driver_nl80211_scan.c 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970
  1. /*
  2. * Driver interaction with Linux nl80211/cfg80211 - Scanning
  3. * Copyright (c) 2002-2014, Jouni Malinen <j@w1.fi>
  4. * Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
  5. * Copyright (c) 2009-2010, Atheros Communications
  6. *
  7. * This software may be distributed under the terms of the BSD license.
  8. * See README for more details.
  9. */
  10. #include "includes.h"
  11. #include <netlink/genl/genl.h>
  12. #include "utils/common.h"
  13. #include "utils/eloop.h"
  14. #include "common/ieee802_11_defs.h"
  15. #include "common/qca-vendor.h"
  16. #include "driver_nl80211.h"
  17. static int get_noise_for_scan_results(struct nl_msg *msg, void *arg)
  18. {
  19. struct nlattr *tb[NL80211_ATTR_MAX + 1];
  20. struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
  21. struct nlattr *sinfo[NL80211_SURVEY_INFO_MAX + 1];
  22. static struct nla_policy survey_policy[NL80211_SURVEY_INFO_MAX + 1] = {
  23. [NL80211_SURVEY_INFO_FREQUENCY] = { .type = NLA_U32 },
  24. [NL80211_SURVEY_INFO_NOISE] = { .type = NLA_U8 },
  25. };
  26. struct wpa_scan_results *scan_results = arg;
  27. struct wpa_scan_res *scan_res;
  28. size_t i;
  29. nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
  30. genlmsg_attrlen(gnlh, 0), NULL);
  31. if (!tb[NL80211_ATTR_SURVEY_INFO]) {
  32. wpa_printf(MSG_DEBUG, "nl80211: Survey data missing");
  33. return NL_SKIP;
  34. }
  35. if (nla_parse_nested(sinfo, NL80211_SURVEY_INFO_MAX,
  36. tb[NL80211_ATTR_SURVEY_INFO],
  37. survey_policy)) {
  38. wpa_printf(MSG_DEBUG, "nl80211: Failed to parse nested "
  39. "attributes");
  40. return NL_SKIP;
  41. }
  42. if (!sinfo[NL80211_SURVEY_INFO_NOISE])
  43. return NL_SKIP;
  44. if (!sinfo[NL80211_SURVEY_INFO_FREQUENCY])
  45. return NL_SKIP;
  46. for (i = 0; i < scan_results->num; ++i) {
  47. scan_res = scan_results->res[i];
  48. if (!scan_res)
  49. continue;
  50. if ((int) nla_get_u32(sinfo[NL80211_SURVEY_INFO_FREQUENCY]) !=
  51. scan_res->freq)
  52. continue;
  53. if (!(scan_res->flags & WPA_SCAN_NOISE_INVALID))
  54. continue;
  55. scan_res->noise = (s8)
  56. nla_get_u8(sinfo[NL80211_SURVEY_INFO_NOISE]);
  57. scan_res->flags &= ~WPA_SCAN_NOISE_INVALID;
  58. }
  59. return NL_SKIP;
  60. }
  61. static int nl80211_get_noise_for_scan_results(
  62. struct wpa_driver_nl80211_data *drv,
  63. struct wpa_scan_results *scan_res)
  64. {
  65. struct nl_msg *msg;
  66. msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_GET_SURVEY);
  67. return send_and_recv_msgs(drv, msg, get_noise_for_scan_results,
  68. scan_res);
  69. }
  70. /**
  71. * wpa_driver_nl80211_scan_timeout - Scan timeout to report scan completion
  72. * @eloop_ctx: Driver private data
  73. * @timeout_ctx: ctx argument given to wpa_driver_nl80211_init()
  74. *
  75. * This function can be used as registered timeout when starting a scan to
  76. * generate a scan completed event if the driver does not report this.
  77. */
  78. void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx)
  79. {
  80. struct wpa_driver_nl80211_data *drv = eloop_ctx;
  81. if (drv->ap_scan_as_station != NL80211_IFTYPE_UNSPECIFIED) {
  82. wpa_driver_nl80211_set_mode(drv->first_bss,
  83. drv->ap_scan_as_station);
  84. drv->ap_scan_as_station = NL80211_IFTYPE_UNSPECIFIED;
  85. }
  86. wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
  87. wpa_supplicant_event(timeout_ctx, EVENT_SCAN_RESULTS, NULL);
  88. }
  89. static struct nl_msg *
  90. nl80211_scan_common(struct i802_bss *bss, u8 cmd,
  91. struct wpa_driver_scan_params *params)
  92. {
  93. struct wpa_driver_nl80211_data *drv = bss->drv;
  94. struct nl_msg *msg;
  95. size_t i;
  96. u32 scan_flags = 0;
  97. msg = nl80211_cmd_msg(bss, 0, cmd);
  98. if (!msg)
  99. return NULL;
  100. if (params->num_ssids) {
  101. struct nlattr *ssids;
  102. ssids = nla_nest_start(msg, NL80211_ATTR_SCAN_SSIDS);
  103. if (ssids == NULL)
  104. goto fail;
  105. for (i = 0; i < params->num_ssids; i++) {
  106. wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
  107. params->ssids[i].ssid,
  108. params->ssids[i].ssid_len);
  109. if (nla_put(msg, i + 1, params->ssids[i].ssid_len,
  110. params->ssids[i].ssid))
  111. goto fail;
  112. }
  113. nla_nest_end(msg, ssids);
  114. }
  115. if (params->extra_ies) {
  116. wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
  117. params->extra_ies, params->extra_ies_len);
  118. if (nla_put(msg, NL80211_ATTR_IE, params->extra_ies_len,
  119. params->extra_ies))
  120. goto fail;
  121. }
  122. if (params->freqs) {
  123. struct nlattr *freqs;
  124. freqs = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES);
  125. if (freqs == NULL)
  126. goto fail;
  127. for (i = 0; params->freqs[i]; i++) {
  128. wpa_printf(MSG_MSGDUMP, "nl80211: Scan frequency %u "
  129. "MHz", params->freqs[i]);
  130. if (nla_put_u32(msg, i + 1, params->freqs[i]))
  131. goto fail;
  132. }
  133. nla_nest_end(msg, freqs);
  134. }
  135. os_free(drv->filter_ssids);
  136. drv->filter_ssids = params->filter_ssids;
  137. params->filter_ssids = NULL;
  138. drv->num_filter_ssids = params->num_filter_ssids;
  139. if (params->only_new_results) {
  140. wpa_printf(MSG_DEBUG, "nl80211: Add NL80211_SCAN_FLAG_FLUSH");
  141. scan_flags |= NL80211_SCAN_FLAG_FLUSH;
  142. }
  143. if (params->low_priority && drv->have_low_prio_scan) {
  144. wpa_printf(MSG_DEBUG,
  145. "nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY");
  146. scan_flags |= NL80211_SCAN_FLAG_LOW_PRIORITY;
  147. }
  148. if (params->mac_addr_rand) {
  149. wpa_printf(MSG_DEBUG,
  150. "nl80211: Add NL80211_SCAN_FLAG_RANDOM_ADDR");
  151. scan_flags |= NL80211_SCAN_FLAG_RANDOM_ADDR;
  152. if (params->mac_addr) {
  153. wpa_printf(MSG_DEBUG, "nl80211: MAC address: " MACSTR,
  154. MAC2STR(params->mac_addr));
  155. if (nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN,
  156. params->mac_addr))
  157. goto fail;
  158. }
  159. if (params->mac_addr_mask) {
  160. wpa_printf(MSG_DEBUG, "nl80211: MAC address mask: "
  161. MACSTR, MAC2STR(params->mac_addr_mask));
  162. if (nla_put(msg, NL80211_ATTR_MAC_MASK, ETH_ALEN,
  163. params->mac_addr_mask))
  164. goto fail;
  165. }
  166. }
  167. if (scan_flags &&
  168. nla_put_u32(msg, NL80211_ATTR_SCAN_FLAGS, scan_flags))
  169. goto fail;
  170. return msg;
  171. fail:
  172. nlmsg_free(msg);
  173. return NULL;
  174. }
  175. /**
  176. * wpa_driver_nl80211_scan - Request the driver to initiate scan
  177. * @bss: Pointer to private driver data from wpa_driver_nl80211_init()
  178. * @params: Scan parameters
  179. * Returns: 0 on success, -1 on failure
  180. */
  181. int wpa_driver_nl80211_scan(struct i802_bss *bss,
  182. struct wpa_driver_scan_params *params)
  183. {
  184. struct wpa_driver_nl80211_data *drv = bss->drv;
  185. int ret = -1, timeout;
  186. struct nl_msg *msg = NULL;
  187. wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: scan request");
  188. drv->scan_for_auth = 0;
  189. if (TEST_FAIL())
  190. return -1;
  191. msg = nl80211_scan_common(bss, NL80211_CMD_TRIGGER_SCAN, params);
  192. if (!msg)
  193. return -1;
  194. if (params->p2p_probe) {
  195. struct nlattr *rates;
  196. wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
  197. rates = nla_nest_start(msg, NL80211_ATTR_SCAN_SUPP_RATES);
  198. if (rates == NULL)
  199. goto fail;
  200. /*
  201. * Remove 2.4 GHz rates 1, 2, 5.5, 11 Mbps from supported rates
  202. * by masking out everything else apart from the OFDM rates 6,
  203. * 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS rates. All 5 GHz
  204. * rates are left enabled.
  205. */
  206. if (nla_put(msg, NL80211_BAND_2GHZ, 8,
  207. "\x0c\x12\x18\x24\x30\x48\x60\x6c"))
  208. goto fail;
  209. nla_nest_end(msg, rates);
  210. if (nla_put_flag(msg, NL80211_ATTR_TX_NO_CCK_RATE))
  211. goto fail;
  212. }
  213. ret = send_and_recv_msgs(drv, msg, NULL, NULL);
  214. msg = NULL;
  215. if (ret) {
  216. wpa_printf(MSG_DEBUG, "nl80211: Scan trigger failed: ret=%d "
  217. "(%s)", ret, strerror(-ret));
  218. if (drv->hostapd && is_ap_interface(drv->nlmode)) {
  219. enum nl80211_iftype old_mode = drv->nlmode;
  220. /*
  221. * mac80211 does not allow scan requests in AP mode, so
  222. * try to do this in station mode.
  223. */
  224. if (wpa_driver_nl80211_set_mode(
  225. bss, NL80211_IFTYPE_STATION))
  226. goto fail;
  227. if (wpa_driver_nl80211_scan(bss, params)) {
  228. wpa_driver_nl80211_set_mode(bss, old_mode);
  229. goto fail;
  230. }
  231. /* Restore AP mode when processing scan results */
  232. drv->ap_scan_as_station = old_mode;
  233. ret = 0;
  234. } else
  235. goto fail;
  236. }
  237. drv->scan_state = SCAN_REQUESTED;
  238. /* Not all drivers generate "scan completed" wireless event, so try to
  239. * read results after a timeout. */
  240. timeout = 10;
  241. if (drv->scan_complete_events) {
  242. /*
  243. * The driver seems to deliver events to notify when scan is
  244. * complete, so use longer timeout to avoid race conditions
  245. * with scanning and following association request.
  246. */
  247. timeout = 30;
  248. }
  249. wpa_printf(MSG_DEBUG, "Scan requested (ret=%d) - scan timeout %d "
  250. "seconds", ret, timeout);
  251. eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
  252. eloop_register_timeout(timeout, 0, wpa_driver_nl80211_scan_timeout,
  253. drv, drv->ctx);
  254. fail:
  255. nlmsg_free(msg);
  256. return ret;
  257. }
  258. /**
  259. * wpa_driver_nl80211_sched_scan - Initiate a scheduled scan
  260. * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
  261. * @params: Scan parameters
  262. * @interval: Interval between scan cycles in milliseconds
  263. * Returns: 0 on success, -1 on failure or if not supported
  264. */
  265. int wpa_driver_nl80211_sched_scan(void *priv,
  266. struct wpa_driver_scan_params *params,
  267. u32 interval)
  268. {
  269. struct i802_bss *bss = priv;
  270. struct wpa_driver_nl80211_data *drv = bss->drv;
  271. int ret = -1;
  272. struct nl_msg *msg;
  273. size_t i;
  274. wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: sched_scan request");
  275. #ifdef ANDROID
  276. if (!drv->capa.sched_scan_supported)
  277. return android_pno_start(bss, params);
  278. #endif /* ANDROID */
  279. msg = nl80211_scan_common(bss, NL80211_CMD_START_SCHED_SCAN, params);
  280. if (!msg ||
  281. nla_put_u32(msg, NL80211_ATTR_SCHED_SCAN_INTERVAL, interval))
  282. goto fail;
  283. if ((drv->num_filter_ssids &&
  284. (int) drv->num_filter_ssids <= drv->capa.max_match_sets) ||
  285. params->filter_rssi) {
  286. struct nlattr *match_sets;
  287. match_sets = nla_nest_start(msg, NL80211_ATTR_SCHED_SCAN_MATCH);
  288. if (match_sets == NULL)
  289. goto fail;
  290. for (i = 0; i < drv->num_filter_ssids; i++) {
  291. struct nlattr *match_set_ssid;
  292. wpa_hexdump_ascii(MSG_MSGDUMP,
  293. "nl80211: Sched scan filter SSID",
  294. drv->filter_ssids[i].ssid,
  295. drv->filter_ssids[i].ssid_len);
  296. match_set_ssid = nla_nest_start(msg, i + 1);
  297. if (match_set_ssid == NULL ||
  298. nla_put(msg, NL80211_ATTR_SCHED_SCAN_MATCH_SSID,
  299. drv->filter_ssids[i].ssid_len,
  300. drv->filter_ssids[i].ssid) ||
  301. (params->filter_rssi &&
  302. nla_put_u32(msg,
  303. NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
  304. params->filter_rssi)))
  305. goto fail;
  306. nla_nest_end(msg, match_set_ssid);
  307. }
  308. /*
  309. * Due to backward compatibility code, newer kernels treat this
  310. * matchset (with only an RSSI filter) as the default for all
  311. * other matchsets, unless it's the only one, in which case the
  312. * matchset will actually allow all SSIDs above the RSSI.
  313. */
  314. if (params->filter_rssi) {
  315. struct nlattr *match_set_rssi;
  316. match_set_rssi = nla_nest_start(msg, 0);
  317. if (match_set_rssi == NULL ||
  318. nla_put_u32(msg, NL80211_SCHED_SCAN_MATCH_ATTR_RSSI,
  319. params->filter_rssi))
  320. goto fail;
  321. wpa_printf(MSG_MSGDUMP,
  322. "nl80211: Sched scan RSSI filter %d dBm",
  323. params->filter_rssi);
  324. nla_nest_end(msg, match_set_rssi);
  325. }
  326. nla_nest_end(msg, match_sets);
  327. }
  328. ret = send_and_recv_msgs(drv, msg, NULL, NULL);
  329. /* TODO: if we get an error here, we should fall back to normal scan */
  330. msg = NULL;
  331. if (ret) {
  332. wpa_printf(MSG_DEBUG, "nl80211: Sched scan start failed: "
  333. "ret=%d (%s)", ret, strerror(-ret));
  334. goto fail;
  335. }
  336. wpa_printf(MSG_DEBUG, "nl80211: Sched scan requested (ret=%d) - "
  337. "scan interval %d msec", ret, interval);
  338. fail:
  339. nlmsg_free(msg);
  340. return ret;
  341. }
  342. /**
  343. * wpa_driver_nl80211_stop_sched_scan - Stop a scheduled scan
  344. * @priv: Pointer to private driver data from wpa_driver_nl80211_init()
  345. * Returns: 0 on success, -1 on failure or if not supported
  346. */
  347. int wpa_driver_nl80211_stop_sched_scan(void *priv)
  348. {
  349. struct i802_bss *bss = priv;
  350. struct wpa_driver_nl80211_data *drv = bss->drv;
  351. int ret;
  352. struct nl_msg *msg;
  353. #ifdef ANDROID
  354. if (!drv->capa.sched_scan_supported)
  355. return android_pno_stop(bss);
  356. #endif /* ANDROID */
  357. msg = nl80211_drv_msg(drv, 0, NL80211_CMD_STOP_SCHED_SCAN);
  358. ret = send_and_recv_msgs(drv, msg, NULL, NULL);
  359. if (ret) {
  360. wpa_printf(MSG_DEBUG,
  361. "nl80211: Sched scan stop failed: ret=%d (%s)",
  362. ret, strerror(-ret));
  363. } else {
  364. wpa_printf(MSG_DEBUG,
  365. "nl80211: Sched scan stop sent");
  366. }
  367. return ret;
  368. }
  369. const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie)
  370. {
  371. const u8 *end, *pos;
  372. if (ies == NULL)
  373. return NULL;
  374. pos = ies;
  375. end = ies + ies_len;
  376. while (pos + 1 < end) {
  377. if (pos + 2 + pos[1] > end)
  378. break;
  379. if (pos[0] == ie)
  380. return pos;
  381. pos += 2 + pos[1];
  382. }
  383. return NULL;
  384. }
  385. static int nl80211_scan_filtered(struct wpa_driver_nl80211_data *drv,
  386. const u8 *ie, size_t ie_len)
  387. {
  388. const u8 *ssid;
  389. size_t i;
  390. if (drv->filter_ssids == NULL)
  391. return 0;
  392. ssid = nl80211_get_ie(ie, ie_len, WLAN_EID_SSID);
  393. if (ssid == NULL)
  394. return 1;
  395. for (i = 0; i < drv->num_filter_ssids; i++) {
  396. if (ssid[1] == drv->filter_ssids[i].ssid_len &&
  397. os_memcmp(ssid + 2, drv->filter_ssids[i].ssid, ssid[1]) ==
  398. 0)
  399. return 0;
  400. }
  401. return 1;
  402. }
  403. int bss_info_handler(struct nl_msg *msg, void *arg)
  404. {
  405. struct nlattr *tb[NL80211_ATTR_MAX + 1];
  406. struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
  407. struct nlattr *bss[NL80211_BSS_MAX + 1];
  408. static struct nla_policy bss_policy[NL80211_BSS_MAX + 1] = {
  409. [NL80211_BSS_BSSID] = { .type = NLA_UNSPEC },
  410. [NL80211_BSS_FREQUENCY] = { .type = NLA_U32 },
  411. [NL80211_BSS_TSF] = { .type = NLA_U64 },
  412. [NL80211_BSS_BEACON_INTERVAL] = { .type = NLA_U16 },
  413. [NL80211_BSS_CAPABILITY] = { .type = NLA_U16 },
  414. [NL80211_BSS_INFORMATION_ELEMENTS] = { .type = NLA_UNSPEC },
  415. [NL80211_BSS_SIGNAL_MBM] = { .type = NLA_U32 },
  416. [NL80211_BSS_SIGNAL_UNSPEC] = { .type = NLA_U8 },
  417. [NL80211_BSS_STATUS] = { .type = NLA_U32 },
  418. [NL80211_BSS_SEEN_MS_AGO] = { .type = NLA_U32 },
  419. [NL80211_BSS_BEACON_IES] = { .type = NLA_UNSPEC },
  420. };
  421. struct nl80211_bss_info_arg *_arg = arg;
  422. struct wpa_scan_results *res = _arg->res;
  423. struct wpa_scan_res **tmp;
  424. struct wpa_scan_res *r;
  425. const u8 *ie, *beacon_ie;
  426. size_t ie_len, beacon_ie_len;
  427. u8 *pos;
  428. size_t i;
  429. nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
  430. genlmsg_attrlen(gnlh, 0), NULL);
  431. if (!tb[NL80211_ATTR_BSS])
  432. return NL_SKIP;
  433. if (nla_parse_nested(bss, NL80211_BSS_MAX, tb[NL80211_ATTR_BSS],
  434. bss_policy))
  435. return NL_SKIP;
  436. if (bss[NL80211_BSS_STATUS]) {
  437. enum nl80211_bss_status status;
  438. status = nla_get_u32(bss[NL80211_BSS_STATUS]);
  439. if (status == NL80211_BSS_STATUS_ASSOCIATED &&
  440. bss[NL80211_BSS_FREQUENCY]) {
  441. _arg->assoc_freq =
  442. nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
  443. wpa_printf(MSG_DEBUG, "nl80211: Associated on %u MHz",
  444. _arg->assoc_freq);
  445. }
  446. if (status == NL80211_BSS_STATUS_IBSS_JOINED &&
  447. bss[NL80211_BSS_FREQUENCY]) {
  448. _arg->ibss_freq =
  449. nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
  450. wpa_printf(MSG_DEBUG, "nl80211: IBSS-joined on %u MHz",
  451. _arg->ibss_freq);
  452. }
  453. if (status == NL80211_BSS_STATUS_ASSOCIATED &&
  454. bss[NL80211_BSS_BSSID]) {
  455. os_memcpy(_arg->assoc_bssid,
  456. nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN);
  457. wpa_printf(MSG_DEBUG, "nl80211: Associated with "
  458. MACSTR, MAC2STR(_arg->assoc_bssid));
  459. }
  460. }
  461. if (!res)
  462. return NL_SKIP;
  463. if (bss[NL80211_BSS_INFORMATION_ELEMENTS]) {
  464. ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
  465. ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]);
  466. } else {
  467. ie = NULL;
  468. ie_len = 0;
  469. }
  470. if (bss[NL80211_BSS_BEACON_IES]) {
  471. beacon_ie = nla_data(bss[NL80211_BSS_BEACON_IES]);
  472. beacon_ie_len = nla_len(bss[NL80211_BSS_BEACON_IES]);
  473. } else {
  474. beacon_ie = NULL;
  475. beacon_ie_len = 0;
  476. }
  477. if (nl80211_scan_filtered(_arg->drv, ie ? ie : beacon_ie,
  478. ie ? ie_len : beacon_ie_len))
  479. return NL_SKIP;
  480. r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len);
  481. if (r == NULL)
  482. return NL_SKIP;
  483. if (bss[NL80211_BSS_BSSID])
  484. os_memcpy(r->bssid, nla_data(bss[NL80211_BSS_BSSID]),
  485. ETH_ALEN);
  486. if (bss[NL80211_BSS_FREQUENCY])
  487. r->freq = nla_get_u32(bss[NL80211_BSS_FREQUENCY]);
  488. if (bss[NL80211_BSS_BEACON_INTERVAL])
  489. r->beacon_int = nla_get_u16(bss[NL80211_BSS_BEACON_INTERVAL]);
  490. if (bss[NL80211_BSS_CAPABILITY])
  491. r->caps = nla_get_u16(bss[NL80211_BSS_CAPABILITY]);
  492. r->flags |= WPA_SCAN_NOISE_INVALID;
  493. if (bss[NL80211_BSS_SIGNAL_MBM]) {
  494. r->level = nla_get_u32(bss[NL80211_BSS_SIGNAL_MBM]);
  495. r->level /= 100; /* mBm to dBm */
  496. r->flags |= WPA_SCAN_LEVEL_DBM | WPA_SCAN_QUAL_INVALID;
  497. } else if (bss[NL80211_BSS_SIGNAL_UNSPEC]) {
  498. r->level = nla_get_u8(bss[NL80211_BSS_SIGNAL_UNSPEC]);
  499. r->flags |= WPA_SCAN_QUAL_INVALID;
  500. } else
  501. r->flags |= WPA_SCAN_LEVEL_INVALID | WPA_SCAN_QUAL_INVALID;
  502. if (bss[NL80211_BSS_TSF])
  503. r->tsf = nla_get_u64(bss[NL80211_BSS_TSF]);
  504. if (bss[NL80211_BSS_BEACON_TSF]) {
  505. u64 tsf = nla_get_u64(bss[NL80211_BSS_BEACON_TSF]);
  506. if (tsf > r->tsf)
  507. r->tsf = tsf;
  508. }
  509. if (bss[NL80211_BSS_SEEN_MS_AGO])
  510. r->age = nla_get_u32(bss[NL80211_BSS_SEEN_MS_AGO]);
  511. r->ie_len = ie_len;
  512. pos = (u8 *) (r + 1);
  513. if (ie) {
  514. os_memcpy(pos, ie, ie_len);
  515. pos += ie_len;
  516. }
  517. r->beacon_ie_len = beacon_ie_len;
  518. if (beacon_ie)
  519. os_memcpy(pos, beacon_ie, beacon_ie_len);
  520. if (bss[NL80211_BSS_STATUS]) {
  521. enum nl80211_bss_status status;
  522. status = nla_get_u32(bss[NL80211_BSS_STATUS]);
  523. switch (status) {
  524. case NL80211_BSS_STATUS_ASSOCIATED:
  525. r->flags |= WPA_SCAN_ASSOCIATED;
  526. break;
  527. default:
  528. break;
  529. }
  530. }
  531. /*
  532. * cfg80211 maintains separate BSS table entries for APs if the same
  533. * BSSID,SSID pair is seen on multiple channels. wpa_supplicant does
  534. * not use frequency as a separate key in the BSS table, so filter out
  535. * duplicated entries. Prefer associated BSS entry in such a case in
  536. * order to get the correct frequency into the BSS table. Similarly,
  537. * prefer newer entries over older.
  538. */
  539. for (i = 0; i < res->num; i++) {
  540. const u8 *s1, *s2;
  541. if (os_memcmp(res->res[i]->bssid, r->bssid, ETH_ALEN) != 0)
  542. continue;
  543. s1 = nl80211_get_ie((u8 *) (res->res[i] + 1),
  544. res->res[i]->ie_len, WLAN_EID_SSID);
  545. s2 = nl80211_get_ie((u8 *) (r + 1), r->ie_len, WLAN_EID_SSID);
  546. if (s1 == NULL || s2 == NULL || s1[1] != s2[1] ||
  547. os_memcmp(s1, s2, 2 + s1[1]) != 0)
  548. continue;
  549. /* Same BSSID,SSID was already included in scan results */
  550. wpa_printf(MSG_DEBUG, "nl80211: Remove duplicated scan result "
  551. "for " MACSTR, MAC2STR(r->bssid));
  552. if (((r->flags & WPA_SCAN_ASSOCIATED) &&
  553. !(res->res[i]->flags & WPA_SCAN_ASSOCIATED)) ||
  554. r->age < res->res[i]->age) {
  555. os_free(res->res[i]);
  556. res->res[i] = r;
  557. } else
  558. os_free(r);
  559. return NL_SKIP;
  560. }
  561. tmp = os_realloc_array(res->res, res->num + 1,
  562. sizeof(struct wpa_scan_res *));
  563. if (tmp == NULL) {
  564. os_free(r);
  565. return NL_SKIP;
  566. }
  567. tmp[res->num++] = r;
  568. res->res = tmp;
  569. return NL_SKIP;
  570. }
  571. static void clear_state_mismatch(struct wpa_driver_nl80211_data *drv,
  572. const u8 *addr)
  573. {
  574. if (drv->capa.flags & WPA_DRIVER_FLAGS_SME) {
  575. wpa_printf(MSG_DEBUG, "nl80211: Clear possible state "
  576. "mismatch (" MACSTR ")", MAC2STR(addr));
  577. wpa_driver_nl80211_mlme(drv, addr,
  578. NL80211_CMD_DEAUTHENTICATE,
  579. WLAN_REASON_PREV_AUTH_NOT_VALID, 1);
  580. }
  581. }
  582. static void wpa_driver_nl80211_check_bss_status(
  583. struct wpa_driver_nl80211_data *drv, struct wpa_scan_results *res)
  584. {
  585. size_t i;
  586. for (i = 0; i < res->num; i++) {
  587. struct wpa_scan_res *r = res->res[i];
  588. if (r->flags & WPA_SCAN_ASSOCIATED) {
  589. wpa_printf(MSG_DEBUG, "nl80211: Scan results "
  590. "indicate BSS status with " MACSTR
  591. " as associated",
  592. MAC2STR(r->bssid));
  593. if (is_sta_interface(drv->nlmode) &&
  594. !drv->associated) {
  595. wpa_printf(MSG_DEBUG, "nl80211: Local state "
  596. "(not associated) does not match "
  597. "with BSS state");
  598. clear_state_mismatch(drv, r->bssid);
  599. } else if (is_sta_interface(drv->nlmode) &&
  600. os_memcmp(drv->bssid, r->bssid, ETH_ALEN) !=
  601. 0) {
  602. wpa_printf(MSG_DEBUG, "nl80211: Local state "
  603. "(associated with " MACSTR ") does "
  604. "not match with BSS state",
  605. MAC2STR(drv->bssid));
  606. clear_state_mismatch(drv, r->bssid);
  607. clear_state_mismatch(drv, drv->bssid);
  608. }
  609. }
  610. }
  611. }
  612. static struct wpa_scan_results *
  613. nl80211_get_scan_results(struct wpa_driver_nl80211_data *drv)
  614. {
  615. struct nl_msg *msg;
  616. struct wpa_scan_results *res;
  617. int ret;
  618. struct nl80211_bss_info_arg arg;
  619. res = os_zalloc(sizeof(*res));
  620. if (res == NULL)
  621. return NULL;
  622. if (!(msg = nl80211_cmd_msg(drv->first_bss, NLM_F_DUMP,
  623. NL80211_CMD_GET_SCAN))) {
  624. wpa_scan_results_free(res);
  625. return NULL;
  626. }
  627. arg.drv = drv;
  628. arg.res = res;
  629. ret = send_and_recv_msgs(drv, msg, bss_info_handler, &arg);
  630. if (ret == 0) {
  631. wpa_printf(MSG_DEBUG, "nl80211: Received scan results (%lu "
  632. "BSSes)", (unsigned long) res->num);
  633. nl80211_get_noise_for_scan_results(drv, res);
  634. return res;
  635. }
  636. wpa_printf(MSG_DEBUG, "nl80211: Scan result fetch failed: ret=%d "
  637. "(%s)", ret, strerror(-ret));
  638. wpa_scan_results_free(res);
  639. return NULL;
  640. }
  641. /**
  642. * wpa_driver_nl80211_get_scan_results - Fetch the latest scan results
  643. * @priv: Pointer to private wext data from wpa_driver_nl80211_init()
  644. * Returns: Scan results on success, -1 on failure
  645. */
  646. struct wpa_scan_results * wpa_driver_nl80211_get_scan_results(void *priv)
  647. {
  648. struct i802_bss *bss = priv;
  649. struct wpa_driver_nl80211_data *drv = bss->drv;
  650. struct wpa_scan_results *res;
  651. res = nl80211_get_scan_results(drv);
  652. if (res)
  653. wpa_driver_nl80211_check_bss_status(drv, res);
  654. return res;
  655. }
  656. void nl80211_dump_scan(struct wpa_driver_nl80211_data *drv)
  657. {
  658. struct wpa_scan_results *res;
  659. size_t i;
  660. res = nl80211_get_scan_results(drv);
  661. if (res == NULL) {
  662. wpa_printf(MSG_DEBUG, "nl80211: Failed to get scan results");
  663. return;
  664. }
  665. wpa_printf(MSG_DEBUG, "nl80211: Scan result dump");
  666. for (i = 0; i < res->num; i++) {
  667. struct wpa_scan_res *r = res->res[i];
  668. wpa_printf(MSG_DEBUG, "nl80211: %d/%d " MACSTR "%s",
  669. (int) i, (int) res->num, MAC2STR(r->bssid),
  670. r->flags & WPA_SCAN_ASSOCIATED ? " [assoc]" : "");
  671. }
  672. wpa_scan_results_free(res);
  673. }
  674. static int scan_cookie_handler(struct nl_msg *msg, void *arg)
  675. {
  676. struct nlattr *tb[NL80211_ATTR_MAX + 1];
  677. struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
  678. u64 *cookie = arg;
  679. nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
  680. genlmsg_attrlen(gnlh, 0), NULL);
  681. if (tb[NL80211_ATTR_VENDOR_DATA]) {
  682. struct nlattr *nl_vendor = tb[NL80211_ATTR_VENDOR_DATA];
  683. struct nlattr *tb_vendor[QCA_WLAN_VENDOR_ATTR_SCAN_MAX + 1];
  684. nla_parse(tb_vendor, QCA_WLAN_VENDOR_ATTR_SCAN_MAX,
  685. nla_data(nl_vendor), nla_len(nl_vendor), NULL);
  686. if (tb_vendor[QCA_WLAN_VENDOR_ATTR_SCAN_COOKIE])
  687. *cookie = nla_get_u64(
  688. tb_vendor[QCA_WLAN_VENDOR_ATTR_SCAN_COOKIE]);
  689. }
  690. return NL_SKIP;
  691. }
  692. /**
  693. * wpa_driver_nl80211_vendor_scan - Request the driver to initiate a vendor scan
  694. * @bss: Pointer to private driver data from wpa_driver_nl80211_init()
  695. * @params: Scan parameters
  696. * Returns: 0 on success, -1 on failure
  697. */
  698. int wpa_driver_nl80211_vendor_scan(struct i802_bss *bss,
  699. struct wpa_driver_scan_params *params)
  700. {
  701. struct wpa_driver_nl80211_data *drv = bss->drv;
  702. struct nl_msg *msg = NULL;
  703. struct nlattr *attr;
  704. size_t i;
  705. u32 scan_flags = 0;
  706. int ret = -1;
  707. u64 cookie = 0;
  708. wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: vendor scan request");
  709. drv->scan_for_auth = 0;
  710. if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
  711. nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_QCA) ||
  712. nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD,
  713. QCA_NL80211_VENDOR_SUBCMD_TRIGGER_SCAN) )
  714. goto fail;
  715. attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
  716. if (attr == NULL)
  717. goto fail;
  718. if (params->num_ssids) {
  719. struct nlattr *ssids;
  720. ssids = nla_nest_start(msg, QCA_WLAN_VENDOR_ATTR_SCAN_SSIDS);
  721. if (ssids == NULL)
  722. goto fail;
  723. for (i = 0; i < params->num_ssids; i++) {
  724. wpa_hexdump_ascii(MSG_MSGDUMP, "nl80211: Scan SSID",
  725. params->ssids[i].ssid,
  726. params->ssids[i].ssid_len);
  727. if (nla_put(msg, i + 1, params->ssids[i].ssid_len,
  728. params->ssids[i].ssid))
  729. goto fail;
  730. }
  731. nla_nest_end(msg, ssids);
  732. }
  733. if (params->extra_ies) {
  734. wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
  735. params->extra_ies, params->extra_ies_len);
  736. if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SCAN_IE,
  737. params->extra_ies_len, params->extra_ies))
  738. goto fail;
  739. }
  740. if (params->freqs) {
  741. struct nlattr *freqs;
  742. freqs = nla_nest_start(msg,
  743. QCA_WLAN_VENDOR_ATTR_SCAN_FREQUENCIES);
  744. if (freqs == NULL)
  745. goto fail;
  746. for (i = 0; params->freqs[i]; i++) {
  747. wpa_printf(MSG_MSGDUMP,
  748. "nl80211: Scan frequency %u MHz",
  749. params->freqs[i]);
  750. if (nla_put_u32(msg, i + 1, params->freqs[i]))
  751. goto fail;
  752. }
  753. nla_nest_end(msg, freqs);
  754. }
  755. os_free(drv->filter_ssids);
  756. drv->filter_ssids = params->filter_ssids;
  757. params->filter_ssids = NULL;
  758. drv->num_filter_ssids = params->num_filter_ssids;
  759. if (params->low_priority && drv->have_low_prio_scan) {
  760. wpa_printf(MSG_DEBUG,
  761. "nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY");
  762. scan_flags |= NL80211_SCAN_FLAG_LOW_PRIORITY;
  763. }
  764. if (params->mac_addr_rand) {
  765. wpa_printf(MSG_DEBUG,
  766. "nl80211: Add NL80211_SCAN_FLAG_RANDOM_ADDR");
  767. scan_flags |= NL80211_SCAN_FLAG_RANDOM_ADDR;
  768. if (params->mac_addr) {
  769. wpa_printf(MSG_DEBUG, "nl80211: MAC address: " MACSTR,
  770. MAC2STR(params->mac_addr));
  771. if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SCAN_MAC,
  772. ETH_ALEN, params->mac_addr))
  773. goto fail;
  774. }
  775. if (params->mac_addr_mask) {
  776. wpa_printf(MSG_DEBUG, "nl80211: MAC address mask: "
  777. MACSTR, MAC2STR(params->mac_addr_mask));
  778. if (nla_put(msg, QCA_WLAN_VENDOR_ATTR_SCAN_MAC_MASK,
  779. ETH_ALEN, params->mac_addr_mask))
  780. goto fail;
  781. }
  782. }
  783. if (scan_flags &&
  784. nla_put_u32(msg, NL80211_ATTR_SCAN_FLAGS, scan_flags))
  785. goto fail;
  786. if (params->p2p_probe) {
  787. struct nlattr *rates;
  788. wpa_printf(MSG_DEBUG, "nl80211: P2P probe - mask SuppRates");
  789. rates = nla_nest_start(msg,
  790. QCA_WLAN_VENDOR_ATTR_SCAN_SUPP_RATES);
  791. if (rates == NULL)
  792. goto fail;
  793. /*
  794. * Remove 2.4 GHz rates 1, 2, 5.5, 11 Mbps from supported rates
  795. * by masking out everything else apart from the OFDM rates 6,
  796. * 9, 12, 18, 24, 36, 48, 54 Mbps from non-MCS rates. All 5 GHz
  797. * rates are left enabled.
  798. */
  799. if (nla_put(msg, NL80211_BAND_2GHZ, 8,
  800. "\x0c\x12\x18\x24\x30\x48\x60\x6c"))
  801. goto fail;
  802. nla_nest_end(msg, rates);
  803. if (nla_put_flag(msg, QCA_WLAN_VENDOR_ATTR_SCAN_TX_NO_CCK_RATE))
  804. goto fail;
  805. }
  806. nla_nest_end(msg, attr);
  807. ret = send_and_recv_msgs(drv, msg, scan_cookie_handler, &cookie);
  808. msg = NULL;
  809. if (ret) {
  810. wpa_printf(MSG_DEBUG,
  811. "nl80211: Vendor scan trigger failed: ret=%d (%s)",
  812. ret, strerror(-ret));
  813. goto fail;
  814. }
  815. drv->vendor_scan_cookie = cookie;
  816. drv->scan_state = SCAN_REQUESTED;
  817. wpa_printf(MSG_DEBUG,
  818. "nl80211: Vendor scan requested (ret=%d) - scan timeout 30 seconds, scan cookie:0x%llx",
  819. ret, (long long unsigned int) cookie);
  820. eloop_cancel_timeout(wpa_driver_nl80211_scan_timeout, drv, drv->ctx);
  821. eloop_register_timeout(30, 0, wpa_driver_nl80211_scan_timeout,
  822. drv, drv->ctx);
  823. fail:
  824. nlmsg_free(msg);
  825. return ret;
  826. }