1/*
2 * hostapd / UNIX domain socket -based control interface
3 * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15#include "utils/includes.h"
16
17#ifndef CONFIG_NATIVE_WINDOWS
18
19#include <sys/un.h>
20#include <sys/stat.h>
21#include <stddef.h>
22
23#include "utils/common.h"
24#include "utils/eloop.h"
25#include "common/ieee802_11_defs.h"
26#include "drivers/driver.h"
27#include "radius/radius_client.h"
28#include "ap/hostapd.h"
29#include "ap/ap_config.h"
30#include "ap/ieee802_1x.h"
31#include "ap/wpa_auth.h"
32#include "ap/ieee802_11.h"
33#include "ap/sta_info.h"
34#include "ap/accounting.h"
35#include "ap/wps_hostapd.h"
36#include "ap/ctrl_iface_ap.h"
37#include "ctrl_iface.h"
38
39
40struct wpa_ctrl_dst {
41	struct wpa_ctrl_dst *next;
42	struct sockaddr_un addr;
43	socklen_t addrlen;
44	int debug_level;
45	int errors;
46};
47
48
49static void hostapd_ctrl_iface_send(struct hostapd_data *hapd, int level,
50				    const char *buf, size_t len);
51
52
53static int hostapd_ctrl_iface_attach(struct hostapd_data *hapd,
54				     struct sockaddr_un *from,
55				     socklen_t fromlen)
56{
57	struct wpa_ctrl_dst *dst;
58
59	dst = os_zalloc(sizeof(*dst));
60	if (dst == NULL)
61		return -1;
62	os_memcpy(&dst->addr, from, sizeof(struct sockaddr_un));
63	dst->addrlen = fromlen;
64	dst->debug_level = MSG_INFO;
65	dst->next = hapd->ctrl_dst;
66	hapd->ctrl_dst = dst;
67	wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
68		    (u8 *) from->sun_path,
69		    fromlen - offsetof(struct sockaddr_un, sun_path));
70	return 0;
71}
72
73
74static int hostapd_ctrl_iface_detach(struct hostapd_data *hapd,
75				     struct sockaddr_un *from,
76				     socklen_t fromlen)
77{
78	struct wpa_ctrl_dst *dst, *prev = NULL;
79
80	dst = hapd->ctrl_dst;
81	while (dst) {
82		if (fromlen == dst->addrlen &&
83		    os_memcmp(from->sun_path, dst->addr.sun_path,
84			      fromlen - offsetof(struct sockaddr_un, sun_path))
85		    == 0) {
86			if (prev == NULL)
87				hapd->ctrl_dst = dst->next;
88			else
89				prev->next = dst->next;
90			os_free(dst);
91			wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
92				    (u8 *) from->sun_path,
93				    fromlen -
94				    offsetof(struct sockaddr_un, sun_path));
95			return 0;
96		}
97		prev = dst;
98		dst = dst->next;
99	}
100	return -1;
101}
102
103
104static int hostapd_ctrl_iface_level(struct hostapd_data *hapd,
105				    struct sockaddr_un *from,
106				    socklen_t fromlen,
107				    char *level)
108{
109	struct wpa_ctrl_dst *dst;
110
111	wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
112
113	dst = hapd->ctrl_dst;
114	while (dst) {
115		if (fromlen == dst->addrlen &&
116		    os_memcmp(from->sun_path, dst->addr.sun_path,
117			      fromlen - offsetof(struct sockaddr_un, sun_path))
118		    == 0) {
119			wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
120				    "level", (u8 *) from->sun_path, fromlen -
121				    offsetof(struct sockaddr_un, sun_path));
122			dst->debug_level = atoi(level);
123			return 0;
124		}
125		dst = dst->next;
126	}
127
128	return -1;
129}
130
131
132static int hostapd_ctrl_iface_new_sta(struct hostapd_data *hapd,
133				      const char *txtaddr)
134{
135	u8 addr[ETH_ALEN];
136	struct sta_info *sta;
137
138	wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr);
139
140	if (hwaddr_aton(txtaddr, addr))
141		return -1;
142
143	sta = ap_get_sta(hapd, addr);
144	if (sta)
145		return 0;
146
147	wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface "
148		   "notification", MAC2STR(addr));
149	sta = ap_sta_add(hapd, addr);
150	if (sta == NULL)
151		return -1;
152
153	hostapd_new_assoc_sta(hapd, sta, 0);
154	return 0;
155}
156
157
158static int hostapd_ctrl_iface_deauthenticate(struct hostapd_data *hapd,
159					     const char *txtaddr)
160{
161	u8 addr[ETH_ALEN];
162	struct sta_info *sta;
163	const char *pos;
164
165	wpa_printf(MSG_DEBUG, "CTRL_IFACE DEAUTHENTICATE %s", txtaddr);
166
167	if (hwaddr_aton(txtaddr, addr))
168		return -1;
169
170	pos = os_strstr(txtaddr, " test=");
171	if (pos) {
172		struct ieee80211_mgmt mgmt;
173		int encrypt;
174		if (hapd->driver->send_frame == NULL)
175			return -1;
176		pos += 6;
177		encrypt = atoi(pos);
178		os_memset(&mgmt, 0, sizeof(mgmt));
179		mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
180						  WLAN_FC_STYPE_DEAUTH);
181		os_memcpy(mgmt.da, addr, ETH_ALEN);
182		os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
183		os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN);
184		mgmt.u.deauth.reason_code =
185			host_to_le16(WLAN_REASON_PREV_AUTH_NOT_VALID);
186		if (hapd->driver->send_frame(hapd->drv_priv, (u8 *) &mgmt,
187					     IEEE80211_HDRLEN +
188					     sizeof(mgmt.u.deauth),
189					     encrypt) < 0)
190			return -1;
191		return 0;
192	}
193
194	hapd->drv.sta_deauth(hapd, addr, WLAN_REASON_PREV_AUTH_NOT_VALID);
195	sta = ap_get_sta(hapd, addr);
196	if (sta)
197		ap_sta_deauthenticate(hapd, sta,
198				      WLAN_REASON_PREV_AUTH_NOT_VALID);
199
200	return 0;
201}
202
203
204static int hostapd_ctrl_iface_disassociate(struct hostapd_data *hapd,
205					   const char *txtaddr)
206{
207	u8 addr[ETH_ALEN];
208	struct sta_info *sta;
209	const char *pos;
210
211	wpa_printf(MSG_DEBUG, "CTRL_IFACE DISASSOCIATE %s", txtaddr);
212
213	if (hwaddr_aton(txtaddr, addr))
214		return -1;
215
216	pos = os_strstr(txtaddr, " test=");
217	if (pos) {
218		struct ieee80211_mgmt mgmt;
219		int encrypt;
220		if (hapd->driver->send_frame == NULL)
221			return -1;
222		pos += 6;
223		encrypt = atoi(pos);
224		os_memset(&mgmt, 0, sizeof(mgmt));
225		mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
226						  WLAN_FC_STYPE_DISASSOC);
227		os_memcpy(mgmt.da, addr, ETH_ALEN);
228		os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
229		os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN);
230		mgmt.u.disassoc.reason_code =
231			host_to_le16(WLAN_REASON_PREV_AUTH_NOT_VALID);
232		if (hapd->driver->send_frame(hapd->drv_priv, (u8 *) &mgmt,
233					     IEEE80211_HDRLEN +
234					     sizeof(mgmt.u.deauth),
235					     encrypt) < 0)
236			return -1;
237		return 0;
238	}
239
240	hapd->drv.sta_disassoc(hapd, addr, WLAN_REASON_PREV_AUTH_NOT_VALID);
241	sta = ap_get_sta(hapd, addr);
242	if (sta)
243		ap_sta_disassociate(hapd, sta,
244				    WLAN_REASON_PREV_AUTH_NOT_VALID);
245
246	return 0;
247}
248
249
250#ifdef CONFIG_IEEE80211W
251#ifdef NEED_AP_MLME
252static int hostapd_ctrl_iface_sa_query(struct hostapd_data *hapd,
253				       const char *txtaddr)
254{
255	u8 addr[ETH_ALEN];
256	u8 trans_id[WLAN_SA_QUERY_TR_ID_LEN];
257
258	wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr);
259
260	if (hwaddr_aton(txtaddr, addr) ||
261	    os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN) < 0)
262		return -1;
263
264	ieee802_11_send_sa_query_req(hapd, addr, trans_id);
265
266	return 0;
267}
268#endif /* NEED_AP_MLME */
269#endif /* CONFIG_IEEE80211W */
270
271
272#ifdef CONFIG_WPS
273static int hostapd_ctrl_iface_wps_pin(struct hostapd_data *hapd, char *txt)
274{
275	char *pin = os_strchr(txt, ' ');
276	char *timeout_txt;
277	int timeout;
278
279	if (pin == NULL)
280		return -1;
281	*pin++ = '\0';
282
283	timeout_txt = os_strchr(pin, ' ');
284	if (timeout_txt) {
285		*timeout_txt++ = '\0';
286		timeout = atoi(timeout_txt);
287	} else
288		timeout = 0;
289
290	return hostapd_wps_add_pin(hapd, txt, pin, timeout);
291}
292
293
294#ifdef CONFIG_WPS_OOB
295static int hostapd_ctrl_iface_wps_oob(struct hostapd_data *hapd, char *txt)
296{
297	char *path, *method, *name;
298
299	path = os_strchr(txt, ' ');
300	if (path == NULL)
301		return -1;
302	*path++ = '\0';
303
304	method = os_strchr(path, ' ');
305	if (method == NULL)
306		return -1;
307	*method++ = '\0';
308
309	name = os_strchr(method, ' ');
310	if (name != NULL)
311		*name++ = '\0';
312
313	return hostapd_wps_start_oob(hapd, txt, path, method, name);
314}
315#endif /* CONFIG_WPS_OOB */
316
317
318static int hostapd_ctrl_iface_wps_ap_pin(struct hostapd_data *hapd, char *txt,
319					 char *buf, size_t buflen)
320{
321	int timeout = 300;
322	char *pos;
323	const char *pin_txt;
324
325	pos = os_strchr(txt, ' ');
326	if (pos)
327		*pos++ = '\0';
328
329	if (os_strcmp(txt, "disable") == 0) {
330		hostapd_wps_ap_pin_disable(hapd);
331		return os_snprintf(buf, buflen, "OK\n");
332	}
333
334	if (os_strcmp(txt, "random") == 0) {
335		if (pos)
336			timeout = atoi(pos);
337		pin_txt = hostapd_wps_ap_pin_random(hapd, timeout);
338		if (pin_txt == NULL)
339			return -1;
340		return os_snprintf(buf, buflen, "%s", pin_txt);
341	}
342
343	if (os_strcmp(txt, "get") == 0) {
344		pin_txt = hostapd_wps_ap_pin_get(hapd);
345		if (pin_txt == NULL)
346			return -1;
347		return os_snprintf(buf, buflen, "%s", pin_txt);
348	}
349
350	if (os_strcmp(txt, "set") == 0) {
351		char *pin;
352		if (pos == NULL)
353			return -1;
354		pin = pos;
355		pos = os_strchr(pos, ' ');
356		if (pos) {
357			*pos++ = '\0';
358			timeout = atoi(pos);
359		}
360		if (os_strlen(pin) > buflen)
361			return -1;
362		if (hostapd_wps_ap_pin_set(hapd, pin, timeout) < 0)
363			return -1;
364		return os_snprintf(buf, buflen, "%s", pin);
365	}
366
367	return -1;
368}
369#endif /* CONFIG_WPS */
370
371
372static void hostapd_ctrl_iface_receive(int sock, void *eloop_ctx,
373				       void *sock_ctx)
374{
375	struct hostapd_data *hapd = eloop_ctx;
376	char buf[256];
377	int res;
378	struct sockaddr_un from;
379	socklen_t fromlen = sizeof(from);
380	char *reply;
381	const int reply_size = 4096;
382	int reply_len;
383
384	res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
385		       (struct sockaddr *) &from, &fromlen);
386	if (res < 0) {
387		perror("recvfrom(ctrl_iface)");
388		return;
389	}
390	buf[res] = '\0';
391	wpa_hexdump_ascii(MSG_DEBUG, "RX ctrl_iface", (u8 *) buf, res);
392
393	reply = os_malloc(reply_size);
394	if (reply == NULL) {
395		sendto(sock, "FAIL\n", 5, 0, (struct sockaddr *) &from,
396		       fromlen);
397		return;
398	}
399
400	os_memcpy(reply, "OK\n", 3);
401	reply_len = 3;
402
403	if (os_strcmp(buf, "PING") == 0) {
404		os_memcpy(reply, "PONG\n", 5);
405		reply_len = 5;
406	} else if (os_strcmp(buf, "MIB") == 0) {
407		reply_len = ieee802_11_get_mib(hapd, reply, reply_size);
408		if (reply_len >= 0) {
409			res = wpa_get_mib(hapd->wpa_auth, reply + reply_len,
410					  reply_size - reply_len);
411			if (res < 0)
412				reply_len = -1;
413			else
414				reply_len += res;
415		}
416		if (reply_len >= 0) {
417			res = ieee802_1x_get_mib(hapd, reply + reply_len,
418						 reply_size - reply_len);
419			if (res < 0)
420				reply_len = -1;
421			else
422				reply_len += res;
423		}
424#ifndef CONFIG_NO_RADIUS
425		if (reply_len >= 0) {
426			res = radius_client_get_mib(hapd->radius,
427						    reply + reply_len,
428						    reply_size - reply_len);
429			if (res < 0)
430				reply_len = -1;
431			else
432				reply_len += res;
433		}
434#endif /* CONFIG_NO_RADIUS */
435	} else if (os_strcmp(buf, "STA-FIRST") == 0) {
436		reply_len = hostapd_ctrl_iface_sta_first(hapd, reply,
437							 reply_size);
438	} else if (os_strncmp(buf, "STA ", 4) == 0) {
439		reply_len = hostapd_ctrl_iface_sta(hapd, buf + 4, reply,
440						   reply_size);
441	} else if (os_strncmp(buf, "STA-NEXT ", 9) == 0) {
442		reply_len = hostapd_ctrl_iface_sta_next(hapd, buf + 9, reply,
443							reply_size);
444	} else if (os_strcmp(buf, "ATTACH") == 0) {
445		if (hostapd_ctrl_iface_attach(hapd, &from, fromlen))
446			reply_len = -1;
447	} else if (os_strcmp(buf, "DETACH") == 0) {
448		if (hostapd_ctrl_iface_detach(hapd, &from, fromlen))
449			reply_len = -1;
450	} else if (os_strncmp(buf, "LEVEL ", 6) == 0) {
451		if (hostapd_ctrl_iface_level(hapd, &from, fromlen,
452						    buf + 6))
453			reply_len = -1;
454	} else if (os_strncmp(buf, "NEW_STA ", 8) == 0) {
455		if (hostapd_ctrl_iface_new_sta(hapd, buf + 8))
456			reply_len = -1;
457	} else if (os_strncmp(buf, "DEAUTHENTICATE ", 15) == 0) {
458		if (hostapd_ctrl_iface_deauthenticate(hapd, buf + 15))
459			reply_len = -1;
460	} else if (os_strncmp(buf, "DISASSOCIATE ", 13) == 0) {
461		if (hostapd_ctrl_iface_disassociate(hapd, buf + 13))
462			reply_len = -1;
463#ifdef CONFIG_IEEE80211W
464#ifdef NEED_AP_MLME
465	} else if (os_strncmp(buf, "SA_QUERY ", 9) == 0) {
466		if (hostapd_ctrl_iface_sa_query(hapd, buf + 9))
467			reply_len = -1;
468#endif /* NEED_AP_MLME */
469#endif /* CONFIG_IEEE80211W */
470#ifdef CONFIG_WPS
471	} else if (os_strncmp(buf, "WPS_PIN ", 8) == 0) {
472		if (hostapd_ctrl_iface_wps_pin(hapd, buf + 8))
473			reply_len = -1;
474	} else if (os_strcmp(buf, "WPS_PBC") == 0) {
475		if (hostapd_wps_button_pushed(hapd))
476			reply_len = -1;
477#ifdef CONFIG_WPS_OOB
478	} else if (os_strncmp(buf, "WPS_OOB ", 8) == 0) {
479		if (hostapd_ctrl_iface_wps_oob(hapd, buf + 8))
480			reply_len = -1;
481#endif /* CONFIG_WPS_OOB */
482	} else if (os_strncmp(buf, "WPS_AP_PIN ", 11) == 0) {
483		reply_len = hostapd_ctrl_iface_wps_ap_pin(hapd, buf + 11,
484							  reply, reply_size);
485#endif /* CONFIG_WPS */
486	} else {
487		os_memcpy(reply, "UNKNOWN COMMAND\n", 16);
488		reply_len = 16;
489	}
490
491	if (reply_len < 0) {
492		os_memcpy(reply, "FAIL\n", 5);
493		reply_len = 5;
494	}
495	sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, fromlen);
496	os_free(reply);
497}
498
499
500static char * hostapd_ctrl_iface_path(struct hostapd_data *hapd)
501{
502	char *buf;
503	size_t len;
504
505	if (hapd->conf->ctrl_interface == NULL)
506		return NULL;
507
508	len = os_strlen(hapd->conf->ctrl_interface) +
509		os_strlen(hapd->conf->iface) + 2;
510	buf = os_malloc(len);
511	if (buf == NULL)
512		return NULL;
513
514	os_snprintf(buf, len, "%s/%s",
515		    hapd->conf->ctrl_interface, hapd->conf->iface);
516	buf[len - 1] = '\0';
517	return buf;
518}
519
520
521static void hostapd_ctrl_iface_msg_cb(void *ctx, int level,
522				      const char *txt, size_t len)
523{
524	struct hostapd_data *hapd = ctx;
525	if (hapd == NULL)
526		return;
527	hostapd_ctrl_iface_send(hapd, level, txt, len);
528}
529
530
531int hostapd_ctrl_iface_init(struct hostapd_data *hapd)
532{
533	struct sockaddr_un addr;
534	int s = -1;
535	char *fname = NULL;
536
537	hapd->ctrl_sock = -1;
538
539	if (hapd->conf->ctrl_interface == NULL)
540		return 0;
541
542	if (mkdir(hapd->conf->ctrl_interface, S_IRWXU | S_IRWXG) < 0) {
543		if (errno == EEXIST) {
544			wpa_printf(MSG_DEBUG, "Using existing control "
545				   "interface directory.");
546		} else {
547			perror("mkdir[ctrl_interface]");
548			goto fail;
549		}
550	}
551
552	if (hapd->conf->ctrl_interface_gid_set &&
553	    chown(hapd->conf->ctrl_interface, 0,
554		  hapd->conf->ctrl_interface_gid) < 0) {
555		perror("chown[ctrl_interface]");
556		return -1;
557	}
558
559	if (os_strlen(hapd->conf->ctrl_interface) + 1 +
560	    os_strlen(hapd->conf->iface) >= sizeof(addr.sun_path))
561		goto fail;
562
563	s = socket(PF_UNIX, SOCK_DGRAM, 0);
564	if (s < 0) {
565		perror("socket(PF_UNIX)");
566		goto fail;
567	}
568
569	os_memset(&addr, 0, sizeof(addr));
570#ifdef __FreeBSD__
571	addr.sun_len = sizeof(addr);
572#endif /* __FreeBSD__ */
573	addr.sun_family = AF_UNIX;
574	fname = hostapd_ctrl_iface_path(hapd);
575	if (fname == NULL)
576		goto fail;
577	os_strlcpy(addr.sun_path, fname, sizeof(addr.sun_path));
578	if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
579		wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
580			   strerror(errno));
581		if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
582			wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
583				   " allow connections - assuming it was left"
584				   "over from forced program termination");
585			if (unlink(fname) < 0) {
586				perror("unlink[ctrl_iface]");
587				wpa_printf(MSG_ERROR, "Could not unlink "
588					   "existing ctrl_iface socket '%s'",
589					   fname);
590				goto fail;
591			}
592			if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) <
593			    0) {
594				perror("bind(PF_UNIX)");
595				goto fail;
596			}
597			wpa_printf(MSG_DEBUG, "Successfully replaced leftover "
598				   "ctrl_iface socket '%s'", fname);
599		} else {
600			wpa_printf(MSG_INFO, "ctrl_iface exists and seems to "
601				   "be in use - cannot override it");
602			wpa_printf(MSG_INFO, "Delete '%s' manually if it is "
603				   "not used anymore", fname);
604			os_free(fname);
605			fname = NULL;
606			goto fail;
607		}
608	}
609
610	if (hapd->conf->ctrl_interface_gid_set &&
611	    chown(fname, 0, hapd->conf->ctrl_interface_gid) < 0) {
612		perror("chown[ctrl_interface/ifname]");
613		goto fail;
614	}
615
616	if (chmod(fname, S_IRWXU | S_IRWXG) < 0) {
617		perror("chmod[ctrl_interface/ifname]");
618		goto fail;
619	}
620	os_free(fname);
621
622	hapd->ctrl_sock = s;
623	eloop_register_read_sock(s, hostapd_ctrl_iface_receive, hapd,
624				 NULL);
625	hapd->msg_ctx = hapd;
626	wpa_msg_register_cb(hostapd_ctrl_iface_msg_cb);
627
628	return 0;
629
630fail:
631	if (s >= 0)
632		close(s);
633	if (fname) {
634		unlink(fname);
635		os_free(fname);
636	}
637	return -1;
638}
639
640
641void hostapd_ctrl_iface_deinit(struct hostapd_data *hapd)
642{
643	struct wpa_ctrl_dst *dst, *prev;
644
645	if (hapd->ctrl_sock > -1) {
646		char *fname;
647		eloop_unregister_read_sock(hapd->ctrl_sock);
648		close(hapd->ctrl_sock);
649		hapd->ctrl_sock = -1;
650		fname = hostapd_ctrl_iface_path(hapd);
651		if (fname)
652			unlink(fname);
653		os_free(fname);
654
655		if (hapd->conf->ctrl_interface &&
656		    rmdir(hapd->conf->ctrl_interface) < 0) {
657			if (errno == ENOTEMPTY) {
658				wpa_printf(MSG_DEBUG, "Control interface "
659					   "directory not empty - leaving it "
660					   "behind");
661			} else {
662				perror("rmdir[ctrl_interface]");
663			}
664		}
665	}
666
667	dst = hapd->ctrl_dst;
668	while (dst) {
669		prev = dst;
670		dst = dst->next;
671		os_free(prev);
672	}
673}
674
675
676static void hostapd_ctrl_iface_send(struct hostapd_data *hapd, int level,
677				    const char *buf, size_t len)
678{
679	struct wpa_ctrl_dst *dst, *next;
680	struct msghdr msg;
681	int idx;
682	struct iovec io[2];
683	char levelstr[10];
684
685	dst = hapd->ctrl_dst;
686	if (hapd->ctrl_sock < 0 || dst == NULL)
687		return;
688
689	os_snprintf(levelstr, sizeof(levelstr), "<%d>", level);
690	io[0].iov_base = levelstr;
691	io[0].iov_len = os_strlen(levelstr);
692	io[1].iov_base = (char *) buf;
693	io[1].iov_len = len;
694	os_memset(&msg, 0, sizeof(msg));
695	msg.msg_iov = io;
696	msg.msg_iovlen = 2;
697
698	idx = 0;
699	while (dst) {
700		next = dst->next;
701		if (level >= dst->debug_level) {
702			wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor send",
703				    (u8 *) dst->addr.sun_path, dst->addrlen -
704				    offsetof(struct sockaddr_un, sun_path));
705			msg.msg_name = &dst->addr;
706			msg.msg_namelen = dst->addrlen;
707			if (sendmsg(hapd->ctrl_sock, &msg, 0) < 0) {
708				int _errno = errno;
709				wpa_printf(MSG_INFO, "CTRL_IFACE monitor[%d]: "
710					   "%d - %s",
711					   idx, errno, strerror(errno));
712				dst->errors++;
713				if (dst->errors > 10 || _errno == ENOENT) {
714					hostapd_ctrl_iface_detach(
715						hapd, &dst->addr,
716						dst->addrlen);
717				}
718			} else
719				dst->errors = 0;
720		}
721		idx++;
722		dst = next;
723	}
724}
725
726#endif /* CONFIG_NATIVE_WINDOWS */
727