mirror of
https://github.com/Telecominfraproject/wlan-ap.git
synced 2025-10-30 18:07:52 +00:00
Compare commits
36 Commits
v1.1.0
...
v1.1.1-rc1
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
11ec1256c5 | ||
|
|
dc8b77ce5f | ||
|
|
87ac2d554d | ||
|
|
b122f99bc1 | ||
|
|
ef68964976 | ||
|
|
d166cf1e31 | ||
|
|
9a7295d396 | ||
|
|
29768c526d | ||
|
|
192546ee01 | ||
|
|
b78645a965 | ||
|
|
94fd1a1821 | ||
|
|
c3d02f8719 | ||
|
|
cc9936baef | ||
|
|
2e018a628c | ||
|
|
b3b1b1307e | ||
|
|
feac133dab | ||
|
|
1bc19d3e99 | ||
|
|
bb459312b0 | ||
|
|
af89773c40 | ||
|
|
3a5531b569 | ||
|
|
1f85d25c83 | ||
|
|
ad9df817de | ||
|
|
d0387fe60c | ||
|
|
fc2cba962e | ||
|
|
2a202eb697 | ||
|
|
327c048b30 | ||
|
|
91b2ec5013 | ||
|
|
ce703e1b2e | ||
|
|
725f213e65 | ||
|
|
320896474b | ||
|
|
8b07342d9d | ||
|
|
1c5a8940e4 | ||
|
|
ec8170bb11 | ||
|
|
804c83e70e | ||
|
|
e412557080 | ||
|
|
12ed24eaf8 |
626
feeds/ipq807x/qca-nss-clients/Makefile
Normal file
626
feeds/ipq807x/qca-nss-clients/Makefile
Normal file
@@ -0,0 +1,626 @@
|
|||||||
|
include $(TOPDIR)/rules.mk
|
||||||
|
include $(INCLUDE_DIR)/kernel.mk
|
||||||
|
|
||||||
|
PKG_NAME:=qca-nss-clients
|
||||||
|
PKG_SOURCE_PROTO:=git
|
||||||
|
PKG_BRANCH:=master
|
||||||
|
PKG_RELEASE:=2
|
||||||
|
PKG_SOURCE_URL:=https://source.codeaurora.org/quic/qsdk/oss/lklm/nss-clients/
|
||||||
|
PKG_VERSION:=9136ef60bf68ceed760781d3acbeddb05470e432
|
||||||
|
|
||||||
|
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
|
||||||
|
PKG_SOURCE_SUBDIR:=$(PKG_NAME)-$(PKG_VERSION)
|
||||||
|
PKG_SOURCE_VERSION:=$(PKG_VERSION)
|
||||||
|
|
||||||
|
#PKG_BUILD_DEPENDS := PACKAGE_kmod-qca-nss-crypto:kmod-qca-nss-crypto
|
||||||
|
MAKE_OPTS:=
|
||||||
|
|
||||||
|
include $(INCLUDE_DIR)/package.mk
|
||||||
|
|
||||||
|
# Keep default as ipq806x for branches that does not have subtarget framework
|
||||||
|
ifeq ($(CONFIG_TARGET_ipq),y)
|
||||||
|
subtarget:=$(SUBTARGET)
|
||||||
|
else
|
||||||
|
subtarget:=$(CONFIG_TARGET_BOARD)
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq (, $(findstring $(subtarget), "ipq807x" "ipq807x_ipq807x" "ipq60xx" "ipq807x_ipq60xx"))
|
||||||
|
# DTLS Manager v2.0 for Hawkeye/Cypress
|
||||||
|
DTLSMGR_DIR:=v2.0
|
||||||
|
# IPsec Manager v2.0 for Hawkeye/Cypress
|
||||||
|
IPSECMGR_DIR:=v2.0
|
||||||
|
else
|
||||||
|
# DTLS Manager v1.0 for Akronite.
|
||||||
|
DTLSMGR_DIR:=v1.0
|
||||||
|
# IPsec Manager v1.0 for Akronite.
|
||||||
|
IPSECMGR_DIR:=v1.0
|
||||||
|
endif
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-tun6rd
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - tun6rd
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-sit @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/qca-nss-tun6rd.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,60,qca-nss-tun6rd)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-tun6rd/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for 6rd tunnel
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-dtlsmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - dtlsmgr
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-cfi-cryptoapi @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/dtls/$(DTLSMGR_DIR)/qca-nss-dtlsmgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-dtls/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for DTLS sessions
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-tlsmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - tlsmgr
|
||||||
|
DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx +kmod-qca-nss-drv +kmod-qca-nss-cfi @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/tls/qca-nss-tlsmgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-tls/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for TLS sessions
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-l2tpv2
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - l2tp
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-ppp +kmod-l2tp @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/l2tp/l2tpv2/qca-nss-l2tpv2.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-l2tpv2)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-l2tp/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for l2tp tunnel
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-pptp
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - PPTP
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-pptp @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/pptp/qca-nss-pptp.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-pptp)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-pptp/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for PPTP tunnel
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-pppoe
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - PPPoE
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-pppoe @!LINUX_3_18 \
|
||||||
|
+!(TARGET_ipq_ipq807x_QSDK_256||TARGET_ipq_ipq60xx_QSDK_256):kmod-bonding
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/pppoe/qca-nss-pppoe.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-pppoe)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-pppoe/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for PPPoE
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-map-t
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - MAP-T
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-nat46 @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/map/map-t/qca-nss-map-t.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-map-t)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-map-t/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for MAP-T
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-gre
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - GRE
|
||||||
|
DEPENDS:=@TARGET_ipq_ipq806x||TARGET_ipq806x||TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx||TARGET_ipq_ipq50xx||TARGET_ipq_ipq50xx_64 \
|
||||||
|
+kmod-qca-nss-drv @!LINUX_3_18 +kmod-gre6
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/gre/qca-nss-gre.ko $(PKG_BUILD_DIR)/gre/test/qca-nss-gre-test.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-gre)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-gre/Description
|
||||||
|
Kernel modules for NSS connection manager - Support for GRE
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-tunipip6
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (connection manager) - DS-lite and ipip6 Tunnel
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-iptunnel6 +kmod-ip6-tunnel @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/tunipip6/qca-nss-tunipip6.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,60,qca-nss-tunipip6)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-tunipip6/Description
|
||||||
|
Kernel modules for NSS connection manager
|
||||||
|
Add support for DS-lite and ipip6 tunnel
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-profile
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18
|
||||||
|
TITLE:=Profiler for QCA NSS driver (IPQ806x)
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/profiler/qca-nss-profile-drv.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-profile/Description
|
||||||
|
This package contains a NSS driver profiler for QCA chipset
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ipsecmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (ipsec manager) - ipsecmgr
|
||||||
|
DEPENDS:=@TARGET_ipq806x||TARGET_ipq_ipq806x||TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx \
|
||||||
|
+kmod-qca-nss-drv +kmod-qca-nss-cfi-cryptoapi +kmod-qca-nss-cfi-ocf @!LINUX_3_18
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-l2tpv2),)
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv-l2tpv2
|
||||||
|
endif
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/ipsecmgr/$(IPSECMGR_DIR)/qca-nss-ipsecmgr.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,60,qca-nss-ipsecmgr)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ipsecmgr/Description
|
||||||
|
Kernel module for NSS IPsec offload manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ipsecmgr-klips
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS (ipsec klips)
|
||||||
|
DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx \
|
||||||
|
+kmod-qca-nss-drv-ipsecmgr kmod-qca-nss-ecm
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/ipsecmgr/$(IPSECMGR_DIR)/plugins/klips/qca-nss-ipsec-klips.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ipsecmgr-klips/Description
|
||||||
|
NSS Kernel module for IPsec klips offload
|
||||||
|
endef
|
||||||
|
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-capwapmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-drv-dtlsmgr @!LINUX_3_18
|
||||||
|
TITLE:=NSS CAPWAP Manager for QCA NSS driver (IPQ806x)
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/capwapmgr/qca-nss-capwapmgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-capwapmgr/Description
|
||||||
|
This package contains a NSS CAPWAP Manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-bridge-mgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS bridge manager
|
||||||
|
DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx \
|
||||||
|
+TARGET_ipq_ipq807x:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq807x:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq_ipq60xx:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq807x_ipq60xx:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \
|
||||||
|
+!(TARGET_ipq_ipq807x_QSDK_256||TARGET_ipq_ipq60xx_QSDK_256):kmod-bonding
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/bridge/qca-nss-bridge-mgr.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-bridge-mgr)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-bridge-mgr/Description
|
||||||
|
Kernel modules for NSS bridge manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-vlan-mgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS vlan manager
|
||||||
|
DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx +kmod-qca-nss-drv @!LINUX_3_18 \
|
||||||
|
+!(TARGET_ipq_ipq807x_QSDK_256||TARGET_ipq_ipq60xx_QSDK_256):kmod-bonding
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/vlan/qca-nss-vlan.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-vlan)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-vlan-mgr/Description
|
||||||
|
Kernel modules for NSS vlan manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-qdisc
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Support
|
||||||
|
TITLE:=Qdisc for configuring shapers in NSS
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/nss_qdisc/qca-nss-qdisc.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,58,qca-nss-qdisc)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-qdisc/Description
|
||||||
|
Linux qdisc that aids in configuring shapers in the NSS
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-igs
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Support
|
||||||
|
TITLE:=Action for offloading traffic to an IFB interface to perform ingress shaping.
|
||||||
|
DEPENDS:=@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx||TARGET_ipq_ipq50xx||TARGET_ipq_ipq50xx_64 \
|
||||||
|
+kmod-qca-nss-drv +kmod-sched-core +kmod-ifb +kmod-qca-nss-drv-qdisc @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/nss_qdisc/igs/act_nssmirred.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-igs/Description
|
||||||
|
Linux action that helps in offloading traffic to an IFB interface to perform ingress shaping.
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-lag-mgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS LAG manager
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18 \
|
||||||
|
+TARGET_ipq_ipq807x:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \
|
||||||
|
+TARGET_ipq807x:kmod-qca-nss-drv-vlan-mgr \
|
||||||
|
+TARGET_ipq807x_ipq807x:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \
|
||||||
|
+TARGET_ipq_ipq60xx:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \
|
||||||
|
+TARGET_ipq807x_ipq60xx:kmod-qca-nss-drv-vlan-mgr @!LINUX_3_18 \
|
||||||
|
+kmod-bonding
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/lag/qca-nss-lag-mgr.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-lag-mgr)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-lag-mgr/Description
|
||||||
|
Kernel modules for NSS LAG manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-netlink
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=@TARGET_ipq807x||TARGET_ipq_ipq807x||TARGET_ipq807x_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx||TARGET_ipq_ipq50xx||TARGET_ipq_ipq50xx_64 \
|
||||||
|
+kmod-qca-nss-drv @!LINUX_3_18 \
|
||||||
|
+PACKAGE_kmod-qca-nss-drv-ipsecmgr:kmod-qca-nss-drv-ipsecmgr \
|
||||||
|
+PACKAGE_kmod-qca-nss-drv-dtlsmgr:kmod-qca-nss-drv-dtlsmgr \
|
||||||
|
+PACKAGE_kmod-qca-nss-drv-capwapmgr:kmod-qca-nss-drv-capwapmgr @!LINUX_3_18
|
||||||
|
TITLE:=NSS NETLINK Manager for QCA NSS driver
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/netlink/qca-nss-netlink.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-netlink/Description
|
||||||
|
Kernel module for NSS netlink manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ovpn-mgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for NSS OpenVPN manager
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-cfi +kmod-tun +kmod-ipt-conntrack @!LINUX_3_18 \
|
||||||
|
@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/openvpn/src/qca-nss-ovpn-mgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ovpn-mgr/Description
|
||||||
|
Kernel module for NSS OpenVPN manager
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ovpn-link
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
TITLE:=Kernel driver for interfacing NSS OpenVPN manager with ECM
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv-ovpn-mgr +kmod-qca-nss-ecm-premium @!LINUX_3_18 \
|
||||||
|
@TARGET_ipq_ipq807x||TARGET_ipq_ipq807x_ipq807x||TARGET_ipq_ipq60xx||TARGET_ipq807x_ipq60xx
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/openvpn/plugins/qca-nss-ovpn-link.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ovpn-link/Description
|
||||||
|
This module registers with ECM and communicates with NSS OpenVPN manager for supporting OpenVPN offload.
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-pvxlanmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18
|
||||||
|
TITLE:=NSS PVXLAN Manager for QCA NSS driver
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/pvxlanmgr/qca-nss-pvxlanmgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-pvxlanmgr/Description
|
||||||
|
Kernel module for managing NSS PVxLAN
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-eogremgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-drv-gre @!LINUX_3_18
|
||||||
|
TITLE:=NSS EOGRE Manager for QCA NSS driver
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/eogremgr/qca-nss-eogremgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-eogremgr/Description
|
||||||
|
Kernel module for managing NSS EoGRE
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-clmapmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-qca-nss-drv-eogremgr @!LINUX_3_18
|
||||||
|
TITLE:=NSS clmap Manager for QCA NSS driver
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/clmapmgr/qca-nss-clmapmgr.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-clmapmgr/Description
|
||||||
|
Kernel module for managing NSS clmap
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-vxlanmgr
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv +kmod-vxlan @!LINUX_3_18
|
||||||
|
TITLE:=NSS VxLAN Manager for QCA NSS driver
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/vxlanmgr/qca-nss-vxlanmgr.ko
|
||||||
|
AUTOLOAD:=$(call AutoLoad,51,qca-nss-vxlanmgr)
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-vxlanmgr/Description
|
||||||
|
Kernel module for managing NSS VxLAN
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-match
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Devices
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18
|
||||||
|
TITLE:=NSS Match for QCA NSS driver
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/match/qca-nss-match.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-match/Description
|
||||||
|
Kernel module for managing NSS Match
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-mirror
|
||||||
|
SECTION:=kernel
|
||||||
|
CATEGORY:=Kernel modules
|
||||||
|
SUBMENU:=Network Support
|
||||||
|
TITLE:=Module for mirroring packets from NSS to host.
|
||||||
|
DEPENDS:=+kmod-qca-nss-drv @!LINUX_3_18
|
||||||
|
FILES:=$(PKG_BUILD_DIR)/mirror/qca-nss-mirror.ko
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-mirror/Description
|
||||||
|
Kernel module for managing NSS Mirror
|
||||||
|
endef
|
||||||
|
|
||||||
|
define Build/InstallDev/qca-nss-clients
|
||||||
|
$(INSTALL_DIR) $(1)/usr/include/qca-nss-clients
|
||||||
|
$(CP) $(PKG_BUILD_DIR)/netlink/include/* $(1)/usr/include/qca-nss-clients/
|
||||||
|
$(CP) $(PKG_BUILD_DIR)/exports/* $(1)/usr/include/qca-nss-clients/
|
||||||
|
endef
|
||||||
|
|
||||||
|
define Build/InstallDev
|
||||||
|
$(call Build/InstallDev/qca-nss-clients,$(1))
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ovpn-mgr/install
|
||||||
|
$(INSTALL_DIR) $(1)/etc/init.d
|
||||||
|
$(INSTALL_BIN) ./files/qca-nss-ovpn.init $(1)/etc/init.d/qca-nss-ovpn
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-ipsecmgr-klips/install
|
||||||
|
$(INSTALL_DIR) $(1)/etc/init.d
|
||||||
|
$(INSTALL_BIN) ./files/qca-nss-ipsec $(1)/etc/init.d/qca-nss-ipsec
|
||||||
|
endef
|
||||||
|
|
||||||
|
define KernelPackage/qca-nss-drv-igs/install
|
||||||
|
$(INSTALL_DIR) $(1)/etc/init.d
|
||||||
|
$(INSTALL_BIN) ./files/qca-nss-mirred.init $(1)/etc/init.d/qca-nss-mirred
|
||||||
|
endef
|
||||||
|
|
||||||
|
EXTRA_CFLAGS+= \
|
||||||
|
-I$(STAGING_DIR)/usr/include/qca-nss-drv \
|
||||||
|
-I$(STAGING_DIR)/usr/include/qca-nss-crypto \
|
||||||
|
-I$(STAGING_DIR)/usr/include/qca-nss-cfi \
|
||||||
|
-I$(STAGING_DIR)/usr/include/qca-nss-gmac \
|
||||||
|
-I$(STAGING_DIR)/usr/include/qca-ssdk \
|
||||||
|
-I$(STAGING_DIR)/usr/include/qca-ssdk/fal \
|
||||||
|
-I$(STAGING_DIR)/usr/include/nat46
|
||||||
|
|
||||||
|
# Build individual packages if selected
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-profile),)
|
||||||
|
MAKE_OPTS+=profile=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-capwapmgr),)
|
||||||
|
MAKE_OPTS+=capwapmgr=y
|
||||||
|
EXTRA_CFLAGS += -DNSS_CAPWAPMGR_ONE_NETDEV
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-tun6rd),)
|
||||||
|
MAKE_OPTS+=tun6rd=m
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-dtlsmgr),)
|
||||||
|
MAKE_OPTS+=dtlsmgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-tlsmgr),)
|
||||||
|
MAKE_OPTS+=tlsmgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-l2tpv2),)
|
||||||
|
MAKE_OPTS+=l2tpv2=y
|
||||||
|
EXTRA_CFLAGS += -DNSS_L2TPV2_ENABLED
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-pptp),)
|
||||||
|
MAKE_OPTS+=pptp=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-map-t),)
|
||||||
|
MAKE_OPTS+=map-t=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-tunipip6),)
|
||||||
|
MAKE_OPTS+=tunipip6=m
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-qdisc),)
|
||||||
|
MAKE_OPTS+=qdisc=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-igs),)
|
||||||
|
MAKE_OPTS+=igs=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ipsecmgr),)
|
||||||
|
EXTRA_CFLAGS+= -I$(PKG_BUILD_DIR)/exports
|
||||||
|
MAKE_OPTS+=ipsecmgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ipsecmgr-klips),)
|
||||||
|
EXTRA_CFLAGS+= -I$(STAGING_DIR)/usr/include/qca-nss-ecm
|
||||||
|
MAKE_OPTS+=ipsecmgr-klips=m
|
||||||
|
endif
|
||||||
|
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-bridge-mgr),)
|
||||||
|
MAKE_OPTS+=bridge-mgr=y
|
||||||
|
#enable OVS bridge if ovsmgr is enabled
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-ovsmgr),)
|
||||||
|
MAKE_OPTS+= NSS_BRIDGE_MGR_OVS_ENABLE=y
|
||||||
|
EXTRA_CFLAGS+= -I$(STAGING_DIR)/usr/include/qca-ovsmgr
|
||||||
|
endif
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-vlan-mgr),)
|
||||||
|
MAKE_OPTS+=vlan-mgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-lag-mgr),)
|
||||||
|
MAKE_OPTS+=lag-mgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-gre),)
|
||||||
|
EXTRA_CFLAGS+= -I$(PKG_BUILD_DIR)/exports
|
||||||
|
MAKE_OPTS+=gre=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-pppoe),)
|
||||||
|
MAKE_OPTS+=pppoe=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-netlink),)
|
||||||
|
MAKE_OPTS+=netlink=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ovpn-mgr),)
|
||||||
|
MAKE_OPTS+=ovpn-mgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-ovpn-link),)
|
||||||
|
MAKE_OPTS+=ovpn-link=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-pvxlanmgr),)
|
||||||
|
MAKE_OPTS+=pvxlanmgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-eogremgr),)
|
||||||
|
MAKE_OPTS+=eogremgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-clmapmgr),)
|
||||||
|
MAKE_OPTS+=clmapmgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-vxlanmgr),)
|
||||||
|
MAKE_OPTS+=vxlanmgr=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-match),)
|
||||||
|
MAKE_OPTS+=match=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
ifneq ($(CONFIG_PACKAGE_kmod-qca-nss-drv-mirror),)
|
||||||
|
MAKE_OPTS+=mirror=y
|
||||||
|
endif
|
||||||
|
|
||||||
|
define Build/Compile
|
||||||
|
$(MAKE) -C "$(LINUX_DIR)" $(strip $(MAKE_OPTS)) \
|
||||||
|
CROSS_COMPILE="$(TARGET_CROSS)" \
|
||||||
|
ARCH="$(LINUX_KARCH)" \
|
||||||
|
M="$(PKG_BUILD_DIR)" \
|
||||||
|
EXTRA_CFLAGS="$(EXTRA_CFLAGS)" \
|
||||||
|
SoC="$(subtarget)" \
|
||||||
|
DTLSMGR_DIR="$(DTLSMGR_DIR)" \
|
||||||
|
IPSECMGR_DIR="$(IPSECMGR_DIR)" \
|
||||||
|
modules
|
||||||
|
endef
|
||||||
|
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-profile))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-capwapmgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-tun6rd))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-dtlsmgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-l2tpv2))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-pptp))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-pppoe))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-map-t))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-tunipip6))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-qdisc))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-igs))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-netlink))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-ipsecmgr))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-ipsecmgr-klips))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-bridge-mgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-vlan-mgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-lag-mgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-gre))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-ovpn-mgr))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-ovpn-link))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-pvxlanmgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-eogremgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-clmapmgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-vxlanmgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-match))
|
||||||
|
#$(eval $(call KernelPackage,qca-nss-drv-tlsmgr))
|
||||||
|
$(eval $(call KernelPackage,qca-nss-drv-mirror))
|
||||||
92
feeds/ipq807x/qca-nss-clients/files/qca-nss-ipsec
Executable file
92
feeds/ipq807x/qca-nss-clients/files/qca-nss-ipsec
Executable file
@@ -0,0 +1,92 @@
|
|||||||
|
#!/bin/sh /etc/rc.common
|
||||||
|
#
|
||||||
|
# Copyright (c) 2018-2019 The Linux Foundation. All rights reserved.
|
||||||
|
#
|
||||||
|
# Permission to use, copy, modify, and/or distribute this software for any
|
||||||
|
# purpose with or without fee is hereby granted, provided that the above
|
||||||
|
# copyright notice and this permission notice appear in all copies.
|
||||||
|
#
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||||
|
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||||
|
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||||
|
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||||
|
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||||
|
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
||||||
|
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||||
|
|
||||||
|
NSS_IPSEC_LOG_FILE=/tmp/.nss_ipsec_log
|
||||||
|
NSS_IPSEC_LOG_STR_ECM="ECM_Loaded"
|
||||||
|
|
||||||
|
ecm_load () {
|
||||||
|
if [ ! -d /sys/module/ecm ]; then
|
||||||
|
/etc/init.d/qca-nss-ecm start
|
||||||
|
if [ -d /sys/module/ecm ]; then
|
||||||
|
echo ${NSS_IPSEC_LOG_STR_ECM} >> ${NSS_IPSEC_LOG_FILE}
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
ecm_unload () {
|
||||||
|
if [ -f /tmp/.nss_ipsec_log ]; then
|
||||||
|
str=`grep ${NSS_IPSEC_LOG_STR_ECM} ${NSS_IPSEC_LOG_FILE}`
|
||||||
|
if [[ $str == ${NSS_IPSEC_LOG_STR_ECM} ]]; then
|
||||||
|
/etc/init.d/qca-nss-ecm stop
|
||||||
|
`sed 's/${NSS_IPSEC_LOG_STR_ECM}/ /g' $NSS_IPSEC_LOG_FILE > $NSS_IPSEC_LOG_FILE`
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
ecm_disable() {
|
||||||
|
|
||||||
|
if [ ! -d /sys/module/ecm ]; then
|
||||||
|
return;
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo 1 > /sys/kernel/debug/ecm/front_end_ipv4_stop
|
||||||
|
echo 1 > /sys/kernel/debug/ecm/front_end_ipv6_stop
|
||||||
|
echo 1 > /sys/kernel/debug/ecm/ecm_db/defunct_all
|
||||||
|
sleep 2
|
||||||
|
}
|
||||||
|
|
||||||
|
ecm_enable() {
|
||||||
|
if [ ! -d /sys/module/ecm ]; then
|
||||||
|
return;
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo 0 > /sys/kernel/debug/ecm/ecm_db/defunct_all
|
||||||
|
echo 0 > /sys/kernel/debug/ecm/front_end_ipv4_stop
|
||||||
|
echo 0 > /sys/kernel/debug/ecm/front_end_ipv6_stop
|
||||||
|
}
|
||||||
|
|
||||||
|
start() {
|
||||||
|
ecm_load
|
||||||
|
|
||||||
|
local kernel_version=$(uname -r)
|
||||||
|
|
||||||
|
insmod /lib/modules/${kernel_version}/qca-nss-ipsec-klips.ko
|
||||||
|
if [ "$?" -gt 0 ]; then
|
||||||
|
echo "Failed to load plugin. Please start ecm if not done already"
|
||||||
|
ecm_enable
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
/etc/init.d/ipsec start
|
||||||
|
sleep 2
|
||||||
|
ipsec eroute
|
||||||
|
|
||||||
|
ecm_enable
|
||||||
|
}
|
||||||
|
|
||||||
|
stop() {
|
||||||
|
ecm_disable
|
||||||
|
|
||||||
|
/etc/init.d/ipsec stop
|
||||||
|
rmmod qca-nss-ipsec-klips
|
||||||
|
|
||||||
|
ecm_unload
|
||||||
|
}
|
||||||
|
|
||||||
|
restart() {
|
||||||
|
stop
|
||||||
|
start
|
||||||
|
}
|
||||||
28
feeds/ipq807x/qca-nss-clients/files/qca-nss-mirred.init
Normal file
28
feeds/ipq807x/qca-nss-clients/files/qca-nss-mirred.init
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
#!/bin/sh /etc/rc.common
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
|
||||||
|
# Permission to use, copy, modify, and/or distribute this software for
|
||||||
|
# any purpose with or without fee is hereby granted, provided that the
|
||||||
|
# above copyright notice and this permission notice appear in all copies.
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||||
|
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||||
|
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||||
|
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||||
|
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||||
|
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
|
||||||
|
# OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||||
|
###########################################################################
|
||||||
|
|
||||||
|
restart() {
|
||||||
|
rmmod act_nssmirred.ko
|
||||||
|
insmod act_nssmirred.ko
|
||||||
|
}
|
||||||
|
|
||||||
|
start() {
|
||||||
|
insmod act_nssmirred.ko
|
||||||
|
}
|
||||||
|
|
||||||
|
stop() {
|
||||||
|
rmmod act_nssmirred.ko
|
||||||
|
}
|
||||||
69
feeds/ipq807x/qca-nss-clients/files/qca-nss-ovpn.init
Normal file
69
feeds/ipq807x/qca-nss-clients/files/qca-nss-ovpn.init
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
#!/bin/sh /etc/rc.common
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# Copyright (c) 2019, The Linux Foundation. All rights reserved.
|
||||||
|
# Permission to use, copy, modify, and/or distribute this software for
|
||||||
|
# any purpose with or without fee is hereby granted, provided that the
|
||||||
|
# above copyright notice and this permission notice appear in all copies.
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
||||||
|
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
||||||
|
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
||||||
|
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
||||||
|
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
||||||
|
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
|
||||||
|
# OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||||
|
###########################################################################
|
||||||
|
|
||||||
|
ecm_disable() {
|
||||||
|
if [ ! -d /sys/module/ecm ]; then
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo 1 > /sys/kernel/debug/ecm/front_end_ipv4_stop
|
||||||
|
echo 1 > /sys/kernel/debug/ecm/front_end_ipv6_stop
|
||||||
|
echo 1 > /sys/kernel/debug/ecm/ecm_db/defunct_all
|
||||||
|
sleep 2
|
||||||
|
}
|
||||||
|
|
||||||
|
ecm_enable() {
|
||||||
|
if [ ! -d /sys/module/ecm ]; then
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo 0 > /sys/kernel/debug/ecm/ecm_db/defunct_all
|
||||||
|
echo 0 > /sys/kernel/debug/ecm/front_end_ipv4_stop
|
||||||
|
echo 0 > /sys/kernel/debug/ecm/front_end_ipv6_stop
|
||||||
|
}
|
||||||
|
|
||||||
|
restart() {
|
||||||
|
ecm_disable
|
||||||
|
|
||||||
|
/etc/init.d/openvpn stop
|
||||||
|
rmmod qca-nss-ovpn-link
|
||||||
|
rmmod qca-nss-ovpn-mgr
|
||||||
|
|
||||||
|
insmod qca-nss-ovpn-mgr
|
||||||
|
insmod qca-nss-ovpn-link
|
||||||
|
|
||||||
|
if [ "$?" -gt 0 ]; then
|
||||||
|
echo "Failed to load plugin. Please start ecm if not done already"
|
||||||
|
ecm_enable
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
ecm_enable
|
||||||
|
}
|
||||||
|
|
||||||
|
start() {
|
||||||
|
restart
|
||||||
|
}
|
||||||
|
|
||||||
|
stop() {
|
||||||
|
ecm_disable
|
||||||
|
|
||||||
|
/etc/init.d/openvpn stop
|
||||||
|
rmmod qca-nss-ovpn-link
|
||||||
|
rmmod qca-nss-ovpn-mgr
|
||||||
|
|
||||||
|
ecm_enable
|
||||||
|
}
|
||||||
@@ -214,6 +214,9 @@ hostapd_common_add_bss_config() {
|
|||||||
config_add_int maxassoc max_inactivity
|
config_add_int maxassoc max_inactivity
|
||||||
config_add_boolean disassoc_low_ack isolate short_preamble
|
config_add_boolean disassoc_low_ack isolate short_preamble
|
||||||
|
|
||||||
|
config_add_int signal_connect signal_stay signal_poll_time \
|
||||||
|
signal_drop_reason signal_strikes
|
||||||
|
|
||||||
config_add_int \
|
config_add_int \
|
||||||
wep_rekey eap_reauth_period \
|
wep_rekey eap_reauth_period \
|
||||||
wpa_group_rekey wpa_pair_rekey wpa_master_rekey
|
wpa_group_rekey wpa_pair_rekey wpa_master_rekey
|
||||||
@@ -485,6 +488,7 @@ hostapd_set_bss_options() {
|
|||||||
local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt
|
local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_key_mgmt
|
||||||
|
|
||||||
json_get_vars \
|
json_get_vars \
|
||||||
|
signal_connect signal_stay signal_poll_time signal_drop_reason signal_strikes \
|
||||||
wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_strict_rekey \
|
wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey wpa_strict_rekey \
|
||||||
wpa_disable_eapol_key_retries tdls_prohibit \
|
wpa_disable_eapol_key_retries tdls_prohibit \
|
||||||
maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
|
maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
|
||||||
@@ -520,8 +524,15 @@ hostapd_set_bss_options() {
|
|||||||
set_default rssi_reject_assoc_rssi 0
|
set_default rssi_reject_assoc_rssi 0
|
||||||
set_default rssi_ignore_probe_request 0
|
set_default rssi_ignore_probe_request 0
|
||||||
set_default rts_threshold -1
|
set_default rts_threshold -1
|
||||||
|
set_default signal_connect -128
|
||||||
|
set_default signal_stay -128
|
||||||
|
set_default signal_poll_time 5
|
||||||
|
set_default signal_drop_reason 3
|
||||||
|
set_default signal_strikes 3
|
||||||
set_default proxy_arp 0
|
set_default proxy_arp 0
|
||||||
set_default multicast_to_unicast 0
|
set_default multicast_to_unicast 0
|
||||||
|
|
||||||
|
|
||||||
append bss_conf "ctrl_interface=/var/run/hostapd"
|
append bss_conf "ctrl_interface=/var/run/hostapd"
|
||||||
if [ "$isolate" -gt 0 ]; then
|
if [ "$isolate" -gt 0 ]; then
|
||||||
append bss_conf "ap_isolate=$isolate" "$N"
|
append bss_conf "ap_isolate=$isolate" "$N"
|
||||||
@@ -549,6 +560,11 @@ hostapd_set_bss_options() {
|
|||||||
append bss_conf "rssi_reject_assoc_rssi=$rssi_reject_assoc_rssi" "$N"
|
append bss_conf "rssi_reject_assoc_rssi=$rssi_reject_assoc_rssi" "$N"
|
||||||
append bss_conf "rssi_ignore_probe_request=$rssi_ignore_probe_request" "$N"
|
append bss_conf "rssi_ignore_probe_request=$rssi_ignore_probe_request" "$N"
|
||||||
append bss_conf "rts_threshold=$rts_threshold" "$N"
|
append bss_conf "rts_threshold=$rts_threshold" "$N"
|
||||||
|
append bss_conf "signal_connect=$signal_connect" "$N"
|
||||||
|
append bss_conf "signal_stay=$signal_stay" "$N"
|
||||||
|
append bss_conf "signal_poll_time=$signal_poll_time" "$N"
|
||||||
|
append bss_conf "signal_strikes=$signal_strikes" "$N"
|
||||||
|
append bss_conf "signal_drop_reason=$signal_drop_reason" "$N"
|
||||||
|
|
||||||
[ -n "$proxy_arp" ] && append bss_conf "proxy_arp=$proxy_arp" "$N"
|
[ -n "$proxy_arp" ] && append bss_conf "proxy_arp=$proxy_arp" "$N"
|
||||||
[ -n "$multicast_to_unicast" ] && append bss_conf "multicast_to_unicast=$multicast_to_unicast" "$N"
|
[ -n "$multicast_to_unicast" ] && append bss_conf "multicast_to_unicast=$multicast_to_unicast" "$N"
|
||||||
@@ -831,7 +847,15 @@ hostapd_set_bss_options() {
|
|||||||
json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout
|
json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout
|
||||||
append bss_conf "ieee80211w=$ieee80211w" "$N"
|
append bss_conf "ieee80211w=$ieee80211w" "$N"
|
||||||
[ "$ieee80211w" -gt "0" ] && {
|
[ "$ieee80211w" -gt "0" ] && {
|
||||||
append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N"
|
case "$auth_type" in
|
||||||
|
eap192)
|
||||||
|
append bss_conf "group_mgmt_cipher=BIP-GMAC-256" "$N"
|
||||||
|
append bss_conf "group_cipher=GCMP-256" "$N"
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N"
|
||||||
|
;;
|
||||||
|
esac
|
||||||
[ -n "$ieee80211w_max_timeout" ] && \
|
[ -n "$ieee80211w_max_timeout" ] && \
|
||||||
append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
|
append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
|
||||||
[ -n "$ieee80211w_retry_timeout" ] && \
|
[ -n "$ieee80211w_retry_timeout" ] && \
|
||||||
@@ -961,10 +985,10 @@ hostapd_set_bss_options() {
|
|||||||
if [ "$hs20" = "1" ]; then
|
if [ "$hs20" = "1" ]; then
|
||||||
append bss_conf "hs20=1" "$N"
|
append bss_conf "hs20=1" "$N"
|
||||||
append_hs20_icons
|
append_hs20_icons
|
||||||
[ -n "$disable_dgaf"] && append bss_conf "disable_dgaf=$disable_dgaf" "$N"
|
[ -n "$disable_dgaf" ] && append bss_conf "disable_dgaf=$disable_dgaf" "$N"
|
||||||
[ -n "$osen"] && append bss_conf "osen=$osen" "$N"
|
[ -n "$osen" ] && append bss_conf "osen=$osen" "$N"
|
||||||
[ "$anqp_domain_id" -gt 0 ] && append bss_conf "anqp_domain_id=$anqp_domain_id" "$N"
|
[ "$anqp_domain_id" -gt 0 ] && append bss_conf "anqp_domain_id=$anqp_domain_id" "$N"
|
||||||
[ -n "$hs20_deauth_req_timeout"] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N"
|
[ -n "$hs20_deauth_req_timeout" ] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N"
|
||||||
[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N"
|
[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N"
|
||||||
[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N"
|
[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N"
|
||||||
[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N"
|
[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N"
|
||||||
|
|||||||
32
feeds/wifi-ax/hostapd/patches/f00-014-fix-ubus-assoc.patch
Normal file
32
feeds/wifi-ax/hostapd/patches/f00-014-fix-ubus-assoc.patch
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
--- a/src/ap/ieee802_11.c
|
||||||
|
+++ b/src/ap/ieee802_11.c
|
||||||
|
@@ -4463,6 +4463,14 @@ static void handle_assoc(struct hostapd_
|
||||||
|
ieee802_11_set_beacons(hapd->iface);
|
||||||
|
}
|
||||||
|
|
||||||
|
+ ubus_resp = hostapd_ubus_handle_event(hapd, &req);
|
||||||
|
+ if (ubus_resp) {
|
||||||
|
+ wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n",
|
||||||
|
+ MAC2STR(mgmt->sa));
|
||||||
|
+ resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||||
|
+ goto fail;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
update_ht_state(hapd, sta);
|
||||||
|
|
||||||
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
||||||
|
@@ -4568,14 +4576,6 @@ static void handle_assoc(struct hostapd_
|
||||||
|
pos, left, rssi, omit_rsnxe);
|
||||||
|
os_free(tmp);
|
||||||
|
|
||||||
|
- ubus_resp = hostapd_ubus_handle_event(hapd, &req);
|
||||||
|
- if (ubus_resp) {
|
||||||
|
- wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n",
|
||||||
|
- MAC2STR(mgmt->sa));
|
||||||
|
- resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||||
|
- goto fail;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
/*
|
||||||
|
* Remove the station in case tranmission of a success response fails
|
||||||
|
* (the STA was added associated to the driver) or if the station was
|
||||||
@@ -0,0 +1,84 @@
|
|||||||
|
From 0e23a88c63d6abbeaef8ec90bd29584b7c5068bd Mon Sep 17 00:00:00 2001
|
||||||
|
From: Sriram R <srirrama@codeaurora.org>
|
||||||
|
Date: Thu, 10 Dec 2020 14:20:50 +0530
|
||||||
|
Subject: [PATCH] ath11k: Clear the fragment cache during key install
|
||||||
|
|
||||||
|
Currently the fragment cache setup during peer assoc is
|
||||||
|
cleared during peer delete. In case a key reinstallation
|
||||||
|
happens with the same peer, possibilitites are same fragment cache
|
||||||
|
where some fragments were added before key installation could be clubbed
|
||||||
|
with fragments received after. In ideal cases where
|
||||||
|
this could result in wrong PN since we expect all fragments to
|
||||||
|
have incrementing PN, this behavior could be explioted
|
||||||
|
to mix fragments of different data resulting in a proper
|
||||||
|
unintended reassembled packet to be passed up the stack.
|
||||||
|
|
||||||
|
Signed-off-by: Sriram R <srirrama@codeaurora.org>
|
||||||
|
---
|
||||||
|
drivers/net/wireless/ath/ath11k/dp_rx.c | 19 +++++++++++++++++++
|
||||||
|
drivers/net/wireless/ath/ath11k/dp_rx.h | 1 +
|
||||||
|
drivers/net/wireless/ath/ath11k/mac.c | 6 ++++++
|
||||||
|
3 files changed, 26 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/drivers/net/wireless/ath/ath11k/dp_rx.c b/drivers/net/wireless/ath/ath11k/dp_rx.c
|
||||||
|
index 0fa25c1..06bbd6e 100644
|
||||||
|
--- a/drivers/net/wireless/ath/ath11k/dp_rx.c
|
||||||
|
+++ b/drivers/net/wireless/ath/ath11k/dp_rx.c
|
||||||
|
@@ -844,6 +844,25 @@ static void ath11k_dp_rx_frags_cleanup(struct dp_rx_tid *rx_tid, bool rel_link_d
|
||||||
|
__skb_queue_purge(&rx_tid->rx_frags);
|
||||||
|
}
|
||||||
|
|
||||||
|
+void ath11k_peer_frags_flush(struct ath11k *ar, struct ath11k_peer *peer)
|
||||||
|
+{
|
||||||
|
+ struct dp_rx_tid *rx_tid;
|
||||||
|
+ int i;
|
||||||
|
+
|
||||||
|
+ lockdep_assert_held(&ar->ab->base_lock);
|
||||||
|
+
|
||||||
|
+ for (i = 0; i <= IEEE80211_NUM_TIDS; i++) {
|
||||||
|
+ rx_tid = &peer->rx_tid[i];
|
||||||
|
+
|
||||||
|
+ spin_unlock_bh(&ar->ab->base_lock);
|
||||||
|
+ del_timer_sync(&rx_tid->frag_timer);
|
||||||
|
+ spin_lock_bh(&ar->ab->base_lock);
|
||||||
|
+
|
||||||
|
+ ath11k_dp_rx_frags_cleanup(rx_tid, true);
|
||||||
|
+
|
||||||
|
+ }
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
void ath11k_peer_rx_tid_cleanup(struct ath11k *ar, struct ath11k_peer *peer)
|
||||||
|
{
|
||||||
|
struct dp_rx_tid *rx_tid;
|
||||||
|
diff --git a/drivers/net/wireless/ath/ath11k/dp_rx.h b/drivers/net/wireless/ath/ath11k/dp_rx.h
|
||||||
|
index f005ded..732f9a7 100644
|
||||||
|
--- a/drivers/net/wireless/ath/ath11k/dp_rx.h
|
||||||
|
+++ b/drivers/net/wireless/ath/ath11k/dp_rx.h
|
||||||
|
@@ -68,6 +68,7 @@ int ath11k_dp_peer_rx_pn_replay_config(struct ath11k_vif *arvif,
|
||||||
|
const u8 *peer_addr,
|
||||||
|
enum set_key_cmd key_cmd,
|
||||||
|
struct ieee80211_key_conf *key);
|
||||||
|
+void ath11k_peer_frags_flush(struct ath11k *ar, struct ath11k_peer *peer);
|
||||||
|
void ath11k_peer_rx_tid_cleanup(struct ath11k *ar, struct ath11k_peer *peer);
|
||||||
|
void ath11k_peer_rx_tid_delete(struct ath11k *ar,
|
||||||
|
struct ath11k_peer *peer, u8 tid);
|
||||||
|
diff --git a/drivers/net/wireless/ath/ath11k/mac.c b/drivers/net/wireless/ath/ath11k/mac.c
|
||||||
|
index 4c88eab..91d645e 100644
|
||||||
|
--- a/drivers/net/wireless/ath/ath11k/mac.c
|
||||||
|
+++ b/drivers/net/wireless/ath/ath11k/mac.c
|
||||||
|
@@ -3707,6 +3707,12 @@ static int ath11k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd,
|
||||||
|
*/
|
||||||
|
spin_lock_bh(&ab->base_lock);
|
||||||
|
peer = ath11k_peer_find(ab, arvif->vdev_id, peer_addr);
|
||||||
|
+
|
||||||
|
+ /* flush the fragments cache during key (re)install to
|
||||||
|
+ * ensure all frags in the new frag list belong to the same key.
|
||||||
|
+ */
|
||||||
|
+ if (peer && cmd == SET_KEY)
|
||||||
|
+ ath11k_peer_frags_flush(ar, peer);
|
||||||
|
spin_unlock_bh(&ab->base_lock);
|
||||||
|
|
||||||
|
if (!peer) {
|
||||||
|
--
|
||||||
|
2.7.4
|
||||||
|
|
||||||
242
feeds/wifi-ax/mac80211/patches/pending/213-mac80211-frag.patch
Normal file
242
feeds/wifi-ax/mac80211/patches/pending/213-mac80211-frag.patch
Normal file
@@ -0,0 +1,242 @@
|
|||||||
|
From patchwork Tue May 11 18:02:44 2021
|
||||||
|
Content-Type: text/plain; charset="utf-8"
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Transfer-Encoding: 7bit
|
||||||
|
X-Patchwork-Submitter: Johannes Berg <johannes@sipsolutions.net>
|
||||||
|
X-Patchwork-Id: 12251641
|
||||||
|
X-Patchwork-Delegate: johannes@sipsolutions.net
|
||||||
|
Return-Path: <linux-wireless-owner@kernel.org>
|
||||||
|
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
|
||||||
|
aws-us-west-2-korg-lkml-1.web.codeaurora.org
|
||||||
|
X-Spam-Level:
|
||||||
|
X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00,
|
||||||
|
HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH,
|
||||||
|
MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT
|
||||||
|
autolearn=unavailable autolearn_force=no version=3.4.0
|
||||||
|
Received: from mail.kernel.org (mail.kernel.org [198.145.29.99])
|
||||||
|
by smtp.lore.kernel.org (Postfix) with ESMTP id 5E0C4C43617
|
||||||
|
for <linux-wireless@archiver.kernel.org>;
|
||||||
|
Tue, 11 May 2021 18:03:20 +0000 (UTC)
|
||||||
|
Received: from vger.kernel.org (vger.kernel.org [23.128.96.18])
|
||||||
|
by mail.kernel.org (Postfix) with ESMTP id 2E1D461625
|
||||||
|
for <linux-wireless@archiver.kernel.org>;
|
||||||
|
Tue, 11 May 2021 18:03:20 +0000 (UTC)
|
||||||
|
Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand
|
||||||
|
id S231693AbhEKSEZ (ORCPT
|
||||||
|
<rfc822;linux-wireless@archiver.kernel.org>);
|
||||||
|
Tue, 11 May 2021 14:04:25 -0400
|
||||||
|
Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41156 "EHLO
|
||||||
|
lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org
|
||||||
|
with ESMTP id S231561AbhEKSEV (ORCPT
|
||||||
|
<rfc822;linux-wireless@vger.kernel.org>);
|
||||||
|
Tue, 11 May 2021 14:04:21 -0400
|
||||||
|
Received: from sipsolutions.net (s3.sipsolutions.net
|
||||||
|
[IPv6:2a01:4f8:191:4433::2])
|
||||||
|
by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D055CC06175F;
|
||||||
|
Tue, 11 May 2021 11:03:10 -0700 (PDT)
|
||||||
|
Received: by sipsolutions.net with esmtpsa
|
||||||
|
(TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
|
||||||
|
(Exim 4.94.2)
|
||||||
|
(envelope-from <johannes@sipsolutions.net>)
|
||||||
|
id 1lgWir-007aAS-9o; Tue, 11 May 2021 20:03:09 +0200
|
||||||
|
From: Johannes Berg <johannes@sipsolutions.net>
|
||||||
|
To: linux-wireless@vger.kernel.org
|
||||||
|
Cc: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be>, stable@vger.kernel.org
|
||||||
|
Subject: [PATCH 03/18] mac80211: properly handle A-MSDUs that start with an
|
||||||
|
RFC 1042 header
|
||||||
|
Date: Tue, 11 May 2021 20:02:44 +0200
|
||||||
|
Message-Id:
|
||||||
|
<20210511200110.0b2b886492f0.I23dd5d685fe16d3b0ec8106e8f01b59f499dffed@changeid>
|
||||||
|
X-Mailer: git-send-email 2.30.2
|
||||||
|
In-Reply-To: <20210511180259.159598-1-johannes@sipsolutions.net>
|
||||||
|
References: <20210511180259.159598-1-johannes@sipsolutions.net>
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Precedence: bulk
|
||||||
|
List-ID: <linux-wireless.vger.kernel.org>
|
||||||
|
X-Mailing-List: linux-wireless@vger.kernel.org
|
||||||
|
|
||||||
|
From: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be>
|
||||||
|
|
||||||
|
Properly parse A-MSDUs whose first 6 bytes happen to equal a rfc1042
|
||||||
|
header. This can occur in practice when the destination MAC address
|
||||||
|
equals AA:AA:03:00:00:00. More importantly, this simplifies the next
|
||||||
|
patch to mitigate A-MSDU injection attacks.
|
||||||
|
|
||||||
|
Cc: stable@vger.kernel.org
|
||||||
|
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@kuleuven.be>
|
||||||
|
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
|
||||||
|
---
|
||||||
|
include/net/cfg80211.h | 4 ++--
|
||||||
|
net/mac80211/rx.c | 2 +-
|
||||||
|
net/wireless/util.c | 4 ++--
|
||||||
|
3 files changed, 5 insertions(+), 5 deletions(-)
|
||||||
|
|
||||||
|
Index: backports-20200902_001-4.4.60-931c337125/include/net/cfg80211.h
|
||||||
|
===================================================================
|
||||||
|
--- backports-20200902_001-4.4.60-931c337125.orig/include/net/cfg80211.h
|
||||||
|
+++ backports-20200902_001-4.4.60-931c337125/include/net/cfg80211.h
|
||||||
|
@@ -5631,7 +5631,7 @@ unsigned int ieee80211_get_mesh_hdrlen(s
|
||||||
|
*/
|
||||||
|
int ieee80211_data_to_8023_exthdr(struct sk_buff *skb, struct ethhdr *ehdr,
|
||||||
|
const u8 *addr, enum nl80211_iftype iftype,
|
||||||
|
- u8 data_offset);
|
||||||
|
+ u8 data_offset, bool is_amsdu);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* ieee80211_data_to_8023 - convert an 802.11 data frame to 802.3
|
||||||
|
@@ -5643,7 +5643,7 @@ int ieee80211_data_to_8023_exthdr(struct
|
||||||
|
static inline int ieee80211_data_to_8023(struct sk_buff *skb, const u8 *addr,
|
||||||
|
enum nl80211_iftype iftype)
|
||||||
|
{
|
||||||
|
- return ieee80211_data_to_8023_exthdr(skb, NULL, addr, iftype, 0);
|
||||||
|
+ return ieee80211_data_to_8023_exthdr(skb, NULL, addr, iftype, 0, false);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
Index: backports-20200902_001-4.4.60-931c337125/net/mac80211/rx.c
|
||||||
|
===================================================================
|
||||||
|
--- backports-20200902_001-4.4.60-931c337125.orig/net/mac80211/rx.c
|
||||||
|
+++ backports-20200902_001-4.4.60-931c337125/net/mac80211/rx.c
|
||||||
|
@@ -6,7 +6,7 @@
|
||||||
|
* Copyright 2007-2010 Johannes Berg <johannes@sipsolutions.net>
|
||||||
|
* Copyright 2013-2014 Intel Mobile Communications GmbH
|
||||||
|
* Copyright(c) 2015 - 2017 Intel Deutschland GmbH
|
||||||
|
- * Copyright (C) 2018-2020 Intel Corporation
|
||||||
|
+ * Copyright (C) 2018-2021 Intel Corporation
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <linux/jiffies.h>
|
||||||
|
@@ -2555,13 +2555,13 @@ static bool ieee80211_frame_allowed(stru
|
||||||
|
struct ethhdr *ehdr = (struct ethhdr *) rx->skb->data;
|
||||||
|
|
||||||
|
/*
|
||||||
|
- * Allow EAPOL frames to us/the PAE group address regardless
|
||||||
|
- * of whether the frame was encrypted or not.
|
||||||
|
- */
|
||||||
|
- if (ehdr->h_proto == rx->sdata->control_port_protocol &&
|
||||||
|
- (ether_addr_equal(ehdr->h_dest, rx->sdata->vif.addr) ||
|
||||||
|
- ether_addr_equal(ehdr->h_dest, pae_group_addr)))
|
||||||
|
- return true;
|
||||||
|
+ * Allow EAPOL frames to us/the PAE group address regardless of
|
||||||
|
+ * whether the frame was encrypted or not, and always disallow
|
||||||
|
+ * all other destination addresses for them.
|
||||||
|
+ */
|
||||||
|
+ if (unlikely(ehdr->h_proto == rx->sdata->control_port_protocol))
|
||||||
|
+ return ether_addr_equal(ehdr->h_dest, rx->sdata->vif.addr) ||
|
||||||
|
+ ether_addr_equal(ehdr->h_dest, pae_group_addr);
|
||||||
|
|
||||||
|
if (ieee80211_802_1x_port_control(rx) ||
|
||||||
|
ieee80211_drop_unencrypted(rx, fc))
|
||||||
|
@@ -2632,7 +2632,26 @@ static void ieee80211_deliver_skb_to_loc
|
||||||
|
cfg80211_rx_control_port(dev, skb, noencrypt);
|
||||||
|
dev_kfree_skb(skb);
|
||||||
|
} else {
|
||||||
|
+ struct ethhdr *ehdr = (void *)skb_mac_header(skb);
|
||||||
|
memset(skb->cb, 0, sizeof(skb->cb));
|
||||||
|
+ /*
|
||||||
|
+ * 802.1X over 802.11 requires that the authenticator address
|
||||||
|
+ * be used for EAPOL frames. However, 802.1X allows the use of
|
||||||
|
+ * the PAE group address instead. If the interface is part of
|
||||||
|
+ * a bridge and we pass the frame with the PAE group address,
|
||||||
|
+ * then the bridge will forward it to the network (even if the
|
||||||
|
+ * client was not associated yet), which isn't supposed to
|
||||||
|
+ * happen.
|
||||||
|
+ * To avoid that, rewrite the destination address to our own
|
||||||
|
+ * address, so that the authenticator (e.g. hostapd) will see
|
||||||
|
+ * the frame, but bridge won't forward it anywhere else. Note
|
||||||
|
+ * that due to earlier filtering, the only other address can
|
||||||
|
+ * be the PAE group address.
|
||||||
|
+ */
|
||||||
|
+ if (unlikely(skb->protocol == sdata->control_port_protocol &&
|
||||||
|
+ !ether_addr_equal(ehdr->h_dest, sdata->vif.addr)))
|
||||||
|
+ ether_addr_copy(ehdr->h_dest, sdata->vif.addr);
|
||||||
|
+
|
||||||
|
netif_rx_nss(rx, skb);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@@ -2672,6 +2691,7 @@ ieee80211_deliver_skb(struct ieee80211_r
|
||||||
|
if ((sdata->vif.type == NL80211_IFTYPE_AP ||
|
||||||
|
sdata->vif.type == NL80211_IFTYPE_AP_VLAN) &&
|
||||||
|
!(sdata->flags & IEEE80211_SDATA_DONT_BRIDGE_PACKETS) &&
|
||||||
|
+ ehdr->h_proto != rx->sdata->control_port_protocol &&
|
||||||
|
(sdata->vif.type != NL80211_IFTYPE_AP_VLAN || !sdata->u.vlan.sta)) {
|
||||||
|
if (is_multicast_ether_addr(ehdr->h_dest) &&
|
||||||
|
ieee80211_vif_get_num_mcast_if(sdata) != 0) {
|
||||||
|
@@ -2781,7 +2801,7 @@ __ieee80211_rx_h_amsdu(struct ieee80211_
|
||||||
|
if (ieee80211_data_to_8023_exthdr(skb, ðhdr,
|
||||||
|
rx->sdata->vif.addr,
|
||||||
|
rx->sdata->vif.type,
|
||||||
|
- data_offset))
|
||||||
|
+ data_offset, true))
|
||||||
|
return RX_DROP_UNUSABLE;
|
||||||
|
|
||||||
|
ieee80211_amsdu_to_8023s(skb, &frame_list, dev->dev_addr,
|
||||||
|
@@ -2838,6 +2858,23 @@ ieee80211_rx_h_amsdu(struct ieee80211_rx
|
||||||
|
if (is_multicast_ether_addr(hdr->addr1))
|
||||||
|
return RX_DROP_UNUSABLE;
|
||||||
|
|
||||||
|
+ if (rx->key) {
|
||||||
|
+ /*
|
||||||
|
+ * We should not receive A-MSDUs on pre-HT connections,
|
||||||
|
+ * and HT connections cannot use old ciphers. Thus drop
|
||||||
|
+ * them, as in those cases we couldn't even have SPP
|
||||||
|
+ * A-MSDUs or such.
|
||||||
|
+ */
|
||||||
|
+ switch (rx->key->conf.cipher) {
|
||||||
|
+ case WLAN_CIPHER_SUITE_WEP40:
|
||||||
|
+ case WLAN_CIPHER_SUITE_WEP104:
|
||||||
|
+ case WLAN_CIPHER_SUITE_TKIP:
|
||||||
|
+ return RX_DROP_UNUSABLE;
|
||||||
|
+ default:
|
||||||
|
+ break;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
return __ieee80211_rx_h_amsdu(rx, 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
Index: backports-20200902_001-4.4.60-931c337125/net/wireless/util.c
|
||||||
|
===================================================================
|
||||||
|
--- backports-20200902_001-4.4.60-931c337125.orig/net/wireless/util.c
|
||||||
|
+++ backports-20200902_001-4.4.60-931c337125/net/wireless/util.c
|
||||||
|
@@ -474,7 +474,7 @@ EXPORT_SYMBOL(ieee80211_get_mesh_hdrlen)
|
||||||
|
|
||||||
|
int ieee80211_data_to_8023_exthdr(struct sk_buff *skb, struct ethhdr *ehdr,
|
||||||
|
const u8 *addr, enum nl80211_iftype iftype,
|
||||||
|
- u8 data_offset)
|
||||||
|
+ u8 data_offset, bool is_amsdu)
|
||||||
|
{
|
||||||
|
struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
|
||||||
|
struct {
|
||||||
|
@@ -562,7 +562,7 @@ int ieee80211_data_to_8023_exthdr(struct
|
||||||
|
skb_copy_bits(skb, hdrlen, &payload, sizeof(payload));
|
||||||
|
tmp.h_proto = payload.proto;
|
||||||
|
|
||||||
|
- if (likely((ether_addr_equal(payload.hdr, rfc1042_header) &&
|
||||||
|
+ if (likely((!is_amsdu && ether_addr_equal(payload.hdr, rfc1042_header) &&
|
||||||
|
tmp.h_proto != htons(ETH_P_AARP) &&
|
||||||
|
tmp.h_proto != htons(ETH_P_IPX)) ||
|
||||||
|
ether_addr_equal(payload.hdr, bridge_tunnel_header)))
|
||||||
|
@@ -708,6 +708,9 @@ void ieee80211_amsdu_to_8023s(struct sk_
|
||||||
|
remaining = skb->len - offset;
|
||||||
|
if (subframe_len > remaining)
|
||||||
|
goto purge;
|
||||||
|
+ /* mitigate A-MSDU aggregation injection attacks */
|
||||||
|
+ if (ether_addr_equal(eth.h_dest, rfc1042_header))
|
||||||
|
+ goto purge;
|
||||||
|
|
||||||
|
offset += sizeof(struct ethhdr);
|
||||||
|
last = remaining <= subframe_len + padding;
|
||||||
|
Index: backports-20200902_001-4.4.60-931c337125/drivers/net/wireless/ath/ath11k/nss.c
|
||||||
|
===================================================================
|
||||||
|
--- backports-20200902_001-4.4.60-931c337125.orig/drivers/net/wireless/ath/ath11k/nss.c
|
||||||
|
+++ backports-20200902_001-4.4.60-931c337125/drivers/net/wireless/ath/ath11k/nss.c
|
||||||
|
@@ -477,7 +477,7 @@ static int ath11k_nss_deliver_rx(struct
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ieee80211_data_to_8023_exthdr(skb, NULL, vif->addr, vif->type,
|
||||||
|
- data_offs - hdr_len)) {
|
||||||
|
+ data_offs - hdr_len, false)) {
|
||||||
|
dev_kfree_skb_any(skb);
|
||||||
|
return -EINVAL;
|
||||||
|
}
|
||||||
@@ -0,0 +1,22 @@
|
|||||||
|
diff -Naur a/drivers/net/wireless/ath/ath11k/mac.c b/drivers/net/wireless/ath/ath11k/mac.c
|
||||||
|
--- a/drivers/net/wireless/ath/ath11k/mac.c 2021-06-09 10:02:12.040840722 -0400
|
||||||
|
+++ b/drivers/net/wireless/ath/ath11k/mac.c 2021-06-10 10:40:12.094003411 -0400
|
||||||
|
@@ -3472,13 +3472,14 @@
|
||||||
|
scan_timeout = min_t(u32, arg->max_rest_time *
|
||||||
|
(arg->chan_list.num_chan - 1) + (req->duration +
|
||||||
|
ATH11K_SCAN_CHANNEL_SWITCH_WMI_EVT_OVERHEAD) *
|
||||||
|
- arg->chan_list.num_chan, arg->max_scan_time +
|
||||||
|
- ATH11K_MAC_SCAN_TIMEOUT_MSECS);
|
||||||
|
+ arg->chan_list.num_chan, arg->max_scan_time);
|
||||||
|
} else {
|
||||||
|
- /* Add a 200ms margin to account for event/command processing */
|
||||||
|
- scan_timeout = arg->max_scan_time + ATH11K_MAC_SCAN_TIMEOUT_MSECS;
|
||||||
|
+ scan_timeout = arg->max_scan_time;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /* Add a 200ms margin to account for event/command processing */
|
||||||
|
+ scan_timeout += ATH11K_MAC_SCAN_TIMEOUT_MSECS;
|
||||||
|
+
|
||||||
|
ret = ath11k_start_scan(ar, arg);
|
||||||
|
if (ret) {
|
||||||
|
ath11k_warn(ar->ab, "failed to start hw scan: %d\n", ret);
|
||||||
@@ -0,0 +1,22 @@
|
|||||||
|
diff -Naur a/ath10k-5.7/mac.c b/ath10k-5.7/mac.c
|
||||||
|
--- a/ath10k-5.7/mac.c 2021-06-09 16:30:17.793556032 -0400
|
||||||
|
+++ b/ath10k-5.7/mac.c 2021-06-09 17:38:08.587733979 -0400
|
||||||
|
@@ -7103,13 +7103,15 @@
|
||||||
|
scan_timeout = min_t(u32, arg.max_rest_time *
|
||||||
|
(arg.n_channels - 1) + (req->duration +
|
||||||
|
ATH10K_SCAN_CHANNEL_SWITCH_WMI_EVT_OVERHEAD) *
|
||||||
|
- arg.n_channels, arg.max_scan_time + 200);
|
||||||
|
+ arg.n_channels, arg.max_scan_time);
|
||||||
|
|
||||||
|
} else {
|
||||||
|
- /* Add a 200ms margin to account for event/command processing */
|
||||||
|
- scan_timeout = arg.max_scan_time + 200;
|
||||||
|
+ scan_timeout = arg.max_scan_time;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /* Add a 200ms margin to account for event/command processing */
|
||||||
|
+ scan_timeout += 200;
|
||||||
|
+
|
||||||
|
ret = ath10k_start_scan(ar, &arg);
|
||||||
|
if (ret) {
|
||||||
|
ath10k_warn(ar, "failed to start hw scan: %d\n", ret);
|
||||||
@@ -810,7 +810,15 @@ hostapd_set_bss_options() {
|
|||||||
json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout
|
json_get_vars ieee80211w_mgmt_cipher ieee80211w_max_timeout ieee80211w_retry_timeout
|
||||||
append bss_conf "ieee80211w=$ieee80211w" "$N"
|
append bss_conf "ieee80211w=$ieee80211w" "$N"
|
||||||
[ "$ieee80211w" -gt "0" ] && {
|
[ "$ieee80211w" -gt "0" ] && {
|
||||||
append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N"
|
case "$auth_type" in
|
||||||
|
eap192)
|
||||||
|
append bss_conf "group_mgmt_cipher=BIP-GMAC-256" "$N"
|
||||||
|
append bss_conf "group_cipher=GCMP-256" "$N"
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
append bss_conf "group_mgmt_cipher=${ieee80211w_mgmt_cipher:-AES-128-CMAC}" "$N"
|
||||||
|
;;
|
||||||
|
esac
|
||||||
[ -n "$ieee80211w_max_timeout" ] && \
|
[ -n "$ieee80211w_max_timeout" ] && \
|
||||||
append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
|
append bss_conf "assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
|
||||||
[ -n "$ieee80211w_retry_timeout" ] && \
|
[ -n "$ieee80211w_retry_timeout" ] && \
|
||||||
@@ -895,10 +903,10 @@ hostapd_set_bss_options() {
|
|||||||
if [ "$hs20" = "1" ]; then
|
if [ "$hs20" = "1" ]; then
|
||||||
append bss_conf "hs20=1" "$N"
|
append bss_conf "hs20=1" "$N"
|
||||||
append_hs20_icons
|
append_hs20_icons
|
||||||
[ -n "$disable_dgaf"] && append bss_conf "disable_dgaf=$disable_dgaf" "$N"
|
[ -n "$disable_dgaf" ] && append bss_conf "disable_dgaf=$disable_dgaf" "$N"
|
||||||
[ -n "$osen"] && append bss_conf "osen=$osen" "$N"
|
[ -n "$osen" ] && append bss_conf "osen=$osen" "$N"
|
||||||
[ "$anqp_domain_id" -gt 0 ] && append bss_conf "anqp_domain_id=$anqp_domain_id" "$N"
|
[ "$anqp_domain_id" -gt 0 ] && append bss_conf "anqp_domain_id=$anqp_domain_id" "$N"
|
||||||
[ -n "$hs20_deauth_req_timeout"] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N"
|
[ -n "$hs20_deauth_req_timeout" ] && append bss_conf "hs20_deauth_req_timeout=$hs20_deauth_req_timeout" "$N"
|
||||||
[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N"
|
[ -n "$osu_ssid" ] && append bss_conf "osu_ssid=$osu_ssid" "$N"
|
||||||
[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N"
|
[ -n "$hs20_wan_metrics" ] && append bss_conf "hs20_wan_metrics=$hs20_wan_metrics" "$N"
|
||||||
[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N"
|
[ -n "$hs20_operating_class" ] && append bss_conf "hs20_operating_class=$hs20_operating_class" "$N"
|
||||||
|
|||||||
32
feeds/wifi-trunk/hostapd/patches/904-fix-ubus-assoc.patch
Normal file
32
feeds/wifi-trunk/hostapd/patches/904-fix-ubus-assoc.patch
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
--- a/src/ap/ieee802_11.c
|
||||||
|
+++ b/src/ap/ieee802_11.c
|
||||||
|
@@ -4463,6 +4463,14 @@ static void handle_assoc(struct hostapd_
|
||||||
|
ieee802_11_set_beacons(hapd->iface);
|
||||||
|
}
|
||||||
|
|
||||||
|
+ ubus_resp = hostapd_ubus_handle_event(hapd, &req);
|
||||||
|
+ if (ubus_resp) {
|
||||||
|
+ wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n",
|
||||||
|
+ MAC2STR(mgmt->sa));
|
||||||
|
+ resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||||
|
+ goto fail;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
update_ht_state(hapd, sta);
|
||||||
|
|
||||||
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
||||||
|
@@ -4568,14 +4576,6 @@ static void handle_assoc(struct hostapd_
|
||||||
|
pos, left, rssi, omit_rsnxe);
|
||||||
|
os_free(tmp);
|
||||||
|
|
||||||
|
- ubus_resp = hostapd_ubus_handle_event(hapd, &req);
|
||||||
|
- if (ubus_resp) {
|
||||||
|
- wpa_printf(MSG_DEBUG, "Station " MACSTR " assoc rejected by ubus handler.\n",
|
||||||
|
- MAC2STR(mgmt->sa));
|
||||||
|
- resp = ubus_resp > 0 ? (u16) ubus_resp : WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||||
|
- goto fail;
|
||||||
|
- }
|
||||||
|
-
|
||||||
|
/*
|
||||||
|
* Remove the station in case tranmission of a success response fails
|
||||||
|
* (the STA was added associated to the driver) or if the station was
|
||||||
@@ -444,6 +444,10 @@ return view.extend({
|
|||||||
o.datatype = 'ip4addr("nomask")';
|
o.datatype = 'ip4addr("nomask")';
|
||||||
o.depends('proto', 'static');
|
o.depends('proto', 'static');
|
||||||
|
|
||||||
|
o = s.option(form.Button, 'save', _(''));
|
||||||
|
o.inputtitle = _('Save Settings');
|
||||||
|
o.onclick = ui.createHandlerFn(this, 'handleSettingsSave', m);
|
||||||
|
|
||||||
s = m.section(form.NamedSection, 'lan', 'lan', _('LAN'));
|
s = m.section(form.NamedSection, 'lan', 'lan', _('LAN'));
|
||||||
|
|
||||||
o = s.option(form.Value, 'addr', _('IP Address'));
|
o = s.option(form.Value, 'addr', _('IP Address'));
|
||||||
@@ -456,7 +460,7 @@ return view.extend({
|
|||||||
|
|
||||||
o = s.option(form.Button, 'save', _(''));
|
o = s.option(form.Button, 'save', _(''));
|
||||||
o.inputtitle = _('Save Settings');
|
o.inputtitle = _('Save Settings');
|
||||||
o.onclick = ui.createHandlerFn(this, 'handleSettingsSave', m);
|
o.onclick = ui.createHandlerFn(this, 'handleLANSettingsSave', m);
|
||||||
|
|
||||||
s = m.section(form.NamedSection, 'maintenance', 'maintenance', _('System Maintenance'));
|
s = m.section(form.NamedSection, 'maintenance', 'maintenance', _('System Maintenance'));
|
||||||
|
|
||||||
|
|||||||
Binary file not shown.
@@ -1,4 +1,12 @@
|
|||||||
@import url('https://fonts.googleapis.com/css2?family=Montserrat&display=swap');
|
/* latin */
|
||||||
|
@font-face {
|
||||||
|
font-family: 'Montserrat';
|
||||||
|
font-style: normal;
|
||||||
|
font-weight: 400;
|
||||||
|
font-display: swap;
|
||||||
|
src: url(Montserrat_latin.woff2) format('woff2');
|
||||||
|
unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+2000-206F, U+2074, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD;
|
||||||
|
}
|
||||||
|
|
||||||
:root {
|
:root {
|
||||||
--main-bright-color: #1B465C;
|
--main-bright-color: #1B465C;
|
||||||
|
|||||||
@@ -52,7 +52,6 @@ define Package/opennds/install
|
|||||||
$(INSTALL_DIR) $(1)/usr/lib/opennds
|
$(INSTALL_DIR) $(1)/usr/lib/opennds
|
||||||
|
|
||||||
$(CP) ./files/lib/splash.css $(1)/etc/opennds/htdocs/
|
$(CP) ./files/lib/splash.css $(1)/etc/opennds/htdocs/
|
||||||
$(CP) ./files/lib/Tip.png $(1)/etc/opennds/htdocs/images/
|
|
||||||
$(CP) ./files/lib/opennds $(1)/etc/config/
|
$(CP) ./files/lib/opennds $(1)/etc/config/
|
||||||
$(CP) ./files/etc/init.d/opennds $(1)/etc/init.d/
|
$(CP) ./files/etc/init.d/opennds $(1)/etc/init.d/
|
||||||
$(CP) ./files/lib/login.sh $(1)/usr/lib/opennds/
|
$(CP) ./files/lib/login.sh $(1)/usr/lib/opennds/
|
||||||
|
|||||||
Binary file not shown.
|
Before Width: | Height: | Size: 21 KiB |
17
feeds/wlan-ap/opensync/files/bin/auto-conf
Executable file
17
feeds/wlan-ap/opensync/files/bin/auto-conf
Executable file
@@ -0,0 +1,17 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
# Finds the highest settings an AP can support for various settings when set to "auto" in config
|
||||||
|
|
||||||
|
find_auto_hwmode() {
|
||||||
|
# This function finds the highest mode (hw_mode) that the AP can support
|
||||||
|
|
||||||
|
# Arguments
|
||||||
|
device=$1
|
||||||
|
|
||||||
|
mode='11n'
|
||||||
|
iw phy "$device" info | grep -q 'VHT Capabilities*' && mode="11ac"
|
||||||
|
iw phy "$device" info | grep -q 'HE.*Capabilities' && mode="11ax"
|
||||||
|
|
||||||
|
echo "$mode"
|
||||||
|
}
|
||||||
|
|
||||||
|
find_auto_hwmode $1
|
||||||
55
feeds/wlan-ap/opensync/files/bin/dynamic_lookup.sh
Executable file
55
feeds/wlan-ap/opensync/files/bin/dynamic_lookup.sh
Executable file
@@ -0,0 +1,55 @@
|
|||||||
|
#! /bin/sh
|
||||||
|
|
||||||
|
usage() {
|
||||||
|
echo "Usage: ${0} <realm>"
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
|
test -n "${1}" || usage
|
||||||
|
|
||||||
|
REALM="${1}"
|
||||||
|
DIGCMD=$(command -v dig)
|
||||||
|
PRINTCMD=$(command -v printf)
|
||||||
|
|
||||||
|
validate_host() {
|
||||||
|
echo ${@} | tr -d '\n\t\r' | grep -E '^[_0-9a-zA-Z][-._0-9a-zA-Z]*$'
|
||||||
|
}
|
||||||
|
|
||||||
|
validate_port() {
|
||||||
|
echo ${@} | tr -d '\n\t\r' | grep -E '^[0-9]+$'
|
||||||
|
}
|
||||||
|
|
||||||
|
srv_lookup() {
|
||||||
|
${DIGCMD} +short srv $SRV_HOST | sort -n -k1 |
|
||||||
|
while read line ; do
|
||||||
|
set $line ; PORT=$(validate_port $3) ; HOST=$(validate_host $4)
|
||||||
|
if [ -n "${HOST}" ] && [ -n "${PORT}" ]; then
|
||||||
|
$PRINTCMD "\thost ${HOST%.}:${PORT}\n"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
naptr_lookup() {
|
||||||
|
${DIGCMD} +short naptr ${REALM} | grep aaa+auth:radius.tls.tcp | sort -n -k1 |
|
||||||
|
while read line; do
|
||||||
|
set $line ; TYPE=$3 ; HOST=$6
|
||||||
|
if [ "$TYPE" = "\"s\"" -o "$TYPE" = "\"S\"" ]; then
|
||||||
|
SRV_HOST=${HOST%.}
|
||||||
|
srv_lookup
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
if test -x "${DIGCMD}" ; then
|
||||||
|
SERVERS=$(naptr_lookup)
|
||||||
|
else
|
||||||
|
echo "${0} requires \"dig\" command."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if test -n "${SERVERS}" ; then
|
||||||
|
$PRINTCMD "server dynamic_radsec.${REALM} {\n${SERVERS}\n\ttype TLS\n}\n"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
exit 10 # No server found.
|
||||||
@@ -24,7 +24,8 @@
|
|||||||
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
||||||
# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
IMGFILE="$(ls ${1}.*)"
|
# Get the most recent upgrade file available
|
||||||
|
IMGFILE="$(ls -t1 ${1}.* | head -n 1)"
|
||||||
|
|
||||||
if [ -z "$IMGFILE" ] || [ ! -f "$IMGFILE" ] ; then
|
if [ -z "$IMGFILE" ] || [ ! -f "$IMGFILE" ] ; then
|
||||||
echo
|
echo
|
||||||
@@ -34,11 +35,14 @@ fi
|
|||||||
|
|
||||||
# Set the current version as inactive before the upgrade
|
# Set the current version as inactive before the upgrade
|
||||||
FW_VERSION=`sed -n 's/FW_IMAGE_ACTIVE:\(.*\)/\1/p' < /usr/opensync/.versions`
|
FW_VERSION=`sed -n 's/FW_IMAGE_ACTIVE:\(.*\)/\1/p' < /usr/opensync/.versions`
|
||||||
|
FW_BACKUP=$(uci get system.tip.inactivefw)
|
||||||
uci set system.tip.inactivefw="${FW_VERSION}"
|
uci set system.tip.inactivefw="${FW_VERSION}"
|
||||||
uci commit
|
uci commit system
|
||||||
|
|
||||||
/sbin/sysupgrade $IMGFILE
|
/sbin/sysupgrade $IMGFILE
|
||||||
if [ "$?" != "0" ] ; then
|
if [ "$?" != "0" ] ; then
|
||||||
|
uci set system.tip.inactivefw="${FW_BACKUP}"
|
||||||
|
uci commit system
|
||||||
echo "$0: Sysupgrade failed."
|
echo "$0: Sysupgrade failed."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|||||||
7
feeds/wlan-ap/opensync/files/bin/wlan_ap_led.sh
Executable file
7
feeds/wlan-ap/opensync/files/bin/wlan_ap_led.sh
Executable file
@@ -0,0 +1,7 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
#Blink AP's LED
|
||||||
|
/usr/opensync/tools/ovsh insert Node_Config module:="led" key:="led_blink" value:="on"
|
||||||
|
|
||||||
|
#Turnoff AP's LED
|
||||||
|
/usr/opensync/tools/ovsh insert Node_Config module:="led" key:="led_off" value:="off"
|
||||||
@@ -1,10 +1,10 @@
|
|||||||
/tmp/log/openvswitch/* {
|
/tmp/log/openvswitch/*.log {
|
||||||
daily
|
daily
|
||||||
rotate 5
|
rotate 5
|
||||||
size 1M
|
size 1M
|
||||||
compress
|
compress
|
||||||
delaycompress
|
delaycompress
|
||||||
dateext
|
dateext
|
||||||
dateformat -%d%m%Y
|
dateformat -%s
|
||||||
notifempty
|
notifempty
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
--- a/interfaces/opensync.ovsschema
|
--- a/interfaces/opensync.ovsschema
|
||||||
+++ b/interfaces/opensync.ovsschema
|
+++ b/interfaces/opensync.ovsschema
|
||||||
@@ -9492,6 +9492,137 @@
|
@@ -9493,6 +9493,146 @@
|
||||||
},
|
},
|
||||||
"isRoot": true,
|
"isRoot": true,
|
||||||
"maxRows": 1
|
"maxRows": 1
|
||||||
@@ -25,6 +25,15 @@
|
|||||||
+ "max": 1
|
+ "max": 1
|
||||||
+ }
|
+ }
|
||||||
+ },
|
+ },
|
||||||
|
+ "auto_discover": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": {
|
||||||
|
+ "type": "boolean"
|
||||||
|
+ },
|
||||||
|
+ "min": 1,
|
||||||
|
+ "max": 1
|
||||||
|
+ }
|
||||||
|
+ },
|
||||||
+ "server": {
|
+ "server": {
|
||||||
+ "type": {
|
+ "type": {
|
||||||
+ "key": {
|
+ "key": {
|
||||||
|
|||||||
12
feeds/wlan-ap/opensync/patches/37-add-auto-hw_mode.patch
Normal file
12
feeds/wlan-ap/opensync/patches/37-add-auto-hw_mode.patch
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
--- a/interfaces/opensync.ovsschema
|
||||||
|
+++ b/interfaces/opensync.ovsschema
|
||||||
|
@@ -1357,7 +1357,8 @@
|
||||||
|
"11n",
|
||||||
|
"11ab",
|
||||||
|
"11ac",
|
||||||
|
- "11ax"
|
||||||
|
+ "11ax",
|
||||||
|
+ "auto"
|
||||||
|
]
|
||||||
|
]
|
||||||
|
},
|
||||||
@@ -0,0 +1,19 @@
|
|||||||
|
--- a/interfaces/opensync.ovsschema
|
||||||
|
+++ b/interfaces/opensync.ovsschema
|
||||||
|
@@ -1880,7 +1880,15 @@
|
||||||
|
"min": 0,
|
||||||
|
"max": "unlimited"
|
||||||
|
}
|
||||||
|
- }
|
||||||
|
+ },
|
||||||
|
+ "channel_max_power": {
|
||||||
|
+ "type": {
|
||||||
|
+ "key": "integer",
|
||||||
|
+ "value": "integer",
|
||||||
|
+ "min": 0,
|
||||||
|
+ "max": "unlimited"
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
},
|
||||||
|
"isRoot": true,
|
||||||
|
"maxRows": 256
|
||||||
13
feeds/wlan-ap/opensync/patches/37-cpu-utilization.patch
Normal file
13
feeds/wlan-ap/opensync/patches/37-cpu-utilization.patch
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
Index: opensync-2.0.5.0/src/lib/target/src/target_linux.c
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/src/lib/target/src/target_linux.c
|
||||||
|
+++ opensync-2.0.5.0/src/lib/target/src/target_linux.c
|
||||||
|
@@ -249,7 +249,7 @@ static bool linux_device_cpuutil_get(dpp
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Calculate percentage and round */
|
||||||
|
- busy = (1.0 - ((double)diff.hz_idle / (double)hz_total_diff)) * 100.0;
|
||||||
|
+ busy = (100.0 - (((double)diff.hz_idle *100.0) / (double)hz_total_diff));
|
||||||
|
|
||||||
|
cpuutil->cpu_util = (uint32_t) (busy + 0.5);
|
||||||
|
|
||||||
@@ -0,0 +1,16 @@
|
|||||||
|
Index: opensync-2.0.5.0/src/lib/datapipeline/inc/dpp_types.h
|
||||||
|
===================================================================
|
||||||
|
--- opensync-2.0.5.0.orig/src/lib/datapipeline/inc/dpp_types.h
|
||||||
|
+++ opensync-2.0.5.0/src/lib/datapipeline/inc/dpp_types.h
|
||||||
|
@@ -148,10 +148,9 @@ typedef enum
|
||||||
|
RADIO_SCAN_TYPE_FULL,
|
||||||
|
RADIO_SCAN_TYPE_ONCHAN,
|
||||||
|
RADIO_SCAN_TYPE_OFFCHAN,
|
||||||
|
+ RADIO_SCAN_MAX_TYPE_QTY
|
||||||
|
} radio_scan_type_t;
|
||||||
|
|
||||||
|
-#define RADIO_SCAN_MAX_TYPE_QTY 3
|
||||||
|
-
|
||||||
|
typedef enum
|
||||||
|
{
|
||||||
|
RADIO_QUEUE_TYPE_VI = 0,
|
||||||
12
feeds/wlan-ap/opensync/patches/39-allow-upgrade-retry.patch
Normal file
12
feeds/wlan-ap/opensync/patches/39-allow-upgrade-retry.patch
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
--- a/src/um/src/um_ovsdb.c
|
||||||
|
+++ b/src/um/src/um_ovsdb.c
|
||||||
|
@@ -356,7 +356,8 @@ static void callback_AWLAN_Node(
|
||||||
|
//TODO Is there something that needs to be done here?
|
||||||
|
}
|
||||||
|
|
||||||
|
- if(awlan_node->upgrade_timer_changed){
|
||||||
|
+ if(awlan_node->upgrade_timer_changed
|
||||||
|
+ || ((awlan_node->firmware_url_changed) && (strlen(awlan_node->firmware_url) > 0))) {
|
||||||
|
if (awlan_node->upgrade_timer > 0)
|
||||||
|
{
|
||||||
|
/* if there is active timer, stop it to set new value */
|
||||||
@@ -0,0 +1,32 @@
|
|||||||
|
--- a/src/um/inc/um.h
|
||||||
|
+++ b/src/um/inc/um.h
|
||||||
|
@@ -32,6 +32,8 @@ SOFTWARE, EVEN IF ADVISED OF THE POSSIBI
|
||||||
|
|
||||||
|
#define UM_STS_FW_DL_START (10) /* FW download started */
|
||||||
|
#define UM_STS_FW_DL_END (11) /* FW download successfully completed */
|
||||||
|
+#define UM_STS_RB_END (12) /* Reboot has been started */
|
||||||
|
+#define UM_STS_FR_END (13) /* Factory reset has been started */
|
||||||
|
#define UM_STS_FW_WR_START (20) /* FW write on alt partition started */
|
||||||
|
#define UM_STS_FW_WR_END (21) /* FW image write successfully completed */
|
||||||
|
#define UM_STS_FW_BC_START (30) /* Bootconfig partition update started */
|
||||||
|
--- a/src/um/src/um_ovsdb.c
|
||||||
|
+++ b/src/um/src/um_ovsdb.c
|
||||||
|
@@ -248,8 +248,16 @@ static void cb_upg(const osp_upg_op_t op
|
||||||
|
case OSP_UPG_DL:
|
||||||
|
if (status == OSP_UPG_OK)
|
||||||
|
{
|
||||||
|
- LOG(INFO, "Download successfully completed");
|
||||||
|
- ret_status = UM_STS_FW_DL_END;
|
||||||
|
+ if (!strcmp(upg_url, "reboot")) {
|
||||||
|
+ LOG(INFO, "Reboot successfully initiated");
|
||||||
|
+ ret_status = UM_STS_RB_END;
|
||||||
|
+ } else if (!strcmp(upg_url, "factory")) {
|
||||||
|
+ LOG(INFO, "Factory reset successfully initiated");
|
||||||
|
+ ret_status = UM_STS_FR_END;
|
||||||
|
+ } else {
|
||||||
|
+ LOG(INFO, "Download successfully completed");
|
||||||
|
+ ret_status = UM_STS_FW_DL_END;
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
11
feeds/wlan-ap/opensync/patches/41-log-supression.patch
Normal file
11
feeds/wlan-ap/opensync/patches/41-log-supression.patch
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
--- a/src/lib/ovsdb/src/ovsdb_table.c
|
||||||
|
+++ b/src/lib/ovsdb/src/ovsdb_table.c
|
||||||
|
@@ -560,7 +560,7 @@ void ovsdb_table_update_cb(ovsdb_update_
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
- LOG(INFO, "MON upd: %s table: %s row: %s", typestr, table->table_name, mon_uuid );
|
||||||
|
+ LOG(TRACE, "MON upd: %s table: %s row: %s", typestr, table->table_name, mon_uuid );
|
||||||
|
|
||||||
|
if (LOG_SEVERITY_TRACE <= log_module_severity_get(MODULE_ID))
|
||||||
|
{
|
||||||
@@ -40,17 +40,20 @@ start_service() {
|
|||||||
echo "Checking Redirector"
|
echo "Checking Redirector"
|
||||||
redirector=$(uci get system.tip.redirector)
|
redirector=$(uci get system.tip.redirector)
|
||||||
if [ -z "$redirector" ]; then
|
if [ -z "$redirector" ]; then
|
||||||
[[ -f /usr/opensync/certs/redirector.txt ]] && redirector=$(cat /usr/opensync/certs/redirector.txt | tr -d '\r\n')
|
[[ -f /usr/opensync/certs/redirector.txt ]] && saved_redirector=$(cat /usr/opensync/certs/redirector.txt | tr -d '\r\n')
|
||||||
if [ -z "$redirector" ]; then
|
logger -t opensync "Contacting DigiCert for redirector address"
|
||||||
logger -t opensync "Contacting DigiCert for redirector address"
|
wlan_ap_redirector.sh
|
||||||
wlan_ap_redirector.sh
|
new_redirector=$(uci get system.tip.redirector)
|
||||||
|
if [ -z "$new_redirector" && -n "$saved_redirector" ]; then
|
||||||
|
logger -t opensync "No response from DigiCert, using saved redirector address ${saved_redirector}"
|
||||||
|
wlan_ap_redirector.sh ${saved_redirector}
|
||||||
else
|
else
|
||||||
logger -t opensync "Restoring redirector ${redirector} after factory reset"
|
logger -t opensync "DigiCert returned redirector address ${new_redirector}"
|
||||||
wlan_ap_redirector.sh ${redirector}
|
|
||||||
fi
|
fi
|
||||||
|
else
|
||||||
|
logger -t opensync "Using existing redirector address ${redirector}"
|
||||||
|
[[ -f /usr/opensync/certs/redirector.txt ]] || echo "${redirector}" > /usr/opensync/certs/redirector.txt
|
||||||
fi
|
fi
|
||||||
[[ -f /usr/opensync/certs/redirector.txt ]] || echo "${redirector}" > /usr/opensync/certs/redirector.txt
|
|
||||||
|
|
||||||
echo "Starting OpenSync"
|
echo "Starting OpenSync"
|
||||||
procd_set_param command ${PROG}
|
procd_set_param command ${PROG}
|
||||||
procd_close_instance
|
procd_close_instance
|
||||||
|
|||||||
@@ -1,6 +1,9 @@
|
|||||||
/* SPDX-License-Identifier: BSD-3-Clause */
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
#include <glob.h>
|
||||||
|
#include <linux/limits.h>
|
||||||
|
#include <libgen.h>
|
||||||
|
|
||||||
#include "uci.h"
|
#include "uci.h"
|
||||||
#include "command.h"
|
#include "command.h"
|
||||||
@@ -156,7 +159,6 @@ static void syslog_handler(int type,
|
|||||||
blob_to_uci_section(uci, "system", "@system[-1]", "system",
|
blob_to_uci_section(uci, "system", "@system[-1]", "system",
|
||||||
b.head, &log_param, NULL);
|
b.head, &log_param, NULL);
|
||||||
uci_commit_all(uci);
|
uci_commit_all(uci);
|
||||||
system("/sbin/reload_config");
|
|
||||||
if (del)
|
if (del)
|
||||||
node_state_del("syslog");
|
node_state_del("syslog");
|
||||||
else
|
else
|
||||||
@@ -249,10 +251,132 @@ static void ntp_handler(int type,
|
|||||||
blob_to_uci_section(uci, "system", "ntp", "timeserver",
|
blob_to_uci_section(uci, "system", "ntp", "timeserver",
|
||||||
b.head, &ntp_param, NULL);
|
b.head, &ntp_param, NULL);
|
||||||
uci_commit_all(uci);
|
uci_commit_all(uci);
|
||||||
system("/sbin/reload_config");
|
|
||||||
ntp_state(0);
|
ntp_state(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
enum {
|
||||||
|
LED_ATTR_SYSFS,
|
||||||
|
LED_ATTR_TRIGGER,
|
||||||
|
LED_ATTR_DELAYON,
|
||||||
|
LED_ATTR_DELAYOFF,
|
||||||
|
LED_ATTR_VALUE,
|
||||||
|
LED_ATTR_KEY,
|
||||||
|
__LED_ATTR_MAX,
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct blobmsg_policy led_policy[__LED_ATTR_MAX] = {
|
||||||
|
[LED_ATTR_SYSFS] = { .name = "sysfs", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[LED_ATTR_TRIGGER] = { .name = "trigger", .type = BLOBMSG_TYPE_STRING },
|
||||||
|
[LED_ATTR_DELAYON] = { .name = "delayon", .type = BLOBMSG_TYPE_STRING},
|
||||||
|
[LED_ATTR_DELAYOFF] = { .name = "delayoff", .type = BLOBMSG_TYPE_STRING},
|
||||||
|
[LED_ATTR_VALUE] = { .name = "value", .type = BLOBMSG_TYPE_STRING},
|
||||||
|
[LED_ATTR_KEY] = { .name = "key", .type = BLOBMSG_TYPE_STRING},
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct uci_blob_param_list led_param = {
|
||||||
|
.n_params = __LED_ATTR_MAX,
|
||||||
|
.params = led_policy,
|
||||||
|
};
|
||||||
|
|
||||||
|
static char led[][8]={"lan", "wan", "eth", "wifi2", "wifi5", "wlan2g", "wlan5g", "power","eth0",
|
||||||
|
"status", "eth1", "wifi2g", "eth2", "wifi5g", "plug", "world", "usb", "linksys", "wps", "bt"};
|
||||||
|
|
||||||
|
static void led_state(int config)
|
||||||
|
{
|
||||||
|
struct blob_attr *tb[__LED_ATTR_MAX] = { };
|
||||||
|
struct uci_package *system;
|
||||||
|
struct uci_section *s = NULL;
|
||||||
|
struct uci_element *e = NULL;
|
||||||
|
char val[8];
|
||||||
|
char key[16];
|
||||||
|
blob_buf_init(&b, 0);
|
||||||
|
uci_load(uci, "system", &system);
|
||||||
|
uci_foreach_element(&system->sections, e) {
|
||||||
|
s = uci_to_section(e);
|
||||||
|
if (!strcmp(s->type, "led")) {
|
||||||
|
uci_to_blob(&b, s, &led_param);
|
||||||
|
blobmsg_parse(led_policy, __LED_ATTR_MAX, tb, blob_data(b.head), blob_len(b.head));
|
||||||
|
if(tb[LED_ATTR_KEY])
|
||||||
|
strcpy(key, blobmsg_get_string(tb[LED_ATTR_KEY]));
|
||||||
|
if(tb[LED_ATTR_VALUE])
|
||||||
|
strcpy(val, blobmsg_get_string(tb[LED_ATTR_VALUE]));
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
s = NULL;
|
||||||
|
}
|
||||||
|
if (!s)
|
||||||
|
goto out;
|
||||||
|
if (config)
|
||||||
|
node_config_set("led", key, val);
|
||||||
|
node_state_set("led", key, val);
|
||||||
|
out:
|
||||||
|
uci_unload(uci, system);
|
||||||
|
}
|
||||||
|
|
||||||
|
int available_led_check(char *led_name)
|
||||||
|
{
|
||||||
|
unsigned int i;
|
||||||
|
for (i = 0; i < ARRAY_SIZE(led); i++) {
|
||||||
|
if(!strcmp(led_name,led[i])) {
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void set_led_config(char *trigger_name, char *key, char* value, char* led_string, char* led_section)
|
||||||
|
{
|
||||||
|
blob_buf_init(&b, 0);
|
||||||
|
blobmsg_add_string(&b, "sysfs", led_string);
|
||||||
|
blobmsg_add_string(&b, "trigger", trigger_name);
|
||||||
|
blobmsg_add_string(&b, "value", value);
|
||||||
|
blobmsg_add_string(&b, "key", key);
|
||||||
|
blob_to_uci_section(uci, "system", led_section, "led", b.head, &led_param, NULL);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void led_handler(int type,
|
||||||
|
struct schema_Node_Config *old,
|
||||||
|
struct schema_Node_Config *conf)
|
||||||
|
{
|
||||||
|
char led_string[32];
|
||||||
|
char ap_name[16];
|
||||||
|
char color[16];
|
||||||
|
char led_section[16];
|
||||||
|
char sys[8];
|
||||||
|
char class[8];
|
||||||
|
char leds[8];
|
||||||
|
char sysled[PATH_MAX];
|
||||||
|
glob_t gl;
|
||||||
|
unsigned int i;
|
||||||
|
|
||||||
|
switch (type) {
|
||||||
|
case OVSDB_UPDATE_NEW:
|
||||||
|
case OVSDB_UPDATE_MODIFY:
|
||||||
|
if (!strcmp(conf->key, "led_blink") || !strcmp(conf->key, "led_off"))
|
||||||
|
{
|
||||||
|
if (glob("/sys/class/leds/*", GLOB_NOSORT, NULL, &gl))
|
||||||
|
return;
|
||||||
|
for (i = 0; i < gl.gl_pathc; i++) {
|
||||||
|
strncpy(sysled, gl.gl_pathv[i], sizeof(sysled));
|
||||||
|
sscanf(sysled,"/%[^/]/%[^/]/%[^/]/%s", sys, class, leds, led_string);
|
||||||
|
sscanf(led_string,"%[^:]:%[^:]:%s",ap_name, color, led_section);
|
||||||
|
if(available_led_check(led_section)) {
|
||||||
|
if(!strcmp(conf->key, "led_blink")) {
|
||||||
|
set_led_config("heartbeat", conf->key, conf->value, led_string, led_section);
|
||||||
|
}
|
||||||
|
else if(!strcmp(conf->key, "led_off")) {
|
||||||
|
set_led_config("none", conf->key, conf->value, led_string, led_section);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
globfree(&gl);
|
||||||
|
}
|
||||||
|
uci_commit_all(uci);
|
||||||
|
led_state(0);
|
||||||
|
}
|
||||||
|
|
||||||
static struct node_handler {
|
static struct node_handler {
|
||||||
char *name;
|
char *name;
|
||||||
void (*handler)(int type,
|
void (*handler)(int type,
|
||||||
@@ -270,6 +394,11 @@ static struct node_handler {
|
|||||||
.handler = ntp_handler,
|
.handler = ntp_handler,
|
||||||
.state = ntp_state,
|
.state = ntp_state,
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
.name = "led",
|
||||||
|
.handler = led_handler,
|
||||||
|
.state = led_state,
|
||||||
|
},
|
||||||
};
|
};
|
||||||
|
|
||||||
static void callback_Node_Config(ovsdb_update_monitor_t *mon,
|
static void callback_Node_Config(ovsdb_update_monitor_t *mon,
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ extern const struct schema_Wifi_VIF_Config *vconf;
|
|||||||
extern void vif_captive_portal_set (const struct schema_Wifi_VIF_Config *vconf, char *ifname);
|
extern void vif_captive_portal_set (const struct schema_Wifi_VIF_Config *vconf, char *ifname);
|
||||||
extern void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate);
|
extern void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate);
|
||||||
extern void captive_portal_init();
|
extern void captive_portal_init();
|
||||||
extern void splash_page_logo(char* dest_file,char* src_url);
|
extern void captive_portal_files_download(char* dest_file,char* src_url);
|
||||||
extern void vif_dhcp_opennds_allowlist_set(const struct schema_Wifi_VIF_Config *vconf, char *ifname);
|
extern void vif_dhcp_opennds_allowlist_set(const struct schema_Wifi_VIF_Config *vconf, char *ifname);
|
||||||
extern void vif_state_dhcp_allowlist_get(struct schema_Wifi_VIF_State *vstate);
|
extern void vif_state_dhcp_allowlist_get(struct schema_Wifi_VIF_State *vstate);
|
||||||
|
|
||||||
|
|||||||
@@ -0,0 +1,19 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
|
#ifndef _FIXUP_H__
|
||||||
|
#define _FIXUP_H__
|
||||||
|
|
||||||
|
struct vif_fixup {
|
||||||
|
struct avl_node avl;
|
||||||
|
char name[IF_NAMESIZE];
|
||||||
|
bool has_captive;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct vif_fixup * vif_fixup_find(const char *name);
|
||||||
|
void vif_fixup_del(char *ifname);
|
||||||
|
|
||||||
|
|
||||||
|
bool vif_fixup_captive_enabled(void);
|
||||||
|
bool vif_fixup_iface_captive_enabled(const char *ifname);
|
||||||
|
void vif_fixup_set_iface_captive(const char *ifname, bool en);
|
||||||
|
#endif
|
||||||
@@ -5,13 +5,14 @@
|
|||||||
|
|
||||||
extern int phy_from_path(char *path, char *phy);
|
extern int phy_from_path(char *path, char *phy);
|
||||||
extern int phy_get_mac(char *phy, char *mac);
|
extern int phy_get_mac(char *phy, char *mac);
|
||||||
extern int phy_find_hwmon(char *path, char *hwmon);
|
extern int phy_find_hwmon(char *phy, char *hwmon, bool *DegreesNotMilliDegrees);
|
||||||
extern int phy_get_tx_chainmask(const char *name);
|
extern int phy_get_tx_chainmask(const char *name);
|
||||||
extern int phy_get_rx_chainmask(const char *name);
|
extern int phy_get_rx_chainmask(const char *name);
|
||||||
extern int phy_get_tx_available_antenna(const char *name);
|
extern int phy_get_tx_available_antenna(const char *name);
|
||||||
extern int phy_get_rx_available_antenna(const char *name);
|
extern int phy_get_rx_available_antenna(const char *name);
|
||||||
extern int phy_get_max_tx_power(const char *name , int channel);
|
extern int phy_get_max_tx_power(const char *name , int channel);
|
||||||
extern int phy_get_channels(const char *name, int *channel);
|
extern int phy_get_channels(const char *name, int *channel);
|
||||||
|
extern int phy_get_dfs_channels(const char *name, int *channel);
|
||||||
extern int phy_get_channels_state(const char *name,
|
extern int phy_get_channels_state(const char *name,
|
||||||
struct schema_Wifi_Radio_State *rstate);
|
struct schema_Wifi_Radio_State *rstate);
|
||||||
extern int phy_get_band(const char *name, char *band);
|
extern int phy_get_band(const char *name, char *band);
|
||||||
|
|||||||
@@ -3,6 +3,10 @@
|
|||||||
#ifndef _RADIO_H__
|
#ifndef _RADIO_H__
|
||||||
#define _RADIO_H__
|
#define _RADIO_H__
|
||||||
|
|
||||||
|
#include "ovsdb_update.h"
|
||||||
|
|
||||||
|
#define CONFIG_APPLY_TIMEOUT 35
|
||||||
|
|
||||||
struct rrm_neighbor {
|
struct rrm_neighbor {
|
||||||
char *mac;
|
char *mac;
|
||||||
char *ssid;
|
char *ssid;
|
||||||
@@ -10,7 +14,6 @@ struct rrm_neighbor {
|
|||||||
};
|
};
|
||||||
|
|
||||||
extern const struct target_radio_ops *radio_ops;
|
extern const struct target_radio_ops *radio_ops;
|
||||||
extern int reload_config;
|
|
||||||
extern struct blob_buf b;
|
extern struct blob_buf b;
|
||||||
extern struct uci_context *uci;
|
extern struct uci_context *uci;
|
||||||
|
|
||||||
@@ -22,5 +25,8 @@ extern int hapd_rrm_set_neighbors(char *name, struct rrm_neighbor *neigh, int co
|
|||||||
extern void radio_maverick(void *arg);
|
extern void radio_maverick(void *arg);
|
||||||
|
|
||||||
int nl80211_channel_get(char *name, unsigned int *chan);
|
int nl80211_channel_get(char *name, unsigned int *chan);
|
||||||
|
void set_config_apply_timeout(ovsdb_update_monitor_t *mon);
|
||||||
|
bool apc_read_conf(struct schema_APC_Config *apcconf);
|
||||||
|
bool apc_read_state(struct schema_APC_State *apcst);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -0,0 +1,20 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
|
#ifndef __TIMER_H__
|
||||||
|
#define __TIMER_H__
|
||||||
|
|
||||||
|
#include <sys/time.h>
|
||||||
|
|
||||||
|
struct timeout;
|
||||||
|
typedef void (*timeout_handler)(struct timeout *t);
|
||||||
|
|
||||||
|
struct timeout {
|
||||||
|
bool pending;
|
||||||
|
timeout_handler cb;
|
||||||
|
struct timeval time;
|
||||||
|
};
|
||||||
|
|
||||||
|
int timeout_set(struct timeout *timeout, int msecs);
|
||||||
|
void timer_expiry_check(struct timeout *timeout);
|
||||||
|
|
||||||
|
#endif
|
||||||
@@ -41,4 +41,7 @@ extern int net_get_mtu(char *iface);
|
|||||||
extern int net_get_mac(char *iface, char *mac);
|
extern int net_get_mac(char *iface, char *mac);
|
||||||
extern int net_is_bridge(char *iface);
|
extern int net_is_bridge(char *iface);
|
||||||
extern char* get_max_channel_bw_channel(int channel_freq, const char* htmode);
|
extern char* get_max_channel_bw_channel(int channel_freq, const char* htmode);
|
||||||
|
int phy_find_hwmon_helper(char *dir, char *file, char *hwmon);
|
||||||
|
extern double dBm_to_mwatts(double dBm);
|
||||||
|
extern double mWatts_to_dBm(double mW);
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -19,6 +19,7 @@
|
|||||||
#define OVSDB_SECURITY_ENCRYPTION_WPA_SAE "WPA-SAE"
|
#define OVSDB_SECURITY_ENCRYPTION_WPA_SAE "WPA-SAE"
|
||||||
#define OVSDB_SECURITY_ENCRYPTION_WPA_EAP "WPA-EAP"
|
#define OVSDB_SECURITY_ENCRYPTION_WPA_EAP "WPA-EAP"
|
||||||
#define OVSDB_SECURITY_ENCRYPTION_WPA3_EAP "WPA3-EAP"
|
#define OVSDB_SECURITY_ENCRYPTION_WPA3_EAP "WPA3-EAP"
|
||||||
|
#define OVSDB_SECURITY_ENCRYPTION_WPA3_EAP_192 "WPA3-EAP-192"
|
||||||
#define OVSDB_SECURITY_RADIUS_SERVER_IP "radius_server_ip"
|
#define OVSDB_SECURITY_RADIUS_SERVER_IP "radius_server_ip"
|
||||||
#define OVSDB_SECURITY_RADIUS_SERVER_PORT "radius_server_port"
|
#define OVSDB_SECURITY_RADIUS_SERVER_PORT "radius_server_port"
|
||||||
#define OVSDB_SECURITY_RADIUS_SERVER_SECRET "radius_server_secret"
|
#define OVSDB_SECURITY_RADIUS_SERVER_SECRET "radius_server_secret"
|
||||||
|
|||||||
@@ -47,6 +47,8 @@ UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/dhcpdiscovery.c
|
|||||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_probe.c
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_probe.c
|
||||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/rrm_config.c
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/rrm_config.c
|
||||||
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_proxy.c
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/radius_proxy.c
|
||||||
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/timer.c
|
||||||
|
UNIT_SRC_TOP += $(OVERRIDE_DIR)/src/fixup.c
|
||||||
|
|
||||||
CONFIG_USE_KCONFIG=y
|
CONFIG_USE_KCONFIG=y
|
||||||
CONFIG_INET_ETH_LINUX=y
|
CONFIG_INET_ETH_LINUX=y
|
||||||
|
|||||||
@@ -20,10 +20,18 @@
|
|||||||
#include "nl80211.h"
|
#include "nl80211.h"
|
||||||
#include "utils.h"
|
#include "utils.h"
|
||||||
#include "captive.h"
|
#include "captive.h"
|
||||||
|
#include <libubox/avl-cmp.h>
|
||||||
|
#include <libubox/avl.h>
|
||||||
|
#include <libubox/vlist.h>
|
||||||
|
#include <net/if.h>
|
||||||
|
#include "fixup.h"
|
||||||
|
|
||||||
struct blob_buf cap={ };
|
static struct blob_buf cap={ };
|
||||||
|
static struct blob_buf cap_blob={ };
|
||||||
|
static struct blob_buf url_buf={ };
|
||||||
static struct uci_package *opennds;
|
static struct uci_package *opennds;
|
||||||
static struct uci_context *cap_uci;
|
static struct uci_context *caps_uci;
|
||||||
|
static struct uci_context *capg_uci;
|
||||||
struct blob_attr *d;
|
struct blob_attr *d;
|
||||||
|
|
||||||
#define SCHEMA_CAPTIVE_PORTAL_OPT_SZ 255
|
#define SCHEMA_CAPTIVE_PORTAL_OPT_SZ 255
|
||||||
@@ -140,6 +148,10 @@ void vif_state_dhcp_allowlist_get(struct schema_Wifi_VIF_State *vstate)
|
|||||||
char read_ifname[8];
|
char read_ifname[8];
|
||||||
char set[8];
|
char set[8];
|
||||||
struct blob_attr *td[__DNS_ATTR_MAX] = { };
|
struct blob_attr *td[__DNS_ATTR_MAX] = { };
|
||||||
|
|
||||||
|
if (vif_fixup_iface_captive_enabled(vstate->if_name) == false)
|
||||||
|
return;
|
||||||
|
|
||||||
uci_load(dns, "dhcp", &dhcp);
|
uci_load(dns, "dhcp", &dhcp);
|
||||||
ip_section = uci_lookup_section(dns, dhcp,"dnsmasq");
|
ip_section = uci_lookup_section(dns, dhcp,"dnsmasq");
|
||||||
if(!ip_section) {
|
if(!ip_section) {
|
||||||
@@ -182,12 +194,16 @@ void vif_dhcp_opennds_allowlist_set(const struct schema_Wifi_VIF_Config *vconf,
|
|||||||
int i;
|
int i;
|
||||||
char ips[128];
|
char ips[128];
|
||||||
char buff[64];
|
char buff[64];
|
||||||
|
|
||||||
|
if (vif_fixup_iface_captive_enabled(vconf->if_name) == false)
|
||||||
|
return;
|
||||||
|
|
||||||
ipset_flush(ifname);
|
ipset_flush(ifname);
|
||||||
e = blobmsg_open_array(&dnsmas, "ipset");
|
e = blobmsg_open_array(&dnsmas, "ipset");
|
||||||
for (i = 0; i < vconf->captive_allowlist_len; i++)
|
for (i = 0; i < vconf->captive_allowlist_len; i++)
|
||||||
{
|
{
|
||||||
strcpy(buff,(char*)vconf->captive_allowlist[i]);
|
strcpy(buff,(char*)vconf->captive_allowlist[i]);
|
||||||
sprintf(ips,"/%s/set_%s", buff,"opennds");
|
snprintf(ips, sizeof(ips), "/%s/set_%s", buff,"opennds");
|
||||||
blobmsg_add_string(&dnsmas, NULL,ips);
|
blobmsg_add_string(&dnsmas, NULL,ips);
|
||||||
}
|
}
|
||||||
blobmsg_close_array(&dnsmas, e);
|
blobmsg_close_array(&dnsmas, e);
|
||||||
@@ -235,10 +251,13 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate)
|
|||||||
struct blob_attr *tc[__NDS_ATTR_MAX] = { };
|
struct blob_attr *tc[__NDS_ATTR_MAX] = { };
|
||||||
struct uci_section *cp_section;
|
struct uci_section *cp_section;
|
||||||
|
|
||||||
uci_load(cap_uci, "opennds", &opennds);
|
if (vif_fixup_iface_captive_enabled(vstate->if_name) == false)
|
||||||
cp_section = uci_lookup_section(cap_uci, opennds,"opennds");
|
return;
|
||||||
|
|
||||||
|
uci_load(capg_uci, "opennds", &opennds);
|
||||||
|
cp_section = uci_lookup_section(capg_uci, opennds,"opennds");
|
||||||
if(!cp_section) {
|
if(!cp_section) {
|
||||||
uci_unload(cap_uci, opennds);
|
uci_unload(capg_uci, opennds);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
blob_buf_init(&cap, 0);
|
blob_buf_init(&cap, 0);
|
||||||
@@ -351,15 +370,14 @@ void vif_state_captive_portal_options_get(struct schema_Wifi_VIF_State *vstate)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
uci_unload(cap_uci, opennds);
|
uci_unload(capg_uci, opennds);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
void clean_up(CURL *curl,FILE* imagefile, FILE* headerfile)
|
void clean_up(CURL *curl,FILE* imagefile)
|
||||||
{
|
{
|
||||||
curl_easy_cleanup(curl);
|
curl_easy_cleanup(curl);
|
||||||
fclose(imagefile);
|
fclose(imagefile);
|
||||||
fclose(headerfile);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -368,33 +386,27 @@ size_t write_data(void *ptr, size_t size, size_t nmemb, FILE *stream) {
|
|||||||
return written;
|
return written;
|
||||||
}
|
}
|
||||||
|
|
||||||
void splash_page_logo(char* dest_file, char* src_url)
|
void captive_portal_files_download(char* dest_file, char* src_url)
|
||||||
{
|
{
|
||||||
CURL *curl;
|
CURL *curl;
|
||||||
CURLcode res;
|
CURLcode res;
|
||||||
FILE *imagefile;
|
FILE *imagefile;
|
||||||
FILE *headerfile;
|
const char *clientcert = "/usr/opensync/certs/client.pem";
|
||||||
static const char *clientcert = "/usr/opensync/certs/client.pem";
|
|
||||||
const char *clientkey = "/usr/opensync/certs/client_dec.key";
|
const char *clientkey = "/usr/opensync/certs/client_dec.key";
|
||||||
static const char *pHeaderFile = "/etc/opennds/splashlogo_header";
|
|
||||||
const char *keytype = "PEM";
|
const char *keytype = "PEM";
|
||||||
char errbuf[CURL_ERROR_SIZE];
|
|
||||||
headerfile = fopen(pHeaderFile, "wb");
|
|
||||||
imagefile = fopen(dest_file, "wb");
|
imagefile = fopen(dest_file, "wb");
|
||||||
if(imagefile == NULL){
|
if(imagefile == NULL){
|
||||||
LOG(ERR, "fopen failed");
|
LOG(ERR, "fopen failed");
|
||||||
if(headerfile)
|
|
||||||
fclose(headerfile);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
curl = curl_easy_init();
|
curl = curl_easy_init();
|
||||||
|
|
||||||
if (curl == NULL){
|
if (curl == NULL){
|
||||||
LOG(ERR, "curl_easy_init failed");
|
LOG(ERR, "curl_easy_init failed");
|
||||||
clean_up(curl,imagefile,headerfile);
|
clean_up(curl,imagefile);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
curl_easy_setopt(curl, CURLOPT_HEADERDATA, headerfile);
|
|
||||||
curl_easy_setopt(curl, CURLOPT_URL, src_url);
|
curl_easy_setopt(curl, CURLOPT_URL, src_url);
|
||||||
curl_easy_setopt(curl, CURLOPT_SSLCERT, clientcert);
|
curl_easy_setopt(curl, CURLOPT_SSLCERT, clientcert);
|
||||||
curl_easy_setopt(curl, CURLOPT_SSLKEY, clientkey);
|
curl_easy_setopt(curl, CURLOPT_SSLKEY, clientkey);
|
||||||
@@ -403,23 +415,22 @@ void splash_page_logo(char* dest_file, char* src_url)
|
|||||||
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L);
|
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L);
|
||||||
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_data);
|
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_data);
|
||||||
curl_easy_setopt(curl, CURLOPT_WRITEDATA, imagefile);
|
curl_easy_setopt(curl, CURLOPT_WRITEDATA, imagefile);
|
||||||
curl_easy_setopt(curl, CURLOPT_ERRORBUFFER, errbuf);
|
|
||||||
curl_easy_setopt(curl, CURLOPT_HEADER, 0L);
|
curl_easy_setopt(curl, CURLOPT_HEADER, 0L);
|
||||||
|
|
||||||
res = curl_easy_perform(curl);
|
res = curl_easy_perform(curl);
|
||||||
if (res != CURLE_OK){
|
if (res != CURLE_OK){
|
||||||
clean_up(curl,imagefile,headerfile);
|
clean_up(curl,imagefile);
|
||||||
remove(dest_file);
|
remove(dest_file);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
clean_up(curl,imagefile,headerfile);
|
clean_up(curl,imagefile);
|
||||||
return ;
|
return ;
|
||||||
}
|
}
|
||||||
|
|
||||||
int ipset_create(char *ifnds)
|
int ipset_create(char *ifnds)
|
||||||
{
|
{
|
||||||
char command[64];
|
char command[64];
|
||||||
sprintf(command,"ipset create set_%s hash:ip", ifnds);
|
snprintf(command, sizeof(command), "ipset create set_%s hash:ip", ifnds);
|
||||||
return (system(command));
|
return (system(command));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -427,18 +438,19 @@ void captive_portal_get_current_urls(char *ifname, char *splash_logo, char *back
|
|||||||
{
|
{
|
||||||
char *buf = NULL;
|
char *buf = NULL;
|
||||||
struct blob_attr *tc[__NDS_ATTR_MAX] = { };
|
struct blob_attr *tc[__NDS_ATTR_MAX] = { };
|
||||||
struct blob_buf url_buf={ };
|
struct uci_section *cp_section = NULL;
|
||||||
struct uci_section *cp_section;
|
struct uci_package *opennds = NULL;
|
||||||
|
|
||||||
uci_load(cap_uci, "opennds", &opennds);
|
uci_load(caps_uci, "opennds", &opennds);
|
||||||
cp_section = uci_lookup_section(cap_uci, opennds,"opennds");
|
cp_section = uci_lookup_section(caps_uci, opennds,"opennds");
|
||||||
if(!cp_section) {
|
if(!cp_section) {
|
||||||
uci_unload(cap_uci, opennds);
|
uci_unload(caps_uci, opennds);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
blob_buf_init(&url_buf, 0);
|
blob_buf_init(&url_buf, 0);
|
||||||
uci_to_blob(&url_buf, cp_section, &opennds_param);
|
uci_to_blob(&url_buf, cp_section, &opennds_param);
|
||||||
|
|
||||||
blobmsg_parse(opennds_policy, __NDS_ATTR_MAX, tc, blob_data(url_buf.head), blob_len(url_buf.head));
|
blobmsg_parse(opennds_policy, __NDS_ATTR_MAX, tc, blob_data(url_buf.head), blob_len(url_buf.head));
|
||||||
|
|
||||||
if (tc[NDS_ATTR_SPLASH_PAGE_LOGO]) {
|
if (tc[NDS_ATTR_SPLASH_PAGE_LOGO]) {
|
||||||
@@ -460,7 +472,8 @@ void captive_portal_get_current_urls(char *ifname, char *splash_logo, char *back
|
|||||||
} else {
|
} else {
|
||||||
user_file[0]=0;
|
user_file[0]=0;
|
||||||
}
|
}
|
||||||
uci_unload(cap_uci, opennds);
|
uci_unload(caps_uci, opennds);
|
||||||
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
void opennds_parameters(char *ifname)
|
void opennds_parameters(char *ifname)
|
||||||
@@ -469,7 +482,7 @@ void opennds_parameters(char *ifname)
|
|||||||
char users_router[7][64] = { "allow tcp port 53","allow udp port 53",
|
char users_router[7][64] = { "allow tcp port 53","allow udp port 53",
|
||||||
"allow udp port 67","allow tcp port 22",
|
"allow udp port 67","allow tcp port 22",
|
||||||
"allow tcp port 23", "allow tcp port 80", "allow tcp port 443"};
|
"allow tcp port 23", "allow tcp port 80", "allow tcp port 443"};
|
||||||
struct blob_buf cap_blob={ };
|
|
||||||
blob_buf_init(&cap_blob, 0);
|
blob_buf_init(&cap_blob, 0);
|
||||||
|
|
||||||
blobmsg_add_string(&cap_blob, "fwhook_enabled","1");
|
blobmsg_add_string(&cap_blob, "fwhook_enabled","1");
|
||||||
@@ -493,38 +506,35 @@ void opennds_parameters(char *ifname)
|
|||||||
blobmsg_add_string(&cap_blob, NULL, users_router[i]);
|
blobmsg_add_string(&cap_blob, NULL, users_router[i]);
|
||||||
}
|
}
|
||||||
blobmsg_close_array(&cap_blob, d);
|
blobmsg_close_array(&cap_blob, d);
|
||||||
blob_to_uci_section(cap_uci, "opennds", "opennds", "opennds", cap_blob.head, &opennds_param, NULL);
|
blob_to_uci_section(caps_uci, "opennds", "opennds", "opennds", cap_blob.head, &opennds_param, NULL);
|
||||||
uci_commit_all(cap_uci);
|
uci_commit_all(caps_uci);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
void opennds_section_del(char *section_name)
|
void opennds_section_del(char *section_name)
|
||||||
{
|
{
|
||||||
struct uci_package *opennds;
|
struct uci_package *opennds;
|
||||||
struct uci_context *nds_ctx;
|
|
||||||
struct uci_element *e = NULL, *tmp = NULL;
|
struct uci_element *e = NULL, *tmp = NULL;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
|
||||||
nds_ctx = uci_alloc_context();
|
ret = uci_load(caps_uci, "opennds", &opennds);
|
||||||
ret = uci_load(nds_ctx, "opennds", &opennds);
|
|
||||||
if (ret) {
|
if (ret) {
|
||||||
LOGE("%s: %s uci_load() failed with rc %d", section_name, __func__, ret);
|
LOGE("%s: %s uci_load() failed with rc %d", section_name, __func__, ret);
|
||||||
uci_free_context(nds_ctx);
|
uci_unload(caps_uci, opennds);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
uci_foreach_element_safe(&opennds->sections, tmp, e) {
|
uci_foreach_element_safe(&opennds->sections, tmp, e) {
|
||||||
struct uci_section *s = uci_to_section(e);
|
struct uci_section *s = uci_to_section(e);
|
||||||
if (!strcmp(s->e.name, section_name)) {
|
if (!strcmp(s->e.name, section_name)) {
|
||||||
uci_section_del(nds_ctx, "vif", "opennds", (char *)s->e.name, section_name);
|
uci_section_del(caps_uci, "vif", "opennds", (char *)s->e.name, section_name);
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
uci_commit(nds_ctx, &opennds, false);
|
uci_commit(caps_uci, &opennds, false);
|
||||||
uci_unload(nds_ctx, opennds);
|
uci_unload(caps_uci, opennds);
|
||||||
uci_free_context(nds_ctx);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *ifname)
|
void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *ifname)
|
||||||
@@ -534,23 +544,26 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
const char *opt;
|
const char *opt;
|
||||||
const char *val;
|
const char *val;
|
||||||
blob_buf_init(&cap, 0);
|
blob_buf_init(&cap, 0);
|
||||||
char path[64];
|
char path[64] = {0};
|
||||||
char webroot[64];
|
char webroot[64] = {0};
|
||||||
|
|
||||||
char ipset_tcp80[64];
|
char ipset_tcp80[64];
|
||||||
char ipset_tcp443[64];
|
char ipset_tcp443[64];
|
||||||
char splash_logo[84];
|
|
||||||
char back_image[84];
|
|
||||||
char user_file[84];
|
|
||||||
|
|
||||||
sprintf(path,"/etc/opennds/htdocs/images/");
|
char splash_logo[84] = {0};
|
||||||
sprintf(webroot,"/etc/opennds/htdocs");
|
char back_image[84] = {0};
|
||||||
sprintf(ipset_tcp80,"allow tcp port 80 ipset set_opennds");
|
char user_file[84] = {0};
|
||||||
sprintf(ipset_tcp443,"allow tcp port 443 ipset set_opennds");
|
|
||||||
|
snprintf(path, sizeof(path), "/etc/opennds/htdocs/images/");
|
||||||
|
snprintf(webroot, sizeof(webroot), "/etc/opennds/htdocs");
|
||||||
|
|
||||||
|
snprintf(ipset_tcp80, sizeof(ipset_tcp80),"allow tcp port 80 ipset set_opennds");
|
||||||
|
snprintf(ipset_tcp443, sizeof(ipset_tcp443), "allow tcp port 443 ipset set_opennds");
|
||||||
|
|
||||||
char file_path[128];
|
char file_path[128];
|
||||||
struct stat st = {0};
|
struct stat st = {0};
|
||||||
if (stat(path, &st) == -1)
|
if (stat(path, &st) == -1)
|
||||||
mkdir(path, 0755);
|
mkdir(path, 0755);
|
||||||
|
|
||||||
captive_portal_get_current_urls(ifname, splash_logo, back_image, user_file);
|
captive_portal_get_current_urls(ifname, splash_logo, back_image, user_file);
|
||||||
|
|
||||||
for (j = 0; j < SCHEMA_CAPTIVE_PORTAL_OPTS_MAX; j++) {
|
for (j = 0; j < SCHEMA_CAPTIVE_PORTAL_OPTS_MAX; j++) {
|
||||||
@@ -575,6 +588,7 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
||||||
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
||||||
blobmsg_close_array(&cap, d);
|
blobmsg_close_array(&cap, d);
|
||||||
|
vif_fixup_set_iface_captive(ifname, true);
|
||||||
|
|
||||||
} else if (strcmp(value,"username")==0) {
|
} else if (strcmp(value,"username")==0) {
|
||||||
blobmsg_add_string(&cap, "webroot",webroot);
|
blobmsg_add_string(&cap, "webroot",webroot);
|
||||||
@@ -589,6 +603,8 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
||||||
blobmsg_close_array(&cap, d);
|
blobmsg_close_array(&cap, d);
|
||||||
|
|
||||||
|
vif_fixup_set_iface_captive(ifname, true);
|
||||||
|
|
||||||
} else if (strcmp(value,"radius")==0) {
|
} else if (strcmp(value,"radius")==0) {
|
||||||
blobmsg_add_string(&cap, "webroot",webroot);
|
blobmsg_add_string(&cap, "webroot",webroot);
|
||||||
opennds_parameters("opennds");
|
opennds_parameters("opennds");
|
||||||
@@ -596,14 +612,19 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
blobmsg_add_string(&cap, "enabled", "1");
|
blobmsg_add_string(&cap, "enabled", "1");
|
||||||
blobmsg_add_string(&cap, "gatewayinterface","br-lan");
|
blobmsg_add_string(&cap, "gatewayinterface","br-lan");
|
||||||
blobmsg_add_string(&cap, "preauth", "/usr/lib/opennds/radius.sh");
|
blobmsg_add_string(&cap, "preauth", "/usr/lib/opennds/radius.sh");
|
||||||
|
|
||||||
ipset_create("opennds");
|
ipset_create("opennds");
|
||||||
d = blobmsg_open_array(&cap, "preauthenticated_users");
|
d = blobmsg_open_array(&cap, "preauthenticated_users");
|
||||||
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
blobmsg_add_string(&cap, NULL, ipset_tcp80);
|
||||||
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
blobmsg_add_string(&cap, NULL, ipset_tcp443);
|
||||||
blobmsg_close_array(&cap, d);
|
blobmsg_close_array(&cap, d);
|
||||||
|
|
||||||
|
vif_fixup_set_iface_captive(ifname, true);
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
opennds_section_del("opennds");
|
vif_fixup_set_iface_captive(ifname, false);
|
||||||
|
if (vif_fixup_captive_enabled() == false)
|
||||||
|
opennds_section_del("opennds");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -630,17 +651,21 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
blobmsg_add_string(&cap, "gatewayname", value);
|
blobmsg_add_string(&cap, "gatewayname", value);
|
||||||
|
|
||||||
else if (strcmp(opt, "splash_page_logo") == 0) {
|
else if (strcmp(opt, "splash_page_logo") == 0) {
|
||||||
blobmsg_add_string(&cap, "splash_page_logo", value);
|
if (value[0] != '\0') {
|
||||||
if (strcmp(splash_logo,value) !=0) {
|
blobmsg_add_string(&cap, "splash_page_logo", value);
|
||||||
sprintf(file_path,"%s%s",path,"TipLogo.png");
|
if (strcmp(splash_logo,value) !=0) {
|
||||||
splash_page_logo(file_path,value);
|
snprintf(file_path, sizeof(file_path), "%s%s",path,"TipLogo.png");
|
||||||
|
captive_portal_files_download(file_path,value);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
} else if (strcmp(opt, "splash_page_background_logo") == 0) {
|
} else if (strcmp(opt, "splash_page_background_logo") == 0) {
|
||||||
blobmsg_add_string(&cap, "page_background_logo", value);
|
if (value[0] != '\0') {
|
||||||
if (strcmp(back_image,value) !=0) {
|
blobmsg_add_string(&cap, "page_background_logo", value);
|
||||||
sprintf(file_path,"%s%s",path,"TipBackLogo.png");
|
if (strcmp(back_image,value) !=0) {
|
||||||
splash_page_logo(file_path,value);
|
snprintf(file_path, sizeof(file_path),"%s%s",path,"TipBackLogo.png");
|
||||||
|
captive_portal_files_download(file_path,value);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -658,20 +683,24 @@ void vif_captive_portal_set(const struct schema_Wifi_VIF_Config *vconf, char *if
|
|||||||
blobmsg_add_string(&cap, "login_success_text", value);
|
blobmsg_add_string(&cap, "login_success_text", value);
|
||||||
|
|
||||||
else if (strcmp(opt, "username_password_file") == 0) {
|
else if (strcmp(opt, "username_password_file") == 0) {
|
||||||
blobmsg_add_string(&cap, "username_password_file", value);
|
if (value[0] != '\0') {
|
||||||
if (strcmp(user_file,value) !=0) {
|
blobmsg_add_string(&cap, "username_password_file", value);
|
||||||
sprintf(file_path,"%s%s",path,"userpass.dat");
|
if (strcmp(user_file,value) !=0) {
|
||||||
splash_page_logo(file_path,value);
|
snprintf(file_path, sizeof(file_path),"%s%s",path,"userpass.dat");
|
||||||
|
captive_portal_files_download(file_path,value);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
blob_to_uci_section(cap_uci, "opennds", "opennds", "opennds", cap.head, &opennds_param, NULL);
|
blob_to_uci_section(caps_uci, "opennds", "opennds", "opennds", cap.head, &opennds_param, NULL);
|
||||||
uci_commit_all(cap_uci);
|
uci_commit_all(caps_uci);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
void captive_portal_init()
|
void captive_portal_init()
|
||||||
{
|
{
|
||||||
cap_uci=uci_alloc_context();
|
caps_uci=uci_alloc_context();
|
||||||
|
capg_uci=uci_alloc_context();
|
||||||
dns=uci_alloc_context();
|
dns=uci_alloc_context();
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,89 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <fcntl.h>
|
||||||
|
#include <ctype.h>
|
||||||
|
#include <stdbool.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
|
||||||
|
#include "log.h"
|
||||||
|
#include "const.h"
|
||||||
|
#include "target.h"
|
||||||
|
|
||||||
|
#include <libubox/avl-cmp.h>
|
||||||
|
#include <libubox/avl.h>
|
||||||
|
#include <libubox/vlist.h>
|
||||||
|
#include <net/if.h>
|
||||||
|
|
||||||
|
#include "fixup.h"
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
* VIF Fixup
|
||||||
|
*/
|
||||||
|
|
||||||
|
static struct avl_tree vif_fixup_tree = AVL_TREE_INIT(vif_fixup_tree, avl_strcmp, false, NULL);
|
||||||
|
|
||||||
|
struct vif_fixup * vif_fixup_find(const char *ifname)
|
||||||
|
{
|
||||||
|
struct vif_fixup *vif = avl_find_element(&vif_fixup_tree, ifname, vif, avl);
|
||||||
|
if (vif)
|
||||||
|
return vif;
|
||||||
|
|
||||||
|
/* Not found, add */
|
||||||
|
vif = malloc(sizeof(*vif));
|
||||||
|
if (!vif)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
|
memset(vif, 0, sizeof(*vif));
|
||||||
|
strncpy(vif->name, ifname, IF_NAMESIZE);
|
||||||
|
vif->avl.key = vif->name;
|
||||||
|
avl_insert(&vif_fixup_tree, &vif->avl);
|
||||||
|
return vif;
|
||||||
|
}
|
||||||
|
|
||||||
|
void vif_fixup_del(char *ifname)
|
||||||
|
{
|
||||||
|
struct vif_fixup *vif = NULL;
|
||||||
|
vif = avl_find_element(&vif_fixup_tree, ifname, vif, avl);
|
||||||
|
if (vif) {
|
||||||
|
avl_delete(&vif_fixup_tree, &vif->avl);
|
||||||
|
free(vif);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
bool vif_fixup_captive_enabled(void)
|
||||||
|
{
|
||||||
|
struct vif_fixup *vif_ptr = NULL;
|
||||||
|
struct vif_fixup *vif = NULL;
|
||||||
|
|
||||||
|
avl_for_each_element_safe(&vif_fixup_tree, vif, avl, vif_ptr) {
|
||||||
|
if (vif->has_captive == true)
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool vif_fixup_iface_captive_enabled(const char *ifname)
|
||||||
|
{
|
||||||
|
struct vif_fixup * vif = NULL;
|
||||||
|
|
||||||
|
vif = vif_fixup_find(ifname);
|
||||||
|
|
||||||
|
if (vif)
|
||||||
|
return vif->has_captive;
|
||||||
|
else
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
void vif_fixup_set_iface_captive(const char *ifname, bool en)
|
||||||
|
{
|
||||||
|
struct vif_fixup * vif = NULL;
|
||||||
|
|
||||||
|
vif = vif_fixup_find(ifname);
|
||||||
|
|
||||||
|
if (vif)
|
||||||
|
vif->has_captive = en;
|
||||||
|
}
|
||||||
@@ -27,6 +27,7 @@
|
|||||||
#include "rrm_config.h"
|
#include "rrm_config.h"
|
||||||
#include "vlan.h"
|
#include "vlan.h"
|
||||||
#include "radius_proxy.h"
|
#include "radius_proxy.h"
|
||||||
|
#include "timer.h"
|
||||||
|
|
||||||
ovsdb_table_t table_Hotspot20_Config;
|
ovsdb_table_t table_Hotspot20_Config;
|
||||||
ovsdb_table_t table_Hotspot20_OSU_Providers;
|
ovsdb_table_t table_Hotspot20_OSU_Providers;
|
||||||
@@ -35,14 +36,16 @@ ovsdb_table_t table_Radius_Proxy_Config;
|
|||||||
|
|
||||||
ovsdb_table_t table_APC_Config;
|
ovsdb_table_t table_APC_Config;
|
||||||
ovsdb_table_t table_APC_State;
|
ovsdb_table_t table_APC_State;
|
||||||
|
ovsdb_table_t table_Wifi_VIF_Config;
|
||||||
|
ovsdb_table_t table_Wifi_Inet_Config;
|
||||||
|
ovsdb_table_t table_Node_Config;
|
||||||
|
|
||||||
unsigned int radproxy_apc = 0;
|
unsigned int radproxy_apc = 0;
|
||||||
extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record);
|
|
||||||
|
|
||||||
static struct uci_package *wireless;
|
static struct uci_package *wireless;
|
||||||
struct uci_context *uci;
|
struct uci_context *uci;
|
||||||
struct blob_buf b = { };
|
struct blob_buf b = { };
|
||||||
struct blob_buf del = { };
|
struct blob_buf del = { };
|
||||||
int reload_config = 0;
|
|
||||||
static struct timespec startup_time;
|
static struct timespec startup_time;
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
@@ -182,6 +185,36 @@ static void radio_state_custom_options_get(struct schema_Wifi_Radio_State *rstat
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void set_channel_max_power(struct schema_Wifi_Radio_State *rstate,
|
||||||
|
int *index, int channel,
|
||||||
|
int max_power)
|
||||||
|
{
|
||||||
|
rstate->channel_max_power_keys[*index] = channel;
|
||||||
|
rstate->channel_max_power[*index] = max_power;
|
||||||
|
*index += 1;
|
||||||
|
rstate->channel_max_power_len = *index;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update the entire channel_max_power map in the radio state
|
||||||
|
static void update_channel_max_power(char* phy, struct schema_Wifi_Radio_State *rstate) {
|
||||||
|
int channels[64];
|
||||||
|
int channel_count = phy_get_channels(phy, channels);
|
||||||
|
channel_count += phy_get_dfs_channels(phy, channels + channel_count);
|
||||||
|
|
||||||
|
// Clear the data previously stored in channel_max_power
|
||||||
|
memset(rstate->channel_max_power_keys, 0, sizeof(rstate->channel_max_power_keys));
|
||||||
|
memset(rstate->channel_max_power, 0, sizeof(rstate->channel_max_power));
|
||||||
|
rstate->channel_max_power_len = 0;
|
||||||
|
|
||||||
|
// Set the new values for channel_max_power
|
||||||
|
int i, index = 0;
|
||||||
|
for (i = 0; i < channel_count && i < 64; i++) {
|
||||||
|
int channel = channels[i];
|
||||||
|
int max_tx_power = phy_get_max_tx_power(phy, channel);
|
||||||
|
set_channel_max_power(rstate, &index, channel, max_tx_power);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
const struct uci_blob_param_list wifi_device_param = {
|
const struct uci_blob_param_list wifi_device_param = {
|
||||||
.n_params = __WDEV_ATTR_MAX,
|
.n_params = __WDEV_ATTR_MAX,
|
||||||
.params = wifi_device_policy,
|
.params = wifi_device_policy,
|
||||||
@@ -217,6 +250,8 @@ static bool radio_state_update(struct uci_section *s, struct schema_Wifi_Radio_C
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
update_channel_max_power(phy, &rstate);
|
||||||
|
|
||||||
if (tb[WDEV_ATTR_CHANNEL]) {
|
if (tb[WDEV_ATTR_CHANNEL]) {
|
||||||
nl80211_channel_get(phy, &chan);
|
nl80211_channel_get(phy, &chan);
|
||||||
if(chan)
|
if(chan)
|
||||||
@@ -409,8 +444,26 @@ bool target_radio_config_set2(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
|
|
||||||
if ((changed->ht_mode) || (changed->hw_mode) || (changed->freq_band)) {
|
if ((changed->ht_mode) || (changed->hw_mode) || (changed->freq_band)) {
|
||||||
int channel_freq;
|
int channel_freq;
|
||||||
|
char buffer[8];
|
||||||
|
FILE *confFile_p;
|
||||||
|
const char* hw_mode = rconf->hw_mode;
|
||||||
|
|
||||||
channel_freq = ieee80211_channel_to_frequency(rconf->channel);
|
channel_freq = ieee80211_channel_to_frequency(rconf->channel);
|
||||||
struct mode_map *m = mode_map_get_uci(rconf->freq_band, get_max_channel_bw_channel(channel_freq, rconf->ht_mode), rconf->hw_mode);
|
if (!strcmp(rconf->hw_mode, "auto")) {
|
||||||
|
char command[] = "auto-conf ";
|
||||||
|
strcat(command, phy);
|
||||||
|
confFile_p = popen(command, "r");
|
||||||
|
|
||||||
|
if (confFile_p)
|
||||||
|
{
|
||||||
|
fgets(buffer, sizeof(buffer), confFile_p);
|
||||||
|
pclose(confFile_p);
|
||||||
|
buffer[strlen(buffer) - 1] = '\0'; // Remove extra \n that got added from 'echo' in script
|
||||||
|
hw_mode = buffer;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
struct mode_map *m = mode_map_get_uci(rconf->freq_band, get_max_channel_bw_channel(channel_freq, rconf->ht_mode), hw_mode);
|
||||||
if (m) {
|
if (m) {
|
||||||
blobmsg_add_string(&b, "htmode", m->ucihtmode);
|
blobmsg_add_string(&b, "htmode", m->ucihtmode);
|
||||||
blobmsg_add_string(&b, "hwmode", m->ucihwmode);
|
blobmsg_add_string(&b, "hwmode", m->ucihwmode);
|
||||||
@@ -438,20 +491,14 @@ bool target_radio_config_set2(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
blob_to_uci_section(uci, "wireless", rconf->if_name, "wifi-device",
|
blob_to_uci_section(uci, "wireless", rconf->if_name, "wifi-device",
|
||||||
b.head, &wifi_device_param, del.head);
|
b.head, &wifi_device_param, del.head);
|
||||||
|
|
||||||
reload_config = 1;
|
uci_commit_all(uci);
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void periodic_task(void *arg)
|
static void periodic_task(void *arg)
|
||||||
{
|
{
|
||||||
static int counter = 0;
|
|
||||||
struct uci_element *e = NULL, *tmp = NULL;
|
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
struct uci_element *e = NULL, *tmp = NULL;
|
||||||
if ((counter % 15) && !reload_config)
|
|
||||||
goto done;
|
|
||||||
|
|
||||||
if (startup_time.tv_sec) {
|
if (startup_time.tv_sec) {
|
||||||
static struct timespec current_time;
|
static struct timespec current_time;
|
||||||
|
|
||||||
@@ -462,20 +509,11 @@ static void periodic_task(void *arg)
|
|||||||
radio_maverick(NULL);
|
radio_maverick(NULL);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (reload_config) {
|
|
||||||
LOGD("periodic: reload_config");
|
|
||||||
reload_config = 0;
|
|
||||||
uci_commit_all(uci);
|
|
||||||
sync();
|
|
||||||
system("reload_config");
|
|
||||||
}
|
|
||||||
|
|
||||||
LOGD("periodic: start state update ");
|
LOGD("periodic: start state update ");
|
||||||
ret = uci_load(uci, "wireless", &wireless);
|
ret = uci_load(uci, "wireless", &wireless);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
LOGE("%s: uci_load() failed with rc %d", __func__, ret);
|
LOGE("%s: uci_load() failed with rc %d", __func__, ret);
|
||||||
return;
|
goto out;
|
||||||
}
|
}
|
||||||
uci_foreach_element_safe(&wireless->sections, tmp, e) {
|
uci_foreach_element_safe(&wireless->sections, tmp, e) {
|
||||||
struct uci_section *s = uci_to_section(e);
|
struct uci_section *s = uci_to_section(e);
|
||||||
@@ -493,9 +531,8 @@ static void periodic_task(void *arg)
|
|||||||
uci_unload(uci, wireless);
|
uci_unload(uci, wireless);
|
||||||
LOGD("periodic: stop state update ");
|
LOGD("periodic: stop state update ");
|
||||||
|
|
||||||
done:
|
out:
|
||||||
counter++;
|
evsched_task_reschedule_ms(EVSCHED_SEC(15));
|
||||||
evsched_task_reschedule_ms(EVSCHED_SEC(1));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
bool target_radio_config_init2(void)
|
bool target_radio_config_init2(void)
|
||||||
@@ -528,7 +565,6 @@ bool target_radio_config_init2(void)
|
|||||||
}
|
}
|
||||||
if (invalidVifFound) {
|
if (invalidVifFound) {
|
||||||
uci_commit(uci, &wireless, false);
|
uci_commit(uci, &wireless, false);
|
||||||
reload_config = 1;
|
|
||||||
}
|
}
|
||||||
uci_unload(uci, wireless);
|
uci_unload(uci, wireless);
|
||||||
|
|
||||||
@@ -611,6 +647,7 @@ void radio_maverick(void *arg)
|
|||||||
uci_unload(uci, wireless);
|
uci_unload(uci, wireless);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static void callback_Hotspot20_Config(ovsdb_update_monitor_t *mon,
|
static void callback_Hotspot20_Config(ovsdb_update_monitor_t *mon,
|
||||||
struct schema_Hotspot20_Config *old,
|
struct schema_Hotspot20_Config *old,
|
||||||
struct schema_Hotspot20_Config *conf)
|
struct schema_Hotspot20_Config *conf)
|
||||||
@@ -630,6 +667,7 @@ static void callback_Hotspot20_Config(ovsdb_update_monitor_t *mon,
|
|||||||
LOG(ERR, "Hotspot20_Config: unexpected mon_type %d %s", mon->mon_type, mon->mon_uuid);
|
LOG(ERR, "Hotspot20_Config: unexpected mon_type %d %s", mon->mon_type, mon->mon_uuid);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
set_config_apply_timeout(mon);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -653,6 +691,7 @@ static void callback_Hotspot20_OSU_Providers(ovsdb_update_monitor_t *mon,
|
|||||||
mon->mon_type, mon->mon_uuid);
|
mon->mon_type, mon->mon_uuid);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
set_config_apply_timeout(mon);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -677,6 +716,7 @@ static void callback_Hotspot20_Icon_Config(ovsdb_update_monitor_t *mon,
|
|||||||
mon->mon_type, mon->mon_uuid);
|
mon->mon_type, mon->mon_uuid);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
set_config_apply_timeout(mon);
|
||||||
return;
|
return;
|
||||||
|
|
||||||
}
|
}
|
||||||
@@ -768,9 +808,105 @@ static const struct blobmsg_policy apc_policy[__APC_ATTR_MAX] = {
|
|||||||
|
|
||||||
struct schema_APC_Config apc_conf;
|
struct schema_APC_Config apc_conf;
|
||||||
|
|
||||||
|
|
||||||
|
bool apc_read_conf(struct schema_APC_Config *apcconf)
|
||||||
|
{
|
||||||
|
json_t *jrows;
|
||||||
|
int cnt = 0;
|
||||||
|
int i = 0;
|
||||||
|
pjs_errmsg_t perr;
|
||||||
|
|
||||||
|
jrows = ovsdb_sync_select_where(SCHEMA_TABLE(APC_Config), NULL);
|
||||||
|
if(!jrows)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
cnt = json_array_size(jrows);
|
||||||
|
if(!cnt)
|
||||||
|
{
|
||||||
|
json_decref(jrows);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i = 0; i < cnt; i++)
|
||||||
|
{
|
||||||
|
if(!schema_APC_Config_from_json(apcconf, json_array_get(jrows, i),
|
||||||
|
false, perr))
|
||||||
|
{
|
||||||
|
LOGE("Unable to parse APC Config column: %s", perr);
|
||||||
|
json_decref(jrows);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
json_decref(jrows);
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool apc_read_state(struct schema_APC_State *apcst)
|
||||||
|
{
|
||||||
|
json_t *jrows;
|
||||||
|
int cnt = 0;
|
||||||
|
int i = 0;
|
||||||
|
pjs_errmsg_t perr;
|
||||||
|
|
||||||
|
jrows = ovsdb_sync_select_where(SCHEMA_TABLE(APC_State), NULL);
|
||||||
|
if(!jrows)
|
||||||
|
{
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
cnt = json_array_size(jrows);
|
||||||
|
if(!cnt)
|
||||||
|
{
|
||||||
|
json_decref(jrows);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i = 0; i < cnt; i++)
|
||||||
|
{
|
||||||
|
if(!schema_APC_State_from_json(apcst, json_array_get(jrows, i),
|
||||||
|
false, perr))
|
||||||
|
{
|
||||||
|
LOGE("Unable to parse APC State column: %s", perr);
|
||||||
|
json_decref(jrows);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
json_decref(jrows);
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Check if apc conf is disabled, if disabled the update state
|
||||||
|
* with NC mode and return, this is to avoid the apc ubus
|
||||||
|
* notifications which come after the APC is disabled */
|
||||||
|
bool apc_conf_en()
|
||||||
|
{
|
||||||
|
struct schema_APC_Config apcconf;
|
||||||
|
struct schema_APC_State apc_state;
|
||||||
|
|
||||||
|
if(apc_read_conf(&apcconf) == false)
|
||||||
|
return true;
|
||||||
|
|
||||||
|
if (apcconf.enabled == false) {
|
||||||
|
SCHEMA_SET_STR(apc_state.mode, "NC");
|
||||||
|
SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0");
|
||||||
|
SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0");
|
||||||
|
SCHEMA_SET_INT(apc_state.enabled, false);
|
||||||
|
if (!ovsdb_table_update(&table_APC_State, &apc_state))
|
||||||
|
LOG(ERR, "APC_state: failed to update");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
void apc_state_set(struct blob_attr *msg)
|
void apc_state_set(struct blob_attr *msg)
|
||||||
{
|
{
|
||||||
struct blob_attr *tb[__APC_ATTR_MAX] = { };
|
struct blob_attr *tb[__APC_ATTR_MAX] = { };
|
||||||
|
struct schema_APC_State apc_state;
|
||||||
|
|
||||||
|
if(apc_conf_en() == false)
|
||||||
|
return;
|
||||||
|
|
||||||
blobmsg_parse(apc_policy, __APC_ATTR_MAX, tb,
|
blobmsg_parse(apc_policy, __APC_ATTR_MAX, tb,
|
||||||
blob_data(msg), blob_len(msg));
|
blob_data(msg), blob_len(msg));
|
||||||
@@ -814,13 +950,35 @@ static int conn_since = 0;
|
|||||||
|
|
||||||
static void apc_enable(bool flag) {
|
static void apc_enable(bool flag) {
|
||||||
|
|
||||||
SCHEMA_SET_INT(apc_conf.enabled, flag);
|
struct schema_APC_State apc_state;
|
||||||
if (!ovsdb_table_update(&table_APC_Config, &apc_conf)) {
|
|
||||||
LOG(ERR, "%s:APC_Config: failed to update", __func__);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
LOGI("APC %s: %s APC", __func__, flag?"enable":"disable");
|
LOGI("APC %s: %s APC", __func__, flag?"enable":"disable");
|
||||||
|
if (flag == false) {
|
||||||
|
if(apc_read_state(&apc_state) == false) {
|
||||||
|
LOG(ERR, "%s: APC_State read failed", __func__);
|
||||||
|
apc_state.enabled = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (apc_state.enabled == true) {
|
||||||
|
SCHEMA_SET_INT(apc_conf.enabled, flag);
|
||||||
|
if (!ovsdb_table_update(&table_APC_Config, &apc_conf)) {
|
||||||
|
LOG(ERR, "%s:APC_Config: failed to update", __func__);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
SCHEMA_SET_STR(apc_state.mode, "NC");
|
||||||
|
SCHEMA_SET_STR(apc_state.dr_addr, "0.0.0.0");
|
||||||
|
SCHEMA_SET_STR(apc_state.bdr_addr, "0.0.0.0");
|
||||||
|
SCHEMA_SET_INT(apc_state.enabled, false);
|
||||||
|
if (!ovsdb_table_update(&table_APC_State, &apc_state))
|
||||||
|
LOG(ERR, "APC_state: failed to update");
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
SCHEMA_SET_INT(apc_conf.enabled, flag);
|
||||||
|
if (!ovsdb_table_update(&table_APC_Config, &apc_conf)) {
|
||||||
|
LOG(ERR, "%s:APC_Config: failed to update", __func__);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
@@ -829,24 +987,20 @@ apc_cld_mon_cb(struct schema_Manager *mgr)
|
|||||||
int i = 0;
|
int i = 0;
|
||||||
conn_since = 0;
|
conn_since = 0;
|
||||||
struct schema_APC_State apc_state;
|
struct schema_APC_State apc_state;
|
||||||
json_t *where;
|
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
int link = 1;
|
int link = 1;
|
||||||
|
|
||||||
where = ovsdb_table_where(&table_APC_State, &apc_state);
|
if(apc_read_state(&apc_state) == false) {
|
||||||
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
|
||||||
where, &apc_state)) {
|
|
||||||
LOG(ERR, "%s: APC_State read failed", __func__);
|
LOG(ERR, "%s: APC_State read failed", __func__);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/*Checks if wan ethernet port is down and disables apc*/
|
/*Checks if wan ethernet port is down and disables apc*/
|
||||||
ret = system("/bin/check_wan_link.sh");
|
ret = system("/bin/check_wan_link.sh");
|
||||||
if (WIFEXITED(ret)) {
|
if (WIFEXITED(ret)) {
|
||||||
LOGI("The return value: %d\n", WEXITSTATUS(ret));
|
|
||||||
link = WEXITSTATUS(ret);
|
link = WEXITSTATUS(ret);
|
||||||
if (link == 0) {
|
if (link == 0) {
|
||||||
|
LOGD("APC link down");
|
||||||
apc_enable(false);
|
apc_enable(false);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@@ -861,7 +1015,6 @@ apc_cld_mon_cb(struct schema_Manager *mgr)
|
|||||||
if(!strncmp(mgr->status_keys[i] , "sec_since_connect",
|
if(!strncmp(mgr->status_keys[i] , "sec_since_connect",
|
||||||
strlen("sec_since_connect"))) {
|
strlen("sec_since_connect"))) {
|
||||||
conn_since = atoi(mgr->status[i]);
|
conn_since = atoi(mgr->status[i]);
|
||||||
LOGI("conn_since: %d", conn_since);
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -934,6 +1087,51 @@ void apc_init()
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void apply_config_handler(struct timeout *timeout)
|
||||||
|
{
|
||||||
|
uci_commit_all(uci);
|
||||||
|
sync();
|
||||||
|
LOGI("====Calling reload_config====");
|
||||||
|
system("/sbin/reload_config");
|
||||||
|
}
|
||||||
|
|
||||||
|
static struct timeout config_timer = {
|
||||||
|
.cb = apply_config_handler
|
||||||
|
};
|
||||||
|
|
||||||
|
static void config_timer_task(void *arg)
|
||||||
|
{
|
||||||
|
timer_expiry_check(&config_timer);
|
||||||
|
evsched_task_reschedule_ms(EVSCHED_SEC(1));
|
||||||
|
}
|
||||||
|
|
||||||
|
void set_config_apply_timeout(ovsdb_update_monitor_t *mon)
|
||||||
|
{
|
||||||
|
static bool firstconfig = true;
|
||||||
|
LOGI("=====Received config update - table:%s uuid:%s Action:%d======", mon->mon_table, mon->mon_uuid, mon->mon_type);
|
||||||
|
if(firstconfig) {
|
||||||
|
firstconfig = false;
|
||||||
|
timeout_set(&config_timer, CONFIG_APPLY_TIMEOUT * 1000);
|
||||||
|
evsched_task(&config_timer_task, NULL, EVSCHED_SEC(1));
|
||||||
|
} else {
|
||||||
|
timeout_set(&config_timer, CONFIG_APPLY_TIMEOUT * 1000);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon,
|
||||||
|
struct schema_Wifi_Inet_Config *old_rec,
|
||||||
|
struct schema_Wifi_Inet_Config *iconf)
|
||||||
|
{
|
||||||
|
set_config_apply_timeout(mon);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void callback_Node_Config(ovsdb_update_monitor_t *mon,
|
||||||
|
struct schema_Node_Config *old,
|
||||||
|
struct schema_Node_Config *conf)
|
||||||
|
{
|
||||||
|
set_config_apply_timeout(mon);
|
||||||
|
}
|
||||||
|
|
||||||
bool target_radio_init(const struct target_radio_ops *ops)
|
bool target_radio_init(const struct target_radio_ops *ops)
|
||||||
{
|
{
|
||||||
uci = uci_alloc_context();
|
uci = uci_alloc_context();
|
||||||
@@ -962,6 +1160,11 @@ bool target_radio_init(const struct target_radio_ops *ops)
|
|||||||
OVSDB_TABLE_INIT(Radius_Proxy_Config, _uuid);
|
OVSDB_TABLE_INIT(Radius_Proxy_Config, _uuid);
|
||||||
OVSDB_TABLE_MONITOR(Radius_Proxy_Config, false);
|
OVSDB_TABLE_MONITOR(Radius_Proxy_Config, false);
|
||||||
|
|
||||||
|
OVSDB_TABLE_INIT(Wifi_Inet_Config, _uuid);
|
||||||
|
OVSDB_TABLE_MONITOR(Wifi_Inet_Config, false);
|
||||||
|
|
||||||
|
OVSDB_TABLE_INIT(Node_Config, _uuid);
|
||||||
|
OVSDB_TABLE_MONITOR(Node_Config, false);
|
||||||
|
|
||||||
evsched_task(&periodic_task, NULL, EVSCHED_SEC(5));
|
evsched_task(&periodic_task, NULL, EVSCHED_SEC(5));
|
||||||
|
|
||||||
|
|||||||
@@ -395,6 +395,7 @@ static void nl80211_add_phy(struct nlattr **tb, char *name)
|
|||||||
|
|
||||||
if (tb_freq[NL80211_FREQUENCY_ATTR_RADAR]) {
|
if (tb_freq[NL80211_FREQUENCY_ATTR_RADAR]) {
|
||||||
phy->chandfs[chan] = 1;
|
phy->chandfs[chan] = 1;
|
||||||
|
phy->chanpwr[chan] = nla_get_u32(tb_freq[NL80211_FREQUENCY_ATTR_MAX_TX_POWER]);
|
||||||
phy->chandisabled[chan] = 0;
|
phy->chandisabled[chan] = 0;
|
||||||
LOG(DEBUG, "%s: found dfs channel %d", phy->name, chan);
|
LOG(DEBUG, "%s: found dfs channel %d", phy->name, chan);
|
||||||
continue;
|
continue;
|
||||||
|
|||||||
@@ -55,6 +55,7 @@ enum {
|
|||||||
RADIUS_PROXY_SERVER_STATUS,
|
RADIUS_PROXY_SERVER_STATUS,
|
||||||
RADIUS_PROXY_SERVER_TLS,
|
RADIUS_PROXY_SERVER_TLS,
|
||||||
RADIUS_PROXY_SERVER_CERT_NAME_CHECK,
|
RADIUS_PROXY_SERVER_CERT_NAME_CHECK,
|
||||||
|
RADIUS_PROXY_SERVER_DYNAMIC_LOOKUP,
|
||||||
__RADIUS_PROXY_SERVER_MAX
|
__RADIUS_PROXY_SERVER_MAX
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -104,6 +105,7 @@ static const struct blobmsg_policy radius_proxy_server_policy[__RADIUS_PROXY_SER
|
|||||||
[RADIUS_PROXY_SERVER_STATUS] = { .name = "statusServer", BLOBMSG_TYPE_BOOL },
|
[RADIUS_PROXY_SERVER_STATUS] = { .name = "statusServer", BLOBMSG_TYPE_BOOL },
|
||||||
[RADIUS_PROXY_SERVER_TLS] = { .name = "tls", BLOBMSG_TYPE_STRING },
|
[RADIUS_PROXY_SERVER_TLS] = { .name = "tls", BLOBMSG_TYPE_STRING },
|
||||||
[RADIUS_PROXY_SERVER_CERT_NAME_CHECK] = { .name = "certificateNameCheck", BLOBMSG_TYPE_BOOL },
|
[RADIUS_PROXY_SERVER_CERT_NAME_CHECK] = { .name = "certificateNameCheck", BLOBMSG_TYPE_BOOL },
|
||||||
|
[RADIUS_PROXY_SERVER_DYNAMIC_LOOKUP] = { .name = "dynamicLookupCommand", BLOBMSG_TYPE_STRING },
|
||||||
};
|
};
|
||||||
|
|
||||||
static const struct blobmsg_policy radius_proxy_realm_policy[__RADIUS_PROXY_REALM_MAX] = {
|
static const struct blobmsg_policy radius_proxy_realm_policy[__RADIUS_PROXY_REALM_MAX] = {
|
||||||
@@ -220,14 +222,6 @@ static bool radius_proxy_config_set(struct schema_Radius_Proxy_Config *conf)
|
|||||||
char server_name[256] = {};
|
char server_name[256] = {};
|
||||||
char acct_server_name[256] = {};
|
char acct_server_name[256] = {};
|
||||||
char tls_name[256] = {};
|
char tls_name[256] = {};
|
||||||
struct schema_APC_State apc_conf;
|
|
||||||
|
|
||||||
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
|
||||||
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
|
||||||
where, &apc_conf)) {
|
|
||||||
LOG(INFO, "APC_State read failed");
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Configure options block */
|
/* Configure options block */
|
||||||
blob_buf_init(&uci_buf, 0);
|
blob_buf_init(&uci_buf, 0);
|
||||||
@@ -290,12 +284,19 @@ static bool radius_proxy_config_set(struct schema_Radius_Proxy_Config *conf)
|
|||||||
"tls", uci_buf.head, &radius_proxy_tls_param, NULL);
|
"tls", uci_buf.head, &radius_proxy_tls_param, NULL);
|
||||||
|
|
||||||
blob_buf_init(&uci_buf, 0);
|
blob_buf_init(&uci_buf, 0);
|
||||||
|
if (conf->auto_discover)
|
||||||
|
{ /* auto discover radsec server address via realm DNS NAPTR record */
|
||||||
|
blobmsg_add_string(&uci_buf, "dynamicLookupCommand", "/bin/dynamic_lookup.sh");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
blobmsg_add_string(&uci_buf, "host", conf->server);
|
||||||
|
blobmsg_add_u32(&uci_buf, "port", conf->port);
|
||||||
|
blobmsg_add_string(&uci_buf, "secret", "radsec");
|
||||||
|
}
|
||||||
blobmsg_add_string(&uci_buf, "name", server_name);
|
blobmsg_add_string(&uci_buf, "name", server_name);
|
||||||
blobmsg_add_string(&uci_buf, "host", conf->server);
|
|
||||||
blobmsg_add_string(&uci_buf, "type", "tls");
|
blobmsg_add_string(&uci_buf, "type", "tls");
|
||||||
blobmsg_add_string(&uci_buf, "tls", tls_name);
|
blobmsg_add_string(&uci_buf, "tls", tls_name);
|
||||||
blobmsg_add_u32(&uci_buf, "port", conf->port);
|
|
||||||
blobmsg_add_string(&uci_buf, "secret", "radsec");
|
|
||||||
blobmsg_add_bool(&uci_buf, "statusServer", 0);
|
blobmsg_add_bool(&uci_buf, "statusServer", 0);
|
||||||
blobmsg_add_bool(&uci_buf, "certificateNameCheck", 0);
|
blobmsg_add_bool(&uci_buf, "certificateNameCheck", 0);
|
||||||
blob_to_uci_section(uci, "radsecproxy", server_name, "server",
|
blob_to_uci_section(uci, "radsecproxy", server_name, "server",
|
||||||
@@ -356,7 +357,6 @@ static bool radius_proxy_config_set(struct schema_Radius_Proxy_Config *conf)
|
|||||||
blob_to_uci_section(uci, "radsecproxy", name, "realm",
|
blob_to_uci_section(uci, "radsecproxy", name, "realm",
|
||||||
uci_buf.head, &radius_proxy_realm_param, NULL);
|
uci_buf.head, &radius_proxy_realm_param, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
uci_commit_all(uci);
|
uci_commit_all(uci);
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
@@ -385,7 +385,6 @@ static bool radius_proxy_config_delete()
|
|||||||
uci_commit(rad_uci, &radsecproxy, false);
|
uci_commit(rad_uci, &radsecproxy, false);
|
||||||
uci_unload(rad_uci, radsecproxy);
|
uci_unload(rad_uci, radsecproxy);
|
||||||
uci_free_context(rad_uci);
|
uci_free_context(rad_uci);
|
||||||
reload_config = 1;
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -410,7 +409,8 @@ void callback_Radius_Proxy_Config(ovsdb_update_monitor_t *self,
|
|||||||
LOG(ERR, "Radius_Proxy_Config: unexpected mon_type %d %s",
|
LOG(ERR, "Radius_Proxy_Config: unexpected mon_type %d %s",
|
||||||
self->mon_type, self->mon_uuid);
|
self->mon_type, self->mon_uuid);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
set_config_apply_timeout(self);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -178,7 +178,8 @@ void callback_Wifi_RRM_Config(ovsdb_update_monitor_t *self,
|
|||||||
default:
|
default:
|
||||||
LOG(ERR, "Wifi_RRM_Config: unexpected mon_type %d %s", self->mon_type, self->mon_uuid);
|
LOG(ERR, "Wifi_RRM_Config: unexpected mon_type %d %s", self->mon_type, self->mon_uuid);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
set_config_apply_timeout(self);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -350,12 +350,12 @@ bool target_stats_device_temp_get(radio_entry_t *radio_cfg, dpp_device_temp_t *t
|
|||||||
char hwmon_path[PATH_MAX];
|
char hwmon_path[PATH_MAX];
|
||||||
int32_t temperature;
|
int32_t temperature;
|
||||||
FILE *fp = NULL;
|
FILE *fp = NULL;
|
||||||
|
bool DegreesNotMilliDegrees;
|
||||||
|
|
||||||
if (phy_find_hwmon(target_map_ifname(radio_cfg->phy_name), hwmon_path)) {
|
if (phy_find_hwmon(target_map_ifname(radio_cfg->phy_name), hwmon_path, &DegreesNotMilliDegrees)) {
|
||||||
LOG(ERR, "%s: hwmon is missing", radio_cfg->phy_name);
|
LOG(ERR, "%s: hwmon is missing", radio_cfg->phy_name);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
fp = fopen(hwmon_path, "r");
|
fp = fopen(hwmon_path, "r");
|
||||||
if (!fp) {
|
if (!fp) {
|
||||||
LOG(ERR, "%s: Failed to open temp input files", radio_cfg->phy_name);
|
LOG(ERR, "%s: Failed to open temp input files", radio_cfg->phy_name);
|
||||||
@@ -372,7 +372,10 @@ bool target_stats_device_temp_get(radio_entry_t *radio_cfg, dpp_device_temp_t *t
|
|||||||
|
|
||||||
fclose(fp);
|
fclose(fp);
|
||||||
temp_entry->type = radio_cfg->type;
|
temp_entry->type = radio_cfg->type;
|
||||||
temp_entry->value = temperature / 1000;
|
if(DegreesNotMilliDegrees)
|
||||||
|
temp_entry->value = temperature;
|
||||||
|
else
|
||||||
|
temp_entry->value = temperature / 1000;
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -38,7 +38,8 @@
|
|||||||
|
|
||||||
extern struct ev_loop *wifihal_evloop;
|
extern struct ev_loop *wifihal_evloop;
|
||||||
static int nl80211_scan_started;
|
static int nl80211_scan_started;
|
||||||
static struct unl unl;
|
static struct unl unl_req;
|
||||||
|
static struct unl unl_notify;
|
||||||
static ev_io unl_io;
|
static ev_io unl_io;
|
||||||
|
|
||||||
struct nl80211_scan {
|
struct nl80211_scan {
|
||||||
@@ -345,7 +346,7 @@ static struct nl_msg *nl80211_call_phy(char *name, int cmd, bool dump)
|
|||||||
if (idx < 0)
|
if (idx < 0)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
msg = unl_genl_msg(&unl, cmd, dump);
|
msg = unl_genl_msg(&unl_req, cmd, dump);
|
||||||
nla_put_u32(msg, NL80211_ATTR_WIPHY, idx);
|
nla_put_u32(msg, NL80211_ATTR_WIPHY, idx);
|
||||||
|
|
||||||
return msg;
|
return msg;
|
||||||
@@ -461,7 +462,7 @@ static void nl80211_ev(struct ev_loop *ev, struct ev_io *io, int event)
|
|||||||
nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, NULL);
|
nl_cb_set(cb, NL_CB_FINISH, NL_CB_CUSTOM, finish_handler, NULL);
|
||||||
nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
|
nl_cb_set(cb, NL_CB_SEQ_CHECK, NL_CB_CUSTOM, no_seq_check, NULL);
|
||||||
nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, nl80211_recv, NULL);
|
nl_cb_set(cb, NL_CB_VALID, NL_CB_CUSTOM, nl80211_recv, NULL);
|
||||||
nl_recvmsgs(unl.sock, cb);
|
nl_recvmsgs(unl_notify.sock, cb);
|
||||||
nl_cb_put(cb);
|
nl_cb_put(cb);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -471,9 +472,9 @@ static struct nl_msg *nl80211_call_vif(struct nl_call_param *nl_call_param, int
|
|||||||
struct nl_msg *msg;
|
struct nl_msg *msg;
|
||||||
|
|
||||||
if (!nl80211_scan_started) {
|
if (!nl80211_scan_started) {
|
||||||
unl_genl_subscribe(&unl, "scan");
|
unl_genl_subscribe(&unl_notify, "scan");
|
||||||
|
|
||||||
ev_io_init(&unl_io, nl80211_ev, unl.sock->s_fd, EV_READ);
|
ev_io_init(&unl_io, nl80211_ev, unl_notify.sock->s_fd, EV_READ);
|
||||||
ev_io_start(wifihal_evloop, &unl_io);
|
ev_io_start(wifihal_evloop, &unl_io);
|
||||||
nl80211_scan_started = 1;
|
nl80211_scan_started = 1;
|
||||||
}
|
}
|
||||||
@@ -481,7 +482,7 @@ static struct nl_msg *nl80211_call_vif(struct nl_call_param *nl_call_param, int
|
|||||||
if (!idx)
|
if (!idx)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
msg = unl_genl_msg(&unl, cmd, dump);
|
msg = unl_genl_msg(&unl_req, cmd, dump);
|
||||||
nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx);
|
nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx);
|
||||||
|
|
||||||
return msg;
|
return msg;
|
||||||
@@ -494,7 +495,7 @@ int nl80211_get_tx_chainmask(char *name, unsigned int *mask)
|
|||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_chainmask_recv, mask);
|
return unl_genl_request(&unl_req, msg, nl80211_chainmask_recv, mask);
|
||||||
}
|
}
|
||||||
|
|
||||||
int nl80211_get_oper_channel(char *name, unsigned int *chan)
|
int nl80211_get_oper_channel(char *name, unsigned int *chan)
|
||||||
@@ -505,10 +506,10 @@ int nl80211_get_oper_channel(char *name, unsigned int *chan)
|
|||||||
if (!idx)
|
if (!idx)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
msg = unl_genl_msg(&unl, NL80211_CMD_GET_INTERFACE, true);
|
msg = unl_genl_msg(&unl_req, NL80211_CMD_GET_INTERFACE, true);
|
||||||
nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx);
|
nla_put_u32(msg, NL80211_ATTR_IFINDEX, idx);
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_channel_recv, chan);
|
return unl_genl_request(&unl_req, msg, nl80211_channel_recv, chan);
|
||||||
}
|
}
|
||||||
|
|
||||||
int nl80211_get_ssid(struct nl_call_param *nl_call_param)
|
int nl80211_get_ssid(struct nl_call_param *nl_call_param)
|
||||||
@@ -518,7 +519,7 @@ int nl80211_get_ssid(struct nl_call_param *nl_call_param)
|
|||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_interface_recv, nl_call_param);
|
return unl_genl_request(&unl_req, msg, nl80211_interface_recv, nl_call_param);
|
||||||
}
|
}
|
||||||
|
|
||||||
int nl80211_get_assoclist(struct nl_call_param *nl_call_param)
|
int nl80211_get_assoclist(struct nl_call_param *nl_call_param)
|
||||||
@@ -528,7 +529,7 @@ int nl80211_get_assoclist(struct nl_call_param *nl_call_param)
|
|||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_assoclist_recv, nl_call_param);
|
return unl_genl_request(&unl_req, msg, nl80211_assoclist_recv, nl_call_param);
|
||||||
}
|
}
|
||||||
|
|
||||||
int nl80211_get_survey(struct nl_call_param *nl_call_param)
|
int nl80211_get_survey(struct nl_call_param *nl_call_param)
|
||||||
@@ -538,7 +539,7 @@ int nl80211_get_survey(struct nl_call_param *nl_call_param)
|
|||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_survey_recv, nl_call_param);
|
return unl_genl_request(&unl_req, msg, nl80211_survey_recv, nl_call_param);
|
||||||
}
|
}
|
||||||
|
|
||||||
int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_list, uint32_t chan_num,
|
int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_list, uint32_t chan_num,
|
||||||
@@ -549,20 +550,39 @@ int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_lis
|
|||||||
struct nlattr *freq;
|
struct nlattr *freq;
|
||||||
unsigned int i, flags = 0;
|
unsigned int i, flags = 0;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
uint32_t oper_chan;
|
||||||
|
|
||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
LOGT("%s: not setting dwell time\n", nl_call_param->ifname);
|
if (nl80211_get_oper_channel(nl_call_param->ifname, &oper_chan) < 0) {
|
||||||
//nla_put_u16(msg, NL80211_ATTR_MEASUREMENT_DURATION, dwell_time);
|
/* Could not get the current operating channel */
|
||||||
|
oper_chan = 0;
|
||||||
|
LOGE("%s: Could not get the current operating channel\n",
|
||||||
|
nl_call_param->ifname);
|
||||||
|
}
|
||||||
|
|
||||||
/* Add the ap-force flag, otherwise the scan fails on wifi6 APs */
|
/* Add the ap-force flag, otherwise the scan fails on wifi6 APs */
|
||||||
flags |= NL80211_SCAN_FLAG_AP;
|
flags |= NL80211_SCAN_FLAG_AP;
|
||||||
nla_put(msg, NL80211_ATTR_SCAN_FLAGS, sizeof(uint32_t), &flags);
|
nla_put(msg, NL80211_ATTR_SCAN_FLAGS, sizeof(uint32_t), &flags);
|
||||||
|
|
||||||
|
if ((scan_type == RADIO_SCAN_TYPE_OFFCHAN) && dwell_time)
|
||||||
|
nla_put_u16(msg, NL80211_ATTR_MEASUREMENT_DURATION, dwell_time);
|
||||||
|
|
||||||
freq = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES);
|
freq = nla_nest_start(msg, NL80211_ATTR_SCAN_FREQUENCIES);
|
||||||
for (i = 0; i < chan_num; i ++)
|
for (i = 0; i < chan_num; i ++) {
|
||||||
nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i]));
|
if (!oper_chan || (scan_type == RADIO_SCAN_TYPE_FULL)) {
|
||||||
|
nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i]));
|
||||||
|
}
|
||||||
|
else if ((scan_type == RADIO_SCAN_TYPE_OFFCHAN) &&
|
||||||
|
(chan_list[i] != oper_chan)) {
|
||||||
|
nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i]));
|
||||||
|
}
|
||||||
|
else if ((scan_type == RADIO_SCAN_TYPE_ONCHAN) &&
|
||||||
|
(chan_list[i] == oper_chan)) {
|
||||||
|
nla_put_u32(msg, i, ieee80211_channel_to_frequency(chan_list[i]));
|
||||||
|
}
|
||||||
|
}
|
||||||
nla_nest_end(msg, freq);
|
nla_nest_end(msg, freq);
|
||||||
|
|
||||||
ret = nl80211_scan_add(nl_call_param->ifname, scan_cb, scan_ctx);
|
ret = nl80211_scan_add(nl_call_param->ifname, scan_cb, scan_ctx);
|
||||||
@@ -571,8 +591,10 @@ int nl80211_scan_trigger(struct nl_call_param *nl_call_param, uint32_t *chan_lis
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = unl_genl_request(&unl, msg, nl80211_scan_trigger_recv, NULL);
|
ret = unl_genl_request(&unl_req, msg, nl80211_scan_trigger_recv, NULL);
|
||||||
if (ret) LOG(DEBUG, "%s: scan request failed %d\n", nl_call_param->ifname, ret);
|
if (ret)
|
||||||
|
LOG(DEBUG, "%s: scan request failed %d\n", nl_call_param->ifname, ret);
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -587,7 +609,7 @@ int nl80211_scan_abort(struct nl_call_param *nl_call_param)
|
|||||||
if (nl80211_scan)
|
if (nl80211_scan)
|
||||||
nl80211_scan_del(nl80211_scan);
|
nl80211_scan_del(nl80211_scan);
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_scan_abort_recv, NULL);
|
return unl_genl_request(&unl_req, msg, nl80211_scan_abort_recv, NULL);
|
||||||
}
|
}
|
||||||
|
|
||||||
int nl80211_scan_dump(struct nl_call_param *nl_call_param)
|
int nl80211_scan_dump(struct nl_call_param *nl_call_param)
|
||||||
@@ -597,18 +619,26 @@ int nl80211_scan_dump(struct nl_call_param *nl_call_param)
|
|||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
return unl_genl_request(&unl, msg, nl80211_scan_dump_recv, nl_call_param);
|
return unl_genl_request(&unl_req, msg, nl80211_scan_dump_recv, nl_call_param);
|
||||||
}
|
}
|
||||||
|
|
||||||
int stats_nl80211_init(void)
|
int stats_nl80211_init(void)
|
||||||
{
|
{
|
||||||
if (unl_genl_init(&unl, "nl80211") < 0) {
|
if (unl_genl_init(&unl_req, "nl80211") < 0) {
|
||||||
LOGE("failed to spawn nl80211");
|
LOGE("failed to spawn nl80211");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (nl_socket_set_buffer_size(unl.sock, 262144, 0) < 0)
|
if (unl_genl_init(&unl_notify, "nl80211") < 0) {
|
||||||
|
LOGE("failed to spawn nl80211");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (nl_socket_set_buffer_size(unl_notify.sock, 262144, 0) < 0)
|
||||||
LOGE("stats_nl80211: Failed to set nl socket buffer size");
|
LOGE("stats_nl80211: Failed to set nl socket buffer size");
|
||||||
|
|
||||||
|
if (nl_socket_set_nonblocking(unl_notify.sock))
|
||||||
|
LOGE("stats_nl80211: Failed to set stats nl socket in the non blocking mode");
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -0,0 +1,62 @@
|
|||||||
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdbool.h>
|
||||||
|
#include <time.h>
|
||||||
|
|
||||||
|
#include "log.h"
|
||||||
|
#include "evsched.h"
|
||||||
|
|
||||||
|
#include "timer.h"
|
||||||
|
|
||||||
|
static int tv_diff(struct timeval *t1, struct timeval *t2)
|
||||||
|
{
|
||||||
|
return
|
||||||
|
(t1->tv_sec - t2->tv_sec) * 1000 +
|
||||||
|
(t1->tv_usec - t2->tv_usec) / 1000;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void gettime(struct timeval *tv)
|
||||||
|
{
|
||||||
|
struct timespec ts;
|
||||||
|
|
||||||
|
clock_gettime(CLOCK_MONOTONIC, &ts);
|
||||||
|
tv->tv_sec = ts.tv_sec;
|
||||||
|
tv->tv_usec = ts.tv_nsec / 1000;
|
||||||
|
}
|
||||||
|
|
||||||
|
int timeout_set(struct timeout *timeout, int msecs)
|
||||||
|
{
|
||||||
|
if (!timeout) {
|
||||||
|
LOGE("%s No timer data", __func__);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
struct timeval *time = &timeout->time;
|
||||||
|
|
||||||
|
if (timeout->pending)
|
||||||
|
timeout->pending = false;
|
||||||
|
|
||||||
|
gettime(time);
|
||||||
|
|
||||||
|
time->tv_sec += msecs / 1000;
|
||||||
|
time->tv_usec += (msecs % 1000) * 1000;
|
||||||
|
|
||||||
|
if (time->tv_usec > 1000000) {
|
||||||
|
time->tv_sec++;
|
||||||
|
time->tv_usec -= 1000000;
|
||||||
|
}
|
||||||
|
timeout->pending = true;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
void timer_expiry_check(struct timeout *t)
|
||||||
|
{
|
||||||
|
struct timeval tv;
|
||||||
|
gettime(&tv);
|
||||||
|
if (t->pending && tv_diff(&t->time, &tv) <= 0) {
|
||||||
|
t->pending = false;
|
||||||
|
LOGI("%s Timer Expired..Executing callback", __func__);
|
||||||
|
if (t->cb)
|
||||||
|
t->cb(t);
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,6 +1,7 @@
|
|||||||
/* SPDX-License-Identifier: BSD-3-Clause */
|
/* SPDX-License-Identifier: BSD-3-Clause */
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
#include <math.h>
|
||||||
#include <glob.h>
|
#include <glob.h>
|
||||||
#include <libgen.h>
|
#include <libgen.h>
|
||||||
#include <fcntl.h>
|
#include <fcntl.h>
|
||||||
@@ -195,24 +196,36 @@ int phy_from_path(char *_path, char *phy, unsigned int idx)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
int phy_find_hwmon(char *phy, char *hwmon)
|
int phy_find_hwmon_helper(char *dir, char *file, char *hwmon)
|
||||||
{
|
{
|
||||||
char tmp[PATH_MAX];
|
|
||||||
glob_t gl;
|
glob_t gl;
|
||||||
|
if (glob(dir, GLOB_NOSORT | GLOB_MARK, NULL, &gl))
|
||||||
*hwmon = '\0';
|
return -1;
|
||||||
snprintf(tmp, sizeof(tmp), "/sys/class/ieee80211/%s/device/hwmon/*", phy);
|
|
||||||
if (glob(tmp, GLOB_NOSORT | GLOB_MARK, NULL, &gl))
|
|
||||||
return -1;
|
|
||||||
if (gl.gl_pathc) {
|
if (gl.gl_pathc) {
|
||||||
strcpy(hwmon, gl.gl_pathv[0]);
|
strcpy(hwmon, gl.gl_pathv[0]);
|
||||||
strncat(hwmon, "temp1_input", PATH_MAX);
|
strncat(hwmon, file, PATH_MAX);
|
||||||
}
|
}
|
||||||
globfree(&gl);
|
globfree(&gl);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int phy_find_hwmon(char *phy, char *hwmon, bool *DegreesNotMilliDegrees)
|
||||||
|
{
|
||||||
|
char tmp[PATH_MAX];
|
||||||
|
*hwmon = '\0';
|
||||||
|
snprintf(tmp, sizeof(tmp), "/sys/class/ieee80211/%s/device/hwmon/*", phy);
|
||||||
|
if (!phy_find_hwmon_helper(tmp, "temp1_input", hwmon)) {
|
||||||
|
*DegreesNotMilliDegrees=false;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
snprintf(tmp, sizeof(tmp), "/sys/class/ieee80211/%s/cooling_device/subsystem/thermal_zone0/", phy);
|
||||||
|
if (!phy_find_hwmon_helper(tmp, "temp", hwmon)) {
|
||||||
|
*DegreesNotMilliDegrees=true;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
int phy_get_mac(char *phy, char *mac)
|
int phy_get_mac(char *phy, char *mac)
|
||||||
{
|
{
|
||||||
int sz = ETH_ALEN * 3;
|
int sz = ETH_ALEN * 3;
|
||||||
@@ -296,6 +309,21 @@ int phy_get_channels(const char *name, int *channel)
|
|||||||
return j;
|
return j;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Gets all the dfs channels avaible for a radio
|
||||||
|
int phy_get_dfs_channels(const char *name, int *dfs_channels)
|
||||||
|
{
|
||||||
|
struct wifi_phy *phy = phy_find(name);
|
||||||
|
int i, j = 0;
|
||||||
|
|
||||||
|
if (!phy)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
for (i = 0; (i < IEEE80211_CHAN_MAX) && (j < 64); i++)
|
||||||
|
if (phy->chandfs[i])
|
||||||
|
dfs_channels[j++] = i;
|
||||||
|
return j;
|
||||||
|
}
|
||||||
|
|
||||||
static void update_channels_state(struct schema_Wifi_Radio_State *rstate,
|
static void update_channels_state(struct schema_Wifi_Radio_State *rstate,
|
||||||
int *index, const char *key, int *value, int value_len)
|
int *index, const char *key, int *value, int value_len)
|
||||||
{
|
{
|
||||||
@@ -484,6 +512,17 @@ bool vif_state_to_conf(struct schema_Wifi_VIF_State *vstate,
|
|||||||
}
|
}
|
||||||
vconf->custom_options_len = vstate->custom_options_len;
|
vconf->custom_options_len = vstate->custom_options_len;
|
||||||
|
|
||||||
|
for (i = 0; i < vstate->captive_allowlist_len; i++)
|
||||||
|
STRSCPY(vconf->captive_allowlist[i], vstate->captive_allowlist[i]);
|
||||||
|
vconf->captive_allowlist_len = vstate->captive_allowlist_len;
|
||||||
|
|
||||||
|
for (i = 0; i < vstate->captive_portal_len; i++) {
|
||||||
|
STRSCPY(vconf->captive_portal_keys[i],
|
||||||
|
vstate->captive_portal_keys[i]);
|
||||||
|
STRSCPY(vconf->captive_portal[i], vstate->captive_portal[i]);
|
||||||
|
}
|
||||||
|
vconf->captive_portal_len = vstate->captive_portal_len;
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
#undef VIF_COPY
|
#undef VIF_COPY
|
||||||
@@ -681,3 +720,14 @@ bool vif_get_key_for_key_distr(const char *secret, char *key_str)
|
|||||||
fclose(fp);
|
fclose(fp);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
double dBm_to_mwatts(double dBm)
|
||||||
|
{
|
||||||
|
return (pow(10,(dBm/10)));
|
||||||
|
}
|
||||||
|
|
||||||
|
double mWatts_to_dBm(double mW)
|
||||||
|
{
|
||||||
|
return (10*log10(mW));
|
||||||
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -26,6 +26,7 @@
|
|||||||
#include "ovsdb_table.h"
|
#include "ovsdb_table.h"
|
||||||
#include "ovsdb_sync.h"
|
#include "ovsdb_sync.h"
|
||||||
#include "rrm_config.h"
|
#include "rrm_config.h"
|
||||||
|
#include "fixup.h"
|
||||||
|
|
||||||
#define MODULE_ID LOG_MODULE_ID_VIF
|
#define MODULE_ID LOG_MODULE_ID_VIF
|
||||||
#define UCI_BUFFER_SIZE 80
|
#define UCI_BUFFER_SIZE 80
|
||||||
@@ -136,6 +137,7 @@ enum {
|
|||||||
WIF_ATTR_RADPROXY,
|
WIF_ATTR_RADPROXY,
|
||||||
WIF_ATTR_PROXY_ARP,
|
WIF_ATTR_PROXY_ARP,
|
||||||
WIF_ATTR_MCAST_TO_UCAST,
|
WIF_ATTR_MCAST_TO_UCAST,
|
||||||
|
WIF_ATTR_AUTH_CACHE,
|
||||||
__WIF_ATTR_MAX,
|
__WIF_ATTR_MAX,
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -233,6 +235,7 @@ static const struct blobmsg_policy wifi_iface_policy[__WIF_ATTR_MAX] = {
|
|||||||
[WIF_ATTR_RADPROXY] = { .name = "radproxy", BLOBMSG_TYPE_STRING },
|
[WIF_ATTR_RADPROXY] = { .name = "radproxy", BLOBMSG_TYPE_STRING },
|
||||||
[WIF_ATTR_PROXY_ARP] = { .name = "proxy_arp", BLOBMSG_TYPE_BOOL },
|
[WIF_ATTR_PROXY_ARP] = { .name = "proxy_arp", BLOBMSG_TYPE_BOOL },
|
||||||
[WIF_ATTR_MCAST_TO_UCAST] = { .name = "multicast_to_unicast", BLOBMSG_TYPE_BOOL },
|
[WIF_ATTR_MCAST_TO_UCAST] = { .name = "multicast_to_unicast", BLOBMSG_TYPE_BOOL },
|
||||||
|
[WIF_ATTR_AUTH_CACHE] = { .name = "auth_cache", BLOBMSG_TYPE_BOOL },
|
||||||
};
|
};
|
||||||
|
|
||||||
const struct uci_blob_param_list wifi_iface_param = {
|
const struct uci_blob_param_list wifi_iface_param = {
|
||||||
@@ -322,10 +325,10 @@ static struct vif_crypto {
|
|||||||
{ "sae-mixed", OVSDB_SECURITY_ENCRYPTION_WPA_SAE, OVSDB_SECURITY_MODE_MIXED, 0 },
|
{ "sae-mixed", OVSDB_SECURITY_ENCRYPTION_WPA_SAE, OVSDB_SECURITY_MODE_MIXED, 0 },
|
||||||
{ "wpa3-only", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_WPA3, 1 },
|
{ "wpa3-only", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_WPA3, 1 },
|
||||||
{ "wpa3-mixed", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_MIXED, 1 },
|
{ "wpa3-mixed", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP, OVSDB_SECURITY_MODE_MIXED, 1 },
|
||||||
|
{ "wpa3", OVSDB_SECURITY_ENCRYPTION_WPA3_EAP_192, OVSDB_SECURITY_MODE_WPA3, 1 },
|
||||||
};
|
};
|
||||||
|
|
||||||
extern ovsdb_table_t table_APC_State;
|
extern ovsdb_table_t table_APC_State;
|
||||||
extern json_t* ovsdb_table_where(ovsdb_table_t *table, void *record);
|
|
||||||
extern unsigned int radproxy_apc;
|
extern unsigned int radproxy_apc;
|
||||||
|
|
||||||
/* Custom options table */
|
/* Custom options table */
|
||||||
@@ -388,7 +391,8 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
const char *mode = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_MODE);
|
const char *mode = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_MODE);
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
unsigned int acct_interval;
|
unsigned int acct_interval;
|
||||||
const char *auth_server, *auth_port, *auth_secret, *security_key, *acct_server;
|
const char *auth_server, *auth_port, *auth_secret, *security_key;
|
||||||
|
const char *acct_server, *acct_port, *acct_secret;
|
||||||
char key_str[64], key_holder_str[128];
|
char key_str[64], key_holder_str[128];
|
||||||
struct schema_APC_State apc_conf;
|
struct schema_APC_State apc_conf;
|
||||||
const char *local_server = "127.0.0.1";
|
const char *local_server = "127.0.0.1";
|
||||||
@@ -410,14 +414,14 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
|
|
||||||
if (vif_crypto[i].enterprise) {
|
if (vif_crypto[i].enterprise) {
|
||||||
|
|
||||||
if (vif_config_custom_opt_get_proxy(vconf)) {
|
if (vif_config_custom_opt_get_proxy(vconf)) { /* Radius Proxy Enabled */
|
||||||
LOGN("%s: Apply Proxy Security Settings", vconf->if_name);
|
LOGN("%s: Apply Proxy Security Settings", vconf->if_name);
|
||||||
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
if(apc_read_state(&apc_conf) == false)
|
||||||
if (false == ovsdb_table_select_one_where(&table_APC_State,
|
{
|
||||||
where, &apc_conf)) {
|
LOGI("APC_State read failed");
|
||||||
LOG(INFO, "APC_State read failed");
|
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!strncmp(apc_conf.mode, "DR", 2)) {
|
if (!strncmp(apc_conf.mode, "DR", 2)) {
|
||||||
auth_server = local_server;
|
auth_server = local_server;
|
||||||
acct_server = local_server;
|
acct_server = local_server;
|
||||||
@@ -430,16 +434,22 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
auth_server = local_server;
|
auth_server = local_server;
|
||||||
acct_server = local_server;
|
acct_server = local_server;
|
||||||
}
|
}
|
||||||
|
auth_port = "1812";
|
||||||
|
auth_secret = "secret";
|
||||||
|
acct_port = "1813";
|
||||||
|
acct_secret = "secret";
|
||||||
}
|
}
|
||||||
else
|
else /* Radius Proxy Disabled */
|
||||||
{
|
{
|
||||||
auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP);
|
auth_server = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_IP);
|
||||||
acct_server = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP);
|
acct_server = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_IP);
|
||||||
|
auth_port = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT);
|
||||||
|
auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET);
|
||||||
|
acct_port = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT);
|
||||||
|
acct_secret = SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_SECRET);
|
||||||
}
|
}
|
||||||
|
|
||||||
acct_interval = 0;
|
acct_interval = 0;
|
||||||
auth_port = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_PORT);
|
|
||||||
auth_secret = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_RADIUS_SECRET);
|
|
||||||
|
|
||||||
LOGT("%s: Server IP %s port %s secret %s", vconf->if_name, auth_server, auth_port, auth_secret);
|
LOGT("%s: Server IP %s port %s secret %s", vconf->if_name, auth_server, auth_port, auth_secret);
|
||||||
if (!auth_server[0] || !auth_port[0] || !auth_secret[0]) {
|
if (!auth_server[0] || !auth_port[0] || !auth_secret[0]) {
|
||||||
@@ -451,10 +461,8 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
blobmsg_add_string(b, "auth_port", auth_port );
|
blobmsg_add_string(b, "auth_port", auth_port );
|
||||||
blobmsg_add_string(b, "auth_secret", auth_secret );
|
blobmsg_add_string(b, "auth_secret", auth_secret );
|
||||||
blobmsg_add_string(b, "acct_server", acct_server);
|
blobmsg_add_string(b, "acct_server", acct_server);
|
||||||
blobmsg_add_string(b, "acct_port",
|
blobmsg_add_string(b, "acct_port", acct_port);
|
||||||
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_PORT));
|
blobmsg_add_string(b, "acct_secret", acct_secret);
|
||||||
blobmsg_add_string(b, "acct_secret",
|
|
||||||
SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_SECRET));
|
|
||||||
blobmsg_add_bool(b, "request_cui", 1);
|
blobmsg_add_bool(b, "request_cui", 1);
|
||||||
acct_interval = atoi(SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_INTERVAL));
|
acct_interval = atoi(SCHEMA_KEY_VAL(vconf->security, OVSDB_SECURITY_RADIUS_ACCT_INTERVAL));
|
||||||
|
|
||||||
@@ -482,6 +490,7 @@ static int vif_config_security_set(struct blob_buf *b,
|
|||||||
strcat(key_holder_str, key_str);
|
strcat(key_holder_str, key_str);
|
||||||
blobmsg_add_string(b, "r1kh", key_holder_str);
|
blobmsg_add_string(b, "r1kh", key_holder_str);
|
||||||
}
|
}
|
||||||
|
blobmsg_add_bool(b, "auth_cache", 1);
|
||||||
} else {
|
} else {
|
||||||
security_key = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_KEY);
|
security_key = SCHEMA_KEY_VAL(vconf->security, SCHEMA_CONSTS_SECURITY_KEY);
|
||||||
if (security_key == NULL) {
|
if (security_key == NULL) {
|
||||||
@@ -1029,7 +1038,8 @@ void vif_section_del(char *section_name)
|
|||||||
ret= uci_load(sec_ctx, "wireless", &wireless);
|
ret= uci_load(sec_ctx, "wireless", &wireless);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
LOGE("%s: %s uci_load() failed with rc %d", section_name, __func__, ret);
|
LOGE("%s: %s uci_load() failed with rc %d", section_name, __func__, ret);
|
||||||
uci_free_context(sec_ctx);
|
if (sec_ctx)
|
||||||
|
uci_free_context(sec_ctx);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
uci_foreach_element_safe(&wireless->sections, tmp, e) {
|
uci_foreach_element_safe(&wireless->sections, tmp, e) {
|
||||||
@@ -1044,8 +1054,8 @@ void vif_section_del(char *section_name)
|
|||||||
}
|
}
|
||||||
uci_commit(sec_ctx, &wireless, false);
|
uci_commit(sec_ctx, &wireless, false);
|
||||||
uci_unload(sec_ctx, wireless);
|
uci_unload(sec_ctx, wireless);
|
||||||
uci_free_context(sec_ctx);
|
if (sec_ctx)
|
||||||
reload_config = 1;
|
uci_free_context(sec_ctx);
|
||||||
}
|
}
|
||||||
|
|
||||||
void vif_check_radius_proxy()
|
void vif_check_radius_proxy()
|
||||||
@@ -1054,8 +1064,7 @@ void vif_check_radius_proxy()
|
|||||||
int n = 0;
|
int n = 0;
|
||||||
void *buf = NULL;
|
void *buf = NULL;
|
||||||
|
|
||||||
json_t *where = ovsdb_table_where(&table_APC_State, &apc_conf);
|
if(apc_read_state(&apc_conf) == false)
|
||||||
if (false == ovsdb_table_select_one_where(&table_APC_State, where, &apc_conf))
|
|
||||||
{
|
{
|
||||||
LOGI("APC_State read failed");
|
LOGI("APC_State read failed");
|
||||||
return;
|
return;
|
||||||
@@ -1316,12 +1325,14 @@ bool target_vif_config_del(const struct schema_Wifi_VIF_Config *vconf)
|
|||||||
const char *ifname;
|
const char *ifname;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
|
||||||
|
vif_fixup_del((char *)vconf->if_name);
|
||||||
vlan_del((char *)vconf->if_name);
|
vlan_del((char *)vconf->if_name);
|
||||||
vif_ctx = uci_alloc_context();
|
vif_ctx = uci_alloc_context();
|
||||||
ret= uci_load(vif_ctx, "wireless", &wireless);
|
ret= uci_load(vif_ctx, "wireless", &wireless);
|
||||||
if (ret) {
|
if (ret) {
|
||||||
LOGE("%s: %s uci_load() failed with rc %d", vconf->if_name, __func__, ret);
|
LOGE("%s: %s uci_load() failed with rc %d", vconf->if_name, __func__, ret);
|
||||||
uci_free_context(vif_ctx);
|
if (vif_ctx)
|
||||||
|
uci_free_context(vif_ctx);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
uci_foreach_element_safe(&wireless->sections, tmp, e) {
|
uci_foreach_element_safe(&wireless->sections, tmp, e) {
|
||||||
@@ -1330,15 +1341,19 @@ bool target_vif_config_del(const struct schema_Wifi_VIF_Config *vconf)
|
|||||||
if (strcmp(s->type, "wifi-iface")) continue;
|
if (strcmp(s->type, "wifi-iface")) continue;
|
||||||
|
|
||||||
ifname = uci_lookup_option_string( vif_ctx, s, "ifname" );
|
ifname = uci_lookup_option_string( vif_ctx, s, "ifname" );
|
||||||
if (!strcmp(ifname,vconf->if_name)) {
|
if (ifname == NULL) {
|
||||||
|
/* Delete this section because it doesn't have an ifname - it is invalid */
|
||||||
|
uci_section_del(vif_ctx, "vif", "wireless", (char *)s->e.name, "wifi-iface");
|
||||||
|
} else if (!strcmp(ifname,vconf->if_name)) {
|
||||||
|
/* Delete this section because it matches the if_name we are trying to delete */
|
||||||
uci_section_del(vif_ctx, "vif", "wireless", (char *)s->e.name, "wifi-iface");
|
uci_section_del(vif_ctx, "vif", "wireless", (char *)s->e.name, "wifi-iface");
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
uci_commit(vif_ctx, &wireless, false);
|
uci_commit(vif_ctx, &wireless, false);
|
||||||
uci_unload(vif_ctx, wireless);
|
uci_unload(vif_ctx, wireless);
|
||||||
uci_free_context(vif_ctx);
|
if (vif_ctx)
|
||||||
reload_config = 1;
|
uci_free_context(vif_ctx);
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1393,7 +1408,7 @@ void vif_hs20_osu_update(struct schema_Hotspot20_OSU_Providers *osuconf)
|
|||||||
|
|
||||||
blob_to_uci_section(uci, "wireless", osuconf->osu_provider_name, "osu-provider",
|
blob_to_uci_section(uci, "wireless", osuconf->osu_provider_name, "osu-provider",
|
||||||
osu.head, &wifi_hs20_osu_param, NULL);
|
osu.head, &wifi_hs20_osu_param, NULL);
|
||||||
reload_config = 1;
|
uci_commit_all(uci);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -1424,7 +1439,7 @@ void vif_hs20_icon_update(struct schema_Hotspot20_Icon_Config *iconconf)
|
|||||||
|
|
||||||
blob_to_uci_section(uci, "wireless", iconconf->icon_config_name, "hs20-icon",
|
blob_to_uci_section(uci, "wireless", iconconf->icon_config_name, "hs20-icon",
|
||||||
hs20.head, &wifi_hs20_icon_param, NULL);
|
hs20.head, &wifi_hs20_icon_param, NULL);
|
||||||
reload_config = 1;
|
uci_commit_all(uci);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1447,9 +1462,9 @@ void vif_hs20_update(struct schema_Hotspot20_Config *hs2conf)
|
|||||||
hs20_vif_config(&b, hs2conf);
|
hs20_vif_config(&b, hs2conf);
|
||||||
blob_to_uci_section(uci, "wireless", vconf.if_name, "wifi-iface",
|
blob_to_uci_section(uci, "wireless", vconf.if_name, "wifi-iface",
|
||||||
b.head, &wifi_iface_param, NULL);
|
b.head, &wifi_iface_param, NULL);
|
||||||
reload_config = 1;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
uci_commit_all(uci);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Mesh options table */
|
/* Mesh options table */
|
||||||
@@ -1517,8 +1532,7 @@ static int mesh_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
blobmsg_add_string(&mesh, "master", "bat0");
|
blobmsg_add_string(&mesh, "master", "bat0");
|
||||||
blob_to_uci_section(uci, "network", vconf->if_name, "interface",
|
blob_to_uci_section(uci, "network", vconf->if_name, "interface",
|
||||||
mesh.head, &wifi_mesh_param, NULL);
|
mesh.head, &wifi_mesh_param, NULL);
|
||||||
|
uci_commit_all(uci);
|
||||||
reload_config = 1;
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1637,8 +1651,7 @@ static int ap_vif_config_set(const struct schema_Wifi_Radio_Config *rconf,
|
|||||||
{
|
{
|
||||||
vif_dhcp_opennds_allowlist_set(vconf,(char*)vconf->if_name);
|
vif_dhcp_opennds_allowlist_set(vconf,(char*)vconf->if_name);
|
||||||
}
|
}
|
||||||
|
uci_commit_all(uci);
|
||||||
reload_config = 1;
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -75,7 +75,6 @@ const struct uci_blob_param_list network_param = {
|
|||||||
.params = network_policy,
|
.params = network_policy,
|
||||||
};
|
};
|
||||||
|
|
||||||
int reload_config = 0;
|
|
||||||
ovsdb_table_t table_Wifi_Inet_Config;
|
ovsdb_table_t table_Wifi_Inet_Config;
|
||||||
struct blob_buf b = { };
|
struct blob_buf b = { };
|
||||||
struct blob_buf del = { };
|
struct blob_buf del = { };
|
||||||
@@ -342,7 +341,6 @@ static int wifi_inet_conf_add(struct schema_Wifi_Inet_Config *iconf)
|
|||||||
}
|
}
|
||||||
|
|
||||||
uci_commit_all(uci);
|
uci_commit_all(uci);
|
||||||
reload_config = 1;
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -361,7 +359,6 @@ static void wifi_inet_conf_del(struct schema_Wifi_Inet_Config *iconf)
|
|||||||
|
|
||||||
uci_section_del(uci, "network", "network", iconf->if_name, "interface");
|
uci_section_del(uci, "network", "network", iconf->if_name, "interface");
|
||||||
uci_commit_all(uci);
|
uci_commit_all(uci);
|
||||||
reload_config = 1;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon,
|
static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon,
|
||||||
@@ -388,17 +385,6 @@ static void callback_Wifi_Inet_Config(ovsdb_update_monitor_t *mon,
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void periodic_task(void *arg)
|
|
||||||
{
|
|
||||||
if (reload_config) {
|
|
||||||
uci_commit_all(uci);
|
|
||||||
system("reload_config");
|
|
||||||
reload_config = 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
evsched_task_reschedule_ms(EVSCHED_SEC(5));
|
|
||||||
}
|
|
||||||
|
|
||||||
void wifi_inet_config_init(void)
|
void wifi_inet_config_init(void)
|
||||||
{
|
{
|
||||||
struct uci_element *e = NULL;
|
struct uci_element *e = NULL;
|
||||||
@@ -418,7 +404,6 @@ void wifi_inet_config_init(void)
|
|||||||
}
|
}
|
||||||
uci_unload(uci, network);
|
uci_unload(uci, network);
|
||||||
OVSDB_TABLE_MONITOR(Wifi_Inet_Config, false);
|
OVSDB_TABLE_MONITOR(Wifi_Inet_Config, false);
|
||||||
evsched_task(&periodic_task, NULL, EVSCHED_SEC(5));
|
|
||||||
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -48,6 +48,12 @@ typedef struct
|
|||||||
ds_tree_node_t node;
|
ds_tree_node_t node;
|
||||||
} rrm_vif_state_t;
|
} rrm_vif_state_t;
|
||||||
|
|
||||||
|
#define RRM_CHANNEL_INTERVAL 15
|
||||||
|
|
||||||
|
#define RRM_MAX_NF_SAMPLES 100
|
||||||
|
#define RRM_OBSS_HOP_MODE_NON_WIFI 1
|
||||||
|
#define RRM_OBSS_HOP_MODE_NON_WIFI_AND_OBSS 2
|
||||||
|
|
||||||
typedef struct
|
typedef struct
|
||||||
{
|
{
|
||||||
// Cached data
|
// Cached data
|
||||||
@@ -59,9 +65,17 @@ typedef struct
|
|||||||
uint32_t min_load;
|
uint32_t min_load;
|
||||||
uint32_t beacon_rate;
|
uint32_t beacon_rate;
|
||||||
uint32_t mcast_rate;
|
uint32_t mcast_rate;
|
||||||
|
int32_t noise_floor_thresh;
|
||||||
|
uint32_t noise_floor_time;
|
||||||
|
int32_t non_wifi_thresh;
|
||||||
|
uint32_t non_wifi_time;
|
||||||
|
uint32_t obss_hop_mode;
|
||||||
|
|
||||||
// Internal state data
|
// Internal state data
|
||||||
int32_t noise_lwm;
|
int32_t avg_nf;
|
||||||
|
int32_t rrm_chan_nf_next_el;
|
||||||
|
int32_t rrm_chan_nf_num_el;
|
||||||
|
double rrm_chan_nf_samples[RRM_MAX_NF_SAMPLES];
|
||||||
} rrm_entry_t;
|
} rrm_entry_t;
|
||||||
|
|
||||||
typedef struct
|
typedef struct
|
||||||
@@ -80,5 +94,6 @@ void set_rrm_parameters(rrm_entry_t *rrm_data);
|
|||||||
ds_tree_t* rrm_get_rrm_config_list(void);
|
ds_tree_t* rrm_get_rrm_config_list(void);
|
||||||
ds_tree_t* rrm_get_radio_list(void);
|
ds_tree_t* rrm_get_radio_list(void);
|
||||||
ds_tree_t* rrm_get_vif_list(void);
|
ds_tree_t* rrm_get_vif_list(void);
|
||||||
|
void rrm_reset_noise_floor_samples(rrm_entry_t *rrm_data);
|
||||||
|
|
||||||
#endif /* RRM_H_INCLUDED */
|
#endif /* RRM_H_INCLUDED */
|
||||||
|
|||||||
@@ -9,8 +9,6 @@
|
|||||||
#include "uci.h"
|
#include "uci.h"
|
||||||
#include "utils.h"
|
#include "utils.h"
|
||||||
|
|
||||||
#define RRM_CHANNEL_INTERVAL 15.0
|
|
||||||
|
|
||||||
struct blob_buf b = { };
|
struct blob_buf b = { };
|
||||||
struct blob_buf del = { };
|
struct blob_buf del = { };
|
||||||
struct uci_context *uci;
|
struct uci_context *uci;
|
||||||
@@ -103,6 +101,57 @@ void get_channel_bandwidth(const char* htmode, int *channel_bandwidth)
|
|||||||
else if(!strcmp(htmode, "HT80"))
|
else if(!strcmp(htmode, "HT80"))
|
||||||
*channel_bandwidth=80;
|
*channel_bandwidth=80;
|
||||||
}
|
}
|
||||||
|
/*
|
||||||
|
* A simple average is calculated against the Noise floor samples.
|
||||||
|
* - Returns a zero, if there are not enough samples in the list.
|
||||||
|
* - Or, returns a calculated avg of the noise samples.
|
||||||
|
* - A circular buffer is considered for storing the samples. New elements replace the
|
||||||
|
* old ones in this buffer.
|
||||||
|
* - The number of samples required is an integer value calculated based on the
|
||||||
|
* configuration time and the sample time.
|
||||||
|
* Example: If the config_time is 120 sec, and sample time is 15 sec, then number of
|
||||||
|
* samples required for averaging is 120/15 = 8 samples.
|
||||||
|
*/
|
||||||
|
int rrm_calculate_avg_noise_floor(rrm_entry_t *rrm_data, int nf, int config_time, int sample_time)
|
||||||
|
{
|
||||||
|
int ii;
|
||||||
|
double avg_mW = 0;
|
||||||
|
int num_samples = config_time/sample_time;
|
||||||
|
|
||||||
|
if (num_samples >= RRM_MAX_NF_SAMPLES)
|
||||||
|
num_samples = RRM_MAX_NF_SAMPLES;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Convert dBm to milliWatts,
|
||||||
|
* and replace the oldest element in the list with the new element
|
||||||
|
*/
|
||||||
|
rrm_data->rrm_chan_nf_samples[rrm_data->rrm_chan_nf_next_el] = dBm_to_mwatts(nf);
|
||||||
|
|
||||||
|
/* Update the index to the oldest element index taking care of the boundary */
|
||||||
|
rrm_data->rrm_chan_nf_next_el = (rrm_data->rrm_chan_nf_next_el+1)%num_samples;
|
||||||
|
|
||||||
|
if (rrm_data->rrm_chan_nf_num_el < num_samples)
|
||||||
|
{
|
||||||
|
rrm_data->rrm_chan_nf_num_el++;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* calculate average */
|
||||||
|
for (ii = 0; ii < num_samples; ii++)
|
||||||
|
{
|
||||||
|
avg_mW += rrm_data->rrm_chan_nf_samples[ii];
|
||||||
|
}
|
||||||
|
avg_mW = avg_mW/num_samples;
|
||||||
|
|
||||||
|
/* convert the averaged milliWats back to dBm */
|
||||||
|
return ((int)(mWatts_to_dBm(avg_mW)));
|
||||||
|
}
|
||||||
|
|
||||||
|
void rrm_reset_noise_floor_samples(rrm_entry_t *rrm_data)
|
||||||
|
{
|
||||||
|
rrm_data->rrm_chan_nf_next_el = 0;
|
||||||
|
rrm_data->rrm_chan_nf_num_el = 0;
|
||||||
|
}
|
||||||
|
|
||||||
void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
||||||
{
|
{
|
||||||
@@ -113,7 +162,6 @@ void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
|||||||
rrm_radio_state_t *radio = NULL;
|
rrm_radio_state_t *radio = NULL;
|
||||||
uint32_t noise;
|
uint32_t noise;
|
||||||
int32_t nf;
|
int32_t nf;
|
||||||
int32_t nf_drop_threshold;
|
|
||||||
rrm_config_t *rrm_config;
|
rrm_config_t *rrm_config;
|
||||||
|
|
||||||
ds_tree_t *radio_list = rrm_get_radio_list();
|
ds_tree_t *radio_list = rrm_get_radio_list();
|
||||||
@@ -122,14 +170,13 @@ void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
|||||||
{
|
{
|
||||||
noise = 0;
|
noise = 0;
|
||||||
rrm_config = NULL;
|
rrm_config = NULL;
|
||||||
nf_drop_threshold = 0;
|
|
||||||
|
|
||||||
if (ubus_get_noise(radio->config.if_name, &noise))
|
if (ubus_get_noise(radio->config.if_name, &noise))
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
nf = (int32_t)noise;
|
nf = (int32_t)noise;
|
||||||
|
|
||||||
if (nf > -1 || nf < -120)
|
if ((nf > -10) || (nf < -120))
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
rrm_config = rrm_get_rrm_config(radio->config.type);
|
rrm_config = rrm_get_rrm_config(radio->config.type);
|
||||||
@@ -137,43 +184,39 @@ void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
|||||||
if (rrm_config == NULL)
|
if (rrm_config == NULL)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
if (nf < rrm_config->rrm_data.noise_lwm )
|
if ((rrm_config->rrm_data.backup_channel == 0) ||
|
||||||
{
|
(rrm_config->rrm_data.backup_channel == radio->config.chan))
|
||||||
rrm_config->rrm_data.noise_lwm = nf;
|
|
||||||
LOGD("[%s] noise_lwm set to %d", radio->config.if_name, nf);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (rrm_config->rrm_data.snr_percentage_drop == 0)
|
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
if (rrm_config->rrm_data.backup_channel == 0)
|
if (rrm_config->rrm_data.noise_floor_thresh == 0)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
nf_drop_threshold = ((int32_t)(100 - rrm_config->rrm_data.snr_percentage_drop) *
|
if (rrm_config->rrm_data.noise_floor_time == 0)
|
||||||
rrm_config->rrm_data.noise_lwm) / 100;
|
continue;
|
||||||
|
|
||||||
LOGD("[%s] backup=%d nf=%d nf_lwm=%d drop=%d thresh=%d",
|
LOGD("[%s] backup=%d nf=%d nf_thresh=%d",
|
||||||
radio->config.if_name,
|
radio->config.if_name,
|
||||||
rrm_config->rrm_data.backup_channel,
|
rrm_config->rrm_data.backup_channel,
|
||||||
nf,
|
nf,
|
||||||
rrm_config->rrm_data.noise_lwm,
|
rrm_config->rrm_data.noise_floor_thresh);
|
||||||
rrm_config->rrm_data.snr_percentage_drop,
|
|
||||||
nf_drop_threshold);
|
|
||||||
|
|
||||||
if (nf > nf_drop_threshold)
|
rrm_config->rrm_data.avg_nf = rrm_calculate_avg_noise_floor(&(rrm_config->rrm_data),
|
||||||
|
nf, rrm_config->rrm_data.noise_floor_time, RRM_CHANNEL_INTERVAL);
|
||||||
|
|
||||||
|
if (rrm_config->rrm_data.avg_nf &&
|
||||||
|
(rrm_config->rrm_data.avg_nf > rrm_config->rrm_data.noise_floor_thresh))
|
||||||
{
|
{
|
||||||
LOGI("Interference detected on [%s], switching to backup_channel=%d nf=%d nf_lwm=%d drop=%d thresh=%d",
|
LOGI("Interference detected on [%s],"
|
||||||
|
" switching to backup_channel=%d avg_nf=%d nfthresh=%d",
|
||||||
radio->config.if_name,
|
radio->config.if_name,
|
||||||
rrm_config->rrm_data.backup_channel,
|
rrm_config->rrm_data.backup_channel,
|
||||||
nf,
|
rrm_config->rrm_data.avg_nf,
|
||||||
rrm_config->rrm_data.noise_lwm,
|
rrm_config->rrm_data.noise_floor_thresh);
|
||||||
rrm_config->rrm_data.snr_percentage_drop,
|
|
||||||
nf_drop_threshold);
|
|
||||||
int channel_bandwidth;
|
int channel_bandwidth;
|
||||||
int sec_chan_offset=0;
|
int sec_chan_offset=0;
|
||||||
struct mode_map *m = mode_map_get_uci(radio->schema.freq_band, get_max_channel_bw_channel(ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel),
|
struct mode_map *m = mode_map_get_uci(radio->schema.freq_band,
|
||||||
radio->schema.ht_mode), radio->schema.hw_mode);
|
get_max_channel_bw_channel(ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel),
|
||||||
|
radio->schema.ht_mode), radio->schema.hw_mode);
|
||||||
if (m) {
|
if (m) {
|
||||||
sec_chan_offset = m->sec_channel_offset;
|
sec_chan_offset = m->sec_channel_offset;
|
||||||
} else
|
} else
|
||||||
@@ -183,6 +226,8 @@ void rrm_nf_timer_handler(struct ev_loop *loop, ev_timer *timer, int revents)
|
|||||||
radio->schema.ht_mode), &channel_bandwidth);
|
radio->schema.ht_mode), &channel_bandwidth);
|
||||||
ubus_set_channel_switch(radio->config.if_name,
|
ubus_set_channel_switch(radio->config.if_name,
|
||||||
ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel), channel_bandwidth, sec_chan_offset);
|
ieee80211_channel_to_frequency(rrm_config->rrm_data.backup_channel), channel_bandwidth, sec_chan_offset);
|
||||||
|
|
||||||
|
rrm_reset_noise_floor_samples(&(rrm_config->rrm_data));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -124,6 +124,21 @@ void rrm_config_update(void)
|
|||||||
rrm_data.min_load = rrm->schema.min_load;
|
rrm_data.min_load = rrm->schema.min_load;
|
||||||
rrm_data.beacon_rate = rrm->schema.beacon_rate;
|
rrm_data.beacon_rate = rrm->schema.beacon_rate;
|
||||||
rrm_data.mcast_rate = rrm->schema.mcast_rate;
|
rrm_data.mcast_rate = rrm->schema.mcast_rate;
|
||||||
|
rrm_data.noise_floor_thresh = rrm->schema.noise_floor_thresh;
|
||||||
|
rrm_data.noise_floor_time = rrm->schema.noise_floor_time;
|
||||||
|
if (rrm_data.noise_floor_time/RRM_CHANNEL_INTERVAL > RRM_MAX_NF_SAMPLES)
|
||||||
|
{
|
||||||
|
LOG(WARN, "RRM Config: Noise floor time too high."
|
||||||
|
" nf_time:%d, sampling_interval:%d, max_num_samples:%d",
|
||||||
|
rrm_data.noise_floor_time, RRM_CHANNEL_INTERVAL,
|
||||||
|
RRM_MAX_NF_SAMPLES);
|
||||||
|
}
|
||||||
|
rrm_data.non_wifi_thresh = rrm->schema.non_wifi_thresh;
|
||||||
|
rrm_data.non_wifi_time = rrm->schema.non_wifi_time;
|
||||||
|
rrm_data.obss_hop_mode = rrm->schema.obss_hop_mode;
|
||||||
|
|
||||||
|
rrm_data.avg_nf = 0;
|
||||||
|
rrm_reset_noise_floor_samples(&rrm_data);
|
||||||
|
|
||||||
/* Update cache config */
|
/* Update cache config */
|
||||||
rrm->rrm_data = rrm_data;
|
rrm->rrm_data = rrm_data;
|
||||||
@@ -408,13 +423,7 @@ void rrm_update_rrm_config_cb(ovsdb_update_monitor_t *self)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
/* Reset configuration */
|
/* Reset configuration */
|
||||||
rrm_config->schema.backup_channel = 0;
|
memset(&(rrm_config->schema), 0, sizeof(rrm_config->schema));
|
||||||
rrm_config->schema.min_load = 0;
|
|
||||||
rrm_config->schema.beacon_rate = 0;
|
|
||||||
rrm_config->schema.mcast_rate = 0;
|
|
||||||
rrm_config->schema.snr_percentage_drop = 0;
|
|
||||||
rrm_config->schema.client_disconnect_threshold = 0;
|
|
||||||
rrm_config->schema.probe_resp_threshold = 0;
|
|
||||||
|
|
||||||
ds_tree_remove(&rrm_config_list, rrm_config);
|
ds_tree_remove(&rrm_config_list, rrm_config);
|
||||||
free(rrm_config);
|
free(rrm_config);
|
||||||
|
|||||||
@@ -86,7 +86,9 @@ linksys,ea8300)
|
|||||||
MODEL_DESCR=$(cat /dev/mtd9 | grep modelDescription | cut -d "=" -f2 | tr -d '\r\n')
|
MODEL_DESCR=$(cat /dev/mtd9 | grep modelDescription | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
MANUF_URL=$(cat /dev/mtd9 | grep manufacturerURL | cut -d "=" -f2 | tr -d '\r\n')
|
MANUF_URL=$(cat /dev/mtd9 | grep manufacturerURL | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
CERT_REGION=$(cat /dev/mtd9 | grep cert_region | cut -d "=" -f2 | tr -d '\r\n')
|
CERT_REGION=$(cat /dev/mtd9 | grep cert_region | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
ID=$(cat /dev/mtd9 | grep hw_mac_addr | cut -d "=" -f2 | tr -d '\r\n')
|
# Commenting out below, because hw_mac_addr is used for eth0/LAN interface
|
||||||
|
# whereas ID corresponds to the mac address of WAN interface.
|
||||||
|
#ID=$(cat /dev/mtd9 | grep hw_mac_addr | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
MANUF_NAME=$(cat /dev/mtd9 | grep "manufacturer=" | cut -d "=" -f2 | tr -d '\r\n')
|
MANUF_NAME=$(cat /dev/mtd9 | grep "manufacturer=" | cut -d "=" -f2 | tr -d '\r\n')
|
||||||
if [ ! $MANUF_NAME ]; then
|
if [ ! $MANUF_NAME ]; then
|
||||||
MANUF_NAME="Linksys"
|
MANUF_NAME="Linksys"
|
||||||
@@ -133,12 +135,16 @@ fi
|
|||||||
|
|
||||||
# fallback check to get the id from mac address if flash does not contain this info.
|
# fallback check to get the id from mac address if flash does not contain this info.
|
||||||
if [ ! $ID ]; then
|
if [ ! $ID ]; then
|
||||||
ID=$(cat /sys/class/net/eth0/address)
|
if [ $(board_name) == "cig,wf194c" ] || [ $(board_name) == "edgecore,eap102" ] || [ $(board_name) == "linksys,ea8300" ]; then
|
||||||
|
ID=$(cat /sys/class/net/eth1/address)
|
||||||
|
else
|
||||||
|
ID=$(cat /sys/class/net/eth0/address)
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# fallback check to get the model if flash does not contain this info.
|
# fallback check to get the model if flash does not contain this info.
|
||||||
if [ ! $MODEL ]; then
|
if [ ! $MODEL ]; then
|
||||||
MODEL=$(cat /tmp/sysinfo/board_name)
|
MODEL=$(cat /tmp/sysinfo/board_name | cut -d "," -f2 | awk '{print toupper($0)}')
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Read the active firmware version info
|
# Read the active firmware version info
|
||||||
|
|||||||
@@ -175,7 +175,7 @@ index 0000000000..90df1f8a9a
|
|||||||
+ kmod-usb-phy-ipq807x kmod-usb-dwc3-of-simple \
|
+ kmod-usb-phy-ipq807x kmod-usb-dwc3-of-simple \
|
||||||
+ kmod-ath11k-ahb kmod-qrtr_mproc wpad \
|
+ kmod-ath11k-ahb kmod-qrtr_mproc wpad \
|
||||||
+ kmod-gpio-button-hotplug \
|
+ kmod-gpio-button-hotplug \
|
||||||
+ qca-thermald-10.4 qca-ssdk-shell
|
+ qca-thermald-10.4 qca-ssdk-shell kmod-qca-nss-drv-bridge-mgr
|
||||||
+
|
+
|
||||||
+$(eval $(call BuildTarget))
|
+$(eval $(call BuildTarget))
|
||||||
diff --git a/target/linux/ipq807x/base-files/etc/board.d/01_leds b/target/linux/ipq807x/base-files/etc/board.d/01_leds
|
diff --git a/target/linux/ipq807x/base-files/etc/board.d/01_leds b/target/linux/ipq807x/base-files/etc/board.d/01_leds
|
||||||
|
|||||||
201
patches/0054-WiFi6-Aps-LEDs-Label-Name-Change.patch
Normal file
201
patches/0054-WiFi6-Aps-LEDs-Label-Name-Change.patch
Normal file
@@ -0,0 +1,201 @@
|
|||||||
|
From 82c689a779db76c74893be4d6249b663d70d80d8 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Nagendrababu <nagendrababu.bonkuri@connectus.ai>
|
||||||
|
Date: Fri, 21 May 2021 16:38:07 -0400
|
||||||
|
Subject: [PATCH] WiFi6-APs-Label-Name-Change
|
||||||
|
|
||||||
|
---
|
||||||
|
.../111-WiFi6-APs-LED-Label-Name-Change.patch | 182 ++++++++++++++++++
|
||||||
|
1 file changed, 182 insertions(+)
|
||||||
|
create mode 100644 target/linux/ipq807x/patches/111-WiFi6-APs-LED-Label-Name-Change.patch
|
||||||
|
|
||||||
|
diff --git a/target/linux/ipq807x/patches/111-WiFi6-APs-LED-Label-Name-Change.patch b/target/linux/ipq807x/patches/111-WiFi6-APs-LED-Label-Name-Change.patch
|
||||||
|
new file mode 100644
|
||||||
|
index 0000000000..2396067aac
|
||||||
|
--- /dev/null
|
||||||
|
+++ b/target/linux/ipq807x/patches/111-WiFi6-APs-LED-Label-Name-Change.patch
|
||||||
|
@@ -0,0 +1,182 @@
|
||||||
|
+Index: linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq6018-cig-wf188.dts
|
||||||
|
+===================================================================
|
||||||
|
+--- linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce.orig/arch/arm64/boot/dts/qcom/qcom-ipq6018-cig-wf188.dts
|
||||||
|
++++ linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq6018-cig-wf188.dts
|
||||||
|
+@@ -309,26 +309,26 @@
|
||||||
|
+ pinctrl-names = "default";
|
||||||
|
+
|
||||||
|
+ led@25 {
|
||||||
|
+- label = "led_5g";
|
||||||
|
+- gpios = <&tlmm 25 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- linux,default-trigger = "wf188:green:5g";
|
||||||
|
++ label = "wf188:green:wifi5g";
|
||||||
|
++ gpios = <&tlmm 25 GPIO_ACTIVE_LOW>;
|
||||||
|
++ linux,default-trigger = "wf188:green:wifi5g";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led@24 {
|
||||||
|
+- label = "led_2g";
|
||||||
|
+- gpios = <&tlmm 24 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- linux,default-trigger = "wf188:green:2g";
|
||||||
|
++ label = "wf188:green:wifi2g";
|
||||||
|
++ gpios = <&tlmm 24 GPIO_ACTIVE_LOW>;
|
||||||
|
++ linux,default-trigger = "wf188:green:wifi2g";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led@18 {
|
||||||
|
+- label = "led_eth";
|
||||||
|
+- gpios = <&tlmm 18 GPIO_ACTIVE_HIGH>;
|
||||||
|
++ label = "wf188:green:eth";
|
||||||
|
++ gpios = <&tlmm 18 GPIO_ACTIVE_LOW>;
|
||||||
|
+ linux,default-trigger = "wf188:green:eth";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led_power: led@16 {
|
||||||
|
+- label = "led_pwr";
|
||||||
|
+- gpios = <&tlmm 16 GPIO_ACTIVE_HIGH>;
|
||||||
|
++ label = "wf188:green:power";
|
||||||
|
++ gpios = <&tlmm 16 GPIO_ACTIVE_LOW>;
|
||||||
|
+ linux,default-trigger = "wf188:green:power";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+Index: linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq6018-cig-wf188n.dts
|
||||||
|
+===================================================================
|
||||||
|
+--- linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce.orig/arch/arm64/boot/dts/qcom/qcom-ipq6018-cig-wf188n.dts
|
||||||
|
++++ linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq6018-cig-wf188n.dts
|
||||||
|
+@@ -309,26 +309,26 @@
|
||||||
|
+ pinctrl-names = "default";
|
||||||
|
+
|
||||||
|
+ led@25 {
|
||||||
|
+- label = "led_5g";
|
||||||
|
+- gpios = <&tlmm 25 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- linux,default-trigger = "wf188:green:5g";
|
||||||
|
++ label = "wf188:green:wifi5g";
|
||||||
|
++ gpios = <&tlmm 25 GPIO_ACTIVE_LOW>;
|
||||||
|
++ linux,default-trigger = "wf188:green:wifi5g";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led@24 {
|
||||||
|
+- label = "led_2g";
|
||||||
|
+- gpios = <&tlmm 24 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- linux,default-trigger = "wf188:green:2g";
|
||||||
|
++ label = "wf188:green:wifi2g";
|
||||||
|
++ gpios = <&tlmm 24 GPIO_ACTIVE_LOW>;
|
||||||
|
++ linux,default-trigger = "wf188:green:wifi2g";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led@18 {
|
||||||
|
+- label = "led_eth";
|
||||||
|
+- gpios = <&tlmm 18 GPIO_ACTIVE_HIGH>;
|
||||||
|
++ label = "wf188:green:eth";
|
||||||
|
++ gpios = <&tlmm 18 GPIO_ACTIVE_LOW>;
|
||||||
|
+ linux,default-trigger = "wf188:green:eth";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led_power: led@16 {
|
||||||
|
+- label = "led_pwr";
|
||||||
|
+- gpios = <&tlmm 16 GPIO_ACTIVE_HIGH>;
|
||||||
|
++ label = "wf188:green:power";
|
||||||
|
++ gpios = <&tlmm 16 GPIO_ACTIVE_LOW>;
|
||||||
|
+ linux,default-trigger = "wf188:green:power";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+Index: linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq6018-edgecore-eap101.dts
|
||||||
|
+===================================================================
|
||||||
|
+--- linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce.orig/arch/arm64/boot/dts/qcom/qcom-ipq6018-edgecore-eap101.dts
|
||||||
|
++++ linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq6018-edgecore-eap101.dts
|
||||||
|
+@@ -337,21 +337,21 @@
|
||||||
|
+ pinctrl-names = "default";
|
||||||
|
+
|
||||||
|
+ led@25 {
|
||||||
|
+- label = "green:wifi5";
|
||||||
|
++ label = "eap101:green:wifi5g";
|
||||||
|
+ gpios = <&tlmm 35 GPIO_ACTIVE_LOW>;
|
||||||
|
+- linux,default-trigger = "wf188:green:5g";
|
||||||
|
++ linux,default-trigger = "eap101:green:wifi5g";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led@24 {
|
||||||
|
+- label = "green:wifi2";
|
||||||
|
++ label = "eap101:green:wifi2g";
|
||||||
|
+ gpios = <&tlmm 37 GPIO_ACTIVE_LOW>;
|
||||||
|
+- linux,default-trigger = "wf188:green:2g";
|
||||||
|
++ linux,default-trigger = "eap101:green:wifi2g";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ led_power: led@16 {
|
||||||
|
+- label = "led_pwr";
|
||||||
|
+- gpios = <&tlmm 74 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- linux,default-trigger = "green:power";
|
||||||
|
++ label = "eap101:green:power";
|
||||||
|
++ gpios = <&tlmm 74 GPIO_ACTIVE_LOW>;
|
||||||
|
++ linux,default-trigger = "eap101:green:power";
|
||||||
|
+ default-state = "off";
|
||||||
|
+ };
|
||||||
|
+ };
|
||||||
|
+Index: linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq807x-eap102.dts
|
||||||
|
+===================================================================
|
||||||
|
+--- linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce.orig/arch/arm64/boot/dts/qcom/qcom-ipq807x-eap102.dts
|
||||||
|
++++ linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq807x-eap102.dts
|
||||||
|
+@@ -671,29 +671,27 @@
|
||||||
|
+ pinctrl-names = "default";
|
||||||
|
+
|
||||||
|
+ led_power: led_pwr {
|
||||||
|
+- label = "green:power";
|
||||||
|
++ label = "eap102:green:power";
|
||||||
|
+ gpios = <&tlmm 46 GPIO_ACTIVE_HIGH>;
|
||||||
|
+ default-state = "on";
|
||||||
|
+- linux,default-trigger = "led_pwr";
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+ led_2g {
|
||||||
|
+- label = "green:wifi2";
|
||||||
|
++ label = "eap102:green:wifi2g";
|
||||||
|
+ gpio = <&tlmm 47 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- default-state = "off";
|
||||||
|
++ default-state = "on";
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+ led_5g {
|
||||||
|
+- label = "green:wifi5";
|
||||||
|
++ label = "eap102:green:wifi5g";
|
||||||
|
+ gpio = <&tlmm 48 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- default-state = "off";
|
||||||
|
++ default-state = "on";
|
||||||
|
+ };
|
||||||
|
+
|
||||||
|
+ led_bt {
|
||||||
|
++ label = "eap102:green:bt";
|
||||||
|
+ gpios = <&tlmm 50 GPIO_ACTIVE_HIGH>;
|
||||||
|
+- label = "green:bt";
|
||||||
|
+- default-state = "off";
|
||||||
|
+- linux,default-trigger = "led_bt";
|
||||||
|
++ default-state = "on";
|
||||||
|
+ };
|
||||||
|
+ };
|
||||||
|
+ nss-macsec0 {
|
||||||
|
+Index: linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq807x-ex227.dts
|
||||||
|
+===================================================================
|
||||||
|
+--- linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce.orig/arch/arm64/boot/dts/qcom/qcom-ipq807x-ex227.dts
|
||||||
|
++++ linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq807x-ex227.dts
|
||||||
|
+@@ -600,7 +600,7 @@
|
||||||
|
+ pinctrl-names = "default";
|
||||||
|
+
|
||||||
|
+ led_power {
|
||||||
|
+- label = "led_power";
|
||||||
|
++ label = "ex227:blue:power";
|
||||||
|
+ gpio = <&tlmm 42 GPIO_ACTIVE_HIGH>;
|
||||||
|
+ default-state = "on";
|
||||||
|
+ };
|
||||||
|
+Index: linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq807x-ex447.dts
|
||||||
|
+===================================================================
|
||||||
|
+--- linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce.orig/arch/arm64/boot/dts/qcom/qcom-ipq807x-ex447.dts
|
||||||
|
++++ linux-4.4.60-qsdk-10fd7d14853b7020b804acae690c8acec5d954ce/arch/arm64/boot/dts/qcom/qcom-ipq807x-ex447.dts
|
||||||
|
+@@ -600,7 +600,7 @@
|
||||||
|
+ pinctrl-names = "default";
|
||||||
|
+
|
||||||
|
+ led_power {
|
||||||
|
+- label = "led_power";
|
||||||
|
++ label = "ex447:blue:power";
|
||||||
|
+ gpio = <&tlmm 42 GPIO_ACTIVE_HIGH>;
|
||||||
|
+ default-state = "on";
|
||||||
|
+ };
|
||||||
|
--
|
||||||
|
2.25.1
|
||||||
|
|
||||||
@@ -81,6 +81,8 @@ packages:
|
|||||||
- apc
|
- apc
|
||||||
- radsecproxy
|
- radsecproxy
|
||||||
- logrotate
|
- logrotate
|
||||||
|
- kmod-ledtrig-heartbeat
|
||||||
|
- bind-dig
|
||||||
|
|
||||||
diffconfig: |
|
diffconfig: |
|
||||||
CONFIG_OPENSSL_ENGINE=y
|
CONFIG_OPENSSL_ENGINE=y
|
||||||
|
|||||||
Reference in New Issue
Block a user