Sfoglia il codice sorgente

qcacld-3.0: Add logic to check if OCI is valid or not

Add logic to check if OCI element in SA query request/responese
valid or not while host and peer both OCV capable.
Don't transmit SA query response when SA query request with
invalid OCI is received from peer.
Similarly, Don't treat it as a valid SA query response if the
OCI element in it is invalid.

Only with logic above, we can pass the WFA WPA3 R3 OCV test
case 14.4.1/14.4.3.

Change-Id: Iefd19f2f7de13b2ed725afed6921ad320307a372
CRs-Fixed: 3106166
Lihua Liu 3 anni fa
parent
commit
dc7dc2e2a7

+ 74 - 19
core/mac/src/pe/lim/lim_process_action_frame.c

@@ -1,6 +1,6 @@
 /*
  * Copyright (c) 2012-2021 The Linux Foundation. All rights reserved.
- * Copyright (c) 2021 Qualcomm Innovation Center, Inc. All rights reserved.
+ * Copyright (c) 2021-2022 Qualcomm Innovation Center, Inc. All rights reserved.
  *
  * Permission to use, copy, modify, and/or distribute this software for
  * any purpose with or without fee is hereby granted, provided that the
@@ -59,6 +59,7 @@
 (DOT11F_FF_CATEGORY_LEN + DOT11F_FF_ACTION_LEN + DOT11F_FF_TRANSACTIONID_LEN)
 #define SA_QUERY_RESP_MIN_LEN \
 (DOT11F_FF_CATEGORY_LEN + DOT11F_FF_ACTION_LEN + DOT11F_FF_TRANSACTIONID_LEN)
+#define SA_QUERY_IE_OFFSET (4)
 
 static last_processed_msg rrm_link_action_frm;
 
@@ -1286,6 +1287,48 @@ __lim_process_neighbor_report(struct mac_context *mac, uint8_t *pRxPacketInfo,
 	qdf_mem_free(pFrm);
 }
 
+static bool
+lim_check_oci_match(struct mac_context *mac, struct pe_session *pe_session,
+		    uint8_t *ie, uint8_t *peer, uint32_t ie_len)
+{
+	const uint8_t *oci_ie;
+	tDot11fIEoci self_oci, *peer_oci;
+
+	if (!lim_is_self_and_peer_ocv_capable(mac, peer, pe_session))
+		return true;
+
+	oci_ie = wlan_get_ie_ptr_from_eid(DOT11F_EID_OCI, ie, ie_len);
+	if (!oci_ie) {
+		pe_err("OCV not found OCI in SA Query frame!");
+		return false;
+	}
+
+	/* OCV enabled, check the OCI information:
+	 * Element ID           : 1 byte
+	 * Packet length        : 1 byte
+	 * Element ID extension : 1 byte
+	 * Operating class      : 1 byte
+	 * Primary channel      : 1 byte
+	 * Freq_seg_1_ch_num    : 1 byte
+	 */
+	peer_oci = (tDot11fIEoci *)&oci_ie[2];
+	lim_fill_oci_params(mac, pe_session, &self_oci);
+
+	if ((self_oci.op_class != peer_oci->op_class) ||
+	    (self_oci.prim_ch_num != peer_oci->prim_ch_num) ||
+	    (self_oci.freq_seg_1_ch_num != peer_oci->freq_seg_1_ch_num)) {
+		pe_err("OCI mismatch,self %d %d %d, peer %d %d %d",
+		       self_oci.op_class,
+		       self_oci.prim_ch_num,
+		       self_oci.freq_seg_1_ch_num,
+		       peer_oci->op_class,
+		       peer_oci->prim_ch_num,
+		       peer_oci->freq_seg_1_ch_num);
+		return false;
+	}
+
+	return true;
+}
 
 /**
  * limProcessSAQueryRequestActionFrame
@@ -1310,8 +1353,8 @@ static void __lim_process_sa_query_request_action_frame(struct mac_context *mac,
 							uint8_t *pRxPacketInfo,
 							struct pe_session *pe_session)
 {
-	tpSirMacMgmtHdr pHdr;
-	uint8_t *pBody;
+	tpSirMacMgmtHdr mac_header;
+	uint8_t *p_body;
 	uint32_t frame_len;
 	uint8_t transId[2];
 
@@ -1319,8 +1362,8 @@ static void __lim_process_sa_query_request_action_frame(struct mac_context *mac,
 	   pHdr = SIR_MAC_BD_TO_MPDUHEADER(pBd);
 	   pBody = SIR_MAC_BD_TO_MPDUDATA(pBd); */
 
-	pHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
-	pBody = WMA_GET_RX_MPDU_DATA(pRxPacketInfo);
+	mac_header = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
+	p_body = WMA_GET_RX_MPDU_DATA(pRxPacketInfo);
 	frame_len = WMA_GET_RX_PAYLOAD_LEN(pRxPacketInfo);
 
 	if (frame_len < SA_QUERY_REQ_MIN_LEN) {
@@ -1328,7 +1371,7 @@ static void __lim_process_sa_query_request_action_frame(struct mac_context *mac,
 		return;
 	}
 	/* If this is an unprotected SA Query Request, then ignore it. */
-	if (pHdr->fc.wep == 0)
+	if (mac_header->fc.wep == 0)
 		return;
 
 	/* 11w offload is enabled then firmware should not fwd this frame */
@@ -1343,12 +1386,18 @@ static void __lim_process_sa_query_request_action_frame(struct mac_context *mac,
 	   Category       : 1 byte
 	   Action         : 1 byte
 	   Transaction ID : 2 bytes */
-	qdf_mem_copy(&transId[0], &pBody[2], 2);
+	qdf_mem_copy(&transId[0], &p_body[2], 2);
+
+	if (!lim_check_oci_match(mac, pe_session,
+				 p_body + SA_QUERY_IE_OFFSET,
+				 mac_header->sa,
+				 frame_len - SA_QUERY_IE_OFFSET))
+		return;
 
 	/* Send 11w SA query response action frame */
 	if (lim_send_sa_query_response_frame(mac,
 					     transId,
-					     pHdr->sa,
+					     mac_header->sa,
 					     pe_session) != QDF_STATUS_SUCCESS) {
 		pe_err("fail to send SA query response action frame");
 		return;
@@ -1377,17 +1426,17 @@ static void __lim_process_sa_query_response_action_frame(struct mac_context *mac
 							 uint8_t *pRxPacketInfo,
 							 struct pe_session *pe_session)
 {
-	tpSirMacMgmtHdr pHdr;
+	tpSirMacMgmtHdr m_hdr;
 	uint32_t frame_len;
-	uint8_t *pBody;
+	uint8_t *p_body;
 	tpDphHashNode pSta;
 	uint16_t aid;
 	uint16_t transId;
 	uint8_t retryNum;
 
-	pHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
+	m_hdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
 	frame_len = WMA_GET_RX_PAYLOAD_LEN(pRxPacketInfo);
-	pBody = WMA_GET_RX_MPDU_DATA(pRxPacketInfo);
+	p_body = WMA_GET_RX_MPDU_DATA(pRxPacketInfo);
 	pe_debug("SA Query Response received");
 
 	if (frame_len < SA_QUERY_RESP_MIN_LEN) {
@@ -1398,8 +1447,8 @@ static void __lim_process_sa_query_response_action_frame(struct mac_context *mac
 	 * Forward to SME to HDD to wpa_supplicant.
 	 */
 	if (LIM_IS_STA_ROLE(pe_session)) {
-		lim_send_sme_mgmt_frame_ind(mac, pHdr->fc.subType,
-					    (uint8_t *)pHdr,
+		lim_send_sme_mgmt_frame_ind(mac, m_hdr->fc.subType,
+					    (uint8_t *)m_hdr,
 					    frame_len + sizeof(tSirMacMgmtHdr),
 					    0,
 					    WMA_GET_RX_FREQ(pRxPacketInfo),
@@ -1410,18 +1459,18 @@ static void __lim_process_sa_query_response_action_frame(struct mac_context *mac
 	}
 
 	/* If this is an unprotected SA Query Response, then ignore it. */
-	if (pHdr->fc.wep == 0)
+	if (m_hdr->fc.wep == 0)
 		return;
 
 	pSta =
-		dph_lookup_hash_entry(mac, pHdr->sa, &aid,
+		dph_lookup_hash_entry(mac, m_hdr->sa, &aid,
 				      &pe_session->dph.dphHashTable);
 	if (!pSta)
 		return;
 
 	pe_debug("SA Query Response source addr:  %0x:%0x:%0x:%0x:%0x:%0x",
-		pHdr->sa[0], pHdr->sa[1], pHdr->sa[2], pHdr->sa[3],
-		pHdr->sa[4], pHdr->sa[5]);
+		 m_hdr->sa[0], m_hdr->sa[1], m_hdr->sa[2], m_hdr->sa[3],
+		 m_hdr->sa[4], m_hdr->sa[5]);
 	pe_debug("SA Query state for station: %d", pSta->pmfSaQueryState);
 
 	if (DPH_SA_QUERY_IN_PROGRESS != pSta->pmfSaQueryState)
@@ -1432,13 +1481,19 @@ static void __lim_process_sa_query_response_action_frame(struct mac_context *mac
 	   Category       : 1 byte
 	   Action         : 1 byte
 	   Transaction ID : 2 bytes */
-	qdf_mem_copy(&transId, &pBody[2], 2);
+	qdf_mem_copy(&transId, &p_body[2], 2);
 
 	/* If SA Query is in progress with the station and the station
 	   responds then the association request that triggered the SA
 	   query is from a rogue station, just go back to initial state. */
 	for (retryNum = 0; retryNum <= pSta->pmfSaQueryRetryCount; retryNum++)
 		if (transId == pSta->pmfSaQueryStartTransId + retryNum) {
+			if (!lim_check_oci_match(mac, pe_session,
+						 p_body + SA_QUERY_IE_OFFSET,
+						 m_hdr->sa,
+						 frame_len -
+						 SA_QUERY_IE_OFFSET))
+				return;
 			pe_debug("Found matching SA Query Request - transaction ID: %d",
 				transId);
 			tx_timer_deactivate(&pSta->pmfSaQueryTimer);

+ 3 - 3
core/mac/src/pe/lim/lim_send_management_frames.c

@@ -1,6 +1,6 @@
 /*
  * Copyright (c) 2011-2021 The Linux Foundation. All rights reserved.
- * Copyright (c) 2021 Qualcomm Innovation Center, Inc. All rights reserved.
+ * Copyright (c) 2021-2022 Qualcomm Innovation Center, Inc. All rights reserved.
  *
  * Permission to use, copy, modify, and/or distribute this software for
  * any purpose with or without fee is hereby granted, provided that the
@@ -5224,7 +5224,7 @@ returnAfterError:
 	return status_code;
 }
 
-static bool
+bool
 lim_is_self_and_peer_ocv_capable(struct mac_context *mac,
 				 uint8_t *peer,
 				 struct pe_session *pe_session)
@@ -5246,7 +5246,7 @@ lim_is_self_and_peer_ocv_capable(struct mac_context *mac,
 	return false;
 }
 
-static void
+void
 lim_fill_oci_params(struct mac_context *mac, struct pe_session *session,
 		    tDot11fIEoci *oci)
 {

+ 27 - 1
core/mac/src/pe/lim/lim_utils.h

@@ -1,6 +1,6 @@
 /*
  * Copyright (c) 2012-2021 The Linux Foundation. All rights reserved.
- * Copyright (c) 2021 Qualcomm Innovation Center, Inc. All rights reserved.
+ * Copyright (c) 2021-2022 Qualcomm Innovation Center, Inc. All rights reserved.
  *
  * Permission to use, copy, modify, and/or distribute this software for
  * any purpose with or without fee is hereby granted, provided that the
@@ -2765,4 +2765,30 @@ void lim_process_tpe_ie_from_beacon(struct mac_context *mac,
  * Return: void
  */
 void lim_send_conc_params_update(void);
+
+/**
+ * lim_is_self_and_peer_ocv_capable() - check whether OCV capable
+ * @mac:        pointer to mac data
+ * @pe_session: pointer to pe session
+.* @peer:       peer mac address
+ *
+ * Return: true if both self and peer ocv capable
+ */
+bool
+lim_is_self_and_peer_ocv_capable(struct mac_context *mac,
+				 uint8_t *peer,
+				 struct pe_session *pe_session);
+
+/**
+ * lim_fill_oci_params() - fill oci parameters
+ * @mac:        pointer to mac data
+ * @session: pointer to pe session
+.* @oci:       pointer of tDot11fIEoci
+ *
+ * Return: void
+ */
+void
+lim_fill_oci_params(struct mac_context *mac, struct pe_session *session,
+		    tDot11fIEoci *oci);
+
 #endif /* __LIM_UTILS_H */