| /* |
| * Driver interaction with Linux nl80211/cfg80211 |
| * Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi> |
| * Copyright (c) 2003-2004, Instant802 Networks, Inc. |
| * Copyright (c) 2005-2006, Devicescape Software, Inc. |
| * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net> |
| * Copyright (c) 2009-2010, Atheros Communications |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "includes.h" |
| #include <sys/ioctl.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <fcntl.h> |
| #include <net/if.h> |
| #include <netlink/genl/genl.h> |
| #include <netlink/genl/family.h> |
| #include <netlink/genl/ctrl.h> |
| #include <linux/rtnetlink.h> |
| #include <netpacket/packet.h> |
| #include <linux/filter.h> |
| #include <linux/errqueue.h> |
| #include "nl80211_copy.h" |
| |
| #include "common.h" |
| #include "eloop.h" |
| #include "utils/list.h" |
| #include "common/ieee802_11_defs.h" |
| #include "common/ieee802_11_common.h" |
| #include "l2_packet/l2_packet.h" |
| #include "netlink.h" |
| #include "linux_ioctl.h" |
| #include "radiotap.h" |
| #include "radiotap_iter.h" |
| #include "rfkill.h" |
| #include "driver.h" |
| |
| #ifndef SO_WIFI_STATUS |
| # if defined(__sparc__) |
| # define SO_WIFI_STATUS 0x0025 |
| # elif defined(__parisc__) |
| # define SO_WIFI_STATUS 0x4022 |
| # else |
| # define SO_WIFI_STATUS 41 |
| # endif |
| |
| # define SCM_WIFI_STATUS SO_WIFI_STATUS |
| #endif |
| |
| #ifndef SO_EE_ORIGIN_TXSTATUS |
| #define SO_EE_ORIGIN_TXSTATUS 4 |
| #endif |
| |
| #ifndef PACKET_TX_TIMESTAMP |
| #define PACKET_TX_TIMESTAMP 16 |
| #endif |
| |
| #ifdef ANDROID |
| #include "android_drv.h" |
| |
| /* system/core/libnl_2 in AOSP does not include nla_put_u32() */ |
| int nla_put_u32(struct nl_msg *msg, int attrtype, uint32_t value) |
| { |
| return nla_put(msg, attrtype, sizeof(uint32_t), &value); |
| } |
| #endif /* ANDROID */ |
| #ifdef CONFIG_LIBNL20 |
| /* libnl 2.0 compatibility code */ |
| #define nl_handle nl_sock |
| #define nl80211_handle_alloc nl_socket_alloc_cb |
| #define nl80211_handle_destroy nl_socket_free |
| #else |
| /* |
| * libnl 1.1 has a bug, it tries to allocate socket numbers densely |
| * but when you free a socket again it will mess up its bitmap and |
| * and use the wrong number the next time it needs a socket ID. |
| * Therefore, we wrap the handle alloc/destroy and add our own pid |
| * accounting. |
| */ |
| static uint32_t port_bitmap[32] = { 0 }; |
| |
| static struct nl_handle *nl80211_handle_alloc(void *cb) |
| { |
| struct nl_handle *handle; |
| uint32_t pid = getpid() & 0x3FFFFF; |
| int i; |
| |
| handle = nl_handle_alloc_cb(cb); |
| |
| for (i = 0; i < 1024; i++) { |
| if (port_bitmap[i / 32] & (1 << (i % 32))) |
| continue; |
| port_bitmap[i / 32] |= 1 << (i % 32); |
| pid += i << 22; |
| break; |
| } |
| |
| nl_socket_set_local_port(handle, pid); |
| |
| return handle; |
| } |
| |
| static void nl80211_handle_destroy(struct nl_handle *handle) |
| { |
| uint32_t port = nl_socket_get_local_port(handle); |
| |
| port >>= 22; |
| port_bitmap[port / 32] &= ~(1 << (port % 32)); |
| |
| nl_handle_destroy(handle); |
| } |
| #endif /* CONFIG_LIBNL20 */ |
| |
| |
| static struct nl_handle * nl_create_handle(struct nl_cb *cb, const char *dbg) |
| { |
| struct nl_handle *handle; |
| |
| handle = nl80211_handle_alloc(cb); |
| if (handle == NULL) { |
| wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink " |
| "callbacks (%s)", dbg); |
| return NULL; |
| } |
| |
| if (genl_connect(handle)) { |
| wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic " |
| "netlink (%s)", dbg); |
| nl80211_handle_destroy(handle); |
| return NULL; |
| } |
| |
| return handle; |
| } |
| |
| |
| static void nl_destroy_handles(struct nl_handle **handle) |
| { |
| if (*handle == NULL) |
| return; |
| nl80211_handle_destroy(*handle); |
| *handle = NULL; |
| } |
| |
| |
| #ifndef IFF_LOWER_UP |
| #define IFF_LOWER_UP 0x10000 /* driver signals L1 up */ |
| #endif |
| #ifndef IFF_DORMANT |
| #define IFF_DORMANT 0x20000 /* driver signals dormant */ |
| #endif |
| |
| #ifndef IF_OPER_DORMANT |
| #define IF_OPER_DORMANT 5 |
| #endif |
| #ifndef IF_OPER_UP |
| #define IF_OPER_UP 6 |
| #endif |
| |
| struct nl80211_global { |
| struct dl_list interfaces; |
| int if_add_ifindex; |
| struct netlink_data *netlink; |
| struct nl_cb *nl_cb; |
| struct nl_handle *nl; |
| int nl80211_id; |
| int ioctl_sock; /* socket for ioctl() use */ |
| |
| struct nl_handle *nl_event; |
| }; |
| |
| struct nl80211_wiphy_data { |
| struct dl_list list; |
| struct dl_list bsss; |
| struct dl_list drvs; |
| |
| struct nl_handle *nl_beacons; |
| struct nl_cb *nl_cb; |
| |
| int wiphy_idx; |
| }; |
| |
| static void nl80211_global_deinit(void *priv); |
| static void wpa_driver_nl80211_deinit(void *priv); |
| |
| struct i802_bss { |
| struct wpa_driver_nl80211_data *drv; |
| struct i802_bss *next; |
| int ifindex; |
| char ifname[IFNAMSIZ + 1]; |
| char brname[IFNAMSIZ]; |
| unsigned int beacon_set:1; |
| unsigned int added_if_into_bridge:1; |
| unsigned int added_bridge:1; |
| unsigned int in_deinit:1; |
| |
| u8 addr[ETH_ALEN]; |
| |
| int freq; |
| |
| void *ctx; |
| struct nl_handle *nl_preq, *nl_mgmt; |
| struct nl_cb *nl_cb; |
| |
| struct nl80211_wiphy_data *wiphy_data; |
| struct dl_list wiphy_list; |
| }; |
| |
| struct wpa_driver_nl80211_data { |
| struct nl80211_global *global; |
| struct dl_list list; |
| struct dl_list wiphy_list; |
| char phyname[32]; |
| void *ctx; |
| int ifindex; |
| int if_removed; |
| int if_disabled; |
| int ignore_if_down_event; |
| struct rfkill_data *rfkill; |
| struct wpa_driver_capa capa; |
| int has_capability; |
| |
| int operstate; |
| |
| int scan_complete_events; |
| |
| struct nl_cb *nl_cb; |
| |
| u8 auth_bssid[ETH_ALEN]; |
| u8 bssid[ETH_ALEN]; |
| int associated; |
| u8 ssid[32]; |
| size_t ssid_len; |
| enum nl80211_iftype nlmode; |
| enum nl80211_iftype ap_scan_as_station; |
| unsigned int assoc_freq; |
| |
| int monitor_sock; |
| int monitor_ifidx; |
| int monitor_refcount; |
| |
| unsigned int disabled_11b_rates:1; |
| unsigned int pending_remain_on_chan:1; |
| unsigned int in_interface_list:1; |
| unsigned int device_ap_sme:1; |
| unsigned int poll_command_supported:1; |
| unsigned int data_tx_status:1; |
| unsigned int scan_for_auth:1; |
| unsigned int retry_auth:1; |
| unsigned int use_monitor:1; |
| unsigned int ignore_next_local_disconnect:1; |
| |
| u64 remain_on_chan_cookie; |
| u64 send_action_cookie; |
| |
| unsigned int last_mgmt_freq; |
| |
| struct wpa_driver_scan_filter *filter_ssids; |
| size_t num_filter_ssids; |
| |
| struct i802_bss first_bss; |
| |
| int eapol_tx_sock; |
| |
| #ifdef HOSTAPD |
| int eapol_sock; /* socket for EAPOL frames */ |
| |
| int default_if_indices[16]; |
| int *if_indices; |
| int num_if_indices; |
| |
| int last_freq; |
| int last_freq_ht; |
| #endif /* HOSTAPD */ |
| |
| /* From failed authentication command */ |
| int auth_freq; |
| u8 auth_bssid_[ETH_ALEN]; |
| u8 auth_ssid[32]; |
| size_t auth_ssid_len; |
| int auth_alg; |
| u8 *auth_ie; |
| size_t auth_ie_len; |
| u8 auth_wep_key[4][16]; |
| size_t auth_wep_key_len[4]; |
| int auth_wep_tx_keyidx; |
| int auth_local_state_change; |
| int auth_p2p; |
| }; |
| |
| |
| static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, |
| void *timeout_ctx); |
| static int wpa_driver_nl80211_set_mode(struct i802_bss *bss, |
| enum nl80211_iftype nlmode); |
| static int |
| wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv); |
| static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv, |
| const u8 *addr, int cmd, u16 reason_code, |
| int local_state_change); |
| static void nl80211_remove_monitor_interface( |
| struct wpa_driver_nl80211_data *drv); |
| static int nl80211_send_frame_cmd(struct i802_bss *bss, |
| unsigned int freq, unsigned int wait, |
| const u8 *buf, size_t buf_len, u64 *cookie, |
| int no_cck, int no_ack, int offchanok); |
| static int wpa_driver_nl80211_probe_req_report(void *priv, int report); |
| #ifdef ANDROID |
| static int android_pno_start(struct i802_bss *bss, |
| struct wpa_driver_scan_params *params); |
| static int android_pno_stop(struct i802_bss *bss); |
| #endif /* ANDROID */ |
| |
| #ifdef HOSTAPD |
| static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx); |
| static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx); |
| static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx); |
| static int wpa_driver_nl80211_if_remove(void *priv, |
| enum wpa_driver_if_type type, |
| const char *ifname); |
| #else /* HOSTAPD */ |
| static inline void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx) |
| { |
| } |
| |
| static inline void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx) |
| { |
| } |
| |
| static inline int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx) |
| { |
| return 0; |
| } |
| #endif /* HOSTAPD */ |
| |
| static int i802_set_freq(void *priv, struct hostapd_freq_params *freq); |
| static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv, |
| int ifindex, int disabled); |
| |
| static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv); |
| static int wpa_driver_nl80211_authenticate_retry( |
| struct wpa_driver_nl80211_data *drv); |
| |
| |
| static int is_ap_interface(enum nl80211_iftype nlmode) |
| { |
| return (nlmode == NL80211_IFTYPE_AP || |
| nlmode == NL80211_IFTYPE_P2P_GO); |
| } |
| |
| |
| static int is_sta_interface(enum nl80211_iftype nlmode) |
| { |
| return (nlmode == NL80211_IFTYPE_STATION || |
| nlmode == NL80211_IFTYPE_P2P_CLIENT); |
| } |
| |
| |
| static int is_p2p_interface(enum nl80211_iftype nlmode) |
| { |
| return (nlmode == NL80211_IFTYPE_P2P_CLIENT || |
| nlmode == NL80211_IFTYPE_P2P_GO); |
| } |
| |
| |
| struct nl80211_bss_info_arg { |
| struct wpa_driver_nl80211_data *drv; |
| struct wpa_scan_results *res; |
| unsigned int assoc_freq; |
| u8 assoc_bssid[ETH_ALEN]; |
| }; |
| |
| static int bss_info_handler(struct nl_msg *msg, void *arg); |
| |
| |
| /* nl80211 code */ |
| static int ack_handler(struct nl_msg *msg, void *arg) |
| { |
| int *err = arg; |
| *err = 0; |
| return NL_STOP; |
| } |
| |
| static int finish_handler(struct nl_msg *msg, void *arg) |
| { |
| int *ret = arg; |
| *ret = 0; |
| return NL_SKIP; |
| } |
| |
| static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err, |
| void *arg) |
| { |
| int *ret = arg; |
| *ret = err->error; |
| return NL_SKIP; |
| } |
| |
| |
| static int no_seq_check(struct nl_msg *msg, void *arg) |
| { |
| return NL_OK; |
| } |
| |
| |
| static int send_and_recv(struct nl80211_global *global, |
| struct nl_handle *nl_handle, struct nl_msg *msg, |
| int (*valid_handler)(struct nl_msg *, void *), |
| void *valid_data) |
| { |
| struct nl_cb *cb; |
| int err = -ENOMEM; |
| |
| cb = nl_cb_clone(global->nl_cb); |
| if (!cb) |
| goto out; |
| |
| err = nl_send_auto_complete(nl_handle, msg); |
| if (err < 0) |
| goto out; |
| |
| err = 1; |
| |
| nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err); |
| nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err); |
| nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err); |
| |
| if (valid_handler) |
| nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, |
| valid_handler, valid_data); |
| |
| while (err > 0) |
| nl_recvmsgs(nl_handle, cb); |
| out: |
| nl_cb_put(cb); |
| nlmsg_free(msg); |
| return err; |
| } |
| |
| |
| static int send_and_recv_msgs_global(struct nl80211_global *global, |
| struct nl_msg *msg, |
| int (*valid_handler)(struct nl_msg *, void *), |
| void *valid_data) |
| { |
| return send_and_recv(global, global->nl, msg, valid_handler, |
| valid_data); |
| } |
| |
| |
| static int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv, |
| struct nl_msg *msg, |
| int (*valid_handler)(struct nl_msg *, void *), |
| void *valid_data) |
| { |
| return send_and_recv(drv->global, drv->global->nl, msg, |
| valid_handler, valid_data); |
| } |
| |
| |
| struct family_data { |
| const char *group; |
| int id; |
| }; |
| |
| |
| static int family_handler(struct nl_msg *msg, void *arg) |
| { |
| struct family_data *res = arg; |
| struct nlattr *tb[CTRL_ATTR_MAX + 1]; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *mcgrp; |
| int i; |
| |
| nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| if (!tb[CTRL_ATTR_MCAST_GROUPS]) |
| return NL_SKIP; |
| |
| nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) { |
| struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1]; |
| nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp), |
| nla_len(mcgrp), NULL); |
| if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] || |
| !tb2[CTRL_ATTR_MCAST_GRP_ID] || |
| os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]), |
| res->group, |
| nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0) |
| continue; |
| res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]); |
| break; |
| }; |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int nl_get_multicast_id(struct nl80211_global *global, |
| const char *family, const char *group) |
| { |
| struct nl_msg *msg; |
| int ret = -1; |
| struct family_data res = { group, -ENOENT }; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -ENOMEM; |
| genlmsg_put(msg, 0, 0, genl_ctrl_resolve(global->nl, "nlctrl"), |
| 0, 0, CTRL_CMD_GETFAMILY, 0); |
| NLA_PUT_STRING(msg, CTRL_ATTR_FAMILY_NAME, family); |
| |
| ret = send_and_recv_msgs_global(global, msg, family_handler, &res); |
| msg = NULL; |
| if (ret == 0) |
| ret = res.id; |
| |
| nla_put_failure: |
| nlmsg_free(msg); |
| return ret; |
| } |
| |
| |
| static void * nl80211_cmd(struct wpa_driver_nl80211_data *drv, |
| struct nl_msg *msg, int flags, uint8_t cmd) |
| { |
| return genlmsg_put(msg, 0, 0, drv->global->nl80211_id, |
| 0, flags, cmd, 0); |
| } |
| |
| |
| struct wiphy_idx_data { |
| int wiphy_idx; |
| }; |
| |
| |
| static int netdev_info_handler(struct nl_msg *msg, void *arg) |
| { |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct wiphy_idx_data *info = arg; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (tb[NL80211_ATTR_WIPHY]) |
| info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]); |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int nl80211_get_wiphy_index(struct i802_bss *bss) |
| { |
| struct nl_msg *msg; |
| struct wiphy_idx_data data = { |
| .wiphy_idx = -1, |
| }; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -1; |
| |
| nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE); |
| |
| NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex); |
| |
| if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0) |
| return data.wiphy_idx; |
| msg = NULL; |
| nla_put_failure: |
| nlmsg_free(msg); |
| return -1; |
| } |
| |
| |
| static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv, |
| struct nl80211_wiphy_data *w) |
| { |
| struct nl_msg *msg; |
| int ret = -1; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -1; |
| |
| nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS); |
| |
| NLA_PUT_U32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx); |
| |
| ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL); |
| msg = NULL; |
| if (ret) { |
| wpa_printf(MSG_DEBUG, "nl80211: Register beacons command " |
| "failed: ret=%d (%s)", |
| ret, strerror(-ret)); |
| goto nla_put_failure; |
| } |
| ret = 0; |
| nla_put_failure: |
| nlmsg_free(msg); |
| return ret; |
| } |
| |
| |
| static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle) |
| { |
| struct nl80211_wiphy_data *w = eloop_ctx; |
| |
| wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available"); |
| |
| nl_recvmsgs(handle, w->nl_cb); |
| } |
| |
| |
| static int process_beacon_event(struct nl_msg *msg, void *arg) |
| { |
| struct nl80211_wiphy_data *w = arg; |
| struct wpa_driver_nl80211_data *drv; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| union wpa_event_data event; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (gnlh->cmd != NL80211_CMD_FRAME) { |
| wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)", |
| gnlh->cmd); |
| return NL_SKIP; |
| } |
| |
| if (!tb[NL80211_ATTR_FRAME]) |
| return NL_SKIP; |
| |
| dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data, |
| wiphy_list) { |
| os_memset(&event, 0, sizeof(event)); |
| event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]); |
| event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]); |
| wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event); |
| } |
| |
| return NL_SKIP; |
| } |
| |
| |
| static struct nl80211_wiphy_data * |
| nl80211_get_wiphy_data_ap(struct i802_bss *bss) |
| { |
| static DEFINE_DL_LIST(nl80211_wiphys); |
| struct nl80211_wiphy_data *w; |
| int wiphy_idx, found = 0; |
| struct i802_bss *tmp_bss; |
| |
| if (bss->wiphy_data != NULL) |
| return bss->wiphy_data; |
| |
| wiphy_idx = nl80211_get_wiphy_index(bss); |
| |
| dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) { |
| if (w->wiphy_idx == wiphy_idx) |
| goto add; |
| } |
| |
| /* alloc new one */ |
| w = os_zalloc(sizeof(*w)); |
| if (w == NULL) |
| return NULL; |
| w->wiphy_idx = wiphy_idx; |
| dl_list_init(&w->bsss); |
| dl_list_init(&w->drvs); |
| |
| w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT); |
| if (!w->nl_cb) { |
| os_free(w); |
| return NULL; |
| } |
| nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL); |
| nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM, process_beacon_event, |
| w); |
| |
| w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb, |
| "wiphy beacons"); |
| if (w->nl_beacons == NULL) { |
| os_free(w); |
| return NULL; |
| } |
| |
| if (nl80211_register_beacons(bss->drv, w)) { |
| nl_destroy_handles(&w->nl_beacons); |
| os_free(w); |
| return NULL; |
| } |
| |
| eloop_register_read_sock(nl_socket_get_fd(w->nl_beacons), |
| nl80211_recv_beacons, w, w->nl_beacons); |
| |
| dl_list_add(&nl80211_wiphys, &w->list); |
| |
| add: |
| /* drv entry for this bss already there? */ |
| dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) { |
| if (tmp_bss->drv == bss->drv) { |
| found = 1; |
| break; |
| } |
| } |
| /* if not add it */ |
| if (!found) |
| dl_list_add(&w->drvs, &bss->drv->wiphy_list); |
| |
| dl_list_add(&w->bsss, &bss->wiphy_list); |
| bss->wiphy_data = w; |
| return w; |
| } |
| |
| |
| static void nl80211_put_wiphy_data_ap(struct i802_bss *bss) |
| { |
| struct nl80211_wiphy_data *w = bss->wiphy_data; |
| struct i802_bss *tmp_bss; |
| int found = 0; |
| |
| if (w == NULL) |
| return; |
| bss->wiphy_data = NULL; |
| dl_list_del(&bss->wiphy_list); |
| |
| /* still any for this drv present? */ |
| dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) { |
| if (tmp_bss->drv == bss->drv) { |
| found = 1; |
| break; |
| } |
| } |
| /* if not remove it */ |
| if (!found) |
| dl_list_del(&bss->drv->wiphy_list); |
| |
| if (!dl_list_empty(&w->bsss)) |
| return; |
| |
| eloop_unregister_read_sock(nl_socket_get_fd(w->nl_beacons)); |
| |
| nl_cb_put(w->nl_cb); |
| nl_destroy_handles(&w->nl_beacons); |
| dl_list_del(&w->list); |
| os_free(w); |
| } |
| |
| |
| static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid) |
| { |
| struct i802_bss *bss = priv; |
| struct wpa_driver_nl80211_data *drv = bss->drv; |
| if (!drv->associated) |
| return -1; |
| os_memcpy(bssid, drv->bssid, ETH_ALEN); |
| return 0; |
| } |
| |
| |
| static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid) |
| { |
| struct i802_bss *bss = priv; |
| struct wpa_driver_nl80211_data *drv = bss->drv; |
| if (!drv->associated) |
| return -1; |
| os_memcpy(ssid, drv->ssid, drv->ssid_len); |
| return drv->ssid_len; |
| } |
| |
| |
| static void wpa_driver_nl80211_event_link(struct wpa_driver_nl80211_data *drv, |
| char *buf, size_t len, int del) |
| { |
| union wpa_event_data event; |
| |
| os_memset(&event, 0, sizeof(event)); |
| if (len > sizeof(event.interface_status.ifname)) |
| len = sizeof(event.interface_status.ifname) - 1; |
| os_memcpy(event.interface_status.ifname, buf, len); |
| event.interface_status.ievent = del ? EVENT_INTERFACE_REMOVED : |
| EVENT_INTERFACE_ADDED; |
| |
| wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s", |
| del ? "DEL" : "NEW", |
| event.interface_status.ifname, |
| del ? "removed" : "added"); |
| |
| if (os_strcmp(drv->first_bss.ifname, event.interface_status.ifname) == 0) { |
| if (del) { |
| if (drv->if_removed) { |
| wpa_printf(MSG_DEBUG, "nl80211: if_removed " |
| "already set - ignore event"); |
| return; |
| } |
| drv->if_removed = 1; |
| } else { |
| if (if_nametoindex(drv->first_bss.ifname) == 0) { |
| wpa_printf(MSG_DEBUG, "nl80211: Interface %s " |
| "does not exist - ignore " |
| "RTM_NEWLINK", |
| drv->first_bss.ifname); |
| return; |
| } |
| if (!drv->if_removed) { |
| wpa_printf(MSG_DEBUG, "nl80211: if_removed " |
| "already cleared - ignore event"); |
| return; |
| } |
| drv->if_removed = 0; |
| } |
| } |
| |
| wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event); |
| } |
| |
| |
| static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv, |
| u8 *buf, size_t len) |
| { |
| int attrlen, rta_len; |
| struct rtattr *attr; |
| |
| attrlen = len; |
| attr = (struct rtattr *) buf; |
| |
| rta_len = RTA_ALIGN(sizeof(struct rtattr)); |
| while (RTA_OK(attr, attrlen)) { |
| if (attr->rta_type == IFLA_IFNAME) { |
| if (os_strcmp(((char *) attr) + rta_len, drv->first_bss.ifname) |
| == 0) |
| return 1; |
| else |
| break; |
| } |
| attr = RTA_NEXT(attr, attrlen); |
| } |
| |
| return 0; |
| } |
| |
| |
| static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv, |
| int ifindex, u8 *buf, size_t len) |
| { |
| if (drv->ifindex == ifindex) |
| return 1; |
| |
| if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) { |
| drv->first_bss.ifindex = if_nametoindex(drv->first_bss.ifname); |
| wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed " |
| "interface"); |
| wpa_driver_nl80211_finish_drv_init(drv); |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| |
| static struct wpa_driver_nl80211_data * |
| nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len) |
| { |
| struct wpa_driver_nl80211_data *drv; |
| dl_list_for_each(drv, &global->interfaces, |
| struct wpa_driver_nl80211_data, list) { |
| if (wpa_driver_nl80211_own_ifindex(drv, idx, buf, len) || |
| have_ifidx(drv, idx)) |
| return drv; |
| } |
| return NULL; |
| } |
| |
| |
| static void wpa_driver_nl80211_event_rtm_newlink(void *ctx, |
| struct ifinfomsg *ifi, |
| u8 *buf, size_t len) |
| { |
| struct nl80211_global *global = ctx; |
| struct wpa_driver_nl80211_data *drv; |
| int attrlen, rta_len; |
| struct rtattr *attr; |
| u32 brid = 0; |
| char namebuf[IFNAMSIZ]; |
| |
| drv = nl80211_find_drv(global, ifi->ifi_index, buf, len); |
| if (!drv) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore event for foreign " |
| "ifindex %d", ifi->ifi_index); |
| return; |
| } |
| |
| wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x " |
| "(%s%s%s%s)", |
| drv->operstate, ifi->ifi_flags, |
| (ifi->ifi_flags & IFF_UP) ? "[UP]" : "", |
| (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "", |
| (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "", |
| (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : ""); |
| |
| if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) { |
| if (if_indextoname(ifi->ifi_index, namebuf) && |
| linux_iface_up(drv->global->ioctl_sock, |
| drv->first_bss.ifname) > 0) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down " |
| "event since interface %s is up", namebuf); |
| return; |
| } |
| wpa_printf(MSG_DEBUG, "nl80211: Interface down"); |
| if (drv->ignore_if_down_event) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down " |
| "event generated by mode change"); |
| drv->ignore_if_down_event = 0; |
| } else { |
| drv->if_disabled = 1; |
| wpa_supplicant_event(drv->ctx, |
| EVENT_INTERFACE_DISABLED, NULL); |
| } |
| } |
| |
| if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) { |
| if (if_indextoname(ifi->ifi_index, namebuf) && |
| linux_iface_up(drv->global->ioctl_sock, |
| drv->first_bss.ifname) == 0) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up " |
| "event since interface %s is down", |
| namebuf); |
| } else if (if_nametoindex(drv->first_bss.ifname) == 0) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up " |
| "event since interface %s does not exist", |
| drv->first_bss.ifname); |
| } else if (drv->if_removed) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up " |
| "event since interface %s is marked " |
| "removed", drv->first_bss.ifname); |
| } else { |
| wpa_printf(MSG_DEBUG, "nl80211: Interface up"); |
| drv->if_disabled = 0; |
| wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED, |
| NULL); |
| } |
| } |
| |
| /* |
| * Some drivers send the association event before the operup event--in |
| * this case, lifting operstate in wpa_driver_nl80211_set_operstate() |
| * fails. This will hit us when wpa_supplicant does not need to do |
| * IEEE 802.1X authentication |
| */ |
| if (drv->operstate == 1 && |
| (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP && |
| !(ifi->ifi_flags & IFF_RUNNING)) |
| netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, |
| -1, IF_OPER_UP); |
| |
| attrlen = len; |
| attr = (struct rtattr *) buf; |
| rta_len = RTA_ALIGN(sizeof(struct rtattr)); |
| while (RTA_OK(attr, attrlen)) { |
| if (attr->rta_type == IFLA_IFNAME) { |
| wpa_driver_nl80211_event_link( |
| drv, |
| ((char *) attr) + rta_len, |
| attr->rta_len - rta_len, 0); |
| } else if (attr->rta_type == IFLA_MASTER) |
| brid = nla_get_u32((struct nlattr *) attr); |
| attr = RTA_NEXT(attr, attrlen); |
| } |
| |
| if (ifi->ifi_family == AF_BRIDGE && brid) { |
| /* device has been added to bridge */ |
| if_indextoname(brid, namebuf); |
| wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s", |
| brid, namebuf); |
| add_ifidx(drv, brid); |
| } |
| } |
| |
| |
| static void wpa_driver_nl80211_event_rtm_dellink(void *ctx, |
| struct ifinfomsg *ifi, |
| u8 *buf, size_t len) |
| { |
| struct nl80211_global *global = ctx; |
| struct wpa_driver_nl80211_data *drv; |
| int attrlen, rta_len; |
| struct rtattr *attr; |
| u32 brid = 0; |
| |
| drv = nl80211_find_drv(global, ifi->ifi_index, buf, len); |
| if (!drv) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore dellink event for " |
| "foreign ifindex %d", ifi->ifi_index); |
| return; |
| } |
| |
| attrlen = len; |
| attr = (struct rtattr *) buf; |
| |
| rta_len = RTA_ALIGN(sizeof(struct rtattr)); |
| while (RTA_OK(attr, attrlen)) { |
| if (attr->rta_type == IFLA_IFNAME) { |
| wpa_driver_nl80211_event_link( |
| drv, |
| ((char *) attr) + rta_len, |
| attr->rta_len - rta_len, 1); |
| } else if (attr->rta_type == IFLA_MASTER) |
| brid = nla_get_u32((struct nlattr *) attr); |
| attr = RTA_NEXT(attr, attrlen); |
| } |
| |
| if (ifi->ifi_family == AF_BRIDGE && brid) { |
| /* device has been removed from bridge */ |
| char namebuf[IFNAMSIZ]; |
| if_indextoname(brid, namebuf); |
| wpa_printf(MSG_DEBUG, "nl80211: Remove ifindex %u for bridge " |
| "%s", brid, namebuf); |
| del_ifidx(drv, brid); |
| } |
| } |
| |
| |
| static void mlme_event_auth(struct wpa_driver_nl80211_data *drv, |
| const u8 *frame, size_t len) |
| { |
| const struct ieee80211_mgmt *mgmt; |
| union wpa_event_data event; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Authenticate event"); |
| mgmt = (const struct ieee80211_mgmt *) frame; |
| if (len < 24 + sizeof(mgmt->u.auth)) { |
| wpa_printf(MSG_DEBUG, "nl80211: Too short association event " |
| "frame"); |
| return; |
| } |
| |
| os_memcpy(drv->auth_bssid, mgmt->sa, ETH_ALEN); |
| os_memset(&event, 0, sizeof(event)); |
| os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); |
| event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); |
| event.auth.auth_transaction = |
| le_to_host16(mgmt->u.auth.auth_transaction); |
| event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); |
| if (len > 24 + sizeof(mgmt->u.auth)) { |
| event.auth.ies = mgmt->u.auth.variable; |
| event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth); |
| } |
| |
| wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event); |
| } |
| |
| |
| static unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv) |
| { |
| struct nl_msg *msg; |
| int ret; |
| struct nl80211_bss_info_arg arg; |
| |
| os_memset(&arg, 0, sizeof(arg)); |
| msg = nlmsg_alloc(); |
| if (!msg) |
| goto nla_put_failure; |
| |
| nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SCAN); |
| NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); |
| |
| arg.drv = drv; |
| ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg); |
| msg = NULL; |
| if (ret == 0) { |
| wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the " |
| "associated BSS from scan results: %u MHz", |
| arg.assoc_freq); |
| return arg.assoc_freq ? arg.assoc_freq : drv->assoc_freq; |
| } |
| wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d " |
| "(%s)", ret, strerror(-ret)); |
| nla_put_failure: |
| nlmsg_free(msg); |
| return drv->assoc_freq; |
| } |
| |
| |
| static void mlme_event_assoc(struct wpa_driver_nl80211_data *drv, |
| const u8 *frame, size_t len) |
| { |
| const struct ieee80211_mgmt *mgmt; |
| union wpa_event_data event; |
| u16 status; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Associate event"); |
| mgmt = (const struct ieee80211_mgmt *) frame; |
| if (len < 24 + sizeof(mgmt->u.assoc_resp)) { |
| wpa_printf(MSG_DEBUG, "nl80211: Too short association event " |
| "frame"); |
| return; |
| } |
| |
| status = le_to_host16(mgmt->u.assoc_resp.status_code); |
| if (status != WLAN_STATUS_SUCCESS) { |
| os_memset(&event, 0, sizeof(event)); |
| event.assoc_reject.bssid = mgmt->bssid; |
| if (len > 24 + sizeof(mgmt->u.assoc_resp)) { |
| event.assoc_reject.resp_ies = |
| (u8 *) mgmt->u.assoc_resp.variable; |
| event.assoc_reject.resp_ies_len = |
| len - 24 - sizeof(mgmt->u.assoc_resp); |
| } |
| event.assoc_reject.status_code = status; |
| |
| wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event); |
| return; |
| } |
| |
| drv->associated = 1; |
| os_memcpy(drv->bssid, mgmt->sa, ETH_ALEN); |
| |
| os_memset(&event, 0, sizeof(event)); |
| if (len > 24 + sizeof(mgmt->u.assoc_resp)) { |
| event.assoc_info.resp_ies = (u8 *) mgmt->u.assoc_resp.variable; |
| event.assoc_info.resp_ies_len = |
| len - 24 - sizeof(mgmt->u.assoc_resp); |
| } |
| |
| event.assoc_info.freq = drv->assoc_freq; |
| |
| wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event); |
| } |
| |
| |
| static void mlme_event_connect(struct wpa_driver_nl80211_data *drv, |
| enum nl80211_commands cmd, struct nlattr *status, |
| struct nlattr *addr, struct nlattr *req_ie, |
| struct nlattr *resp_ie) |
| { |
| union wpa_event_data event; |
| |
| if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) { |
| /* |
| * Avoid reporting two association events that would confuse |
| * the core code. |
| */ |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore connect event (cmd=%d) " |
| "when using userspace SME", cmd); |
| return; |
| } |
| |
| if (cmd == NL80211_CMD_CONNECT) |
| wpa_printf(MSG_DEBUG, "nl80211: Connect event"); |
| else if (cmd == NL80211_CMD_ROAM) |
| wpa_printf(MSG_DEBUG, "nl80211: Roam event"); |
| |
| os_memset(&event, 0, sizeof(event)); |
| if (cmd == NL80211_CMD_CONNECT && |
| nla_get_u16(status) != WLAN_STATUS_SUCCESS) { |
| if (addr) |
| event.assoc_reject.bssid = nla_data(addr); |
| if (resp_ie) { |
| event.assoc_reject.resp_ies = nla_data(resp_ie); |
| event.assoc_reject.resp_ies_len = nla_len(resp_ie); |
| } |
| event.assoc_reject.status_code = nla_get_u16(status); |
| wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event); |
| return; |
| } |
| |
| drv->associated = 1; |
| if (addr) |
| os_memcpy(drv->bssid, nla_data(addr), ETH_ALEN); |
| |
| if (req_ie) { |
| event.assoc_info.req_ies = nla_data(req_ie); |
| event.assoc_info.req_ies_len = nla_len(req_ie); |
| } |
| if (resp_ie) { |
| event.assoc_info.resp_ies = nla_data(resp_ie); |
| event.assoc_info.resp_ies_len = nla_len(resp_ie); |
| } |
| |
| event.assoc_info.freq = nl80211_get_assoc_freq(drv); |
| |
| wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event); |
| } |
| |
| |
| static void mlme_event_disconnect(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *reason, struct nlattr *addr, |
| struct nlattr *by_ap) |
| { |
| union wpa_event_data data; |
| unsigned int locally_generated = by_ap == NULL; |
| |
| if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) { |
| /* |
| * Avoid reporting two disassociation events that could |
| * confuse the core code. |
| */ |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect " |
| "event when using userspace SME"); |
| return; |
| } |
| |
| if (drv->ignore_next_local_disconnect) { |
| drv->ignore_next_local_disconnect = 0; |
| if (locally_generated) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect " |
| "event triggered during reassociation"); |
| return; |
| } |
| wpa_printf(MSG_WARNING, "nl80211: Was expecting local " |
| "disconnect but got another disconnect " |
| "event first"); |
| } |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Disconnect event"); |
| drv->associated = 0; |
| os_memset(&data, 0, sizeof(data)); |
| if (reason) |
| data.deauth_info.reason_code = nla_get_u16(reason); |
| data.deauth_info.locally_generated = by_ap == NULL; |
| wpa_supplicant_event(drv->ctx, EVENT_DEAUTH, &data); |
| } |
| |
| |
| static void mlme_event_ch_switch(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *freq, struct nlattr *type, |
| enum wpa_event_type event) |
| { |
| union wpa_event_data data; |
| int ht_enabled = 1; |
| int chan_offset = 0; |
| |
| wpa_printf(MSG_INFO, "nl80211: Channel switch event"); |
| |
| if (!freq || !type) |
| return; |
| |
| switch (nla_get_u32(type)) { |
| case NL80211_CHAN_NO_HT: |
| ht_enabled = 0; |
| break; |
| case NL80211_CHAN_HT20: |
| break; |
| case NL80211_CHAN_HT40PLUS: |
| chan_offset = 1; |
| break; |
| case NL80211_CHAN_HT40MINUS: |
| chan_offset = -1; |
| break; |
| } |
| |
| data.ch_switch.freq = nla_get_u32(freq); |
| data.ch_switch.ht_enabled = ht_enabled; |
| data.ch_switch.ch_offset = chan_offset; |
| |
| wpa_supplicant_event(drv->ctx, event, &data); |
| } |
| |
| |
| static void mlme_timeout_event(struct wpa_driver_nl80211_data *drv, |
| enum nl80211_commands cmd, struct nlattr *addr) |
| { |
| union wpa_event_data event; |
| enum wpa_event_type ev; |
| |
| if (nla_len(addr) != ETH_ALEN) |
| return; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: MLME event %d; timeout with " MACSTR, |
| cmd, MAC2STR((u8 *) nla_data(addr))); |
| |
| if (cmd == NL80211_CMD_AUTHENTICATE) |
| ev = EVENT_AUTH_TIMED_OUT; |
| else if (cmd == NL80211_CMD_ASSOCIATE) |
| ev = EVENT_ASSOC_TIMED_OUT; |
| else |
| return; |
| |
| os_memset(&event, 0, sizeof(event)); |
| os_memcpy(event.timeout_event.addr, nla_data(addr), ETH_ALEN); |
| wpa_supplicant_event(drv->ctx, ev, &event); |
| } |
| |
| |
| static void mlme_event_mgmt(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *freq, struct nlattr *sig, |
| const u8 *frame, size_t len) |
| { |
| const struct ieee80211_mgmt *mgmt; |
| union wpa_event_data event; |
| u16 fc, stype; |
| int ssi_signal = 0; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Frame event"); |
| mgmt = (const struct ieee80211_mgmt *) frame; |
| if (len < 24) { |
| wpa_printf(MSG_DEBUG, "nl80211: Too short action frame"); |
| return; |
| } |
| |
| fc = le_to_host16(mgmt->frame_control); |
| stype = WLAN_FC_GET_STYPE(fc); |
| |
| if (sig) |
| ssi_signal = (s32) nla_get_u32(sig); |
| |
| os_memset(&event, 0, sizeof(event)); |
| if (freq) { |
| event.rx_action.freq = nla_get_u32(freq); |
| drv->last_mgmt_freq = event.rx_action.freq; |
| } |
| if (stype == WLAN_FC_STYPE_ACTION) { |
| event.rx_action.da = mgmt->da; |
| event.rx_action.sa = mgmt->sa; |
| event.rx_action.bssid = mgmt->bssid; |
| event.rx_action.category = mgmt->u.action.category; |
| event.rx_action.data = &mgmt->u.action.category + 1; |
| event.rx_action.len = frame + len - event.rx_action.data; |
| wpa_supplicant_event(drv->ctx, EVENT_RX_ACTION, &event); |
| } else { |
| event.rx_mgmt.frame = frame; |
| event.rx_mgmt.frame_len = len; |
| event.rx_mgmt.ssi_signal = ssi_signal; |
| wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event); |
| } |
| } |
| |
| |
| static void mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *cookie, const u8 *frame, |
| size_t len, struct nlattr *ack) |
| { |
| union wpa_event_data event; |
| const struct ieee80211_hdr *hdr; |
| u16 fc; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Frame TX status event"); |
| if (!is_ap_interface(drv->nlmode)) { |
| u64 cookie_val; |
| |
| if (!cookie) |
| return; |
| |
| cookie_val = nla_get_u64(cookie); |
| wpa_printf(MSG_DEBUG, "nl80211: Action TX status:" |
| " cookie=0%llx%s (ack=%d)", |
| (long long unsigned int) cookie_val, |
| cookie_val == drv->send_action_cookie ? |
| " (match)" : " (unknown)", ack != NULL); |
| if (cookie_val != drv->send_action_cookie) |
| return; |
| } |
| |
| hdr = (const struct ieee80211_hdr *) frame; |
| fc = le_to_host16(hdr->frame_control); |
| |
| os_memset(&event, 0, sizeof(event)); |
| event.tx_status.type = WLAN_FC_GET_TYPE(fc); |
| event.tx_status.stype = WLAN_FC_GET_STYPE(fc); |
| event.tx_status.dst = hdr->addr1; |
| event.tx_status.data = frame; |
| event.tx_status.data_len = len; |
| event.tx_status.ack = ack != NULL; |
| wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event); |
| } |
| |
| |
| static void mlme_event_deauth_disassoc(struct wpa_driver_nl80211_data *drv, |
| enum wpa_event_type type, |
| const u8 *frame, size_t len) |
| { |
| const struct ieee80211_mgmt *mgmt; |
| union wpa_event_data event; |
| const u8 *bssid = NULL; |
| u16 reason_code = 0; |
| |
| if (type == EVENT_DEAUTH) |
| wpa_printf(MSG_DEBUG, "nl80211: Deauthenticate event"); |
| else |
| wpa_printf(MSG_DEBUG, "nl80211: Disassociate event"); |
| |
| mgmt = (const struct ieee80211_mgmt *) frame; |
| if (len >= 24) { |
| bssid = mgmt->bssid; |
| |
| if (drv->associated != 0 && |
| os_memcmp(bssid, drv->bssid, ETH_ALEN) != 0 && |
| os_memcmp(bssid, drv->auth_bssid, ETH_ALEN) != 0) { |
| /* |
| * We have presumably received this deauth as a |
| * response to a clear_state_mismatch() outgoing |
| * deauth. Don't let it take us offline! |
| */ |
| wpa_printf(MSG_DEBUG, "nl80211: Deauth received " |
| "from Unknown BSSID " MACSTR " -- ignoring", |
| MAC2STR(bssid)); |
| return; |
| } |
| } |
| |
| drv->associated = 0; |
| os_memset(&event, 0, sizeof(event)); |
| |
| /* Note: Same offset for Reason Code in both frame subtypes */ |
| if (len >= 24 + sizeof(mgmt->u.deauth)) |
| reason_code = le_to_host16(mgmt->u.deauth.reason_code); |
| |
| if (type == EVENT_DISASSOC) { |
| event.disassoc_info.locally_generated = |
| !os_memcmp(mgmt->sa, drv->first_bss.addr, ETH_ALEN); |
| event.disassoc_info.addr = bssid; |
| event.disassoc_info.reason_code = reason_code; |
| if (frame + len > mgmt->u.disassoc.variable) { |
| event.disassoc_info.ie = mgmt->u.disassoc.variable; |
| event.disassoc_info.ie_len = frame + len - |
| mgmt->u.disassoc.variable; |
| } |
| } else { |
| event.deauth_info.locally_generated = |
| !os_memcmp(mgmt->sa, drv->first_bss.addr, ETH_ALEN); |
| event.deauth_info.addr = bssid; |
| event.deauth_info.reason_code = reason_code; |
| if (frame + len > mgmt->u.deauth.variable) { |
| event.deauth_info.ie = mgmt->u.deauth.variable; |
| event.deauth_info.ie_len = frame + len - |
| mgmt->u.deauth.variable; |
| } |
| } |
| |
| wpa_supplicant_event(drv->ctx, type, &event); |
| } |
| |
| |
| static void mlme_event_unprot_disconnect(struct wpa_driver_nl80211_data *drv, |
| enum wpa_event_type type, |
| const u8 *frame, size_t len) |
| { |
| const struct ieee80211_mgmt *mgmt; |
| union wpa_event_data event; |
| u16 reason_code = 0; |
| |
| if (type == EVENT_UNPROT_DEAUTH) |
| wpa_printf(MSG_DEBUG, "nl80211: Unprot Deauthenticate event"); |
| else |
| wpa_printf(MSG_DEBUG, "nl80211: Unprot Disassociate event"); |
| |
| if (len < 24) |
| return; |
| |
| mgmt = (const struct ieee80211_mgmt *) frame; |
| |
| os_memset(&event, 0, sizeof(event)); |
| /* Note: Same offset for Reason Code in both frame subtypes */ |
| if (len >= 24 + sizeof(mgmt->u.deauth)) |
| reason_code = le_to_host16(mgmt->u.deauth.reason_code); |
| |
| if (type == EVENT_UNPROT_DISASSOC) { |
| event.unprot_disassoc.sa = mgmt->sa; |
| event.unprot_disassoc.da = mgmt->da; |
| event.unprot_disassoc.reason_code = reason_code; |
| } else { |
| event.unprot_deauth.sa = mgmt->sa; |
| event.unprot_deauth.da = mgmt->da; |
| event.unprot_deauth.reason_code = reason_code; |
| } |
| |
| wpa_supplicant_event(drv->ctx, type, &event); |
| } |
| |
| |
| static void mlme_event(struct wpa_driver_nl80211_data *drv, |
| enum nl80211_commands cmd, struct nlattr *frame, |
| struct nlattr *addr, struct nlattr *timed_out, |
| struct nlattr *freq, struct nlattr *ack, |
| struct nlattr *cookie, struct nlattr *sig) |
| { |
| if (timed_out && addr) { |
| mlme_timeout_event(drv, cmd, addr); |
| return; |
| } |
| |
| if (frame == NULL) { |
| wpa_printf(MSG_DEBUG, "nl80211: MLME event %d without frame " |
| "data", cmd); |
| return; |
| } |
| |
| wpa_printf(MSG_DEBUG, "nl80211: MLME event %d", cmd); |
| wpa_hexdump(MSG_MSGDUMP, "nl80211: MLME event frame", |
| nla_data(frame), nla_len(frame)); |
| |
| switch (cmd) { |
| case NL80211_CMD_AUTHENTICATE: |
| mlme_event_auth(drv, nla_data(frame), nla_len(frame)); |
| break; |
| case NL80211_CMD_ASSOCIATE: |
| mlme_event_assoc(drv, nla_data(frame), nla_len(frame)); |
| break; |
| case NL80211_CMD_DEAUTHENTICATE: |
| mlme_event_deauth_disassoc(drv, EVENT_DEAUTH, |
| nla_data(frame), nla_len(frame)); |
| break; |
| case NL80211_CMD_DISASSOCIATE: |
| mlme_event_deauth_disassoc(drv, EVENT_DISASSOC, |
| nla_data(frame), nla_len(frame)); |
| break; |
| case NL80211_CMD_FRAME: |
| mlme_event_mgmt(drv, freq, sig, nla_data(frame), |
| nla_len(frame)); |
| break; |
| case NL80211_CMD_FRAME_TX_STATUS: |
| mlme_event_mgmt_tx_status(drv, cookie, nla_data(frame), |
| nla_len(frame), ack); |
| break; |
| case NL80211_CMD_UNPROT_DEAUTHENTICATE: |
| mlme_event_unprot_disconnect(drv, EVENT_UNPROT_DEAUTH, |
| nla_data(frame), nla_len(frame)); |
| break; |
| case NL80211_CMD_UNPROT_DISASSOCIATE: |
| mlme_event_unprot_disconnect(drv, EVENT_UNPROT_DISASSOC, |
| nla_data(frame), nla_len(frame)); |
| break; |
| default: |
| break; |
| } |
| } |
| |
| |
| static void mlme_event_michael_mic_failure(struct i802_bss *bss, |
| struct nlattr *tb[]) |
| { |
| union wpa_event_data data; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: MLME event Michael MIC failure"); |
| os_memset(&data, 0, sizeof(data)); |
| if (tb[NL80211_ATTR_MAC]) { |
| wpa_hexdump(MSG_DEBUG, "nl80211: Source MAC address", |
| nla_data(tb[NL80211_ATTR_MAC]), |
| nla_len(tb[NL80211_ATTR_MAC])); |
| data.michael_mic_failure.src = nla_data(tb[NL80211_ATTR_MAC]); |
| } |
| if (tb[NL80211_ATTR_KEY_SEQ]) { |
| wpa_hexdump(MSG_DEBUG, "nl80211: TSC", |
| nla_data(tb[NL80211_ATTR_KEY_SEQ]), |
| nla_len(tb[NL80211_ATTR_KEY_SEQ])); |
| } |
| if (tb[NL80211_ATTR_KEY_TYPE]) { |
| enum nl80211_key_type key_type = |
| nla_get_u32(tb[NL80211_ATTR_KEY_TYPE]); |
| wpa_printf(MSG_DEBUG, "nl80211: Key Type %d", key_type); |
| if (key_type == NL80211_KEYTYPE_PAIRWISE) |
| data.michael_mic_failure.unicast = 1; |
| } else |
| data.michael_mic_failure.unicast = 1; |
| |
| if (tb[NL80211_ATTR_KEY_IDX]) { |
| u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]); |
| wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id); |
| } |
| |
| wpa_supplicant_event(bss->ctx, EVENT_MICHAEL_MIC_FAILURE, &data); |
| } |
| |
| |
| static void mlme_event_join_ibss(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *tb[]) |
| { |
| if (tb[NL80211_ATTR_MAC] == NULL) { |
| wpa_printf(MSG_DEBUG, "nl80211: No address in IBSS joined " |
| "event"); |
| return; |
| } |
| os_memcpy(drv->bssid, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN); |
| drv->associated = 1; |
| wpa_printf(MSG_DEBUG, "nl80211: IBSS " MACSTR " joined", |
| MAC2STR(drv->bssid)); |
| |
| wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL); |
| } |
| |
| |
| static void mlme_event_remain_on_channel(struct wpa_driver_nl80211_data *drv, |
| int cancel_event, struct nlattr *tb[]) |
| { |
| unsigned int freq, chan_type, duration; |
| union wpa_event_data data; |
| u64 cookie; |
| |
| if (tb[NL80211_ATTR_WIPHY_FREQ]) |
| freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]); |
| else |
| freq = 0; |
| |
| if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) |
| chan_type = nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]); |
| else |
| chan_type = 0; |
| |
| if (tb[NL80211_ATTR_DURATION]) |
| duration = nla_get_u32(tb[NL80211_ATTR_DURATION]); |
| else |
| duration = 0; |
| |
| if (tb[NL80211_ATTR_COOKIE]) |
| cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]); |
| else |
| cookie = 0; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel event (cancel=%d " |
| "freq=%u channel_type=%u duration=%u cookie=0x%llx (%s))", |
| cancel_event, freq, chan_type, duration, |
| (long long unsigned int) cookie, |
| cookie == drv->remain_on_chan_cookie ? "match" : "unknown"); |
| |
| if (cookie != drv->remain_on_chan_cookie) |
| return; /* not for us */ |
| |
| if (cancel_event) |
| drv->pending_remain_on_chan = 0; |
| |
| os_memset(&data, 0, sizeof(data)); |
| data.remain_on_channel.freq = freq; |
| data.remain_on_channel.duration = duration; |
| wpa_supplicant_event(drv->ctx, cancel_event ? |
| EVENT_CANCEL_REMAIN_ON_CHANNEL : |
| EVENT_REMAIN_ON_CHANNEL, &data); |
| } |
| |
| |
| static void send_scan_event(struct wpa_driver_nl80211_data *drv, int aborted, |
| struct nlattr *tb[]) |
| { |
| union wpa_event_data event; |
| struct nlattr *nl; |
| int rem; |
| struct scan_info *info; |
| #define MAX_REPORT_FREQS 50 |
| int freqs[MAX_REPORT_FREQS]; |
| int num_freqs = 0; |
| |
| if (drv->scan_for_auth) { |
| drv->scan_for_auth = 0; |
| wpa_printf(MSG_DEBUG, "nl80211: Scan results for missing " |
| "cfg80211 BSS entry"); |
| wpa_driver_nl80211_authenticate_retry(drv); |
| return; |
| } |
| |
| os_memset(&event, 0, sizeof(event)); |
| info = &event.scan_info; |
| info->aborted = aborted; |
| |
| if (tb[NL80211_ATTR_SCAN_SSIDS]) { |
| nla_for_each_nested(nl, tb[NL80211_ATTR_SCAN_SSIDS], rem) { |
| struct wpa_driver_scan_ssid *s = |
| &info->ssids[info->num_ssids]; |
| s->ssid = nla_data(nl); |
| s->ssid_len = nla_len(nl); |
| info->num_ssids++; |
| if (info->num_ssids == WPAS_MAX_SCAN_SSIDS) |
| break; |
| } |
| } |
| if (tb[NL80211_ATTR_SCAN_FREQUENCIES]) { |
| nla_for_each_nested(nl, tb[NL80211_ATTR_SCAN_FREQUENCIES], rem) |
| { |
| freqs[num_freqs] = nla_get_u32(nl); |
| num_freqs++; |
| if (num_freqs == MAX_REPORT_FREQS - 1) |
| break; |
| } |
| info->freqs = freqs; |
| info->num_freqs = num_freqs; |
| } |
| wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, &event); |
| } |
| |
| |
| static int get_link_signal(struct nl_msg *msg, void *arg) |
| { |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *sinfo[NL80211_STA_INFO_MAX + 1]; |
| static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { |
| [NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 }, |
| }; |
| struct nlattr *rinfo[NL80211_RATE_INFO_MAX + 1]; |
| static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = { |
| [NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 }, |
| [NL80211_RATE_INFO_MCS] = { .type = NLA_U8 }, |
| [NL80211_RATE_INFO_40_MHZ_WIDTH] = { .type = NLA_FLAG }, |
| [NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG }, |
| }; |
| struct wpa_signal_info *sig_change = arg; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| if (!tb[NL80211_ATTR_STA_INFO] || |
| nla_parse_nested(sinfo, NL80211_STA_INFO_MAX, |
| tb[NL80211_ATTR_STA_INFO], policy)) |
| return NL_SKIP; |
| if (!sinfo[NL80211_STA_INFO_SIGNAL]) |
| return NL_SKIP; |
| |
| sig_change->current_signal = |
| (s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL]); |
| |
| if (sinfo[NL80211_STA_INFO_TX_BITRATE]) { |
| if (nla_parse_nested(rinfo, NL80211_RATE_INFO_MAX, |
| sinfo[NL80211_STA_INFO_TX_BITRATE], |
| rate_policy)) { |
| sig_change->current_txrate = 0; |
| } else { |
| if (rinfo[NL80211_RATE_INFO_BITRATE]) { |
| sig_change->current_txrate = |
| nla_get_u16(rinfo[ |
| NL80211_RATE_INFO_BITRATE]) * 100; |
| } |
| } |
| } |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv, |
| struct wpa_signal_info *sig) |
| { |
| struct nl_msg *msg; |
| |
| sig->current_signal = -9999; |
| sig->current_txrate = 0; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -ENOMEM; |
| |
| nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_STATION); |
| |
| NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); |
| NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid); |
| |
| return send_and_recv_msgs(drv, msg, get_link_signal, sig); |
| nla_put_failure: |
| nlmsg_free(msg); |
| return -ENOBUFS; |
| } |
| |
| |
| static int get_link_noise(struct nl_msg *msg, void *arg) |
| { |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1]; |
| static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = { |
| [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 }, |
| [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 }, |
| }; |
| struct wpa_signal_info *sig_change = arg; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (!tb[NL80211_ATTR_SURVEY_INFO]) { |
| wpa_printf(MSG_DEBUG, "nl80211: survey data missing!"); |
| return NL_SKIP; |
| } |
| |
| if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX, |
| tb[NL80211_ATTR_SURVEY_INFO], |
| survey_policy)) { |
| wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested " |
| "attributes!"); |
| return NL_SKIP; |
| } |
| |
| if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) |
| return NL_SKIP; |
| |
| if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) != |
| sig_change->frequency) |
| return NL_SKIP; |
| |
| if (!sinfo[NL80211_SURVEY_INFO_NOISE]) |
| return NL_SKIP; |
| |
| sig_change->current_noise = |
| (s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]); |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv, |
| struct wpa_signal_info *sig_change) |
| { |
| struct nl_msg *msg; |
| |
| sig_change->current_noise = 9999; |
| sig_change->frequency = drv->assoc_freq; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -ENOMEM; |
| |
| nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY); |
| |
| NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); |
| |
| return send_and_recv_msgs(drv, msg, get_link_noise, sig_change); |
| nla_put_failure: |
| nlmsg_free(msg); |
| return -ENOBUFS; |
| } |
| |
| |
| static int get_noise_for_scan_results(struct nl_msg *msg, void *arg) |
| { |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1]; |
| static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = { |
| [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 }, |
| [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 }, |
| }; |
| struct wpa_scan_results *scan_results = arg; |
| struct wpa_scan_res *scan_res; |
| size_t i; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (!tb[NL80211_ATTR_SURVEY_INFO]) { |
| wpa_printf(MSG_DEBUG, "nl80211: Survey data missing"); |
| return NL_SKIP; |
| } |
| |
| if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX, |
| tb[NL80211_ATTR_SURVEY_INFO], |
| survey_policy)) { |
| wpa_printf(MSG_DEBUG, "nl80211: Failed to parse nested " |
| "attributes"); |
| return NL_SKIP; |
| } |
| |
| if (!sinfo[NL80211_SURVEY_INFO_NOISE]) |
| return NL_SKIP; |
| |
| if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) |
| return NL_SKIP; |
| |
| for (i = 0; i < scan_results->num; ++i) { |
| scan_res = scan_results->res[i]; |
| if (!scan_res) |
| continue; |
| if ((int) nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) != |
| scan_res->freq) |
| continue; |
| if (!(scan_res->flags & WPA_SCAN_NOISE_INVALID)) |
| continue; |
| scan_res->noise = (s8) |
| nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]); |
| scan_res->flags &= ~WPA_SCAN_NOISE_INVALID; |
| } |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int nl80211_get_noise_for_scan_results( |
| struct wpa_driver_nl80211_data *drv, |
| struct wpa_scan_results *scan_res) |
| { |
| struct nl_msg *msg; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -ENOMEM; |
| |
| nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY); |
| |
| NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex); |
| |
| return send_and_recv_msgs(drv, msg, get_noise_for_scan_results, |
| scan_res); |
| nla_put_failure: |
| nlmsg_free(msg); |
| return -ENOBUFS; |
| } |
| |
| |
| static void nl80211_cqm_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *tb[]) |
| { |
| static struct nla_policy cqm_policy[NL80211_ATTR_CQM_MAX + 1] = { |
| [NL80211_ATTR_CQM_RSSI_THOLD] = { .type = NLA_U32 }, |
| [NL80211_ATTR_CQM_RSSI_HYST] = { .type = NLA_U8 }, |
| [NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] = { .type = NLA_U32 }, |
| [NL80211_ATTR_CQM_PKT_LOSS_EVENT] = { .type = NLA_U32 }, |
| }; |
| struct nlattr *cqm[NL80211_ATTR_CQM_MAX + 1]; |
| enum nl80211_cqm_rssi_threshold_event event; |
| union wpa_event_data ed; |
| struct wpa_signal_info sig; |
| int res; |
| |
| if (tb[NL80211_ATTR_CQM] == NULL || |
| nla_parse_nested(cqm, NL80211_ATTR_CQM_MAX, tb[NL80211_ATTR_CQM], |
| cqm_policy)) { |
| wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid CQM event"); |
| return; |
| } |
| |
| os_memset(&ed, 0, sizeof(ed)); |
| |
| if (cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]) { |
| if (!tb[NL80211_ATTR_MAC]) |
| return; |
| os_memcpy(ed.low_ack.addr, nla_data(tb[NL80211_ATTR_MAC]), |
| ETH_ALEN); |
| wpa_supplicant_event(drv->ctx, EVENT_STATION_LOW_ACK, &ed); |
| return; |
| } |
| |
| if (cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] == NULL) |
| return; |
| event = nla_get_u32(cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]); |
| |
| if (event == NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH) { |
| wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor " |
| "event: RSSI high"); |
| ed.signal_change.above_threshold = 1; |
| } else if (event == NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW) { |
| wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor " |
| "event: RSSI low"); |
| ed.signal_change.above_threshold = 0; |
| } else |
| return; |
| |
| res = nl80211_get_link_signal(drv, &sig); |
| if (res == 0) { |
| ed.signal_change.current_signal = sig.current_signal; |
| ed.signal_change.current_txrate = sig.current_txrate; |
| wpa_printf(MSG_DEBUG, "nl80211: Signal: %d dBm txrate: %d", |
| sig.current_signal, sig.current_txrate); |
| } |
| |
| res = nl80211_get_link_noise(drv, &sig); |
| if (res == 0) { |
| ed.signal_change.current_noise = sig.current_noise; |
| wpa_printf(MSG_DEBUG, "nl80211: Noise: %d dBm", |
| sig.current_noise); |
| } |
| |
| wpa_supplicant_event(drv->ctx, EVENT_SIGNAL_CHANGE, &ed); |
| } |
| |
| static void nl80211_roaming_support_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr *tb[]) |
| { |
| int enabled; |
| enum wpa_event_type event; |
| |
| enabled = (tb[NL80211_ATTR_ROAMING_DISABLED] == NULL); |
| |
| if (enabled) |
| event = EVENT_ROAMING_ENABLED; |
| else |
| event = EVENT_ROAMING_DISABLED; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: roaming %s", |
| enabled ? "enabled" : "disabled"); |
| |
| wpa_supplicant_event(drv->ctx, event, NULL); |
| } |
| |
| static void nl80211_new_station_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| u8 *addr; |
| union wpa_event_data data; |
| |
| if (tb[NL80211_ATTR_MAC] == NULL) |
| return; |
| addr = nla_data(tb[NL80211_ATTR_MAC]); |
| wpa_printf(MSG_DEBUG, "nl80211: New station " MACSTR, MAC2STR(addr)); |
| |
| if (is_ap_interface(drv->nlmode) && drv->device_ap_sme) { |
| u8 *ies = NULL; |
| size_t ies_len = 0; |
| if (tb[NL80211_ATTR_IE]) { |
| ies = nla_data(tb[NL80211_ATTR_IE]); |
| ies_len = nla_len(tb[NL80211_ATTR_IE]); |
| } |
| wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len); |
| drv_event_assoc(drv->ctx, addr, ies, ies_len, 0); |
| return; |
| } |
| |
| if (drv->nlmode != NL80211_IFTYPE_ADHOC) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN); |
| wpa_supplicant_event(drv->ctx, EVENT_IBSS_RSN_START, &data); |
| } |
| |
| |
| static void nl80211_del_station_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| u8 *addr; |
| union wpa_event_data data; |
| |
| if (tb[NL80211_ATTR_MAC] == NULL) |
| return; |
| addr = nla_data(tb[NL80211_ATTR_MAC]); |
| wpa_printf(MSG_DEBUG, "nl80211: Delete station " MACSTR, |
| MAC2STR(addr)); |
| |
| if (is_ap_interface(drv->nlmode) && drv->device_ap_sme) { |
| drv_event_disassoc(drv->ctx, addr); |
| return; |
| } |
| |
| if (drv->nlmode != NL80211_IFTYPE_ADHOC) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN); |
| wpa_supplicant_event(drv->ctx, EVENT_IBSS_PEER_LOST, &data); |
| } |
| |
| |
| static void nl80211_rekey_offload_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| struct nlattr *rekey_info[NUM_NL80211_REKEY_DATA]; |
| static struct nla_policy rekey_policy[NUM_NL80211_REKEY_DATA] = { |
| [NL80211_REKEY_DATA_KEK] = { |
| .minlen = NL80211_KEK_LEN, |
| .maxlen = NL80211_KEK_LEN, |
| }, |
| [NL80211_REKEY_DATA_KCK] = { |
| .minlen = NL80211_KCK_LEN, |
| .maxlen = NL80211_KCK_LEN, |
| }, |
| [NL80211_REKEY_DATA_REPLAY_CTR] = { |
| .minlen = NL80211_REPLAY_CTR_LEN, |
| .maxlen = NL80211_REPLAY_CTR_LEN, |
| }, |
| }; |
| union wpa_event_data data; |
| |
| if (!tb[NL80211_ATTR_MAC]) |
| return; |
| if (!tb[NL80211_ATTR_REKEY_DATA]) |
| return; |
| if (nla_parse_nested(rekey_info, MAX_NL80211_REKEY_DATA, |
| tb[NL80211_ATTR_REKEY_DATA], rekey_policy)) |
| return; |
| if (!rekey_info[NL80211_REKEY_DATA_REPLAY_CTR]) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| data.driver_gtk_rekey.bssid = nla_data(tb[NL80211_ATTR_MAC]); |
| wpa_printf(MSG_DEBUG, "nl80211: Rekey offload event for BSSID " MACSTR, |
| MAC2STR(data.driver_gtk_rekey.bssid)); |
| data.driver_gtk_rekey.replay_ctr = |
| nla_data(rekey_info[NL80211_REKEY_DATA_REPLAY_CTR]); |
| wpa_hexdump(MSG_DEBUG, "nl80211: Rekey offload - Replay Counter", |
| data.driver_gtk_rekey.replay_ctr, NL80211_REPLAY_CTR_LEN); |
| wpa_supplicant_event(drv->ctx, EVENT_DRIVER_GTK_REKEY, &data); |
| } |
| |
| |
| static void nl80211_pmksa_candidate_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| struct nlattr *cand[NUM_NL80211_PMKSA_CANDIDATE]; |
| static struct nla_policy cand_policy[NUM_NL80211_PMKSA_CANDIDATE] = { |
| [NL80211_PMKSA_CANDIDATE_INDEX] = { .type = NLA_U32 }, |
| [NL80211_PMKSA_CANDIDATE_BSSID] = { |
| .minlen = ETH_ALEN, |
| .maxlen = ETH_ALEN, |
| }, |
| [NL80211_PMKSA_CANDIDATE_PREAUTH] = { .type = NLA_FLAG }, |
| }; |
| union wpa_event_data data; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: PMKSA candidate event"); |
| |
| if (!tb[NL80211_ATTR_PMKSA_CANDIDATE]) |
| return; |
| if (nla_parse_nested(cand, MAX_NL80211_PMKSA_CANDIDATE, |
| tb[NL80211_ATTR_PMKSA_CANDIDATE], cand_policy)) |
| return; |
| if (!cand[NL80211_PMKSA_CANDIDATE_INDEX] || |
| !cand[NL80211_PMKSA_CANDIDATE_BSSID]) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| os_memcpy(data.pmkid_candidate.bssid, |
| nla_data(cand[NL80211_PMKSA_CANDIDATE_BSSID]), ETH_ALEN); |
| data.pmkid_candidate.index = |
| nla_get_u32(cand[NL80211_PMKSA_CANDIDATE_INDEX]); |
| data.pmkid_candidate.preauth = |
| cand[NL80211_PMKSA_CANDIDATE_PREAUTH] != NULL; |
| wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE, &data); |
| } |
| |
| |
| static void nl80211_client_probe_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| union wpa_event_data data; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Probe client event"); |
| |
| if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_ACK]) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| os_memcpy(data.client_poll.addr, |
| nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN); |
| |
| wpa_supplicant_event(drv->ctx, EVENT_DRIVER_CLIENT_POLL_OK, &data); |
| } |
| |
| static void nl80211_req_ch_sw_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| union wpa_event_data data; |
| |
| if (!tb[NL80211_ATTR_WIPHY_FREQ]) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| data.ch_switch.freq = nla_get_u16(tb[NL80211_ATTR_WIPHY_FREQ]); |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Requst to switch to %d freq", |
| data.ch_switch.freq); |
| |
| wpa_supplicant_event(drv->ctx, EVENT_REQ_CH_SW, &data); |
| } |
| |
| static void nl80211_tdls_oper_event(struct wpa_driver_nl80211_data *drv, |
| struct nlattr **tb) |
| { |
| union wpa_event_data data; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: TDLS operation event"); |
| |
| if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_TDLS_OPERATION]) |
| return; |
| |
| os_memset(&data, 0, sizeof(data)); |
| os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN); |
| switch (nla_get_u8(tb[NL80211_ATTR_TDLS_OPERATION])) { |
| case NL80211_TDLS_SETUP: |
| wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer " |
| MACSTR, MAC2STR(data.tdls.peer)); |
| data.tdls.oper = TDLS_REQUEST_SETUP; |
| break; |
| case NL80211_TDLS_TEARDOWN: |
| wpa_printf(MSG_DEBUG, "nl80211: TDLS teardown request for peer " |
| MACSTR, MAC2STR(data.tdls.peer)); |
| data.tdls.oper = TDLS_REQUEST_TEARDOWN; |
| break; |
| default: |
| wpa_printf(MSG_DEBUG, "nl80211: Unsupported TDLS operatione " |
| "event"); |
| return; |
| } |
| if (tb[NL80211_ATTR_REASON_CODE]) { |
| data.tdls.reason_code = |
| nla_get_u16(tb[NL80211_ATTR_REASON_CODE]); |
| } |
| |
| wpa_supplicant_event(drv->ctx, EVENT_TDLS, &data); |
| } |
| |
| |
| static void nl80211_spurious_frame(struct i802_bss *bss, struct nlattr **tb, |
| int wds) |
| { |
| struct wpa_driver_nl80211_data *drv = bss->drv; |
| union wpa_event_data event; |
| |
| if (!tb[NL80211_ATTR_MAC]) |
| return; |
| |
| os_memset(&event, 0, sizeof(event)); |
| event.rx_from_unknown.bssid = bss->addr; |
| event.rx_from_unknown.addr = nla_data(tb[NL80211_ATTR_MAC]); |
| event.rx_from_unknown.wds = wds; |
| |
| wpa_supplicant_event(drv->ctx, EVENT_RX_FROM_UNKNOWN, &event); |
| } |
| |
| |
| static void do_process_drv_event(struct i802_bss *bss, int cmd, |
| struct nlattr **tb) |
| { |
| struct wpa_driver_nl80211_data *drv = bss->drv; |
| |
| if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED && |
| (cmd == NL80211_CMD_NEW_SCAN_RESULTS || |
| cmd == NL80211_CMD_SCAN_ABORTED)) { |
| wpa_driver_nl80211_set_mode(&drv->first_bss, |
| drv->ap_scan_as_station); |
| drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED; |
| } |
| |
| switch (cmd) { |
| case NL80211_CMD_TRIGGER_SCAN: |
| wpa_printf(MSG_DEBUG, "nl80211: Scan trigger"); |
| break; |
| case NL80211_CMD_START_SCHED_SCAN: |
| wpa_printf(MSG_DEBUG, "nl80211: Sched scan started"); |
| break; |
| case NL80211_CMD_SCHED_SCAN_STOPPED: |
| wpa_printf(MSG_DEBUG, "nl80211: Sched scan stopped"); |
| wpa_supplicant_event(drv->ctx, EVENT_SCHED_SCAN_STOPPED, NULL); |
| break; |
| case NL80211_CMD_NEW_SCAN_RESULTS: |
| wpa_printf(MSG_DEBUG, "nl80211: New scan results available"); |
| drv->scan_complete_events = 1; |
| eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, |
| drv->ctx); |
| send_scan_event(drv, 0, tb); |
| break; |
| case NL80211_CMD_SCHED_SCAN_RESULTS: |
| wpa_printf(MSG_DEBUG, |
| "nl80211: New sched scan results available"); |
| send_scan_event(drv, 0, tb); |
| break; |
| case NL80211_CMD_SCAN_ABORTED: |
| wpa_printf(MSG_DEBUG, "nl80211: Scan aborted"); |
| /* |
| * Need to indicate that scan results are available in order |
| * not to make wpa_supplicant stop its scanning. |
| */ |
| eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, |
| drv->ctx); |
| send_scan_event(drv, 1, tb); |
| break; |
| case NL80211_CMD_AUTHENTICATE: |
| case NL80211_CMD_ASSOCIATE: |
| case NL80211_CMD_DEAUTHENTICATE: |
| case NL80211_CMD_DISASSOCIATE: |
| case NL80211_CMD_FRAME_TX_STATUS: |
| case NL80211_CMD_UNPROT_DEAUTHENTICATE: |
| case NL80211_CMD_UNPROT_DISASSOCIATE: |
| mlme_event(drv, cmd, tb[NL80211_ATTR_FRAME], |
| tb[NL80211_ATTR_MAC], tb[NL80211_ATTR_TIMED_OUT], |
| tb[NL80211_ATTR_WIPHY_FREQ], tb[NL80211_ATTR_ACK], |
| tb[NL80211_ATTR_COOKIE], |
| tb[NL80211_ATTR_RX_SIGNAL_DBM]); |
| break; |
| case NL80211_CMD_CONNECT: |
| case NL80211_CMD_ROAM: |
| mlme_event_connect(drv, cmd, |
| tb[NL80211_ATTR_STATUS_CODE], |
| tb[NL80211_ATTR_MAC], |
| tb[NL80211_ATTR_REQ_IE], |
| tb[NL80211_ATTR_RESP_IE]); |
| break; |
| case NL80211_CMD_CH_SWITCH_NOTIFY: |
| mlme_event_ch_switch(drv, tb[NL80211_ATTR_WIPHY_FREQ], |
| tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE], |
| EVENT_CH_SWITCH); |
| break; |
| case NL80211_CMD_REQ_CH_SW: |
| nl80211_req_ch_sw_event(drv, tb); |
| break; |
| case NL80211_CMD_DISCONNECT: |
| mlme_event_disconnect(drv, tb[NL80211_ATTR_REASON_CODE], |
| tb[NL80211_ATTR_MAC], |
| tb[NL80211_ATTR_DISCONNECTED_BY_AP]); |
| break; |
| case NL80211_CMD_MICHAEL_MIC_FAILURE: |
| mlme_event_michael_mic_failure(bss, tb); |
| break; |
| case NL80211_CMD_JOIN_IBSS: |
| mlme_event_join_ibss(drv, tb); |
| break; |
| case NL80211_CMD_REMAIN_ON_CHANNEL: |
| mlme_event_remain_on_channel(drv, 0, tb); |
| break; |
| case NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL: |
| mlme_event_remain_on_channel(drv, 1, tb); |
| break; |
| case NL80211_CMD_NOTIFY_CQM: |
| nl80211_cqm_event(drv, tb); |
| break; |
| case NL80211_CMD_ROAMING_SUPPORT: |
| nl80211_roaming_support_event(drv, tb); |
| break; |
| case NL80211_CMD_REG_CHANGE: |
| wpa_printf(MSG_DEBUG, "nl80211: Regulatory domain change"); |
| wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED, |
| NULL); |
| break; |
| case NL80211_CMD_REG_BEACON_HINT: |
| wpa_printf(MSG_DEBUG, "nl80211: Regulatory beacon hint"); |
| wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED, |
| NULL); |
| break; |
| case NL80211_CMD_NEW_STATION: |
| nl80211_new_station_event(drv, tb); |
| break; |
| case NL80211_CMD_DEL_STATION: |
| nl80211_del_station_event(drv, tb); |
| break; |
| case NL80211_CMD_SET_REKEY_OFFLOAD: |
| nl80211_rekey_offload_event(drv, tb); |
| break; |
| case NL80211_CMD_PMKSA_CANDIDATE: |
| nl80211_pmksa_candidate_event(drv, tb); |
| break; |
| case NL80211_CMD_PROBE_CLIENT: |
| nl80211_client_probe_event(drv, tb); |
| break; |
| case NL80211_CMD_TDLS_OPER: |
| nl80211_tdls_oper_event(drv, tb); |
| break; |
| default: |
| wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event " |
| "(cmd=%d)", cmd); |
| break; |
| } |
| } |
| |
| |
| static int process_drv_event(struct nl_msg *msg, void *arg) |
| { |
| struct wpa_driver_nl80211_data *drv = arg; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct i802_bss *bss; |
| int ifidx = -1; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (tb[NL80211_ATTR_IFINDEX]) |
| ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]); |
| |
| for (bss = &drv->first_bss; bss; bss = bss->next) { |
| if (ifidx == -1 || ifidx == bss->ifindex) { |
| do_process_drv_event(bss, gnlh->cmd, tb); |
| return NL_SKIP; |
| } |
| } |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Ignored event (cmd=%d) for foreign " |
| "interface (ifindex %d)", gnlh->cmd, ifidx); |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int process_global_event(struct nl_msg *msg, void *arg) |
| { |
| struct nl80211_global *global = arg; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct wpa_driver_nl80211_data *drv, *tmp; |
| int ifidx = -1; |
| struct i802_bss *bss; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (tb[NL80211_ATTR_IFINDEX]) |
| ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]); |
| |
| dl_list_for_each_safe(drv, tmp, &global->interfaces, |
| struct wpa_driver_nl80211_data, list) { |
| for (bss = &drv->first_bss; bss; bss = bss->next) { |
| if (ifidx == -1 || ifidx == bss->ifindex) { |
| do_process_drv_event(bss, gnlh->cmd, tb); |
| return NL_SKIP; |
| } |
| } |
| } |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int process_bss_event(struct nl_msg *msg, void *arg) |
| { |
| struct i802_bss *bss = arg; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| switch (gnlh->cmd) { |
| case NL80211_CMD_FRAME: |
| case NL80211_CMD_FRAME_TX_STATUS: |
| mlme_event(bss->drv, gnlh->cmd, tb[NL80211_ATTR_FRAME], |
| tb[NL80211_ATTR_MAC], tb[NL80211_ATTR_TIMED_OUT], |
| tb[NL80211_ATTR_WIPHY_FREQ], tb[NL80211_ATTR_ACK], |
| tb[NL80211_ATTR_COOKIE], |
| tb[NL80211_ATTR_RX_SIGNAL_DBM]); |
| break; |
| case NL80211_CMD_UNEXPECTED_FRAME: |
| nl80211_spurious_frame(bss, tb, 0); |
| break; |
| case NL80211_CMD_UNEXPECTED_4ADDR_FRAME: |
| nl80211_spurious_frame(bss, tb, 1); |
| break; |
| default: |
| wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event " |
| "(cmd=%d)", gnlh->cmd); |
| break; |
| } |
| |
| return NL_SKIP; |
| } |
| |
| |
| static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx, |
| void *handle) |
| { |
| struct nl_cb *cb = eloop_ctx; |
| |
| wpa_printf(MSG_DEBUG, "nl80211: Event message available"); |
| |
| nl_recvmsgs(handle, cb); |
| } |
| |
| |
| /** |
| * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain |
| * @priv: driver_nl80211 private data |
| * @alpha2_arg: country to which to switch to |
| * Returns: 0 on success, -1 on failure |
| * |
| * This asks nl80211 to set the regulatory domain for given |
| * country ISO / IEC alpha2. |
| */ |
| static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg) |
| { |
| struct i802_bss *bss = priv; |
| struct wpa_driver_nl80211_data *drv = bss->drv; |
| char alpha2[3]; |
| struct nl_msg *msg; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -ENOMEM; |
| |
| alpha2[0] = alpha2_arg[0]; |
| alpha2[1] = alpha2_arg[1]; |
| alpha2[2] = '\0'; |
| |
| nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG); |
| |
| NLA_PUT_STRING(msg, NL80211_ATTR_REG_ALPHA2, alpha2); |
| if (send_and_recv_msgs(drv, msg, NULL, NULL)) |
| return -EINVAL; |
| return 0; |
| nla_put_failure: |
| nlmsg_free(msg); |
| return -EINVAL; |
| } |
| |
| |
| struct wiphy_info_data { |
| struct wpa_driver_capa *capa; |
| |
| unsigned int error:1; |
| unsigned int device_ap_sme:1; |
| unsigned int poll_command_supported:1; |
| unsigned int data_tx_status:1; |
| unsigned int monitor_supported:1; |
| }; |
| |
| |
| static unsigned int probe_resp_offload_support(int supp_protocols) |
| { |
| unsigned int prot = 0; |
| |
| if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS) |
| prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; |
| if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS2) |
| prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; |
| if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_P2P) |
| prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; |
| if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_80211U) |
| prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; |
| |
| return prot; |
| } |
| |
| |
| static int wiphy_info_handler(struct nl_msg *msg, void *arg) |
| { |
| struct nlattr *tb[NL80211_ATTR_MAX + 1]; |
| struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg)); |
| struct wiphy_info_data *info = arg; |
| int p2p_go_supported = 0, p2p_client_supported = 0; |
| int p2p_concurrent = 0, p2p_multichan_concurrent = 0; |
| int auth_supported = 0, connect_supported = 0; |
| struct wpa_driver_capa *capa = info->capa; |
| static struct nla_policy |
| iface_combination_policy[NUM_NL80211_IFACE_COMB] = { |
| [NL80211_IFACE_COMB_LIMITS] = { .type = NLA_NESTED }, |
| [NL80211_IFACE_COMB_MAXNUM] = { .type = NLA_U32 }, |
| [NL80211_IFACE_COMB_STA_AP_BI_MATCH] = { .type = NLA_FLAG }, |
| [NL80211_IFACE_COMB_NUM_CHANNELS] = { .type = NLA_U32 }, |
| }, |
| iface_limit_policy[NUM_NL80211_IFACE_LIMIT] = { |
| [NL80211_IFACE_LIMIT_TYPES] = { .type = NLA_NESTED }, |
| [NL80211_IFACE_LIMIT_MAX] = { .type = NLA_U32 }, |
| }; |
| |
| nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0), |
| genlmsg_attrlen(gnlh, 0), NULL); |
| |
| if (tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS]) |
| capa->max_scan_ssids = |
| nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS]); |
| |
| if (tb[NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS]) |
| capa->max_sched_scan_ssids = |
| nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS]); |
| |
| if (tb[NL80211_ATTR_MAX_MATCH_SETS]) |
| capa->max_match_sets = |
| nla_get_u8(tb[NL80211_ATTR_MAX_MATCH_SETS]); |
| |
| if (tb[NL80211_ATTR_SUPPORTED_IFTYPES]) { |
| struct nlattr *nl_mode; |
| int i; |
| nla_for_each_nested(nl_mode, |
| tb[NL80211_ATTR_SUPPORTED_IFTYPES], i) { |
| switch (nla_type(nl_mode)) { |
| case NL80211_IFTYPE_AP: |
| capa->flags |= WPA_DRIVER_FLAGS_AP; |
| break; |
| case NL80211_IFTYPE_P2P_GO: |
| p2p_go_supported = 1; |
| break; |
| case NL80211_IFTYPE_P2P_CLIENT: |
| p2p_client_supported = 1; |
| break; |
| case NL80211_IFTYPE_MONITOR: |
| info->monitor_supported = 1; |
| break; |
| } |
| } |
| } |
| |
| if (tb[NL80211_ATTR_INTERFACE_COMBINATIONS]) { |
| struct nlattr *nl_combi; |
| int rem_combi; |
| |
| nla_for_each_nested(nl_combi, |
| tb[NL80211_ATTR_INTERFACE_COMBINATIONS], |
| rem_combi) { |
| struct nlattr *tb_comb[NUM_NL80211_IFACE_COMB]; |
| struct nlattr *tb_limit[NUM_NL80211_IFACE_LIMIT]; |
| struct nlattr *nl_limit, *nl_mode; |
| int err, rem_limit, rem_mode; |
| int combination_has_p2p = 0, combination_has_mgd = 0; |
| |
| err = nla_parse_nested(tb_comb, MAX_NL80211_IFACE_COMB, |
| nl_combi, |
| iface_combination_policy); |
| if (err || !tb_comb[NL80211_IFACE_COMB_LIMITS] || |
| !tb_comb[NL80211_IFACE_COMB_MAXNUM] || |
| !tb_comb[NL80211_IFACE_COMB_NUM_CHANNELS]) |
| goto broken_combination; |
| |
| nla_for_each_nested(nl_limit, |
| tb_comb[NL80211_IFACE_COMB_LIMITS], |
| rem_limit) { |
| err = nla_parse_nested(tb_limit, |
| MAX_NL80211_IFACE_LIMIT, |
| nl_limit, |
| iface_limit_policy); |
| if (err || |
| !tb_limit[NL80211_IFACE_LIMIT_TYPES]) |
| goto broken_combination; |
| |
| nla_for_each_nested( |
| nl_mode, |
| tb_limit[NL80211_IFACE_LIMIT_TYPES], |
| rem_mode) { |
| int ift = nla_type(nl_mode); |
| if (ift == NL80211_IFTYPE_P2P_GO || |
| ift == NL80211_IFTYPE_P2P_CLIENT) |
| combination_has_p2p = 1; |
| if (ift == NL80211_IFTYPE_STATION) |
| combination_has_mgd = 1; |
| } |
| if (combination_has_p2p && combination_has_mgd) |
| break; |
| } |
| |
| if (combination_has_p2p && combination_has_mgd) { |
| p2p_concurrent = 1; |
| if (nla_get_u32(tb_comb[NL80211_IFACE_COMB_NUM_CHANNELS]) > 1) |
| p2p_multichan_concurrent = 1; |
| break; |
| } |
| |
| broken_combination: |
| ; |
| } |
| } |
| |
| if (tb[NL80211_ATTR_SUPPORTED_COMMANDS]) { |
| struct nlattr *nl_cmd; |
| int i; |
| |
| nla_for_each_nested(nl_cmd, |
| tb[NL80211_ATTR_SUPPORTED_COMMANDS], i) { |
| switch (nla_get_u32(nl_cmd)) { |
| case NL80211_CMD_AUTHENTICATE: |
| auth_supported = 1; |
| break; |
| case NL80211_CMD_CONNECT: |
| connect_supported = 1; |
| break; |
| case NL80211_CMD_START_SCHED_SCAN: |
| capa->sched_scan_supported = 1; |
| break; |
| case NL80211_CMD_PROBE_CLIENT: |
| info->poll_command_supported = 1; |
| break; |
| } |
| } |
| } |
| |
| if (tb[NL80211_ATTR_OFFCHANNEL_TX_OK]) { |
| wpa_printf(MSG_DEBUG, "nl80211: Using driver-based " |
| "off-channel TX"); |
| capa->flags |= WPA_DRIVER_FLAGS_OFFCHANNEL_TX; |
| } |
| |
| if (tb[NL80211_ATTR_ROAM_SUPPORT]) { |
| wpa_printf(MSG_DEBUG, "nl80211: Using driver-based roaming"); |
| capa->flags |= WPA_DRIVER_FLAGS_BSS_SELECTION; |
| } |
| |
| /* default to 5000 since early versions of mac80211 don't set it */ |
| capa->max_remain_on_chan = 5000; |
| |
| if (tb[NL80211_ATTR_SUPPORT_AP_UAPSD]) |
| capa->flags |= WPA_DRIVER_FLAGS_AP_UAPSD; |
| |
| if (tb[NL80211_ATTR_MAX_REMAIN_ON_CHANNEL_DURATION]) |
| capa->max_remain_on_chan = |
| nla_get_u32(tb[NL80211_ATTR_MAX_REMAIN_ON_CHANNEL_DURATION]); |
| |
| if (auth_supported) |
| capa->flags |= WPA_DRIVER_FLAGS_SME; |
| else if (!connect_supported) { |
| wpa_printf(MSG_INFO, "nl80211: Driver does not support " |
| "authentication/association or connect commands"); |
| info->error = 1; |
| } |
| |
| if (p2p_go_supported && p2p_client_supported) |
| capa->flags |= WPA_DRIVER_FLAGS_P2P_CAPABLE; |
| if (p2p_concurrent) { |
| wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group " |
| "interface (driver advertised support)"); |
| capa->flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT; |
| capa->flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P; |
| |
| if (p2p_multichan_concurrent) { |
| wpa_printf(MSG_DEBUG, "nl80211: Enable multi-channel " |
| "concurrent (driver advertised support)"); |
| capa->flags |= |
| WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT; |
| } |
| } |
| |
| if (tb[NL80211_ATTR_TDLS_SUPPORT]) { |
| wpa_printf(MSG_DEBUG, "nl80211: TDLS supported"); |
| capa->flags |= WPA_DRIVER_FLAGS_TDLS_SUPPORT; |
| |
| if (tb[NL80211_ATTR_TDLS_EXTERNAL_SETUP]) { |
| wpa_printf(MSG_DEBUG, "nl80211: TDLS external setup"); |
| capa->flags |= |
| WPA_DRIVER_FLAGS_TDLS_EXTERNAL_SETUP; |
| } |
| } |
| |
| if (tb[NL80211_ATTR_DEVICE_AP_SME]) |
| info->device_ap_sme = 1; |
| |
| if (tb[NL80211_ATTR_FEATURE_FLAGS]) { |
| u32 flags = nla_get_u32(tb[NL80211_ATTR_FEATURE_FLAGS]); |
| |
| if (flags & NL80211_FEATURE_SK_TX_STATUS) |
| info->data_tx_status = 1; |
| |
| if (flags & NL80211_FEATURE_INACTIVITY_TIMER) |
| capa->flags |= WPA_DRIVER_FLAGS_INACTIVITY_TIMER; |
| |
| if (flags & NL80211_FEATURE_SAE) |
| capa->flags |= WPA_DRIVER_FLAGS_SAE; |
| |
| if (flags & NL80211_FEATURE_NEED_OBSS_SCAN) |
| capa->flags |= WPA_DRIVER_FLAGS_OBSS_SCAN; |
| } |
| |
| if (tb[NL80211_ATTR_PROBE_RESP_OFFLOAD]) { |
| int protocols = |
| nla_get_u32(tb[NL80211_ATTR_PROBE_RESP_OFFLOAD]); |
| wpa_printf(MSG_DEBUG, "nl80211: Supports Probe Response " |
| "offload in AP mode"); |
| capa->flags |= WPA_DRIVER_FLAGS_PROBE_RESP_OFFLOAD; |
| capa->probe_resp_offloads = |
| probe_resp_offload_support(protocols); |
| } |
| |
| return NL_SKIP; |
| } |
| |
| |
| static int wpa_driver_nl80211_get_info(struct wpa_driver_nl80211_data *drv, |
| struct wiphy_info_data *info) |
| { |
| struct nl_msg *msg; |
| |
| os_memset(info, 0, sizeof(*info)); |
| info->capa = &drv->capa; |
| |
| msg = nlmsg_alloc(); |
| if (!msg) |
| return -1; |
| |
| nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_WIPHY); |
| |
| NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->first_bss.ifindex); |
| |
| if (send_and_recv_msgs(drv, msg, wiphy_info_handler, info) == 0) |
| return 0; |
| msg = NULL; |
| nla_put_failure: |
| nlmsg_free(msg); |
| return -1; |
| } |
| |
| |
| static int wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv) |
| { |
| struct wiphy_info_data info; |
| if (wpa_driver_nl80211_get_info(drv, &info)) |
| return -1; |
| |
| if (info.error) |
| return -1; |
| |
| drv->has_capability = 1; |
| /* For now, assume TKIP, CCMP, WPA, WPA2 are supported */ |
| drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA | |
| WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK | |
| WPA_DRIVER_CAPA_KEY_MGMT_WPA2 | |
| WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK; |
| drv->capa.enc = WPA_DRIVER_CAPA_ENC_WEP40 | |
| WPA_DRIVER_CAPA_ENC_WEP104 | |
| WPA_DRIVER_CAPA_ENC_TKIP | |
| WPA_DRIVER_CAPA_ENC_CCMP; |
| drv->capa.auth = WPA_DRIVER_AUTH_OPEN | |
| WPA_DRIVER_AUTH_SHARED | |
| WPA_DRIVER_AUTH_LEAP; |
| |
| drv->capa.flags |= WPA_DRIVER_FLAGS_SANE_ERROR_CODES; |
| drv->capa.flags |= WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC_DONE; |
| drv->capa.flags |= WPA_DRIVER_FLAGS_EAPOL_TX_STATUS; |
| |
| if (!info.device_ap_sme) { |
| drv->capa.flags |= WPA_DRIVER_FLAGS_DEAUTH_TX_STATUS; |
| |
| /* |
| * No AP SME is currently assumed to also indicate no AP MLME |
| * in the driver/firmware. |
| */ |
| drv->capa.flags |= WPA_DRIVER_FLAGS_AP_MLME; |
| } |
| |
| drv->device_ap_sme = info.device_ap_sme; |
| drv->poll_command_supported = info.poll_command_supported; |
| drv->data_tx_status = info.data_tx_status; |
| |
| /* |
| * If poll command and tx status are supported, mac80211 is new enough |
| * to have everything we need to not need monitor interfaces. |
| */ |
| drv->use_monitor = !info.poll_command_supported || !info.data_tx_status; |
| |
| if (drv->device_ap_sme && drv->use_monitor) { |
| /* |
| * Non-mac80211 drivers may not support monitor interface. |
| * Make sure we do not get stuck with incorrect capability here |
| * by explicitly testing this. |
| */ |
| if (!info.monitor_supported) { |
| wpa_printf(MSG_DEBUG, "nl80211: Disable use_monitor " |
| "with device_ap_sme since no monitor mode " |
| "support detected"); |
| drv->use_monitor = 0; |
| } |
| } |
| |
| /* |
| * If we aren't going to use monitor interfaces, but the |
| * driver doesn't support data TX status, we won't get TX |
| * status for EAPOL frames. |
| */ |
| if (!drv->use_monitor && !info.data_tx_status) |
| drv->capa.flags &= ~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS; |
| |
| return 0; |
| } |
| |
| |
| #ifdef ANDROID |
| static int android_genl_ctrl_resolve(struct nl_handle *handle, |
| const char *name) |
| { |
| /* |
| * Android ICS has very minimal genl_ctrl_resolve() implementation, so |
| * need to work around that. |
| */ |
| struct nl_cache *cache = NULL; |
| struct genl_family *nl80211 = NULL; |
| int id = -1; |
| |
| if (genl_ctrl_alloc_cache(handle, &cache) < 0) { |
| wpa_printf(MSG_ERROR, "nl80211: Failed to allocate generic " |
| "netlink cache"); |
| goto fail; |
| } |
| |
| nl80211 = genl_ctrl_search_by_name(cache, name); |
| if (nl80211 == NULL) |
| goto fail; |
| |
| id = genl_family_get_id(nl80211); |
| |
| fail: |
| if (nl80211) |
| genl_family_put(nl80211); |
| if (cache) |
| nl_cache_free(cache); |
| |
| return id; |
| } |
| #define genl_ctrl_resolve android_genl_ctrl_resolve |
| #endif /* ANDROID */ |
| |
| |
| static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global) |
| { |
| int ret; |
| |
| global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT); |
| if (global->nl_cb == NULL) { |
| wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink " |
| "callbacks"); |
| return -1; |
| } |
| |
| global->nl = nl_create_handle(global->nl_cb, "nl"); |
| if (global->nl == NULL) |
| goto err; |
| |
| global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211"); |
| if (global->nl80211_id < 0) { |
| wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not " |
| "found"); |
| goto err; |
| } |
| |
| global->nl_event = nl_create_handle(global->nl_cb, "event"); |
| if (global->nl_event == NULL) |
| goto err; |
| |
| ret = nl_get_multicast_id(global, "nl80211", "scan"); |
| if (ret >= 0) |
| ret = nl_socket_add_membership(global->nl_event, ret); |
| if (ret < 0) { |
| wpa_printf(MSG_ERROR, "nl80211: Could not add multicast " |
| "membership for scan events: %d (%s)", |
| ret, strerror(-ret)); |
| goto err; |
| } |
| |
| ret = nl_get_multicast_id(global, "nl80211", "mlme"); |
| if (ret >= 0) |
| ret = nl_socket_add_membership(global->nl_event, ret); |
| if (ret < 0) { |
| wpa_printf(MSG_ERROR, "nl80211: Could not add multicast " |
| "membership for mlme events: %d (%s)", |
| ret, strerror(-ret)); |
| goto err; |
| } |
| |
| ret = nl_get_multicast_id(global, "nl80211", "regulatory"); |
| if (ret >= 0) |
| ret = nl_socket_add_membership(global->nl_event, ret); |
| if (ret < 0) { |
| wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast " |
| "membership for regulatory events: %d (%s)", |
| ret, strerror(-ret)); |
| /* Continue without regulatory events */ |
| } |
| |
| nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, |
| no_seq_check, NULL); |
| nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM, |
| process_global_event, global); |
| |
| eloop_register_read_sock(nl_socket_get_fd(global->nl_event), |
| wpa_driver_nl80211_event_receive, |
| global->nl_cb, global->nl_event); |
| |
| return 0; |
| |
| err: |
| nl_destroy_handles(&global->nl_event); |
| nl_destroy_handles(&global->nl); |
| nl_cb_put(global->nl_cb); |
| global->nl_cb = NULL; |
| return -1; |
| } |
| |
| |
| static int wpa_driver_nl80211_init_nl(struct wpa_driver_nl80211_data *drv) |
| { |
| drv->nl_cb = nl_cb_alloc(NL_CB_DEFAULT); |
| if (!drv->nl_cb) { |
| wpa_printf(MSG_ERROR, "nl80211: Failed to alloc cb struct"); |
| return -1; |
| } |
| |
| nl_cb_set(drv->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, |
| no_seq_check, NULL); |
| nl_cb_set(drv->nl_cb, NL_CB_VALID, NL_CB_CUSTOM, |
| process_drv_event, drv); |
| |
| return 0; |
| } |
| |
| |
| static void wpa_driver_nl80211_rfkill_blocked(void *ctx) |
| { |
| wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked"); |
| /* |
| * This may be for any interface; use ifdown event to disable |
| * interface. |
| */ |
| } |
| |
| |
| static void wpa_driver_nl80211_rfkill_unblocked(void *ctx) |
| { |
| struct wpa_driver_nl80211_data *drv = ctx; |
| wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked"); |
| if (linux_set_iface_flags(drv->global->ioctl_sock, |
| drv->first_bss.ifname, 1)) { |
| wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP " |
| "after rfkill unblock"); |
| return; |
| } |
| /* rtnetlink ifup handler will report interface as enabled */ |
| } |
| |
| |
| static void nl80211_get_phy_name(struct wpa_driver_nl80211_data *drv) |
| { |
| /* Find phy (radio) to which this interface belongs */ |
| char buf[90], *pos; |
| int f, rv; |
| |
| drv->phyname[0] = '\0'; |
| snprintf(buf, sizeof(buf) - 1, "/sys/class/net/%s/phy80211/name", |
| drv->first_bss.ifname); |
| f = open(buf, O_RDONLY); |
| if (f < 0) { |
| wpa_printf(MSG_DEBUG, "Could not open file %s: %s", |
| buf, strerror(errno)); |
| return; |
| } |
| |
| rv = read(f, drv->phyname, sizeof(drv->phyname) - 1); |
| close(f); |
| if (rv < 0) { |
|