hostapd: fix segfault when deinit mesh ifaces
[openwrt/staging/mkresin.git] / package / network / services / hostapd / src / src / ap / ubus.c
1 /*
2 * hostapd / ubus support
3 * Copyright (c) 2013, Felix Fietkau <nbd@nbd.name>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "utils/includes.h"
10 #include "utils/common.h"
11 #include "utils/eloop.h"
12 #include "utils/wpabuf.h"
13 #include "common/ieee802_11_defs.h"
14 #include "hostapd.h"
15 #include "neighbor_db.h"
16 #include "wps_hostapd.h"
17 #include "sta_info.h"
18 #include "ubus.h"
19 #include "ap_drv_ops.h"
20 #include "beacon.h"
21 #include "rrm.h"
22 #include "wnm_ap.h"
23 #include "taxonomy.h"
24 #include "airtime_policy.h"
25
26 static struct ubus_context *ctx;
27 static struct blob_buf b;
28 static int ctx_ref;
29
30 static inline struct hapd_interfaces *get_hapd_interfaces_from_object(struct ubus_object *obj)
31 {
32 return container_of(obj, struct hapd_interfaces, ubus);
33 }
34
35 static inline struct hostapd_data *get_hapd_from_object(struct ubus_object *obj)
36 {
37 return container_of(obj, struct hostapd_data, ubus.obj);
38 }
39
40 struct ubus_banned_client {
41 struct avl_node avl;
42 u8 addr[ETH_ALEN];
43 };
44
45 static void ubus_receive(int sock, void *eloop_ctx, void *sock_ctx)
46 {
47 struct ubus_context *ctx = eloop_ctx;
48 ubus_handle_event(ctx);
49 }
50
51 static void ubus_reconnect_timeout(void *eloop_data, void *user_ctx)
52 {
53 if (ubus_reconnect(ctx, NULL)) {
54 eloop_register_timeout(1, 0, ubus_reconnect_timeout, ctx, NULL);
55 return;
56 }
57
58 eloop_register_read_sock(ctx->sock.fd, ubus_receive, ctx, NULL);
59 }
60
61 static void hostapd_ubus_connection_lost(struct ubus_context *ctx)
62 {
63 eloop_unregister_read_sock(ctx->sock.fd);
64 eloop_register_timeout(1, 0, ubus_reconnect_timeout, ctx, NULL);
65 }
66
67 static bool hostapd_ubus_init(void)
68 {
69 if (ctx)
70 return true;
71
72 ctx = ubus_connect(NULL);
73 if (!ctx)
74 return false;
75
76 ctx->connection_lost = hostapd_ubus_connection_lost;
77 eloop_register_read_sock(ctx->sock.fd, ubus_receive, ctx, NULL);
78 return true;
79 }
80
81 static void hostapd_ubus_ref_inc(void)
82 {
83 ctx_ref++;
84 }
85
86 static void hostapd_ubus_ref_dec(void)
87 {
88 ctx_ref--;
89 if (!ctx)
90 return;
91
92 if (ctx_ref)
93 return;
94
95 eloop_unregister_read_sock(ctx->sock.fd);
96 ubus_free(ctx);
97 ctx = NULL;
98 }
99
100 void hostapd_ubus_add_iface(struct hostapd_iface *iface)
101 {
102 if (!hostapd_ubus_init())
103 return;
104 }
105
106 void hostapd_ubus_free_iface(struct hostapd_iface *iface)
107 {
108 if (!ctx)
109 return;
110 }
111
112 static void hostapd_notify_ubus(struct ubus_object *obj, char *bssname, char *event)
113 {
114 char *event_type;
115
116 if (!ctx || !obj)
117 return;
118
119 if (asprintf(&event_type, "bss.%s", event) < 0)
120 return;
121
122 blob_buf_init(&b, 0);
123 blobmsg_add_string(&b, "name", bssname);
124 ubus_notify(ctx, obj, event_type, b.head, -1);
125 free(event_type);
126 }
127
128 static void hostapd_send_procd_event(char *bssname, char *event)
129 {
130 char *name, *s;
131 uint32_t id;
132 void *v;
133
134 if (!ctx || ubus_lookup_id(ctx, "service", &id))
135 return;
136
137 if (asprintf(&name, "hostapd.%s.%s", bssname, event) < 0)
138 return;
139
140 blob_buf_init(&b, 0);
141
142 s = blobmsg_alloc_string_buffer(&b, "type", strlen(name) + 1);
143 sprintf(s, "%s", name);
144 blobmsg_add_string_buffer(&b);
145
146 v = blobmsg_open_table(&b, "data");
147 blobmsg_close_table(&b, v);
148
149 ubus_invoke(ctx, id, "event", b.head, NULL, NULL, 1000);
150
151 free(name);
152 }
153
154 static void hostapd_send_shared_event(struct ubus_object *obj, char *bssname, char *event)
155 {
156 hostapd_send_procd_event(bssname, event);
157 hostapd_notify_ubus(obj, bssname, event);
158 }
159
160 static void
161 hostapd_bss_del_ban(void *eloop_data, void *user_ctx)
162 {
163 struct ubus_banned_client *ban = eloop_data;
164 struct hostapd_data *hapd = user_ctx;
165
166 avl_delete(&hapd->ubus.banned, &ban->avl);
167 free(ban);
168 }
169
170 static void
171 hostapd_bss_ban_client(struct hostapd_data *hapd, u8 *addr, int time)
172 {
173 struct ubus_banned_client *ban;
174
175 if (time < 0)
176 time = 0;
177
178 ban = avl_find_element(&hapd->ubus.banned, addr, ban, avl);
179 if (!ban) {
180 if (!time)
181 return;
182
183 ban = os_zalloc(sizeof(*ban));
184 memcpy(ban->addr, addr, sizeof(ban->addr));
185 ban->avl.key = ban->addr;
186 avl_insert(&hapd->ubus.banned, &ban->avl);
187 } else {
188 eloop_cancel_timeout(hostapd_bss_del_ban, ban, hapd);
189 if (!time) {
190 hostapd_bss_del_ban(ban, hapd);
191 return;
192 }
193 }
194
195 eloop_register_timeout(0, time * 1000, hostapd_bss_del_ban, ban, hapd);
196 }
197
198 static int
199 hostapd_bss_reload(struct ubus_context *ctx, struct ubus_object *obj,
200 struct ubus_request_data *req, const char *method,
201 struct blob_attr *msg)
202 {
203 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
204 int ret = hostapd_reload_config(hapd->iface, 1);
205
206 hostapd_send_shared_event(&hapd->iface->interfaces->ubus, hapd->conf->iface, "reload");
207 return ret;
208 }
209
210
211 static void
212 hostapd_parse_vht_map_blobmsg(uint16_t map)
213 {
214 char label[4];
215 int16_t val;
216 int i;
217
218 for (i = 0; i < 8; i++) {
219 snprintf(label, 4, "%dss", i + 1);
220
221 val = (map & (BIT(1) | BIT(0))) + 7;
222 blobmsg_add_u16(&b, label, val == 10 ? -1 : val);
223 map = map >> 2;
224 }
225 }
226
227 static void
228 hostapd_parse_vht_capab_blobmsg(struct ieee80211_vht_capabilities *vhtc)
229 {
230 void *supported_mcs;
231 void *map;
232 int i;
233
234 static const struct {
235 const char *name;
236 uint32_t flag;
237 } vht_capas[] = {
238 { "su_beamformee", VHT_CAP_SU_BEAMFORMEE_CAPABLE },
239 { "mu_beamformee", VHT_CAP_MU_BEAMFORMEE_CAPABLE },
240 };
241
242 for (i = 0; i < ARRAY_SIZE(vht_capas); i++)
243 blobmsg_add_u8(&b, vht_capas[i].name,
244 !!(vhtc->vht_capabilities_info & vht_capas[i].flag));
245
246 supported_mcs = blobmsg_open_table(&b, "mcs_map");
247
248 /* RX map */
249 map = blobmsg_open_table(&b, "rx");
250 hostapd_parse_vht_map_blobmsg(le_to_host16(vhtc->vht_supported_mcs_set.rx_map));
251 blobmsg_close_table(&b, map);
252
253 /* TX map */
254 map = blobmsg_open_table(&b, "tx");
255 hostapd_parse_vht_map_blobmsg(le_to_host16(vhtc->vht_supported_mcs_set.tx_map));
256 blobmsg_close_table(&b, map);
257
258 blobmsg_close_table(&b, supported_mcs);
259 }
260
261 static void
262 hostapd_parse_capab_blobmsg(struct sta_info *sta)
263 {
264 void *r, *v;
265
266 v = blobmsg_open_table(&b, "capabilities");
267
268 if (sta->vht_capabilities) {
269 r = blobmsg_open_table(&b, "vht");
270 hostapd_parse_vht_capab_blobmsg(sta->vht_capabilities);
271 blobmsg_close_table(&b, r);
272 }
273
274 /* ToDo: Add HT / HE capability parsing */
275
276 blobmsg_close_table(&b, v);
277 }
278
279 static int
280 hostapd_bss_get_clients(struct ubus_context *ctx, struct ubus_object *obj,
281 struct ubus_request_data *req, const char *method,
282 struct blob_attr *msg)
283 {
284 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
285 struct hostap_sta_driver_data sta_driver_data;
286 struct sta_info *sta;
287 void *list, *c;
288 char mac_buf[20];
289 static const struct {
290 const char *name;
291 uint32_t flag;
292 } sta_flags[] = {
293 { "auth", WLAN_STA_AUTH },
294 { "assoc", WLAN_STA_ASSOC },
295 { "authorized", WLAN_STA_AUTHORIZED },
296 { "preauth", WLAN_STA_PREAUTH },
297 { "wds", WLAN_STA_WDS },
298 { "wmm", WLAN_STA_WMM },
299 { "ht", WLAN_STA_HT },
300 { "vht", WLAN_STA_VHT },
301 { "he", WLAN_STA_HE },
302 { "wps", WLAN_STA_WPS },
303 { "mfp", WLAN_STA_MFP },
304 };
305
306 blob_buf_init(&b, 0);
307 blobmsg_add_u32(&b, "freq", hapd->iface->freq);
308 list = blobmsg_open_table(&b, "clients");
309 for (sta = hapd->sta_list; sta; sta = sta->next) {
310 void *r;
311 int i;
312
313 sprintf(mac_buf, MACSTR, MAC2STR(sta->addr));
314 c = blobmsg_open_table(&b, mac_buf);
315 for (i = 0; i < ARRAY_SIZE(sta_flags); i++)
316 blobmsg_add_u8(&b, sta_flags[i].name,
317 !!(sta->flags & sta_flags[i].flag));
318
319 r = blobmsg_open_array(&b, "rrm");
320 for (i = 0; i < ARRAY_SIZE(sta->rrm_enabled_capa); i++)
321 blobmsg_add_u32(&b, "", sta->rrm_enabled_capa[i]);
322 blobmsg_close_array(&b, r);
323 blobmsg_add_u32(&b, "aid", sta->aid);
324 #ifdef CONFIG_TAXONOMY
325 r = blobmsg_alloc_string_buffer(&b, "signature", 1024);
326 if (retrieve_sta_taxonomy(hapd, sta, r, 1024) > 0)
327 blobmsg_add_string_buffer(&b);
328 #endif
329
330 /* Driver information */
331 if (hostapd_drv_read_sta_data(hapd, &sta_driver_data, sta->addr) >= 0) {
332 r = blobmsg_open_table(&b, "bytes");
333 blobmsg_add_u64(&b, "rx", sta_driver_data.rx_bytes);
334 blobmsg_add_u64(&b, "tx", sta_driver_data.tx_bytes);
335 blobmsg_close_table(&b, r);
336 r = blobmsg_open_table(&b, "airtime");
337 blobmsg_add_u64(&b, "rx", sta_driver_data.rx_airtime);
338 blobmsg_add_u64(&b, "tx", sta_driver_data.tx_airtime);
339 blobmsg_close_table(&b, r);
340 r = blobmsg_open_table(&b, "packets");
341 blobmsg_add_u32(&b, "rx", sta_driver_data.rx_packets);
342 blobmsg_add_u32(&b, "tx", sta_driver_data.tx_packets);
343 blobmsg_close_table(&b, r);
344 r = blobmsg_open_table(&b, "rate");
345 /* Rate in kbits */
346 blobmsg_add_u32(&b, "rx", sta_driver_data.current_rx_rate * 100);
347 blobmsg_add_u32(&b, "tx", sta_driver_data.current_tx_rate * 100);
348 blobmsg_close_table(&b, r);
349 blobmsg_add_u32(&b, "signal", sta_driver_data.signal);
350 }
351
352 hostapd_parse_capab_blobmsg(sta);
353
354 blobmsg_close_table(&b, c);
355 }
356 blobmsg_close_array(&b, list);
357 ubus_send_reply(ctx, req, b.head);
358
359 return 0;
360 }
361
362 static int
363 hostapd_bss_get_features(struct ubus_context *ctx, struct ubus_object *obj,
364 struct ubus_request_data *req, const char *method,
365 struct blob_attr *msg)
366 {
367 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
368
369 blob_buf_init(&b, 0);
370 blobmsg_add_u8(&b, "ht_supported", ht_supported(hapd->iface->hw_features));
371 blobmsg_add_u8(&b, "vht_supported", vht_supported(hapd->iface->hw_features));
372 ubus_send_reply(ctx, req, b.head);
373
374 return 0;
375 }
376
377 /* Imported from iw/util.c
378 * https://git.kernel.org/pub/scm/linux/kernel/git/jberg/iw.git/tree/util.c?id=4b25ae3537af48dbf9d0abf94132e5ba01b32c18#n200
379 */
380 int ieee80211_frequency_to_channel(int freq)
381 {
382 /* see 802.11-2007 17.3.8.3.2 and Annex J */
383 if (freq == 2484)
384 return 14;
385 /* see 802.11ax D6.1 27.3.23.2 and Annex E */
386 else if (freq == 5935)
387 return 2;
388 else if (freq < 2484)
389 return (freq - 2407) / 5;
390 else if (freq >= 4910 && freq <= 4980)
391 return (freq - 4000) / 5;
392 else if (freq < 5950)
393 return (freq - 5000) / 5;
394 else if (freq <= 45000) /* DMG band lower limit */
395 /* see 802.11ax D6.1 27.3.23.2 */
396 return (freq - 5950) / 5;
397 else if (freq >= 58320 && freq <= 70200)
398 return (freq - 56160) / 2160;
399 else
400 return 0;
401 }
402
403 static int
404 hostapd_bss_get_status(struct ubus_context *ctx, struct ubus_object *obj,
405 struct ubus_request_data *req, const char *method,
406 struct blob_attr *msg)
407 {
408 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
409 void *airtime_table, *dfs_table;
410 struct os_reltime now;
411 char ssid[SSID_MAX_LEN + 1];
412 char phy_name[17];
413 size_t ssid_len = SSID_MAX_LEN;
414
415 if (hapd->conf->ssid.ssid_len < SSID_MAX_LEN)
416 ssid_len = hapd->conf->ssid.ssid_len;
417
418 blob_buf_init(&b, 0);
419 blobmsg_add_string(&b, "status", hostapd_state_text(hapd->iface->state));
420 blobmsg_printf(&b, "bssid", MACSTR, MAC2STR(hapd->conf->bssid));
421
422 memset(ssid, 0, SSID_MAX_LEN + 1);
423 memcpy(ssid, hapd->conf->ssid.ssid, ssid_len);
424 blobmsg_add_string(&b, "ssid", ssid);
425
426 blobmsg_add_u32(&b, "freq", hapd->iface->freq);
427 blobmsg_add_u32(&b, "channel", ieee80211_frequency_to_channel(hapd->iface->freq));
428
429 snprintf(phy_name, 17, "%s", hapd->iface->phy);
430 blobmsg_add_string(&b, "phy", phy_name);
431
432 /* Airtime */
433 airtime_table = blobmsg_open_table(&b, "airtime");
434 blobmsg_add_u64(&b, "time", hapd->iface->last_channel_time);
435 blobmsg_add_u64(&b, "time_busy", hapd->iface->last_channel_time_busy);
436 blobmsg_add_u16(&b, "utilization", hapd->iface->channel_utilization);
437 blobmsg_close_table(&b, airtime_table);
438
439 /* DFS */
440 dfs_table = blobmsg_open_table(&b, "dfs");
441 blobmsg_add_u32(&b, "cac_seconds", hapd->iface->dfs_cac_ms / 1000);
442 blobmsg_add_u8(&b, "cac_active", !!(hapd->iface->cac_started));
443 os_reltime_age(&hapd->iface->dfs_cac_start, &now);
444 blobmsg_add_u32(&b, "cac_seconds_left",
445 hapd->iface->cac_started ? hapd->iface->dfs_cac_ms / 1000 - now.sec : 0);
446 blobmsg_close_table(&b, dfs_table);
447
448 ubus_send_reply(ctx, req, b.head);
449
450 return 0;
451 }
452
453 enum {
454 NOTIFY_RESPONSE,
455 __NOTIFY_MAX
456 };
457
458 static const struct blobmsg_policy notify_policy[__NOTIFY_MAX] = {
459 [NOTIFY_RESPONSE] = { "notify_response", BLOBMSG_TYPE_INT32 },
460 };
461
462 static int
463 hostapd_notify_response(struct ubus_context *ctx, struct ubus_object *obj,
464 struct ubus_request_data *req, const char *method,
465 struct blob_attr *msg)
466 {
467 struct blob_attr *tb[__NOTIFY_MAX];
468 struct hostapd_data *hapd = get_hapd_from_object(obj);
469 struct wpabuf *elems;
470 const char *pos;
471 size_t len;
472
473 blobmsg_parse(notify_policy, __NOTIFY_MAX, tb,
474 blob_data(msg), blob_len(msg));
475
476 if (!tb[NOTIFY_RESPONSE])
477 return UBUS_STATUS_INVALID_ARGUMENT;
478
479 hapd->ubus.notify_response = blobmsg_get_u32(tb[NOTIFY_RESPONSE]);
480
481 return UBUS_STATUS_OK;
482 }
483
484 enum {
485 DEL_CLIENT_ADDR,
486 DEL_CLIENT_REASON,
487 DEL_CLIENT_DEAUTH,
488 DEL_CLIENT_BAN_TIME,
489 __DEL_CLIENT_MAX
490 };
491
492 static const struct blobmsg_policy del_policy[__DEL_CLIENT_MAX] = {
493 [DEL_CLIENT_ADDR] = { "addr", BLOBMSG_TYPE_STRING },
494 [DEL_CLIENT_REASON] = { "reason", BLOBMSG_TYPE_INT32 },
495 [DEL_CLIENT_DEAUTH] = { "deauth", BLOBMSG_TYPE_INT8 },
496 [DEL_CLIENT_BAN_TIME] = { "ban_time", BLOBMSG_TYPE_INT32 },
497 };
498
499 static int
500 hostapd_bss_del_client(struct ubus_context *ctx, struct ubus_object *obj,
501 struct ubus_request_data *req, const char *method,
502 struct blob_attr *msg)
503 {
504 struct blob_attr *tb[__DEL_CLIENT_MAX];
505 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
506 struct sta_info *sta;
507 bool deauth = false;
508 int reason;
509 u8 addr[ETH_ALEN];
510
511 blobmsg_parse(del_policy, __DEL_CLIENT_MAX, tb, blob_data(msg), blob_len(msg));
512
513 if (!tb[DEL_CLIENT_ADDR])
514 return UBUS_STATUS_INVALID_ARGUMENT;
515
516 if (hwaddr_aton(blobmsg_data(tb[DEL_CLIENT_ADDR]), addr))
517 return UBUS_STATUS_INVALID_ARGUMENT;
518
519 if (tb[DEL_CLIENT_REASON])
520 reason = blobmsg_get_u32(tb[DEL_CLIENT_REASON]);
521
522 if (tb[DEL_CLIENT_DEAUTH])
523 deauth = blobmsg_get_bool(tb[DEL_CLIENT_DEAUTH]);
524
525 sta = ap_get_sta(hapd, addr);
526 if (sta) {
527 if (deauth) {
528 hostapd_drv_sta_deauth(hapd, addr, reason);
529 ap_sta_deauthenticate(hapd, sta, reason);
530 } else {
531 hostapd_drv_sta_disassoc(hapd, addr, reason);
532 ap_sta_disassociate(hapd, sta, reason);
533 }
534 }
535
536 if (tb[DEL_CLIENT_BAN_TIME])
537 hostapd_bss_ban_client(hapd, addr, blobmsg_get_u32(tb[DEL_CLIENT_BAN_TIME]));
538
539 return 0;
540 }
541
542 static void
543 blobmsg_add_macaddr(struct blob_buf *buf, const char *name, const u8 *addr)
544 {
545 char *s;
546
547 s = blobmsg_alloc_string_buffer(buf, name, 20);
548 sprintf(s, MACSTR, MAC2STR(addr));
549 blobmsg_add_string_buffer(buf);
550 }
551
552 static int
553 hostapd_bss_list_bans(struct ubus_context *ctx, struct ubus_object *obj,
554 struct ubus_request_data *req, const char *method,
555 struct blob_attr *msg)
556 {
557 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
558 struct ubus_banned_client *ban;
559 void *c;
560
561 blob_buf_init(&b, 0);
562 c = blobmsg_open_array(&b, "clients");
563 avl_for_each_element(&hapd->ubus.banned, ban, avl)
564 blobmsg_add_macaddr(&b, NULL, ban->addr);
565 blobmsg_close_array(&b, c);
566 ubus_send_reply(ctx, req, b.head);
567
568 return 0;
569 }
570
571 #ifdef CONFIG_WPS
572 static int
573 hostapd_bss_wps_start(struct ubus_context *ctx, struct ubus_object *obj,
574 struct ubus_request_data *req, const char *method,
575 struct blob_attr *msg)
576 {
577 int rc;
578 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
579
580 rc = hostapd_wps_button_pushed(hapd, NULL);
581
582 if (rc != 0)
583 return UBUS_STATUS_NOT_SUPPORTED;
584
585 return 0;
586 }
587
588
589 static const char * pbc_status_enum_str(enum pbc_status status)
590 {
591 switch (status) {
592 case WPS_PBC_STATUS_DISABLE:
593 return "Disabled";
594 case WPS_PBC_STATUS_ACTIVE:
595 return "Active";
596 case WPS_PBC_STATUS_TIMEOUT:
597 return "Timed-out";
598 case WPS_PBC_STATUS_OVERLAP:
599 return "Overlap";
600 default:
601 return "Unknown";
602 }
603 }
604
605 static int
606 hostapd_bss_wps_status(struct ubus_context *ctx, struct ubus_object *obj,
607 struct ubus_request_data *req, const char *method,
608 struct blob_attr *msg)
609 {
610 int rc;
611 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
612
613 blob_buf_init(&b, 0);
614
615 blobmsg_add_string(&b, "pbc_status", pbc_status_enum_str(hapd->wps_stats.pbc_status));
616 blobmsg_add_string(&b, "last_wps_result",
617 (hapd->wps_stats.status == WPS_STATUS_SUCCESS ?
618 "Success":
619 (hapd->wps_stats.status == WPS_STATUS_FAILURE ?
620 "Failed" : "None")));
621
622 /* If status == Failure - Add possible Reasons */
623 if(hapd->wps_stats.status == WPS_STATUS_FAILURE &&
624 hapd->wps_stats.failure_reason > 0)
625 blobmsg_add_string(&b, "reason", wps_ei_str(hapd->wps_stats.failure_reason));
626
627 if (hapd->wps_stats.status)
628 blobmsg_printf(&b, "peer_address", MACSTR, MAC2STR(hapd->wps_stats.peer_addr));
629
630 ubus_send_reply(ctx, req, b.head);
631
632 return 0;
633 }
634
635 static int
636 hostapd_bss_wps_cancel(struct ubus_context *ctx, struct ubus_object *obj,
637 struct ubus_request_data *req, const char *method,
638 struct blob_attr *msg)
639 {
640 int rc;
641 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
642
643 rc = hostapd_wps_cancel(hapd);
644
645 if (rc != 0)
646 return UBUS_STATUS_NOT_SUPPORTED;
647
648 return 0;
649 }
650 #endif /* CONFIG_WPS */
651
652 static int
653 hostapd_bss_update_beacon(struct ubus_context *ctx, struct ubus_object *obj,
654 struct ubus_request_data *req, const char *method,
655 struct blob_attr *msg)
656 {
657 int rc;
658 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
659
660 rc = ieee802_11_set_beacon(hapd);
661
662 if (rc != 0)
663 return UBUS_STATUS_NOT_SUPPORTED;
664
665 return 0;
666 }
667
668 enum {
669 CONFIG_IFACE,
670 CONFIG_FILE,
671 __CONFIG_MAX
672 };
673
674 static const struct blobmsg_policy config_add_policy[__CONFIG_MAX] = {
675 [CONFIG_IFACE] = { "iface", BLOBMSG_TYPE_STRING },
676 [CONFIG_FILE] = { "config", BLOBMSG_TYPE_STRING },
677 };
678
679 static int
680 hostapd_config_add(struct ubus_context *ctx, struct ubus_object *obj,
681 struct ubus_request_data *req, const char *method,
682 struct blob_attr *msg)
683 {
684 struct blob_attr *tb[__CONFIG_MAX];
685 struct hapd_interfaces *interfaces = get_hapd_interfaces_from_object(obj);
686 char buf[128];
687
688 blobmsg_parse(config_add_policy, __CONFIG_MAX, tb, blob_data(msg), blob_len(msg));
689
690 if (!tb[CONFIG_FILE] || !tb[CONFIG_IFACE])
691 return UBUS_STATUS_INVALID_ARGUMENT;
692
693 snprintf(buf, sizeof(buf), "bss_config=%s:%s",
694 blobmsg_get_string(tb[CONFIG_IFACE]),
695 blobmsg_get_string(tb[CONFIG_FILE]));
696
697 if (hostapd_add_iface(interfaces, buf))
698 return UBUS_STATUS_INVALID_ARGUMENT;
699
700 blob_buf_init(&b, 0);
701 blobmsg_add_u32(&b, "pid", getpid());
702 ubus_send_reply(ctx, req, b.head);
703
704 return UBUS_STATUS_OK;
705 }
706
707 enum {
708 CONFIG_REM_IFACE,
709 __CONFIG_REM_MAX
710 };
711
712 static const struct blobmsg_policy config_remove_policy[__CONFIG_REM_MAX] = {
713 [CONFIG_REM_IFACE] = { "iface", BLOBMSG_TYPE_STRING },
714 };
715
716 static int
717 hostapd_config_remove(struct ubus_context *ctx, struct ubus_object *obj,
718 struct ubus_request_data *req, const char *method,
719 struct blob_attr *msg)
720 {
721 struct blob_attr *tb[__CONFIG_REM_MAX];
722 struct hapd_interfaces *interfaces = get_hapd_interfaces_from_object(obj);
723 char buf[128];
724
725 blobmsg_parse(config_remove_policy, __CONFIG_REM_MAX, tb, blob_data(msg), blob_len(msg));
726
727 if (!tb[CONFIG_REM_IFACE])
728 return UBUS_STATUS_INVALID_ARGUMENT;
729
730 if (hostapd_remove_iface(interfaces, blobmsg_get_string(tb[CONFIG_REM_IFACE])))
731 return UBUS_STATUS_INVALID_ARGUMENT;
732
733 return UBUS_STATUS_OK;
734 }
735
736 enum {
737 CSA_FREQ,
738 CSA_BCN_COUNT,
739 CSA_CENTER_FREQ1,
740 CSA_CENTER_FREQ2,
741 CSA_BANDWIDTH,
742 CSA_SEC_CHANNEL_OFFSET,
743 CSA_HT,
744 CSA_VHT,
745 CSA_HE,
746 CSA_BLOCK_TX,
747 CSA_FORCE,
748 __CSA_MAX
749 };
750
751 static const struct blobmsg_policy csa_policy[__CSA_MAX] = {
752 [CSA_FREQ] = { "freq", BLOBMSG_TYPE_INT32 },
753 [CSA_BCN_COUNT] = { "bcn_count", BLOBMSG_TYPE_INT32 },
754 [CSA_CENTER_FREQ1] = { "center_freq1", BLOBMSG_TYPE_INT32 },
755 [CSA_CENTER_FREQ2] = { "center_freq2", BLOBMSG_TYPE_INT32 },
756 [CSA_BANDWIDTH] = { "bandwidth", BLOBMSG_TYPE_INT32 },
757 [CSA_SEC_CHANNEL_OFFSET] = { "sec_channel_offset", BLOBMSG_TYPE_INT32 },
758 [CSA_HT] = { "ht", BLOBMSG_TYPE_BOOL },
759 [CSA_VHT] = { "vht", BLOBMSG_TYPE_BOOL },
760 [CSA_HE] = { "he", BLOBMSG_TYPE_BOOL },
761 [CSA_BLOCK_TX] = { "block_tx", BLOBMSG_TYPE_BOOL },
762 [CSA_FORCE] = { "force", BLOBMSG_TYPE_BOOL },
763 };
764
765
766 static void switch_chan_fallback_cb(void *eloop_data, void *user_ctx)
767 {
768 struct hostapd_iface *iface = eloop_data;
769 struct hostapd_freq_params *freq_params = user_ctx;
770
771 hostapd_switch_channel_fallback(iface, freq_params);
772 }
773
774 #ifdef NEED_AP_MLME
775 static int
776 hostapd_switch_chan(struct ubus_context *ctx, struct ubus_object *obj,
777 struct ubus_request_data *req, const char *method,
778 struct blob_attr *msg)
779 {
780 struct blob_attr *tb[__CSA_MAX];
781 struct hostapd_data *hapd = get_hapd_from_object(obj);
782 struct hostapd_config *iconf = hapd->iface->conf;
783 struct hostapd_freq_params *freq_params;
784 struct csa_settings css = {
785 .freq_params = {
786 .ht_enabled = iconf->ieee80211n,
787 .vht_enabled = iconf->ieee80211ac,
788 .he_enabled = iconf->ieee80211ax,
789 .sec_channel_offset = iconf->secondary_channel,
790 }
791 };
792 int ret = UBUS_STATUS_OK;
793 int i;
794
795 blobmsg_parse(csa_policy, __CSA_MAX, tb, blob_data(msg), blob_len(msg));
796
797 if (!tb[CSA_FREQ])
798 return UBUS_STATUS_INVALID_ARGUMENT;
799
800 switch (iconf->vht_oper_chwidth) {
801 case CHANWIDTH_USE_HT:
802 if (iconf->secondary_channel)
803 css.freq_params.bandwidth = 40;
804 else
805 css.freq_params.bandwidth = 20;
806 break;
807 case CHANWIDTH_160MHZ:
808 css.freq_params.bandwidth = 160;
809 break;
810 default:
811 css.freq_params.bandwidth = 80;
812 break;
813 }
814
815 css.freq_params.freq = blobmsg_get_u32(tb[CSA_FREQ]);
816
817 #define SET_CSA_SETTING(name, field, type) \
818 do { \
819 if (tb[name]) \
820 css.field = blobmsg_get_ ## type(tb[name]); \
821 } while(0)
822
823 SET_CSA_SETTING(CSA_BCN_COUNT, cs_count, u32);
824 SET_CSA_SETTING(CSA_CENTER_FREQ1, freq_params.center_freq1, u32);
825 SET_CSA_SETTING(CSA_CENTER_FREQ2, freq_params.center_freq2, u32);
826 SET_CSA_SETTING(CSA_BANDWIDTH, freq_params.bandwidth, u32);
827 SET_CSA_SETTING(CSA_SEC_CHANNEL_OFFSET, freq_params.sec_channel_offset, u32);
828 SET_CSA_SETTING(CSA_HT, freq_params.ht_enabled, bool);
829 SET_CSA_SETTING(CSA_VHT, freq_params.vht_enabled, bool);
830 SET_CSA_SETTING(CSA_HE, freq_params.he_enabled, bool);
831 SET_CSA_SETTING(CSA_BLOCK_TX, block_tx, bool);
832
833 for (i = 0; i < hapd->iface->num_bss; i++) {
834 struct hostapd_data *bss = hapd->iface->bss[i];
835
836 if (hostapd_switch_channel(bss, &css) != 0)
837 ret = UBUS_STATUS_NOT_SUPPORTED;
838 }
839
840 if (!ret || !tb[CSA_FORCE] || !blobmsg_get_bool(tb[CSA_FORCE]))
841 return ret;
842
843 freq_params = malloc(sizeof(*freq_params));
844 memcpy(freq_params, &css.freq_params, sizeof(*freq_params));
845 eloop_register_timeout(0, 1, switch_chan_fallback_cb,
846 hapd->iface, freq_params);
847
848 return 0;
849 #undef SET_CSA_SETTING
850 }
851 #endif
852
853 enum {
854 VENDOR_ELEMENTS,
855 __VENDOR_ELEMENTS_MAX
856 };
857
858 static const struct blobmsg_policy ve_policy[__VENDOR_ELEMENTS_MAX] = {
859 /* vendor elements are provided as hex-string */
860 [VENDOR_ELEMENTS] = { "vendor_elements", BLOBMSG_TYPE_STRING },
861 };
862
863 static int
864 hostapd_vendor_elements(struct ubus_context *ctx, struct ubus_object *obj,
865 struct ubus_request_data *req, const char *method,
866 struct blob_attr *msg)
867 {
868 struct blob_attr *tb[__VENDOR_ELEMENTS_MAX];
869 struct hostapd_data *hapd = get_hapd_from_object(obj);
870 struct hostapd_bss_config *bss = hapd->conf;
871 struct wpabuf *elems;
872 const char *pos;
873 size_t len;
874
875 blobmsg_parse(ve_policy, __VENDOR_ELEMENTS_MAX, tb,
876 blob_data(msg), blob_len(msg));
877
878 if (!tb[VENDOR_ELEMENTS])
879 return UBUS_STATUS_INVALID_ARGUMENT;
880
881 pos = blobmsg_data(tb[VENDOR_ELEMENTS]);
882 len = os_strlen(pos);
883 if (len & 0x01)
884 return UBUS_STATUS_INVALID_ARGUMENT;
885
886 len /= 2;
887 if (len == 0) {
888 wpabuf_free(bss->vendor_elements);
889 bss->vendor_elements = NULL;
890 return 0;
891 }
892
893 elems = wpabuf_alloc(len);
894 if (elems == NULL)
895 return 1;
896
897 if (hexstr2bin(pos, wpabuf_put(elems, len), len)) {
898 wpabuf_free(elems);
899 return UBUS_STATUS_INVALID_ARGUMENT;
900 }
901
902 wpabuf_free(bss->vendor_elements);
903 bss->vendor_elements = elems;
904
905 /* update beacons if vendor elements were set successfully */
906 if (ieee802_11_update_beacons(hapd->iface) != 0)
907 return UBUS_STATUS_NOT_SUPPORTED;
908 return UBUS_STATUS_OK;
909 }
910
911 static void
912 hostapd_rrm_print_nr(struct hostapd_neighbor_entry *nr)
913 {
914 const u8 *data;
915 char *str;
916 int len;
917
918 blobmsg_printf(&b, "", MACSTR, MAC2STR(nr->bssid));
919
920 str = blobmsg_alloc_string_buffer(&b, "", nr->ssid.ssid_len + 1);
921 memcpy(str, nr->ssid.ssid, nr->ssid.ssid_len);
922 str[nr->ssid.ssid_len] = 0;
923 blobmsg_add_string_buffer(&b);
924
925 len = wpabuf_len(nr->nr);
926 str = blobmsg_alloc_string_buffer(&b, "", 2 * len + 1);
927 wpa_snprintf_hex(str, 2 * len + 1, wpabuf_head_u8(nr->nr), len);
928 blobmsg_add_string_buffer(&b);
929 }
930
931 enum {
932 BSS_MGMT_EN_NEIGHBOR,
933 BSS_MGMT_EN_BEACON,
934 #ifdef CONFIG_WNM_AP
935 BSS_MGMT_EN_BSS_TRANSITION,
936 #endif
937 __BSS_MGMT_EN_MAX
938 };
939
940 static bool
941 __hostapd_bss_mgmt_enable_f(struct hostapd_data *hapd, int flag)
942 {
943 struct hostapd_bss_config *bss = hapd->conf;
944 uint32_t flags;
945
946 switch (flag) {
947 case BSS_MGMT_EN_NEIGHBOR:
948 if (bss->radio_measurements[0] &
949 WLAN_RRM_CAPS_NEIGHBOR_REPORT)
950 return false;
951
952 bss->radio_measurements[0] |=
953 WLAN_RRM_CAPS_NEIGHBOR_REPORT;
954 hostapd_neighbor_set_own_report(hapd);
955 return true;
956 case BSS_MGMT_EN_BEACON:
957 flags = WLAN_RRM_CAPS_BEACON_REPORT_PASSIVE |
958 WLAN_RRM_CAPS_BEACON_REPORT_ACTIVE |
959 WLAN_RRM_CAPS_BEACON_REPORT_TABLE;
960
961 if (bss->radio_measurements[0] & flags == flags)
962 return false;
963
964 bss->radio_measurements[0] |= (u8) flags;
965 return true;
966 #ifdef CONFIG_WNM_AP
967 case BSS_MGMT_EN_BSS_TRANSITION:
968 if (bss->bss_transition)
969 return false;
970
971 bss->bss_transition = 1;
972 return true;
973 #endif
974 }
975 }
976
977 static void
978 __hostapd_bss_mgmt_enable(struct hostapd_data *hapd, uint32_t flags)
979 {
980 bool update = false;
981 int i;
982
983 for (i = 0; i < __BSS_MGMT_EN_MAX; i++) {
984 if (!(flags & (1 << i)))
985 continue;
986
987 update |= __hostapd_bss_mgmt_enable_f(hapd, i);
988 }
989
990 if (update)
991 ieee802_11_update_beacons(hapd->iface);
992 }
993
994
995 static const struct blobmsg_policy bss_mgmt_enable_policy[__BSS_MGMT_EN_MAX] = {
996 [BSS_MGMT_EN_NEIGHBOR] = { "neighbor_report", BLOBMSG_TYPE_BOOL },
997 [BSS_MGMT_EN_BEACON] = { "beacon_report", BLOBMSG_TYPE_BOOL },
998 #ifdef CONFIG_WNM_AP
999 [BSS_MGMT_EN_BSS_TRANSITION] = { "bss_transition", BLOBMSG_TYPE_BOOL },
1000 #endif
1001 };
1002
1003 static int
1004 hostapd_bss_mgmt_enable(struct ubus_context *ctx, struct ubus_object *obj,
1005 struct ubus_request_data *req, const char *method,
1006 struct blob_attr *msg)
1007
1008 {
1009 struct hostapd_data *hapd = get_hapd_from_object(obj);
1010 struct blob_attr *tb[__BSS_MGMT_EN_MAX];
1011 struct blob_attr *cur;
1012 uint32_t flags = 0;
1013 int i;
1014 bool neigh = false, beacon = false;
1015
1016 blobmsg_parse(bss_mgmt_enable_policy, __BSS_MGMT_EN_MAX, tb, blob_data(msg), blob_len(msg));
1017
1018 for (i = 0; i < ARRAY_SIZE(tb); i++) {
1019 if (!tb[i] || !blobmsg_get_bool(tb[i]))
1020 continue;
1021
1022 flags |= (1 << i);
1023 }
1024
1025 __hostapd_bss_mgmt_enable(hapd, flags);
1026 }
1027
1028
1029 static void
1030 hostapd_rrm_nr_enable(struct hostapd_data *hapd)
1031 {
1032 __hostapd_bss_mgmt_enable(hapd, 1 << BSS_MGMT_EN_NEIGHBOR);
1033 }
1034
1035 static int
1036 hostapd_rrm_nr_get_own(struct ubus_context *ctx, struct ubus_object *obj,
1037 struct ubus_request_data *req, const char *method,
1038 struct blob_attr *msg)
1039 {
1040 struct hostapd_data *hapd = get_hapd_from_object(obj);
1041 struct hostapd_neighbor_entry *nr;
1042 void *c;
1043
1044 hostapd_rrm_nr_enable(hapd);
1045
1046 nr = hostapd_neighbor_get(hapd, hapd->own_addr, NULL);
1047 if (!nr)
1048 return UBUS_STATUS_NOT_FOUND;
1049
1050 blob_buf_init(&b, 0);
1051
1052 c = blobmsg_open_array(&b, "value");
1053 hostapd_rrm_print_nr(nr);
1054 blobmsg_close_array(&b, c);
1055
1056 ubus_send_reply(ctx, req, b.head);
1057
1058 return 0;
1059 }
1060
1061 static int
1062 hostapd_rrm_nr_list(struct ubus_context *ctx, struct ubus_object *obj,
1063 struct ubus_request_data *req, const char *method,
1064 struct blob_attr *msg)
1065 {
1066 struct hostapd_data *hapd = get_hapd_from_object(obj);
1067 struct hostapd_neighbor_entry *nr;
1068 void *c;
1069
1070 hostapd_rrm_nr_enable(hapd);
1071 blob_buf_init(&b, 0);
1072
1073 c = blobmsg_open_array(&b, "list");
1074 dl_list_for_each(nr, &hapd->nr_db, struct hostapd_neighbor_entry, list) {
1075 void *cur;
1076
1077 if (!memcmp(nr->bssid, hapd->own_addr, ETH_ALEN))
1078 continue;
1079
1080 cur = blobmsg_open_array(&b, NULL);
1081 hostapd_rrm_print_nr(nr);
1082 blobmsg_close_array(&b, cur);
1083 }
1084 blobmsg_close_array(&b, c);
1085
1086 ubus_send_reply(ctx, req, b.head);
1087
1088 return 0;
1089 }
1090
1091 enum {
1092 NR_SET_LIST,
1093 __NR_SET_LIST_MAX
1094 };
1095
1096 static const struct blobmsg_policy nr_set_policy[__NR_SET_LIST_MAX] = {
1097 [NR_SET_LIST] = { "list", BLOBMSG_TYPE_ARRAY },
1098 };
1099
1100
1101 static void
1102 hostapd_rrm_nr_clear(struct hostapd_data *hapd)
1103 {
1104 struct hostapd_neighbor_entry *nr;
1105
1106 restart:
1107 dl_list_for_each(nr, &hapd->nr_db, struct hostapd_neighbor_entry, list) {
1108 if (!memcmp(nr->bssid, hapd->own_addr, ETH_ALEN))
1109 continue;
1110
1111 hostapd_neighbor_remove(hapd, nr->bssid, &nr->ssid);
1112 goto restart;
1113 }
1114 }
1115
1116 static int
1117 hostapd_rrm_nr_set(struct ubus_context *ctx, struct ubus_object *obj,
1118 struct ubus_request_data *req, const char *method,
1119 struct blob_attr *msg)
1120 {
1121 static const struct blobmsg_policy nr_e_policy[] = {
1122 { .type = BLOBMSG_TYPE_STRING },
1123 { .type = BLOBMSG_TYPE_STRING },
1124 { .type = BLOBMSG_TYPE_STRING },
1125 };
1126 struct hostapd_data *hapd = get_hapd_from_object(obj);
1127 struct blob_attr *tb_l[__NR_SET_LIST_MAX];
1128 struct blob_attr *tb[ARRAY_SIZE(nr_e_policy)];
1129 struct blob_attr *cur;
1130 int rem;
1131
1132 hostapd_rrm_nr_enable(hapd);
1133
1134 blobmsg_parse(nr_set_policy, __NR_SET_LIST_MAX, tb_l, blob_data(msg), blob_len(msg));
1135 if (!tb_l[NR_SET_LIST])
1136 return UBUS_STATUS_INVALID_ARGUMENT;
1137
1138 hostapd_rrm_nr_clear(hapd);
1139 blobmsg_for_each_attr(cur, tb_l[NR_SET_LIST], rem) {
1140 struct wpa_ssid_value ssid;
1141 struct wpabuf *data;
1142 u8 bssid[ETH_ALEN];
1143 char *s, *nr_s;
1144
1145 blobmsg_parse_array(nr_e_policy, ARRAY_SIZE(nr_e_policy), tb, blobmsg_data(cur), blobmsg_data_len(cur));
1146 if (!tb[0] || !tb[1] || !tb[2])
1147 goto invalid;
1148
1149 /* Neighbor Report binary */
1150 nr_s = blobmsg_get_string(tb[2]);
1151 data = wpabuf_parse_bin(nr_s);
1152 if (!data)
1153 goto invalid;
1154
1155 /* BSSID */
1156 s = blobmsg_get_string(tb[0]);
1157 if (strlen(s) == 0) {
1158 /* Copy BSSID from neighbor report */
1159 if (hwaddr_compact_aton(nr_s, bssid))
1160 goto invalid;
1161 } else if (hwaddr_aton(s, bssid)) {
1162 goto invalid;
1163 }
1164
1165 /* SSID */
1166 s = blobmsg_get_string(tb[1]);
1167 if (strlen(s) == 0) {
1168 /* Copy SSID from hostapd BSS conf */
1169 memcpy(&ssid, &hapd->conf->ssid, sizeof(ssid));
1170 } else {
1171 ssid.ssid_len = strlen(s);
1172 if (ssid.ssid_len > sizeof(ssid.ssid))
1173 goto invalid;
1174
1175 memcpy(&ssid, s, ssid.ssid_len);
1176 }
1177
1178 hostapd_neighbor_set(hapd, bssid, &ssid, data, NULL, NULL, 0);
1179 wpabuf_free(data);
1180 continue;
1181
1182 invalid:
1183 return UBUS_STATUS_INVALID_ARGUMENT;
1184 }
1185
1186 return 0;
1187 }
1188
1189 enum {
1190 BEACON_REQ_ADDR,
1191 BEACON_REQ_MODE,
1192 BEACON_REQ_OP_CLASS,
1193 BEACON_REQ_CHANNEL,
1194 BEACON_REQ_DURATION,
1195 BEACON_REQ_BSSID,
1196 BEACON_REQ_SSID,
1197 __BEACON_REQ_MAX,
1198 };
1199
1200 static const struct blobmsg_policy beacon_req_policy[__BEACON_REQ_MAX] = {
1201 [BEACON_REQ_ADDR] = { "addr", BLOBMSG_TYPE_STRING },
1202 [BEACON_REQ_OP_CLASS] { "op_class", BLOBMSG_TYPE_INT32 },
1203 [BEACON_REQ_CHANNEL] { "channel", BLOBMSG_TYPE_INT32 },
1204 [BEACON_REQ_DURATION] { "duration", BLOBMSG_TYPE_INT32 },
1205 [BEACON_REQ_MODE] { "mode", BLOBMSG_TYPE_INT32 },
1206 [BEACON_REQ_BSSID] { "bssid", BLOBMSG_TYPE_STRING },
1207 [BEACON_REQ_SSID] { "ssid", BLOBMSG_TYPE_STRING },
1208 };
1209
1210 static int
1211 hostapd_rrm_beacon_req(struct ubus_context *ctx, struct ubus_object *obj,
1212 struct ubus_request_data *ureq, const char *method,
1213 struct blob_attr *msg)
1214 {
1215 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
1216 struct blob_attr *tb[__BEACON_REQ_MAX];
1217 struct blob_attr *cur;
1218 struct wpabuf *req;
1219 u8 bssid[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
1220 u8 addr[ETH_ALEN];
1221 int mode, rem, ret;
1222 int buf_len = 13;
1223
1224 blobmsg_parse(beacon_req_policy, __BEACON_REQ_MAX, tb, blob_data(msg), blob_len(msg));
1225
1226 if (!tb[BEACON_REQ_ADDR] || !tb[BEACON_REQ_MODE] || !tb[BEACON_REQ_DURATION] ||
1227 !tb[BEACON_REQ_OP_CLASS] || !tb[BEACON_REQ_CHANNEL])
1228 return UBUS_STATUS_INVALID_ARGUMENT;
1229
1230 if (tb[BEACON_REQ_SSID])
1231 buf_len += blobmsg_data_len(tb[BEACON_REQ_SSID]) + 2 - 1;
1232
1233 mode = blobmsg_get_u32(tb[BEACON_REQ_MODE]);
1234 if (hwaddr_aton(blobmsg_data(tb[BEACON_REQ_ADDR]), addr))
1235 return UBUS_STATUS_INVALID_ARGUMENT;
1236
1237 if (tb[BEACON_REQ_BSSID] &&
1238 hwaddr_aton(blobmsg_data(tb[BEACON_REQ_BSSID]), bssid))
1239 return UBUS_STATUS_INVALID_ARGUMENT;
1240
1241 req = wpabuf_alloc(buf_len);
1242 if (!req)
1243 return UBUS_STATUS_UNKNOWN_ERROR;
1244
1245 /* 1: regulatory class */
1246 wpabuf_put_u8(req, blobmsg_get_u32(tb[BEACON_REQ_OP_CLASS]));
1247
1248 /* 2: channel number */
1249 wpabuf_put_u8(req, blobmsg_get_u32(tb[BEACON_REQ_CHANNEL]));
1250
1251 /* 3-4: randomization interval */
1252 wpabuf_put_le16(req, 0);
1253
1254 /* 5-6: duration */
1255 wpabuf_put_le16(req, blobmsg_get_u32(tb[BEACON_REQ_DURATION]));
1256
1257 /* 7: mode */
1258 wpabuf_put_u8(req, blobmsg_get_u32(tb[BEACON_REQ_MODE]));
1259
1260 /* 8-13: BSSID */
1261 wpabuf_put_data(req, bssid, ETH_ALEN);
1262
1263 if ((cur = tb[BEACON_REQ_SSID]) != NULL) {
1264 wpabuf_put_u8(req, WLAN_EID_SSID);
1265 wpabuf_put_u8(req, blobmsg_data_len(cur) - 1);
1266 wpabuf_put_data(req, blobmsg_data(cur), blobmsg_data_len(cur) - 1);
1267 }
1268
1269 ret = hostapd_send_beacon_req(hapd, addr, 0, req);
1270 if (ret < 0)
1271 return -ret;
1272
1273 return 0;
1274 }
1275
1276
1277 #ifdef CONFIG_WNM_AP
1278 enum {
1279 WNM_DISASSOC_ADDR,
1280 WNM_DISASSOC_DURATION,
1281 WNM_DISASSOC_NEIGHBORS,
1282 WNM_DISASSOC_ABRIDGED,
1283 __WNM_DISASSOC_MAX,
1284 };
1285
1286 static const struct blobmsg_policy wnm_disassoc_policy[__WNM_DISASSOC_MAX] = {
1287 [WNM_DISASSOC_ADDR] = { "addr", BLOBMSG_TYPE_STRING },
1288 [WNM_DISASSOC_DURATION] { "duration", BLOBMSG_TYPE_INT32 },
1289 [WNM_DISASSOC_NEIGHBORS] { "neighbors", BLOBMSG_TYPE_ARRAY },
1290 [WNM_DISASSOC_ABRIDGED] { "abridged", BLOBMSG_TYPE_BOOL },
1291 };
1292
1293 static int
1294 hostapd_wnm_disassoc_imminent(struct ubus_context *ctx, struct ubus_object *obj,
1295 struct ubus_request_data *ureq, const char *method,
1296 struct blob_attr *msg)
1297 {
1298 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
1299 struct blob_attr *tb[__WNM_DISASSOC_MAX];
1300 struct blob_attr *cur;
1301 struct sta_info *sta;
1302 int duration = 10;
1303 int rem;
1304 int nr_len = 0;
1305 u8 *nr = NULL;
1306 u8 req_mode = WNM_BSS_TM_REQ_DISASSOC_IMMINENT;
1307 u8 addr[ETH_ALEN];
1308
1309 blobmsg_parse(wnm_disassoc_policy, __WNM_DISASSOC_MAX, tb, blob_data(msg), blob_len(msg));
1310
1311 if (!tb[WNM_DISASSOC_ADDR])
1312 return UBUS_STATUS_INVALID_ARGUMENT;
1313
1314 if (hwaddr_aton(blobmsg_data(tb[WNM_DISASSOC_ADDR]), addr))
1315 return UBUS_STATUS_INVALID_ARGUMENT;
1316
1317 if ((cur = tb[WNM_DISASSOC_DURATION]) != NULL)
1318 duration = blobmsg_get_u32(cur);
1319
1320 sta = ap_get_sta(hapd, addr);
1321 if (!sta)
1322 return UBUS_STATUS_NOT_FOUND;
1323
1324 if (tb[WNM_DISASSOC_NEIGHBORS]) {
1325 u8 *nr_cur;
1326
1327 if (blobmsg_check_array(tb[WNM_DISASSOC_NEIGHBORS],
1328 BLOBMSG_TYPE_STRING) < 0)
1329 return UBUS_STATUS_INVALID_ARGUMENT;
1330
1331 blobmsg_for_each_attr(cur, tb[WNM_DISASSOC_NEIGHBORS], rem) {
1332 int len = strlen(blobmsg_get_string(cur));
1333
1334 if (len % 2)
1335 return UBUS_STATUS_INVALID_ARGUMENT;
1336
1337 nr_len += (len / 2) + 2;
1338 }
1339
1340 if (nr_len) {
1341 nr = os_zalloc(nr_len);
1342 if (!nr)
1343 return UBUS_STATUS_UNKNOWN_ERROR;
1344 }
1345
1346 nr_cur = nr;
1347 blobmsg_for_each_attr(cur, tb[WNM_DISASSOC_NEIGHBORS], rem) {
1348 int len = strlen(blobmsg_get_string(cur)) / 2;
1349
1350 *nr_cur++ = WLAN_EID_NEIGHBOR_REPORT;
1351 *nr_cur++ = (u8) len;
1352 if (hexstr2bin(blobmsg_data(cur), nr_cur, len)) {
1353 free(nr);
1354 return UBUS_STATUS_INVALID_ARGUMENT;
1355 }
1356
1357 nr_cur += len;
1358 }
1359 }
1360
1361 if (nr)
1362 req_mode |= WNM_BSS_TM_REQ_PREF_CAND_LIST_INCLUDED;
1363
1364 if (tb[WNM_DISASSOC_ABRIDGED] && blobmsg_get_bool(tb[WNM_DISASSOC_ABRIDGED]))
1365 req_mode |= WNM_BSS_TM_REQ_ABRIDGED;
1366
1367 if (wnm_send_bss_tm_req(hapd, sta, req_mode, duration, duration, NULL,
1368 NULL, nr, nr_len, NULL, 0))
1369 return UBUS_STATUS_UNKNOWN_ERROR;
1370
1371 return 0;
1372 }
1373 #endif
1374
1375 #ifdef CONFIG_AIRTIME_POLICY
1376 enum {
1377 UPDATE_AIRTIME_STA,
1378 UPDATE_AIRTIME_WEIGHT,
1379 __UPDATE_AIRTIME_MAX,
1380 };
1381
1382
1383 static const struct blobmsg_policy airtime_policy[__UPDATE_AIRTIME_MAX] = {
1384 [UPDATE_AIRTIME_STA] = { "sta", BLOBMSG_TYPE_STRING },
1385 [UPDATE_AIRTIME_WEIGHT] = { "weight", BLOBMSG_TYPE_INT32 },
1386 };
1387
1388 static int
1389 hostapd_bss_update_airtime(struct ubus_context *ctx, struct ubus_object *obj,
1390 struct ubus_request_data *ureq, const char *method,
1391 struct blob_attr *msg)
1392 {
1393 struct hostapd_data *hapd = container_of(obj, struct hostapd_data, ubus.obj);
1394 struct blob_attr *tb[__UPDATE_AIRTIME_MAX];
1395 struct sta_info *sta = NULL;
1396 u8 addr[ETH_ALEN];
1397 int weight;
1398
1399 blobmsg_parse(airtime_policy, __UPDATE_AIRTIME_MAX, tb, blob_data(msg), blob_len(msg));
1400
1401 if (!tb[UPDATE_AIRTIME_WEIGHT])
1402 return UBUS_STATUS_INVALID_ARGUMENT;
1403
1404 weight = blobmsg_get_u32(tb[UPDATE_AIRTIME_WEIGHT]);
1405
1406 if (!tb[UPDATE_AIRTIME_STA]) {
1407 if (!weight)
1408 return UBUS_STATUS_INVALID_ARGUMENT;
1409
1410 hapd->conf->airtime_weight = weight;
1411 return 0;
1412 }
1413
1414 if (hwaddr_aton(blobmsg_data(tb[UPDATE_AIRTIME_STA]), addr))
1415 return UBUS_STATUS_INVALID_ARGUMENT;
1416
1417 sta = ap_get_sta(hapd, addr);
1418 if (!sta)
1419 return UBUS_STATUS_NOT_FOUND;
1420
1421 sta->dyn_airtime_weight = weight;
1422 airtime_policy_new_sta(hapd, sta);
1423
1424 return 0;
1425 }
1426 #endif
1427
1428
1429 static const struct ubus_method bss_methods[] = {
1430 UBUS_METHOD_NOARG("reload", hostapd_bss_reload),
1431 UBUS_METHOD_NOARG("get_clients", hostapd_bss_get_clients),
1432 UBUS_METHOD_NOARG("get_status", hostapd_bss_get_status),
1433 UBUS_METHOD("del_client", hostapd_bss_del_client, del_policy),
1434 #ifdef CONFIG_AIRTIME_POLICY
1435 UBUS_METHOD("update_airtime", hostapd_bss_update_airtime, airtime_policy),
1436 #endif
1437 UBUS_METHOD_NOARG("list_bans", hostapd_bss_list_bans),
1438 #ifdef CONFIG_WPS
1439 UBUS_METHOD_NOARG("wps_start", hostapd_bss_wps_start),
1440 UBUS_METHOD_NOARG("wps_status", hostapd_bss_wps_status),
1441 UBUS_METHOD_NOARG("wps_cancel", hostapd_bss_wps_cancel),
1442 #endif
1443 UBUS_METHOD_NOARG("update_beacon", hostapd_bss_update_beacon),
1444 UBUS_METHOD_NOARG("get_features", hostapd_bss_get_features),
1445 #ifdef NEED_AP_MLME
1446 UBUS_METHOD("switch_chan", hostapd_switch_chan, csa_policy),
1447 #endif
1448 UBUS_METHOD("set_vendor_elements", hostapd_vendor_elements, ve_policy),
1449 UBUS_METHOD("notify_response", hostapd_notify_response, notify_policy),
1450 UBUS_METHOD("bss_mgmt_enable", hostapd_bss_mgmt_enable, bss_mgmt_enable_policy),
1451 UBUS_METHOD_NOARG("rrm_nr_get_own", hostapd_rrm_nr_get_own),
1452 UBUS_METHOD_NOARG("rrm_nr_list", hostapd_rrm_nr_list),
1453 UBUS_METHOD("rrm_nr_set", hostapd_rrm_nr_set, nr_set_policy),
1454 UBUS_METHOD("rrm_beacon_req", hostapd_rrm_beacon_req, beacon_req_policy),
1455 #ifdef CONFIG_WNM_AP
1456 UBUS_METHOD("wnm_disassoc_imminent", hostapd_wnm_disassoc_imminent, wnm_disassoc_policy),
1457 #endif
1458 };
1459
1460 static struct ubus_object_type bss_object_type =
1461 UBUS_OBJECT_TYPE("hostapd_bss", bss_methods);
1462
1463 static int avl_compare_macaddr(const void *k1, const void *k2, void *ptr)
1464 {
1465 return memcmp(k1, k2, ETH_ALEN);
1466 }
1467
1468 void hostapd_ubus_add_bss(struct hostapd_data *hapd)
1469 {
1470 struct ubus_object *obj = &hapd->ubus.obj;
1471 char *name;
1472 int ret;
1473
1474 #ifdef CONFIG_MESH
1475 if (hapd->conf->mesh & MESH_ENABLED)
1476 return;
1477 #endif
1478
1479 if (!hostapd_ubus_init())
1480 return;
1481
1482 if (asprintf(&name, "hostapd.%s", hapd->conf->iface) < 0)
1483 return;
1484
1485 avl_init(&hapd->ubus.banned, avl_compare_macaddr, false, NULL);
1486 obj->name = name;
1487 obj->type = &bss_object_type;
1488 obj->methods = bss_object_type.methods;
1489 obj->n_methods = bss_object_type.n_methods;
1490 ret = ubus_add_object(ctx, obj);
1491 hostapd_ubus_ref_inc();
1492
1493 hostapd_send_shared_event(&hapd->iface->interfaces->ubus, hapd->conf->iface, "add");
1494 }
1495
1496 void hostapd_ubus_free_bss(struct hostapd_data *hapd)
1497 {
1498 struct ubus_object *obj = &hapd->ubus.obj;
1499 char *name = (char *) obj->name;
1500
1501 #ifdef CONFIG_MESH
1502 if (hapd->conf->mesh & MESH_ENABLED)
1503 return;
1504 #endif
1505
1506 if (!ctx)
1507 return;
1508
1509 hostapd_send_shared_event(&hapd->iface->interfaces->ubus, hapd->conf->iface, "remove");
1510
1511 if (obj->id) {
1512 ubus_remove_object(ctx, obj);
1513 hostapd_ubus_ref_dec();
1514 }
1515
1516 free(name);
1517 }
1518
1519 static void
1520 hostapd_ubus_vlan_action(struct hostapd_data *hapd, struct hostapd_vlan *vlan,
1521 const char *action)
1522 {
1523 struct vlan_description *desc = &vlan->vlan_desc;
1524 void *c;
1525 int i;
1526
1527 if (!hapd->ubus.obj.has_subscribers)
1528 return;
1529
1530 blob_buf_init(&b, 0);
1531 blobmsg_add_string(&b, "ifname", vlan->ifname);
1532 blobmsg_add_string(&b, "bridge", vlan->bridge);
1533 blobmsg_add_u32(&b, "vlan_id", vlan->vlan_id);
1534
1535 if (desc->notempty) {
1536 blobmsg_add_u32(&b, "untagged", desc->untagged);
1537 c = blobmsg_open_array(&b, "tagged");
1538 for (i = 0; i < ARRAY_SIZE(desc->tagged) && desc->tagged[i]; i++)
1539 blobmsg_add_u32(&b, "", desc->tagged[i]);
1540 blobmsg_close_array(&b, c);
1541 }
1542
1543 ubus_notify(ctx, &hapd->ubus.obj, action, b.head, -1);
1544 }
1545
1546 void hostapd_ubus_add_vlan(struct hostapd_data *hapd, struct hostapd_vlan *vlan)
1547 {
1548 hostapd_ubus_vlan_action(hapd, vlan, "vlan_add");
1549 }
1550
1551 void hostapd_ubus_remove_vlan(struct hostapd_data *hapd, struct hostapd_vlan *vlan)
1552 {
1553 hostapd_ubus_vlan_action(hapd, vlan, "vlan_remove");
1554 }
1555
1556 static const struct ubus_method daemon_methods[] = {
1557 UBUS_METHOD("config_add", hostapd_config_add, config_add_policy),
1558 UBUS_METHOD("config_remove", hostapd_config_remove, config_remove_policy),
1559 };
1560
1561 static struct ubus_object_type daemon_object_type =
1562 UBUS_OBJECT_TYPE("hostapd", daemon_methods);
1563
1564 void hostapd_ubus_add(struct hapd_interfaces *interfaces)
1565 {
1566 struct ubus_object *obj = &interfaces->ubus;
1567 int ret;
1568
1569 if (!hostapd_ubus_init())
1570 return;
1571
1572 obj->name = strdup("hostapd");
1573
1574 obj->type = &daemon_object_type;
1575 obj->methods = daemon_object_type.methods;
1576 obj->n_methods = daemon_object_type.n_methods;
1577 ret = ubus_add_object(ctx, obj);
1578 hostapd_ubus_ref_inc();
1579 }
1580
1581 void hostapd_ubus_free(struct hapd_interfaces *interfaces)
1582 {
1583 struct ubus_object *obj = &interfaces->ubus;
1584 char *name = (char *) obj->name;
1585
1586 if (!ctx)
1587 return;
1588
1589 if (obj->id) {
1590 ubus_remove_object(ctx, obj);
1591 hostapd_ubus_ref_dec();
1592 }
1593
1594 free(name);
1595 }
1596
1597 struct ubus_event_req {
1598 struct ubus_notify_request nreq;
1599 int resp;
1600 };
1601
1602 static void
1603 ubus_event_cb(struct ubus_notify_request *req, int idx, int ret)
1604 {
1605 struct ubus_event_req *ureq = container_of(req, struct ubus_event_req, nreq);
1606
1607 ureq->resp = ret;
1608 }
1609
1610 int hostapd_ubus_handle_event(struct hostapd_data *hapd, struct hostapd_ubus_request *req)
1611 {
1612 struct ubus_banned_client *ban;
1613 const char *types[HOSTAPD_UBUS_TYPE_MAX] = {
1614 [HOSTAPD_UBUS_PROBE_REQ] = "probe",
1615 [HOSTAPD_UBUS_AUTH_REQ] = "auth",
1616 [HOSTAPD_UBUS_ASSOC_REQ] = "assoc",
1617 };
1618 const char *type = "mgmt";
1619 struct ubus_event_req ureq = {};
1620 const u8 *addr;
1621
1622 if (req->mgmt_frame)
1623 addr = req->mgmt_frame->sa;
1624 else
1625 addr = req->addr;
1626
1627 ban = avl_find_element(&hapd->ubus.banned, addr, ban, avl);
1628 if (ban)
1629 return WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
1630
1631 if (!hapd->ubus.obj.has_subscribers)
1632 return WLAN_STATUS_SUCCESS;
1633
1634 if (req->type < ARRAY_SIZE(types))
1635 type = types[req->type];
1636
1637 blob_buf_init(&b, 0);
1638 blobmsg_add_macaddr(&b, "address", addr);
1639 if (req->mgmt_frame)
1640 blobmsg_add_macaddr(&b, "target", req->mgmt_frame->da);
1641 if (req->ssi_signal)
1642 blobmsg_add_u32(&b, "signal", req->ssi_signal);
1643 blobmsg_add_u32(&b, "freq", hapd->iface->freq);
1644
1645 if (req->elems) {
1646 if(req->elems->ht_capabilities)
1647 {
1648 struct ieee80211_ht_capabilities *ht_capabilities;
1649 void *ht_cap, *ht_cap_mcs_set, *mcs_set;
1650
1651
1652 ht_capabilities = (struct ieee80211_ht_capabilities*) req->elems->ht_capabilities;
1653 ht_cap = blobmsg_open_table(&b, "ht_capabilities");
1654 blobmsg_add_u16(&b, "ht_capabilities_info", ht_capabilities->ht_capabilities_info);
1655 ht_cap_mcs_set = blobmsg_open_table(&b, "supported_mcs_set");
1656 blobmsg_add_u16(&b, "a_mpdu_params", ht_capabilities->a_mpdu_params);
1657 blobmsg_add_u16(&b, "ht_extended_capabilities", ht_capabilities->ht_extended_capabilities);
1658 blobmsg_add_u32(&b, "tx_bf_capability_info", ht_capabilities->tx_bf_capability_info);
1659 blobmsg_add_u16(&b, "asel_capabilities", ht_capabilities->asel_capabilities);
1660 mcs_set = blobmsg_open_array(&b, "supported_mcs_set");
1661 for (int i = 0; i < 16; i++) {
1662 blobmsg_add_u16(&b, NULL, (u16) ht_capabilities->supported_mcs_set[i]);
1663 }
1664 blobmsg_close_array(&b, mcs_set);
1665 blobmsg_close_table(&b, ht_cap_mcs_set);
1666 blobmsg_close_table(&b, ht_cap);
1667 }
1668 if(req->elems->vht_capabilities)
1669 {
1670 struct ieee80211_vht_capabilities *vht_capabilities;
1671 void *vht_cap, *vht_cap_mcs_set;
1672
1673 vht_capabilities = (struct ieee80211_vht_capabilities*) req->elems->vht_capabilities;
1674 vht_cap = blobmsg_open_table(&b, "vht_capabilities");
1675 blobmsg_add_u32(&b, "vht_capabilities_info", vht_capabilities->vht_capabilities_info);
1676 vht_cap_mcs_set = blobmsg_open_table(&b, "vht_supported_mcs_set");
1677 blobmsg_add_u16(&b, "rx_map", vht_capabilities->vht_supported_mcs_set.rx_map);
1678 blobmsg_add_u16(&b, "rx_highest", vht_capabilities->vht_supported_mcs_set.rx_highest);
1679 blobmsg_add_u16(&b, "tx_map", vht_capabilities->vht_supported_mcs_set.tx_map);
1680 blobmsg_add_u16(&b, "tx_highest", vht_capabilities->vht_supported_mcs_set.tx_highest);
1681 blobmsg_close_table(&b, vht_cap_mcs_set);
1682 blobmsg_close_table(&b, vht_cap);
1683 }
1684 }
1685
1686 if (!hapd->ubus.notify_response) {
1687 ubus_notify(ctx, &hapd->ubus.obj, type, b.head, -1);
1688 return WLAN_STATUS_SUCCESS;
1689 }
1690
1691 if (ubus_notify_async(ctx, &hapd->ubus.obj, type, b.head, &ureq.nreq))
1692 return WLAN_STATUS_SUCCESS;
1693
1694 ureq.nreq.status_cb = ubus_event_cb;
1695 ubus_complete_request(ctx, &ureq.nreq.req, 100);
1696
1697 if (ureq.resp)
1698 return ureq.resp;
1699
1700 return WLAN_STATUS_SUCCESS;
1701 }
1702
1703 void hostapd_ubus_notify(struct hostapd_data *hapd, const char *type, const u8 *addr)
1704 {
1705 if (!hapd->ubus.obj.has_subscribers)
1706 return;
1707
1708 if (!addr)
1709 return;
1710
1711 blob_buf_init(&b, 0);
1712 blobmsg_add_macaddr(&b, "address", addr);
1713
1714 ubus_notify(ctx, &hapd->ubus.obj, type, b.head, -1);
1715 }
1716
1717 void hostapd_ubus_notify_beacon_report(
1718 struct hostapd_data *hapd, const u8 *addr, u8 token, u8 rep_mode,
1719 struct rrm_measurement_beacon_report *rep, size_t len)
1720 {
1721 if (!hapd->ubus.obj.has_subscribers)
1722 return;
1723
1724 if (!addr || !rep)
1725 return;
1726
1727 blob_buf_init(&b, 0);
1728 blobmsg_add_macaddr(&b, "address", addr);
1729 blobmsg_add_u16(&b, "op-class", rep->op_class);
1730 blobmsg_add_u16(&b, "channel", rep->channel);
1731 blobmsg_add_u64(&b, "start-time", rep->start_time);
1732 blobmsg_add_u16(&b, "duration", rep->duration);
1733 blobmsg_add_u16(&b, "report-info", rep->report_info);
1734 blobmsg_add_u16(&b, "rcpi", rep->rcpi);
1735 blobmsg_add_u16(&b, "rsni", rep->rsni);
1736 blobmsg_add_macaddr(&b, "bssid", rep->bssid);
1737 blobmsg_add_u16(&b, "antenna-id", rep->antenna_id);
1738 blobmsg_add_u16(&b, "parent-tsf", rep->parent_tsf);
1739
1740 ubus_notify(ctx, &hapd->ubus.obj, "beacon-report", b.head, -1);
1741 }
1742
1743 void hostapd_ubus_notify_radar_detected(struct hostapd_iface *iface, int frequency,
1744 int chan_width, int cf1, int cf2)
1745 {
1746 struct hostapd_data *hapd;
1747 int i;
1748
1749 blob_buf_init(&b, 0);
1750 blobmsg_add_u16(&b, "frequency", frequency);
1751 blobmsg_add_u16(&b, "width", chan_width);
1752 blobmsg_add_u16(&b, "center1", cf1);
1753 blobmsg_add_u16(&b, "center2", cf2);
1754
1755 for (i = 0; i < iface->num_bss; i++) {
1756 hapd = iface->bss[i];
1757 ubus_notify(ctx, &hapd->ubus.obj, "radar-detected", b.head, -1);
1758 }
1759 }