driver_nl80211_scan.c 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972
  1. /*
  2. * Driver interaction with Linux nl80211/cfg80211 - Scanning
  3. * Copyright (c) 2002-2014, Jouni Malinen <j@w1.fi>
  4. * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
  5. * Copyright (c) 2009-2010, Atheros Communications
  6. *
  7. * This software may be distributed under the terms of the BSD license.
  8. * See README for more details.
  9. */
  10. #include "includes.h"
  11. #include <netlink/genl/genl.h>
  12. #include "utils/common.h"
  13. #include "utils/eloop.h"
  14. #include "common/ieee802_11_defs.h"
  15. #include "common/qca-vendor.h"
  16. #include "driver_nl80211.h"
  17. static int get_noise_for_scan_results(struct nl_msg *msg, void *arg)
  18. {
  19. struct nlattr *tb[NL80211_ATTR_MAX + 1];
  20. struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
  21. struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
  22. static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
  23. [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
  24. [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
  25. };
  26. struct wpa_scan_results *scan_results = arg;
  27. struct wpa_scan_res *scan_res;
  28. size_t i;
  29. nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
  30. genlmsg_attrlen(gnlh, 0), NULL);
  31. if (!tb[NL80211_ATTR_SURVEY_INFO]) {
  32. wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
  33. return NL_SKIP;
  34. }
  35. if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
  36. tb[NL80211_ATTR_SURVEY_INFO],
  37. survey_policy)) {
  38. wpa_printf(MSG_DEBUG, "nl80211: Failed to parse nested "
  39. "attributes");
  40. return NL_SKIP;
  41. }
  42. if (!sinfo[NL80211_SURVEY_INFO_NOISE])
  43. return NL_SKIP;
  44. if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
  45. return NL_SKIP;
  46. for (i = 0; i < scan_results->num; ++i) {
  47. scan_res = scan_results->res[i];
  48. if (!scan_res)
  49. continue;
  50. if ((int) nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
  51. scan_res->freq)
  52. continue;
  53. if (!(scan_res->flags & WPA_SCAN_NOISE_INVALID))
  54. continue;
  55. scan_res->noise = (s8)
  56. nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
  57. scan_res->flags &= ~WPA_SCAN_NOISE_INVALID;
  58. }
  59. return NL_SKIP;
  60. }
  61. static int nl80211_get_noise_for_scan_results(
  62. struct wpa_driver_nl80211_data *drv,
  63. struct wpa_scan_results *scan_res)
  64. {
  65. struct nl_msg *msg;
  66. msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
  67. return send_and_recv_msgs(drv, msg, get_noise_for_scan_results,
  68. scan_res);
  69. }
  70. /**
  71. * wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
  72. * @eloop_ctx: Driver private data
  73. * @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
  74. *
  75. * This function can be used as registered timeout when starting a scan to
  76. * generate a scan completed event if the driver does not report this.
  77. */
  78. void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx)
  79. {
  80. struct wpa_driver_nl80211_data *drv = eloop_ctx;
  81. if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED) {
  82. wpa_driver_nl80211_set_mode(drv->first_bss,
  83. drv->ap_scan_as_station);
  84. drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
  85. }
  86. wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
  87. wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
  88. }
  89. static struct nl_msg *
  90. nl80211_scan_common(struct i802_bss *bss, u8 cmd,
  91. struct wpa_driver_scan_params *params)
  92. {
  93. struct wpa_driver_nl80211_data *drv = bss->drv;
  94. struct nl_msg *msg;
  95. size_t i;
  96. u32 scan_flags = 0;
  97. msg = nl80211_cmd_msg(bss, 0, cmd);
  98. if (!msg)
  99. return NULL;
  100. if (params->num_ssids) {
  101. struct nlattr *ssids;
  102. ssids = nla_nest_start(msg, NL80211_ATTR_SCAN_SSIDS);
  103. if (ssids == NULL)
  104. goto fail;
  105. for (i = 0; i < params->num_ssids; i++) {
  106. wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
  107. params->ssids[i].ssid,
  108. params->ssids[i].ssid_len);
  109. if (nla_put(msg, i + 1, params->ssids[i].ssid_len,
  110. params->ssids[i].ssid))
  111. goto fail;
  112. }
  113. nla_nest_end(msg, ssids);
  114. }
  115. if (params->extra_ies) {
  116. wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
  117. params->extra_ies, params->extra_ies_len);
  118. if (nla_put(msg, NL80211_ATTR_IE, params->extra_ies_len,
  119. params->extra_ies))
  120. goto fail;
  121. }
  122. if (params->freqs) {
  123. struct nlattr *freqs;
  124. freqs = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES);
  125. if (freqs == NULL)
  126. goto fail;
  127. for (i = 0; params->freqs[i]; i++) {
  128. wpa_printf(MSG_MSGDUMP, "nl80211: Scan frequency %u "
  129. "MHz", params->freqs[i]);
  130. if (nla_put_u32(msg, i + 1, params->freqs[i]))
  131. goto fail;
  132. }
  133. nla_nest_end(msg, freqs);
  134. }
  135. os_free(drv->filter_ssids);
  136. drv->filter_ssids = params->filter_ssids;
  137. params->filter_ssids = NULL;
  138. drv->num_filter_ssids = params->num_filter_ssids;
  139. if (params->only_new_results) {
  140. wpa_printf(MSG_DEBUG, "nl80211: Add NL80211_SCAN_FLAG_FLUSH");
  141. scan_flags |= NL80211_SCAN_FLAG_FLUSH;
  142. }
  143. if (params->low_priority && drv->have_low_prio_scan) {
  144. wpa_printf(MSG_DEBUG,
  145. "nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY");
  146. scan_flags |= NL80211_SCAN_FLAG_LOW_PRIORITY;
  147. }
  148. if (params->mac_addr_rand) {
  149. wpa_printf(MSG_DEBUG,
  150. "nl80211: Add NL80211_SCAN_FLAG_RANDOM_ADDR");
  151. scan_flags |= NL80211_SCAN_FLAG_RANDOM_ADDR;
  152. if (params->mac_addr) {
  153. wpa_printf(MSG_DEBUG, "nl80211: MAC address: " MACSTR,
  154. MAC2STR(params->mac_addr));
  155. if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
  156. params->mac_addr))
  157. goto fail;
  158. }
  159. if (params->mac_addr_mask) {
  160. wpa_printf(MSG_DEBUG, "nl80211: MAC address mask: "
  161. MACSTR, MAC2STR(params->mac_addr_mask));
  162. if (nla_put(msg, NL80211_ATTR_MAC_MASK, ETH_ALEN,
  163. params->mac_addr_mask))
  164. goto fail;
  165. }
  166. }
  167. if (scan_flags &&
  168. nla_put_u32(msg, NL80211_ATTR_SCAN_FLAGS, scan_flags))
  169. goto fail;
  170. return msg;
  171. fail:
  172. nlmsg_free(msg);
  173. return NULL;
  174. }
  175. /**
  176. * wpa_driver_nl80211_scan - Request the driver to initiate scan
  177. * @bss: Pointer to private driver data from wpa_driver_nl80211_init()
  178. * @params: Scan parameters
  179. * Returns: 0 on success, -1 on failure
  180. */
  181. int wpa_driver_nl80211_scan(struct i802_bss *bss,
  182. struct wpa_driver_scan_params *params)
  183. {
  184. struct wpa_driver_nl80211_data *drv = bss->drv;
  185. int ret = -1, timeout;
  186. struct nl_msg *msg = NULL;
  187. wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: scan request");
  188. drv->scan_for_auth = 0;
  189. if (TEST_FAIL())
  190. return -1;
  191. msg = nl80211_scan_common(bss, NL80211_CMD_TRIGGER_SCAN, params);
  192. if (!msg)
  193. return -1;
  194. if (params->p2p_probe) {
  195. struct nlattr *rates;
  196. wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
  197. rates = nla_nest_start(msg, NL80211_ATTR_SCAN_SUPP_RATES);
  198. if (rates == NULL)
  199. goto fail;
  200. /*
  201. * Remove 2.4 GHz rates 1, 2, 5.5, 11 Mbps from supported rates
  202. * by masking out everything else apart from the OFDM rates 6,
  203. * 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS rates. All 5 GHz
  204. * rates are left enabled.
  205. */
  206. if (nla_put(msg, NL80211_BAND_2GHZ, 8,
  207. "\x0c\x12\x18\x24\x30\x48\x60\x6c"))
  208. goto fail;
  209. nla_nest_end(msg, rates);
  210. if (nla_put_flag(msg, NL80211_ATTR_TX_NO_CCK_RATE))
  211. goto fail;
  212. }
  213. ret = send_and_recv_msgs(drv, msg, NULL, NULL);
  214. msg = NULL;
  215. if (ret) {
  216. wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
  217. "(%s)", ret, strerror(-ret));
  218. if (drv->hostapd && is_ap_interface(drv->nlmode)) {
  219. enum nl80211_iftype old_mode = drv->nlmode;
  220. /*
  221. * mac80211 does not allow scan requests in AP mode, so
  222. * try to do this in station mode.
  223. */
  224. if (wpa_driver_nl80211_set_mode(
  225. bss, NL80211_IFTYPE_STATION))
  226. goto fail;
  227. if (wpa_driver_nl80211_scan(bss, params)) {
  228. wpa_driver_nl80211_set_mode(bss, old_mode);
  229. goto fail;
  230. }
  231. /* Restore AP mode when processing scan results */
  232. drv->ap_scan_as_station = old_mode;
  233. ret = 0;
  234. } else
  235. goto fail;
  236. }
  237. drv->scan_state = SCAN_REQUESTED;
  238. /* Not all drivers generate "scan completed" wireless event, so try to
  239. * read results after a timeout. */
  240. timeout = 10;
  241. if (drv->scan_complete_events) {
  242. /*
  243. * The driver seems to deliver events to notify when scan is
  244. * complete, so use longer timeout to avoid race conditions
  245. * with scanning and following association request.
  246. */
  247. timeout = 30;
  248. }
  249. wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
  250. "seconds", ret, timeout);
  251. eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
  252. eloop_register_timeout(timeout, 0, wpa_driver_nl80211_scan_timeout,
  253. drv, drv->ctx);
  254. drv->last_scan_cmd = NL80211_CMD_TRIGGER_SCAN;
  255. fail:
  256. nlmsg_free(msg);
  257. return ret;
  258. }
  259. /**
  260. * wpa_driver_nl80211_sched_scan - Initiate a scheduled scan
  261. * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
  262. * @params: Scan parameters
  263. * @interval: Interval between scan cycles in milliseconds
  264. * Returns: 0 on success, -1 on failure or if not supported
  265. */
  266. int wpa_driver_nl80211_sched_scan(void *priv,
  267. struct wpa_driver_scan_params *params,
  268. u32 interval)
  269. {
  270. struct i802_bss *bss = priv;
  271. struct wpa_driver_nl80211_data *drv = bss->drv;
  272. int ret = -1;
  273. struct nl_msg *msg;
  274. size_t i;
  275. wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: sched_scan request");
  276. #ifdef ANDROID
  277. if (!drv->capa.sched_scan_supported)
  278. return android_pno_start(bss, params);
  279. #endif /* ANDROID */
  280. msg = nl80211_scan_common(bss, NL80211_CMD_START_SCHED_SCAN, params);
  281. if (!msg ||
  282. nla_put_u32(msg, NL80211_ATTR_SCHED_SCAN_INTERVAL, interval))
  283. goto fail;
  284. if ((drv->num_filter_ssids &&
  285. (int) drv->num_filter_ssids <= drv->capa.max_match_sets) ||
  286. params->filter_rssi) {
  287. struct nlattr *match_sets;
  288. match_sets = nla_nest_start(msg, NL80211_ATTR_SCHED_SCAN_MATCH);
  289. if (match_sets == NULL)
  290. goto fail;
  291. for (i = 0; i < drv->num_filter_ssids; i++) {
  292. struct nlattr *match_set_ssid;
  293. wpa_hexdump_ascii(MSG_MSGDUMP,
  294. "nl80211: Sched scan filter SSID",
  295. drv->filter_ssids[i].ssid,
  296. drv->filter_ssids[i].ssid_len);
  297. match_set_ssid = nla_nest_start(msg, i + 1);
  298. if (match_set_ssid == NULL ||
  299. nla_put(msg, NL80211_ATTR_SCHED_SCAN_MATCH_SSID,
  300. drv->filter_ssids[i].ssid_len,
  301. drv->filter_ssids[i].ssid) ||
  302. (params->filter_rssi &&
  303. nla_put_u32(msg,
  304. NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
  305. params->filter_rssi)))
  306. goto fail;
  307. nla_nest_end(msg, match_set_ssid);
  308. }
  309. /*
  310. * Due to backward compatibility code, newer kernels treat this
  311. * matchset (with only an RSSI filter) as the default for all
  312. * other matchsets, unless it's the only one, in which case the
  313. * matchset will actually allow all SSIDs above the RSSI.
  314. */
  315. if (params->filter_rssi) {
  316. struct nlattr *match_set_rssi;
  317. match_set_rssi = nla_nest_start(msg, 0);
  318. if (match_set_rssi == NULL ||
  319. nla_put_u32(msg, NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
  320. params->filter_rssi))
  321. goto fail;
  322. wpa_printf(MSG_MSGDUMP,
  323. "nl80211: Sched scan RSSI filter %d dBm",
  324. params->filter_rssi);
  325. nla_nest_end(msg, match_set_rssi);
  326. }
  327. nla_nest_end(msg, match_sets);
  328. }
  329. ret = send_and_recv_msgs(drv, msg, NULL, NULL);
  330. /* TODO: if we get an error here, we should fall back to normal scan */
  331. msg = NULL;
  332. if (ret) {
  333. wpa_printf(MSG_DEBUG, "nl80211: Sched scan start failed: "
  334. "ret=%d (%s)", ret, strerror(-ret));
  335. goto fail;
  336. }
  337. wpa_printf(MSG_DEBUG, "nl80211: Sched scan requested (ret=%d) - "
  338. "scan interval %d msec", ret, interval);
  339. fail:
  340. nlmsg_free(msg);
  341. return ret;
  342. }
  343. /**
  344. * wpa_driver_nl80211_stop_sched_scan - Stop a scheduled scan
  345. * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
  346. * Returns: 0 on success, -1 on failure or if not supported
  347. */
  348. int wpa_driver_nl80211_stop_sched_scan(void *priv)
  349. {
  350. struct i802_bss *bss = priv;
  351. struct wpa_driver_nl80211_data *drv = bss->drv;
  352. int ret;
  353. struct nl_msg *msg;
  354. #ifdef ANDROID
  355. if (!drv->capa.sched_scan_supported)
  356. return android_pno_stop(bss);
  357. #endif /* ANDROID */
  358. msg = nl80211_drv_msg(drv, 0, NL80211_CMD_STOP_SCHED_SCAN);
  359. ret = send_and_recv_msgs(drv, msg, NULL, NULL);
  360. if (ret) {
  361. wpa_printf(MSG_DEBUG,
  362. "nl80211: Sched scan stop failed: ret=%d (%s)",
  363. ret, strerror(-ret));
  364. } else {
  365. wpa_printf(MSG_DEBUG,
  366. "nl80211: Sched scan stop sent");
  367. }
  368. return ret;
  369. }
  370. const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie)
  371. {
  372. const u8 *end, *pos;
  373. if (ies == NULL)
  374. return NULL;
  375. pos = ies;
  376. end = ies + ies_len;
  377. while (pos + 1 < end) {
  378. if (pos + 2 + pos[1] > end)
  379. break;
  380. if (pos[0] == ie)
  381. return pos;
  382. pos += 2 + pos[1];
  383. }
  384. return NULL;
  385. }
  386. static int nl80211_scan_filtered(struct wpa_driver_nl80211_data *drv,
  387. const u8 *ie, size_t ie_len)
  388. {
  389. const u8 *ssid;
  390. size_t i;
  391. if (drv->filter_ssids == NULL)
  392. return 0;
  393. ssid = nl80211_get_ie(ie, ie_len, WLAN_EID_SSID);
  394. if (ssid == NULL)
  395. return 1;
  396. for (i = 0; i < drv->num_filter_ssids; i++) {
  397. if (ssid[1] == drv->filter_ssids[i].ssid_len &&
  398. os_memcmp(ssid + 2, drv->filter_ssids[i].ssid, ssid[1]) ==
  399. 0)
  400. return 0;
  401. }
  402. return 1;
  403. }
  404. int bss_info_handler(struct nl_msg *msg, void *arg)
  405. {
  406. struct nlattr *tb[NL80211_ATTR_MAX + 1];
  407. struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
  408. struct nlattr *bss[NL80211_BSS_MAX + 1];
  409. static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
  410. [NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
  411. [NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
  412. [NL80211_BSS_TSF] = { .type = NLA_U64 },
  413. [NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 },
  414. [NL80211_BSS_CAPABILITY] = { .type = NLA_U16 },
  415. [NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
  416. [NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 },
  417. [NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 },
  418. [NL80211_BSS_STATUS] = { .type = NLA_U32 },
  419. [NL80211_BSS_SEEN_MS_AGO] = { .type = NLA_U32 },
  420. [NL80211_BSS_BEACON_IES] = { .type = NLA_UNSPEC },
  421. };
  422. struct nl80211_bss_info_arg *_arg = arg;
  423. struct wpa_scan_results *res = _arg->res;
  424. struct wpa_scan_res **tmp;
  425. struct wpa_scan_res *r;
  426. const u8 *ie, *beacon_ie;
  427. size_t ie_len, beacon_ie_len;
  428. u8 *pos;
  429. size_t i;
  430. nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
  431. genlmsg_attrlen(gnlh, 0), NULL);
  432. if (!tb[NL80211_ATTR_BSS])
  433. return NL_SKIP;
  434. if (nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
  435. bss_policy))
  436. return NL_SKIP;
  437. if (bss[NL80211_BSS_STATUS]) {
  438. enum nl80211_bss_status status;
  439. status = nla_get_u32(bss[NL80211_BSS_STATUS]);
  440. if (status == NL80211_BSS_STATUS_ASSOCIATED &&
  441. bss[NL80211_BSS_FREQUENCY]) {
  442. _arg->assoc_freq =
  443. nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
  444. wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
  445. _arg->assoc_freq);
  446. }
  447. if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
  448. bss[NL80211_BSS_FREQUENCY]) {
  449. _arg->ibss_freq =
  450. nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
  451. wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
  452. _arg->ibss_freq);
  453. }
  454. if (status == NL80211_BSS_STATUS_ASSOCIATED &&
  455. bss[NL80211_BSS_BSSID]) {
  456. os_memcpy(_arg->assoc_bssid,
  457. nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN);
  458. wpa_printf(MSG_DEBUG, "nl80211: Associated with "
  459. MACSTR, MAC2STR(_arg->assoc_bssid));
  460. }
  461. }
  462. if (!res)
  463. return NL_SKIP;
  464. if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
  465. ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
  466. ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
  467. } else {
  468. ie = NULL;
  469. ie_len = 0;
  470. }
  471. if (bss[NL80211_BSS_BEACON_IES]) {
  472. beacon_ie = nla_data(bss[NL80211_BSS_BEACON_IES]);
  473. beacon_ie_len = nla_len(bss[NL80211_BSS_BEACON_IES]);
  474. } else {
  475. beacon_ie = NULL;
  476. beacon_ie_len = 0;
  477. }
  478. if (nl80211_scan_filtered(_arg->drv, ie ? ie : beacon_ie,
  479. ie ? ie_len : beacon_ie_len))
  480. return NL_SKIP;
  481. r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len);
  482. if (r == NULL)
  483. return NL_SKIP;
  484. if (bss[NL80211_BSS_BSSID])
  485. os_memcpy(r->bssid, nla_data(bss[NL80211_BSS_BSSID]),
  486. ETH_ALEN);
  487. if (bss[NL80211_BSS_FREQUENCY])
  488. r->freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
  489. if (bss[NL80211_BSS_BEACON_INTERVAL])
  490. r->beacon_int = nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL]);
  491. if (bss[NL80211_BSS_CAPABILITY])
  492. r->caps = nla_get_u16(bss[NL80211_BSS_CAPABILITY]);
  493. r->flags |= WPA_SCAN_NOISE_INVALID;
  494. if (bss[NL80211_BSS_SIGNAL_MBM]) {
  495. r->level = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]);
  496. r->level /= 100; /* mBm to dBm */
  497. r->flags |= WPA_SCAN_LEVEL_DBM | WPA_SCAN_QUAL_INVALID;
  498. } else if (bss[NL80211_BSS_SIGNAL_UNSPEC]) {
  499. r->level = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]);
  500. r->flags |= WPA_SCAN_QUAL_INVALID;
  501. } else
  502. r->flags |= WPA_SCAN_LEVEL_INVALID | WPA_SCAN_QUAL_INVALID;
  503. if (bss[NL80211_BSS_TSF])
  504. r->tsf = nla_get_u64(bss[NL80211_BSS_TSF]);
  505. if (bss[NL80211_BSS_BEACON_TSF]) {
  506. u64 tsf = nla_get_u64(bss[NL80211_BSS_BEACON_TSF]);
  507. if (tsf > r->tsf)
  508. r->tsf = tsf;
  509. }
  510. if (bss[NL80211_BSS_SEEN_MS_AGO])
  511. r->age = nla_get_u32(bss[NL80211_BSS_SEEN_MS_AGO]);
  512. r->ie_len = ie_len;
  513. pos = (u8 *) (r + 1);
  514. if (ie) {
  515. os_memcpy(pos, ie, ie_len);
  516. pos += ie_len;
  517. }
  518. r->beacon_ie_len = beacon_ie_len;
  519. if (beacon_ie)
  520. os_memcpy(pos, beacon_ie, beacon_ie_len);
  521. if (bss[NL80211_BSS_STATUS]) {
  522. enum nl80211_bss_status status;
  523. status = nla_get_u32(bss[NL80211_BSS_STATUS]);
  524. switch (status) {
  525. case NL80211_BSS_STATUS_ASSOCIATED:
  526. r->flags |= WPA_SCAN_ASSOCIATED;
  527. break;
  528. default:
  529. break;
  530. }
  531. }
  532. /*
  533. * cfg80211 maintains separate BSS table entries for APs if the same
  534. * BSSID,SSID pair is seen on multiple channels. wpa_supplicant does
  535. * not use frequency as a separate key in the BSS table, so filter out
  536. * duplicated entries. Prefer associated BSS entry in such a case in
  537. * order to get the correct frequency into the BSS table. Similarly,
  538. * prefer newer entries over older.
  539. */
  540. for (i = 0; i < res->num; i++) {
  541. const u8 *s1, *s2;
  542. if (os_memcmp(res->res[i]->bssid, r->bssid, ETH_ALEN) != 0)
  543. continue;
  544. s1 = nl80211_get_ie((u8 *) (res->res[i] + 1),
  545. res->res[i]->ie_len, WLAN_EID_SSID);
  546. s2 = nl80211_get_ie((u8 *) (r + 1), r->ie_len, WLAN_EID_SSID);
  547. if (s1 == NULL || s2 == NULL || s1[1] != s2[1] ||
  548. os_memcmp(s1, s2, 2 + s1[1]) != 0)
  549. continue;
  550. /* Same BSSID,SSID was already included in scan results */
  551. wpa_printf(MSG_DEBUG, "nl80211: Remove duplicated scan result "
  552. "for " MACSTR, MAC2STR(r->bssid));
  553. if (((r->flags & WPA_SCAN_ASSOCIATED) &&
  554. !(res->res[i]->flags & WPA_SCAN_ASSOCIATED)) ||
  555. r->age < res->res[i]->age) {
  556. os_free(res->res[i]);
  557. res->res[i] = r;
  558. } else
  559. os_free(r);
  560. return NL_SKIP;
  561. }
  562. tmp = os_realloc_array(res->res, res->num + 1,
  563. sizeof(struct wpa_scan_res *));
  564. if (tmp == NULL) {
  565. os_free(r);
  566. return NL_SKIP;
  567. }
  568. tmp[res->num++] = r;
  569. res->res = tmp;
  570. return NL_SKIP;
  571. }
  572. static void clear_state_mismatch(struct wpa_driver_nl80211_data *drv,
  573. const u8 *addr)
  574. {
  575. if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
  576. wpa_printf(MSG_DEBUG, "nl80211: Clear possible state "
  577. "mismatch (" MACSTR ")", MAC2STR(addr));
  578. wpa_driver_nl80211_mlme(drv, addr,
  579. NL80211_CMD_DEAUTHENTICATE,
  580. WLAN_REASON_PREV_AUTH_NOT_VALID, 1);
  581. }
  582. }
  583. static void wpa_driver_nl80211_check_bss_status(
  584. struct wpa_driver_nl80211_data *drv, struct wpa_scan_results *res)
  585. {
  586. size_t i;
  587. for (i = 0; i < res->num; i++) {
  588. struct wpa_scan_res *r = res->res[i];
  589. if (r->flags & WPA_SCAN_ASSOCIATED) {
  590. wpa_printf(MSG_DEBUG, "nl80211: Scan results "
  591. "indicate BSS status with " MACSTR
  592. " as associated",
  593. MAC2STR(r->bssid));
  594. if (is_sta_interface(drv->nlmode) &&
  595. !drv->associated) {
  596. wpa_printf(MSG_DEBUG, "nl80211: Local state "
  597. "(not associated) does not match "
  598. "with BSS state");
  599. clear_state_mismatch(drv, r->bssid);
  600. } else if (is_sta_interface(drv->nlmode) &&
  601. os_memcmp(drv->bssid, r->bssid, ETH_ALEN) !=
  602. 0) {
  603. wpa_printf(MSG_DEBUG, "nl80211: Local state "
  604. "(associated with " MACSTR ") does "
  605. "not match with BSS state",
  606. MAC2STR(drv->bssid));
  607. clear_state_mismatch(drv, r->bssid);
  608. clear_state_mismatch(drv, drv->bssid);
  609. }
  610. }
  611. }
  612. }
  613. static struct wpa_scan_results *
  614. nl80211_get_scan_results(struct wpa_driver_nl80211_data *drv)
  615. {
  616. struct nl_msg *msg;
  617. struct wpa_scan_results *res;
  618. int ret;
  619. struct nl80211_bss_info_arg arg;
  620. res = os_zalloc(sizeof(*res));
  621. if (res == NULL)
  622. return NULL;
  623. if (!(msg = nl80211_cmd_msg(drv->first_bss, NLM_F_DUMP,
  624. NL80211_CMD_GET_SCAN))) {
  625. wpa_scan_results_free(res);
  626. return NULL;
  627. }
  628. arg.drv = drv;
  629. arg.res = res;
  630. ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
  631. if (ret == 0) {
  632. wpa_printf(MSG_DEBUG, "nl80211: Received scan results (%lu "
  633. "BSSes)", (unsigned long) res->num);
  634. nl80211_get_noise_for_scan_results(drv, res);
  635. return res;
  636. }
  637. wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
  638. "(%s)", ret, strerror(-ret));
  639. wpa_scan_results_free(res);
  640. return NULL;
  641. }
  642. /**
  643. * wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
  644. * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
  645. * Returns: Scan results on success, -1 on failure
  646. */
  647. struct wpa_scan_results * wpa_driver_nl80211_get_scan_results(void *priv)
  648. {
  649. struct i802_bss *bss = priv;
  650. struct wpa_driver_nl80211_data *drv = bss->drv;
  651. struct wpa_scan_results *res;
  652. res = nl80211_get_scan_results(drv);
  653. if (res)
  654. wpa_driver_nl80211_check_bss_status(drv, res);
  655. return res;
  656. }
  657. void nl80211_dump_scan(struct wpa_driver_nl80211_data *drv)
  658. {
  659. struct wpa_scan_results *res;
  660. size_t i;
  661. res = nl80211_get_scan_results(drv);
  662. if (res == NULL) {
  663. wpa_printf(MSG_DEBUG, "nl80211: Failed to get scan results");
  664. return;
  665. }
  666. wpa_printf(MSG_DEBUG, "nl80211: Scan result dump");
  667. for (i = 0; i < res->num; i++) {
  668. struct wpa_scan_res *r = res->res[i];
  669. wpa_printf(MSG_DEBUG, "nl80211: %d/%d " MACSTR "%s",
  670. (int) i, (int) res->num, MAC2STR(r->bssid),
  671. r->flags & WPA_SCAN_ASSOCIATED ? " [assoc]" : "");
  672. }
  673. wpa_scan_results_free(res);
  674. }
  675. static int scan_cookie_handler(struct nl_msg *msg, void *arg)
  676. {
  677. struct nlattr *tb[NL80211_ATTR_MAX + 1];
  678. struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
  679. u64 *cookie = arg;
  680. nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
  681. genlmsg_attrlen(gnlh, 0), NULL);
  682. if (tb[NL80211_ATTR_VENDOR_DATA]) {
  683. struct nlattr *nl_vendor = tb[NL80211_ATTR_VENDOR_DATA];
  684. struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_SCAN_MAX + 1];
  685. nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_SCAN_MAX,
  686. nla_data(nl_vendor), nla_len(nl_vendor), NULL);
  687. if (tb_vendor[QCA_WLAN_VENDOR_ATTR_SCAN_COOKIE])
  688. *cookie = nla_get_u64(
  689. tb_vendor[QCA_WLAN_VENDOR_ATTR_SCAN_COOKIE]);
  690. }
  691. return NL_SKIP;
  692. }
  693. /**
  694. * wpa_driver_nl80211_vendor_scan - Request the driver to initiate a vendor scan
  695. * @bss: Pointer to private driver data from wpa_driver_nl80211_init()
  696. * @params: Scan parameters
  697. * Returns: 0 on success, -1 on failure
  698. */
  699. int wpa_driver_nl80211_vendor_scan(struct i802_bss *bss,
  700. struct wpa_driver_scan_params *params)
  701. {
  702. struct wpa_driver_nl80211_data *drv = bss->drv;
  703. struct nl_msg *msg = NULL;
  704. struct nlattr *attr;
  705. size_t i;
  706. u32 scan_flags = 0;
  707. int ret = -1;
  708. u64 cookie = 0;
  709. wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: vendor scan request");
  710. drv->scan_for_auth = 0;
  711. if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
  712. nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
  713. nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
  714. QCA_NL80211_VENDOR_SUBCMD_TRIGGER_SCAN) )
  715. goto fail;
  716. attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
  717. if (attr == NULL)
  718. goto fail;
  719. if (params->num_ssids) {
  720. struct nlattr *ssids;
  721. ssids = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_SCAN_SSIDS);
  722. if (ssids == NULL)
  723. goto fail;
  724. for (i = 0; i < params->num_ssids; i++) {
  725. wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
  726. params->ssids[i].ssid,
  727. params->ssids[i].ssid_len);
  728. if (nla_put(msg, i + 1, params->ssids[i].ssid_len,
  729. params->ssids[i].ssid))
  730. goto fail;
  731. }
  732. nla_nest_end(msg, ssids);
  733. }
  734. if (params->extra_ies) {
  735. wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
  736. params->extra_ies, params->extra_ies_len);
  737. if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SCAN_IE,
  738. params->extra_ies_len, params->extra_ies))
  739. goto fail;
  740. }
  741. if (params->freqs) {
  742. struct nlattr *freqs;
  743. freqs = nla_nest_start(msg,
  744. QCA_WLAN_VENDOR_ATTR_SCAN_FREQUENCIES);
  745. if (freqs == NULL)
  746. goto fail;
  747. for (i = 0; params->freqs[i]; i++) {
  748. wpa_printf(MSG_MSGDUMP,
  749. "nl80211: Scan frequency %u MHz",
  750. params->freqs[i]);
  751. if (nla_put_u32(msg, i + 1, params->freqs[i]))
  752. goto fail;
  753. }
  754. nla_nest_end(msg, freqs);
  755. }
  756. os_free(drv->filter_ssids);
  757. drv->filter_ssids = params->filter_ssids;
  758. params->filter_ssids = NULL;
  759. drv->num_filter_ssids = params->num_filter_ssids;
  760. if (params->low_priority && drv->have_low_prio_scan) {
  761. wpa_printf(MSG_DEBUG,
  762. "nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY");
  763. scan_flags |= NL80211_SCAN_FLAG_LOW_PRIORITY;
  764. }
  765. if (params->mac_addr_rand) {
  766. wpa_printf(MSG_DEBUG,
  767. "nl80211: Add NL80211_SCAN_FLAG_RANDOM_ADDR");
  768. scan_flags |= NL80211_SCAN_FLAG_RANDOM_ADDR;
  769. if (params->mac_addr) {
  770. wpa_printf(MSG_DEBUG, "nl80211: MAC address: " MACSTR,
  771. MAC2STR(params->mac_addr));
  772. if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SCAN_MAC,
  773. ETH_ALEN, params->mac_addr))
  774. goto fail;
  775. }
  776. if (params->mac_addr_mask) {
  777. wpa_printf(MSG_DEBUG, "nl80211: MAC address mask: "
  778. MACSTR, MAC2STR(params->mac_addr_mask));
  779. if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SCAN_MAC_MASK,
  780. ETH_ALEN, params->mac_addr_mask))
  781. goto fail;
  782. }
  783. }
  784. if (scan_flags &&
  785. nla_put_u32(msg, NL80211_ATTR_SCAN_FLAGS, scan_flags))
  786. goto fail;
  787. if (params->p2p_probe) {
  788. struct nlattr *rates;
  789. wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
  790. rates = nla_nest_start(msg,
  791. QCA_WLAN_VENDOR_ATTR_SCAN_SUPP_RATES);
  792. if (rates == NULL)
  793. goto fail;
  794. /*
  795. * Remove 2.4 GHz rates 1, 2, 5.5, 11 Mbps from supported rates
  796. * by masking out everything else apart from the OFDM rates 6,
  797. * 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS rates. All 5 GHz
  798. * rates are left enabled.
  799. */
  800. if (nla_put(msg, NL80211_BAND_2GHZ, 8,
  801. "\x0c\x12\x18\x24\x30\x48\x60\x6c"))
  802. goto fail;
  803. nla_nest_end(msg, rates);
  804. if (nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_SCAN_TX_NO_CCK_RATE))
  805. goto fail;
  806. }
  807. nla_nest_end(msg, attr);
  808. ret = send_and_recv_msgs(drv, msg, scan_cookie_handler, &cookie);
  809. msg = NULL;
  810. if (ret) {
  811. wpa_printf(MSG_DEBUG,
  812. "nl80211: Vendor scan trigger failed: ret=%d (%s)",
  813. ret, strerror(-ret));
  814. goto fail;
  815. }
  816. drv->vendor_scan_cookie = cookie;
  817. drv->scan_state = SCAN_REQUESTED;
  818. wpa_printf(MSG_DEBUG,
  819. "nl80211: Vendor scan requested (ret=%d) - scan timeout 30 seconds, scan cookie:0x%llx",
  820. ret, (long long unsigned int) cookie);
  821. eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
  822. eloop_register_timeout(30, 0, wpa_driver_nl80211_scan_timeout,
  823. drv, drv->ctx);
  824. drv->last_scan_cmd = NL80211_CMD_VENDOR;
  825. fail:
  826. nlmsg_free(msg);
  827. return ret;
  828. }