Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp1601913rdb; Wed, 20 Sep 2023 14:03:02 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGHRwjn8SMrkbL5+JPICm/opxTj2Hq/EQsPChXftZz7I3e2d+9pVLjhWxx7wY1c5Fhm98bE X-Received: by 2002:a05:6a20:3d09:b0:14c:c393:692 with SMTP id y9-20020a056a203d0900b0014cc3930692mr4705825pzi.7.1695243781806; Wed, 20 Sep 2023 14:03:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695243781; cv=none; d=google.com; s=arc-20160816; b=R1hiscaqf6m4KpfkmeqaXiY0AB696jGXAqGBgoxL/KbMSXLFTkRPBK/ZyPL/xGBvhj JyQ2j4lq8agO/n0m0HATe30feFktNi2by3SaSjvhmIWJe+Oi1i/f1++tvXPzOMVdzizw aXzMBKYssLIJbPGysqUkZsqu4MDd//ODqTAgABPQRSa+7R7SzfjxZwSGBT9DH2/JJbqf UIv/jpTpJux1Y95On5UKQxk3hgIvAFZItrlsgBAvK+Q8vpG6mJv+tOrAt/CRkPQ0s9D1 o05LSwqGxyvXoj/mtkC3PgbQwv8DzpkoAuA6i85y+cCfb1z9vXWCMBYE60ofCMLmI0go pFhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Krcv55ypXb++xLKsAvxDr5Wdo4NbuSJ4DNMONV5tERc=; fh=Jp47DAEBZGYKvP+QhbZP30z/2qU5MmgU1PLrOH49x2Y=; b=SQDf5W7GB7rvd/7hJDlGzUJUZNJ5cmrn12C1s8LV7eotS0kwcSL89Ahd3JHIV9Rn2d Au6dS3N1Ne6hCuVjdKXG4wkHG7kijCX/9PaFgG2RSHmm2mXIsEOJWQe1QFboWHHKJwyj wTlDMfycBBY/LcdwnFaRlBS9jssIZcIK+NWAln9YtPR8eIQDR4TVWF7YOEzyK2Iso0b7 Qs22fSD6ToeMwBNs07Jys+0aLG3VImGMHWc2UER4ovZGIueufk7ZXKZncq2rPOpVUuca NrPVENLwHe1iVcjvKu5SDyY/A+mxqDwgivwGkxVxtj0jOMEJZXFF9i0sjkrOZlHZYtPQ PBag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=K2wnk88t; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id u8-20020a17090341c800b001c470c25409si7671017ple.327.2023.09.20.14.03.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Sep 2023 14:03:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=K2wnk88t; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id D5B4081142C1; Wed, 20 Sep 2023 11:27:46 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229764AbjITS1P (ORCPT + 56 others); Wed, 20 Sep 2023 14:27:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59696 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229639AbjITS1O (ORCPT ); Wed, 20 Sep 2023 14:27:14 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9CD0AC6 for ; Wed, 20 Sep 2023 11:27:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1695234420; x=1726770420; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=nk9yaiE40tY3rG0eHhncncPn4QSdtadwzRmF+nkFgJg=; b=K2wnk88tF7BkXF7P10YADhmPGuYRpMEXBtCp4/yTplwTrvIkVpwAMufE KywSZ8gCHQannc7Oj/iLFlxzESodX5U2m/Su0GXmOkcDnp88h/QkXOrJq 77PbKpxArOW3ykkClzcKC+6ltP5JbPepWTwVefbCjEj+wuaQW4Iw11opJ ualkNQo6CCFPpOdz2R0fJmM4iLtgr/dxsk93csc58iO7oORadKUUU2my+ axU7r9k6dLEQDPJCqG3+6g82O7hATGVhHtQB/1PjRAwXhc3Ka5NPDpkOr 89Y05qY53Ywt446B+BT27jir2iINJAQnftbQc3MSI4o3JRiP3Si0q2VVd Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10839"; a="360556459" X-IronPort-AV: E=Sophos;i="6.03,162,1694761200"; d="scan'208";a="360556459" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Sep 2023 11:26:49 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10839"; a="723424285" X-IronPort-AV: E=Sophos;i="6.03,162,1694761200"; d="scan'208";a="723424285" Received: from dmani-mobl1.ger.corp.intel.com (HELO ggreenma-mobl2.lan) ([10.214.217.100]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Sep 2023 11:26:48 -0700 From: gregory.greenman@intel.com To: johannes@sipsolutions.net Cc: linux-wireless@vger.kernel.org, Benjamin Berg , Gregory Greenman Subject: [PATCH v2 16/18] wifi: cfg80211: report per-link errors during association Date: Wed, 20 Sep 2023 21:25:27 +0300 Message-Id: <20230920211508.ebe63c0bd513.I40799998f02bf987acee1501a2522dc98bb6eb5a@changeid> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230920182529.659973-1-gregory.greenman@intel.com> References: <20230920182529.659973-1-gregory.greenman@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 20 Sep 2023 11:27:47 -0700 (PDT) From: Benjamin Berg When one of the links (other than the assoc_link) is misconfigured and cannot work the association will fail. However, userspace was not able to tell that the operation only failed because of a problem with one of the links. Fix this, by allowing the driver to set a per-link error code and reporting the (first) offending link by setting the bad_attr accordingly. This only allows us to report the first error, but that is sufficient for userspace to e.g. remove the offending link and retry. Signed-off-by: Benjamin Berg Signed-off-by: Gregory Greenman --- include/net/cfg80211.h | 3 +++ net/wireless/nl80211.c | 50 +++++++++++++++++++++++++++++++++++++----- 2 files changed, 47 insertions(+), 6 deletions(-) diff --git a/include/net/cfg80211.h b/include/net/cfg80211.h index 9af714431b22..0115fd9bf33a 100644 --- a/include/net/cfg80211.h +++ b/include/net/cfg80211.h @@ -2964,12 +2964,15 @@ struct cfg80211_auth_request { * @elems_len: length of the elements * @disabled: If set this link should be included during association etc. but it * should not be used until enabled by the AP MLD. + * @error: per-link error code, must be <= 0. If there is an error, then the + * operation as a whole must fail. */ struct cfg80211_assoc_link { struct cfg80211_bss *bss; const u8 *elems; size_t elems_len; bool disabled; + int error; }; /** diff --git a/net/wireless/nl80211.c b/net/wireless/nl80211.c index e64bf2a58b36..74eaf74f153a 100644 --- a/net/wireless/nl80211.c +++ b/net/wireless/nl80211.c @@ -10942,8 +10942,9 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) if (cfg80211_find_ext_elem(WLAN_EID_EXT_NON_INHERITANCE, req.ie, req.ie_len)) { - GENL_SET_ERR_MSG(info, - "non-inheritance makes no sense"); + NL_SET_ERR_MSG_ATTR(info->extack, + info->attrs[NL80211_ATTR_IE], + "non-inheritance makes no sense"); return -EINVAL; } } @@ -11068,6 +11069,7 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) if (!attrs[NL80211_ATTR_MLO_LINK_ID]) { err = -EINVAL; + NL_SET_BAD_ATTR(info->extack, link); goto free; } @@ -11075,6 +11077,7 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) /* cannot use the same link ID again */ if (req.links[link_id].bss) { err = -EINVAL; + NL_SET_BAD_ATTR(info->extack, link); goto free; } req.links[link_id].bss = @@ -11082,6 +11085,8 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) if (IS_ERR(req.links[link_id].bss)) { err = PTR_ERR(req.links[link_id].bss); req.links[link_id].bss = NULL; + NL_SET_ERR_MSG_ATTR(info->extack, + link, "Error fetching BSS for link"); goto free; } @@ -11094,8 +11099,9 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) if (cfg80211_find_elem(WLAN_EID_FRAGMENT, req.links[link_id].elems, req.links[link_id].elems_len)) { - GENL_SET_ERR_MSG(info, - "cannot deal with fragmentation"); + NL_SET_ERR_MSG_ATTR(info->extack, + attrs[NL80211_ATTR_IE], + "cannot deal with fragmentation"); err = -EINVAL; goto free; } @@ -11103,8 +11109,9 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) if (cfg80211_find_ext_elem(WLAN_EID_EXT_NON_INHERITANCE, req.links[link_id].elems, req.links[link_id].elems_len)) { - GENL_SET_ERR_MSG(info, - "cannot deal with non-inheritance"); + NL_SET_ERR_MSG_ATTR(info->extack, + attrs[NL80211_ATTR_IE], + "cannot deal with non-inheritance"); err = -EINVAL; goto free; } @@ -11147,6 +11154,9 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) err = nl80211_crypto_settings(rdev, info, &req.crypto, 1); if (!err) { + struct nlattr *link; + int rem = 0; + err = cfg80211_mlme_assoc(rdev, dev, &req); if (!err && info->attrs[NL80211_ATTR_SOCKET_OWNER]) { @@ -11155,6 +11165,34 @@ static int nl80211_associate(struct sk_buff *skb, struct genl_info *info) memcpy(dev->ieee80211_ptr->disconnect_bssid, ap_addr, ETH_ALEN); } + + /* Report error from first problematic link */ + if (info->attrs[NL80211_ATTR_MLO_LINKS]) { + nla_for_each_nested(link, + info->attrs[NL80211_ATTR_MLO_LINKS], + rem) { + struct nlattr *link_id_attr = + nla_find_nested(link, NL80211_ATTR_MLO_LINK_ID); + + if (!link_id_attr) + continue; + + link_id = nla_get_u8(link_id_attr); + + if (link_id == req.link_id) + continue; + + if (!req.links[link_id].error || + WARN_ON(req.links[link_id].error > 0)) + continue; + + WARN_ON(err >= 0); + + NL_SET_BAD_ATTR(info->extack, link); + err = req.links[link_id].error; + break; + } + } } free: -- 2.38.1