1 /*
2 * Driver interaction with Linux nl80211/cfg80211
3 * Copyright (c) 2002-2015, Jouni Malinen <j@w1.fi>
4 * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5 * Copyright (c) 2005-2006, Devicescape Software, Inc.
6 * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
7 * Copyright (c) 2009-2010, Atheros Communications
8 *
9 * This software may be distributed under the terms of the BSD license.
10 * See README for more details.
11 */
12
13 #include "includes.h"
14 #include <sys/types.h>
15 #include <fcntl.h>
16 #include <net/if.h>
17 #include <netlink/genl/genl.h>
18 #include <netlink/genl/ctrl.h>
19 #ifdef CONFIG_LIBNL3_ROUTE
20 #include <netlink/route/neighbour.h>
21 #endif /* CONFIG_LIBNL3_ROUTE */
22 #include <linux/rtnetlink.h>
23 #include <netpacket/packet.h>
24 #include <linux/errqueue.h>
25
26 #include "common.h"
27 #include "eloop.h"
28 #include "common/qca-vendor.h"
29 #include "common/qca-vendor-attr.h"
30 #include "common/brcm_vendor.h"
31 #include "common/ieee802_11_defs.h"
32 #include "common/ieee802_11_common.h"
33 #include "common/wpa_common.h"
34 #include "crypto/sha256.h"
35 #include "crypto/sha384.h"
36 #include "netlink.h"
37 #include "linux_defines.h"
38 #include "linux_ioctl.h"
39 #include "radiotap.h"
40 #include "radiotap_iter.h"
41 #include "rfkill.h"
42 #include "driver_nl80211.h"
43 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
44 #include "common/brcm_vendor.h"
45 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
46
47 #ifndef NETLINK_CAP_ACK
48 #define NETLINK_CAP_ACK 10
49 #endif /* NETLINK_CAP_ACK */
50 /* support for extack if compilation headers are too old */
51 #ifndef NETLINK_EXT_ACK
52 #define NETLINK_EXT_ACK 11
53 enum nlmsgerr_attrs {
54 NLMSGERR_ATTR_UNUSED,
55 NLMSGERR_ATTR_MSG,
56 NLMSGERR_ATTR_OFFS,
57 NLMSGERR_ATTR_COOKIE,
58
59 __NLMSGERR_ATTR_MAX,
60 NLMSGERR_ATTR_MAX = __NLMSGERR_ATTR_MAX - 1
61 };
62 #endif
63 #ifndef NLM_F_CAPPED
64 #define NLM_F_CAPPED 0x100
65 #endif
66 #ifndef NLM_F_ACK_TLVS
67 #define NLM_F_ACK_TLVS 0x200
68 #endif
69 #ifndef SOL_NETLINK
70 #define SOL_NETLINK 270
71 #endif
72
73
74 #ifdef ANDROID
75 /* system/core/libnl_2 does not include nl_socket_set_nonblocking() */
76 #undef nl_socket_set_nonblocking
77 #define nl_socket_set_nonblocking(h) android_nl_socket_set_nonblocking(h)
78
79 #endif /* ANDROID */
80
81
nl_create_handle(struct nl_cb * cb,const char * dbg)82 static struct nl_sock * nl_create_handle(struct nl_cb *cb, const char *dbg)
83 {
84 struct nl_sock *handle;
85
86 handle = nl_socket_alloc_cb(cb);
87 if (handle == NULL) {
88 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
89 "callbacks (%s)", dbg);
90 return NULL;
91 }
92
93 if (genl_connect(handle)) {
94 wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
95 "netlink (%s)", dbg);
96 nl_socket_free(handle);
97 return NULL;
98 }
99
100 return handle;
101 }
102
103
nl_destroy_handles(struct nl_sock ** handle)104 static void nl_destroy_handles(struct nl_sock **handle)
105 {
106 if (*handle == NULL)
107 return;
108 nl_socket_free(*handle);
109 *handle = NULL;
110 }
111
112
113 #if __WORDSIZE == 64
114 #define ELOOP_SOCKET_INVALID (intptr_t) 0x8888888888888889ULL
115 #else
116 #define ELOOP_SOCKET_INVALID (intptr_t) 0x88888889ULL
117 #endif
118
nl80211_register_eloop_read(struct nl_sock ** handle,eloop_sock_handler handler,void * eloop_data,int persist)119 static void nl80211_register_eloop_read(struct nl_sock **handle,
120 eloop_sock_handler handler,
121 void *eloop_data, int persist)
122 {
123 /*
124 * libnl uses a pretty small buffer (32 kB that gets converted to 64 kB)
125 * by default. It is possible to hit that limit in some cases where
126 * operations are blocked, e.g., with a burst of Deauthentication frames
127 * to hostapd and STA entry deletion. Try to increase the buffer to make
128 * this less likely to occur.
129 */
130 int err;
131
132 err = nl_socket_set_buffer_size(*handle, 262144, 0);
133 if (err < 0) {
134 wpa_printf(MSG_DEBUG,
135 "nl80211: Could not set nl_socket RX buffer size: %s",
136 nl_geterror(err));
137 /* continue anyway with the default (smaller) buffer */
138 }
139
140 nl_socket_set_nonblocking(*handle);
141 eloop_register_read_sock(nl_socket_get_fd(*handle), handler,
142 eloop_data, *handle);
143 if (!persist)
144 *handle = (void *) (((intptr_t) *handle) ^
145 ELOOP_SOCKET_INVALID);
146 }
147
148
nl80211_destroy_eloop_handle(struct nl_sock ** handle,int persist)149 static void nl80211_destroy_eloop_handle(struct nl_sock **handle, int persist)
150 {
151 if (!persist)
152 *handle = (void *) (((intptr_t) *handle) ^
153 ELOOP_SOCKET_INVALID);
154 eloop_unregister_read_sock(nl_socket_get_fd(*handle));
155 nl_destroy_handles(handle);
156 }
157
158
159 static void nl80211_global_deinit(void *priv);
160 static void nl80211_check_global(struct nl80211_global *global);
161
162 static void wpa_driver_nl80211_deinit(struct i802_bss *bss);
163 static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
164 struct hostapd_freq_params *freq);
165
166 static int
167 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
168 const u8 *set_addr, int first,
169 const char *driver_params);
170 static int nl80211_send_frame_cmd(struct i802_bss *bss,
171 unsigned int freq, unsigned int wait,
172 const u8 *buf, size_t buf_len,
173 int save_cookie,
174 int no_cck, int no_ack, int offchanok,
175 const u16 *csa_offs, size_t csa_offs_len);
176 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss,
177 int report);
178 static int nl80211_put_freq_params(struct nl_msg *msg,
179 const struct hostapd_freq_params *freq);
180
181 #define IFIDX_ANY -1
182
183 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
184 int ifidx_reason);
185 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
186 int ifidx_reason);
187 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
188 int ifidx_reason);
189
190 static int nl80211_set_channel(struct i802_bss *bss,
191 struct hostapd_freq_params *freq, int set_chan);
192 static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
193 int ifindex, int disabled);
194
195 static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
196 int reset_mode);
197
198 static int i802_set_iface_flags(struct i802_bss *bss, int up);
199 static int nl80211_set_param(void *priv, const char *param);
200 #ifdef CONFIG_MESH
201 static int nl80211_put_mesh_config(struct nl_msg *msg,
202 struct wpa_driver_mesh_bss_params *params);
203 #endif /* CONFIG_MESH */
204 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
205 u16 reason);
206 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
207 static int nl80211_set_td_policy(void *priv, u32 td_policy);
208 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
209
210 /* Converts nl80211_chan_width to a common format */
convert2width(int width)211 enum chan_width convert2width(int width)
212 {
213 switch (width) {
214 case NL80211_CHAN_WIDTH_20_NOHT:
215 return CHAN_WIDTH_20_NOHT;
216 case NL80211_CHAN_WIDTH_20:
217 return CHAN_WIDTH_20;
218 case NL80211_CHAN_WIDTH_40:
219 return CHAN_WIDTH_40;
220 case NL80211_CHAN_WIDTH_80:
221 return CHAN_WIDTH_80;
222 case NL80211_CHAN_WIDTH_80P80:
223 return CHAN_WIDTH_80P80;
224 case NL80211_CHAN_WIDTH_160:
225 return CHAN_WIDTH_160;
226 case NL80211_CHAN_WIDTH_320:
227 return CHAN_WIDTH_320;
228 default:
229 return CHAN_WIDTH_UNKNOWN;
230 }
231 }
232
233
is_ap_interface(enum nl80211_iftype nlmode)234 int is_ap_interface(enum nl80211_iftype nlmode)
235 {
236 return nlmode == NL80211_IFTYPE_AP ||
237 nlmode == NL80211_IFTYPE_P2P_GO;
238 }
239
240
is_sta_interface(enum nl80211_iftype nlmode)241 int is_sta_interface(enum nl80211_iftype nlmode)
242 {
243 return nlmode == NL80211_IFTYPE_STATION ||
244 nlmode == NL80211_IFTYPE_P2P_CLIENT;
245 }
246
247
is_p2p_net_interface(enum nl80211_iftype nlmode)248 static int is_p2p_net_interface(enum nl80211_iftype nlmode)
249 {
250 return nlmode == NL80211_IFTYPE_P2P_CLIENT ||
251 nlmode == NL80211_IFTYPE_P2P_GO;
252 }
253
254
get_bss_ifindex(struct wpa_driver_nl80211_data * drv,int ifindex)255 struct i802_bss * get_bss_ifindex(struct wpa_driver_nl80211_data *drv,
256 int ifindex)
257 {
258 struct i802_bss *bss;
259
260 for (bss = drv->first_bss; bss; bss = bss->next) {
261 if (bss->ifindex == ifindex)
262 return bss;
263 }
264
265 return NULL;
266 }
267
268
is_mesh_interface(enum nl80211_iftype nlmode)269 static int is_mesh_interface(enum nl80211_iftype nlmode)
270 {
271 return nlmode == NL80211_IFTYPE_MESH_POINT;
272 }
273
274
nl80211_mark_disconnected(struct wpa_driver_nl80211_data * drv)275 void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv)
276 {
277 if (drv->associated)
278 os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
279 drv->associated = 0;
280 os_memset(&drv->sta_mlo_info, 0, sizeof(drv->sta_mlo_info));
281 os_memset(drv->bssid, 0, ETH_ALEN);
282 drv->first_bss->flink->freq = 0;
283 #ifdef CONFIG_DRIVER_NL80211_QCA
284 os_free(drv->pending_roam_data);
285 drv->pending_roam_data = NULL;
286 os_free(drv->pending_t2lm_data);
287 drv->pending_t2lm_data = NULL;
288 os_free(drv->pending_link_reconfig_data);
289 drv->pending_link_reconfig_data = NULL;
290 #endif /* CONFIG_DRIVER_NL80211_QCA */
291
292 drv->auth_mld = false;
293 drv->auth_mld_link_id = -1;
294 os_memset(drv->auth_ap_mld_addr, 0, ETH_ALEN);
295 }
296
297
298 /* nl80211 code */
ack_handler(struct nl_msg * msg,void * arg)299 static int ack_handler(struct nl_msg *msg, void *arg)
300 {
301 int *err = arg;
302 *err = 0;
303 return NL_STOP;
304 }
305
306
307 struct nl80211_ack_ext_arg {
308 int *err;
309 void *ext_data;
310 };
311
312
ack_handler_cookie(struct nl_msg * msg,void * arg)313 static int ack_handler_cookie(struct nl_msg *msg, void *arg)
314 {
315 struct nl80211_ack_ext_arg *ext_arg = arg;
316 struct nlattr *tb[NLMSGERR_ATTR_MAX + 1];
317 u64 *cookie = ext_arg->ext_data;
318 struct nlattr *attrs;
319 size_t ack_len, attr_len;
320
321 *ext_arg->err = 0;
322 ack_len = sizeof(struct nlmsghdr) + sizeof(int) +
323 sizeof(struct nlmsghdr);
324 attrs = (struct nlattr *)
325 ((u8 *) nlmsg_data(nlmsg_hdr(msg)) + sizeof(struct nlmsghdr) +
326 sizeof(int));
327 if (nlmsg_hdr(msg)->nlmsg_len <= ack_len)
328 return NL_STOP;
329
330 attr_len = nlmsg_hdr(msg)->nlmsg_len - ack_len;
331
332 if(!(nlmsg_hdr(msg)->nlmsg_flags & NLM_F_ACK_TLVS))
333 return NL_STOP;
334
335 nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, attr_len, NULL);
336 if (tb[NLMSGERR_ATTR_COOKIE])
337 *cookie = nla_get_u64(tb[NLMSGERR_ATTR_COOKIE]);
338
339 return NL_STOP;
340 }
341
342
finish_handler(struct nl_msg * msg,void * arg)343 static int finish_handler(struct nl_msg *msg, void *arg)
344 {
345 int *ret = arg;
346 *ret = 0;
347 return NL_SKIP;
348 }
349
error_handler(struct sockaddr_nl * nla,struct nlmsgerr * err,void * arg)350 static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
351 void *arg)
352 {
353 struct nlmsghdr *nlh = (struct nlmsghdr *) err - 1;
354 int len = nlh->nlmsg_len;
355 struct nlattr *attrs;
356 struct nlattr *tb[NLMSGERR_ATTR_MAX + 1];
357 int *ret = arg;
358 int ack_len = sizeof(*nlh) + sizeof(int) + sizeof(*nlh);
359
360 *ret = err->error;
361
362 if (!(nlh->nlmsg_flags & NLM_F_ACK_TLVS))
363 return NL_SKIP;
364
365 if (!(nlh->nlmsg_flags & NLM_F_CAPPED))
366 ack_len += err->msg.nlmsg_len - sizeof(*nlh);
367
368 if (len <= ack_len)
369 return NL_STOP;
370
371 attrs = (void *) ((unsigned char *) nlh + ack_len);
372 len -= ack_len;
373
374 nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, len, NULL);
375 if (tb[NLMSGERR_ATTR_MSG]) {
376 len = strnlen((char *) nla_data(tb[NLMSGERR_ATTR_MSG]),
377 nla_len(tb[NLMSGERR_ATTR_MSG]));
378 wpa_printf(MSG_ERROR, "nl80211: kernel reports: %*s",
379 len, (char *) nla_data(tb[NLMSGERR_ATTR_MSG]));
380 }
381
382 return NL_SKIP;
383 }
384
385
no_seq_check(struct nl_msg * msg,void * arg)386 static int no_seq_check(struct nl_msg *msg, void *arg)
387 {
388 return NL_OK;
389 }
390
391
nl80211_nlmsg_clear(struct nl_msg * msg)392 static void nl80211_nlmsg_clear(struct nl_msg *msg)
393 {
394 /*
395 * Clear nlmsg data, e.g., to make sure key material is not left in
396 * heap memory for unnecessarily long time.
397 */
398 if (msg) {
399 struct nlmsghdr *hdr = nlmsg_hdr(msg);
400 void *data = nlmsg_data(hdr);
401 /*
402 * This would use nlmsg_datalen() or the older nlmsg_len() if
403 * only libnl were to maintain a stable API.. Neither will work
404 * with all released versions, so just calculate the length
405 * here.
406 */
407 int len = hdr->nlmsg_len - NLMSG_HDRLEN;
408
409 os_memset(data, 0, len);
410 }
411 }
412
413
send_and_recv(struct nl80211_global * global,struct nl_sock * nl_handle,struct nl_msg * msg,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)414 static int send_and_recv(struct nl80211_global *global,
415 struct nl_sock *nl_handle, struct nl_msg *msg,
416 int (*valid_handler)(struct nl_msg *, void *),
417 void *valid_data,
418 int (*ack_handler_custom)(struct nl_msg *, void *),
419 void *ack_data)
420 {
421 struct nl_cb *cb;
422 int err = -ENOMEM, opt;
423
424 if (!msg)
425 return -ENOMEM;
426
427 cb = nl_cb_clone(global->nl_cb);
428 if (!cb)
429 goto out;
430
431 /* try to set NETLINK_EXT_ACK to 1, ignoring errors */
432 opt = 1;
433 setsockopt(nl_socket_get_fd(nl_handle), SOL_NETLINK,
434 NETLINK_EXT_ACK, &opt, sizeof(opt));
435
436 /* try to set NETLINK_CAP_ACK to 1, ignoring errors */
437 opt = 1;
438 setsockopt(nl_socket_get_fd(nl_handle), SOL_NETLINK,
439 NETLINK_CAP_ACK, &opt, sizeof(opt));
440
441 err = nl_send_auto_complete(nl_handle, msg);
442 if (err < 0) {
443 wpa_printf(MSG_INFO,
444 "nl80211: nl_send_auto_complete() failed: %s",
445 nl_geterror(err));
446 /* Need to convert libnl error code to an errno value. For now,
447 * just hardcode this to EBADF; the real error reason is shown
448 * in that error print above. */
449 err = -EBADF;
450 goto out;
451 }
452
453 err = 1;
454
455 nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
456 nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
457 if (ack_handler_custom) {
458 struct nl80211_ack_ext_arg *ext_arg = ack_data;
459
460 ext_arg->err = &err;
461 nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM,
462 ack_handler_custom, ack_data);
463 } else {
464 nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
465 }
466
467 if (valid_handler)
468 nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
469 valid_handler, valid_data);
470
471 while (err > 0) {
472 int res = nl_recvmsgs(nl_handle, cb);
473
474 if (res == -NLE_DUMP_INTR) {
475 /* Most likely one of the nl80211 dump routines hit a
476 * case where internal results changed while the dump
477 * was being sent. The most common known case for this
478 * is scan results fetching while associated were every
479 * received Beacon frame from the AP may end up
480 * incrementing bss_generation. This
481 * NL80211_CMD_GET_SCAN case tries again in the caller;
482 * other cases (of which there are no known common ones)
483 * will stop and return an error. */
484 wpa_printf(MSG_DEBUG, "nl80211: %s; convert to -EAGAIN",
485 nl_geterror(res));
486 err = -EAGAIN;
487 } else if (res < 0) {
488 wpa_printf(MSG_INFO,
489 "nl80211: %s->nl_recvmsgs failed: %d (%s)",
490 __func__, res, nl_geterror(res));
491 }
492 }
493 out:
494 nl_cb_put(cb);
495 /* Always clear the message as it can potentially contain keys */
496 nl80211_nlmsg_clear(msg);
497 nlmsg_free(msg);
498 return err;
499 }
500
501
send_and_recv_msgs(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)502 int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
503 struct nl_msg *msg,
504 int (*valid_handler)(struct nl_msg *, void *),
505 void *valid_data,
506 int (*ack_handler_custom)(struct nl_msg *, void *),
507 void *ack_data)
508 {
509 return send_and_recv(drv->global, drv->global->nl, msg,
510 valid_handler, valid_data,
511 ack_handler_custom, ack_data);
512 }
513
514
515 /* Use this method to mark that it is necessary to own the connection/interface
516 * for this operation.
517 * handle may be set to NULL, to get the same behavior as send_and_recv_msgs().
518 * set_owner can be used to mark this socket for receiving control port frames.
519 */
send_and_recv_msgs_owner(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,struct nl_sock * handle,int set_owner,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)520 static int send_and_recv_msgs_owner(struct wpa_driver_nl80211_data *drv,
521 struct nl_msg *msg,
522 struct nl_sock *handle, int set_owner,
523 int (*valid_handler)(struct nl_msg *,
524 void *),
525 void *valid_data,
526 int (*ack_handler_custom)(struct nl_msg *,
527 void *),
528 void *ack_data)
529 {
530 if (!msg)
531 return -ENOMEM;
532
533 /* Control port over nl80211 needs the flags and attributes below.
534 *
535 * The Linux kernel has initial checks for them (in nl80211.c) like:
536 * validate_pae_over_nl80211(...)
537 * or final checks like:
538 * dev->ieee80211_ptr->conn_owner_nlportid != info->snd_portid
539 *
540 * Final operations (e.g., disassociate) don't need to set these
541 * attributes, but they have to be performed on the socket, which has
542 * the connection owner property set in the kernel.
543 */
544 if ((drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) &&
545 handle && set_owner &&
546 (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_OVER_NL80211) ||
547 nla_put_flag(msg, NL80211_ATTR_SOCKET_OWNER) ||
548 nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
549 nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_PREAUTH)))
550 return -1;
551
552 return send_and_recv(drv->global, handle ? handle : drv->global->nl,
553 msg, valid_handler, valid_data,
554 ack_handler_custom, ack_data);
555 }
556
557
558 static int
send_and_recv_msgs_connect_handle(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,struct i802_bss * bss,int set_owner)559 send_and_recv_msgs_connect_handle(struct wpa_driver_nl80211_data *drv,
560 struct nl_msg *msg, struct i802_bss *bss,
561 int set_owner)
562 {
563 struct nl_sock *nl_connect = get_connect_handle(bss);
564
565 if (nl_connect)
566 return send_and_recv_msgs_owner(drv, msg, nl_connect, set_owner,
567 process_bss_event, bss, NULL,
568 NULL);
569 else
570 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
571 }
572
573
get_connect_handle(struct i802_bss * bss)574 struct nl_sock * get_connect_handle(struct i802_bss *bss)
575 {
576 if ((bss->drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) ||
577 bss->use_nl_connect)
578 return bss->nl_connect;
579
580 return NULL;
581 }
582
583
584 struct family_data {
585 const char *group;
586 int id;
587 };
588
589
family_handler(struct nl_msg * msg,void * arg)590 static int family_handler(struct nl_msg *msg, void *arg)
591 {
592 struct family_data *res = arg;
593 struct nlattr *tb[CTRL_ATTR_MAX + 1];
594 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
595 struct nlattr *mcgrp;
596 int i;
597
598 nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
599 genlmsg_attrlen(gnlh, 0), NULL);
600 if (!tb[CTRL_ATTR_MCAST_GROUPS])
601 return NL_SKIP;
602
603 nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
604 struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
605 nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
606 nla_len(mcgrp), NULL);
607 if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
608 !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
609 os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
610 res->group,
611 nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
612 continue;
613 res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
614 break;
615 };
616
617 return NL_SKIP;
618 }
619
620
nl_get_multicast_id(struct nl80211_global * global,const char * family,const char * group)621 static int nl_get_multicast_id(struct nl80211_global *global,
622 const char *family, const char *group)
623 {
624 struct nl_msg *msg;
625 int ret;
626 struct family_data res = { group, -ENOENT };
627
628 msg = nlmsg_alloc();
629 if (!msg)
630 return -ENOMEM;
631 if (!genlmsg_put(msg, 0, 0, global->nlctrl_id,
632 0, 0, CTRL_CMD_GETFAMILY, 0) ||
633 nla_put_string(msg, CTRL_ATTR_FAMILY_NAME, family)) {
634 nlmsg_free(msg);
635 return -1;
636 }
637
638 ret = send_and_recv(global, global->nl, msg, family_handler, &res,
639 NULL, NULL);
640 if (ret == 0)
641 ret = res.id;
642 return ret;
643 }
644
645
nl80211_cmd(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int flags,uint8_t cmd)646 void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
647 struct nl_msg *msg, int flags, uint8_t cmd)
648 {
649 if (TEST_FAIL())
650 return NULL;
651 return genlmsg_put(msg, 0, 0, drv->global->nl80211_id,
652 0, flags, cmd, 0);
653 }
654
655
nl80211_set_iface_id(struct nl_msg * msg,struct i802_bss * bss)656 static int nl80211_set_iface_id(struct nl_msg *msg, struct i802_bss *bss)
657 {
658 if (bss->wdev_id_set)
659 return nla_put_u64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
660 return nla_put_u32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
661 }
662
663
nl80211_cmd_msg(struct i802_bss * bss,int flags,uint8_t cmd)664 struct nl_msg * nl80211_cmd_msg(struct i802_bss *bss, int flags, uint8_t cmd)
665 {
666 struct nl_msg *msg;
667
668 msg = nlmsg_alloc();
669 if (!msg)
670 return NULL;
671
672 if (!nl80211_cmd(bss->drv, msg, flags, cmd) ||
673 nl80211_set_iface_id(msg, bss) < 0) {
674 nlmsg_free(msg);
675 return NULL;
676 }
677
678 return msg;
679 }
680
681
682 static struct nl_msg *
nl80211_ifindex_msg_build(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int ifindex,int flags,uint8_t cmd)683 nl80211_ifindex_msg_build(struct wpa_driver_nl80211_data *drv,
684 struct nl_msg *msg, int ifindex, int flags,
685 uint8_t cmd)
686 {
687 if (!msg)
688 return NULL;
689
690 if (!nl80211_cmd(drv, msg, flags, cmd) ||
691 nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex)) {
692 nlmsg_free(msg);
693 return NULL;
694 }
695
696 return msg;
697 }
698
699
700 static struct nl_msg *
nl80211_ifindex_msg(struct wpa_driver_nl80211_data * drv,int ifindex,int flags,uint8_t cmd)701 nl80211_ifindex_msg(struct wpa_driver_nl80211_data *drv, int ifindex,
702 int flags, uint8_t cmd)
703 {
704 return nl80211_ifindex_msg_build(drv, nlmsg_alloc(), ifindex, flags,
705 cmd);
706 }
707
708
nl80211_drv_msg(struct wpa_driver_nl80211_data * drv,int flags,uint8_t cmd)709 struct nl_msg * nl80211_drv_msg(struct wpa_driver_nl80211_data *drv, int flags,
710 uint8_t cmd)
711 {
712 return nl80211_ifindex_msg(drv, drv->ifindex, flags, cmd);
713 }
714
715
nl80211_bss_msg(struct i802_bss * bss,int flags,uint8_t cmd)716 struct nl_msg * nl80211_bss_msg(struct i802_bss *bss, int flags, uint8_t cmd)
717 {
718 return nl80211_ifindex_msg(bss->drv, bss->ifindex, flags, cmd);
719 }
720
721
722 struct wiphy_idx_data {
723 int wiphy_idx;
724 enum nl80211_iftype nlmode;
725 u8 *macaddr;
726 u8 use_4addr;
727 };
728
729
netdev_info_handler(struct nl_msg * msg,void * arg)730 static int netdev_info_handler(struct nl_msg *msg, void *arg)
731 {
732 struct nlattr *tb[NL80211_ATTR_MAX + 1];
733 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
734 struct wiphy_idx_data *info = arg;
735
736 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
737 genlmsg_attrlen(gnlh, 0), NULL);
738
739 if (tb[NL80211_ATTR_WIPHY])
740 info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
741
742 if (tb[NL80211_ATTR_IFTYPE])
743 info->nlmode = nla_get_u32(tb[NL80211_ATTR_IFTYPE]);
744
745 if (tb[NL80211_ATTR_MAC] && info->macaddr)
746 os_memcpy(info->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
747 ETH_ALEN);
748
749 if (tb[NL80211_ATTR_4ADDR])
750 info->use_4addr = nla_get_u8(tb[NL80211_ATTR_4ADDR]);
751
752 return NL_SKIP;
753 }
754
755
nl80211_get_wiphy_index(struct i802_bss * bss)756 int nl80211_get_wiphy_index(struct i802_bss *bss)
757 {
758 struct nl_msg *msg;
759 struct wiphy_idx_data data = {
760 .wiphy_idx = -1,
761 .macaddr = NULL,
762 };
763
764 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
765 return -1;
766
767 if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
768 NULL, NULL) == 0)
769 return data.wiphy_idx;
770 return -1;
771 }
772
773
nl80211_get_ifmode(struct i802_bss * bss)774 static enum nl80211_iftype nl80211_get_ifmode(struct i802_bss *bss)
775 {
776 struct nl_msg *msg;
777 struct wiphy_idx_data data = {
778 .nlmode = NL80211_IFTYPE_UNSPECIFIED,
779 .macaddr = NULL,
780 };
781
782 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
783 return NL80211_IFTYPE_UNSPECIFIED;
784
785 if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
786 NULL, NULL) == 0)
787 return data.nlmode;
788 return NL80211_IFTYPE_UNSPECIFIED;
789 }
790
791
nl80211_get_macaddr(struct i802_bss * bss)792 static int nl80211_get_macaddr(struct i802_bss *bss)
793 {
794 struct nl_msg *msg;
795 struct wiphy_idx_data data = {
796 .macaddr = bss->addr,
797 };
798
799 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
800 return -1;
801
802 return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
803 NULL, NULL);
804 }
805
806
nl80211_get_4addr(struct i802_bss * bss)807 static int nl80211_get_4addr(struct i802_bss *bss)
808 {
809 struct nl_msg *msg;
810 struct wiphy_idx_data data = {
811 .use_4addr = 0,
812 };
813
814 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)) ||
815 send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
816 NULL, NULL))
817 return -1;
818 return data.use_4addr;
819 }
820
821
nl80211_register_beacons(struct wpa_driver_nl80211_data * drv,struct nl80211_wiphy_data * w)822 static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv,
823 struct nl80211_wiphy_data *w)
824 {
825 struct nl_msg *msg;
826 int ret;
827
828 msg = nlmsg_alloc();
829 if (!msg)
830 return -1;
831
832 if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS) ||
833 nla_put_u32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx)) {
834 nlmsg_free(msg);
835 return -1;
836 }
837
838 ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL,
839 NULL, NULL);
840 if (ret) {
841 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
842 "failed: ret=%d (%s)",
843 ret, strerror(-ret));
844 }
845 return ret;
846 }
847
848
nl80211_recv_beacons(int sock,void * eloop_ctx,void * handle)849 static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle)
850 {
851 struct nl80211_wiphy_data *w = eloop_ctx;
852 int res;
853
854 wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
855
856 res = nl_recvmsgs(handle, w->nl_cb);
857 if (res < 0) {
858 wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
859 __func__, res);
860 }
861 }
862
863
process_beacon_event(struct nl_msg * msg,void * arg)864 static int process_beacon_event(struct nl_msg *msg, void *arg)
865 {
866 struct nl80211_wiphy_data *w = arg;
867 struct wpa_driver_nl80211_data *drv;
868 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
869 struct nlattr *tb[NL80211_ATTR_MAX + 1];
870 union wpa_event_data event;
871
872 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
873 genlmsg_attrlen(gnlh, 0), NULL);
874
875 if (gnlh->cmd != NL80211_CMD_FRAME) {
876 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
877 gnlh->cmd);
878 return NL_SKIP;
879 }
880
881 if (!tb[NL80211_ATTR_FRAME])
882 return NL_SKIP;
883
884 dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data,
885 wiphy_list) {
886 os_memset(&event, 0, sizeof(event));
887 event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]);
888 event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]);
889 wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
890 }
891
892 return NL_SKIP;
893 }
894
895
896 static struct nl80211_wiphy_data *
nl80211_get_wiphy_data_ap(struct i802_bss * bss)897 nl80211_get_wiphy_data_ap(struct i802_bss *bss)
898 {
899 static DEFINE_DL_LIST(nl80211_wiphys);
900 struct nl80211_wiphy_data *w;
901 int wiphy_idx, found = 0;
902 struct i802_bss *tmp_bss;
903 u8 channel;
904
905 if (bss->wiphy_data != NULL)
906 return bss->wiphy_data;
907
908 wiphy_idx = nl80211_get_wiphy_index(bss);
909
910 dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) {
911 if (w->wiphy_idx == wiphy_idx)
912 goto add;
913 }
914
915 /* alloc new one */
916 w = os_zalloc(sizeof(*w));
917 if (w == NULL)
918 return NULL;
919 w->wiphy_idx = wiphy_idx;
920 dl_list_init(&w->bsss);
921 dl_list_init(&w->drvs);
922
923 /* Beacon frames not supported in IEEE 802.11ad */
924 if (ieee80211_freq_to_chan(bss->flink->freq, &channel) !=
925 HOSTAPD_MODE_IEEE80211AD) {
926 w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
927 if (!w->nl_cb) {
928 os_free(w);
929 return NULL;
930 }
931 nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
932 no_seq_check, NULL);
933 nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
934 process_beacon_event, w);
935
936 w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb,
937 "wiphy beacons");
938 if (w->nl_beacons == NULL) {
939 os_free(w);
940 return NULL;
941 }
942
943 if (nl80211_register_beacons(bss->drv, w)) {
944 nl_destroy_handles(&w->nl_beacons);
945 os_free(w);
946 return NULL;
947 }
948
949 nl80211_register_eloop_read(&w->nl_beacons,
950 nl80211_recv_beacons, w, 0);
951 }
952
953 dl_list_add(&nl80211_wiphys, &w->list);
954
955 add:
956 /* drv entry for this bss already there? */
957 dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
958 if (tmp_bss->drv == bss->drv) {
959 found = 1;
960 break;
961 }
962 }
963 /* if not add it */
964 if (!found)
965 dl_list_add(&w->drvs, &bss->drv->wiphy_list);
966
967 dl_list_add(&w->bsss, &bss->wiphy_list);
968 bss->wiphy_data = w;
969 return w;
970 }
971
972
nl80211_put_wiphy_data_ap(struct i802_bss * bss)973 static void nl80211_put_wiphy_data_ap(struct i802_bss *bss)
974 {
975 struct nl80211_wiphy_data *w = bss->wiphy_data;
976 struct i802_bss *tmp_bss;
977 int found = 0;
978
979 if (w == NULL)
980 return;
981 bss->wiphy_data = NULL;
982 dl_list_del(&bss->wiphy_list);
983
984 /* still any for this drv present? */
985 dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
986 if (tmp_bss->drv == bss->drv) {
987 found = 1;
988 break;
989 }
990 }
991 /* if not remove it */
992 if (!found)
993 dl_list_del(&bss->drv->wiphy_list);
994
995 if (!dl_list_empty(&w->bsss))
996 return;
997
998 if (w->nl_beacons)
999 nl80211_destroy_eloop_handle(&w->nl_beacons, 0);
1000
1001 nl_cb_put(w->nl_cb);
1002 dl_list_del(&w->list);
1003 os_free(w);
1004 }
1005
1006
nl80211_get_ifindex(void * priv)1007 static unsigned int nl80211_get_ifindex(void *priv)
1008 {
1009 struct i802_bss *bss = priv;
1010 struct wpa_driver_nl80211_data *drv = bss->drv;
1011
1012 return drv->ifindex;
1013 }
1014
1015
wpa_driver_nl80211_get_bssid(void * priv,u8 * bssid)1016 static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
1017 {
1018 struct i802_bss *bss = priv;
1019 struct wpa_driver_nl80211_data *drv = bss->drv;
1020 if (!drv->associated)
1021 return -1;
1022 os_memcpy(bssid, drv->bssid, ETH_ALEN);
1023 return 0;
1024 }
1025
1026
wpa_driver_nl80211_get_ssid(void * priv,u8 * ssid)1027 static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
1028 {
1029 struct i802_bss *bss = priv;
1030 struct wpa_driver_nl80211_data *drv = bss->drv;
1031 if (!drv->associated)
1032 return -1;
1033 os_memcpy(ssid, drv->ssid, drv->ssid_len);
1034 return drv->ssid_len;
1035 }
1036
1037
get_mlo_info(struct nl_msg * msg,void * arg)1038 static int get_mlo_info(struct nl_msg *msg, void *arg)
1039 {
1040 struct nlattr *tb[NL80211_ATTR_MAX + 1];
1041 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1042 struct nlattr *link_attr, *link_data[NL80211_ATTR_MAX + 1];
1043 static struct nla_policy link_policy[NL80211_ATTR_MAX + 1] = {
1044 [NL80211_ATTR_MLO_LINK_ID] = { .type = NLA_U8 },
1045 [NL80211_ATTR_MAC] = { .minlen = ETH_ALEN, .maxlen = ETH_ALEN },
1046 };
1047 struct driver_sta_mlo_info *info = arg;
1048 int rem;
1049
1050 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1051 genlmsg_attrlen(gnlh, 0), NULL);
1052
1053 if (!tb[NL80211_ATTR_MLO_LINKS])
1054 return NL_SKIP;
1055
1056 info->valid_links = 0;
1057 nla_for_each_nested(link_attr, tb[NL80211_ATTR_MLO_LINKS], rem) {
1058 u8 link_id;
1059
1060 if (nla_parse_nested(link_data, NL80211_ATTR_MAX,
1061 link_attr, link_policy) != 0)
1062 continue;
1063
1064 if (!link_data[NL80211_ATTR_MLO_LINK_ID] ||
1065 !link_data[NL80211_ATTR_MAC])
1066 continue;
1067
1068 link_id = nla_get_u8(link_data[NL80211_ATTR_MLO_LINK_ID]);
1069 if (link_id >= MAX_NUM_MLD_LINKS)
1070 continue;
1071 info->valid_links |= BIT(link_id);
1072 os_memcpy(info->links[link_id].addr,
1073 nla_data(link_data[NL80211_ATTR_MAC]), ETH_ALEN);
1074 if (link_data[NL80211_ATTR_WIPHY_FREQ])
1075 info->links[link_id].freq =
1076 nla_get_u32(link_data[NL80211_ATTR_WIPHY_FREQ]);
1077 }
1078
1079 return NL_SKIP;
1080 }
1081
1082
nl80211_get_sta_mlo_info(void * priv,struct driver_sta_mlo_info * mlo_info)1083 static int nl80211_get_sta_mlo_info(void *priv,
1084 struct driver_sta_mlo_info *mlo_info)
1085 {
1086 struct i802_bss *bss = priv;
1087 struct wpa_driver_nl80211_data *drv = bss->drv;
1088
1089 if (!drv->associated)
1090 return -1;
1091
1092 if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
1093 struct nl_msg *msg;
1094
1095 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
1096 if (send_and_recv_msgs(drv, msg, get_mlo_info,
1097 &drv->sta_mlo_info, NULL, NULL))
1098 return -1;
1099 }
1100
1101 os_memcpy(mlo_info, &drv->sta_mlo_info, sizeof(*mlo_info));
1102 return 0;
1103 }
1104
1105
wpa_driver_nl80211_event_newlink(struct nl80211_global * global,struct wpa_driver_nl80211_data * drv,int ifindex,const char * ifname)1106 static void wpa_driver_nl80211_event_newlink(
1107 struct nl80211_global *global, struct wpa_driver_nl80211_data *drv,
1108 int ifindex, const char *ifname)
1109 {
1110 union wpa_event_data event;
1111
1112 if (drv && os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1113 if (if_nametoindex(drv->first_bss->ifname) == 0) {
1114 wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
1115 drv->first_bss->ifname);
1116 return;
1117 }
1118 if (!drv->if_removed)
1119 return;
1120 wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
1121 drv->first_bss->ifname);
1122 drv->if_removed = 0;
1123 }
1124
1125 os_memset(&event, 0, sizeof(event));
1126 event.interface_status.ifindex = ifindex;
1127 os_strlcpy(event.interface_status.ifname, ifname,
1128 sizeof(event.interface_status.ifname));
1129 event.interface_status.ievent = EVENT_INTERFACE_ADDED;
1130 if (drv)
1131 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1132 else
1133 wpa_supplicant_event_global(global->ctx, EVENT_INTERFACE_STATUS,
1134 &event);
1135 }
1136
1137
wpa_driver_nl80211_event_dellink(struct nl80211_global * global,struct wpa_driver_nl80211_data * drv,int ifindex,const char * ifname)1138 static void wpa_driver_nl80211_event_dellink(
1139 struct nl80211_global *global, struct wpa_driver_nl80211_data *drv,
1140 int ifindex, const char *ifname)
1141 {
1142 union wpa_event_data event;
1143
1144 if (drv && os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1145 if (drv->if_removed) {
1146 wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
1147 ifname);
1148 return;
1149 }
1150 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
1151 ifname);
1152 drv->if_removed = 1;
1153 } else {
1154 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
1155 ifname);
1156 }
1157
1158 os_memset(&event, 0, sizeof(event));
1159 event.interface_status.ifindex = ifindex;
1160 os_strlcpy(event.interface_status.ifname, ifname,
1161 sizeof(event.interface_status.ifname));
1162 event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
1163 if (drv)
1164 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1165 else
1166 wpa_supplicant_event_global(global->ctx, EVENT_INTERFACE_STATUS,
1167 &event);
1168 }
1169
1170
wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data * drv,u8 * buf,size_t len)1171 static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
1172 u8 *buf, size_t len)
1173 {
1174 int attrlen, rta_len;
1175 struct rtattr *attr;
1176
1177 attrlen = len;
1178 attr = (struct rtattr *) buf;
1179
1180 rta_len = RTA_ALIGN(sizeof(struct rtattr));
1181 while (RTA_OK(attr, attrlen)) {
1182 if (attr->rta_type == IFLA_IFNAME) {
1183 if (os_strcmp(((char *) attr) + rta_len,
1184 drv->first_bss->ifname) == 0)
1185 return 1;
1186 else
1187 break;
1188 }
1189 attr = RTA_NEXT(attr, attrlen);
1190 }
1191
1192 return 0;
1193 }
1194
1195
wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data * drv,int ifindex,u8 * buf,size_t len)1196 static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
1197 int ifindex, u8 *buf, size_t len)
1198 {
1199 if (drv->ifindex == ifindex)
1200 return 1;
1201
1202 if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) {
1203 nl80211_check_global(drv->global);
1204 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
1205 "interface");
1206 if (wpa_driver_nl80211_finish_drv_init(drv, NULL, 0, NULL) < 0)
1207 return -1;
1208 return 1;
1209 }
1210
1211 return 0;
1212 }
1213
1214
1215 static struct wpa_driver_nl80211_data *
nl80211_find_drv(struct nl80211_global * global,int idx,u8 * buf,size_t len,int * init_failed)1216 nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len,
1217 int *init_failed)
1218 {
1219 struct wpa_driver_nl80211_data *drv;
1220 int res;
1221
1222 if (init_failed)
1223 *init_failed = 0;
1224 dl_list_for_each(drv, &global->interfaces,
1225 struct wpa_driver_nl80211_data, list) {
1226 res = wpa_driver_nl80211_own_ifindex(drv, idx, buf, len);
1227 if (res < 0) {
1228 wpa_printf(MSG_DEBUG,
1229 "nl80211: Found matching own interface, but failed to complete reinitialization");
1230 if (init_failed)
1231 *init_failed = 1;
1232 return drv;
1233 }
1234 if (res > 0 || have_ifidx(drv, idx, IFIDX_ANY))
1235 return drv;
1236 }
1237 return NULL;
1238 }
1239
1240
nl80211_refresh_mac(struct wpa_driver_nl80211_data * drv,int ifindex,int notify)1241 static void nl80211_refresh_mac(struct wpa_driver_nl80211_data *drv,
1242 int ifindex, int notify)
1243 {
1244 struct i802_bss *bss;
1245 u8 addr[ETH_ALEN];
1246
1247 bss = get_bss_ifindex(drv, ifindex);
1248 if (bss &&
1249 linux_get_ifhwaddr(drv->global->ioctl_sock,
1250 bss->ifname, addr) < 0) {
1251 wpa_printf(MSG_DEBUG,
1252 "nl80211: %s: failed to re-read MAC address",
1253 bss->ifname);
1254 } else if (bss && os_memcmp(addr, bss->addr, ETH_ALEN) != 0) {
1255 wpa_printf(MSG_DEBUG,
1256 "nl80211: Own MAC address on ifindex %d (%s) changed from "
1257 MACSTR " to " MACSTR,
1258 ifindex, bss->ifname,
1259 MAC2STR(bss->addr), MAC2STR(addr));
1260 os_memcpy(bss->prev_addr, bss->addr, ETH_ALEN);
1261 os_memcpy(bss->addr, addr, ETH_ALEN);
1262 if (notify)
1263 wpa_supplicant_event(drv->ctx,
1264 EVENT_INTERFACE_MAC_CHANGED, NULL);
1265 }
1266 }
1267
1268
wpa_driver_nl80211_event_rtm_newlink(void * ctx,struct ifinfomsg * ifi,u8 * buf,size_t len)1269 static void wpa_driver_nl80211_event_rtm_newlink(void *ctx,
1270 struct ifinfomsg *ifi,
1271 u8 *buf, size_t len)
1272 {
1273 struct nl80211_global *global = ctx;
1274 struct wpa_driver_nl80211_data *drv;
1275 int attrlen;
1276 struct rtattr *attr;
1277 u32 brid = 0;
1278 char namebuf[IFNAMSIZ];
1279 char ifname[IFNAMSIZ + 1];
1280 char extra[100], *pos, *end;
1281 int init_failed;
1282
1283 extra[0] = '\0';
1284 pos = extra;
1285 end = pos + sizeof(extra);
1286 ifname[0] = '\0';
1287
1288 attrlen = len;
1289 attr = (struct rtattr *) buf;
1290 while (RTA_OK(attr, attrlen)) {
1291 switch (attr->rta_type) {
1292 case IFLA_IFNAME:
1293 if (RTA_PAYLOAD(attr) > IFNAMSIZ)
1294 break;
1295 os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1296 ifname[RTA_PAYLOAD(attr)] = '\0';
1297 break;
1298 case IFLA_MASTER:
1299 brid = nla_get_u32((struct nlattr *) attr);
1300 pos += os_snprintf(pos, end - pos, " master=%u", brid);
1301 break;
1302 case IFLA_WIRELESS:
1303 pos += os_snprintf(pos, end - pos, " wext");
1304 break;
1305 case IFLA_OPERSTATE:
1306 pos += os_snprintf(pos, end - pos, " operstate=%u",
1307 nla_get_u32((struct nlattr *) attr));
1308 break;
1309 case IFLA_LINKMODE:
1310 pos += os_snprintf(pos, end - pos, " linkmode=%u",
1311 nla_get_u32((struct nlattr *) attr));
1312 break;
1313 }
1314 attr = RTA_NEXT(attr, attrlen);
1315 }
1316 extra[sizeof(extra) - 1] = '\0';
1317
1318 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1319 ifi->ifi_index, ifname, extra, ifi->ifi_family,
1320 ifi->ifi_flags,
1321 (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1322 (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1323 (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1324 (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1325
1326 drv = nl80211_find_drv(global, ifi->ifi_index, buf, len, &init_failed);
1327 if (!drv)
1328 goto event_newlink;
1329 if (init_failed)
1330 return; /* do not update interface state */
1331
1332 if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) {
1333 namebuf[0] = '\0';
1334 if (if_indextoname(ifi->ifi_index, namebuf) &&
1335 linux_iface_up(drv->global->ioctl_sock, namebuf) > 0) {
1336 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1337 "event since interface %s is up", namebuf);
1338 drv->ignore_if_down_event = 0;
1339 /* Re-read MAC address as it may have changed */
1340 nl80211_refresh_mac(drv, ifi->ifi_index, 1);
1341 return;
1342 }
1343 wpa_printf(MSG_DEBUG, "nl80211: Interface down (%s/%s)",
1344 namebuf, ifname);
1345 if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
1346 wpa_printf(MSG_DEBUG,
1347 "nl80211: Not the main interface (%s) - do not indicate interface down",
1348 drv->first_bss->ifname);
1349 } else if (drv->ignore_if_down_event) {
1350 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1351 "event generated by mode change");
1352 drv->ignore_if_down_event = 0;
1353 } else {
1354 drv->if_disabled = 1;
1355 wpa_supplicant_event(drv->ctx,
1356 EVENT_INTERFACE_DISABLED, NULL);
1357
1358 /*
1359 * Try to get drv again, since it may be removed as
1360 * part of the EVENT_INTERFACE_DISABLED handling for
1361 * dynamic interfaces
1362 */
1363 drv = nl80211_find_drv(global, ifi->ifi_index,
1364 buf, len, NULL);
1365 if (!drv)
1366 return;
1367 }
1368 }
1369
1370 if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) {
1371 namebuf[0] = '\0';
1372 if (if_indextoname(ifi->ifi_index, namebuf) &&
1373 linux_iface_up(drv->global->ioctl_sock, namebuf) == 0) {
1374 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1375 "event since interface %s is down",
1376 namebuf);
1377 return;
1378 }
1379 wpa_printf(MSG_DEBUG, "nl80211: Interface up (%s/%s)",
1380 namebuf, ifname);
1381 if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
1382 wpa_printf(MSG_DEBUG,
1383 "nl80211: Not the main interface (%s) - do not indicate interface up",
1384 drv->first_bss->ifname);
1385 } else if (if_nametoindex(drv->first_bss->ifname) == 0) {
1386 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1387 "event since interface %s does not exist",
1388 drv->first_bss->ifname);
1389 } else if (drv->if_removed) {
1390 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1391 "event since interface %s is marked "
1392 "removed", drv->first_bss->ifname);
1393 } else {
1394 /* Re-read MAC address as it may have changed */
1395 nl80211_refresh_mac(drv, ifi->ifi_index, 0);
1396
1397 drv->if_disabled = 0;
1398 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED,
1399 NULL);
1400 }
1401 } else if (ifi->ifi_flags & IFF_UP) {
1402 /* Re-read MAC address as it may have changed */
1403 nl80211_refresh_mac(drv, ifi->ifi_index, 1);
1404 }
1405
1406 /*
1407 * Some drivers send the association event before the operup event--in
1408 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
1409 * fails. This will hit us when wpa_supplicant does not need to do
1410 * IEEE 802.1X authentication
1411 */
1412 if (drv->operstate == 1 &&
1413 (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
1414 !(ifi->ifi_flags & IFF_RUNNING)) {
1415 wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
1416 netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
1417 -1, IF_OPER_UP);
1418 }
1419
1420 event_newlink:
1421 if (ifname[0])
1422 wpa_driver_nl80211_event_newlink(global, drv, ifi->ifi_index,
1423 ifname);
1424
1425 if (ifi->ifi_family == AF_BRIDGE && brid && drv) {
1426 struct i802_bss *bss;
1427
1428 /* device has been added to bridge */
1429 if (!if_indextoname(brid, namebuf)) {
1430 wpa_printf(MSG_DEBUG,
1431 "nl80211: Could not find bridge ifname for ifindex %u",
1432 brid);
1433 return;
1434 }
1435 wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
1436 brid, namebuf);
1437 add_ifidx(drv, brid, ifi->ifi_index);
1438
1439 for (bss = drv->first_bss; bss; bss = bss->next) {
1440 if (os_strcmp(ifname, bss->ifname) == 0) {
1441 os_strlcpy(bss->brname, namebuf, IFNAMSIZ);
1442 break;
1443 }
1444 }
1445 }
1446 }
1447
1448
wpa_driver_nl80211_event_rtm_dellink(void * ctx,struct ifinfomsg * ifi,u8 * buf,size_t len)1449 static void wpa_driver_nl80211_event_rtm_dellink(void *ctx,
1450 struct ifinfomsg *ifi,
1451 u8 *buf, size_t len)
1452 {
1453 struct nl80211_global *global = ctx;
1454 struct wpa_driver_nl80211_data *drv;
1455 int attrlen;
1456 struct rtattr *attr;
1457 u32 brid = 0;
1458 char ifname[IFNAMSIZ + 1];
1459 char extra[100], *pos, *end;
1460
1461 extra[0] = '\0';
1462 pos = extra;
1463 end = pos + sizeof(extra);
1464 ifname[0] = '\0';
1465
1466 attrlen = len;
1467 attr = (struct rtattr *) buf;
1468 while (RTA_OK(attr, attrlen)) {
1469 switch (attr->rta_type) {
1470 case IFLA_IFNAME:
1471 if (RTA_PAYLOAD(attr) > IFNAMSIZ)
1472 break;
1473 os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1474 ifname[RTA_PAYLOAD(attr)] = '\0';
1475 break;
1476 case IFLA_MASTER:
1477 brid = nla_get_u32((struct nlattr *) attr);
1478 pos += os_snprintf(pos, end - pos, " master=%u", brid);
1479 break;
1480 case IFLA_OPERSTATE:
1481 pos += os_snprintf(pos, end - pos, " operstate=%u",
1482 nla_get_u32((struct nlattr *) attr));
1483 break;
1484 case IFLA_LINKMODE:
1485 pos += os_snprintf(pos, end - pos, " linkmode=%u",
1486 nla_get_u32((struct nlattr *) attr));
1487 break;
1488 }
1489 attr = RTA_NEXT(attr, attrlen);
1490 }
1491 extra[sizeof(extra) - 1] = '\0';
1492
1493 wpa_printf(MSG_DEBUG, "RTM_DELLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1494 ifi->ifi_index, ifname, extra, ifi->ifi_family,
1495 ifi->ifi_flags,
1496 (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1497 (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1498 (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1499 (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1500
1501 drv = nl80211_find_drv(global, ifi->ifi_index, buf, len, NULL);
1502
1503 if (ifi->ifi_family == AF_BRIDGE && brid && drv) {
1504 /* device has been removed from bridge */
1505 char namebuf[IFNAMSIZ];
1506
1507 if (!if_indextoname(brid, namebuf)) {
1508 wpa_printf(MSG_DEBUG,
1509 "nl80211: Could not find bridge ifname for ifindex %u",
1510 brid);
1511 } else {
1512 wpa_printf(MSG_DEBUG,
1513 "nl80211: Remove ifindex %u for bridge %s",
1514 brid, namebuf);
1515 }
1516 del_ifidx(drv, brid, ifi->ifi_index);
1517 }
1518
1519 if (ifi->ifi_family != AF_BRIDGE || !brid)
1520 wpa_driver_nl80211_event_dellink(global, drv, ifi->ifi_index,
1521 ifname);
1522 }
1523
1524
1525 struct nl80211_get_assoc_freq_arg {
1526 struct wpa_driver_nl80211_data *drv;
1527 unsigned int assoc_freq;
1528 unsigned int ibss_freq;
1529 u8 assoc_bssid[ETH_ALEN];
1530 u8 assoc_ssid[SSID_MAX_LEN];
1531 u8 assoc_ssid_len;
1532 u8 bssid[MAX_NUM_MLD_LINKS][ETH_ALEN];
1533 unsigned int freq[MAX_NUM_MLD_LINKS];
1534 };
1535
nl80211_get_assoc_freq_handler(struct nl_msg * msg,void * arg)1536 static int nl80211_get_assoc_freq_handler(struct nl_msg *msg, void *arg)
1537 {
1538 struct nlattr *tb[NL80211_ATTR_MAX + 1];
1539 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1540 struct nlattr *bss[NL80211_BSS_MAX + 1];
1541 static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
1542 [NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
1543 [NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
1544 [NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
1545 [NL80211_BSS_STATUS] = { .type = NLA_U32 },
1546 [NL80211_BSS_MLO_LINK_ID] = { .type = NLA_U8 },
1547 };
1548 struct nl80211_get_assoc_freq_arg *ctx = arg;
1549 enum nl80211_bss_status status;
1550 struct wpa_driver_nl80211_data *drv = ctx->drv;
1551
1552 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1553 genlmsg_attrlen(gnlh, 0), NULL);
1554 if (!tb[NL80211_ATTR_BSS] ||
1555 nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
1556 bss_policy) ||
1557 !bss[NL80211_BSS_STATUS])
1558 return NL_SKIP;
1559
1560 status = nla_get_u32(bss[NL80211_BSS_STATUS]);
1561 if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1562 bss[NL80211_BSS_FREQUENCY]) {
1563 int link_id = -1;
1564 u32 freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1565
1566 if (bss[NL80211_BSS_MLO_LINK_ID])
1567 link_id = nla_get_u8(bss[NL80211_BSS_MLO_LINK_ID]);
1568
1569 if (link_id >= 0 && link_id < MAX_NUM_MLD_LINKS) {
1570 ctx->freq[link_id] = freq;
1571 wpa_printf(MSG_DEBUG,
1572 "nl80211: MLO link %d associated on %u MHz",
1573 link_id, ctx->freq[link_id]);
1574 }
1575
1576 if (!drv->sta_mlo_info.valid_links ||
1577 drv->sta_mlo_info.assoc_link_id == link_id) {
1578 ctx->assoc_freq = freq;
1579 wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
1580 ctx->assoc_freq);
1581 }
1582 }
1583 if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
1584 bss[NL80211_BSS_FREQUENCY]) {
1585 ctx->ibss_freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1586 wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
1587 ctx->ibss_freq);
1588 }
1589 if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1590 bss[NL80211_BSS_BSSID]) {
1591 int link_id = -1;
1592 const u8 *bssid = nla_data(bss[NL80211_BSS_BSSID]);
1593
1594 if (bss[NL80211_BSS_MLO_LINK_ID])
1595 link_id = nla_get_u8(bss[NL80211_BSS_MLO_LINK_ID]);
1596
1597 if (link_id >= 0 && link_id < MAX_NUM_MLD_LINKS) {
1598 os_memcpy(ctx->bssid[link_id], bssid, ETH_ALEN);
1599 wpa_printf(MSG_DEBUG,
1600 "nl80211: MLO link %d associated with "
1601 MACSTR, link_id, MAC2STR(bssid));
1602 }
1603
1604 if (!drv->sta_mlo_info.valid_links ||
1605 drv->sta_mlo_info.assoc_link_id == link_id) {
1606 os_memcpy(ctx->assoc_bssid, bssid, ETH_ALEN);
1607 wpa_printf(MSG_DEBUG, "nl80211: Associated with "
1608 MACSTR, MAC2STR(bssid));
1609 }
1610
1611 }
1612
1613 if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1614 bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
1615 const u8 *ie, *ssid;
1616 size_t ie_len;
1617
1618 ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1619 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1620 ssid = get_ie(ie, ie_len, WLAN_EID_SSID);
1621 if (ssid && ssid[1] > 0 && ssid[1] <= SSID_MAX_LEN) {
1622 ctx->assoc_ssid_len = ssid[1];
1623 os_memcpy(ctx->assoc_ssid, ssid + 2, ssid[1]);
1624 }
1625 }
1626
1627 return NL_SKIP;
1628 }
1629
1630
nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data * drv,u8 * ssid)1631 int nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data *drv, u8 *ssid)
1632 {
1633 struct nl_msg *msg;
1634 int ret;
1635 struct nl80211_get_assoc_freq_arg arg;
1636 int count = 0;
1637
1638 try_again:
1639 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1640 os_memset(&arg, 0, sizeof(arg));
1641 arg.drv = drv;
1642 ret = send_and_recv_msgs(drv, msg, nl80211_get_assoc_freq_handler,
1643 &arg, NULL, NULL);
1644 if (ret == -EAGAIN) {
1645 count++;
1646 if (count >= 10) {
1647 wpa_printf(MSG_INFO,
1648 "nl80211: Failed to receive consistent scan result dump for get_assoc_ssid");
1649 } else {
1650 wpa_printf(MSG_DEBUG,
1651 "nl80211: Failed to receive consistent scan result dump for get_assoc_ssid - try again");
1652 goto try_again;
1653 }
1654 }
1655 if (ret == 0) {
1656 os_memcpy(ssid, arg.assoc_ssid, arg.assoc_ssid_len);
1657 return arg.assoc_ssid_len;
1658 }
1659 wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d (%s)",
1660 ret, strerror(-ret));
1661 return ret;
1662 }
1663
1664
nl80211_get_assoc_freq(struct wpa_driver_nl80211_data * drv)1665 unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv)
1666 {
1667 struct nl_msg *msg;
1668 int ret;
1669 struct nl80211_get_assoc_freq_arg arg;
1670 int count = 0;
1671
1672 try_again:
1673 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1674 os_memset(&arg, 0, sizeof(arg));
1675 arg.drv = drv;
1676 ret = send_and_recv_msgs(drv, msg, nl80211_get_assoc_freq_handler,
1677 &arg, NULL, NULL);
1678 if (ret == -EAGAIN) {
1679 count++;
1680 if (count >= 10) {
1681 wpa_printf(MSG_INFO,
1682 "nl80211: Failed to receive consistent scan result dump for get_assoc_freq");
1683 } else {
1684 wpa_printf(MSG_DEBUG,
1685 "nl80211: Failed to receive consistent scan result dump for get_assoc_freq - try again");
1686 goto try_again;
1687 }
1688 }
1689 if (ret == 0) {
1690 unsigned int freq = drv->nlmode == NL80211_IFTYPE_ADHOC ?
1691 arg.ibss_freq : arg.assoc_freq;
1692 wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
1693 "associated BSS from scan results: %u MHz", freq);
1694 if (freq)
1695 drv->assoc_freq = freq;
1696
1697 if (drv->sta_mlo_info.valid_links) {
1698 int i;
1699
1700 for (i = 0; i < MAX_NUM_MLD_LINKS; i++)
1701 drv->sta_mlo_info.links[i].freq = arg.freq[i];
1702 }
1703
1704 return drv->assoc_freq;
1705 }
1706 wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1707 "(%s)", ret, strerror(-ret));
1708 return drv->assoc_freq;
1709 }
1710
get_link_noise(struct nl_msg * msg,void * arg)1711 static int get_link_noise(struct nl_msg *msg, void *arg)
1712 {
1713 struct nlattr *tb[NL80211_ATTR_MAX + 1];
1714 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1715 struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
1716 static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
1717 [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
1718 [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
1719 };
1720 struct wpa_signal_info *sig_change = arg;
1721
1722 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1723 genlmsg_attrlen(gnlh, 0), NULL);
1724
1725 if (!tb[NL80211_ATTR_SURVEY_INFO]) {
1726 wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
1727 return NL_SKIP;
1728 }
1729
1730 if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
1731 tb[NL80211_ATTR_SURVEY_INFO],
1732 survey_policy)) {
1733 wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
1734 "attributes!");
1735 return NL_SKIP;
1736 }
1737
1738 if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
1739 return NL_SKIP;
1740
1741 if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
1742 sig_change->frequency)
1743 return NL_SKIP;
1744
1745 if (!sinfo[NL80211_SURVEY_INFO_NOISE])
1746 return NL_SKIP;
1747
1748 sig_change->current_noise =
1749 (s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
1750
1751 return NL_SKIP;
1752 }
1753
1754
nl80211_get_link_noise(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig_change)1755 int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
1756 struct wpa_signal_info *sig_change)
1757 {
1758 struct nl_msg *msg;
1759
1760 sig_change->current_noise = WPA_INVALID_NOISE;
1761 sig_change->frequency = drv->assoc_freq;
1762
1763 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
1764 return send_and_recv_msgs(drv, msg, get_link_noise, sig_change,
1765 NULL, NULL);
1766 }
1767
1768
get_channel_info(struct nl_msg * msg,void * arg)1769 static int get_channel_info(struct nl_msg *msg, void *arg)
1770 {
1771 struct nlattr *tb[NL80211_ATTR_MAX + 1] = { 0 };
1772 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1773 struct wpa_channel_info *chan_info = arg;
1774
1775 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1776 genlmsg_attrlen(gnlh, 0), NULL);
1777
1778 os_memset(chan_info, 0, sizeof(struct wpa_channel_info));
1779 chan_info->chanwidth = CHAN_WIDTH_UNKNOWN;
1780
1781 if (tb[NL80211_ATTR_WIPHY_FREQ])
1782 chan_info->frequency =
1783 nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
1784 if (tb[NL80211_ATTR_CHANNEL_WIDTH])
1785 chan_info->chanwidth = convert2width(
1786 nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
1787 if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) {
1788 enum nl80211_channel_type ct =
1789 nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]);
1790
1791 switch (ct) {
1792 case NL80211_CHAN_HT40MINUS:
1793 chan_info->sec_channel = -1;
1794 break;
1795 case NL80211_CHAN_HT40PLUS:
1796 chan_info->sec_channel = 1;
1797 break;
1798 default:
1799 chan_info->sec_channel = 0;
1800 break;
1801 }
1802 }
1803 if (tb[NL80211_ATTR_CENTER_FREQ1])
1804 chan_info->center_frq1 =
1805 nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
1806 if (tb[NL80211_ATTR_CENTER_FREQ2])
1807 chan_info->center_frq2 =
1808 nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
1809
1810 if (chan_info->center_frq2) {
1811 u8 seg1_idx = 0;
1812
1813 if (ieee80211_freq_to_chan(chan_info->center_frq2, &seg1_idx) !=
1814 NUM_HOSTAPD_MODES)
1815 chan_info->seg1_idx = seg1_idx;
1816 }
1817
1818 return NL_SKIP;
1819 }
1820
1821
nl80211_channel_info(void * priv,struct wpa_channel_info * ci)1822 static int nl80211_channel_info(void *priv, struct wpa_channel_info *ci)
1823 {
1824 struct i802_bss *bss = priv;
1825 struct wpa_driver_nl80211_data *drv = bss->drv;
1826 struct nl_msg *msg;
1827
1828 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
1829 return send_and_recv_msgs(drv, msg, get_channel_info, ci, NULL, NULL);
1830 }
1831
1832
wpa_driver_nl80211_event_receive(int sock,void * eloop_ctx,void * handle)1833 static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
1834 void *handle)
1835 {
1836 struct nl_cb *cb = eloop_ctx;
1837 int res;
1838
1839 wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
1840
1841 res = nl_recvmsgs(handle, cb);
1842 if (res < 0) {
1843 wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
1844 __func__, res);
1845 }
1846 }
1847
1848
1849 /**
1850 * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
1851 * @priv: driver_nl80211 private data
1852 * @alpha2_arg: country to which to switch to
1853 * Returns: 0 on success, -1 on failure
1854 *
1855 * This asks nl80211 to set the regulatory domain for given
1856 * country ISO / IEC alpha2.
1857 */
wpa_driver_nl80211_set_country(void * priv,const char * alpha2_arg)1858 static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
1859 {
1860 struct i802_bss *bss = priv;
1861 struct wpa_driver_nl80211_data *drv = bss->drv;
1862 char alpha2[3];
1863 struct nl_msg *msg;
1864
1865 msg = nlmsg_alloc();
1866 if (!msg)
1867 return -ENOMEM;
1868
1869 alpha2[0] = alpha2_arg[0];
1870 alpha2[1] = alpha2_arg[1];
1871 alpha2[2] = '\0';
1872
1873 if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG) ||
1874 nla_put_string(msg, NL80211_ATTR_REG_ALPHA2, alpha2)) {
1875 nlmsg_free(msg);
1876 return -EINVAL;
1877 }
1878 if (send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL))
1879 return -EINVAL;
1880 return 0;
1881 }
1882
1883
nl80211_get_country(struct nl_msg * msg,void * arg)1884 static int nl80211_get_country(struct nl_msg *msg, void *arg)
1885 {
1886 char *alpha2 = arg;
1887 struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
1888 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1889
1890 nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1891 genlmsg_attrlen(gnlh, 0), NULL);
1892 if (!tb_msg[NL80211_ATTR_REG_ALPHA2]) {
1893 wpa_printf(MSG_DEBUG, "nl80211: No country information available");
1894 return NL_SKIP;
1895 }
1896 os_strlcpy(alpha2, nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]), 3);
1897 return NL_SKIP;
1898 }
1899
1900
wpa_driver_nl80211_get_country(void * priv,char * alpha2)1901 static int wpa_driver_nl80211_get_country(void *priv, char *alpha2)
1902 {
1903 struct i802_bss *bss = priv;
1904 struct wpa_driver_nl80211_data *drv = bss->drv;
1905 struct nl_msg *msg;
1906 int ret;
1907
1908 msg = nlmsg_alloc();
1909 if (!msg)
1910 return -ENOMEM;
1911
1912 nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
1913
1914 if (drv->capa.flags & WPA_DRIVER_FLAGS_SELF_MANAGED_REGULATORY) {
1915 /* put wiphy idx to get the interface specific country code
1916 * instead of the global one. */
1917 if (nla_put_u32(msg, NL80211_ATTR_WIPHY, drv->wiphy_idx)) {
1918 nlmsg_free(msg);
1919 return -1;
1920 }
1921 }
1922
1923 alpha2[0] = '\0';
1924 ret = send_and_recv_msgs(drv, msg, nl80211_get_country, alpha2,
1925 NULL, NULL);
1926 if (!alpha2[0])
1927 ret = -1;
1928
1929 return ret;
1930 }
1931
1932
wpa_driver_nl80211_init_nl_global(struct nl80211_global * global)1933 static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global)
1934 {
1935 int ret;
1936
1937 global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
1938 if (global->nl_cb == NULL) {
1939 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
1940 "callbacks");
1941 return -1;
1942 }
1943
1944 global->nl = nl_create_handle(global->nl_cb, "nl");
1945 if (global->nl == NULL)
1946 goto err;
1947
1948 global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
1949 if (global->nl80211_id < 0) {
1950 wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
1951 "found");
1952 goto err;
1953 }
1954
1955 global->nlctrl_id = genl_ctrl_resolve(global->nl, "nlctrl");
1956 if (global->nlctrl_id < 0) {
1957 wpa_printf(MSG_ERROR,
1958 "nl80211: 'nlctrl' generic netlink not found");
1959 goto err;
1960 }
1961
1962 global->nl_event = nl_create_handle(global->nl_cb, "event");
1963 if (global->nl_event == NULL)
1964 goto err;
1965
1966 ret = nl_get_multicast_id(global, "nl80211", "scan");
1967 if (ret >= 0)
1968 ret = nl_socket_add_membership(global->nl_event, ret);
1969 if (ret < 0) {
1970 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1971 "membership for scan events: %d (%s)",
1972 ret, nl_geterror(ret));
1973 goto err;
1974 }
1975
1976 ret = nl_get_multicast_id(global, "nl80211", "mlme");
1977 if (ret >= 0)
1978 ret = nl_socket_add_membership(global->nl_event, ret);
1979 if (ret < 0) {
1980 wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1981 "membership for mlme events: %d (%s)",
1982 ret, nl_geterror(ret));
1983 goto err;
1984 }
1985
1986 ret = nl_get_multicast_id(global, "nl80211", "regulatory");
1987 if (ret >= 0)
1988 ret = nl_socket_add_membership(global->nl_event, ret);
1989 if (ret < 0) {
1990 wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
1991 "membership for regulatory events: %d (%s)",
1992 ret, nl_geterror(ret));
1993 /* Continue without regulatory events */
1994 }
1995
1996 ret = nl_get_multicast_id(global, "nl80211", "vendor");
1997 if (ret >= 0)
1998 ret = nl_socket_add_membership(global->nl_event, ret);
1999 if (ret < 0) {
2000 wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
2001 "membership for vendor events: %d (%s)",
2002 ret, nl_geterror(ret));
2003 /* Continue without vendor events */
2004 }
2005
2006 nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
2007 no_seq_check, NULL);
2008 nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
2009 process_global_event, global);
2010
2011 nl80211_register_eloop_read(&global->nl_event,
2012 wpa_driver_nl80211_event_receive,
2013 global->nl_cb, 0);
2014
2015 return 0;
2016
2017 err:
2018 nl_destroy_handles(&global->nl_event);
2019 nl_destroy_handles(&global->nl);
2020 nl_cb_put(global->nl_cb);
2021 global->nl_cb = NULL;
2022 return -1;
2023 }
2024
2025
nl80211_check_global(struct nl80211_global * global)2026 static void nl80211_check_global(struct nl80211_global *global)
2027 {
2028 struct nl_sock *handle;
2029 const char *groups[] = { "scan", "mlme", "regulatory", "vendor", NULL };
2030 int ret;
2031 unsigned int i;
2032
2033 /*
2034 * Try to re-add memberships to handle case of cfg80211 getting reloaded
2035 * and all registration having been cleared.
2036 */
2037 handle = (void *) (((intptr_t) global->nl_event) ^
2038 ELOOP_SOCKET_INVALID);
2039
2040 for (i = 0; groups[i]; i++) {
2041 ret = nl_get_multicast_id(global, "nl80211", groups[i]);
2042 if (ret >= 0)
2043 ret = nl_socket_add_membership(handle, ret);
2044 if (ret < 0) {
2045 wpa_printf(MSG_INFO,
2046 "nl80211: Could not re-add multicast membership for %s events: %d (%s)",
2047 groups[i], ret, nl_geterror(ret));
2048 }
2049 }
2050 }
2051
2052
wpa_driver_nl80211_rfkill_blocked(void * ctx)2053 static void wpa_driver_nl80211_rfkill_blocked(void *ctx)
2054 {
2055 struct wpa_driver_nl80211_data *drv = ctx;
2056
2057 wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
2058
2059 /*
2060 * rtnetlink ifdown handler will report interfaces other than the P2P
2061 * Device interface as disabled.
2062 */
2063 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2064 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_DISABLED, NULL);
2065 }
2066
2067
wpa_driver_nl80211_rfkill_unblocked(void * ctx)2068 static void wpa_driver_nl80211_rfkill_unblocked(void *ctx)
2069 {
2070 struct wpa_driver_nl80211_data *drv = ctx;
2071 wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
2072 if (i802_set_iface_flags(drv->first_bss, 1)) {
2073 wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
2074 "after rfkill unblock");
2075 return;
2076 }
2077
2078 if (is_p2p_net_interface(drv->nlmode))
2079 nl80211_disable_11b_rates(drv, drv->ifindex, 1);
2080
2081 /*
2082 * rtnetlink ifup handler will report interfaces other than the P2P
2083 * Device interface as enabled.
2084 */
2085 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2086 wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED, NULL);
2087 }
2088
2089
wpa_driver_nl80211_handle_eapol_tx_status(int sock,void * eloop_ctx,void * handle)2090 static void wpa_driver_nl80211_handle_eapol_tx_status(int sock,
2091 void *eloop_ctx,
2092 void *handle)
2093 {
2094 struct wpa_driver_nl80211_data *drv = eloop_ctx;
2095 u8 data[2048];
2096 struct msghdr msg;
2097 struct iovec entry;
2098 u8 control[512];
2099 struct cmsghdr *cmsg;
2100 int res, found_ee = 0, found_wifi = 0, acked = 0;
2101 union wpa_event_data event;
2102
2103 memset(&msg, 0, sizeof(msg));
2104 msg.msg_iov = &entry;
2105 msg.msg_iovlen = 1;
2106 entry.iov_base = data;
2107 entry.iov_len = sizeof(data);
2108 msg.msg_control = &control;
2109 msg.msg_controllen = sizeof(control);
2110
2111 res = recvmsg(sock, &msg, MSG_ERRQUEUE);
2112 /* if error or not fitting 802.3 header, return */
2113 if (res < 14)
2114 return;
2115
2116 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
2117 {
2118 if (cmsg->cmsg_level == SOL_SOCKET &&
2119 cmsg->cmsg_type == SCM_WIFI_STATUS) {
2120 int *ack;
2121
2122 found_wifi = 1;
2123 ack = (void *)CMSG_DATA(cmsg);
2124 acked = *ack;
2125 }
2126
2127 if (cmsg->cmsg_level == SOL_PACKET &&
2128 cmsg->cmsg_type == PACKET_TX_TIMESTAMP) {
2129 struct sock_extended_err *err =
2130 (struct sock_extended_err *)CMSG_DATA(cmsg);
2131
2132 if (err->ee_origin == SO_EE_ORIGIN_TXSTATUS)
2133 found_ee = 1;
2134 }
2135 }
2136
2137 if (!found_ee || !found_wifi)
2138 return;
2139
2140 memset(&event, 0, sizeof(event));
2141 event.eapol_tx_status.dst = data;
2142 event.eapol_tx_status.data = data + 14;
2143 event.eapol_tx_status.data_len = res - 14;
2144 event.eapol_tx_status.ack = acked;
2145 wpa_supplicant_event(drv->ctx, EVENT_EAPOL_TX_STATUS, &event);
2146 }
2147
2148
nl80211_init_connect_handle(struct i802_bss * bss)2149 static int nl80211_init_connect_handle(struct i802_bss *bss)
2150 {
2151 if (bss->nl_connect) {
2152 wpa_printf(MSG_DEBUG,
2153 "nl80211: Connect handle already created (nl_connect=%p)",
2154 bss->nl_connect);
2155 return -1;
2156 }
2157
2158 bss->nl_connect = nl_create_handle(bss->nl_cb, "connect");
2159 if (!bss->nl_connect)
2160 return -1;
2161 nl80211_register_eloop_read(&bss->nl_connect,
2162 wpa_driver_nl80211_event_receive,
2163 bss->nl_cb, 1);
2164 return 0;
2165 }
2166
2167
nl80211_init_bss(struct i802_bss * bss)2168 static int nl80211_init_bss(struct i802_bss *bss)
2169 {
2170 bss->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
2171 if (!bss->nl_cb)
2172 return -1;
2173
2174 nl_cb_set(bss->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
2175 no_seq_check, NULL);
2176 nl_cb_set(bss->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
2177 process_bss_event, bss);
2178
2179 nl80211_init_connect_handle(bss);
2180
2181 return 0;
2182 }
2183
2184
nl80211_destroy_bss(struct i802_bss * bss)2185 static void nl80211_destroy_bss(struct i802_bss *bss)
2186 {
2187 nl_cb_put(bss->nl_cb);
2188 bss->nl_cb = NULL;
2189
2190 if (bss->nl_connect)
2191 nl80211_destroy_eloop_handle(&bss->nl_connect, 1);
2192 }
2193
2194
2195 static void
wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data * drv)2196 wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data *drv)
2197 {
2198 struct rfkill_config *rcfg;
2199
2200 if (drv->rfkill)
2201 return;
2202
2203 rcfg = os_zalloc(sizeof(*rcfg));
2204 if (!rcfg)
2205 return;
2206
2207 rcfg->ctx = drv;
2208
2209 /* rfkill uses netdev sysfs for initialization. However, P2P Device is
2210 * not associated with a netdev, so use the name of some other interface
2211 * sharing the same wiphy as the P2P Device interface.
2212 *
2213 * Note: This is valid, as a P2P Device interface is always dynamically
2214 * created and is created only once another wpa_s interface was added.
2215 */
2216 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
2217 struct nl80211_global *global = drv->global;
2218 struct wpa_driver_nl80211_data *tmp1;
2219
2220 dl_list_for_each(tmp1, &global->interfaces,
2221 struct wpa_driver_nl80211_data, list) {
2222 if (drv == tmp1 || drv->wiphy_idx != tmp1->wiphy_idx ||
2223 !tmp1->rfkill)
2224 continue;
2225
2226 wpa_printf(MSG_DEBUG,
2227 "nl80211: Use (%s) to initialize P2P Device rfkill",
2228 tmp1->first_bss->ifname);
2229 os_strlcpy(rcfg->ifname, tmp1->first_bss->ifname,
2230 sizeof(rcfg->ifname));
2231 break;
2232 }
2233 } else {
2234 os_strlcpy(rcfg->ifname, drv->first_bss->ifname,
2235 sizeof(rcfg->ifname));
2236 }
2237
2238 rcfg->blocked_cb = wpa_driver_nl80211_rfkill_blocked;
2239 rcfg->unblocked_cb = wpa_driver_nl80211_rfkill_unblocked;
2240 drv->rfkill = rfkill_init(rcfg);
2241 if (!drv->rfkill) {
2242 wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
2243 os_free(rcfg);
2244 }
2245 }
2246
2247
wpa_driver_nl80211_drv_init(void * ctx,const char * ifname,void * global_priv,int hostapd,const u8 * set_addr,const char * driver_params)2248 static void * wpa_driver_nl80211_drv_init(void *ctx, const char *ifname,
2249 void *global_priv, int hostapd,
2250 const u8 *set_addr,
2251 const char *driver_params)
2252 {
2253 struct wpa_driver_nl80211_data *drv;
2254 struct i802_bss *bss;
2255 unsigned int i;
2256
2257 if (global_priv == NULL)
2258 return NULL;
2259 drv = os_zalloc(sizeof(*drv));
2260 if (drv == NULL)
2261 return NULL;
2262 drv->global = global_priv;
2263 drv->ctx = ctx;
2264 drv->hostapd = !!hostapd;
2265 drv->eapol_sock = -1;
2266
2267 /*
2268 * There is no driver capability flag for this, so assume it is
2269 * supported and disable this on first attempt to use if the driver
2270 * rejects the command due to missing support.
2271 */
2272 drv->set_rekey_offload = 1;
2273
2274 drv->num_if_indices = ARRAY_SIZE(drv->default_if_indices);
2275 drv->if_indices = drv->default_if_indices;
2276
2277 drv->first_bss = os_zalloc(sizeof(*drv->first_bss));
2278 if (!drv->first_bss) {
2279 os_free(drv);
2280 return NULL;
2281 }
2282 bss = drv->first_bss;
2283 bss->drv = drv;
2284 bss->ctx = ctx;
2285
2286 os_strlcpy(bss->ifname, ifname, sizeof(bss->ifname));
2287 drv->monitor_ifidx = -1;
2288 drv->monitor_sock = -1;
2289 drv->eapol_tx_sock = -1;
2290 drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
2291
2292 if (nl80211_init_bss(bss))
2293 goto failed;
2294
2295 if (wpa_driver_nl80211_finish_drv_init(drv, set_addr, 1, driver_params))
2296 goto failed;
2297
2298 if (drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS) {
2299 drv->control_port_ap = 1;
2300 goto skip_wifi_status;
2301 }
2302
2303 drv->eapol_tx_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
2304 if (drv->eapol_tx_sock < 0)
2305 goto failed;
2306
2307 if (drv->data_tx_status) {
2308 int enabled = 1;
2309
2310 if (setsockopt(drv->eapol_tx_sock, SOL_SOCKET, SO_WIFI_STATUS,
2311 &enabled, sizeof(enabled)) < 0) {
2312 wpa_printf(MSG_DEBUG,
2313 "nl80211: wifi status sockopt failed: %s",
2314 strerror(errno));
2315 drv->data_tx_status = 0;
2316 if (!drv->use_monitor)
2317 drv->capa.flags &=
2318 ~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
2319 } else {
2320 eloop_register_read_sock(
2321 drv->eapol_tx_sock,
2322 wpa_driver_nl80211_handle_eapol_tx_status,
2323 drv, NULL);
2324 }
2325 }
2326 skip_wifi_status:
2327
2328 if (drv->global) {
2329 nl80211_check_global(drv->global);
2330 dl_list_add(&drv->global->interfaces, &drv->list);
2331 drv->in_interface_list = 1;
2332 }
2333
2334 /*
2335 * Set the default link to be the first one, and set its address to that
2336 * of the interface.
2337 */
2338 bss->flink = &bss->links[0];
2339 bss->n_links = 1;
2340 os_memcpy(bss->flink->addr, bss->addr, ETH_ALEN);
2341
2342 for (i = 0; i < MAX_NUM_MLD_LINKS; i++)
2343 bss->links[i].link_id = NL80211_DRV_LINK_ID_NA;
2344
2345 return bss;
2346
2347 failed:
2348 wpa_driver_nl80211_deinit(bss);
2349 return NULL;
2350 }
2351
2352
2353 /**
2354 * wpa_driver_nl80211_init - Initialize nl80211 driver interface
2355 * @ctx: context to be used when calling wpa_supplicant functions,
2356 * e.g., wpa_supplicant_event()
2357 * @ifname: interface name, e.g., wlan0
2358 * @global_priv: private driver global data from global_init()
2359 * Returns: Pointer to private data, %NULL on failure
2360 */
wpa_driver_nl80211_init(void * ctx,const char * ifname,void * global_priv)2361 static void * wpa_driver_nl80211_init(void *ctx, const char *ifname,
2362 void *global_priv)
2363 {
2364 return wpa_driver_nl80211_drv_init(ctx, ifname, global_priv, 0, NULL,
2365 NULL);
2366 }
2367
2368
nl80211_register_frame(struct i802_bss * bss,struct nl_sock * nl_handle,u16 type,const u8 * match,size_t match_len,bool multicast)2369 static int nl80211_register_frame(struct i802_bss *bss,
2370 struct nl_sock *nl_handle,
2371 u16 type, const u8 *match, size_t match_len,
2372 bool multicast)
2373 {
2374 struct wpa_driver_nl80211_data *drv = bss->drv;
2375 struct nl_msg *msg;
2376 int ret;
2377 char buf[30];
2378
2379 buf[0] = '\0';
2380 wpa_snprintf_hex(buf, sizeof(buf), match, match_len);
2381 wpa_printf(MSG_DEBUG,
2382 "nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s multicast=%d",
2383 type, fc2str(type), nl_handle, buf, multicast);
2384
2385 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REGISTER_FRAME)) ||
2386 (multicast && nla_put_flag(msg, NL80211_ATTR_RECEIVE_MULTICAST)) ||
2387 nla_put_u16(msg, NL80211_ATTR_FRAME_TYPE, type) ||
2388 nla_put(msg, NL80211_ATTR_FRAME_MATCH, match_len, match)) {
2389 nlmsg_free(msg);
2390 return -1;
2391 }
2392
2393 ret = send_and_recv(drv->global, nl_handle, msg, NULL, NULL,
2394 NULL, NULL);
2395 if (ret) {
2396 wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
2397 "failed (type=%u): ret=%d (%s)",
2398 type, ret, strerror(-ret));
2399 wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
2400 match, match_len);
2401 }
2402 return ret;
2403 }
2404
2405
nl80211_alloc_mgmt_handle(struct i802_bss * bss)2406 static int nl80211_alloc_mgmt_handle(struct i802_bss *bss)
2407 {
2408 if (bss->nl_mgmt) {
2409 wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
2410 "already on! (nl_mgmt=%p)", bss->nl_mgmt);
2411 return -1;
2412 }
2413
2414 bss->nl_mgmt = nl_create_handle(bss->nl_cb, "mgmt");
2415 if (bss->nl_mgmt == NULL)
2416 return -1;
2417
2418 return 0;
2419 }
2420
2421
nl80211_mgmt_handle_register_eloop(struct i802_bss * bss)2422 static void nl80211_mgmt_handle_register_eloop(struct i802_bss *bss)
2423 {
2424 nl80211_register_eloop_read(&bss->nl_mgmt,
2425 wpa_driver_nl80211_event_receive,
2426 bss->nl_cb, 0);
2427 }
2428
2429
nl80211_register_action_frame(struct i802_bss * bss,const u8 * match,size_t match_len)2430 static int nl80211_register_action_frame(struct i802_bss *bss,
2431 const u8 *match, size_t match_len)
2432 {
2433 u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
2434 return nl80211_register_frame(bss, bss->nl_mgmt,
2435 type, match, match_len, false);
2436 }
2437
2438
nl80211_mgmt_subscribe_non_ap(struct i802_bss * bss)2439 static int nl80211_mgmt_subscribe_non_ap(struct i802_bss *bss)
2440 {
2441 struct wpa_driver_nl80211_data *drv = bss->drv;
2442 u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
2443 int ret = 0;
2444
2445 if (nl80211_alloc_mgmt_handle(bss))
2446 return -1;
2447 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
2448 "handle %p", bss->nl_mgmt);
2449
2450 if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
2451 /* register for any AUTH message */
2452 nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0, false);
2453 } else if ((drv->capa.flags & WPA_DRIVER_FLAGS_SAE) &&
2454 !(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
2455 /* register for SAE Authentication frames */
2456 nl80211_register_frame(bss, bss->nl_mgmt, type,
2457 (u8 *) "\x03\x00", 2, false);
2458 }
2459
2460 #ifdef CONFIG_PASN
2461 /* register for PASN Authentication frames */
2462 if (nl80211_register_frame(bss, bss->nl_mgmt, type,
2463 (u8 *) "\x07\x00", 2, false))
2464 ret = -1;
2465 #endif /* CONFIG_PASN */
2466
2467 #ifdef CONFIG_INTERWORKING
2468 /* QoS Map Configure */
2469 if (nl80211_register_action_frame(bss, (u8 *) "\x01\x04", 2) < 0)
2470 ret = -1;
2471 #endif /* CONFIG_INTERWORKING */
2472 #if defined(CONFIG_P2P) || defined(CONFIG_INTERWORKING) || defined(CONFIG_DPP)
2473 /* GAS Initial Request */
2474 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0a", 2) < 0)
2475 ret = -1;
2476 /* GAS Initial Response */
2477 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0b", 2) < 0)
2478 ret = -1;
2479 /* GAS Comeback Request */
2480 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0c", 2) < 0)
2481 ret = -1;
2482 /* GAS Comeback Response */
2483 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0d", 2) < 0)
2484 ret = -1;
2485 /* Protected GAS Initial Request */
2486 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0a", 2) < 0)
2487 ret = -1;
2488 /* Protected GAS Initial Response */
2489 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0b", 2) < 0)
2490 ret = -1;
2491 /* Protected GAS Comeback Request */
2492 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0c", 2) < 0)
2493 ret = -1;
2494 /* Protected GAS Comeback Response */
2495 if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0d", 2) < 0)
2496 ret = -1;
2497 #endif /* CONFIG_P2P || CONFIG_INTERWORKING || CONFIG_DPP */
2498 #ifdef CONFIG_P2P
2499 /* P2P Public Action */
2500 if (nl80211_register_action_frame(bss,
2501 (u8 *) "\x04\x09\x50\x6f\x9a\x09",
2502 6) < 0)
2503 ret = -1;
2504 /* P2P Action */
2505 if (nl80211_register_action_frame(bss,
2506 (u8 *) "\x7f\x50\x6f\x9a\x09",
2507 5) < 0)
2508 ret = -1;
2509 #endif /* CONFIG_P2P */
2510 #ifdef CONFIG_DPP
2511 /* DPP Public Action */
2512 if (nl80211_register_action_frame(bss,
2513 (u8 *) "\x04\x09\x50\x6f\x9a\x1a",
2514 6) < 0)
2515 ret = -1;
2516 #endif /* CONFIG_DPP */
2517 #ifdef CONFIG_OCV
2518 /* SA Query Request */
2519 if (nl80211_register_action_frame(bss, (u8 *) "\x08\x00", 2) < 0)
2520 ret = -1;
2521 #endif /* CONFIG_OCV */
2522 /* SA Query Response */
2523 if (nl80211_register_action_frame(bss, (u8 *) "\x08\x01", 2) < 0)
2524 ret = -1;
2525 #ifdef CONFIG_TDLS
2526 if ((drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT)) {
2527 /* TDLS Discovery Response */
2528 if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0e", 2) <
2529 0)
2530 ret = -1;
2531 }
2532 #endif /* CONFIG_TDLS */
2533 #ifdef CONFIG_FST
2534 /* FST Action frames */
2535 if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
2536 ret = -1;
2537 #endif /* CONFIG_FST */
2538
2539 /* FT Action frames */
2540 if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
2541 ret = -1;
2542 else if (!drv->has_driver_key_mgmt) {
2543 int i;
2544
2545 /* Update supported AKMs only if the driver doesn't advertize
2546 * any AKM capabilities. */
2547 drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_FT |
2548 WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2549
2550 /* Update per interface supported AKMs */
2551 for (i = 0; i < WPA_IF_MAX; i++)
2552 drv->capa.key_mgmt_iftype[i] = drv->capa.key_mgmt;
2553 }
2554
2555 /* WNM - BSS Transition Management Request */
2556 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x07", 2) < 0)
2557 ret = -1;
2558 /* WNM-Sleep Mode Response */
2559 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x11", 2) < 0)
2560 ret = -1;
2561 #ifdef CONFIG_WNM
2562 /* WNM - Collocated Interference Request */
2563 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x0b", 2) < 0)
2564 ret = -1;
2565 #endif /* CONFIG_WNM */
2566
2567 #ifdef CONFIG_HS20
2568 /* WNM-Notification */
2569 if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x1a", 2) < 0)
2570 ret = -1;
2571 #endif /* CONFIG_HS20 */
2572
2573 /* WMM-AC ADDTS Response */
2574 if (nl80211_register_action_frame(bss, (u8 *) "\x11\x01", 2) < 0)
2575 ret = -1;
2576
2577 /* WMM-AC DELTS */
2578 if (nl80211_register_action_frame(bss, (u8 *) "\x11\x02", 2) < 0)
2579 ret = -1;
2580
2581 /* Radio Measurement - Neighbor Report Response */
2582 if (nl80211_register_action_frame(bss, (u8 *) "\x05\x05", 2) < 0)
2583 ret = -1;
2584
2585 /* Radio Measurement - Radio Measurement Request */
2586 if (!drv->no_rrm &&
2587 nl80211_register_action_frame(bss, (u8 *) "\x05\x00", 2) < 0)
2588 ret = -1;
2589
2590 /* Radio Measurement - Link Measurement Request */
2591 if ((drv->capa.rrm_flags & WPA_DRIVER_FLAGS_TX_POWER_INSERTION) &&
2592 (nl80211_register_action_frame(bss, (u8 *) "\x05\x02", 2) < 0))
2593 ret = -1;
2594
2595 /* Robust AV SCS Response */
2596 if (nl80211_register_action_frame(bss, (u8 *) "\x13\x01", 2) < 0)
2597 ret = -1;
2598
2599 /* Robust AV MSCS Response */
2600 if (nl80211_register_action_frame(bss, (u8 *) "\x13\x05", 2) < 0)
2601 ret = -1;
2602
2603 /* Protected QoS Management Action frame */
2604 if (nl80211_register_action_frame(bss, (u8 *) "\x7e\x50\x6f\x9a\x1a",
2605 5) < 0)
2606 ret = -1;
2607
2608 nl80211_mgmt_handle_register_eloop(bss);
2609
2610 return ret;
2611 }
2612
2613
nl80211_mgmt_subscribe_mesh(struct i802_bss * bss)2614 static int nl80211_mgmt_subscribe_mesh(struct i802_bss *bss)
2615 {
2616 int ret = 0;
2617
2618 if (nl80211_alloc_mgmt_handle(bss))
2619 return -1;
2620
2621 wpa_printf(MSG_DEBUG,
2622 "nl80211: Subscribe to mgmt frames with mesh handle %p",
2623 bss->nl_mgmt);
2624
2625 /* Auth frames for mesh SAE */
2626 if (nl80211_register_frame(bss, bss->nl_mgmt,
2627 (WLAN_FC_TYPE_MGMT << 2) |
2628 (WLAN_FC_STYPE_AUTH << 4),
2629 NULL, 0, false) < 0)
2630 ret = -1;
2631
2632 /* Mesh peering open */
2633 if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x01", 2) < 0)
2634 ret = -1;
2635 /* Mesh peering confirm */
2636 if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x02", 2) < 0)
2637 ret = -1;
2638 /* Mesh peering close */
2639 if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x03", 2) < 0)
2640 ret = -1;
2641
2642 nl80211_mgmt_handle_register_eloop(bss);
2643
2644 return ret;
2645 }
2646
2647
nl80211_register_spurious_class3(struct i802_bss * bss)2648 static int nl80211_register_spurious_class3(struct i802_bss *bss)
2649 {
2650 struct nl_msg *msg;
2651 int ret;
2652
2653 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UNEXPECTED_FRAME);
2654 ret = send_and_recv(bss->drv->global, bss->nl_mgmt, msg, NULL, NULL,
2655 NULL, NULL);
2656 if (ret) {
2657 wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
2658 "failed: ret=%d (%s)",
2659 ret, strerror(-ret));
2660 }
2661 return ret;
2662 }
2663
2664
nl80211_action_subscribe_ap(struct i802_bss * bss)2665 static int nl80211_action_subscribe_ap(struct i802_bss *bss)
2666 {
2667 int ret = 0;
2668
2669 /* Public Action frames */
2670 if (nl80211_register_action_frame(bss, (u8 *) "\x04", 1) < 0)
2671 ret = -1;
2672 /* RRM Measurement Report */
2673 if (nl80211_register_action_frame(bss, (u8 *) "\x05\x01", 2) < 0)
2674 ret = -1;
2675 /* RRM Link Measurement Report */
2676 if (nl80211_register_action_frame(bss, (u8 *) "\x05\x03", 2) < 0)
2677 ret = -1;
2678 /* RRM Neighbor Report Request */
2679 if (nl80211_register_action_frame(bss, (u8 *) "\x05\x04", 2) < 0)
2680 ret = -1;
2681 /* FT Action frames */
2682 if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
2683 ret = -1;
2684 /* SA Query */
2685 if (nl80211_register_action_frame(bss, (u8 *) "\x08", 1) < 0)
2686 ret = -1;
2687 /* Protected Dual of Public Action */
2688 if (nl80211_register_action_frame(bss, (u8 *) "\x09", 1) < 0)
2689 ret = -1;
2690 /* WNM */
2691 if (nl80211_register_action_frame(bss, (u8 *) "\x0a", 1) < 0)
2692 ret = -1;
2693 /* WMM */
2694 if (nl80211_register_action_frame(bss, (u8 *) "\x11", 1) < 0)
2695 ret = -1;
2696 #ifdef CONFIG_FST
2697 /* FST Action frames */
2698 if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
2699 ret = -1;
2700 #endif /* CONFIG_FST */
2701 /* Vendor-specific */
2702 if (nl80211_register_action_frame(bss, (u8 *) "\x7f", 1) < 0)
2703 ret = -1;
2704
2705 return ret;
2706 }
2707
2708
nl80211_mgmt_subscribe_ap(struct i802_bss * bss)2709 static int nl80211_mgmt_subscribe_ap(struct i802_bss *bss)
2710 {
2711 static const int stypes[] = {
2712 WLAN_FC_STYPE_AUTH,
2713 WLAN_FC_STYPE_ASSOC_REQ,
2714 WLAN_FC_STYPE_REASSOC_REQ,
2715 WLAN_FC_STYPE_DISASSOC,
2716 WLAN_FC_STYPE_DEAUTH,
2717 WLAN_FC_STYPE_PROBE_REQ,
2718 /* Beacon doesn't work as mac80211 doesn't currently allow
2719 * it, but it wouldn't really be the right thing anyway as
2720 * it isn't per interface ... maybe just dump the scan
2721 * results periodically for OLBC?
2722 */
2723 /* WLAN_FC_STYPE_BEACON, */
2724 };
2725 unsigned int i;
2726
2727 if (nl80211_alloc_mgmt_handle(bss))
2728 return -1;
2729 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2730 "handle %p", bss->nl_mgmt);
2731
2732 for (i = 0; i < ARRAY_SIZE(stypes); i++) {
2733 if (nl80211_register_frame(bss, bss->nl_mgmt,
2734 (WLAN_FC_TYPE_MGMT << 2) |
2735 (stypes[i] << 4),
2736 NULL, 0, false) < 0) {
2737 goto out_err;
2738 }
2739 }
2740
2741 if (nl80211_action_subscribe_ap(bss))
2742 goto out_err;
2743
2744 if (nl80211_register_spurious_class3(bss))
2745 goto out_err;
2746
2747 nl80211_mgmt_handle_register_eloop(bss);
2748 return 0;
2749
2750 out_err:
2751 nl_destroy_handles(&bss->nl_mgmt);
2752 return -1;
2753 }
2754
2755
nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss * bss)2756 static int nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss *bss)
2757 {
2758 if (nl80211_alloc_mgmt_handle(bss))
2759 return -1;
2760 wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2761 "handle %p (device SME)", bss->nl_mgmt);
2762
2763 if (nl80211_action_subscribe_ap(bss))
2764 goto out_err;
2765
2766 if (bss->drv->device_ap_sme) {
2767 u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
2768
2769 /* Register for all Authentication frames */
2770 if (nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0,
2771 false) < 0)
2772 wpa_printf(MSG_DEBUG,
2773 "nl80211: Failed to subscribe to handle Authentication frames - SAE offload may not work");
2774 }
2775
2776 nl80211_mgmt_handle_register_eloop(bss);
2777 return 0;
2778
2779 out_err:
2780 nl_destroy_handles(&bss->nl_mgmt);
2781 return -1;
2782 }
2783
2784
nl80211_mgmt_unsubscribe(struct i802_bss * bss,const char * reason)2785 static void nl80211_mgmt_unsubscribe(struct i802_bss *bss, const char *reason)
2786 {
2787 if (bss->nl_mgmt == NULL)
2788 return;
2789 wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
2790 "(%s)", bss->nl_mgmt, reason);
2791 nl80211_destroy_eloop_handle(&bss->nl_mgmt, 0);
2792
2793 nl80211_put_wiphy_data_ap(bss);
2794 }
2795
2796
wpa_driver_nl80211_send_rfkill(void * eloop_ctx,void * timeout_ctx)2797 static void wpa_driver_nl80211_send_rfkill(void *eloop_ctx, void *timeout_ctx)
2798 {
2799 wpa_supplicant_event(timeout_ctx, EVENT_INTERFACE_DISABLED, NULL);
2800 }
2801
2802
nl80211_del_p2pdev(struct i802_bss * bss)2803 static void nl80211_del_p2pdev(struct i802_bss *bss)
2804 {
2805 struct nl_msg *msg;
2806 int ret;
2807
2808 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_INTERFACE);
2809 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
2810
2811 wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
2812 bss->ifname, (long long unsigned int) bss->wdev_id,
2813 strerror(-ret));
2814 }
2815
2816
nl80211_set_p2pdev(struct i802_bss * bss,int start)2817 static int nl80211_set_p2pdev(struct i802_bss *bss, int start)
2818 {
2819 struct nl_msg *msg;
2820 int ret;
2821
2822 msg = nl80211_cmd_msg(bss, 0, start ? NL80211_CMD_START_P2P_DEVICE :
2823 NL80211_CMD_STOP_P2P_DEVICE);
2824 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
2825
2826 wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
2827 start ? "Start" : "Stop",
2828 bss->ifname, (long long unsigned int) bss->wdev_id,
2829 strerror(-ret));
2830 return ret;
2831 }
2832
2833
i802_set_iface_flags(struct i802_bss * bss,int up)2834 static int i802_set_iface_flags(struct i802_bss *bss, int up)
2835 {
2836 enum nl80211_iftype nlmode;
2837
2838 nlmode = nl80211_get_ifmode(bss);
2839 if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2840 return linux_set_iface_flags(bss->drv->global->ioctl_sock,
2841 bss->ifname, up);
2842 }
2843
2844 /* P2P Device has start/stop which is equivalent */
2845 return nl80211_set_p2pdev(bss, up);
2846 }
2847
2848
2849 #ifdef CONFIG_TESTING_OPTIONS
qca_vendor_test_cmd_handler(struct nl_msg * msg,void * arg)2850 static int qca_vendor_test_cmd_handler(struct nl_msg *msg, void *arg)
2851 {
2852 /* struct wpa_driver_nl80211_data *drv = arg; */
2853 struct nlattr *tb[NL80211_ATTR_MAX + 1];
2854 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2855
2856
2857 wpa_printf(MSG_DEBUG,
2858 "nl80211: QCA vendor test command response received");
2859
2860 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2861 genlmsg_attrlen(gnlh, 0), NULL);
2862 if (!tb[NL80211_ATTR_VENDOR_DATA]) {
2863 wpa_printf(MSG_DEBUG, "nl80211: No vendor data attribute");
2864 return NL_SKIP;
2865 }
2866
2867 wpa_hexdump(MSG_DEBUG,
2868 "nl80211: Received QCA vendor test command response",
2869 nla_data(tb[NL80211_ATTR_VENDOR_DATA]),
2870 nla_len(tb[NL80211_ATTR_VENDOR_DATA]));
2871
2872 return NL_SKIP;
2873 }
2874 #endif /* CONFIG_TESTING_OPTIONS */
2875
2876
qca_vendor_test(struct wpa_driver_nl80211_data * drv)2877 static void qca_vendor_test(struct wpa_driver_nl80211_data *drv)
2878 {
2879 #ifdef CONFIG_TESTING_OPTIONS
2880 struct nl_msg *msg;
2881 struct nlattr *params;
2882 int ret;
2883
2884 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
2885 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2886 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2887 QCA_NL80211_VENDOR_SUBCMD_TEST) ||
2888 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2889 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TEST, 123)) {
2890 nlmsg_free(msg);
2891 return;
2892 }
2893 nla_nest_end(msg, params);
2894
2895 ret = send_and_recv_msgs(drv, msg, qca_vendor_test_cmd_handler, drv,
2896 NULL, NULL);
2897 wpa_printf(MSG_DEBUG,
2898 "nl80211: QCA vendor test command returned %d (%s)",
2899 ret, strerror(-ret));
2900 #endif /* CONFIG_TESTING_OPTIONS */
2901 }
2902
2903
2904 static int
wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data * drv,const u8 * set_addr,int first,const char * driver_params)2905 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
2906 const u8 *set_addr, int first,
2907 const char *driver_params)
2908 {
2909 struct i802_bss *bss = drv->first_bss;
2910 int send_rfkill_event = 0;
2911 enum nl80211_iftype nlmode;
2912
2913 drv->ifindex = if_nametoindex(bss->ifname);
2914 bss->ifindex = drv->ifindex;
2915 bss->wdev_id = drv->global->if_add_wdevid;
2916 bss->wdev_id_set = drv->global->if_add_wdevid_set;
2917
2918 bss->if_dynamic = drv->ifindex == drv->global->if_add_ifindex;
2919 bss->if_dynamic = bss->if_dynamic || drv->global->if_add_wdevid_set;
2920 drv->global->if_add_wdevid_set = 0;
2921
2922 if (!bss->if_dynamic && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
2923 bss->static_ap = 1;
2924
2925 if (first &&
2926 nl80211_get_ifmode(bss) != NL80211_IFTYPE_P2P_DEVICE &&
2927 linux_iface_up(drv->global->ioctl_sock, bss->ifname) > 0)
2928 drv->start_iface_up = 1;
2929
2930 if (wpa_driver_nl80211_capa(drv))
2931 return -1;
2932
2933 if (driver_params && nl80211_set_param(bss, driver_params) < 0)
2934 return -1;
2935
2936 wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
2937 bss->ifname, drv->phyname);
2938
2939 if (set_addr &&
2940 (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) ||
2941 linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2942 set_addr)))
2943 return -1;
2944
2945 if (first && nl80211_get_ifmode(bss) == NL80211_IFTYPE_STATION)
2946 drv->start_mode_sta = 1;
2947
2948 if (drv->hostapd || bss->static_ap)
2949 nlmode = NL80211_IFTYPE_AP;
2950 else if (bss->if_dynamic ||
2951 nl80211_get_ifmode(bss) == NL80211_IFTYPE_MESH_POINT)
2952 nlmode = nl80211_get_ifmode(bss);
2953 else
2954 nlmode = NL80211_IFTYPE_STATION;
2955
2956 if (wpa_driver_nl80211_set_mode(bss, nlmode) < 0) {
2957 wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
2958 return -1;
2959 }
2960
2961 if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2962 nl80211_get_macaddr(bss);
2963
2964 wpa_driver_nl80211_drv_init_rfkill(drv);
2965
2966 if (!rfkill_is_blocked(drv->rfkill)) {
2967 int ret = i802_set_iface_flags(bss, 1);
2968 if (ret) {
2969 wpa_printf(MSG_ERROR, "nl80211: Could not set "
2970 "interface '%s' UP", bss->ifname);
2971 return ret;
2972 }
2973
2974 if (is_p2p_net_interface(nlmode))
2975 nl80211_disable_11b_rates(bss->drv,
2976 bss->drv->ifindex, 1);
2977
2978 if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2979 return ret;
2980 } else {
2981 wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
2982 "interface '%s' due to rfkill", bss->ifname);
2983 if (nlmode != NL80211_IFTYPE_P2P_DEVICE)
2984 drv->if_disabled = 1;
2985
2986 send_rfkill_event = 1;
2987 }
2988
2989 if (!drv->hostapd && nlmode != NL80211_IFTYPE_P2P_DEVICE)
2990 netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
2991 1, IF_OPER_DORMANT);
2992
2993 if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2994 if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2995 bss->addr))
2996 return -1;
2997 os_memcpy(drv->perm_addr, bss->addr, ETH_ALEN);
2998 }
2999
3000 if (send_rfkill_event) {
3001 eloop_register_timeout(0, 0, wpa_driver_nl80211_send_rfkill,
3002 drv, drv->ctx);
3003 }
3004
3005 if (drv->vendor_cmd_test_avail)
3006 qca_vendor_test(drv);
3007
3008 return 0;
3009 }
3010
3011
wpa_driver_nl80211_del_beacon(struct i802_bss * bss,struct i802_link * link)3012 static int wpa_driver_nl80211_del_beacon(struct i802_bss *bss,
3013 struct i802_link *link)
3014 {
3015 struct nl_msg *msg;
3016 struct wpa_driver_nl80211_data *drv = bss->drv;
3017
3018 if (!link->beacon_set)
3019 return 0;
3020
3021 wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
3022 drv->ifindex);
3023 link->beacon_set = 0;
3024 link->freq = 0;
3025
3026 nl80211_put_wiphy_data_ap(bss);
3027 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_DEL_BEACON);
3028 if (!msg)
3029 return -ENOBUFS;
3030
3031 if (link->link_id != NL80211_DRV_LINK_ID_NA) {
3032 wpa_printf(MSG_DEBUG,
3033 "nl80211: MLD: stop beaconing on link=%u",
3034 link->link_id);
3035
3036 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
3037 link->link_id)) {
3038 nlmsg_free(msg);
3039 return -ENOBUFS;
3040 }
3041 }
3042
3043 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3044 }
3045
3046
wpa_driver_nl80211_del_beacon_all(struct i802_bss * bss)3047 static void wpa_driver_nl80211_del_beacon_all(struct i802_bss *bss)
3048 {
3049 unsigned int i;
3050
3051 for (i = 0; i < bss->n_links; i++)
3052 wpa_driver_nl80211_del_beacon(bss, &bss->links[i]);
3053 }
3054
3055
3056 /**
3057 * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
3058 * @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
3059 *
3060 * Shut down driver interface and processing of driver events. Free
3061 * private data buffer if one was allocated in wpa_driver_nl80211_init().
3062 */
wpa_driver_nl80211_deinit(struct i802_bss * bss)3063 static void wpa_driver_nl80211_deinit(struct i802_bss *bss)
3064 {
3065 struct wpa_driver_nl80211_data *drv = bss->drv;
3066 unsigned int i;
3067
3068 wpa_printf(MSG_INFO, "nl80211: deinit ifname=%s disabled_11b_rates=%d",
3069 bss->ifname, drv->disabled_11b_rates);
3070
3071 bss->in_deinit = 1;
3072 if (drv->data_tx_status)
3073 eloop_unregister_read_sock(drv->eapol_tx_sock);
3074 if (drv->eapol_tx_sock >= 0)
3075 close(drv->eapol_tx_sock);
3076
3077 if (bss->nl_preq)
3078 wpa_driver_nl80211_probe_req_report(bss, 0);
3079 if (bss->added_if_into_bridge) {
3080 if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
3081 bss->ifname) < 0)
3082 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
3083 "interface %s from bridge %s: %s",
3084 bss->ifname, bss->brname, strerror(errno));
3085 }
3086
3087 if (drv->rtnl_sk)
3088 nl_socket_free(drv->rtnl_sk);
3089
3090 if (bss->added_bridge) {
3091 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->brname,
3092 0) < 0)
3093 wpa_printf(MSG_INFO,
3094 "nl80211: Could not set bridge %s down",
3095 bss->brname);
3096 if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
3097 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
3098 "bridge %s: %s",
3099 bss->brname, strerror(errno));
3100 }
3101
3102 nl80211_remove_monitor_interface(drv);
3103
3104 if (is_ap_interface(drv->nlmode))
3105 wpa_driver_nl80211_del_beacon_all(bss);
3106
3107 if (drv->eapol_sock >= 0) {
3108 eloop_unregister_read_sock(drv->eapol_sock);
3109 close(drv->eapol_sock);
3110 }
3111
3112 if (drv->if_indices != drv->default_if_indices)
3113 os_free(drv->if_indices);
3114
3115 if (drv->disabled_11b_rates)
3116 nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3117
3118 netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, 0,
3119 IF_OPER_UP);
3120 eloop_cancel_timeout(wpa_driver_nl80211_send_rfkill, drv, drv->ctx);
3121 rfkill_deinit(drv->rfkill);
3122
3123 eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
3124
3125 if (!drv->start_iface_up)
3126 (void) i802_set_iface_flags(bss, 0);
3127
3128 if (drv->addr_changed) {
3129 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
3130 0) < 0) {
3131 wpa_printf(MSG_DEBUG,
3132 "nl80211: Could not set interface down to restore permanent MAC address");
3133 }
3134 if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
3135 drv->perm_addr) < 0) {
3136 wpa_printf(MSG_DEBUG,
3137 "nl80211: Could not restore permanent MAC address");
3138 }
3139 }
3140
3141 if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE) {
3142 if (drv->start_mode_sta)
3143 wpa_driver_nl80211_set_mode(bss,
3144 NL80211_IFTYPE_STATION);
3145 nl80211_mgmt_unsubscribe(bss, "deinit");
3146 } else {
3147 nl80211_mgmt_unsubscribe(bss, "deinit");
3148 nl80211_del_p2pdev(bss);
3149 }
3150
3151 nl80211_destroy_bss(drv->first_bss);
3152
3153 os_free(drv->filter_ssids);
3154
3155 os_free(drv->auth_ie);
3156 os_free(drv->auth_data);
3157
3158 if (drv->in_interface_list)
3159 dl_list_del(&drv->list);
3160
3161 os_free(drv->extended_capa);
3162 os_free(drv->extended_capa_mask);
3163 for (i = 0; i < drv->num_iface_ext_capa; i++) {
3164 os_free(drv->iface_ext_capa[i].ext_capa);
3165 os_free(drv->iface_ext_capa[i].ext_capa_mask);
3166 }
3167 os_free(drv->first_bss);
3168 #ifdef CONFIG_DRIVER_NL80211_QCA
3169 os_free(drv->pending_roam_data);
3170 #endif /* CONFIG_DRIVER_NL80211_QCA */
3171 os_free(drv);
3172 }
3173
3174
wpa_alg_to_cipher_suite(enum wpa_alg alg,size_t key_len)3175 static u32 wpa_alg_to_cipher_suite(enum wpa_alg alg, size_t key_len)
3176 {
3177 switch (alg) {
3178 case WPA_ALG_WEP:
3179 if (key_len == 5)
3180 return RSN_CIPHER_SUITE_WEP40;
3181 return RSN_CIPHER_SUITE_WEP104;
3182 case WPA_ALG_TKIP:
3183 return RSN_CIPHER_SUITE_TKIP;
3184 case WPA_ALG_CCMP:
3185 return RSN_CIPHER_SUITE_CCMP;
3186 case WPA_ALG_GCMP:
3187 return RSN_CIPHER_SUITE_GCMP;
3188 case WPA_ALG_CCMP_256:
3189 return RSN_CIPHER_SUITE_CCMP_256;
3190 case WPA_ALG_GCMP_256:
3191 return RSN_CIPHER_SUITE_GCMP_256;
3192 case WPA_ALG_BIP_CMAC_128:
3193 return RSN_CIPHER_SUITE_AES_128_CMAC;
3194 case WPA_ALG_BIP_GMAC_128:
3195 return RSN_CIPHER_SUITE_BIP_GMAC_128;
3196 case WPA_ALG_BIP_GMAC_256:
3197 return RSN_CIPHER_SUITE_BIP_GMAC_256;
3198 case WPA_ALG_BIP_CMAC_256:
3199 return RSN_CIPHER_SUITE_BIP_CMAC_256;
3200 case WPA_ALG_SMS4:
3201 return RSN_CIPHER_SUITE_SMS4;
3202 case WPA_ALG_KRK:
3203 return RSN_CIPHER_SUITE_KRK;
3204 case WPA_ALG_NONE:
3205 wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
3206 alg);
3207 return 0;
3208 }
3209
3210 wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
3211 alg);
3212 return 0;
3213 }
3214
3215
wpa_cipher_to_cipher_suite(unsigned int cipher)3216 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher)
3217 {
3218 switch (cipher) {
3219 case WPA_CIPHER_CCMP_256:
3220 return RSN_CIPHER_SUITE_CCMP_256;
3221 case WPA_CIPHER_GCMP_256:
3222 return RSN_CIPHER_SUITE_GCMP_256;
3223 case WPA_CIPHER_CCMP:
3224 return RSN_CIPHER_SUITE_CCMP;
3225 case WPA_CIPHER_GCMP:
3226 return RSN_CIPHER_SUITE_GCMP;
3227 case WPA_CIPHER_TKIP:
3228 return RSN_CIPHER_SUITE_TKIP;
3229 case WPA_CIPHER_WEP104:
3230 return RSN_CIPHER_SUITE_WEP104;
3231 case WPA_CIPHER_WEP40:
3232 return RSN_CIPHER_SUITE_WEP40;
3233 case WPA_CIPHER_GTK_NOT_USED:
3234 return RSN_CIPHER_SUITE_NO_GROUP_ADDRESSED;
3235 default:
3236 return 0;
3237 }
3238 }
3239
3240
wpa_cipher_to_cipher_suites(unsigned int ciphers,u32 suites[],int max_suites)3241 static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[],
3242 int max_suites)
3243 {
3244 int num_suites = 0;
3245
3246 if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256)
3247 suites[num_suites++] = RSN_CIPHER_SUITE_CCMP_256;
3248 if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256)
3249 suites[num_suites++] = RSN_CIPHER_SUITE_GCMP_256;
3250 if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP)
3251 suites[num_suites++] = RSN_CIPHER_SUITE_CCMP;
3252 if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP)
3253 suites[num_suites++] = RSN_CIPHER_SUITE_GCMP;
3254 if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP)
3255 suites[num_suites++] = RSN_CIPHER_SUITE_TKIP;
3256 if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104)
3257 suites[num_suites++] = RSN_CIPHER_SUITE_WEP104;
3258 if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40)
3259 suites[num_suites++] = RSN_CIPHER_SUITE_WEP40;
3260
3261 return num_suites;
3262 }
3263
3264
wpa_key_mgmt_to_suites(unsigned int key_mgmt_suites,u32 suites[],int max_suites)3265 static int wpa_key_mgmt_to_suites(unsigned int key_mgmt_suites, u32 suites[],
3266 int max_suites)
3267 {
3268 int num_suites = 0;
3269
3270 #define __AKM(a, b) \
3271 if (num_suites < max_suites && \
3272 (key_mgmt_suites & (WPA_KEY_MGMT_ ## a))) \
3273 suites[num_suites++] = (RSN_AUTH_KEY_MGMT_ ## b)
3274 __AKM(IEEE8021X, UNSPEC_802_1X);
3275 __AKM(PSK, PSK_OVER_802_1X);
3276 __AKM(FT_IEEE8021X, FT_802_1X);
3277 __AKM(FT_PSK, FT_PSK);
3278 __AKM(IEEE8021X_SHA256, 802_1X_SHA256);
3279 __AKM(PSK_SHA256, PSK_SHA256);
3280 __AKM(SAE, SAE);
3281 __AKM(SAE_EXT_KEY, SAE_EXT_KEY);
3282 __AKM(FT_SAE, FT_SAE);
3283 __AKM(FT_SAE_EXT_KEY, FT_SAE_EXT_KEY);
3284 __AKM(CCKM, CCKM);
3285 __AKM(OSEN, OSEN);
3286 __AKM(IEEE8021X_SUITE_B, 802_1X_SUITE_B);
3287 __AKM(IEEE8021X_SUITE_B_192, 802_1X_SUITE_B_192);
3288 __AKM(FILS_SHA256, FILS_SHA256);
3289 __AKM(FILS_SHA384, FILS_SHA384);
3290 __AKM(FT_FILS_SHA256, FT_FILS_SHA256);
3291 __AKM(FT_FILS_SHA384, FT_FILS_SHA384);
3292 __AKM(OWE, OWE);
3293 __AKM(DPP, DPP);
3294 __AKM(FT_IEEE8021X_SHA384, FT_802_1X_SHA384);
3295 #undef __AKM
3296
3297 return num_suites;
3298 }
3299
3300 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
wpa_driver_do_broadcom_acs(struct wpa_driver_nl80211_data * drv,struct drv_acs_params * params)3301 static int wpa_driver_do_broadcom_acs(struct wpa_driver_nl80211_data *drv,
3302 struct drv_acs_params *params)
3303 {
3304 struct nl_msg *msg;
3305 struct nlattr *data;
3306 int freq_list_len;
3307 int ret = -1;
3308
3309 freq_list_len = int_array_len(params->freq_list);
3310 wpa_printf(MSG_DEBUG, "%s: freq_list_len=%d",
3311 __func__, freq_list_len);
3312
3313 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
3314 if (!msg ||
3315 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
3316 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3317 BRCM_VENDOR_SCMD_ACS) ||
3318 !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3319 nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HW_MODE, params->hw_mode) ||
3320 nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HT_ENABLED,
3321 params->ht_enabled) ||
3322 nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HT40_ENABLED,
3323 params->ht40_enabled) ||
3324 nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_VHT_ENABLED,
3325 params->vht_enabled) ||
3326 nla_put_u16(msg, BRCM_VENDOR_ATTR_ACS_CHWIDTH, params->ch_width) ||
3327 (freq_list_len > 0 &&
3328 nla_put(msg, BRCM_VENDOR_ATTR_ACS_FREQ_LIST,
3329 sizeof(int) * freq_list_len, params->freq_list)))
3330 goto fail;
3331 nla_nest_end(msg, data);
3332
3333 wpa_printf(MSG_DEBUG,
3334 "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d BW: %d",
3335 params->hw_mode, params->ht_enabled, params->ht40_enabled,
3336 params->vht_enabled, params->ch_width);
3337
3338 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3339 if (ret) {
3340 wpa_printf(MSG_ERROR,
3341 "nl80211: BRCM Failed to invoke driver ACS function: %s",
3342 strerror(errno));
3343 }
3344
3345 msg = NULL;
3346 fail:
3347 nlmsg_free(msg);
3348 return ret;
3349 }
3350 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3351
3352 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
wpa_cross_akm_key_mgmt_to_suites(unsigned int key_mgmt_suites,u32 suites[],int max_suites)3353 static int wpa_cross_akm_key_mgmt_to_suites(unsigned int key_mgmt_suites, u32 suites[],
3354 int max_suites)
3355 {
3356 int num_suites = 0;
3357
3358 #define __AKM_TO_SUITES_ARRAY(a, b) \
3359 if (num_suites < max_suites && \
3360 (key_mgmt_suites & (WPA_KEY_MGMT_ ## a))) \
3361 suites[num_suites++] = (RSN_AUTH_KEY_MGMT_ ## b)
3362 __AKM_TO_SUITES_ARRAY(PSK, PSK_OVER_802_1X);
3363 __AKM_TO_SUITES_ARRAY(SAE, SAE);
3364 #undef __AKM_TO_SUITES_ARRAY
3365
3366 return num_suites;
3367 }
3368 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3369
3370 #ifdef CONFIG_DRIVER_NL80211_QCA
issue_key_mgmt_set_key(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len)3371 static int issue_key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
3372 const u8 *key, size_t key_len)
3373 {
3374 struct nl_msg *msg;
3375 int ret;
3376
3377 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD))
3378 return 0;
3379
3380 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
3381 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3382 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3383 QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY) ||
3384 nla_put(msg, NL80211_ATTR_VENDOR_DATA, key_len, key)) {
3385 nl80211_nlmsg_clear(msg);
3386 nlmsg_free(msg);
3387 return -1;
3388 }
3389 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3390 if (ret) {
3391 wpa_printf(MSG_DEBUG,
3392 "nl80211: Key management set key failed: ret=%d (%s)",
3393 ret, strerror(-ret));
3394 }
3395
3396 return ret;
3397 }
3398 #endif /* CONFIG_DRIVER_NL80211_QCA */
3399
3400
3401 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
key_mgmt_set_key(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len)3402 static int key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
3403 const u8 *key, size_t key_len)
3404 {
3405 struct nl_msg *msg;
3406 int ret;
3407 struct nlattr *params;
3408
3409 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
3410 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
3411 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3412 BRCM_VENDOR_SCMD_SET_PMK) ||
3413 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3414 nla_put(msg, BRCM_ATTR_DRIVER_KEY_PMK, key_len, key)) {
3415 nl80211_nlmsg_clear(msg);
3416 nlmsg_free(msg);
3417 return -ENOBUFS;
3418 }
3419 nla_nest_end(msg, params);
3420
3421 ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
3422 if (ret) {
3423 wpa_printf(MSG_DEBUG, "nl80211: Key mgmt set key failed: ret=%d (%s)",
3424 ret, strerror(-ret));
3425 }
3426
3427 return ret;
3428 }
3429 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3430
3431
nl80211_set_pmk(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len,const u8 * addr)3432 static int nl80211_set_pmk(struct wpa_driver_nl80211_data *drv,
3433 const u8 *key, size_t key_len,
3434 const u8 *addr)
3435 {
3436 struct nl_msg *msg = NULL;
3437 int ret;
3438
3439 /*
3440 * If the authenticator address is not set, assume it is
3441 * the current BSSID.
3442 */
3443 if (!addr && drv->associated)
3444 addr = drv->bssid;
3445 else if (!addr)
3446 return -1;
3447
3448 wpa_printf(MSG_DEBUG, "nl80211: Set PMK to the driver for " MACSTR,
3449 MAC2STR(addr));
3450 wpa_hexdump_key(MSG_DEBUG, "nl80211: PMK", key, key_len);
3451 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_PMK);
3452 if (!msg ||
3453 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
3454 nla_put(msg, NL80211_ATTR_PMK, key_len, key)) {
3455 nl80211_nlmsg_clear(msg);
3456 nlmsg_free(msg);
3457 return -ENOBUFS;
3458 }
3459
3460 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3461 if (ret) {
3462 wpa_printf(MSG_DEBUG, "nl80211: Set PMK failed: ret=%d (%s)",
3463 ret, strerror(-ret));
3464 }
3465
3466 return ret;
3467 }
3468
3469
wpa_driver_nl80211_set_key(struct i802_bss * bss,struct wpa_driver_set_key_params * params)3470 static int wpa_driver_nl80211_set_key(struct i802_bss *bss,
3471 struct wpa_driver_set_key_params *params)
3472 {
3473 struct wpa_driver_nl80211_data *drv = bss->drv;
3474 int ifindex;
3475 struct nl_msg *msg;
3476 struct nl_msg *key_msg;
3477 int ret;
3478 int skip_set_key = 1;
3479 const char *ifname = params->ifname;
3480 enum wpa_alg alg = params->alg;
3481 const u8 *addr = params->addr;
3482 int key_idx = params->key_idx;
3483 int set_tx = params->set_tx;
3484 const u8 *seq = params->seq;
3485 size_t seq_len = params->seq_len;
3486 const u8 *key = params->key;
3487 size_t key_len = params->key_len;
3488 int vlan_id = params->vlan_id;
3489 enum key_flag key_flag = params->key_flag;
3490 int link_id = params->link_id;
3491
3492 /* Ignore for P2P Device */
3493 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
3494 return 0;
3495
3496 ifindex = if_nametoindex(ifname);
3497 wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
3498 "set_tx=%d seq_len=%lu key_len=%lu key_flag=0x%x link_id=%d",
3499 __func__, ifindex, ifname, alg, addr, key_idx, set_tx,
3500 (unsigned long) seq_len, (unsigned long) key_len, key_flag,
3501 link_id);
3502
3503 if (check_key_flag(key_flag)) {
3504 wpa_printf(MSG_DEBUG, "%s: invalid key_flag", __func__);
3505 return -EINVAL;
3506 }
3507
3508 #ifdef CONFIG_DRIVER_NL80211_QCA
3509 if ((key_flag & KEY_FLAG_PMK) &&
3510 (drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD)) {
3511 wpa_printf(MSG_DEBUG, "%s: calling issue_key_mgmt_set_key",
3512 __func__);
3513 ret = issue_key_mgmt_set_key(drv, key, key_len);
3514 return ret;
3515 }
3516 #endif /* CONFIG_DRIVER_NL80211_QCA */
3517
3518 if (key_flag & KEY_FLAG_PMK) {
3519 if (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X)
3520 return nl80211_set_pmk(drv, key, key_len, addr);
3521 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
3522 if (drv->vendor_set_pmk) {
3523 wpa_printf(MSG_INFO, "nl80211: key_mgmt_set_key with key_len %lu", (unsigned long) key_len);
3524 return key_mgmt_set_key(drv, key, key_len);
3525 }
3526 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3527
3528 /* The driver does not have any offload mechanism for PMK, so
3529 * there is no need to configure this key. */
3530 return 0;
3531 }
3532
3533 ret = -ENOBUFS;
3534 key_msg = nlmsg_alloc();
3535 if (!key_msg)
3536 return ret;
3537
3538 if ((key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3539 KEY_FLAG_PAIRWISE_RX_TX_MODIFY) {
3540 wpa_printf(MSG_DEBUG,
3541 "nl80211: SET_KEY (pairwise RX/TX modify)");
3542 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
3543 if (!msg)
3544 goto fail2;
3545 } else if (alg == WPA_ALG_NONE && (key_flag & KEY_FLAG_RX_TX)) {
3546 wpa_printf(MSG_DEBUG, "%s: invalid key_flag to delete key",
3547 __func__);
3548 ret = -EINVAL;
3549 goto fail2;
3550 } else if (alg == WPA_ALG_NONE) {
3551 wpa_printf(MSG_DEBUG, "nl80211: DEL_KEY");
3552 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_DEL_KEY);
3553 if (!msg)
3554 goto fail2;
3555 } else {
3556 u32 suite;
3557
3558 suite = wpa_alg_to_cipher_suite(alg, key_len);
3559 if (!suite) {
3560 ret = -EINVAL;
3561 goto fail2;
3562 }
3563 wpa_printf(MSG_DEBUG, "nl80211: NEW_KEY");
3564 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_NEW_KEY);
3565 if (!msg)
3566 goto fail2;
3567 if (nla_put(key_msg, NL80211_KEY_DATA, key_len, key) ||
3568 nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite))
3569 goto fail;
3570 wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
3571
3572 if (seq && seq_len) {
3573 if (nla_put(key_msg, NL80211_KEY_SEQ, seq_len, seq))
3574 goto fail;
3575 wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ",
3576 seq, seq_len);
3577 }
3578 }
3579
3580 if (addr && !is_broadcast_ether_addr(addr)) {
3581 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
3582 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
3583 goto fail;
3584
3585 if ((key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3586 KEY_FLAG_PAIRWISE_RX ||
3587 (key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3588 KEY_FLAG_PAIRWISE_RX_TX_MODIFY) {
3589 if (nla_put_u8(key_msg, NL80211_KEY_MODE,
3590 key_flag == KEY_FLAG_PAIRWISE_RX ?
3591 NL80211_KEY_NO_TX : NL80211_KEY_SET_TX))
3592 goto fail;
3593 } else if ((key_flag & KEY_FLAG_GROUP_MASK) ==
3594 KEY_FLAG_GROUP_RX) {
3595 wpa_printf(MSG_DEBUG, " RSN IBSS RX GTK");
3596 if (nla_put_u32(key_msg, NL80211_KEY_TYPE,
3597 NL80211_KEYTYPE_GROUP))
3598 goto fail;
3599 } else if (!(key_flag & KEY_FLAG_PAIRWISE)) {
3600 wpa_printf(MSG_DEBUG,
3601 " key_flag missing PAIRWISE when setting a pairwise key");
3602 ret = -EINVAL;
3603 goto fail;
3604 } else if (alg == WPA_ALG_WEP &&
3605 (key_flag & KEY_FLAG_RX_TX) == KEY_FLAG_RX_TX) {
3606 wpa_printf(MSG_DEBUG, " unicast WEP key");
3607 skip_set_key = 0;
3608 } else {
3609 wpa_printf(MSG_DEBUG, " pairwise key");
3610 }
3611 } else if ((key_flag & KEY_FLAG_PAIRWISE) ||
3612 !(key_flag & KEY_FLAG_GROUP)) {
3613 wpa_printf(MSG_DEBUG,
3614 " invalid key_flag for a broadcast key");
3615 ret = -EINVAL;
3616 goto fail;
3617 } else {
3618 wpa_printf(MSG_DEBUG, " broadcast key");
3619 if (key_flag & KEY_FLAG_DEFAULT)
3620 skip_set_key = 0;
3621 }
3622 if (nla_put_u8(key_msg, NL80211_KEY_IDX, key_idx) ||
3623 nla_put_nested(msg, NL80211_ATTR_KEY, key_msg))
3624 goto fail;
3625 nl80211_nlmsg_clear(key_msg);
3626 nlmsg_free(key_msg);
3627 key_msg = NULL;
3628
3629 if (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD)) {
3630 wpa_printf(MSG_DEBUG, "nl80211: VLAN ID %d", vlan_id);
3631 if (nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id))
3632 goto fail;
3633 }
3634
3635 if (link_id != -1) {
3636 wpa_printf(MSG_DEBUG, "nl80211: Link ID %d", link_id);
3637 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id))
3638 goto fail;
3639 }
3640
3641 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3642 if ((ret == -ENOENT || ret == -ENOLINK) && alg == WPA_ALG_NONE)
3643 ret = 0;
3644 if (ret)
3645 wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s",
3646 ret, strerror(-ret));
3647
3648 /*
3649 * If we failed or don't need to set the key as default (below),
3650 * we're done here.
3651 */
3652 if (ret || skip_set_key)
3653 return ret;
3654 wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_SET_KEY - default key");
3655
3656 ret = -ENOBUFS;
3657 key_msg = nlmsg_alloc();
3658 if (!key_msg)
3659 return ret;
3660
3661 msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
3662 if (!msg)
3663 goto fail2;
3664 if (!key_msg ||
3665 nla_put_u8(key_msg, NL80211_KEY_IDX, key_idx) ||
3666 nla_put_flag(key_msg, wpa_alg_bip(alg) ?
3667 (key_idx == 6 || key_idx == 7 ?
3668 NL80211_KEY_DEFAULT_BEACON :
3669 NL80211_KEY_DEFAULT_MGMT) :
3670 NL80211_KEY_DEFAULT))
3671 goto fail;
3672 if (addr && is_broadcast_ether_addr(addr)) {
3673 struct nlattr *types;
3674
3675 types = nla_nest_start(key_msg, NL80211_KEY_DEFAULT_TYPES);
3676 if (!types ||
3677 nla_put_flag(key_msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST))
3678 goto fail;
3679 nla_nest_end(key_msg, types);
3680 } else if (addr) {
3681 struct nlattr *types;
3682
3683 types = nla_nest_start(key_msg, NL80211_KEY_DEFAULT_TYPES);
3684 if (!types ||
3685 nla_put_flag(key_msg, NL80211_KEY_DEFAULT_TYPE_UNICAST))
3686 goto fail;
3687 nla_nest_end(key_msg, types);
3688 }
3689
3690 if (nla_put_nested(msg, NL80211_ATTR_KEY, key_msg))
3691 goto fail;
3692 nl80211_nlmsg_clear(key_msg);
3693 nlmsg_free(key_msg);
3694 key_msg = NULL;
3695
3696 if (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD)) {
3697 wpa_printf(MSG_DEBUG, "nl80211: set_key default - VLAN ID %d",
3698 vlan_id);
3699 if (nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id))
3700 goto fail;
3701 }
3702
3703 if (link_id != -1) {
3704 wpa_printf(MSG_DEBUG, "nl80211: set_key default - Link ID %d",
3705 link_id);
3706 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id))
3707 goto fail;
3708 }
3709
3710 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3711 if (ret)
3712 wpa_printf(MSG_DEBUG,
3713 "nl80211: set_key default failed; err=%d %s",
3714 ret, strerror(-ret));
3715 return ret;
3716
3717 fail:
3718 nl80211_nlmsg_clear(msg);
3719 nlmsg_free(msg);
3720 fail2:
3721 nl80211_nlmsg_clear(key_msg);
3722 nlmsg_free(key_msg);
3723 return ret;
3724 }
3725
3726
nl_add_key(struct nl_msg * msg,enum wpa_alg alg,int key_idx,int defkey,const u8 * seq,size_t seq_len,const u8 * key,size_t key_len)3727 static int nl_add_key(struct nl_msg *msg, enum wpa_alg alg,
3728 int key_idx, int defkey,
3729 const u8 *seq, size_t seq_len,
3730 const u8 *key, size_t key_len)
3731 {
3732 struct nlattr *key_attr = nla_nest_start(msg, NL80211_ATTR_KEY);
3733 u32 suite;
3734
3735 if (!key_attr)
3736 return -1;
3737
3738 suite = wpa_alg_to_cipher_suite(alg, key_len);
3739 if (!suite)
3740 return -1;
3741
3742 if (defkey && wpa_alg_bip(alg)) {
3743 if (nla_put_flag(msg, NL80211_KEY_DEFAULT_MGMT))
3744 return -1;
3745 } else if (defkey) {
3746 if (nla_put_flag(msg, NL80211_KEY_DEFAULT))
3747 return -1;
3748 }
3749
3750 if (nla_put_u8(msg, NL80211_KEY_IDX, key_idx) ||
3751 nla_put_u32(msg, NL80211_KEY_CIPHER, suite) ||
3752 (seq && seq_len &&
3753 nla_put(msg, NL80211_KEY_SEQ, seq_len, seq)) ||
3754 nla_put(msg, NL80211_KEY_DATA, key_len, key))
3755 return -1;
3756
3757 nla_nest_end(msg, key_attr);
3758
3759 return 0;
3760 }
3761
3762
nl80211_set_conn_keys(struct wpa_driver_associate_params * params,struct nl_msg * msg)3763 static int nl80211_set_conn_keys(struct wpa_driver_associate_params *params,
3764 struct nl_msg *msg)
3765 {
3766 int i, privacy = 0;
3767 struct nlattr *nl_keys, *nl_key;
3768
3769 for (i = 0; i < 4; i++) {
3770 if (!params->wep_key[i])
3771 continue;
3772 privacy = 1;
3773 break;
3774 }
3775 if (params->wps == WPS_MODE_PRIVACY)
3776 privacy = 1;
3777 if (params->pairwise_suite &&
3778 params->pairwise_suite != WPA_CIPHER_NONE)
3779 privacy = 1;
3780
3781 if (!privacy)
3782 return 0;
3783
3784 if (nla_put_flag(msg, NL80211_ATTR_PRIVACY))
3785 return -ENOBUFS;
3786
3787 nl_keys = nla_nest_start(msg, NL80211_ATTR_KEYS);
3788 if (!nl_keys)
3789 return -ENOBUFS;
3790
3791 for (i = 0; i < 4; i++) {
3792 if (!params->wep_key[i])
3793 continue;
3794
3795 nl_key = nla_nest_start(msg, i);
3796 if (!nl_key ||
3797 nla_put(msg, NL80211_KEY_DATA, params->wep_key_len[i],
3798 params->wep_key[i]) ||
3799 nla_put_u32(msg, NL80211_KEY_CIPHER,
3800 params->wep_key_len[i] == 5 ?
3801 RSN_CIPHER_SUITE_WEP40 :
3802 RSN_CIPHER_SUITE_WEP104) ||
3803 nla_put_u8(msg, NL80211_KEY_IDX, i) ||
3804 (i == params->wep_tx_keyidx &&
3805 nla_put_flag(msg, NL80211_KEY_DEFAULT)))
3806 return -ENOBUFS;
3807
3808 nla_nest_end(msg, nl_key);
3809 }
3810 nla_nest_end(msg, nl_keys);
3811
3812 return 0;
3813 }
3814
3815
wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data * drv,const u8 * addr,int cmd,u16 reason_code,int local_state_change,struct i802_bss * bss)3816 int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
3817 const u8 *addr, int cmd, u16 reason_code,
3818 int local_state_change,
3819 struct i802_bss *bss)
3820 {
3821 int ret;
3822 struct nl_msg *msg;
3823 struct nl_sock *nl_connect = get_connect_handle(bss);
3824
3825 if (!(msg = nl80211_drv_msg(drv, 0, cmd)) ||
3826 nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code) ||
3827 (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
3828 (local_state_change &&
3829 nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))) {
3830 nlmsg_free(msg);
3831 return -1;
3832 }
3833
3834 if (nl_connect)
3835 ret = send_and_recv(drv->global, nl_connect, msg,
3836 process_bss_event, bss, NULL, NULL);
3837 else
3838 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3839 if (ret) {
3840 wpa_dbg(drv->ctx, MSG_DEBUG,
3841 "nl80211: MLME command failed: reason=%u ret=%d (%s)",
3842 reason_code, ret, strerror(-ret));
3843 }
3844 return ret;
3845 }
3846
3847
wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data * drv,u16 reason_code,struct i802_bss * bss)3848 static int wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data *drv,
3849 u16 reason_code,
3850 struct i802_bss *bss)
3851 {
3852 int ret;
3853 int drv_associated = drv->associated;
3854
3855 wpa_printf(MSG_DEBUG, "%s(reason_code=%d)", __func__, reason_code);
3856 nl80211_mark_disconnected(drv);
3857 /* Disconnect command doesn't need BSSID - it uses cached value */
3858 ret = wpa_driver_nl80211_mlme(drv, NULL, NL80211_CMD_DISCONNECT,
3859 reason_code, 0, bss);
3860 /*
3861 * For locally generated disconnect, supplicant already generates a
3862 * DEAUTH event, so ignore the event from NL80211.
3863 */
3864 drv->ignore_next_local_disconnect = drv_associated && (ret == 0);
3865
3866 return ret;
3867 }
3868
3869
wpa_driver_nl80211_deauthenticate(struct i802_bss * bss,const u8 * addr,u16 reason_code)3870 static int wpa_driver_nl80211_deauthenticate(struct i802_bss *bss,
3871 const u8 *addr, u16 reason_code)
3872 {
3873 struct wpa_driver_nl80211_data *drv = bss->drv;
3874 int ret;
3875 int drv_associated = drv->associated;
3876
3877 if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
3878 nl80211_mark_disconnected(drv);
3879 return nl80211_leave_ibss(drv, 1);
3880 }
3881 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
3882 return wpa_driver_nl80211_disconnect(drv, reason_code, bss);
3883 }
3884 wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " reason_code=%d)",
3885 __func__, MAC2STR(addr), reason_code);
3886 nl80211_mark_disconnected(drv);
3887 ret = wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
3888 reason_code, 0, bss);
3889 /*
3890 * For locally generated deauthenticate, supplicant already generates a
3891 * DEAUTH event, so ignore the event from NL80211.
3892 */
3893 drv->ignore_next_local_deauth = drv_associated && (ret == 0);
3894
3895 return ret;
3896 }
3897
3898
nl80211_copy_auth_params(struct wpa_driver_nl80211_data * drv,struct wpa_driver_auth_params * params)3899 static void nl80211_copy_auth_params(struct wpa_driver_nl80211_data *drv,
3900 struct wpa_driver_auth_params *params)
3901 {
3902 int i;
3903
3904 drv->auth_freq = params->freq;
3905 drv->auth_alg = params->auth_alg;
3906 drv->auth_wep_tx_keyidx = params->wep_tx_keyidx;
3907 drv->auth_local_state_change = params->local_state_change;
3908 drv->auth_p2p = params->p2p;
3909
3910 if (params->bssid)
3911 os_memcpy(drv->auth_bssid_, params->bssid, ETH_ALEN);
3912 else
3913 os_memset(drv->auth_bssid_, 0, ETH_ALEN);
3914
3915 if (params->ssid) {
3916 os_memcpy(drv->auth_ssid, params->ssid, params->ssid_len);
3917 drv->auth_ssid_len = params->ssid_len;
3918 } else
3919 drv->auth_ssid_len = 0;
3920
3921
3922 os_free(drv->auth_ie);
3923 drv->auth_ie = NULL;
3924 drv->auth_ie_len = 0;
3925 if (params->ie) {
3926 drv->auth_ie = os_malloc(params->ie_len);
3927 if (drv->auth_ie) {
3928 os_memcpy(drv->auth_ie, params->ie, params->ie_len);
3929 drv->auth_ie_len = params->ie_len;
3930 }
3931 }
3932
3933 if (params->mld && params->ap_mld_addr) {
3934 drv->auth_mld = params->mld;
3935 drv->auth_mld_link_id = params->mld_link_id;
3936 os_memcpy(drv->auth_ap_mld_addr, params->ap_mld_addr, ETH_ALEN);
3937 } else {
3938 drv->auth_mld = false;
3939 drv->auth_mld_link_id = -1;
3940 }
3941
3942 os_free(drv->auth_data);
3943 drv->auth_data = NULL;
3944 drv->auth_data_len = 0;
3945 if (params->auth_data) {
3946 drv->auth_data = os_memdup(params->auth_data,
3947 params->auth_data_len);
3948 if (drv->auth_data)
3949 drv->auth_data_len = params->auth_data_len;
3950 }
3951
3952 for (i = 0; i < 4; i++) {
3953 if (params->wep_key[i] && params->wep_key_len[i] &&
3954 params->wep_key_len[i] <= 16) {
3955 os_memcpy(drv->auth_wep_key[i], params->wep_key[i],
3956 params->wep_key_len[i]);
3957 drv->auth_wep_key_len[i] = params->wep_key_len[i];
3958 } else
3959 drv->auth_wep_key_len[i] = 0;
3960 }
3961 }
3962
3963
nl80211_unmask_11b_rates(struct i802_bss * bss)3964 static void nl80211_unmask_11b_rates(struct i802_bss *bss)
3965 {
3966 struct wpa_driver_nl80211_data *drv = bss->drv;
3967
3968 if (is_p2p_net_interface(drv->nlmode) || !drv->disabled_11b_rates)
3969 return;
3970
3971 /*
3972 * Looks like we failed to unmask 11b rates previously. This could
3973 * happen, e.g., if the interface was down at the point in time when a
3974 * P2P group was terminated.
3975 */
3976 wpa_printf(MSG_DEBUG,
3977 "nl80211: Interface %s mode is for non-P2P, but 11b rates were disabled - re-enable them",
3978 bss->ifname);
3979 nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3980 }
3981
3982
get_nl_auth_type(int wpa_auth_alg)3983 static enum nl80211_auth_type get_nl_auth_type(int wpa_auth_alg)
3984 {
3985 if (wpa_auth_alg & WPA_AUTH_ALG_OPEN)
3986 return NL80211_AUTHTYPE_OPEN_SYSTEM;
3987 if (wpa_auth_alg & WPA_AUTH_ALG_SHARED)
3988 return NL80211_AUTHTYPE_SHARED_KEY;
3989 if (wpa_auth_alg & WPA_AUTH_ALG_LEAP)
3990 return NL80211_AUTHTYPE_NETWORK_EAP;
3991 if (wpa_auth_alg & WPA_AUTH_ALG_FT)
3992 return NL80211_AUTHTYPE_FT;
3993 if (wpa_auth_alg & WPA_AUTH_ALG_SAE)
3994 return NL80211_AUTHTYPE_SAE;
3995 if (wpa_auth_alg & WPA_AUTH_ALG_FILS)
3996 return NL80211_AUTHTYPE_FILS_SK;
3997 if (wpa_auth_alg & WPA_AUTH_ALG_FILS_SK_PFS)
3998 return NL80211_AUTHTYPE_FILS_SK_PFS;
3999
4000 return NL80211_AUTHTYPE_MAX;
4001 }
4002
4003
wpa_driver_nl80211_authenticate(struct i802_bss * bss,struct wpa_driver_auth_params * params)4004 static int wpa_driver_nl80211_authenticate(
4005 struct i802_bss *bss, struct wpa_driver_auth_params *params)
4006 {
4007 struct wpa_driver_nl80211_data *drv = bss->drv;
4008 int ret = -1, i;
4009 struct nl_msg *msg;
4010 enum nl80211_auth_type type;
4011 enum nl80211_iftype nlmode;
4012 int count = 0;
4013 int is_retry;
4014 struct wpa_driver_set_key_params p;
4015
4016 nl80211_unmask_11b_rates(bss);
4017
4018 is_retry = drv->retry_auth;
4019 drv->retry_auth = 0;
4020 drv->ignore_deauth_event = 0;
4021
4022 nl80211_mark_disconnected(drv);
4023 os_memset(drv->auth_bssid, 0, ETH_ALEN);
4024 if (params->bssid)
4025 os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
4026 else
4027 os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
4028 /* FIX: IBSS mode */
4029 nlmode = params->p2p ?
4030 NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
4031 if (drv->nlmode != nlmode &&
4032 wpa_driver_nl80211_set_mode(bss, nlmode) < 0)
4033 return -1;
4034
4035 retry:
4036 wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
4037 drv->ifindex);
4038
4039 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_AUTHENTICATE);
4040 if (!msg)
4041 goto fail;
4042
4043 os_memset(&p, 0, sizeof(p));
4044 p.ifname = bss->ifname;
4045 p.alg = WPA_ALG_WEP;
4046 p.link_id = -1;
4047 for (i = 0; i < 4; i++) {
4048 if (!params->wep_key[i])
4049 continue;
4050 p.key_idx = i;
4051 p.set_tx = i == params->wep_tx_keyidx;
4052 p.key = params->wep_key[i];
4053 p.key_len = params->wep_key_len[i];
4054 p.key_flag = i == params->wep_tx_keyidx ?
4055 KEY_FLAG_GROUP_RX_TX_DEFAULT :
4056 KEY_FLAG_GROUP_RX_TX;
4057 wpa_driver_nl80211_set_key(bss, &p);
4058 if (params->wep_tx_keyidx != i)
4059 continue;
4060 if (nl_add_key(msg, WPA_ALG_WEP, i, 1, NULL, 0,
4061 params->wep_key[i], params->wep_key_len[i]))
4062 goto fail;
4063 }
4064
4065 if (params->bssid) {
4066 wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
4067 MAC2STR(params->bssid));
4068 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
4069 goto fail;
4070 }
4071 if (params->freq) {
4072 wpa_printf(MSG_DEBUG, " * freq=%d", params->freq);
4073 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq))
4074 goto fail;
4075 }
4076 if (params->ssid) {
4077 wpa_printf(MSG_DEBUG, " * SSID=%s",
4078 wpa_ssid_txt(params->ssid, params->ssid_len));
4079 if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
4080 params->ssid))
4081 goto fail;
4082 }
4083 wpa_hexdump(MSG_DEBUG, " * IEs", params->ie, params->ie_len);
4084 if (params->ie &&
4085 nla_put(msg, NL80211_ATTR_IE, params->ie_len, params->ie))
4086 goto fail;
4087 if (params->auth_data) {
4088 wpa_hexdump(MSG_DEBUG, " * auth_data", params->auth_data,
4089 params->auth_data_len);
4090 if (nla_put(msg, NL80211_ATTR_SAE_DATA, params->auth_data_len,
4091 params->auth_data))
4092 goto fail;
4093 }
4094 type = get_nl_auth_type(params->auth_alg);
4095 wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
4096 if (type == NL80211_AUTHTYPE_MAX ||
4097 nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
4098 goto fail;
4099 if (params->local_state_change) {
4100 wpa_printf(MSG_DEBUG, " * Local state change only");
4101 if (nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))
4102 goto fail;
4103 }
4104
4105 if (params->mld && params->ap_mld_addr) {
4106 wpa_printf(MSG_DEBUG, " * MLD: link_id=%u, MLD addr=" MACSTR,
4107 params->mld_link_id, MAC2STR(params->ap_mld_addr));
4108
4109 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
4110 params->mld_link_id) ||
4111 nla_put(msg, NL80211_ATTR_MLD_ADDR, ETH_ALEN,
4112 params->ap_mld_addr))
4113 goto fail;
4114 }
4115
4116 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4117 msg = NULL;
4118 if (ret) {
4119 wpa_dbg(drv->ctx, MSG_DEBUG,
4120 "nl80211: MLME command failed (auth): count=%d ret=%d (%s)",
4121 count, ret, strerror(-ret));
4122 count++;
4123 if ((ret == -EALREADY || ret == -EEXIST) && count == 1 &&
4124 params->bssid && !params->local_state_change) {
4125 /*
4126 * mac80211 does not currently accept new
4127 * authentication if we are already authenticated. As a
4128 * workaround, force deauthentication and try again.
4129 */
4130 wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
4131 "after forced deauthentication");
4132 drv->ignore_deauth_event = 1;
4133 wpa_driver_nl80211_deauthenticate(
4134 bss, params->bssid,
4135 WLAN_REASON_PREV_AUTH_NOT_VALID);
4136 nlmsg_free(msg);
4137 goto retry;
4138 }
4139
4140 if (ret == -ENOENT && params->freq && !is_retry) {
4141 /*
4142 * cfg80211 has likely expired the BSS entry even
4143 * though it was previously available in our internal
4144 * BSS table. To recover quickly, start a single
4145 * channel scan on the specified channel.
4146 */
4147 struct wpa_driver_scan_params scan;
4148 int freqs[2];
4149
4150 os_memset(&scan, 0, sizeof(scan));
4151 scan.num_ssids = 1;
4152 if (params->ssid) {
4153 scan.ssids[0].ssid = params->ssid;
4154 scan.ssids[0].ssid_len = params->ssid_len;
4155 }
4156 freqs[0] = params->freq;
4157 freqs[1] = 0;
4158 scan.freqs = freqs;
4159 wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
4160 "channel scan to refresh cfg80211 BSS "
4161 "entry");
4162 ret = wpa_driver_nl80211_scan(bss, &scan);
4163 if (ret == 0) {
4164 nl80211_copy_auth_params(drv, params);
4165 drv->scan_for_auth = 1;
4166 }
4167 } else if (is_retry) {
4168 /*
4169 * Need to indicate this with an event since the return
4170 * value from the retry is not delivered to core code.
4171 */
4172 union wpa_event_data event;
4173 wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
4174 "failed");
4175 os_memset(&event, 0, sizeof(event));
4176 os_memcpy(event.timeout_event.addr, drv->auth_bssid_,
4177 ETH_ALEN);
4178 wpa_supplicant_event(drv->ctx, EVENT_AUTH_TIMED_OUT,
4179 &event);
4180 }
4181 } else {
4182 wpa_printf(MSG_DEBUG,
4183 "nl80211: Authentication request send successfully");
4184 }
4185
4186 fail:
4187 nlmsg_free(msg);
4188 return ret;
4189 }
4190
4191
wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data * drv)4192 int wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data *drv)
4193 {
4194 struct wpa_driver_auth_params params;
4195 struct i802_bss *bss = drv->first_bss;
4196 int i;
4197
4198 wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
4199
4200 os_memset(¶ms, 0, sizeof(params));
4201 params.freq = drv->auth_freq;
4202 params.auth_alg = drv->auth_alg;
4203 params.wep_tx_keyidx = drv->auth_wep_tx_keyidx;
4204 params.local_state_change = drv->auth_local_state_change;
4205 params.p2p = drv->auth_p2p;
4206
4207 if (!is_zero_ether_addr(drv->auth_bssid_))
4208 params.bssid = drv->auth_bssid_;
4209
4210 if (drv->auth_ssid_len) {
4211 params.ssid = drv->auth_ssid;
4212 params.ssid_len = drv->auth_ssid_len;
4213 }
4214
4215 params.ie = drv->auth_ie;
4216 params.ie_len = drv->auth_ie_len;
4217 params.auth_data = drv->auth_data;
4218 params.auth_data_len = drv->auth_data_len;
4219 params.mld = drv->auth_mld;
4220 params.mld_link_id = drv->auth_mld_link_id;
4221 if (drv->auth_mld)
4222 params.ap_mld_addr = drv->auth_ap_mld_addr;
4223
4224 for (i = 0; i < 4; i++) {
4225 if (drv->auth_wep_key_len[i]) {
4226 params.wep_key[i] = drv->auth_wep_key[i];
4227 params.wep_key_len[i] = drv->auth_wep_key_len[i];
4228 }
4229 }
4230
4231 drv->retry_auth = 1;
4232 return wpa_driver_nl80211_authenticate(bss, ¶ms);
4233 }
4234
4235
wpa_driver_nl80211_send_mlme(struct i802_bss * bss,const u8 * data,size_t data_len,int noack,unsigned int freq,int no_cck,int offchanok,unsigned int wait_time,const u16 * csa_offs,size_t csa_offs_len,int no_encrypt)4236 static int wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data,
4237 size_t data_len, int noack,
4238 unsigned int freq, int no_cck,
4239 int offchanok,
4240 unsigned int wait_time,
4241 const u16 *csa_offs,
4242 size_t csa_offs_len, int no_encrypt)
4243 {
4244 struct wpa_driver_nl80211_data *drv = bss->drv;
4245 struct ieee80211_mgmt *mgmt;
4246 int encrypt = !no_encrypt;
4247 u16 fc;
4248 int use_cookie = 1;
4249 int res;
4250
4251 mgmt = (struct ieee80211_mgmt *) data;
4252 fc = le_to_host16(mgmt->frame_control);
4253 wpa_printf(MSG_DEBUG, "nl80211: send_mlme - da=" MACSTR
4254 " noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u no_encrypt=%d fc=0x%x (%s) nlmode=%d",
4255 MAC2STR(mgmt->da), noack, freq, no_cck, offchanok, wait_time,
4256 no_encrypt, fc, fc2str(fc), drv->nlmode);
4257
4258 if ((is_sta_interface(drv->nlmode) ||
4259 drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) &&
4260 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4261 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_RESP) {
4262 /*
4263 * The use of last_mgmt_freq is a bit of a hack,
4264 * but it works due to the single-threaded nature
4265 * of wpa_supplicant.
4266 */
4267 if (freq == 0) {
4268 wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
4269 drv->last_mgmt_freq);
4270 freq = drv->last_mgmt_freq;
4271 }
4272 wait_time = 0;
4273 use_cookie = 0;
4274 no_cck = 1;
4275 offchanok = 1;
4276 goto send_frame_cmd;
4277 }
4278
4279 if (drv->device_ap_sme && is_ap_interface(drv->nlmode)) {
4280 if (freq == 0) {
4281 wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
4282 bss->flink->freq);
4283 freq = bss->flink->freq;
4284 }
4285 if ((int) freq == bss->flink->freq)
4286 wait_time = 0;
4287 goto send_frame_cmd;
4288 }
4289
4290 if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4291 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
4292 /*
4293 * Only one of the authentication frame types is encrypted.
4294 * In order for static WEP encryption to work properly (i.e.,
4295 * to not encrypt the frame), we need to tell mac80211 about
4296 * the frames that must not be encrypted.
4297 */
4298 u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
4299 u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
4300 if (auth_alg != WLAN_AUTH_SHARED_KEY || auth_trans != 3)
4301 encrypt = 0;
4302 }
4303
4304 if (is_sta_interface(drv->nlmode) &&
4305 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4306 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
4307 if (freq == 0 &&
4308 (drv->capa.flags & WPA_DRIVER_FLAGS_SAE) &&
4309 !(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
4310 freq = nl80211_get_assoc_freq(drv);
4311 wpa_printf(MSG_DEBUG,
4312 "nl80211: send_mlme - Use assoc_freq=%u for external auth",
4313 freq);
4314 }
4315
4316 /* Allow off channel for PASN authentication */
4317 if (data_len >= IEEE80211_HDRLEN + 2 &&
4318 WPA_GET_LE16(data + IEEE80211_HDRLEN) == WLAN_AUTH_PASN &&
4319 !offchanok) {
4320 wpa_printf(MSG_DEBUG,
4321 "nl80211: send_mlme: allow off channel for PASN");
4322 offchanok = 1;
4323 }
4324 }
4325
4326 #ifdef CONFIG_PASN
4327 if (is_sta_interface(drv->nlmode) &&
4328 WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4329 WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_DEAUTH) {
4330 wpa_printf(MSG_DEBUG,
4331 "nl80211: send_mlme: allow Deauthentication frame for PASN");
4332
4333 use_cookie = 0;
4334 offchanok = 1;
4335 goto send_frame_cmd;
4336 }
4337 #endif /* CONFIG_PASN */
4338
4339 if (freq == 0 && drv->nlmode == NL80211_IFTYPE_ADHOC) {
4340 freq = nl80211_get_assoc_freq(drv);
4341 wpa_printf(MSG_DEBUG,
4342 "nl80211: send_mlme - Use assoc_freq=%u for IBSS",
4343 freq);
4344 }
4345 if (freq == 0) {
4346 wpa_printf(MSG_DEBUG, "nl80211: send_mlme - Use bss->freq=%u",
4347 bss->flink->freq);
4348 freq = bss->flink->freq;
4349 }
4350
4351 if (drv->use_monitor && is_ap_interface(drv->nlmode)) {
4352 wpa_printf(MSG_DEBUG,
4353 "nl80211: send_frame(freq=%u bss->freq=%u) -> send_monitor",
4354 freq, bss->flink->freq);
4355 return nl80211_send_monitor(drv, data, data_len, encrypt,
4356 noack);
4357 }
4358
4359 if (noack || WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT ||
4360 WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_ACTION)
4361 use_cookie = 0;
4362 send_frame_cmd:
4363 #ifdef CONFIG_TESTING_OPTIONS
4364 if (no_encrypt && !encrypt && !drv->use_monitor) {
4365 wpa_printf(MSG_DEBUG,
4366 "nl80211: Request to send an unencrypted frame - use a monitor interface for this");
4367 if (nl80211_create_monitor_interface(drv) < 0)
4368 return -1;
4369 res = nl80211_send_monitor(drv, data, data_len, encrypt,
4370 noack);
4371 nl80211_remove_monitor_interface(drv);
4372 return res;
4373 }
4374 #endif /* CONFIG_TESTING_OPTIONS */
4375
4376 wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame_cmd");
4377 res = nl80211_send_frame_cmd(bss, freq, wait_time, data, data_len,
4378 use_cookie, no_cck, noack, offchanok,
4379 csa_offs, csa_offs_len);
4380
4381 return res;
4382 }
4383
4384
nl80211_put_basic_rates(struct nl_msg * msg,const int * basic_rates)4385 static int nl80211_put_basic_rates(struct nl_msg *msg, const int *basic_rates)
4386 {
4387 u8 rates[NL80211_MAX_SUPP_RATES];
4388 u8 rates_len = 0;
4389 int i;
4390
4391 if (!basic_rates)
4392 return 0;
4393
4394 for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0; i++)
4395 rates[rates_len++] = basic_rates[i] / 5;
4396
4397 return nla_put(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
4398 }
4399
4400
nl80211_set_bss(struct i802_bss * bss,int cts,int preamble,int slot,int ht_opmode,int ap_isolate,const int * basic_rates)4401 static int nl80211_set_bss(struct i802_bss *bss, int cts, int preamble,
4402 int slot, int ht_opmode, int ap_isolate,
4403 const int *basic_rates)
4404 {
4405 struct wpa_driver_nl80211_data *drv = bss->drv;
4406 struct nl_msg *msg;
4407
4408 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_BSS)) ||
4409 (cts >= 0 &&
4410 nla_put_u8(msg, NL80211_ATTR_BSS_CTS_PROT, cts)) ||
4411 (preamble >= 0 &&
4412 nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble)) ||
4413 (slot >= 0 &&
4414 nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot)) ||
4415 (ht_opmode >= 0 &&
4416 nla_put_u16(msg, NL80211_ATTR_BSS_HT_OPMODE, ht_opmode)) ||
4417 (ap_isolate >= 0 &&
4418 nla_put_u8(msg, NL80211_ATTR_AP_ISOLATE, ap_isolate)) ||
4419 nl80211_put_basic_rates(msg, basic_rates)) {
4420 nlmsg_free(msg);
4421 return -ENOBUFS;
4422 }
4423
4424 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4425 }
4426
4427
wpa_driver_nl80211_set_acl(void * priv,struct hostapd_acl_params * params)4428 static int wpa_driver_nl80211_set_acl(void *priv,
4429 struct hostapd_acl_params *params)
4430 {
4431 struct i802_bss *bss = priv;
4432 struct wpa_driver_nl80211_data *drv = bss->drv;
4433 struct nl_msg *msg;
4434 struct nl_msg *acl;
4435 unsigned int i;
4436 int ret;
4437 size_t acl_nla_sz, acl_nlmsg_sz, nla_sz, nlmsg_sz;
4438
4439 if (!(drv->capa.max_acl_mac_addrs))
4440 return -ENOTSUP;
4441
4442 if (params->num_mac_acl > drv->capa.max_acl_mac_addrs)
4443 return -ENOTSUP;
4444
4445 wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
4446 params->acl_policy ? "Accept" : "Deny", params->num_mac_acl);
4447
4448 acl_nla_sz = nla_total_size(ETH_ALEN) * params->num_mac_acl;
4449 acl_nlmsg_sz = nlmsg_total_size(acl_nla_sz);
4450 acl = nlmsg_alloc_size(acl_nlmsg_sz);
4451 if (!acl)
4452 return -ENOMEM;
4453 for (i = 0; i < params->num_mac_acl; i++) {
4454 if (nla_put(acl, i + 1, ETH_ALEN, params->mac_acl[i].addr)) {
4455 nlmsg_free(acl);
4456 return -ENOMEM;
4457 }
4458 }
4459
4460 /*
4461 * genetlink message header (Length of user header is 0) +
4462 * u32 attr: NL80211_ATTR_IFINDEX +
4463 * u32 attr: NL80211_ATTR_ACL_POLICY +
4464 * nested acl attr
4465 */
4466 nla_sz = GENL_HDRLEN +
4467 nla_total_size(4) * 2 +
4468 nla_total_size(acl_nla_sz);
4469 nlmsg_sz = nlmsg_total_size(nla_sz);
4470 if (!(msg = nl80211_ifindex_msg_build(drv, nlmsg_alloc_size(nlmsg_sz),
4471 drv->ifindex, 0,
4472 NL80211_CMD_SET_MAC_ACL)) ||
4473 nla_put_u32(msg, NL80211_ATTR_ACL_POLICY, params->acl_policy ?
4474 NL80211_ACL_POLICY_DENY_UNLESS_LISTED :
4475 NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED) ||
4476 nla_put_nested(msg, NL80211_ATTR_MAC_ADDRS, acl)) {
4477 nlmsg_free(msg);
4478 nlmsg_free(acl);
4479 return -ENOMEM;
4480 }
4481 nlmsg_free(acl);
4482
4483 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4484 if (ret) {
4485 wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
4486 ret, strerror(-ret));
4487 }
4488
4489 return ret;
4490 }
4491
4492
nl80211_put_beacon_int(struct nl_msg * msg,int beacon_int)4493 static int nl80211_put_beacon_int(struct nl_msg *msg, int beacon_int)
4494 {
4495 if (beacon_int > 0) {
4496 wpa_printf(MSG_DEBUG, " * beacon_int=%d", beacon_int);
4497 return nla_put_u32(msg, NL80211_ATTR_BEACON_INTERVAL,
4498 beacon_int);
4499 }
4500
4501 return 0;
4502 }
4503
4504
nl80211_put_dtim_period(struct nl_msg * msg,int dtim_period)4505 static int nl80211_put_dtim_period(struct nl_msg *msg, int dtim_period)
4506 {
4507 if (dtim_period > 0) {
4508 wpa_printf(MSG_DEBUG, " * dtim_period=%d", dtim_period);
4509 return nla_put_u32(msg, NL80211_ATTR_DTIM_PERIOD, dtim_period);
4510 }
4511
4512 return 0;
4513 }
4514
4515
4516 #ifdef CONFIG_MESH
nl80211_set_mesh_config(void * priv,struct wpa_driver_mesh_bss_params * params)4517 static int nl80211_set_mesh_config(void *priv,
4518 struct wpa_driver_mesh_bss_params *params)
4519 {
4520 struct i802_bss *bss = priv;
4521 struct wpa_driver_nl80211_data *drv = bss->drv;
4522 struct nl_msg *msg;
4523 int ret;
4524
4525 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_MESH_CONFIG);
4526 if (!msg)
4527 return -1;
4528
4529 ret = nl80211_put_mesh_config(msg, params);
4530 if (ret < 0) {
4531 nlmsg_free(msg);
4532 return ret;
4533 }
4534
4535 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4536 if (ret) {
4537 wpa_printf(MSG_ERROR,
4538 "nl80211: Mesh config set failed: %d (%s)",
4539 ret, strerror(-ret));
4540 return ret;
4541 }
4542 return 0;
4543 }
4544 #endif /* CONFIG_MESH */
4545
4546
nl80211_put_beacon_rate(struct nl_msg * msg,u64 flags,u64 flags2,struct wpa_driver_ap_params * params)4547 static int nl80211_put_beacon_rate(struct nl_msg *msg, u64 flags, u64 flags2,
4548 struct wpa_driver_ap_params *params)
4549 {
4550 struct nlattr *bands, *band;
4551 struct nl80211_txrate_vht vht_rate;
4552 struct nl80211_txrate_he he_rate;
4553
4554 if (!params->freq ||
4555 (params->beacon_rate == 0 &&
4556 params->rate_type == BEACON_RATE_LEGACY))
4557 return 0;
4558
4559 bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
4560 if (!bands)
4561 return -1;
4562
4563 switch (params->freq->mode) {
4564 case HOSTAPD_MODE_IEEE80211B:
4565 case HOSTAPD_MODE_IEEE80211G:
4566 band = nla_nest_start(msg, NL80211_BAND_2GHZ);
4567 break;
4568 case HOSTAPD_MODE_IEEE80211A:
4569 if (is_6ghz_freq(params->freq->freq))
4570 band = nla_nest_start(msg, NL80211_BAND_6GHZ);
4571 else
4572 band = nla_nest_start(msg, NL80211_BAND_5GHZ);
4573 break;
4574 case HOSTAPD_MODE_IEEE80211AD:
4575 band = nla_nest_start(msg, NL80211_BAND_60GHZ);
4576 break;
4577 default:
4578 return 0;
4579 }
4580
4581 if (!band)
4582 return -1;
4583
4584 os_memset(&vht_rate, 0, sizeof(vht_rate));
4585 os_memset(&he_rate, 0, sizeof(he_rate));
4586
4587 switch (params->rate_type) {
4588 case BEACON_RATE_LEGACY:
4589 if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_LEGACY)) {
4590 wpa_printf(MSG_INFO,
4591 "nl80211: Driver does not support setting Beacon frame rate (legacy)");
4592 return -1;
4593 }
4594
4595 if (nla_put_u8(msg, NL80211_TXRATE_LEGACY,
4596 (u8) params->beacon_rate / 5) ||
4597 nla_put(msg, NL80211_TXRATE_HT, 0, NULL) ||
4598 (params->freq->vht_enabled &&
4599 nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4600 &vht_rate)))
4601 return -1;
4602
4603 wpa_printf(MSG_DEBUG, " * beacon_rate = legacy:%u (* 100 kbps)",
4604 params->beacon_rate);
4605 break;
4606 case BEACON_RATE_HT:
4607 if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_HT)) {
4608 wpa_printf(MSG_INFO,
4609 "nl80211: Driver does not support setting Beacon frame rate (HT)");
4610 return -1;
4611 }
4612 if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL) ||
4613 nla_put_u8(msg, NL80211_TXRATE_HT, params->beacon_rate) ||
4614 (params->freq->vht_enabled &&
4615 nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4616 &vht_rate)))
4617 return -1;
4618 wpa_printf(MSG_DEBUG, " * beacon_rate = HT-MCS %u",
4619 params->beacon_rate);
4620 break;
4621 case BEACON_RATE_VHT:
4622 if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_VHT)) {
4623 wpa_printf(MSG_INFO,
4624 "nl80211: Driver does not support setting Beacon frame rate (VHT)");
4625 return -1;
4626 }
4627 vht_rate.mcs[0] = BIT(params->beacon_rate);
4628 if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL))
4629 return -1;
4630 if (nla_put(msg, NL80211_TXRATE_HT, 0, NULL))
4631 return -1;
4632 if (nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4633 &vht_rate))
4634 return -1;
4635 wpa_printf(MSG_DEBUG, " * beacon_rate = VHT-MCS %u",
4636 params->beacon_rate);
4637 break;
4638 case BEACON_RATE_HE:
4639 if (!(flags2 & WPA_DRIVER_FLAGS2_BEACON_RATE_HE)) {
4640 wpa_printf(MSG_INFO,
4641 "nl80211: Driver does not support setting Beacon frame rate (HE)");
4642 return -1;
4643 }
4644 he_rate.mcs[0] = BIT(params->beacon_rate);
4645 if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL) ||
4646 nla_put(msg, NL80211_TXRATE_HT, 0, NULL) ||
4647 nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4648 &vht_rate) ||
4649 nla_put(msg, NL80211_TXRATE_HE, sizeof(he_rate), &he_rate))
4650 return -1;
4651 wpa_printf(MSG_DEBUG, " * beacon_rate = HE-MCS %u",
4652 params->beacon_rate);
4653 break;
4654 }
4655
4656 nla_nest_end(msg, band);
4657 nla_nest_end(msg, bands);
4658
4659 return 0;
4660 }
4661
4662
nl80211_set_multicast_to_unicast(struct i802_bss * bss,int multicast_to_unicast)4663 static int nl80211_set_multicast_to_unicast(struct i802_bss *bss,
4664 int multicast_to_unicast)
4665 {
4666 struct wpa_driver_nl80211_data *drv = bss->drv;
4667 struct nl_msg *msg;
4668 int ret;
4669
4670 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_MULTICAST_TO_UNICAST);
4671 if (!msg ||
4672 (multicast_to_unicast &&
4673 nla_put_flag(msg, NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED))) {
4674 wpa_printf(MSG_ERROR,
4675 "nl80211: Failed to build NL80211_CMD_SET_MULTICAST_TO_UNICAST msg for %s",
4676 bss->ifname);
4677 nlmsg_free(msg);
4678 return -ENOBUFS;
4679 }
4680
4681 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4682
4683 switch (ret) {
4684 case 0:
4685 wpa_printf(MSG_DEBUG,
4686 "nl80211: multicast to unicast %s on interface %s",
4687 multicast_to_unicast ? "enabled" : "disabled",
4688 bss->ifname);
4689 break;
4690 case -EOPNOTSUPP:
4691 if (!multicast_to_unicast)
4692 break;
4693 wpa_printf(MSG_INFO,
4694 "nl80211: multicast to unicast not supported on interface %s",
4695 bss->ifname);
4696 break;
4697 default:
4698 wpa_printf(MSG_ERROR,
4699 "nl80211: %s multicast to unicast failed with %d (%s) on interface %s",
4700 multicast_to_unicast ? "enabling" : "disabling",
4701 ret, strerror(-ret), bss->ifname);
4702 break;
4703 }
4704
4705 return ret;
4706 }
4707
4708
4709 #ifdef CONFIG_SAE
nl80211_put_sae_pwe(struct nl_msg * msg,enum sae_pwe pwe)4710 static int nl80211_put_sae_pwe(struct nl_msg *msg, enum sae_pwe pwe)
4711 {
4712 u8 sae_pwe;
4713
4714 wpa_printf(MSG_DEBUG, "nl802111: sae_pwe=%d", pwe);
4715 if (pwe == SAE_PWE_HUNT_AND_PECK)
4716 sae_pwe = NL80211_SAE_PWE_HUNT_AND_PECK;
4717 else if (pwe == SAE_PWE_HASH_TO_ELEMENT)
4718 sae_pwe = NL80211_SAE_PWE_HASH_TO_ELEMENT;
4719 else if (pwe == SAE_PWE_BOTH)
4720 sae_pwe = NL80211_SAE_PWE_BOTH;
4721 else if (pwe == SAE_PWE_FORCE_HUNT_AND_PECK)
4722 return 0; /* special test mode */
4723 else
4724 return -1;
4725 if (nla_put_u8(msg, NL80211_ATTR_SAE_PWE, sae_pwe))
4726 return -1;
4727
4728 return 0;
4729 }
4730 #endif /* CONFIG_SAE */
4731
4732
4733 #ifdef CONFIG_FILS
nl80211_fils_discovery(struct i802_bss * bss,struct nl_msg * msg,struct wpa_driver_ap_params * params)4734 static int nl80211_fils_discovery(struct i802_bss *bss, struct nl_msg *msg,
4735 struct wpa_driver_ap_params *params)
4736 {
4737 struct nlattr *attr;
4738
4739 if (!bss->drv->fils_discovery) {
4740 wpa_printf(MSG_ERROR,
4741 "nl80211: Driver does not support FILS Discovery frame transmission for %s",
4742 bss->ifname);
4743 return -1;
4744 }
4745
4746 attr = nla_nest_start(msg, NL80211_ATTR_FILS_DISCOVERY);
4747 if (!attr ||
4748 nla_put_u32(msg, NL80211_FILS_DISCOVERY_ATTR_INT_MIN,
4749 params->fd_min_int) ||
4750 nla_put_u32(msg, NL80211_FILS_DISCOVERY_ATTR_INT_MAX,
4751 params->fd_max_int) ||
4752 (params->fd_frame_tmpl &&
4753 nla_put(msg, NL80211_FILS_DISCOVERY_ATTR_TMPL,
4754 params->fd_frame_tmpl_len, params->fd_frame_tmpl)))
4755 return -1;
4756
4757 nla_nest_end(msg, attr);
4758 return 0;
4759 }
4760 #endif /* CONFIG_FILS */
4761
4762
4763 #ifdef CONFIG_IEEE80211AX
4764
nl80211_unsol_bcast_probe_resp(struct i802_bss * bss,struct nl_msg * msg,struct wpa_driver_ap_params * params)4765 static int nl80211_unsol_bcast_probe_resp(struct i802_bss *bss,
4766 struct nl_msg *msg,
4767 struct wpa_driver_ap_params *params)
4768 {
4769 struct nlattr *attr;
4770
4771 if (!bss->drv->unsol_bcast_probe_resp) {
4772 wpa_printf(MSG_ERROR,
4773 "nl80211: Driver does not support unsolicited broadcast Probe Response frame transmission for %s",
4774 bss->ifname);
4775 return -1;
4776 }
4777
4778 wpa_printf(MSG_DEBUG,
4779 "nl80211: Unsolicited broadcast Probe Response frame interval: %u",
4780 params->unsol_bcast_probe_resp_interval);
4781 attr = nla_nest_start(msg, NL80211_ATTR_UNSOL_BCAST_PROBE_RESP);
4782 if (!attr ||
4783 nla_put_u32(msg, NL80211_UNSOL_BCAST_PROBE_RESP_ATTR_INT,
4784 params->unsol_bcast_probe_resp_interval) ||
4785 (params->unsol_bcast_probe_resp_tmpl &&
4786 nla_put(msg, NL80211_UNSOL_BCAST_PROBE_RESP_ATTR_TMPL,
4787 params->unsol_bcast_probe_resp_tmpl_len,
4788 params->unsol_bcast_probe_resp_tmpl)))
4789 return -1;
4790
4791 nla_nest_end(msg, attr);
4792 return 0;
4793 }
4794
4795
nl80211_mbssid(struct nl_msg * msg,struct wpa_driver_ap_params * params)4796 static int nl80211_mbssid(struct nl_msg *msg,
4797 struct wpa_driver_ap_params *params)
4798 {
4799 struct nlattr *config, *elems;
4800 int ifidx;
4801
4802 if (!params->mbssid_tx_iface)
4803 return 0;
4804
4805 config = nla_nest_start(msg, NL80211_ATTR_MBSSID_CONFIG);
4806 if (!config ||
4807 nla_put_u8(msg, NL80211_MBSSID_CONFIG_ATTR_INDEX,
4808 params->mbssid_index))
4809 return -1;
4810
4811 if (params->mbssid_tx_iface) {
4812 ifidx = if_nametoindex(params->mbssid_tx_iface);
4813 if (ifidx <= 0 ||
4814 nla_put_u32(msg, NL80211_MBSSID_CONFIG_ATTR_TX_IFINDEX,
4815 ifidx))
4816 return -1;
4817 }
4818
4819 if (params->ema && nla_put_flag(msg, NL80211_MBSSID_CONFIG_ATTR_EMA))
4820 return -1;
4821
4822 nla_nest_end(msg, config);
4823
4824 if (params->mbssid_elem_count && params->mbssid_elem_len &&
4825 params->mbssid_elem_offset && *params->mbssid_elem_offset) {
4826 u8 i, **offs = params->mbssid_elem_offset;
4827
4828 elems = nla_nest_start(msg, NL80211_ATTR_MBSSID_ELEMS);
4829 if (!elems)
4830 return -1;
4831
4832 for (i = 0; i < params->mbssid_elem_count - 1; i++) {
4833 if (nla_put(msg, i + 1, offs[i + 1] - offs[i], offs[i]))
4834 return -1;
4835 }
4836
4837 if (nla_put(msg, i + 1,
4838 *offs + params->mbssid_elem_len - offs[i],
4839 offs[i]))
4840 return -1;
4841
4842 nla_nest_end(msg, elems);
4843 }
4844
4845 if (!params->ema)
4846 return 0;
4847
4848 if (params->rnr_elem_count && params->rnr_elem_len &&
4849 params->rnr_elem_offset && *params->rnr_elem_offset) {
4850 u8 i, **offs = params->rnr_elem_offset;
4851
4852 elems = nla_nest_start(msg, NL80211_ATTR_EMA_RNR_ELEMS);
4853 if (!elems)
4854 return -1;
4855
4856 for (i = 0; i < params->rnr_elem_count - 1; i++) {
4857 if (nla_put(msg, i + 1, offs[i + 1] - offs[i], offs[i]))
4858 return -1;
4859 }
4860
4861 if (nla_put(msg, i + 1, *offs + params->rnr_elem_len - offs[i],
4862 offs[i]))
4863 return -1;
4864 nla_nest_end(msg, elems);
4865 }
4866
4867 return 0;
4868 }
4869
4870 #endif /* CONFIG_IEEE80211AX */
4871
4872
4873 #ifdef CONFIG_DRIVER_NL80211_QCA
qca_set_allowed_ap_freqs(struct wpa_driver_nl80211_data * drv,const int * freqs,int num_freqs)4874 static void qca_set_allowed_ap_freqs(struct wpa_driver_nl80211_data *drv,
4875 const int *freqs, int num_freqs)
4876 {
4877 struct nl_msg *msg;
4878 struct nlattr *params, *freqs_list;
4879 int i, ret;
4880
4881 if (!drv->set_wifi_conf_vendor_cmd_avail || !drv->qca_ap_allowed_freqs)
4882 return;
4883
4884 wpa_printf(MSG_DEBUG, "nl80211: Set AP allowed frequency list");
4885
4886 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
4887 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4888 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4889 QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
4890 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)))
4891 goto err;
4892
4893 freqs_list = nla_nest_start(
4894 msg, QCA_WLAN_VENDOR_ATTR_CONFIG_AP_ALLOWED_FREQ_LIST);
4895 if (!freqs_list)
4896 goto err;
4897
4898 for (i = 0; i < num_freqs; i++) {
4899 if (nla_put_u32(msg, i, freqs[i]))
4900 goto err;
4901 }
4902
4903 nla_nest_end(msg, freqs_list);
4904 nla_nest_end(msg, params);
4905
4906 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4907 if (ret)
4908 wpa_printf(MSG_ERROR,
4909 "nl80211: Failed set AP alllowed frequency list: %d (%s)",
4910 ret, strerror(-ret));
4911
4912 return;
4913 err:
4914 nlmsg_free(msg);
4915 }
4916 #endif /* CONFIG_DRIVER_NL80211_QCA */
4917
4918
wpa_driver_nl80211_set_ap(void * priv,struct wpa_driver_ap_params * params)4919 static int wpa_driver_nl80211_set_ap(void *priv,
4920 struct wpa_driver_ap_params *params)
4921 {
4922 struct i802_bss *bss = priv;
4923 struct wpa_driver_nl80211_data *drv = bss->drv;
4924 struct nl_msg *msg;
4925 u8 cmd = NL80211_CMD_NEW_BEACON;
4926 int ret = -ENOBUFS;
4927 int beacon_set;
4928 int num_suites;
4929 u32 suites[20], suite;
4930 u32 ver;
4931 #ifdef CONFIG_MESH
4932 struct wpa_driver_mesh_bss_params mesh_params;
4933 #endif /* CONFIG_MESH */
4934
4935 beacon_set = params->reenable ? 0 : bss->flink->beacon_set;
4936
4937 wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
4938 beacon_set);
4939 if (beacon_set)
4940 cmd = NL80211_CMD_SET_BEACON;
4941 else if (!drv->device_ap_sme && !drv->use_monitor &&
4942 !nl80211_get_wiphy_data_ap(bss))
4943 return -ENOBUFS;
4944
4945 wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
4946 params->head, params->head_len);
4947 wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
4948 params->tail, params->tail_len);
4949 wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", bss->ifindex);
4950 wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
4951 wpa_printf(MSG_DEBUG, "nl80211: beacon_rate=%u", params->beacon_rate);
4952 wpa_printf(MSG_DEBUG, "nl80211: rate_type=%d", params->rate_type);
4953 wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
4954 wpa_printf(MSG_DEBUG, "nl80211: ssid=%s",
4955 wpa_ssid_txt(params->ssid, params->ssid_len));
4956 if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
4957 nla_put(msg, NL80211_ATTR_BEACON_HEAD, params->head_len,
4958 params->head) ||
4959 nla_put(msg, NL80211_ATTR_BEACON_TAIL, params->tail_len,
4960 params->tail) ||
4961 nl80211_put_beacon_int(msg, params->beacon_int) ||
4962 nl80211_put_beacon_rate(msg, drv->capa.flags, drv->capa.flags2,
4963 params) ||
4964 nl80211_put_dtim_period(msg, params->dtim_period) ||
4965 nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
4966 goto fail;
4967 if (params->proberesp && params->proberesp_len) {
4968 wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
4969 params->proberesp, params->proberesp_len);
4970 if (nla_put(msg, NL80211_ATTR_PROBE_RESP, params->proberesp_len,
4971 params->proberesp))
4972 goto fail;
4973 }
4974 switch (params->hide_ssid) {
4975 case NO_SSID_HIDING:
4976 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
4977 if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4978 NL80211_HIDDEN_SSID_NOT_IN_USE))
4979 goto fail;
4980 break;
4981 case HIDDEN_SSID_ZERO_LEN:
4982 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
4983 if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4984 NL80211_HIDDEN_SSID_ZERO_LEN))
4985 goto fail;
4986 break;
4987 case HIDDEN_SSID_ZERO_CONTENTS:
4988 wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
4989 if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4990 NL80211_HIDDEN_SSID_ZERO_CONTENTS))
4991 goto fail;
4992 break;
4993 }
4994 wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
4995 if (params->privacy &&
4996 nla_put_flag(msg, NL80211_ATTR_PRIVACY))
4997 goto fail;
4998 wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
4999 if ((params->auth_algs & (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) ==
5000 (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) {
5001 /* Leave out the attribute */
5002 } else if (params->auth_algs & WPA_AUTH_ALG_SHARED) {
5003 if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
5004 NL80211_AUTHTYPE_SHARED_KEY))
5005 goto fail;
5006 } else {
5007 if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
5008 NL80211_AUTHTYPE_OPEN_SYSTEM))
5009 goto fail;
5010 }
5011
5012 wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
5013 ver = 0;
5014 if (params->wpa_version & WPA_PROTO_WPA)
5015 ver |= NL80211_WPA_VERSION_1;
5016 if (params->wpa_version & WPA_PROTO_RSN)
5017 ver |= NL80211_WPA_VERSION_2;
5018 if (ver &&
5019 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
5020 goto fail;
5021
5022 wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
5023 params->key_mgmt_suites);
5024 num_suites = wpa_key_mgmt_to_suites(params->key_mgmt_suites,
5025 suites, ARRAY_SIZE(suites));
5026 if (num_suites > NL80211_MAX_NR_AKM_SUITES)
5027 wpa_printf(MSG_DEBUG,
5028 "nl80211: Not enough room for all AKM suites (num_suites=%d > NL80211_MAX_NR_AKM_SUITES)",
5029 num_suites);
5030 else if (num_suites &&
5031 nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32),
5032 suites))
5033 goto fail;
5034
5035 if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
5036 (!params->pairwise_ciphers ||
5037 params->pairwise_ciphers & (WPA_CIPHER_WEP104 | WPA_CIPHER_WEP40)) &&
5038 (nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
5039 nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT)))
5040 goto fail;
5041
5042 if (drv->device_ap_sme) {
5043 u32 flags = 0;
5044
5045 if (params->key_mgmt_suites & (WPA_KEY_MGMT_SAE |
5046 WPA_KEY_MGMT_SAE_EXT_KEY)) {
5047 /* Add the previously used flag attribute to support
5048 * older kernel versions and the newer flag bit for
5049 * newer kernels. */
5050 if (nla_put_flag(msg,
5051 NL80211_ATTR_EXTERNAL_AUTH_SUPPORT))
5052 goto fail;
5053 flags |= NL80211_AP_SETTINGS_EXTERNAL_AUTH_SUPPORT;
5054 }
5055
5056 flags |= NL80211_AP_SETTINGS_SA_QUERY_OFFLOAD_SUPPORT;
5057
5058 if (nla_put_u32(msg, NL80211_ATTR_AP_SETTINGS_FLAGS, flags))
5059 goto fail;
5060 }
5061
5062 wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
5063 params->pairwise_ciphers);
5064 num_suites = wpa_cipher_to_cipher_suites(params->pairwise_ciphers,
5065 suites, ARRAY_SIZE(suites));
5066 if (num_suites &&
5067 nla_put(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
5068 num_suites * sizeof(u32), suites))
5069 goto fail;
5070
5071 wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
5072 params->group_cipher);
5073 suite = wpa_cipher_to_cipher_suite(params->group_cipher);
5074 if (suite &&
5075 nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, suite))
5076 goto fail;
5077
5078 if (params->beacon_ies) {
5079 wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
5080 params->beacon_ies);
5081 if (nla_put(msg, NL80211_ATTR_IE,
5082 wpabuf_len(params->beacon_ies),
5083 wpabuf_head(params->beacon_ies)))
5084 goto fail;
5085 }
5086 if (params->proberesp_ies) {
5087 wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
5088 params->proberesp_ies);
5089 if (nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
5090 wpabuf_len(params->proberesp_ies),
5091 wpabuf_head(params->proberesp_ies)))
5092 goto fail;
5093 }
5094 if (params->assocresp_ies) {
5095 wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
5096 params->assocresp_ies);
5097 if (nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
5098 wpabuf_len(params->assocresp_ies),
5099 wpabuf_head(params->assocresp_ies)))
5100 goto fail;
5101 }
5102
5103 if (drv->capa.flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER) {
5104 wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
5105 params->ap_max_inactivity);
5106 if (nla_put_u16(msg, NL80211_ATTR_INACTIVITY_TIMEOUT,
5107 params->ap_max_inactivity))
5108 goto fail;
5109 }
5110
5111 #ifdef CONFIG_P2P
5112 if (params->p2p_go_ctwindow > 0) {
5113 if (drv->p2p_go_ctwindow_supported) {
5114 wpa_printf(MSG_DEBUG, "nl80211: P2P GO ctwindow=%d",
5115 params->p2p_go_ctwindow);
5116 if (nla_put_u8(msg, NL80211_ATTR_P2P_CTWINDOW,
5117 params->p2p_go_ctwindow))
5118 goto fail;
5119 } else {
5120 wpa_printf(MSG_INFO,
5121 "nl80211: Driver does not support CTWindow configuration - ignore this parameter");
5122 }
5123 }
5124 #endif /* CONFIG_P2P */
5125
5126 if (params->pbss) {
5127 wpa_printf(MSG_DEBUG, "nl80211: PBSS");
5128 if (nla_put_flag(msg, NL80211_ATTR_PBSS))
5129 goto fail;
5130 }
5131
5132 if (params->ftm_responder) {
5133 struct nlattr *ftm;
5134
5135 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_FTM_RESPONDER)) {
5136 ret = -ENOTSUP;
5137 goto fail;
5138 }
5139
5140 ftm = nla_nest_start(msg, NL80211_ATTR_FTM_RESPONDER);
5141 if (!ftm ||
5142 nla_put_flag(msg, NL80211_FTM_RESP_ATTR_ENABLED) ||
5143 (params->lci &&
5144 nla_put(msg, NL80211_FTM_RESP_ATTR_LCI,
5145 wpabuf_len(params->lci),
5146 wpabuf_head(params->lci))) ||
5147 (params->civic &&
5148 nla_put(msg, NL80211_FTM_RESP_ATTR_CIVICLOC,
5149 wpabuf_len(params->civic),
5150 wpabuf_head(params->civic))))
5151 goto fail;
5152 nla_nest_end(msg, ftm);
5153 }
5154
5155 #ifdef CONFIG_IEEE80211AX
5156 if (params->he_spr_ctrl) {
5157 struct nlattr *spr;
5158
5159 spr = nla_nest_start(msg, NL80211_ATTR_HE_OBSS_PD);
5160 wpa_printf(MSG_DEBUG, "nl80211: he_spr_ctrl=0x%x",
5161 params->he_spr_ctrl);
5162
5163 if (!spr ||
5164 nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_SR_CTRL,
5165 params->he_spr_ctrl) ||
5166 ((params->he_spr_ctrl &
5167 SPATIAL_REUSE_NON_SRG_OFFSET_PRESENT) &&
5168 nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_NON_SRG_MAX_OFFSET,
5169 params->he_spr_non_srg_obss_pd_max_offset)))
5170 goto fail;
5171
5172 if ((params->he_spr_ctrl &
5173 SPATIAL_REUSE_SRG_INFORMATION_PRESENT) &&
5174 (nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET,
5175 params->he_spr_srg_obss_pd_min_offset) ||
5176 nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET,
5177 params->he_spr_srg_obss_pd_max_offset) ||
5178 nla_put(msg, NL80211_HE_OBSS_PD_ATTR_BSS_COLOR_BITMAP,
5179 sizeof(params->he_spr_bss_color_bitmap),
5180 params->he_spr_bss_color_bitmap) ||
5181 nla_put(msg, NL80211_HE_OBSS_PD_ATTR_PARTIAL_BSSID_BITMAP,
5182 sizeof(params->he_spr_partial_bssid_bitmap),
5183 params->he_spr_partial_bssid_bitmap)))
5184 goto fail;
5185
5186 nla_nest_end(msg, spr);
5187 }
5188
5189 if (params->freq && nl80211_put_freq_params(msg, params->freq) < 0)
5190 goto fail;
5191
5192 if (params->freq && params->freq->he_enabled) {
5193 struct nlattr *bss_color;
5194
5195 bss_color = nla_nest_start(msg, NL80211_ATTR_HE_BSS_COLOR);
5196 if (!bss_color ||
5197 (params->he_bss_color_disabled &&
5198 nla_put_flag(msg, NL80211_HE_BSS_COLOR_ATTR_DISABLED)) ||
5199 (params->he_bss_color_partial &&
5200 nla_put_flag(msg, NL80211_HE_BSS_COLOR_ATTR_PARTIAL)) ||
5201 nla_put_u8(msg, NL80211_HE_BSS_COLOR_ATTR_COLOR,
5202 params->he_bss_color))
5203 goto fail;
5204 nla_nest_end(msg, bss_color);
5205 }
5206
5207 if (params->twt_responder) {
5208 wpa_printf(MSG_DEBUG, "nl80211: twt_responder=%d",
5209 params->twt_responder);
5210 if (nla_put_flag(msg, NL80211_ATTR_TWT_RESPONDER))
5211 goto fail;
5212 }
5213
5214 if (params->unsol_bcast_probe_resp_interval &&
5215 nl80211_unsol_bcast_probe_resp(bss, msg, params) < 0)
5216 goto fail;
5217
5218 if (nl80211_mbssid(msg, params) < 0)
5219 goto fail;
5220 #endif /* CONFIG_IEEE80211AX */
5221
5222 #ifdef CONFIG_SAE
5223 if (wpa_key_mgmt_sae(params->key_mgmt_suites) &&
5224 nl80211_put_sae_pwe(msg, params->sae_pwe) < 0)
5225 goto fail;
5226 #endif /* CONFIG_SAE */
5227
5228 #ifdef CONFIG_FILS
5229 if (params->fd_max_int && nl80211_fils_discovery(bss, msg, params) < 0)
5230 goto fail;
5231 #endif /* CONFIG_FILS */
5232
5233 if (params->punct_bitmap) {
5234 wpa_printf(MSG_DEBUG, "nl80211: Puncturing bitmap=0x%04x",
5235 params->punct_bitmap);
5236 if (nla_put_u32(msg, NL80211_ATTR_PUNCT_BITMAP,
5237 params->punct_bitmap))
5238 goto fail;
5239 }
5240
5241 #ifdef CONFIG_DRIVER_NL80211_QCA
5242 if (cmd == NL80211_CMD_NEW_BEACON && params->allowed_freqs)
5243 qca_set_allowed_ap_freqs(drv, params->allowed_freqs,
5244 int_array_len(params->allowed_freqs));
5245 #endif /* CONFIG_DRIVER_NL80211_QCA */
5246
5247 ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
5248 if (ret) {
5249 wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
5250 ret, strerror(-ret));
5251 } else {
5252 bss->flink->beacon_set = 1;
5253 nl80211_set_bss(bss, params->cts_protect, params->preamble,
5254 params->short_slot_time, params->ht_opmode,
5255 params->isolate, params->basic_rates);
5256 nl80211_set_multicast_to_unicast(bss,
5257 params->multicast_to_unicast);
5258 if (beacon_set && params->freq &&
5259 params->freq->bandwidth != bss->flink->bandwidth) {
5260 wpa_printf(MSG_DEBUG,
5261 "nl80211: Update BSS %s bandwidth: %d -> %d",
5262 bss->ifname, bss->flink->bandwidth,
5263 params->freq->bandwidth);
5264 ret = nl80211_set_channel(bss, params->freq, 1);
5265 if (ret) {
5266 wpa_printf(MSG_DEBUG,
5267 "nl80211: Frequency set failed: %d (%s)",
5268 ret, strerror(-ret));
5269 } else {
5270 wpa_printf(MSG_DEBUG,
5271 "nl80211: Frequency set succeeded for ht2040 coex");
5272 bss->flink->bandwidth = params->freq->bandwidth;
5273 }
5274 } else if (!beacon_set && params->freq) {
5275 /*
5276 * cfg80211 updates the driver on frequence change in AP
5277 * mode only at the point when beaconing is started, so
5278 * set the initial value here.
5279 */
5280 bss->flink->bandwidth = params->freq->bandwidth;
5281 }
5282 }
5283
5284 #ifdef CONFIG_MESH
5285 if (is_mesh_interface(drv->nlmode) && params->ht_opmode != -1) {
5286 os_memset(&mesh_params, 0, sizeof(mesh_params));
5287 mesh_params.flags |= WPA_DRIVER_MESH_CONF_FLAG_HT_OP_MODE;
5288 mesh_params.ht_opmode = params->ht_opmode;
5289 ret = nl80211_set_mesh_config(priv, &mesh_params);
5290 if (ret < 0)
5291 return ret;
5292 }
5293 #endif /* CONFIG_MESH */
5294
5295 return ret;
5296 fail:
5297 nlmsg_free(msg);
5298 return ret;
5299 }
5300
5301
nl80211_put_freq_params(struct nl_msg * msg,const struct hostapd_freq_params * freq)5302 static int nl80211_put_freq_params(struct nl_msg *msg,
5303 const struct hostapd_freq_params *freq)
5304 {
5305 enum hostapd_hw_mode hw_mode;
5306 int is_24ghz;
5307 u8 channel;
5308
5309 wpa_printf(MSG_DEBUG, " * freq=%d", freq->freq);
5310 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq))
5311 return -ENOBUFS;
5312
5313 wpa_printf(MSG_DEBUG, " * eht_enabled=%d", freq->eht_enabled);
5314 wpa_printf(MSG_DEBUG, " * he_enabled=%d", freq->he_enabled);
5315 wpa_printf(MSG_DEBUG, " * vht_enabled=%d", freq->vht_enabled);
5316 wpa_printf(MSG_DEBUG, " * ht_enabled=%d", freq->ht_enabled);
5317 wpa_printf(MSG_DEBUG, " * radar_background=%d",
5318 freq->radar_background);
5319
5320 hw_mode = ieee80211_freq_to_chan(freq->freq, &channel);
5321 is_24ghz = hw_mode == HOSTAPD_MODE_IEEE80211G ||
5322 hw_mode == HOSTAPD_MODE_IEEE80211B;
5323
5324 if (freq->vht_enabled ||
5325 ((freq->he_enabled || freq->eht_enabled) && !is_24ghz)) {
5326 enum nl80211_chan_width cw;
5327
5328 wpa_printf(MSG_DEBUG, " * bandwidth=%d", freq->bandwidth);
5329 switch (freq->bandwidth) {
5330 case 20:
5331 cw = NL80211_CHAN_WIDTH_20;
5332 break;
5333 case 40:
5334 cw = NL80211_CHAN_WIDTH_40;
5335 break;
5336 case 80:
5337 if (freq->center_freq2)
5338 cw = NL80211_CHAN_WIDTH_80P80;
5339 else
5340 cw = NL80211_CHAN_WIDTH_80;
5341 break;
5342 case 160:
5343 cw = NL80211_CHAN_WIDTH_160;
5344 break;
5345 case 320:
5346 cw = NL80211_CHAN_WIDTH_320;
5347 break;
5348 default:
5349 return -EINVAL;
5350 }
5351
5352 wpa_printf(MSG_DEBUG, " * channel_width=%d", cw);
5353 wpa_printf(MSG_DEBUG, " * center_freq1=%d",
5354 freq->center_freq1);
5355 wpa_printf(MSG_DEBUG, " * center_freq2=%d",
5356 freq->center_freq2);
5357 if (nla_put_u32(msg, NL80211_ATTR_CHANNEL_WIDTH, cw) ||
5358 nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ1,
5359 freq->center_freq1) ||
5360 (freq->center_freq2 &&
5361 nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ2,
5362 freq->center_freq2)))
5363 return -ENOBUFS;
5364 } else if (freq->ht_enabled) {
5365 enum nl80211_channel_type ct;
5366
5367 wpa_printf(MSG_DEBUG, " * sec_channel_offset=%d",
5368 freq->sec_channel_offset);
5369 switch (freq->sec_channel_offset) {
5370 case -1:
5371 ct = NL80211_CHAN_HT40MINUS;
5372 break;
5373 case 1:
5374 ct = NL80211_CHAN_HT40PLUS;
5375 break;
5376 default:
5377 ct = NL80211_CHAN_HT20;
5378 break;
5379 }
5380
5381 wpa_printf(MSG_DEBUG, " * channel_type=%d", ct);
5382 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE, ct))
5383 return -ENOBUFS;
5384 } else if (freq->edmg.channels && freq->edmg.bw_config) {
5385 wpa_printf(MSG_DEBUG,
5386 " * EDMG configuration: channels=0x%x bw_config=%d",
5387 freq->edmg.channels, freq->edmg.bw_config);
5388 if (nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_CHANNELS,
5389 freq->edmg.channels) ||
5390 nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_BW_CONFIG,
5391 freq->edmg.bw_config))
5392 return -1;
5393 } else {
5394 wpa_printf(MSG_DEBUG, " * channel_type=%d",
5395 NL80211_CHAN_NO_HT);
5396 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
5397 NL80211_CHAN_NO_HT))
5398 return -ENOBUFS;
5399 }
5400 if (freq->radar_background &&
5401 nla_put_flag(msg, NL80211_ATTR_RADAR_BACKGROUND))
5402 return -ENOBUFS;
5403
5404 return 0;
5405 }
5406
5407
nl80211_set_channel(struct i802_bss * bss,struct hostapd_freq_params * freq,int set_chan)5408 static int nl80211_set_channel(struct i802_bss *bss,
5409 struct hostapd_freq_params *freq, int set_chan)
5410 {
5411 struct wpa_driver_nl80211_data *drv = bss->drv;
5412 struct nl_msg *msg;
5413 int ret;
5414
5415 wpa_printf(MSG_DEBUG,
5416 "nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, eht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
5417 freq->freq, freq->ht_enabled, freq->vht_enabled,
5418 freq->he_enabled, freq->eht_enabled, freq->bandwidth,
5419 freq->center_freq1, freq->center_freq2);
5420
5421 msg = nl80211_drv_msg(drv, 0, set_chan ? NL80211_CMD_SET_CHANNEL :
5422 NL80211_CMD_SET_WIPHY);
5423 if (!msg || nl80211_put_freq_params(msg, freq) < 0) {
5424 nlmsg_free(msg);
5425 return -1;
5426 }
5427
5428 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5429 if (ret == 0) {
5430 bss->flink->freq = freq->freq;
5431 return 0;
5432 }
5433 wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
5434 "%d (%s)", freq->freq, ret, strerror(-ret));
5435 return -1;
5436 }
5437
5438
sta_flags_nl80211(int flags)5439 static u32 sta_flags_nl80211(int flags)
5440 {
5441 u32 f = 0;
5442
5443 if (flags & WPA_STA_AUTHORIZED)
5444 f |= BIT(NL80211_STA_FLAG_AUTHORIZED);
5445 if (flags & WPA_STA_WMM)
5446 f |= BIT(NL80211_STA_FLAG_WME);
5447 if (flags & WPA_STA_SHORT_PREAMBLE)
5448 f |= BIT(NL80211_STA_FLAG_SHORT_PREAMBLE);
5449 if (flags & WPA_STA_MFP)
5450 f |= BIT(NL80211_STA_FLAG_MFP);
5451 if (flags & WPA_STA_TDLS_PEER)
5452 f |= BIT(NL80211_STA_FLAG_TDLS_PEER);
5453 if (flags & WPA_STA_AUTHENTICATED)
5454 f |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
5455 if (flags & WPA_STA_ASSOCIATED)
5456 f |= BIT(NL80211_STA_FLAG_ASSOCIATED);
5457
5458 return f;
5459 }
5460
5461
5462 #ifdef CONFIG_MESH
sta_plink_state_nl80211(enum mesh_plink_state state)5463 static u32 sta_plink_state_nl80211(enum mesh_plink_state state)
5464 {
5465 switch (state) {
5466 case PLINK_IDLE:
5467 return NL80211_PLINK_LISTEN;
5468 case PLINK_OPN_SNT:
5469 return NL80211_PLINK_OPN_SNT;
5470 case PLINK_OPN_RCVD:
5471 return NL80211_PLINK_OPN_RCVD;
5472 case PLINK_CNF_RCVD:
5473 return NL80211_PLINK_CNF_RCVD;
5474 case PLINK_ESTAB:
5475 return NL80211_PLINK_ESTAB;
5476 case PLINK_HOLDING:
5477 return NL80211_PLINK_HOLDING;
5478 case PLINK_BLOCKED:
5479 return NL80211_PLINK_BLOCKED;
5480 default:
5481 wpa_printf(MSG_ERROR, "nl80211: Invalid mesh plink state %d",
5482 state);
5483 }
5484 return -1;
5485 }
5486 #endif /* CONFIG_MESH */
5487
5488
wpa_driver_nl80211_sta_add(void * priv,struct hostapd_sta_add_params * params)5489 static int wpa_driver_nl80211_sta_add(void *priv,
5490 struct hostapd_sta_add_params *params)
5491 {
5492 struct i802_bss *bss = priv;
5493 struct wpa_driver_nl80211_data *drv = bss->drv;
5494 struct nl_msg *msg;
5495 struct nl80211_sta_flag_update upd;
5496 int ret = -ENOBUFS;
5497 u8 cmd;
5498 const char *cmd_string;
5499
5500 if ((params->flags & WPA_STA_TDLS_PEER) &&
5501 !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
5502 return -EOPNOTSUPP;
5503
5504 if (params->mld_link_sta) {
5505 cmd = params->set ? NL80211_CMD_MODIFY_LINK_STA :
5506 NL80211_CMD_ADD_LINK_STA;
5507 cmd_string = params->set ? "NL80211_CMD_MODIFY_LINK_STA" :
5508 "NL80211_CMD_ADD_LINK_STA";
5509 } else {
5510 cmd = params->set ? NL80211_CMD_SET_STATION :
5511 NL80211_CMD_NEW_STATION;
5512 cmd_string = params->set ? "NL80211_CMD_SET_STATION" :
5513 "NL80211_CMD_NEW_STATION";
5514 }
5515
5516 wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
5517 cmd_string, MAC2STR(params->addr));
5518 msg = nl80211_bss_msg(bss, 0, cmd);
5519 if (!msg)
5520 goto fail;
5521
5522 /*
5523 * Set the below properties only in one of the following cases:
5524 * 1. New station is added, already associated.
5525 * 2. Set WPA_STA_TDLS_PEER station.
5526 * 3. Set an already added unassociated station, if driver supports
5527 * full AP client state. (Set these properties after station became
5528 * associated will be rejected by the driver).
5529 */
5530 if (!params->set || (params->flags & WPA_STA_TDLS_PEER) ||
5531 (params->set && FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags) &&
5532 (params->flags & WPA_STA_ASSOCIATED))) {
5533 wpa_hexdump(MSG_DEBUG, " * supported rates",
5534 params->supp_rates, params->supp_rates_len);
5535 wpa_printf(MSG_DEBUG, " * capability=0x%x",
5536 params->capability);
5537 if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_RATES,
5538 params->supp_rates_len, params->supp_rates) ||
5539 nla_put_u16(msg, NL80211_ATTR_STA_CAPABILITY,
5540 params->capability))
5541 goto fail;
5542
5543 if (params->ht_capabilities) {
5544 wpa_hexdump(MSG_DEBUG, " * ht_capabilities",
5545 (u8 *) params->ht_capabilities,
5546 sizeof(*params->ht_capabilities));
5547 if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY,
5548 sizeof(*params->ht_capabilities),
5549 params->ht_capabilities))
5550 goto fail;
5551 }
5552
5553 if (params->vht_capabilities) {
5554 wpa_hexdump(MSG_DEBUG, " * vht_capabilities",
5555 (u8 *) params->vht_capabilities,
5556 sizeof(*params->vht_capabilities));
5557 if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY,
5558 sizeof(*params->vht_capabilities),
5559 params->vht_capabilities))
5560 goto fail;
5561 }
5562
5563 if (params->he_capab) {
5564 wpa_hexdump(MSG_DEBUG, " * he_capab",
5565 params->he_capab, params->he_capab_len);
5566 if (nla_put(msg, NL80211_ATTR_HE_CAPABILITY,
5567 params->he_capab_len, params->he_capab))
5568 goto fail;
5569 }
5570
5571 if (params->he_6ghz_capab) {
5572 wpa_hexdump(MSG_DEBUG, " * he_6ghz_capab",
5573 params->he_6ghz_capab,
5574 sizeof(*params->he_6ghz_capab));
5575 if (nla_put(msg, NL80211_ATTR_HE_6GHZ_CAPABILITY,
5576 sizeof(*params->he_6ghz_capab),
5577 params->he_6ghz_capab))
5578 goto fail;
5579 }
5580
5581 if (params->eht_capab) {
5582 wpa_hexdump(MSG_DEBUG, " * eht_capab",
5583 params->eht_capab, params->eht_capab_len);
5584 if (nla_put(msg, NL80211_ATTR_EHT_CAPABILITY,
5585 params->eht_capab_len, params->eht_capab))
5586 goto fail;
5587 }
5588
5589 if (params->ext_capab) {
5590 wpa_hexdump(MSG_DEBUG, " * ext_capab",
5591 params->ext_capab, params->ext_capab_len);
5592 if (nla_put(msg, NL80211_ATTR_STA_EXT_CAPABILITY,
5593 params->ext_capab_len, params->ext_capab))
5594 goto fail;
5595 }
5596
5597 if (is_ap_interface(drv->nlmode) &&
5598 nla_put_u8(msg, NL80211_ATTR_STA_SUPPORT_P2P_PS,
5599 params->support_p2p_ps ?
5600 NL80211_P2P_PS_SUPPORTED :
5601 NL80211_P2P_PS_UNSUPPORTED))
5602 goto fail;
5603 }
5604 if (!params->set) {
5605 if (params->aid) {
5606 wpa_printf(MSG_DEBUG, " * aid=%u", params->aid);
5607 if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid))
5608 goto fail;
5609 } else {
5610 /*
5611 * cfg80211 validates that AID is non-zero, so we have
5612 * to make this a non-zero value for the TDLS case where
5613 * a stub STA entry is used for now and for a station
5614 * that is still not associated.
5615 */
5616 wpa_printf(MSG_DEBUG, " * aid=1 (%s workaround)",
5617 (params->flags & WPA_STA_TDLS_PEER) ?
5618 "TDLS" : "UNASSOC_STA");
5619 if (nla_put_u16(msg, NL80211_ATTR_STA_AID, 1))
5620 goto fail;
5621 }
5622 wpa_printf(MSG_DEBUG, " * listen_interval=%u",
5623 params->listen_interval);
5624 if (nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
5625 params->listen_interval))
5626 goto fail;
5627 } else if (params->aid && (params->flags & WPA_STA_TDLS_PEER)) {
5628 wpa_printf(MSG_DEBUG, " * peer_aid=%u", params->aid);
5629 if (nla_put_u16(msg, NL80211_ATTR_PEER_AID, params->aid))
5630 goto fail;
5631 } else if (FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags) &&
5632 (params->flags & WPA_STA_ASSOCIATED)) {
5633 wpa_printf(MSG_DEBUG, " * aid=%u", params->aid);
5634 wpa_printf(MSG_DEBUG, " * listen_interval=%u",
5635 params->listen_interval);
5636 if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid) ||
5637 nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
5638 params->listen_interval))
5639 goto fail;
5640 }
5641
5642 if (params->vht_opmode_enabled) {
5643 wpa_printf(MSG_DEBUG, " * opmode=%u", params->vht_opmode);
5644 if (nla_put_u8(msg, NL80211_ATTR_OPMODE_NOTIF,
5645 params->vht_opmode))
5646 goto fail;
5647 }
5648
5649 if (params->supp_channels) {
5650 wpa_hexdump(MSG_DEBUG, " * supported channels",
5651 params->supp_channels, params->supp_channels_len);
5652 if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_CHANNELS,
5653 params->supp_channels_len, params->supp_channels))
5654 goto fail;
5655 }
5656
5657 if (params->supp_oper_classes) {
5658 wpa_hexdump(MSG_DEBUG, " * supported operating classes",
5659 params->supp_oper_classes,
5660 params->supp_oper_classes_len);
5661 if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
5662 params->supp_oper_classes_len,
5663 params->supp_oper_classes))
5664 goto fail;
5665 }
5666
5667 os_memset(&upd, 0, sizeof(upd));
5668 upd.set = sta_flags_nl80211(params->flags);
5669 upd.mask = upd.set | sta_flags_nl80211(params->flags_mask);
5670
5671 /*
5672 * If the driver doesn't support full AP client state, ignore ASSOC/AUTH
5673 * flags, as nl80211 driver moves a new station, by default, into
5674 * associated state.
5675 *
5676 * On the other hand, if the driver supports that feature and the
5677 * station is added in unauthenticated state, set the
5678 * authenticated/associated bits in the mask to prevent moving this
5679 * station to associated state before it is actually associated.
5680 *
5681 * This is irrelevant for mesh mode where the station is added to the
5682 * driver as authenticated already, and ASSOCIATED isn't part of the
5683 * nl80211 API.
5684 */
5685 if (!is_mesh_interface(drv->nlmode)) {
5686 if (!FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags)) {
5687 wpa_printf(MSG_DEBUG,
5688 "nl80211: Ignore ASSOC/AUTH flags since driver doesn't support full AP client state");
5689 upd.mask &= ~(BIT(NL80211_STA_FLAG_ASSOCIATED) |
5690 BIT(NL80211_STA_FLAG_AUTHENTICATED));
5691 } else if (!params->set &&
5692 !(params->flags & WPA_STA_TDLS_PEER)) {
5693 if (!(params->flags & WPA_STA_AUTHENTICATED))
5694 upd.mask |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
5695 if (!(params->flags & WPA_STA_ASSOCIATED))
5696 upd.mask |= BIT(NL80211_STA_FLAG_ASSOCIATED);
5697 }
5698 #ifdef CONFIG_MESH
5699 } else {
5700 if (params->plink_state == PLINK_ESTAB && params->peer_aid) {
5701 ret = nla_put_u16(msg, NL80211_ATTR_MESH_PEER_AID,
5702 params->peer_aid);
5703 if (ret)
5704 goto fail;
5705 }
5706 #endif /* CONFIG_MESH */
5707 }
5708
5709 wpa_printf(MSG_DEBUG, " * flags set=0x%x mask=0x%x",
5710 upd.set, upd.mask);
5711 if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
5712 goto fail;
5713
5714 #ifdef CONFIG_MESH
5715 if (params->plink_state &&
5716 nla_put_u8(msg, NL80211_ATTR_STA_PLINK_STATE,
5717 sta_plink_state_nl80211(params->plink_state)))
5718 goto fail;
5719 #endif /* CONFIG_MESH */
5720
5721 if ((!params->set || (params->flags & WPA_STA_TDLS_PEER) ||
5722 FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags)) &&
5723 (params->flags & WPA_STA_WMM)) {
5724 struct nlattr *wme = nla_nest_start(msg, NL80211_ATTR_STA_WME);
5725
5726 wpa_printf(MSG_DEBUG, " * qosinfo=0x%x", params->qosinfo);
5727 if (!wme ||
5728 nla_put_u8(msg, NL80211_STA_WME_UAPSD_QUEUES,
5729 params->qosinfo & WMM_QOSINFO_STA_AC_MASK) ||
5730 nla_put_u8(msg, NL80211_STA_WME_MAX_SP,
5731 (params->qosinfo >> WMM_QOSINFO_STA_SP_SHIFT) &
5732 WMM_QOSINFO_STA_SP_MASK))
5733 goto fail;
5734 nla_nest_end(msg, wme);
5735 }
5736
5737 /* In case we are an AP MLD need to always specify the link ID */
5738 if (params->mld_link_id >= 0) {
5739 wpa_printf(MSG_DEBUG, " * mld_link_id=%d",
5740 params->mld_link_id);
5741 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
5742 params->mld_link_id))
5743 goto fail;
5744
5745 /*
5746 * If the link address is specified the station is a non-AP MLD
5747 * and thus need to provide the MLD address as the station
5748 * address, and the non-AP MLD link address as the link address.
5749 */
5750 if (params->mld_link_addr) {
5751 wpa_printf(MSG_DEBUG, " * mld_link_addr=" MACSTR,
5752 MAC2STR(params->mld_link_addr));
5753
5754 if (nla_put(msg, NL80211_ATTR_MLD_ADDR,
5755 ETH_ALEN, params->addr) ||
5756 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
5757 params->mld_link_addr))
5758 goto fail;
5759 } else {
5760 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
5761 params->addr))
5762 goto fail;
5763 }
5764 } else {
5765 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr))
5766 goto fail;
5767 }
5768
5769 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5770 msg = NULL;
5771 if (ret)
5772 wpa_printf(MSG_DEBUG, "nl80211: %s result: %d (%s)",
5773 cmd_string, ret, strerror(-ret));
5774 if (ret == -EEXIST)
5775 ret = 0;
5776 fail:
5777 nlmsg_free(msg);
5778 return ret;
5779 }
5780
5781
rtnl_neigh_delete_fdb_entry(struct i802_bss * bss,const u8 * addr)5782 static void rtnl_neigh_delete_fdb_entry(struct i802_bss *bss, const u8 *addr)
5783 {
5784 #ifdef CONFIG_LIBNL3_ROUTE
5785 struct wpa_driver_nl80211_data *drv = bss->drv;
5786 struct rtnl_neigh *rn;
5787 struct nl_addr *nl_addr;
5788 int err;
5789
5790 rn = rtnl_neigh_alloc();
5791 if (!rn)
5792 return;
5793
5794 rtnl_neigh_set_family(rn, AF_BRIDGE);
5795 rtnl_neigh_set_ifindex(rn, bss->ifindex);
5796 nl_addr = nl_addr_build(AF_BRIDGE, (void *) addr, ETH_ALEN);
5797 if (!nl_addr) {
5798 rtnl_neigh_put(rn);
5799 return;
5800 }
5801 rtnl_neigh_set_lladdr(rn, nl_addr);
5802
5803 err = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
5804 if (err < 0) {
5805 wpa_printf(MSG_DEBUG, "nl80211: bridge FDB entry delete for "
5806 MACSTR " ifindex=%d failed: %s", MAC2STR(addr),
5807 bss->ifindex, nl_geterror(err));
5808 } else {
5809 wpa_printf(MSG_DEBUG, "nl80211: deleted bridge FDB entry for "
5810 MACSTR, MAC2STR(addr));
5811 }
5812
5813 nl_addr_put(nl_addr);
5814 rtnl_neigh_put(rn);
5815 #endif /* CONFIG_LIBNL3_ROUTE */
5816 }
5817
5818
wpa_driver_nl80211_sta_remove(struct i802_bss * bss,const u8 * addr,int deauth,u16 reason_code)5819 static int wpa_driver_nl80211_sta_remove(struct i802_bss *bss, const u8 *addr,
5820 int deauth, u16 reason_code)
5821 {
5822 struct wpa_driver_nl80211_data *drv = bss->drv;
5823 struct nl_msg *msg;
5824 int ret;
5825
5826 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION)) ||
5827 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
5828 (deauth == 0 &&
5829 nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
5830 WLAN_FC_STYPE_DISASSOC)) ||
5831 (deauth == 1 &&
5832 nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
5833 WLAN_FC_STYPE_DEAUTH)) ||
5834 (reason_code &&
5835 nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code))) {
5836 nlmsg_free(msg);
5837 return -ENOBUFS;
5838 }
5839
5840 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5841 wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
5842 " --> %d (%s)",
5843 bss->ifname, MAC2STR(addr), ret, strerror(-ret));
5844
5845 if (drv->rtnl_sk)
5846 rtnl_neigh_delete_fdb_entry(bss, addr);
5847
5848 if (ret == -ENOENT)
5849 return 0;
5850 return ret;
5851 }
5852
5853
nl80211_remove_iface(struct wpa_driver_nl80211_data * drv,int ifidx)5854 void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv, int ifidx)
5855 {
5856 struct nl_msg *msg;
5857 struct wpa_driver_nl80211_data *drv2;
5858
5859 wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
5860
5861 /* stop listening for EAPOL on this interface */
5862 dl_list_for_each(drv2, &drv->global->interfaces,
5863 struct wpa_driver_nl80211_data, list)
5864 {
5865 del_ifidx(drv2, ifidx, IFIDX_ANY);
5866 /* Remove all bridges learned for this iface */
5867 del_ifidx(drv2, IFIDX_ANY, ifidx);
5868 }
5869
5870 msg = nl80211_ifindex_msg(drv, ifidx, 0, NL80211_CMD_DEL_INTERFACE);
5871 if (send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL) == 0)
5872 return;
5873 wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d)", ifidx);
5874 }
5875
5876
nl80211_iftype_str(enum nl80211_iftype mode)5877 const char * nl80211_iftype_str(enum nl80211_iftype mode)
5878 {
5879 switch (mode) {
5880 case NL80211_IFTYPE_ADHOC:
5881 return "ADHOC";
5882 case NL80211_IFTYPE_STATION:
5883 return "STATION";
5884 case NL80211_IFTYPE_AP:
5885 return "AP";
5886 case NL80211_IFTYPE_AP_VLAN:
5887 return "AP_VLAN";
5888 case NL80211_IFTYPE_WDS:
5889 return "WDS";
5890 case NL80211_IFTYPE_MONITOR:
5891 return "MONITOR";
5892 case NL80211_IFTYPE_MESH_POINT:
5893 return "MESH_POINT";
5894 case NL80211_IFTYPE_P2P_CLIENT:
5895 return "P2P_CLIENT";
5896 case NL80211_IFTYPE_P2P_GO:
5897 return "P2P_GO";
5898 case NL80211_IFTYPE_P2P_DEVICE:
5899 return "P2P_DEVICE";
5900 case NL80211_IFTYPE_OCB:
5901 return "OCB";
5902 case NL80211_IFTYPE_NAN:
5903 return "NAN";
5904 default:
5905 return "unknown";
5906 }
5907 }
5908
5909
nl80211_create_iface_once(struct wpa_driver_nl80211_data * drv,const char * ifname,enum nl80211_iftype iftype,const u8 * addr,int wds,int (* handler)(struct nl_msg *,void *),void * arg)5910 static int nl80211_create_iface_once(struct wpa_driver_nl80211_data *drv,
5911 const char *ifname,
5912 enum nl80211_iftype iftype,
5913 const u8 *addr, int wds,
5914 int (*handler)(struct nl_msg *, void *),
5915 void *arg)
5916 {
5917 struct nl_msg *msg;
5918 int ifidx;
5919 int ret = -ENOBUFS;
5920
5921 wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
5922 iftype, nl80211_iftype_str(iftype));
5923
5924 msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_NEW_INTERFACE);
5925 if (!msg ||
5926 nla_put_string(msg, NL80211_ATTR_IFNAME, ifname) ||
5927 nla_put_u32(msg, NL80211_ATTR_IFTYPE, iftype))
5928 goto fail;
5929
5930 if (iftype == NL80211_IFTYPE_MONITOR) {
5931 struct nlattr *flags;
5932
5933 flags = nla_nest_start(msg, NL80211_ATTR_MNTR_FLAGS);
5934 if (!flags ||
5935 nla_put_flag(msg, NL80211_MNTR_FLAG_COOK_FRAMES))
5936 goto fail;
5937
5938 nla_nest_end(msg, flags);
5939 } else if (wds) {
5940 if (nla_put_u8(msg, NL80211_ATTR_4ADDR, wds))
5941 goto fail;
5942 }
5943
5944 /*
5945 * Tell cfg80211 that the interface belongs to the socket that created
5946 * it, and the interface should be deleted when the socket is closed.
5947 */
5948 if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
5949 goto fail;
5950
5951 if ((addr && iftype == NL80211_IFTYPE_P2P_DEVICE) &&
5952 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
5953 goto fail;
5954
5955 ret = send_and_recv_msgs(drv, msg, handler, arg, NULL, NULL);
5956 msg = NULL;
5957 if (ret) {
5958 fail:
5959 nlmsg_free(msg);
5960 wpa_printf(MSG_ERROR, "Failed to create interface %s: %d (%s)",
5961 ifname, ret, strerror(-ret));
5962 return ret;
5963 }
5964
5965 if (iftype == NL80211_IFTYPE_P2P_DEVICE)
5966 return 0;
5967
5968 ifidx = if_nametoindex(ifname);
5969 wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
5970 ifname, ifidx);
5971
5972 if (ifidx <= 0)
5973 return -1;
5974
5975 /*
5976 * Some virtual interfaces need to process EAPOL packets and events on
5977 * the parent interface. This is used mainly with hostapd.
5978 */
5979 if (drv->hostapd ||
5980 iftype == NL80211_IFTYPE_AP_VLAN ||
5981 iftype == NL80211_IFTYPE_WDS ||
5982 iftype == NL80211_IFTYPE_MONITOR) {
5983 /* start listening for EAPOL on this interface */
5984 add_ifidx(drv, ifidx, IFIDX_ANY);
5985 }
5986
5987 if (addr && iftype != NL80211_IFTYPE_MONITOR &&
5988 linux_set_ifhwaddr(drv->global->ioctl_sock, ifname, addr)) {
5989 nl80211_remove_iface(drv, ifidx);
5990 return -1;
5991 }
5992
5993 return ifidx;
5994 }
5995
5996
nl80211_create_iface(struct wpa_driver_nl80211_data * drv,const char * ifname,enum nl80211_iftype iftype,const u8 * addr,int wds,int (* handler)(struct nl_msg *,void *),void * arg,int use_existing)5997 int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
5998 const char *ifname, enum nl80211_iftype iftype,
5999 const u8 *addr, int wds,
6000 int (*handler)(struct nl_msg *, void *),
6001 void *arg, int use_existing)
6002 {
6003 int ret;
6004
6005 ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds, handler,
6006 arg);
6007
6008 /* if error occurred and interface exists already */
6009 if (ret == -ENFILE && if_nametoindex(ifname)) {
6010 if (use_existing) {
6011 wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
6012 ifname);
6013 if (addr && iftype != NL80211_IFTYPE_MONITOR &&
6014 linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
6015 addr) < 0 &&
6016 (linux_set_iface_flags(drv->global->ioctl_sock,
6017 ifname, 0) < 0 ||
6018 linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
6019 addr) < 0 ||
6020 linux_set_iface_flags(drv->global->ioctl_sock,
6021 ifname, 1) < 0))
6022 return -1;
6023 return -ENFILE;
6024 }
6025 wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
6026
6027 /* Try to remove the interface that was already there. */
6028 nl80211_remove_iface(drv, if_nametoindex(ifname));
6029
6030 /* Try to create the interface again */
6031 ret = nl80211_create_iface_once(drv, ifname, iftype, addr,
6032 wds, handler, arg);
6033 }
6034
6035 if (ret >= 0 && is_p2p_net_interface(iftype)) {
6036 wpa_printf(MSG_DEBUG,
6037 "nl80211: Interface %s created for P2P - disable 11b rates",
6038 ifname);
6039 nl80211_disable_11b_rates(drv, ret, 1);
6040 }
6041
6042 return ret;
6043 }
6044
6045
nl80211_setup_ap(struct i802_bss * bss)6046 static int nl80211_setup_ap(struct i802_bss *bss)
6047 {
6048 struct wpa_driver_nl80211_data *drv = bss->drv;
6049
6050 wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
6051 bss->ifname, drv->device_ap_sme, drv->use_monitor);
6052
6053 /*
6054 * Disable Probe Request reporting unless we need it in this way for
6055 * devices that include the AP SME, in the other case (unless using
6056 * monitor iface) we'll get it through the nl_mgmt socket instead.
6057 */
6058 if (!drv->device_ap_sme)
6059 wpa_driver_nl80211_probe_req_report(bss, 0);
6060
6061 if (!drv->device_ap_sme && !drv->use_monitor)
6062 if (nl80211_mgmt_subscribe_ap(bss))
6063 return -1;
6064
6065 if (drv->device_ap_sme && !drv->use_monitor)
6066 if (nl80211_mgmt_subscribe_ap_dev_sme(bss))
6067 wpa_printf(MSG_DEBUG,
6068 "nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it");
6069
6070 if (!drv->device_ap_sme && drv->use_monitor &&
6071 nl80211_create_monitor_interface(drv) &&
6072 !drv->device_ap_sme)
6073 return -1;
6074
6075 if (drv->device_ap_sme &&
6076 wpa_driver_nl80211_probe_req_report(bss, 1) < 0) {
6077 wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
6078 "Probe Request frame reporting in AP mode");
6079 /* Try to survive without this */
6080 }
6081
6082 return 0;
6083 }
6084
6085
nl80211_teardown_ap(struct i802_bss * bss)6086 static void nl80211_teardown_ap(struct i802_bss *bss)
6087 {
6088 struct wpa_driver_nl80211_data *drv = bss->drv;
6089
6090 wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
6091 bss->ifname, drv->device_ap_sme, drv->use_monitor);
6092 if (drv->device_ap_sme) {
6093 wpa_driver_nl80211_probe_req_report(bss, 0);
6094 if (!drv->use_monitor)
6095 nl80211_mgmt_unsubscribe(bss, "AP teardown (dev SME)");
6096 } else if (drv->use_monitor)
6097 nl80211_remove_monitor_interface(drv);
6098 else
6099 nl80211_mgmt_unsubscribe(bss, "AP teardown");
6100
6101 nl80211_put_wiphy_data_ap(bss);
6102 bss->flink->beacon_set = 0;
6103 }
6104
6105
nl80211_tx_control_port(void * priv,const u8 * dest,u16 proto,const u8 * buf,size_t len,int no_encrypt)6106 static int nl80211_tx_control_port(void *priv, const u8 *dest,
6107 u16 proto, const u8 *buf, size_t len,
6108 int no_encrypt)
6109 {
6110 struct nl80211_ack_ext_arg ext_arg;
6111 struct i802_bss *bss = priv;
6112 struct nl_msg *msg;
6113 u64 cookie = 0;
6114 int ret;
6115
6116 wpa_printf(MSG_DEBUG,
6117 "nl80211: Send over control port dest=" MACSTR
6118 " proto=0x%04x len=%u no_encrypt=%d",
6119 MAC2STR(dest), proto, (unsigned int) len, no_encrypt);
6120
6121 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CONTROL_PORT_FRAME);
6122 if (!msg ||
6123 nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, proto) ||
6124 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dest) ||
6125 nla_put(msg, NL80211_ATTR_FRAME, len, buf) ||
6126 (no_encrypt &&
6127 nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT))) {
6128 nlmsg_free(msg);
6129 return -ENOBUFS;
6130 }
6131
6132 os_memset(&ext_arg, 0, sizeof(struct nl80211_ack_ext_arg));
6133 ext_arg.ext_data = &cookie;
6134 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL,
6135 ack_handler_cookie, &ext_arg);
6136 if (ret) {
6137 wpa_printf(MSG_DEBUG,
6138 "nl80211: tx_control_port failed: ret=%d (%s)",
6139 ret, strerror(-ret));
6140 } else {
6141 struct wpa_driver_nl80211_data *drv = bss->drv;
6142
6143 wpa_printf(MSG_DEBUG,
6144 "nl80211: tx_control_port cookie=0x%llx",
6145 (long long unsigned int) cookie);
6146 drv->eapol_tx_cookie = cookie;
6147 }
6148
6149 return ret;
6150 }
6151
6152
nl80211_send_eapol_data(struct i802_bss * bss,const u8 * addr,const u8 * data,size_t data_len)6153 static int nl80211_send_eapol_data(struct i802_bss *bss,
6154 const u8 *addr, const u8 *data,
6155 size_t data_len)
6156 {
6157 struct sockaddr_ll ll;
6158 int ret;
6159
6160 if (bss->drv->eapol_tx_sock < 0) {
6161 wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
6162 return -1;
6163 }
6164
6165 os_memset(&ll, 0, sizeof(ll));
6166 ll.sll_family = AF_PACKET;
6167 ll.sll_ifindex = bss->ifindex;
6168 ll.sll_protocol = htons(ETH_P_PAE);
6169 ll.sll_halen = ETH_ALEN;
6170 os_memcpy(ll.sll_addr, addr, ETH_ALEN);
6171 ret = sendto(bss->drv->eapol_tx_sock, data, data_len, 0,
6172 (struct sockaddr *) &ll, sizeof(ll));
6173 if (ret < 0)
6174 wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
6175 strerror(errno));
6176
6177 return ret;
6178 }
6179
6180
6181 static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
6182
wpa_driver_nl80211_hapd_send_eapol(void * priv,const u8 * addr,const u8 * data,size_t data_len,int encrypt,const u8 * own_addr,u32 flags)6183 static int wpa_driver_nl80211_hapd_send_eapol(
6184 void *priv, const u8 *addr, const u8 *data,
6185 size_t data_len, int encrypt, const u8 *own_addr, u32 flags)
6186 {
6187 struct i802_bss *bss = priv;
6188 struct wpa_driver_nl80211_data *drv = bss->drv;
6189 struct ieee80211_hdr *hdr;
6190 size_t len;
6191 u8 *pos;
6192 int res;
6193 int qos = flags & WPA_STA_WMM;
6194
6195 /* For now, disable EAPOL TX over control port in AP mode by default
6196 * since it does not provide TX status notifications. */
6197 if (drv->control_port_ap &&
6198 (drv->capa.flags & WPA_DRIVER_FLAGS_CONTROL_PORT))
6199 return nl80211_tx_control_port(bss, addr, ETH_P_EAPOL,
6200 data, data_len, !encrypt);
6201
6202 if (drv->device_ap_sme || !drv->use_monitor)
6203 return nl80211_send_eapol_data(bss, addr, data, data_len);
6204
6205 len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
6206 data_len;
6207 hdr = os_zalloc(len);
6208 if (hdr == NULL) {
6209 wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
6210 (unsigned long) len);
6211 return -1;
6212 }
6213
6214 hdr->frame_control =
6215 IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
6216 hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
6217 if (encrypt)
6218 hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
6219 if (qos) {
6220 hdr->frame_control |=
6221 host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
6222 }
6223
6224 memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
6225 memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
6226 memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
6227 pos = (u8 *) (hdr + 1);
6228
6229 if (qos) {
6230 /* Set highest priority in QoS header */
6231 pos[0] = 7;
6232 pos[1] = 0;
6233 pos += 2;
6234 }
6235
6236 memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
6237 pos += sizeof(rfc1042_header);
6238 WPA_PUT_BE16(pos, ETH_P_PAE);
6239 pos += 2;
6240 memcpy(pos, data, data_len);
6241
6242 res = nl80211_send_monitor(drv, hdr, len, encrypt, 0);
6243 if (res < 0) {
6244 wpa_printf(MSG_ERROR,
6245 "hapd_send_eapol - packet len: %lu - failed",
6246 (unsigned long) len);
6247 }
6248 os_free(hdr);
6249
6250 return res;
6251 }
6252
6253
wpa_driver_nl80211_sta_set_flags(void * priv,const u8 * addr,unsigned int total_flags,unsigned int flags_or,unsigned int flags_and)6254 static int wpa_driver_nl80211_sta_set_flags(void *priv, const u8 *addr,
6255 unsigned int total_flags,
6256 unsigned int flags_or,
6257 unsigned int flags_and)
6258 {
6259 struct i802_bss *bss = priv;
6260 struct nl_msg *msg;
6261 struct nlattr *flags;
6262 struct nl80211_sta_flag_update upd;
6263
6264 wpa_printf(MSG_DEBUG, "nl80211: Set STA flags - ifname=%s addr=" MACSTR
6265 " total_flags=0x%x flags_or=0x%x flags_and=0x%x authorized=%d",
6266 bss->ifname, MAC2STR(addr), total_flags, flags_or, flags_and,
6267 !!(total_flags & WPA_STA_AUTHORIZED));
6268
6269 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
6270 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
6271 goto fail;
6272
6273 /*
6274 * Backwards compatibility version using NL80211_ATTR_STA_FLAGS. This
6275 * can be removed eventually.
6276 */
6277 flags = nla_nest_start(msg, NL80211_ATTR_STA_FLAGS);
6278 if (!flags ||
6279 ((total_flags & WPA_STA_AUTHORIZED) &&
6280 nla_put_flag(msg, NL80211_STA_FLAG_AUTHORIZED)) ||
6281 ((total_flags & WPA_STA_WMM) &&
6282 nla_put_flag(msg, NL80211_STA_FLAG_WME)) ||
6283 ((total_flags & WPA_STA_SHORT_PREAMBLE) &&
6284 nla_put_flag(msg, NL80211_STA_FLAG_SHORT_PREAMBLE)) ||
6285 ((total_flags & WPA_STA_MFP) &&
6286 nla_put_flag(msg, NL80211_STA_FLAG_MFP)) ||
6287 ((total_flags & WPA_STA_TDLS_PEER) &&
6288 nla_put_flag(msg, NL80211_STA_FLAG_TDLS_PEER)))
6289 goto fail;
6290
6291 nla_nest_end(msg, flags);
6292
6293 os_memset(&upd, 0, sizeof(upd));
6294 upd.mask = sta_flags_nl80211(flags_or | ~flags_and);
6295 upd.set = sta_flags_nl80211(flags_or);
6296 if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
6297 goto fail;
6298
6299 return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
6300 fail:
6301 nlmsg_free(msg);
6302 return -ENOBUFS;
6303 }
6304
6305
driver_nl80211_sta_set_airtime_weight(void * priv,const u8 * addr,unsigned int weight)6306 static int driver_nl80211_sta_set_airtime_weight(void *priv, const u8 *addr,
6307 unsigned int weight)
6308 {
6309 struct i802_bss *bss = priv;
6310 struct nl_msg *msg;
6311 int ret;
6312
6313 wpa_printf(MSG_DEBUG,
6314 "nl80211: Set STA airtime weight - ifname=%s addr=" MACSTR
6315 " weight=%u", bss->ifname, MAC2STR(addr), weight);
6316
6317 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
6318 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
6319 nla_put_u16(msg, NL80211_ATTR_AIRTIME_WEIGHT, weight))
6320 goto fail;
6321
6322 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
6323 if (ret) {
6324 wpa_printf(MSG_DEBUG,
6325 "nl80211: SET_STATION[AIRTIME_WEIGHT] failed: ret=%d (%s)",
6326 ret, strerror(-ret));
6327 }
6328 return ret;
6329 fail:
6330 nlmsg_free(msg);
6331 return -ENOBUFS;
6332 }
6333
6334
wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params)6335 static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
6336 struct wpa_driver_associate_params *params)
6337 {
6338 enum nl80211_iftype nlmode, old_mode;
6339
6340 if (params->p2p) {
6341 wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
6342 "group (GO)");
6343 nlmode = NL80211_IFTYPE_P2P_GO;
6344 } else
6345 nlmode = NL80211_IFTYPE_AP;
6346
6347 old_mode = drv->nlmode;
6348 if (wpa_driver_nl80211_set_mode(drv->first_bss, nlmode)) {
6349 nl80211_remove_monitor_interface(drv);
6350 return -1;
6351 }
6352
6353 if (params->freq.freq &&
6354 nl80211_set_channel(drv->first_bss, ¶ms->freq, 0)) {
6355 if (old_mode != nlmode)
6356 wpa_driver_nl80211_set_mode(drv->first_bss, old_mode);
6357 nl80211_remove_monitor_interface(drv);
6358 return -1;
6359 }
6360
6361 return 0;
6362 }
6363
6364
nl80211_leave_ibss(struct wpa_driver_nl80211_data * drv,int reset_mode)6365 static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
6366 int reset_mode)
6367 {
6368 struct nl_msg *msg;
6369 int ret;
6370
6371 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_IBSS);
6372 ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6373 if (ret) {
6374 wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
6375 "(%s)", ret, strerror(-ret));
6376 } else {
6377 wpa_printf(MSG_DEBUG,
6378 "nl80211: Leave IBSS request sent successfully");
6379 }
6380
6381 if (reset_mode &&
6382 wpa_driver_nl80211_set_mode(drv->first_bss,
6383 NL80211_IFTYPE_STATION)) {
6384 wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
6385 "station mode");
6386 }
6387
6388 return ret;
6389 }
6390
6391
nl80211_ht_vht_overrides(struct nl_msg * msg,struct wpa_driver_associate_params * params)6392 static int nl80211_ht_vht_overrides(struct nl_msg *msg,
6393 struct wpa_driver_associate_params *params)
6394 {
6395 if (params->disable_ht && nla_put_flag(msg, NL80211_ATTR_DISABLE_HT))
6396 return -1;
6397
6398 if (params->htcaps && params->htcaps_mask) {
6399 int sz = sizeof(struct ieee80211_ht_capabilities);
6400 wpa_hexdump(MSG_DEBUG, " * htcaps", params->htcaps, sz);
6401 wpa_hexdump(MSG_DEBUG, " * htcaps_mask",
6402 params->htcaps_mask, sz);
6403 if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY, sz,
6404 params->htcaps) ||
6405 nla_put(msg, NL80211_ATTR_HT_CAPABILITY_MASK, sz,
6406 params->htcaps_mask))
6407 return -1;
6408 }
6409
6410 #ifdef CONFIG_VHT_OVERRIDES
6411 if (params->disable_vht) {
6412 wpa_printf(MSG_DEBUG, " * VHT disabled");
6413 if (nla_put_flag(msg, NL80211_ATTR_DISABLE_VHT))
6414 return -1;
6415 }
6416
6417 if (params->vhtcaps && params->vhtcaps_mask) {
6418 int sz = sizeof(struct ieee80211_vht_capabilities);
6419 wpa_hexdump(MSG_DEBUG, " * vhtcaps", params->vhtcaps, sz);
6420 wpa_hexdump(MSG_DEBUG, " * vhtcaps_mask",
6421 params->vhtcaps_mask, sz);
6422 if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY, sz,
6423 params->vhtcaps) ||
6424 nla_put(msg, NL80211_ATTR_VHT_CAPABILITY_MASK, sz,
6425 params->vhtcaps_mask))
6426 return -1;
6427 }
6428 #endif /* CONFIG_VHT_OVERRIDES */
6429
6430 #ifdef CONFIG_HE_OVERRIDES
6431 if (params->disable_he) {
6432 wpa_printf(MSG_DEBUG, " * HE disabled");
6433 if (nla_put_flag(msg, NL80211_ATTR_DISABLE_HE))
6434 return -1;
6435 }
6436 #endif /* CONFIG_HE_OVERRIDES */
6437
6438 if (params->disable_eht) {
6439 wpa_printf(MSG_DEBUG, " * EHT disabled");
6440 if (nla_put_flag(msg, NL80211_ATTR_DISABLE_EHT))
6441 return -1;
6442 }
6443
6444 return 0;
6445 }
6446
6447
wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params)6448 static int wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data *drv,
6449 struct wpa_driver_associate_params *params)
6450 {
6451 struct nl_msg *msg;
6452 int ret = -1;
6453 int count = 0;
6454
6455 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
6456
6457 if (wpa_driver_nl80211_set_mode_ibss(drv->first_bss, ¶ms->freq)) {
6458 wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
6459 "IBSS mode");
6460 return -1;
6461 }
6462
6463 retry:
6464 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_IBSS)) ||
6465 params->ssid == NULL || params->ssid_len > sizeof(drv->ssid))
6466 goto fail;
6467
6468 wpa_printf(MSG_DEBUG, " * SSID=%s",
6469 wpa_ssid_txt(params->ssid, params->ssid_len));
6470 if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
6471 goto fail;
6472 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
6473 drv->ssid_len = params->ssid_len;
6474
6475 if (nl80211_put_freq_params(msg, ¶ms->freq) < 0 ||
6476 nl80211_put_beacon_int(msg, params->beacon_int))
6477 goto fail;
6478
6479 ret = nl80211_set_conn_keys(params, msg);
6480 if (ret)
6481 goto fail;
6482
6483 if (params->bssid && params->fixed_bssid) {
6484 wpa_printf(MSG_DEBUG, " * BSSID=" MACSTR,
6485 MAC2STR(params->bssid));
6486 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
6487 goto fail;
6488 }
6489
6490 if (params->fixed_freq) {
6491 wpa_printf(MSG_DEBUG, " * fixed_freq");
6492 if (nla_put_flag(msg, NL80211_ATTR_FREQ_FIXED))
6493 goto fail;
6494 }
6495
6496 if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
6497 params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6498 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
6499 params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
6500 wpa_printf(MSG_DEBUG, " * control port");
6501 if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
6502 goto fail;
6503 }
6504
6505 if (params->wpa_ie) {
6506 wpa_hexdump(MSG_DEBUG,
6507 " * Extra IEs for Beacon/Probe Response frames",
6508 params->wpa_ie, params->wpa_ie_len);
6509 if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
6510 params->wpa_ie))
6511 goto fail;
6512 }
6513
6514 ret = nl80211_ht_vht_overrides(msg, params);
6515 if (ret < 0)
6516 goto fail;
6517
6518 ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6519 msg = NULL;
6520 if (ret) {
6521 wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
6522 ret, strerror(-ret));
6523 count++;
6524 if (ret == -EALREADY && count == 1) {
6525 wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
6526 "forced leave");
6527 nl80211_leave_ibss(drv, 0);
6528 nlmsg_free(msg);
6529 goto retry;
6530 }
6531 } else {
6532 wpa_printf(MSG_DEBUG,
6533 "nl80211: Join IBSS request sent successfully");
6534 }
6535
6536 fail:
6537 nlmsg_free(msg);
6538 return ret;
6539 }
6540
6541
nl80211_put_fils_connect_params(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct nl_msg * msg)6542 static int nl80211_put_fils_connect_params(struct wpa_driver_nl80211_data *drv,
6543 struct wpa_driver_associate_params *params,
6544 struct nl_msg *msg)
6545 {
6546 if (params->fils_erp_username_len) {
6547 wpa_hexdump_ascii(MSG_DEBUG, " * FILS ERP EMSKname/username",
6548 params->fils_erp_username,
6549 params->fils_erp_username_len);
6550 if (nla_put(msg, NL80211_ATTR_FILS_ERP_USERNAME,
6551 params->fils_erp_username_len,
6552 params->fils_erp_username))
6553 return -1;
6554 }
6555
6556 if (params->fils_erp_realm_len) {
6557 wpa_hexdump_ascii(MSG_DEBUG, " * FILS ERP Realm",
6558 params->fils_erp_realm,
6559 params->fils_erp_realm_len);
6560 if (nla_put(msg, NL80211_ATTR_FILS_ERP_REALM,
6561 params->fils_erp_realm_len, params->fils_erp_realm))
6562 return -1;
6563 }
6564
6565 if (params->fils_erp_rrk_len) {
6566 wpa_printf(MSG_DEBUG, " * FILS ERP next seq %u",
6567 params->fils_erp_next_seq_num);
6568 if (nla_put_u16(msg, NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM,
6569 params->fils_erp_next_seq_num))
6570 return -1;
6571
6572 wpa_printf(MSG_DEBUG, " * FILS ERP rRK (len=%lu)",
6573 (unsigned long) params->fils_erp_rrk_len);
6574 if (nla_put(msg, NL80211_ATTR_FILS_ERP_RRK,
6575 params->fils_erp_rrk_len, params->fils_erp_rrk))
6576 return -1;
6577 }
6578
6579 return 0;
6580 }
6581
6582
num_bits_set(u32 val)6583 static unsigned int num_bits_set(u32 val)
6584 {
6585 unsigned int c;
6586
6587 for (c = 0; val; c++)
6588 val &= val - 1;
6589
6590 return c;
6591 }
6592
6593
nl80211_connect_common(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct nl_msg * msg)6594 static int nl80211_connect_common(struct wpa_driver_nl80211_data *drv,
6595 struct wpa_driver_associate_params *params,
6596 struct nl_msg *msg)
6597 {
6598 if (params->mld_params.mld_addr && params->mld_params.valid_links > 0) {
6599 struct wpa_driver_mld_params *mld_params = ¶ms->mld_params;
6600 struct nlattr *links, *attr;
6601 int i;
6602 u8 link_id;
6603
6604 wpa_printf(MSG_DEBUG, " * MLD: MLD addr=" MACSTR,
6605 MAC2STR(mld_params->mld_addr));
6606
6607 if (nla_put(msg, NL80211_ATTR_MLD_ADDR, ETH_ALEN,
6608 mld_params->mld_addr) ||
6609 nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
6610 mld_params->assoc_link_id))
6611 return -1;
6612
6613 links = nla_nest_start(msg, NL80211_ATTR_MLO_LINKS);
6614 if (!links)
6615 return -1;
6616
6617 attr = nla_nest_start(msg, 0);
6618 if (!attr)
6619 return -1;
6620
6621 /* First add the association link ID */
6622 link_id = mld_params->assoc_link_id;
6623 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id) ||
6624 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
6625 mld_params->mld_links[link_id].bssid) ||
6626 nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6627 mld_params->mld_links[link_id].freq))
6628 return -1;
6629
6630 os_memcpy(drv->sta_mlo_info.links[link_id].bssid,
6631 mld_params->mld_links[link_id].bssid, ETH_ALEN);
6632
6633 nla_nest_end(msg, attr);
6634
6635 for (i = 1, link_id = 0; link_id < MAX_NUM_MLD_LINKS;
6636 link_id++) {
6637 if (!(mld_params->valid_links & BIT(link_id)) ||
6638 link_id == mld_params->assoc_link_id)
6639 continue;
6640
6641 attr = nla_nest_start(msg, i);
6642 if (!attr)
6643 return -1;
6644
6645 if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
6646 link_id) ||
6647 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
6648 mld_params->mld_links[link_id].bssid) ||
6649 nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6650 mld_params->mld_links[link_id].freq) ||
6651 (mld_params->mld_links[link_id].ies &&
6652 mld_params->mld_links[i].ies_len &&
6653 nla_put(msg, NL80211_ATTR_IE,
6654 mld_params->mld_links[link_id].ies_len,
6655 mld_params->mld_links[link_id].ies)))
6656 return -1;
6657
6658 os_memcpy(drv->sta_mlo_info.links[link_id].bssid,
6659 mld_params->mld_links[link_id].bssid,
6660 ETH_ALEN);
6661 nla_nest_end(msg, attr);
6662 i++;
6663 }
6664
6665 nla_nest_end(msg, links);
6666
6667 os_memcpy(drv->sta_mlo_info.ap_mld_addr,
6668 params->mld_params.mld_addr, ETH_ALEN);
6669 drv->sta_mlo_info.assoc_link_id = mld_params->assoc_link_id;
6670 drv->sta_mlo_info.req_links = mld_params->valid_links;
6671 }
6672
6673 if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
6674 return -1;
6675
6676 if (params->bssid && !params->mld_params.mld_addr) {
6677 wpa_printf(MSG_DEBUG, " * bssid=" MACSTR,
6678 MAC2STR(params->bssid));
6679 if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
6680 return -1;
6681 }
6682
6683 if (params->bssid_hint) {
6684 wpa_printf(MSG_DEBUG, " * bssid_hint=" MACSTR,
6685 MAC2STR(params->bssid_hint));
6686 if (nla_put(msg, NL80211_ATTR_MAC_HINT, ETH_ALEN,
6687 params->bssid_hint))
6688 return -1;
6689 }
6690
6691 if (params->freq.freq && !params->mld_params.mld_addr) {
6692 wpa_printf(MSG_DEBUG, " * freq=%d", params->freq.freq);
6693 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6694 params->freq.freq))
6695 return -1;
6696 drv->assoc_freq = params->freq.freq;
6697 } else
6698 drv->assoc_freq = 0;
6699
6700 if (params->freq_hint) {
6701 wpa_printf(MSG_DEBUG, " * freq_hint=%d", params->freq_hint);
6702 if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ_HINT,
6703 params->freq_hint))
6704 return -1;
6705 }
6706
6707 if (params->freq.edmg.channels && params->freq.edmg.bw_config) {
6708 wpa_printf(MSG_DEBUG,
6709 " * EDMG configuration: channels=0x%x bw_config=%d",
6710 params->freq.edmg.channels,
6711 params->freq.edmg.bw_config);
6712 if (nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_CHANNELS,
6713 params->freq.edmg.channels) ||
6714 nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_BW_CONFIG,
6715 params->freq.edmg.bw_config))
6716 return -1;
6717 }
6718
6719 if (params->bg_scan_period >= 0) {
6720 wpa_printf(MSG_DEBUG, " * bg scan period=%d",
6721 params->bg_scan_period);
6722 if (nla_put_u16(msg, NL80211_ATTR_BG_SCAN_PERIOD,
6723 params->bg_scan_period))
6724 return -1;
6725 }
6726
6727 if (params->ssid) {
6728 wpa_printf(MSG_DEBUG, " * SSID=%s",
6729 wpa_ssid_txt(params->ssid, params->ssid_len));
6730 if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
6731 params->ssid))
6732 return -1;
6733 if (params->ssid_len > sizeof(drv->ssid))
6734 return -1;
6735 os_memcpy(drv->ssid, params->ssid, params->ssid_len);
6736 drv->ssid_len = params->ssid_len;
6737 }
6738
6739 wpa_hexdump(MSG_DEBUG, " * IEs", params->wpa_ie, params->wpa_ie_len);
6740 if (params->wpa_ie &&
6741 nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len, params->wpa_ie))
6742 return -1;
6743
6744 if (params->wpa_proto) {
6745 enum nl80211_wpa_versions ver = 0;
6746
6747 if (params->wpa_proto & WPA_PROTO_WPA)
6748 ver |= NL80211_WPA_VERSION_1;
6749 if (params->wpa_proto & WPA_PROTO_RSN)
6750 ver |= NL80211_WPA_VERSION_2;
6751
6752 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
6753 if (nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
6754 return -1;
6755 }
6756
6757 if (params->pairwise_suite != WPA_CIPHER_NONE) {
6758 u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite);
6759 wpa_printf(MSG_DEBUG, " * pairwise=0x%x", cipher);
6760 if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
6761 cipher))
6762 return -1;
6763 }
6764
6765 if (params->group_suite == WPA_CIPHER_GTK_NOT_USED &&
6766 !(drv->capa.enc & WPA_DRIVER_CAPA_ENC_GTK_NOT_USED)) {
6767 /*
6768 * This is likely to work even though many drivers do not
6769 * advertise support for operations without GTK.
6770 */
6771 wpa_printf(MSG_DEBUG, " * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
6772 } else if (params->group_suite != WPA_CIPHER_NONE) {
6773 u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite);
6774 wpa_printf(MSG_DEBUG, " * group=0x%x", cipher);
6775 if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher))
6776 return -1;
6777 }
6778
6779 if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
6780 params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6781 params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X ||
6782 params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK ||
6783 params->key_mgmt_suite == WPA_KEY_MGMT_CCKM ||
6784 params->key_mgmt_suite == WPA_KEY_MGMT_OSEN ||
6785 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
6786 params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
6787 params->key_mgmt_suite == WPA_KEY_MGMT_SAE ||
6788 params->key_mgmt_suite == WPA_KEY_MGMT_SAE_EXT_KEY ||
6789 params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE ||
6790 params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE_EXT_KEY ||
6791 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
6792 params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192 ||
6793 params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X_SHA384 ||
6794 params->key_mgmt_suite == WPA_KEY_MGMT_FILS_SHA256 ||
6795 params->key_mgmt_suite == WPA_KEY_MGMT_FILS_SHA384 ||
6796 params->key_mgmt_suite == WPA_KEY_MGMT_FT_FILS_SHA256 ||
6797 params->key_mgmt_suite == WPA_KEY_MGMT_FT_FILS_SHA384 ||
6798 params->key_mgmt_suite == WPA_KEY_MGMT_OWE ||
6799 params->key_mgmt_suite == WPA_KEY_MGMT_DPP) {
6800 u32 *mgmt;
6801 unsigned int akm_count = 1, i;
6802
6803 /*
6804 * Make sure the driver has capability to handle default AKM in
6805 * key_mgmt_suite plus allowed AKMs in allowed_key_mgmts.
6806 */
6807 if (drv->capa.max_num_akms <=
6808 num_bits_set(params->allowed_key_mgmts)) {
6809 wpa_printf(MSG_INFO,
6810 "nl80211: Not enough support for the allowed AKMs (max_num_akms=%u <= num_bits_set=%u)",
6811 drv->capa.max_num_akms,
6812 num_bits_set(params->allowed_key_mgmts));
6813 return -1;
6814 }
6815
6816 mgmt = os_malloc(sizeof(u32) * drv->capa.max_num_akms);
6817 if (!mgmt)
6818 return -1;
6819
6820 mgmt[0] = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
6821
6822 switch (params->key_mgmt_suite) {
6823 case WPA_KEY_MGMT_CCKM:
6824 mgmt[0] = RSN_AUTH_KEY_MGMT_CCKM;
6825 break;
6826 case WPA_KEY_MGMT_IEEE8021X:
6827 mgmt[0] = RSN_AUTH_KEY_MGMT_UNSPEC_802_1X;
6828 break;
6829 case WPA_KEY_MGMT_FT_IEEE8021X:
6830 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_802_1X;
6831 break;
6832 case WPA_KEY_MGMT_FT_PSK:
6833 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_PSK;
6834 break;
6835 case WPA_KEY_MGMT_IEEE8021X_SHA256:
6836 mgmt[0] = RSN_AUTH_KEY_MGMT_802_1X_SHA256;
6837 break;
6838 case WPA_KEY_MGMT_PSK_SHA256:
6839 mgmt[0] = RSN_AUTH_KEY_MGMT_PSK_SHA256;
6840 break;
6841 case WPA_KEY_MGMT_OSEN:
6842 mgmt[0] = RSN_AUTH_KEY_MGMT_OSEN;
6843 break;
6844 case WPA_KEY_MGMT_SAE:
6845 mgmt[0] = RSN_AUTH_KEY_MGMT_SAE;
6846 break;
6847 case WPA_KEY_MGMT_SAE_EXT_KEY:
6848 mgmt[0] = RSN_AUTH_KEY_MGMT_SAE_EXT_KEY;
6849 break;
6850 case WPA_KEY_MGMT_FT_SAE:
6851 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_SAE;
6852 break;
6853 case WPA_KEY_MGMT_FT_SAE_EXT_KEY:
6854 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_SAE_EXT_KEY;
6855 break;
6856 case WPA_KEY_MGMT_IEEE8021X_SUITE_B:
6857 mgmt[0] = RSN_AUTH_KEY_MGMT_802_1X_SUITE_B;
6858 break;
6859 case WPA_KEY_MGMT_IEEE8021X_SUITE_B_192:
6860 mgmt[0] = RSN_AUTH_KEY_MGMT_802_1X_SUITE_B_192;
6861 break;
6862 case WPA_KEY_MGMT_FT_IEEE8021X_SHA384:
6863 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_802_1X_SHA384;
6864 break;
6865 case WPA_KEY_MGMT_FILS_SHA256:
6866 mgmt[0] = RSN_AUTH_KEY_MGMT_FILS_SHA256;
6867 break;
6868 case WPA_KEY_MGMT_FILS_SHA384:
6869 mgmt[0] = RSN_AUTH_KEY_MGMT_FILS_SHA384;
6870 break;
6871 case WPA_KEY_MGMT_FT_FILS_SHA256:
6872 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_FILS_SHA256;
6873 break;
6874 case WPA_KEY_MGMT_FT_FILS_SHA384:
6875 mgmt[0] = RSN_AUTH_KEY_MGMT_FT_FILS_SHA384;
6876 break;
6877 case WPA_KEY_MGMT_OWE:
6878 mgmt[0] = RSN_AUTH_KEY_MGMT_OWE;
6879 break;
6880 case WPA_KEY_MGMT_DPP:
6881 mgmt[0] = RSN_AUTH_KEY_MGMT_DPP;
6882 break;
6883 case WPA_KEY_MGMT_PSK:
6884 default:
6885 mgmt[0] = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
6886 break;
6887 }
6888
6889 if (drv->capa.max_num_akms > 1) {
6890 akm_count += wpa_key_mgmt_to_suites(
6891 params->allowed_key_mgmts, &mgmt[1],
6892 drv->capa.max_num_akms - 1);
6893 }
6894
6895 for (i = 0; i < akm_count; i++)
6896 wpa_printf(MSG_DEBUG, " * akm[%d]=0x%x", i, mgmt[i]);
6897
6898 if (nla_put(msg, NL80211_ATTR_AKM_SUITES,
6899 akm_count * sizeof(u32), mgmt)) {
6900 os_free(mgmt);
6901 return -1;
6902 }
6903
6904 os_free(mgmt);
6905 }
6906
6907 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6908 if (IS_CROSS_AKM_ROAM_KEY_MGMT(params->key_mgmt_suite)) {
6909 int num_suites;
6910 u32 suites[NL80211_MAX_NR_AKM_SUITES];
6911
6912 wpa_printf(MSG_INFO, "nl80211: key_mgmt_suites=0x%x",
6913 params->key_mgmt_suite);
6914 num_suites = wpa_cross_akm_key_mgmt_to_suites(params->key_mgmt_suite,
6915 suites, ARRAY_SIZE(suites));
6916 if (num_suites &&
6917 nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32), suites)) {
6918 wpa_printf(MSG_ERROR, "Updating multi akm_suite failed");
6919 return -1;
6920 }
6921 }
6922 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6923 if (params->req_handshake_offload &&
6924 (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X)) {
6925 wpa_printf(MSG_DEBUG, " * WANT_1X_4WAY_HS");
6926 if (nla_put_flag(msg, NL80211_ATTR_WANT_1X_4WAY_HS))
6927 return -1;
6928 }
6929
6930 /* Add PSK in case of 4-way handshake offload */
6931 if (params->psk &&
6932 (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK)) {
6933 wpa_hexdump_key(MSG_DEBUG, " * PSK", params->psk, 32);
6934 if (nla_put(msg, NL80211_ATTR_PMK, 32, params->psk))
6935 return -1;
6936 }
6937
6938 if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
6939 return -1;
6940
6941 if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
6942 (params->pairwise_suite == WPA_CIPHER_NONE ||
6943 params->pairwise_suite == WPA_CIPHER_WEP104 ||
6944 params->pairwise_suite == WPA_CIPHER_WEP40) &&
6945 (nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
6946 nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT)))
6947 return -1;
6948
6949 if (params->rrm_used) {
6950 u32 drv_rrm_flags = drv->capa.rrm_flags;
6951 if ((!((drv_rrm_flags &
6952 WPA_DRIVER_FLAGS_DS_PARAM_SET_IE_IN_PROBES) &&
6953 (drv_rrm_flags & WPA_DRIVER_FLAGS_QUIET)) &&
6954 !(drv_rrm_flags & WPA_DRIVER_FLAGS_SUPPORT_RRM)) ||
6955 nla_put_flag(msg, NL80211_ATTR_USE_RRM))
6956 return -1;
6957 }
6958
6959 if (nl80211_ht_vht_overrides(msg, params) < 0)
6960 return -1;
6961
6962 if (params->p2p)
6963 wpa_printf(MSG_DEBUG, " * P2P group");
6964
6965 if (params->pbss) {
6966 wpa_printf(MSG_DEBUG, " * PBSS");
6967 if (nla_put_flag(msg, NL80211_ATTR_PBSS))
6968 return -1;
6969 }
6970
6971 drv->connect_reassoc = 0;
6972 if (params->prev_bssid) {
6973 wpa_printf(MSG_DEBUG, " * prev_bssid=" MACSTR,
6974 MAC2STR(params->prev_bssid));
6975 if (nla_put(msg, NL80211_ATTR_PREV_BSSID, ETH_ALEN,
6976 params->prev_bssid))
6977 return -1;
6978 drv->connect_reassoc = 1;
6979 }
6980
6981 if ((params->auth_alg & WPA_AUTH_ALG_FILS) &&
6982 nl80211_put_fils_connect_params(drv, params, msg) != 0)
6983 return -1;
6984
6985 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6986 if (((params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
6987 (params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE)) &&
6988 #else
6989 if ((wpa_key_mgmt_sae(params->key_mgmt_suite) ||
6990 wpa_key_mgmt_sae(params->allowed_key_mgmts)) &&
6991 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6992 (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) &&
6993 nla_put_flag(msg, NL80211_ATTR_EXTERNAL_AUTH_SUPPORT))
6994 return -1;
6995
6996 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
6997 nla_put_flag(msg, NL80211_ATTR_MLO_SUPPORT))
6998 return -1;
6999
7000 return 0;
7001 }
7002
7003
wpa_driver_nl80211_try_connect(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct i802_bss * bss)7004 static int wpa_driver_nl80211_try_connect(
7005 struct wpa_driver_nl80211_data *drv,
7006 struct wpa_driver_associate_params *params,
7007 struct i802_bss *bss)
7008 {
7009 struct nl_msg *msg;
7010 enum nl80211_auth_type type;
7011 int ret;
7012 int algs;
7013
7014 #ifdef CONFIG_DRIVER_NL80211_QCA
7015 if (params->req_key_mgmt_offload && params->psk &&
7016 (wpa_key_mgmt_wpa_psk_no_sae(params->key_mgmt_suite) ||
7017 wpa_key_mgmt_wpa_psk_no_sae(params->allowed_key_mgmts))) {
7018 wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");
7019 ret = issue_key_mgmt_set_key(drv, params->psk, 32);
7020 if (ret)
7021 return ret;
7022 }
7023 #endif /* CONFIG_DRIVER_NL80211_QCA */
7024
7025 wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
7026 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_CONNECT);
7027 if (!msg)
7028 return -1;
7029
7030 ret = nl80211_connect_common(drv, params, msg);
7031 if (ret)
7032 goto fail;
7033
7034 if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
7035 nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
7036 goto fail;
7037
7038 if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_OPTIONAL &&
7039 (drv->capa.flags & WPA_DRIVER_FLAGS_MFP_OPTIONAL) &&
7040 nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_OPTIONAL))
7041 goto fail;
7042
7043 #ifdef CONFIG_SAE
7044 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
7045 if (((params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
7046 (params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE)) &&
7047 #else
7048 if ((wpa_key_mgmt_sae(params->key_mgmt_suite) ||
7049 wpa_key_mgmt_sae(params->allowed_key_mgmts)) &&
7050 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
7051 nl80211_put_sae_pwe(msg, params->sae_pwe) < 0)
7052 goto fail;
7053 #endif /* CONFIG_SAE */
7054
7055 algs = 0;
7056 if (params->auth_alg & WPA_AUTH_ALG_OPEN)
7057 algs++;
7058 if (params->auth_alg & WPA_AUTH_ALG_SHARED)
7059 algs++;
7060 if (params->auth_alg & WPA_AUTH_ALG_LEAP)
7061 algs++;
7062 if (params->auth_alg & WPA_AUTH_ALG_FILS)
7063 algs++;
7064 if (params->auth_alg & WPA_AUTH_ALG_FT)
7065 algs++;
7066 if (algs > 1) {
7067 wpa_printf(MSG_DEBUG, " * Leave out Auth Type for automatic "
7068 "selection");
7069 goto skip_auth_type;
7070 }
7071
7072 type = get_nl_auth_type(params->auth_alg);
7073 wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
7074 if (type == NL80211_AUTHTYPE_MAX ||
7075 nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
7076 goto fail;
7077
7078 skip_auth_type:
7079 ret = nl80211_set_conn_keys(params, msg);
7080 if (ret)
7081 goto fail;
7082
7083 ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
7084 msg = NULL;
7085 if (ret) {
7086 wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
7087 "(%s)", ret, strerror(-ret));
7088 } else {
7089 #ifdef CONFIG_DRIVER_NL80211_QCA
7090 drv->roam_indication_done = false;
7091 #endif /* CONFIG_DRIVER_NL80211_QCA */
7092 wpa_printf(MSG_DEBUG,
7093 "nl80211: Connect request send successfully");
7094 }
7095
7096 fail:
7097 nl80211_nlmsg_clear(msg);
7098 nlmsg_free(msg);
7099 return ret;
7100
7101 }
7102
7103
wpa_driver_nl80211_connect(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct i802_bss * bss)7104 static int wpa_driver_nl80211_connect(
7105 struct wpa_driver_nl80211_data *drv,
7106 struct wpa_driver_associate_params *params,
7107 struct i802_bss *bss)
7108 {
7109 int ret;
7110
7111 /* Store the connection attempted bssid for future use */
7112 if (params->bssid)
7113 os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
7114 else
7115 os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
7116
7117 ret = wpa_driver_nl80211_try_connect(drv, params, bss);
7118 if (ret == -EALREADY) {
7119 /*
7120 * cfg80211 does not currently accept new connections if
7121 * we are already connected. As a workaround, force
7122 * disconnection and try again.
7123 */
7124 wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
7125 "disconnecting before reassociation "
7126 "attempt");
7127 if (wpa_driver_nl80211_disconnect(
7128 drv, WLAN_REASON_PREV_AUTH_NOT_VALID, bss))
7129 return -1;
7130 ret = wpa_driver_nl80211_try_connect(drv, params, bss);
7131 }
7132 return ret;
7133 }
7134
7135
wpa_driver_nl80211_associate(void * priv,struct wpa_driver_associate_params * params)7136 static int wpa_driver_nl80211_associate(
7137 void *priv, struct wpa_driver_associate_params *params)
7138 {
7139 struct i802_bss *bss = priv;
7140 struct wpa_driver_nl80211_data *drv = bss->drv;
7141 int ret = -1;
7142 struct nl_msg *msg;
7143
7144 nl80211_unmask_11b_rates(bss);
7145
7146 if (params->mode == IEEE80211_MODE_AP)
7147 return wpa_driver_nl80211_ap(drv, params);
7148
7149 if (params->mode == IEEE80211_MODE_IBSS)
7150 return wpa_driver_nl80211_ibss(drv, params);
7151
7152 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
7153 enum nl80211_iftype nlmode = params->p2p ?
7154 NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
7155
7156 if (wpa_driver_nl80211_set_mode(priv, nlmode) < 0)
7157 return -1;
7158 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
7159 if ((params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
7160 (params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE))
7161 #else
7162 if (wpa_key_mgmt_sae(params->key_mgmt_suite) ||
7163 wpa_key_mgmt_sae(params->allowed_key_mgmts))
7164 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
7165 bss->use_nl_connect = 1;
7166 else
7167 bss->use_nl_connect = 0;
7168
7169 return wpa_driver_nl80211_connect(drv, params, bss);
7170 }
7171
7172 nl80211_mark_disconnected(drv);
7173
7174 wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
7175 drv->ifindex);
7176 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_ASSOCIATE);
7177 if (!msg)
7178 return -1;
7179
7180 ret = nl80211_connect_common(drv, params, msg);
7181 if (ret)
7182 goto fail;
7183
7184 if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
7185 nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
7186 goto fail;
7187
7188 if (params->fils_kek) {
7189 wpa_printf(MSG_DEBUG, " * FILS KEK (len=%u)",
7190 (unsigned int) params->fils_kek_len);
7191 if (nla_put(msg, NL80211_ATTR_FILS_KEK, params->fils_kek_len,
7192 params->fils_kek))
7193 goto fail;
7194 }
7195 if (params->fils_nonces) {
7196 wpa_hexdump(MSG_DEBUG, " * FILS nonces (for AAD)",
7197 params->fils_nonces,
7198 params->fils_nonces_len);
7199 if (nla_put(msg, NL80211_ATTR_FILS_NONCES,
7200 params->fils_nonces_len, params->fils_nonces))
7201 goto fail;
7202 }
7203
7204 ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
7205 msg = NULL;
7206 if (ret) {
7207 wpa_dbg(drv->ctx, MSG_DEBUG,
7208 "nl80211: MLME command failed (assoc): ret=%d (%s)",
7209 ret, strerror(-ret));
7210 nl80211_dump_scan(drv);
7211 } else {
7212 wpa_printf(MSG_DEBUG,
7213 "nl80211: Association request send successfully");
7214 }
7215
7216 fail:
7217 nlmsg_free(msg);
7218 return ret;
7219 }
7220
7221
nl80211_set_mode(struct wpa_driver_nl80211_data * drv,int ifindex,enum nl80211_iftype mode)7222 static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
7223 int ifindex, enum nl80211_iftype mode)
7224 {
7225 struct nl_msg *msg;
7226 int ret = -ENOBUFS;
7227
7228 wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
7229 ifindex, mode, nl80211_iftype_str(mode));
7230
7231 msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
7232 if (!msg || nla_put_u32(msg, NL80211_ATTR_IFTYPE, mode))
7233 goto fail;
7234
7235 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7236 msg = NULL;
7237 if (!ret)
7238 return 0;
7239 fail:
7240 nlmsg_free(msg);
7241 wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
7242 " %d (%s)", ifindex, mode, ret, strerror(-ret));
7243 return ret;
7244 }
7245
7246
wpa_driver_nl80211_set_mode_impl(struct i802_bss * bss,enum nl80211_iftype nlmode,struct hostapd_freq_params * desired_freq_params)7247 static int wpa_driver_nl80211_set_mode_impl(
7248 struct i802_bss *bss,
7249 enum nl80211_iftype nlmode,
7250 struct hostapd_freq_params *desired_freq_params)
7251 {
7252 struct wpa_driver_nl80211_data *drv = bss->drv;
7253 int ret = -1;
7254 int i;
7255 int was_ap = is_ap_interface(drv->nlmode);
7256 int res;
7257 int mode_switch_res;
7258
7259 if (TEST_FAIL())
7260 return -1;
7261
7262 mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
7263 if (mode_switch_res && nlmode == nl80211_get_ifmode(bss))
7264 mode_switch_res = 0;
7265
7266 if (mode_switch_res == 0) {
7267 drv->nlmode = nlmode;
7268 ret = 0;
7269 goto done;
7270 }
7271
7272 if (mode_switch_res == -ENODEV)
7273 return -1;
7274
7275 if (nlmode == drv->nlmode) {
7276 wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
7277 "requested mode - ignore error");
7278 ret = 0;
7279 goto done; /* Already in the requested mode */
7280 }
7281
7282 /* mac80211 doesn't allow mode changes while the device is up, so
7283 * take the device down, try to set the mode again, and bring the
7284 * device back up.
7285 */
7286 wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
7287 "interface down");
7288 for (i = 0; i < 10; i++) {
7289 res = i802_set_iface_flags(bss, 0);
7290 if (res == -EACCES || res == -ENODEV)
7291 break;
7292 if (res != 0) {
7293 wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
7294 "interface down");
7295 os_sleep(0, 100000);
7296 continue;
7297 }
7298
7299 /*
7300 * Setting the mode will fail for some drivers if the phy is
7301 * on a frequency that the mode is disallowed in.
7302 */
7303 if (desired_freq_params) {
7304 res = nl80211_set_channel(bss, desired_freq_params, 0);
7305 if (res) {
7306 wpa_printf(MSG_DEBUG,
7307 "nl80211: Failed to set frequency on interface");
7308 }
7309 }
7310
7311 if (i == 0 && was_ap && !is_ap_interface(nlmode) &&
7312 bss->brname[0] &&
7313 (bss->added_if_into_bridge || bss->already_in_bridge)) {
7314 wpa_printf(MSG_DEBUG,
7315 "nl80211: Remove AP interface %s temporarily from the bridge %s to allow its mode to be set to STATION",
7316 bss->ifname, bss->brname);
7317 if (linux_br_del_if(drv->global->ioctl_sock,
7318 bss->brname, bss->ifname) < 0)
7319 wpa_printf(MSG_INFO,
7320 "nl80211: Failed to remove interface %s from bridge %s: %s",
7321 bss->ifname, bss->brname,
7322 strerror(errno));
7323 }
7324
7325 /* Try to set the mode again while the interface is down */
7326 mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
7327 if (mode_switch_res == -EBUSY) {
7328 wpa_printf(MSG_DEBUG,
7329 "nl80211: Delaying mode set while interface going down");
7330 os_sleep(0, 100000);
7331 continue;
7332 }
7333 ret = mode_switch_res;
7334 break;
7335 }
7336
7337 if (!ret) {
7338 wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
7339 "interface is down");
7340 drv->nlmode = nlmode;
7341 drv->ignore_if_down_event = 1;
7342 }
7343
7344 /* Bring the interface back up */
7345 res = linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1);
7346 if (res != 0) {
7347 wpa_printf(MSG_DEBUG,
7348 "nl80211: Failed to set interface up after switching mode");
7349 ret = -1;
7350 }
7351
7352 done:
7353 if (ret) {
7354 wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
7355 "from %d failed", nlmode, drv->nlmode);
7356 return ret;
7357 }
7358
7359 if (is_p2p_net_interface(nlmode)) {
7360 wpa_printf(MSG_DEBUG,
7361 "nl80211: Interface %s mode change to P2P - disable 11b rates",
7362 bss->ifname);
7363 nl80211_disable_11b_rates(drv, drv->ifindex, 1);
7364 } else if (drv->disabled_11b_rates) {
7365 wpa_printf(MSG_DEBUG,
7366 "nl80211: Interface %s mode changed to non-P2P - re-enable 11b rates",
7367 bss->ifname);
7368 nl80211_disable_11b_rates(drv, drv->ifindex, 0);
7369 }
7370
7371 if (is_ap_interface(nlmode)) {
7372 nl80211_mgmt_unsubscribe(bss, "start AP");
7373 /* Setup additional AP mode functionality if needed */
7374 if (nl80211_setup_ap(bss))
7375 return -1;
7376 } else if (was_ap) {
7377 /* Remove additional AP mode functionality */
7378 nl80211_teardown_ap(bss);
7379 } else {
7380 nl80211_mgmt_unsubscribe(bss, "mode change");
7381 }
7382
7383 if (is_mesh_interface(nlmode) &&
7384 nl80211_mgmt_subscribe_mesh(bss))
7385 return -1;
7386
7387 if (!bss->in_deinit && !is_ap_interface(nlmode) &&
7388 !is_mesh_interface(nlmode) &&
7389 nl80211_mgmt_subscribe_non_ap(bss) < 0)
7390 wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
7391 "frame processing - ignore for now");
7392
7393 return 0;
7394 }
7395
7396
nl80211_restore_ap_mode(struct i802_bss * bss)7397 void nl80211_restore_ap_mode(struct i802_bss *bss)
7398 {
7399 struct wpa_driver_nl80211_data *drv = bss->drv;
7400 int was_ap = is_ap_interface(drv->nlmode);
7401 int br_ifindex;
7402
7403 wpa_driver_nl80211_set_mode(bss, drv->ap_scan_as_station);
7404 if (!was_ap && is_ap_interface(drv->ap_scan_as_station) &&
7405 bss->brname[0] &&
7406 (bss->added_if_into_bridge || bss->already_in_bridge)) {
7407 wpa_printf(MSG_DEBUG,
7408 "nl80211: Add AP interface %s back into the bridge %s",
7409 bss->ifname, bss->brname);
7410 if (linux_br_add_if(drv->global->ioctl_sock, bss->brname,
7411 bss->ifname) < 0) {
7412 wpa_printf(MSG_WARNING,
7413 "nl80211: Failed to add interface %s into bridge %s: %s",
7414 bss->ifname, bss->brname, strerror(errno));
7415 }
7416 br_ifindex = if_nametoindex(bss->brname);
7417 add_ifidx(drv, br_ifindex, drv->ifindex);
7418 }
7419 drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
7420 }
7421
7422
wpa_driver_nl80211_set_mode(struct i802_bss * bss,enum nl80211_iftype nlmode)7423 int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
7424 enum nl80211_iftype nlmode)
7425 {
7426 return wpa_driver_nl80211_set_mode_impl(bss, nlmode, NULL);
7427 }
7428
7429
wpa_driver_nl80211_set_mode_ibss(struct i802_bss * bss,struct hostapd_freq_params * freq)7430 static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
7431 struct hostapd_freq_params *freq)
7432 {
7433 return wpa_driver_nl80211_set_mode_impl(bss, NL80211_IFTYPE_ADHOC,
7434 freq);
7435 }
7436
7437
wpa_driver_nl80211_get_capa(void * priv,struct wpa_driver_capa * capa)7438 static int wpa_driver_nl80211_get_capa(void *priv,
7439 struct wpa_driver_capa *capa)
7440 {
7441 struct i802_bss *bss = priv;
7442 struct wpa_driver_nl80211_data *drv = bss->drv;
7443
7444 if (!drv->has_capability)
7445 return -1;
7446 os_memcpy(capa, &drv->capa, sizeof(*capa));
7447 if (drv->extended_capa && drv->extended_capa_mask) {
7448 capa->extended_capa = drv->extended_capa;
7449 capa->extended_capa_mask = drv->extended_capa_mask;
7450 capa->extended_capa_len = drv->extended_capa_len;
7451 }
7452
7453 return 0;
7454 }
7455
7456
wpa_driver_nl80211_set_operstate(void * priv,int state)7457 static int wpa_driver_nl80211_set_operstate(void *priv, int state)
7458 {
7459 struct i802_bss *bss = priv;
7460 struct wpa_driver_nl80211_data *drv = bss->drv;
7461
7462 wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
7463 bss->ifname, drv->operstate, state,
7464 state ? "UP" : "DORMANT");
7465 drv->operstate = state;
7466 return netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, -1,
7467 state ? IF_OPER_UP : IF_OPER_DORMANT);
7468 }
7469
7470
wpa_driver_nl80211_set_supp_port(void * priv,int authorized)7471 static int wpa_driver_nl80211_set_supp_port(void *priv, int authorized)
7472 {
7473 struct i802_bss *bss = priv;
7474 struct wpa_driver_nl80211_data *drv = bss->drv;
7475 struct nl_msg *msg;
7476 struct nl80211_sta_flag_update upd;
7477 int ret;
7478 const u8 *connected_addr = drv->sta_mlo_info.valid_links ?
7479 drv->sta_mlo_info.ap_mld_addr : drv->bssid;
7480
7481 if (!drv->associated && is_zero_ether_addr(connected_addr) &&
7482 !authorized) {
7483 wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
7484 return 0;
7485 }
7486
7487 wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
7488 MACSTR, authorized ? "" : "un", MAC2STR(connected_addr));
7489
7490 os_memset(&upd, 0, sizeof(upd));
7491 upd.mask = BIT(NL80211_STA_FLAG_AUTHORIZED);
7492 if (authorized)
7493 upd.set = BIT(NL80211_STA_FLAG_AUTHORIZED);
7494
7495 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
7496 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, connected_addr) ||
7497 nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd)) {
7498 nlmsg_free(msg);
7499 return -ENOBUFS;
7500 }
7501
7502 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7503 if (!ret)
7504 return 0;
7505 wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
7506 ret, strerror(-ret));
7507 return ret;
7508 }
7509
7510
7511 /* Set kernel driver on given frequency (MHz) */
i802_set_freq(void * priv,struct hostapd_freq_params * freq)7512 static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
7513 {
7514 struct i802_bss *bss = priv;
7515 return nl80211_set_channel(bss, freq, 0);
7516 }
7517
7518
min_int(int a,int b)7519 static inline int min_int(int a, int b)
7520 {
7521 if (a < b)
7522 return a;
7523 return b;
7524 }
7525
7526
get_key_handler(struct nl_msg * msg,void * arg)7527 static int get_key_handler(struct nl_msg *msg, void *arg)
7528 {
7529 struct nlattr *tb[NL80211_ATTR_MAX + 1];
7530 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7531
7532 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7533 genlmsg_attrlen(gnlh, 0), NULL);
7534
7535 /*
7536 * TODO: validate the key index and mac address!
7537 * Otherwise, there's a race condition as soon as
7538 * the kernel starts sending key notifications.
7539 */
7540
7541 if (tb[NL80211_ATTR_KEY_SEQ])
7542 memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
7543 min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
7544 nl80211_nlmsg_clear(msg);
7545 return NL_SKIP;
7546 }
7547
7548
i802_get_seqnum(const char * iface,void * priv,const u8 * addr,int idx,u8 * seq)7549 static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
7550 int idx, u8 *seq)
7551 {
7552 struct i802_bss *bss = priv;
7553 struct wpa_driver_nl80211_data *drv = bss->drv;
7554 struct nl_msg *msg;
7555
7556 msg = nl80211_ifindex_msg(drv, if_nametoindex(iface), 0,
7557 NL80211_CMD_GET_KEY);
7558 if (!msg ||
7559 (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
7560 nla_put_u8(msg, NL80211_ATTR_KEY_IDX, idx)) {
7561 nlmsg_free(msg);
7562 return -ENOBUFS;
7563 }
7564
7565 memset(seq, 0, 6);
7566
7567 return send_and_recv_msgs(drv, msg, get_key_handler, seq, NULL, NULL);
7568 }
7569
7570
i802_set_rts(void * priv,int rts)7571 static int i802_set_rts(void *priv, int rts)
7572 {
7573 struct i802_bss *bss = priv;
7574 struct wpa_driver_nl80211_data *drv = bss->drv;
7575 struct nl_msg *msg;
7576 int ret;
7577 u32 val;
7578
7579 if (rts >= 2347 || rts == -1)
7580 val = (u32) -1;
7581 else
7582 val = rts;
7583
7584 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
7585 nla_put_u32(msg, NL80211_ATTR_WIPHY_RTS_THRESHOLD, val)) {
7586 nlmsg_free(msg);
7587 return -ENOBUFS;
7588 }
7589
7590 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7591 if (!ret)
7592 return 0;
7593 wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
7594 "%d (%s)", rts, ret, strerror(-ret));
7595 return ret;
7596 }
7597
7598
i802_set_frag(void * priv,int frag)7599 static int i802_set_frag(void *priv, int frag)
7600 {
7601 struct i802_bss *bss = priv;
7602 struct wpa_driver_nl80211_data *drv = bss->drv;
7603 struct nl_msg *msg;
7604 int ret;
7605 u32 val;
7606
7607 if (frag >= 2346 || frag == -1)
7608 val = (u32) -1;
7609 else
7610 val = frag;
7611
7612 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
7613 nla_put_u32(msg, NL80211_ATTR_WIPHY_FRAG_THRESHOLD, val)) {
7614 nlmsg_free(msg);
7615 return -ENOBUFS;
7616 }
7617
7618 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7619 if (!ret)
7620 return 0;
7621 wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
7622 "%d: %d (%s)", frag, ret, strerror(-ret));
7623 return ret;
7624 }
7625
7626
i802_flush(void * priv)7627 static int i802_flush(void *priv)
7628 {
7629 struct i802_bss *bss = priv;
7630 struct nl_msg *msg;
7631 int res;
7632
7633 wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
7634 bss->ifname);
7635
7636 /*
7637 * XXX: FIX! this needs to flush all VLANs too
7638 */
7639 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION);
7640 res = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
7641 if (res) {
7642 wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
7643 "(%s)", res, strerror(-res));
7644 }
7645 return res;
7646 }
7647
7648
get_sta_tid_stats(struct hostap_sta_driver_data * data,struct nlattr * attr)7649 static void get_sta_tid_stats(struct hostap_sta_driver_data *data,
7650 struct nlattr *attr)
7651 {
7652 struct nlattr *tid_stats[NL80211_TID_STATS_MAX + 1], *tidattr;
7653 struct nlattr *txq_stats[NL80211_TXQ_STATS_MAX + 1];
7654 static struct nla_policy txq_stats_policy[NL80211_TXQ_STATS_MAX + 1] = {
7655 [NL80211_TXQ_STATS_BACKLOG_BYTES] = { .type = NLA_U32 },
7656 [NL80211_TXQ_STATS_BACKLOG_PACKETS] = { .type = NLA_U32 },
7657 };
7658 int rem;
7659
7660 nla_for_each_nested(tidattr, attr, rem) {
7661 if (nla_parse_nested(tid_stats, NL80211_TID_STATS_MAX,
7662 tidattr, NULL) != 0 ||
7663 !tid_stats[NL80211_TID_STATS_TXQ_STATS] ||
7664 nla_parse_nested(txq_stats, NL80211_TXQ_STATS_MAX,
7665 tid_stats[NL80211_TID_STATS_TXQ_STATS],
7666 txq_stats_policy) != 0)
7667 continue;
7668 /* sum the backlogs over all TIDs for station */
7669 if (txq_stats[NL80211_TXQ_STATS_BACKLOG_BYTES])
7670 data->backlog_bytes += nla_get_u32(
7671 txq_stats[NL80211_TXQ_STATS_BACKLOG_BYTES]);
7672 if (txq_stats[NL80211_TXQ_STATS_BACKLOG_PACKETS])
7673 data->backlog_bytes += nla_get_u32(
7674 txq_stats[NL80211_TXQ_STATS_BACKLOG_PACKETS]);
7675 }
7676 }
7677
7678
get_sta_handler(struct nl_msg * msg,void * arg)7679 static int get_sta_handler(struct nl_msg *msg, void *arg)
7680 {
7681 struct nlattr *tb[NL80211_ATTR_MAX + 1];
7682 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7683 struct hostap_sta_driver_data *data = arg;
7684 struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
7685 static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
7686 [NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
7687 [NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
7688 [NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
7689 [NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
7690 [NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
7691 [NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
7692 [NL80211_STA_INFO_TX_RETRIES] = { .type = NLA_U32 },
7693 [NL80211_STA_INFO_TX_FAILED] = { .type = NLA_U32 },
7694 [NL80211_STA_INFO_SIGNAL_AVG] = { .type = NLA_U8 },
7695 [NL80211_STA_INFO_CONNECTED_TIME] = { .type = NLA_U32 },
7696 [NL80211_STA_INFO_BEACON_LOSS] = { .type = NLA_U32 },
7697 [NL80211_STA_INFO_RX_BYTES64] = { .type = NLA_U64 },
7698 [NL80211_STA_INFO_TX_BYTES64] = { .type = NLA_U64 },
7699 [NL80211_STA_INFO_EXPECTED_THROUGHPUT] = { .type = NLA_U32 },
7700 [NL80211_STA_INFO_RX_DROP_MISC] = { .type = NLA_U64 },
7701 [NL80211_STA_INFO_BEACON_RX] = { .type = NLA_U64 },
7702 [NL80211_STA_INFO_BEACON_SIGNAL_AVG] = { .type = NLA_U8},
7703 [NL80211_STA_INFO_RX_DURATION] = { .type = NLA_U64 },
7704 [NL80211_STA_INFO_ACK_SIGNAL] = { .type = NLA_U8 },
7705 [NL80211_STA_INFO_ACK_SIGNAL_AVG] = { .type = NLA_S8 },
7706 [NL80211_STA_INFO_RX_MPDUS] = { .type = NLA_U32 },
7707 [NL80211_STA_INFO_FCS_ERROR_COUNT] = { .type = NLA_U32 },
7708 [NL80211_STA_INFO_TX_DURATION] = { .type = NLA_U64 },
7709 };
7710 struct nlattr *rate[NL80211_RATE_INFO_MAX + 1];
7711 static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
7712 [NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
7713 [NL80211_RATE_INFO_BITRATE32] = { .type = NLA_U32 },
7714 [NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
7715 [NL80211_RATE_INFO_VHT_MCS] = { .type = NLA_U8 },
7716 [NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
7717 [NL80211_RATE_INFO_VHT_NSS] = { .type = NLA_U8 },
7718 [NL80211_RATE_INFO_HE_MCS] = { .type = NLA_U8 },
7719 [NL80211_RATE_INFO_HE_NSS] = { .type = NLA_U8 },
7720 [NL80211_RATE_INFO_HE_GI] = { .type = NLA_U8 },
7721 [NL80211_RATE_INFO_HE_DCM] = { .type = NLA_U8 },
7722 };
7723
7724 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7725 genlmsg_attrlen(gnlh, 0), NULL);
7726
7727 /*
7728 * TODO: validate the interface and mac address!
7729 * Otherwise, there's a race condition as soon as
7730 * the kernel starts sending station notifications.
7731 */
7732
7733 if (!tb[NL80211_ATTR_STA_INFO]) {
7734 wpa_printf(MSG_DEBUG, "sta stats missing!");
7735 return NL_SKIP;
7736 }
7737 if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
7738 tb[NL80211_ATTR_STA_INFO],
7739 stats_policy)) {
7740 wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
7741 return NL_SKIP;
7742 }
7743
7744 if (stats[NL80211_STA_INFO_INACTIVE_TIME])
7745 data->inactive_msec =
7746 nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
7747 /* For backwards compatibility, fetch the 32-bit counters first. */
7748 if (stats[NL80211_STA_INFO_RX_BYTES])
7749 data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
7750 if (stats[NL80211_STA_INFO_TX_BYTES])
7751 data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
7752 if (stats[NL80211_STA_INFO_RX_BYTES64] &&
7753 stats[NL80211_STA_INFO_TX_BYTES64]) {
7754 /*
7755 * The driver supports 64-bit counters, so use them to override
7756 * the 32-bit values.
7757 */
7758 data->rx_bytes =
7759 nla_get_u64(stats[NL80211_STA_INFO_RX_BYTES64]);
7760 data->tx_bytes =
7761 nla_get_u64(stats[NL80211_STA_INFO_TX_BYTES64]);
7762 data->bytes_64bit = 1;
7763 }
7764 if (stats[NL80211_STA_INFO_SIGNAL])
7765 data->signal = (s8) nla_get_u8(stats[NL80211_STA_INFO_SIGNAL]);
7766 if (stats[NL80211_STA_INFO_RX_PACKETS])
7767 data->rx_packets =
7768 nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
7769 if (stats[NL80211_STA_INFO_TX_PACKETS])
7770 data->tx_packets =
7771 nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
7772 if (stats[NL80211_STA_INFO_TX_RETRIES])
7773 data->tx_retry_count =
7774 nla_get_u32(stats[NL80211_STA_INFO_TX_RETRIES]);
7775 if (stats[NL80211_STA_INFO_TX_FAILED])
7776 data->tx_retry_failed =
7777 nla_get_u32(stats[NL80211_STA_INFO_TX_FAILED]);
7778 if (stats[NL80211_STA_INFO_SIGNAL_AVG])
7779 data->avg_signal =
7780 (s8) nla_get_u8(stats[NL80211_STA_INFO_SIGNAL_AVG]);
7781 if (stats[NL80211_STA_INFO_CONNECTED_TIME]) {
7782 data->connected_sec =
7783 nla_get_u32(stats[NL80211_STA_INFO_CONNECTED_TIME]);
7784 data->flags |= STA_DRV_DATA_CONN_TIME;
7785 }
7786 if (stats[NL80211_STA_INFO_BEACON_LOSS])
7787 data->beacon_loss_count =
7788 nla_get_u32(stats[NL80211_STA_INFO_BEACON_LOSS]);
7789 if (stats[NL80211_STA_INFO_EXPECTED_THROUGHPUT])
7790 data->expected_throughput =
7791 nla_get_u32(stats[NL80211_STA_INFO_EXPECTED_THROUGHPUT]);
7792 if (stats[NL80211_STA_INFO_RX_DROP_MISC])
7793 data->rx_drop_misc =
7794 nla_get_u64(stats[NL80211_STA_INFO_RX_DROP_MISC]);
7795 if (stats[NL80211_STA_INFO_BEACON_RX])
7796 data->beacons_count =
7797 nla_get_u64(stats[NL80211_STA_INFO_BEACON_RX]);
7798 if (stats[NL80211_STA_INFO_BEACON_SIGNAL_AVG])
7799 data->avg_beacon_signal =
7800 (s8) nla_get_u8(stats[NL80211_STA_INFO_BEACON_SIGNAL_AVG]);
7801 if (stats[NL80211_STA_INFO_RX_DURATION])
7802 data->rx_airtime =
7803 nla_get_u64(stats[NL80211_STA_INFO_RX_DURATION]);
7804 if (stats[NL80211_STA_INFO_ACK_SIGNAL]) {
7805 data->last_ack_rssi =
7806 nla_get_u8(stats[NL80211_STA_INFO_ACK_SIGNAL]);
7807 data->flags |= STA_DRV_DATA_LAST_ACK_RSSI;
7808 }
7809 if (stats[NL80211_STA_INFO_ACK_SIGNAL_AVG])
7810 data->avg_ack_signal =
7811 nla_get_s8(stats[NL80211_STA_INFO_ACK_SIGNAL_AVG]);
7812 if (stats[NL80211_STA_INFO_RX_MPDUS])
7813 data->rx_mpdus = nla_get_u32(stats[NL80211_STA_INFO_RX_MPDUS]);
7814 if (stats[NL80211_STA_INFO_FCS_ERROR_COUNT])
7815 data->fcs_error_count =
7816 nla_get_u32(stats[NL80211_STA_INFO_FCS_ERROR_COUNT]);
7817 if (stats[NL80211_STA_INFO_TX_DURATION])
7818 data->tx_airtime =
7819 nla_get_u64(stats[NL80211_STA_INFO_TX_DURATION]);
7820
7821 if (stats[NL80211_STA_INFO_TX_BITRATE] &&
7822 nla_parse_nested(rate, NL80211_RATE_INFO_MAX,
7823 stats[NL80211_STA_INFO_TX_BITRATE],
7824 rate_policy) == 0) {
7825 if (rate[NL80211_RATE_INFO_BITRATE32])
7826 data->current_tx_rate =
7827 nla_get_u32(rate[NL80211_RATE_INFO_BITRATE32]);
7828 else if (rate[NL80211_RATE_INFO_BITRATE])
7829 data->current_tx_rate =
7830 nla_get_u16(rate[NL80211_RATE_INFO_BITRATE]);
7831
7832 /* Convert from 100 kbps to kbps; it's a more convenient unit.
7833 * It's also safe up until ~1Tbps. */
7834 data->current_tx_rate = data->current_tx_rate * 100;
7835
7836 if (rate[NL80211_RATE_INFO_MCS]) {
7837 data->tx_mcs = nla_get_u8(rate[NL80211_RATE_INFO_MCS]);
7838 data->flags |= STA_DRV_DATA_TX_MCS;
7839 }
7840 if (rate[NL80211_RATE_INFO_VHT_MCS]) {
7841 data->tx_vhtmcs =
7842 nla_get_u8(rate[NL80211_RATE_INFO_VHT_MCS]);
7843 data->flags |= STA_DRV_DATA_TX_VHT_MCS;
7844 }
7845 if (rate[NL80211_RATE_INFO_SHORT_GI]) {
7846 data->tx_guard_interval = GUARD_INTERVAL_0_4;
7847 data->flags |= STA_DRV_DATA_TX_SHORT_GI;
7848 }
7849 if (rate[NL80211_RATE_INFO_VHT_NSS]) {
7850 data->tx_vht_nss =
7851 nla_get_u8(rate[NL80211_RATE_INFO_VHT_NSS]);
7852 data->flags |= STA_DRV_DATA_TX_VHT_NSS;
7853 }
7854 if (rate[NL80211_RATE_INFO_HE_MCS]) {
7855 data->tx_hemcs =
7856 nla_get_u8(rate[NL80211_RATE_INFO_HE_MCS]);
7857 data->flags |= STA_DRV_DATA_TX_HE_MCS;
7858 }
7859 if (rate[NL80211_RATE_INFO_HE_NSS]) {
7860 data->tx_he_nss =
7861 nla_get_u8(rate[NL80211_RATE_INFO_HE_NSS]);
7862 data->flags |= STA_DRV_DATA_TX_HE_NSS;
7863 }
7864 if (rate[NL80211_RATE_INFO_HE_GI]) {
7865 switch (nla_get_u8(rate[NL80211_RATE_INFO_HE_GI])) {
7866 case NL80211_RATE_INFO_HE_GI_0_8:
7867 data->tx_guard_interval = GUARD_INTERVAL_0_8;
7868 break;
7869 case NL80211_RATE_INFO_HE_GI_1_6:
7870 data->tx_guard_interval = GUARD_INTERVAL_1_6;
7871 break;
7872 case NL80211_RATE_INFO_HE_GI_3_2:
7873 data->tx_guard_interval = GUARD_INTERVAL_3_2;
7874 break;
7875 }
7876 data->flags |= STA_DRV_DATA_TX_HE_GI;
7877 }
7878 if (rate[NL80211_RATE_INFO_HE_DCM]) {
7879 data->tx_dcm =
7880 nla_get_u8(rate[NL80211_RATE_INFO_HE_DCM]);
7881 data->flags |= STA_DRV_DATA_TX_HE_DCM;
7882 }
7883 }
7884
7885 if (stats[NL80211_STA_INFO_RX_BITRATE] &&
7886 nla_parse_nested(rate, NL80211_RATE_INFO_MAX,
7887 stats[NL80211_STA_INFO_RX_BITRATE],
7888 rate_policy) == 0) {
7889 if (rate[NL80211_RATE_INFO_BITRATE32])
7890 data->current_rx_rate =
7891 nla_get_u32(rate[NL80211_RATE_INFO_BITRATE32]);
7892 else if (rate[NL80211_RATE_INFO_BITRATE])
7893 data->current_rx_rate =
7894 nla_get_u16(rate[NL80211_RATE_INFO_BITRATE]);
7895
7896 /* Convert from 100 kbps to kbps; it's a more convenient unit.
7897 * It's also safe up until ~1Tbps. */
7898 data->current_rx_rate = data->current_rx_rate * 100;
7899
7900 if (rate[NL80211_RATE_INFO_MCS]) {
7901 data->rx_mcs = nla_get_u8(rate[NL80211_RATE_INFO_MCS]);
7902 data->flags |= STA_DRV_DATA_RX_MCS;
7903 }
7904 if (rate[NL80211_RATE_INFO_VHT_MCS]) {
7905 data->rx_vhtmcs =
7906 nla_get_u8(rate[NL80211_RATE_INFO_VHT_MCS]);
7907 data->flags |= STA_DRV_DATA_RX_VHT_MCS;
7908 }
7909 if (rate[NL80211_RATE_INFO_SHORT_GI]) {
7910 data->rx_guard_interval = GUARD_INTERVAL_0_4;
7911 data->flags |= STA_DRV_DATA_RX_SHORT_GI;
7912 }
7913 if (rate[NL80211_RATE_INFO_VHT_NSS]) {
7914 data->rx_vht_nss =
7915 nla_get_u8(rate[NL80211_RATE_INFO_VHT_NSS]);
7916 data->flags |= STA_DRV_DATA_RX_VHT_NSS;
7917 }
7918 if (rate[NL80211_RATE_INFO_HE_MCS]) {
7919 data->rx_hemcs =
7920 nla_get_u8(rate[NL80211_RATE_INFO_HE_MCS]);
7921 data->flags |= STA_DRV_DATA_RX_HE_MCS;
7922 }
7923 if (rate[NL80211_RATE_INFO_HE_NSS]) {
7924 data->rx_he_nss =
7925 nla_get_u8(rate[NL80211_RATE_INFO_HE_NSS]);
7926 data->flags |= STA_DRV_DATA_RX_HE_NSS;
7927 }
7928 if (rate[NL80211_RATE_INFO_HE_GI]) {
7929 switch (nla_get_u8(rate[NL80211_RATE_INFO_HE_GI])) {
7930 case NL80211_RATE_INFO_HE_GI_0_8:
7931 data->rx_guard_interval = GUARD_INTERVAL_0_8;
7932 break;
7933 case NL80211_RATE_INFO_HE_GI_1_6:
7934 data->rx_guard_interval = GUARD_INTERVAL_1_6;
7935 break;
7936 case NL80211_RATE_INFO_HE_GI_3_2:
7937 data->rx_guard_interval = GUARD_INTERVAL_3_2;
7938 break;
7939 }
7940 data->flags |= STA_DRV_DATA_RX_HE_GI;
7941 }
7942 if (rate[NL80211_RATE_INFO_HE_DCM]) {
7943 data->rx_dcm =
7944 nla_get_u8(rate[NL80211_RATE_INFO_HE_DCM]);
7945 data->flags |= STA_DRV_DATA_RX_HE_DCM;
7946 }
7947 }
7948
7949 if (stats[NL80211_STA_INFO_TID_STATS])
7950 get_sta_tid_stats(data, stats[NL80211_STA_INFO_TID_STATS]);
7951
7952 return NL_SKIP;
7953 }
7954
7955
nl80211_get_link_signal(struct wpa_driver_nl80211_data * drv,const u8 * bssid,struct hostap_sta_driver_data * data)7956 int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
7957 const u8 *bssid,
7958 struct hostap_sta_driver_data *data)
7959 {
7960 struct nl_msg *msg;
7961
7962 data->signal = -WPA_INVALID_NOISE;
7963 data->current_tx_rate = 0;
7964
7965 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_STATION)) ||
7966 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid)) {
7967 nlmsg_free(msg);
7968 return -ENOBUFS;
7969 }
7970
7971 return send_and_recv_msgs(drv, msg, get_sta_handler, data, NULL, NULL);
7972 }
7973
7974
i802_read_sta_data(struct i802_bss * bss,struct hostap_sta_driver_data * data,const u8 * addr)7975 static int i802_read_sta_data(struct i802_bss *bss,
7976 struct hostap_sta_driver_data *data,
7977 const u8 *addr)
7978 {
7979 struct nl_msg *msg;
7980
7981 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_GET_STATION)) ||
7982 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
7983 nlmsg_free(msg);
7984 return -ENOBUFS;
7985 }
7986
7987 return send_and_recv_msgs(bss->drv, msg, get_sta_handler, data,
7988 NULL, NULL);
7989 }
7990
7991
i802_set_tx_queue_params(void * priv,int queue,int aifs,int cw_min,int cw_max,int burst_time)7992 static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
7993 int cw_min, int cw_max, int burst_time)
7994 {
7995 struct i802_bss *bss = priv;
7996 struct wpa_driver_nl80211_data *drv = bss->drv;
7997 struct nl_msg *msg;
7998 struct nlattr *txq, *params;
7999 int res;
8000
8001 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_WIPHY);
8002 if (!msg)
8003 return -1;
8004
8005 txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
8006 if (!txq)
8007 goto fail;
8008
8009 /* We are only sending parameters for a single TXQ at a time */
8010 params = nla_nest_start(msg, 1);
8011 if (!params)
8012 goto fail;
8013
8014 switch (queue) {
8015 case 0:
8016 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VO))
8017 goto fail;
8018 break;
8019 case 1:
8020 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VI))
8021 goto fail;
8022 break;
8023 case 2:
8024 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BE))
8025 goto fail;
8026 break;
8027 case 3:
8028 if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BK))
8029 goto fail;
8030 break;
8031 }
8032 /* Burst time is configured in units of 0.1 msec and TXOP parameter in
8033 * 32 usec, so need to convert the value here. */
8034 if (nla_put_u16(msg, NL80211_TXQ_ATTR_TXOP,
8035 (burst_time * 100 + 16) / 32) ||
8036 nla_put_u16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min) ||
8037 nla_put_u16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max) ||
8038 nla_put_u8(msg, NL80211_TXQ_ATTR_AIFS, aifs))
8039 goto fail;
8040
8041 nla_nest_end(msg, params);
8042
8043 nla_nest_end(msg, txq);
8044
8045 res = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8046 wpa_printf(MSG_DEBUG,
8047 "nl80211: TX queue param set: queue=%d aifs=%d cw_min=%d cw_max=%d burst_time=%d --> res=%d",
8048 queue, aifs, cw_min, cw_max, burst_time, res);
8049 if (res == 0)
8050 return 0;
8051 msg = NULL;
8052 fail:
8053 nlmsg_free(msg);
8054 return -1;
8055 }
8056
8057
i802_set_sta_vlan(struct i802_bss * bss,const u8 * addr,const char * ifname,int vlan_id)8058 static int i802_set_sta_vlan(struct i802_bss *bss, const u8 *addr,
8059 const char *ifname, int vlan_id)
8060 {
8061 struct wpa_driver_nl80211_data *drv = bss->drv;
8062 struct nl_msg *msg;
8063 int ret;
8064
8065 wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
8066 ", ifname=%s[%d], vlan_id=%d)",
8067 bss->ifname, if_nametoindex(bss->ifname),
8068 MAC2STR(addr), ifname, if_nametoindex(ifname), vlan_id);
8069 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
8070 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
8071 (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD) &&
8072 nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id)) ||
8073 nla_put_u32(msg, NL80211_ATTR_STA_VLAN, if_nametoindex(ifname))) {
8074 nlmsg_free(msg);
8075 return -ENOBUFS;
8076 }
8077
8078 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8079 if (ret < 0) {
8080 wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
8081 MACSTR " ifname=%s vlan_id=%d) failed: %d (%s)",
8082 MAC2STR(addr), ifname, vlan_id, ret,
8083 strerror(-ret));
8084 }
8085 return ret;
8086 }
8087
8088
i802_get_inact_sec(void * priv,const u8 * addr)8089 static int i802_get_inact_sec(void *priv, const u8 *addr)
8090 {
8091 struct hostap_sta_driver_data data;
8092 int ret;
8093
8094 os_memset(&data, 0, sizeof(data));
8095 data.inactive_msec = (unsigned long) -1;
8096 ret = i802_read_sta_data(priv, &data, addr);
8097 if (ret == -ENOENT)
8098 return -ENOENT;
8099 if (ret || data.inactive_msec == (unsigned long) -1)
8100 return -1;
8101 return data.inactive_msec / 1000;
8102 }
8103
8104
i802_sta_clear_stats(void * priv,const u8 * addr)8105 static int i802_sta_clear_stats(void *priv, const u8 *addr)
8106 {
8107 #if 0
8108 /* TODO */
8109 #endif
8110 return 0;
8111 }
8112
8113
i802_sta_deauth(void * priv,const u8 * own_addr,const u8 * addr,u16 reason)8114 static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
8115 u16 reason)
8116 {
8117 struct i802_bss *bss = priv;
8118 struct wpa_driver_nl80211_data *drv = bss->drv;
8119 struct ieee80211_mgmt mgmt;
8120 u8 channel;
8121
8122 if (ieee80211_freq_to_chan(bss->flink->freq, &channel) ==
8123 HOSTAPD_MODE_IEEE80211AD) {
8124 /* Deauthentication is not used in DMG/IEEE 802.11ad;
8125 * disassociate the STA instead. */
8126 return i802_sta_disassoc(priv, own_addr, addr, reason);
8127 }
8128
8129 if (is_mesh_interface(drv->nlmode))
8130 return -1;
8131
8132 if (drv->device_ap_sme)
8133 return wpa_driver_nl80211_sta_remove(bss, addr, 1, reason);
8134
8135 memset(&mgmt, 0, sizeof(mgmt));
8136 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
8137 WLAN_FC_STYPE_DEAUTH);
8138 memcpy(mgmt.da, addr, ETH_ALEN);
8139 memcpy(mgmt.sa, own_addr, ETH_ALEN);
8140 memcpy(mgmt.bssid, own_addr, ETH_ALEN);
8141 mgmt.u.deauth.reason_code = host_to_le16(reason);
8142 return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
8143 IEEE80211_HDRLEN +
8144 sizeof(mgmt.u.deauth), 0, 0, 0, 0,
8145 0, NULL, 0, 0);
8146 }
8147
8148
i802_sta_disassoc(void * priv,const u8 * own_addr,const u8 * addr,u16 reason)8149 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
8150 u16 reason)
8151 {
8152 struct i802_bss *bss = priv;
8153 struct wpa_driver_nl80211_data *drv = bss->drv;
8154 struct ieee80211_mgmt mgmt;
8155
8156 if (is_mesh_interface(drv->nlmode))
8157 return -1;
8158
8159 if (drv->device_ap_sme)
8160 return wpa_driver_nl80211_sta_remove(bss, addr, 0, reason);
8161
8162 memset(&mgmt, 0, sizeof(mgmt));
8163 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
8164 WLAN_FC_STYPE_DISASSOC);
8165 memcpy(mgmt.da, addr, ETH_ALEN);
8166 memcpy(mgmt.sa, own_addr, ETH_ALEN);
8167 memcpy(mgmt.bssid, own_addr, ETH_ALEN);
8168 mgmt.u.disassoc.reason_code = host_to_le16(reason);
8169 return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
8170 IEEE80211_HDRLEN +
8171 sizeof(mgmt.u.disassoc), 0, 0, 0, 0,
8172 0, NULL, 0, 0);
8173 }
8174
8175
dump_ifidx(struct wpa_driver_nl80211_data * drv)8176 static void dump_ifidx(struct wpa_driver_nl80211_data *drv)
8177 {
8178 char buf[200], *pos, *end;
8179 int i, res;
8180
8181 pos = buf;
8182 end = pos + sizeof(buf);
8183
8184 for (i = 0; i < drv->num_if_indices; i++) {
8185 if (!drv->if_indices[i].ifindex)
8186 continue;
8187 res = os_snprintf(pos, end - pos, " %d(%d)",
8188 drv->if_indices[i].ifindex,
8189 drv->if_indices[i].reason);
8190 if (os_snprintf_error(end - pos, res))
8191 break;
8192 pos += res;
8193 }
8194 *pos = '\0';
8195
8196 wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
8197 drv->num_if_indices, buf);
8198 }
8199
8200
add_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)8201 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
8202 int ifidx_reason)
8203 {
8204 int i;
8205 struct drv_nl80211_if_info *old;
8206
8207 wpa_printf(MSG_DEBUG,
8208 "nl80211: Add own interface ifindex %d (ifidx_reason %d)",
8209 ifidx, ifidx_reason);
8210 if (have_ifidx(drv, ifidx, ifidx_reason)) {
8211 wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
8212 ifidx);
8213 return;
8214 }
8215 for (i = 0; i < drv->num_if_indices; i++) {
8216 if (drv->if_indices[i].ifindex == 0) {
8217 drv->if_indices[i].ifindex = ifidx;
8218 drv->if_indices[i].reason = ifidx_reason;
8219 dump_ifidx(drv);
8220 return;
8221 }
8222 }
8223
8224 if (drv->if_indices != drv->default_if_indices)
8225 old = drv->if_indices;
8226 else
8227 old = NULL;
8228
8229 drv->if_indices = os_realloc_array(old, drv->num_if_indices + 1,
8230 sizeof(*old));
8231 if (!drv->if_indices) {
8232 if (!old)
8233 drv->if_indices = drv->default_if_indices;
8234 else
8235 drv->if_indices = old;
8236 wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
8237 "interfaces");
8238 wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
8239 return;
8240 }
8241 if (!old)
8242 os_memcpy(drv->if_indices, drv->default_if_indices,
8243 sizeof(drv->default_if_indices));
8244 drv->if_indices[drv->num_if_indices].ifindex = ifidx;
8245 drv->if_indices[drv->num_if_indices].reason = ifidx_reason;
8246 drv->num_if_indices++;
8247 dump_ifidx(drv);
8248 }
8249
8250
del_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)8251 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
8252 int ifidx_reason)
8253 {
8254 int i;
8255
8256 for (i = 0; i < drv->num_if_indices; i++) {
8257 if ((drv->if_indices[i].ifindex == ifidx ||
8258 ifidx == IFIDX_ANY) &&
8259 (drv->if_indices[i].reason == ifidx_reason ||
8260 ifidx_reason == IFIDX_ANY)) {
8261 drv->if_indices[i].ifindex = 0;
8262 drv->if_indices[i].reason = 0;
8263 break;
8264 }
8265 }
8266 dump_ifidx(drv);
8267 }
8268
8269
have_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)8270 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
8271 int ifidx_reason)
8272 {
8273 int i;
8274
8275 for (i = 0; i < drv->num_if_indices; i++)
8276 if (drv->if_indices[i].ifindex == ifidx &&
8277 (drv->if_indices[i].reason == ifidx_reason ||
8278 ifidx_reason == IFIDX_ANY))
8279 return 1;
8280
8281 return 0;
8282 }
8283
8284
i802_set_wds_sta(void * priv,const u8 * addr,int aid,int val,const char * bridge_ifname,char * ifname_wds)8285 static int i802_set_wds_sta(void *priv, const u8 *addr, int aid, int val,
8286 const char *bridge_ifname, char *ifname_wds)
8287 {
8288 struct i802_bss *bss = priv;
8289 struct wpa_driver_nl80211_data *drv = bss->drv;
8290 char name[IFNAMSIZ + 1];
8291 union wpa_event_data event;
8292 int ret;
8293
8294 ret = os_snprintf(name, sizeof(name), "%s.sta%d", bss->ifname, aid);
8295 if (ret >= (int) sizeof(name))
8296 wpa_printf(MSG_WARNING,
8297 "nl80211: WDS interface name was truncated");
8298 else if (ret < 0)
8299 return ret;
8300
8301 if (ifname_wds)
8302 os_strlcpy(ifname_wds, name, IFNAMSIZ + 1);
8303
8304 wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
8305 " aid=%d val=%d name=%s", MAC2STR(addr), aid, val, name);
8306 if (val) {
8307 if (!if_nametoindex(name)) {
8308 if (nl80211_create_iface(drv, name,
8309 NL80211_IFTYPE_AP_VLAN,
8310 bss->addr, 1, NULL, NULL, 0) <
8311 0)
8312 return -1;
8313 if (bridge_ifname &&
8314 linux_br_add_if(drv->global->ioctl_sock,
8315 bridge_ifname, name) < 0)
8316 return -1;
8317
8318 os_memset(&event, 0, sizeof(event));
8319 event.wds_sta_interface.sta_addr = addr;
8320 event.wds_sta_interface.ifname = name;
8321 event.wds_sta_interface.istatus = INTERFACE_ADDED;
8322 wpa_supplicant_event(bss->ctx,
8323 EVENT_WDS_STA_INTERFACE_STATUS,
8324 &event);
8325 }
8326 if (linux_set_iface_flags(drv->global->ioctl_sock, name, 1)) {
8327 wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
8328 "interface %s up", name);
8329 }
8330 return i802_set_sta_vlan(priv, addr, name, 0);
8331 } else {
8332 if (bridge_ifname &&
8333 linux_br_del_if(drv->global->ioctl_sock, bridge_ifname,
8334 name) < 0)
8335 wpa_printf(MSG_INFO,
8336 "nl80211: Failed to remove interface %s from bridge %s: %s",
8337 name, bridge_ifname, strerror(errno));
8338
8339 i802_set_sta_vlan(priv, addr, bss->ifname, 0);
8340 nl80211_remove_iface(drv, if_nametoindex(name));
8341 os_memset(&event, 0, sizeof(event));
8342 event.wds_sta_interface.sta_addr = addr;
8343 event.wds_sta_interface.ifname = name;
8344 event.wds_sta_interface.istatus = INTERFACE_REMOVED;
8345 wpa_supplicant_event(bss->ctx, EVENT_WDS_STA_INTERFACE_STATUS,
8346 &event);
8347 return 0;
8348 }
8349 }
8350
8351
handle_eapol(int sock,void * eloop_ctx,void * sock_ctx)8352 static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
8353 {
8354 struct wpa_driver_nl80211_data *drv = eloop_ctx;
8355 struct sockaddr_ll lladdr;
8356 unsigned char buf[3000];
8357 int len;
8358 socklen_t fromlen = sizeof(lladdr);
8359
8360 len = recvfrom(sock, buf, sizeof(buf), 0,
8361 (struct sockaddr *)&lladdr, &fromlen);
8362 if (len < 0) {
8363 wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
8364 strerror(errno));
8365 return;
8366 }
8367
8368 if (have_ifidx(drv, lladdr.sll_ifindex, IFIDX_ANY))
8369 drv_event_eapol_rx(drv->ctx, lladdr.sll_addr, buf, len);
8370 }
8371
8372
i802_check_bridge(struct wpa_driver_nl80211_data * drv,struct i802_bss * bss,const char * brname,const char * ifname)8373 static int i802_check_bridge(struct wpa_driver_nl80211_data *drv,
8374 struct i802_bss *bss,
8375 const char *brname, const char *ifname)
8376 {
8377 int br_ifindex;
8378 char in_br[IFNAMSIZ];
8379
8380 os_strlcpy(bss->brname, brname, IFNAMSIZ);
8381 br_ifindex = if_nametoindex(brname);
8382 if (br_ifindex == 0) {
8383 /*
8384 * Bridge was configured, but the bridge device does
8385 * not exist. Try to add it now.
8386 */
8387 if (linux_br_add(drv->global->ioctl_sock, brname) < 0) {
8388 wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
8389 "bridge interface %s: %s",
8390 brname, strerror(errno));
8391 return -1;
8392 }
8393 bss->added_bridge = 1;
8394 br_ifindex = if_nametoindex(brname);
8395 add_ifidx(drv, br_ifindex, drv->ifindex);
8396 }
8397 bss->br_ifindex = br_ifindex;
8398
8399 if (linux_br_get(in_br, ifname) == 0) {
8400 if (os_strcmp(in_br, brname) == 0) {
8401 bss->already_in_bridge = 1;
8402 return 0; /* already in the bridge */
8403 }
8404
8405 wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
8406 "bridge %s", ifname, in_br);
8407 if (linux_br_del_if(drv->global->ioctl_sock, in_br, ifname) <
8408 0) {
8409 wpa_printf(MSG_ERROR, "nl80211: Failed to "
8410 "remove interface %s from bridge "
8411 "%s: %s",
8412 ifname, in_br, strerror(errno));
8413 return -1;
8414 }
8415 }
8416
8417 wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
8418 ifname, brname);
8419 if (linux_br_add_if(drv->global->ioctl_sock, brname, ifname) < 0) {
8420 wpa_printf(MSG_WARNING,
8421 "nl80211: Failed to add interface %s into bridge %s: %s",
8422 ifname, brname, strerror(errno));
8423 /* Try to continue without the interface being in a bridge. This
8424 * may be needed for some cases, e.g., with Open vSwitch, where
8425 * an external component will need to handle bridge
8426 * configuration. */
8427 return 0;
8428 }
8429 bss->added_if_into_bridge = 1;
8430
8431 return 0;
8432 }
8433
8434
i802_init(struct hostapd_data * hapd,struct wpa_init_params * params)8435 static void *i802_init(struct hostapd_data *hapd,
8436 struct wpa_init_params *params)
8437 {
8438 struct wpa_driver_nl80211_data *drv;
8439 struct i802_bss *bss;
8440 size_t i;
8441 char master_ifname[IFNAMSIZ];
8442 int ifindex, br_ifindex = 0;
8443 int br_added = 0;
8444
8445 bss = wpa_driver_nl80211_drv_init(hapd, params->ifname,
8446 params->global_priv, 1,
8447 params->bssid, params->driver_params);
8448 if (bss == NULL)
8449 return NULL;
8450
8451 drv = bss->drv;
8452
8453 if (linux_br_get(master_ifname, params->ifname) == 0) {
8454 wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
8455 params->ifname, master_ifname);
8456 br_ifindex = if_nametoindex(master_ifname);
8457 os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
8458 } else if ((params->num_bridge == 0 || !params->bridge[0]) &&
8459 linux_master_get(master_ifname, params->ifname) == 0) {
8460 wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in master %s",
8461 params->ifname, master_ifname);
8462 /* start listening for EAPOL on the master interface */
8463 add_ifidx(drv, if_nametoindex(master_ifname), drv->ifindex);
8464
8465 /* check if master itself is under bridge */
8466 if (linux_br_get(master_ifname, master_ifname) == 0) {
8467 wpa_printf(MSG_DEBUG, "nl80211: which is in bridge %s",
8468 master_ifname);
8469 br_ifindex = if_nametoindex(master_ifname);
8470 os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
8471 }
8472 } else {
8473 master_ifname[0] = '\0';
8474 }
8475
8476 bss->br_ifindex = br_ifindex;
8477
8478 for (i = 0; i < params->num_bridge; i++) {
8479 if (params->bridge[i]) {
8480 ifindex = if_nametoindex(params->bridge[i]);
8481 if (ifindex)
8482 add_ifidx(drv, ifindex, drv->ifindex);
8483 if (ifindex == br_ifindex)
8484 br_added = 1;
8485 }
8486 }
8487
8488 /* start listening for EAPOL on the default AP interface */
8489 add_ifidx(drv, drv->ifindex, IFIDX_ANY);
8490
8491 if (params->num_bridge && params->bridge[0]) {
8492 if (i802_check_bridge(drv, bss, params->bridge[0],
8493 params->ifname) < 0)
8494 goto failed;
8495 if (os_strcmp(params->bridge[0], master_ifname) != 0)
8496 br_added = 1;
8497 }
8498
8499 if (!br_added && br_ifindex &&
8500 (params->num_bridge == 0 || !params->bridge[0]))
8501 add_ifidx(drv, br_ifindex, drv->ifindex);
8502
8503 #ifdef CONFIG_LIBNL3_ROUTE
8504 if (bss->added_if_into_bridge || bss->already_in_bridge) {
8505 int err;
8506
8507 drv->rtnl_sk = nl_socket_alloc();
8508 if (drv->rtnl_sk == NULL) {
8509 wpa_printf(MSG_ERROR, "nl80211: Failed to allocate nl_sock");
8510 goto failed;
8511 }
8512
8513 err = nl_connect(drv->rtnl_sk, NETLINK_ROUTE);
8514 if (err) {
8515 wpa_printf(MSG_ERROR, "nl80211: Failed to connect nl_sock to NETLINK_ROUTE: %s",
8516 nl_geterror(err));
8517 goto failed;
8518 }
8519 }
8520 #endif /* CONFIG_LIBNL3_ROUTE */
8521
8522 if (drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) {
8523 wpa_printf(MSG_DEBUG,
8524 "nl80211: Do not open EAPOL RX socket - using control port for RX");
8525 goto skip_eapol_sock;
8526 }
8527
8528 drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
8529 if (drv->eapol_sock < 0) {
8530 wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
8531 strerror(errno));
8532 goto failed;
8533 }
8534
8535 if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
8536 {
8537 wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
8538 goto failed;
8539 }
8540 skip_eapol_sock:
8541
8542 if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
8543 params->own_addr))
8544 goto failed;
8545 os_memcpy(drv->perm_addr, params->own_addr, ETH_ALEN);
8546
8547 memcpy(bss->addr, params->own_addr, ETH_ALEN);
8548
8549 return bss;
8550
8551 failed:
8552 wpa_driver_nl80211_deinit(bss);
8553 return NULL;
8554 }
8555
8556
i802_deinit(void * priv)8557 static void i802_deinit(void *priv)
8558 {
8559 struct i802_bss *bss = priv;
8560 wpa_driver_nl80211_deinit(bss);
8561 }
8562
8563
wpa_driver_nl80211_if_type(enum wpa_driver_if_type type)8564 static enum nl80211_iftype wpa_driver_nl80211_if_type(
8565 enum wpa_driver_if_type type)
8566 {
8567 switch (type) {
8568 case WPA_IF_STATION:
8569 return NL80211_IFTYPE_STATION;
8570 case WPA_IF_P2P_CLIENT:
8571 case WPA_IF_P2P_GROUP:
8572 return NL80211_IFTYPE_P2P_CLIENT;
8573 case WPA_IF_AP_VLAN:
8574 return NL80211_IFTYPE_AP_VLAN;
8575 case WPA_IF_AP_BSS:
8576 return NL80211_IFTYPE_AP;
8577 case WPA_IF_P2P_GO:
8578 return NL80211_IFTYPE_P2P_GO;
8579 case WPA_IF_P2P_DEVICE:
8580 return NL80211_IFTYPE_P2P_DEVICE;
8581 case WPA_IF_MESH:
8582 return NL80211_IFTYPE_MESH_POINT;
8583 default:
8584 return -1;
8585 }
8586 }
8587
8588
nl80211_addr_in_use(struct nl80211_global * global,const u8 * addr)8589 static int nl80211_addr_in_use(struct nl80211_global *global, const u8 *addr)
8590 {
8591 struct wpa_driver_nl80211_data *drv;
8592 dl_list_for_each(drv, &global->interfaces,
8593 struct wpa_driver_nl80211_data, list) {
8594 if (os_memcmp(addr, drv->first_bss->addr, ETH_ALEN) == 0)
8595 return 1;
8596 }
8597 return 0;
8598 }
8599
8600
nl80211_vif_addr(struct wpa_driver_nl80211_data * drv,u8 * new_addr)8601 static int nl80211_vif_addr(struct wpa_driver_nl80211_data *drv, u8 *new_addr)
8602 {
8603 unsigned int idx;
8604
8605 if (!drv->global)
8606 return -1;
8607
8608 os_memcpy(new_addr, drv->first_bss->addr, ETH_ALEN);
8609 for (idx = 0; idx < 64; idx++) {
8610 new_addr[0] = drv->first_bss->addr[0] | 0x02;
8611 new_addr[0] ^= idx << 2;
8612 if (!nl80211_addr_in_use(drv->global, new_addr))
8613 break;
8614 }
8615 if (idx == 64)
8616 return -1;
8617
8618 wpa_printf(MSG_DEBUG, "nl80211: Assigned new virtual interface address "
8619 MACSTR, MAC2STR(new_addr));
8620
8621 return 0;
8622 }
8623
8624
8625 struct wdev_info {
8626 u64 wdev_id;
8627 int wdev_id_set;
8628 u8 macaddr[ETH_ALEN];
8629 };
8630
nl80211_wdev_handler(struct nl_msg * msg,void * arg)8631 static int nl80211_wdev_handler(struct nl_msg *msg, void *arg)
8632 {
8633 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8634 struct nlattr *tb[NL80211_ATTR_MAX + 1];
8635 struct wdev_info *wi = arg;
8636
8637 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8638 genlmsg_attrlen(gnlh, 0), NULL);
8639 if (tb[NL80211_ATTR_WDEV]) {
8640 wi->wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
8641 wi->wdev_id_set = 1;
8642 }
8643
8644 if (tb[NL80211_ATTR_MAC])
8645 os_memcpy(wi->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
8646 ETH_ALEN);
8647
8648 return NL_SKIP;
8649 }
8650
8651
wpa_driver_nl80211_if_add(void * priv,enum wpa_driver_if_type type,const char * ifname,const u8 * addr,void * bss_ctx,void ** drv_priv,char * force_ifname,u8 * if_addr,const char * bridge,int use_existing,int setup_ap)8652 static int wpa_driver_nl80211_if_add(void *priv, enum wpa_driver_if_type type,
8653 const char *ifname, const u8 *addr,
8654 void *bss_ctx, void **drv_priv,
8655 char *force_ifname, u8 *if_addr,
8656 const char *bridge, int use_existing,
8657 int setup_ap)
8658 {
8659 enum nl80211_iftype nlmode;
8660 struct i802_bss *bss = priv;
8661 struct wpa_driver_nl80211_data *drv = bss->drv;
8662 int ifidx;
8663 int added = 1;
8664
8665 if (addr)
8666 os_memcpy(if_addr, addr, ETH_ALEN);
8667 nlmode = wpa_driver_nl80211_if_type(type);
8668 if (nlmode == NL80211_IFTYPE_P2P_DEVICE) {
8669 struct wdev_info p2pdev_info;
8670
8671 os_memset(&p2pdev_info, 0, sizeof(p2pdev_info));
8672 ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
8673 0, nl80211_wdev_handler,
8674 &p2pdev_info, use_existing);
8675 if (!p2pdev_info.wdev_id_set || ifidx != 0) {
8676 wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
8677 ifname);
8678 return -1;
8679 }
8680
8681 drv->global->if_add_wdevid = p2pdev_info.wdev_id;
8682 drv->global->if_add_wdevid_set = p2pdev_info.wdev_id_set;
8683 if (!is_zero_ether_addr(p2pdev_info.macaddr)) {
8684 os_memcpy(if_addr, p2pdev_info.macaddr, ETH_ALEN);
8685 os_memcpy(drv->global->p2p_perm_addr, p2pdev_info.macaddr, ETH_ALEN);
8686 }
8687 wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
8688 ifname,
8689 (long long unsigned int) p2pdev_info.wdev_id);
8690 } else {
8691 ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
8692 0, NULL, NULL, use_existing);
8693 if (use_existing && ifidx == -ENFILE) {
8694 added = 0;
8695 ifidx = if_nametoindex(ifname);
8696 } else if (ifidx < 0) {
8697 return -1;
8698 }
8699 }
8700
8701 if (!addr) {
8702 if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
8703 os_memcpy(if_addr, bss->addr, ETH_ALEN);
8704 else if (linux_get_ifhwaddr(drv->global->ioctl_sock,
8705 ifname, if_addr) < 0) {
8706 if (added)
8707 nl80211_remove_iface(drv, ifidx);
8708 return -1;
8709 }
8710 }
8711
8712 if (!addr &&
8713 (type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP ||
8714 type == WPA_IF_P2P_GO || type == WPA_IF_MESH ||
8715 type == WPA_IF_STATION || type == WPA_IF_AP_BSS)) {
8716 /* Enforce unique address */
8717 u8 new_addr[ETH_ALEN];
8718
8719 if (linux_get_ifhwaddr(drv->global->ioctl_sock, ifname,
8720 new_addr) < 0) {
8721 if (added)
8722 nl80211_remove_iface(drv, ifidx);
8723 return -1;
8724 }
8725 if (nl80211_addr_in_use(drv->global, new_addr)) {
8726 wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
8727 "for interface %s type %d", ifname, type);
8728 if (nl80211_vif_addr(drv, new_addr) < 0) {
8729 if (added)
8730 nl80211_remove_iface(drv, ifidx);
8731 return -1;
8732 }
8733 if (linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
8734 new_addr) < 0) {
8735 if (added)
8736 nl80211_remove_iface(drv, ifidx);
8737 return -1;
8738 }
8739 }
8740 os_memcpy(if_addr, new_addr, ETH_ALEN);
8741 }
8742
8743 if (type == WPA_IF_AP_BSS && setup_ap) {
8744 struct i802_bss *new_bss = os_zalloc(sizeof(*new_bss));
8745 unsigned int i;
8746
8747 if (new_bss == NULL) {
8748 if (added)
8749 nl80211_remove_iface(drv, ifidx);
8750 return -1;
8751 }
8752
8753 /* Initialize here before any failure path */
8754 for (i = 0; i < MAX_NUM_MLD_LINKS; i++)
8755 new_bss->links[i].link_id = NL80211_DRV_LINK_ID_NA;
8756
8757 if (bridge &&
8758 i802_check_bridge(drv, new_bss, bridge, ifname) < 0) {
8759 wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
8760 "interface %s to a bridge %s",
8761 ifname, bridge);
8762 if (added)
8763 nl80211_remove_iface(drv, ifidx);
8764 os_free(new_bss);
8765 return -1;
8766 }
8767
8768 if (linux_set_iface_flags(drv->global->ioctl_sock, ifname, 1))
8769 {
8770 if (added)
8771 nl80211_remove_iface(drv, ifidx);
8772 os_free(new_bss);
8773 return -1;
8774 }
8775 os_strlcpy(new_bss->ifname, ifname, IFNAMSIZ);
8776 os_memcpy(new_bss->addr, if_addr, ETH_ALEN);
8777 new_bss->ifindex = ifidx;
8778 new_bss->drv = drv;
8779 new_bss->next = drv->first_bss->next;
8780 new_bss->flink = &new_bss->links[0];
8781 new_bss->n_links = 1;
8782 os_memcpy(new_bss->flink->addr, new_bss->addr, ETH_ALEN);
8783
8784 new_bss->flink->freq = drv->first_bss->flink->freq;
8785 new_bss->ctx = bss_ctx;
8786 new_bss->added_if = added;
8787 drv->first_bss->next = new_bss;
8788 if (drv_priv)
8789 *drv_priv = new_bss;
8790 nl80211_init_bss(new_bss);
8791
8792 /* Subscribe management frames for this WPA_IF_AP_BSS */
8793 if (nl80211_setup_ap(new_bss))
8794 return -1;
8795 }
8796
8797 if (drv->global)
8798 drv->global->if_add_ifindex = ifidx;
8799
8800 /*
8801 * Some virtual interfaces need to process EAPOL packets and events on
8802 * the parent interface. This is used mainly with hostapd.
8803 */
8804 if (ifidx > 0 &&
8805 (drv->hostapd ||
8806 nlmode == NL80211_IFTYPE_AP_VLAN ||
8807 nlmode == NL80211_IFTYPE_WDS ||
8808 nlmode == NL80211_IFTYPE_MONITOR))
8809 add_ifidx(drv, ifidx, IFIDX_ANY);
8810
8811 return 0;
8812 }
8813
8814
wpa_driver_nl80211_if_remove(struct i802_bss * bss,enum wpa_driver_if_type type,const char * ifname)8815 static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
8816 enum wpa_driver_if_type type,
8817 const char *ifname)
8818 {
8819 struct wpa_driver_nl80211_data *drv = bss->drv;
8820 int ifindex = if_nametoindex(ifname);
8821
8822 wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
8823 __func__, type, ifname, ifindex, bss->added_if);
8824 if (ifindex > 0 && (bss->added_if || bss->ifindex != ifindex))
8825 nl80211_remove_iface(drv, ifindex);
8826 else if (ifindex > 0 && !bss->added_if) {
8827 struct wpa_driver_nl80211_data *drv2;
8828 dl_list_for_each(drv2, &drv->global->interfaces,
8829 struct wpa_driver_nl80211_data, list) {
8830 del_ifidx(drv2, ifindex, IFIDX_ANY);
8831 del_ifidx(drv2, IFIDX_ANY, ifindex);
8832 }
8833 }
8834
8835 if (type != WPA_IF_AP_BSS)
8836 return 0;
8837
8838 if (bss->added_if_into_bridge) {
8839 if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
8840 bss->ifname) < 0)
8841 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
8842 "interface %s from bridge %s: %s",
8843 bss->ifname, bss->brname, strerror(errno));
8844 }
8845 if (bss->added_bridge) {
8846 if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
8847 wpa_printf(MSG_INFO, "nl80211: Failed to remove "
8848 "bridge %s: %s",
8849 bss->brname, strerror(errno));
8850 }
8851
8852 if (bss != drv->first_bss) {
8853 struct i802_bss *tbss;
8854
8855 wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
8856 for (tbss = drv->first_bss; tbss; tbss = tbss->next) {
8857 if (tbss->next == bss) {
8858 tbss->next = bss->next;
8859 /* Unsubscribe management frames */
8860 nl80211_teardown_ap(bss);
8861 nl80211_destroy_bss(bss);
8862 if (!bss->added_if)
8863 i802_set_iface_flags(bss, 0);
8864 os_free(bss);
8865 bss = NULL;
8866 break;
8867 }
8868 }
8869 if (bss)
8870 wpa_printf(MSG_INFO, "nl80211: %s - could not find "
8871 "BSS %p in the list", __func__, bss);
8872 } else {
8873 wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
8874 nl80211_teardown_ap(bss);
8875 if (!bss->added_if && !drv->first_bss->next)
8876 wpa_driver_nl80211_del_beacon_all(bss);
8877 nl80211_destroy_bss(bss);
8878 if (!bss->added_if)
8879 i802_set_iface_flags(bss, 0);
8880 if (drv->first_bss->next) {
8881 drv->first_bss = drv->first_bss->next;
8882 drv->ctx = drv->first_bss->ctx;
8883 os_free(bss);
8884 } else {
8885 wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
8886 }
8887 }
8888
8889 return 0;
8890 }
8891
8892
cookie_handler(struct nl_msg * msg,void * arg)8893 static int cookie_handler(struct nl_msg *msg, void *arg)
8894 {
8895 struct nlattr *tb[NL80211_ATTR_MAX + 1];
8896 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8897 u64 *cookie = arg;
8898 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8899 genlmsg_attrlen(gnlh, 0), NULL);
8900 if (tb[NL80211_ATTR_COOKIE])
8901 *cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
8902 return NL_SKIP;
8903 }
8904
8905
nl80211_send_frame_cmd(struct i802_bss * bss,unsigned int freq,unsigned int wait,const u8 * buf,size_t buf_len,int save_cookie,int no_cck,int no_ack,int offchanok,const u16 * csa_offs,size_t csa_offs_len)8906 static int nl80211_send_frame_cmd(struct i802_bss *bss,
8907 unsigned int freq, unsigned int wait,
8908 const u8 *buf, size_t buf_len,
8909 int save_cookie, int no_cck, int no_ack,
8910 int offchanok, const u16 *csa_offs,
8911 size_t csa_offs_len)
8912 {
8913 struct wpa_driver_nl80211_data *drv = bss->drv;
8914 struct nl_msg *msg;
8915 u64 cookie;
8916 int ret = -1;
8917
8918 wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
8919 "no_ack=%d offchanok=%d",
8920 freq, wait, no_cck, no_ack, offchanok);
8921 wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len);
8922
8923 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME)) ||
8924 (freq && nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq)) ||
8925 (wait && nla_put_u32(msg, NL80211_ATTR_DURATION, wait)) ||
8926 (offchanok && ((drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
8927 drv->test_use_roc_tx) &&
8928 nla_put_flag(msg, NL80211_ATTR_OFFCHANNEL_TX_OK)) ||
8929 (no_cck && nla_put_flag(msg, NL80211_ATTR_TX_NO_CCK_RATE)) ||
8930 (no_ack && nla_put_flag(msg, NL80211_ATTR_DONT_WAIT_FOR_ACK)) ||
8931 (csa_offs && nla_put(msg, NL80211_ATTR_CSA_C_OFFSETS_TX,
8932 csa_offs_len * sizeof(u16), csa_offs)) ||
8933 nla_put(msg, NL80211_ATTR_FRAME, buf_len, buf))
8934 goto fail;
8935
8936 cookie = 0;
8937 ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
8938 msg = NULL;
8939 if (ret) {
8940 wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
8941 "(%s) (freq=%u wait=%u)", ret, strerror(-ret),
8942 freq, wait);
8943 } else {
8944 wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
8945 "cookie 0x%llx", no_ack ? " (no ACK)" : "",
8946 (long long unsigned int) cookie);
8947
8948 if (save_cookie)
8949 drv->send_frame_cookie = no_ack ? (u64) -1 : cookie;
8950
8951 if (!wait) {
8952 /* There is no need to store this cookie since there
8953 * is no wait that could be canceled later. */
8954 goto fail;
8955 }
8956 if (drv->num_send_frame_cookies == MAX_SEND_FRAME_COOKIES) {
8957 wpa_printf(MSG_DEBUG,
8958 "nl80211: Drop oldest pending send frame cookie 0x%llx",
8959 (long long unsigned int)
8960 drv->send_frame_cookies[0]);
8961 os_memmove(&drv->send_frame_cookies[0],
8962 &drv->send_frame_cookies[1],
8963 (MAX_SEND_FRAME_COOKIES - 1) *
8964 sizeof(u64));
8965 drv->num_send_frame_cookies--;
8966 }
8967 drv->send_frame_cookies[drv->num_send_frame_cookies] = cookie;
8968 drv->num_send_frame_cookies++;
8969 }
8970
8971 fail:
8972 nlmsg_free(msg);
8973 return ret;
8974 }
8975
8976
wpa_driver_nl80211_send_action(struct i802_bss * bss,unsigned int freq,unsigned int wait_time,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,int no_cck)8977 static int wpa_driver_nl80211_send_action(struct i802_bss *bss,
8978 unsigned int freq,
8979 unsigned int wait_time,
8980 const u8 *dst, const u8 *src,
8981 const u8 *bssid,
8982 const u8 *data, size_t data_len,
8983 int no_cck)
8984 {
8985 struct wpa_driver_nl80211_data *drv = bss->drv;
8986 int ret = -1;
8987 u8 *buf;
8988 struct ieee80211_hdr *hdr;
8989 int offchanok = 1;
8990
8991 if (is_ap_interface(drv->nlmode) && (int) freq == bss->flink->freq &&
8992 bss->flink->beacon_set)
8993 offchanok = 0;
8994
8995 wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
8996 "freq=%u MHz wait=%d ms no_cck=%d offchanok=%d)",
8997 drv->ifindex, freq, wait_time, no_cck, offchanok);
8998
8999 buf = os_zalloc(24 + data_len);
9000 if (buf == NULL)
9001 return ret;
9002 os_memcpy(buf + 24, data, data_len);
9003 hdr = (struct ieee80211_hdr *) buf;
9004 hdr->frame_control =
9005 IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
9006 os_memcpy(hdr->addr1, dst, ETH_ALEN);
9007 os_memcpy(hdr->addr2, src, ETH_ALEN);
9008 os_memcpy(hdr->addr3, bssid, ETH_ALEN);
9009
9010 if (os_memcmp(bss->addr, src, ETH_ALEN) != 0) {
9011 wpa_printf(MSG_DEBUG, "nl80211: Use random TA " MACSTR,
9012 MAC2STR(src));
9013 os_memcpy(bss->rand_addr, src, ETH_ALEN);
9014 } else {
9015 os_memset(bss->rand_addr, 0, ETH_ALEN);
9016 }
9017
9018 #ifdef CONFIG_MESH
9019 if (is_mesh_interface(drv->nlmode)) {
9020 struct hostapd_hw_modes *modes;
9021 u16 num_modes, flags;
9022 u8 dfs_domain;
9023 int i;
9024
9025 modes = nl80211_get_hw_feature_data(bss, &num_modes,
9026 &flags, &dfs_domain);
9027 if (dfs_domain != HOSTAPD_DFS_REGION_ETSI &&
9028 ieee80211_is_dfs(bss->flink->freq, modes, num_modes))
9029 offchanok = 0;
9030 if (modes) {
9031 for (i = 0; i < num_modes; i++) {
9032 os_free(modes[i].channels);
9033 os_free(modes[i].rates);
9034 }
9035 os_free(modes);
9036 }
9037 }
9038 #endif /* CONFIG_MESH */
9039
9040 if (is_ap_interface(drv->nlmode) &&
9041 (!(drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
9042 (int) freq == bss->flink->freq || drv->device_ap_sme ||
9043 !drv->use_monitor))
9044 ret = wpa_driver_nl80211_send_mlme(bss, buf, 24 + data_len,
9045 0, freq, no_cck, offchanok,
9046 wait_time, NULL, 0, 0);
9047 else
9048 ret = nl80211_send_frame_cmd(bss, freq, wait_time, buf,
9049 24 + data_len,
9050 1, no_cck, 0, offchanok, NULL, 0);
9051
9052 os_free(buf);
9053 return ret;
9054 }
9055
9056
nl80211_frame_wait_cancel(struct i802_bss * bss,u64 cookie)9057 static void nl80211_frame_wait_cancel(struct i802_bss *bss, u64 cookie)
9058 {
9059 struct wpa_driver_nl80211_data *drv = bss->drv;
9060 struct nl_msg *msg;
9061 int ret;
9062
9063 wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
9064 (long long unsigned int) cookie);
9065 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME_WAIT_CANCEL)) ||
9066 nla_put_u64(msg, NL80211_ATTR_COOKIE, cookie)) {
9067 nlmsg_free(msg);
9068 return;
9069 }
9070
9071 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9072 if (ret)
9073 wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
9074 "(%s)", ret, strerror(-ret));
9075 }
9076
9077
wpa_driver_nl80211_send_action_cancel_wait(void * priv)9078 static void wpa_driver_nl80211_send_action_cancel_wait(void *priv)
9079 {
9080 struct i802_bss *bss = priv;
9081 struct wpa_driver_nl80211_data *drv = bss->drv;
9082 unsigned int i;
9083 u64 cookie;
9084
9085 /* Cancel the last pending TX cookie */
9086 if (drv->send_frame_cookie != (u64) -1)
9087 nl80211_frame_wait_cancel(bss, drv->send_frame_cookie);
9088
9089 /*
9090 * Cancel the other pending TX cookies, if any. This is needed since
9091 * the driver may keep a list of all pending offchannel TX operations
9092 * and free up the radio only once they have expired or cancelled.
9093 */
9094 for (i = drv->num_send_frame_cookies; i > 0; i--) {
9095 cookie = drv->send_frame_cookies[i - 1];
9096 if (cookie != drv->send_frame_cookie)
9097 nl80211_frame_wait_cancel(bss, cookie);
9098 }
9099 drv->num_send_frame_cookies = 0;
9100 }
9101
9102
wpa_driver_nl80211_remain_on_channel(void * priv,unsigned int freq,unsigned int duration)9103 static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq,
9104 unsigned int duration)
9105 {
9106 struct i802_bss *bss = priv;
9107 struct wpa_driver_nl80211_data *drv = bss->drv;
9108 struct nl_msg *msg;
9109 int ret;
9110 u64 cookie;
9111
9112 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REMAIN_ON_CHANNEL)) ||
9113 nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq) ||
9114 nla_put_u32(msg, NL80211_ATTR_DURATION, duration)) {
9115 nlmsg_free(msg);
9116 return -1;
9117 }
9118
9119 cookie = 0;
9120 ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
9121 if (ret == 0) {
9122 wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
9123 "0x%llx for freq=%u MHz duration=%u",
9124 (long long unsigned int) cookie, freq, duration);
9125 drv->remain_on_chan_cookie = cookie;
9126 drv->pending_remain_on_chan = 1;
9127 return 0;
9128 }
9129 wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
9130 "(freq=%d duration=%u): %d (%s)",
9131 freq, duration, ret, strerror(-ret));
9132 return -1;
9133 }
9134
9135
wpa_driver_nl80211_cancel_remain_on_channel(void * priv)9136 static int wpa_driver_nl80211_cancel_remain_on_channel(void *priv)
9137 {
9138 struct i802_bss *bss = priv;
9139 struct wpa_driver_nl80211_data *drv = bss->drv;
9140 struct nl_msg *msg;
9141 int ret;
9142
9143 if (!drv->pending_remain_on_chan) {
9144 wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
9145 "to cancel");
9146 return -1;
9147 }
9148
9149 wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
9150 "0x%llx",
9151 (long long unsigned int) drv->remain_on_chan_cookie);
9152
9153 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL);
9154 if (!msg ||
9155 nla_put_u64(msg, NL80211_ATTR_COOKIE, drv->remain_on_chan_cookie)) {
9156 nlmsg_free(msg);
9157 return -1;
9158 }
9159
9160 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9161 if (ret == 0)
9162 return 0;
9163 wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
9164 "%d (%s)", ret, strerror(-ret));
9165 return -1;
9166 }
9167
9168
wpa_driver_nl80211_probe_req_report(struct i802_bss * bss,int report)9169 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report)
9170 {
9171 struct wpa_driver_nl80211_data *drv = bss->drv;
9172
9173 if (!report) {
9174 if (bss->nl_preq && drv->device_ap_sme &&
9175 is_ap_interface(drv->nlmode) && !bss->in_deinit &&
9176 !bss->static_ap) {
9177 /*
9178 * Do not disable Probe Request reporting that was
9179 * enabled in nl80211_setup_ap().
9180 */
9181 wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
9182 "Probe Request reporting nl_preq=%p while "
9183 "in AP mode", bss->nl_preq);
9184 } else if (bss->nl_preq) {
9185 wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
9186 "reporting nl_preq=%p", bss->nl_preq);
9187 nl80211_destroy_eloop_handle(&bss->nl_preq, 0);
9188 }
9189 return 0;
9190 }
9191
9192 if (bss->nl_preq) {
9193 wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
9194 "already on! nl_preq=%p", bss->nl_preq);
9195 return 0;
9196 }
9197
9198 bss->nl_preq = nl_create_handle(drv->global->nl_cb, "preq");
9199 if (bss->nl_preq == NULL)
9200 return -1;
9201 wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
9202 "reporting nl_preq=%p", bss->nl_preq);
9203
9204 if (nl80211_register_frame(bss, bss->nl_preq,
9205 (WLAN_FC_TYPE_MGMT << 2) |
9206 (WLAN_FC_STYPE_PROBE_REQ << 4),
9207 NULL, 0, false) < 0)
9208 goto out_err;
9209
9210 nl80211_register_eloop_read(&bss->nl_preq,
9211 wpa_driver_nl80211_event_receive,
9212 bss->nl_cb, 0);
9213
9214 return 0;
9215
9216 out_err:
9217 nl_destroy_handles(&bss->nl_preq);
9218 return -1;
9219 }
9220
9221
nl80211_disable_11b_rates(struct wpa_driver_nl80211_data * drv,int ifindex,int disabled)9222 static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
9223 int ifindex, int disabled)
9224 {
9225 struct nl_msg *msg;
9226 struct nlattr *bands, *band;
9227 int ret;
9228
9229 wpa_printf(MSG_DEBUG,
9230 "nl80211: NL80211_CMD_SET_TX_BITRATE_MASK (ifindex=%d %s)",
9231 ifindex, disabled ? "NL80211_TXRATE_LEGACY=OFDM-only" :
9232 "no NL80211_TXRATE_LEGACY constraint");
9233
9234 msg = nl80211_ifindex_msg(drv, ifindex, 0,
9235 NL80211_CMD_SET_TX_BITRATE_MASK);
9236 if (!msg)
9237 return -1;
9238
9239 bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
9240 if (!bands)
9241 goto fail;
9242
9243 /*
9244 * Disable 2 GHz rates 1, 2, 5.5, 11 Mbps by masking out everything
9245 * else apart from 6, 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS
9246 * rates. All 5 GHz rates are left enabled.
9247 */
9248 band = nla_nest_start(msg, NL80211_BAND_2GHZ);
9249 if (!band ||
9250 (disabled && nla_put(msg, NL80211_TXRATE_LEGACY, 8,
9251 "\x0c\x12\x18\x24\x30\x48\x60\x6c")))
9252 goto fail;
9253 nla_nest_end(msg, band);
9254
9255 nla_nest_end(msg, bands);
9256
9257 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9258 if (ret) {
9259 wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
9260 "(%s)", ret, strerror(-ret));
9261 } else
9262 drv->disabled_11b_rates = disabled;
9263
9264 return ret;
9265
9266 fail:
9267 nlmsg_free(msg);
9268 return -1;
9269 }
9270
9271
nl80211_remove_links(struct i802_bss * bss)9272 static void nl80211_remove_links(struct i802_bss *bss)
9273 {
9274 struct wpa_driver_nl80211_data *drv = bss->drv;
9275 struct nl_msg *msg;
9276 int ret;
9277 u8 link_id;
9278
9279 while (bss->links[0].link_id != NL80211_DRV_LINK_ID_NA) {
9280 struct i802_link *link = &bss->links[0];
9281
9282 wpa_printf(MSG_DEBUG, "nl80211: MLD: remove link_id=%u",
9283 link->link_id);
9284
9285 wpa_driver_nl80211_del_beacon(bss, link);
9286
9287 link_id = link->link_id;
9288
9289 /* First remove the link locally */
9290 if (bss->n_links == 1) {
9291 bss->flink->link_id = NL80211_DRV_LINK_ID_NA;
9292 os_memcpy(bss->flink->addr, bss->addr, ETH_ALEN);
9293 } else {
9294 struct i802_link *other = &bss->links[bss->n_links - 1];
9295
9296 os_memcpy(link, other, sizeof(*link));
9297 other->link_id = NL80211_DRV_LINK_ID_NA;
9298 os_memset(other->addr, 0, ETH_ALEN);
9299
9300 bss->n_links--;
9301 }
9302
9303 /* Remove the link from the kernel */
9304 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_REMOVE_LINK);
9305 if (!msg ||
9306 nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id)) {
9307 nlmsg_free(msg);
9308 wpa_printf(MSG_ERROR,
9309 "nl80211: remove link (%d) failed",
9310 link_id);
9311 return;
9312 }
9313
9314 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9315 if (ret) {
9316 wpa_printf(MSG_ERROR,
9317 "nl80211: remove link (%d) failed. ret=%d (%s)",
9318 link_id, ret, strerror(-ret));
9319 return;
9320 }
9321 }
9322 }
9323
9324
wpa_driver_nl80211_deinit_ap(void * priv)9325 static int wpa_driver_nl80211_deinit_ap(void *priv)
9326 {
9327 struct i802_bss *bss = priv;
9328 struct wpa_driver_nl80211_data *drv = bss->drv;
9329
9330 if (!is_ap_interface(drv->nlmode))
9331 return -1;
9332
9333 /* Stop beaconing */
9334 wpa_driver_nl80211_del_beacon(bss, bss->flink);
9335
9336 nl80211_remove_links(bss);
9337
9338 /*
9339 * If the P2P GO interface was dynamically added, then it is
9340 * possible that the interface change to station is not possible.
9341 */
9342 if (drv->nlmode == NL80211_IFTYPE_P2P_GO && bss->if_dynamic)
9343 return 0;
9344
9345 return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
9346 }
9347
9348
wpa_driver_nl80211_stop_ap(void * priv)9349 static int wpa_driver_nl80211_stop_ap(void *priv)
9350 {
9351 struct i802_bss *bss = priv;
9352 struct wpa_driver_nl80211_data *drv = bss->drv;
9353
9354 if (!is_ap_interface(drv->nlmode))
9355 return -1;
9356
9357 wpa_driver_nl80211_del_beacon_all(bss);
9358
9359 return 0;
9360 }
9361
9362
wpa_driver_nl80211_deinit_p2p_cli(void * priv)9363 static int wpa_driver_nl80211_deinit_p2p_cli(void *priv)
9364 {
9365 struct i802_bss *bss = priv;
9366 struct wpa_driver_nl80211_data *drv = bss->drv;
9367 if (drv->nlmode != NL80211_IFTYPE_P2P_CLIENT)
9368 return -1;
9369
9370 /*
9371 * If the P2P Client interface was dynamically added, then it is
9372 * possible that the interface change to station is not possible.
9373 */
9374 if (bss->if_dynamic)
9375 return 0;
9376
9377 return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
9378 }
9379
9380
wpa_driver_nl80211_resume(void * priv)9381 static void wpa_driver_nl80211_resume(void *priv)
9382 {
9383 struct i802_bss *bss = priv;
9384 enum nl80211_iftype nlmode = nl80211_get_ifmode(bss);
9385
9386 if (i802_set_iface_flags(bss, 1))
9387 wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
9388
9389 if (is_p2p_net_interface(nlmode))
9390 nl80211_disable_11b_rates(bss->drv, bss->drv->ifindex, 1);
9391 }
9392
9393
nl80211_signal_monitor(void * priv,int threshold,int hysteresis)9394 static int nl80211_signal_monitor(void *priv, int threshold, int hysteresis)
9395 {
9396 struct i802_bss *bss = priv;
9397 struct wpa_driver_nl80211_data *drv = bss->drv;
9398 struct nl_msg *msg;
9399 struct nlattr *cqm;
9400
9401 wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
9402 "hysteresis=%d", threshold, hysteresis);
9403
9404 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_CQM)) ||
9405 !(cqm = nla_nest_start(msg, NL80211_ATTR_CQM)) ||
9406 nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_THOLD, threshold) ||
9407 nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_HYST, hysteresis)) {
9408 nlmsg_free(msg);
9409 return -1;
9410 }
9411 nla_nest_end(msg, cqm);
9412
9413 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9414 }
9415
9416
get_channel_width(struct nl_msg * msg,void * arg)9417 static int get_channel_width(struct nl_msg *msg, void *arg)
9418 {
9419 struct nlattr *tb[NL80211_ATTR_MAX + 1];
9420 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9421 struct wpa_signal_info *sig_change = arg;
9422
9423 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9424 genlmsg_attrlen(gnlh, 0), NULL);
9425
9426 sig_change->center_frq1 = -1;
9427 sig_change->center_frq2 = -1;
9428 sig_change->chanwidth = CHAN_WIDTH_UNKNOWN;
9429
9430 if (tb[NL80211_ATTR_CHANNEL_WIDTH]) {
9431 sig_change->chanwidth = convert2width(
9432 nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
9433 if (tb[NL80211_ATTR_CENTER_FREQ1])
9434 sig_change->center_frq1 =
9435 nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
9436 if (tb[NL80211_ATTR_CENTER_FREQ2])
9437 sig_change->center_frq2 =
9438 nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
9439 }
9440
9441 return NL_SKIP;
9442 }
9443
9444
nl80211_get_channel_width(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig)9445 static int nl80211_get_channel_width(struct wpa_driver_nl80211_data *drv,
9446 struct wpa_signal_info *sig)
9447 {
9448 struct nl_msg *msg;
9449
9450 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
9451 return send_and_recv_msgs(drv, msg, get_channel_width, sig, NULL, NULL);
9452 }
9453
9454
nl80211_signal_poll(void * priv,struct wpa_signal_info * si)9455 static int nl80211_signal_poll(void *priv, struct wpa_signal_info *si)
9456 {
9457 struct i802_bss *bss = priv;
9458 struct wpa_driver_nl80211_data *drv = bss->drv;
9459 int res;
9460
9461 os_memset(si, 0, sizeof(*si));
9462 res = nl80211_get_link_signal(drv, drv->bssid, &si->data);
9463 if (res) {
9464 if (drv->nlmode != NL80211_IFTYPE_ADHOC &&
9465 drv->nlmode != NL80211_IFTYPE_MESH_POINT)
9466 return res;
9467 si->data.signal = 0;
9468 }
9469
9470 res = nl80211_get_channel_width(drv, si);
9471 if (res != 0)
9472 return res;
9473
9474 return nl80211_get_link_noise(drv, si);
9475 }
9476
9477
get_links_noise(struct nl_msg * msg,void * arg)9478 static int get_links_noise(struct nl_msg *msg, void *arg)
9479 {
9480 struct nlattr *tb[NL80211_ATTR_MAX + 1];
9481 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9482 struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
9483 static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
9484 [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
9485 [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
9486 };
9487 struct wpa_mlo_signal_info *mlo_sig = arg;
9488 int i;
9489
9490 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9491 genlmsg_attrlen(gnlh, 0), NULL);
9492
9493 if (!tb[NL80211_ATTR_SURVEY_INFO]) {
9494 wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
9495 return NL_SKIP;
9496 }
9497
9498 if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
9499 tb[NL80211_ATTR_SURVEY_INFO],
9500 survey_policy)) {
9501 wpa_printf(MSG_DEBUG,
9502 "nl80211: Failed to parse nested attributes");
9503 return NL_SKIP;
9504 }
9505
9506 if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
9507 return NL_SKIP;
9508
9509 if (!sinfo[NL80211_SURVEY_INFO_NOISE])
9510 return NL_SKIP;
9511
9512 for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
9513 if (!(mlo_sig->valid_links & BIT(i)))
9514 continue;
9515
9516 if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
9517 mlo_sig->links[i].frequency)
9518 continue;
9519
9520 mlo_sig->links[i].current_noise =
9521 (s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
9522 break;
9523 }
9524
9525 return NL_SKIP;
9526 }
9527
9528
nl80211_get_links_noise(struct wpa_driver_nl80211_data * drv,struct wpa_mlo_signal_info * mlo_sig)9529 static int nl80211_get_links_noise(struct wpa_driver_nl80211_data *drv,
9530 struct wpa_mlo_signal_info *mlo_sig)
9531 {
9532 struct nl_msg *msg;
9533
9534 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
9535 return send_and_recv_msgs(drv, msg, get_links_noise, mlo_sig,
9536 NULL, NULL);
9537 }
9538
9539
get_links_channel_width(struct nl_msg * msg,void * arg)9540 static int get_links_channel_width(struct nl_msg *msg, void *arg)
9541 {
9542 struct nlattr *tb[NL80211_ATTR_MAX + 1];
9543 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9544 struct wpa_mlo_signal_info *mlo_sig = arg;
9545 struct nlattr *link;
9546 int rem_links;
9547
9548 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9549 genlmsg_attrlen(gnlh, 0), NULL);
9550
9551 if (!tb[NL80211_ATTR_MLO_LINKS])
9552 return NL_SKIP;
9553
9554 nla_for_each_nested(link, tb[NL80211_ATTR_MLO_LINKS], rem_links) {
9555 struct nlattr *tb2[NL80211_ATTR_MAX + 1];
9556 int link_id;
9557
9558 nla_parse(tb2, NL80211_ATTR_MAX, nla_data(link), nla_len(link),
9559 NULL);
9560
9561 if (!tb2[NL80211_ATTR_MLO_LINK_ID])
9562 continue;
9563
9564 link_id = nla_get_u8(tb2[NL80211_ATTR_MLO_LINK_ID]);
9565 if (link_id >= MAX_NUM_MLD_LINKS)
9566 continue;
9567
9568 if (!tb2[NL80211_ATTR_CHANNEL_WIDTH])
9569 continue;
9570 mlo_sig->links[link_id].chanwidth = convert2width(
9571 nla_get_u32(tb2[NL80211_ATTR_CHANNEL_WIDTH]));
9572 if (tb2[NL80211_ATTR_CENTER_FREQ1])
9573 mlo_sig->links[link_id].center_frq1 =
9574 nla_get_u32(tb2[NL80211_ATTR_CENTER_FREQ1]);
9575 if (tb2[NL80211_ATTR_CENTER_FREQ2])
9576 mlo_sig->links[link_id].center_frq2 =
9577 nla_get_u32(tb2[NL80211_ATTR_CENTER_FREQ2]);
9578 }
9579
9580 return NL_SKIP;
9581 }
9582
9583
nl80211_get_links_channel_width(struct wpa_driver_nl80211_data * drv,struct wpa_mlo_signal_info * mlo_sig)9584 static int nl80211_get_links_channel_width(struct wpa_driver_nl80211_data *drv,
9585 struct wpa_mlo_signal_info *mlo_sig)
9586 {
9587 struct nl_msg *msg;
9588
9589 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
9590 return send_and_recv_msgs(drv, msg, get_links_channel_width, mlo_sig,
9591 NULL, NULL);
9592 }
9593
9594
nl80211_mlo_signal_poll(void * priv,struct wpa_mlo_signal_info * mlo_si)9595 static int nl80211_mlo_signal_poll(void *priv,
9596 struct wpa_mlo_signal_info *mlo_si)
9597 {
9598 struct i802_bss *bss = priv;
9599 struct wpa_driver_nl80211_data *drv = bss->drv;
9600 int res;
9601 int i;
9602
9603 if (drv->nlmode != NL80211_IFTYPE_STATION ||
9604 !drv->sta_mlo_info.valid_links)
9605 return -1;
9606
9607 os_memset(mlo_si, 0, sizeof(*mlo_si));
9608 mlo_si->valid_links = drv->sta_mlo_info.valid_links;
9609
9610 for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
9611 if (!(mlo_si->valid_links & BIT(i)))
9612 continue;
9613
9614 res = nl80211_get_link_signal(drv,
9615 drv->sta_mlo_info.links[i].bssid,
9616 &mlo_si->links[i].data);
9617 if (res != 0)
9618 return res;
9619
9620 mlo_si->links[i].center_frq1 = -1;
9621 mlo_si->links[i].center_frq2 = -1;
9622 mlo_si->links[i].chanwidth = CHAN_WIDTH_UNKNOWN;
9623 mlo_si->links[i].current_noise = WPA_INVALID_NOISE;
9624 mlo_si->links[i].frequency = drv->sta_mlo_info.links[i].freq;
9625 }
9626
9627 res = nl80211_get_links_channel_width(drv, mlo_si);
9628 if (res != 0)
9629 return res;
9630
9631 return nl80211_get_links_noise(drv, mlo_si);
9632 }
9633
9634
nl80211_set_param(void * priv,const char * param)9635 static int nl80211_set_param(void *priv, const char *param)
9636 {
9637 struct i802_bss *bss = priv;
9638 struct wpa_driver_nl80211_data *drv = bss->drv;
9639
9640 if (param == NULL)
9641 return 0;
9642 wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
9643
9644 #ifdef CONFIG_P2P
9645 if (os_strstr(param, "use_p2p_group_interface=1")) {
9646 wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
9647 "interface");
9648 drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
9649 drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
9650 }
9651 #endif /* CONFIG_P2P */
9652
9653 if (os_strstr(param, "use_monitor=1"))
9654 drv->use_monitor = 1;
9655
9656 if (os_strstr(param, "force_connect_cmd=1")) {
9657 drv->capa.flags &= ~WPA_DRIVER_FLAGS_SME;
9658 drv->force_connect_cmd = 1;
9659 }
9660
9661 if (os_strstr(param, "force_bss_selection=1"))
9662 drv->capa.flags |= WPA_DRIVER_FLAGS_BSS_SELECTION;
9663
9664 if (os_strstr(param, "no_offchannel_tx=1")) {
9665 drv->capa.flags &= ~WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
9666 drv->test_use_roc_tx = 1;
9667 }
9668
9669 if (os_strstr(param, "control_port=0")) {
9670 drv->capa.flags &= ~WPA_DRIVER_FLAGS_CONTROL_PORT;
9671 drv->capa.flags2 &= ~(WPA_DRIVER_FLAGS2_CONTROL_PORT_RX |
9672 WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS);
9673 drv->control_port_ap = 0;
9674 }
9675
9676 if (os_strstr(param, "control_port_ap=1"))
9677 drv->control_port_ap = 1;
9678
9679 if (os_strstr(param, "control_port_ap=0")) {
9680 drv->capa.flags2 &= ~WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS;
9681 drv->control_port_ap = 0;
9682 }
9683
9684 if (os_strstr(param, "full_ap_client_state=0"))
9685 drv->capa.flags &= ~WPA_DRIVER_FLAGS_FULL_AP_CLIENT_STATE;
9686
9687 if (os_strstr(param, "no_rrm=1")) {
9688 drv->no_rrm = 1;
9689
9690 if (!bss->in_deinit && !is_ap_interface(drv->nlmode) &&
9691 !is_mesh_interface(drv->nlmode)) {
9692 nl80211_mgmt_unsubscribe(bss, "no_rrm=1");
9693 if (nl80211_mgmt_subscribe_non_ap(bss) < 0)
9694 wpa_printf(MSG_DEBUG,
9695 "nl80211: Failed to re-register Action frame processing - ignore for now");
9696 }
9697 }
9698
9699 if (os_strstr(param, "secure_ltf=1")) {
9700 drv->capa.flags2 |= WPA_DRIVER_FLAGS2_SEC_LTF_STA |
9701 WPA_DRIVER_FLAGS2_SEC_LTF_AP;
9702 }
9703
9704 return 0;
9705 }
9706
9707
nl80211_global_init(void * ctx)9708 static void * nl80211_global_init(void *ctx)
9709 {
9710 struct nl80211_global *global;
9711 struct netlink_config *cfg;
9712
9713 global = os_zalloc(sizeof(*global));
9714 if (global == NULL)
9715 return NULL;
9716 global->ctx = ctx;
9717 global->ioctl_sock = -1;
9718 dl_list_init(&global->interfaces);
9719 global->if_add_ifindex = -1;
9720
9721 cfg = os_zalloc(sizeof(*cfg));
9722 if (cfg == NULL)
9723 goto err;
9724
9725 cfg->ctx = global;
9726 cfg->newlink_cb = wpa_driver_nl80211_event_rtm_newlink;
9727 cfg->dellink_cb = wpa_driver_nl80211_event_rtm_dellink;
9728 global->netlink = netlink_init(cfg);
9729 if (global->netlink == NULL) {
9730 os_free(cfg);
9731 goto err;
9732 }
9733
9734 if (wpa_driver_nl80211_init_nl_global(global) < 0)
9735 goto err;
9736
9737 global->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
9738 if (global->ioctl_sock < 0) {
9739 wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
9740 strerror(errno));
9741 goto err;
9742 }
9743
9744 return global;
9745
9746 err:
9747 nl80211_global_deinit(global);
9748 return NULL;
9749 }
9750
9751
nl80211_global_deinit(void * priv)9752 static void nl80211_global_deinit(void *priv)
9753 {
9754 struct nl80211_global *global = priv;
9755 if (global == NULL)
9756 return;
9757 if (!dl_list_empty(&global->interfaces)) {
9758 wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
9759 "nl80211_global_deinit",
9760 dl_list_len(&global->interfaces));
9761 }
9762
9763 if (global->netlink)
9764 netlink_deinit(global->netlink);
9765
9766 nl_destroy_handles(&global->nl);
9767
9768 if (global->nl_event)
9769 nl80211_destroy_eloop_handle(&global->nl_event, 0);
9770
9771 nl_cb_put(global->nl_cb);
9772
9773 if (global->ioctl_sock >= 0)
9774 close(global->ioctl_sock);
9775
9776 os_free(global);
9777 }
9778
9779
nl80211_get_radio_name(void * priv)9780 static const char * nl80211_get_radio_name(void *priv)
9781 {
9782 struct i802_bss *bss = priv;
9783 struct wpa_driver_nl80211_data *drv = bss->drv;
9784 return drv->phyname;
9785 }
9786
9787
nl80211_pmkid(struct i802_bss * bss,int cmd,struct wpa_pmkid_params * params,bool skip_pmk)9788 static int nl80211_pmkid(struct i802_bss *bss, int cmd,
9789 struct wpa_pmkid_params *params, bool skip_pmk)
9790 {
9791 struct nl_msg *msg;
9792
9793 if (cmd == NL80211_CMD_SET_PMKSA)
9794 wpa_printf(MSG_DEBUG,
9795 "nl80211: NL80211_CMD_SET_PMKSA with skip_pmk=%s pmk_len=%zu",
9796 skip_pmk ? "true" : "false", params->pmk_len);
9797
9798 if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
9799 (params->pmkid &&
9800 nla_put(msg, NL80211_ATTR_PMKID, 16, params->pmkid)) ||
9801 (params->bssid &&
9802 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid)) ||
9803 (params->ssid_len &&
9804 nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid)) ||
9805 (params->fils_cache_id &&
9806 nla_put(msg, NL80211_ATTR_FILS_CACHE_ID, 2,
9807 params->fils_cache_id)) ||
9808 (params->pmk_lifetime &&
9809 nla_put_u32(msg, NL80211_ATTR_PMK_LIFETIME,
9810 params->pmk_lifetime)) ||
9811 (params->pmk_reauth_threshold &&
9812 nla_put_u8(msg, NL80211_ATTR_PMK_REAUTH_THRESHOLD,
9813 params->pmk_reauth_threshold)) ||
9814 (cmd != NL80211_CMD_DEL_PMKSA &&
9815 params->pmk_len && !skip_pmk &&
9816 nla_put(msg, NL80211_ATTR_PMK, params->pmk_len, params->pmk))) {
9817 nl80211_nlmsg_clear(msg);
9818 nlmsg_free(msg);
9819 return -ENOBUFS;
9820 }
9821
9822 return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
9823 }
9824
9825
nl80211_add_pmkid(void * priv,struct wpa_pmkid_params * params)9826 static int nl80211_add_pmkid(void *priv, struct wpa_pmkid_params *params)
9827 {
9828 struct i802_bss *bss = priv;
9829 const size_t PMK_MAX_LEN = 64; /* current cfg80211 limit */
9830 const size_t LEGACY_PMK_MAX_LEN = 48; /* old cfg80211 limit */
9831 bool skip_pmk = params->pmk_len > PMK_MAX_LEN;
9832 int ret;
9833
9834 if (params->bssid)
9835 wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR,
9836 MAC2STR(params->bssid));
9837 else if (params->fils_cache_id && params->ssid_len) {
9838 wpa_printf(MSG_DEBUG,
9839 "nl80211: Add PMKSA for cache id %02x%02x SSID %s",
9840 params->fils_cache_id[0], params->fils_cache_id[1],
9841 wpa_ssid_txt(params->ssid, params->ssid_len));
9842 }
9843
9844 ret = nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, params, skip_pmk);
9845 /*
9846 * Try again by skipping PMK if the first attempt failed with ERANGE
9847 * error, PMK was not skipped, and PMK length is greater than the
9848 * legacy kernel maximum allowed limit.
9849 */
9850 if (ret == -ERANGE && !skip_pmk &&
9851 params->pmk_len > LEGACY_PMK_MAX_LEN)
9852 ret = nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, params, true);
9853 if (ret < 0) {
9854 wpa_printf(MSG_DEBUG,
9855 "nl80211: NL80211_CMD_SET_PMKSA failed: %d (%s)",
9856 ret, strerror(-ret));
9857 }
9858
9859 return ret;
9860 }
9861
9862
nl80211_remove_pmkid(void * priv,struct wpa_pmkid_params * params)9863 static int nl80211_remove_pmkid(void *priv, struct wpa_pmkid_params *params)
9864 {
9865 struct i802_bss *bss = priv;
9866 int ret;
9867
9868 if (params->bssid)
9869 wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
9870 MAC2STR(params->bssid));
9871 else if (params->fils_cache_id && params->ssid_len) {
9872 wpa_printf(MSG_DEBUG,
9873 "nl80211: Delete PMKSA for cache id %02x%02x SSID %s",
9874 params->fils_cache_id[0], params->fils_cache_id[1],
9875 wpa_ssid_txt(params->ssid, params->ssid_len));
9876 }
9877
9878 ret = nl80211_pmkid(bss, NL80211_CMD_DEL_PMKSA, params, true);
9879 if (ret < 0) {
9880 wpa_printf(MSG_DEBUG,
9881 "nl80211: NL80211_CMD_DEL_PMKSA failed: %d (%s)",
9882 ret, strerror(-ret));
9883 }
9884
9885 return ret;
9886 }
9887
9888
nl80211_flush_pmkid(void * priv)9889 static int nl80211_flush_pmkid(void *priv)
9890 {
9891 struct i802_bss *bss = priv;
9892 struct nl_msg *msg;
9893
9894 wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
9895 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_FLUSH_PMKSA);
9896 if (!msg)
9897 return -ENOBUFS;
9898 return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
9899 }
9900
9901
clean_survey_results(struct survey_results * survey_results)9902 static void clean_survey_results(struct survey_results *survey_results)
9903 {
9904 struct freq_survey *survey, *tmp;
9905
9906 if (dl_list_empty(&survey_results->survey_list))
9907 return;
9908
9909 dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
9910 struct freq_survey, list) {
9911 dl_list_del(&survey->list);
9912 os_free(survey);
9913 }
9914 }
9915
9916
add_survey(struct nlattr ** sinfo,u32 ifidx,struct dl_list * survey_list)9917 static void add_survey(struct nlattr **sinfo, u32 ifidx,
9918 struct dl_list *survey_list)
9919 {
9920 struct freq_survey *survey;
9921
9922 survey = os_zalloc(sizeof(struct freq_survey));
9923 if (!survey)
9924 return;
9925
9926 survey->ifidx = ifidx;
9927 survey->freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
9928 survey->filled = 0;
9929
9930 if (sinfo[NL80211_SURVEY_INFO_NOISE]) {
9931 survey->nf = (int8_t)
9932 nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
9933 survey->filled |= SURVEY_HAS_NF;
9934 }
9935
9936 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]) {
9937 survey->channel_time =
9938 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]);
9939 survey->filled |= SURVEY_HAS_CHAN_TIME;
9940 }
9941
9942 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]) {
9943 survey->channel_time_busy =
9944 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]);
9945 survey->filled |= SURVEY_HAS_CHAN_TIME_BUSY;
9946 }
9947
9948 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]) {
9949 survey->channel_time_rx =
9950 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]);
9951 survey->filled |= SURVEY_HAS_CHAN_TIME_RX;
9952 }
9953
9954 if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]) {
9955 survey->channel_time_tx =
9956 nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]);
9957 survey->filled |= SURVEY_HAS_CHAN_TIME_TX;
9958 }
9959
9960 wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
9961 survey->freq,
9962 survey->nf,
9963 (unsigned long int) survey->channel_time,
9964 (unsigned long int) survey->channel_time_busy,
9965 (unsigned long int) survey->channel_time_tx,
9966 (unsigned long int) survey->channel_time_rx,
9967 survey->filled);
9968
9969 dl_list_add_tail(survey_list, &survey->list);
9970 }
9971
9972
check_survey_ok(struct nlattr ** sinfo,u32 surveyed_freq,unsigned int freq_filter)9973 static int check_survey_ok(struct nlattr **sinfo, u32 surveyed_freq,
9974 unsigned int freq_filter)
9975 {
9976 if (!freq_filter)
9977 return 1;
9978
9979 return freq_filter == surveyed_freq;
9980 }
9981
9982
survey_handler(struct nl_msg * msg,void * arg)9983 static int survey_handler(struct nl_msg *msg, void *arg)
9984 {
9985 struct nlattr *tb[NL80211_ATTR_MAX + 1];
9986 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9987 struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
9988 struct survey_results *survey_results;
9989 u32 surveyed_freq = 0;
9990 u32 ifidx;
9991
9992 static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
9993 [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
9994 [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
9995 };
9996
9997 survey_results = (struct survey_results *) arg;
9998
9999 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10000 genlmsg_attrlen(gnlh, 0), NULL);
10001
10002 if (!tb[NL80211_ATTR_IFINDEX])
10003 return NL_SKIP;
10004
10005 ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
10006
10007 if (!tb[NL80211_ATTR_SURVEY_INFO])
10008 return NL_SKIP;
10009
10010 if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
10011 tb[NL80211_ATTR_SURVEY_INFO],
10012 survey_policy))
10013 return NL_SKIP;
10014
10015 if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) {
10016 wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
10017 return NL_SKIP;
10018 }
10019
10020 surveyed_freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
10021
10022 if (!check_survey_ok(sinfo, surveyed_freq,
10023 survey_results->freq_filter))
10024 return NL_SKIP;
10025
10026 if (survey_results->freq_filter &&
10027 survey_results->freq_filter != surveyed_freq) {
10028 wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
10029 surveyed_freq);
10030 return NL_SKIP;
10031 }
10032
10033 add_survey(sinfo, ifidx, &survey_results->survey_list);
10034
10035 return NL_SKIP;
10036 }
10037
10038
wpa_driver_nl80211_get_survey(void * priv,unsigned int freq)10039 static int wpa_driver_nl80211_get_survey(void *priv, unsigned int freq)
10040 {
10041 struct i802_bss *bss = priv;
10042 struct wpa_driver_nl80211_data *drv = bss->drv;
10043 struct nl_msg *msg;
10044 int err;
10045 union wpa_event_data data;
10046 struct survey_results *survey_results;
10047
10048 os_memset(&data, 0, sizeof(data));
10049 survey_results = &data.survey_results;
10050
10051 dl_list_init(&survey_results->survey_list);
10052
10053 msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
10054 if (!msg)
10055 return -ENOBUFS;
10056
10057 if (freq)
10058 data.survey_results.freq_filter = freq;
10059
10060 do {
10061 wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
10062 err = send_and_recv_msgs(drv, msg, survey_handler,
10063 survey_results, NULL, NULL);
10064 } while (err > 0);
10065
10066 if (err)
10067 wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
10068 else
10069 wpa_supplicant_event(drv->ctx, EVENT_SURVEY, &data);
10070
10071 clean_survey_results(survey_results);
10072 return err;
10073 }
10074
10075
nl80211_set_rekey_info(void * priv,const u8 * kek,size_t kek_len,const u8 * kck,size_t kck_len,const u8 * replay_ctr)10076 static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len,
10077 const u8 *kck, size_t kck_len,
10078 const u8 *replay_ctr)
10079 {
10080 struct i802_bss *bss = priv;
10081 struct wpa_driver_nl80211_data *drv = bss->drv;
10082 struct nlattr *replay_nested;
10083 struct nl_msg *msg;
10084 int ret;
10085
10086 if (!drv->set_rekey_offload)
10087 return;
10088
10089 wpa_printf(MSG_DEBUG, "nl80211: Set rekey offload");
10090 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_REKEY_OFFLOAD)) ||
10091 !(replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA)) ||
10092 nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) ||
10093 (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) ||
10094 nla_put(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
10095 replay_ctr)) {
10096 nl80211_nlmsg_clear(msg);
10097 nlmsg_free(msg);
10098 return;
10099 }
10100
10101 nla_nest_end(msg, replay_nested);
10102
10103 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10104 if (ret == -EOPNOTSUPP) {
10105 wpa_printf(MSG_DEBUG,
10106 "nl80211: Driver does not support rekey offload");
10107 drv->set_rekey_offload = 0;
10108 }
10109 }
10110
10111
nl80211_send_null_frame(struct i802_bss * bss,const u8 * own_addr,const u8 * addr,int qos)10112 static void nl80211_send_null_frame(struct i802_bss *bss, const u8 *own_addr,
10113 const u8 *addr, int qos)
10114 {
10115 /* send data frame to poll STA and check whether
10116 * this frame is ACKed */
10117 struct {
10118 struct ieee80211_hdr hdr;
10119 u16 qos_ctl;
10120 } STRUCT_PACKED nulldata;
10121 size_t size;
10122
10123 /* Send data frame to poll STA and check whether this frame is ACKed */
10124
10125 os_memset(&nulldata, 0, sizeof(nulldata));
10126
10127 if (qos) {
10128 nulldata.hdr.frame_control =
10129 IEEE80211_FC(WLAN_FC_TYPE_DATA,
10130 WLAN_FC_STYPE_QOS_NULL);
10131 size = sizeof(nulldata);
10132 } else {
10133 nulldata.hdr.frame_control =
10134 IEEE80211_FC(WLAN_FC_TYPE_DATA,
10135 WLAN_FC_STYPE_NULLFUNC);
10136 size = sizeof(struct ieee80211_hdr);
10137 }
10138
10139 nulldata.hdr.frame_control |= host_to_le16(WLAN_FC_FROMDS);
10140 os_memcpy(nulldata.hdr.IEEE80211_DA_FROMDS, addr, ETH_ALEN);
10141 os_memcpy(nulldata.hdr.IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
10142 os_memcpy(nulldata.hdr.IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
10143
10144 if (wpa_driver_nl80211_send_mlme(bss, (u8 *) &nulldata, size, 0, 0, 0,
10145 0, 0, NULL, 0, 0) < 0)
10146 wpa_printf(MSG_DEBUG, "nl80211_send_null_frame: Failed to "
10147 "send poll frame");
10148 }
10149
nl80211_poll_client(void * priv,const u8 * own_addr,const u8 * addr,int qos)10150 static void nl80211_poll_client(void *priv, const u8 *own_addr, const u8 *addr,
10151 int qos)
10152 {
10153 struct i802_bss *bss = priv;
10154 struct wpa_driver_nl80211_data *drv = bss->drv;
10155 struct nl_msg *msg;
10156 u64 cookie;
10157 int ret;
10158
10159 if (!drv->poll_command_supported) {
10160 nl80211_send_null_frame(bss, own_addr, addr, qos);
10161 return;
10162 }
10163
10164 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_PROBE_CLIENT)) ||
10165 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
10166 nlmsg_free(msg);
10167 return;
10168 }
10169
10170 ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
10171 if (ret < 0) {
10172 wpa_printf(MSG_DEBUG, "nl80211: Client probe request for "
10173 MACSTR " failed: ret=%d (%s)",
10174 MAC2STR(addr), ret, strerror(-ret));
10175 } else {
10176 wpa_printf(MSG_DEBUG,
10177 "nl80211: Client probe request addr=" MACSTR
10178 " cookie=%llu", MAC2STR(addr),
10179 (long long unsigned int) cookie);
10180 }
10181 }
10182
10183
nl80211_set_power_save(struct i802_bss * bss,int enabled)10184 static int nl80211_set_power_save(struct i802_bss *bss, int enabled)
10185 {
10186 struct nl_msg *msg;
10187 int ret;
10188
10189 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_POWER_SAVE)) ||
10190 nla_put_u32(msg, NL80211_ATTR_PS_STATE,
10191 enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED)) {
10192 nlmsg_free(msg);
10193 return -ENOBUFS;
10194 }
10195
10196 ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
10197 if (ret < 0) {
10198 wpa_printf(MSG_DEBUG,
10199 "nl80211: Setting PS state %s failed: %d (%s)",
10200 enabled ? "enabled" : "disabled",
10201 ret, strerror(-ret));
10202 }
10203 return ret;
10204 }
10205
10206
nl80211_set_p2p_powersave(void * priv,int legacy_ps,int opp_ps,int ctwindow)10207 static int nl80211_set_p2p_powersave(void *priv, int legacy_ps, int opp_ps,
10208 int ctwindow)
10209 {
10210 struct i802_bss *bss = priv;
10211
10212 wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
10213 "opp_ps=%d ctwindow=%d)", legacy_ps, opp_ps, ctwindow);
10214
10215 if (opp_ps != -1 || ctwindow != -1) {
10216 #ifdef ANDROID_P2P
10217 wpa_driver_set_p2p_ps(priv, legacy_ps, opp_ps, ctwindow);
10218 #else /* ANDROID_P2P */
10219 return -1; /* Not yet supported */
10220 #endif /* ANDROID_P2P */
10221 }
10222
10223 if (legacy_ps == -1)
10224 return 0;
10225 if (legacy_ps != 0 && legacy_ps != 1)
10226 return -1; /* Not yet supported */
10227
10228 return nl80211_set_power_save(bss, legacy_ps);
10229 }
10230
10231
nl80211_start_radar_detection(void * priv,struct hostapd_freq_params * freq)10232 static int nl80211_start_radar_detection(void *priv,
10233 struct hostapd_freq_params *freq)
10234 {
10235 struct i802_bss *bss = priv;
10236 struct wpa_driver_nl80211_data *drv = bss->drv;
10237 struct nl_msg *msg;
10238 int ret;
10239
10240 wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
10241 freq->freq, freq->ht_enabled, freq->vht_enabled, freq->he_enabled,
10242 freq->bandwidth, freq->center_freq1, freq->center_freq2);
10243
10244 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_RADAR)) {
10245 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
10246 "detection");
10247 return -1;
10248 }
10249
10250 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_RADAR_DETECT)) ||
10251 nl80211_put_freq_params(msg, freq) < 0) {
10252 nlmsg_free(msg);
10253 return -1;
10254 }
10255
10256 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10257 if (ret == 0)
10258 return 0;
10259 wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
10260 "%d (%s)", ret, strerror(-ret));
10261 return -1;
10262 }
10263
10264 #ifdef CONFIG_TDLS
10265
nl80211_add_peer_capab(struct nl_msg * msg,enum tdls_peer_capability capa)10266 static int nl80211_add_peer_capab(struct nl_msg *msg,
10267 enum tdls_peer_capability capa)
10268 {
10269 u32 peer_capab = 0;
10270
10271 if (!capa)
10272 return 0;
10273
10274 if (capa & TDLS_PEER_HT)
10275 peer_capab |= NL80211_TDLS_PEER_HT;
10276 if (capa & TDLS_PEER_VHT)
10277 peer_capab |= NL80211_TDLS_PEER_VHT;
10278 if (capa & TDLS_PEER_WMM)
10279 peer_capab |= NL80211_TDLS_PEER_WMM;
10280 if (capa & TDLS_PEER_HE)
10281 peer_capab |= NL80211_TDLS_PEER_HE;
10282
10283 return nla_put_u32(msg, NL80211_ATTR_TDLS_PEER_CAPABILITY,
10284 peer_capab);
10285 }
10286
10287
nl80211_send_tdls_mgmt(void * priv,const u8 * dst,u8 action_code,u8 dialog_token,u16 status_code,u32 peer_capab,int initiator,const u8 * buf,size_t len)10288 static int nl80211_send_tdls_mgmt(void *priv, const u8 *dst, u8 action_code,
10289 u8 dialog_token, u16 status_code,
10290 u32 peer_capab, int initiator, const u8 *buf,
10291 size_t len)
10292 {
10293 struct i802_bss *bss = priv;
10294 struct wpa_driver_nl80211_data *drv = bss->drv;
10295 struct nl_msg *msg;
10296
10297 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
10298 return -EOPNOTSUPP;
10299
10300 if (!dst)
10301 return -EINVAL;
10302
10303 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_MGMT)) ||
10304 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dst) ||
10305 nla_put_u8(msg, NL80211_ATTR_TDLS_ACTION, action_code) ||
10306 nla_put_u8(msg, NL80211_ATTR_TDLS_DIALOG_TOKEN, dialog_token) ||
10307 nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, status_code) ||
10308 nl80211_add_peer_capab(msg, peer_capab) ||
10309 (initiator && nla_put_flag(msg, NL80211_ATTR_TDLS_INITIATOR)) ||
10310 nla_put(msg, NL80211_ATTR_IE, len, buf))
10311 goto fail;
10312
10313 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10314
10315 fail:
10316 nlmsg_free(msg);
10317 return -ENOBUFS;
10318 }
10319
10320
nl80211_tdls_oper(void * priv,enum tdls_oper oper,const u8 * peer)10321 static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer)
10322 {
10323 struct i802_bss *bss = priv;
10324 struct wpa_driver_nl80211_data *drv = bss->drv;
10325 struct nl_msg *msg;
10326 enum nl80211_tdls_operation nl80211_oper;
10327 int res;
10328
10329 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
10330 return -EOPNOTSUPP;
10331
10332 switch (oper) {
10333 case TDLS_DISCOVERY_REQ:
10334 nl80211_oper = NL80211_TDLS_DISCOVERY_REQ;
10335 break;
10336 case TDLS_SETUP:
10337 nl80211_oper = NL80211_TDLS_SETUP;
10338 break;
10339 case TDLS_TEARDOWN:
10340 nl80211_oper = NL80211_TDLS_TEARDOWN;
10341 break;
10342 case TDLS_ENABLE_LINK:
10343 nl80211_oper = NL80211_TDLS_ENABLE_LINK;
10344 break;
10345 case TDLS_DISABLE_LINK:
10346 nl80211_oper = NL80211_TDLS_DISABLE_LINK;
10347 break;
10348 case TDLS_ENABLE:
10349 return 0;
10350 case TDLS_DISABLE:
10351 return 0;
10352 default:
10353 return -EINVAL;
10354 }
10355
10356 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_OPER)) ||
10357 nla_put_u8(msg, NL80211_ATTR_TDLS_OPERATION, nl80211_oper) ||
10358 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer)) {
10359 nlmsg_free(msg);
10360 return -ENOBUFS;
10361 }
10362
10363 res = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10364 wpa_printf(MSG_DEBUG, "nl80211: TDLS_OPER: oper=%d mac=" MACSTR
10365 " --> res=%d (%s)", nl80211_oper, MAC2STR(peer), res,
10366 strerror(-res));
10367 return res;
10368 }
10369
10370
10371 static int
nl80211_tdls_enable_channel_switch(void * priv,const u8 * addr,u8 oper_class,const struct hostapd_freq_params * params)10372 nl80211_tdls_enable_channel_switch(void *priv, const u8 *addr, u8 oper_class,
10373 const struct hostapd_freq_params *params)
10374 {
10375 struct i802_bss *bss = priv;
10376 struct wpa_driver_nl80211_data *drv = bss->drv;
10377 struct nl_msg *msg;
10378 int ret = -ENOBUFS;
10379
10380 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
10381 !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
10382 return -EOPNOTSUPP;
10383
10384 wpa_printf(MSG_DEBUG, "nl80211: Enable TDLS channel switch " MACSTR
10385 " oper_class=%u freq=%u",
10386 MAC2STR(addr), oper_class, params->freq);
10387 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CHANNEL_SWITCH);
10388 if (!msg ||
10389 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
10390 nla_put_u8(msg, NL80211_ATTR_OPER_CLASS, oper_class) ||
10391 (ret = nl80211_put_freq_params(msg, params))) {
10392 nlmsg_free(msg);
10393 wpa_printf(MSG_DEBUG, "nl80211: Could not build TDLS chan switch");
10394 return ret;
10395 }
10396
10397 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10398 }
10399
10400
10401 static int
nl80211_tdls_disable_channel_switch(void * priv,const u8 * addr)10402 nl80211_tdls_disable_channel_switch(void *priv, const u8 *addr)
10403 {
10404 struct i802_bss *bss = priv;
10405 struct wpa_driver_nl80211_data *drv = bss->drv;
10406 struct nl_msg *msg;
10407
10408 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
10409 !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
10410 return -EOPNOTSUPP;
10411
10412 wpa_printf(MSG_DEBUG, "nl80211: Disable TDLS channel switch " MACSTR,
10413 MAC2STR(addr));
10414 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH);
10415 if (!msg ||
10416 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
10417 nlmsg_free(msg);
10418 wpa_printf(MSG_DEBUG,
10419 "nl80211: Could not build TDLS cancel chan switch");
10420 return -ENOBUFS;
10421 }
10422
10423 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10424 }
10425
10426 #endif /* CONFIG TDLS */
10427
10428
driver_nl80211_set_key(void * priv,struct wpa_driver_set_key_params * params)10429 static int driver_nl80211_set_key(void *priv,
10430 struct wpa_driver_set_key_params *params)
10431 {
10432 struct i802_bss *bss = priv;
10433
10434 return wpa_driver_nl80211_set_key(bss, params);
10435 }
10436
10437
driver_nl80211_scan2(void * priv,struct wpa_driver_scan_params * params)10438 static int driver_nl80211_scan2(void *priv,
10439 struct wpa_driver_scan_params *params)
10440 {
10441 struct i802_bss *bss = priv;
10442 #ifdef CONFIG_DRIVER_NL80211_QCA
10443 struct wpa_driver_nl80211_data *drv = bss->drv;
10444
10445 /*
10446 * Do a vendor specific scan if possible. If only_new_results is
10447 * set, do a normal scan since a kernel (cfg80211) BSS cache flush
10448 * cannot be achieved through a vendor scan. The below condition may
10449 * need to be modified if new scan flags are added in the future whose
10450 * functionality can only be achieved through a normal scan.
10451 */
10452 if (drv->scan_vendor_cmd_avail && !params->only_new_results)
10453 return wpa_driver_nl80211_vendor_scan(bss, params);
10454 #endif /* CONFIG_DRIVER_NL80211_QCA */
10455 return wpa_driver_nl80211_scan(bss, params);
10456 }
10457
10458
driver_nl80211_deauthenticate(void * priv,const u8 * addr,u16 reason_code)10459 static int driver_nl80211_deauthenticate(void *priv, const u8 *addr,
10460 u16 reason_code)
10461 {
10462 struct i802_bss *bss = priv;
10463 return wpa_driver_nl80211_deauthenticate(bss, addr, reason_code);
10464 }
10465
10466
driver_nl80211_authenticate(void * priv,struct wpa_driver_auth_params * params)10467 static int driver_nl80211_authenticate(void *priv,
10468 struct wpa_driver_auth_params *params)
10469 {
10470 struct i802_bss *bss = priv;
10471 return wpa_driver_nl80211_authenticate(bss, params);
10472 }
10473
10474
driver_nl80211_deinit(void * priv)10475 static void driver_nl80211_deinit(void *priv)
10476 {
10477 struct i802_bss *bss = priv;
10478 wpa_driver_nl80211_deinit(bss);
10479 }
10480
10481
driver_nl80211_if_remove(void * priv,enum wpa_driver_if_type type,const char * ifname)10482 static int driver_nl80211_if_remove(void *priv, enum wpa_driver_if_type type,
10483 const char *ifname)
10484 {
10485 struct i802_bss *bss = priv;
10486 return wpa_driver_nl80211_if_remove(bss, type, ifname);
10487 }
10488
10489
driver_nl80211_send_mlme(void * priv,const u8 * data,size_t data_len,int noack,unsigned int freq,const u16 * csa_offs,size_t csa_offs_len,int no_encrypt,unsigned int wait)10490 static int driver_nl80211_send_mlme(void *priv, const u8 *data,
10491 size_t data_len, int noack,
10492 unsigned int freq,
10493 const u16 *csa_offs, size_t csa_offs_len,
10494 int no_encrypt, unsigned int wait)
10495 {
10496 struct i802_bss *bss = priv;
10497 return wpa_driver_nl80211_send_mlme(bss, data, data_len, noack,
10498 freq, 0, 0, wait, csa_offs,
10499 csa_offs_len, no_encrypt);
10500 }
10501
10502
driver_nl80211_sta_remove(void * priv,const u8 * addr)10503 static int driver_nl80211_sta_remove(void *priv, const u8 *addr)
10504 {
10505 struct i802_bss *bss = priv;
10506 return wpa_driver_nl80211_sta_remove(bss, addr, -1, 0);
10507 }
10508
10509
driver_nl80211_set_sta_vlan(void * priv,const u8 * addr,const char * ifname,int vlan_id)10510 static int driver_nl80211_set_sta_vlan(void *priv, const u8 *addr,
10511 const char *ifname, int vlan_id)
10512 {
10513 struct i802_bss *bss = priv;
10514 return i802_set_sta_vlan(bss, addr, ifname, vlan_id);
10515 }
10516
10517
driver_nl80211_read_sta_data(void * priv,struct hostap_sta_driver_data * data,const u8 * addr)10518 static int driver_nl80211_read_sta_data(void *priv,
10519 struct hostap_sta_driver_data *data,
10520 const u8 *addr)
10521 {
10522 struct i802_bss *bss = priv;
10523
10524 os_memset(data, 0, sizeof(*data));
10525 return i802_read_sta_data(bss, data, addr);
10526 }
10527
10528
driver_nl80211_send_action(void * priv,unsigned int freq,unsigned int wait_time,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,int no_cck)10529 static int driver_nl80211_send_action(void *priv, unsigned int freq,
10530 unsigned int wait_time,
10531 const u8 *dst, const u8 *src,
10532 const u8 *bssid,
10533 const u8 *data, size_t data_len,
10534 int no_cck)
10535 {
10536 struct i802_bss *bss = priv;
10537 return wpa_driver_nl80211_send_action(bss, freq, wait_time, dst, src,
10538 bssid, data, data_len, no_cck);
10539 }
10540
10541
driver_nl80211_probe_req_report(void * priv,int report)10542 static int driver_nl80211_probe_req_report(void *priv, int report)
10543 {
10544 struct i802_bss *bss = priv;
10545 return wpa_driver_nl80211_probe_req_report(bss, report);
10546 }
10547
10548
wpa_driver_nl80211_update_ft_ies(void * priv,const u8 * md,const u8 * ies,size_t ies_len)10549 static int wpa_driver_nl80211_update_ft_ies(void *priv, const u8 *md,
10550 const u8 *ies, size_t ies_len)
10551 {
10552 int ret;
10553 struct nl_msg *msg;
10554 struct i802_bss *bss = priv;
10555 struct wpa_driver_nl80211_data *drv = bss->drv;
10556 u16 mdid = WPA_GET_LE16(md);
10557
10558 wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
10559 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_FT_IES)) ||
10560 nla_put(msg, NL80211_ATTR_IE, ies_len, ies) ||
10561 nla_put_u16(msg, NL80211_ATTR_MDID, mdid)) {
10562 nlmsg_free(msg);
10563 return -ENOBUFS;
10564 }
10565
10566 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10567 if (ret) {
10568 wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
10569 "err=%d (%s)", ret, strerror(-ret));
10570 }
10571
10572 return ret;
10573 }
10574
10575
nl80211_update_dh_ie(void * priv,const u8 * peer_mac,u16 reason_code,const u8 * ie,size_t ie_len)10576 static int nl80211_update_dh_ie(void *priv, const u8 *peer_mac,
10577 u16 reason_code, const u8 *ie, size_t ie_len)
10578 {
10579 int ret;
10580 struct nl_msg *msg;
10581 struct i802_bss *bss = priv;
10582 struct wpa_driver_nl80211_data *drv = bss->drv;
10583
10584 wpa_printf(MSG_DEBUG, "nl80211: Updating DH IE peer: " MACSTR
10585 " reason %u", MAC2STR(peer_mac), reason_code);
10586 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UPDATE_OWE_INFO)) ||
10587 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer_mac) ||
10588 nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, reason_code) ||
10589 (ie && nla_put(msg, NL80211_ATTR_IE, ie_len, ie))) {
10590 nlmsg_free(msg);
10591 return -ENOBUFS;
10592 }
10593
10594 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10595 if (ret) {
10596 wpa_printf(MSG_DEBUG,
10597 "nl80211: update_dh_ie failed err=%d (%s)",
10598 ret, strerror(-ret));
10599 }
10600
10601 return ret;
10602 }
10603
10604
wpa_driver_nl80211_get_macaddr(void * priv)10605 static const u8 * wpa_driver_nl80211_get_macaddr(void *priv)
10606 {
10607 struct i802_bss *bss = priv;
10608 struct wpa_driver_nl80211_data *drv = bss->drv;
10609
10610 if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE)
10611 return NULL;
10612
10613 return bss->addr;
10614 }
10615
10616
scan_state_str(enum scan_states scan_state)10617 static const char * scan_state_str(enum scan_states scan_state)
10618 {
10619 switch (scan_state) {
10620 case NO_SCAN:
10621 return "NO_SCAN";
10622 case SCAN_REQUESTED:
10623 return "SCAN_REQUESTED";
10624 case SCAN_STARTED:
10625 return "SCAN_STARTED";
10626 case SCAN_COMPLETED:
10627 return "SCAN_COMPLETED";
10628 case SCAN_ABORTED:
10629 return "SCAN_ABORTED";
10630 case SCHED_SCAN_STARTED:
10631 return "SCHED_SCAN_STARTED";
10632 case SCHED_SCAN_STOPPED:
10633 return "SCHED_SCAN_STOPPED";
10634 case SCHED_SCAN_RESULTS:
10635 return "SCHED_SCAN_RESULTS";
10636 }
10637
10638 return "??";
10639 }
10640
10641
wpa_driver_nl80211_status(void * priv,char * buf,size_t buflen)10642 static int wpa_driver_nl80211_status(void *priv, char *buf, size_t buflen)
10643 {
10644 struct i802_bss *bss = priv;
10645 struct wpa_driver_nl80211_data *drv = bss->drv;
10646 int res;
10647 char *pos, *end;
10648 struct nl_msg *msg;
10649 char alpha2[3] = { 0, 0, 0 };
10650
10651 pos = buf;
10652 end = buf + buflen;
10653
10654 res = os_snprintf(pos, end - pos,
10655 "ifindex=%d\n"
10656 "ifname=%s\n"
10657 "brname=%s\n"
10658 "addr=" MACSTR "\n"
10659 "freq=%d\n"
10660 "%s%s%s%s%s%s",
10661 bss->ifindex,
10662 bss->ifname,
10663 bss->brname,
10664 MAC2STR(bss->addr),
10665 bss->flink->freq,
10666 bss->flink->beacon_set ? "beacon_set=1\n" : "",
10667 bss->added_if_into_bridge ?
10668 "added_if_into_bridge=1\n" : "",
10669 bss->already_in_bridge ? "already_in_bridge=1\n" : "",
10670 bss->added_bridge ? "added_bridge=1\n" : "",
10671 bss->in_deinit ? "in_deinit=1\n" : "",
10672 bss->if_dynamic ? "if_dynamic=1\n" : "");
10673 if (os_snprintf_error(end - pos, res))
10674 return pos - buf;
10675 pos += res;
10676
10677 if (bss->wdev_id_set) {
10678 res = os_snprintf(pos, end - pos, "wdev_id=%llu\n",
10679 (unsigned long long) bss->wdev_id);
10680 if (os_snprintf_error(end - pos, res))
10681 return pos - buf;
10682 pos += res;
10683 }
10684
10685 res = os_snprintf(pos, end - pos,
10686 "phyname=%s\n"
10687 "perm_addr=" MACSTR "\n"
10688 "drv_ifindex=%d\n"
10689 "operstate=%d\n"
10690 "scan_state=%s\n"
10691 "auth_bssid=" MACSTR "\n"
10692 "auth_attempt_bssid=" MACSTR "\n"
10693 "bssid=" MACSTR "\n"
10694 "prev_bssid=" MACSTR "\n"
10695 "associated=%d\n"
10696 "assoc_freq=%u\n"
10697 "monitor_sock=%d\n"
10698 "monitor_ifidx=%d\n"
10699 "monitor_refcount=%d\n"
10700 "last_mgmt_freq=%u\n"
10701 "eapol_tx_sock=%d\n"
10702 "%s%s%s%s%s%s%s%s%s%s%s%s%s",
10703 drv->phyname,
10704 MAC2STR(drv->perm_addr),
10705 drv->ifindex,
10706 drv->operstate,
10707 scan_state_str(drv->scan_state),
10708 MAC2STR(drv->auth_bssid),
10709 MAC2STR(drv->auth_attempt_bssid),
10710 MAC2STR(drv->bssid),
10711 MAC2STR(drv->prev_bssid),
10712 drv->associated,
10713 drv->assoc_freq,
10714 drv->monitor_sock,
10715 drv->monitor_ifidx,
10716 drv->monitor_refcount,
10717 drv->last_mgmt_freq,
10718 drv->eapol_tx_sock,
10719 drv->ignore_if_down_event ?
10720 "ignore_if_down_event=1\n" : "",
10721 drv->scan_complete_events ?
10722 "scan_complete_events=1\n" : "",
10723 drv->disabled_11b_rates ?
10724 "disabled_11b_rates=1\n" : "",
10725 drv->pending_remain_on_chan ?
10726 "pending_remain_on_chan=1\n" : "",
10727 drv->in_interface_list ? "in_interface_list=1\n" : "",
10728 drv->device_ap_sme ? "device_ap_sme=1\n" : "",
10729 drv->poll_command_supported ?
10730 "poll_command_supported=1\n" : "",
10731 drv->data_tx_status ? "data_tx_status=1\n" : "",
10732 drv->scan_for_auth ? "scan_for_auth=1\n" : "",
10733 drv->retry_auth ? "retry_auth=1\n" : "",
10734 drv->use_monitor ? "use_monitor=1\n" : "",
10735 drv->ignore_next_local_disconnect ?
10736 "ignore_next_local_disconnect=1\n" : "",
10737 drv->ignore_next_local_deauth ?
10738 "ignore_next_local_deauth=1\n" : "");
10739 if (os_snprintf_error(end - pos, res))
10740 return pos - buf;
10741 pos += res;
10742
10743 if (drv->sta_mlo_info.valid_links) {
10744 int i;
10745 struct driver_sta_mlo_info *mlo = &drv->sta_mlo_info;
10746
10747 res = os_snprintf(pos, end - pos,
10748 "ap_mld_addr=" MACSTR "\n"
10749 "default_map=%d\n",
10750 MAC2STR(mlo->ap_mld_addr),
10751 mlo->default_map);
10752 if (os_snprintf_error(end - pos, res))
10753 return pos - buf;
10754 pos += res;
10755
10756 for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
10757 if (!(mlo->valid_links & BIT(i)))
10758 continue;
10759
10760 res = os_snprintf(pos, end - pos,
10761 "link_addr[%u]=" MACSTR "\n"
10762 "link_bssid[%u]=" MACSTR "\n"
10763 "link_freq[%u]=%u\n",
10764 i, MAC2STR(mlo->links[i].addr),
10765 i, MAC2STR(mlo->links[i].bssid),
10766 i, mlo->links[i].freq);
10767 if (os_snprintf_error(end - pos, res))
10768 return pos - buf;
10769 pos += res;
10770
10771 if (!mlo->default_map) {
10772 res = os_snprintf(
10773 pos, end - pos,
10774 "uplink_map[%u]=%x\n"
10775 "downlink_map[%u]=%x\n",
10776 i, mlo->links[i].t2lmap.uplink,
10777 i, mlo->links[i].t2lmap.downlink);
10778 if (os_snprintf_error(end - pos, res))
10779 return pos - buf;
10780 pos += res;
10781 }
10782 }
10783 }
10784
10785 if (drv->has_capability) {
10786 res = os_snprintf(pos, end - pos,
10787 "capa.key_mgmt=0x%x\n"
10788 "capa.enc=0x%x\n"
10789 "capa.auth=0x%x\n"
10790 "capa.flags=0x%llx\n"
10791 "capa.rrm_flags=0x%x\n"
10792 "capa.max_scan_ssids=%d\n"
10793 "capa.max_sched_scan_ssids=%d\n"
10794 "capa.sched_scan_supported=%d\n"
10795 "capa.max_match_sets=%d\n"
10796 "capa.max_remain_on_chan=%u\n"
10797 "capa.max_stations=%u\n"
10798 "capa.probe_resp_offloads=0x%x\n"
10799 "capa.max_acl_mac_addrs=%u\n"
10800 "capa.num_multichan_concurrent=%u\n"
10801 "capa.mac_addr_rand_sched_scan_supported=%d\n"
10802 "capa.mac_addr_rand_scan_supported=%d\n"
10803 "capa.conc_capab=%u\n"
10804 "capa.max_conc_chan_2_4=%u\n"
10805 "capa.max_conc_chan_5_0=%u\n"
10806 "capa.max_sched_scan_plans=%u\n"
10807 "capa.max_sched_scan_plan_interval=%u\n"
10808 "capa.max_sched_scan_plan_iterations=%u\n"
10809 "capa.mbssid_max_interfaces=%u\n"
10810 "capa.ema_max_periodicity=%u\n",
10811 drv->capa.key_mgmt,
10812 drv->capa.enc,
10813 drv->capa.auth,
10814 (unsigned long long) drv->capa.flags,
10815 drv->capa.rrm_flags,
10816 drv->capa.max_scan_ssids,
10817 drv->capa.max_sched_scan_ssids,
10818 drv->capa.sched_scan_supported,
10819 drv->capa.max_match_sets,
10820 drv->capa.max_remain_on_chan,
10821 drv->capa.max_stations,
10822 drv->capa.probe_resp_offloads,
10823 drv->capa.max_acl_mac_addrs,
10824 drv->capa.num_multichan_concurrent,
10825 drv->capa.mac_addr_rand_sched_scan_supported,
10826 drv->capa.mac_addr_rand_scan_supported,
10827 drv->capa.conc_capab,
10828 drv->capa.max_conc_chan_2_4,
10829 drv->capa.max_conc_chan_5_0,
10830 drv->capa.max_sched_scan_plans,
10831 drv->capa.max_sched_scan_plan_interval,
10832 drv->capa.max_sched_scan_plan_iterations,
10833 drv->capa.mbssid_max_interfaces,
10834 drv->capa.ema_max_periodicity);
10835 if (os_snprintf_error(end - pos, res))
10836 return pos - buf;
10837 pos += res;
10838 }
10839
10840 msg = nlmsg_alloc();
10841 if (msg &&
10842 nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG) &&
10843 nla_put_u32(msg, NL80211_ATTR_WIPHY, drv->wiphy_idx) == 0) {
10844 if (send_and_recv_msgs(drv, msg, nl80211_get_country,
10845 alpha2, NULL, NULL) == 0 &&
10846 alpha2[0]) {
10847 res = os_snprintf(pos, end - pos, "country=%s\n",
10848 alpha2);
10849 if (os_snprintf_error(end - pos, res))
10850 return pos - buf;
10851 pos += res;
10852 }
10853 } else {
10854 nlmsg_free(msg);
10855 }
10856
10857 return pos - buf;
10858 }
10859
10860
set_beacon_data(struct nl_msg * msg,struct beacon_data * settings)10861 static int set_beacon_data(struct nl_msg *msg, struct beacon_data *settings)
10862 {
10863 if ((settings->head &&
10864 nla_put(msg, NL80211_ATTR_BEACON_HEAD,
10865 settings->head_len, settings->head)) ||
10866 (settings->tail &&
10867 nla_put(msg, NL80211_ATTR_BEACON_TAIL,
10868 settings->tail_len, settings->tail)) ||
10869 (settings->beacon_ies &&
10870 nla_put(msg, NL80211_ATTR_IE,
10871 settings->beacon_ies_len, settings->beacon_ies)) ||
10872 (settings->proberesp_ies &&
10873 nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
10874 settings->proberesp_ies_len, settings->proberesp_ies)) ||
10875 (settings->assocresp_ies &&
10876 nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
10877 settings->assocresp_ies_len, settings->assocresp_ies)) ||
10878 (settings->probe_resp &&
10879 nla_put(msg, NL80211_ATTR_PROBE_RESP,
10880 settings->probe_resp_len, settings->probe_resp)))
10881 return -ENOBUFS;
10882
10883 return 0;
10884 }
10885
10886
nl80211_switch_channel(void * priv,struct csa_settings * settings)10887 static int nl80211_switch_channel(void *priv, struct csa_settings *settings)
10888 {
10889 struct nl_msg *msg;
10890 struct i802_bss *bss = priv;
10891 struct wpa_driver_nl80211_data *drv = bss->drv;
10892 struct nlattr *beacon_csa;
10893 int ret = -ENOBUFS;
10894 int csa_off_len = 0;
10895 int i;
10896
10897 wpa_printf(MSG_DEBUG,
10898 "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d channel=%d sec_channel_offset=%d width=%d cf1=%d cf2=%d puncturing_bitmap=0x%04x%s%s%s)",
10899 settings->cs_count, settings->block_tx,
10900 settings->freq_params.freq,
10901 settings->freq_params.channel,
10902 settings->freq_params.sec_channel_offset,
10903 settings->freq_params.bandwidth,
10904 settings->freq_params.center_freq1,
10905 settings->freq_params.center_freq2,
10906 settings->punct_bitmap,
10907 settings->freq_params.ht_enabled ? " ht" : "",
10908 settings->freq_params.vht_enabled ? " vht" : "",
10909 settings->freq_params.he_enabled ? " he" : "");
10910
10911 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_AP_CSA)) {
10912 wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
10913 return -EOPNOTSUPP;
10914 }
10915
10916 if (drv->nlmode != NL80211_IFTYPE_AP &&
10917 drv->nlmode != NL80211_IFTYPE_P2P_GO &&
10918 drv->nlmode != NL80211_IFTYPE_MESH_POINT)
10919 return -EOPNOTSUPP;
10920
10921 /*
10922 * Remove empty counters, assuming Probe Response and Beacon frame
10923 * counters match. This implementation assumes that there are only two
10924 * counters.
10925 */
10926 if (settings->counter_offset_beacon[0] &&
10927 !settings->counter_offset_beacon[1]) {
10928 csa_off_len = 1;
10929 } else if (settings->counter_offset_beacon[1] &&
10930 !settings->counter_offset_beacon[0]) {
10931 csa_off_len = 1;
10932 settings->counter_offset_beacon[0] =
10933 settings->counter_offset_beacon[1];
10934 settings->counter_offset_presp[0] =
10935 settings->counter_offset_presp[1];
10936 } else if (settings->counter_offset_beacon[1] &&
10937 settings->counter_offset_beacon[0]) {
10938 csa_off_len = 2;
10939 } else {
10940 wpa_printf(MSG_ERROR, "nl80211: No CSA counters provided");
10941 return -EINVAL;
10942 }
10943
10944 /* Check CSA counters validity */
10945 if (drv->capa.max_csa_counters &&
10946 csa_off_len > drv->capa.max_csa_counters) {
10947 wpa_printf(MSG_ERROR,
10948 "nl80211: Too many CSA counters provided");
10949 return -EINVAL;
10950 }
10951
10952 if (!settings->beacon_csa.tail)
10953 return -EINVAL;
10954
10955 for (i = 0; i < csa_off_len; i++) {
10956 u16 csa_c_off_bcn = settings->counter_offset_beacon[i];
10957 u16 csa_c_off_presp = settings->counter_offset_presp[i];
10958
10959 if ((settings->beacon_csa.tail_len <= csa_c_off_bcn) ||
10960 (settings->beacon_csa.tail[csa_c_off_bcn] !=
10961 settings->cs_count))
10962 return -EINVAL;
10963
10964 if (settings->beacon_csa.probe_resp &&
10965 ((settings->beacon_csa.probe_resp_len <=
10966 csa_c_off_presp) ||
10967 (settings->beacon_csa.probe_resp[csa_c_off_presp] !=
10968 settings->cs_count)))
10969 return -EINVAL;
10970 }
10971
10972 if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CHANNEL_SWITCH)) ||
10973 nla_put_u32(msg, NL80211_ATTR_CH_SWITCH_COUNT,
10974 settings->cs_count) ||
10975 (ret = nl80211_put_freq_params(msg, &settings->freq_params)) ||
10976 (settings->block_tx &&
10977 nla_put_flag(msg, NL80211_ATTR_CH_SWITCH_BLOCK_TX)) ||
10978 (settings->punct_bitmap &&
10979 nla_put_u32(msg, NL80211_ATTR_PUNCT_BITMAP,
10980 settings->punct_bitmap)))
10981 goto error;
10982
10983 /* beacon_after params */
10984 ret = set_beacon_data(msg, &settings->beacon_after);
10985 if (ret)
10986 goto error;
10987
10988 /* beacon_csa params */
10989 beacon_csa = nla_nest_start(msg, NL80211_ATTR_CSA_IES);
10990 if (!beacon_csa)
10991 goto fail;
10992
10993 ret = set_beacon_data(msg, &settings->beacon_csa);
10994 if (ret)
10995 goto error;
10996
10997 if (nla_put(msg, NL80211_ATTR_CSA_C_OFF_BEACON,
10998 csa_off_len * sizeof(u16),
10999 settings->counter_offset_beacon) ||
11000 (settings->beacon_csa.probe_resp &&
11001 nla_put(msg, NL80211_ATTR_CSA_C_OFF_PRESP,
11002 csa_off_len * sizeof(u16),
11003 settings->counter_offset_presp)))
11004 goto fail;
11005
11006 nla_nest_end(msg, beacon_csa);
11007 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11008 if (ret) {
11009 wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
11010 ret, strerror(-ret));
11011 }
11012 return ret;
11013
11014 fail:
11015 ret = -ENOBUFS;
11016 error:
11017 nlmsg_free(msg);
11018 wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
11019 return ret;
11020 }
11021
11022
11023 #ifdef CONFIG_IEEE80211AX
nl80211_switch_color(void * priv,struct cca_settings * settings)11024 static int nl80211_switch_color(void *priv, struct cca_settings *settings)
11025 {
11026 struct i802_bss *bss = priv;
11027 struct wpa_driver_nl80211_data *drv = bss->drv;
11028 struct nlattr *beacon_cca;
11029 struct nl_msg *msg;
11030 int ret = -ENOBUFS;
11031
11032 wpa_printf(MSG_DEBUG,
11033 "nl80211: Color change request (cca_count=%u color=%d)",
11034 settings->cca_count, settings->cca_color);
11035
11036 if (drv->nlmode != NL80211_IFTYPE_AP)
11037 return -EOPNOTSUPP;
11038
11039 if (!settings->beacon_cca.tail)
11040 return -EINVAL;
11041
11042 if (settings->beacon_cca.tail_len <= settings->counter_offset_beacon ||
11043 settings->beacon_cca.tail[settings->counter_offset_beacon] !=
11044 settings->cca_count)
11045 return -EINVAL;
11046
11047 if (settings->beacon_cca.probe_resp &&
11048 (settings->beacon_cca.probe_resp_len <=
11049 settings->counter_offset_presp ||
11050 settings->beacon_cca.probe_resp[settings->counter_offset_presp] !=
11051 settings->cca_count))
11052 return -EINVAL;
11053
11054 msg = nl80211_bss_msg(bss, 0, NL80211_CMD_COLOR_CHANGE_REQUEST);
11055 if (!msg ||
11056 nla_put_u8(msg, NL80211_ATTR_COLOR_CHANGE_COUNT,
11057 settings->cca_count) ||
11058 nla_put_u8(msg, NL80211_ATTR_COLOR_CHANGE_COLOR,
11059 settings->cca_color))
11060 goto error;
11061
11062 /* beacon_after params */
11063 ret = set_beacon_data(msg, &settings->beacon_after);
11064 if (ret)
11065 goto error;
11066
11067 /* beacon_csa params */
11068 beacon_cca = nla_nest_start(msg, NL80211_ATTR_COLOR_CHANGE_ELEMS);
11069 if (!beacon_cca) {
11070 ret = -ENOBUFS;
11071 goto error;
11072 }
11073
11074 ret = set_beacon_data(msg, &settings->beacon_cca);
11075 if (ret)
11076 goto error;
11077
11078 if (nla_put_u16(msg, NL80211_ATTR_CNTDWN_OFFS_BEACON,
11079 settings->counter_offset_beacon) ||
11080 (settings->beacon_cca.probe_resp &&
11081 nla_put_u16(msg, NL80211_ATTR_CNTDWN_OFFS_PRESP,
11082 settings->counter_offset_presp))) {
11083 ret = -ENOBUFS;
11084 goto error;
11085 }
11086
11087 nla_nest_end(msg, beacon_cca);
11088 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11089 if (ret) {
11090 wpa_printf(MSG_DEBUG,
11091 "nl80211: switch_color failed err=%d (%s)",
11092 ret, strerror(-ret));
11093 }
11094 return ret;
11095
11096 error:
11097 nlmsg_free(msg);
11098 wpa_printf(MSG_DEBUG, "nl80211: Could not build color switch request");
11099 return ret;
11100 }
11101 #endif /* CONFIG_IEEE80211AX */
11102
11103
nl80211_add_ts(void * priv,u8 tsid,const u8 * addr,u8 user_priority,u16 admitted_time)11104 static int nl80211_add_ts(void *priv, u8 tsid, const u8 *addr,
11105 u8 user_priority, u16 admitted_time)
11106 {
11107 struct i802_bss *bss = priv;
11108 struct wpa_driver_nl80211_data *drv = bss->drv;
11109 struct nl_msg *msg;
11110 int ret;
11111
11112 wpa_printf(MSG_DEBUG,
11113 "nl80211: add_ts request: tsid=%u admitted_time=%u up=%d",
11114 tsid, admitted_time, user_priority);
11115
11116 if (!is_sta_interface(drv->nlmode))
11117 return -ENOTSUP;
11118
11119 msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_ADD_TX_TS);
11120 if (!msg ||
11121 nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
11122 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
11123 nla_put_u8(msg, NL80211_ATTR_USER_PRIO, user_priority) ||
11124 nla_put_u16(msg, NL80211_ATTR_ADMITTED_TIME, admitted_time)) {
11125 nlmsg_free(msg);
11126 return -ENOBUFS;
11127 }
11128
11129 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11130 if (ret)
11131 wpa_printf(MSG_DEBUG, "nl80211: add_ts failed err=%d (%s)",
11132 ret, strerror(-ret));
11133 return ret;
11134 }
11135
11136
nl80211_del_ts(void * priv,u8 tsid,const u8 * addr)11137 static int nl80211_del_ts(void *priv, u8 tsid, const u8 *addr)
11138 {
11139 struct i802_bss *bss = priv;
11140 struct wpa_driver_nl80211_data *drv = bss->drv;
11141 struct nl_msg *msg;
11142 int ret;
11143
11144 wpa_printf(MSG_DEBUG, "nl80211: del_ts request: tsid=%u", tsid);
11145
11146 if (!is_sta_interface(drv->nlmode))
11147 return -ENOTSUP;
11148
11149 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_TX_TS)) ||
11150 nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
11151 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
11152 nlmsg_free(msg);
11153 return -ENOBUFS;
11154 }
11155
11156 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11157 if (ret)
11158 wpa_printf(MSG_DEBUG, "nl80211: del_ts failed err=%d (%s)",
11159 ret, strerror(-ret));
11160 return ret;
11161 }
11162
11163
11164 #ifdef CONFIG_TESTING_OPTIONS
cmd_reply_handler(struct nl_msg * msg,void * arg)11165 static int cmd_reply_handler(struct nl_msg *msg, void *arg)
11166 {
11167 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11168 struct wpabuf *buf = arg;
11169
11170 if (!buf)
11171 return NL_SKIP;
11172
11173 if ((size_t) genlmsg_attrlen(gnlh, 0) > wpabuf_tailroom(buf)) {
11174 wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
11175 return NL_SKIP;
11176 }
11177
11178 wpabuf_put_data(buf, genlmsg_attrdata(gnlh, 0),
11179 genlmsg_attrlen(gnlh, 0));
11180
11181 return NL_SKIP;
11182 }
11183 #endif /* CONFIG_TESTING_OPTIONS */
11184
11185
vendor_reply_handler(struct nl_msg * msg,void * arg)11186 static int vendor_reply_handler(struct nl_msg *msg, void *arg)
11187 {
11188 struct nlattr *tb[NL80211_ATTR_MAX + 1];
11189 struct nlattr *nl_vendor_reply, *nl;
11190 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11191 struct wpabuf *buf = arg;
11192 int rem;
11193
11194 if (!buf)
11195 return NL_SKIP;
11196
11197 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11198 genlmsg_attrlen(gnlh, 0), NULL);
11199 nl_vendor_reply = tb[NL80211_ATTR_VENDOR_DATA];
11200
11201 if (!nl_vendor_reply)
11202 return NL_SKIP;
11203
11204 if ((size_t) nla_len(nl_vendor_reply) > wpabuf_tailroom(buf)) {
11205 wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
11206 return NL_SKIP;
11207 }
11208
11209 nla_for_each_nested(nl, nl_vendor_reply, rem) {
11210 wpabuf_put_data(buf, nla_data(nl), nla_len(nl));
11211 }
11212
11213 return NL_SKIP;
11214 }
11215
11216
is_cmd_with_nested_attrs(unsigned int vendor_id,unsigned int subcmd)11217 static bool is_cmd_with_nested_attrs(unsigned int vendor_id,
11218 unsigned int subcmd)
11219 {
11220 if (vendor_id != OUI_QCA)
11221 return true;
11222
11223 switch (subcmd) {
11224 case QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY:
11225 case QCA_NL80211_VENDOR_SUBCMD_STATS_EXT:
11226 case QCA_NL80211_VENDOR_SUBCMD_SCANNING_MAC_OUI:
11227 case QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY:
11228 case QCA_NL80211_VENDOR_SUBCMD_SPECTRAL_SCAN_GET_STATUS:
11229 case QCA_NL80211_VENDOR_SUBCMD_NAN:
11230 return false;
11231 default:
11232 return true;
11233 }
11234 }
11235
11236
nl80211_vendor_cmd(void * priv,unsigned int vendor_id,unsigned int subcmd,const u8 * data,size_t data_len,enum nested_attr nested_attr,struct wpabuf * buf)11237 static int nl80211_vendor_cmd(void *priv, unsigned int vendor_id,
11238 unsigned int subcmd, const u8 *data,
11239 size_t data_len, enum nested_attr nested_attr,
11240 struct wpabuf *buf)
11241 {
11242 struct i802_bss *bss = priv;
11243 struct wpa_driver_nl80211_data *drv = bss->drv;
11244 struct nl_msg *msg;
11245 int ret, nla_flag;
11246
11247 #ifdef CONFIG_TESTING_OPTIONS
11248 if (vendor_id == 0xffffffff) {
11249 msg = nlmsg_alloc();
11250 if (!msg)
11251 return -ENOMEM;
11252
11253 nl80211_cmd(drv, msg, 0, subcmd);
11254 if (nlmsg_append(msg, (void *) data, data_len, NLMSG_ALIGNTO) <
11255 0)
11256 goto fail;
11257 /* This test vendor_cmd can be used with nl80211 commands that
11258 * need the connect nl_sock, so use the owner-setting variant
11259 * of send_and_recv_msgs(). */
11260 ret = send_and_recv_msgs_owner(drv, msg,
11261 get_connect_handle(bss), 0,
11262 cmd_reply_handler, buf,
11263 NULL, NULL);
11264 if (ret)
11265 wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
11266 ret);
11267 return ret;
11268 }
11269 #endif /* CONFIG_TESTING_OPTIONS */
11270
11271 if (nested_attr == NESTED_ATTR_USED)
11272 nla_flag = NLA_F_NESTED;
11273 else if (nested_attr == NESTED_ATTR_UNSPECIFIED &&
11274 is_cmd_with_nested_attrs(vendor_id, subcmd))
11275 nla_flag = NLA_F_NESTED;
11276 else
11277 nla_flag = 0;
11278
11279 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
11280 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, vendor_id) ||
11281 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, subcmd) ||
11282 (data &&
11283 nla_put(msg, nla_flag | NL80211_ATTR_VENDOR_DATA,
11284 data_len, data)))
11285 goto fail;
11286
11287 ret = send_and_recv_msgs(drv, msg, vendor_reply_handler, buf,
11288 NULL, NULL);
11289 if (ret)
11290 wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
11291 ret);
11292 return ret;
11293
11294 fail:
11295 nlmsg_free(msg);
11296 return -ENOBUFS;
11297 }
11298
11299
nl80211_set_qos_map(void * priv,const u8 * qos_map_set,u8 qos_map_set_len)11300 static int nl80211_set_qos_map(void *priv, const u8 *qos_map_set,
11301 u8 qos_map_set_len)
11302 {
11303 struct i802_bss *bss = priv;
11304 struct wpa_driver_nl80211_data *drv = bss->drv;
11305 struct nl_msg *msg;
11306 int ret;
11307
11308 wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
11309 qos_map_set, qos_map_set_len);
11310
11311 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_QOS_MAP)) ||
11312 nla_put(msg, NL80211_ATTR_QOS_MAP, qos_map_set_len, qos_map_set)) {
11313 nlmsg_free(msg);
11314 return -ENOBUFS;
11315 }
11316
11317 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11318 if (ret)
11319 wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
11320
11321 return ret;
11322 }
11323
11324
get_wowlan_handler(struct nl_msg * msg,void * arg)11325 static int get_wowlan_handler(struct nl_msg *msg, void *arg)
11326 {
11327 struct nlattr *tb[NL80211_ATTR_MAX + 1];
11328 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11329 int *wowlan_enabled = arg;
11330
11331 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11332 genlmsg_attrlen(gnlh, 0), NULL);
11333
11334 *wowlan_enabled = !!tb[NL80211_ATTR_WOWLAN_TRIGGERS];
11335
11336 return NL_SKIP;
11337 }
11338
11339
nl80211_get_wowlan(void * priv)11340 static int nl80211_get_wowlan(void *priv)
11341 {
11342 struct i802_bss *bss = priv;
11343 struct wpa_driver_nl80211_data *drv = bss->drv;
11344 struct nl_msg *msg;
11345 int wowlan_enabled;
11346 int ret;
11347
11348 wpa_printf(MSG_DEBUG, "nl80211: Getting wowlan status");
11349
11350 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_WOWLAN);
11351
11352 ret = send_and_recv_msgs(drv, msg, get_wowlan_handler, &wowlan_enabled,
11353 NULL, NULL);
11354 if (ret) {
11355 wpa_printf(MSG_DEBUG, "nl80211: Getting wowlan status failed");
11356 return 0;
11357 }
11358
11359 wpa_printf(MSG_DEBUG, "nl80211: wowlan is %s",
11360 wowlan_enabled ? "enabled" : "disabled");
11361
11362 return wowlan_enabled;
11363 }
11364
11365
nl80211_set_wowlan(void * priv,const struct wowlan_triggers * triggers)11366 static int nl80211_set_wowlan(void *priv,
11367 const struct wowlan_triggers *triggers)
11368 {
11369 struct i802_bss *bss = priv;
11370 struct wpa_driver_nl80211_data *drv = bss->drv;
11371 struct nl_msg *msg;
11372 struct nlattr *wowlan_triggers;
11373 int ret;
11374
11375 wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
11376
11377 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_SET_WOWLAN)) ||
11378 !(wowlan_triggers = nla_nest_start(msg,
11379 NL80211_ATTR_WOWLAN_TRIGGERS)) ||
11380 (triggers->any &&
11381 nla_put_flag(msg, NL80211_WOWLAN_TRIG_ANY)) ||
11382 (triggers->disconnect &&
11383 nla_put_flag(msg, NL80211_WOWLAN_TRIG_DISCONNECT)) ||
11384 (triggers->magic_pkt &&
11385 nla_put_flag(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT)) ||
11386 (triggers->gtk_rekey_failure &&
11387 nla_put_flag(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE)) ||
11388 (triggers->eap_identity_req &&
11389 nla_put_flag(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST)) ||
11390 (triggers->four_way_handshake &&
11391 nla_put_flag(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE)) ||
11392 (triggers->rfkill_release &&
11393 nla_put_flag(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE))) {
11394 nlmsg_free(msg);
11395 return -ENOBUFS;
11396 }
11397
11398 nla_nest_end(msg, wowlan_triggers);
11399
11400 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11401 if (ret)
11402 wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
11403
11404 return ret;
11405 }
11406
11407
11408 #ifdef CONFIG_DRIVER_NL80211_QCA
nl80211_roaming(void * priv,int allowed,const u8 * bssid)11409 static int nl80211_roaming(void *priv, int allowed, const u8 *bssid)
11410 {
11411 struct i802_bss *bss = priv;
11412 struct wpa_driver_nl80211_data *drv = bss->drv;
11413 struct nl_msg *msg;
11414 struct nlattr *params;
11415
11416 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
11417
11418 if (!drv->roaming_vendor_cmd_avail) {
11419 wpa_printf(MSG_DEBUG,
11420 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
11421 return -1;
11422 }
11423
11424 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11425 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11426 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11427 QCA_NL80211_VENDOR_SUBCMD_ROAMING) ||
11428 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11429 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_POLICY,
11430 allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
11431 QCA_ROAMING_NOT_ALLOWED) ||
11432 (bssid &&
11433 nla_put(msg, QCA_WLAN_VENDOR_ATTR_MAC_ADDR, ETH_ALEN, bssid))) {
11434 nlmsg_free(msg);
11435 return -1;
11436 }
11437 nla_nest_end(msg, params);
11438
11439 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11440 }
11441
11442
nl80211_disable_fils(void * priv,int disable)11443 static int nl80211_disable_fils(void *priv, int disable)
11444 {
11445 struct i802_bss *bss = priv;
11446 struct wpa_driver_nl80211_data *drv = bss->drv;
11447 struct nl_msg *msg;
11448 struct nlattr *params;
11449
11450 wpa_printf(MSG_DEBUG, "nl80211: Disable FILS=%d", disable);
11451
11452 if (!drv->set_wifi_conf_vendor_cmd_avail)
11453 return -1;
11454
11455 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11456 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11457 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11458 QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
11459 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11460 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_DISABLE_FILS,
11461 disable)) {
11462 nlmsg_free(msg);
11463 return -1;
11464 }
11465 nla_nest_end(msg, params);
11466
11467 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11468 }
11469
11470
11471 /* Reserved QCA_WLAN_VENDOR_ATTR_ROAMING_REQ_ID value for wpa_supplicant */
11472 #define WPA_SUPPLICANT_CLIENT_ID 1
11473
nl80211_set_bssid_tmp_disallow(void * priv,unsigned int num_bssid,const u8 * bssid)11474 static int nl80211_set_bssid_tmp_disallow(void *priv, unsigned int num_bssid,
11475 const u8 *bssid)
11476 {
11477 struct i802_bss *bss = priv;
11478 struct wpa_driver_nl80211_data *drv = bss->drv;
11479 struct nl_msg *msg;
11480 struct nlattr *params, *nlbssids, *attr;
11481 unsigned int i;
11482
11483 wpa_printf(MSG_DEBUG,
11484 "nl80211: Set temporarily disallowed BSSIDs (num=%u)",
11485 num_bssid);
11486
11487 if (!drv->roam_vendor_cmd_avail)
11488 return -1;
11489
11490 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11491 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11492 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11493 QCA_NL80211_VENDOR_SUBCMD_ROAM) ||
11494 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11495 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_SUBCMD,
11496 QCA_WLAN_VENDOR_ROAMING_SUBCMD_SET_BLACKLIST_BSSID) ||
11497 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_REQ_ID,
11498 WPA_SUPPLICANT_CLIENT_ID) ||
11499 nla_put_u32(msg,
11500 QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS_NUM_BSSID,
11501 num_bssid))
11502 goto fail;
11503
11504 nlbssids = nla_nest_start(
11505 msg, QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS);
11506 if (!nlbssids)
11507 goto fail;
11508
11509 for (i = 0; i < num_bssid; i++) {
11510 attr = nla_nest_start(msg, i);
11511 if (!attr)
11512 goto fail;
11513 if (nla_put(msg,
11514 QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS_BSSID,
11515 ETH_ALEN, &bssid[i * ETH_ALEN]))
11516 goto fail;
11517 wpa_printf(MSG_DEBUG, "nl80211: BSSID[%u]: " MACSTR, i,
11518 MAC2STR(&bssid[i * ETH_ALEN]));
11519 nla_nest_end(msg, attr);
11520 }
11521 nla_nest_end(msg, nlbssids);
11522 nla_nest_end(msg, params);
11523
11524 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11525
11526 fail:
11527 nlmsg_free(msg);
11528 return -1;
11529 }
11530
11531
nl80211_add_sta_node(void * priv,const u8 * addr,u16 auth_alg)11532 static int nl80211_add_sta_node(void *priv, const u8 *addr, u16 auth_alg)
11533 {
11534 struct i802_bss *bss = priv;
11535 struct wpa_driver_nl80211_data *drv = bss->drv;
11536 struct nl_msg *msg;
11537 struct nlattr *params;
11538
11539 if (!drv->add_sta_node_vendor_cmd_avail)
11540 return -EOPNOTSUPP;
11541
11542 wpa_printf(MSG_DEBUG, "nl80211: Add STA node");
11543
11544 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11545 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11546 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11547 QCA_NL80211_VENDOR_SUBCMD_ADD_STA_NODE) ||
11548 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11549 (addr &&
11550 nla_put(msg, QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_MAC_ADDR, ETH_ALEN,
11551 addr)) ||
11552 nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_AUTH_ALGO,
11553 auth_alg)) {
11554 nlmsg_free(msg);
11555 wpa_printf(MSG_ERROR,
11556 "%s: err in adding vendor_cmd and vendor_data",
11557 __func__);
11558 return -1;
11559 }
11560 nla_nest_end(msg, params);
11561
11562 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11563 }
11564
11565 #endif /* CONFIG_DRIVER_NL80211_QCA */
11566
11567
nl80211_set_mac_addr(void * priv,const u8 * addr)11568 static int nl80211_set_mac_addr(void *priv, const u8 *addr)
11569 {
11570 struct i802_bss *bss = priv;
11571 struct wpa_driver_nl80211_data *drv = bss->drv;
11572 int new_addr = addr != NULL;
11573 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
11574 struct nl_msg *msg;
11575 struct nlattr *params;
11576 int ret;
11577 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
11578 wpa_printf(MSG_DEBUG, "Enter: %s", __FUNCTION__);
11579
11580 if (TEST_FAIL())
11581 return -1;
11582 if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
11583 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
11584 if (!addr ) {
11585 addr = drv->global->p2p_perm_addr;
11586 }
11587
11588 if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
11589 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
11590 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11591 BRCM_VENDOR_SCMD_SET_MAC) ||
11592 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11593 nla_put(msg, BRCM_ATTR_DRIVER_MAC_ADDR, ETH_ALEN, addr)) {
11594 wpa_printf(MSG_ERROR, "failed to put p2p randmac");
11595 nl80211_nlmsg_clear(msg);
11596 nlmsg_free(msg);
11597 return -ENOBUFS;
11598 }
11599 nla_nest_end(msg, params);
11600
11601 ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
11602 if (ret) {
11603 wpa_printf(MSG_ERROR, "nl80211: p2p set macaddr failed: ret=%d (%s)",
11604 ret, strerror(-ret));
11605 }
11606 memcpy(bss->addr, addr, ETH_ALEN);
11607 return ret;
11608 #else
11609 return -ENOTSUP;
11610 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
11611 }
11612 if (!addr)
11613 addr = drv->perm_addr;
11614
11615 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) < 0)
11616 return -1;
11617
11618 if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname, addr) < 0)
11619 {
11620 wpa_printf(MSG_DEBUG,
11621 "nl80211: failed to set_mac_addr for %s to " MACSTR,
11622 bss->ifname, MAC2STR(addr));
11623 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
11624 1) < 0) {
11625 wpa_printf(MSG_DEBUG,
11626 "nl80211: Could not restore interface UP after failed set_mac_addr");
11627 }
11628 return -1;
11629 }
11630
11631 wpa_printf(MSG_DEBUG, "nl80211: set_mac_addr for %s to " MACSTR,
11632 bss->ifname, MAC2STR(addr));
11633 drv->addr_changed = new_addr;
11634 os_memcpy(bss->prev_addr, bss->addr, ETH_ALEN);
11635 os_memcpy(bss->addr, addr, ETH_ALEN);
11636
11637 if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1) < 0)
11638 {
11639 wpa_printf(MSG_DEBUG,
11640 "nl80211: Could not restore interface UP after set_mac_addr");
11641 }
11642 return 0;
11643 }
11644
11645
11646 #ifdef CONFIG_MESH
11647
wpa_driver_nl80211_init_mesh(void * priv)11648 static int wpa_driver_nl80211_init_mesh(void *priv)
11649 {
11650 if (wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_MESH_POINT)) {
11651 wpa_printf(MSG_INFO,
11652 "nl80211: Failed to set interface into mesh mode");
11653 return -1;
11654 }
11655 return 0;
11656 }
11657
11658
nl80211_put_mesh_id(struct nl_msg * msg,const u8 * mesh_id,size_t mesh_id_len)11659 static int nl80211_put_mesh_id(struct nl_msg *msg, const u8 *mesh_id,
11660 size_t mesh_id_len)
11661 {
11662 if (mesh_id) {
11663 wpa_printf(MSG_DEBUG, " * Mesh ID (SSID)=%s",
11664 wpa_ssid_txt(mesh_id, mesh_id_len));
11665 return nla_put(msg, NL80211_ATTR_MESH_ID, mesh_id_len, mesh_id);
11666 }
11667
11668 return 0;
11669 }
11670
11671
nl80211_put_mesh_config(struct nl_msg * msg,struct wpa_driver_mesh_bss_params * params)11672 static int nl80211_put_mesh_config(struct nl_msg *msg,
11673 struct wpa_driver_mesh_bss_params *params)
11674 {
11675 struct nlattr *container;
11676
11677 container = nla_nest_start(msg, NL80211_ATTR_MESH_CONFIG);
11678 if (!container)
11679 return -1;
11680
11681 if (((params->flags & WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS) &&
11682 nla_put_u8(msg, NL80211_MESHCONF_AUTO_OPEN_PLINKS,
11683 params->auto_plinks)) ||
11684 ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_FORWARDING) &&
11685 nla_put_u8(msg, NL80211_MESHCONF_FORWARDING,
11686 params->forwarding)) ||
11687 ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_MAX_PEER_LINKS) &&
11688 nla_put_u16(msg, NL80211_MESHCONF_MAX_PEER_LINKS,
11689 params->max_peer_links)) ||
11690 ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_RSSI_THRESHOLD) &&
11691 nla_put_u32(msg, NL80211_MESHCONF_RSSI_THRESHOLD,
11692 params->rssi_threshold)))
11693 return -1;
11694
11695 /*
11696 * Set NL80211_MESHCONF_PLINK_TIMEOUT even if user mpm is used because
11697 * the timer could disconnect stations even in that case.
11698 */
11699 if ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_PEER_LINK_TIMEOUT) &&
11700 nla_put_u32(msg, NL80211_MESHCONF_PLINK_TIMEOUT,
11701 params->peer_link_timeout)) {
11702 wpa_printf(MSG_ERROR, "nl80211: Failed to set PLINK_TIMEOUT");
11703 return -1;
11704 }
11705
11706 if ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_HT_OP_MODE) &&
11707 nla_put_u16(msg, NL80211_MESHCONF_HT_OPMODE, params->ht_opmode)) {
11708 wpa_printf(MSG_ERROR, "nl80211: Failed to set HT_OP_MODE");
11709 return -1;
11710 }
11711
11712 nla_nest_end(msg, container);
11713
11714 return 0;
11715 }
11716
11717
nl80211_join_mesh(struct i802_bss * bss,struct wpa_driver_mesh_join_params * params)11718 static int nl80211_join_mesh(struct i802_bss *bss,
11719 struct wpa_driver_mesh_join_params *params)
11720 {
11721 struct wpa_driver_nl80211_data *drv = bss->drv;
11722 struct nl_msg *msg;
11723 struct nlattr *container;
11724 int ret = -1;
11725
11726 wpa_printf(MSG_DEBUG, "nl80211: mesh join (ifindex=%d)", drv->ifindex);
11727 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_MESH);
11728 if (!msg ||
11729 nl80211_put_freq_params(msg, ¶ms->freq) ||
11730 nl80211_put_basic_rates(msg, params->basic_rates) ||
11731 nl80211_put_mesh_id(msg, params->meshid, params->meshid_len) ||
11732 nl80211_put_beacon_int(msg, params->beacon_int) ||
11733 nl80211_put_dtim_period(msg, params->dtim_period))
11734 goto fail;
11735
11736 wpa_printf(MSG_DEBUG, " * flags=%08X", params->flags);
11737
11738 if (params->handle_dfs && nla_put_flag(msg, NL80211_ATTR_HANDLE_DFS))
11739 goto fail;
11740
11741 container = nla_nest_start(msg, NL80211_ATTR_MESH_SETUP);
11742 if (!container)
11743 goto fail;
11744
11745 if (params->ies) {
11746 wpa_hexdump(MSG_DEBUG, " * IEs", params->ies, params->ie_len);
11747 if (nla_put(msg, NL80211_MESH_SETUP_IE, params->ie_len,
11748 params->ies))
11749 goto fail;
11750 }
11751 /* WPA_DRIVER_MESH_FLAG_OPEN_AUTH is treated as default by nl80211 */
11752 if (params->flags & WPA_DRIVER_MESH_FLAG_SAE_AUTH) {
11753 if (nla_put_u8(msg, NL80211_MESH_SETUP_AUTH_PROTOCOL, 0x1) ||
11754 nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AUTH))
11755 goto fail;
11756 }
11757 if ((params->flags & WPA_DRIVER_MESH_FLAG_AMPE) &&
11758 nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AMPE))
11759 goto fail;
11760 if ((params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM) &&
11761 nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_MPM))
11762 goto fail;
11763 nla_nest_end(msg, container);
11764
11765 params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS;
11766 params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_PEER_LINK_TIMEOUT;
11767 params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_MAX_PEER_LINKS;
11768 if (nl80211_put_mesh_config(msg, ¶ms->conf) < 0)
11769 goto fail;
11770
11771 ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
11772 msg = NULL;
11773 if (ret) {
11774 wpa_printf(MSG_DEBUG, "nl80211: mesh join failed: ret=%d (%s)",
11775 ret, strerror(-ret));
11776 goto fail;
11777 }
11778 ret = 0;
11779 drv->assoc_freq = bss->flink->freq = params->freq.freq;
11780 wpa_printf(MSG_DEBUG, "nl80211: mesh join request send successfully");
11781
11782 fail:
11783 nlmsg_free(msg);
11784 return ret;
11785 }
11786
11787
11788 static int
wpa_driver_nl80211_join_mesh(void * priv,struct wpa_driver_mesh_join_params * params)11789 wpa_driver_nl80211_join_mesh(void *priv,
11790 struct wpa_driver_mesh_join_params *params)
11791 {
11792 struct i802_bss *bss = priv;
11793 int ret, timeout;
11794
11795 timeout = params->conf.peer_link_timeout;
11796
11797 /* Disable kernel inactivity timer */
11798 if (params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM)
11799 params->conf.peer_link_timeout = 0;
11800
11801 ret = nl80211_join_mesh(bss, params);
11802 if (ret == -EINVAL && params->conf.peer_link_timeout == 0) {
11803 wpa_printf(MSG_DEBUG,
11804 "nl80211: Mesh join retry for peer_link_timeout");
11805 /*
11806 * Old kernel does not support setting
11807 * NL80211_MESHCONF_PLINK_TIMEOUT to zero, so set 60 seconds
11808 * into future from peer_link_timeout.
11809 */
11810 params->conf.peer_link_timeout = timeout + 60;
11811 ret = nl80211_join_mesh(priv, params);
11812 }
11813
11814 params->conf.peer_link_timeout = timeout;
11815 return ret;
11816 }
11817
11818
wpa_driver_nl80211_leave_mesh(void * priv)11819 static int wpa_driver_nl80211_leave_mesh(void *priv)
11820 {
11821 struct i802_bss *bss = priv;
11822 struct wpa_driver_nl80211_data *drv = bss->drv;
11823 struct nl_msg *msg;
11824 int ret;
11825
11826 wpa_printf(MSG_DEBUG, "nl80211: mesh leave (ifindex=%d)", drv->ifindex);
11827 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_MESH);
11828 ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 0);
11829 if (ret) {
11830 wpa_printf(MSG_DEBUG, "nl80211: mesh leave failed: ret=%d (%s)",
11831 ret, strerror(-ret));
11832 } else {
11833 wpa_printf(MSG_DEBUG,
11834 "nl80211: mesh leave request send successfully");
11835 drv->first_bss->flink->freq = 0;
11836 }
11837
11838 if (drv->start_mode_sta &&
11839 wpa_driver_nl80211_set_mode(drv->first_bss,
11840 NL80211_IFTYPE_STATION)) {
11841 wpa_printf(MSG_INFO,
11842 "nl80211: Failed to set interface into station mode");
11843 }
11844 return ret;
11845 }
11846
11847
nl80211_probe_mesh_link(void * priv,const u8 * addr,const u8 * eth,size_t len)11848 static int nl80211_probe_mesh_link(void *priv, const u8 *addr, const u8 *eth,
11849 size_t len)
11850 {
11851 struct i802_bss *bss = priv;
11852 struct wpa_driver_nl80211_data *drv = bss->drv;
11853 struct nl_msg *msg;
11854 int ret;
11855
11856 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_PROBE_MESH_LINK);
11857 if (!msg ||
11858 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
11859 nla_put(msg, NL80211_ATTR_FRAME, len, eth)) {
11860 nlmsg_free(msg);
11861 return -ENOBUFS;
11862 }
11863
11864 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11865 if (ret) {
11866 wpa_printf(MSG_DEBUG, "nl80211: mesh link probe to " MACSTR
11867 " failed: ret=%d (%s)",
11868 MAC2STR(addr), ret, strerror(-ret));
11869 } else {
11870 wpa_printf(MSG_DEBUG, "nl80211: Mesh link to " MACSTR
11871 " probed successfully", MAC2STR(addr));
11872 }
11873
11874 return ret;
11875 }
11876
11877 #endif /* CONFIG_MESH */
11878
11879
wpa_driver_br_add_ip_neigh(void * priv,u8 version,const u8 * ipaddr,int prefixlen,const u8 * addr)11880 static int wpa_driver_br_add_ip_neigh(void *priv, u8 version,
11881 const u8 *ipaddr, int prefixlen,
11882 const u8 *addr)
11883 {
11884 #ifdef CONFIG_LIBNL3_ROUTE
11885 struct i802_bss *bss = priv;
11886 struct wpa_driver_nl80211_data *drv = bss->drv;
11887 struct rtnl_neigh *rn;
11888 struct nl_addr *nl_ipaddr = NULL;
11889 struct nl_addr *nl_lladdr = NULL;
11890 int family, addrsize;
11891 int res;
11892
11893 if (!ipaddr || prefixlen == 0 || !addr)
11894 return -EINVAL;
11895
11896 if (bss->br_ifindex == 0) {
11897 wpa_printf(MSG_DEBUG,
11898 "nl80211: bridge must be set before adding an ip neigh to it");
11899 return -1;
11900 }
11901
11902 if (!drv->rtnl_sk) {
11903 wpa_printf(MSG_DEBUG,
11904 "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
11905 return -1;
11906 }
11907
11908 if (version == 4) {
11909 family = AF_INET;
11910 addrsize = 4;
11911 } else if (version == 6) {
11912 family = AF_INET6;
11913 addrsize = 16;
11914 } else {
11915 return -EINVAL;
11916 }
11917
11918 rn = rtnl_neigh_alloc();
11919 if (rn == NULL)
11920 return -ENOMEM;
11921
11922 /* set the destination ip address for neigh */
11923 nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
11924 if (nl_ipaddr == NULL) {
11925 wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
11926 res = -ENOMEM;
11927 goto errout;
11928 }
11929 nl_addr_set_prefixlen(nl_ipaddr, prefixlen);
11930 res = rtnl_neigh_set_dst(rn, nl_ipaddr);
11931 if (res) {
11932 wpa_printf(MSG_DEBUG,
11933 "nl80211: neigh set destination addr failed");
11934 goto errout;
11935 }
11936
11937 /* set the corresponding lladdr for neigh */
11938 nl_lladdr = nl_addr_build(AF_BRIDGE, (u8 *) addr, ETH_ALEN);
11939 if (nl_lladdr == NULL) {
11940 wpa_printf(MSG_DEBUG, "nl80211: neigh set lladdr failed");
11941 res = -ENOMEM;
11942 goto errout;
11943 }
11944 rtnl_neigh_set_lladdr(rn, nl_lladdr);
11945
11946 rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
11947 rtnl_neigh_set_state(rn, NUD_PERMANENT);
11948
11949 res = rtnl_neigh_add(drv->rtnl_sk, rn, NLM_F_CREATE);
11950 if (res) {
11951 wpa_printf(MSG_DEBUG,
11952 "nl80211: Adding bridge ip neigh failed: %s",
11953 nl_geterror(res));
11954 }
11955 errout:
11956 if (nl_lladdr)
11957 nl_addr_put(nl_lladdr);
11958 if (nl_ipaddr)
11959 nl_addr_put(nl_ipaddr);
11960 if (rn)
11961 rtnl_neigh_put(rn);
11962 return res;
11963 #else /* CONFIG_LIBNL3_ROUTE */
11964 return -1;
11965 #endif /* CONFIG_LIBNL3_ROUTE */
11966 }
11967
11968
wpa_driver_br_delete_ip_neigh(void * priv,u8 version,const u8 * ipaddr)11969 static int wpa_driver_br_delete_ip_neigh(void *priv, u8 version,
11970 const u8 *ipaddr)
11971 {
11972 #ifdef CONFIG_LIBNL3_ROUTE
11973 struct i802_bss *bss = priv;
11974 struct wpa_driver_nl80211_data *drv = bss->drv;
11975 struct rtnl_neigh *rn;
11976 struct nl_addr *nl_ipaddr;
11977 int family, addrsize;
11978 int res;
11979
11980 if (!ipaddr)
11981 return -EINVAL;
11982
11983 if (version == 4) {
11984 family = AF_INET;
11985 addrsize = 4;
11986 } else if (version == 6) {
11987 family = AF_INET6;
11988 addrsize = 16;
11989 } else {
11990 return -EINVAL;
11991 }
11992
11993 if (bss->br_ifindex == 0) {
11994 wpa_printf(MSG_DEBUG,
11995 "nl80211: bridge must be set to delete an ip neigh");
11996 return -1;
11997 }
11998
11999 if (!drv->rtnl_sk) {
12000 wpa_printf(MSG_DEBUG,
12001 "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
12002 return -1;
12003 }
12004
12005 rn = rtnl_neigh_alloc();
12006 if (rn == NULL)
12007 return -ENOMEM;
12008
12009 /* set the destination ip address for neigh */
12010 nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
12011 if (nl_ipaddr == NULL) {
12012 wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
12013 res = -ENOMEM;
12014 goto errout;
12015 }
12016 res = rtnl_neigh_set_dst(rn, nl_ipaddr);
12017 if (res) {
12018 wpa_printf(MSG_DEBUG,
12019 "nl80211: neigh set destination addr failed");
12020 goto errout;
12021 }
12022
12023 rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
12024
12025 res = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
12026 if (res) {
12027 wpa_printf(MSG_DEBUG,
12028 "nl80211: Deleting bridge ip neigh failed: %s",
12029 nl_geterror(res));
12030 }
12031 errout:
12032 if (nl_ipaddr)
12033 nl_addr_put(nl_ipaddr);
12034 if (rn)
12035 rtnl_neigh_put(rn);
12036 return res;
12037 #else /* CONFIG_LIBNL3_ROUTE */
12038 return -1;
12039 #endif /* CONFIG_LIBNL3_ROUTE */
12040 }
12041
12042
linux_write_system_file(const char * path,unsigned int val)12043 static int linux_write_system_file(const char *path, unsigned int val)
12044 {
12045 char buf[50];
12046 int fd, len;
12047
12048 len = os_snprintf(buf, sizeof(buf), "%u\n", val);
12049 if (os_snprintf_error(sizeof(buf), len))
12050 return -1;
12051
12052 fd = open(path, O_WRONLY);
12053 if (fd < 0)
12054 return -1;
12055
12056 if (write(fd, buf, len) < 0) {
12057 wpa_printf(MSG_DEBUG,
12058 "nl80211: Failed to write Linux system file: %s with the value of %d",
12059 path, val);
12060 close(fd);
12061 return -1;
12062 }
12063 close(fd);
12064
12065 return 0;
12066 }
12067
12068
drv_br_port_attr_str(enum drv_br_port_attr attr)12069 static const char * drv_br_port_attr_str(enum drv_br_port_attr attr)
12070 {
12071 switch (attr) {
12072 case DRV_BR_PORT_ATTR_PROXYARP:
12073 return "proxyarp_wifi";
12074 case DRV_BR_PORT_ATTR_HAIRPIN_MODE:
12075 return "hairpin_mode";
12076 case DRV_BR_PORT_ATTR_MCAST2UCAST:
12077 return "multicast_to_unicast";
12078 }
12079
12080 return NULL;
12081 }
12082
12083
wpa_driver_br_port_set_attr(void * priv,enum drv_br_port_attr attr,unsigned int val)12084 static int wpa_driver_br_port_set_attr(void *priv, enum drv_br_port_attr attr,
12085 unsigned int val)
12086 {
12087 struct i802_bss *bss = priv;
12088 char path[128];
12089 const char *attr_txt;
12090
12091 attr_txt = drv_br_port_attr_str(attr);
12092 if (attr_txt == NULL)
12093 return -EINVAL;
12094
12095 os_snprintf(path, sizeof(path), "/sys/class/net/%s/brport/%s",
12096 bss->ifname, attr_txt);
12097
12098 if (linux_write_system_file(path, val))
12099 return -1;
12100
12101 return 0;
12102 }
12103
12104
drv_br_net_param_str(enum drv_br_net_param param)12105 static const char * drv_br_net_param_str(enum drv_br_net_param param)
12106 {
12107 switch (param) {
12108 case DRV_BR_NET_PARAM_GARP_ACCEPT:
12109 return "arp_accept";
12110 default:
12111 return NULL;
12112 }
12113 }
12114
12115
wpa_driver_br_set_net_param(void * priv,enum drv_br_net_param param,unsigned int val)12116 static int wpa_driver_br_set_net_param(void *priv, enum drv_br_net_param param,
12117 unsigned int val)
12118 {
12119 struct i802_bss *bss = priv;
12120 char path[128];
12121 const char *param_txt;
12122 int ip_version = 4;
12123
12124 if (param == DRV_BR_MULTICAST_SNOOPING) {
12125 os_snprintf(path, sizeof(path),
12126 "/sys/devices/virtual/net/%s/bridge/multicast_snooping",
12127 bss->brname);
12128 goto set_val;
12129 }
12130
12131 param_txt = drv_br_net_param_str(param);
12132 if (param_txt == NULL)
12133 return -EINVAL;
12134
12135 switch (param) {
12136 case DRV_BR_NET_PARAM_GARP_ACCEPT:
12137 ip_version = 4;
12138 break;
12139 default:
12140 return -EINVAL;
12141 }
12142
12143 os_snprintf(path, sizeof(path), "/proc/sys/net/ipv%d/conf/%s/%s",
12144 ip_version, bss->brname, param_txt);
12145
12146 set_val:
12147 if (linux_write_system_file(path, val))
12148 return -1;
12149
12150 return 0;
12151 }
12152
12153
12154 #ifdef CONFIG_DRIVER_NL80211_QCA
12155
hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)12156 static int hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)
12157 {
12158 switch (hw_mode) {
12159 case HOSTAPD_MODE_IEEE80211B:
12160 return QCA_ACS_MODE_IEEE80211B;
12161 case HOSTAPD_MODE_IEEE80211G:
12162 return QCA_ACS_MODE_IEEE80211G;
12163 case HOSTAPD_MODE_IEEE80211A:
12164 return QCA_ACS_MODE_IEEE80211A;
12165 case HOSTAPD_MODE_IEEE80211AD:
12166 return QCA_ACS_MODE_IEEE80211AD;
12167 case HOSTAPD_MODE_IEEE80211ANY:
12168 return QCA_ACS_MODE_IEEE80211ANY;
12169 default:
12170 return -1;
12171 }
12172 }
12173
12174
add_acs_ch_list(struct nl_msg * msg,const int * freq_list)12175 static int add_acs_ch_list(struct nl_msg *msg, const int *freq_list)
12176 {
12177 int num_channels = 0, num_freqs;
12178 u8 *ch_list;
12179 enum hostapd_hw_mode hw_mode;
12180 int ret = 0;
12181 int i;
12182
12183 if (!freq_list)
12184 return 0;
12185
12186 num_freqs = int_array_len(freq_list);
12187 ch_list = os_malloc(sizeof(u8) * num_freqs);
12188 if (!ch_list)
12189 return -1;
12190
12191 for (i = 0; i < num_freqs; i++) {
12192 const int freq = freq_list[i];
12193
12194 if (freq == 0)
12195 break;
12196 /* Send 2.4 GHz and 5 GHz channels with
12197 * QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST to maintain backwards
12198 * compatibility.
12199 */
12200 if (!(freq >= 2412 && freq <= 2484) &&
12201 !(freq >= 5180 && freq <= 5900) &&
12202 !(freq >= 5945 && freq <= 7115))
12203 continue;
12204 hw_mode = ieee80211_freq_to_chan(freq, &ch_list[num_channels]);
12205 if (hw_mode != NUM_HOSTAPD_MODES)
12206 num_channels++;
12207 }
12208
12209 if (num_channels)
12210 ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST,
12211 num_channels, ch_list);
12212
12213 os_free(ch_list);
12214 return ret;
12215 }
12216
12217
add_acs_freq_list(struct nl_msg * msg,const int * freq_list)12218 static int add_acs_freq_list(struct nl_msg *msg, const int *freq_list)
12219 {
12220 int i, len, ret;
12221 u32 *freqs;
12222
12223 if (!freq_list)
12224 return 0;
12225 len = int_array_len(freq_list);
12226 freqs = os_malloc(sizeof(u32) * len);
12227 if (!freqs)
12228 return -1;
12229 for (i = 0; i < len; i++)
12230 freqs[i] = freq_list[i];
12231 ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_FREQ_LIST,
12232 sizeof(u32) * len, freqs);
12233 os_free(freqs);
12234 return ret;
12235 }
12236
12237
nl80211_qca_do_acs(struct wpa_driver_nl80211_data * drv,struct drv_acs_params * params)12238 static int nl80211_qca_do_acs(struct wpa_driver_nl80211_data *drv,
12239 struct drv_acs_params *params)
12240 {
12241 struct nl_msg *msg;
12242 struct nlattr *data;
12243 int ret;
12244 int mode;
12245
12246 mode = hw_mode_to_qca_acs(params->hw_mode);
12247 if (mode < 0)
12248 return -1;
12249
12250 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12251 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12252 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12253 QCA_NL80211_VENDOR_SUBCMD_DO_ACS) ||
12254 !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12255 nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_ACS_HW_MODE, mode) ||
12256 (params->ht_enabled &&
12257 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT_ENABLED)) ||
12258 (params->ht40_enabled &&
12259 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT40_ENABLED)) ||
12260 (params->vht_enabled &&
12261 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_VHT_ENABLED)) ||
12262 (params->eht_enabled &&
12263 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_EHT_ENABLED)) ||
12264 nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ACS_CHWIDTH,
12265 params->ch_width) ||
12266 add_acs_ch_list(msg, params->freq_list) ||
12267 add_acs_freq_list(msg, params->freq_list) ||
12268 (params->edmg_enabled &&
12269 nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_EDMG_ENABLED))) {
12270 nlmsg_free(msg);
12271 return -ENOBUFS;
12272 }
12273 nla_nest_end(msg, data);
12274
12275 wpa_printf(MSG_DEBUG,
12276 "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d EHT: %d BW: %d EDMG: %d",
12277 params->hw_mode, params->ht_enabled, params->ht40_enabled,
12278 params->vht_enabled, params->eht_enabled, params->ch_width,
12279 params->edmg_enabled);
12280
12281 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12282 if (ret) {
12283 wpa_printf(MSG_DEBUG,
12284 "nl80211: Failed to invoke driver ACS function: %s",
12285 strerror(-ret));
12286 }
12287 return ret;
12288 }
12289
12290
nl80211_set_band(void * priv,u32 band_mask)12291 static int nl80211_set_band(void *priv, u32 band_mask)
12292 {
12293 struct i802_bss *bss = priv;
12294 struct wpa_driver_nl80211_data *drv = bss->drv;
12295 struct nl_msg *msg;
12296 struct nlattr *data;
12297 int ret;
12298 enum qca_set_band qca_band_value;
12299 u32 qca_band_mask = QCA_SETBAND_AUTO;
12300
12301 if (!drv->setband_vendor_cmd_avail ||
12302 (band_mask > (WPA_SETBAND_2G | WPA_SETBAND_5G | WPA_SETBAND_6G)))
12303 return -1;
12304
12305 if (band_mask & WPA_SETBAND_5G)
12306 qca_band_mask |= QCA_SETBAND_5G;
12307 if (band_mask & WPA_SETBAND_2G)
12308 qca_band_mask |= QCA_SETBAND_2G;
12309 if (band_mask & WPA_SETBAND_6G)
12310 qca_band_mask |= QCA_SETBAND_6G;
12311
12312 /*
12313 * QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE is a legacy interface hence make
12314 * it suite to its values (AUTO/5G/2G) for backwards compatibility.
12315 */
12316 qca_band_value = ((qca_band_mask & QCA_SETBAND_5G) &&
12317 (qca_band_mask & QCA_SETBAND_2G)) ?
12318 QCA_SETBAND_AUTO :
12319 qca_band_mask & ~QCA_SETBAND_6G;
12320
12321 wpa_printf(MSG_DEBUG,
12322 "nl80211: QCA_BAND_MASK = 0x%x, QCA_BAND_VALUE = %d",
12323 qca_band_mask, qca_band_value);
12324
12325 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12326 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12327 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12328 QCA_NL80211_VENDOR_SUBCMD_SETBAND) ||
12329 !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12330 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE,
12331 qca_band_value) ||
12332 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_MASK,
12333 qca_band_mask)) {
12334 nlmsg_free(msg);
12335 return -ENOBUFS;
12336 }
12337 nla_nest_end(msg, data);
12338
12339 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12340 if (ret) {
12341 wpa_printf(MSG_DEBUG,
12342 "nl80211: Driver setband function failed: %s",
12343 strerror(-ret));
12344 }
12345 return ret;
12346 }
12347
12348
12349 struct nl80211_pcl {
12350 unsigned int num;
12351 struct weighted_pcl *freq_list;
12352 };
12353
get_pcl_attr_values(struct weighted_pcl * wpcl,struct nlattr * nl[])12354 static void get_pcl_attr_values(struct weighted_pcl *wpcl, struct nlattr *nl[])
12355 {
12356 if (nl[QCA_WLAN_VENDOR_ATTR_PCL_FREQ])
12357 wpcl->freq = nla_get_u32(nl[QCA_WLAN_VENDOR_ATTR_PCL_FREQ]);
12358 if (nl[QCA_WLAN_VENDOR_ATTR_PCL_WEIGHT])
12359 wpcl->weight = nla_get_u8(nl[QCA_WLAN_VENDOR_ATTR_PCL_WEIGHT]);
12360 if (nl[QCA_WLAN_VENDOR_ATTR_PCL_FLAG]) {
12361 u32 flags = nla_get_u32(nl[QCA_WLAN_VENDOR_ATTR_PCL_FLAG]);
12362
12363 wpcl->flag = 0;
12364 if (flags & BIT(0))
12365 wpcl->flag |= WEIGHTED_PCL_GO;
12366 if (flags & BIT(1))
12367 wpcl->flag |= WEIGHTED_PCL_CLI;
12368 if (flags & BIT(2))
12369 wpcl->flag |= WEIGHTED_PCL_MUST_CONSIDER;
12370 if (flags & BIT(3))
12371 wpcl->flag |= WEIGHTED_PCL_EXCLUDE;
12372 } else {
12373 wpcl->flag = WEIGHTED_PCL_GO | WEIGHTED_PCL_CLI;
12374 }
12375 }
12376
12377
preferred_freq_info_handler(struct nl_msg * msg,void * arg)12378 static int preferred_freq_info_handler(struct nl_msg *msg, void *arg)
12379 {
12380 struct nlattr *tb[NL80211_ATTR_MAX + 1];
12381 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
12382 struct nl80211_pcl *param = arg;
12383 struct nlattr *nl_vend, *attr;
12384 enum qca_iface_type iface_type;
12385 struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
12386 struct nlattr *nl_pcl[QCA_WLAN_VENDOR_ATTR_PCL_MAX + 1];
12387 unsigned int num, max_num;
12388 u32 *freqs;
12389
12390 nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
12391 genlmsg_attrlen(gnlh, 0), NULL);
12392
12393 nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
12394 if (!nl_vend)
12395 return NL_SKIP;
12396
12397 nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
12398 nla_data(nl_vend), nla_len(nl_vend), NULL);
12399
12400 attr = tb_vendor[
12401 QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE];
12402 if (!attr) {
12403 wpa_printf(MSG_ERROR, "nl80211: iface_type couldn't be found");
12404 param->num = 0;
12405 return NL_SKIP;
12406 }
12407
12408 iface_type = (enum qca_iface_type) nla_get_u32(attr);
12409 wpa_printf(MSG_DEBUG, "nl80211: Driver returned iface_type=%d",
12410 iface_type);
12411
12412 attr = tb_vendor[
12413 QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_WEIGHED_PCL];
12414 if (attr) {
12415 int rem;
12416 struct nlattr *wpcl = attr;
12417 unsigned int i;
12418
12419 num = 0;
12420 nla_for_each_nested(attr, wpcl, rem) {
12421 if (num == param->num)
12422 break; /* not enough room for all entries */
12423 if (nla_parse(nl_pcl, QCA_WLAN_VENDOR_ATTR_PCL_MAX,
12424 nla_data(attr), nla_len(attr), NULL)) {
12425 wpa_printf(MSG_ERROR,
12426 "nl80211: Failed to parse PCL info");
12427 param->num = 0;
12428 return NL_SKIP;
12429 }
12430 get_pcl_attr_values(¶m->freq_list[num], nl_pcl);
12431 num++;
12432 }
12433 param->num = num;
12434
12435 /* Sort frequencies based on their weight */
12436 for (i = 0; i < num; i++) {
12437 unsigned int j;
12438
12439 for (j = i + 1; j < num; j++) {
12440 if (param->freq_list[i].weight <
12441 param->freq_list[j].weight) {
12442 struct weighted_pcl tmp;
12443
12444 tmp = param->freq_list[i];
12445 param->freq_list[i] =
12446 param->freq_list[j];
12447 param->freq_list[j] = tmp;
12448 }
12449 }
12450 }
12451 } else if (tb_vendor[QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST]) {
12452 wpa_printf(MSG_DEBUG,
12453 "nl80211: Driver does not provide weighted PCL; use the non-weighted variant");
12454 attr = tb_vendor[QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST];
12455 /*
12456 * param->num has the maximum number of entries for which there
12457 * is room in the freq_list provided by the caller.
12458 */
12459 freqs = nla_data(attr);
12460 max_num = nla_len(attr) / sizeof(u32);
12461 if (max_num > param->num)
12462 max_num = param->num;
12463 for (num = 0; num < max_num; num++) {
12464 param->freq_list[num].freq = freqs[num];
12465 param->freq_list[num].flag =
12466 WEIGHTED_PCL_GO | WEIGHTED_PCL_CLI;
12467 }
12468 param->num = num;
12469 } else {
12470 wpa_printf(MSG_ERROR,
12471 "nl80211: preferred_freq_list couldn't be found");
12472 param->num = 0;
12473 return NL_SKIP;
12474 }
12475 return NL_SKIP;
12476 }
12477
12478
nl80211_get_pref_freq_list(void * priv,enum wpa_driver_if_type if_type,unsigned int * num,struct weighted_pcl * freq_list)12479 static int nl80211_get_pref_freq_list(void *priv,
12480 enum wpa_driver_if_type if_type,
12481 unsigned int *num,
12482 struct weighted_pcl *freq_list)
12483 {
12484 struct i802_bss *bss = priv;
12485 struct wpa_driver_nl80211_data *drv = bss->drv;
12486 struct nl_msg *msg;
12487 int ret;
12488 unsigned int i;
12489 struct nlattr *params;
12490 struct nl80211_pcl param;
12491 enum qca_iface_type iface_type;
12492
12493 if (!drv->get_pref_freq_list)
12494 return -1;
12495
12496 switch (if_type) {
12497 case WPA_IF_STATION:
12498 iface_type = QCA_IFACE_TYPE_STA;
12499 break;
12500 case WPA_IF_AP_BSS:
12501 iface_type = QCA_IFACE_TYPE_AP;
12502 break;
12503 case WPA_IF_P2P_GO:
12504 iface_type = QCA_IFACE_TYPE_P2P_GO;
12505 break;
12506 case WPA_IF_P2P_CLIENT:
12507 iface_type = QCA_IFACE_TYPE_P2P_CLIENT;
12508 break;
12509 case WPA_IF_IBSS:
12510 iface_type = QCA_IFACE_TYPE_IBSS;
12511 break;
12512 case WPA_IF_TDLS:
12513 iface_type = QCA_IFACE_TYPE_TDLS;
12514 break;
12515 default:
12516 return -1;
12517 }
12518
12519 param.num = *num;
12520 param.freq_list = freq_list;
12521
12522 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12523 nla_put_u32(msg, NL80211_ATTR_IFINDEX, drv->ifindex) ||
12524 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12525 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12526 QCA_NL80211_VENDOR_SUBCMD_GET_PREFERRED_FREQ_LIST) ||
12527 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12528 nla_put_u32(msg,
12529 QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE,
12530 iface_type)) {
12531 wpa_printf(MSG_ERROR,
12532 "%s: err in adding vendor_cmd and vendor_data",
12533 __func__);
12534 nlmsg_free(msg);
12535 return -1;
12536 }
12537 nla_nest_end(msg, params);
12538
12539 if (freq_list)
12540 os_memset(freq_list, 0, *num * sizeof(struct weighted_pcl));
12541 ret = send_and_recv_msgs(drv, msg, preferred_freq_info_handler, ¶m,
12542 NULL, NULL);
12543 if (ret) {
12544 wpa_printf(MSG_ERROR,
12545 "%s: err in send_and_recv_msgs", __func__);
12546 return ret;
12547 }
12548
12549 *num = param.num;
12550
12551 for (i = 0; i < *num; i++) {
12552 wpa_printf(MSG_DEBUG,
12553 "nl80211: preferred_channel_list[%d]=%d[%d]:0x%x",
12554 i, freq_list[i].freq, freq_list[i].weight,
12555 freq_list[i].flag);
12556 }
12557
12558 return 0;
12559 }
12560
12561
nl80211_set_prob_oper_freq(void * priv,unsigned int freq)12562 static int nl80211_set_prob_oper_freq(void *priv, unsigned int freq)
12563 {
12564 struct i802_bss *bss = priv;
12565 struct wpa_driver_nl80211_data *drv = bss->drv;
12566 struct nl_msg *msg;
12567 int ret;
12568 struct nlattr *params;
12569
12570 if (!drv->set_prob_oper_freq)
12571 return -1;
12572
12573 wpa_printf(MSG_DEBUG,
12574 "nl80211: Set P2P probable operating freq %u for ifindex %d",
12575 freq, bss->ifindex);
12576
12577 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12578 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12579 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12580 QCA_NL80211_VENDOR_SUBCMD_SET_PROBABLE_OPER_CHANNEL) ||
12581 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12582 nla_put_u32(msg,
12583 QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_IFACE_TYPE,
12584 QCA_IFACE_TYPE_P2P_CLIENT) ||
12585 nla_put_u32(msg,
12586 QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_FREQ,
12587 freq)) {
12588 wpa_printf(MSG_ERROR,
12589 "%s: err in adding vendor_cmd and vendor_data",
12590 __func__);
12591 nlmsg_free(msg);
12592 return -1;
12593 }
12594 nla_nest_end(msg, params);
12595
12596 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12597 msg = NULL;
12598 if (ret) {
12599 wpa_printf(MSG_ERROR, "%s: err in send_and_recv_msgs",
12600 __func__);
12601 return ret;
12602 }
12603 nlmsg_free(msg);
12604 return 0;
12605 }
12606
12607
nl80211_p2p_lo_start(void * priv,unsigned int freq,unsigned int period,unsigned int interval,unsigned int count,const u8 * device_types,size_t dev_types_len,const u8 * ies,size_t ies_len)12608 static int nl80211_p2p_lo_start(void *priv, unsigned int freq,
12609 unsigned int period, unsigned int interval,
12610 unsigned int count, const u8 *device_types,
12611 size_t dev_types_len,
12612 const u8 *ies, size_t ies_len)
12613 {
12614 struct i802_bss *bss = priv;
12615 struct wpa_driver_nl80211_data *drv = bss->drv;
12616 struct nl_msg *msg;
12617 struct nlattr *container;
12618 int ret;
12619
12620 wpa_printf(MSG_DEBUG,
12621 "nl80211: Start P2P Listen offload: freq=%u, period=%u, interval=%u, count=%u",
12622 freq, period, interval, count);
12623
12624 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD))
12625 return -1;
12626
12627 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12628 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12629 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12630 QCA_NL80211_VENDOR_SUBCMD_P2P_LISTEN_OFFLOAD_START))
12631 goto fail;
12632
12633 container = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12634 if (!container)
12635 goto fail;
12636
12637 if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_CHANNEL,
12638 freq) ||
12639 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_PERIOD,
12640 period) ||
12641 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_INTERVAL,
12642 interval) ||
12643 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_COUNT,
12644 count) ||
12645 nla_put(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_DEVICE_TYPES,
12646 dev_types_len, device_types) ||
12647 nla_put(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_VENDOR_IE,
12648 ies_len, ies))
12649 goto fail;
12650
12651 nla_nest_end(msg, container);
12652 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12653 msg = NULL;
12654 if (ret) {
12655 wpa_printf(MSG_DEBUG,
12656 "nl80211: Failed to send P2P Listen offload vendor command");
12657 goto fail;
12658 }
12659
12660 return 0;
12661
12662 fail:
12663 nlmsg_free(msg);
12664 return -1;
12665 }
12666
12667
nl80211_p2p_lo_stop(void * priv)12668 static int nl80211_p2p_lo_stop(void *priv)
12669 {
12670 struct i802_bss *bss = priv;
12671 struct wpa_driver_nl80211_data *drv = bss->drv;
12672 struct nl_msg *msg;
12673
12674 wpa_printf(MSG_DEBUG, "nl80211: Stop P2P Listen offload");
12675
12676 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD))
12677 return -1;
12678
12679 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12680 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12681 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12682 QCA_NL80211_VENDOR_SUBCMD_P2P_LISTEN_OFFLOAD_STOP)) {
12683 nlmsg_free(msg);
12684 return -1;
12685 }
12686
12687 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12688 }
12689
12690
nl80211_set_tdls_mode(void * priv,int tdls_external_control)12691 static int nl80211_set_tdls_mode(void *priv, int tdls_external_control)
12692 {
12693 struct i802_bss *bss = priv;
12694 struct wpa_driver_nl80211_data *drv = bss->drv;
12695 struct nl_msg *msg;
12696 struct nlattr *params;
12697 int ret;
12698 u32 tdls_mode;
12699
12700 wpa_printf(MSG_DEBUG,
12701 "nl80211: Set TDKS mode: tdls_external_control=%d",
12702 tdls_external_control);
12703
12704 if (tdls_external_control == 1)
12705 tdls_mode = QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_IMPLICIT |
12706 QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_EXTERNAL;
12707 else
12708 tdls_mode = QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_EXPLICIT;
12709
12710 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12711 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12712 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12713 QCA_NL80211_VENDOR_SUBCMD_CONFIGURE_TDLS))
12714 goto fail;
12715
12716 params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12717 if (!params)
12718 goto fail;
12719
12720 if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TDLS_CONFIG_TRIGGER_MODE,
12721 tdls_mode))
12722 goto fail;
12723
12724 nla_nest_end(msg, params);
12725
12726 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12727 msg = NULL;
12728 if (ret) {
12729 wpa_printf(MSG_ERROR,
12730 "nl80211: Set TDLS mode failed: ret=%d (%s)",
12731 ret, strerror(-ret));
12732 goto fail;
12733 }
12734 return 0;
12735 fail:
12736 nlmsg_free(msg);
12737 return -1;
12738 }
12739
12740
12741 #ifdef CONFIG_MBO
12742
12743 static enum mbo_transition_reject_reason
nl80211_mbo_reject_reason_mapping(enum qca_wlan_btm_candidate_status status)12744 nl80211_mbo_reject_reason_mapping(enum qca_wlan_btm_candidate_status status)
12745 {
12746 switch (status) {
12747 case QCA_STATUS_REJECT_EXCESSIVE_FRAME_LOSS_EXPECTED:
12748 return MBO_TRANSITION_REJECT_REASON_FRAME_LOSS;
12749 case QCA_STATUS_REJECT_EXCESSIVE_DELAY_EXPECTED:
12750 return MBO_TRANSITION_REJECT_REASON_DELAY;
12751 case QCA_STATUS_REJECT_INSUFFICIENT_QOS_CAPACITY:
12752 return MBO_TRANSITION_REJECT_REASON_QOS_CAPACITY;
12753 case QCA_STATUS_REJECT_LOW_RSSI:
12754 return MBO_TRANSITION_REJECT_REASON_RSSI;
12755 case QCA_STATUS_REJECT_HIGH_INTERFERENCE:
12756 return MBO_TRANSITION_REJECT_REASON_INTERFERENCE;
12757 case QCA_STATUS_REJECT_UNKNOWN:
12758 default:
12759 return MBO_TRANSITION_REJECT_REASON_UNSPECIFIED;
12760 }
12761 }
12762
12763
nl80211_parse_btm_candidate_info(struct candidate_list * candidate,struct nlattr * tb[],int num)12764 static void nl80211_parse_btm_candidate_info(struct candidate_list *candidate,
12765 struct nlattr *tb[], int num)
12766 {
12767 enum qca_wlan_btm_candidate_status status;
12768 char buf[50];
12769
12770 os_memcpy(candidate->bssid,
12771 nla_data(tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID]),
12772 ETH_ALEN);
12773
12774 status = nla_get_u32(
12775 tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS]);
12776 candidate->is_accept = status == QCA_STATUS_ACCEPT;
12777 candidate->reject_reason = nl80211_mbo_reject_reason_mapping(status);
12778
12779 if (candidate->is_accept)
12780 os_snprintf(buf, sizeof(buf), "Accepted");
12781 else
12782 os_snprintf(buf, sizeof(buf),
12783 "Rejected, Reject_reason: %d",
12784 candidate->reject_reason);
12785 wpa_printf(MSG_DEBUG, "nl80211: BSSID[%d]: " MACSTR " %s",
12786 num, MAC2STR(candidate->bssid), buf);
12787 }
12788
12789
12790 static int
nl80211_get_bss_transition_status_handler(struct nl_msg * msg,void * arg)12791 nl80211_get_bss_transition_status_handler(struct nl_msg *msg, void *arg)
12792 {
12793 struct wpa_bss_candidate_info *info = arg;
12794 struct candidate_list *candidate = info->candidates;
12795 struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
12796 struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
12797 struct nlattr *tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX + 1];
12798 static struct nla_policy policy[
12799 QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX + 1] = {
12800 [QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID] = {
12801 .minlen = ETH_ALEN
12802 },
12803 [QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS] = {
12804 .type = NLA_U32,
12805 },
12806 };
12807 struct nlattr *attr;
12808 int rem;
12809 struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
12810 u8 num;
12811
12812 num = info->num; /* number of candidates sent to driver */
12813 info->num = 0;
12814 nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
12815 genlmsg_attrlen(gnlh, 0), NULL);
12816
12817 if (!tb_msg[NL80211_ATTR_VENDOR_DATA] ||
12818 nla_parse_nested(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
12819 tb_msg[NL80211_ATTR_VENDOR_DATA], NULL) ||
12820 !tb_vendor[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO])
12821 return NL_SKIP;
12822
12823 wpa_printf(MSG_DEBUG,
12824 "nl80211: WNM Candidate list received from driver");
12825 nla_for_each_nested(attr,
12826 tb_vendor[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO],
12827 rem) {
12828 if (info->num >= num ||
12829 nla_parse_nested(
12830 tb, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX,
12831 attr, policy) ||
12832 !tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID] ||
12833 !tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS])
12834 break;
12835
12836 nl80211_parse_btm_candidate_info(candidate, tb, info->num);
12837
12838 candidate++;
12839 info->num++;
12840 }
12841
12842 return NL_SKIP;
12843 }
12844
12845
12846 static struct wpa_bss_candidate_info *
nl80211_get_bss_transition_status(void * priv,struct wpa_bss_trans_info * params)12847 nl80211_get_bss_transition_status(void *priv, struct wpa_bss_trans_info *params)
12848 {
12849 struct i802_bss *bss = priv;
12850 struct wpa_driver_nl80211_data *drv = bss->drv;
12851 struct nl_msg *msg;
12852 struct nlattr *attr, *attr1, *attr2;
12853 struct wpa_bss_candidate_info *info;
12854 u8 i;
12855 int ret;
12856 u8 *pos;
12857
12858 if (!drv->fetch_bss_trans_status)
12859 return NULL;
12860
12861 info = os_zalloc(sizeof(*info));
12862 if (!info)
12863 return NULL;
12864 /* Allocate memory for number of candidates sent to driver */
12865 info->candidates = os_calloc(params->n_candidates,
12866 sizeof(*info->candidates));
12867 if (!info->candidates) {
12868 os_free(info);
12869 return NULL;
12870 }
12871
12872 /* Copy the number of candidates being sent to driver. This is used in
12873 * nl80211_get_bss_transition_status_handler() to limit the number of
12874 * candidates that can be populated in info->candidates and will be
12875 * later overwritten with the actual number of candidates received from
12876 * the driver.
12877 */
12878 info->num = params->n_candidates;
12879
12880 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12881 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12882 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12883 QCA_NL80211_VENDOR_SUBCMD_FETCH_BSS_TRANSITION_STATUS))
12884 goto fail;
12885
12886 attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12887 if (!attr)
12888 goto fail;
12889
12890 if (nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_BTM_MBO_TRANSITION_REASON,
12891 params->mbo_transition_reason))
12892 goto fail;
12893
12894 attr1 = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO);
12895 if (!attr1)
12896 goto fail;
12897
12898 wpa_printf(MSG_DEBUG,
12899 "nl80211: WNM Candidate list info sending to driver: mbo_transition_reason: %d n_candidates: %d",
12900 params->mbo_transition_reason, params->n_candidates);
12901 pos = params->bssid;
12902 for (i = 0; i < params->n_candidates; i++) {
12903 wpa_printf(MSG_DEBUG, "nl80211: BSSID[%d]: " MACSTR, i,
12904 MAC2STR(pos));
12905 attr2 = nla_nest_start(msg, i);
12906 if (!attr2 ||
12907 nla_put(msg, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID,
12908 ETH_ALEN, pos))
12909 goto fail;
12910 pos += ETH_ALEN;
12911 nla_nest_end(msg, attr2);
12912 }
12913
12914 nla_nest_end(msg, attr1);
12915 nla_nest_end(msg, attr);
12916
12917 ret = send_and_recv_msgs(drv, msg,
12918 nl80211_get_bss_transition_status_handler,
12919 info, NULL, NULL);
12920 msg = NULL;
12921 if (ret) {
12922 wpa_printf(MSG_ERROR,
12923 "nl80211: WNM Get BSS transition status failed: ret=%d (%s)",
12924 ret, strerror(-ret));
12925 goto fail;
12926 }
12927 return info;
12928
12929 fail:
12930 nlmsg_free(msg);
12931 os_free(info->candidates);
12932 os_free(info);
12933 return NULL;
12934 }
12935
12936
12937 /**
12938 * nl80211_ignore_assoc_disallow - Configure driver to ignore assoc_disallow
12939 * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
12940 * @ignore_assoc_disallow: 0 to not ignore, 1 to ignore
12941 * Returns: 0 on success, -1 on failure
12942 */
nl80211_ignore_assoc_disallow(void * priv,int ignore_disallow)12943 static int nl80211_ignore_assoc_disallow(void *priv, int ignore_disallow)
12944 {
12945 struct i802_bss *bss = priv;
12946 struct wpa_driver_nl80211_data *drv = bss->drv;
12947 struct nl_msg *msg;
12948 struct nlattr *attr;
12949 int ret = -1;
12950
12951 if (!drv->set_wifi_conf_vendor_cmd_avail)
12952 return -1;
12953
12954 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12955 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12956 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12957 QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION))
12958 goto fail;
12959
12960 attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12961 if (!attr)
12962 goto fail;
12963
12964 wpa_printf(MSG_DEBUG, "nl80211: Set ignore_assoc_disallow %d",
12965 ignore_disallow);
12966 if (nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_IGNORE_ASSOC_DISALLOWED,
12967 ignore_disallow))
12968 goto fail;
12969
12970 nla_nest_end(msg, attr);
12971
12972 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12973 msg = NULL;
12974 if (ret) {
12975 wpa_printf(MSG_ERROR,
12976 "nl80211: Set ignore_assoc_disallow failed: ret=%d (%s)",
12977 ret, strerror(-ret));
12978 goto fail;
12979 }
12980
12981 fail:
12982 nlmsg_free(msg);
12983 return ret;
12984 }
12985
12986 #endif /* CONFIG_MBO */
12987
12988
12989 #ifdef CONFIG_PASN
12990
nl80211_send_pasn_resp(void * priv,struct pasn_auth * params)12991 static int nl80211_send_pasn_resp(void *priv, struct pasn_auth *params)
12992 {
12993 unsigned int i;
12994 struct i802_bss *bss = priv;
12995 struct nl_msg *msg = NULL;
12996 struct nlattr *nlpeers, *attr, *attr1;
12997 struct wpa_driver_nl80211_data *drv = bss->drv;
12998
12999 wpa_dbg(drv->ctx, MSG_DEBUG,
13000 "nl80211: PASN authentication response for %d entries",
13001 params->num_peers);
13002 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
13003 if (!msg ||
13004 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
13005 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
13006 QCA_NL80211_VENDOR_SUBCMD_PASN))
13007 goto fail;
13008
13009 attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
13010 if (!attr)
13011 goto fail;
13012
13013 nlpeers = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEERS);
13014 if (!nlpeers)
13015 goto fail;
13016
13017 for (i = 0; i < params->num_peers; i++) {
13018 attr1 = nla_nest_start(msg, i);
13019 if (!attr1 ||
13020 nla_put(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_SRC_ADDR,
13021 ETH_ALEN, params->peer[i].own_addr) ||
13022 nla_put(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_MAC_ADDR,
13023 ETH_ALEN, params->peer[i].peer_addr))
13024 goto fail;
13025
13026 if (params->peer[i].status == 0 &&
13027 nla_put_flag(msg,
13028 QCA_WLAN_VENDOR_ATTR_PASN_PEER_STATUS_SUCCESS))
13029 goto fail;
13030
13031 wpa_printf(MSG_DEBUG,
13032 "nl80211: Own address[%u]: " MACSTR
13033 " Peer address[%u]: " MACSTR " Status: %s",
13034 i, MAC2STR(params->peer[i].own_addr), i,
13035 MAC2STR(params->peer[i].peer_addr),
13036 params->peer[i].status ? "Fail" : "Success");
13037 nla_nest_end(msg, attr1);
13038 }
13039
13040 nla_nest_end(msg, nlpeers);
13041 nla_nest_end(msg, attr);
13042
13043 return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13044
13045 fail:
13046 nlmsg_free(msg);
13047 return -1;
13048 }
13049
13050
wpa_ltf_keyseed_len_to_sha_type(size_t len)13051 static u32 wpa_ltf_keyseed_len_to_sha_type(size_t len)
13052 {
13053 if (len == SHA384_MAC_LEN)
13054 return QCA_WLAN_VENDOR_SHA_384;
13055 if (len == SHA256_MAC_LEN)
13056 return QCA_WLAN_VENDOR_SHA_256;
13057
13058 wpa_printf(MSG_ERROR, "nl80211: Unexpected LTF keyseed len %zu", len);
13059 return (u32) -1;
13060 }
13061
13062
nl80211_set_secure_ranging_ctx(void * priv,struct secure_ranging_params * params)13063 static int nl80211_set_secure_ranging_ctx(void *priv,
13064 struct secure_ranging_params *params)
13065 {
13066 int ret;
13067 u32 suite;
13068 struct nlattr *attr;
13069 struct nl_msg *msg = NULL;
13070 struct i802_bss *bss = priv;
13071 struct wpa_driver_nl80211_data *drv = bss->drv;
13072
13073 /* Configure secure ranging context only to the drivers that support it.
13074 */
13075 if (!drv->secure_ranging_ctx_vendor_cmd_avail)
13076 return 0;
13077
13078 if (!params->peer_addr || !params->own_addr)
13079 return -1;
13080
13081 wpa_dbg(drv->ctx, MSG_DEBUG,
13082 "nl80211: Secure ranging context for " MACSTR,
13083 MAC2STR(params->peer_addr));
13084
13085 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
13086 if (!msg ||
13087 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
13088 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
13089 QCA_NL80211_VENDOR_SUBCMD_SECURE_RANGING_CONTEXT))
13090 goto fail;
13091
13092 attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
13093 if (!attr)
13094 goto fail;
13095
13096 if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_PEER_MAC_ADDR,
13097 ETH_ALEN, params->peer_addr) ||
13098 nla_put(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_SRC_ADDR,
13099 ETH_ALEN, params->own_addr) ||
13100 nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_ACTION,
13101 params->action))
13102 goto fail;
13103
13104 if (params->cipher) {
13105 suite = wpa_cipher_to_cipher_suite(params->cipher);
13106 if (!suite ||
13107 nla_put_u32(msg,
13108 QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_CIPHER,
13109 suite))
13110 goto fail;
13111 }
13112
13113 if (params->tk_len && params->tk) {
13114 if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_TK,
13115 params->tk_len, params->tk))
13116 goto fail;
13117 wpa_hexdump_key(MSG_DEBUG, "nl80211: TK",
13118 params->tk, params->tk_len);
13119 }
13120
13121 if (params->ltf_keyseed_len && params->ltf_keyseed) {
13122 u32 sha_type = wpa_ltf_keyseed_len_to_sha_type(
13123 params->ltf_keyseed_len);
13124
13125 if (sha_type == (u32) -1 ||
13126 nla_put_u32(
13127 msg,
13128 QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_SHA_TYPE,
13129 sha_type) ||
13130 nla_put(msg,
13131 QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_LTF_KEYSEED,
13132 params->ltf_keyseed_len, params->ltf_keyseed))
13133 goto fail;
13134 wpa_hexdump_key(MSG_DEBUG, "nl80211: LTF keyseed",
13135 params->ltf_keyseed, params->ltf_keyseed_len);
13136 }
13137 nla_nest_end(msg, attr);
13138
13139 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13140 if (ret)
13141 wpa_printf(MSG_DEBUG,
13142 "nl80211: Set secure ranging context failed: ret=%d (%s)",
13143 ret, strerror(-ret));
13144 return ret;
13145 fail:
13146 nlmsg_free(msg);
13147 return -1;
13148 }
13149
13150 #endif /* CONFIG_PASN */
13151
13152 #endif /* CONFIG_DRIVER_NL80211_QCA */
13153
nl80211_do_acs(void * priv,struct drv_acs_params * params)13154 static int nl80211_do_acs(void *priv, struct drv_acs_params *params)
13155 {
13156 #if defined(CONFIG_DRIVER_NL80211_QCA) || defined(CONFIG_DRIVER_NL80211_BRCM) \
13157 || defined(CONFIG_DRIVER_NL80211_SYNA)
13158 struct i802_bss *bss = priv;
13159 struct wpa_driver_nl80211_data *drv = bss->drv;
13160 #endif /* CONFIG_DRIVER_NL80211_QCA || CONFIG_DRIVER_NL80211_BRCM \
13161 || defined(CONFIG_DRIVER_NL80211_SYNA) */
13162
13163 #ifdef CONFIG_DRIVER_NL80211_QCA
13164 if (drv->qca_do_acs)
13165 return nl80211_qca_do_acs(drv, params);
13166 #endif /* CONFIG_DRIVER_NL80211_QCA */
13167
13168 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
13169 if (drv->brcm_do_acs)
13170 return wpa_driver_do_broadcom_acs(drv, params);
13171 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
13172
13173 return -1;
13174 }
13175
13176
nl80211_write_to_file(const char * name,unsigned int val)13177 static int nl80211_write_to_file(const char *name, unsigned int val)
13178 {
13179 int fd, len;
13180 char tmp[128];
13181 int ret = 0;
13182
13183 fd = open(name, O_RDWR);
13184 if (fd < 0) {
13185 int level;
13186 /*
13187 * Flags may not exist on older kernels, or while we're tearing
13188 * down a disappearing device.
13189 */
13190 if (errno == ENOENT) {
13191 ret = 0;
13192 level = MSG_DEBUG;
13193 } else {
13194 ret = -1;
13195 level = MSG_ERROR;
13196 }
13197 wpa_printf(level, "nl80211: Failed to open %s: %s",
13198 name, strerror(errno));
13199 return ret;
13200 }
13201
13202 len = os_snprintf(tmp, sizeof(tmp), "%u\n", val);
13203 len = write(fd, tmp, len);
13204 if (len < 0) {
13205 ret = -1;
13206 wpa_printf(MSG_ERROR, "nl80211: Failed to write to %s: %s",
13207 name, strerror(errno));
13208 }
13209 close(fd);
13210
13211 return ret;
13212 }
13213
13214
nl80211_configure_data_frame_filters(void * priv,u32 filter_flags)13215 static int nl80211_configure_data_frame_filters(void *priv, u32 filter_flags)
13216 {
13217 struct i802_bss *bss = priv;
13218 char path[128];
13219 int ret;
13220
13221 /* P2P-Device has no netdev that can (or should) be configured here */
13222 if (nl80211_get_ifmode(bss) == NL80211_IFTYPE_P2P_DEVICE)
13223 return 0;
13224
13225 wpa_printf(MSG_DEBUG, "nl80211: Data frame filter flags=0x%x",
13226 filter_flags);
13227
13228 /* Configure filtering of unicast frame encrypted using GTK */
13229 ret = os_snprintf(path, sizeof(path),
13230 "/proc/sys/net/ipv4/conf/%s/drop_unicast_in_l2_multicast",
13231 bss->ifname);
13232 if (os_snprintf_error(sizeof(path), ret))
13233 return -1;
13234
13235 ret = nl80211_write_to_file(path,
13236 !!(filter_flags &
13237 WPA_DATA_FRAME_FILTER_FLAG_GTK));
13238 if (ret) {
13239 wpa_printf(MSG_ERROR,
13240 "nl80211: Failed to set IPv4 unicast in multicast filter");
13241 return ret;
13242 }
13243
13244 os_snprintf(path, sizeof(path),
13245 "/proc/sys/net/ipv6/conf/%s/drop_unicast_in_l2_multicast",
13246 bss->ifname);
13247 ret = nl80211_write_to_file(path,
13248 !!(filter_flags &
13249 WPA_DATA_FRAME_FILTER_FLAG_GTK));
13250
13251 if (ret) {
13252 wpa_printf(MSG_ERROR,
13253 "nl80211: Failed to set IPv6 unicast in multicast filter");
13254 return ret;
13255 }
13256
13257 /* Configure filtering of unicast frame encrypted using GTK */
13258 os_snprintf(path, sizeof(path),
13259 "/proc/sys/net/ipv4/conf/%s/drop_gratuitous_arp",
13260 bss->ifname);
13261 ret = nl80211_write_to_file(path,
13262 !!(filter_flags &
13263 WPA_DATA_FRAME_FILTER_FLAG_ARP));
13264 if (ret) {
13265 wpa_printf(MSG_ERROR,
13266 "nl80211: Failed set gratuitous ARP filter");
13267 return ret;
13268 }
13269
13270 /* Configure filtering of IPv6 NA frames */
13271 os_snprintf(path, sizeof(path),
13272 "/proc/sys/net/ipv6/conf/%s/drop_unsolicited_na",
13273 bss->ifname);
13274 ret = nl80211_write_to_file(path,
13275 !!(filter_flags &
13276 WPA_DATA_FRAME_FILTER_FLAG_NA));
13277 if (ret) {
13278 wpa_printf(MSG_ERROR,
13279 "nl80211: Failed to set unsolicited NA filter");
13280 return ret;
13281 }
13282
13283 return 0;
13284 }
13285
13286
nl80211_get_ext_capab(void * priv,enum wpa_driver_if_type type,const u8 ** ext_capa,const u8 ** ext_capa_mask,unsigned int * ext_capa_len)13287 static int nl80211_get_ext_capab(void *priv, enum wpa_driver_if_type type,
13288 const u8 **ext_capa, const u8 **ext_capa_mask,
13289 unsigned int *ext_capa_len)
13290 {
13291 struct i802_bss *bss = priv;
13292 struct wpa_driver_nl80211_data *drv = bss->drv;
13293 enum nl80211_iftype nlmode;
13294 unsigned int i;
13295
13296 if (!ext_capa || !ext_capa_mask || !ext_capa_len)
13297 return -1;
13298
13299 nlmode = wpa_driver_nl80211_if_type(type);
13300
13301 /* By default, use the per-radio values */
13302 *ext_capa = drv->extended_capa;
13303 *ext_capa_mask = drv->extended_capa_mask;
13304 *ext_capa_len = drv->extended_capa_len;
13305
13306 /* Replace the default value if a per-interface type value exists */
13307 for (i = 0; i < drv->num_iface_ext_capa; i++) {
13308 if (nlmode == drv->iface_ext_capa[i].iftype) {
13309 *ext_capa = drv->iface_ext_capa[i].ext_capa;
13310 *ext_capa_mask = drv->iface_ext_capa[i].ext_capa_mask;
13311 *ext_capa_len = drv->iface_ext_capa[i].ext_capa_len;
13312 break;
13313 }
13314 }
13315
13316 return 0;
13317 }
13318
13319
nl80211_update_connection_params(void * priv,struct wpa_driver_associate_params * params,enum wpa_drv_update_connect_params_mask mask)13320 static int nl80211_update_connection_params(
13321 void *priv, struct wpa_driver_associate_params *params,
13322 enum wpa_drv_update_connect_params_mask mask)
13323 {
13324 struct i802_bss *bss = priv;
13325 struct wpa_driver_nl80211_data *drv = bss->drv;
13326 struct nl_msg *msg;
13327 int ret = -1;
13328 enum nl80211_auth_type type;
13329
13330 /* Update Connection Params is intended for drivers that implement
13331 * internal SME and expect these updated connection params from
13332 * wpa_supplicant. Do not send this request for the drivers using
13333 * SME from wpa_supplicant.
13334 */
13335 if (drv->capa.flags & WPA_DRIVER_FLAGS_SME)
13336 return 0;
13337
13338 /* Handle any connection param update here which might receive kernel handling in future */
13339 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
13340 if (mask & WPA_DRV_UPDATE_TD_POLICY) {
13341 ret = nl80211_set_td_policy(priv, params->td_policy);
13342 if (ret) {
13343 wpa_dbg(drv->ctx, MSG_DEBUG,
13344 "nl80211: Update connect params command failed: ret=%d (%s)",
13345 ret, strerror(-ret));
13346 }
13347 return ret;
13348 }
13349 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
13350
13351 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_CONNECT_PARAMS);
13352 if (!msg)
13353 goto fail;
13354
13355 wpa_printf(MSG_DEBUG, "nl80211: Update connection params (ifindex=%d)",
13356 drv->ifindex);
13357
13358 if ((mask & WPA_DRV_UPDATE_ASSOC_IES) && params->wpa_ie) {
13359 if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
13360 params->wpa_ie))
13361 goto fail;
13362 wpa_hexdump(MSG_DEBUG, " * IEs", params->wpa_ie,
13363 params->wpa_ie_len);
13364 }
13365
13366 if (mask & WPA_DRV_UPDATE_AUTH_TYPE) {
13367 type = get_nl_auth_type(params->auth_alg);
13368 if (type == NL80211_AUTHTYPE_MAX ||
13369 nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
13370 goto fail;
13371 wpa_printf(MSG_DEBUG, " * Auth Type %d", type);
13372 }
13373
13374 if ((mask & WPA_DRV_UPDATE_FILS_ERP_INFO) &&
13375 nl80211_put_fils_connect_params(drv, params, msg))
13376 goto fail;
13377
13378 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13379 msg = NULL;
13380 if (ret)
13381 wpa_dbg(drv->ctx, MSG_DEBUG,
13382 "nl80211: Update connect params command failed: ret=%d (%s)",
13383 ret, strerror(-ret));
13384
13385 fail:
13386 nlmsg_free(msg);
13387 return ret;
13388 }
13389
13390
nl80211_send_external_auth_status(void * priv,struct external_auth * params)13391 static int nl80211_send_external_auth_status(void *priv,
13392 struct external_auth *params)
13393 {
13394 struct i802_bss *bss = priv;
13395 struct wpa_driver_nl80211_data *drv = bss->drv;
13396 struct nl_msg *msg = NULL;
13397 int ret = -1;
13398
13399 /* External auth command/status is intended for drivers that implement
13400 * internal SME but want to offload authentication processing (e.g.,
13401 * SAE) to hostapd/wpa_supplicant. Do not send the status to drivers
13402 * which do not support AP SME or use wpa_supplicant/hostapd SME.
13403 */
13404 if ((is_ap_interface(drv->nlmode) && !bss->drv->device_ap_sme) ||
13405 (drv->capa.flags & WPA_DRIVER_FLAGS_SME))
13406 return -1;
13407
13408 wpa_dbg(drv->ctx, MSG_DEBUG,
13409 "nl80211: External auth status: %u", params->status);
13410
13411 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_EXTERNAL_AUTH);
13412 if (!msg ||
13413 nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, params->status) ||
13414 (params->ssid && params->ssid_len &&
13415 nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid)) ||
13416 (params->pmkid &&
13417 nla_put(msg, NL80211_ATTR_PMKID, PMKID_LEN, params->pmkid)) ||
13418 (params->bssid &&
13419 nla_put(msg, NL80211_ATTR_BSSID, ETH_ALEN, params->bssid)))
13420 goto fail;
13421 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13422 msg = NULL;
13423 if (ret) {
13424 wpa_printf(MSG_DEBUG,
13425 "nl80211: External Auth status update failed: ret=%d (%s)",
13426 ret, strerror(-ret));
13427 goto fail;
13428 }
13429 fail:
13430 nlmsg_free(msg);
13431 return ret;
13432 }
13433
13434
nl80211_set_4addr_mode(void * priv,const char * bridge_ifname,int val)13435 static int nl80211_set_4addr_mode(void *priv, const char *bridge_ifname,
13436 int val)
13437 {
13438 struct i802_bss *bss = priv;
13439 struct wpa_driver_nl80211_data *drv = bss->drv;
13440 struct nl_msg *msg;
13441 int ret = -ENOBUFS;
13442
13443 wpa_printf(MSG_DEBUG, "nl80211: %s 4addr mode (bridge_ifname: %s)",
13444 val ? "Enable" : "Disable", bridge_ifname);
13445
13446 msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
13447 if (!msg || nla_put_u8(msg, NL80211_ATTR_4ADDR, val))
13448 goto fail;
13449
13450 if (bridge_ifname[0] && bss->added_if_into_bridge && !val) {
13451 if (linux_br_del_if(drv->global->ioctl_sock,
13452 bridge_ifname, bss->ifname)) {
13453 wpa_printf(MSG_ERROR,
13454 "nl80211: Failed to remove interface %s from bridge %s",
13455 bss->ifname, bridge_ifname);
13456 return -1;
13457 }
13458 bss->added_if_into_bridge = 0;
13459 }
13460
13461 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13462 msg = NULL;
13463 if (ret && val && nl80211_get_4addr(bss) == 1) {
13464 wpa_printf(MSG_DEBUG,
13465 "nl80211: 4addr mode was already enabled");
13466 ret = 0;
13467 }
13468 if (!ret) {
13469 if (bridge_ifname[0] && val &&
13470 i802_check_bridge(drv, bss, bridge_ifname, bss->ifname) < 0)
13471 return -1;
13472 return 0;
13473 }
13474
13475 fail:
13476 nlmsg_free(msg);
13477 wpa_printf(MSG_ERROR, "nl80211: Failed to enable/disable 4addr");
13478
13479 return ret;
13480 }
13481
13482
13483 #ifdef CONFIG_DPP
nl80211_dpp_listen(void * priv,bool enable)13484 static int nl80211_dpp_listen(void *priv, bool enable)
13485 {
13486 struct i802_bss *bss = priv;
13487 struct wpa_driver_nl80211_data *drv = bss->drv;
13488 u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
13489 struct nl_sock *handle;
13490
13491 if (!drv->multicast_registrations || !bss->nl_mgmt)
13492 return 0; /* cannot do more than hope broadcast RX works */
13493
13494 wpa_printf(MSG_DEBUG,
13495 "nl80211: Update DPP Public Action frame registration (%s multicast RX)",
13496 enable ? "enable" : "disable");
13497 handle = (void *) (((intptr_t) bss->nl_mgmt) ^ ELOOP_SOCKET_INVALID);
13498 return nl80211_register_frame(bss, handle, type,
13499 (u8 *) "\x04\x09\x50\x6f\x9a\x1a", 6,
13500 enable);
13501 }
13502 #endif /* CONFIG_DPP */
13503
13504 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
nl80211_set_td_policy(void * priv,u32 td_policy)13505 static int nl80211_set_td_policy(void *priv, u32 td_policy)
13506 {
13507 struct i802_bss *bss = priv;
13508 struct wpa_driver_nl80211_data *drv = bss->drv;
13509 struct nl_msg *msg;
13510 int ret;
13511 struct nlattr *params;
13512
13513 if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
13514 nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
13515 nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, BRCM_VENDOR_SCMD_SET_TD_POLICY) ||
13516 !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
13517 (nla_put_u32(msg, BRCM_ATTR_DRIVER_TD_POLICY, td_policy))) {
13518 nl80211_nlmsg_clear(msg);
13519 nlmsg_free(msg);
13520 return -ENOBUFS;
13521 }
13522 nla_nest_end(msg, params);
13523 wpa_printf(MSG_DEBUG, "nl80211: Transition Disable Policy %d\n", td_policy);
13524
13525 ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
13526 if (ret) {
13527 wpa_printf(MSG_DEBUG, "nl80211: Transition Disable setting failed: ret=%d (%s)",
13528 ret, strerror(-ret));
13529 }
13530
13531 return ret;
13532 }
13533 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
13534
nl80211_link_add(void * priv,u8 link_id,const u8 * addr)13535 static int nl80211_link_add(void *priv, u8 link_id, const u8 *addr)
13536 {
13537 struct i802_bss *bss = priv;
13538 struct wpa_driver_nl80211_data *drv = bss->drv;
13539 struct nl_msg *msg;
13540 unsigned int idx, i;
13541 int ret;
13542
13543 wpa_printf(MSG_DEBUG, "nl80211: MLD: add link_id=%u, addr=" MACSTR,
13544 link_id, MAC2STR(addr));
13545
13546 if (drv->nlmode != NL80211_IFTYPE_AP) {
13547 wpa_printf(MSG_DEBUG,
13548 "nl80211: MLD: cannot add link to iftype=%u",
13549 drv->nlmode);
13550 return -EINVAL;
13551 }
13552
13553 if (bss->n_links >= MAX_NUM_MLD_LINKS) {
13554 wpa_printf(MSG_DEBUG, "nl80211: MLD: already have n_links=%zu",
13555 bss->n_links);
13556 return -EINVAL;
13557 }
13558
13559 for (i = 0; i < bss->n_links; i++) {
13560 if (bss->links[i].link_id == link_id &&
13561 bss->links[i].beacon_set) {
13562 wpa_printf(MSG_DEBUG,
13563 "nl80211: MLD: link already set");
13564 return -EINVAL;
13565 }
13566 }
13567
13568 /* try using the first link entry, assuming it is not beaconing yet */
13569 if (bss->n_links == 1 &&
13570 bss->flink->link_id == NL80211_DRV_LINK_ID_NA) {
13571 if (bss->flink->beacon_set) {
13572 wpa_printf(MSG_DEBUG, "nl80211: BSS already beaconing");
13573 return -EINVAL;
13574 }
13575
13576 idx = 0;
13577 } else {
13578 idx = bss->n_links;
13579 }
13580
13581 msg = nl80211_drv_msg(drv, 0, NL80211_CMD_ADD_LINK);
13582 if (!msg ||
13583 nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id) ||
13584 nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
13585 nlmsg_free(msg);
13586 return -ENOBUFS;
13587 }
13588
13589 ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13590 if (ret) {
13591 wpa_printf(MSG_DEBUG, "nl80211: add link failed. ret=%d (%s)",
13592 ret, strerror(-ret));
13593 return ret;
13594 }
13595
13596 bss->links[idx].link_id = link_id;
13597 os_memcpy(bss->links[idx].addr, addr, ETH_ALEN);
13598
13599 bss->n_links = idx + 1;
13600
13601 wpa_printf(MSG_DEBUG, "nl80211: MLD: n_links=%zu", bss->n_links);
13602 return 0;
13603 }
13604
13605
13606 #ifdef CONFIG_TESTING_OPTIONS
13607
testing_nl80211_register_frame(void * priv,u16 type,const u8 * match,size_t match_len,bool multicast)13608 static int testing_nl80211_register_frame(void *priv, u16 type,
13609 const u8 *match, size_t match_len,
13610 bool multicast)
13611 {
13612 struct i802_bss *bss = priv;
13613 struct nl_sock *handle;
13614
13615 if (!bss->nl_mgmt)
13616 return -1;
13617 handle = (void *) (((intptr_t) bss->nl_mgmt) ^ ELOOP_SOCKET_INVALID);
13618 return nl80211_register_frame(bss, handle, type, match, match_len,
13619 multicast);
13620 }
13621
13622
testing_nl80211_radio_disable(void * priv,int disabled)13623 static int testing_nl80211_radio_disable(void *priv, int disabled)
13624 {
13625 struct i802_bss *bss = priv;
13626 struct wpa_driver_nl80211_data *drv = bss->drv;
13627
13628 /* For now, this is supported only partially in station mode with
13629 * SME-in-wpa_supplicant case where the NL80211_ATTR_LOCAL_STATE_CHANGE
13630 * attribute can be used to avoid sending out the Deauthentication frame
13631 * to the currently associated AP. */
13632
13633 if (!disabled)
13634 return 0;
13635
13636 if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME))
13637 return -1;
13638
13639 if (!drv->associated)
13640 return 0;
13641
13642 return wpa_driver_nl80211_mlme(drv, drv->bssid,
13643 NL80211_CMD_DEAUTHENTICATE,
13644 WLAN_REASON_PREV_AUTH_NOT_VALID, 1,
13645 drv->first_bss);
13646 }
13647
13648 #endif /* CONFIG_TESTING_OPTIONS */
13649
13650
13651 const struct wpa_driver_ops wpa_driver_nl80211_ops = {
13652 .name = "nl80211",
13653 .desc = "Linux nl80211/cfg80211",
13654 .get_bssid = wpa_driver_nl80211_get_bssid,
13655 .get_ssid = wpa_driver_nl80211_get_ssid,
13656 .set_key = driver_nl80211_set_key,
13657 .scan2 = driver_nl80211_scan2,
13658 .sched_scan = wpa_driver_nl80211_sched_scan,
13659 .stop_sched_scan = wpa_driver_nl80211_stop_sched_scan,
13660 .get_scan_results2 = wpa_driver_nl80211_get_scan_results,
13661 .abort_scan = wpa_driver_nl80211_abort_scan,
13662 .deauthenticate = driver_nl80211_deauthenticate,
13663 .authenticate = driver_nl80211_authenticate,
13664 .associate = wpa_driver_nl80211_associate,
13665 .global_init = nl80211_global_init,
13666 .global_deinit = nl80211_global_deinit,
13667 .init2 = wpa_driver_nl80211_init,
13668 .deinit = driver_nl80211_deinit,
13669 .get_capa = wpa_driver_nl80211_get_capa,
13670 .set_operstate = wpa_driver_nl80211_set_operstate,
13671 .set_supp_port = wpa_driver_nl80211_set_supp_port,
13672 .set_country = wpa_driver_nl80211_set_country,
13673 .get_country = wpa_driver_nl80211_get_country,
13674 .set_ap = wpa_driver_nl80211_set_ap,
13675 .set_acl = wpa_driver_nl80211_set_acl,
13676 .if_add = wpa_driver_nl80211_if_add,
13677 .if_remove = driver_nl80211_if_remove,
13678 .send_mlme = driver_nl80211_send_mlme,
13679 .get_hw_feature_data = nl80211_get_hw_feature_data,
13680 .sta_add = wpa_driver_nl80211_sta_add,
13681 .sta_remove = driver_nl80211_sta_remove,
13682 .tx_control_port = nl80211_tx_control_port,
13683 .hapd_send_eapol = wpa_driver_nl80211_hapd_send_eapol,
13684 .sta_set_flags = wpa_driver_nl80211_sta_set_flags,
13685 .sta_set_airtime_weight = driver_nl80211_sta_set_airtime_weight,
13686 .hapd_init = i802_init,
13687 .hapd_deinit = i802_deinit,
13688 .set_wds_sta = i802_set_wds_sta,
13689 .get_seqnum = i802_get_seqnum,
13690 .flush = i802_flush,
13691 .get_inact_sec = i802_get_inact_sec,
13692 .sta_clear_stats = i802_sta_clear_stats,
13693 .set_rts = i802_set_rts,
13694 .set_frag = i802_set_frag,
13695 .set_tx_queue_params = i802_set_tx_queue_params,
13696 .set_sta_vlan = driver_nl80211_set_sta_vlan,
13697 .sta_deauth = i802_sta_deauth,
13698 .sta_disassoc = i802_sta_disassoc,
13699 .read_sta_data = driver_nl80211_read_sta_data,
13700 .set_freq = i802_set_freq,
13701 .send_action = driver_nl80211_send_action,
13702 .send_action_cancel_wait = wpa_driver_nl80211_send_action_cancel_wait,
13703 .remain_on_channel = wpa_driver_nl80211_remain_on_channel,
13704 .cancel_remain_on_channel =
13705 wpa_driver_nl80211_cancel_remain_on_channel,
13706 .probe_req_report = driver_nl80211_probe_req_report,
13707 .deinit_ap = wpa_driver_nl80211_deinit_ap,
13708 .deinit_p2p_cli = wpa_driver_nl80211_deinit_p2p_cli,
13709 .resume = wpa_driver_nl80211_resume,
13710 .signal_monitor = nl80211_signal_monitor,
13711 .signal_poll = nl80211_signal_poll,
13712 .mlo_signal_poll = nl80211_mlo_signal_poll,
13713 .channel_info = nl80211_channel_info,
13714 .set_param = nl80211_set_param,
13715 .get_radio_name = nl80211_get_radio_name,
13716 .add_pmkid = nl80211_add_pmkid,
13717 .remove_pmkid = nl80211_remove_pmkid,
13718 .flush_pmkid = nl80211_flush_pmkid,
13719 .set_rekey_info = nl80211_set_rekey_info,
13720 .poll_client = nl80211_poll_client,
13721 .set_p2p_powersave = nl80211_set_p2p_powersave,
13722 .start_dfs_cac = nl80211_start_radar_detection,
13723 .stop_ap = wpa_driver_nl80211_stop_ap,
13724 #ifdef CONFIG_TDLS
13725 .send_tdls_mgmt = nl80211_send_tdls_mgmt,
13726 .tdls_oper = nl80211_tdls_oper,
13727 .tdls_enable_channel_switch = nl80211_tdls_enable_channel_switch,
13728 .tdls_disable_channel_switch = nl80211_tdls_disable_channel_switch,
13729 #endif /* CONFIG_TDLS */
13730 .update_ft_ies = wpa_driver_nl80211_update_ft_ies,
13731 .update_dh_ie = nl80211_update_dh_ie,
13732 .get_mac_addr = wpa_driver_nl80211_get_macaddr,
13733 .get_survey = wpa_driver_nl80211_get_survey,
13734 .status = wpa_driver_nl80211_status,
13735 .switch_channel = nl80211_switch_channel,
13736 #ifdef CONFIG_IEEE80211AX
13737 .switch_color = nl80211_switch_color,
13738 #endif /* CONFIG_IEEE80211AX */
13739 #ifdef ANDROID_P2P
13740 .set_noa = wpa_driver_set_p2p_noa,
13741 .get_noa = wpa_driver_get_p2p_noa,
13742 .set_ap_wps_ie = wpa_driver_set_ap_wps_p2p_ie,
13743 #endif /* ANDROID_P2P */
13744 #ifdef ANDROID
13745 #ifndef ANDROID_LIB_STUB
13746 .driver_cmd = wpa_driver_nl80211_driver_cmd,
13747 #endif /* !ANDROID_LIB_STUB */
13748 #endif /* ANDROID */
13749 .vendor_cmd = nl80211_vendor_cmd,
13750 .set_qos_map = nl80211_set_qos_map,
13751 .get_wowlan = nl80211_get_wowlan,
13752 .set_wowlan = nl80211_set_wowlan,
13753 .set_mac_addr = nl80211_set_mac_addr,
13754 #ifdef CONFIG_MESH
13755 .init_mesh = wpa_driver_nl80211_init_mesh,
13756 .join_mesh = wpa_driver_nl80211_join_mesh,
13757 .leave_mesh = wpa_driver_nl80211_leave_mesh,
13758 .probe_mesh_link = nl80211_probe_mesh_link,
13759 #endif /* CONFIG_MESH */
13760 .br_add_ip_neigh = wpa_driver_br_add_ip_neigh,
13761 .br_delete_ip_neigh = wpa_driver_br_delete_ip_neigh,
13762 .br_port_set_attr = wpa_driver_br_port_set_attr,
13763 .br_set_net_param = wpa_driver_br_set_net_param,
13764 .add_tx_ts = nl80211_add_ts,
13765 .del_tx_ts = nl80211_del_ts,
13766 .get_ifindex = nl80211_get_ifindex,
13767 #ifdef CONFIG_DRIVER_NL80211_QCA
13768 .roaming = nl80211_roaming,
13769 .disable_fils = nl80211_disable_fils,
13770 .set_band = nl80211_set_band,
13771 .get_pref_freq_list = nl80211_get_pref_freq_list,
13772 .set_prob_oper_freq = nl80211_set_prob_oper_freq,
13773 .p2p_lo_start = nl80211_p2p_lo_start,
13774 .p2p_lo_stop = nl80211_p2p_lo_stop,
13775 .set_default_scan_ies = nl80211_set_default_scan_ies,
13776 .set_tdls_mode = nl80211_set_tdls_mode,
13777 #ifdef CONFIG_MBO
13778 .get_bss_transition_status = nl80211_get_bss_transition_status,
13779 .ignore_assoc_disallow = nl80211_ignore_assoc_disallow,
13780 #endif /* CONFIG_MBO */
13781 .set_bssid_tmp_disallow = nl80211_set_bssid_tmp_disallow,
13782 .add_sta_node = nl80211_add_sta_node,
13783 #ifdef CONFIG_PASN
13784 .send_pasn_resp = nl80211_send_pasn_resp,
13785 .set_secure_ranging_ctx = nl80211_set_secure_ranging_ctx,
13786 #endif /* CONFIG_PASN */
13787 #endif /* CONFIG_DRIVER_NL80211_QCA */
13788 .do_acs = nl80211_do_acs,
13789 .configure_data_frame_filters = nl80211_configure_data_frame_filters,
13790 .get_ext_capab = nl80211_get_ext_capab,
13791 .update_connect_params = nl80211_update_connection_params,
13792 .send_external_auth_status = nl80211_send_external_auth_status,
13793 .set_4addr_mode = nl80211_set_4addr_mode,
13794 #ifdef CONFIG_DPP
13795 .dpp_listen = nl80211_dpp_listen,
13796 #endif /* CONFIG_DPP */
13797 .get_sta_mlo_info = nl80211_get_sta_mlo_info,
13798 .link_add = nl80211_link_add,
13799 #ifdef CONFIG_TESTING_OPTIONS
13800 .register_frame = testing_nl80211_register_frame,
13801 .radio_disable = testing_nl80211_radio_disable,
13802 #endif /* CONFIG_TESTING_OPTIONS */
13803 };
13804