|
@@ -1186,6 +1186,7 @@ static QDF_STATUS lim_send_join_req(struct pe_session *session,
|
|
|
mlm_join_req);
|
|
|
}
|
|
|
|
|
|
+#ifdef WLAN_FEATURE_HOST_ROAM
|
|
|
/**
|
|
|
* lim_send_reassoc_req() - send vdev start request for reassoc
|
|
|
*@session: pe session
|
|
@@ -1212,6 +1213,35 @@ static QDF_STATUS lim_send_reassoc_req(struct pe_session *session,
|
|
|
return QDF_STATUS_SUCCESS;
|
|
|
}
|
|
|
|
|
|
+/**
|
|
|
+ * lim_send_ft_reassoc_req() - send vdev start request for ft_reassoc
|
|
|
+ *@session: pe session
|
|
|
+ *@mlm_join_req: join req
|
|
|
+ *
|
|
|
+ * Return: QDF_STATUS
|
|
|
+ */
|
|
|
+static QDF_STATUS lim_send_ft_reassoc_req(struct pe_session *session,
|
|
|
+ tLimMlmReassocReq *reassoc_req)
|
|
|
+{
|
|
|
+ QDF_STATUS status;
|
|
|
+
|
|
|
+ status = mlme_set_assoc_type(session->vdev, VDEV_FT_REASSOC);
|
|
|
+ if (QDF_IS_STATUS_ERROR(status))
|
|
|
+ return status;
|
|
|
+
|
|
|
+ if (wlan_vdev_mlme_get_state(session->vdev) == WLAN_VDEV_S_UP) {
|
|
|
+ pe_err("ft_reassoc req in unexpected vdev SM state:%d",
|
|
|
+ wlan_vdev_mlme_get_state(session->vdev));
|
|
|
+ return QDF_STATUS_E_FAILURE;
|
|
|
+ }
|
|
|
+
|
|
|
+ return wlan_vdev_mlme_sm_deliver_evt(session->vdev,
|
|
|
+ WLAN_VDEV_SM_EV_START,
|
|
|
+ sizeof(*reassoc_req),
|
|
|
+ reassoc_req);
|
|
|
+}
|
|
|
+#endif
|
|
|
+
|
|
|
static void lim_join_req_update_ht_vht_caps(struct mac_context *mac,
|
|
|
struct pe_session *session,
|
|
|
struct bss_description *bss_desc,
|
|
@@ -1299,34 +1329,6 @@ static void lim_join_req_update_ht_vht_caps(struct mac_context *mac,
|
|
|
ht_caps.caps, vht_config.caps);
|
|
|
}
|
|
|
|
|
|
-/**
|
|
|
- * lim_send_ft_reassoc_req() - send vdev start request for ft_reassoc
|
|
|
- *@session: pe session
|
|
|
- *@mlm_join_req: join req
|
|
|
- *
|
|
|
- * Return: QDF_STATUS
|
|
|
- */
|
|
|
-static QDF_STATUS lim_send_ft_reassoc_req(struct pe_session *session,
|
|
|
- tLimMlmReassocReq *reassoc_req)
|
|
|
-{
|
|
|
- QDF_STATUS status;
|
|
|
-
|
|
|
- status = mlme_set_assoc_type(session->vdev, VDEV_FT_REASSOC);
|
|
|
- if (QDF_IS_STATUS_ERROR(status))
|
|
|
- return status;
|
|
|
-
|
|
|
- if (wlan_vdev_mlme_get_state(session->vdev) == WLAN_VDEV_S_UP) {
|
|
|
- pe_err("ft_reassoc req in unexpected vdev SM state:%d",
|
|
|
- wlan_vdev_mlme_get_state(session->vdev));
|
|
|
- return QDF_STATUS_E_FAILURE;
|
|
|
- }
|
|
|
-
|
|
|
- return wlan_vdev_mlme_sm_deliver_evt(session->vdev,
|
|
|
- WLAN_VDEV_SM_EV_START,
|
|
|
- sizeof(*reassoc_req),
|
|
|
- reassoc_req);
|
|
|
-}
|
|
|
-
|
|
|
bool
|
|
|
lim_get_vdev_rmf_capable(struct mac_context *mac, struct pe_session *session)
|
|
|
{
|
|
@@ -2517,38 +2519,6 @@ static inline void lim_update_sae_config(struct mac_context *mac,
|
|
|
{ }
|
|
|
#endif
|
|
|
|
|
|
-#ifdef FEATURE_WLAN_ESE
|
|
|
-static bool lim_is_open_mode(struct wlan_objmgr_vdev *vdev)
|
|
|
-{
|
|
|
- int32_t ucast_cipher;
|
|
|
-
|
|
|
- ucast_cipher = wlan_crypto_get_param(vdev,
|
|
|
- WLAN_CRYPTO_PARAM_UCAST_CIPHER);
|
|
|
- if (!ucast_cipher ||
|
|
|
- ((QDF_HAS_PARAM(ucast_cipher, WLAN_CRYPTO_CIPHER_NONE) ==
|
|
|
- ucast_cipher)))
|
|
|
- return true;
|
|
|
-
|
|
|
- return false;
|
|
|
-}
|
|
|
-
|
|
|
-static bool
|
|
|
-lim_ese_open_present(struct pe_session *session, bool ese_version_present)
|
|
|
-{
|
|
|
- if (lim_is_open_mode(session->vdev) && ese_version_present &&
|
|
|
- session->mac_ctx->mlme_cfg->lfr.ese_enabled)
|
|
|
- return true;
|
|
|
-
|
|
|
- return false;
|
|
|
-}
|
|
|
-#else
|
|
|
-static bool
|
|
|
-lim_ese_open_present(struct pe_session *session, bool ese_version_present)
|
|
|
-{
|
|
|
- return false;
|
|
|
-}
|
|
|
-#endif
|
|
|
-
|
|
|
static void
|
|
|
lim_fill_11r_params(struct mac_context *mac_ctx, struct pe_session *session,
|
|
|
bool ese_version_present)
|
|
@@ -2560,44 +2530,16 @@ lim_fill_11r_params(struct mac_context *mac_ctx, struct pe_session *session,
|
|
|
return;
|
|
|
if (wlan_cm_is_auth_type_11r(mlme_obj, session->vdev,
|
|
|
session->lim_join_req->bssDescription.mdiePresent) &&
|
|
|
- !lim_ese_open_present(session, ese_version_present))
|
|
|
+ !cm_ese_open_present(session->vdev, mlme_obj, ese_version_present))
|
|
|
session->is11Rconnection = true;
|
|
|
}
|
|
|
|
|
|
#ifdef FEATURE_WLAN_ESE
|
|
|
-static bool
|
|
|
-lim_is_ese_profile(struct mac_context *mac_ctx, struct pe_session *session,
|
|
|
- bool ese_version_present)
|
|
|
-{
|
|
|
- int32_t akm;
|
|
|
- int32_t auth_mode;
|
|
|
-
|
|
|
- akm = wlan_crypto_get_param(session->vdev,
|
|
|
- WLAN_CRYPTO_PARAM_KEY_MGMT);
|
|
|
-
|
|
|
- auth_mode = wlan_crypto_get_param(session->vdev,
|
|
|
- WLAN_CRYPTO_PARAM_AUTH_MODE);
|
|
|
-
|
|
|
- if (!mac_ctx->mlme_cfg->lfr.ese_enabled)
|
|
|
- return false;
|
|
|
-
|
|
|
- if (QDF_HAS_PARAM(akm, WLAN_CRYPTO_KEY_MGMT_CCKM))
|
|
|
- return true;
|
|
|
-
|
|
|
- /* A profile can not be both ESE and 11R. But an 802.11R AP
|
|
|
- * may be advertising support for ESE as well. So if we are
|
|
|
- * associating Open or explicitly ESE then we will get ESE.
|
|
|
- * If we are associating explicitly 11R only then we will get
|
|
|
- * 11R.
|
|
|
- */
|
|
|
- return lim_ese_open_present(session, ese_version_present);
|
|
|
-}
|
|
|
-
|
|
|
static void
|
|
|
lim_fill_ese_params(struct mac_context *mac_ctx, struct pe_session *session,
|
|
|
bool ese_version_present)
|
|
|
{
|
|
|
- if (lim_is_ese_profile(mac_ctx, session, ese_version_present))
|
|
|
+ if (cm_is_ese_connection(session->vdev, ese_version_present))
|
|
|
session->isESEconnection = true;
|
|
|
|
|
|
wlan_cm_set_ese_assoc(mac_ctx->pdev, session->vdev_id,
|
|
@@ -2807,11 +2749,6 @@ lim_fill_pe_session(struct mac_context *mac_ctx, struct pe_session *session,
|
|
|
|
|
|
qdf_mem_free(ie_struct);
|
|
|
|
|
|
- wlan_add_supported_5Ghz_channels(mac_ctx->psoc, mac_ctx->pdev,
|
|
|
- session->lim_join_req->supportedChannels.channelList,
|
|
|
- &session->lim_join_req->supportedChannels.numChnl,
|
|
|
- false);
|
|
|
-
|
|
|
/* Copying of bssId is already done, while creating session */
|
|
|
sir_copy_mac_addr(session->self_mac_addr,
|
|
|
wlan_vdev_mlme_get_macaddr(session->vdev));
|
|
@@ -3394,8 +3331,7 @@ lim_fill_rsn_ie(struct mac_context *mac_ctx, struct pe_session *session,
|
|
|
WLAN_ELEMID_RSN, ONE_BYTE,
|
|
|
NULL, 0, rsn_ie, DOT11F_IE_RSN_MAX_LEN);
|
|
|
|
|
|
- if (session->lim_join_req->force_rsne_override &&
|
|
|
- QDF_IS_STATUS_SUCCESS(status)) {
|
|
|
+ if (req->force_rsne_override && QDF_IS_STATUS_SUCCESS(status)) {
|
|
|
rsn_ie_len = rsn_ie[1];
|
|
|
if (rsn_ie_len < DOT11F_IE_RSN_MIN_LEN ||
|
|
|
rsn_ie_len > DOT11F_IE_RSN_MAX_LEN) {
|
|
@@ -3624,6 +3560,9 @@ lim_fill_session_params(struct mac_context *mac_ctx,
|
|
|
req->assoc_ie.ptr, req->assoc_ie.len);
|
|
|
qdf_mem_copy(pe_join_req->addIEAssoc.addIEdata,
|
|
|
req->assoc_ie.ptr, req->assoc_ie.len);
|
|
|
+ /* update assoc ie to cm */
|
|
|
+ cm_update_session_assoc_ie(mac_ctx->psoc, session->vdev_id,
|
|
|
+ &req->assoc_ie);
|
|
|
pe_join_req->addIEAssoc.length = req->assoc_ie.len;
|
|
|
qdf_mem_copy(pe_join_req->addIEScan.addIEdata,
|
|
|
req->scan_ie.ptr, req->scan_ie.len);
|
|
@@ -3902,6 +3841,391 @@ QDF_STATUS cm_process_peer_create(struct scheduler_msg *msg)
|
|
|
|
|
|
return status;
|
|
|
}
|
|
|
+
|
|
|
+#ifdef WLAN_FEATURE_HOST_ROAM
|
|
|
+static void lim_handle_reassoc_req(struct cm_vdev_join_req *req)
|
|
|
+{
|
|
|
+ struct mac_context *mac_ctx;
|
|
|
+ struct pe_session *session_entry;
|
|
|
+ uint8_t session_id;
|
|
|
+ uint8_t vdev_id;
|
|
|
+ uint32_t ie_len;
|
|
|
+ uint32_t bss_len;
|
|
|
+ struct join_req *reassoc_req = NULL;
|
|
|
+ uint16_t caps;
|
|
|
+ uint32_t val;
|
|
|
+ tLimMlmReassocReq *mlm_reassoc_req;
|
|
|
+ tSirResultCodes ret_code = eSIR_SME_SUCCESS;
|
|
|
+ int8_t local_pwr_constraint = 0, reg_max = 0;
|
|
|
+ uint32_t tele_bcn_en = 0;
|
|
|
+ QDF_STATUS status;
|
|
|
+ tDot11fBeaconIEs *ie_struct;
|
|
|
+ ePhyChanBondState cb_mode;
|
|
|
+ tSirMacCapabilityInfo *ap_cap_info;
|
|
|
+ struct bss_description *bss_desc;
|
|
|
+ uint8_t wmm_mode, value;
|
|
|
+ bool is_pwr_constraint;
|
|
|
+ int32_t ucast_cipher;
|
|
|
+ int32_t auth_mode;
|
|
|
+ int32_t akm;
|
|
|
+
|
|
|
+ if (!req)
|
|
|
+ return;
|
|
|
+
|
|
|
+ mac_ctx = cds_get_context(QDF_MODULE_ID_PE);
|
|
|
+ if (!mac_ctx)
|
|
|
+ return;
|
|
|
+
|
|
|
+ vdev_id = req->vdev_id;
|
|
|
+ session_entry = pe_find_session_by_bssid(mac_ctx,
|
|
|
+ req->entry->bssid.bytes,
|
|
|
+ &session_id);
|
|
|
+ if (!session_entry) {
|
|
|
+ pe_err("Session does not exist for: "QDF_MAC_ADDR_FMT,
|
|
|
+ QDF_MAC_ADDR_REF(req->entry->bssid.bytes));
|
|
|
+ ret_code = eSIR_SME_INVALID_PARAMETERS;
|
|
|
+ session_entry = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
|
|
|
+ if (session_entry)
|
|
|
+ lim_handle_sme_join_result(mac_ctx,
|
|
|
+ eSIR_SME_INVALID_PARAMETERS,
|
|
|
+ STATUS_UNSPECIFIED_FAILURE,
|
|
|
+ session_entry);
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+ session_entry->cm_id = req->cm_id;
|
|
|
+ ie_len = util_scan_entry_ie_len(req->entry);
|
|
|
+ bss_len = (uint16_t)(offsetof(struct bss_description,
|
|
|
+ ieFields[0]) + ie_len);
|
|
|
+
|
|
|
+ reassoc_req = qdf_mem_malloc(sizeof(*session_entry->lim_join_req) +
|
|
|
+ bss_len);
|
|
|
+ if (!reassoc_req) {
|
|
|
+ ret_code = eSIR_SME_RESOURCES_UNAVAILABLE;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+ lim_diag_event_report(mac_ctx, WLAN_PE_DIAG_REASSOC_REQ_EVENT,
|
|
|
+ session_entry, QDF_STATUS_SUCCESS,
|
|
|
+ QDF_STATUS_SUCCESS);
|
|
|
+
|
|
|
+ pe_debug("Beacon/probe frame received:");
|
|
|
+ QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE, QDF_TRACE_LEVEL_DEBUG,
|
|
|
+ util_scan_entry_frame_ptr(req->entry),
|
|
|
+ util_scan_entry_frame_len(req->entry));
|
|
|
+
|
|
|
+ bss_desc = &reassoc_req->bssDescription;
|
|
|
+ status = wlan_fill_bss_desc_from_scan_entry(mac_ctx, bss_desc,
|
|
|
+ req->entry);
|
|
|
+ if (QDF_IS_STATUS_ERROR(status)) {
|
|
|
+ ret_code = eSIR_SME_RESOURCES_UNAVAILABLE;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+ /* Store the reassoc handle in the session Table */
|
|
|
+ session_entry->lim_join_req = reassoc_req;
|
|
|
+ session_entry->pLimReAssocReq = reassoc_req;
|
|
|
+
|
|
|
+ status = wlan_get_parsed_bss_description_ies(mac_ctx, bss_desc,
|
|
|
+ &ie_struct);
|
|
|
+ if (QDF_IS_STATUS_ERROR(status)) {
|
|
|
+ pe_err("IE parsing failed vdev id %d",
|
|
|
+ session_entry->vdev_id);
|
|
|
+ session_entry->lim_join_req = NULL;
|
|
|
+ ret_code = eSIR_SME_RESOURCES_UNAVAILABLE;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+ pe_debug("Assoc IE len: %d", req->assoc_ie.len);
|
|
|
+ if (req->assoc_ie.len)
|
|
|
+ QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE, QDF_TRACE_LEVEL_DEBUG,
|
|
|
+ req->assoc_ie.ptr, req->assoc_ie.len);
|
|
|
+ if (lim_is_rsn_profile(session_entry))
|
|
|
+ lim_fill_rsn_ie(mac_ctx, session_entry, req);
|
|
|
+ else if (lim_is_wpa_profile(session_entry))
|
|
|
+ lim_fill_wpa_ie(mac_ctx, session_entry, req);
|
|
|
+ else if (lim_is_wapi_profile(session_entry))
|
|
|
+ lim_fill_wapi_ie(mac_ctx, session_entry, req);
|
|
|
+
|
|
|
+ pe_debug("After stripping Assoc IE len: %d", req->assoc_ie.len);
|
|
|
+ if (req->assoc_ie.len)
|
|
|
+ QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE, QDF_TRACE_LEVEL_DEBUG,
|
|
|
+ req->assoc_ie.ptr, req->assoc_ie.len);
|
|
|
+ qdf_mem_copy(reassoc_req->addIEAssoc.addIEdata,
|
|
|
+ req->assoc_ie.ptr, req->assoc_ie.len);
|
|
|
+ reassoc_req->addIEAssoc.length = req->assoc_ie.len;
|
|
|
+ /* update assoc ie to cm */
|
|
|
+ cm_update_session_assoc_ie(mac_ctx->psoc, vdev_id, &req->assoc_ie);
|
|
|
+ ucast_cipher = wlan_crypto_get_param(session_entry->vdev,
|
|
|
+ WLAN_CRYPTO_PARAM_UCAST_CIPHER);
|
|
|
+ auth_mode = wlan_crypto_get_param(session_entry->vdev,
|
|
|
+ WLAN_CRYPTO_PARAM_AUTH_MODE);
|
|
|
+ akm = wlan_crypto_get_param(session_entry->vdev,
|
|
|
+ WLAN_CRYPTO_PARAM_KEY_MGMT);
|
|
|
+ ap_cap_info = (tSirMacCapabilityInfo *)&req->entry->cap_info.value;
|
|
|
+
|
|
|
+ lim_set_privacy(mac_ctx, ucast_cipher, auth_mode, akm,
|
|
|
+ ap_cap_info->privacy);
|
|
|
+
|
|
|
+ if (session_entry->vhtCapability) {
|
|
|
+ if (session_entry->opmode == QDF_STA_MODE) {
|
|
|
+ session_entry->vht_config.su_beam_formee =
|
|
|
+ mac_ctx->mlme_cfg->vht_caps.vht_cap_info.su_bformee;
|
|
|
+ } else {
|
|
|
+ session_entry->vht_config.su_beam_formee = 0;
|
|
|
+ }
|
|
|
+ session_entry->enableVhtpAid =
|
|
|
+ mac_ctx->mlme_cfg->vht_caps.vht_cap_info.enable_paid;
|
|
|
+ session_entry->enableVhtGid =
|
|
|
+ mac_ctx->mlme_cfg->vht_caps.vht_cap_info.enable_gid;
|
|
|
+ pe_debug("vht su bformer [%d]", session_entry->vht_config.su_beam_former);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (session_entry->nss == 1)
|
|
|
+ session_entry->supported_nss_1x1 = true;
|
|
|
+
|
|
|
+ lim_check_oui_and_update_session(mac_ctx, session_entry, ie_struct);
|
|
|
+
|
|
|
+ session_entry->lim_reassoc_chan_freq = req->entry->channel.chan_freq;
|
|
|
+ cb_mode = wlan_get_cb_mode(mac_ctx,
|
|
|
+ session_entry->lim_reassoc_chan_freq,
|
|
|
+ ie_struct);
|
|
|
+ session_entry->reAssocHtSupportedChannelWidthSet = cb_mode ? 1 : 0;
|
|
|
+ session_entry->reAssocHtRecommendedTxWidthSet =
|
|
|
+ session_entry->reAssocHtSupportedChannelWidthSet;
|
|
|
+ session_entry->reAssocHtSecondaryChannelOffset = cb_mode;
|
|
|
+
|
|
|
+ mac_ctx->mlme_cfg->power.local_power_constraint =
|
|
|
+ wlan_get_11h_power_constraint(mac_ctx,
|
|
|
+ &ie_struct->PowerConstraints);
|
|
|
+ if (session_entry->dot11mode == MLME_DOT11_MODE_11B)
|
|
|
+ mac_ctx->mlme_cfg->feature_flags.enable_short_slot_time_11g = 0;
|
|
|
+ else
|
|
|
+ mac_ctx->mlme_cfg->feature_flags.enable_short_slot_time_11g =
|
|
|
+ mac_ctx->mlme_cfg->ht_caps.short_slot_time_enabled;
|
|
|
+ session_entry->enable_session_twt_support =
|
|
|
+ lim_enable_twt(mac_ctx, ie_struct);
|
|
|
+
|
|
|
+ qdf_mem_free(ie_struct);
|
|
|
+ pe_debug("vhtCapability: %d su_beam_formee: %d su_tx_bformer %d",
|
|
|
+ session_entry->vhtCapability,
|
|
|
+ session_entry->vht_config.su_beam_formee,
|
|
|
+ session_entry->vht_config.su_beam_former);
|
|
|
+
|
|
|
+ session_entry->enableHtSmps = mac_ctx->mlme_cfg->ht_caps.enable_smps;
|
|
|
+ session_entry->htSmpsvalue = mac_ctx->mlme_cfg->ht_caps.smps;
|
|
|
+ session_entry->send_smps_action =
|
|
|
+ mac_ctx->roam.configParam.send_smps_action;
|
|
|
+ pe_debug("enableHtSmps: %d htSmps: %d send action: %d supported nss 1x1: %d",
|
|
|
+ session_entry->enableHtSmps,
|
|
|
+ session_entry->htSmpsvalue,
|
|
|
+ session_entry->send_smps_action,
|
|
|
+ session_entry->supported_nss_1x1);
|
|
|
+ session_entry->lim_join_req = NULL;
|
|
|
+
|
|
|
+ /* Reassociate request is expected in link established state only. */
|
|
|
+ if (session_entry->limSmeState != eLIM_SME_LINK_EST_STATE) {
|
|
|
+ if (session_entry->limSmeState == eLIM_SME_WT_REASSOC_STATE) {
|
|
|
+ /*
|
|
|
+ * May be from 11r FT pre-auth. So lets check it
|
|
|
+ * before we bail out
|
|
|
+ */
|
|
|
+ pe_debug("Session in reassoc state is %d",
|
|
|
+ session_entry->peSessionId);
|
|
|
+
|
|
|
+ /* Make sure its our preauth bssid */
|
|
|
+ if (qdf_mem_cmp(req->entry->bssid.bytes,
|
|
|
+ session_entry->limReAssocbssId,
|
|
|
+ QDF_MAC_ADDR_SIZE)) {
|
|
|
+ pe_err("Requested BSSID: "QDF_MAC_ADDR_FMT " but bssId in reassoc state" QDF_MAC_ADDR_FMT,
|
|
|
+ QDF_MAC_ADDR_REF(req->entry->bssid.bytes),
|
|
|
+ QDF_MAC_ADDR_REF(session_entry->limReAssocbssId));
|
|
|
+ ret_code = eSIR_SME_INVALID_PARAMETERS;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+
|
|
|
+ session_entry->vdev_id = vdev_id;
|
|
|
+ mlm_reassoc_req =
|
|
|
+ qdf_mem_malloc(sizeof(*mlm_reassoc_req));
|
|
|
+ if (!mlm_reassoc_req) {
|
|
|
+ ret_code = eSIR_SME_RESOURCES_UNAVAILABLE;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+
|
|
|
+ /* Update PE sessionId */
|
|
|
+ mlm_reassoc_req->sessionId = session_entry->peSessionId;
|
|
|
+ status = lim_send_ft_reassoc_req(session_entry,
|
|
|
+ mlm_reassoc_req);
|
|
|
+ if (QDF_IS_STATUS_ERROR(status)) {
|
|
|
+ qdf_mem_free(mlm_reassoc_req);
|
|
|
+ ret_code = eSIR_SME_REFUSED;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+ return;
|
|
|
+ }
|
|
|
+ /*
|
|
|
+ * Should not have received eWNI_SME_REASSOC_REQ
|
|
|
+ */
|
|
|
+ pe_err("received unexpected SME_REASSOC_REQ in state %X",
|
|
|
+ session_entry->limSmeState);
|
|
|
+ lim_print_sme_state(mac_ctx, LOGE, session_entry->limSmeState);
|
|
|
+
|
|
|
+ ret_code = eSIR_SME_UNEXPECTED_REQ_RESULT_CODE;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+
|
|
|
+ qdf_mem_copy(session_entry->limReAssocbssId, req->entry->bssid.bytes,
|
|
|
+ sizeof(tSirMacAddr));
|
|
|
+
|
|
|
+ session_entry->limReassocBssCaps = req->entry->cap_info.value;
|
|
|
+ reg_max = wlan_reg_get_channel_reg_power_for_freq(
|
|
|
+ mac_ctx->pdev, session_entry->curr_op_freq);
|
|
|
+ local_pwr_constraint = reg_max;
|
|
|
+
|
|
|
+ lim_extract_ap_capability(mac_ctx, (uint8_t *)bss_desc->ieFields,
|
|
|
+ lim_get_ielen_from_bss_description(bss_desc),
|
|
|
+ &session_entry->limReassocBssQosCaps,
|
|
|
+ &session_entry->gLimCurrentBssUapsd,
|
|
|
+ &local_pwr_constraint, session_entry,
|
|
|
+ &is_pwr_constraint);
|
|
|
+ if (is_pwr_constraint)
|
|
|
+ local_pwr_constraint = reg_max - local_pwr_constraint;
|
|
|
+
|
|
|
+ session_entry->maxTxPower = QDF_MIN(reg_max, (local_pwr_constraint));
|
|
|
+ session_entry->max_11h_pwr =
|
|
|
+ QDF_MIN(lim_get_cfg_max_tx_power(mac_ctx,
|
|
|
+ bss_desc->chan_freq),
|
|
|
+ MAX_TX_PWR_CAP);
|
|
|
+ session_entry->min_11h_pwr = MIN_TX_PWR_CAP;
|
|
|
+ if (!session_entry->max_11h_pwr)
|
|
|
+ session_entry->max_11h_pwr = MAX_TX_PWR_CAP;
|
|
|
+
|
|
|
+ if (session_entry->max_11h_pwr > session_entry->maxTxPower)
|
|
|
+ session_entry->max_11h_pwr = session_entry->maxTxPower;
|
|
|
+
|
|
|
+ pe_info("Reg max = %d, local pwr constraint = %d, max tx = %d",
|
|
|
+ reg_max, local_pwr_constraint, session_entry->maxTxPower);
|
|
|
+ /* Copy the SSID from session entry to local variable */
|
|
|
+ session_entry->limReassocSSID.length = req->entry->ssid.length;
|
|
|
+ qdf_mem_copy(session_entry->limReassocSSID.ssId,
|
|
|
+ req->entry->ssid.ssid,
|
|
|
+ session_entry->limReassocSSID.length);
|
|
|
+
|
|
|
+ if (!session_entry->enable_session_twt_support) {
|
|
|
+ status = wlan_mlme_get_wmm_mode(mac_ctx->psoc, &wmm_mode);
|
|
|
+ if (!QDF_IS_STATUS_SUCCESS(status)) {
|
|
|
+ pe_err("Get wmm_mode failed");
|
|
|
+ ret_code = eSIR_SME_INVALID_PARAMETERS;
|
|
|
+ goto end;
|
|
|
+ } else if (wmm_mode == 2) {
|
|
|
+ /*QoS not enabled in cfg file */
|
|
|
+ session_entry->gUapsdPerAcBitmask = 0;
|
|
|
+ } else {
|
|
|
+ /*QoS enabled, update uapsd mask from cfg file */
|
|
|
+ status = wlan_mlme_get_wmm_uapsd_mask(mac_ctx->psoc,
|
|
|
+ &value);
|
|
|
+ if (QDF_IS_STATUS_ERROR(status)) {
|
|
|
+ pe_err("Get uapsd_mask failed");
|
|
|
+ ret_code = eSIR_SME_INVALID_PARAMETERS;
|
|
|
+ goto end;
|
|
|
+ } else
|
|
|
+ session_entry->gUapsdPerAcBitmask = value;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ if (session_entry->gLimCurrentBssUapsd)
|
|
|
+ pe_debug("UAPSD flag for all AC - 0x%2x",
|
|
|
+ session_entry->gUapsdPerAcBitmask);
|
|
|
+
|
|
|
+ mlm_reassoc_req = qdf_mem_malloc(sizeof(tLimMlmReassocReq));
|
|
|
+ if (!mlm_reassoc_req) {
|
|
|
+ ret_code = eSIR_SME_RESOURCES_UNAVAILABLE;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+
|
|
|
+ qdf_mem_copy(mlm_reassoc_req->peerMacAddr,
|
|
|
+ session_entry->limReAssocbssId, sizeof(tSirMacAddr));
|
|
|
+
|
|
|
+ if (lim_get_capability_info(mac_ctx, &caps, session_entry) !=
|
|
|
+ QDF_STATUS_SUCCESS)
|
|
|
+ pe_err("could not retrieve Capabilities value");
|
|
|
+
|
|
|
+ lim_update_caps_info_for_bss(mac_ctx, &caps,
|
|
|
+ req->entry->cap_info.value);
|
|
|
+ pe_debug("Capabilities info Reassoc: 0x%X", caps);
|
|
|
+
|
|
|
+ mlm_reassoc_req->capabilityInfo = caps;
|
|
|
+
|
|
|
+ /* Update PE session_id */
|
|
|
+ mlm_reassoc_req->sessionId = session_id;
|
|
|
+
|
|
|
+ /*
|
|
|
+ * If telescopic beaconing is enabled, set listen interval to
|
|
|
+ * CFG_TELE_BCN_MAX_LI
|
|
|
+ */
|
|
|
+
|
|
|
+ tele_bcn_en = mac_ctx->mlme_cfg->sap_cfg.tele_bcn_wakeup_en;
|
|
|
+
|
|
|
+ if (tele_bcn_en)
|
|
|
+ val = mac_ctx->mlme_cfg->sap_cfg.tele_bcn_max_li;
|
|
|
+ else
|
|
|
+ val = mac_ctx->mlme_cfg->sap_cfg.listen_interval;
|
|
|
+
|
|
|
+ mlm_reassoc_req->listenInterval = (uint16_t) val;
|
|
|
+ if (mac_ctx->mlme_cfg->gen.enabled_11h &&
|
|
|
+ ap_cap_info->spectrumMgt && bss_desc->nwType == eSIR_11A_NW_TYPE)
|
|
|
+ session_entry->spectrumMgtEnabled = true;
|
|
|
+
|
|
|
+ /* Enable the spectrum management if this is a DFS channel */
|
|
|
+ if (session_entry->country_info_present &&
|
|
|
+ lim_isconnected_on_dfs_freq(
|
|
|
+ mac_ctx, session_entry->curr_op_freq))
|
|
|
+ session_entry->spectrumMgtEnabled = true;
|
|
|
+
|
|
|
+ session_entry->limPrevSmeState = session_entry->limSmeState;
|
|
|
+ session_entry->limSmeState = eLIM_SME_WT_REASSOC_STATE;
|
|
|
+
|
|
|
+ MTRACE(mac_trace(mac_ctx, TRACE_CODE_SME_STATE, session_entry->peSessionId,
|
|
|
+ session_entry->limSmeState));
|
|
|
+
|
|
|
+ status = lim_send_reassoc_req(session_entry, mlm_reassoc_req);
|
|
|
+ if (QDF_IS_STATUS_ERROR(status)) {
|
|
|
+ qdf_mem_free(mlm_reassoc_req);
|
|
|
+ ret_code = eSIR_SME_REFUSED;
|
|
|
+ goto end;
|
|
|
+ }
|
|
|
+
|
|
|
+ return;
|
|
|
+end:
|
|
|
+ if (reassoc_req) {
|
|
|
+ qdf_mem_free(reassoc_req);
|
|
|
+ if (session_entry)
|
|
|
+ session_entry->pLimReAssocReq = NULL;
|
|
|
+ }
|
|
|
+
|
|
|
+ /*
|
|
|
+ * Send Reassoc failure response to host
|
|
|
+ * (note session_entry may be NULL, but that's OK)
|
|
|
+ */
|
|
|
+ lim_send_sme_join_reassoc_rsp(mac_ctx, eWNI_SME_REASSOC_RSP,
|
|
|
+ ret_code, STATUS_UNSPECIFIED_FAILURE,
|
|
|
+ session_entry, vdev_id);
|
|
|
+}
|
|
|
+
|
|
|
+QDF_STATUS cm_process_reassoc_req(struct scheduler_msg *msg)
|
|
|
+{
|
|
|
+ struct cm_vdev_join_req *req;
|
|
|
+
|
|
|
+ if (!msg || !msg->bodyptr) {
|
|
|
+ mlme_err("msg or msg->bodyptr is NULL");
|
|
|
+ return QDF_STATUS_E_INVAL;
|
|
|
+ }
|
|
|
+
|
|
|
+ req = msg->bodyptr;
|
|
|
+
|
|
|
+ lim_handle_reassoc_req(req);
|
|
|
+
|
|
|
+ cm_free_join_req(req);
|
|
|
+
|
|
|
+ return QDF_STATUS_SUCCESS;
|
|
|
+}
|
|
|
+#endif
|
|
|
#else
|
|
|
|
|
|
/**
|
|
@@ -4558,6 +4882,7 @@ void lim_calculate_tpc(struct mac_context *mac,
|
|
|
num_pwr_levels, is_psd_power, reg_max, ap_power_type_6g);
|
|
|
}
|
|
|
|
|
|
+#ifndef FEATURE_CM_ENABLE
|
|
|
/**
|
|
|
* __lim_process_sme_reassoc_req() - process reassoc req
|
|
|
*
|
|
@@ -4604,7 +4929,6 @@ static void __lim_process_sme_reassoc_req(struct mac_context *mac_ctx,
|
|
|
}
|
|
|
qdf_mem_copy(reassoc_req, in_req, in_req->length);
|
|
|
|
|
|
-#ifndef FEATURE_CM_ENABLE
|
|
|
if (!lim_is_sme_join_req_valid(mac_ctx, reassoc_req)) {
|
|
|
/*
|
|
|
* Received invalid eWNI_SME_REASSOC_REQ
|
|
@@ -4614,7 +4938,7 @@ static void __lim_process_sme_reassoc_req(struct mac_context *mac_ctx,
|
|
|
ret_code = eSIR_SME_INVALID_PARAMETERS;
|
|
|
goto end;
|
|
|
}
|
|
|
-#endif
|
|
|
+
|
|
|
session_entry = pe_find_session_by_bssid(mac_ctx,
|
|
|
reassoc_req->bssDescription.bssId,
|
|
|
&session_id);
|
|
@@ -4918,6 +5242,7 @@ end:
|
|
|
ret_code, STATUS_UNSPECIFIED_FAILURE,
|
|
|
session_entry, vdev_id);
|
|
|
}
|
|
|
+#endif
|
|
|
|
|
|
bool send_disassoc_frame = 1;
|
|
|
/**
|
|
@@ -7462,11 +7787,10 @@ bool lim_process_sme_req_messages(struct mac_context *mac,
|
|
|
case eWNI_SME_JOIN_REQ:
|
|
|
__lim_process_sme_join_req(mac, msg_buf);
|
|
|
break;
|
|
|
-#endif
|
|
|
case eWNI_SME_REASSOC_REQ:
|
|
|
__lim_process_sme_reassoc_req(mac, msg_buf);
|
|
|
break;
|
|
|
-
|
|
|
+#endif
|
|
|
case eWNI_SME_DISASSOC_REQ:
|
|
|
lim_process_sme_disassoc_req(mac, pMsg);
|
|
|
break;
|