udp: Merge udp_send and udp_output
[dragonfly.git] / contrib / wpa_supplicant / wpa_supplicant / ctrl_iface_unix.c
1 /*
2  * WPA Supplicant / UNIX domain socket -based control interface
3  * Copyright (c) 2004-2005, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "includes.h"
16 #include <sys/un.h>
17 #include <sys/stat.h>
18 #include <grp.h>
19 #include <stddef.h>
20
21 #include "common.h"
22 #include "eloop.h"
23 #include "config.h"
24 #include "eapol_supp/eapol_supp_sm.h"
25 #include "wpa_supplicant_i.h"
26 #include "ctrl_iface.h"
27
28 /* Per-interface ctrl_iface */
29
30 /**
31  * struct wpa_ctrl_dst - Internal data structure of control interface monitors
32  *
33  * This structure is used to store information about registered control
34  * interface monitors into struct wpa_supplicant. This data is private to
35  * ctrl_iface_unix.c and should not be touched directly from other files.
36  */
37 struct wpa_ctrl_dst {
38         struct wpa_ctrl_dst *next;
39         struct sockaddr_un addr;
40         socklen_t addrlen;
41         int debug_level;
42         int errors;
43 };
44
45
46 struct ctrl_iface_priv {
47         struct wpa_supplicant *wpa_s;
48         int sock;
49         struct wpa_ctrl_dst *ctrl_dst;
50 };
51
52
53 static void wpa_supplicant_ctrl_iface_send(struct ctrl_iface_priv *priv,
54                                            int level, const char *buf,
55                                            size_t len);
56
57
58 static int wpa_supplicant_ctrl_iface_attach(struct ctrl_iface_priv *priv,
59                                             struct sockaddr_un *from,
60                                             socklen_t fromlen)
61 {
62         struct wpa_ctrl_dst *dst;
63
64         dst = os_zalloc(sizeof(*dst));
65         if (dst == NULL)
66                 return -1;
67         os_memcpy(&dst->addr, from, sizeof(struct sockaddr_un));
68         dst->addrlen = fromlen;
69         dst->debug_level = MSG_INFO;
70         dst->next = priv->ctrl_dst;
71         priv->ctrl_dst = dst;
72         wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
73                     (u8 *) from->sun_path,
74                     fromlen - offsetof(struct sockaddr_un, sun_path));
75         return 0;
76 }
77
78
79 static int wpa_supplicant_ctrl_iface_detach(struct ctrl_iface_priv *priv,
80                                             struct sockaddr_un *from,
81                                             socklen_t fromlen)
82 {
83         struct wpa_ctrl_dst *dst, *prev = NULL;
84
85         dst = priv->ctrl_dst;
86         while (dst) {
87                 if (fromlen == dst->addrlen &&
88                     os_memcmp(from->sun_path, dst->addr.sun_path,
89                               fromlen - offsetof(struct sockaddr_un, sun_path))
90                     == 0) {
91                         if (prev == NULL)
92                                 priv->ctrl_dst = dst->next;
93                         else
94                                 prev->next = dst->next;
95                         os_free(dst);
96                         wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
97                                     (u8 *) from->sun_path,
98                                     fromlen -
99                                     offsetof(struct sockaddr_un, sun_path));
100                         return 0;
101                 }
102                 prev = dst;
103                 dst = dst->next;
104         }
105         return -1;
106 }
107
108
109 static int wpa_supplicant_ctrl_iface_level(struct ctrl_iface_priv *priv,
110                                            struct sockaddr_un *from,
111                                            socklen_t fromlen,
112                                            char *level)
113 {
114         struct wpa_ctrl_dst *dst;
115
116         wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
117
118         dst = priv->ctrl_dst;
119         while (dst) {
120                 if (fromlen == dst->addrlen &&
121                     os_memcmp(from->sun_path, dst->addr.sun_path,
122                               fromlen - offsetof(struct sockaddr_un, sun_path))
123                     == 0) {
124                         wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
125                                     "level", (u8 *) from->sun_path,
126                                     fromlen -
127                                     offsetof(struct sockaddr_un, sun_path));
128                         dst->debug_level = atoi(level);
129                         return 0;
130                 }
131                 dst = dst->next;
132         }
133
134         return -1;
135 }
136
137
138 static void wpa_supplicant_ctrl_iface_receive(int sock, void *eloop_ctx,
139                                               void *sock_ctx)
140 {
141         struct wpa_supplicant *wpa_s = eloop_ctx;
142         struct ctrl_iface_priv *priv = sock_ctx;
143         char buf[256];
144         int res;
145         struct sockaddr_un from;
146         socklen_t fromlen = sizeof(from);
147         char *reply = NULL;
148         size_t reply_len = 0;
149         int new_attached = 0;
150
151         res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
152                        (struct sockaddr *) &from, &fromlen);
153         if (res < 0) {
154                 perror("recvfrom(ctrl_iface)");
155                 return;
156         }
157         buf[res] = '\0';
158
159         if (os_strcmp(buf, "ATTACH") == 0) {
160                 if (wpa_supplicant_ctrl_iface_attach(priv, &from, fromlen))
161                         reply_len = 1;
162                 else {
163                         new_attached = 1;
164                         reply_len = 2;
165                 }
166         } else if (os_strcmp(buf, "DETACH") == 0) {
167                 if (wpa_supplicant_ctrl_iface_detach(priv, &from, fromlen))
168                         reply_len = 1;
169                 else
170                         reply_len = 2;
171         } else if (os_strncmp(buf, "LEVEL ", 6) == 0) {
172                 if (wpa_supplicant_ctrl_iface_level(priv, &from, fromlen,
173                                                     buf + 6))
174                         reply_len = 1;
175                 else
176                         reply_len = 2;
177         } else {
178                 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf,
179                                                           &reply_len);
180         }
181
182         if (reply) {
183                 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from,
184                        fromlen);
185                 os_free(reply);
186         } else if (reply_len == 1) {
187                 sendto(sock, "FAIL\n", 5, 0, (struct sockaddr *) &from,
188                        fromlen);
189         } else if (reply_len == 2) {
190                 sendto(sock, "OK\n", 3, 0, (struct sockaddr *) &from,
191                        fromlen);
192         }
193
194         if (new_attached)
195                 eapol_sm_notify_ctrl_attached(wpa_s->eapol);
196 }
197
198
199 static char * wpa_supplicant_ctrl_iface_path(struct wpa_supplicant *wpa_s)
200 {
201         char *buf;
202         size_t len;
203         char *pbuf, *dir = NULL, *gid_str = NULL;
204         int res;
205
206         if (wpa_s->conf->ctrl_interface == NULL)
207                 return NULL;
208
209         pbuf = os_strdup(wpa_s->conf->ctrl_interface);
210         if (pbuf == NULL)
211                 return NULL;
212         if (os_strncmp(pbuf, "DIR=", 4) == 0) {
213                 dir = pbuf + 4;
214                 gid_str = os_strstr(dir, " GROUP=");
215                 if (gid_str) {
216                         *gid_str = '\0';
217                         gid_str += 7;
218                 }
219         } else
220                 dir = pbuf;
221
222         len = os_strlen(dir) + os_strlen(wpa_s->ifname) + 2;
223         buf = os_malloc(len);
224         if (buf == NULL) {
225                 os_free(pbuf);
226                 return NULL;
227         }
228
229         res = os_snprintf(buf, len, "%s/%s", dir, wpa_s->ifname);
230         if (res < 0 || (size_t) res >= len) {
231                 os_free(pbuf);
232                 os_free(buf);
233                 return NULL;
234         }
235 #ifdef __CYGWIN__
236         {
237                 /* Windows/WinPcap uses interface names that are not suitable
238                  * as a file name - convert invalid chars to underscores */
239                 char *pos = buf;
240                 while (*pos) {
241                         if (*pos == '\\')
242                                 *pos = '_';
243                         pos++;
244                 }
245         }
246 #endif /* __CYGWIN__ */
247         os_free(pbuf);
248         return buf;
249 }
250
251
252 static void wpa_supplicant_ctrl_iface_msg_cb(void *ctx, int level,
253                                              const char *txt, size_t len)
254 {
255         struct wpa_supplicant *wpa_s = ctx;
256         if (wpa_s == NULL || wpa_s->ctrl_iface == NULL)
257                 return;
258         wpa_supplicant_ctrl_iface_send(wpa_s->ctrl_iface, level, txt, len);
259 }
260
261
262 struct ctrl_iface_priv *
263 wpa_supplicant_ctrl_iface_init(struct wpa_supplicant *wpa_s)
264 {
265         struct ctrl_iface_priv *priv;
266         struct sockaddr_un addr;
267         char *fname = NULL;
268         gid_t gid = 0;
269         int gid_set = 0;
270         char *buf, *dir = NULL, *gid_str = NULL;
271         struct group *grp;
272         char *endp;
273
274         priv = os_zalloc(sizeof(*priv));
275         if (priv == NULL)
276                 return NULL;
277         priv->wpa_s = wpa_s;
278         priv->sock = -1;
279
280         if (wpa_s->conf->ctrl_interface == NULL)
281                 return priv;
282
283         buf = os_strdup(wpa_s->conf->ctrl_interface);
284         if (buf == NULL)
285                 goto fail;
286         if (os_strncmp(buf, "DIR=", 4) == 0) {
287                 dir = buf + 4;
288                 gid_str = os_strstr(dir, " GROUP=");
289                 if (gid_str) {
290                         *gid_str = '\0';
291                         gid_str += 7;
292                 }
293         } else {
294                 dir = buf;
295                 gid_str = wpa_s->conf->ctrl_interface_group;
296         }
297
298         if (mkdir(dir, S_IRWXU | S_IRWXG) < 0) {
299                 if (errno == EEXIST) {
300                         wpa_printf(MSG_DEBUG, "Using existing control "
301                                    "interface directory.");
302                 } else {
303                         perror("mkdir[ctrl_interface]");
304                         goto fail;
305                 }
306         }
307
308         if (gid_str) {
309                 grp = getgrnam(gid_str);
310                 if (grp) {
311                         gid = grp->gr_gid;
312                         gid_set = 1;
313                         wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
314                                    " (from group name '%s')",
315                                    (int) gid, gid_str);
316                 } else {
317                         /* Group name not found - try to parse this as gid */
318                         gid = strtol(gid_str, &endp, 10);
319                         if (*gid_str == '\0' || *endp != '\0') {
320                                 wpa_printf(MSG_ERROR, "CTRL: Invalid group "
321                                            "'%s'", gid_str);
322                                 goto fail;
323                         }
324                         gid_set = 1;
325                         wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d",
326                                    (int) gid);
327                 }
328         }
329
330         if (gid_set && chown(dir, -1, gid) < 0) {
331                 perror("chown[ctrl_interface]");
332                 goto fail;
333         }
334
335         /* Make sure the group can enter and read the directory */
336         if (gid_set &&
337             chmod(dir, S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP) < 0) {
338                 wpa_printf(MSG_ERROR, "CTRL: chmod[ctrl_interface]: %s",
339                            strerror(errno));
340                 goto fail;
341         }
342
343         if (os_strlen(dir) + 1 + os_strlen(wpa_s->ifname) >=
344             sizeof(addr.sun_path)) {
345                 wpa_printf(MSG_ERROR, "ctrl_iface path limit exceeded");
346                 goto fail;
347         }
348
349         priv->sock = socket(PF_UNIX, SOCK_DGRAM, 0);
350         if (priv->sock < 0) {
351                 perror("socket(PF_UNIX)");
352                 goto fail;
353         }
354
355         os_memset(&addr, 0, sizeof(addr));
356 #ifdef __FreeBSD__
357         addr.sun_len = sizeof(addr);
358 #endif /* __FreeBSD__ */
359         addr.sun_family = AF_UNIX;
360         fname = wpa_supplicant_ctrl_iface_path(wpa_s);
361         if (fname == NULL)
362                 goto fail;
363         os_strlcpy(addr.sun_path, fname, sizeof(addr.sun_path));
364         if (bind(priv->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
365                 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
366                            strerror(errno));
367                 if (connect(priv->sock, (struct sockaddr *) &addr,
368                             sizeof(addr)) < 0) {
369                         wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
370                                    " allow connections - assuming it was left"
371                                    "over from forced program termination");
372                         if (unlink(fname) < 0) {
373                                 perror("unlink[ctrl_iface]");
374                                 wpa_printf(MSG_ERROR, "Could not unlink "
375                                            "existing ctrl_iface socket '%s'",
376                                            fname);
377                                 goto fail;
378                         }
379                         if (bind(priv->sock, (struct sockaddr *) &addr,
380                                  sizeof(addr)) < 0) {
381                                 perror("bind(PF_UNIX)");
382                                 goto fail;
383                         }
384                         wpa_printf(MSG_DEBUG, "Successfully replaced leftover "
385                                    "ctrl_iface socket '%s'", fname);
386                 } else {
387                         wpa_printf(MSG_INFO, "ctrl_iface exists and seems to "
388                                    "be in use - cannot override it");
389                         wpa_printf(MSG_INFO, "Delete '%s' manually if it is "
390                                    "not used anymore", fname);
391                         os_free(fname);
392                         fname = NULL;
393                         goto fail;
394                 }
395         }
396
397         if (gid_set && chown(fname, -1, gid) < 0) {
398                 perror("chown[ctrl_interface/ifname]");
399                 goto fail;
400         }
401
402         if (chmod(fname, S_IRWXU | S_IRWXG) < 0) {
403                 perror("chmod[ctrl_interface/ifname]");
404                 goto fail;
405         }
406         os_free(fname);
407
408         eloop_register_read_sock(priv->sock, wpa_supplicant_ctrl_iface_receive,
409                                  wpa_s, priv);
410         wpa_msg_register_cb(wpa_supplicant_ctrl_iface_msg_cb);
411
412         os_free(buf);
413         return priv;
414
415 fail:
416         if (priv->sock >= 0)
417                 close(priv->sock);
418         os_free(priv);
419         if (fname) {
420                 unlink(fname);
421                 os_free(fname);
422         }
423         os_free(buf);
424         return NULL;
425 }
426
427
428 void wpa_supplicant_ctrl_iface_deinit(struct ctrl_iface_priv *priv)
429 {
430         struct wpa_ctrl_dst *dst, *prev;
431
432         if (priv->sock > -1) {
433                 char *fname;
434                 char *buf, *dir = NULL, *gid_str = NULL;
435                 eloop_unregister_read_sock(priv->sock);
436                 if (priv->ctrl_dst) {
437                         /*
438                          * Wait a second before closing the control socket if
439                          * there are any attached monitors in order to allow
440                          * them to receive any pending messages.
441                          */
442                         wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
443                                    "monitors to receive messages");
444                         os_sleep(1, 0);
445                 }
446                 close(priv->sock);
447                 priv->sock = -1;
448                 fname = wpa_supplicant_ctrl_iface_path(priv->wpa_s);
449                 if (fname) {
450                         unlink(fname);
451                         os_free(fname);
452                 }
453
454                 buf = os_strdup(priv->wpa_s->conf->ctrl_interface);
455                 if (buf == NULL)
456                         goto free_dst;
457                 if (os_strncmp(buf, "DIR=", 4) == 0) {
458                         dir = buf + 4;
459                         gid_str = os_strstr(dir, " GROUP=");
460                         if (gid_str) {
461                                 *gid_str = '\0';
462                                 gid_str += 7;
463                         }
464                 } else
465                         dir = buf;
466
467                 if (rmdir(dir) < 0) {
468                         if (errno == ENOTEMPTY) {
469                                 wpa_printf(MSG_DEBUG, "Control interface "
470                                            "directory not empty - leaving it "
471                                            "behind");
472                         } else {
473                                 perror("rmdir[ctrl_interface]");
474                         }
475                 }
476                 os_free(buf);
477         }
478
479 free_dst:
480         dst = priv->ctrl_dst;
481         while (dst) {
482                 prev = dst;
483                 dst = dst->next;
484                 os_free(prev);
485         }
486         os_free(priv);
487 }
488
489
490 /**
491  * wpa_supplicant_ctrl_iface_send - Send a control interface packet to monitors
492  * @priv: Pointer to private data from wpa_supplicant_ctrl_iface_init()
493  * @level: Priority level of the message
494  * @buf: Message data
495  * @len: Message length
496  *
497  * Send a packet to all monitor programs attached to the control interface.
498  */
499 static void wpa_supplicant_ctrl_iface_send(struct ctrl_iface_priv *priv,
500                                            int level, const char *buf,
501                                            size_t len)
502 {
503         struct wpa_ctrl_dst *dst, *next;
504         char levelstr[10];
505         int idx, res;
506         struct msghdr msg;
507         struct iovec io[2];
508
509         dst = priv->ctrl_dst;
510         if (priv->sock < 0 || dst == NULL)
511                 return;
512
513         res = os_snprintf(levelstr, sizeof(levelstr), "<%d>", level);
514         if (res < 0 || (size_t) res >= sizeof(levelstr))
515                 return;
516         io[0].iov_base = levelstr;
517         io[0].iov_len = os_strlen(levelstr);
518         io[1].iov_base = (char *) buf;
519         io[1].iov_len = len;
520         os_memset(&msg, 0, sizeof(msg));
521         msg.msg_iov = io;
522         msg.msg_iovlen = 2;
523
524         idx = 0;
525         while (dst) {
526                 next = dst->next;
527                 if (level >= dst->debug_level) {
528                         wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor send",
529                                     (u8 *) dst->addr.sun_path, dst->addrlen -
530                                     offsetof(struct sockaddr_un, sun_path));
531                         msg.msg_name = (void *) &dst->addr;
532                         msg.msg_namelen = dst->addrlen;
533                         if (sendmsg(priv->sock, &msg, 0) < 0) {
534                                 int _errno = errno;
535                                 wpa_printf(MSG_INFO, "CTRL_IFACE monitor[%d]: "
536                                            "%d - %s",
537                                            idx, errno, strerror(errno));
538                                 dst->errors++;
539                                 if (dst->errors > 10 || _errno == ENOENT) {
540                                         wpa_supplicant_ctrl_iface_detach(
541                                                 priv, &dst->addr,
542                                                 dst->addrlen);
543                                 }
544                         } else
545                                 dst->errors = 0;
546                 }
547                 idx++;
548                 dst = next;
549         }
550 }
551
552
553 void wpa_supplicant_ctrl_iface_wait(struct ctrl_iface_priv *priv)
554 {
555         char buf[256];
556         int res;
557         struct sockaddr_un from;
558         socklen_t fromlen = sizeof(from);
559
560         for (;;) {
561                 wpa_printf(MSG_DEBUG, "CTRL_IFACE - %s - wait for monitor to "
562                            "attach", priv->wpa_s->ifname);
563                 eloop_wait_for_read_sock(priv->sock);
564
565                 res = recvfrom(priv->sock, buf, sizeof(buf) - 1, 0,
566                                (struct sockaddr *) &from, &fromlen);
567                 if (res < 0) {
568                         perror("recvfrom(ctrl_iface)");
569                         continue;
570                 }
571                 buf[res] = '\0';
572
573                 if (os_strcmp(buf, "ATTACH") == 0) {
574                         /* handle ATTACH signal of first monitor interface */
575                         if (!wpa_supplicant_ctrl_iface_attach(priv, &from,
576                                                               fromlen)) {
577                                 sendto(priv->sock, "OK\n", 3, 0,
578                                        (struct sockaddr *) &from, fromlen);
579                                 /* OK to continue */
580                                 return;
581                         } else {
582                                 sendto(priv->sock, "FAIL\n", 5, 0,
583                                        (struct sockaddr *) &from, fromlen);
584                         }
585                 } else {
586                         /* return FAIL for all other signals */
587                         sendto(priv->sock, "FAIL\n", 5, 0,
588                                (struct sockaddr *) &from, fromlen);
589                 }
590         }
591 }
592
593
594 /* Global ctrl_iface */
595
596 struct ctrl_iface_global_priv {
597         struct wpa_global *global;
598         int sock;
599 };
600
601
602 static void wpa_supplicant_global_ctrl_iface_receive(int sock, void *eloop_ctx,
603                                                      void *sock_ctx)
604 {
605         struct wpa_global *global = eloop_ctx;
606         char buf[256];
607         int res;
608         struct sockaddr_un from;
609         socklen_t fromlen = sizeof(from);
610         char *reply;
611         size_t reply_len;
612
613         res = recvfrom(sock, buf, sizeof(buf) - 1, 0,
614                        (struct sockaddr *) &from, &fromlen);
615         if (res < 0) {
616                 perror("recvfrom(ctrl_iface)");
617                 return;
618         }
619         buf[res] = '\0';
620
621         reply = wpa_supplicant_global_ctrl_iface_process(global, buf,
622                                                          &reply_len);
623
624         if (reply) {
625                 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from,
626                        fromlen);
627                 os_free(reply);
628         } else if (reply_len) {
629                 sendto(sock, "FAIL\n", 5, 0, (struct sockaddr *) &from,
630                        fromlen);
631         }
632 }
633
634
635 struct ctrl_iface_global_priv *
636 wpa_supplicant_global_ctrl_iface_init(struct wpa_global *global)
637 {
638         struct ctrl_iface_global_priv *priv;
639         struct sockaddr_un addr;
640
641         priv = os_zalloc(sizeof(*priv));
642         if (priv == NULL)
643                 return NULL;
644         priv->global = global;
645         priv->sock = -1;
646
647         if (global->params.ctrl_interface == NULL)
648                 return priv;
649
650         wpa_printf(MSG_DEBUG, "Global control interface '%s'",
651                    global->params.ctrl_interface);
652
653         priv->sock = socket(PF_UNIX, SOCK_DGRAM, 0);
654         if (priv->sock < 0) {
655                 perror("socket(PF_UNIX)");
656                 goto fail;
657         }
658
659         os_memset(&addr, 0, sizeof(addr));
660 #ifdef __FreeBSD__
661         addr.sun_len = sizeof(addr);
662 #endif /* __FreeBSD__ */
663         addr.sun_family = AF_UNIX;
664         os_strlcpy(addr.sun_path, global->params.ctrl_interface,
665                    sizeof(addr.sun_path));
666         if (bind(priv->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
667                 perror("bind(PF_UNIX)");
668                 if (connect(priv->sock, (struct sockaddr *) &addr,
669                             sizeof(addr)) < 0) {
670                         wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
671                                    " allow connections - assuming it was left"
672                                    "over from forced program termination");
673                         if (unlink(global->params.ctrl_interface) < 0) {
674                                 perror("unlink[ctrl_iface]");
675                                 wpa_printf(MSG_ERROR, "Could not unlink "
676                                            "existing ctrl_iface socket '%s'",
677                                            global->params.ctrl_interface);
678                                 goto fail;
679                         }
680                         if (bind(priv->sock, (struct sockaddr *) &addr,
681                                  sizeof(addr)) < 0) {
682                                 perror("bind(PF_UNIX)");
683                                 goto fail;
684                         }
685                         wpa_printf(MSG_DEBUG, "Successfully replaced leftover "
686                                    "ctrl_iface socket '%s'",
687                                    global->params.ctrl_interface);
688                 } else {
689                         wpa_printf(MSG_INFO, "ctrl_iface exists and seems to "
690                                    "be in use - cannot override it");
691                         wpa_printf(MSG_INFO, "Delete '%s' manually if it is "
692                                    "not used anymore",
693                                    global->params.ctrl_interface);
694                         goto fail;
695                 }
696         }
697
698         eloop_register_read_sock(priv->sock,
699                                  wpa_supplicant_global_ctrl_iface_receive,
700                                  global, NULL);
701
702         return priv;
703
704 fail:
705         if (priv->sock >= 0)
706                 close(priv->sock);
707         os_free(priv);
708         return NULL;
709 }
710
711
712 void
713 wpa_supplicant_global_ctrl_iface_deinit(struct ctrl_iface_global_priv *priv)
714 {
715         if (priv->sock >= 0) {
716                 eloop_unregister_read_sock(priv->sock);
717                 close(priv->sock);
718         }
719         if (priv->global->params.ctrl_interface)
720                 unlink(priv->global->params.ctrl_interface);
721         os_free(priv);
722 }