fst_session.c 32 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274
  1. /*
  2. * FST module - FST Session implementation
  3. * Copyright (c) 2014, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/eloop.h"
  11. #include "common/defs.h"
  12. #include "fst/fst_internal.h"
  13. #include "fst/fst_defs.h"
  14. #include "fst/fst_ctrl_iface.h"
  15. #define US_80211_TU 1024
  16. #define US_TO_TU(m) ((m) * / US_80211_TU)
  17. #define TU_TO_US(m) ((m) * US_80211_TU)
  18. #define FST_LLT_SWITCH_IMMEDIATELY 0
  19. #define fst_printf_session(s, level, format, ...) \
  20. fst_printf((level), "%u (0x%08x): [" MACSTR "," MACSTR "] :" format, \
  21. (s)->id, (s)->data.fsts_id, \
  22. MAC2STR((s)->data.old_peer_addr), \
  23. MAC2STR((s)->data.new_peer_addr), \
  24. ##__VA_ARGS__)
  25. #define fst_printf_siface(s, iface, level, format, ...) \
  26. fst_printf_session((s), (level), "%s: " format, \
  27. fst_iface_get_name(iface), ##__VA_ARGS__)
  28. #define fst_printf_sframe(s, is_old, level, format, ...) \
  29. fst_printf_siface((s), \
  30. (is_old) ? (s)->data.old_iface : (s)->data.new_iface, \
  31. (level), format, ##__VA_ARGS__)
  32. #define FST_LLT_MS_DEFAULT 50
  33. #define FST_ACTION_MAX_SUPPORTED FST_ACTION_ON_CHANNEL_TUNNEL
  34. const char * const fst_action_names[] = {
  35. [FST_ACTION_SETUP_REQUEST] = "Setup Request",
  36. [FST_ACTION_SETUP_RESPONSE] = "Setup Response",
  37. [FST_ACTION_TEAR_DOWN] = "Tear Down",
  38. [FST_ACTION_ACK_REQUEST] = "Ack Request",
  39. [FST_ACTION_ACK_RESPONSE] = "Ack Response",
  40. [FST_ACTION_ON_CHANNEL_TUNNEL] = "On Channel Tunnel",
  41. };
  42. struct fst_session {
  43. struct {
  44. /* Session configuration that can be zeroed on reset */
  45. u8 old_peer_addr[ETH_ALEN];
  46. u8 new_peer_addr[ETH_ALEN];
  47. struct fst_iface *new_iface;
  48. struct fst_iface *old_iface;
  49. u32 llt_ms;
  50. u8 pending_setup_req_dlgt;
  51. u32 fsts_id; /* FSTS ID, see spec, 8.4.2.147
  52. * Session Transition element */
  53. } data;
  54. /* Session object internal fields which won't be zeroed on reset */
  55. struct dl_list global_sessions_lentry;
  56. u32 id; /* Session object ID used to identify
  57. * specific session object */
  58. struct fst_group *group;
  59. enum fst_session_state state;
  60. Boolean stt_armed;
  61. };
  62. static struct dl_list global_sessions_list;
  63. static u32 global_session_id = 0;
  64. #define foreach_fst_session(s) \
  65. dl_list_for_each((s), &global_sessions_list, \
  66. struct fst_session, global_sessions_lentry)
  67. #define foreach_fst_session_safe(s, temp) \
  68. dl_list_for_each_safe((s), (temp), &global_sessions_list, \
  69. struct fst_session, global_sessions_lentry)
  70. static void fst_session_global_inc_id(void)
  71. {
  72. global_session_id++;
  73. if (global_session_id == FST_INVALID_SESSION_ID)
  74. global_session_id++;
  75. }
  76. int fst_session_global_init(void)
  77. {
  78. dl_list_init(&global_sessions_list);
  79. return 0;
  80. }
  81. void fst_session_global_deinit(void)
  82. {
  83. WPA_ASSERT(dl_list_empty(&global_sessions_list));
  84. }
  85. static inline void fst_session_notify_ctrl(struct fst_session *s,
  86. enum fst_event_type event_type,
  87. union fst_event_extra *extra)
  88. {
  89. foreach_fst_ctrl_call(on_event, event_type, NULL, s, extra);
  90. }
  91. static void fst_session_set_state(struct fst_session *s,
  92. enum fst_session_state state,
  93. union fst_session_state_switch_extra *extra)
  94. {
  95. if (s->state != state) {
  96. union fst_event_extra evext = {
  97. .session_state = {
  98. .old_state = s->state,
  99. .new_state = state,
  100. },
  101. };
  102. if (extra)
  103. evext.session_state.extra = *extra;
  104. fst_session_notify_ctrl(s, EVENT_FST_SESSION_STATE_CHANGED,
  105. &evext);
  106. fst_printf_session(s, MSG_INFO, "State: %s => %s",
  107. fst_session_state_name(s->state),
  108. fst_session_state_name(state));
  109. s->state = state;
  110. }
  111. }
  112. static u32 fst_find_free_session_id(void)
  113. {
  114. u32 i, id = FST_INVALID_SESSION_ID;
  115. struct fst_session *s;
  116. for (i = 0; i < (u32) -1; i++) {
  117. Boolean in_use = FALSE;
  118. foreach_fst_session(s) {
  119. if (s->id == global_session_id) {
  120. fst_session_global_inc_id();
  121. in_use = TRUE;
  122. break;
  123. }
  124. }
  125. if (!in_use) {
  126. id = global_session_id;
  127. fst_session_global_inc_id();
  128. break;
  129. }
  130. }
  131. return id;
  132. }
  133. static void fst_session_timeout_handler(void *eloop_data, void *user_ctx)
  134. {
  135. struct fst_session *s = user_ctx;
  136. union fst_session_state_switch_extra extra = {
  137. .to_initial = {
  138. .reason = REASON_STT,
  139. },
  140. };
  141. fst_printf_session(s, MSG_WARNING, "Session State Timeout");
  142. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &extra);
  143. }
  144. static void fst_session_stt_arm(struct fst_session *s)
  145. {
  146. eloop_register_timeout(0, TU_TO_US(FST_DEFAULT_SESSION_TIMEOUT_TU),
  147. fst_session_timeout_handler, NULL, s);
  148. s->stt_armed = TRUE;
  149. }
  150. static void fst_session_stt_disarm(struct fst_session *s)
  151. {
  152. if (s->stt_armed) {
  153. eloop_cancel_timeout(fst_session_timeout_handler, NULL, s);
  154. s->stt_armed = FALSE;
  155. }
  156. }
  157. static Boolean fst_session_is_in_transition(struct fst_session *s)
  158. {
  159. /* See spec, 10.32.2.2 Transitioning between states */
  160. return s->stt_armed;
  161. }
  162. static int fst_session_is_in_progress(struct fst_session *s)
  163. {
  164. return s->state != FST_SESSION_STATE_INITIAL;
  165. }
  166. static int fst_session_is_ready_pending(struct fst_session *s)
  167. {
  168. return s->state == FST_SESSION_STATE_SETUP_COMPLETION &&
  169. fst_session_is_in_transition(s);
  170. }
  171. static int fst_session_is_ready(struct fst_session *s)
  172. {
  173. return s->state == FST_SESSION_STATE_SETUP_COMPLETION &&
  174. !fst_session_is_in_transition(s);
  175. }
  176. static int fst_session_is_switch_requested(struct fst_session *s)
  177. {
  178. return s->state == FST_SESSION_STATE_TRANSITION_DONE &&
  179. fst_session_is_in_transition(s);
  180. }
  181. static struct fst_session *
  182. fst_find_session_in_progress(const u8 *peer_addr, struct fst_group *g)
  183. {
  184. struct fst_session *s;
  185. foreach_fst_session(s) {
  186. if (s->group == g &&
  187. (os_memcmp(s->data.old_peer_addr, peer_addr,
  188. ETH_ALEN) == 0 ||
  189. os_memcmp(s->data.new_peer_addr, peer_addr,
  190. ETH_ALEN) == 0) &&
  191. fst_session_is_in_progress(s))
  192. return s;
  193. }
  194. return NULL;
  195. }
  196. static void fst_session_reset_ex(struct fst_session *s, enum fst_reason reason)
  197. {
  198. union fst_session_state_switch_extra evext = {
  199. .to_initial = {
  200. .reason = reason,
  201. },
  202. };
  203. if (s->state == FST_SESSION_STATE_SETUP_COMPLETION ||
  204. s->state == FST_SESSION_STATE_TRANSITION_DONE)
  205. fst_session_tear_down_setup(s);
  206. fst_session_stt_disarm(s);
  207. os_memset(&s->data, 0, sizeof(s->data));
  208. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  209. }
  210. static int fst_session_send_action(struct fst_session *s, Boolean old_iface,
  211. const void *payload, size_t size,
  212. const struct wpabuf *extra_buf)
  213. {
  214. size_t len;
  215. int res;
  216. struct wpabuf *buf;
  217. u8 action;
  218. struct fst_iface *iface =
  219. old_iface ? s->data.old_iface : s->data.new_iface;
  220. WPA_ASSERT(payload != NULL);
  221. WPA_ASSERT(size != 0);
  222. action = *(const u8 *) payload;
  223. WPA_ASSERT(action <= FST_ACTION_MAX_SUPPORTED);
  224. if (!iface) {
  225. fst_printf_session(s, MSG_ERROR,
  226. "no %s interface for FST Action '%s' sending",
  227. old_iface ? "old" : "new",
  228. fst_action_names[action]);
  229. return -1;
  230. }
  231. len = sizeof(u8) /* category */ + size;
  232. if (extra_buf)
  233. len += wpabuf_size(extra_buf);
  234. buf = wpabuf_alloc(len);
  235. if (!buf) {
  236. fst_printf_session(s, MSG_ERROR,
  237. "cannot allocate buffer of %zu bytes for FST Action '%s' sending",
  238. len, fst_action_names[action]);
  239. return -1;
  240. }
  241. wpabuf_put_u8(buf, WLAN_ACTION_FST);
  242. wpabuf_put_data(buf, payload, size);
  243. if (extra_buf)
  244. wpabuf_put_buf(buf, extra_buf);
  245. res = fst_iface_send_action(iface,
  246. old_iface ? s->data.old_peer_addr :
  247. s->data.new_peer_addr, buf);
  248. if (res < 0)
  249. fst_printf_siface(s, iface, MSG_ERROR,
  250. "failed to send FST Action '%s'",
  251. fst_action_names[action]);
  252. else
  253. fst_printf_siface(s, iface, MSG_DEBUG, "FST Action '%s' sent",
  254. fst_action_names[action]);
  255. wpabuf_free(buf);
  256. return res;
  257. }
  258. static int fst_session_send_tear_down(struct fst_session *s)
  259. {
  260. struct fst_tear_down td;
  261. int res;
  262. if (!fst_session_is_in_progress(s)) {
  263. fst_printf_session(s, MSG_ERROR, "No FST setup to tear down");
  264. return -1;
  265. }
  266. WPA_ASSERT(s->data.old_iface != NULL);
  267. WPA_ASSERT(s->data.new_iface != NULL);
  268. os_memset(&td, 0, sizeof(td));
  269. td.action = FST_ACTION_TEAR_DOWN;
  270. td.fsts_id = host_to_le32(s->data.fsts_id);
  271. res = fst_session_send_action(s, TRUE, &td, sizeof(td), NULL);
  272. if (!res)
  273. fst_printf_sframe(s, TRUE, MSG_INFO, "FST TearDown sent");
  274. else
  275. fst_printf_sframe(s, TRUE, MSG_ERROR,
  276. "failed to send FST TearDown");
  277. return res;
  278. }
  279. static void fst_session_handle_setup_request(struct fst_iface *iface,
  280. const struct ieee80211_mgmt *mgmt,
  281. size_t frame_len)
  282. {
  283. struct fst_session *s;
  284. const struct fst_setup_req *req =
  285. (const struct fst_setup_req *) &mgmt->u.action.u.fst_action;
  286. struct fst_iface *new_iface = NULL;
  287. struct fst_group *g;
  288. u8 new_iface_peer_addr[ETH_ALEN];
  289. struct wpabuf *peer_mbies;
  290. if (frame_len < sizeof(*req)) {
  291. fst_printf_iface(iface, MSG_WARNING,
  292. "FST Request dropped: too short (%zu < %zu)",
  293. frame_len, sizeof(*req));
  294. return;
  295. }
  296. if (req->stie.new_band_id == req->stie.old_band_id) {
  297. fst_printf_iface(iface, MSG_WARNING,
  298. "FST Request dropped: new and old band IDs are the same");
  299. return;
  300. }
  301. g = fst_iface_get_group(iface);
  302. if (frame_len > sizeof(*req)) {
  303. fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1),
  304. frame_len - sizeof(*req));
  305. fst_printf_iface(iface, MSG_INFO,
  306. "FST Request: MB IEs updated for " MACSTR,
  307. MAC2STR(mgmt->sa));
  308. }
  309. peer_mbies = fst_iface_get_peer_mb_ie(iface, mgmt->sa);
  310. if (peer_mbies) {
  311. new_iface = fst_group_get_new_iface_by_stie_and_mbie(
  312. g, wpabuf_head(peer_mbies), wpabuf_len(peer_mbies),
  313. &req->stie, new_iface_peer_addr);
  314. if (new_iface)
  315. fst_printf_iface(iface, MSG_INFO,
  316. "FST Request: new iface (%s:" MACSTR
  317. ") found by MB IEs",
  318. fst_iface_get_name(new_iface),
  319. MAC2STR(new_iface_peer_addr));
  320. }
  321. if (!new_iface) {
  322. new_iface = fst_group_find_new_iface_by_stie(
  323. g, iface, mgmt->sa, &req->stie,
  324. new_iface_peer_addr);
  325. if (new_iface)
  326. fst_printf_iface(iface, MSG_INFO,
  327. "FST Request: new iface (%s:" MACSTR
  328. ") found by others",
  329. fst_iface_get_name(new_iface),
  330. MAC2STR(new_iface_peer_addr));
  331. }
  332. if (!new_iface) {
  333. fst_printf_iface(iface, MSG_WARNING,
  334. "FST Request dropped: new iface not found");
  335. return;
  336. }
  337. s = fst_find_session_in_progress(mgmt->sa, g);
  338. if (s) {
  339. union fst_session_state_switch_extra evext = {
  340. .to_initial = {
  341. .reason = REASON_SETUP,
  342. },
  343. };
  344. /*
  345. * 10.32.2.2 Transitioning between states:
  346. * Upon receipt of an FST Setup Request frame, the responder
  347. * shall respond with an FST Setup Response frame unless it has
  348. * a pending FST Setup Request frame addressed to the initiator
  349. * and the responder has a numerically larger MAC address than
  350. * the initiator’s MAC address, in which case, the responder
  351. * shall delete the received FST Setup Request.
  352. */
  353. if (os_memcmp(mgmt->da, mgmt->sa, ETH_ALEN) > 0) {
  354. fst_printf_session(s, MSG_WARNING,
  355. "FST Request dropped due to MAC comparison (our MAC is "
  356. MACSTR ")",
  357. MAC2STR(mgmt->da));
  358. return;
  359. }
  360. if (!fst_session_is_ready_pending(s)) {
  361. fst_printf_session(s, MSG_WARNING,
  362. "FST Request from " MACSTR
  363. " dropped due to inappropriate state %s",
  364. MAC2STR(mgmt->da),
  365. fst_session_state_name(s->state));
  366. return;
  367. }
  368. /*
  369. * If FST Setup Request arrived with the same FSTS ID as one we
  370. * initialized before, it means the other side either didn't
  371. * receive our FST Request or skipped it for some reason (for
  372. * example, due to numerical MAC comparison).
  373. *
  374. * In this case, there's no need to tear down the session.
  375. * Moreover, as FSTS ID is the same, the other side will
  376. * associate this tear down with the session it initiated that
  377. * will break the sync.
  378. */
  379. if (le_to_host32(req->stie.fsts_id) != s->data.fsts_id)
  380. fst_session_send_tear_down(s);
  381. else
  382. fst_printf_session(s, MSG_WARNING,
  383. "Skipping TearDown as the FST request has the same FSTS ID as initiated");
  384. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  385. fst_session_stt_disarm(s);
  386. fst_printf_session(s, MSG_WARNING, "reset due to FST request");
  387. }
  388. s = fst_session_create(g);
  389. if (!s) {
  390. fst_printf(MSG_WARNING,
  391. "FST Request dropped: cannot create session for %s and %s",
  392. fst_iface_get_name(iface),
  393. fst_iface_get_name(new_iface));
  394. return;
  395. }
  396. fst_session_set_iface(s, iface, TRUE);
  397. fst_session_set_peer_addr(s, mgmt->sa, TRUE);
  398. fst_session_set_iface(s, new_iface, FALSE);
  399. fst_session_set_peer_addr(s, new_iface_peer_addr, FALSE);
  400. fst_session_set_llt(s, FST_LLT_VAL_TO_MS(le_to_host32(req->llt)));
  401. s->data.pending_setup_req_dlgt = req->dialog_token;
  402. s->data.fsts_id = le_to_host32(req->stie.fsts_id);
  403. fst_session_stt_arm(s);
  404. fst_session_notify_ctrl(s, EVENT_FST_SETUP, NULL);
  405. fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION, NULL);
  406. }
  407. static void fst_session_handle_setup_response(struct fst_session *s,
  408. struct fst_iface *iface,
  409. const struct ieee80211_mgmt *mgmt,
  410. size_t frame_len)
  411. {
  412. const struct fst_setup_res *res =
  413. (const struct fst_setup_res *) &mgmt->u.action.u.fst_action;
  414. enum hostapd_hw_mode hw_mode;
  415. u8 channel;
  416. union fst_session_state_switch_extra evext = {
  417. .to_initial = {0},
  418. };
  419. if (iface != s->data.old_iface) {
  420. fst_printf_session(s, MSG_WARNING,
  421. "FST Response dropped: %s is not the old iface",
  422. fst_iface_get_name(iface));
  423. return;
  424. }
  425. if (!fst_session_is_ready_pending(s)) {
  426. fst_printf_session(s, MSG_WARNING,
  427. "FST Response dropped due to wrong state: %s",
  428. fst_session_state_name(s->state));
  429. return;
  430. }
  431. if (res->dialog_token != s->data.pending_setup_req_dlgt) {
  432. fst_printf_session(s, MSG_WARNING,
  433. "FST Response dropped due to wrong dialog token (%u != %u)",
  434. s->data.pending_setup_req_dlgt,
  435. res->dialog_token);
  436. return;
  437. }
  438. if (res->status_code == WLAN_STATUS_SUCCESS &&
  439. le_to_host32(res->stie.fsts_id) != s->data.fsts_id) {
  440. fst_printf_session(s, MSG_WARNING,
  441. "FST Response dropped due to wrong FST Session ID (%u)",
  442. le_to_host32(res->stie.fsts_id));
  443. return;
  444. }
  445. fst_session_stt_disarm(s);
  446. if (res->status_code != WLAN_STATUS_SUCCESS) {
  447. /*
  448. * 10.32.2.2 Transitioning between states
  449. * The initiator shall set the STT to the value of the
  450. * FSTSessionTimeOut field at ... and at each ACK frame sent in
  451. * response to a received FST Setup Response with the Status
  452. * Code field equal to PENDING_ADMITTING_FST_SESSION or
  453. * PENDING_GAP_IN_BA_WINDOW.
  454. */
  455. evext.to_initial.reason = REASON_REJECT;
  456. evext.to_initial.reject_code = res->status_code;
  457. evext.to_initial.initiator = FST_INITIATOR_REMOTE;
  458. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  459. fst_printf_session(s, MSG_WARNING,
  460. "FST Setup rejected by remote side with status %u",
  461. res->status_code);
  462. return;
  463. }
  464. fst_iface_get_channel_info(s->data.new_iface, &hw_mode, &channel);
  465. if (fst_hw_mode_to_band(hw_mode) != res->stie.new_band_id) {
  466. evext.to_initial.reason = REASON_ERROR_PARAMS;
  467. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  468. fst_printf_session(s, MSG_WARNING,
  469. "invalid FST Setup parameters");
  470. fst_session_tear_down_setup(s);
  471. return;
  472. }
  473. fst_printf_session(s, MSG_INFO,
  474. "%s: FST Setup established for %s (llt=%u)",
  475. fst_iface_get_name(s->data.old_iface),
  476. fst_iface_get_name(s->data.new_iface),
  477. s->data.llt_ms);
  478. fst_session_notify_ctrl(s, EVENT_FST_ESTABLISHED, NULL);
  479. if (s->data.llt_ms == FST_LLT_SWITCH_IMMEDIATELY)
  480. fst_session_initiate_switch(s);
  481. }
  482. static void fst_session_handle_tear_down(struct fst_session *s,
  483. struct fst_iface *iface,
  484. const struct ieee80211_mgmt *mgmt,
  485. size_t frame_len)
  486. {
  487. const struct fst_tear_down *td =
  488. (const struct fst_tear_down *) &mgmt->u.action.u.fst_action;
  489. union fst_session_state_switch_extra evext = {
  490. .to_initial = {
  491. .reason = REASON_TEARDOWN,
  492. .initiator = FST_INITIATOR_REMOTE,
  493. },
  494. };
  495. if (!fst_session_is_in_progress(s)) {
  496. fst_printf_session(s, MSG_WARNING, "no FST Setup to tear down");
  497. return;
  498. }
  499. if (le_to_host32(td->fsts_id) != s->data.fsts_id) {
  500. fst_printf_siface(s, iface, MSG_WARNING,
  501. "tear down for wrong FST Setup ID (%u)",
  502. le_to_host32(td->fsts_id));
  503. return;
  504. }
  505. fst_session_stt_disarm(s);
  506. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  507. }
  508. static void fst_session_handle_ack_request(struct fst_session *s,
  509. struct fst_iface *iface,
  510. const struct ieee80211_mgmt *mgmt,
  511. size_t frame_len)
  512. {
  513. const struct fst_ack_req *req =
  514. (const struct fst_ack_req *) &mgmt->u.action.u.fst_action;
  515. struct fst_ack_res res;
  516. union fst_session_state_switch_extra evext = {
  517. .to_initial = {
  518. .reason = REASON_SWITCH,
  519. .initiator = FST_INITIATOR_REMOTE,
  520. },
  521. };
  522. if (!fst_session_is_ready(s) && !fst_session_is_switch_requested(s)) {
  523. fst_printf_siface(s, iface, MSG_ERROR,
  524. "cannot initiate switch due to wrong session state (%s)",
  525. fst_session_state_name(s->state));
  526. return;
  527. }
  528. WPA_ASSERT(s->data.new_iface != NULL);
  529. if (iface != s->data.new_iface) {
  530. fst_printf_siface(s, iface, MSG_ERROR,
  531. "Ack received on wrong interface");
  532. return;
  533. }
  534. if (le_to_host32(req->fsts_id) != s->data.fsts_id) {
  535. fst_printf_siface(s, iface, MSG_WARNING,
  536. "Ack for wrong FST Setup ID (%u)",
  537. le_to_host32(req->fsts_id));
  538. return;
  539. }
  540. os_memset(&res, 0, sizeof(res));
  541. res.action = FST_ACTION_ACK_RESPONSE;
  542. res.dialog_token = req->dialog_token;
  543. res.fsts_id = req->fsts_id;
  544. if (!fst_session_send_action(s, FALSE, &res, sizeof(res), NULL)) {
  545. fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Response sent");
  546. fst_session_stt_disarm(s);
  547. fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE,
  548. NULL);
  549. fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED,
  550. NULL);
  551. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  552. }
  553. }
  554. static void
  555. fst_session_handle_ack_response(struct fst_session *s,
  556. struct fst_iface *iface,
  557. const struct ieee80211_mgmt *mgmt,
  558. size_t frame_len)
  559. {
  560. const struct fst_ack_res *res =
  561. (const struct fst_ack_res *) &mgmt->u.action.u.fst_action;
  562. union fst_session_state_switch_extra evext = {
  563. .to_initial = {
  564. .reason = REASON_SWITCH,
  565. .initiator = FST_INITIATOR_LOCAL,
  566. },
  567. };
  568. if (!fst_session_is_switch_requested(s)) {
  569. fst_printf_siface(s, iface, MSG_ERROR,
  570. "Ack Response in inappropriate session state (%s)",
  571. fst_session_state_name(s->state));
  572. return;
  573. }
  574. WPA_ASSERT(s->data.new_iface != NULL);
  575. if (iface != s->data.new_iface) {
  576. fst_printf_siface(s, iface, MSG_ERROR,
  577. "Ack response received on wrong interface");
  578. return;
  579. }
  580. if (le_to_host32(res->fsts_id) != s->data.fsts_id) {
  581. fst_printf_siface(s, iface, MSG_ERROR,
  582. "Ack response for wrong FST Setup ID (%u)",
  583. le_to_host32(res->fsts_id));
  584. return;
  585. }
  586. fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED, NULL);
  587. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  588. fst_session_stt_disarm(s);
  589. }
  590. struct fst_session * fst_session_create(struct fst_group *g)
  591. {
  592. struct fst_session *s;
  593. u32 id;
  594. WPA_ASSERT(!is_zero_ether_addr(own_addr));
  595. id = fst_find_free_session_id();
  596. if (id == FST_INVALID_SESSION_ID) {
  597. fst_printf(MSG_ERROR, "Cannot assign new session ID");
  598. return NULL;
  599. }
  600. s = os_zalloc(sizeof(*s));
  601. if (!s) {
  602. fst_printf(MSG_ERROR, "Cannot allocate new session object");
  603. return NULL;
  604. }
  605. s->id = id;
  606. s->group = g;
  607. s->state = FST_SESSION_STATE_INITIAL;
  608. s->data.llt_ms = FST_LLT_MS_DEFAULT;
  609. fst_printf(MSG_INFO, "Session %u created", s->id);
  610. dl_list_add_tail(&global_sessions_list, &s->global_sessions_lentry);
  611. foreach_fst_ctrl_call(on_session_added, s);
  612. return s;
  613. }
  614. void fst_session_set_iface(struct fst_session *s, struct fst_iface *iface,
  615. Boolean is_old)
  616. {
  617. if (is_old)
  618. s->data.old_iface = iface;
  619. else
  620. s->data.new_iface = iface;
  621. }
  622. void fst_session_set_llt(struct fst_session *s, u32 llt)
  623. {
  624. s->data.llt_ms = llt;
  625. }
  626. void fst_session_set_peer_addr(struct fst_session *s, const u8 *addr,
  627. Boolean is_old)
  628. {
  629. u8 *a = is_old ? s->data.old_peer_addr : s->data.new_peer_addr;
  630. os_memcpy(a, addr, ETH_ALEN);
  631. }
  632. int fst_session_initiate_setup(struct fst_session *s)
  633. {
  634. struct fst_setup_req req;
  635. int res;
  636. u32 fsts_id;
  637. u8 dialog_token;
  638. struct fst_session *_s;
  639. if (fst_session_is_in_progress(s)) {
  640. fst_printf_session(s, MSG_ERROR, "Session in progress");
  641. return -EINVAL;
  642. }
  643. if (is_zero_ether_addr(s->data.old_peer_addr)) {
  644. fst_printf_session(s, MSG_ERROR, "No old peer MAC address");
  645. return -EINVAL;
  646. }
  647. if (is_zero_ether_addr(s->data.new_peer_addr)) {
  648. fst_printf_session(s, MSG_ERROR, "No new peer MAC address");
  649. return -EINVAL;
  650. }
  651. if (!s->data.old_iface) {
  652. fst_printf_session(s, MSG_ERROR, "No old interface defined");
  653. return -EINVAL;
  654. }
  655. if (!s->data.new_iface) {
  656. fst_printf_session(s, MSG_ERROR, "No new interface defined");
  657. return -EINVAL;
  658. }
  659. if (s->data.new_iface == s->data.old_iface) {
  660. fst_printf_session(s, MSG_ERROR,
  661. "Same interface set as old and new");
  662. return -EINVAL;
  663. }
  664. if (!fst_iface_is_connected(s->data.old_iface, s->data.old_peer_addr)) {
  665. fst_printf_session(s, MSG_ERROR,
  666. "The preset old peer address is not connected");
  667. return -EINVAL;
  668. }
  669. if (!fst_iface_is_connected(s->data.new_iface, s->data.new_peer_addr)) {
  670. fst_printf_session(s, MSG_ERROR,
  671. "The preset new peer address is not connected");
  672. return -EINVAL;
  673. }
  674. _s = fst_find_session_in_progress(s->data.old_peer_addr, s->group);
  675. if (_s) {
  676. fst_printf_session(s, MSG_ERROR,
  677. "There is another session in progress (old): %u",
  678. _s->id);
  679. return -EINVAL;
  680. }
  681. _s = fst_find_session_in_progress(s->data.new_peer_addr, s->group);
  682. if (_s) {
  683. fst_printf_session(s, MSG_ERROR,
  684. "There is another session in progress (new): %u",
  685. _s->id);
  686. return -EINVAL;
  687. }
  688. dialog_token = fst_group_assign_dialog_token(s->group);
  689. fsts_id = fst_group_assign_fsts_id(s->group);
  690. os_memset(&req, 0, sizeof(req));
  691. fst_printf_siface(s, s->data.old_iface, MSG_INFO,
  692. "initiating FST setup for %s (llt=%u ms)",
  693. fst_iface_get_name(s->data.new_iface), s->data.llt_ms);
  694. req.action = FST_ACTION_SETUP_REQUEST;
  695. req.dialog_token = dialog_token;
  696. req.llt = host_to_le32(FST_LLT_MS_TO_VAL(s->data.llt_ms));
  697. /* 8.4.2.147 Session Transition element */
  698. req.stie.element_id = WLAN_EID_SESSION_TRANSITION;
  699. req.stie.length = sizeof(req.stie);
  700. req.stie.fsts_id = host_to_le32(fsts_id);
  701. req.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
  702. req.stie.new_band_id = fst_iface_get_band_id(s->data.new_iface);
  703. req.stie.new_band_op = 1;
  704. req.stie.new_band_setup = 0;
  705. req.stie.old_band_id = fst_iface_get_band_id(s->data.old_iface);
  706. req.stie.old_band_op = 1;
  707. req.stie.old_band_setup = 0;
  708. res = fst_session_send_action(s, TRUE, &req, sizeof(req),
  709. fst_iface_get_mbie(s->data.old_iface));
  710. if (!res) {
  711. s->data.fsts_id = fsts_id;
  712. s->data.pending_setup_req_dlgt = dialog_token;
  713. fst_printf_sframe(s, TRUE, MSG_INFO, "FST Setup Request sent");
  714. fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION,
  715. NULL);
  716. fst_session_stt_arm(s);
  717. }
  718. return res;
  719. }
  720. int fst_session_respond(struct fst_session *s, u8 status_code)
  721. {
  722. struct fst_setup_res res;
  723. enum hostapd_hw_mode hw_mode;
  724. u8 channel;
  725. if (!fst_session_is_ready_pending(s)) {
  726. fst_printf_session(s, MSG_ERROR, "incorrect state: %s",
  727. fst_session_state_name(s->state));
  728. return -EINVAL;
  729. }
  730. if (is_zero_ether_addr(s->data.old_peer_addr)) {
  731. fst_printf_session(s, MSG_ERROR, "No peer MAC address");
  732. return -EINVAL;
  733. }
  734. if (!s->data.old_iface) {
  735. fst_printf_session(s, MSG_ERROR, "No old interface defined");
  736. return -EINVAL;
  737. }
  738. if (!s->data.new_iface) {
  739. fst_printf_session(s, MSG_ERROR, "No new interface defined");
  740. return -EINVAL;
  741. }
  742. if (s->data.new_iface == s->data.old_iface) {
  743. fst_printf_session(s, MSG_ERROR,
  744. "Same interface set as old and new");
  745. return -EINVAL;
  746. }
  747. if (!fst_iface_is_connected(s->data.old_iface, s->data.old_peer_addr)) {
  748. fst_printf_session(s, MSG_ERROR,
  749. "The preset peer address is not in the peer list");
  750. return -EINVAL;
  751. }
  752. fst_session_stt_disarm(s);
  753. os_memset(&res, 0, sizeof(res));
  754. res.action = FST_ACTION_SETUP_RESPONSE;
  755. res.dialog_token = s->data.pending_setup_req_dlgt;
  756. res.status_code = status_code;
  757. if (status_code == WLAN_STATUS_SUCCESS) {
  758. res.stie.element_id = WLAN_EID_SESSION_TRANSITION;
  759. res.stie.length = sizeof(res.stie);
  760. res.stie.fsts_id = s->data.fsts_id;
  761. res.stie.session_control = SESSION_CONTROL(SESSION_TYPE_BSS, 0);
  762. fst_iface_get_channel_info(s->data.new_iface, &hw_mode,
  763. &channel);
  764. res.stie.new_band_id = fst_hw_mode_to_band(hw_mode);
  765. res.stie.new_band_op = 1;
  766. res.stie.new_band_setup = 0;
  767. fst_iface_get_channel_info(s->data.old_iface, &hw_mode,
  768. &channel);
  769. res.stie.old_band_id = fst_hw_mode_to_band(hw_mode);
  770. res.stie.old_band_op = 1;
  771. res.stie.old_band_setup = 0;
  772. fst_printf_session(s, MSG_INFO,
  773. "%s: FST Setup Request accepted for %s (llt=%u)",
  774. fst_iface_get_name(s->data.old_iface),
  775. fst_iface_get_name(s->data.new_iface),
  776. s->data.llt_ms);
  777. } else {
  778. fst_printf_session(s, MSG_WARNING,
  779. "%s: FST Setup Request rejected with code %d",
  780. fst_iface_get_name(s->data.old_iface),
  781. status_code);
  782. }
  783. if (fst_session_send_action(s, TRUE, &res, sizeof(res),
  784. fst_iface_get_mbie(s->data.old_iface))) {
  785. fst_printf_sframe(s, TRUE, MSG_ERROR,
  786. "cannot send FST Setup Response with code %d",
  787. status_code);
  788. return -EINVAL;
  789. }
  790. fst_printf_sframe(s, TRUE, MSG_INFO, "FST Setup Response sent");
  791. if (status_code != WLAN_STATUS_SUCCESS) {
  792. union fst_session_state_switch_extra evext = {
  793. .to_initial = {
  794. .reason = REASON_REJECT,
  795. .reject_code = status_code,
  796. .initiator = FST_INITIATOR_LOCAL,
  797. },
  798. };
  799. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  800. }
  801. return 0;
  802. }
  803. int fst_session_initiate_switch(struct fst_session *s)
  804. {
  805. struct fst_ack_req req;
  806. int res;
  807. u8 dialog_token;
  808. if (!fst_session_is_ready(s)) {
  809. fst_printf_session(s, MSG_ERROR,
  810. "cannot initiate switch due to wrong setup state (%d)",
  811. s->state);
  812. return -1;
  813. }
  814. dialog_token = fst_group_assign_dialog_token(s->group);
  815. WPA_ASSERT(s->data.new_iface != NULL);
  816. WPA_ASSERT(s->data.old_iface != NULL);
  817. fst_printf_session(s, MSG_INFO, "initiating FST switch: %s => %s",
  818. fst_iface_get_name(s->data.old_iface),
  819. fst_iface_get_name(s->data.new_iface));
  820. os_memset(&req, 0, sizeof(req));
  821. req.action = FST_ACTION_ACK_REQUEST;
  822. req.dialog_token = dialog_token;
  823. req.fsts_id = host_to_le32(s->data.fsts_id);
  824. res = fst_session_send_action(s, FALSE, &req, sizeof(req), NULL);
  825. if (!res) {
  826. fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Request sent");
  827. fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE,
  828. NULL);
  829. fst_session_stt_arm(s);
  830. } else {
  831. fst_printf_sframe(s, FALSE, MSG_ERROR,
  832. "Cannot send FST Ack Request");
  833. }
  834. return res;
  835. }
  836. void fst_session_handle_action(struct fst_session *s,
  837. struct fst_iface *iface,
  838. const struct ieee80211_mgmt *mgmt,
  839. size_t frame_len)
  840. {
  841. switch (mgmt->u.action.u.fst_action.action) {
  842. case FST_ACTION_SETUP_REQUEST:
  843. WPA_ASSERT(0);
  844. break;
  845. case FST_ACTION_SETUP_RESPONSE:
  846. fst_session_handle_setup_response(s, iface, mgmt, frame_len);
  847. break;
  848. case FST_ACTION_TEAR_DOWN:
  849. fst_session_handle_tear_down(s, iface, mgmt, frame_len);
  850. break;
  851. case FST_ACTION_ACK_REQUEST:
  852. fst_session_handle_ack_request(s, iface, mgmt, frame_len);
  853. break;
  854. case FST_ACTION_ACK_RESPONSE:
  855. fst_session_handle_ack_response(s, iface, mgmt, frame_len);
  856. break;
  857. case FST_ACTION_ON_CHANNEL_TUNNEL:
  858. default:
  859. fst_printf_sframe(s, FALSE, MSG_ERROR,
  860. "Unsupported FST Action frame");
  861. break;
  862. }
  863. }
  864. int fst_session_tear_down_setup(struct fst_session *s)
  865. {
  866. int res;
  867. union fst_session_state_switch_extra evext = {
  868. .to_initial = {
  869. .reason = REASON_TEARDOWN,
  870. .initiator = FST_INITIATOR_LOCAL,
  871. },
  872. };
  873. res = fst_session_send_tear_down(s);
  874. fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext);
  875. return res;
  876. }
  877. void fst_session_reset(struct fst_session *s)
  878. {
  879. fst_session_reset_ex(s, REASON_RESET);
  880. }
  881. void fst_session_delete(struct fst_session *s)
  882. {
  883. fst_printf(MSG_INFO, "Session %u deleted", s->id);
  884. dl_list_del(&s->global_sessions_lentry);
  885. foreach_fst_ctrl_call(on_session_removed, s);
  886. os_free(s);
  887. }
  888. struct fst_group * fst_session_get_group(struct fst_session *s)
  889. {
  890. return s->group;
  891. }
  892. struct fst_iface * fst_session_get_iface(struct fst_session *s, Boolean is_old)
  893. {
  894. return is_old ? s->data.old_iface : s->data.new_iface;
  895. }
  896. u32 fst_session_get_id(struct fst_session *s)
  897. {
  898. return s->id;
  899. }
  900. const u8 * fst_session_get_peer_addr(struct fst_session *s, Boolean is_old)
  901. {
  902. return is_old ? s->data.old_peer_addr : s->data.new_peer_addr;
  903. }
  904. u32 fst_session_get_llt(struct fst_session *s)
  905. {
  906. return s->data.llt_ms;
  907. }
  908. enum fst_session_state fst_session_get_state(struct fst_session *s)
  909. {
  910. return s->state;
  911. }
  912. struct fst_session * fst_session_get_by_id(u32 id)
  913. {
  914. struct fst_session *s;
  915. foreach_fst_session(s) {
  916. if (id == s->id)
  917. return s;
  918. }
  919. return NULL;
  920. }
  921. void fst_session_enum(struct fst_group *g, fst_session_enum_clb clb, void *ctx)
  922. {
  923. struct fst_session *s;
  924. foreach_fst_session(s) {
  925. if (!g || s->group == g)
  926. clb(s->group, s, ctx);
  927. }
  928. }
  929. void fst_session_on_action_rx(struct fst_iface *iface,
  930. const struct ieee80211_mgmt *mgmt,
  931. size_t len)
  932. {
  933. struct fst_session *s;
  934. if (mgmt->u.action.category != WLAN_ACTION_FST) {
  935. fst_printf_iface(iface, MSG_ERROR,
  936. "action frame of wrong category (%u) received!",
  937. mgmt->u.action.category);
  938. return;
  939. }
  940. if (mgmt->u.action.u.fst_action.action <= FST_ACTION_MAX_SUPPORTED) {
  941. fst_printf_iface(iface, MSG_DEBUG,
  942. "FST Action '%s' received!",
  943. fst_action_names[mgmt->u.action.u.fst_action.action]);
  944. } else {
  945. fst_printf_iface(iface, MSG_WARNING,
  946. "unknown FST Action (%u) received!",
  947. mgmt->u.action.u.fst_action.action);
  948. return;
  949. }
  950. if (mgmt->u.action.u.fst_action.action == FST_ACTION_SETUP_REQUEST) {
  951. fst_session_handle_setup_request(iface, mgmt, len);
  952. return;
  953. }
  954. s = fst_find_session_in_progress(mgmt->sa, fst_iface_get_group(iface));
  955. if (s) {
  956. fst_session_handle_action(s, iface, mgmt, len);
  957. } else {
  958. fst_printf_iface(iface, MSG_WARNING,
  959. "FST Action '%s' dropped: no session in progress found",
  960. fst_action_names[mgmt->u.action.u.fst_action.action]);
  961. }
  962. }
  963. int fst_session_set_str_ifname(struct fst_session *s, const char *ifname,
  964. Boolean is_old)
  965. {
  966. struct fst_group *g = fst_session_get_group(s);
  967. struct fst_iface *i;
  968. i = fst_group_get_iface_by_name(g, ifname);
  969. if (!i) {
  970. fst_printf_session(s, MSG_WARNING,
  971. "Cannot set iface %s: no such iface within group '%s'",
  972. ifname, fst_group_get_id(g));
  973. return -1;
  974. }
  975. fst_session_set_iface(s, i, is_old);
  976. return 0;
  977. }
  978. int fst_session_set_str_peer_addr(struct fst_session *s, const char *mac,
  979. Boolean is_old)
  980. {
  981. u8 peer_addr[ETH_ALEN];
  982. int res = fst_read_peer_addr(mac, peer_addr);
  983. if (res)
  984. return res;
  985. fst_session_set_peer_addr(s, peer_addr, is_old);
  986. return 0;
  987. }
  988. int fst_session_set_str_llt(struct fst_session *s, const char *llt_str)
  989. {
  990. char *endp;
  991. long int llt = strtol(llt_str, &endp, 0);
  992. if (*endp || llt < 0 || (unsigned long int) llt > FST_MAX_LLT_MS) {
  993. fst_printf_session(s, MSG_WARNING,
  994. "Cannot set llt %s: Invalid llt value (1..%u expected)",
  995. llt_str, FST_MAX_LLT_MS);
  996. return -1;
  997. }
  998. fst_session_set_llt(s, (u32) llt);
  999. return 0;
  1000. }
  1001. void fst_session_global_on_iface_detached(struct fst_iface *iface)
  1002. {
  1003. struct fst_session *s;
  1004. foreach_fst_session(s) {
  1005. if (fst_session_is_in_progress(s) &&
  1006. (s->data.new_iface == iface ||
  1007. s->data.old_iface == iface))
  1008. fst_session_reset_ex(s, REASON_DETACH_IFACE);
  1009. }
  1010. }
  1011. struct fst_session * fst_session_global_get_first_by_group(struct fst_group *g)
  1012. {
  1013. struct fst_session *s;
  1014. foreach_fst_session(s) {
  1015. if (s->group == g)
  1016. return s;
  1017. }
  1018. return NULL;
  1019. }