Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v3.5 664 lines 20 kB view raw
1/* src/p80211/p80211conv.c 2* 3* Ether/802.11 conversions and packet buffer routines 4* 5* Copyright (C) 1999 AbsoluteValue Systems, Inc. All Rights Reserved. 6* -------------------------------------------------------------------- 7* 8* linux-wlan 9* 10* The contents of this file are subject to the Mozilla Public 11* License Version 1.1 (the "License"); you may not use this file 12* except in compliance with the License. You may obtain a copy of 13* the License at http://www.mozilla.org/MPL/ 14* 15* Software distributed under the License is distributed on an "AS 16* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or 17* implied. See the License for the specific language governing 18* rights and limitations under the License. 19* 20* Alternatively, the contents of this file may be used under the 21* terms of the GNU Public License version 2 (the "GPL"), in which 22* case the provisions of the GPL are applicable instead of the 23* above. If you wish to allow the use of your version of this file 24* only under the terms of the GPL and not to allow others to use 25* your version of this file under the MPL, indicate your decision 26* by deleting the provisions above and replace them with the notice 27* and other provisions required by the GPL. If you do not delete 28* the provisions above, a recipient may use your version of this 29* file under either the MPL or the GPL. 30* 31* -------------------------------------------------------------------- 32* 33* Inquiries regarding the linux-wlan Open Source project can be 34* made directly to: 35* 36* AbsoluteValue Systems Inc. 37* info@linux-wlan.com 38* http://www.linux-wlan.com 39* 40* -------------------------------------------------------------------- 41* 42* Portions of the development of this software were funded by 43* Intersil Corporation as part of PRISM(R) chipset product development. 44* 45* -------------------------------------------------------------------- 46* 47* This file defines the functions that perform Ethernet to/from 48* 802.11 frame conversions. 49* 50* -------------------------------------------------------------------- 51* 52*================================================================ */ 53 54#include <linux/module.h> 55#include <linux/kernel.h> 56#include <linux/sched.h> 57#include <linux/types.h> 58#include <linux/skbuff.h> 59#include <linux/slab.h> 60#include <linux/wireless.h> 61#include <linux/netdevice.h> 62#include <linux/etherdevice.h> 63#include <linux/if_ether.h> 64#include <linux/byteorder/generic.h> 65 66#include <asm/byteorder.h> 67 68#include "p80211types.h" 69#include "p80211hdr.h" 70#include "p80211conv.h" 71#include "p80211mgmt.h" 72#include "p80211msg.h" 73#include "p80211netdev.h" 74#include "p80211ioctl.h" 75#include "p80211req.h" 76 77static u8 oui_rfc1042[] = { 0x00, 0x00, 0x00 }; 78static u8 oui_8021h[] = { 0x00, 0x00, 0xf8 }; 79 80/*---------------------------------------------------------------- 81* p80211pb_ether_to_80211 82* 83* Uses the contents of the ether frame and the etherconv setting 84* to build the elements of the 802.11 frame. 85* 86* We don't actually set 87* up the frame header here. That's the MAC's job. We're only handling 88* conversion of DIXII or 802.3+LLC frames to something that works 89* with 802.11. 90* 91* Note -- 802.11 header is NOT part of the skb. Likewise, the 802.11 92* FCS is also not present and will need to be added elsewhere. 93* 94* Arguments: 95* ethconv Conversion type to perform 96* skb skbuff containing the ether frame 97* p80211_hdr 802.11 header 98* 99* Returns: 100* 0 on success, non-zero otherwise 101* 102* Call context: 103* May be called in interrupt or non-interrupt context 104----------------------------------------------------------------*/ 105int skb_ether_to_p80211(wlandevice_t *wlandev, u32 ethconv, 106 struct sk_buff *skb, union p80211_hdr *p80211_hdr, 107 struct p80211_metawep *p80211_wep) 108{ 109 110 u16 fc; 111 u16 proto; 112 struct wlan_ethhdr e_hdr; 113 struct wlan_llc *e_llc; 114 struct wlan_snap *e_snap; 115 int foo; 116 117 memcpy(&e_hdr, skb->data, sizeof(e_hdr)); 118 119 if (skb->len <= 0) { 120 pr_debug("zero-length skb!\n"); 121 return 1; 122 } 123 124 if (ethconv == WLAN_ETHCONV_ENCAP) { /* simplest case */ 125 pr_debug("ENCAP len: %d\n", skb->len); 126 /* here, we don't care what kind of ether frm. Just stick it */ 127 /* in the 80211 payload */ 128 /* which is to say, leave the skb alone. */ 129 } else { 130 /* step 1: classify ether frame, DIX or 802.3? */ 131 proto = ntohs(e_hdr.type); 132 if (proto <= 1500) { 133 pr_debug("802.3 len: %d\n", skb->len); 134 /* codes <= 1500 reserved for 802.3 lengths */ 135 /* it's 802.3, pass ether payload unchanged, */ 136 137 /* trim off ethernet header */ 138 skb_pull(skb, WLAN_ETHHDR_LEN); 139 140 /* leave off any PAD octets. */ 141 skb_trim(skb, proto); 142 } else { 143 pr_debug("DIXII len: %d\n", skb->len); 144 /* it's DIXII, time for some conversion */ 145 146 /* trim off ethernet header */ 147 skb_pull(skb, WLAN_ETHHDR_LEN); 148 149 /* tack on SNAP */ 150 e_snap = 151 (struct wlan_snap *) skb_push(skb, 152 sizeof(struct wlan_snap)); 153 e_snap->type = htons(proto); 154 if (ethconv == WLAN_ETHCONV_8021h 155 && p80211_stt_findproto(proto)) { 156 memcpy(e_snap->oui, oui_8021h, 157 WLAN_IEEE_OUI_LEN); 158 } else { 159 memcpy(e_snap->oui, oui_rfc1042, 160 WLAN_IEEE_OUI_LEN); 161 } 162 163 /* tack on llc */ 164 e_llc = 165 (struct wlan_llc *) skb_push(skb, 166 sizeof(struct wlan_llc)); 167 e_llc->dsap = 0xAA; /* SNAP, see IEEE 802 */ 168 e_llc->ssap = 0xAA; 169 e_llc->ctl = 0x03; 170 171 } 172 } 173 174 /* Set up the 802.11 header */ 175 /* It's a data frame */ 176 fc = cpu_to_le16(WLAN_SET_FC_FTYPE(WLAN_FTYPE_DATA) | 177 WLAN_SET_FC_FSTYPE(WLAN_FSTYPE_DATAONLY)); 178 179 switch (wlandev->macmode) { 180 case WLAN_MACMODE_IBSS_STA: 181 memcpy(p80211_hdr->a3.a1, &e_hdr.daddr, ETH_ALEN); 182 memcpy(p80211_hdr->a3.a2, wlandev->netdev->dev_addr, ETH_ALEN); 183 memcpy(p80211_hdr->a3.a3, wlandev->bssid, ETH_ALEN); 184 break; 185 case WLAN_MACMODE_ESS_STA: 186 fc |= cpu_to_le16(WLAN_SET_FC_TODS(1)); 187 memcpy(p80211_hdr->a3.a1, wlandev->bssid, ETH_ALEN); 188 memcpy(p80211_hdr->a3.a2, wlandev->netdev->dev_addr, ETH_ALEN); 189 memcpy(p80211_hdr->a3.a3, &e_hdr.daddr, ETH_ALEN); 190 break; 191 case WLAN_MACMODE_ESS_AP: 192 fc |= cpu_to_le16(WLAN_SET_FC_FROMDS(1)); 193 memcpy(p80211_hdr->a3.a1, &e_hdr.daddr, ETH_ALEN); 194 memcpy(p80211_hdr->a3.a2, wlandev->bssid, ETH_ALEN); 195 memcpy(p80211_hdr->a3.a3, &e_hdr.saddr, ETH_ALEN); 196 break; 197 default: 198 printk(KERN_ERR 199 "Error: Converting eth to wlan in unknown mode.\n"); 200 return 1; 201 break; 202 } 203 204 p80211_wep->data = NULL; 205 206 if ((wlandev->hostwep & HOSTWEP_PRIVACYINVOKED) 207 && (wlandev->hostwep & HOSTWEP_ENCRYPT)) { 208 /* XXXX need to pick keynum other than default? */ 209 210 p80211_wep->data = kmalloc(skb->len, GFP_ATOMIC); 211 foo = wep_encrypt(wlandev, skb->data, p80211_wep->data, 212 skb->len, 213 (wlandev->hostwep & HOSTWEP_DEFAULTKEY_MASK), 214 p80211_wep->iv, p80211_wep->icv); 215 if (foo) { 216 printk(KERN_WARNING 217 "Host en-WEP failed, dropping frame (%d).\n", 218 foo); 219 return 2; 220 } 221 fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1)); 222 } 223 224 /* skb->nh.raw = skb->data; */ 225 226 p80211_hdr->a3.fc = fc; 227 p80211_hdr->a3.dur = 0; 228 p80211_hdr->a3.seq = 0; 229 230 return 0; 231} 232 233/* jkriegl: from orinoco, modified */ 234static void orinoco_spy_gather(wlandevice_t *wlandev, char *mac, 235 struct p80211_rxmeta *rxmeta) 236{ 237 int i; 238 239 /* Gather wireless spy statistics: for each packet, compare the 240 * source address with out list, and if match, get the stats... */ 241 242 for (i = 0; i < wlandev->spy_number; i++) { 243 244 if (!memcmp(wlandev->spy_address[i], mac, ETH_ALEN)) { 245 memcpy(wlandev->spy_address[i], mac, ETH_ALEN); 246 wlandev->spy_stat[i].level = rxmeta->signal; 247 wlandev->spy_stat[i].noise = rxmeta->noise; 248 wlandev->spy_stat[i].qual = 249 (rxmeta->signal > 250 rxmeta->noise) ? (rxmeta->signal - 251 rxmeta->noise) : 0; 252 wlandev->spy_stat[i].updated = 0x7; 253 } 254 } 255} 256 257/*---------------------------------------------------------------- 258* p80211pb_80211_to_ether 259* 260* Uses the contents of a received 802.11 frame and the etherconv 261* setting to build an ether frame. 262* 263* This function extracts the src and dest address from the 802.11 264* frame to use in the construction of the eth frame. 265* 266* Arguments: 267* ethconv Conversion type to perform 268* skb Packet buffer containing the 802.11 frame 269* 270* Returns: 271* 0 on success, non-zero otherwise 272* 273* Call context: 274* May be called in interrupt or non-interrupt context 275----------------------------------------------------------------*/ 276int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv, 277 struct sk_buff *skb) 278{ 279 netdevice_t *netdev = wlandev->netdev; 280 u16 fc; 281 unsigned int payload_length; 282 unsigned int payload_offset; 283 u8 daddr[WLAN_ETHADDR_LEN]; 284 u8 saddr[WLAN_ETHADDR_LEN]; 285 union p80211_hdr *w_hdr; 286 struct wlan_ethhdr *e_hdr; 287 struct wlan_llc *e_llc; 288 struct wlan_snap *e_snap; 289 290 int foo; 291 292 payload_length = skb->len - WLAN_HDR_A3_LEN - WLAN_CRC_LEN; 293 payload_offset = WLAN_HDR_A3_LEN; 294 295 w_hdr = (union p80211_hdr *) skb->data; 296 297 /* setup some vars for convenience */ 298 fc = le16_to_cpu(w_hdr->a3.fc); 299 if ((WLAN_GET_FC_TODS(fc) == 0) && (WLAN_GET_FC_FROMDS(fc) == 0)) { 300 memcpy(daddr, w_hdr->a3.a1, WLAN_ETHADDR_LEN); 301 memcpy(saddr, w_hdr->a3.a2, WLAN_ETHADDR_LEN); 302 } else if ((WLAN_GET_FC_TODS(fc) == 0) 303 && (WLAN_GET_FC_FROMDS(fc) == 1)) { 304 memcpy(daddr, w_hdr->a3.a1, WLAN_ETHADDR_LEN); 305 memcpy(saddr, w_hdr->a3.a3, WLAN_ETHADDR_LEN); 306 } else if ((WLAN_GET_FC_TODS(fc) == 1) 307 && (WLAN_GET_FC_FROMDS(fc) == 0)) { 308 memcpy(daddr, w_hdr->a3.a3, WLAN_ETHADDR_LEN); 309 memcpy(saddr, w_hdr->a3.a2, WLAN_ETHADDR_LEN); 310 } else { 311 payload_offset = WLAN_HDR_A4_LEN; 312 if (payload_length < WLAN_HDR_A4_LEN - WLAN_HDR_A3_LEN) { 313 printk(KERN_ERR "A4 frame too short!\n"); 314 return 1; 315 } 316 payload_length -= (WLAN_HDR_A4_LEN - WLAN_HDR_A3_LEN); 317 memcpy(daddr, w_hdr->a4.a3, WLAN_ETHADDR_LEN); 318 memcpy(saddr, w_hdr->a4.a4, WLAN_ETHADDR_LEN); 319 } 320 321 /* perform de-wep if necessary.. */ 322 if ((wlandev->hostwep & HOSTWEP_PRIVACYINVOKED) && WLAN_GET_FC_ISWEP(fc) 323 && (wlandev->hostwep & HOSTWEP_DECRYPT)) { 324 if (payload_length <= 8) { 325 printk(KERN_ERR "WEP frame too short (%u).\n", 326 skb->len); 327 return 1; 328 } 329 foo = wep_decrypt(wlandev, skb->data + payload_offset + 4, 330 payload_length - 8, -1, 331 skb->data + payload_offset, 332 skb->data + payload_offset + 333 payload_length - 4); 334 if (foo) { 335 /* de-wep failed, drop skb. */ 336 pr_debug("Host de-WEP failed, dropping frame (%d).\n", 337 foo); 338 wlandev->rx.decrypt_err++; 339 return 2; 340 } 341 342 /* subtract the IV+ICV length off the payload */ 343 payload_length -= 8; 344 /* chop off the IV */ 345 skb_pull(skb, 4); 346 /* chop off the ICV. */ 347 skb_trim(skb, skb->len - 4); 348 349 wlandev->rx.decrypt++; 350 } 351 352 e_hdr = (struct wlan_ethhdr *) (skb->data + payload_offset); 353 354 e_llc = (struct wlan_llc *) (skb->data + payload_offset); 355 e_snap = 356 (struct wlan_snap *) (skb->data + payload_offset + 357 sizeof(struct wlan_llc)); 358 359 /* Test for the various encodings */ 360 if ((payload_length >= sizeof(struct wlan_ethhdr)) && 361 (e_llc->dsap != 0xaa || e_llc->ssap != 0xaa) && 362 ((memcmp(daddr, e_hdr->daddr, WLAN_ETHADDR_LEN) == 0) || 363 (memcmp(saddr, e_hdr->saddr, WLAN_ETHADDR_LEN) == 0))) { 364 pr_debug("802.3 ENCAP len: %d\n", payload_length); 365 /* 802.3 Encapsulated */ 366 /* Test for an overlength frame */ 367 if (payload_length > (netdev->mtu + WLAN_ETHHDR_LEN)) { 368 /* A bogus length ethfrm has been encap'd. */ 369 /* Is someone trying an oflow attack? */ 370 printk(KERN_ERR "ENCAP frame too large (%d > %d)\n", 371 payload_length, netdev->mtu + WLAN_ETHHDR_LEN); 372 return 1; 373 } 374 375 /* Chop off the 802.11 header. it's already sane. */ 376 skb_pull(skb, payload_offset); 377 /* chop off the 802.11 CRC */ 378 skb_trim(skb, skb->len - WLAN_CRC_LEN); 379 380 } else if ((payload_length >= sizeof(struct wlan_llc) + 381 sizeof(struct wlan_snap)) 382 && (e_llc->dsap == 0xaa) 383 && (e_llc->ssap == 0xaa) 384 && (e_llc->ctl == 0x03) 385 && 386 (((memcmp(e_snap->oui, oui_rfc1042, WLAN_IEEE_OUI_LEN) == 0) 387 && (ethconv == WLAN_ETHCONV_8021h) 388 && (p80211_stt_findproto(le16_to_cpu(e_snap->type)))) 389 || (memcmp(e_snap->oui, oui_rfc1042, WLAN_IEEE_OUI_LEN) != 390 0))) { 391 pr_debug("SNAP+RFC1042 len: %d\n", payload_length); 392 /* it's a SNAP + RFC1042 frame && protocol is in STT */ 393 /* build 802.3 + RFC1042 */ 394 395 /* Test for an overlength frame */ 396 if (payload_length > netdev->mtu) { 397 /* A bogus length ethfrm has been sent. */ 398 /* Is someone trying an oflow attack? */ 399 printk(KERN_ERR "SNAP frame too large (%d > %d)\n", 400 payload_length, netdev->mtu); 401 return 1; 402 } 403 404 /* chop 802.11 header from skb. */ 405 skb_pull(skb, payload_offset); 406 407 /* create 802.3 header at beginning of skb. */ 408 e_hdr = (struct wlan_ethhdr *) skb_push(skb, WLAN_ETHHDR_LEN); 409 memcpy(e_hdr->daddr, daddr, WLAN_ETHADDR_LEN); 410 memcpy(e_hdr->saddr, saddr, WLAN_ETHADDR_LEN); 411 e_hdr->type = htons(payload_length); 412 413 /* chop off the 802.11 CRC */ 414 skb_trim(skb, skb->len - WLAN_CRC_LEN); 415 416 } else if ((payload_length >= sizeof(struct wlan_llc) + 417 sizeof(struct wlan_snap)) 418 && (e_llc->dsap == 0xaa) 419 && (e_llc->ssap == 0xaa) 420 && (e_llc->ctl == 0x03)) { 421 pr_debug("802.1h/RFC1042 len: %d\n", payload_length); 422 /* it's an 802.1h frame || (an RFC1042 && protocol not in STT) 423 build a DIXII + RFC894 */ 424 425 /* Test for an overlength frame */ 426 if ((payload_length - sizeof(struct wlan_llc) - 427 sizeof(struct wlan_snap)) 428 > netdev->mtu) { 429 /* A bogus length ethfrm has been sent. */ 430 /* Is someone trying an oflow attack? */ 431 printk(KERN_ERR "DIXII frame too large (%ld > %d)\n", 432 (long int)(payload_length - 433 sizeof(struct wlan_llc) - 434 sizeof(struct wlan_snap)), netdev->mtu); 435 return 1; 436 } 437 438 /* chop 802.11 header from skb. */ 439 skb_pull(skb, payload_offset); 440 441 /* chop llc header from skb. */ 442 skb_pull(skb, sizeof(struct wlan_llc)); 443 444 /* chop snap header from skb. */ 445 skb_pull(skb, sizeof(struct wlan_snap)); 446 447 /* create 802.3 header at beginning of skb. */ 448 e_hdr = (struct wlan_ethhdr *) skb_push(skb, WLAN_ETHHDR_LEN); 449 e_hdr->type = e_snap->type; 450 memcpy(e_hdr->daddr, daddr, WLAN_ETHADDR_LEN); 451 memcpy(e_hdr->saddr, saddr, WLAN_ETHADDR_LEN); 452 453 /* chop off the 802.11 CRC */ 454 skb_trim(skb, skb->len - WLAN_CRC_LEN); 455 } else { 456 pr_debug("NON-ENCAP len: %d\n", payload_length); 457 /* any NON-ENCAP */ 458 /* it's a generic 80211+LLC or IPX 'Raw 802.3' */ 459 /* build an 802.3 frame */ 460 /* allocate space and setup hostbuf */ 461 462 /* Test for an overlength frame */ 463 if (payload_length > netdev->mtu) { 464 /* A bogus length ethfrm has been sent. */ 465 /* Is someone trying an oflow attack? */ 466 printk(KERN_ERR "OTHER frame too large (%d > %d)\n", 467 payload_length, netdev->mtu); 468 return 1; 469 } 470 471 /* Chop off the 802.11 header. */ 472 skb_pull(skb, payload_offset); 473 474 /* create 802.3 header at beginning of skb. */ 475 e_hdr = (struct wlan_ethhdr *) skb_push(skb, WLAN_ETHHDR_LEN); 476 memcpy(e_hdr->daddr, daddr, WLAN_ETHADDR_LEN); 477 memcpy(e_hdr->saddr, saddr, WLAN_ETHADDR_LEN); 478 e_hdr->type = htons(payload_length); 479 480 /* chop off the 802.11 CRC */ 481 skb_trim(skb, skb->len - WLAN_CRC_LEN); 482 483 } 484 485 /* 486 * Note that eth_type_trans() expects an skb w/ skb->data pointing 487 * at the MAC header, it then sets the following skb members: 488 * skb->mac_header, 489 * skb->data, and 490 * skb->pkt_type. 491 * It then _returns_ the value that _we're_ supposed to stuff in 492 * skb->protocol. This is nuts. 493 */ 494 skb->protocol = eth_type_trans(skb, netdev); 495 496 /* jkriegl: process signal and noise as set in hfa384x_int_rx() */ 497 /* jkriegl: only process signal/noise if requested by iwspy */ 498 if (wlandev->spy_number) 499 orinoco_spy_gather(wlandev, eth_hdr(skb)->h_source, 500 P80211SKB_RXMETA(skb)); 501 502 /* Free the metadata */ 503 p80211skb_rxmeta_detach(skb); 504 505 return 0; 506} 507 508/*---------------------------------------------------------------- 509* p80211_stt_findproto 510* 511* Searches the 802.1h Selective Translation Table for a given 512* protocol. 513* 514* Arguments: 515* proto protocl number (in host order) to search for. 516* 517* Returns: 518* 1 - if the table is empty or a match is found. 519* 0 - if the table is non-empty and a match is not found. 520* 521* Call context: 522* May be called in interrupt or non-interrupt context 523----------------------------------------------------------------*/ 524int p80211_stt_findproto(u16 proto) 525{ 526 /* Always return found for now. This is the behavior used by the */ 527 /* Zoom Win95 driver when 802.1h mode is selected */ 528 /* TODO: If necessary, add an actual search we'll probably 529 need this to match the CMAC's way of doing things. 530 Need to do some testing to confirm. 531 */ 532 533 if (proto == 0x80f3) /* APPLETALK */ 534 return 1; 535 536 return 0; 537} 538 539/*---------------------------------------------------------------- 540* p80211skb_rxmeta_detach 541* 542* Disconnects the frmmeta and rxmeta from an skb. 543* 544* Arguments: 545* wlandev The wlandev this skb belongs to. 546* skb The skb we're attaching to. 547* 548* Returns: 549* 0 on success, non-zero otherwise 550* 551* Call context: 552* May be called in interrupt or non-interrupt context 553----------------------------------------------------------------*/ 554void p80211skb_rxmeta_detach(struct sk_buff *skb) 555{ 556 struct p80211_rxmeta *rxmeta; 557 struct p80211_frmmeta *frmmeta; 558 559 /* Sanity checks */ 560 if (skb == NULL) { /* bad skb */ 561 pr_debug("Called w/ null skb.\n"); 562 goto exit; 563 } 564 frmmeta = P80211SKB_FRMMETA(skb); 565 if (frmmeta == NULL) { /* no magic */ 566 pr_debug("Called w/ bad frmmeta magic.\n"); 567 goto exit; 568 } 569 rxmeta = frmmeta->rx; 570 if (rxmeta == NULL) { /* bad meta ptr */ 571 pr_debug("Called w/ bad rxmeta ptr.\n"); 572 goto exit; 573 } 574 575 /* Free rxmeta */ 576 kfree(rxmeta); 577 578 /* Clear skb->cb */ 579 memset(skb->cb, 0, sizeof(skb->cb)); 580exit: 581 return; 582} 583 584/*---------------------------------------------------------------- 585* p80211skb_rxmeta_attach 586* 587* Allocates a p80211rxmeta structure, initializes it, and attaches 588* it to an skb. 589* 590* Arguments: 591* wlandev The wlandev this skb belongs to. 592* skb The skb we're attaching to. 593* 594* Returns: 595* 0 on success, non-zero otherwise 596* 597* Call context: 598* May be called in interrupt or non-interrupt context 599----------------------------------------------------------------*/ 600int p80211skb_rxmeta_attach(struct wlandevice *wlandev, struct sk_buff *skb) 601{ 602 int result = 0; 603 struct p80211_rxmeta *rxmeta; 604 struct p80211_frmmeta *frmmeta; 605 606 /* If these already have metadata, we error out! */ 607 if (P80211SKB_RXMETA(skb) != NULL) { 608 printk(KERN_ERR "%s: RXmeta already attached!\n", 609 wlandev->name); 610 result = 0; 611 goto exit; 612 } 613 614 /* Allocate the rxmeta */ 615 rxmeta = kzalloc(sizeof(struct p80211_rxmeta), GFP_ATOMIC); 616 617 if (rxmeta == NULL) { 618 printk(KERN_ERR "%s: Failed to allocate rxmeta.\n", 619 wlandev->name); 620 result = 1; 621 goto exit; 622 } 623 624 /* Initialize the rxmeta */ 625 rxmeta->wlandev = wlandev; 626 rxmeta->hosttime = jiffies; 627 628 /* Overlay a frmmeta_t onto skb->cb */ 629 memset(skb->cb, 0, sizeof(struct p80211_frmmeta)); 630 frmmeta = (struct p80211_frmmeta *) (skb->cb); 631 frmmeta->magic = P80211_FRMMETA_MAGIC; 632 frmmeta->rx = rxmeta; 633exit: 634 return result; 635} 636 637/*---------------------------------------------------------------- 638* p80211skb_free 639* 640* Frees an entire p80211skb by checking and freeing the meta struct 641* and then freeing the skb. 642* 643* Arguments: 644* wlandev The wlandev this skb belongs to. 645* skb The skb we're attaching to. 646* 647* Returns: 648* 0 on success, non-zero otherwise 649* 650* Call context: 651* May be called in interrupt or non-interrupt context 652----------------------------------------------------------------*/ 653void p80211skb_free(struct wlandevice *wlandev, struct sk_buff *skb) 654{ 655 struct p80211_frmmeta *meta; 656 657 meta = P80211SKB_FRMMETA(skb); 658 if (meta && meta->rx) 659 p80211skb_rxmeta_detach(skb); 660 else 661 printk(KERN_ERR "Freeing an skb (%p) w/ no frmmeta.\n", skb); 662 dev_kfree_skb(skb); 663 return; 664}