1 /*
2  * Driver interaction with Linux nl80211/cfg80211
3  * Copyright (c) 2002-2015, Jouni Malinen <j@w1.fi>
4  * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5  * Copyright (c) 2005-2006, Devicescape Software, Inc.
6  * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
7  * Copyright (c) 2009-2010, Atheros Communications
8  *
9  * This software may be distributed under the terms of the BSD license.
10  * See README for more details.
11  */
12 
13 #include "includes.h"
14 #include <sys/types.h>
15 #include <fcntl.h>
16 #include <net/if.h>
17 #include <netlink/genl/genl.h>
18 #include <netlink/genl/ctrl.h>
19 #ifdef CONFIG_LIBNL3_ROUTE
20 #include <netlink/route/neighbour.h>
21 #endif /* CONFIG_LIBNL3_ROUTE */
22 #include <linux/rtnetlink.h>
23 #include <netpacket/packet.h>
24 #include <linux/errqueue.h>
25 
26 #include "common.h"
27 #include "eloop.h"
28 #include "common/qca-vendor.h"
29 #include "common/qca-vendor-attr.h"
30 #include "common/brcm_vendor.h"
31 #include "common/ieee802_11_defs.h"
32 #include "common/ieee802_11_common.h"
33 #include "common/wpa_common.h"
34 #include "crypto/sha256.h"
35 #include "crypto/sha384.h"
36 #include "netlink.h"
37 #include "linux_defines.h"
38 #include "linux_ioctl.h"
39 #include "radiotap.h"
40 #include "radiotap_iter.h"
41 #include "rfkill.h"
42 #include "driver_nl80211.h"
43 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
44 #include "common/brcm_vendor.h"
45 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
46 
47 #ifndef NETLINK_CAP_ACK
48 #define NETLINK_CAP_ACK 10
49 #endif /* NETLINK_CAP_ACK */
50 /* support for extack if compilation headers are too old */
51 #ifndef NETLINK_EXT_ACK
52 #define NETLINK_EXT_ACK 11
53 enum nlmsgerr_attrs {
54 	NLMSGERR_ATTR_UNUSED,
55 	NLMSGERR_ATTR_MSG,
56 	NLMSGERR_ATTR_OFFS,
57 	NLMSGERR_ATTR_COOKIE,
58 
59 	__NLMSGERR_ATTR_MAX,
60 	NLMSGERR_ATTR_MAX = __NLMSGERR_ATTR_MAX - 1
61 };
62 #endif
63 #ifndef NLM_F_CAPPED
64 #define NLM_F_CAPPED 0x100
65 #endif
66 #ifndef NLM_F_ACK_TLVS
67 #define NLM_F_ACK_TLVS 0x200
68 #endif
69 #ifndef SOL_NETLINK
70 #define SOL_NETLINK 270
71 #endif
72 
73 
74 #ifdef ANDROID
75 /* system/core/libnl_2 does not include nl_socket_set_nonblocking() */
76 #undef nl_socket_set_nonblocking
77 #define nl_socket_set_nonblocking(h) android_nl_socket_set_nonblocking(h)
78 
79 #endif /* ANDROID */
80 
81 
nl_create_handle(struct nl_cb * cb,const char * dbg)82 static struct nl_sock * nl_create_handle(struct nl_cb *cb, const char *dbg)
83 {
84 	struct nl_sock *handle;
85 
86 	handle = nl_socket_alloc_cb(cb);
87 	if (handle == NULL) {
88 		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
89 			   "callbacks (%s)", dbg);
90 		return NULL;
91 	}
92 
93 	if (genl_connect(handle)) {
94 		wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
95 			   "netlink (%s)", dbg);
96 		nl_socket_free(handle);
97 		return NULL;
98 	}
99 
100 	return handle;
101 }
102 
103 
nl_destroy_handles(struct nl_sock ** handle)104 static void nl_destroy_handles(struct nl_sock **handle)
105 {
106 	if (*handle == NULL)
107 		return;
108 	nl_socket_free(*handle);
109 	*handle = NULL;
110 }
111 
112 
113 #if __WORDSIZE == 64
114 #define ELOOP_SOCKET_INVALID	(intptr_t) 0x8888888888888889ULL
115 #else
116 #define ELOOP_SOCKET_INVALID	(intptr_t) 0x88888889ULL
117 #endif
118 
nl80211_register_eloop_read(struct nl_sock ** handle,eloop_sock_handler handler,void * eloop_data,int persist)119 static void nl80211_register_eloop_read(struct nl_sock **handle,
120 					eloop_sock_handler handler,
121 					void *eloop_data, int persist)
122 {
123 	/*
124 	 * libnl uses a pretty small buffer (32 kB that gets converted to 64 kB)
125 	 * by default. It is possible to hit that limit in some cases where
126 	 * operations are blocked, e.g., with a burst of Deauthentication frames
127 	 * to hostapd and STA entry deletion. Try to increase the buffer to make
128 	 * this less likely to occur.
129 	 */
130 	int err;
131 
132 	err = nl_socket_set_buffer_size(*handle, 262144, 0);
133 	if (err < 0) {
134 		wpa_printf(MSG_DEBUG,
135 			   "nl80211: Could not set nl_socket RX buffer size: %s",
136 			   nl_geterror(err));
137 		/* continue anyway with the default (smaller) buffer */
138 	}
139 
140 	nl_socket_set_nonblocking(*handle);
141 	eloop_register_read_sock(nl_socket_get_fd(*handle), handler,
142 				 eloop_data, *handle);
143 	if (!persist)
144 		*handle = (void *) (((intptr_t) *handle) ^
145 				    ELOOP_SOCKET_INVALID);
146 }
147 
148 
nl80211_destroy_eloop_handle(struct nl_sock ** handle,int persist)149 static void nl80211_destroy_eloop_handle(struct nl_sock **handle, int persist)
150 {
151 	if (!persist)
152 		*handle = (void *) (((intptr_t) *handle) ^
153 				    ELOOP_SOCKET_INVALID);
154 	eloop_unregister_read_sock(nl_socket_get_fd(*handle));
155 	nl_destroy_handles(handle);
156 }
157 
158 
159 static void nl80211_global_deinit(void *priv);
160 static void nl80211_check_global(struct nl80211_global *global);
161 
162 static void wpa_driver_nl80211_deinit(struct i802_bss *bss);
163 static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
164 					    struct hostapd_freq_params *freq);
165 
166 static int
167 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
168 				   const u8 *set_addr, int first,
169 				   const char *driver_params);
170 static int nl80211_send_frame_cmd(struct i802_bss *bss,
171 				  unsigned int freq, unsigned int wait,
172 				  const u8 *buf, size_t buf_len,
173 				  int save_cookie,
174 				  int no_cck, int no_ack, int offchanok,
175 				  const u16 *csa_offs, size_t csa_offs_len);
176 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss,
177 					       int report);
178 static int nl80211_put_freq_params(struct nl_msg *msg,
179 				   const struct hostapd_freq_params *freq);
180 
181 #define IFIDX_ANY -1
182 
183 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
184 		      int ifidx_reason);
185 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
186 		      int ifidx_reason);
187 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
188 		      int ifidx_reason);
189 
190 static int nl80211_set_channel(struct i802_bss *bss,
191 			       struct hostapd_freq_params *freq, int set_chan);
192 static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
193 				     int ifindex, int disabled);
194 
195 static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
196 			      int reset_mode);
197 
198 static int i802_set_iface_flags(struct i802_bss *bss, int up);
199 static int nl80211_set_param(void *priv, const char *param);
200 #ifdef CONFIG_MESH
201 static int nl80211_put_mesh_config(struct nl_msg *msg,
202 				   struct wpa_driver_mesh_bss_params *params);
203 #endif /* CONFIG_MESH */
204 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
205 			     u16 reason);
206 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
207 static int nl80211_set_td_policy(void *priv, u32 td_policy);
208 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
209 
210 /* Converts nl80211_chan_width to a common format */
convert2width(int width)211 enum chan_width convert2width(int width)
212 {
213 	switch (width) {
214 	case NL80211_CHAN_WIDTH_20_NOHT:
215 		return CHAN_WIDTH_20_NOHT;
216 	case NL80211_CHAN_WIDTH_20:
217 		return CHAN_WIDTH_20;
218 	case NL80211_CHAN_WIDTH_40:
219 		return CHAN_WIDTH_40;
220 	case NL80211_CHAN_WIDTH_80:
221 		return CHAN_WIDTH_80;
222 	case NL80211_CHAN_WIDTH_80P80:
223 		return CHAN_WIDTH_80P80;
224 	case NL80211_CHAN_WIDTH_160:
225 		return CHAN_WIDTH_160;
226 	case NL80211_CHAN_WIDTH_320:
227 		return CHAN_WIDTH_320;
228 	default:
229 		return CHAN_WIDTH_UNKNOWN;
230 	}
231 }
232 
233 
is_ap_interface(enum nl80211_iftype nlmode)234 int is_ap_interface(enum nl80211_iftype nlmode)
235 {
236 	return nlmode == NL80211_IFTYPE_AP ||
237 		nlmode == NL80211_IFTYPE_P2P_GO;
238 }
239 
240 
is_sta_interface(enum nl80211_iftype nlmode)241 int is_sta_interface(enum nl80211_iftype nlmode)
242 {
243 	return nlmode == NL80211_IFTYPE_STATION ||
244 		nlmode == NL80211_IFTYPE_P2P_CLIENT;
245 }
246 
247 
is_p2p_net_interface(enum nl80211_iftype nlmode)248 static int is_p2p_net_interface(enum nl80211_iftype nlmode)
249 {
250 	return nlmode == NL80211_IFTYPE_P2P_CLIENT ||
251 		nlmode == NL80211_IFTYPE_P2P_GO;
252 }
253 
254 
get_bss_ifindex(struct wpa_driver_nl80211_data * drv,int ifindex)255 struct i802_bss * get_bss_ifindex(struct wpa_driver_nl80211_data *drv,
256 				  int ifindex)
257 {
258 	struct i802_bss *bss;
259 
260 	for (bss = drv->first_bss; bss; bss = bss->next) {
261 		if (bss->ifindex == ifindex)
262 			return bss;
263 	}
264 
265 	return NULL;
266 }
267 
268 
is_mesh_interface(enum nl80211_iftype nlmode)269 static int is_mesh_interface(enum nl80211_iftype nlmode)
270 {
271 	return nlmode == NL80211_IFTYPE_MESH_POINT;
272 }
273 
274 
nl80211_mark_disconnected(struct wpa_driver_nl80211_data * drv)275 void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv)
276 {
277 	if (drv->associated)
278 		os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
279 	drv->associated = 0;
280 	os_memset(&drv->sta_mlo_info, 0, sizeof(drv->sta_mlo_info));
281 	os_memset(drv->bssid, 0, ETH_ALEN);
282 	drv->first_bss->flink->freq = 0;
283 #ifdef CONFIG_DRIVER_NL80211_QCA
284 	os_free(drv->pending_roam_data);
285 	drv->pending_roam_data = NULL;
286 	os_free(drv->pending_t2lm_data);
287 	drv->pending_t2lm_data = NULL;
288 	os_free(drv->pending_link_reconfig_data);
289 	drv->pending_link_reconfig_data = NULL;
290 #endif /* CONFIG_DRIVER_NL80211_QCA */
291 
292 	drv->auth_mld = false;
293 	drv->auth_mld_link_id = -1;
294 	os_memset(drv->auth_ap_mld_addr, 0, ETH_ALEN);
295 }
296 
297 
298 /* nl80211 code */
ack_handler(struct nl_msg * msg,void * arg)299 static int ack_handler(struct nl_msg *msg, void *arg)
300 {
301 	int *err = arg;
302 	*err = 0;
303 	return NL_STOP;
304 }
305 
306 
307 struct nl80211_ack_ext_arg {
308 	int *err;
309 	void *ext_data;
310 };
311 
312 
ack_handler_cookie(struct nl_msg * msg,void * arg)313 static int ack_handler_cookie(struct nl_msg *msg, void *arg)
314 {
315 	struct nl80211_ack_ext_arg *ext_arg = arg;
316 	struct nlattr *tb[NLMSGERR_ATTR_MAX + 1];
317 	u64 *cookie = ext_arg->ext_data;
318 	struct nlattr *attrs;
319 	size_t ack_len, attr_len;
320 
321 	*ext_arg->err = 0;
322 	ack_len = sizeof(struct nlmsghdr) + sizeof(int) +
323 		sizeof(struct nlmsghdr);
324 	attrs = (struct nlattr *)
325 		((u8 *) nlmsg_data(nlmsg_hdr(msg)) + sizeof(struct nlmsghdr) +
326 		 sizeof(int));
327 	if (nlmsg_hdr(msg)->nlmsg_len <= ack_len)
328 		return NL_STOP;
329 
330 	attr_len = nlmsg_hdr(msg)->nlmsg_len - ack_len;
331 
332 	if(!(nlmsg_hdr(msg)->nlmsg_flags & NLM_F_ACK_TLVS))
333 		return NL_STOP;
334 
335 	nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, attr_len, NULL);
336 	if (tb[NLMSGERR_ATTR_COOKIE])
337 		*cookie = nla_get_u64(tb[NLMSGERR_ATTR_COOKIE]);
338 
339 	return NL_STOP;
340 }
341 
342 
finish_handler(struct nl_msg * msg,void * arg)343 static int finish_handler(struct nl_msg *msg, void *arg)
344 {
345 	int *ret = arg;
346 	*ret = 0;
347 	return NL_SKIP;
348 }
349 
error_handler(struct sockaddr_nl * nla,struct nlmsgerr * err,void * arg)350 static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
351 			 void *arg)
352 {
353 	struct nlmsghdr *nlh = (struct nlmsghdr *) err - 1;
354 	int len = nlh->nlmsg_len;
355 	struct nlattr *attrs;
356 	struct nlattr *tb[NLMSGERR_ATTR_MAX + 1];
357 	int *ret = arg;
358 	int ack_len = sizeof(*nlh) + sizeof(int) + sizeof(*nlh);
359 
360 	*ret = err->error;
361 
362 	if (!(nlh->nlmsg_flags & NLM_F_ACK_TLVS))
363 		return NL_SKIP;
364 
365 	if (!(nlh->nlmsg_flags & NLM_F_CAPPED))
366 		ack_len += err->msg.nlmsg_len - sizeof(*nlh);
367 
368 	if (len <= ack_len)
369 		return NL_STOP;
370 
371 	attrs = (void *) ((unsigned char *) nlh + ack_len);
372 	len -= ack_len;
373 
374 	nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, len, NULL);
375 	if (tb[NLMSGERR_ATTR_MSG]) {
376 		len = strnlen((char *) nla_data(tb[NLMSGERR_ATTR_MSG]),
377 			      nla_len(tb[NLMSGERR_ATTR_MSG]));
378 		wpa_printf(MSG_ERROR, "nl80211: kernel reports: %*s",
379 			   len, (char *) nla_data(tb[NLMSGERR_ATTR_MSG]));
380 	}
381 
382 	return NL_SKIP;
383 }
384 
385 
no_seq_check(struct nl_msg * msg,void * arg)386 static int no_seq_check(struct nl_msg *msg, void *arg)
387 {
388 	return NL_OK;
389 }
390 
391 
nl80211_nlmsg_clear(struct nl_msg * msg)392 static void nl80211_nlmsg_clear(struct nl_msg *msg)
393 {
394 	/*
395 	 * Clear nlmsg data, e.g., to make sure key material is not left in
396 	 * heap memory for unnecessarily long time.
397 	 */
398 	if (msg) {
399 		struct nlmsghdr *hdr = nlmsg_hdr(msg);
400 		void *data = nlmsg_data(hdr);
401 		/*
402 		 * This would use nlmsg_datalen() or the older nlmsg_len() if
403 		 * only libnl were to maintain a stable API.. Neither will work
404 		 * with all released versions, so just calculate the length
405 		 * here.
406 		 */
407 		int len = hdr->nlmsg_len - NLMSG_HDRLEN;
408 
409 		os_memset(data, 0, len);
410 	}
411 }
412 
413 
send_and_recv(struct nl80211_global * global,struct nl_sock * nl_handle,struct nl_msg * msg,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)414 static int send_and_recv(struct nl80211_global *global,
415 			 struct nl_sock *nl_handle, struct nl_msg *msg,
416 			 int (*valid_handler)(struct nl_msg *, void *),
417 			 void *valid_data,
418 			 int (*ack_handler_custom)(struct nl_msg *, void *),
419 			 void *ack_data)
420 {
421 	struct nl_cb *cb;
422 	int err = -ENOMEM, opt;
423 
424 	if (!msg)
425 		return -ENOMEM;
426 
427 	cb = nl_cb_clone(global->nl_cb);
428 	if (!cb)
429 		goto out;
430 
431 	/* try to set NETLINK_EXT_ACK to 1, ignoring errors */
432 	opt = 1;
433 	setsockopt(nl_socket_get_fd(nl_handle), SOL_NETLINK,
434 		   NETLINK_EXT_ACK, &opt, sizeof(opt));
435 
436 	/* try to set NETLINK_CAP_ACK to 1, ignoring errors */
437 	opt = 1;
438 	setsockopt(nl_socket_get_fd(nl_handle), SOL_NETLINK,
439 		   NETLINK_CAP_ACK, &opt, sizeof(opt));
440 
441 	err = nl_send_auto_complete(nl_handle, msg);
442 	if (err < 0) {
443 		wpa_printf(MSG_INFO,
444 			   "nl80211: nl_send_auto_complete() failed: %s",
445 			   nl_geterror(err));
446 		/* Need to convert libnl error code to an errno value. For now,
447 		 * just hardcode this to EBADF; the real error reason is shown
448 		 * in that error print above. */
449 		err = -EBADF;
450 		goto out;
451 	}
452 
453 	err = 1;
454 
455 	nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
456 	nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
457 	if (ack_handler_custom) {
458 		struct nl80211_ack_ext_arg *ext_arg = ack_data;
459 
460 		ext_arg->err = &err;
461 		nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM,
462 			  ack_handler_custom, ack_data);
463 	} else {
464 		nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
465 	}
466 
467 	if (valid_handler)
468 		nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
469 			  valid_handler, valid_data);
470 
471 	while (err > 0) {
472 		int res = nl_recvmsgs(nl_handle, cb);
473 
474 		if (res == -NLE_DUMP_INTR) {
475 			/* Most likely one of the nl80211 dump routines hit a
476 			 * case where internal results changed while the dump
477 			 * was being sent. The most common known case for this
478 			 * is scan results fetching while associated were every
479 			 * received Beacon frame from the AP may end up
480 			 * incrementing bss_generation. This
481 			 * NL80211_CMD_GET_SCAN case tries again in the caller;
482 			 * other cases (of which there are no known common ones)
483 			 * will stop and return an error. */
484 			wpa_printf(MSG_DEBUG, "nl80211: %s; convert to -EAGAIN",
485 				   nl_geterror(res));
486 			err = -EAGAIN;
487 		} else if (res < 0) {
488 			wpa_printf(MSG_INFO,
489 				   "nl80211: %s->nl_recvmsgs failed: %d (%s)",
490 				   __func__, res, nl_geterror(res));
491 		}
492 	}
493  out:
494 	nl_cb_put(cb);
495 	/* Always clear the message as it can potentially contain keys */
496 	nl80211_nlmsg_clear(msg);
497 	nlmsg_free(msg);
498 	return err;
499 }
500 
501 
send_and_recv_msgs(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)502 int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
503 		       struct nl_msg *msg,
504 		       int (*valid_handler)(struct nl_msg *, void *),
505 		       void *valid_data,
506 		       int (*ack_handler_custom)(struct nl_msg *, void *),
507 		       void *ack_data)
508 {
509 	return send_and_recv(drv->global, drv->global->nl, msg,
510 			     valid_handler, valid_data,
511 			     ack_handler_custom, ack_data);
512 }
513 
514 
515 /* Use this method to mark that it is necessary to own the connection/interface
516  * for this operation.
517  * handle may be set to NULL, to get the same behavior as send_and_recv_msgs().
518  * set_owner can be used to mark this socket for receiving control port frames.
519  */
send_and_recv_msgs_owner(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,struct nl_sock * handle,int set_owner,int (* valid_handler)(struct nl_msg *,void *),void * valid_data,int (* ack_handler_custom)(struct nl_msg *,void *),void * ack_data)520 static int send_and_recv_msgs_owner(struct wpa_driver_nl80211_data *drv,
521 				    struct nl_msg *msg,
522 				    struct nl_sock *handle, int set_owner,
523 				    int (*valid_handler)(struct nl_msg *,
524 							 void *),
525 				    void *valid_data,
526 				    int (*ack_handler_custom)(struct nl_msg *,
527 							      void *),
528 				    void *ack_data)
529 {
530 	if (!msg)
531 		return -ENOMEM;
532 
533 	/* Control port over nl80211 needs the flags and attributes below.
534 	 *
535 	 * The Linux kernel has initial checks for them (in nl80211.c) like:
536 	 *     validate_pae_over_nl80211(...)
537 	 * or final checks like:
538 	 *     dev->ieee80211_ptr->conn_owner_nlportid != info->snd_portid
539 	 *
540 	 * Final operations (e.g., disassociate) don't need to set these
541 	 * attributes, but they have to be performed on the socket, which has
542 	 * the connection owner property set in the kernel.
543 	 */
544 	if ((drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) &&
545 	    handle && set_owner &&
546 	    (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_OVER_NL80211) ||
547 	     nla_put_flag(msg, NL80211_ATTR_SOCKET_OWNER) ||
548 	     nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
549 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_PREAUTH)))
550 		return -1;
551 
552 	return send_and_recv(drv->global, handle ? handle : drv->global->nl,
553 			     msg, valid_handler, valid_data,
554 			     ack_handler_custom, ack_data);
555 }
556 
557 
558 static int
send_and_recv_msgs_connect_handle(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,struct i802_bss * bss,int set_owner)559 send_and_recv_msgs_connect_handle(struct wpa_driver_nl80211_data *drv,
560 				  struct nl_msg *msg, struct i802_bss *bss,
561 				  int set_owner)
562 {
563 	struct nl_sock *nl_connect = get_connect_handle(bss);
564 
565 	if (nl_connect)
566 		return send_and_recv_msgs_owner(drv, msg, nl_connect, set_owner,
567 						process_bss_event, bss, NULL,
568 						NULL);
569 	else
570 		return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
571 }
572 
573 
get_connect_handle(struct i802_bss * bss)574 struct nl_sock * get_connect_handle(struct i802_bss *bss)
575 {
576 	if ((bss->drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) ||
577 	    bss->use_nl_connect)
578 		return bss->nl_connect;
579 
580 	return NULL;
581 }
582 
583 
584 struct family_data {
585 	const char *group;
586 	int id;
587 };
588 
589 
family_handler(struct nl_msg * msg,void * arg)590 static int family_handler(struct nl_msg *msg, void *arg)
591 {
592 	struct family_data *res = arg;
593 	struct nlattr *tb[CTRL_ATTR_MAX + 1];
594 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
595 	struct nlattr *mcgrp;
596 	int i;
597 
598 	nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
599 		  genlmsg_attrlen(gnlh, 0), NULL);
600 	if (!tb[CTRL_ATTR_MCAST_GROUPS])
601 		return NL_SKIP;
602 
603 	nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
604 		struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
605 		nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
606 			  nla_len(mcgrp), NULL);
607 		if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
608 		    !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
609 		    os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
610 			       res->group,
611 			       nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
612 			continue;
613 		res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
614 		break;
615 	};
616 
617 	return NL_SKIP;
618 }
619 
620 
nl_get_multicast_id(struct nl80211_global * global,const char * family,const char * group)621 static int nl_get_multicast_id(struct nl80211_global *global,
622 			       const char *family, const char *group)
623 {
624 	struct nl_msg *msg;
625 	int ret;
626 	struct family_data res = { group, -ENOENT };
627 
628 	msg = nlmsg_alloc();
629 	if (!msg)
630 		return -ENOMEM;
631 	if (!genlmsg_put(msg, 0, 0, global->nlctrl_id,
632 			 0, 0, CTRL_CMD_GETFAMILY, 0) ||
633 	    nla_put_string(msg, CTRL_ATTR_FAMILY_NAME, family)) {
634 		nlmsg_free(msg);
635 		return -1;
636 	}
637 
638 	ret = send_and_recv(global, global->nl, msg, family_handler, &res,
639 			    NULL, NULL);
640 	if (ret == 0)
641 		ret = res.id;
642 	return ret;
643 }
644 
645 
nl80211_cmd(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int flags,uint8_t cmd)646 void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
647 		   struct nl_msg *msg, int flags, uint8_t cmd)
648 {
649 	if (TEST_FAIL())
650 		return NULL;
651 	return genlmsg_put(msg, 0, 0, drv->global->nl80211_id,
652 			   0, flags, cmd, 0);
653 }
654 
655 
nl80211_set_iface_id(struct nl_msg * msg,struct i802_bss * bss)656 static int nl80211_set_iface_id(struct nl_msg *msg, struct i802_bss *bss)
657 {
658 	if (bss->wdev_id_set)
659 		return nla_put_u64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
660 	return nla_put_u32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
661 }
662 
663 
nl80211_cmd_msg(struct i802_bss * bss,int flags,uint8_t cmd)664 struct nl_msg * nl80211_cmd_msg(struct i802_bss *bss, int flags, uint8_t cmd)
665 {
666 	struct nl_msg *msg;
667 
668 	msg = nlmsg_alloc();
669 	if (!msg)
670 		return NULL;
671 
672 	if (!nl80211_cmd(bss->drv, msg, flags, cmd) ||
673 	    nl80211_set_iface_id(msg, bss) < 0) {
674 		nlmsg_free(msg);
675 		return NULL;
676 	}
677 
678 	return msg;
679 }
680 
681 
682 static struct nl_msg *
nl80211_ifindex_msg_build(struct wpa_driver_nl80211_data * drv,struct nl_msg * msg,int ifindex,int flags,uint8_t cmd)683 nl80211_ifindex_msg_build(struct wpa_driver_nl80211_data *drv,
684 			  struct nl_msg *msg, int ifindex, int flags,
685 			  uint8_t cmd)
686 {
687 	if (!msg)
688 		return NULL;
689 
690 	if (!nl80211_cmd(drv, msg, flags, cmd) ||
691 	    nla_put_u32(msg, NL80211_ATTR_IFINDEX, ifindex)) {
692 		nlmsg_free(msg);
693 		return NULL;
694 	}
695 
696 	return msg;
697 }
698 
699 
700 static struct nl_msg *
nl80211_ifindex_msg(struct wpa_driver_nl80211_data * drv,int ifindex,int flags,uint8_t cmd)701 nl80211_ifindex_msg(struct wpa_driver_nl80211_data *drv, int ifindex,
702 		    int flags, uint8_t cmd)
703 {
704 	return nl80211_ifindex_msg_build(drv, nlmsg_alloc(), ifindex, flags,
705 					 cmd);
706 }
707 
708 
nl80211_drv_msg(struct wpa_driver_nl80211_data * drv,int flags,uint8_t cmd)709 struct nl_msg * nl80211_drv_msg(struct wpa_driver_nl80211_data *drv, int flags,
710 				uint8_t cmd)
711 {
712 	return nl80211_ifindex_msg(drv, drv->ifindex, flags, cmd);
713 }
714 
715 
nl80211_bss_msg(struct i802_bss * bss,int flags,uint8_t cmd)716 struct nl_msg * nl80211_bss_msg(struct i802_bss *bss, int flags, uint8_t cmd)
717 {
718 	return nl80211_ifindex_msg(bss->drv, bss->ifindex, flags, cmd);
719 }
720 
721 
722 struct wiphy_idx_data {
723 	int wiphy_idx;
724 	enum nl80211_iftype nlmode;
725 	u8 *macaddr;
726 	u8 use_4addr;
727 };
728 
729 
netdev_info_handler(struct nl_msg * msg,void * arg)730 static int netdev_info_handler(struct nl_msg *msg, void *arg)
731 {
732 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
733 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
734 	struct wiphy_idx_data *info = arg;
735 
736 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
737 		  genlmsg_attrlen(gnlh, 0), NULL);
738 
739 	if (tb[NL80211_ATTR_WIPHY])
740 		info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
741 
742 	if (tb[NL80211_ATTR_IFTYPE])
743 		info->nlmode = nla_get_u32(tb[NL80211_ATTR_IFTYPE]);
744 
745 	if (tb[NL80211_ATTR_MAC] && info->macaddr)
746 		os_memcpy(info->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
747 			  ETH_ALEN);
748 
749 	if (tb[NL80211_ATTR_4ADDR])
750 		info->use_4addr = nla_get_u8(tb[NL80211_ATTR_4ADDR]);
751 
752 	return NL_SKIP;
753 }
754 
755 
nl80211_get_wiphy_index(struct i802_bss * bss)756 int nl80211_get_wiphy_index(struct i802_bss *bss)
757 {
758 	struct nl_msg *msg;
759 	struct wiphy_idx_data data = {
760 		.wiphy_idx = -1,
761 		.macaddr = NULL,
762 	};
763 
764 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
765 		return -1;
766 
767 	if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
768 			       NULL, NULL) == 0)
769 		return data.wiphy_idx;
770 	return -1;
771 }
772 
773 
nl80211_get_ifmode(struct i802_bss * bss)774 static enum nl80211_iftype nl80211_get_ifmode(struct i802_bss *bss)
775 {
776 	struct nl_msg *msg;
777 	struct wiphy_idx_data data = {
778 		.nlmode = NL80211_IFTYPE_UNSPECIFIED,
779 		.macaddr = NULL,
780 	};
781 
782 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
783 		return NL80211_IFTYPE_UNSPECIFIED;
784 
785 	if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
786 			       NULL, NULL) == 0)
787 		return data.nlmode;
788 	return NL80211_IFTYPE_UNSPECIFIED;
789 }
790 
791 
nl80211_get_macaddr(struct i802_bss * bss)792 static int nl80211_get_macaddr(struct i802_bss *bss)
793 {
794 	struct nl_msg *msg;
795 	struct wiphy_idx_data data = {
796 		.macaddr = bss->addr,
797 	};
798 
799 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)))
800 		return -1;
801 
802 	return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
803 				  NULL, NULL);
804 }
805 
806 
nl80211_get_4addr(struct i802_bss * bss)807 static int nl80211_get_4addr(struct i802_bss *bss)
808 {
809 	struct nl_msg *msg;
810 	struct wiphy_idx_data data = {
811 		.use_4addr = 0,
812 	};
813 
814 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_GET_INTERFACE)) ||
815 	    send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data,
816 			       NULL, NULL))
817 		return -1;
818 	return data.use_4addr;
819 }
820 
821 
nl80211_register_beacons(struct wpa_driver_nl80211_data * drv,struct nl80211_wiphy_data * w)822 static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv,
823 				    struct nl80211_wiphy_data *w)
824 {
825 	struct nl_msg *msg;
826 	int ret;
827 
828 	msg = nlmsg_alloc();
829 	if (!msg)
830 		return -1;
831 
832 	if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS) ||
833 	    nla_put_u32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx)) {
834 		nlmsg_free(msg);
835 		return -1;
836 	}
837 
838 	ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL,
839 			    NULL, NULL);
840 	if (ret) {
841 		wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
842 			   "failed: ret=%d (%s)",
843 			   ret, strerror(-ret));
844 	}
845 	return ret;
846 }
847 
848 
nl80211_recv_beacons(int sock,void * eloop_ctx,void * handle)849 static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle)
850 {
851 	struct nl80211_wiphy_data *w = eloop_ctx;
852 	int res;
853 
854 	wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
855 
856 	res = nl_recvmsgs(handle, w->nl_cb);
857 	if (res < 0) {
858 		wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
859 			   __func__, res);
860 	}
861 }
862 
863 
process_beacon_event(struct nl_msg * msg,void * arg)864 static int process_beacon_event(struct nl_msg *msg, void *arg)
865 {
866 	struct nl80211_wiphy_data *w = arg;
867 	struct wpa_driver_nl80211_data *drv;
868 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
869 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
870 	union wpa_event_data event;
871 
872 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
873 		  genlmsg_attrlen(gnlh, 0), NULL);
874 
875 	if (gnlh->cmd != NL80211_CMD_FRAME) {
876 		wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
877 			   gnlh->cmd);
878 		return NL_SKIP;
879 	}
880 
881 	if (!tb[NL80211_ATTR_FRAME])
882 		return NL_SKIP;
883 
884 	dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data,
885 			 wiphy_list) {
886 		os_memset(&event, 0, sizeof(event));
887 		event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]);
888 		event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]);
889 		wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
890 	}
891 
892 	return NL_SKIP;
893 }
894 
895 
896 static struct nl80211_wiphy_data *
nl80211_get_wiphy_data_ap(struct i802_bss * bss)897 nl80211_get_wiphy_data_ap(struct i802_bss *bss)
898 {
899 	static DEFINE_DL_LIST(nl80211_wiphys);
900 	struct nl80211_wiphy_data *w;
901 	int wiphy_idx, found = 0;
902 	struct i802_bss *tmp_bss;
903 	u8 channel;
904 
905 	if (bss->wiphy_data != NULL)
906 		return bss->wiphy_data;
907 
908 	wiphy_idx = nl80211_get_wiphy_index(bss);
909 
910 	dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) {
911 		if (w->wiphy_idx == wiphy_idx)
912 			goto add;
913 	}
914 
915 	/* alloc new one */
916 	w = os_zalloc(sizeof(*w));
917 	if (w == NULL)
918 		return NULL;
919 	w->wiphy_idx = wiphy_idx;
920 	dl_list_init(&w->bsss);
921 	dl_list_init(&w->drvs);
922 
923 	/* Beacon frames not supported in IEEE 802.11ad */
924 	if (ieee80211_freq_to_chan(bss->flink->freq, &channel) !=
925 	    HOSTAPD_MODE_IEEE80211AD) {
926 		w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
927 		if (!w->nl_cb) {
928 			os_free(w);
929 			return NULL;
930 		}
931 		nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
932 			  no_seq_check, NULL);
933 		nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
934 			  process_beacon_event, w);
935 
936 		w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb,
937 						 "wiphy beacons");
938 		if (w->nl_beacons == NULL) {
939 			os_free(w);
940 			return NULL;
941 		}
942 
943 		if (nl80211_register_beacons(bss->drv, w)) {
944 			nl_destroy_handles(&w->nl_beacons);
945 			os_free(w);
946 			return NULL;
947 		}
948 
949 		nl80211_register_eloop_read(&w->nl_beacons,
950 					    nl80211_recv_beacons, w, 0);
951 	}
952 
953 	dl_list_add(&nl80211_wiphys, &w->list);
954 
955 add:
956 	/* drv entry for this bss already there? */
957 	dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
958 		if (tmp_bss->drv == bss->drv) {
959 			found = 1;
960 			break;
961 		}
962 	}
963 	/* if not add it */
964 	if (!found)
965 		dl_list_add(&w->drvs, &bss->drv->wiphy_list);
966 
967 	dl_list_add(&w->bsss, &bss->wiphy_list);
968 	bss->wiphy_data = w;
969 	return w;
970 }
971 
972 
nl80211_put_wiphy_data_ap(struct i802_bss * bss)973 static void nl80211_put_wiphy_data_ap(struct i802_bss *bss)
974 {
975 	struct nl80211_wiphy_data *w = bss->wiphy_data;
976 	struct i802_bss *tmp_bss;
977 	int found = 0;
978 
979 	if (w == NULL)
980 		return;
981 	bss->wiphy_data = NULL;
982 	dl_list_del(&bss->wiphy_list);
983 
984 	/* still any for this drv present? */
985 	dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
986 		if (tmp_bss->drv == bss->drv) {
987 			found = 1;
988 			break;
989 		}
990 	}
991 	/* if not remove it */
992 	if (!found)
993 		dl_list_del(&bss->drv->wiphy_list);
994 
995 	if (!dl_list_empty(&w->bsss))
996 		return;
997 
998 	if (w->nl_beacons)
999 		nl80211_destroy_eloop_handle(&w->nl_beacons, 0);
1000 
1001 	nl_cb_put(w->nl_cb);
1002 	dl_list_del(&w->list);
1003 	os_free(w);
1004 }
1005 
1006 
nl80211_get_ifindex(void * priv)1007 static unsigned int nl80211_get_ifindex(void *priv)
1008 {
1009 	struct i802_bss *bss = priv;
1010 	struct wpa_driver_nl80211_data *drv = bss->drv;
1011 
1012 	return drv->ifindex;
1013 }
1014 
1015 
wpa_driver_nl80211_get_bssid(void * priv,u8 * bssid)1016 static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
1017 {
1018 	struct i802_bss *bss = priv;
1019 	struct wpa_driver_nl80211_data *drv = bss->drv;
1020 	if (!drv->associated)
1021 		return -1;
1022 	os_memcpy(bssid, drv->bssid, ETH_ALEN);
1023 	return 0;
1024 }
1025 
1026 
wpa_driver_nl80211_get_ssid(void * priv,u8 * ssid)1027 static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
1028 {
1029 	struct i802_bss *bss = priv;
1030 	struct wpa_driver_nl80211_data *drv = bss->drv;
1031 	if (!drv->associated)
1032 		return -1;
1033 	os_memcpy(ssid, drv->ssid, drv->ssid_len);
1034 	return drv->ssid_len;
1035 }
1036 
1037 
get_mlo_info(struct nl_msg * msg,void * arg)1038 static int get_mlo_info(struct nl_msg *msg, void *arg)
1039 {
1040 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
1041 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1042 	struct nlattr *link_attr, *link_data[NL80211_ATTR_MAX + 1];
1043 	static struct nla_policy link_policy[NL80211_ATTR_MAX + 1] = {
1044 		[NL80211_ATTR_MLO_LINK_ID] = { .type = NLA_U8 },
1045 		[NL80211_ATTR_MAC] = { .minlen = ETH_ALEN, .maxlen = ETH_ALEN },
1046 	};
1047 	struct driver_sta_mlo_info *info = arg;
1048 	int rem;
1049 
1050 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1051 		  genlmsg_attrlen(gnlh, 0), NULL);
1052 
1053 	if (!tb[NL80211_ATTR_MLO_LINKS])
1054 		return NL_SKIP;
1055 
1056 	info->valid_links = 0;
1057 	nla_for_each_nested(link_attr, tb[NL80211_ATTR_MLO_LINKS], rem) {
1058 		u8 link_id;
1059 
1060 		if (nla_parse_nested(link_data, NL80211_ATTR_MAX,
1061 				     link_attr, link_policy) != 0)
1062 			continue;
1063 
1064 		if (!link_data[NL80211_ATTR_MLO_LINK_ID] ||
1065 		    !link_data[NL80211_ATTR_MAC])
1066 			continue;
1067 
1068 		link_id = nla_get_u8(link_data[NL80211_ATTR_MLO_LINK_ID]);
1069 		if (link_id >= MAX_NUM_MLD_LINKS)
1070 			continue;
1071 		info->valid_links |= BIT(link_id);
1072 		os_memcpy(info->links[link_id].addr,
1073 			  nla_data(link_data[NL80211_ATTR_MAC]), ETH_ALEN);
1074 		if (link_data[NL80211_ATTR_WIPHY_FREQ])
1075 			info->links[link_id].freq =
1076 				nla_get_u32(link_data[NL80211_ATTR_WIPHY_FREQ]);
1077 	}
1078 
1079 	return NL_SKIP;
1080 }
1081 
1082 
nl80211_get_sta_mlo_info(void * priv,struct driver_sta_mlo_info * mlo_info)1083 static int nl80211_get_sta_mlo_info(void *priv,
1084 				    struct driver_sta_mlo_info *mlo_info)
1085 {
1086 	struct i802_bss *bss = priv;
1087 	struct wpa_driver_nl80211_data *drv = bss->drv;
1088 
1089 	if (!drv->associated)
1090 		return -1;
1091 
1092 	if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
1093 		struct nl_msg *msg;
1094 
1095 		msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
1096 		if (send_and_recv_msgs(drv, msg, get_mlo_info,
1097 				       &drv->sta_mlo_info, NULL, NULL))
1098 			return -1;
1099 	}
1100 
1101 	os_memcpy(mlo_info, &drv->sta_mlo_info, sizeof(*mlo_info));
1102 	return 0;
1103 }
1104 
1105 
wpa_driver_nl80211_event_newlink(struct nl80211_global * global,struct wpa_driver_nl80211_data * drv,int ifindex,const char * ifname)1106 static void wpa_driver_nl80211_event_newlink(
1107 	struct nl80211_global *global, struct wpa_driver_nl80211_data *drv,
1108 	int ifindex, const char *ifname)
1109 {
1110 	union wpa_event_data event;
1111 
1112 	if (drv && os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1113 		if (if_nametoindex(drv->first_bss->ifname) == 0) {
1114 			wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
1115 				   drv->first_bss->ifname);
1116 			return;
1117 		}
1118 		if (!drv->if_removed)
1119 			return;
1120 		wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
1121 			   drv->first_bss->ifname);
1122 		drv->if_removed = 0;
1123 	}
1124 
1125 	os_memset(&event, 0, sizeof(event));
1126 	event.interface_status.ifindex = ifindex;
1127 	os_strlcpy(event.interface_status.ifname, ifname,
1128 		   sizeof(event.interface_status.ifname));
1129 	event.interface_status.ievent = EVENT_INTERFACE_ADDED;
1130 	if (drv)
1131 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1132 	else
1133 		wpa_supplicant_event_global(global->ctx, EVENT_INTERFACE_STATUS,
1134 					    &event);
1135 }
1136 
1137 
wpa_driver_nl80211_event_dellink(struct nl80211_global * global,struct wpa_driver_nl80211_data * drv,int ifindex,const char * ifname)1138 static void wpa_driver_nl80211_event_dellink(
1139 	struct nl80211_global *global, struct wpa_driver_nl80211_data *drv,
1140 	int ifindex, const char *ifname)
1141 {
1142 	union wpa_event_data event;
1143 
1144 	if (drv && os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1145 		if (drv->if_removed) {
1146 			wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
1147 				   ifname);
1148 			return;
1149 		}
1150 		wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
1151 			   ifname);
1152 		drv->if_removed = 1;
1153 	} else {
1154 		wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
1155 			   ifname);
1156 	}
1157 
1158 	os_memset(&event, 0, sizeof(event));
1159 	event.interface_status.ifindex = ifindex;
1160 	os_strlcpy(event.interface_status.ifname, ifname,
1161 		   sizeof(event.interface_status.ifname));
1162 	event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
1163 	if (drv)
1164 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1165 	else
1166 		wpa_supplicant_event_global(global->ctx, EVENT_INTERFACE_STATUS,
1167 					    &event);
1168 }
1169 
1170 
wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data * drv,u8 * buf,size_t len)1171 static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
1172 					 u8 *buf, size_t len)
1173 {
1174 	int attrlen, rta_len;
1175 	struct rtattr *attr;
1176 
1177 	attrlen = len;
1178 	attr = (struct rtattr *) buf;
1179 
1180 	rta_len = RTA_ALIGN(sizeof(struct rtattr));
1181 	while (RTA_OK(attr, attrlen)) {
1182 		if (attr->rta_type == IFLA_IFNAME) {
1183 			if (os_strcmp(((char *) attr) + rta_len,
1184 				      drv->first_bss->ifname) == 0)
1185 				return 1;
1186 			else
1187 				break;
1188 		}
1189 		attr = RTA_NEXT(attr, attrlen);
1190 	}
1191 
1192 	return 0;
1193 }
1194 
1195 
wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data * drv,int ifindex,u8 * buf,size_t len)1196 static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
1197 					  int ifindex, u8 *buf, size_t len)
1198 {
1199 	if (drv->ifindex == ifindex)
1200 		return 1;
1201 
1202 	if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) {
1203 		nl80211_check_global(drv->global);
1204 		wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
1205 			   "interface");
1206 		if (wpa_driver_nl80211_finish_drv_init(drv, NULL, 0, NULL) < 0)
1207 			return -1;
1208 		return 1;
1209 	}
1210 
1211 	return 0;
1212 }
1213 
1214 
1215 static struct wpa_driver_nl80211_data *
nl80211_find_drv(struct nl80211_global * global,int idx,u8 * buf,size_t len,int * init_failed)1216 nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len,
1217 		 int *init_failed)
1218 {
1219 	struct wpa_driver_nl80211_data *drv;
1220 	int res;
1221 
1222 	if (init_failed)
1223 		*init_failed = 0;
1224 	dl_list_for_each(drv, &global->interfaces,
1225 			 struct wpa_driver_nl80211_data, list) {
1226 		res = wpa_driver_nl80211_own_ifindex(drv, idx, buf, len);
1227 		if (res < 0) {
1228 			wpa_printf(MSG_DEBUG,
1229 				   "nl80211: Found matching own interface, but failed to complete reinitialization");
1230 			if (init_failed)
1231 				*init_failed = 1;
1232 			return drv;
1233 		}
1234 		if (res > 0 || have_ifidx(drv, idx, IFIDX_ANY))
1235 			return drv;
1236 	}
1237 	return NULL;
1238 }
1239 
1240 
nl80211_refresh_mac(struct wpa_driver_nl80211_data * drv,int ifindex,int notify)1241 static void nl80211_refresh_mac(struct wpa_driver_nl80211_data *drv,
1242 				int ifindex, int notify)
1243 {
1244 	struct i802_bss *bss;
1245 	u8 addr[ETH_ALEN];
1246 
1247 	bss = get_bss_ifindex(drv, ifindex);
1248 	if (bss &&
1249 	    linux_get_ifhwaddr(drv->global->ioctl_sock,
1250 			       bss->ifname, addr) < 0) {
1251 		wpa_printf(MSG_DEBUG,
1252 			   "nl80211: %s: failed to re-read MAC address",
1253 			   bss->ifname);
1254 	} else if (bss && os_memcmp(addr, bss->addr, ETH_ALEN) != 0) {
1255 		wpa_printf(MSG_DEBUG,
1256 			   "nl80211: Own MAC address on ifindex %d (%s) changed from "
1257 			   MACSTR " to " MACSTR,
1258 			   ifindex, bss->ifname,
1259 			   MAC2STR(bss->addr), MAC2STR(addr));
1260 		os_memcpy(bss->prev_addr, bss->addr, ETH_ALEN);
1261 		os_memcpy(bss->addr, addr, ETH_ALEN);
1262 		if (notify)
1263 			wpa_supplicant_event(drv->ctx,
1264 					     EVENT_INTERFACE_MAC_CHANGED, NULL);
1265 	}
1266 }
1267 
1268 
wpa_driver_nl80211_event_rtm_newlink(void * ctx,struct ifinfomsg * ifi,u8 * buf,size_t len)1269 static void wpa_driver_nl80211_event_rtm_newlink(void *ctx,
1270 						 struct ifinfomsg *ifi,
1271 						 u8 *buf, size_t len)
1272 {
1273 	struct nl80211_global *global = ctx;
1274 	struct wpa_driver_nl80211_data *drv;
1275 	int attrlen;
1276 	struct rtattr *attr;
1277 	u32 brid = 0;
1278 	char namebuf[IFNAMSIZ];
1279 	char ifname[IFNAMSIZ + 1];
1280 	char extra[100], *pos, *end;
1281 	int init_failed;
1282 
1283 	extra[0] = '\0';
1284 	pos = extra;
1285 	end = pos + sizeof(extra);
1286 	ifname[0] = '\0';
1287 
1288 	attrlen = len;
1289 	attr = (struct rtattr *) buf;
1290 	while (RTA_OK(attr, attrlen)) {
1291 		switch (attr->rta_type) {
1292 		case IFLA_IFNAME:
1293 			if (RTA_PAYLOAD(attr) > IFNAMSIZ)
1294 				break;
1295 			os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1296 			ifname[RTA_PAYLOAD(attr)] = '\0';
1297 			break;
1298 		case IFLA_MASTER:
1299 			brid = nla_get_u32((struct nlattr *) attr);
1300 			pos += os_snprintf(pos, end - pos, " master=%u", brid);
1301 			break;
1302 		case IFLA_WIRELESS:
1303 			pos += os_snprintf(pos, end - pos, " wext");
1304 			break;
1305 		case IFLA_OPERSTATE:
1306 			pos += os_snprintf(pos, end - pos, " operstate=%u",
1307 					   nla_get_u32((struct nlattr *) attr));
1308 			break;
1309 		case IFLA_LINKMODE:
1310 			pos += os_snprintf(pos, end - pos, " linkmode=%u",
1311 					   nla_get_u32((struct nlattr *) attr));
1312 			break;
1313 		}
1314 		attr = RTA_NEXT(attr, attrlen);
1315 	}
1316 	extra[sizeof(extra) - 1] = '\0';
1317 
1318 	wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1319 		   ifi->ifi_index, ifname, extra, ifi->ifi_family,
1320 		   ifi->ifi_flags,
1321 		   (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1322 		   (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1323 		   (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1324 		   (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1325 
1326 	drv = nl80211_find_drv(global, ifi->ifi_index, buf, len, &init_failed);
1327 	if (!drv)
1328 		goto event_newlink;
1329 	if (init_failed)
1330 		return; /* do not update interface state */
1331 
1332 	if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) {
1333 		namebuf[0] = '\0';
1334 		if (if_indextoname(ifi->ifi_index, namebuf) &&
1335 		    linux_iface_up(drv->global->ioctl_sock, namebuf) > 0) {
1336 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1337 				   "event since interface %s is up", namebuf);
1338 			drv->ignore_if_down_event = 0;
1339 			/* Re-read MAC address as it may have changed */
1340 			nl80211_refresh_mac(drv, ifi->ifi_index, 1);
1341 			return;
1342 		}
1343 		wpa_printf(MSG_DEBUG, "nl80211: Interface down (%s/%s)",
1344 			   namebuf, ifname);
1345 		if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
1346 			wpa_printf(MSG_DEBUG,
1347 				   "nl80211: Not the main interface (%s) - do not indicate interface down",
1348 				   drv->first_bss->ifname);
1349 		} else if (drv->ignore_if_down_event) {
1350 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1351 				   "event generated by mode change");
1352 			drv->ignore_if_down_event = 0;
1353 		} else {
1354 			drv->if_disabled = 1;
1355 			wpa_supplicant_event(drv->ctx,
1356 					     EVENT_INTERFACE_DISABLED, NULL);
1357 
1358 			/*
1359 			 * Try to get drv again, since it may be removed as
1360 			 * part of the EVENT_INTERFACE_DISABLED handling for
1361 			 * dynamic interfaces
1362 			 */
1363 			drv = nl80211_find_drv(global, ifi->ifi_index,
1364 					       buf, len, NULL);
1365 			if (!drv)
1366 				return;
1367 		}
1368 	}
1369 
1370 	if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) {
1371 		namebuf[0] = '\0';
1372 		if (if_indextoname(ifi->ifi_index, namebuf) &&
1373 		    linux_iface_up(drv->global->ioctl_sock, namebuf) == 0) {
1374 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1375 				   "event since interface %s is down",
1376 				   namebuf);
1377 			return;
1378 		}
1379 		wpa_printf(MSG_DEBUG, "nl80211: Interface up (%s/%s)",
1380 			   namebuf, ifname);
1381 		if (os_strcmp(drv->first_bss->ifname, ifname) != 0) {
1382 			wpa_printf(MSG_DEBUG,
1383 				   "nl80211: Not the main interface (%s) - do not indicate interface up",
1384 				   drv->first_bss->ifname);
1385 		} else if (if_nametoindex(drv->first_bss->ifname) == 0) {
1386 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1387 				   "event since interface %s does not exist",
1388 				   drv->first_bss->ifname);
1389 		} else if (drv->if_removed) {
1390 			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1391 				   "event since interface %s is marked "
1392 				   "removed", drv->first_bss->ifname);
1393 		} else {
1394 			/* Re-read MAC address as it may have changed */
1395 			nl80211_refresh_mac(drv, ifi->ifi_index, 0);
1396 
1397 			drv->if_disabled = 0;
1398 			wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED,
1399 					     NULL);
1400 		}
1401 	} else if (ifi->ifi_flags & IFF_UP) {
1402 		/* Re-read MAC address as it may have changed */
1403 		nl80211_refresh_mac(drv, ifi->ifi_index, 1);
1404 	}
1405 
1406 	/*
1407 	 * Some drivers send the association event before the operup event--in
1408 	 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
1409 	 * fails. This will hit us when wpa_supplicant does not need to do
1410 	 * IEEE 802.1X authentication
1411 	 */
1412 	if (drv->operstate == 1 &&
1413 	    (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
1414 	    !(ifi->ifi_flags & IFF_RUNNING)) {
1415 		wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
1416 		netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
1417 				       -1, IF_OPER_UP);
1418 	}
1419 
1420 event_newlink:
1421 	if (ifname[0])
1422 		wpa_driver_nl80211_event_newlink(global, drv, ifi->ifi_index,
1423 						 ifname);
1424 
1425 	if (ifi->ifi_family == AF_BRIDGE && brid && drv) {
1426 		struct i802_bss *bss;
1427 
1428 		/* device has been added to bridge */
1429 		if (!if_indextoname(brid, namebuf)) {
1430 			wpa_printf(MSG_DEBUG,
1431 				   "nl80211: Could not find bridge ifname for ifindex %u",
1432 				   brid);
1433 			return;
1434 		}
1435 		wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
1436 			   brid, namebuf);
1437 		add_ifidx(drv, brid, ifi->ifi_index);
1438 
1439 		for (bss = drv->first_bss; bss; bss = bss->next) {
1440 			if (os_strcmp(ifname, bss->ifname) == 0) {
1441 				os_strlcpy(bss->brname, namebuf, IFNAMSIZ);
1442 				break;
1443 			}
1444 		}
1445 	}
1446 }
1447 
1448 
wpa_driver_nl80211_event_rtm_dellink(void * ctx,struct ifinfomsg * ifi,u8 * buf,size_t len)1449 static void wpa_driver_nl80211_event_rtm_dellink(void *ctx,
1450 						 struct ifinfomsg *ifi,
1451 						 u8 *buf, size_t len)
1452 {
1453 	struct nl80211_global *global = ctx;
1454 	struct wpa_driver_nl80211_data *drv;
1455 	int attrlen;
1456 	struct rtattr *attr;
1457 	u32 brid = 0;
1458 	char ifname[IFNAMSIZ + 1];
1459 	char extra[100], *pos, *end;
1460 
1461 	extra[0] = '\0';
1462 	pos = extra;
1463 	end = pos + sizeof(extra);
1464 	ifname[0] = '\0';
1465 
1466 	attrlen = len;
1467 	attr = (struct rtattr *) buf;
1468 	while (RTA_OK(attr, attrlen)) {
1469 		switch (attr->rta_type) {
1470 		case IFLA_IFNAME:
1471 			if (RTA_PAYLOAD(attr) > IFNAMSIZ)
1472 				break;
1473 			os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1474 			ifname[RTA_PAYLOAD(attr)] = '\0';
1475 			break;
1476 		case IFLA_MASTER:
1477 			brid = nla_get_u32((struct nlattr *) attr);
1478 			pos += os_snprintf(pos, end - pos, " master=%u", brid);
1479 			break;
1480 		case IFLA_OPERSTATE:
1481 			pos += os_snprintf(pos, end - pos, " operstate=%u",
1482 					   nla_get_u32((struct nlattr *) attr));
1483 			break;
1484 		case IFLA_LINKMODE:
1485 			pos += os_snprintf(pos, end - pos, " linkmode=%u",
1486 					   nla_get_u32((struct nlattr *) attr));
1487 			break;
1488 		}
1489 		attr = RTA_NEXT(attr, attrlen);
1490 	}
1491 	extra[sizeof(extra) - 1] = '\0';
1492 
1493 	wpa_printf(MSG_DEBUG, "RTM_DELLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)",
1494 		   ifi->ifi_index, ifname, extra, ifi->ifi_family,
1495 		   ifi->ifi_flags,
1496 		   (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1497 		   (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1498 		   (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1499 		   (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1500 
1501 	drv = nl80211_find_drv(global, ifi->ifi_index, buf, len, NULL);
1502 
1503 	if (ifi->ifi_family == AF_BRIDGE && brid && drv) {
1504 		/* device has been removed from bridge */
1505 		char namebuf[IFNAMSIZ];
1506 
1507 		if (!if_indextoname(brid, namebuf)) {
1508 			wpa_printf(MSG_DEBUG,
1509 				   "nl80211: Could not find bridge ifname for ifindex %u",
1510 				   brid);
1511 		} else {
1512 			wpa_printf(MSG_DEBUG,
1513 				   "nl80211: Remove ifindex %u for bridge %s",
1514 				   brid, namebuf);
1515 		}
1516 		del_ifidx(drv, brid, ifi->ifi_index);
1517 	}
1518 
1519 	if (ifi->ifi_family != AF_BRIDGE || !brid)
1520 		wpa_driver_nl80211_event_dellink(global, drv, ifi->ifi_index,
1521 						 ifname);
1522 }
1523 
1524 
1525 struct nl80211_get_assoc_freq_arg {
1526 	struct wpa_driver_nl80211_data *drv;
1527 	unsigned int assoc_freq;
1528 	unsigned int ibss_freq;
1529 	u8 assoc_bssid[ETH_ALEN];
1530 	u8 assoc_ssid[SSID_MAX_LEN];
1531 	u8 assoc_ssid_len;
1532 	u8 bssid[MAX_NUM_MLD_LINKS][ETH_ALEN];
1533 	unsigned int freq[MAX_NUM_MLD_LINKS];
1534 };
1535 
nl80211_get_assoc_freq_handler(struct nl_msg * msg,void * arg)1536 static int nl80211_get_assoc_freq_handler(struct nl_msg *msg, void *arg)
1537 {
1538 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
1539 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1540 	struct nlattr *bss[NL80211_BSS_MAX + 1];
1541 	static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
1542 		[NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
1543 		[NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
1544 		[NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
1545 		[NL80211_BSS_STATUS] = { .type = NLA_U32 },
1546 		[NL80211_BSS_MLO_LINK_ID] = { .type = NLA_U8 },
1547 	};
1548 	struct nl80211_get_assoc_freq_arg *ctx = arg;
1549 	enum nl80211_bss_status status;
1550 	struct wpa_driver_nl80211_data *drv = ctx->drv;
1551 
1552 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1553 		  genlmsg_attrlen(gnlh, 0), NULL);
1554 	if (!tb[NL80211_ATTR_BSS] ||
1555 	    nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
1556 			     bss_policy) ||
1557 	    !bss[NL80211_BSS_STATUS])
1558 		return NL_SKIP;
1559 
1560 	status = nla_get_u32(bss[NL80211_BSS_STATUS]);
1561 	if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1562 	    bss[NL80211_BSS_FREQUENCY]) {
1563 		int link_id = -1;
1564 		u32 freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1565 
1566 		if (bss[NL80211_BSS_MLO_LINK_ID])
1567 			link_id = nla_get_u8(bss[NL80211_BSS_MLO_LINK_ID]);
1568 
1569 		if (link_id >= 0 && link_id < MAX_NUM_MLD_LINKS) {
1570 			ctx->freq[link_id] = freq;
1571 			wpa_printf(MSG_DEBUG,
1572 				   "nl80211: MLO link %d associated on %u MHz",
1573 				   link_id, ctx->freq[link_id]);
1574 		}
1575 
1576 		if (!drv->sta_mlo_info.valid_links ||
1577 		    drv->sta_mlo_info.assoc_link_id == link_id) {
1578 			ctx->assoc_freq = freq;
1579 			wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
1580 				   ctx->assoc_freq);
1581 		}
1582 	}
1583 	if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
1584 	    bss[NL80211_BSS_FREQUENCY]) {
1585 		ctx->ibss_freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
1586 		wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
1587 			   ctx->ibss_freq);
1588 	}
1589 	if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1590 	    bss[NL80211_BSS_BSSID]) {
1591 		int link_id = -1;
1592 		const u8 *bssid = nla_data(bss[NL80211_BSS_BSSID]);
1593 
1594 		if (bss[NL80211_BSS_MLO_LINK_ID])
1595 			link_id = nla_get_u8(bss[NL80211_BSS_MLO_LINK_ID]);
1596 
1597 		if (link_id >= 0 && link_id < MAX_NUM_MLD_LINKS) {
1598 			os_memcpy(ctx->bssid[link_id], bssid, ETH_ALEN);
1599 			wpa_printf(MSG_DEBUG,
1600 				   "nl80211: MLO link %d associated with "
1601 				   MACSTR, link_id, MAC2STR(bssid));
1602 		}
1603 
1604 		if (!drv->sta_mlo_info.valid_links ||
1605 		    drv->sta_mlo_info.assoc_link_id == link_id) {
1606 			os_memcpy(ctx->assoc_bssid, bssid, ETH_ALEN);
1607 			wpa_printf(MSG_DEBUG, "nl80211: Associated with "
1608 				   MACSTR, MAC2STR(bssid));
1609 		}
1610 
1611 	}
1612 
1613 	if (status == NL80211_BSS_STATUS_ASSOCIATED &&
1614 	    bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
1615 		const u8 *ie, *ssid;
1616 		size_t ie_len;
1617 
1618 		ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1619 		ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
1620 		ssid = get_ie(ie, ie_len, WLAN_EID_SSID);
1621 		if (ssid && ssid[1] > 0 && ssid[1] <= SSID_MAX_LEN) {
1622 			ctx->assoc_ssid_len = ssid[1];
1623 			os_memcpy(ctx->assoc_ssid, ssid + 2, ssid[1]);
1624 		}
1625 	}
1626 
1627 	return NL_SKIP;
1628 }
1629 
1630 
nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data * drv,u8 * ssid)1631 int nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data *drv, u8 *ssid)
1632 {
1633 	struct nl_msg *msg;
1634 	int ret;
1635 	struct nl80211_get_assoc_freq_arg arg;
1636 	int count = 0;
1637 
1638 try_again:
1639 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1640 	os_memset(&arg, 0, sizeof(arg));
1641 	arg.drv = drv;
1642 	ret = send_and_recv_msgs(drv, msg, nl80211_get_assoc_freq_handler,
1643 				 &arg, NULL, NULL);
1644 	if (ret == -EAGAIN) {
1645 		count++;
1646 		if (count >= 10) {
1647 			wpa_printf(MSG_INFO,
1648 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_ssid");
1649 		} else {
1650 			wpa_printf(MSG_DEBUG,
1651 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_ssid - try again");
1652 			goto try_again;
1653 		}
1654 	}
1655 	if (ret == 0) {
1656 		os_memcpy(ssid, arg.assoc_ssid, arg.assoc_ssid_len);
1657 		return arg.assoc_ssid_len;
1658 	}
1659 	wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d (%s)",
1660 		   ret, strerror(-ret));
1661 	return ret;
1662 }
1663 
1664 
nl80211_get_assoc_freq(struct wpa_driver_nl80211_data * drv)1665 unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv)
1666 {
1667 	struct nl_msg *msg;
1668 	int ret;
1669 	struct nl80211_get_assoc_freq_arg arg;
1670 	int count = 0;
1671 
1672 try_again:
1673 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1674 	os_memset(&arg, 0, sizeof(arg));
1675 	arg.drv = drv;
1676 	ret = send_and_recv_msgs(drv, msg, nl80211_get_assoc_freq_handler,
1677 				 &arg, NULL, NULL);
1678 	if (ret == -EAGAIN) {
1679 		count++;
1680 		if (count >= 10) {
1681 			wpa_printf(MSG_INFO,
1682 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_freq");
1683 		} else {
1684 			wpa_printf(MSG_DEBUG,
1685 				   "nl80211: Failed to receive consistent scan result dump for get_assoc_freq - try again");
1686 			goto try_again;
1687 		}
1688 	}
1689 	if (ret == 0) {
1690 		unsigned int freq = drv->nlmode == NL80211_IFTYPE_ADHOC ?
1691 			arg.ibss_freq : arg.assoc_freq;
1692 		wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
1693 			   "associated BSS from scan results: %u MHz", freq);
1694 		if (freq)
1695 			drv->assoc_freq = freq;
1696 
1697 		if (drv->sta_mlo_info.valid_links) {
1698 			int i;
1699 
1700 			for (i = 0; i < MAX_NUM_MLD_LINKS; i++)
1701 				drv->sta_mlo_info.links[i].freq = arg.freq[i];
1702 		}
1703 
1704 		return drv->assoc_freq;
1705 	}
1706 	wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1707 		   "(%s)", ret, strerror(-ret));
1708 	return drv->assoc_freq;
1709 }
1710 
get_link_noise(struct nl_msg * msg,void * arg)1711 static int get_link_noise(struct nl_msg *msg, void *arg)
1712 {
1713 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
1714 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1715 	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
1716 	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
1717 		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
1718 		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
1719 	};
1720 	struct wpa_signal_info *sig_change = arg;
1721 
1722 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1723 		  genlmsg_attrlen(gnlh, 0), NULL);
1724 
1725 	if (!tb[NL80211_ATTR_SURVEY_INFO]) {
1726 		wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
1727 		return NL_SKIP;
1728 	}
1729 
1730 	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
1731 			     tb[NL80211_ATTR_SURVEY_INFO],
1732 			     survey_policy)) {
1733 		wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
1734 			   "attributes!");
1735 		return NL_SKIP;
1736 	}
1737 
1738 	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
1739 		return NL_SKIP;
1740 
1741 	if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
1742 	    sig_change->frequency)
1743 		return NL_SKIP;
1744 
1745 	if (!sinfo[NL80211_SURVEY_INFO_NOISE])
1746 		return NL_SKIP;
1747 
1748 	sig_change->current_noise =
1749 		(s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
1750 
1751 	return NL_SKIP;
1752 }
1753 
1754 
nl80211_get_link_noise(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig_change)1755 int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
1756 			   struct wpa_signal_info *sig_change)
1757 {
1758 	struct nl_msg *msg;
1759 
1760 	sig_change->current_noise = WPA_INVALID_NOISE;
1761 	sig_change->frequency = drv->assoc_freq;
1762 
1763 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
1764 	return send_and_recv_msgs(drv, msg, get_link_noise, sig_change,
1765 				  NULL, NULL);
1766 }
1767 
1768 
get_channel_info(struct nl_msg * msg,void * arg)1769 static int get_channel_info(struct nl_msg *msg, void *arg)
1770 {
1771 	struct nlattr *tb[NL80211_ATTR_MAX + 1] = { 0 };
1772 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1773 	struct wpa_channel_info *chan_info = arg;
1774 
1775 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1776 		  genlmsg_attrlen(gnlh, 0), NULL);
1777 
1778 	os_memset(chan_info, 0, sizeof(struct wpa_channel_info));
1779 	chan_info->chanwidth = CHAN_WIDTH_UNKNOWN;
1780 
1781 	if (tb[NL80211_ATTR_WIPHY_FREQ])
1782 		chan_info->frequency =
1783 			nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
1784 	if (tb[NL80211_ATTR_CHANNEL_WIDTH])
1785 		chan_info->chanwidth = convert2width(
1786 			nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
1787 	if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) {
1788 		enum nl80211_channel_type ct =
1789 			nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]);
1790 
1791 		switch (ct) {
1792 		case NL80211_CHAN_HT40MINUS:
1793 			chan_info->sec_channel = -1;
1794 			break;
1795 		case NL80211_CHAN_HT40PLUS:
1796 			chan_info->sec_channel = 1;
1797 			break;
1798 		default:
1799 			chan_info->sec_channel = 0;
1800 			break;
1801 		}
1802 	}
1803 	if (tb[NL80211_ATTR_CENTER_FREQ1])
1804 		chan_info->center_frq1 =
1805 			nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
1806 	if (tb[NL80211_ATTR_CENTER_FREQ2])
1807 		chan_info->center_frq2 =
1808 			nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
1809 
1810 	if (chan_info->center_frq2) {
1811 		u8 seg1_idx = 0;
1812 
1813 		if (ieee80211_freq_to_chan(chan_info->center_frq2, &seg1_idx) !=
1814 		    NUM_HOSTAPD_MODES)
1815 			chan_info->seg1_idx = seg1_idx;
1816 	}
1817 
1818 	return NL_SKIP;
1819 }
1820 
1821 
nl80211_channel_info(void * priv,struct wpa_channel_info * ci)1822 static int nl80211_channel_info(void *priv, struct wpa_channel_info *ci)
1823 {
1824 	struct i802_bss *bss = priv;
1825 	struct wpa_driver_nl80211_data *drv = bss->drv;
1826 	struct nl_msg *msg;
1827 
1828 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
1829 	return send_and_recv_msgs(drv, msg, get_channel_info, ci, NULL, NULL);
1830 }
1831 
1832 
wpa_driver_nl80211_event_receive(int sock,void * eloop_ctx,void * handle)1833 static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
1834 					     void *handle)
1835 {
1836 	struct nl_cb *cb = eloop_ctx;
1837 	int res;
1838 
1839 	wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
1840 
1841 	res = nl_recvmsgs(handle, cb);
1842 	if (res < 0) {
1843 		wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
1844 			   __func__, res);
1845 	}
1846 }
1847 
1848 
1849 /**
1850  * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
1851  * @priv: driver_nl80211 private data
1852  * @alpha2_arg: country to which to switch to
1853  * Returns: 0 on success, -1 on failure
1854  *
1855  * This asks nl80211 to set the regulatory domain for given
1856  * country ISO / IEC alpha2.
1857  */
wpa_driver_nl80211_set_country(void * priv,const char * alpha2_arg)1858 static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
1859 {
1860 	struct i802_bss *bss = priv;
1861 	struct wpa_driver_nl80211_data *drv = bss->drv;
1862 	char alpha2[3];
1863 	struct nl_msg *msg;
1864 
1865 	msg = nlmsg_alloc();
1866 	if (!msg)
1867 		return -ENOMEM;
1868 
1869 	alpha2[0] = alpha2_arg[0];
1870 	alpha2[1] = alpha2_arg[1];
1871 	alpha2[2] = '\0';
1872 
1873 	if (!nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG) ||
1874 	    nla_put_string(msg, NL80211_ATTR_REG_ALPHA2, alpha2)) {
1875 		nlmsg_free(msg);
1876 		return -EINVAL;
1877 	}
1878 	if (send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL))
1879 		return -EINVAL;
1880 	return 0;
1881 }
1882 
1883 
nl80211_get_country(struct nl_msg * msg,void * arg)1884 static int nl80211_get_country(struct nl_msg *msg, void *arg)
1885 {
1886 	char *alpha2 = arg;
1887 	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
1888 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
1889 
1890 	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
1891 		  genlmsg_attrlen(gnlh, 0), NULL);
1892 	if (!tb_msg[NL80211_ATTR_REG_ALPHA2]) {
1893 		wpa_printf(MSG_DEBUG, "nl80211: No country information available");
1894 		return NL_SKIP;
1895 	}
1896 	os_strlcpy(alpha2, nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]), 3);
1897 	return NL_SKIP;
1898 }
1899 
1900 
wpa_driver_nl80211_get_country(void * priv,char * alpha2)1901 static int wpa_driver_nl80211_get_country(void *priv, char *alpha2)
1902 {
1903 	struct i802_bss *bss = priv;
1904 	struct wpa_driver_nl80211_data *drv = bss->drv;
1905 	struct nl_msg *msg;
1906 	int ret;
1907 
1908 	msg = nlmsg_alloc();
1909 	if (!msg)
1910 		return -ENOMEM;
1911 
1912 	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
1913 
1914 	if (drv->capa.flags & WPA_DRIVER_FLAGS_SELF_MANAGED_REGULATORY) {
1915 		/* put wiphy idx to get the interface specific country code
1916 		 * instead of the global one. */
1917 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY, drv->wiphy_idx)) {
1918 			nlmsg_free(msg);
1919 			return -1;
1920 		}
1921 	}
1922 
1923 	alpha2[0] = '\0';
1924 	ret = send_and_recv_msgs(drv, msg, nl80211_get_country, alpha2,
1925 				 NULL, NULL);
1926 	if (!alpha2[0])
1927 		ret = -1;
1928 
1929 	return ret;
1930 }
1931 
1932 
wpa_driver_nl80211_init_nl_global(struct nl80211_global * global)1933 static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global)
1934 {
1935 	int ret;
1936 
1937 	global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
1938 	if (global->nl_cb == NULL) {
1939 		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
1940 			   "callbacks");
1941 		return -1;
1942 	}
1943 
1944 	global->nl = nl_create_handle(global->nl_cb, "nl");
1945 	if (global->nl == NULL)
1946 		goto err;
1947 
1948 	global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
1949 	if (global->nl80211_id < 0) {
1950 		wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
1951 			   "found");
1952 		goto err;
1953 	}
1954 
1955 	global->nlctrl_id = genl_ctrl_resolve(global->nl, "nlctrl");
1956 	if (global->nlctrl_id < 0) {
1957 		wpa_printf(MSG_ERROR,
1958 			   "nl80211: 'nlctrl' generic netlink not found");
1959 		goto err;
1960 	}
1961 
1962 	global->nl_event = nl_create_handle(global->nl_cb, "event");
1963 	if (global->nl_event == NULL)
1964 		goto err;
1965 
1966 	ret = nl_get_multicast_id(global, "nl80211", "scan");
1967 	if (ret >= 0)
1968 		ret = nl_socket_add_membership(global->nl_event, ret);
1969 	if (ret < 0) {
1970 		wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1971 			   "membership for scan events: %d (%s)",
1972 			   ret, nl_geterror(ret));
1973 		goto err;
1974 	}
1975 
1976 	ret = nl_get_multicast_id(global, "nl80211", "mlme");
1977 	if (ret >= 0)
1978 		ret = nl_socket_add_membership(global->nl_event, ret);
1979 	if (ret < 0) {
1980 		wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
1981 			   "membership for mlme events: %d (%s)",
1982 			   ret, nl_geterror(ret));
1983 		goto err;
1984 	}
1985 
1986 	ret = nl_get_multicast_id(global, "nl80211", "regulatory");
1987 	if (ret >= 0)
1988 		ret = nl_socket_add_membership(global->nl_event, ret);
1989 	if (ret < 0) {
1990 		wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
1991 			   "membership for regulatory events: %d (%s)",
1992 			   ret, nl_geterror(ret));
1993 		/* Continue without regulatory events */
1994 	}
1995 
1996 	ret = nl_get_multicast_id(global, "nl80211", "vendor");
1997 	if (ret >= 0)
1998 		ret = nl_socket_add_membership(global->nl_event, ret);
1999 	if (ret < 0) {
2000 		wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
2001 			   "membership for vendor events: %d (%s)",
2002 			   ret, nl_geterror(ret));
2003 		/* Continue without vendor events */
2004 	}
2005 
2006 	nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
2007 		  no_seq_check, NULL);
2008 	nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
2009 		  process_global_event, global);
2010 
2011 	nl80211_register_eloop_read(&global->nl_event,
2012 				    wpa_driver_nl80211_event_receive,
2013 				    global->nl_cb, 0);
2014 
2015 	return 0;
2016 
2017 err:
2018 	nl_destroy_handles(&global->nl_event);
2019 	nl_destroy_handles(&global->nl);
2020 	nl_cb_put(global->nl_cb);
2021 	global->nl_cb = NULL;
2022 	return -1;
2023 }
2024 
2025 
nl80211_check_global(struct nl80211_global * global)2026 static void nl80211_check_global(struct nl80211_global *global)
2027 {
2028 	struct nl_sock *handle;
2029 	const char *groups[] = { "scan", "mlme", "regulatory", "vendor", NULL };
2030 	int ret;
2031 	unsigned int i;
2032 
2033 	/*
2034 	 * Try to re-add memberships to handle case of cfg80211 getting reloaded
2035 	 * and all registration having been cleared.
2036 	 */
2037 	handle = (void *) (((intptr_t) global->nl_event) ^
2038 			   ELOOP_SOCKET_INVALID);
2039 
2040 	for (i = 0; groups[i]; i++) {
2041 		ret = nl_get_multicast_id(global, "nl80211", groups[i]);
2042 		if (ret >= 0)
2043 			ret = nl_socket_add_membership(handle, ret);
2044 		if (ret < 0) {
2045 			wpa_printf(MSG_INFO,
2046 				   "nl80211: Could not re-add multicast membership for %s events: %d (%s)",
2047 				   groups[i], ret, nl_geterror(ret));
2048 		}
2049 	}
2050 }
2051 
2052 
wpa_driver_nl80211_rfkill_blocked(void * ctx)2053 static void wpa_driver_nl80211_rfkill_blocked(void *ctx)
2054 {
2055 	struct wpa_driver_nl80211_data *drv = ctx;
2056 
2057 	wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
2058 
2059 	/*
2060 	 * rtnetlink ifdown handler will report interfaces other than the P2P
2061 	 * Device interface as disabled.
2062 	 */
2063 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2064 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_DISABLED, NULL);
2065 }
2066 
2067 
wpa_driver_nl80211_rfkill_unblocked(void * ctx)2068 static void wpa_driver_nl80211_rfkill_unblocked(void *ctx)
2069 {
2070 	struct wpa_driver_nl80211_data *drv = ctx;
2071 	wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
2072 	if (i802_set_iface_flags(drv->first_bss, 1)) {
2073 		wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
2074 			   "after rfkill unblock");
2075 		return;
2076 	}
2077 
2078 	if (is_p2p_net_interface(drv->nlmode))
2079 		nl80211_disable_11b_rates(drv, drv->ifindex, 1);
2080 
2081 	/*
2082 	 * rtnetlink ifup handler will report interfaces other than the P2P
2083 	 * Device interface as enabled.
2084 	 */
2085 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
2086 		wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED, NULL);
2087 }
2088 
2089 
wpa_driver_nl80211_handle_eapol_tx_status(int sock,void * eloop_ctx,void * handle)2090 static void wpa_driver_nl80211_handle_eapol_tx_status(int sock,
2091 						      void *eloop_ctx,
2092 						      void *handle)
2093 {
2094 	struct wpa_driver_nl80211_data *drv = eloop_ctx;
2095 	u8 data[2048];
2096 	struct msghdr msg;
2097 	struct iovec entry;
2098 	u8 control[512];
2099 	struct cmsghdr *cmsg;
2100 	int res, found_ee = 0, found_wifi = 0, acked = 0;
2101 	union wpa_event_data event;
2102 
2103 	memset(&msg, 0, sizeof(msg));
2104 	msg.msg_iov = &entry;
2105 	msg.msg_iovlen = 1;
2106 	entry.iov_base = data;
2107 	entry.iov_len = sizeof(data);
2108 	msg.msg_control = &control;
2109 	msg.msg_controllen = sizeof(control);
2110 
2111 	res = recvmsg(sock, &msg, MSG_ERRQUEUE);
2112 	/* if error or not fitting 802.3 header, return */
2113 	if (res < 14)
2114 		return;
2115 
2116 	for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
2117 	{
2118 		if (cmsg->cmsg_level == SOL_SOCKET &&
2119 		    cmsg->cmsg_type == SCM_WIFI_STATUS) {
2120 			int *ack;
2121 
2122 			found_wifi = 1;
2123 			ack = (void *)CMSG_DATA(cmsg);
2124 			acked = *ack;
2125 		}
2126 
2127 		if (cmsg->cmsg_level == SOL_PACKET &&
2128 		    cmsg->cmsg_type == PACKET_TX_TIMESTAMP) {
2129 			struct sock_extended_err *err =
2130 				(struct sock_extended_err *)CMSG_DATA(cmsg);
2131 
2132 			if (err->ee_origin == SO_EE_ORIGIN_TXSTATUS)
2133 				found_ee = 1;
2134 		}
2135 	}
2136 
2137 	if (!found_ee || !found_wifi)
2138 		return;
2139 
2140 	memset(&event, 0, sizeof(event));
2141 	event.eapol_tx_status.dst = data;
2142 	event.eapol_tx_status.data = data + 14;
2143 	event.eapol_tx_status.data_len = res - 14;
2144 	event.eapol_tx_status.ack = acked;
2145 	wpa_supplicant_event(drv->ctx, EVENT_EAPOL_TX_STATUS, &event);
2146 }
2147 
2148 
nl80211_init_connect_handle(struct i802_bss * bss)2149 static int nl80211_init_connect_handle(struct i802_bss *bss)
2150 {
2151 	if (bss->nl_connect) {
2152 		wpa_printf(MSG_DEBUG,
2153 			   "nl80211: Connect handle already created (nl_connect=%p)",
2154 			   bss->nl_connect);
2155 		return -1;
2156 	}
2157 
2158 	bss->nl_connect = nl_create_handle(bss->nl_cb, "connect");
2159 	if (!bss->nl_connect)
2160 		return -1;
2161 	nl80211_register_eloop_read(&bss->nl_connect,
2162 				    wpa_driver_nl80211_event_receive,
2163 				    bss->nl_cb, 1);
2164 	return 0;
2165 }
2166 
2167 
nl80211_init_bss(struct i802_bss * bss)2168 static int nl80211_init_bss(struct i802_bss *bss)
2169 {
2170 	bss->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
2171 	if (!bss->nl_cb)
2172 		return -1;
2173 
2174 	nl_cb_set(bss->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
2175 		  no_seq_check, NULL);
2176 	nl_cb_set(bss->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
2177 		  process_bss_event, bss);
2178 
2179 	nl80211_init_connect_handle(bss);
2180 
2181 	return 0;
2182 }
2183 
2184 
nl80211_destroy_bss(struct i802_bss * bss)2185 static void nl80211_destroy_bss(struct i802_bss *bss)
2186 {
2187 	nl_cb_put(bss->nl_cb);
2188 	bss->nl_cb = NULL;
2189 
2190 	if (bss->nl_connect)
2191 		nl80211_destroy_eloop_handle(&bss->nl_connect, 1);
2192 }
2193 
2194 
2195 static void
wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data * drv)2196 wpa_driver_nl80211_drv_init_rfkill(struct wpa_driver_nl80211_data *drv)
2197 {
2198 	struct rfkill_config *rcfg;
2199 
2200 	if (drv->rfkill)
2201 		return;
2202 
2203 	rcfg = os_zalloc(sizeof(*rcfg));
2204 	if (!rcfg)
2205 		return;
2206 
2207 	rcfg->ctx = drv;
2208 
2209 	/* rfkill uses netdev sysfs for initialization. However, P2P Device is
2210 	 * not associated with a netdev, so use the name of some other interface
2211 	 * sharing the same wiphy as the P2P Device interface.
2212 	 *
2213 	 * Note: This is valid, as a P2P Device interface is always dynamically
2214 	 * created and is created only once another wpa_s interface was added.
2215 	 */
2216 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
2217 		struct nl80211_global *global = drv->global;
2218 		struct wpa_driver_nl80211_data *tmp1;
2219 
2220 		dl_list_for_each(tmp1, &global->interfaces,
2221 				 struct wpa_driver_nl80211_data, list) {
2222 			if (drv == tmp1 || drv->wiphy_idx != tmp1->wiphy_idx ||
2223 			    !tmp1->rfkill)
2224 				continue;
2225 
2226 			wpa_printf(MSG_DEBUG,
2227 				   "nl80211: Use (%s) to initialize P2P Device rfkill",
2228 				   tmp1->first_bss->ifname);
2229 			os_strlcpy(rcfg->ifname, tmp1->first_bss->ifname,
2230 				   sizeof(rcfg->ifname));
2231 			break;
2232 		}
2233 	} else {
2234 		os_strlcpy(rcfg->ifname, drv->first_bss->ifname,
2235 			   sizeof(rcfg->ifname));
2236 	}
2237 
2238 	rcfg->blocked_cb = wpa_driver_nl80211_rfkill_blocked;
2239 	rcfg->unblocked_cb = wpa_driver_nl80211_rfkill_unblocked;
2240 	drv->rfkill = rfkill_init(rcfg);
2241 	if (!drv->rfkill) {
2242 		wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
2243 		os_free(rcfg);
2244 	}
2245 }
2246 
2247 
wpa_driver_nl80211_drv_init(void * ctx,const char * ifname,void * global_priv,int hostapd,const u8 * set_addr,const char * driver_params)2248 static void * wpa_driver_nl80211_drv_init(void *ctx, const char *ifname,
2249 					  void *global_priv, int hostapd,
2250 					  const u8 *set_addr,
2251 					  const char *driver_params)
2252 {
2253 	struct wpa_driver_nl80211_data *drv;
2254 	struct i802_bss *bss;
2255 	unsigned int i;
2256 
2257 	if (global_priv == NULL)
2258 		return NULL;
2259 	drv = os_zalloc(sizeof(*drv));
2260 	if (drv == NULL)
2261 		return NULL;
2262 	drv->global = global_priv;
2263 	drv->ctx = ctx;
2264 	drv->hostapd = !!hostapd;
2265 	drv->eapol_sock = -1;
2266 
2267 	/*
2268 	 * There is no driver capability flag for this, so assume it is
2269 	 * supported and disable this on first attempt to use if the driver
2270 	 * rejects the command due to missing support.
2271 	 */
2272 	drv->set_rekey_offload = 1;
2273 
2274 	drv->num_if_indices = ARRAY_SIZE(drv->default_if_indices);
2275 	drv->if_indices = drv->default_if_indices;
2276 
2277 	drv->first_bss = os_zalloc(sizeof(*drv->first_bss));
2278 	if (!drv->first_bss) {
2279 		os_free(drv);
2280 		return NULL;
2281 	}
2282 	bss = drv->first_bss;
2283 	bss->drv = drv;
2284 	bss->ctx = ctx;
2285 
2286 	os_strlcpy(bss->ifname, ifname, sizeof(bss->ifname));
2287 	drv->monitor_ifidx = -1;
2288 	drv->monitor_sock = -1;
2289 	drv->eapol_tx_sock = -1;
2290 	drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
2291 
2292 	if (nl80211_init_bss(bss))
2293 		goto failed;
2294 
2295 	if (wpa_driver_nl80211_finish_drv_init(drv, set_addr, 1, driver_params))
2296 		goto failed;
2297 
2298 	if (drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS) {
2299 		drv->control_port_ap = 1;
2300 		goto skip_wifi_status;
2301 	}
2302 
2303 	drv->eapol_tx_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
2304 	if (drv->eapol_tx_sock < 0)
2305 		goto failed;
2306 
2307 	if (drv->data_tx_status) {
2308 		int enabled = 1;
2309 
2310 		if (setsockopt(drv->eapol_tx_sock, SOL_SOCKET, SO_WIFI_STATUS,
2311 			       &enabled, sizeof(enabled)) < 0) {
2312 			wpa_printf(MSG_DEBUG,
2313 				   "nl80211: wifi status sockopt failed: %s",
2314 				   strerror(errno));
2315 			drv->data_tx_status = 0;
2316 			if (!drv->use_monitor)
2317 				drv->capa.flags &=
2318 					~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
2319 		} else {
2320 			eloop_register_read_sock(
2321 				drv->eapol_tx_sock,
2322 				wpa_driver_nl80211_handle_eapol_tx_status,
2323 				drv, NULL);
2324 		}
2325 	}
2326 skip_wifi_status:
2327 
2328 	if (drv->global) {
2329 		nl80211_check_global(drv->global);
2330 		dl_list_add(&drv->global->interfaces, &drv->list);
2331 		drv->in_interface_list = 1;
2332 	}
2333 
2334 	/*
2335 	 * Set the default link to be the first one, and set its address to that
2336 	 * of the interface.
2337 	 */
2338 	bss->flink = &bss->links[0];
2339 	bss->n_links = 1;
2340 	os_memcpy(bss->flink->addr, bss->addr, ETH_ALEN);
2341 
2342 	for (i = 0; i < MAX_NUM_MLD_LINKS; i++)
2343 		bss->links[i].link_id = NL80211_DRV_LINK_ID_NA;
2344 
2345 	return bss;
2346 
2347 failed:
2348 	wpa_driver_nl80211_deinit(bss);
2349 	return NULL;
2350 }
2351 
2352 
2353 /**
2354  * wpa_driver_nl80211_init - Initialize nl80211 driver interface
2355  * @ctx: context to be used when calling wpa_supplicant functions,
2356  * e.g., wpa_supplicant_event()
2357  * @ifname: interface name, e.g., wlan0
2358  * @global_priv: private driver global data from global_init()
2359  * Returns: Pointer to private data, %NULL on failure
2360  */
wpa_driver_nl80211_init(void * ctx,const char * ifname,void * global_priv)2361 static void * wpa_driver_nl80211_init(void *ctx, const char *ifname,
2362 				      void *global_priv)
2363 {
2364 	return wpa_driver_nl80211_drv_init(ctx, ifname, global_priv, 0, NULL,
2365 					   NULL);
2366 }
2367 
2368 
nl80211_register_frame(struct i802_bss * bss,struct nl_sock * nl_handle,u16 type,const u8 * match,size_t match_len,bool multicast)2369 static int nl80211_register_frame(struct i802_bss *bss,
2370 				  struct nl_sock *nl_handle,
2371 				  u16 type, const u8 *match, size_t match_len,
2372 				  bool multicast)
2373 {
2374 	struct wpa_driver_nl80211_data *drv = bss->drv;
2375 	struct nl_msg *msg;
2376 	int ret;
2377 	char buf[30];
2378 
2379 	buf[0] = '\0';
2380 	wpa_snprintf_hex(buf, sizeof(buf), match, match_len);
2381 	wpa_printf(MSG_DEBUG,
2382 		   "nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s multicast=%d",
2383 		   type, fc2str(type), nl_handle, buf, multicast);
2384 
2385 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REGISTER_FRAME)) ||
2386 	    (multicast && nla_put_flag(msg, NL80211_ATTR_RECEIVE_MULTICAST)) ||
2387 	    nla_put_u16(msg, NL80211_ATTR_FRAME_TYPE, type) ||
2388 	    nla_put(msg, NL80211_ATTR_FRAME_MATCH, match_len, match)) {
2389 		nlmsg_free(msg);
2390 		return -1;
2391 	}
2392 
2393 	ret = send_and_recv(drv->global, nl_handle, msg, NULL, NULL,
2394 			    NULL, NULL);
2395 	if (ret) {
2396 		wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
2397 			   "failed (type=%u): ret=%d (%s)",
2398 			   type, ret, strerror(-ret));
2399 		wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
2400 			    match, match_len);
2401 	}
2402 	return ret;
2403 }
2404 
2405 
nl80211_alloc_mgmt_handle(struct i802_bss * bss)2406 static int nl80211_alloc_mgmt_handle(struct i802_bss *bss)
2407 {
2408 	if (bss->nl_mgmt) {
2409 		wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
2410 			   "already on! (nl_mgmt=%p)", bss->nl_mgmt);
2411 		return -1;
2412 	}
2413 
2414 	bss->nl_mgmt = nl_create_handle(bss->nl_cb, "mgmt");
2415 	if (bss->nl_mgmt == NULL)
2416 		return -1;
2417 
2418 	return 0;
2419 }
2420 
2421 
nl80211_mgmt_handle_register_eloop(struct i802_bss * bss)2422 static void nl80211_mgmt_handle_register_eloop(struct i802_bss *bss)
2423 {
2424 	nl80211_register_eloop_read(&bss->nl_mgmt,
2425 				    wpa_driver_nl80211_event_receive,
2426 				    bss->nl_cb, 0);
2427 }
2428 
2429 
nl80211_register_action_frame(struct i802_bss * bss,const u8 * match,size_t match_len)2430 static int nl80211_register_action_frame(struct i802_bss *bss,
2431 					 const u8 *match, size_t match_len)
2432 {
2433 	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
2434 	return nl80211_register_frame(bss, bss->nl_mgmt,
2435 				      type, match, match_len, false);
2436 }
2437 
2438 
nl80211_mgmt_subscribe_non_ap(struct i802_bss * bss)2439 static int nl80211_mgmt_subscribe_non_ap(struct i802_bss *bss)
2440 {
2441 	struct wpa_driver_nl80211_data *drv = bss->drv;
2442 	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
2443 	int ret = 0;
2444 
2445 	if (nl80211_alloc_mgmt_handle(bss))
2446 		return -1;
2447 	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
2448 		   "handle %p", bss->nl_mgmt);
2449 
2450 	if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
2451 		/* register for any AUTH message */
2452 		nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0, false);
2453 	} else if ((drv->capa.flags & WPA_DRIVER_FLAGS_SAE) &&
2454 		   !(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
2455 		/* register for SAE Authentication frames */
2456 		nl80211_register_frame(bss, bss->nl_mgmt, type,
2457 				       (u8 *) "\x03\x00", 2, false);
2458 	}
2459 
2460 #ifdef CONFIG_PASN
2461 	/* register for PASN Authentication frames */
2462 	if (nl80211_register_frame(bss, bss->nl_mgmt, type,
2463 				   (u8 *) "\x07\x00", 2, false))
2464 		ret = -1;
2465 #endif /* CONFIG_PASN */
2466 
2467 #ifdef CONFIG_INTERWORKING
2468 	/* QoS Map Configure */
2469 	if (nl80211_register_action_frame(bss, (u8 *) "\x01\x04", 2) < 0)
2470 		ret = -1;
2471 #endif /* CONFIG_INTERWORKING */
2472 #if defined(CONFIG_P2P) || defined(CONFIG_INTERWORKING) || defined(CONFIG_DPP)
2473 	/* GAS Initial Request */
2474 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0a", 2) < 0)
2475 		ret = -1;
2476 	/* GAS Initial Response */
2477 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0b", 2) < 0)
2478 		ret = -1;
2479 	/* GAS Comeback Request */
2480 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0c", 2) < 0)
2481 		ret = -1;
2482 	/* GAS Comeback Response */
2483 	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0d", 2) < 0)
2484 		ret = -1;
2485 	/* Protected GAS Initial Request */
2486 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0a", 2) < 0)
2487 		ret = -1;
2488 	/* Protected GAS Initial Response */
2489 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0b", 2) < 0)
2490 		ret = -1;
2491 	/* Protected GAS Comeback Request */
2492 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0c", 2) < 0)
2493 		ret = -1;
2494 	/* Protected GAS Comeback Response */
2495 	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0d", 2) < 0)
2496 		ret = -1;
2497 #endif /* CONFIG_P2P || CONFIG_INTERWORKING || CONFIG_DPP */
2498 #ifdef CONFIG_P2P
2499 	/* P2P Public Action */
2500 	if (nl80211_register_action_frame(bss,
2501 					  (u8 *) "\x04\x09\x50\x6f\x9a\x09",
2502 					  6) < 0)
2503 		ret = -1;
2504 	/* P2P Action */
2505 	if (nl80211_register_action_frame(bss,
2506 					  (u8 *) "\x7f\x50\x6f\x9a\x09",
2507 					  5) < 0)
2508 		ret = -1;
2509 #endif /* CONFIG_P2P */
2510 #ifdef CONFIG_DPP
2511 	/* DPP Public Action */
2512 	if (nl80211_register_action_frame(bss,
2513 					  (u8 *) "\x04\x09\x50\x6f\x9a\x1a",
2514 					  6) < 0)
2515 		ret = -1;
2516 #endif /* CONFIG_DPP */
2517 #ifdef CONFIG_OCV
2518 	/* SA Query Request */
2519 	if (nl80211_register_action_frame(bss, (u8 *) "\x08\x00", 2) < 0)
2520 		ret = -1;
2521 #endif /* CONFIG_OCV */
2522 	/* SA Query Response */
2523 	if (nl80211_register_action_frame(bss, (u8 *) "\x08\x01", 2) < 0)
2524 		ret = -1;
2525 #ifdef CONFIG_TDLS
2526 	if ((drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT)) {
2527 		/* TDLS Discovery Response */
2528 		if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0e", 2) <
2529 		    0)
2530 			ret = -1;
2531 	}
2532 #endif /* CONFIG_TDLS */
2533 #ifdef CONFIG_FST
2534 	/* FST Action frames */
2535 	if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
2536 		ret = -1;
2537 #endif /* CONFIG_FST */
2538 
2539 	/* FT Action frames */
2540 	if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
2541 		ret = -1;
2542 	else if (!drv->has_driver_key_mgmt) {
2543 		int i;
2544 
2545 		/* Update supported AKMs only if the driver doesn't advertize
2546 		 * any AKM capabilities. */
2547 		drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_FT |
2548 			WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
2549 
2550 		/* Update per interface supported AKMs */
2551 		for (i = 0; i < WPA_IF_MAX; i++)
2552 			drv->capa.key_mgmt_iftype[i] = drv->capa.key_mgmt;
2553 	}
2554 
2555 	/* WNM - BSS Transition Management Request */
2556 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x07", 2) < 0)
2557 		ret = -1;
2558 	/* WNM-Sleep Mode Response */
2559 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x11", 2) < 0)
2560 		ret = -1;
2561 #ifdef CONFIG_WNM
2562 	/* WNM - Collocated Interference Request */
2563 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x0b", 2) < 0)
2564 		ret = -1;
2565 #endif /* CONFIG_WNM */
2566 
2567 #ifdef CONFIG_HS20
2568 	/* WNM-Notification */
2569 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x1a", 2) < 0)
2570 		ret = -1;
2571 #endif /* CONFIG_HS20 */
2572 
2573 	/* WMM-AC ADDTS Response */
2574 	if (nl80211_register_action_frame(bss, (u8 *) "\x11\x01", 2) < 0)
2575 		ret = -1;
2576 
2577 	/* WMM-AC DELTS */
2578 	if (nl80211_register_action_frame(bss, (u8 *) "\x11\x02", 2) < 0)
2579 		ret = -1;
2580 
2581 	/* Radio Measurement - Neighbor Report Response */
2582 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x05", 2) < 0)
2583 		ret = -1;
2584 
2585 	/* Radio Measurement - Radio Measurement Request */
2586 	if  (!drv->no_rrm &&
2587 	     nl80211_register_action_frame(bss, (u8 *) "\x05\x00", 2) < 0)
2588 		ret = -1;
2589 
2590 	/* Radio Measurement - Link Measurement Request */
2591 	if ((drv->capa.rrm_flags & WPA_DRIVER_FLAGS_TX_POWER_INSERTION) &&
2592 	    (nl80211_register_action_frame(bss, (u8 *) "\x05\x02", 2) < 0))
2593 		ret = -1;
2594 
2595 	/* Robust AV SCS Response */
2596 	if (nl80211_register_action_frame(bss, (u8 *) "\x13\x01", 2) < 0)
2597 		ret = -1;
2598 
2599 	/* Robust AV MSCS Response */
2600 	if (nl80211_register_action_frame(bss, (u8 *) "\x13\x05", 2) < 0)
2601 		ret = -1;
2602 
2603 	/* Protected QoS Management Action frame */
2604 	if (nl80211_register_action_frame(bss, (u8 *) "\x7e\x50\x6f\x9a\x1a",
2605 					  5) < 0)
2606 		ret = -1;
2607 
2608 	nl80211_mgmt_handle_register_eloop(bss);
2609 
2610 	return ret;
2611 }
2612 
2613 
nl80211_mgmt_subscribe_mesh(struct i802_bss * bss)2614 static int nl80211_mgmt_subscribe_mesh(struct i802_bss *bss)
2615 {
2616 	int ret = 0;
2617 
2618 	if (nl80211_alloc_mgmt_handle(bss))
2619 		return -1;
2620 
2621 	wpa_printf(MSG_DEBUG,
2622 		   "nl80211: Subscribe to mgmt frames with mesh handle %p",
2623 		   bss->nl_mgmt);
2624 
2625 	/* Auth frames for mesh SAE */
2626 	if (nl80211_register_frame(bss, bss->nl_mgmt,
2627 				   (WLAN_FC_TYPE_MGMT << 2) |
2628 				   (WLAN_FC_STYPE_AUTH << 4),
2629 				   NULL, 0, false) < 0)
2630 		ret = -1;
2631 
2632 	/* Mesh peering open */
2633 	if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x01", 2) < 0)
2634 		ret = -1;
2635 	/* Mesh peering confirm */
2636 	if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x02", 2) < 0)
2637 		ret = -1;
2638 	/* Mesh peering close */
2639 	if (nl80211_register_action_frame(bss, (u8 *) "\x0f\x03", 2) < 0)
2640 		ret = -1;
2641 
2642 	nl80211_mgmt_handle_register_eloop(bss);
2643 
2644 	return ret;
2645 }
2646 
2647 
nl80211_register_spurious_class3(struct i802_bss * bss)2648 static int nl80211_register_spurious_class3(struct i802_bss *bss)
2649 {
2650 	struct nl_msg *msg;
2651 	int ret;
2652 
2653 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UNEXPECTED_FRAME);
2654 	ret = send_and_recv(bss->drv->global, bss->nl_mgmt, msg, NULL, NULL,
2655 			    NULL, NULL);
2656 	if (ret) {
2657 		wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
2658 			   "failed: ret=%d (%s)",
2659 			   ret, strerror(-ret));
2660 	}
2661 	return ret;
2662 }
2663 
2664 
nl80211_action_subscribe_ap(struct i802_bss * bss)2665 static int nl80211_action_subscribe_ap(struct i802_bss *bss)
2666 {
2667 	int ret = 0;
2668 
2669 	/* Public Action frames */
2670 	if (nl80211_register_action_frame(bss, (u8 *) "\x04", 1) < 0)
2671 		ret = -1;
2672 	/* RRM Measurement Report */
2673 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x01", 2) < 0)
2674 		ret = -1;
2675 	/* RRM Link Measurement Report */
2676 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x03", 2) < 0)
2677 		ret = -1;
2678 	/* RRM Neighbor Report Request */
2679 	if (nl80211_register_action_frame(bss, (u8 *) "\x05\x04", 2) < 0)
2680 		ret = -1;
2681 	/* FT Action frames */
2682 	if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
2683 		ret = -1;
2684 	/* SA Query */
2685 	if (nl80211_register_action_frame(bss, (u8 *) "\x08", 1) < 0)
2686 		ret = -1;
2687 	/* Protected Dual of Public Action */
2688 	if (nl80211_register_action_frame(bss, (u8 *) "\x09", 1) < 0)
2689 		ret = -1;
2690 	/* WNM */
2691 	if (nl80211_register_action_frame(bss, (u8 *) "\x0a", 1) < 0)
2692 		ret = -1;
2693 	/* WMM */
2694 	if (nl80211_register_action_frame(bss, (u8 *) "\x11", 1) < 0)
2695 		ret = -1;
2696 #ifdef CONFIG_FST
2697 	/* FST Action frames */
2698 	if (nl80211_register_action_frame(bss, (u8 *) "\x12", 1) < 0)
2699 		ret = -1;
2700 #endif /* CONFIG_FST */
2701 	/* Vendor-specific */
2702 	if (nl80211_register_action_frame(bss, (u8 *) "\x7f", 1) < 0)
2703 		ret = -1;
2704 
2705 	return ret;
2706 }
2707 
2708 
nl80211_mgmt_subscribe_ap(struct i802_bss * bss)2709 static int nl80211_mgmt_subscribe_ap(struct i802_bss *bss)
2710 {
2711 	static const int stypes[] = {
2712 		WLAN_FC_STYPE_AUTH,
2713 		WLAN_FC_STYPE_ASSOC_REQ,
2714 		WLAN_FC_STYPE_REASSOC_REQ,
2715 		WLAN_FC_STYPE_DISASSOC,
2716 		WLAN_FC_STYPE_DEAUTH,
2717 		WLAN_FC_STYPE_PROBE_REQ,
2718 /* Beacon doesn't work as mac80211 doesn't currently allow
2719  * it, but it wouldn't really be the right thing anyway as
2720  * it isn't per interface ... maybe just dump the scan
2721  * results periodically for OLBC?
2722  */
2723 		/* WLAN_FC_STYPE_BEACON, */
2724 	};
2725 	unsigned int i;
2726 
2727 	if (nl80211_alloc_mgmt_handle(bss))
2728 		return -1;
2729 	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2730 		   "handle %p", bss->nl_mgmt);
2731 
2732 	for (i = 0; i < ARRAY_SIZE(stypes); i++) {
2733 		if (nl80211_register_frame(bss, bss->nl_mgmt,
2734 					   (WLAN_FC_TYPE_MGMT << 2) |
2735 					   (stypes[i] << 4),
2736 					   NULL, 0, false) < 0) {
2737 			goto out_err;
2738 		}
2739 	}
2740 
2741 	if (nl80211_action_subscribe_ap(bss))
2742 		goto out_err;
2743 
2744 	if (nl80211_register_spurious_class3(bss))
2745 		goto out_err;
2746 
2747 	nl80211_mgmt_handle_register_eloop(bss);
2748 	return 0;
2749 
2750 out_err:
2751 	nl_destroy_handles(&bss->nl_mgmt);
2752 	return -1;
2753 }
2754 
2755 
nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss * bss)2756 static int nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss *bss)
2757 {
2758 	if (nl80211_alloc_mgmt_handle(bss))
2759 		return -1;
2760 	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
2761 		   "handle %p (device SME)", bss->nl_mgmt);
2762 
2763 	if (nl80211_action_subscribe_ap(bss))
2764 		goto out_err;
2765 
2766 	if (bss->drv->device_ap_sme) {
2767 		u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
2768 
2769 		/* Register for all Authentication frames */
2770 		if (nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0,
2771 					   false) < 0)
2772 			wpa_printf(MSG_DEBUG,
2773 				   "nl80211: Failed to subscribe to handle Authentication frames - SAE offload may not work");
2774 	}
2775 
2776 	nl80211_mgmt_handle_register_eloop(bss);
2777 	return 0;
2778 
2779 out_err:
2780 	nl_destroy_handles(&bss->nl_mgmt);
2781 	return -1;
2782 }
2783 
2784 
nl80211_mgmt_unsubscribe(struct i802_bss * bss,const char * reason)2785 static void nl80211_mgmt_unsubscribe(struct i802_bss *bss, const char *reason)
2786 {
2787 	if (bss->nl_mgmt == NULL)
2788 		return;
2789 	wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
2790 		   "(%s)", bss->nl_mgmt, reason);
2791 	nl80211_destroy_eloop_handle(&bss->nl_mgmt, 0);
2792 
2793 	nl80211_put_wiphy_data_ap(bss);
2794 }
2795 
2796 
wpa_driver_nl80211_send_rfkill(void * eloop_ctx,void * timeout_ctx)2797 static void wpa_driver_nl80211_send_rfkill(void *eloop_ctx, void *timeout_ctx)
2798 {
2799 	wpa_supplicant_event(timeout_ctx, EVENT_INTERFACE_DISABLED, NULL);
2800 }
2801 
2802 
nl80211_del_p2pdev(struct i802_bss * bss)2803 static void nl80211_del_p2pdev(struct i802_bss *bss)
2804 {
2805 	struct nl_msg *msg;
2806 	int ret;
2807 
2808 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_INTERFACE);
2809 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
2810 
2811 	wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
2812 		   bss->ifname, (long long unsigned int) bss->wdev_id,
2813 		   strerror(-ret));
2814 }
2815 
2816 
nl80211_set_p2pdev(struct i802_bss * bss,int start)2817 static int nl80211_set_p2pdev(struct i802_bss *bss, int start)
2818 {
2819 	struct nl_msg *msg;
2820 	int ret;
2821 
2822 	msg = nl80211_cmd_msg(bss, 0, start ? NL80211_CMD_START_P2P_DEVICE :
2823 			      NL80211_CMD_STOP_P2P_DEVICE);
2824 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
2825 
2826 	wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
2827 		   start ? "Start" : "Stop",
2828 		   bss->ifname, (long long unsigned int) bss->wdev_id,
2829 		   strerror(-ret));
2830 	return ret;
2831 }
2832 
2833 
i802_set_iface_flags(struct i802_bss * bss,int up)2834 static int i802_set_iface_flags(struct i802_bss *bss, int up)
2835 {
2836 	enum nl80211_iftype nlmode;
2837 
2838 	nlmode = nl80211_get_ifmode(bss);
2839 	if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2840 		return linux_set_iface_flags(bss->drv->global->ioctl_sock,
2841 					     bss->ifname, up);
2842 	}
2843 
2844 	/* P2P Device has start/stop which is equivalent */
2845 	return nl80211_set_p2pdev(bss, up);
2846 }
2847 
2848 
2849 #ifdef CONFIG_TESTING_OPTIONS
qca_vendor_test_cmd_handler(struct nl_msg * msg,void * arg)2850 static int qca_vendor_test_cmd_handler(struct nl_msg *msg, void *arg)
2851 {
2852 	/* struct wpa_driver_nl80211_data *drv = arg; */
2853 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
2854 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2855 
2856 
2857 	wpa_printf(MSG_DEBUG,
2858 		   "nl80211: QCA vendor test command response received");
2859 
2860 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2861 		  genlmsg_attrlen(gnlh, 0), NULL);
2862 	if (!tb[NL80211_ATTR_VENDOR_DATA]) {
2863 		wpa_printf(MSG_DEBUG, "nl80211: No vendor data attribute");
2864 		return NL_SKIP;
2865 	}
2866 
2867 	wpa_hexdump(MSG_DEBUG,
2868 		    "nl80211: Received QCA vendor test command response",
2869 		    nla_data(tb[NL80211_ATTR_VENDOR_DATA]),
2870 		    nla_len(tb[NL80211_ATTR_VENDOR_DATA]));
2871 
2872 	return NL_SKIP;
2873 }
2874 #endif /* CONFIG_TESTING_OPTIONS */
2875 
2876 
qca_vendor_test(struct wpa_driver_nl80211_data * drv)2877 static void qca_vendor_test(struct wpa_driver_nl80211_data *drv)
2878 {
2879 #ifdef CONFIG_TESTING_OPTIONS
2880 	struct nl_msg *msg;
2881 	struct nlattr *params;
2882 	int ret;
2883 
2884 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
2885 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
2886 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
2887 			QCA_NL80211_VENDOR_SUBCMD_TEST) ||
2888 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
2889 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TEST, 123)) {
2890 		nlmsg_free(msg);
2891 		return;
2892 	}
2893 	nla_nest_end(msg, params);
2894 
2895 	ret = send_and_recv_msgs(drv, msg, qca_vendor_test_cmd_handler, drv,
2896 				 NULL, NULL);
2897 	wpa_printf(MSG_DEBUG,
2898 		   "nl80211: QCA vendor test command returned %d (%s)",
2899 		   ret, strerror(-ret));
2900 #endif /* CONFIG_TESTING_OPTIONS */
2901 }
2902 
2903 
2904 static int
wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data * drv,const u8 * set_addr,int first,const char * driver_params)2905 wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
2906 				   const u8 *set_addr, int first,
2907 				   const char *driver_params)
2908 {
2909 	struct i802_bss *bss = drv->first_bss;
2910 	int send_rfkill_event = 0;
2911 	enum nl80211_iftype nlmode;
2912 
2913 	drv->ifindex = if_nametoindex(bss->ifname);
2914 	bss->ifindex = drv->ifindex;
2915 	bss->wdev_id = drv->global->if_add_wdevid;
2916 	bss->wdev_id_set = drv->global->if_add_wdevid_set;
2917 
2918 	bss->if_dynamic = drv->ifindex == drv->global->if_add_ifindex;
2919 	bss->if_dynamic = bss->if_dynamic || drv->global->if_add_wdevid_set;
2920 	drv->global->if_add_wdevid_set = 0;
2921 
2922 	if (!bss->if_dynamic && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
2923 		bss->static_ap = 1;
2924 
2925 	if (first &&
2926 	    nl80211_get_ifmode(bss) != NL80211_IFTYPE_P2P_DEVICE &&
2927 	    linux_iface_up(drv->global->ioctl_sock, bss->ifname) > 0)
2928 		drv->start_iface_up = 1;
2929 
2930 	if (wpa_driver_nl80211_capa(drv))
2931 		return -1;
2932 
2933 	if (driver_params && nl80211_set_param(bss, driver_params) < 0)
2934 		return -1;
2935 
2936 	wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
2937 		   bss->ifname, drv->phyname);
2938 
2939 	if (set_addr &&
2940 	    (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) ||
2941 	     linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2942 				set_addr)))
2943 		return -1;
2944 
2945 	if (first && nl80211_get_ifmode(bss) == NL80211_IFTYPE_STATION)
2946 		drv->start_mode_sta = 1;
2947 
2948 	if (drv->hostapd || bss->static_ap)
2949 		nlmode = NL80211_IFTYPE_AP;
2950 	else if (bss->if_dynamic ||
2951 		 nl80211_get_ifmode(bss) == NL80211_IFTYPE_MESH_POINT)
2952 		nlmode = nl80211_get_ifmode(bss);
2953 	else
2954 		nlmode = NL80211_IFTYPE_STATION;
2955 
2956 	if (wpa_driver_nl80211_set_mode(bss, nlmode) < 0) {
2957 		wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
2958 		return -1;
2959 	}
2960 
2961 	if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2962 		nl80211_get_macaddr(bss);
2963 
2964 	wpa_driver_nl80211_drv_init_rfkill(drv);
2965 
2966 	if (!rfkill_is_blocked(drv->rfkill)) {
2967 		int ret = i802_set_iface_flags(bss, 1);
2968 		if (ret) {
2969 			wpa_printf(MSG_ERROR, "nl80211: Could not set "
2970 				   "interface '%s' UP", bss->ifname);
2971 			return ret;
2972 		}
2973 
2974 		if (is_p2p_net_interface(nlmode))
2975 			nl80211_disable_11b_rates(bss->drv,
2976 						  bss->drv->ifindex, 1);
2977 
2978 		if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
2979 			return ret;
2980 	} else {
2981 		wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
2982 			   "interface '%s' due to rfkill", bss->ifname);
2983 		if (nlmode != NL80211_IFTYPE_P2P_DEVICE)
2984 			drv->if_disabled = 1;
2985 
2986 		send_rfkill_event = 1;
2987 	}
2988 
2989 	if (!drv->hostapd && nlmode != NL80211_IFTYPE_P2P_DEVICE)
2990 		netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
2991 				       1, IF_OPER_DORMANT);
2992 
2993 	if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
2994 		if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
2995 				       bss->addr))
2996 			return -1;
2997 		os_memcpy(drv->perm_addr, bss->addr, ETH_ALEN);
2998 	}
2999 
3000 	if (send_rfkill_event) {
3001 		eloop_register_timeout(0, 0, wpa_driver_nl80211_send_rfkill,
3002 				       drv, drv->ctx);
3003 	}
3004 
3005 	if (drv->vendor_cmd_test_avail)
3006 		qca_vendor_test(drv);
3007 
3008 	return 0;
3009 }
3010 
3011 
wpa_driver_nl80211_del_beacon(struct i802_bss * bss,struct i802_link * link)3012 static int wpa_driver_nl80211_del_beacon(struct i802_bss *bss,
3013 					 struct i802_link *link)
3014 {
3015 	struct nl_msg *msg;
3016 	struct wpa_driver_nl80211_data *drv = bss->drv;
3017 
3018 	if (!link->beacon_set)
3019 		return 0;
3020 
3021 	wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
3022 		   drv->ifindex);
3023 	link->beacon_set = 0;
3024 	link->freq = 0;
3025 
3026 	nl80211_put_wiphy_data_ap(bss);
3027 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_DEL_BEACON);
3028 	if (!msg)
3029 		return -ENOBUFS;
3030 
3031 	if (link->link_id != NL80211_DRV_LINK_ID_NA) {
3032 		wpa_printf(MSG_DEBUG,
3033 			   "nl80211: MLD: stop beaconing on link=%u",
3034 			   link->link_id);
3035 
3036 		if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
3037 			       link->link_id)) {
3038 			nlmsg_free(msg);
3039 			return -ENOBUFS;
3040 		}
3041 	}
3042 
3043 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3044 }
3045 
3046 
wpa_driver_nl80211_del_beacon_all(struct i802_bss * bss)3047 static void wpa_driver_nl80211_del_beacon_all(struct i802_bss *bss)
3048 {
3049 	unsigned int i;
3050 
3051 	for (i = 0; i < bss->n_links; i++)
3052 		wpa_driver_nl80211_del_beacon(bss, &bss->links[i]);
3053 }
3054 
3055 
3056 /**
3057  * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
3058  * @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
3059  *
3060  * Shut down driver interface and processing of driver events. Free
3061  * private data buffer if one was allocated in wpa_driver_nl80211_init().
3062  */
wpa_driver_nl80211_deinit(struct i802_bss * bss)3063 static void wpa_driver_nl80211_deinit(struct i802_bss *bss)
3064 {
3065 	struct wpa_driver_nl80211_data *drv = bss->drv;
3066 	unsigned int i;
3067 
3068 	wpa_printf(MSG_INFO, "nl80211: deinit ifname=%s disabled_11b_rates=%d",
3069 		   bss->ifname, drv->disabled_11b_rates);
3070 
3071 	bss->in_deinit = 1;
3072 	if (drv->data_tx_status)
3073 		eloop_unregister_read_sock(drv->eapol_tx_sock);
3074 	if (drv->eapol_tx_sock >= 0)
3075 		close(drv->eapol_tx_sock);
3076 
3077 	if (bss->nl_preq)
3078 		wpa_driver_nl80211_probe_req_report(bss, 0);
3079 	if (bss->added_if_into_bridge) {
3080 		if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
3081 				    bss->ifname) < 0)
3082 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
3083 				   "interface %s from bridge %s: %s",
3084 				   bss->ifname, bss->brname, strerror(errno));
3085 	}
3086 
3087 	if (drv->rtnl_sk)
3088 		nl_socket_free(drv->rtnl_sk);
3089 
3090 	if (bss->added_bridge) {
3091 		if (linux_set_iface_flags(drv->global->ioctl_sock, bss->brname,
3092 					  0) < 0)
3093 			wpa_printf(MSG_INFO,
3094 				   "nl80211: Could not set bridge %s down",
3095 				   bss->brname);
3096 		if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
3097 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
3098 				   "bridge %s: %s",
3099 				   bss->brname, strerror(errno));
3100 	}
3101 
3102 	nl80211_remove_monitor_interface(drv);
3103 
3104 	if (is_ap_interface(drv->nlmode))
3105 		wpa_driver_nl80211_del_beacon_all(bss);
3106 
3107 	if (drv->eapol_sock >= 0) {
3108 		eloop_unregister_read_sock(drv->eapol_sock);
3109 		close(drv->eapol_sock);
3110 	}
3111 
3112 	if (drv->if_indices != drv->default_if_indices)
3113 		os_free(drv->if_indices);
3114 
3115 	if (drv->disabled_11b_rates)
3116 		nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3117 
3118 	netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, 0,
3119 			       IF_OPER_UP);
3120 	eloop_cancel_timeout(wpa_driver_nl80211_send_rfkill, drv, drv->ctx);
3121 	rfkill_deinit(drv->rfkill);
3122 
3123 	eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
3124 
3125 	if (!drv->start_iface_up)
3126 		(void) i802_set_iface_flags(bss, 0);
3127 
3128 	if (drv->addr_changed) {
3129 		if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
3130 					  0) < 0) {
3131 			wpa_printf(MSG_DEBUG,
3132 				   "nl80211: Could not set interface down to restore permanent MAC address");
3133 		}
3134 		if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
3135 				       drv->perm_addr) < 0) {
3136 			wpa_printf(MSG_DEBUG,
3137 				   "nl80211: Could not restore permanent MAC address");
3138 		}
3139 	}
3140 
3141 	if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE) {
3142 		if (drv->start_mode_sta)
3143 			wpa_driver_nl80211_set_mode(bss,
3144 						    NL80211_IFTYPE_STATION);
3145 		nl80211_mgmt_unsubscribe(bss, "deinit");
3146 	} else {
3147 		nl80211_mgmt_unsubscribe(bss, "deinit");
3148 		nl80211_del_p2pdev(bss);
3149 	}
3150 
3151 	nl80211_destroy_bss(drv->first_bss);
3152 
3153 	os_free(drv->filter_ssids);
3154 
3155 	os_free(drv->auth_ie);
3156 	os_free(drv->auth_data);
3157 
3158 	if (drv->in_interface_list)
3159 		dl_list_del(&drv->list);
3160 
3161 	os_free(drv->extended_capa);
3162 	os_free(drv->extended_capa_mask);
3163 	for (i = 0; i < drv->num_iface_ext_capa; i++) {
3164 		os_free(drv->iface_ext_capa[i].ext_capa);
3165 		os_free(drv->iface_ext_capa[i].ext_capa_mask);
3166 	}
3167 	os_free(drv->first_bss);
3168 #ifdef CONFIG_DRIVER_NL80211_QCA
3169 	os_free(drv->pending_roam_data);
3170 #endif /* CONFIG_DRIVER_NL80211_QCA */
3171 	os_free(drv);
3172 }
3173 
3174 
wpa_alg_to_cipher_suite(enum wpa_alg alg,size_t key_len)3175 static u32 wpa_alg_to_cipher_suite(enum wpa_alg alg, size_t key_len)
3176 {
3177 	switch (alg) {
3178 	case WPA_ALG_WEP:
3179 		if (key_len == 5)
3180 			return RSN_CIPHER_SUITE_WEP40;
3181 		return RSN_CIPHER_SUITE_WEP104;
3182 	case WPA_ALG_TKIP:
3183 		return RSN_CIPHER_SUITE_TKIP;
3184 	case WPA_ALG_CCMP:
3185 		return RSN_CIPHER_SUITE_CCMP;
3186 	case WPA_ALG_GCMP:
3187 		return RSN_CIPHER_SUITE_GCMP;
3188 	case WPA_ALG_CCMP_256:
3189 		return RSN_CIPHER_SUITE_CCMP_256;
3190 	case WPA_ALG_GCMP_256:
3191 		return RSN_CIPHER_SUITE_GCMP_256;
3192 	case WPA_ALG_BIP_CMAC_128:
3193 		return RSN_CIPHER_SUITE_AES_128_CMAC;
3194 	case WPA_ALG_BIP_GMAC_128:
3195 		return RSN_CIPHER_SUITE_BIP_GMAC_128;
3196 	case WPA_ALG_BIP_GMAC_256:
3197 		return RSN_CIPHER_SUITE_BIP_GMAC_256;
3198 	case WPA_ALG_BIP_CMAC_256:
3199 		return RSN_CIPHER_SUITE_BIP_CMAC_256;
3200 	case WPA_ALG_SMS4:
3201 		return RSN_CIPHER_SUITE_SMS4;
3202 	case WPA_ALG_KRK:
3203 		return RSN_CIPHER_SUITE_KRK;
3204 	case WPA_ALG_NONE:
3205 		wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
3206 			   alg);
3207 		return 0;
3208 	}
3209 
3210 	wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
3211 		   alg);
3212 	return 0;
3213 }
3214 
3215 
wpa_cipher_to_cipher_suite(unsigned int cipher)3216 static u32 wpa_cipher_to_cipher_suite(unsigned int cipher)
3217 {
3218 	switch (cipher) {
3219 	case WPA_CIPHER_CCMP_256:
3220 		return RSN_CIPHER_SUITE_CCMP_256;
3221 	case WPA_CIPHER_GCMP_256:
3222 		return RSN_CIPHER_SUITE_GCMP_256;
3223 	case WPA_CIPHER_CCMP:
3224 		return RSN_CIPHER_SUITE_CCMP;
3225 	case WPA_CIPHER_GCMP:
3226 		return RSN_CIPHER_SUITE_GCMP;
3227 	case WPA_CIPHER_TKIP:
3228 		return RSN_CIPHER_SUITE_TKIP;
3229 	case WPA_CIPHER_WEP104:
3230 		return RSN_CIPHER_SUITE_WEP104;
3231 	case WPA_CIPHER_WEP40:
3232 		return RSN_CIPHER_SUITE_WEP40;
3233 	case WPA_CIPHER_GTK_NOT_USED:
3234 		return RSN_CIPHER_SUITE_NO_GROUP_ADDRESSED;
3235 	default:
3236 		return 0;
3237 	}
3238 }
3239 
3240 
wpa_cipher_to_cipher_suites(unsigned int ciphers,u32 suites[],int max_suites)3241 static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[],
3242 				       int max_suites)
3243 {
3244 	int num_suites = 0;
3245 
3246 	if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256)
3247 		suites[num_suites++] = RSN_CIPHER_SUITE_CCMP_256;
3248 	if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256)
3249 		suites[num_suites++] = RSN_CIPHER_SUITE_GCMP_256;
3250 	if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP)
3251 		suites[num_suites++] = RSN_CIPHER_SUITE_CCMP;
3252 	if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP)
3253 		suites[num_suites++] = RSN_CIPHER_SUITE_GCMP;
3254 	if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP)
3255 		suites[num_suites++] = RSN_CIPHER_SUITE_TKIP;
3256 	if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104)
3257 		suites[num_suites++] = RSN_CIPHER_SUITE_WEP104;
3258 	if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40)
3259 		suites[num_suites++] = RSN_CIPHER_SUITE_WEP40;
3260 
3261 	return num_suites;
3262 }
3263 
3264 
wpa_key_mgmt_to_suites(unsigned int key_mgmt_suites,u32 suites[],int max_suites)3265 static int wpa_key_mgmt_to_suites(unsigned int key_mgmt_suites, u32 suites[],
3266 				  int max_suites)
3267 {
3268 	int num_suites = 0;
3269 
3270 #define __AKM(a, b) \
3271 	if (num_suites < max_suites && \
3272 	    (key_mgmt_suites & (WPA_KEY_MGMT_ ## a))) \
3273 		suites[num_suites++] = (RSN_AUTH_KEY_MGMT_ ## b)
3274 	__AKM(IEEE8021X, UNSPEC_802_1X);
3275 	__AKM(PSK, PSK_OVER_802_1X);
3276 	__AKM(FT_IEEE8021X, FT_802_1X);
3277 	__AKM(FT_PSK, FT_PSK);
3278 	__AKM(IEEE8021X_SHA256, 802_1X_SHA256);
3279 	__AKM(PSK_SHA256, PSK_SHA256);
3280 	__AKM(SAE, SAE);
3281 	__AKM(SAE_EXT_KEY, SAE_EXT_KEY);
3282 	__AKM(FT_SAE, FT_SAE);
3283 	__AKM(FT_SAE_EXT_KEY, FT_SAE_EXT_KEY);
3284 	__AKM(CCKM, CCKM);
3285 	__AKM(OSEN, OSEN);
3286 	__AKM(IEEE8021X_SUITE_B, 802_1X_SUITE_B);
3287 	__AKM(IEEE8021X_SUITE_B_192, 802_1X_SUITE_B_192);
3288 	__AKM(FILS_SHA256, FILS_SHA256);
3289 	__AKM(FILS_SHA384, FILS_SHA384);
3290 	__AKM(FT_FILS_SHA256, FT_FILS_SHA256);
3291 	__AKM(FT_FILS_SHA384, FT_FILS_SHA384);
3292 	__AKM(OWE, OWE);
3293 	__AKM(DPP, DPP);
3294 	__AKM(FT_IEEE8021X_SHA384, FT_802_1X_SHA384);
3295 #undef __AKM
3296 
3297 	return num_suites;
3298 }
3299 
3300 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
wpa_driver_do_broadcom_acs(struct wpa_driver_nl80211_data * drv,struct drv_acs_params * params)3301 static int wpa_driver_do_broadcom_acs(struct wpa_driver_nl80211_data *drv,
3302 				      struct drv_acs_params *params)
3303 {
3304 	struct nl_msg *msg;
3305 	struct nlattr *data;
3306 	int freq_list_len;
3307 	int ret = -1;
3308 
3309 	freq_list_len = int_array_len(params->freq_list);
3310 	wpa_printf(MSG_DEBUG, "%s: freq_list_len=%d",
3311 		    __func__, freq_list_len);
3312 
3313 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
3314 	if (!msg ||
3315 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
3316 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3317 			BRCM_VENDOR_SCMD_ACS) ||
3318 	    !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3319 	    nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HW_MODE, params->hw_mode) ||
3320 	    nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HT_ENABLED,
3321 		       params->ht_enabled) ||
3322 	    nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_HT40_ENABLED,
3323 		       params->ht40_enabled) ||
3324 		nla_put_u8(msg, BRCM_VENDOR_ATTR_ACS_VHT_ENABLED,
3325 		       params->vht_enabled) ||
3326 	    nla_put_u16(msg, BRCM_VENDOR_ATTR_ACS_CHWIDTH, params->ch_width) ||
3327 	    (freq_list_len > 0 &&
3328 	     nla_put(msg, BRCM_VENDOR_ATTR_ACS_FREQ_LIST,
3329 		     sizeof(int) * freq_list_len, params->freq_list)))
3330 		goto fail;
3331 	nla_nest_end(msg, data);
3332 
3333 	wpa_printf(MSG_DEBUG,
3334 		   "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d BW: %d",
3335 		   params->hw_mode, params->ht_enabled, params->ht40_enabled,
3336 		   params->vht_enabled, params->ch_width);
3337 
3338 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3339 	if (ret) {
3340 		wpa_printf(MSG_ERROR,
3341 			   "nl80211: BRCM Failed to invoke driver ACS function: %s",
3342 			   strerror(errno));
3343 	}
3344 
3345 	msg = NULL;
3346 fail:
3347 	nlmsg_free(msg);
3348 	return ret;
3349 }
3350 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3351 
3352 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
wpa_cross_akm_key_mgmt_to_suites(unsigned int key_mgmt_suites,u32 suites[],int max_suites)3353 static int wpa_cross_akm_key_mgmt_to_suites(unsigned int key_mgmt_suites, u32 suites[],
3354                         int max_suites)
3355 {
3356     int num_suites = 0;
3357 
3358 #define __AKM_TO_SUITES_ARRAY(a, b) \
3359     if (num_suites < max_suites && \
3360         (key_mgmt_suites & (WPA_KEY_MGMT_ ## a))) \
3361         suites[num_suites++] = (RSN_AUTH_KEY_MGMT_ ## b)
3362     __AKM_TO_SUITES_ARRAY(PSK, PSK_OVER_802_1X);
3363     __AKM_TO_SUITES_ARRAY(SAE, SAE);
3364 #undef __AKM_TO_SUITES_ARRAY
3365 
3366     return num_suites;
3367 }
3368 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3369 
3370 #ifdef CONFIG_DRIVER_NL80211_QCA
issue_key_mgmt_set_key(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len)3371 static int issue_key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
3372 				  const u8 *key, size_t key_len)
3373 {
3374 	struct nl_msg *msg;
3375 	int ret;
3376 
3377 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD))
3378 		return 0;
3379 
3380 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
3381 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
3382 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3383 			QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY) ||
3384 	    nla_put(msg, NL80211_ATTR_VENDOR_DATA, key_len, key)) {
3385 		nl80211_nlmsg_clear(msg);
3386 		nlmsg_free(msg);
3387 		return -1;
3388 	}
3389 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3390 	if (ret) {
3391 		wpa_printf(MSG_DEBUG,
3392 			   "nl80211: Key management set key failed: ret=%d (%s)",
3393 			   ret, strerror(-ret));
3394 	}
3395 
3396 	return ret;
3397 }
3398 #endif /* CONFIG_DRIVER_NL80211_QCA */
3399 
3400 
3401 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
key_mgmt_set_key(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len)3402 static int key_mgmt_set_key(struct wpa_driver_nl80211_data *drv,
3403 				  const u8 *key, size_t key_len)
3404 {
3405 	struct nl_msg *msg;
3406 	int ret;
3407 	struct nlattr *params;
3408 
3409 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
3410 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
3411 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
3412 				BRCM_VENDOR_SCMD_SET_PMK) ||
3413           !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
3414             nla_put(msg, BRCM_ATTR_DRIVER_KEY_PMK, key_len, key)) {
3415                 nl80211_nlmsg_clear(msg);
3416                 nlmsg_free(msg);
3417                 return -ENOBUFS;
3418 	}
3419 	nla_nest_end(msg, params);
3420 
3421 	ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
3422 	if (ret) {
3423 		wpa_printf(MSG_DEBUG, "nl80211: Key mgmt set key failed: ret=%d (%s)",
3424 			ret, strerror(-ret));
3425 	}
3426 
3427 	return ret;
3428 }
3429 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3430 
3431 
nl80211_set_pmk(struct wpa_driver_nl80211_data * drv,const u8 * key,size_t key_len,const u8 * addr)3432 static int nl80211_set_pmk(struct wpa_driver_nl80211_data *drv,
3433 			   const u8 *key, size_t key_len,
3434 			   const u8 *addr)
3435 {
3436 	struct nl_msg *msg = NULL;
3437 	int ret;
3438 
3439 	/*
3440 	 * If the authenticator address is not set, assume it is
3441 	 * the current BSSID.
3442 	 */
3443 	if (!addr && drv->associated)
3444 		addr = drv->bssid;
3445 	else if (!addr)
3446 		return -1;
3447 
3448 	wpa_printf(MSG_DEBUG, "nl80211: Set PMK to the driver for " MACSTR,
3449 		   MAC2STR(addr));
3450 	wpa_hexdump_key(MSG_DEBUG, "nl80211: PMK", key, key_len);
3451 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_PMK);
3452 	if (!msg ||
3453 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
3454 	    nla_put(msg, NL80211_ATTR_PMK, key_len, key)) {
3455 		nl80211_nlmsg_clear(msg);
3456 		nlmsg_free(msg);
3457 		return -ENOBUFS;
3458 	}
3459 
3460 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3461 	if (ret) {
3462 		wpa_printf(MSG_DEBUG, "nl80211: Set PMK failed: ret=%d (%s)",
3463 			   ret, strerror(-ret));
3464 	}
3465 
3466 	return ret;
3467 }
3468 
3469 
wpa_driver_nl80211_set_key(struct i802_bss * bss,struct wpa_driver_set_key_params * params)3470 static int wpa_driver_nl80211_set_key(struct i802_bss *bss,
3471 				      struct wpa_driver_set_key_params *params)
3472 {
3473 	struct wpa_driver_nl80211_data *drv = bss->drv;
3474 	int ifindex;
3475 	struct nl_msg *msg;
3476 	struct nl_msg *key_msg;
3477 	int ret;
3478 	int skip_set_key = 1;
3479 	const char *ifname = params->ifname;
3480 	enum wpa_alg alg = params->alg;
3481 	const u8 *addr = params->addr;
3482 	int key_idx = params->key_idx;
3483 	int set_tx = params->set_tx;
3484 	const u8 *seq = params->seq;
3485 	size_t seq_len = params->seq_len;
3486 	const u8 *key = params->key;
3487 	size_t key_len = params->key_len;
3488 	int vlan_id = params->vlan_id;
3489 	enum key_flag key_flag = params->key_flag;
3490 	int link_id = params->link_id;
3491 
3492 	/* Ignore for P2P Device */
3493 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
3494 		return 0;
3495 
3496 	ifindex = if_nametoindex(ifname);
3497 	wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
3498 		   "set_tx=%d seq_len=%lu key_len=%lu key_flag=0x%x link_id=%d",
3499 		   __func__, ifindex, ifname, alg, addr, key_idx, set_tx,
3500 		   (unsigned long) seq_len, (unsigned long) key_len, key_flag,
3501 		   link_id);
3502 
3503 	if (check_key_flag(key_flag)) {
3504 		wpa_printf(MSG_DEBUG, "%s: invalid key_flag", __func__);
3505 		return -EINVAL;
3506 	}
3507 
3508 #ifdef CONFIG_DRIVER_NL80211_QCA
3509 	if ((key_flag & KEY_FLAG_PMK) &&
3510 	    (drv->capa.flags & WPA_DRIVER_FLAGS_KEY_MGMT_OFFLOAD)) {
3511 		wpa_printf(MSG_DEBUG, "%s: calling issue_key_mgmt_set_key",
3512 			   __func__);
3513 		ret = issue_key_mgmt_set_key(drv, key, key_len);
3514 		return ret;
3515 	}
3516 #endif /* CONFIG_DRIVER_NL80211_QCA */
3517 
3518 	if (key_flag & KEY_FLAG_PMK) {
3519 		if (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X)
3520 			return nl80211_set_pmk(drv, key, key_len, addr);
3521 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
3522 		if (drv->vendor_set_pmk) {
3523 			wpa_printf(MSG_INFO, "nl80211: key_mgmt_set_key with key_len %lu", (unsigned long) key_len);
3524 			return key_mgmt_set_key(drv, key, key_len);
3525 		}
3526 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
3527 
3528 		/* The driver does not have any offload mechanism for PMK, so
3529 		 * there is no need to configure this key. */
3530 		return 0;
3531 	}
3532 
3533 	ret = -ENOBUFS;
3534 	key_msg = nlmsg_alloc();
3535 	if (!key_msg)
3536 		return ret;
3537 
3538 	if ((key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3539 	    KEY_FLAG_PAIRWISE_RX_TX_MODIFY) {
3540 		wpa_printf(MSG_DEBUG,
3541 			   "nl80211: SET_KEY (pairwise RX/TX modify)");
3542 		msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
3543 		if (!msg)
3544 			goto fail2;
3545 	} else if (alg == WPA_ALG_NONE && (key_flag & KEY_FLAG_RX_TX)) {
3546 		wpa_printf(MSG_DEBUG, "%s: invalid key_flag to delete key",
3547 			   __func__);
3548 		ret = -EINVAL;
3549 		goto fail2;
3550 	} else if (alg == WPA_ALG_NONE) {
3551 		wpa_printf(MSG_DEBUG, "nl80211: DEL_KEY");
3552 		msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_DEL_KEY);
3553 		if (!msg)
3554 			goto fail2;
3555 	} else {
3556 		u32 suite;
3557 
3558 		suite = wpa_alg_to_cipher_suite(alg, key_len);
3559 		if (!suite) {
3560 			ret = -EINVAL;
3561 			goto fail2;
3562 		}
3563 		wpa_printf(MSG_DEBUG, "nl80211: NEW_KEY");
3564 		msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_NEW_KEY);
3565 		if (!msg)
3566 			goto fail2;
3567 		if (nla_put(key_msg, NL80211_KEY_DATA, key_len, key) ||
3568 		    nla_put_u32(key_msg, NL80211_KEY_CIPHER, suite))
3569 			goto fail;
3570 		wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
3571 
3572 		if (seq && seq_len) {
3573 			if (nla_put(key_msg, NL80211_KEY_SEQ, seq_len, seq))
3574 				goto fail;
3575 			wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ",
3576 				    seq, seq_len);
3577 		}
3578 	}
3579 
3580 	if (addr && !is_broadcast_ether_addr(addr)) {
3581 		wpa_printf(MSG_DEBUG, "   addr=" MACSTR, MAC2STR(addr));
3582 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
3583 			goto fail;
3584 
3585 		if ((key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3586 		    KEY_FLAG_PAIRWISE_RX ||
3587 		    (key_flag & KEY_FLAG_PAIRWISE_MASK) ==
3588 		    KEY_FLAG_PAIRWISE_RX_TX_MODIFY) {
3589 			if (nla_put_u8(key_msg, NL80211_KEY_MODE,
3590 				       key_flag == KEY_FLAG_PAIRWISE_RX ?
3591 				       NL80211_KEY_NO_TX : NL80211_KEY_SET_TX))
3592 				goto fail;
3593 		} else if ((key_flag & KEY_FLAG_GROUP_MASK) ==
3594 			   KEY_FLAG_GROUP_RX) {
3595 			wpa_printf(MSG_DEBUG, "   RSN IBSS RX GTK");
3596 			if (nla_put_u32(key_msg, NL80211_KEY_TYPE,
3597 					NL80211_KEYTYPE_GROUP))
3598 				goto fail;
3599 		} else if (!(key_flag & KEY_FLAG_PAIRWISE)) {
3600 			wpa_printf(MSG_DEBUG,
3601 				   "   key_flag missing PAIRWISE when setting a pairwise key");
3602 			ret = -EINVAL;
3603 			goto fail;
3604 		} else if (alg == WPA_ALG_WEP &&
3605 			   (key_flag & KEY_FLAG_RX_TX) == KEY_FLAG_RX_TX) {
3606 			wpa_printf(MSG_DEBUG, "   unicast WEP key");
3607 			skip_set_key = 0;
3608 		} else {
3609 			wpa_printf(MSG_DEBUG, "   pairwise key");
3610 		}
3611 	} else if ((key_flag & KEY_FLAG_PAIRWISE) ||
3612 		   !(key_flag & KEY_FLAG_GROUP)) {
3613 		wpa_printf(MSG_DEBUG,
3614 			   "   invalid key_flag for a broadcast key");
3615 		ret = -EINVAL;
3616 		goto fail;
3617 	} else {
3618 		wpa_printf(MSG_DEBUG, "   broadcast key");
3619 		if (key_flag & KEY_FLAG_DEFAULT)
3620 			skip_set_key = 0;
3621 	}
3622 	if (nla_put_u8(key_msg, NL80211_KEY_IDX, key_idx) ||
3623 	    nla_put_nested(msg, NL80211_ATTR_KEY, key_msg))
3624 		goto fail;
3625 	nl80211_nlmsg_clear(key_msg);
3626 	nlmsg_free(key_msg);
3627 	key_msg = NULL;
3628 
3629 	if (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD)) {
3630 		wpa_printf(MSG_DEBUG, "nl80211: VLAN ID %d", vlan_id);
3631 		if (nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id))
3632 			goto fail;
3633 	}
3634 
3635 	if (link_id != -1) {
3636 		wpa_printf(MSG_DEBUG, "nl80211: Link ID %d", link_id);
3637 		if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id))
3638 			goto fail;
3639 	}
3640 
3641 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3642 	if ((ret == -ENOENT || ret == -ENOLINK) && alg == WPA_ALG_NONE)
3643 		ret = 0;
3644 	if (ret)
3645 		wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s",
3646 			   ret, strerror(-ret));
3647 
3648 	/*
3649 	 * If we failed or don't need to set the key as default (below),
3650 	 * we're done here.
3651 	 */
3652 	if (ret || skip_set_key)
3653 		return ret;
3654 	wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_SET_KEY - default key");
3655 
3656 	ret = -ENOBUFS;
3657 	key_msg = nlmsg_alloc();
3658 	if (!key_msg)
3659 		return ret;
3660 
3661 	msg = nl80211_ifindex_msg(drv, ifindex, 0, NL80211_CMD_SET_KEY);
3662 	if (!msg)
3663 		goto fail2;
3664 	if (!key_msg ||
3665 	    nla_put_u8(key_msg, NL80211_KEY_IDX, key_idx) ||
3666 	    nla_put_flag(key_msg, wpa_alg_bip(alg) ?
3667 			 (key_idx == 6 || key_idx == 7 ?
3668 			  NL80211_KEY_DEFAULT_BEACON :
3669 			  NL80211_KEY_DEFAULT_MGMT) :
3670 			 NL80211_KEY_DEFAULT))
3671 		goto fail;
3672 	if (addr && is_broadcast_ether_addr(addr)) {
3673 		struct nlattr *types;
3674 
3675 		types = nla_nest_start(key_msg, NL80211_KEY_DEFAULT_TYPES);
3676 		if (!types ||
3677 		    nla_put_flag(key_msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST))
3678 			goto fail;
3679 		nla_nest_end(key_msg, types);
3680 	} else if (addr) {
3681 		struct nlattr *types;
3682 
3683 		types = nla_nest_start(key_msg, NL80211_KEY_DEFAULT_TYPES);
3684 		if (!types ||
3685 		    nla_put_flag(key_msg, NL80211_KEY_DEFAULT_TYPE_UNICAST))
3686 			goto fail;
3687 		nla_nest_end(key_msg, types);
3688 	}
3689 
3690 	if (nla_put_nested(msg, NL80211_ATTR_KEY, key_msg))
3691 		goto fail;
3692 	nl80211_nlmsg_clear(key_msg);
3693 	nlmsg_free(key_msg);
3694 	key_msg = NULL;
3695 
3696 	if (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD)) {
3697 		wpa_printf(MSG_DEBUG, "nl80211: set_key default - VLAN ID %d",
3698 			   vlan_id);
3699 		if (nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id))
3700 			goto fail;
3701 	}
3702 
3703 	if (link_id != -1) {
3704 		wpa_printf(MSG_DEBUG, "nl80211: set_key default - Link ID %d",
3705 			   link_id);
3706 		if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id))
3707 			goto fail;
3708 	}
3709 
3710 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3711 	if (ret)
3712 		wpa_printf(MSG_DEBUG,
3713 			   "nl80211: set_key default failed; err=%d %s",
3714 			   ret, strerror(-ret));
3715 	return ret;
3716 
3717 fail:
3718 	nl80211_nlmsg_clear(msg);
3719 	nlmsg_free(msg);
3720 fail2:
3721 	nl80211_nlmsg_clear(key_msg);
3722 	nlmsg_free(key_msg);
3723 	return ret;
3724 }
3725 
3726 
nl_add_key(struct nl_msg * msg,enum wpa_alg alg,int key_idx,int defkey,const u8 * seq,size_t seq_len,const u8 * key,size_t key_len)3727 static int nl_add_key(struct nl_msg *msg, enum wpa_alg alg,
3728 		      int key_idx, int defkey,
3729 		      const u8 *seq, size_t seq_len,
3730 		      const u8 *key, size_t key_len)
3731 {
3732 	struct nlattr *key_attr = nla_nest_start(msg, NL80211_ATTR_KEY);
3733 	u32 suite;
3734 
3735 	if (!key_attr)
3736 		return -1;
3737 
3738 	suite = wpa_alg_to_cipher_suite(alg, key_len);
3739 	if (!suite)
3740 		return -1;
3741 
3742 	if (defkey && wpa_alg_bip(alg)) {
3743 		if (nla_put_flag(msg, NL80211_KEY_DEFAULT_MGMT))
3744 			return -1;
3745 	} else if (defkey) {
3746 		if (nla_put_flag(msg, NL80211_KEY_DEFAULT))
3747 			return -1;
3748 	}
3749 
3750 	if (nla_put_u8(msg, NL80211_KEY_IDX, key_idx) ||
3751 	    nla_put_u32(msg, NL80211_KEY_CIPHER, suite) ||
3752 	    (seq && seq_len &&
3753 	     nla_put(msg, NL80211_KEY_SEQ, seq_len, seq)) ||
3754 	    nla_put(msg, NL80211_KEY_DATA, key_len, key))
3755 		return -1;
3756 
3757 	nla_nest_end(msg, key_attr);
3758 
3759 	return 0;
3760 }
3761 
3762 
nl80211_set_conn_keys(struct wpa_driver_associate_params * params,struct nl_msg * msg)3763 static int nl80211_set_conn_keys(struct wpa_driver_associate_params *params,
3764 				 struct nl_msg *msg)
3765 {
3766 	int i, privacy = 0;
3767 	struct nlattr *nl_keys, *nl_key;
3768 
3769 	for (i = 0; i < 4; i++) {
3770 		if (!params->wep_key[i])
3771 			continue;
3772 		privacy = 1;
3773 		break;
3774 	}
3775 	if (params->wps == WPS_MODE_PRIVACY)
3776 		privacy = 1;
3777 	if (params->pairwise_suite &&
3778 	    params->pairwise_suite != WPA_CIPHER_NONE)
3779 		privacy = 1;
3780 
3781 	if (!privacy)
3782 		return 0;
3783 
3784 	if (nla_put_flag(msg, NL80211_ATTR_PRIVACY))
3785 		return -ENOBUFS;
3786 
3787 	nl_keys = nla_nest_start(msg, NL80211_ATTR_KEYS);
3788 	if (!nl_keys)
3789 		return -ENOBUFS;
3790 
3791 	for (i = 0; i < 4; i++) {
3792 		if (!params->wep_key[i])
3793 			continue;
3794 
3795 		nl_key = nla_nest_start(msg, i);
3796 		if (!nl_key ||
3797 		    nla_put(msg, NL80211_KEY_DATA, params->wep_key_len[i],
3798 			    params->wep_key[i]) ||
3799 		    nla_put_u32(msg, NL80211_KEY_CIPHER,
3800 				params->wep_key_len[i] == 5 ?
3801 				RSN_CIPHER_SUITE_WEP40 :
3802 				RSN_CIPHER_SUITE_WEP104) ||
3803 		    nla_put_u8(msg, NL80211_KEY_IDX, i) ||
3804 		    (i == params->wep_tx_keyidx &&
3805 		     nla_put_flag(msg, NL80211_KEY_DEFAULT)))
3806 			return -ENOBUFS;
3807 
3808 		nla_nest_end(msg, nl_key);
3809 	}
3810 	nla_nest_end(msg, nl_keys);
3811 
3812 	return 0;
3813 }
3814 
3815 
wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data * drv,const u8 * addr,int cmd,u16 reason_code,int local_state_change,struct i802_bss * bss)3816 int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
3817 			    const u8 *addr, int cmd, u16 reason_code,
3818 			    int local_state_change,
3819 			    struct i802_bss *bss)
3820 {
3821 	int ret;
3822 	struct nl_msg *msg;
3823 	struct nl_sock *nl_connect = get_connect_handle(bss);
3824 
3825 	if (!(msg = nl80211_drv_msg(drv, 0, cmd)) ||
3826 	    nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code) ||
3827 	    (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
3828 	    (local_state_change &&
3829 	     nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))) {
3830 		nlmsg_free(msg);
3831 		return -1;
3832 	}
3833 
3834 	if (nl_connect)
3835 		ret = send_and_recv(drv->global, nl_connect, msg,
3836 				    process_bss_event, bss, NULL, NULL);
3837 	else
3838 		ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
3839 	if (ret) {
3840 		wpa_dbg(drv->ctx, MSG_DEBUG,
3841 			"nl80211: MLME command failed: reason=%u ret=%d (%s)",
3842 			reason_code, ret, strerror(-ret));
3843 	}
3844 	return ret;
3845 }
3846 
3847 
wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data * drv,u16 reason_code,struct i802_bss * bss)3848 static int wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data *drv,
3849 					 u16 reason_code,
3850 					 struct i802_bss *bss)
3851 {
3852 	int ret;
3853 	int drv_associated = drv->associated;
3854 
3855 	wpa_printf(MSG_DEBUG, "%s(reason_code=%d)", __func__, reason_code);
3856 	nl80211_mark_disconnected(drv);
3857 	/* Disconnect command doesn't need BSSID - it uses cached value */
3858 	ret = wpa_driver_nl80211_mlme(drv, NULL, NL80211_CMD_DISCONNECT,
3859 				      reason_code, 0, bss);
3860 	/*
3861 	 * For locally generated disconnect, supplicant already generates a
3862 	 * DEAUTH event, so ignore the event from NL80211.
3863 	 */
3864 	drv->ignore_next_local_disconnect = drv_associated && (ret == 0);
3865 
3866 	return ret;
3867 }
3868 
3869 
wpa_driver_nl80211_deauthenticate(struct i802_bss * bss,const u8 * addr,u16 reason_code)3870 static int wpa_driver_nl80211_deauthenticate(struct i802_bss *bss,
3871 					     const u8 *addr, u16 reason_code)
3872 {
3873 	struct wpa_driver_nl80211_data *drv = bss->drv;
3874 	int ret;
3875 	int drv_associated = drv->associated;
3876 
3877 	if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
3878 		nl80211_mark_disconnected(drv);
3879 		return nl80211_leave_ibss(drv, 1);
3880 	}
3881 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
3882 		return wpa_driver_nl80211_disconnect(drv, reason_code, bss);
3883 	}
3884 	wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " reason_code=%d)",
3885 		   __func__, MAC2STR(addr), reason_code);
3886 	nl80211_mark_disconnected(drv);
3887 	ret = wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
3888 				      reason_code, 0, bss);
3889 	/*
3890 	 * For locally generated deauthenticate, supplicant already generates a
3891 	 * DEAUTH event, so ignore the event from NL80211.
3892 	 */
3893 	drv->ignore_next_local_deauth = drv_associated && (ret == 0);
3894 
3895 	return ret;
3896 }
3897 
3898 
nl80211_copy_auth_params(struct wpa_driver_nl80211_data * drv,struct wpa_driver_auth_params * params)3899 static void nl80211_copy_auth_params(struct wpa_driver_nl80211_data *drv,
3900 				     struct wpa_driver_auth_params *params)
3901 {
3902 	int i;
3903 
3904 	drv->auth_freq = params->freq;
3905 	drv->auth_alg = params->auth_alg;
3906 	drv->auth_wep_tx_keyidx = params->wep_tx_keyidx;
3907 	drv->auth_local_state_change = params->local_state_change;
3908 	drv->auth_p2p = params->p2p;
3909 
3910 	if (params->bssid)
3911 		os_memcpy(drv->auth_bssid_, params->bssid, ETH_ALEN);
3912 	else
3913 		os_memset(drv->auth_bssid_, 0, ETH_ALEN);
3914 
3915 	if (params->ssid) {
3916 		os_memcpy(drv->auth_ssid, params->ssid, params->ssid_len);
3917 		drv->auth_ssid_len = params->ssid_len;
3918 	} else
3919 		drv->auth_ssid_len = 0;
3920 
3921 
3922 	os_free(drv->auth_ie);
3923 	drv->auth_ie = NULL;
3924 	drv->auth_ie_len = 0;
3925 	if (params->ie) {
3926 		drv->auth_ie = os_malloc(params->ie_len);
3927 		if (drv->auth_ie) {
3928 			os_memcpy(drv->auth_ie, params->ie, params->ie_len);
3929 			drv->auth_ie_len = params->ie_len;
3930 		}
3931 	}
3932 
3933 	if (params->mld && params->ap_mld_addr) {
3934 		drv->auth_mld = params->mld;
3935 		drv->auth_mld_link_id = params->mld_link_id;
3936 		os_memcpy(drv->auth_ap_mld_addr, params->ap_mld_addr, ETH_ALEN);
3937 	} else {
3938 		drv->auth_mld = false;
3939 		drv->auth_mld_link_id = -1;
3940 	}
3941 
3942 	os_free(drv->auth_data);
3943 	drv->auth_data = NULL;
3944 	drv->auth_data_len = 0;
3945 	if (params->auth_data) {
3946 		drv->auth_data = os_memdup(params->auth_data,
3947 					   params->auth_data_len);
3948 		if (drv->auth_data)
3949 			drv->auth_data_len = params->auth_data_len;
3950 	}
3951 
3952 	for (i = 0; i < 4; i++) {
3953 		if (params->wep_key[i] && params->wep_key_len[i] &&
3954 		    params->wep_key_len[i] <= 16) {
3955 			os_memcpy(drv->auth_wep_key[i], params->wep_key[i],
3956 				  params->wep_key_len[i]);
3957 			drv->auth_wep_key_len[i] = params->wep_key_len[i];
3958 		} else
3959 			drv->auth_wep_key_len[i] = 0;
3960 	}
3961 }
3962 
3963 
nl80211_unmask_11b_rates(struct i802_bss * bss)3964 static void nl80211_unmask_11b_rates(struct i802_bss *bss)
3965 {
3966 	struct wpa_driver_nl80211_data *drv = bss->drv;
3967 
3968 	if (is_p2p_net_interface(drv->nlmode) || !drv->disabled_11b_rates)
3969 		return;
3970 
3971 	/*
3972 	 * Looks like we failed to unmask 11b rates previously. This could
3973 	 * happen, e.g., if the interface was down at the point in time when a
3974 	 * P2P group was terminated.
3975 	 */
3976 	wpa_printf(MSG_DEBUG,
3977 		   "nl80211: Interface %s mode is for non-P2P, but 11b rates were disabled - re-enable them",
3978 		   bss->ifname);
3979 	nl80211_disable_11b_rates(drv, drv->ifindex, 0);
3980 }
3981 
3982 
get_nl_auth_type(int wpa_auth_alg)3983 static enum nl80211_auth_type get_nl_auth_type(int wpa_auth_alg)
3984 {
3985 	if (wpa_auth_alg & WPA_AUTH_ALG_OPEN)
3986 		return NL80211_AUTHTYPE_OPEN_SYSTEM;
3987 	if (wpa_auth_alg & WPA_AUTH_ALG_SHARED)
3988 		return NL80211_AUTHTYPE_SHARED_KEY;
3989 	if (wpa_auth_alg & WPA_AUTH_ALG_LEAP)
3990 		return NL80211_AUTHTYPE_NETWORK_EAP;
3991 	if (wpa_auth_alg & WPA_AUTH_ALG_FT)
3992 		return NL80211_AUTHTYPE_FT;
3993 	if (wpa_auth_alg & WPA_AUTH_ALG_SAE)
3994 		return NL80211_AUTHTYPE_SAE;
3995 	if (wpa_auth_alg & WPA_AUTH_ALG_FILS)
3996 		return NL80211_AUTHTYPE_FILS_SK;
3997 	if (wpa_auth_alg & WPA_AUTH_ALG_FILS_SK_PFS)
3998 		return NL80211_AUTHTYPE_FILS_SK_PFS;
3999 
4000 	return NL80211_AUTHTYPE_MAX;
4001 }
4002 
4003 
wpa_driver_nl80211_authenticate(struct i802_bss * bss,struct wpa_driver_auth_params * params)4004 static int wpa_driver_nl80211_authenticate(
4005 	struct i802_bss *bss, struct wpa_driver_auth_params *params)
4006 {
4007 	struct wpa_driver_nl80211_data *drv = bss->drv;
4008 	int ret = -1, i;
4009 	struct nl_msg *msg;
4010 	enum nl80211_auth_type type;
4011 	enum nl80211_iftype nlmode;
4012 	int count = 0;
4013 	int is_retry;
4014 	struct wpa_driver_set_key_params p;
4015 
4016 	nl80211_unmask_11b_rates(bss);
4017 
4018 	is_retry = drv->retry_auth;
4019 	drv->retry_auth = 0;
4020 	drv->ignore_deauth_event = 0;
4021 
4022 	nl80211_mark_disconnected(drv);
4023 	os_memset(drv->auth_bssid, 0, ETH_ALEN);
4024 	if (params->bssid)
4025 		os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
4026 	else
4027 		os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
4028 	/* FIX: IBSS mode */
4029 	nlmode = params->p2p ?
4030 		NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
4031 	if (drv->nlmode != nlmode &&
4032 	    wpa_driver_nl80211_set_mode(bss, nlmode) < 0)
4033 		return -1;
4034 
4035 retry:
4036 	wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
4037 		   drv->ifindex);
4038 
4039 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_AUTHENTICATE);
4040 	if (!msg)
4041 		goto fail;
4042 
4043 	os_memset(&p, 0, sizeof(p));
4044 	p.ifname = bss->ifname;
4045 	p.alg = WPA_ALG_WEP;
4046 	p.link_id = -1;
4047 	for (i = 0; i < 4; i++) {
4048 		if (!params->wep_key[i])
4049 			continue;
4050 		p.key_idx = i;
4051 		p.set_tx = i == params->wep_tx_keyidx;
4052 		p.key = params->wep_key[i];
4053 		p.key_len = params->wep_key_len[i];
4054 		p.key_flag = i == params->wep_tx_keyidx ?
4055 			KEY_FLAG_GROUP_RX_TX_DEFAULT :
4056 			KEY_FLAG_GROUP_RX_TX;
4057 		wpa_driver_nl80211_set_key(bss, &p);
4058 		if (params->wep_tx_keyidx != i)
4059 			continue;
4060 		if (nl_add_key(msg, WPA_ALG_WEP, i, 1, NULL, 0,
4061 			       params->wep_key[i], params->wep_key_len[i]))
4062 			goto fail;
4063 	}
4064 
4065 	if (params->bssid) {
4066 		wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
4067 			   MAC2STR(params->bssid));
4068 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
4069 			goto fail;
4070 	}
4071 	if (params->freq) {
4072 		wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
4073 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq))
4074 			goto fail;
4075 	}
4076 	if (params->ssid) {
4077 		wpa_printf(MSG_DEBUG, "  * SSID=%s",
4078 			   wpa_ssid_txt(params->ssid, params->ssid_len));
4079 		if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
4080 			    params->ssid))
4081 			goto fail;
4082 	}
4083 	wpa_hexdump(MSG_DEBUG, "  * IEs", params->ie, params->ie_len);
4084 	if (params->ie &&
4085 	    nla_put(msg, NL80211_ATTR_IE, params->ie_len, params->ie))
4086 		goto fail;
4087 	if (params->auth_data) {
4088 		wpa_hexdump(MSG_DEBUG, "  * auth_data", params->auth_data,
4089 			    params->auth_data_len);
4090 		if (nla_put(msg, NL80211_ATTR_SAE_DATA, params->auth_data_len,
4091 			    params->auth_data))
4092 			goto fail;
4093 	}
4094 	type = get_nl_auth_type(params->auth_alg);
4095 	wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
4096 	if (type == NL80211_AUTHTYPE_MAX ||
4097 	    nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
4098 		goto fail;
4099 	if (params->local_state_change) {
4100 		wpa_printf(MSG_DEBUG, "  * Local state change only");
4101 		if (nla_put_flag(msg, NL80211_ATTR_LOCAL_STATE_CHANGE))
4102 			goto fail;
4103 	}
4104 
4105 	if (params->mld && params->ap_mld_addr) {
4106 		wpa_printf(MSG_DEBUG, "  * MLD: link_id=%u, MLD addr=" MACSTR,
4107 			   params->mld_link_id, MAC2STR(params->ap_mld_addr));
4108 
4109 		if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
4110 			       params->mld_link_id) ||
4111 		    nla_put(msg, NL80211_ATTR_MLD_ADDR, ETH_ALEN,
4112 			    params->ap_mld_addr))
4113 			goto fail;
4114 	}
4115 
4116 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4117 	msg = NULL;
4118 	if (ret) {
4119 		wpa_dbg(drv->ctx, MSG_DEBUG,
4120 			"nl80211: MLME command failed (auth): count=%d ret=%d (%s)",
4121 			count, ret, strerror(-ret));
4122 		count++;
4123 		if ((ret == -EALREADY || ret == -EEXIST) && count == 1 &&
4124 		    params->bssid && !params->local_state_change) {
4125 			/*
4126 			 * mac80211 does not currently accept new
4127 			 * authentication if we are already authenticated. As a
4128 			 * workaround, force deauthentication and try again.
4129 			 */
4130 			wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
4131 				   "after forced deauthentication");
4132 			drv->ignore_deauth_event = 1;
4133 			wpa_driver_nl80211_deauthenticate(
4134 				bss, params->bssid,
4135 				WLAN_REASON_PREV_AUTH_NOT_VALID);
4136 			nlmsg_free(msg);
4137 			goto retry;
4138 		}
4139 
4140 		if (ret == -ENOENT && params->freq && !is_retry) {
4141 			/*
4142 			 * cfg80211 has likely expired the BSS entry even
4143 			 * though it was previously available in our internal
4144 			 * BSS table. To recover quickly, start a single
4145 			 * channel scan on the specified channel.
4146 			 */
4147 			struct wpa_driver_scan_params scan;
4148 			int freqs[2];
4149 
4150 			os_memset(&scan, 0, sizeof(scan));
4151 			scan.num_ssids = 1;
4152 			if (params->ssid) {
4153 				scan.ssids[0].ssid = params->ssid;
4154 				scan.ssids[0].ssid_len = params->ssid_len;
4155 			}
4156 			freqs[0] = params->freq;
4157 			freqs[1] = 0;
4158 			scan.freqs = freqs;
4159 			wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
4160 				   "channel scan to refresh cfg80211 BSS "
4161 				   "entry");
4162 			ret = wpa_driver_nl80211_scan(bss, &scan);
4163 			if (ret == 0) {
4164 				nl80211_copy_auth_params(drv, params);
4165 				drv->scan_for_auth = 1;
4166 			}
4167 		} else if (is_retry) {
4168 			/*
4169 			 * Need to indicate this with an event since the return
4170 			 * value from the retry is not delivered to core code.
4171 			 */
4172 			union wpa_event_data event;
4173 			wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
4174 				   "failed");
4175 			os_memset(&event, 0, sizeof(event));
4176 			os_memcpy(event.timeout_event.addr, drv->auth_bssid_,
4177 				  ETH_ALEN);
4178 			wpa_supplicant_event(drv->ctx, EVENT_AUTH_TIMED_OUT,
4179 					     &event);
4180 		}
4181 	} else {
4182 		wpa_printf(MSG_DEBUG,
4183 			   "nl80211: Authentication request send successfully");
4184 	}
4185 
4186 fail:
4187 	nlmsg_free(msg);
4188 	return ret;
4189 }
4190 
4191 
wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data * drv)4192 int wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data *drv)
4193 {
4194 	struct wpa_driver_auth_params params;
4195 	struct i802_bss *bss = drv->first_bss;
4196 	int i;
4197 
4198 	wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
4199 
4200 	os_memset(¶ms, 0, sizeof(params));
4201 	params.freq = drv->auth_freq;
4202 	params.auth_alg = drv->auth_alg;
4203 	params.wep_tx_keyidx = drv->auth_wep_tx_keyidx;
4204 	params.local_state_change = drv->auth_local_state_change;
4205 	params.p2p = drv->auth_p2p;
4206 
4207 	if (!is_zero_ether_addr(drv->auth_bssid_))
4208 		params.bssid = drv->auth_bssid_;
4209 
4210 	if (drv->auth_ssid_len) {
4211 		params.ssid = drv->auth_ssid;
4212 		params.ssid_len = drv->auth_ssid_len;
4213 	}
4214 
4215 	params.ie = drv->auth_ie;
4216 	params.ie_len = drv->auth_ie_len;
4217 	params.auth_data = drv->auth_data;
4218 	params.auth_data_len = drv->auth_data_len;
4219 	params.mld = drv->auth_mld;
4220 	params.mld_link_id = drv->auth_mld_link_id;
4221 	if (drv->auth_mld)
4222 		params.ap_mld_addr = drv->auth_ap_mld_addr;
4223 
4224 	for (i = 0; i < 4; i++) {
4225 		if (drv->auth_wep_key_len[i]) {
4226 			params.wep_key[i] = drv->auth_wep_key[i];
4227 			params.wep_key_len[i] = drv->auth_wep_key_len[i];
4228 		}
4229 	}
4230 
4231 	drv->retry_auth = 1;
4232 	return wpa_driver_nl80211_authenticate(bss, ¶ms);
4233 }
4234 
4235 
wpa_driver_nl80211_send_mlme(struct i802_bss * bss,const u8 * data,size_t data_len,int noack,unsigned int freq,int no_cck,int offchanok,unsigned int wait_time,const u16 * csa_offs,size_t csa_offs_len,int no_encrypt)4236 static int wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data,
4237 					size_t data_len, int noack,
4238 					unsigned int freq, int no_cck,
4239 					int offchanok,
4240 					unsigned int wait_time,
4241 					const u16 *csa_offs,
4242 					size_t csa_offs_len, int no_encrypt)
4243 {
4244 	struct wpa_driver_nl80211_data *drv = bss->drv;
4245 	struct ieee80211_mgmt *mgmt;
4246 	int encrypt = !no_encrypt;
4247 	u16 fc;
4248 	int use_cookie = 1;
4249 	int res;
4250 
4251 	mgmt = (struct ieee80211_mgmt *) data;
4252 	fc = le_to_host16(mgmt->frame_control);
4253 	wpa_printf(MSG_DEBUG, "nl80211: send_mlme - da=" MACSTR
4254 		   " noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u no_encrypt=%d fc=0x%x (%s) nlmode=%d",
4255 		   MAC2STR(mgmt->da), noack, freq, no_cck, offchanok, wait_time,
4256 		   no_encrypt, fc, fc2str(fc), drv->nlmode);
4257 
4258 	if ((is_sta_interface(drv->nlmode) ||
4259 	     drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) &&
4260 	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4261 	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_RESP) {
4262 		/*
4263 		 * The use of last_mgmt_freq is a bit of a hack,
4264 		 * but it works due to the single-threaded nature
4265 		 * of wpa_supplicant.
4266 		 */
4267 		if (freq == 0) {
4268 			wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
4269 				   drv->last_mgmt_freq);
4270 			freq = drv->last_mgmt_freq;
4271 		}
4272 		wait_time = 0;
4273 		use_cookie = 0;
4274 		no_cck = 1;
4275 		offchanok = 1;
4276 		goto send_frame_cmd;
4277 	}
4278 
4279 	if (drv->device_ap_sme && is_ap_interface(drv->nlmode)) {
4280 		if (freq == 0) {
4281 			wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
4282 				   bss->flink->freq);
4283 			freq = bss->flink->freq;
4284 		}
4285 		if ((int) freq == bss->flink->freq)
4286 			wait_time = 0;
4287 		goto send_frame_cmd;
4288 	}
4289 
4290 	if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4291 	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
4292 		/*
4293 		 * Only one of the authentication frame types is encrypted.
4294 		 * In order for static WEP encryption to work properly (i.e.,
4295 		 * to not encrypt the frame), we need to tell mac80211 about
4296 		 * the frames that must not be encrypted.
4297 		 */
4298 		u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
4299 		u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
4300 		if (auth_alg != WLAN_AUTH_SHARED_KEY || auth_trans != 3)
4301 			encrypt = 0;
4302 	}
4303 
4304 	if (is_sta_interface(drv->nlmode) &&
4305 	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4306 	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
4307 		if (freq == 0 &&
4308 		    (drv->capa.flags & WPA_DRIVER_FLAGS_SAE) &&
4309 		    !(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
4310 			freq = nl80211_get_assoc_freq(drv);
4311 			wpa_printf(MSG_DEBUG,
4312 				   "nl80211: send_mlme - Use assoc_freq=%u for external auth",
4313 				   freq);
4314 		}
4315 
4316 		/* Allow off channel for PASN authentication */
4317 		if (data_len >= IEEE80211_HDRLEN + 2 &&
4318 		    WPA_GET_LE16(data + IEEE80211_HDRLEN) == WLAN_AUTH_PASN &&
4319 		    !offchanok) {
4320 			wpa_printf(MSG_DEBUG,
4321 				   "nl80211: send_mlme: allow off channel for PASN");
4322 			offchanok = 1;
4323 		}
4324 	}
4325 
4326 #ifdef CONFIG_PASN
4327 	if (is_sta_interface(drv->nlmode) &&
4328 	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
4329 	     WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_DEAUTH) {
4330 		wpa_printf(MSG_DEBUG,
4331 			   "nl80211: send_mlme: allow Deauthentication frame for PASN");
4332 
4333 		use_cookie = 0;
4334 		offchanok = 1;
4335 		goto send_frame_cmd;
4336 	}
4337 #endif /* CONFIG_PASN */
4338 
4339 	if (freq == 0 && drv->nlmode == NL80211_IFTYPE_ADHOC) {
4340 		freq = nl80211_get_assoc_freq(drv);
4341 		wpa_printf(MSG_DEBUG,
4342 			   "nl80211: send_mlme - Use assoc_freq=%u for IBSS",
4343 			   freq);
4344 	}
4345 	if (freq == 0) {
4346 		wpa_printf(MSG_DEBUG, "nl80211: send_mlme - Use bss->freq=%u",
4347 			   bss->flink->freq);
4348 		freq = bss->flink->freq;
4349 	}
4350 
4351 	if (drv->use_monitor && is_ap_interface(drv->nlmode)) {
4352 		wpa_printf(MSG_DEBUG,
4353 			   "nl80211: send_frame(freq=%u bss->freq=%u) -> send_monitor",
4354 			   freq, bss->flink->freq);
4355 		return nl80211_send_monitor(drv, data, data_len, encrypt,
4356 					    noack);
4357 	}
4358 
4359 	if (noack || WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT ||
4360 	    WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_ACTION)
4361 		use_cookie = 0;
4362 send_frame_cmd:
4363 #ifdef CONFIG_TESTING_OPTIONS
4364 	if (no_encrypt && !encrypt && !drv->use_monitor) {
4365 		wpa_printf(MSG_DEBUG,
4366 			   "nl80211: Request to send an unencrypted frame - use a monitor interface for this");
4367 		if (nl80211_create_monitor_interface(drv) < 0)
4368 			return -1;
4369 		res = nl80211_send_monitor(drv, data, data_len, encrypt,
4370 					   noack);
4371 		nl80211_remove_monitor_interface(drv);
4372 		return res;
4373 	}
4374 #endif /* CONFIG_TESTING_OPTIONS */
4375 
4376 	wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame_cmd");
4377 	res = nl80211_send_frame_cmd(bss, freq, wait_time, data, data_len,
4378 				     use_cookie, no_cck, noack, offchanok,
4379 				     csa_offs, csa_offs_len);
4380 
4381 	return res;
4382 }
4383 
4384 
nl80211_put_basic_rates(struct nl_msg * msg,const int * basic_rates)4385 static int nl80211_put_basic_rates(struct nl_msg *msg, const int *basic_rates)
4386 {
4387 	u8 rates[NL80211_MAX_SUPP_RATES];
4388 	u8 rates_len = 0;
4389 	int i;
4390 
4391 	if (!basic_rates)
4392 		return 0;
4393 
4394 	for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0; i++)
4395 		rates[rates_len++] = basic_rates[i] / 5;
4396 
4397 	return nla_put(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
4398 }
4399 
4400 
nl80211_set_bss(struct i802_bss * bss,int cts,int preamble,int slot,int ht_opmode,int ap_isolate,const int * basic_rates)4401 static int nl80211_set_bss(struct i802_bss *bss, int cts, int preamble,
4402 			   int slot, int ht_opmode, int ap_isolate,
4403 			   const int *basic_rates)
4404 {
4405 	struct wpa_driver_nl80211_data *drv = bss->drv;
4406 	struct nl_msg *msg;
4407 
4408 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_BSS)) ||
4409 	    (cts >= 0 &&
4410 	     nla_put_u8(msg, NL80211_ATTR_BSS_CTS_PROT, cts)) ||
4411 	    (preamble >= 0 &&
4412 	     nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble)) ||
4413 	    (slot >= 0 &&
4414 	     nla_put_u8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot)) ||
4415 	    (ht_opmode >= 0 &&
4416 	     nla_put_u16(msg, NL80211_ATTR_BSS_HT_OPMODE, ht_opmode)) ||
4417 	    (ap_isolate >= 0 &&
4418 	     nla_put_u8(msg, NL80211_ATTR_AP_ISOLATE, ap_isolate)) ||
4419 	    nl80211_put_basic_rates(msg, basic_rates)) {
4420 		nlmsg_free(msg);
4421 		return -ENOBUFS;
4422 	}
4423 
4424 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4425 }
4426 
4427 
wpa_driver_nl80211_set_acl(void * priv,struct hostapd_acl_params * params)4428 static int wpa_driver_nl80211_set_acl(void *priv,
4429 				      struct hostapd_acl_params *params)
4430 {
4431 	struct i802_bss *bss = priv;
4432 	struct wpa_driver_nl80211_data *drv = bss->drv;
4433 	struct nl_msg *msg;
4434 	struct nl_msg *acl;
4435 	unsigned int i;
4436 	int ret;
4437 	size_t acl_nla_sz, acl_nlmsg_sz, nla_sz, nlmsg_sz;
4438 
4439 	if (!(drv->capa.max_acl_mac_addrs))
4440 		return -ENOTSUP;
4441 
4442 	if (params->num_mac_acl > drv->capa.max_acl_mac_addrs)
4443 		return -ENOTSUP;
4444 
4445 	wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
4446 		   params->acl_policy ? "Accept" : "Deny", params->num_mac_acl);
4447 
4448 	acl_nla_sz = nla_total_size(ETH_ALEN) * params->num_mac_acl;
4449 	acl_nlmsg_sz = nlmsg_total_size(acl_nla_sz);
4450 	acl = nlmsg_alloc_size(acl_nlmsg_sz);
4451 	if (!acl)
4452 		return -ENOMEM;
4453 	for (i = 0; i < params->num_mac_acl; i++) {
4454 		if (nla_put(acl, i + 1, ETH_ALEN, params->mac_acl[i].addr)) {
4455 			nlmsg_free(acl);
4456 			return -ENOMEM;
4457 		}
4458 	}
4459 
4460 	/*
4461 	 * genetlink message header (Length of user header is 0) +
4462 	 * u32 attr: NL80211_ATTR_IFINDEX +
4463 	 * u32 attr: NL80211_ATTR_ACL_POLICY +
4464 	 * nested acl attr
4465 	 */
4466 	nla_sz = GENL_HDRLEN +
4467 		nla_total_size(4) * 2 +
4468 		nla_total_size(acl_nla_sz);
4469 	nlmsg_sz = nlmsg_total_size(nla_sz);
4470 	if (!(msg = nl80211_ifindex_msg_build(drv, nlmsg_alloc_size(nlmsg_sz),
4471 					      drv->ifindex, 0,
4472 					      NL80211_CMD_SET_MAC_ACL)) ||
4473 	    nla_put_u32(msg, NL80211_ATTR_ACL_POLICY, params->acl_policy ?
4474 			NL80211_ACL_POLICY_DENY_UNLESS_LISTED :
4475 			NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED) ||
4476 	    nla_put_nested(msg, NL80211_ATTR_MAC_ADDRS, acl)) {
4477 		nlmsg_free(msg);
4478 		nlmsg_free(acl);
4479 		return -ENOMEM;
4480 	}
4481 	nlmsg_free(acl);
4482 
4483 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4484 	if (ret) {
4485 		wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
4486 			   ret, strerror(-ret));
4487 	}
4488 
4489 	return ret;
4490 }
4491 
4492 
nl80211_put_beacon_int(struct nl_msg * msg,int beacon_int)4493 static int nl80211_put_beacon_int(struct nl_msg *msg, int beacon_int)
4494 {
4495 	if (beacon_int > 0) {
4496 		wpa_printf(MSG_DEBUG, "  * beacon_int=%d", beacon_int);
4497 		return nla_put_u32(msg, NL80211_ATTR_BEACON_INTERVAL,
4498 				   beacon_int);
4499 	}
4500 
4501 	return 0;
4502 }
4503 
4504 
nl80211_put_dtim_period(struct nl_msg * msg,int dtim_period)4505 static int nl80211_put_dtim_period(struct nl_msg *msg, int dtim_period)
4506 {
4507 	if (dtim_period > 0) {
4508 		wpa_printf(MSG_DEBUG, "  * dtim_period=%d", dtim_period);
4509 		return nla_put_u32(msg, NL80211_ATTR_DTIM_PERIOD, dtim_period);
4510 	}
4511 
4512 	return 0;
4513 }
4514 
4515 
4516 #ifdef CONFIG_MESH
nl80211_set_mesh_config(void * priv,struct wpa_driver_mesh_bss_params * params)4517 static int nl80211_set_mesh_config(void *priv,
4518 				   struct wpa_driver_mesh_bss_params *params)
4519 {
4520 	struct i802_bss *bss = priv;
4521 	struct wpa_driver_nl80211_data *drv = bss->drv;
4522 	struct nl_msg *msg;
4523 	int ret;
4524 
4525 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_MESH_CONFIG);
4526 	if (!msg)
4527 		return -1;
4528 
4529 	ret = nl80211_put_mesh_config(msg, params);
4530 	if (ret < 0) {
4531 		nlmsg_free(msg);
4532 		return ret;
4533 	}
4534 
4535 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4536 	if (ret) {
4537 		wpa_printf(MSG_ERROR,
4538 			   "nl80211: Mesh config set failed: %d (%s)",
4539 			   ret, strerror(-ret));
4540 		return ret;
4541 	}
4542 	return 0;
4543 }
4544 #endif /* CONFIG_MESH */
4545 
4546 
nl80211_put_beacon_rate(struct nl_msg * msg,u64 flags,u64 flags2,struct wpa_driver_ap_params * params)4547 static int nl80211_put_beacon_rate(struct nl_msg *msg, u64 flags, u64 flags2,
4548 				   struct wpa_driver_ap_params *params)
4549 {
4550 	struct nlattr *bands, *band;
4551 	struct nl80211_txrate_vht vht_rate;
4552 	struct nl80211_txrate_he he_rate;
4553 
4554 	if (!params->freq ||
4555 	    (params->beacon_rate == 0 &&
4556 	     params->rate_type == BEACON_RATE_LEGACY))
4557 		return 0;
4558 
4559 	bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
4560 	if (!bands)
4561 		return -1;
4562 
4563 	switch (params->freq->mode) {
4564 	case HOSTAPD_MODE_IEEE80211B:
4565 	case HOSTAPD_MODE_IEEE80211G:
4566 		band = nla_nest_start(msg, NL80211_BAND_2GHZ);
4567 		break;
4568 	case HOSTAPD_MODE_IEEE80211A:
4569 		if (is_6ghz_freq(params->freq->freq))
4570 			band = nla_nest_start(msg, NL80211_BAND_6GHZ);
4571 		else
4572 			band = nla_nest_start(msg, NL80211_BAND_5GHZ);
4573 		break;
4574 	case HOSTAPD_MODE_IEEE80211AD:
4575 		band = nla_nest_start(msg, NL80211_BAND_60GHZ);
4576 		break;
4577 	default:
4578 		return 0;
4579 	}
4580 
4581 	if (!band)
4582 		return -1;
4583 
4584 	os_memset(&vht_rate, 0, sizeof(vht_rate));
4585 	os_memset(&he_rate, 0, sizeof(he_rate));
4586 
4587 	switch (params->rate_type) {
4588 	case BEACON_RATE_LEGACY:
4589 		if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_LEGACY)) {
4590 			wpa_printf(MSG_INFO,
4591 				   "nl80211: Driver does not support setting Beacon frame rate (legacy)");
4592 			return -1;
4593 		}
4594 
4595 		if (nla_put_u8(msg, NL80211_TXRATE_LEGACY,
4596 			       (u8) params->beacon_rate / 5) ||
4597 		    nla_put(msg, NL80211_TXRATE_HT, 0, NULL) ||
4598 		    (params->freq->vht_enabled &&
4599 		     nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4600 			     &vht_rate)))
4601 			return -1;
4602 
4603 		wpa_printf(MSG_DEBUG, " * beacon_rate = legacy:%u (* 100 kbps)",
4604 			   params->beacon_rate);
4605 		break;
4606 	case BEACON_RATE_HT:
4607 		if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_HT)) {
4608 			wpa_printf(MSG_INFO,
4609 				   "nl80211: Driver does not support setting Beacon frame rate (HT)");
4610 			return -1;
4611 		}
4612 		if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL) ||
4613 		    nla_put_u8(msg, NL80211_TXRATE_HT, params->beacon_rate) ||
4614 		    (params->freq->vht_enabled &&
4615 		     nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4616 			     &vht_rate)))
4617 			return -1;
4618 		wpa_printf(MSG_DEBUG, " * beacon_rate = HT-MCS %u",
4619 			   params->beacon_rate);
4620 		break;
4621 	case BEACON_RATE_VHT:
4622 		if (!(flags & WPA_DRIVER_FLAGS_BEACON_RATE_VHT)) {
4623 			wpa_printf(MSG_INFO,
4624 				   "nl80211: Driver does not support setting Beacon frame rate (VHT)");
4625 			return -1;
4626 		}
4627 		vht_rate.mcs[0] = BIT(params->beacon_rate);
4628 		if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL))
4629 			return -1;
4630 		if (nla_put(msg, NL80211_TXRATE_HT, 0, NULL))
4631 			return -1;
4632 		if (nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4633 			    &vht_rate))
4634 			return -1;
4635 		wpa_printf(MSG_DEBUG, " * beacon_rate = VHT-MCS %u",
4636 			   params->beacon_rate);
4637 		break;
4638 	case BEACON_RATE_HE:
4639 		if (!(flags2 & WPA_DRIVER_FLAGS2_BEACON_RATE_HE)) {
4640 			wpa_printf(MSG_INFO,
4641 				   "nl80211: Driver does not support setting Beacon frame rate (HE)");
4642 			return -1;
4643 		}
4644 		he_rate.mcs[0] = BIT(params->beacon_rate);
4645 		if (nla_put(msg, NL80211_TXRATE_LEGACY, 0, NULL) ||
4646 		    nla_put(msg, NL80211_TXRATE_HT, 0, NULL) ||
4647 		    nla_put(msg, NL80211_TXRATE_VHT, sizeof(vht_rate),
4648 			    &vht_rate) ||
4649 		    nla_put(msg, NL80211_TXRATE_HE, sizeof(he_rate), &he_rate))
4650 			return -1;
4651 		wpa_printf(MSG_DEBUG, " * beacon_rate = HE-MCS %u",
4652 			   params->beacon_rate);
4653 		break;
4654 	}
4655 
4656 	nla_nest_end(msg, band);
4657 	nla_nest_end(msg, bands);
4658 
4659 	return 0;
4660 }
4661 
4662 
nl80211_set_multicast_to_unicast(struct i802_bss * bss,int multicast_to_unicast)4663 static int nl80211_set_multicast_to_unicast(struct i802_bss *bss,
4664 					    int multicast_to_unicast)
4665 {
4666 	struct wpa_driver_nl80211_data *drv = bss->drv;
4667 	struct nl_msg *msg;
4668 	int ret;
4669 
4670 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_MULTICAST_TO_UNICAST);
4671 	if (!msg ||
4672 	    (multicast_to_unicast &&
4673 	     nla_put_flag(msg, NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED))) {
4674 		wpa_printf(MSG_ERROR,
4675 			   "nl80211: Failed to build NL80211_CMD_SET_MULTICAST_TO_UNICAST msg for %s",
4676 			   bss->ifname);
4677 		nlmsg_free(msg);
4678 		return -ENOBUFS;
4679 	}
4680 
4681 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4682 
4683 	switch (ret) {
4684 	case 0:
4685 		wpa_printf(MSG_DEBUG,
4686 			   "nl80211: multicast to unicast %s on interface %s",
4687 			   multicast_to_unicast ? "enabled" : "disabled",
4688 			   bss->ifname);
4689 		break;
4690 	case -EOPNOTSUPP:
4691 		if (!multicast_to_unicast)
4692 			break;
4693 		wpa_printf(MSG_INFO,
4694 			   "nl80211: multicast to unicast not supported on interface %s",
4695 			   bss->ifname);
4696 		break;
4697 	default:
4698 		wpa_printf(MSG_ERROR,
4699 			   "nl80211: %s multicast to unicast failed with %d (%s) on interface %s",
4700 			   multicast_to_unicast ? "enabling" : "disabling",
4701 			   ret, strerror(-ret), bss->ifname);
4702 		break;
4703 	}
4704 
4705 	return ret;
4706 }
4707 
4708 
4709 #ifdef CONFIG_SAE
nl80211_put_sae_pwe(struct nl_msg * msg,enum sae_pwe pwe)4710 static int nl80211_put_sae_pwe(struct nl_msg *msg, enum sae_pwe pwe)
4711 {
4712 	u8 sae_pwe;
4713 
4714 	wpa_printf(MSG_DEBUG, "nl802111: sae_pwe=%d", pwe);
4715 	if (pwe == SAE_PWE_HUNT_AND_PECK)
4716 		sae_pwe = NL80211_SAE_PWE_HUNT_AND_PECK;
4717 	else if (pwe == SAE_PWE_HASH_TO_ELEMENT)
4718 		sae_pwe = NL80211_SAE_PWE_HASH_TO_ELEMENT;
4719 	else if (pwe == SAE_PWE_BOTH)
4720 		sae_pwe = NL80211_SAE_PWE_BOTH;
4721 	else if (pwe == SAE_PWE_FORCE_HUNT_AND_PECK)
4722 		return 0; /* special test mode */
4723 	else
4724 		return -1;
4725 	if (nla_put_u8(msg, NL80211_ATTR_SAE_PWE, sae_pwe))
4726 		return -1;
4727 
4728 	return 0;
4729 }
4730 #endif /* CONFIG_SAE */
4731 
4732 
4733 #ifdef CONFIG_FILS
nl80211_fils_discovery(struct i802_bss * bss,struct nl_msg * msg,struct wpa_driver_ap_params * params)4734 static int nl80211_fils_discovery(struct i802_bss *bss, struct nl_msg *msg,
4735 				  struct wpa_driver_ap_params *params)
4736 {
4737 	struct nlattr *attr;
4738 
4739 	if (!bss->drv->fils_discovery) {
4740 		wpa_printf(MSG_ERROR,
4741 			   "nl80211: Driver does not support FILS Discovery frame transmission for %s",
4742 			   bss->ifname);
4743 		return -1;
4744 	}
4745 
4746 	attr = nla_nest_start(msg, NL80211_ATTR_FILS_DISCOVERY);
4747 	if (!attr ||
4748 	    nla_put_u32(msg, NL80211_FILS_DISCOVERY_ATTR_INT_MIN,
4749 			params->fd_min_int) ||
4750 	    nla_put_u32(msg, NL80211_FILS_DISCOVERY_ATTR_INT_MAX,
4751 			params->fd_max_int) ||
4752 	    (params->fd_frame_tmpl &&
4753 	     nla_put(msg, NL80211_FILS_DISCOVERY_ATTR_TMPL,
4754 		     params->fd_frame_tmpl_len, params->fd_frame_tmpl)))
4755 		return -1;
4756 
4757 	nla_nest_end(msg, attr);
4758 	return 0;
4759 }
4760 #endif /* CONFIG_FILS */
4761 
4762 
4763 #ifdef CONFIG_IEEE80211AX
4764 
nl80211_unsol_bcast_probe_resp(struct i802_bss * bss,struct nl_msg * msg,struct wpa_driver_ap_params * params)4765 static int nl80211_unsol_bcast_probe_resp(struct i802_bss *bss,
4766 					  struct nl_msg *msg,
4767 					  struct wpa_driver_ap_params *params)
4768 {
4769 	struct nlattr *attr;
4770 
4771 	if (!bss->drv->unsol_bcast_probe_resp) {
4772 		wpa_printf(MSG_ERROR,
4773 			   "nl80211: Driver does not support unsolicited broadcast Probe Response frame transmission for %s",
4774 			   bss->ifname);
4775 		return -1;
4776 	}
4777 
4778 	wpa_printf(MSG_DEBUG,
4779 		   "nl80211: Unsolicited broadcast Probe Response frame interval: %u",
4780 		   params->unsol_bcast_probe_resp_interval);
4781 	attr = nla_nest_start(msg, NL80211_ATTR_UNSOL_BCAST_PROBE_RESP);
4782 	if (!attr ||
4783 	    nla_put_u32(msg, NL80211_UNSOL_BCAST_PROBE_RESP_ATTR_INT,
4784 			params->unsol_bcast_probe_resp_interval) ||
4785 	    (params->unsol_bcast_probe_resp_tmpl &&
4786 	     nla_put(msg, NL80211_UNSOL_BCAST_PROBE_RESP_ATTR_TMPL,
4787 		     params->unsol_bcast_probe_resp_tmpl_len,
4788 		     params->unsol_bcast_probe_resp_tmpl)))
4789 		return -1;
4790 
4791 	nla_nest_end(msg, attr);
4792 	return 0;
4793 }
4794 
4795 
nl80211_mbssid(struct nl_msg * msg,struct wpa_driver_ap_params * params)4796 static int nl80211_mbssid(struct nl_msg *msg,
4797 			 struct wpa_driver_ap_params *params)
4798 {
4799 	struct nlattr *config, *elems;
4800 	int ifidx;
4801 
4802 	if (!params->mbssid_tx_iface)
4803 		return 0;
4804 
4805 	config = nla_nest_start(msg, NL80211_ATTR_MBSSID_CONFIG);
4806 	if (!config ||
4807 	    nla_put_u8(msg, NL80211_MBSSID_CONFIG_ATTR_INDEX,
4808 		       params->mbssid_index))
4809 		return -1;
4810 
4811 	if (params->mbssid_tx_iface) {
4812 		ifidx = if_nametoindex(params->mbssid_tx_iface);
4813 		if (ifidx <= 0 ||
4814 		    nla_put_u32(msg, NL80211_MBSSID_CONFIG_ATTR_TX_IFINDEX,
4815 				ifidx))
4816 			return -1;
4817 	}
4818 
4819 	if (params->ema && nla_put_flag(msg, NL80211_MBSSID_CONFIG_ATTR_EMA))
4820 		return -1;
4821 
4822 	nla_nest_end(msg, config);
4823 
4824 	if (params->mbssid_elem_count && params->mbssid_elem_len &&
4825 	    params->mbssid_elem_offset && *params->mbssid_elem_offset) {
4826 		u8 i, **offs = params->mbssid_elem_offset;
4827 
4828 		elems = nla_nest_start(msg, NL80211_ATTR_MBSSID_ELEMS);
4829 		if (!elems)
4830 			return -1;
4831 
4832 		for (i = 0; i < params->mbssid_elem_count - 1; i++) {
4833 			if (nla_put(msg, i + 1, offs[i + 1] - offs[i], offs[i]))
4834 				return -1;
4835 		}
4836 
4837 		if (nla_put(msg, i + 1,
4838 			    *offs + params->mbssid_elem_len - offs[i],
4839 			    offs[i]))
4840 			return -1;
4841 
4842 		nla_nest_end(msg, elems);
4843 	}
4844 
4845 	if (!params->ema)
4846 		return 0;
4847 
4848 	if (params->rnr_elem_count && params->rnr_elem_len &&
4849 	    params->rnr_elem_offset && *params->rnr_elem_offset) {
4850 		u8 i, **offs = params->rnr_elem_offset;
4851 
4852 		elems = nla_nest_start(msg, NL80211_ATTR_EMA_RNR_ELEMS);
4853 		if (!elems)
4854 			return -1;
4855 
4856 		for (i = 0; i < params->rnr_elem_count - 1; i++) {
4857 			if (nla_put(msg, i + 1, offs[i + 1] - offs[i], offs[i]))
4858 				return -1;
4859 		}
4860 
4861 		if (nla_put(msg, i + 1, *offs + params->rnr_elem_len - offs[i],
4862 			    offs[i]))
4863 			return -1;
4864 		nla_nest_end(msg, elems);
4865 	}
4866 
4867 	return 0;
4868 }
4869 
4870 #endif /* CONFIG_IEEE80211AX */
4871 
4872 
4873 #ifdef CONFIG_DRIVER_NL80211_QCA
qca_set_allowed_ap_freqs(struct wpa_driver_nl80211_data * drv,const int * freqs,int num_freqs)4874 static void qca_set_allowed_ap_freqs(struct wpa_driver_nl80211_data *drv,
4875 				    const int *freqs, int num_freqs)
4876 {
4877 	struct nl_msg *msg;
4878 	struct nlattr *params, *freqs_list;
4879 	int i, ret;
4880 
4881 	if (!drv->set_wifi_conf_vendor_cmd_avail || !drv->qca_ap_allowed_freqs)
4882 		return;
4883 
4884 	wpa_printf(MSG_DEBUG, "nl80211: Set AP allowed frequency list");
4885 
4886 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
4887 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
4888 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
4889 			QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
4890 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)))
4891 		goto err;
4892 
4893 	freqs_list = nla_nest_start(
4894 		msg, QCA_WLAN_VENDOR_ATTR_CONFIG_AP_ALLOWED_FREQ_LIST);
4895 	if (!freqs_list)
4896 		goto err;
4897 
4898 	for (i = 0; i < num_freqs; i++) {
4899 		if (nla_put_u32(msg, i, freqs[i]))
4900 			goto err;
4901 	}
4902 
4903 	nla_nest_end(msg, freqs_list);
4904 	nla_nest_end(msg, params);
4905 
4906 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
4907 	if (ret)
4908 		wpa_printf(MSG_ERROR,
4909 			   "nl80211: Failed set AP alllowed frequency list: %d (%s)",
4910 			   ret, strerror(-ret));
4911 
4912 	return;
4913 err:
4914 	nlmsg_free(msg);
4915 }
4916 #endif /* CONFIG_DRIVER_NL80211_QCA */
4917 
4918 
wpa_driver_nl80211_set_ap(void * priv,struct wpa_driver_ap_params * params)4919 static int wpa_driver_nl80211_set_ap(void *priv,
4920 				     struct wpa_driver_ap_params *params)
4921 {
4922 	struct i802_bss *bss = priv;
4923 	struct wpa_driver_nl80211_data *drv = bss->drv;
4924 	struct nl_msg *msg;
4925 	u8 cmd = NL80211_CMD_NEW_BEACON;
4926 	int ret = -ENOBUFS;
4927 	int beacon_set;
4928 	int num_suites;
4929 	u32 suites[20], suite;
4930 	u32 ver;
4931 #ifdef CONFIG_MESH
4932 	struct wpa_driver_mesh_bss_params mesh_params;
4933 #endif /* CONFIG_MESH */
4934 
4935 	beacon_set = params->reenable ? 0 : bss->flink->beacon_set;
4936 
4937 	wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
4938 		   beacon_set);
4939 	if (beacon_set)
4940 		cmd = NL80211_CMD_SET_BEACON;
4941 	else if (!drv->device_ap_sme && !drv->use_monitor &&
4942 		 !nl80211_get_wiphy_data_ap(bss))
4943 		return -ENOBUFS;
4944 
4945 	wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
4946 		    params->head, params->head_len);
4947 	wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
4948 		    params->tail, params->tail_len);
4949 	wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", bss->ifindex);
4950 	wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
4951 	wpa_printf(MSG_DEBUG, "nl80211: beacon_rate=%u", params->beacon_rate);
4952 	wpa_printf(MSG_DEBUG, "nl80211: rate_type=%d", params->rate_type);
4953 	wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
4954 	wpa_printf(MSG_DEBUG, "nl80211: ssid=%s",
4955 		   wpa_ssid_txt(params->ssid, params->ssid_len));
4956 	if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
4957 	    nla_put(msg, NL80211_ATTR_BEACON_HEAD, params->head_len,
4958 		    params->head) ||
4959 	    nla_put(msg, NL80211_ATTR_BEACON_TAIL, params->tail_len,
4960 		    params->tail) ||
4961 	    nl80211_put_beacon_int(msg, params->beacon_int) ||
4962 	    nl80211_put_beacon_rate(msg, drv->capa.flags, drv->capa.flags2,
4963 				    params) ||
4964 	    nl80211_put_dtim_period(msg, params->dtim_period) ||
4965 	    nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
4966 		goto fail;
4967 	if (params->proberesp && params->proberesp_len) {
4968 		wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
4969 			    params->proberesp, params->proberesp_len);
4970 		if (nla_put(msg, NL80211_ATTR_PROBE_RESP, params->proberesp_len,
4971 			    params->proberesp))
4972 			goto fail;
4973 	}
4974 	switch (params->hide_ssid) {
4975 	case NO_SSID_HIDING:
4976 		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
4977 		if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4978 				NL80211_HIDDEN_SSID_NOT_IN_USE))
4979 			goto fail;
4980 		break;
4981 	case HIDDEN_SSID_ZERO_LEN:
4982 		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
4983 		if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4984 				NL80211_HIDDEN_SSID_ZERO_LEN))
4985 			goto fail;
4986 		break;
4987 	case HIDDEN_SSID_ZERO_CONTENTS:
4988 		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
4989 		if (nla_put_u32(msg, NL80211_ATTR_HIDDEN_SSID,
4990 				NL80211_HIDDEN_SSID_ZERO_CONTENTS))
4991 			goto fail;
4992 		break;
4993 	}
4994 	wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
4995 	if (params->privacy &&
4996 	    nla_put_flag(msg, NL80211_ATTR_PRIVACY))
4997 		goto fail;
4998 	wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
4999 	if ((params->auth_algs & (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) ==
5000 	    (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) {
5001 		/* Leave out the attribute */
5002 	} else if (params->auth_algs & WPA_AUTH_ALG_SHARED) {
5003 		if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
5004 				NL80211_AUTHTYPE_SHARED_KEY))
5005 			goto fail;
5006 	} else {
5007 		if (nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE,
5008 				NL80211_AUTHTYPE_OPEN_SYSTEM))
5009 			goto fail;
5010 	}
5011 
5012 	wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
5013 	ver = 0;
5014 	if (params->wpa_version & WPA_PROTO_WPA)
5015 		ver |= NL80211_WPA_VERSION_1;
5016 	if (params->wpa_version & WPA_PROTO_RSN)
5017 		ver |= NL80211_WPA_VERSION_2;
5018 	if (ver &&
5019 	    nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
5020 		goto fail;
5021 
5022 	wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
5023 		   params->key_mgmt_suites);
5024 	num_suites = wpa_key_mgmt_to_suites(params->key_mgmt_suites,
5025 					    suites, ARRAY_SIZE(suites));
5026 	if (num_suites > NL80211_MAX_NR_AKM_SUITES)
5027 		wpa_printf(MSG_DEBUG,
5028 			   "nl80211: Not enough room for all AKM suites (num_suites=%d > NL80211_MAX_NR_AKM_SUITES)",
5029 			   num_suites);
5030 	else if (num_suites &&
5031 		 nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32),
5032 			 suites))
5033 		goto fail;
5034 
5035 	if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
5036 	    (!params->pairwise_ciphers ||
5037 	     params->pairwise_ciphers & (WPA_CIPHER_WEP104 | WPA_CIPHER_WEP40)) &&
5038 	    (nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
5039 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT)))
5040 		goto fail;
5041 
5042 	if (drv->device_ap_sme) {
5043 		u32 flags = 0;
5044 
5045 		if (params->key_mgmt_suites & (WPA_KEY_MGMT_SAE |
5046 					       WPA_KEY_MGMT_SAE_EXT_KEY)) {
5047 			/* Add the previously used flag attribute to support
5048 			 * older kernel versions and the newer flag bit for
5049 			 * newer kernels. */
5050 			if (nla_put_flag(msg,
5051 					 NL80211_ATTR_EXTERNAL_AUTH_SUPPORT))
5052 				goto fail;
5053 			flags |= NL80211_AP_SETTINGS_EXTERNAL_AUTH_SUPPORT;
5054 		}
5055 
5056 		flags |= NL80211_AP_SETTINGS_SA_QUERY_OFFLOAD_SUPPORT;
5057 
5058 		if (nla_put_u32(msg, NL80211_ATTR_AP_SETTINGS_FLAGS, flags))
5059 			goto fail;
5060 	}
5061 
5062 	wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
5063 		   params->pairwise_ciphers);
5064 	num_suites = wpa_cipher_to_cipher_suites(params->pairwise_ciphers,
5065 						 suites, ARRAY_SIZE(suites));
5066 	if (num_suites &&
5067 	    nla_put(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
5068 		    num_suites * sizeof(u32), suites))
5069 		goto fail;
5070 
5071 	wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
5072 		   params->group_cipher);
5073 	suite = wpa_cipher_to_cipher_suite(params->group_cipher);
5074 	if (suite &&
5075 	    nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, suite))
5076 		goto fail;
5077 
5078 	if (params->beacon_ies) {
5079 		wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
5080 				params->beacon_ies);
5081 		if (nla_put(msg, NL80211_ATTR_IE,
5082 			    wpabuf_len(params->beacon_ies),
5083 			    wpabuf_head(params->beacon_ies)))
5084 			goto fail;
5085 	}
5086 	if (params->proberesp_ies) {
5087 		wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
5088 				params->proberesp_ies);
5089 		if (nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
5090 			    wpabuf_len(params->proberesp_ies),
5091 			    wpabuf_head(params->proberesp_ies)))
5092 			goto fail;
5093 	}
5094 	if (params->assocresp_ies) {
5095 		wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
5096 				params->assocresp_ies);
5097 		if (nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
5098 			    wpabuf_len(params->assocresp_ies),
5099 			    wpabuf_head(params->assocresp_ies)))
5100 			goto fail;
5101 	}
5102 
5103 	if (drv->capa.flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER)  {
5104 		wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
5105 			   params->ap_max_inactivity);
5106 		if (nla_put_u16(msg, NL80211_ATTR_INACTIVITY_TIMEOUT,
5107 				params->ap_max_inactivity))
5108 			goto fail;
5109 	}
5110 
5111 #ifdef CONFIG_P2P
5112 	if (params->p2p_go_ctwindow > 0) {
5113 		if (drv->p2p_go_ctwindow_supported) {
5114 			wpa_printf(MSG_DEBUG, "nl80211: P2P GO ctwindow=%d",
5115 				   params->p2p_go_ctwindow);
5116 			if (nla_put_u8(msg, NL80211_ATTR_P2P_CTWINDOW,
5117 				       params->p2p_go_ctwindow))
5118 				goto fail;
5119 		} else {
5120 			wpa_printf(MSG_INFO,
5121 				   "nl80211: Driver does not support CTWindow configuration - ignore this parameter");
5122 		}
5123 	}
5124 #endif /* CONFIG_P2P */
5125 
5126 	if (params->pbss) {
5127 		wpa_printf(MSG_DEBUG, "nl80211: PBSS");
5128 		if (nla_put_flag(msg, NL80211_ATTR_PBSS))
5129 			goto fail;
5130 	}
5131 
5132 	if (params->ftm_responder) {
5133 		struct nlattr *ftm;
5134 
5135 		if (!(drv->capa.flags & WPA_DRIVER_FLAGS_FTM_RESPONDER)) {
5136 			ret = -ENOTSUP;
5137 			goto fail;
5138 		}
5139 
5140 		ftm = nla_nest_start(msg, NL80211_ATTR_FTM_RESPONDER);
5141 		if (!ftm ||
5142 		    nla_put_flag(msg, NL80211_FTM_RESP_ATTR_ENABLED) ||
5143 		    (params->lci &&
5144 		     nla_put(msg, NL80211_FTM_RESP_ATTR_LCI,
5145 			     wpabuf_len(params->lci),
5146 			     wpabuf_head(params->lci))) ||
5147 		    (params->civic &&
5148 		     nla_put(msg, NL80211_FTM_RESP_ATTR_CIVICLOC,
5149 			     wpabuf_len(params->civic),
5150 			     wpabuf_head(params->civic))))
5151 			goto fail;
5152 		nla_nest_end(msg, ftm);
5153 	}
5154 
5155 #ifdef CONFIG_IEEE80211AX
5156 	if (params->he_spr_ctrl) {
5157 		struct nlattr *spr;
5158 
5159 		spr = nla_nest_start(msg, NL80211_ATTR_HE_OBSS_PD);
5160 		wpa_printf(MSG_DEBUG, "nl80211: he_spr_ctrl=0x%x",
5161 			   params->he_spr_ctrl);
5162 
5163 		if (!spr ||
5164 		    nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_SR_CTRL,
5165 			       params->he_spr_ctrl) ||
5166 		    ((params->he_spr_ctrl &
5167 		      SPATIAL_REUSE_NON_SRG_OFFSET_PRESENT) &&
5168 		     nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_NON_SRG_MAX_OFFSET,
5169 				params->he_spr_non_srg_obss_pd_max_offset)))
5170 			goto fail;
5171 
5172 		if ((params->he_spr_ctrl &
5173 		     SPATIAL_REUSE_SRG_INFORMATION_PRESENT) &&
5174 		    (nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET,
5175 				params->he_spr_srg_obss_pd_min_offset) ||
5176 		     nla_put_u8(msg, NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET,
5177 				params->he_spr_srg_obss_pd_max_offset) ||
5178 		     nla_put(msg, NL80211_HE_OBSS_PD_ATTR_BSS_COLOR_BITMAP,
5179 			     sizeof(params->he_spr_bss_color_bitmap),
5180 			     params->he_spr_bss_color_bitmap) ||
5181 		     nla_put(msg, NL80211_HE_OBSS_PD_ATTR_PARTIAL_BSSID_BITMAP,
5182 			     sizeof(params->he_spr_partial_bssid_bitmap),
5183 			     params->he_spr_partial_bssid_bitmap)))
5184 			goto fail;
5185 
5186 		nla_nest_end(msg, spr);
5187 	}
5188 
5189 	if (params->freq && nl80211_put_freq_params(msg, params->freq) < 0)
5190 		goto fail;
5191 
5192 	if (params->freq && params->freq->he_enabled) {
5193 		struct nlattr *bss_color;
5194 
5195 		bss_color = nla_nest_start(msg, NL80211_ATTR_HE_BSS_COLOR);
5196 		if (!bss_color ||
5197 		    (params->he_bss_color_disabled &&
5198 		     nla_put_flag(msg, NL80211_HE_BSS_COLOR_ATTR_DISABLED)) ||
5199 		    (params->he_bss_color_partial &&
5200 		     nla_put_flag(msg, NL80211_HE_BSS_COLOR_ATTR_PARTIAL)) ||
5201 		    nla_put_u8(msg, NL80211_HE_BSS_COLOR_ATTR_COLOR,
5202 			       params->he_bss_color))
5203 			goto fail;
5204 		nla_nest_end(msg, bss_color);
5205 	}
5206 
5207 	if (params->twt_responder) {
5208 		wpa_printf(MSG_DEBUG, "nl80211: twt_responder=%d",
5209 			   params->twt_responder);
5210 		if (nla_put_flag(msg, NL80211_ATTR_TWT_RESPONDER))
5211 			goto fail;
5212 	}
5213 
5214 	if (params->unsol_bcast_probe_resp_interval &&
5215 	    nl80211_unsol_bcast_probe_resp(bss, msg, params) < 0)
5216 		goto fail;
5217 
5218 	if (nl80211_mbssid(msg, params) < 0)
5219 		goto fail;
5220 #endif /* CONFIG_IEEE80211AX */
5221 
5222 #ifdef CONFIG_SAE
5223 	if (wpa_key_mgmt_sae(params->key_mgmt_suites) &&
5224 	    nl80211_put_sae_pwe(msg, params->sae_pwe) < 0)
5225 		goto fail;
5226 #endif /* CONFIG_SAE */
5227 
5228 #ifdef CONFIG_FILS
5229 	if (params->fd_max_int && nl80211_fils_discovery(bss, msg, params) < 0)
5230 		goto fail;
5231 #endif /* CONFIG_FILS */
5232 
5233 	if (params->punct_bitmap) {
5234 		wpa_printf(MSG_DEBUG, "nl80211: Puncturing bitmap=0x%04x",
5235 			   params->punct_bitmap);
5236 		if (nla_put_u32(msg, NL80211_ATTR_PUNCT_BITMAP,
5237 				params->punct_bitmap))
5238 			goto fail;
5239 	}
5240 
5241 #ifdef CONFIG_DRIVER_NL80211_QCA
5242 	if (cmd == NL80211_CMD_NEW_BEACON && params->allowed_freqs)
5243 		qca_set_allowed_ap_freqs(drv, params->allowed_freqs,
5244 					 int_array_len(params->allowed_freqs));
5245 #endif /* CONFIG_DRIVER_NL80211_QCA */
5246 
5247 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
5248 	if (ret) {
5249 		wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
5250 			   ret, strerror(-ret));
5251 	} else {
5252 		bss->flink->beacon_set = 1;
5253 		nl80211_set_bss(bss, params->cts_protect, params->preamble,
5254 				params->short_slot_time, params->ht_opmode,
5255 				params->isolate, params->basic_rates);
5256 		nl80211_set_multicast_to_unicast(bss,
5257 						 params->multicast_to_unicast);
5258 		if (beacon_set && params->freq &&
5259 		    params->freq->bandwidth != bss->flink->bandwidth) {
5260 			wpa_printf(MSG_DEBUG,
5261 				   "nl80211: Update BSS %s bandwidth: %d -> %d",
5262 				   bss->ifname, bss->flink->bandwidth,
5263 				   params->freq->bandwidth);
5264 			ret = nl80211_set_channel(bss, params->freq, 1);
5265 			if (ret) {
5266 				wpa_printf(MSG_DEBUG,
5267 					   "nl80211: Frequency set failed: %d (%s)",
5268 					   ret, strerror(-ret));
5269 			} else {
5270 				wpa_printf(MSG_DEBUG,
5271 					   "nl80211: Frequency set succeeded for ht2040 coex");
5272 				bss->flink->bandwidth = params->freq->bandwidth;
5273 			}
5274 		} else if (!beacon_set && params->freq) {
5275 			/*
5276 			 * cfg80211 updates the driver on frequence change in AP
5277 			 * mode only at the point when beaconing is started, so
5278 			 * set the initial value here.
5279 			 */
5280 			bss->flink->bandwidth = params->freq->bandwidth;
5281 		}
5282 	}
5283 
5284 #ifdef CONFIG_MESH
5285 	if (is_mesh_interface(drv->nlmode) && params->ht_opmode != -1) {
5286 		os_memset(&mesh_params, 0, sizeof(mesh_params));
5287 		mesh_params.flags |= WPA_DRIVER_MESH_CONF_FLAG_HT_OP_MODE;
5288 		mesh_params.ht_opmode = params->ht_opmode;
5289 		ret = nl80211_set_mesh_config(priv, &mesh_params);
5290 		if (ret < 0)
5291 			return ret;
5292 	}
5293 #endif /* CONFIG_MESH */
5294 
5295 	return ret;
5296 fail:
5297 	nlmsg_free(msg);
5298 	return ret;
5299 }
5300 
5301 
nl80211_put_freq_params(struct nl_msg * msg,const struct hostapd_freq_params * freq)5302 static int nl80211_put_freq_params(struct nl_msg *msg,
5303 				   const struct hostapd_freq_params *freq)
5304 {
5305 	enum hostapd_hw_mode hw_mode;
5306 	int is_24ghz;
5307 	u8 channel;
5308 
5309 	wpa_printf(MSG_DEBUG, "  * freq=%d", freq->freq);
5310 	if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq))
5311 		return -ENOBUFS;
5312 
5313 	wpa_printf(MSG_DEBUG, "  * eht_enabled=%d", freq->eht_enabled);
5314 	wpa_printf(MSG_DEBUG, "  * he_enabled=%d", freq->he_enabled);
5315 	wpa_printf(MSG_DEBUG, "  * vht_enabled=%d", freq->vht_enabled);
5316 	wpa_printf(MSG_DEBUG, "  * ht_enabled=%d", freq->ht_enabled);
5317 	wpa_printf(MSG_DEBUG, "  * radar_background=%d",
5318 		   freq->radar_background);
5319 
5320 	hw_mode = ieee80211_freq_to_chan(freq->freq, &channel);
5321 	is_24ghz = hw_mode == HOSTAPD_MODE_IEEE80211G ||
5322 		hw_mode == HOSTAPD_MODE_IEEE80211B;
5323 
5324 	if (freq->vht_enabled ||
5325 	    ((freq->he_enabled || freq->eht_enabled) && !is_24ghz)) {
5326 		enum nl80211_chan_width cw;
5327 
5328 		wpa_printf(MSG_DEBUG, "  * bandwidth=%d", freq->bandwidth);
5329 		switch (freq->bandwidth) {
5330 		case 20:
5331 			cw = NL80211_CHAN_WIDTH_20;
5332 			break;
5333 		case 40:
5334 			cw = NL80211_CHAN_WIDTH_40;
5335 			break;
5336 		case 80:
5337 			if (freq->center_freq2)
5338 				cw = NL80211_CHAN_WIDTH_80P80;
5339 			else
5340 				cw = NL80211_CHAN_WIDTH_80;
5341 			break;
5342 		case 160:
5343 			cw = NL80211_CHAN_WIDTH_160;
5344 			break;
5345 		case 320:
5346 			cw = NL80211_CHAN_WIDTH_320;
5347 			break;
5348 		default:
5349 			return -EINVAL;
5350 		}
5351 
5352 		wpa_printf(MSG_DEBUG, "  * channel_width=%d", cw);
5353 		wpa_printf(MSG_DEBUG, "  * center_freq1=%d",
5354 			   freq->center_freq1);
5355 		wpa_printf(MSG_DEBUG, "  * center_freq2=%d",
5356 			   freq->center_freq2);
5357 		if (nla_put_u32(msg, NL80211_ATTR_CHANNEL_WIDTH, cw) ||
5358 		    nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ1,
5359 				freq->center_freq1) ||
5360 		    (freq->center_freq2 &&
5361 		     nla_put_u32(msg, NL80211_ATTR_CENTER_FREQ2,
5362 				 freq->center_freq2)))
5363 			return -ENOBUFS;
5364 	} else if (freq->ht_enabled) {
5365 		enum nl80211_channel_type ct;
5366 
5367 		wpa_printf(MSG_DEBUG, "  * sec_channel_offset=%d",
5368 			   freq->sec_channel_offset);
5369 		switch (freq->sec_channel_offset) {
5370 		case -1:
5371 			ct = NL80211_CHAN_HT40MINUS;
5372 			break;
5373 		case 1:
5374 			ct = NL80211_CHAN_HT40PLUS;
5375 			break;
5376 		default:
5377 			ct = NL80211_CHAN_HT20;
5378 			break;
5379 		}
5380 
5381 		wpa_printf(MSG_DEBUG, "  * channel_type=%d", ct);
5382 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE, ct))
5383 			return -ENOBUFS;
5384 	} else if (freq->edmg.channels && freq->edmg.bw_config) {
5385 		wpa_printf(MSG_DEBUG,
5386 			   "  * EDMG configuration: channels=0x%x bw_config=%d",
5387 			   freq->edmg.channels, freq->edmg.bw_config);
5388 		if (nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_CHANNELS,
5389 			       freq->edmg.channels) ||
5390 		    nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_BW_CONFIG,
5391 			       freq->edmg.bw_config))
5392 			return -1;
5393 	} else {
5394 		wpa_printf(MSG_DEBUG, "  * channel_type=%d",
5395 			   NL80211_CHAN_NO_HT);
5396 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
5397 				NL80211_CHAN_NO_HT))
5398 			return -ENOBUFS;
5399 	}
5400 	if (freq->radar_background &&
5401 	    nla_put_flag(msg, NL80211_ATTR_RADAR_BACKGROUND))
5402 		return -ENOBUFS;
5403 
5404 	return 0;
5405 }
5406 
5407 
nl80211_set_channel(struct i802_bss * bss,struct hostapd_freq_params * freq,int set_chan)5408 static int nl80211_set_channel(struct i802_bss *bss,
5409 			       struct hostapd_freq_params *freq, int set_chan)
5410 {
5411 	struct wpa_driver_nl80211_data *drv = bss->drv;
5412 	struct nl_msg *msg;
5413 	int ret;
5414 
5415 	wpa_printf(MSG_DEBUG,
5416 		   "nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, eht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
5417 		   freq->freq, freq->ht_enabled, freq->vht_enabled,
5418 		   freq->he_enabled, freq->eht_enabled, freq->bandwidth,
5419 		   freq->center_freq1, freq->center_freq2);
5420 
5421 	msg = nl80211_drv_msg(drv, 0, set_chan ? NL80211_CMD_SET_CHANNEL :
5422 			      NL80211_CMD_SET_WIPHY);
5423 	if (!msg || nl80211_put_freq_params(msg, freq) < 0) {
5424 		nlmsg_free(msg);
5425 		return -1;
5426 	}
5427 
5428 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5429 	if (ret == 0) {
5430 		bss->flink->freq = freq->freq;
5431 		return 0;
5432 	}
5433 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
5434 		   "%d (%s)", freq->freq, ret, strerror(-ret));
5435 	return -1;
5436 }
5437 
5438 
sta_flags_nl80211(int flags)5439 static u32 sta_flags_nl80211(int flags)
5440 {
5441 	u32 f = 0;
5442 
5443 	if (flags & WPA_STA_AUTHORIZED)
5444 		f |= BIT(NL80211_STA_FLAG_AUTHORIZED);
5445 	if (flags & WPA_STA_WMM)
5446 		f |= BIT(NL80211_STA_FLAG_WME);
5447 	if (flags & WPA_STA_SHORT_PREAMBLE)
5448 		f |= BIT(NL80211_STA_FLAG_SHORT_PREAMBLE);
5449 	if (flags & WPA_STA_MFP)
5450 		f |= BIT(NL80211_STA_FLAG_MFP);
5451 	if (flags & WPA_STA_TDLS_PEER)
5452 		f |= BIT(NL80211_STA_FLAG_TDLS_PEER);
5453 	if (flags & WPA_STA_AUTHENTICATED)
5454 		f |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
5455 	if (flags & WPA_STA_ASSOCIATED)
5456 		f |= BIT(NL80211_STA_FLAG_ASSOCIATED);
5457 
5458 	return f;
5459 }
5460 
5461 
5462 #ifdef CONFIG_MESH
sta_plink_state_nl80211(enum mesh_plink_state state)5463 static u32 sta_plink_state_nl80211(enum mesh_plink_state state)
5464 {
5465 	switch (state) {
5466 	case PLINK_IDLE:
5467 		return NL80211_PLINK_LISTEN;
5468 	case PLINK_OPN_SNT:
5469 		return NL80211_PLINK_OPN_SNT;
5470 	case PLINK_OPN_RCVD:
5471 		return NL80211_PLINK_OPN_RCVD;
5472 	case PLINK_CNF_RCVD:
5473 		return NL80211_PLINK_CNF_RCVD;
5474 	case PLINK_ESTAB:
5475 		return NL80211_PLINK_ESTAB;
5476 	case PLINK_HOLDING:
5477 		return NL80211_PLINK_HOLDING;
5478 	case PLINK_BLOCKED:
5479 		return NL80211_PLINK_BLOCKED;
5480 	default:
5481 		wpa_printf(MSG_ERROR, "nl80211: Invalid mesh plink state %d",
5482 			   state);
5483 	}
5484 	return -1;
5485 }
5486 #endif /* CONFIG_MESH */
5487 
5488 
wpa_driver_nl80211_sta_add(void * priv,struct hostapd_sta_add_params * params)5489 static int wpa_driver_nl80211_sta_add(void *priv,
5490 				      struct hostapd_sta_add_params *params)
5491 {
5492 	struct i802_bss *bss = priv;
5493 	struct wpa_driver_nl80211_data *drv = bss->drv;
5494 	struct nl_msg *msg;
5495 	struct nl80211_sta_flag_update upd;
5496 	int ret = -ENOBUFS;
5497 	u8 cmd;
5498 	const char *cmd_string;
5499 
5500 	if ((params->flags & WPA_STA_TDLS_PEER) &&
5501 	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
5502 		return -EOPNOTSUPP;
5503 
5504 	if (params->mld_link_sta) {
5505 		cmd = params->set ? NL80211_CMD_MODIFY_LINK_STA :
5506 			NL80211_CMD_ADD_LINK_STA;
5507 		cmd_string = params->set ? "NL80211_CMD_MODIFY_LINK_STA" :
5508 			"NL80211_CMD_ADD_LINK_STA";
5509 	} else {
5510 		cmd = params->set ? NL80211_CMD_SET_STATION :
5511 			NL80211_CMD_NEW_STATION;
5512 		cmd_string = params->set ? "NL80211_CMD_SET_STATION" :
5513 			"NL80211_CMD_NEW_STATION";
5514 	}
5515 
5516 	wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
5517 		   cmd_string, MAC2STR(params->addr));
5518 	msg = nl80211_bss_msg(bss, 0, cmd);
5519 	if (!msg)
5520 		goto fail;
5521 
5522 	/*
5523 	 * Set the below properties only in one of the following cases:
5524 	 * 1. New station is added, already associated.
5525 	 * 2. Set WPA_STA_TDLS_PEER station.
5526 	 * 3. Set an already added unassociated station, if driver supports
5527 	 * full AP client state. (Set these properties after station became
5528 	 * associated will be rejected by the driver).
5529 	 */
5530 	if (!params->set || (params->flags & WPA_STA_TDLS_PEER) ||
5531 	    (params->set && FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags) &&
5532 	     (params->flags & WPA_STA_ASSOCIATED))) {
5533 		wpa_hexdump(MSG_DEBUG, "  * supported rates",
5534 			    params->supp_rates, params->supp_rates_len);
5535 		wpa_printf(MSG_DEBUG, "  * capability=0x%x",
5536 			   params->capability);
5537 		if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_RATES,
5538 			    params->supp_rates_len, params->supp_rates) ||
5539 		    nla_put_u16(msg, NL80211_ATTR_STA_CAPABILITY,
5540 				params->capability))
5541 			goto fail;
5542 
5543 		if (params->ht_capabilities) {
5544 			wpa_hexdump(MSG_DEBUG, "  * ht_capabilities",
5545 				    (u8 *) params->ht_capabilities,
5546 				    sizeof(*params->ht_capabilities));
5547 			if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY,
5548 				    sizeof(*params->ht_capabilities),
5549 				    params->ht_capabilities))
5550 				goto fail;
5551 		}
5552 
5553 		if (params->vht_capabilities) {
5554 			wpa_hexdump(MSG_DEBUG, "  * vht_capabilities",
5555 				    (u8 *) params->vht_capabilities,
5556 				    sizeof(*params->vht_capabilities));
5557 			if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY,
5558 				    sizeof(*params->vht_capabilities),
5559 				    params->vht_capabilities))
5560 				goto fail;
5561 		}
5562 
5563 		if (params->he_capab) {
5564 			wpa_hexdump(MSG_DEBUG, "  * he_capab",
5565 				    params->he_capab, params->he_capab_len);
5566 			if (nla_put(msg, NL80211_ATTR_HE_CAPABILITY,
5567 				    params->he_capab_len, params->he_capab))
5568 				goto fail;
5569 		}
5570 
5571 		if (params->he_6ghz_capab) {
5572 			wpa_hexdump(MSG_DEBUG, "  * he_6ghz_capab",
5573 				    params->he_6ghz_capab,
5574 				    sizeof(*params->he_6ghz_capab));
5575 			if (nla_put(msg, NL80211_ATTR_HE_6GHZ_CAPABILITY,
5576 				    sizeof(*params->he_6ghz_capab),
5577 				    params->he_6ghz_capab))
5578 				goto fail;
5579 		}
5580 
5581 		if (params->eht_capab) {
5582 			wpa_hexdump(MSG_DEBUG, "  * eht_capab",
5583 				    params->eht_capab, params->eht_capab_len);
5584 			if (nla_put(msg, NL80211_ATTR_EHT_CAPABILITY,
5585 				    params->eht_capab_len, params->eht_capab))
5586 				goto fail;
5587 		}
5588 
5589 		if (params->ext_capab) {
5590 			wpa_hexdump(MSG_DEBUG, "  * ext_capab",
5591 				    params->ext_capab, params->ext_capab_len);
5592 			if (nla_put(msg, NL80211_ATTR_STA_EXT_CAPABILITY,
5593 				    params->ext_capab_len, params->ext_capab))
5594 				goto fail;
5595 		}
5596 
5597 		if (is_ap_interface(drv->nlmode) &&
5598 		    nla_put_u8(msg, NL80211_ATTR_STA_SUPPORT_P2P_PS,
5599 			       params->support_p2p_ps ?
5600 			       NL80211_P2P_PS_SUPPORTED :
5601 			       NL80211_P2P_PS_UNSUPPORTED))
5602 			goto fail;
5603 	}
5604 	if (!params->set) {
5605 		if (params->aid) {
5606 			wpa_printf(MSG_DEBUG, "  * aid=%u", params->aid);
5607 			if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid))
5608 				goto fail;
5609 		} else {
5610 			/*
5611 			 * cfg80211 validates that AID is non-zero, so we have
5612 			 * to make this a non-zero value for the TDLS case where
5613 			 * a stub STA entry is used for now and for a station
5614 			 * that is still not associated.
5615 			 */
5616 			wpa_printf(MSG_DEBUG, "  * aid=1 (%s workaround)",
5617 				   (params->flags & WPA_STA_TDLS_PEER) ?
5618 				   "TDLS" : "UNASSOC_STA");
5619 			if (nla_put_u16(msg, NL80211_ATTR_STA_AID, 1))
5620 				goto fail;
5621 		}
5622 		wpa_printf(MSG_DEBUG, "  * listen_interval=%u",
5623 			   params->listen_interval);
5624 		if (nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
5625 				params->listen_interval))
5626 			goto fail;
5627 	} else if (params->aid && (params->flags & WPA_STA_TDLS_PEER)) {
5628 		wpa_printf(MSG_DEBUG, "  * peer_aid=%u", params->aid);
5629 		if (nla_put_u16(msg, NL80211_ATTR_PEER_AID, params->aid))
5630 			goto fail;
5631 	} else if (FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags) &&
5632 		   (params->flags & WPA_STA_ASSOCIATED)) {
5633 		wpa_printf(MSG_DEBUG, "  * aid=%u", params->aid);
5634 		wpa_printf(MSG_DEBUG, "  * listen_interval=%u",
5635 			   params->listen_interval);
5636 		if (nla_put_u16(msg, NL80211_ATTR_STA_AID, params->aid) ||
5637 		    nla_put_u16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
5638 				params->listen_interval))
5639 			goto fail;
5640 	}
5641 
5642 	if (params->vht_opmode_enabled) {
5643 		wpa_printf(MSG_DEBUG, "  * opmode=%u", params->vht_opmode);
5644 		if (nla_put_u8(msg, NL80211_ATTR_OPMODE_NOTIF,
5645 			       params->vht_opmode))
5646 			goto fail;
5647 	}
5648 
5649 	if (params->supp_channels) {
5650 		wpa_hexdump(MSG_DEBUG, "  * supported channels",
5651 			    params->supp_channels, params->supp_channels_len);
5652 		if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_CHANNELS,
5653 			    params->supp_channels_len, params->supp_channels))
5654 			goto fail;
5655 	}
5656 
5657 	if (params->supp_oper_classes) {
5658 		wpa_hexdump(MSG_DEBUG, "  * supported operating classes",
5659 			    params->supp_oper_classes,
5660 			    params->supp_oper_classes_len);
5661 		if (nla_put(msg, NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
5662 			    params->supp_oper_classes_len,
5663 			    params->supp_oper_classes))
5664 			goto fail;
5665 	}
5666 
5667 	os_memset(&upd, 0, sizeof(upd));
5668 	upd.set = sta_flags_nl80211(params->flags);
5669 	upd.mask = upd.set | sta_flags_nl80211(params->flags_mask);
5670 
5671 	/*
5672 	 * If the driver doesn't support full AP client state, ignore ASSOC/AUTH
5673 	 * flags, as nl80211 driver moves a new station, by default, into
5674 	 * associated state.
5675 	 *
5676 	 * On the other hand, if the driver supports that feature and the
5677 	 * station is added in unauthenticated state, set the
5678 	 * authenticated/associated bits in the mask to prevent moving this
5679 	 * station to associated state before it is actually associated.
5680 	 *
5681 	 * This is irrelevant for mesh mode where the station is added to the
5682 	 * driver as authenticated already, and ASSOCIATED isn't part of the
5683 	 * nl80211 API.
5684 	 */
5685 	if (!is_mesh_interface(drv->nlmode)) {
5686 		if (!FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags)) {
5687 			wpa_printf(MSG_DEBUG,
5688 				   "nl80211: Ignore ASSOC/AUTH flags since driver doesn't support full AP client state");
5689 			upd.mask &= ~(BIT(NL80211_STA_FLAG_ASSOCIATED) |
5690 				      BIT(NL80211_STA_FLAG_AUTHENTICATED));
5691 		} else if (!params->set &&
5692 			   !(params->flags & WPA_STA_TDLS_PEER)) {
5693 			if (!(params->flags & WPA_STA_AUTHENTICATED))
5694 				upd.mask |= BIT(NL80211_STA_FLAG_AUTHENTICATED);
5695 			if (!(params->flags & WPA_STA_ASSOCIATED))
5696 				upd.mask |= BIT(NL80211_STA_FLAG_ASSOCIATED);
5697 		}
5698 #ifdef CONFIG_MESH
5699 	} else {
5700 		if (params->plink_state == PLINK_ESTAB && params->peer_aid) {
5701 			ret = nla_put_u16(msg, NL80211_ATTR_MESH_PEER_AID,
5702 					  params->peer_aid);
5703 			if (ret)
5704 				goto fail;
5705 		}
5706 #endif /* CONFIG_MESH */
5707 	}
5708 
5709 	wpa_printf(MSG_DEBUG, "  * flags set=0x%x mask=0x%x",
5710 		   upd.set, upd.mask);
5711 	if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
5712 		goto fail;
5713 
5714 #ifdef CONFIG_MESH
5715 	if (params->plink_state &&
5716 	    nla_put_u8(msg, NL80211_ATTR_STA_PLINK_STATE,
5717 		       sta_plink_state_nl80211(params->plink_state)))
5718 		goto fail;
5719 #endif /* CONFIG_MESH */
5720 
5721 	if ((!params->set || (params->flags & WPA_STA_TDLS_PEER) ||
5722 	     FULL_AP_CLIENT_STATE_SUPP(drv->capa.flags)) &&
5723 	     (params->flags & WPA_STA_WMM)) {
5724 		struct nlattr *wme = nla_nest_start(msg, NL80211_ATTR_STA_WME);
5725 
5726 		wpa_printf(MSG_DEBUG, "  * qosinfo=0x%x", params->qosinfo);
5727 		if (!wme ||
5728 		    nla_put_u8(msg, NL80211_STA_WME_UAPSD_QUEUES,
5729 			       params->qosinfo & WMM_QOSINFO_STA_AC_MASK) ||
5730 		    nla_put_u8(msg, NL80211_STA_WME_MAX_SP,
5731 			       (params->qosinfo >> WMM_QOSINFO_STA_SP_SHIFT) &
5732 			       WMM_QOSINFO_STA_SP_MASK))
5733 			goto fail;
5734 		nla_nest_end(msg, wme);
5735 	}
5736 
5737 	/* In case we are an AP MLD need to always specify the link ID */
5738 	if (params->mld_link_id >= 0) {
5739 		wpa_printf(MSG_DEBUG, "  * mld_link_id=%d",
5740 			   params->mld_link_id);
5741 		if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
5742 			       params->mld_link_id))
5743 			goto fail;
5744 
5745 		/*
5746 		 * If the link address is specified the station is a non-AP MLD
5747 		 * and thus need to provide the MLD address as the station
5748 		 * address, and the non-AP MLD link address as the link address.
5749 		 */
5750 		if (params->mld_link_addr) {
5751 			wpa_printf(MSG_DEBUG, "  * mld_link_addr=" MACSTR,
5752 				   MAC2STR(params->mld_link_addr));
5753 
5754 			if (nla_put(msg, NL80211_ATTR_MLD_ADDR,
5755 				    ETH_ALEN, params->addr) ||
5756 			    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
5757 				    params->mld_link_addr))
5758 				goto fail;
5759 		} else {
5760 			if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
5761 				    params->addr))
5762 				goto fail;
5763 		}
5764 	} else {
5765 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr))
5766 			goto fail;
5767 	}
5768 
5769 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5770 	msg = NULL;
5771 	if (ret)
5772 		wpa_printf(MSG_DEBUG, "nl80211: %s result: %d (%s)",
5773 			   cmd_string, ret, strerror(-ret));
5774 	if (ret == -EEXIST)
5775 		ret = 0;
5776 fail:
5777 	nlmsg_free(msg);
5778 	return ret;
5779 }
5780 
5781 
rtnl_neigh_delete_fdb_entry(struct i802_bss * bss,const u8 * addr)5782 static void rtnl_neigh_delete_fdb_entry(struct i802_bss *bss, const u8 *addr)
5783 {
5784 #ifdef CONFIG_LIBNL3_ROUTE
5785 	struct wpa_driver_nl80211_data *drv = bss->drv;
5786 	struct rtnl_neigh *rn;
5787 	struct nl_addr *nl_addr;
5788 	int err;
5789 
5790 	rn = rtnl_neigh_alloc();
5791 	if (!rn)
5792 		return;
5793 
5794 	rtnl_neigh_set_family(rn, AF_BRIDGE);
5795 	rtnl_neigh_set_ifindex(rn, bss->ifindex);
5796 	nl_addr = nl_addr_build(AF_BRIDGE, (void *) addr, ETH_ALEN);
5797 	if (!nl_addr) {
5798 		rtnl_neigh_put(rn);
5799 		return;
5800 	}
5801 	rtnl_neigh_set_lladdr(rn, nl_addr);
5802 
5803 	err = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
5804 	if (err < 0) {
5805 		wpa_printf(MSG_DEBUG, "nl80211: bridge FDB entry delete for "
5806 			   MACSTR " ifindex=%d failed: %s", MAC2STR(addr),
5807 			   bss->ifindex, nl_geterror(err));
5808 	} else {
5809 		wpa_printf(MSG_DEBUG, "nl80211: deleted bridge FDB entry for "
5810 			   MACSTR, MAC2STR(addr));
5811 	}
5812 
5813 	nl_addr_put(nl_addr);
5814 	rtnl_neigh_put(rn);
5815 #endif /* CONFIG_LIBNL3_ROUTE */
5816 }
5817 
5818 
wpa_driver_nl80211_sta_remove(struct i802_bss * bss,const u8 * addr,int deauth,u16 reason_code)5819 static int wpa_driver_nl80211_sta_remove(struct i802_bss *bss, const u8 *addr,
5820 					 int deauth, u16 reason_code)
5821 {
5822 	struct wpa_driver_nl80211_data *drv = bss->drv;
5823 	struct nl_msg *msg;
5824 	int ret;
5825 
5826 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION)) ||
5827 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
5828 	    (deauth == 0 &&
5829 	     nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
5830 			WLAN_FC_STYPE_DISASSOC)) ||
5831 	    (deauth == 1 &&
5832 	     nla_put_u8(msg, NL80211_ATTR_MGMT_SUBTYPE,
5833 			WLAN_FC_STYPE_DEAUTH)) ||
5834 	    (reason_code &&
5835 	     nla_put_u16(msg, NL80211_ATTR_REASON_CODE, reason_code))) {
5836 		nlmsg_free(msg);
5837 		return -ENOBUFS;
5838 	}
5839 
5840 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
5841 	wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
5842 		   " --> %d (%s)",
5843 		   bss->ifname, MAC2STR(addr), ret, strerror(-ret));
5844 
5845 	if (drv->rtnl_sk)
5846 		rtnl_neigh_delete_fdb_entry(bss, addr);
5847 
5848 	if (ret == -ENOENT)
5849 		return 0;
5850 	return ret;
5851 }
5852 
5853 
nl80211_remove_iface(struct wpa_driver_nl80211_data * drv,int ifidx)5854 void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv, int ifidx)
5855 {
5856 	struct nl_msg *msg;
5857 	struct wpa_driver_nl80211_data *drv2;
5858 
5859 	wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
5860 
5861 	/* stop listening for EAPOL on this interface */
5862 	dl_list_for_each(drv2, &drv->global->interfaces,
5863 			 struct wpa_driver_nl80211_data, list)
5864 	{
5865 		del_ifidx(drv2, ifidx, IFIDX_ANY);
5866 		/* Remove all bridges learned for this iface */
5867 		del_ifidx(drv2, IFIDX_ANY, ifidx);
5868 	}
5869 
5870 	msg = nl80211_ifindex_msg(drv, ifidx, 0, NL80211_CMD_DEL_INTERFACE);
5871 	if (send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL) == 0)
5872 		return;
5873 	wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d)", ifidx);
5874 }
5875 
5876 
nl80211_iftype_str(enum nl80211_iftype mode)5877 const char * nl80211_iftype_str(enum nl80211_iftype mode)
5878 {
5879 	switch (mode) {
5880 	case NL80211_IFTYPE_ADHOC:
5881 		return "ADHOC";
5882 	case NL80211_IFTYPE_STATION:
5883 		return "STATION";
5884 	case NL80211_IFTYPE_AP:
5885 		return "AP";
5886 	case NL80211_IFTYPE_AP_VLAN:
5887 		return "AP_VLAN";
5888 	case NL80211_IFTYPE_WDS:
5889 		return "WDS";
5890 	case NL80211_IFTYPE_MONITOR:
5891 		return "MONITOR";
5892 	case NL80211_IFTYPE_MESH_POINT:
5893 		return "MESH_POINT";
5894 	case NL80211_IFTYPE_P2P_CLIENT:
5895 		return "P2P_CLIENT";
5896 	case NL80211_IFTYPE_P2P_GO:
5897 		return "P2P_GO";
5898 	case NL80211_IFTYPE_P2P_DEVICE:
5899 		return "P2P_DEVICE";
5900 	case NL80211_IFTYPE_OCB:
5901 		return "OCB";
5902 	case NL80211_IFTYPE_NAN:
5903 		return "NAN";
5904 	default:
5905 		return "unknown";
5906 	}
5907 }
5908 
5909 
nl80211_create_iface_once(struct wpa_driver_nl80211_data * drv,const char * ifname,enum nl80211_iftype iftype,const u8 * addr,int wds,int (* handler)(struct nl_msg *,void *),void * arg)5910 static int nl80211_create_iface_once(struct wpa_driver_nl80211_data *drv,
5911 				     const char *ifname,
5912 				     enum nl80211_iftype iftype,
5913 				     const u8 *addr, int wds,
5914 				     int (*handler)(struct nl_msg *, void *),
5915 				     void *arg)
5916 {
5917 	struct nl_msg *msg;
5918 	int ifidx;
5919 	int ret = -ENOBUFS;
5920 
5921 	wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
5922 		   iftype, nl80211_iftype_str(iftype));
5923 
5924 	msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_NEW_INTERFACE);
5925 	if (!msg ||
5926 	    nla_put_string(msg, NL80211_ATTR_IFNAME, ifname) ||
5927 	    nla_put_u32(msg, NL80211_ATTR_IFTYPE, iftype))
5928 		goto fail;
5929 
5930 	if (iftype == NL80211_IFTYPE_MONITOR) {
5931 		struct nlattr *flags;
5932 
5933 		flags = nla_nest_start(msg, NL80211_ATTR_MNTR_FLAGS);
5934 		if (!flags ||
5935 		    nla_put_flag(msg, NL80211_MNTR_FLAG_COOK_FRAMES))
5936 			goto fail;
5937 
5938 		nla_nest_end(msg, flags);
5939 	} else if (wds) {
5940 		if (nla_put_u8(msg, NL80211_ATTR_4ADDR, wds))
5941 			goto fail;
5942 	}
5943 
5944 	/*
5945 	 * Tell cfg80211 that the interface belongs to the socket that created
5946 	 * it, and the interface should be deleted when the socket is closed.
5947 	 */
5948 	if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
5949 		goto fail;
5950 
5951 	if ((addr && iftype == NL80211_IFTYPE_P2P_DEVICE) &&
5952 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
5953 		goto fail;
5954 
5955 	ret = send_and_recv_msgs(drv, msg, handler, arg, NULL, NULL);
5956 	msg = NULL;
5957 	if (ret) {
5958 	fail:
5959 		nlmsg_free(msg);
5960 		wpa_printf(MSG_ERROR, "Failed to create interface %s: %d (%s)",
5961 			   ifname, ret, strerror(-ret));
5962 		return ret;
5963 	}
5964 
5965 	if (iftype == NL80211_IFTYPE_P2P_DEVICE)
5966 		return 0;
5967 
5968 	ifidx = if_nametoindex(ifname);
5969 	wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
5970 		   ifname, ifidx);
5971 
5972 	if (ifidx <= 0)
5973 		return -1;
5974 
5975 	/*
5976 	 * Some virtual interfaces need to process EAPOL packets and events on
5977 	 * the parent interface. This is used mainly with hostapd.
5978 	 */
5979 	if (drv->hostapd ||
5980 	    iftype == NL80211_IFTYPE_AP_VLAN ||
5981 	    iftype == NL80211_IFTYPE_WDS ||
5982 	    iftype == NL80211_IFTYPE_MONITOR) {
5983 		/* start listening for EAPOL on this interface */
5984 		add_ifidx(drv, ifidx, IFIDX_ANY);
5985 	}
5986 
5987 	if (addr && iftype != NL80211_IFTYPE_MONITOR &&
5988 	    linux_set_ifhwaddr(drv->global->ioctl_sock, ifname, addr)) {
5989 		nl80211_remove_iface(drv, ifidx);
5990 		return -1;
5991 	}
5992 
5993 	return ifidx;
5994 }
5995 
5996 
nl80211_create_iface(struct wpa_driver_nl80211_data * drv,const char * ifname,enum nl80211_iftype iftype,const u8 * addr,int wds,int (* handler)(struct nl_msg *,void *),void * arg,int use_existing)5997 int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
5998 			 const char *ifname, enum nl80211_iftype iftype,
5999 			 const u8 *addr, int wds,
6000 			 int (*handler)(struct nl_msg *, void *),
6001 			 void *arg, int use_existing)
6002 {
6003 	int ret;
6004 
6005 	ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds, handler,
6006 					arg);
6007 
6008 	/* if error occurred and interface exists already */
6009 	if (ret == -ENFILE && if_nametoindex(ifname)) {
6010 		if (use_existing) {
6011 			wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
6012 				   ifname);
6013 			if (addr && iftype != NL80211_IFTYPE_MONITOR &&
6014 			    linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
6015 					       addr) < 0 &&
6016 			    (linux_set_iface_flags(drv->global->ioctl_sock,
6017 						   ifname, 0) < 0 ||
6018 			     linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
6019 						addr) < 0 ||
6020 			     linux_set_iface_flags(drv->global->ioctl_sock,
6021 						   ifname, 1) < 0))
6022 					return -1;
6023 			return -ENFILE;
6024 		}
6025 		wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
6026 
6027 		/* Try to remove the interface that was already there. */
6028 		nl80211_remove_iface(drv, if_nametoindex(ifname));
6029 
6030 		/* Try to create the interface again */
6031 		ret = nl80211_create_iface_once(drv, ifname, iftype, addr,
6032 						wds, handler, arg);
6033 	}
6034 
6035 	if (ret >= 0 && is_p2p_net_interface(iftype)) {
6036 		wpa_printf(MSG_DEBUG,
6037 			   "nl80211: Interface %s created for P2P - disable 11b rates",
6038 			   ifname);
6039 		nl80211_disable_11b_rates(drv, ret, 1);
6040 	}
6041 
6042 	return ret;
6043 }
6044 
6045 
nl80211_setup_ap(struct i802_bss * bss)6046 static int nl80211_setup_ap(struct i802_bss *bss)
6047 {
6048 	struct wpa_driver_nl80211_data *drv = bss->drv;
6049 
6050 	wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
6051 		   bss->ifname, drv->device_ap_sme, drv->use_monitor);
6052 
6053 	/*
6054 	 * Disable Probe Request reporting unless we need it in this way for
6055 	 * devices that include the AP SME, in the other case (unless using
6056 	 * monitor iface) we'll get it through the nl_mgmt socket instead.
6057 	 */
6058 	if (!drv->device_ap_sme)
6059 		wpa_driver_nl80211_probe_req_report(bss, 0);
6060 
6061 	if (!drv->device_ap_sme && !drv->use_monitor)
6062 		if (nl80211_mgmt_subscribe_ap(bss))
6063 			return -1;
6064 
6065 	if (drv->device_ap_sme && !drv->use_monitor)
6066 		if (nl80211_mgmt_subscribe_ap_dev_sme(bss))
6067 			wpa_printf(MSG_DEBUG,
6068 				   "nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it");
6069 
6070 	if (!drv->device_ap_sme && drv->use_monitor &&
6071 	    nl80211_create_monitor_interface(drv) &&
6072 	    !drv->device_ap_sme)
6073 		return -1;
6074 
6075 	if (drv->device_ap_sme &&
6076 	    wpa_driver_nl80211_probe_req_report(bss, 1) < 0) {
6077 		wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
6078 			   "Probe Request frame reporting in AP mode");
6079 		/* Try to survive without this */
6080 	}
6081 
6082 	return 0;
6083 }
6084 
6085 
nl80211_teardown_ap(struct i802_bss * bss)6086 static void nl80211_teardown_ap(struct i802_bss *bss)
6087 {
6088 	struct wpa_driver_nl80211_data *drv = bss->drv;
6089 
6090 	wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
6091 		   bss->ifname, drv->device_ap_sme, drv->use_monitor);
6092 	if (drv->device_ap_sme) {
6093 		wpa_driver_nl80211_probe_req_report(bss, 0);
6094 		if (!drv->use_monitor)
6095 			nl80211_mgmt_unsubscribe(bss, "AP teardown (dev SME)");
6096 	} else if (drv->use_monitor)
6097 		nl80211_remove_monitor_interface(drv);
6098 	else
6099 		nl80211_mgmt_unsubscribe(bss, "AP teardown");
6100 
6101 	nl80211_put_wiphy_data_ap(bss);
6102 	bss->flink->beacon_set = 0;
6103 }
6104 
6105 
nl80211_tx_control_port(void * priv,const u8 * dest,u16 proto,const u8 * buf,size_t len,int no_encrypt)6106 static int nl80211_tx_control_port(void *priv, const u8 *dest,
6107 				   u16 proto, const u8 *buf, size_t len,
6108 				   int no_encrypt)
6109 {
6110 	struct nl80211_ack_ext_arg ext_arg;
6111 	struct i802_bss *bss = priv;
6112 	struct nl_msg *msg;
6113 	u64 cookie = 0;
6114 	int ret;
6115 
6116 	wpa_printf(MSG_DEBUG,
6117 		   "nl80211: Send over control port dest=" MACSTR
6118 		   " proto=0x%04x len=%u no_encrypt=%d",
6119 		   MAC2STR(dest), proto, (unsigned int) len, no_encrypt);
6120 
6121 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CONTROL_PORT_FRAME);
6122 	if (!msg ||
6123 	    nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, proto) ||
6124 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dest) ||
6125 	    nla_put(msg, NL80211_ATTR_FRAME, len, buf) ||
6126 	    (no_encrypt &&
6127 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT))) {
6128 		nlmsg_free(msg);
6129 		return -ENOBUFS;
6130 	}
6131 
6132 	os_memset(&ext_arg, 0, sizeof(struct nl80211_ack_ext_arg));
6133 	ext_arg.ext_data = &cookie;
6134 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL,
6135 				 ack_handler_cookie, &ext_arg);
6136 	if (ret) {
6137 		wpa_printf(MSG_DEBUG,
6138 			   "nl80211: tx_control_port failed: ret=%d (%s)",
6139 			   ret, strerror(-ret));
6140 	} else {
6141 		struct wpa_driver_nl80211_data *drv = bss->drv;
6142 
6143 		wpa_printf(MSG_DEBUG,
6144 			   "nl80211: tx_control_port cookie=0x%llx",
6145 			   (long long unsigned int) cookie);
6146 		drv->eapol_tx_cookie = cookie;
6147 	}
6148 
6149 	return ret;
6150 }
6151 
6152 
nl80211_send_eapol_data(struct i802_bss * bss,const u8 * addr,const u8 * data,size_t data_len)6153 static int nl80211_send_eapol_data(struct i802_bss *bss,
6154 				   const u8 *addr, const u8 *data,
6155 				   size_t data_len)
6156 {
6157 	struct sockaddr_ll ll;
6158 	int ret;
6159 
6160 	if (bss->drv->eapol_tx_sock < 0) {
6161 		wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
6162 		return -1;
6163 	}
6164 
6165 	os_memset(&ll, 0, sizeof(ll));
6166 	ll.sll_family = AF_PACKET;
6167 	ll.sll_ifindex = bss->ifindex;
6168 	ll.sll_protocol = htons(ETH_P_PAE);
6169 	ll.sll_halen = ETH_ALEN;
6170 	os_memcpy(ll.sll_addr, addr, ETH_ALEN);
6171 	ret = sendto(bss->drv->eapol_tx_sock, data, data_len, 0,
6172 		     (struct sockaddr *) &ll, sizeof(ll));
6173 	if (ret < 0)
6174 		wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
6175 			   strerror(errno));
6176 
6177 	return ret;
6178 }
6179 
6180 
6181 static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
6182 
wpa_driver_nl80211_hapd_send_eapol(void * priv,const u8 * addr,const u8 * data,size_t data_len,int encrypt,const u8 * own_addr,u32 flags)6183 static int wpa_driver_nl80211_hapd_send_eapol(
6184 	void *priv, const u8 *addr, const u8 *data,
6185 	size_t data_len, int encrypt, const u8 *own_addr, u32 flags)
6186 {
6187 	struct i802_bss *bss = priv;
6188 	struct wpa_driver_nl80211_data *drv = bss->drv;
6189 	struct ieee80211_hdr *hdr;
6190 	size_t len;
6191 	u8 *pos;
6192 	int res;
6193 	int qos = flags & WPA_STA_WMM;
6194 
6195 	/* For now, disable EAPOL TX over control port in AP mode by default
6196 	 * since it does not provide TX status notifications. */
6197 	if (drv->control_port_ap &&
6198 	    (drv->capa.flags & WPA_DRIVER_FLAGS_CONTROL_PORT))
6199 		return nl80211_tx_control_port(bss, addr, ETH_P_EAPOL,
6200 					       data, data_len, !encrypt);
6201 
6202 	if (drv->device_ap_sme || !drv->use_monitor)
6203 		return nl80211_send_eapol_data(bss, addr, data, data_len);
6204 
6205 	len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
6206 		data_len;
6207 	hdr = os_zalloc(len);
6208 	if (hdr == NULL) {
6209 		wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
6210 			   (unsigned long) len);
6211 		return -1;
6212 	}
6213 
6214 	hdr->frame_control =
6215 		IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
6216 	hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
6217 	if (encrypt)
6218 		hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
6219 	if (qos) {
6220 		hdr->frame_control |=
6221 			host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
6222 	}
6223 
6224 	memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
6225 	memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
6226 	memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
6227 	pos = (u8 *) (hdr + 1);
6228 
6229 	if (qos) {
6230 		/* Set highest priority in QoS header */
6231 		pos[0] = 7;
6232 		pos[1] = 0;
6233 		pos += 2;
6234 	}
6235 
6236 	memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
6237 	pos += sizeof(rfc1042_header);
6238 	WPA_PUT_BE16(pos, ETH_P_PAE);
6239 	pos += 2;
6240 	memcpy(pos, data, data_len);
6241 
6242 	res = nl80211_send_monitor(drv, hdr, len, encrypt, 0);
6243 	if (res < 0) {
6244 		wpa_printf(MSG_ERROR,
6245 			   "hapd_send_eapol - packet len: %lu - failed",
6246 			   (unsigned long) len);
6247 	}
6248 	os_free(hdr);
6249 
6250 	return res;
6251 }
6252 
6253 
wpa_driver_nl80211_sta_set_flags(void * priv,const u8 * addr,unsigned int total_flags,unsigned int flags_or,unsigned int flags_and)6254 static int wpa_driver_nl80211_sta_set_flags(void *priv, const u8 *addr,
6255 					    unsigned int total_flags,
6256 					    unsigned int flags_or,
6257 					    unsigned int flags_and)
6258 {
6259 	struct i802_bss *bss = priv;
6260 	struct nl_msg *msg;
6261 	struct nlattr *flags;
6262 	struct nl80211_sta_flag_update upd;
6263 
6264 	wpa_printf(MSG_DEBUG, "nl80211: Set STA flags - ifname=%s addr=" MACSTR
6265 		   " total_flags=0x%x flags_or=0x%x flags_and=0x%x authorized=%d",
6266 		   bss->ifname, MAC2STR(addr), total_flags, flags_or, flags_and,
6267 		   !!(total_flags & WPA_STA_AUTHORIZED));
6268 
6269 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
6270 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr))
6271 		goto fail;
6272 
6273 	/*
6274 	 * Backwards compatibility version using NL80211_ATTR_STA_FLAGS. This
6275 	 * can be removed eventually.
6276 	 */
6277 	flags = nla_nest_start(msg, NL80211_ATTR_STA_FLAGS);
6278 	if (!flags ||
6279 	    ((total_flags & WPA_STA_AUTHORIZED) &&
6280 	     nla_put_flag(msg, NL80211_STA_FLAG_AUTHORIZED)) ||
6281 	    ((total_flags & WPA_STA_WMM) &&
6282 	     nla_put_flag(msg, NL80211_STA_FLAG_WME)) ||
6283 	    ((total_flags & WPA_STA_SHORT_PREAMBLE) &&
6284 	     nla_put_flag(msg, NL80211_STA_FLAG_SHORT_PREAMBLE)) ||
6285 	    ((total_flags & WPA_STA_MFP) &&
6286 	     nla_put_flag(msg, NL80211_STA_FLAG_MFP)) ||
6287 	    ((total_flags & WPA_STA_TDLS_PEER) &&
6288 	     nla_put_flag(msg, NL80211_STA_FLAG_TDLS_PEER)))
6289 		goto fail;
6290 
6291 	nla_nest_end(msg, flags);
6292 
6293 	os_memset(&upd, 0, sizeof(upd));
6294 	upd.mask = sta_flags_nl80211(flags_or | ~flags_and);
6295 	upd.set = sta_flags_nl80211(flags_or);
6296 	if (nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd))
6297 		goto fail;
6298 
6299 	return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
6300 fail:
6301 	nlmsg_free(msg);
6302 	return -ENOBUFS;
6303 }
6304 
6305 
driver_nl80211_sta_set_airtime_weight(void * priv,const u8 * addr,unsigned int weight)6306 static int driver_nl80211_sta_set_airtime_weight(void *priv, const u8 *addr,
6307 						 unsigned int weight)
6308 {
6309 	struct i802_bss *bss = priv;
6310 	struct nl_msg *msg;
6311 	int ret;
6312 
6313 	wpa_printf(MSG_DEBUG,
6314 		   "nl80211: Set STA airtime weight - ifname=%s addr=" MACSTR
6315 		   " weight=%u", bss->ifname, MAC2STR(addr), weight);
6316 
6317 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
6318 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
6319 	    nla_put_u16(msg, NL80211_ATTR_AIRTIME_WEIGHT, weight))
6320 		goto fail;
6321 
6322 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
6323 	if (ret) {
6324 		wpa_printf(MSG_DEBUG,
6325 			   "nl80211: SET_STATION[AIRTIME_WEIGHT] failed: ret=%d (%s)",
6326 			   ret, strerror(-ret));
6327 	}
6328 	return ret;
6329 fail:
6330 	nlmsg_free(msg);
6331 	return -ENOBUFS;
6332 }
6333 
6334 
wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params)6335 static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
6336 				 struct wpa_driver_associate_params *params)
6337 {
6338 	enum nl80211_iftype nlmode, old_mode;
6339 
6340 	if (params->p2p) {
6341 		wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
6342 			   "group (GO)");
6343 		nlmode = NL80211_IFTYPE_P2P_GO;
6344 	} else
6345 		nlmode = NL80211_IFTYPE_AP;
6346 
6347 	old_mode = drv->nlmode;
6348 	if (wpa_driver_nl80211_set_mode(drv->first_bss, nlmode)) {
6349 		nl80211_remove_monitor_interface(drv);
6350 		return -1;
6351 	}
6352 
6353 	if (params->freq.freq &&
6354 	    nl80211_set_channel(drv->first_bss, ¶ms->freq, 0)) {
6355 		if (old_mode != nlmode)
6356 			wpa_driver_nl80211_set_mode(drv->first_bss, old_mode);
6357 		nl80211_remove_monitor_interface(drv);
6358 		return -1;
6359 	}
6360 
6361 	return 0;
6362 }
6363 
6364 
nl80211_leave_ibss(struct wpa_driver_nl80211_data * drv,int reset_mode)6365 static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv,
6366 			      int reset_mode)
6367 {
6368 	struct nl_msg *msg;
6369 	int ret;
6370 
6371 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_IBSS);
6372 	ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6373 	if (ret) {
6374 		wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
6375 			   "(%s)", ret, strerror(-ret));
6376 	} else {
6377 		wpa_printf(MSG_DEBUG,
6378 			   "nl80211: Leave IBSS request sent successfully");
6379 	}
6380 
6381 	if (reset_mode &&
6382 	    wpa_driver_nl80211_set_mode(drv->first_bss,
6383 					NL80211_IFTYPE_STATION)) {
6384 		wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
6385 			   "station mode");
6386 	}
6387 
6388 	return ret;
6389 }
6390 
6391 
nl80211_ht_vht_overrides(struct nl_msg * msg,struct wpa_driver_associate_params * params)6392 static int nl80211_ht_vht_overrides(struct nl_msg *msg,
6393 				    struct wpa_driver_associate_params *params)
6394 {
6395 	if (params->disable_ht && nla_put_flag(msg, NL80211_ATTR_DISABLE_HT))
6396 		return -1;
6397 
6398 	if (params->htcaps && params->htcaps_mask) {
6399 		int sz = sizeof(struct ieee80211_ht_capabilities);
6400 		wpa_hexdump(MSG_DEBUG, "  * htcaps", params->htcaps, sz);
6401 		wpa_hexdump(MSG_DEBUG, "  * htcaps_mask",
6402 			    params->htcaps_mask, sz);
6403 		if (nla_put(msg, NL80211_ATTR_HT_CAPABILITY, sz,
6404 			    params->htcaps) ||
6405 		    nla_put(msg, NL80211_ATTR_HT_CAPABILITY_MASK, sz,
6406 			    params->htcaps_mask))
6407 			return -1;
6408 	}
6409 
6410 #ifdef CONFIG_VHT_OVERRIDES
6411 	if (params->disable_vht) {
6412 		wpa_printf(MSG_DEBUG, "  * VHT disabled");
6413 		if (nla_put_flag(msg, NL80211_ATTR_DISABLE_VHT))
6414 			return -1;
6415 	}
6416 
6417 	if (params->vhtcaps && params->vhtcaps_mask) {
6418 		int sz = sizeof(struct ieee80211_vht_capabilities);
6419 		wpa_hexdump(MSG_DEBUG, "  * vhtcaps", params->vhtcaps, sz);
6420 		wpa_hexdump(MSG_DEBUG, "  * vhtcaps_mask",
6421 			    params->vhtcaps_mask, sz);
6422 		if (nla_put(msg, NL80211_ATTR_VHT_CAPABILITY, sz,
6423 			    params->vhtcaps) ||
6424 		    nla_put(msg, NL80211_ATTR_VHT_CAPABILITY_MASK, sz,
6425 			    params->vhtcaps_mask))
6426 			return -1;
6427 	}
6428 #endif /* CONFIG_VHT_OVERRIDES */
6429 
6430 #ifdef CONFIG_HE_OVERRIDES
6431 	if (params->disable_he) {
6432 		wpa_printf(MSG_DEBUG, "  * HE disabled");
6433 		if (nla_put_flag(msg, NL80211_ATTR_DISABLE_HE))
6434 			return -1;
6435 	}
6436 #endif /* CONFIG_HE_OVERRIDES */
6437 
6438 	if (params->disable_eht) {
6439 		wpa_printf(MSG_DEBUG, "  * EHT disabled");
6440 		if (nla_put_flag(msg, NL80211_ATTR_DISABLE_EHT))
6441 			return -1;
6442 	}
6443 
6444 	return 0;
6445 }
6446 
6447 
wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params)6448 static int wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data *drv,
6449 				   struct wpa_driver_associate_params *params)
6450 {
6451 	struct nl_msg *msg;
6452 	int ret = -1;
6453 	int count = 0;
6454 
6455 	wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
6456 
6457 	if (wpa_driver_nl80211_set_mode_ibss(drv->first_bss, ¶ms->freq)) {
6458 		wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
6459 			   "IBSS mode");
6460 		return -1;
6461 	}
6462 
6463 retry:
6464 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_IBSS)) ||
6465 	    params->ssid == NULL || params->ssid_len > sizeof(drv->ssid))
6466 		goto fail;
6467 
6468 	wpa_printf(MSG_DEBUG, "  * SSID=%s",
6469 		   wpa_ssid_txt(params->ssid, params->ssid_len));
6470 	if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid))
6471 		goto fail;
6472 	os_memcpy(drv->ssid, params->ssid, params->ssid_len);
6473 	drv->ssid_len = params->ssid_len;
6474 
6475 	if (nl80211_put_freq_params(msg, ¶ms->freq) < 0 ||
6476 	    nl80211_put_beacon_int(msg, params->beacon_int))
6477 		goto fail;
6478 
6479 	ret = nl80211_set_conn_keys(params, msg);
6480 	if (ret)
6481 		goto fail;
6482 
6483 	if (params->bssid && params->fixed_bssid) {
6484 		wpa_printf(MSG_DEBUG, "  * BSSID=" MACSTR,
6485 			   MAC2STR(params->bssid));
6486 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
6487 			goto fail;
6488 	}
6489 
6490 	if (params->fixed_freq) {
6491 		wpa_printf(MSG_DEBUG, "  * fixed_freq");
6492 		if (nla_put_flag(msg, NL80211_ATTR_FREQ_FIXED))
6493 			goto fail;
6494 	}
6495 
6496 	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
6497 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6498 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
6499 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
6500 		wpa_printf(MSG_DEBUG, "  * control port");
6501 		if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
6502 			goto fail;
6503 	}
6504 
6505 	if (params->wpa_ie) {
6506 		wpa_hexdump(MSG_DEBUG,
6507 			    "  * Extra IEs for Beacon/Probe Response frames",
6508 			    params->wpa_ie, params->wpa_ie_len);
6509 		if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
6510 			    params->wpa_ie))
6511 			goto fail;
6512 	}
6513 
6514 	ret = nl80211_ht_vht_overrides(msg, params);
6515 	if (ret < 0)
6516 		goto fail;
6517 
6518 	ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
6519 	msg = NULL;
6520 	if (ret) {
6521 		wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
6522 			   ret, strerror(-ret));
6523 		count++;
6524 		if (ret == -EALREADY && count == 1) {
6525 			wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
6526 				   "forced leave");
6527 			nl80211_leave_ibss(drv, 0);
6528 			nlmsg_free(msg);
6529 			goto retry;
6530 		}
6531 	} else {
6532 		wpa_printf(MSG_DEBUG,
6533 			   "nl80211: Join IBSS request sent successfully");
6534 	}
6535 
6536 fail:
6537 	nlmsg_free(msg);
6538 	return ret;
6539 }
6540 
6541 
nl80211_put_fils_connect_params(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct nl_msg * msg)6542 static int nl80211_put_fils_connect_params(struct wpa_driver_nl80211_data *drv,
6543 					   struct wpa_driver_associate_params *params,
6544 					   struct nl_msg *msg)
6545 {
6546 	if (params->fils_erp_username_len) {
6547 		wpa_hexdump_ascii(MSG_DEBUG, "  * FILS ERP EMSKname/username",
6548 				  params->fils_erp_username,
6549 				  params->fils_erp_username_len);
6550 		if (nla_put(msg, NL80211_ATTR_FILS_ERP_USERNAME,
6551 			    params->fils_erp_username_len,
6552 			    params->fils_erp_username))
6553 			return -1;
6554 	}
6555 
6556 	if (params->fils_erp_realm_len) {
6557 		wpa_hexdump_ascii(MSG_DEBUG, "  * FILS ERP Realm",
6558 				  params->fils_erp_realm,
6559 				  params->fils_erp_realm_len);
6560 		if (nla_put(msg, NL80211_ATTR_FILS_ERP_REALM,
6561 			    params->fils_erp_realm_len, params->fils_erp_realm))
6562 			return -1;
6563 	}
6564 
6565 	if (params->fils_erp_rrk_len) {
6566 		wpa_printf(MSG_DEBUG, "  * FILS ERP next seq %u",
6567 			   params->fils_erp_next_seq_num);
6568 		if (nla_put_u16(msg, NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM,
6569 				params->fils_erp_next_seq_num))
6570 			return -1;
6571 
6572 		wpa_printf(MSG_DEBUG, "  * FILS ERP rRK (len=%lu)",
6573 			   (unsigned long) params->fils_erp_rrk_len);
6574 		if (nla_put(msg, NL80211_ATTR_FILS_ERP_RRK,
6575 			    params->fils_erp_rrk_len, params->fils_erp_rrk))
6576 			return -1;
6577 	}
6578 
6579 	return 0;
6580 }
6581 
6582 
num_bits_set(u32 val)6583 static unsigned int num_bits_set(u32 val)
6584 {
6585 	unsigned int c;
6586 
6587 	for (c = 0; val; c++)
6588 		val &= val - 1;
6589 
6590 	return c;
6591 }
6592 
6593 
nl80211_connect_common(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct nl_msg * msg)6594 static int nl80211_connect_common(struct wpa_driver_nl80211_data *drv,
6595 				  struct wpa_driver_associate_params *params,
6596 				  struct nl_msg *msg)
6597 {
6598 	if (params->mld_params.mld_addr && params->mld_params.valid_links > 0) {
6599 		struct wpa_driver_mld_params *mld_params = ¶ms->mld_params;
6600 		struct nlattr *links, *attr;
6601 		int i;
6602 		u8 link_id;
6603 
6604 		wpa_printf(MSG_DEBUG, "  * MLD: MLD addr=" MACSTR,
6605 			   MAC2STR(mld_params->mld_addr));
6606 
6607 		if (nla_put(msg, NL80211_ATTR_MLD_ADDR, ETH_ALEN,
6608 			    mld_params->mld_addr) ||
6609 		    nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
6610 			       mld_params->assoc_link_id))
6611 			return -1;
6612 
6613 		links = nla_nest_start(msg, NL80211_ATTR_MLO_LINKS);
6614 		if (!links)
6615 			return -1;
6616 
6617 		attr = nla_nest_start(msg, 0);
6618 		if (!attr)
6619 			return -1;
6620 
6621 		/* First add the association link ID */
6622 		link_id = mld_params->assoc_link_id;
6623 		if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id) ||
6624 		    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
6625 			    mld_params->mld_links[link_id].bssid) ||
6626 		    nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6627 				mld_params->mld_links[link_id].freq))
6628 			return -1;
6629 
6630 		os_memcpy(drv->sta_mlo_info.links[link_id].bssid,
6631 			  mld_params->mld_links[link_id].bssid, ETH_ALEN);
6632 
6633 		nla_nest_end(msg, attr);
6634 
6635 		for (i = 1, link_id = 0; link_id < MAX_NUM_MLD_LINKS;
6636 		     link_id++) {
6637 			if (!(mld_params->valid_links & BIT(link_id)) ||
6638 			    link_id == mld_params->assoc_link_id)
6639 				continue;
6640 
6641 			attr = nla_nest_start(msg, i);
6642 			if (!attr)
6643 				return -1;
6644 
6645 			if (nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID,
6646 				       link_id) ||
6647 			    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
6648 				    mld_params->mld_links[link_id].bssid) ||
6649 			    nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6650 					mld_params->mld_links[link_id].freq) ||
6651 			    (mld_params->mld_links[link_id].ies &&
6652 			     mld_params->mld_links[i].ies_len &&
6653 			     nla_put(msg, NL80211_ATTR_IE,
6654 				     mld_params->mld_links[link_id].ies_len,
6655 				     mld_params->mld_links[link_id].ies)))
6656 				return -1;
6657 
6658 			os_memcpy(drv->sta_mlo_info.links[link_id].bssid,
6659 				  mld_params->mld_links[link_id].bssid,
6660 				  ETH_ALEN);
6661 			nla_nest_end(msg, attr);
6662 			i++;
6663 		}
6664 
6665 		nla_nest_end(msg, links);
6666 
6667 		os_memcpy(drv->sta_mlo_info.ap_mld_addr,
6668 			  params->mld_params.mld_addr, ETH_ALEN);
6669 		drv->sta_mlo_info.assoc_link_id = mld_params->assoc_link_id;
6670 		drv->sta_mlo_info.req_links = mld_params->valid_links;
6671 	}
6672 
6673 	if (nla_put_flag(msg, NL80211_ATTR_IFACE_SOCKET_OWNER))
6674 		return -1;
6675 
6676 	if (params->bssid && !params->mld_params.mld_addr) {
6677 		wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
6678 			   MAC2STR(params->bssid));
6679 		if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid))
6680 			return -1;
6681 	}
6682 
6683 	if (params->bssid_hint) {
6684 		wpa_printf(MSG_DEBUG, "  * bssid_hint=" MACSTR,
6685 			   MAC2STR(params->bssid_hint));
6686 		if (nla_put(msg, NL80211_ATTR_MAC_HINT, ETH_ALEN,
6687 			    params->bssid_hint))
6688 			return -1;
6689 	}
6690 
6691 	if (params->freq.freq && !params->mld_params.mld_addr) {
6692 		wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq.freq);
6693 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ,
6694 				params->freq.freq))
6695 			return -1;
6696 		drv->assoc_freq = params->freq.freq;
6697 	} else
6698 		drv->assoc_freq = 0;
6699 
6700 	if (params->freq_hint) {
6701 		wpa_printf(MSG_DEBUG, "  * freq_hint=%d", params->freq_hint);
6702 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ_HINT,
6703 				params->freq_hint))
6704 			return -1;
6705 	}
6706 
6707 	if (params->freq.edmg.channels && params->freq.edmg.bw_config) {
6708 		wpa_printf(MSG_DEBUG,
6709 			   "  * EDMG configuration: channels=0x%x bw_config=%d",
6710 			   params->freq.edmg.channels,
6711 			   params->freq.edmg.bw_config);
6712 		if (nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_CHANNELS,
6713 			       params->freq.edmg.channels) ||
6714 		    nla_put_u8(msg, NL80211_ATTR_WIPHY_EDMG_BW_CONFIG,
6715 			       params->freq.edmg.bw_config))
6716 			return -1;
6717 	}
6718 
6719 	if (params->bg_scan_period >= 0) {
6720 		wpa_printf(MSG_DEBUG, "  * bg scan period=%d",
6721 			   params->bg_scan_period);
6722 		if (nla_put_u16(msg, NL80211_ATTR_BG_SCAN_PERIOD,
6723 				params->bg_scan_period))
6724 			return -1;
6725 	}
6726 
6727 	if (params->ssid) {
6728 		wpa_printf(MSG_DEBUG, "  * SSID=%s",
6729 			   wpa_ssid_txt(params->ssid, params->ssid_len));
6730 		if (nla_put(msg, NL80211_ATTR_SSID, params->ssid_len,
6731 			    params->ssid))
6732 			return -1;
6733 		if (params->ssid_len > sizeof(drv->ssid))
6734 			return -1;
6735 		os_memcpy(drv->ssid, params->ssid, params->ssid_len);
6736 		drv->ssid_len = params->ssid_len;
6737 	}
6738 
6739 	wpa_hexdump(MSG_DEBUG, "  * IEs", params->wpa_ie, params->wpa_ie_len);
6740 	if (params->wpa_ie &&
6741 	    nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len, params->wpa_ie))
6742 		return -1;
6743 
6744 	if (params->wpa_proto) {
6745 		enum nl80211_wpa_versions ver = 0;
6746 
6747 		if (params->wpa_proto & WPA_PROTO_WPA)
6748 			ver |= NL80211_WPA_VERSION_1;
6749 		if (params->wpa_proto & WPA_PROTO_RSN)
6750 			ver |= NL80211_WPA_VERSION_2;
6751 
6752 		wpa_printf(MSG_DEBUG, "  * WPA Versions 0x%x", ver);
6753 		if (nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
6754 			return -1;
6755 	}
6756 
6757 	if (params->pairwise_suite != WPA_CIPHER_NONE) {
6758 		u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite);
6759 		wpa_printf(MSG_DEBUG, "  * pairwise=0x%x", cipher);
6760 		if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
6761 				cipher))
6762 			return -1;
6763 	}
6764 
6765 	if (params->group_suite == WPA_CIPHER_GTK_NOT_USED &&
6766 	    !(drv->capa.enc & WPA_DRIVER_CAPA_ENC_GTK_NOT_USED)) {
6767 		/*
6768 		 * This is likely to work even though many drivers do not
6769 		 * advertise support for operations without GTK.
6770 		 */
6771 		wpa_printf(MSG_DEBUG, "  * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
6772 	} else if (params->group_suite != WPA_CIPHER_NONE) {
6773 		u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite);
6774 		wpa_printf(MSG_DEBUG, "  * group=0x%x", cipher);
6775 		if (nla_put_u32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher))
6776 			return -1;
6777 	}
6778 
6779 	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
6780 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
6781 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X ||
6782 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK ||
6783 	    params->key_mgmt_suite == WPA_KEY_MGMT_CCKM ||
6784 	    params->key_mgmt_suite == WPA_KEY_MGMT_OSEN ||
6785 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
6786 	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
6787 	    params->key_mgmt_suite == WPA_KEY_MGMT_SAE ||
6788 	    params->key_mgmt_suite == WPA_KEY_MGMT_SAE_EXT_KEY ||
6789 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE ||
6790 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE_EXT_KEY ||
6791 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
6792 	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192 ||
6793 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X_SHA384 ||
6794 	    params->key_mgmt_suite == WPA_KEY_MGMT_FILS_SHA256 ||
6795 	    params->key_mgmt_suite == WPA_KEY_MGMT_FILS_SHA384 ||
6796 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_FILS_SHA256 ||
6797 	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_FILS_SHA384 ||
6798 	    params->key_mgmt_suite == WPA_KEY_MGMT_OWE ||
6799 	    params->key_mgmt_suite == WPA_KEY_MGMT_DPP) {
6800 		u32 *mgmt;
6801 		unsigned int akm_count = 1, i;
6802 
6803 		/*
6804 		 * Make sure the driver has capability to handle default AKM in
6805 		 * key_mgmt_suite plus allowed AKMs in allowed_key_mgmts.
6806 		 */
6807 		if (drv->capa.max_num_akms <=
6808 		    num_bits_set(params->allowed_key_mgmts)) {
6809 			wpa_printf(MSG_INFO,
6810 				   "nl80211: Not enough support for the allowed AKMs (max_num_akms=%u <= num_bits_set=%u)",
6811 				   drv->capa.max_num_akms,
6812 				   num_bits_set(params->allowed_key_mgmts));
6813 			return -1;
6814 		}
6815 
6816 		mgmt = os_malloc(sizeof(u32) * drv->capa.max_num_akms);
6817 		if (!mgmt)
6818 			return -1;
6819 
6820 		mgmt[0] = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
6821 
6822 		switch (params->key_mgmt_suite) {
6823 		case WPA_KEY_MGMT_CCKM:
6824 			mgmt[0] = RSN_AUTH_KEY_MGMT_CCKM;
6825 			break;
6826 		case WPA_KEY_MGMT_IEEE8021X:
6827 			mgmt[0] = RSN_AUTH_KEY_MGMT_UNSPEC_802_1X;
6828 			break;
6829 		case WPA_KEY_MGMT_FT_IEEE8021X:
6830 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_802_1X;
6831 			break;
6832 		case WPA_KEY_MGMT_FT_PSK:
6833 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_PSK;
6834 			break;
6835 		case WPA_KEY_MGMT_IEEE8021X_SHA256:
6836 			mgmt[0] = RSN_AUTH_KEY_MGMT_802_1X_SHA256;
6837 			break;
6838 		case WPA_KEY_MGMT_PSK_SHA256:
6839 			mgmt[0] = RSN_AUTH_KEY_MGMT_PSK_SHA256;
6840 			break;
6841 		case WPA_KEY_MGMT_OSEN:
6842 			mgmt[0] = RSN_AUTH_KEY_MGMT_OSEN;
6843 			break;
6844 		case WPA_KEY_MGMT_SAE:
6845 			mgmt[0] = RSN_AUTH_KEY_MGMT_SAE;
6846 			break;
6847 		case WPA_KEY_MGMT_SAE_EXT_KEY:
6848 			mgmt[0] = RSN_AUTH_KEY_MGMT_SAE_EXT_KEY;
6849 			break;
6850 		case WPA_KEY_MGMT_FT_SAE:
6851 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_SAE;
6852 			break;
6853 		case WPA_KEY_MGMT_FT_SAE_EXT_KEY:
6854 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_SAE_EXT_KEY;
6855 			break;
6856 		case WPA_KEY_MGMT_IEEE8021X_SUITE_B:
6857 			mgmt[0] = RSN_AUTH_KEY_MGMT_802_1X_SUITE_B;
6858 			break;
6859 		case WPA_KEY_MGMT_IEEE8021X_SUITE_B_192:
6860 			mgmt[0] = RSN_AUTH_KEY_MGMT_802_1X_SUITE_B_192;
6861 			break;
6862 		case WPA_KEY_MGMT_FT_IEEE8021X_SHA384:
6863 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_802_1X_SHA384;
6864 			break;
6865 		case WPA_KEY_MGMT_FILS_SHA256:
6866 			mgmt[0] = RSN_AUTH_KEY_MGMT_FILS_SHA256;
6867 			break;
6868 		case WPA_KEY_MGMT_FILS_SHA384:
6869 			mgmt[0] = RSN_AUTH_KEY_MGMT_FILS_SHA384;
6870 			break;
6871 		case WPA_KEY_MGMT_FT_FILS_SHA256:
6872 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_FILS_SHA256;
6873 			break;
6874 		case WPA_KEY_MGMT_FT_FILS_SHA384:
6875 			mgmt[0] = RSN_AUTH_KEY_MGMT_FT_FILS_SHA384;
6876 			break;
6877 		case WPA_KEY_MGMT_OWE:
6878 			mgmt[0] = RSN_AUTH_KEY_MGMT_OWE;
6879 			break;
6880 		case WPA_KEY_MGMT_DPP:
6881 			mgmt[0] = RSN_AUTH_KEY_MGMT_DPP;
6882 			break;
6883 		case WPA_KEY_MGMT_PSK:
6884 		default:
6885 			mgmt[0] = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
6886 			break;
6887 		}
6888 
6889 		if (drv->capa.max_num_akms > 1) {
6890 			akm_count += wpa_key_mgmt_to_suites(
6891 				params->allowed_key_mgmts, &mgmt[1],
6892 				drv->capa.max_num_akms - 1);
6893 		}
6894 
6895 		for (i = 0; i < akm_count; i++)
6896 			wpa_printf(MSG_DEBUG, "  * akm[%d]=0x%x", i, mgmt[i]);
6897 
6898 		if (nla_put(msg, NL80211_ATTR_AKM_SUITES,
6899 			    akm_count * sizeof(u32), mgmt)) {
6900 			os_free(mgmt);
6901 			return -1;
6902 		}
6903 
6904 		os_free(mgmt);
6905 	}
6906 
6907 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6908 	if (IS_CROSS_AKM_ROAM_KEY_MGMT(params->key_mgmt_suite)) {
6909 		int num_suites;
6910 		u32 suites[NL80211_MAX_NR_AKM_SUITES];
6911 
6912 		wpa_printf(MSG_INFO, "nl80211: key_mgmt_suites=0x%x",
6913 			params->key_mgmt_suite);
6914 		num_suites = wpa_cross_akm_key_mgmt_to_suites(params->key_mgmt_suite,
6915 			suites, ARRAY_SIZE(suites));
6916 		if (num_suites &&
6917 			nla_put(msg, NL80211_ATTR_AKM_SUITES, num_suites * sizeof(u32), suites)) {
6918 			wpa_printf(MSG_ERROR, "Updating multi akm_suite failed");
6919 			return -1;
6920 		}
6921 	}
6922 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6923 	if (params->req_handshake_offload &&
6924 	    (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X)) {
6925 		    wpa_printf(MSG_DEBUG, "  * WANT_1X_4WAY_HS");
6926 		    if (nla_put_flag(msg, NL80211_ATTR_WANT_1X_4WAY_HS))
6927 			    return -1;
6928 	    }
6929 
6930 	/* Add PSK in case of 4-way handshake offload */
6931 	if (params->psk &&
6932 	    (drv->capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK)) {
6933 		wpa_hexdump_key(MSG_DEBUG, "  * PSK", params->psk, 32);
6934 		if (nla_put(msg, NL80211_ATTR_PMK, 32, params->psk))
6935 			return -1;
6936 	}
6937 
6938 	if (nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT))
6939 		return -1;
6940 
6941 	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
6942 	    (params->pairwise_suite == WPA_CIPHER_NONE ||
6943 	     params->pairwise_suite == WPA_CIPHER_WEP104 ||
6944 	     params->pairwise_suite == WPA_CIPHER_WEP40) &&
6945 	    (nla_put_u16(msg, NL80211_ATTR_CONTROL_PORT_ETHERTYPE, ETH_P_PAE) ||
6946 	     nla_put_flag(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT)))
6947 		return -1;
6948 
6949 	if (params->rrm_used) {
6950 		u32 drv_rrm_flags = drv->capa.rrm_flags;
6951 		if ((!((drv_rrm_flags &
6952 			WPA_DRIVER_FLAGS_DS_PARAM_SET_IE_IN_PROBES) &&
6953 		       (drv_rrm_flags & WPA_DRIVER_FLAGS_QUIET)) &&
6954 		     !(drv_rrm_flags & WPA_DRIVER_FLAGS_SUPPORT_RRM)) ||
6955 		    nla_put_flag(msg, NL80211_ATTR_USE_RRM))
6956 			return -1;
6957 	}
6958 
6959 	if (nl80211_ht_vht_overrides(msg, params) < 0)
6960 		return -1;
6961 
6962 	if (params->p2p)
6963 		wpa_printf(MSG_DEBUG, "  * P2P group");
6964 
6965 	if (params->pbss) {
6966 		wpa_printf(MSG_DEBUG, "  * PBSS");
6967 		if (nla_put_flag(msg, NL80211_ATTR_PBSS))
6968 			return -1;
6969 	}
6970 
6971 	drv->connect_reassoc = 0;
6972 	if (params->prev_bssid) {
6973 		wpa_printf(MSG_DEBUG, "  * prev_bssid=" MACSTR,
6974 			   MAC2STR(params->prev_bssid));
6975 		if (nla_put(msg, NL80211_ATTR_PREV_BSSID, ETH_ALEN,
6976 			    params->prev_bssid))
6977 			return -1;
6978 		drv->connect_reassoc = 1;
6979 	}
6980 
6981 	if ((params->auth_alg & WPA_AUTH_ALG_FILS) &&
6982 	    nl80211_put_fils_connect_params(drv, params, msg) != 0)
6983 		return -1;
6984 
6985 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
6986 	if (((params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
6987 	     (params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE)) &&
6988 #else
6989 	if ((wpa_key_mgmt_sae(params->key_mgmt_suite) ||
6990 	     wpa_key_mgmt_sae(params->allowed_key_mgmts)) &&
6991 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
6992 	    (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) &&
6993 	    nla_put_flag(msg, NL80211_ATTR_EXTERNAL_AUTH_SUPPORT))
6994 		return -1;
6995 
6996 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
6997 	    nla_put_flag(msg, NL80211_ATTR_MLO_SUPPORT))
6998 		return -1;
6999 
7000 	return 0;
7001 }
7002 
7003 
wpa_driver_nl80211_try_connect(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct i802_bss * bss)7004 static int wpa_driver_nl80211_try_connect(
7005 	struct wpa_driver_nl80211_data *drv,
7006 	struct wpa_driver_associate_params *params,
7007 	struct i802_bss *bss)
7008 {
7009 	struct nl_msg *msg;
7010 	enum nl80211_auth_type type;
7011 	int ret;
7012 	int algs;
7013 
7014 #ifdef CONFIG_DRIVER_NL80211_QCA
7015 	if (params->req_key_mgmt_offload && params->psk &&
7016 	    (wpa_key_mgmt_wpa_psk_no_sae(params->key_mgmt_suite) ||
7017 	     wpa_key_mgmt_wpa_psk_no_sae(params->allowed_key_mgmts))) {
7018 		wpa_printf(MSG_DEBUG, "nl80211: Key management set PSK");
7019 		ret = issue_key_mgmt_set_key(drv, params->psk, 32);
7020 		if (ret)
7021 			return ret;
7022 	}
7023 #endif /* CONFIG_DRIVER_NL80211_QCA */
7024 
7025 	wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
7026 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_CONNECT);
7027 	if (!msg)
7028 		return -1;
7029 
7030 	ret = nl80211_connect_common(drv, params, msg);
7031 	if (ret)
7032 		goto fail;
7033 
7034 	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
7035 	    nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
7036 		goto fail;
7037 
7038 	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_OPTIONAL &&
7039 	    (drv->capa.flags & WPA_DRIVER_FLAGS_MFP_OPTIONAL) &&
7040 	    nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_OPTIONAL))
7041 		goto fail;
7042 
7043 #ifdef CONFIG_SAE
7044 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
7045 	if (((params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
7046 	     (params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE)) &&
7047 #else
7048 	if ((wpa_key_mgmt_sae(params->key_mgmt_suite) ||
7049 	     wpa_key_mgmt_sae(params->allowed_key_mgmts)) &&
7050 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
7051 	    nl80211_put_sae_pwe(msg, params->sae_pwe) < 0)
7052 		goto fail;
7053 #endif /* CONFIG_SAE */
7054 
7055 	algs = 0;
7056 	if (params->auth_alg & WPA_AUTH_ALG_OPEN)
7057 		algs++;
7058 	if (params->auth_alg & WPA_AUTH_ALG_SHARED)
7059 		algs++;
7060 	if (params->auth_alg & WPA_AUTH_ALG_LEAP)
7061 		algs++;
7062 	if (params->auth_alg & WPA_AUTH_ALG_FILS)
7063 		algs++;
7064 	if (params->auth_alg & WPA_AUTH_ALG_FT)
7065 		algs++;
7066 	if (algs > 1) {
7067 		wpa_printf(MSG_DEBUG, "  * Leave out Auth Type for automatic "
7068 			   "selection");
7069 		goto skip_auth_type;
7070 	}
7071 
7072 	type = get_nl_auth_type(params->auth_alg);
7073 	wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
7074 	if (type == NL80211_AUTHTYPE_MAX ||
7075 	    nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
7076 		goto fail;
7077 
7078 skip_auth_type:
7079 	ret = nl80211_set_conn_keys(params, msg);
7080 	if (ret)
7081 		goto fail;
7082 
7083 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
7084 	msg = NULL;
7085 	if (ret) {
7086 		wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
7087 			   "(%s)", ret, strerror(-ret));
7088 	} else {
7089 #ifdef CONFIG_DRIVER_NL80211_QCA
7090 		drv->roam_indication_done = false;
7091 #endif /* CONFIG_DRIVER_NL80211_QCA */
7092 		wpa_printf(MSG_DEBUG,
7093 			   "nl80211: Connect request send successfully");
7094 	}
7095 
7096 fail:
7097 	nl80211_nlmsg_clear(msg);
7098 	nlmsg_free(msg);
7099 	return ret;
7100 
7101 }
7102 
7103 
wpa_driver_nl80211_connect(struct wpa_driver_nl80211_data * drv,struct wpa_driver_associate_params * params,struct i802_bss * bss)7104 static int wpa_driver_nl80211_connect(
7105 	struct wpa_driver_nl80211_data *drv,
7106 	struct wpa_driver_associate_params *params,
7107 	struct i802_bss *bss)
7108 {
7109 	int ret;
7110 
7111 	/* Store the connection attempted bssid for future use */
7112 	if (params->bssid)
7113 		os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
7114 	else
7115 		os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
7116 
7117 	ret = wpa_driver_nl80211_try_connect(drv, params, bss);
7118 	if (ret == -EALREADY) {
7119 		/*
7120 		 * cfg80211 does not currently accept new connections if
7121 		 * we are already connected. As a workaround, force
7122 		 * disconnection and try again.
7123 		 */
7124 		wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
7125 			   "disconnecting before reassociation "
7126 			   "attempt");
7127 		if (wpa_driver_nl80211_disconnect(
7128 			    drv, WLAN_REASON_PREV_AUTH_NOT_VALID, bss))
7129 			return -1;
7130 		ret = wpa_driver_nl80211_try_connect(drv, params, bss);
7131 	}
7132 	return ret;
7133 }
7134 
7135 
wpa_driver_nl80211_associate(void * priv,struct wpa_driver_associate_params * params)7136 static int wpa_driver_nl80211_associate(
7137 	void *priv, struct wpa_driver_associate_params *params)
7138 {
7139 	struct i802_bss *bss = priv;
7140 	struct wpa_driver_nl80211_data *drv = bss->drv;
7141 	int ret = -1;
7142 	struct nl_msg *msg;
7143 
7144 	nl80211_unmask_11b_rates(bss);
7145 
7146 	if (params->mode == IEEE80211_MODE_AP)
7147 		return wpa_driver_nl80211_ap(drv, params);
7148 
7149 	if (params->mode == IEEE80211_MODE_IBSS)
7150 		return wpa_driver_nl80211_ibss(drv, params);
7151 
7152 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
7153 		enum nl80211_iftype nlmode = params->p2p ?
7154 			NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
7155 
7156 		if (wpa_driver_nl80211_set_mode(priv, nlmode) < 0)
7157 			return -1;
7158 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
7159 		if ((params->key_mgmt_suite & WPA_KEY_MGMT_SAE) ||
7160 		    (params->key_mgmt_suite == WPA_KEY_MGMT_FT_SAE))
7161 #else
7162 		if (wpa_key_mgmt_sae(params->key_mgmt_suite) ||
7163 		    wpa_key_mgmt_sae(params->allowed_key_mgmts))
7164 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
7165 			bss->use_nl_connect = 1;
7166 		else
7167 			bss->use_nl_connect = 0;
7168 
7169 		return wpa_driver_nl80211_connect(drv, params, bss);
7170 	}
7171 
7172 	nl80211_mark_disconnected(drv);
7173 
7174 	wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
7175 		   drv->ifindex);
7176 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_ASSOCIATE);
7177 	if (!msg)
7178 		return -1;
7179 
7180 	ret = nl80211_connect_common(drv, params, msg);
7181 	if (ret)
7182 		goto fail;
7183 
7184 	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED &&
7185 	    nla_put_u32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED))
7186 		goto fail;
7187 
7188 	if (params->fils_kek) {
7189 		wpa_printf(MSG_DEBUG, "  * FILS KEK (len=%u)",
7190 			   (unsigned int) params->fils_kek_len);
7191 		if (nla_put(msg, NL80211_ATTR_FILS_KEK, params->fils_kek_len,
7192 			    params->fils_kek))
7193 			goto fail;
7194 	}
7195 	if (params->fils_nonces) {
7196 		wpa_hexdump(MSG_DEBUG, "  * FILS nonces (for AAD)",
7197 			    params->fils_nonces,
7198 			    params->fils_nonces_len);
7199 		if (nla_put(msg, NL80211_ATTR_FILS_NONCES,
7200 			    params->fils_nonces_len, params->fils_nonces))
7201 			goto fail;
7202 	}
7203 
7204 	ret = send_and_recv_msgs_connect_handle(drv, msg, drv->first_bss, 1);
7205 	msg = NULL;
7206 	if (ret) {
7207 		wpa_dbg(drv->ctx, MSG_DEBUG,
7208 			"nl80211: MLME command failed (assoc): ret=%d (%s)",
7209 			ret, strerror(-ret));
7210 		nl80211_dump_scan(drv);
7211 	} else {
7212 		wpa_printf(MSG_DEBUG,
7213 			   "nl80211: Association request send successfully");
7214 	}
7215 
7216 fail:
7217 	nlmsg_free(msg);
7218 	return ret;
7219 }
7220 
7221 
nl80211_set_mode(struct wpa_driver_nl80211_data * drv,int ifindex,enum nl80211_iftype mode)7222 static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
7223 			    int ifindex, enum nl80211_iftype mode)
7224 {
7225 	struct nl_msg *msg;
7226 	int ret = -ENOBUFS;
7227 
7228 	wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
7229 		   ifindex, mode, nl80211_iftype_str(mode));
7230 
7231 	msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
7232 	if (!msg || nla_put_u32(msg, NL80211_ATTR_IFTYPE, mode))
7233 		goto fail;
7234 
7235 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7236 	msg = NULL;
7237 	if (!ret)
7238 		return 0;
7239 fail:
7240 	nlmsg_free(msg);
7241 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
7242 		   " %d (%s)", ifindex, mode, ret, strerror(-ret));
7243 	return ret;
7244 }
7245 
7246 
wpa_driver_nl80211_set_mode_impl(struct i802_bss * bss,enum nl80211_iftype nlmode,struct hostapd_freq_params * desired_freq_params)7247 static int wpa_driver_nl80211_set_mode_impl(
7248 		struct i802_bss *bss,
7249 		enum nl80211_iftype nlmode,
7250 		struct hostapd_freq_params *desired_freq_params)
7251 {
7252 	struct wpa_driver_nl80211_data *drv = bss->drv;
7253 	int ret = -1;
7254 	int i;
7255 	int was_ap = is_ap_interface(drv->nlmode);
7256 	int res;
7257 	int mode_switch_res;
7258 
7259 	if (TEST_FAIL())
7260 		return -1;
7261 
7262 	mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
7263 	if (mode_switch_res && nlmode == nl80211_get_ifmode(bss))
7264 		mode_switch_res = 0;
7265 
7266 	if (mode_switch_res == 0) {
7267 		drv->nlmode = nlmode;
7268 		ret = 0;
7269 		goto done;
7270 	}
7271 
7272 	if (mode_switch_res == -ENODEV)
7273 		return -1;
7274 
7275 	if (nlmode == drv->nlmode) {
7276 		wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
7277 			   "requested mode - ignore error");
7278 		ret = 0;
7279 		goto done; /* Already in the requested mode */
7280 	}
7281 
7282 	/* mac80211 doesn't allow mode changes while the device is up, so
7283 	 * take the device down, try to set the mode again, and bring the
7284 	 * device back up.
7285 	 */
7286 	wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
7287 		   "interface down");
7288 	for (i = 0; i < 10; i++) {
7289 		res = i802_set_iface_flags(bss, 0);
7290 		if (res == -EACCES || res == -ENODEV)
7291 			break;
7292 		if (res != 0) {
7293 			wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
7294 				   "interface down");
7295 			os_sleep(0, 100000);
7296 			continue;
7297 		}
7298 
7299 		/*
7300 		 * Setting the mode will fail for some drivers if the phy is
7301 		 * on a frequency that the mode is disallowed in.
7302 		 */
7303 		if (desired_freq_params) {
7304 			res = nl80211_set_channel(bss, desired_freq_params, 0);
7305 			if (res) {
7306 				wpa_printf(MSG_DEBUG,
7307 					   "nl80211: Failed to set frequency on interface");
7308 			}
7309 		}
7310 
7311 		if (i == 0 && was_ap && !is_ap_interface(nlmode) &&
7312 		    bss->brname[0] &&
7313 		    (bss->added_if_into_bridge || bss->already_in_bridge)) {
7314 			wpa_printf(MSG_DEBUG,
7315 				   "nl80211: Remove AP interface %s temporarily from the bridge %s to allow its mode to be set to STATION",
7316 				   bss->ifname, bss->brname);
7317 			if (linux_br_del_if(drv->global->ioctl_sock,
7318 					    bss->brname, bss->ifname) < 0)
7319 				wpa_printf(MSG_INFO,
7320 					   "nl80211: Failed to remove interface %s from bridge %s: %s",
7321 					   bss->ifname, bss->brname,
7322 					   strerror(errno));
7323 		}
7324 
7325 		/* Try to set the mode again while the interface is down */
7326 		mode_switch_res = nl80211_set_mode(drv, drv->ifindex, nlmode);
7327 		if (mode_switch_res == -EBUSY) {
7328 			wpa_printf(MSG_DEBUG,
7329 				   "nl80211: Delaying mode set while interface going down");
7330 			os_sleep(0, 100000);
7331 			continue;
7332 		}
7333 		ret = mode_switch_res;
7334 		break;
7335 	}
7336 
7337 	if (!ret) {
7338 		wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
7339 			   "interface is down");
7340 		drv->nlmode = nlmode;
7341 		drv->ignore_if_down_event = 1;
7342 	}
7343 
7344 	/* Bring the interface back up */
7345 	res = linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1);
7346 	if (res != 0) {
7347 		wpa_printf(MSG_DEBUG,
7348 			   "nl80211: Failed to set interface up after switching mode");
7349 		ret = -1;
7350 	}
7351 
7352 done:
7353 	if (ret) {
7354 		wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
7355 			   "from %d failed", nlmode, drv->nlmode);
7356 		return ret;
7357 	}
7358 
7359 	if (is_p2p_net_interface(nlmode)) {
7360 		wpa_printf(MSG_DEBUG,
7361 			   "nl80211: Interface %s mode change to P2P - disable 11b rates",
7362 			   bss->ifname);
7363 		nl80211_disable_11b_rates(drv, drv->ifindex, 1);
7364 	} else if (drv->disabled_11b_rates) {
7365 		wpa_printf(MSG_DEBUG,
7366 			   "nl80211: Interface %s mode changed to non-P2P - re-enable 11b rates",
7367 			   bss->ifname);
7368 		nl80211_disable_11b_rates(drv, drv->ifindex, 0);
7369 	}
7370 
7371 	if (is_ap_interface(nlmode)) {
7372 		nl80211_mgmt_unsubscribe(bss, "start AP");
7373 		/* Setup additional AP mode functionality if needed */
7374 		if (nl80211_setup_ap(bss))
7375 			return -1;
7376 	} else if (was_ap) {
7377 		/* Remove additional AP mode functionality */
7378 		nl80211_teardown_ap(bss);
7379 	} else {
7380 		nl80211_mgmt_unsubscribe(bss, "mode change");
7381 	}
7382 
7383 	if (is_mesh_interface(nlmode) &&
7384 	    nl80211_mgmt_subscribe_mesh(bss))
7385 		return -1;
7386 
7387 	if (!bss->in_deinit && !is_ap_interface(nlmode) &&
7388 	    !is_mesh_interface(nlmode) &&
7389 	    nl80211_mgmt_subscribe_non_ap(bss) < 0)
7390 		wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
7391 			   "frame processing - ignore for now");
7392 
7393 	return 0;
7394 }
7395 
7396 
nl80211_restore_ap_mode(struct i802_bss * bss)7397 void nl80211_restore_ap_mode(struct i802_bss *bss)
7398 {
7399 	struct wpa_driver_nl80211_data *drv = bss->drv;
7400 	int was_ap = is_ap_interface(drv->nlmode);
7401 	int br_ifindex;
7402 
7403 	wpa_driver_nl80211_set_mode(bss, drv->ap_scan_as_station);
7404 	if (!was_ap && is_ap_interface(drv->ap_scan_as_station) &&
7405 	    bss->brname[0] &&
7406 	    (bss->added_if_into_bridge || bss->already_in_bridge)) {
7407 		wpa_printf(MSG_DEBUG,
7408 			   "nl80211: Add AP interface %s back into the bridge %s",
7409 			   bss->ifname, bss->brname);
7410 		if (linux_br_add_if(drv->global->ioctl_sock, bss->brname,
7411 				    bss->ifname) < 0) {
7412 			wpa_printf(MSG_WARNING,
7413 				   "nl80211: Failed to add interface %s into bridge %s: %s",
7414 				   bss->ifname, bss->brname, strerror(errno));
7415 		}
7416 		br_ifindex = if_nametoindex(bss->brname);
7417 		add_ifidx(drv, br_ifindex, drv->ifindex);
7418 	}
7419 	drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
7420 }
7421 
7422 
wpa_driver_nl80211_set_mode(struct i802_bss * bss,enum nl80211_iftype nlmode)7423 int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
7424 				enum nl80211_iftype nlmode)
7425 {
7426 	return wpa_driver_nl80211_set_mode_impl(bss, nlmode, NULL);
7427 }
7428 
7429 
wpa_driver_nl80211_set_mode_ibss(struct i802_bss * bss,struct hostapd_freq_params * freq)7430 static int wpa_driver_nl80211_set_mode_ibss(struct i802_bss *bss,
7431 					    struct hostapd_freq_params *freq)
7432 {
7433 	return wpa_driver_nl80211_set_mode_impl(bss, NL80211_IFTYPE_ADHOC,
7434 						freq);
7435 }
7436 
7437 
wpa_driver_nl80211_get_capa(void * priv,struct wpa_driver_capa * capa)7438 static int wpa_driver_nl80211_get_capa(void *priv,
7439 				       struct wpa_driver_capa *capa)
7440 {
7441 	struct i802_bss *bss = priv;
7442 	struct wpa_driver_nl80211_data *drv = bss->drv;
7443 
7444 	if (!drv->has_capability)
7445 		return -1;
7446 	os_memcpy(capa, &drv->capa, sizeof(*capa));
7447 	if (drv->extended_capa && drv->extended_capa_mask) {
7448 		capa->extended_capa = drv->extended_capa;
7449 		capa->extended_capa_mask = drv->extended_capa_mask;
7450 		capa->extended_capa_len = drv->extended_capa_len;
7451 	}
7452 
7453 	return 0;
7454 }
7455 
7456 
wpa_driver_nl80211_set_operstate(void * priv,int state)7457 static int wpa_driver_nl80211_set_operstate(void *priv, int state)
7458 {
7459 	struct i802_bss *bss = priv;
7460 	struct wpa_driver_nl80211_data *drv = bss->drv;
7461 
7462 	wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
7463 		   bss->ifname, drv->operstate, state,
7464 		   state ? "UP" : "DORMANT");
7465 	drv->operstate = state;
7466 	return netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, -1,
7467 				      state ? IF_OPER_UP : IF_OPER_DORMANT);
7468 }
7469 
7470 
wpa_driver_nl80211_set_supp_port(void * priv,int authorized)7471 static int wpa_driver_nl80211_set_supp_port(void *priv, int authorized)
7472 {
7473 	struct i802_bss *bss = priv;
7474 	struct wpa_driver_nl80211_data *drv = bss->drv;
7475 	struct nl_msg *msg;
7476 	struct nl80211_sta_flag_update upd;
7477 	int ret;
7478 	const u8 *connected_addr = drv->sta_mlo_info.valid_links ?
7479 		drv->sta_mlo_info.ap_mld_addr : drv->bssid;
7480 
7481 	if (!drv->associated && is_zero_ether_addr(connected_addr) &&
7482 	    !authorized) {
7483 		wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
7484 		return 0;
7485 	}
7486 
7487 	wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
7488 		   MACSTR, authorized ? "" : "un", MAC2STR(connected_addr));
7489 
7490 	os_memset(&upd, 0, sizeof(upd));
7491 	upd.mask = BIT(NL80211_STA_FLAG_AUTHORIZED);
7492 	if (authorized)
7493 		upd.set = BIT(NL80211_STA_FLAG_AUTHORIZED);
7494 
7495 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
7496 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, connected_addr) ||
7497 	    nla_put(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd)) {
7498 		nlmsg_free(msg);
7499 		return -ENOBUFS;
7500 	}
7501 
7502 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7503 	if (!ret)
7504 		return 0;
7505 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
7506 		   ret, strerror(-ret));
7507 	return ret;
7508 }
7509 
7510 
7511 /* Set kernel driver on given frequency (MHz) */
i802_set_freq(void * priv,struct hostapd_freq_params * freq)7512 static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
7513 {
7514 	struct i802_bss *bss = priv;
7515 	return nl80211_set_channel(bss, freq, 0);
7516 }
7517 
7518 
min_int(int a,int b)7519 static inline int min_int(int a, int b)
7520 {
7521 	if (a < b)
7522 		return a;
7523 	return b;
7524 }
7525 
7526 
get_key_handler(struct nl_msg * msg,void * arg)7527 static int get_key_handler(struct nl_msg *msg, void *arg)
7528 {
7529 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
7530 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7531 
7532 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7533 		  genlmsg_attrlen(gnlh, 0), NULL);
7534 
7535 	/*
7536 	 * TODO: validate the key index and mac address!
7537 	 * Otherwise, there's a race condition as soon as
7538 	 * the kernel starts sending key notifications.
7539 	 */
7540 
7541 	if (tb[NL80211_ATTR_KEY_SEQ])
7542 		memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
7543 		       min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
7544 	nl80211_nlmsg_clear(msg);
7545 	return NL_SKIP;
7546 }
7547 
7548 
i802_get_seqnum(const char * iface,void * priv,const u8 * addr,int idx,u8 * seq)7549 static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
7550 			   int idx, u8 *seq)
7551 {
7552 	struct i802_bss *bss = priv;
7553 	struct wpa_driver_nl80211_data *drv = bss->drv;
7554 	struct nl_msg *msg;
7555 
7556 	msg = nl80211_ifindex_msg(drv, if_nametoindex(iface), 0,
7557 				  NL80211_CMD_GET_KEY);
7558 	if (!msg ||
7559 	    (addr && nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) ||
7560 	    nla_put_u8(msg, NL80211_ATTR_KEY_IDX, idx)) {
7561 		nlmsg_free(msg);
7562 		return -ENOBUFS;
7563 	}
7564 
7565 	memset(seq, 0, 6);
7566 
7567 	return send_and_recv_msgs(drv, msg, get_key_handler, seq, NULL, NULL);
7568 }
7569 
7570 
i802_set_rts(void * priv,int rts)7571 static int i802_set_rts(void *priv, int rts)
7572 {
7573 	struct i802_bss *bss = priv;
7574 	struct wpa_driver_nl80211_data *drv = bss->drv;
7575 	struct nl_msg *msg;
7576 	int ret;
7577 	u32 val;
7578 
7579 	if (rts >= 2347 || rts == -1)
7580 		val = (u32) -1;
7581 	else
7582 		val = rts;
7583 
7584 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
7585 	    nla_put_u32(msg, NL80211_ATTR_WIPHY_RTS_THRESHOLD, val)) {
7586 		nlmsg_free(msg);
7587 		return -ENOBUFS;
7588 	}
7589 
7590 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7591 	if (!ret)
7592 		return 0;
7593 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
7594 		   "%d (%s)", rts, ret, strerror(-ret));
7595 	return ret;
7596 }
7597 
7598 
i802_set_frag(void * priv,int frag)7599 static int i802_set_frag(void *priv, int frag)
7600 {
7601 	struct i802_bss *bss = priv;
7602 	struct wpa_driver_nl80211_data *drv = bss->drv;
7603 	struct nl_msg *msg;
7604 	int ret;
7605 	u32 val;
7606 
7607 	if (frag >= 2346 || frag == -1)
7608 		val = (u32) -1;
7609 	else
7610 		val = frag;
7611 
7612 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_WIPHY)) ||
7613 	    nla_put_u32(msg, NL80211_ATTR_WIPHY_FRAG_THRESHOLD, val)) {
7614 		nlmsg_free(msg);
7615 		return -ENOBUFS;
7616 	}
7617 
7618 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
7619 	if (!ret)
7620 		return 0;
7621 	wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
7622 		   "%d: %d (%s)", frag, ret, strerror(-ret));
7623 	return ret;
7624 }
7625 
7626 
i802_flush(void * priv)7627 static int i802_flush(void *priv)
7628 {
7629 	struct i802_bss *bss = priv;
7630 	struct nl_msg *msg;
7631 	int res;
7632 
7633 	wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
7634 		   bss->ifname);
7635 
7636 	/*
7637 	 * XXX: FIX! this needs to flush all VLANs too
7638 	 */
7639 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_DEL_STATION);
7640 	res = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
7641 	if (res) {
7642 		wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
7643 			   "(%s)", res, strerror(-res));
7644 	}
7645 	return res;
7646 }
7647 
7648 
get_sta_tid_stats(struct hostap_sta_driver_data * data,struct nlattr * attr)7649 static void get_sta_tid_stats(struct hostap_sta_driver_data *data,
7650 			      struct nlattr *attr)
7651 {
7652 	struct nlattr *tid_stats[NL80211_TID_STATS_MAX + 1], *tidattr;
7653 	struct nlattr *txq_stats[NL80211_TXQ_STATS_MAX + 1];
7654 	static struct nla_policy txq_stats_policy[NL80211_TXQ_STATS_MAX + 1] = {
7655 		[NL80211_TXQ_STATS_BACKLOG_BYTES] = { .type = NLA_U32 },
7656 		[NL80211_TXQ_STATS_BACKLOG_PACKETS] = { .type = NLA_U32 },
7657 	};
7658 	int rem;
7659 
7660 	nla_for_each_nested(tidattr, attr, rem) {
7661 		if (nla_parse_nested(tid_stats, NL80211_TID_STATS_MAX,
7662 				     tidattr, NULL) != 0 ||
7663 		    !tid_stats[NL80211_TID_STATS_TXQ_STATS] ||
7664 		    nla_parse_nested(txq_stats, NL80211_TXQ_STATS_MAX,
7665 				     tid_stats[NL80211_TID_STATS_TXQ_STATS],
7666 				     txq_stats_policy) != 0)
7667 			continue;
7668 		/* sum the backlogs over all TIDs for station */
7669 		if (txq_stats[NL80211_TXQ_STATS_BACKLOG_BYTES])
7670 			data->backlog_bytes += nla_get_u32(
7671 				txq_stats[NL80211_TXQ_STATS_BACKLOG_BYTES]);
7672 		if (txq_stats[NL80211_TXQ_STATS_BACKLOG_PACKETS])
7673 			data->backlog_bytes += nla_get_u32(
7674 				txq_stats[NL80211_TXQ_STATS_BACKLOG_PACKETS]);
7675 	}
7676 }
7677 
7678 
get_sta_handler(struct nl_msg * msg,void * arg)7679 static int get_sta_handler(struct nl_msg *msg, void *arg)
7680 {
7681 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
7682 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
7683 	struct hostap_sta_driver_data *data = arg;
7684 	struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
7685 	static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
7686 		[NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
7687 		[NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
7688 		[NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
7689 		[NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
7690 		[NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
7691 		[NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
7692 		[NL80211_STA_INFO_TX_RETRIES] = { .type = NLA_U32 },
7693 		[NL80211_STA_INFO_TX_FAILED] = { .type = NLA_U32 },
7694 		[NL80211_STA_INFO_SIGNAL_AVG] = { .type = NLA_U8 },
7695 		[NL80211_STA_INFO_CONNECTED_TIME] = { .type = NLA_U32 },
7696 		[NL80211_STA_INFO_BEACON_LOSS] = { .type = NLA_U32 },
7697 		[NL80211_STA_INFO_RX_BYTES64] = { .type = NLA_U64 },
7698 		[NL80211_STA_INFO_TX_BYTES64] = { .type = NLA_U64 },
7699 		[NL80211_STA_INFO_EXPECTED_THROUGHPUT] = { .type = NLA_U32 },
7700 		[NL80211_STA_INFO_RX_DROP_MISC] = { .type = NLA_U64 },
7701 		[NL80211_STA_INFO_BEACON_RX] = { .type = NLA_U64 },
7702 		[NL80211_STA_INFO_BEACON_SIGNAL_AVG] = { .type = NLA_U8},
7703 		[NL80211_STA_INFO_RX_DURATION] = { .type = NLA_U64 },
7704 		[NL80211_STA_INFO_ACK_SIGNAL] = { .type = NLA_U8 },
7705 		[NL80211_STA_INFO_ACK_SIGNAL_AVG] = { .type = NLA_S8 },
7706 		[NL80211_STA_INFO_RX_MPDUS] = { .type = NLA_U32 },
7707 		[NL80211_STA_INFO_FCS_ERROR_COUNT] = { .type = NLA_U32 },
7708 		[NL80211_STA_INFO_TX_DURATION] = { .type = NLA_U64 },
7709 	};
7710 	struct nlattr *rate[NL80211_RATE_INFO_MAX + 1];
7711 	static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
7712 		[NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
7713 		[NL80211_RATE_INFO_BITRATE32] = { .type = NLA_U32 },
7714 		[NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
7715 		[NL80211_RATE_INFO_VHT_MCS] = { .type = NLA_U8 },
7716 		[NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
7717 		[NL80211_RATE_INFO_VHT_NSS] = { .type = NLA_U8 },
7718 		[NL80211_RATE_INFO_HE_MCS] = { .type = NLA_U8 },
7719 		[NL80211_RATE_INFO_HE_NSS] = { .type = NLA_U8 },
7720 		[NL80211_RATE_INFO_HE_GI] = { .type = NLA_U8 },
7721 		[NL80211_RATE_INFO_HE_DCM] = { .type = NLA_U8 },
7722 	};
7723 
7724 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
7725 		  genlmsg_attrlen(gnlh, 0), NULL);
7726 
7727 	/*
7728 	 * TODO: validate the interface and mac address!
7729 	 * Otherwise, there's a race condition as soon as
7730 	 * the kernel starts sending station notifications.
7731 	 */
7732 
7733 	if (!tb[NL80211_ATTR_STA_INFO]) {
7734 		wpa_printf(MSG_DEBUG, "sta stats missing!");
7735 		return NL_SKIP;
7736 	}
7737 	if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
7738 			     tb[NL80211_ATTR_STA_INFO],
7739 			     stats_policy)) {
7740 		wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
7741 		return NL_SKIP;
7742 	}
7743 
7744 	if (stats[NL80211_STA_INFO_INACTIVE_TIME])
7745 		data->inactive_msec =
7746 			nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
7747 	/* For backwards compatibility, fetch the 32-bit counters first. */
7748 	if (stats[NL80211_STA_INFO_RX_BYTES])
7749 		data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
7750 	if (stats[NL80211_STA_INFO_TX_BYTES])
7751 		data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
7752 	if (stats[NL80211_STA_INFO_RX_BYTES64] &&
7753 	    stats[NL80211_STA_INFO_TX_BYTES64]) {
7754 		/*
7755 		 * The driver supports 64-bit counters, so use them to override
7756 		 * the 32-bit values.
7757 		 */
7758 		data->rx_bytes =
7759 			nla_get_u64(stats[NL80211_STA_INFO_RX_BYTES64]);
7760 		data->tx_bytes =
7761 			nla_get_u64(stats[NL80211_STA_INFO_TX_BYTES64]);
7762 		data->bytes_64bit = 1;
7763 	}
7764 	if (stats[NL80211_STA_INFO_SIGNAL])
7765 		data->signal = (s8) nla_get_u8(stats[NL80211_STA_INFO_SIGNAL]);
7766 	if (stats[NL80211_STA_INFO_RX_PACKETS])
7767 		data->rx_packets =
7768 			nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
7769 	if (stats[NL80211_STA_INFO_TX_PACKETS])
7770 		data->tx_packets =
7771 			nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
7772 	if (stats[NL80211_STA_INFO_TX_RETRIES])
7773 		data->tx_retry_count =
7774 			nla_get_u32(stats[NL80211_STA_INFO_TX_RETRIES]);
7775 	if (stats[NL80211_STA_INFO_TX_FAILED])
7776 		data->tx_retry_failed =
7777 			nla_get_u32(stats[NL80211_STA_INFO_TX_FAILED]);
7778 	if (stats[NL80211_STA_INFO_SIGNAL_AVG])
7779 		data->avg_signal =
7780 			(s8) nla_get_u8(stats[NL80211_STA_INFO_SIGNAL_AVG]);
7781 	if (stats[NL80211_STA_INFO_CONNECTED_TIME]) {
7782 		data->connected_sec =
7783 			nla_get_u32(stats[NL80211_STA_INFO_CONNECTED_TIME]);
7784 		data->flags |= STA_DRV_DATA_CONN_TIME;
7785 	}
7786 	if (stats[NL80211_STA_INFO_BEACON_LOSS])
7787 		data->beacon_loss_count =
7788 			nla_get_u32(stats[NL80211_STA_INFO_BEACON_LOSS]);
7789 	if (stats[NL80211_STA_INFO_EXPECTED_THROUGHPUT])
7790 		data->expected_throughput =
7791 			nla_get_u32(stats[NL80211_STA_INFO_EXPECTED_THROUGHPUT]);
7792 	if (stats[NL80211_STA_INFO_RX_DROP_MISC])
7793 		data->rx_drop_misc =
7794 			nla_get_u64(stats[NL80211_STA_INFO_RX_DROP_MISC]);
7795 	if (stats[NL80211_STA_INFO_BEACON_RX])
7796 		data->beacons_count =
7797 			nla_get_u64(stats[NL80211_STA_INFO_BEACON_RX]);
7798 	if (stats[NL80211_STA_INFO_BEACON_SIGNAL_AVG])
7799 		data->avg_beacon_signal =
7800 			(s8) nla_get_u8(stats[NL80211_STA_INFO_BEACON_SIGNAL_AVG]);
7801 	if (stats[NL80211_STA_INFO_RX_DURATION])
7802 		data->rx_airtime =
7803 			nla_get_u64(stats[NL80211_STA_INFO_RX_DURATION]);
7804 	if (stats[NL80211_STA_INFO_ACK_SIGNAL]) {
7805 		data->last_ack_rssi =
7806 			nla_get_u8(stats[NL80211_STA_INFO_ACK_SIGNAL]);
7807 		data->flags |= STA_DRV_DATA_LAST_ACK_RSSI;
7808 	}
7809 	if (stats[NL80211_STA_INFO_ACK_SIGNAL_AVG])
7810 		data->avg_ack_signal =
7811 			nla_get_s8(stats[NL80211_STA_INFO_ACK_SIGNAL_AVG]);
7812 	if (stats[NL80211_STA_INFO_RX_MPDUS])
7813 		data->rx_mpdus = nla_get_u32(stats[NL80211_STA_INFO_RX_MPDUS]);
7814 	if (stats[NL80211_STA_INFO_FCS_ERROR_COUNT])
7815 		data->fcs_error_count =
7816 			nla_get_u32(stats[NL80211_STA_INFO_FCS_ERROR_COUNT]);
7817 	if (stats[NL80211_STA_INFO_TX_DURATION])
7818 		data->tx_airtime =
7819 			nla_get_u64(stats[NL80211_STA_INFO_TX_DURATION]);
7820 
7821 	if (stats[NL80211_STA_INFO_TX_BITRATE] &&
7822 	    nla_parse_nested(rate, NL80211_RATE_INFO_MAX,
7823 			     stats[NL80211_STA_INFO_TX_BITRATE],
7824 			     rate_policy) == 0) {
7825 		if (rate[NL80211_RATE_INFO_BITRATE32])
7826 			data->current_tx_rate =
7827 				nla_get_u32(rate[NL80211_RATE_INFO_BITRATE32]);
7828 		else if (rate[NL80211_RATE_INFO_BITRATE])
7829 			data->current_tx_rate =
7830 				nla_get_u16(rate[NL80211_RATE_INFO_BITRATE]);
7831 
7832 		/* Convert from 100 kbps to kbps; it's a more convenient unit.
7833 		 * It's also safe up until ~1Tbps. */
7834 		data->current_tx_rate = data->current_tx_rate * 100;
7835 
7836 		if (rate[NL80211_RATE_INFO_MCS]) {
7837 			data->tx_mcs = nla_get_u8(rate[NL80211_RATE_INFO_MCS]);
7838 			data->flags |= STA_DRV_DATA_TX_MCS;
7839 		}
7840 		if (rate[NL80211_RATE_INFO_VHT_MCS]) {
7841 			data->tx_vhtmcs =
7842 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_MCS]);
7843 			data->flags |= STA_DRV_DATA_TX_VHT_MCS;
7844 		}
7845 		if (rate[NL80211_RATE_INFO_SHORT_GI]) {
7846 			data->tx_guard_interval = GUARD_INTERVAL_0_4;
7847 			data->flags |= STA_DRV_DATA_TX_SHORT_GI;
7848 		}
7849 		if (rate[NL80211_RATE_INFO_VHT_NSS]) {
7850 			data->tx_vht_nss =
7851 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_NSS]);
7852 			data->flags |= STA_DRV_DATA_TX_VHT_NSS;
7853 		}
7854 		if (rate[NL80211_RATE_INFO_HE_MCS]) {
7855 			data->tx_hemcs =
7856 				nla_get_u8(rate[NL80211_RATE_INFO_HE_MCS]);
7857 			data->flags |= STA_DRV_DATA_TX_HE_MCS;
7858 		}
7859 		if (rate[NL80211_RATE_INFO_HE_NSS]) {
7860 			data->tx_he_nss =
7861 				nla_get_u8(rate[NL80211_RATE_INFO_HE_NSS]);
7862 			data->flags |= STA_DRV_DATA_TX_HE_NSS;
7863 		}
7864 		if (rate[NL80211_RATE_INFO_HE_GI]) {
7865 			switch (nla_get_u8(rate[NL80211_RATE_INFO_HE_GI])) {
7866 			case NL80211_RATE_INFO_HE_GI_0_8:
7867 				data->tx_guard_interval = GUARD_INTERVAL_0_8;
7868 				break;
7869 			case NL80211_RATE_INFO_HE_GI_1_6:
7870 				data->tx_guard_interval = GUARD_INTERVAL_1_6;
7871 				break;
7872 			case NL80211_RATE_INFO_HE_GI_3_2:
7873 				data->tx_guard_interval = GUARD_INTERVAL_3_2;
7874 				break;
7875 			}
7876 			data->flags |= STA_DRV_DATA_TX_HE_GI;
7877 		}
7878 		if (rate[NL80211_RATE_INFO_HE_DCM]) {
7879 			data->tx_dcm =
7880 				nla_get_u8(rate[NL80211_RATE_INFO_HE_DCM]);
7881 			data->flags |= STA_DRV_DATA_TX_HE_DCM;
7882 		}
7883 	}
7884 
7885 	if (stats[NL80211_STA_INFO_RX_BITRATE] &&
7886 	    nla_parse_nested(rate, NL80211_RATE_INFO_MAX,
7887 			     stats[NL80211_STA_INFO_RX_BITRATE],
7888 			     rate_policy) == 0) {
7889 		if (rate[NL80211_RATE_INFO_BITRATE32])
7890 			data->current_rx_rate =
7891 				nla_get_u32(rate[NL80211_RATE_INFO_BITRATE32]);
7892 		else if (rate[NL80211_RATE_INFO_BITRATE])
7893 			data->current_rx_rate =
7894 				nla_get_u16(rate[NL80211_RATE_INFO_BITRATE]);
7895 
7896 		/* Convert from 100 kbps to kbps; it's a more convenient unit.
7897 		 * It's also safe up until ~1Tbps. */
7898 		data->current_rx_rate = data->current_rx_rate * 100;
7899 
7900 		if (rate[NL80211_RATE_INFO_MCS]) {
7901 			data->rx_mcs = nla_get_u8(rate[NL80211_RATE_INFO_MCS]);
7902 			data->flags |= STA_DRV_DATA_RX_MCS;
7903 		}
7904 		if (rate[NL80211_RATE_INFO_VHT_MCS]) {
7905 			data->rx_vhtmcs =
7906 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_MCS]);
7907 			data->flags |= STA_DRV_DATA_RX_VHT_MCS;
7908 		}
7909 		if (rate[NL80211_RATE_INFO_SHORT_GI]) {
7910 			data->rx_guard_interval = GUARD_INTERVAL_0_4;
7911 			data->flags |= STA_DRV_DATA_RX_SHORT_GI;
7912 		}
7913 		if (rate[NL80211_RATE_INFO_VHT_NSS]) {
7914 			data->rx_vht_nss =
7915 				nla_get_u8(rate[NL80211_RATE_INFO_VHT_NSS]);
7916 			data->flags |= STA_DRV_DATA_RX_VHT_NSS;
7917 		}
7918 		if (rate[NL80211_RATE_INFO_HE_MCS]) {
7919 			data->rx_hemcs =
7920 				nla_get_u8(rate[NL80211_RATE_INFO_HE_MCS]);
7921 			data->flags |= STA_DRV_DATA_RX_HE_MCS;
7922 		}
7923 		if (rate[NL80211_RATE_INFO_HE_NSS]) {
7924 			data->rx_he_nss =
7925 				nla_get_u8(rate[NL80211_RATE_INFO_HE_NSS]);
7926 			data->flags |= STA_DRV_DATA_RX_HE_NSS;
7927 		}
7928 		if (rate[NL80211_RATE_INFO_HE_GI]) {
7929 			switch (nla_get_u8(rate[NL80211_RATE_INFO_HE_GI])) {
7930 			case NL80211_RATE_INFO_HE_GI_0_8:
7931 				data->rx_guard_interval = GUARD_INTERVAL_0_8;
7932 				break;
7933 			case NL80211_RATE_INFO_HE_GI_1_6:
7934 				data->rx_guard_interval = GUARD_INTERVAL_1_6;
7935 				break;
7936 			case NL80211_RATE_INFO_HE_GI_3_2:
7937 				data->rx_guard_interval = GUARD_INTERVAL_3_2;
7938 				break;
7939 			}
7940 			data->flags |= STA_DRV_DATA_RX_HE_GI;
7941 		}
7942 		if (rate[NL80211_RATE_INFO_HE_DCM]) {
7943 			data->rx_dcm =
7944 				nla_get_u8(rate[NL80211_RATE_INFO_HE_DCM]);
7945 			data->flags |= STA_DRV_DATA_RX_HE_DCM;
7946 		}
7947 	}
7948 
7949 	if (stats[NL80211_STA_INFO_TID_STATS])
7950 		get_sta_tid_stats(data, stats[NL80211_STA_INFO_TID_STATS]);
7951 
7952 	return NL_SKIP;
7953 }
7954 
7955 
nl80211_get_link_signal(struct wpa_driver_nl80211_data * drv,const u8 * bssid,struct hostap_sta_driver_data * data)7956 int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
7957 			    const u8 *bssid,
7958 			    struct hostap_sta_driver_data *data)
7959 {
7960 	struct nl_msg *msg;
7961 
7962 	data->signal = -WPA_INVALID_NOISE;
7963 	data->current_tx_rate = 0;
7964 
7965 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_STATION)) ||
7966 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid)) {
7967 		nlmsg_free(msg);
7968 		return -ENOBUFS;
7969 	}
7970 
7971 	return send_and_recv_msgs(drv, msg, get_sta_handler, data, NULL, NULL);
7972 }
7973 
7974 
i802_read_sta_data(struct i802_bss * bss,struct hostap_sta_driver_data * data,const u8 * addr)7975 static int i802_read_sta_data(struct i802_bss *bss,
7976 			      struct hostap_sta_driver_data *data,
7977 			      const u8 *addr)
7978 {
7979 	struct nl_msg *msg;
7980 
7981 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_GET_STATION)) ||
7982 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
7983 		nlmsg_free(msg);
7984 		return -ENOBUFS;
7985 	}
7986 
7987 	return send_and_recv_msgs(bss->drv, msg, get_sta_handler, data,
7988 				  NULL, NULL);
7989 }
7990 
7991 
i802_set_tx_queue_params(void * priv,int queue,int aifs,int cw_min,int cw_max,int burst_time)7992 static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
7993 				    int cw_min, int cw_max, int burst_time)
7994 {
7995 	struct i802_bss *bss = priv;
7996 	struct wpa_driver_nl80211_data *drv = bss->drv;
7997 	struct nl_msg *msg;
7998 	struct nlattr *txq, *params;
7999 	int res;
8000 
8001 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_WIPHY);
8002 	if (!msg)
8003 		return -1;
8004 
8005 	txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
8006 	if (!txq)
8007 		goto fail;
8008 
8009 	/* We are only sending parameters for a single TXQ at a time */
8010 	params = nla_nest_start(msg, 1);
8011 	if (!params)
8012 		goto fail;
8013 
8014 	switch (queue) {
8015 	case 0:
8016 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VO))
8017 			goto fail;
8018 		break;
8019 	case 1:
8020 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VI))
8021 			goto fail;
8022 		break;
8023 	case 2:
8024 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BE))
8025 			goto fail;
8026 		break;
8027 	case 3:
8028 		if (nla_put_u8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BK))
8029 			goto fail;
8030 		break;
8031 	}
8032 	/* Burst time is configured in units of 0.1 msec and TXOP parameter in
8033 	 * 32 usec, so need to convert the value here. */
8034 	if (nla_put_u16(msg, NL80211_TXQ_ATTR_TXOP,
8035 			(burst_time * 100 + 16) / 32) ||
8036 	    nla_put_u16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min) ||
8037 	    nla_put_u16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max) ||
8038 	    nla_put_u8(msg, NL80211_TXQ_ATTR_AIFS, aifs))
8039 		goto fail;
8040 
8041 	nla_nest_end(msg, params);
8042 
8043 	nla_nest_end(msg, txq);
8044 
8045 	res = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8046 	wpa_printf(MSG_DEBUG,
8047 		   "nl80211: TX queue param set: queue=%d aifs=%d cw_min=%d cw_max=%d burst_time=%d --> res=%d",
8048 		   queue, aifs, cw_min, cw_max, burst_time, res);
8049 	if (res == 0)
8050 		return 0;
8051 	msg = NULL;
8052 fail:
8053 	nlmsg_free(msg);
8054 	return -1;
8055 }
8056 
8057 
i802_set_sta_vlan(struct i802_bss * bss,const u8 * addr,const char * ifname,int vlan_id)8058 static int i802_set_sta_vlan(struct i802_bss *bss, const u8 *addr,
8059 			     const char *ifname, int vlan_id)
8060 {
8061 	struct wpa_driver_nl80211_data *drv = bss->drv;
8062 	struct nl_msg *msg;
8063 	int ret;
8064 
8065 	wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
8066 		   ", ifname=%s[%d], vlan_id=%d)",
8067 		   bss->ifname, if_nametoindex(bss->ifname),
8068 		   MAC2STR(addr), ifname, if_nametoindex(ifname), vlan_id);
8069 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_STATION)) ||
8070 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
8071 	    (vlan_id && (drv->capa.flags & WPA_DRIVER_FLAGS_VLAN_OFFLOAD) &&
8072 	     nla_put_u16(msg, NL80211_ATTR_VLAN_ID, vlan_id)) ||
8073 	    nla_put_u32(msg, NL80211_ATTR_STA_VLAN, if_nametoindex(ifname))) {
8074 		nlmsg_free(msg);
8075 		return -ENOBUFS;
8076 	}
8077 
8078 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
8079 	if (ret < 0) {
8080 		wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
8081 			   MACSTR " ifname=%s vlan_id=%d) failed: %d (%s)",
8082 			   MAC2STR(addr), ifname, vlan_id, ret,
8083 			   strerror(-ret));
8084 	}
8085 	return ret;
8086 }
8087 
8088 
i802_get_inact_sec(void * priv,const u8 * addr)8089 static int i802_get_inact_sec(void *priv, const u8 *addr)
8090 {
8091 	struct hostap_sta_driver_data data;
8092 	int ret;
8093 
8094 	os_memset(&data, 0, sizeof(data));
8095 	data.inactive_msec = (unsigned long) -1;
8096 	ret = i802_read_sta_data(priv, &data, addr);
8097 	if (ret == -ENOENT)
8098 		return -ENOENT;
8099 	if (ret || data.inactive_msec == (unsigned long) -1)
8100 		return -1;
8101 	return data.inactive_msec / 1000;
8102 }
8103 
8104 
i802_sta_clear_stats(void * priv,const u8 * addr)8105 static int i802_sta_clear_stats(void *priv, const u8 *addr)
8106 {
8107 #if 0
8108 	/* TODO */
8109 #endif
8110 	return 0;
8111 }
8112 
8113 
i802_sta_deauth(void * priv,const u8 * own_addr,const u8 * addr,u16 reason)8114 static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
8115 			   u16 reason)
8116 {
8117 	struct i802_bss *bss = priv;
8118 	struct wpa_driver_nl80211_data *drv = bss->drv;
8119 	struct ieee80211_mgmt mgmt;
8120 	u8 channel;
8121 
8122 	if (ieee80211_freq_to_chan(bss->flink->freq, &channel) ==
8123 	    HOSTAPD_MODE_IEEE80211AD) {
8124 		/* Deauthentication is not used in DMG/IEEE 802.11ad;
8125 		 * disassociate the STA instead. */
8126 		return i802_sta_disassoc(priv, own_addr, addr, reason);
8127 	}
8128 
8129 	if (is_mesh_interface(drv->nlmode))
8130 		return -1;
8131 
8132 	if (drv->device_ap_sme)
8133 		return wpa_driver_nl80211_sta_remove(bss, addr, 1, reason);
8134 
8135 	memset(&mgmt, 0, sizeof(mgmt));
8136 	mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
8137 					  WLAN_FC_STYPE_DEAUTH);
8138 	memcpy(mgmt.da, addr, ETH_ALEN);
8139 	memcpy(mgmt.sa, own_addr, ETH_ALEN);
8140 	memcpy(mgmt.bssid, own_addr, ETH_ALEN);
8141 	mgmt.u.deauth.reason_code = host_to_le16(reason);
8142 	return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
8143 					    IEEE80211_HDRLEN +
8144 					    sizeof(mgmt.u.deauth), 0, 0, 0, 0,
8145 					    0, NULL, 0, 0);
8146 }
8147 
8148 
i802_sta_disassoc(void * priv,const u8 * own_addr,const u8 * addr,u16 reason)8149 static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
8150 			     u16 reason)
8151 {
8152 	struct i802_bss *bss = priv;
8153 	struct wpa_driver_nl80211_data *drv = bss->drv;
8154 	struct ieee80211_mgmt mgmt;
8155 
8156 	if (is_mesh_interface(drv->nlmode))
8157 		return -1;
8158 
8159 	if (drv->device_ap_sme)
8160 		return wpa_driver_nl80211_sta_remove(bss, addr, 0, reason);
8161 
8162 	memset(&mgmt, 0, sizeof(mgmt));
8163 	mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
8164 					  WLAN_FC_STYPE_DISASSOC);
8165 	memcpy(mgmt.da, addr, ETH_ALEN);
8166 	memcpy(mgmt.sa, own_addr, ETH_ALEN);
8167 	memcpy(mgmt.bssid, own_addr, ETH_ALEN);
8168 	mgmt.u.disassoc.reason_code = host_to_le16(reason);
8169 	return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
8170 					    IEEE80211_HDRLEN +
8171 					    sizeof(mgmt.u.disassoc), 0, 0, 0, 0,
8172 					    0, NULL, 0, 0);
8173 }
8174 
8175 
dump_ifidx(struct wpa_driver_nl80211_data * drv)8176 static void dump_ifidx(struct wpa_driver_nl80211_data *drv)
8177 {
8178 	char buf[200], *pos, *end;
8179 	int i, res;
8180 
8181 	pos = buf;
8182 	end = pos + sizeof(buf);
8183 
8184 	for (i = 0; i < drv->num_if_indices; i++) {
8185 		if (!drv->if_indices[i].ifindex)
8186 			continue;
8187 		res = os_snprintf(pos, end - pos, " %d(%d)",
8188 				  drv->if_indices[i].ifindex,
8189 				  drv->if_indices[i].reason);
8190 		if (os_snprintf_error(end - pos, res))
8191 			break;
8192 		pos += res;
8193 	}
8194 	*pos = '\0';
8195 
8196 	wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
8197 		   drv->num_if_indices, buf);
8198 }
8199 
8200 
add_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)8201 static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
8202 		      int ifidx_reason)
8203 {
8204 	int i;
8205 	struct drv_nl80211_if_info *old;
8206 
8207 	wpa_printf(MSG_DEBUG,
8208 		   "nl80211: Add own interface ifindex %d (ifidx_reason %d)",
8209 		   ifidx, ifidx_reason);
8210 	if (have_ifidx(drv, ifidx, ifidx_reason)) {
8211 		wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
8212 			   ifidx);
8213 		return;
8214 	}
8215 	for (i = 0; i < drv->num_if_indices; i++) {
8216 		if (drv->if_indices[i].ifindex == 0) {
8217 			drv->if_indices[i].ifindex = ifidx;
8218 			drv->if_indices[i].reason = ifidx_reason;
8219 			dump_ifidx(drv);
8220 			return;
8221 		}
8222 	}
8223 
8224 	if (drv->if_indices != drv->default_if_indices)
8225 		old = drv->if_indices;
8226 	else
8227 		old = NULL;
8228 
8229 	drv->if_indices = os_realloc_array(old, drv->num_if_indices + 1,
8230 					   sizeof(*old));
8231 	if (!drv->if_indices) {
8232 		if (!old)
8233 			drv->if_indices = drv->default_if_indices;
8234 		else
8235 			drv->if_indices = old;
8236 		wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
8237 			   "interfaces");
8238 		wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
8239 		return;
8240 	}
8241 	if (!old)
8242 		os_memcpy(drv->if_indices, drv->default_if_indices,
8243 			  sizeof(drv->default_if_indices));
8244 	drv->if_indices[drv->num_if_indices].ifindex = ifidx;
8245 	drv->if_indices[drv->num_if_indices].reason = ifidx_reason;
8246 	drv->num_if_indices++;
8247 	dump_ifidx(drv);
8248 }
8249 
8250 
del_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)8251 static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
8252 		      int ifidx_reason)
8253 {
8254 	int i;
8255 
8256 	for (i = 0; i < drv->num_if_indices; i++) {
8257 		if ((drv->if_indices[i].ifindex == ifidx ||
8258 		     ifidx == IFIDX_ANY) &&
8259 		    (drv->if_indices[i].reason == ifidx_reason ||
8260 		     ifidx_reason == IFIDX_ANY)) {
8261 			drv->if_indices[i].ifindex = 0;
8262 			drv->if_indices[i].reason = 0;
8263 			break;
8264 		}
8265 	}
8266 	dump_ifidx(drv);
8267 }
8268 
8269 
have_ifidx(struct wpa_driver_nl80211_data * drv,int ifidx,int ifidx_reason)8270 static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx,
8271 		      int ifidx_reason)
8272 {
8273 	int i;
8274 
8275 	for (i = 0; i < drv->num_if_indices; i++)
8276 		if (drv->if_indices[i].ifindex == ifidx &&
8277 		    (drv->if_indices[i].reason == ifidx_reason ||
8278 		     ifidx_reason == IFIDX_ANY))
8279 			return 1;
8280 
8281 	return 0;
8282 }
8283 
8284 
i802_set_wds_sta(void * priv,const u8 * addr,int aid,int val,const char * bridge_ifname,char * ifname_wds)8285 static int i802_set_wds_sta(void *priv, const u8 *addr, int aid, int val,
8286 			    const char *bridge_ifname, char *ifname_wds)
8287 {
8288 	struct i802_bss *bss = priv;
8289 	struct wpa_driver_nl80211_data *drv = bss->drv;
8290 	char name[IFNAMSIZ + 1];
8291 	union wpa_event_data event;
8292 	int ret;
8293 
8294 	ret = os_snprintf(name, sizeof(name), "%s.sta%d", bss->ifname, aid);
8295 	if (ret >= (int) sizeof(name))
8296 		wpa_printf(MSG_WARNING,
8297 			   "nl80211: WDS interface name was truncated");
8298 	else if (ret < 0)
8299 		return ret;
8300 
8301 	if (ifname_wds)
8302 		os_strlcpy(ifname_wds, name, IFNAMSIZ + 1);
8303 
8304 	wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
8305 		   " aid=%d val=%d name=%s", MAC2STR(addr), aid, val, name);
8306 	if (val) {
8307 		if (!if_nametoindex(name)) {
8308 			if (nl80211_create_iface(drv, name,
8309 						 NL80211_IFTYPE_AP_VLAN,
8310 						 bss->addr, 1, NULL, NULL, 0) <
8311 			    0)
8312 				return -1;
8313 			if (bridge_ifname &&
8314 			    linux_br_add_if(drv->global->ioctl_sock,
8315 					    bridge_ifname, name) < 0)
8316 				return -1;
8317 
8318 			os_memset(&event, 0, sizeof(event));
8319 			event.wds_sta_interface.sta_addr = addr;
8320 			event.wds_sta_interface.ifname = name;
8321 			event.wds_sta_interface.istatus = INTERFACE_ADDED;
8322 			wpa_supplicant_event(bss->ctx,
8323 					     EVENT_WDS_STA_INTERFACE_STATUS,
8324 					     &event);
8325 		}
8326 		if (linux_set_iface_flags(drv->global->ioctl_sock, name, 1)) {
8327 			wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
8328 				   "interface %s up", name);
8329 		}
8330 		return i802_set_sta_vlan(priv, addr, name, 0);
8331 	} else {
8332 		if (bridge_ifname &&
8333 		    linux_br_del_if(drv->global->ioctl_sock, bridge_ifname,
8334 				    name) < 0)
8335 			wpa_printf(MSG_INFO,
8336 				   "nl80211: Failed to remove interface %s from bridge %s: %s",
8337 				   name, bridge_ifname, strerror(errno));
8338 
8339 		i802_set_sta_vlan(priv, addr, bss->ifname, 0);
8340 		nl80211_remove_iface(drv, if_nametoindex(name));
8341 		os_memset(&event, 0, sizeof(event));
8342 		event.wds_sta_interface.sta_addr = addr;
8343 		event.wds_sta_interface.ifname = name;
8344 		event.wds_sta_interface.istatus = INTERFACE_REMOVED;
8345 		wpa_supplicant_event(bss->ctx, EVENT_WDS_STA_INTERFACE_STATUS,
8346 				     &event);
8347 		return 0;
8348 	}
8349 }
8350 
8351 
handle_eapol(int sock,void * eloop_ctx,void * sock_ctx)8352 static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
8353 {
8354 	struct wpa_driver_nl80211_data *drv = eloop_ctx;
8355 	struct sockaddr_ll lladdr;
8356 	unsigned char buf[3000];
8357 	int len;
8358 	socklen_t fromlen = sizeof(lladdr);
8359 
8360 	len = recvfrom(sock, buf, sizeof(buf), 0,
8361 		       (struct sockaddr *)&lladdr, &fromlen);
8362 	if (len < 0) {
8363 		wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
8364 			   strerror(errno));
8365 		return;
8366 	}
8367 
8368 	if (have_ifidx(drv, lladdr.sll_ifindex, IFIDX_ANY))
8369 		drv_event_eapol_rx(drv->ctx, lladdr.sll_addr, buf, len);
8370 }
8371 
8372 
i802_check_bridge(struct wpa_driver_nl80211_data * drv,struct i802_bss * bss,const char * brname,const char * ifname)8373 static int i802_check_bridge(struct wpa_driver_nl80211_data *drv,
8374 			     struct i802_bss *bss,
8375 			     const char *brname, const char *ifname)
8376 {
8377 	int br_ifindex;
8378 	char in_br[IFNAMSIZ];
8379 
8380 	os_strlcpy(bss->brname, brname, IFNAMSIZ);
8381 	br_ifindex = if_nametoindex(brname);
8382 	if (br_ifindex == 0) {
8383 		/*
8384 		 * Bridge was configured, but the bridge device does
8385 		 * not exist. Try to add it now.
8386 		 */
8387 		if (linux_br_add(drv->global->ioctl_sock, brname) < 0) {
8388 			wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
8389 				   "bridge interface %s: %s",
8390 				   brname, strerror(errno));
8391 			return -1;
8392 		}
8393 		bss->added_bridge = 1;
8394 		br_ifindex = if_nametoindex(brname);
8395 		add_ifidx(drv, br_ifindex, drv->ifindex);
8396 	}
8397 	bss->br_ifindex = br_ifindex;
8398 
8399 	if (linux_br_get(in_br, ifname) == 0) {
8400 		if (os_strcmp(in_br, brname) == 0) {
8401 			bss->already_in_bridge = 1;
8402 			return 0; /* already in the bridge */
8403 		}
8404 
8405 		wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
8406 			   "bridge %s", ifname, in_br);
8407 		if (linux_br_del_if(drv->global->ioctl_sock, in_br, ifname) <
8408 		    0) {
8409 			wpa_printf(MSG_ERROR, "nl80211: Failed to "
8410 				   "remove interface %s from bridge "
8411 				   "%s: %s",
8412 				   ifname, in_br, strerror(errno));
8413 			return -1;
8414 		}
8415 	}
8416 
8417 	wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
8418 		   ifname, brname);
8419 	if (linux_br_add_if(drv->global->ioctl_sock, brname, ifname) < 0) {
8420 		wpa_printf(MSG_WARNING,
8421 			   "nl80211: Failed to add interface %s into bridge %s: %s",
8422 			   ifname, brname, strerror(errno));
8423 		/* Try to continue without the interface being in a bridge. This
8424 		 * may be needed for some cases, e.g., with Open vSwitch, where
8425 		 * an external component will need to handle bridge
8426 		 * configuration. */
8427 		return 0;
8428 	}
8429 	bss->added_if_into_bridge = 1;
8430 
8431 	return 0;
8432 }
8433 
8434 
i802_init(struct hostapd_data * hapd,struct wpa_init_params * params)8435 static void *i802_init(struct hostapd_data *hapd,
8436 		       struct wpa_init_params *params)
8437 {
8438 	struct wpa_driver_nl80211_data *drv;
8439 	struct i802_bss *bss;
8440 	size_t i;
8441 	char master_ifname[IFNAMSIZ];
8442 	int ifindex, br_ifindex = 0;
8443 	int br_added = 0;
8444 
8445 	bss = wpa_driver_nl80211_drv_init(hapd, params->ifname,
8446 					  params->global_priv, 1,
8447 					  params->bssid, params->driver_params);
8448 	if (bss == NULL)
8449 		return NULL;
8450 
8451 	drv = bss->drv;
8452 
8453 	if (linux_br_get(master_ifname, params->ifname) == 0) {
8454 		wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
8455 			   params->ifname, master_ifname);
8456 		br_ifindex = if_nametoindex(master_ifname);
8457 		os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
8458 	} else if ((params->num_bridge == 0 || !params->bridge[0]) &&
8459 		   linux_master_get(master_ifname, params->ifname) == 0) {
8460 		wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in master %s",
8461 			params->ifname, master_ifname);
8462 		/* start listening for EAPOL on the master interface */
8463 		add_ifidx(drv, if_nametoindex(master_ifname), drv->ifindex);
8464 
8465 		/* check if master itself is under bridge */
8466 		if (linux_br_get(master_ifname, master_ifname) == 0) {
8467 			wpa_printf(MSG_DEBUG, "nl80211: which is in bridge %s",
8468 				   master_ifname);
8469 			br_ifindex = if_nametoindex(master_ifname);
8470 			os_strlcpy(bss->brname, master_ifname, IFNAMSIZ);
8471 		}
8472 	} else {
8473 		master_ifname[0] = '\0';
8474 	}
8475 
8476 	bss->br_ifindex = br_ifindex;
8477 
8478 	for (i = 0; i < params->num_bridge; i++) {
8479 		if (params->bridge[i]) {
8480 			ifindex = if_nametoindex(params->bridge[i]);
8481 			if (ifindex)
8482 				add_ifidx(drv, ifindex, drv->ifindex);
8483 			if (ifindex == br_ifindex)
8484 				br_added = 1;
8485 		}
8486 	}
8487 
8488 	/* start listening for EAPOL on the default AP interface */
8489 	add_ifidx(drv, drv->ifindex, IFIDX_ANY);
8490 
8491 	if (params->num_bridge && params->bridge[0]) {
8492 		if (i802_check_bridge(drv, bss, params->bridge[0],
8493 				      params->ifname) < 0)
8494 			goto failed;
8495 		if (os_strcmp(params->bridge[0], master_ifname) != 0)
8496 			br_added = 1;
8497 	}
8498 
8499 	if (!br_added && br_ifindex &&
8500 	    (params->num_bridge == 0 || !params->bridge[0]))
8501 		add_ifidx(drv, br_ifindex, drv->ifindex);
8502 
8503 #ifdef CONFIG_LIBNL3_ROUTE
8504 	if (bss->added_if_into_bridge || bss->already_in_bridge) {
8505 		int err;
8506 
8507 		drv->rtnl_sk = nl_socket_alloc();
8508 		if (drv->rtnl_sk == NULL) {
8509 			wpa_printf(MSG_ERROR, "nl80211: Failed to allocate nl_sock");
8510 			goto failed;
8511 		}
8512 
8513 		err = nl_connect(drv->rtnl_sk, NETLINK_ROUTE);
8514 		if (err) {
8515 			wpa_printf(MSG_ERROR, "nl80211: Failed to connect nl_sock to NETLINK_ROUTE: %s",
8516 				   nl_geterror(err));
8517 			goto failed;
8518 		}
8519 	}
8520 #endif /* CONFIG_LIBNL3_ROUTE */
8521 
8522 	if (drv->capa.flags2 & WPA_DRIVER_FLAGS2_CONTROL_PORT_RX) {
8523 		wpa_printf(MSG_DEBUG,
8524 			   "nl80211: Do not open EAPOL RX socket - using control port for RX");
8525 		goto skip_eapol_sock;
8526 	}
8527 
8528 	drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
8529 	if (drv->eapol_sock < 0) {
8530 		wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
8531 			   strerror(errno));
8532 		goto failed;
8533 	}
8534 
8535 	if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
8536 	{
8537 		wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
8538 		goto failed;
8539 	}
8540 skip_eapol_sock:
8541 
8542 	if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
8543 			       params->own_addr))
8544 		goto failed;
8545 	os_memcpy(drv->perm_addr, params->own_addr, ETH_ALEN);
8546 
8547 	memcpy(bss->addr, params->own_addr, ETH_ALEN);
8548 
8549 	return bss;
8550 
8551 failed:
8552 	wpa_driver_nl80211_deinit(bss);
8553 	return NULL;
8554 }
8555 
8556 
i802_deinit(void * priv)8557 static void i802_deinit(void *priv)
8558 {
8559 	struct i802_bss *bss = priv;
8560 	wpa_driver_nl80211_deinit(bss);
8561 }
8562 
8563 
wpa_driver_nl80211_if_type(enum wpa_driver_if_type type)8564 static enum nl80211_iftype wpa_driver_nl80211_if_type(
8565 	enum wpa_driver_if_type type)
8566 {
8567 	switch (type) {
8568 	case WPA_IF_STATION:
8569 		return NL80211_IFTYPE_STATION;
8570 	case WPA_IF_P2P_CLIENT:
8571 	case WPA_IF_P2P_GROUP:
8572 		return NL80211_IFTYPE_P2P_CLIENT;
8573 	case WPA_IF_AP_VLAN:
8574 		return NL80211_IFTYPE_AP_VLAN;
8575 	case WPA_IF_AP_BSS:
8576 		return NL80211_IFTYPE_AP;
8577 	case WPA_IF_P2P_GO:
8578 		return NL80211_IFTYPE_P2P_GO;
8579 	case WPA_IF_P2P_DEVICE:
8580 		return NL80211_IFTYPE_P2P_DEVICE;
8581 	case WPA_IF_MESH:
8582 		return NL80211_IFTYPE_MESH_POINT;
8583 	default:
8584 		return -1;
8585 	}
8586 }
8587 
8588 
nl80211_addr_in_use(struct nl80211_global * global,const u8 * addr)8589 static int nl80211_addr_in_use(struct nl80211_global *global, const u8 *addr)
8590 {
8591 	struct wpa_driver_nl80211_data *drv;
8592 	dl_list_for_each(drv, &global->interfaces,
8593 			 struct wpa_driver_nl80211_data, list) {
8594 		if (os_memcmp(addr, drv->first_bss->addr, ETH_ALEN) == 0)
8595 			return 1;
8596 	}
8597 	return 0;
8598 }
8599 
8600 
nl80211_vif_addr(struct wpa_driver_nl80211_data * drv,u8 * new_addr)8601 static int nl80211_vif_addr(struct wpa_driver_nl80211_data *drv, u8 *new_addr)
8602 {
8603 	unsigned int idx;
8604 
8605 	if (!drv->global)
8606 		return -1;
8607 
8608 	os_memcpy(new_addr, drv->first_bss->addr, ETH_ALEN);
8609 	for (idx = 0; idx < 64; idx++) {
8610 		new_addr[0] = drv->first_bss->addr[0] | 0x02;
8611 		new_addr[0] ^= idx << 2;
8612 		if (!nl80211_addr_in_use(drv->global, new_addr))
8613 			break;
8614 	}
8615 	if (idx == 64)
8616 		return -1;
8617 
8618 	wpa_printf(MSG_DEBUG, "nl80211: Assigned new virtual interface address "
8619 		   MACSTR, MAC2STR(new_addr));
8620 
8621 	return 0;
8622 }
8623 
8624 
8625 struct wdev_info {
8626 	u64 wdev_id;
8627 	int wdev_id_set;
8628 	u8 macaddr[ETH_ALEN];
8629 };
8630 
nl80211_wdev_handler(struct nl_msg * msg,void * arg)8631 static int nl80211_wdev_handler(struct nl_msg *msg, void *arg)
8632 {
8633 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8634 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
8635 	struct wdev_info *wi = arg;
8636 
8637 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8638 		  genlmsg_attrlen(gnlh, 0), NULL);
8639 	if (tb[NL80211_ATTR_WDEV]) {
8640 		wi->wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
8641 		wi->wdev_id_set = 1;
8642 	}
8643 
8644 	if (tb[NL80211_ATTR_MAC])
8645 		os_memcpy(wi->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
8646 			  ETH_ALEN);
8647 
8648 	return NL_SKIP;
8649 }
8650 
8651 
wpa_driver_nl80211_if_add(void * priv,enum wpa_driver_if_type type,const char * ifname,const u8 * addr,void * bss_ctx,void ** drv_priv,char * force_ifname,u8 * if_addr,const char * bridge,int use_existing,int setup_ap)8652 static int wpa_driver_nl80211_if_add(void *priv, enum wpa_driver_if_type type,
8653 				     const char *ifname, const u8 *addr,
8654 				     void *bss_ctx, void **drv_priv,
8655 				     char *force_ifname, u8 *if_addr,
8656 				     const char *bridge, int use_existing,
8657 				     int setup_ap)
8658 {
8659 	enum nl80211_iftype nlmode;
8660 	struct i802_bss *bss = priv;
8661 	struct wpa_driver_nl80211_data *drv = bss->drv;
8662 	int ifidx;
8663 	int added = 1;
8664 
8665 	if (addr)
8666 		os_memcpy(if_addr, addr, ETH_ALEN);
8667 	nlmode = wpa_driver_nl80211_if_type(type);
8668 	if (nlmode == NL80211_IFTYPE_P2P_DEVICE) {
8669 		struct wdev_info p2pdev_info;
8670 
8671 		os_memset(&p2pdev_info, 0, sizeof(p2pdev_info));
8672 		ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
8673 					     0, nl80211_wdev_handler,
8674 					     &p2pdev_info, use_existing);
8675 		if (!p2pdev_info.wdev_id_set || ifidx != 0) {
8676 			wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
8677 				   ifname);
8678 			return -1;
8679 		}
8680 
8681 		drv->global->if_add_wdevid = p2pdev_info.wdev_id;
8682 		drv->global->if_add_wdevid_set = p2pdev_info.wdev_id_set;
8683 		if (!is_zero_ether_addr(p2pdev_info.macaddr)) {
8684 			os_memcpy(if_addr, p2pdev_info.macaddr, ETH_ALEN);
8685 			os_memcpy(drv->global->p2p_perm_addr, p2pdev_info.macaddr, ETH_ALEN);
8686 		}
8687 		wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
8688 			   ifname,
8689 			   (long long unsigned int) p2pdev_info.wdev_id);
8690 	} else {
8691 		ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
8692 					     0, NULL, NULL, use_existing);
8693 		if (use_existing && ifidx == -ENFILE) {
8694 			added = 0;
8695 			ifidx = if_nametoindex(ifname);
8696 		} else if (ifidx < 0) {
8697 			return -1;
8698 		}
8699 	}
8700 
8701 	if (!addr) {
8702 		if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
8703 			os_memcpy(if_addr, bss->addr, ETH_ALEN);
8704 		else if (linux_get_ifhwaddr(drv->global->ioctl_sock,
8705 					    ifname, if_addr) < 0) {
8706 			if (added)
8707 				nl80211_remove_iface(drv, ifidx);
8708 			return -1;
8709 		}
8710 	}
8711 
8712 	if (!addr &&
8713 	    (type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP ||
8714 	     type == WPA_IF_P2P_GO || type == WPA_IF_MESH ||
8715 	     type == WPA_IF_STATION || type == WPA_IF_AP_BSS)) {
8716 		/* Enforce unique address */
8717 		u8 new_addr[ETH_ALEN];
8718 
8719 		if (linux_get_ifhwaddr(drv->global->ioctl_sock, ifname,
8720 				       new_addr) < 0) {
8721 			if (added)
8722 				nl80211_remove_iface(drv, ifidx);
8723 			return -1;
8724 		}
8725 		if (nl80211_addr_in_use(drv->global, new_addr)) {
8726 			wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
8727 				   "for interface %s type %d", ifname, type);
8728 			if (nl80211_vif_addr(drv, new_addr) < 0) {
8729 				if (added)
8730 					nl80211_remove_iface(drv, ifidx);
8731 				return -1;
8732 			}
8733 			if (linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
8734 					       new_addr) < 0) {
8735 				if (added)
8736 					nl80211_remove_iface(drv, ifidx);
8737 				return -1;
8738 			}
8739 		}
8740 		os_memcpy(if_addr, new_addr, ETH_ALEN);
8741 	}
8742 
8743 	if (type == WPA_IF_AP_BSS && setup_ap) {
8744 		struct i802_bss *new_bss = os_zalloc(sizeof(*new_bss));
8745 		unsigned int i;
8746 
8747 		if (new_bss == NULL) {
8748 			if (added)
8749 				nl80211_remove_iface(drv, ifidx);
8750 			return -1;
8751 		}
8752 
8753 		/* Initialize here before any failure path */
8754 		for (i = 0; i < MAX_NUM_MLD_LINKS; i++)
8755 			new_bss->links[i].link_id = NL80211_DRV_LINK_ID_NA;
8756 
8757 		if (bridge &&
8758 		    i802_check_bridge(drv, new_bss, bridge, ifname) < 0) {
8759 			wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
8760 				   "interface %s to a bridge %s",
8761 				   ifname, bridge);
8762 			if (added)
8763 				nl80211_remove_iface(drv, ifidx);
8764 			os_free(new_bss);
8765 			return -1;
8766 		}
8767 
8768 		if (linux_set_iface_flags(drv->global->ioctl_sock, ifname, 1))
8769 		{
8770 			if (added)
8771 				nl80211_remove_iface(drv, ifidx);
8772 			os_free(new_bss);
8773 			return -1;
8774 		}
8775 		os_strlcpy(new_bss->ifname, ifname, IFNAMSIZ);
8776 		os_memcpy(new_bss->addr, if_addr, ETH_ALEN);
8777 		new_bss->ifindex = ifidx;
8778 		new_bss->drv = drv;
8779 		new_bss->next = drv->first_bss->next;
8780 		new_bss->flink = &new_bss->links[0];
8781 		new_bss->n_links = 1;
8782 		os_memcpy(new_bss->flink->addr, new_bss->addr, ETH_ALEN);
8783 
8784 		new_bss->flink->freq = drv->first_bss->flink->freq;
8785 		new_bss->ctx = bss_ctx;
8786 		new_bss->added_if = added;
8787 		drv->first_bss->next = new_bss;
8788 		if (drv_priv)
8789 			*drv_priv = new_bss;
8790 		nl80211_init_bss(new_bss);
8791 
8792 		/* Subscribe management frames for this WPA_IF_AP_BSS */
8793 		if (nl80211_setup_ap(new_bss))
8794 			return -1;
8795 	}
8796 
8797 	if (drv->global)
8798 		drv->global->if_add_ifindex = ifidx;
8799 
8800 	/*
8801 	 * Some virtual interfaces need to process EAPOL packets and events on
8802 	 * the parent interface. This is used mainly with hostapd.
8803 	 */
8804 	if (ifidx > 0 &&
8805 	    (drv->hostapd ||
8806 	     nlmode == NL80211_IFTYPE_AP_VLAN ||
8807 	     nlmode == NL80211_IFTYPE_WDS ||
8808 	     nlmode == NL80211_IFTYPE_MONITOR))
8809 		add_ifidx(drv, ifidx, IFIDX_ANY);
8810 
8811 	return 0;
8812 }
8813 
8814 
wpa_driver_nl80211_if_remove(struct i802_bss * bss,enum wpa_driver_if_type type,const char * ifname)8815 static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
8816 					enum wpa_driver_if_type type,
8817 					const char *ifname)
8818 {
8819 	struct wpa_driver_nl80211_data *drv = bss->drv;
8820 	int ifindex = if_nametoindex(ifname);
8821 
8822 	wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
8823 		   __func__, type, ifname, ifindex, bss->added_if);
8824 	if (ifindex > 0 && (bss->added_if || bss->ifindex != ifindex))
8825 		nl80211_remove_iface(drv, ifindex);
8826 	else if (ifindex > 0 && !bss->added_if) {
8827 		struct wpa_driver_nl80211_data *drv2;
8828 		dl_list_for_each(drv2, &drv->global->interfaces,
8829 				 struct wpa_driver_nl80211_data, list) {
8830 			del_ifidx(drv2, ifindex, IFIDX_ANY);
8831 			del_ifidx(drv2, IFIDX_ANY, ifindex);
8832 		}
8833 	}
8834 
8835 	if (type != WPA_IF_AP_BSS)
8836 		return 0;
8837 
8838 	if (bss->added_if_into_bridge) {
8839 		if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
8840 				    bss->ifname) < 0)
8841 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
8842 				   "interface %s from bridge %s: %s",
8843 				   bss->ifname, bss->brname, strerror(errno));
8844 	}
8845 	if (bss->added_bridge) {
8846 		if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
8847 			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
8848 				   "bridge %s: %s",
8849 				   bss->brname, strerror(errno));
8850 	}
8851 
8852 	if (bss != drv->first_bss) {
8853 		struct i802_bss *tbss;
8854 
8855 		wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
8856 		for (tbss = drv->first_bss; tbss; tbss = tbss->next) {
8857 			if (tbss->next == bss) {
8858 				tbss->next = bss->next;
8859 				/* Unsubscribe management frames */
8860 				nl80211_teardown_ap(bss);
8861 				nl80211_destroy_bss(bss);
8862 				if (!bss->added_if)
8863 					i802_set_iface_flags(bss, 0);
8864 				os_free(bss);
8865 				bss = NULL;
8866 				break;
8867 			}
8868 		}
8869 		if (bss)
8870 			wpa_printf(MSG_INFO, "nl80211: %s - could not find "
8871 				   "BSS %p in the list", __func__, bss);
8872 	} else {
8873 		wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
8874 		nl80211_teardown_ap(bss);
8875 		if (!bss->added_if && !drv->first_bss->next)
8876 			wpa_driver_nl80211_del_beacon_all(bss);
8877 		nl80211_destroy_bss(bss);
8878 		if (!bss->added_if)
8879 			i802_set_iface_flags(bss, 0);
8880 		if (drv->first_bss->next) {
8881 			drv->first_bss = drv->first_bss->next;
8882 			drv->ctx = drv->first_bss->ctx;
8883 			os_free(bss);
8884 		} else {
8885 			wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
8886 		}
8887 	}
8888 
8889 	return 0;
8890 }
8891 
8892 
cookie_handler(struct nl_msg * msg,void * arg)8893 static int cookie_handler(struct nl_msg *msg, void *arg)
8894 {
8895 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
8896 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
8897 	u64 *cookie = arg;
8898 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
8899 		  genlmsg_attrlen(gnlh, 0), NULL);
8900 	if (tb[NL80211_ATTR_COOKIE])
8901 		*cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
8902 	return NL_SKIP;
8903 }
8904 
8905 
nl80211_send_frame_cmd(struct i802_bss * bss,unsigned int freq,unsigned int wait,const u8 * buf,size_t buf_len,int save_cookie,int no_cck,int no_ack,int offchanok,const u16 * csa_offs,size_t csa_offs_len)8906 static int nl80211_send_frame_cmd(struct i802_bss *bss,
8907 				  unsigned int freq, unsigned int wait,
8908 				  const u8 *buf, size_t buf_len,
8909 				  int save_cookie, int no_cck, int no_ack,
8910 				  int offchanok, const u16 *csa_offs,
8911 				  size_t csa_offs_len)
8912 {
8913 	struct wpa_driver_nl80211_data *drv = bss->drv;
8914 	struct nl_msg *msg;
8915 	u64 cookie;
8916 	int ret = -1;
8917 
8918 	wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
8919 		   "no_ack=%d offchanok=%d",
8920 		   freq, wait, no_cck, no_ack, offchanok);
8921 	wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len);
8922 
8923 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME)) ||
8924 	    (freq && nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq)) ||
8925 	    (wait && nla_put_u32(msg, NL80211_ATTR_DURATION, wait)) ||
8926 	    (offchanok && ((drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
8927 			   drv->test_use_roc_tx) &&
8928 	     nla_put_flag(msg, NL80211_ATTR_OFFCHANNEL_TX_OK)) ||
8929 	    (no_cck && nla_put_flag(msg, NL80211_ATTR_TX_NO_CCK_RATE)) ||
8930 	    (no_ack && nla_put_flag(msg, NL80211_ATTR_DONT_WAIT_FOR_ACK)) ||
8931 	    (csa_offs && nla_put(msg, NL80211_ATTR_CSA_C_OFFSETS_TX,
8932 				 csa_offs_len * sizeof(u16), csa_offs)) ||
8933 	    nla_put(msg, NL80211_ATTR_FRAME, buf_len, buf))
8934 		goto fail;
8935 
8936 	cookie = 0;
8937 	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
8938 	msg = NULL;
8939 	if (ret) {
8940 		wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
8941 			   "(%s) (freq=%u wait=%u)", ret, strerror(-ret),
8942 			   freq, wait);
8943 	} else {
8944 		wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
8945 			   "cookie 0x%llx", no_ack ? " (no ACK)" : "",
8946 			   (long long unsigned int) cookie);
8947 
8948 		if (save_cookie)
8949 			drv->send_frame_cookie = no_ack ? (u64) -1 : cookie;
8950 
8951 		if (!wait) {
8952 			 /* There is no need to store this cookie since there
8953 			  * is no wait that could be canceled later.  */
8954 			goto fail;
8955 		}
8956 		if (drv->num_send_frame_cookies == MAX_SEND_FRAME_COOKIES) {
8957 			wpa_printf(MSG_DEBUG,
8958 				   "nl80211: Drop oldest pending send frame cookie 0x%llx",
8959 				   (long long unsigned int)
8960 				   drv->send_frame_cookies[0]);
8961 			os_memmove(&drv->send_frame_cookies[0],
8962 				   &drv->send_frame_cookies[1],
8963 				   (MAX_SEND_FRAME_COOKIES - 1) *
8964 				   sizeof(u64));
8965 			drv->num_send_frame_cookies--;
8966 		}
8967 		drv->send_frame_cookies[drv->num_send_frame_cookies] = cookie;
8968 		drv->num_send_frame_cookies++;
8969 	}
8970 
8971 fail:
8972 	nlmsg_free(msg);
8973 	return ret;
8974 }
8975 
8976 
wpa_driver_nl80211_send_action(struct i802_bss * bss,unsigned int freq,unsigned int wait_time,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,int no_cck)8977 static int wpa_driver_nl80211_send_action(struct i802_bss *bss,
8978 					  unsigned int freq,
8979 					  unsigned int wait_time,
8980 					  const u8 *dst, const u8 *src,
8981 					  const u8 *bssid,
8982 					  const u8 *data, size_t data_len,
8983 					  int no_cck)
8984 {
8985 	struct wpa_driver_nl80211_data *drv = bss->drv;
8986 	int ret = -1;
8987 	u8 *buf;
8988 	struct ieee80211_hdr *hdr;
8989 	int offchanok = 1;
8990 
8991 	if (is_ap_interface(drv->nlmode) && (int) freq == bss->flink->freq &&
8992 	    bss->flink->beacon_set)
8993 		offchanok = 0;
8994 
8995 	wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
8996 		   "freq=%u MHz wait=%d ms no_cck=%d offchanok=%d)",
8997 		   drv->ifindex, freq, wait_time, no_cck, offchanok);
8998 
8999 	buf = os_zalloc(24 + data_len);
9000 	if (buf == NULL)
9001 		return ret;
9002 	os_memcpy(buf + 24, data, data_len);
9003 	hdr = (struct ieee80211_hdr *) buf;
9004 	hdr->frame_control =
9005 		IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
9006 	os_memcpy(hdr->addr1, dst, ETH_ALEN);
9007 	os_memcpy(hdr->addr2, src, ETH_ALEN);
9008 	os_memcpy(hdr->addr3, bssid, ETH_ALEN);
9009 
9010 	if (os_memcmp(bss->addr, src, ETH_ALEN) != 0) {
9011 		wpa_printf(MSG_DEBUG, "nl80211: Use random TA " MACSTR,
9012 			   MAC2STR(src));
9013 		os_memcpy(bss->rand_addr, src, ETH_ALEN);
9014 	} else {
9015 		os_memset(bss->rand_addr, 0, ETH_ALEN);
9016 	}
9017 
9018 #ifdef CONFIG_MESH
9019 	if (is_mesh_interface(drv->nlmode)) {
9020 		struct hostapd_hw_modes *modes;
9021 		u16 num_modes, flags;
9022 		u8 dfs_domain;
9023 		int i;
9024 
9025 		modes = nl80211_get_hw_feature_data(bss, &num_modes,
9026 						    &flags, &dfs_domain);
9027 		if (dfs_domain != HOSTAPD_DFS_REGION_ETSI &&
9028 		    ieee80211_is_dfs(bss->flink->freq, modes, num_modes))
9029 			offchanok = 0;
9030 		if (modes) {
9031 			for (i = 0; i < num_modes; i++) {
9032 				os_free(modes[i].channels);
9033 				os_free(modes[i].rates);
9034 			}
9035 			os_free(modes);
9036 		}
9037 	}
9038 #endif /* CONFIG_MESH */
9039 
9040 	if (is_ap_interface(drv->nlmode) &&
9041 	    (!(drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
9042 	     (int) freq == bss->flink->freq || drv->device_ap_sme ||
9043 	     !drv->use_monitor))
9044 		ret = wpa_driver_nl80211_send_mlme(bss, buf, 24 + data_len,
9045 						   0, freq, no_cck, offchanok,
9046 						   wait_time, NULL, 0, 0);
9047 	else
9048 		ret = nl80211_send_frame_cmd(bss, freq, wait_time, buf,
9049 					     24 + data_len,
9050 					     1, no_cck, 0, offchanok, NULL, 0);
9051 
9052 	os_free(buf);
9053 	return ret;
9054 }
9055 
9056 
nl80211_frame_wait_cancel(struct i802_bss * bss,u64 cookie)9057 static void nl80211_frame_wait_cancel(struct i802_bss *bss, u64 cookie)
9058 {
9059 	struct wpa_driver_nl80211_data *drv = bss->drv;
9060 	struct nl_msg *msg;
9061 	int ret;
9062 
9063 	wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
9064 		   (long long unsigned int) cookie);
9065 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_FRAME_WAIT_CANCEL)) ||
9066 	    nla_put_u64(msg, NL80211_ATTR_COOKIE, cookie)) {
9067 		nlmsg_free(msg);
9068 		return;
9069 	}
9070 
9071 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9072 	if (ret)
9073 		wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
9074 			   "(%s)", ret, strerror(-ret));
9075 }
9076 
9077 
wpa_driver_nl80211_send_action_cancel_wait(void * priv)9078 static void wpa_driver_nl80211_send_action_cancel_wait(void *priv)
9079 {
9080 	struct i802_bss *bss = priv;
9081 	struct wpa_driver_nl80211_data *drv = bss->drv;
9082 	unsigned int i;
9083 	u64 cookie;
9084 
9085 	/* Cancel the last pending TX cookie */
9086 	if (drv->send_frame_cookie != (u64) -1)
9087 		nl80211_frame_wait_cancel(bss, drv->send_frame_cookie);
9088 
9089 	/*
9090 	 * Cancel the other pending TX cookies, if any. This is needed since
9091 	 * the driver may keep a list of all pending offchannel TX operations
9092 	 * and free up the radio only once they have expired or cancelled.
9093 	 */
9094 	for (i = drv->num_send_frame_cookies; i > 0; i--) {
9095 		cookie = drv->send_frame_cookies[i - 1];
9096 		if (cookie != drv->send_frame_cookie)
9097 			nl80211_frame_wait_cancel(bss, cookie);
9098 	}
9099 	drv->num_send_frame_cookies = 0;
9100 }
9101 
9102 
wpa_driver_nl80211_remain_on_channel(void * priv,unsigned int freq,unsigned int duration)9103 static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq,
9104 						unsigned int duration)
9105 {
9106 	struct i802_bss *bss = priv;
9107 	struct wpa_driver_nl80211_data *drv = bss->drv;
9108 	struct nl_msg *msg;
9109 	int ret;
9110 	u64 cookie;
9111 
9112 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_REMAIN_ON_CHANNEL)) ||
9113 	    nla_put_u32(msg, NL80211_ATTR_WIPHY_FREQ, freq) ||
9114 	    nla_put_u32(msg, NL80211_ATTR_DURATION, duration)) {
9115 		nlmsg_free(msg);
9116 		return -1;
9117 	}
9118 
9119 	cookie = 0;
9120 	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
9121 	if (ret == 0) {
9122 		wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
9123 			   "0x%llx for freq=%u MHz duration=%u",
9124 			   (long long unsigned int) cookie, freq, duration);
9125 		drv->remain_on_chan_cookie = cookie;
9126 		drv->pending_remain_on_chan = 1;
9127 		return 0;
9128 	}
9129 	wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
9130 		   "(freq=%d duration=%u): %d (%s)",
9131 		   freq, duration, ret, strerror(-ret));
9132 	return -1;
9133 }
9134 
9135 
wpa_driver_nl80211_cancel_remain_on_channel(void * priv)9136 static int wpa_driver_nl80211_cancel_remain_on_channel(void *priv)
9137 {
9138 	struct i802_bss *bss = priv;
9139 	struct wpa_driver_nl80211_data *drv = bss->drv;
9140 	struct nl_msg *msg;
9141 	int ret;
9142 
9143 	if (!drv->pending_remain_on_chan) {
9144 		wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
9145 			   "to cancel");
9146 		return -1;
9147 	}
9148 
9149 	wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
9150 		   "0x%llx",
9151 		   (long long unsigned int) drv->remain_on_chan_cookie);
9152 
9153 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL);
9154 	if (!msg ||
9155 	    nla_put_u64(msg, NL80211_ATTR_COOKIE, drv->remain_on_chan_cookie)) {
9156 		nlmsg_free(msg);
9157 		return -1;
9158 	}
9159 
9160 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9161 	if (ret == 0)
9162 		return 0;
9163 	wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
9164 		   "%d (%s)", ret, strerror(-ret));
9165 	return -1;
9166 }
9167 
9168 
wpa_driver_nl80211_probe_req_report(struct i802_bss * bss,int report)9169 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report)
9170 {
9171 	struct wpa_driver_nl80211_data *drv = bss->drv;
9172 
9173 	if (!report) {
9174 		if (bss->nl_preq && drv->device_ap_sme &&
9175 		    is_ap_interface(drv->nlmode) && !bss->in_deinit &&
9176 		    !bss->static_ap) {
9177 			/*
9178 			 * Do not disable Probe Request reporting that was
9179 			 * enabled in nl80211_setup_ap().
9180 			 */
9181 			wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
9182 				   "Probe Request reporting nl_preq=%p while "
9183 				   "in AP mode", bss->nl_preq);
9184 		} else if (bss->nl_preq) {
9185 			wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
9186 				   "reporting nl_preq=%p", bss->nl_preq);
9187 			nl80211_destroy_eloop_handle(&bss->nl_preq, 0);
9188 		}
9189 		return 0;
9190 	}
9191 
9192 	if (bss->nl_preq) {
9193 		wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
9194 			   "already on! nl_preq=%p", bss->nl_preq);
9195 		return 0;
9196 	}
9197 
9198 	bss->nl_preq = nl_create_handle(drv->global->nl_cb, "preq");
9199 	if (bss->nl_preq == NULL)
9200 		return -1;
9201 	wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
9202 		   "reporting nl_preq=%p", bss->nl_preq);
9203 
9204 	if (nl80211_register_frame(bss, bss->nl_preq,
9205 				   (WLAN_FC_TYPE_MGMT << 2) |
9206 				   (WLAN_FC_STYPE_PROBE_REQ << 4),
9207 				   NULL, 0, false) < 0)
9208 		goto out_err;
9209 
9210 	nl80211_register_eloop_read(&bss->nl_preq,
9211 				    wpa_driver_nl80211_event_receive,
9212 				    bss->nl_cb, 0);
9213 
9214 	return 0;
9215 
9216  out_err:
9217 	nl_destroy_handles(&bss->nl_preq);
9218 	return -1;
9219 }
9220 
9221 
nl80211_disable_11b_rates(struct wpa_driver_nl80211_data * drv,int ifindex,int disabled)9222 static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
9223 				     int ifindex, int disabled)
9224 {
9225 	struct nl_msg *msg;
9226 	struct nlattr *bands, *band;
9227 	int ret;
9228 
9229 	wpa_printf(MSG_DEBUG,
9230 		   "nl80211: NL80211_CMD_SET_TX_BITRATE_MASK (ifindex=%d %s)",
9231 		   ifindex, disabled ? "NL80211_TXRATE_LEGACY=OFDM-only" :
9232 		   "no NL80211_TXRATE_LEGACY constraint");
9233 
9234 	msg = nl80211_ifindex_msg(drv, ifindex, 0,
9235 				  NL80211_CMD_SET_TX_BITRATE_MASK);
9236 	if (!msg)
9237 		return -1;
9238 
9239 	bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
9240 	if (!bands)
9241 		goto fail;
9242 
9243 	/*
9244 	 * Disable 2 GHz rates 1, 2, 5.5, 11 Mbps by masking out everything
9245 	 * else apart from 6, 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS
9246 	 * rates. All 5 GHz rates are left enabled.
9247 	 */
9248 	band = nla_nest_start(msg, NL80211_BAND_2GHZ);
9249 	if (!band ||
9250 	    (disabled && nla_put(msg, NL80211_TXRATE_LEGACY, 8,
9251 				 "\x0c\x12\x18\x24\x30\x48\x60\x6c")))
9252 		goto fail;
9253 	nla_nest_end(msg, band);
9254 
9255 	nla_nest_end(msg, bands);
9256 
9257 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9258 	if (ret) {
9259 		wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
9260 			   "(%s)", ret, strerror(-ret));
9261 	} else
9262 		drv->disabled_11b_rates = disabled;
9263 
9264 	return ret;
9265 
9266 fail:
9267 	nlmsg_free(msg);
9268 	return -1;
9269 }
9270 
9271 
nl80211_remove_links(struct i802_bss * bss)9272 static void nl80211_remove_links(struct i802_bss *bss)
9273 {
9274 	struct wpa_driver_nl80211_data *drv = bss->drv;
9275 	struct nl_msg *msg;
9276 	int ret;
9277 	u8 link_id;
9278 
9279 	while (bss->links[0].link_id != NL80211_DRV_LINK_ID_NA) {
9280 		struct i802_link *link = &bss->links[0];
9281 
9282 		wpa_printf(MSG_DEBUG, "nl80211: MLD: remove link_id=%u",
9283 			   link->link_id);
9284 
9285 		wpa_driver_nl80211_del_beacon(bss, link);
9286 
9287 		link_id = link->link_id;
9288 
9289 		/* First remove the link locally */
9290 		if (bss->n_links == 1) {
9291 			bss->flink->link_id = NL80211_DRV_LINK_ID_NA;
9292 			os_memcpy(bss->flink->addr, bss->addr, ETH_ALEN);
9293 		} else {
9294 			struct i802_link *other = &bss->links[bss->n_links - 1];
9295 
9296 			os_memcpy(link, other, sizeof(*link));
9297 			other->link_id = NL80211_DRV_LINK_ID_NA;
9298 			os_memset(other->addr, 0, ETH_ALEN);
9299 
9300 			bss->n_links--;
9301 		}
9302 
9303 		/* Remove the link from the kernel */
9304 		msg = nl80211_drv_msg(drv, 0, NL80211_CMD_REMOVE_LINK);
9305 		if (!msg ||
9306 		    nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id)) {
9307 			nlmsg_free(msg);
9308 			wpa_printf(MSG_ERROR,
9309 				   "nl80211: remove link (%d) failed",
9310 				   link_id);
9311 			return;
9312 		}
9313 
9314 		ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9315 		if (ret) {
9316 			wpa_printf(MSG_ERROR,
9317 				   "nl80211: remove link (%d) failed. ret=%d (%s)",
9318 				   link_id, ret, strerror(-ret));
9319 			return;
9320 		}
9321 	}
9322 }
9323 
9324 
wpa_driver_nl80211_deinit_ap(void * priv)9325 static int wpa_driver_nl80211_deinit_ap(void *priv)
9326 {
9327 	struct i802_bss *bss = priv;
9328 	struct wpa_driver_nl80211_data *drv = bss->drv;
9329 
9330 	if (!is_ap_interface(drv->nlmode))
9331 		return -1;
9332 
9333 	/* Stop beaconing */
9334 	wpa_driver_nl80211_del_beacon(bss, bss->flink);
9335 
9336 	nl80211_remove_links(bss);
9337 
9338 	/*
9339 	 * If the P2P GO interface was dynamically added, then it is
9340 	 * possible that the interface change to station is not possible.
9341 	 */
9342 	if (drv->nlmode == NL80211_IFTYPE_P2P_GO && bss->if_dynamic)
9343 		return 0;
9344 
9345 	return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
9346 }
9347 
9348 
wpa_driver_nl80211_stop_ap(void * priv)9349 static int wpa_driver_nl80211_stop_ap(void *priv)
9350 {
9351 	struct i802_bss *bss = priv;
9352 	struct wpa_driver_nl80211_data *drv = bss->drv;
9353 
9354 	if (!is_ap_interface(drv->nlmode))
9355 		return -1;
9356 
9357 	wpa_driver_nl80211_del_beacon_all(bss);
9358 
9359 	return 0;
9360 }
9361 
9362 
wpa_driver_nl80211_deinit_p2p_cli(void * priv)9363 static int wpa_driver_nl80211_deinit_p2p_cli(void *priv)
9364 {
9365 	struct i802_bss *bss = priv;
9366 	struct wpa_driver_nl80211_data *drv = bss->drv;
9367 	if (drv->nlmode != NL80211_IFTYPE_P2P_CLIENT)
9368 		return -1;
9369 
9370 	/*
9371 	 * If the P2P Client interface was dynamically added, then it is
9372 	 * possible that the interface change to station is not possible.
9373 	 */
9374 	if (bss->if_dynamic)
9375 		return 0;
9376 
9377 	return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
9378 }
9379 
9380 
wpa_driver_nl80211_resume(void * priv)9381 static void wpa_driver_nl80211_resume(void *priv)
9382 {
9383 	struct i802_bss *bss = priv;
9384 	enum nl80211_iftype nlmode = nl80211_get_ifmode(bss);
9385 
9386 	if (i802_set_iface_flags(bss, 1))
9387 		wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
9388 
9389 	if (is_p2p_net_interface(nlmode))
9390 		nl80211_disable_11b_rates(bss->drv, bss->drv->ifindex, 1);
9391 }
9392 
9393 
nl80211_signal_monitor(void * priv,int threshold,int hysteresis)9394 static int nl80211_signal_monitor(void *priv, int threshold, int hysteresis)
9395 {
9396 	struct i802_bss *bss = priv;
9397 	struct wpa_driver_nl80211_data *drv = bss->drv;
9398 	struct nl_msg *msg;
9399 	struct nlattr *cqm;
9400 
9401 	wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
9402 		   "hysteresis=%d", threshold, hysteresis);
9403 
9404 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_CQM)) ||
9405 	    !(cqm = nla_nest_start(msg, NL80211_ATTR_CQM)) ||
9406 	    nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_THOLD, threshold) ||
9407 	    nla_put_u32(msg, NL80211_ATTR_CQM_RSSI_HYST, hysteresis)) {
9408 		nlmsg_free(msg);
9409 		return -1;
9410 	}
9411 	nla_nest_end(msg, cqm);
9412 
9413 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
9414 }
9415 
9416 
get_channel_width(struct nl_msg * msg,void * arg)9417 static int get_channel_width(struct nl_msg *msg, void *arg)
9418 {
9419 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9420 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9421 	struct wpa_signal_info *sig_change = arg;
9422 
9423 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9424 		  genlmsg_attrlen(gnlh, 0), NULL);
9425 
9426 	sig_change->center_frq1 = -1;
9427 	sig_change->center_frq2 = -1;
9428 	sig_change->chanwidth = CHAN_WIDTH_UNKNOWN;
9429 
9430 	if (tb[NL80211_ATTR_CHANNEL_WIDTH]) {
9431 		sig_change->chanwidth = convert2width(
9432 			nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
9433 		if (tb[NL80211_ATTR_CENTER_FREQ1])
9434 			sig_change->center_frq1 =
9435 				nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
9436 		if (tb[NL80211_ATTR_CENTER_FREQ2])
9437 			sig_change->center_frq2 =
9438 				nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
9439 	}
9440 
9441 	return NL_SKIP;
9442 }
9443 
9444 
nl80211_get_channel_width(struct wpa_driver_nl80211_data * drv,struct wpa_signal_info * sig)9445 static int nl80211_get_channel_width(struct wpa_driver_nl80211_data *drv,
9446 				     struct wpa_signal_info *sig)
9447 {
9448 	struct nl_msg *msg;
9449 
9450 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
9451 	return send_and_recv_msgs(drv, msg, get_channel_width, sig, NULL, NULL);
9452 }
9453 
9454 
nl80211_signal_poll(void * priv,struct wpa_signal_info * si)9455 static int nl80211_signal_poll(void *priv, struct wpa_signal_info *si)
9456 {
9457 	struct i802_bss *bss = priv;
9458 	struct wpa_driver_nl80211_data *drv = bss->drv;
9459 	int res;
9460 
9461 	os_memset(si, 0, sizeof(*si));
9462 	res = nl80211_get_link_signal(drv, drv->bssid, &si->data);
9463 	if (res) {
9464 		if (drv->nlmode != NL80211_IFTYPE_ADHOC &&
9465 		    drv->nlmode != NL80211_IFTYPE_MESH_POINT)
9466 			return res;
9467 		si->data.signal = 0;
9468 	}
9469 
9470 	res = nl80211_get_channel_width(drv, si);
9471 	if (res != 0)
9472 		return res;
9473 
9474 	return nl80211_get_link_noise(drv, si);
9475 }
9476 
9477 
get_links_noise(struct nl_msg * msg,void * arg)9478 static int get_links_noise(struct nl_msg *msg, void *arg)
9479 {
9480 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9481 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9482 	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
9483 	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
9484 		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
9485 		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
9486 	};
9487 	struct wpa_mlo_signal_info *mlo_sig = arg;
9488 	int i;
9489 
9490 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9491 		  genlmsg_attrlen(gnlh, 0), NULL);
9492 
9493 	if (!tb[NL80211_ATTR_SURVEY_INFO]) {
9494 		wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
9495 		return NL_SKIP;
9496 	}
9497 
9498 	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
9499 			     tb[NL80211_ATTR_SURVEY_INFO],
9500 			     survey_policy)) {
9501 		wpa_printf(MSG_DEBUG,
9502 			   "nl80211: Failed to parse nested attributes");
9503 		return NL_SKIP;
9504 	}
9505 
9506 	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
9507 		return NL_SKIP;
9508 
9509 	if (!sinfo[NL80211_SURVEY_INFO_NOISE])
9510 		return NL_SKIP;
9511 
9512 	for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
9513 		if (!(mlo_sig->valid_links & BIT(i)))
9514 			continue;
9515 
9516 		if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
9517 		    mlo_sig->links[i].frequency)
9518 			continue;
9519 
9520 		mlo_sig->links[i].current_noise =
9521 			(s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
9522 		break;
9523 	}
9524 
9525 	return NL_SKIP;
9526 }
9527 
9528 
nl80211_get_links_noise(struct wpa_driver_nl80211_data * drv,struct wpa_mlo_signal_info * mlo_sig)9529 static int nl80211_get_links_noise(struct wpa_driver_nl80211_data *drv,
9530 				   struct wpa_mlo_signal_info *mlo_sig)
9531 {
9532 	struct nl_msg *msg;
9533 
9534 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
9535 	return send_and_recv_msgs(drv, msg, get_links_noise, mlo_sig,
9536 				  NULL, NULL);
9537 }
9538 
9539 
get_links_channel_width(struct nl_msg * msg,void * arg)9540 static int get_links_channel_width(struct nl_msg *msg, void *arg)
9541 {
9542 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9543 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9544 	struct wpa_mlo_signal_info *mlo_sig = arg;
9545 	struct nlattr *link;
9546 	int rem_links;
9547 
9548 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9549 		  genlmsg_attrlen(gnlh, 0), NULL);
9550 
9551 	if (!tb[NL80211_ATTR_MLO_LINKS])
9552 		return NL_SKIP;
9553 
9554 	nla_for_each_nested(link, tb[NL80211_ATTR_MLO_LINKS], rem_links) {
9555 		struct nlattr *tb2[NL80211_ATTR_MAX + 1];
9556 		int link_id;
9557 
9558 		nla_parse(tb2, NL80211_ATTR_MAX, nla_data(link), nla_len(link),
9559 			  NULL);
9560 
9561 		if (!tb2[NL80211_ATTR_MLO_LINK_ID])
9562 			continue;
9563 
9564 		link_id = nla_get_u8(tb2[NL80211_ATTR_MLO_LINK_ID]);
9565 		if (link_id >= MAX_NUM_MLD_LINKS)
9566 			continue;
9567 
9568 		if (!tb2[NL80211_ATTR_CHANNEL_WIDTH])
9569 			continue;
9570 		mlo_sig->links[link_id].chanwidth = convert2width(
9571 			nla_get_u32(tb2[NL80211_ATTR_CHANNEL_WIDTH]));
9572 		if (tb2[NL80211_ATTR_CENTER_FREQ1])
9573 			mlo_sig->links[link_id].center_frq1 =
9574 				nla_get_u32(tb2[NL80211_ATTR_CENTER_FREQ1]);
9575 		if (tb2[NL80211_ATTR_CENTER_FREQ2])
9576 			mlo_sig->links[link_id].center_frq2 =
9577 				nla_get_u32(tb2[NL80211_ATTR_CENTER_FREQ2]);
9578 	}
9579 
9580 	return NL_SKIP;
9581 }
9582 
9583 
nl80211_get_links_channel_width(struct wpa_driver_nl80211_data * drv,struct wpa_mlo_signal_info * mlo_sig)9584 static int nl80211_get_links_channel_width(struct wpa_driver_nl80211_data *drv,
9585 					   struct wpa_mlo_signal_info *mlo_sig)
9586 {
9587 	struct nl_msg *msg;
9588 
9589 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_INTERFACE);
9590 	return send_and_recv_msgs(drv, msg, get_links_channel_width, mlo_sig,
9591 				  NULL, NULL);
9592 }
9593 
9594 
nl80211_mlo_signal_poll(void * priv,struct wpa_mlo_signal_info * mlo_si)9595 static int nl80211_mlo_signal_poll(void *priv,
9596 				   struct wpa_mlo_signal_info *mlo_si)
9597 {
9598 	struct i802_bss *bss = priv;
9599 	struct wpa_driver_nl80211_data *drv = bss->drv;
9600 	int res;
9601 	int i;
9602 
9603 	if (drv->nlmode != NL80211_IFTYPE_STATION ||
9604 	    !drv->sta_mlo_info.valid_links)
9605 		return -1;
9606 
9607 	os_memset(mlo_si, 0, sizeof(*mlo_si));
9608 	mlo_si->valid_links = drv->sta_mlo_info.valid_links;
9609 
9610 	for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
9611 		if (!(mlo_si->valid_links & BIT(i)))
9612 			continue;
9613 
9614 		res = nl80211_get_link_signal(drv,
9615 					      drv->sta_mlo_info.links[i].bssid,
9616 					      &mlo_si->links[i].data);
9617 		if (res != 0)
9618 			return res;
9619 
9620 		mlo_si->links[i].center_frq1 = -1;
9621 		mlo_si->links[i].center_frq2 = -1;
9622 		mlo_si->links[i].chanwidth = CHAN_WIDTH_UNKNOWN;
9623 		mlo_si->links[i].current_noise = WPA_INVALID_NOISE;
9624 		mlo_si->links[i].frequency = drv->sta_mlo_info.links[i].freq;
9625 	}
9626 
9627 	res = nl80211_get_links_channel_width(drv, mlo_si);
9628 	if (res != 0)
9629 		return res;
9630 
9631 	return nl80211_get_links_noise(drv, mlo_si);
9632 }
9633 
9634 
nl80211_set_param(void * priv,const char * param)9635 static int nl80211_set_param(void *priv, const char *param)
9636 {
9637 	struct i802_bss *bss = priv;
9638 	struct wpa_driver_nl80211_data *drv = bss->drv;
9639 
9640 	if (param == NULL)
9641 		return 0;
9642 	wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
9643 
9644 #ifdef CONFIG_P2P
9645 	if (os_strstr(param, "use_p2p_group_interface=1")) {
9646 		wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
9647 			   "interface");
9648 		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
9649 		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
9650 	}
9651 #endif /* CONFIG_P2P */
9652 
9653 	if (os_strstr(param, "use_monitor=1"))
9654 		drv->use_monitor = 1;
9655 
9656 	if (os_strstr(param, "force_connect_cmd=1")) {
9657 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_SME;
9658 		drv->force_connect_cmd = 1;
9659 	}
9660 
9661 	if (os_strstr(param, "force_bss_selection=1"))
9662 		drv->capa.flags |= WPA_DRIVER_FLAGS_BSS_SELECTION;
9663 
9664 	if (os_strstr(param, "no_offchannel_tx=1")) {
9665 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
9666 		drv->test_use_roc_tx = 1;
9667 	}
9668 
9669 	if (os_strstr(param, "control_port=0")) {
9670 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_CONTROL_PORT;
9671 		drv->capa.flags2 &= ~(WPA_DRIVER_FLAGS2_CONTROL_PORT_RX |
9672 				      WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS);
9673 		drv->control_port_ap = 0;
9674 	}
9675 
9676 	if (os_strstr(param, "control_port_ap=1"))
9677 		drv->control_port_ap = 1;
9678 
9679 	if (os_strstr(param, "control_port_ap=0")) {
9680 		drv->capa.flags2 &= ~WPA_DRIVER_FLAGS2_CONTROL_PORT_TX_STATUS;
9681 		drv->control_port_ap = 0;
9682 	}
9683 
9684 	if (os_strstr(param, "full_ap_client_state=0"))
9685 		drv->capa.flags &= ~WPA_DRIVER_FLAGS_FULL_AP_CLIENT_STATE;
9686 
9687 	if (os_strstr(param, "no_rrm=1")) {
9688 		drv->no_rrm = 1;
9689 
9690 		if (!bss->in_deinit && !is_ap_interface(drv->nlmode) &&
9691 		    !is_mesh_interface(drv->nlmode)) {
9692 			nl80211_mgmt_unsubscribe(bss, "no_rrm=1");
9693 			if (nl80211_mgmt_subscribe_non_ap(bss) < 0)
9694 				wpa_printf(MSG_DEBUG,
9695 					   "nl80211: Failed to re-register Action frame processing - ignore for now");
9696 		}
9697 	}
9698 
9699 	if (os_strstr(param, "secure_ltf=1")) {
9700 		drv->capa.flags2 |= WPA_DRIVER_FLAGS2_SEC_LTF_STA |
9701 			WPA_DRIVER_FLAGS2_SEC_LTF_AP;
9702 	}
9703 
9704 	return 0;
9705 }
9706 
9707 
nl80211_global_init(void * ctx)9708 static void * nl80211_global_init(void *ctx)
9709 {
9710 	struct nl80211_global *global;
9711 	struct netlink_config *cfg;
9712 
9713 	global = os_zalloc(sizeof(*global));
9714 	if (global == NULL)
9715 		return NULL;
9716 	global->ctx = ctx;
9717 	global->ioctl_sock = -1;
9718 	dl_list_init(&global->interfaces);
9719 	global->if_add_ifindex = -1;
9720 
9721 	cfg = os_zalloc(sizeof(*cfg));
9722 	if (cfg == NULL)
9723 		goto err;
9724 
9725 	cfg->ctx = global;
9726 	cfg->newlink_cb = wpa_driver_nl80211_event_rtm_newlink;
9727 	cfg->dellink_cb = wpa_driver_nl80211_event_rtm_dellink;
9728 	global->netlink = netlink_init(cfg);
9729 	if (global->netlink == NULL) {
9730 		os_free(cfg);
9731 		goto err;
9732 	}
9733 
9734 	if (wpa_driver_nl80211_init_nl_global(global) < 0)
9735 		goto err;
9736 
9737 	global->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
9738 	if (global->ioctl_sock < 0) {
9739 		wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
9740 			   strerror(errno));
9741 		goto err;
9742 	}
9743 
9744 	return global;
9745 
9746 err:
9747 	nl80211_global_deinit(global);
9748 	return NULL;
9749 }
9750 
9751 
nl80211_global_deinit(void * priv)9752 static void nl80211_global_deinit(void *priv)
9753 {
9754 	struct nl80211_global *global = priv;
9755 	if (global == NULL)
9756 		return;
9757 	if (!dl_list_empty(&global->interfaces)) {
9758 		wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
9759 			   "nl80211_global_deinit",
9760 			   dl_list_len(&global->interfaces));
9761 	}
9762 
9763 	if (global->netlink)
9764 		netlink_deinit(global->netlink);
9765 
9766 	nl_destroy_handles(&global->nl);
9767 
9768 	if (global->nl_event)
9769 		nl80211_destroy_eloop_handle(&global->nl_event, 0);
9770 
9771 	nl_cb_put(global->nl_cb);
9772 
9773 	if (global->ioctl_sock >= 0)
9774 		close(global->ioctl_sock);
9775 
9776 	os_free(global);
9777 }
9778 
9779 
nl80211_get_radio_name(void * priv)9780 static const char * nl80211_get_radio_name(void *priv)
9781 {
9782 	struct i802_bss *bss = priv;
9783 	struct wpa_driver_nl80211_data *drv = bss->drv;
9784 	return drv->phyname;
9785 }
9786 
9787 
nl80211_pmkid(struct i802_bss * bss,int cmd,struct wpa_pmkid_params * params,bool skip_pmk)9788 static int nl80211_pmkid(struct i802_bss *bss, int cmd,
9789 			 struct wpa_pmkid_params *params, bool skip_pmk)
9790 {
9791 	struct nl_msg *msg;
9792 
9793 	if (cmd == NL80211_CMD_SET_PMKSA)
9794 		wpa_printf(MSG_DEBUG,
9795 			   "nl80211: NL80211_CMD_SET_PMKSA with skip_pmk=%s pmk_len=%zu",
9796 			   skip_pmk ? "true" : "false", params->pmk_len);
9797 
9798 	if (!(msg = nl80211_bss_msg(bss, 0, cmd)) ||
9799 	    (params->pmkid &&
9800 	     nla_put(msg, NL80211_ATTR_PMKID, 16, params->pmkid)) ||
9801 	    (params->bssid &&
9802 	     nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid)) ||
9803 	    (params->ssid_len &&
9804 	     nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid)) ||
9805 	    (params->fils_cache_id &&
9806 	     nla_put(msg, NL80211_ATTR_FILS_CACHE_ID, 2,
9807 		     params->fils_cache_id)) ||
9808 	    (params->pmk_lifetime &&
9809 	     nla_put_u32(msg, NL80211_ATTR_PMK_LIFETIME,
9810 			 params->pmk_lifetime)) ||
9811 	    (params->pmk_reauth_threshold &&
9812 	     nla_put_u8(msg, NL80211_ATTR_PMK_REAUTH_THRESHOLD,
9813 			params->pmk_reauth_threshold)) ||
9814 	    (cmd != NL80211_CMD_DEL_PMKSA &&
9815 	     params->pmk_len && !skip_pmk &&
9816 	     nla_put(msg, NL80211_ATTR_PMK, params->pmk_len, params->pmk))) {
9817 		nl80211_nlmsg_clear(msg);
9818 		nlmsg_free(msg);
9819 		return -ENOBUFS;
9820 	}
9821 
9822 	return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
9823 }
9824 
9825 
nl80211_add_pmkid(void * priv,struct wpa_pmkid_params * params)9826 static int nl80211_add_pmkid(void *priv, struct wpa_pmkid_params *params)
9827 {
9828 	struct i802_bss *bss = priv;
9829 	const size_t PMK_MAX_LEN = 64; /* current cfg80211 limit */
9830 	const size_t LEGACY_PMK_MAX_LEN = 48; /* old cfg80211 limit */
9831 	bool skip_pmk = params->pmk_len > PMK_MAX_LEN;
9832 	int ret;
9833 
9834 	if (params->bssid)
9835 		wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR,
9836 			   MAC2STR(params->bssid));
9837 	else if (params->fils_cache_id && params->ssid_len) {
9838 		wpa_printf(MSG_DEBUG,
9839 			   "nl80211: Add PMKSA for cache id %02x%02x SSID %s",
9840 			   params->fils_cache_id[0], params->fils_cache_id[1],
9841 			   wpa_ssid_txt(params->ssid, params->ssid_len));
9842 	}
9843 
9844 	ret = nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, params, skip_pmk);
9845 	/*
9846 	 * Try again by skipping PMK if the first attempt failed with ERANGE
9847 	 * error, PMK was not skipped, and PMK length is greater than the
9848 	 * legacy kernel maximum allowed limit.
9849 	 */
9850 	if (ret == -ERANGE && !skip_pmk &&
9851 	    params->pmk_len > LEGACY_PMK_MAX_LEN)
9852 		ret = nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, params, true);
9853 	if (ret < 0) {
9854 		wpa_printf(MSG_DEBUG,
9855 			   "nl80211: NL80211_CMD_SET_PMKSA failed: %d (%s)",
9856 			   ret, strerror(-ret));
9857 	}
9858 
9859 	return ret;
9860 }
9861 
9862 
nl80211_remove_pmkid(void * priv,struct wpa_pmkid_params * params)9863 static int nl80211_remove_pmkid(void *priv, struct wpa_pmkid_params *params)
9864 {
9865 	struct i802_bss *bss = priv;
9866 	int ret;
9867 
9868 	if (params->bssid)
9869 		wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
9870 			   MAC2STR(params->bssid));
9871 	else if (params->fils_cache_id && params->ssid_len) {
9872 		wpa_printf(MSG_DEBUG,
9873 			   "nl80211: Delete PMKSA for cache id %02x%02x SSID %s",
9874 			   params->fils_cache_id[0], params->fils_cache_id[1],
9875 			   wpa_ssid_txt(params->ssid, params->ssid_len));
9876 	}
9877 
9878 	ret = nl80211_pmkid(bss, NL80211_CMD_DEL_PMKSA, params, true);
9879 	if (ret < 0) {
9880 		wpa_printf(MSG_DEBUG,
9881 			   "nl80211: NL80211_CMD_DEL_PMKSA failed: %d (%s)",
9882 			   ret, strerror(-ret));
9883 	}
9884 
9885 	return ret;
9886 }
9887 
9888 
nl80211_flush_pmkid(void * priv)9889 static int nl80211_flush_pmkid(void *priv)
9890 {
9891 	struct i802_bss *bss = priv;
9892 	struct nl_msg *msg;
9893 
9894 	wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
9895 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_FLUSH_PMKSA);
9896 	if (!msg)
9897 		return -ENOBUFS;
9898 	return send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
9899 }
9900 
9901 
clean_survey_results(struct survey_results * survey_results)9902 static void clean_survey_results(struct survey_results *survey_results)
9903 {
9904 	struct freq_survey *survey, *tmp;
9905 
9906 	if (dl_list_empty(&survey_results->survey_list))
9907 		return;
9908 
9909 	dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
9910 			      struct freq_survey, list) {
9911 		dl_list_del(&survey->list);
9912 		os_free(survey);
9913 	}
9914 }
9915 
9916 
add_survey(struct nlattr ** sinfo,u32 ifidx,struct dl_list * survey_list)9917 static void add_survey(struct nlattr **sinfo, u32 ifidx,
9918 		       struct dl_list *survey_list)
9919 {
9920 	struct freq_survey *survey;
9921 
9922 	survey = os_zalloc(sizeof(struct freq_survey));
9923 	if  (!survey)
9924 		return;
9925 
9926 	survey->ifidx = ifidx;
9927 	survey->freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
9928 	survey->filled = 0;
9929 
9930 	if (sinfo[NL80211_SURVEY_INFO_NOISE]) {
9931 		survey->nf = (int8_t)
9932 			nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
9933 		survey->filled |= SURVEY_HAS_NF;
9934 	}
9935 
9936 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]) {
9937 		survey->channel_time =
9938 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]);
9939 		survey->filled |= SURVEY_HAS_CHAN_TIME;
9940 	}
9941 
9942 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]) {
9943 		survey->channel_time_busy =
9944 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]);
9945 		survey->filled |= SURVEY_HAS_CHAN_TIME_BUSY;
9946 	}
9947 
9948 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]) {
9949 		survey->channel_time_rx =
9950 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]);
9951 		survey->filled |= SURVEY_HAS_CHAN_TIME_RX;
9952 	}
9953 
9954 	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]) {
9955 		survey->channel_time_tx =
9956 			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]);
9957 		survey->filled |= SURVEY_HAS_CHAN_TIME_TX;
9958 	}
9959 
9960 	wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
9961 		   survey->freq,
9962 		   survey->nf,
9963 		   (unsigned long int) survey->channel_time,
9964 		   (unsigned long int) survey->channel_time_busy,
9965 		   (unsigned long int) survey->channel_time_tx,
9966 		   (unsigned long int) survey->channel_time_rx,
9967 		   survey->filled);
9968 
9969 	dl_list_add_tail(survey_list, &survey->list);
9970 }
9971 
9972 
check_survey_ok(struct nlattr ** sinfo,u32 surveyed_freq,unsigned int freq_filter)9973 static int check_survey_ok(struct nlattr **sinfo, u32 surveyed_freq,
9974 			   unsigned int freq_filter)
9975 {
9976 	if (!freq_filter)
9977 		return 1;
9978 
9979 	return freq_filter == surveyed_freq;
9980 }
9981 
9982 
survey_handler(struct nl_msg * msg,void * arg)9983 static int survey_handler(struct nl_msg *msg, void *arg)
9984 {
9985 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9986 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9987 	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
9988 	struct survey_results *survey_results;
9989 	u32 surveyed_freq = 0;
9990 	u32 ifidx;
9991 
9992 	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
9993 		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
9994 		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
9995 	};
9996 
9997 	survey_results = (struct survey_results *) arg;
9998 
9999 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10000 		  genlmsg_attrlen(gnlh, 0), NULL);
10001 
10002 	if (!tb[NL80211_ATTR_IFINDEX])
10003 		return NL_SKIP;
10004 
10005 	ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
10006 
10007 	if (!tb[NL80211_ATTR_SURVEY_INFO])
10008 		return NL_SKIP;
10009 
10010 	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
10011 			     tb[NL80211_ATTR_SURVEY_INFO],
10012 			     survey_policy))
10013 		return NL_SKIP;
10014 
10015 	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) {
10016 		wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
10017 		return NL_SKIP;
10018 	}
10019 
10020 	surveyed_freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
10021 
10022 	if (!check_survey_ok(sinfo, surveyed_freq,
10023 			     survey_results->freq_filter))
10024 		return NL_SKIP;
10025 
10026 	if (survey_results->freq_filter &&
10027 	    survey_results->freq_filter != surveyed_freq) {
10028 		wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
10029 			   surveyed_freq);
10030 		return NL_SKIP;
10031 	}
10032 
10033 	add_survey(sinfo, ifidx, &survey_results->survey_list);
10034 
10035 	return NL_SKIP;
10036 }
10037 
10038 
wpa_driver_nl80211_get_survey(void * priv,unsigned int freq)10039 static int wpa_driver_nl80211_get_survey(void *priv, unsigned int freq)
10040 {
10041 	struct i802_bss *bss = priv;
10042 	struct wpa_driver_nl80211_data *drv = bss->drv;
10043 	struct nl_msg *msg;
10044 	int err;
10045 	union wpa_event_data data;
10046 	struct survey_results *survey_results;
10047 
10048 	os_memset(&data, 0, sizeof(data));
10049 	survey_results = &data.survey_results;
10050 
10051 	dl_list_init(&survey_results->survey_list);
10052 
10053 	msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
10054 	if (!msg)
10055 		return -ENOBUFS;
10056 
10057 	if (freq)
10058 		data.survey_results.freq_filter = freq;
10059 
10060 	do {
10061 		wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
10062 		err = send_and_recv_msgs(drv, msg, survey_handler,
10063 					 survey_results, NULL, NULL);
10064 	} while (err > 0);
10065 
10066 	if (err)
10067 		wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
10068 	else
10069 		wpa_supplicant_event(drv->ctx, EVENT_SURVEY, &data);
10070 
10071 	clean_survey_results(survey_results);
10072 	return err;
10073 }
10074 
10075 
nl80211_set_rekey_info(void * priv,const u8 * kek,size_t kek_len,const u8 * kck,size_t kck_len,const u8 * replay_ctr)10076 static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len,
10077 				   const u8 *kck, size_t kck_len,
10078 				   const u8 *replay_ctr)
10079 {
10080 	struct i802_bss *bss = priv;
10081 	struct wpa_driver_nl80211_data *drv = bss->drv;
10082 	struct nlattr *replay_nested;
10083 	struct nl_msg *msg;
10084 	int ret;
10085 
10086 	if (!drv->set_rekey_offload)
10087 		return;
10088 
10089 	wpa_printf(MSG_DEBUG, "nl80211: Set rekey offload");
10090 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_REKEY_OFFLOAD)) ||
10091 	    !(replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA)) ||
10092 	    nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) ||
10093 	    (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) ||
10094 	    nla_put(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
10095 		    replay_ctr)) {
10096 		nl80211_nlmsg_clear(msg);
10097 		nlmsg_free(msg);
10098 		return;
10099 	}
10100 
10101 	nla_nest_end(msg, replay_nested);
10102 
10103 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10104 	if (ret == -EOPNOTSUPP) {
10105 		wpa_printf(MSG_DEBUG,
10106 			   "nl80211: Driver does not support rekey offload");
10107 		drv->set_rekey_offload = 0;
10108 	}
10109 }
10110 
10111 
nl80211_send_null_frame(struct i802_bss * bss,const u8 * own_addr,const u8 * addr,int qos)10112 static void nl80211_send_null_frame(struct i802_bss *bss, const u8 *own_addr,
10113 				    const u8 *addr, int qos)
10114 {
10115 	/* send data frame to poll STA and check whether
10116 	 * this frame is ACKed */
10117 	struct {
10118 		struct ieee80211_hdr hdr;
10119 		u16 qos_ctl;
10120 	} STRUCT_PACKED nulldata;
10121 	size_t size;
10122 
10123 	/* Send data frame to poll STA and check whether this frame is ACKed */
10124 
10125 	os_memset(&nulldata, 0, sizeof(nulldata));
10126 
10127 	if (qos) {
10128 		nulldata.hdr.frame_control =
10129 			IEEE80211_FC(WLAN_FC_TYPE_DATA,
10130 				     WLAN_FC_STYPE_QOS_NULL);
10131 		size = sizeof(nulldata);
10132 	} else {
10133 		nulldata.hdr.frame_control =
10134 			IEEE80211_FC(WLAN_FC_TYPE_DATA,
10135 				     WLAN_FC_STYPE_NULLFUNC);
10136 		size = sizeof(struct ieee80211_hdr);
10137 	}
10138 
10139 	nulldata.hdr.frame_control |= host_to_le16(WLAN_FC_FROMDS);
10140 	os_memcpy(nulldata.hdr.IEEE80211_DA_FROMDS, addr, ETH_ALEN);
10141 	os_memcpy(nulldata.hdr.IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
10142 	os_memcpy(nulldata.hdr.IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
10143 
10144 	if (wpa_driver_nl80211_send_mlme(bss, (u8 *) &nulldata, size, 0, 0, 0,
10145 					 0, 0, NULL, 0, 0) < 0)
10146 		wpa_printf(MSG_DEBUG, "nl80211_send_null_frame: Failed to "
10147 			   "send poll frame");
10148 }
10149 
nl80211_poll_client(void * priv,const u8 * own_addr,const u8 * addr,int qos)10150 static void nl80211_poll_client(void *priv, const u8 *own_addr, const u8 *addr,
10151 				int qos)
10152 {
10153 	struct i802_bss *bss = priv;
10154 	struct wpa_driver_nl80211_data *drv = bss->drv;
10155 	struct nl_msg *msg;
10156 	u64 cookie;
10157 	int ret;
10158 
10159 	if (!drv->poll_command_supported) {
10160 		nl80211_send_null_frame(bss, own_addr, addr, qos);
10161 		return;
10162 	}
10163 
10164 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_PROBE_CLIENT)) ||
10165 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
10166 		nlmsg_free(msg);
10167 		return;
10168 	}
10169 
10170 	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie, NULL, NULL);
10171 	if (ret < 0) {
10172 		wpa_printf(MSG_DEBUG, "nl80211: Client probe request for "
10173 			   MACSTR " failed: ret=%d (%s)",
10174 			   MAC2STR(addr), ret, strerror(-ret));
10175 	} else {
10176 		wpa_printf(MSG_DEBUG,
10177 			   "nl80211: Client probe request addr=" MACSTR
10178 			   " cookie=%llu", MAC2STR(addr),
10179 			   (long long unsigned int) cookie);
10180 	}
10181 }
10182 
10183 
nl80211_set_power_save(struct i802_bss * bss,int enabled)10184 static int nl80211_set_power_save(struct i802_bss *bss, int enabled)
10185 {
10186 	struct nl_msg *msg;
10187 	int ret;
10188 
10189 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_POWER_SAVE)) ||
10190 	    nla_put_u32(msg, NL80211_ATTR_PS_STATE,
10191 			enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED)) {
10192 		nlmsg_free(msg);
10193 		return -ENOBUFS;
10194 	}
10195 
10196 	ret = send_and_recv_msgs(bss->drv, msg, NULL, NULL, NULL, NULL);
10197 	if (ret < 0) {
10198 		wpa_printf(MSG_DEBUG,
10199 			   "nl80211: Setting PS state %s failed: %d (%s)",
10200 			   enabled ? "enabled" : "disabled",
10201 			   ret, strerror(-ret));
10202 	}
10203 	return ret;
10204 }
10205 
10206 
nl80211_set_p2p_powersave(void * priv,int legacy_ps,int opp_ps,int ctwindow)10207 static int nl80211_set_p2p_powersave(void *priv, int legacy_ps, int opp_ps,
10208 				     int ctwindow)
10209 {
10210 	struct i802_bss *bss = priv;
10211 
10212 	wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
10213 		   "opp_ps=%d ctwindow=%d)", legacy_ps, opp_ps, ctwindow);
10214 
10215 	if (opp_ps != -1 || ctwindow != -1) {
10216 #ifdef ANDROID_P2P
10217 		wpa_driver_set_p2p_ps(priv, legacy_ps, opp_ps, ctwindow);
10218 #else /* ANDROID_P2P */
10219 		return -1; /* Not yet supported */
10220 #endif /* ANDROID_P2P */
10221 	}
10222 
10223 	if (legacy_ps == -1)
10224 		return 0;
10225 	if (legacy_ps != 0 && legacy_ps != 1)
10226 		return -1; /* Not yet supported */
10227 
10228 	return nl80211_set_power_save(bss, legacy_ps);
10229 }
10230 
10231 
nl80211_start_radar_detection(void * priv,struct hostapd_freq_params * freq)10232 static int nl80211_start_radar_detection(void *priv,
10233 					 struct hostapd_freq_params *freq)
10234 {
10235 	struct i802_bss *bss = priv;
10236 	struct wpa_driver_nl80211_data *drv = bss->drv;
10237 	struct nl_msg *msg;
10238 	int ret;
10239 
10240 	wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
10241 		   freq->freq, freq->ht_enabled, freq->vht_enabled, freq->he_enabled,
10242 		   freq->bandwidth, freq->center_freq1, freq->center_freq2);
10243 
10244 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_RADAR)) {
10245 		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
10246 			   "detection");
10247 		return -1;
10248 	}
10249 
10250 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_RADAR_DETECT)) ||
10251 	    nl80211_put_freq_params(msg, freq) < 0) {
10252 		nlmsg_free(msg);
10253 		return -1;
10254 	}
10255 
10256 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10257 	if (ret == 0)
10258 		return 0;
10259 	wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
10260 		   "%d (%s)", ret, strerror(-ret));
10261 	return -1;
10262 }
10263 
10264 #ifdef CONFIG_TDLS
10265 
nl80211_add_peer_capab(struct nl_msg * msg,enum tdls_peer_capability capa)10266 static int nl80211_add_peer_capab(struct nl_msg *msg,
10267 				  enum tdls_peer_capability capa)
10268 {
10269 	u32 peer_capab = 0;
10270 
10271 	if (!capa)
10272 		return 0;
10273 
10274 	if (capa & TDLS_PEER_HT)
10275 		peer_capab |= NL80211_TDLS_PEER_HT;
10276 	if (capa & TDLS_PEER_VHT)
10277 		peer_capab |= NL80211_TDLS_PEER_VHT;
10278 	if (capa & TDLS_PEER_WMM)
10279 		peer_capab |= NL80211_TDLS_PEER_WMM;
10280 	if (capa & TDLS_PEER_HE)
10281 		peer_capab |= NL80211_TDLS_PEER_HE;
10282 
10283 	return nla_put_u32(msg, NL80211_ATTR_TDLS_PEER_CAPABILITY,
10284 			   peer_capab);
10285 }
10286 
10287 
nl80211_send_tdls_mgmt(void * priv,const u8 * dst,u8 action_code,u8 dialog_token,u16 status_code,u32 peer_capab,int initiator,const u8 * buf,size_t len)10288 static int nl80211_send_tdls_mgmt(void *priv, const u8 *dst, u8 action_code,
10289 				  u8 dialog_token, u16 status_code,
10290 				  u32 peer_capab, int initiator, const u8 *buf,
10291 				  size_t len)
10292 {
10293 	struct i802_bss *bss = priv;
10294 	struct wpa_driver_nl80211_data *drv = bss->drv;
10295 	struct nl_msg *msg;
10296 
10297 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
10298 		return -EOPNOTSUPP;
10299 
10300 	if (!dst)
10301 		return -EINVAL;
10302 
10303 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_MGMT)) ||
10304 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, dst) ||
10305 	    nla_put_u8(msg, NL80211_ATTR_TDLS_ACTION, action_code) ||
10306 	    nla_put_u8(msg, NL80211_ATTR_TDLS_DIALOG_TOKEN, dialog_token) ||
10307 	    nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, status_code) ||
10308 	    nl80211_add_peer_capab(msg, peer_capab) ||
10309 	    (initiator && nla_put_flag(msg, NL80211_ATTR_TDLS_INITIATOR)) ||
10310 	    nla_put(msg, NL80211_ATTR_IE, len, buf))
10311 		goto fail;
10312 
10313 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10314 
10315 fail:
10316 	nlmsg_free(msg);
10317 	return -ENOBUFS;
10318 }
10319 
10320 
nl80211_tdls_oper(void * priv,enum tdls_oper oper,const u8 * peer)10321 static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer)
10322 {
10323 	struct i802_bss *bss = priv;
10324 	struct wpa_driver_nl80211_data *drv = bss->drv;
10325 	struct nl_msg *msg;
10326 	enum nl80211_tdls_operation nl80211_oper;
10327 	int res;
10328 
10329 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
10330 		return -EOPNOTSUPP;
10331 
10332 	switch (oper) {
10333 	case TDLS_DISCOVERY_REQ:
10334 		nl80211_oper = NL80211_TDLS_DISCOVERY_REQ;
10335 		break;
10336 	case TDLS_SETUP:
10337 		nl80211_oper = NL80211_TDLS_SETUP;
10338 		break;
10339 	case TDLS_TEARDOWN:
10340 		nl80211_oper = NL80211_TDLS_TEARDOWN;
10341 		break;
10342 	case TDLS_ENABLE_LINK:
10343 		nl80211_oper = NL80211_TDLS_ENABLE_LINK;
10344 		break;
10345 	case TDLS_DISABLE_LINK:
10346 		nl80211_oper = NL80211_TDLS_DISABLE_LINK;
10347 		break;
10348 	case TDLS_ENABLE:
10349 		return 0;
10350 	case TDLS_DISABLE:
10351 		return 0;
10352 	default:
10353 		return -EINVAL;
10354 	}
10355 
10356 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_TDLS_OPER)) ||
10357 	    nla_put_u8(msg, NL80211_ATTR_TDLS_OPERATION, nl80211_oper) ||
10358 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer)) {
10359 		nlmsg_free(msg);
10360 		return -ENOBUFS;
10361 	}
10362 
10363 	res = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10364 	wpa_printf(MSG_DEBUG, "nl80211: TDLS_OPER: oper=%d mac=" MACSTR
10365 		   " --> res=%d (%s)", nl80211_oper, MAC2STR(peer), res,
10366 		   strerror(-res));
10367 	return res;
10368 }
10369 
10370 
10371 static int
nl80211_tdls_enable_channel_switch(void * priv,const u8 * addr,u8 oper_class,const struct hostapd_freq_params * params)10372 nl80211_tdls_enable_channel_switch(void *priv, const u8 *addr, u8 oper_class,
10373 				   const struct hostapd_freq_params *params)
10374 {
10375 	struct i802_bss *bss = priv;
10376 	struct wpa_driver_nl80211_data *drv = bss->drv;
10377 	struct nl_msg *msg;
10378 	int ret = -ENOBUFS;
10379 
10380 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
10381 	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
10382 		return -EOPNOTSUPP;
10383 
10384 	wpa_printf(MSG_DEBUG, "nl80211: Enable TDLS channel switch " MACSTR
10385 		   " oper_class=%u freq=%u",
10386 		   MAC2STR(addr), oper_class, params->freq);
10387 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CHANNEL_SWITCH);
10388 	if (!msg ||
10389 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
10390 	    nla_put_u8(msg, NL80211_ATTR_OPER_CLASS, oper_class) ||
10391 	    (ret = nl80211_put_freq_params(msg, params))) {
10392 		nlmsg_free(msg);
10393 		wpa_printf(MSG_DEBUG, "nl80211: Could not build TDLS chan switch");
10394 		return ret;
10395 	}
10396 
10397 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10398 }
10399 
10400 
10401 static int
nl80211_tdls_disable_channel_switch(void * priv,const u8 * addr)10402 nl80211_tdls_disable_channel_switch(void *priv, const u8 *addr)
10403 {
10404 	struct i802_bss *bss = priv;
10405 	struct wpa_driver_nl80211_data *drv = bss->drv;
10406 	struct nl_msg *msg;
10407 
10408 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT) ||
10409 	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_CHANNEL_SWITCH))
10410 		return -EOPNOTSUPP;
10411 
10412 	wpa_printf(MSG_DEBUG, "nl80211: Disable TDLS channel switch " MACSTR,
10413 		   MAC2STR(addr));
10414 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH);
10415 	if (!msg ||
10416 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
10417 		nlmsg_free(msg);
10418 		wpa_printf(MSG_DEBUG,
10419 			   "nl80211: Could not build TDLS cancel chan switch");
10420 		return -ENOBUFS;
10421 	}
10422 
10423 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10424 }
10425 
10426 #endif /* CONFIG TDLS */
10427 
10428 
driver_nl80211_set_key(void * priv,struct wpa_driver_set_key_params * params)10429 static int driver_nl80211_set_key(void *priv,
10430 				  struct wpa_driver_set_key_params *params)
10431 {
10432 	struct i802_bss *bss = priv;
10433 
10434 	return wpa_driver_nl80211_set_key(bss, params);
10435 }
10436 
10437 
driver_nl80211_scan2(void * priv,struct wpa_driver_scan_params * params)10438 static int driver_nl80211_scan2(void *priv,
10439 				struct wpa_driver_scan_params *params)
10440 {
10441 	struct i802_bss *bss = priv;
10442 #ifdef CONFIG_DRIVER_NL80211_QCA
10443 	struct wpa_driver_nl80211_data *drv = bss->drv;
10444 
10445 	/*
10446 	 * Do a vendor specific scan if possible. If only_new_results is
10447 	 * set, do a normal scan since a kernel (cfg80211) BSS cache flush
10448 	 * cannot be achieved through a vendor scan. The below condition may
10449 	 * need to be modified if new scan flags are added in the future whose
10450 	 * functionality can only be achieved through a normal scan.
10451 	 */
10452 	if (drv->scan_vendor_cmd_avail && !params->only_new_results)
10453 		return wpa_driver_nl80211_vendor_scan(bss, params);
10454 #endif /* CONFIG_DRIVER_NL80211_QCA */
10455 	return wpa_driver_nl80211_scan(bss, params);
10456 }
10457 
10458 
driver_nl80211_deauthenticate(void * priv,const u8 * addr,u16 reason_code)10459 static int driver_nl80211_deauthenticate(void *priv, const u8 *addr,
10460 					 u16 reason_code)
10461 {
10462 	struct i802_bss *bss = priv;
10463 	return wpa_driver_nl80211_deauthenticate(bss, addr, reason_code);
10464 }
10465 
10466 
driver_nl80211_authenticate(void * priv,struct wpa_driver_auth_params * params)10467 static int driver_nl80211_authenticate(void *priv,
10468 				       struct wpa_driver_auth_params *params)
10469 {
10470 	struct i802_bss *bss = priv;
10471 	return wpa_driver_nl80211_authenticate(bss, params);
10472 }
10473 
10474 
driver_nl80211_deinit(void * priv)10475 static void driver_nl80211_deinit(void *priv)
10476 {
10477 	struct i802_bss *bss = priv;
10478 	wpa_driver_nl80211_deinit(bss);
10479 }
10480 
10481 
driver_nl80211_if_remove(void * priv,enum wpa_driver_if_type type,const char * ifname)10482 static int driver_nl80211_if_remove(void *priv, enum wpa_driver_if_type type,
10483 				    const char *ifname)
10484 {
10485 	struct i802_bss *bss = priv;
10486 	return wpa_driver_nl80211_if_remove(bss, type, ifname);
10487 }
10488 
10489 
driver_nl80211_send_mlme(void * priv,const u8 * data,size_t data_len,int noack,unsigned int freq,const u16 * csa_offs,size_t csa_offs_len,int no_encrypt,unsigned int wait)10490 static int driver_nl80211_send_mlme(void *priv, const u8 *data,
10491 				    size_t data_len, int noack,
10492 				    unsigned int freq,
10493 				    const u16 *csa_offs, size_t csa_offs_len,
10494 				    int no_encrypt, unsigned int wait)
10495 {
10496 	struct i802_bss *bss = priv;
10497 	return wpa_driver_nl80211_send_mlme(bss, data, data_len, noack,
10498 					    freq, 0, 0, wait, csa_offs,
10499 					    csa_offs_len, no_encrypt);
10500 }
10501 
10502 
driver_nl80211_sta_remove(void * priv,const u8 * addr)10503 static int driver_nl80211_sta_remove(void *priv, const u8 *addr)
10504 {
10505 	struct i802_bss *bss = priv;
10506 	return wpa_driver_nl80211_sta_remove(bss, addr, -1, 0);
10507 }
10508 
10509 
driver_nl80211_set_sta_vlan(void * priv,const u8 * addr,const char * ifname,int vlan_id)10510 static int driver_nl80211_set_sta_vlan(void *priv, const u8 *addr,
10511 				       const char *ifname, int vlan_id)
10512 {
10513 	struct i802_bss *bss = priv;
10514 	return i802_set_sta_vlan(bss, addr, ifname, vlan_id);
10515 }
10516 
10517 
driver_nl80211_read_sta_data(void * priv,struct hostap_sta_driver_data * data,const u8 * addr)10518 static int driver_nl80211_read_sta_data(void *priv,
10519 					struct hostap_sta_driver_data *data,
10520 					const u8 *addr)
10521 {
10522 	struct i802_bss *bss = priv;
10523 
10524 	os_memset(data, 0, sizeof(*data));
10525 	return i802_read_sta_data(bss, data, addr);
10526 }
10527 
10528 
driver_nl80211_send_action(void * priv,unsigned int freq,unsigned int wait_time,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,int no_cck)10529 static int driver_nl80211_send_action(void *priv, unsigned int freq,
10530 				      unsigned int wait_time,
10531 				      const u8 *dst, const u8 *src,
10532 				      const u8 *bssid,
10533 				      const u8 *data, size_t data_len,
10534 				      int no_cck)
10535 {
10536 	struct i802_bss *bss = priv;
10537 	return wpa_driver_nl80211_send_action(bss, freq, wait_time, dst, src,
10538 					      bssid, data, data_len, no_cck);
10539 }
10540 
10541 
driver_nl80211_probe_req_report(void * priv,int report)10542 static int driver_nl80211_probe_req_report(void *priv, int report)
10543 {
10544 	struct i802_bss *bss = priv;
10545 	return wpa_driver_nl80211_probe_req_report(bss, report);
10546 }
10547 
10548 
wpa_driver_nl80211_update_ft_ies(void * priv,const u8 * md,const u8 * ies,size_t ies_len)10549 static int wpa_driver_nl80211_update_ft_ies(void *priv, const u8 *md,
10550 					    const u8 *ies, size_t ies_len)
10551 {
10552 	int ret;
10553 	struct nl_msg *msg;
10554 	struct i802_bss *bss = priv;
10555 	struct wpa_driver_nl80211_data *drv = bss->drv;
10556 	u16 mdid = WPA_GET_LE16(md);
10557 
10558 	wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
10559 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_FT_IES)) ||
10560 	    nla_put(msg, NL80211_ATTR_IE, ies_len, ies) ||
10561 	    nla_put_u16(msg, NL80211_ATTR_MDID, mdid)) {
10562 		nlmsg_free(msg);
10563 		return -ENOBUFS;
10564 	}
10565 
10566 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10567 	if (ret) {
10568 		wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
10569 			   "err=%d (%s)", ret, strerror(-ret));
10570 	}
10571 
10572 	return ret;
10573 }
10574 
10575 
nl80211_update_dh_ie(void * priv,const u8 * peer_mac,u16 reason_code,const u8 * ie,size_t ie_len)10576 static int nl80211_update_dh_ie(void *priv, const u8 *peer_mac,
10577 				u16 reason_code, const u8 *ie, size_t ie_len)
10578 {
10579 	int ret;
10580 	struct nl_msg *msg;
10581 	struct i802_bss *bss = priv;
10582 	struct wpa_driver_nl80211_data *drv = bss->drv;
10583 
10584 	wpa_printf(MSG_DEBUG, "nl80211: Updating DH IE peer: " MACSTR
10585 		   " reason %u", MAC2STR(peer_mac), reason_code);
10586 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_UPDATE_OWE_INFO)) ||
10587 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, peer_mac) ||
10588 	    nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, reason_code) ||
10589 	    (ie && nla_put(msg, NL80211_ATTR_IE, ie_len, ie))) {
10590 		nlmsg_free(msg);
10591 		return -ENOBUFS;
10592 	}
10593 
10594 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
10595 	if (ret) {
10596 		wpa_printf(MSG_DEBUG,
10597 			   "nl80211: update_dh_ie failed err=%d (%s)",
10598 			   ret, strerror(-ret));
10599 	}
10600 
10601 	return ret;
10602 }
10603 
10604 
wpa_driver_nl80211_get_macaddr(void * priv)10605 static const u8 * wpa_driver_nl80211_get_macaddr(void *priv)
10606 {
10607 	struct i802_bss *bss = priv;
10608 	struct wpa_driver_nl80211_data *drv = bss->drv;
10609 
10610 	if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE)
10611 		return NULL;
10612 
10613 	return bss->addr;
10614 }
10615 
10616 
scan_state_str(enum scan_states scan_state)10617 static const char * scan_state_str(enum scan_states scan_state)
10618 {
10619 	switch (scan_state) {
10620 	case NO_SCAN:
10621 		return "NO_SCAN";
10622 	case SCAN_REQUESTED:
10623 		return "SCAN_REQUESTED";
10624 	case SCAN_STARTED:
10625 		return "SCAN_STARTED";
10626 	case SCAN_COMPLETED:
10627 		return "SCAN_COMPLETED";
10628 	case SCAN_ABORTED:
10629 		return "SCAN_ABORTED";
10630 	case SCHED_SCAN_STARTED:
10631 		return "SCHED_SCAN_STARTED";
10632 	case SCHED_SCAN_STOPPED:
10633 		return "SCHED_SCAN_STOPPED";
10634 	case SCHED_SCAN_RESULTS:
10635 		return "SCHED_SCAN_RESULTS";
10636 	}
10637 
10638 	return "??";
10639 }
10640 
10641 
wpa_driver_nl80211_status(void * priv,char * buf,size_t buflen)10642 static int wpa_driver_nl80211_status(void *priv, char *buf, size_t buflen)
10643 {
10644 	struct i802_bss *bss = priv;
10645 	struct wpa_driver_nl80211_data *drv = bss->drv;
10646 	int res;
10647 	char *pos, *end;
10648 	struct nl_msg *msg;
10649 	char alpha2[3] = { 0, 0, 0 };
10650 
10651 	pos = buf;
10652 	end = buf + buflen;
10653 
10654 	res = os_snprintf(pos, end - pos,
10655 			  "ifindex=%d\n"
10656 			  "ifname=%s\n"
10657 			  "brname=%s\n"
10658 			  "addr=" MACSTR "\n"
10659 			  "freq=%d\n"
10660 			  "%s%s%s%s%s%s",
10661 			  bss->ifindex,
10662 			  bss->ifname,
10663 			  bss->brname,
10664 			  MAC2STR(bss->addr),
10665 			  bss->flink->freq,
10666 			  bss->flink->beacon_set ? "beacon_set=1\n" : "",
10667 			  bss->added_if_into_bridge ?
10668 			  "added_if_into_bridge=1\n" : "",
10669 			  bss->already_in_bridge ? "already_in_bridge=1\n" : "",
10670 			  bss->added_bridge ? "added_bridge=1\n" : "",
10671 			  bss->in_deinit ? "in_deinit=1\n" : "",
10672 			  bss->if_dynamic ? "if_dynamic=1\n" : "");
10673 	if (os_snprintf_error(end - pos, res))
10674 		return pos - buf;
10675 	pos += res;
10676 
10677 	if (bss->wdev_id_set) {
10678 		res = os_snprintf(pos, end - pos, "wdev_id=%llu\n",
10679 				  (unsigned long long) bss->wdev_id);
10680 		if (os_snprintf_error(end - pos, res))
10681 			return pos - buf;
10682 		pos += res;
10683 	}
10684 
10685 	res = os_snprintf(pos, end - pos,
10686 			  "phyname=%s\n"
10687 			  "perm_addr=" MACSTR "\n"
10688 			  "drv_ifindex=%d\n"
10689 			  "operstate=%d\n"
10690 			  "scan_state=%s\n"
10691 			  "auth_bssid=" MACSTR "\n"
10692 			  "auth_attempt_bssid=" MACSTR "\n"
10693 			  "bssid=" MACSTR "\n"
10694 			  "prev_bssid=" MACSTR "\n"
10695 			  "associated=%d\n"
10696 			  "assoc_freq=%u\n"
10697 			  "monitor_sock=%d\n"
10698 			  "monitor_ifidx=%d\n"
10699 			  "monitor_refcount=%d\n"
10700 			  "last_mgmt_freq=%u\n"
10701 			  "eapol_tx_sock=%d\n"
10702 			  "%s%s%s%s%s%s%s%s%s%s%s%s%s",
10703 			  drv->phyname,
10704 			  MAC2STR(drv->perm_addr),
10705 			  drv->ifindex,
10706 			  drv->operstate,
10707 			  scan_state_str(drv->scan_state),
10708 			  MAC2STR(drv->auth_bssid),
10709 			  MAC2STR(drv->auth_attempt_bssid),
10710 			  MAC2STR(drv->bssid),
10711 			  MAC2STR(drv->prev_bssid),
10712 			  drv->associated,
10713 			  drv->assoc_freq,
10714 			  drv->monitor_sock,
10715 			  drv->monitor_ifidx,
10716 			  drv->monitor_refcount,
10717 			  drv->last_mgmt_freq,
10718 			  drv->eapol_tx_sock,
10719 			  drv->ignore_if_down_event ?
10720 			  "ignore_if_down_event=1\n" : "",
10721 			  drv->scan_complete_events ?
10722 			  "scan_complete_events=1\n" : "",
10723 			  drv->disabled_11b_rates ?
10724 			  "disabled_11b_rates=1\n" : "",
10725 			  drv->pending_remain_on_chan ?
10726 			  "pending_remain_on_chan=1\n" : "",
10727 			  drv->in_interface_list ? "in_interface_list=1\n" : "",
10728 			  drv->device_ap_sme ? "device_ap_sme=1\n" : "",
10729 			  drv->poll_command_supported ?
10730 			  "poll_command_supported=1\n" : "",
10731 			  drv->data_tx_status ? "data_tx_status=1\n" : "",
10732 			  drv->scan_for_auth ? "scan_for_auth=1\n" : "",
10733 			  drv->retry_auth ? "retry_auth=1\n" : "",
10734 			  drv->use_monitor ? "use_monitor=1\n" : "",
10735 			  drv->ignore_next_local_disconnect ?
10736 			  "ignore_next_local_disconnect=1\n" : "",
10737 			  drv->ignore_next_local_deauth ?
10738 			  "ignore_next_local_deauth=1\n" : "");
10739 	if (os_snprintf_error(end - pos, res))
10740 		return pos - buf;
10741 	pos += res;
10742 
10743 	if (drv->sta_mlo_info.valid_links) {
10744 		int i;
10745 		struct driver_sta_mlo_info *mlo = &drv->sta_mlo_info;
10746 
10747 		res = os_snprintf(pos, end - pos,
10748 				  "ap_mld_addr=" MACSTR "\n"
10749 				  "default_map=%d\n",
10750 				   MAC2STR(mlo->ap_mld_addr),
10751 				   mlo->default_map);
10752 		if (os_snprintf_error(end - pos, res))
10753 			return pos - buf;
10754 		pos += res;
10755 
10756 		for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
10757 			if (!(mlo->valid_links & BIT(i)))
10758 				continue;
10759 
10760 			res = os_snprintf(pos, end - pos,
10761 					  "link_addr[%u]=" MACSTR "\n"
10762 					  "link_bssid[%u]=" MACSTR "\n"
10763 					  "link_freq[%u]=%u\n",
10764 					  i, MAC2STR(mlo->links[i].addr),
10765 					  i, MAC2STR(mlo->links[i].bssid),
10766 					  i, mlo->links[i].freq);
10767 			if (os_snprintf_error(end - pos, res))
10768 				return pos - buf;
10769 			pos += res;
10770 
10771 			if (!mlo->default_map) {
10772 				res = os_snprintf(
10773 					pos, end - pos,
10774 					"uplink_map[%u]=%x\n"
10775 					"downlink_map[%u]=%x\n",
10776 					i, mlo->links[i].t2lmap.uplink,
10777 					i, mlo->links[i].t2lmap.downlink);
10778 				if (os_snprintf_error(end - pos, res))
10779 					return pos - buf;
10780 				pos += res;
10781 			}
10782 		}
10783 	}
10784 
10785 	if (drv->has_capability) {
10786 		res = os_snprintf(pos, end - pos,
10787 				  "capa.key_mgmt=0x%x\n"
10788 				  "capa.enc=0x%x\n"
10789 				  "capa.auth=0x%x\n"
10790 				  "capa.flags=0x%llx\n"
10791 				  "capa.rrm_flags=0x%x\n"
10792 				  "capa.max_scan_ssids=%d\n"
10793 				  "capa.max_sched_scan_ssids=%d\n"
10794 				  "capa.sched_scan_supported=%d\n"
10795 				  "capa.max_match_sets=%d\n"
10796 				  "capa.max_remain_on_chan=%u\n"
10797 				  "capa.max_stations=%u\n"
10798 				  "capa.probe_resp_offloads=0x%x\n"
10799 				  "capa.max_acl_mac_addrs=%u\n"
10800 				  "capa.num_multichan_concurrent=%u\n"
10801 				  "capa.mac_addr_rand_sched_scan_supported=%d\n"
10802 				  "capa.mac_addr_rand_scan_supported=%d\n"
10803 				  "capa.conc_capab=%u\n"
10804 				  "capa.max_conc_chan_2_4=%u\n"
10805 				  "capa.max_conc_chan_5_0=%u\n"
10806 				  "capa.max_sched_scan_plans=%u\n"
10807 				  "capa.max_sched_scan_plan_interval=%u\n"
10808 				  "capa.max_sched_scan_plan_iterations=%u\n"
10809 				  "capa.mbssid_max_interfaces=%u\n"
10810 				  "capa.ema_max_periodicity=%u\n",
10811 				  drv->capa.key_mgmt,
10812 				  drv->capa.enc,
10813 				  drv->capa.auth,
10814 				  (unsigned long long) drv->capa.flags,
10815 				  drv->capa.rrm_flags,
10816 				  drv->capa.max_scan_ssids,
10817 				  drv->capa.max_sched_scan_ssids,
10818 				  drv->capa.sched_scan_supported,
10819 				  drv->capa.max_match_sets,
10820 				  drv->capa.max_remain_on_chan,
10821 				  drv->capa.max_stations,
10822 				  drv->capa.probe_resp_offloads,
10823 				  drv->capa.max_acl_mac_addrs,
10824 				  drv->capa.num_multichan_concurrent,
10825 				  drv->capa.mac_addr_rand_sched_scan_supported,
10826 				  drv->capa.mac_addr_rand_scan_supported,
10827 				  drv->capa.conc_capab,
10828 				  drv->capa.max_conc_chan_2_4,
10829 				  drv->capa.max_conc_chan_5_0,
10830 				  drv->capa.max_sched_scan_plans,
10831 				  drv->capa.max_sched_scan_plan_interval,
10832 				  drv->capa.max_sched_scan_plan_iterations,
10833 				  drv->capa.mbssid_max_interfaces,
10834 				  drv->capa.ema_max_periodicity);
10835 		if (os_snprintf_error(end - pos, res))
10836 			return pos - buf;
10837 		pos += res;
10838 	}
10839 
10840 	msg = nlmsg_alloc();
10841 	if (msg &&
10842 	    nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG) &&
10843 	    nla_put_u32(msg, NL80211_ATTR_WIPHY, drv->wiphy_idx) == 0) {
10844 		if (send_and_recv_msgs(drv, msg, nl80211_get_country,
10845 				       alpha2, NULL, NULL) == 0 &&
10846 		    alpha2[0]) {
10847 			res = os_snprintf(pos, end - pos, "country=%s\n",
10848 					  alpha2);
10849 			if (os_snprintf_error(end - pos, res))
10850 				return pos - buf;
10851 			pos += res;
10852 		}
10853 	} else {
10854 		nlmsg_free(msg);
10855 	}
10856 
10857 	return pos - buf;
10858 }
10859 
10860 
set_beacon_data(struct nl_msg * msg,struct beacon_data * settings)10861 static int set_beacon_data(struct nl_msg *msg, struct beacon_data *settings)
10862 {
10863 	if ((settings->head &&
10864 	     nla_put(msg, NL80211_ATTR_BEACON_HEAD,
10865 		     settings->head_len, settings->head)) ||
10866 	    (settings->tail &&
10867 	     nla_put(msg, NL80211_ATTR_BEACON_TAIL,
10868 		     settings->tail_len, settings->tail)) ||
10869 	    (settings->beacon_ies &&
10870 	     nla_put(msg, NL80211_ATTR_IE,
10871 		     settings->beacon_ies_len, settings->beacon_ies)) ||
10872 	    (settings->proberesp_ies &&
10873 	     nla_put(msg, NL80211_ATTR_IE_PROBE_RESP,
10874 		     settings->proberesp_ies_len, settings->proberesp_ies)) ||
10875 	    (settings->assocresp_ies &&
10876 	     nla_put(msg, NL80211_ATTR_IE_ASSOC_RESP,
10877 		     settings->assocresp_ies_len, settings->assocresp_ies)) ||
10878 	    (settings->probe_resp &&
10879 	     nla_put(msg, NL80211_ATTR_PROBE_RESP,
10880 		     settings->probe_resp_len, settings->probe_resp)))
10881 		return -ENOBUFS;
10882 
10883 	return 0;
10884 }
10885 
10886 
nl80211_switch_channel(void * priv,struct csa_settings * settings)10887 static int nl80211_switch_channel(void *priv, struct csa_settings *settings)
10888 {
10889 	struct nl_msg *msg;
10890 	struct i802_bss *bss = priv;
10891 	struct wpa_driver_nl80211_data *drv = bss->drv;
10892 	struct nlattr *beacon_csa;
10893 	int ret = -ENOBUFS;
10894 	int csa_off_len = 0;
10895 	int i;
10896 
10897 	wpa_printf(MSG_DEBUG,
10898 		   "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d channel=%d sec_channel_offset=%d width=%d cf1=%d cf2=%d puncturing_bitmap=0x%04x%s%s%s)",
10899 		   settings->cs_count, settings->block_tx,
10900 		   settings->freq_params.freq,
10901 		   settings->freq_params.channel,
10902 		   settings->freq_params.sec_channel_offset,
10903 		   settings->freq_params.bandwidth,
10904 		   settings->freq_params.center_freq1,
10905 		   settings->freq_params.center_freq2,
10906 		   settings->punct_bitmap,
10907 		   settings->freq_params.ht_enabled ? " ht" : "",
10908 		   settings->freq_params.vht_enabled ? " vht" : "",
10909 		   settings->freq_params.he_enabled ? " he" : "");
10910 
10911 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_AP_CSA)) {
10912 		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
10913 		return -EOPNOTSUPP;
10914 	}
10915 
10916 	if (drv->nlmode != NL80211_IFTYPE_AP &&
10917 	    drv->nlmode != NL80211_IFTYPE_P2P_GO &&
10918 	    drv->nlmode != NL80211_IFTYPE_MESH_POINT)
10919 		return -EOPNOTSUPP;
10920 
10921 	/*
10922 	 * Remove empty counters, assuming Probe Response and Beacon frame
10923 	 * counters match. This implementation assumes that there are only two
10924 	 * counters.
10925 	 */
10926 	if (settings->counter_offset_beacon[0] &&
10927 	    !settings->counter_offset_beacon[1]) {
10928 		csa_off_len = 1;
10929 	} else if (settings->counter_offset_beacon[1] &&
10930 		   !settings->counter_offset_beacon[0]) {
10931 		csa_off_len = 1;
10932 		settings->counter_offset_beacon[0] =
10933 			settings->counter_offset_beacon[1];
10934 		settings->counter_offset_presp[0] =
10935 			settings->counter_offset_presp[1];
10936 	} else if (settings->counter_offset_beacon[1] &&
10937 		   settings->counter_offset_beacon[0]) {
10938 		csa_off_len = 2;
10939 	} else {
10940 		wpa_printf(MSG_ERROR, "nl80211: No CSA counters provided");
10941 		return -EINVAL;
10942 	}
10943 
10944 	/* Check CSA counters validity */
10945 	if (drv->capa.max_csa_counters &&
10946 	    csa_off_len > drv->capa.max_csa_counters) {
10947 		wpa_printf(MSG_ERROR,
10948 			   "nl80211: Too many CSA counters provided");
10949 		return -EINVAL;
10950 	}
10951 
10952 	if (!settings->beacon_csa.tail)
10953 		return -EINVAL;
10954 
10955 	for (i = 0; i < csa_off_len; i++) {
10956 		u16 csa_c_off_bcn = settings->counter_offset_beacon[i];
10957 		u16 csa_c_off_presp = settings->counter_offset_presp[i];
10958 
10959 		if ((settings->beacon_csa.tail_len <= csa_c_off_bcn) ||
10960 		    (settings->beacon_csa.tail[csa_c_off_bcn] !=
10961 		     settings->cs_count))
10962 			return -EINVAL;
10963 
10964 		if (settings->beacon_csa.probe_resp &&
10965 		    ((settings->beacon_csa.probe_resp_len <=
10966 		      csa_c_off_presp) ||
10967 		     (settings->beacon_csa.probe_resp[csa_c_off_presp] !=
10968 		      settings->cs_count)))
10969 			return -EINVAL;
10970 	}
10971 
10972 	if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_CHANNEL_SWITCH)) ||
10973 	    nla_put_u32(msg, NL80211_ATTR_CH_SWITCH_COUNT,
10974 			settings->cs_count) ||
10975 	    (ret = nl80211_put_freq_params(msg, &settings->freq_params)) ||
10976 	    (settings->block_tx &&
10977 	     nla_put_flag(msg, NL80211_ATTR_CH_SWITCH_BLOCK_TX)) ||
10978 	    (settings->punct_bitmap &&
10979 	     nla_put_u32(msg, NL80211_ATTR_PUNCT_BITMAP,
10980 			 settings->punct_bitmap)))
10981 		goto error;
10982 
10983 	/* beacon_after params */
10984 	ret = set_beacon_data(msg, &settings->beacon_after);
10985 	if (ret)
10986 		goto error;
10987 
10988 	/* beacon_csa params */
10989 	beacon_csa = nla_nest_start(msg, NL80211_ATTR_CSA_IES);
10990 	if (!beacon_csa)
10991 		goto fail;
10992 
10993 	ret = set_beacon_data(msg, &settings->beacon_csa);
10994 	if (ret)
10995 		goto error;
10996 
10997 	if (nla_put(msg, NL80211_ATTR_CSA_C_OFF_BEACON,
10998 		    csa_off_len * sizeof(u16),
10999 		    settings->counter_offset_beacon) ||
11000 	    (settings->beacon_csa.probe_resp &&
11001 	     nla_put(msg, NL80211_ATTR_CSA_C_OFF_PRESP,
11002 		     csa_off_len * sizeof(u16),
11003 		     settings->counter_offset_presp)))
11004 		goto fail;
11005 
11006 	nla_nest_end(msg, beacon_csa);
11007 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11008 	if (ret) {
11009 		wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
11010 			   ret, strerror(-ret));
11011 	}
11012 	return ret;
11013 
11014 fail:
11015 	ret = -ENOBUFS;
11016 error:
11017 	nlmsg_free(msg);
11018 	wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
11019 	return ret;
11020 }
11021 
11022 
11023 #ifdef CONFIG_IEEE80211AX
nl80211_switch_color(void * priv,struct cca_settings * settings)11024 static int nl80211_switch_color(void *priv, struct cca_settings *settings)
11025 {
11026 	struct i802_bss *bss = priv;
11027 	struct wpa_driver_nl80211_data *drv = bss->drv;
11028 	struct nlattr *beacon_cca;
11029 	struct nl_msg *msg;
11030 	int ret = -ENOBUFS;
11031 
11032 	wpa_printf(MSG_DEBUG,
11033 		   "nl80211: Color change request (cca_count=%u color=%d)",
11034 		   settings->cca_count, settings->cca_color);
11035 
11036 	if (drv->nlmode != NL80211_IFTYPE_AP)
11037 		return -EOPNOTSUPP;
11038 
11039 	if (!settings->beacon_cca.tail)
11040 		return -EINVAL;
11041 
11042 	if (settings->beacon_cca.tail_len <= settings->counter_offset_beacon ||
11043 	    settings->beacon_cca.tail[settings->counter_offset_beacon] !=
11044 	    settings->cca_count)
11045 		return -EINVAL;
11046 
11047 	if (settings->beacon_cca.probe_resp &&
11048 	    (settings->beacon_cca.probe_resp_len <=
11049 	     settings->counter_offset_presp ||
11050 	     settings->beacon_cca.probe_resp[settings->counter_offset_presp] !=
11051 	     settings->cca_count))
11052 		return -EINVAL;
11053 
11054 	msg = nl80211_bss_msg(bss, 0, NL80211_CMD_COLOR_CHANGE_REQUEST);
11055 	if (!msg ||
11056 	    nla_put_u8(msg, NL80211_ATTR_COLOR_CHANGE_COUNT,
11057 		       settings->cca_count) ||
11058 	    nla_put_u8(msg, NL80211_ATTR_COLOR_CHANGE_COLOR,
11059 		       settings->cca_color))
11060 		goto error;
11061 
11062 	/* beacon_after params */
11063 	ret = set_beacon_data(msg, &settings->beacon_after);
11064 	if (ret)
11065 		goto error;
11066 
11067 	/* beacon_csa params */
11068 	beacon_cca = nla_nest_start(msg, NL80211_ATTR_COLOR_CHANGE_ELEMS);
11069 	if (!beacon_cca) {
11070 		ret = -ENOBUFS;
11071 		goto error;
11072 	}
11073 
11074 	ret = set_beacon_data(msg, &settings->beacon_cca);
11075 	if (ret)
11076 		goto error;
11077 
11078 	if (nla_put_u16(msg, NL80211_ATTR_CNTDWN_OFFS_BEACON,
11079 			settings->counter_offset_beacon) ||
11080 	    (settings->beacon_cca.probe_resp &&
11081 	     nla_put_u16(msg, NL80211_ATTR_CNTDWN_OFFS_PRESP,
11082 			 settings->counter_offset_presp))) {
11083 		ret = -ENOBUFS;
11084 		goto error;
11085 	}
11086 
11087 	nla_nest_end(msg, beacon_cca);
11088 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11089 	if (ret) {
11090 		wpa_printf(MSG_DEBUG,
11091 			   "nl80211: switch_color failed err=%d (%s)",
11092 			   ret, strerror(-ret));
11093 	}
11094 	return ret;
11095 
11096 error:
11097 	nlmsg_free(msg);
11098 	wpa_printf(MSG_DEBUG, "nl80211: Could not build color switch request");
11099 	return ret;
11100 }
11101 #endif /* CONFIG_IEEE80211AX */
11102 
11103 
nl80211_add_ts(void * priv,u8 tsid,const u8 * addr,u8 user_priority,u16 admitted_time)11104 static int nl80211_add_ts(void *priv, u8 tsid, const u8 *addr,
11105 			  u8 user_priority, u16 admitted_time)
11106 {
11107 	struct i802_bss *bss = priv;
11108 	struct wpa_driver_nl80211_data *drv = bss->drv;
11109 	struct nl_msg *msg;
11110 	int ret;
11111 
11112 	wpa_printf(MSG_DEBUG,
11113 		   "nl80211: add_ts request: tsid=%u admitted_time=%u up=%d",
11114 		   tsid, admitted_time, user_priority);
11115 
11116 	if (!is_sta_interface(drv->nlmode))
11117 		return -ENOTSUP;
11118 
11119 	msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_ADD_TX_TS);
11120 	if (!msg ||
11121 	    nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
11122 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
11123 	    nla_put_u8(msg, NL80211_ATTR_USER_PRIO, user_priority) ||
11124 	    nla_put_u16(msg, NL80211_ATTR_ADMITTED_TIME, admitted_time)) {
11125 		nlmsg_free(msg);
11126 		return -ENOBUFS;
11127 	}
11128 
11129 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11130 	if (ret)
11131 		wpa_printf(MSG_DEBUG, "nl80211: add_ts failed err=%d (%s)",
11132 			   ret, strerror(-ret));
11133 	return ret;
11134 }
11135 
11136 
nl80211_del_ts(void * priv,u8 tsid,const u8 * addr)11137 static int nl80211_del_ts(void *priv, u8 tsid, const u8 *addr)
11138 {
11139 	struct i802_bss *bss = priv;
11140 	struct wpa_driver_nl80211_data *drv = bss->drv;
11141 	struct nl_msg *msg;
11142 	int ret;
11143 
11144 	wpa_printf(MSG_DEBUG, "nl80211: del_ts request: tsid=%u", tsid);
11145 
11146 	if (!is_sta_interface(drv->nlmode))
11147 		return -ENOTSUP;
11148 
11149 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_DEL_TX_TS)) ||
11150 	    nla_put_u8(msg, NL80211_ATTR_TSID, tsid) ||
11151 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
11152 		nlmsg_free(msg);
11153 		return -ENOBUFS;
11154 	}
11155 
11156 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11157 	if (ret)
11158 		wpa_printf(MSG_DEBUG, "nl80211: del_ts failed err=%d (%s)",
11159 			   ret, strerror(-ret));
11160 	return ret;
11161 }
11162 
11163 
11164 #ifdef CONFIG_TESTING_OPTIONS
cmd_reply_handler(struct nl_msg * msg,void * arg)11165 static int cmd_reply_handler(struct nl_msg *msg, void *arg)
11166 {
11167 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11168 	struct wpabuf *buf = arg;
11169 
11170 	if (!buf)
11171 		return NL_SKIP;
11172 
11173 	if ((size_t) genlmsg_attrlen(gnlh, 0) > wpabuf_tailroom(buf)) {
11174 		wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
11175 		return NL_SKIP;
11176 	}
11177 
11178 	wpabuf_put_data(buf, genlmsg_attrdata(gnlh, 0),
11179 			genlmsg_attrlen(gnlh, 0));
11180 
11181 	return NL_SKIP;
11182 }
11183 #endif /* CONFIG_TESTING_OPTIONS */
11184 
11185 
vendor_reply_handler(struct nl_msg * msg,void * arg)11186 static int vendor_reply_handler(struct nl_msg *msg, void *arg)
11187 {
11188 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
11189 	struct nlattr *nl_vendor_reply, *nl;
11190 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11191 	struct wpabuf *buf = arg;
11192 	int rem;
11193 
11194 	if (!buf)
11195 		return NL_SKIP;
11196 
11197 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11198 		  genlmsg_attrlen(gnlh, 0), NULL);
11199 	nl_vendor_reply = tb[NL80211_ATTR_VENDOR_DATA];
11200 
11201 	if (!nl_vendor_reply)
11202 		return NL_SKIP;
11203 
11204 	if ((size_t) nla_len(nl_vendor_reply) > wpabuf_tailroom(buf)) {
11205 		wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
11206 		return NL_SKIP;
11207 	}
11208 
11209 	nla_for_each_nested(nl, nl_vendor_reply, rem) {
11210 		wpabuf_put_data(buf, nla_data(nl), nla_len(nl));
11211 	}
11212 
11213 	return NL_SKIP;
11214 }
11215 
11216 
is_cmd_with_nested_attrs(unsigned int vendor_id,unsigned int subcmd)11217 static bool is_cmd_with_nested_attrs(unsigned int vendor_id,
11218 				     unsigned int subcmd)
11219 {
11220 	if (vendor_id != OUI_QCA)
11221 		return true;
11222 
11223 	switch (subcmd) {
11224 	case QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY:
11225 	case QCA_NL80211_VENDOR_SUBCMD_STATS_EXT:
11226 	case QCA_NL80211_VENDOR_SUBCMD_SCANNING_MAC_OUI:
11227 	case QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_SET_KEY:
11228 	case QCA_NL80211_VENDOR_SUBCMD_SPECTRAL_SCAN_GET_STATUS:
11229 	case QCA_NL80211_VENDOR_SUBCMD_NAN:
11230 		return false;
11231 	default:
11232 		return true;
11233 	}
11234 }
11235 
11236 
nl80211_vendor_cmd(void * priv,unsigned int vendor_id,unsigned int subcmd,const u8 * data,size_t data_len,enum nested_attr nested_attr,struct wpabuf * buf)11237 static int nl80211_vendor_cmd(void *priv, unsigned int vendor_id,
11238 			      unsigned int subcmd, const u8 *data,
11239 			      size_t data_len, enum nested_attr nested_attr,
11240 			      struct wpabuf *buf)
11241 {
11242 	struct i802_bss *bss = priv;
11243 	struct wpa_driver_nl80211_data *drv = bss->drv;
11244 	struct nl_msg *msg;
11245 	int ret, nla_flag;
11246 
11247 #ifdef CONFIG_TESTING_OPTIONS
11248 	if (vendor_id == 0xffffffff) {
11249 		msg = nlmsg_alloc();
11250 		if (!msg)
11251 			return -ENOMEM;
11252 
11253 		nl80211_cmd(drv, msg, 0, subcmd);
11254 		if (nlmsg_append(msg, (void *) data, data_len, NLMSG_ALIGNTO) <
11255 		    0)
11256 			goto fail;
11257 		/* This test vendor_cmd can be used with nl80211 commands that
11258 		 * need the connect nl_sock, so use the owner-setting variant
11259 		 * of send_and_recv_msgs(). */
11260 		ret = send_and_recv_msgs_owner(drv, msg,
11261 					       get_connect_handle(bss), 0,
11262 					       cmd_reply_handler, buf,
11263 					       NULL, NULL);
11264 		if (ret)
11265 			wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
11266 				   ret);
11267 		return ret;
11268 	}
11269 #endif /* CONFIG_TESTING_OPTIONS */
11270 
11271 	if (nested_attr == NESTED_ATTR_USED)
11272 		nla_flag = NLA_F_NESTED;
11273 	else if (nested_attr == NESTED_ATTR_UNSPECIFIED &&
11274 		 is_cmd_with_nested_attrs(vendor_id, subcmd))
11275 		nla_flag = NLA_F_NESTED;
11276 	else
11277 		nla_flag = 0;
11278 
11279 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
11280 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, vendor_id) ||
11281 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, subcmd) ||
11282 	    (data &&
11283 	     nla_put(msg, nla_flag | NL80211_ATTR_VENDOR_DATA,
11284 		     data_len, data)))
11285 		goto fail;
11286 
11287 	ret = send_and_recv_msgs(drv, msg, vendor_reply_handler, buf,
11288 				 NULL, NULL);
11289 	if (ret)
11290 		wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
11291 			   ret);
11292 	return ret;
11293 
11294 fail:
11295 	nlmsg_free(msg);
11296 	return -ENOBUFS;
11297 }
11298 
11299 
nl80211_set_qos_map(void * priv,const u8 * qos_map_set,u8 qos_map_set_len)11300 static int nl80211_set_qos_map(void *priv, const u8 *qos_map_set,
11301 			       u8 qos_map_set_len)
11302 {
11303 	struct i802_bss *bss = priv;
11304 	struct wpa_driver_nl80211_data *drv = bss->drv;
11305 	struct nl_msg *msg;
11306 	int ret;
11307 
11308 	wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
11309 		    qos_map_set, qos_map_set_len);
11310 
11311 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_SET_QOS_MAP)) ||
11312 	    nla_put(msg, NL80211_ATTR_QOS_MAP, qos_map_set_len, qos_map_set)) {
11313 		nlmsg_free(msg);
11314 		return -ENOBUFS;
11315 	}
11316 
11317 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11318 	if (ret)
11319 		wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
11320 
11321 	return ret;
11322 }
11323 
11324 
get_wowlan_handler(struct nl_msg * msg,void * arg)11325 static int get_wowlan_handler(struct nl_msg *msg, void *arg)
11326 {
11327 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
11328 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11329 	int *wowlan_enabled = arg;
11330 
11331 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11332 		  genlmsg_attrlen(gnlh, 0), NULL);
11333 
11334 	*wowlan_enabled = !!tb[NL80211_ATTR_WOWLAN_TRIGGERS];
11335 
11336 	return NL_SKIP;
11337 }
11338 
11339 
nl80211_get_wowlan(void * priv)11340 static int nl80211_get_wowlan(void *priv)
11341 {
11342 	struct i802_bss *bss = priv;
11343 	struct wpa_driver_nl80211_data *drv = bss->drv;
11344 	struct nl_msg *msg;
11345 	int wowlan_enabled;
11346 	int ret;
11347 
11348 	wpa_printf(MSG_DEBUG, "nl80211: Getting wowlan status");
11349 
11350 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_GET_WOWLAN);
11351 
11352 	ret = send_and_recv_msgs(drv, msg, get_wowlan_handler, &wowlan_enabled,
11353 				 NULL, NULL);
11354 	if (ret) {
11355 		wpa_printf(MSG_DEBUG, "nl80211: Getting wowlan status failed");
11356 		return 0;
11357 	}
11358 
11359 	wpa_printf(MSG_DEBUG, "nl80211: wowlan is %s",
11360 		   wowlan_enabled ? "enabled" : "disabled");
11361 
11362 	return wowlan_enabled;
11363 }
11364 
11365 
nl80211_set_wowlan(void * priv,const struct wowlan_triggers * triggers)11366 static int nl80211_set_wowlan(void *priv,
11367 			      const struct wowlan_triggers *triggers)
11368 {
11369 	struct i802_bss *bss = priv;
11370 	struct wpa_driver_nl80211_data *drv = bss->drv;
11371 	struct nl_msg *msg;
11372 	struct nlattr *wowlan_triggers;
11373 	int ret;
11374 
11375 	wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
11376 
11377 	if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_SET_WOWLAN)) ||
11378 	    !(wowlan_triggers = nla_nest_start(msg,
11379 					       NL80211_ATTR_WOWLAN_TRIGGERS)) ||
11380 	    (triggers->any &&
11381 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_ANY)) ||
11382 	    (triggers->disconnect &&
11383 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_DISCONNECT)) ||
11384 	    (triggers->magic_pkt &&
11385 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT)) ||
11386 	    (triggers->gtk_rekey_failure &&
11387 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE)) ||
11388 	    (triggers->eap_identity_req &&
11389 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST)) ||
11390 	    (triggers->four_way_handshake &&
11391 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE)) ||
11392 	    (triggers->rfkill_release &&
11393 	     nla_put_flag(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE))) {
11394 		nlmsg_free(msg);
11395 		return -ENOBUFS;
11396 	}
11397 
11398 	nla_nest_end(msg, wowlan_triggers);
11399 
11400 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11401 	if (ret)
11402 		wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
11403 
11404 	return ret;
11405 }
11406 
11407 
11408 #ifdef CONFIG_DRIVER_NL80211_QCA
nl80211_roaming(void * priv,int allowed,const u8 * bssid)11409 static int nl80211_roaming(void *priv, int allowed, const u8 *bssid)
11410 {
11411 	struct i802_bss *bss = priv;
11412 	struct wpa_driver_nl80211_data *drv = bss->drv;
11413 	struct nl_msg *msg;
11414 	struct nlattr *params;
11415 
11416 	wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
11417 
11418 	if (!drv->roaming_vendor_cmd_avail) {
11419 		wpa_printf(MSG_DEBUG,
11420 			   "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
11421 		return -1;
11422 	}
11423 
11424 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11425 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11426 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11427 			QCA_NL80211_VENDOR_SUBCMD_ROAMING) ||
11428 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11429 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_POLICY,
11430 			allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
11431 			QCA_ROAMING_NOT_ALLOWED) ||
11432 	    (bssid &&
11433 	     nla_put(msg, QCA_WLAN_VENDOR_ATTR_MAC_ADDR, ETH_ALEN, bssid))) {
11434 		nlmsg_free(msg);
11435 		return -1;
11436 	}
11437 	nla_nest_end(msg, params);
11438 
11439 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11440 }
11441 
11442 
nl80211_disable_fils(void * priv,int disable)11443 static int nl80211_disable_fils(void *priv, int disable)
11444 {
11445 	struct i802_bss *bss = priv;
11446 	struct wpa_driver_nl80211_data *drv = bss->drv;
11447 	struct nl_msg *msg;
11448 	struct nlattr *params;
11449 
11450 	wpa_printf(MSG_DEBUG, "nl80211: Disable FILS=%d", disable);
11451 
11452 	if (!drv->set_wifi_conf_vendor_cmd_avail)
11453 		return -1;
11454 
11455 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11456 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11457 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11458 			QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION) ||
11459 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11460 	    nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_DISABLE_FILS,
11461 		       disable)) {
11462 		nlmsg_free(msg);
11463 		return -1;
11464 	}
11465 	nla_nest_end(msg, params);
11466 
11467 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11468 }
11469 
11470 
11471 /* Reserved QCA_WLAN_VENDOR_ATTR_ROAMING_REQ_ID value for wpa_supplicant */
11472 #define WPA_SUPPLICANT_CLIENT_ID 1
11473 
nl80211_set_bssid_tmp_disallow(void * priv,unsigned int num_bssid,const u8 * bssid)11474 static int nl80211_set_bssid_tmp_disallow(void *priv, unsigned int num_bssid,
11475 					  const u8 *bssid)
11476 {
11477 	struct i802_bss *bss = priv;
11478 	struct wpa_driver_nl80211_data *drv = bss->drv;
11479 	struct nl_msg *msg;
11480 	struct nlattr *params, *nlbssids, *attr;
11481 	unsigned int i;
11482 
11483 	wpa_printf(MSG_DEBUG,
11484 		   "nl80211: Set temporarily disallowed BSSIDs (num=%u)",
11485 		   num_bssid);
11486 
11487 	if (!drv->roam_vendor_cmd_avail)
11488 		return -1;
11489 
11490 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11491 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11492 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11493 			QCA_NL80211_VENDOR_SUBCMD_ROAM) ||
11494 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11495 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_SUBCMD,
11496 			QCA_WLAN_VENDOR_ROAMING_SUBCMD_SET_BLACKLIST_BSSID) ||
11497 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_ROAMING_REQ_ID,
11498 			WPA_SUPPLICANT_CLIENT_ID) ||
11499 	    nla_put_u32(msg,
11500 			QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS_NUM_BSSID,
11501 			num_bssid))
11502 		goto fail;
11503 
11504 	nlbssids = nla_nest_start(
11505 		msg, QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS);
11506 	if (!nlbssids)
11507 		goto fail;
11508 
11509 	for (i = 0; i < num_bssid; i++) {
11510 		attr = nla_nest_start(msg, i);
11511 		if (!attr)
11512 			goto fail;
11513 		if (nla_put(msg,
11514 			    QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_SET_BSSID_PARAMS_BSSID,
11515 			    ETH_ALEN, &bssid[i * ETH_ALEN]))
11516 			goto fail;
11517 		wpa_printf(MSG_DEBUG, "nl80211:   BSSID[%u]: " MACSTR, i,
11518 			   MAC2STR(&bssid[i * ETH_ALEN]));
11519 		nla_nest_end(msg, attr);
11520 	}
11521 	nla_nest_end(msg, nlbssids);
11522 	nla_nest_end(msg, params);
11523 
11524 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11525 
11526 fail:
11527 	nlmsg_free(msg);
11528 	return -1;
11529 }
11530 
11531 
nl80211_add_sta_node(void * priv,const u8 * addr,u16 auth_alg)11532 static int nl80211_add_sta_node(void *priv, const u8 *addr, u16 auth_alg)
11533 {
11534 	struct i802_bss *bss = priv;
11535 	struct wpa_driver_nl80211_data *drv = bss->drv;
11536 	struct nl_msg *msg;
11537 	struct nlattr *params;
11538 
11539 	if (!drv->add_sta_node_vendor_cmd_avail)
11540 		return -EOPNOTSUPP;
11541 
11542 	wpa_printf(MSG_DEBUG, "nl80211: Add STA node");
11543 
11544 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
11545 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
11546 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11547 			QCA_NL80211_VENDOR_SUBCMD_ADD_STA_NODE) ||
11548 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11549 	    (addr &&
11550 	     nla_put(msg, QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_MAC_ADDR, ETH_ALEN,
11551 		     addr)) ||
11552 	    nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_AUTH_ALGO,
11553 			auth_alg)) {
11554 		nlmsg_free(msg);
11555 		wpa_printf(MSG_ERROR,
11556 			   "%s: err in adding vendor_cmd and vendor_data",
11557 			   __func__);
11558 		return -1;
11559 	}
11560 	nla_nest_end(msg, params);
11561 
11562 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11563 }
11564 
11565 #endif /* CONFIG_DRIVER_NL80211_QCA */
11566 
11567 
nl80211_set_mac_addr(void * priv,const u8 * addr)11568 static int nl80211_set_mac_addr(void *priv, const u8 *addr)
11569 {
11570 	struct i802_bss *bss = priv;
11571 	struct wpa_driver_nl80211_data *drv = bss->drv;
11572 	int new_addr = addr != NULL;
11573 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
11574 	struct nl_msg *msg;
11575 	struct nlattr *params;
11576 	int ret;
11577 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
11578 	wpa_printf(MSG_DEBUG, "Enter: %s", __FUNCTION__);
11579 
11580 	if (TEST_FAIL())
11581 		return -1;
11582 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) {
11583 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
11584 		if (!addr ) {
11585 			addr = drv->global->p2p_perm_addr;
11586 		}
11587 
11588 		if (!(msg = nl80211_cmd_msg(bss, 0, NL80211_CMD_VENDOR)) ||
11589 			nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
11590 			nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
11591 				BRCM_VENDOR_SCMD_SET_MAC) ||
11592 			!(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
11593 			nla_put(msg, BRCM_ATTR_DRIVER_MAC_ADDR, ETH_ALEN, addr)) {
11594 			wpa_printf(MSG_ERROR, "failed to put p2p randmac");
11595 			nl80211_nlmsg_clear(msg);
11596 			nlmsg_free(msg);
11597 			return -ENOBUFS;
11598 		}
11599 		nla_nest_end(msg, params);
11600 
11601 		ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
11602 		if (ret) {
11603 			wpa_printf(MSG_ERROR, "nl80211: p2p set macaddr failed: ret=%d (%s)",
11604 				ret, strerror(-ret));
11605 		}
11606 		memcpy(bss->addr, addr, ETH_ALEN);
11607 		return ret;
11608 #else
11609 		return -ENOTSUP;
11610 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
11611 	}
11612 	if (!addr)
11613 		addr = drv->perm_addr;
11614 
11615 	if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) < 0)
11616 		return -1;
11617 
11618 	if (linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname, addr) < 0)
11619 	{
11620 		wpa_printf(MSG_DEBUG,
11621 			"nl80211: failed to set_mac_addr for %s to " MACSTR,
11622 			bss->ifname, MAC2STR(addr));
11623 		if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname,
11624 			1) < 0) {
11625 			wpa_printf(MSG_DEBUG,
11626 				"nl80211: Could not restore interface UP after failed set_mac_addr");
11627 		}
11628 		return -1;
11629 	}
11630 
11631 	wpa_printf(MSG_DEBUG, "nl80211: set_mac_addr for %s to " MACSTR,
11632 		bss->ifname, MAC2STR(addr));
11633 	drv->addr_changed = new_addr;
11634 	os_memcpy(bss->prev_addr, bss->addr, ETH_ALEN);
11635 	os_memcpy(bss->addr, addr, ETH_ALEN);
11636 
11637 	if (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 1) < 0)
11638 	{
11639 		wpa_printf(MSG_DEBUG,
11640 			"nl80211: Could not restore interface UP after set_mac_addr");
11641 	}
11642 	return 0;
11643 }
11644 
11645 
11646 #ifdef CONFIG_MESH
11647 
wpa_driver_nl80211_init_mesh(void * priv)11648 static int wpa_driver_nl80211_init_mesh(void *priv)
11649 {
11650 	if (wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_MESH_POINT)) {
11651 		wpa_printf(MSG_INFO,
11652 			   "nl80211: Failed to set interface into mesh mode");
11653 		return -1;
11654 	}
11655 	return 0;
11656 }
11657 
11658 
nl80211_put_mesh_id(struct nl_msg * msg,const u8 * mesh_id,size_t mesh_id_len)11659 static int nl80211_put_mesh_id(struct nl_msg *msg, const u8 *mesh_id,
11660 			       size_t mesh_id_len)
11661 {
11662 	if (mesh_id) {
11663 		wpa_printf(MSG_DEBUG, "  * Mesh ID (SSID)=%s",
11664 			   wpa_ssid_txt(mesh_id, mesh_id_len));
11665 		return nla_put(msg, NL80211_ATTR_MESH_ID, mesh_id_len, mesh_id);
11666 	}
11667 
11668 	return 0;
11669 }
11670 
11671 
nl80211_put_mesh_config(struct nl_msg * msg,struct wpa_driver_mesh_bss_params * params)11672 static int nl80211_put_mesh_config(struct nl_msg *msg,
11673 				   struct wpa_driver_mesh_bss_params *params)
11674 {
11675 	struct nlattr *container;
11676 
11677 	container = nla_nest_start(msg, NL80211_ATTR_MESH_CONFIG);
11678 	if (!container)
11679 		return -1;
11680 
11681 	if (((params->flags & WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS) &&
11682 	     nla_put_u8(msg, NL80211_MESHCONF_AUTO_OPEN_PLINKS,
11683 			params->auto_plinks)) ||
11684 	    ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_FORWARDING) &&
11685 	     nla_put_u8(msg, NL80211_MESHCONF_FORWARDING,
11686 			params->forwarding)) ||
11687 	    ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_MAX_PEER_LINKS) &&
11688 	     nla_put_u16(msg, NL80211_MESHCONF_MAX_PEER_LINKS,
11689 			 params->max_peer_links)) ||
11690 	    ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_RSSI_THRESHOLD) &&
11691 	     nla_put_u32(msg, NL80211_MESHCONF_RSSI_THRESHOLD,
11692 			 params->rssi_threshold)))
11693 		return -1;
11694 
11695 	/*
11696 	 * Set NL80211_MESHCONF_PLINK_TIMEOUT even if user mpm is used because
11697 	 * the timer could disconnect stations even in that case.
11698 	 */
11699 	if ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_PEER_LINK_TIMEOUT) &&
11700 	    nla_put_u32(msg, NL80211_MESHCONF_PLINK_TIMEOUT,
11701 			params->peer_link_timeout)) {
11702 		wpa_printf(MSG_ERROR, "nl80211: Failed to set PLINK_TIMEOUT");
11703 		return -1;
11704 	}
11705 
11706 	if ((params->flags & WPA_DRIVER_MESH_CONF_FLAG_HT_OP_MODE) &&
11707 	    nla_put_u16(msg, NL80211_MESHCONF_HT_OPMODE, params->ht_opmode)) {
11708 		wpa_printf(MSG_ERROR, "nl80211: Failed to set HT_OP_MODE");
11709 		return -1;
11710 	}
11711 
11712 	nla_nest_end(msg, container);
11713 
11714 	return 0;
11715 }
11716 
11717 
nl80211_join_mesh(struct i802_bss * bss,struct wpa_driver_mesh_join_params * params)11718 static int nl80211_join_mesh(struct i802_bss *bss,
11719 			     struct wpa_driver_mesh_join_params *params)
11720 {
11721 	struct wpa_driver_nl80211_data *drv = bss->drv;
11722 	struct nl_msg *msg;
11723 	struct nlattr *container;
11724 	int ret = -1;
11725 
11726 	wpa_printf(MSG_DEBUG, "nl80211: mesh join (ifindex=%d)", drv->ifindex);
11727 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_JOIN_MESH);
11728 	if (!msg ||
11729 	    nl80211_put_freq_params(msg, ¶ms->freq) ||
11730 	    nl80211_put_basic_rates(msg, params->basic_rates) ||
11731 	    nl80211_put_mesh_id(msg, params->meshid, params->meshid_len) ||
11732 	    nl80211_put_beacon_int(msg, params->beacon_int) ||
11733 	    nl80211_put_dtim_period(msg, params->dtim_period))
11734 		goto fail;
11735 
11736 	wpa_printf(MSG_DEBUG, "  * flags=%08X", params->flags);
11737 
11738 	if (params->handle_dfs && nla_put_flag(msg, NL80211_ATTR_HANDLE_DFS))
11739 		goto fail;
11740 
11741 	container = nla_nest_start(msg, NL80211_ATTR_MESH_SETUP);
11742 	if (!container)
11743 		goto fail;
11744 
11745 	if (params->ies) {
11746 		wpa_hexdump(MSG_DEBUG, "  * IEs", params->ies, params->ie_len);
11747 		if (nla_put(msg, NL80211_MESH_SETUP_IE, params->ie_len,
11748 			    params->ies))
11749 			goto fail;
11750 	}
11751 	/* WPA_DRIVER_MESH_FLAG_OPEN_AUTH is treated as default by nl80211 */
11752 	if (params->flags & WPA_DRIVER_MESH_FLAG_SAE_AUTH) {
11753 		if (nla_put_u8(msg, NL80211_MESH_SETUP_AUTH_PROTOCOL, 0x1) ||
11754 		    nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AUTH))
11755 			goto fail;
11756 	}
11757 	if ((params->flags & WPA_DRIVER_MESH_FLAG_AMPE) &&
11758 	    nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_AMPE))
11759 		goto fail;
11760 	if ((params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM) &&
11761 	    nla_put_flag(msg, NL80211_MESH_SETUP_USERSPACE_MPM))
11762 		goto fail;
11763 	nla_nest_end(msg, container);
11764 
11765 	params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_AUTO_PLINKS;
11766 	params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_PEER_LINK_TIMEOUT;
11767 	params->conf.flags |= WPA_DRIVER_MESH_CONF_FLAG_MAX_PEER_LINKS;
11768 	if (nl80211_put_mesh_config(msg, ¶ms->conf) < 0)
11769 		goto fail;
11770 
11771 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 1);
11772 	msg = NULL;
11773 	if (ret) {
11774 		wpa_printf(MSG_DEBUG, "nl80211: mesh join failed: ret=%d (%s)",
11775 			   ret, strerror(-ret));
11776 		goto fail;
11777 	}
11778 	ret = 0;
11779 	drv->assoc_freq = bss->flink->freq = params->freq.freq;
11780 	wpa_printf(MSG_DEBUG, "nl80211: mesh join request send successfully");
11781 
11782 fail:
11783 	nlmsg_free(msg);
11784 	return ret;
11785 }
11786 
11787 
11788 static int
wpa_driver_nl80211_join_mesh(void * priv,struct wpa_driver_mesh_join_params * params)11789 wpa_driver_nl80211_join_mesh(void *priv,
11790 			     struct wpa_driver_mesh_join_params *params)
11791 {
11792 	struct i802_bss *bss = priv;
11793 	int ret, timeout;
11794 
11795 	timeout = params->conf.peer_link_timeout;
11796 
11797 	/* Disable kernel inactivity timer */
11798 	if (params->flags & WPA_DRIVER_MESH_FLAG_USER_MPM)
11799 		params->conf.peer_link_timeout = 0;
11800 
11801 	ret = nl80211_join_mesh(bss, params);
11802 	if (ret == -EINVAL && params->conf.peer_link_timeout == 0) {
11803 		wpa_printf(MSG_DEBUG,
11804 			   "nl80211: Mesh join retry for peer_link_timeout");
11805 		/*
11806 		 * Old kernel does not support setting
11807 		 * NL80211_MESHCONF_PLINK_TIMEOUT to zero, so set 60 seconds
11808 		 * into future from peer_link_timeout.
11809 		 */
11810 		params->conf.peer_link_timeout = timeout + 60;
11811 		ret = nl80211_join_mesh(priv, params);
11812 	}
11813 
11814 	params->conf.peer_link_timeout = timeout;
11815 	return ret;
11816 }
11817 
11818 
wpa_driver_nl80211_leave_mesh(void * priv)11819 static int wpa_driver_nl80211_leave_mesh(void *priv)
11820 {
11821 	struct i802_bss *bss = priv;
11822 	struct wpa_driver_nl80211_data *drv = bss->drv;
11823 	struct nl_msg *msg;
11824 	int ret;
11825 
11826 	wpa_printf(MSG_DEBUG, "nl80211: mesh leave (ifindex=%d)", drv->ifindex);
11827 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_LEAVE_MESH);
11828 	ret = send_and_recv_msgs_connect_handle(drv, msg, bss, 0);
11829 	if (ret) {
11830 		wpa_printf(MSG_DEBUG, "nl80211: mesh leave failed: ret=%d (%s)",
11831 			   ret, strerror(-ret));
11832 	} else {
11833 		wpa_printf(MSG_DEBUG,
11834 			   "nl80211: mesh leave request send successfully");
11835 		drv->first_bss->flink->freq = 0;
11836 	}
11837 
11838 	if (drv->start_mode_sta &&
11839 	    wpa_driver_nl80211_set_mode(drv->first_bss,
11840 					NL80211_IFTYPE_STATION)) {
11841 		wpa_printf(MSG_INFO,
11842 			   "nl80211: Failed to set interface into station mode");
11843 	}
11844 	return ret;
11845 }
11846 
11847 
nl80211_probe_mesh_link(void * priv,const u8 * addr,const u8 * eth,size_t len)11848 static int nl80211_probe_mesh_link(void *priv, const u8 *addr, const u8 *eth,
11849 				   size_t len)
11850 {
11851 	struct i802_bss *bss = priv;
11852 	struct wpa_driver_nl80211_data *drv = bss->drv;
11853 	struct nl_msg *msg;
11854 	int ret;
11855 
11856 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_PROBE_MESH_LINK);
11857 	if (!msg ||
11858 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr) ||
11859 	    nla_put(msg, NL80211_ATTR_FRAME, len, eth)) {
11860 		nlmsg_free(msg);
11861 		return -ENOBUFS;
11862 	}
11863 
11864 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
11865 	if (ret) {
11866 		wpa_printf(MSG_DEBUG, "nl80211: mesh link probe to " MACSTR
11867 			   " failed: ret=%d (%s)",
11868 			   MAC2STR(addr), ret, strerror(-ret));
11869 	} else {
11870 		wpa_printf(MSG_DEBUG, "nl80211: Mesh link to " MACSTR
11871 			   " probed successfully", MAC2STR(addr));
11872 	}
11873 
11874 	return ret;
11875 }
11876 
11877 #endif /* CONFIG_MESH */
11878 
11879 
wpa_driver_br_add_ip_neigh(void * priv,u8 version,const u8 * ipaddr,int prefixlen,const u8 * addr)11880 static int wpa_driver_br_add_ip_neigh(void *priv, u8 version,
11881 				      const u8 *ipaddr, int prefixlen,
11882 				      const u8 *addr)
11883 {
11884 #ifdef CONFIG_LIBNL3_ROUTE
11885 	struct i802_bss *bss = priv;
11886 	struct wpa_driver_nl80211_data *drv = bss->drv;
11887 	struct rtnl_neigh *rn;
11888 	struct nl_addr *nl_ipaddr = NULL;
11889 	struct nl_addr *nl_lladdr = NULL;
11890 	int family, addrsize;
11891 	int res;
11892 
11893 	if (!ipaddr || prefixlen == 0 || !addr)
11894 		return -EINVAL;
11895 
11896 	if (bss->br_ifindex == 0) {
11897 		wpa_printf(MSG_DEBUG,
11898 			   "nl80211: bridge must be set before adding an ip neigh to it");
11899 		return -1;
11900 	}
11901 
11902 	if (!drv->rtnl_sk) {
11903 		wpa_printf(MSG_DEBUG,
11904 			   "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
11905 		return -1;
11906 	}
11907 
11908 	if (version == 4) {
11909 		family = AF_INET;
11910 		addrsize = 4;
11911 	} else if (version == 6) {
11912 		family = AF_INET6;
11913 		addrsize = 16;
11914 	} else {
11915 		return -EINVAL;
11916 	}
11917 
11918 	rn = rtnl_neigh_alloc();
11919 	if (rn == NULL)
11920 		return -ENOMEM;
11921 
11922 	/* set the destination ip address for neigh */
11923 	nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
11924 	if (nl_ipaddr == NULL) {
11925 		wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
11926 		res = -ENOMEM;
11927 		goto errout;
11928 	}
11929 	nl_addr_set_prefixlen(nl_ipaddr, prefixlen);
11930 	res = rtnl_neigh_set_dst(rn, nl_ipaddr);
11931 	if (res) {
11932 		wpa_printf(MSG_DEBUG,
11933 			   "nl80211: neigh set destination addr failed");
11934 		goto errout;
11935 	}
11936 
11937 	/* set the corresponding lladdr for neigh */
11938 	nl_lladdr = nl_addr_build(AF_BRIDGE, (u8 *) addr, ETH_ALEN);
11939 	if (nl_lladdr == NULL) {
11940 		wpa_printf(MSG_DEBUG, "nl80211: neigh set lladdr failed");
11941 		res = -ENOMEM;
11942 		goto errout;
11943 	}
11944 	rtnl_neigh_set_lladdr(rn, nl_lladdr);
11945 
11946 	rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
11947 	rtnl_neigh_set_state(rn, NUD_PERMANENT);
11948 
11949 	res = rtnl_neigh_add(drv->rtnl_sk, rn, NLM_F_CREATE);
11950 	if (res) {
11951 		wpa_printf(MSG_DEBUG,
11952 			   "nl80211: Adding bridge ip neigh failed: %s",
11953 			   nl_geterror(res));
11954 	}
11955 errout:
11956 	if (nl_lladdr)
11957 		nl_addr_put(nl_lladdr);
11958 	if (nl_ipaddr)
11959 		nl_addr_put(nl_ipaddr);
11960 	if (rn)
11961 		rtnl_neigh_put(rn);
11962 	return res;
11963 #else /* CONFIG_LIBNL3_ROUTE */
11964 	return -1;
11965 #endif /* CONFIG_LIBNL3_ROUTE */
11966 }
11967 
11968 
wpa_driver_br_delete_ip_neigh(void * priv,u8 version,const u8 * ipaddr)11969 static int wpa_driver_br_delete_ip_neigh(void *priv, u8 version,
11970 					 const u8 *ipaddr)
11971 {
11972 #ifdef CONFIG_LIBNL3_ROUTE
11973 	struct i802_bss *bss = priv;
11974 	struct wpa_driver_nl80211_data *drv = bss->drv;
11975 	struct rtnl_neigh *rn;
11976 	struct nl_addr *nl_ipaddr;
11977 	int family, addrsize;
11978 	int res;
11979 
11980 	if (!ipaddr)
11981 		return -EINVAL;
11982 
11983 	if (version == 4) {
11984 		family = AF_INET;
11985 		addrsize = 4;
11986 	} else if (version == 6) {
11987 		family = AF_INET6;
11988 		addrsize = 16;
11989 	} else {
11990 		return -EINVAL;
11991 	}
11992 
11993 	if (bss->br_ifindex == 0) {
11994 		wpa_printf(MSG_DEBUG,
11995 			   "nl80211: bridge must be set to delete an ip neigh");
11996 		return -1;
11997 	}
11998 
11999 	if (!drv->rtnl_sk) {
12000 		wpa_printf(MSG_DEBUG,
12001 			   "nl80211: nl_sock for NETLINK_ROUTE is not initialized");
12002 		return -1;
12003 	}
12004 
12005 	rn = rtnl_neigh_alloc();
12006 	if (rn == NULL)
12007 		return -ENOMEM;
12008 
12009 	/* set the destination ip address for neigh */
12010 	nl_ipaddr = nl_addr_build(family, (void *) ipaddr, addrsize);
12011 	if (nl_ipaddr == NULL) {
12012 		wpa_printf(MSG_DEBUG, "nl80211: nl_ipaddr build failed");
12013 		res = -ENOMEM;
12014 		goto errout;
12015 	}
12016 	res = rtnl_neigh_set_dst(rn, nl_ipaddr);
12017 	if (res) {
12018 		wpa_printf(MSG_DEBUG,
12019 			   "nl80211: neigh set destination addr failed");
12020 		goto errout;
12021 	}
12022 
12023 	rtnl_neigh_set_ifindex(rn, bss->br_ifindex);
12024 
12025 	res = rtnl_neigh_delete(drv->rtnl_sk, rn, 0);
12026 	if (res) {
12027 		wpa_printf(MSG_DEBUG,
12028 			   "nl80211: Deleting bridge ip neigh failed: %s",
12029 			   nl_geterror(res));
12030 	}
12031 errout:
12032 	if (nl_ipaddr)
12033 		nl_addr_put(nl_ipaddr);
12034 	if (rn)
12035 		rtnl_neigh_put(rn);
12036 	return res;
12037 #else /* CONFIG_LIBNL3_ROUTE */
12038 	return -1;
12039 #endif /* CONFIG_LIBNL3_ROUTE */
12040 }
12041 
12042 
linux_write_system_file(const char * path,unsigned int val)12043 static int linux_write_system_file(const char *path, unsigned int val)
12044 {
12045 	char buf[50];
12046 	int fd, len;
12047 
12048 	len = os_snprintf(buf, sizeof(buf), "%u\n", val);
12049 	if (os_snprintf_error(sizeof(buf), len))
12050 		return -1;
12051 
12052 	fd = open(path, O_WRONLY);
12053 	if (fd < 0)
12054 		return -1;
12055 
12056 	if (write(fd, buf, len) < 0) {
12057 		wpa_printf(MSG_DEBUG,
12058 			   "nl80211: Failed to write Linux system file: %s with the value of %d",
12059 			   path, val);
12060 		close(fd);
12061 		return -1;
12062 	}
12063 	close(fd);
12064 
12065 	return 0;
12066 }
12067 
12068 
drv_br_port_attr_str(enum drv_br_port_attr attr)12069 static const char * drv_br_port_attr_str(enum drv_br_port_attr attr)
12070 {
12071 	switch (attr) {
12072 	case DRV_BR_PORT_ATTR_PROXYARP:
12073 		return "proxyarp_wifi";
12074 	case DRV_BR_PORT_ATTR_HAIRPIN_MODE:
12075 		return "hairpin_mode";
12076 	case DRV_BR_PORT_ATTR_MCAST2UCAST:
12077 		return "multicast_to_unicast";
12078 	}
12079 
12080 	return NULL;
12081 }
12082 
12083 
wpa_driver_br_port_set_attr(void * priv,enum drv_br_port_attr attr,unsigned int val)12084 static int wpa_driver_br_port_set_attr(void *priv, enum drv_br_port_attr attr,
12085 				       unsigned int val)
12086 {
12087 	struct i802_bss *bss = priv;
12088 	char path[128];
12089 	const char *attr_txt;
12090 
12091 	attr_txt = drv_br_port_attr_str(attr);
12092 	if (attr_txt == NULL)
12093 		return -EINVAL;
12094 
12095 	os_snprintf(path, sizeof(path), "/sys/class/net/%s/brport/%s",
12096 		    bss->ifname, attr_txt);
12097 
12098 	if (linux_write_system_file(path, val))
12099 		return -1;
12100 
12101 	return 0;
12102 }
12103 
12104 
drv_br_net_param_str(enum drv_br_net_param param)12105 static const char * drv_br_net_param_str(enum drv_br_net_param param)
12106 {
12107 	switch (param) {
12108 	case DRV_BR_NET_PARAM_GARP_ACCEPT:
12109 		return "arp_accept";
12110 	default:
12111 		return NULL;
12112 	}
12113 }
12114 
12115 
wpa_driver_br_set_net_param(void * priv,enum drv_br_net_param param,unsigned int val)12116 static int wpa_driver_br_set_net_param(void *priv, enum drv_br_net_param param,
12117 				       unsigned int val)
12118 {
12119 	struct i802_bss *bss = priv;
12120 	char path[128];
12121 	const char *param_txt;
12122 	int ip_version = 4;
12123 
12124 	if (param == DRV_BR_MULTICAST_SNOOPING) {
12125 		os_snprintf(path, sizeof(path),
12126 			    "/sys/devices/virtual/net/%s/bridge/multicast_snooping",
12127 			    bss->brname);
12128 		goto set_val;
12129 	}
12130 
12131 	param_txt = drv_br_net_param_str(param);
12132 	if (param_txt == NULL)
12133 		return -EINVAL;
12134 
12135 	switch (param) {
12136 		case DRV_BR_NET_PARAM_GARP_ACCEPT:
12137 			ip_version = 4;
12138 			break;
12139 		default:
12140 			return -EINVAL;
12141 	}
12142 
12143 	os_snprintf(path, sizeof(path), "/proc/sys/net/ipv%d/conf/%s/%s",
12144 		    ip_version, bss->brname, param_txt);
12145 
12146 set_val:
12147 	if (linux_write_system_file(path, val))
12148 		return -1;
12149 
12150 	return 0;
12151 }
12152 
12153 
12154 #ifdef CONFIG_DRIVER_NL80211_QCA
12155 
hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)12156 static int hw_mode_to_qca_acs(enum hostapd_hw_mode hw_mode)
12157 {
12158 	switch (hw_mode) {
12159 	case HOSTAPD_MODE_IEEE80211B:
12160 		return QCA_ACS_MODE_IEEE80211B;
12161 	case HOSTAPD_MODE_IEEE80211G:
12162 		return QCA_ACS_MODE_IEEE80211G;
12163 	case HOSTAPD_MODE_IEEE80211A:
12164 		return QCA_ACS_MODE_IEEE80211A;
12165 	case HOSTAPD_MODE_IEEE80211AD:
12166 		return QCA_ACS_MODE_IEEE80211AD;
12167 	case HOSTAPD_MODE_IEEE80211ANY:
12168 		return QCA_ACS_MODE_IEEE80211ANY;
12169 	default:
12170 		return -1;
12171 	}
12172 }
12173 
12174 
add_acs_ch_list(struct nl_msg * msg,const int * freq_list)12175 static int add_acs_ch_list(struct nl_msg *msg, const int *freq_list)
12176 {
12177 	int num_channels = 0, num_freqs;
12178 	u8 *ch_list;
12179 	enum hostapd_hw_mode hw_mode;
12180 	int ret = 0;
12181 	int i;
12182 
12183 	if (!freq_list)
12184 		return 0;
12185 
12186 	num_freqs = int_array_len(freq_list);
12187 	ch_list = os_malloc(sizeof(u8) * num_freqs);
12188 	if (!ch_list)
12189 		return -1;
12190 
12191 	for (i = 0; i < num_freqs; i++) {
12192 		const int freq = freq_list[i];
12193 
12194 		if (freq == 0)
12195 			break;
12196 		/* Send 2.4 GHz and 5 GHz channels with
12197 		 * QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST to maintain backwards
12198 		 * compatibility.
12199 		 */
12200 		if (!(freq >= 2412 && freq <= 2484) &&
12201 		    !(freq >= 5180 && freq <= 5900) &&
12202 		    !(freq >= 5945 && freq <= 7115))
12203 			continue;
12204 		hw_mode = ieee80211_freq_to_chan(freq, &ch_list[num_channels]);
12205 		if (hw_mode != NUM_HOSTAPD_MODES)
12206 			num_channels++;
12207 	}
12208 
12209 	if (num_channels)
12210 		ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_CH_LIST,
12211 			      num_channels, ch_list);
12212 
12213 	os_free(ch_list);
12214 	return ret;
12215 }
12216 
12217 
add_acs_freq_list(struct nl_msg * msg,const int * freq_list)12218 static int add_acs_freq_list(struct nl_msg *msg, const int *freq_list)
12219 {
12220 	int i, len, ret;
12221 	u32 *freqs;
12222 
12223 	if (!freq_list)
12224 		return 0;
12225 	len = int_array_len(freq_list);
12226 	freqs = os_malloc(sizeof(u32) * len);
12227 	if (!freqs)
12228 		return -1;
12229 	for (i = 0; i < len; i++)
12230 		freqs[i] = freq_list[i];
12231 	ret = nla_put(msg, QCA_WLAN_VENDOR_ATTR_ACS_FREQ_LIST,
12232 		      sizeof(u32) * len, freqs);
12233 	os_free(freqs);
12234 	return ret;
12235 }
12236 
12237 
nl80211_qca_do_acs(struct wpa_driver_nl80211_data * drv,struct drv_acs_params * params)12238 static int nl80211_qca_do_acs(struct wpa_driver_nl80211_data *drv,
12239 			      struct drv_acs_params *params)
12240 {
12241 	struct nl_msg *msg;
12242 	struct nlattr *data;
12243 	int ret;
12244 	int mode;
12245 
12246 	mode = hw_mode_to_qca_acs(params->hw_mode);
12247 	if (mode < 0)
12248 		return -1;
12249 
12250 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12251 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12252 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12253 			QCA_NL80211_VENDOR_SUBCMD_DO_ACS) ||
12254 	    !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12255 	    nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_ACS_HW_MODE, mode) ||
12256 	    (params->ht_enabled &&
12257 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT_ENABLED)) ||
12258 	    (params->ht40_enabled &&
12259 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_HT40_ENABLED)) ||
12260 	    (params->vht_enabled &&
12261 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_VHT_ENABLED)) ||
12262 	    (params->eht_enabled &&
12263 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_EHT_ENABLED)) ||
12264 	    nla_put_u16(msg, QCA_WLAN_VENDOR_ATTR_ACS_CHWIDTH,
12265 			params->ch_width) ||
12266 	    add_acs_ch_list(msg, params->freq_list) ||
12267 	    add_acs_freq_list(msg, params->freq_list) ||
12268 	    (params->edmg_enabled &&
12269 	     nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_ACS_EDMG_ENABLED))) {
12270 		nlmsg_free(msg);
12271 		return -ENOBUFS;
12272 	}
12273 	nla_nest_end(msg, data);
12274 
12275 	wpa_printf(MSG_DEBUG,
12276 		   "nl80211: ACS Params: HW_MODE: %d HT: %d HT40: %d VHT: %d EHT: %d BW: %d EDMG: %d",
12277 		   params->hw_mode, params->ht_enabled, params->ht40_enabled,
12278 		   params->vht_enabled, params->eht_enabled, params->ch_width,
12279 		   params->edmg_enabled);
12280 
12281 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12282 	if (ret) {
12283 		wpa_printf(MSG_DEBUG,
12284 			   "nl80211: Failed to invoke driver ACS function: %s",
12285 			   strerror(-ret));
12286 	}
12287 	return ret;
12288 }
12289 
12290 
nl80211_set_band(void * priv,u32 band_mask)12291 static int nl80211_set_band(void *priv, u32 band_mask)
12292 {
12293 	struct i802_bss *bss = priv;
12294 	struct wpa_driver_nl80211_data *drv = bss->drv;
12295 	struct nl_msg *msg;
12296 	struct nlattr *data;
12297 	int ret;
12298 	enum qca_set_band qca_band_value;
12299 	u32 qca_band_mask = QCA_SETBAND_AUTO;
12300 
12301 	if (!drv->setband_vendor_cmd_avail ||
12302 	    (band_mask > (WPA_SETBAND_2G | WPA_SETBAND_5G | WPA_SETBAND_6G)))
12303 		return -1;
12304 
12305 	if (band_mask & WPA_SETBAND_5G)
12306 		qca_band_mask |= QCA_SETBAND_5G;
12307 	if (band_mask & WPA_SETBAND_2G)
12308 		qca_band_mask |= QCA_SETBAND_2G;
12309 	if (band_mask & WPA_SETBAND_6G)
12310 		qca_band_mask |= QCA_SETBAND_6G;
12311 
12312 	/*
12313 	 * QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE is a legacy interface hence make
12314 	 * it suite to its values (AUTO/5G/2G) for backwards compatibility.
12315 	 */
12316 	qca_band_value = ((qca_band_mask & QCA_SETBAND_5G) &&
12317 			  (qca_band_mask & QCA_SETBAND_2G)) ?
12318 				QCA_SETBAND_AUTO :
12319 				qca_band_mask & ~QCA_SETBAND_6G;
12320 
12321 	wpa_printf(MSG_DEBUG,
12322 		   "nl80211: QCA_BAND_MASK = 0x%x, QCA_BAND_VALUE = %d",
12323 		   qca_band_mask, qca_band_value);
12324 
12325 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12326 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12327 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12328 			QCA_NL80211_VENDOR_SUBCMD_SETBAND) ||
12329 	    !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12330 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_VALUE,
12331 			qca_band_value) ||
12332 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SETBAND_MASK,
12333 			qca_band_mask)) {
12334 		nlmsg_free(msg);
12335 		return -ENOBUFS;
12336 	}
12337 	nla_nest_end(msg, data);
12338 
12339 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12340 	if (ret) {
12341 		wpa_printf(MSG_DEBUG,
12342 			   "nl80211: Driver setband function failed: %s",
12343 			   strerror(-ret));
12344 	}
12345 	return ret;
12346 }
12347 
12348 
12349 struct nl80211_pcl {
12350 	unsigned int num;
12351 	struct weighted_pcl *freq_list;
12352 };
12353 
get_pcl_attr_values(struct weighted_pcl * wpcl,struct nlattr * nl[])12354 static void get_pcl_attr_values(struct weighted_pcl *wpcl, struct nlattr *nl[])
12355 {
12356 	if (nl[QCA_WLAN_VENDOR_ATTR_PCL_FREQ])
12357 		wpcl->freq = nla_get_u32(nl[QCA_WLAN_VENDOR_ATTR_PCL_FREQ]);
12358 	if (nl[QCA_WLAN_VENDOR_ATTR_PCL_WEIGHT])
12359 		wpcl->weight = nla_get_u8(nl[QCA_WLAN_VENDOR_ATTR_PCL_WEIGHT]);
12360 	if (nl[QCA_WLAN_VENDOR_ATTR_PCL_FLAG]) {
12361 		u32 flags = nla_get_u32(nl[QCA_WLAN_VENDOR_ATTR_PCL_FLAG]);
12362 
12363 		wpcl->flag = 0;
12364 		if (flags & BIT(0))
12365 			wpcl->flag |= WEIGHTED_PCL_GO;
12366 		if (flags & BIT(1))
12367 			wpcl->flag |= WEIGHTED_PCL_CLI;
12368 		if (flags & BIT(2))
12369 			wpcl->flag |= WEIGHTED_PCL_MUST_CONSIDER;
12370 		if (flags & BIT(3))
12371 			wpcl->flag |= WEIGHTED_PCL_EXCLUDE;
12372 	} else {
12373 		wpcl->flag = WEIGHTED_PCL_GO | WEIGHTED_PCL_CLI;
12374 	}
12375 }
12376 
12377 
preferred_freq_info_handler(struct nl_msg * msg,void * arg)12378 static int preferred_freq_info_handler(struct nl_msg *msg, void *arg)
12379 {
12380 	struct nlattr *tb[NL80211_ATTR_MAX + 1];
12381 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
12382 	struct nl80211_pcl *param = arg;
12383 	struct nlattr *nl_vend, *attr;
12384 	enum qca_iface_type iface_type;
12385 	struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
12386 	struct nlattr *nl_pcl[QCA_WLAN_VENDOR_ATTR_PCL_MAX + 1];
12387 	unsigned int num, max_num;
12388 	u32 *freqs;
12389 
12390 	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
12391 		  genlmsg_attrlen(gnlh, 0), NULL);
12392 
12393 	nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
12394 	if (!nl_vend)
12395 		return NL_SKIP;
12396 
12397 	nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
12398 		  nla_data(nl_vend), nla_len(nl_vend), NULL);
12399 
12400 	attr = tb_vendor[
12401 		QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE];
12402 	if (!attr) {
12403 		wpa_printf(MSG_ERROR, "nl80211: iface_type couldn't be found");
12404 		param->num = 0;
12405 		return NL_SKIP;
12406 	}
12407 
12408 	iface_type = (enum qca_iface_type) nla_get_u32(attr);
12409 	wpa_printf(MSG_DEBUG, "nl80211: Driver returned iface_type=%d",
12410 		   iface_type);
12411 
12412 	attr = tb_vendor[
12413 		QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_WEIGHED_PCL];
12414 	if (attr) {
12415 		int rem;
12416 		struct nlattr *wpcl = attr;
12417 		unsigned int i;
12418 
12419 		num = 0;
12420 		nla_for_each_nested(attr, wpcl, rem) {
12421 			if (num == param->num)
12422 				break; /* not enough room for all entries */
12423 			if (nla_parse(nl_pcl, QCA_WLAN_VENDOR_ATTR_PCL_MAX,
12424 				      nla_data(attr), nla_len(attr), NULL)) {
12425 				wpa_printf(MSG_ERROR,
12426 					   "nl80211: Failed to parse PCL info");
12427 				param->num = 0;
12428 				return NL_SKIP;
12429 			}
12430 			get_pcl_attr_values(¶m->freq_list[num], nl_pcl);
12431 			num++;
12432 		}
12433 		param->num = num;
12434 
12435 		/* Sort frequencies based on their weight */
12436 		for (i = 0; i < num; i++) {
12437 			unsigned int j;
12438 
12439 			for (j = i + 1; j < num; j++) {
12440 				if (param->freq_list[i].weight <
12441 				    param->freq_list[j].weight) {
12442 					struct weighted_pcl tmp;
12443 
12444 					tmp = param->freq_list[i];
12445 					param->freq_list[i] =
12446 						param->freq_list[j];
12447 					param->freq_list[j] = tmp;
12448 				}
12449 			}
12450 		}
12451 	} else if (tb_vendor[QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST]) {
12452 		wpa_printf(MSG_DEBUG,
12453 			   "nl80211: Driver does not provide weighted PCL; use the non-weighted variant");
12454 		attr = tb_vendor[QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST];
12455 		/*
12456 		 * param->num has the maximum number of entries for which there
12457 		 * is room in the freq_list provided by the caller.
12458 		 */
12459 		freqs = nla_data(attr);
12460 		max_num = nla_len(attr) / sizeof(u32);
12461 		if (max_num > param->num)
12462 			max_num = param->num;
12463 		for (num = 0; num < max_num; num++) {
12464 			param->freq_list[num].freq = freqs[num];
12465 			param->freq_list[num].flag =
12466 				WEIGHTED_PCL_GO | WEIGHTED_PCL_CLI;
12467 		}
12468 		param->num = num;
12469 	} else {
12470 		wpa_printf(MSG_ERROR,
12471 			   "nl80211: preferred_freq_list couldn't be found");
12472 		param->num = 0;
12473 		return NL_SKIP;
12474 	}
12475 	return NL_SKIP;
12476 }
12477 
12478 
nl80211_get_pref_freq_list(void * priv,enum wpa_driver_if_type if_type,unsigned int * num,struct weighted_pcl * freq_list)12479 static int nl80211_get_pref_freq_list(void *priv,
12480 				      enum wpa_driver_if_type if_type,
12481 				      unsigned int *num,
12482 				      struct weighted_pcl *freq_list)
12483 {
12484 	struct i802_bss *bss = priv;
12485 	struct wpa_driver_nl80211_data *drv = bss->drv;
12486 	struct nl_msg *msg;
12487 	int ret;
12488 	unsigned int i;
12489 	struct nlattr *params;
12490 	struct nl80211_pcl param;
12491 	enum qca_iface_type iface_type;
12492 
12493 	if (!drv->get_pref_freq_list)
12494 		return -1;
12495 
12496 	switch (if_type) {
12497 	case WPA_IF_STATION:
12498 		iface_type = QCA_IFACE_TYPE_STA;
12499 		break;
12500 	case WPA_IF_AP_BSS:
12501 		iface_type = QCA_IFACE_TYPE_AP;
12502 		break;
12503 	case WPA_IF_P2P_GO:
12504 		iface_type = QCA_IFACE_TYPE_P2P_GO;
12505 		break;
12506 	case WPA_IF_P2P_CLIENT:
12507 		iface_type = QCA_IFACE_TYPE_P2P_CLIENT;
12508 		break;
12509 	case WPA_IF_IBSS:
12510 		iface_type = QCA_IFACE_TYPE_IBSS;
12511 		break;
12512 	case WPA_IF_TDLS:
12513 		iface_type = QCA_IFACE_TYPE_TDLS;
12514 		break;
12515 	default:
12516 		return -1;
12517 	}
12518 
12519 	param.num = *num;
12520 	param.freq_list = freq_list;
12521 
12522 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12523 	    nla_put_u32(msg, NL80211_ATTR_IFINDEX, drv->ifindex) ||
12524 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12525 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12526 			QCA_NL80211_VENDOR_SUBCMD_GET_PREFERRED_FREQ_LIST) ||
12527 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12528 	    nla_put_u32(msg,
12529 			QCA_WLAN_VENDOR_ATTR_GET_PREFERRED_FREQ_LIST_IFACE_TYPE,
12530 			iface_type)) {
12531 		wpa_printf(MSG_ERROR,
12532 			   "%s: err in adding vendor_cmd and vendor_data",
12533 			   __func__);
12534 		nlmsg_free(msg);
12535 		return -1;
12536 	}
12537 	nla_nest_end(msg, params);
12538 
12539 	if (freq_list)
12540 		os_memset(freq_list, 0, *num * sizeof(struct weighted_pcl));
12541 	ret = send_and_recv_msgs(drv, msg, preferred_freq_info_handler, ¶m,
12542 				 NULL, NULL);
12543 	if (ret) {
12544 		wpa_printf(MSG_ERROR,
12545 			   "%s: err in send_and_recv_msgs", __func__);
12546 		return ret;
12547 	}
12548 
12549 	*num = param.num;
12550 
12551 	for (i = 0; i < *num; i++) {
12552 		wpa_printf(MSG_DEBUG,
12553 			   "nl80211: preferred_channel_list[%d]=%d[%d]:0x%x",
12554 			   i, freq_list[i].freq, freq_list[i].weight,
12555 			   freq_list[i].flag);
12556 	}
12557 
12558 	return 0;
12559 }
12560 
12561 
nl80211_set_prob_oper_freq(void * priv,unsigned int freq)12562 static int nl80211_set_prob_oper_freq(void *priv, unsigned int freq)
12563 {
12564 	struct i802_bss *bss = priv;
12565 	struct wpa_driver_nl80211_data *drv = bss->drv;
12566 	struct nl_msg *msg;
12567 	int ret;
12568 	struct nlattr *params;
12569 
12570 	if (!drv->set_prob_oper_freq)
12571 		return -1;
12572 
12573 	wpa_printf(MSG_DEBUG,
12574 		   "nl80211: Set P2P probable operating freq %u for ifindex %d",
12575 		   freq, bss->ifindex);
12576 
12577 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12578 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12579 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12580 			QCA_NL80211_VENDOR_SUBCMD_SET_PROBABLE_OPER_CHANNEL) ||
12581 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
12582 	    nla_put_u32(msg,
12583 			QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_IFACE_TYPE,
12584 			QCA_IFACE_TYPE_P2P_CLIENT) ||
12585 	    nla_put_u32(msg,
12586 			QCA_WLAN_VENDOR_ATTR_PROBABLE_OPER_CHANNEL_FREQ,
12587 			freq)) {
12588 		wpa_printf(MSG_ERROR,
12589 			   "%s: err in adding vendor_cmd and vendor_data",
12590 			   __func__);
12591 		nlmsg_free(msg);
12592 		return -1;
12593 	}
12594 	nla_nest_end(msg, params);
12595 
12596 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12597 	msg = NULL;
12598 	if (ret) {
12599 		wpa_printf(MSG_ERROR, "%s: err in send_and_recv_msgs",
12600 			   __func__);
12601 		return ret;
12602 	}
12603 	nlmsg_free(msg);
12604 	return 0;
12605 }
12606 
12607 
nl80211_p2p_lo_start(void * priv,unsigned int freq,unsigned int period,unsigned int interval,unsigned int count,const u8 * device_types,size_t dev_types_len,const u8 * ies,size_t ies_len)12608 static int nl80211_p2p_lo_start(void *priv, unsigned int freq,
12609 				unsigned int period, unsigned int interval,
12610 				unsigned int count, const u8 *device_types,
12611 				size_t dev_types_len,
12612 				const u8 *ies, size_t ies_len)
12613 {
12614 	struct i802_bss *bss = priv;
12615 	struct wpa_driver_nl80211_data *drv = bss->drv;
12616 	struct nl_msg *msg;
12617 	struct nlattr *container;
12618 	int ret;
12619 
12620 	wpa_printf(MSG_DEBUG,
12621 		   "nl80211: Start P2P Listen offload: freq=%u, period=%u, interval=%u, count=%u",
12622 		   freq, period, interval, count);
12623 
12624 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD))
12625 		return -1;
12626 
12627 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12628 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12629 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12630 			QCA_NL80211_VENDOR_SUBCMD_P2P_LISTEN_OFFLOAD_START))
12631 		goto fail;
12632 
12633 	container = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12634 	if (!container)
12635 		goto fail;
12636 
12637 	if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_CHANNEL,
12638 			freq) ||
12639 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_PERIOD,
12640 			period) ||
12641 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_INTERVAL,
12642 			interval) ||
12643 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_COUNT,
12644 			count) ||
12645 	    nla_put(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_DEVICE_TYPES,
12646 		    dev_types_len, device_types) ||
12647 	    nla_put(msg, QCA_WLAN_VENDOR_ATTR_P2P_LISTEN_OFFLOAD_VENDOR_IE,
12648 		    ies_len, ies))
12649 		goto fail;
12650 
12651 	nla_nest_end(msg, container);
12652 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12653 	msg = NULL;
12654 	if (ret) {
12655 		wpa_printf(MSG_DEBUG,
12656 			   "nl80211: Failed to send P2P Listen offload vendor command");
12657 		goto fail;
12658 	}
12659 
12660 	return 0;
12661 
12662 fail:
12663 	nlmsg_free(msg);
12664 	return -1;
12665 }
12666 
12667 
nl80211_p2p_lo_stop(void * priv)12668 static int nl80211_p2p_lo_stop(void *priv)
12669 {
12670 	struct i802_bss *bss = priv;
12671 	struct wpa_driver_nl80211_data *drv = bss->drv;
12672 	struct nl_msg *msg;
12673 
12674 	wpa_printf(MSG_DEBUG, "nl80211: Stop P2P Listen offload");
12675 
12676 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_P2P_LISTEN_OFFLOAD))
12677 		return -1;
12678 
12679 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12680 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12681 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12682 			QCA_NL80211_VENDOR_SUBCMD_P2P_LISTEN_OFFLOAD_STOP)) {
12683 		nlmsg_free(msg);
12684 		return -1;
12685 	}
12686 
12687 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12688 }
12689 
12690 
nl80211_set_tdls_mode(void * priv,int tdls_external_control)12691 static int nl80211_set_tdls_mode(void *priv, int tdls_external_control)
12692 {
12693 	struct i802_bss *bss = priv;
12694 	struct wpa_driver_nl80211_data *drv = bss->drv;
12695 	struct nl_msg *msg;
12696 	struct nlattr *params;
12697 	int ret;
12698 	u32 tdls_mode;
12699 
12700 	wpa_printf(MSG_DEBUG,
12701 		   "nl80211: Set TDKS mode: tdls_external_control=%d",
12702 		   tdls_external_control);
12703 
12704 	if (tdls_external_control == 1)
12705 		tdls_mode = QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_IMPLICIT |
12706 			QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_EXTERNAL;
12707 	else
12708 		tdls_mode = QCA_WLAN_VENDOR_TDLS_TRIGGER_MODE_EXPLICIT;
12709 
12710 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12711 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12712 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12713 			QCA_NL80211_VENDOR_SUBCMD_CONFIGURE_TDLS))
12714 		goto fail;
12715 
12716 	params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12717 	if (!params)
12718 		goto fail;
12719 
12720 	if (nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_TDLS_CONFIG_TRIGGER_MODE,
12721 			tdls_mode))
12722 		goto fail;
12723 
12724 	nla_nest_end(msg, params);
12725 
12726 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12727 	msg = NULL;
12728 	if (ret) {
12729 		wpa_printf(MSG_ERROR,
12730 			   "nl80211: Set TDLS mode failed: ret=%d (%s)",
12731 			   ret, strerror(-ret));
12732 		goto fail;
12733 	}
12734 	return 0;
12735 fail:
12736 	nlmsg_free(msg);
12737 	return -1;
12738 }
12739 
12740 
12741 #ifdef CONFIG_MBO
12742 
12743 static enum mbo_transition_reject_reason
nl80211_mbo_reject_reason_mapping(enum qca_wlan_btm_candidate_status status)12744 nl80211_mbo_reject_reason_mapping(enum qca_wlan_btm_candidate_status status)
12745 {
12746 	switch (status) {
12747 	case QCA_STATUS_REJECT_EXCESSIVE_FRAME_LOSS_EXPECTED:
12748 		return MBO_TRANSITION_REJECT_REASON_FRAME_LOSS;
12749 	case QCA_STATUS_REJECT_EXCESSIVE_DELAY_EXPECTED:
12750 		return MBO_TRANSITION_REJECT_REASON_DELAY;
12751 	case QCA_STATUS_REJECT_INSUFFICIENT_QOS_CAPACITY:
12752 		return MBO_TRANSITION_REJECT_REASON_QOS_CAPACITY;
12753 	case QCA_STATUS_REJECT_LOW_RSSI:
12754 		return MBO_TRANSITION_REJECT_REASON_RSSI;
12755 	case QCA_STATUS_REJECT_HIGH_INTERFERENCE:
12756 		return MBO_TRANSITION_REJECT_REASON_INTERFERENCE;
12757 	case QCA_STATUS_REJECT_UNKNOWN:
12758 	default:
12759 		return MBO_TRANSITION_REJECT_REASON_UNSPECIFIED;
12760 	}
12761 }
12762 
12763 
nl80211_parse_btm_candidate_info(struct candidate_list * candidate,struct nlattr * tb[],int num)12764 static void nl80211_parse_btm_candidate_info(struct candidate_list *candidate,
12765 					     struct nlattr *tb[], int num)
12766 {
12767 	enum qca_wlan_btm_candidate_status status;
12768 	char buf[50];
12769 
12770 	os_memcpy(candidate->bssid,
12771 		  nla_data(tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID]),
12772 		  ETH_ALEN);
12773 
12774 	status = nla_get_u32(
12775 		tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS]);
12776 	candidate->is_accept = status == QCA_STATUS_ACCEPT;
12777 	candidate->reject_reason = nl80211_mbo_reject_reason_mapping(status);
12778 
12779 	if (candidate->is_accept)
12780 		os_snprintf(buf, sizeof(buf), "Accepted");
12781 	else
12782 		os_snprintf(buf, sizeof(buf),
12783 			    "Rejected, Reject_reason: %d",
12784 			    candidate->reject_reason);
12785 	wpa_printf(MSG_DEBUG, "nl80211:   BSSID[%d]: " MACSTR " %s",
12786 		   num, MAC2STR(candidate->bssid), buf);
12787 }
12788 
12789 
12790 static int
nl80211_get_bss_transition_status_handler(struct nl_msg * msg,void * arg)12791 nl80211_get_bss_transition_status_handler(struct nl_msg *msg, void *arg)
12792 {
12793 	struct wpa_bss_candidate_info *info = arg;
12794 	struct candidate_list *candidate = info->candidates;
12795 	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
12796 	struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
12797 	struct nlattr *tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX + 1];
12798 	static struct nla_policy policy[
12799 		QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX + 1] = {
12800 		[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID] = {
12801 			.minlen = ETH_ALEN
12802 		},
12803 		[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS] = {
12804 			.type = NLA_U32,
12805 		},
12806 	};
12807 	struct nlattr *attr;
12808 	int rem;
12809 	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
12810 	u8 num;
12811 
12812 	num = info->num; /* number of candidates sent to driver */
12813 	info->num = 0;
12814 	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
12815 		  genlmsg_attrlen(gnlh, 0), NULL);
12816 
12817 	if (!tb_msg[NL80211_ATTR_VENDOR_DATA] ||
12818 	    nla_parse_nested(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
12819 			     tb_msg[NL80211_ATTR_VENDOR_DATA], NULL) ||
12820 	    !tb_vendor[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO])
12821 		return NL_SKIP;
12822 
12823 	wpa_printf(MSG_DEBUG,
12824 		   "nl80211: WNM Candidate list received from driver");
12825 	nla_for_each_nested(attr,
12826 			    tb_vendor[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO],
12827 			    rem) {
12828 		if (info->num >= num ||
12829 		    nla_parse_nested(
12830 			    tb, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_MAX,
12831 			    attr, policy) ||
12832 		    !tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID] ||
12833 		    !tb[QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_STATUS])
12834 			break;
12835 
12836 		nl80211_parse_btm_candidate_info(candidate, tb, info->num);
12837 
12838 		candidate++;
12839 		info->num++;
12840 	}
12841 
12842 	return NL_SKIP;
12843 }
12844 
12845 
12846 static struct wpa_bss_candidate_info *
nl80211_get_bss_transition_status(void * priv,struct wpa_bss_trans_info * params)12847 nl80211_get_bss_transition_status(void *priv, struct wpa_bss_trans_info *params)
12848 {
12849 	struct i802_bss *bss = priv;
12850 	struct wpa_driver_nl80211_data *drv = bss->drv;
12851 	struct nl_msg *msg;
12852 	struct nlattr *attr, *attr1, *attr2;
12853 	struct wpa_bss_candidate_info *info;
12854 	u8 i;
12855 	int ret;
12856 	u8 *pos;
12857 
12858 	if (!drv->fetch_bss_trans_status)
12859 		return NULL;
12860 
12861 	info = os_zalloc(sizeof(*info));
12862 	if (!info)
12863 		return NULL;
12864 	/* Allocate memory for number of candidates sent to driver */
12865 	info->candidates = os_calloc(params->n_candidates,
12866 				     sizeof(*info->candidates));
12867 	if (!info->candidates) {
12868 		os_free(info);
12869 		return NULL;
12870 	}
12871 
12872 	/* Copy the number of candidates being sent to driver. This is used in
12873 	 * nl80211_get_bss_transition_status_handler() to limit the number of
12874 	 * candidates that can be populated in info->candidates and will be
12875 	 * later overwritten with the actual number of candidates received from
12876 	 * the driver.
12877 	 */
12878 	info->num = params->n_candidates;
12879 
12880 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12881 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12882 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12883 			QCA_NL80211_VENDOR_SUBCMD_FETCH_BSS_TRANSITION_STATUS))
12884 		goto fail;
12885 
12886 	attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12887 	if (!attr)
12888 		goto fail;
12889 
12890 	if (nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_BTM_MBO_TRANSITION_REASON,
12891 		       params->mbo_transition_reason))
12892 		goto fail;
12893 
12894 	attr1 = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO);
12895 	if (!attr1)
12896 		goto fail;
12897 
12898 	wpa_printf(MSG_DEBUG,
12899 		   "nl80211: WNM Candidate list info sending to driver: mbo_transition_reason: %d n_candidates: %d",
12900 		   params->mbo_transition_reason, params->n_candidates);
12901 	pos = params->bssid;
12902 	for (i = 0; i < params->n_candidates; i++) {
12903 		wpa_printf(MSG_DEBUG, "nl80211:   BSSID[%d]: " MACSTR, i,
12904 			   MAC2STR(pos));
12905 		attr2 = nla_nest_start(msg, i);
12906 		if (!attr2 ||
12907 		    nla_put(msg, QCA_WLAN_VENDOR_ATTR_BTM_CANDIDATE_INFO_BSSID,
12908 			    ETH_ALEN, pos))
12909 			goto fail;
12910 		pos += ETH_ALEN;
12911 		nla_nest_end(msg, attr2);
12912 	}
12913 
12914 	nla_nest_end(msg, attr1);
12915 	nla_nest_end(msg, attr);
12916 
12917 	ret = send_and_recv_msgs(drv, msg,
12918 				 nl80211_get_bss_transition_status_handler,
12919 				 info, NULL, NULL);
12920 	msg = NULL;
12921 	if (ret) {
12922 		wpa_printf(MSG_ERROR,
12923 			   "nl80211: WNM Get BSS transition status failed: ret=%d (%s)",
12924 			   ret, strerror(-ret));
12925 		goto fail;
12926 	}
12927 	return info;
12928 
12929 fail:
12930 	nlmsg_free(msg);
12931 	os_free(info->candidates);
12932 	os_free(info);
12933 	return NULL;
12934 }
12935 
12936 
12937 /**
12938  * nl80211_ignore_assoc_disallow - Configure driver to ignore assoc_disallow
12939  * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
12940  * @ignore_assoc_disallow: 0 to not ignore, 1 to ignore
12941  * Returns: 0 on success, -1 on failure
12942  */
nl80211_ignore_assoc_disallow(void * priv,int ignore_disallow)12943 static int nl80211_ignore_assoc_disallow(void *priv, int ignore_disallow)
12944 {
12945 	struct i802_bss *bss = priv;
12946 	struct wpa_driver_nl80211_data *drv = bss->drv;
12947 	struct nl_msg *msg;
12948 	struct nlattr *attr;
12949 	int ret = -1;
12950 
12951 	if (!drv->set_wifi_conf_vendor_cmd_avail)
12952 		return -1;
12953 
12954 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
12955 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
12956 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
12957 			QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION))
12958 		goto fail;
12959 
12960 	attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
12961 	if (!attr)
12962 		goto fail;
12963 
12964 	wpa_printf(MSG_DEBUG, "nl80211: Set ignore_assoc_disallow %d",
12965 		   ignore_disallow);
12966 	if (nla_put_u8(msg, QCA_WLAN_VENDOR_ATTR_CONFIG_IGNORE_ASSOC_DISALLOWED,
12967 		       ignore_disallow))
12968 		goto fail;
12969 
12970 	nla_nest_end(msg, attr);
12971 
12972 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
12973 	msg = NULL;
12974 	if (ret) {
12975 		wpa_printf(MSG_ERROR,
12976 			   "nl80211: Set ignore_assoc_disallow failed: ret=%d (%s)",
12977 			   ret, strerror(-ret));
12978 		goto fail;
12979 	}
12980 
12981 fail:
12982 	nlmsg_free(msg);
12983 	return ret;
12984 }
12985 
12986 #endif /* CONFIG_MBO */
12987 
12988 
12989 #ifdef CONFIG_PASN
12990 
nl80211_send_pasn_resp(void * priv,struct pasn_auth * params)12991 static int nl80211_send_pasn_resp(void *priv, struct pasn_auth *params)
12992 {
12993 	unsigned int i;
12994 	struct i802_bss *bss = priv;
12995 	struct nl_msg *msg = NULL;
12996 	struct nlattr *nlpeers, *attr, *attr1;
12997 	struct wpa_driver_nl80211_data *drv = bss->drv;
12998 
12999 	wpa_dbg(drv->ctx, MSG_DEBUG,
13000 		"nl80211: PASN authentication response for %d entries",
13001 		params->num_peers);
13002 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
13003 	if (!msg ||
13004 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
13005 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
13006 			QCA_NL80211_VENDOR_SUBCMD_PASN))
13007 		goto fail;
13008 
13009 	attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
13010 	if (!attr)
13011 		goto fail;
13012 
13013 	nlpeers = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEERS);
13014 	if (!nlpeers)
13015 		goto fail;
13016 
13017 	for (i = 0; i < params->num_peers; i++) {
13018 		attr1 = nla_nest_start(msg, i);
13019 		if (!attr1 ||
13020 		    nla_put(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_SRC_ADDR,
13021 			    ETH_ALEN, params->peer[i].own_addr) ||
13022 		    nla_put(msg, QCA_WLAN_VENDOR_ATTR_PASN_PEER_MAC_ADDR,
13023 			    ETH_ALEN, params->peer[i].peer_addr))
13024 			goto fail;
13025 
13026 		if (params->peer[i].status == 0 &&
13027 		    nla_put_flag(msg,
13028 				 QCA_WLAN_VENDOR_ATTR_PASN_PEER_STATUS_SUCCESS))
13029 			goto fail;
13030 
13031 		wpa_printf(MSG_DEBUG,
13032 			   "nl80211: Own address[%u]: " MACSTR
13033 			   " Peer address[%u]: " MACSTR " Status: %s",
13034 			   i, MAC2STR(params->peer[i].own_addr), i,
13035 			   MAC2STR(params->peer[i].peer_addr),
13036 			   params->peer[i].status ? "Fail" : "Success");
13037 		nla_nest_end(msg, attr1);
13038 	}
13039 
13040 	nla_nest_end(msg, nlpeers);
13041 	nla_nest_end(msg, attr);
13042 
13043 	return send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13044 
13045 fail:
13046 	nlmsg_free(msg);
13047 	return -1;
13048 }
13049 
13050 
wpa_ltf_keyseed_len_to_sha_type(size_t len)13051 static u32 wpa_ltf_keyseed_len_to_sha_type(size_t len)
13052 {
13053 	if (len == SHA384_MAC_LEN)
13054 		return QCA_WLAN_VENDOR_SHA_384;
13055 	if (len == SHA256_MAC_LEN)
13056 		return QCA_WLAN_VENDOR_SHA_256;
13057 
13058 	wpa_printf(MSG_ERROR, "nl80211: Unexpected LTF keyseed len %zu", len);
13059 	return (u32) -1;
13060 }
13061 
13062 
nl80211_set_secure_ranging_ctx(void * priv,struct secure_ranging_params * params)13063 static int nl80211_set_secure_ranging_ctx(void *priv,
13064 					  struct secure_ranging_params *params)
13065 {
13066 	int ret;
13067 	u32 suite;
13068 	struct nlattr *attr;
13069 	struct nl_msg *msg = NULL;
13070 	struct i802_bss *bss = priv;
13071 	struct wpa_driver_nl80211_data *drv = bss->drv;
13072 
13073 	/* Configure secure ranging context only to the drivers that support it.
13074 	 */
13075 	if (!drv->secure_ranging_ctx_vendor_cmd_avail)
13076 		return 0;
13077 
13078 	if (!params->peer_addr || !params->own_addr)
13079 		return -1;
13080 
13081 	wpa_dbg(drv->ctx, MSG_DEBUG,
13082 		"nl80211: Secure ranging context for " MACSTR,
13083 		MAC2STR(params->peer_addr));
13084 
13085 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR);
13086 	if (!msg ||
13087 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
13088 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
13089 			QCA_NL80211_VENDOR_SUBCMD_SECURE_RANGING_CONTEXT))
13090 		goto fail;
13091 
13092 	attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
13093 	if (!attr)
13094 		goto fail;
13095 
13096 	if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_PEER_MAC_ADDR,
13097 		    ETH_ALEN, params->peer_addr) ||
13098 	    nla_put(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_SRC_ADDR,
13099 		    ETH_ALEN, params->own_addr) ||
13100 	    nla_put_u32(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_ACTION,
13101 			params->action))
13102 		goto fail;
13103 
13104 	if (params->cipher) {
13105 		suite = wpa_cipher_to_cipher_suite(params->cipher);
13106 		if (!suite ||
13107 		    nla_put_u32(msg,
13108 				QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_CIPHER,
13109 				suite))
13110 			goto fail;
13111 	}
13112 
13113 	if (params->tk_len && params->tk) {
13114 		if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_TK,
13115 			    params->tk_len, params->tk))
13116 			goto fail;
13117 		wpa_hexdump_key(MSG_DEBUG, "nl80211: TK",
13118 				params->tk, params->tk_len);
13119 	}
13120 
13121 	if (params->ltf_keyseed_len && params->ltf_keyseed) {
13122 		u32 sha_type = wpa_ltf_keyseed_len_to_sha_type(
13123 			params->ltf_keyseed_len);
13124 
13125 		if (sha_type == (u32) -1 ||
13126 		    nla_put_u32(
13127 			    msg,
13128 			    QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_SHA_TYPE,
13129 			    sha_type) ||
13130 		    nla_put(msg,
13131 			    QCA_WLAN_VENDOR_ATTR_SECURE_RANGING_CTX_LTF_KEYSEED,
13132 			    params->ltf_keyseed_len, params->ltf_keyseed))
13133 			goto fail;
13134 		wpa_hexdump_key(MSG_DEBUG, "nl80211: LTF keyseed",
13135 				params->ltf_keyseed, params->ltf_keyseed_len);
13136 	}
13137 	nla_nest_end(msg, attr);
13138 
13139 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13140 	if (ret)
13141 		wpa_printf(MSG_DEBUG,
13142 			   "nl80211: Set secure ranging context failed: ret=%d (%s)",
13143 			   ret, strerror(-ret));
13144 	return ret;
13145 fail:
13146 	nlmsg_free(msg);
13147 	return -1;
13148 }
13149 
13150 #endif /* CONFIG_PASN */
13151 
13152 #endif /* CONFIG_DRIVER_NL80211_QCA */
13153 
nl80211_do_acs(void * priv,struct drv_acs_params * params)13154 static int nl80211_do_acs(void *priv, struct drv_acs_params *params)
13155 {
13156 #if defined(CONFIG_DRIVER_NL80211_QCA) || defined(CONFIG_DRIVER_NL80211_BRCM) \
13157 	|| defined(CONFIG_DRIVER_NL80211_SYNA)
13158 	struct i802_bss *bss = priv;
13159 	struct wpa_driver_nl80211_data *drv = bss->drv;
13160 #endif /* CONFIG_DRIVER_NL80211_QCA || CONFIG_DRIVER_NL80211_BRCM \
13161 	  || defined(CONFIG_DRIVER_NL80211_SYNA) */
13162 
13163 #ifdef CONFIG_DRIVER_NL80211_QCA
13164 	if (drv->qca_do_acs)
13165 		return nl80211_qca_do_acs(drv, params);
13166 #endif /* CONFIG_DRIVER_NL80211_QCA */
13167 
13168 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
13169 	if (drv->brcm_do_acs)
13170 		return wpa_driver_do_broadcom_acs(drv, params);
13171 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
13172 
13173 	return -1;
13174 }
13175 
13176 
nl80211_write_to_file(const char * name,unsigned int val)13177 static int nl80211_write_to_file(const char *name, unsigned int val)
13178 {
13179 	int fd, len;
13180 	char tmp[128];
13181 	int ret = 0;
13182 
13183 	fd = open(name, O_RDWR);
13184 	if (fd < 0) {
13185 		int level;
13186 		/*
13187 		 * Flags may not exist on older kernels, or while we're tearing
13188 		 * down a disappearing device.
13189 		 */
13190 		if (errno == ENOENT) {
13191 			ret = 0;
13192 			level = MSG_DEBUG;
13193 		} else {
13194 			ret = -1;
13195 			level = MSG_ERROR;
13196 		}
13197 		wpa_printf(level, "nl80211: Failed to open %s: %s",
13198 			   name, strerror(errno));
13199 		return ret;
13200 	}
13201 
13202 	len = os_snprintf(tmp, sizeof(tmp), "%u\n", val);
13203 	len = write(fd, tmp, len);
13204 	if (len < 0) {
13205 		ret = -1;
13206 		wpa_printf(MSG_ERROR, "nl80211: Failed to write to %s: %s",
13207 			   name, strerror(errno));
13208 	}
13209 	close(fd);
13210 
13211 	return ret;
13212 }
13213 
13214 
nl80211_configure_data_frame_filters(void * priv,u32 filter_flags)13215 static int nl80211_configure_data_frame_filters(void *priv, u32 filter_flags)
13216 {
13217 	struct i802_bss *bss = priv;
13218 	char path[128];
13219 	int ret;
13220 
13221 	/* P2P-Device has no netdev that can (or should) be configured here */
13222 	if (nl80211_get_ifmode(bss) == NL80211_IFTYPE_P2P_DEVICE)
13223 		return 0;
13224 
13225 	wpa_printf(MSG_DEBUG, "nl80211: Data frame filter flags=0x%x",
13226 		   filter_flags);
13227 
13228 	/* Configure filtering of unicast frame encrypted using GTK */
13229 	ret = os_snprintf(path, sizeof(path),
13230 			  "/proc/sys/net/ipv4/conf/%s/drop_unicast_in_l2_multicast",
13231 			  bss->ifname);
13232 	if (os_snprintf_error(sizeof(path), ret))
13233 		return -1;
13234 
13235 	ret = nl80211_write_to_file(path,
13236 				    !!(filter_flags &
13237 				       WPA_DATA_FRAME_FILTER_FLAG_GTK));
13238 	if (ret) {
13239 		wpa_printf(MSG_ERROR,
13240 			   "nl80211: Failed to set IPv4 unicast in multicast filter");
13241 		return ret;
13242 	}
13243 
13244 	os_snprintf(path, sizeof(path),
13245 		    "/proc/sys/net/ipv6/conf/%s/drop_unicast_in_l2_multicast",
13246 		    bss->ifname);
13247 	ret = nl80211_write_to_file(path,
13248 				    !!(filter_flags &
13249 				       WPA_DATA_FRAME_FILTER_FLAG_GTK));
13250 
13251 	if (ret) {
13252 		wpa_printf(MSG_ERROR,
13253 			   "nl80211: Failed to set IPv6 unicast in multicast filter");
13254 		return ret;
13255 	}
13256 
13257 	/* Configure filtering of unicast frame encrypted using GTK */
13258 	os_snprintf(path, sizeof(path),
13259 		    "/proc/sys/net/ipv4/conf/%s/drop_gratuitous_arp",
13260 		    bss->ifname);
13261 	ret = nl80211_write_to_file(path,
13262 				    !!(filter_flags &
13263 				       WPA_DATA_FRAME_FILTER_FLAG_ARP));
13264 	if (ret) {
13265 		wpa_printf(MSG_ERROR,
13266 			   "nl80211: Failed set gratuitous ARP filter");
13267 		return ret;
13268 	}
13269 
13270 	/* Configure filtering of IPv6 NA frames */
13271 	os_snprintf(path, sizeof(path),
13272 		    "/proc/sys/net/ipv6/conf/%s/drop_unsolicited_na",
13273 		    bss->ifname);
13274 	ret = nl80211_write_to_file(path,
13275 				    !!(filter_flags &
13276 				       WPA_DATA_FRAME_FILTER_FLAG_NA));
13277 	if (ret) {
13278 		wpa_printf(MSG_ERROR,
13279 			   "nl80211: Failed to set unsolicited NA filter");
13280 		return ret;
13281 	}
13282 
13283 	return 0;
13284 }
13285 
13286 
nl80211_get_ext_capab(void * priv,enum wpa_driver_if_type type,const u8 ** ext_capa,const u8 ** ext_capa_mask,unsigned int * ext_capa_len)13287 static int nl80211_get_ext_capab(void *priv, enum wpa_driver_if_type type,
13288 				 const u8 **ext_capa, const u8 **ext_capa_mask,
13289 				 unsigned int *ext_capa_len)
13290 {
13291 	struct i802_bss *bss = priv;
13292 	struct wpa_driver_nl80211_data *drv = bss->drv;
13293 	enum nl80211_iftype nlmode;
13294 	unsigned int i;
13295 
13296 	if (!ext_capa || !ext_capa_mask || !ext_capa_len)
13297 		return -1;
13298 
13299 	nlmode = wpa_driver_nl80211_if_type(type);
13300 
13301 	/* By default, use the per-radio values */
13302 	*ext_capa = drv->extended_capa;
13303 	*ext_capa_mask = drv->extended_capa_mask;
13304 	*ext_capa_len = drv->extended_capa_len;
13305 
13306 	/* Replace the default value if a per-interface type value exists */
13307 	for (i = 0; i < drv->num_iface_ext_capa; i++) {
13308 		if (nlmode == drv->iface_ext_capa[i].iftype) {
13309 			*ext_capa = drv->iface_ext_capa[i].ext_capa;
13310 			*ext_capa_mask = drv->iface_ext_capa[i].ext_capa_mask;
13311 			*ext_capa_len = drv->iface_ext_capa[i].ext_capa_len;
13312 			break;
13313 		}
13314 	}
13315 
13316 	return 0;
13317 }
13318 
13319 
nl80211_update_connection_params(void * priv,struct wpa_driver_associate_params * params,enum wpa_drv_update_connect_params_mask mask)13320 static int nl80211_update_connection_params(
13321 	void *priv, struct wpa_driver_associate_params *params,
13322 	enum wpa_drv_update_connect_params_mask mask)
13323 {
13324 	struct i802_bss *bss = priv;
13325 	struct wpa_driver_nl80211_data *drv = bss->drv;
13326 	struct nl_msg *msg;
13327 	int ret = -1;
13328 	enum nl80211_auth_type type;
13329 
13330 	/* Update Connection Params is intended for drivers that implement
13331 	 * internal SME and expect these updated connection params from
13332 	 * wpa_supplicant. Do not send this request for the drivers using
13333 	 * SME from wpa_supplicant.
13334 	 */
13335 	if (drv->capa.flags & WPA_DRIVER_FLAGS_SME)
13336 		return 0;
13337 
13338 	/* Handle any connection param update here which might receive kernel handling in future */
13339 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
13340 	if (mask & WPA_DRV_UPDATE_TD_POLICY) {
13341 		ret = nl80211_set_td_policy(priv, params->td_policy);
13342 		if (ret) {
13343 			wpa_dbg(drv->ctx, MSG_DEBUG,
13344 				"nl80211: Update connect params command failed: ret=%d (%s)",
13345 				ret, strerror(-ret));
13346 		}
13347 		return ret;
13348 	}
13349 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
13350 
13351 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_UPDATE_CONNECT_PARAMS);
13352 	if (!msg)
13353 		goto fail;
13354 
13355 	wpa_printf(MSG_DEBUG, "nl80211: Update connection params (ifindex=%d)",
13356 		   drv->ifindex);
13357 
13358 	if ((mask & WPA_DRV_UPDATE_ASSOC_IES) && params->wpa_ie) {
13359 		if (nla_put(msg, NL80211_ATTR_IE, params->wpa_ie_len,
13360 			    params->wpa_ie))
13361 			goto fail;
13362 		wpa_hexdump(MSG_DEBUG, "  * IEs", params->wpa_ie,
13363 			    params->wpa_ie_len);
13364 	}
13365 
13366 	if (mask & WPA_DRV_UPDATE_AUTH_TYPE) {
13367 		type = get_nl_auth_type(params->auth_alg);
13368 		if (type == NL80211_AUTHTYPE_MAX ||
13369 		    nla_put_u32(msg, NL80211_ATTR_AUTH_TYPE, type))
13370 			goto fail;
13371 		wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
13372 	}
13373 
13374 	if ((mask & WPA_DRV_UPDATE_FILS_ERP_INFO) &&
13375 	    nl80211_put_fils_connect_params(drv, params, msg))
13376 		goto fail;
13377 
13378 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13379 	msg = NULL;
13380 	if (ret)
13381 		wpa_dbg(drv->ctx, MSG_DEBUG,
13382 			"nl80211: Update connect params command failed: ret=%d (%s)",
13383 			ret, strerror(-ret));
13384 
13385 fail:
13386 	nlmsg_free(msg);
13387 	return ret;
13388 }
13389 
13390 
nl80211_send_external_auth_status(void * priv,struct external_auth * params)13391 static int nl80211_send_external_auth_status(void *priv,
13392 					     struct external_auth *params)
13393 {
13394 	struct i802_bss *bss = priv;
13395 	struct wpa_driver_nl80211_data *drv = bss->drv;
13396 	struct nl_msg *msg = NULL;
13397 	int ret = -1;
13398 
13399 	/* External auth command/status is intended for drivers that implement
13400 	 * internal SME but want to offload authentication processing (e.g.,
13401 	 * SAE) to hostapd/wpa_supplicant. Do not send the status to drivers
13402 	 * which do not support AP SME or use wpa_supplicant/hostapd SME.
13403 	 */
13404 	if ((is_ap_interface(drv->nlmode) && !bss->drv->device_ap_sme) ||
13405 	    (drv->capa.flags & WPA_DRIVER_FLAGS_SME))
13406 		return -1;
13407 
13408 	wpa_dbg(drv->ctx, MSG_DEBUG,
13409 		"nl80211: External auth status: %u", params->status);
13410 
13411 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_EXTERNAL_AUTH);
13412 	if (!msg ||
13413 	    nla_put_u16(msg, NL80211_ATTR_STATUS_CODE, params->status) ||
13414 	    (params->ssid && params->ssid_len &&
13415 	     nla_put(msg, NL80211_ATTR_SSID, params->ssid_len, params->ssid)) ||
13416 	    (params->pmkid &&
13417 	     nla_put(msg, NL80211_ATTR_PMKID, PMKID_LEN, params->pmkid)) ||
13418 	    (params->bssid &&
13419 	     nla_put(msg, NL80211_ATTR_BSSID, ETH_ALEN, params->bssid)))
13420 		goto fail;
13421 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13422 	msg = NULL;
13423 	if (ret) {
13424 		wpa_printf(MSG_DEBUG,
13425 			   "nl80211: External Auth status update failed: ret=%d (%s)",
13426 			   ret, strerror(-ret));
13427 		goto fail;
13428 	}
13429 fail:
13430 	nlmsg_free(msg);
13431 	return ret;
13432 }
13433 
13434 
nl80211_set_4addr_mode(void * priv,const char * bridge_ifname,int val)13435 static int nl80211_set_4addr_mode(void *priv, const char *bridge_ifname,
13436 				  int val)
13437 {
13438 	struct i802_bss *bss = priv;
13439 	struct wpa_driver_nl80211_data *drv = bss->drv;
13440 	struct nl_msg *msg;
13441 	int ret = -ENOBUFS;
13442 
13443 	wpa_printf(MSG_DEBUG, "nl80211: %s 4addr mode (bridge_ifname: %s)",
13444 		   val ? "Enable" : "Disable", bridge_ifname);
13445 
13446 	msg = nl80211_cmd_msg(drv->first_bss, 0, NL80211_CMD_SET_INTERFACE);
13447 	if (!msg || nla_put_u8(msg, NL80211_ATTR_4ADDR, val))
13448 		goto fail;
13449 
13450 	if (bridge_ifname[0] && bss->added_if_into_bridge && !val) {
13451 		if (linux_br_del_if(drv->global->ioctl_sock,
13452 				    bridge_ifname, bss->ifname)) {
13453 			wpa_printf(MSG_ERROR,
13454 				   "nl80211: Failed to remove interface %s from bridge %s",
13455 				   bss->ifname, bridge_ifname);
13456 			return -1;
13457 		}
13458 		bss->added_if_into_bridge = 0;
13459 	}
13460 
13461 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13462 	msg = NULL;
13463 	if (ret && val && nl80211_get_4addr(bss) == 1) {
13464 		wpa_printf(MSG_DEBUG,
13465 			   "nl80211: 4addr mode was already enabled");
13466 		ret = 0;
13467 	}
13468 	if (!ret) {
13469 		if (bridge_ifname[0] && val &&
13470 		    i802_check_bridge(drv, bss, bridge_ifname, bss->ifname) < 0)
13471 			return -1;
13472 		return 0;
13473 	}
13474 
13475 fail:
13476 	nlmsg_free(msg);
13477 	wpa_printf(MSG_ERROR, "nl80211: Failed to enable/disable 4addr");
13478 
13479 	return ret;
13480 }
13481 
13482 
13483 #ifdef CONFIG_DPP
nl80211_dpp_listen(void * priv,bool enable)13484 static int nl80211_dpp_listen(void *priv, bool enable)
13485 {
13486 	struct i802_bss *bss = priv;
13487 	struct wpa_driver_nl80211_data *drv = bss->drv;
13488 	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
13489 	struct nl_sock *handle;
13490 
13491 	if (!drv->multicast_registrations || !bss->nl_mgmt)
13492 		return 0; /* cannot do more than hope broadcast RX works */
13493 
13494 	wpa_printf(MSG_DEBUG,
13495 		   "nl80211: Update DPP Public Action frame registration (%s multicast RX)",
13496 		   enable ? "enable" : "disable");
13497 	handle = (void *) (((intptr_t) bss->nl_mgmt) ^ ELOOP_SOCKET_INVALID);
13498 	return nl80211_register_frame(bss, handle, type,
13499 				      (u8 *) "\x04\x09\x50\x6f\x9a\x1a", 6,
13500 				      enable);
13501 }
13502 #endif /* CONFIG_DPP */
13503 
13504 #if defined(CONFIG_DRIVER_NL80211_BRCM) || defined(CONFIG_DRIVER_NL80211_SYNA)
nl80211_set_td_policy(void * priv,u32 td_policy)13505 static int nl80211_set_td_policy(void *priv, u32 td_policy)
13506 {
13507 	struct i802_bss *bss = priv;
13508 	struct wpa_driver_nl80211_data *drv = bss->drv;
13509 	struct nl_msg *msg;
13510 	int ret;
13511 	struct nlattr *params;
13512 
13513 	if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
13514 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_BRCM) ||
13515 	    nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, BRCM_VENDOR_SCMD_SET_TD_POLICY) ||
13516 	    !(params = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
13517 	    (nla_put_u32(msg, BRCM_ATTR_DRIVER_TD_POLICY, td_policy))) {
13518 		nl80211_nlmsg_clear(msg);
13519 		nlmsg_free(msg);
13520 		return -ENOBUFS;
13521 	}
13522 	nla_nest_end(msg, params);
13523 	wpa_printf(MSG_DEBUG, "nl80211: Transition Disable Policy %d\n", td_policy);
13524 
13525 	ret = send_and_recv_msgs(drv, msg, NULL, (void *) -1, NULL, NULL);
13526 	if (ret) {
13527 		wpa_printf(MSG_DEBUG, "nl80211: Transition Disable setting failed: ret=%d (%s)",
13528 		ret, strerror(-ret));
13529 	}
13530 
13531 	return ret;
13532 }
13533 #endif /* CONFIG_DRIVER_NL80211_BRCM || CONFIG_DRIVER_NL80211_SYNA */
13534 
nl80211_link_add(void * priv,u8 link_id,const u8 * addr)13535 static int nl80211_link_add(void *priv, u8 link_id, const u8 *addr)
13536 {
13537 	struct i802_bss *bss = priv;
13538 	struct wpa_driver_nl80211_data *drv = bss->drv;
13539 	struct nl_msg *msg;
13540 	unsigned int idx, i;
13541 	int ret;
13542 
13543 	wpa_printf(MSG_DEBUG, "nl80211: MLD: add link_id=%u, addr=" MACSTR,
13544 		   link_id, MAC2STR(addr));
13545 
13546 	if (drv->nlmode != NL80211_IFTYPE_AP) {
13547 		wpa_printf(MSG_DEBUG,
13548 			   "nl80211: MLD: cannot add link to iftype=%u",
13549 			   drv->nlmode);
13550 		return -EINVAL;
13551 	}
13552 
13553 	if (bss->n_links >= MAX_NUM_MLD_LINKS) {
13554 		wpa_printf(MSG_DEBUG, "nl80211: MLD: already have n_links=%zu",
13555 			   bss->n_links);
13556 		return -EINVAL;
13557 	}
13558 
13559 	for (i = 0; i < bss->n_links; i++) {
13560 		if (bss->links[i].link_id == link_id &&
13561 		    bss->links[i].beacon_set) {
13562 			wpa_printf(MSG_DEBUG,
13563 				   "nl80211: MLD: link already set");
13564 			return -EINVAL;
13565 		}
13566 	}
13567 
13568 	/* try using the first link entry, assuming it is not beaconing yet */
13569 	if (bss->n_links == 1 &&
13570 	    bss->flink->link_id == NL80211_DRV_LINK_ID_NA) {
13571 		if (bss->flink->beacon_set) {
13572 			wpa_printf(MSG_DEBUG, "nl80211: BSS already beaconing");
13573 			return -EINVAL;
13574 		}
13575 
13576 		idx = 0;
13577 	} else {
13578 		idx = bss->n_links;
13579 	}
13580 
13581 	msg = nl80211_drv_msg(drv, 0, NL80211_CMD_ADD_LINK);
13582 	if (!msg ||
13583 	    nla_put_u8(msg, NL80211_ATTR_MLO_LINK_ID, link_id) ||
13584 	    nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, addr)) {
13585 		nlmsg_free(msg);
13586 		return -ENOBUFS;
13587 	}
13588 
13589 	ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
13590 	if (ret) {
13591 		wpa_printf(MSG_DEBUG, "nl80211: add link failed. ret=%d (%s)",
13592 			   ret, strerror(-ret));
13593 		return ret;
13594 	}
13595 
13596 	bss->links[idx].link_id = link_id;
13597 	os_memcpy(bss->links[idx].addr, addr, ETH_ALEN);
13598 
13599 	bss->n_links = idx + 1;
13600 
13601 	wpa_printf(MSG_DEBUG, "nl80211: MLD: n_links=%zu", bss->n_links);
13602 	return 0;
13603 }
13604 
13605 
13606 #ifdef CONFIG_TESTING_OPTIONS
13607 
testing_nl80211_register_frame(void * priv,u16 type,const u8 * match,size_t match_len,bool multicast)13608 static int testing_nl80211_register_frame(void *priv, u16 type,
13609 					  const u8 *match, size_t match_len,
13610 					  bool multicast)
13611 {
13612 	struct i802_bss *bss = priv;
13613 	struct nl_sock *handle;
13614 
13615 	if (!bss->nl_mgmt)
13616 		return -1;
13617 	handle = (void *) (((intptr_t) bss->nl_mgmt) ^ ELOOP_SOCKET_INVALID);
13618 	return nl80211_register_frame(bss, handle, type, match, match_len,
13619 				      multicast);
13620 }
13621 
13622 
testing_nl80211_radio_disable(void * priv,int disabled)13623 static int testing_nl80211_radio_disable(void *priv, int disabled)
13624 {
13625 	struct i802_bss *bss = priv;
13626 	struct wpa_driver_nl80211_data *drv = bss->drv;
13627 
13628 	/* For now, this is supported only partially in station mode with
13629 	 * SME-in-wpa_supplicant case where the NL80211_ATTR_LOCAL_STATE_CHANGE
13630 	 * attribute can be used to avoid sending out the Deauthentication frame
13631 	 * to the currently associated AP. */
13632 
13633 	if (!disabled)
13634 		return 0;
13635 
13636 	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME))
13637 		return -1;
13638 
13639 	if (!drv->associated)
13640 		return 0;
13641 
13642 	return wpa_driver_nl80211_mlme(drv, drv->bssid,
13643 				       NL80211_CMD_DEAUTHENTICATE,
13644 				       WLAN_REASON_PREV_AUTH_NOT_VALID, 1,
13645 				       drv->first_bss);
13646 }
13647 
13648 #endif /* CONFIG_TESTING_OPTIONS */
13649 
13650 
13651 const struct wpa_driver_ops wpa_driver_nl80211_ops = {
13652 	.name = "nl80211",
13653 	.desc = "Linux nl80211/cfg80211",
13654 	.get_bssid = wpa_driver_nl80211_get_bssid,
13655 	.get_ssid = wpa_driver_nl80211_get_ssid,
13656 	.set_key = driver_nl80211_set_key,
13657 	.scan2 = driver_nl80211_scan2,
13658 	.sched_scan = wpa_driver_nl80211_sched_scan,
13659 	.stop_sched_scan = wpa_driver_nl80211_stop_sched_scan,
13660 	.get_scan_results2 = wpa_driver_nl80211_get_scan_results,
13661 	.abort_scan = wpa_driver_nl80211_abort_scan,
13662 	.deauthenticate = driver_nl80211_deauthenticate,
13663 	.authenticate = driver_nl80211_authenticate,
13664 	.associate = wpa_driver_nl80211_associate,
13665 	.global_init = nl80211_global_init,
13666 	.global_deinit = nl80211_global_deinit,
13667 	.init2 = wpa_driver_nl80211_init,
13668 	.deinit = driver_nl80211_deinit,
13669 	.get_capa = wpa_driver_nl80211_get_capa,
13670 	.set_operstate = wpa_driver_nl80211_set_operstate,
13671 	.set_supp_port = wpa_driver_nl80211_set_supp_port,
13672 	.set_country = wpa_driver_nl80211_set_country,
13673 	.get_country = wpa_driver_nl80211_get_country,
13674 	.set_ap = wpa_driver_nl80211_set_ap,
13675 	.set_acl = wpa_driver_nl80211_set_acl,
13676 	.if_add = wpa_driver_nl80211_if_add,
13677 	.if_remove = driver_nl80211_if_remove,
13678 	.send_mlme = driver_nl80211_send_mlme,
13679 	.get_hw_feature_data = nl80211_get_hw_feature_data,
13680 	.sta_add = wpa_driver_nl80211_sta_add,
13681 	.sta_remove = driver_nl80211_sta_remove,
13682 	.tx_control_port = nl80211_tx_control_port,
13683 	.hapd_send_eapol = wpa_driver_nl80211_hapd_send_eapol,
13684 	.sta_set_flags = wpa_driver_nl80211_sta_set_flags,
13685 	.sta_set_airtime_weight = driver_nl80211_sta_set_airtime_weight,
13686 	.hapd_init = i802_init,
13687 	.hapd_deinit = i802_deinit,
13688 	.set_wds_sta = i802_set_wds_sta,
13689 	.get_seqnum = i802_get_seqnum,
13690 	.flush = i802_flush,
13691 	.get_inact_sec = i802_get_inact_sec,
13692 	.sta_clear_stats = i802_sta_clear_stats,
13693 	.set_rts = i802_set_rts,
13694 	.set_frag = i802_set_frag,
13695 	.set_tx_queue_params = i802_set_tx_queue_params,
13696 	.set_sta_vlan = driver_nl80211_set_sta_vlan,
13697 	.sta_deauth = i802_sta_deauth,
13698 	.sta_disassoc = i802_sta_disassoc,
13699 	.read_sta_data = driver_nl80211_read_sta_data,
13700 	.set_freq = i802_set_freq,
13701 	.send_action = driver_nl80211_send_action,
13702 	.send_action_cancel_wait = wpa_driver_nl80211_send_action_cancel_wait,
13703 	.remain_on_channel = wpa_driver_nl80211_remain_on_channel,
13704 	.cancel_remain_on_channel =
13705 	wpa_driver_nl80211_cancel_remain_on_channel,
13706 	.probe_req_report = driver_nl80211_probe_req_report,
13707 	.deinit_ap = wpa_driver_nl80211_deinit_ap,
13708 	.deinit_p2p_cli = wpa_driver_nl80211_deinit_p2p_cli,
13709 	.resume = wpa_driver_nl80211_resume,
13710 	.signal_monitor = nl80211_signal_monitor,
13711 	.signal_poll = nl80211_signal_poll,
13712 	.mlo_signal_poll = nl80211_mlo_signal_poll,
13713 	.channel_info = nl80211_channel_info,
13714 	.set_param = nl80211_set_param,
13715 	.get_radio_name = nl80211_get_radio_name,
13716 	.add_pmkid = nl80211_add_pmkid,
13717 	.remove_pmkid = nl80211_remove_pmkid,
13718 	.flush_pmkid = nl80211_flush_pmkid,
13719 	.set_rekey_info = nl80211_set_rekey_info,
13720 	.poll_client = nl80211_poll_client,
13721 	.set_p2p_powersave = nl80211_set_p2p_powersave,
13722 	.start_dfs_cac = nl80211_start_radar_detection,
13723 	.stop_ap = wpa_driver_nl80211_stop_ap,
13724 #ifdef CONFIG_TDLS
13725 	.send_tdls_mgmt = nl80211_send_tdls_mgmt,
13726 	.tdls_oper = nl80211_tdls_oper,
13727 	.tdls_enable_channel_switch = nl80211_tdls_enable_channel_switch,
13728 	.tdls_disable_channel_switch = nl80211_tdls_disable_channel_switch,
13729 #endif /* CONFIG_TDLS */
13730 	.update_ft_ies = wpa_driver_nl80211_update_ft_ies,
13731 	.update_dh_ie = nl80211_update_dh_ie,
13732 	.get_mac_addr = wpa_driver_nl80211_get_macaddr,
13733 	.get_survey = wpa_driver_nl80211_get_survey,
13734 	.status = wpa_driver_nl80211_status,
13735 	.switch_channel = nl80211_switch_channel,
13736 #ifdef CONFIG_IEEE80211AX
13737 	.switch_color = nl80211_switch_color,
13738 #endif /* CONFIG_IEEE80211AX */
13739 #ifdef ANDROID_P2P
13740 	.set_noa = wpa_driver_set_p2p_noa,
13741 	.get_noa = wpa_driver_get_p2p_noa,
13742 	.set_ap_wps_ie = wpa_driver_set_ap_wps_p2p_ie,
13743 #endif /* ANDROID_P2P */
13744 #ifdef ANDROID
13745 #ifndef ANDROID_LIB_STUB
13746 	.driver_cmd = wpa_driver_nl80211_driver_cmd,
13747 #endif /* !ANDROID_LIB_STUB */
13748 #endif /* ANDROID */
13749 	.vendor_cmd = nl80211_vendor_cmd,
13750 	.set_qos_map = nl80211_set_qos_map,
13751 	.get_wowlan = nl80211_get_wowlan,
13752 	.set_wowlan = nl80211_set_wowlan,
13753 	.set_mac_addr = nl80211_set_mac_addr,
13754 #ifdef CONFIG_MESH
13755 	.init_mesh = wpa_driver_nl80211_init_mesh,
13756 	.join_mesh = wpa_driver_nl80211_join_mesh,
13757 	.leave_mesh = wpa_driver_nl80211_leave_mesh,
13758 	.probe_mesh_link = nl80211_probe_mesh_link,
13759 #endif /* CONFIG_MESH */
13760 	.br_add_ip_neigh = wpa_driver_br_add_ip_neigh,
13761 	.br_delete_ip_neigh = wpa_driver_br_delete_ip_neigh,
13762 	.br_port_set_attr = wpa_driver_br_port_set_attr,
13763 	.br_set_net_param = wpa_driver_br_set_net_param,
13764 	.add_tx_ts = nl80211_add_ts,
13765 	.del_tx_ts = nl80211_del_ts,
13766 	.get_ifindex = nl80211_get_ifindex,
13767 #ifdef CONFIG_DRIVER_NL80211_QCA
13768 	.roaming = nl80211_roaming,
13769 	.disable_fils = nl80211_disable_fils,
13770 	.set_band = nl80211_set_band,
13771 	.get_pref_freq_list = nl80211_get_pref_freq_list,
13772 	.set_prob_oper_freq = nl80211_set_prob_oper_freq,
13773 	.p2p_lo_start = nl80211_p2p_lo_start,
13774 	.p2p_lo_stop = nl80211_p2p_lo_stop,
13775 	.set_default_scan_ies = nl80211_set_default_scan_ies,
13776 	.set_tdls_mode = nl80211_set_tdls_mode,
13777 #ifdef CONFIG_MBO
13778 	.get_bss_transition_status = nl80211_get_bss_transition_status,
13779 	.ignore_assoc_disallow = nl80211_ignore_assoc_disallow,
13780 #endif /* CONFIG_MBO */
13781 	.set_bssid_tmp_disallow = nl80211_set_bssid_tmp_disallow,
13782 	.add_sta_node = nl80211_add_sta_node,
13783 #ifdef CONFIG_PASN
13784 	.send_pasn_resp = nl80211_send_pasn_resp,
13785 	.set_secure_ranging_ctx = nl80211_set_secure_ranging_ctx,
13786 #endif /* CONFIG_PASN */
13787 #endif /* CONFIG_DRIVER_NL80211_QCA */
13788 	.do_acs = nl80211_do_acs,
13789 	.configure_data_frame_filters = nl80211_configure_data_frame_filters,
13790 	.get_ext_capab = nl80211_get_ext_capab,
13791 	.update_connect_params = nl80211_update_connection_params,
13792 	.send_external_auth_status = nl80211_send_external_auth_status,
13793 	.set_4addr_mode = nl80211_set_4addr_mode,
13794 #ifdef CONFIG_DPP
13795 	.dpp_listen = nl80211_dpp_listen,
13796 #endif /* CONFIG_DPP */
13797 	.get_sta_mlo_info = nl80211_get_sta_mlo_info,
13798 	.link_add = nl80211_link_add,
13799 #ifdef CONFIG_TESTING_OPTIONS
13800 	.register_frame = testing_nl80211_register_frame,
13801 	.radio_disable = testing_nl80211_radio_disable,
13802 #endif /* CONFIG_TESTING_OPTIONS */
13803 };
13804