rx.c 83.7 KB
Newer Older
1 2 3 4
/*
 * Copyright 2002-2005, Instant802 Networks, Inc.
 * Copyright 2005-2006, Devicescape Software, Inc.
 * Copyright 2006-2007	Jiri Benc <jbenc@suse.cz>
5
 * Copyright 2007-2010	Johannes Berg <johannes@sipsolutions.net>
6 7 8 9 10 11
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 */

12
#include <linux/jiffies.h>
13
#include <linux/slab.h>
14 15 16 17
#include <linux/kernel.h>
#include <linux/skbuff.h>
#include <linux/netdevice.h>
#include <linux/etherdevice.h>
18
#include <linux/rcupdate.h>
19 20 21 22
#include <net/mac80211.h>
#include <net/ieee80211_radiotap.h>

#include "ieee80211_i.h"
23
#include "driver-ops.h"
Johannes Berg's avatar
Johannes Berg committed
24
#include "led.h"
25
#include "mesh.h"
26 27 28 29 30
#include "wep.h"
#include "wpa.h"
#include "tkip.h"
#include "wme.h"

31 32 33 34 35 36 37
/*
 * monitor mode reception
 *
 * This function cleans up the SKB, i.e. it removes all the stuff
 * only useful for monitoring.
 */
static struct sk_buff *remove_monitor_info(struct ieee80211_local *local,
38
					   struct sk_buff *skb)
39 40 41
{
	if (local->hw.flags & IEEE80211_HW_RX_INCLUDES_FCS) {
		if (likely(skb->len > FCS_LEN))
Zhu Yi's avatar
Zhu Yi committed
42
			__pskb_trim(skb, skb->len - FCS_LEN);
43 44 45 46 47 48 49 50 51 52 53
		else {
			/* driver bug */
			WARN_ON(1);
			dev_kfree_skb(skb);
			skb = NULL;
		}
	}

	return skb;
}

54
static inline int should_drop_frame(struct sk_buff *skb,
55
				    int present_fcs_len)
56
{
57
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
58
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
59 60 61

	if (status->flag & (RX_FLAG_FAILED_FCS_CRC | RX_FLAG_FAILED_PLCP_CRC))
		return 1;
62
	if (unlikely(skb->len < 16 + present_fcs_len))
63
		return 1;
64 65 66
	if (ieee80211_is_ctl(hdr->frame_control) &&
	    !ieee80211_is_pspoll(hdr->frame_control) &&
	    !ieee80211_is_back_req(hdr->frame_control))
67 68 69 70
		return 1;
	return 0;
}

71 72 73 74 75 76 77 78 79
static int
ieee80211_rx_radiotap_len(struct ieee80211_local *local,
			  struct ieee80211_rx_status *status)
{
	int len;

	/* always present fields */
	len = sizeof(struct ieee80211_radiotap_header) + 9;

Johannes Berg's avatar
Johannes Berg committed
80
	if (status->flag & RX_FLAG_MACTIME_MPDU)
81
		len += 8;
Johannes Berg's avatar
Johannes Berg committed
82
	if (local->hw.flags & IEEE80211_HW_SIGNAL_DBM)
83 84 85 86 87
		len += 1;

	if (len & 1) /* padding for RX_FLAGS if necessary */
		len++;

88 89 90
	if (status->flag & RX_FLAG_HT) /* HT info */
		len += 3;

91 92 93
	return len;
}

94
/*
95 96 97 98 99 100 101 102 103 104
 * ieee80211_add_rx_radiotap_header - add radiotap header
 *
 * add a radiotap header containing all the fields which the hardware provided.
 */
static void
ieee80211_add_rx_radiotap_header(struct ieee80211_local *local,
				 struct sk_buff *skb,
				 struct ieee80211_rate *rate,
				 int rtap_len)
{
105
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
106 107
	struct ieee80211_radiotap_header *rthdr;
	unsigned char *pos;
108
	u16 rx_flags = 0;
109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125

	rthdr = (struct ieee80211_radiotap_header *)skb_push(skb, rtap_len);
	memset(rthdr, 0, rtap_len);

	/* radiotap header, set always present flags */
	rthdr->it_present =
		cpu_to_le32((1 << IEEE80211_RADIOTAP_FLAGS) |
			    (1 << IEEE80211_RADIOTAP_CHANNEL) |
			    (1 << IEEE80211_RADIOTAP_ANTENNA) |
			    (1 << IEEE80211_RADIOTAP_RX_FLAGS));
	rthdr->it_len = cpu_to_le16(rtap_len);

	pos = (unsigned char *)(rthdr+1);

	/* the order of the following fields is important */

	/* IEEE80211_RADIOTAP_TSFT */
Johannes Berg's avatar
Johannes Berg committed
126
	if (status->flag & RX_FLAG_MACTIME_MPDU) {
127
		put_unaligned_le64(status->mactime, pos);
128 129 130 131 132 133 134 135
		rthdr->it_present |=
			cpu_to_le32(1 << IEEE80211_RADIOTAP_TSFT);
		pos += 8;
	}

	/* IEEE80211_RADIOTAP_FLAGS */
	if (local->hw.flags & IEEE80211_HW_RX_INCLUDES_FCS)
		*pos |= IEEE80211_RADIOTAP_F_FCS;
Johannes Berg's avatar
Johannes Berg committed
136 137
	if (status->flag & (RX_FLAG_FAILED_FCS_CRC | RX_FLAG_FAILED_PLCP_CRC))
		*pos |= IEEE80211_RADIOTAP_F_BADFCS;
138 139
	if (status->flag & RX_FLAG_SHORTPRE)
		*pos |= IEEE80211_RADIOTAP_F_SHORTPRE;
140 141 142
	pos++;

	/* IEEE80211_RADIOTAP_RATE */
143 144
	if (status->flag & RX_FLAG_HT) {
		/*
145
		 * MCS information is a separate field in radiotap,
146 147
		 * added below. The byte here is needed as padding
		 * for the channel though, so initialise it to 0.
148 149
		 */
		*pos = 0;
150
	} else {
151
		rthdr->it_present |= cpu_to_le32(1 << IEEE80211_RADIOTAP_RATE);
152
		*pos = rate->bitrate / 5;
153
	}
154 155 156
	pos++;

	/* IEEE80211_RADIOTAP_CHANNEL */
157
	put_unaligned_le16(status->freq, pos);
158 159
	pos += 2;
	if (status->band == IEEE80211_BAND_5GHZ)
160 161
		put_unaligned_le16(IEEE80211_CHAN_OFDM | IEEE80211_CHAN_5GHZ,
				   pos);
162 163 164
	else if (status->flag & RX_FLAG_HT)
		put_unaligned_le16(IEEE80211_CHAN_DYN | IEEE80211_CHAN_2GHZ,
				   pos);
165
	else if (rate->flags & IEEE80211_RATE_ERP_G)
166 167
		put_unaligned_le16(IEEE80211_CHAN_OFDM | IEEE80211_CHAN_2GHZ,
				   pos);
168
	else
169 170
		put_unaligned_le16(IEEE80211_CHAN_CCK | IEEE80211_CHAN_2GHZ,
				   pos);
171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190
	pos += 2;

	/* IEEE80211_RADIOTAP_DBM_ANTSIGNAL */
	if (local->hw.flags & IEEE80211_HW_SIGNAL_DBM) {
		*pos = status->signal;
		rthdr->it_present |=
			cpu_to_le32(1 << IEEE80211_RADIOTAP_DBM_ANTSIGNAL);
		pos++;
	}

	/* IEEE80211_RADIOTAP_LOCK_QUALITY is missing */

	/* IEEE80211_RADIOTAP_ANTENNA */
	*pos = status->antenna;
	pos++;

	/* IEEE80211_RADIOTAP_DB_ANTNOISE is not used */

	/* IEEE80211_RADIOTAP_RX_FLAGS */
	/* ensure 2 byte alignment for the 2 byte field as required */
191
	if ((pos - (u8 *)rthdr) & 1)
192
		pos++;
Johannes Berg's avatar
Johannes Berg committed
193
	if (status->flag & RX_FLAG_FAILED_PLCP_CRC)
194 195
		rx_flags |= IEEE80211_RADIOTAP_F_RX_BADPLCP;
	put_unaligned_le16(rx_flags, pos);
196
	pos += 2;
197 198 199 200 201 202 203 204 205 206 207 208 209 210

	if (status->flag & RX_FLAG_HT) {
		rthdr->it_present |= cpu_to_le32(1 << IEEE80211_RADIOTAP_MCS);
		*pos++ = IEEE80211_RADIOTAP_MCS_HAVE_MCS |
			 IEEE80211_RADIOTAP_MCS_HAVE_GI |
			 IEEE80211_RADIOTAP_MCS_HAVE_BW;
		*pos = 0;
		if (status->flag & RX_FLAG_SHORT_GI)
			*pos |= IEEE80211_RADIOTAP_MCS_SGI;
		if (status->flag & RX_FLAG_40MHZ)
			*pos |= IEEE80211_RADIOTAP_MCS_BW_40;
		pos++;
		*pos++ = status->rate_idx;
	}
211 212
}

213 214 215 216 217 218 219
/*
 * This function copies a received frame to all monitor interfaces and
 * returns a cleaned-up SKB that no longer includes the FCS nor the
 * radiotap header the driver might have added.
 */
static struct sk_buff *
ieee80211_rx_monitor(struct ieee80211_local *local, struct sk_buff *origskb,
220
		     struct ieee80211_rate *rate)
221
{
222
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(origskb);
223 224 225 226 227 228 229 230 231 232 233 234 235 236
	struct ieee80211_sub_if_data *sdata;
	int needed_headroom = 0;
	struct sk_buff *skb, *skb2;
	struct net_device *prev_dev = NULL;
	int present_fcs_len = 0;

	/*
	 * First, we may need to make a copy of the skb because
	 *  (1) we need to modify it for radiotap (if not present), and
	 *  (2) the other RX handlers will modify the skb we got.
	 *
	 * We don't need to, of course, if we aren't going to return
	 * the SKB because it has a bad FCS/PLCP checksum.
	 */
237 238 239

	/* room for the radiotap header based on driver features */
	needed_headroom = ieee80211_rx_radiotap_len(local, status);
240 241 242 243

	if (local->hw.flags & IEEE80211_HW_RX_INCLUDES_FCS)
		present_fcs_len = FCS_LEN;

Zhu Yi's avatar
Zhu Yi committed
244 245 246 247 248 249
	/* make sure hdr->frame_control is on the linear part */
	if (!pskb_may_pull(origskb, 2)) {
		dev_kfree_skb(origskb);
		return NULL;
	}

250
	if (!local->monitors) {
251
		if (should_drop_frame(origskb, present_fcs_len)) {
252 253 254 255
			dev_kfree_skb(origskb);
			return NULL;
		}

256
		return remove_monitor_info(local, origskb);
257 258
	}

259
	if (should_drop_frame(origskb, present_fcs_len)) {
260 261 262 263 264 265 266 267 268 269 270 271
		/* only need to expand headroom if necessary */
		skb = origskb;
		origskb = NULL;

		/*
		 * This shouldn't trigger often because most devices have an
		 * RX header they pull before we get here, and that should
		 * be big enough for our radiotap information. We should
		 * probably export the length to drivers so that we can have
		 * them allocate enough headroom to start with.
		 */
		if (skb_headroom(skb) < needed_headroom &&
272
		    pskb_expand_head(skb, needed_headroom, 0, GFP_ATOMIC)) {
273 274 275 276 277 278 279 280 281 282
			dev_kfree_skb(skb);
			return NULL;
		}
	} else {
		/*
		 * Need to make a copy and possibly remove radiotap header
		 * and FCS from the original.
		 */
		skb = skb_copy_expand(origskb, needed_headroom, 0, GFP_ATOMIC);

283
		origskb = remove_monitor_info(local, origskb);
284 285 286 287 288

		if (!skb)
			return origskb;
	}

289 290
	/* prepend radiotap information */
	ieee80211_add_rx_radiotap_header(local, skb, rate, needed_headroom);
291

292
	skb_reset_mac_header(skb);
293 294 295 296 297
	skb->ip_summed = CHECKSUM_UNNECESSARY;
	skb->pkt_type = PACKET_OTHERHOST;
	skb->protocol = htons(ETH_P_802_2);

	list_for_each_entry_rcu(sdata, &local->interfaces, list) {
298
		if (sdata->vif.type != NL80211_IFTYPE_MONITOR)
299 300
			continue;

301 302 303
		if (sdata->u.mntr_flags & MONITOR_FLAG_COOK_FRAMES)
			continue;

304
		if (!ieee80211_sdata_running(sdata))
305 306
			continue;

307 308 309 310
		if (prev_dev) {
			skb2 = skb_clone(skb, GFP_ATOMIC);
			if (skb2) {
				skb2->dev = prev_dev;
311
				netif_receive_skb(skb2);
312 313 314 315 316 317 318 319 320 321
			}
		}

		prev_dev = sdata->dev;
		sdata->dev->stats.rx_packets++;
		sdata->dev->stats.rx_bytes += skb->len;
	}

	if (prev_dev) {
		skb->dev = prev_dev;
322
		netif_receive_skb(skb);
323 324 325 326 327 328 329
	} else
		dev_kfree_skb(skb);

	return origskb;
}


330
static void ieee80211_parse_qos(struct ieee80211_rx_data *rx)
331
{
332
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)rx->skb->data;
333
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(rx->skb);
334
	int tid, seqno_idx, security_idx;
335 336

	/* does the frame have a qos control field? */
337 338
	if (ieee80211_is_data_qos(hdr->frame_control)) {
		u8 *qc = ieee80211_get_qos_ctl(hdr);
339
		/* frame has qos control */
340
		tid = *qc & IEEE80211_QOS_CTL_TID_MASK;
341
		if (*qc & IEEE80211_QOS_CTL_A_MSDU_PRESENT)
342
			status->rx_flags |= IEEE80211_RX_AMSDU;
343 344 345

		seqno_idx = tid;
		security_idx = tid;
346
	} else {
347 348 349 350 351 352 353 354 355 356 357
		/*
		 * IEEE 802.11-2007, 7.1.3.4.1 ("Sequence Number field"):
		 *
		 *	Sequence numbers for management frames, QoS data
		 *	frames with a broadcast/multicast address in the
		 *	Address 1 field, and all non-QoS data frames sent
		 *	by QoS STAs are assigned using an additional single
		 *	modulo-4096 counter, [...]
		 *
		 * We also use that counter for non-QoS STAs.
		 */
358 359 360 361 362
		seqno_idx = NUM_RX_DATA_QUEUES;
		security_idx = 0;
		if (ieee80211_is_mgmt(hdr->frame_control))
			security_idx = NUM_RX_DATA_QUEUES;
		tid = 0;
363
	}
364

365 366
	rx->seqno_idx = seqno_idx;
	rx->security_idx = security_idx;
367 368 369
	/* Set skb->priority to 1d tag if highest order bit of TID is not set.
	 * For now, set skb->priority to 0 for other cases. */
	rx->skb->priority = (tid > 7) ? 0 : tid;
370
}
371

372 373 374 375 376 377 378 379 380 381 382
/**
 * DOC: Packet alignment
 *
 * Drivers always need to pass packets that are aligned to two-byte boundaries
 * to the stack.
 *
 * Additionally, should, if possible, align the payload data in a way that
 * guarantees that the contained IP header is aligned to a four-byte
 * boundary. In the case of regular frames, this simply means aligning the
 * payload to a four-byte boundary (because either the IP header is directly
 * contained, or IV/RFC1042 headers that have a length divisible by four are
383 384 385
 * in front of it).  If the payload data is not properly aligned and the
 * architecture doesn't support efficient unaligned operations, mac80211
 * will align the data.
386 387 388 389 390 391 392
 *
 * With A-MSDU frames, however, the payload data address must yield two modulo
 * four because there are 14-byte 802.3 headers within the A-MSDU frames that
 * push the IP header further back to a multiple of four again. Thankfully, the
 * specs were sane enough this time around to require padding each A-MSDU
 * subframe to a length that is a multiple of four.
 *
Lucas De Marchi's avatar
Lucas De Marchi committed
393
 * Padding like Atheros hardware adds which is between the 802.11 header and
394 395 396 397
 * the payload is not supported, the driver is required to move the 802.11
 * header to be directly in front of the payload in that case.
 */
static void ieee80211_verify_alignment(struct ieee80211_rx_data *rx)
398
{
399 400 401
#ifdef CONFIG_MAC80211_VERBOSE_DEBUG
	WARN_ONCE((unsigned long)rx->skb->data & 1,
		  "unaligned packet at 0x%p\n", rx->skb->data);
402
#endif
403 404
}

405

406 407
/* rx handlers */

408
static ieee80211_rx_result debug_noinline
409
ieee80211_rx_h_passive_scan(struct ieee80211_rx_data *rx)
410 411
{
	struct ieee80211_local *local = rx->local;
412
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(rx->skb);
413 414
	struct sk_buff *skb = rx->skb;

415 416
	if (likely(!(status->rx_flags & IEEE80211_RX_IN_SCAN) &&
		   !local->sched_scanning))
417 418
		return RX_CONTINUE;

419
	if (test_bit(SCAN_HW_SCANNING, &local->scanning) ||
420 421
	    test_bit(SCAN_SW_SCANNING, &local->scanning) ||
	    local->sched_scanning)
422
		return ieee80211_scan_rx(rx->sdata, skb);
Zhu Yi's avatar
Zhu Yi committed
423

424 425 426
	/* scanning finished during invoking of handlers */
	I802_DEBUG_INC(local->rx_handlers_drop_passive_scan);
	return RX_DROP_UNUSABLE;
427 428
}

429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474

static int ieee80211_is_unicast_robust_mgmt_frame(struct sk_buff *skb)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;

	if (skb->len < 24 || is_multicast_ether_addr(hdr->addr1))
		return 0;

	return ieee80211_is_robust_mgmt_frame(hdr);
}


static int ieee80211_is_multicast_robust_mgmt_frame(struct sk_buff *skb)
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;

	if (skb->len < 24 || !is_multicast_ether_addr(hdr->addr1))
		return 0;

	return ieee80211_is_robust_mgmt_frame(hdr);
}


/* Get the BIP key index from MMIE; return -1 if this is not a BIP frame */
static int ieee80211_get_mmie_keyidx(struct sk_buff *skb)
{
	struct ieee80211_mgmt *hdr = (struct ieee80211_mgmt *) skb->data;
	struct ieee80211_mmie *mmie;

	if (skb->len < 24 + sizeof(*mmie) ||
	    !is_multicast_ether_addr(hdr->da))
		return -1;

	if (!ieee80211_is_robust_mgmt_frame((struct ieee80211_hdr *) hdr))
		return -1; /* not a robust management frame */

	mmie = (struct ieee80211_mmie *)
		(skb->data + skb->len - sizeof(*mmie));
	if (mmie->element_id != WLAN_EID_MMIE ||
	    mmie->length != sizeof(*mmie) - 2)
		return -1;

	return le16_to_cpu(mmie->key_id);
}


475
static ieee80211_rx_result
476
ieee80211_rx_mesh_check(struct ieee80211_rx_data *rx)
477
{
478
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)rx->skb->data;
479
	char *dev_addr = rx->sdata->vif.addr;
480

481
	if (ieee80211_is_data(hdr->frame_control)) {
482 483 484 485 486 487 488 489 490 491 492 493
		if (is_multicast_ether_addr(hdr->addr1)) {
			if (ieee80211_has_tods(hdr->frame_control) ||
				!ieee80211_has_fromds(hdr->frame_control))
				return RX_DROP_MONITOR;
			if (memcmp(hdr->addr3, dev_addr, ETH_ALEN) == 0)
				return RX_DROP_MONITOR;
		} else {
			if (!ieee80211_has_a4(hdr->frame_control))
				return RX_DROP_MONITOR;
			if (memcmp(hdr->addr4, dev_addr, ETH_ALEN) == 0)
				return RX_DROP_MONITOR;
		}
494 495 496 497 498 499
	}

	/* If there is not an established peer link and this is not a peer link
	 * establisment frame, beacon or probe, drop the frame.
	 */

500
	if (!rx->sta || sta_plink_state(rx->sta) != NL80211_PLINK_ESTAB) {
501
		struct ieee80211_mgmt *mgmt;
502

503
		if (!ieee80211_is_mgmt(hdr->frame_control))
504 505
			return RX_DROP_MONITOR;

506
		if (ieee80211_is_action(hdr->frame_control)) {
507
			u8 category;
508
			mgmt = (struct ieee80211_mgmt *)hdr;
509 510 511
			category = mgmt->u.action.category;
			if (category != WLAN_CATEGORY_MESH_ACTION &&
				category != WLAN_CATEGORY_SELF_PROTECTED)
512 513 514 515
				return RX_DROP_MONITOR;
			return RX_CONTINUE;
		}

516 517
		if (ieee80211_is_probe_req(hdr->frame_control) ||
		    ieee80211_is_probe_resp(hdr->frame_control) ||
518 519
		    ieee80211_is_beacon(hdr->frame_control) ||
		    ieee80211_is_auth(hdr->frame_control))
520 521 522 523 524 525
			return RX_CONTINUE;

		return RX_DROP_MONITOR;

	}

Johannes Berg's avatar
Johannes Berg committed
526 527
	return RX_CONTINUE;
}
528

529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549
#define SEQ_MODULO 0x1000
#define SEQ_MASK   0xfff

static inline int seq_less(u16 sq1, u16 sq2)
{
	return ((sq1 - sq2) & SEQ_MASK) > (SEQ_MODULO >> 1);
}

static inline u16 seq_inc(u16 sq)
{
	return (sq + 1) & SEQ_MASK;
}

static inline u16 seq_sub(u16 sq1, u16 sq2)
{
	return (sq1 - sq2) & SEQ_MASK;
}


static void ieee80211_release_reorder_frame(struct ieee80211_hw *hw,
					    struct tid_ampdu_rx *tid_agg_rx,
550
					    int index)
551
{
552
	struct ieee80211_local *local = hw_to_local(hw);
553
	struct sk_buff *skb = tid_agg_rx->reorder_buf[index];
554
	struct ieee80211_rx_status *status;
555

556 557
	lockdep_assert_held(&tid_agg_rx->reorder_lock);

558 559 560
	if (!skb)
		goto no_frame;

561
	/* release the frame from the reorder ring buffer */
562 563
	tid_agg_rx->stored_mpdu_num--;
	tid_agg_rx->reorder_buf[index] = NULL;
564 565
	status = IEEE80211_SKB_RXCB(skb);
	status->rx_flags |= IEEE80211_RX_DEFERRED_RELEASE;
566
	skb_queue_tail(&local->rx_skb_queue, skb);
567 568 569 570 571 572 573

no_frame:
	tid_agg_rx->head_seq_num = seq_inc(tid_agg_rx->head_seq_num);
}

static void ieee80211_release_reorder_frames(struct ieee80211_hw *hw,
					     struct tid_ampdu_rx *tid_agg_rx,
574
					     u16 head_seq_num)
575 576 577
{
	int index;

578 579
	lockdep_assert_held(&tid_agg_rx->reorder_lock);

580 581 582
	while (seq_less(tid_agg_rx->head_seq_num, head_seq_num)) {
		index = seq_sub(tid_agg_rx->head_seq_num, tid_agg_rx->ssn) %
							tid_agg_rx->buf_size;
583
		ieee80211_release_reorder_frame(hw, tid_agg_rx, index);
584 585 586 587 588 589 590 591 592
	}
}

/*
 * Timeout (in jiffies) for skb's that are waiting in the RX reorder buffer. If
 * the skb was added to the buffer longer than this time ago, the earlier
 * frames that have not yet been received are assumed to be lost and the skb
 * can be released for processing. This may also release other skb's from the
 * reorder buffer if there are no additional gaps between the frames.
593 594
 *
 * Callers must hold tid_agg_rx->reorder_lock.
595 596 597
 */
#define HT_RX_REORDER_BUF_TIMEOUT (HZ / 10)

598
static void ieee80211_sta_reorder_release(struct ieee80211_hw *hw,
599
					  struct tid_ampdu_rx *tid_agg_rx)
600
{
601
	int index, j;
602

603 604
	lockdep_assert_held(&tid_agg_rx->reorder_lock);

605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620
	/* release the buffer until next missing frame */
	index = seq_sub(tid_agg_rx->head_seq_num, tid_agg_rx->ssn) %
						tid_agg_rx->buf_size;
	if (!tid_agg_rx->reorder_buf[index] &&
	    tid_agg_rx->stored_mpdu_num > 1) {
		/*
		 * No buffers ready to be released, but check whether any
		 * frames in the reorder buffer have timed out.
		 */
		int skipped = 1;
		for (j = (index + 1) % tid_agg_rx->buf_size; j != index;
		     j = (j + 1) % tid_agg_rx->buf_size) {
			if (!tid_agg_rx->reorder_buf[j]) {
				skipped++;
				continue;
			}
621 622
			if (skipped &&
			    !time_after(jiffies, tid_agg_rx->reorder_time[j] +
623
					HT_RX_REORDER_BUF_TIMEOUT))
624
				goto set_release_timer;
625 626 627

#ifdef CONFIG_MAC80211_HT_DEBUG
			if (net_ratelimit())
Joe Perches's avatar
Joe Perches committed
628 629
				wiphy_debug(hw->wiphy,
					    "release an RX reorder frame due to timeout on earlier frames\n");
630
#endif
631
			ieee80211_release_reorder_frame(hw, tid_agg_rx, j);
632 633 634 635 636 637 638 639 640

			/*
			 * Increment the head seq# also for the skipped slots.
			 */
			tid_agg_rx->head_seq_num =
				(tid_agg_rx->head_seq_num + skipped) & SEQ_MASK;
			skipped = 0;
		}
	} else while (tid_agg_rx->reorder_buf[index]) {
641
		ieee80211_release_reorder_frame(hw, tid_agg_rx, index);
642 643 644
		index =	seq_sub(tid_agg_rx->head_seq_num, tid_agg_rx->ssn) %
							tid_agg_rx->buf_size;
	}
645 646 647 648 649 650 651 652 653 654 655 656 657 658

	if (tid_agg_rx->stored_mpdu_num) {
		j = index = seq_sub(tid_agg_rx->head_seq_num,
				    tid_agg_rx->ssn) % tid_agg_rx->buf_size;

		for (; j != (index - 1) % tid_agg_rx->buf_size;
		     j = (j + 1) % tid_agg_rx->buf_size) {
			if (tid_agg_rx->reorder_buf[j])
				break;
		}

 set_release_timer:

		mod_timer(&tid_agg_rx->reorder_timer,
659
			  tid_agg_rx->reorder_time[j] + 1 +
660 661 662 663
			  HT_RX_REORDER_BUF_TIMEOUT);
	} else {
		del_timer(&tid_agg_rx->reorder_timer);
	}
664 665
}

666 667 668 669 670 671 672
/*
 * As this function belongs to the RX path it must be under
 * rcu_read_lock protection. It returns false if the frame
 * can be processed immediately, true if it was consumed.
 */
static bool ieee80211_sta_manage_reorder_buf(struct ieee80211_hw *hw,
					     struct tid_ampdu_rx *tid_agg_rx,
673
					     struct sk_buff *skb)
674 675 676 677 678 679
{
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
	u16 sc = le16_to_cpu(hdr->seq_ctrl);
	u16 mpdu_seq_num = (sc & IEEE80211_SCTL_SEQ) >> 4;
	u16 head_seq_num, buf_size;
	int index;
680
	bool ret = true;
681

682 683
	spin_lock(&tid_agg_rx->reorder_lock);

684 685 686 687 688 689
	buf_size = tid_agg_rx->buf_size;
	head_seq_num = tid_agg_rx->head_seq_num;

	/* frame with out of date sequence number */
	if (seq_less(mpdu_seq_num, head_seq_num)) {
		dev_kfree_skb(skb);
690
		goto out;
691 692 693 694 695 696 697 698 699
	}

	/*
	 * If frame the sequence number exceeds our buffering window
	 * size release some previous frames to make room for this one.
	 */
	if (!seq_less(mpdu_seq_num, head_seq_num + buf_size)) {
		head_seq_num = seq_inc(seq_sub(mpdu_seq_num, buf_size));
		/* release stored frames up to new head to stack */
700
		ieee80211_release_reorder_frames(hw, tid_agg_rx, head_seq_num);
701 702 703 704 705 706 707 708 709
	}

	/* Now the new frame is always in the range of the reordering buffer */

	index = seq_sub(mpdu_seq_num, tid_agg_rx->ssn) % tid_agg_rx->buf_size;

	/* check if we already stored this frame */
	if (tid_agg_rx->reorder_buf[index]) {
		dev_kfree_skb(skb);
710
		goto out;
711 712 713 714 715
	}

	/*
	 * If the current MPDU is in the right order and nothing else
	 * is stored we can process it directly, no need to buffer it.
716 717
	 * If it is first but there's something stored, we may be able
	 * to release frames after this one.
718 719 720 721
	 */
	if (mpdu_seq_num == tid_agg_rx->head_seq_num &&
	    tid_agg_rx->stored_mpdu_num == 0) {
		tid_agg_rx->head_seq_num = seq_inc(tid_agg_rx->head_seq_num);
722 723
		ret = false;
		goto out;
724 725 726 727 728 729
	}

	/* put the frame in the reordering buffer */
	tid_agg_rx->reorder_buf[index] = skb;
	tid_agg_rx->reorder_time[index] = jiffies;
	tid_agg_rx->stored_mpdu_num++;
730
	ieee80211_sta_reorder_release(hw, tid_agg_rx);
731

732 733 734
 out:
	spin_unlock(&tid_agg_rx->reorder_lock);
	return ret;
735 736 737 738 739 740
}

/*
 * Reorder MPDUs from A-MPDUs, keeping them on a buffer. Returns
 * true if the MPDU was buffered, false if it should be processed.
 */
741
static void ieee80211_rx_reorder_ampdu(struct ieee80211_rx_data *rx)
742
{
743 744
	struct sk_buff *skb = rx->skb;
	struct ieee80211_local *local = rx->local;
745 746
	struct ieee80211_hw *hw = &local->hw;
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *) skb->data;
747
	struct sta_info *sta = rx->sta;
748 749 750 751 752
	struct tid_ampdu_rx *tid_agg_rx;
	u16 sc;
	int tid;

	if (!ieee80211_is_data_qos(hdr->frame_control))
753
		goto dont_reorder;
754 755 756 757 758 759 760

	/*
	 * filter the QoS data rx stream according to
	 * STA/TID and check if this STA/TID is on aggregation
	 */

	if (!sta)
761
		goto dont_reorder;
762 763 764

	tid = *ieee80211_get_qos_ctl(hdr) & IEEE80211_QOS_CTL_TID_MASK;

765 766 767
	tid_agg_rx = rcu_dereference(sta->ampdu_mlme.tid_rx[tid]);
	if (!tid_agg_rx)
		goto dont_reorder;
768 769 770

	/* qos null data frames are excluded */
	if (unlikely(hdr->frame_control & cpu_to_le16(IEEE80211_STYPE_NULLFUNC)))
771
		goto dont_reorder;
772 773 774 775 776 777 778 779 780 781 782

	/* new, potentially un-ordered, ampdu frame - process it */

	/* reset session timer */
	if (tid_agg_rx->timeout)
		mod_timer(&tid_agg_rx->session_timer,
			  TU_TO_EXP_TIME(tid_agg_rx->timeout));

	/* if this mpdu is fragmented - terminate rx aggregation session */
	sc = le16_to_cpu(hdr->seq_ctrl);
	if (sc & IEEE80211_SCTL_FRAG) {
783
		skb->pkt_type = IEEE80211_SDATA_QUEUE_TYPE_FRAME;
784 785
		skb_queue_tail(&rx->sdata->skb_queue, skb);
		ieee80211_queue_work(&local->hw, &rx->sdata->work);
786
		return;
787 788
	}

789 790 791 792 793 794 795
	/*
	 * No locking needed -- we will only ever process one
	 * RX packet at a time, and thus own tid_agg_rx. All
	 * other code manipulating it needs to (and does) make
	 * sure that we cannot get to it any more before doing
	 * anything with it.
	 */
796
	if (ieee80211_sta_manage_reorder_buf(hw, tid_agg_rx, skb))
797 798 799
		return;

 dont_reorder:
800
	skb_queue_tail(&local->rx_skb_queue, skb);
801
}
802

803
static ieee80211_rx_result debug_noinline
804
ieee80211_rx_h_check(struct ieee80211_rx_data *rx)
805
{
806
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)rx->skb->data;
807
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(rx->skb);
808 809 810

	/* Drop duplicate 802.11 retransmissions (IEEE 802.11 Chap. 9.2.9) */
	if (rx->sta && !is_multicast_ether_addr(hdr->addr1)) {
811
		if (unlikely(ieee80211_has_retry(hdr->frame_control) &&
812
			     rx->sta->last_seq_ctrl[rx->seqno_idx] ==
813
			     hdr->seq_ctrl)) {
814
			if (status->rx_flags & IEEE80211_RX_RA_MATCH) {
815 816 817
				rx->local->dot11FrameDuplicateCount++;
				rx->sta->num_duplicates++;
			}
818
			return RX_DROP_UNUSABLE;
819
		} else
820
			rx->sta->last_seq_ctrl[rx->seqno_idx] = hdr->seq_ctrl;
821 822 823 824
	}

	if (unlikely(rx->skb->len < 16)) {
		I802_DEBUG_INC(rx->local->rx_handlers_drop_short);
Johannes Berg's avatar
Johannes Berg committed
825
		return RX_DROP_MONITOR;
826 827 828 829 830
	}

	/* Drop disallowed frame classes based on STA auth/assoc state;
	 * IEEE 802.11, Chap 5.5.
	 *
831 832
	 * mac80211 filters only based on association state, i.e. it drops
	 * Class 3 frames from not associated stations. hostapd sends
833 834 835
	 * deauth/disassoc frames when needed. In addition, hostapd is
	 * responsible for filtering on both auth and assoc states.
	 */
836

Johannes Berg's avatar
Johannes Berg committed
837
	if (ieee80211_vif_is_mesh(&rx->sdata->vif))
838 839
		return ieee80211_rx_mesh_check(rx);

840 841
	if (unlikely((ieee80211_is_data(hdr->frame_control) ||
		      ieee80211_is_pspoll(hdr->frame_control)) &&
842
		     rx->sdata->vif.type != NL80211_IFTYPE_ADHOC &&
Bill Jordan's avatar
Bill Jordan committed
843
		     rx->sdata->vif.type != NL80211_IFTYPE_WDS &&
844
		     (!rx->sta || !test_sta_flag(rx->sta, WLAN_STA_ASSOC)))) {
845 846 847 848 849 850 851 852 853 854 855 856
		if (rx->sta && rx->sta->dummy &&
		    ieee80211_is_data_present(hdr->frame_control)) {
			u16 ethertype;
			u8 *payload;

			payload = rx->skb->data +
				ieee80211_hdrlen(hdr->frame_control);
			ethertype = (payload[6] << 8) | payload[7];
			if (cpu_to_be16(ethertype) ==
			    rx->sdata->control_port_protocol)
				return RX_CONTINUE;
		}
Johannes Berg's avatar
Johannes Berg committed
857
		return RX_DROP_MONITOR;
858
	}
859

860
	return RX_CONTINUE;
861 862 863
}


864
static ieee80211_rx_result debug_noinline
865
ieee80211_rx_h_decrypt(struct ieee80211_rx_data *rx)
866
{
Johannes Berg's avatar
Johannes Berg committed
867 868 869
	struct sk_buff *skb = rx->skb;
	struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(skb);
	struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
870 871
	int keyidx;
	int hdrlen;
Johannes Berg's avatar
Johannes Berg committed
872
	ieee80211_rx_result result = RX_DROP_UNUSABLE;
873
	struct ieee80211_key *sta_ptk = NULL;
874
	int mmie_keyidx = -1;
875
	__le16 fc;
876

877 878 879
	/*
	 * Key selection 101
	 *
880
	 * There are four types of keys:
881
	 *  - GTK (group keys)
882
	 *  - IGTK (group keys for management frames)
883 884 885 886 887
	 *  - PTK (pairwise keys)
	 *  - STK (station-to-station pairwise keys)
	 *
	 * When selecting a key, we have to distinguish between multicast
	 * (including broadcast) and unicast frames, the latter can only
888 889 890 891
	 * use PTKs and STKs while the former always use GTKs and IGTKs.
	 * Unless, of course, actual WEP keys ("pre-RSNA") are used, then
	 * unicast frames can also use key indices like GTKs. Hence, if we
	 * don't have a PTK/STK we check the key index for a WEP key.
892
	 *
893 894 895 896
	 * Note that in a regular BSS, multicast frames are sent by the
	 * AP only, associated stations unicast the frame to the AP first
	 * which then multicasts it on their behalf.
	 *
897 898
	 * There is also a slight problem in IBSS mode: GTKs are negotiated
	 * with each station, that is something we don't currently handle.
899 900 901
	 * The spec seems to expect that one negotiates the same key with
	 * every station but there's no such requirement; VLANs could be
	 * possible.
902 903 904
	 */

	/*
905
	 * No point in finding a key and decrypting if the frame is neither
906 907
	 * addressed to us nor a multicast frame.
	 */
908
	if (!(status->rx_flags & IEEE80211_RX_RA_MATCH))
909
		return RX_CONTINUE;
910

911 912 913
	/* start without a key */
	rx->key = NULL;

914
	if (rx->sta)
915
		sta_ptk = rcu_dereference(rx->sta->ptk);
916

917 918 919
	fc = hdr->frame_control;

	if (!ieee80211_has_protected(fc))
920 921
		mmie_keyidx = ieee80211_get_mmie_keyidx(rx->skb);

922 923
	if (!is_multicast_ether_addr(hdr->addr1) && sta_ptk) {
		rx->key = sta_ptk;
924 925 926
		if ((status->flag & RX_FLAG_DECRYPTED) &&
		    (status->flag & RX_FLAG_IV_STRIPPED))
			return RX_CONTINUE;
927
		/* Skip decryption if the frame is not protected. */
928
		if (!ieee80211_has_protected(fc))
929
			return RX_CONTINUE;
930 931
	} else if (mmie_keyidx >= 0) {
		/* Broadcast/multicast robust management frame / BIP */
Johannes Berg's avatar
Johannes Berg committed
932 933
		if ((status->flag & RX_FLAG_DECRYPTED) &&
		    (status->flag & RX_FLAG_IV_STRIPPED))
934 935 936 937 938
			return RX_CONTINUE;

		if (mmie_keyidx < NUM_DEFAULT_KEYS ||
		    mmie_keyidx >= NUM_DEFAULT_KEYS + NUM_DEFAULT_MGMT_KEYS)
			return RX_DROP_MONITOR; /* unexpected BIP keyidx */
939 940 941 942
		if (rx->sta)
			rx->key = rcu_dereference(rx->sta->gtk[mmie_keyidx]);
		if (!rx->key)
			rx->key = rcu_dereference(rx->sdata->keys[mmie_keyidx]);
943
	} else if (!ieee80211_has_protected(fc)) {
944 945 946 947 948 949 950
		/*
		 * The frame was not protected, so skip decryption. However, we
		 * need to set rx->key if there is a key that could have been
		 * used so that the frame may be dropped if encryption would
		 * have been expected.
		 */
		struct ieee80211_key *key = NULL;
951 952 953
		struct ieee80211_sub_if_data *sdata = rx->sdata;
		int i;

954
		if (ieee80211_is_mgmt(fc) &&
955 956 957
		    is_multicast_ether_addr(hdr->addr1) &&
		    (key = rcu_dereference(rx->sdata->default_mgmt_key)))
			rx->key = key;
958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975
		else {
			if (rx->sta) {
				for (i = 0; i < NUM_DEFAULT_KEYS; i++) {
					key = rcu_dereference(rx->sta->gtk[i]);
					if (key)
						break;
				}
			}
			if (!key) {
				for (i = 0; i < NUM_DEFAULT_KEYS; i++) {
					key = rcu_dereference(sdata->keys[i]);
					if (key)
						break;
				}
			}
			if (key)
				rx->key = key;
		}
976
		return RX_CONTINUE;
977
	} else {
978
		u8 keyid;
979 980 981 982 983 984 985 986 987
		/*
		 * The device doesn't give us the IV so we won't be
		 * able to look up the key. That's ok though, we
		 * don't need to decrypt the frame, we just won't
		 * be able to keep statistics accurate.
		 * Except for key threshold notifications, should
		 * we somehow allow the driver to tell us which key
		 * the hardware used if this flag is set?
		 */
Johannes Berg's avatar
Johannes Berg committed
988 989
		if ((status->flag & RX_FLAG_DECRYPTED) &&
		    (status->flag & RX_FLAG_IV_STRIPPED))
990
			return RX_CONTINUE;
991

992
		hdrlen = ieee80211_hdrlen(fc);
993 994

		if (rx->skb->len < 8 + hdrlen)
Johannes Berg's avatar
Johannes Berg committed
995
			return RX_DROP_UNUSABLE; /* TODO: count this? */
996 997 998 999 1000

		/*
		 * no need to call ieee80211_wep_get_keyidx,
		 * it verifies a bunch of things we've done already
		 */
1001 1002
		skb_copy_bits(rx->skb, hdrlen + 3, &keyid, 1);
		keyidx = keyid >> 6;
1003

1004 1005 1006
		/* check per-station GTK first, if multicast packet */
		if (is_multicast_ether_addr(hdr->addr1) && rx->sta)
			rx->key = rcu_dereference(rx->sta->gtk[keyidx]);
1007

1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022
		/* if not found, try default key */
		if (!rx->key) {
			rx->key = rcu_dereference(rx->sdata->keys[keyidx]);

			/*
			 * RSNA-protected unicast frames should always be
			 * sent with pairwise or station-to-station keys,
			 * but for WEP we allow using a key index as well.
			 */
			if (rx->key &&
			    rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 &&
			    rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 &&
			    !is_multicast_ether_addr(hdr->addr1))
				rx->key = NULL;
		}
1023 1024
	}

1025
	if (rx->key) {
1026 1027 1028
		if (unlikely(rx->key->flags & KEY_FLAG_TAINTED))
			return RX_DROP_MONITOR;

1029
		rx->key->tx_rx_count++;
1030
		/* TODO: add threshold stuff again */
1031
	} else {
Johannes Berg's avatar
Johannes Berg committed
1032
		return RX_DROP_MONITOR;
1033 1034
	}

1035 1036
	if (skb_linearize(rx->skb))
		return RX_DROP_UNUSABLE;
1037
	/* the hdr variable is invalid now! */
1038

1039 1040 1041
	switch (rx->key->conf.cipher) {
	case WLAN_CIPHER_SUITE_WEP40:
	case WLAN_CIPHER_SUITE_WEP104:
1042 1043 1044 1045 1046 1047 1048
		/* Check for weak IVs if possible */
		if (rx->sta && ieee80211_is_data(fc) &&
		    (!(status->flag & RX_FLAG_IV_STRIPPED) ||
		     !(status->flag & RX_FLAG_DECRYPTED)) &&
		    ieee80211_wep_is_weak_iv(rx->skb, rx->key))
			rx->sta->wep_weak_iv_count++;

1049 1050
		result = ieee80211_crypto_wep_decrypt(rx);
		break;
1051
	case WLAN_CIPHER_SUITE_TKIP:
1052 1053
		result = ieee80211_crypto_tkip_decrypt(rx);
		break;
1054
	case WLAN_CIPHER_SUITE_CCMP:
1055 1056
		result = ieee80211_crypto_ccmp_decrypt(rx);
		break;
1057
	case WLAN_CIPHER_SUITE_AES_CMAC:
1058 1059
		result = ieee80211_crypto_aes_cmac_decrypt(rx);
		break;
1060 1061 1062 1063 1064 1065
	default:
		/*
		 * We can reach here only with HW-only algorithms
		 * but why didn't it decrypt the frame?!
		 */
		return RX_DROP_UNUSABLE;
1066 1067
	}

1068
	/* either the frame has been decrypted or will be dropped */
Johannes Berg's avatar
Johannes Berg committed
1069
	status->flag |= RX_FLAG_DECRYPTED;
1070 1071

	return result;
1072 1073
}

1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106
static ieee80211_rx_result debug_noi