aboutsummaryrefslogtreecommitdiffstats
path: root/package/madwifi/patches/309-micfail_detect.patch
diff options
context:
space:
mode:
Diffstat (limited to 'package/madwifi/patches/309-micfail_detect.patch')
-rw-r--r--package/madwifi/patches/309-micfail_detect.patch321
1 files changed, 0 insertions, 321 deletions
diff --git a/package/madwifi/patches/309-micfail_detect.patch b/package/madwifi/patches/309-micfail_detect.patch
deleted file mode 100644
index ca4103a206..0000000000
--- a/package/madwifi/patches/309-micfail_detect.patch
+++ /dev/null
@@ -1,321 +0,0 @@
---- a/ath/if_ath.c
-+++ b/ath/if_ath.c
-@@ -6457,6 +6457,7 @@ ath_rx_poll(struct net_device *dev, int
- int type;
- u_int phyerr;
- u_int processed = 0, early_stop = 0;
-+ u_int mic_fail = 0;
-
- DPRINTF(sc, ATH_DEBUG_RX_PROC, "invoked\n");
- process_rx_again:
-@@ -6558,24 +6559,8 @@ process_rx_again:
- }
- if (rs->rs_status & HAL_RXERR_MIC) {
- sc->sc_stats.ast_rx_badmic++;
-- /*
-- * Do minimal work required to hand off
-- * the 802.11 header for notification.
-- */
-- /* XXX frag's and QoS frames */
-- if (len >= sizeof (struct ieee80211_frame)) {
-- bus_dma_sync_single(sc->sc_bdev,
-- bf->bf_skbaddr, len,
-- BUS_DMA_FROMDEVICE);
--#if 0
--/* XXX revalidate MIC, lookup ni to find VAP */
-- ieee80211_notify_michael_failure(ic,
-- (struct ieee80211_frame *)skb->data,
-- sc->sc_splitmic ?
-- rs->rs_keyix - 32 : rs->rs_keyix
-- );
--#endif
-- }
-+ mic_fail = 1;
-+ goto rx_accept;
- }
- /*
- * Reject error frames if we have no vaps that
-@@ -6614,8 +6599,9 @@ rx_accept:
- /*
- * Finished monitor mode handling, now reject
- * error frames before passing to other vaps
-+ * Ignore MIC failures here, as we need to recheck them
- */
-- if (rs->rs_status != 0) {
-+ if (rs->rs_status & ~(HAL_RXERR_MIC | HAL_RXERR_DECRYPT)) {
- ieee80211_dev_kfree_skb(&skb);
- goto rx_next;
- }
-@@ -6623,6 +6609,26 @@ rx_accept:
- /* remove the CRC */
- skb_trim(skb, skb->len - IEEE80211_CRC_LEN);
-
-+ if (mic_fail) {
-+ /* Ignore control frames which are reported with mic error */
-+ if ((((struct ieee80211_frame *)skb->data)->i_fc[0] &
-+ IEEE80211_FC0_TYPE_MASK) == IEEE80211_FC0_TYPE_CTL)
-+ goto drop_micfail;
-+
-+ ni = ieee80211_find_rxnode(ic, (const struct ieee80211_frame_min *) skb->data);
-+
-+ if (ni && ni->ni_table) {
-+ ieee80211_check_mic(ni, skb);
-+ ieee80211_unref_node(&ni);
-+ }
-+
-+drop_micfail:
-+ dev_kfree_skb_any(skb);
-+ skb = NULL;
-+ mic_fail = 0;
-+ goto rx_next;
-+ }
-+
- /*
- * From this point on we assume the frame is at least
- * as large as ieee80211_frame_min; verify that.
-@@ -6635,6 +6641,7 @@ rx_accept:
- goto rx_next;
- }
-
-+ /* MIC failure. Drop the packet in any case */
- /*
- * Normal receive.
- */
---- a/net80211/ieee80211_crypto_ccmp.c
-+++ b/net80211/ieee80211_crypto_ccmp.c
-@@ -73,7 +73,7 @@ static int ccmp_setkey(struct ieee80211_
- static int ccmp_encap(struct ieee80211_key *, struct sk_buff *, u_int8_t);
- static int ccmp_decap(struct ieee80211_key *, struct sk_buff *, int);
- static int ccmp_enmic(struct ieee80211_key *, struct sk_buff *, int);
--static int ccmp_demic(struct ieee80211_key *, struct sk_buff *, int);
-+static int ccmp_demic(struct ieee80211_key *, struct sk_buff *, int, int);
-
- static const struct ieee80211_cipher ccmp = {
- .ic_name = "AES-CCM",
-@@ -314,7 +314,7 @@ ccmp_decap(struct ieee80211_key *k, stru
- * Verify and strip MIC from the frame.
- */
- static int
--ccmp_demic(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen)
-+ccmp_demic(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen, int force)
- {
- return 1;
- }
---- a/net80211/ieee80211_crypto.h
-+++ b/net80211/ieee80211_crypto.h
-@@ -145,7 +145,7 @@ struct ieee80211_cipher {
- int (*ic_encap)(struct ieee80211_key *, struct sk_buff *, u_int8_t);
- int (*ic_decap)(struct ieee80211_key *, struct sk_buff *, int);
- int (*ic_enmic)(struct ieee80211_key *, struct sk_buff *, int);
-- int (*ic_demic)(struct ieee80211_key *, struct sk_buff *, int);
-+ int (*ic_demic)(struct ieee80211_key *, struct sk_buff *, int, int);
- };
- extern const struct ieee80211_cipher ieee80211_cipher_none;
-
-@@ -163,10 +163,10 @@ struct ieee80211_key *ieee80211_crypto_d
- */
- static __inline int
- ieee80211_crypto_demic(struct ieee80211vap *vap, struct ieee80211_key *k,
-- struct sk_buff *skb, int hdrlen)
-+ struct sk_buff *skb, int hdrlen, int force)
- {
- const struct ieee80211_cipher *cip = k->wk_cipher;
-- return (cip->ic_miclen > 0 ? cip->ic_demic(k, skb, hdrlen) : 1);
-+ return (cip->ic_miclen > 0 ? cip->ic_demic(k, skb, hdrlen, force) : 1);
- }
-
- /*
---- a/net80211/ieee80211_crypto_none.c
-+++ b/net80211/ieee80211_crypto_none.c
-@@ -52,7 +52,7 @@ static int none_setkey(struct ieee80211_
- static int none_encap(struct ieee80211_key *, struct sk_buff *, u_int8_t);
- static int none_decap(struct ieee80211_key *, struct sk_buff *, int);
- static int none_enmic(struct ieee80211_key *, struct sk_buff *, int);
--static int none_demic(struct ieee80211_key *, struct sk_buff *, int);
-+static int none_demic(struct ieee80211_key *, struct sk_buff *, int, int);
-
- const struct ieee80211_cipher ieee80211_cipher_none = {
- .ic_name = "NONE",
-@@ -137,7 +137,7 @@ none_enmic(struct ieee80211_key *k, stru
- }
-
- static int
--none_demic(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen)
-+none_demic(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen, int force)
- {
- struct ieee80211vap *vap = k->wk_private;
-
---- a/net80211/ieee80211_crypto_tkip.c
-+++ b/net80211/ieee80211_crypto_tkip.c
-@@ -57,7 +57,7 @@ static int tkip_setkey(struct ieee80211_
- static int tkip_encap(struct ieee80211_key *, struct sk_buff *, u_int8_t);
- static int tkip_enmic(struct ieee80211_key *, struct sk_buff *, int);
- static int tkip_decap(struct ieee80211_key *, struct sk_buff *, int);
--static int tkip_demic(struct ieee80211_key *, struct sk_buff *, int);
-+static int tkip_demic(struct ieee80211_key *, struct sk_buff *, int, int);
-
- static const struct ieee80211_cipher tkip = {
- .ic_name = "TKIP",
-@@ -339,7 +339,7 @@ tkip_decap(struct ieee80211_key *k, stru
- * Verify and strip MIC from the frame.
- */
- static int
--tkip_demic(struct ieee80211_key *k, struct sk_buff *skb0, int hdrlen)
-+tkip_demic(struct ieee80211_key *k, struct sk_buff *skb0, int hdrlen, int force)
- {
- struct tkip_ctx *ctx = k->wk_private;
- struct sk_buff *skb;
-@@ -355,7 +355,7 @@ tkip_demic(struct ieee80211_key *k, stru
- }
- wh = (struct ieee80211_frame *) skb0->data;
- /* NB: skb left pointing at last in chain */
-- if (k->wk_flags & IEEE80211_KEY_SWMIC) {
-+ if ((k->wk_flags & IEEE80211_KEY_SWMIC) || force) {
- struct ieee80211vap *vap = ctx->tc_vap;
- u8 mic[IEEE80211_WEP_MICLEN];
- u8 mic0[IEEE80211_WEP_MICLEN];
---- a/net80211/ieee80211_crypto_wep.c
-+++ b/net80211/ieee80211_crypto_wep.c
-@@ -54,7 +54,7 @@ static int wep_setkey(struct ieee80211_k
- static int wep_encap(struct ieee80211_key *, struct sk_buff *, u_int8_t);
- static int wep_decap(struct ieee80211_key *, struct sk_buff *, int);
- static int wep_enmic(struct ieee80211_key *, struct sk_buff *, int);
--static int wep_demic(struct ieee80211_key *, struct sk_buff *, int);
-+static int wep_demic(struct ieee80211_key *, struct sk_buff *, int, int);
-
- static const struct ieee80211_cipher wep = {
- .ic_name = "WEP",
-@@ -244,7 +244,7 @@ wep_decap(struct ieee80211_key *k, struc
- * Verify and strip MIC from the frame.
- */
- static int
--wep_demic(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen)
-+wep_demic(struct ieee80211_key *k, struct sk_buff *skb, int hdrlen, int force)
- {
- return 1;
- }
---- a/net80211/ieee80211_input.c
-+++ b/net80211/ieee80211_input.c
-@@ -669,7 +669,7 @@ ieee80211_input(struct ieee80211vap * va
- * Next strip any MSDU crypto bits.
- */
- if (key != NULL &&
-- !ieee80211_crypto_demic(vap, key, skb, hdrspace)) {
-+ !ieee80211_crypto_demic(vap, key, skb, hdrspace, 0)) {
- IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
- ni->ni_macaddr, "data", "%s", "demic error");
- IEEE80211_NODE_STAT(ni, rx_demicfail);
-@@ -4293,6 +4293,47 @@ ath_eth_type_trans(struct sk_buff *skb,
- }
- #endif
-
-+/*
-+ * Process a frame w/ hw detected MIC failure.
-+ * The frame will be dropped in any case.
-+ */
-+void
-+ieee80211_check_mic(struct ieee80211_node *ni, struct sk_buff *skb)
-+{
-+ struct ieee80211vap *vap = ni->ni_vap;
-+
-+ struct ieee80211_frame *wh;
-+ struct ieee80211_key *key;
-+ int hdrspace;
-+ struct ieee80211com *ic = vap->iv_ic;
-+
-+ if (skb->len < sizeof(struct ieee80211_frame_min)) {
-+ IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_ANY,
-+ ni->ni_macaddr, NULL,
-+ "too short (1): len %u", skb->len);
-+ vap->iv_stats.is_rx_tooshort++;
-+ return;
-+ }
-+
-+ wh = (struct ieee80211_frame *)skb->data;
-+
-+ hdrspace = ieee80211_hdrspace(ic, wh);
-+ key = ieee80211_crypto_decap(ni, skb, hdrspace);
-+ if (key == NULL) {
-+ /* NB: stats+msgs handled in crypto_decap */
-+ IEEE80211_NODE_STAT(ni, rx_wepfail);
-+ return;
-+ }
-+
-+ if (!ieee80211_crypto_demic(vap, key, skb, hdrspace, 1)) {
-+ IEEE80211_DISCARD_MAC(vap, IEEE80211_MSG_INPUT,
-+ ni->ni_macaddr, "data", "%s", "demic error");
-+ IEEE80211_NODE_STAT(ni, rx_demicfail);
-+ }
-+ return;
-+}
-+EXPORT_SYMBOL(ieee80211_check_mic);
-+
- #ifdef IEEE80211_DEBUG
- /*
- * Debugging support.
---- a/net80211/ieee80211_proto.h
-+++ b/net80211/ieee80211_proto.h
-@@ -90,6 +90,7 @@ int ieee80211_iserp_rateset(struct ieee8
- void ieee80211_set11gbasicrates(struct ieee80211_rateset *, enum ieee80211_phymode);
- enum ieee80211_phymode ieee80211_get11gbasicrates(struct ieee80211_rateset *);
- void ieee80211_send_pspoll(struct ieee80211_node *);
-+void ieee80211_check_mic(struct ieee80211_node *, struct sk_buff *);
-
- /*
- * Return the size of the 802.11 header for a management or data frame.
---- a/net80211/ieee80211_linux.c
-+++ b/net80211/ieee80211_linux.c
-@@ -337,8 +337,8 @@ ieee80211_notify_replay_failure(struct i
- /* TODO: needed parameters: count, keyid, key type, src address, TSC */
- snprintf(buf, sizeof(buf), "%s(keyid=%d %scast addr=" MAC_FMT ")", tag,
- k->wk_keyix,
-- IEEE80211_IS_MULTICAST(wh->i_addr1) ? "broad" : "uni",
-- MAC_ADDR(wh->i_addr1));
-+ IEEE80211_IS_MULTICAST(wh->i_addr2) ? "broad" : "uni",
-+ MAC_ADDR(wh->i_addr2));
- memset(&wrqu, 0, sizeof(wrqu));
- wrqu.data.length = strlen(buf);
- wireless_send_event(dev, IWEVCUSTOM, &wrqu, buf);
---- a/net80211/ieee80211_output.c
-+++ b/net80211/ieee80211_output.c
-@@ -1074,13 +1074,16 @@ ieee80211_encap(struct ieee80211_node *n
- cip = (struct ieee80211_cipher *) key->wk_cipher;
- ciphdrsize = cip->ic_header;
- tailsize += (cip->ic_trailer + cip->ic_miclen);
-+
-+ /* add the 8 bytes MIC length */
-+ if (cip->ic_cipher == IEEE80211_CIPHER_TKIP)
-+ pktlen += IEEE80211_WEP_MICLEN;
- }
-
- pdusize = vap->iv_fragthreshold - (hdrsize_nopad + ciphdrsize);
- fragcnt = *framecnt =
-- ((pktlen - (hdrsize_nopad + ciphdrsize)) / pdusize) +
-- (((pktlen - (hdrsize_nopad + ciphdrsize)) %
-- pdusize == 0) ? 0 : 1);
-+ ((pktlen - hdrsize_nopad) / pdusize) +
-+ (((pktlen - hdrsize_nopad) % pdusize == 0) ? 0 : 1);
-
- /*
- * Allocate sk_buff for each subsequent fragment; First fragment
---- a/net80211/ieee80211_node.c
-+++ b/net80211/ieee80211_node.c
-@@ -2264,11 +2264,13 @@ ieee80211_node_leave(struct ieee80211_no
- /* From this point onwards we can no longer find the node,
- * so no more references are generated
- */
-- ieee80211_remove_wds_addr(nt, ni->ni_macaddr);
-- ieee80211_del_wds_node(nt, ni);
-- IEEE80211_NODE_TABLE_LOCK_IRQ(nt);
-- node_table_leave_locked(nt, ni);
-- IEEE80211_NODE_TABLE_UNLOCK_IRQ(nt);
-+ if (nt) {
-+ ieee80211_remove_wds_addr(nt, ni->ni_macaddr);
-+ ieee80211_del_wds_node(nt, ni);
-+ IEEE80211_NODE_TABLE_LOCK_IRQ(nt);
-+ node_table_leave_locked(nt, ni);
-+ IEEE80211_NODE_TABLE_UNLOCK_IRQ(nt);
-+ }
-
- /*
- * If node wasn't previously associated all