1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause 2 /* 3 * Copyright (C) 2015-2017 Intel Deutschland GmbH 4 * Copyright (C) 2018-2023 Intel Corporation 5 */ 6 #include <net/cfg80211.h> 7 #include <linux/etherdevice.h> 8 #include "mvm.h" 9 #include "constants.h" 10 11 struct iwl_mvm_pasn_sta { 12 struct list_head list; 13 struct iwl_mvm_int_sta int_sta; 14 u8 addr[ETH_ALEN]; 15 16 /* must be last as it followed by buffer holding the key */ 17 struct ieee80211_key_conf keyconf; 18 }; 19 20 struct iwl_mvm_pasn_hltk_data { 21 u8 *addr; 22 u8 cipher; 23 u8 *hltk; 24 }; 25 26 static int iwl_mvm_ftm_responder_set_bw_v1(struct cfg80211_chan_def *chandef, 27 u8 *bw, u8 *ctrl_ch_position) 28 { 29 switch (chandef->width) { 30 case NL80211_CHAN_WIDTH_20_NOHT: 31 *bw = IWL_TOF_BW_20_LEGACY; 32 break; 33 case NL80211_CHAN_WIDTH_20: 34 *bw = IWL_TOF_BW_20_HT; 35 break; 36 case NL80211_CHAN_WIDTH_40: 37 *bw = IWL_TOF_BW_40; 38 *ctrl_ch_position = iwl_mvm_get_ctrl_pos(chandef); 39 break; 40 case NL80211_CHAN_WIDTH_80: 41 *bw = IWL_TOF_BW_80; 42 *ctrl_ch_position = iwl_mvm_get_ctrl_pos(chandef); 43 break; 44 default: 45 return -EOPNOTSUPP; 46 } 47 48 return 0; 49 } 50 51 static int iwl_mvm_ftm_responder_set_bw_v2(struct cfg80211_chan_def *chandef, 52 u8 *format_bw, u8 *ctrl_ch_position, 53 u8 cmd_ver) 54 { 55 switch (chandef->width) { 56 case NL80211_CHAN_WIDTH_20_NOHT: 57 *format_bw = IWL_LOCATION_FRAME_FORMAT_LEGACY; 58 *format_bw |= IWL_LOCATION_BW_20MHZ << LOCATION_BW_POS; 59 break; 60 case NL80211_CHAN_WIDTH_20: 61 *format_bw = IWL_LOCATION_FRAME_FORMAT_HT; 62 *format_bw |= IWL_LOCATION_BW_20MHZ << LOCATION_BW_POS; 63 break; 64 case NL80211_CHAN_WIDTH_40: 65 *format_bw = IWL_LOCATION_FRAME_FORMAT_HT; 66 *format_bw |= IWL_LOCATION_BW_40MHZ << LOCATION_BW_POS; 67 *ctrl_ch_position = iwl_mvm_get_ctrl_pos(chandef); 68 break; 69 case NL80211_CHAN_WIDTH_80: 70 *format_bw = IWL_LOCATION_FRAME_FORMAT_VHT; 71 *format_bw |= IWL_LOCATION_BW_80MHZ << LOCATION_BW_POS; 72 *ctrl_ch_position = iwl_mvm_get_ctrl_pos(chandef); 73 break; 74 case NL80211_CHAN_WIDTH_160: 75 if (cmd_ver >= 9) { 76 *format_bw = IWL_LOCATION_FRAME_FORMAT_HE; 77 *format_bw |= IWL_LOCATION_BW_160MHZ << LOCATION_BW_POS; 78 *ctrl_ch_position = iwl_mvm_get_ctrl_pos(chandef); 79 break; 80 } 81 fallthrough; 82 default: 83 return -EOPNOTSUPP; 84 } 85 86 return 0; 87 } 88 89 static void 90 iwl_mvm_ftm_responder_set_ndp(struct iwl_mvm *mvm, 91 struct iwl_tof_responder_config_cmd_v9 *cmd) 92 { 93 /* Up to 2 R2I STS are allowed on the responder */ 94 u32 r2i_max_sts = IWL_MVM_FTM_R2I_MAX_STS < 2 ? 95 IWL_MVM_FTM_R2I_MAX_STS : 1; 96 97 cmd->r2i_ndp_params = IWL_MVM_FTM_R2I_MAX_REP | 98 (r2i_max_sts << IWL_RESPONDER_STS_POS) | 99 (IWL_MVM_FTM_R2I_MAX_TOTAL_LTF << IWL_RESPONDER_TOTAL_LTF_POS); 100 cmd->i2r_ndp_params = IWL_MVM_FTM_I2R_MAX_REP | 101 (IWL_MVM_FTM_I2R_MAX_STS << IWL_RESPONDER_STS_POS) | 102 (IWL_MVM_FTM_I2R_MAX_TOTAL_LTF << IWL_RESPONDER_TOTAL_LTF_POS); 103 cmd->cmd_valid_fields |= 104 cpu_to_le32(IWL_TOF_RESPONDER_CMD_VALID_NDP_PARAMS); 105 } 106 107 static int 108 iwl_mvm_ftm_responder_cmd(struct iwl_mvm *mvm, 109 struct ieee80211_vif *vif, 110 struct cfg80211_chan_def *chandef, 111 struct ieee80211_bss_conf *link_conf) 112 { 113 u32 cmd_id = WIDE_ID(LOCATION_GROUP, TOF_RESPONDER_CONFIG_CMD); 114 struct iwl_mvm_vif *mvmvif = iwl_mvm_vif_from_mac80211(vif); 115 /* 116 * The command structure is the same for versions 6, 7 and 8 (only the 117 * field interpretation is different), so the same struct can be use 118 * for all cases. 119 */ 120 struct iwl_tof_responder_config_cmd_v9 cmd = { 121 .channel_num = chandef->chan->hw_value, 122 .cmd_valid_fields = 123 cpu_to_le32(IWL_TOF_RESPONDER_CMD_VALID_CHAN_INFO | 124 IWL_TOF_RESPONDER_CMD_VALID_BSSID | 125 IWL_TOF_RESPONDER_CMD_VALID_STA_ID), 126 .sta_id = mvmvif->link[link_conf->link_id]->bcast_sta.sta_id, 127 }; 128 u8 cmd_ver = iwl_fw_lookup_cmd_ver(mvm->fw, cmd_id, 6); 129 int err; 130 int cmd_size; 131 132 lockdep_assert_held(&mvm->mutex); 133 134 /* Use a default of bss_color=1 for now */ 135 if (cmd_ver == 9) { 136 cmd.cmd_valid_fields |= 137 cpu_to_le32(IWL_TOF_RESPONDER_CMD_VALID_BSS_COLOR | 138 IWL_TOF_RESPONDER_CMD_VALID_MIN_MAX_TIME_BETWEEN_MSR); 139 cmd.bss_color = 1; 140 cmd.min_time_between_msr = 141 cpu_to_le16(IWL_MVM_FTM_NON_TB_MIN_TIME_BETWEEN_MSR); 142 cmd.max_time_between_msr = 143 cpu_to_le16(IWL_MVM_FTM_NON_TB_MAX_TIME_BETWEEN_MSR); 144 cmd_size = sizeof(struct iwl_tof_responder_config_cmd_v9); 145 } else { 146 /* All versions up to version 8 have the same size */ 147 cmd_size = sizeof(struct iwl_tof_responder_config_cmd_v8); 148 } 149 150 if (cmd_ver >= 8) 151 iwl_mvm_ftm_responder_set_ndp(mvm, &cmd); 152 153 if (cmd_ver >= 7) 154 err = iwl_mvm_ftm_responder_set_bw_v2(chandef, &cmd.format_bw, 155 &cmd.ctrl_ch_position, 156 cmd_ver); 157 else 158 err = iwl_mvm_ftm_responder_set_bw_v1(chandef, &cmd.format_bw, 159 &cmd.ctrl_ch_position); 160 161 if (err) { 162 IWL_ERR(mvm, "Failed to set responder bandwidth\n"); 163 return err; 164 } 165 166 memcpy(cmd.bssid, vif->addr, ETH_ALEN); 167 168 return iwl_mvm_send_cmd_pdu(mvm, cmd_id, 0, cmd_size, &cmd); 169 } 170 171 static int 172 iwl_mvm_ftm_responder_dyn_cfg_v2(struct iwl_mvm *mvm, 173 struct ieee80211_vif *vif, 174 struct ieee80211_ftm_responder_params *params) 175 { 176 struct iwl_tof_responder_dyn_config_cmd_v2 cmd = { 177 .lci_len = cpu_to_le32(params->lci_len + 2), 178 .civic_len = cpu_to_le32(params->civicloc_len + 2), 179 }; 180 u8 data[IWL_LCI_CIVIC_IE_MAX_SIZE] = {0}; 181 struct iwl_host_cmd hcmd = { 182 .id = WIDE_ID(LOCATION_GROUP, TOF_RESPONDER_DYN_CONFIG_CMD), 183 .data[0] = &cmd, 184 .len[0] = sizeof(cmd), 185 .data[1] = &data, 186 /* .len[1] set later */ 187 /* may not be able to DMA from stack */ 188 .dataflags[1] = IWL_HCMD_DFL_DUP, 189 }; 190 u32 aligned_lci_len = ALIGN(params->lci_len + 2, 4); 191 u32 aligned_civicloc_len = ALIGN(params->civicloc_len + 2, 4); 192 u8 *pos = data; 193 194 lockdep_assert_held(&mvm->mutex); 195 196 if (aligned_lci_len + aligned_civicloc_len > sizeof(data)) { 197 IWL_ERR(mvm, "LCI/civicloc data too big (%zd + %zd)\n", 198 params->lci_len, params->civicloc_len); 199 return -ENOBUFS; 200 } 201 202 pos[0] = WLAN_EID_MEASURE_REPORT; 203 pos[1] = params->lci_len; 204 memcpy(pos + 2, params->lci, params->lci_len); 205 206 pos += aligned_lci_len; 207 pos[0] = WLAN_EID_MEASURE_REPORT; 208 pos[1] = params->civicloc_len; 209 memcpy(pos + 2, params->civicloc, params->civicloc_len); 210 211 hcmd.len[1] = aligned_lci_len + aligned_civicloc_len; 212 213 return iwl_mvm_send_cmd(mvm, &hcmd); 214 } 215 216 static int 217 iwl_mvm_ftm_responder_dyn_cfg_v3(struct iwl_mvm *mvm, 218 struct ieee80211_vif *vif, 219 struct ieee80211_ftm_responder_params *params, 220 struct iwl_mvm_pasn_hltk_data *hltk_data) 221 { 222 struct iwl_tof_responder_dyn_config_cmd cmd; 223 struct iwl_host_cmd hcmd = { 224 .id = WIDE_ID(LOCATION_GROUP, TOF_RESPONDER_DYN_CONFIG_CMD), 225 .data[0] = &cmd, 226 .len[0] = sizeof(cmd), 227 /* may not be able to DMA from stack */ 228 .dataflags[0] = IWL_HCMD_DFL_DUP, 229 }; 230 231 lockdep_assert_held(&mvm->mutex); 232 233 cmd.valid_flags = 0; 234 235 if (params) { 236 if (params->lci_len + 2 > sizeof(cmd.lci_buf) || 237 params->civicloc_len + 2 > sizeof(cmd.civic_buf)) { 238 IWL_ERR(mvm, 239 "LCI/civic data too big (lci=%zd, civic=%zd)\n", 240 params->lci_len, params->civicloc_len); 241 return -ENOBUFS; 242 } 243 244 cmd.lci_buf[0] = WLAN_EID_MEASURE_REPORT; 245 cmd.lci_buf[1] = params->lci_len; 246 memcpy(cmd.lci_buf + 2, params->lci, params->lci_len); 247 cmd.lci_len = params->lci_len + 2; 248 249 cmd.civic_buf[0] = WLAN_EID_MEASURE_REPORT; 250 cmd.civic_buf[1] = params->civicloc_len; 251 memcpy(cmd.civic_buf + 2, params->civicloc, 252 params->civicloc_len); 253 cmd.civic_len = params->civicloc_len + 2; 254 255 cmd.valid_flags |= IWL_RESPONDER_DYN_CFG_VALID_LCI | 256 IWL_RESPONDER_DYN_CFG_VALID_CIVIC; 257 } 258 259 if (hltk_data) { 260 if (hltk_data->cipher > IWL_LOCATION_CIPHER_GCMP_256) { 261 IWL_ERR(mvm, "invalid cipher: %u\n", 262 hltk_data->cipher); 263 return -EINVAL; 264 } 265 266 cmd.cipher = hltk_data->cipher; 267 memcpy(cmd.addr, hltk_data->addr, sizeof(cmd.addr)); 268 memcpy(cmd.hltk_buf, hltk_data->hltk, sizeof(cmd.hltk_buf)); 269 cmd.valid_flags |= IWL_RESPONDER_DYN_CFG_VALID_PASN_STA; 270 } 271 272 return iwl_mvm_send_cmd(mvm, &hcmd); 273 } 274 275 static int 276 iwl_mvm_ftm_responder_dyn_cfg_cmd(struct iwl_mvm *mvm, 277 struct ieee80211_vif *vif, 278 struct ieee80211_ftm_responder_params *params) 279 { 280 int ret; 281 u8 cmd_ver = iwl_fw_lookup_cmd_ver(mvm->fw, 282 WIDE_ID(LOCATION_GROUP, TOF_RESPONDER_DYN_CONFIG_CMD), 283 2); 284 285 switch (cmd_ver) { 286 case 2: 287 ret = iwl_mvm_ftm_responder_dyn_cfg_v2(mvm, vif, 288 params); 289 break; 290 case 3: 291 ret = iwl_mvm_ftm_responder_dyn_cfg_v3(mvm, vif, 292 params, NULL); 293 break; 294 default: 295 IWL_ERR(mvm, "Unsupported DYN_CONFIG_CMD version %u\n", 296 cmd_ver); 297 ret = -EOPNOTSUPP; 298 } 299 300 return ret; 301 } 302 303 static void iwl_mvm_resp_del_pasn_sta(struct iwl_mvm *mvm, 304 struct ieee80211_vif *vif, 305 struct iwl_mvm_pasn_sta *sta) 306 { 307 list_del(&sta->list); 308 309 if (sta->keyconf.keylen) 310 iwl_mvm_sec_key_del_pasn(mvm, vif, BIT(sta->int_sta.sta_id), 311 &sta->keyconf); 312 313 if (iwl_mvm_has_mld_api(mvm->fw)) 314 iwl_mvm_mld_rm_sta_id(mvm, sta->int_sta.sta_id); 315 else 316 iwl_mvm_rm_sta_id(mvm, vif, sta->int_sta.sta_id); 317 318 iwl_mvm_dealloc_int_sta(mvm, &sta->int_sta); 319 kfree(sta); 320 } 321 322 int iwl_mvm_ftm_respoder_add_pasn_sta(struct iwl_mvm *mvm, 323 struct ieee80211_vif *vif, 324 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, 325 u8 *hltk, u32 hltk_len) 326 { 327 int ret; 328 struct iwl_mvm_pasn_sta *sta = NULL; 329 struct iwl_mvm_pasn_hltk_data hltk_data = { 330 .addr = addr, 331 .hltk = hltk, 332 }; 333 struct iwl_mvm_pasn_hltk_data *hltk_data_ptr = NULL; 334 335 u8 cmd_ver = iwl_fw_lookup_cmd_ver(mvm->fw, 336 WIDE_ID(LOCATION_GROUP, TOF_RESPONDER_DYN_CONFIG_CMD), 337 2); 338 339 lockdep_assert_held(&mvm->mutex); 340 341 if (cmd_ver < 3) { 342 IWL_ERR(mvm, "Adding PASN station not supported by FW\n"); 343 return -EOPNOTSUPP; 344 } 345 346 if ((!hltk || !hltk_len) && (!tk || !tk_len)) { 347 IWL_ERR(mvm, "TK and HLTK not set\n"); 348 return -EINVAL; 349 } 350 351 if (hltk && hltk_len) { 352 if (!fw_has_capa(&mvm->fw->ucode_capa, 353 IWL_UCODE_TLV_CAPA_SECURE_LTF_SUPPORT)) { 354 IWL_ERR(mvm, "No support for secure LTF measurement\n"); 355 return -EINVAL; 356 } 357 358 hltk_data.cipher = iwl_mvm_cipher_to_location_cipher(cipher); 359 if (hltk_data.cipher == IWL_LOCATION_CIPHER_INVALID) { 360 IWL_ERR(mvm, "invalid cipher: %u\n", cipher); 361 return -EINVAL; 362 } 363 364 hltk_data_ptr = &hltk_data; 365 } 366 367 if (tk && tk_len) { 368 sta = kzalloc(sizeof(*sta) + tk_len, GFP_KERNEL); 369 if (!sta) 370 return -ENOBUFS; 371 372 ret = iwl_mvm_add_pasn_sta(mvm, vif, &sta->int_sta, addr, 373 cipher, tk, tk_len, &sta->keyconf); 374 if (ret) { 375 kfree(sta); 376 return ret; 377 } 378 379 memcpy(sta->addr, addr, ETH_ALEN); 380 list_add_tail(&sta->list, &mvm->resp_pasn_list); 381 } 382 383 ret = iwl_mvm_ftm_responder_dyn_cfg_v3(mvm, vif, NULL, hltk_data_ptr); 384 if (ret && sta) 385 iwl_mvm_resp_del_pasn_sta(mvm, vif, sta); 386 387 return ret; 388 } 389 390 int iwl_mvm_ftm_resp_remove_pasn_sta(struct iwl_mvm *mvm, 391 struct ieee80211_vif *vif, u8 *addr) 392 { 393 struct iwl_mvm_pasn_sta *sta, *prev; 394 395 lockdep_assert_held(&mvm->mutex); 396 397 list_for_each_entry_safe(sta, prev, &mvm->resp_pasn_list, list) { 398 if (!memcmp(sta->addr, addr, ETH_ALEN)) { 399 iwl_mvm_resp_del_pasn_sta(mvm, vif, sta); 400 return 0; 401 } 402 } 403 404 IWL_ERR(mvm, "FTM: PASN station %pM not found\n", addr); 405 return -EINVAL; 406 } 407 408 int iwl_mvm_ftm_start_responder(struct iwl_mvm *mvm, struct ieee80211_vif *vif, 409 struct ieee80211_bss_conf *bss_conf) 410 { 411 struct iwl_mvm_vif *mvmvif = iwl_mvm_vif_from_mac80211(vif); 412 struct ieee80211_ftm_responder_params *params; 413 struct ieee80211_chanctx_conf ctx, *pctx; 414 u16 *phy_ctxt_id; 415 struct iwl_mvm_phy_ctxt *phy_ctxt; 416 int ret; 417 418 params = bss_conf->ftmr_params; 419 420 lockdep_assert_held(&mvm->mutex); 421 422 if (WARN_ON_ONCE(!bss_conf->ftm_responder)) 423 return -EINVAL; 424 425 if (vif->p2p || vif->type != NL80211_IFTYPE_AP || 426 !mvmvif->ap_ibss_active) { 427 IWL_ERR(mvm, "Cannot start responder, not in AP mode\n"); 428 return -EIO; 429 } 430 431 rcu_read_lock(); 432 pctx = rcu_dereference(bss_conf->chanctx_conf); 433 /* Copy the ctx to unlock the rcu and send the phy ctxt. We don't care 434 * about changes in the ctx after releasing the lock because the driver 435 * is still protected by the mutex. */ 436 ctx = *pctx; 437 phy_ctxt_id = (u16 *)pctx->drv_priv; 438 rcu_read_unlock(); 439 440 phy_ctxt = &mvm->phy_ctxts[*phy_ctxt_id]; 441 ret = iwl_mvm_phy_ctxt_changed(mvm, phy_ctxt, &ctx.def, &ctx.ap, 442 ctx.rx_chains_static, 443 ctx.rx_chains_dynamic); 444 if (ret) 445 return ret; 446 447 ret = iwl_mvm_ftm_responder_cmd(mvm, vif, &ctx.def, bss_conf); 448 if (ret) 449 return ret; 450 451 if (params) 452 ret = iwl_mvm_ftm_responder_dyn_cfg_cmd(mvm, vif, params); 453 454 return ret; 455 } 456 457 void iwl_mvm_ftm_responder_clear(struct iwl_mvm *mvm, 458 struct ieee80211_vif *vif) 459 { 460 struct iwl_mvm_pasn_sta *sta, *prev; 461 462 lockdep_assert_held(&mvm->mutex); 463 464 list_for_each_entry_safe(sta, prev, &mvm->resp_pasn_list, list) 465 iwl_mvm_resp_del_pasn_sta(mvm, vif, sta); 466 } 467 468 void iwl_mvm_ftm_restart_responder(struct iwl_mvm *mvm, 469 struct ieee80211_vif *vif, 470 struct ieee80211_bss_conf *bss_conf) 471 { 472 if (!bss_conf->ftm_responder) 473 return; 474 475 iwl_mvm_ftm_responder_clear(mvm, vif); 476 iwl_mvm_ftm_start_responder(mvm, vif, bss_conf); 477 } 478 479 void iwl_mvm_ftm_responder_stats(struct iwl_mvm *mvm, 480 struct iwl_rx_cmd_buffer *rxb) 481 { 482 struct iwl_rx_packet *pkt = rxb_addr(rxb); 483 struct iwl_ftm_responder_stats *resp = (void *)pkt->data; 484 struct cfg80211_ftm_responder_stats *stats = &mvm->ftm_resp_stats; 485 u32 flags = le32_to_cpu(resp->flags); 486 487 if (resp->success_ftm == resp->ftm_per_burst) 488 stats->success_num++; 489 else if (resp->success_ftm >= 2) 490 stats->partial_num++; 491 else 492 stats->failed_num++; 493 494 if ((flags & FTM_RESP_STAT_ASAP_REQ) && 495 (flags & FTM_RESP_STAT_ASAP_RESP)) 496 stats->asap_num++; 497 498 if (flags & FTM_RESP_STAT_NON_ASAP_RESP) 499 stats->non_asap_num++; 500 501 stats->total_duration_ms += le32_to_cpu(resp->duration) / USEC_PER_MSEC; 502 503 if (flags & FTM_RESP_STAT_TRIGGER_UNKNOWN) 504 stats->unknown_triggers_num++; 505 506 if (flags & FTM_RESP_STAT_DUP) 507 stats->reschedule_requests_num++; 508 509 if (flags & FTM_RESP_STAT_NON_ASAP_OUT_WIN) 510 stats->out_of_window_triggers_num++; 511 } 512