xref: /openbmc/linux/include/net/cfg80211.h (revision ca79522c)
1 #ifndef __NET_CFG80211_H
2 #define __NET_CFG80211_H
3 /*
4  * 802.11 device and configuration interface
5  *
6  * Copyright 2006-2010	Johannes Berg <johannes@sipsolutions.net>
7  *
8  * This program is free software; you can redistribute it and/or modify
9  * it under the terms of the GNU General Public License version 2 as
10  * published by the Free Software Foundation.
11  */
12 
13 #include <linux/netdevice.h>
14 #include <linux/debugfs.h>
15 #include <linux/list.h>
16 #include <linux/bug.h>
17 #include <linux/netlink.h>
18 #include <linux/skbuff.h>
19 #include <linux/nl80211.h>
20 #include <linux/if_ether.h>
21 #include <linux/ieee80211.h>
22 #include <linux/net.h>
23 #include <net/regulatory.h>
24 
25 /**
26  * DOC: Introduction
27  *
28  * cfg80211 is the configuration API for 802.11 devices in Linux. It bridges
29  * userspace and drivers, and offers some utility functionality associated
30  * with 802.11. cfg80211 must, directly or indirectly via mac80211, be used
31  * by all modern wireless drivers in Linux, so that they offer a consistent
32  * API through nl80211. For backward compatibility, cfg80211 also offers
33  * wireless extensions to userspace, but hides them from drivers completely.
34  *
35  * Additionally, cfg80211 contains code to help enforce regulatory spectrum
36  * use restrictions.
37  */
38 
39 
40 /**
41  * DOC: Device registration
42  *
43  * In order for a driver to use cfg80211, it must register the hardware device
44  * with cfg80211. This happens through a number of hardware capability structs
45  * described below.
46  *
47  * The fundamental structure for each device is the 'wiphy', of which each
48  * instance describes a physical wireless device connected to the system. Each
49  * such wiphy can have zero, one, or many virtual interfaces associated with
50  * it, which need to be identified as such by pointing the network interface's
51  * @ieee80211_ptr pointer to a &struct wireless_dev which further describes
52  * the wireless part of the interface, normally this struct is embedded in the
53  * network interface's private data area. Drivers can optionally allow creating
54  * or destroying virtual interfaces on the fly, but without at least one or the
55  * ability to create some the wireless device isn't useful.
56  *
57  * Each wiphy structure contains device capability information, and also has
58  * a pointer to the various operations the driver offers. The definitions and
59  * structures here describe these capabilities in detail.
60  */
61 
62 struct wiphy;
63 
64 /*
65  * wireless hardware capability structures
66  */
67 
68 /**
69  * enum ieee80211_band - supported frequency bands
70  *
71  * The bands are assigned this way because the supported
72  * bitrates differ in these bands.
73  *
74  * @IEEE80211_BAND_2GHZ: 2.4GHz ISM band
75  * @IEEE80211_BAND_5GHZ: around 5GHz band (4.9-5.7)
76  * @IEEE80211_BAND_60GHZ: around 60 GHz band (58.32 - 64.80 GHz)
77  * @IEEE80211_NUM_BANDS: number of defined bands
78  */
79 enum ieee80211_band {
80 	IEEE80211_BAND_2GHZ = NL80211_BAND_2GHZ,
81 	IEEE80211_BAND_5GHZ = NL80211_BAND_5GHZ,
82 	IEEE80211_BAND_60GHZ = NL80211_BAND_60GHZ,
83 
84 	/* keep last */
85 	IEEE80211_NUM_BANDS
86 };
87 
88 /**
89  * enum ieee80211_channel_flags - channel flags
90  *
91  * Channel flags set by the regulatory control code.
92  *
93  * @IEEE80211_CHAN_DISABLED: This channel is disabled.
94  * @IEEE80211_CHAN_PASSIVE_SCAN: Only passive scanning is permitted
95  *	on this channel.
96  * @IEEE80211_CHAN_NO_IBSS: IBSS is not allowed on this channel.
97  * @IEEE80211_CHAN_RADAR: Radar detection is required on this channel.
98  * @IEEE80211_CHAN_NO_HT40PLUS: extension channel above this channel
99  * 	is not permitted.
100  * @IEEE80211_CHAN_NO_HT40MINUS: extension channel below this channel
101  * 	is not permitted.
102  * @IEEE80211_CHAN_NO_OFDM: OFDM is not allowed on this channel.
103  * @IEEE80211_CHAN_NO_80MHZ: If the driver supports 80 MHz on the band,
104  *	this flag indicates that an 80 MHz channel cannot use this
105  *	channel as the control or any of the secondary channels.
106  *	This may be due to the driver or due to regulatory bandwidth
107  *	restrictions.
108  * @IEEE80211_CHAN_NO_160MHZ: If the driver supports 160 MHz on the band,
109  *	this flag indicates that an 160 MHz channel cannot use this
110  *	channel as the control or any of the secondary channels.
111  *	This may be due to the driver or due to regulatory bandwidth
112  *	restrictions.
113  */
114 enum ieee80211_channel_flags {
115 	IEEE80211_CHAN_DISABLED		= 1<<0,
116 	IEEE80211_CHAN_PASSIVE_SCAN	= 1<<1,
117 	IEEE80211_CHAN_NO_IBSS		= 1<<2,
118 	IEEE80211_CHAN_RADAR		= 1<<3,
119 	IEEE80211_CHAN_NO_HT40PLUS	= 1<<4,
120 	IEEE80211_CHAN_NO_HT40MINUS	= 1<<5,
121 	IEEE80211_CHAN_NO_OFDM		= 1<<6,
122 	IEEE80211_CHAN_NO_80MHZ		= 1<<7,
123 	IEEE80211_CHAN_NO_160MHZ	= 1<<8,
124 };
125 
126 #define IEEE80211_CHAN_NO_HT40 \
127 	(IEEE80211_CHAN_NO_HT40PLUS | IEEE80211_CHAN_NO_HT40MINUS)
128 
129 #define IEEE80211_DFS_MIN_CAC_TIME_MS		60000
130 #define IEEE80211_DFS_MIN_NOP_TIME_MS		(30 * 60 * 1000)
131 
132 /**
133  * struct ieee80211_channel - channel definition
134  *
135  * This structure describes a single channel for use
136  * with cfg80211.
137  *
138  * @center_freq: center frequency in MHz
139  * @hw_value: hardware-specific value for the channel
140  * @flags: channel flags from &enum ieee80211_channel_flags.
141  * @orig_flags: channel flags at registration time, used by regulatory
142  *	code to support devices with additional restrictions
143  * @band: band this channel belongs to.
144  * @max_antenna_gain: maximum antenna gain in dBi
145  * @max_power: maximum transmission power (in dBm)
146  * @max_reg_power: maximum regulatory transmission power (in dBm)
147  * @beacon_found: helper to regulatory code to indicate when a beacon
148  *	has been found on this channel. Use regulatory_hint_found_beacon()
149  *	to enable this, this is useful only on 5 GHz band.
150  * @orig_mag: internal use
151  * @orig_mpwr: internal use
152  * @dfs_state: current state of this channel. Only relevant if radar is required
153  *	on this channel.
154  * @dfs_state_entered: timestamp (jiffies) when the dfs state was entered.
155  */
156 struct ieee80211_channel {
157 	enum ieee80211_band band;
158 	u16 center_freq;
159 	u16 hw_value;
160 	u32 flags;
161 	int max_antenna_gain;
162 	int max_power;
163 	int max_reg_power;
164 	bool beacon_found;
165 	u32 orig_flags;
166 	int orig_mag, orig_mpwr;
167 	enum nl80211_dfs_state dfs_state;
168 	unsigned long dfs_state_entered;
169 };
170 
171 /**
172  * enum ieee80211_rate_flags - rate flags
173  *
174  * Hardware/specification flags for rates. These are structured
175  * in a way that allows using the same bitrate structure for
176  * different bands/PHY modes.
177  *
178  * @IEEE80211_RATE_SHORT_PREAMBLE: Hardware can send with short
179  *	preamble on this bitrate; only relevant in 2.4GHz band and
180  *	with CCK rates.
181  * @IEEE80211_RATE_MANDATORY_A: This bitrate is a mandatory rate
182  *	when used with 802.11a (on the 5 GHz band); filled by the
183  *	core code when registering the wiphy.
184  * @IEEE80211_RATE_MANDATORY_B: This bitrate is a mandatory rate
185  *	when used with 802.11b (on the 2.4 GHz band); filled by the
186  *	core code when registering the wiphy.
187  * @IEEE80211_RATE_MANDATORY_G: This bitrate is a mandatory rate
188  *	when used with 802.11g (on the 2.4 GHz band); filled by the
189  *	core code when registering the wiphy.
190  * @IEEE80211_RATE_ERP_G: This is an ERP rate in 802.11g mode.
191  */
192 enum ieee80211_rate_flags {
193 	IEEE80211_RATE_SHORT_PREAMBLE	= 1<<0,
194 	IEEE80211_RATE_MANDATORY_A	= 1<<1,
195 	IEEE80211_RATE_MANDATORY_B	= 1<<2,
196 	IEEE80211_RATE_MANDATORY_G	= 1<<3,
197 	IEEE80211_RATE_ERP_G		= 1<<4,
198 };
199 
200 /**
201  * struct ieee80211_rate - bitrate definition
202  *
203  * This structure describes a bitrate that an 802.11 PHY can
204  * operate with. The two values @hw_value and @hw_value_short
205  * are only for driver use when pointers to this structure are
206  * passed around.
207  *
208  * @flags: rate-specific flags
209  * @bitrate: bitrate in units of 100 Kbps
210  * @hw_value: driver/hardware value for this rate
211  * @hw_value_short: driver/hardware value for this rate when
212  *	short preamble is used
213  */
214 struct ieee80211_rate {
215 	u32 flags;
216 	u16 bitrate;
217 	u16 hw_value, hw_value_short;
218 };
219 
220 /**
221  * struct ieee80211_sta_ht_cap - STA's HT capabilities
222  *
223  * This structure describes most essential parameters needed
224  * to describe 802.11n HT capabilities for an STA.
225  *
226  * @ht_supported: is HT supported by the STA
227  * @cap: HT capabilities map as described in 802.11n spec
228  * @ampdu_factor: Maximum A-MPDU length factor
229  * @ampdu_density: Minimum A-MPDU spacing
230  * @mcs: Supported MCS rates
231  */
232 struct ieee80211_sta_ht_cap {
233 	u16 cap; /* use IEEE80211_HT_CAP_ */
234 	bool ht_supported;
235 	u8 ampdu_factor;
236 	u8 ampdu_density;
237 	struct ieee80211_mcs_info mcs;
238 };
239 
240 /**
241  * struct ieee80211_sta_vht_cap - STA's VHT capabilities
242  *
243  * This structure describes most essential parameters needed
244  * to describe 802.11ac VHT capabilities for an STA.
245  *
246  * @vht_supported: is VHT supported by the STA
247  * @cap: VHT capabilities map as described in 802.11ac spec
248  * @vht_mcs: Supported VHT MCS rates
249  */
250 struct ieee80211_sta_vht_cap {
251 	bool vht_supported;
252 	u32 cap; /* use IEEE80211_VHT_CAP_ */
253 	struct ieee80211_vht_mcs_info vht_mcs;
254 };
255 
256 /**
257  * struct ieee80211_supported_band - frequency band definition
258  *
259  * This structure describes a frequency band a wiphy
260  * is able to operate in.
261  *
262  * @channels: Array of channels the hardware can operate in
263  *	in this band.
264  * @band: the band this structure represents
265  * @n_channels: Number of channels in @channels
266  * @bitrates: Array of bitrates the hardware can operate with
267  *	in this band. Must be sorted to give a valid "supported
268  *	rates" IE, i.e. CCK rates first, then OFDM.
269  * @n_bitrates: Number of bitrates in @bitrates
270  * @ht_cap: HT capabilities in this band
271  * @vht_cap: VHT capabilities in this band
272  */
273 struct ieee80211_supported_band {
274 	struct ieee80211_channel *channels;
275 	struct ieee80211_rate *bitrates;
276 	enum ieee80211_band band;
277 	int n_channels;
278 	int n_bitrates;
279 	struct ieee80211_sta_ht_cap ht_cap;
280 	struct ieee80211_sta_vht_cap vht_cap;
281 };
282 
283 /*
284  * Wireless hardware/device configuration structures and methods
285  */
286 
287 /**
288  * DOC: Actions and configuration
289  *
290  * Each wireless device and each virtual interface offer a set of configuration
291  * operations and other actions that are invoked by userspace. Each of these
292  * actions is described in the operations structure, and the parameters these
293  * operations use are described separately.
294  *
295  * Additionally, some operations are asynchronous and expect to get status
296  * information via some functions that drivers need to call.
297  *
298  * Scanning and BSS list handling with its associated functionality is described
299  * in a separate chapter.
300  */
301 
302 /**
303  * struct vif_params - describes virtual interface parameters
304  * @use_4addr: use 4-address frames
305  * @macaddr: address to use for this virtual interface. This will only
306  * 	be used for non-netdevice interfaces. If this parameter is set
307  * 	to zero address the driver may determine the address as needed.
308  */
309 struct vif_params {
310        int use_4addr;
311        u8 macaddr[ETH_ALEN];
312 };
313 
314 /**
315  * struct key_params - key information
316  *
317  * Information about a key
318  *
319  * @key: key material
320  * @key_len: length of key material
321  * @cipher: cipher suite selector
322  * @seq: sequence counter (IV/PN) for TKIP and CCMP keys, only used
323  *	with the get_key() callback, must be in little endian,
324  *	length given by @seq_len.
325  * @seq_len: length of @seq.
326  */
327 struct key_params {
328 	u8 *key;
329 	u8 *seq;
330 	int key_len;
331 	int seq_len;
332 	u32 cipher;
333 };
334 
335 /**
336  * struct cfg80211_chan_def - channel definition
337  * @chan: the (control) channel
338  * @width: channel width
339  * @center_freq1: center frequency of first segment
340  * @center_freq2: center frequency of second segment
341  *	(only with 80+80 MHz)
342  */
343 struct cfg80211_chan_def {
344 	struct ieee80211_channel *chan;
345 	enum nl80211_chan_width width;
346 	u32 center_freq1;
347 	u32 center_freq2;
348 };
349 
350 /**
351  * cfg80211_get_chandef_type - return old channel type from chandef
352  * @chandef: the channel definition
353  *
354  * Return: The old channel type (NOHT, HT20, HT40+/-) from a given
355  * chandef, which must have a bandwidth allowing this conversion.
356  */
357 static inline enum nl80211_channel_type
358 cfg80211_get_chandef_type(const struct cfg80211_chan_def *chandef)
359 {
360 	switch (chandef->width) {
361 	case NL80211_CHAN_WIDTH_20_NOHT:
362 		return NL80211_CHAN_NO_HT;
363 	case NL80211_CHAN_WIDTH_20:
364 		return NL80211_CHAN_HT20;
365 	case NL80211_CHAN_WIDTH_40:
366 		if (chandef->center_freq1 > chandef->chan->center_freq)
367 			return NL80211_CHAN_HT40PLUS;
368 		return NL80211_CHAN_HT40MINUS;
369 	default:
370 		WARN_ON(1);
371 		return NL80211_CHAN_NO_HT;
372 	}
373 }
374 
375 /**
376  * cfg80211_chandef_create - create channel definition using channel type
377  * @chandef: the channel definition struct to fill
378  * @channel: the control channel
379  * @chantype: the channel type
380  *
381  * Given a channel type, create a channel definition.
382  */
383 void cfg80211_chandef_create(struct cfg80211_chan_def *chandef,
384 			     struct ieee80211_channel *channel,
385 			     enum nl80211_channel_type chantype);
386 
387 /**
388  * cfg80211_chandef_identical - check if two channel definitions are identical
389  * @chandef1: first channel definition
390  * @chandef2: second channel definition
391  *
392  * Return: %true if the channels defined by the channel definitions are
393  * identical, %false otherwise.
394  */
395 static inline bool
396 cfg80211_chandef_identical(const struct cfg80211_chan_def *chandef1,
397 			   const struct cfg80211_chan_def *chandef2)
398 {
399 	return (chandef1->chan == chandef2->chan &&
400 		chandef1->width == chandef2->width &&
401 		chandef1->center_freq1 == chandef2->center_freq1 &&
402 		chandef1->center_freq2 == chandef2->center_freq2);
403 }
404 
405 /**
406  * cfg80211_chandef_compatible - check if two channel definitions are compatible
407  * @chandef1: first channel definition
408  * @chandef2: second channel definition
409  *
410  * Return: %NULL if the given channel definitions are incompatible,
411  * chandef1 or chandef2 otherwise.
412  */
413 const struct cfg80211_chan_def *
414 cfg80211_chandef_compatible(const struct cfg80211_chan_def *chandef1,
415 			    const struct cfg80211_chan_def *chandef2);
416 
417 /**
418  * cfg80211_chandef_valid - check if a channel definition is valid
419  * @chandef: the channel definition to check
420  * Return: %true if the channel definition is valid. %false otherwise.
421  */
422 bool cfg80211_chandef_valid(const struct cfg80211_chan_def *chandef);
423 
424 /**
425  * cfg80211_chandef_usable - check if secondary channels can be used
426  * @wiphy: the wiphy to validate against
427  * @chandef: the channel definition to check
428  * @prohibited_flags: the regulatory channel flags that must not be set
429  * Return: %true if secondary channels are usable. %false otherwise.
430  */
431 bool cfg80211_chandef_usable(struct wiphy *wiphy,
432 			     const struct cfg80211_chan_def *chandef,
433 			     u32 prohibited_flags);
434 
435 /**
436  * enum survey_info_flags - survey information flags
437  *
438  * @SURVEY_INFO_NOISE_DBM: noise (in dBm) was filled in
439  * @SURVEY_INFO_IN_USE: channel is currently being used
440  * @SURVEY_INFO_CHANNEL_TIME: channel active time (in ms) was filled in
441  * @SURVEY_INFO_CHANNEL_TIME_BUSY: channel busy time was filled in
442  * @SURVEY_INFO_CHANNEL_TIME_EXT_BUSY: extension channel busy time was filled in
443  * @SURVEY_INFO_CHANNEL_TIME_RX: channel receive time was filled in
444  * @SURVEY_INFO_CHANNEL_TIME_TX: channel transmit time was filled in
445  *
446  * Used by the driver to indicate which info in &struct survey_info
447  * it has filled in during the get_survey().
448  */
449 enum survey_info_flags {
450 	SURVEY_INFO_NOISE_DBM = 1<<0,
451 	SURVEY_INFO_IN_USE = 1<<1,
452 	SURVEY_INFO_CHANNEL_TIME = 1<<2,
453 	SURVEY_INFO_CHANNEL_TIME_BUSY = 1<<3,
454 	SURVEY_INFO_CHANNEL_TIME_EXT_BUSY = 1<<4,
455 	SURVEY_INFO_CHANNEL_TIME_RX = 1<<5,
456 	SURVEY_INFO_CHANNEL_TIME_TX = 1<<6,
457 };
458 
459 /**
460  * struct survey_info - channel survey response
461  *
462  * @channel: the channel this survey record reports, mandatory
463  * @filled: bitflag of flags from &enum survey_info_flags
464  * @noise: channel noise in dBm. This and all following fields are
465  *     optional
466  * @channel_time: amount of time in ms the radio spent on the channel
467  * @channel_time_busy: amount of time the primary channel was sensed busy
468  * @channel_time_ext_busy: amount of time the extension channel was sensed busy
469  * @channel_time_rx: amount of time the radio spent receiving data
470  * @channel_time_tx: amount of time the radio spent transmitting data
471  *
472  * Used by dump_survey() to report back per-channel survey information.
473  *
474  * This structure can later be expanded with things like
475  * channel duty cycle etc.
476  */
477 struct survey_info {
478 	struct ieee80211_channel *channel;
479 	u64 channel_time;
480 	u64 channel_time_busy;
481 	u64 channel_time_ext_busy;
482 	u64 channel_time_rx;
483 	u64 channel_time_tx;
484 	u32 filled;
485 	s8 noise;
486 };
487 
488 /**
489  * struct cfg80211_crypto_settings - Crypto settings
490  * @wpa_versions: indicates which, if any, WPA versions are enabled
491  *	(from enum nl80211_wpa_versions)
492  * @cipher_group: group key cipher suite (or 0 if unset)
493  * @n_ciphers_pairwise: number of AP supported unicast ciphers
494  * @ciphers_pairwise: unicast key cipher suites
495  * @n_akm_suites: number of AKM suites
496  * @akm_suites: AKM suites
497  * @control_port: Whether user space controls IEEE 802.1X port, i.e.,
498  *	sets/clears %NL80211_STA_FLAG_AUTHORIZED. If true, the driver is
499  *	required to assume that the port is unauthorized until authorized by
500  *	user space. Otherwise, port is marked authorized by default.
501  * @control_port_ethertype: the control port protocol that should be
502  *	allowed through even on unauthorized ports
503  * @control_port_no_encrypt: TRUE to prevent encryption of control port
504  *	protocol frames.
505  */
506 struct cfg80211_crypto_settings {
507 	u32 wpa_versions;
508 	u32 cipher_group;
509 	int n_ciphers_pairwise;
510 	u32 ciphers_pairwise[NL80211_MAX_NR_CIPHER_SUITES];
511 	int n_akm_suites;
512 	u32 akm_suites[NL80211_MAX_NR_AKM_SUITES];
513 	bool control_port;
514 	__be16 control_port_ethertype;
515 	bool control_port_no_encrypt;
516 };
517 
518 /**
519  * struct cfg80211_beacon_data - beacon data
520  * @head: head portion of beacon (before TIM IE)
521  *     or %NULL if not changed
522  * @tail: tail portion of beacon (after TIM IE)
523  *     or %NULL if not changed
524  * @head_len: length of @head
525  * @tail_len: length of @tail
526  * @beacon_ies: extra information element(s) to add into Beacon frames or %NULL
527  * @beacon_ies_len: length of beacon_ies in octets
528  * @proberesp_ies: extra information element(s) to add into Probe Response
529  *	frames or %NULL
530  * @proberesp_ies_len: length of proberesp_ies in octets
531  * @assocresp_ies: extra information element(s) to add into (Re)Association
532  *	Response frames or %NULL
533  * @assocresp_ies_len: length of assocresp_ies in octets
534  * @probe_resp_len: length of probe response template (@probe_resp)
535  * @probe_resp: probe response template (AP mode only)
536  */
537 struct cfg80211_beacon_data {
538 	const u8 *head, *tail;
539 	const u8 *beacon_ies;
540 	const u8 *proberesp_ies;
541 	const u8 *assocresp_ies;
542 	const u8 *probe_resp;
543 
544 	size_t head_len, tail_len;
545 	size_t beacon_ies_len;
546 	size_t proberesp_ies_len;
547 	size_t assocresp_ies_len;
548 	size_t probe_resp_len;
549 };
550 
551 struct mac_address {
552 	u8 addr[ETH_ALEN];
553 };
554 
555 /**
556  * struct cfg80211_acl_data - Access control list data
557  *
558  * @acl_policy: ACL policy to be applied on the station's
559  *	entry specified by mac_addr
560  * @n_acl_entries: Number of MAC address entries passed
561  * @mac_addrs: List of MAC addresses of stations to be used for ACL
562  */
563 struct cfg80211_acl_data {
564 	enum nl80211_acl_policy acl_policy;
565 	int n_acl_entries;
566 
567 	/* Keep it last */
568 	struct mac_address mac_addrs[];
569 };
570 
571 /**
572  * struct cfg80211_ap_settings - AP configuration
573  *
574  * Used to configure an AP interface.
575  *
576  * @chandef: defines the channel to use
577  * @beacon: beacon data
578  * @beacon_interval: beacon interval
579  * @dtim_period: DTIM period
580  * @ssid: SSID to be used in the BSS (note: may be %NULL if not provided from
581  *	user space)
582  * @ssid_len: length of @ssid
583  * @hidden_ssid: whether to hide the SSID in Beacon/Probe Response frames
584  * @crypto: crypto settings
585  * @privacy: the BSS uses privacy
586  * @auth_type: Authentication type (algorithm)
587  * @inactivity_timeout: time in seconds to determine station's inactivity.
588  * @p2p_ctwindow: P2P CT Window
589  * @p2p_opp_ps: P2P opportunistic PS
590  * @acl: ACL configuration used by the drivers which has support for
591  *	MAC address based access control
592  * @radar_required: set if radar detection is required
593  */
594 struct cfg80211_ap_settings {
595 	struct cfg80211_chan_def chandef;
596 
597 	struct cfg80211_beacon_data beacon;
598 
599 	int beacon_interval, dtim_period;
600 	const u8 *ssid;
601 	size_t ssid_len;
602 	enum nl80211_hidden_ssid hidden_ssid;
603 	struct cfg80211_crypto_settings crypto;
604 	bool privacy;
605 	enum nl80211_auth_type auth_type;
606 	int inactivity_timeout;
607 	u8 p2p_ctwindow;
608 	bool p2p_opp_ps;
609 	const struct cfg80211_acl_data *acl;
610 	bool radar_required;
611 };
612 
613 /**
614  * enum station_parameters_apply_mask - station parameter values to apply
615  * @STATION_PARAM_APPLY_UAPSD: apply new uAPSD parameters (uapsd_queues, max_sp)
616  * @STATION_PARAM_APPLY_CAPABILITY: apply new capability
617  * @STATION_PARAM_APPLY_PLINK_STATE: apply new plink state
618  *
619  * Not all station parameters have in-band "no change" signalling,
620  * for those that don't these flags will are used.
621  */
622 enum station_parameters_apply_mask {
623 	STATION_PARAM_APPLY_UAPSD = BIT(0),
624 	STATION_PARAM_APPLY_CAPABILITY = BIT(1),
625 	STATION_PARAM_APPLY_PLINK_STATE = BIT(2),
626 };
627 
628 /**
629  * struct station_parameters - station parameters
630  *
631  * Used to change and create a new station.
632  *
633  * @vlan: vlan interface station should belong to
634  * @supported_rates: supported rates in IEEE 802.11 format
635  *	(or NULL for no change)
636  * @supported_rates_len: number of supported rates
637  * @sta_flags_mask: station flags that changed
638  *	(bitmask of BIT(NL80211_STA_FLAG_...))
639  * @sta_flags_set: station flags values
640  *	(bitmask of BIT(NL80211_STA_FLAG_...))
641  * @listen_interval: listen interval or -1 for no change
642  * @aid: AID or zero for no change
643  * @plink_action: plink action to take
644  * @plink_state: set the peer link state for a station
645  * @ht_capa: HT capabilities of station
646  * @vht_capa: VHT capabilities of station
647  * @uapsd_queues: bitmap of queues configured for uapsd. same format
648  *	as the AC bitmap in the QoS info field
649  * @max_sp: max Service Period. same format as the MAX_SP in the
650  *	QoS info field (but already shifted down)
651  * @sta_modify_mask: bitmap indicating which parameters changed
652  *	(for those that don't have a natural "no change" value),
653  *	see &enum station_parameters_apply_mask
654  * @local_pm: local link-specific mesh power save mode (no change when set
655  *	to unknown)
656  * @capability: station capability
657  * @ext_capab: extended capabilities of the station
658  * @ext_capab_len: number of extended capabilities
659  */
660 struct station_parameters {
661 	const u8 *supported_rates;
662 	struct net_device *vlan;
663 	u32 sta_flags_mask, sta_flags_set;
664 	u32 sta_modify_mask;
665 	int listen_interval;
666 	u16 aid;
667 	u8 supported_rates_len;
668 	u8 plink_action;
669 	u8 plink_state;
670 	const struct ieee80211_ht_cap *ht_capa;
671 	const struct ieee80211_vht_cap *vht_capa;
672 	u8 uapsd_queues;
673 	u8 max_sp;
674 	enum nl80211_mesh_power_mode local_pm;
675 	u16 capability;
676 	const u8 *ext_capab;
677 	u8 ext_capab_len;
678 };
679 
680 /**
681  * enum cfg80211_station_type - the type of station being modified
682  * @CFG80211_STA_AP_CLIENT: client of an AP interface
683  * @CFG80211_STA_AP_MLME_CLIENT: client of an AP interface that has
684  *	the AP MLME in the device
685  * @CFG80211_STA_AP_STA: AP station on managed interface
686  * @CFG80211_STA_IBSS: IBSS station
687  * @CFG80211_STA_TDLS_PEER_SETUP: TDLS peer on managed interface (dummy entry
688  *	while TDLS setup is in progress, it moves out of this state when
689  *	being marked authorized; use this only if TDLS with external setup is
690  *	supported/used)
691  * @CFG80211_STA_TDLS_PEER_ACTIVE: TDLS peer on managed interface (active
692  *	entry that is operating, has been marked authorized by userspace)
693  * @CFG80211_STA_MESH_PEER_KERNEL: peer on mesh interface (kernel managed)
694  * @CFG80211_STA_MESH_PEER_USER: peer on mesh interface (user managed)
695  */
696 enum cfg80211_station_type {
697 	CFG80211_STA_AP_CLIENT,
698 	CFG80211_STA_AP_MLME_CLIENT,
699 	CFG80211_STA_AP_STA,
700 	CFG80211_STA_IBSS,
701 	CFG80211_STA_TDLS_PEER_SETUP,
702 	CFG80211_STA_TDLS_PEER_ACTIVE,
703 	CFG80211_STA_MESH_PEER_KERNEL,
704 	CFG80211_STA_MESH_PEER_USER,
705 };
706 
707 /**
708  * cfg80211_check_station_change - validate parameter changes
709  * @wiphy: the wiphy this operates on
710  * @params: the new parameters for a station
711  * @statype: the type of station being modified
712  *
713  * Utility function for the @change_station driver method. Call this function
714  * with the appropriate station type looking up the station (and checking that
715  * it exists). It will verify whether the station change is acceptable, and if
716  * not will return an error code. Note that it may modify the parameters for
717  * backward compatibility reasons, so don't use them before calling this.
718  */
719 int cfg80211_check_station_change(struct wiphy *wiphy,
720 				  struct station_parameters *params,
721 				  enum cfg80211_station_type statype);
722 
723 /**
724  * enum station_info_flags - station information flags
725  *
726  * Used by the driver to indicate which info in &struct station_info
727  * it has filled in during get_station() or dump_station().
728  *
729  * @STATION_INFO_INACTIVE_TIME: @inactive_time filled
730  * @STATION_INFO_RX_BYTES: @rx_bytes filled
731  * @STATION_INFO_TX_BYTES: @tx_bytes filled
732  * @STATION_INFO_RX_BYTES64: @rx_bytes filled with 64-bit value
733  * @STATION_INFO_TX_BYTES64: @tx_bytes filled with 64-bit value
734  * @STATION_INFO_LLID: @llid filled
735  * @STATION_INFO_PLID: @plid filled
736  * @STATION_INFO_PLINK_STATE: @plink_state filled
737  * @STATION_INFO_SIGNAL: @signal filled
738  * @STATION_INFO_TX_BITRATE: @txrate fields are filled
739  *  (tx_bitrate, tx_bitrate_flags and tx_bitrate_mcs)
740  * @STATION_INFO_RX_PACKETS: @rx_packets filled with 32-bit value
741  * @STATION_INFO_TX_PACKETS: @tx_packets filled with 32-bit value
742  * @STATION_INFO_TX_RETRIES: @tx_retries filled
743  * @STATION_INFO_TX_FAILED: @tx_failed filled
744  * @STATION_INFO_RX_DROP_MISC: @rx_dropped_misc filled
745  * @STATION_INFO_SIGNAL_AVG: @signal_avg filled
746  * @STATION_INFO_RX_BITRATE: @rxrate fields are filled
747  * @STATION_INFO_BSS_PARAM: @bss_param filled
748  * @STATION_INFO_CONNECTED_TIME: @connected_time filled
749  * @STATION_INFO_ASSOC_REQ_IES: @assoc_req_ies filled
750  * @STATION_INFO_STA_FLAGS: @sta_flags filled
751  * @STATION_INFO_BEACON_LOSS_COUNT: @beacon_loss_count filled
752  * @STATION_INFO_T_OFFSET: @t_offset filled
753  * @STATION_INFO_LOCAL_PM: @local_pm filled
754  * @STATION_INFO_PEER_PM: @peer_pm filled
755  * @STATION_INFO_NONPEER_PM: @nonpeer_pm filled
756  */
757 enum station_info_flags {
758 	STATION_INFO_INACTIVE_TIME	= 1<<0,
759 	STATION_INFO_RX_BYTES		= 1<<1,
760 	STATION_INFO_TX_BYTES		= 1<<2,
761 	STATION_INFO_LLID		= 1<<3,
762 	STATION_INFO_PLID		= 1<<4,
763 	STATION_INFO_PLINK_STATE	= 1<<5,
764 	STATION_INFO_SIGNAL		= 1<<6,
765 	STATION_INFO_TX_BITRATE		= 1<<7,
766 	STATION_INFO_RX_PACKETS		= 1<<8,
767 	STATION_INFO_TX_PACKETS		= 1<<9,
768 	STATION_INFO_TX_RETRIES		= 1<<10,
769 	STATION_INFO_TX_FAILED		= 1<<11,
770 	STATION_INFO_RX_DROP_MISC	= 1<<12,
771 	STATION_INFO_SIGNAL_AVG		= 1<<13,
772 	STATION_INFO_RX_BITRATE		= 1<<14,
773 	STATION_INFO_BSS_PARAM          = 1<<15,
774 	STATION_INFO_CONNECTED_TIME	= 1<<16,
775 	STATION_INFO_ASSOC_REQ_IES	= 1<<17,
776 	STATION_INFO_STA_FLAGS		= 1<<18,
777 	STATION_INFO_BEACON_LOSS_COUNT	= 1<<19,
778 	STATION_INFO_T_OFFSET		= 1<<20,
779 	STATION_INFO_LOCAL_PM		= 1<<21,
780 	STATION_INFO_PEER_PM		= 1<<22,
781 	STATION_INFO_NONPEER_PM		= 1<<23,
782 	STATION_INFO_RX_BYTES64		= 1<<24,
783 	STATION_INFO_TX_BYTES64		= 1<<25,
784 };
785 
786 /**
787  * enum station_info_rate_flags - bitrate info flags
788  *
789  * Used by the driver to indicate the specific rate transmission
790  * type for 802.11n transmissions.
791  *
792  * @RATE_INFO_FLAGS_MCS: mcs field filled with HT MCS
793  * @RATE_INFO_FLAGS_VHT_MCS: mcs field filled with VHT MCS
794  * @RATE_INFO_FLAGS_40_MHZ_WIDTH: 40 MHz width transmission
795  * @RATE_INFO_FLAGS_80_MHZ_WIDTH: 80 MHz width transmission
796  * @RATE_INFO_FLAGS_80P80_MHZ_WIDTH: 80+80 MHz width transmission
797  * @RATE_INFO_FLAGS_160_MHZ_WIDTH: 160 MHz width transmission
798  * @RATE_INFO_FLAGS_SHORT_GI: 400ns guard interval
799  * @RATE_INFO_FLAGS_60G: 60GHz MCS
800  */
801 enum rate_info_flags {
802 	RATE_INFO_FLAGS_MCS			= BIT(0),
803 	RATE_INFO_FLAGS_VHT_MCS			= BIT(1),
804 	RATE_INFO_FLAGS_40_MHZ_WIDTH		= BIT(2),
805 	RATE_INFO_FLAGS_80_MHZ_WIDTH		= BIT(3),
806 	RATE_INFO_FLAGS_80P80_MHZ_WIDTH		= BIT(4),
807 	RATE_INFO_FLAGS_160_MHZ_WIDTH		= BIT(5),
808 	RATE_INFO_FLAGS_SHORT_GI		= BIT(6),
809 	RATE_INFO_FLAGS_60G			= BIT(7),
810 };
811 
812 /**
813  * struct rate_info - bitrate information
814  *
815  * Information about a receiving or transmitting bitrate
816  *
817  * @flags: bitflag of flags from &enum rate_info_flags
818  * @mcs: mcs index if struct describes a 802.11n bitrate
819  * @legacy: bitrate in 100kbit/s for 802.11abg
820  * @nss: number of streams (VHT only)
821  */
822 struct rate_info {
823 	u8 flags;
824 	u8 mcs;
825 	u16 legacy;
826 	u8 nss;
827 };
828 
829 /**
830  * enum station_info_rate_flags - bitrate info flags
831  *
832  * Used by the driver to indicate the specific rate transmission
833  * type for 802.11n transmissions.
834  *
835  * @BSS_PARAM_FLAGS_CTS_PROT: whether CTS protection is enabled
836  * @BSS_PARAM_FLAGS_SHORT_PREAMBLE: whether short preamble is enabled
837  * @BSS_PARAM_FLAGS_SHORT_SLOT_TIME: whether short slot time is enabled
838  */
839 enum bss_param_flags {
840 	BSS_PARAM_FLAGS_CTS_PROT	= 1<<0,
841 	BSS_PARAM_FLAGS_SHORT_PREAMBLE	= 1<<1,
842 	BSS_PARAM_FLAGS_SHORT_SLOT_TIME	= 1<<2,
843 };
844 
845 /**
846  * struct sta_bss_parameters - BSS parameters for the attached station
847  *
848  * Information about the currently associated BSS
849  *
850  * @flags: bitflag of flags from &enum bss_param_flags
851  * @dtim_period: DTIM period for the BSS
852  * @beacon_interval: beacon interval
853  */
854 struct sta_bss_parameters {
855 	u8 flags;
856 	u8 dtim_period;
857 	u16 beacon_interval;
858 };
859 
860 /**
861  * struct station_info - station information
862  *
863  * Station information filled by driver for get_station() and dump_station.
864  *
865  * @filled: bitflag of flags from &enum station_info_flags
866  * @connected_time: time(in secs) since a station is last connected
867  * @inactive_time: time since last station activity (tx/rx) in milliseconds
868  * @rx_bytes: bytes received from this station
869  * @tx_bytes: bytes transmitted to this station
870  * @llid: mesh local link id
871  * @plid: mesh peer link id
872  * @plink_state: mesh peer link state
873  * @signal: The signal strength, type depends on the wiphy's signal_type.
874  *	For CFG80211_SIGNAL_TYPE_MBM, value is expressed in _dBm_.
875  * @signal_avg: Average signal strength, type depends on the wiphy's signal_type.
876  *	For CFG80211_SIGNAL_TYPE_MBM, value is expressed in _dBm_.
877  * @txrate: current unicast bitrate from this station
878  * @rxrate: current unicast bitrate to this station
879  * @rx_packets: packets received from this station
880  * @tx_packets: packets transmitted to this station
881  * @tx_retries: cumulative retry counts
882  * @tx_failed: number of failed transmissions (retries exceeded, no ACK)
883  * @rx_dropped_misc:  Dropped for un-specified reason.
884  * @bss_param: current BSS parameters
885  * @generation: generation number for nl80211 dumps.
886  *	This number should increase every time the list of stations
887  *	changes, i.e. when a station is added or removed, so that
888  *	userspace can tell whether it got a consistent snapshot.
889  * @assoc_req_ies: IEs from (Re)Association Request.
890  *	This is used only when in AP mode with drivers that do not use
891  *	user space MLME/SME implementation. The information is provided for
892  *	the cfg80211_new_sta() calls to notify user space of the IEs.
893  * @assoc_req_ies_len: Length of assoc_req_ies buffer in octets.
894  * @sta_flags: station flags mask & values
895  * @beacon_loss_count: Number of times beacon loss event has triggered.
896  * @t_offset: Time offset of the station relative to this host.
897  * @local_pm: local mesh STA power save mode
898  * @peer_pm: peer mesh STA power save mode
899  * @nonpeer_pm: non-peer mesh STA power save mode
900  */
901 struct station_info {
902 	u32 filled;
903 	u32 connected_time;
904 	u32 inactive_time;
905 	u64 rx_bytes;
906 	u64 tx_bytes;
907 	u16 llid;
908 	u16 plid;
909 	u8 plink_state;
910 	s8 signal;
911 	s8 signal_avg;
912 	struct rate_info txrate;
913 	struct rate_info rxrate;
914 	u32 rx_packets;
915 	u32 tx_packets;
916 	u32 tx_retries;
917 	u32 tx_failed;
918 	u32 rx_dropped_misc;
919 	struct sta_bss_parameters bss_param;
920 	struct nl80211_sta_flag_update sta_flags;
921 
922 	int generation;
923 
924 	const u8 *assoc_req_ies;
925 	size_t assoc_req_ies_len;
926 
927 	u32 beacon_loss_count;
928 	s64 t_offset;
929 	enum nl80211_mesh_power_mode local_pm;
930 	enum nl80211_mesh_power_mode peer_pm;
931 	enum nl80211_mesh_power_mode nonpeer_pm;
932 
933 	/*
934 	 * Note: Add a new enum station_info_flags value for each new field and
935 	 * use it to check which fields are initialized.
936 	 */
937 };
938 
939 /**
940  * enum monitor_flags - monitor flags
941  *
942  * Monitor interface configuration flags. Note that these must be the bits
943  * according to the nl80211 flags.
944  *
945  * @MONITOR_FLAG_FCSFAIL: pass frames with bad FCS
946  * @MONITOR_FLAG_PLCPFAIL: pass frames with bad PLCP
947  * @MONITOR_FLAG_CONTROL: pass control frames
948  * @MONITOR_FLAG_OTHER_BSS: disable BSSID filtering
949  * @MONITOR_FLAG_COOK_FRAMES: report frames after processing
950  */
951 enum monitor_flags {
952 	MONITOR_FLAG_FCSFAIL		= 1<<NL80211_MNTR_FLAG_FCSFAIL,
953 	MONITOR_FLAG_PLCPFAIL		= 1<<NL80211_MNTR_FLAG_PLCPFAIL,
954 	MONITOR_FLAG_CONTROL		= 1<<NL80211_MNTR_FLAG_CONTROL,
955 	MONITOR_FLAG_OTHER_BSS		= 1<<NL80211_MNTR_FLAG_OTHER_BSS,
956 	MONITOR_FLAG_COOK_FRAMES	= 1<<NL80211_MNTR_FLAG_COOK_FRAMES,
957 };
958 
959 /**
960  * enum mpath_info_flags -  mesh path information flags
961  *
962  * Used by the driver to indicate which info in &struct mpath_info it has filled
963  * in during get_station() or dump_station().
964  *
965  * @MPATH_INFO_FRAME_QLEN: @frame_qlen filled
966  * @MPATH_INFO_SN: @sn filled
967  * @MPATH_INFO_METRIC: @metric filled
968  * @MPATH_INFO_EXPTIME: @exptime filled
969  * @MPATH_INFO_DISCOVERY_TIMEOUT: @discovery_timeout filled
970  * @MPATH_INFO_DISCOVERY_RETRIES: @discovery_retries filled
971  * @MPATH_INFO_FLAGS: @flags filled
972  */
973 enum mpath_info_flags {
974 	MPATH_INFO_FRAME_QLEN		= BIT(0),
975 	MPATH_INFO_SN			= BIT(1),
976 	MPATH_INFO_METRIC		= BIT(2),
977 	MPATH_INFO_EXPTIME		= BIT(3),
978 	MPATH_INFO_DISCOVERY_TIMEOUT	= BIT(4),
979 	MPATH_INFO_DISCOVERY_RETRIES	= BIT(5),
980 	MPATH_INFO_FLAGS		= BIT(6),
981 };
982 
983 /**
984  * struct mpath_info - mesh path information
985  *
986  * Mesh path information filled by driver for get_mpath() and dump_mpath().
987  *
988  * @filled: bitfield of flags from &enum mpath_info_flags
989  * @frame_qlen: number of queued frames for this destination
990  * @sn: target sequence number
991  * @metric: metric (cost) of this mesh path
992  * @exptime: expiration time for the mesh path from now, in msecs
993  * @flags: mesh path flags
994  * @discovery_timeout: total mesh path discovery timeout, in msecs
995  * @discovery_retries: mesh path discovery retries
996  * @generation: generation number for nl80211 dumps.
997  *	This number should increase every time the list of mesh paths
998  *	changes, i.e. when a station is added or removed, so that
999  *	userspace can tell whether it got a consistent snapshot.
1000  */
1001 struct mpath_info {
1002 	u32 filled;
1003 	u32 frame_qlen;
1004 	u32 sn;
1005 	u32 metric;
1006 	u32 exptime;
1007 	u32 discovery_timeout;
1008 	u8 discovery_retries;
1009 	u8 flags;
1010 
1011 	int generation;
1012 };
1013 
1014 /**
1015  * struct bss_parameters - BSS parameters
1016  *
1017  * Used to change BSS parameters (mainly for AP mode).
1018  *
1019  * @use_cts_prot: Whether to use CTS protection
1020  *	(0 = no, 1 = yes, -1 = do not change)
1021  * @use_short_preamble: Whether the use of short preambles is allowed
1022  *	(0 = no, 1 = yes, -1 = do not change)
1023  * @use_short_slot_time: Whether the use of short slot time is allowed
1024  *	(0 = no, 1 = yes, -1 = do not change)
1025  * @basic_rates: basic rates in IEEE 802.11 format
1026  *	(or NULL for no change)
1027  * @basic_rates_len: number of basic rates
1028  * @ap_isolate: do not forward packets between connected stations
1029  * @ht_opmode: HT Operation mode
1030  * 	(u16 = opmode, -1 = do not change)
1031  * @p2p_ctwindow: P2P CT Window (-1 = no change)
1032  * @p2p_opp_ps: P2P opportunistic PS (-1 = no change)
1033  */
1034 struct bss_parameters {
1035 	int use_cts_prot;
1036 	int use_short_preamble;
1037 	int use_short_slot_time;
1038 	u8 *basic_rates;
1039 	u8 basic_rates_len;
1040 	int ap_isolate;
1041 	int ht_opmode;
1042 	s8 p2p_ctwindow, p2p_opp_ps;
1043 };
1044 
1045 /**
1046  * struct mesh_config - 802.11s mesh configuration
1047  *
1048  * These parameters can be changed while the mesh is active.
1049  *
1050  * @dot11MeshRetryTimeout: the initial retry timeout in millisecond units used
1051  *	by the Mesh Peering Open message
1052  * @dot11MeshConfirmTimeout: the initial retry timeout in millisecond units
1053  *	used by the Mesh Peering Open message
1054  * @dot11MeshHoldingTimeout: the confirm timeout in millisecond units used by
1055  *	the mesh peering management to close a mesh peering
1056  * @dot11MeshMaxPeerLinks: the maximum number of peer links allowed on this
1057  *	mesh interface
1058  * @dot11MeshMaxRetries: the maximum number of peer link open retries that can
1059  *	be sent to establish a new peer link instance in a mesh
1060  * @dot11MeshTTL: the value of TTL field set at a source mesh STA
1061  * @element_ttl: the value of TTL field set at a mesh STA for path selection
1062  *	elements
1063  * @auto_open_plinks: whether we should automatically open peer links when we
1064  *	detect compatible mesh peers
1065  * @dot11MeshNbrOffsetMaxNeighbor: the maximum number of neighbors to
1066  *	synchronize to for 11s default synchronization method
1067  * @dot11MeshHWMPmaxPREQretries: the number of action frames containing a PREQ
1068  *	that an originator mesh STA can send to a particular path target
1069  * @path_refresh_time: how frequently to refresh mesh paths in milliseconds
1070  * @min_discovery_timeout: the minimum length of time to wait until giving up on
1071  *	a path discovery in milliseconds
1072  * @dot11MeshHWMPactivePathTimeout: the time (in TUs) for which mesh STAs
1073  *	receiving a PREQ shall consider the forwarding information from the
1074  *	root to be valid. (TU = time unit)
1075  * @dot11MeshHWMPpreqMinInterval: the minimum interval of time (in TUs) during
1076  *	which a mesh STA can send only one action frame containing a PREQ
1077  *	element
1078  * @dot11MeshHWMPperrMinInterval: the minimum interval of time (in TUs) during
1079  *	which a mesh STA can send only one Action frame containing a PERR
1080  *	element
1081  * @dot11MeshHWMPnetDiameterTraversalTime: the interval of time (in TUs) that
1082  *	it takes for an HWMP information element to propagate across the mesh
1083  * @dot11MeshHWMPRootMode: the configuration of a mesh STA as root mesh STA
1084  * @dot11MeshHWMPRannInterval: the interval of time (in TUs) between root
1085  *	announcements are transmitted
1086  * @dot11MeshGateAnnouncementProtocol: whether to advertise that this mesh
1087  *	station has access to a broader network beyond the MBSS. (This is
1088  *	missnamed in draft 12.0: dot11MeshGateAnnouncementProtocol set to true
1089  *	only means that the station will announce others it's a mesh gate, but
1090  *	not necessarily using the gate announcement protocol. Still keeping the
1091  *	same nomenclature to be in sync with the spec)
1092  * @dot11MeshForwarding: whether the Mesh STA is forwarding or non-forwarding
1093  *	entity (default is TRUE - forwarding entity)
1094  * @rssi_threshold: the threshold for average signal strength of candidate
1095  *	station to establish a peer link
1096  * @ht_opmode: mesh HT protection mode
1097  *
1098  * @dot11MeshHWMPactivePathToRootTimeout: The time (in TUs) for which mesh STAs
1099  *	receiving a proactive PREQ shall consider the forwarding information to
1100  *	the root mesh STA to be valid.
1101  *
1102  * @dot11MeshHWMProotInterval: The interval of time (in TUs) between proactive
1103  *	PREQs are transmitted.
1104  * @dot11MeshHWMPconfirmationInterval: The minimum interval of time (in TUs)
1105  *	during which a mesh STA can send only one Action frame containing
1106  *	a PREQ element for root path confirmation.
1107  * @power_mode: The default mesh power save mode which will be the initial
1108  *	setting for new peer links.
1109  * @dot11MeshAwakeWindowDuration: The duration in TUs the STA will remain awake
1110  *	after transmitting its beacon.
1111  */
1112 struct mesh_config {
1113 	u16 dot11MeshRetryTimeout;
1114 	u16 dot11MeshConfirmTimeout;
1115 	u16 dot11MeshHoldingTimeout;
1116 	u16 dot11MeshMaxPeerLinks;
1117 	u8 dot11MeshMaxRetries;
1118 	u8 dot11MeshTTL;
1119 	u8 element_ttl;
1120 	bool auto_open_plinks;
1121 	u32 dot11MeshNbrOffsetMaxNeighbor;
1122 	u8 dot11MeshHWMPmaxPREQretries;
1123 	u32 path_refresh_time;
1124 	u16 min_discovery_timeout;
1125 	u32 dot11MeshHWMPactivePathTimeout;
1126 	u16 dot11MeshHWMPpreqMinInterval;
1127 	u16 dot11MeshHWMPperrMinInterval;
1128 	u16 dot11MeshHWMPnetDiameterTraversalTime;
1129 	u8 dot11MeshHWMPRootMode;
1130 	u16 dot11MeshHWMPRannInterval;
1131 	bool dot11MeshGateAnnouncementProtocol;
1132 	bool dot11MeshForwarding;
1133 	s32 rssi_threshold;
1134 	u16 ht_opmode;
1135 	u32 dot11MeshHWMPactivePathToRootTimeout;
1136 	u16 dot11MeshHWMProotInterval;
1137 	u16 dot11MeshHWMPconfirmationInterval;
1138 	enum nl80211_mesh_power_mode power_mode;
1139 	u16 dot11MeshAwakeWindowDuration;
1140 };
1141 
1142 /**
1143  * struct mesh_setup - 802.11s mesh setup configuration
1144  * @chandef: defines the channel to use
1145  * @mesh_id: the mesh ID
1146  * @mesh_id_len: length of the mesh ID, at least 1 and at most 32 bytes
1147  * @sync_method: which synchronization method to use
1148  * @path_sel_proto: which path selection protocol to use
1149  * @path_metric: which metric to use
1150  * @ie: vendor information elements (optional)
1151  * @ie_len: length of vendor information elements
1152  * @is_authenticated: this mesh requires authentication
1153  * @is_secure: this mesh uses security
1154  * @user_mpm: userspace handles all MPM functions
1155  * @dtim_period: DTIM period to use
1156  * @beacon_interval: beacon interval to use
1157  * @mcast_rate: multicat rate for Mesh Node [6Mbps is the default for 802.11a]
1158  *
1159  * These parameters are fixed when the mesh is created.
1160  */
1161 struct mesh_setup {
1162 	struct cfg80211_chan_def chandef;
1163 	const u8 *mesh_id;
1164 	u8 mesh_id_len;
1165 	u8 sync_method;
1166 	u8 path_sel_proto;
1167 	u8 path_metric;
1168 	const u8 *ie;
1169 	u8 ie_len;
1170 	bool is_authenticated;
1171 	bool is_secure;
1172 	bool user_mpm;
1173 	u8 dtim_period;
1174 	u16 beacon_interval;
1175 	int mcast_rate[IEEE80211_NUM_BANDS];
1176 };
1177 
1178 /**
1179  * struct ieee80211_txq_params - TX queue parameters
1180  * @ac: AC identifier
1181  * @txop: Maximum burst time in units of 32 usecs, 0 meaning disabled
1182  * @cwmin: Minimum contention window [a value of the form 2^n-1 in the range
1183  *	1..32767]
1184  * @cwmax: Maximum contention window [a value of the form 2^n-1 in the range
1185  *	1..32767]
1186  * @aifs: Arbitration interframe space [0..255]
1187  */
1188 struct ieee80211_txq_params {
1189 	enum nl80211_ac ac;
1190 	u16 txop;
1191 	u16 cwmin;
1192 	u16 cwmax;
1193 	u8 aifs;
1194 };
1195 
1196 /**
1197  * DOC: Scanning and BSS list handling
1198  *
1199  * The scanning process itself is fairly simple, but cfg80211 offers quite
1200  * a bit of helper functionality. To start a scan, the scan operation will
1201  * be invoked with a scan definition. This scan definition contains the
1202  * channels to scan, and the SSIDs to send probe requests for (including the
1203  * wildcard, if desired). A passive scan is indicated by having no SSIDs to
1204  * probe. Additionally, a scan request may contain extra information elements
1205  * that should be added to the probe request. The IEs are guaranteed to be
1206  * well-formed, and will not exceed the maximum length the driver advertised
1207  * in the wiphy structure.
1208  *
1209  * When scanning finds a BSS, cfg80211 needs to be notified of that, because
1210  * it is responsible for maintaining the BSS list; the driver should not
1211  * maintain a list itself. For this notification, various functions exist.
1212  *
1213  * Since drivers do not maintain a BSS list, there are also a number of
1214  * functions to search for a BSS and obtain information about it from the
1215  * BSS structure cfg80211 maintains. The BSS list is also made available
1216  * to userspace.
1217  */
1218 
1219 /**
1220  * struct cfg80211_ssid - SSID description
1221  * @ssid: the SSID
1222  * @ssid_len: length of the ssid
1223  */
1224 struct cfg80211_ssid {
1225 	u8 ssid[IEEE80211_MAX_SSID_LEN];
1226 	u8 ssid_len;
1227 };
1228 
1229 /**
1230  * struct cfg80211_scan_request - scan request description
1231  *
1232  * @ssids: SSIDs to scan for (active scan only)
1233  * @n_ssids: number of SSIDs
1234  * @channels: channels to scan on.
1235  * @n_channels: total number of channels to scan
1236  * @ie: optional information element(s) to add into Probe Request or %NULL
1237  * @ie_len: length of ie in octets
1238  * @flags: bit field of flags controlling operation
1239  * @rates: bitmap of rates to advertise for each band
1240  * @wiphy: the wiphy this was for
1241  * @scan_start: time (in jiffies) when the scan started
1242  * @wdev: the wireless device to scan for
1243  * @aborted: (internal) scan request was notified as aborted
1244  * @no_cck: used to send probe requests at non CCK rate in 2GHz band
1245  */
1246 struct cfg80211_scan_request {
1247 	struct cfg80211_ssid *ssids;
1248 	int n_ssids;
1249 	u32 n_channels;
1250 	const u8 *ie;
1251 	size_t ie_len;
1252 	u32 flags;
1253 
1254 	u32 rates[IEEE80211_NUM_BANDS];
1255 
1256 	struct wireless_dev *wdev;
1257 
1258 	/* internal */
1259 	struct wiphy *wiphy;
1260 	unsigned long scan_start;
1261 	bool aborted;
1262 	bool no_cck;
1263 
1264 	/* keep last */
1265 	struct ieee80211_channel *channels[0];
1266 };
1267 
1268 /**
1269  * struct cfg80211_match_set - sets of attributes to match
1270  *
1271  * @ssid: SSID to be matched
1272  */
1273 struct cfg80211_match_set {
1274 	struct cfg80211_ssid ssid;
1275 };
1276 
1277 /**
1278  * struct cfg80211_sched_scan_request - scheduled scan request description
1279  *
1280  * @ssids: SSIDs to scan for (passed in the probe_reqs in active scans)
1281  * @n_ssids: number of SSIDs
1282  * @n_channels: total number of channels to scan
1283  * @interval: interval between each scheduled scan cycle
1284  * @ie: optional information element(s) to add into Probe Request or %NULL
1285  * @ie_len: length of ie in octets
1286  * @flags: bit field of flags controlling operation
1287  * @match_sets: sets of parameters to be matched for a scan result
1288  * 	entry to be considered valid and to be passed to the host
1289  * 	(others are filtered out).
1290  *	If ommited, all results are passed.
1291  * @n_match_sets: number of match sets
1292  * @wiphy: the wiphy this was for
1293  * @dev: the interface
1294  * @scan_start: start time of the scheduled scan
1295  * @channels: channels to scan
1296  * @rssi_thold: don't report scan results below this threshold (in s32 dBm)
1297  */
1298 struct cfg80211_sched_scan_request {
1299 	struct cfg80211_ssid *ssids;
1300 	int n_ssids;
1301 	u32 n_channels;
1302 	u32 interval;
1303 	const u8 *ie;
1304 	size_t ie_len;
1305 	u32 flags;
1306 	struct cfg80211_match_set *match_sets;
1307 	int n_match_sets;
1308 	s32 rssi_thold;
1309 
1310 	/* internal */
1311 	struct wiphy *wiphy;
1312 	struct net_device *dev;
1313 	unsigned long scan_start;
1314 
1315 	/* keep last */
1316 	struct ieee80211_channel *channels[0];
1317 };
1318 
1319 /**
1320  * enum cfg80211_signal_type - signal type
1321  *
1322  * @CFG80211_SIGNAL_TYPE_NONE: no signal strength information available
1323  * @CFG80211_SIGNAL_TYPE_MBM: signal strength in mBm (100*dBm)
1324  * @CFG80211_SIGNAL_TYPE_UNSPEC: signal strength, increasing from 0 through 100
1325  */
1326 enum cfg80211_signal_type {
1327 	CFG80211_SIGNAL_TYPE_NONE,
1328 	CFG80211_SIGNAL_TYPE_MBM,
1329 	CFG80211_SIGNAL_TYPE_UNSPEC,
1330 };
1331 
1332 /**
1333  * struct cfg80211_bss_ie_data - BSS entry IE data
1334  * @tsf: TSF contained in the frame that carried these IEs
1335  * @rcu_head: internal use, for freeing
1336  * @len: length of the IEs
1337  * @data: IE data
1338  */
1339 struct cfg80211_bss_ies {
1340 	u64 tsf;
1341 	struct rcu_head rcu_head;
1342 	int len;
1343 	u8 data[];
1344 };
1345 
1346 /**
1347  * struct cfg80211_bss - BSS description
1348  *
1349  * This structure describes a BSS (which may also be a mesh network)
1350  * for use in scan results and similar.
1351  *
1352  * @channel: channel this BSS is on
1353  * @bssid: BSSID of the BSS
1354  * @beacon_interval: the beacon interval as from the frame
1355  * @capability: the capability field in host byte order
1356  * @ies: the information elements (Note that there is no guarantee that these
1357  *	are well-formed!); this is a pointer to either the beacon_ies or
1358  *	proberesp_ies depending on whether Probe Response frame has been
1359  *	received. It is always non-%NULL.
1360  * @beacon_ies: the information elements from the last Beacon frame
1361  *	(implementation note: if @hidden_beacon_bss is set this struct doesn't
1362  *	own the beacon_ies, but they're just pointers to the ones from the
1363  *	@hidden_beacon_bss struct)
1364  * @proberesp_ies: the information elements from the last Probe Response frame
1365  * @hidden_beacon_bss: in case this BSS struct represents a probe response from
1366  *	a BSS that hides the SSID in its beacon, this points to the BSS struct
1367  *	that holds the beacon data. @beacon_ies is still valid, of course, and
1368  *	points to the same data as hidden_beacon_bss->beacon_ies in that case.
1369  * @signal: signal strength value (type depends on the wiphy's signal_type)
1370  * @priv: private area for driver use, has at least wiphy->bss_priv_size bytes
1371  */
1372 struct cfg80211_bss {
1373 	struct ieee80211_channel *channel;
1374 
1375 	const struct cfg80211_bss_ies __rcu *ies;
1376 	const struct cfg80211_bss_ies __rcu *beacon_ies;
1377 	const struct cfg80211_bss_ies __rcu *proberesp_ies;
1378 
1379 	struct cfg80211_bss *hidden_beacon_bss;
1380 
1381 	s32 signal;
1382 
1383 	u16 beacon_interval;
1384 	u16 capability;
1385 
1386 	u8 bssid[ETH_ALEN];
1387 
1388 	u8 priv[0] __aligned(sizeof(void *));
1389 };
1390 
1391 /**
1392  * ieee80211_bss_get_ie - find IE with given ID
1393  * @bss: the bss to search
1394  * @ie: the IE ID
1395  *
1396  * Note that the return value is an RCU-protected pointer, so
1397  * rcu_read_lock() must be held when calling this function.
1398  * Return: %NULL if not found.
1399  */
1400 const u8 *ieee80211_bss_get_ie(struct cfg80211_bss *bss, u8 ie);
1401 
1402 
1403 /**
1404  * struct cfg80211_auth_request - Authentication request data
1405  *
1406  * This structure provides information needed to complete IEEE 802.11
1407  * authentication.
1408  *
1409  * @bss: The BSS to authenticate with.
1410  * @auth_type: Authentication type (algorithm)
1411  * @ie: Extra IEs to add to Authentication frame or %NULL
1412  * @ie_len: Length of ie buffer in octets
1413  * @key_len: length of WEP key for shared key authentication
1414  * @key_idx: index of WEP key for shared key authentication
1415  * @key: WEP key for shared key authentication
1416  * @sae_data: Non-IE data to use with SAE or %NULL. This starts with
1417  *	Authentication transaction sequence number field.
1418  * @sae_data_len: Length of sae_data buffer in octets
1419  */
1420 struct cfg80211_auth_request {
1421 	struct cfg80211_bss *bss;
1422 	const u8 *ie;
1423 	size_t ie_len;
1424 	enum nl80211_auth_type auth_type;
1425 	const u8 *key;
1426 	u8 key_len, key_idx;
1427 	const u8 *sae_data;
1428 	size_t sae_data_len;
1429 };
1430 
1431 /**
1432  * enum cfg80211_assoc_req_flags - Over-ride default behaviour in association.
1433  *
1434  * @ASSOC_REQ_DISABLE_HT:  Disable HT (802.11n)
1435  * @ASSOC_REQ_DISABLE_VHT:  Disable VHT
1436  */
1437 enum cfg80211_assoc_req_flags {
1438 	ASSOC_REQ_DISABLE_HT		= BIT(0),
1439 	ASSOC_REQ_DISABLE_VHT		= BIT(1),
1440 };
1441 
1442 /**
1443  * struct cfg80211_assoc_request - (Re)Association request data
1444  *
1445  * This structure provides information needed to complete IEEE 802.11
1446  * (re)association.
1447  * @bss: The BSS to associate with. If the call is successful the driver
1448  *	is given a reference that it must release, normally via a call to
1449  *	cfg80211_send_rx_assoc(), or, if association timed out, with a
1450  *	call to cfg80211_put_bss() (in addition to calling
1451  *	cfg80211_send_assoc_timeout())
1452  * @ie: Extra IEs to add to (Re)Association Request frame or %NULL
1453  * @ie_len: Length of ie buffer in octets
1454  * @use_mfp: Use management frame protection (IEEE 802.11w) in this association
1455  * @crypto: crypto settings
1456  * @prev_bssid: previous BSSID, if not %NULL use reassociate frame
1457  * @flags:  See &enum cfg80211_assoc_req_flags
1458  * @ht_capa:  HT Capabilities over-rides.  Values set in ht_capa_mask
1459  *   will be used in ht_capa.  Un-supported values will be ignored.
1460  * @ht_capa_mask:  The bits of ht_capa which are to be used.
1461  * @vht_capa: VHT capability override
1462  * @vht_capa_mask: VHT capability mask indicating which fields to use
1463  */
1464 struct cfg80211_assoc_request {
1465 	struct cfg80211_bss *bss;
1466 	const u8 *ie, *prev_bssid;
1467 	size_t ie_len;
1468 	struct cfg80211_crypto_settings crypto;
1469 	bool use_mfp;
1470 	u32 flags;
1471 	struct ieee80211_ht_cap ht_capa;
1472 	struct ieee80211_ht_cap ht_capa_mask;
1473 	struct ieee80211_vht_cap vht_capa, vht_capa_mask;
1474 };
1475 
1476 /**
1477  * struct cfg80211_deauth_request - Deauthentication request data
1478  *
1479  * This structure provides information needed to complete IEEE 802.11
1480  * deauthentication.
1481  *
1482  * @bssid: the BSSID of the BSS to deauthenticate from
1483  * @ie: Extra IEs to add to Deauthentication frame or %NULL
1484  * @ie_len: Length of ie buffer in octets
1485  * @reason_code: The reason code for the deauthentication
1486  * @local_state_change: if set, change local state only and
1487  *	do not set a deauth frame
1488  */
1489 struct cfg80211_deauth_request {
1490 	const u8 *bssid;
1491 	const u8 *ie;
1492 	size_t ie_len;
1493 	u16 reason_code;
1494 	bool local_state_change;
1495 };
1496 
1497 /**
1498  * struct cfg80211_disassoc_request - Disassociation request data
1499  *
1500  * This structure provides information needed to complete IEEE 802.11
1501  * disassocation.
1502  *
1503  * @bss: the BSS to disassociate from
1504  * @ie: Extra IEs to add to Disassociation frame or %NULL
1505  * @ie_len: Length of ie buffer in octets
1506  * @reason_code: The reason code for the disassociation
1507  * @local_state_change: This is a request for a local state only, i.e., no
1508  *	Disassociation frame is to be transmitted.
1509  */
1510 struct cfg80211_disassoc_request {
1511 	struct cfg80211_bss *bss;
1512 	const u8 *ie;
1513 	size_t ie_len;
1514 	u16 reason_code;
1515 	bool local_state_change;
1516 };
1517 
1518 /**
1519  * struct cfg80211_ibss_params - IBSS parameters
1520  *
1521  * This structure defines the IBSS parameters for the join_ibss()
1522  * method.
1523  *
1524  * @ssid: The SSID, will always be non-null.
1525  * @ssid_len: The length of the SSID, will always be non-zero.
1526  * @bssid: Fixed BSSID requested, maybe be %NULL, if set do not
1527  *	search for IBSSs with a different BSSID.
1528  * @chandef: defines the channel to use if no other IBSS to join can be found
1529  * @channel_fixed: The channel should be fixed -- do not search for
1530  *	IBSSs to join on other channels.
1531  * @ie: information element(s) to include in the beacon
1532  * @ie_len: length of that
1533  * @beacon_interval: beacon interval to use
1534  * @privacy: this is a protected network, keys will be configured
1535  *	after joining
1536  * @control_port: whether user space controls IEEE 802.1X port, i.e.,
1537  *	sets/clears %NL80211_STA_FLAG_AUTHORIZED. If true, the driver is
1538  *	required to assume that the port is unauthorized until authorized by
1539  *	user space. Otherwise, port is marked authorized by default.
1540  * @basic_rates: bitmap of basic rates to use when creating the IBSS
1541  * @mcast_rate: per-band multicast rate index + 1 (0: disabled)
1542  */
1543 struct cfg80211_ibss_params {
1544 	u8 *ssid;
1545 	u8 *bssid;
1546 	struct cfg80211_chan_def chandef;
1547 	u8 *ie;
1548 	u8 ssid_len, ie_len;
1549 	u16 beacon_interval;
1550 	u32 basic_rates;
1551 	bool channel_fixed;
1552 	bool privacy;
1553 	bool control_port;
1554 	int mcast_rate[IEEE80211_NUM_BANDS];
1555 };
1556 
1557 /**
1558  * struct cfg80211_connect_params - Connection parameters
1559  *
1560  * This structure provides information needed to complete IEEE 802.11
1561  * authentication and association.
1562  *
1563  * @channel: The channel to use or %NULL if not specified (auto-select based
1564  *	on scan results)
1565  * @bssid: The AP BSSID or %NULL if not specified (auto-select based on scan
1566  *	results)
1567  * @ssid: SSID
1568  * @ssid_len: Length of ssid in octets
1569  * @auth_type: Authentication type (algorithm)
1570  * @ie: IEs for association request
1571  * @ie_len: Length of assoc_ie in octets
1572  * @privacy: indicates whether privacy-enabled APs should be used
1573  * @mfp: indicate whether management frame protection is used
1574  * @crypto: crypto settings
1575  * @key_len: length of WEP key for shared key authentication
1576  * @key_idx: index of WEP key for shared key authentication
1577  * @key: WEP key for shared key authentication
1578  * @flags:  See &enum cfg80211_assoc_req_flags
1579  * @bg_scan_period:  Background scan period in seconds
1580  *   or -1 to indicate that default value is to be used.
1581  * @ht_capa:  HT Capabilities over-rides.  Values set in ht_capa_mask
1582  *   will be used in ht_capa.  Un-supported values will be ignored.
1583  * @ht_capa_mask:  The bits of ht_capa which are to be used.
1584  * @vht_capa:  VHT Capability overrides
1585  * @vht_capa_mask: The bits of vht_capa which are to be used.
1586  */
1587 struct cfg80211_connect_params {
1588 	struct ieee80211_channel *channel;
1589 	u8 *bssid;
1590 	u8 *ssid;
1591 	size_t ssid_len;
1592 	enum nl80211_auth_type auth_type;
1593 	u8 *ie;
1594 	size_t ie_len;
1595 	bool privacy;
1596 	enum nl80211_mfp mfp;
1597 	struct cfg80211_crypto_settings crypto;
1598 	const u8 *key;
1599 	u8 key_len, key_idx;
1600 	u32 flags;
1601 	int bg_scan_period;
1602 	struct ieee80211_ht_cap ht_capa;
1603 	struct ieee80211_ht_cap ht_capa_mask;
1604 	struct ieee80211_vht_cap vht_capa;
1605 	struct ieee80211_vht_cap vht_capa_mask;
1606 };
1607 
1608 /**
1609  * enum wiphy_params_flags - set_wiphy_params bitfield values
1610  * @WIPHY_PARAM_RETRY_SHORT: wiphy->retry_short has changed
1611  * @WIPHY_PARAM_RETRY_LONG: wiphy->retry_long has changed
1612  * @WIPHY_PARAM_FRAG_THRESHOLD: wiphy->frag_threshold has changed
1613  * @WIPHY_PARAM_RTS_THRESHOLD: wiphy->rts_threshold has changed
1614  * @WIPHY_PARAM_COVERAGE_CLASS: coverage class changed
1615  */
1616 enum wiphy_params_flags {
1617 	WIPHY_PARAM_RETRY_SHORT		= 1 << 0,
1618 	WIPHY_PARAM_RETRY_LONG		= 1 << 1,
1619 	WIPHY_PARAM_FRAG_THRESHOLD	= 1 << 2,
1620 	WIPHY_PARAM_RTS_THRESHOLD	= 1 << 3,
1621 	WIPHY_PARAM_COVERAGE_CLASS	= 1 << 4,
1622 };
1623 
1624 /*
1625  * cfg80211_bitrate_mask - masks for bitrate control
1626  */
1627 struct cfg80211_bitrate_mask {
1628 	struct {
1629 		u32 legacy;
1630 		u8 mcs[IEEE80211_HT_MCS_MASK_LEN];
1631 	} control[IEEE80211_NUM_BANDS];
1632 };
1633 /**
1634  * struct cfg80211_pmksa - PMK Security Association
1635  *
1636  * This structure is passed to the set/del_pmksa() method for PMKSA
1637  * caching.
1638  *
1639  * @bssid: The AP's BSSID.
1640  * @pmkid: The PMK material itself.
1641  */
1642 struct cfg80211_pmksa {
1643 	u8 *bssid;
1644 	u8 *pmkid;
1645 };
1646 
1647 /**
1648  * struct cfg80211_wowlan_trig_pkt_pattern - packet pattern
1649  * @mask: bitmask where to match pattern and where to ignore bytes,
1650  *	one bit per byte, in same format as nl80211
1651  * @pattern: bytes to match where bitmask is 1
1652  * @pattern_len: length of pattern (in bytes)
1653  * @pkt_offset: packet offset (in bytes)
1654  *
1655  * Internal note: @mask and @pattern are allocated in one chunk of
1656  * memory, free @mask only!
1657  */
1658 struct cfg80211_wowlan_trig_pkt_pattern {
1659 	u8 *mask, *pattern;
1660 	int pattern_len;
1661 	int pkt_offset;
1662 };
1663 
1664 /**
1665  * struct cfg80211_wowlan_tcp - TCP connection parameters
1666  *
1667  * @sock: (internal) socket for source port allocation
1668  * @src: source IP address
1669  * @dst: destination IP address
1670  * @dst_mac: destination MAC address
1671  * @src_port: source port
1672  * @dst_port: destination port
1673  * @payload_len: data payload length
1674  * @payload: data payload buffer
1675  * @payload_seq: payload sequence stamping configuration
1676  * @data_interval: interval at which to send data packets
1677  * @wake_len: wakeup payload match length
1678  * @wake_data: wakeup payload match data
1679  * @wake_mask: wakeup payload match mask
1680  * @tokens_size: length of the tokens buffer
1681  * @payload_tok: payload token usage configuration
1682  */
1683 struct cfg80211_wowlan_tcp {
1684 	struct socket *sock;
1685 	__be32 src, dst;
1686 	u16 src_port, dst_port;
1687 	u8 dst_mac[ETH_ALEN];
1688 	int payload_len;
1689 	const u8 *payload;
1690 	struct nl80211_wowlan_tcp_data_seq payload_seq;
1691 	u32 data_interval;
1692 	u32 wake_len;
1693 	const u8 *wake_data, *wake_mask;
1694 	u32 tokens_size;
1695 	/* must be last, variable member */
1696 	struct nl80211_wowlan_tcp_data_token payload_tok;
1697 };
1698 
1699 /**
1700  * struct cfg80211_wowlan - Wake on Wireless-LAN support info
1701  *
1702  * This structure defines the enabled WoWLAN triggers for the device.
1703  * @any: wake up on any activity -- special trigger if device continues
1704  *	operating as normal during suspend
1705  * @disconnect: wake up if getting disconnected
1706  * @magic_pkt: wake up on receiving magic packet
1707  * @patterns: wake up on receiving packet matching a pattern
1708  * @n_patterns: number of patterns
1709  * @gtk_rekey_failure: wake up on GTK rekey failure
1710  * @eap_identity_req: wake up on EAP identity request packet
1711  * @four_way_handshake: wake up on 4-way handshake
1712  * @rfkill_release: wake up when rfkill is released
1713  * @tcp: TCP connection establishment/wakeup parameters, see nl80211.h.
1714  *	NULL if not configured.
1715  */
1716 struct cfg80211_wowlan {
1717 	bool any, disconnect, magic_pkt, gtk_rekey_failure,
1718 	     eap_identity_req, four_way_handshake,
1719 	     rfkill_release;
1720 	struct cfg80211_wowlan_trig_pkt_pattern *patterns;
1721 	struct cfg80211_wowlan_tcp *tcp;
1722 	int n_patterns;
1723 };
1724 
1725 /**
1726  * struct cfg80211_wowlan_wakeup - wakeup report
1727  * @disconnect: woke up by getting disconnected
1728  * @magic_pkt: woke up by receiving magic packet
1729  * @gtk_rekey_failure: woke up by GTK rekey failure
1730  * @eap_identity_req: woke up by EAP identity request packet
1731  * @four_way_handshake: woke up by 4-way handshake
1732  * @rfkill_release: woke up by rfkill being released
1733  * @pattern_idx: pattern that caused wakeup, -1 if not due to pattern
1734  * @packet_present_len: copied wakeup packet data
1735  * @packet_len: original wakeup packet length
1736  * @packet: The packet causing the wakeup, if any.
1737  * @packet_80211:  For pattern match, magic packet and other data
1738  *	frame triggers an 802.3 frame should be reported, for
1739  *	disconnect due to deauth 802.11 frame. This indicates which
1740  *	it is.
1741  * @tcp_match: TCP wakeup packet received
1742  * @tcp_connlost: TCP connection lost or failed to establish
1743  * @tcp_nomoretokens: TCP data ran out of tokens
1744  */
1745 struct cfg80211_wowlan_wakeup {
1746 	bool disconnect, magic_pkt, gtk_rekey_failure,
1747 	     eap_identity_req, four_way_handshake,
1748 	     rfkill_release, packet_80211,
1749 	     tcp_match, tcp_connlost, tcp_nomoretokens;
1750 	s32 pattern_idx;
1751 	u32 packet_present_len, packet_len;
1752 	const void *packet;
1753 };
1754 
1755 /**
1756  * struct cfg80211_gtk_rekey_data - rekey data
1757  * @kek: key encryption key
1758  * @kck: key confirmation key
1759  * @replay_ctr: replay counter
1760  */
1761 struct cfg80211_gtk_rekey_data {
1762 	u8 kek[NL80211_KEK_LEN];
1763 	u8 kck[NL80211_KCK_LEN];
1764 	u8 replay_ctr[NL80211_REPLAY_CTR_LEN];
1765 };
1766 
1767 /**
1768  * struct cfg80211_update_ft_ies_params - FT IE Information
1769  *
1770  * This structure provides information needed to update the fast transition IE
1771  *
1772  * @md: The Mobility Domain ID, 2 Octet value
1773  * @ie: Fast Transition IEs
1774  * @ie_len: Length of ft_ie in octets
1775  */
1776 struct cfg80211_update_ft_ies_params {
1777 	u16 md;
1778 	const u8 *ie;
1779 	size_t ie_len;
1780 };
1781 
1782 /**
1783  * struct cfg80211_ops - backend description for wireless configuration
1784  *
1785  * This struct is registered by fullmac card drivers and/or wireless stacks
1786  * in order to handle configuration requests on their interfaces.
1787  *
1788  * All callbacks except where otherwise noted should return 0
1789  * on success or a negative error code.
1790  *
1791  * All operations are currently invoked under rtnl for consistency with the
1792  * wireless extensions but this is subject to reevaluation as soon as this
1793  * code is used more widely and we have a first user without wext.
1794  *
1795  * @suspend: wiphy device needs to be suspended. The variable @wow will
1796  *	be %NULL or contain the enabled Wake-on-Wireless triggers that are
1797  *	configured for the device.
1798  * @resume: wiphy device needs to be resumed
1799  * @set_wakeup: Called when WoWLAN is enabled/disabled, use this callback
1800  *	to call device_set_wakeup_enable() to enable/disable wakeup from
1801  *	the device.
1802  *
1803  * @add_virtual_intf: create a new virtual interface with the given name,
1804  *	must set the struct wireless_dev's iftype. Beware: You must create
1805  *	the new netdev in the wiphy's network namespace! Returns the struct
1806  *	wireless_dev, or an ERR_PTR. For P2P device wdevs, the driver must
1807  *	also set the address member in the wdev.
1808  *
1809  * @del_virtual_intf: remove the virtual interface
1810  *
1811  * @change_virtual_intf: change type/configuration of virtual interface,
1812  *	keep the struct wireless_dev's iftype updated.
1813  *
1814  * @add_key: add a key with the given parameters. @mac_addr will be %NULL
1815  *	when adding a group key.
1816  *
1817  * @get_key: get information about the key with the given parameters.
1818  *	@mac_addr will be %NULL when requesting information for a group
1819  *	key. All pointers given to the @callback function need not be valid
1820  *	after it returns. This function should return an error if it is
1821  *	not possible to retrieve the key, -ENOENT if it doesn't exist.
1822  *
1823  * @del_key: remove a key given the @mac_addr (%NULL for a group key)
1824  *	and @key_index, return -ENOENT if the key doesn't exist.
1825  *
1826  * @set_default_key: set the default key on an interface
1827  *
1828  * @set_default_mgmt_key: set the default management frame key on an interface
1829  *
1830  * @set_rekey_data: give the data necessary for GTK rekeying to the driver
1831  *
1832  * @start_ap: Start acting in AP mode defined by the parameters.
1833  * @change_beacon: Change the beacon parameters for an access point mode
1834  *	interface. This should reject the call when AP mode wasn't started.
1835  * @stop_ap: Stop being an AP, including stopping beaconing.
1836  *
1837  * @add_station: Add a new station.
1838  * @del_station: Remove a station; @mac may be NULL to remove all stations.
1839  * @change_station: Modify a given station. Note that flags changes are not much
1840  *	validated in cfg80211, in particular the auth/assoc/authorized flags
1841  *	might come to the driver in invalid combinations -- make sure to check
1842  *	them, also against the existing state! Drivers must call
1843  *	cfg80211_check_station_change() to validate the information.
1844  * @get_station: get station information for the station identified by @mac
1845  * @dump_station: dump station callback -- resume dump at index @idx
1846  *
1847  * @add_mpath: add a fixed mesh path
1848  * @del_mpath: delete a given mesh path
1849  * @change_mpath: change a given mesh path
1850  * @get_mpath: get a mesh path for the given parameters
1851  * @dump_mpath: dump mesh path callback -- resume dump at index @idx
1852  * @join_mesh: join the mesh network with the specified parameters
1853  * @leave_mesh: leave the current mesh network
1854  *
1855  * @get_mesh_config: Get the current mesh configuration
1856  *
1857  * @update_mesh_config: Update mesh parameters on a running mesh.
1858  *	The mask is a bitfield which tells us which parameters to
1859  *	set, and which to leave alone.
1860  *
1861  * @change_bss: Modify parameters for a given BSS.
1862  *
1863  * @set_txq_params: Set TX queue parameters
1864  *
1865  * @libertas_set_mesh_channel: Only for backward compatibility for libertas,
1866  *	as it doesn't implement join_mesh and needs to set the channel to
1867  *	join the mesh instead.
1868  *
1869  * @set_monitor_channel: Set the monitor mode channel for the device. If other
1870  *	interfaces are active this callback should reject the configuration.
1871  *	If no interfaces are active or the device is down, the channel should
1872  *	be stored for when a monitor interface becomes active.
1873  *
1874  * @scan: Request to do a scan. If returning zero, the scan request is given
1875  *	the driver, and will be valid until passed to cfg80211_scan_done().
1876  *	For scan results, call cfg80211_inform_bss(); you can call this outside
1877  *	the scan/scan_done bracket too.
1878  *
1879  * @auth: Request to authenticate with the specified peer
1880  * @assoc: Request to (re)associate with the specified peer
1881  * @deauth: Request to deauthenticate from the specified peer
1882  * @disassoc: Request to disassociate from the specified peer
1883  *
1884  * @connect: Connect to the ESS with the specified parameters. When connected,
1885  *	call cfg80211_connect_result() with status code %WLAN_STATUS_SUCCESS.
1886  *	If the connection fails for some reason, call cfg80211_connect_result()
1887  *	with the status from the AP.
1888  * @disconnect: Disconnect from the BSS/ESS.
1889  *
1890  * @join_ibss: Join the specified IBSS (or create if necessary). Once done, call
1891  *	cfg80211_ibss_joined(), also call that function when changing BSSID due
1892  *	to a merge.
1893  * @leave_ibss: Leave the IBSS.
1894  *
1895  * @set_mcast_rate: Set the specified multicast rate (only if vif is in ADHOC or
1896  *	MESH mode)
1897  *
1898  * @set_wiphy_params: Notify that wiphy parameters have changed;
1899  *	@changed bitfield (see &enum wiphy_params_flags) describes which values
1900  *	have changed. The actual parameter values are available in
1901  *	struct wiphy. If returning an error, no value should be changed.
1902  *
1903  * @set_tx_power: set the transmit power according to the parameters,
1904  *	the power passed is in mBm, to get dBm use MBM_TO_DBM(). The
1905  *	wdev may be %NULL if power was set for the wiphy, and will
1906  *	always be %NULL unless the driver supports per-vif TX power
1907  *	(as advertised by the nl80211 feature flag.)
1908  * @get_tx_power: store the current TX power into the dbm variable;
1909  *	return 0 if successful
1910  *
1911  * @set_wds_peer: set the WDS peer for a WDS interface
1912  *
1913  * @rfkill_poll: polls the hw rfkill line, use cfg80211 reporting
1914  *	functions to adjust rfkill hw state
1915  *
1916  * @dump_survey: get site survey information.
1917  *
1918  * @remain_on_channel: Request the driver to remain awake on the specified
1919  *	channel for the specified duration to complete an off-channel
1920  *	operation (e.g., public action frame exchange). When the driver is
1921  *	ready on the requested channel, it must indicate this with an event
1922  *	notification by calling cfg80211_ready_on_channel().
1923  * @cancel_remain_on_channel: Cancel an on-going remain-on-channel operation.
1924  *	This allows the operation to be terminated prior to timeout based on
1925  *	the duration value.
1926  * @mgmt_tx: Transmit a management frame.
1927  * @mgmt_tx_cancel_wait: Cancel the wait time from transmitting a management
1928  *	frame on another channel
1929  *
1930  * @testmode_cmd: run a test mode command
1931  * @testmode_dump: Implement a test mode dump. The cb->args[2] and up may be
1932  *	used by the function, but 0 and 1 must not be touched. Additionally,
1933  *	return error codes other than -ENOBUFS and -ENOENT will terminate the
1934  *	dump and return to userspace with an error, so be careful. If any data
1935  *	was passed in from userspace then the data/len arguments will be present
1936  *	and point to the data contained in %NL80211_ATTR_TESTDATA.
1937  *
1938  * @set_bitrate_mask: set the bitrate mask configuration
1939  *
1940  * @set_pmksa: Cache a PMKID for a BSSID. This is mostly useful for fullmac
1941  *	devices running firmwares capable of generating the (re) association
1942  *	RSN IE. It allows for faster roaming between WPA2 BSSIDs.
1943  * @del_pmksa: Delete a cached PMKID.
1944  * @flush_pmksa: Flush all cached PMKIDs.
1945  * @set_power_mgmt: Configure WLAN power management. A timeout value of -1
1946  *	allows the driver to adjust the dynamic ps timeout value.
1947  * @set_cqm_rssi_config: Configure connection quality monitor RSSI threshold.
1948  * @set_cqm_txe_config: Configure connection quality monitor TX error
1949  *	thresholds.
1950  * @sched_scan_start: Tell the driver to start a scheduled scan.
1951  * @sched_scan_stop: Tell the driver to stop an ongoing scheduled scan.
1952  *
1953  * @mgmt_frame_register: Notify driver that a management frame type was
1954  *	registered. Note that this callback may not sleep, and cannot run
1955  *	concurrently with itself.
1956  *
1957  * @set_antenna: Set antenna configuration (tx_ant, rx_ant) on the device.
1958  *	Parameters are bitmaps of allowed antennas to use for TX/RX. Drivers may
1959  *	reject TX/RX mask combinations they cannot support by returning -EINVAL
1960  *	(also see nl80211.h @NL80211_ATTR_WIPHY_ANTENNA_TX).
1961  *
1962  * @get_antenna: Get current antenna configuration from device (tx_ant, rx_ant).
1963  *
1964  * @set_ringparam: Set tx and rx ring sizes.
1965  *
1966  * @get_ringparam: Get tx and rx ring current and maximum sizes.
1967  *
1968  * @tdls_mgmt: Transmit a TDLS management frame.
1969  * @tdls_oper: Perform a high-level TDLS operation (e.g. TDLS link setup).
1970  *
1971  * @probe_client: probe an associated client, must return a cookie that it
1972  *	later passes to cfg80211_probe_status().
1973  *
1974  * @set_noack_map: Set the NoAck Map for the TIDs.
1975  *
1976  * @get_et_sset_count:  Ethtool API to get string-set count.
1977  *	See @ethtool_ops.get_sset_count
1978  *
1979  * @get_et_stats:  Ethtool API to get a set of u64 stats.
1980  *	See @ethtool_ops.get_ethtool_stats
1981  *
1982  * @get_et_strings:  Ethtool API to get a set of strings to describe stats
1983  *	and perhaps other supported types of ethtool data-sets.
1984  *	See @ethtool_ops.get_strings
1985  *
1986  * @get_channel: Get the current operating channel for the virtual interface.
1987  *	For monitor interfaces, it should return %NULL unless there's a single
1988  *	current monitoring channel.
1989  *
1990  * @start_p2p_device: Start the given P2P device.
1991  * @stop_p2p_device: Stop the given P2P device.
1992  *
1993  * @set_mac_acl: Sets MAC address control list in AP and P2P GO mode.
1994  *	Parameters include ACL policy, an array of MAC address of stations
1995  *	and the number of MAC addresses. If there is already a list in driver
1996  *	this new list replaces the existing one. Driver has to clear its ACL
1997  *	when number of MAC addresses entries is passed as 0. Drivers which
1998  *	advertise the support for MAC based ACL have to implement this callback.
1999  *
2000  * @start_radar_detection: Start radar detection in the driver.
2001  *
2002  * @update_ft_ies: Provide updated Fast BSS Transition information to the
2003  *	driver. If the SME is in the driver/firmware, this information can be
2004  *	used in building Authentication and Reassociation Request frames.
2005  *
2006  * @crit_proto_start: Indicates a critical protocol needs more link reliability
2007  *	for a given duration (milliseconds). The protocol is provided so the
2008  *	driver can take the most appropriate actions.
2009  * @crit_proto_stop: Indicates critical protocol no longer needs increased link
2010  *	reliability. This operation can not fail.
2011  */
2012 struct cfg80211_ops {
2013 	int	(*suspend)(struct wiphy *wiphy, struct cfg80211_wowlan *wow);
2014 	int	(*resume)(struct wiphy *wiphy);
2015 	void	(*set_wakeup)(struct wiphy *wiphy, bool enabled);
2016 
2017 	struct wireless_dev * (*add_virtual_intf)(struct wiphy *wiphy,
2018 						  const char *name,
2019 						  enum nl80211_iftype type,
2020 						  u32 *flags,
2021 						  struct vif_params *params);
2022 	int	(*del_virtual_intf)(struct wiphy *wiphy,
2023 				    struct wireless_dev *wdev);
2024 	int	(*change_virtual_intf)(struct wiphy *wiphy,
2025 				       struct net_device *dev,
2026 				       enum nl80211_iftype type, u32 *flags,
2027 				       struct vif_params *params);
2028 
2029 	int	(*add_key)(struct wiphy *wiphy, struct net_device *netdev,
2030 			   u8 key_index, bool pairwise, const u8 *mac_addr,
2031 			   struct key_params *params);
2032 	int	(*get_key)(struct wiphy *wiphy, struct net_device *netdev,
2033 			   u8 key_index, bool pairwise, const u8 *mac_addr,
2034 			   void *cookie,
2035 			   void (*callback)(void *cookie, struct key_params*));
2036 	int	(*del_key)(struct wiphy *wiphy, struct net_device *netdev,
2037 			   u8 key_index, bool pairwise, const u8 *mac_addr);
2038 	int	(*set_default_key)(struct wiphy *wiphy,
2039 				   struct net_device *netdev,
2040 				   u8 key_index, bool unicast, bool multicast);
2041 	int	(*set_default_mgmt_key)(struct wiphy *wiphy,
2042 					struct net_device *netdev,
2043 					u8 key_index);
2044 
2045 	int	(*start_ap)(struct wiphy *wiphy, struct net_device *dev,
2046 			    struct cfg80211_ap_settings *settings);
2047 	int	(*change_beacon)(struct wiphy *wiphy, struct net_device *dev,
2048 				 struct cfg80211_beacon_data *info);
2049 	int	(*stop_ap)(struct wiphy *wiphy, struct net_device *dev);
2050 
2051 
2052 	int	(*add_station)(struct wiphy *wiphy, struct net_device *dev,
2053 			       u8 *mac, struct station_parameters *params);
2054 	int	(*del_station)(struct wiphy *wiphy, struct net_device *dev,
2055 			       u8 *mac);
2056 	int	(*change_station)(struct wiphy *wiphy, struct net_device *dev,
2057 				  u8 *mac, struct station_parameters *params);
2058 	int	(*get_station)(struct wiphy *wiphy, struct net_device *dev,
2059 			       u8 *mac, struct station_info *sinfo);
2060 	int	(*dump_station)(struct wiphy *wiphy, struct net_device *dev,
2061 			       int idx, u8 *mac, struct station_info *sinfo);
2062 
2063 	int	(*add_mpath)(struct wiphy *wiphy, struct net_device *dev,
2064 			       u8 *dst, u8 *next_hop);
2065 	int	(*del_mpath)(struct wiphy *wiphy, struct net_device *dev,
2066 			       u8 *dst);
2067 	int	(*change_mpath)(struct wiphy *wiphy, struct net_device *dev,
2068 				  u8 *dst, u8 *next_hop);
2069 	int	(*get_mpath)(struct wiphy *wiphy, struct net_device *dev,
2070 			       u8 *dst, u8 *next_hop,
2071 			       struct mpath_info *pinfo);
2072 	int	(*dump_mpath)(struct wiphy *wiphy, struct net_device *dev,
2073 			       int idx, u8 *dst, u8 *next_hop,
2074 			       struct mpath_info *pinfo);
2075 	int	(*get_mesh_config)(struct wiphy *wiphy,
2076 				struct net_device *dev,
2077 				struct mesh_config *conf);
2078 	int	(*update_mesh_config)(struct wiphy *wiphy,
2079 				      struct net_device *dev, u32 mask,
2080 				      const struct mesh_config *nconf);
2081 	int	(*join_mesh)(struct wiphy *wiphy, struct net_device *dev,
2082 			     const struct mesh_config *conf,
2083 			     const struct mesh_setup *setup);
2084 	int	(*leave_mesh)(struct wiphy *wiphy, struct net_device *dev);
2085 
2086 	int	(*change_bss)(struct wiphy *wiphy, struct net_device *dev,
2087 			      struct bss_parameters *params);
2088 
2089 	int	(*set_txq_params)(struct wiphy *wiphy, struct net_device *dev,
2090 				  struct ieee80211_txq_params *params);
2091 
2092 	int	(*libertas_set_mesh_channel)(struct wiphy *wiphy,
2093 					     struct net_device *dev,
2094 					     struct ieee80211_channel *chan);
2095 
2096 	int	(*set_monitor_channel)(struct wiphy *wiphy,
2097 				       struct cfg80211_chan_def *chandef);
2098 
2099 	int	(*scan)(struct wiphy *wiphy,
2100 			struct cfg80211_scan_request *request);
2101 
2102 	int	(*auth)(struct wiphy *wiphy, struct net_device *dev,
2103 			struct cfg80211_auth_request *req);
2104 	int	(*assoc)(struct wiphy *wiphy, struct net_device *dev,
2105 			 struct cfg80211_assoc_request *req);
2106 	int	(*deauth)(struct wiphy *wiphy, struct net_device *dev,
2107 			  struct cfg80211_deauth_request *req);
2108 	int	(*disassoc)(struct wiphy *wiphy, struct net_device *dev,
2109 			    struct cfg80211_disassoc_request *req);
2110 
2111 	int	(*connect)(struct wiphy *wiphy, struct net_device *dev,
2112 			   struct cfg80211_connect_params *sme);
2113 	int	(*disconnect)(struct wiphy *wiphy, struct net_device *dev,
2114 			      u16 reason_code);
2115 
2116 	int	(*join_ibss)(struct wiphy *wiphy, struct net_device *dev,
2117 			     struct cfg80211_ibss_params *params);
2118 	int	(*leave_ibss)(struct wiphy *wiphy, struct net_device *dev);
2119 
2120 	int	(*set_mcast_rate)(struct wiphy *wiphy, struct net_device *dev,
2121 				  int rate[IEEE80211_NUM_BANDS]);
2122 
2123 	int	(*set_wiphy_params)(struct wiphy *wiphy, u32 changed);
2124 
2125 	int	(*set_tx_power)(struct wiphy *wiphy, struct wireless_dev *wdev,
2126 				enum nl80211_tx_power_setting type, int mbm);
2127 	int	(*get_tx_power)(struct wiphy *wiphy, struct wireless_dev *wdev,
2128 				int *dbm);
2129 
2130 	int	(*set_wds_peer)(struct wiphy *wiphy, struct net_device *dev,
2131 				const u8 *addr);
2132 
2133 	void	(*rfkill_poll)(struct wiphy *wiphy);
2134 
2135 #ifdef CONFIG_NL80211_TESTMODE
2136 	int	(*testmode_cmd)(struct wiphy *wiphy, void *data, int len);
2137 	int	(*testmode_dump)(struct wiphy *wiphy, struct sk_buff *skb,
2138 				 struct netlink_callback *cb,
2139 				 void *data, int len);
2140 #endif
2141 
2142 	int	(*set_bitrate_mask)(struct wiphy *wiphy,
2143 				    struct net_device *dev,
2144 				    const u8 *peer,
2145 				    const struct cfg80211_bitrate_mask *mask);
2146 
2147 	int	(*dump_survey)(struct wiphy *wiphy, struct net_device *netdev,
2148 			int idx, struct survey_info *info);
2149 
2150 	int	(*set_pmksa)(struct wiphy *wiphy, struct net_device *netdev,
2151 			     struct cfg80211_pmksa *pmksa);
2152 	int	(*del_pmksa)(struct wiphy *wiphy, struct net_device *netdev,
2153 			     struct cfg80211_pmksa *pmksa);
2154 	int	(*flush_pmksa)(struct wiphy *wiphy, struct net_device *netdev);
2155 
2156 	int	(*remain_on_channel)(struct wiphy *wiphy,
2157 				     struct wireless_dev *wdev,
2158 				     struct ieee80211_channel *chan,
2159 				     unsigned int duration,
2160 				     u64 *cookie);
2161 	int	(*cancel_remain_on_channel)(struct wiphy *wiphy,
2162 					    struct wireless_dev *wdev,
2163 					    u64 cookie);
2164 
2165 	int	(*mgmt_tx)(struct wiphy *wiphy, struct wireless_dev *wdev,
2166 			  struct ieee80211_channel *chan, bool offchan,
2167 			  unsigned int wait, const u8 *buf, size_t len,
2168 			  bool no_cck, bool dont_wait_for_ack, u64 *cookie);
2169 	int	(*mgmt_tx_cancel_wait)(struct wiphy *wiphy,
2170 				       struct wireless_dev *wdev,
2171 				       u64 cookie);
2172 
2173 	int	(*set_power_mgmt)(struct wiphy *wiphy, struct net_device *dev,
2174 				  bool enabled, int timeout);
2175 
2176 	int	(*set_cqm_rssi_config)(struct wiphy *wiphy,
2177 				       struct net_device *dev,
2178 				       s32 rssi_thold, u32 rssi_hyst);
2179 
2180 	int	(*set_cqm_txe_config)(struct wiphy *wiphy,
2181 				      struct net_device *dev,
2182 				      u32 rate, u32 pkts, u32 intvl);
2183 
2184 	void	(*mgmt_frame_register)(struct wiphy *wiphy,
2185 				       struct wireless_dev *wdev,
2186 				       u16 frame_type, bool reg);
2187 
2188 	int	(*set_antenna)(struct wiphy *wiphy, u32 tx_ant, u32 rx_ant);
2189 	int	(*get_antenna)(struct wiphy *wiphy, u32 *tx_ant, u32 *rx_ant);
2190 
2191 	int	(*set_ringparam)(struct wiphy *wiphy, u32 tx, u32 rx);
2192 	void	(*get_ringparam)(struct wiphy *wiphy,
2193 				 u32 *tx, u32 *tx_max, u32 *rx, u32 *rx_max);
2194 
2195 	int	(*sched_scan_start)(struct wiphy *wiphy,
2196 				struct net_device *dev,
2197 				struct cfg80211_sched_scan_request *request);
2198 	int	(*sched_scan_stop)(struct wiphy *wiphy, struct net_device *dev);
2199 
2200 	int	(*set_rekey_data)(struct wiphy *wiphy, struct net_device *dev,
2201 				  struct cfg80211_gtk_rekey_data *data);
2202 
2203 	int	(*tdls_mgmt)(struct wiphy *wiphy, struct net_device *dev,
2204 			     u8 *peer, u8 action_code,  u8 dialog_token,
2205 			     u16 status_code, const u8 *buf, size_t len);
2206 	int	(*tdls_oper)(struct wiphy *wiphy, struct net_device *dev,
2207 			     u8 *peer, enum nl80211_tdls_operation oper);
2208 
2209 	int	(*probe_client)(struct wiphy *wiphy, struct net_device *dev,
2210 				const u8 *peer, u64 *cookie);
2211 
2212 	int	(*set_noack_map)(struct wiphy *wiphy,
2213 				  struct net_device *dev,
2214 				  u16 noack_map);
2215 
2216 	int	(*get_et_sset_count)(struct wiphy *wiphy,
2217 				     struct net_device *dev, int sset);
2218 	void	(*get_et_stats)(struct wiphy *wiphy, struct net_device *dev,
2219 				struct ethtool_stats *stats, u64 *data);
2220 	void	(*get_et_strings)(struct wiphy *wiphy, struct net_device *dev,
2221 				  u32 sset, u8 *data);
2222 
2223 	int	(*get_channel)(struct wiphy *wiphy,
2224 			       struct wireless_dev *wdev,
2225 			       struct cfg80211_chan_def *chandef);
2226 
2227 	int	(*start_p2p_device)(struct wiphy *wiphy,
2228 				    struct wireless_dev *wdev);
2229 	void	(*stop_p2p_device)(struct wiphy *wiphy,
2230 				   struct wireless_dev *wdev);
2231 
2232 	int	(*set_mac_acl)(struct wiphy *wiphy, struct net_device *dev,
2233 			       const struct cfg80211_acl_data *params);
2234 
2235 	int	(*start_radar_detection)(struct wiphy *wiphy,
2236 					 struct net_device *dev,
2237 					 struct cfg80211_chan_def *chandef);
2238 	int	(*update_ft_ies)(struct wiphy *wiphy, struct net_device *dev,
2239 				 struct cfg80211_update_ft_ies_params *ftie);
2240 	int	(*crit_proto_start)(struct wiphy *wiphy,
2241 				    struct wireless_dev *wdev,
2242 				    enum nl80211_crit_proto_id protocol,
2243 				    u16 duration);
2244 	void	(*crit_proto_stop)(struct wiphy *wiphy,
2245 				   struct wireless_dev *wdev);
2246 };
2247 
2248 /*
2249  * wireless hardware and networking interfaces structures
2250  * and registration/helper functions
2251  */
2252 
2253 /**
2254  * enum wiphy_flags - wiphy capability flags
2255  *
2256  * @WIPHY_FLAG_CUSTOM_REGULATORY:  tells us the driver for this device
2257  * 	has its own custom regulatory domain and cannot identify the
2258  * 	ISO / IEC 3166 alpha2 it belongs to. When this is enabled
2259  * 	we will disregard the first regulatory hint (when the
2260  * 	initiator is %REGDOM_SET_BY_CORE).
2261  * @WIPHY_FLAG_STRICT_REGULATORY: tells us the driver for this device will
2262  *	ignore regulatory domain settings until it gets its own regulatory
2263  *	domain via its regulatory_hint() unless the regulatory hint is
2264  *	from a country IE. After its gets its own regulatory domain it will
2265  *	only allow further regulatory domain settings to further enhance
2266  *	compliance. For example if channel 13 and 14 are disabled by this
2267  *	regulatory domain no user regulatory domain can enable these channels
2268  *	at a later time. This can be used for devices which do not have
2269  *	calibration information guaranteed for frequencies or settings
2270  *	outside of its regulatory domain. If used in combination with
2271  *	WIPHY_FLAG_CUSTOM_REGULATORY the inspected country IE power settings
2272  *	will be followed.
2273  * @WIPHY_FLAG_DISABLE_BEACON_HINTS: enable this if your driver needs to ensure
2274  *	that passive scan flags and beaconing flags may not be lifted by
2275  *	cfg80211 due to regulatory beacon hints. For more information on beacon
2276  *	hints read the documenation for regulatory_hint_found_beacon()
2277  * @WIPHY_FLAG_NETNS_OK: if not set, do not allow changing the netns of this
2278  *	wiphy at all
2279  * @WIPHY_FLAG_PS_ON_BY_DEFAULT: if set to true, powersave will be enabled
2280  *	by default -- this flag will be set depending on the kernel's default
2281  *	on wiphy_new(), but can be changed by the driver if it has a good
2282  *	reason to override the default
2283  * @WIPHY_FLAG_4ADDR_AP: supports 4addr mode even on AP (with a single station
2284  *	on a VLAN interface)
2285  * @WIPHY_FLAG_4ADDR_STATION: supports 4addr mode even as a station
2286  * @WIPHY_FLAG_CONTROL_PORT_PROTOCOL: This device supports setting the
2287  *	control port protocol ethertype. The device also honours the
2288  *	control_port_no_encrypt flag.
2289  * @WIPHY_FLAG_IBSS_RSN: The device supports IBSS RSN.
2290  * @WIPHY_FLAG_MESH_AUTH: The device supports mesh authentication by routing
2291  *	auth frames to userspace. See @NL80211_MESH_SETUP_USERSPACE_AUTH.
2292  * @WIPHY_FLAG_SUPPORTS_SCHED_SCAN: The device supports scheduled scans.
2293  * @WIPHY_FLAG_SUPPORTS_FW_ROAM: The device supports roaming feature in the
2294  *	firmware.
2295  * @WIPHY_FLAG_AP_UAPSD: The device supports uapsd on AP.
2296  * @WIPHY_FLAG_SUPPORTS_TDLS: The device supports TDLS (802.11z) operation.
2297  * @WIPHY_FLAG_TDLS_EXTERNAL_SETUP: The device does not handle TDLS (802.11z)
2298  *	link setup/discovery operations internally. Setup, discovery and
2299  *	teardown packets should be sent through the @NL80211_CMD_TDLS_MGMT
2300  *	command. When this flag is not set, @NL80211_CMD_TDLS_OPER should be
2301  *	used for asking the driver/firmware to perform a TDLS operation.
2302  * @WIPHY_FLAG_HAVE_AP_SME: device integrates AP SME
2303  * @WIPHY_FLAG_REPORTS_OBSS: the device will report beacons from other BSSes
2304  *	when there are virtual interfaces in AP mode by calling
2305  *	cfg80211_report_obss_beacon().
2306  * @WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD: When operating as an AP, the device
2307  *	responds to probe-requests in hardware.
2308  * @WIPHY_FLAG_OFFCHAN_TX: Device supports direct off-channel TX.
2309  * @WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL: Device supports remain-on-channel call.
2310  */
2311 enum wiphy_flags {
2312 	WIPHY_FLAG_CUSTOM_REGULATORY		= BIT(0),
2313 	WIPHY_FLAG_STRICT_REGULATORY		= BIT(1),
2314 	WIPHY_FLAG_DISABLE_BEACON_HINTS		= BIT(2),
2315 	WIPHY_FLAG_NETNS_OK			= BIT(3),
2316 	WIPHY_FLAG_PS_ON_BY_DEFAULT		= BIT(4),
2317 	WIPHY_FLAG_4ADDR_AP			= BIT(5),
2318 	WIPHY_FLAG_4ADDR_STATION		= BIT(6),
2319 	WIPHY_FLAG_CONTROL_PORT_PROTOCOL	= BIT(7),
2320 	WIPHY_FLAG_IBSS_RSN			= BIT(8),
2321 	WIPHY_FLAG_MESH_AUTH			= BIT(10),
2322 	WIPHY_FLAG_SUPPORTS_SCHED_SCAN		= BIT(11),
2323 	/* use hole at 12 */
2324 	WIPHY_FLAG_SUPPORTS_FW_ROAM		= BIT(13),
2325 	WIPHY_FLAG_AP_UAPSD			= BIT(14),
2326 	WIPHY_FLAG_SUPPORTS_TDLS		= BIT(15),
2327 	WIPHY_FLAG_TDLS_EXTERNAL_SETUP		= BIT(16),
2328 	WIPHY_FLAG_HAVE_AP_SME			= BIT(17),
2329 	WIPHY_FLAG_REPORTS_OBSS			= BIT(18),
2330 	WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD	= BIT(19),
2331 	WIPHY_FLAG_OFFCHAN_TX			= BIT(20),
2332 	WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL	= BIT(21),
2333 };
2334 
2335 /**
2336  * struct ieee80211_iface_limit - limit on certain interface types
2337  * @max: maximum number of interfaces of these types
2338  * @types: interface types (bits)
2339  */
2340 struct ieee80211_iface_limit {
2341 	u16 max;
2342 	u16 types;
2343 };
2344 
2345 /**
2346  * struct ieee80211_iface_combination - possible interface combination
2347  * @limits: limits for the given interface types
2348  * @n_limits: number of limitations
2349  * @num_different_channels: can use up to this many different channels
2350  * @max_interfaces: maximum number of interfaces in total allowed in this
2351  *	group
2352  * @beacon_int_infra_match: In this combination, the beacon intervals
2353  *	between infrastructure and AP types must match. This is required
2354  *	only in special cases.
2355  * @radar_detect_widths: bitmap of channel widths supported for radar detection
2356  *
2357  * These examples can be expressed as follows:
2358  *
2359  * Allow #STA <= 1, #AP <= 1, matching BI, channels = 1, 2 total:
2360  *
2361  *  struct ieee80211_iface_limit limits1[] = {
2362  *	{ .max = 1, .types = BIT(NL80211_IFTYPE_STATION), },
2363  *	{ .max = 1, .types = BIT(NL80211_IFTYPE_AP}, },
2364  *  };
2365  *  struct ieee80211_iface_combination combination1 = {
2366  *	.limits = limits1,
2367  *	.n_limits = ARRAY_SIZE(limits1),
2368  *	.max_interfaces = 2,
2369  *	.beacon_int_infra_match = true,
2370  *  };
2371  *
2372  *
2373  * Allow #{AP, P2P-GO} <= 8, channels = 1, 8 total:
2374  *
2375  *  struct ieee80211_iface_limit limits2[] = {
2376  *	{ .max = 8, .types = BIT(NL80211_IFTYPE_AP) |
2377  *			     BIT(NL80211_IFTYPE_P2P_GO), },
2378  *  };
2379  *  struct ieee80211_iface_combination combination2 = {
2380  *	.limits = limits2,
2381  *	.n_limits = ARRAY_SIZE(limits2),
2382  *	.max_interfaces = 8,
2383  *	.num_different_channels = 1,
2384  *  };
2385  *
2386  *
2387  * Allow #STA <= 1, #{P2P-client,P2P-GO} <= 3 on two channels, 4 total.
2388  * This allows for an infrastructure connection and three P2P connections.
2389  *
2390  *  struct ieee80211_iface_limit limits3[] = {
2391  *	{ .max = 1, .types = BIT(NL80211_IFTYPE_STATION), },
2392  *	{ .max = 3, .types = BIT(NL80211_IFTYPE_P2P_GO) |
2393  *			     BIT(NL80211_IFTYPE_P2P_CLIENT), },
2394  *  };
2395  *  struct ieee80211_iface_combination combination3 = {
2396  *	.limits = limits3,
2397  *	.n_limits = ARRAY_SIZE(limits3),
2398  *	.max_interfaces = 4,
2399  *	.num_different_channels = 2,
2400  *  };
2401  */
2402 struct ieee80211_iface_combination {
2403 	const struct ieee80211_iface_limit *limits;
2404 	u32 num_different_channels;
2405 	u16 max_interfaces;
2406 	u8 n_limits;
2407 	bool beacon_int_infra_match;
2408 	u8 radar_detect_widths;
2409 };
2410 
2411 struct ieee80211_txrx_stypes {
2412 	u16 tx, rx;
2413 };
2414 
2415 /**
2416  * enum wiphy_wowlan_support_flags - WoWLAN support flags
2417  * @WIPHY_WOWLAN_ANY: supports wakeup for the special "any"
2418  *	trigger that keeps the device operating as-is and
2419  *	wakes up the host on any activity, for example a
2420  *	received packet that passed filtering; note that the
2421  *	packet should be preserved in that case
2422  * @WIPHY_WOWLAN_MAGIC_PKT: supports wakeup on magic packet
2423  *	(see nl80211.h)
2424  * @WIPHY_WOWLAN_DISCONNECT: supports wakeup on disconnect
2425  * @WIPHY_WOWLAN_SUPPORTS_GTK_REKEY: supports GTK rekeying while asleep
2426  * @WIPHY_WOWLAN_GTK_REKEY_FAILURE: supports wakeup on GTK rekey failure
2427  * @WIPHY_WOWLAN_EAP_IDENTITY_REQ: supports wakeup on EAP identity request
2428  * @WIPHY_WOWLAN_4WAY_HANDSHAKE: supports wakeup on 4-way handshake failure
2429  * @WIPHY_WOWLAN_RFKILL_RELEASE: supports wakeup on RF-kill release
2430  */
2431 enum wiphy_wowlan_support_flags {
2432 	WIPHY_WOWLAN_ANY		= BIT(0),
2433 	WIPHY_WOWLAN_MAGIC_PKT		= BIT(1),
2434 	WIPHY_WOWLAN_DISCONNECT		= BIT(2),
2435 	WIPHY_WOWLAN_SUPPORTS_GTK_REKEY	= BIT(3),
2436 	WIPHY_WOWLAN_GTK_REKEY_FAILURE	= BIT(4),
2437 	WIPHY_WOWLAN_EAP_IDENTITY_REQ	= BIT(5),
2438 	WIPHY_WOWLAN_4WAY_HANDSHAKE	= BIT(6),
2439 	WIPHY_WOWLAN_RFKILL_RELEASE	= BIT(7),
2440 };
2441 
2442 struct wiphy_wowlan_tcp_support {
2443 	const struct nl80211_wowlan_tcp_data_token_feature *tok;
2444 	u32 data_payload_max;
2445 	u32 data_interval_max;
2446 	u32 wake_payload_max;
2447 	bool seq;
2448 };
2449 
2450 /**
2451  * struct wiphy_wowlan_support - WoWLAN support data
2452  * @flags: see &enum wiphy_wowlan_support_flags
2453  * @n_patterns: number of supported wakeup patterns
2454  *	(see nl80211.h for the pattern definition)
2455  * @pattern_max_len: maximum length of each pattern
2456  * @pattern_min_len: minimum length of each pattern
2457  * @max_pkt_offset: maximum Rx packet offset
2458  * @tcp: TCP wakeup support information
2459  */
2460 struct wiphy_wowlan_support {
2461 	u32 flags;
2462 	int n_patterns;
2463 	int pattern_max_len;
2464 	int pattern_min_len;
2465 	int max_pkt_offset;
2466 	const struct wiphy_wowlan_tcp_support *tcp;
2467 };
2468 
2469 /**
2470  * struct wiphy - wireless hardware description
2471  * @reg_notifier: the driver's regulatory notification callback,
2472  *	note that if your driver uses wiphy_apply_custom_regulatory()
2473  *	the reg_notifier's request can be passed as NULL
2474  * @regd: the driver's regulatory domain, if one was requested via
2475  * 	the regulatory_hint() API. This can be used by the driver
2476  *	on the reg_notifier() if it chooses to ignore future
2477  *	regulatory domain changes caused by other drivers.
2478  * @signal_type: signal type reported in &struct cfg80211_bss.
2479  * @cipher_suites: supported cipher suites
2480  * @n_cipher_suites: number of supported cipher suites
2481  * @retry_short: Retry limit for short frames (dot11ShortRetryLimit)
2482  * @retry_long: Retry limit for long frames (dot11LongRetryLimit)
2483  * @frag_threshold: Fragmentation threshold (dot11FragmentationThreshold);
2484  *	-1 = fragmentation disabled, only odd values >= 256 used
2485  * @rts_threshold: RTS threshold (dot11RTSThreshold); -1 = RTS/CTS disabled
2486  * @_net: the network namespace this wiphy currently lives in
2487  * @perm_addr: permanent MAC address of this device
2488  * @addr_mask: If the device supports multiple MAC addresses by masking,
2489  *	set this to a mask with variable bits set to 1, e.g. if the last
2490  *	four bits are variable then set it to 00:...:00:0f. The actual
2491  *	variable bits shall be determined by the interfaces added, with
2492  *	interfaces not matching the mask being rejected to be brought up.
2493  * @n_addresses: number of addresses in @addresses.
2494  * @addresses: If the device has more than one address, set this pointer
2495  *	to a list of addresses (6 bytes each). The first one will be used
2496  *	by default for perm_addr. In this case, the mask should be set to
2497  *	all-zeroes. In this case it is assumed that the device can handle
2498  *	the same number of arbitrary MAC addresses.
2499  * @registered: protects ->resume and ->suspend sysfs callbacks against
2500  *	unregister hardware
2501  * @debugfsdir: debugfs directory used for this wiphy, will be renamed
2502  *	automatically on wiphy renames
2503  * @dev: (virtual) struct device for this wiphy
2504  * @registered: helps synchronize suspend/resume with wiphy unregister
2505  * @wext: wireless extension handlers
2506  * @priv: driver private data (sized according to wiphy_new() parameter)
2507  * @interface_modes: bitmask of interfaces types valid for this wiphy,
2508  *	must be set by driver
2509  * @iface_combinations: Valid interface combinations array, should not
2510  *	list single interface types.
2511  * @n_iface_combinations: number of entries in @iface_combinations array.
2512  * @software_iftypes: bitmask of software interface types, these are not
2513  *	subject to any restrictions since they are purely managed in SW.
2514  * @flags: wiphy flags, see &enum wiphy_flags
2515  * @features: features advertised to nl80211, see &enum nl80211_feature_flags.
2516  * @bss_priv_size: each BSS struct has private data allocated with it,
2517  *	this variable determines its size
2518  * @max_scan_ssids: maximum number of SSIDs the device can scan for in
2519  *	any given scan
2520  * @max_sched_scan_ssids: maximum number of SSIDs the device can scan
2521  *	for in any given scheduled scan
2522  * @max_match_sets: maximum number of match sets the device can handle
2523  *	when performing a scheduled scan, 0 if filtering is not
2524  *	supported.
2525  * @max_scan_ie_len: maximum length of user-controlled IEs device can
2526  *	add to probe request frames transmitted during a scan, must not
2527  *	include fixed IEs like supported rates
2528  * @max_sched_scan_ie_len: same as max_scan_ie_len, but for scheduled
2529  *	scans
2530  * @coverage_class: current coverage class
2531  * @fw_version: firmware version for ethtool reporting
2532  * @hw_version: hardware version for ethtool reporting
2533  * @max_num_pmkids: maximum number of PMKIDs supported by device
2534  * @privid: a pointer that drivers can use to identify if an arbitrary
2535  *	wiphy is theirs, e.g. in global notifiers
2536  * @bands: information about bands/channels supported by this device
2537  *
2538  * @mgmt_stypes: bitmasks of frame subtypes that can be subscribed to or
2539  *	transmitted through nl80211, points to an array indexed by interface
2540  *	type
2541  *
2542  * @available_antennas_tx: bitmap of antennas which are available to be
2543  *	configured as TX antennas. Antenna configuration commands will be
2544  *	rejected unless this or @available_antennas_rx is set.
2545  *
2546  * @available_antennas_rx: bitmap of antennas which are available to be
2547  *	configured as RX antennas. Antenna configuration commands will be
2548  *	rejected unless this or @available_antennas_tx is set.
2549  *
2550  * @probe_resp_offload:
2551  *	 Bitmap of supported protocols for probe response offloading.
2552  *	 See &enum nl80211_probe_resp_offload_support_attr. Only valid
2553  *	 when the wiphy flag @WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD is set.
2554  *
2555  * @max_remain_on_channel_duration: Maximum time a remain-on-channel operation
2556  *	may request, if implemented.
2557  *
2558  * @wowlan: WoWLAN support information
2559  *
2560  * @ap_sme_capa: AP SME capabilities, flags from &enum nl80211_ap_sme_features.
2561  * @ht_capa_mod_mask:  Specify what ht_cap values can be over-ridden.
2562  *	If null, then none can be over-ridden.
2563  * @vht_capa_mod_mask:  Specify what VHT capabilities can be over-ridden.
2564  *	If null, then none can be over-ridden.
2565  *
2566  * @max_acl_mac_addrs: Maximum number of MAC addresses that the device
2567  *	supports for ACL.
2568  *
2569  * @extended_capabilities: extended capabilities supported by the driver,
2570  *	additional capabilities might be supported by userspace; these are
2571  *	the 802.11 extended capabilities ("Extended Capabilities element")
2572  *	and are in the same format as in the information element. See
2573  *	802.11-2012 8.4.2.29 for the defined fields.
2574  * @extended_capabilities_mask: mask of the valid values
2575  * @extended_capabilities_len: length of the extended capabilities
2576  */
2577 struct wiphy {
2578 	/* assign these fields before you register the wiphy */
2579 
2580 	/* permanent MAC address(es) */
2581 	u8 perm_addr[ETH_ALEN];
2582 	u8 addr_mask[ETH_ALEN];
2583 
2584 	struct mac_address *addresses;
2585 
2586 	const struct ieee80211_txrx_stypes *mgmt_stypes;
2587 
2588 	const struct ieee80211_iface_combination *iface_combinations;
2589 	int n_iface_combinations;
2590 	u16 software_iftypes;
2591 
2592 	u16 n_addresses;
2593 
2594 	/* Supported interface modes, OR together BIT(NL80211_IFTYPE_...) */
2595 	u16 interface_modes;
2596 
2597 	u16 max_acl_mac_addrs;
2598 
2599 	u32 flags, features;
2600 
2601 	u32 ap_sme_capa;
2602 
2603 	enum cfg80211_signal_type signal_type;
2604 
2605 	int bss_priv_size;
2606 	u8 max_scan_ssids;
2607 	u8 max_sched_scan_ssids;
2608 	u8 max_match_sets;
2609 	u16 max_scan_ie_len;
2610 	u16 max_sched_scan_ie_len;
2611 
2612 	int n_cipher_suites;
2613 	const u32 *cipher_suites;
2614 
2615 	u8 retry_short;
2616 	u8 retry_long;
2617 	u32 frag_threshold;
2618 	u32 rts_threshold;
2619 	u8 coverage_class;
2620 
2621 	char fw_version[ETHTOOL_FWVERS_LEN];
2622 	u32 hw_version;
2623 
2624 #ifdef CONFIG_PM
2625 	struct wiphy_wowlan_support wowlan;
2626 #endif
2627 
2628 	u16 max_remain_on_channel_duration;
2629 
2630 	u8 max_num_pmkids;
2631 
2632 	u32 available_antennas_tx;
2633 	u32 available_antennas_rx;
2634 
2635 	/*
2636 	 * Bitmap of supported protocols for probe response offloading
2637 	 * see &enum nl80211_probe_resp_offload_support_attr. Only valid
2638 	 * when the wiphy flag @WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD is set.
2639 	 */
2640 	u32 probe_resp_offload;
2641 
2642 	const u8 *extended_capabilities, *extended_capabilities_mask;
2643 	u8 extended_capabilities_len;
2644 
2645 	/* If multiple wiphys are registered and you're handed e.g.
2646 	 * a regular netdev with assigned ieee80211_ptr, you won't
2647 	 * know whether it points to a wiphy your driver has registered
2648 	 * or not. Assign this to something global to your driver to
2649 	 * help determine whether you own this wiphy or not. */
2650 	const void *privid;
2651 
2652 	struct ieee80211_supported_band *bands[IEEE80211_NUM_BANDS];
2653 
2654 	/* Lets us get back the wiphy on the callback */
2655 	void (*reg_notifier)(struct wiphy *wiphy,
2656 			     struct regulatory_request *request);
2657 
2658 	/* fields below are read-only, assigned by cfg80211 */
2659 
2660 	const struct ieee80211_regdomain __rcu *regd;
2661 
2662 	/* the item in /sys/class/ieee80211/ points to this,
2663 	 * you need use set_wiphy_dev() (see below) */
2664 	struct device dev;
2665 
2666 	/* protects ->resume, ->suspend sysfs callbacks against unregister hw */
2667 	bool registered;
2668 
2669 	/* dir in debugfs: ieee80211/<wiphyname> */
2670 	struct dentry *debugfsdir;
2671 
2672 	const struct ieee80211_ht_cap *ht_capa_mod_mask;
2673 	const struct ieee80211_vht_cap *vht_capa_mod_mask;
2674 
2675 #ifdef CONFIG_NET_NS
2676 	/* the network namespace this phy lives in currently */
2677 	struct net *_net;
2678 #endif
2679 
2680 #ifdef CONFIG_CFG80211_WEXT
2681 	const struct iw_handler_def *wext;
2682 #endif
2683 
2684 	char priv[0] __aligned(NETDEV_ALIGN);
2685 };
2686 
2687 static inline struct net *wiphy_net(struct wiphy *wiphy)
2688 {
2689 	return read_pnet(&wiphy->_net);
2690 }
2691 
2692 static inline void wiphy_net_set(struct wiphy *wiphy, struct net *net)
2693 {
2694 	write_pnet(&wiphy->_net, net);
2695 }
2696 
2697 /**
2698  * wiphy_priv - return priv from wiphy
2699  *
2700  * @wiphy: the wiphy whose priv pointer to return
2701  * Return: The priv of @wiphy.
2702  */
2703 static inline void *wiphy_priv(struct wiphy *wiphy)
2704 {
2705 	BUG_ON(!wiphy);
2706 	return &wiphy->priv;
2707 }
2708 
2709 /**
2710  * priv_to_wiphy - return the wiphy containing the priv
2711  *
2712  * @priv: a pointer previously returned by wiphy_priv
2713  * Return: The wiphy of @priv.
2714  */
2715 static inline struct wiphy *priv_to_wiphy(void *priv)
2716 {
2717 	BUG_ON(!priv);
2718 	return container_of(priv, struct wiphy, priv);
2719 }
2720 
2721 /**
2722  * set_wiphy_dev - set device pointer for wiphy
2723  *
2724  * @wiphy: The wiphy whose device to bind
2725  * @dev: The device to parent it to
2726  */
2727 static inline void set_wiphy_dev(struct wiphy *wiphy, struct device *dev)
2728 {
2729 	wiphy->dev.parent = dev;
2730 }
2731 
2732 /**
2733  * wiphy_dev - get wiphy dev pointer
2734  *
2735  * @wiphy: The wiphy whose device struct to look up
2736  * Return: The dev of @wiphy.
2737  */
2738 static inline struct device *wiphy_dev(struct wiphy *wiphy)
2739 {
2740 	return wiphy->dev.parent;
2741 }
2742 
2743 /**
2744  * wiphy_name - get wiphy name
2745  *
2746  * @wiphy: The wiphy whose name to return
2747  * Return: The name of @wiphy.
2748  */
2749 static inline const char *wiphy_name(const struct wiphy *wiphy)
2750 {
2751 	return dev_name(&wiphy->dev);
2752 }
2753 
2754 /**
2755  * wiphy_new - create a new wiphy for use with cfg80211
2756  *
2757  * @ops: The configuration operations for this device
2758  * @sizeof_priv: The size of the private area to allocate
2759  *
2760  * Create a new wiphy and associate the given operations with it.
2761  * @sizeof_priv bytes are allocated for private use.
2762  *
2763  * Return: A pointer to the new wiphy. This pointer must be
2764  * assigned to each netdev's ieee80211_ptr for proper operation.
2765  */
2766 struct wiphy *wiphy_new(const struct cfg80211_ops *ops, int sizeof_priv);
2767 
2768 /**
2769  * wiphy_register - register a wiphy with cfg80211
2770  *
2771  * @wiphy: The wiphy to register.
2772  *
2773  * Return: A non-negative wiphy index or a negative error code.
2774  */
2775 extern int wiphy_register(struct wiphy *wiphy);
2776 
2777 /**
2778  * wiphy_unregister - deregister a wiphy from cfg80211
2779  *
2780  * @wiphy: The wiphy to unregister.
2781  *
2782  * After this call, no more requests can be made with this priv
2783  * pointer, but the call may sleep to wait for an outstanding
2784  * request that is being handled.
2785  */
2786 extern void wiphy_unregister(struct wiphy *wiphy);
2787 
2788 /**
2789  * wiphy_free - free wiphy
2790  *
2791  * @wiphy: The wiphy to free
2792  */
2793 extern void wiphy_free(struct wiphy *wiphy);
2794 
2795 /* internal structs */
2796 struct cfg80211_conn;
2797 struct cfg80211_internal_bss;
2798 struct cfg80211_cached_keys;
2799 
2800 /**
2801  * struct wireless_dev - wireless device state
2802  *
2803  * For netdevs, this structure must be allocated by the driver
2804  * that uses the ieee80211_ptr field in struct net_device (this
2805  * is intentional so it can be allocated along with the netdev.)
2806  * It need not be registered then as netdev registration will
2807  * be intercepted by cfg80211 to see the new wireless device.
2808  *
2809  * For non-netdev uses, it must also be allocated by the driver
2810  * in response to the cfg80211 callbacks that require it, as
2811  * there's no netdev registration in that case it may not be
2812  * allocated outside of callback operations that return it.
2813  *
2814  * @wiphy: pointer to hardware description
2815  * @iftype: interface type
2816  * @list: (private) Used to collect the interfaces
2817  * @netdev: (private) Used to reference back to the netdev, may be %NULL
2818  * @identifier: (private) Identifier used in nl80211 to identify this
2819  *	wireless device if it has no netdev
2820  * @current_bss: (private) Used by the internal configuration code
2821  * @channel: (private) Used by the internal configuration code to track
2822  *	the user-set AP, monitor and WDS channel
2823  * @preset_chan: (private) Used by the internal configuration code to
2824  *	track the channel to be used for AP later
2825  * @bssid: (private) Used by the internal configuration code
2826  * @ssid: (private) Used by the internal configuration code
2827  * @ssid_len: (private) Used by the internal configuration code
2828  * @mesh_id_len: (private) Used by the internal configuration code
2829  * @mesh_id_up_len: (private) Used by the internal configuration code
2830  * @wext: (private) Used by the internal wireless extensions compat code
2831  * @use_4addr: indicates 4addr mode is used on this interface, must be
2832  *	set by driver (if supported) on add_interface BEFORE registering the
2833  *	netdev and may otherwise be used by driver read-only, will be update
2834  *	by cfg80211 on change_interface
2835  * @mgmt_registrations: list of registrations for management frames
2836  * @mgmt_registrations_lock: lock for the list
2837  * @mtx: mutex used to lock data in this struct
2838  * @cleanup_work: work struct used for cleanup that can't be done directly
2839  * @beacon_interval: beacon interval used on this device for transmitting
2840  *	beacons, 0 when not valid
2841  * @address: The address for this device, valid only if @netdev is %NULL
2842  * @p2p_started: true if this is a P2P Device that has been started
2843  * @cac_started: true if DFS channel availability check has been started
2844  * @cac_start_time: timestamp (jiffies) when the dfs state was entered.
2845  */
2846 struct wireless_dev {
2847 	struct wiphy *wiphy;
2848 	enum nl80211_iftype iftype;
2849 
2850 	/* the remainder of this struct should be private to cfg80211 */
2851 	struct list_head list;
2852 	struct net_device *netdev;
2853 
2854 	u32 identifier;
2855 
2856 	struct list_head mgmt_registrations;
2857 	spinlock_t mgmt_registrations_lock;
2858 
2859 	struct mutex mtx;
2860 
2861 	struct work_struct cleanup_work;
2862 
2863 	bool use_4addr, p2p_started;
2864 
2865 	u8 address[ETH_ALEN] __aligned(sizeof(u16));
2866 
2867 	/* currently used for IBSS and SME - might be rearranged later */
2868 	u8 ssid[IEEE80211_MAX_SSID_LEN];
2869 	u8 ssid_len, mesh_id_len, mesh_id_up_len;
2870 	enum {
2871 		CFG80211_SME_IDLE,
2872 		CFG80211_SME_CONNECTING,
2873 		CFG80211_SME_CONNECTED,
2874 	} sme_state;
2875 	struct cfg80211_conn *conn;
2876 	struct cfg80211_cached_keys *connect_keys;
2877 
2878 	struct list_head event_list;
2879 	spinlock_t event_lock;
2880 
2881 	struct cfg80211_internal_bss *current_bss; /* associated / joined */
2882 	struct cfg80211_chan_def preset_chandef;
2883 
2884 	/* for AP and mesh channel tracking */
2885 	struct ieee80211_channel *channel;
2886 
2887 	bool ibss_fixed;
2888 
2889 	bool ps;
2890 	int ps_timeout;
2891 
2892 	int beacon_interval;
2893 
2894 	u32 ap_unexpected_nlportid;
2895 
2896 	bool cac_started;
2897 	unsigned long cac_start_time;
2898 
2899 #ifdef CONFIG_CFG80211_WEXT
2900 	/* wext data */
2901 	struct {
2902 		struct cfg80211_ibss_params ibss;
2903 		struct cfg80211_connect_params connect;
2904 		struct cfg80211_cached_keys *keys;
2905 		u8 *ie;
2906 		size_t ie_len;
2907 		u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
2908 		u8 ssid[IEEE80211_MAX_SSID_LEN];
2909 		s8 default_key, default_mgmt_key;
2910 		bool prev_bssid_valid;
2911 	} wext;
2912 #endif
2913 };
2914 
2915 static inline u8 *wdev_address(struct wireless_dev *wdev)
2916 {
2917 	if (wdev->netdev)
2918 		return wdev->netdev->dev_addr;
2919 	return wdev->address;
2920 }
2921 
2922 /**
2923  * wdev_priv - return wiphy priv from wireless_dev
2924  *
2925  * @wdev: The wireless device whose wiphy's priv pointer to return
2926  * Return: The wiphy priv of @wdev.
2927  */
2928 static inline void *wdev_priv(struct wireless_dev *wdev)
2929 {
2930 	BUG_ON(!wdev);
2931 	return wiphy_priv(wdev->wiphy);
2932 }
2933 
2934 /**
2935  * DOC: Utility functions
2936  *
2937  * cfg80211 offers a number of utility functions that can be useful.
2938  */
2939 
2940 /**
2941  * ieee80211_channel_to_frequency - convert channel number to frequency
2942  * @chan: channel number
2943  * @band: band, necessary due to channel number overlap
2944  * Return: The corresponding frequency (in MHz), or 0 if the conversion failed.
2945  */
2946 extern int ieee80211_channel_to_frequency(int chan, enum ieee80211_band band);
2947 
2948 /**
2949  * ieee80211_frequency_to_channel - convert frequency to channel number
2950  * @freq: center frequency
2951  * Return: The corresponding channel, or 0 if the conversion failed.
2952  */
2953 extern int ieee80211_frequency_to_channel(int freq);
2954 
2955 /*
2956  * Name indirection necessary because the ieee80211 code also has
2957  * a function named "ieee80211_get_channel", so if you include
2958  * cfg80211's header file you get cfg80211's version, if you try
2959  * to include both header files you'll (rightfully!) get a symbol
2960  * clash.
2961  */
2962 extern struct ieee80211_channel *__ieee80211_get_channel(struct wiphy *wiphy,
2963 							 int freq);
2964 /**
2965  * ieee80211_get_channel - get channel struct from wiphy for specified frequency
2966  * @wiphy: the struct wiphy to get the channel for
2967  * @freq: the center frequency of the channel
2968  * Return: The channel struct from @wiphy at @freq.
2969  */
2970 static inline struct ieee80211_channel *
2971 ieee80211_get_channel(struct wiphy *wiphy, int freq)
2972 {
2973 	return __ieee80211_get_channel(wiphy, freq);
2974 }
2975 
2976 /**
2977  * ieee80211_get_response_rate - get basic rate for a given rate
2978  *
2979  * @sband: the band to look for rates in
2980  * @basic_rates: bitmap of basic rates
2981  * @bitrate: the bitrate for which to find the basic rate
2982  *
2983  * Return: The basic rate corresponding to a given bitrate, that
2984  * is the next lower bitrate contained in the basic rate map,
2985  * which is, for this function, given as a bitmap of indices of
2986  * rates in the band's bitrate table.
2987  */
2988 struct ieee80211_rate *
2989 ieee80211_get_response_rate(struct ieee80211_supported_band *sband,
2990 			    u32 basic_rates, int bitrate);
2991 
2992 /*
2993  * Radiotap parsing functions -- for controlled injection support
2994  *
2995  * Implemented in net/wireless/radiotap.c
2996  * Documentation in Documentation/networking/radiotap-headers.txt
2997  */
2998 
2999 struct radiotap_align_size {
3000 	uint8_t align:4, size:4;
3001 };
3002 
3003 struct ieee80211_radiotap_namespace {
3004 	const struct radiotap_align_size *align_size;
3005 	int n_bits;
3006 	uint32_t oui;
3007 	uint8_t subns;
3008 };
3009 
3010 struct ieee80211_radiotap_vendor_namespaces {
3011 	const struct ieee80211_radiotap_namespace *ns;
3012 	int n_ns;
3013 };
3014 
3015 /**
3016  * struct ieee80211_radiotap_iterator - tracks walk thru present radiotap args
3017  * @this_arg_index: index of current arg, valid after each successful call
3018  *	to ieee80211_radiotap_iterator_next()
3019  * @this_arg: pointer to current radiotap arg; it is valid after each
3020  *	call to ieee80211_radiotap_iterator_next() but also after
3021  *	ieee80211_radiotap_iterator_init() where it will point to
3022  *	the beginning of the actual data portion
3023  * @this_arg_size: length of the current arg, for convenience
3024  * @current_namespace: pointer to the current namespace definition
3025  *	(or internally %NULL if the current namespace is unknown)
3026  * @is_radiotap_ns: indicates whether the current namespace is the default
3027  *	radiotap namespace or not
3028  *
3029  * @_rtheader: pointer to the radiotap header we are walking through
3030  * @_max_length: length of radiotap header in cpu byte ordering
3031  * @_arg_index: next argument index
3032  * @_arg: next argument pointer
3033  * @_next_bitmap: internal pointer to next present u32
3034  * @_bitmap_shifter: internal shifter for curr u32 bitmap, b0 set == arg present
3035  * @_vns: vendor namespace definitions
3036  * @_next_ns_data: beginning of the next namespace's data
3037  * @_reset_on_ext: internal; reset the arg index to 0 when going to the
3038  *	next bitmap word
3039  *
3040  * Describes the radiotap parser state. Fields prefixed with an underscore
3041  * must not be used by users of the parser, only by the parser internally.
3042  */
3043 
3044 struct ieee80211_radiotap_iterator {
3045 	struct ieee80211_radiotap_header *_rtheader;
3046 	const struct ieee80211_radiotap_vendor_namespaces *_vns;
3047 	const struct ieee80211_radiotap_namespace *current_namespace;
3048 
3049 	unsigned char *_arg, *_next_ns_data;
3050 	__le32 *_next_bitmap;
3051 
3052 	unsigned char *this_arg;
3053 	int this_arg_index;
3054 	int this_arg_size;
3055 
3056 	int is_radiotap_ns;
3057 
3058 	int _max_length;
3059 	int _arg_index;
3060 	uint32_t _bitmap_shifter;
3061 	int _reset_on_ext;
3062 };
3063 
3064 extern int ieee80211_radiotap_iterator_init(
3065 	struct ieee80211_radiotap_iterator *iterator,
3066 	struct ieee80211_radiotap_header *radiotap_header,
3067 	int max_length, const struct ieee80211_radiotap_vendor_namespaces *vns);
3068 
3069 extern int ieee80211_radiotap_iterator_next(
3070 	struct ieee80211_radiotap_iterator *iterator);
3071 
3072 
3073 extern const unsigned char rfc1042_header[6];
3074 extern const unsigned char bridge_tunnel_header[6];
3075 
3076 /**
3077  * ieee80211_get_hdrlen_from_skb - get header length from data
3078  *
3079  * @skb: the frame
3080  *
3081  * Given an skb with a raw 802.11 header at the data pointer this function
3082  * returns the 802.11 header length.
3083  *
3084  * Return: The 802.11 header length in bytes (not including encryption
3085  * headers). Or 0 if the data in the sk_buff is too short to contain a valid
3086  * 802.11 header.
3087  */
3088 unsigned int ieee80211_get_hdrlen_from_skb(const struct sk_buff *skb);
3089 
3090 /**
3091  * ieee80211_hdrlen - get header length in bytes from frame control
3092  * @fc: frame control field in little-endian format
3093  * Return: The header length in bytes.
3094  */
3095 unsigned int __attribute_const__ ieee80211_hdrlen(__le16 fc);
3096 
3097 /**
3098  * ieee80211_get_mesh_hdrlen - get mesh extension header length
3099  * @meshhdr: the mesh extension header, only the flags field
3100  *	(first byte) will be accessed
3101  * Return: The length of the extension header, which is always at
3102  * least 6 bytes and at most 18 if address 5 and 6 are present.
3103  */
3104 unsigned int ieee80211_get_mesh_hdrlen(struct ieee80211s_hdr *meshhdr);
3105 
3106 /**
3107  * DOC: Data path helpers
3108  *
3109  * In addition to generic utilities, cfg80211 also offers
3110  * functions that help implement the data path for devices
3111  * that do not do the 802.11/802.3 conversion on the device.
3112  */
3113 
3114 /**
3115  * ieee80211_data_to_8023 - convert an 802.11 data frame to 802.3
3116  * @skb: the 802.11 data frame
3117  * @addr: the device MAC address
3118  * @iftype: the virtual interface type
3119  * Return: 0 on success. Non-zero on error.
3120  */
3121 int ieee80211_data_to_8023(struct sk_buff *skb, const u8 *addr,
3122 			   enum nl80211_iftype iftype);
3123 
3124 /**
3125  * ieee80211_data_from_8023 - convert an 802.3 frame to 802.11
3126  * @skb: the 802.3 frame
3127  * @addr: the device MAC address
3128  * @iftype: the virtual interface type
3129  * @bssid: the network bssid (used only for iftype STATION and ADHOC)
3130  * @qos: build 802.11 QoS data frame
3131  * Return: 0 on success, or a negative error code.
3132  */
3133 int ieee80211_data_from_8023(struct sk_buff *skb, const u8 *addr,
3134 			     enum nl80211_iftype iftype, u8 *bssid, bool qos);
3135 
3136 /**
3137  * ieee80211_amsdu_to_8023s - decode an IEEE 802.11n A-MSDU frame
3138  *
3139  * Decode an IEEE 802.11n A-MSDU frame and convert it to a list of
3140  * 802.3 frames. The @list will be empty if the decode fails. The
3141  * @skb is consumed after the function returns.
3142  *
3143  * @skb: The input IEEE 802.11n A-MSDU frame.
3144  * @list: The output list of 802.3 frames. It must be allocated and
3145  *	initialized by by the caller.
3146  * @addr: The device MAC address.
3147  * @iftype: The device interface type.
3148  * @extra_headroom: The hardware extra headroom for SKBs in the @list.
3149  * @has_80211_header: Set it true if SKB is with IEEE 802.11 header.
3150  */
3151 void ieee80211_amsdu_to_8023s(struct sk_buff *skb, struct sk_buff_head *list,
3152 			      const u8 *addr, enum nl80211_iftype iftype,
3153 			      const unsigned int extra_headroom,
3154 			      bool has_80211_header);
3155 
3156 /**
3157  * cfg80211_classify8021d - determine the 802.1p/1d tag for a data frame
3158  * @skb: the data frame
3159  * Return: The 802.1p/1d tag.
3160  */
3161 unsigned int cfg80211_classify8021d(struct sk_buff *skb);
3162 
3163 /**
3164  * cfg80211_find_ie - find information element in data
3165  *
3166  * @eid: element ID
3167  * @ies: data consisting of IEs
3168  * @len: length of data
3169  *
3170  * Return: %NULL if the element ID could not be found or if
3171  * the element is invalid (claims to be longer than the given
3172  * data), or a pointer to the first byte of the requested
3173  * element, that is the byte containing the element ID.
3174  *
3175  * Note: There are no checks on the element length other than
3176  * having to fit into the given data.
3177  */
3178 const u8 *cfg80211_find_ie(u8 eid, const u8 *ies, int len);
3179 
3180 /**
3181  * cfg80211_find_vendor_ie - find vendor specific information element in data
3182  *
3183  * @oui: vendor OUI
3184  * @oui_type: vendor-specific OUI type
3185  * @ies: data consisting of IEs
3186  * @len: length of data
3187  *
3188  * Return: %NULL if the vendor specific element ID could not be found or if the
3189  * element is invalid (claims to be longer than the given data), or a pointer to
3190  * the first byte of the requested element, that is the byte containing the
3191  * element ID.
3192  *
3193  * Note: There are no checks on the element length other than having to fit into
3194  * the given data.
3195  */
3196 const u8 *cfg80211_find_vendor_ie(unsigned int oui, u8 oui_type,
3197 				  const u8 *ies, int len);
3198 
3199 /**
3200  * DOC: Regulatory enforcement infrastructure
3201  *
3202  * TODO
3203  */
3204 
3205 /**
3206  * regulatory_hint - driver hint to the wireless core a regulatory domain
3207  * @wiphy: the wireless device giving the hint (used only for reporting
3208  *	conflicts)
3209  * @alpha2: the ISO/IEC 3166 alpha2 the driver claims its regulatory domain
3210  * 	should be in. If @rd is set this should be NULL. Note that if you
3211  * 	set this to NULL you should still set rd->alpha2 to some accepted
3212  * 	alpha2.
3213  *
3214  * Wireless drivers can use this function to hint to the wireless core
3215  * what it believes should be the current regulatory domain by
3216  * giving it an ISO/IEC 3166 alpha2 country code it knows its regulatory
3217  * domain should be in or by providing a completely build regulatory domain.
3218  * If the driver provides an ISO/IEC 3166 alpha2 userspace will be queried
3219  * for a regulatory domain structure for the respective country.
3220  *
3221  * The wiphy must have been registered to cfg80211 prior to this call.
3222  * For cfg80211 drivers this means you must first use wiphy_register(),
3223  * for mac80211 drivers you must first use ieee80211_register_hw().
3224  *
3225  * Drivers should check the return value, its possible you can get
3226  * an -ENOMEM.
3227  *
3228  * Return: 0 on success. -ENOMEM.
3229  */
3230 extern int regulatory_hint(struct wiphy *wiphy, const char *alpha2);
3231 
3232 /**
3233  * wiphy_apply_custom_regulatory - apply a custom driver regulatory domain
3234  * @wiphy: the wireless device we want to process the regulatory domain on
3235  * @regd: the custom regulatory domain to use for this wiphy
3236  *
3237  * Drivers can sometimes have custom regulatory domains which do not apply
3238  * to a specific country. Drivers can use this to apply such custom regulatory
3239  * domains. This routine must be called prior to wiphy registration. The
3240  * custom regulatory domain will be trusted completely and as such previous
3241  * default channel settings will be disregarded. If no rule is found for a
3242  * channel on the regulatory domain the channel will be disabled.
3243  */
3244 extern void wiphy_apply_custom_regulatory(
3245 	struct wiphy *wiphy,
3246 	const struct ieee80211_regdomain *regd);
3247 
3248 /**
3249  * freq_reg_info - get regulatory information for the given frequency
3250  * @wiphy: the wiphy for which we want to process this rule for
3251  * @center_freq: Frequency in KHz for which we want regulatory information for
3252  *
3253  * Use this function to get the regulatory rule for a specific frequency on
3254  * a given wireless device. If the device has a specific regulatory domain
3255  * it wants to follow we respect that unless a country IE has been received
3256  * and processed already.
3257  *
3258  * Return: A valid pointer, or, when an error occurs, for example if no rule
3259  * can be found, the return value is encoded using ERR_PTR(). Use IS_ERR() to
3260  * check and PTR_ERR() to obtain the numeric return value. The numeric return
3261  * value will be -ERANGE if we determine the given center_freq does not even
3262  * have a regulatory rule for a frequency range in the center_freq's band.
3263  * See freq_in_rule_band() for our current definition of a band -- this is
3264  * purely subjective and right now it's 802.11 specific.
3265  */
3266 const struct ieee80211_reg_rule *freq_reg_info(struct wiphy *wiphy,
3267 					       u32 center_freq);
3268 
3269 /*
3270  * callbacks for asynchronous cfg80211 methods, notification
3271  * functions and BSS handling helpers
3272  */
3273 
3274 /**
3275  * cfg80211_scan_done - notify that scan finished
3276  *
3277  * @request: the corresponding scan request
3278  * @aborted: set to true if the scan was aborted for any reason,
3279  *	userspace will be notified of that
3280  */
3281 void cfg80211_scan_done(struct cfg80211_scan_request *request, bool aborted);
3282 
3283 /**
3284  * cfg80211_sched_scan_results - notify that new scan results are available
3285  *
3286  * @wiphy: the wiphy which got scheduled scan results
3287  */
3288 void cfg80211_sched_scan_results(struct wiphy *wiphy);
3289 
3290 /**
3291  * cfg80211_sched_scan_stopped - notify that the scheduled scan has stopped
3292  *
3293  * @wiphy: the wiphy on which the scheduled scan stopped
3294  *
3295  * The driver can call this function to inform cfg80211 that the
3296  * scheduled scan had to be stopped, for whatever reason.  The driver
3297  * is then called back via the sched_scan_stop operation when done.
3298  */
3299 void cfg80211_sched_scan_stopped(struct wiphy *wiphy);
3300 
3301 /**
3302  * cfg80211_inform_bss_frame - inform cfg80211 of a received BSS frame
3303  *
3304  * @wiphy: the wiphy reporting the BSS
3305  * @channel: The channel the frame was received on
3306  * @mgmt: the management frame (probe response or beacon)
3307  * @len: length of the management frame
3308  * @signal: the signal strength, type depends on the wiphy's signal_type
3309  * @gfp: context flags
3310  *
3311  * This informs cfg80211 that BSS information was found and
3312  * the BSS should be updated/added.
3313  *
3314  * Return: A referenced struct, must be released with cfg80211_put_bss()!
3315  * Or %NULL on error.
3316  */
3317 struct cfg80211_bss * __must_check
3318 cfg80211_inform_bss_frame(struct wiphy *wiphy,
3319 			  struct ieee80211_channel *channel,
3320 			  struct ieee80211_mgmt *mgmt, size_t len,
3321 			  s32 signal, gfp_t gfp);
3322 
3323 /**
3324  * cfg80211_inform_bss - inform cfg80211 of a new BSS
3325  *
3326  * @wiphy: the wiphy reporting the BSS
3327  * @channel: The channel the frame was received on
3328  * @bssid: the BSSID of the BSS
3329  * @tsf: the TSF sent by the peer in the beacon/probe response (or 0)
3330  * @capability: the capability field sent by the peer
3331  * @beacon_interval: the beacon interval announced by the peer
3332  * @ie: additional IEs sent by the peer
3333  * @ielen: length of the additional IEs
3334  * @signal: the signal strength, type depends on the wiphy's signal_type
3335  * @gfp: context flags
3336  *
3337  * This informs cfg80211 that BSS information was found and
3338  * the BSS should be updated/added.
3339  *
3340  * Return: A referenced struct, must be released with cfg80211_put_bss()!
3341  * Or %NULL on error.
3342  */
3343 struct cfg80211_bss * __must_check
3344 cfg80211_inform_bss(struct wiphy *wiphy,
3345 		    struct ieee80211_channel *channel,
3346 		    const u8 *bssid, u64 tsf, u16 capability,
3347 		    u16 beacon_interval, const u8 *ie, size_t ielen,
3348 		    s32 signal, gfp_t gfp);
3349 
3350 struct cfg80211_bss *cfg80211_get_bss(struct wiphy *wiphy,
3351 				      struct ieee80211_channel *channel,
3352 				      const u8 *bssid,
3353 				      const u8 *ssid, size_t ssid_len,
3354 				      u16 capa_mask, u16 capa_val);
3355 static inline struct cfg80211_bss *
3356 cfg80211_get_ibss(struct wiphy *wiphy,
3357 		  struct ieee80211_channel *channel,
3358 		  const u8 *ssid, size_t ssid_len)
3359 {
3360 	return cfg80211_get_bss(wiphy, channel, NULL, ssid, ssid_len,
3361 				WLAN_CAPABILITY_IBSS, WLAN_CAPABILITY_IBSS);
3362 }
3363 
3364 /**
3365  * cfg80211_ref_bss - reference BSS struct
3366  * @wiphy: the wiphy this BSS struct belongs to
3367  * @bss: the BSS struct to reference
3368  *
3369  * Increments the refcount of the given BSS struct.
3370  */
3371 void cfg80211_ref_bss(struct wiphy *wiphy, struct cfg80211_bss *bss);
3372 
3373 /**
3374  * cfg80211_put_bss - unref BSS struct
3375  * @wiphy: the wiphy this BSS struct belongs to
3376  * @bss: the BSS struct
3377  *
3378  * Decrements the refcount of the given BSS struct.
3379  */
3380 void cfg80211_put_bss(struct wiphy *wiphy, struct cfg80211_bss *bss);
3381 
3382 /**
3383  * cfg80211_unlink_bss - unlink BSS from internal data structures
3384  * @wiphy: the wiphy
3385  * @bss: the bss to remove
3386  *
3387  * This function removes the given BSS from the internal data structures
3388  * thereby making it no longer show up in scan results etc. Use this
3389  * function when you detect a BSS is gone. Normally BSSes will also time
3390  * out, so it is not necessary to use this function at all.
3391  */
3392 void cfg80211_unlink_bss(struct wiphy *wiphy, struct cfg80211_bss *bss);
3393 
3394 /**
3395  * cfg80211_send_rx_auth - notification of processed authentication
3396  * @dev: network device
3397  * @buf: authentication frame (header + body)
3398  * @len: length of the frame data
3399  *
3400  * This function is called whenever an authentication has been processed in
3401  * station mode. The driver is required to call either this function or
3402  * cfg80211_send_auth_timeout() to indicate the result of cfg80211_ops::auth()
3403  * call. This function may sleep.
3404  */
3405 void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len);
3406 
3407 /**
3408  * cfg80211_send_auth_timeout - notification of timed out authentication
3409  * @dev: network device
3410  * @addr: The MAC address of the device with which the authentication timed out
3411  *
3412  * This function may sleep.
3413  */
3414 void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr);
3415 
3416 /**
3417  * cfg80211_send_rx_assoc - notification of processed association
3418  * @dev: network device
3419  * @bss: the BSS struct association was requested for, the struct reference
3420  *	is owned by cfg80211 after this call
3421  * @buf: (re)association response frame (header + body)
3422  * @len: length of the frame data
3423  *
3424  * This function is called whenever a (re)association response has been
3425  * processed in station mode. The driver is required to call either this
3426  * function or cfg80211_send_assoc_timeout() to indicate the result of
3427  * cfg80211_ops::assoc() call. This function may sleep.
3428  */
3429 void cfg80211_send_rx_assoc(struct net_device *dev, struct cfg80211_bss *bss,
3430 			    const u8 *buf, size_t len);
3431 
3432 /**
3433  * cfg80211_send_assoc_timeout - notification of timed out association
3434  * @dev: network device
3435  * @addr: The MAC address of the device with which the association timed out
3436  *
3437  * This function may sleep.
3438  */
3439 void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr);
3440 
3441 /**
3442  * cfg80211_send_deauth - notification of processed deauthentication
3443  * @dev: network device
3444  * @buf: deauthentication frame (header + body)
3445  * @len: length of the frame data
3446  *
3447  * This function is called whenever deauthentication has been processed in
3448  * station mode. This includes both received deauthentication frames and
3449  * locally generated ones. This function may sleep.
3450  */
3451 void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len);
3452 
3453 /**
3454  * __cfg80211_send_deauth - notification of processed deauthentication
3455  * @dev: network device
3456  * @buf: deauthentication frame (header + body)
3457  * @len: length of the frame data
3458  *
3459  * Like cfg80211_send_deauth(), but doesn't take the wdev lock.
3460  */
3461 void __cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len);
3462 
3463 /**
3464  * cfg80211_send_disassoc - notification of processed disassociation
3465  * @dev: network device
3466  * @buf: disassociation response frame (header + body)
3467  * @len: length of the frame data
3468  *
3469  * This function is called whenever disassociation has been processed in
3470  * station mode. This includes both received disassociation frames and locally
3471  * generated ones. This function may sleep.
3472  */
3473 void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len);
3474 
3475 /**
3476  * __cfg80211_send_disassoc - notification of processed disassociation
3477  * @dev: network device
3478  * @buf: disassociation response frame (header + body)
3479  * @len: length of the frame data
3480  *
3481  * Like cfg80211_send_disassoc(), but doesn't take the wdev lock.
3482  */
3483 void __cfg80211_send_disassoc(struct net_device *dev, const u8 *buf,
3484 	size_t len);
3485 
3486 /**
3487  * cfg80211_send_unprot_deauth - notification of unprotected deauthentication
3488  * @dev: network device
3489  * @buf: deauthentication frame (header + body)
3490  * @len: length of the frame data
3491  *
3492  * This function is called whenever a received Deauthentication frame has been
3493  * dropped in station mode because of MFP being used but the Deauthentication
3494  * frame was not protected. This function may sleep.
3495  */
3496 void cfg80211_send_unprot_deauth(struct net_device *dev, const u8 *buf,
3497 				 size_t len);
3498 
3499 /**
3500  * cfg80211_send_unprot_disassoc - notification of unprotected disassociation
3501  * @dev: network device
3502  * @buf: disassociation frame (header + body)
3503  * @len: length of the frame data
3504  *
3505  * This function is called whenever a received Disassociation frame has been
3506  * dropped in station mode because of MFP being used but the Disassociation
3507  * frame was not protected. This function may sleep.
3508  */
3509 void cfg80211_send_unprot_disassoc(struct net_device *dev, const u8 *buf,
3510 				   size_t len);
3511 
3512 /**
3513  * cfg80211_michael_mic_failure - notification of Michael MIC failure (TKIP)
3514  * @dev: network device
3515  * @addr: The source MAC address of the frame
3516  * @key_type: The key type that the received frame used
3517  * @key_id: Key identifier (0..3). Can be -1 if missing.
3518  * @tsc: The TSC value of the frame that generated the MIC failure (6 octets)
3519  * @gfp: allocation flags
3520  *
3521  * This function is called whenever the local MAC detects a MIC failure in a
3522  * received frame. This matches with MLME-MICHAELMICFAILURE.indication()
3523  * primitive.
3524  */
3525 void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
3526 				  enum nl80211_key_type key_type, int key_id,
3527 				  const u8 *tsc, gfp_t gfp);
3528 
3529 /**
3530  * cfg80211_ibss_joined - notify cfg80211 that device joined an IBSS
3531  *
3532  * @dev: network device
3533  * @bssid: the BSSID of the IBSS joined
3534  * @gfp: allocation flags
3535  *
3536  * This function notifies cfg80211 that the device joined an IBSS or
3537  * switched to a different BSSID. Before this function can be called,
3538  * either a beacon has to have been received from the IBSS, or one of
3539  * the cfg80211_inform_bss{,_frame} functions must have been called
3540  * with the locally generated beacon -- this guarantees that there is
3541  * always a scan result for this IBSS. cfg80211 will handle the rest.
3542  */
3543 void cfg80211_ibss_joined(struct net_device *dev, const u8 *bssid, gfp_t gfp);
3544 
3545 /**
3546  * cfg80211_notify_new_candidate - notify cfg80211 of a new mesh peer candidate
3547  *
3548  * @dev: network device
3549  * @macaddr: the MAC address of the new candidate
3550  * @ie: information elements advertised by the peer candidate
3551  * @ie_len: lenght of the information elements buffer
3552  * @gfp: allocation flags
3553  *
3554  * This function notifies cfg80211 that the mesh peer candidate has been
3555  * detected, most likely via a beacon or, less likely, via a probe response.
3556  * cfg80211 then sends a notification to userspace.
3557  */
3558 void cfg80211_notify_new_peer_candidate(struct net_device *dev,
3559 		const u8 *macaddr, const u8 *ie, u8 ie_len, gfp_t gfp);
3560 
3561 /**
3562  * DOC: RFkill integration
3563  *
3564  * RFkill integration in cfg80211 is almost invisible to drivers,
3565  * as cfg80211 automatically registers an rfkill instance for each
3566  * wireless device it knows about. Soft kill is also translated
3567  * into disconnecting and turning all interfaces off, drivers are
3568  * expected to turn off the device when all interfaces are down.
3569  *
3570  * However, devices may have a hard RFkill line, in which case they
3571  * also need to interact with the rfkill subsystem, via cfg80211.
3572  * They can do this with a few helper functions documented here.
3573  */
3574 
3575 /**
3576  * wiphy_rfkill_set_hw_state - notify cfg80211 about hw block state
3577  * @wiphy: the wiphy
3578  * @blocked: block status
3579  */
3580 void wiphy_rfkill_set_hw_state(struct wiphy *wiphy, bool blocked);
3581 
3582 /**
3583  * wiphy_rfkill_start_polling - start polling rfkill
3584  * @wiphy: the wiphy
3585  */
3586 void wiphy_rfkill_start_polling(struct wiphy *wiphy);
3587 
3588 /**
3589  * wiphy_rfkill_stop_polling - stop polling rfkill
3590  * @wiphy: the wiphy
3591  */
3592 void wiphy_rfkill_stop_polling(struct wiphy *wiphy);
3593 
3594 #ifdef CONFIG_NL80211_TESTMODE
3595 /**
3596  * DOC: Test mode
3597  *
3598  * Test mode is a set of utility functions to allow drivers to
3599  * interact with driver-specific tools to aid, for instance,
3600  * factory programming.
3601  *
3602  * This chapter describes how drivers interact with it, for more
3603  * information see the nl80211 book's chapter on it.
3604  */
3605 
3606 /**
3607  * cfg80211_testmode_alloc_reply_skb - allocate testmode reply
3608  * @wiphy: the wiphy
3609  * @approxlen: an upper bound of the length of the data that will
3610  *	be put into the skb
3611  *
3612  * This function allocates and pre-fills an skb for a reply to
3613  * the testmode command. Since it is intended for a reply, calling
3614  * it outside of the @testmode_cmd operation is invalid.
3615  *
3616  * The returned skb is pre-filled with the wiphy index and set up in
3617  * a way that any data that is put into the skb (with skb_put(),
3618  * nla_put() or similar) will end up being within the
3619  * %NL80211_ATTR_TESTDATA attribute, so all that needs to be done
3620  * with the skb is adding data for the corresponding userspace tool
3621  * which can then read that data out of the testdata attribute. You
3622  * must not modify the skb in any other way.
3623  *
3624  * When done, call cfg80211_testmode_reply() with the skb and return
3625  * its error code as the result of the @testmode_cmd operation.
3626  *
3627  * Return: An allocated and pre-filled skb. %NULL if any errors happen.
3628  */
3629 struct sk_buff *cfg80211_testmode_alloc_reply_skb(struct wiphy *wiphy,
3630 						  int approxlen);
3631 
3632 /**
3633  * cfg80211_testmode_reply - send the reply skb
3634  * @skb: The skb, must have been allocated with
3635  *	cfg80211_testmode_alloc_reply_skb()
3636  *
3637  * Since calling this function will usually be the last thing
3638  * before returning from the @testmode_cmd you should return
3639  * the error code.  Note that this function consumes the skb
3640  * regardless of the return value.
3641  *
3642  * Return: An error code or 0 on success.
3643  */
3644 int cfg80211_testmode_reply(struct sk_buff *skb);
3645 
3646 /**
3647  * cfg80211_testmode_alloc_event_skb - allocate testmode event
3648  * @wiphy: the wiphy
3649  * @approxlen: an upper bound of the length of the data that will
3650  *	be put into the skb
3651  * @gfp: allocation flags
3652  *
3653  * This function allocates and pre-fills an skb for an event on the
3654  * testmode multicast group.
3655  *
3656  * The returned skb is set up in the same way as with
3657  * cfg80211_testmode_alloc_reply_skb() but prepared for an event. As
3658  * there, you should simply add data to it that will then end up in the
3659  * %NL80211_ATTR_TESTDATA attribute. Again, you must not modify the skb
3660  * in any other way.
3661  *
3662  * When done filling the skb, call cfg80211_testmode_event() with the
3663  * skb to send the event.
3664  *
3665  * Return: An allocated and pre-filled skb. %NULL if any errors happen.
3666  */
3667 struct sk_buff *cfg80211_testmode_alloc_event_skb(struct wiphy *wiphy,
3668 						  int approxlen, gfp_t gfp);
3669 
3670 /**
3671  * cfg80211_testmode_event - send the event
3672  * @skb: The skb, must have been allocated with
3673  *	cfg80211_testmode_alloc_event_skb()
3674  * @gfp: allocation flags
3675  *
3676  * This function sends the given @skb, which must have been allocated
3677  * by cfg80211_testmode_alloc_event_skb(), as an event. It always
3678  * consumes it.
3679  */
3680 void cfg80211_testmode_event(struct sk_buff *skb, gfp_t gfp);
3681 
3682 #define CFG80211_TESTMODE_CMD(cmd)	.testmode_cmd = (cmd),
3683 #define CFG80211_TESTMODE_DUMP(cmd)	.testmode_dump = (cmd),
3684 #else
3685 #define CFG80211_TESTMODE_CMD(cmd)
3686 #define CFG80211_TESTMODE_DUMP(cmd)
3687 #endif
3688 
3689 /**
3690  * cfg80211_connect_result - notify cfg80211 of connection result
3691  *
3692  * @dev: network device
3693  * @bssid: the BSSID of the AP
3694  * @req_ie: association request IEs (maybe be %NULL)
3695  * @req_ie_len: association request IEs length
3696  * @resp_ie: association response IEs (may be %NULL)
3697  * @resp_ie_len: assoc response IEs length
3698  * @status: status code, 0 for successful connection, use
3699  *	%WLAN_STATUS_UNSPECIFIED_FAILURE if your device cannot give you
3700  *	the real status code for failures.
3701  * @gfp: allocation flags
3702  *
3703  * It should be called by the underlying driver whenever connect() has
3704  * succeeded.
3705  */
3706 void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
3707 			     const u8 *req_ie, size_t req_ie_len,
3708 			     const u8 *resp_ie, size_t resp_ie_len,
3709 			     u16 status, gfp_t gfp);
3710 
3711 /**
3712  * cfg80211_roamed - notify cfg80211 of roaming
3713  *
3714  * @dev: network device
3715  * @channel: the channel of the new AP
3716  * @bssid: the BSSID of the new AP
3717  * @req_ie: association request IEs (maybe be %NULL)
3718  * @req_ie_len: association request IEs length
3719  * @resp_ie: association response IEs (may be %NULL)
3720  * @resp_ie_len: assoc response IEs length
3721  * @gfp: allocation flags
3722  *
3723  * It should be called by the underlying driver whenever it roamed
3724  * from one AP to another while connected.
3725  */
3726 void cfg80211_roamed(struct net_device *dev,
3727 		     struct ieee80211_channel *channel,
3728 		     const u8 *bssid,
3729 		     const u8 *req_ie, size_t req_ie_len,
3730 		     const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp);
3731 
3732 /**
3733  * cfg80211_roamed_bss - notify cfg80211 of roaming
3734  *
3735  * @dev: network device
3736  * @bss: entry of bss to which STA got roamed
3737  * @req_ie: association request IEs (maybe be %NULL)
3738  * @req_ie_len: association request IEs length
3739  * @resp_ie: association response IEs (may be %NULL)
3740  * @resp_ie_len: assoc response IEs length
3741  * @gfp: allocation flags
3742  *
3743  * This is just a wrapper to notify cfg80211 of roaming event with driver
3744  * passing bss to avoid a race in timeout of the bss entry. It should be
3745  * called by the underlying driver whenever it roamed from one AP to another
3746  * while connected. Drivers which have roaming implemented in firmware
3747  * may use this function to avoid a race in bss entry timeout where the bss
3748  * entry of the new AP is seen in the driver, but gets timed out by the time
3749  * it is accessed in __cfg80211_roamed() due to delay in scheduling
3750  * rdev->event_work. In case of any failures, the reference is released
3751  * either in cfg80211_roamed_bss() or in __cfg80211_romed(), Otherwise,
3752  * it will be released while diconneting from the current bss.
3753  */
3754 void cfg80211_roamed_bss(struct net_device *dev, struct cfg80211_bss *bss,
3755 			 const u8 *req_ie, size_t req_ie_len,
3756 			 const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp);
3757 
3758 /**
3759  * cfg80211_disconnected - notify cfg80211 that connection was dropped
3760  *
3761  * @dev: network device
3762  * @ie: information elements of the deauth/disassoc frame (may be %NULL)
3763  * @ie_len: length of IEs
3764  * @reason: reason code for the disconnection, set it to 0 if unknown
3765  * @gfp: allocation flags
3766  *
3767  * After it calls this function, the driver should enter an idle state
3768  * and not try to connect to any AP any more.
3769  */
3770 void cfg80211_disconnected(struct net_device *dev, u16 reason,
3771 			   u8 *ie, size_t ie_len, gfp_t gfp);
3772 
3773 /**
3774  * cfg80211_ready_on_channel - notification of remain_on_channel start
3775  * @wdev: wireless device
3776  * @cookie: the request cookie
3777  * @chan: The current channel (from remain_on_channel request)
3778  * @duration: Duration in milliseconds that the driver intents to remain on the
3779  *	channel
3780  * @gfp: allocation flags
3781  */
3782 void cfg80211_ready_on_channel(struct wireless_dev *wdev, u64 cookie,
3783 			       struct ieee80211_channel *chan,
3784 			       unsigned int duration, gfp_t gfp);
3785 
3786 /**
3787  * cfg80211_remain_on_channel_expired - remain_on_channel duration expired
3788  * @wdev: wireless device
3789  * @cookie: the request cookie
3790  * @chan: The current channel (from remain_on_channel request)
3791  * @gfp: allocation flags
3792  */
3793 void cfg80211_remain_on_channel_expired(struct wireless_dev *wdev, u64 cookie,
3794 					struct ieee80211_channel *chan,
3795 					gfp_t gfp);
3796 
3797 
3798 /**
3799  * cfg80211_new_sta - notify userspace about station
3800  *
3801  * @dev: the netdev
3802  * @mac_addr: the station's address
3803  * @sinfo: the station information
3804  * @gfp: allocation flags
3805  */
3806 void cfg80211_new_sta(struct net_device *dev, const u8 *mac_addr,
3807 		      struct station_info *sinfo, gfp_t gfp);
3808 
3809 /**
3810  * cfg80211_del_sta - notify userspace about deletion of a station
3811  *
3812  * @dev: the netdev
3813  * @mac_addr: the station's address
3814  * @gfp: allocation flags
3815  */
3816 void cfg80211_del_sta(struct net_device *dev, const u8 *mac_addr, gfp_t gfp);
3817 
3818 /**
3819  * cfg80211_conn_failed - connection request failed notification
3820  *
3821  * @dev: the netdev
3822  * @mac_addr: the station's address
3823  * @reason: the reason for connection failure
3824  * @gfp: allocation flags
3825  *
3826  * Whenever a station tries to connect to an AP and if the station
3827  * could not connect to the AP as the AP has rejected the connection
3828  * for some reasons, this function is called.
3829  *
3830  * The reason for connection failure can be any of the value from
3831  * nl80211_connect_failed_reason enum
3832  */
3833 void cfg80211_conn_failed(struct net_device *dev, const u8 *mac_addr,
3834 			  enum nl80211_connect_failed_reason reason,
3835 			  gfp_t gfp);
3836 
3837 /**
3838  * cfg80211_rx_mgmt - notification of received, unprocessed management frame
3839  * @wdev: wireless device receiving the frame
3840  * @freq: Frequency on which the frame was received in MHz
3841  * @sig_dbm: signal strength in mBm, or 0 if unknown
3842  * @buf: Management frame (header + body)
3843  * @len: length of the frame data
3844  * @gfp: context flags
3845  *
3846  * This function is called whenever an Action frame is received for a station
3847  * mode interface, but is not processed in kernel.
3848  *
3849  * Return: %true if a user space application has registered for this frame.
3850  * For action frames, that makes it responsible for rejecting unrecognized
3851  * action frames; %false otherwise, in which case for action frames the
3852  * driver is responsible for rejecting the frame.
3853  */
3854 bool cfg80211_rx_mgmt(struct wireless_dev *wdev, int freq, int sig_dbm,
3855 		      const u8 *buf, size_t len, gfp_t gfp);
3856 
3857 /**
3858  * cfg80211_mgmt_tx_status - notification of TX status for management frame
3859  * @wdev: wireless device receiving the frame
3860  * @cookie: Cookie returned by cfg80211_ops::mgmt_tx()
3861  * @buf: Management frame (header + body)
3862  * @len: length of the frame data
3863  * @ack: Whether frame was acknowledged
3864  * @gfp: context flags
3865  *
3866  * This function is called whenever a management frame was requested to be
3867  * transmitted with cfg80211_ops::mgmt_tx() to report the TX status of the
3868  * transmission attempt.
3869  */
3870 void cfg80211_mgmt_tx_status(struct wireless_dev *wdev, u64 cookie,
3871 			     const u8 *buf, size_t len, bool ack, gfp_t gfp);
3872 
3873 
3874 /**
3875  * cfg80211_cqm_rssi_notify - connection quality monitoring rssi event
3876  * @dev: network device
3877  * @rssi_event: the triggered RSSI event
3878  * @gfp: context flags
3879  *
3880  * This function is called when a configured connection quality monitoring
3881  * rssi threshold reached event occurs.
3882  */
3883 void cfg80211_cqm_rssi_notify(struct net_device *dev,
3884 			      enum nl80211_cqm_rssi_threshold_event rssi_event,
3885 			      gfp_t gfp);
3886 
3887 /**
3888  * cfg80211_radar_event - radar detection event
3889  * @wiphy: the wiphy
3890  * @chandef: chandef for the current channel
3891  * @gfp: context flags
3892  *
3893  * This function is called when a radar is detected on the current chanenl.
3894  */
3895 void cfg80211_radar_event(struct wiphy *wiphy,
3896 			  struct cfg80211_chan_def *chandef, gfp_t gfp);
3897 
3898 /**
3899  * cfg80211_cac_event - Channel availability check (CAC) event
3900  * @netdev: network device
3901  * @event: type of event
3902  * @gfp: context flags
3903  *
3904  * This function is called when a Channel availability check (CAC) is finished
3905  * or aborted. This must be called to notify the completion of a CAC process,
3906  * also by full-MAC drivers.
3907  */
3908 void cfg80211_cac_event(struct net_device *netdev,
3909 			enum nl80211_radar_event event, gfp_t gfp);
3910 
3911 
3912 /**
3913  * cfg80211_cqm_pktloss_notify - notify userspace about packetloss to peer
3914  * @dev: network device
3915  * @peer: peer's MAC address
3916  * @num_packets: how many packets were lost -- should be a fixed threshold
3917  *	but probably no less than maybe 50, or maybe a throughput dependent
3918  *	threshold (to account for temporary interference)
3919  * @gfp: context flags
3920  */
3921 void cfg80211_cqm_pktloss_notify(struct net_device *dev,
3922 				 const u8 *peer, u32 num_packets, gfp_t gfp);
3923 
3924 /**
3925  * cfg80211_cqm_txe_notify - TX error rate event
3926  * @dev: network device
3927  * @peer: peer's MAC address
3928  * @num_packets: how many packets were lost
3929  * @rate: % of packets which failed transmission
3930  * @intvl: interval (in s) over which the TX failure threshold was breached.
3931  * @gfp: context flags
3932  *
3933  * Notify userspace when configured % TX failures over number of packets in a
3934  * given interval is exceeded.
3935  */
3936 void cfg80211_cqm_txe_notify(struct net_device *dev, const u8 *peer,
3937 			     u32 num_packets, u32 rate, u32 intvl, gfp_t gfp);
3938 
3939 /**
3940  * cfg80211_gtk_rekey_notify - notify userspace about driver rekeying
3941  * @dev: network device
3942  * @bssid: BSSID of AP (to avoid races)
3943  * @replay_ctr: new replay counter
3944  * @gfp: allocation flags
3945  */
3946 void cfg80211_gtk_rekey_notify(struct net_device *dev, const u8 *bssid,
3947 			       const u8 *replay_ctr, gfp_t gfp);
3948 
3949 /**
3950  * cfg80211_pmksa_candidate_notify - notify about PMKSA caching candidate
3951  * @dev: network device
3952  * @index: candidate index (the smaller the index, the higher the priority)
3953  * @bssid: BSSID of AP
3954  * @preauth: Whether AP advertises support for RSN pre-authentication
3955  * @gfp: allocation flags
3956  */
3957 void cfg80211_pmksa_candidate_notify(struct net_device *dev, int index,
3958 				     const u8 *bssid, bool preauth, gfp_t gfp);
3959 
3960 /**
3961  * cfg80211_rx_spurious_frame - inform userspace about a spurious frame
3962  * @dev: The device the frame matched to
3963  * @addr: the transmitter address
3964  * @gfp: context flags
3965  *
3966  * This function is used in AP mode (only!) to inform userspace that
3967  * a spurious class 3 frame was received, to be able to deauth the
3968  * sender.
3969  * Return: %true if the frame was passed to userspace (or this failed
3970  * for a reason other than not having a subscription.)
3971  */
3972 bool cfg80211_rx_spurious_frame(struct net_device *dev,
3973 				const u8 *addr, gfp_t gfp);
3974 
3975 /**
3976  * cfg80211_rx_unexpected_4addr_frame - inform about unexpected WDS frame
3977  * @dev: The device the frame matched to
3978  * @addr: the transmitter address
3979  * @gfp: context flags
3980  *
3981  * This function is used in AP mode (only!) to inform userspace that
3982  * an associated station sent a 4addr frame but that wasn't expected.
3983  * It is allowed and desirable to send this event only once for each
3984  * station to avoid event flooding.
3985  * Return: %true if the frame was passed to userspace (or this failed
3986  * for a reason other than not having a subscription.)
3987  */
3988 bool cfg80211_rx_unexpected_4addr_frame(struct net_device *dev,
3989 					const u8 *addr, gfp_t gfp);
3990 
3991 /**
3992  * cfg80211_probe_status - notify userspace about probe status
3993  * @dev: the device the probe was sent on
3994  * @addr: the address of the peer
3995  * @cookie: the cookie filled in @probe_client previously
3996  * @acked: indicates whether probe was acked or not
3997  * @gfp: allocation flags
3998  */
3999 void cfg80211_probe_status(struct net_device *dev, const u8 *addr,
4000 			   u64 cookie, bool acked, gfp_t gfp);
4001 
4002 /**
4003  * cfg80211_report_obss_beacon - report beacon from other APs
4004  * @wiphy: The wiphy that received the beacon
4005  * @frame: the frame
4006  * @len: length of the frame
4007  * @freq: frequency the frame was received on
4008  * @sig_dbm: signal strength in mBm, or 0 if unknown
4009  *
4010  * Use this function to report to userspace when a beacon was
4011  * received. It is not useful to call this when there is no
4012  * netdev that is in AP/GO mode.
4013  */
4014 void cfg80211_report_obss_beacon(struct wiphy *wiphy,
4015 				 const u8 *frame, size_t len,
4016 				 int freq, int sig_dbm);
4017 
4018 /**
4019  * cfg80211_reg_can_beacon - check if beaconing is allowed
4020  * @wiphy: the wiphy
4021  * @chandef: the channel definition
4022  *
4023  * Return: %true if there is no secondary channel or the secondary channel(s)
4024  * can be used for beaconing (i.e. is not a radar channel etc.)
4025  */
4026 bool cfg80211_reg_can_beacon(struct wiphy *wiphy,
4027 			     struct cfg80211_chan_def *chandef);
4028 
4029 /*
4030  * cfg80211_ch_switch_notify - update wdev channel and notify userspace
4031  * @dev: the device which switched channels
4032  * @chandef: the new channel definition
4033  *
4034  * Acquires wdev_lock, so must only be called from sleepable driver context!
4035  */
4036 void cfg80211_ch_switch_notify(struct net_device *dev,
4037 			       struct cfg80211_chan_def *chandef);
4038 
4039 /**
4040  * ieee80211_operating_class_to_band - convert operating class to band
4041  *
4042  * @operating_class: the operating class to convert
4043  * @band: band pointer to fill
4044  *
4045  * Returns %true if the conversion was successful, %false otherwise.
4046  */
4047 bool ieee80211_operating_class_to_band(u8 operating_class,
4048 				       enum ieee80211_band *band);
4049 
4050 /*
4051  * cfg80211_tdls_oper_request - request userspace to perform TDLS operation
4052  * @dev: the device on which the operation is requested
4053  * @peer: the MAC address of the peer device
4054  * @oper: the requested TDLS operation (NL80211_TDLS_SETUP or
4055  *	NL80211_TDLS_TEARDOWN)
4056  * @reason_code: the reason code for teardown request
4057  * @gfp: allocation flags
4058  *
4059  * This function is used to request userspace to perform TDLS operation that
4060  * requires knowledge of keys, i.e., link setup or teardown when the AP
4061  * connection uses encryption. This is optional mechanism for the driver to use
4062  * if it can automatically determine when a TDLS link could be useful (e.g.,
4063  * based on traffic and signal strength for a peer).
4064  */
4065 void cfg80211_tdls_oper_request(struct net_device *dev, const u8 *peer,
4066 				enum nl80211_tdls_operation oper,
4067 				u16 reason_code, gfp_t gfp);
4068 
4069 /*
4070  * cfg80211_calculate_bitrate - calculate actual bitrate (in 100Kbps units)
4071  * @rate: given rate_info to calculate bitrate from
4072  *
4073  * return 0 if MCS index >= 32
4074  */
4075 u32 cfg80211_calculate_bitrate(struct rate_info *rate);
4076 
4077 /**
4078  * cfg80211_unregister_wdev - remove the given wdev
4079  * @wdev: struct wireless_dev to remove
4080  *
4081  * Call this function only for wdevs that have no netdev assigned,
4082  * e.g. P2P Devices. It removes the device from the list so that
4083  * it can no longer be used. It is necessary to call this function
4084  * even when cfg80211 requests the removal of the interface by
4085  * calling the del_virtual_intf() callback. The function must also
4086  * be called when the driver wishes to unregister the wdev, e.g.
4087  * when the device is unbound from the driver.
4088  *
4089  * Requires the RTNL to be held.
4090  */
4091 void cfg80211_unregister_wdev(struct wireless_dev *wdev);
4092 
4093 /**
4094  * struct cfg80211_ft_event - FT Information Elements
4095  * @ies: FT IEs
4096  * @ies_len: length of the FT IE in bytes
4097  * @target_ap: target AP's MAC address
4098  * @ric_ies: RIC IE
4099  * @ric_ies_len: length of the RIC IE in bytes
4100  */
4101 struct cfg80211_ft_event_params {
4102 	const u8 *ies;
4103 	size_t ies_len;
4104 	const u8 *target_ap;
4105 	const u8 *ric_ies;
4106 	size_t ric_ies_len;
4107 };
4108 
4109 /**
4110  * cfg80211_ft_event - notify userspace about FT IE and RIC IE
4111  * @netdev: network device
4112  * @ft_event: IE information
4113  */
4114 void cfg80211_ft_event(struct net_device *netdev,
4115 		       struct cfg80211_ft_event_params *ft_event);
4116 
4117 /**
4118  * cfg80211_get_p2p_attr - find and copy a P2P attribute from IE buffer
4119  * @ies: the input IE buffer
4120  * @len: the input length
4121  * @attr: the attribute ID to find
4122  * @buf: output buffer, can be %NULL if the data isn't needed, e.g.
4123  *	if the function is only called to get the needed buffer size
4124  * @bufsize: size of the output buffer
4125  *
4126  * The function finds a given P2P attribute in the (vendor) IEs and
4127  * copies its contents to the given buffer.
4128  *
4129  * Return: A negative error code (-%EILSEQ or -%ENOENT) if the data is
4130  * malformed or the attribute can't be found (respectively), or the
4131  * length of the found attribute (which can be zero).
4132  */
4133 int cfg80211_get_p2p_attr(const u8 *ies, unsigned int len,
4134 			  enum ieee80211_p2p_attr_id attr,
4135 			  u8 *buf, unsigned int bufsize);
4136 
4137 /**
4138  * cfg80211_report_wowlan_wakeup - report wakeup from WoWLAN
4139  * @wdev: the wireless device reporting the wakeup
4140  * @wakeup: the wakeup report
4141  * @gfp: allocation flags
4142  *
4143  * This function reports that the given device woke up. If it
4144  * caused the wakeup, report the reason(s), otherwise you may
4145  * pass %NULL as the @wakeup parameter to advertise that something
4146  * else caused the wakeup.
4147  */
4148 void cfg80211_report_wowlan_wakeup(struct wireless_dev *wdev,
4149 				   struct cfg80211_wowlan_wakeup *wakeup,
4150 				   gfp_t gfp);
4151 
4152 /**
4153  * cfg80211_crit_proto_stopped() - indicate critical protocol stopped by driver.
4154  *
4155  * @wdev: the wireless device for which critical protocol is stopped.
4156  *
4157  * This function can be called by the driver to indicate it has reverted
4158  * operation back to normal. One reason could be that the duration given
4159  * by .crit_proto_start() has expired.
4160  */
4161 void cfg80211_crit_proto_stopped(struct wireless_dev *wdev, gfp_t gfp);
4162 
4163 /* Logging, debugging and troubleshooting/diagnostic helpers. */
4164 
4165 /* wiphy_printk helpers, similar to dev_printk */
4166 
4167 #define wiphy_printk(level, wiphy, format, args...)		\
4168 	dev_printk(level, &(wiphy)->dev, format, ##args)
4169 #define wiphy_emerg(wiphy, format, args...)			\
4170 	dev_emerg(&(wiphy)->dev, format, ##args)
4171 #define wiphy_alert(wiphy, format, args...)			\
4172 	dev_alert(&(wiphy)->dev, format, ##args)
4173 #define wiphy_crit(wiphy, format, args...)			\
4174 	dev_crit(&(wiphy)->dev, format, ##args)
4175 #define wiphy_err(wiphy, format, args...)			\
4176 	dev_err(&(wiphy)->dev, format, ##args)
4177 #define wiphy_warn(wiphy, format, args...)			\
4178 	dev_warn(&(wiphy)->dev, format, ##args)
4179 #define wiphy_notice(wiphy, format, args...)			\
4180 	dev_notice(&(wiphy)->dev, format, ##args)
4181 #define wiphy_info(wiphy, format, args...)			\
4182 	dev_info(&(wiphy)->dev, format, ##args)
4183 
4184 #define wiphy_debug(wiphy, format, args...)			\
4185 	wiphy_printk(KERN_DEBUG, wiphy, format, ##args)
4186 
4187 #define wiphy_dbg(wiphy, format, args...)			\
4188 	dev_dbg(&(wiphy)->dev, format, ##args)
4189 
4190 #if defined(VERBOSE_DEBUG)
4191 #define wiphy_vdbg	wiphy_dbg
4192 #else
4193 #define wiphy_vdbg(wiphy, format, args...)				\
4194 ({									\
4195 	if (0)								\
4196 		wiphy_printk(KERN_DEBUG, wiphy, format, ##args);	\
4197 	0;								\
4198 })
4199 #endif
4200 
4201 /*
4202  * wiphy_WARN() acts like wiphy_printk(), but with the key difference
4203  * of using a WARN/WARN_ON to get the message out, including the
4204  * file/line information and a backtrace.
4205  */
4206 #define wiphy_WARN(wiphy, format, args...)			\
4207 	WARN(1, "wiphy: %s\n" format, wiphy_name(wiphy), ##args);
4208 
4209 #endif /* __NET_CFG80211_H */
4210