| /* |
| * Copyright (c) 2012-2014 The Linux Foundation. All rights reserved. |
| * |
| * Previously licensed under the ISC license by Qualcomm Atheros, Inc. |
| * |
| * |
| * Permission to use, copy, modify, and/or distribute this software for |
| * any purpose with or without fee is hereby granted, provided that the |
| * above copyright notice and this permission notice appear in all |
| * copies. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL |
| * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED |
| * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE |
| * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL |
| * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR |
| * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER |
| * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR |
| * PERFORMANCE OF THIS SOFTWARE. |
| */ |
| |
| /* |
| * This file was originally distributed by Qualcomm Atheros, Inc. |
| * under proprietary terms before Copyright ownership was assigned |
| * to the Linux Foundation. |
| */ |
| |
| #include "palTypes.h" |
| #include "aniGlobal.h" |
| |
| #include "utilsApi.h" |
| #include "limTypes.h" |
| #include "limUtils.h" |
| #include "limAssocUtils.h" |
| #include "limSecurityUtils.h" |
| #include "limSerDesUtils.h" |
| #include "schApi.h" |
| #include "limSendMessages.h" |
| |
| |
| |
| /** |
| * limProcessDeauthFrame |
| * |
| *FUNCTION: |
| * This function is called by limProcessMessageQueue() upon |
| * Deauthentication frame reception. |
| * |
| *LOGIC: |
| * |
| *ASSUMPTIONS: |
| * |
| *NOTE: |
| * |
| * @param pMac - Pointer to Global MAC structure |
| * @param *pRxPacketInfo - A pointer to Buffer descriptor + associated PDUs |
| * @return None |
| */ |
| |
| void |
| limProcessDeauthFrame(tpAniSirGlobal pMac, tANI_U8 *pRxPacketInfo, tpPESession psessionEntry) |
| { |
| tANI_U8 *pBody; |
| tANI_U16 aid, reasonCode; |
| tpSirMacMgmtHdr pHdr; |
| tLimMlmAssocCnf mlmAssocCnf; |
| tLimMlmDeauthInd mlmDeauthInd; |
| tpDphHashNode pStaDs; |
| tpPESession pRoamSessionEntry=NULL; |
| tANI_U8 roamSessionId; |
| #ifdef WLAN_FEATURE_11W |
| tANI_U32 frameLen; |
| #endif |
| |
| |
| pHdr = WDA_GET_RX_MAC_HEADER(pRxPacketInfo); |
| |
| pBody = WDA_GET_RX_MPDU_DATA(pRxPacketInfo); |
| |
| |
| if ((eLIM_STA_ROLE == psessionEntry->limSystemRole) && (eLIM_SME_WT_DEAUTH_STATE == psessionEntry->limSmeState)) |
| { |
| /*Every 15th deauth frame will be logged in kmsg*/ |
| if(!(pMac->lim.deauthMsgCnt & 0xF)) |
| { |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame in DEAUTH_WT_STATE" |
| "(already processing previously received DEAUTH frame).." |
| "Dropping this.. Deauth Failed %d"),++pMac->lim.deauthMsgCnt);) |
| } |
| else |
| { |
| pMac->lim.deauthMsgCnt++; |
| } |
| return; |
| } |
| |
| if (limIsGroupAddr(pHdr->sa)) |
| { |
| // Received Deauth frame from a BC/MC address |
| // Log error and ignore it |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame from a BC/MC address"));) |
| |
| return; |
| } |
| |
| if (limIsGroupAddr(pHdr->da) && !limIsAddrBC(pHdr->da)) |
| { |
| // Received Deauth frame for a MC address |
| // Log error and ignore it |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame for a MC address"));) |
| |
| return; |
| } |
| |
| #ifdef WLAN_FEATURE_11W |
| /* PMF: If this session is a PMF session, then ensure that this frame was protected */ |
| if(psessionEntry->limRmfEnabled && (WDA_GET_RX_DPU_FEEDBACK(pRxPacketInfo) & DPU_FEEDBACK_UNPROTECTED_ERROR)) |
| { |
| PELOGE(limLog(pMac, LOGE, FL("received an unprotected deauth from AP"));) |
| // If the frame received is unprotected, forward it to the supplicant to initiate |
| // an SA query |
| frameLen = WDA_GET_RX_PAYLOAD_LEN(pRxPacketInfo); |
| |
| //send the unprotected frame indication to SME |
| limSendSmeUnprotectedMgmtFrameInd( pMac, pHdr->fc.subType, |
| (tANI_U8*)pHdr, (frameLen + sizeof(tSirMacMgmtHdr)), |
| psessionEntry->smeSessionId, psessionEntry); |
| return; |
| } |
| #endif |
| |
| // Get reasonCode from Deauthentication frame body |
| reasonCode = sirReadU16(pBody); |
| |
| PELOGE(limLog(pMac, LOGE, |
| FL("Received Deauth frame for Addr: "MAC_ADDRESS_STR" (mlm state = %s," |
| " sme state = %d systemrole = %d) with reason code %d from " |
| MAC_ADDRESS_STR), MAC_ADDR_ARRAY(pHdr->da), |
| limMlmStateStr(psessionEntry->limMlmState), psessionEntry->limSmeState, |
| psessionEntry->limSystemRole, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa));) |
| |
| if (limCheckDisassocDeauthAckPending(pMac, (tANI_U8*)pHdr->sa)) |
| { |
| PELOGE(limLog(pMac, LOGE, |
| FL("Ignore the Deauth received, while waiting for ack of " |
| "disassoc/deauth"));) |
| limCleanUpDisassocDeauthReq(pMac,(tANI_U8*)pHdr->sa, 1); |
| return; |
| } |
| |
| |
| if ( (psessionEntry->limSystemRole == eLIM_AP_ROLE )||(psessionEntry->limSystemRole == eLIM_BT_AMP_AP_ROLE) ) |
| { |
| switch (reasonCode) |
| { |
| case eSIR_MAC_UNSPEC_FAILURE_REASON: |
| case eSIR_MAC_DEAUTH_LEAVING_BSS_REASON: |
| // Valid reasonCode in received Deauthentication frame |
| break; |
| |
| default: |
| // Invalid reasonCode in received Deauthentication frame |
| // Log error and ignore the frame |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame with invalid reasonCode %d from " |
| MAC_ADDRESS_STR), reasonCode, MAC_ADDR_ARRAY(pHdr->sa));) |
| |
| break; |
| } |
| } |
| else if (psessionEntry->limSystemRole == eLIM_STA_ROLE ||psessionEntry->limSystemRole == eLIM_BT_AMP_STA_ROLE) |
| { |
| switch (reasonCode) |
| { |
| case eSIR_MAC_UNSPEC_FAILURE_REASON: |
| case eSIR_MAC_PREV_AUTH_NOT_VALID_REASON: |
| case eSIR_MAC_DEAUTH_LEAVING_BSS_REASON: |
| case eSIR_MAC_CLASS2_FRAME_FROM_NON_AUTH_STA_REASON: |
| case eSIR_MAC_CLASS3_FRAME_FROM_NON_ASSOC_STA_REASON: |
| case eSIR_MAC_STA_NOT_PRE_AUTHENTICATED_REASON: |
| // Valid reasonCode in received Deauth frame |
| break; |
| |
| default: |
| // Invalid reasonCode in received Deauth frame |
| // Log error and ignore the frame |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame with invalid reasonCode %d from " |
| MAC_ADDRESS_STR), reasonCode, MAC_ADDR_ARRAY(pHdr->sa));) |
| |
| break; |
| } |
| } |
| else |
| { |
| // Received Deauth frame in either IBSS |
| // or un-known role. Log and ignore it |
| limLog(pMac, LOGE, |
| FL("received Deauth frame with reasonCode %d in role %d from " |
| MAC_ADDRESS_STR),reasonCode, psessionEntry->limSystemRole, |
| MAC_ADDR_ARRAY(pHdr->sa)); |
| |
| return; |
| } |
| |
| /** If we are in the middle of ReAssoc, a few things could happen: |
| * - STA is reassociating to current AP, and receives deauth from: |
| * a) current AP |
| * b) other AP |
| * - STA is reassociating to a new AP, and receives deauth from: |
| * c) current AP |
| * d) reassoc AP |
| * e) other AP |
| * |
| * The logic is: |
| * 1) If rcv deauth from an AP other than the one we're trying to |
| * reassociate with, then drop the deauth frame (case b, c, e) |
| * 2) If rcv deauth from the "new" reassoc AP (case d), then restore |
| * context with previous AP and send SME_REASSOC_RSP failure. |
| * 3) If rcv deauth from the reassoc AP, which is also the same |
| * AP we're currently associated with (case a), then proceed |
| * with normal deauth processing. |
| */ |
| if ( psessionEntry->limReAssocbssId!=NULL ) |
| { |
| pRoamSessionEntry = peFindSessionByBssid(pMac, psessionEntry->limReAssocbssId, &roamSessionId); |
| } |
| if (limIsReassocInProgress(pMac,psessionEntry) || limIsReassocInProgress(pMac,pRoamSessionEntry)) { |
| if (!IS_REASSOC_BSSID(pMac,pHdr->sa,psessionEntry)) { |
| PELOGE(limLog(pMac, LOGE, FL("Rcv Deauth from unknown/different " |
| "AP while ReAssoc. Ignore "MAC_ADDRESS_STR),MAC_ADDR_ARRAY(pHdr->sa));) |
| PELOGE(limLog(pMac, LOGE, FL(" limReAssocbssId : "MAC_ADDRESS_STR), |
| MAC_ADDR_ARRAY(psessionEntry->limReAssocbssId));) |
| return; |
| } |
| |
| /** Received deauth from the new AP to which we tried to ReAssociate. |
| * Drop ReAssoc and Restore the Previous context( current connected AP). |
| */ |
| if (!IS_CURRENT_BSSID(pMac, pHdr->sa,psessionEntry)) { |
| PELOGE(limLog(pMac, LOGE, FL("received DeAuth from the New AP to " |
| "which ReAssoc is sent "MAC_ADDRESS_STR),MAC_ADDR_ARRAY(pHdr->sa));) |
| PELOGE(limLog(pMac, LOGE, FL(" psessionEntry->bssId: "MAC_ADDRESS_STR), |
| MAC_ADDR_ARRAY(psessionEntry->bssId));) |
| limRestorePreReassocState(pMac, |
| eSIR_SME_REASSOC_REFUSED, reasonCode,psessionEntry); |
| return; |
| } |
| } |
| |
| |
| /* If received DeAuth from AP other than the one we're trying to join with |
| * nor associated with, then ignore deauth and delete Pre-auth entry. |
| */ |
| if(psessionEntry->limSystemRole != eLIM_AP_ROLE ){ |
| if (!IS_CURRENT_BSSID(pMac, pHdr->bssId, psessionEntry)) |
| { |
| PELOGE(limLog(pMac, LOGE, FL("received DeAuth from an AP other " |
| "than we're trying to join. Ignore. "MAC_ADDRESS_STR), |
| MAC_ADDR_ARRAY(pHdr->sa));) |
| if (limSearchPreAuthList(pMac, pHdr->sa)) |
| { |
| limLog(pMac, LOG1, FL("Preauth entry exist. " |
| "Deleting... ")); |
| limDeletePreAuthNode(pMac, pHdr->sa); |
| } |
| return; |
| } |
| } |
| |
| pStaDs = dphLookupHashEntry(pMac, pHdr->sa, &aid, &psessionEntry->dph.dphHashTable); |
| |
| // Check for pre-assoc states |
| switch (psessionEntry->limSystemRole) |
| { |
| case eLIM_STA_ROLE: |
| case eLIM_BT_AMP_STA_ROLE: |
| switch (psessionEntry->limMlmState) |
| { |
| case eLIM_MLM_WT_AUTH_FRAME2_STATE: |
| /** |
| * AP sent Deauth frame while waiting |
| * for Auth frame2. Report Auth failure |
| * to SME. |
| */ |
| |
| // Log error |
| limLog(pMac, LOG1, |
| FL("received Deauth frame state %d with failure " |
| "code %d from "MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa)); |
| |
| limRestoreFromAuthState(pMac, eSIR_SME_DEAUTH_WHILE_JOIN, |
| reasonCode,psessionEntry); |
| |
| return; |
| |
| case eLIM_MLM_AUTHENTICATED_STATE: |
| limLog(pMac, LOG1, |
| FL("received Deauth frame state %d with " |
| "reasonCode=%d from "MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa)); |
| /// Issue Deauth Indication to SME. |
| vos_mem_copy((tANI_U8 *) &mlmDeauthInd.peerMacAddr, |
| pHdr->sa, |
| sizeof(tSirMacAddr)); |
| mlmDeauthInd.reasonCode = reasonCode; |
| |
| psessionEntry->limMlmState = eLIM_MLM_IDLE_STATE; |
| MTRACE(macTrace(pMac, TRACE_CODE_MLM_STATE, psessionEntry->peSessionId, psessionEntry->limMlmState)); |
| |
| |
| limPostSmeMessage(pMac, |
| LIM_MLM_DEAUTH_IND, |
| (tANI_U32 *) &mlmDeauthInd); |
| return; |
| |
| case eLIM_MLM_WT_ASSOC_RSP_STATE: |
| /** |
| * AP may have 'aged-out' our Pre-auth |
| * context. Delete local pre-auth context |
| * if any and issue ASSOC_CNF to SME. |
| */ |
| limLog(pMac, LOG1, |
| FL("received Deauth frame state %d with " |
| "reasonCode=%d from "MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa)); |
| if (limSearchPreAuthList(pMac, pHdr->sa)) |
| limDeletePreAuthNode(pMac, pHdr->sa); |
| |
| if (psessionEntry->pLimMlmJoinReq) |
| { |
| vos_mem_free(psessionEntry->pLimMlmJoinReq); |
| psessionEntry->pLimMlmJoinReq = NULL; |
| } |
| |
| mlmAssocCnf.resultCode = eSIR_SME_DEAUTH_WHILE_JOIN; |
| mlmAssocCnf.protStatusCode = reasonCode; |
| |
| /* PE session Id*/ |
| mlmAssocCnf.sessionId = psessionEntry->peSessionId; |
| |
| psessionEntry->limMlmState = |
| psessionEntry->limPrevMlmState; |
| MTRACE(macTrace(pMac, TRACE_CODE_MLM_STATE, psessionEntry->peSessionId, psessionEntry->limMlmState)); |
| |
| // Deactive Association response timeout |
| limDeactivateAndChangeTimer( |
| pMac, |
| eLIM_ASSOC_FAIL_TIMER); |
| |
| limPostSmeMessage( |
| pMac, |
| LIM_MLM_ASSOC_CNF, |
| (tANI_U32 *) &mlmAssocCnf); |
| |
| return; |
| |
| case eLIM_MLM_WT_ADD_STA_RSP_STATE: |
| psessionEntry->fDeauthReceived = true; |
| PELOGW(limLog(pMac, LOGW, |
| FL("Received Deauth frame in state %d with Reason " |
| "Code %d from Peer"MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa));) |
| return ; |
| |
| case eLIM_MLM_IDLE_STATE: |
| case eLIM_MLM_LINK_ESTABLISHED_STATE: |
| #ifdef FEATURE_WLAN_TDLS |
| if ((NULL != pStaDs) && (STA_ENTRY_TDLS_PEER == pStaDs->staType)) |
| { |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame in state %d with " |
| "reason code %d from Tdls peer" |
| MAC_ADDRESS_STR), |
| psessionEntry->limMlmState,reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa));) |
| limSendSmeTDLSDelStaInd(pMac, pStaDs, psessionEntry, |
| reasonCode); |
| return; |
| } |
| else |
| { |
| |
| limDeleteTDLSPeers(pMac, psessionEntry); |
| #endif |
| /** |
| * This could be Deauthentication frame from |
| * a BSS with which pre-authentication was |
| * performed. Delete Pre-auth entry if found. |
| */ |
| if (limSearchPreAuthList(pMac, pHdr->sa)) |
| limDeletePreAuthNode(pMac, pHdr->sa); |
| #ifdef FEATURE_WLAN_TDLS |
| } |
| #endif |
| break; |
| |
| case eLIM_MLM_WT_REASSOC_RSP_STATE: |
| limLog(pMac, LOGE, |
| FL("received Deauth frame state %d with " |
| "reasonCode=%d from "MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa)); |
| break; |
| |
| case eLIM_MLM_WT_FT_REASSOC_RSP_STATE: |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame in FT state %d with " |
| "reasonCode=%d from "MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa));) |
| break; |
| |
| default: |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame in state %d with " |
| "reasonCode=%d from "MAC_ADDRESS_STR), |
| psessionEntry->limMlmState, reasonCode, |
| MAC_ADDR_ARRAY(pHdr->sa));) |
| return; |
| } |
| break; |
| |
| case eLIM_STA_IN_IBSS_ROLE: |
| break; |
| |
| case eLIM_AP_ROLE: |
| break; |
| |
| default: // eLIM_AP_ROLE or eLIM_BT_AMP_AP_ROLE |
| |
| |
| return; |
| } // end switch (pMac->lim.gLimSystemRole) |
| |
| |
| |
| /** |
| * Extract 'associated' context for STA, if any. |
| * This is maintained by DPH and created by LIM. |
| */ |
| if (NULL == pStaDs) |
| { |
| limLog(pMac, LOGE, FL("pStaDs is NULL")); |
| return; |
| } |
| |
| if ((pStaDs->mlmStaContext.mlmState == eLIM_MLM_WT_DEL_STA_RSP_STATE) || |
| (pStaDs->mlmStaContext.mlmState == eLIM_MLM_WT_DEL_BSS_RSP_STATE)) |
| { |
| /** |
| * Already in the process of deleting context for the peer |
| * and received Deauthentication frame. Log and Ignore. |
| */ |
| PELOGE(limLog(pMac, LOGE, |
| FL("received Deauth frame from peer that is in state %d, addr " |
| MAC_ADDRESS_STR), |
| pStaDs->mlmStaContext.mlmState,MAC_ADDR_ARRAY(pHdr->sa));) |
| return; |
| } |
| pStaDs->mlmStaContext.disassocReason = (tSirMacReasonCodes)reasonCode; |
| pStaDs->mlmStaContext.cleanupTrigger = eLIM_PEER_ENTITY_DEAUTH; |
| |
| /// Issue Deauth Indication to SME. |
| vos_mem_copy((tANI_U8 *) &mlmDeauthInd.peerMacAddr, |
| pStaDs->staAddr, |
| sizeof(tSirMacAddr)); |
| mlmDeauthInd.reasonCode = (tANI_U8) pStaDs->mlmStaContext.disassocReason; |
| mlmDeauthInd.deauthTrigger = eLIM_PEER_ENTITY_DEAUTH; |
| |
| |
| /* |
| * If we're in the middle of ReAssoc and received deauth from |
| * the ReAssoc AP, then notify SME by sending REASSOC_RSP with |
| * failure result code. SME will post the disconnect to the |
| * supplicant and the latter would start a fresh assoc. |
| */ |
| if (limIsReassocInProgress(pMac,psessionEntry)) { |
| /** |
| * AP may have 'aged-out' our Pre-auth |
| * context. Delete local pre-auth context |
| * if any and issue REASSOC_CNF to SME. |
| */ |
| if (limSearchPreAuthList(pMac, pHdr->sa)) |
| limDeletePreAuthNode(pMac, pHdr->sa); |
| |
| if (psessionEntry->limAssocResponseData) { |
| vos_mem_free(psessionEntry->limAssocResponseData); |
| psessionEntry->limAssocResponseData = NULL; |
| } |
| |
| PELOGE(limLog(pMac, LOGE, FL("Rcv Deauth from ReAssoc AP. " |
| "Issue REASSOC_CNF. "));) |
| /* |
| * TODO: Instead of overloading eSIR_SME_FT_REASSOC_TIMEOUT_FAILURE |
| * it would have been good to define/use a different failure type. |
| * Using eSIR_SME_FT_REASSOC_FAILURE does not seem to clean-up |
| * properly and we end up seeing "transmit queue timeout". |
| */ |
| limPostReassocFailure(pMac, eSIR_SME_FT_REASSOC_TIMEOUT_FAILURE, |
| eSIR_MAC_UNSPEC_FAILURE_STATUS, psessionEntry); |
| return; |
| } |
| /* reset the deauthMsgCnt here since we are able to Process |
| * the deauth frame and sending up the indication as well */ |
| if(pMac->lim.deauthMsgCnt != 0) |
| { |
| pMac->lim.deauthMsgCnt = 0; |
| } |
| /// Deauthentication from peer MAC entity |
| limPostSmeMessage(pMac, LIM_MLM_DEAUTH_IND, (tANI_U32 *) &mlmDeauthInd); |
| |
| // send eWNI_SME_DEAUTH_IND to SME |
| limSendSmeDeauthInd(pMac, pStaDs, psessionEntry); |
| return; |
| |
| } /*** end limProcessDeauthFrame() ***/ |
| |