blob: af6eaa5507593ab3d526e755ff1ba1bab3fa9b32 [file] [log] [blame]
developer1a173672023-12-21 14:49:33 +08001From adc0d43ecd5ad2f8932c7a25c6b0e1dea336aef8 Mon Sep 17 00:00:00 2001
developer092b55c2023-01-18 18:20:58 +08002From: TomLiu <tomml.liu@mediatek.com>
3Date: Tue, 9 Aug 2022 10:23:44 -0700
developer1a173672023-12-21 14:49:33 +08004Subject: [PATCH] hostapd: mtk: Add hostapd MU SET/GET control
developer092b55c2023-01-18 18:20:58 +08005
6---
7 hostapd/config_file.c | 9 +++
developer1a173672023-12-21 14:49:33 +08008 hostapd/ctrl_iface.c | 66 ++++++++++++++++++
developer092b55c2023-01-18 18:20:58 +08009 hostapd/hostapd_cli.c | 18 +++++
10 src/ap/ap_config.c | 1 +
11 src/ap/ap_config.h | 1 +
12 src/ap/ap_drv_ops.c | 14 ++++
13 src/ap/ap_drv_ops.h | 2 +
14 src/ap/hostapd.c | 2 +
15 src/common/mtk_vendor.h | 15 ++++
16 src/drivers/driver.h | 13 ++++
17 src/drivers/driver_nl80211.c | 110 ++++++++++++++++++++++++++++++
18 src/drivers/driver_nl80211.h | 1 +
19 src/drivers/driver_nl80211_capa.c | 3 +
developer1a173672023-12-21 14:49:33 +080020 13 files changed, 255 insertions(+)
developer092b55c2023-01-18 18:20:58 +080021
22diff --git a/hostapd/config_file.c b/hostapd/config_file.c
developerf552fec2023-03-27 11:22:06 +080023index b5024cc..62e8b33 100644
developer092b55c2023-01-18 18:20:58 +080024--- a/hostapd/config_file.c
25+++ b/hostapd/config_file.c
developerd8126d12023-02-17 11:50:45 +080026@@ -3661,6 +3661,15 @@ static int hostapd_config_fill(struct hostapd_config *conf,
developer092b55c2023-01-18 18:20:58 +080027 return 1;
28 }
29 bss->unsol_bcast_probe_resp_interval = val;
developer2c78ce72023-02-24 11:26:12 +080030+ } else if (os_strcmp(buf, "mu_onoff") == 0) {
developer092b55c2023-01-18 18:20:58 +080031+ int val = atoi(pos);
32+ if (val < 0 || val > 15) {
33+ wpa_printf(MSG_ERROR,
developer2c78ce72023-02-24 11:26:12 +080034+ "Line %d: invalid mu_onoff value",
developer092b55c2023-01-18 18:20:58 +080035+ line);
36+ return 1;
37+ }
developer2c78ce72023-02-24 11:26:12 +080038+ conf->mu_onoff = val;
developer092b55c2023-01-18 18:20:58 +080039 #endif /* CONFIG_IEEE80211AX */
40 } else if (os_strcmp(buf, "max_listen_interval") == 0) {
41 bss->max_listen_interval = atoi(pos);
42diff --git a/hostapd/ctrl_iface.c b/hostapd/ctrl_iface.c
developer1a173672023-12-21 14:49:33 +080043index 9c70d54..894c47a 100644
developer092b55c2023-01-18 18:20:58 +080044--- a/hostapd/ctrl_iface.c
45+++ b/hostapd/ctrl_iface.c
developer1a173672023-12-21 14:49:33 +080046@@ -3441,6 +3441,67 @@ hostapd_ctrl_iface_get_edcca(struct hostapd_data *hapd, char *cmd, char *buf,
developer092b55c2023-01-18 18:20:58 +080047 }
48
49
50+static int
developer2c78ce72023-02-24 11:26:12 +080051+hostapd_ctrl_iface_set_mu(struct hostapd_data *hapd, char *cmd,
developer092b55c2023-01-18 18:20:58 +080052+ char *buf, size_t buflen)
53+{
54+ char *pos, *config, *value;
55+ config = cmd;
56+ pos = os_strchr(config, ' ');
57+ if (pos == NULL)
58+ return -1;
59+ *pos++ = '\0';
60+
61+ if(pos == NULL)
62+ return -1;
63+ value = pos;
64+
65+ if (os_strcmp(config, "onoff") == 0) {
developer2c78ce72023-02-24 11:26:12 +080066+ int mu = atoi(value);
67+ if (mu < 0 || mu > 15) {
68+ wpa_printf(MSG_ERROR, "Invalid value for mu");
developer092b55c2023-01-18 18:20:58 +080069+ return -1;
70+ }
developer2c78ce72023-02-24 11:26:12 +080071+ hapd->iconf->mu_onoff = (u8) mu;
developer092b55c2023-01-18 18:20:58 +080072+ } else {
73+ wpa_printf(MSG_ERROR,
developer2c78ce72023-02-24 11:26:12 +080074+ "Unsupported parameter %s for SET_MU", config);
developer092b55c2023-01-18 18:20:58 +080075+ return -1;
76+ }
77+
developer2c78ce72023-02-24 11:26:12 +080078+ if(hostapd_drv_mu_ctrl(hapd) == 0) {
developer092b55c2023-01-18 18:20:58 +080079+ return os_snprintf(buf, buflen, "OK\n");
80+ } else {
81+ return -1;
82+ }
83+}
84+
85+
86+static int
developer2c78ce72023-02-24 11:26:12 +080087+hostapd_ctrl_iface_get_mu(struct hostapd_data *hapd, char *buf,
developer092b55c2023-01-18 18:20:58 +080088+ size_t buflen)
89+{
developer2c78ce72023-02-24 11:26:12 +080090+ u8 mu_onoff;
developer092b55c2023-01-18 18:20:58 +080091+ char *pos, *end;
92+
93+ pos = buf;
94+ end = buf + buflen;
95+
developer1a173672023-12-21 14:49:33 +080096+ if (hapd->iface->state != HAPD_IFACE_ENABLED)
97+ return os_snprintf(pos, end - pos, "Not allowed to get_mu when current state is %s\n",
98+ hostapd_state_text(hapd->iface->state));
99+
developer2c78ce72023-02-24 11:26:12 +0800100+ if (hostapd_drv_mu_dump(hapd, &mu_onoff) == 0) {
101+ hapd->iconf->mu_onoff = mu_onoff;
developer092b55c2023-01-18 18:20:58 +0800102+ return os_snprintf(pos, end - pos, "[hostapd_cli] = UL MU-MIMO: %d, DL MU-MIMO: %d, UL OFDMA: %d, DL OFDMA: %d\n",
developer2c78ce72023-02-24 11:26:12 +0800103+ !!(mu_onoff&BIT(3)), !!(mu_onoff&BIT(2)), !!(mu_onoff&BIT(1)), !!(mu_onoff&BIT(0)));
developer092b55c2023-01-18 18:20:58 +0800104+ } else {
105+ wpa_printf(MSG_INFO, "ctrl iface failed to call");
106+ return -1;
107+ }
108+}
109+
110+
111 static int hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd,
112 char *buf, char *reply,
113 int reply_size,
developer1a173672023-12-21 14:49:33 +0800114@@ -3993,6 +4054,11 @@ static int hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd,
developer092b55c2023-01-18 18:20:58 +0800115 } else if (os_strncmp(buf, "GET_EDCCA ", 10) == 0) {
116 reply_len = hostapd_ctrl_iface_get_edcca(hapd, buf+10, reply,
117 reply_size);
developer2c78ce72023-02-24 11:26:12 +0800118+ } else if (os_strncmp(buf, "SET_MU ", 7) == 0) {
119+ reply_len = hostapd_ctrl_iface_set_mu(hapd, buf + 7, reply,
developer092b55c2023-01-18 18:20:58 +0800120+ reply_size);
developer2c78ce72023-02-24 11:26:12 +0800121+ } else if (os_strncmp(buf, "GET_MU", 6) == 0) {
122+ reply_len = hostapd_ctrl_iface_get_mu(hapd, reply, reply_size);
developer092b55c2023-01-18 18:20:58 +0800123 } else {
124 os_memcpy(reply, "UNKNOWN COMMAND\n", 16);
125 reply_len = 16;
126diff --git a/hostapd/hostapd_cli.c b/hostapd/hostapd_cli.c
developerf552fec2023-03-27 11:22:06 +0800127index db21258..e16a1dc 100644
developer092b55c2023-01-18 18:20:58 +0800128--- a/hostapd/hostapd_cli.c
129+++ b/hostapd/hostapd_cli.c
130@@ -1380,6 +1380,20 @@ static int hostapd_cli_cmd_driver_flags(struct wpa_ctrl *ctrl, int argc,
131 }
132
133
developer2c78ce72023-02-24 11:26:12 +0800134+static int hostapd_cli_cmd_set_mu(struct wpa_ctrl *ctrl, int argc,
developer092b55c2023-01-18 18:20:58 +0800135+ char *argv[])
136+{
developer2c78ce72023-02-24 11:26:12 +0800137+ return hostapd_cli_cmd(ctrl, "SET_MU", 1, argc, argv);
developer092b55c2023-01-18 18:20:58 +0800138+}
139+
140+
developer2c78ce72023-02-24 11:26:12 +0800141+static int hostapd_cli_cmd_get_mu(struct wpa_ctrl *ctrl, int argc,
developer092b55c2023-01-18 18:20:58 +0800142+ char *argv[])
143+{
developer2c78ce72023-02-24 11:26:12 +0800144+ return hostapd_cli_cmd(ctrl, "GET_MU", 0, NULL, NULL);
developer092b55c2023-01-18 18:20:58 +0800145+}
146+
147+
148 #ifdef CONFIG_DPP
149
150 static int hostapd_cli_cmd_dpp_qr_code(struct wpa_ctrl *ctrl, int argc,
151@@ -1705,6 +1719,10 @@ static const struct hostapd_cli_cmd hostapd_cli_commands[] = {
152 " = send FTM range request"},
153 { "driver_flags", hostapd_cli_cmd_driver_flags, NULL,
154 " = show supported driver flags"},
developer2c78ce72023-02-24 11:26:12 +0800155+ { "set_mu", hostapd_cli_cmd_set_mu, NULL,
developer092b55c2023-01-18 18:20:58 +0800156+ "<value> [0-15] bitmap- UL MU-MIMO(bit3), DL MU-MIMO(bit2), UL OFDMA(bit1), DL OFDMA(bit0)"},
developer2c78ce72023-02-24 11:26:12 +0800157+ { "get_mu", hostapd_cli_cmd_get_mu, NULL,
158+ " = show mu onoff value in 0-15 bitmap"},
developer092b55c2023-01-18 18:20:58 +0800159 #ifdef CONFIG_DPP
160 { "dpp_qr_code", hostapd_cli_cmd_dpp_qr_code, NULL,
161 "report a scanned DPP URI from a QR Code" },
162diff --git a/src/ap/ap_config.c b/src/ap/ap_config.c
developer1a173672023-12-21 14:49:33 +0800163index 344585a..9e5a2ec 100644
developer092b55c2023-01-18 18:20:58 +0800164--- a/src/ap/ap_config.c
165+++ b/src/ap/ap_config.c
166@@ -280,6 +280,7 @@ struct hostapd_config * hostapd_config_defaults(void)
167 conf->he_6ghz_max_ampdu_len_exp = 7;
168 conf->he_6ghz_rx_ant_pat = 1;
169 conf->he_6ghz_tx_ant_pat = 1;
developerf0fd7052023-08-14 20:23:42 +0800170+ conf->mu_onoff = 0xf;
developer092b55c2023-01-18 18:20:58 +0800171 #endif /* CONFIG_IEEE80211AX */
172
173 /* The third octet of the country string uses an ASCII space character
174diff --git a/src/ap/ap_config.h b/src/ap/ap_config.h
developerf552fec2023-03-27 11:22:06 +0800175index 4ac4699..37779b7 100644
developer092b55c2023-01-18 18:20:58 +0800176--- a/src/ap/ap_config.h
177+++ b/src/ap/ap_config.h
developerd8126d12023-02-17 11:50:45 +0800178@@ -1115,6 +1115,7 @@ struct hostapd_config {
developer092b55c2023-01-18 18:20:58 +0800179 u8 he_6ghz_rx_ant_pat;
180 u8 he_6ghz_tx_ant_pat;
181 u8 he_6ghz_reg_pwr_type;
developer2c78ce72023-02-24 11:26:12 +0800182+ u8 mu_onoff;
developer092b55c2023-01-18 18:20:58 +0800183 #endif /* CONFIG_IEEE80211AX */
184
185 /* VHT enable/disable config from CHAN_SWITCH */
186diff --git a/src/ap/ap_drv_ops.c b/src/ap/ap_drv_ops.c
developerf552fec2023-03-27 11:22:06 +0800187index 25e967d..60b9fc0 100644
developer092b55c2023-01-18 18:20:58 +0800188--- a/src/ap/ap_drv_ops.c
189+++ b/src/ap/ap_drv_ops.c
190@@ -1039,3 +1039,17 @@ int hostapd_drv_get_edcca(struct hostapd_data *hapd, const u8 mode, u8 *value)
191 return 0;
192 return hapd->driver->get_edcca(hapd->drv_priv, mode, value);
193 }
194+
developer2c78ce72023-02-24 11:26:12 +0800195+int hostapd_drv_mu_ctrl(struct hostapd_data *hapd)
developer092b55c2023-01-18 18:20:58 +0800196+{
developer2c78ce72023-02-24 11:26:12 +0800197+ if (!hapd->driver || !hapd->driver->mu_ctrl)
developer092b55c2023-01-18 18:20:58 +0800198+ return 0;
developer2c78ce72023-02-24 11:26:12 +0800199+ return hapd->driver->mu_ctrl(hapd->drv_priv, hapd->iconf->mu_onoff);
developer092b55c2023-01-18 18:20:58 +0800200+}
201+
developer2c78ce72023-02-24 11:26:12 +0800202+int hostapd_drv_mu_dump(struct hostapd_data *hapd, u8 *mu_onoff)
developer092b55c2023-01-18 18:20:58 +0800203+{
developer2c78ce72023-02-24 11:26:12 +0800204+ if (!hapd->driver || !hapd->driver->mu_dump)
developer092b55c2023-01-18 18:20:58 +0800205+ return 0;
developer2c78ce72023-02-24 11:26:12 +0800206+ return hapd->driver->mu_dump(hapd->drv_priv, mu_onoff);
developer092b55c2023-01-18 18:20:58 +0800207+}
208diff --git a/src/ap/ap_drv_ops.h b/src/ap/ap_drv_ops.h
developerf552fec2023-03-27 11:22:06 +0800209index 70a99f4..185d5f3 100644
developer092b55c2023-01-18 18:20:58 +0800210--- a/src/ap/ap_drv_ops.h
211+++ b/src/ap/ap_drv_ops.h
212@@ -142,6 +142,8 @@ int hostapd_drv_configure_edcca_enable(struct hostapd_data *hapd);
213 int hostapd_drv_configure_edcca_threshold(struct hostapd_data *hapd,
214 const int *threshold);
215 int hostapd_drv_get_edcca(struct hostapd_data *hapd, const u8 mode, u8 *value);
developer2c78ce72023-02-24 11:26:12 +0800216+int hostapd_drv_mu_ctrl(struct hostapd_data *hapd);
217+int hostapd_drv_mu_dump(struct hostapd_data *hapd, u8 *mu_onoff);
developer092b55c2023-01-18 18:20:58 +0800218
219 #include "drivers/driver.h"
220
221diff --git a/src/ap/hostapd.c b/src/ap/hostapd.c
developerf552fec2023-03-27 11:22:06 +0800222index 3bb38fe..71d7bfa 100644
developer092b55c2023-01-18 18:20:58 +0800223--- a/src/ap/hostapd.c
224+++ b/src/ap/hostapd.c
developerd8126d12023-02-17 11:50:45 +0800225@@ -2302,6 +2302,8 @@ dfs_offload:
developer092b55c2023-01-18 18:20:58 +0800226 if (hostapd_drv_configure_edcca_threshold(hapd,
227 hapd->iconf->edcca_threshold) < 0)
228 goto fail;
developer2c78ce72023-02-24 11:26:12 +0800229+ if (hostapd_drv_mu_ctrl(hapd) < 0)
developer092b55c2023-01-18 18:20:58 +0800230+ goto fail;
231
232 wpa_printf(MSG_DEBUG, "%s: Setup of interface done.",
233 iface->bss[0]->conf->iface);
234diff --git a/src/common/mtk_vendor.h b/src/common/mtk_vendor.h
developerf552fec2023-03-27 11:22:06 +0800235index 7056126..ef8618e 100644
developer092b55c2023-01-18 18:20:58 +0800236--- a/src/common/mtk_vendor.h
237+++ b/src/common/mtk_vendor.h
238@@ -10,6 +10,8 @@ enum mtk_nl80211_vendor_subcmds {
239 MTK_NL80211_VENDOR_SUBCMD_CSI_CTRL = 0xc2,
240 MTK_NL80211_VENDOR_SUBCMD_RFEATURE_CTRL = 0xc3,
241 MTK_NL80211_VENDOR_SUBCMD_WIRELESS_CTRL = 0xc4,
developer2c78ce72023-02-24 11:26:12 +0800242+ MTK_NL80211_VENDOR_SUBCMD_MU_CTRL = 0xc5,
developer092b55c2023-01-18 18:20:58 +0800243+ MTK_NL80211_VENDOR_SUBCMD_PHY_CAPA_CTRL= 0xc6,
244 MTK_NL80211_VENDOR_SUBCMD_EDCCA_CTRL = 0xc7,
245 };
246
247@@ -174,6 +176,19 @@ enum mtk_vendor_attr_rfeature_ctrl {
248 NUM_MTK_VENDOR_ATTRS_RFEATURE_CTRL - 1
249 };
250
developer2c78ce72023-02-24 11:26:12 +0800251+enum mtk_vendor_attr_mu_ctrl {
252+ MTK_VENDOR_ATTR_MU_CTRL_UNSPEC,
developer092b55c2023-01-18 18:20:58 +0800253+
developer2c78ce72023-02-24 11:26:12 +0800254+ MTK_VENDOR_ATTR_MU_CTRL_ONOFF,
255+ MTK_VENDOR_ATTR_MU_CTRL_DUMP,
developer092b55c2023-01-18 18:20:58 +0800256+
257+ /* keep last */
developer2c78ce72023-02-24 11:26:12 +0800258+ NUM_MTK_VENDOR_ATTRS_MU_CTRL,
259+ MTK_VENDOR_ATTR_MU_CTRL_MAX =
260+ NUM_MTK_VENDOR_ATTRS_MU_CTRL - 1
developer092b55c2023-01-18 18:20:58 +0800261+};
262+
263+
264 #define CSI_MAX_COUNT 256
265 #define ETH_ALEN 6
266
267diff --git a/src/drivers/driver.h b/src/drivers/driver.h
developerf552fec2023-03-27 11:22:06 +0800268index 3559974..fa5ad45 100644
developer092b55c2023-01-18 18:20:58 +0800269--- a/src/drivers/driver.h
270+++ b/src/drivers/driver.h
271@@ -1623,6 +1623,11 @@ struct wpa_driver_ap_params {
272 * Unsolicited broadcast Probe Response template length
273 */
274 size_t unsol_bcast_probe_resp_tmpl_len;
275+
276+ /**
developer2c78ce72023-02-24 11:26:12 +0800277+ * mu onoff=<val> (bitmap- UL MU-MIMO(bit3), DL MU-MIMO(bit2), UL OFDMA(bit1), DL OFDMA(bit0))
developer092b55c2023-01-18 18:20:58 +0800278+ */
developer2c78ce72023-02-24 11:26:12 +0800279+ u8 mu_onoff;
developer092b55c2023-01-18 18:20:58 +0800280 };
281
282 struct wpa_driver_mesh_bss_params {
283@@ -4680,6 +4685,14 @@ struct wpa_driver_ops {
284 const s8 edcca_compensation);
285 int (*configure_edcca_threshold)(void *priv, const int *threshold);
286 int (*get_edcca)(void *priv, const u8 mode, u8 *value);
287+
288+ /**
developer2c78ce72023-02-24 11:26:12 +0800289+ * mu_ctrl - ctrl on off for UL/DL MURU
developer092b55c2023-01-18 18:20:58 +0800290+ * @priv: Private driver interface data
291+ *
292+ */
developer2c78ce72023-02-24 11:26:12 +0800293+ int (*mu_ctrl)(void *priv, u8 mu_onoff);
294+ int (*mu_dump)(void *priv, u8 *mu_onoff);
developer092b55c2023-01-18 18:20:58 +0800295 };
296
297 /**
298diff --git a/src/drivers/driver_nl80211.c b/src/drivers/driver_nl80211.c
developerf552fec2023-03-27 11:22:06 +0800299index 6d4a4db..0523aab 100644
developer092b55c2023-01-18 18:20:58 +0800300--- a/src/drivers/driver_nl80211.c
301+++ b/src/drivers/driver_nl80211.c
302@@ -12304,6 +12304,114 @@ fail:
303 }
304
305
306+#ifdef CONFIG_IEEE80211AX
developer2c78ce72023-02-24 11:26:12 +0800307+static int nl80211_mu_onoff(void *priv, u8 mu_onoff)
developer092b55c2023-01-18 18:20:58 +0800308+{
309+ struct i802_bss *bss = priv;
310+ struct wpa_driver_nl80211_data *drv = bss->drv;
311+ struct nl_msg *msg;
312+ struct nlattr *data;
313+ int ret;
314+
developer2c78ce72023-02-24 11:26:12 +0800315+ if (!drv->mtk_mu_vendor_cmd_avail) {
developer092b55c2023-01-18 18:20:58 +0800316+ wpa_printf(MSG_INFO,
developer2c78ce72023-02-24 11:26:12 +0800317+ "nl80211: Driver does not support setting mu control");
developer092b55c2023-01-18 18:20:58 +0800318+ return 0;
319+ }
320+
321+ if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
322+ nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_MTK) ||
developer2c78ce72023-02-24 11:26:12 +0800323+ nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, MTK_NL80211_VENDOR_SUBCMD_MU_CTRL) ||
developer092b55c2023-01-18 18:20:58 +0800324+ !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
developer2c78ce72023-02-24 11:26:12 +0800325+ nla_put_u8(msg, MTK_VENDOR_ATTR_MU_CTRL_ONOFF, mu_onoff)) {
developer092b55c2023-01-18 18:20:58 +0800326+ nlmsg_free(msg);
327+ return -ENOBUFS;
328+ }
329+ nla_nest_end(msg, data);
330+ ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
331+ if(ret){
developer2c78ce72023-02-24 11:26:12 +0800332+ wpa_printf(MSG_ERROR, "Failed to set mu_onoff. ret=%d (%s)", ret, strerror(-ret));
developer092b55c2023-01-18 18:20:58 +0800333+ }
334+ return ret;
335+}
336+
337+
developer2c78ce72023-02-24 11:26:12 +0800338+static int mu_dump_handler(struct nl_msg *msg, void *arg)
developer092b55c2023-01-18 18:20:58 +0800339+{
developer2c78ce72023-02-24 11:26:12 +0800340+ u8 *mu_onoff = (u8 *) arg;
developer092b55c2023-01-18 18:20:58 +0800341+ struct nlattr *tb[NL80211_ATTR_MAX + 1];
developer2c78ce72023-02-24 11:26:12 +0800342+ struct nlattr *tb_vendor[MTK_VENDOR_ATTR_MU_CTRL_MAX + 1];
developer092b55c2023-01-18 18:20:58 +0800343+ struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
344+ struct nlattr *nl_vend, *attr;
345+
346+ static const struct nla_policy
developer2c78ce72023-02-24 11:26:12 +0800347+ mu_ctrl_policy[NUM_MTK_VENDOR_ATTRS_MU_CTRL + 1] = {
348+ [MTK_VENDOR_ATTR_MU_CTRL_ONOFF] = {.type = NLA_U8 },
349+ [MTK_VENDOR_ATTR_MU_CTRL_DUMP] = {.type = NLA_U8 },
developer092b55c2023-01-18 18:20:58 +0800350+ };
351+
352+ nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
353+ genlmsg_attrlen(gnlh, 0), NULL);
354+
355+ nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
356+ if (!nl_vend)
357+ return NL_SKIP;
358+
developer2c78ce72023-02-24 11:26:12 +0800359+ nla_parse(tb_vendor, MTK_VENDOR_ATTR_MU_CTRL_MAX,
developer092b55c2023-01-18 18:20:58 +0800360+ nla_data(nl_vend), nla_len(nl_vend), NULL);
361+
developer2c78ce72023-02-24 11:26:12 +0800362+ attr = tb_vendor[MTK_VENDOR_ATTR_MU_CTRL_DUMP];
developer092b55c2023-01-18 18:20:58 +0800363+ if (!attr) {
developer2c78ce72023-02-24 11:26:12 +0800364+ wpa_printf(MSG_ERROR, "nl80211: cannot find MTK_VENDOR_ATTR_MU_CTRL_DUMP");
developer092b55c2023-01-18 18:20:58 +0800365+ return NL_SKIP;
366+ }
367+
developer2c78ce72023-02-24 11:26:12 +0800368+ *mu_onoff = nla_get_u8(attr);
369+ wpa_printf(MSG_DEBUG, "nla_get mu_onoff: %d\n", *mu_onoff);
developer092b55c2023-01-18 18:20:58 +0800370+
371+ return 0;
372+}
373+
developer2c78ce72023-02-24 11:26:12 +0800374+static int nl80211_mu_dump(void *priv, u8 *mu_onoff)
developer092b55c2023-01-18 18:20:58 +0800375+{
376+ struct i802_bss *bss = priv;
377+ struct wpa_driver_nl80211_data *drv = bss->drv;
378+ struct nl_msg *msg;
379+ struct nlattr *attr;
380+ int ret;
381+
developer2c78ce72023-02-24 11:26:12 +0800382+ if (!drv->mtk_mu_vendor_cmd_avail) {
developer092b55c2023-01-18 18:20:58 +0800383+ wpa_printf(MSG_INFO,
developer2c78ce72023-02-24 11:26:12 +0800384+ "nl80211: Driver does not support setting mu control");
developer092b55c2023-01-18 18:20:58 +0800385+ return 0;
386+ }
387+
388+ if (!(msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_VENDOR)) ||
389+ nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_MTK) ||
developer2c78ce72023-02-24 11:26:12 +0800390+ nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, MTK_NL80211_VENDOR_SUBCMD_MU_CTRL)) {
developer092b55c2023-01-18 18:20:58 +0800391+ nlmsg_free(msg);
392+ return -ENOBUFS;
393+ }
394+
395+ attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
396+ if (!attr) {
397+ nlmsg_free(msg);
398+ return -1;
399+ }
400+
401+ nla_nest_end(msg, attr);
402+
developer2c78ce72023-02-24 11:26:12 +0800403+ ret = send_and_recv_msgs(drv, msg, mu_dump_handler, mu_onoff, NULL, NULL);
developer092b55c2023-01-18 18:20:58 +0800404+
405+ if(ret){
developer2c78ce72023-02-24 11:26:12 +0800406+ wpa_printf(MSG_ERROR, "Failed to get mu_onoff. ret=%d (%s)", ret, strerror(-ret));
developer092b55c2023-01-18 18:20:58 +0800407+ }
408+
409+ return ret;
410+}
411+#endif /* CONFIG_IEEE80211AX */
412+
413+
414 #ifdef CONFIG_DPP
415 static int nl80211_dpp_listen(void *priv, bool enable)
416 {
417@@ -12668,6 +12776,8 @@ const struct wpa_driver_ops wpa_driver_nl80211_ops = {
418 .update_connect_params = nl80211_update_connection_params,
419 .send_external_auth_status = nl80211_send_external_auth_status,
420 .set_4addr_mode = nl80211_set_4addr_mode,
developer2c78ce72023-02-24 11:26:12 +0800421+ .mu_ctrl = nl80211_mu_onoff,
422+ .mu_dump = nl80211_mu_dump,
developer092b55c2023-01-18 18:20:58 +0800423 #ifdef CONFIG_DPP
424 .dpp_listen = nl80211_dpp_listen,
425 #endif /* CONFIG_DPP */
426diff --git a/src/drivers/driver_nl80211.h b/src/drivers/driver_nl80211.h
developerf552fec2023-03-27 11:22:06 +0800427index 13e5d24..1dd984c 100644
developer092b55c2023-01-18 18:20:58 +0800428--- a/src/drivers/driver_nl80211.h
429+++ b/src/drivers/driver_nl80211.h
430@@ -182,6 +182,7 @@ struct wpa_driver_nl80211_data {
431 unsigned int brcm_do_acs:1;
432 unsigned int uses_6ghz:1;
433 unsigned int mtk_edcca_vendor_cmd_avail:1;
developer2c78ce72023-02-24 11:26:12 +0800434+ unsigned int mtk_mu_vendor_cmd_avail:1;
developer092b55c2023-01-18 18:20:58 +0800435
436 u64 vendor_scan_cookie;
437 u64 remain_on_chan_cookie;
438diff --git a/src/drivers/driver_nl80211_capa.c b/src/drivers/driver_nl80211_capa.c
developerf552fec2023-03-27 11:22:06 +0800439index 732ae29..cc11891 100644
developer092b55c2023-01-18 18:20:58 +0800440--- a/src/drivers/driver_nl80211_capa.c
441+++ b/src/drivers/driver_nl80211_capa.c
442@@ -1056,6 +1056,9 @@ static int wiphy_info_handler(struct nl_msg *msg, void *arg)
443 case MTK_NL80211_VENDOR_SUBCMD_EDCCA_CTRL :
444 drv->mtk_edcca_vendor_cmd_avail = 1;
445 break;
developer2c78ce72023-02-24 11:26:12 +0800446+ case MTK_NL80211_VENDOR_SUBCMD_MU_CTRL :
447+ drv->mtk_mu_vendor_cmd_avail = 1;
developer092b55c2023-01-18 18:20:58 +0800448+ break;
449 }
450 }
451
452--
developer1a173672023-12-21 14:49:33 +08004532.18.0
developer092b55c2023-01-18 18:20:58 +0800454