blob: ba26a694cfe303acd2f2651e2dde66aeda887459 [file] [log] [blame]
/*
* Copyright (c) 2011-2016 The Linux Foundation. All rights reserved.
*
* Previously licensed under the ISC license by Qualcomm Atheros, Inc.
*
*
* Permission to use, copy, modify, and/or distribute this software for
* any purpose with or without fee is hereby granted, provided that the
* above copyright notice and this permission notice appear in all
* copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
* WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
* AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
* TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* PERFORMANCE OF THIS SOFTWARE.
*/
/*
* This file was originally distributed by Qualcomm Atheros, Inc.
* under proprietary terms before Copyright ownership was assigned
* to the Linux Foundation.
*/
/*
*
* This file lim_process_deauth_frame.cc contains the code
* for processing Deauthentication Frame.
* Author: Chandra Modumudi
* Date: 03/24/02
* History:-
* Date Modified by Modification Information
* --------------------------------------------------------------------
*
*/
#include "cds_api.h"
#include "ani_global.h"
#include "utils_api.h"
#include "lim_types.h"
#include "lim_utils.h"
#include "lim_assoc_utils.h"
#include "lim_security_utils.h"
#include "lim_ser_des_utils.h"
#include "sch_api.h"
#include "lim_send_messages.h"
/**
* lim_process_deauth_frame
*
***FUNCTION:
* This function is called by limProcessMessageQueue() upon
* Deauthentication frame reception.
*
***LOGIC:
*
***ASSUMPTIONS:
*
***NOTE:
*
* @param pMac - Pointer to Global MAC structure
* @param *pRxPacketInfo - A pointer to Buffer descriptor + associated PDUs
* @return None
*/
void
lim_process_deauth_frame(tpAniSirGlobal pMac, uint8_t *pRxPacketInfo,
tpPESession psessionEntry)
{
uint8_t *pBody;
uint16_t aid, reasonCode;
tpSirMacMgmtHdr pHdr;
tLimMlmAssocCnf mlmAssocCnf;
tLimMlmDeauthInd mlmDeauthInd;
tpDphHashNode pStaDs;
tpPESession pRoamSessionEntry = NULL;
uint8_t roamSessionId;
#ifdef WLAN_FEATURE_11W
uint32_t frameLen;
#endif
pHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
pBody = WMA_GET_RX_MPDU_DATA(pRxPacketInfo);
if (LIM_IS_STA_ROLE(psessionEntry) &&
((eLIM_SME_WT_DISASSOC_STATE == psessionEntry->limSmeState) ||
(eLIM_SME_WT_DEAUTH_STATE == psessionEntry->limSmeState))) {
/*Every 15th deauth frame will be logged in kmsg */
if (!(pMac->lim.deauthMsgCnt & 0xF)) {
PELOGE(lim_log(pMac, LOGE,
FL
("received Deauth frame in DEAUTH_WT_STATE"
"(already processing previously received DEAUTH frame).."
"Dropping this.. Deauth Failed %d"),
++pMac->lim.deauthMsgCnt);
)
} else {
pMac->lim.deauthMsgCnt++;
}
return;
}
if (lim_is_group_addr(pHdr->sa)) {
/* Received Deauth frame from a BC/MC address */
/* Log error and ignore it */
PELOGE(lim_log(pMac, LOGE,
FL("received Deauth frame from a BC/MC address"));
)
return;
}
if (lim_is_group_addr(pHdr->da) && !lim_is_addr_bc(pHdr->da)) {
/* Received Deauth frame for a MC address */
/* Log error and ignore it */
PELOGE(lim_log(pMac, LOGE,
FL("received Deauth frame for a MC address"));
)
return;
}
if (!lim_validate_received_frame_a1_addr(pMac,
pHdr->da, psessionEntry)) {
lim_log(pMac, LOGE,
FL("rx frame doesn't have valid a1 address, drop it"));
return;
}
#ifdef WLAN_FEATURE_11W
/* PMF: If this session is a PMF session, then ensure that this frame was protected */
if (psessionEntry->limRmfEnabled
&& (WMA_GET_RX_DPU_FEEDBACK(pRxPacketInfo) &
DPU_FEEDBACK_UNPROTECTED_ERROR)) {
PELOGE(lim_log
(pMac, LOGE,
FL("received an unprotected deauth from AP"));
)
/*
* When 11w offload is enabled then
* firmware should not fwd this frame
*/
if (LIM_IS_STA_ROLE(psessionEntry) && pMac->pmf_offload) {
lim_log(pMac, LOGE,
FL("11w offload is enable,unprotected deauth is not expected")
);
return;
}
/* If the frame received is unprotected, forward it to the supplicant to initiate */
/* an SA query */
frameLen = WMA_GET_RX_PAYLOAD_LEN(pRxPacketInfo);
/* send the unprotected frame indication to SME */
lim_send_sme_unprotected_mgmt_frame_ind(pMac, pHdr->fc.subType,
(uint8_t *) pHdr,
(frameLen +
sizeof(tSirMacMgmtHdr)),
psessionEntry->smeSessionId,
psessionEntry);
return;
}
#endif
/* Get reasonCode from Deauthentication frame body */
reasonCode = sir_read_u16(pBody);
PELOGE(lim_log(pMac, LOGE,
FL("Received Deauth frame for Addr: " MAC_ADDRESS_STR
" (mlm state = %s,"
" sme state = %d systemrole = %d) with reason code %d [%s] from "
MAC_ADDRESS_STR), MAC_ADDR_ARRAY(pHdr->da),
lim_mlm_state_str(psessionEntry->limMlmState),
psessionEntry->limSmeState,
GET_LIM_SYSTEM_ROLE(psessionEntry),
reasonCode, lim_dot11_reason_str(reasonCode),
MAC_ADDR_ARRAY(pHdr->sa));
)
if (lim_check_disassoc_deauth_ack_pending(pMac, (uint8_t *) pHdr->sa)) {
PELOGE(lim_log(pMac, LOGE,
FL
("Ignore the Deauth received, while waiting for ack of "
"disassoc/deauth"));
)
lim_clean_up_disassoc_deauth_req(pMac, (uint8_t *) pHdr->sa, 1);
return;
}
if (LIM_IS_AP_ROLE(psessionEntry) ||
LIM_IS_BT_AMP_AP_ROLE(psessionEntry)) {
switch (reasonCode) {
case eSIR_MAC_UNSPEC_FAILURE_REASON:
case eSIR_MAC_DEAUTH_LEAVING_BSS_REASON:
/* Valid reasonCode in received Deauthentication frame */
break;
default:
/* Invalid reasonCode in received Deauthentication frame */
/* Log error and ignore the frame */
PELOGE(lim_log(pMac, LOGE,
FL
("received Deauth frame with invalid reasonCode %d from "
MAC_ADDRESS_STR), reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
break;
}
} else if (LIM_IS_STA_ROLE(psessionEntry) ||
LIM_IS_BT_AMP_STA_ROLE(psessionEntry)) {
switch (reasonCode) {
case eSIR_MAC_UNSPEC_FAILURE_REASON:
case eSIR_MAC_PREV_AUTH_NOT_VALID_REASON:
case eSIR_MAC_DEAUTH_LEAVING_BSS_REASON:
case eSIR_MAC_CLASS2_FRAME_FROM_NON_AUTH_STA_REASON:
case eSIR_MAC_CLASS3_FRAME_FROM_NON_ASSOC_STA_REASON:
case eSIR_MAC_STA_NOT_PRE_AUTHENTICATED_REASON:
/* Valid reasonCode in received Deauth frame */
break;
default:
/* Invalid reasonCode in received Deauth frame */
/* Log error and ignore the frame */
PELOGE(lim_log(pMac, LOGE,
FL
("received Deauth frame with invalid reasonCode %d from "
MAC_ADDRESS_STR), reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
break;
}
} else {
/* Received Deauth frame in either IBSS */
/* or un-known role. Log and ignore it */
lim_log(pMac, LOGE,
FL
("received Deauth frame with reasonCode %d in role %d from "
MAC_ADDRESS_STR), reasonCode,
GET_LIM_SYSTEM_ROLE(psessionEntry),
MAC_ADDR_ARRAY(pHdr->sa));
return;
}
/** If we are in the middle of ReAssoc, a few things could happen:
* - STA is reassociating to current AP, and receives deauth from:
* a) current AP
* b) other AP
* - STA is reassociating to a new AP, and receives deauth from:
* c) current AP
* d) reassoc AP
* e) other AP
*
* The logic is:
* 1) If rcv deauth from an AP other than the one we're trying to
* reassociate with, then drop the deauth frame (case b, c, e)
* 2) If rcv deauth from the "new" reassoc AP (case d), then restore
* context with previous AP and send SME_REASSOC_RSP failure.
* 3) If rcv deauth from the reassoc AP, which is also the same
* AP we're currently associated with (case a), then proceed
* with normal deauth processing.
*/
if (psessionEntry->limReAssocbssId != NULL) {
pRoamSessionEntry =
pe_find_session_by_bssid(pMac, psessionEntry->limReAssocbssId,
&roamSessionId);
}
if (lim_is_reassoc_in_progress(pMac, psessionEntry)
|| lim_is_reassoc_in_progress(pMac, pRoamSessionEntry)) {
if (!IS_REASSOC_BSSID(pMac, pHdr->sa, psessionEntry)) {
PELOGE(lim_log
(pMac, LOGE,
FL("Rcv Deauth from unknown/different "
"AP while ReAssoc. Ignore " MAC_ADDRESS_STR),
MAC_ADDR_ARRAY(pHdr->sa));
)
PELOGE(lim_log
(pMac, LOGE,
FL(" limReAssocbssId : " MAC_ADDRESS_STR),
MAC_ADDR_ARRAY(psessionEntry->
limReAssocbssId));
)
return;
}
/** Received deauth from the new AP to which we tried to ReAssociate.
* Drop ReAssoc and Restore the Previous context( current connected AP).
*/
if (!IS_CURRENT_BSSID(pMac, pHdr->sa, psessionEntry)) {
PELOGE(lim_log
(pMac, LOGE,
FL("received DeAuth from the New AP to "
"which ReAssoc is sent " MAC_ADDRESS_STR),
MAC_ADDR_ARRAY(pHdr->sa));
)
PELOGE(lim_log
(pMac, LOGE,
FL(" psessionEntry->bssId: "
MAC_ADDRESS_STR),
MAC_ADDR_ARRAY(psessionEntry->bssId));
)
lim_restore_pre_reassoc_state(pMac,
eSIR_SME_REASSOC_REFUSED,
reasonCode,
psessionEntry);
return;
}
}
/* If received DeAuth from AP other than the one we're trying to join with
* nor associated with, then ignore deauth and delete Pre-auth entry.
*/
if (!LIM_IS_AP_ROLE(psessionEntry)) {
if (!IS_CURRENT_BSSID(pMac, pHdr->bssId, psessionEntry)) {
PELOGE(lim_log
(pMac, LOGE,
FL("received DeAuth from an AP other "
"than we're trying to join. Ignore. "
MAC_ADDRESS_STR), MAC_ADDR_ARRAY(pHdr->sa));
)
if (lim_search_pre_auth_list(pMac, pHdr->sa)) {
PELOG1(lim_log
(pMac, LOG1,
FL("Preauth entry exist. "
"Deleting... "));
)
lim_delete_pre_auth_node(pMac, pHdr->sa);
}
return;
}
}
pStaDs =
dph_lookup_hash_entry(pMac, pHdr->sa, &aid,
&psessionEntry->dph.dphHashTable);
/* Check for pre-assoc states */
switch (GET_LIM_SYSTEM_ROLE(psessionEntry)) {
case eLIM_STA_ROLE:
case eLIM_BT_AMP_STA_ROLE:
switch (psessionEntry->limMlmState) {
case eLIM_MLM_WT_AUTH_FRAME2_STATE:
/**
* AP sent Deauth frame while waiting
* for Auth frame2. Report Auth failure
* to SME.
*/
/* Log error */
PELOG1(lim_log(pMac, LOG1,
FL
("received Deauth frame state %X with failure "
"code %d from " MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
lim_restore_from_auth_state(pMac,
eSIR_SME_DEAUTH_WHILE_JOIN,
reasonCode, psessionEntry);
return;
case eLIM_MLM_AUTHENTICATED_STATE:
lim_log(pMac, LOG1,
FL("received Deauth frame state %X with "
"reasonCode=%d from " MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
/* / Issue Deauth Indication to SME. */
qdf_mem_copy((uint8_t *) &mlmDeauthInd.peerMacAddr,
pHdr->sa, sizeof(tSirMacAddr));
mlmDeauthInd.reasonCode = reasonCode;
psessionEntry->limMlmState = eLIM_MLM_IDLE_STATE;
MTRACE(mac_trace
(pMac, TRACE_CODE_MLM_STATE,
psessionEntry->peSessionId,
psessionEntry->limMlmState));
lim_post_sme_message(pMac,
LIM_MLM_DEAUTH_IND,
(uint32_t *) &mlmDeauthInd);
return;
case eLIM_MLM_WT_ASSOC_RSP_STATE:
/**
* AP may have 'aged-out' our Pre-auth
* context. Delete local pre-auth context
* if any and issue ASSOC_CNF to SME.
*/
lim_log(pMac, LOG1,
FL("received Deauth frame state %X with "
"reasonCode=%d from " MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
if (lim_search_pre_auth_list(pMac, pHdr->sa))
lim_delete_pre_auth_node(pMac, pHdr->sa);
if (psessionEntry->pLimMlmJoinReq) {
qdf_mem_free(psessionEntry->pLimMlmJoinReq);
psessionEntry->pLimMlmJoinReq = NULL;
}
mlmAssocCnf.resultCode = eSIR_SME_DEAUTH_WHILE_JOIN;
mlmAssocCnf.protStatusCode = reasonCode;
/* PE session Id */
mlmAssocCnf.sessionId = psessionEntry->peSessionId;
psessionEntry->limMlmState =
psessionEntry->limPrevMlmState;
MTRACE(mac_trace
(pMac, TRACE_CODE_MLM_STATE,
psessionEntry->peSessionId,
psessionEntry->limMlmState));
/* Deactive Association response timeout */
lim_deactivate_and_change_timer(pMac,
eLIM_ASSOC_FAIL_TIMER);
lim_post_sme_message(pMac,
LIM_MLM_ASSOC_CNF,
(uint32_t *) &mlmAssocCnf);
return;
case eLIM_MLM_WT_ADD_STA_RSP_STATE:
psessionEntry->fDeauthReceived = true;
PELOGW(lim_log(pMac, LOGW,
FL
("Received Deauth frame in state %X with Reason "
"Code %d from Peer" MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
return;
case eLIM_MLM_IDLE_STATE:
case eLIM_MLM_LINK_ESTABLISHED_STATE:
#ifdef FEATURE_WLAN_TDLS
if ((NULL != pStaDs)
&& (STA_ENTRY_TDLS_PEER == pStaDs->staType)) {
PELOGE(lim_log
(pMac, LOGE,
FL
("received Deauth frame in state %X with "
"reason code %d from Tdls peer"
MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
lim_send_sme_tdls_del_sta_ind(pMac, pStaDs,
psessionEntry,
reasonCode);
return;
} else {
/*
* Delete all the TDLS peers only if Deauth
* is received from the AP
*/
if (IS_CURRENT_BSSID(pMac, pHdr->sa, psessionEntry))
lim_delete_tdls_peers(pMac, psessionEntry);
#endif
/**
* This could be Deauthentication frame from
* a BSS with which pre-authentication was
* performed. Delete Pre-auth entry if found.
*/
if (lim_search_pre_auth_list(pMac, pHdr->sa))
lim_delete_pre_auth_node(pMac, pHdr->sa);
#ifdef FEATURE_WLAN_TDLS
}
#endif
break;
case eLIM_MLM_WT_REASSOC_RSP_STATE:
lim_log(pMac, LOGE,
FL("received Deauth frame state %X with "
"reasonCode=%d from " MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
break;
case eLIM_MLM_WT_FT_REASSOC_RSP_STATE:
PELOGE(lim_log(pMac, LOGE,
FL
("received Deauth frame in FT state %X with "
"reasonCode=%d from " MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
break;
default:
PELOGE(lim_log(pMac, LOGE,
FL
("received Deauth frame in state %X with "
"reasonCode=%d from " MAC_ADDRESS_STR),
psessionEntry->limMlmState, reasonCode,
MAC_ADDR_ARRAY(pHdr->sa));
)
return;
}
break;
case eLIM_STA_IN_IBSS_ROLE:
break;
case eLIM_AP_ROLE:
break;
default: /* eLIM_AP_ROLE or eLIM_BT_AMP_AP_ROLE */
return;
} /* end switch (pMac->lim.gLimSystemRole) */
/**
* Extract 'associated' context for STA, if any.
* This is maintained by DPH and created by LIM.
*/
if (NULL == pStaDs) {
lim_log(pMac, LOGE, FL("pStaDs is NULL"));
return;
}
if ((pStaDs->mlmStaContext.mlmState == eLIM_MLM_WT_DEL_STA_RSP_STATE) ||
(pStaDs->mlmStaContext.mlmState == eLIM_MLM_WT_DEL_BSS_RSP_STATE)) {
/**
* Already in the process of deleting context for the peer
* and received Deauthentication frame. Log and Ignore.
*/
PELOGE(lim_log(pMac, LOGE,
FL
("received Deauth frame from peer that is in state %X, addr "
MAC_ADDRESS_STR), pStaDs->mlmStaContext.mlmState,
MAC_ADDR_ARRAY(pHdr->sa));
)
return;
}
pStaDs->mlmStaContext.disassocReason = (tSirMacReasonCodes) reasonCode;
pStaDs->mlmStaContext.cleanupTrigger = eLIM_PEER_ENTITY_DEAUTH;
/* / Issue Deauth Indication to SME. */
qdf_mem_copy((uint8_t *) &mlmDeauthInd.peerMacAddr,
pStaDs->staAddr, sizeof(tSirMacAddr));
mlmDeauthInd.reasonCode =
(uint8_t) pStaDs->mlmStaContext.disassocReason;
mlmDeauthInd.deauthTrigger = eLIM_PEER_ENTITY_DEAUTH;
/*
* If we're in the middle of ReAssoc and received deauth from
* the ReAssoc AP, then notify SME by sending REASSOC_RSP with
* failure result code. SME will post the disconnect to the
* supplicant and the latter would start a fresh assoc.
*/
if (lim_is_reassoc_in_progress(pMac, psessionEntry)) {
/**
* AP may have 'aged-out' our Pre-auth
* context. Delete local pre-auth context
* if any and issue REASSOC_CNF to SME.
*/
if (lim_search_pre_auth_list(pMac, pHdr->sa))
lim_delete_pre_auth_node(pMac, pHdr->sa);
if (psessionEntry->limAssocResponseData) {
qdf_mem_free(psessionEntry->limAssocResponseData);
psessionEntry->limAssocResponseData = NULL;
}
PELOGE(lim_log(pMac, LOGE, FL("Rcv Deauth from ReAssoc AP. "
"Issue REASSOC_CNF. "));
)
/*
* TODO: Instead of overloading eSIR_SME_FT_REASSOC_TIMEOUT_FAILURE
* it would have been good to define/use a different failure type.
* Using eSIR_SME_FT_REASSOC_FAILURE does not seem to clean-up
* properly and we end up seeing "transmit queue timeout".
*/
lim_post_reassoc_failure(pMac,
eSIR_SME_FT_REASSOC_TIMEOUT_FAILURE,
eSIR_MAC_UNSPEC_FAILURE_STATUS,
psessionEntry);
return;
}
/* reset the deauthMsgCnt here since we are able to Process
* the deauth frame and sending up the indication as well */
if (pMac->lim.deauthMsgCnt != 0) {
pMac->lim.deauthMsgCnt = 0;
}
if (LIM_IS_STA_ROLE(psessionEntry))
wma_tx_abort(psessionEntry->smeSessionId);
/* / Deauthentication from peer MAC entity */
lim_post_sme_message(pMac, LIM_MLM_DEAUTH_IND,
(uint32_t *) &mlmDeauthInd);
/* send eWNI_SME_DEAUTH_IND to SME */
lim_send_sme_deauth_ind(pMac, pStaDs, psessionEntry);
return;
} /*** end lim_process_deauth_frame() ***/