Loading...
1// SPDX-License-Identifier: GPL-2.0+
2/* Copyright (c) 2015-2016 Quantenna Communications. All rights reserved. */
3
4#include <linux/kernel.h>
5#include <linux/module.h>
6#include <linux/slab.h>
7#include <linux/nospec.h>
8
9#include "cfg80211.h"
10#include "core.h"
11#include "qlink.h"
12#include "bus.h"
13#include "trans.h"
14#include "util.h"
15#include "event.h"
16#include "qlink_util.h"
17
18static int
19qtnf_event_handle_sta_assoc(struct qtnf_wmac *mac, struct qtnf_vif *vif,
20 const struct qlink_event_sta_assoc *sta_assoc,
21 u16 len)
22{
23 const u8 *sta_addr;
24 u16 frame_control;
25 struct station_info *sinfo;
26 size_t payload_len;
27 u16 tlv_type;
28 u16 tlv_value_len;
29 const struct qlink_tlv_hdr *tlv;
30 int ret = 0;
31
32 if (unlikely(len < sizeof(*sta_assoc))) {
33 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
34 mac->macid, vif->vifid, len, sizeof(*sta_assoc));
35 return -EINVAL;
36 }
37
38 if (vif->wdev.iftype != NL80211_IFTYPE_AP) {
39 pr_err("VIF%u.%u: STA_ASSOC event when not in AP mode\n",
40 mac->macid, vif->vifid);
41 return -EPROTO;
42 }
43
44 sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL);
45 if (!sinfo)
46 return -ENOMEM;
47
48 sta_addr = sta_assoc->sta_addr;
49 frame_control = le16_to_cpu(sta_assoc->frame_control);
50
51 pr_debug("VIF%u.%u: MAC:%pM FC:%x\n", mac->macid, vif->vifid, sta_addr,
52 frame_control);
53
54 qtnf_sta_list_add(vif, sta_addr);
55
56 sinfo->assoc_req_ies = NULL;
57 sinfo->assoc_req_ies_len = 0;
58 sinfo->generation = vif->generation;
59
60 payload_len = len - sizeof(*sta_assoc);
61
62 qlink_for_each_tlv(tlv, sta_assoc->ies, payload_len) {
63 tlv_type = le16_to_cpu(tlv->type);
64 tlv_value_len = le16_to_cpu(tlv->len);
65
66 if (tlv_type == QTN_TLV_ID_IE_SET) {
67 const struct qlink_tlv_ie_set *ie_set;
68 unsigned int ie_len;
69
70 if (tlv_value_len <
71 (sizeof(*ie_set) - sizeof(ie_set->hdr))) {
72 ret = -EINVAL;
73 goto out;
74 }
75
76 ie_set = (const struct qlink_tlv_ie_set *)tlv;
77 ie_len = tlv_value_len -
78 (sizeof(*ie_set) - sizeof(ie_set->hdr));
79
80 if (ie_set->type == QLINK_IE_SET_ASSOC_REQ && ie_len) {
81 sinfo->assoc_req_ies = ie_set->ie_data;
82 sinfo->assoc_req_ies_len = ie_len;
83 }
84 }
85 }
86
87 if (!qlink_tlv_parsing_ok(tlv, sta_assoc->ies, payload_len)) {
88 pr_err("Malformed TLV buffer\n");
89 ret = -EINVAL;
90 goto out;
91 }
92
93 cfg80211_new_sta(vif->netdev, sta_assoc->sta_addr, sinfo,
94 GFP_KERNEL);
95
96out:
97 kfree(sinfo);
98 return ret;
99}
100
101static int
102qtnf_event_handle_sta_deauth(struct qtnf_wmac *mac, struct qtnf_vif *vif,
103 const struct qlink_event_sta_deauth *sta_deauth,
104 u16 len)
105{
106 const u8 *sta_addr;
107 u16 reason;
108
109 if (unlikely(len < sizeof(*sta_deauth))) {
110 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
111 mac->macid, vif->vifid, len,
112 sizeof(struct qlink_event_sta_deauth));
113 return -EINVAL;
114 }
115
116 if (vif->wdev.iftype != NL80211_IFTYPE_AP) {
117 pr_err("VIF%u.%u: STA_DEAUTH event when not in AP mode\n",
118 mac->macid, vif->vifid);
119 return -EPROTO;
120 }
121
122 sta_addr = sta_deauth->sta_addr;
123 reason = le16_to_cpu(sta_deauth->reason);
124
125 pr_debug("VIF%u.%u: MAC:%pM reason:%x\n", mac->macid, vif->vifid,
126 sta_addr, reason);
127
128 if (qtnf_sta_list_del(vif, sta_addr))
129 cfg80211_del_sta(vif->netdev, sta_deauth->sta_addr,
130 GFP_KERNEL);
131
132 return 0;
133}
134
135static int
136qtnf_event_handle_bss_join(struct qtnf_vif *vif,
137 const struct qlink_event_bss_join *join_info,
138 u16 len)
139{
140 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
141 enum ieee80211_statuscode status = le16_to_cpu(join_info->status);
142 struct cfg80211_chan_def chandef;
143 struct cfg80211_bss *bss = NULL;
144 u8 *ie = NULL;
145 size_t payload_len;
146 u16 tlv_type;
147 u16 tlv_value_len;
148 const struct qlink_tlv_hdr *tlv;
149 const u8 *rsp_ies = NULL;
150 size_t rsp_ies_len = 0;
151
152 if (unlikely(len < sizeof(*join_info))) {
153 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
154 vif->mac->macid, vif->vifid, len,
155 sizeof(struct qlink_event_bss_join));
156 return -EINVAL;
157 }
158
159 if (vif->wdev.iftype != NL80211_IFTYPE_STATION) {
160 pr_err("VIF%u.%u: BSS_JOIN event when not in STA mode\n",
161 vif->mac->macid, vif->vifid);
162 return -EPROTO;
163 }
164
165 pr_debug("VIF%u.%u: BSSID:%pM chan:%u status:%u\n",
166 vif->mac->macid, vif->vifid, join_info->bssid,
167 le16_to_cpu(join_info->chan.chan.center_freq), status);
168
169 if (status != WLAN_STATUS_SUCCESS)
170 goto done;
171
172 qlink_chandef_q2cfg(wiphy, &join_info->chan, &chandef);
173 if (!cfg80211_chandef_valid(&chandef)) {
174 pr_warn("MAC%u.%u: bad channel freq=%u cf1=%u cf2=%u bw=%u\n",
175 vif->mac->macid, vif->vifid,
176 chandef.chan ? chandef.chan->center_freq : 0,
177 chandef.center_freq1,
178 chandef.center_freq2,
179 chandef.width);
180 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
181 goto done;
182 }
183
184 bss = cfg80211_get_bss(wiphy, chandef.chan, join_info->bssid,
185 NULL, 0, IEEE80211_BSS_TYPE_ESS,
186 IEEE80211_PRIVACY_ANY);
187 if (!bss) {
188 pr_warn("VIF%u.%u: add missing BSS:%pM chan:%u\n",
189 vif->mac->macid, vif->vifid,
190 join_info->bssid, chandef.chan->hw_value);
191
192 if (!vif->wdev.u.client.ssid_len) {
193 pr_warn("VIF%u.%u: SSID unknown for BSS:%pM\n",
194 vif->mac->macid, vif->vifid,
195 join_info->bssid);
196 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
197 goto done;
198 }
199
200 ie = kzalloc(2 + vif->wdev.u.client.ssid_len, GFP_KERNEL);
201 if (!ie) {
202 pr_warn("VIF%u.%u: IE alloc failed for BSS:%pM\n",
203 vif->mac->macid, vif->vifid,
204 join_info->bssid);
205 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
206 goto done;
207 }
208
209 ie[0] = WLAN_EID_SSID;
210 ie[1] = vif->wdev.u.client.ssid_len;
211 memcpy(ie + 2, vif->wdev.u.client.ssid,
212 vif->wdev.u.client.ssid_len);
213
214 bss = cfg80211_inform_bss(wiphy, chandef.chan,
215 CFG80211_BSS_FTYPE_UNKNOWN,
216 join_info->bssid, 0,
217 WLAN_CAPABILITY_ESS, 100,
218 ie, 2 + vif->wdev.u.client.ssid_len,
219 0, GFP_KERNEL);
220 if (!bss) {
221 pr_warn("VIF%u.%u: can't connect to unknown BSS: %pM\n",
222 vif->mac->macid, vif->vifid,
223 join_info->bssid);
224 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
225 goto done;
226 }
227 }
228
229 payload_len = len - sizeof(*join_info);
230
231 qlink_for_each_tlv(tlv, join_info->ies, payload_len) {
232 tlv_type = le16_to_cpu(tlv->type);
233 tlv_value_len = le16_to_cpu(tlv->len);
234
235 if (tlv_type == QTN_TLV_ID_IE_SET) {
236 const struct qlink_tlv_ie_set *ie_set;
237 unsigned int ie_len;
238
239 if (tlv_value_len <
240 (sizeof(*ie_set) - sizeof(ie_set->hdr))) {
241 pr_warn("invalid IE_SET TLV\n");
242 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
243 goto done;
244 }
245
246 ie_set = (const struct qlink_tlv_ie_set *)tlv;
247 ie_len = tlv_value_len -
248 (sizeof(*ie_set) - sizeof(ie_set->hdr));
249
250 switch (ie_set->type) {
251 case QLINK_IE_SET_ASSOC_RESP:
252 if (ie_len) {
253 rsp_ies = ie_set->ie_data;
254 rsp_ies_len = ie_len;
255 }
256 break;
257 default:
258 pr_warn("unexpected IE type: %u\n",
259 ie_set->type);
260 break;
261 }
262 }
263 }
264
265 if (!qlink_tlv_parsing_ok(tlv, join_info->ies, payload_len))
266 pr_warn("Malformed TLV buffer\n");
267done:
268 cfg80211_connect_result(vif->netdev, join_info->bssid, NULL, 0, rsp_ies,
269 rsp_ies_len, status, GFP_KERNEL);
270 if (bss) {
271 if (!ether_addr_equal(vif->bssid, join_info->bssid))
272 ether_addr_copy(vif->bssid, join_info->bssid);
273 cfg80211_put_bss(wiphy, bss);
274 }
275
276 if (status == WLAN_STATUS_SUCCESS)
277 netif_carrier_on(vif->netdev);
278
279 kfree(ie);
280 return 0;
281}
282
283static int
284qtnf_event_handle_bss_leave(struct qtnf_vif *vif,
285 const struct qlink_event_bss_leave *leave_info,
286 u16 len)
287{
288 if (unlikely(len < sizeof(*leave_info))) {
289 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
290 vif->mac->macid, vif->vifid, len,
291 sizeof(struct qlink_event_bss_leave));
292 return -EINVAL;
293 }
294
295 if (vif->wdev.iftype != NL80211_IFTYPE_STATION) {
296 pr_err("VIF%u.%u: BSS_LEAVE event when not in STA mode\n",
297 vif->mac->macid, vif->vifid);
298 return -EPROTO;
299 }
300
301 pr_debug("VIF%u.%u: disconnected\n", vif->mac->macid, vif->vifid);
302
303 cfg80211_disconnected(vif->netdev, le16_to_cpu(leave_info->reason),
304 NULL, 0, 0, GFP_KERNEL);
305 netif_carrier_off(vif->netdev);
306
307 return 0;
308}
309
310static int
311qtnf_event_handle_mgmt_received(struct qtnf_vif *vif,
312 const struct qlink_event_rxmgmt *rxmgmt,
313 u16 len)
314{
315 const size_t min_len = sizeof(*rxmgmt) +
316 sizeof(struct ieee80211_hdr_3addr);
317 const struct ieee80211_hdr_3addr *frame = (void *)rxmgmt->frame_data;
318 const u16 frame_len = len - sizeof(*rxmgmt);
319 enum nl80211_rxmgmt_flags flags = 0;
320
321 if (unlikely(len < min_len)) {
322 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
323 vif->mac->macid, vif->vifid, len, min_len);
324 return -EINVAL;
325 }
326
327 if (le32_to_cpu(rxmgmt->flags) & QLINK_RXMGMT_FLAG_ANSWERED)
328 flags |= NL80211_RXMGMT_FLAG_ANSWERED;
329
330 pr_debug("%s LEN:%u FC:%.4X SA:%pM\n", vif->netdev->name, frame_len,
331 le16_to_cpu(frame->frame_control), frame->addr2);
332
333 cfg80211_rx_mgmt(&vif->wdev, le32_to_cpu(rxmgmt->freq), rxmgmt->sig_dbm,
334 rxmgmt->frame_data, frame_len, flags);
335
336 return 0;
337}
338
339static int
340qtnf_event_handle_scan_results(struct qtnf_vif *vif,
341 const struct qlink_event_scan_result *sr,
342 u16 len)
343{
344 struct cfg80211_bss *bss;
345 struct ieee80211_channel *channel;
346 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
347 enum cfg80211_bss_frame_type frame_type = CFG80211_BSS_FTYPE_UNKNOWN;
348 size_t payload_len;
349 u16 tlv_type;
350 u16 tlv_value_len;
351 const struct qlink_tlv_hdr *tlv;
352 const u8 *ies = NULL;
353 size_t ies_len = 0;
354
355 if (len < sizeof(*sr)) {
356 pr_err("VIF%u.%u: payload is too short\n", vif->mac->macid,
357 vif->vifid);
358 return -EINVAL;
359 }
360
361 channel = ieee80211_get_channel(wiphy, le16_to_cpu(sr->freq));
362 if (!channel) {
363 pr_err("VIF%u.%u: channel at %u MHz not found\n",
364 vif->mac->macid, vif->vifid, le16_to_cpu(sr->freq));
365 return -EINVAL;
366 }
367
368 payload_len = len - sizeof(*sr);
369
370 qlink_for_each_tlv(tlv, sr->payload, payload_len) {
371 tlv_type = le16_to_cpu(tlv->type);
372 tlv_value_len = le16_to_cpu(tlv->len);
373
374 if (tlv_type == QTN_TLV_ID_IE_SET) {
375 const struct qlink_tlv_ie_set *ie_set;
376 unsigned int ie_len;
377
378 if (tlv_value_len <
379 (sizeof(*ie_set) - sizeof(ie_set->hdr)))
380 return -EINVAL;
381
382 ie_set = (const struct qlink_tlv_ie_set *)tlv;
383 ie_len = tlv_value_len -
384 (sizeof(*ie_set) - sizeof(ie_set->hdr));
385
386 switch (ie_set->type) {
387 case QLINK_IE_SET_BEACON_IES:
388 frame_type = CFG80211_BSS_FTYPE_BEACON;
389 break;
390 case QLINK_IE_SET_PROBE_RESP_IES:
391 frame_type = CFG80211_BSS_FTYPE_PRESP;
392 break;
393 default:
394 frame_type = CFG80211_BSS_FTYPE_UNKNOWN;
395 }
396
397 if (ie_len) {
398 ies = ie_set->ie_data;
399 ies_len = ie_len;
400 }
401 }
402 }
403
404 if (!qlink_tlv_parsing_ok(tlv, sr->payload, payload_len))
405 return -EINVAL;
406
407 bss = cfg80211_inform_bss(wiphy, channel, frame_type,
408 sr->bssid, get_unaligned_le64(&sr->tsf),
409 le16_to_cpu(sr->capab),
410 le16_to_cpu(sr->bintval), ies, ies_len,
411 DBM_TO_MBM(sr->sig_dbm), GFP_KERNEL);
412 if (!bss)
413 return -ENOMEM;
414
415 cfg80211_put_bss(wiphy, bss);
416
417 return 0;
418}
419
420static int
421qtnf_event_handle_scan_complete(struct qtnf_wmac *mac,
422 const struct qlink_event_scan_complete *status,
423 u16 len)
424{
425 if (len < sizeof(*status)) {
426 pr_err("MAC%u: payload is too short\n", mac->macid);
427 return -EINVAL;
428 }
429
430 qtnf_scan_done(mac, le32_to_cpu(status->flags) & QLINK_SCAN_ABORTED);
431
432 return 0;
433}
434
435static int
436qtnf_event_handle_freq_change(struct qtnf_wmac *mac,
437 const struct qlink_event_freq_change *data,
438 u16 len)
439{
440 struct wiphy *wiphy = priv_to_wiphy(mac);
441 struct cfg80211_chan_def chandef;
442 struct qtnf_vif *vif;
443 int i;
444
445 if (len < sizeof(*data)) {
446 pr_err("MAC%u: payload is too short\n", mac->macid);
447 return -EINVAL;
448 }
449
450 if (!wiphy->registered)
451 return 0;
452
453 qlink_chandef_q2cfg(wiphy, &data->chan, &chandef);
454
455 if (!cfg80211_chandef_valid(&chandef)) {
456 pr_err("MAC%u: bad channel freq=%u cf1=%u cf2=%u bw=%u\n",
457 mac->macid, chandef.chan->center_freq,
458 chandef.center_freq1, chandef.center_freq2,
459 chandef.width);
460 return -EINVAL;
461 }
462
463 pr_debug("MAC%d: new channel ieee=%u freq1=%u freq2=%u bw=%u\n",
464 mac->macid, chandef.chan->hw_value, chandef.center_freq1,
465 chandef.center_freq2, chandef.width);
466
467 for (i = 0; i < QTNF_MAX_INTF; i++) {
468 vif = &mac->iflist[i];
469
470 if (vif->wdev.iftype == NL80211_IFTYPE_UNSPECIFIED)
471 continue;
472
473 if (vif->wdev.iftype == NL80211_IFTYPE_STATION &&
474 !vif->wdev.connected)
475 continue;
476
477 if (!vif->netdev)
478 continue;
479
480 wiphy_lock(priv_to_wiphy(vif->mac));
481 cfg80211_ch_switch_notify(vif->netdev, &chandef, 0, 0);
482 wiphy_unlock(priv_to_wiphy(vif->mac));
483 }
484
485 return 0;
486}
487
488static int qtnf_event_handle_radar(struct qtnf_vif *vif,
489 const struct qlink_event_radar *ev,
490 u16 len)
491{
492 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
493 struct cfg80211_chan_def chandef;
494
495 if (len < sizeof(*ev)) {
496 pr_err("MAC%u: payload is too short\n", vif->mac->macid);
497 return -EINVAL;
498 }
499
500 if (!wiphy->registered || !vif->netdev)
501 return 0;
502
503 qlink_chandef_q2cfg(wiphy, &ev->chan, &chandef);
504
505 if (!cfg80211_chandef_valid(&chandef)) {
506 pr_err("MAC%u: bad channel f1=%u f2=%u bw=%u\n",
507 vif->mac->macid,
508 chandef.center_freq1, chandef.center_freq2,
509 chandef.width);
510 return -EINVAL;
511 }
512
513 pr_info("%s: radar event=%u f1=%u f2=%u bw=%u\n",
514 vif->netdev->name, ev->event,
515 chandef.center_freq1, chandef.center_freq2,
516 chandef.width);
517
518 switch (ev->event) {
519 case QLINK_RADAR_DETECTED:
520 cfg80211_radar_event(wiphy, &chandef, GFP_KERNEL);
521 break;
522 case QLINK_RADAR_CAC_FINISHED:
523 if (!vif->wdev.cac_started)
524 break;
525
526 cfg80211_cac_event(vif->netdev, &chandef,
527 NL80211_RADAR_CAC_FINISHED, GFP_KERNEL);
528 break;
529 case QLINK_RADAR_CAC_ABORTED:
530 if (!vif->wdev.cac_started)
531 break;
532
533 cfg80211_cac_event(vif->netdev, &chandef,
534 NL80211_RADAR_CAC_ABORTED, GFP_KERNEL);
535 break;
536 case QLINK_RADAR_CAC_STARTED:
537 if (vif->wdev.cac_started)
538 break;
539
540 if (!wiphy_ext_feature_isset(wiphy,
541 NL80211_EXT_FEATURE_DFS_OFFLOAD))
542 break;
543
544 cfg80211_cac_event(vif->netdev, &chandef,
545 NL80211_RADAR_CAC_STARTED, GFP_KERNEL);
546 break;
547 default:
548 pr_warn("%s: unhandled radar event %u\n",
549 vif->netdev->name, ev->event);
550 break;
551 }
552
553 return 0;
554}
555
556static int
557qtnf_event_handle_external_auth(struct qtnf_vif *vif,
558 const struct qlink_event_external_auth *ev,
559 u16 len)
560{
561 struct cfg80211_external_auth_params auth = {0};
562 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
563 int ret;
564
565 if (len < sizeof(*ev)) {
566 pr_err("MAC%u: payload is too short\n", vif->mac->macid);
567 return -EINVAL;
568 }
569
570 if (!wiphy->registered || !vif->netdev)
571 return 0;
572
573 if (ev->ssid_len) {
574 int len = clamp_val(ev->ssid_len, 0, IEEE80211_MAX_SSID_LEN);
575
576 memcpy(auth.ssid.ssid, ev->ssid, len);
577 auth.ssid.ssid_len = len;
578 }
579
580 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite);
581 ether_addr_copy(auth.bssid, ev->bssid);
582 auth.action = ev->action;
583
584 pr_debug("%s: external SAE processing: bss=%pM action=%u akm=%u\n",
585 vif->netdev->name, auth.bssid, auth.action,
586 auth.key_mgmt_suite);
587
588 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL);
589 if (ret)
590 pr_warn("failed to offload external auth request\n");
591
592 return ret;
593}
594
595static int
596qtnf_event_handle_mic_failure(struct qtnf_vif *vif,
597 const struct qlink_event_mic_failure *mic_ev,
598 u16 len)
599{
600 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
601 u8 pairwise;
602
603 if (len < sizeof(*mic_ev)) {
604 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
605 vif->mac->macid, vif->vifid, len,
606 sizeof(struct qlink_event_mic_failure));
607 return -EINVAL;
608 }
609
610 if (!wiphy->registered || !vif->netdev)
611 return 0;
612
613 if (vif->wdev.iftype != NL80211_IFTYPE_STATION) {
614 pr_err("VIF%u.%u: MIC_FAILURE event when not in STA mode\n",
615 vif->mac->macid, vif->vifid);
616 return -EPROTO;
617 }
618
619 pairwise = mic_ev->pairwise ?
620 NL80211_KEYTYPE_PAIRWISE : NL80211_KEYTYPE_GROUP;
621
622 pr_info("%s: MIC error: src=%pM key_index=%u pairwise=%u\n",
623 vif->netdev->name, mic_ev->src, mic_ev->key_index, pairwise);
624
625 cfg80211_michael_mic_failure(vif->netdev, mic_ev->src, pairwise,
626 mic_ev->key_index, NULL, GFP_KERNEL);
627
628 return 0;
629}
630
631static int
632qtnf_event_handle_update_owe(struct qtnf_vif *vif,
633 const struct qlink_event_update_owe *owe_ev,
634 u16 len)
635{
636 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
637 struct cfg80211_update_owe_info owe_info = {};
638 const u16 ie_len = len - sizeof(*owe_ev);
639 u8 *ie;
640
641 if (len < sizeof(*owe_ev)) {
642 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
643 vif->mac->macid, vif->vifid, len,
644 sizeof(struct qlink_event_update_owe));
645 return -EINVAL;
646 }
647
648 if (!wiphy->registered || !vif->netdev)
649 return 0;
650
651 if (vif->wdev.iftype != NL80211_IFTYPE_AP) {
652 pr_err("VIF%u.%u: UPDATE_OWE event when not in AP mode\n",
653 vif->mac->macid, vif->vifid);
654 return -EPROTO;
655 }
656
657 ie = kzalloc(ie_len, GFP_KERNEL);
658 if (!ie)
659 return -ENOMEM;
660
661 memcpy(owe_info.peer, owe_ev->peer, ETH_ALEN);
662 memcpy(ie, owe_ev->ies, ie_len);
663 owe_info.ie_len = ie_len;
664 owe_info.ie = ie;
665 owe_info.assoc_link_id = -1;
666
667 pr_info("%s: external OWE processing: peer=%pM\n",
668 vif->netdev->name, owe_ev->peer);
669
670 cfg80211_update_owe_info_event(vif->netdev, &owe_info, GFP_KERNEL);
671 kfree(ie);
672
673 return 0;
674}
675
676static int qtnf_event_parse(struct qtnf_wmac *mac,
677 const struct sk_buff *event_skb)
678{
679 const struct qlink_event *event;
680 struct qtnf_vif *vif = NULL;
681 int ret = -1;
682 u16 event_id;
683 u16 event_len;
684 u8 vifid;
685
686 event = (const struct qlink_event *)event_skb->data;
687 event_id = le16_to_cpu(event->event_id);
688 event_len = le16_to_cpu(event->mhdr.len);
689
690 if (event->vifid >= QTNF_MAX_INTF) {
691 pr_err("invalid vif(%u)\n", event->vifid);
692 return -EINVAL;
693 }
694
695 vifid = array_index_nospec(event->vifid, QTNF_MAX_INTF);
696 vif = &mac->iflist[vifid];
697
698 switch (event_id) {
699 case QLINK_EVENT_STA_ASSOCIATED:
700 ret = qtnf_event_handle_sta_assoc(mac, vif, (const void *)event,
701 event_len);
702 break;
703 case QLINK_EVENT_STA_DEAUTH:
704 ret = qtnf_event_handle_sta_deauth(mac, vif,
705 (const void *)event,
706 event_len);
707 break;
708 case QLINK_EVENT_MGMT_RECEIVED:
709 ret = qtnf_event_handle_mgmt_received(vif, (const void *)event,
710 event_len);
711 break;
712 case QLINK_EVENT_SCAN_RESULTS:
713 ret = qtnf_event_handle_scan_results(vif, (const void *)event,
714 event_len);
715 break;
716 case QLINK_EVENT_SCAN_COMPLETE:
717 ret = qtnf_event_handle_scan_complete(mac, (const void *)event,
718 event_len);
719 break;
720 case QLINK_EVENT_BSS_JOIN:
721 ret = qtnf_event_handle_bss_join(vif, (const void *)event,
722 event_len);
723 break;
724 case QLINK_EVENT_BSS_LEAVE:
725 ret = qtnf_event_handle_bss_leave(vif, (const void *)event,
726 event_len);
727 break;
728 case QLINK_EVENT_FREQ_CHANGE:
729 ret = qtnf_event_handle_freq_change(mac, (const void *)event,
730 event_len);
731 break;
732 case QLINK_EVENT_RADAR:
733 ret = qtnf_event_handle_radar(vif, (const void *)event,
734 event_len);
735 break;
736 case QLINK_EVENT_EXTERNAL_AUTH:
737 ret = qtnf_event_handle_external_auth(vif, (const void *)event,
738 event_len);
739 break;
740 case QLINK_EVENT_MIC_FAILURE:
741 ret = qtnf_event_handle_mic_failure(vif, (const void *)event,
742 event_len);
743 break;
744 case QLINK_EVENT_UPDATE_OWE:
745 ret = qtnf_event_handle_update_owe(vif, (const void *)event,
746 event_len);
747 break;
748 default:
749 pr_warn("unknown event type: %x\n", event_id);
750 break;
751 }
752
753 return ret;
754}
755
756static int qtnf_event_process_skb(struct qtnf_bus *bus,
757 const struct sk_buff *skb)
758{
759 const struct qlink_event *event;
760 struct qtnf_wmac *mac;
761 int res;
762
763 if (unlikely(!skb || skb->len < sizeof(*event))) {
764 pr_err("invalid event buffer\n");
765 return -EINVAL;
766 }
767
768 event = (struct qlink_event *)skb->data;
769
770 mac = qtnf_core_get_mac(bus, event->macid);
771
772 pr_debug("new event id:%x len:%u mac:%u vif:%u\n",
773 le16_to_cpu(event->event_id), le16_to_cpu(event->mhdr.len),
774 event->macid, event->vifid);
775
776 if (unlikely(!mac))
777 return -ENXIO;
778
779 rtnl_lock();
780 res = qtnf_event_parse(mac, skb);
781 rtnl_unlock();
782
783 return res;
784}
785
786void qtnf_event_work_handler(struct work_struct *work)
787{
788 struct qtnf_bus *bus = container_of(work, struct qtnf_bus, event_work);
789 struct sk_buff_head *event_queue = &bus->trans.event_queue;
790 struct sk_buff *current_event_skb = skb_dequeue(event_queue);
791
792 while (current_event_skb) {
793 qtnf_event_process_skb(bus, current_event_skb);
794 dev_kfree_skb_any(current_event_skb);
795 current_event_skb = skb_dequeue(event_queue);
796 }
797}
1// SPDX-License-Identifier: GPL-2.0+
2/* Copyright (c) 2015-2016 Quantenna Communications. All rights reserved. */
3
4#include <linux/kernel.h>
5#include <linux/module.h>
6#include <linux/slab.h>
7#include <linux/nospec.h>
8
9#include "cfg80211.h"
10#include "core.h"
11#include "qlink.h"
12#include "bus.h"
13#include "trans.h"
14#include "util.h"
15#include "event.h"
16#include "qlink_util.h"
17
18static int
19qtnf_event_handle_sta_assoc(struct qtnf_wmac *mac, struct qtnf_vif *vif,
20 const struct qlink_event_sta_assoc *sta_assoc,
21 u16 len)
22{
23 const u8 *sta_addr;
24 u16 frame_control;
25 struct station_info *sinfo;
26 size_t payload_len;
27 u16 tlv_type;
28 u16 tlv_value_len;
29 const struct qlink_tlv_hdr *tlv;
30 int ret = 0;
31
32 if (unlikely(len < sizeof(*sta_assoc))) {
33 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
34 mac->macid, vif->vifid, len, sizeof(*sta_assoc));
35 return -EINVAL;
36 }
37
38 if (vif->wdev.iftype != NL80211_IFTYPE_AP) {
39 pr_err("VIF%u.%u: STA_ASSOC event when not in AP mode\n",
40 mac->macid, vif->vifid);
41 return -EPROTO;
42 }
43
44 sinfo = kzalloc(sizeof(*sinfo), GFP_KERNEL);
45 if (!sinfo)
46 return -ENOMEM;
47
48 sta_addr = sta_assoc->sta_addr;
49 frame_control = le16_to_cpu(sta_assoc->frame_control);
50
51 pr_debug("VIF%u.%u: MAC:%pM FC:%x\n", mac->macid, vif->vifid, sta_addr,
52 frame_control);
53
54 qtnf_sta_list_add(vif, sta_addr);
55
56 sinfo->assoc_req_ies = NULL;
57 sinfo->assoc_req_ies_len = 0;
58 sinfo->generation = vif->generation;
59
60 payload_len = len - sizeof(*sta_assoc);
61
62 qlink_for_each_tlv(tlv, sta_assoc->ies, payload_len) {
63 tlv_type = le16_to_cpu(tlv->type);
64 tlv_value_len = le16_to_cpu(tlv->len);
65
66 if (tlv_type == QTN_TLV_ID_IE_SET) {
67 const struct qlink_tlv_ie_set *ie_set;
68 unsigned int ie_len;
69
70 if (tlv_value_len <
71 (sizeof(*ie_set) - sizeof(ie_set->hdr))) {
72 ret = -EINVAL;
73 goto out;
74 }
75
76 ie_set = (const struct qlink_tlv_ie_set *)tlv;
77 ie_len = tlv_value_len -
78 (sizeof(*ie_set) - sizeof(ie_set->hdr));
79
80 if (ie_set->type == QLINK_IE_SET_ASSOC_REQ && ie_len) {
81 sinfo->assoc_req_ies = ie_set->ie_data;
82 sinfo->assoc_req_ies_len = ie_len;
83 }
84 }
85 }
86
87 if (!qlink_tlv_parsing_ok(tlv, sta_assoc->ies, payload_len)) {
88 pr_err("Malformed TLV buffer\n");
89 ret = -EINVAL;
90 goto out;
91 }
92
93 cfg80211_new_sta(vif->netdev, sta_assoc->sta_addr, sinfo,
94 GFP_KERNEL);
95
96out:
97 kfree(sinfo);
98 return ret;
99}
100
101static int
102qtnf_event_handle_sta_deauth(struct qtnf_wmac *mac, struct qtnf_vif *vif,
103 const struct qlink_event_sta_deauth *sta_deauth,
104 u16 len)
105{
106 const u8 *sta_addr;
107 u16 reason;
108
109 if (unlikely(len < sizeof(*sta_deauth))) {
110 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
111 mac->macid, vif->vifid, len,
112 sizeof(struct qlink_event_sta_deauth));
113 return -EINVAL;
114 }
115
116 if (vif->wdev.iftype != NL80211_IFTYPE_AP) {
117 pr_err("VIF%u.%u: STA_DEAUTH event when not in AP mode\n",
118 mac->macid, vif->vifid);
119 return -EPROTO;
120 }
121
122 sta_addr = sta_deauth->sta_addr;
123 reason = le16_to_cpu(sta_deauth->reason);
124
125 pr_debug("VIF%u.%u: MAC:%pM reason:%x\n", mac->macid, vif->vifid,
126 sta_addr, reason);
127
128 if (qtnf_sta_list_del(vif, sta_addr))
129 cfg80211_del_sta(vif->netdev, sta_deauth->sta_addr,
130 GFP_KERNEL);
131
132 return 0;
133}
134
135static int
136qtnf_event_handle_bss_join(struct qtnf_vif *vif,
137 const struct qlink_event_bss_join *join_info,
138 u16 len)
139{
140 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
141 enum ieee80211_statuscode status = le16_to_cpu(join_info->status);
142 struct cfg80211_chan_def chandef;
143 struct cfg80211_bss *bss = NULL;
144 u8 *ie = NULL;
145 size_t payload_len;
146 u16 tlv_type;
147 u16 tlv_value_len;
148 const struct qlink_tlv_hdr *tlv;
149 const u8 *rsp_ies = NULL;
150 size_t rsp_ies_len = 0;
151
152 if (unlikely(len < sizeof(*join_info))) {
153 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
154 vif->mac->macid, vif->vifid, len,
155 sizeof(struct qlink_event_bss_join));
156 return -EINVAL;
157 }
158
159 if (vif->wdev.iftype != NL80211_IFTYPE_STATION) {
160 pr_err("VIF%u.%u: BSS_JOIN event when not in STA mode\n",
161 vif->mac->macid, vif->vifid);
162 return -EPROTO;
163 }
164
165 pr_debug("VIF%u.%u: BSSID:%pM chan:%u status:%u\n",
166 vif->mac->macid, vif->vifid, join_info->bssid,
167 le16_to_cpu(join_info->chan.chan.center_freq), status);
168
169 if (status != WLAN_STATUS_SUCCESS)
170 goto done;
171
172 qlink_chandef_q2cfg(wiphy, &join_info->chan, &chandef);
173 if (!cfg80211_chandef_valid(&chandef)) {
174 pr_warn("MAC%u.%u: bad channel freq=%u cf1=%u cf2=%u bw=%u\n",
175 vif->mac->macid, vif->vifid,
176 chandef.chan ? chandef.chan->center_freq : 0,
177 chandef.center_freq1,
178 chandef.center_freq2,
179 chandef.width);
180 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
181 goto done;
182 }
183
184 bss = cfg80211_get_bss(wiphy, chandef.chan, join_info->bssid,
185 NULL, 0, IEEE80211_BSS_TYPE_ESS,
186 IEEE80211_PRIVACY_ANY);
187 if (!bss) {
188 pr_warn("VIF%u.%u: add missing BSS:%pM chan:%u\n",
189 vif->mac->macid, vif->vifid,
190 join_info->bssid, chandef.chan->hw_value);
191
192 if (!vif->wdev.ssid_len) {
193 pr_warn("VIF%u.%u: SSID unknown for BSS:%pM\n",
194 vif->mac->macid, vif->vifid,
195 join_info->bssid);
196 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
197 goto done;
198 }
199
200 ie = kzalloc(2 + vif->wdev.ssid_len, GFP_KERNEL);
201 if (!ie) {
202 pr_warn("VIF%u.%u: IE alloc failed for BSS:%pM\n",
203 vif->mac->macid, vif->vifid,
204 join_info->bssid);
205 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
206 goto done;
207 }
208
209 ie[0] = WLAN_EID_SSID;
210 ie[1] = vif->wdev.ssid_len;
211 memcpy(ie + 2, vif->wdev.ssid, vif->wdev.ssid_len);
212
213 bss = cfg80211_inform_bss(wiphy, chandef.chan,
214 CFG80211_BSS_FTYPE_UNKNOWN,
215 join_info->bssid, 0,
216 WLAN_CAPABILITY_ESS, 100,
217 ie, 2 + vif->wdev.ssid_len,
218 0, GFP_KERNEL);
219 if (!bss) {
220 pr_warn("VIF%u.%u: can't connect to unknown BSS: %pM\n",
221 vif->mac->macid, vif->vifid,
222 join_info->bssid);
223 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
224 goto done;
225 }
226 }
227
228 payload_len = len - sizeof(*join_info);
229
230 qlink_for_each_tlv(tlv, join_info->ies, payload_len) {
231 tlv_type = le16_to_cpu(tlv->type);
232 tlv_value_len = le16_to_cpu(tlv->len);
233
234 if (tlv_type == QTN_TLV_ID_IE_SET) {
235 const struct qlink_tlv_ie_set *ie_set;
236 unsigned int ie_len;
237
238 if (tlv_value_len <
239 (sizeof(*ie_set) - sizeof(ie_set->hdr))) {
240 pr_warn("invalid IE_SET TLV\n");
241 status = WLAN_STATUS_UNSPECIFIED_FAILURE;
242 goto done;
243 }
244
245 ie_set = (const struct qlink_tlv_ie_set *)tlv;
246 ie_len = tlv_value_len -
247 (sizeof(*ie_set) - sizeof(ie_set->hdr));
248
249 switch (ie_set->type) {
250 case QLINK_IE_SET_ASSOC_RESP:
251 if (ie_len) {
252 rsp_ies = ie_set->ie_data;
253 rsp_ies_len = ie_len;
254 }
255 break;
256 default:
257 pr_warn("unexpected IE type: %u\n",
258 ie_set->type);
259 break;
260 }
261 }
262 }
263
264 if (!qlink_tlv_parsing_ok(tlv, join_info->ies, payload_len))
265 pr_warn("Malformed TLV buffer\n");
266done:
267 cfg80211_connect_result(vif->netdev, join_info->bssid, NULL, 0, rsp_ies,
268 rsp_ies_len, status, GFP_KERNEL);
269 if (bss) {
270 if (!ether_addr_equal(vif->bssid, join_info->bssid))
271 ether_addr_copy(vif->bssid, join_info->bssid);
272 cfg80211_put_bss(wiphy, bss);
273 }
274
275 if (status == WLAN_STATUS_SUCCESS)
276 netif_carrier_on(vif->netdev);
277
278 kfree(ie);
279 return 0;
280}
281
282static int
283qtnf_event_handle_bss_leave(struct qtnf_vif *vif,
284 const struct qlink_event_bss_leave *leave_info,
285 u16 len)
286{
287 if (unlikely(len < sizeof(*leave_info))) {
288 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
289 vif->mac->macid, vif->vifid, len,
290 sizeof(struct qlink_event_bss_leave));
291 return -EINVAL;
292 }
293
294 if (vif->wdev.iftype != NL80211_IFTYPE_STATION) {
295 pr_err("VIF%u.%u: BSS_LEAVE event when not in STA mode\n",
296 vif->mac->macid, vif->vifid);
297 return -EPROTO;
298 }
299
300 pr_debug("VIF%u.%u: disconnected\n", vif->mac->macid, vif->vifid);
301
302 cfg80211_disconnected(vif->netdev, le16_to_cpu(leave_info->reason),
303 NULL, 0, 0, GFP_KERNEL);
304 netif_carrier_off(vif->netdev);
305
306 return 0;
307}
308
309static int
310qtnf_event_handle_mgmt_received(struct qtnf_vif *vif,
311 const struct qlink_event_rxmgmt *rxmgmt,
312 u16 len)
313{
314 const size_t min_len = sizeof(*rxmgmt) +
315 sizeof(struct ieee80211_hdr_3addr);
316 const struct ieee80211_hdr_3addr *frame = (void *)rxmgmt->frame_data;
317 const u16 frame_len = len - sizeof(*rxmgmt);
318 enum nl80211_rxmgmt_flags flags = 0;
319
320 if (unlikely(len < min_len)) {
321 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
322 vif->mac->macid, vif->vifid, len, min_len);
323 return -EINVAL;
324 }
325
326 if (le32_to_cpu(rxmgmt->flags) & QLINK_RXMGMT_FLAG_ANSWERED)
327 flags |= NL80211_RXMGMT_FLAG_ANSWERED;
328
329 pr_debug("%s LEN:%u FC:%.4X SA:%pM\n", vif->netdev->name, frame_len,
330 le16_to_cpu(frame->frame_control), frame->addr2);
331
332 cfg80211_rx_mgmt(&vif->wdev, le32_to_cpu(rxmgmt->freq), rxmgmt->sig_dbm,
333 rxmgmt->frame_data, frame_len, flags);
334
335 return 0;
336}
337
338static int
339qtnf_event_handle_scan_results(struct qtnf_vif *vif,
340 const struct qlink_event_scan_result *sr,
341 u16 len)
342{
343 struct cfg80211_bss *bss;
344 struct ieee80211_channel *channel;
345 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
346 enum cfg80211_bss_frame_type frame_type = CFG80211_BSS_FTYPE_UNKNOWN;
347 size_t payload_len;
348 u16 tlv_type;
349 u16 tlv_value_len;
350 const struct qlink_tlv_hdr *tlv;
351 const u8 *ies = NULL;
352 size_t ies_len = 0;
353
354 if (len < sizeof(*sr)) {
355 pr_err("VIF%u.%u: payload is too short\n", vif->mac->macid,
356 vif->vifid);
357 return -EINVAL;
358 }
359
360 channel = ieee80211_get_channel(wiphy, le16_to_cpu(sr->freq));
361 if (!channel) {
362 pr_err("VIF%u.%u: channel at %u MHz not found\n",
363 vif->mac->macid, vif->vifid, le16_to_cpu(sr->freq));
364 return -EINVAL;
365 }
366
367 payload_len = len - sizeof(*sr);
368
369 qlink_for_each_tlv(tlv, sr->payload, payload_len) {
370 tlv_type = le16_to_cpu(tlv->type);
371 tlv_value_len = le16_to_cpu(tlv->len);
372
373 if (tlv_type == QTN_TLV_ID_IE_SET) {
374 const struct qlink_tlv_ie_set *ie_set;
375 unsigned int ie_len;
376
377 if (tlv_value_len <
378 (sizeof(*ie_set) - sizeof(ie_set->hdr)))
379 return -EINVAL;
380
381 ie_set = (const struct qlink_tlv_ie_set *)tlv;
382 ie_len = tlv_value_len -
383 (sizeof(*ie_set) - sizeof(ie_set->hdr));
384
385 switch (ie_set->type) {
386 case QLINK_IE_SET_BEACON_IES:
387 frame_type = CFG80211_BSS_FTYPE_BEACON;
388 break;
389 case QLINK_IE_SET_PROBE_RESP_IES:
390 frame_type = CFG80211_BSS_FTYPE_PRESP;
391 break;
392 default:
393 frame_type = CFG80211_BSS_FTYPE_UNKNOWN;
394 }
395
396 if (ie_len) {
397 ies = ie_set->ie_data;
398 ies_len = ie_len;
399 }
400 }
401 }
402
403 if (!qlink_tlv_parsing_ok(tlv, sr->payload, payload_len))
404 return -EINVAL;
405
406 bss = cfg80211_inform_bss(wiphy, channel, frame_type,
407 sr->bssid, get_unaligned_le64(&sr->tsf),
408 le16_to_cpu(sr->capab),
409 le16_to_cpu(sr->bintval), ies, ies_len,
410 DBM_TO_MBM(sr->sig_dbm), GFP_KERNEL);
411 if (!bss)
412 return -ENOMEM;
413
414 cfg80211_put_bss(wiphy, bss);
415
416 return 0;
417}
418
419static int
420qtnf_event_handle_scan_complete(struct qtnf_wmac *mac,
421 const struct qlink_event_scan_complete *status,
422 u16 len)
423{
424 if (len < sizeof(*status)) {
425 pr_err("MAC%u: payload is too short\n", mac->macid);
426 return -EINVAL;
427 }
428
429 qtnf_scan_done(mac, le32_to_cpu(status->flags) & QLINK_SCAN_ABORTED);
430
431 return 0;
432}
433
434static int
435qtnf_event_handle_freq_change(struct qtnf_wmac *mac,
436 const struct qlink_event_freq_change *data,
437 u16 len)
438{
439 struct wiphy *wiphy = priv_to_wiphy(mac);
440 struct cfg80211_chan_def chandef;
441 struct qtnf_vif *vif;
442 int i;
443
444 if (len < sizeof(*data)) {
445 pr_err("MAC%u: payload is too short\n", mac->macid);
446 return -EINVAL;
447 }
448
449 if (!wiphy->registered)
450 return 0;
451
452 qlink_chandef_q2cfg(wiphy, &data->chan, &chandef);
453
454 if (!cfg80211_chandef_valid(&chandef)) {
455 pr_err("MAC%u: bad channel freq=%u cf1=%u cf2=%u bw=%u\n",
456 mac->macid, chandef.chan->center_freq,
457 chandef.center_freq1, chandef.center_freq2,
458 chandef.width);
459 return -EINVAL;
460 }
461
462 pr_debug("MAC%d: new channel ieee=%u freq1=%u freq2=%u bw=%u\n",
463 mac->macid, chandef.chan->hw_value, chandef.center_freq1,
464 chandef.center_freq2, chandef.width);
465
466 for (i = 0; i < QTNF_MAX_INTF; i++) {
467 vif = &mac->iflist[i];
468
469 if (vif->wdev.iftype == NL80211_IFTYPE_UNSPECIFIED)
470 continue;
471
472 if (vif->wdev.iftype == NL80211_IFTYPE_STATION &&
473 !vif->wdev.current_bss)
474 continue;
475
476 if (!vif->netdev)
477 continue;
478
479 mutex_lock(&vif->wdev.mtx);
480 cfg80211_ch_switch_notify(vif->netdev, &chandef);
481 mutex_unlock(&vif->wdev.mtx);
482 }
483
484 return 0;
485}
486
487static int qtnf_event_handle_radar(struct qtnf_vif *vif,
488 const struct qlink_event_radar *ev,
489 u16 len)
490{
491 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
492 struct cfg80211_chan_def chandef;
493
494 if (len < sizeof(*ev)) {
495 pr_err("MAC%u: payload is too short\n", vif->mac->macid);
496 return -EINVAL;
497 }
498
499 if (!wiphy->registered || !vif->netdev)
500 return 0;
501
502 qlink_chandef_q2cfg(wiphy, &ev->chan, &chandef);
503
504 if (!cfg80211_chandef_valid(&chandef)) {
505 pr_err("MAC%u: bad channel f1=%u f2=%u bw=%u\n",
506 vif->mac->macid,
507 chandef.center_freq1, chandef.center_freq2,
508 chandef.width);
509 return -EINVAL;
510 }
511
512 pr_info("%s: radar event=%u f1=%u f2=%u bw=%u\n",
513 vif->netdev->name, ev->event,
514 chandef.center_freq1, chandef.center_freq2,
515 chandef.width);
516
517 switch (ev->event) {
518 case QLINK_RADAR_DETECTED:
519 cfg80211_radar_event(wiphy, &chandef, GFP_KERNEL);
520 break;
521 case QLINK_RADAR_CAC_FINISHED:
522 if (!vif->wdev.cac_started)
523 break;
524
525 cfg80211_cac_event(vif->netdev, &chandef,
526 NL80211_RADAR_CAC_FINISHED, GFP_KERNEL);
527 break;
528 case QLINK_RADAR_CAC_ABORTED:
529 if (!vif->wdev.cac_started)
530 break;
531
532 cfg80211_cac_event(vif->netdev, &chandef,
533 NL80211_RADAR_CAC_ABORTED, GFP_KERNEL);
534 break;
535 case QLINK_RADAR_CAC_STARTED:
536 if (vif->wdev.cac_started)
537 break;
538
539 if (!wiphy_ext_feature_isset(wiphy,
540 NL80211_EXT_FEATURE_DFS_OFFLOAD))
541 break;
542
543 cfg80211_cac_event(vif->netdev, &chandef,
544 NL80211_RADAR_CAC_STARTED, GFP_KERNEL);
545 break;
546 default:
547 pr_warn("%s: unhandled radar event %u\n",
548 vif->netdev->name, ev->event);
549 break;
550 }
551
552 return 0;
553}
554
555static int
556qtnf_event_handle_external_auth(struct qtnf_vif *vif,
557 const struct qlink_event_external_auth *ev,
558 u16 len)
559{
560 struct cfg80211_external_auth_params auth = {0};
561 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
562 int ret;
563
564 if (len < sizeof(*ev)) {
565 pr_err("MAC%u: payload is too short\n", vif->mac->macid);
566 return -EINVAL;
567 }
568
569 if (!wiphy->registered || !vif->netdev)
570 return 0;
571
572 if (ev->ssid_len) {
573 memcpy(auth.ssid.ssid, ev->ssid, ev->ssid_len);
574 auth.ssid.ssid_len = ev->ssid_len;
575 }
576
577 auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite);
578 ether_addr_copy(auth.bssid, ev->bssid);
579 auth.action = ev->action;
580
581 pr_debug("%s: external SAE processing: bss=%pM action=%u akm=%u\n",
582 vif->netdev->name, auth.bssid, auth.action,
583 auth.key_mgmt_suite);
584
585 ret = cfg80211_external_auth_request(vif->netdev, &auth, GFP_KERNEL);
586 if (ret)
587 pr_warn("failed to offload external auth request\n");
588
589 return ret;
590}
591
592static int
593qtnf_event_handle_mic_failure(struct qtnf_vif *vif,
594 const struct qlink_event_mic_failure *mic_ev,
595 u16 len)
596{
597 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
598 u8 pairwise;
599
600 if (len < sizeof(*mic_ev)) {
601 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
602 vif->mac->macid, vif->vifid, len,
603 sizeof(struct qlink_event_mic_failure));
604 return -EINVAL;
605 }
606
607 if (!wiphy->registered || !vif->netdev)
608 return 0;
609
610 if (vif->wdev.iftype != NL80211_IFTYPE_STATION) {
611 pr_err("VIF%u.%u: MIC_FAILURE event when not in STA mode\n",
612 vif->mac->macid, vif->vifid);
613 return -EPROTO;
614 }
615
616 pairwise = mic_ev->pairwise ?
617 NL80211_KEYTYPE_PAIRWISE : NL80211_KEYTYPE_GROUP;
618
619 pr_info("%s: MIC error: src=%pM key_index=%u pairwise=%u\n",
620 vif->netdev->name, mic_ev->src, mic_ev->key_index, pairwise);
621
622 cfg80211_michael_mic_failure(vif->netdev, mic_ev->src, pairwise,
623 mic_ev->key_index, NULL, GFP_KERNEL);
624
625 return 0;
626}
627
628static int
629qtnf_event_handle_update_owe(struct qtnf_vif *vif,
630 const struct qlink_event_update_owe *owe_ev,
631 u16 len)
632{
633 struct wiphy *wiphy = priv_to_wiphy(vif->mac);
634 struct cfg80211_update_owe_info owe_info = {};
635 const u16 ie_len = len - sizeof(*owe_ev);
636 u8 *ie;
637
638 if (len < sizeof(*owe_ev)) {
639 pr_err("VIF%u.%u: payload is too short (%u < %zu)\n",
640 vif->mac->macid, vif->vifid, len,
641 sizeof(struct qlink_event_update_owe));
642 return -EINVAL;
643 }
644
645 if (!wiphy->registered || !vif->netdev)
646 return 0;
647
648 if (vif->wdev.iftype != NL80211_IFTYPE_AP) {
649 pr_err("VIF%u.%u: UPDATE_OWE event when not in AP mode\n",
650 vif->mac->macid, vif->vifid);
651 return -EPROTO;
652 }
653
654 ie = kzalloc(ie_len, GFP_KERNEL);
655 if (!ie)
656 return -ENOMEM;
657
658 memcpy(owe_info.peer, owe_ev->peer, ETH_ALEN);
659 memcpy(ie, owe_ev->ies, ie_len);
660 owe_info.ie_len = ie_len;
661 owe_info.ie = ie;
662
663 pr_info("%s: external OWE processing: peer=%pM\n",
664 vif->netdev->name, owe_ev->peer);
665
666 cfg80211_update_owe_info_event(vif->netdev, &owe_info, GFP_KERNEL);
667 kfree(ie);
668
669 return 0;
670}
671
672static int qtnf_event_parse(struct qtnf_wmac *mac,
673 const struct sk_buff *event_skb)
674{
675 const struct qlink_event *event;
676 struct qtnf_vif *vif = NULL;
677 int ret = -1;
678 u16 event_id;
679 u16 event_len;
680 u8 vifid;
681
682 event = (const struct qlink_event *)event_skb->data;
683 event_id = le16_to_cpu(event->event_id);
684 event_len = le16_to_cpu(event->mhdr.len);
685
686 if (event->vifid >= QTNF_MAX_INTF) {
687 pr_err("invalid vif(%u)\n", event->vifid);
688 return -EINVAL;
689 }
690
691 vifid = array_index_nospec(event->vifid, QTNF_MAX_INTF);
692 vif = &mac->iflist[vifid];
693
694 switch (event_id) {
695 case QLINK_EVENT_STA_ASSOCIATED:
696 ret = qtnf_event_handle_sta_assoc(mac, vif, (const void *)event,
697 event_len);
698 break;
699 case QLINK_EVENT_STA_DEAUTH:
700 ret = qtnf_event_handle_sta_deauth(mac, vif,
701 (const void *)event,
702 event_len);
703 break;
704 case QLINK_EVENT_MGMT_RECEIVED:
705 ret = qtnf_event_handle_mgmt_received(vif, (const void *)event,
706 event_len);
707 break;
708 case QLINK_EVENT_SCAN_RESULTS:
709 ret = qtnf_event_handle_scan_results(vif, (const void *)event,
710 event_len);
711 break;
712 case QLINK_EVENT_SCAN_COMPLETE:
713 ret = qtnf_event_handle_scan_complete(mac, (const void *)event,
714 event_len);
715 break;
716 case QLINK_EVENT_BSS_JOIN:
717 ret = qtnf_event_handle_bss_join(vif, (const void *)event,
718 event_len);
719 break;
720 case QLINK_EVENT_BSS_LEAVE:
721 ret = qtnf_event_handle_bss_leave(vif, (const void *)event,
722 event_len);
723 break;
724 case QLINK_EVENT_FREQ_CHANGE:
725 ret = qtnf_event_handle_freq_change(mac, (const void *)event,
726 event_len);
727 break;
728 case QLINK_EVENT_RADAR:
729 ret = qtnf_event_handle_radar(vif, (const void *)event,
730 event_len);
731 break;
732 case QLINK_EVENT_EXTERNAL_AUTH:
733 ret = qtnf_event_handle_external_auth(vif, (const void *)event,
734 event_len);
735 break;
736 case QLINK_EVENT_MIC_FAILURE:
737 ret = qtnf_event_handle_mic_failure(vif, (const void *)event,
738 event_len);
739 break;
740 case QLINK_EVENT_UPDATE_OWE:
741 ret = qtnf_event_handle_update_owe(vif, (const void *)event,
742 event_len);
743 break;
744 default:
745 pr_warn("unknown event type: %x\n", event_id);
746 break;
747 }
748
749 return ret;
750}
751
752static int qtnf_event_process_skb(struct qtnf_bus *bus,
753 const struct sk_buff *skb)
754{
755 const struct qlink_event *event;
756 struct qtnf_wmac *mac;
757 int res;
758
759 if (unlikely(!skb || skb->len < sizeof(*event))) {
760 pr_err("invalid event buffer\n");
761 return -EINVAL;
762 }
763
764 event = (struct qlink_event *)skb->data;
765
766 mac = qtnf_core_get_mac(bus, event->macid);
767
768 pr_debug("new event id:%x len:%u mac:%u vif:%u\n",
769 le16_to_cpu(event->event_id), le16_to_cpu(event->mhdr.len),
770 event->macid, event->vifid);
771
772 if (unlikely(!mac))
773 return -ENXIO;
774
775 rtnl_lock();
776 res = qtnf_event_parse(mac, skb);
777 rtnl_unlock();
778
779 return res;
780}
781
782void qtnf_event_work_handler(struct work_struct *work)
783{
784 struct qtnf_bus *bus = container_of(work, struct qtnf_bus, event_work);
785 struct sk_buff_head *event_queue = &bus->trans.event_queue;
786 struct sk_buff *current_event_skb = skb_dequeue(event_queue);
787
788 while (current_event_skb) {
789 qtnf_event_process_skb(bus, current_event_skb);
790 dev_kfree_skb_any(current_event_skb);
791 current_event_skb = skb_dequeue(event_queue);
792 }
793}