Browse Source

qcacld-3.0: Exempt pe_session validation for set_key_rsp in NAN mode

Currently, host driver validates pe_session in lim to handle
set key response and send the set context response to sme if there
is no valid session. This is fine for STA, P2P and SAP modes as
there would be a valid session. But host driver does not need to
send set context response for NAN iface in NAN pairing protocol
as it doesn't have a valid pe_session and peer does not exist for
NAN iface. So, exempt the pe_session validation for NAN interface.

Change-Id: Iff3ca8b6a281fc0ab94ed8be683ae507e20a214e
CRs-Fixed: 3257689
Rahul Gusain 2 years ago
parent
commit
d33f805968
1 changed files with 21 additions and 15 deletions
  1. 21 15
      core/mac/src/pe/lim/lim_process_mlm_rsp_messages.c

+ 21 - 15
core/mac/src/pe/lim/lim_process_mlm_rsp_messages.c

@@ -2502,6 +2502,7 @@ void lim_process_mlm_set_sta_key_rsp(struct mac_context *mac_ctx,
 	uint16_t key_len;
 	uint16_t result_status;
 	tSetStaKeyParams *set_key_params;
+	tLimMlmStates mlm_state = eLIM_MLM_OFFLINE_STATE;
 
 	SET_LIM_PROCESS_DEFD_MESGS(mac_ctx, true);
 	qdf_mem_zero((void *)&mlm_set_key_cnf, sizeof(tLimMlmSetKeysCnf));
@@ -2511,20 +2512,28 @@ void lim_process_mlm_set_sta_key_rsp(struct mac_context *mac_ctx,
 	}
 	set_key_params = msg->bodyptr;
 	vdev_id = set_key_params->vdev_id;
-	session_entry = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
-	if (!session_entry) {
-		pe_err("session does not exist for given vdev_id %d", vdev_id);
-		qdf_mem_zero(msg->bodyptr, sizeof(*set_key_params));
-		qdf_mem_free(msg->bodyptr);
-		msg->bodyptr = NULL;
-		lim_send_sme_set_context_rsp(mac_ctx,
-					     mlm_set_key_cnf.peer_macaddr,
-					     0, eSIR_SME_INVALID_SESSION, NULL,
-					     vdev_id);
-		return;
+	session_id = vdev_id;
+	if (wlan_get_opmode_from_vdev_id(mac_ctx->pdev,
+					 vdev_id) != QDF_NAN_DISC_MODE) {
+		session_entry = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
+		if (!session_entry) {
+			pe_err("session does not exist for given vdev_id %d",
+			       vdev_id);
+			qdf_mem_zero(msg->bodyptr, sizeof(*set_key_params));
+			qdf_mem_free(msg->bodyptr);
+			msg->bodyptr = NULL;
+			lim_send_sme_set_context_rsp(mac_ctx,
+						     mlm_set_key_cnf.peer_macaddr,
+						     0,
+						     eSIR_SME_INVALID_SESSION,
+						     NULL, vdev_id);
+			return;
+		}
+		session_id = session_entry->peSessionId;
+		mlm_state = session_entry->limMlmState;
 	}
 
-	session_id = session_entry->peSessionId;
+	MTRACE(mac_trace(mac_ctx, TRACE_CODE_MLM_STATE, session_id, mlm_state));
 	pe_debug("PE session ID %d, vdev_id %d", session_id, vdev_id);
 	result_status = set_key_params->status;
 	key_len = set_key_params->key[0].keyLength;
@@ -2534,9 +2543,6 @@ void lim_process_mlm_set_sta_key_rsp(struct mac_context *mac_ctx,
 	else
 		mlm_set_key_cnf.key_len_nonzero = false;
 
-
-	MTRACE(mac_trace(mac_ctx, TRACE_CODE_MLM_STATE,
-		session_entry->peSessionId, session_entry->limMlmState));
 	if (resp_reqd) {
 		tpLimMlmSetKeysReq lpLimMlmSetKeysReq =
 			(tpLimMlmSetKeysReq) mac_ctx->lim.gpLimMlmSetKeysReq;