The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/net80211/ieee80211_acl.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
    3  *
    4  * Copyright (c) 2004-2008 Sam Leffler, Errno Consulting
    5  * All rights reserved.
    6  *
    7  * Redistribution and use in source and binary forms, with or without
    8  * modification, are permitted provided that the following conditions
    9  * are met:
   10  * 1. Redistributions of source code must retain the above copyright
   11  *    notice, this list of conditions and the following disclaimer.
   12  * 2. Redistributions in binary form must reproduce the above copyright
   13  *    notice, this list of conditions and the following disclaimer in the
   14  *    documentation and/or other materials provided with the distribution.
   15  *
   16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
   17  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
   18  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
   19  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
   20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
   21  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
   22  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
   23  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
   24  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
   25  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   26  */
   27 
   28 #include <sys/cdefs.h>
   29 __FBSDID("$FreeBSD$");
   30 
   31 /*
   32  * IEEE 802.11 MAC ACL support.
   33  *
   34  * When this module is loaded the sender address of each auth mgt
   35  * frame is passed to the iac_check method and the module indicates
   36  * if the frame should be accepted or rejected.  If the policy is
   37  * set to ACL_POLICY_OPEN then all frames are accepted w/o checking
   38  * the address.  Otherwise, the address is looked up in the database
   39  * and if found the frame is either accepted (ACL_POLICY_ALLOW)
   40  * or rejected (ACL_POLICY_DENT).
   41  */
   42 #include "opt_wlan.h"
   43 
   44 #include <sys/param.h>
   45 #include <sys/kernel.h>
   46 #include <sys/systm.h> 
   47 #include <sys/malloc.h>   
   48 #include <sys/mbuf.h>   
   49 #include <sys/module.h>
   50 #include <sys/queue.h>
   51 
   52 #include <sys/socket.h>
   53 
   54 #include <net/if.h>
   55 #include <net/if_media.h>
   56 #include <net/ethernet.h>
   57 #include <net/route.h>
   58 
   59 #include <net80211/ieee80211_var.h>
   60 
   61 enum {
   62         ACL_POLICY_OPEN         = 0,    /* open, don't check ACL's */
   63         ACL_POLICY_ALLOW        = 1,    /* allow traffic from MAC */
   64         ACL_POLICY_DENY         = 2,    /* deny traffic from MAC */
   65         /*
   66          * NB: ACL_POLICY_RADIUS must be the same value as
   67          *     IEEE80211_MACCMD_POLICY_RADIUS because of the way
   68          *     acl_getpolicy() works.
   69          */
   70         ACL_POLICY_RADIUS       = 7,    /* defer to RADIUS ACL server */
   71 };
   72 
   73 #define ACL_HASHSIZE    32
   74 
   75 struct acl {
   76         TAILQ_ENTRY(acl)        acl_list;
   77         LIST_ENTRY(acl)         acl_hash;
   78         uint8_t                 acl_macaddr[IEEE80211_ADDR_LEN];
   79 };
   80 struct aclstate {
   81         acl_lock_t              as_lock;
   82         int                     as_policy;
   83         uint32_t                as_nacls;
   84         TAILQ_HEAD(, acl)       as_list;        /* list of all ACL's */
   85         LIST_HEAD(, acl)        as_hash[ACL_HASHSIZE];
   86         struct ieee80211vap     *as_vap;
   87 };
   88 
   89 /* simple hash is enough for variation of macaddr */
   90 #define ACL_HASH(addr)  \
   91         (((const uint8_t *)(addr))[IEEE80211_ADDR_LEN - 1] % ACL_HASHSIZE)
   92 
   93 static MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl");
   94 
   95 static  int acl_free_all(struct ieee80211vap *);
   96 
   97 /* number of references from net80211 layer */
   98 static  int nrefs = 0;
   99 
  100 static int
  101 acl_attach(struct ieee80211vap *vap)
  102 {
  103         struct aclstate *as;
  104 
  105         as = (struct aclstate *) IEEE80211_MALLOC(sizeof(struct aclstate),
  106                 M_80211_ACL, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO);
  107         if (as == NULL)
  108                 return 0;
  109         ACL_LOCK_INIT(as, "acl");
  110         TAILQ_INIT(&as->as_list);
  111         as->as_policy = ACL_POLICY_OPEN;
  112         as->as_vap = vap;
  113         vap->iv_as = as;
  114         nrefs++;                        /* NB: we assume caller locking */
  115         return 1;
  116 }
  117 
  118 static void
  119 acl_detach(struct ieee80211vap *vap)
  120 {
  121         struct aclstate *as = vap->iv_as;
  122 
  123         KASSERT(nrefs > 0, ("imbalanced attach/detach"));
  124         nrefs--;                        /* NB: we assume caller locking */
  125 
  126         acl_free_all(vap);
  127         vap->iv_as = NULL;
  128         ACL_LOCK_DESTROY(as);
  129         IEEE80211_FREE(as, M_80211_ACL);
  130 }
  131 
  132 static __inline struct acl *
  133 _find_acl(struct aclstate *as, const uint8_t *macaddr)
  134 {
  135         struct acl *acl;
  136         int hash;
  137 
  138         hash = ACL_HASH(macaddr);
  139         LIST_FOREACH(acl, &as->as_hash[hash], acl_hash) {
  140                 if (IEEE80211_ADDR_EQ(acl->acl_macaddr, macaddr))
  141                         return acl;
  142         }
  143         return NULL;
  144 }
  145 
  146 static void
  147 _acl_free(struct aclstate *as, struct acl *acl)
  148 {
  149         ACL_LOCK_ASSERT(as);
  150 
  151         TAILQ_REMOVE(&as->as_list, acl, acl_list);
  152         LIST_REMOVE(acl, acl_hash);
  153         IEEE80211_FREE(acl, M_80211_ACL);
  154         as->as_nacls--;
  155 }
  156 
  157 static int
  158 acl_check(struct ieee80211vap *vap, const struct ieee80211_frame *wh)
  159 {
  160         struct aclstate *as = vap->iv_as;
  161 
  162         switch (as->as_policy) {
  163         case ACL_POLICY_OPEN:
  164         case ACL_POLICY_RADIUS:
  165                 return 1;
  166         case ACL_POLICY_ALLOW:
  167                 return _find_acl(as, wh->i_addr2) != NULL;
  168         case ACL_POLICY_DENY:
  169                 return _find_acl(as, wh->i_addr2) == NULL;
  170         }
  171         return 0;               /* should not happen */
  172 }
  173 
  174 static int
  175 acl_add(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN])
  176 {
  177         struct aclstate *as = vap->iv_as;
  178         struct acl *acl, *new;
  179         int hash;
  180 
  181         new = (struct acl *) IEEE80211_MALLOC(sizeof(struct acl),
  182             M_80211_ACL, IEEE80211_M_NOWAIT | IEEE80211_M_ZERO);
  183         if (new == NULL) {
  184                 IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
  185                         "ACL: add %s failed, no memory\n", ether_sprintf(mac));
  186                 /* XXX statistic */
  187                 return ENOMEM;
  188         }
  189 
  190         ACL_LOCK(as);
  191         hash = ACL_HASH(mac);
  192         LIST_FOREACH(acl, &as->as_hash[hash], acl_hash) {
  193                 if (IEEE80211_ADDR_EQ(acl->acl_macaddr, mac)) {
  194                         ACL_UNLOCK(as);
  195                         IEEE80211_FREE(new, M_80211_ACL);
  196                         IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
  197                                 "ACL: add %s failed, already present\n",
  198                                 ether_sprintf(mac));
  199                         return EEXIST;
  200                 }
  201         }
  202         IEEE80211_ADDR_COPY(new->acl_macaddr, mac);
  203         TAILQ_INSERT_TAIL(&as->as_list, new, acl_list);
  204         LIST_INSERT_HEAD(&as->as_hash[hash], new, acl_hash);
  205         as->as_nacls++;
  206         ACL_UNLOCK(as);
  207 
  208         IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
  209                 "ACL: add %s\n", ether_sprintf(mac));
  210         return 0;
  211 }
  212 
  213 static int
  214 acl_remove(struct ieee80211vap *vap, const uint8_t mac[IEEE80211_ADDR_LEN])
  215 {
  216         struct aclstate *as = vap->iv_as;
  217         struct acl *acl;
  218 
  219         ACL_LOCK(as);
  220         acl = _find_acl(as, mac);
  221         if (acl != NULL)
  222                 _acl_free(as, acl);
  223         ACL_UNLOCK(as);
  224 
  225         IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
  226                 "ACL: remove %s%s\n", ether_sprintf(mac),
  227                 acl == NULL ? ", not present" : "");
  228 
  229         return (acl == NULL ? ENOENT : 0);
  230 }
  231 
  232 static int
  233 acl_free_all(struct ieee80211vap *vap)
  234 {
  235         struct aclstate *as = vap->iv_as;
  236         struct acl *acl;
  237 
  238         IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL, "ACL: %s\n", "free all");
  239 
  240         ACL_LOCK(as);
  241         while ((acl = TAILQ_FIRST(&as->as_list)) != NULL)
  242                 _acl_free(as, acl);
  243         ACL_UNLOCK(as);
  244 
  245         return 0;
  246 }
  247 
  248 static int
  249 acl_setpolicy(struct ieee80211vap *vap, int policy)
  250 {
  251         struct aclstate *as = vap->iv_as;
  252 
  253         IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
  254                 "ACL: set policy to %u\n", policy);
  255 
  256         switch (policy) {
  257         case IEEE80211_MACCMD_POLICY_OPEN:
  258                 as->as_policy = ACL_POLICY_OPEN;
  259                 break;
  260         case IEEE80211_MACCMD_POLICY_ALLOW:
  261                 as->as_policy = ACL_POLICY_ALLOW;
  262                 break;
  263         case IEEE80211_MACCMD_POLICY_DENY:
  264                 as->as_policy = ACL_POLICY_DENY;
  265                 break;
  266         case IEEE80211_MACCMD_POLICY_RADIUS:
  267                 as->as_policy = ACL_POLICY_RADIUS;
  268                 break;
  269         default:
  270                 return EINVAL;
  271         }
  272         return 0;
  273 }
  274 
  275 static int
  276 acl_getpolicy(struct ieee80211vap *vap)
  277 {
  278         struct aclstate *as = vap->iv_as;
  279 
  280         return as->as_policy;
  281 }
  282 
  283 static int
  284 acl_setioctl(struct ieee80211vap *vap, struct ieee80211req *ireq)
  285 {
  286 
  287         return EINVAL;
  288 }
  289 
  290 static int
  291 acl_getioctl(struct ieee80211vap *vap, struct ieee80211req *ireq)
  292 {
  293         struct aclstate *as = vap->iv_as;
  294         struct acl *acl;
  295         struct ieee80211req_maclist *ap;
  296         int error;
  297         uint32_t i, space;
  298 
  299         switch (ireq->i_val) {
  300         case IEEE80211_MACCMD_POLICY:
  301                 ireq->i_val = as->as_policy;
  302                 return 0;
  303         case IEEE80211_MACCMD_LIST:
  304                 space = as->as_nacls * IEEE80211_ADDR_LEN;
  305                 if (ireq->i_len == 0) {
  306                         ireq->i_len = space;    /* return required space */
  307                         return 0;               /* NB: must not error */
  308                 }
  309                 ap = (struct ieee80211req_maclist *) IEEE80211_MALLOC(space,
  310                     M_TEMP, IEEE80211_M_NOWAIT);
  311                 if (ap == NULL)
  312                         return ENOMEM;
  313                 i = 0;
  314                 ACL_LOCK(as);
  315                 TAILQ_FOREACH(acl, &as->as_list, acl_list) {
  316                         IEEE80211_ADDR_COPY(ap[i].ml_macaddr, acl->acl_macaddr);
  317                         i++;
  318                 }
  319                 ACL_UNLOCK(as);
  320                 if (ireq->i_len >= space) {
  321                         error = copyout(ap, ireq->i_data, space);
  322                         ireq->i_len = space;
  323                 } else
  324                         error = copyout(ap, ireq->i_data, ireq->i_len);
  325                 IEEE80211_FREE(ap, M_TEMP);
  326                 return error;
  327         }
  328         return EINVAL;
  329 }
  330 
  331 static const struct ieee80211_aclator mac = {
  332         .iac_name       = "mac",
  333         .iac_attach     = acl_attach,
  334         .iac_detach     = acl_detach,
  335         .iac_check      = acl_check,
  336         .iac_add        = acl_add,
  337         .iac_remove     = acl_remove,
  338         .iac_flush      = acl_free_all,
  339         .iac_setpolicy  = acl_setpolicy,
  340         .iac_getpolicy  = acl_getpolicy,
  341         .iac_setioctl   = acl_setioctl,
  342         .iac_getioctl   = acl_getioctl,
  343 };
  344 IEEE80211_ACL_MODULE(wlan_acl, mac, 1);

Cache object: 8dd0c2598415902a6f657b63cf5f1f3e


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.