Search Linux Wireless

[PATCH] mac80211: Handle race condition in replay handling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Added fix for the issue where the Rx throughput use to get stuck,
with unicast key rotation feature enabled in the Cisco AP.
The issue is that due to race condition during EAPOL key
handshake and packet reception, the PN gets reset at MAC, while
it still receives previous PN range packets for a while from AP.
At MAC, there is a memcpy of the PN from the received PN
and as a result the maintained PN is overwritten with the
previous PN sequence value after being reset at the time, new
key is plumbed by supplicant.

As a result, when this change in sequence number happens, the
replay detection handling in MAC gets triggered, causing the
traffic to stops for some while till PN re-match, with the
one last updated at MAC.

The fix takes care of selectively updating the Rx PN during
this transition phase.

Signed-off-by: Amit Shakya <amit.shakya@xxxxxxxxxxxxxx>
---
net/mac80211/key.c |    9 +++++++++
net/mac80211/key.h |    1 +
net/mac80211/wpa.c |   35 ++++++++++++++++++++++++++++++++++-
3 files changed, 44 insertions(+), 1 deletions(-)

diff --git a/net/mac80211/key.c b/net/mac80211/key.c
index 5bb600d..461bb7c 100644
--- a/net/mac80211/key.c
+++ b/net/mac80211/key.c
@@ -278,6 +278,15 @@ static void __ieee80211_key_replace(struct ieee80211_sub_if_data *sdata,
          list_add_tail(&new->list, &sdata->key_list);

     if (sta && pairwise) {
+          if (old && new &&
+               (new->conf.cipher == WLAN_CIPHER_SUITE_CCMP)) {
+               int i;
+               for (i = 0; i < NUM_RX_DATA_QUEUES + 1; i++) {
+                    memcpy(new->u.ccmp.prev_rx_pn[i],
+                    old->u.ccmp.prev_rx_pn[i], CCMP_PN_LEN);
+               }
+          }
+
          rcu_assign_pointer(sta->ptk, new);
    } else if (sta) {
          if (old)
diff --git a/net/mac80211/key.h b/net/mac80211/key.h
index 7d4e31f..e0d9728 100644
--- a/net/mac80211/key.h
+++ b/net/mac80211/key.h
@@ -93,6 +93,7 @@ struct ieee80211_key {
                * Management frames.
                */
               u8 rx_pn[NUM_RX_DATA_QUEUES + 1][CCMP_PN_LEN];
+               u8 prev_rx_pn[NUM_RX_DATA_QUEUES + 1][CCMP_PN_LEN];
               struct crypto_cipher *tfm;
               u32 replays; /* dot11RSNAStatsCCMPReplays */
          } ccmp;
diff --git a/net/mac80211/wpa.c b/net/mac80211/wpa.c
index 0ae23c6..e1c3612 100644
--- a/net/mac80211/wpa.c
+++ b/net/mac80211/wpa.c
@@ -482,6 +482,7 @@ ieee80211_crypto_ccmp_decrypt(struct ieee80211_rx_data *rx)
    u8 pn[CCMP_PN_LEN];
    int data_len;
    int queue;
+    static const u8 zero_pn[6] = {0};

     hdrlen = ieee80211_hdrlen(hdr->frame_control);

@@ -523,7 +524,39 @@ ieee80211_crypto_ccmp_decrypt(struct ieee80211_rx_data *rx)
               return RX_DROP_UNUSABLE;
    }

-    memcpy(key->u.ccmp.rx_pn[queue], pn, CCMP_PN_LEN);
+    /* As long as u.ccmp.rx_pn and u.ccmp.prev_rx_pn are equal, no
+    race condition induced.
+    It is seen that with Cisco AP and with PTK re-negotiation feature
+    enabled on Cisco to do key-negotiaton periodically, even after the
+    RX PN is reset by the supplicant, at MAC, we still keep getting
+    previous RX PN packets.
+    This is due to race condition when this feature is enabled with
+    throughput test and is introduced because of the combination of
+    different TIDs used for data and EAPOL packets and aggregation.
+    The RX PN gets reset to lower value after a while and at that time
+    the RX PN value becomes lower than the maintained current PN at MAC.
+    As a result, the replay detection code chips in and starts dropping all
+    packets till the PN re-match. This causes throughput to stall
+    intermittently for the duration till RX PN match with current PN.
+    So to take care of this we maintain u.ccmp.prev_rx_pn, which doesn't get
+    reset when new PTK is plumbed by supplicant and use it for detecting
+    this transition i.e. from higher PN to lower PN and once this situation
+    happens start updating u.ccmp.rx_pn and thereafter u.ccmp.rx_pn and
+    u.ccmp.prev_rx_pn should be same. In normal scenario, i.e. no new key
+    plumbed both counters should be same. */
+    if ((memcmp(key->u.ccmp.prev_rx_pn[queue],
+          key->u.ccmp.rx_pn[queue], CCMP_PN_LEN) == 0) ||
+          (memcmp(key->u.ccmp.prev_rx_pn[queue], pn, CCMP_PN_LEN) > 0)) {
+          memcpy(key->u.ccmp.rx_pn[queue], pn, CCMP_PN_LEN);
+          memcpy(key->u.ccmp.prev_rx_pn[queue], pn, CCMP_PN_LEN);
+    }
+
+    /* If u.ccmp.rx_pn gets reset to zero due to PTK re-negotiaton then
+    don't update it and just keep updating the u.ccmp.prev_rx_pn.
+    This is to detect the transition that will happen later i.e. from higher
+    RX PN to lower RX PN in case of race condition scenario. */
+    if (memcmp(key->u.ccmp.rx_pn[queue], zero_pn, CCMP_PN_LEN) == 0)
+          memcpy(key->u.ccmp.prev_rx_pn[queue], pn, CCMP_PN_LEN);

     /* Remove CCMP header and MIC */
    if (pskb_trim(skb, skb->len - CCMP_MIC_LEN))
-- 
1.7.0.4

--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Wireless Personal Area Network]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite Hiking]     [MIPS Linux]     [ARM Linux]     [Linux RAID]

  Powered by Linux