driver_nl80211.c revision 3c57b3f85a2d1d586b8b42014a806df23d309824
1/*
2 * Driver interaction with Linux nl80211/cfg80211
3 * Copyright (c) 2002-2014, Jouni Malinen <j@w1.fi>
4 * Copyright (c) 2003-2004, Instant802 Networks, Inc.
5 * Copyright (c) 2005-2006, Devicescape Software, Inc.
6 * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
7 * Copyright (c) 2009-2010, Atheros Communications
8 *
9 * This software may be distributed under the terms of the BSD license.
10 * See README for more details.
11 */
12
13#include "includes.h"
14#include <sys/ioctl.h>
15#include <sys/types.h>
16#include <sys/stat.h>
17#include <fcntl.h>
18#include <net/if.h>
19#include <netlink/genl/genl.h>
20#include <netlink/genl/family.h>
21#include <netlink/genl/ctrl.h>
22#include <linux/rtnetlink.h>
23#include <netpacket/packet.h>
24#include <linux/filter.h>
25#include <linux/errqueue.h>
26#include "nl80211_copy.h"
27
28#include "common.h"
29#include "eloop.h"
30#include "utils/list.h"
31#include "common/qca-vendor.h"
32#include "common/qca-vendor-attr.h"
33#include "common/ieee802_11_defs.h"
34#include "common/ieee802_11_common.h"
35#include "l2_packet/l2_packet.h"
36#include "netlink.h"
37#include "linux_ioctl.h"
38#include "radiotap.h"
39#include "radiotap_iter.h"
40#include "rfkill.h"
41#include "driver.h"
42
43#ifndef SO_WIFI_STATUS
44# if defined(__sparc__)
45#  define SO_WIFI_STATUS	0x0025
46# elif defined(__parisc__)
47#  define SO_WIFI_STATUS	0x4022
48# else
49#  define SO_WIFI_STATUS	41
50# endif
51
52# define SCM_WIFI_STATUS	SO_WIFI_STATUS
53#endif
54
55#ifndef SO_EE_ORIGIN_TXSTATUS
56#define SO_EE_ORIGIN_TXSTATUS	4
57#endif
58
59#ifndef PACKET_TX_TIMESTAMP
60#define PACKET_TX_TIMESTAMP	16
61#endif
62
63#ifdef ANDROID
64#include "android_drv.h"
65#endif /* ANDROID */
66#ifdef CONFIG_LIBNL20
67/* libnl 2.0 compatibility code */
68#define nl_handle nl_sock
69#define nl80211_handle_alloc nl_socket_alloc_cb
70#define nl80211_handle_destroy nl_socket_free
71#else
72/*
73 * libnl 1.1 has a bug, it tries to allocate socket numbers densely
74 * but when you free a socket again it will mess up its bitmap and
75 * and use the wrong number the next time it needs a socket ID.
76 * Therefore, we wrap the handle alloc/destroy and add our own pid
77 * accounting.
78 */
79static uint32_t port_bitmap[32] = { 0 };
80
81static struct nl_handle *nl80211_handle_alloc(void *cb)
82{
83	struct nl_handle *handle;
84	uint32_t pid = getpid() & 0x3FFFFF;
85	int i;
86
87	handle = nl_handle_alloc_cb(cb);
88
89	for (i = 0; i < 1024; i++) {
90		if (port_bitmap[i / 32] & (1 << (i % 32)))
91			continue;
92		port_bitmap[i / 32] |= 1 << (i % 32);
93		pid += i << 22;
94		break;
95	}
96
97	nl_socket_set_local_port(handle, pid);
98
99	return handle;
100}
101
102static void nl80211_handle_destroy(struct nl_handle *handle)
103{
104	uint32_t port = nl_socket_get_local_port(handle);
105
106	port >>= 22;
107	port_bitmap[port / 32] &= ~(1 << (port % 32));
108
109	nl_handle_destroy(handle);
110}
111#endif /* CONFIG_LIBNL20 */
112
113
114#ifdef ANDROID
115/* system/core/libnl_2 does not include nl_socket_set_nonblocking() */
116static int android_nl_socket_set_nonblocking(struct nl_handle *handle)
117{
118	return fcntl(nl_socket_get_fd(handle), F_SETFL, O_NONBLOCK);
119}
120#undef nl_socket_set_nonblocking
121#define nl_socket_set_nonblocking(h) android_nl_socket_set_nonblocking(h)
122#endif /* ANDROID */
123
124
125static struct nl_handle * nl_create_handle(struct nl_cb *cb, const char *dbg)
126{
127	struct nl_handle *handle;
128
129	handle = nl80211_handle_alloc(cb);
130	if (handle == NULL) {
131		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
132			   "callbacks (%s)", dbg);
133		return NULL;
134	}
135
136	if (genl_connect(handle)) {
137		wpa_printf(MSG_ERROR, "nl80211: Failed to connect to generic "
138			   "netlink (%s)", dbg);
139		nl80211_handle_destroy(handle);
140		return NULL;
141	}
142
143	return handle;
144}
145
146
147static void nl_destroy_handles(struct nl_handle **handle)
148{
149	if (*handle == NULL)
150		return;
151	nl80211_handle_destroy(*handle);
152	*handle = NULL;
153}
154
155
156#if __WORDSIZE == 64
157#define ELOOP_SOCKET_INVALID	(intptr_t) 0x8888888888888889ULL
158#else
159#define ELOOP_SOCKET_INVALID	(intptr_t) 0x88888889ULL
160#endif
161
162static void nl80211_register_eloop_read(struct nl_handle **handle,
163					eloop_sock_handler handler,
164					void *eloop_data)
165{
166	nl_socket_set_nonblocking(*handle);
167	eloop_register_read_sock(nl_socket_get_fd(*handle), handler,
168				 eloop_data, *handle);
169	*handle = (void *) (((intptr_t) *handle) ^ ELOOP_SOCKET_INVALID);
170}
171
172
173static void nl80211_destroy_eloop_handle(struct nl_handle **handle)
174{
175	*handle = (void *) (((intptr_t) *handle) ^ ELOOP_SOCKET_INVALID);
176	eloop_unregister_read_sock(nl_socket_get_fd(*handle));
177	nl_destroy_handles(handle);
178}
179
180
181#ifndef IFF_LOWER_UP
182#define IFF_LOWER_UP   0x10000         /* driver signals L1 up         */
183#endif
184#ifndef IFF_DORMANT
185#define IFF_DORMANT    0x20000         /* driver signals dormant       */
186#endif
187
188#ifndef IF_OPER_DORMANT
189#define IF_OPER_DORMANT 5
190#endif
191#ifndef IF_OPER_UP
192#define IF_OPER_UP 6
193#endif
194
195struct nl80211_global {
196	struct dl_list interfaces;
197	int if_add_ifindex;
198	u64 if_add_wdevid;
199	int if_add_wdevid_set;
200	struct netlink_data *netlink;
201	struct nl_cb *nl_cb;
202	struct nl_handle *nl;
203	int nl80211_id;
204	int ioctl_sock; /* socket for ioctl() use */
205
206	struct nl_handle *nl_event;
207};
208
209struct nl80211_wiphy_data {
210	struct dl_list list;
211	struct dl_list bsss;
212	struct dl_list drvs;
213
214	struct nl_handle *nl_beacons;
215	struct nl_cb *nl_cb;
216
217	int wiphy_idx;
218};
219
220static void nl80211_global_deinit(void *priv);
221
222struct i802_bss {
223	struct wpa_driver_nl80211_data *drv;
224	struct i802_bss *next;
225	int ifindex;
226	u64 wdev_id;
227	char ifname[IFNAMSIZ + 1];
228	char brname[IFNAMSIZ];
229	unsigned int beacon_set:1;
230	unsigned int added_if_into_bridge:1;
231	unsigned int added_bridge:1;
232	unsigned int in_deinit:1;
233	unsigned int wdev_id_set:1;
234	unsigned int added_if:1;
235
236	u8 addr[ETH_ALEN];
237
238	int freq;
239	int bandwidth;
240	int if_dynamic;
241
242	void *ctx;
243	struct nl_handle *nl_preq, *nl_mgmt;
244	struct nl_cb *nl_cb;
245
246	struct nl80211_wiphy_data *wiphy_data;
247	struct dl_list wiphy_list;
248};
249
250struct wpa_driver_nl80211_data {
251	struct nl80211_global *global;
252	struct dl_list list;
253	struct dl_list wiphy_list;
254	char phyname[32];
255	void *ctx;
256	int ifindex;
257	int if_removed;
258	int if_disabled;
259	int ignore_if_down_event;
260	struct rfkill_data *rfkill;
261	struct wpa_driver_capa capa;
262	u8 *extended_capa, *extended_capa_mask;
263	unsigned int extended_capa_len;
264	int has_capability;
265
266	int operstate;
267
268	int scan_complete_events;
269	enum scan_states {
270		NO_SCAN, SCAN_REQUESTED, SCAN_STARTED, SCAN_COMPLETED,
271		SCAN_ABORTED, SCHED_SCAN_STARTED, SCHED_SCAN_STOPPED,
272		SCHED_SCAN_RESULTS
273	} scan_state;
274
275	struct nl_cb *nl_cb;
276
277	u8 auth_bssid[ETH_ALEN];
278	u8 auth_attempt_bssid[ETH_ALEN];
279	u8 bssid[ETH_ALEN];
280	u8 prev_bssid[ETH_ALEN];
281	int associated;
282	u8 ssid[32];
283	size_t ssid_len;
284	enum nl80211_iftype nlmode;
285	enum nl80211_iftype ap_scan_as_station;
286	unsigned int assoc_freq;
287
288	int monitor_sock;
289	int monitor_ifidx;
290	int monitor_refcount;
291
292	unsigned int disabled_11b_rates:1;
293	unsigned int pending_remain_on_chan:1;
294	unsigned int in_interface_list:1;
295	unsigned int device_ap_sme:1;
296	unsigned int poll_command_supported:1;
297	unsigned int data_tx_status:1;
298	unsigned int scan_for_auth:1;
299	unsigned int retry_auth:1;
300	unsigned int use_monitor:1;
301	unsigned int ignore_next_local_disconnect:1;
302	unsigned int ignore_next_local_deauth:1;
303	unsigned int allow_p2p_device:1;
304	unsigned int hostapd:1;
305	unsigned int start_mode_ap:1;
306	unsigned int start_iface_up:1;
307	unsigned int test_use_roc_tx:1;
308	unsigned int ignore_deauth_event:1;
309	unsigned int dfs_vendor_cmd_avail:1;
310
311	u64 remain_on_chan_cookie;
312	u64 send_action_cookie;
313
314	unsigned int last_mgmt_freq;
315
316	struct wpa_driver_scan_filter *filter_ssids;
317	size_t num_filter_ssids;
318
319	struct i802_bss *first_bss;
320
321	int eapol_tx_sock;
322
323	int eapol_sock; /* socket for EAPOL frames */
324
325	int default_if_indices[16];
326	int *if_indices;
327	int num_if_indices;
328
329	/* From failed authentication command */
330	int auth_freq;
331	u8 auth_bssid_[ETH_ALEN];
332	u8 auth_ssid[32];
333	size_t auth_ssid_len;
334	int auth_alg;
335	u8 *auth_ie;
336	size_t auth_ie_len;
337	u8 auth_wep_key[4][16];
338	size_t auth_wep_key_len[4];
339	int auth_wep_tx_keyidx;
340	int auth_local_state_change;
341	int auth_p2p;
342};
343
344
345static void wpa_driver_nl80211_deinit(struct i802_bss *bss);
346static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx,
347					    void *timeout_ctx);
348static int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
349				       enum nl80211_iftype nlmode);
350static int
351wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
352				   const u8 *set_addr, int first);
353static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
354				   const u8 *addr, int cmd, u16 reason_code,
355				   int local_state_change);
356static void nl80211_remove_monitor_interface(
357	struct wpa_driver_nl80211_data *drv);
358static int nl80211_send_frame_cmd(struct i802_bss *bss,
359				  unsigned int freq, unsigned int wait,
360				  const u8 *buf, size_t buf_len, u64 *cookie,
361				  int no_cck, int no_ack, int offchanok);
362static int nl80211_register_frame(struct i802_bss *bss,
363				  struct nl_handle *hl_handle,
364				  u16 type, const u8 *match, size_t match_len);
365static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss,
366					       int report);
367#ifdef ANDROID
368static int android_pno_start(struct i802_bss *bss,
369			     struct wpa_driver_scan_params *params);
370static int android_pno_stop(struct i802_bss *bss);
371extern int wpa_driver_nl80211_driver_cmd(void *priv, char *cmd, char *buf,
372					 size_t buf_len);
373#endif /* ANDROID */
374#ifdef ANDROID_P2P
375#ifdef ANDROID_P2P_STUB
376int wpa_driver_set_p2p_noa(void *priv, u8 count, int start, int duration) {
377	return 0;
378}
379int wpa_driver_get_p2p_noa(void *priv, u8 *buf, size_t len) {
380	return 0;
381}
382int wpa_driver_set_p2p_ps(void *priv, int legacy_ps, int opp_ps, int ctwindow) {
383	return -1;
384}
385int wpa_driver_set_ap_wps_p2p_ie(void *priv, const struct wpabuf *beacon,
386				 const struct wpabuf *proberesp,
387				 const struct wpabuf *assocresp) {
388	return 0;
389}
390#else /* ANDROID_P2P_STUB */
391int wpa_driver_set_p2p_noa(void *priv, u8 count, int start, int duration);
392int wpa_driver_get_p2p_noa(void *priv, u8 *buf, size_t len);
393int wpa_driver_set_p2p_ps(void *priv, int legacy_ps, int opp_ps, int ctwindow);
394int wpa_driver_set_ap_wps_p2p_ie(void *priv, const struct wpabuf *beacon,
395				 const struct wpabuf *proberesp,
396				 const struct wpabuf *assocresp);
397#endif /* ANDROID_P2P_STUB */
398#endif /* ANDROID_P2P */
399
400static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
401static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
402static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx);
403static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
404					enum wpa_driver_if_type type,
405					const char *ifname);
406
407static int nl80211_set_channel(struct i802_bss *bss,
408			       struct hostapd_freq_params *freq, int set_chan);
409static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
410				     int ifindex, int disabled);
411
412static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv);
413static int wpa_driver_nl80211_authenticate_retry(
414	struct wpa_driver_nl80211_data *drv);
415
416static int i802_set_iface_flags(struct i802_bss *bss, int up);
417
418
419static const char * nl80211_command_to_string(enum nl80211_commands cmd)
420{
421#define C2S(x) case x: return #x;
422	switch (cmd) {
423	C2S(NL80211_CMD_UNSPEC)
424	C2S(NL80211_CMD_GET_WIPHY)
425	C2S(NL80211_CMD_SET_WIPHY)
426	C2S(NL80211_CMD_NEW_WIPHY)
427	C2S(NL80211_CMD_DEL_WIPHY)
428	C2S(NL80211_CMD_GET_INTERFACE)
429	C2S(NL80211_CMD_SET_INTERFACE)
430	C2S(NL80211_CMD_NEW_INTERFACE)
431	C2S(NL80211_CMD_DEL_INTERFACE)
432	C2S(NL80211_CMD_GET_KEY)
433	C2S(NL80211_CMD_SET_KEY)
434	C2S(NL80211_CMD_NEW_KEY)
435	C2S(NL80211_CMD_DEL_KEY)
436	C2S(NL80211_CMD_GET_BEACON)
437	C2S(NL80211_CMD_SET_BEACON)
438	C2S(NL80211_CMD_START_AP)
439	C2S(NL80211_CMD_STOP_AP)
440	C2S(NL80211_CMD_GET_STATION)
441	C2S(NL80211_CMD_SET_STATION)
442	C2S(NL80211_CMD_NEW_STATION)
443	C2S(NL80211_CMD_DEL_STATION)
444	C2S(NL80211_CMD_GET_MPATH)
445	C2S(NL80211_CMD_SET_MPATH)
446	C2S(NL80211_CMD_NEW_MPATH)
447	C2S(NL80211_CMD_DEL_MPATH)
448	C2S(NL80211_CMD_SET_BSS)
449	C2S(NL80211_CMD_SET_REG)
450	C2S(NL80211_CMD_REQ_SET_REG)
451	C2S(NL80211_CMD_GET_MESH_CONFIG)
452	C2S(NL80211_CMD_SET_MESH_CONFIG)
453	C2S(NL80211_CMD_SET_MGMT_EXTRA_IE)
454	C2S(NL80211_CMD_GET_REG)
455	C2S(NL80211_CMD_GET_SCAN)
456	C2S(NL80211_CMD_TRIGGER_SCAN)
457	C2S(NL80211_CMD_NEW_SCAN_RESULTS)
458	C2S(NL80211_CMD_SCAN_ABORTED)
459	C2S(NL80211_CMD_REG_CHANGE)
460	C2S(NL80211_CMD_AUTHENTICATE)
461	C2S(NL80211_CMD_ASSOCIATE)
462	C2S(NL80211_CMD_DEAUTHENTICATE)
463	C2S(NL80211_CMD_DISASSOCIATE)
464	C2S(NL80211_CMD_MICHAEL_MIC_FAILURE)
465	C2S(NL80211_CMD_REG_BEACON_HINT)
466	C2S(NL80211_CMD_JOIN_IBSS)
467	C2S(NL80211_CMD_LEAVE_IBSS)
468	C2S(NL80211_CMD_TESTMODE)
469	C2S(NL80211_CMD_CONNECT)
470	C2S(NL80211_CMD_ROAM)
471	C2S(NL80211_CMD_DISCONNECT)
472	C2S(NL80211_CMD_SET_WIPHY_NETNS)
473	C2S(NL80211_CMD_GET_SURVEY)
474	C2S(NL80211_CMD_NEW_SURVEY_RESULTS)
475	C2S(NL80211_CMD_SET_PMKSA)
476	C2S(NL80211_CMD_DEL_PMKSA)
477	C2S(NL80211_CMD_FLUSH_PMKSA)
478	C2S(NL80211_CMD_REMAIN_ON_CHANNEL)
479	C2S(NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL)
480	C2S(NL80211_CMD_SET_TX_BITRATE_MASK)
481	C2S(NL80211_CMD_REGISTER_FRAME)
482	C2S(NL80211_CMD_FRAME)
483	C2S(NL80211_CMD_FRAME_TX_STATUS)
484	C2S(NL80211_CMD_SET_POWER_SAVE)
485	C2S(NL80211_CMD_GET_POWER_SAVE)
486	C2S(NL80211_CMD_SET_CQM)
487	C2S(NL80211_CMD_NOTIFY_CQM)
488	C2S(NL80211_CMD_SET_CHANNEL)
489	C2S(NL80211_CMD_SET_WDS_PEER)
490	C2S(NL80211_CMD_FRAME_WAIT_CANCEL)
491	C2S(NL80211_CMD_JOIN_MESH)
492	C2S(NL80211_CMD_LEAVE_MESH)
493	C2S(NL80211_CMD_UNPROT_DEAUTHENTICATE)
494	C2S(NL80211_CMD_UNPROT_DISASSOCIATE)
495	C2S(NL80211_CMD_NEW_PEER_CANDIDATE)
496	C2S(NL80211_CMD_GET_WOWLAN)
497	C2S(NL80211_CMD_SET_WOWLAN)
498	C2S(NL80211_CMD_START_SCHED_SCAN)
499	C2S(NL80211_CMD_STOP_SCHED_SCAN)
500	C2S(NL80211_CMD_SCHED_SCAN_RESULTS)
501	C2S(NL80211_CMD_SCHED_SCAN_STOPPED)
502	C2S(NL80211_CMD_SET_REKEY_OFFLOAD)
503	C2S(NL80211_CMD_PMKSA_CANDIDATE)
504	C2S(NL80211_CMD_TDLS_OPER)
505	C2S(NL80211_CMD_TDLS_MGMT)
506	C2S(NL80211_CMD_UNEXPECTED_FRAME)
507	C2S(NL80211_CMD_PROBE_CLIENT)
508	C2S(NL80211_CMD_REGISTER_BEACONS)
509	C2S(NL80211_CMD_UNEXPECTED_4ADDR_FRAME)
510	C2S(NL80211_CMD_SET_NOACK_MAP)
511	C2S(NL80211_CMD_CH_SWITCH_NOTIFY)
512	C2S(NL80211_CMD_START_P2P_DEVICE)
513	C2S(NL80211_CMD_STOP_P2P_DEVICE)
514	C2S(NL80211_CMD_CONN_FAILED)
515	C2S(NL80211_CMD_SET_MCAST_RATE)
516	C2S(NL80211_CMD_SET_MAC_ACL)
517	C2S(NL80211_CMD_RADAR_DETECT)
518	C2S(NL80211_CMD_GET_PROTOCOL_FEATURES)
519	C2S(NL80211_CMD_UPDATE_FT_IES)
520	C2S(NL80211_CMD_FT_EVENT)
521	C2S(NL80211_CMD_CRIT_PROTOCOL_START)
522	C2S(NL80211_CMD_CRIT_PROTOCOL_STOP)
523	C2S(NL80211_CMD_GET_COALESCE)
524	C2S(NL80211_CMD_SET_COALESCE)
525	C2S(NL80211_CMD_CHANNEL_SWITCH)
526	C2S(NL80211_CMD_VENDOR)
527	C2S(NL80211_CMD_SET_QOS_MAP)
528	default:
529		return "NL80211_CMD_UNKNOWN";
530	}
531#undef C2S
532}
533
534
535/* Converts nl80211_chan_width to a common format */
536static enum chan_width convert2width(int width)
537{
538	switch (width) {
539	case NL80211_CHAN_WIDTH_20_NOHT:
540		return CHAN_WIDTH_20_NOHT;
541	case NL80211_CHAN_WIDTH_20:
542		return CHAN_WIDTH_20;
543	case NL80211_CHAN_WIDTH_40:
544		return CHAN_WIDTH_40;
545	case NL80211_CHAN_WIDTH_80:
546		return CHAN_WIDTH_80;
547	case NL80211_CHAN_WIDTH_80P80:
548		return CHAN_WIDTH_80P80;
549	case NL80211_CHAN_WIDTH_160:
550		return CHAN_WIDTH_160;
551	}
552	return CHAN_WIDTH_UNKNOWN;
553}
554
555
556static int is_ap_interface(enum nl80211_iftype nlmode)
557{
558	return nlmode == NL80211_IFTYPE_AP ||
559		nlmode == NL80211_IFTYPE_P2P_GO;
560}
561
562
563static int is_sta_interface(enum nl80211_iftype nlmode)
564{
565	return nlmode == NL80211_IFTYPE_STATION ||
566		nlmode == NL80211_IFTYPE_P2P_CLIENT;
567}
568
569
570static int is_p2p_net_interface(enum nl80211_iftype nlmode)
571{
572	return nlmode == NL80211_IFTYPE_P2P_CLIENT ||
573		nlmode == NL80211_IFTYPE_P2P_GO;
574}
575
576
577static void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv)
578{
579	if (drv->associated)
580		os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
581	drv->associated = 0;
582	os_memset(drv->bssid, 0, ETH_ALEN);
583}
584
585
586struct nl80211_bss_info_arg {
587	struct wpa_driver_nl80211_data *drv;
588	struct wpa_scan_results *res;
589	unsigned int assoc_freq;
590	unsigned int ibss_freq;
591	u8 assoc_bssid[ETH_ALEN];
592};
593
594static int bss_info_handler(struct nl_msg *msg, void *arg);
595
596
597/* nl80211 code */
598static int ack_handler(struct nl_msg *msg, void *arg)
599{
600	int *err = arg;
601	*err = 0;
602	return NL_STOP;
603}
604
605static int finish_handler(struct nl_msg *msg, void *arg)
606{
607	int *ret = arg;
608	*ret = 0;
609	return NL_SKIP;
610}
611
612static int error_handler(struct sockaddr_nl *nla, struct nlmsgerr *err,
613			 void *arg)
614{
615	int *ret = arg;
616	*ret = err->error;
617	return NL_SKIP;
618}
619
620
621static int no_seq_check(struct nl_msg *msg, void *arg)
622{
623	return NL_OK;
624}
625
626
627static int send_and_recv(struct nl80211_global *global,
628			 struct nl_handle *nl_handle, struct nl_msg *msg,
629			 int (*valid_handler)(struct nl_msg *, void *),
630			 void *valid_data)
631{
632	struct nl_cb *cb;
633	int err = -ENOMEM;
634
635	cb = nl_cb_clone(global->nl_cb);
636	if (!cb)
637		goto out;
638
639	err = nl_send_auto_complete(nl_handle, msg);
640	if (err < 0)
641		goto out;
642
643	err = 1;
644
645	nl_cb_err(cb, NL_CB_CUSTOM, error_handler, &err);
646	nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, &err);
647	nl_cb_set(cb, NL_CB_ACK, NL_CB_CUSTOM, ack_handler, &err);
648
649	if (valid_handler)
650		nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM,
651			  valid_handler, valid_data);
652
653	while (err > 0) {
654		int res = nl_recvmsgs(nl_handle, cb);
655		if (res) {
656			wpa_printf(MSG_INFO,
657				   "nl80211: %s->nl_recvmsgs failed: %d",
658				   __func__, res);
659		}
660	}
661 out:
662	nl_cb_put(cb);
663	nlmsg_free(msg);
664	return err;
665}
666
667
668static int send_and_recv_msgs_global(struct nl80211_global *global,
669				     struct nl_msg *msg,
670				     int (*valid_handler)(struct nl_msg *, void *),
671				     void *valid_data)
672{
673	return send_and_recv(global, global->nl, msg, valid_handler,
674			     valid_data);
675}
676
677
678static int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv,
679			      struct nl_msg *msg,
680			      int (*valid_handler)(struct nl_msg *, void *),
681			      void *valid_data)
682{
683	return send_and_recv(drv->global, drv->global->nl, msg,
684			     valid_handler, valid_data);
685}
686
687
688struct family_data {
689	const char *group;
690	int id;
691};
692
693
694static int nl80211_set_iface_id(struct nl_msg *msg, struct i802_bss *bss)
695{
696	if (bss->wdev_id_set)
697		NLA_PUT_U64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
698	else
699		NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
700	return 0;
701
702nla_put_failure:
703	return -1;
704}
705
706
707static int family_handler(struct nl_msg *msg, void *arg)
708{
709	struct family_data *res = arg;
710	struct nlattr *tb[CTRL_ATTR_MAX + 1];
711	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
712	struct nlattr *mcgrp;
713	int i;
714
715	nla_parse(tb, CTRL_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
716		  genlmsg_attrlen(gnlh, 0), NULL);
717	if (!tb[CTRL_ATTR_MCAST_GROUPS])
718		return NL_SKIP;
719
720	nla_for_each_nested(mcgrp, tb[CTRL_ATTR_MCAST_GROUPS], i) {
721		struct nlattr *tb2[CTRL_ATTR_MCAST_GRP_MAX + 1];
722		nla_parse(tb2, CTRL_ATTR_MCAST_GRP_MAX, nla_data(mcgrp),
723			  nla_len(mcgrp), NULL);
724		if (!tb2[CTRL_ATTR_MCAST_GRP_NAME] ||
725		    !tb2[CTRL_ATTR_MCAST_GRP_ID] ||
726		    os_strncmp(nla_data(tb2[CTRL_ATTR_MCAST_GRP_NAME]),
727			       res->group,
728			       nla_len(tb2[CTRL_ATTR_MCAST_GRP_NAME])) != 0)
729			continue;
730		res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
731		break;
732	};
733
734	return NL_SKIP;
735}
736
737
738static int nl_get_multicast_id(struct nl80211_global *global,
739			       const char *family, const char *group)
740{
741	struct nl_msg *msg;
742	int ret = -1;
743	struct family_data res = { group, -ENOENT };
744
745	msg = nlmsg_alloc();
746	if (!msg)
747		return -ENOMEM;
748	genlmsg_put(msg, 0, 0, genl_ctrl_resolve(global->nl, "nlctrl"),
749		    0, 0, CTRL_CMD_GETFAMILY, 0);
750	NLA_PUT_STRING(msg, CTRL_ATTR_FAMILY_NAME, family);
751
752	ret = send_and_recv_msgs_global(global, msg, family_handler, &res);
753	msg = NULL;
754	if (ret == 0)
755		ret = res.id;
756
757nla_put_failure:
758	nlmsg_free(msg);
759	return ret;
760}
761
762
763static void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
764			  struct nl_msg *msg, int flags, uint8_t cmd)
765{
766	return genlmsg_put(msg, 0, 0, drv->global->nl80211_id,
767			   0, flags, cmd, 0);
768}
769
770
771struct wiphy_idx_data {
772	int wiphy_idx;
773	enum nl80211_iftype nlmode;
774	u8 *macaddr;
775};
776
777
778static int netdev_info_handler(struct nl_msg *msg, void *arg)
779{
780	struct nlattr *tb[NL80211_ATTR_MAX + 1];
781	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
782	struct wiphy_idx_data *info = arg;
783
784	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
785		  genlmsg_attrlen(gnlh, 0), NULL);
786
787	if (tb[NL80211_ATTR_WIPHY])
788		info->wiphy_idx = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
789
790	if (tb[NL80211_ATTR_IFTYPE])
791		info->nlmode = nla_get_u32(tb[NL80211_ATTR_IFTYPE]);
792
793	if (tb[NL80211_ATTR_MAC] && info->macaddr)
794		os_memcpy(info->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
795			  ETH_ALEN);
796
797	return NL_SKIP;
798}
799
800
801static int nl80211_get_wiphy_index(struct i802_bss *bss)
802{
803	struct nl_msg *msg;
804	struct wiphy_idx_data data = {
805		.wiphy_idx = -1,
806		.macaddr = NULL,
807	};
808
809	msg = nlmsg_alloc();
810	if (!msg)
811		return NL80211_IFTYPE_UNSPECIFIED;
812
813	nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE);
814
815	if (nl80211_set_iface_id(msg, bss) < 0)
816		goto nla_put_failure;
817
818	if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0)
819		return data.wiphy_idx;
820	msg = NULL;
821nla_put_failure:
822	nlmsg_free(msg);
823	return -1;
824}
825
826
827static enum nl80211_iftype nl80211_get_ifmode(struct i802_bss *bss)
828{
829	struct nl_msg *msg;
830	struct wiphy_idx_data data = {
831		.nlmode = NL80211_IFTYPE_UNSPECIFIED,
832		.macaddr = NULL,
833	};
834
835	msg = nlmsg_alloc();
836	if (!msg)
837		return -1;
838
839	nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE);
840
841	if (nl80211_set_iface_id(msg, bss) < 0)
842		goto nla_put_failure;
843
844	if (send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data) == 0)
845		return data.nlmode;
846	msg = NULL;
847nla_put_failure:
848	nlmsg_free(msg);
849	return NL80211_IFTYPE_UNSPECIFIED;
850}
851
852
853static int nl80211_get_macaddr(struct i802_bss *bss)
854{
855	struct nl_msg *msg;
856	struct wiphy_idx_data data = {
857		.macaddr = bss->addr,
858	};
859
860	msg = nlmsg_alloc();
861	if (!msg)
862		return NL80211_IFTYPE_UNSPECIFIED;
863
864	nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_GET_INTERFACE);
865	if (nl80211_set_iface_id(msg, bss) < 0)
866		goto nla_put_failure;
867
868	return send_and_recv_msgs(bss->drv, msg, netdev_info_handler, &data);
869
870nla_put_failure:
871	nlmsg_free(msg);
872	return NL80211_IFTYPE_UNSPECIFIED;
873}
874
875
876static int nl80211_register_beacons(struct wpa_driver_nl80211_data *drv,
877				    struct nl80211_wiphy_data *w)
878{
879	struct nl_msg *msg;
880	int ret = -1;
881
882	msg = nlmsg_alloc();
883	if (!msg)
884		return -1;
885
886	nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_BEACONS);
887
888	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx);
889
890	ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL);
891	msg = NULL;
892	if (ret) {
893		wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
894			   "failed: ret=%d (%s)",
895			   ret, strerror(-ret));
896		goto nla_put_failure;
897	}
898	ret = 0;
899nla_put_failure:
900	nlmsg_free(msg);
901	return ret;
902}
903
904
905static void nl80211_recv_beacons(int sock, void *eloop_ctx, void *handle)
906{
907	struct nl80211_wiphy_data *w = eloop_ctx;
908	int res;
909
910	wpa_printf(MSG_EXCESSIVE, "nl80211: Beacon event message available");
911
912	res = nl_recvmsgs(handle, w->nl_cb);
913	if (res) {
914		wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
915			   __func__, res);
916	}
917}
918
919
920static int process_beacon_event(struct nl_msg *msg, void *arg)
921{
922	struct nl80211_wiphy_data *w = arg;
923	struct wpa_driver_nl80211_data *drv;
924	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
925	struct nlattr *tb[NL80211_ATTR_MAX + 1];
926	union wpa_event_data event;
927
928	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
929		  genlmsg_attrlen(gnlh, 0), NULL);
930
931	if (gnlh->cmd != NL80211_CMD_FRAME) {
932		wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
933			   gnlh->cmd);
934		return NL_SKIP;
935	}
936
937	if (!tb[NL80211_ATTR_FRAME])
938		return NL_SKIP;
939
940	dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data,
941			 wiphy_list) {
942		os_memset(&event, 0, sizeof(event));
943		event.rx_mgmt.frame = nla_data(tb[NL80211_ATTR_FRAME]);
944		event.rx_mgmt.frame_len = nla_len(tb[NL80211_ATTR_FRAME]);
945		wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
946	}
947
948	return NL_SKIP;
949}
950
951
952static struct nl80211_wiphy_data *
953nl80211_get_wiphy_data_ap(struct i802_bss *bss)
954{
955	static DEFINE_DL_LIST(nl80211_wiphys);
956	struct nl80211_wiphy_data *w;
957	int wiphy_idx, found = 0;
958	struct i802_bss *tmp_bss;
959
960	if (bss->wiphy_data != NULL)
961		return bss->wiphy_data;
962
963	wiphy_idx = nl80211_get_wiphy_index(bss);
964
965	dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) {
966		if (w->wiphy_idx == wiphy_idx)
967			goto add;
968	}
969
970	/* alloc new one */
971	w = os_zalloc(sizeof(*w));
972	if (w == NULL)
973		return NULL;
974	w->wiphy_idx = wiphy_idx;
975	dl_list_init(&w->bsss);
976	dl_list_init(&w->drvs);
977
978	w->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
979	if (!w->nl_cb) {
980		os_free(w);
981		return NULL;
982	}
983	nl_cb_set(w->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
984	nl_cb_set(w->nl_cb, NL_CB_VALID, NL_CB_CUSTOM, process_beacon_event,
985		  w);
986
987	w->nl_beacons = nl_create_handle(bss->drv->global->nl_cb,
988					 "wiphy beacons");
989	if (w->nl_beacons == NULL) {
990		os_free(w);
991		return NULL;
992	}
993
994	if (nl80211_register_beacons(bss->drv, w)) {
995		nl_destroy_handles(&w->nl_beacons);
996		os_free(w);
997		return NULL;
998	}
999
1000	nl80211_register_eloop_read(&w->nl_beacons, nl80211_recv_beacons, w);
1001
1002	dl_list_add(&nl80211_wiphys, &w->list);
1003
1004add:
1005	/* drv entry for this bss already there? */
1006	dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
1007		if (tmp_bss->drv == bss->drv) {
1008			found = 1;
1009			break;
1010		}
1011	}
1012	/* if not add it */
1013	if (!found)
1014		dl_list_add(&w->drvs, &bss->drv->wiphy_list);
1015
1016	dl_list_add(&w->bsss, &bss->wiphy_list);
1017	bss->wiphy_data = w;
1018	return w;
1019}
1020
1021
1022static void nl80211_put_wiphy_data_ap(struct i802_bss *bss)
1023{
1024	struct nl80211_wiphy_data *w = bss->wiphy_data;
1025	struct i802_bss *tmp_bss;
1026	int found = 0;
1027
1028	if (w == NULL)
1029		return;
1030	bss->wiphy_data = NULL;
1031	dl_list_del(&bss->wiphy_list);
1032
1033	/* still any for this drv present? */
1034	dl_list_for_each(tmp_bss, &w->bsss, struct i802_bss, wiphy_list) {
1035		if (tmp_bss->drv == bss->drv) {
1036			found = 1;
1037			break;
1038		}
1039	}
1040	/* if not remove it */
1041	if (!found)
1042		dl_list_del(&bss->drv->wiphy_list);
1043
1044	if (!dl_list_empty(&w->bsss))
1045		return;
1046
1047	nl80211_destroy_eloop_handle(&w->nl_beacons);
1048
1049	nl_cb_put(w->nl_cb);
1050	dl_list_del(&w->list);
1051	os_free(w);
1052}
1053
1054
1055static int wpa_driver_nl80211_get_bssid(void *priv, u8 *bssid)
1056{
1057	struct i802_bss *bss = priv;
1058	struct wpa_driver_nl80211_data *drv = bss->drv;
1059	if (!drv->associated)
1060		return -1;
1061	os_memcpy(bssid, drv->bssid, ETH_ALEN);
1062	return 0;
1063}
1064
1065
1066static int wpa_driver_nl80211_get_ssid(void *priv, u8 *ssid)
1067{
1068	struct i802_bss *bss = priv;
1069	struct wpa_driver_nl80211_data *drv = bss->drv;
1070	if (!drv->associated)
1071		return -1;
1072	os_memcpy(ssid, drv->ssid, drv->ssid_len);
1073	return drv->ssid_len;
1074}
1075
1076
1077static void wpa_driver_nl80211_event_newlink(
1078	struct wpa_driver_nl80211_data *drv, char *ifname)
1079{
1080	union wpa_event_data event;
1081
1082	if (os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1083		if (if_nametoindex(drv->first_bss->ifname) == 0) {
1084			wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
1085				   drv->first_bss->ifname);
1086			return;
1087		}
1088		if (!drv->if_removed)
1089			return;
1090		wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
1091			   drv->first_bss->ifname);
1092		drv->if_removed = 0;
1093	}
1094
1095	os_memset(&event, 0, sizeof(event));
1096	os_strlcpy(event.interface_status.ifname, ifname,
1097		   sizeof(event.interface_status.ifname));
1098	event.interface_status.ievent = EVENT_INTERFACE_ADDED;
1099	wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1100}
1101
1102
1103static void wpa_driver_nl80211_event_dellink(
1104	struct wpa_driver_nl80211_data *drv, char *ifname)
1105{
1106	union wpa_event_data event;
1107
1108	if (os_strcmp(drv->first_bss->ifname, ifname) == 0) {
1109		if (drv->if_removed) {
1110			wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
1111				   ifname);
1112			return;
1113		}
1114		wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
1115			   ifname);
1116		drv->if_removed = 1;
1117	} else {
1118		wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
1119			   ifname);
1120	}
1121
1122	os_memset(&event, 0, sizeof(event));
1123	os_strlcpy(event.interface_status.ifname, ifname,
1124		   sizeof(event.interface_status.ifname));
1125	event.interface_status.ievent = EVENT_INTERFACE_REMOVED;
1126	wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_STATUS, &event);
1127}
1128
1129
1130static int wpa_driver_nl80211_own_ifname(struct wpa_driver_nl80211_data *drv,
1131					 u8 *buf, size_t len)
1132{
1133	int attrlen, rta_len;
1134	struct rtattr *attr;
1135
1136	attrlen = len;
1137	attr = (struct rtattr *) buf;
1138
1139	rta_len = RTA_ALIGN(sizeof(struct rtattr));
1140	while (RTA_OK(attr, attrlen)) {
1141		if (attr->rta_type == IFLA_IFNAME) {
1142			if (os_strcmp(((char *) attr) + rta_len,
1143				      drv->first_bss->ifname) == 0)
1144				return 1;
1145			else
1146				break;
1147		}
1148		attr = RTA_NEXT(attr, attrlen);
1149	}
1150
1151	return 0;
1152}
1153
1154
1155static int wpa_driver_nl80211_own_ifindex(struct wpa_driver_nl80211_data *drv,
1156					  int ifindex, u8 *buf, size_t len)
1157{
1158	if (drv->ifindex == ifindex)
1159		return 1;
1160
1161	if (drv->if_removed && wpa_driver_nl80211_own_ifname(drv, buf, len)) {
1162		wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
1163			   "interface");
1164		wpa_driver_nl80211_finish_drv_init(drv, NULL, 0);
1165		return 1;
1166	}
1167
1168	return 0;
1169}
1170
1171
1172static struct wpa_driver_nl80211_data *
1173nl80211_find_drv(struct nl80211_global *global, int idx, u8 *buf, size_t len)
1174{
1175	struct wpa_driver_nl80211_data *drv;
1176	dl_list_for_each(drv, &global->interfaces,
1177			 struct wpa_driver_nl80211_data, list) {
1178		if (wpa_driver_nl80211_own_ifindex(drv, idx, buf, len) ||
1179		    have_ifidx(drv, idx))
1180			return drv;
1181	}
1182	return NULL;
1183}
1184
1185
1186static void wpa_driver_nl80211_event_rtm_newlink(void *ctx,
1187						 struct ifinfomsg *ifi,
1188						 u8 *buf, size_t len)
1189{
1190	struct nl80211_global *global = ctx;
1191	struct wpa_driver_nl80211_data *drv;
1192	int attrlen;
1193	struct rtattr *attr;
1194	u32 brid = 0;
1195	char namebuf[IFNAMSIZ];
1196	char ifname[IFNAMSIZ + 1];
1197	char extra[100], *pos, *end;
1198
1199	drv = nl80211_find_drv(global, ifi->ifi_index, buf, len);
1200	if (!drv) {
1201		wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_NEWLINK event for foreign ifindex %d",
1202			   ifi->ifi_index);
1203		return;
1204	}
1205
1206	extra[0] = '\0';
1207	pos = extra;
1208	end = pos + sizeof(extra);
1209	ifname[0] = '\0';
1210
1211	attrlen = len;
1212	attr = (struct rtattr *) buf;
1213	while (RTA_OK(attr, attrlen)) {
1214		switch (attr->rta_type) {
1215		case IFLA_IFNAME:
1216			if (RTA_PAYLOAD(attr) >= IFNAMSIZ)
1217				break;
1218			os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1219			ifname[RTA_PAYLOAD(attr)] = '\0';
1220			break;
1221		case IFLA_MASTER:
1222			brid = nla_get_u32((struct nlattr *) attr);
1223			pos += os_snprintf(pos, end - pos, " master=%u", brid);
1224			break;
1225		case IFLA_WIRELESS:
1226			pos += os_snprintf(pos, end - pos, " wext");
1227			break;
1228		case IFLA_OPERSTATE:
1229			pos += os_snprintf(pos, end - pos, " operstate=%u",
1230					   nla_get_u32((struct nlattr *) attr));
1231			break;
1232		case IFLA_LINKMODE:
1233			pos += os_snprintf(pos, end - pos, " linkmode=%u",
1234					   nla_get_u32((struct nlattr *) attr));
1235			break;
1236		}
1237		attr = RTA_NEXT(attr, attrlen);
1238	}
1239	extra[sizeof(extra) - 1] = '\0';
1240
1241	wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_flags=0x%x (%s%s%s%s)",
1242		   ifi->ifi_index, ifname, extra, ifi->ifi_flags,
1243		   (ifi->ifi_flags & IFF_UP) ? "[UP]" : "",
1244		   (ifi->ifi_flags & IFF_RUNNING) ? "[RUNNING]" : "",
1245		   (ifi->ifi_flags & IFF_LOWER_UP) ? "[LOWER_UP]" : "",
1246		   (ifi->ifi_flags & IFF_DORMANT) ? "[DORMANT]" : "");
1247
1248	if (!drv->if_disabled && !(ifi->ifi_flags & IFF_UP)) {
1249		if (if_indextoname(ifi->ifi_index, namebuf) &&
1250		    linux_iface_up(drv->global->ioctl_sock,
1251				   drv->first_bss->ifname) > 0) {
1252			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1253				   "event since interface %s is up", namebuf);
1254			return;
1255		}
1256		wpa_printf(MSG_DEBUG, "nl80211: Interface down");
1257		if (drv->ignore_if_down_event) {
1258			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down "
1259				   "event generated by mode change");
1260			drv->ignore_if_down_event = 0;
1261		} else {
1262			drv->if_disabled = 1;
1263			wpa_supplicant_event(drv->ctx,
1264					     EVENT_INTERFACE_DISABLED, NULL);
1265
1266			/*
1267			 * Try to get drv again, since it may be removed as
1268			 * part of the EVENT_INTERFACE_DISABLED handling for
1269			 * dynamic interfaces
1270			 */
1271			drv = nl80211_find_drv(global, ifi->ifi_index,
1272					       buf, len);
1273			if (!drv)
1274				return;
1275		}
1276	}
1277
1278	if (drv->if_disabled && (ifi->ifi_flags & IFF_UP)) {
1279		if (if_indextoname(ifi->ifi_index, namebuf) &&
1280		    linux_iface_up(drv->global->ioctl_sock,
1281				   drv->first_bss->ifname) == 0) {
1282			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1283				   "event since interface %s is down",
1284				   namebuf);
1285		} else if (if_nametoindex(drv->first_bss->ifname) == 0) {
1286			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1287				   "event since interface %s does not exist",
1288				   drv->first_bss->ifname);
1289		} else if (drv->if_removed) {
1290			wpa_printf(MSG_DEBUG, "nl80211: Ignore interface up "
1291				   "event since interface %s is marked "
1292				   "removed", drv->first_bss->ifname);
1293		} else {
1294			wpa_printf(MSG_DEBUG, "nl80211: Interface up");
1295			drv->if_disabled = 0;
1296			wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_ENABLED,
1297					     NULL);
1298		}
1299	}
1300
1301	/*
1302	 * Some drivers send the association event before the operup event--in
1303	 * this case, lifting operstate in wpa_driver_nl80211_set_operstate()
1304	 * fails. This will hit us when wpa_supplicant does not need to do
1305	 * IEEE 802.1X authentication
1306	 */
1307	if (drv->operstate == 1 &&
1308	    (ifi->ifi_flags & (IFF_LOWER_UP | IFF_DORMANT)) == IFF_LOWER_UP &&
1309	    !(ifi->ifi_flags & IFF_RUNNING)) {
1310		wpa_printf(MSG_DEBUG, "nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate");
1311		netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
1312				       -1, IF_OPER_UP);
1313	}
1314
1315	if (ifname[0])
1316		wpa_driver_nl80211_event_newlink(drv, ifname);
1317
1318	if (ifi->ifi_family == AF_BRIDGE && brid) {
1319		/* device has been added to bridge */
1320		if_indextoname(brid, namebuf);
1321		wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
1322			   brid, namebuf);
1323		add_ifidx(drv, brid);
1324	}
1325}
1326
1327
1328static void wpa_driver_nl80211_event_rtm_dellink(void *ctx,
1329						 struct ifinfomsg *ifi,
1330						 u8 *buf, size_t len)
1331{
1332	struct nl80211_global *global = ctx;
1333	struct wpa_driver_nl80211_data *drv;
1334	int attrlen;
1335	struct rtattr *attr;
1336	u32 brid = 0;
1337	char ifname[IFNAMSIZ + 1];
1338
1339	drv = nl80211_find_drv(global, ifi->ifi_index, buf, len);
1340	if (!drv) {
1341		wpa_printf(MSG_DEBUG, "nl80211: Ignore RTM_DELLINK event for foreign ifindex %d",
1342			   ifi->ifi_index);
1343		return;
1344	}
1345
1346	ifname[0] = '\0';
1347
1348	attrlen = len;
1349	attr = (struct rtattr *) buf;
1350	while (RTA_OK(attr, attrlen)) {
1351		switch (attr->rta_type) {
1352		case IFLA_IFNAME:
1353			if (RTA_PAYLOAD(attr) >= IFNAMSIZ)
1354				break;
1355			os_memcpy(ifname, RTA_DATA(attr), RTA_PAYLOAD(attr));
1356			ifname[RTA_PAYLOAD(attr)] = '\0';
1357			break;
1358		case IFLA_MASTER:
1359			brid = nla_get_u32((struct nlattr *) attr);
1360			break;
1361		}
1362		attr = RTA_NEXT(attr, attrlen);
1363	}
1364
1365	if (ifname[0])
1366		wpa_driver_nl80211_event_dellink(drv, ifname);
1367
1368	if (ifi->ifi_family == AF_BRIDGE && brid) {
1369		/* device has been removed from bridge */
1370		char namebuf[IFNAMSIZ];
1371		if_indextoname(brid, namebuf);
1372		wpa_printf(MSG_DEBUG, "nl80211: Remove ifindex %u for bridge "
1373			   "%s", brid, namebuf);
1374		del_ifidx(drv, brid);
1375	}
1376}
1377
1378
1379static void mlme_event_auth(struct wpa_driver_nl80211_data *drv,
1380			    const u8 *frame, size_t len)
1381{
1382	const struct ieee80211_mgmt *mgmt;
1383	union wpa_event_data event;
1384
1385	wpa_printf(MSG_DEBUG, "nl80211: Authenticate event");
1386	mgmt = (const struct ieee80211_mgmt *) frame;
1387	if (len < 24 + sizeof(mgmt->u.auth)) {
1388		wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
1389			   "frame");
1390		return;
1391	}
1392
1393	os_memcpy(drv->auth_bssid, mgmt->sa, ETH_ALEN);
1394	os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
1395	os_memset(&event, 0, sizeof(event));
1396	os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN);
1397	event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg);
1398	event.auth.auth_transaction =
1399		le_to_host16(mgmt->u.auth.auth_transaction);
1400	event.auth.status_code = le_to_host16(mgmt->u.auth.status_code);
1401	if (len > 24 + sizeof(mgmt->u.auth)) {
1402		event.auth.ies = mgmt->u.auth.variable;
1403		event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth);
1404	}
1405
1406	wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event);
1407}
1408
1409
1410static unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv)
1411{
1412	struct nl_msg *msg;
1413	int ret;
1414	struct nl80211_bss_info_arg arg;
1415
1416	os_memset(&arg, 0, sizeof(arg));
1417	msg = nlmsg_alloc();
1418	if (!msg)
1419		goto nla_put_failure;
1420
1421	nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
1422	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
1423
1424	arg.drv = drv;
1425	ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
1426	msg = NULL;
1427	if (ret == 0) {
1428		unsigned int freq = drv->nlmode == NL80211_IFTYPE_ADHOC ?
1429			arg.ibss_freq : arg.assoc_freq;
1430		wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the "
1431			   "associated BSS from scan results: %u MHz", freq);
1432		if (freq)
1433			drv->assoc_freq = freq;
1434		return drv->assoc_freq;
1435	}
1436	wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
1437		   "(%s)", ret, strerror(-ret));
1438nla_put_failure:
1439	nlmsg_free(msg);
1440	return drv->assoc_freq;
1441}
1442
1443
1444static void mlme_event_assoc(struct wpa_driver_nl80211_data *drv,
1445			    const u8 *frame, size_t len)
1446{
1447	const struct ieee80211_mgmt *mgmt;
1448	union wpa_event_data event;
1449	u16 status;
1450
1451	wpa_printf(MSG_DEBUG, "nl80211: Associate event");
1452	mgmt = (const struct ieee80211_mgmt *) frame;
1453	if (len < 24 + sizeof(mgmt->u.assoc_resp)) {
1454		wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
1455			   "frame");
1456		return;
1457	}
1458
1459	status = le_to_host16(mgmt->u.assoc_resp.status_code);
1460	if (status != WLAN_STATUS_SUCCESS) {
1461		os_memset(&event, 0, sizeof(event));
1462		event.assoc_reject.bssid = mgmt->bssid;
1463		if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
1464			event.assoc_reject.resp_ies =
1465				(u8 *) mgmt->u.assoc_resp.variable;
1466			event.assoc_reject.resp_ies_len =
1467				len - 24 - sizeof(mgmt->u.assoc_resp);
1468		}
1469		event.assoc_reject.status_code = status;
1470
1471		wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event);
1472		return;
1473	}
1474
1475	drv->associated = 1;
1476	os_memcpy(drv->bssid, mgmt->sa, ETH_ALEN);
1477	os_memcpy(drv->prev_bssid, mgmt->sa, ETH_ALEN);
1478
1479	os_memset(&event, 0, sizeof(event));
1480	if (len > 24 + sizeof(mgmt->u.assoc_resp)) {
1481		event.assoc_info.resp_ies = (u8 *) mgmt->u.assoc_resp.variable;
1482		event.assoc_info.resp_ies_len =
1483			len - 24 - sizeof(mgmt->u.assoc_resp);
1484	}
1485
1486	event.assoc_info.freq = drv->assoc_freq;
1487
1488	wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event);
1489}
1490
1491
1492static void mlme_event_connect(struct wpa_driver_nl80211_data *drv,
1493			       enum nl80211_commands cmd, struct nlattr *status,
1494			       struct nlattr *addr, struct nlattr *req_ie,
1495			       struct nlattr *resp_ie)
1496{
1497	union wpa_event_data event;
1498
1499	if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
1500		/*
1501		 * Avoid reporting two association events that would confuse
1502		 * the core code.
1503		 */
1504		wpa_printf(MSG_DEBUG, "nl80211: Ignore connect event (cmd=%d) "
1505			   "when using userspace SME", cmd);
1506		return;
1507	}
1508
1509	if (cmd == NL80211_CMD_CONNECT)
1510		wpa_printf(MSG_DEBUG, "nl80211: Connect event");
1511	else if (cmd == NL80211_CMD_ROAM)
1512		wpa_printf(MSG_DEBUG, "nl80211: Roam event");
1513
1514	os_memset(&event, 0, sizeof(event));
1515	if (cmd == NL80211_CMD_CONNECT &&
1516	    nla_get_u16(status) != WLAN_STATUS_SUCCESS) {
1517		if (addr)
1518			event.assoc_reject.bssid = nla_data(addr);
1519		if (resp_ie) {
1520			event.assoc_reject.resp_ies = nla_data(resp_ie);
1521			event.assoc_reject.resp_ies_len = nla_len(resp_ie);
1522		}
1523		event.assoc_reject.status_code = nla_get_u16(status);
1524		wpa_supplicant_event(drv->ctx, EVENT_ASSOC_REJECT, &event);
1525		return;
1526	}
1527
1528	drv->associated = 1;
1529	if (addr) {
1530		os_memcpy(drv->bssid, nla_data(addr), ETH_ALEN);
1531		os_memcpy(drv->prev_bssid, drv->bssid, ETH_ALEN);
1532	}
1533
1534	if (req_ie) {
1535		event.assoc_info.req_ies = nla_data(req_ie);
1536		event.assoc_info.req_ies_len = nla_len(req_ie);
1537	}
1538	if (resp_ie) {
1539		event.assoc_info.resp_ies = nla_data(resp_ie);
1540		event.assoc_info.resp_ies_len = nla_len(resp_ie);
1541	}
1542
1543	event.assoc_info.freq = nl80211_get_assoc_freq(drv);
1544
1545	wpa_supplicant_event(drv->ctx, EVENT_ASSOC, &event);
1546}
1547
1548
1549static void mlme_event_disconnect(struct wpa_driver_nl80211_data *drv,
1550				  struct nlattr *reason, struct nlattr *addr,
1551				  struct nlattr *by_ap)
1552{
1553	union wpa_event_data data;
1554	unsigned int locally_generated = by_ap == NULL;
1555
1556	if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
1557		/*
1558		 * Avoid reporting two disassociation events that could
1559		 * confuse the core code.
1560		 */
1561		wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect "
1562			   "event when using userspace SME");
1563		return;
1564	}
1565
1566	if (drv->ignore_next_local_disconnect) {
1567		drv->ignore_next_local_disconnect = 0;
1568		if (locally_generated) {
1569			wpa_printf(MSG_DEBUG, "nl80211: Ignore disconnect "
1570				   "event triggered during reassociation");
1571			return;
1572		}
1573		wpa_printf(MSG_WARNING, "nl80211: Was expecting local "
1574			   "disconnect but got another disconnect "
1575			   "event first");
1576	}
1577
1578	wpa_printf(MSG_DEBUG, "nl80211: Disconnect event");
1579	nl80211_mark_disconnected(drv);
1580	os_memset(&data, 0, sizeof(data));
1581	if (reason)
1582		data.deauth_info.reason_code = nla_get_u16(reason);
1583	data.deauth_info.locally_generated = by_ap == NULL;
1584	wpa_supplicant_event(drv->ctx, EVENT_DEAUTH, &data);
1585}
1586
1587
1588static int calculate_chan_offset(int width, int freq, int cf1, int cf2)
1589{
1590	int freq1 = 0;
1591
1592	switch (convert2width(width)) {
1593	case CHAN_WIDTH_20_NOHT:
1594	case CHAN_WIDTH_20:
1595		return 0;
1596	case CHAN_WIDTH_40:
1597		freq1 = cf1 - 10;
1598		break;
1599	case CHAN_WIDTH_80:
1600		freq1 = cf1 - 30;
1601		break;
1602	case CHAN_WIDTH_160:
1603		freq1 = cf1 - 70;
1604		break;
1605	case CHAN_WIDTH_UNKNOWN:
1606	case CHAN_WIDTH_80P80:
1607		/* FIXME: implement this */
1608		return 0;
1609	}
1610
1611	return (abs(freq - freq1) / 20) % 2 == 0 ? 1 : -1;
1612}
1613
1614
1615static void mlme_event_ch_switch(struct wpa_driver_nl80211_data *drv,
1616				 struct nlattr *ifindex, struct nlattr *freq,
1617				 struct nlattr *type, struct nlattr *bw,
1618				 struct nlattr *cf1, struct nlattr *cf2)
1619{
1620	struct i802_bss *bss;
1621	union wpa_event_data data;
1622	int ht_enabled = 1;
1623	int chan_offset = 0;
1624	int ifidx;
1625
1626	wpa_printf(MSG_DEBUG, "nl80211: Channel switch event");
1627
1628	if (!freq)
1629		return;
1630
1631	ifidx = nla_get_u32(ifindex);
1632	for (bss = drv->first_bss; bss; bss = bss->next)
1633		if (bss->ifindex == ifidx)
1634			break;
1635
1636	if (bss == NULL) {
1637		wpa_printf(MSG_WARNING, "nl80211: Unknown ifindex (%d) for channel switch, ignoring",
1638			   ifidx);
1639		return;
1640	}
1641
1642	if (type) {
1643		switch (nla_get_u32(type)) {
1644		case NL80211_CHAN_NO_HT:
1645			ht_enabled = 0;
1646			break;
1647		case NL80211_CHAN_HT20:
1648			break;
1649		case NL80211_CHAN_HT40PLUS:
1650			chan_offset = 1;
1651			break;
1652		case NL80211_CHAN_HT40MINUS:
1653			chan_offset = -1;
1654			break;
1655		}
1656	} else if (bw && cf1) {
1657		/* This can happen for example with VHT80 ch switch */
1658		chan_offset = calculate_chan_offset(nla_get_u32(bw),
1659						    nla_get_u32(freq),
1660						    nla_get_u32(cf1),
1661						    cf2 ? nla_get_u32(cf2) : 0);
1662	} else {
1663		wpa_printf(MSG_WARNING, "nl80211: Unknown secondary channel information - following channel definition calculations may fail");
1664	}
1665
1666	os_memset(&data, 0, sizeof(data));
1667	data.ch_switch.freq = nla_get_u32(freq);
1668	data.ch_switch.ht_enabled = ht_enabled;
1669	data.ch_switch.ch_offset = chan_offset;
1670	if (bw)
1671		data.ch_switch.ch_width = convert2width(nla_get_u32(bw));
1672	if (cf1)
1673		data.ch_switch.cf1 = nla_get_u32(cf1);
1674	if (cf2)
1675		data.ch_switch.cf2 = nla_get_u32(cf2);
1676
1677	bss->freq = data.ch_switch.freq;
1678
1679	wpa_supplicant_event(drv->ctx, EVENT_CH_SWITCH, &data);
1680}
1681
1682
1683static void mlme_timeout_event(struct wpa_driver_nl80211_data *drv,
1684			       enum nl80211_commands cmd, struct nlattr *addr)
1685{
1686	union wpa_event_data event;
1687	enum wpa_event_type ev;
1688
1689	if (nla_len(addr) != ETH_ALEN)
1690		return;
1691
1692	wpa_printf(MSG_DEBUG, "nl80211: MLME event %d; timeout with " MACSTR,
1693		   cmd, MAC2STR((u8 *) nla_data(addr)));
1694
1695	if (cmd == NL80211_CMD_AUTHENTICATE)
1696		ev = EVENT_AUTH_TIMED_OUT;
1697	else if (cmd == NL80211_CMD_ASSOCIATE)
1698		ev = EVENT_ASSOC_TIMED_OUT;
1699	else
1700		return;
1701
1702	os_memset(&event, 0, sizeof(event));
1703	os_memcpy(event.timeout_event.addr, nla_data(addr), ETH_ALEN);
1704	wpa_supplicant_event(drv->ctx, ev, &event);
1705}
1706
1707
1708static void mlme_event_mgmt(struct i802_bss *bss,
1709			    struct nlattr *freq, struct nlattr *sig,
1710			    const u8 *frame, size_t len)
1711{
1712	struct wpa_driver_nl80211_data *drv = bss->drv;
1713	const struct ieee80211_mgmt *mgmt;
1714	union wpa_event_data event;
1715	u16 fc, stype;
1716	int ssi_signal = 0;
1717	int rx_freq = 0;
1718
1719	wpa_printf(MSG_MSGDUMP, "nl80211: Frame event");
1720	mgmt = (const struct ieee80211_mgmt *) frame;
1721	if (len < 24) {
1722		wpa_printf(MSG_DEBUG, "nl80211: Too short management frame");
1723		return;
1724	}
1725
1726	fc = le_to_host16(mgmt->frame_control);
1727	stype = WLAN_FC_GET_STYPE(fc);
1728
1729	if (sig)
1730		ssi_signal = (s32) nla_get_u32(sig);
1731
1732	os_memset(&event, 0, sizeof(event));
1733	if (freq) {
1734		event.rx_mgmt.freq = nla_get_u32(freq);
1735		rx_freq = drv->last_mgmt_freq = event.rx_mgmt.freq;
1736	}
1737	wpa_printf(MSG_DEBUG,
1738		   "nl80211: RX frame freq=%d ssi_signal=%d stype=%u len=%u",
1739		   rx_freq, ssi_signal, stype, (unsigned int) len);
1740	event.rx_mgmt.frame = frame;
1741	event.rx_mgmt.frame_len = len;
1742	event.rx_mgmt.ssi_signal = ssi_signal;
1743	event.rx_mgmt.drv_priv = bss;
1744	wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
1745}
1746
1747
1748static void mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv,
1749				      struct nlattr *cookie, const u8 *frame,
1750				      size_t len, struct nlattr *ack)
1751{
1752	union wpa_event_data event;
1753	const struct ieee80211_hdr *hdr;
1754	u16 fc;
1755
1756	wpa_printf(MSG_DEBUG, "nl80211: Frame TX status event");
1757	if (!is_ap_interface(drv->nlmode)) {
1758		u64 cookie_val;
1759
1760		if (!cookie)
1761			return;
1762
1763		cookie_val = nla_get_u64(cookie);
1764		wpa_printf(MSG_DEBUG, "nl80211: Action TX status:"
1765			   " cookie=0%llx%s (ack=%d)",
1766			   (long long unsigned int) cookie_val,
1767			   cookie_val == drv->send_action_cookie ?
1768			   " (match)" : " (unknown)", ack != NULL);
1769		if (cookie_val != drv->send_action_cookie)
1770			return;
1771	}
1772
1773	hdr = (const struct ieee80211_hdr *) frame;
1774	fc = le_to_host16(hdr->frame_control);
1775
1776	os_memset(&event, 0, sizeof(event));
1777	event.tx_status.type = WLAN_FC_GET_TYPE(fc);
1778	event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
1779	event.tx_status.dst = hdr->addr1;
1780	event.tx_status.data = frame;
1781	event.tx_status.data_len = len;
1782	event.tx_status.ack = ack != NULL;
1783	wpa_supplicant_event(drv->ctx, EVENT_TX_STATUS, &event);
1784}
1785
1786
1787static void mlme_event_deauth_disassoc(struct wpa_driver_nl80211_data *drv,
1788				       enum wpa_event_type type,
1789				       const u8 *frame, size_t len)
1790{
1791	const struct ieee80211_mgmt *mgmt;
1792	union wpa_event_data event;
1793	const u8 *bssid = NULL;
1794	u16 reason_code = 0;
1795
1796	if (type == EVENT_DEAUTH)
1797		wpa_printf(MSG_DEBUG, "nl80211: Deauthenticate event");
1798	else
1799		wpa_printf(MSG_DEBUG, "nl80211: Disassociate event");
1800
1801	mgmt = (const struct ieee80211_mgmt *) frame;
1802	if (len >= 24) {
1803		bssid = mgmt->bssid;
1804
1805		if ((drv->capa.flags & WPA_DRIVER_FLAGS_SME) &&
1806		    !drv->associated &&
1807		    os_memcmp(bssid, drv->auth_bssid, ETH_ALEN) != 0 &&
1808		    os_memcmp(bssid, drv->auth_attempt_bssid, ETH_ALEN) != 0 &&
1809		    os_memcmp(bssid, drv->prev_bssid, ETH_ALEN) == 0) {
1810			/*
1811			 * Avoid issues with some roaming cases where
1812			 * disconnection event for the old AP may show up after
1813			 * we have started connection with the new AP.
1814			 */
1815			wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth/disassoc event from old AP " MACSTR " when already authenticating with " MACSTR,
1816				   MAC2STR(bssid),
1817				   MAC2STR(drv->auth_attempt_bssid));
1818			return;
1819		}
1820
1821		if (drv->associated != 0 &&
1822		    os_memcmp(bssid, drv->bssid, ETH_ALEN) != 0 &&
1823		    os_memcmp(bssid, drv->auth_bssid, ETH_ALEN) != 0) {
1824			/*
1825			 * We have presumably received this deauth as a
1826			 * response to a clear_state_mismatch() outgoing
1827			 * deauth.  Don't let it take us offline!
1828			 */
1829			wpa_printf(MSG_DEBUG, "nl80211: Deauth received "
1830				   "from Unknown BSSID " MACSTR " -- ignoring",
1831				   MAC2STR(bssid));
1832			return;
1833		}
1834	}
1835
1836	nl80211_mark_disconnected(drv);
1837	os_memset(&event, 0, sizeof(event));
1838
1839	/* Note: Same offset for Reason Code in both frame subtypes */
1840	if (len >= 24 + sizeof(mgmt->u.deauth))
1841		reason_code = le_to_host16(mgmt->u.deauth.reason_code);
1842
1843	if (type == EVENT_DISASSOC) {
1844		event.disassoc_info.locally_generated =
1845			!os_memcmp(mgmt->sa, drv->first_bss->addr, ETH_ALEN);
1846		event.disassoc_info.addr = bssid;
1847		event.disassoc_info.reason_code = reason_code;
1848		if (frame + len > mgmt->u.disassoc.variable) {
1849			event.disassoc_info.ie = mgmt->u.disassoc.variable;
1850			event.disassoc_info.ie_len = frame + len -
1851				mgmt->u.disassoc.variable;
1852		}
1853	} else {
1854		if (drv->ignore_deauth_event) {
1855			wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth event due to previous forced deauth-during-auth");
1856			drv->ignore_deauth_event = 0;
1857			return;
1858		}
1859		event.deauth_info.locally_generated =
1860			!os_memcmp(mgmt->sa, drv->first_bss->addr, ETH_ALEN);
1861		if (drv->ignore_next_local_deauth) {
1862			drv->ignore_next_local_deauth = 0;
1863			if (event.deauth_info.locally_generated) {
1864				wpa_printf(MSG_DEBUG, "nl80211: Ignore deauth event triggered due to own deauth request");
1865				return;
1866			}
1867			wpa_printf(MSG_WARNING, "nl80211: Was expecting local deauth but got another disconnect event first");
1868		}
1869		event.deauth_info.addr = bssid;
1870		event.deauth_info.reason_code = reason_code;
1871		if (frame + len > mgmt->u.deauth.variable) {
1872			event.deauth_info.ie = mgmt->u.deauth.variable;
1873			event.deauth_info.ie_len = frame + len -
1874				mgmt->u.deauth.variable;
1875		}
1876	}
1877
1878	wpa_supplicant_event(drv->ctx, type, &event);
1879}
1880
1881
1882static void mlme_event_unprot_disconnect(struct wpa_driver_nl80211_data *drv,
1883					 enum wpa_event_type type,
1884					 const u8 *frame, size_t len)
1885{
1886	const struct ieee80211_mgmt *mgmt;
1887	union wpa_event_data event;
1888	u16 reason_code = 0;
1889
1890	if (type == EVENT_UNPROT_DEAUTH)
1891		wpa_printf(MSG_DEBUG, "nl80211: Unprot Deauthenticate event");
1892	else
1893		wpa_printf(MSG_DEBUG, "nl80211: Unprot Disassociate event");
1894
1895	if (len < 24)
1896		return;
1897
1898	mgmt = (const struct ieee80211_mgmt *) frame;
1899
1900	os_memset(&event, 0, sizeof(event));
1901	/* Note: Same offset for Reason Code in both frame subtypes */
1902	if (len >= 24 + sizeof(mgmt->u.deauth))
1903		reason_code = le_to_host16(mgmt->u.deauth.reason_code);
1904
1905	if (type == EVENT_UNPROT_DISASSOC) {
1906		event.unprot_disassoc.sa = mgmt->sa;
1907		event.unprot_disassoc.da = mgmt->da;
1908		event.unprot_disassoc.reason_code = reason_code;
1909	} else {
1910		event.unprot_deauth.sa = mgmt->sa;
1911		event.unprot_deauth.da = mgmt->da;
1912		event.unprot_deauth.reason_code = reason_code;
1913	}
1914
1915	wpa_supplicant_event(drv->ctx, type, &event);
1916}
1917
1918
1919static void mlme_event(struct i802_bss *bss,
1920		       enum nl80211_commands cmd, struct nlattr *frame,
1921		       struct nlattr *addr, struct nlattr *timed_out,
1922		       struct nlattr *freq, struct nlattr *ack,
1923		       struct nlattr *cookie, struct nlattr *sig)
1924{
1925	struct wpa_driver_nl80211_data *drv = bss->drv;
1926	const u8 *data;
1927	size_t len;
1928
1929	if (timed_out && addr) {
1930		mlme_timeout_event(drv, cmd, addr);
1931		return;
1932	}
1933
1934	if (frame == NULL) {
1935		wpa_printf(MSG_DEBUG,
1936			   "nl80211: MLME event %d (%s) without frame data",
1937			   cmd, nl80211_command_to_string(cmd));
1938		return;
1939	}
1940
1941	data = nla_data(frame);
1942	len = nla_len(frame);
1943	if (len < 4 + 2 * ETH_ALEN) {
1944		wpa_printf(MSG_MSGDUMP, "nl80211: MLME event %d (%s) on %s("
1945			   MACSTR ") - too short",
1946			   cmd, nl80211_command_to_string(cmd), bss->ifname,
1947			   MAC2STR(bss->addr));
1948		return;
1949	}
1950	wpa_printf(MSG_MSGDUMP, "nl80211: MLME event %d (%s) on %s(" MACSTR
1951		   ") A1=" MACSTR " A2=" MACSTR, cmd,
1952		   nl80211_command_to_string(cmd), bss->ifname,
1953		   MAC2STR(bss->addr), MAC2STR(data + 4),
1954		   MAC2STR(data + 4 + ETH_ALEN));
1955	if (cmd != NL80211_CMD_FRAME_TX_STATUS && !(data[4] & 0x01) &&
1956	    os_memcmp(bss->addr, data + 4, ETH_ALEN) != 0 &&
1957	    os_memcmp(bss->addr, data + 4 + ETH_ALEN, ETH_ALEN) != 0) {
1958		wpa_printf(MSG_MSGDUMP, "nl80211: %s: Ignore MLME frame event "
1959			   "for foreign address", bss->ifname);
1960		return;
1961	}
1962	wpa_hexdump(MSG_MSGDUMP, "nl80211: MLME event frame",
1963		    nla_data(frame), nla_len(frame));
1964
1965	switch (cmd) {
1966	case NL80211_CMD_AUTHENTICATE:
1967		mlme_event_auth(drv, nla_data(frame), nla_len(frame));
1968		break;
1969	case NL80211_CMD_ASSOCIATE:
1970		mlme_event_assoc(drv, nla_data(frame), nla_len(frame));
1971		break;
1972	case NL80211_CMD_DEAUTHENTICATE:
1973		mlme_event_deauth_disassoc(drv, EVENT_DEAUTH,
1974					   nla_data(frame), nla_len(frame));
1975		break;
1976	case NL80211_CMD_DISASSOCIATE:
1977		mlme_event_deauth_disassoc(drv, EVENT_DISASSOC,
1978					   nla_data(frame), nla_len(frame));
1979		break;
1980	case NL80211_CMD_FRAME:
1981		mlme_event_mgmt(bss, freq, sig, nla_data(frame),
1982				nla_len(frame));
1983		break;
1984	case NL80211_CMD_FRAME_TX_STATUS:
1985		mlme_event_mgmt_tx_status(drv, cookie, nla_data(frame),
1986					  nla_len(frame), ack);
1987		break;
1988	case NL80211_CMD_UNPROT_DEAUTHENTICATE:
1989		mlme_event_unprot_disconnect(drv, EVENT_UNPROT_DEAUTH,
1990					     nla_data(frame), nla_len(frame));
1991		break;
1992	case NL80211_CMD_UNPROT_DISASSOCIATE:
1993		mlme_event_unprot_disconnect(drv, EVENT_UNPROT_DISASSOC,
1994					     nla_data(frame), nla_len(frame));
1995		break;
1996	default:
1997		break;
1998	}
1999}
2000
2001
2002static void mlme_event_michael_mic_failure(struct i802_bss *bss,
2003					   struct nlattr *tb[])
2004{
2005	union wpa_event_data data;
2006
2007	wpa_printf(MSG_DEBUG, "nl80211: MLME event Michael MIC failure");
2008	os_memset(&data, 0, sizeof(data));
2009	if (tb[NL80211_ATTR_MAC]) {
2010		wpa_hexdump(MSG_DEBUG, "nl80211: Source MAC address",
2011			    nla_data(tb[NL80211_ATTR_MAC]),
2012			    nla_len(tb[NL80211_ATTR_MAC]));
2013		data.michael_mic_failure.src = nla_data(tb[NL80211_ATTR_MAC]);
2014	}
2015	if (tb[NL80211_ATTR_KEY_SEQ]) {
2016		wpa_hexdump(MSG_DEBUG, "nl80211: TSC",
2017			    nla_data(tb[NL80211_ATTR_KEY_SEQ]),
2018			    nla_len(tb[NL80211_ATTR_KEY_SEQ]));
2019	}
2020	if (tb[NL80211_ATTR_KEY_TYPE]) {
2021		enum nl80211_key_type key_type =
2022			nla_get_u32(tb[NL80211_ATTR_KEY_TYPE]);
2023		wpa_printf(MSG_DEBUG, "nl80211: Key Type %d", key_type);
2024		if (key_type == NL80211_KEYTYPE_PAIRWISE)
2025			data.michael_mic_failure.unicast = 1;
2026	} else
2027		data.michael_mic_failure.unicast = 1;
2028
2029	if (tb[NL80211_ATTR_KEY_IDX]) {
2030		u8 key_id = nla_get_u8(tb[NL80211_ATTR_KEY_IDX]);
2031		wpa_printf(MSG_DEBUG, "nl80211: Key Id %d", key_id);
2032	}
2033
2034	wpa_supplicant_event(bss->ctx, EVENT_MICHAEL_MIC_FAILURE, &data);
2035}
2036
2037
2038static void mlme_event_join_ibss(struct wpa_driver_nl80211_data *drv,
2039				 struct nlattr *tb[])
2040{
2041	unsigned int freq;
2042
2043	if (tb[NL80211_ATTR_MAC] == NULL) {
2044		wpa_printf(MSG_DEBUG, "nl80211: No address in IBSS joined "
2045			   "event");
2046		return;
2047	}
2048	os_memcpy(drv->bssid, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
2049
2050	drv->associated = 1;
2051	wpa_printf(MSG_DEBUG, "nl80211: IBSS " MACSTR " joined",
2052		   MAC2STR(drv->bssid));
2053
2054	freq = nl80211_get_assoc_freq(drv);
2055	if (freq) {
2056		wpa_printf(MSG_DEBUG, "nl80211: IBSS on frequency %u MHz",
2057			   freq);
2058		drv->first_bss->freq = freq;
2059	}
2060
2061	wpa_supplicant_event(drv->ctx, EVENT_ASSOC, NULL);
2062}
2063
2064
2065static void mlme_event_remain_on_channel(struct wpa_driver_nl80211_data *drv,
2066					 int cancel_event, struct nlattr *tb[])
2067{
2068	unsigned int freq, chan_type, duration;
2069	union wpa_event_data data;
2070	u64 cookie;
2071
2072	if (tb[NL80211_ATTR_WIPHY_FREQ])
2073		freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
2074	else
2075		freq = 0;
2076
2077	if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE])
2078		chan_type = nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]);
2079	else
2080		chan_type = 0;
2081
2082	if (tb[NL80211_ATTR_DURATION])
2083		duration = nla_get_u32(tb[NL80211_ATTR_DURATION]);
2084	else
2085		duration = 0;
2086
2087	if (tb[NL80211_ATTR_COOKIE])
2088		cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
2089	else
2090		cookie = 0;
2091
2092	wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel event (cancel=%d "
2093		   "freq=%u channel_type=%u duration=%u cookie=0x%llx (%s))",
2094		   cancel_event, freq, chan_type, duration,
2095		   (long long unsigned int) cookie,
2096		   cookie == drv->remain_on_chan_cookie ? "match" : "unknown");
2097
2098	if (cookie != drv->remain_on_chan_cookie)
2099		return; /* not for us */
2100
2101	if (cancel_event)
2102		drv->pending_remain_on_chan = 0;
2103
2104	os_memset(&data, 0, sizeof(data));
2105	data.remain_on_channel.freq = freq;
2106	data.remain_on_channel.duration = duration;
2107	wpa_supplicant_event(drv->ctx, cancel_event ?
2108			     EVENT_CANCEL_REMAIN_ON_CHANNEL :
2109			     EVENT_REMAIN_ON_CHANNEL, &data);
2110}
2111
2112
2113static void mlme_event_ft_event(struct wpa_driver_nl80211_data *drv,
2114				struct nlattr *tb[])
2115{
2116	union wpa_event_data data;
2117
2118	os_memset(&data, 0, sizeof(data));
2119
2120	if (tb[NL80211_ATTR_IE]) {
2121		data.ft_ies.ies = nla_data(tb[NL80211_ATTR_IE]);
2122		data.ft_ies.ies_len = nla_len(tb[NL80211_ATTR_IE]);
2123	}
2124
2125	if (tb[NL80211_ATTR_IE_RIC]) {
2126		data.ft_ies.ric_ies = nla_data(tb[NL80211_ATTR_IE_RIC]);
2127		data.ft_ies.ric_ies_len = nla_len(tb[NL80211_ATTR_IE_RIC]);
2128	}
2129
2130	if (tb[NL80211_ATTR_MAC])
2131		os_memcpy(data.ft_ies.target_ap,
2132			  nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
2133
2134	wpa_printf(MSG_DEBUG, "nl80211: FT event target_ap " MACSTR,
2135		   MAC2STR(data.ft_ies.target_ap));
2136
2137	wpa_supplicant_event(drv->ctx, EVENT_FT_RESPONSE, &data);
2138}
2139
2140
2141static void send_scan_event(struct wpa_driver_nl80211_data *drv, int aborted,
2142			    struct nlattr *tb[])
2143{
2144	union wpa_event_data event;
2145	struct nlattr *nl;
2146	int rem;
2147	struct scan_info *info;
2148#define MAX_REPORT_FREQS 50
2149	int freqs[MAX_REPORT_FREQS];
2150	int num_freqs = 0;
2151
2152	if (drv->scan_for_auth) {
2153		drv->scan_for_auth = 0;
2154		wpa_printf(MSG_DEBUG, "nl80211: Scan results for missing "
2155			   "cfg80211 BSS entry");
2156		wpa_driver_nl80211_authenticate_retry(drv);
2157		return;
2158	}
2159
2160	os_memset(&event, 0, sizeof(event));
2161	info = &event.scan_info;
2162	info->aborted = aborted;
2163
2164	if (tb[NL80211_ATTR_SCAN_SSIDS]) {
2165		nla_for_each_nested(nl, tb[NL80211_ATTR_SCAN_SSIDS], rem) {
2166			struct wpa_driver_scan_ssid *s =
2167				&info->ssids[info->num_ssids];
2168			s->ssid = nla_data(nl);
2169			s->ssid_len = nla_len(nl);
2170			wpa_printf(MSG_DEBUG, "nl80211: Scan probed for SSID '%s'",
2171				   wpa_ssid_txt(s->ssid, s->ssid_len));
2172			info->num_ssids++;
2173			if (info->num_ssids == WPAS_MAX_SCAN_SSIDS)
2174				break;
2175		}
2176	}
2177	if (tb[NL80211_ATTR_SCAN_FREQUENCIES]) {
2178		char msg[200], *pos, *end;
2179		int res;
2180
2181		pos = msg;
2182		end = pos + sizeof(msg);
2183		*pos = '\0';
2184
2185		nla_for_each_nested(nl, tb[NL80211_ATTR_SCAN_FREQUENCIES], rem)
2186		{
2187			freqs[num_freqs] = nla_get_u32(nl);
2188			res = os_snprintf(pos, end - pos, " %d",
2189					  freqs[num_freqs]);
2190			if (res > 0 && end - pos > res)
2191				pos += res;
2192			num_freqs++;
2193			if (num_freqs == MAX_REPORT_FREQS - 1)
2194				break;
2195		}
2196		info->freqs = freqs;
2197		info->num_freqs = num_freqs;
2198		wpa_printf(MSG_DEBUG, "nl80211: Scan included frequencies:%s",
2199			   msg);
2200	}
2201	wpa_supplicant_event(drv->ctx, EVENT_SCAN_RESULTS, &event);
2202}
2203
2204
2205static int get_link_signal(struct nl_msg *msg, void *arg)
2206{
2207	struct nlattr *tb[NL80211_ATTR_MAX + 1];
2208	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2209	struct nlattr *sinfo[NL80211_STA_INFO_MAX + 1];
2210	static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = {
2211		[NL80211_STA_INFO_SIGNAL] = { .type = NLA_U8 },
2212		[NL80211_STA_INFO_SIGNAL_AVG] = { .type = NLA_U8 },
2213	};
2214	struct nlattr *rinfo[NL80211_RATE_INFO_MAX + 1];
2215	static struct nla_policy rate_policy[NL80211_RATE_INFO_MAX + 1] = {
2216		[NL80211_RATE_INFO_BITRATE] = { .type = NLA_U16 },
2217		[NL80211_RATE_INFO_MCS] = { .type = NLA_U8 },
2218		[NL80211_RATE_INFO_40_MHZ_WIDTH] = { .type = NLA_FLAG },
2219		[NL80211_RATE_INFO_SHORT_GI] = { .type = NLA_FLAG },
2220	};
2221	struct wpa_signal_info *sig_change = arg;
2222
2223	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2224		  genlmsg_attrlen(gnlh, 0), NULL);
2225	if (!tb[NL80211_ATTR_STA_INFO] ||
2226	    nla_parse_nested(sinfo, NL80211_STA_INFO_MAX,
2227			     tb[NL80211_ATTR_STA_INFO], policy))
2228		return NL_SKIP;
2229	if (!sinfo[NL80211_STA_INFO_SIGNAL])
2230		return NL_SKIP;
2231
2232	sig_change->current_signal =
2233		(s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL]);
2234
2235	if (sinfo[NL80211_STA_INFO_SIGNAL_AVG])
2236		sig_change->avg_signal =
2237			(s8) nla_get_u8(sinfo[NL80211_STA_INFO_SIGNAL_AVG]);
2238	else
2239		sig_change->avg_signal = 0;
2240
2241	if (sinfo[NL80211_STA_INFO_TX_BITRATE]) {
2242		if (nla_parse_nested(rinfo, NL80211_RATE_INFO_MAX,
2243				     sinfo[NL80211_STA_INFO_TX_BITRATE],
2244				     rate_policy)) {
2245			sig_change->current_txrate = 0;
2246		} else {
2247			if (rinfo[NL80211_RATE_INFO_BITRATE]) {
2248				sig_change->current_txrate =
2249					nla_get_u16(rinfo[
2250					     NL80211_RATE_INFO_BITRATE]) * 100;
2251			}
2252		}
2253	}
2254
2255	return NL_SKIP;
2256}
2257
2258
2259static int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
2260				   struct wpa_signal_info *sig)
2261{
2262	struct nl_msg *msg;
2263
2264	sig->current_signal = -9999;
2265	sig->current_txrate = 0;
2266
2267	msg = nlmsg_alloc();
2268	if (!msg)
2269		return -ENOMEM;
2270
2271	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_STATION);
2272
2273	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2274	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid);
2275
2276	return send_and_recv_msgs(drv, msg, get_link_signal, sig);
2277 nla_put_failure:
2278	nlmsg_free(msg);
2279	return -ENOBUFS;
2280}
2281
2282
2283static int get_link_noise(struct nl_msg *msg, void *arg)
2284{
2285	struct nlattr *tb[NL80211_ATTR_MAX + 1];
2286	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2287	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
2288	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
2289		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
2290		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
2291	};
2292	struct wpa_signal_info *sig_change = arg;
2293
2294	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2295		  genlmsg_attrlen(gnlh, 0), NULL);
2296
2297	if (!tb[NL80211_ATTR_SURVEY_INFO]) {
2298		wpa_printf(MSG_DEBUG, "nl80211: survey data missing!");
2299		return NL_SKIP;
2300	}
2301
2302	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
2303			     tb[NL80211_ATTR_SURVEY_INFO],
2304			     survey_policy)) {
2305		wpa_printf(MSG_DEBUG, "nl80211: failed to parse nested "
2306			   "attributes!");
2307		return NL_SKIP;
2308	}
2309
2310	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
2311		return NL_SKIP;
2312
2313	if (nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
2314	    sig_change->frequency)
2315		return NL_SKIP;
2316
2317	if (!sinfo[NL80211_SURVEY_INFO_NOISE])
2318		return NL_SKIP;
2319
2320	sig_change->current_noise =
2321		(s8) nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
2322
2323	return NL_SKIP;
2324}
2325
2326
2327static int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
2328				  struct wpa_signal_info *sig_change)
2329{
2330	struct nl_msg *msg;
2331
2332	sig_change->current_noise = 9999;
2333	sig_change->frequency = drv->assoc_freq;
2334
2335	msg = nlmsg_alloc();
2336	if (!msg)
2337		return -ENOMEM;
2338
2339	nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
2340
2341	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2342
2343	return send_and_recv_msgs(drv, msg, get_link_noise, sig_change);
2344 nla_put_failure:
2345	nlmsg_free(msg);
2346	return -ENOBUFS;
2347}
2348
2349
2350static int get_noise_for_scan_results(struct nl_msg *msg, void *arg)
2351{
2352	struct nlattr *tb[NL80211_ATTR_MAX + 1];
2353	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
2354	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
2355	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
2356		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
2357		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
2358	};
2359	struct wpa_scan_results *scan_results = arg;
2360	struct wpa_scan_res *scan_res;
2361	size_t i;
2362
2363	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
2364		  genlmsg_attrlen(gnlh, 0), NULL);
2365
2366	if (!tb[NL80211_ATTR_SURVEY_INFO]) {
2367		wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
2368		return NL_SKIP;
2369	}
2370
2371	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
2372			     tb[NL80211_ATTR_SURVEY_INFO],
2373			     survey_policy)) {
2374		wpa_printf(MSG_DEBUG, "nl80211: Failed to parse nested "
2375			   "attributes");
2376		return NL_SKIP;
2377	}
2378
2379	if (!sinfo[NL80211_SURVEY_INFO_NOISE])
2380		return NL_SKIP;
2381
2382	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
2383		return NL_SKIP;
2384
2385	for (i = 0; i < scan_results->num; ++i) {
2386		scan_res = scan_results->res[i];
2387		if (!scan_res)
2388			continue;
2389		if ((int) nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
2390		    scan_res->freq)
2391			continue;
2392		if (!(scan_res->flags & WPA_SCAN_NOISE_INVALID))
2393			continue;
2394		scan_res->noise = (s8)
2395			nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
2396		scan_res->flags &= ~WPA_SCAN_NOISE_INVALID;
2397	}
2398
2399	return NL_SKIP;
2400}
2401
2402
2403static int nl80211_get_noise_for_scan_results(
2404	struct wpa_driver_nl80211_data *drv,
2405	struct wpa_scan_results *scan_res)
2406{
2407	struct nl_msg *msg;
2408
2409	msg = nlmsg_alloc();
2410	if (!msg)
2411		return -ENOMEM;
2412
2413	nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
2414
2415	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
2416
2417	return send_and_recv_msgs(drv, msg, get_noise_for_scan_results,
2418				  scan_res);
2419 nla_put_failure:
2420	nlmsg_free(msg);
2421	return -ENOBUFS;
2422}
2423
2424
2425static void nl80211_cqm_event(struct wpa_driver_nl80211_data *drv,
2426			      struct nlattr *tb[])
2427{
2428	static struct nla_policy cqm_policy[NL80211_ATTR_CQM_MAX + 1] = {
2429		[NL80211_ATTR_CQM_RSSI_THOLD] = { .type = NLA_U32 },
2430		[NL80211_ATTR_CQM_RSSI_HYST] = { .type = NLA_U8 },
2431		[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] = { .type = NLA_U32 },
2432		[NL80211_ATTR_CQM_PKT_LOSS_EVENT] = { .type = NLA_U32 },
2433	};
2434	struct nlattr *cqm[NL80211_ATTR_CQM_MAX + 1];
2435	enum nl80211_cqm_rssi_threshold_event event;
2436	union wpa_event_data ed;
2437	struct wpa_signal_info sig;
2438	int res;
2439
2440	if (tb[NL80211_ATTR_CQM] == NULL ||
2441	    nla_parse_nested(cqm, NL80211_ATTR_CQM_MAX, tb[NL80211_ATTR_CQM],
2442			     cqm_policy)) {
2443		wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid CQM event");
2444		return;
2445	}
2446
2447	os_memset(&ed, 0, sizeof(ed));
2448
2449	if (cqm[NL80211_ATTR_CQM_PKT_LOSS_EVENT]) {
2450		if (!tb[NL80211_ATTR_MAC])
2451			return;
2452		os_memcpy(ed.low_ack.addr, nla_data(tb[NL80211_ATTR_MAC]),
2453			  ETH_ALEN);
2454		wpa_supplicant_event(drv->ctx, EVENT_STATION_LOW_ACK, &ed);
2455		return;
2456	}
2457
2458	if (cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT] == NULL)
2459		return;
2460	event = nla_get_u32(cqm[NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT]);
2461
2462	if (event == NL80211_CQM_RSSI_THRESHOLD_EVENT_HIGH) {
2463		wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor "
2464			   "event: RSSI high");
2465		ed.signal_change.above_threshold = 1;
2466	} else if (event == NL80211_CQM_RSSI_THRESHOLD_EVENT_LOW) {
2467		wpa_printf(MSG_DEBUG, "nl80211: Connection quality monitor "
2468			   "event: RSSI low");
2469		ed.signal_change.above_threshold = 0;
2470	} else
2471		return;
2472
2473	res = nl80211_get_link_signal(drv, &sig);
2474	if (res == 0) {
2475		ed.signal_change.current_signal = sig.current_signal;
2476		ed.signal_change.current_txrate = sig.current_txrate;
2477		wpa_printf(MSG_DEBUG, "nl80211: Signal: %d dBm  txrate: %d",
2478			   sig.current_signal, sig.current_txrate);
2479	}
2480
2481	res = nl80211_get_link_noise(drv, &sig);
2482	if (res == 0) {
2483		ed.signal_change.current_noise = sig.current_noise;
2484		wpa_printf(MSG_DEBUG, "nl80211: Noise: %d dBm",
2485			   sig.current_noise);
2486	}
2487
2488	wpa_supplicant_event(drv->ctx, EVENT_SIGNAL_CHANGE, &ed);
2489}
2490
2491
2492static void nl80211_new_station_event(struct wpa_driver_nl80211_data *drv,
2493				      struct nlattr **tb)
2494{
2495	u8 *addr;
2496	union wpa_event_data data;
2497
2498	if (tb[NL80211_ATTR_MAC] == NULL)
2499		return;
2500	addr = nla_data(tb[NL80211_ATTR_MAC]);
2501	wpa_printf(MSG_DEBUG, "nl80211: New station " MACSTR, MAC2STR(addr));
2502
2503	if (is_ap_interface(drv->nlmode) && drv->device_ap_sme) {
2504		u8 *ies = NULL;
2505		size_t ies_len = 0;
2506		if (tb[NL80211_ATTR_IE]) {
2507			ies = nla_data(tb[NL80211_ATTR_IE]);
2508			ies_len = nla_len(tb[NL80211_ATTR_IE]);
2509		}
2510		wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len);
2511		drv_event_assoc(drv->ctx, addr, ies, ies_len, 0);
2512		return;
2513	}
2514
2515	if (drv->nlmode != NL80211_IFTYPE_ADHOC)
2516		return;
2517
2518	os_memset(&data, 0, sizeof(data));
2519	os_memcpy(data.ibss_rsn_start.peer, addr, ETH_ALEN);
2520	wpa_supplicant_event(drv->ctx, EVENT_IBSS_RSN_START, &data);
2521}
2522
2523
2524static void nl80211_del_station_event(struct wpa_driver_nl80211_data *drv,
2525				      struct nlattr **tb)
2526{
2527	u8 *addr;
2528	union wpa_event_data data;
2529
2530	if (tb[NL80211_ATTR_MAC] == NULL)
2531		return;
2532	addr = nla_data(tb[NL80211_ATTR_MAC]);
2533	wpa_printf(MSG_DEBUG, "nl80211: Delete station " MACSTR,
2534		   MAC2STR(addr));
2535
2536	if (is_ap_interface(drv->nlmode) && drv->device_ap_sme) {
2537		drv_event_disassoc(drv->ctx, addr);
2538		return;
2539	}
2540
2541	if (drv->nlmode != NL80211_IFTYPE_ADHOC)
2542		return;
2543
2544	os_memset(&data, 0, sizeof(data));
2545	os_memcpy(data.ibss_peer_lost.peer, addr, ETH_ALEN);
2546	wpa_supplicant_event(drv->ctx, EVENT_IBSS_PEER_LOST, &data);
2547}
2548
2549
2550static void nl80211_rekey_offload_event(struct wpa_driver_nl80211_data *drv,
2551					struct nlattr **tb)
2552{
2553	struct nlattr *rekey_info[NUM_NL80211_REKEY_DATA];
2554	static struct nla_policy rekey_policy[NUM_NL80211_REKEY_DATA] = {
2555		[NL80211_REKEY_DATA_KEK] = {
2556			.minlen = NL80211_KEK_LEN,
2557			.maxlen = NL80211_KEK_LEN,
2558		},
2559		[NL80211_REKEY_DATA_KCK] = {
2560			.minlen = NL80211_KCK_LEN,
2561			.maxlen = NL80211_KCK_LEN,
2562		},
2563		[NL80211_REKEY_DATA_REPLAY_CTR] = {
2564			.minlen = NL80211_REPLAY_CTR_LEN,
2565			.maxlen = NL80211_REPLAY_CTR_LEN,
2566		},
2567	};
2568	union wpa_event_data data;
2569
2570	if (!tb[NL80211_ATTR_MAC])
2571		return;
2572	if (!tb[NL80211_ATTR_REKEY_DATA])
2573		return;
2574	if (nla_parse_nested(rekey_info, MAX_NL80211_REKEY_DATA,
2575			     tb[NL80211_ATTR_REKEY_DATA], rekey_policy))
2576		return;
2577	if (!rekey_info[NL80211_REKEY_DATA_REPLAY_CTR])
2578		return;
2579
2580	os_memset(&data, 0, sizeof(data));
2581	data.driver_gtk_rekey.bssid = nla_data(tb[NL80211_ATTR_MAC]);
2582	wpa_printf(MSG_DEBUG, "nl80211: Rekey offload event for BSSID " MACSTR,
2583		   MAC2STR(data.driver_gtk_rekey.bssid));
2584	data.driver_gtk_rekey.replay_ctr =
2585		nla_data(rekey_info[NL80211_REKEY_DATA_REPLAY_CTR]);
2586	wpa_hexdump(MSG_DEBUG, "nl80211: Rekey offload - Replay Counter",
2587		    data.driver_gtk_rekey.replay_ctr, NL80211_REPLAY_CTR_LEN);
2588	wpa_supplicant_event(drv->ctx, EVENT_DRIVER_GTK_REKEY, &data);
2589}
2590
2591
2592static void nl80211_pmksa_candidate_event(struct wpa_driver_nl80211_data *drv,
2593					  struct nlattr **tb)
2594{
2595	struct nlattr *cand[NUM_NL80211_PMKSA_CANDIDATE];
2596	static struct nla_policy cand_policy[NUM_NL80211_PMKSA_CANDIDATE] = {
2597		[NL80211_PMKSA_CANDIDATE_INDEX] = { .type = NLA_U32 },
2598		[NL80211_PMKSA_CANDIDATE_BSSID] = {
2599			.minlen = ETH_ALEN,
2600			.maxlen = ETH_ALEN,
2601		},
2602		[NL80211_PMKSA_CANDIDATE_PREAUTH] = { .type = NLA_FLAG },
2603	};
2604	union wpa_event_data data;
2605
2606	wpa_printf(MSG_DEBUG, "nl80211: PMKSA candidate event");
2607
2608	if (!tb[NL80211_ATTR_PMKSA_CANDIDATE])
2609		return;
2610	if (nla_parse_nested(cand, MAX_NL80211_PMKSA_CANDIDATE,
2611			     tb[NL80211_ATTR_PMKSA_CANDIDATE], cand_policy))
2612		return;
2613	if (!cand[NL80211_PMKSA_CANDIDATE_INDEX] ||
2614	    !cand[NL80211_PMKSA_CANDIDATE_BSSID])
2615		return;
2616
2617	os_memset(&data, 0, sizeof(data));
2618	os_memcpy(data.pmkid_candidate.bssid,
2619		  nla_data(cand[NL80211_PMKSA_CANDIDATE_BSSID]), ETH_ALEN);
2620	data.pmkid_candidate.index =
2621		nla_get_u32(cand[NL80211_PMKSA_CANDIDATE_INDEX]);
2622	data.pmkid_candidate.preauth =
2623		cand[NL80211_PMKSA_CANDIDATE_PREAUTH] != NULL;
2624	wpa_supplicant_event(drv->ctx, EVENT_PMKID_CANDIDATE, &data);
2625}
2626
2627
2628static void nl80211_client_probe_event(struct wpa_driver_nl80211_data *drv,
2629				       struct nlattr **tb)
2630{
2631	union wpa_event_data data;
2632
2633	wpa_printf(MSG_DEBUG, "nl80211: Probe client event");
2634
2635	if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_ACK])
2636		return;
2637
2638	os_memset(&data, 0, sizeof(data));
2639	os_memcpy(data.client_poll.addr,
2640		  nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
2641
2642	wpa_supplicant_event(drv->ctx, EVENT_DRIVER_CLIENT_POLL_OK, &data);
2643}
2644
2645
2646static void nl80211_tdls_oper_event(struct wpa_driver_nl80211_data *drv,
2647				    struct nlattr **tb)
2648{
2649	union wpa_event_data data;
2650
2651	wpa_printf(MSG_DEBUG, "nl80211: TDLS operation event");
2652
2653	if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_TDLS_OPERATION])
2654		return;
2655
2656	os_memset(&data, 0, sizeof(data));
2657	os_memcpy(data.tdls.peer, nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
2658	switch (nla_get_u8(tb[NL80211_ATTR_TDLS_OPERATION])) {
2659	case NL80211_TDLS_SETUP:
2660		wpa_printf(MSG_DEBUG, "nl80211: TDLS setup request for peer "
2661			   MACSTR, MAC2STR(data.tdls.peer));
2662		data.tdls.oper = TDLS_REQUEST_SETUP;
2663		break;
2664	case NL80211_TDLS_TEARDOWN:
2665		wpa_printf(MSG_DEBUG, "nl80211: TDLS teardown request for peer "
2666			   MACSTR, MAC2STR(data.tdls.peer));
2667		data.tdls.oper = TDLS_REQUEST_TEARDOWN;
2668		break;
2669	default:
2670		wpa_printf(MSG_DEBUG, "nl80211: Unsupported TDLS operatione "
2671			   "event");
2672		return;
2673	}
2674	if (tb[NL80211_ATTR_REASON_CODE]) {
2675		data.tdls.reason_code =
2676			nla_get_u16(tb[NL80211_ATTR_REASON_CODE]);
2677	}
2678
2679	wpa_supplicant_event(drv->ctx, EVENT_TDLS, &data);
2680}
2681
2682
2683static void nl80211_stop_ap(struct wpa_driver_nl80211_data *drv,
2684			    struct nlattr **tb)
2685{
2686	wpa_supplicant_event(drv->ctx, EVENT_INTERFACE_UNAVAILABLE, NULL);
2687}
2688
2689
2690static void nl80211_connect_failed_event(struct wpa_driver_nl80211_data *drv,
2691					 struct nlattr **tb)
2692{
2693	union wpa_event_data data;
2694	u32 reason;
2695
2696	wpa_printf(MSG_DEBUG, "nl80211: Connect failed event");
2697
2698	if (!tb[NL80211_ATTR_MAC] || !tb[NL80211_ATTR_CONN_FAILED_REASON])
2699		return;
2700
2701	os_memset(&data, 0, sizeof(data));
2702	os_memcpy(data.connect_failed_reason.addr,
2703		  nla_data(tb[NL80211_ATTR_MAC]), ETH_ALEN);
2704
2705	reason = nla_get_u32(tb[NL80211_ATTR_CONN_FAILED_REASON]);
2706	switch (reason) {
2707	case NL80211_CONN_FAIL_MAX_CLIENTS:
2708		wpa_printf(MSG_DEBUG, "nl80211: Max client reached");
2709		data.connect_failed_reason.code = MAX_CLIENT_REACHED;
2710		break;
2711	case NL80211_CONN_FAIL_BLOCKED_CLIENT:
2712		wpa_printf(MSG_DEBUG, "nl80211: Blocked client " MACSTR
2713			   " tried to connect",
2714			   MAC2STR(data.connect_failed_reason.addr));
2715		data.connect_failed_reason.code = BLOCKED_CLIENT;
2716		break;
2717	default:
2718		wpa_printf(MSG_DEBUG, "nl8021l: Unknown connect failed reason "
2719			   "%u", reason);
2720		return;
2721	}
2722
2723	wpa_supplicant_event(drv->ctx, EVENT_CONNECT_FAILED_REASON, &data);
2724}
2725
2726
2727static void nl80211_radar_event(struct wpa_driver_nl80211_data *drv,
2728				struct nlattr **tb)
2729{
2730	union wpa_event_data data;
2731	enum nl80211_radar_event event_type;
2732
2733	if (!tb[NL80211_ATTR_WIPHY_FREQ] || !tb[NL80211_ATTR_RADAR_EVENT])
2734		return;
2735
2736	os_memset(&data, 0, sizeof(data));
2737	data.dfs_event.freq = nla_get_u32(tb[NL80211_ATTR_WIPHY_FREQ]);
2738	event_type = nla_get_u32(tb[NL80211_ATTR_RADAR_EVENT]);
2739
2740	/* Check HT params */
2741	if (tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE]) {
2742		data.dfs_event.ht_enabled = 1;
2743		data.dfs_event.chan_offset = 0;
2744
2745		switch (nla_get_u32(tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE])) {
2746		case NL80211_CHAN_NO_HT:
2747			data.dfs_event.ht_enabled = 0;
2748			break;
2749		case NL80211_CHAN_HT20:
2750			break;
2751		case NL80211_CHAN_HT40PLUS:
2752			data.dfs_event.chan_offset = 1;
2753			break;
2754		case NL80211_CHAN_HT40MINUS:
2755			data.dfs_event.chan_offset = -1;
2756			break;
2757		}
2758	}
2759
2760	/* Get VHT params */
2761	if (tb[NL80211_ATTR_CHANNEL_WIDTH])
2762		data.dfs_event.chan_width =
2763			convert2width(nla_get_u32(
2764					      tb[NL80211_ATTR_CHANNEL_WIDTH]));
2765	if (tb[NL80211_ATTR_CENTER_FREQ1])
2766		data.dfs_event.cf1 = nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
2767	if (tb[NL80211_ATTR_CENTER_FREQ2])
2768		data.dfs_event.cf2 = nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
2769
2770	wpa_printf(MSG_DEBUG, "nl80211: DFS event on freq %d MHz, ht: %d, offset: %d, width: %d, cf1: %dMHz, cf2: %dMHz",
2771		   data.dfs_event.freq, data.dfs_event.ht_enabled,
2772		   data.dfs_event.chan_offset, data.dfs_event.chan_width,
2773		   data.dfs_event.cf1, data.dfs_event.cf2);
2774
2775	switch (event_type) {
2776	case NL80211_RADAR_DETECTED:
2777		wpa_supplicant_event(drv->ctx, EVENT_DFS_RADAR_DETECTED, &data);
2778		break;
2779	case NL80211_RADAR_CAC_FINISHED:
2780		wpa_supplicant_event(drv->ctx, EVENT_DFS_CAC_FINISHED, &data);
2781		break;
2782	case NL80211_RADAR_CAC_ABORTED:
2783		wpa_supplicant_event(drv->ctx, EVENT_DFS_CAC_ABORTED, &data);
2784		break;
2785	case NL80211_RADAR_NOP_FINISHED:
2786		wpa_supplicant_event(drv->ctx, EVENT_DFS_NOP_FINISHED, &data);
2787		break;
2788	default:
2789		wpa_printf(MSG_DEBUG, "nl80211: Unknown radar event %d "
2790			   "received", event_type);
2791		break;
2792	}
2793}
2794
2795
2796static void nl80211_spurious_frame(struct i802_bss *bss, struct nlattr **tb,
2797				   int wds)
2798{
2799	struct wpa_driver_nl80211_data *drv = bss->drv;
2800	union wpa_event_data event;
2801
2802	if (!tb[NL80211_ATTR_MAC])
2803		return;
2804
2805	os_memset(&event, 0, sizeof(event));
2806	event.rx_from_unknown.bssid = bss->addr;
2807	event.rx_from_unknown.addr = nla_data(tb[NL80211_ATTR_MAC]);
2808	event.rx_from_unknown.wds = wds;
2809
2810	wpa_supplicant_event(drv->ctx, EVENT_RX_FROM_UNKNOWN, &event);
2811}
2812
2813
2814static void qca_nl80211_avoid_freq(struct wpa_driver_nl80211_data *drv,
2815				   const u8 *data, size_t len)
2816{
2817	u32 i, count;
2818	union wpa_event_data event;
2819	struct wpa_freq_range *range = NULL;
2820	const struct qca_avoid_freq_list *freq_range;
2821
2822	freq_range = (const struct qca_avoid_freq_list *) data;
2823	if (len < sizeof(freq_range->count))
2824		return;
2825
2826	count = freq_range->count;
2827	if (len < sizeof(freq_range->count) +
2828	    count * sizeof(struct qca_avoid_freq_range)) {
2829		wpa_printf(MSG_DEBUG, "nl80211: Ignored too short avoid frequency list (len=%u)",
2830			   (unsigned int) len);
2831		return;
2832	}
2833
2834	if (count > 0) {
2835		range = os_calloc(count, sizeof(struct wpa_freq_range));
2836		if (range == NULL)
2837			return;
2838	}
2839
2840	os_memset(&event, 0, sizeof(event));
2841	for (i = 0; i < count; i++) {
2842		unsigned int idx = event.freq_range.num;
2843		range[idx].min = freq_range->range[i].start_freq;
2844		range[idx].max = freq_range->range[i].end_freq;
2845		wpa_printf(MSG_DEBUG, "nl80211: Avoid frequency range: %u-%u",
2846			   range[idx].min, range[idx].max);
2847		if (range[idx].min > range[idx].max) {
2848			wpa_printf(MSG_DEBUG, "nl80211: Ignore invalid frequency range");
2849			continue;
2850		}
2851		event.freq_range.num++;
2852	}
2853	event.freq_range.range = range;
2854
2855	wpa_supplicant_event(drv->ctx, EVENT_AVOID_FREQUENCIES, &event);
2856
2857	os_free(range);
2858}
2859
2860
2861static void nl80211_vendor_event_qca(struct wpa_driver_nl80211_data *drv,
2862				     u32 subcmd, u8 *data, size_t len)
2863{
2864	switch (subcmd) {
2865	case QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY:
2866		qca_nl80211_avoid_freq(drv, data, len);
2867		break;
2868	default:
2869		wpa_printf(MSG_DEBUG,
2870			   "nl80211: Ignore unsupported QCA vendor event %u",
2871			   subcmd);
2872		break;
2873	}
2874}
2875
2876
2877static void nl80211_vendor_event(struct wpa_driver_nl80211_data *drv,
2878				 struct nlattr **tb)
2879{
2880	u32 vendor_id, subcmd, wiphy = 0;
2881	int wiphy_idx;
2882	u8 *data = NULL;
2883	size_t len = 0;
2884
2885	if (!tb[NL80211_ATTR_VENDOR_ID] ||
2886	    !tb[NL80211_ATTR_VENDOR_SUBCMD])
2887		return;
2888
2889	vendor_id = nla_get_u32(tb[NL80211_ATTR_VENDOR_ID]);
2890	subcmd = nla_get_u32(tb[NL80211_ATTR_VENDOR_SUBCMD]);
2891
2892	if (tb[NL80211_ATTR_WIPHY])
2893		wiphy = nla_get_u32(tb[NL80211_ATTR_WIPHY]);
2894
2895	wpa_printf(MSG_DEBUG, "nl80211: Vendor event: wiphy=%u vendor_id=0x%x subcmd=%u",
2896		   wiphy, vendor_id, subcmd);
2897
2898	if (tb[NL80211_ATTR_VENDOR_DATA]) {
2899		data = nla_data(tb[NL80211_ATTR_VENDOR_DATA]);
2900		len = nla_len(tb[NL80211_ATTR_VENDOR_DATA]);
2901		wpa_hexdump(MSG_MSGDUMP, "nl80211: Vendor data", data, len);
2902	}
2903
2904	wiphy_idx = nl80211_get_wiphy_index(drv->first_bss);
2905	if (wiphy_idx >= 0 && wiphy_idx != (int) wiphy) {
2906		wpa_printf(MSG_DEBUG, "nl80211: Ignore vendor event for foreign wiphy %u (own: %d)",
2907			   wiphy, wiphy_idx);
2908		return;
2909	}
2910
2911	switch (vendor_id) {
2912	case OUI_QCA:
2913		nl80211_vendor_event_qca(drv, subcmd, data, len);
2914		break;
2915	default:
2916		wpa_printf(MSG_DEBUG, "nl80211: Ignore unsupported vendor event");
2917		break;
2918	}
2919}
2920
2921
2922static void nl80211_reg_change_event(struct wpa_driver_nl80211_data *drv,
2923				     struct nlattr *tb[])
2924{
2925	union wpa_event_data data;
2926	enum nl80211_reg_initiator init;
2927
2928	wpa_printf(MSG_DEBUG, "nl80211: Regulatory domain change");
2929
2930	if (tb[NL80211_ATTR_REG_INITIATOR] == NULL)
2931		return;
2932
2933	os_memset(&data, 0, sizeof(data));
2934	init = nla_get_u8(tb[NL80211_ATTR_REG_INITIATOR]);
2935	wpa_printf(MSG_DEBUG, " * initiator=%d", init);
2936	switch (init) {
2937	case NL80211_REGDOM_SET_BY_CORE:
2938		data.channel_list_changed.initiator = REGDOM_SET_BY_CORE;
2939		break;
2940	case NL80211_REGDOM_SET_BY_USER:
2941		data.channel_list_changed.initiator = REGDOM_SET_BY_USER;
2942		break;
2943	case NL80211_REGDOM_SET_BY_DRIVER:
2944		data.channel_list_changed.initiator = REGDOM_SET_BY_DRIVER;
2945		break;
2946	case NL80211_REGDOM_SET_BY_COUNTRY_IE:
2947		data.channel_list_changed.initiator = REGDOM_SET_BY_COUNTRY_IE;
2948		break;
2949	}
2950
2951	if (tb[NL80211_ATTR_REG_TYPE]) {
2952		enum nl80211_reg_type type;
2953		type = nla_get_u8(tb[NL80211_ATTR_REG_TYPE]);
2954		wpa_printf(MSG_DEBUG, " * type=%d", type);
2955		switch (type) {
2956		case NL80211_REGDOM_TYPE_COUNTRY:
2957			data.channel_list_changed.type = REGDOM_TYPE_COUNTRY;
2958			break;
2959		case NL80211_REGDOM_TYPE_WORLD:
2960			data.channel_list_changed.type = REGDOM_TYPE_WORLD;
2961			break;
2962		case NL80211_REGDOM_TYPE_CUSTOM_WORLD:
2963			data.channel_list_changed.type =
2964				REGDOM_TYPE_CUSTOM_WORLD;
2965			break;
2966		case NL80211_REGDOM_TYPE_INTERSECTION:
2967			data.channel_list_changed.type =
2968				REGDOM_TYPE_INTERSECTION;
2969			break;
2970		}
2971	}
2972
2973	if (tb[NL80211_ATTR_REG_ALPHA2]) {
2974		os_strlcpy(data.channel_list_changed.alpha2,
2975			   nla_get_string(tb[NL80211_ATTR_REG_ALPHA2]),
2976			   sizeof(data.channel_list_changed.alpha2));
2977		wpa_printf(MSG_DEBUG, " * alpha2=%s",
2978			   data.channel_list_changed.alpha2);
2979	}
2980
2981	wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED, &data);
2982}
2983
2984
2985static void do_process_drv_event(struct i802_bss *bss, int cmd,
2986				 struct nlattr **tb)
2987{
2988	struct wpa_driver_nl80211_data *drv = bss->drv;
2989	union wpa_event_data data;
2990
2991	wpa_printf(MSG_DEBUG, "nl80211: Drv Event %d (%s) received for %s",
2992		   cmd, nl80211_command_to_string(cmd), bss->ifname);
2993
2994	if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED &&
2995	    (cmd == NL80211_CMD_NEW_SCAN_RESULTS ||
2996	     cmd == NL80211_CMD_SCAN_ABORTED)) {
2997		wpa_driver_nl80211_set_mode(drv->first_bss,
2998					    drv->ap_scan_as_station);
2999		drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
3000	}
3001
3002	switch (cmd) {
3003	case NL80211_CMD_TRIGGER_SCAN:
3004		wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan trigger");
3005		drv->scan_state = SCAN_STARTED;
3006		if (drv->scan_for_auth) {
3007			/*
3008			 * Cannot indicate EVENT_SCAN_STARTED here since we skip
3009			 * EVENT_SCAN_RESULTS in scan_for_auth case and the
3010			 * upper layer implementation could get confused about
3011			 * scanning state.
3012			 */
3013			wpa_printf(MSG_DEBUG, "nl80211: Do not indicate scan-start event due to internal scan_for_auth");
3014			break;
3015		}
3016		wpa_supplicant_event(drv->ctx, EVENT_SCAN_STARTED, NULL);
3017		break;
3018	case NL80211_CMD_START_SCHED_SCAN:
3019		wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan started");
3020		drv->scan_state = SCHED_SCAN_STARTED;
3021		break;
3022	case NL80211_CMD_SCHED_SCAN_STOPPED:
3023		wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan stopped");
3024		drv->scan_state = SCHED_SCAN_STOPPED;
3025		wpa_supplicant_event(drv->ctx, EVENT_SCHED_SCAN_STOPPED, NULL);
3026		break;
3027	case NL80211_CMD_NEW_SCAN_RESULTS:
3028		wpa_dbg(drv->ctx, MSG_DEBUG,
3029			"nl80211: New scan results available");
3030		drv->scan_state = SCAN_COMPLETED;
3031		drv->scan_complete_events = 1;
3032		eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
3033				     drv->ctx);
3034		send_scan_event(drv, 0, tb);
3035		break;
3036	case NL80211_CMD_SCHED_SCAN_RESULTS:
3037		wpa_dbg(drv->ctx, MSG_DEBUG,
3038			"nl80211: New sched scan results available");
3039		drv->scan_state = SCHED_SCAN_RESULTS;
3040		send_scan_event(drv, 0, tb);
3041		break;
3042	case NL80211_CMD_SCAN_ABORTED:
3043		wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan aborted");
3044		drv->scan_state = SCAN_ABORTED;
3045		/*
3046		 * Need to indicate that scan results are available in order
3047		 * not to make wpa_supplicant stop its scanning.
3048		 */
3049		eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv,
3050				     drv->ctx);
3051		send_scan_event(drv, 1, tb);
3052		break;
3053	case NL80211_CMD_AUTHENTICATE:
3054	case NL80211_CMD_ASSOCIATE:
3055	case NL80211_CMD_DEAUTHENTICATE:
3056	case NL80211_CMD_DISASSOCIATE:
3057	case NL80211_CMD_FRAME_TX_STATUS:
3058	case NL80211_CMD_UNPROT_DEAUTHENTICATE:
3059	case NL80211_CMD_UNPROT_DISASSOCIATE:
3060		mlme_event(bss, cmd, tb[NL80211_ATTR_FRAME],
3061			   tb[NL80211_ATTR_MAC], tb[NL80211_ATTR_TIMED_OUT],
3062			   tb[NL80211_ATTR_WIPHY_FREQ], tb[NL80211_ATTR_ACK],
3063			   tb[NL80211_ATTR_COOKIE],
3064			   tb[NL80211_ATTR_RX_SIGNAL_DBM]);
3065		break;
3066	case NL80211_CMD_CONNECT:
3067	case NL80211_CMD_ROAM:
3068		mlme_event_connect(drv, cmd,
3069				   tb[NL80211_ATTR_STATUS_CODE],
3070				   tb[NL80211_ATTR_MAC],
3071				   tb[NL80211_ATTR_REQ_IE],
3072				   tb[NL80211_ATTR_RESP_IE]);
3073		break;
3074	case NL80211_CMD_CH_SWITCH_NOTIFY:
3075		mlme_event_ch_switch(drv,
3076				     tb[NL80211_ATTR_IFINDEX],
3077				     tb[NL80211_ATTR_WIPHY_FREQ],
3078				     tb[NL80211_ATTR_WIPHY_CHANNEL_TYPE],
3079				     tb[NL80211_ATTR_CHANNEL_WIDTH],
3080				     tb[NL80211_ATTR_CENTER_FREQ1],
3081				     tb[NL80211_ATTR_CENTER_FREQ2]);
3082		break;
3083	case NL80211_CMD_DISCONNECT:
3084		mlme_event_disconnect(drv, tb[NL80211_ATTR_REASON_CODE],
3085				      tb[NL80211_ATTR_MAC],
3086				      tb[NL80211_ATTR_DISCONNECTED_BY_AP]);
3087		break;
3088	case NL80211_CMD_MICHAEL_MIC_FAILURE:
3089		mlme_event_michael_mic_failure(bss, tb);
3090		break;
3091	case NL80211_CMD_JOIN_IBSS:
3092		mlme_event_join_ibss(drv, tb);
3093		break;
3094	case NL80211_CMD_REMAIN_ON_CHANNEL:
3095		mlme_event_remain_on_channel(drv, 0, tb);
3096		break;
3097	case NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL:
3098		mlme_event_remain_on_channel(drv, 1, tb);
3099		break;
3100	case NL80211_CMD_NOTIFY_CQM:
3101		nl80211_cqm_event(drv, tb);
3102		break;
3103	case NL80211_CMD_REG_CHANGE:
3104		nl80211_reg_change_event(drv, tb);
3105		break;
3106	case NL80211_CMD_REG_BEACON_HINT:
3107		wpa_printf(MSG_DEBUG, "nl80211: Regulatory beacon hint");
3108		os_memset(&data, 0, sizeof(data));
3109		data.channel_list_changed.initiator = REGDOM_BEACON_HINT;
3110		wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED,
3111				     &data);
3112		break;
3113	case NL80211_CMD_NEW_STATION:
3114		nl80211_new_station_event(drv, tb);
3115		break;
3116	case NL80211_CMD_DEL_STATION:
3117		nl80211_del_station_event(drv, tb);
3118		break;
3119	case NL80211_CMD_SET_REKEY_OFFLOAD:
3120		nl80211_rekey_offload_event(drv, tb);
3121		break;
3122	case NL80211_CMD_PMKSA_CANDIDATE:
3123		nl80211_pmksa_candidate_event(drv, tb);
3124		break;
3125	case NL80211_CMD_PROBE_CLIENT:
3126		nl80211_client_probe_event(drv, tb);
3127		break;
3128	case NL80211_CMD_TDLS_OPER:
3129		nl80211_tdls_oper_event(drv, tb);
3130		break;
3131	case NL80211_CMD_CONN_FAILED:
3132		nl80211_connect_failed_event(drv, tb);
3133		break;
3134	case NL80211_CMD_FT_EVENT:
3135		mlme_event_ft_event(drv, tb);
3136		break;
3137	case NL80211_CMD_RADAR_DETECT:
3138		nl80211_radar_event(drv, tb);
3139		break;
3140	case NL80211_CMD_STOP_AP:
3141		nl80211_stop_ap(drv, tb);
3142		break;
3143	case NL80211_CMD_VENDOR:
3144		nl80211_vendor_event(drv, tb);
3145		break;
3146	default:
3147		wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Ignored unknown event "
3148			"(cmd=%d)", cmd);
3149		break;
3150	}
3151}
3152
3153
3154static int process_drv_event(struct nl_msg *msg, void *arg)
3155{
3156	struct wpa_driver_nl80211_data *drv = arg;
3157	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3158	struct nlattr *tb[NL80211_ATTR_MAX + 1];
3159	struct i802_bss *bss;
3160	int ifidx = -1;
3161
3162	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3163		  genlmsg_attrlen(gnlh, 0), NULL);
3164
3165	if (tb[NL80211_ATTR_IFINDEX]) {
3166		ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
3167
3168		for (bss = drv->first_bss; bss; bss = bss->next)
3169			if (ifidx == -1 || ifidx == bss->ifindex) {
3170				do_process_drv_event(bss, gnlh->cmd, tb);
3171				return NL_SKIP;
3172			}
3173		wpa_printf(MSG_DEBUG,
3174			   "nl80211: Ignored event (cmd=%d) for foreign interface (ifindex %d)",
3175			   gnlh->cmd, ifidx);
3176	} else if (tb[NL80211_ATTR_WDEV]) {
3177		u64 wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
3178		wpa_printf(MSG_DEBUG, "nl80211: Process event on P2P device");
3179		for (bss = drv->first_bss; bss; bss = bss->next) {
3180			if (bss->wdev_id_set && wdev_id == bss->wdev_id) {
3181				do_process_drv_event(bss, gnlh->cmd, tb);
3182				return NL_SKIP;
3183			}
3184		}
3185		wpa_printf(MSG_DEBUG,
3186			   "nl80211: Ignored event (cmd=%d) for foreign interface (wdev 0x%llx)",
3187			   gnlh->cmd, (long long unsigned int) wdev_id);
3188	}
3189
3190	return NL_SKIP;
3191}
3192
3193
3194static int process_global_event(struct nl_msg *msg, void *arg)
3195{
3196	struct nl80211_global *global = arg;
3197	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3198	struct nlattr *tb[NL80211_ATTR_MAX + 1];
3199	struct wpa_driver_nl80211_data *drv, *tmp;
3200	int ifidx = -1;
3201	struct i802_bss *bss;
3202	u64 wdev_id = 0;
3203	int wdev_id_set = 0;
3204
3205	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3206		  genlmsg_attrlen(gnlh, 0), NULL);
3207
3208	if (tb[NL80211_ATTR_IFINDEX])
3209		ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
3210	else if (tb[NL80211_ATTR_WDEV]) {
3211		wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
3212		wdev_id_set = 1;
3213	}
3214
3215	dl_list_for_each_safe(drv, tmp, &global->interfaces,
3216			      struct wpa_driver_nl80211_data, list) {
3217		for (bss = drv->first_bss; bss; bss = bss->next) {
3218			if ((ifidx == -1 && !wdev_id_set) ||
3219			    ifidx == bss->ifindex ||
3220			    (wdev_id_set && bss->wdev_id_set &&
3221			     wdev_id == bss->wdev_id)) {
3222				do_process_drv_event(bss, gnlh->cmd, tb);
3223				return NL_SKIP;
3224			}
3225		}
3226	}
3227
3228	return NL_SKIP;
3229}
3230
3231
3232static int process_bss_event(struct nl_msg *msg, void *arg)
3233{
3234	struct i802_bss *bss = arg;
3235	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3236	struct nlattr *tb[NL80211_ATTR_MAX + 1];
3237
3238	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3239		  genlmsg_attrlen(gnlh, 0), NULL);
3240
3241	wpa_printf(MSG_DEBUG, "nl80211: BSS Event %d (%s) received for %s",
3242		   gnlh->cmd, nl80211_command_to_string(gnlh->cmd),
3243		   bss->ifname);
3244
3245	switch (gnlh->cmd) {
3246	case NL80211_CMD_FRAME:
3247	case NL80211_CMD_FRAME_TX_STATUS:
3248		mlme_event(bss, gnlh->cmd, tb[NL80211_ATTR_FRAME],
3249			   tb[NL80211_ATTR_MAC], tb[NL80211_ATTR_TIMED_OUT],
3250			   tb[NL80211_ATTR_WIPHY_FREQ], tb[NL80211_ATTR_ACK],
3251			   tb[NL80211_ATTR_COOKIE],
3252			   tb[NL80211_ATTR_RX_SIGNAL_DBM]);
3253		break;
3254	case NL80211_CMD_UNEXPECTED_FRAME:
3255		nl80211_spurious_frame(bss, tb, 0);
3256		break;
3257	case NL80211_CMD_UNEXPECTED_4ADDR_FRAME:
3258		nl80211_spurious_frame(bss, tb, 1);
3259		break;
3260	default:
3261		wpa_printf(MSG_DEBUG, "nl80211: Ignored unknown event "
3262			   "(cmd=%d)", gnlh->cmd);
3263		break;
3264	}
3265
3266	return NL_SKIP;
3267}
3268
3269
3270static void wpa_driver_nl80211_event_receive(int sock, void *eloop_ctx,
3271					     void *handle)
3272{
3273	struct nl_cb *cb = eloop_ctx;
3274	int res;
3275
3276	wpa_printf(MSG_MSGDUMP, "nl80211: Event message available");
3277
3278	res = nl_recvmsgs(handle, cb);
3279	if (res) {
3280		wpa_printf(MSG_INFO, "nl80211: %s->nl_recvmsgs failed: %d",
3281			   __func__, res);
3282	}
3283}
3284
3285
3286/**
3287 * wpa_driver_nl80211_set_country - ask nl80211 to set the regulatory domain
3288 * @priv: driver_nl80211 private data
3289 * @alpha2_arg: country to which to switch to
3290 * Returns: 0 on success, -1 on failure
3291 *
3292 * This asks nl80211 to set the regulatory domain for given
3293 * country ISO / IEC alpha2.
3294 */
3295static int wpa_driver_nl80211_set_country(void *priv, const char *alpha2_arg)
3296{
3297	struct i802_bss *bss = priv;
3298	struct wpa_driver_nl80211_data *drv = bss->drv;
3299	char alpha2[3];
3300	struct nl_msg *msg;
3301
3302	msg = nlmsg_alloc();
3303	if (!msg)
3304		return -ENOMEM;
3305
3306	alpha2[0] = alpha2_arg[0];
3307	alpha2[1] = alpha2_arg[1];
3308	alpha2[2] = '\0';
3309
3310	nl80211_cmd(drv, msg, 0, NL80211_CMD_REQ_SET_REG);
3311
3312	NLA_PUT_STRING(msg, NL80211_ATTR_REG_ALPHA2, alpha2);
3313	if (send_and_recv_msgs(drv, msg, NULL, NULL))
3314		return -EINVAL;
3315	return 0;
3316nla_put_failure:
3317	nlmsg_free(msg);
3318	return -EINVAL;
3319}
3320
3321
3322static int nl80211_get_country(struct nl_msg *msg, void *arg)
3323{
3324	char *alpha2 = arg;
3325	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
3326	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3327
3328	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3329		  genlmsg_attrlen(gnlh, 0), NULL);
3330	if (!tb_msg[NL80211_ATTR_REG_ALPHA2]) {
3331		wpa_printf(MSG_DEBUG, "nl80211: No country information available");
3332		return NL_SKIP;
3333	}
3334	os_strlcpy(alpha2, nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]), 3);
3335	return NL_SKIP;
3336}
3337
3338
3339static int wpa_driver_nl80211_get_country(void *priv, char *alpha2)
3340{
3341	struct i802_bss *bss = priv;
3342	struct wpa_driver_nl80211_data *drv = bss->drv;
3343	struct nl_msg *msg;
3344	int ret;
3345
3346	msg = nlmsg_alloc();
3347	if (!msg)
3348		return -ENOMEM;
3349
3350	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
3351	alpha2[0] = '\0';
3352	ret = send_and_recv_msgs(drv, msg, nl80211_get_country, alpha2);
3353	if (!alpha2[0])
3354		ret = -1;
3355
3356	return ret;
3357}
3358
3359
3360static int protocol_feature_handler(struct nl_msg *msg, void *arg)
3361{
3362	u32 *feat = arg;
3363	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
3364	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3365
3366	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3367		  genlmsg_attrlen(gnlh, 0), NULL);
3368
3369	if (tb_msg[NL80211_ATTR_PROTOCOL_FEATURES])
3370		*feat = nla_get_u32(tb_msg[NL80211_ATTR_PROTOCOL_FEATURES]);
3371
3372	return NL_SKIP;
3373}
3374
3375
3376static u32 get_nl80211_protocol_features(struct wpa_driver_nl80211_data *drv)
3377{
3378	u32 feat = 0;
3379	struct nl_msg *msg;
3380
3381	msg = nlmsg_alloc();
3382	if (!msg)
3383		goto nla_put_failure;
3384
3385	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_PROTOCOL_FEATURES);
3386	if (send_and_recv_msgs(drv, msg, protocol_feature_handler, &feat) == 0)
3387		return feat;
3388
3389	msg = NULL;
3390nla_put_failure:
3391	nlmsg_free(msg);
3392	return 0;
3393}
3394
3395
3396struct wiphy_info_data {
3397	struct wpa_driver_nl80211_data *drv;
3398	struct wpa_driver_capa *capa;
3399
3400	unsigned int num_multichan_concurrent;
3401
3402	unsigned int error:1;
3403	unsigned int device_ap_sme:1;
3404	unsigned int poll_command_supported:1;
3405	unsigned int data_tx_status:1;
3406	unsigned int monitor_supported:1;
3407	unsigned int auth_supported:1;
3408	unsigned int connect_supported:1;
3409	unsigned int p2p_go_supported:1;
3410	unsigned int p2p_client_supported:1;
3411	unsigned int p2p_concurrent:1;
3412	unsigned int channel_switch_supported:1;
3413	unsigned int set_qos_map_supported:1;
3414};
3415
3416
3417static unsigned int probe_resp_offload_support(int supp_protocols)
3418{
3419	unsigned int prot = 0;
3420
3421	if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS)
3422		prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS;
3423	if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_WPS2)
3424		prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2;
3425	if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_P2P)
3426		prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P;
3427	if (supp_protocols & NL80211_PROBE_RESP_OFFLOAD_SUPPORT_80211U)
3428		prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING;
3429
3430	return prot;
3431}
3432
3433
3434static void wiphy_info_supported_iftypes(struct wiphy_info_data *info,
3435					 struct nlattr *tb)
3436{
3437	struct nlattr *nl_mode;
3438	int i;
3439
3440	if (tb == NULL)
3441		return;
3442
3443	nla_for_each_nested(nl_mode, tb, i) {
3444		switch (nla_type(nl_mode)) {
3445		case NL80211_IFTYPE_AP:
3446			info->capa->flags |= WPA_DRIVER_FLAGS_AP;
3447			break;
3448		case NL80211_IFTYPE_ADHOC:
3449			info->capa->flags |= WPA_DRIVER_FLAGS_IBSS;
3450			break;
3451		case NL80211_IFTYPE_P2P_DEVICE:
3452			info->capa->flags |=
3453				WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE;
3454			break;
3455		case NL80211_IFTYPE_P2P_GO:
3456			info->p2p_go_supported = 1;
3457			break;
3458		case NL80211_IFTYPE_P2P_CLIENT:
3459			info->p2p_client_supported = 1;
3460			break;
3461		case NL80211_IFTYPE_MONITOR:
3462			info->monitor_supported = 1;
3463			break;
3464		}
3465	}
3466}
3467
3468
3469static int wiphy_info_iface_comb_process(struct wiphy_info_data *info,
3470					 struct nlattr *nl_combi)
3471{
3472	struct nlattr *tb_comb[NUM_NL80211_IFACE_COMB];
3473	struct nlattr *tb_limit[NUM_NL80211_IFACE_LIMIT];
3474	struct nlattr *nl_limit, *nl_mode;
3475	int err, rem_limit, rem_mode;
3476	int combination_has_p2p = 0, combination_has_mgd = 0;
3477	static struct nla_policy
3478	iface_combination_policy[NUM_NL80211_IFACE_COMB] = {
3479		[NL80211_IFACE_COMB_LIMITS] = { .type = NLA_NESTED },
3480		[NL80211_IFACE_COMB_MAXNUM] = { .type = NLA_U32 },
3481		[NL80211_IFACE_COMB_STA_AP_BI_MATCH] = { .type = NLA_FLAG },
3482		[NL80211_IFACE_COMB_NUM_CHANNELS] = { .type = NLA_U32 },
3483		[NL80211_IFACE_COMB_RADAR_DETECT_WIDTHS] = { .type = NLA_U32 },
3484	},
3485	iface_limit_policy[NUM_NL80211_IFACE_LIMIT] = {
3486		[NL80211_IFACE_LIMIT_TYPES] = { .type = NLA_NESTED },
3487		[NL80211_IFACE_LIMIT_MAX] = { .type = NLA_U32 },
3488	};
3489
3490	err = nla_parse_nested(tb_comb, MAX_NL80211_IFACE_COMB,
3491			       nl_combi, iface_combination_policy);
3492	if (err || !tb_comb[NL80211_IFACE_COMB_LIMITS] ||
3493	    !tb_comb[NL80211_IFACE_COMB_MAXNUM] ||
3494	    !tb_comb[NL80211_IFACE_COMB_NUM_CHANNELS])
3495		return 0; /* broken combination */
3496
3497	if (tb_comb[NL80211_IFACE_COMB_RADAR_DETECT_WIDTHS])
3498		info->capa->flags |= WPA_DRIVER_FLAGS_RADAR;
3499
3500	nla_for_each_nested(nl_limit, tb_comb[NL80211_IFACE_COMB_LIMITS],
3501			    rem_limit) {
3502		err = nla_parse_nested(tb_limit, MAX_NL80211_IFACE_LIMIT,
3503				       nl_limit, iface_limit_policy);
3504		if (err || !tb_limit[NL80211_IFACE_LIMIT_TYPES])
3505			return 0; /* broken combination */
3506
3507		nla_for_each_nested(nl_mode,
3508				    tb_limit[NL80211_IFACE_LIMIT_TYPES],
3509				    rem_mode) {
3510			int ift = nla_type(nl_mode);
3511			if (ift == NL80211_IFTYPE_P2P_GO ||
3512			    ift == NL80211_IFTYPE_P2P_CLIENT)
3513				combination_has_p2p = 1;
3514			if (ift == NL80211_IFTYPE_STATION)
3515				combination_has_mgd = 1;
3516		}
3517		if (combination_has_p2p && combination_has_mgd)
3518			break;
3519	}
3520
3521	if (combination_has_p2p && combination_has_mgd) {
3522		unsigned int num_channels =
3523			nla_get_u32(tb_comb[NL80211_IFACE_COMB_NUM_CHANNELS]);
3524
3525		info->p2p_concurrent = 1;
3526		if (info->num_multichan_concurrent < num_channels)
3527			info->num_multichan_concurrent = num_channels;
3528	}
3529
3530	return 0;
3531}
3532
3533
3534static void wiphy_info_iface_comb(struct wiphy_info_data *info,
3535				  struct nlattr *tb)
3536{
3537	struct nlattr *nl_combi;
3538	int rem_combi;
3539
3540	if (tb == NULL)
3541		return;
3542
3543	nla_for_each_nested(nl_combi, tb, rem_combi) {
3544		if (wiphy_info_iface_comb_process(info, nl_combi) > 0)
3545			break;
3546	}
3547}
3548
3549
3550static void wiphy_info_supp_cmds(struct wiphy_info_data *info,
3551				 struct nlattr *tb)
3552{
3553	struct nlattr *nl_cmd;
3554	int i;
3555
3556	if (tb == NULL)
3557		return;
3558
3559	nla_for_each_nested(nl_cmd, tb, i) {
3560		switch (nla_get_u32(nl_cmd)) {
3561		case NL80211_CMD_AUTHENTICATE:
3562			info->auth_supported = 1;
3563			break;
3564		case NL80211_CMD_CONNECT:
3565			info->connect_supported = 1;
3566			break;
3567		case NL80211_CMD_START_SCHED_SCAN:
3568			info->capa->sched_scan_supported = 1;
3569			break;
3570		case NL80211_CMD_PROBE_CLIENT:
3571			info->poll_command_supported = 1;
3572			break;
3573		case NL80211_CMD_CHANNEL_SWITCH:
3574			info->channel_switch_supported = 1;
3575			break;
3576		case NL80211_CMD_SET_QOS_MAP:
3577			info->set_qos_map_supported = 1;
3578			break;
3579		}
3580	}
3581}
3582
3583
3584static void wiphy_info_cipher_suites(struct wiphy_info_data *info,
3585				     struct nlattr *tb)
3586{
3587	int i, num;
3588	u32 *ciphers;
3589
3590	if (tb == NULL)
3591		return;
3592
3593	num = nla_len(tb) / sizeof(u32);
3594	ciphers = nla_data(tb);
3595	for (i = 0; i < num; i++) {
3596		u32 c = ciphers[i];
3597
3598		wpa_printf(MSG_DEBUG, "nl80211: Supported cipher %02x-%02x-%02x:%d",
3599			   c >> 24, (c >> 16) & 0xff,
3600			   (c >> 8) & 0xff, c & 0xff);
3601		switch (c) {
3602		case WLAN_CIPHER_SUITE_CCMP_256:
3603			info->capa->enc |= WPA_DRIVER_CAPA_ENC_CCMP_256;
3604			break;
3605		case WLAN_CIPHER_SUITE_GCMP_256:
3606			info->capa->enc |= WPA_DRIVER_CAPA_ENC_GCMP_256;
3607			break;
3608		case WLAN_CIPHER_SUITE_CCMP:
3609			info->capa->enc |= WPA_DRIVER_CAPA_ENC_CCMP;
3610			break;
3611		case WLAN_CIPHER_SUITE_GCMP:
3612			info->capa->enc |= WPA_DRIVER_CAPA_ENC_GCMP;
3613			break;
3614		case WLAN_CIPHER_SUITE_TKIP:
3615			info->capa->enc |= WPA_DRIVER_CAPA_ENC_TKIP;
3616			break;
3617		case WLAN_CIPHER_SUITE_WEP104:
3618			info->capa->enc |= WPA_DRIVER_CAPA_ENC_WEP104;
3619			break;
3620		case WLAN_CIPHER_SUITE_WEP40:
3621			info->capa->enc |= WPA_DRIVER_CAPA_ENC_WEP40;
3622			break;
3623		case WLAN_CIPHER_SUITE_AES_CMAC:
3624			info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP;
3625			break;
3626		case WLAN_CIPHER_SUITE_BIP_GMAC_128:
3627			info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP_GMAC_128;
3628			break;
3629		case WLAN_CIPHER_SUITE_BIP_GMAC_256:
3630			info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP_GMAC_256;
3631			break;
3632		case WLAN_CIPHER_SUITE_BIP_CMAC_256:
3633			info->capa->enc |= WPA_DRIVER_CAPA_ENC_BIP_CMAC_256;
3634			break;
3635		case WLAN_CIPHER_SUITE_NO_GROUP_ADDR:
3636			info->capa->enc |= WPA_DRIVER_CAPA_ENC_GTK_NOT_USED;
3637			break;
3638		}
3639	}
3640}
3641
3642
3643static void wiphy_info_max_roc(struct wpa_driver_capa *capa,
3644			       struct nlattr *tb)
3645{
3646	if (tb)
3647		capa->max_remain_on_chan = nla_get_u32(tb);
3648}
3649
3650
3651static void wiphy_info_tdls(struct wpa_driver_capa *capa, struct nlattr *tdls,
3652			    struct nlattr *ext_setup)
3653{
3654	if (tdls == NULL)
3655		return;
3656
3657	wpa_printf(MSG_DEBUG, "nl80211: TDLS supported");
3658	capa->flags |= WPA_DRIVER_FLAGS_TDLS_SUPPORT;
3659
3660	if (ext_setup) {
3661		wpa_printf(MSG_DEBUG, "nl80211: TDLS external setup");
3662		capa->flags |= WPA_DRIVER_FLAGS_TDLS_EXTERNAL_SETUP;
3663	}
3664}
3665
3666
3667static void wiphy_info_feature_flags(struct wiphy_info_data *info,
3668				     struct nlattr *tb)
3669{
3670	u32 flags;
3671	struct wpa_driver_capa *capa = info->capa;
3672
3673	if (tb == NULL)
3674		return;
3675
3676	flags = nla_get_u32(tb);
3677
3678	if (flags & NL80211_FEATURE_SK_TX_STATUS)
3679		info->data_tx_status = 1;
3680
3681	if (flags & NL80211_FEATURE_INACTIVITY_TIMER)
3682		capa->flags |= WPA_DRIVER_FLAGS_INACTIVITY_TIMER;
3683
3684	if (flags & NL80211_FEATURE_SAE)
3685		capa->flags |= WPA_DRIVER_FLAGS_SAE;
3686
3687	if (flags & NL80211_FEATURE_NEED_OBSS_SCAN)
3688		capa->flags |= WPA_DRIVER_FLAGS_OBSS_SCAN;
3689
3690	if (flags & NL80211_FEATURE_AP_MODE_CHAN_WIDTH_CHANGE)
3691		capa->flags |= WPA_DRIVER_FLAGS_HT_2040_COEX;
3692}
3693
3694
3695static void wiphy_info_probe_resp_offload(struct wpa_driver_capa *capa,
3696					  struct nlattr *tb)
3697{
3698	u32 protocols;
3699
3700	if (tb == NULL)
3701		return;
3702
3703	protocols = nla_get_u32(tb);
3704	wpa_printf(MSG_DEBUG, "nl80211: Supports Probe Response offload in AP "
3705		   "mode");
3706	capa->flags |= WPA_DRIVER_FLAGS_PROBE_RESP_OFFLOAD;
3707	capa->probe_resp_offloads = probe_resp_offload_support(protocols);
3708}
3709
3710
3711static void wiphy_info_wowlan_triggers(struct wpa_driver_capa *capa,
3712				       struct nlattr *tb)
3713{
3714	struct nlattr *triggers[MAX_NL80211_WOWLAN_TRIG + 1];
3715
3716	if (tb == NULL)
3717		return;
3718
3719	if (nla_parse_nested(triggers, MAX_NL80211_WOWLAN_TRIG,
3720			     tb, NULL))
3721		return;
3722
3723	if (triggers[NL80211_WOWLAN_TRIG_ANY])
3724		capa->wowlan_triggers.any = 1;
3725	if (triggers[NL80211_WOWLAN_TRIG_DISCONNECT])
3726		capa->wowlan_triggers.disconnect = 1;
3727	if (triggers[NL80211_WOWLAN_TRIG_MAGIC_PKT])
3728		capa->wowlan_triggers.magic_pkt = 1;
3729	if (triggers[NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE])
3730		capa->wowlan_triggers.gtk_rekey_failure = 1;
3731	if (triggers[NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST])
3732		capa->wowlan_triggers.eap_identity_req = 1;
3733	if (triggers[NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE])
3734		capa->wowlan_triggers.four_way_handshake = 1;
3735	if (triggers[NL80211_WOWLAN_TRIG_RFKILL_RELEASE])
3736		capa->wowlan_triggers.rfkill_release = 1;
3737}
3738
3739
3740static int wiphy_info_handler(struct nl_msg *msg, void *arg)
3741{
3742	struct nlattr *tb[NL80211_ATTR_MAX + 1];
3743	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
3744	struct wiphy_info_data *info = arg;
3745	struct wpa_driver_capa *capa = info->capa;
3746	struct wpa_driver_nl80211_data *drv = info->drv;
3747
3748	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
3749		  genlmsg_attrlen(gnlh, 0), NULL);
3750
3751	if (tb[NL80211_ATTR_WIPHY_NAME])
3752		os_strlcpy(drv->phyname,
3753			   nla_get_string(tb[NL80211_ATTR_WIPHY_NAME]),
3754			   sizeof(drv->phyname));
3755	if (tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS])
3756		capa->max_scan_ssids =
3757			nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCAN_SSIDS]);
3758
3759	if (tb[NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS])
3760		capa->max_sched_scan_ssids =
3761			nla_get_u8(tb[NL80211_ATTR_MAX_NUM_SCHED_SCAN_SSIDS]);
3762
3763	if (tb[NL80211_ATTR_MAX_MATCH_SETS])
3764		capa->max_match_sets =
3765			nla_get_u8(tb[NL80211_ATTR_MAX_MATCH_SETS]);
3766
3767	if (tb[NL80211_ATTR_MAC_ACL_MAX])
3768		capa->max_acl_mac_addrs =
3769			nla_get_u8(tb[NL80211_ATTR_MAC_ACL_MAX]);
3770
3771	wiphy_info_supported_iftypes(info, tb[NL80211_ATTR_SUPPORTED_IFTYPES]);
3772	wiphy_info_iface_comb(info, tb[NL80211_ATTR_INTERFACE_COMBINATIONS]);
3773	wiphy_info_supp_cmds(info, tb[NL80211_ATTR_SUPPORTED_COMMANDS]);
3774	wiphy_info_cipher_suites(info, tb[NL80211_ATTR_CIPHER_SUITES]);
3775
3776	if (tb[NL80211_ATTR_OFFCHANNEL_TX_OK]) {
3777		wpa_printf(MSG_DEBUG, "nl80211: Using driver-based "
3778			   "off-channel TX");
3779		capa->flags |= WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
3780	}
3781
3782	if (tb[NL80211_ATTR_ROAM_SUPPORT]) {
3783		wpa_printf(MSG_DEBUG, "nl80211: Using driver-based roaming");
3784		capa->flags |= WPA_DRIVER_FLAGS_BSS_SELECTION;
3785	}
3786
3787	wiphy_info_max_roc(capa,
3788			   tb[NL80211_ATTR_MAX_REMAIN_ON_CHANNEL_DURATION]);
3789
3790	if (tb[NL80211_ATTR_SUPPORT_AP_UAPSD])
3791		capa->flags |= WPA_DRIVER_FLAGS_AP_UAPSD;
3792
3793	wiphy_info_tdls(capa, tb[NL80211_ATTR_TDLS_SUPPORT],
3794			tb[NL80211_ATTR_TDLS_EXTERNAL_SETUP]);
3795
3796	if (tb[NL80211_ATTR_DEVICE_AP_SME])
3797		info->device_ap_sme = 1;
3798
3799	wiphy_info_feature_flags(info, tb[NL80211_ATTR_FEATURE_FLAGS]);
3800	wiphy_info_probe_resp_offload(capa,
3801				      tb[NL80211_ATTR_PROBE_RESP_OFFLOAD]);
3802
3803	if (tb[NL80211_ATTR_EXT_CAPA] && tb[NL80211_ATTR_EXT_CAPA_MASK] &&
3804	    drv->extended_capa == NULL) {
3805		drv->extended_capa =
3806			os_malloc(nla_len(tb[NL80211_ATTR_EXT_CAPA]));
3807		if (drv->extended_capa) {
3808			os_memcpy(drv->extended_capa,
3809				  nla_data(tb[NL80211_ATTR_EXT_CAPA]),
3810				  nla_len(tb[NL80211_ATTR_EXT_CAPA]));
3811			drv->extended_capa_len =
3812				nla_len(tb[NL80211_ATTR_EXT_CAPA]);
3813		}
3814		drv->extended_capa_mask =
3815			os_malloc(nla_len(tb[NL80211_ATTR_EXT_CAPA]));
3816		if (drv->extended_capa_mask) {
3817			os_memcpy(drv->extended_capa_mask,
3818				  nla_data(tb[NL80211_ATTR_EXT_CAPA]),
3819				  nla_len(tb[NL80211_ATTR_EXT_CAPA]));
3820		} else {
3821			os_free(drv->extended_capa);
3822			drv->extended_capa = NULL;
3823			drv->extended_capa_len = 0;
3824		}
3825	}
3826
3827	if (tb[NL80211_ATTR_VENDOR_DATA]) {
3828		struct nlattr *nl;
3829		int rem;
3830
3831		nla_for_each_nested(nl, tb[NL80211_ATTR_VENDOR_DATA], rem) {
3832			struct nl80211_vendor_cmd_info *vinfo;
3833			if (nla_len(nl) != sizeof(*vinfo)) {
3834				wpa_printf(MSG_DEBUG, "nl80211: Unexpected vendor data info");
3835				continue;
3836			}
3837			vinfo = nla_data(nl);
3838			if (vinfo->subcmd ==
3839			    QCA_NL80211_VENDOR_SUBCMD_DFS_CAPABILITY)
3840				drv->dfs_vendor_cmd_avail = 1;
3841
3842			wpa_printf(MSG_DEBUG, "nl80211: Supported vendor command: vendor_id=0x%x subcmd=%u",
3843				   vinfo->vendor_id, vinfo->subcmd);
3844		}
3845	}
3846
3847	if (tb[NL80211_ATTR_VENDOR_EVENTS]) {
3848		struct nlattr *nl;
3849		int rem;
3850
3851		nla_for_each_nested(nl, tb[NL80211_ATTR_VENDOR_EVENTS], rem) {
3852			struct nl80211_vendor_cmd_info *vinfo;
3853			if (nla_len(nl) != sizeof(*vinfo)) {
3854				wpa_printf(MSG_DEBUG, "nl80211: Unexpected vendor data info");
3855				continue;
3856			}
3857			vinfo = nla_data(nl);
3858			wpa_printf(MSG_DEBUG, "nl80211: Supported vendor event: vendor_id=0x%x subcmd=%u",
3859				   vinfo->vendor_id, vinfo->subcmd);
3860		}
3861	}
3862
3863	wiphy_info_wowlan_triggers(capa,
3864				   tb[NL80211_ATTR_WOWLAN_TRIGGERS_SUPPORTED]);
3865
3866	if (tb[NL80211_ATTR_MAX_AP_ASSOC_STA])
3867		capa->max_stations =
3868			nla_get_u32(tb[NL80211_ATTR_MAX_AP_ASSOC_STA]);
3869
3870	return NL_SKIP;
3871}
3872
3873
3874static int wpa_driver_nl80211_get_info(struct wpa_driver_nl80211_data *drv,
3875				       struct wiphy_info_data *info)
3876{
3877	u32 feat;
3878	struct nl_msg *msg;
3879
3880	os_memset(info, 0, sizeof(*info));
3881	info->capa = &drv->capa;
3882	info->drv = drv;
3883
3884	msg = nlmsg_alloc();
3885	if (!msg)
3886		return -1;
3887
3888	feat = get_nl80211_protocol_features(drv);
3889	if (feat & NL80211_PROTOCOL_FEATURE_SPLIT_WIPHY_DUMP)
3890		nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_WIPHY);
3891	else
3892		nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_WIPHY);
3893
3894	NLA_PUT_FLAG(msg, NL80211_ATTR_SPLIT_WIPHY_DUMP);
3895	if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
3896		goto nla_put_failure;
3897
3898	if (send_and_recv_msgs(drv, msg, wiphy_info_handler, info))
3899		return -1;
3900
3901	if (info->auth_supported)
3902		drv->capa.flags |= WPA_DRIVER_FLAGS_SME;
3903	else if (!info->connect_supported) {
3904		wpa_printf(MSG_INFO, "nl80211: Driver does not support "
3905			   "authentication/association or connect commands");
3906		info->error = 1;
3907	}
3908
3909	if (info->p2p_go_supported && info->p2p_client_supported)
3910		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CAPABLE;
3911	if (info->p2p_concurrent) {
3912		wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
3913			   "interface (driver advertised support)");
3914		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
3915		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
3916	}
3917	if (info->num_multichan_concurrent > 1) {
3918		wpa_printf(MSG_DEBUG, "nl80211: Enable multi-channel "
3919			   "concurrent (driver advertised support)");
3920		drv->capa.num_multichan_concurrent =
3921			info->num_multichan_concurrent;
3922	}
3923
3924	/* default to 5000 since early versions of mac80211 don't set it */
3925	if (!drv->capa.max_remain_on_chan)
3926		drv->capa.max_remain_on_chan = 5000;
3927
3928	if (info->channel_switch_supported)
3929		drv->capa.flags |= WPA_DRIVER_FLAGS_AP_CSA;
3930
3931	return 0;
3932nla_put_failure:
3933	nlmsg_free(msg);
3934	return -1;
3935}
3936
3937
3938static int wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv)
3939{
3940	struct wiphy_info_data info;
3941	if (wpa_driver_nl80211_get_info(drv, &info))
3942		return -1;
3943
3944	if (info.error)
3945		return -1;
3946
3947	drv->has_capability = 1;
3948	drv->capa.key_mgmt = WPA_DRIVER_CAPA_KEY_MGMT_WPA |
3949		WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
3950		WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
3951		WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK;
3952	drv->capa.auth = WPA_DRIVER_AUTH_OPEN |
3953		WPA_DRIVER_AUTH_SHARED |
3954		WPA_DRIVER_AUTH_LEAP;
3955
3956	drv->capa.flags |= WPA_DRIVER_FLAGS_SANE_ERROR_CODES;
3957	drv->capa.flags |= WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC_DONE;
3958	drv->capa.flags |= WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
3959
3960	/*
3961	 * As all cfg80211 drivers must support cases where the AP interface is
3962	 * removed without the knowledge of wpa_supplicant/hostapd, e.g., in
3963	 * case that the user space daemon has crashed, they must be able to
3964	 * cleanup all stations and key entries in the AP tear down flow. Thus,
3965	 * this flag can/should always be set for cfg80211 drivers.
3966	 */
3967	drv->capa.flags |= WPA_DRIVER_FLAGS_AP_TEARDOWN_SUPPORT;
3968
3969	if (!info.device_ap_sme) {
3970		drv->capa.flags |= WPA_DRIVER_FLAGS_DEAUTH_TX_STATUS;
3971
3972		/*
3973		 * No AP SME is currently assumed to also indicate no AP MLME
3974		 * in the driver/firmware.
3975		 */
3976		drv->capa.flags |= WPA_DRIVER_FLAGS_AP_MLME;
3977	}
3978
3979	drv->device_ap_sme = info.device_ap_sme;
3980	drv->poll_command_supported = info.poll_command_supported;
3981	drv->data_tx_status = info.data_tx_status;
3982	if (info.set_qos_map_supported)
3983		drv->capa.flags |= WPA_DRIVER_FLAGS_QOS_MAPPING;
3984
3985	/*
3986	 * If poll command and tx status are supported, mac80211 is new enough
3987	 * to have everything we need to not need monitor interfaces.
3988	 */
3989	drv->use_monitor = !info.poll_command_supported || !info.data_tx_status;
3990
3991	if (drv->device_ap_sme && drv->use_monitor) {
3992		/*
3993		 * Non-mac80211 drivers may not support monitor interface.
3994		 * Make sure we do not get stuck with incorrect capability here
3995		 * by explicitly testing this.
3996		 */
3997		if (!info.monitor_supported) {
3998			wpa_printf(MSG_DEBUG, "nl80211: Disable use_monitor "
3999				   "with device_ap_sme since no monitor mode "
4000				   "support detected");
4001			drv->use_monitor = 0;
4002		}
4003	}
4004
4005	/*
4006	 * If we aren't going to use monitor interfaces, but the
4007	 * driver doesn't support data TX status, we won't get TX
4008	 * status for EAPOL frames.
4009	 */
4010	if (!drv->use_monitor && !info.data_tx_status)
4011		drv->capa.flags &= ~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
4012
4013	return 0;
4014}
4015
4016
4017#ifdef ANDROID
4018static int android_genl_ctrl_resolve(struct nl_handle *handle,
4019				     const char *name)
4020{
4021	/*
4022	 * Android ICS has very minimal genl_ctrl_resolve() implementation, so
4023	 * need to work around that.
4024	 */
4025	struct nl_cache *cache = NULL;
4026	struct genl_family *nl80211 = NULL;
4027	int id = -1;
4028
4029	if (genl_ctrl_alloc_cache(handle, &cache) < 0) {
4030		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate generic "
4031			   "netlink cache");
4032		goto fail;
4033	}
4034
4035	nl80211 = genl_ctrl_search_by_name(cache, name);
4036	if (nl80211 == NULL)
4037		goto fail;
4038
4039	id = genl_family_get_id(nl80211);
4040
4041fail:
4042	if (nl80211)
4043		genl_family_put(nl80211);
4044	if (cache)
4045		nl_cache_free(cache);
4046
4047	return id;
4048}
4049#define genl_ctrl_resolve android_genl_ctrl_resolve
4050#endif /* ANDROID */
4051
4052
4053static int wpa_driver_nl80211_init_nl_global(struct nl80211_global *global)
4054{
4055	int ret;
4056
4057	global->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
4058	if (global->nl_cb == NULL) {
4059		wpa_printf(MSG_ERROR, "nl80211: Failed to allocate netlink "
4060			   "callbacks");
4061		return -1;
4062	}
4063
4064	global->nl = nl_create_handle(global->nl_cb, "nl");
4065	if (global->nl == NULL)
4066		goto err;
4067
4068	global->nl80211_id = genl_ctrl_resolve(global->nl, "nl80211");
4069	if (global->nl80211_id < 0) {
4070		wpa_printf(MSG_ERROR, "nl80211: 'nl80211' generic netlink not "
4071			   "found");
4072		goto err;
4073	}
4074
4075	global->nl_event = nl_create_handle(global->nl_cb, "event");
4076	if (global->nl_event == NULL)
4077		goto err;
4078
4079	ret = nl_get_multicast_id(global, "nl80211", "scan");
4080	if (ret >= 0)
4081		ret = nl_socket_add_membership(global->nl_event, ret);
4082	if (ret < 0) {
4083		wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
4084			   "membership for scan events: %d (%s)",
4085			   ret, strerror(-ret));
4086		goto err;
4087	}
4088
4089	ret = nl_get_multicast_id(global, "nl80211", "mlme");
4090	if (ret >= 0)
4091		ret = nl_socket_add_membership(global->nl_event, ret);
4092	if (ret < 0) {
4093		wpa_printf(MSG_ERROR, "nl80211: Could not add multicast "
4094			   "membership for mlme events: %d (%s)",
4095			   ret, strerror(-ret));
4096		goto err;
4097	}
4098
4099	ret = nl_get_multicast_id(global, "nl80211", "regulatory");
4100	if (ret >= 0)
4101		ret = nl_socket_add_membership(global->nl_event, ret);
4102	if (ret < 0) {
4103		wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
4104			   "membership for regulatory events: %d (%s)",
4105			   ret, strerror(-ret));
4106		/* Continue without regulatory events */
4107	}
4108
4109	ret = nl_get_multicast_id(global, "nl80211", "vendor");
4110	if (ret >= 0)
4111		ret = nl_socket_add_membership(global->nl_event, ret);
4112	if (ret < 0) {
4113		wpa_printf(MSG_DEBUG, "nl80211: Could not add multicast "
4114			   "membership for vendor events: %d (%s)",
4115			   ret, strerror(-ret));
4116		/* Continue without vendor events */
4117	}
4118
4119	nl_cb_set(global->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
4120		  no_seq_check, NULL);
4121	nl_cb_set(global->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
4122		  process_global_event, global);
4123
4124	nl80211_register_eloop_read(&global->nl_event,
4125				    wpa_driver_nl80211_event_receive,
4126				    global->nl_cb);
4127
4128	return 0;
4129
4130err:
4131	nl_destroy_handles(&global->nl_event);
4132	nl_destroy_handles(&global->nl);
4133	nl_cb_put(global->nl_cb);
4134	global->nl_cb = NULL;
4135	return -1;
4136}
4137
4138
4139static int wpa_driver_nl80211_init_nl(struct wpa_driver_nl80211_data *drv)
4140{
4141	drv->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
4142	if (!drv->nl_cb) {
4143		wpa_printf(MSG_ERROR, "nl80211: Failed to alloc cb struct");
4144		return -1;
4145	}
4146
4147	nl_cb_set(drv->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
4148		  no_seq_check, NULL);
4149	nl_cb_set(drv->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
4150		  process_drv_event, drv);
4151
4152	return 0;
4153}
4154
4155
4156static void wpa_driver_nl80211_rfkill_blocked(void *ctx)
4157{
4158	wpa_printf(MSG_DEBUG, "nl80211: RFKILL blocked");
4159	/*
4160	 * This may be for any interface; use ifdown event to disable
4161	 * interface.
4162	 */
4163}
4164
4165
4166static void wpa_driver_nl80211_rfkill_unblocked(void *ctx)
4167{
4168	struct wpa_driver_nl80211_data *drv = ctx;
4169	wpa_printf(MSG_DEBUG, "nl80211: RFKILL unblocked");
4170	if (i802_set_iface_flags(drv->first_bss, 1)) {
4171		wpa_printf(MSG_DEBUG, "nl80211: Could not set interface UP "
4172			   "after rfkill unblock");
4173		return;
4174	}
4175	/* rtnetlink ifup handler will report interface as enabled */
4176}
4177
4178
4179static void wpa_driver_nl80211_handle_eapol_tx_status(int sock,
4180						      void *eloop_ctx,
4181						      void *handle)
4182{
4183	struct wpa_driver_nl80211_data *drv = eloop_ctx;
4184	u8 data[2048];
4185	struct msghdr msg;
4186	struct iovec entry;
4187	u8 control[512];
4188	struct cmsghdr *cmsg;
4189	int res, found_ee = 0, found_wifi = 0, acked = 0;
4190	union wpa_event_data event;
4191
4192	memset(&msg, 0, sizeof(msg));
4193	msg.msg_iov = &entry;
4194	msg.msg_iovlen = 1;
4195	entry.iov_base = data;
4196	entry.iov_len = sizeof(data);
4197	msg.msg_control = &control;
4198	msg.msg_controllen = sizeof(control);
4199
4200	res = recvmsg(sock, &msg, MSG_ERRQUEUE);
4201	/* if error or not fitting 802.3 header, return */
4202	if (res < 14)
4203		return;
4204
4205	for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg))
4206	{
4207		if (cmsg->cmsg_level == SOL_SOCKET &&
4208		    cmsg->cmsg_type == SCM_WIFI_STATUS) {
4209			int *ack;
4210
4211			found_wifi = 1;
4212			ack = (void *)CMSG_DATA(cmsg);
4213			acked = *ack;
4214		}
4215
4216		if (cmsg->cmsg_level == SOL_PACKET &&
4217		    cmsg->cmsg_type == PACKET_TX_TIMESTAMP) {
4218			struct sock_extended_err *err =
4219				(struct sock_extended_err *)CMSG_DATA(cmsg);
4220
4221			if (err->ee_origin == SO_EE_ORIGIN_TXSTATUS)
4222				found_ee = 1;
4223		}
4224	}
4225
4226	if (!found_ee || !found_wifi)
4227		return;
4228
4229	memset(&event, 0, sizeof(event));
4230	event.eapol_tx_status.dst = data;
4231	event.eapol_tx_status.data = data + 14;
4232	event.eapol_tx_status.data_len = res - 14;
4233	event.eapol_tx_status.ack = acked;
4234	wpa_supplicant_event(drv->ctx, EVENT_EAPOL_TX_STATUS, &event);
4235}
4236
4237
4238static int nl80211_init_bss(struct i802_bss *bss)
4239{
4240	bss->nl_cb = nl_cb_alloc(NL_CB_DEFAULT);
4241	if (!bss->nl_cb)
4242		return -1;
4243
4244	nl_cb_set(bss->nl_cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM,
4245		  no_seq_check, NULL);
4246	nl_cb_set(bss->nl_cb, NL_CB_VALID, NL_CB_CUSTOM,
4247		  process_bss_event, bss);
4248
4249	return 0;
4250}
4251
4252
4253static void nl80211_destroy_bss(struct i802_bss *bss)
4254{
4255	nl_cb_put(bss->nl_cb);
4256	bss->nl_cb = NULL;
4257}
4258
4259
4260static void * wpa_driver_nl80211_drv_init(void *ctx, const char *ifname,
4261					  void *global_priv, int hostapd,
4262					  const u8 *set_addr)
4263{
4264	struct wpa_driver_nl80211_data *drv;
4265	struct rfkill_config *rcfg;
4266	struct i802_bss *bss;
4267
4268	if (global_priv == NULL)
4269		return NULL;
4270	drv = os_zalloc(sizeof(*drv));
4271	if (drv == NULL)
4272		return NULL;
4273	drv->global = global_priv;
4274	drv->ctx = ctx;
4275	drv->hostapd = !!hostapd;
4276	drv->eapol_sock = -1;
4277	drv->num_if_indices = sizeof(drv->default_if_indices) / sizeof(int);
4278	drv->if_indices = drv->default_if_indices;
4279
4280	drv->first_bss = os_zalloc(sizeof(*drv->first_bss));
4281	if (!drv->first_bss) {
4282		os_free(drv);
4283		return NULL;
4284	}
4285	bss = drv->first_bss;
4286	bss->drv = drv;
4287	bss->ctx = ctx;
4288
4289	os_strlcpy(bss->ifname, ifname, sizeof(bss->ifname));
4290	drv->monitor_ifidx = -1;
4291	drv->monitor_sock = -1;
4292	drv->eapol_tx_sock = -1;
4293	drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
4294
4295	if (wpa_driver_nl80211_init_nl(drv)) {
4296		os_free(drv);
4297		return NULL;
4298	}
4299
4300	if (nl80211_init_bss(bss))
4301		goto failed;
4302
4303	rcfg = os_zalloc(sizeof(*rcfg));
4304	if (rcfg == NULL)
4305		goto failed;
4306	rcfg->ctx = drv;
4307	os_strlcpy(rcfg->ifname, ifname, sizeof(rcfg->ifname));
4308	rcfg->blocked_cb = wpa_driver_nl80211_rfkill_blocked;
4309	rcfg->unblocked_cb = wpa_driver_nl80211_rfkill_unblocked;
4310	drv->rfkill = rfkill_init(rcfg);
4311	if (drv->rfkill == NULL) {
4312		wpa_printf(MSG_DEBUG, "nl80211: RFKILL status not available");
4313		os_free(rcfg);
4314	}
4315
4316	if (linux_iface_up(drv->global->ioctl_sock, ifname) > 0)
4317		drv->start_iface_up = 1;
4318
4319	if (wpa_driver_nl80211_finish_drv_init(drv, set_addr, 1))
4320		goto failed;
4321
4322	drv->eapol_tx_sock = socket(PF_PACKET, SOCK_DGRAM, 0);
4323	if (drv->eapol_tx_sock < 0)
4324		goto failed;
4325
4326	if (drv->data_tx_status) {
4327		int enabled = 1;
4328
4329		if (setsockopt(drv->eapol_tx_sock, SOL_SOCKET, SO_WIFI_STATUS,
4330			       &enabled, sizeof(enabled)) < 0) {
4331			wpa_printf(MSG_DEBUG,
4332				"nl80211: wifi status sockopt failed\n");
4333			drv->data_tx_status = 0;
4334			if (!drv->use_monitor)
4335				drv->capa.flags &=
4336					~WPA_DRIVER_FLAGS_EAPOL_TX_STATUS;
4337		} else {
4338			eloop_register_read_sock(drv->eapol_tx_sock,
4339				wpa_driver_nl80211_handle_eapol_tx_status,
4340				drv, NULL);
4341		}
4342	}
4343
4344	if (drv->global) {
4345		dl_list_add(&drv->global->interfaces, &drv->list);
4346		drv->in_interface_list = 1;
4347	}
4348
4349	return bss;
4350
4351failed:
4352	wpa_driver_nl80211_deinit(bss);
4353	return NULL;
4354}
4355
4356
4357/**
4358 * wpa_driver_nl80211_init - Initialize nl80211 driver interface
4359 * @ctx: context to be used when calling wpa_supplicant functions,
4360 * e.g., wpa_supplicant_event()
4361 * @ifname: interface name, e.g., wlan0
4362 * @global_priv: private driver global data from global_init()
4363 * Returns: Pointer to private data, %NULL on failure
4364 */
4365static void * wpa_driver_nl80211_init(void *ctx, const char *ifname,
4366				      void *global_priv)
4367{
4368	return wpa_driver_nl80211_drv_init(ctx, ifname, global_priv, 0, NULL);
4369}
4370
4371
4372static int nl80211_register_frame(struct i802_bss *bss,
4373				  struct nl_handle *nl_handle,
4374				  u16 type, const u8 *match, size_t match_len)
4375{
4376	struct wpa_driver_nl80211_data *drv = bss->drv;
4377	struct nl_msg *msg;
4378	int ret = -1;
4379	char buf[30];
4380
4381	msg = nlmsg_alloc();
4382	if (!msg)
4383		return -1;
4384
4385	buf[0] = '\0';
4386	wpa_snprintf_hex(buf, sizeof(buf), match, match_len);
4387	wpa_printf(MSG_DEBUG, "nl80211: Register frame type=0x%x nl_handle=%p match=%s",
4388		   type, nl_handle, buf);
4389
4390	nl80211_cmd(drv, msg, 0, NL80211_CMD_REGISTER_ACTION);
4391
4392	if (nl80211_set_iface_id(msg, bss) < 0)
4393		goto nla_put_failure;
4394
4395	NLA_PUT_U16(msg, NL80211_ATTR_FRAME_TYPE, type);
4396	NLA_PUT(msg, NL80211_ATTR_FRAME_MATCH, match_len, match);
4397
4398	ret = send_and_recv(drv->global, nl_handle, msg, NULL, NULL);
4399	msg = NULL;
4400	if (ret) {
4401		wpa_printf(MSG_DEBUG, "nl80211: Register frame command "
4402			   "failed (type=%u): ret=%d (%s)",
4403			   type, ret, strerror(-ret));
4404		wpa_hexdump(MSG_DEBUG, "nl80211: Register frame match",
4405			    match, match_len);
4406		goto nla_put_failure;
4407	}
4408	ret = 0;
4409nla_put_failure:
4410	nlmsg_free(msg);
4411	return ret;
4412}
4413
4414
4415static int nl80211_alloc_mgmt_handle(struct i802_bss *bss)
4416{
4417	struct wpa_driver_nl80211_data *drv = bss->drv;
4418
4419	if (bss->nl_mgmt) {
4420		wpa_printf(MSG_DEBUG, "nl80211: Mgmt reporting "
4421			   "already on! (nl_mgmt=%p)", bss->nl_mgmt);
4422		return -1;
4423	}
4424
4425	bss->nl_mgmt = nl_create_handle(drv->nl_cb, "mgmt");
4426	if (bss->nl_mgmt == NULL)
4427		return -1;
4428
4429	return 0;
4430}
4431
4432
4433static void nl80211_mgmt_handle_register_eloop(struct i802_bss *bss)
4434{
4435	nl80211_register_eloop_read(&bss->nl_mgmt,
4436				    wpa_driver_nl80211_event_receive,
4437				    bss->nl_cb);
4438}
4439
4440
4441static int nl80211_register_action_frame(struct i802_bss *bss,
4442					 const u8 *match, size_t match_len)
4443{
4444	u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_ACTION << 4);
4445	return nl80211_register_frame(bss, bss->nl_mgmt,
4446				      type, match, match_len);
4447}
4448
4449
4450static int nl80211_mgmt_subscribe_non_ap(struct i802_bss *bss)
4451{
4452	struct wpa_driver_nl80211_data *drv = bss->drv;
4453	int ret = 0;
4454
4455	if (nl80211_alloc_mgmt_handle(bss))
4456		return -1;
4457	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with non-AP "
4458		   "handle %p", bss->nl_mgmt);
4459
4460	if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
4461		u16 type = (WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4);
4462
4463		/* register for any AUTH message */
4464		nl80211_register_frame(bss, bss->nl_mgmt, type, NULL, 0);
4465	}
4466
4467#ifdef CONFIG_INTERWORKING
4468	/* QoS Map Configure */
4469	if (nl80211_register_action_frame(bss, (u8 *) "\x01\x04", 2) < 0)
4470		ret = -1;
4471#endif /* CONFIG_INTERWORKING */
4472#if defined(CONFIG_P2P) || defined(CONFIG_INTERWORKING)
4473	/* GAS Initial Request */
4474	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0a", 2) < 0)
4475		ret = -1;
4476	/* GAS Initial Response */
4477	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0b", 2) < 0)
4478		ret = -1;
4479	/* GAS Comeback Request */
4480	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0c", 2) < 0)
4481		ret = -1;
4482	/* GAS Comeback Response */
4483	if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0d", 2) < 0)
4484		ret = -1;
4485	/* Protected GAS Initial Request */
4486	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0a", 2) < 0)
4487		ret = -1;
4488	/* Protected GAS Initial Response */
4489	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0b", 2) < 0)
4490		ret = -1;
4491	/* Protected GAS Comeback Request */
4492	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0c", 2) < 0)
4493		ret = -1;
4494	/* Protected GAS Comeback Response */
4495	if (nl80211_register_action_frame(bss, (u8 *) "\x09\x0d", 2) < 0)
4496		ret = -1;
4497#endif /* CONFIG_P2P || CONFIG_INTERWORKING */
4498#ifdef CONFIG_P2P
4499	/* P2P Public Action */
4500	if (nl80211_register_action_frame(bss,
4501					  (u8 *) "\x04\x09\x50\x6f\x9a\x09",
4502					  6) < 0)
4503		ret = -1;
4504	/* P2P Action */
4505	if (nl80211_register_action_frame(bss,
4506					  (u8 *) "\x7f\x50\x6f\x9a\x09",
4507					  5) < 0)
4508		ret = -1;
4509#endif /* CONFIG_P2P */
4510#ifdef CONFIG_IEEE80211W
4511	/* SA Query Response */
4512	if (nl80211_register_action_frame(bss, (u8 *) "\x08\x01", 2) < 0)
4513		ret = -1;
4514#endif /* CONFIG_IEEE80211W */
4515#ifdef CONFIG_TDLS
4516	if ((drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT)) {
4517		/* TDLS Discovery Response */
4518		if (nl80211_register_action_frame(bss, (u8 *) "\x04\x0e", 2) <
4519		    0)
4520			ret = -1;
4521	}
4522#endif /* CONFIG_TDLS */
4523
4524	/* FT Action frames */
4525	if (nl80211_register_action_frame(bss, (u8 *) "\x06", 1) < 0)
4526		ret = -1;
4527	else
4528		drv->capa.key_mgmt |= WPA_DRIVER_CAPA_KEY_MGMT_FT |
4529			WPA_DRIVER_CAPA_KEY_MGMT_FT_PSK;
4530
4531	/* WNM - BSS Transition Management Request */
4532	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x07", 2) < 0)
4533		ret = -1;
4534	/* WNM-Sleep Mode Response */
4535	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x11", 2) < 0)
4536		ret = -1;
4537
4538#ifdef CONFIG_HS20
4539	/* WNM-Notification */
4540	if (nl80211_register_action_frame(bss, (u8 *) "\x0a\x1a", 2) < 0)
4541		return -1;
4542#endif /* CONFIG_HS20 */
4543
4544	nl80211_mgmt_handle_register_eloop(bss);
4545
4546	return ret;
4547}
4548
4549
4550static int nl80211_register_spurious_class3(struct i802_bss *bss)
4551{
4552	struct wpa_driver_nl80211_data *drv = bss->drv;
4553	struct nl_msg *msg;
4554	int ret = -1;
4555
4556	msg = nlmsg_alloc();
4557	if (!msg)
4558		return -1;
4559
4560	nl80211_cmd(drv, msg, 0, NL80211_CMD_UNEXPECTED_FRAME);
4561
4562	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
4563
4564	ret = send_and_recv(drv->global, bss->nl_mgmt, msg, NULL, NULL);
4565	msg = NULL;
4566	if (ret) {
4567		wpa_printf(MSG_DEBUG, "nl80211: Register spurious class3 "
4568			   "failed: ret=%d (%s)",
4569			   ret, strerror(-ret));
4570		goto nla_put_failure;
4571	}
4572	ret = 0;
4573nla_put_failure:
4574	nlmsg_free(msg);
4575	return ret;
4576}
4577
4578
4579static int nl80211_mgmt_subscribe_ap(struct i802_bss *bss)
4580{
4581	static const int stypes[] = {
4582		WLAN_FC_STYPE_AUTH,
4583		WLAN_FC_STYPE_ASSOC_REQ,
4584		WLAN_FC_STYPE_REASSOC_REQ,
4585		WLAN_FC_STYPE_DISASSOC,
4586		WLAN_FC_STYPE_DEAUTH,
4587		WLAN_FC_STYPE_ACTION,
4588		WLAN_FC_STYPE_PROBE_REQ,
4589/* Beacon doesn't work as mac80211 doesn't currently allow
4590 * it, but it wouldn't really be the right thing anyway as
4591 * it isn't per interface ... maybe just dump the scan
4592 * results periodically for OLBC?
4593 */
4594		/* WLAN_FC_STYPE_BEACON, */
4595	};
4596	unsigned int i;
4597
4598	if (nl80211_alloc_mgmt_handle(bss))
4599		return -1;
4600	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
4601		   "handle %p", bss->nl_mgmt);
4602
4603	for (i = 0; i < ARRAY_SIZE(stypes); i++) {
4604		if (nl80211_register_frame(bss, bss->nl_mgmt,
4605					   (WLAN_FC_TYPE_MGMT << 2) |
4606					   (stypes[i] << 4),
4607					   NULL, 0) < 0) {
4608			goto out_err;
4609		}
4610	}
4611
4612	if (nl80211_register_spurious_class3(bss))
4613		goto out_err;
4614
4615	if (nl80211_get_wiphy_data_ap(bss) == NULL)
4616		goto out_err;
4617
4618	nl80211_mgmt_handle_register_eloop(bss);
4619	return 0;
4620
4621out_err:
4622	nl_destroy_handles(&bss->nl_mgmt);
4623	return -1;
4624}
4625
4626
4627static int nl80211_mgmt_subscribe_ap_dev_sme(struct i802_bss *bss)
4628{
4629	if (nl80211_alloc_mgmt_handle(bss))
4630		return -1;
4631	wpa_printf(MSG_DEBUG, "nl80211: Subscribe to mgmt frames with AP "
4632		   "handle %p (device SME)", bss->nl_mgmt);
4633
4634	if (nl80211_register_frame(bss, bss->nl_mgmt,
4635				   (WLAN_FC_TYPE_MGMT << 2) |
4636				   (WLAN_FC_STYPE_ACTION << 4),
4637				   NULL, 0) < 0)
4638		goto out_err;
4639
4640	nl80211_mgmt_handle_register_eloop(bss);
4641	return 0;
4642
4643out_err:
4644	nl_destroy_handles(&bss->nl_mgmt);
4645	return -1;
4646}
4647
4648
4649static void nl80211_mgmt_unsubscribe(struct i802_bss *bss, const char *reason)
4650{
4651	if (bss->nl_mgmt == NULL)
4652		return;
4653	wpa_printf(MSG_DEBUG, "nl80211: Unsubscribe mgmt frames handle %p "
4654		   "(%s)", bss->nl_mgmt, reason);
4655	nl80211_destroy_eloop_handle(&bss->nl_mgmt);
4656
4657	nl80211_put_wiphy_data_ap(bss);
4658}
4659
4660
4661static void wpa_driver_nl80211_send_rfkill(void *eloop_ctx, void *timeout_ctx)
4662{
4663	wpa_supplicant_event(timeout_ctx, EVENT_INTERFACE_DISABLED, NULL);
4664}
4665
4666
4667static void nl80211_del_p2pdev(struct i802_bss *bss)
4668{
4669	struct wpa_driver_nl80211_data *drv = bss->drv;
4670	struct nl_msg *msg;
4671	int ret;
4672
4673	msg = nlmsg_alloc();
4674	if (!msg)
4675		return;
4676
4677	nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_INTERFACE);
4678	NLA_PUT_U64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
4679
4680	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
4681	msg = NULL;
4682
4683	wpa_printf(MSG_DEBUG, "nl80211: Delete P2P Device %s (0x%llx): %s",
4684		   bss->ifname, (long long unsigned int) bss->wdev_id,
4685		   strerror(-ret));
4686
4687nla_put_failure:
4688	nlmsg_free(msg);
4689}
4690
4691
4692static int nl80211_set_p2pdev(struct i802_bss *bss, int start)
4693{
4694	struct wpa_driver_nl80211_data *drv = bss->drv;
4695	struct nl_msg *msg;
4696	int ret = -1;
4697
4698	msg = nlmsg_alloc();
4699	if (!msg)
4700		return -1;
4701
4702	if (start)
4703		nl80211_cmd(drv, msg, 0, NL80211_CMD_START_P2P_DEVICE);
4704	else
4705		nl80211_cmd(drv, msg, 0, NL80211_CMD_STOP_P2P_DEVICE);
4706
4707	NLA_PUT_U64(msg, NL80211_ATTR_WDEV, bss->wdev_id);
4708
4709	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
4710	msg = NULL;
4711
4712	wpa_printf(MSG_DEBUG, "nl80211: %s P2P Device %s (0x%llx): %s",
4713		   start ? "Start" : "Stop",
4714		   bss->ifname, (long long unsigned int) bss->wdev_id,
4715		   strerror(-ret));
4716
4717nla_put_failure:
4718	nlmsg_free(msg);
4719	return ret;
4720}
4721
4722
4723static int i802_set_iface_flags(struct i802_bss *bss, int up)
4724{
4725	enum nl80211_iftype nlmode;
4726
4727	nlmode = nl80211_get_ifmode(bss);
4728	if (nlmode != NL80211_IFTYPE_P2P_DEVICE) {
4729		return linux_set_iface_flags(bss->drv->global->ioctl_sock,
4730					     bss->ifname, up);
4731	}
4732
4733	/* P2P Device has start/stop which is equivalent */
4734	return nl80211_set_p2pdev(bss, up);
4735}
4736
4737
4738static int
4739wpa_driver_nl80211_finish_drv_init(struct wpa_driver_nl80211_data *drv,
4740				   const u8 *set_addr, int first)
4741{
4742	struct i802_bss *bss = drv->first_bss;
4743	int send_rfkill_event = 0;
4744	enum nl80211_iftype nlmode;
4745
4746	drv->ifindex = if_nametoindex(bss->ifname);
4747	bss->ifindex = drv->ifindex;
4748	bss->wdev_id = drv->global->if_add_wdevid;
4749	bss->wdev_id_set = drv->global->if_add_wdevid_set;
4750
4751	bss->if_dynamic = drv->ifindex == drv->global->if_add_ifindex;
4752	bss->if_dynamic = bss->if_dynamic || drv->global->if_add_wdevid_set;
4753	drv->global->if_add_wdevid_set = 0;
4754
4755	if (wpa_driver_nl80211_capa(drv))
4756		return -1;
4757
4758	wpa_printf(MSG_DEBUG, "nl80211: interface %s in phy %s",
4759		   bss->ifname, drv->phyname);
4760
4761	if (set_addr &&
4762	    (linux_set_iface_flags(drv->global->ioctl_sock, bss->ifname, 0) ||
4763	     linux_set_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
4764				set_addr)))
4765		return -1;
4766
4767	if (first && nl80211_get_ifmode(bss) == NL80211_IFTYPE_AP)
4768		drv->start_mode_ap = 1;
4769
4770	if (drv->hostapd)
4771		nlmode = NL80211_IFTYPE_AP;
4772	else if (bss->if_dynamic)
4773		nlmode = nl80211_get_ifmode(bss);
4774	else
4775		nlmode = NL80211_IFTYPE_STATION;
4776
4777	if (wpa_driver_nl80211_set_mode(bss, nlmode) < 0) {
4778		wpa_printf(MSG_ERROR, "nl80211: Could not configure driver mode");
4779		return -1;
4780	}
4781
4782	if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
4783		nl80211_get_macaddr(bss);
4784
4785	if (!rfkill_is_blocked(drv->rfkill)) {
4786		int ret = i802_set_iface_flags(bss, 1);
4787		if (ret) {
4788			wpa_printf(MSG_ERROR, "nl80211: Could not set "
4789				   "interface '%s' UP", bss->ifname);
4790			return ret;
4791		}
4792		if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
4793			return ret;
4794	} else {
4795		wpa_printf(MSG_DEBUG, "nl80211: Could not yet enable "
4796			   "interface '%s' due to rfkill", bss->ifname);
4797		if (nlmode == NL80211_IFTYPE_P2P_DEVICE)
4798			return 0;
4799		drv->if_disabled = 1;
4800		send_rfkill_event = 1;
4801	}
4802
4803	if (!drv->hostapd)
4804		netlink_send_oper_ifla(drv->global->netlink, drv->ifindex,
4805				       1, IF_OPER_DORMANT);
4806
4807	if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
4808			       bss->addr))
4809		return -1;
4810
4811	if (send_rfkill_event) {
4812		eloop_register_timeout(0, 0, wpa_driver_nl80211_send_rfkill,
4813				       drv, drv->ctx);
4814	}
4815
4816	return 0;
4817}
4818
4819
4820static int wpa_driver_nl80211_del_beacon(struct wpa_driver_nl80211_data *drv)
4821{
4822	struct nl_msg *msg;
4823
4824	msg = nlmsg_alloc();
4825	if (!msg)
4826		return -ENOMEM;
4827
4828	wpa_printf(MSG_DEBUG, "nl80211: Remove beacon (ifindex=%d)",
4829		   drv->ifindex);
4830	nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_BEACON);
4831	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
4832
4833	return send_and_recv_msgs(drv, msg, NULL, NULL);
4834 nla_put_failure:
4835	nlmsg_free(msg);
4836	return -ENOBUFS;
4837}
4838
4839
4840/**
4841 * wpa_driver_nl80211_deinit - Deinitialize nl80211 driver interface
4842 * @bss: Pointer to private nl80211 data from wpa_driver_nl80211_init()
4843 *
4844 * Shut down driver interface and processing of driver events. Free
4845 * private data buffer if one was allocated in wpa_driver_nl80211_init().
4846 */
4847static void wpa_driver_nl80211_deinit(struct i802_bss *bss)
4848{
4849	struct wpa_driver_nl80211_data *drv = bss->drv;
4850
4851	bss->in_deinit = 1;
4852	if (drv->data_tx_status)
4853		eloop_unregister_read_sock(drv->eapol_tx_sock);
4854	if (drv->eapol_tx_sock >= 0)
4855		close(drv->eapol_tx_sock);
4856
4857	if (bss->nl_preq)
4858		wpa_driver_nl80211_probe_req_report(bss, 0);
4859	if (bss->added_if_into_bridge) {
4860		if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
4861				    bss->ifname) < 0)
4862			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
4863				   "interface %s from bridge %s: %s",
4864				   bss->ifname, bss->brname, strerror(errno));
4865	}
4866	if (bss->added_bridge) {
4867		if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
4868			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
4869				   "bridge %s: %s",
4870				   bss->brname, strerror(errno));
4871	}
4872
4873	nl80211_remove_monitor_interface(drv);
4874
4875	if (is_ap_interface(drv->nlmode))
4876		wpa_driver_nl80211_del_beacon(drv);
4877
4878	if (drv->eapol_sock >= 0) {
4879		eloop_unregister_read_sock(drv->eapol_sock);
4880		close(drv->eapol_sock);
4881	}
4882
4883	if (drv->if_indices != drv->default_if_indices)
4884		os_free(drv->if_indices);
4885
4886	if (drv->disabled_11b_rates)
4887		nl80211_disable_11b_rates(drv, drv->ifindex, 0);
4888
4889	netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, 0,
4890			       IF_OPER_UP);
4891	eloop_cancel_timeout(wpa_driver_nl80211_send_rfkill, drv, drv->ctx);
4892	rfkill_deinit(drv->rfkill);
4893
4894	eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
4895
4896	if (!drv->start_iface_up)
4897		(void) i802_set_iface_flags(bss, 0);
4898	if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE) {
4899		if (!drv->hostapd || !drv->start_mode_ap)
4900			wpa_driver_nl80211_set_mode(bss,
4901						    NL80211_IFTYPE_STATION);
4902		nl80211_mgmt_unsubscribe(bss, "deinit");
4903	} else {
4904		nl80211_mgmt_unsubscribe(bss, "deinit");
4905		nl80211_del_p2pdev(bss);
4906	}
4907	nl_cb_put(drv->nl_cb);
4908
4909	nl80211_destroy_bss(drv->first_bss);
4910
4911	os_free(drv->filter_ssids);
4912
4913	os_free(drv->auth_ie);
4914
4915	if (drv->in_interface_list)
4916		dl_list_del(&drv->list);
4917
4918	os_free(drv->extended_capa);
4919	os_free(drv->extended_capa_mask);
4920	os_free(drv->first_bss);
4921	os_free(drv);
4922}
4923
4924
4925/**
4926 * wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
4927 * @eloop_ctx: Driver private data
4928 * @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
4929 *
4930 * This function can be used as registered timeout when starting a scan to
4931 * generate a scan completed event if the driver does not report this.
4932 */
4933static void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx)
4934{
4935	struct wpa_driver_nl80211_data *drv = eloop_ctx;
4936	if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED) {
4937		wpa_driver_nl80211_set_mode(drv->first_bss,
4938					    drv->ap_scan_as_station);
4939		drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
4940	}
4941	wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
4942	wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
4943}
4944
4945
4946static struct nl_msg *
4947nl80211_scan_common(struct wpa_driver_nl80211_data *drv, u8 cmd,
4948		    struct wpa_driver_scan_params *params, u64 *wdev_id)
4949{
4950	struct nl_msg *msg;
4951	size_t i;
4952
4953	msg = nlmsg_alloc();
4954	if (!msg)
4955		return NULL;
4956
4957	nl80211_cmd(drv, msg, 0, cmd);
4958
4959	if (!wdev_id)
4960		NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
4961	else
4962		NLA_PUT_U64(msg, NL80211_ATTR_WDEV, *wdev_id);
4963
4964	if (params->num_ssids) {
4965		struct nlattr *ssids;
4966
4967		ssids = nla_nest_start(msg, NL80211_ATTR_SCAN_SSIDS);
4968		if (ssids == NULL)
4969			goto fail;
4970		for (i = 0; i < params->num_ssids; i++) {
4971			wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
4972					  params->ssids[i].ssid,
4973					  params->ssids[i].ssid_len);
4974			if (nla_put(msg, i + 1, params->ssids[i].ssid_len,
4975				    params->ssids[i].ssid) < 0)
4976				goto fail;
4977		}
4978		nla_nest_end(msg, ssids);
4979	}
4980
4981	if (params->extra_ies) {
4982		wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
4983			    params->extra_ies, params->extra_ies_len);
4984		if (nla_put(msg, NL80211_ATTR_IE, params->extra_ies_len,
4985			    params->extra_ies) < 0)
4986			goto fail;
4987	}
4988
4989	if (params->freqs) {
4990		struct nlattr *freqs;
4991		freqs = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES);
4992		if (freqs == NULL)
4993			goto fail;
4994		for (i = 0; params->freqs[i]; i++) {
4995			wpa_printf(MSG_MSGDUMP, "nl80211: Scan frequency %u "
4996				   "MHz", params->freqs[i]);
4997			if (nla_put_u32(msg, i + 1, params->freqs[i]) < 0)
4998				goto fail;
4999		}
5000		nla_nest_end(msg, freqs);
5001	}
5002
5003	os_free(drv->filter_ssids);
5004	drv->filter_ssids = params->filter_ssids;
5005	params->filter_ssids = NULL;
5006	drv->num_filter_ssids = params->num_filter_ssids;
5007
5008	if (params->only_new_results) {
5009		wpa_printf(MSG_DEBUG, "nl80211: Add NL80211_SCAN_FLAG_FLUSH");
5010		NLA_PUT_U32(msg, NL80211_ATTR_SCAN_FLAGS,
5011			    NL80211_SCAN_FLAG_FLUSH);
5012	}
5013
5014	return msg;
5015
5016fail:
5017nla_put_failure:
5018	nlmsg_free(msg);
5019	return NULL;
5020}
5021
5022
5023/**
5024 * wpa_driver_nl80211_scan - Request the driver to initiate scan
5025 * @bss: Pointer to private driver data from wpa_driver_nl80211_init()
5026 * @params: Scan parameters
5027 * Returns: 0 on success, -1 on failure
5028 */
5029static int wpa_driver_nl80211_scan(struct i802_bss *bss,
5030				   struct wpa_driver_scan_params *params)
5031{
5032	struct wpa_driver_nl80211_data *drv = bss->drv;
5033	int ret = -1, timeout;
5034	struct nl_msg *msg = NULL;
5035
5036	wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: scan request");
5037	drv->scan_for_auth = 0;
5038
5039	msg = nl80211_scan_common(drv, NL80211_CMD_TRIGGER_SCAN, params,
5040				  bss->wdev_id_set ? &bss->wdev_id : NULL);
5041	if (!msg)
5042		return -1;
5043
5044	if (params->p2p_probe) {
5045		struct nlattr *rates;
5046
5047		wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
5048
5049		rates = nla_nest_start(msg, NL80211_ATTR_SCAN_SUPP_RATES);
5050		if (rates == NULL)
5051			goto nla_put_failure;
5052
5053		/*
5054		 * Remove 2.4 GHz rates 1, 2, 5.5, 11 Mbps from supported rates
5055		 * by masking out everything else apart from the OFDM rates 6,
5056		 * 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS rates. All 5 GHz
5057		 * rates are left enabled.
5058		 */
5059		NLA_PUT(msg, NL80211_BAND_2GHZ, 8,
5060			"\x0c\x12\x18\x24\x30\x48\x60\x6c");
5061		nla_nest_end(msg, rates);
5062
5063		NLA_PUT_FLAG(msg, NL80211_ATTR_TX_NO_CCK_RATE);
5064	}
5065
5066	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5067	msg = NULL;
5068	if (ret) {
5069		wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
5070			   "(%s)", ret, strerror(-ret));
5071		if (drv->hostapd && is_ap_interface(drv->nlmode)) {
5072			enum nl80211_iftype old_mode = drv->nlmode;
5073
5074			/*
5075			 * mac80211 does not allow scan requests in AP mode, so
5076			 * try to do this in station mode.
5077			 */
5078			if (wpa_driver_nl80211_set_mode(
5079				    bss, NL80211_IFTYPE_STATION))
5080				goto nla_put_failure;
5081
5082			if (wpa_driver_nl80211_scan(bss, params)) {
5083				wpa_driver_nl80211_set_mode(bss, drv->nlmode);
5084				goto nla_put_failure;
5085			}
5086
5087			/* Restore AP mode when processing scan results */
5088			drv->ap_scan_as_station = old_mode;
5089			ret = 0;
5090		} else
5091			goto nla_put_failure;
5092	}
5093
5094	drv->scan_state = SCAN_REQUESTED;
5095	/* Not all drivers generate "scan completed" wireless event, so try to
5096	 * read results after a timeout. */
5097	timeout = 10;
5098	if (drv->scan_complete_events) {
5099		/*
5100		 * The driver seems to deliver events to notify when scan is
5101		 * complete, so use longer timeout to avoid race conditions
5102		 * with scanning and following association request.
5103		 */
5104		timeout = 30;
5105	}
5106	wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
5107		   "seconds", ret, timeout);
5108	eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
5109	eloop_register_timeout(timeout, 0, wpa_driver_nl80211_scan_timeout,
5110			       drv, drv->ctx);
5111
5112nla_put_failure:
5113	nlmsg_free(msg);
5114	return ret;
5115}
5116
5117
5118/**
5119 * wpa_driver_nl80211_sched_scan - Initiate a scheduled scan
5120 * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
5121 * @params: Scan parameters
5122 * @interval: Interval between scan cycles in milliseconds
5123 * Returns: 0 on success, -1 on failure or if not supported
5124 */
5125static int wpa_driver_nl80211_sched_scan(void *priv,
5126					 struct wpa_driver_scan_params *params,
5127					 u32 interval)
5128{
5129	struct i802_bss *bss = priv;
5130	struct wpa_driver_nl80211_data *drv = bss->drv;
5131	int ret = -1;
5132	struct nl_msg *msg;
5133	size_t i;
5134
5135	wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: sched_scan request");
5136
5137#ifdef ANDROID
5138	if (!drv->capa.sched_scan_supported)
5139		return android_pno_start(bss, params);
5140#endif /* ANDROID */
5141
5142	msg = nl80211_scan_common(drv, NL80211_CMD_START_SCHED_SCAN, params,
5143				  bss->wdev_id_set ? &bss->wdev_id : NULL);
5144	if (!msg)
5145		goto nla_put_failure;
5146
5147	NLA_PUT_U32(msg, NL80211_ATTR_SCHED_SCAN_INTERVAL, interval);
5148
5149	if ((drv->num_filter_ssids &&
5150	    (int) drv->num_filter_ssids <= drv->capa.max_match_sets) ||
5151	    params->filter_rssi) {
5152		struct nlattr *match_sets;
5153		match_sets = nla_nest_start(msg, NL80211_ATTR_SCHED_SCAN_MATCH);
5154		if (match_sets == NULL)
5155			goto nla_put_failure;
5156
5157		for (i = 0; i < drv->num_filter_ssids; i++) {
5158			struct nlattr *match_set_ssid;
5159			wpa_hexdump_ascii(MSG_MSGDUMP,
5160					  "nl80211: Sched scan filter SSID",
5161					  drv->filter_ssids[i].ssid,
5162					  drv->filter_ssids[i].ssid_len);
5163
5164			match_set_ssid = nla_nest_start(msg, i + 1);
5165			if (match_set_ssid == NULL)
5166				goto nla_put_failure;
5167			NLA_PUT(msg, NL80211_ATTR_SCHED_SCAN_MATCH_SSID,
5168				drv->filter_ssids[i].ssid_len,
5169				drv->filter_ssids[i].ssid);
5170			if (params->filter_rssi)
5171				NLA_PUT_U32(msg,
5172					    NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
5173					    params->filter_rssi);
5174
5175			nla_nest_end(msg, match_set_ssid);
5176		}
5177
5178		/*
5179		 * Due to backward compatibility code, newer kernels treat this
5180		 * matchset (with only an RSSI filter) as the default for all
5181		 * other matchsets, unless it's the only one, in which case the
5182		 * matchset will actually allow all SSIDs above the RSSI.
5183		 */
5184		if (params->filter_rssi) {
5185			struct nlattr *match_set_rssi;
5186			match_set_rssi = nla_nest_start(msg, 0);
5187			if (match_set_rssi == NULL)
5188				goto nla_put_failure;
5189			NLA_PUT_U32(msg, NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
5190				    params->filter_rssi);
5191			wpa_printf(MSG_MSGDUMP,
5192				   "nl80211: Sched scan RSSI filter %d dBm",
5193				   params->filter_rssi);
5194			nla_nest_end(msg, match_set_rssi);
5195		}
5196
5197		nla_nest_end(msg, match_sets);
5198	}
5199
5200	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5201
5202	/* TODO: if we get an error here, we should fall back to normal scan */
5203
5204	msg = NULL;
5205	if (ret) {
5206		wpa_printf(MSG_DEBUG, "nl80211: Sched scan start failed: "
5207			   "ret=%d (%s)", ret, strerror(-ret));
5208		goto nla_put_failure;
5209	}
5210
5211	wpa_printf(MSG_DEBUG, "nl80211: Sched scan requested (ret=%d) - "
5212		   "scan interval %d msec", ret, interval);
5213
5214nla_put_failure:
5215	nlmsg_free(msg);
5216	return ret;
5217}
5218
5219
5220/**
5221 * wpa_driver_nl80211_stop_sched_scan - Stop a scheduled scan
5222 * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
5223 * Returns: 0 on success, -1 on failure or if not supported
5224 */
5225static int wpa_driver_nl80211_stop_sched_scan(void *priv)
5226{
5227	struct i802_bss *bss = priv;
5228	struct wpa_driver_nl80211_data *drv = bss->drv;
5229	int ret = 0;
5230	struct nl_msg *msg;
5231
5232#ifdef ANDROID
5233	if (!drv->capa.sched_scan_supported)
5234		return android_pno_stop(bss);
5235#endif /* ANDROID */
5236
5237	msg = nlmsg_alloc();
5238	if (!msg)
5239		return -1;
5240
5241	nl80211_cmd(drv, msg, 0, NL80211_CMD_STOP_SCHED_SCAN);
5242
5243	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
5244
5245	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5246	msg = NULL;
5247	if (ret) {
5248		wpa_printf(MSG_DEBUG, "nl80211: Sched scan stop failed: "
5249			   "ret=%d (%s)", ret, strerror(-ret));
5250		goto nla_put_failure;
5251	}
5252
5253	wpa_printf(MSG_DEBUG, "nl80211: Sched scan stop sent (ret=%d)", ret);
5254
5255nla_put_failure:
5256	nlmsg_free(msg);
5257	return ret;
5258}
5259
5260
5261static const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie)
5262{
5263	const u8 *end, *pos;
5264
5265	if (ies == NULL)
5266		return NULL;
5267
5268	pos = ies;
5269	end = ies + ies_len;
5270
5271	while (pos + 1 < end) {
5272		if (pos + 2 + pos[1] > end)
5273			break;
5274		if (pos[0] == ie)
5275			return pos;
5276		pos += 2 + pos[1];
5277	}
5278
5279	return NULL;
5280}
5281
5282
5283static int nl80211_scan_filtered(struct wpa_driver_nl80211_data *drv,
5284				 const u8 *ie, size_t ie_len)
5285{
5286	const u8 *ssid;
5287	size_t i;
5288
5289	if (drv->filter_ssids == NULL)
5290		return 0;
5291
5292	ssid = nl80211_get_ie(ie, ie_len, WLAN_EID_SSID);
5293	if (ssid == NULL)
5294		return 1;
5295
5296	for (i = 0; i < drv->num_filter_ssids; i++) {
5297		if (ssid[1] == drv->filter_ssids[i].ssid_len &&
5298		    os_memcmp(ssid + 2, drv->filter_ssids[i].ssid, ssid[1]) ==
5299		    0)
5300			return 0;
5301	}
5302
5303	return 1;
5304}
5305
5306
5307static int bss_info_handler(struct nl_msg *msg, void *arg)
5308{
5309	struct nlattr *tb[NL80211_ATTR_MAX + 1];
5310	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
5311	struct nlattr *bss[NL80211_BSS_MAX + 1];
5312	static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
5313		[NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
5314		[NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
5315		[NL80211_BSS_TSF] = { .type = NLA_U64 },
5316		[NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 },
5317		[NL80211_BSS_CAPABILITY] = { .type = NLA_U16 },
5318		[NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
5319		[NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 },
5320		[NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 },
5321		[NL80211_BSS_STATUS] = { .type = NLA_U32 },
5322		[NL80211_BSS_SEEN_MS_AGO] = { .type = NLA_U32 },
5323		[NL80211_BSS_BEACON_IES] = { .type = NLA_UNSPEC },
5324	};
5325	struct nl80211_bss_info_arg *_arg = arg;
5326	struct wpa_scan_results *res = _arg->res;
5327	struct wpa_scan_res **tmp;
5328	struct wpa_scan_res *r;
5329	const u8 *ie, *beacon_ie;
5330	size_t ie_len, beacon_ie_len;
5331	u8 *pos;
5332	size_t i;
5333
5334	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
5335		  genlmsg_attrlen(gnlh, 0), NULL);
5336	if (!tb[NL80211_ATTR_BSS])
5337		return NL_SKIP;
5338	if (nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
5339			     bss_policy))
5340		return NL_SKIP;
5341	if (bss[NL80211_BSS_STATUS]) {
5342		enum nl80211_bss_status status;
5343		status = nla_get_u32(bss[NL80211_BSS_STATUS]);
5344		if (status == NL80211_BSS_STATUS_ASSOCIATED &&
5345		    bss[NL80211_BSS_FREQUENCY]) {
5346			_arg->assoc_freq =
5347				nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
5348			wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
5349				   _arg->assoc_freq);
5350		}
5351		if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
5352		    bss[NL80211_BSS_FREQUENCY]) {
5353			_arg->ibss_freq =
5354				nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
5355			wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
5356				   _arg->ibss_freq);
5357		}
5358		if (status == NL80211_BSS_STATUS_ASSOCIATED &&
5359		    bss[NL80211_BSS_BSSID]) {
5360			os_memcpy(_arg->assoc_bssid,
5361				  nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN);
5362			wpa_printf(MSG_DEBUG, "nl80211: Associated with "
5363				   MACSTR, MAC2STR(_arg->assoc_bssid));
5364		}
5365	}
5366	if (!res)
5367		return NL_SKIP;
5368	if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
5369		ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
5370		ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
5371	} else {
5372		ie = NULL;
5373		ie_len = 0;
5374	}
5375	if (bss[NL80211_BSS_BEACON_IES]) {
5376		beacon_ie = nla_data(bss[NL80211_BSS_BEACON_IES]);
5377		beacon_ie_len = nla_len(bss[NL80211_BSS_BEACON_IES]);
5378	} else {
5379		beacon_ie = NULL;
5380		beacon_ie_len = 0;
5381	}
5382
5383	if (nl80211_scan_filtered(_arg->drv, ie ? ie : beacon_ie,
5384				  ie ? ie_len : beacon_ie_len))
5385		return NL_SKIP;
5386
5387	r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len);
5388	if (r == NULL)
5389		return NL_SKIP;
5390	if (bss[NL80211_BSS_BSSID])
5391		os_memcpy(r->bssid, nla_data(bss[NL80211_BSS_BSSID]),
5392			  ETH_ALEN);
5393	if (bss[NL80211_BSS_FREQUENCY])
5394		r->freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
5395	if (bss[NL80211_BSS_BEACON_INTERVAL])
5396		r->beacon_int = nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL]);
5397	if (bss[NL80211_BSS_CAPABILITY])
5398		r->caps = nla_get_u16(bss[NL80211_BSS_CAPABILITY]);
5399	r->flags |= WPA_SCAN_NOISE_INVALID;
5400	if (bss[NL80211_BSS_SIGNAL_MBM]) {
5401		r->level = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]);
5402		r->level /= 100; /* mBm to dBm */
5403		r->flags |= WPA_SCAN_LEVEL_DBM | WPA_SCAN_QUAL_INVALID;
5404	} else if (bss[NL80211_BSS_SIGNAL_UNSPEC]) {
5405		r->level = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]);
5406		r->flags |= WPA_SCAN_QUAL_INVALID;
5407	} else
5408		r->flags |= WPA_SCAN_LEVEL_INVALID | WPA_SCAN_QUAL_INVALID;
5409	if (bss[NL80211_BSS_TSF])
5410		r->tsf = nla_get_u64(bss[NL80211_BSS_TSF]);
5411	if (bss[NL80211_BSS_SEEN_MS_AGO])
5412		r->age = nla_get_u32(bss[NL80211_BSS_SEEN_MS_AGO]);
5413	r->ie_len = ie_len;
5414	pos = (u8 *) (r + 1);
5415	if (ie) {
5416		os_memcpy(pos, ie, ie_len);
5417		pos += ie_len;
5418	}
5419	r->beacon_ie_len = beacon_ie_len;
5420	if (beacon_ie)
5421		os_memcpy(pos, beacon_ie, beacon_ie_len);
5422
5423	if (bss[NL80211_BSS_STATUS]) {
5424		enum nl80211_bss_status status;
5425		status = nla_get_u32(bss[NL80211_BSS_STATUS]);
5426		switch (status) {
5427		case NL80211_BSS_STATUS_AUTHENTICATED:
5428			r->flags |= WPA_SCAN_AUTHENTICATED;
5429			break;
5430		case NL80211_BSS_STATUS_ASSOCIATED:
5431			r->flags |= WPA_SCAN_ASSOCIATED;
5432			break;
5433		default:
5434			break;
5435		}
5436	}
5437
5438	/*
5439	 * cfg80211 maintains separate BSS table entries for APs if the same
5440	 * BSSID,SSID pair is seen on multiple channels. wpa_supplicant does
5441	 * not use frequency as a separate key in the BSS table, so filter out
5442	 * duplicated entries. Prefer associated BSS entry in such a case in
5443	 * order to get the correct frequency into the BSS table. Similarly,
5444	 * prefer newer entries over older.
5445	 */
5446	for (i = 0; i < res->num; i++) {
5447		const u8 *s1, *s2;
5448		if (os_memcmp(res->res[i]->bssid, r->bssid, ETH_ALEN) != 0)
5449			continue;
5450
5451		s1 = nl80211_get_ie((u8 *) (res->res[i] + 1),
5452				    res->res[i]->ie_len, WLAN_EID_SSID);
5453		s2 = nl80211_get_ie((u8 *) (r + 1), r->ie_len, WLAN_EID_SSID);
5454		if (s1 == NULL || s2 == NULL || s1[1] != s2[1] ||
5455		    os_memcmp(s1, s2, 2 + s1[1]) != 0)
5456			continue;
5457
5458		/* Same BSSID,SSID was already included in scan results */
5459		wpa_printf(MSG_DEBUG, "nl80211: Remove duplicated scan result "
5460			   "for " MACSTR, MAC2STR(r->bssid));
5461
5462		if (((r->flags & WPA_SCAN_ASSOCIATED) &&
5463		     !(res->res[i]->flags & WPA_SCAN_ASSOCIATED)) ||
5464		    r->age < res->res[i]->age) {
5465			os_free(res->res[i]);
5466			res->res[i] = r;
5467		} else
5468			os_free(r);
5469		return NL_SKIP;
5470	}
5471
5472	tmp = os_realloc_array(res->res, res->num + 1,
5473			       sizeof(struct wpa_scan_res *));
5474	if (tmp == NULL) {
5475		os_free(r);
5476		return NL_SKIP;
5477	}
5478	tmp[res->num++] = r;
5479	res->res = tmp;
5480
5481	return NL_SKIP;
5482}
5483
5484
5485static void clear_state_mismatch(struct wpa_driver_nl80211_data *drv,
5486				 const u8 *addr)
5487{
5488	if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
5489		wpa_printf(MSG_DEBUG, "nl80211: Clear possible state "
5490			   "mismatch (" MACSTR ")", MAC2STR(addr));
5491		wpa_driver_nl80211_mlme(drv, addr,
5492					NL80211_CMD_DEAUTHENTICATE,
5493					WLAN_REASON_PREV_AUTH_NOT_VALID, 1);
5494	}
5495}
5496
5497
5498static void wpa_driver_nl80211_check_bss_status(
5499	struct wpa_driver_nl80211_data *drv, struct wpa_scan_results *res)
5500{
5501	size_t i;
5502
5503	for (i = 0; i < res->num; i++) {
5504		struct wpa_scan_res *r = res->res[i];
5505		if (r->flags & WPA_SCAN_AUTHENTICATED) {
5506			wpa_printf(MSG_DEBUG, "nl80211: Scan results "
5507				   "indicates BSS status with " MACSTR
5508				   " as authenticated",
5509				   MAC2STR(r->bssid));
5510			if (is_sta_interface(drv->nlmode) &&
5511			    os_memcmp(r->bssid, drv->bssid, ETH_ALEN) != 0 &&
5512			    os_memcmp(r->bssid, drv->auth_bssid, ETH_ALEN) !=
5513			    0) {
5514				wpa_printf(MSG_DEBUG, "nl80211: Unknown BSSID"
5515					   " in local state (auth=" MACSTR
5516					   " assoc=" MACSTR ")",
5517					   MAC2STR(drv->auth_bssid),
5518					   MAC2STR(drv->bssid));
5519				clear_state_mismatch(drv, r->bssid);
5520			}
5521		}
5522
5523		if (r->flags & WPA_SCAN_ASSOCIATED) {
5524			wpa_printf(MSG_DEBUG, "nl80211: Scan results "
5525				   "indicate BSS status with " MACSTR
5526				   " as associated",
5527				   MAC2STR(r->bssid));
5528			if (is_sta_interface(drv->nlmode) &&
5529			    !drv->associated) {
5530				wpa_printf(MSG_DEBUG, "nl80211: Local state "
5531					   "(not associated) does not match "
5532					   "with BSS state");
5533				clear_state_mismatch(drv, r->bssid);
5534			} else if (is_sta_interface(drv->nlmode) &&
5535				   os_memcmp(drv->bssid, r->bssid, ETH_ALEN) !=
5536				   0) {
5537				wpa_printf(MSG_DEBUG, "nl80211: Local state "
5538					   "(associated with " MACSTR ") does "
5539					   "not match with BSS state",
5540					   MAC2STR(drv->bssid));
5541				clear_state_mismatch(drv, r->bssid);
5542				clear_state_mismatch(drv, drv->bssid);
5543			}
5544		}
5545	}
5546}
5547
5548
5549static struct wpa_scan_results *
5550nl80211_get_scan_results(struct wpa_driver_nl80211_data *drv)
5551{
5552	struct nl_msg *msg;
5553	struct wpa_scan_results *res;
5554	int ret;
5555	struct nl80211_bss_info_arg arg;
5556
5557	res = os_zalloc(sizeof(*res));
5558	if (res == NULL)
5559		return NULL;
5560	msg = nlmsg_alloc();
5561	if (!msg)
5562		goto nla_put_failure;
5563
5564	nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SCAN);
5565	if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
5566		goto nla_put_failure;
5567
5568	arg.drv = drv;
5569	arg.res = res;
5570	ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
5571	msg = NULL;
5572	if (ret == 0) {
5573		wpa_printf(MSG_DEBUG, "nl80211: Received scan results (%lu "
5574			   "BSSes)", (unsigned long) res->num);
5575		nl80211_get_noise_for_scan_results(drv, res);
5576		return res;
5577	}
5578	wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
5579		   "(%s)", ret, strerror(-ret));
5580nla_put_failure:
5581	nlmsg_free(msg);
5582	wpa_scan_results_free(res);
5583	return NULL;
5584}
5585
5586
5587/**
5588 * wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
5589 * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
5590 * Returns: Scan results on success, -1 on failure
5591 */
5592static struct wpa_scan_results *
5593wpa_driver_nl80211_get_scan_results(void *priv)
5594{
5595	struct i802_bss *bss = priv;
5596	struct wpa_driver_nl80211_data *drv = bss->drv;
5597	struct wpa_scan_results *res;
5598
5599	res = nl80211_get_scan_results(drv);
5600	if (res)
5601		wpa_driver_nl80211_check_bss_status(drv, res);
5602	return res;
5603}
5604
5605
5606static void nl80211_dump_scan(struct wpa_driver_nl80211_data *drv)
5607{
5608	struct wpa_scan_results *res;
5609	size_t i;
5610
5611	res = nl80211_get_scan_results(drv);
5612	if (res == NULL) {
5613		wpa_printf(MSG_DEBUG, "nl80211: Failed to get scan results");
5614		return;
5615	}
5616
5617	wpa_printf(MSG_DEBUG, "nl80211: Scan result dump");
5618	for (i = 0; i < res->num; i++) {
5619		struct wpa_scan_res *r = res->res[i];
5620		wpa_printf(MSG_DEBUG, "nl80211: %d/%d " MACSTR "%s%s",
5621			   (int) i, (int) res->num, MAC2STR(r->bssid),
5622			   r->flags & WPA_SCAN_AUTHENTICATED ? " [auth]" : "",
5623			   r->flags & WPA_SCAN_ASSOCIATED ? " [assoc]" : "");
5624	}
5625
5626	wpa_scan_results_free(res);
5627}
5628
5629
5630static u32 wpa_alg_to_cipher_suite(enum wpa_alg alg, size_t key_len)
5631{
5632	switch (alg) {
5633	case WPA_ALG_WEP:
5634		if (key_len == 5)
5635			return WLAN_CIPHER_SUITE_WEP40;
5636		return WLAN_CIPHER_SUITE_WEP104;
5637	case WPA_ALG_TKIP:
5638		return WLAN_CIPHER_SUITE_TKIP;
5639	case WPA_ALG_CCMP:
5640		return WLAN_CIPHER_SUITE_CCMP;
5641	case WPA_ALG_GCMP:
5642		return WLAN_CIPHER_SUITE_GCMP;
5643	case WPA_ALG_CCMP_256:
5644		return WLAN_CIPHER_SUITE_CCMP_256;
5645	case WPA_ALG_GCMP_256:
5646		return WLAN_CIPHER_SUITE_GCMP_256;
5647	case WPA_ALG_IGTK:
5648		return WLAN_CIPHER_SUITE_AES_CMAC;
5649	case WPA_ALG_BIP_GMAC_128:
5650		return WLAN_CIPHER_SUITE_BIP_GMAC_128;
5651	case WPA_ALG_BIP_GMAC_256:
5652		return WLAN_CIPHER_SUITE_BIP_GMAC_256;
5653	case WPA_ALG_BIP_CMAC_256:
5654		return WLAN_CIPHER_SUITE_BIP_CMAC_256;
5655	case WPA_ALG_SMS4:
5656		return WLAN_CIPHER_SUITE_SMS4;
5657	case WPA_ALG_KRK:
5658		return WLAN_CIPHER_SUITE_KRK;
5659	case WPA_ALG_NONE:
5660	case WPA_ALG_PMK:
5661		wpa_printf(MSG_ERROR, "nl80211: Unexpected encryption algorithm %d",
5662			   alg);
5663		return 0;
5664	}
5665
5666	wpa_printf(MSG_ERROR, "nl80211: Unsupported encryption algorithm %d",
5667		   alg);
5668	return 0;
5669}
5670
5671
5672static u32 wpa_cipher_to_cipher_suite(unsigned int cipher)
5673{
5674	switch (cipher) {
5675	case WPA_CIPHER_CCMP_256:
5676		return WLAN_CIPHER_SUITE_CCMP_256;
5677	case WPA_CIPHER_GCMP_256:
5678		return WLAN_CIPHER_SUITE_GCMP_256;
5679	case WPA_CIPHER_CCMP:
5680		return WLAN_CIPHER_SUITE_CCMP;
5681	case WPA_CIPHER_GCMP:
5682		return WLAN_CIPHER_SUITE_GCMP;
5683	case WPA_CIPHER_TKIP:
5684		return WLAN_CIPHER_SUITE_TKIP;
5685	case WPA_CIPHER_WEP104:
5686		return WLAN_CIPHER_SUITE_WEP104;
5687	case WPA_CIPHER_WEP40:
5688		return WLAN_CIPHER_SUITE_WEP40;
5689	case WPA_CIPHER_GTK_NOT_USED:
5690		return WLAN_CIPHER_SUITE_NO_GROUP_ADDR;
5691	}
5692
5693	return 0;
5694}
5695
5696
5697static int wpa_cipher_to_cipher_suites(unsigned int ciphers, u32 suites[],
5698				       int max_suites)
5699{
5700	int num_suites = 0;
5701
5702	if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP_256)
5703		suites[num_suites++] = WLAN_CIPHER_SUITE_CCMP_256;
5704	if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP_256)
5705		suites[num_suites++] = WLAN_CIPHER_SUITE_GCMP_256;
5706	if (num_suites < max_suites && ciphers & WPA_CIPHER_CCMP)
5707		suites[num_suites++] = WLAN_CIPHER_SUITE_CCMP;
5708	if (num_suites < max_suites && ciphers & WPA_CIPHER_GCMP)
5709		suites[num_suites++] = WLAN_CIPHER_SUITE_GCMP;
5710	if (num_suites < max_suites && ciphers & WPA_CIPHER_TKIP)
5711		suites[num_suites++] = WLAN_CIPHER_SUITE_TKIP;
5712	if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP104)
5713		suites[num_suites++] = WLAN_CIPHER_SUITE_WEP104;
5714	if (num_suites < max_suites && ciphers & WPA_CIPHER_WEP40)
5715		suites[num_suites++] = WLAN_CIPHER_SUITE_WEP40;
5716
5717	return num_suites;
5718}
5719
5720
5721static int wpa_driver_nl80211_set_key(const char *ifname, struct i802_bss *bss,
5722				      enum wpa_alg alg, const u8 *addr,
5723				      int key_idx, int set_tx,
5724				      const u8 *seq, size_t seq_len,
5725				      const u8 *key, size_t key_len)
5726{
5727	struct wpa_driver_nl80211_data *drv = bss->drv;
5728	int ifindex;
5729	struct nl_msg *msg;
5730	int ret;
5731	int tdls = 0;
5732
5733	/* Ignore for P2P Device */
5734	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
5735		return 0;
5736
5737	ifindex = if_nametoindex(ifname);
5738	wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
5739		   "set_tx=%d seq_len=%lu key_len=%lu",
5740		   __func__, ifindex, ifname, alg, addr, key_idx, set_tx,
5741		   (unsigned long) seq_len, (unsigned long) key_len);
5742#ifdef CONFIG_TDLS
5743	if (key_idx == -1) {
5744		key_idx = 0;
5745		tdls = 1;
5746	}
5747#endif /* CONFIG_TDLS */
5748
5749	msg = nlmsg_alloc();
5750	if (!msg)
5751		return -ENOMEM;
5752
5753	if (alg == WPA_ALG_NONE) {
5754		nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_KEY);
5755	} else {
5756		nl80211_cmd(drv, msg, 0, NL80211_CMD_NEW_KEY);
5757		NLA_PUT(msg, NL80211_ATTR_KEY_DATA, key_len, key);
5758		wpa_hexdump_key(MSG_DEBUG, "nl80211: KEY_DATA", key, key_len);
5759		NLA_PUT_U32(msg, NL80211_ATTR_KEY_CIPHER,
5760			    wpa_alg_to_cipher_suite(alg, key_len));
5761	}
5762
5763	if (seq && seq_len) {
5764		NLA_PUT(msg, NL80211_ATTR_KEY_SEQ, seq_len, seq);
5765		wpa_hexdump(MSG_DEBUG, "nl80211: KEY_SEQ", seq, seq_len);
5766	}
5767
5768	if (addr && !is_broadcast_ether_addr(addr)) {
5769		wpa_printf(MSG_DEBUG, "   addr=" MACSTR, MAC2STR(addr));
5770		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
5771
5772		if (alg != WPA_ALG_WEP && key_idx && !set_tx) {
5773			wpa_printf(MSG_DEBUG, "   RSN IBSS RX GTK");
5774			NLA_PUT_U32(msg, NL80211_ATTR_KEY_TYPE,
5775				    NL80211_KEYTYPE_GROUP);
5776		}
5777	} else if (addr && is_broadcast_ether_addr(addr)) {
5778		struct nlattr *types;
5779
5780		wpa_printf(MSG_DEBUG, "   broadcast key");
5781
5782		types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
5783		if (!types)
5784			goto nla_put_failure;
5785		NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST);
5786		nla_nest_end(msg, types);
5787	}
5788	NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
5789	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
5790
5791	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5792	if ((ret == -ENOENT || ret == -ENOLINK) && alg == WPA_ALG_NONE)
5793		ret = 0;
5794	if (ret)
5795		wpa_printf(MSG_DEBUG, "nl80211: set_key failed; err=%d %s)",
5796			   ret, strerror(-ret));
5797
5798	/*
5799	 * If we failed or don't need to set the default TX key (below),
5800	 * we're done here.
5801	 */
5802	if (ret || !set_tx || alg == WPA_ALG_NONE || tdls)
5803		return ret;
5804	if (is_ap_interface(drv->nlmode) && addr &&
5805	    !is_broadcast_ether_addr(addr))
5806		return ret;
5807
5808	msg = nlmsg_alloc();
5809	if (!msg)
5810		return -ENOMEM;
5811
5812	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_KEY);
5813	NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, key_idx);
5814	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
5815	if (alg == WPA_ALG_IGTK)
5816		NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT_MGMT);
5817	else
5818		NLA_PUT_FLAG(msg, NL80211_ATTR_KEY_DEFAULT);
5819	if (addr && is_broadcast_ether_addr(addr)) {
5820		struct nlattr *types;
5821
5822		types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
5823		if (!types)
5824			goto nla_put_failure;
5825		NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_TYPE_MULTICAST);
5826		nla_nest_end(msg, types);
5827	} else if (addr) {
5828		struct nlattr *types;
5829
5830		types = nla_nest_start(msg, NL80211_ATTR_KEY_DEFAULT_TYPES);
5831		if (!types)
5832			goto nla_put_failure;
5833		NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_TYPE_UNICAST);
5834		nla_nest_end(msg, types);
5835	}
5836
5837	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5838	if (ret == -ENOENT)
5839		ret = 0;
5840	if (ret)
5841		wpa_printf(MSG_DEBUG, "nl80211: set_key default failed; "
5842			   "err=%d %s)", ret, strerror(-ret));
5843	return ret;
5844
5845nla_put_failure:
5846	nlmsg_free(msg);
5847	return -ENOBUFS;
5848}
5849
5850
5851static int nl_add_key(struct nl_msg *msg, enum wpa_alg alg,
5852		      int key_idx, int defkey,
5853		      const u8 *seq, size_t seq_len,
5854		      const u8 *key, size_t key_len)
5855{
5856	struct nlattr *key_attr = nla_nest_start(msg, NL80211_ATTR_KEY);
5857	if (!key_attr)
5858		return -1;
5859
5860	if (defkey && alg == WPA_ALG_IGTK)
5861		NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT_MGMT);
5862	else if (defkey)
5863		NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT);
5864
5865	NLA_PUT_U8(msg, NL80211_KEY_IDX, key_idx);
5866
5867	NLA_PUT_U32(msg, NL80211_KEY_CIPHER,
5868		    wpa_alg_to_cipher_suite(alg, key_len));
5869
5870	if (seq && seq_len)
5871		NLA_PUT(msg, NL80211_KEY_SEQ, seq_len, seq);
5872
5873	NLA_PUT(msg, NL80211_KEY_DATA, key_len, key);
5874
5875	nla_nest_end(msg, key_attr);
5876
5877	return 0;
5878 nla_put_failure:
5879	return -1;
5880}
5881
5882
5883static int nl80211_set_conn_keys(struct wpa_driver_associate_params *params,
5884				 struct nl_msg *msg)
5885{
5886	int i, privacy = 0;
5887	struct nlattr *nl_keys, *nl_key;
5888
5889	for (i = 0; i < 4; i++) {
5890		if (!params->wep_key[i])
5891			continue;
5892		privacy = 1;
5893		break;
5894	}
5895	if (params->wps == WPS_MODE_PRIVACY)
5896		privacy = 1;
5897	if (params->pairwise_suite &&
5898	    params->pairwise_suite != WPA_CIPHER_NONE)
5899		privacy = 1;
5900
5901	if (!privacy)
5902		return 0;
5903
5904	NLA_PUT_FLAG(msg, NL80211_ATTR_PRIVACY);
5905
5906	nl_keys = nla_nest_start(msg, NL80211_ATTR_KEYS);
5907	if (!nl_keys)
5908		goto nla_put_failure;
5909
5910	for (i = 0; i < 4; i++) {
5911		if (!params->wep_key[i])
5912			continue;
5913
5914		nl_key = nla_nest_start(msg, i);
5915		if (!nl_key)
5916			goto nla_put_failure;
5917
5918		NLA_PUT(msg, NL80211_KEY_DATA, params->wep_key_len[i],
5919			params->wep_key[i]);
5920		if (params->wep_key_len[i] == 5)
5921			NLA_PUT_U32(msg, NL80211_KEY_CIPHER,
5922				    WLAN_CIPHER_SUITE_WEP40);
5923		else
5924			NLA_PUT_U32(msg, NL80211_KEY_CIPHER,
5925				    WLAN_CIPHER_SUITE_WEP104);
5926
5927		NLA_PUT_U8(msg, NL80211_KEY_IDX, i);
5928
5929		if (i == params->wep_tx_keyidx)
5930			NLA_PUT_FLAG(msg, NL80211_KEY_DEFAULT);
5931
5932		nla_nest_end(msg, nl_key);
5933	}
5934	nla_nest_end(msg, nl_keys);
5935
5936	return 0;
5937
5938nla_put_failure:
5939	return -ENOBUFS;
5940}
5941
5942
5943static int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
5944				   const u8 *addr, int cmd, u16 reason_code,
5945				   int local_state_change)
5946{
5947	int ret = -1;
5948	struct nl_msg *msg;
5949
5950	msg = nlmsg_alloc();
5951	if (!msg)
5952		return -1;
5953
5954	nl80211_cmd(drv, msg, 0, cmd);
5955
5956	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
5957	NLA_PUT_U16(msg, NL80211_ATTR_REASON_CODE, reason_code);
5958	if (addr)
5959		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
5960	if (local_state_change)
5961		NLA_PUT_FLAG(msg, NL80211_ATTR_LOCAL_STATE_CHANGE);
5962
5963	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
5964	msg = NULL;
5965	if (ret) {
5966		wpa_dbg(drv->ctx, MSG_DEBUG,
5967			"nl80211: MLME command failed: reason=%u ret=%d (%s)",
5968			reason_code, ret, strerror(-ret));
5969		goto nla_put_failure;
5970	}
5971	ret = 0;
5972
5973nla_put_failure:
5974	nlmsg_free(msg);
5975	return ret;
5976}
5977
5978
5979static int wpa_driver_nl80211_disconnect(struct wpa_driver_nl80211_data *drv,
5980					 int reason_code)
5981{
5982	int ret;
5983
5984	wpa_printf(MSG_DEBUG, "%s(reason_code=%d)", __func__, reason_code);
5985	nl80211_mark_disconnected(drv);
5986	/* Disconnect command doesn't need BSSID - it uses cached value */
5987	ret = wpa_driver_nl80211_mlme(drv, NULL, NL80211_CMD_DISCONNECT,
5988				      reason_code, 0);
5989	/*
5990	 * For locally generated disconnect, supplicant already generates a
5991	 * DEAUTH event, so ignore the event from NL80211.
5992	 */
5993	drv->ignore_next_local_disconnect = ret == 0;
5994
5995	return ret;
5996}
5997
5998
5999static int wpa_driver_nl80211_deauthenticate(struct i802_bss *bss,
6000					     const u8 *addr, int reason_code)
6001{
6002	struct wpa_driver_nl80211_data *drv = bss->drv;
6003	int ret;
6004
6005	if (drv->nlmode == NL80211_IFTYPE_ADHOC) {
6006		nl80211_mark_disconnected(drv);
6007		return nl80211_leave_ibss(drv);
6008	}
6009	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME))
6010		return wpa_driver_nl80211_disconnect(drv, reason_code);
6011	wpa_printf(MSG_DEBUG, "%s(addr=" MACSTR " reason_code=%d)",
6012		   __func__, MAC2STR(addr), reason_code);
6013	nl80211_mark_disconnected(drv);
6014	ret = wpa_driver_nl80211_mlme(drv, addr, NL80211_CMD_DEAUTHENTICATE,
6015				      reason_code, 0);
6016	/*
6017	 * For locally generated deauthenticate, supplicant already generates a
6018	 * DEAUTH event, so ignore the event from NL80211.
6019	 */
6020	drv->ignore_next_local_deauth = ret == 0;
6021	return ret;
6022}
6023
6024
6025static void nl80211_copy_auth_params(struct wpa_driver_nl80211_data *drv,
6026				     struct wpa_driver_auth_params *params)
6027{
6028	int i;
6029
6030	drv->auth_freq = params->freq;
6031	drv->auth_alg = params->auth_alg;
6032	drv->auth_wep_tx_keyidx = params->wep_tx_keyidx;
6033	drv->auth_local_state_change = params->local_state_change;
6034	drv->auth_p2p = params->p2p;
6035
6036	if (params->bssid)
6037		os_memcpy(drv->auth_bssid_, params->bssid, ETH_ALEN);
6038	else
6039		os_memset(drv->auth_bssid_, 0, ETH_ALEN);
6040
6041	if (params->ssid) {
6042		os_memcpy(drv->auth_ssid, params->ssid, params->ssid_len);
6043		drv->auth_ssid_len = params->ssid_len;
6044	} else
6045		drv->auth_ssid_len = 0;
6046
6047
6048	os_free(drv->auth_ie);
6049	drv->auth_ie = NULL;
6050	drv->auth_ie_len = 0;
6051	if (params->ie) {
6052		drv->auth_ie = os_malloc(params->ie_len);
6053		if (drv->auth_ie) {
6054			os_memcpy(drv->auth_ie, params->ie, params->ie_len);
6055			drv->auth_ie_len = params->ie_len;
6056		}
6057	}
6058
6059	for (i = 0; i < 4; i++) {
6060		if (params->wep_key[i] && params->wep_key_len[i] &&
6061		    params->wep_key_len[i] <= 16) {
6062			os_memcpy(drv->auth_wep_key[i], params->wep_key[i],
6063				  params->wep_key_len[i]);
6064			drv->auth_wep_key_len[i] = params->wep_key_len[i];
6065		} else
6066			drv->auth_wep_key_len[i] = 0;
6067	}
6068}
6069
6070
6071static int wpa_driver_nl80211_authenticate(
6072	struct i802_bss *bss, struct wpa_driver_auth_params *params)
6073{
6074	struct wpa_driver_nl80211_data *drv = bss->drv;
6075	int ret = -1, i;
6076	struct nl_msg *msg;
6077	enum nl80211_auth_type type;
6078	enum nl80211_iftype nlmode;
6079	int count = 0;
6080	int is_retry;
6081
6082	is_retry = drv->retry_auth;
6083	drv->retry_auth = 0;
6084	drv->ignore_deauth_event = 0;
6085
6086	nl80211_mark_disconnected(drv);
6087	os_memset(drv->auth_bssid, 0, ETH_ALEN);
6088	if (params->bssid)
6089		os_memcpy(drv->auth_attempt_bssid, params->bssid, ETH_ALEN);
6090	else
6091		os_memset(drv->auth_attempt_bssid, 0, ETH_ALEN);
6092	/* FIX: IBSS mode */
6093	nlmode = params->p2p ?
6094		NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
6095	if (drv->nlmode != nlmode &&
6096	    wpa_driver_nl80211_set_mode(bss, nlmode) < 0)
6097		return -1;
6098
6099retry:
6100	msg = nlmsg_alloc();
6101	if (!msg)
6102		return -1;
6103
6104	wpa_printf(MSG_DEBUG, "nl80211: Authenticate (ifindex=%d)",
6105		   drv->ifindex);
6106
6107	nl80211_cmd(drv, msg, 0, NL80211_CMD_AUTHENTICATE);
6108
6109	for (i = 0; i < 4; i++) {
6110		if (!params->wep_key[i])
6111			continue;
6112		wpa_driver_nl80211_set_key(bss->ifname, bss, WPA_ALG_WEP,
6113					   NULL, i,
6114					   i == params->wep_tx_keyidx, NULL, 0,
6115					   params->wep_key[i],
6116					   params->wep_key_len[i]);
6117		if (params->wep_tx_keyidx != i)
6118			continue;
6119		if (nl_add_key(msg, WPA_ALG_WEP, i, 1, NULL, 0,
6120			       params->wep_key[i], params->wep_key_len[i])) {
6121			nlmsg_free(msg);
6122			return -1;
6123		}
6124	}
6125
6126	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
6127	if (params->bssid) {
6128		wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
6129			   MAC2STR(params->bssid));
6130		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
6131	}
6132	if (params->freq) {
6133		wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
6134		NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
6135	}
6136	if (params->ssid) {
6137		wpa_hexdump_ascii(MSG_DEBUG, "  * SSID",
6138				  params->ssid, params->ssid_len);
6139		NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
6140			params->ssid);
6141	}
6142	wpa_hexdump(MSG_DEBUG, "  * IEs", params->ie, params->ie_len);
6143	if (params->ie)
6144		NLA_PUT(msg, NL80211_ATTR_IE, params->ie_len, params->ie);
6145	if (params->sae_data) {
6146		wpa_hexdump(MSG_DEBUG, "  * SAE data", params->sae_data,
6147			    params->sae_data_len);
6148		NLA_PUT(msg, NL80211_ATTR_SAE_DATA, params->sae_data_len,
6149			params->sae_data);
6150	}
6151	if (params->auth_alg & WPA_AUTH_ALG_OPEN)
6152		type = NL80211_AUTHTYPE_OPEN_SYSTEM;
6153	else if (params->auth_alg & WPA_AUTH_ALG_SHARED)
6154		type = NL80211_AUTHTYPE_SHARED_KEY;
6155	else if (params->auth_alg & WPA_AUTH_ALG_LEAP)
6156		type = NL80211_AUTHTYPE_NETWORK_EAP;
6157	else if (params->auth_alg & WPA_AUTH_ALG_FT)
6158		type = NL80211_AUTHTYPE_FT;
6159	else if (params->auth_alg & WPA_AUTH_ALG_SAE)
6160		type = NL80211_AUTHTYPE_SAE;
6161	else
6162		goto nla_put_failure;
6163	wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
6164	NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE, type);
6165	if (params->local_state_change) {
6166		wpa_printf(MSG_DEBUG, "  * Local state change only");
6167		NLA_PUT_FLAG(msg, NL80211_ATTR_LOCAL_STATE_CHANGE);
6168	}
6169
6170	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
6171	msg = NULL;
6172	if (ret) {
6173		wpa_dbg(drv->ctx, MSG_DEBUG,
6174			"nl80211: MLME command failed (auth): ret=%d (%s)",
6175			ret, strerror(-ret));
6176		count++;
6177		if (ret == -EALREADY && count == 1 && params->bssid &&
6178		    !params->local_state_change) {
6179			/*
6180			 * mac80211 does not currently accept new
6181			 * authentication if we are already authenticated. As a
6182			 * workaround, force deauthentication and try again.
6183			 */
6184			wpa_printf(MSG_DEBUG, "nl80211: Retry authentication "
6185				   "after forced deauthentication");
6186			drv->ignore_deauth_event = 1;
6187			wpa_driver_nl80211_deauthenticate(
6188				bss, params->bssid,
6189				WLAN_REASON_PREV_AUTH_NOT_VALID);
6190			nlmsg_free(msg);
6191			goto retry;
6192		}
6193
6194		if (ret == -ENOENT && params->freq && !is_retry) {
6195			/*
6196			 * cfg80211 has likely expired the BSS entry even
6197			 * though it was previously available in our internal
6198			 * BSS table. To recover quickly, start a single
6199			 * channel scan on the specified channel.
6200			 */
6201			struct wpa_driver_scan_params scan;
6202			int freqs[2];
6203
6204			os_memset(&scan, 0, sizeof(scan));
6205			scan.num_ssids = 1;
6206			if (params->ssid) {
6207				scan.ssids[0].ssid = params->ssid;
6208				scan.ssids[0].ssid_len = params->ssid_len;
6209			}
6210			freqs[0] = params->freq;
6211			freqs[1] = 0;
6212			scan.freqs = freqs;
6213			wpa_printf(MSG_DEBUG, "nl80211: Trigger single "
6214				   "channel scan to refresh cfg80211 BSS "
6215				   "entry");
6216			ret = wpa_driver_nl80211_scan(bss, &scan);
6217			if (ret == 0) {
6218				nl80211_copy_auth_params(drv, params);
6219				drv->scan_for_auth = 1;
6220			}
6221		} else if (is_retry) {
6222			/*
6223			 * Need to indicate this with an event since the return
6224			 * value from the retry is not delivered to core code.
6225			 */
6226			union wpa_event_data event;
6227			wpa_printf(MSG_DEBUG, "nl80211: Authentication retry "
6228				   "failed");
6229			os_memset(&event, 0, sizeof(event));
6230			os_memcpy(event.timeout_event.addr, drv->auth_bssid_,
6231				  ETH_ALEN);
6232			wpa_supplicant_event(drv->ctx, EVENT_AUTH_TIMED_OUT,
6233					     &event);
6234		}
6235
6236		goto nla_put_failure;
6237	}
6238	ret = 0;
6239	wpa_printf(MSG_DEBUG, "nl80211: Authentication request send "
6240		   "successfully");
6241
6242nla_put_failure:
6243	nlmsg_free(msg);
6244	return ret;
6245}
6246
6247
6248static int wpa_driver_nl80211_authenticate_retry(
6249	struct wpa_driver_nl80211_data *drv)
6250{
6251	struct wpa_driver_auth_params params;
6252	struct i802_bss *bss = drv->first_bss;
6253	int i;
6254
6255	wpa_printf(MSG_DEBUG, "nl80211: Try to authenticate again");
6256
6257	os_memset(&params, 0, sizeof(params));
6258	params.freq = drv->auth_freq;
6259	params.auth_alg = drv->auth_alg;
6260	params.wep_tx_keyidx = drv->auth_wep_tx_keyidx;
6261	params.local_state_change = drv->auth_local_state_change;
6262	params.p2p = drv->auth_p2p;
6263
6264	if (!is_zero_ether_addr(drv->auth_bssid_))
6265		params.bssid = drv->auth_bssid_;
6266
6267	if (drv->auth_ssid_len) {
6268		params.ssid = drv->auth_ssid;
6269		params.ssid_len = drv->auth_ssid_len;
6270	}
6271
6272	params.ie = drv->auth_ie;
6273	params.ie_len = drv->auth_ie_len;
6274
6275	for (i = 0; i < 4; i++) {
6276		if (drv->auth_wep_key_len[i]) {
6277			params.wep_key[i] = drv->auth_wep_key[i];
6278			params.wep_key_len[i] = drv->auth_wep_key_len[i];
6279		}
6280	}
6281
6282	drv->retry_auth = 1;
6283	return wpa_driver_nl80211_authenticate(bss, &params);
6284}
6285
6286
6287struct phy_info_arg {
6288	u16 *num_modes;
6289	struct hostapd_hw_modes *modes;
6290	int last_mode, last_chan_idx;
6291};
6292
6293static void phy_info_ht_capa(struct hostapd_hw_modes *mode, struct nlattr *capa,
6294			     struct nlattr *ampdu_factor,
6295			     struct nlattr *ampdu_density,
6296			     struct nlattr *mcs_set)
6297{
6298	if (capa)
6299		mode->ht_capab = nla_get_u16(capa);
6300
6301	if (ampdu_factor)
6302		mode->a_mpdu_params |= nla_get_u8(ampdu_factor) & 0x03;
6303
6304	if (ampdu_density)
6305		mode->a_mpdu_params |= nla_get_u8(ampdu_density) << 2;
6306
6307	if (mcs_set && nla_len(mcs_set) >= 16) {
6308		u8 *mcs;
6309		mcs = nla_data(mcs_set);
6310		os_memcpy(mode->mcs_set, mcs, 16);
6311	}
6312}
6313
6314
6315static void phy_info_vht_capa(struct hostapd_hw_modes *mode,
6316			      struct nlattr *capa,
6317			      struct nlattr *mcs_set)
6318{
6319	if (capa)
6320		mode->vht_capab = nla_get_u32(capa);
6321
6322	if (mcs_set && nla_len(mcs_set) >= 8) {
6323		u8 *mcs;
6324		mcs = nla_data(mcs_set);
6325		os_memcpy(mode->vht_mcs_set, mcs, 8);
6326	}
6327}
6328
6329
6330static void phy_info_freq(struct hostapd_hw_modes *mode,
6331			  struct hostapd_channel_data *chan,
6332			  struct nlattr *tb_freq[])
6333{
6334	u8 channel;
6335	chan->freq = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_FREQ]);
6336	chan->flag = 0;
6337	chan->dfs_cac_ms = 0;
6338	if (ieee80211_freq_to_chan(chan->freq, &channel) != NUM_HOSTAPD_MODES)
6339		chan->chan = channel;
6340
6341	if (tb_freq[NL80211_FREQUENCY_ATTR_DISABLED])
6342		chan->flag |= HOSTAPD_CHAN_DISABLED;
6343	if (tb_freq[NL80211_FREQUENCY_ATTR_NO_IR])
6344		chan->flag |= HOSTAPD_CHAN_PASSIVE_SCAN | HOSTAPD_CHAN_NO_IBSS;
6345	if (tb_freq[NL80211_FREQUENCY_ATTR_RADAR])
6346		chan->flag |= HOSTAPD_CHAN_RADAR;
6347
6348	if (tb_freq[NL80211_FREQUENCY_ATTR_DFS_STATE]) {
6349		enum nl80211_dfs_state state =
6350			nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_DFS_STATE]);
6351
6352		switch (state) {
6353		case NL80211_DFS_USABLE:
6354			chan->flag |= HOSTAPD_CHAN_DFS_USABLE;
6355			break;
6356		case NL80211_DFS_AVAILABLE:
6357			chan->flag |= HOSTAPD_CHAN_DFS_AVAILABLE;
6358			break;
6359		case NL80211_DFS_UNAVAILABLE:
6360			chan->flag |= HOSTAPD_CHAN_DFS_UNAVAILABLE;
6361			break;
6362		}
6363	}
6364
6365	if (tb_freq[NL80211_FREQUENCY_ATTR_DFS_CAC_TIME]) {
6366		chan->dfs_cac_ms = nla_get_u32(
6367			tb_freq[NL80211_FREQUENCY_ATTR_DFS_CAC_TIME]);
6368	}
6369}
6370
6371
6372static int phy_info_freqs(struct phy_info_arg *phy_info,
6373			  struct hostapd_hw_modes *mode, struct nlattr *tb)
6374{
6375	static struct nla_policy freq_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
6376		[NL80211_FREQUENCY_ATTR_FREQ] = { .type = NLA_U32 },
6377		[NL80211_FREQUENCY_ATTR_DISABLED] = { .type = NLA_FLAG },
6378		[NL80211_FREQUENCY_ATTR_NO_IR] = { .type = NLA_FLAG },
6379		[NL80211_FREQUENCY_ATTR_RADAR] = { .type = NLA_FLAG },
6380		[NL80211_FREQUENCY_ATTR_MAX_TX_POWER] = { .type = NLA_U32 },
6381		[NL80211_FREQUENCY_ATTR_DFS_STATE] = { .type = NLA_U32 },
6382	};
6383	int new_channels = 0;
6384	struct hostapd_channel_data *channel;
6385	struct nlattr *tb_freq[NL80211_FREQUENCY_ATTR_MAX + 1];
6386	struct nlattr *nl_freq;
6387	int rem_freq, idx;
6388
6389	if (tb == NULL)
6390		return NL_OK;
6391
6392	nla_for_each_nested(nl_freq, tb, rem_freq) {
6393		nla_parse(tb_freq, NL80211_FREQUENCY_ATTR_MAX,
6394			  nla_data(nl_freq), nla_len(nl_freq), freq_policy);
6395		if (!tb_freq[NL80211_FREQUENCY_ATTR_FREQ])
6396			continue;
6397		new_channels++;
6398	}
6399
6400	channel = os_realloc_array(mode->channels,
6401				   mode->num_channels + new_channels,
6402				   sizeof(struct hostapd_channel_data));
6403	if (!channel)
6404		return NL_SKIP;
6405
6406	mode->channels = channel;
6407	mode->num_channels += new_channels;
6408
6409	idx = phy_info->last_chan_idx;
6410
6411	nla_for_each_nested(nl_freq, tb, rem_freq) {
6412		nla_parse(tb_freq, NL80211_FREQUENCY_ATTR_MAX,
6413			  nla_data(nl_freq), nla_len(nl_freq), freq_policy);
6414		if (!tb_freq[NL80211_FREQUENCY_ATTR_FREQ])
6415			continue;
6416		phy_info_freq(mode, &mode->channels[idx], tb_freq);
6417		idx++;
6418	}
6419	phy_info->last_chan_idx = idx;
6420
6421	return NL_OK;
6422}
6423
6424
6425static int phy_info_rates(struct hostapd_hw_modes *mode, struct nlattr *tb)
6426{
6427	static struct nla_policy rate_policy[NL80211_BITRATE_ATTR_MAX + 1] = {
6428		[NL80211_BITRATE_ATTR_RATE] = { .type = NLA_U32 },
6429		[NL80211_BITRATE_ATTR_2GHZ_SHORTPREAMBLE] =
6430		{ .type = NLA_FLAG },
6431	};
6432	struct nlattr *tb_rate[NL80211_BITRATE_ATTR_MAX + 1];
6433	struct nlattr *nl_rate;
6434	int rem_rate, idx;
6435
6436	if (tb == NULL)
6437		return NL_OK;
6438
6439	nla_for_each_nested(nl_rate, tb, rem_rate) {
6440		nla_parse(tb_rate, NL80211_BITRATE_ATTR_MAX,
6441			  nla_data(nl_rate), nla_len(nl_rate),
6442			  rate_policy);
6443		if (!tb_rate[NL80211_BITRATE_ATTR_RATE])
6444			continue;
6445		mode->num_rates++;
6446	}
6447
6448	mode->rates = os_calloc(mode->num_rates, sizeof(int));
6449	if (!mode->rates)
6450		return NL_SKIP;
6451
6452	idx = 0;
6453
6454	nla_for_each_nested(nl_rate, tb, rem_rate) {
6455		nla_parse(tb_rate, NL80211_BITRATE_ATTR_MAX,
6456			  nla_data(nl_rate), nla_len(nl_rate),
6457			  rate_policy);
6458		if (!tb_rate[NL80211_BITRATE_ATTR_RATE])
6459			continue;
6460		mode->rates[idx] = nla_get_u32(
6461			tb_rate[NL80211_BITRATE_ATTR_RATE]);
6462		idx++;
6463	}
6464
6465	return NL_OK;
6466}
6467
6468
6469static int phy_info_band(struct phy_info_arg *phy_info, struct nlattr *nl_band)
6470{
6471	struct nlattr *tb_band[NL80211_BAND_ATTR_MAX + 1];
6472	struct hostapd_hw_modes *mode;
6473	int ret;
6474
6475	if (phy_info->last_mode != nl_band->nla_type) {
6476		mode = os_realloc_array(phy_info->modes,
6477					*phy_info->num_modes + 1,
6478					sizeof(*mode));
6479		if (!mode)
6480			return NL_SKIP;
6481		phy_info->modes = mode;
6482
6483		mode = &phy_info->modes[*(phy_info->num_modes)];
6484		os_memset(mode, 0, sizeof(*mode));
6485		mode->mode = NUM_HOSTAPD_MODES;
6486		mode->flags = HOSTAPD_MODE_FLAG_HT_INFO_KNOWN |
6487			HOSTAPD_MODE_FLAG_VHT_INFO_KNOWN;
6488
6489		/*
6490		 * Unsupported VHT MCS stream is defined as value 3, so the VHT
6491		 * MCS RX/TX map must be initialized with 0xffff to mark all 8
6492		 * possible streams as unsupported. This will be overridden if
6493		 * driver advertises VHT support.
6494		 */
6495		mode->vht_mcs_set[0] = 0xff;
6496		mode->vht_mcs_set[1] = 0xff;
6497		mode->vht_mcs_set[4] = 0xff;
6498		mode->vht_mcs_set[5] = 0xff;
6499
6500		*(phy_info->num_modes) += 1;
6501		phy_info->last_mode = nl_band->nla_type;
6502		phy_info->last_chan_idx = 0;
6503	} else
6504		mode = &phy_info->modes[*(phy_info->num_modes) - 1];
6505
6506	nla_parse(tb_band, NL80211_BAND_ATTR_MAX, nla_data(nl_band),
6507		  nla_len(nl_band), NULL);
6508
6509	phy_info_ht_capa(mode, tb_band[NL80211_BAND_ATTR_HT_CAPA],
6510			 tb_band[NL80211_BAND_ATTR_HT_AMPDU_FACTOR],
6511			 tb_band[NL80211_BAND_ATTR_HT_AMPDU_DENSITY],
6512			 tb_band[NL80211_BAND_ATTR_HT_MCS_SET]);
6513	phy_info_vht_capa(mode, tb_band[NL80211_BAND_ATTR_VHT_CAPA],
6514			  tb_band[NL80211_BAND_ATTR_VHT_MCS_SET]);
6515	ret = phy_info_freqs(phy_info, mode, tb_band[NL80211_BAND_ATTR_FREQS]);
6516	if (ret != NL_OK)
6517		return ret;
6518	ret = phy_info_rates(mode, tb_band[NL80211_BAND_ATTR_RATES]);
6519	if (ret != NL_OK)
6520		return ret;
6521
6522	return NL_OK;
6523}
6524
6525
6526static int phy_info_handler(struct nl_msg *msg, void *arg)
6527{
6528	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
6529	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
6530	struct phy_info_arg *phy_info = arg;
6531	struct nlattr *nl_band;
6532	int rem_band;
6533
6534	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
6535		  genlmsg_attrlen(gnlh, 0), NULL);
6536
6537	if (!tb_msg[NL80211_ATTR_WIPHY_BANDS])
6538		return NL_SKIP;
6539
6540	nla_for_each_nested(nl_band, tb_msg[NL80211_ATTR_WIPHY_BANDS], rem_band)
6541	{
6542		int res = phy_info_band(phy_info, nl_band);
6543		if (res != NL_OK)
6544			return res;
6545	}
6546
6547	return NL_SKIP;
6548}
6549
6550
6551static struct hostapd_hw_modes *
6552wpa_driver_nl80211_postprocess_modes(struct hostapd_hw_modes *modes,
6553				     u16 *num_modes)
6554{
6555	u16 m;
6556	struct hostapd_hw_modes *mode11g = NULL, *nmodes, *mode;
6557	int i, mode11g_idx = -1;
6558
6559	/* heuristic to set up modes */
6560	for (m = 0; m < *num_modes; m++) {
6561		if (!modes[m].num_channels)
6562			continue;
6563		if (modes[m].channels[0].freq < 4000) {
6564			modes[m].mode = HOSTAPD_MODE_IEEE80211B;
6565			for (i = 0; i < modes[m].num_rates; i++) {
6566				if (modes[m].rates[i] > 200) {
6567					modes[m].mode = HOSTAPD_MODE_IEEE80211G;
6568					break;
6569				}
6570			}
6571		} else if (modes[m].channels[0].freq > 50000)
6572			modes[m].mode = HOSTAPD_MODE_IEEE80211AD;
6573		else
6574			modes[m].mode = HOSTAPD_MODE_IEEE80211A;
6575	}
6576
6577	/* If only 802.11g mode is included, use it to construct matching
6578	 * 802.11b mode data. */
6579
6580	for (m = 0; m < *num_modes; m++) {
6581		if (modes[m].mode == HOSTAPD_MODE_IEEE80211B)
6582			return modes; /* 802.11b already included */
6583		if (modes[m].mode == HOSTAPD_MODE_IEEE80211G)
6584			mode11g_idx = m;
6585	}
6586
6587	if (mode11g_idx < 0)
6588		return modes; /* 2.4 GHz band not supported at all */
6589
6590	nmodes = os_realloc_array(modes, *num_modes + 1, sizeof(*nmodes));
6591	if (nmodes == NULL)
6592		return modes; /* Could not add 802.11b mode */
6593
6594	mode = &nmodes[*num_modes];
6595	os_memset(mode, 0, sizeof(*mode));
6596	(*num_modes)++;
6597	modes = nmodes;
6598
6599	mode->mode = HOSTAPD_MODE_IEEE80211B;
6600
6601	mode11g = &modes[mode11g_idx];
6602	mode->num_channels = mode11g->num_channels;
6603	mode->channels = os_malloc(mode11g->num_channels *
6604				   sizeof(struct hostapd_channel_data));
6605	if (mode->channels == NULL) {
6606		(*num_modes)--;
6607		return modes; /* Could not add 802.11b mode */
6608	}
6609	os_memcpy(mode->channels, mode11g->channels,
6610		  mode11g->num_channels * sizeof(struct hostapd_channel_data));
6611
6612	mode->num_rates = 0;
6613	mode->rates = os_malloc(4 * sizeof(int));
6614	if (mode->rates == NULL) {
6615		os_free(mode->channels);
6616		(*num_modes)--;
6617		return modes; /* Could not add 802.11b mode */
6618	}
6619
6620	for (i = 0; i < mode11g->num_rates; i++) {
6621		if (mode11g->rates[i] != 10 && mode11g->rates[i] != 20 &&
6622		    mode11g->rates[i] != 55 && mode11g->rates[i] != 110)
6623			continue;
6624		mode->rates[mode->num_rates] = mode11g->rates[i];
6625		mode->num_rates++;
6626		if (mode->num_rates == 4)
6627			break;
6628	}
6629
6630	if (mode->num_rates == 0) {
6631		os_free(mode->channels);
6632		os_free(mode->rates);
6633		(*num_modes)--;
6634		return modes; /* No 802.11b rates */
6635	}
6636
6637	wpa_printf(MSG_DEBUG, "nl80211: Added 802.11b mode based on 802.11g "
6638		   "information");
6639
6640	return modes;
6641}
6642
6643
6644static void nl80211_set_ht40_mode(struct hostapd_hw_modes *mode, int start,
6645				  int end)
6646{
6647	int c;
6648
6649	for (c = 0; c < mode->num_channels; c++) {
6650		struct hostapd_channel_data *chan = &mode->channels[c];
6651		if (chan->freq - 10 >= start && chan->freq + 10 <= end)
6652			chan->flag |= HOSTAPD_CHAN_HT40;
6653	}
6654}
6655
6656
6657static void nl80211_set_ht40_mode_sec(struct hostapd_hw_modes *mode, int start,
6658				      int end)
6659{
6660	int c;
6661
6662	for (c = 0; c < mode->num_channels; c++) {
6663		struct hostapd_channel_data *chan = &mode->channels[c];
6664		if (!(chan->flag & HOSTAPD_CHAN_HT40))
6665			continue;
6666		if (chan->freq - 30 >= start && chan->freq - 10 <= end)
6667			chan->flag |= HOSTAPD_CHAN_HT40MINUS;
6668		if (chan->freq + 10 >= start && chan->freq + 30 <= end)
6669			chan->flag |= HOSTAPD_CHAN_HT40PLUS;
6670	}
6671}
6672
6673
6674static void nl80211_reg_rule_max_eirp(u32 start, u32 end, u32 max_eirp,
6675				      struct phy_info_arg *results)
6676{
6677	u16 m;
6678
6679	for (m = 0; m < *results->num_modes; m++) {
6680		int c;
6681		struct hostapd_hw_modes *mode = &results->modes[m];
6682
6683		for (c = 0; c < mode->num_channels; c++) {
6684			struct hostapd_channel_data *chan = &mode->channels[c];
6685			if ((u32) chan->freq - 10 >= start &&
6686			    (u32) chan->freq + 10 <= end)
6687				chan->max_tx_power = max_eirp;
6688		}
6689	}
6690}
6691
6692
6693static void nl80211_reg_rule_ht40(u32 start, u32 end,
6694				  struct phy_info_arg *results)
6695{
6696	u16 m;
6697
6698	for (m = 0; m < *results->num_modes; m++) {
6699		if (!(results->modes[m].ht_capab &
6700		      HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
6701			continue;
6702		nl80211_set_ht40_mode(&results->modes[m], start, end);
6703	}
6704}
6705
6706
6707static void nl80211_reg_rule_sec(struct nlattr *tb[],
6708				 struct phy_info_arg *results)
6709{
6710	u32 start, end, max_bw;
6711	u16 m;
6712
6713	if (tb[NL80211_ATTR_FREQ_RANGE_START] == NULL ||
6714	    tb[NL80211_ATTR_FREQ_RANGE_END] == NULL ||
6715	    tb[NL80211_ATTR_FREQ_RANGE_MAX_BW] == NULL)
6716		return;
6717
6718	start = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_START]) / 1000;
6719	end = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_END]) / 1000;
6720	max_bw = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_MAX_BW]) / 1000;
6721
6722	if (max_bw < 20)
6723		return;
6724
6725	for (m = 0; m < *results->num_modes; m++) {
6726		if (!(results->modes[m].ht_capab &
6727		      HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
6728			continue;
6729		nl80211_set_ht40_mode_sec(&results->modes[m], start, end);
6730	}
6731}
6732
6733
6734static void nl80211_set_vht_mode(struct hostapd_hw_modes *mode, int start,
6735				 int end)
6736{
6737	int c;
6738
6739	for (c = 0; c < mode->num_channels; c++) {
6740		struct hostapd_channel_data *chan = &mode->channels[c];
6741		if (chan->freq - 10 >= start && chan->freq + 70 <= end)
6742			chan->flag |= HOSTAPD_CHAN_VHT_10_70;
6743
6744		if (chan->freq - 30 >= start && chan->freq + 50 <= end)
6745			chan->flag |= HOSTAPD_CHAN_VHT_30_50;
6746
6747		if (chan->freq - 50 >= start && chan->freq + 30 <= end)
6748			chan->flag |= HOSTAPD_CHAN_VHT_50_30;
6749
6750		if (chan->freq - 70 >= start && chan->freq + 10 <= end)
6751			chan->flag |= HOSTAPD_CHAN_VHT_70_10;
6752	}
6753}
6754
6755
6756static void nl80211_reg_rule_vht(struct nlattr *tb[],
6757				 struct phy_info_arg *results)
6758{
6759	u32 start, end, max_bw;
6760	u16 m;
6761
6762	if (tb[NL80211_ATTR_FREQ_RANGE_START] == NULL ||
6763	    tb[NL80211_ATTR_FREQ_RANGE_END] == NULL ||
6764	    tb[NL80211_ATTR_FREQ_RANGE_MAX_BW] == NULL)
6765		return;
6766
6767	start = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_START]) / 1000;
6768	end = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_END]) / 1000;
6769	max_bw = nla_get_u32(tb[NL80211_ATTR_FREQ_RANGE_MAX_BW]) / 1000;
6770
6771	if (max_bw < 80)
6772		return;
6773
6774	for (m = 0; m < *results->num_modes; m++) {
6775		if (!(results->modes[m].ht_capab &
6776		      HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
6777			continue;
6778		/* TODO: use a real VHT support indication */
6779		if (!results->modes[m].vht_capab)
6780			continue;
6781
6782		nl80211_set_vht_mode(&results->modes[m], start, end);
6783	}
6784}
6785
6786
6787static const char * dfs_domain_name(enum nl80211_dfs_regions region)
6788{
6789	switch (region) {
6790	case NL80211_DFS_UNSET:
6791		return "DFS-UNSET";
6792	case NL80211_DFS_FCC:
6793		return "DFS-FCC";
6794	case NL80211_DFS_ETSI:
6795		return "DFS-ETSI";
6796	case NL80211_DFS_JP:
6797		return "DFS-JP";
6798	default:
6799		return "DFS-invalid";
6800	}
6801}
6802
6803
6804static int nl80211_get_reg(struct nl_msg *msg, void *arg)
6805{
6806	struct phy_info_arg *results = arg;
6807	struct nlattr *tb_msg[NL80211_ATTR_MAX + 1];
6808	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
6809	struct nlattr *nl_rule;
6810	struct nlattr *tb_rule[NL80211_FREQUENCY_ATTR_MAX + 1];
6811	int rem_rule;
6812	static struct nla_policy reg_policy[NL80211_FREQUENCY_ATTR_MAX + 1] = {
6813		[NL80211_ATTR_REG_RULE_FLAGS] = { .type = NLA_U32 },
6814		[NL80211_ATTR_FREQ_RANGE_START] = { .type = NLA_U32 },
6815		[NL80211_ATTR_FREQ_RANGE_END] = { .type = NLA_U32 },
6816		[NL80211_ATTR_FREQ_RANGE_MAX_BW] = { .type = NLA_U32 },
6817		[NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN] = { .type = NLA_U32 },
6818		[NL80211_ATTR_POWER_RULE_MAX_EIRP] = { .type = NLA_U32 },
6819	};
6820
6821	nla_parse(tb_msg, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
6822		  genlmsg_attrlen(gnlh, 0), NULL);
6823	if (!tb_msg[NL80211_ATTR_REG_ALPHA2] ||
6824	    !tb_msg[NL80211_ATTR_REG_RULES]) {
6825		wpa_printf(MSG_DEBUG, "nl80211: No regulatory information "
6826			   "available");
6827		return NL_SKIP;
6828	}
6829
6830	if (tb_msg[NL80211_ATTR_DFS_REGION]) {
6831		enum nl80211_dfs_regions dfs_domain;
6832		dfs_domain = nla_get_u8(tb_msg[NL80211_ATTR_DFS_REGION]);
6833		wpa_printf(MSG_DEBUG, "nl80211: Regulatory information - country=%s (%s)",
6834			   (char *) nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]),
6835			   dfs_domain_name(dfs_domain));
6836	} else {
6837		wpa_printf(MSG_DEBUG, "nl80211: Regulatory information - country=%s",
6838			   (char *) nla_data(tb_msg[NL80211_ATTR_REG_ALPHA2]));
6839	}
6840
6841	nla_for_each_nested(nl_rule, tb_msg[NL80211_ATTR_REG_RULES], rem_rule)
6842	{
6843		u32 start, end, max_eirp = 0, max_bw = 0, flags = 0;
6844		nla_parse(tb_rule, NL80211_FREQUENCY_ATTR_MAX,
6845			  nla_data(nl_rule), nla_len(nl_rule), reg_policy);
6846		if (tb_rule[NL80211_ATTR_FREQ_RANGE_START] == NULL ||
6847		    tb_rule[NL80211_ATTR_FREQ_RANGE_END] == NULL)
6848			continue;
6849		start = nla_get_u32(tb_rule[NL80211_ATTR_FREQ_RANGE_START]) / 1000;
6850		end = nla_get_u32(tb_rule[NL80211_ATTR_FREQ_RANGE_END]) / 1000;
6851		if (tb_rule[NL80211_ATTR_POWER_RULE_MAX_EIRP])
6852			max_eirp = nla_get_u32(tb_rule[NL80211_ATTR_POWER_RULE_MAX_EIRP]) / 100;
6853		if (tb_rule[NL80211_ATTR_FREQ_RANGE_MAX_BW])
6854			max_bw = nla_get_u32(tb_rule[NL80211_ATTR_FREQ_RANGE_MAX_BW]) / 1000;
6855		if (tb_rule[NL80211_ATTR_REG_RULE_FLAGS])
6856			flags = nla_get_u32(tb_rule[NL80211_ATTR_REG_RULE_FLAGS]);
6857
6858		wpa_printf(MSG_DEBUG, "nl80211: %u-%u @ %u MHz %u mBm%s%s%s%s%s%s%s%s",
6859			   start, end, max_bw, max_eirp,
6860			   flags & NL80211_RRF_NO_OFDM ? " (no OFDM)" : "",
6861			   flags & NL80211_RRF_NO_CCK ? " (no CCK)" : "",
6862			   flags & NL80211_RRF_NO_INDOOR ? " (no indoor)" : "",
6863			   flags & NL80211_RRF_NO_OUTDOOR ? " (no outdoor)" :
6864			   "",
6865			   flags & NL80211_RRF_DFS ? " (DFS)" : "",
6866			   flags & NL80211_RRF_PTP_ONLY ? " (PTP only)" : "",
6867			   flags & NL80211_RRF_PTMP_ONLY ? " (PTMP only)" : "",
6868			   flags & NL80211_RRF_NO_IR ? " (no IR)" : "");
6869		if (max_bw >= 40)
6870			nl80211_reg_rule_ht40(start, end, results);
6871		if (tb_rule[NL80211_ATTR_POWER_RULE_MAX_EIRP])
6872			nl80211_reg_rule_max_eirp(start, end, max_eirp,
6873						  results);
6874	}
6875
6876	nla_for_each_nested(nl_rule, tb_msg[NL80211_ATTR_REG_RULES], rem_rule)
6877	{
6878		nla_parse(tb_rule, NL80211_FREQUENCY_ATTR_MAX,
6879			  nla_data(nl_rule), nla_len(nl_rule), reg_policy);
6880		nl80211_reg_rule_sec(tb_rule, results);
6881	}
6882
6883	nla_for_each_nested(nl_rule, tb_msg[NL80211_ATTR_REG_RULES], rem_rule)
6884	{
6885		nla_parse(tb_rule, NL80211_FREQUENCY_ATTR_MAX,
6886			  nla_data(nl_rule), nla_len(nl_rule), reg_policy);
6887		nl80211_reg_rule_vht(tb_rule, results);
6888	}
6889
6890	return NL_SKIP;
6891}
6892
6893
6894static int nl80211_set_regulatory_flags(struct wpa_driver_nl80211_data *drv,
6895					struct phy_info_arg *results)
6896{
6897	struct nl_msg *msg;
6898
6899	msg = nlmsg_alloc();
6900	if (!msg)
6901		return -ENOMEM;
6902
6903	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_REG);
6904	return send_and_recv_msgs(drv, msg, nl80211_get_reg, results);
6905}
6906
6907
6908static struct hostapd_hw_modes *
6909wpa_driver_nl80211_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags)
6910{
6911	u32 feat;
6912	struct i802_bss *bss = priv;
6913	struct wpa_driver_nl80211_data *drv = bss->drv;
6914	struct nl_msg *msg;
6915	struct phy_info_arg result = {
6916		.num_modes = num_modes,
6917		.modes = NULL,
6918		.last_mode = -1,
6919	};
6920
6921	*num_modes = 0;
6922	*flags = 0;
6923
6924	msg = nlmsg_alloc();
6925	if (!msg)
6926		return NULL;
6927
6928	feat = get_nl80211_protocol_features(drv);
6929	if (feat & NL80211_PROTOCOL_FEATURE_SPLIT_WIPHY_DUMP)
6930		nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_WIPHY);
6931	else
6932		nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_WIPHY);
6933
6934	NLA_PUT_FLAG(msg, NL80211_ATTR_SPLIT_WIPHY_DUMP);
6935	if (nl80211_set_iface_id(msg, bss) < 0)
6936		goto nla_put_failure;
6937
6938	if (send_and_recv_msgs(drv, msg, phy_info_handler, &result) == 0) {
6939		nl80211_set_regulatory_flags(drv, &result);
6940		return wpa_driver_nl80211_postprocess_modes(result.modes,
6941							    num_modes);
6942	}
6943	msg = NULL;
6944 nla_put_failure:
6945	nlmsg_free(msg);
6946	return NULL;
6947}
6948
6949
6950static int wpa_driver_nl80211_send_mntr(struct wpa_driver_nl80211_data *drv,
6951					const void *data, size_t len,
6952					int encrypt, int noack)
6953{
6954	__u8 rtap_hdr[] = {
6955		0x00, 0x00, /* radiotap version */
6956		0x0e, 0x00, /* radiotap length */
6957		0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
6958		IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
6959		0x00,       /* padding */
6960		0x00, 0x00, /* RX and TX flags to indicate that */
6961		0x00, 0x00, /* this is the injected frame directly */
6962	};
6963	struct iovec iov[2] = {
6964		{
6965			.iov_base = &rtap_hdr,
6966			.iov_len = sizeof(rtap_hdr),
6967		},
6968		{
6969			.iov_base = (void *) data,
6970			.iov_len = len,
6971		}
6972	};
6973	struct msghdr msg = {
6974		.msg_name = NULL,
6975		.msg_namelen = 0,
6976		.msg_iov = iov,
6977		.msg_iovlen = 2,
6978		.msg_control = NULL,
6979		.msg_controllen = 0,
6980		.msg_flags = 0,
6981	};
6982	int res;
6983	u16 txflags = 0;
6984
6985	if (encrypt)
6986		rtap_hdr[8] |= IEEE80211_RADIOTAP_F_WEP;
6987
6988	if (drv->monitor_sock < 0) {
6989		wpa_printf(MSG_DEBUG, "nl80211: No monitor socket available "
6990			   "for %s", __func__);
6991		return -1;
6992	}
6993
6994	if (noack)
6995		txflags |= IEEE80211_RADIOTAP_F_TX_NOACK;
6996	WPA_PUT_LE16(&rtap_hdr[12], txflags);
6997
6998	res = sendmsg(drv->monitor_sock, &msg, 0);
6999	if (res < 0) {
7000		wpa_printf(MSG_INFO, "nl80211: sendmsg: %s", strerror(errno));
7001		return -1;
7002	}
7003	return 0;
7004}
7005
7006
7007static int wpa_driver_nl80211_send_frame(struct i802_bss *bss,
7008					 const void *data, size_t len,
7009					 int encrypt, int noack,
7010					 unsigned int freq, int no_cck,
7011					 int offchanok, unsigned int wait_time)
7012{
7013	struct wpa_driver_nl80211_data *drv = bss->drv;
7014	u64 cookie;
7015	int res;
7016
7017	if (freq == 0 && drv->nlmode == NL80211_IFTYPE_ADHOC) {
7018		freq = nl80211_get_assoc_freq(drv);
7019		wpa_printf(MSG_DEBUG,
7020			   "nl80211: send_frame - Use assoc_freq=%u for IBSS",
7021			   freq);
7022	}
7023	if (freq == 0) {
7024		wpa_printf(MSG_DEBUG, "nl80211: send_frame - Use bss->freq=%u",
7025			   bss->freq);
7026		freq = bss->freq;
7027	}
7028
7029	if (drv->use_monitor) {
7030		wpa_printf(MSG_DEBUG, "nl80211: send_frame(freq=%u bss->freq=%u) -> send_mntr",
7031			   freq, bss->freq);
7032		return wpa_driver_nl80211_send_mntr(drv, data, len,
7033						    encrypt, noack);
7034	}
7035
7036	wpa_printf(MSG_DEBUG, "nl80211: send_frame -> send_frame_cmd");
7037	res = nl80211_send_frame_cmd(bss, freq, wait_time, data, len,
7038				     &cookie, no_cck, noack, offchanok);
7039	if (res == 0 && !noack) {
7040		const struct ieee80211_mgmt *mgmt;
7041		u16 fc;
7042
7043		mgmt = (const struct ieee80211_mgmt *) data;
7044		fc = le_to_host16(mgmt->frame_control);
7045		if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
7046		    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION) {
7047			wpa_printf(MSG_MSGDUMP,
7048				   "nl80211: Update send_action_cookie from 0x%llx to 0x%llx",
7049				   (long long unsigned int)
7050				   drv->send_action_cookie,
7051				   (long long unsigned int) cookie);
7052			drv->send_action_cookie = cookie;
7053		}
7054	}
7055
7056	return res;
7057}
7058
7059
7060static int wpa_driver_nl80211_send_mlme(struct i802_bss *bss, const u8 *data,
7061					size_t data_len, int noack,
7062					unsigned int freq, int no_cck,
7063					int offchanok,
7064					unsigned int wait_time)
7065{
7066	struct wpa_driver_nl80211_data *drv = bss->drv;
7067	struct ieee80211_mgmt *mgmt;
7068	int encrypt = 1;
7069	u16 fc;
7070
7071	mgmt = (struct ieee80211_mgmt *) data;
7072	fc = le_to_host16(mgmt->frame_control);
7073	wpa_printf(MSG_DEBUG, "nl80211: send_mlme - noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u fc=0x%x nlmode=%d",
7074		   noack, freq, no_cck, offchanok, wait_time, fc, drv->nlmode);
7075
7076	if ((is_sta_interface(drv->nlmode) ||
7077	     drv->nlmode == NL80211_IFTYPE_P2P_DEVICE) &&
7078	    WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
7079	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_RESP) {
7080		/*
7081		 * The use of last_mgmt_freq is a bit of a hack,
7082		 * but it works due to the single-threaded nature
7083		 * of wpa_supplicant.
7084		 */
7085		if (freq == 0) {
7086			wpa_printf(MSG_DEBUG, "nl80211: Use last_mgmt_freq=%d",
7087				   drv->last_mgmt_freq);
7088			freq = drv->last_mgmt_freq;
7089		}
7090		return nl80211_send_frame_cmd(bss, freq, 0,
7091					      data, data_len, NULL, 1, noack,
7092					      1);
7093	}
7094
7095	if (drv->device_ap_sme && is_ap_interface(drv->nlmode)) {
7096		if (freq == 0) {
7097			wpa_printf(MSG_DEBUG, "nl80211: Use bss->freq=%d",
7098				   bss->freq);
7099			freq = bss->freq;
7100		}
7101		return nl80211_send_frame_cmd(bss, freq,
7102					      (int) freq == bss->freq ? 0 :
7103					      wait_time,
7104					      data, data_len,
7105					      &drv->send_action_cookie,
7106					      no_cck, noack, offchanok);
7107	}
7108
7109	if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
7110	    WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_AUTH) {
7111		/*
7112		 * Only one of the authentication frame types is encrypted.
7113		 * In order for static WEP encryption to work properly (i.e.,
7114		 * to not encrypt the frame), we need to tell mac80211 about
7115		 * the frames that must not be encrypted.
7116		 */
7117		u16 auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
7118		u16 auth_trans = le_to_host16(mgmt->u.auth.auth_transaction);
7119		if (auth_alg != WLAN_AUTH_SHARED_KEY || auth_trans != 3)
7120			encrypt = 0;
7121	}
7122
7123	wpa_printf(MSG_DEBUG, "nl80211: send_mlme -> send_frame");
7124	return wpa_driver_nl80211_send_frame(bss, data, data_len, encrypt,
7125					     noack, freq, no_cck, offchanok,
7126					     wait_time);
7127}
7128
7129
7130static int nl80211_set_bss(struct i802_bss *bss, int cts, int preamble,
7131			   int slot, int ht_opmode, int ap_isolate,
7132			   int *basic_rates)
7133{
7134	struct wpa_driver_nl80211_data *drv = bss->drv;
7135	struct nl_msg *msg;
7136
7137	msg = nlmsg_alloc();
7138	if (!msg)
7139		return -ENOMEM;
7140
7141	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_BSS);
7142
7143	if (cts >= 0)
7144		NLA_PUT_U8(msg, NL80211_ATTR_BSS_CTS_PROT, cts);
7145	if (preamble >= 0)
7146		NLA_PUT_U8(msg, NL80211_ATTR_BSS_SHORT_PREAMBLE, preamble);
7147	if (slot >= 0)
7148		NLA_PUT_U8(msg, NL80211_ATTR_BSS_SHORT_SLOT_TIME, slot);
7149	if (ht_opmode >= 0)
7150		NLA_PUT_U16(msg, NL80211_ATTR_BSS_HT_OPMODE, ht_opmode);
7151	if (ap_isolate >= 0)
7152		NLA_PUT_U8(msg, NL80211_ATTR_AP_ISOLATE, ap_isolate);
7153
7154	if (basic_rates) {
7155		u8 rates[NL80211_MAX_SUPP_RATES];
7156		u8 rates_len = 0;
7157		int i;
7158
7159		for (i = 0; i < NL80211_MAX_SUPP_RATES && basic_rates[i] >= 0;
7160		     i++)
7161			rates[rates_len++] = basic_rates[i] / 5;
7162
7163		NLA_PUT(msg, NL80211_ATTR_BSS_BASIC_RATES, rates_len, rates);
7164	}
7165
7166	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
7167
7168	return send_and_recv_msgs(drv, msg, NULL, NULL);
7169 nla_put_failure:
7170	nlmsg_free(msg);
7171	return -ENOBUFS;
7172}
7173
7174
7175static int wpa_driver_nl80211_set_acl(void *priv,
7176				      struct hostapd_acl_params *params)
7177{
7178	struct i802_bss *bss = priv;
7179	struct wpa_driver_nl80211_data *drv = bss->drv;
7180	struct nl_msg *msg;
7181	struct nlattr *acl;
7182	unsigned int i;
7183	int ret = 0;
7184
7185	if (!(drv->capa.max_acl_mac_addrs))
7186		return -ENOTSUP;
7187
7188	if (params->num_mac_acl > drv->capa.max_acl_mac_addrs)
7189		return -ENOTSUP;
7190
7191	msg = nlmsg_alloc();
7192	if (!msg)
7193		return -ENOMEM;
7194
7195	wpa_printf(MSG_DEBUG, "nl80211: Set %s ACL (num_mac_acl=%u)",
7196		   params->acl_policy ? "Accept" : "Deny", params->num_mac_acl);
7197
7198	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_MAC_ACL);
7199
7200	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
7201
7202	NLA_PUT_U32(msg, NL80211_ATTR_ACL_POLICY, params->acl_policy ?
7203		    NL80211_ACL_POLICY_DENY_UNLESS_LISTED :
7204		    NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED);
7205
7206	acl = nla_nest_start(msg, NL80211_ATTR_MAC_ADDRS);
7207	if (acl == NULL)
7208		goto nla_put_failure;
7209
7210	for (i = 0; i < params->num_mac_acl; i++)
7211		NLA_PUT(msg, i + 1, ETH_ALEN, params->mac_acl[i].addr);
7212
7213	nla_nest_end(msg, acl);
7214
7215	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7216	msg = NULL;
7217	if (ret) {
7218		wpa_printf(MSG_DEBUG, "nl80211: Failed to set MAC ACL: %d (%s)",
7219			   ret, strerror(-ret));
7220	}
7221
7222nla_put_failure:
7223	nlmsg_free(msg);
7224
7225	return ret;
7226}
7227
7228
7229static int wpa_driver_nl80211_set_ap(void *priv,
7230				     struct wpa_driver_ap_params *params)
7231{
7232	struct i802_bss *bss = priv;
7233	struct wpa_driver_nl80211_data *drv = bss->drv;
7234	struct nl_msg *msg;
7235	u8 cmd = NL80211_CMD_NEW_BEACON;
7236	int ret;
7237	int beacon_set;
7238	int ifindex = if_nametoindex(bss->ifname);
7239	int num_suites;
7240	u32 suites[10], suite;
7241	u32 ver;
7242
7243	beacon_set = bss->beacon_set;
7244
7245	msg = nlmsg_alloc();
7246	if (!msg)
7247		return -ENOMEM;
7248
7249	wpa_printf(MSG_DEBUG, "nl80211: Set beacon (beacon_set=%d)",
7250		   beacon_set);
7251	if (beacon_set)
7252		cmd = NL80211_CMD_SET_BEACON;
7253
7254	nl80211_cmd(drv, msg, 0, cmd);
7255	wpa_hexdump(MSG_DEBUG, "nl80211: Beacon head",
7256		    params->head, params->head_len);
7257	NLA_PUT(msg, NL80211_ATTR_BEACON_HEAD, params->head_len, params->head);
7258	wpa_hexdump(MSG_DEBUG, "nl80211: Beacon tail",
7259		    params->tail, params->tail_len);
7260	NLA_PUT(msg, NL80211_ATTR_BEACON_TAIL, params->tail_len, params->tail);
7261	wpa_printf(MSG_DEBUG, "nl80211: ifindex=%d", ifindex);
7262	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
7263	wpa_printf(MSG_DEBUG, "nl80211: beacon_int=%d", params->beacon_int);
7264	NLA_PUT_U32(msg, NL80211_ATTR_BEACON_INTERVAL, params->beacon_int);
7265	wpa_printf(MSG_DEBUG, "nl80211: dtim_period=%d", params->dtim_period);
7266	NLA_PUT_U32(msg, NL80211_ATTR_DTIM_PERIOD, params->dtim_period);
7267	wpa_hexdump_ascii(MSG_DEBUG, "nl80211: ssid",
7268			  params->ssid, params->ssid_len);
7269	NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
7270		params->ssid);
7271	if (params->proberesp && params->proberesp_len) {
7272		wpa_hexdump(MSG_DEBUG, "nl80211: proberesp (offload)",
7273			    params->proberesp, params->proberesp_len);
7274		NLA_PUT(msg, NL80211_ATTR_PROBE_RESP, params->proberesp_len,
7275			params->proberesp);
7276	}
7277	switch (params->hide_ssid) {
7278	case NO_SSID_HIDING:
7279		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID not in use");
7280		NLA_PUT_U32(msg, NL80211_ATTR_HIDDEN_SSID,
7281			    NL80211_HIDDEN_SSID_NOT_IN_USE);
7282		break;
7283	case HIDDEN_SSID_ZERO_LEN:
7284		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero len");
7285		NLA_PUT_U32(msg, NL80211_ATTR_HIDDEN_SSID,
7286			    NL80211_HIDDEN_SSID_ZERO_LEN);
7287		break;
7288	case HIDDEN_SSID_ZERO_CONTENTS:
7289		wpa_printf(MSG_DEBUG, "nl80211: hidden SSID zero contents");
7290		NLA_PUT_U32(msg, NL80211_ATTR_HIDDEN_SSID,
7291			    NL80211_HIDDEN_SSID_ZERO_CONTENTS);
7292		break;
7293	}
7294	wpa_printf(MSG_DEBUG, "nl80211: privacy=%d", params->privacy);
7295	if (params->privacy)
7296		NLA_PUT_FLAG(msg, NL80211_ATTR_PRIVACY);
7297	wpa_printf(MSG_DEBUG, "nl80211: auth_algs=0x%x", params->auth_algs);
7298	if ((params->auth_algs & (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) ==
7299	    (WPA_AUTH_ALG_OPEN | WPA_AUTH_ALG_SHARED)) {
7300		/* Leave out the attribute */
7301	} else if (params->auth_algs & WPA_AUTH_ALG_SHARED)
7302		NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
7303			    NL80211_AUTHTYPE_SHARED_KEY);
7304	else
7305		NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE,
7306			    NL80211_AUTHTYPE_OPEN_SYSTEM);
7307
7308	wpa_printf(MSG_DEBUG, "nl80211: wpa_version=0x%x", params->wpa_version);
7309	ver = 0;
7310	if (params->wpa_version & WPA_PROTO_WPA)
7311		ver |= NL80211_WPA_VERSION_1;
7312	if (params->wpa_version & WPA_PROTO_RSN)
7313		ver |= NL80211_WPA_VERSION_2;
7314	if (ver)
7315		NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
7316
7317	wpa_printf(MSG_DEBUG, "nl80211: key_mgmt_suites=0x%x",
7318		   params->key_mgmt_suites);
7319	num_suites = 0;
7320	if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X)
7321		suites[num_suites++] = WLAN_AKM_SUITE_8021X;
7322	if (params->key_mgmt_suites & WPA_KEY_MGMT_PSK)
7323		suites[num_suites++] = WLAN_AKM_SUITE_PSK;
7324	if (num_suites) {
7325		NLA_PUT(msg, NL80211_ATTR_AKM_SUITES,
7326			num_suites * sizeof(u32), suites);
7327	}
7328
7329	if (params->key_mgmt_suites & WPA_KEY_MGMT_IEEE8021X &&
7330	    params->pairwise_ciphers & (WPA_CIPHER_WEP104 | WPA_CIPHER_WEP40))
7331		NLA_PUT_FLAG(msg, NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT);
7332
7333	wpa_printf(MSG_DEBUG, "nl80211: pairwise_ciphers=0x%x",
7334		   params->pairwise_ciphers);
7335	num_suites = wpa_cipher_to_cipher_suites(params->pairwise_ciphers,
7336						 suites, ARRAY_SIZE(suites));
7337	if (num_suites) {
7338		NLA_PUT(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE,
7339			num_suites * sizeof(u32), suites);
7340	}
7341
7342	wpa_printf(MSG_DEBUG, "nl80211: group_cipher=0x%x",
7343		   params->group_cipher);
7344	suite = wpa_cipher_to_cipher_suite(params->group_cipher);
7345	if (suite)
7346		NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, suite);
7347
7348	if (params->beacon_ies) {
7349		wpa_hexdump_buf(MSG_DEBUG, "nl80211: beacon_ies",
7350				params->beacon_ies);
7351		NLA_PUT(msg, NL80211_ATTR_IE, wpabuf_len(params->beacon_ies),
7352			wpabuf_head(params->beacon_ies));
7353	}
7354	if (params->proberesp_ies) {
7355		wpa_hexdump_buf(MSG_DEBUG, "nl80211: proberesp_ies",
7356				params->proberesp_ies);
7357		NLA_PUT(msg, NL80211_ATTR_IE_PROBE_RESP,
7358			wpabuf_len(params->proberesp_ies),
7359			wpabuf_head(params->proberesp_ies));
7360	}
7361	if (params->assocresp_ies) {
7362		wpa_hexdump_buf(MSG_DEBUG, "nl80211: assocresp_ies",
7363				params->assocresp_ies);
7364		NLA_PUT(msg, NL80211_ATTR_IE_ASSOC_RESP,
7365			wpabuf_len(params->assocresp_ies),
7366			wpabuf_head(params->assocresp_ies));
7367	}
7368
7369	if (drv->capa.flags & WPA_DRIVER_FLAGS_INACTIVITY_TIMER)  {
7370		wpa_printf(MSG_DEBUG, "nl80211: ap_max_inactivity=%d",
7371			   params->ap_max_inactivity);
7372		NLA_PUT_U16(msg, NL80211_ATTR_INACTIVITY_TIMEOUT,
7373			    params->ap_max_inactivity);
7374	}
7375
7376	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7377	if (ret) {
7378		wpa_printf(MSG_DEBUG, "nl80211: Beacon set failed: %d (%s)",
7379			   ret, strerror(-ret));
7380	} else {
7381		bss->beacon_set = 1;
7382		nl80211_set_bss(bss, params->cts_protect, params->preamble,
7383				params->short_slot_time, params->ht_opmode,
7384				params->isolate, params->basic_rates);
7385		if (beacon_set && params->freq &&
7386		    params->freq->bandwidth != bss->bandwidth) {
7387			wpa_printf(MSG_DEBUG,
7388				   "nl80211: Update BSS %s bandwidth: %d -> %d",
7389				   bss->ifname, bss->bandwidth,
7390				   params->freq->bandwidth);
7391			ret = nl80211_set_channel(bss, params->freq, 1);
7392			if (ret) {
7393				wpa_printf(MSG_DEBUG,
7394					   "nl80211: Frequency set failed: %d (%s)",
7395					   ret, strerror(-ret));
7396			} else {
7397				wpa_printf(MSG_DEBUG,
7398					   "nl80211: Frequency set succeeded for ht2040 coex");
7399				bss->bandwidth = params->freq->bandwidth;
7400			}
7401		} else if (!beacon_set) {
7402			/*
7403			 * cfg80211 updates the driver on frequence change in AP
7404			 * mode only at the point when beaconing is started, so
7405			 * set the initial value here.
7406			 */
7407			bss->bandwidth = params->freq->bandwidth;
7408		}
7409	}
7410	return ret;
7411 nla_put_failure:
7412	nlmsg_free(msg);
7413	return -ENOBUFS;
7414}
7415
7416
7417static int nl80211_put_freq_params(struct nl_msg *msg,
7418				   struct hostapd_freq_params *freq)
7419{
7420	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq);
7421	if (freq->vht_enabled) {
7422		switch (freq->bandwidth) {
7423		case 20:
7424			NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
7425				    NL80211_CHAN_WIDTH_20);
7426			break;
7427		case 40:
7428			NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
7429				    NL80211_CHAN_WIDTH_40);
7430			break;
7431		case 80:
7432			if (freq->center_freq2)
7433				NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
7434					    NL80211_CHAN_WIDTH_80P80);
7435			else
7436				NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
7437					    NL80211_CHAN_WIDTH_80);
7438			break;
7439		case 160:
7440			NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
7441				    NL80211_CHAN_WIDTH_160);
7442			break;
7443		default:
7444			return -EINVAL;
7445		}
7446		NLA_PUT_U32(msg, NL80211_ATTR_CENTER_FREQ1, freq->center_freq1);
7447		if (freq->center_freq2)
7448			NLA_PUT_U32(msg, NL80211_ATTR_CENTER_FREQ2,
7449				    freq->center_freq2);
7450	} else if (freq->ht_enabled) {
7451		switch (freq->sec_channel_offset) {
7452		case -1:
7453			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
7454				    NL80211_CHAN_HT40MINUS);
7455			break;
7456		case 1:
7457			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
7458				    NL80211_CHAN_HT40PLUS);
7459			break;
7460		default:
7461			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
7462				    NL80211_CHAN_HT20);
7463			break;
7464		}
7465	}
7466	return 0;
7467
7468nla_put_failure:
7469	return -ENOBUFS;
7470}
7471
7472
7473static int nl80211_set_channel(struct i802_bss *bss,
7474			       struct hostapd_freq_params *freq, int set_chan)
7475{
7476	struct wpa_driver_nl80211_data *drv = bss->drv;
7477	struct nl_msg *msg;
7478	int ret;
7479
7480	wpa_printf(MSG_DEBUG,
7481		   "nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
7482		   freq->freq, freq->ht_enabled, freq->vht_enabled,
7483		   freq->bandwidth, freq->center_freq1, freq->center_freq2);
7484	msg = nlmsg_alloc();
7485	if (!msg)
7486		return -1;
7487
7488	nl80211_cmd(drv, msg, 0, set_chan ? NL80211_CMD_SET_CHANNEL :
7489		    NL80211_CMD_SET_WIPHY);
7490
7491	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
7492	if (nl80211_put_freq_params(msg, freq) < 0)
7493		goto nla_put_failure;
7494
7495	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7496	msg = NULL;
7497	if (ret == 0) {
7498		bss->freq = freq->freq;
7499		return 0;
7500	}
7501	wpa_printf(MSG_DEBUG, "nl80211: Failed to set channel (freq=%d): "
7502		   "%d (%s)", freq->freq, ret, strerror(-ret));
7503nla_put_failure:
7504	nlmsg_free(msg);
7505	return -1;
7506}
7507
7508
7509static u32 sta_flags_nl80211(int flags)
7510{
7511	u32 f = 0;
7512
7513	if (flags & WPA_STA_AUTHORIZED)
7514		f |= BIT(NL80211_STA_FLAG_AUTHORIZED);
7515	if (flags & WPA_STA_WMM)
7516		f |= BIT(NL80211_STA_FLAG_WME);
7517	if (flags & WPA_STA_SHORT_PREAMBLE)
7518		f |= BIT(NL80211_STA_FLAG_SHORT_PREAMBLE);
7519	if (flags & WPA_STA_MFP)
7520		f |= BIT(NL80211_STA_FLAG_MFP);
7521	if (flags & WPA_STA_TDLS_PEER)
7522		f |= BIT(NL80211_STA_FLAG_TDLS_PEER);
7523
7524	return f;
7525}
7526
7527
7528static int wpa_driver_nl80211_sta_add(void *priv,
7529				      struct hostapd_sta_add_params *params)
7530{
7531	struct i802_bss *bss = priv;
7532	struct wpa_driver_nl80211_data *drv = bss->drv;
7533	struct nl_msg *msg;
7534	struct nl80211_sta_flag_update upd;
7535	int ret = -ENOBUFS;
7536
7537	if ((params->flags & WPA_STA_TDLS_PEER) &&
7538	    !(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
7539		return -EOPNOTSUPP;
7540
7541	msg = nlmsg_alloc();
7542	if (!msg)
7543		return -ENOMEM;
7544
7545	wpa_printf(MSG_DEBUG, "nl80211: %s STA " MACSTR,
7546		   params->set ? "Set" : "Add", MAC2STR(params->addr));
7547	nl80211_cmd(drv, msg, 0, params->set ? NL80211_CMD_SET_STATION :
7548		    NL80211_CMD_NEW_STATION);
7549
7550	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
7551	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->addr);
7552	NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_RATES, params->supp_rates_len,
7553		params->supp_rates);
7554	wpa_hexdump(MSG_DEBUG, "  * supported rates", params->supp_rates,
7555		    params->supp_rates_len);
7556	if (!params->set) {
7557		if (params->aid) {
7558			wpa_printf(MSG_DEBUG, "  * aid=%u", params->aid);
7559			NLA_PUT_U16(msg, NL80211_ATTR_STA_AID, params->aid);
7560		} else {
7561			/*
7562			 * cfg80211 validates that AID is non-zero, so we have
7563			 * to make this a non-zero value for the TDLS case where
7564			 * a dummy STA entry is used for now.
7565			 */
7566			wpa_printf(MSG_DEBUG, "  * aid=1 (TDLS workaround)");
7567			NLA_PUT_U16(msg, NL80211_ATTR_STA_AID, 1);
7568		}
7569		wpa_printf(MSG_DEBUG, "  * listen_interval=%u",
7570			   params->listen_interval);
7571		NLA_PUT_U16(msg, NL80211_ATTR_STA_LISTEN_INTERVAL,
7572			    params->listen_interval);
7573	} else if (params->aid && (params->flags & WPA_STA_TDLS_PEER)) {
7574		wpa_printf(MSG_DEBUG, "  * peer_aid=%u", params->aid);
7575		NLA_PUT_U16(msg, NL80211_ATTR_PEER_AID, params->aid);
7576	}
7577	if (params->ht_capabilities) {
7578		wpa_hexdump(MSG_DEBUG, "  * ht_capabilities",
7579			    (u8 *) params->ht_capabilities,
7580			    sizeof(*params->ht_capabilities));
7581		NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY,
7582			sizeof(*params->ht_capabilities),
7583			params->ht_capabilities);
7584	}
7585
7586	if (params->vht_capabilities) {
7587		wpa_hexdump(MSG_DEBUG, "  * vht_capabilities",
7588			    (u8 *) params->vht_capabilities,
7589			    sizeof(*params->vht_capabilities));
7590		NLA_PUT(msg, NL80211_ATTR_VHT_CAPABILITY,
7591			sizeof(*params->vht_capabilities),
7592			params->vht_capabilities);
7593	}
7594
7595	if (params->vht_opmode_enabled) {
7596		wpa_printf(MSG_DEBUG, "  * opmode=%u", params->vht_opmode);
7597		NLA_PUT_U8(msg, NL80211_ATTR_OPMODE_NOTIF,
7598			   params->vht_opmode);
7599	}
7600
7601	wpa_printf(MSG_DEBUG, "  * capability=0x%x", params->capability);
7602	NLA_PUT_U16(msg, NL80211_ATTR_STA_CAPABILITY, params->capability);
7603
7604	if (params->ext_capab) {
7605		wpa_hexdump(MSG_DEBUG, "  * ext_capab",
7606			    params->ext_capab, params->ext_capab_len);
7607		NLA_PUT(msg, NL80211_ATTR_STA_EXT_CAPABILITY,
7608			params->ext_capab_len, params->ext_capab);
7609	}
7610
7611	if (params->supp_channels) {
7612		wpa_hexdump(MSG_DEBUG, "  * supported channels",
7613			    params->supp_channels, params->supp_channels_len);
7614		NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_CHANNELS,
7615			params->supp_channels_len, params->supp_channels);
7616	}
7617
7618	if (params->supp_oper_classes) {
7619		wpa_hexdump(MSG_DEBUG, "  * supported operating classes",
7620			    params->supp_oper_classes,
7621			    params->supp_oper_classes_len);
7622		NLA_PUT(msg, NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES,
7623			params->supp_oper_classes_len,
7624			params->supp_oper_classes);
7625	}
7626
7627	os_memset(&upd, 0, sizeof(upd));
7628	upd.mask = sta_flags_nl80211(params->flags);
7629	upd.set = upd.mask;
7630	wpa_printf(MSG_DEBUG, "  * flags set=0x%x mask=0x%x",
7631		   upd.set, upd.mask);
7632	NLA_PUT(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd);
7633
7634	if (params->flags & WPA_STA_WMM) {
7635		struct nlattr *wme = nla_nest_start(msg, NL80211_ATTR_STA_WME);
7636
7637		if (!wme)
7638			goto nla_put_failure;
7639
7640		wpa_printf(MSG_DEBUG, "  * qosinfo=0x%x", params->qosinfo);
7641		NLA_PUT_U8(msg, NL80211_STA_WME_UAPSD_QUEUES,
7642				params->qosinfo & WMM_QOSINFO_STA_AC_MASK);
7643		NLA_PUT_U8(msg, NL80211_STA_WME_MAX_SP,
7644				(params->qosinfo >> WMM_QOSINFO_STA_SP_SHIFT) &
7645				WMM_QOSINFO_STA_SP_MASK);
7646		nla_nest_end(msg, wme);
7647	}
7648
7649	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7650	msg = NULL;
7651	if (ret)
7652		wpa_printf(MSG_DEBUG, "nl80211: NL80211_CMD_%s_STATION "
7653			   "result: %d (%s)", params->set ? "SET" : "NEW", ret,
7654			   strerror(-ret));
7655	if (ret == -EEXIST)
7656		ret = 0;
7657 nla_put_failure:
7658	nlmsg_free(msg);
7659	return ret;
7660}
7661
7662
7663static int wpa_driver_nl80211_sta_remove(struct i802_bss *bss, const u8 *addr)
7664{
7665	struct wpa_driver_nl80211_data *drv = bss->drv;
7666	struct nl_msg *msg;
7667	int ret;
7668
7669	msg = nlmsg_alloc();
7670	if (!msg)
7671		return -ENOMEM;
7672
7673	nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_STATION);
7674
7675	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
7676		    if_nametoindex(bss->ifname));
7677	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
7678
7679	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
7680	wpa_printf(MSG_DEBUG, "nl80211: sta_remove -> DEL_STATION %s " MACSTR
7681		   " --> %d (%s)",
7682		   bss->ifname, MAC2STR(addr), ret, strerror(-ret));
7683	if (ret == -ENOENT)
7684		return 0;
7685	return ret;
7686 nla_put_failure:
7687	nlmsg_free(msg);
7688	return -ENOBUFS;
7689}
7690
7691
7692static void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv,
7693				 int ifidx)
7694{
7695	struct nl_msg *msg;
7696
7697	wpa_printf(MSG_DEBUG, "nl80211: Remove interface ifindex=%d", ifidx);
7698
7699	/* stop listening for EAPOL on this interface */
7700	del_ifidx(drv, ifidx);
7701
7702	msg = nlmsg_alloc();
7703	if (!msg)
7704		goto nla_put_failure;
7705
7706	nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_INTERFACE);
7707	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifidx);
7708
7709	if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
7710		return;
7711	msg = NULL;
7712 nla_put_failure:
7713	nlmsg_free(msg);
7714	wpa_printf(MSG_ERROR, "Failed to remove interface (ifidx=%d)", ifidx);
7715}
7716
7717
7718static const char * nl80211_iftype_str(enum nl80211_iftype mode)
7719{
7720	switch (mode) {
7721	case NL80211_IFTYPE_ADHOC:
7722		return "ADHOC";
7723	case NL80211_IFTYPE_STATION:
7724		return "STATION";
7725	case NL80211_IFTYPE_AP:
7726		return "AP";
7727	case NL80211_IFTYPE_AP_VLAN:
7728		return "AP_VLAN";
7729	case NL80211_IFTYPE_WDS:
7730		return "WDS";
7731	case NL80211_IFTYPE_MONITOR:
7732		return "MONITOR";
7733	case NL80211_IFTYPE_MESH_POINT:
7734		return "MESH_POINT";
7735	case NL80211_IFTYPE_P2P_CLIENT:
7736		return "P2P_CLIENT";
7737	case NL80211_IFTYPE_P2P_GO:
7738		return "P2P_GO";
7739	case NL80211_IFTYPE_P2P_DEVICE:
7740		return "P2P_DEVICE";
7741	default:
7742		return "unknown";
7743	}
7744}
7745
7746
7747static int nl80211_create_iface_once(struct wpa_driver_nl80211_data *drv,
7748				     const char *ifname,
7749				     enum nl80211_iftype iftype,
7750				     const u8 *addr, int wds,
7751				     int (*handler)(struct nl_msg *, void *),
7752				     void *arg)
7753{
7754	struct nl_msg *msg;
7755	int ifidx;
7756	int ret = -ENOBUFS;
7757
7758	wpa_printf(MSG_DEBUG, "nl80211: Create interface iftype %d (%s)",
7759		   iftype, nl80211_iftype_str(iftype));
7760
7761	msg = nlmsg_alloc();
7762	if (!msg)
7763		return -1;
7764
7765	nl80211_cmd(drv, msg, 0, NL80211_CMD_NEW_INTERFACE);
7766	if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
7767		goto nla_put_failure;
7768	NLA_PUT_STRING(msg, NL80211_ATTR_IFNAME, ifname);
7769	NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, iftype);
7770
7771	if (iftype == NL80211_IFTYPE_MONITOR) {
7772		struct nlattr *flags;
7773
7774		flags = nla_nest_start(msg, NL80211_ATTR_MNTR_FLAGS);
7775		if (!flags)
7776			goto nla_put_failure;
7777
7778		NLA_PUT_FLAG(msg, NL80211_MNTR_FLAG_COOK_FRAMES);
7779
7780		nla_nest_end(msg, flags);
7781	} else if (wds) {
7782		NLA_PUT_U8(msg, NL80211_ATTR_4ADDR, wds);
7783	}
7784
7785	/*
7786	 * Tell cfg80211 that the interface belongs to the socket that created
7787	 * it, and the interface should be deleted when the socket is closed.
7788	 */
7789	NLA_PUT_FLAG(msg, NL80211_ATTR_IFACE_SOCKET_OWNER);
7790
7791	ret = send_and_recv_msgs(drv, msg, handler, arg);
7792	msg = NULL;
7793	if (ret) {
7794 nla_put_failure:
7795		nlmsg_free(msg);
7796		wpa_printf(MSG_ERROR, "Failed to create interface %s: %d (%s)",
7797			   ifname, ret, strerror(-ret));
7798		return ret;
7799	}
7800
7801	if (iftype == NL80211_IFTYPE_P2P_DEVICE)
7802		return 0;
7803
7804	ifidx = if_nametoindex(ifname);
7805	wpa_printf(MSG_DEBUG, "nl80211: New interface %s created: ifindex=%d",
7806		   ifname, ifidx);
7807
7808	if (ifidx <= 0)
7809		return -1;
7810
7811	/* start listening for EAPOL on this interface */
7812	add_ifidx(drv, ifidx);
7813
7814	if (addr && iftype != NL80211_IFTYPE_MONITOR &&
7815	    linux_set_ifhwaddr(drv->global->ioctl_sock, ifname, addr)) {
7816		nl80211_remove_iface(drv, ifidx);
7817		return -1;
7818	}
7819
7820	return ifidx;
7821}
7822
7823
7824static int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
7825				const char *ifname, enum nl80211_iftype iftype,
7826				const u8 *addr, int wds,
7827				int (*handler)(struct nl_msg *, void *),
7828				void *arg, int use_existing)
7829{
7830	int ret;
7831
7832	ret = nl80211_create_iface_once(drv, ifname, iftype, addr, wds, handler,
7833					arg);
7834
7835	/* if error occurred and interface exists already */
7836	if (ret == -ENFILE && if_nametoindex(ifname)) {
7837		if (use_existing) {
7838			wpa_printf(MSG_DEBUG, "nl80211: Continue using existing interface %s",
7839				   ifname);
7840			if (addr && iftype != NL80211_IFTYPE_MONITOR &&
7841			    linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
7842					       addr) < 0 &&
7843			    (linux_set_iface_flags(drv->global->ioctl_sock,
7844						   ifname, 0) < 0 ||
7845			     linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
7846						addr) < 0 ||
7847			     linux_set_iface_flags(drv->global->ioctl_sock,
7848						   ifname, 1) < 0))
7849					return -1;
7850			return -ENFILE;
7851		}
7852		wpa_printf(MSG_INFO, "Try to remove and re-create %s", ifname);
7853
7854		/* Try to remove the interface that was already there. */
7855		nl80211_remove_iface(drv, if_nametoindex(ifname));
7856
7857		/* Try to create the interface again */
7858		ret = nl80211_create_iface_once(drv, ifname, iftype, addr,
7859						wds, handler, arg);
7860	}
7861
7862	if (ret >= 0 && is_p2p_net_interface(iftype))
7863		nl80211_disable_11b_rates(drv, ret, 1);
7864
7865	return ret;
7866}
7867
7868
7869static void handle_tx_callback(void *ctx, u8 *buf, size_t len, int ok)
7870{
7871	struct ieee80211_hdr *hdr;
7872	u16 fc;
7873	union wpa_event_data event;
7874
7875	hdr = (struct ieee80211_hdr *) buf;
7876	fc = le_to_host16(hdr->frame_control);
7877
7878	os_memset(&event, 0, sizeof(event));
7879	event.tx_status.type = WLAN_FC_GET_TYPE(fc);
7880	event.tx_status.stype = WLAN_FC_GET_STYPE(fc);
7881	event.tx_status.dst = hdr->addr1;
7882	event.tx_status.data = buf;
7883	event.tx_status.data_len = len;
7884	event.tx_status.ack = ok;
7885	wpa_supplicant_event(ctx, EVENT_TX_STATUS, &event);
7886}
7887
7888
7889static void from_unknown_sta(struct wpa_driver_nl80211_data *drv,
7890			     u8 *buf, size_t len)
7891{
7892	struct ieee80211_hdr *hdr = (void *)buf;
7893	u16 fc;
7894	union wpa_event_data event;
7895
7896	if (len < sizeof(*hdr))
7897		return;
7898
7899	fc = le_to_host16(hdr->frame_control);
7900
7901	os_memset(&event, 0, sizeof(event));
7902	event.rx_from_unknown.bssid = get_hdr_bssid(hdr, len);
7903	event.rx_from_unknown.addr = hdr->addr2;
7904	event.rx_from_unknown.wds = (fc & (WLAN_FC_FROMDS | WLAN_FC_TODS)) ==
7905		(WLAN_FC_FROMDS | WLAN_FC_TODS);
7906	wpa_supplicant_event(drv->ctx, EVENT_RX_FROM_UNKNOWN, &event);
7907}
7908
7909
7910static void handle_frame(struct wpa_driver_nl80211_data *drv,
7911			 u8 *buf, size_t len, int datarate, int ssi_signal)
7912{
7913	struct ieee80211_hdr *hdr;
7914	u16 fc;
7915	union wpa_event_data event;
7916
7917	hdr = (struct ieee80211_hdr *) buf;
7918	fc = le_to_host16(hdr->frame_control);
7919
7920	switch (WLAN_FC_GET_TYPE(fc)) {
7921	case WLAN_FC_TYPE_MGMT:
7922		os_memset(&event, 0, sizeof(event));
7923		event.rx_mgmt.frame = buf;
7924		event.rx_mgmt.frame_len = len;
7925		event.rx_mgmt.datarate = datarate;
7926		event.rx_mgmt.ssi_signal = ssi_signal;
7927		wpa_supplicant_event(drv->ctx, EVENT_RX_MGMT, &event);
7928		break;
7929	case WLAN_FC_TYPE_CTRL:
7930		/* can only get here with PS-Poll frames */
7931		wpa_printf(MSG_DEBUG, "CTRL");
7932		from_unknown_sta(drv, buf, len);
7933		break;
7934	case WLAN_FC_TYPE_DATA:
7935		from_unknown_sta(drv, buf, len);
7936		break;
7937	}
7938}
7939
7940
7941static void handle_monitor_read(int sock, void *eloop_ctx, void *sock_ctx)
7942{
7943	struct wpa_driver_nl80211_data *drv = eloop_ctx;
7944	int len;
7945	unsigned char buf[3000];
7946	struct ieee80211_radiotap_iterator iter;
7947	int ret;
7948	int datarate = 0, ssi_signal = 0;
7949	int injected = 0, failed = 0, rxflags = 0;
7950
7951	len = recv(sock, buf, sizeof(buf), 0);
7952	if (len < 0) {
7953		wpa_printf(MSG_ERROR, "nl80211: Monitor socket recv failed: %s",
7954			   strerror(errno));
7955		return;
7956	}
7957
7958	if (ieee80211_radiotap_iterator_init(&iter, (void *) buf, len, NULL)) {
7959		wpa_printf(MSG_INFO, "nl80211: received invalid radiotap frame");
7960		return;
7961	}
7962
7963	while (1) {
7964		ret = ieee80211_radiotap_iterator_next(&iter);
7965		if (ret == -ENOENT)
7966			break;
7967		if (ret) {
7968			wpa_printf(MSG_INFO, "nl80211: received invalid radiotap frame (%d)",
7969				   ret);
7970			return;
7971		}
7972		switch (iter.this_arg_index) {
7973		case IEEE80211_RADIOTAP_FLAGS:
7974			if (*iter.this_arg & IEEE80211_RADIOTAP_F_FCS)
7975				len -= 4;
7976			break;
7977		case IEEE80211_RADIOTAP_RX_FLAGS:
7978			rxflags = 1;
7979			break;
7980		case IEEE80211_RADIOTAP_TX_FLAGS:
7981			injected = 1;
7982			failed = le_to_host16((*(uint16_t *) iter.this_arg)) &
7983					IEEE80211_RADIOTAP_F_TX_FAIL;
7984			break;
7985		case IEEE80211_RADIOTAP_DATA_RETRIES:
7986			break;
7987		case IEEE80211_RADIOTAP_CHANNEL:
7988			/* TODO: convert from freq/flags to channel number */
7989			break;
7990		case IEEE80211_RADIOTAP_RATE:
7991			datarate = *iter.this_arg * 5;
7992			break;
7993		case IEEE80211_RADIOTAP_DBM_ANTSIGNAL:
7994			ssi_signal = (s8) *iter.this_arg;
7995			break;
7996		}
7997	}
7998
7999	if (rxflags && injected)
8000		return;
8001
8002	if (!injected)
8003		handle_frame(drv, buf + iter._max_length,
8004			     len - iter._max_length, datarate, ssi_signal);
8005	else
8006		handle_tx_callback(drv->ctx, buf + iter._max_length,
8007				   len - iter._max_length, !failed);
8008}
8009
8010
8011/*
8012 * we post-process the filter code later and rewrite
8013 * this to the offset to the last instruction
8014 */
8015#define PASS	0xFF
8016#define FAIL	0xFE
8017
8018static struct sock_filter msock_filter_insns[] = {
8019	/*
8020	 * do a little-endian load of the radiotap length field
8021	 */
8022	/* load lower byte into A */
8023	BPF_STMT(BPF_LD  | BPF_B | BPF_ABS, 2),
8024	/* put it into X (== index register) */
8025	BPF_STMT(BPF_MISC| BPF_TAX, 0),
8026	/* load upper byte into A */
8027	BPF_STMT(BPF_LD  | BPF_B | BPF_ABS, 3),
8028	/* left-shift it by 8 */
8029	BPF_STMT(BPF_ALU | BPF_LSH | BPF_K, 8),
8030	/* or with X */
8031	BPF_STMT(BPF_ALU | BPF_OR | BPF_X, 0),
8032	/* put result into X */
8033	BPF_STMT(BPF_MISC| BPF_TAX, 0),
8034
8035	/*
8036	 * Allow management frames through, this also gives us those
8037	 * management frames that we sent ourselves with status
8038	 */
8039	/* load the lower byte of the IEEE 802.11 frame control field */
8040	BPF_STMT(BPF_LD  | BPF_B | BPF_IND, 0),
8041	/* mask off frame type and version */
8042	BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xF),
8043	/* accept frame if it's both 0, fall through otherwise */
8044	BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0, PASS, 0),
8045
8046	/*
8047	 * TODO: add a bit to radiotap RX flags that indicates
8048	 * that the sending station is not associated, then
8049	 * add a filter here that filters on our DA and that flag
8050	 * to allow us to deauth frames to that bad station.
8051	 *
8052	 * For now allow all To DS data frames through.
8053	 */
8054	/* load the IEEE 802.11 frame control field */
8055	BPF_STMT(BPF_LD  | BPF_H | BPF_IND, 0),
8056	/* mask off frame type, version and DS status */
8057	BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0x0F03),
8058	/* accept frame if version 0, type 2 and To DS, fall through otherwise
8059	 */
8060	BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0801, PASS, 0),
8061
8062#if 0
8063	/*
8064	 * drop non-data frames
8065	 */
8066	/* load the lower byte of the frame control field */
8067	BPF_STMT(BPF_LD   | BPF_B | BPF_IND, 0),
8068	/* mask off QoS bit */
8069	BPF_STMT(BPF_ALU  | BPF_AND | BPF_K, 0x0c),
8070	/* drop non-data frames */
8071	BPF_JUMP(BPF_JMP  | BPF_JEQ | BPF_K, 8, 0, FAIL),
8072#endif
8073	/* load the upper byte of the frame control field */
8074	BPF_STMT(BPF_LD   | BPF_B | BPF_IND, 1),
8075	/* mask off toDS/fromDS */
8076	BPF_STMT(BPF_ALU  | BPF_AND | BPF_K, 0x03),
8077	/* accept WDS frames */
8078	BPF_JUMP(BPF_JMP  | BPF_JEQ | BPF_K, 3, PASS, 0),
8079
8080	/*
8081	 * add header length to index
8082	 */
8083	/* load the lower byte of the frame control field */
8084	BPF_STMT(BPF_LD   | BPF_B | BPF_IND, 0),
8085	/* mask off QoS bit */
8086	BPF_STMT(BPF_ALU  | BPF_AND | BPF_K, 0x80),
8087	/* right shift it by 6 to give 0 or 2 */
8088	BPF_STMT(BPF_ALU  | BPF_RSH | BPF_K, 6),
8089	/* add data frame header length */
8090	BPF_STMT(BPF_ALU  | BPF_ADD | BPF_K, 24),
8091	/* add index, was start of 802.11 header */
8092	BPF_STMT(BPF_ALU  | BPF_ADD | BPF_X, 0),
8093	/* move to index, now start of LL header */
8094	BPF_STMT(BPF_MISC | BPF_TAX, 0),
8095
8096	/*
8097	 * Accept empty data frames, we use those for
8098	 * polling activity.
8099	 */
8100	BPF_STMT(BPF_LD  | BPF_W | BPF_LEN, 0),
8101	BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_X, 0, PASS, 0),
8102
8103	/*
8104	 * Accept EAPOL frames
8105	 */
8106	BPF_STMT(BPF_LD  | BPF_W | BPF_IND, 0),
8107	BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0xAAAA0300, 0, FAIL),
8108	BPF_STMT(BPF_LD  | BPF_W | BPF_IND, 4),
8109	BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0000888E, PASS, FAIL),
8110
8111	/* keep these last two statements or change the code below */
8112	/* return 0 == "DROP" */
8113	BPF_STMT(BPF_RET | BPF_K, 0),
8114	/* return ~0 == "keep all" */
8115	BPF_STMT(BPF_RET | BPF_K, ~0),
8116};
8117
8118static struct sock_fprog msock_filter = {
8119	.len = ARRAY_SIZE(msock_filter_insns),
8120	.filter = msock_filter_insns,
8121};
8122
8123
8124static int add_monitor_filter(int s)
8125{
8126	int idx;
8127
8128	/* rewrite all PASS/FAIL jump offsets */
8129	for (idx = 0; idx < msock_filter.len; idx++) {
8130		struct sock_filter *insn = &msock_filter_insns[idx];
8131
8132		if (BPF_CLASS(insn->code) == BPF_JMP) {
8133			if (insn->code == (BPF_JMP|BPF_JA)) {
8134				if (insn->k == PASS)
8135					insn->k = msock_filter.len - idx - 2;
8136				else if (insn->k == FAIL)
8137					insn->k = msock_filter.len - idx - 3;
8138			}
8139
8140			if (insn->jt == PASS)
8141				insn->jt = msock_filter.len - idx - 2;
8142			else if (insn->jt == FAIL)
8143				insn->jt = msock_filter.len - idx - 3;
8144
8145			if (insn->jf == PASS)
8146				insn->jf = msock_filter.len - idx - 2;
8147			else if (insn->jf == FAIL)
8148				insn->jf = msock_filter.len - idx - 3;
8149		}
8150	}
8151
8152	if (setsockopt(s, SOL_SOCKET, SO_ATTACH_FILTER,
8153		       &msock_filter, sizeof(msock_filter))) {
8154		wpa_printf(MSG_ERROR, "nl80211: setsockopt(SO_ATTACH_FILTER) failed: %s",
8155			   strerror(errno));
8156		return -1;
8157	}
8158
8159	return 0;
8160}
8161
8162
8163static void nl80211_remove_monitor_interface(
8164	struct wpa_driver_nl80211_data *drv)
8165{
8166	if (drv->monitor_refcount > 0)
8167		drv->monitor_refcount--;
8168	wpa_printf(MSG_DEBUG, "nl80211: Remove monitor interface: refcount=%d",
8169		   drv->monitor_refcount);
8170	if (drv->monitor_refcount > 0)
8171		return;
8172
8173	if (drv->monitor_ifidx >= 0) {
8174		nl80211_remove_iface(drv, drv->monitor_ifidx);
8175		drv->monitor_ifidx = -1;
8176	}
8177	if (drv->monitor_sock >= 0) {
8178		eloop_unregister_read_sock(drv->monitor_sock);
8179		close(drv->monitor_sock);
8180		drv->monitor_sock = -1;
8181	}
8182}
8183
8184
8185static int
8186nl80211_create_monitor_interface(struct wpa_driver_nl80211_data *drv)
8187{
8188	char buf[IFNAMSIZ];
8189	struct sockaddr_ll ll;
8190	int optval;
8191	socklen_t optlen;
8192
8193	if (drv->monitor_ifidx >= 0) {
8194		drv->monitor_refcount++;
8195		wpa_printf(MSG_DEBUG, "nl80211: Re-use existing monitor interface: refcount=%d",
8196			   drv->monitor_refcount);
8197		return 0;
8198	}
8199
8200	if (os_strncmp(drv->first_bss->ifname, "p2p-", 4) == 0) {
8201		/*
8202		 * P2P interface name is of the format p2p-%s-%d. For monitor
8203		 * interface name corresponding to P2P GO, replace "p2p-" with
8204		 * "mon-" to retain the same interface name length and to
8205		 * indicate that it is a monitor interface.
8206		 */
8207		snprintf(buf, IFNAMSIZ, "mon-%s", drv->first_bss->ifname + 4);
8208	} else {
8209		/* Non-P2P interface with AP functionality. */
8210		snprintf(buf, IFNAMSIZ, "mon.%s", drv->first_bss->ifname);
8211	}
8212
8213	buf[IFNAMSIZ - 1] = '\0';
8214
8215	drv->monitor_ifidx =
8216		nl80211_create_iface(drv, buf, NL80211_IFTYPE_MONITOR, NULL,
8217				     0, NULL, NULL, 0);
8218
8219	if (drv->monitor_ifidx == -EOPNOTSUPP) {
8220		/*
8221		 * This is backward compatibility for a few versions of
8222		 * the kernel only that didn't advertise the right
8223		 * attributes for the only driver that then supported
8224		 * AP mode w/o monitor -- ath6kl.
8225		 */
8226		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support "
8227			   "monitor interface type - try to run without it");
8228		drv->device_ap_sme = 1;
8229	}
8230
8231	if (drv->monitor_ifidx < 0)
8232		return -1;
8233
8234	if (linux_set_iface_flags(drv->global->ioctl_sock, buf, 1))
8235		goto error;
8236
8237	memset(&ll, 0, sizeof(ll));
8238	ll.sll_family = AF_PACKET;
8239	ll.sll_ifindex = drv->monitor_ifidx;
8240	drv->monitor_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
8241	if (drv->monitor_sock < 0) {
8242		wpa_printf(MSG_ERROR, "nl80211: socket[PF_PACKET,SOCK_RAW] failed: %s",
8243			   strerror(errno));
8244		goto error;
8245	}
8246
8247	if (add_monitor_filter(drv->monitor_sock)) {
8248		wpa_printf(MSG_INFO, "Failed to set socket filter for monitor "
8249			   "interface; do filtering in user space");
8250		/* This works, but will cost in performance. */
8251	}
8252
8253	if (bind(drv->monitor_sock, (struct sockaddr *) &ll, sizeof(ll)) < 0) {
8254		wpa_printf(MSG_ERROR, "nl80211: monitor socket bind failed: %s",
8255			   strerror(errno));
8256		goto error;
8257	}
8258
8259	optlen = sizeof(optval);
8260	optval = 20;
8261	if (setsockopt
8262	    (drv->monitor_sock, SOL_SOCKET, SO_PRIORITY, &optval, optlen)) {
8263		wpa_printf(MSG_ERROR, "nl80211: Failed to set socket priority: %s",
8264			   strerror(errno));
8265		goto error;
8266	}
8267
8268	if (eloop_register_read_sock(drv->monitor_sock, handle_monitor_read,
8269				     drv, NULL)) {
8270		wpa_printf(MSG_INFO, "nl80211: Could not register monitor read socket");
8271		goto error;
8272	}
8273
8274	drv->monitor_refcount++;
8275	return 0;
8276 error:
8277	nl80211_remove_monitor_interface(drv);
8278	return -1;
8279}
8280
8281
8282static int nl80211_setup_ap(struct i802_bss *bss)
8283{
8284	struct wpa_driver_nl80211_data *drv = bss->drv;
8285
8286	wpa_printf(MSG_DEBUG, "nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d",
8287		   bss->ifname, drv->device_ap_sme, drv->use_monitor);
8288
8289	/*
8290	 * Disable Probe Request reporting unless we need it in this way for
8291	 * devices that include the AP SME, in the other case (unless using
8292	 * monitor iface) we'll get it through the nl_mgmt socket instead.
8293	 */
8294	if (!drv->device_ap_sme)
8295		wpa_driver_nl80211_probe_req_report(bss, 0);
8296
8297	if (!drv->device_ap_sme && !drv->use_monitor)
8298		if (nl80211_mgmt_subscribe_ap(bss))
8299			return -1;
8300
8301	if (drv->device_ap_sme && !drv->use_monitor)
8302		if (nl80211_mgmt_subscribe_ap_dev_sme(bss))
8303			return -1;
8304
8305	if (!drv->device_ap_sme && drv->use_monitor &&
8306	    nl80211_create_monitor_interface(drv) &&
8307	    !drv->device_ap_sme)
8308		return -1;
8309
8310	if (drv->device_ap_sme &&
8311	    wpa_driver_nl80211_probe_req_report(bss, 1) < 0) {
8312		wpa_printf(MSG_DEBUG, "nl80211: Failed to enable "
8313			   "Probe Request frame reporting in AP mode");
8314		/* Try to survive without this */
8315	}
8316
8317	return 0;
8318}
8319
8320
8321static void nl80211_teardown_ap(struct i802_bss *bss)
8322{
8323	struct wpa_driver_nl80211_data *drv = bss->drv;
8324
8325	wpa_printf(MSG_DEBUG, "nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d",
8326		   bss->ifname, drv->device_ap_sme, drv->use_monitor);
8327	if (drv->device_ap_sme) {
8328		wpa_driver_nl80211_probe_req_report(bss, 0);
8329		if (!drv->use_monitor)
8330			nl80211_mgmt_unsubscribe(bss, "AP teardown (dev SME)");
8331	} else if (drv->use_monitor)
8332		nl80211_remove_monitor_interface(drv);
8333	else
8334		nl80211_mgmt_unsubscribe(bss, "AP teardown");
8335
8336	bss->beacon_set = 0;
8337}
8338
8339
8340static int nl80211_send_eapol_data(struct i802_bss *bss,
8341				   const u8 *addr, const u8 *data,
8342				   size_t data_len)
8343{
8344	struct sockaddr_ll ll;
8345	int ret;
8346
8347	if (bss->drv->eapol_tx_sock < 0) {
8348		wpa_printf(MSG_DEBUG, "nl80211: No socket to send EAPOL");
8349		return -1;
8350	}
8351
8352	os_memset(&ll, 0, sizeof(ll));
8353	ll.sll_family = AF_PACKET;
8354	ll.sll_ifindex = bss->ifindex;
8355	ll.sll_protocol = htons(ETH_P_PAE);
8356	ll.sll_halen = ETH_ALEN;
8357	os_memcpy(ll.sll_addr, addr, ETH_ALEN);
8358	ret = sendto(bss->drv->eapol_tx_sock, data, data_len, 0,
8359		     (struct sockaddr *) &ll, sizeof(ll));
8360	if (ret < 0)
8361		wpa_printf(MSG_ERROR, "nl80211: EAPOL TX: %s",
8362			   strerror(errno));
8363
8364	return ret;
8365}
8366
8367
8368static const u8 rfc1042_header[6] = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00 };
8369
8370static int wpa_driver_nl80211_hapd_send_eapol(
8371	void *priv, const u8 *addr, const u8 *data,
8372	size_t data_len, int encrypt, const u8 *own_addr, u32 flags)
8373{
8374	struct i802_bss *bss = priv;
8375	struct wpa_driver_nl80211_data *drv = bss->drv;
8376	struct ieee80211_hdr *hdr;
8377	size_t len;
8378	u8 *pos;
8379	int res;
8380	int qos = flags & WPA_STA_WMM;
8381
8382	if (drv->device_ap_sme || !drv->use_monitor)
8383		return nl80211_send_eapol_data(bss, addr, data, data_len);
8384
8385	len = sizeof(*hdr) + (qos ? 2 : 0) + sizeof(rfc1042_header) + 2 +
8386		data_len;
8387	hdr = os_zalloc(len);
8388	if (hdr == NULL) {
8389		wpa_printf(MSG_INFO, "nl80211: Failed to allocate EAPOL buffer(len=%lu)",
8390			   (unsigned long) len);
8391		return -1;
8392	}
8393
8394	hdr->frame_control =
8395		IEEE80211_FC(WLAN_FC_TYPE_DATA, WLAN_FC_STYPE_DATA);
8396	hdr->frame_control |= host_to_le16(WLAN_FC_FROMDS);
8397	if (encrypt)
8398		hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
8399	if (qos) {
8400		hdr->frame_control |=
8401			host_to_le16(WLAN_FC_STYPE_QOS_DATA << 4);
8402	}
8403
8404	memcpy(hdr->IEEE80211_DA_FROMDS, addr, ETH_ALEN);
8405	memcpy(hdr->IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
8406	memcpy(hdr->IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
8407	pos = (u8 *) (hdr + 1);
8408
8409	if (qos) {
8410		/* Set highest priority in QoS header */
8411		pos[0] = 7;
8412		pos[1] = 0;
8413		pos += 2;
8414	}
8415
8416	memcpy(pos, rfc1042_header, sizeof(rfc1042_header));
8417	pos += sizeof(rfc1042_header);
8418	WPA_PUT_BE16(pos, ETH_P_PAE);
8419	pos += 2;
8420	memcpy(pos, data, data_len);
8421
8422	res = wpa_driver_nl80211_send_frame(bss, (u8 *) hdr, len, encrypt, 0,
8423					    0, 0, 0, 0);
8424	if (res < 0) {
8425		wpa_printf(MSG_ERROR, "i802_send_eapol - packet len: %lu - "
8426			   "failed: %d (%s)",
8427			   (unsigned long) len, errno, strerror(errno));
8428	}
8429	os_free(hdr);
8430
8431	return res;
8432}
8433
8434
8435static int wpa_driver_nl80211_sta_set_flags(void *priv, const u8 *addr,
8436					    int total_flags,
8437					    int flags_or, int flags_and)
8438{
8439	struct i802_bss *bss = priv;
8440	struct wpa_driver_nl80211_data *drv = bss->drv;
8441	struct nl_msg *msg;
8442	struct nlattr *flags;
8443	struct nl80211_sta_flag_update upd;
8444
8445	msg = nlmsg_alloc();
8446	if (!msg)
8447		return -ENOMEM;
8448
8449	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_STATION);
8450
8451	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
8452		    if_nametoindex(bss->ifname));
8453	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
8454
8455	/*
8456	 * Backwards compatibility version using NL80211_ATTR_STA_FLAGS. This
8457	 * can be removed eventually.
8458	 */
8459	flags = nla_nest_start(msg, NL80211_ATTR_STA_FLAGS);
8460	if (!flags)
8461		goto nla_put_failure;
8462	if (total_flags & WPA_STA_AUTHORIZED)
8463		NLA_PUT_FLAG(msg, NL80211_STA_FLAG_AUTHORIZED);
8464
8465	if (total_flags & WPA_STA_WMM)
8466		NLA_PUT_FLAG(msg, NL80211_STA_FLAG_WME);
8467
8468	if (total_flags & WPA_STA_SHORT_PREAMBLE)
8469		NLA_PUT_FLAG(msg, NL80211_STA_FLAG_SHORT_PREAMBLE);
8470
8471	if (total_flags & WPA_STA_MFP)
8472		NLA_PUT_FLAG(msg, NL80211_STA_FLAG_MFP);
8473
8474	if (total_flags & WPA_STA_TDLS_PEER)
8475		NLA_PUT_FLAG(msg, NL80211_STA_FLAG_TDLS_PEER);
8476
8477	nla_nest_end(msg, flags);
8478
8479	os_memset(&upd, 0, sizeof(upd));
8480	upd.mask = sta_flags_nl80211(flags_or | ~flags_and);
8481	upd.set = sta_flags_nl80211(flags_or);
8482	NLA_PUT(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd);
8483
8484	return send_and_recv_msgs(drv, msg, NULL, NULL);
8485 nla_put_failure:
8486	nlmsg_free(msg);
8487	return -ENOBUFS;
8488}
8489
8490
8491static int wpa_driver_nl80211_ap(struct wpa_driver_nl80211_data *drv,
8492				 struct wpa_driver_associate_params *params)
8493{
8494	enum nl80211_iftype nlmode, old_mode;
8495	struct hostapd_freq_params freq = {
8496		.freq = params->freq,
8497	};
8498
8499	if (params->p2p) {
8500		wpa_printf(MSG_DEBUG, "nl80211: Setup AP operations for P2P "
8501			   "group (GO)");
8502		nlmode = NL80211_IFTYPE_P2P_GO;
8503	} else
8504		nlmode = NL80211_IFTYPE_AP;
8505
8506	old_mode = drv->nlmode;
8507	if (wpa_driver_nl80211_set_mode(drv->first_bss, nlmode)) {
8508		nl80211_remove_monitor_interface(drv);
8509		return -1;
8510	}
8511
8512	if (nl80211_set_channel(drv->first_bss, &freq, 0)) {
8513		if (old_mode != nlmode)
8514			wpa_driver_nl80211_set_mode(drv->first_bss, old_mode);
8515		nl80211_remove_monitor_interface(drv);
8516		return -1;
8517	}
8518
8519	return 0;
8520}
8521
8522
8523static int nl80211_leave_ibss(struct wpa_driver_nl80211_data *drv)
8524{
8525	struct nl_msg *msg;
8526	int ret = -1;
8527
8528	msg = nlmsg_alloc();
8529	if (!msg)
8530		return -1;
8531
8532	nl80211_cmd(drv, msg, 0, NL80211_CMD_LEAVE_IBSS);
8533	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
8534	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8535	msg = NULL;
8536	if (ret) {
8537		wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS failed: ret=%d "
8538			   "(%s)", ret, strerror(-ret));
8539		goto nla_put_failure;
8540	}
8541
8542	ret = 0;
8543	wpa_printf(MSG_DEBUG, "nl80211: Leave IBSS request sent successfully");
8544
8545nla_put_failure:
8546	if (wpa_driver_nl80211_set_mode(drv->first_bss,
8547					NL80211_IFTYPE_STATION)) {
8548		wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
8549			   "station mode");
8550	}
8551
8552	nlmsg_free(msg);
8553	return ret;
8554}
8555
8556
8557static int wpa_driver_nl80211_ibss(struct wpa_driver_nl80211_data *drv,
8558				   struct wpa_driver_associate_params *params)
8559{
8560	struct nl_msg *msg;
8561	int ret = -1;
8562	int count = 0;
8563
8564	wpa_printf(MSG_DEBUG, "nl80211: Join IBSS (ifindex=%d)", drv->ifindex);
8565
8566	if (wpa_driver_nl80211_set_mode(drv->first_bss,
8567					NL80211_IFTYPE_ADHOC)) {
8568		wpa_printf(MSG_INFO, "nl80211: Failed to set interface into "
8569			   "IBSS mode");
8570		return -1;
8571	}
8572
8573retry:
8574	msg = nlmsg_alloc();
8575	if (!msg)
8576		return -1;
8577
8578	nl80211_cmd(drv, msg, 0, NL80211_CMD_JOIN_IBSS);
8579	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
8580
8581	if (params->ssid == NULL || params->ssid_len > sizeof(drv->ssid))
8582		goto nla_put_failure;
8583
8584	wpa_hexdump_ascii(MSG_DEBUG, "  * SSID",
8585			  params->ssid, params->ssid_len);
8586	NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
8587		params->ssid);
8588	os_memcpy(drv->ssid, params->ssid, params->ssid_len);
8589	drv->ssid_len = params->ssid_len;
8590
8591	wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
8592	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
8593
8594	if (params->beacon_int > 0) {
8595		wpa_printf(MSG_DEBUG, "  * beacon_int=%d", params->beacon_int);
8596		NLA_PUT_U32(msg, NL80211_ATTR_BEACON_INTERVAL,
8597			    params->beacon_int);
8598	}
8599
8600	ret = nl80211_set_conn_keys(params, msg);
8601	if (ret)
8602		goto nla_put_failure;
8603
8604	if (params->bssid && params->fixed_bssid) {
8605		wpa_printf(MSG_DEBUG, "  * BSSID=" MACSTR,
8606			   MAC2STR(params->bssid));
8607		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
8608	}
8609
8610	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
8611	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
8612	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
8613	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
8614		wpa_printf(MSG_DEBUG, "  * control port");
8615		NLA_PUT_FLAG(msg, NL80211_ATTR_CONTROL_PORT);
8616	}
8617
8618	if (params->wpa_ie) {
8619		wpa_hexdump(MSG_DEBUG,
8620			    "  * Extra IEs for Beacon/Probe Response frames",
8621			    params->wpa_ie, params->wpa_ie_len);
8622		NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
8623			params->wpa_ie);
8624	}
8625
8626	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8627	msg = NULL;
8628	if (ret) {
8629		wpa_printf(MSG_DEBUG, "nl80211: Join IBSS failed: ret=%d (%s)",
8630			   ret, strerror(-ret));
8631		count++;
8632		if (ret == -EALREADY && count == 1) {
8633			wpa_printf(MSG_DEBUG, "nl80211: Retry IBSS join after "
8634				   "forced leave");
8635			nl80211_leave_ibss(drv);
8636			nlmsg_free(msg);
8637			goto retry;
8638		}
8639
8640		goto nla_put_failure;
8641	}
8642	ret = 0;
8643	wpa_printf(MSG_DEBUG, "nl80211: Join IBSS request sent successfully");
8644
8645nla_put_failure:
8646	nlmsg_free(msg);
8647	return ret;
8648}
8649
8650
8651static int nl80211_connect_common(struct wpa_driver_nl80211_data *drv,
8652				  struct wpa_driver_associate_params *params,
8653				  struct nl_msg *msg)
8654{
8655	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
8656
8657	if (params->bssid) {
8658		wpa_printf(MSG_DEBUG, "  * bssid=" MACSTR,
8659			   MAC2STR(params->bssid));
8660		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, params->bssid);
8661	}
8662
8663	if (params->bssid_hint) {
8664		wpa_printf(MSG_DEBUG, "  * bssid_hint=" MACSTR,
8665			   MAC2STR(params->bssid_hint));
8666		NLA_PUT(msg, NL80211_ATTR_MAC_HINT, ETH_ALEN,
8667			params->bssid_hint);
8668	}
8669
8670	if (params->freq) {
8671		wpa_printf(MSG_DEBUG, "  * freq=%d", params->freq);
8672		NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, params->freq);
8673		drv->assoc_freq = params->freq;
8674	} else
8675		drv->assoc_freq = 0;
8676
8677	if (params->freq_hint) {
8678		wpa_printf(MSG_DEBUG, "  * freq_hint=%d", params->freq_hint);
8679		NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ_HINT,
8680			    params->freq_hint);
8681	}
8682
8683	if (params->bg_scan_period >= 0) {
8684		wpa_printf(MSG_DEBUG, "  * bg scan period=%d",
8685			   params->bg_scan_period);
8686		NLA_PUT_U16(msg, NL80211_ATTR_BG_SCAN_PERIOD,
8687			    params->bg_scan_period);
8688	}
8689
8690	if (params->ssid) {
8691		wpa_hexdump_ascii(MSG_DEBUG, "  * SSID",
8692				  params->ssid, params->ssid_len);
8693		NLA_PUT(msg, NL80211_ATTR_SSID, params->ssid_len,
8694			params->ssid);
8695		if (params->ssid_len > sizeof(drv->ssid))
8696			goto nla_put_failure;
8697		os_memcpy(drv->ssid, params->ssid, params->ssid_len);
8698		drv->ssid_len = params->ssid_len;
8699	}
8700
8701	wpa_hexdump(MSG_DEBUG, "  * IEs", params->wpa_ie, params->wpa_ie_len);
8702	if (params->wpa_ie)
8703		NLA_PUT(msg, NL80211_ATTR_IE, params->wpa_ie_len,
8704			params->wpa_ie);
8705
8706	if (params->wpa_proto) {
8707		enum nl80211_wpa_versions ver = 0;
8708
8709		if (params->wpa_proto & WPA_PROTO_WPA)
8710			ver |= NL80211_WPA_VERSION_1;
8711		if (params->wpa_proto & WPA_PROTO_RSN)
8712			ver |= NL80211_WPA_VERSION_2;
8713
8714		wpa_printf(MSG_DEBUG, "  * WPA Versions 0x%x", ver);
8715		NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
8716	}
8717
8718	if (params->pairwise_suite != WPA_CIPHER_NONE) {
8719		u32 cipher = wpa_cipher_to_cipher_suite(params->pairwise_suite);
8720		wpa_printf(MSG_DEBUG, "  * pairwise=0x%x", cipher);
8721		NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITES_PAIRWISE, cipher);
8722	}
8723
8724	if (params->group_suite == WPA_CIPHER_GTK_NOT_USED &&
8725	    !(drv->capa.enc & WPA_DRIVER_CAPA_ENC_GTK_NOT_USED)) {
8726		/*
8727		 * This is likely to work even though many drivers do not
8728		 * advertise support for operations without GTK.
8729		 */
8730		wpa_printf(MSG_DEBUG, "  * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement");
8731	} else if (params->group_suite != WPA_CIPHER_NONE) {
8732		u32 cipher = wpa_cipher_to_cipher_suite(params->group_suite);
8733		wpa_printf(MSG_DEBUG, "  * group=0x%x", cipher);
8734		NLA_PUT_U32(msg, NL80211_ATTR_CIPHER_SUITE_GROUP, cipher);
8735	}
8736
8737	if (params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
8738	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK ||
8739	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_IEEE8021X ||
8740	    params->key_mgmt_suite == WPA_KEY_MGMT_FT_PSK ||
8741	    params->key_mgmt_suite == WPA_KEY_MGMT_CCKM ||
8742	    params->key_mgmt_suite == WPA_KEY_MGMT_OSEN ||
8743	    params->key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
8744	    params->key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256) {
8745		int mgmt = WLAN_AKM_SUITE_PSK;
8746
8747		switch (params->key_mgmt_suite) {
8748		case WPA_KEY_MGMT_CCKM:
8749			mgmt = WLAN_AKM_SUITE_CCKM;
8750			break;
8751		case WPA_KEY_MGMT_IEEE8021X:
8752			mgmt = WLAN_AKM_SUITE_8021X;
8753			break;
8754		case WPA_KEY_MGMT_FT_IEEE8021X:
8755			mgmt = WLAN_AKM_SUITE_FT_8021X;
8756			break;
8757		case WPA_KEY_MGMT_FT_PSK:
8758			mgmt = WLAN_AKM_SUITE_FT_PSK;
8759			break;
8760		case WPA_KEY_MGMT_IEEE8021X_SHA256:
8761			mgmt = WLAN_AKM_SUITE_8021X_SHA256;
8762			break;
8763		case WPA_KEY_MGMT_PSK_SHA256:
8764			mgmt = WLAN_AKM_SUITE_PSK_SHA256;
8765			break;
8766		case WPA_KEY_MGMT_OSEN:
8767			mgmt = WLAN_AKM_SUITE_OSEN;
8768			break;
8769		case WPA_KEY_MGMT_PSK:
8770		default:
8771			mgmt = WLAN_AKM_SUITE_PSK;
8772			break;
8773		}
8774		wpa_printf(MSG_DEBUG, "  * akm=0x%x", mgmt);
8775		NLA_PUT_U32(msg, NL80211_ATTR_AKM_SUITES, mgmt);
8776	}
8777
8778	NLA_PUT_FLAG(msg, NL80211_ATTR_CONTROL_PORT);
8779
8780	if (params->mgmt_frame_protection == MGMT_FRAME_PROTECTION_REQUIRED)
8781		NLA_PUT_U32(msg, NL80211_ATTR_USE_MFP, NL80211_MFP_REQUIRED);
8782
8783	if (params->disable_ht)
8784		NLA_PUT_FLAG(msg, NL80211_ATTR_DISABLE_HT);
8785
8786	if (params->htcaps && params->htcaps_mask) {
8787		int sz = sizeof(struct ieee80211_ht_capabilities);
8788		wpa_hexdump(MSG_DEBUG, "  * htcaps", params->htcaps, sz);
8789		NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY, sz, params->htcaps);
8790		wpa_hexdump(MSG_DEBUG, "  * htcaps_mask",
8791			    params->htcaps_mask, sz);
8792		NLA_PUT(msg, NL80211_ATTR_HT_CAPABILITY_MASK, sz,
8793			params->htcaps_mask);
8794	}
8795
8796#ifdef CONFIG_VHT_OVERRIDES
8797	if (params->disable_vht) {
8798		wpa_printf(MSG_DEBUG, "  * VHT disabled");
8799		NLA_PUT_FLAG(msg, NL80211_ATTR_DISABLE_VHT);
8800	}
8801
8802	if (params->vhtcaps && params->vhtcaps_mask) {
8803		int sz = sizeof(struct ieee80211_vht_capabilities);
8804		wpa_hexdump(MSG_DEBUG, "  * vhtcaps", params->vhtcaps, sz);
8805		NLA_PUT(msg, NL80211_ATTR_VHT_CAPABILITY, sz, params->vhtcaps);
8806		wpa_hexdump(MSG_DEBUG, "  * vhtcaps_mask",
8807			    params->vhtcaps_mask, sz);
8808		NLA_PUT(msg, NL80211_ATTR_VHT_CAPABILITY_MASK, sz,
8809			params->vhtcaps_mask);
8810	}
8811#endif /* CONFIG_VHT_OVERRIDES */
8812
8813	if (params->p2p)
8814		wpa_printf(MSG_DEBUG, "  * P2P group");
8815
8816	return 0;
8817nla_put_failure:
8818	return -1;
8819}
8820
8821
8822static int wpa_driver_nl80211_try_connect(
8823	struct wpa_driver_nl80211_data *drv,
8824	struct wpa_driver_associate_params *params)
8825{
8826	struct nl_msg *msg;
8827	enum nl80211_auth_type type;
8828	int ret;
8829	int algs;
8830
8831	msg = nlmsg_alloc();
8832	if (!msg)
8833		return -1;
8834
8835	wpa_printf(MSG_DEBUG, "nl80211: Connect (ifindex=%d)", drv->ifindex);
8836	nl80211_cmd(drv, msg, 0, NL80211_CMD_CONNECT);
8837
8838	ret = nl80211_connect_common(drv, params, msg);
8839	if (ret)
8840		goto nla_put_failure;
8841
8842	algs = 0;
8843	if (params->auth_alg & WPA_AUTH_ALG_OPEN)
8844		algs++;
8845	if (params->auth_alg & WPA_AUTH_ALG_SHARED)
8846		algs++;
8847	if (params->auth_alg & WPA_AUTH_ALG_LEAP)
8848		algs++;
8849	if (algs > 1) {
8850		wpa_printf(MSG_DEBUG, "  * Leave out Auth Type for automatic "
8851			   "selection");
8852		goto skip_auth_type;
8853	}
8854
8855	if (params->auth_alg & WPA_AUTH_ALG_OPEN)
8856		type = NL80211_AUTHTYPE_OPEN_SYSTEM;
8857	else if (params->auth_alg & WPA_AUTH_ALG_SHARED)
8858		type = NL80211_AUTHTYPE_SHARED_KEY;
8859	else if (params->auth_alg & WPA_AUTH_ALG_LEAP)
8860		type = NL80211_AUTHTYPE_NETWORK_EAP;
8861	else if (params->auth_alg & WPA_AUTH_ALG_FT)
8862		type = NL80211_AUTHTYPE_FT;
8863	else
8864		goto nla_put_failure;
8865
8866	wpa_printf(MSG_DEBUG, "  * Auth Type %d", type);
8867	NLA_PUT_U32(msg, NL80211_ATTR_AUTH_TYPE, type);
8868
8869skip_auth_type:
8870	ret = nl80211_set_conn_keys(params, msg);
8871	if (ret)
8872		goto nla_put_failure;
8873
8874	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8875	msg = NULL;
8876	if (ret) {
8877		wpa_printf(MSG_DEBUG, "nl80211: MLME connect failed: ret=%d "
8878			   "(%s)", ret, strerror(-ret));
8879		goto nla_put_failure;
8880	}
8881	ret = 0;
8882	wpa_printf(MSG_DEBUG, "nl80211: Connect request send successfully");
8883
8884nla_put_failure:
8885	nlmsg_free(msg);
8886	return ret;
8887
8888}
8889
8890
8891static int wpa_driver_nl80211_connect(
8892	struct wpa_driver_nl80211_data *drv,
8893	struct wpa_driver_associate_params *params)
8894{
8895	int ret = wpa_driver_nl80211_try_connect(drv, params);
8896	if (ret == -EALREADY) {
8897		/*
8898		 * cfg80211 does not currently accept new connections if
8899		 * we are already connected. As a workaround, force
8900		 * disconnection and try again.
8901		 */
8902		wpa_printf(MSG_DEBUG, "nl80211: Explicitly "
8903			   "disconnecting before reassociation "
8904			   "attempt");
8905		if (wpa_driver_nl80211_disconnect(
8906			    drv, WLAN_REASON_PREV_AUTH_NOT_VALID))
8907			return -1;
8908		ret = wpa_driver_nl80211_try_connect(drv, params);
8909	}
8910	return ret;
8911}
8912
8913
8914static int wpa_driver_nl80211_associate(
8915	void *priv, struct wpa_driver_associate_params *params)
8916{
8917	struct i802_bss *bss = priv;
8918	struct wpa_driver_nl80211_data *drv = bss->drv;
8919	int ret;
8920	struct nl_msg *msg;
8921
8922	if (params->mode == IEEE80211_MODE_AP)
8923		return wpa_driver_nl80211_ap(drv, params);
8924
8925	if (params->mode == IEEE80211_MODE_IBSS)
8926		return wpa_driver_nl80211_ibss(drv, params);
8927
8928	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_SME)) {
8929		enum nl80211_iftype nlmode = params->p2p ?
8930			NL80211_IFTYPE_P2P_CLIENT : NL80211_IFTYPE_STATION;
8931
8932		if (wpa_driver_nl80211_set_mode(priv, nlmode) < 0)
8933			return -1;
8934		return wpa_driver_nl80211_connect(drv, params);
8935	}
8936
8937	nl80211_mark_disconnected(drv);
8938
8939	msg = nlmsg_alloc();
8940	if (!msg)
8941		return -1;
8942
8943	wpa_printf(MSG_DEBUG, "nl80211: Associate (ifindex=%d)",
8944		   drv->ifindex);
8945	nl80211_cmd(drv, msg, 0, NL80211_CMD_ASSOCIATE);
8946
8947	ret = nl80211_connect_common(drv, params, msg);
8948	if (ret)
8949		goto nla_put_failure;
8950
8951	if (params->prev_bssid) {
8952		wpa_printf(MSG_DEBUG, "  * prev_bssid=" MACSTR,
8953			   MAC2STR(params->prev_bssid));
8954		NLA_PUT(msg, NL80211_ATTR_PREV_BSSID, ETH_ALEN,
8955			params->prev_bssid);
8956	}
8957
8958	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8959	msg = NULL;
8960	if (ret) {
8961		wpa_dbg(drv->ctx, MSG_DEBUG,
8962			"nl80211: MLME command failed (assoc): ret=%d (%s)",
8963			ret, strerror(-ret));
8964		nl80211_dump_scan(drv);
8965		goto nla_put_failure;
8966	}
8967	ret = 0;
8968	wpa_printf(MSG_DEBUG, "nl80211: Association request send "
8969		   "successfully");
8970
8971nla_put_failure:
8972	nlmsg_free(msg);
8973	return ret;
8974}
8975
8976
8977static int nl80211_set_mode(struct wpa_driver_nl80211_data *drv,
8978			    int ifindex, enum nl80211_iftype mode)
8979{
8980	struct nl_msg *msg;
8981	int ret = -ENOBUFS;
8982
8983	wpa_printf(MSG_DEBUG, "nl80211: Set mode ifindex %d iftype %d (%s)",
8984		   ifindex, mode, nl80211_iftype_str(mode));
8985
8986	msg = nlmsg_alloc();
8987	if (!msg)
8988		return -ENOMEM;
8989
8990	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_INTERFACE);
8991	if (nl80211_set_iface_id(msg, drv->first_bss) < 0)
8992		goto nla_put_failure;
8993	NLA_PUT_U32(msg, NL80211_ATTR_IFTYPE, mode);
8994
8995	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
8996	msg = NULL;
8997	if (!ret)
8998		return 0;
8999nla_put_failure:
9000	nlmsg_free(msg);
9001	wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface %d to mode %d:"
9002		   " %d (%s)", ifindex, mode, ret, strerror(-ret));
9003	return ret;
9004}
9005
9006
9007static int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
9008				       enum nl80211_iftype nlmode)
9009{
9010	struct wpa_driver_nl80211_data *drv = bss->drv;
9011	int ret = -1;
9012	int i;
9013	int was_ap = is_ap_interface(drv->nlmode);
9014	int res;
9015
9016	res = nl80211_set_mode(drv, drv->ifindex, nlmode);
9017	if (res && nlmode == nl80211_get_ifmode(bss))
9018		res = 0;
9019
9020	if (res == 0) {
9021		drv->nlmode = nlmode;
9022		ret = 0;
9023		goto done;
9024	}
9025
9026	if (res == -ENODEV)
9027		return -1;
9028
9029	if (nlmode == drv->nlmode) {
9030		wpa_printf(MSG_DEBUG, "nl80211: Interface already in "
9031			   "requested mode - ignore error");
9032		ret = 0;
9033		goto done; /* Already in the requested mode */
9034	}
9035
9036	/* mac80211 doesn't allow mode changes while the device is up, so
9037	 * take the device down, try to set the mode again, and bring the
9038	 * device back up.
9039	 */
9040	wpa_printf(MSG_DEBUG, "nl80211: Try mode change after setting "
9041		   "interface down");
9042	for (i = 0; i < 10; i++) {
9043		res = i802_set_iface_flags(bss, 0);
9044		if (res == -EACCES || res == -ENODEV)
9045			break;
9046		if (res == 0) {
9047			/* Try to set the mode again while the interface is
9048			 * down */
9049			ret = nl80211_set_mode(drv, drv->ifindex, nlmode);
9050			if (ret == -EACCES)
9051				break;
9052			res = i802_set_iface_flags(bss, 1);
9053			if (res && !ret)
9054				ret = -1;
9055			else if (ret != -EBUSY)
9056				break;
9057		} else
9058			wpa_printf(MSG_DEBUG, "nl80211: Failed to set "
9059				   "interface down");
9060		os_sleep(0, 100000);
9061	}
9062
9063	if (!ret) {
9064		wpa_printf(MSG_DEBUG, "nl80211: Mode change succeeded while "
9065			   "interface is down");
9066		drv->nlmode = nlmode;
9067		drv->ignore_if_down_event = 1;
9068	}
9069
9070done:
9071	if (ret) {
9072		wpa_printf(MSG_DEBUG, "nl80211: Interface mode change to %d "
9073			   "from %d failed", nlmode, drv->nlmode);
9074		return ret;
9075	}
9076
9077	if (is_p2p_net_interface(nlmode))
9078		nl80211_disable_11b_rates(drv, drv->ifindex, 1);
9079	else if (drv->disabled_11b_rates)
9080		nl80211_disable_11b_rates(drv, drv->ifindex, 0);
9081
9082	if (is_ap_interface(nlmode)) {
9083		nl80211_mgmt_unsubscribe(bss, "start AP");
9084		/* Setup additional AP mode functionality if needed */
9085		if (nl80211_setup_ap(bss))
9086			return -1;
9087	} else if (was_ap) {
9088		/* Remove additional AP mode functionality */
9089		nl80211_teardown_ap(bss);
9090	} else {
9091		nl80211_mgmt_unsubscribe(bss, "mode change");
9092	}
9093
9094	if (!bss->in_deinit && !is_ap_interface(nlmode) &&
9095	    nl80211_mgmt_subscribe_non_ap(bss) < 0)
9096		wpa_printf(MSG_DEBUG, "nl80211: Failed to register Action "
9097			   "frame processing - ignore for now");
9098
9099	return 0;
9100}
9101
9102
9103static int dfs_info_handler(struct nl_msg *msg, void *arg)
9104{
9105	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9106	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9107	int *dfs_capability_ptr = arg;
9108
9109	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9110		  genlmsg_attrlen(gnlh, 0), NULL);
9111
9112	if (tb[NL80211_ATTR_VENDOR_DATA]) {
9113		struct nlattr *nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
9114		struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_MAX + 1];
9115
9116		nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_MAX,
9117			  nla_data(nl_vend), nla_len(nl_vend), NULL);
9118
9119		if (tb_vendor[QCA_WLAN_VENDOR_ATTR_DFS]) {
9120			u32 val;
9121			val = nla_get_u32(tb_vendor[QCA_WLAN_VENDOR_ATTR_DFS]);
9122			wpa_printf(MSG_DEBUG, "nl80211: DFS offload capability: %u",
9123				   val);
9124			*dfs_capability_ptr = val;
9125		}
9126	}
9127
9128	return NL_SKIP;
9129}
9130
9131
9132static int wpa_driver_nl80211_get_capa(void *priv,
9133				       struct wpa_driver_capa *capa)
9134{
9135	struct i802_bss *bss = priv;
9136	struct wpa_driver_nl80211_data *drv = bss->drv;
9137	struct nl_msg *msg;
9138	int dfs_capability = 0;
9139	int ret = 0;
9140
9141	if (!drv->has_capability)
9142		return -1;
9143	os_memcpy(capa, &drv->capa, sizeof(*capa));
9144	if (drv->extended_capa && drv->extended_capa_mask) {
9145		capa->extended_capa = drv->extended_capa;
9146		capa->extended_capa_mask = drv->extended_capa_mask;
9147		capa->extended_capa_len = drv->extended_capa_len;
9148	}
9149
9150	if ((capa->flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE) &&
9151	    !drv->allow_p2p_device) {
9152		wpa_printf(MSG_DEBUG, "nl80211: Do not indicate P2P_DEVICE support (p2p_device=1 driver param not specified)");
9153		capa->flags &= ~WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE;
9154	}
9155
9156	if (drv->dfs_vendor_cmd_avail == 1) {
9157		msg = nlmsg_alloc();
9158		if (!msg)
9159			return -ENOMEM;
9160
9161		nl80211_cmd(drv, msg, 0, NL80211_CMD_VENDOR);
9162
9163		NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
9164		NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA);
9165		NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_SUBCMD,
9166			    QCA_NL80211_VENDOR_SUBCMD_DFS_CAPABILITY);
9167
9168		ret = send_and_recv_msgs(drv, msg, dfs_info_handler,
9169					 &dfs_capability);
9170		if (!ret) {
9171			if (dfs_capability)
9172				capa->flags |= WPA_DRIVER_FLAGS_DFS_OFFLOAD;
9173		}
9174	}
9175
9176	return ret;
9177
9178 nla_put_failure:
9179	nlmsg_free(msg);
9180	return -ENOBUFS;
9181}
9182
9183
9184static int wpa_driver_nl80211_set_operstate(void *priv, int state)
9185{
9186	struct i802_bss *bss = priv;
9187	struct wpa_driver_nl80211_data *drv = bss->drv;
9188
9189	wpa_printf(MSG_DEBUG, "nl80211: Set %s operstate %d->%d (%s)",
9190		   bss->ifname, drv->operstate, state,
9191		   state ? "UP" : "DORMANT");
9192	drv->operstate = state;
9193	return netlink_send_oper_ifla(drv->global->netlink, drv->ifindex, -1,
9194				      state ? IF_OPER_UP : IF_OPER_DORMANT);
9195}
9196
9197
9198static int wpa_driver_nl80211_set_supp_port(void *priv, int authorized)
9199{
9200	struct i802_bss *bss = priv;
9201	struct wpa_driver_nl80211_data *drv = bss->drv;
9202	struct nl_msg *msg;
9203	struct nl80211_sta_flag_update upd;
9204	int ret = -ENOBUFS;
9205
9206	if (!drv->associated && is_zero_ether_addr(drv->bssid) && !authorized) {
9207		wpa_printf(MSG_DEBUG, "nl80211: Skip set_supp_port(unauthorized) while not associated");
9208		return 0;
9209	}
9210
9211	wpa_printf(MSG_DEBUG, "nl80211: Set supplicant port %sauthorized for "
9212		   MACSTR, authorized ? "" : "un", MAC2STR(drv->bssid));
9213
9214	msg = nlmsg_alloc();
9215	if (!msg)
9216		return -ENOMEM;
9217
9218	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_STATION);
9219
9220	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
9221		    if_nametoindex(bss->ifname));
9222	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, drv->bssid);
9223
9224	os_memset(&upd, 0, sizeof(upd));
9225	upd.mask = BIT(NL80211_STA_FLAG_AUTHORIZED);
9226	if (authorized)
9227		upd.set = BIT(NL80211_STA_FLAG_AUTHORIZED);
9228	NLA_PUT(msg, NL80211_ATTR_STA_FLAGS2, sizeof(upd), &upd);
9229
9230	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
9231	msg = NULL;
9232	if (!ret)
9233		return 0;
9234 nla_put_failure:
9235	nlmsg_free(msg);
9236	wpa_printf(MSG_DEBUG, "nl80211: Failed to set STA flag: %d (%s)",
9237		   ret, strerror(-ret));
9238	return ret;
9239}
9240
9241
9242/* Set kernel driver on given frequency (MHz) */
9243static int i802_set_freq(void *priv, struct hostapd_freq_params *freq)
9244{
9245	struct i802_bss *bss = priv;
9246	return nl80211_set_channel(bss, freq, 0);
9247}
9248
9249
9250static inline int min_int(int a, int b)
9251{
9252	if (a < b)
9253		return a;
9254	return b;
9255}
9256
9257
9258static int get_key_handler(struct nl_msg *msg, void *arg)
9259{
9260	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9261	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9262
9263	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9264		  genlmsg_attrlen(gnlh, 0), NULL);
9265
9266	/*
9267	 * TODO: validate the key index and mac address!
9268	 * Otherwise, there's a race condition as soon as
9269	 * the kernel starts sending key notifications.
9270	 */
9271
9272	if (tb[NL80211_ATTR_KEY_SEQ])
9273		memcpy(arg, nla_data(tb[NL80211_ATTR_KEY_SEQ]),
9274		       min_int(nla_len(tb[NL80211_ATTR_KEY_SEQ]), 6));
9275	return NL_SKIP;
9276}
9277
9278
9279static int i802_get_seqnum(const char *iface, void *priv, const u8 *addr,
9280			   int idx, u8 *seq)
9281{
9282	struct i802_bss *bss = priv;
9283	struct wpa_driver_nl80211_data *drv = bss->drv;
9284	struct nl_msg *msg;
9285
9286	msg = nlmsg_alloc();
9287	if (!msg)
9288		return -ENOMEM;
9289
9290	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_KEY);
9291
9292	if (addr)
9293		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
9294	NLA_PUT_U8(msg, NL80211_ATTR_KEY_IDX, idx);
9295	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(iface));
9296
9297	memset(seq, 0, 6);
9298
9299	return send_and_recv_msgs(drv, msg, get_key_handler, seq);
9300 nla_put_failure:
9301	nlmsg_free(msg);
9302	return -ENOBUFS;
9303}
9304
9305
9306static int i802_set_rts(void *priv, int rts)
9307{
9308	struct i802_bss *bss = priv;
9309	struct wpa_driver_nl80211_data *drv = bss->drv;
9310	struct nl_msg *msg;
9311	int ret = -ENOBUFS;
9312	u32 val;
9313
9314	msg = nlmsg_alloc();
9315	if (!msg)
9316		return -ENOMEM;
9317
9318	if (rts >= 2347)
9319		val = (u32) -1;
9320	else
9321		val = rts;
9322
9323	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WIPHY);
9324	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
9325	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_RTS_THRESHOLD, val);
9326
9327	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
9328	msg = NULL;
9329	if (!ret)
9330		return 0;
9331nla_put_failure:
9332	nlmsg_free(msg);
9333	wpa_printf(MSG_DEBUG, "nl80211: Failed to set RTS threshold %d: "
9334		   "%d (%s)", rts, ret, strerror(-ret));
9335	return ret;
9336}
9337
9338
9339static int i802_set_frag(void *priv, int frag)
9340{
9341	struct i802_bss *bss = priv;
9342	struct wpa_driver_nl80211_data *drv = bss->drv;
9343	struct nl_msg *msg;
9344	int ret = -ENOBUFS;
9345	u32 val;
9346
9347	msg = nlmsg_alloc();
9348	if (!msg)
9349		return -ENOMEM;
9350
9351	if (frag >= 2346)
9352		val = (u32) -1;
9353	else
9354		val = frag;
9355
9356	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WIPHY);
9357	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
9358	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FRAG_THRESHOLD, val);
9359
9360	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
9361	msg = NULL;
9362	if (!ret)
9363		return 0;
9364nla_put_failure:
9365	nlmsg_free(msg);
9366	wpa_printf(MSG_DEBUG, "nl80211: Failed to set fragmentation threshold "
9367		   "%d: %d (%s)", frag, ret, strerror(-ret));
9368	return ret;
9369}
9370
9371
9372static int i802_flush(void *priv)
9373{
9374	struct i802_bss *bss = priv;
9375	struct wpa_driver_nl80211_data *drv = bss->drv;
9376	struct nl_msg *msg;
9377	int res;
9378
9379	msg = nlmsg_alloc();
9380	if (!msg)
9381		return -1;
9382
9383	wpa_printf(MSG_DEBUG, "nl80211: flush -> DEL_STATION %s (all)",
9384		   bss->ifname);
9385	nl80211_cmd(drv, msg, 0, NL80211_CMD_DEL_STATION);
9386
9387	/*
9388	 * XXX: FIX! this needs to flush all VLANs too
9389	 */
9390	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
9391		    if_nametoindex(bss->ifname));
9392
9393	res = send_and_recv_msgs(drv, msg, NULL, NULL);
9394	if (res) {
9395		wpa_printf(MSG_DEBUG, "nl80211: Station flush failed: ret=%d "
9396			   "(%s)", res, strerror(-res));
9397	}
9398	return res;
9399 nla_put_failure:
9400	nlmsg_free(msg);
9401	return -ENOBUFS;
9402}
9403
9404
9405static int get_sta_handler(struct nl_msg *msg, void *arg)
9406{
9407	struct nlattr *tb[NL80211_ATTR_MAX + 1];
9408	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
9409	struct hostap_sta_driver_data *data = arg;
9410	struct nlattr *stats[NL80211_STA_INFO_MAX + 1];
9411	static struct nla_policy stats_policy[NL80211_STA_INFO_MAX + 1] = {
9412		[NL80211_STA_INFO_INACTIVE_TIME] = { .type = NLA_U32 },
9413		[NL80211_STA_INFO_RX_BYTES] = { .type = NLA_U32 },
9414		[NL80211_STA_INFO_TX_BYTES] = { .type = NLA_U32 },
9415		[NL80211_STA_INFO_RX_PACKETS] = { .type = NLA_U32 },
9416		[NL80211_STA_INFO_TX_PACKETS] = { .type = NLA_U32 },
9417		[NL80211_STA_INFO_TX_FAILED] = { .type = NLA_U32 },
9418	};
9419
9420	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
9421		  genlmsg_attrlen(gnlh, 0), NULL);
9422
9423	/*
9424	 * TODO: validate the interface and mac address!
9425	 * Otherwise, there's a race condition as soon as
9426	 * the kernel starts sending station notifications.
9427	 */
9428
9429	if (!tb[NL80211_ATTR_STA_INFO]) {
9430		wpa_printf(MSG_DEBUG, "sta stats missing!");
9431		return NL_SKIP;
9432	}
9433	if (nla_parse_nested(stats, NL80211_STA_INFO_MAX,
9434			     tb[NL80211_ATTR_STA_INFO],
9435			     stats_policy)) {
9436		wpa_printf(MSG_DEBUG, "failed to parse nested attributes!");
9437		return NL_SKIP;
9438	}
9439
9440	if (stats[NL80211_STA_INFO_INACTIVE_TIME])
9441		data->inactive_msec =
9442			nla_get_u32(stats[NL80211_STA_INFO_INACTIVE_TIME]);
9443	if (stats[NL80211_STA_INFO_RX_BYTES])
9444		data->rx_bytes = nla_get_u32(stats[NL80211_STA_INFO_RX_BYTES]);
9445	if (stats[NL80211_STA_INFO_TX_BYTES])
9446		data->tx_bytes = nla_get_u32(stats[NL80211_STA_INFO_TX_BYTES]);
9447	if (stats[NL80211_STA_INFO_RX_PACKETS])
9448		data->rx_packets =
9449			nla_get_u32(stats[NL80211_STA_INFO_RX_PACKETS]);
9450	if (stats[NL80211_STA_INFO_TX_PACKETS])
9451		data->tx_packets =
9452			nla_get_u32(stats[NL80211_STA_INFO_TX_PACKETS]);
9453	if (stats[NL80211_STA_INFO_TX_FAILED])
9454		data->tx_retry_failed =
9455			nla_get_u32(stats[NL80211_STA_INFO_TX_FAILED]);
9456
9457	return NL_SKIP;
9458}
9459
9460static int i802_read_sta_data(struct i802_bss *bss,
9461			      struct hostap_sta_driver_data *data,
9462			      const u8 *addr)
9463{
9464	struct wpa_driver_nl80211_data *drv = bss->drv;
9465	struct nl_msg *msg;
9466
9467	os_memset(data, 0, sizeof(*data));
9468	msg = nlmsg_alloc();
9469	if (!msg)
9470		return -ENOMEM;
9471
9472	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_STATION);
9473
9474	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
9475	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
9476
9477	return send_and_recv_msgs(drv, msg, get_sta_handler, data);
9478 nla_put_failure:
9479	nlmsg_free(msg);
9480	return -ENOBUFS;
9481}
9482
9483
9484static int i802_set_tx_queue_params(void *priv, int queue, int aifs,
9485				    int cw_min, int cw_max, int burst_time)
9486{
9487	struct i802_bss *bss = priv;
9488	struct wpa_driver_nl80211_data *drv = bss->drv;
9489	struct nl_msg *msg;
9490	struct nlattr *txq, *params;
9491
9492	msg = nlmsg_alloc();
9493	if (!msg)
9494		return -1;
9495
9496	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WIPHY);
9497
9498	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
9499
9500	txq = nla_nest_start(msg, NL80211_ATTR_WIPHY_TXQ_PARAMS);
9501	if (!txq)
9502		goto nla_put_failure;
9503
9504	/* We are only sending parameters for a single TXQ at a time */
9505	params = nla_nest_start(msg, 1);
9506	if (!params)
9507		goto nla_put_failure;
9508
9509	switch (queue) {
9510	case 0:
9511		NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VO);
9512		break;
9513	case 1:
9514		NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_VI);
9515		break;
9516	case 2:
9517		NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BE);
9518		break;
9519	case 3:
9520		NLA_PUT_U8(msg, NL80211_TXQ_ATTR_QUEUE, NL80211_TXQ_Q_BK);
9521		break;
9522	}
9523	/* Burst time is configured in units of 0.1 msec and TXOP parameter in
9524	 * 32 usec, so need to convert the value here. */
9525	NLA_PUT_U16(msg, NL80211_TXQ_ATTR_TXOP, (burst_time * 100 + 16) / 32);
9526	NLA_PUT_U16(msg, NL80211_TXQ_ATTR_CWMIN, cw_min);
9527	NLA_PUT_U16(msg, NL80211_TXQ_ATTR_CWMAX, cw_max);
9528	NLA_PUT_U8(msg, NL80211_TXQ_ATTR_AIFS, aifs);
9529
9530	nla_nest_end(msg, params);
9531
9532	nla_nest_end(msg, txq);
9533
9534	if (send_and_recv_msgs(drv, msg, NULL, NULL) == 0)
9535		return 0;
9536	msg = NULL;
9537 nla_put_failure:
9538	nlmsg_free(msg);
9539	return -1;
9540}
9541
9542
9543static int i802_set_sta_vlan(struct i802_bss *bss, const u8 *addr,
9544			     const char *ifname, int vlan_id)
9545{
9546	struct wpa_driver_nl80211_data *drv = bss->drv;
9547	struct nl_msg *msg;
9548	int ret = -ENOBUFS;
9549
9550	msg = nlmsg_alloc();
9551	if (!msg)
9552		return -ENOMEM;
9553
9554	wpa_printf(MSG_DEBUG, "nl80211: %s[%d]: set_sta_vlan(" MACSTR
9555		   ", ifname=%s[%d], vlan_id=%d)",
9556		   bss->ifname, if_nametoindex(bss->ifname),
9557		   MAC2STR(addr), ifname, if_nametoindex(ifname), vlan_id);
9558	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_STATION);
9559
9560	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX,
9561		    if_nametoindex(bss->ifname));
9562	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
9563	NLA_PUT_U32(msg, NL80211_ATTR_STA_VLAN,
9564		    if_nametoindex(ifname));
9565
9566	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
9567	msg = NULL;
9568	if (ret < 0) {
9569		wpa_printf(MSG_ERROR, "nl80211: NL80211_ATTR_STA_VLAN (addr="
9570			   MACSTR " ifname=%s vlan_id=%d) failed: %d (%s)",
9571			   MAC2STR(addr), ifname, vlan_id, ret,
9572			   strerror(-ret));
9573	}
9574 nla_put_failure:
9575	nlmsg_free(msg);
9576	return ret;
9577}
9578
9579
9580static int i802_get_inact_sec(void *priv, const u8 *addr)
9581{
9582	struct hostap_sta_driver_data data;
9583	int ret;
9584
9585	data.inactive_msec = (unsigned long) -1;
9586	ret = i802_read_sta_data(priv, &data, addr);
9587	if (ret || data.inactive_msec == (unsigned long) -1)
9588		return -1;
9589	return data.inactive_msec / 1000;
9590}
9591
9592
9593static int i802_sta_clear_stats(void *priv, const u8 *addr)
9594{
9595#if 0
9596	/* TODO */
9597#endif
9598	return 0;
9599}
9600
9601
9602static int i802_sta_deauth(void *priv, const u8 *own_addr, const u8 *addr,
9603			   int reason)
9604{
9605	struct i802_bss *bss = priv;
9606	struct wpa_driver_nl80211_data *drv = bss->drv;
9607	struct ieee80211_mgmt mgmt;
9608
9609	if (drv->device_ap_sme)
9610		return wpa_driver_nl80211_sta_remove(bss, addr);
9611
9612	memset(&mgmt, 0, sizeof(mgmt));
9613	mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
9614					  WLAN_FC_STYPE_DEAUTH);
9615	memcpy(mgmt.da, addr, ETH_ALEN);
9616	memcpy(mgmt.sa, own_addr, ETH_ALEN);
9617	memcpy(mgmt.bssid, own_addr, ETH_ALEN);
9618	mgmt.u.deauth.reason_code = host_to_le16(reason);
9619	return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
9620					    IEEE80211_HDRLEN +
9621					    sizeof(mgmt.u.deauth), 0, 0, 0, 0,
9622					    0);
9623}
9624
9625
9626static int i802_sta_disassoc(void *priv, const u8 *own_addr, const u8 *addr,
9627			     int reason)
9628{
9629	struct i802_bss *bss = priv;
9630	struct wpa_driver_nl80211_data *drv = bss->drv;
9631	struct ieee80211_mgmt mgmt;
9632
9633	if (drv->device_ap_sme)
9634		return wpa_driver_nl80211_sta_remove(bss, addr);
9635
9636	memset(&mgmt, 0, sizeof(mgmt));
9637	mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
9638					  WLAN_FC_STYPE_DISASSOC);
9639	memcpy(mgmt.da, addr, ETH_ALEN);
9640	memcpy(mgmt.sa, own_addr, ETH_ALEN);
9641	memcpy(mgmt.bssid, own_addr, ETH_ALEN);
9642	mgmt.u.disassoc.reason_code = host_to_le16(reason);
9643	return wpa_driver_nl80211_send_mlme(bss, (u8 *) &mgmt,
9644					    IEEE80211_HDRLEN +
9645					    sizeof(mgmt.u.disassoc), 0, 0, 0, 0,
9646					    0);
9647}
9648
9649
9650static void dump_ifidx(struct wpa_driver_nl80211_data *drv)
9651{
9652	char buf[200], *pos, *end;
9653	int i, res;
9654
9655	pos = buf;
9656	end = pos + sizeof(buf);
9657
9658	for (i = 0; i < drv->num_if_indices; i++) {
9659		if (!drv->if_indices[i])
9660			continue;
9661		res = os_snprintf(pos, end - pos, " %d", drv->if_indices[i]);
9662		if (res < 0 || res >= end - pos)
9663			break;
9664		pos += res;
9665	}
9666	*pos = '\0';
9667
9668	wpa_printf(MSG_DEBUG, "nl80211: if_indices[%d]:%s",
9669		   drv->num_if_indices, buf);
9670}
9671
9672
9673static void add_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
9674{
9675	int i;
9676	int *old;
9677
9678	wpa_printf(MSG_DEBUG, "nl80211: Add own interface ifindex %d",
9679		   ifidx);
9680	if (have_ifidx(drv, ifidx)) {
9681		wpa_printf(MSG_DEBUG, "nl80211: ifindex %d already in the list",
9682			   ifidx);
9683		return;
9684	}
9685	for (i = 0; i < drv->num_if_indices; i++) {
9686		if (drv->if_indices[i] == 0) {
9687			drv->if_indices[i] = ifidx;
9688			dump_ifidx(drv);
9689			return;
9690		}
9691	}
9692
9693	if (drv->if_indices != drv->default_if_indices)
9694		old = drv->if_indices;
9695	else
9696		old = NULL;
9697
9698	drv->if_indices = os_realloc_array(old, drv->num_if_indices + 1,
9699					   sizeof(int));
9700	if (!drv->if_indices) {
9701		if (!old)
9702			drv->if_indices = drv->default_if_indices;
9703		else
9704			drv->if_indices = old;
9705		wpa_printf(MSG_ERROR, "Failed to reallocate memory for "
9706			   "interfaces");
9707		wpa_printf(MSG_ERROR, "Ignoring EAPOL on interface %d", ifidx);
9708		return;
9709	} else if (!old)
9710		os_memcpy(drv->if_indices, drv->default_if_indices,
9711			  sizeof(drv->default_if_indices));
9712	drv->if_indices[drv->num_if_indices] = ifidx;
9713	drv->num_if_indices++;
9714	dump_ifidx(drv);
9715}
9716
9717
9718static void del_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
9719{
9720	int i;
9721
9722	for (i = 0; i < drv->num_if_indices; i++) {
9723		if (drv->if_indices[i] == ifidx) {
9724			drv->if_indices[i] = 0;
9725			break;
9726		}
9727	}
9728	dump_ifidx(drv);
9729}
9730
9731
9732static int have_ifidx(struct wpa_driver_nl80211_data *drv, int ifidx)
9733{
9734	int i;
9735
9736	for (i = 0; i < drv->num_if_indices; i++)
9737		if (drv->if_indices[i] == ifidx)
9738			return 1;
9739
9740	return 0;
9741}
9742
9743
9744static int i802_set_wds_sta(void *priv, const u8 *addr, int aid, int val,
9745			    const char *bridge_ifname, char *ifname_wds)
9746{
9747	struct i802_bss *bss = priv;
9748	struct wpa_driver_nl80211_data *drv = bss->drv;
9749	char name[IFNAMSIZ + 1];
9750
9751	os_snprintf(name, sizeof(name), "%s.sta%d", bss->ifname, aid);
9752	if (ifname_wds)
9753		os_strlcpy(ifname_wds, name, IFNAMSIZ + 1);
9754
9755	wpa_printf(MSG_DEBUG, "nl80211: Set WDS STA addr=" MACSTR
9756		   " aid=%d val=%d name=%s", MAC2STR(addr), aid, val, name);
9757	if (val) {
9758		if (!if_nametoindex(name)) {
9759			if (nl80211_create_iface(drv, name,
9760						 NL80211_IFTYPE_AP_VLAN,
9761						 bss->addr, 1, NULL, NULL, 0) <
9762			    0)
9763				return -1;
9764			if (bridge_ifname &&
9765			    linux_br_add_if(drv->global->ioctl_sock,
9766					    bridge_ifname, name) < 0)
9767				return -1;
9768		}
9769		if (linux_set_iface_flags(drv->global->ioctl_sock, name, 1)) {
9770			wpa_printf(MSG_ERROR, "nl80211: Failed to set WDS STA "
9771				   "interface %s up", name);
9772		}
9773		return i802_set_sta_vlan(priv, addr, name, 0);
9774	} else {
9775		if (bridge_ifname)
9776			linux_br_del_if(drv->global->ioctl_sock, bridge_ifname,
9777					name);
9778
9779		i802_set_sta_vlan(priv, addr, bss->ifname, 0);
9780		nl80211_remove_iface(drv, if_nametoindex(name));
9781		return 0;
9782	}
9783}
9784
9785
9786static void handle_eapol(int sock, void *eloop_ctx, void *sock_ctx)
9787{
9788	struct wpa_driver_nl80211_data *drv = eloop_ctx;
9789	struct sockaddr_ll lladdr;
9790	unsigned char buf[3000];
9791	int len;
9792	socklen_t fromlen = sizeof(lladdr);
9793
9794	len = recvfrom(sock, buf, sizeof(buf), 0,
9795		       (struct sockaddr *)&lladdr, &fromlen);
9796	if (len < 0) {
9797		wpa_printf(MSG_ERROR, "nl80211: EAPOL recv failed: %s",
9798			   strerror(errno));
9799		return;
9800	}
9801
9802	if (have_ifidx(drv, lladdr.sll_ifindex))
9803		drv_event_eapol_rx(drv->ctx, lladdr.sll_addr, buf, len);
9804}
9805
9806
9807static int i802_check_bridge(struct wpa_driver_nl80211_data *drv,
9808			     struct i802_bss *bss,
9809			     const char *brname, const char *ifname)
9810{
9811	int ifindex;
9812	char in_br[IFNAMSIZ];
9813
9814	os_strlcpy(bss->brname, brname, IFNAMSIZ);
9815	ifindex = if_nametoindex(brname);
9816	if (ifindex == 0) {
9817		/*
9818		 * Bridge was configured, but the bridge device does
9819		 * not exist. Try to add it now.
9820		 */
9821		if (linux_br_add(drv->global->ioctl_sock, brname) < 0) {
9822			wpa_printf(MSG_ERROR, "nl80211: Failed to add the "
9823				   "bridge interface %s: %s",
9824				   brname, strerror(errno));
9825			return -1;
9826		}
9827		bss->added_bridge = 1;
9828		add_ifidx(drv, if_nametoindex(brname));
9829	}
9830
9831	if (linux_br_get(in_br, ifname) == 0) {
9832		if (os_strcmp(in_br, brname) == 0)
9833			return 0; /* already in the bridge */
9834
9835		wpa_printf(MSG_DEBUG, "nl80211: Removing interface %s from "
9836			   "bridge %s", ifname, in_br);
9837		if (linux_br_del_if(drv->global->ioctl_sock, in_br, ifname) <
9838		    0) {
9839			wpa_printf(MSG_ERROR, "nl80211: Failed to "
9840				   "remove interface %s from bridge "
9841				   "%s: %s",
9842				   ifname, brname, strerror(errno));
9843			return -1;
9844		}
9845	}
9846
9847	wpa_printf(MSG_DEBUG, "nl80211: Adding interface %s into bridge %s",
9848		   ifname, brname);
9849	if (linux_br_add_if(drv->global->ioctl_sock, brname, ifname) < 0) {
9850		wpa_printf(MSG_ERROR, "nl80211: Failed to add interface %s "
9851			   "into bridge %s: %s",
9852			   ifname, brname, strerror(errno));
9853		return -1;
9854	}
9855	bss->added_if_into_bridge = 1;
9856
9857	return 0;
9858}
9859
9860
9861static void *i802_init(struct hostapd_data *hapd,
9862		       struct wpa_init_params *params)
9863{
9864	struct wpa_driver_nl80211_data *drv;
9865	struct i802_bss *bss;
9866	size_t i;
9867	char brname[IFNAMSIZ];
9868	int ifindex, br_ifindex;
9869	int br_added = 0;
9870
9871	bss = wpa_driver_nl80211_drv_init(hapd, params->ifname,
9872					  params->global_priv, 1,
9873					  params->bssid);
9874	if (bss == NULL)
9875		return NULL;
9876
9877	drv = bss->drv;
9878
9879	if (linux_br_get(brname, params->ifname) == 0) {
9880		wpa_printf(MSG_DEBUG, "nl80211: Interface %s is in bridge %s",
9881			   params->ifname, brname);
9882		br_ifindex = if_nametoindex(brname);
9883	} else {
9884		brname[0] = '\0';
9885		br_ifindex = 0;
9886	}
9887
9888	for (i = 0; i < params->num_bridge; i++) {
9889		if (params->bridge[i]) {
9890			ifindex = if_nametoindex(params->bridge[i]);
9891			if (ifindex)
9892				add_ifidx(drv, ifindex);
9893			if (ifindex == br_ifindex)
9894				br_added = 1;
9895		}
9896	}
9897	if (!br_added && br_ifindex &&
9898	    (params->num_bridge == 0 || !params->bridge[0]))
9899		add_ifidx(drv, br_ifindex);
9900
9901	/* start listening for EAPOL on the default AP interface */
9902	add_ifidx(drv, drv->ifindex);
9903
9904	if (params->num_bridge && params->bridge[0] &&
9905	    i802_check_bridge(drv, bss, params->bridge[0], params->ifname) < 0)
9906		goto failed;
9907
9908	drv->eapol_sock = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_PAE));
9909	if (drv->eapol_sock < 0) {
9910		wpa_printf(MSG_ERROR, "nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s",
9911			   strerror(errno));
9912		goto failed;
9913	}
9914
9915	if (eloop_register_read_sock(drv->eapol_sock, handle_eapol, drv, NULL))
9916	{
9917		wpa_printf(MSG_INFO, "nl80211: Could not register read socket for eapol");
9918		goto failed;
9919	}
9920
9921	if (linux_get_ifhwaddr(drv->global->ioctl_sock, bss->ifname,
9922			       params->own_addr))
9923		goto failed;
9924
9925	memcpy(bss->addr, params->own_addr, ETH_ALEN);
9926
9927	return bss;
9928
9929failed:
9930	wpa_driver_nl80211_deinit(bss);
9931	return NULL;
9932}
9933
9934
9935static void i802_deinit(void *priv)
9936{
9937	struct i802_bss *bss = priv;
9938	wpa_driver_nl80211_deinit(bss);
9939}
9940
9941
9942static enum nl80211_iftype wpa_driver_nl80211_if_type(
9943	enum wpa_driver_if_type type)
9944{
9945	switch (type) {
9946	case WPA_IF_STATION:
9947		return NL80211_IFTYPE_STATION;
9948	case WPA_IF_P2P_CLIENT:
9949	case WPA_IF_P2P_GROUP:
9950		return NL80211_IFTYPE_P2P_CLIENT;
9951	case WPA_IF_AP_VLAN:
9952		return NL80211_IFTYPE_AP_VLAN;
9953	case WPA_IF_AP_BSS:
9954		return NL80211_IFTYPE_AP;
9955	case WPA_IF_P2P_GO:
9956		return NL80211_IFTYPE_P2P_GO;
9957	case WPA_IF_P2P_DEVICE:
9958		return NL80211_IFTYPE_P2P_DEVICE;
9959	}
9960	return -1;
9961}
9962
9963
9964#ifdef CONFIG_P2P
9965
9966static int nl80211_addr_in_use(struct nl80211_global *global, const u8 *addr)
9967{
9968	struct wpa_driver_nl80211_data *drv;
9969	dl_list_for_each(drv, &global->interfaces,
9970			 struct wpa_driver_nl80211_data, list) {
9971		if (os_memcmp(addr, drv->first_bss->addr, ETH_ALEN) == 0)
9972			return 1;
9973	}
9974	return 0;
9975}
9976
9977
9978static int nl80211_p2p_interface_addr(struct wpa_driver_nl80211_data *drv,
9979				      u8 *new_addr)
9980{
9981	unsigned int idx;
9982
9983	if (!drv->global)
9984		return -1;
9985
9986	os_memcpy(new_addr, drv->first_bss->addr, ETH_ALEN);
9987	for (idx = 0; idx < 64; idx++) {
9988		new_addr[0] = drv->first_bss->addr[0] | 0x02;
9989		new_addr[0] ^= idx << 2;
9990		if (!nl80211_addr_in_use(drv->global, new_addr))
9991			break;
9992	}
9993	if (idx == 64)
9994		return -1;
9995
9996	wpa_printf(MSG_DEBUG, "nl80211: Assigned new P2P Interface Address "
9997		   MACSTR, MAC2STR(new_addr));
9998
9999	return 0;
10000}
10001
10002#endif /* CONFIG_P2P */
10003
10004
10005struct wdev_info {
10006	u64 wdev_id;
10007	int wdev_id_set;
10008	u8 macaddr[ETH_ALEN];
10009};
10010
10011static int nl80211_wdev_handler(struct nl_msg *msg, void *arg)
10012{
10013	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
10014	struct nlattr *tb[NL80211_ATTR_MAX + 1];
10015	struct wdev_info *wi = arg;
10016
10017	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10018		  genlmsg_attrlen(gnlh, 0), NULL);
10019	if (tb[NL80211_ATTR_WDEV]) {
10020		wi->wdev_id = nla_get_u64(tb[NL80211_ATTR_WDEV]);
10021		wi->wdev_id_set = 1;
10022	}
10023
10024	if (tb[NL80211_ATTR_MAC])
10025		os_memcpy(wi->macaddr, nla_data(tb[NL80211_ATTR_MAC]),
10026			  ETH_ALEN);
10027
10028	return NL_SKIP;
10029}
10030
10031
10032static int wpa_driver_nl80211_if_add(void *priv, enum wpa_driver_if_type type,
10033				     const char *ifname, const u8 *addr,
10034				     void *bss_ctx, void **drv_priv,
10035				     char *force_ifname, u8 *if_addr,
10036				     const char *bridge, int use_existing)
10037{
10038	enum nl80211_iftype nlmode;
10039	struct i802_bss *bss = priv;
10040	struct wpa_driver_nl80211_data *drv = bss->drv;
10041	int ifidx;
10042	int added = 1;
10043
10044	if (addr)
10045		os_memcpy(if_addr, addr, ETH_ALEN);
10046	nlmode = wpa_driver_nl80211_if_type(type);
10047	if (nlmode == NL80211_IFTYPE_P2P_DEVICE) {
10048		struct wdev_info p2pdev_info;
10049
10050		os_memset(&p2pdev_info, 0, sizeof(p2pdev_info));
10051		ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
10052					     0, nl80211_wdev_handler,
10053					     &p2pdev_info, use_existing);
10054		if (!p2pdev_info.wdev_id_set || ifidx != 0) {
10055			wpa_printf(MSG_ERROR, "nl80211: Failed to create a P2P Device interface %s",
10056				   ifname);
10057			return -1;
10058		}
10059
10060		drv->global->if_add_wdevid = p2pdev_info.wdev_id;
10061		drv->global->if_add_wdevid_set = p2pdev_info.wdev_id_set;
10062		if (!is_zero_ether_addr(p2pdev_info.macaddr))
10063			os_memcpy(if_addr, p2pdev_info.macaddr, ETH_ALEN);
10064		wpa_printf(MSG_DEBUG, "nl80211: New P2P Device interface %s (0x%llx) created",
10065			   ifname,
10066			   (long long unsigned int) p2pdev_info.wdev_id);
10067	} else {
10068		ifidx = nl80211_create_iface(drv, ifname, nlmode, addr,
10069					     0, NULL, NULL, use_existing);
10070		if (use_existing && ifidx == -ENFILE) {
10071			added = 0;
10072			ifidx = if_nametoindex(ifname);
10073		} else if (ifidx < 0) {
10074			return -1;
10075		}
10076	}
10077
10078	if (!addr) {
10079		if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
10080			os_memcpy(if_addr, bss->addr, ETH_ALEN);
10081		else if (linux_get_ifhwaddr(drv->global->ioctl_sock,
10082					    bss->ifname, if_addr) < 0) {
10083			if (added)
10084				nl80211_remove_iface(drv, ifidx);
10085			return -1;
10086		}
10087	}
10088
10089#ifdef CONFIG_P2P
10090	if (!addr &&
10091	    (type == WPA_IF_P2P_CLIENT || type == WPA_IF_P2P_GROUP ||
10092	     type == WPA_IF_P2P_GO)) {
10093		/* Enforce unique P2P Interface Address */
10094		u8 new_addr[ETH_ALEN];
10095
10096		if (linux_get_ifhwaddr(drv->global->ioctl_sock, ifname,
10097				       new_addr) < 0) {
10098			nl80211_remove_iface(drv, ifidx);
10099			return -1;
10100		}
10101		if (nl80211_addr_in_use(drv->global, new_addr)) {
10102			wpa_printf(MSG_DEBUG, "nl80211: Allocate new address "
10103				   "for P2P group interface");
10104			if (nl80211_p2p_interface_addr(drv, new_addr) < 0) {
10105				nl80211_remove_iface(drv, ifidx);
10106				return -1;
10107			}
10108			if (linux_set_ifhwaddr(drv->global->ioctl_sock, ifname,
10109					       new_addr) < 0) {
10110				nl80211_remove_iface(drv, ifidx);
10111				return -1;
10112			}
10113		}
10114		os_memcpy(if_addr, new_addr, ETH_ALEN);
10115	}
10116#endif /* CONFIG_P2P */
10117
10118	if (type == WPA_IF_AP_BSS) {
10119		struct i802_bss *new_bss = os_zalloc(sizeof(*new_bss));
10120		if (new_bss == NULL) {
10121			if (added)
10122				nl80211_remove_iface(drv, ifidx);
10123			return -1;
10124		}
10125
10126		if (bridge &&
10127		    i802_check_bridge(drv, new_bss, bridge, ifname) < 0) {
10128			wpa_printf(MSG_ERROR, "nl80211: Failed to add the new "
10129				   "interface %s to a bridge %s",
10130				   ifname, bridge);
10131			if (added)
10132				nl80211_remove_iface(drv, ifidx);
10133			os_free(new_bss);
10134			return -1;
10135		}
10136
10137		if (linux_set_iface_flags(drv->global->ioctl_sock, ifname, 1))
10138		{
10139			nl80211_remove_iface(drv, ifidx);
10140			os_free(new_bss);
10141			return -1;
10142		}
10143		os_strlcpy(new_bss->ifname, ifname, IFNAMSIZ);
10144		os_memcpy(new_bss->addr, if_addr, ETH_ALEN);
10145		new_bss->ifindex = ifidx;
10146		new_bss->drv = drv;
10147		new_bss->next = drv->first_bss->next;
10148		new_bss->freq = drv->first_bss->freq;
10149		new_bss->ctx = bss_ctx;
10150		new_bss->added_if = added;
10151		drv->first_bss->next = new_bss;
10152		if (drv_priv)
10153			*drv_priv = new_bss;
10154		nl80211_init_bss(new_bss);
10155
10156		/* Subscribe management frames for this WPA_IF_AP_BSS */
10157		if (nl80211_setup_ap(new_bss))
10158			return -1;
10159	}
10160
10161	if (drv->global)
10162		drv->global->if_add_ifindex = ifidx;
10163
10164	if (ifidx > 0)
10165		add_ifidx(drv, ifidx);
10166
10167	return 0;
10168}
10169
10170
10171static int wpa_driver_nl80211_if_remove(struct i802_bss *bss,
10172					enum wpa_driver_if_type type,
10173					const char *ifname)
10174{
10175	struct wpa_driver_nl80211_data *drv = bss->drv;
10176	int ifindex = if_nametoindex(ifname);
10177
10178	wpa_printf(MSG_DEBUG, "nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d",
10179		   __func__, type, ifname, ifindex, bss->added_if);
10180	if (ifindex > 0 && (bss->added_if || bss->ifindex != ifindex))
10181		nl80211_remove_iface(drv, ifindex);
10182	else if (ifindex > 0 && !bss->added_if)
10183		del_ifidx(drv, ifindex);
10184
10185	if (type != WPA_IF_AP_BSS)
10186		return 0;
10187
10188	if (bss->added_if_into_bridge) {
10189		if (linux_br_del_if(drv->global->ioctl_sock, bss->brname,
10190				    bss->ifname) < 0)
10191			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
10192				   "interface %s from bridge %s: %s",
10193				   bss->ifname, bss->brname, strerror(errno));
10194	}
10195	if (bss->added_bridge) {
10196		if (linux_br_del(drv->global->ioctl_sock, bss->brname) < 0)
10197			wpa_printf(MSG_INFO, "nl80211: Failed to remove "
10198				   "bridge %s: %s",
10199				   bss->brname, strerror(errno));
10200	}
10201
10202	if (bss != drv->first_bss) {
10203		struct i802_bss *tbss;
10204
10205		wpa_printf(MSG_DEBUG, "nl80211: Not the first BSS - remove it");
10206		for (tbss = drv->first_bss; tbss; tbss = tbss->next) {
10207			if (tbss->next == bss) {
10208				tbss->next = bss->next;
10209				/* Unsubscribe management frames */
10210				nl80211_teardown_ap(bss);
10211				nl80211_destroy_bss(bss);
10212				if (!bss->added_if)
10213					i802_set_iface_flags(bss, 0);
10214				os_free(bss);
10215				bss = NULL;
10216				break;
10217			}
10218		}
10219		if (bss)
10220			wpa_printf(MSG_INFO, "nl80211: %s - could not find "
10221				   "BSS %p in the list", __func__, bss);
10222	} else {
10223		wpa_printf(MSG_DEBUG, "nl80211: First BSS - reassign context");
10224		nl80211_teardown_ap(bss);
10225		if (!bss->added_if && !drv->first_bss->next)
10226			wpa_driver_nl80211_del_beacon(drv);
10227		nl80211_destroy_bss(bss);
10228		if (!bss->added_if)
10229			i802_set_iface_flags(bss, 0);
10230		if (drv->first_bss->next) {
10231			drv->first_bss = drv->first_bss->next;
10232			drv->ctx = drv->first_bss->ctx;
10233			os_free(bss);
10234		} else {
10235			wpa_printf(MSG_DEBUG, "nl80211: No second BSS to reassign context to");
10236		}
10237	}
10238
10239	return 0;
10240}
10241
10242
10243static int cookie_handler(struct nl_msg *msg, void *arg)
10244{
10245	struct nlattr *tb[NL80211_ATTR_MAX + 1];
10246	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
10247	u64 *cookie = arg;
10248	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10249		  genlmsg_attrlen(gnlh, 0), NULL);
10250	if (tb[NL80211_ATTR_COOKIE])
10251		*cookie = nla_get_u64(tb[NL80211_ATTR_COOKIE]);
10252	return NL_SKIP;
10253}
10254
10255
10256static int nl80211_send_frame_cmd(struct i802_bss *bss,
10257				  unsigned int freq, unsigned int wait,
10258				  const u8 *buf, size_t buf_len,
10259				  u64 *cookie_out, int no_cck, int no_ack,
10260				  int offchanok)
10261{
10262	struct wpa_driver_nl80211_data *drv = bss->drv;
10263	struct nl_msg *msg;
10264	u64 cookie;
10265	int ret = -1;
10266
10267	msg = nlmsg_alloc();
10268	if (!msg)
10269		return -1;
10270
10271	wpa_printf(MSG_MSGDUMP, "nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d "
10272		   "no_ack=%d offchanok=%d",
10273		   freq, wait, no_cck, no_ack, offchanok);
10274	wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len);
10275	nl80211_cmd(drv, msg, 0, NL80211_CMD_FRAME);
10276
10277	if (nl80211_set_iface_id(msg, bss) < 0)
10278		goto nla_put_failure;
10279	if (freq)
10280		NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
10281	if (wait)
10282		NLA_PUT_U32(msg, NL80211_ATTR_DURATION, wait);
10283	if (offchanok && ((drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
10284			  drv->test_use_roc_tx))
10285		NLA_PUT_FLAG(msg, NL80211_ATTR_OFFCHANNEL_TX_OK);
10286	if (no_cck)
10287		NLA_PUT_FLAG(msg, NL80211_ATTR_TX_NO_CCK_RATE);
10288	if (no_ack)
10289		NLA_PUT_FLAG(msg, NL80211_ATTR_DONT_WAIT_FOR_ACK);
10290
10291	NLA_PUT(msg, NL80211_ATTR_FRAME, buf_len, buf);
10292
10293	cookie = 0;
10294	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie);
10295	msg = NULL;
10296	if (ret) {
10297		wpa_printf(MSG_DEBUG, "nl80211: Frame command failed: ret=%d "
10298			   "(%s) (freq=%u wait=%u)", ret, strerror(-ret),
10299			   freq, wait);
10300		goto nla_put_failure;
10301	}
10302	wpa_printf(MSG_MSGDUMP, "nl80211: Frame TX command accepted%s; "
10303		   "cookie 0x%llx", no_ack ? " (no ACK)" : "",
10304		   (long long unsigned int) cookie);
10305
10306	if (cookie_out)
10307		*cookie_out = no_ack ? (u64) -1 : cookie;
10308
10309nla_put_failure:
10310	nlmsg_free(msg);
10311	return ret;
10312}
10313
10314
10315static int wpa_driver_nl80211_send_action(struct i802_bss *bss,
10316					  unsigned int freq,
10317					  unsigned int wait_time,
10318					  const u8 *dst, const u8 *src,
10319					  const u8 *bssid,
10320					  const u8 *data, size_t data_len,
10321					  int no_cck)
10322{
10323	struct wpa_driver_nl80211_data *drv = bss->drv;
10324	int ret = -1;
10325	u8 *buf;
10326	struct ieee80211_hdr *hdr;
10327
10328	wpa_printf(MSG_DEBUG, "nl80211: Send Action frame (ifindex=%d, "
10329		   "freq=%u MHz wait=%d ms no_cck=%d)",
10330		   drv->ifindex, freq, wait_time, no_cck);
10331
10332	buf = os_zalloc(24 + data_len);
10333	if (buf == NULL)
10334		return ret;
10335	os_memcpy(buf + 24, data, data_len);
10336	hdr = (struct ieee80211_hdr *) buf;
10337	hdr->frame_control =
10338		IEEE80211_FC(WLAN_FC_TYPE_MGMT, WLAN_FC_STYPE_ACTION);
10339	os_memcpy(hdr->addr1, dst, ETH_ALEN);
10340	os_memcpy(hdr->addr2, src, ETH_ALEN);
10341	os_memcpy(hdr->addr3, bssid, ETH_ALEN);
10342
10343	if (is_ap_interface(drv->nlmode) &&
10344	    (!(drv->capa.flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX) ||
10345	     (int) freq == bss->freq || drv->device_ap_sme ||
10346	     !drv->use_monitor))
10347		ret = wpa_driver_nl80211_send_mlme(bss, buf, 24 + data_len,
10348						   0, freq, no_cck, 1,
10349						   wait_time);
10350	else
10351		ret = nl80211_send_frame_cmd(bss, freq, wait_time, buf,
10352					     24 + data_len,
10353					     &drv->send_action_cookie,
10354					     no_cck, 0, 1);
10355
10356	os_free(buf);
10357	return ret;
10358}
10359
10360
10361static void wpa_driver_nl80211_send_action_cancel_wait(void *priv)
10362{
10363	struct i802_bss *bss = priv;
10364	struct wpa_driver_nl80211_data *drv = bss->drv;
10365	struct nl_msg *msg;
10366	int ret;
10367
10368	msg = nlmsg_alloc();
10369	if (!msg)
10370		return;
10371
10372	wpa_printf(MSG_DEBUG, "nl80211: Cancel TX frame wait: cookie=0x%llx",
10373		   (long long unsigned int) drv->send_action_cookie);
10374	nl80211_cmd(drv, msg, 0, NL80211_CMD_FRAME_WAIT_CANCEL);
10375
10376	if (nl80211_set_iface_id(msg, bss) < 0)
10377		goto nla_put_failure;
10378	NLA_PUT_U64(msg, NL80211_ATTR_COOKIE, drv->send_action_cookie);
10379
10380	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
10381	msg = NULL;
10382	if (ret)
10383		wpa_printf(MSG_DEBUG, "nl80211: wait cancel failed: ret=%d "
10384			   "(%s)", ret, strerror(-ret));
10385
10386 nla_put_failure:
10387	nlmsg_free(msg);
10388}
10389
10390
10391static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq,
10392						unsigned int duration)
10393{
10394	struct i802_bss *bss = priv;
10395	struct wpa_driver_nl80211_data *drv = bss->drv;
10396	struct nl_msg *msg;
10397	int ret;
10398	u64 cookie;
10399
10400	msg = nlmsg_alloc();
10401	if (!msg)
10402		return -1;
10403
10404	nl80211_cmd(drv, msg, 0, NL80211_CMD_REMAIN_ON_CHANNEL);
10405
10406	if (nl80211_set_iface_id(msg, bss) < 0)
10407		goto nla_put_failure;
10408
10409	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq);
10410	NLA_PUT_U32(msg, NL80211_ATTR_DURATION, duration);
10411
10412	cookie = 0;
10413	ret = send_and_recv_msgs(drv, msg, cookie_handler, &cookie);
10414	msg = NULL;
10415	if (ret == 0) {
10416		wpa_printf(MSG_DEBUG, "nl80211: Remain-on-channel cookie "
10417			   "0x%llx for freq=%u MHz duration=%u",
10418			   (long long unsigned int) cookie, freq, duration);
10419		drv->remain_on_chan_cookie = cookie;
10420		drv->pending_remain_on_chan = 1;
10421		return 0;
10422	}
10423	wpa_printf(MSG_DEBUG, "nl80211: Failed to request remain-on-channel "
10424		   "(freq=%d duration=%u): %d (%s)",
10425		   freq, duration, ret, strerror(-ret));
10426nla_put_failure:
10427	nlmsg_free(msg);
10428	return -1;
10429}
10430
10431
10432static int wpa_driver_nl80211_cancel_remain_on_channel(void *priv)
10433{
10434	struct i802_bss *bss = priv;
10435	struct wpa_driver_nl80211_data *drv = bss->drv;
10436	struct nl_msg *msg;
10437	int ret;
10438
10439	if (!drv->pending_remain_on_chan) {
10440		wpa_printf(MSG_DEBUG, "nl80211: No pending remain-on-channel "
10441			   "to cancel");
10442		return -1;
10443	}
10444
10445	wpa_printf(MSG_DEBUG, "nl80211: Cancel remain-on-channel with cookie "
10446		   "0x%llx",
10447		   (long long unsigned int) drv->remain_on_chan_cookie);
10448
10449	msg = nlmsg_alloc();
10450	if (!msg)
10451		return -1;
10452
10453	nl80211_cmd(drv, msg, 0, NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL);
10454
10455	if (nl80211_set_iface_id(msg, bss) < 0)
10456		goto nla_put_failure;
10457
10458	NLA_PUT_U64(msg, NL80211_ATTR_COOKIE, drv->remain_on_chan_cookie);
10459
10460	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
10461	msg = NULL;
10462	if (ret == 0)
10463		return 0;
10464	wpa_printf(MSG_DEBUG, "nl80211: Failed to cancel remain-on-channel: "
10465		   "%d (%s)", ret, strerror(-ret));
10466nla_put_failure:
10467	nlmsg_free(msg);
10468	return -1;
10469}
10470
10471
10472static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report)
10473{
10474	struct wpa_driver_nl80211_data *drv = bss->drv;
10475
10476	if (!report) {
10477		if (bss->nl_preq && drv->device_ap_sme &&
10478		    is_ap_interface(drv->nlmode)) {
10479			/*
10480			 * Do not disable Probe Request reporting that was
10481			 * enabled in nl80211_setup_ap().
10482			 */
10483			wpa_printf(MSG_DEBUG, "nl80211: Skip disabling of "
10484				   "Probe Request reporting nl_preq=%p while "
10485				   "in AP mode", bss->nl_preq);
10486		} else if (bss->nl_preq) {
10487			wpa_printf(MSG_DEBUG, "nl80211: Disable Probe Request "
10488				   "reporting nl_preq=%p", bss->nl_preq);
10489			nl80211_destroy_eloop_handle(&bss->nl_preq);
10490		}
10491		return 0;
10492	}
10493
10494	if (bss->nl_preq) {
10495		wpa_printf(MSG_DEBUG, "nl80211: Probe Request reporting "
10496			   "already on! nl_preq=%p", bss->nl_preq);
10497		return 0;
10498	}
10499
10500	bss->nl_preq = nl_create_handle(drv->global->nl_cb, "preq");
10501	if (bss->nl_preq == NULL)
10502		return -1;
10503	wpa_printf(MSG_DEBUG, "nl80211: Enable Probe Request "
10504		   "reporting nl_preq=%p", bss->nl_preq);
10505
10506	if (nl80211_register_frame(bss, bss->nl_preq,
10507				   (WLAN_FC_TYPE_MGMT << 2) |
10508				   (WLAN_FC_STYPE_PROBE_REQ << 4),
10509				   NULL, 0) < 0)
10510		goto out_err;
10511
10512	nl80211_register_eloop_read(&bss->nl_preq,
10513				    wpa_driver_nl80211_event_receive,
10514				    bss->nl_cb);
10515
10516	return 0;
10517
10518 out_err:
10519	nl_destroy_handles(&bss->nl_preq);
10520	return -1;
10521}
10522
10523
10524static int nl80211_disable_11b_rates(struct wpa_driver_nl80211_data *drv,
10525				     int ifindex, int disabled)
10526{
10527	struct nl_msg *msg;
10528	struct nlattr *bands, *band;
10529	int ret;
10530
10531	msg = nlmsg_alloc();
10532	if (!msg)
10533		return -1;
10534
10535	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_TX_BITRATE_MASK);
10536	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, ifindex);
10537
10538	bands = nla_nest_start(msg, NL80211_ATTR_TX_RATES);
10539	if (!bands)
10540		goto nla_put_failure;
10541
10542	/*
10543	 * Disable 2 GHz rates 1, 2, 5.5, 11 Mbps by masking out everything
10544	 * else apart from 6, 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS
10545	 * rates. All 5 GHz rates are left enabled.
10546	 */
10547	band = nla_nest_start(msg, NL80211_BAND_2GHZ);
10548	if (!band)
10549		goto nla_put_failure;
10550	if (disabled) {
10551		NLA_PUT(msg, NL80211_TXRATE_LEGACY, 8,
10552			"\x0c\x12\x18\x24\x30\x48\x60\x6c");
10553	}
10554	nla_nest_end(msg, band);
10555
10556	nla_nest_end(msg, bands);
10557
10558	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
10559	msg = NULL;
10560	if (ret) {
10561		wpa_printf(MSG_DEBUG, "nl80211: Set TX rates failed: ret=%d "
10562			   "(%s)", ret, strerror(-ret));
10563	} else
10564		drv->disabled_11b_rates = disabled;
10565
10566	return ret;
10567
10568nla_put_failure:
10569	nlmsg_free(msg);
10570	return -1;
10571}
10572
10573
10574static int wpa_driver_nl80211_deinit_ap(void *priv)
10575{
10576	struct i802_bss *bss = priv;
10577	struct wpa_driver_nl80211_data *drv = bss->drv;
10578	if (!is_ap_interface(drv->nlmode))
10579		return -1;
10580	wpa_driver_nl80211_del_beacon(drv);
10581
10582	/*
10583	 * If the P2P GO interface was dynamically added, then it is
10584	 * possible that the interface change to station is not possible.
10585	 */
10586	if (drv->nlmode == NL80211_IFTYPE_P2P_GO && bss->if_dynamic)
10587		return 0;
10588
10589	return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
10590}
10591
10592
10593static int wpa_driver_nl80211_stop_ap(void *priv)
10594{
10595	struct i802_bss *bss = priv;
10596	struct wpa_driver_nl80211_data *drv = bss->drv;
10597	if (!is_ap_interface(drv->nlmode))
10598		return -1;
10599	wpa_driver_nl80211_del_beacon(drv);
10600	bss->beacon_set = 0;
10601	return 0;
10602}
10603
10604
10605static int wpa_driver_nl80211_deinit_p2p_cli(void *priv)
10606{
10607	struct i802_bss *bss = priv;
10608	struct wpa_driver_nl80211_data *drv = bss->drv;
10609	if (drv->nlmode != NL80211_IFTYPE_P2P_CLIENT)
10610		return -1;
10611
10612	/*
10613	 * If the P2P Client interface was dynamically added, then it is
10614	 * possible that the interface change to station is not possible.
10615	 */
10616	if (bss->if_dynamic)
10617		return 0;
10618
10619	return wpa_driver_nl80211_set_mode(priv, NL80211_IFTYPE_STATION);
10620}
10621
10622
10623static void wpa_driver_nl80211_resume(void *priv)
10624{
10625	struct i802_bss *bss = priv;
10626
10627	if (i802_set_iface_flags(bss, 1))
10628		wpa_printf(MSG_DEBUG, "nl80211: Failed to set interface up on resume event");
10629}
10630
10631
10632static int nl80211_send_ft_action(void *priv, u8 action, const u8 *target_ap,
10633				  const u8 *ies, size_t ies_len)
10634{
10635	struct i802_bss *bss = priv;
10636	struct wpa_driver_nl80211_data *drv = bss->drv;
10637	int ret;
10638	u8 *data, *pos;
10639	size_t data_len;
10640	const u8 *own_addr = bss->addr;
10641
10642	if (action != 1) {
10643		wpa_printf(MSG_ERROR, "nl80211: Unsupported send_ft_action "
10644			   "action %d", action);
10645		return -1;
10646	}
10647
10648	/*
10649	 * Action frame payload:
10650	 * Category[1] = 6 (Fast BSS Transition)
10651	 * Action[1] = 1 (Fast BSS Transition Request)
10652	 * STA Address
10653	 * Target AP Address
10654	 * FT IEs
10655	 */
10656
10657	data_len = 2 + 2 * ETH_ALEN + ies_len;
10658	data = os_malloc(data_len);
10659	if (data == NULL)
10660		return -1;
10661	pos = data;
10662	*pos++ = 0x06; /* FT Action category */
10663	*pos++ = action;
10664	os_memcpy(pos, own_addr, ETH_ALEN);
10665	pos += ETH_ALEN;
10666	os_memcpy(pos, target_ap, ETH_ALEN);
10667	pos += ETH_ALEN;
10668	os_memcpy(pos, ies, ies_len);
10669
10670	ret = wpa_driver_nl80211_send_action(bss, drv->assoc_freq, 0,
10671					     drv->bssid, own_addr, drv->bssid,
10672					     data, data_len, 0);
10673	os_free(data);
10674
10675	return ret;
10676}
10677
10678
10679static int nl80211_signal_monitor(void *priv, int threshold, int hysteresis)
10680{
10681	struct i802_bss *bss = priv;
10682	struct wpa_driver_nl80211_data *drv = bss->drv;
10683	struct nl_msg *msg;
10684	struct nlattr *cqm;
10685	int ret = -1;
10686
10687	wpa_printf(MSG_DEBUG, "nl80211: Signal monitor threshold=%d "
10688		   "hysteresis=%d", threshold, hysteresis);
10689
10690	msg = nlmsg_alloc();
10691	if (!msg)
10692		return -1;
10693
10694	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_CQM);
10695
10696	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
10697
10698	cqm = nla_nest_start(msg, NL80211_ATTR_CQM);
10699	if (cqm == NULL)
10700		goto nla_put_failure;
10701
10702	NLA_PUT_U32(msg, NL80211_ATTR_CQM_RSSI_THOLD, threshold);
10703	NLA_PUT_U32(msg, NL80211_ATTR_CQM_RSSI_HYST, hysteresis);
10704	nla_nest_end(msg, cqm);
10705
10706	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
10707	msg = NULL;
10708
10709nla_put_failure:
10710	nlmsg_free(msg);
10711	return ret;
10712}
10713
10714
10715static int get_channel_width(struct nl_msg *msg, void *arg)
10716{
10717	struct nlattr *tb[NL80211_ATTR_MAX + 1];
10718	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
10719	struct wpa_signal_info *sig_change = arg;
10720
10721	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
10722		  genlmsg_attrlen(gnlh, 0), NULL);
10723
10724	sig_change->center_frq1 = -1;
10725	sig_change->center_frq2 = -1;
10726	sig_change->chanwidth = CHAN_WIDTH_UNKNOWN;
10727
10728	if (tb[NL80211_ATTR_CHANNEL_WIDTH]) {
10729		sig_change->chanwidth = convert2width(
10730			nla_get_u32(tb[NL80211_ATTR_CHANNEL_WIDTH]));
10731		if (tb[NL80211_ATTR_CENTER_FREQ1])
10732			sig_change->center_frq1 =
10733				nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ1]);
10734		if (tb[NL80211_ATTR_CENTER_FREQ2])
10735			sig_change->center_frq2 =
10736				nla_get_u32(tb[NL80211_ATTR_CENTER_FREQ2]);
10737	}
10738
10739	return NL_SKIP;
10740}
10741
10742
10743static int nl80211_get_channel_width(struct wpa_driver_nl80211_data *drv,
10744				     struct wpa_signal_info *sig)
10745{
10746	struct nl_msg *msg;
10747
10748	msg = nlmsg_alloc();
10749	if (!msg)
10750		return -ENOMEM;
10751
10752	nl80211_cmd(drv, msg, 0, NL80211_CMD_GET_INTERFACE);
10753	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
10754
10755	return send_and_recv_msgs(drv, msg, get_channel_width, sig);
10756
10757nla_put_failure:
10758	nlmsg_free(msg);
10759	return -ENOBUFS;
10760}
10761
10762
10763static int nl80211_signal_poll(void *priv, struct wpa_signal_info *si)
10764{
10765	struct i802_bss *bss = priv;
10766	struct wpa_driver_nl80211_data *drv = bss->drv;
10767	int res;
10768
10769	os_memset(si, 0, sizeof(*si));
10770	res = nl80211_get_link_signal(drv, si);
10771	if (res != 0)
10772		return res;
10773
10774	res = nl80211_get_channel_width(drv, si);
10775	if (res != 0)
10776		return res;
10777
10778	return nl80211_get_link_noise(drv, si);
10779}
10780
10781
10782static int wpa_driver_nl80211_shared_freq(void *priv)
10783{
10784	struct i802_bss *bss = priv;
10785	struct wpa_driver_nl80211_data *drv = bss->drv;
10786	struct wpa_driver_nl80211_data *driver;
10787	int freq = 0;
10788
10789	/*
10790	 * If the same PHY is in connected state with some other interface,
10791	 * then retrieve the assoc freq.
10792	 */
10793	wpa_printf(MSG_DEBUG, "nl80211: Get shared freq for PHY %s",
10794		   drv->phyname);
10795
10796	dl_list_for_each(driver, &drv->global->interfaces,
10797			 struct wpa_driver_nl80211_data, list) {
10798		if (drv == driver ||
10799		    os_strcmp(drv->phyname, driver->phyname) != 0 ||
10800		    !driver->associated)
10801			continue;
10802
10803		wpa_printf(MSG_DEBUG, "nl80211: Found a match for PHY %s - %s "
10804			   MACSTR,
10805			   driver->phyname, driver->first_bss->ifname,
10806			   MAC2STR(driver->first_bss->addr));
10807		if (is_ap_interface(driver->nlmode))
10808			freq = driver->first_bss->freq;
10809		else
10810			freq = nl80211_get_assoc_freq(driver);
10811		wpa_printf(MSG_DEBUG, "nl80211: Shared freq for PHY %s: %d",
10812			   drv->phyname, freq);
10813	}
10814
10815	if (!freq)
10816		wpa_printf(MSG_DEBUG, "nl80211: No shared interface for "
10817			   "PHY (%s) in associated state", drv->phyname);
10818
10819	return freq;
10820}
10821
10822
10823static int nl80211_send_frame(void *priv, const u8 *data, size_t data_len,
10824			      int encrypt)
10825{
10826	struct i802_bss *bss = priv;
10827	return wpa_driver_nl80211_send_frame(bss, data, data_len, encrypt, 0,
10828					     0, 0, 0, 0);
10829}
10830
10831
10832static int nl80211_set_param(void *priv, const char *param)
10833{
10834	wpa_printf(MSG_DEBUG, "nl80211: driver param='%s'", param);
10835	if (param == NULL)
10836		return 0;
10837
10838#ifdef CONFIG_P2P
10839	if (os_strstr(param, "use_p2p_group_interface=1")) {
10840		struct i802_bss *bss = priv;
10841		struct wpa_driver_nl80211_data *drv = bss->drv;
10842
10843		wpa_printf(MSG_DEBUG, "nl80211: Use separate P2P group "
10844			   "interface");
10845		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_CONCURRENT;
10846		drv->capa.flags |= WPA_DRIVER_FLAGS_P2P_MGMT_AND_NON_P2P;
10847	}
10848
10849	if (os_strstr(param, "p2p_device=1")) {
10850		struct i802_bss *bss = priv;
10851		struct wpa_driver_nl80211_data *drv = bss->drv;
10852		drv->allow_p2p_device = 1;
10853	}
10854#endif /* CONFIG_P2P */
10855
10856	if (os_strstr(param, "use_monitor=1")) {
10857		struct i802_bss *bss = priv;
10858		struct wpa_driver_nl80211_data *drv = bss->drv;
10859		drv->use_monitor = 1;
10860	}
10861
10862	if (os_strstr(param, "force_connect_cmd=1")) {
10863		struct i802_bss *bss = priv;
10864		struct wpa_driver_nl80211_data *drv = bss->drv;
10865		drv->capa.flags &= ~WPA_DRIVER_FLAGS_SME;
10866	}
10867
10868	if (os_strstr(param, "no_offchannel_tx=1")) {
10869		struct i802_bss *bss = priv;
10870		struct wpa_driver_nl80211_data *drv = bss->drv;
10871		drv->capa.flags &= ~WPA_DRIVER_FLAGS_OFFCHANNEL_TX;
10872		drv->test_use_roc_tx = 1;
10873	}
10874
10875	return 0;
10876}
10877
10878
10879static void * nl80211_global_init(void)
10880{
10881	struct nl80211_global *global;
10882	struct netlink_config *cfg;
10883
10884	global = os_zalloc(sizeof(*global));
10885	if (global == NULL)
10886		return NULL;
10887	global->ioctl_sock = -1;
10888	dl_list_init(&global->interfaces);
10889	global->if_add_ifindex = -1;
10890
10891	cfg = os_zalloc(sizeof(*cfg));
10892	if (cfg == NULL)
10893		goto err;
10894
10895	cfg->ctx = global;
10896	cfg->newlink_cb = wpa_driver_nl80211_event_rtm_newlink;
10897	cfg->dellink_cb = wpa_driver_nl80211_event_rtm_dellink;
10898	global->netlink = netlink_init(cfg);
10899	if (global->netlink == NULL) {
10900		os_free(cfg);
10901		goto err;
10902	}
10903
10904	if (wpa_driver_nl80211_init_nl_global(global) < 0)
10905		goto err;
10906
10907	global->ioctl_sock = socket(PF_INET, SOCK_DGRAM, 0);
10908	if (global->ioctl_sock < 0) {
10909		wpa_printf(MSG_ERROR, "nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s",
10910			   strerror(errno));
10911		goto err;
10912	}
10913
10914	return global;
10915
10916err:
10917	nl80211_global_deinit(global);
10918	return NULL;
10919}
10920
10921
10922static void nl80211_global_deinit(void *priv)
10923{
10924	struct nl80211_global *global = priv;
10925	if (global == NULL)
10926		return;
10927	if (!dl_list_empty(&global->interfaces)) {
10928		wpa_printf(MSG_ERROR, "nl80211: %u interface(s) remain at "
10929			   "nl80211_global_deinit",
10930			   dl_list_len(&global->interfaces));
10931	}
10932
10933	if (global->netlink)
10934		netlink_deinit(global->netlink);
10935
10936	nl_destroy_handles(&global->nl);
10937
10938	if (global->nl_event)
10939		nl80211_destroy_eloop_handle(&global->nl_event);
10940
10941	nl_cb_put(global->nl_cb);
10942
10943	if (global->ioctl_sock >= 0)
10944		close(global->ioctl_sock);
10945
10946	os_free(global);
10947}
10948
10949
10950static const char * nl80211_get_radio_name(void *priv)
10951{
10952	struct i802_bss *bss = priv;
10953	struct wpa_driver_nl80211_data *drv = bss->drv;
10954	return drv->phyname;
10955}
10956
10957
10958static int nl80211_pmkid(struct i802_bss *bss, int cmd, const u8 *bssid,
10959			 const u8 *pmkid)
10960{
10961	struct nl_msg *msg;
10962
10963	msg = nlmsg_alloc();
10964	if (!msg)
10965		return -ENOMEM;
10966
10967	nl80211_cmd(bss->drv, msg, 0, cmd);
10968
10969	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, if_nametoindex(bss->ifname));
10970	if (pmkid)
10971		NLA_PUT(msg, NL80211_ATTR_PMKID, 16, pmkid);
10972	if (bssid)
10973		NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, bssid);
10974
10975	return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
10976 nla_put_failure:
10977	nlmsg_free(msg);
10978	return -ENOBUFS;
10979}
10980
10981
10982static int nl80211_add_pmkid(void *priv, const u8 *bssid, const u8 *pmkid)
10983{
10984	struct i802_bss *bss = priv;
10985	wpa_printf(MSG_DEBUG, "nl80211: Add PMKID for " MACSTR, MAC2STR(bssid));
10986	return nl80211_pmkid(bss, NL80211_CMD_SET_PMKSA, bssid, pmkid);
10987}
10988
10989
10990static int nl80211_remove_pmkid(void *priv, const u8 *bssid, const u8 *pmkid)
10991{
10992	struct i802_bss *bss = priv;
10993	wpa_printf(MSG_DEBUG, "nl80211: Delete PMKID for " MACSTR,
10994		   MAC2STR(bssid));
10995	return nl80211_pmkid(bss, NL80211_CMD_DEL_PMKSA, bssid, pmkid);
10996}
10997
10998
10999static int nl80211_flush_pmkid(void *priv)
11000{
11001	struct i802_bss *bss = priv;
11002	wpa_printf(MSG_DEBUG, "nl80211: Flush PMKIDs");
11003	return nl80211_pmkid(bss, NL80211_CMD_FLUSH_PMKSA, NULL, NULL);
11004}
11005
11006
11007static void clean_survey_results(struct survey_results *survey_results)
11008{
11009	struct freq_survey *survey, *tmp;
11010
11011	if (dl_list_empty(&survey_results->survey_list))
11012		return;
11013
11014	dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
11015			      struct freq_survey, list) {
11016		dl_list_del(&survey->list);
11017		os_free(survey);
11018	}
11019}
11020
11021
11022static void add_survey(struct nlattr **sinfo, u32 ifidx,
11023		       struct dl_list *survey_list)
11024{
11025	struct freq_survey *survey;
11026
11027	survey = os_zalloc(sizeof(struct freq_survey));
11028	if  (!survey)
11029		return;
11030
11031	survey->ifidx = ifidx;
11032	survey->freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
11033	survey->filled = 0;
11034
11035	if (sinfo[NL80211_SURVEY_INFO_NOISE]) {
11036		survey->nf = (int8_t)
11037			nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
11038		survey->filled |= SURVEY_HAS_NF;
11039	}
11040
11041	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]) {
11042		survey->channel_time =
11043			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME]);
11044		survey->filled |= SURVEY_HAS_CHAN_TIME;
11045	}
11046
11047	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]) {
11048		survey->channel_time_busy =
11049			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_BUSY]);
11050		survey->filled |= SURVEY_HAS_CHAN_TIME_BUSY;
11051	}
11052
11053	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]) {
11054		survey->channel_time_rx =
11055			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_RX]);
11056		survey->filled |= SURVEY_HAS_CHAN_TIME_RX;
11057	}
11058
11059	if (sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]) {
11060		survey->channel_time_tx =
11061			nla_get_u64(sinfo[NL80211_SURVEY_INFO_CHANNEL_TIME_TX]);
11062		survey->filled |= SURVEY_HAS_CHAN_TIME_TX;
11063	}
11064
11065	wpa_printf(MSG_DEBUG, "nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x)",
11066		   survey->freq,
11067		   survey->nf,
11068		   (unsigned long int) survey->channel_time,
11069		   (unsigned long int) survey->channel_time_busy,
11070		   (unsigned long int) survey->channel_time_tx,
11071		   (unsigned long int) survey->channel_time_rx,
11072		   survey->filled);
11073
11074	dl_list_add_tail(survey_list, &survey->list);
11075}
11076
11077
11078static int check_survey_ok(struct nlattr **sinfo, u32 surveyed_freq,
11079			   unsigned int freq_filter)
11080{
11081	if (!freq_filter)
11082		return 1;
11083
11084	return freq_filter == surveyed_freq;
11085}
11086
11087
11088static int survey_handler(struct nl_msg *msg, void *arg)
11089{
11090	struct nlattr *tb[NL80211_ATTR_MAX + 1];
11091	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
11092	struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
11093	struct survey_results *survey_results;
11094	u32 surveyed_freq = 0;
11095	u32 ifidx;
11096
11097	static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
11098		[NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
11099		[NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
11100	};
11101
11102	survey_results = (struct survey_results *) arg;
11103
11104	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
11105		  genlmsg_attrlen(gnlh, 0), NULL);
11106
11107	if (!tb[NL80211_ATTR_IFINDEX])
11108		return NL_SKIP;
11109
11110	ifidx = nla_get_u32(tb[NL80211_ATTR_IFINDEX]);
11111
11112	if (!tb[NL80211_ATTR_SURVEY_INFO])
11113		return NL_SKIP;
11114
11115	if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
11116			     tb[NL80211_ATTR_SURVEY_INFO],
11117			     survey_policy))
11118		return NL_SKIP;
11119
11120	if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY]) {
11121		wpa_printf(MSG_ERROR, "nl80211: Invalid survey data");
11122		return NL_SKIP;
11123	}
11124
11125	surveyed_freq = nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]);
11126
11127	if (!check_survey_ok(sinfo, surveyed_freq,
11128			     survey_results->freq_filter))
11129		return NL_SKIP;
11130
11131	if (survey_results->freq_filter &&
11132	    survey_results->freq_filter != surveyed_freq) {
11133		wpa_printf(MSG_EXCESSIVE, "nl80211: Ignoring survey data for freq %d MHz",
11134			   surveyed_freq);
11135		return NL_SKIP;
11136	}
11137
11138	add_survey(sinfo, ifidx, &survey_results->survey_list);
11139
11140	return NL_SKIP;
11141}
11142
11143
11144static int wpa_driver_nl80211_get_survey(void *priv, unsigned int freq)
11145{
11146	struct i802_bss *bss = priv;
11147	struct wpa_driver_nl80211_data *drv = bss->drv;
11148	struct nl_msg *msg;
11149	int err = -ENOBUFS;
11150	union wpa_event_data data;
11151	struct survey_results *survey_results;
11152
11153	os_memset(&data, 0, sizeof(data));
11154	survey_results = &data.survey_results;
11155
11156	dl_list_init(&survey_results->survey_list);
11157
11158	msg = nlmsg_alloc();
11159	if (!msg)
11160		goto nla_put_failure;
11161
11162	nl80211_cmd(drv, msg, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
11163
11164	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
11165
11166	if (freq)
11167		data.survey_results.freq_filter = freq;
11168
11169	do {
11170		wpa_printf(MSG_DEBUG, "nl80211: Fetch survey data");
11171		err = send_and_recv_msgs(drv, msg, survey_handler,
11172					 survey_results);
11173	} while (err > 0);
11174
11175	if (err) {
11176		wpa_printf(MSG_ERROR, "nl80211: Failed to process survey data");
11177		goto out_clean;
11178	}
11179
11180	wpa_supplicant_event(drv->ctx, EVENT_SURVEY, &data);
11181
11182out_clean:
11183	clean_survey_results(survey_results);
11184nla_put_failure:
11185	return err;
11186}
11187
11188
11189static void nl80211_set_rekey_info(void *priv, const u8 *kek, const u8 *kck,
11190				   const u8 *replay_ctr)
11191{
11192	struct i802_bss *bss = priv;
11193	struct wpa_driver_nl80211_data *drv = bss->drv;
11194	struct nlattr *replay_nested;
11195	struct nl_msg *msg;
11196
11197	msg = nlmsg_alloc();
11198	if (!msg)
11199		return;
11200
11201	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_REKEY_OFFLOAD);
11202
11203	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
11204
11205	replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA);
11206	if (!replay_nested)
11207		goto nla_put_failure;
11208
11209	NLA_PUT(msg, NL80211_REKEY_DATA_KEK, NL80211_KEK_LEN, kek);
11210	NLA_PUT(msg, NL80211_REKEY_DATA_KCK, NL80211_KCK_LEN, kck);
11211	NLA_PUT(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
11212		replay_ctr);
11213
11214	nla_nest_end(msg, replay_nested);
11215
11216	send_and_recv_msgs(drv, msg, NULL, NULL);
11217	return;
11218 nla_put_failure:
11219	nlmsg_free(msg);
11220}
11221
11222
11223static void nl80211_send_null_frame(struct i802_bss *bss, const u8 *own_addr,
11224				    const u8 *addr, int qos)
11225{
11226	/* send data frame to poll STA and check whether
11227	 * this frame is ACKed */
11228	struct {
11229		struct ieee80211_hdr hdr;
11230		u16 qos_ctl;
11231	} STRUCT_PACKED nulldata;
11232	size_t size;
11233
11234	/* Send data frame to poll STA and check whether this frame is ACKed */
11235
11236	os_memset(&nulldata, 0, sizeof(nulldata));
11237
11238	if (qos) {
11239		nulldata.hdr.frame_control =
11240			IEEE80211_FC(WLAN_FC_TYPE_DATA,
11241				     WLAN_FC_STYPE_QOS_NULL);
11242		size = sizeof(nulldata);
11243	} else {
11244		nulldata.hdr.frame_control =
11245			IEEE80211_FC(WLAN_FC_TYPE_DATA,
11246				     WLAN_FC_STYPE_NULLFUNC);
11247		size = sizeof(struct ieee80211_hdr);
11248	}
11249
11250	nulldata.hdr.frame_control |= host_to_le16(WLAN_FC_FROMDS);
11251	os_memcpy(nulldata.hdr.IEEE80211_DA_FROMDS, addr, ETH_ALEN);
11252	os_memcpy(nulldata.hdr.IEEE80211_BSSID_FROMDS, own_addr, ETH_ALEN);
11253	os_memcpy(nulldata.hdr.IEEE80211_SA_FROMDS, own_addr, ETH_ALEN);
11254
11255	if (wpa_driver_nl80211_send_mlme(bss, (u8 *) &nulldata, size, 0, 0, 0,
11256					 0, 0) < 0)
11257		wpa_printf(MSG_DEBUG, "nl80211_send_null_frame: Failed to "
11258			   "send poll frame");
11259}
11260
11261static void nl80211_poll_client(void *priv, const u8 *own_addr, const u8 *addr,
11262				int qos)
11263{
11264	struct i802_bss *bss = priv;
11265	struct wpa_driver_nl80211_data *drv = bss->drv;
11266	struct nl_msg *msg;
11267
11268	if (!drv->poll_command_supported) {
11269		nl80211_send_null_frame(bss, own_addr, addr, qos);
11270		return;
11271	}
11272
11273	msg = nlmsg_alloc();
11274	if (!msg)
11275		return;
11276
11277	nl80211_cmd(drv, msg, 0, NL80211_CMD_PROBE_CLIENT);
11278
11279	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
11280	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, addr);
11281
11282	send_and_recv_msgs(drv, msg, NULL, NULL);
11283	return;
11284 nla_put_failure:
11285	nlmsg_free(msg);
11286}
11287
11288
11289static int nl80211_set_power_save(struct i802_bss *bss, int enabled)
11290{
11291	struct nl_msg *msg;
11292
11293	msg = nlmsg_alloc();
11294	if (!msg)
11295		return -ENOMEM;
11296
11297	nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_SET_POWER_SAVE);
11298	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, bss->ifindex);
11299	NLA_PUT_U32(msg, NL80211_ATTR_PS_STATE,
11300		    enabled ? NL80211_PS_ENABLED : NL80211_PS_DISABLED);
11301	return send_and_recv_msgs(bss->drv, msg, NULL, NULL);
11302nla_put_failure:
11303	nlmsg_free(msg);
11304	return -ENOBUFS;
11305}
11306
11307
11308static int nl80211_set_p2p_powersave(void *priv, int legacy_ps, int opp_ps,
11309				     int ctwindow)
11310{
11311	struct i802_bss *bss = priv;
11312
11313	wpa_printf(MSG_DEBUG, "nl80211: set_p2p_powersave (legacy_ps=%d "
11314		   "opp_ps=%d ctwindow=%d)", legacy_ps, opp_ps, ctwindow);
11315
11316	if (opp_ps != -1 || ctwindow != -1) {
11317#ifdef ANDROID_P2P
11318		wpa_driver_set_p2p_ps(priv, legacy_ps, opp_ps, ctwindow);
11319#else /* ANDROID_P2P */
11320		return -1; /* Not yet supported */
11321#endif /* ANDROID_P2P */
11322	}
11323
11324	if (legacy_ps == -1)
11325		return 0;
11326	if (legacy_ps != 0 && legacy_ps != 1)
11327		return -1; /* Not yet supported */
11328
11329	return nl80211_set_power_save(bss, legacy_ps);
11330}
11331
11332
11333static int nl80211_start_radar_detection(void *priv,
11334					 struct hostapd_freq_params *freq)
11335{
11336	struct i802_bss *bss = priv;
11337	struct wpa_driver_nl80211_data *drv = bss->drv;
11338	struct nl_msg *msg;
11339	int ret;
11340
11341	wpa_printf(MSG_DEBUG, "nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz)",
11342		   freq->freq, freq->ht_enabled, freq->vht_enabled,
11343		   freq->bandwidth, freq->center_freq1, freq->center_freq2);
11344
11345	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_RADAR)) {
11346		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support radar "
11347			   "detection");
11348		return -1;
11349	}
11350
11351	msg = nlmsg_alloc();
11352	if (!msg)
11353		return -1;
11354
11355	nl80211_cmd(bss->drv, msg, 0, NL80211_CMD_RADAR_DETECT);
11356	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
11357	NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_FREQ, freq->freq);
11358
11359	if (freq->vht_enabled) {
11360		switch (freq->bandwidth) {
11361		case 20:
11362			NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
11363				    NL80211_CHAN_WIDTH_20);
11364			break;
11365		case 40:
11366			NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
11367				    NL80211_CHAN_WIDTH_40);
11368			break;
11369		case 80:
11370			if (freq->center_freq2)
11371				NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
11372					    NL80211_CHAN_WIDTH_80P80);
11373			else
11374				NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
11375					    NL80211_CHAN_WIDTH_80);
11376			break;
11377		case 160:
11378			NLA_PUT_U32(msg, NL80211_ATTR_CHANNEL_WIDTH,
11379				    NL80211_CHAN_WIDTH_160);
11380			break;
11381		default:
11382			return -1;
11383		}
11384		NLA_PUT_U32(msg, NL80211_ATTR_CENTER_FREQ1, freq->center_freq1);
11385		if (freq->center_freq2)
11386			NLA_PUT_U32(msg, NL80211_ATTR_CENTER_FREQ2,
11387				    freq->center_freq2);
11388	} else if (freq->ht_enabled) {
11389		switch (freq->sec_channel_offset) {
11390		case -1:
11391			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
11392				    NL80211_CHAN_HT40MINUS);
11393			break;
11394		case 1:
11395			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
11396				    NL80211_CHAN_HT40PLUS);
11397			break;
11398		default:
11399			NLA_PUT_U32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
11400				    NL80211_CHAN_HT20);
11401			break;
11402		}
11403	}
11404
11405	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
11406	if (ret == 0)
11407		return 0;
11408	wpa_printf(MSG_DEBUG, "nl80211: Failed to start radar detection: "
11409		   "%d (%s)", ret, strerror(-ret));
11410nla_put_failure:
11411	return -1;
11412}
11413
11414#ifdef CONFIG_TDLS
11415
11416static int nl80211_send_tdls_mgmt(void *priv, const u8 *dst, u8 action_code,
11417				  u8 dialog_token, u16 status_code,
11418				  u32 peer_capab, const u8 *buf, size_t len)
11419{
11420	struct i802_bss *bss = priv;
11421	struct wpa_driver_nl80211_data *drv = bss->drv;
11422	struct nl_msg *msg;
11423
11424	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
11425		return -EOPNOTSUPP;
11426
11427	if (!dst)
11428		return -EINVAL;
11429
11430	msg = nlmsg_alloc();
11431	if (!msg)
11432		return -ENOMEM;
11433
11434	nl80211_cmd(drv, msg, 0, NL80211_CMD_TDLS_MGMT);
11435	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
11436	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, dst);
11437	NLA_PUT_U8(msg, NL80211_ATTR_TDLS_ACTION, action_code);
11438	NLA_PUT_U8(msg, NL80211_ATTR_TDLS_DIALOG_TOKEN, dialog_token);
11439	NLA_PUT_U16(msg, NL80211_ATTR_STATUS_CODE, status_code);
11440	if (peer_capab) {
11441		/*
11442		 * The internal enum tdls_peer_capability definition is
11443		 * currently identical with the nl80211 enum
11444		 * nl80211_tdls_peer_capability, so no conversion is needed
11445		 * here.
11446		 */
11447		NLA_PUT_U32(msg, NL80211_ATTR_TDLS_PEER_CAPABILITY, peer_capab);
11448	}
11449	NLA_PUT(msg, NL80211_ATTR_IE, len, buf);
11450
11451	return send_and_recv_msgs(drv, msg, NULL, NULL);
11452
11453nla_put_failure:
11454	nlmsg_free(msg);
11455	return -ENOBUFS;
11456}
11457
11458
11459static int nl80211_tdls_oper(void *priv, enum tdls_oper oper, const u8 *peer)
11460{
11461	struct i802_bss *bss = priv;
11462	struct wpa_driver_nl80211_data *drv = bss->drv;
11463	struct nl_msg *msg;
11464	enum nl80211_tdls_operation nl80211_oper;
11465
11466	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT))
11467		return -EOPNOTSUPP;
11468
11469	switch (oper) {
11470	case TDLS_DISCOVERY_REQ:
11471		nl80211_oper = NL80211_TDLS_DISCOVERY_REQ;
11472		break;
11473	case TDLS_SETUP:
11474		nl80211_oper = NL80211_TDLS_SETUP;
11475		break;
11476	case TDLS_TEARDOWN:
11477		nl80211_oper = NL80211_TDLS_TEARDOWN;
11478		break;
11479	case TDLS_ENABLE_LINK:
11480		nl80211_oper = NL80211_TDLS_ENABLE_LINK;
11481		break;
11482	case TDLS_DISABLE_LINK:
11483		nl80211_oper = NL80211_TDLS_DISABLE_LINK;
11484		break;
11485	case TDLS_ENABLE:
11486		return 0;
11487	case TDLS_DISABLE:
11488		return 0;
11489	default:
11490		return -EINVAL;
11491	}
11492
11493	msg = nlmsg_alloc();
11494	if (!msg)
11495		return -ENOMEM;
11496
11497	nl80211_cmd(drv, msg, 0, NL80211_CMD_TDLS_OPER);
11498	NLA_PUT_U8(msg, NL80211_ATTR_TDLS_OPERATION, nl80211_oper);
11499	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
11500	NLA_PUT(msg, NL80211_ATTR_MAC, ETH_ALEN, peer);
11501
11502	return send_and_recv_msgs(drv, msg, NULL, NULL);
11503
11504nla_put_failure:
11505	nlmsg_free(msg);
11506	return -ENOBUFS;
11507}
11508
11509#endif /* CONFIG TDLS */
11510
11511
11512#ifdef ANDROID
11513
11514typedef struct android_wifi_priv_cmd {
11515	char *buf;
11516	int used_len;
11517	int total_len;
11518} android_wifi_priv_cmd;
11519
11520static int drv_errors = 0;
11521
11522static void wpa_driver_send_hang_msg(struct wpa_driver_nl80211_data *drv)
11523{
11524	drv_errors++;
11525	if (drv_errors > DRV_NUMBER_SEQUENTIAL_ERRORS) {
11526		drv_errors = 0;
11527		wpa_msg(drv->ctx, MSG_INFO, WPA_EVENT_DRIVER_STATE "HANGED");
11528	}
11529}
11530
11531
11532static int android_priv_cmd(struct i802_bss *bss, const char *cmd)
11533{
11534	struct wpa_driver_nl80211_data *drv = bss->drv;
11535	struct ifreq ifr;
11536	android_wifi_priv_cmd priv_cmd;
11537	char buf[MAX_DRV_CMD_SIZE];
11538	int ret;
11539
11540	os_memset(&ifr, 0, sizeof(ifr));
11541	os_memset(&priv_cmd, 0, sizeof(priv_cmd));
11542	os_strlcpy(ifr.ifr_name, bss->ifname, IFNAMSIZ);
11543
11544	os_memset(buf, 0, sizeof(buf));
11545	os_strlcpy(buf, cmd, sizeof(buf));
11546
11547	priv_cmd.buf = buf;
11548	priv_cmd.used_len = sizeof(buf);
11549	priv_cmd.total_len = sizeof(buf);
11550	ifr.ifr_data = &priv_cmd;
11551
11552	ret = ioctl(drv->global->ioctl_sock, SIOCDEVPRIVATE + 1, &ifr);
11553	if (ret < 0) {
11554		wpa_printf(MSG_ERROR, "%s: failed to issue private commands",
11555			   __func__);
11556		wpa_driver_send_hang_msg(drv);
11557		return ret;
11558	}
11559
11560	drv_errors = 0;
11561	return 0;
11562}
11563
11564
11565static int android_pno_start(struct i802_bss *bss,
11566			     struct wpa_driver_scan_params *params)
11567{
11568	struct wpa_driver_nl80211_data *drv = bss->drv;
11569	struct ifreq ifr;
11570	android_wifi_priv_cmd priv_cmd;
11571	int ret = 0, i = 0, bp;
11572	char buf[WEXT_PNO_MAX_COMMAND_SIZE];
11573
11574	bp = WEXT_PNOSETUP_HEADER_SIZE;
11575	os_memcpy(buf, WEXT_PNOSETUP_HEADER, bp);
11576	buf[bp++] = WEXT_PNO_TLV_PREFIX;
11577	buf[bp++] = WEXT_PNO_TLV_VERSION;
11578	buf[bp++] = WEXT_PNO_TLV_SUBVERSION;
11579	buf[bp++] = WEXT_PNO_TLV_RESERVED;
11580
11581	while (i < WEXT_PNO_AMOUNT && (size_t) i < params->num_ssids) {
11582		/* Check that there is enough space needed for 1 more SSID, the
11583		 * other sections and null termination */
11584		if ((bp + WEXT_PNO_SSID_HEADER_SIZE + MAX_SSID_LEN +
11585		     WEXT_PNO_NONSSID_SECTIONS_SIZE + 1) >= (int) sizeof(buf))
11586			break;
11587		wpa_hexdump_ascii(MSG_DEBUG, "For PNO Scan",
11588				  params->ssids[i].ssid,
11589				  params->ssids[i].ssid_len);
11590		buf[bp++] = WEXT_PNO_SSID_SECTION;
11591		buf[bp++] = params->ssids[i].ssid_len;
11592		os_memcpy(&buf[bp], params->ssids[i].ssid,
11593			  params->ssids[i].ssid_len);
11594		bp += params->ssids[i].ssid_len;
11595		i++;
11596	}
11597
11598	buf[bp++] = WEXT_PNO_SCAN_INTERVAL_SECTION;
11599	os_snprintf(&buf[bp], WEXT_PNO_SCAN_INTERVAL_LENGTH + 1, "%x",
11600		    WEXT_PNO_SCAN_INTERVAL);
11601	bp += WEXT_PNO_SCAN_INTERVAL_LENGTH;
11602
11603	buf[bp++] = WEXT_PNO_REPEAT_SECTION;
11604	os_snprintf(&buf[bp], WEXT_PNO_REPEAT_LENGTH + 1, "%x",
11605		    WEXT_PNO_REPEAT);
11606	bp += WEXT_PNO_REPEAT_LENGTH;
11607
11608	buf[bp++] = WEXT_PNO_MAX_REPEAT_SECTION;
11609	os_snprintf(&buf[bp], WEXT_PNO_MAX_REPEAT_LENGTH + 1, "%x",
11610		    WEXT_PNO_MAX_REPEAT);
11611	bp += WEXT_PNO_MAX_REPEAT_LENGTH + 1;
11612
11613	memset(&ifr, 0, sizeof(ifr));
11614	memset(&priv_cmd, 0, sizeof(priv_cmd));
11615	os_strlcpy(ifr.ifr_name, bss->ifname, IFNAMSIZ);
11616
11617	priv_cmd.buf = buf;
11618	priv_cmd.used_len = bp;
11619	priv_cmd.total_len = bp;
11620	ifr.ifr_data = &priv_cmd;
11621
11622	ret = ioctl(drv->global->ioctl_sock, SIOCDEVPRIVATE + 1, &ifr);
11623
11624	if (ret < 0) {
11625		wpa_printf(MSG_ERROR, "ioctl[SIOCSIWPRIV] (pnosetup): %d",
11626			   ret);
11627		wpa_driver_send_hang_msg(drv);
11628		return ret;
11629	}
11630
11631	drv_errors = 0;
11632
11633	return android_priv_cmd(bss, "PNOFORCE 1");
11634}
11635
11636
11637static int android_pno_stop(struct i802_bss *bss)
11638{
11639	return android_priv_cmd(bss, "PNOFORCE 0");
11640}
11641
11642#endif /* ANDROID */
11643
11644
11645static int driver_nl80211_set_key(const char *ifname, void *priv,
11646				  enum wpa_alg alg, const u8 *addr,
11647				  int key_idx, int set_tx,
11648				  const u8 *seq, size_t seq_len,
11649				  const u8 *key, size_t key_len)
11650{
11651	struct i802_bss *bss = priv;
11652	return wpa_driver_nl80211_set_key(ifname, bss, alg, addr, key_idx,
11653					  set_tx, seq, seq_len, key, key_len);
11654}
11655
11656
11657static int driver_nl80211_scan2(void *priv,
11658				struct wpa_driver_scan_params *params)
11659{
11660	struct i802_bss *bss = priv;
11661	return wpa_driver_nl80211_scan(bss, params);
11662}
11663
11664
11665static int driver_nl80211_deauthenticate(void *priv, const u8 *addr,
11666					 int reason_code)
11667{
11668	struct i802_bss *bss = priv;
11669	return wpa_driver_nl80211_deauthenticate(bss, addr, reason_code);
11670}
11671
11672
11673static int driver_nl80211_authenticate(void *priv,
11674				       struct wpa_driver_auth_params *params)
11675{
11676	struct i802_bss *bss = priv;
11677	return wpa_driver_nl80211_authenticate(bss, params);
11678}
11679
11680
11681static void driver_nl80211_deinit(void *priv)
11682{
11683	struct i802_bss *bss = priv;
11684	wpa_driver_nl80211_deinit(bss);
11685}
11686
11687
11688static int driver_nl80211_if_remove(void *priv, enum wpa_driver_if_type type,
11689				    const char *ifname)
11690{
11691	struct i802_bss *bss = priv;
11692	return wpa_driver_nl80211_if_remove(bss, type, ifname);
11693}
11694
11695
11696static int driver_nl80211_send_mlme(void *priv, const u8 *data,
11697				    size_t data_len, int noack)
11698{
11699	struct i802_bss *bss = priv;
11700	return wpa_driver_nl80211_send_mlme(bss, data, data_len, noack,
11701					    0, 0, 0, 0);
11702}
11703
11704
11705static int driver_nl80211_sta_remove(void *priv, const u8 *addr)
11706{
11707	struct i802_bss *bss = priv;
11708	return wpa_driver_nl80211_sta_remove(bss, addr);
11709}
11710
11711
11712static int driver_nl80211_set_sta_vlan(void *priv, const u8 *addr,
11713				       const char *ifname, int vlan_id)
11714{
11715	struct i802_bss *bss = priv;
11716	return i802_set_sta_vlan(bss, addr, ifname, vlan_id);
11717}
11718
11719
11720static int driver_nl80211_read_sta_data(void *priv,
11721					struct hostap_sta_driver_data *data,
11722					const u8 *addr)
11723{
11724	struct i802_bss *bss = priv;
11725	return i802_read_sta_data(bss, data, addr);
11726}
11727
11728
11729static int driver_nl80211_send_action(void *priv, unsigned int freq,
11730				      unsigned int wait_time,
11731				      const u8 *dst, const u8 *src,
11732				      const u8 *bssid,
11733				      const u8 *data, size_t data_len,
11734				      int no_cck)
11735{
11736	struct i802_bss *bss = priv;
11737	return wpa_driver_nl80211_send_action(bss, freq, wait_time, dst, src,
11738					      bssid, data, data_len, no_cck);
11739}
11740
11741
11742static int driver_nl80211_probe_req_report(void *priv, int report)
11743{
11744	struct i802_bss *bss = priv;
11745	return wpa_driver_nl80211_probe_req_report(bss, report);
11746}
11747
11748
11749static int wpa_driver_nl80211_update_ft_ies(void *priv, const u8 *md,
11750					    const u8 *ies, size_t ies_len)
11751{
11752	int ret;
11753	struct nl_msg *msg;
11754	struct i802_bss *bss = priv;
11755	struct wpa_driver_nl80211_data *drv = bss->drv;
11756	u16 mdid = WPA_GET_LE16(md);
11757
11758	msg = nlmsg_alloc();
11759	if (!msg)
11760		return -ENOMEM;
11761
11762	wpa_printf(MSG_DEBUG, "nl80211: Updating FT IEs");
11763	nl80211_cmd(drv, msg, 0, NL80211_CMD_UPDATE_FT_IES);
11764	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
11765	NLA_PUT(msg, NL80211_ATTR_IE, ies_len, ies);
11766	NLA_PUT_U16(msg, NL80211_ATTR_MDID, mdid);
11767
11768	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
11769	if (ret) {
11770		wpa_printf(MSG_DEBUG, "nl80211: update_ft_ies failed "
11771			   "err=%d (%s)", ret, strerror(-ret));
11772	}
11773
11774	return ret;
11775
11776nla_put_failure:
11777	nlmsg_free(msg);
11778	return -ENOBUFS;
11779}
11780
11781
11782const u8 * wpa_driver_nl80211_get_macaddr(void *priv)
11783{
11784	struct i802_bss *bss = priv;
11785	struct wpa_driver_nl80211_data *drv = bss->drv;
11786
11787	if (drv->nlmode != NL80211_IFTYPE_P2P_DEVICE)
11788		return NULL;
11789
11790	return bss->addr;
11791}
11792
11793
11794static const char * scan_state_str(enum scan_states scan_state)
11795{
11796	switch (scan_state) {
11797	case NO_SCAN:
11798		return "NO_SCAN";
11799	case SCAN_REQUESTED:
11800		return "SCAN_REQUESTED";
11801	case SCAN_STARTED:
11802		return "SCAN_STARTED";
11803	case SCAN_COMPLETED:
11804		return "SCAN_COMPLETED";
11805	case SCAN_ABORTED:
11806		return "SCAN_ABORTED";
11807	case SCHED_SCAN_STARTED:
11808		return "SCHED_SCAN_STARTED";
11809	case SCHED_SCAN_STOPPED:
11810		return "SCHED_SCAN_STOPPED";
11811	case SCHED_SCAN_RESULTS:
11812		return "SCHED_SCAN_RESULTS";
11813	}
11814
11815	return "??";
11816}
11817
11818
11819static int wpa_driver_nl80211_status(void *priv, char *buf, size_t buflen)
11820{
11821	struct i802_bss *bss = priv;
11822	struct wpa_driver_nl80211_data *drv = bss->drv;
11823	int res;
11824	char *pos, *end;
11825
11826	pos = buf;
11827	end = buf + buflen;
11828
11829	res = os_snprintf(pos, end - pos,
11830			  "ifindex=%d\n"
11831			  "ifname=%s\n"
11832			  "brname=%s\n"
11833			  "addr=" MACSTR "\n"
11834			  "freq=%d\n"
11835			  "%s%s%s%s%s",
11836			  bss->ifindex,
11837			  bss->ifname,
11838			  bss->brname,
11839			  MAC2STR(bss->addr),
11840			  bss->freq,
11841			  bss->beacon_set ? "beacon_set=1\n" : "",
11842			  bss->added_if_into_bridge ?
11843			  "added_if_into_bridge=1\n" : "",
11844			  bss->added_bridge ? "added_bridge=1\n" : "",
11845			  bss->in_deinit ? "in_deinit=1\n" : "",
11846			  bss->if_dynamic ? "if_dynamic=1\n" : "");
11847	if (res < 0 || res >= end - pos)
11848		return pos - buf;
11849	pos += res;
11850
11851	if (bss->wdev_id_set) {
11852		res = os_snprintf(pos, end - pos, "wdev_id=%llu\n",
11853				  (unsigned long long) bss->wdev_id);
11854		if (res < 0 || res >= end - pos)
11855			return pos - buf;
11856		pos += res;
11857	}
11858
11859	res = os_snprintf(pos, end - pos,
11860			  "phyname=%s\n"
11861			  "drv_ifindex=%d\n"
11862			  "operstate=%d\n"
11863			  "scan_state=%s\n"
11864			  "auth_bssid=" MACSTR "\n"
11865			  "auth_attempt_bssid=" MACSTR "\n"
11866			  "bssid=" MACSTR "\n"
11867			  "prev_bssid=" MACSTR "\n"
11868			  "associated=%d\n"
11869			  "assoc_freq=%u\n"
11870			  "monitor_sock=%d\n"
11871			  "monitor_ifidx=%d\n"
11872			  "monitor_refcount=%d\n"
11873			  "last_mgmt_freq=%u\n"
11874			  "eapol_tx_sock=%d\n"
11875			  "%s%s%s%s%s%s%s%s%s%s%s%s%s%s",
11876			  drv->phyname,
11877			  drv->ifindex,
11878			  drv->operstate,
11879			  scan_state_str(drv->scan_state),
11880			  MAC2STR(drv->auth_bssid),
11881			  MAC2STR(drv->auth_attempt_bssid),
11882			  MAC2STR(drv->bssid),
11883			  MAC2STR(drv->prev_bssid),
11884			  drv->associated,
11885			  drv->assoc_freq,
11886			  drv->monitor_sock,
11887			  drv->monitor_ifidx,
11888			  drv->monitor_refcount,
11889			  drv->last_mgmt_freq,
11890			  drv->eapol_tx_sock,
11891			  drv->ignore_if_down_event ?
11892			  "ignore_if_down_event=1\n" : "",
11893			  drv->scan_complete_events ?
11894			  "scan_complete_events=1\n" : "",
11895			  drv->disabled_11b_rates ?
11896			  "disabled_11b_rates=1\n" : "",
11897			  drv->pending_remain_on_chan ?
11898			  "pending_remain_on_chan=1\n" : "",
11899			  drv->in_interface_list ? "in_interface_list=1\n" : "",
11900			  drv->device_ap_sme ? "device_ap_sme=1\n" : "",
11901			  drv->poll_command_supported ?
11902			  "poll_command_supported=1\n" : "",
11903			  drv->data_tx_status ? "data_tx_status=1\n" : "",
11904			  drv->scan_for_auth ? "scan_for_auth=1\n" : "",
11905			  drv->retry_auth ? "retry_auth=1\n" : "",
11906			  drv->use_monitor ? "use_monitor=1\n" : "",
11907			  drv->ignore_next_local_disconnect ?
11908			  "ignore_next_local_disconnect=1\n" : "",
11909			  drv->ignore_next_local_deauth ?
11910			  "ignore_next_local_deauth=1\n" : "",
11911			  drv->allow_p2p_device ? "allow_p2p_device=1\n" : "");
11912	if (res < 0 || res >= end - pos)
11913		return pos - buf;
11914	pos += res;
11915
11916	if (drv->has_capability) {
11917		res = os_snprintf(pos, end - pos,
11918				  "capa.key_mgmt=0x%x\n"
11919				  "capa.enc=0x%x\n"
11920				  "capa.auth=0x%x\n"
11921				  "capa.flags=0x%x\n"
11922				  "capa.max_scan_ssids=%d\n"
11923				  "capa.max_sched_scan_ssids=%d\n"
11924				  "capa.sched_scan_supported=%d\n"
11925				  "capa.max_match_sets=%d\n"
11926				  "capa.max_remain_on_chan=%u\n"
11927				  "capa.max_stations=%u\n"
11928				  "capa.probe_resp_offloads=0x%x\n"
11929				  "capa.max_acl_mac_addrs=%u\n"
11930				  "capa.num_multichan_concurrent=%u\n",
11931				  drv->capa.key_mgmt,
11932				  drv->capa.enc,
11933				  drv->capa.auth,
11934				  drv->capa.flags,
11935				  drv->capa.max_scan_ssids,
11936				  drv->capa.max_sched_scan_ssids,
11937				  drv->capa.sched_scan_supported,
11938				  drv->capa.max_match_sets,
11939				  drv->capa.max_remain_on_chan,
11940				  drv->capa.max_stations,
11941				  drv->capa.probe_resp_offloads,
11942				  drv->capa.max_acl_mac_addrs,
11943				  drv->capa.num_multichan_concurrent);
11944		if (res < 0 || res >= end - pos)
11945			return pos - buf;
11946		pos += res;
11947	}
11948
11949	return pos - buf;
11950}
11951
11952
11953static int set_beacon_data(struct nl_msg *msg, struct beacon_data *settings)
11954{
11955	if (settings->head)
11956		NLA_PUT(msg, NL80211_ATTR_BEACON_HEAD,
11957			settings->head_len, settings->head);
11958
11959	if (settings->tail)
11960		NLA_PUT(msg, NL80211_ATTR_BEACON_TAIL,
11961			settings->tail_len, settings->tail);
11962
11963	if (settings->beacon_ies)
11964		NLA_PUT(msg, NL80211_ATTR_IE,
11965			settings->beacon_ies_len, settings->beacon_ies);
11966
11967	if (settings->proberesp_ies)
11968		NLA_PUT(msg, NL80211_ATTR_IE_PROBE_RESP,
11969			settings->proberesp_ies_len, settings->proberesp_ies);
11970
11971	if (settings->assocresp_ies)
11972		NLA_PUT(msg,
11973			NL80211_ATTR_IE_ASSOC_RESP,
11974			settings->assocresp_ies_len, settings->assocresp_ies);
11975
11976	if (settings->probe_resp)
11977		NLA_PUT(msg, NL80211_ATTR_PROBE_RESP,
11978			settings->probe_resp_len, settings->probe_resp);
11979
11980	return 0;
11981
11982nla_put_failure:
11983	return -ENOBUFS;
11984}
11985
11986
11987static int nl80211_switch_channel(void *priv, struct csa_settings *settings)
11988{
11989	struct nl_msg *msg;
11990	struct i802_bss *bss = priv;
11991	struct wpa_driver_nl80211_data *drv = bss->drv;
11992	struct nlattr *beacon_csa;
11993	int ret = -ENOBUFS;
11994
11995	wpa_printf(MSG_DEBUG, "nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d width=%d cf1=%d cf2=%d)",
11996		   settings->cs_count, settings->block_tx,
11997		   settings->freq_params.freq, settings->freq_params.bandwidth,
11998		   settings->freq_params.center_freq1,
11999		   settings->freq_params.center_freq2);
12000
12001	if (!(drv->capa.flags & WPA_DRIVER_FLAGS_AP_CSA)) {
12002		wpa_printf(MSG_DEBUG, "nl80211: Driver does not support channel switch command");
12003		return -EOPNOTSUPP;
12004	}
12005
12006	if ((drv->nlmode != NL80211_IFTYPE_AP) &&
12007	    (drv->nlmode != NL80211_IFTYPE_P2P_GO))
12008		return -EOPNOTSUPP;
12009
12010	/* check settings validity */
12011	if (!settings->beacon_csa.tail ||
12012	    ((settings->beacon_csa.tail_len <=
12013	      settings->counter_offset_beacon) ||
12014	     (settings->beacon_csa.tail[settings->counter_offset_beacon] !=
12015	      settings->cs_count)))
12016		return -EINVAL;
12017
12018	if (settings->beacon_csa.probe_resp &&
12019	    ((settings->beacon_csa.probe_resp_len <=
12020	      settings->counter_offset_presp) ||
12021	     (settings->beacon_csa.probe_resp[settings->counter_offset_presp] !=
12022	      settings->cs_count)))
12023		return -EINVAL;
12024
12025	msg = nlmsg_alloc();
12026	if (!msg)
12027		return -ENOMEM;
12028
12029	nl80211_cmd(drv, msg, 0, NL80211_CMD_CHANNEL_SWITCH);
12030	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
12031	NLA_PUT_U32(msg, NL80211_ATTR_CH_SWITCH_COUNT, settings->cs_count);
12032	ret = nl80211_put_freq_params(msg, &settings->freq_params);
12033	if (ret)
12034		goto error;
12035
12036	if (settings->block_tx)
12037		NLA_PUT_FLAG(msg, NL80211_ATTR_CH_SWITCH_BLOCK_TX);
12038
12039	/* beacon_after params */
12040	ret = set_beacon_data(msg, &settings->beacon_after);
12041	if (ret)
12042		goto error;
12043
12044	/* beacon_csa params */
12045	beacon_csa = nla_nest_start(msg, NL80211_ATTR_CSA_IES);
12046	if (!beacon_csa)
12047		goto nla_put_failure;
12048
12049	ret = set_beacon_data(msg, &settings->beacon_csa);
12050	if (ret)
12051		goto error;
12052
12053	NLA_PUT_U16(msg, NL80211_ATTR_CSA_C_OFF_BEACON,
12054		    settings->counter_offset_beacon);
12055
12056	if (settings->beacon_csa.probe_resp)
12057		NLA_PUT_U16(msg, NL80211_ATTR_CSA_C_OFF_PRESP,
12058			    settings->counter_offset_presp);
12059
12060	nla_nest_end(msg, beacon_csa);
12061	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
12062	if (ret) {
12063		wpa_printf(MSG_DEBUG, "nl80211: switch_channel failed err=%d (%s)",
12064			   ret, strerror(-ret));
12065	}
12066	return ret;
12067
12068nla_put_failure:
12069	ret = -ENOBUFS;
12070error:
12071	nlmsg_free(msg);
12072	wpa_printf(MSG_DEBUG, "nl80211: Could not build channel switch request");
12073	return ret;
12074}
12075
12076
12077#ifdef CONFIG_TESTING_OPTIONS
12078static int cmd_reply_handler(struct nl_msg *msg, void *arg)
12079{
12080	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
12081	struct wpabuf *buf = arg;
12082
12083	if (!buf)
12084		return NL_SKIP;
12085
12086	if ((size_t) genlmsg_attrlen(gnlh, 0) > wpabuf_tailroom(buf)) {
12087		wpa_printf(MSG_INFO, "nl80211: insufficient buffer space for reply");
12088		return NL_SKIP;
12089	}
12090
12091	wpabuf_put_data(buf, genlmsg_attrdata(gnlh, 0),
12092			genlmsg_attrlen(gnlh, 0));
12093
12094	return NL_SKIP;
12095}
12096#endif /* CONFIG_TESTING_OPTIONS */
12097
12098
12099static int vendor_reply_handler(struct nl_msg *msg, void *arg)
12100{
12101	struct nlattr *tb[NL80211_ATTR_MAX + 1];
12102	struct nlattr *nl_vendor_reply, *nl;
12103	struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
12104	struct wpabuf *buf = arg;
12105	int rem;
12106
12107	if (!buf)
12108		return NL_SKIP;
12109
12110	nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
12111		  genlmsg_attrlen(gnlh, 0), NULL);
12112	nl_vendor_reply = tb[NL80211_ATTR_VENDOR_DATA];
12113
12114	if (!nl_vendor_reply)
12115		return NL_SKIP;
12116
12117	if ((size_t) nla_len(nl_vendor_reply) > wpabuf_tailroom(buf)) {
12118		wpa_printf(MSG_INFO, "nl80211: Vendor command: insufficient buffer space for reply");
12119		return NL_SKIP;
12120	}
12121
12122	nla_for_each_nested(nl, nl_vendor_reply, rem) {
12123		wpabuf_put_data(buf, nla_data(nl), nla_len(nl));
12124	}
12125
12126	return NL_SKIP;
12127}
12128
12129
12130static int nl80211_vendor_cmd(void *priv, unsigned int vendor_id,
12131			      unsigned int subcmd, const u8 *data,
12132			      size_t data_len, struct wpabuf *buf)
12133{
12134	struct i802_bss *bss = priv;
12135	struct wpa_driver_nl80211_data *drv = bss->drv;
12136	struct nl_msg *msg;
12137	int ret;
12138
12139	msg = nlmsg_alloc();
12140	if (!msg)
12141		return -ENOMEM;
12142
12143#ifdef CONFIG_TESTING_OPTIONS
12144	if (vendor_id == 0xffffffff) {
12145		nl80211_cmd(drv, msg, 0, subcmd);
12146		if (nlmsg_append(msg, (void *) data, data_len, NLMSG_ALIGNTO) <
12147		    0)
12148			goto nla_put_failure;
12149		ret = send_and_recv_msgs(drv, msg, cmd_reply_handler, buf);
12150		if (ret)
12151			wpa_printf(MSG_DEBUG, "nl80211: command failed err=%d",
12152				   ret);
12153		return ret;
12154	}
12155#endif /* CONFIG_TESTING_OPTIONS */
12156
12157	nl80211_cmd(drv, msg, 0, NL80211_CMD_VENDOR);
12158	if (nl80211_set_iface_id(msg, bss) < 0)
12159		goto nla_put_failure;
12160	NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_ID, vendor_id);
12161	NLA_PUT_U32(msg, NL80211_ATTR_VENDOR_SUBCMD, subcmd);
12162	if (data)
12163		NLA_PUT(msg, NL80211_ATTR_VENDOR_DATA, data_len, data);
12164
12165	ret = send_and_recv_msgs(drv, msg, vendor_reply_handler, buf);
12166	if (ret)
12167		wpa_printf(MSG_DEBUG, "nl80211: vendor command failed err=%d",
12168			   ret);
12169	return ret;
12170
12171nla_put_failure:
12172	nlmsg_free(msg);
12173	return -ENOBUFS;
12174}
12175
12176
12177static int nl80211_set_qos_map(void *priv, const u8 *qos_map_set,
12178			       u8 qos_map_set_len)
12179{
12180	struct i802_bss *bss = priv;
12181	struct wpa_driver_nl80211_data *drv = bss->drv;
12182	struct nl_msg *msg;
12183	int ret;
12184
12185	msg = nlmsg_alloc();
12186	if (!msg)
12187		return -ENOMEM;
12188
12189	wpa_hexdump(MSG_DEBUG, "nl80211: Setting QoS Map",
12190		    qos_map_set, qos_map_set_len);
12191
12192	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_QOS_MAP);
12193	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
12194	NLA_PUT(msg, NL80211_ATTR_QOS_MAP, qos_map_set_len, qos_map_set);
12195
12196	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
12197	if (ret)
12198		wpa_printf(MSG_DEBUG, "nl80211: Setting QoS Map failed");
12199
12200	return ret;
12201
12202nla_put_failure:
12203	nlmsg_free(msg);
12204	return -ENOBUFS;
12205}
12206
12207
12208static int nl80211_set_wowlan(void *priv,
12209			      const struct wowlan_triggers *triggers)
12210{
12211	struct i802_bss *bss = priv;
12212	struct wpa_driver_nl80211_data *drv = bss->drv;
12213	struct nl_msg *msg;
12214	struct nlattr *wowlan_triggers;
12215	int ret;
12216
12217	msg = nlmsg_alloc();
12218	if (!msg)
12219		return -ENOMEM;
12220
12221	wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan");
12222
12223	nl80211_cmd(drv, msg, 0, NL80211_CMD_SET_WOWLAN);
12224	NLA_PUT_U32(msg, NL80211_ATTR_IFINDEX, drv->ifindex);
12225
12226	wowlan_triggers = nla_nest_start(msg, NL80211_ATTR_WOWLAN_TRIGGERS);
12227	if (!wowlan_triggers)
12228		goto nla_put_failure;
12229
12230	if (triggers->any)
12231		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_ANY);
12232	if (triggers->disconnect)
12233		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_DISCONNECT);
12234	if (triggers->magic_pkt)
12235		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_MAGIC_PKT);
12236	if (triggers->gtk_rekey_failure)
12237		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE);
12238	if (triggers->eap_identity_req)
12239		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST);
12240	if (triggers->four_way_handshake)
12241		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE);
12242	if (triggers->rfkill_release)
12243		NLA_PUT_FLAG(msg, NL80211_WOWLAN_TRIG_RFKILL_RELEASE);
12244
12245	nla_nest_end(msg, wowlan_triggers);
12246
12247	ret = send_and_recv_msgs(drv, msg, NULL, NULL);
12248	if (ret)
12249		wpa_printf(MSG_DEBUG, "nl80211: Setting wowlan failed");
12250
12251	return ret;
12252
12253nla_put_failure:
12254	nlmsg_free(msg);
12255	return -ENOBUFS;
12256}
12257
12258
12259const struct wpa_driver_ops wpa_driver_nl80211_ops = {
12260	.name = "nl80211",
12261	.desc = "Linux nl80211/cfg80211",
12262	.get_bssid = wpa_driver_nl80211_get_bssid,
12263	.get_ssid = wpa_driver_nl80211_get_ssid,
12264	.set_key = driver_nl80211_set_key,
12265	.scan2 = driver_nl80211_scan2,
12266	.sched_scan = wpa_driver_nl80211_sched_scan,
12267	.stop_sched_scan = wpa_driver_nl80211_stop_sched_scan,
12268	.get_scan_results2 = wpa_driver_nl80211_get_scan_results,
12269	.deauthenticate = driver_nl80211_deauthenticate,
12270	.authenticate = driver_nl80211_authenticate,
12271	.associate = wpa_driver_nl80211_associate,
12272	.global_init = nl80211_global_init,
12273	.global_deinit = nl80211_global_deinit,
12274	.init2 = wpa_driver_nl80211_init,
12275	.deinit = driver_nl80211_deinit,
12276	.get_capa = wpa_driver_nl80211_get_capa,
12277	.set_operstate = wpa_driver_nl80211_set_operstate,
12278	.set_supp_port = wpa_driver_nl80211_set_supp_port,
12279	.set_country = wpa_driver_nl80211_set_country,
12280	.get_country = wpa_driver_nl80211_get_country,
12281	.set_ap = wpa_driver_nl80211_set_ap,
12282	.set_acl = wpa_driver_nl80211_set_acl,
12283	.if_add = wpa_driver_nl80211_if_add,
12284	.if_remove = driver_nl80211_if_remove,
12285	.send_mlme = driver_nl80211_send_mlme,
12286	.get_hw_feature_data = wpa_driver_nl80211_get_hw_feature_data,
12287	.sta_add = wpa_driver_nl80211_sta_add,
12288	.sta_remove = driver_nl80211_sta_remove,
12289	.hapd_send_eapol = wpa_driver_nl80211_hapd_send_eapol,
12290	.sta_set_flags = wpa_driver_nl80211_sta_set_flags,
12291	.hapd_init = i802_init,
12292	.hapd_deinit = i802_deinit,
12293	.set_wds_sta = i802_set_wds_sta,
12294	.get_seqnum = i802_get_seqnum,
12295	.flush = i802_flush,
12296	.get_inact_sec = i802_get_inact_sec,
12297	.sta_clear_stats = i802_sta_clear_stats,
12298	.set_rts = i802_set_rts,
12299	.set_frag = i802_set_frag,
12300	.set_tx_queue_params = i802_set_tx_queue_params,
12301	.set_sta_vlan = driver_nl80211_set_sta_vlan,
12302	.sta_deauth = i802_sta_deauth,
12303	.sta_disassoc = i802_sta_disassoc,
12304	.read_sta_data = driver_nl80211_read_sta_data,
12305	.set_freq = i802_set_freq,
12306	.send_action = driver_nl80211_send_action,
12307	.send_action_cancel_wait = wpa_driver_nl80211_send_action_cancel_wait,
12308	.remain_on_channel = wpa_driver_nl80211_remain_on_channel,
12309	.cancel_remain_on_channel =
12310	wpa_driver_nl80211_cancel_remain_on_channel,
12311	.probe_req_report = driver_nl80211_probe_req_report,
12312	.deinit_ap = wpa_driver_nl80211_deinit_ap,
12313	.deinit_p2p_cli = wpa_driver_nl80211_deinit_p2p_cli,
12314	.resume = wpa_driver_nl80211_resume,
12315	.send_ft_action = nl80211_send_ft_action,
12316	.signal_monitor = nl80211_signal_monitor,
12317	.signal_poll = nl80211_signal_poll,
12318	.send_frame = nl80211_send_frame,
12319	.shared_freq = wpa_driver_nl80211_shared_freq,
12320	.set_param = nl80211_set_param,
12321	.get_radio_name = nl80211_get_radio_name,
12322	.add_pmkid = nl80211_add_pmkid,
12323	.remove_pmkid = nl80211_remove_pmkid,
12324	.flush_pmkid = nl80211_flush_pmkid,
12325	.set_rekey_info = nl80211_set_rekey_info,
12326	.poll_client = nl80211_poll_client,
12327	.set_p2p_powersave = nl80211_set_p2p_powersave,
12328	.start_dfs_cac = nl80211_start_radar_detection,
12329	.stop_ap = wpa_driver_nl80211_stop_ap,
12330#ifdef CONFIG_TDLS
12331	.send_tdls_mgmt = nl80211_send_tdls_mgmt,
12332	.tdls_oper = nl80211_tdls_oper,
12333#endif /* CONFIG_TDLS */
12334	.update_ft_ies = wpa_driver_nl80211_update_ft_ies,
12335	.get_mac_addr = wpa_driver_nl80211_get_macaddr,
12336	.get_survey = wpa_driver_nl80211_get_survey,
12337	.status = wpa_driver_nl80211_status,
12338	.switch_channel = nl80211_switch_channel,
12339#ifdef ANDROID_P2P
12340	.set_noa = wpa_driver_set_p2p_noa,
12341	.get_noa = wpa_driver_get_p2p_noa,
12342	.set_ap_wps_ie = wpa_driver_set_ap_wps_p2p_ie,
12343#endif /* ANDROID_P2P */
12344#ifdef ANDROID
12345	.driver_cmd = wpa_driver_nl80211_driver_cmd,
12346#endif /* ANDROID */
12347	.vendor_cmd = nl80211_vendor_cmd,
12348	.set_qos_map = nl80211_set_qos_map,
12349	.set_wowlan = nl80211_set_wowlan,
12350};
12351