|
@@ -1411,9 +1411,9 @@ void lim_process_sta_mlm_add_sta_rsp(struct mac_context *mac_ctx,
|
|
if (true == session_entry->fDeauthReceived) {
|
|
if (true == session_entry->fDeauthReceived) {
|
|
pe_err("Received Deauth frame in ADD_STA_RESP state");
|
|
pe_err("Received Deauth frame in ADD_STA_RESP state");
|
|
if (QDF_STATUS_SUCCESS == add_sta_params->status) {
|
|
if (QDF_STATUS_SUCCESS == add_sta_params->status) {
|
|
- pe_err("ADD_STA success, send update result code with eSIR_SME_JOIN_DEAUTH_FROM_AP_DURING_ADD_STA staIdx: %d limMlmState: %d",
|
|
|
|
- add_sta_params->staIdx,
|
|
|
|
- session_entry->limMlmState);
|
|
|
|
|
|
+ pe_err("ADD_STA success, send update result code with eSIR_SME_JOIN_DEAUTH_FROM_AP_DURING_ADD_STA limMlmState: %d bssid %pM",
|
|
|
|
+ session_entry->limMlmState,
|
|
|
|
+ add_sta_params->staMac);
|
|
|
|
|
|
if (session_entry->limSmeState ==
|
|
if (session_entry->limSmeState ==
|
|
eLIM_SME_WT_REASSOC_STATE)
|
|
eLIM_SME_WT_REASSOC_STATE)
|
|
@@ -1428,7 +1428,6 @@ void lim_process_sta_mlm_add_sta_rsp(struct mac_context *mac_ctx,
|
|
eSIR_SME_JOIN_DEAUTH_FROM_AP_DURING_ADD_STA;
|
|
eSIR_SME_JOIN_DEAUTH_FROM_AP_DURING_ADD_STA;
|
|
mlm_assoc_cnf.protStatusCode =
|
|
mlm_assoc_cnf.protStatusCode =
|
|
eSIR_MAC_UNSPEC_FAILURE_STATUS;
|
|
eSIR_MAC_UNSPEC_FAILURE_STATUS;
|
|
- session_entry->staId = add_sta_params->staIdx;
|
|
|
|
goto end;
|
|
goto end;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -1454,7 +1453,7 @@ void lim_process_sta_mlm_add_sta_rsp(struct mac_context *mac_ctx,
|
|
tpLimMlmSetKeysReq pMlmStaKeys =
|
|
tpLimMlmSetKeysReq pMlmStaKeys =
|
|
&ft_ctx->PreAuthKeyInfo.extSetStaKeyParam;
|
|
&ft_ctx->PreAuthKeyInfo.extSetStaKeyParam;
|
|
lim_send_set_sta_key_req(mac_ctx, pMlmStaKeys,
|
|
lim_send_set_sta_key_req(mac_ctx, pMlmStaKeys,
|
|
- 0, 0, ft_session, false);
|
|
|
|
|
|
+ 0, ft_session, false);
|
|
ft_ctx->PreAuthKeyInfo.extSetStaKeyParamValid =
|
|
ft_ctx->PreAuthKeyInfo.extSetStaKeyParamValid =
|
|
false;
|
|
false;
|
|
}
|
|
}
|
|
@@ -1477,14 +1476,6 @@ void lim_process_sta_mlm_add_sta_rsp(struct mac_context *mac_ctx,
|
|
MTRACE(mac_trace(mac_ctx, TRACE_CODE_MLM_STATE,
|
|
MTRACE(mac_trace(mac_ctx, TRACE_CODE_MLM_STATE,
|
|
session_entry->peSessionId,
|
|
session_entry->peSessionId,
|
|
session_entry->limMlmState));
|
|
session_entry->limMlmState));
|
|
- /*
|
|
|
|
- * Storing the self StaIndex(Generated by HAL) in
|
|
|
|
- * session context, instead of storing it in DPH Hash
|
|
|
|
- * entry for Self STA.
|
|
|
|
- * DPH entry for the self STA stores the sta index for
|
|
|
|
- * the BSS entry to which the STA is associated
|
|
|
|
- */
|
|
|
|
- session_entry->staId = add_sta_params->staIdx;
|
|
|
|
|
|
|
|
#ifdef WLAN_DEBUG
|
|
#ifdef WLAN_DEBUG
|
|
mac_ctx->lim.gLimNumLinkEsts++;
|
|
mac_ctx->lim.gLimNumLinkEsts++;
|
|
@@ -1914,7 +1905,6 @@ void lim_process_ap_mlm_add_sta_rsp(struct mac_context *mac,
|
|
pe_session);
|
|
pe_session);
|
|
goto end;
|
|
goto end;
|
|
}
|
|
}
|
|
- sta->staIndex = pAddStaParams->staIdx;
|
|
|
|
sta->nss = pAddStaParams->nss;
|
|
sta->nss = pAddStaParams->nss;
|
|
/* if the AssocRsp frame is not acknowledged, then keep alive timer will take care of the state */
|
|
/* if the AssocRsp frame is not acknowledged, then keep alive timer will take care of the state */
|
|
sta->valid = 1;
|
|
sta->valid = 1;
|
|
@@ -2022,7 +2012,6 @@ static void lim_process_ap_mlm_add_bss_rsp(struct mac_context *mac,
|
|
&& (isWepEnabled))
|
|
&& (isWepEnabled))
|
|
mac->mlme_cfg->sap_cfg.assoc_sta_limit =
|
|
mac->mlme_cfg->sap_cfg.assoc_sta_limit =
|
|
MAX_SUPPORTED_PEERS_WEP;
|
|
MAX_SUPPORTED_PEERS_WEP;
|
|
- pe_session->staId = wma_peer_get_peet_id(pe_session->bssId);
|
|
|
|
mlmStartCnf.resultCode = eSIR_SME_SUCCESS;
|
|
mlmStartCnf.resultCode = eSIR_SME_SUCCESS;
|
|
} else {
|
|
} else {
|
|
pe_err("WMA_ADD_BSS_REQ failed with status %d",
|
|
pe_err("WMA_ADD_BSS_REQ failed with status %d",
|
|
@@ -2075,8 +2064,6 @@ lim_process_ibss_mlm_add_bss_rsp(struct mac_context *mac,
|
|
|
|
|
|
/* Apply previously set configuration at HW */
|
|
/* Apply previously set configuration at HW */
|
|
lim_apply_configuration(mac, pe_session);
|
|
lim_apply_configuration(mac, pe_session);
|
|
- pe_session->staId =
|
|
|
|
- wma_peer_get_peet_id(pe_session->self_mac_addr);
|
|
|
|
mlmStartCnf.resultCode = eSIR_SME_SUCCESS;
|
|
mlmStartCnf.resultCode = eSIR_SME_SUCCESS;
|
|
/* If ADD BSS was issued as part of IBSS coalescing, don't send the message to SME, as that is internal to LIM */
|
|
/* If ADD BSS was issued as part of IBSS coalescing, don't send the message to SME, as that is internal to LIM */
|
|
if (true == mac->lim.gLimIbssCoalescingHappened) {
|
|
if (true == mac->lim.gLimIbssCoalescingHappened) {
|
|
@@ -2154,8 +2141,6 @@ void lim_process_sta_add_bss_rsp_pre_assoc(struct mac_context *mac_ctx,
|
|
goto joinFailure;
|
|
goto joinFailure;
|
|
}
|
|
}
|
|
/* Success, handle below */
|
|
/* Success, handle below */
|
|
- /* STA Index(genr by HAL) for the BSS entry is stored here */
|
|
|
|
- sta->staIndex = add_bss_params->staContext.staIdx;
|
|
|
|
/* Trigger Authentication with AP */
|
|
/* Trigger Authentication with AP */
|
|
cfgAuthType = mac_ctx->mlme_cfg->wep_params.auth_type;
|
|
cfgAuthType = mac_ctx->mlme_cfg->wep_params.auth_type;
|
|
|
|
|
|
@@ -2182,8 +2167,6 @@ void lim_process_sta_add_bss_rsp_pre_assoc(struct mac_context *mac_ctx,
|
|
pMlmAuthReq->sessionId = session_entry->peSessionId;
|
|
pMlmAuthReq->sessionId = session_entry->peSessionId;
|
|
session_entry->limPrevSmeState = session_entry->limSmeState;
|
|
session_entry->limPrevSmeState = session_entry->limSmeState;
|
|
session_entry->limSmeState = eLIM_SME_WT_AUTH_STATE;
|
|
session_entry->limSmeState = eLIM_SME_WT_AUTH_STATE;
|
|
- /* remember staId in case of assoc timeout/failure handling */
|
|
|
|
- session_entry->staId = add_bss_params->staContext.staIdx;
|
|
|
|
|
|
|
|
MTRACE(mac_trace(mac_ctx, TRACE_CODE_SME_STATE,
|
|
MTRACE(mac_trace(mac_ctx, TRACE_CODE_SME_STATE,
|
|
session_entry->peSessionId,
|
|
session_entry->peSessionId,
|
|
@@ -2218,7 +2201,6 @@ static void lim_process_sta_mlm_add_bss_rsp(struct mac_context *mac_ctx,
|
|
uint32_t msg_type = LIM_MLM_ASSOC_CNF;
|
|
uint32_t msg_type = LIM_MLM_ASSOC_CNF;
|
|
uint32_t sub_type = LIM_ASSOC;
|
|
uint32_t sub_type = LIM_ASSOC;
|
|
tpDphHashNode sta_ds = NULL;
|
|
tpDphHashNode sta_ds = NULL;
|
|
- uint16_t sta_idx = STA_INVALID_IDX;
|
|
|
|
uint8_t update_sta = false;
|
|
uint8_t update_sta = false;
|
|
|
|
|
|
mlm_assoc_cnf.resultCode = eSIR_SME_SUCCESS;
|
|
mlm_assoc_cnf.resultCode = eSIR_SME_SUCCESS;
|
|
@@ -2238,7 +2220,6 @@ static void lim_process_sta_mlm_add_bss_rsp(struct mac_context *mac_ctx,
|
|
*/
|
|
*/
|
|
if (sir_compare_mac_addr(session_entry->bssId,
|
|
if (sir_compare_mac_addr(session_entry->bssId,
|
|
session_entry->limReAssocbssId)) {
|
|
session_entry->limReAssocbssId)) {
|
|
- sta_idx = session_entry->staId;
|
|
|
|
update_sta = true;
|
|
update_sta = true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -2274,19 +2255,13 @@ static void lim_process_sta_mlm_add_bss_rsp(struct mac_context *mac_ctx,
|
|
(tSirResultCodes) eSIR_SME_REFUSED;
|
|
(tSirResultCodes) eSIR_SME_REFUSED;
|
|
} else {
|
|
} else {
|
|
/* Success, handle below */
|
|
/* Success, handle below */
|
|
- /*
|
|
|
|
- * STA Index(genr by HAL) for the BSS
|
|
|
|
- * entry is stored here
|
|
|
|
- */
|
|
|
|
- sta_ds->staIndex =
|
|
|
|
- wma_peer_get_peet_id(session_entry->bssId);
|
|
|
|
/* Downgrade the EDCA parameters if needed */
|
|
/* Downgrade the EDCA parameters if needed */
|
|
lim_set_active_edca_params(mac_ctx,
|
|
lim_set_active_edca_params(mac_ctx,
|
|
session_entry->gLimEdcaParams, session_entry);
|
|
session_entry->gLimEdcaParams, session_entry);
|
|
lim_send_edca_params(mac_ctx,
|
|
lim_send_edca_params(mac_ctx,
|
|
session_entry->gLimEdcaParamsActive,
|
|
session_entry->gLimEdcaParamsActive,
|
|
session_entry->vdev_id, false);
|
|
session_entry->vdev_id, false);
|
|
- if (lim_add_sta_self(mac_ctx, sta_idx, update_sta,
|
|
|
|
|
|
+ if (lim_add_sta_self(mac_ctx, update_sta,
|
|
session_entry) != QDF_STATUS_SUCCESS) {
|
|
session_entry) != QDF_STATUS_SUCCESS) {
|
|
/* Add STA context at HW */
|
|
/* Add STA context at HW */
|
|
pe_err("Session:%d could not Add Self"
|
|
pe_err("Session:%d could not Add Self"
|