blob: 507035a49ca3467d7f4abf3637562bfa038aafb7 [file] [log] [blame]
developer8eb72a32023-03-30 08:32:07 +08001From cc5676dafa6a4664a98d0bbdea9cac811a5141dc Mon Sep 17 00:00:00 2001
developerdb40e3c2022-08-09 15:36:12 -07002From: TomLiu <tomml.liu@mediatek.com>
3Date: Tue, 9 Aug 2022 10:23:44 -0700
developer8eb72a32023-03-30 08:32:07 +08004Subject: [PATCH 06/25] hostapd: mtk: Add hostapd MU SET/GET control
developerdb40e3c2022-08-09 15:36:12 -07005
6---
7 hostapd/config_file.c | 9 +++
8 hostapd/ctrl_iface.c | 62 +++++++++++++++++
9 hostapd/hostapd_cli.c | 18 +++++
10 src/ap/ap_config.c | 1 +
11 src/ap/ap_config.h | 1 +
12 src/ap/ap_drv_ops.c | 14 ++++
13 src/ap/ap_drv_ops.h | 2 +
14 src/ap/hostapd.c | 2 +
15 src/common/mtk_vendor.h | 15 ++++
16 src/drivers/driver.h | 13 ++++
17 src/drivers/driver_nl80211.c | 110 ++++++++++++++++++++++++++++++
18 src/drivers/driver_nl80211.h | 1 +
19 src/drivers/driver_nl80211_capa.c | 3 +
20 13 files changed, 251 insertions(+)
21
22diff --git a/hostapd/config_file.c b/hostapd/config_file.c
developer81939a52023-03-25 15:31:11 +080023index b5024cc..62e8b33 100644
developerdb40e3c2022-08-09 15:36:12 -070024--- a/hostapd/config_file.c
25+++ b/hostapd/config_file.c
developer57a17d42023-02-14 23:19:14 +080026@@ -3661,6 +3661,15 @@ static int hostapd_config_fill(struct hostapd_config *conf,
developerdb40e3c2022-08-09 15:36:12 -070027 return 1;
28 }
29 bss->unsol_bcast_probe_resp_interval = val;
developer57de9b72023-02-20 11:15:54 +080030+ } else if (os_strcmp(buf, "mu_onoff") == 0) {
developerdb40e3c2022-08-09 15:36:12 -070031+ int val = atoi(pos);
32+ if (val < 0 || val > 15) {
33+ wpa_printf(MSG_ERROR,
developer57de9b72023-02-20 11:15:54 +080034+ "Line %d: invalid mu_onoff value",
developerdb40e3c2022-08-09 15:36:12 -070035+ line);
36+ return 1;
37+ }
developer57de9b72023-02-20 11:15:54 +080038+ conf->mu_onoff = val;
developerdb40e3c2022-08-09 15:36:12 -070039 #endif /* CONFIG_IEEE80211AX */
40 } else if (os_strcmp(buf, "max_listen_interval") == 0) {
41 bss->max_listen_interval = atoi(pos);
42diff --git a/hostapd/ctrl_iface.c b/hostapd/ctrl_iface.c
developer81939a52023-03-25 15:31:11 +080043index 9c70d54..c72f336 100644
developerdb40e3c2022-08-09 15:36:12 -070044--- a/hostapd/ctrl_iface.c
45+++ b/hostapd/ctrl_iface.c
developerbf811862022-11-17 14:31:04 +080046@@ -3441,6 +3441,63 @@ hostapd_ctrl_iface_get_edcca(struct hostapd_data *hapd, char *cmd, char *buf,
developerdb40e3c2022-08-09 15:36:12 -070047 }
48
49
50+static int
developer57de9b72023-02-20 11:15:54 +080051+hostapd_ctrl_iface_set_mu(struct hostapd_data *hapd, char *cmd,
developerdb40e3c2022-08-09 15:36:12 -070052+ char *buf, size_t buflen)
53+{
54+ char *pos, *config, *value;
55+ config = cmd;
56+ pos = os_strchr(config, ' ');
57+ if (pos == NULL)
58+ return -1;
59+ *pos++ = '\0';
60+
61+ if(pos == NULL)
62+ return -1;
63+ value = pos;
64+
65+ if (os_strcmp(config, "onoff") == 0) {
developer57de9b72023-02-20 11:15:54 +080066+ int mu = atoi(value);
67+ if (mu < 0 || mu > 15) {
68+ wpa_printf(MSG_ERROR, "Invalid value for mu");
developerdb40e3c2022-08-09 15:36:12 -070069+ return -1;
70+ }
developer57de9b72023-02-20 11:15:54 +080071+ hapd->iconf->mu_onoff = (u8) mu;
developerdb40e3c2022-08-09 15:36:12 -070072+ } else {
73+ wpa_printf(MSG_ERROR,
developer57de9b72023-02-20 11:15:54 +080074+ "Unsupported parameter %s for SET_MU", config);
developerdb40e3c2022-08-09 15:36:12 -070075+ return -1;
76+ }
77+
developer57de9b72023-02-20 11:15:54 +080078+ if(hostapd_drv_mu_ctrl(hapd) == 0) {
developerdb40e3c2022-08-09 15:36:12 -070079+ return os_snprintf(buf, buflen, "OK\n");
80+ } else {
81+ return -1;
82+ }
83+}
84+
85+
86+static int
developer57de9b72023-02-20 11:15:54 +080087+hostapd_ctrl_iface_get_mu(struct hostapd_data *hapd, char *buf,
developerdb40e3c2022-08-09 15:36:12 -070088+ size_t buflen)
89+{
developer57de9b72023-02-20 11:15:54 +080090+ u8 mu_onoff;
developerdb40e3c2022-08-09 15:36:12 -070091+ char *pos, *end;
92+
93+ pos = buf;
94+ end = buf + buflen;
95+
developer57de9b72023-02-20 11:15:54 +080096+ if (hostapd_drv_mu_dump(hapd, &mu_onoff) == 0) {
97+ hapd->iconf->mu_onoff = mu_onoff;
developerdb40e3c2022-08-09 15:36:12 -070098+ return os_snprintf(pos, end - pos, "[hostapd_cli] = UL MU-MIMO: %d, DL MU-MIMO: %d, UL OFDMA: %d, DL OFDMA: %d\n",
developer57de9b72023-02-20 11:15:54 +080099+ !!(mu_onoff&BIT(3)), !!(mu_onoff&BIT(2)), !!(mu_onoff&BIT(1)), !!(mu_onoff&BIT(0)));
developerdb40e3c2022-08-09 15:36:12 -0700100+ } else {
101+ wpa_printf(MSG_INFO, "ctrl iface failed to call");
102+ return -1;
103+ }
104+}
105+
106+
107 static int hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd,
108 char *buf, char *reply,
109 int reply_size,
developerbf811862022-11-17 14:31:04 +0800110@@ -3993,6 +4050,11 @@ static int hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd,
111 } else if (os_strncmp(buf, "GET_EDCCA ", 10) == 0) {
112 reply_len = hostapd_ctrl_iface_get_edcca(hapd, buf+10, reply,
113 reply_size);
developer57de9b72023-02-20 11:15:54 +0800114+ } else if (os_strncmp(buf, "SET_MU ", 7) == 0) {
115+ reply_len = hostapd_ctrl_iface_set_mu(hapd, buf + 7, reply,
developerdb40e3c2022-08-09 15:36:12 -0700116+ reply_size);
developer57de9b72023-02-20 11:15:54 +0800117+ } else if (os_strncmp(buf, "GET_MU", 6) == 0) {
118+ reply_len = hostapd_ctrl_iface_get_mu(hapd, reply, reply_size);
developerdb40e3c2022-08-09 15:36:12 -0700119 } else {
120 os_memcpy(reply, "UNKNOWN COMMAND\n", 16);
121 reply_len = 16;
122diff --git a/hostapd/hostapd_cli.c b/hostapd/hostapd_cli.c
developer81939a52023-03-25 15:31:11 +0800123index db21258..e16a1dc 100644
developerdb40e3c2022-08-09 15:36:12 -0700124--- a/hostapd/hostapd_cli.c
125+++ b/hostapd/hostapd_cli.c
126@@ -1380,6 +1380,20 @@ static int hostapd_cli_cmd_driver_flags(struct wpa_ctrl *ctrl, int argc,
127 }
128
129
developer57de9b72023-02-20 11:15:54 +0800130+static int hostapd_cli_cmd_set_mu(struct wpa_ctrl *ctrl, int argc,
developerdb40e3c2022-08-09 15:36:12 -0700131+ char *argv[])
132+{
developer57de9b72023-02-20 11:15:54 +0800133+ return hostapd_cli_cmd(ctrl, "SET_MU", 1, argc, argv);
developerdb40e3c2022-08-09 15:36:12 -0700134+}
135+
136+
developer57de9b72023-02-20 11:15:54 +0800137+static int hostapd_cli_cmd_get_mu(struct wpa_ctrl *ctrl, int argc,
developerdb40e3c2022-08-09 15:36:12 -0700138+ char *argv[])
139+{
developer57de9b72023-02-20 11:15:54 +0800140+ return hostapd_cli_cmd(ctrl, "GET_MU", 0, NULL, NULL);
developerdb40e3c2022-08-09 15:36:12 -0700141+}
142+
143+
144 #ifdef CONFIG_DPP
145
146 static int hostapd_cli_cmd_dpp_qr_code(struct wpa_ctrl *ctrl, int argc,
developerc41fcd32022-09-20 22:09:06 +0800147@@ -1705,6 +1719,10 @@ static const struct hostapd_cli_cmd hostapd_cli_commands[] = {
developerdb40e3c2022-08-09 15:36:12 -0700148 " = send FTM range request"},
149 { "driver_flags", hostapd_cli_cmd_driver_flags, NULL,
150 " = show supported driver flags"},
developer57de9b72023-02-20 11:15:54 +0800151+ { "set_mu", hostapd_cli_cmd_set_mu, NULL,
developerdb40e3c2022-08-09 15:36:12 -0700152+ "<value> [0-15] bitmap- UL MU-MIMO(bit3), DL MU-MIMO(bit2), UL OFDMA(bit1), DL OFDMA(bit0)"},
developer57de9b72023-02-20 11:15:54 +0800153+ { "get_mu", hostapd_cli_cmd_get_mu, NULL,
154+ " = show mu onoff value in 0-15 bitmap"},
developerdb40e3c2022-08-09 15:36:12 -0700155 #ifdef CONFIG_DPP
156 { "dpp_qr_code", hostapd_cli_cmd_dpp_qr_code, NULL,
157 "report a scanned DPP URI from a QR Code" },
158diff --git a/src/ap/ap_config.c b/src/ap/ap_config.c
developer81939a52023-03-25 15:31:11 +0800159index 344585a..d4fc191 100644
developerdb40e3c2022-08-09 15:36:12 -0700160--- a/src/ap/ap_config.c
161+++ b/src/ap/ap_config.c
162@@ -280,6 +280,7 @@ struct hostapd_config * hostapd_config_defaults(void)
163 conf->he_6ghz_max_ampdu_len_exp = 7;
164 conf->he_6ghz_rx_ant_pat = 1;
165 conf->he_6ghz_tx_ant_pat = 1;
developer57de9b72023-02-20 11:15:54 +0800166+ conf->mu_onoff = 13;
developerdb40e3c2022-08-09 15:36:12 -0700167 #endif /* CONFIG_IEEE80211AX */
168
169 /* The third octet of the country string uses an ASCII space character
170diff --git a/src/ap/ap_config.h b/src/ap/ap_config.h
developer81939a52023-03-25 15:31:11 +0800171index 4ac4699..37779b7 100644
developerdb40e3c2022-08-09 15:36:12 -0700172--- a/src/ap/ap_config.h
173+++ b/src/ap/ap_config.h
developer57a17d42023-02-14 23:19:14 +0800174@@ -1115,6 +1115,7 @@ struct hostapd_config {
developerdb40e3c2022-08-09 15:36:12 -0700175 u8 he_6ghz_rx_ant_pat;
176 u8 he_6ghz_tx_ant_pat;
177 u8 he_6ghz_reg_pwr_type;
developer57de9b72023-02-20 11:15:54 +0800178+ u8 mu_onoff;
developerdb40e3c2022-08-09 15:36:12 -0700179 #endif /* CONFIG_IEEE80211AX */
180
181 /* VHT enable/disable config from CHAN_SWITCH */
182diff --git a/src/ap/ap_drv_ops.c b/src/ap/ap_drv_ops.c
developer81939a52023-03-25 15:31:11 +0800183index 25e967d..60b9fc0 100644
developerdb40e3c2022-08-09 15:36:12 -0700184--- a/src/ap/ap_drv_ops.c
185+++ b/src/ap/ap_drv_ops.c
developerbf811862022-11-17 14:31:04 +0800186@@ -1039,3 +1039,17 @@ int hostapd_drv_get_edcca(struct hostapd_data *hapd, const u8 mode, u8 *value)
187 return 0;
188 return hapd->driver->get_edcca(hapd->drv_priv, mode, value);
developerdb40e3c2022-08-09 15:36:12 -0700189 }
190+
developer57de9b72023-02-20 11:15:54 +0800191+int hostapd_drv_mu_ctrl(struct hostapd_data *hapd)
developerdb40e3c2022-08-09 15:36:12 -0700192+{
developer57de9b72023-02-20 11:15:54 +0800193+ if (!hapd->driver || !hapd->driver->mu_ctrl)
developerdb40e3c2022-08-09 15:36:12 -0700194+ return 0;
developer57de9b72023-02-20 11:15:54 +0800195+ return hapd->driver->mu_ctrl(hapd->drv_priv, hapd->iconf->mu_onoff);
developerdb40e3c2022-08-09 15:36:12 -0700196+}
197+
developer57de9b72023-02-20 11:15:54 +0800198+int hostapd_drv_mu_dump(struct hostapd_data *hapd, u8 *mu_onoff)
developerdb40e3c2022-08-09 15:36:12 -0700199+{
developer57de9b72023-02-20 11:15:54 +0800200+ if (!hapd->driver || !hapd->driver->mu_dump)
developerdb40e3c2022-08-09 15:36:12 -0700201+ return 0;
developer57de9b72023-02-20 11:15:54 +0800202+ return hapd->driver->mu_dump(hapd->drv_priv, mu_onoff);
developerdb40e3c2022-08-09 15:36:12 -0700203+}
204diff --git a/src/ap/ap_drv_ops.h b/src/ap/ap_drv_ops.h
developer81939a52023-03-25 15:31:11 +0800205index 70a99f4..185d5f3 100644
developerdb40e3c2022-08-09 15:36:12 -0700206--- a/src/ap/ap_drv_ops.h
207+++ b/src/ap/ap_drv_ops.h
developerbf811862022-11-17 14:31:04 +0800208@@ -142,6 +142,8 @@ int hostapd_drv_configure_edcca_enable(struct hostapd_data *hapd);
209 int hostapd_drv_configure_edcca_threshold(struct hostapd_data *hapd,
210 const int *threshold);
211 int hostapd_drv_get_edcca(struct hostapd_data *hapd, const u8 mode, u8 *value);
developer57de9b72023-02-20 11:15:54 +0800212+int hostapd_drv_mu_ctrl(struct hostapd_data *hapd);
213+int hostapd_drv_mu_dump(struct hostapd_data *hapd, u8 *mu_onoff);
developerdb40e3c2022-08-09 15:36:12 -0700214
215 #include "drivers/driver.h"
216
217diff --git a/src/ap/hostapd.c b/src/ap/hostapd.c
developer81939a52023-03-25 15:31:11 +0800218index 3bb38fe..71d7bfa 100644
developerdb40e3c2022-08-09 15:36:12 -0700219--- a/src/ap/hostapd.c
220+++ b/src/ap/hostapd.c
developer57a17d42023-02-14 23:19:14 +0800221@@ -2302,6 +2302,8 @@ dfs_offload:
developerbf811862022-11-17 14:31:04 +0800222 if (hostapd_drv_configure_edcca_threshold(hapd,
223 hapd->iconf->edcca_threshold) < 0)
developerdb40e3c2022-08-09 15:36:12 -0700224 goto fail;
developer57de9b72023-02-20 11:15:54 +0800225+ if (hostapd_drv_mu_ctrl(hapd) < 0)
developerdb40e3c2022-08-09 15:36:12 -0700226+ goto fail;
227
228 wpa_printf(MSG_DEBUG, "%s: Setup of interface done.",
229 iface->bss[0]->conf->iface);
230diff --git a/src/common/mtk_vendor.h b/src/common/mtk_vendor.h
developer81939a52023-03-25 15:31:11 +0800231index 7056126..ef8618e 100644
developerdb40e3c2022-08-09 15:36:12 -0700232--- a/src/common/mtk_vendor.h
233+++ b/src/common/mtk_vendor.h
234@@ -10,6 +10,8 @@ enum mtk_nl80211_vendor_subcmds {
235 MTK_NL80211_VENDOR_SUBCMD_CSI_CTRL = 0xc2,
236 MTK_NL80211_VENDOR_SUBCMD_RFEATURE_CTRL = 0xc3,
237 MTK_NL80211_VENDOR_SUBCMD_WIRELESS_CTRL = 0xc4,
developer57de9b72023-02-20 11:15:54 +0800238+ MTK_NL80211_VENDOR_SUBCMD_MU_CTRL = 0xc5,
developerdb40e3c2022-08-09 15:36:12 -0700239+ MTK_NL80211_VENDOR_SUBCMD_PHY_CAPA_CTRL= 0xc6,
240 MTK_NL80211_VENDOR_SUBCMD_EDCCA_CTRL = 0xc7,
241 };
242
developerbf811862022-11-17 14:31:04 +0800243@@ -174,6 +176,19 @@ enum mtk_vendor_attr_rfeature_ctrl {
developerdb40e3c2022-08-09 15:36:12 -0700244 NUM_MTK_VENDOR_ATTRS_RFEATURE_CTRL - 1
245 };
246
developer57de9b72023-02-20 11:15:54 +0800247+enum mtk_vendor_attr_mu_ctrl {
248+ MTK_VENDOR_ATTR_MU_CTRL_UNSPEC,
developerdb40e3c2022-08-09 15:36:12 -0700249+
developer57de9b72023-02-20 11:15:54 +0800250+ MTK_VENDOR_ATTR_MU_CTRL_ONOFF,
251+ MTK_VENDOR_ATTR_MU_CTRL_DUMP,
developerdb40e3c2022-08-09 15:36:12 -0700252+
253+ /* keep last */
developer57de9b72023-02-20 11:15:54 +0800254+ NUM_MTK_VENDOR_ATTRS_MU_CTRL,
255+ MTK_VENDOR_ATTR_MU_CTRL_MAX =
256+ NUM_MTK_VENDOR_ATTRS_MU_CTRL - 1
developerdb40e3c2022-08-09 15:36:12 -0700257+};
258+
259+
260 #define CSI_MAX_COUNT 256
261 #define ETH_ALEN 6
262
263diff --git a/src/drivers/driver.h b/src/drivers/driver.h
developer81939a52023-03-25 15:31:11 +0800264index 3559974..fa5ad45 100644
developerdb40e3c2022-08-09 15:36:12 -0700265--- a/src/drivers/driver.h
266+++ b/src/drivers/driver.h
developerc41fcd32022-09-20 22:09:06 +0800267@@ -1623,6 +1623,11 @@ struct wpa_driver_ap_params {
developerdb40e3c2022-08-09 15:36:12 -0700268 * Unsolicited broadcast Probe Response template length
269 */
270 size_t unsol_bcast_probe_resp_tmpl_len;
271+
272+ /**
developer57de9b72023-02-20 11:15:54 +0800273+ * mu onoff=<val> (bitmap- UL MU-MIMO(bit3), DL MU-MIMO(bit2), UL OFDMA(bit1), DL OFDMA(bit0))
developerdb40e3c2022-08-09 15:36:12 -0700274+ */
developer57de9b72023-02-20 11:15:54 +0800275+ u8 mu_onoff;
developerdb40e3c2022-08-09 15:36:12 -0700276 };
277
278 struct wpa_driver_mesh_bss_params {
developerbf811862022-11-17 14:31:04 +0800279@@ -4680,6 +4685,14 @@ struct wpa_driver_ops {
developerdb40e3c2022-08-09 15:36:12 -0700280 const s8 edcca_compensation);
developerbf811862022-11-17 14:31:04 +0800281 int (*configure_edcca_threshold)(void *priv, const int *threshold);
282 int (*get_edcca)(void *priv, const u8 mode, u8 *value);
developerdb40e3c2022-08-09 15:36:12 -0700283+
284+ /**
developer57de9b72023-02-20 11:15:54 +0800285+ * mu_ctrl - ctrl on off for UL/DL MURU
developerdb40e3c2022-08-09 15:36:12 -0700286+ * @priv: Private driver interface data
287+ *
288+ */
developer57de9b72023-02-20 11:15:54 +0800289+ int (*mu_ctrl)(void *priv, u8 mu_onoff);
290+ int (*mu_dump)(void *priv, u8 *mu_onoff);
developerdb40e3c2022-08-09 15:36:12 -0700291 };
292
293 /**
294diff --git a/src/drivers/driver_nl80211.c b/src/drivers/driver_nl80211.c
developer81939a52023-03-25 15:31:11 +0800295index 6d4a4db..0523aab 100644
developerdb40e3c2022-08-09 15:36:12 -0700296--- a/src/drivers/driver_nl80211.c
297+++ b/src/drivers/driver_nl80211.c
developerbf811862022-11-17 14:31:04 +0800298@@ -12304,6 +12304,114 @@ fail:
developerdb40e3c2022-08-09 15:36:12 -0700299 }
300
301
302+#ifdef CONFIG_IEEE80211AX
developer57de9b72023-02-20 11:15:54 +0800303+static int nl80211_mu_onoff(void *priv, u8 mu_onoff)
developerdb40e3c2022-08-09 15:36:12 -0700304+{
305+ struct i802_bss *bss = priv;
306+ struct wpa_driver_nl80211_data *drv = bss->drv;
307+ struct nl_msg *msg;
308+ struct nlattr *data;
309+ int ret;
310+
developer57de9b72023-02-20 11:15:54 +0800311+ if (!drv->mtk_mu_vendor_cmd_avail) {
developerdb40e3c2022-08-09 15:36:12 -0700312+ wpa_printf(MSG_INFO,
developer57de9b72023-02-20 11:15:54 +0800313+ "nl80211: Driver does not support setting mu control");
developerdb40e3c2022-08-09 15:36:12 -0700314+ return 0;
315+ }
316+
317+ if (!(msg = nl80211_drv_msg(drv, 0, NL80211_CMD_VENDOR)) ||
318+ nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_MTK) ||
developer57de9b72023-02-20 11:15:54 +0800319+ nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, MTK_NL80211_VENDOR_SUBCMD_MU_CTRL) ||
developerdb40e3c2022-08-09 15:36:12 -0700320+ !(data = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA)) ||
developer57de9b72023-02-20 11:15:54 +0800321+ nla_put_u8(msg, MTK_VENDOR_ATTR_MU_CTRL_ONOFF, mu_onoff)) {
developerdb40e3c2022-08-09 15:36:12 -0700322+ nlmsg_free(msg);
323+ return -ENOBUFS;
324+ }
325+ nla_nest_end(msg, data);
326+ ret = send_and_recv_msgs(drv, msg, NULL, NULL, NULL, NULL);
327+ if(ret){
developer57de9b72023-02-20 11:15:54 +0800328+ wpa_printf(MSG_ERROR, "Failed to set mu_onoff. ret=%d (%s)", ret, strerror(-ret));
developerdb40e3c2022-08-09 15:36:12 -0700329+ }
330+ return ret;
331+}
332+
333+
developer57de9b72023-02-20 11:15:54 +0800334+static int mu_dump_handler(struct nl_msg *msg, void *arg)
developerdb40e3c2022-08-09 15:36:12 -0700335+{
developer57de9b72023-02-20 11:15:54 +0800336+ u8 *mu_onoff = (u8 *) arg;
developerdb40e3c2022-08-09 15:36:12 -0700337+ struct nlattr *tb[NL80211_ATTR_MAX + 1];
developer57de9b72023-02-20 11:15:54 +0800338+ struct nlattr *tb_vendor[MTK_VENDOR_ATTR_MU_CTRL_MAX + 1];
developerdb40e3c2022-08-09 15:36:12 -0700339+ struct genlmsghdr *gnlh = nlmsg_data(nlmsg_hdr(msg));
340+ struct nlattr *nl_vend, *attr;
341+
342+ static const struct nla_policy
developer57de9b72023-02-20 11:15:54 +0800343+ mu_ctrl_policy[NUM_MTK_VENDOR_ATTRS_MU_CTRL + 1] = {
344+ [MTK_VENDOR_ATTR_MU_CTRL_ONOFF] = {.type = NLA_U8 },
345+ [MTK_VENDOR_ATTR_MU_CTRL_DUMP] = {.type = NLA_U8 },
developerdb40e3c2022-08-09 15:36:12 -0700346+ };
347+
348+ nla_parse(tb, NL80211_ATTR_MAX, genlmsg_attrdata(gnlh, 0),
349+ genlmsg_attrlen(gnlh, 0), NULL);
350+
351+ nl_vend = tb[NL80211_ATTR_VENDOR_DATA];
352+ if (!nl_vend)
353+ return NL_SKIP;
354+
developer57de9b72023-02-20 11:15:54 +0800355+ nla_parse(tb_vendor, MTK_VENDOR_ATTR_MU_CTRL_MAX,
developerdb40e3c2022-08-09 15:36:12 -0700356+ nla_data(nl_vend), nla_len(nl_vend), NULL);
357+
developer57de9b72023-02-20 11:15:54 +0800358+ attr = tb_vendor[MTK_VENDOR_ATTR_MU_CTRL_DUMP];
developerdb40e3c2022-08-09 15:36:12 -0700359+ if (!attr) {
developer57de9b72023-02-20 11:15:54 +0800360+ wpa_printf(MSG_ERROR, "nl80211: cannot find MTK_VENDOR_ATTR_MU_CTRL_DUMP");
developerdb40e3c2022-08-09 15:36:12 -0700361+ return NL_SKIP;
362+ }
363+
developer57de9b72023-02-20 11:15:54 +0800364+ *mu_onoff = nla_get_u8(attr);
365+ wpa_printf(MSG_DEBUG, "nla_get mu_onoff: %d\n", *mu_onoff);
developerdb40e3c2022-08-09 15:36:12 -0700366+
367+ return 0;
368+}
369+
developer57de9b72023-02-20 11:15:54 +0800370+static int nl80211_mu_dump(void *priv, u8 *mu_onoff)
developerdb40e3c2022-08-09 15:36:12 -0700371+{
372+ struct i802_bss *bss = priv;
373+ struct wpa_driver_nl80211_data *drv = bss->drv;
374+ struct nl_msg *msg;
375+ struct nlattr *attr;
376+ int ret;
377+
developer57de9b72023-02-20 11:15:54 +0800378+ if (!drv->mtk_mu_vendor_cmd_avail) {
developerdb40e3c2022-08-09 15:36:12 -0700379+ wpa_printf(MSG_INFO,
developer57de9b72023-02-20 11:15:54 +0800380+ "nl80211: Driver does not support setting mu control");
developerdb40e3c2022-08-09 15:36:12 -0700381+ return 0;
382+ }
383+
384+ if (!(msg = nl80211_drv_msg(drv, NLM_F_DUMP, NL80211_CMD_VENDOR)) ||
385+ nla_put_u32(msg, NL80211_ATTR_VENDOR_ID, OUI_MTK) ||
developer57de9b72023-02-20 11:15:54 +0800386+ nla_put_u32(msg, NL80211_ATTR_VENDOR_SUBCMD, MTK_NL80211_VENDOR_SUBCMD_MU_CTRL)) {
developerdb40e3c2022-08-09 15:36:12 -0700387+ nlmsg_free(msg);
388+ return -ENOBUFS;
389+ }
390+
391+ attr = nla_nest_start(msg, NL80211_ATTR_VENDOR_DATA);
392+ if (!attr) {
393+ nlmsg_free(msg);
394+ return -1;
395+ }
396+
397+ nla_nest_end(msg, attr);
398+
developer57de9b72023-02-20 11:15:54 +0800399+ ret = send_and_recv_msgs(drv, msg, mu_dump_handler, mu_onoff, NULL, NULL);
developerdb40e3c2022-08-09 15:36:12 -0700400+
401+ if(ret){
developer57de9b72023-02-20 11:15:54 +0800402+ wpa_printf(MSG_ERROR, "Failed to get mu_onoff. ret=%d (%s)", ret, strerror(-ret));
developerdb40e3c2022-08-09 15:36:12 -0700403+ }
404+
405+ return ret;
406+}
407+#endif /* CONFIG_IEEE80211AX */
408+
409+
410 #ifdef CONFIG_DPP
411 static int nl80211_dpp_listen(void *priv, bool enable)
412 {
developerbf811862022-11-17 14:31:04 +0800413@@ -12668,6 +12776,8 @@ const struct wpa_driver_ops wpa_driver_nl80211_ops = {
developerdb40e3c2022-08-09 15:36:12 -0700414 .update_connect_params = nl80211_update_connection_params,
415 .send_external_auth_status = nl80211_send_external_auth_status,
416 .set_4addr_mode = nl80211_set_4addr_mode,
developer57de9b72023-02-20 11:15:54 +0800417+ .mu_ctrl = nl80211_mu_onoff,
418+ .mu_dump = nl80211_mu_dump,
developerdb40e3c2022-08-09 15:36:12 -0700419 #ifdef CONFIG_DPP
420 .dpp_listen = nl80211_dpp_listen,
421 #endif /* CONFIG_DPP */
422diff --git a/src/drivers/driver_nl80211.h b/src/drivers/driver_nl80211.h
developer81939a52023-03-25 15:31:11 +0800423index 13e5d24..1dd984c 100644
developerdb40e3c2022-08-09 15:36:12 -0700424--- a/src/drivers/driver_nl80211.h
425+++ b/src/drivers/driver_nl80211.h
developerc41fcd32022-09-20 22:09:06 +0800426@@ -182,6 +182,7 @@ struct wpa_driver_nl80211_data {
developerdb40e3c2022-08-09 15:36:12 -0700427 unsigned int brcm_do_acs:1;
developerc41fcd32022-09-20 22:09:06 +0800428 unsigned int uses_6ghz:1;
developerdb40e3c2022-08-09 15:36:12 -0700429 unsigned int mtk_edcca_vendor_cmd_avail:1;
developer57de9b72023-02-20 11:15:54 +0800430+ unsigned int mtk_mu_vendor_cmd_avail:1;
developerdb40e3c2022-08-09 15:36:12 -0700431
432 u64 vendor_scan_cookie;
433 u64 remain_on_chan_cookie;
434diff --git a/src/drivers/driver_nl80211_capa.c b/src/drivers/driver_nl80211_capa.c
developer81939a52023-03-25 15:31:11 +0800435index 732ae29..cc11891 100644
developerdb40e3c2022-08-09 15:36:12 -0700436--- a/src/drivers/driver_nl80211_capa.c
437+++ b/src/drivers/driver_nl80211_capa.c
developerc41fcd32022-09-20 22:09:06 +0800438@@ -1056,6 +1056,9 @@ static int wiphy_info_handler(struct nl_msg *msg, void *arg)
developerdb40e3c2022-08-09 15:36:12 -0700439 case MTK_NL80211_VENDOR_SUBCMD_EDCCA_CTRL :
440 drv->mtk_edcca_vendor_cmd_avail = 1;
441 break;
developer57de9b72023-02-20 11:15:54 +0800442+ case MTK_NL80211_VENDOR_SUBCMD_MU_CTRL :
443+ drv->mtk_mu_vendor_cmd_avail = 1;
developerdb40e3c2022-08-09 15:36:12 -0700444+ break;
445 }
446 }
447
448--
developer81939a52023-03-25 15:31:11 +08004492.18.0
developerdb40e3c2022-08-09 15:36:12 -0700450