1  /*
2   * Copyright (c) 2011-2021 The Linux Foundation. All rights reserved.
3   * Copyright (c) 2021-2024 Qualcomm Innovation Center, Inc. All rights reserved.
4   *
5   * Permission to use, copy, modify, and/or distribute this software for
6   * any purpose with or without fee is hereby granted, provided that the
7   * above copyright notice and this permission notice appear in all
8   * copies.
9   *
10   * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
11   * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
12   * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
13   * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
14   * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
15   * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
16   * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17   * PERFORMANCE OF THIS SOFTWARE.
18   */
19  
20  /*
21   * This file lim_api.cc contains the functions that are
22   * exported by LIM to other modules.
23   *
24   * Author:        Chandra Modumudi
25   * Date:          02/11/02
26   * History:-
27   * Date           Modified by    Modification Information
28   * --------------------------------------------------------------------
29   *
30   */
31  #include "cds_api.h"
32  #include "wni_cfg.h"
33  #include "wni_api.h"
34  #include "sir_common.h"
35  #include "sir_debug.h"
36  
37  #include "sch_api.h"
38  #include "utils_api.h"
39  #include "lim_api.h"
40  #include "lim_global.h"
41  #include "lim_types.h"
42  #include "lim_utils.h"
43  #include "lim_assoc_utils.h"
44  #include "lim_prop_exts_utils.h"
45  #include "lim_ser_des_utils.h"
46  #include "lim_admit_control.h"
47  #include "lim_send_sme_rsp_messages.h"
48  #include "lim_security_utils.h"
49  #include "wmm_apsd.h"
50  #include "lim_trace.h"
51  #include "lim_ft_defs.h"
52  #include "lim_session.h"
53  #include "wma_types.h"
54  #include "wlan_crypto_global_api.h"
55  #include "wlan_crypto_def_i.h"
56  
57  #include "rrm_api.h"
58  
59  #include <lim_ft.h>
60  #include "qdf_types.h"
61  #include "cds_packet.h"
62  #include "cds_utils.h"
63  #include "sys_startup.h"
64  #include "cds_api.h"
65  #include "wlan_policy_mgr_api.h"
66  #include "nan_datapath.h"
67  #include "wma.h"
68  #include "wlan_mgmt_txrx_utils_api.h"
69  #include "wlan_objmgr_psoc_obj.h"
70  #include "os_if_nan.h"
71  #include <wlan_scan_ucfg_api.h>
72  #include <wlan_scan_public_structs.h>
73  #include <wlan_p2p_ucfg_api.h>
74  #include "wlan_utility.h"
75  #include <wlan_tdls_cfg_api.h>
76  #include "cfg_ucfg_api.h"
77  #include "wlan_mlme_public_struct.h"
78  #include "wlan_mlme_twt_api.h"
79  #include "wlan_scan_utils_api.h"
80  #include <qdf_hang_event_notifier.h>
81  #include <qdf_notifier.h>
82  #include "wlan_pkt_capture_ucfg_api.h"
83  #include <lim_mlo.h>
84  #include "wlan_mlo_mgr_roam.h"
85  #include "utils_mlo.h"
86  #include "wlan_mlo_mgr_sta.h"
87  #include "wlan_mlo_mgr_peer.h"
88  #include <wlan_twt_api.h>
89  #include "wlan_tdls_api.h"
90  #include "wlan_mlo_mgr_link_switch.h"
91  #include "wlan_cm_api.h"
92  #include "wlan_mlme_api.h"
93  
94  struct pe_hang_event_fixed_param {
95  	uint16_t tlv_header;
96  	uint8_t vdev_id;
97  	uint8_t limmlmstate;
98  	uint8_t limprevmlmstate;
99  	uint8_t limsmestate;
100  	uint8_t limprevsmestate;
101  } qdf_packed;
102  
__lim_init_bss_vars(struct mac_context * mac)103  static void __lim_init_bss_vars(struct mac_context *mac)
104  {
105  	qdf_mem_zero((void *)mac->lim.gpSession,
106  		    sizeof(*mac->lim.gpSession) * mac->lim.maxBssId);
107  }
108  
__lim_init_stats_vars(struct mac_context * mac)109  static void __lim_init_stats_vars(struct mac_context *mac)
110  {
111  	/* / Variable to keep track of number of currently associated STAs */
112  	mac->lim.gLimNumOfAniSTAs = 0; /* count of ANI peers */
113  
114  	qdf_mem_zero(mac->lim.gLimHeartBeatApMac[0],
115  			sizeof(tSirMacAddr));
116  	qdf_mem_zero(mac->lim.gLimHeartBeatApMac[1],
117  			sizeof(tSirMacAddr));
118  	mac->lim.gLimHeartBeatApMacIndex = 0;
119  }
120  
__lim_init_states(struct mac_context * mac)121  static void __lim_init_states(struct mac_context *mac)
122  {
123  	/* Counts Heartbeat failures */
124  	mac->lim.gLimHBfailureCntInLinkEstState = 0;
125  	mac->lim.gLimProbeFailureAfterHBfailedCnt = 0;
126  	mac->lim.gLimHBfailureCntInOtherStates = 0;
127  	mac->lim.gLimRspReqd = 0;
128  	mac->lim.gLimPrevSmeState = eLIM_SME_OFFLINE_STATE;
129  
130  	/* / MLM State visible across all Sirius modules */
131  	MTRACE(mac_trace
132  		       (mac, TRACE_CODE_MLM_STATE, NO_SESSION, eLIM_MLM_IDLE_STATE));
133  	mac->lim.gLimMlmState = eLIM_MLM_IDLE_STATE;
134  
135  	/* / Previous MLM State */
136  	mac->lim.gLimPrevMlmState = eLIM_MLM_OFFLINE_STATE;
137  
138  	/**
139  	 * Initialize state to eLIM_SME_OFFLINE_STATE
140  	 */
141  	mac->lim.gLimSmeState = eLIM_SME_OFFLINE_STATE;
142  
143  	/**
144  	 * By default assume 'unknown' role. This will be updated
145  	 * when SME_START_BSS_REQ is received.
146  	 */
147  
148  	qdf_mem_zero(&mac->lim.gLimNoShortParams, sizeof(tLimNoShortParams));
149  	qdf_mem_zero(&mac->lim.gLimNoShortSlotParams,
150  		    sizeof(tLimNoShortSlotParams));
151  
152  	mac->lim.gLimPhyMode = 0;
153  }
154  
__lim_init_vars(struct mac_context * mac)155  static void __lim_init_vars(struct mac_context *mac)
156  {
157  	/* Place holder for Measurement Req/Rsp/Ind related info */
158  
159  
160  	/* Deferred Queue Parameters */
161  	qdf_mem_zero(&mac->lim.gLimDeferredMsgQ, sizeof(tSirAddtsReq));
162  
163  	/* addts request if any - only one can be outstanding at any time */
164  	qdf_mem_zero(&mac->lim.gLimAddtsReq, sizeof(tSirAddtsReq));
165  	mac->lim.gLimAddtsSent = 0;
166  	mac->lim.gLimAddtsRspTimerCount = 0;
167  
168  	/* protection related config cache */
169  	qdf_mem_zero(&mac->lim.cfgProtection, sizeof(tCfgProtection));
170  	mac->lim.gLimProtectionControl = 0;
171  	SET_LIM_PROCESS_DEFD_MESGS(mac, true);
172  
173  	/* WMM Related Flag */
174  	mac->lim.gUapsdEnable = 0;
175  
176  	/* QoS-AC Downgrade: Initially, no AC is admitted */
177  	mac->lim.gAcAdmitMask[SIR_MAC_DIRECTION_UPLINK] = 0;
178  	mac->lim.gAcAdmitMask[SIR_MAC_DIRECTION_DNLINK] = 0;
179  
180  	/* dialogue token List head/tail for Action frames request sent. */
181  	mac->lim.pDialogueTokenHead = NULL;
182  	mac->lim.pDialogueTokenTail = NULL;
183  
184  	qdf_mem_zero(&mac->lim.tspecInfo,
185  		    sizeof(tLimTspecInfo) * LIM_NUM_TSPEC_MAX);
186  
187  	/* admission control policy information */
188  	qdf_mem_zero(&mac->lim.admitPolicyInfo, sizeof(tLimAdmitPolicyInfo));
189  }
190  
__lim_init_assoc_vars(struct mac_context * mac)191  static void __lim_init_assoc_vars(struct mac_context *mac)
192  {
193  	mac->lim.gLimIbssStaLimit = 0;
194  	/* Place holder for current authentication request */
195  	/* being handled */
196  	mac->lim.gpLimMlmAuthReq = NULL;
197  
198  	/* / MAC level Pre-authentication related globals */
199  	mac->lim.gLimPreAuthChannelNumber = 0;
200  	mac->lim.gLimPreAuthType = eSIR_OPEN_SYSTEM;
201  	qdf_mem_zero(&mac->lim.gLimPreAuthPeerAddr, sizeof(tSirMacAddr));
202  	mac->lim.gLimNumPreAuthContexts = 0;
203  	qdf_mem_zero(&mac->lim.gLimPreAuthTimerTable, sizeof(tLimPreAuthTable));
204  
205  	/* Place holder for Pre-authentication node list */
206  	mac->lim.pLimPreAuthList = NULL;
207  
208  	/* One cache for each overlap and associated case. */
209  	qdf_mem_zero(mac->lim.protStaOverlapCache,
210  		    sizeof(tCacheParams) * LIM_PROT_STA_OVERLAP_CACHE_SIZE);
211  	qdf_mem_zero(mac->lim.protStaCache,
212  		    sizeof(tCacheParams) * LIM_PROT_STA_CACHE_SIZE);
213  
214  	mac->lim.pe_session = NULL;
215  	mac->lim.reAssocRetryAttempt = 0;
216  
217  }
218  
__lim_init_ht_vars(struct mac_context * mac)219  static void __lim_init_ht_vars(struct mac_context *mac)
220  {
221  	mac->lim.htCapabilityPresentInBeacon = 0;
222  	mac->lim.gHTGreenfield = 0;
223  	mac->lim.gHTShortGI40Mhz = 0;
224  	mac->lim.gHTShortGI20Mhz = 0;
225  	mac->lim.gHTMaxAmsduLength = 0;
226  	mac->lim.gHTDsssCckRate40MHzSupport = 0;
227  	mac->lim.gHTPSMPSupport = 0;
228  	mac->lim.gHTLsigTXOPProtection = 0;
229  	mac->lim.gHTMIMOPSState = eSIR_HT_MIMO_PS_STATIC;
230  	mac->lim.gHTAMpduDensity = 0;
231  
232  	mac->lim.gMaxAmsduSizeEnabled = false;
233  	mac->lim.gHTMaxRxAMpduFactor = 0;
234  	mac->lim.gHTServiceIntervalGranularity = 0;
235  	mac->lim.gHTControlledAccessOnly = 0;
236  	mac->lim.gHTOperMode = eSIR_HT_OP_MODE_PURE;
237  	mac->lim.gHTPCOActive = 0;
238  
239  	mac->lim.gHTPCOPhase = 0;
240  	mac->lim.gHTSecondaryBeacon = 0;
241  	mac->lim.gHTDualCTSProtection = 0;
242  	mac->lim.gHTSTBCBasicMCS = 0;
243  }
244  
__lim_init_config(struct mac_context * mac)245  static QDF_STATUS __lim_init_config(struct mac_context *mac)
246  {
247  	struct mlme_ht_capabilities_info *ht_cap_info;
248  #ifdef FEATURE_WLAN_TDLS
249  	QDF_STATUS status;
250  	uint32_t val1;
251  	bool valb;
252  #endif
253  
254  	/* Read all the CFGs here that were updated before pe_start is called */
255  	/* All these CFG READS/WRITES are only allowed in init, at start when there is no session
256  	 * and they will be used throughout when there is no session
257  	 */
258  	mac->lim.gLimIbssStaLimit = mac->mlme_cfg->sap_cfg.assoc_sta_limit;
259  	ht_cap_info = &mac->mlme_cfg->ht_caps.ht_cap_info;
260  
261  	/* channel bonding mode could be set to anything from 0 to 4(Titan had these */
262  	/* modes But for Taurus we have only two modes: enable(>0) or disable(=0) */
263  	ht_cap_info->supported_channel_width_set =
264  			mac->mlme_cfg->feature_flags.channel_bonding_mode ?
265  			WNI_CFG_CHANNEL_BONDING_MODE_ENABLE :
266  			WNI_CFG_CHANNEL_BONDING_MODE_DISABLE;
267  
268  	mac->mlme_cfg->ht_caps.info_field_1.recommended_tx_width_set =
269  		ht_cap_info->supported_channel_width_set;
270  
271  	if (!mac->mlme_cfg->timeouts.heart_beat_threshold) {
272  		mac->sys.gSysEnableLinkMonitorMode = 0;
273  	} else {
274  		/* No need to activate the timer during init time. */
275  		mac->sys.gSysEnableLinkMonitorMode = 1;
276  	}
277  
278  	/* WNI_CFG_PROBE_RSP_BCN_ADDNIE_DATA - not needed */
279  
280  	/* This was initially done after resume notification from HAL. Now, DAL is
281  	   started before PE so this can be done here */
282  	handle_ht_capabilityand_ht_info(mac, NULL);
283  #ifdef FEATURE_WLAN_TDLS
284  	status = cfg_tdls_get_buffer_sta_enable(mac->psoc, &valb);
285  	if (QDF_STATUS_SUCCESS != status) {
286  		pe_err("cfg get LimTDLSBufStaEnabled failed");
287  		return QDF_STATUS_E_FAILURE;
288  	}
289  	mac->lim.gLimTDLSBufStaEnabled = (uint8_t)valb;
290  
291  	status = cfg_tdls_get_uapsd_mask(mac->psoc, &val1);
292  	if (QDF_STATUS_SUCCESS != status) {
293  		pe_err("cfg get LimTDLSUapsdMask failed");
294  		return QDF_STATUS_E_FAILURE;
295  	}
296  	mac->lim.gLimTDLSUapsdMask = (uint8_t)val1;
297  
298  	status = cfg_tdls_get_off_channel_enable(mac->psoc, &valb);
299  	if (QDF_STATUS_SUCCESS != status) {
300  		pe_err("cfg get LimTDLSUapsdMask failed");
301  		return QDF_STATUS_E_FAILURE;
302  	}
303  	mac->lim.gLimTDLSOffChannelEnabled = (uint8_t)valb;
304  
305  	status = cfg_tdls_get_wmm_mode_enable(mac->psoc, &valb);
306  	if (QDF_STATUS_SUCCESS != status) {
307  		pe_err("cfg get LimTDLSWmmMode failed");
308  		return QDF_STATUS_E_FAILURE;
309  	}
310  	mac->lim.gLimTDLSWmmMode = (uint8_t)valb;
311  #endif
312  
313  	return QDF_STATUS_SUCCESS;
314  }
315  
316  /*
317     lim_start
318     This function is to replace the __lim_process_sme_start_req since there is no
319     eWNI_SME_START_REQ post to PE.
320   */
lim_start(struct mac_context * mac)321  QDF_STATUS lim_start(struct mac_context *mac)
322  {
323  	QDF_STATUS retCode = QDF_STATUS_SUCCESS;
324  
325  	pe_debug("enter");
326  
327  	if (mac->lim.gLimSmeState == eLIM_SME_OFFLINE_STATE) {
328  		mac->lim.gLimSmeState = eLIM_SME_IDLE_STATE;
329  
330  		MTRACE(mac_trace
331  			       (mac, TRACE_CODE_SME_STATE, NO_SESSION,
332  			       mac->lim.gLimSmeState));
333  
334  		/* Initialize MLM state machine */
335  		if (QDF_STATUS_SUCCESS != lim_init_mlm(mac)) {
336  			pe_err("Init MLM failed");
337  			return QDF_STATUS_E_FAILURE;
338  		}
339  	} else {
340  		/**
341  		 * Should not have received eWNI_SME_START_REQ in states
342  		 * other than OFFLINE. Return response to host and
343  		 * log error
344  		 */
345  		pe_warn("Invalid SME state: %X",
346  			mac->lim.gLimSmeState);
347  		retCode = QDF_STATUS_E_FAILURE;
348  	}
349  
350  	mac->lim.req_id =
351  		wlan_scan_register_requester(mac->psoc,
352  					     "LIM",
353  					     lim_process_rx_scan_handler,
354  					     mac);
355  	return retCode;
356  }
357  
358  /**
359   * lim_initialize()
360   *
361   ***FUNCTION:
362   * This function is called from LIM thread entry function.
363   * LIM related global data structures are initialized in this function.
364   *
365   ***LOGIC:
366   * NA
367   *
368   ***ASSUMPTIONS:
369   * NA
370   *
371   ***NOTE:
372   * NA
373   *
374   * @param  mac - Pointer to global MAC structure
375   * @return None
376   */
377  
lim_initialize(struct mac_context * mac)378  QDF_STATUS lim_initialize(struct mac_context *mac)
379  {
380  	QDF_STATUS status = QDF_STATUS_SUCCESS;
381  
382  	mac->lim.tdls_frm_session_id = NO_SESSION;
383  	mac->lim.deferredMsgCnt = 0;
384  	mac->lim.retry_packet_cnt = 0;
385  	mac->lim.deauthMsgCnt = 0;
386  	mac->lim.disassocMsgCnt = 0;
387  
388  	__lim_init_assoc_vars(mac);
389  	__lim_init_vars(mac);
390  	__lim_init_states(mac);
391  	__lim_init_stats_vars(mac);
392  	__lim_init_bss_vars(mac);
393  	__lim_init_ht_vars(mac);
394  
395  	rrm_initialize(mac);
396  
397  	if (QDF_IS_STATUS_ERROR(qdf_mutex_create(
398  					&mac->lim.lim_frame_register_lock))) {
399  		pe_err("lim lock init failed!");
400  		return QDF_STATUS_E_FAILURE;
401  	}
402  
403  	qdf_list_create(&mac->lim.gLimMgmtFrameRegistratinQueue, 0);
404  
405  	/* initialize the TSPEC admission control table. */
406  	/* Note that this was initially done after resume notification from HAL. */
407  	/* Now, DAL is started before PE so this can be done here */
408  	lim_admit_control_init(mac);
409  	return status;
410  
411  } /*** end lim_initialize() ***/
412  
413  /**
414   * lim_cleanup()
415   *
416   ***FUNCTION:
417   * This function is called upon reset or persona change
418   * to cleanup LIM state
419   *
420   ***LOGIC:
421   * NA
422   *
423   ***ASSUMPTIONS:
424   * NA
425   *
426   ***NOTE:
427   * NA
428   *
429   * @param  mac - Pointer to Global MAC structure
430   * @return None
431   */
432  
lim_cleanup(struct mac_context * mac)433  void lim_cleanup(struct mac_context *mac)
434  {
435  	uint8_t i;
436  	qdf_list_node_t *lst_node;
437  
438  	/*
439  	 * Before destroying the list making sure all the nodes have been
440  	 * deleted
441  	 */
442  	while (qdf_list_remove_front(
443  			&mac->lim.gLimMgmtFrameRegistratinQueue,
444  			&lst_node) == QDF_STATUS_SUCCESS) {
445  		qdf_mem_free(lst_node);
446  	}
447  	qdf_list_destroy(&mac->lim.gLimMgmtFrameRegistratinQueue);
448  	qdf_mutex_destroy(&mac->lim.lim_frame_register_lock);
449  
450  	pe_deregister_mgmt_rx_frm_callback(mac);
451  
452  	/* free up preAuth table */
453  	if (mac->lim.gLimPreAuthTimerTable.pTable) {
454  		for (i = 0; i < mac->lim.gLimPreAuthTimerTable.numEntry; i++)
455  			qdf_mem_free(mac->lim.gLimPreAuthTimerTable.pTable[i]);
456  		qdf_mem_free(mac->lim.gLimPreAuthTimerTable.pTable);
457  		mac->lim.gLimPreAuthTimerTable.pTable = NULL;
458  		mac->lim.gLimPreAuthTimerTable.numEntry = 0;
459  	}
460  
461  	if (mac->lim.pDialogueTokenHead) {
462  		lim_delete_dialogue_token_list(mac);
463  	}
464  
465  	if (mac->lim.pDialogueTokenTail) {
466  		qdf_mem_free(mac->lim.pDialogueTokenTail);
467  		mac->lim.pDialogueTokenTail = NULL;
468  	}
469  
470  	if (mac->lim.gpLimMlmAuthReq) {
471  		qdf_mem_free(mac->lim.gpLimMlmAuthReq);
472  		mac->lim.gpLimMlmAuthReq = NULL;
473  	}
474  
475  	if (mac->lim.limDisassocDeauthCnfReq.pMlmDisassocReq) {
476  		qdf_mem_free(mac->lim.limDisassocDeauthCnfReq.pMlmDisassocReq);
477  		mac->lim.limDisassocDeauthCnfReq.pMlmDisassocReq = NULL;
478  	}
479  
480  	if (mac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq) {
481  		qdf_mem_free(mac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq);
482  		mac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq = NULL;
483  	}
484  
485  	/* Now, finally reset the deferred message queue pointers */
486  	lim_reset_deferred_msg_q(mac);
487  
488  	for (i = 0; i < MAX_MEASUREMENT_REQUEST; i++)
489  		rrm_cleanup(mac, i);
490  
491  	lim_ft_cleanup_all_ft_sessions(mac);
492  
493  	wlan_scan_unregister_requester(mac->psoc, mac->lim.req_id);
494  } /*** end lim_cleanup() ***/
495  
496  #ifdef WLAN_FEATURE_MEMDUMP_ENABLE
497  /**
498   * lim_state_info_dump() - print state information of lim layer
499   * @buf: buffer pointer
500   * @size: size of buffer to be filled
501   *
502   * This function is used to print state information of lim layer
503   *
504   * Return: None
505   */
lim_state_info_dump(char ** buf_ptr,uint16_t * size)506  static void lim_state_info_dump(char **buf_ptr, uint16_t *size)
507  {
508  	struct mac_context *mac;
509  	uint16_t len = 0;
510  	char *buf = *buf_ptr;
511  
512  	mac = cds_get_context(QDF_MODULE_ID_PE);
513  	if (!mac) {
514  		return;
515  	}
516  
517  	pe_debug("size of buffer: %d", *size);
518  
519  	len += qdf_scnprintf(buf + len, *size - len,
520  		"\n SmeState: %d", mac->lim.gLimSmeState);
521  	len += qdf_scnprintf(buf + len, *size - len,
522  		"\n PrevSmeState: %d", mac->lim.gLimPrevSmeState);
523  	len += qdf_scnprintf(buf + len, *size - len,
524  		"\n MlmState: %d", mac->lim.gLimMlmState);
525  	len += qdf_scnprintf(buf + len, *size - len,
526  		"\n PrevMlmState: %d", mac->lim.gLimPrevMlmState);
527  	len += qdf_scnprintf(buf + len, *size - len,
528  		"\n ProcessDefdMsgs: %d", mac->lim.gLimProcessDefdMsgs);
529  
530  	*size -= len;
531  	*buf_ptr += len;
532  }
533  
534  /**
535   * lim_register_debug_callback() - registration function for lim layer
536   * to print lim state information
537   *
538   * Return: None
539   */
lim_register_debug_callback(void)540  static void lim_register_debug_callback(void)
541  {
542  	qdf_register_debug_callback(QDF_MODULE_ID_PE, &lim_state_info_dump);
543  }
544  #else /* WLAN_FEATURE_MEMDUMP_ENABLE */
lim_register_debug_callback(void)545  static void lim_register_debug_callback(void)
546  {
547  }
548  #endif /* WLAN_FEATURE_MEMDUMP_ENABLE */
549  
550  #ifdef WLAN_FEATURE_NAN
lim_nan_register_callbacks(struct mac_context * mac_ctx)551  static void lim_nan_register_callbacks(struct mac_context *mac_ctx)
552  {
553  	struct nan_callbacks cb_obj = {0};
554  
555  	cb_obj.add_ndi_peer = lim_add_ndi_peer_converged;
556  	cb_obj.ndp_delete_peers = lim_ndp_delete_peers_converged;
557  	cb_obj.delete_peers_by_addr = lim_ndp_delete_peers_by_addr_converged;
558  
559  	ucfg_nan_register_lim_callbacks(mac_ctx->psoc, &cb_obj);
560  }
561  #else
lim_nan_register_callbacks(struct mac_context * mac_ctx)562  static inline void lim_nan_register_callbacks(struct mac_context *mac_ctx)
563  {
564  }
565  #endif
566  
lim_stop_pmfcomeback_timer(struct pe_session * session)567  void lim_stop_pmfcomeback_timer(struct pe_session *session)
568  {
569  	if (session->opmode != QDF_STA_MODE)
570  		return;
571  
572  	qdf_mc_timer_stop(&session->pmf_retry_timer);
573  	session->pmf_retry_timer_info.retried = false;
574  }
575  
576  /*
577   * pe_shutdown_notifier_cb - Shutdown notifier callback
578   * @ctx: Pointer to Global MAC structure
579   *
580   * Return: None
581   */
pe_shutdown_notifier_cb(void * ctx)582  static void pe_shutdown_notifier_cb(void *ctx)
583  {
584  	struct mac_context *mac_ctx = (struct mac_context *)ctx;
585  	struct pe_session *session;
586  	uint8_t i;
587  
588  	lim_deactivate_timers(mac_ctx);
589  	for (i = 0; i < mac_ctx->lim.maxBssId; i++) {
590  		session = &mac_ctx->lim.gpSession[i];
591  		if (session->valid == true) {
592  			if (LIM_IS_AP_ROLE(session))
593  				qdf_mc_timer_stop(&session->
594  						 protection_fields_reset_timer);
595  			lim_stop_pmfcomeback_timer(session);
596  		}
597  	}
598  }
599  
is_mgmt_protected(uint32_t vdev_id,const uint8_t * peer_mac_addr)600  bool is_mgmt_protected(uint32_t vdev_id,
601  		       const uint8_t *peer_mac_addr)
602  {
603  	uint16_t aid;
604  	tpDphHashNode sta_ds;
605  	struct pe_session *session;
606  	bool protected = false;
607  	struct mac_context *mac_ctx = cds_get_context(QDF_MODULE_ID_PE);
608  
609  	if (!mac_ctx)
610  		return false;
611  
612  	session = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
613  	if (!session) {
614  		/* couldn't find session */
615  		pe_err("Session not found for vdev_id: %d", vdev_id);
616  		return false;
617  	}
618  
619  	sta_ds = dph_lookup_hash_entry(mac_ctx, (uint8_t *)peer_mac_addr, &aid,
620  				       &session->dph.dphHashTable);
621  	if (sta_ds) {
622  		/* rmfenabled will be set at the time of addbss.
623  		 * but sometimes EAP auth fails and keys are not
624  		 * installed then if we send any management frame
625  		 * like deauth/disassoc with this bit set then
626  		 * firmware crashes. so check for keys are
627  		 * installed or not also before setting the bit
628  		 */
629  		if (sta_ds->rmfEnabled && sta_ds->is_key_installed)
630  			protected = true;
631  	}
632  
633  	return protected;
634  }
635  
p2p_register_callbacks(struct mac_context * mac_ctx)636  static void p2p_register_callbacks(struct mac_context *mac_ctx)
637  {
638  	struct p2p_protocol_callbacks p2p_cb = {0};
639  
640  	p2p_cb.is_mgmt_protected = is_mgmt_protected;
641  	ucfg_p2p_register_callbacks(mac_ctx->psoc, &p2p_cb);
642  }
643  
644  /*
645   * lim_register_sap_bcn_callback(): Register a callback with scan module for SAP
646   * @mac_ctx: pointer to the global mac context
647   *
648   * Registers the function lim_handle_sap_beacon as callback with the Scan
649   * module to handle beacon frames for SAP sessions
650   *
651   * Return: QDF Status
652   */
lim_register_sap_bcn_callback(struct mac_context * mac_ctx)653  static QDF_STATUS lim_register_sap_bcn_callback(struct mac_context *mac_ctx)
654  {
655  	QDF_STATUS status;
656  
657  	status = ucfg_scan_register_bcn_cb(mac_ctx->psoc,
658  			lim_handle_sap_beacon,
659  			SCAN_CB_TYPE_UPDATE_BCN);
660  	if (!QDF_IS_STATUS_SUCCESS(status)) {
661  		pe_err("failed with status code %08d [x%08x]",
662  			status, status);
663  	}
664  
665  	return status;
666  }
667  
668  /*
669   * lim_unregister_sap_bcn_callback(): Unregister the callback with scan module
670   * @mac_ctx: pointer to the global mac context
671   *
672   * Unregisters the callback registered with the Scan
673   * module to handle beacon frames for SAP sessions
674   *
675   * Return: QDF Status
676   */
lim_unregister_sap_bcn_callback(struct mac_context * mac_ctx)677  static QDF_STATUS lim_unregister_sap_bcn_callback(struct mac_context *mac_ctx)
678  {
679  	QDF_STATUS status;
680  
681  	status = ucfg_scan_register_bcn_cb(mac_ctx->psoc,
682  			NULL, SCAN_CB_TYPE_UPDATE_BCN);
683  	if (!QDF_IS_STATUS_SUCCESS(status)) {
684  		pe_err("failed with status code %08d [x%08x]",
685  			status, status);
686  	}
687  
688  	return status;
689  }
690  
691  /*
692   * lim_register_scan_mbssid_callback(): Register callback with scan module
693   * @mac_ctx: pointer to the global mac context
694   *
695   * Registers the function lim_register_scan_mbssid_callback as callback
696   * with the Scan module to handle generated frames by MBSSID IE
697   *
698   * Return: QDF Status
699   */
700  static QDF_STATUS
lim_register_scan_mbssid_callback(struct mac_context * mac_ctx)701  lim_register_scan_mbssid_callback(struct mac_context *mac_ctx)
702  {
703  	QDF_STATUS status;
704  
705  	status = wlan_scan_register_mbssid_cb(mac_ctx->psoc,
706  					      lim_handle_frame_genby_mbssid);
707  	if (!QDF_IS_STATUS_SUCCESS(status)) {
708  		pe_err("failed with status code %08d [x%08x]",
709  		       status, status);
710  	}
711  
712  	return status;
713  }
714  
715  /*
716   * lim_unregister_scan_mbssid_callback(): Unregister callback with scan module
717   * @mac_ctx: pointer to the global mac context
718   *
719   * Unregisters the callback registered with the Scan module to handle
720   * generated frames by MBSSID IE
721   *
722   * Return: QDF Status
723   */
724  static QDF_STATUS
lim_unregister_scan_mbssid_callback(struct mac_context * mac_ctx)725  lim_unregister_scan_mbssid_callback(struct mac_context *mac_ctx)
726  {
727  	QDF_STATUS status;
728  
729  	status = wlan_scan_register_mbssid_cb(mac_ctx->psoc, NULL);
730  	if (!QDF_IS_STATUS_SUCCESS(status)) {
731  		pe_err("failed with status code %08d [x%08x]",
732  		       status, status);
733  	}
734  
735  	return status;
736  }
737  
lim_register_policy_mgr_callback(struct wlan_objmgr_psoc * psoc)738  static void lim_register_policy_mgr_callback(struct wlan_objmgr_psoc *psoc)
739  {
740  	struct policy_mgr_conc_cbacks conc_cbacks;
741  
742  	qdf_mem_zero(&conc_cbacks, sizeof(conc_cbacks));
743  	conc_cbacks.connection_info_update = lim_send_conc_params_update;
744  
745  	if (QDF_STATUS_SUCCESS != policy_mgr_register_conc_cb(psoc,
746  							      &conc_cbacks)) {
747  		pe_err("failed to register policy manager callbacks");
748  	}
749  }
750  
pe_hang_event_notifier_call(struct notifier_block * block,unsigned long state,void * data)751  static int pe_hang_event_notifier_call(struct notifier_block *block,
752  				       unsigned long state,
753  				       void *data)
754  {
755  	qdf_notif_block *notif_block = qdf_container_of(block, qdf_notif_block,
756  							notif_block);
757  	struct mac_context *mac;
758  	struct pe_session *session;
759  	struct qdf_notifer_data *pe_hang_data = data;
760  	uint8_t *pe_data;
761  	uint8_t i;
762  	struct pe_hang_event_fixed_param *cmd;
763  	size_t size;
764  
765  	if (!data)
766  		return NOTIFY_STOP_MASK;
767  
768  	mac = notif_block->priv_data;
769  	if (!mac)
770  		return NOTIFY_STOP_MASK;
771  
772  	size = sizeof(*cmd);
773  	for (i = 0; i < mac->lim.maxBssId; i++) {
774  		session = &mac->lim.gpSession[i];
775  		if (!session->valid)
776  			continue;
777  		if (pe_hang_data->offset + size > QDF_WLAN_HANG_FW_OFFSET)
778  			return NOTIFY_STOP_MASK;
779  
780  		pe_data = (pe_hang_data->hang_data + pe_hang_data->offset);
781  		cmd = (struct pe_hang_event_fixed_param *)pe_data;
782  		QDF_HANG_EVT_SET_HDR(&cmd->tlv_header, HANG_EVT_TAG_LEGACY_MAC,
783  				     QDF_HANG_GET_STRUCT_TLVLEN(*cmd));
784  		cmd->vdev_id = session->vdev_id;
785  		cmd->limmlmstate = session->limMlmState;
786  		cmd->limprevmlmstate = session->limPrevMlmState;
787  		cmd->limsmestate = session->limSmeState;
788  		cmd->limprevsmestate = session->limPrevSmeState;
789  		pe_hang_data->offset += size;
790  	}
791  
792  	return NOTIFY_OK;
793  }
794  
795  static qdf_notif_block pe_hang_event_notifier = {
796  	.notif_block.notifier_call = pe_hang_event_notifier_call,
797  };
798  
799  /** -------------------------------------------------------------
800     \fn pe_open
801     \brief will be called in Open sequence from mac_open
802     \param   struct mac_context *mac
803     \param   tHalOpenParameters *pHalOpenParam
804     \return  QDF_STATUS
805     -------------------------------------------------------------*/
806  
pe_open(struct mac_context * mac,struct cds_config_info * cds_cfg)807  QDF_STATUS pe_open(struct mac_context *mac, struct cds_config_info *cds_cfg)
808  {
809  	QDF_STATUS status = QDF_STATUS_SUCCESS;
810  
811  	if (QDF_DRIVER_TYPE_MFG == cds_cfg->driver_type)
812  		return QDF_STATUS_SUCCESS;
813  
814  	mac->lim.maxBssId = cds_cfg->max_bssid;
815  	mac->lim.maxStation = cds_cfg->max_station;
816  	mac->lim.max_sta_of_pe_session =
817  			(cds_cfg->max_station > SIR_SAP_MAX_NUM_PEERS) ?
818  				SIR_SAP_MAX_NUM_PEERS : cds_cfg->max_station;
819  	qdf_spinlock_create(&mac->sys.bbt_mgmt_lock);
820  
821  	if ((mac->lim.maxBssId == 0) || (mac->lim.maxStation == 0)) {
822  		pe_err("max number of Bssid or Stations cannot be zero!");
823  		return QDF_STATUS_E_FAILURE;
824  	}
825  
826  	if (!QDF_IS_STATUS_SUCCESS(pe_allocate_dph_node_array_buffer())) {
827  		pe_err("g_dph_node_array memory allocate failed!");
828  		return QDF_STATUS_E_NOMEM;
829  	}
830  
831  	mac->lim.lim_timers.gpLimCnfWaitTimer =
832  		qdf_mem_malloc(sizeof(TX_TIMER) * (mac->lim.maxStation + 1));
833  	if (!mac->lim.lim_timers.gpLimCnfWaitTimer) {
834  		status = QDF_STATUS_E_NOMEM;
835  		goto pe_open_timer_fail;
836  	}
837  
838  	mac->lim.gpSession =
839  		qdf_mem_common_alloc(sizeof(struct pe_session) * mac->lim.maxBssId);
840  	if (!mac->lim.gpSession) {
841  		status = QDF_STATUS_E_NOMEM;
842  		goto pe_open_psession_fail;
843  	}
844  
845  	status = lim_initialize(mac);
846  	if (QDF_STATUS_SUCCESS != status) {
847  		pe_err("lim_initialize failed!");
848  		status = QDF_STATUS_E_FAILURE;
849  		goto  pe_open_lock_fail;
850  	}
851  
852  	/*
853  	 * pe_open is successful by now, so it is right time to initialize
854  	 * MTRACE for PE module. if LIM_TRACE_RECORD is not defined in build
855  	 * file then nothing will be logged for PE module.
856  	 */
857  #ifdef LIM_TRACE_RECORD
858  	MTRACE(lim_trace_init(mac));
859  #endif
860  	lim_register_debug_callback();
861  	lim_nan_register_callbacks(mac);
862  	p2p_register_callbacks(mac);
863  	lim_register_scan_mbssid_callback(mac);
864  	lim_register_sap_bcn_callback(mac);
865  	wlan_reg_register_ctry_change_callback(
866  					mac->psoc,
867  					lim_update_tx_pwr_on_ctry_change_cb);
868  
869  	wlan_reg_register_is_chan_connected_callback(mac->psoc,
870  					lim_get_connected_chan_for_mode);
871  
872  	if (mac->mlme_cfg->edca_params.enable_edca_params)
873  		lim_register_policy_mgr_callback(mac->psoc);
874  
875  	if (!QDF_IS_STATUS_SUCCESS(
876  	    cds_shutdown_notifier_register(pe_shutdown_notifier_cb, mac))) {
877  		pe_err("Shutdown notifier register failed");
878  	}
879  
880  	pe_hang_event_notifier.priv_data = mac;
881  	qdf_hang_event_register_notifier(&pe_hang_event_notifier);
882  
883  	return status; /* status here will be QDF_STATUS_SUCCESS */
884  
885  pe_open_lock_fail:
886  	qdf_mem_common_free(mac->lim.gpSession);
887  	mac->lim.gpSession = NULL;
888  pe_open_psession_fail:
889  	qdf_mem_free(mac->lim.lim_timers.gpLimCnfWaitTimer);
890  	mac->lim.lim_timers.gpLimCnfWaitTimer = NULL;
891  pe_open_timer_fail:
892  	pe_free_dph_node_array_buffer();
893  
894  	return status;
895  }
896  
897  /** -------------------------------------------------------------
898     \fn pe_close
899     \brief will be called in close sequence from mac_close
900     \param   struct mac_context *mac
901     \return  QDF_STATUS
902     -------------------------------------------------------------*/
903  
pe_close(struct mac_context * mac)904  QDF_STATUS pe_close(struct mac_context *mac)
905  {
906  	uint8_t i;
907  
908  	if (ANI_DRIVER_TYPE(mac) == QDF_DRIVER_TYPE_MFG)
909  		return QDF_STATUS_SUCCESS;
910  
911  	qdf_hang_event_unregister_notifier(&pe_hang_event_notifier);
912  	lim_cleanup_mlm(mac);
913  	lim_cleanup(mac);
914  	lim_unregister_scan_mbssid_callback(mac);
915  	lim_unregister_sap_bcn_callback(mac);
916  	wlan_reg_unregister_ctry_change_callback(
917  					mac->psoc,
918  					lim_update_tx_pwr_on_ctry_change_cb);
919  
920  	wlan_reg_unregister_is_chan_connected_callback(mac->psoc,
921  					lim_get_connected_chan_for_mode);
922  
923  	if (mac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq) {
924  		qdf_mem_free(mac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq);
925  		mac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq = NULL;
926  	}
927  
928  	qdf_spinlock_destroy(&mac->sys.bbt_mgmt_lock);
929  	for (i = 0; i < mac->lim.maxBssId; i++) {
930  		if (mac->lim.gpSession[i].valid == true)
931  			pe_delete_session(mac, &mac->lim.gpSession[i]);
932  	}
933  	qdf_mem_free(mac->lim.lim_timers.gpLimCnfWaitTimer);
934  	mac->lim.lim_timers.gpLimCnfWaitTimer = NULL;
935  
936  	qdf_mem_common_free(mac->lim.gpSession);
937  	mac->lim.gpSession = NULL;
938  
939  	pe_free_dph_node_array_buffer();
940  
941  	return QDF_STATUS_SUCCESS;
942  }
943  
944  /** -------------------------------------------------------------
945     \fn pe_start
946     \brief will be called in start sequence from mac_start
947     \param   struct mac_context *mac
948     \return QDF_STATUS_SUCCESS on success, other QDF_STATUS on error
949     -------------------------------------------------------------*/
950  
pe_start(struct mac_context * mac)951  QDF_STATUS pe_start(struct mac_context *mac)
952  {
953  	QDF_STATUS status = QDF_STATUS_SUCCESS;
954  	status = lim_start(mac);
955  	if (QDF_STATUS_SUCCESS != status) {
956  		pe_err("lim_start failed!");
957  		return status;
958  	}
959  	/* Initialize the configurations needed by PE */
960  	if (QDF_STATUS_E_FAILURE == __lim_init_config(mac)) {
961  		pe_err("lim init config failed!");
962  		/* We need to undo everything in lim_start */
963  		lim_cleanup_mlm(mac);
964  		return QDF_STATUS_E_FAILURE;
965  	}
966  
967  	return status;
968  }
969  
970  /** -------------------------------------------------------------
971     \fn pe_stop
972     \brief will be called in stop sequence from mac_stop
973     \param   struct mac_context *mac
974     \return none
975     -------------------------------------------------------------*/
976  
pe_stop(struct mac_context * mac)977  void pe_stop(struct mac_context *mac)
978  {
979  	pe_debug(" PE STOP: Set LIM state to eLIM_MLM_OFFLINE_STATE");
980  	SET_LIM_MLM_STATE(mac, eLIM_MLM_OFFLINE_STATE);
981  	return;
982  }
983  
pe_free_nested_messages(struct scheduler_msg * msg)984  static void pe_free_nested_messages(struct scheduler_msg *msg)
985  {
986  	switch (msg->type) {
987  	default:
988  		break;
989  	}
990  }
991  
992  /** -------------------------------------------------------------
993     \fn pe_free_msg
994     \brief Called by CDS scheduler (function cds_sched_flush_mc_mqs)
995   \      to free a given PE message on the TX and MC thread.
996   \      This happens when there are messages pending in the PE
997   \      queue when system is being stopped and reset.
998     \param   struct mac_context *mac
999     \param   struct scheduler_msg       pMsg
1000     \return none
1001     -----------------------------------------------------------------*/
pe_free_msg(struct mac_context * mac,struct scheduler_msg * pMsg)1002  void pe_free_msg(struct mac_context *mac, struct scheduler_msg *pMsg)
1003  {
1004  	if (pMsg) {
1005  		if (pMsg->bodyptr) {
1006  			if (SIR_BB_XPORT_MGMT_MSG == pMsg->type) {
1007  				cds_pkt_return_packet((cds_pkt_t *) pMsg->
1008  						      bodyptr);
1009  			} else {
1010  				pe_free_nested_messages(pMsg);
1011  				qdf_mem_free((void *)pMsg->bodyptr);
1012  			}
1013  		}
1014  		pMsg->bodyptr = 0;
1015  		pMsg->bodyval = 0;
1016  		pMsg->type = 0;
1017  	}
1018  	return;
1019  }
1020  
lim_post_msg_api(struct mac_context * mac,struct scheduler_msg * msg)1021  QDF_STATUS lim_post_msg_api(struct mac_context *mac, struct scheduler_msg *msg)
1022  {
1023  	return scheduler_post_message(QDF_MODULE_ID_PE,
1024  				      QDF_MODULE_ID_PE,
1025  				      QDF_MODULE_ID_PE, msg);
1026  }
1027  
lim_post_msg_high_priority(struct mac_context * mac,struct scheduler_msg * msg)1028  QDF_STATUS lim_post_msg_high_priority(struct mac_context *mac,
1029  				      struct scheduler_msg *msg)
1030  {
1031  	return scheduler_post_msg_by_priority(QDF_MODULE_ID_PE,
1032  					       msg, true);
1033  }
1034  
pe_mc_process_handler(struct scheduler_msg * msg)1035  QDF_STATUS pe_mc_process_handler(struct scheduler_msg *msg)
1036  {
1037  	struct mac_context *mac_ctx = cds_get_context(QDF_MODULE_ID_PE);
1038  
1039  	if (!mac_ctx)
1040  		return QDF_STATUS_E_FAILURE;
1041  
1042  	if (ANI_DRIVER_TYPE(mac_ctx) == QDF_DRIVER_TYPE_MFG)
1043  		return QDF_STATUS_SUCCESS;
1044  
1045  	lim_message_processor(mac_ctx, msg);
1046  
1047  	return QDF_STATUS_SUCCESS;
1048  }
1049  
1050  /**
1051   * pe_drop_pending_rx_mgmt_frames: To drop pending RX mgmt frames
1052   * @mac_ctx: Pointer to global MAC structure
1053   * @hdr: Management header
1054   * @cds_pkt: Packet
1055   *
1056   * This function is used to drop RX pending mgmt frames if pe mgmt queue
1057   * reaches threshold
1058   *
1059   * Return: QDF_STATUS_SUCCESS on success or QDF_STATUS_E_FAILURE on failure
1060   */
pe_drop_pending_rx_mgmt_frames(struct mac_context * mac_ctx,tpSirMacMgmtHdr hdr,cds_pkt_t * cds_pkt)1061  static QDF_STATUS pe_drop_pending_rx_mgmt_frames(struct mac_context *mac_ctx,
1062  				tpSirMacMgmtHdr hdr, cds_pkt_t *cds_pkt)
1063  {
1064  	qdf_spin_lock(&mac_ctx->sys.bbt_mgmt_lock);
1065  	if (mac_ctx->sys.sys_bbt_pending_mgmt_count >=
1066  	     MGMT_RX_PACKETS_THRESHOLD) {
1067  		qdf_spin_unlock(&mac_ctx->sys.bbt_mgmt_lock);
1068  		pe_debug("No.of pending RX management frames reaches to threshold, dropping management frames");
1069  		cds_pkt_return_packet(cds_pkt);
1070  		cds_pkt = NULL;
1071  		mac_ctx->rx_packet_drop_counter++;
1072  		return QDF_STATUS_E_FAILURE;
1073  	} else if (mac_ctx->sys.sys_bbt_pending_mgmt_count >
1074  		   (MGMT_RX_PACKETS_THRESHOLD / 2)) {
1075  		/* drop all probereq, proberesp and beacons */
1076  		if (hdr->fc.subType == SIR_MAC_MGMT_BEACON ||
1077  		    hdr->fc.subType == SIR_MAC_MGMT_PROBE_REQ ||
1078  		    hdr->fc.subType == SIR_MAC_MGMT_PROBE_RSP) {
1079  			qdf_spin_unlock(&mac_ctx->sys.bbt_mgmt_lock);
1080  			if (!(mac_ctx->rx_packet_drop_counter % 100))
1081  				pe_debug("No.of pending RX mgmt frames reaches 1/2 thresh, dropping frame subtype: %d rx_packet_drop_counter: %d",
1082  					hdr->fc.subType,
1083  					mac_ctx->rx_packet_drop_counter);
1084  			mac_ctx->rx_packet_drop_counter++;
1085  			cds_pkt_return_packet(cds_pkt);
1086  			cds_pkt = NULL;
1087  			return QDF_STATUS_E_FAILURE;
1088  		}
1089  	}
1090  	mac_ctx->sys.sys_bbt_pending_mgmt_count++;
1091  	qdf_spin_unlock(&mac_ctx->sys.bbt_mgmt_lock);
1092  	if (mac_ctx->sys.sys_bbt_pending_mgmt_count ==
1093  	    (MGMT_RX_PACKETS_THRESHOLD / 4)) {
1094  		if (!(mac_ctx->rx_packet_drop_counter % 100))
1095  			pe_debug("No.of pending RX management frames reaches to 1/4th of threshold, rx_packet_drop_counter: %d",
1096  				mac_ctx->rx_packet_drop_counter);
1097  		mac_ctx->rx_packet_drop_counter++;
1098  	}
1099  	return QDF_STATUS_SUCCESS;
1100  }
1101  
1102  /**
1103   * pe_is_ext_scan_bcn_probe_rsp - Check if the beacon or probe response
1104   * is from Ext or EPNO scan
1105   *
1106   * @hdr: pointer to the 802.11 header of the frame
1107   * @rx_pkt_info: pointer to the rx packet meta
1108   *
1109   * Checks if the beacon or probe response is from Ext Scan or EPNO scan
1110   *
1111   * Return: true or false
1112   */
1113  #ifdef FEATURE_WLAN_EXTSCAN
pe_is_ext_scan_bcn_probe_rsp(tpSirMacMgmtHdr hdr,uint8_t * rx_pkt_info)1114  static inline bool pe_is_ext_scan_bcn_probe_rsp(tpSirMacMgmtHdr hdr,
1115  				uint8_t *rx_pkt_info)
1116  {
1117  	if ((hdr->fc.subType == SIR_MAC_MGMT_BEACON ||
1118  	     hdr->fc.subType == SIR_MAC_MGMT_PROBE_RSP) &&
1119  	    (WMA_IS_EXTSCAN_SCAN_SRC(rx_pkt_info) ||
1120  	    WMA_IS_EPNO_SCAN_SRC(rx_pkt_info)))
1121  		return true;
1122  
1123  	return false;
1124  }
1125  #else
pe_is_ext_scan_bcn_probe_rsp(tpSirMacMgmtHdr hdr,uint8_t * rx_pkt_info)1126  static inline bool pe_is_ext_scan_bcn_probe_rsp(tpSirMacMgmtHdr hdr,
1127  				uint8_t *rx_pkt_info)
1128  {
1129  	return false;
1130  }
1131  #endif
1132  
1133  /**
1134   * pe_filter_drop_bcn_probe_frame - Apply filter on the received frame
1135   *
1136   * @mac_ctx: pointer to the global mac context
1137   * @hdr: pointer to the 802.11 header of the frame
1138   * @rx_pkt_info: pointer to the rx packet meta
1139   *
1140   * Applies the filter from global mac context on the received beacon/
1141   * probe response frame before posting it to the PE queue
1142   *
1143   * Return: true if frame is allowed, false if frame is to be dropped.
1144   */
pe_filter_bcn_probe_frame(struct mac_context * mac_ctx,tpSirMacMgmtHdr hdr,uint8_t * rx_pkt_info)1145  static bool pe_filter_bcn_probe_frame(struct mac_context *mac_ctx,
1146  					tpSirMacMgmtHdr hdr,
1147  					uint8_t *rx_pkt_info)
1148  {
1149  	uint8_t session_id;
1150  	struct mgmt_beacon_probe_filter *filter;
1151  
1152  	if (pe_is_ext_scan_bcn_probe_rsp(hdr, rx_pkt_info))
1153  		return true;
1154  
1155  	filter = &mac_ctx->bcn_filter;
1156  
1157  	/*
1158  	 * If any STA session exists and beacon source matches any of the
1159  	 * STA BSSIDs, allow the frame
1160  	 */
1161  	if (filter->num_sta_sessions) {
1162  		for (session_id = 0; session_id < WLAN_MAX_VDEVS;
1163  		     session_id++) {
1164  			if (sir_compare_mac_addr(filter->sta_bssid[session_id],
1165  			    hdr->bssId)) {
1166  				return true;
1167  			}
1168  		}
1169  	}
1170  
1171  	return false;
1172  }
1173  
pe_handle_probe_req_frames(struct mac_context * mac_ctx,cds_pkt_t * pkt)1174  static QDF_STATUS pe_handle_probe_req_frames(struct mac_context *mac_ctx,
1175  					cds_pkt_t *pkt)
1176  {
1177  	QDF_STATUS status;
1178  	struct scheduler_msg msg = {0};
1179  	uint32_t scan_queue_size = 0;
1180  
1181  	/* Check if the probe request frame can be posted in the scan queue */
1182  	status = scheduler_get_queue_size(QDF_MODULE_ID_SCAN, &scan_queue_size);
1183  	if (!QDF_IS_STATUS_SUCCESS(status) ||
1184  	    scan_queue_size > MAX_BCN_PROBE_IN_SCAN_QUEUE) {
1185  		pe_debug_rl("Dropping probe req frame, queue size %d",
1186  			    scan_queue_size);
1187  		return QDF_STATUS_E_FAILURE;
1188  	}
1189  
1190  	/* Forward to MAC via mesg = SIR_BB_XPORT_MGMT_MSG */
1191  	msg.type = SIR_BB_XPORT_MGMT_MSG;
1192  	msg.bodyptr = pkt;
1193  	msg.bodyval = 0;
1194  	msg.callback = pe_mc_process_handler;
1195  
1196  	status = scheduler_post_message(QDF_MODULE_ID_PE,
1197  					QDF_MODULE_ID_PE,
1198  					QDF_MODULE_ID_SCAN, &msg);
1199  
1200  	return status;
1201  }
1202  
1203  /* --------------------------------------------------------------------------- */
1204  /**
1205   * pe_handle_mgmt_frame() - Process the Management frames from TXRX
1206   * @psoc: psoc context
1207   * @peer: peer
1208   * @buf: buffer
1209   * @mgmt_rx_params; rx event params
1210   * @frm_type: frame type
1211   *
1212   * This function handles the mgmt rx frame from mgmt txrx component and forms
1213   * a cds packet and schedule it in controller thread for further processing.
1214   *
1215   * Return: QDF_STATUS_SUCCESS - in case of success
1216   */
pe_handle_mgmt_frame(struct wlan_objmgr_psoc * psoc,struct wlan_objmgr_peer * peer,qdf_nbuf_t buf,struct mgmt_rx_event_params * mgmt_rx_params,enum mgmt_frame_type frm_type)1217  static QDF_STATUS pe_handle_mgmt_frame(struct wlan_objmgr_psoc *psoc,
1218  			struct wlan_objmgr_peer *peer, qdf_nbuf_t buf,
1219  			struct mgmt_rx_event_params *mgmt_rx_params,
1220  			enum mgmt_frame_type frm_type)
1221  {
1222  	struct mac_context *mac;
1223  	tpSirMacMgmtHdr mHdr;
1224  	struct scheduler_msg msg = {0};
1225  	cds_pkt_t *pVosPkt;
1226  	QDF_STATUS qdf_status;
1227  	uint8_t *pRxPacketInfo;
1228  	int ret;
1229  
1230  	/* skip offload packets */
1231  	if ((ucfg_pkt_capture_get_mode(psoc) != PACKET_CAPTURE_MODE_DISABLE) &&
1232  	    mgmt_rx_params->status & WMI_RX_OFFLOAD_MON_MODE) {
1233  		qdf_nbuf_free(buf);
1234  		return QDF_STATUS_SUCCESS;
1235  	}
1236  
1237  	mac = cds_get_context(QDF_MODULE_ID_PE);
1238  	if (!mac) {
1239  		/* cannot log a failure without a valid mac */
1240  		qdf_nbuf_free(buf);
1241  		return QDF_STATUS_E_FAILURE;
1242  	}
1243  
1244  	if (mac->usr_cfg_disable_rsp_tx) {
1245  		pe_debug("Drop Rx pkt with user config");
1246  		qdf_nbuf_free(buf);
1247  		return QDF_STATUS_SUCCESS;
1248  	}
1249  	pVosPkt = qdf_mem_malloc_atomic(sizeof(*pVosPkt));
1250  	if (!pVosPkt) {
1251  		qdf_nbuf_free(buf);
1252  		return QDF_STATUS_E_NOMEM;
1253  	}
1254  
1255  	ret = wma_form_rx_packet(buf, mgmt_rx_params, pVosPkt);
1256  	if (ret) {
1257  		pe_debug_rl("Failed to fill cds packet from event buffer");
1258  		return QDF_STATUS_E_FAILURE;
1259  	}
1260  
1261  	qdf_status =
1262  		wma_ds_peek_rx_packet_info(pVosPkt, (void *)&pRxPacketInfo);
1263  
1264  	if (!QDF_IS_STATUS_SUCCESS(qdf_status)) {
1265  		cds_pkt_return_packet(pVosPkt);
1266  		pVosPkt = NULL;
1267  		return QDF_STATUS_E_FAILURE;
1268  	}
1269  
1270  	/*
1271  	 * The MPDU header is now present at a certain "offset" in
1272  	 * the BD and is specified in the BD itself
1273  	 */
1274  
1275  	mHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
1276  
1277  	/*
1278  	 * Filter the beacon/probe response frames before posting it
1279  	 * on the PE queue
1280  	 */
1281  	if ((mHdr->fc.subType == SIR_MAC_MGMT_BEACON ||
1282  	    mHdr->fc.subType == SIR_MAC_MGMT_PROBE_RSP) &&
1283  	    !pe_filter_bcn_probe_frame(mac, mHdr, pRxPacketInfo)) {
1284  		cds_pkt_return_packet(pVosPkt);
1285  		pVosPkt = NULL;
1286  		return QDF_STATUS_SUCCESS;
1287  	}
1288  
1289  	/*
1290  	 * Post Probe Req frames to Scan queue and return
1291  	 */
1292  	if (mHdr->fc.subType == SIR_MAC_MGMT_PROBE_REQ) {
1293  		qdf_status = pe_handle_probe_req_frames(mac, pVosPkt);
1294  		if (!QDF_IS_STATUS_SUCCESS(qdf_status)) {
1295  			cds_pkt_return_packet(pVosPkt);
1296  			pVosPkt = NULL;
1297  		}
1298  		return qdf_status;
1299  	}
1300  
1301  	if (QDF_STATUS_SUCCESS !=
1302  	    pe_drop_pending_rx_mgmt_frames(mac, mHdr, pVosPkt))
1303  		return QDF_STATUS_E_FAILURE;
1304  
1305  	/* Forward to MAC via mesg = SIR_BB_XPORT_MGMT_MSG */
1306  	msg.type = SIR_BB_XPORT_MGMT_MSG;
1307  	msg.bodyptr = pVosPkt;
1308  	msg.bodyval = 0;
1309  
1310  	if (QDF_STATUS_SUCCESS != sys_bbt_process_message_core(mac,
1311  							 &msg,
1312  							 mHdr->fc.type,
1313  							 mHdr->fc.subType)) {
1314  		cds_pkt_return_packet(pVosPkt);
1315  		pVosPkt = NULL;
1316  		/*
1317  		 * Decrement sys_bbt_pending_mgmt_count if packet
1318  		 * is dropped before posting to LIM
1319  		 */
1320  		lim_decrement_pending_mgmt_count(mac);
1321  		return QDF_STATUS_E_FAILURE;
1322  	}
1323  
1324  	return QDF_STATUS_SUCCESS;
1325  }
1326  
pe_register_mgmt_rx_frm_callback(struct mac_context * mac_ctx)1327  void pe_register_mgmt_rx_frm_callback(struct mac_context *mac_ctx)
1328  {
1329  	QDF_STATUS status;
1330  	struct mgmt_txrx_mgmt_frame_cb_info frm_cb_info;
1331  
1332  	frm_cb_info.frm_type = MGMT_FRAME_TYPE_ALL;
1333  	frm_cb_info.mgmt_rx_cb = pe_handle_mgmt_frame;
1334  
1335  	status = wlan_mgmt_txrx_register_rx_cb(mac_ctx->psoc,
1336  					 WLAN_UMAC_COMP_MLME, &frm_cb_info, 1);
1337  	if (status != QDF_STATUS_SUCCESS)
1338  		pe_err("Registering the PE Handle with MGMT TXRX layer has failed");
1339  
1340  	wma_register_mgmt_frm_client();
1341  }
1342  
pe_deregister_mgmt_rx_frm_callback(struct mac_context * mac_ctx)1343  void pe_deregister_mgmt_rx_frm_callback(struct mac_context *mac_ctx)
1344  {
1345  	QDF_STATUS status;
1346  	struct mgmt_txrx_mgmt_frame_cb_info frm_cb_info;
1347  
1348  	frm_cb_info.frm_type = MGMT_FRAME_TYPE_ALL;
1349  	frm_cb_info.mgmt_rx_cb = pe_handle_mgmt_frame;
1350  
1351  	status = wlan_mgmt_txrx_deregister_rx_cb(mac_ctx->psoc,
1352  					 WLAN_UMAC_COMP_MLME, &frm_cb_info, 1);
1353  	if (status != QDF_STATUS_SUCCESS)
1354  		pe_err("Deregistering the PE Handle with MGMT TXRX layer has failed");
1355  
1356  	wma_de_register_mgmt_frm_client();
1357  }
1358  
1359  
1360  /**
1361   * pe_register_callbacks_with_wma() - register SME and PE callback functions to
1362   * WMA.
1363   * (function documentation in lim_api.h)
1364   */
pe_register_callbacks_with_wma(struct mac_context * mac,struct sme_ready_req * ready_req)1365  void pe_register_callbacks_with_wma(struct mac_context *mac,
1366  				    struct sme_ready_req *ready_req)
1367  {
1368  	QDF_STATUS status;
1369  
1370  	status = wma_register_roaming_callbacks(
1371  			ready_req->csr_roam_auth_event_handle_cb,
1372  			ready_req->pe_roam_synch_cb,
1373  			ready_req->pe_disconnect_cb,
1374  			ready_req->pe_roam_set_ie_cb);
1375  	if (status != QDF_STATUS_SUCCESS)
1376  		pe_err("Registering roaming callbacks with WMA failed");
1377  }
1378  
1379  void
lim_received_hb_handler(struct mac_context * mac,uint32_t chan_freq,struct pe_session * pe_session)1380  lim_received_hb_handler(struct mac_context *mac, uint32_t chan_freq,
1381  			struct pe_session *pe_session)
1382  {
1383  	if (chan_freq == 0 || chan_freq == pe_session->curr_op_freq)
1384  		pe_session->LimRxedBeaconCntDuringHB++;
1385  
1386  	pe_session->pmmOffloadInfo.bcnmiss = false;
1387  } /*** lim_init_wds_info_params() ***/
1388  
1389  /** -------------------------------------------------------------
1390     \fn lim_update_overlap_sta_param
1391     \brief Updates overlap cache and param data structure
1392     \param      struct mac_context *   mac
1393     \param      tSirMacAddr bssId
1394     \param      tpLimProtStaParams pStaParams
1395     \return      None
1396     -------------------------------------------------------------*/
1397  void
lim_update_overlap_sta_param(struct mac_context * mac,tSirMacAddr bssId,tpLimProtStaParams pStaParams)1398  lim_update_overlap_sta_param(struct mac_context *mac, tSirMacAddr bssId,
1399  			     tpLimProtStaParams pStaParams)
1400  {
1401  	int i;
1402  
1403  	if (!pStaParams->numSta) {
1404  		qdf_mem_copy(mac->lim.protStaOverlapCache[0].addr,
1405  			     bssId, sizeof(tSirMacAddr));
1406  		mac->lim.protStaOverlapCache[0].active = true;
1407  
1408  		pStaParams->numSta = 1;
1409  
1410  		return;
1411  	}
1412  
1413  	for (i = 0; i < LIM_PROT_STA_OVERLAP_CACHE_SIZE; i++) {
1414  		if (mac->lim.protStaOverlapCache[i].active) {
1415  			if (!qdf_mem_cmp
1416  				    (mac->lim.protStaOverlapCache[i].addr, bssId,
1417  				    sizeof(tSirMacAddr))) {
1418  				return;
1419  			}
1420  		} else
1421  			break;
1422  	}
1423  
1424  	if (i == LIM_PROT_STA_OVERLAP_CACHE_SIZE) {
1425  		pe_debug("Overlap cache is full");
1426  	} else {
1427  		qdf_mem_copy(mac->lim.protStaOverlapCache[i].addr,
1428  			     bssId, sizeof(tSirMacAddr));
1429  		mac->lim.protStaOverlapCache[i].active = true;
1430  
1431  		pStaParams->numSta++;
1432  	}
1433  }
1434  
1435  /**
1436   * lim_enc_type_matched() - matches security type of incoming beracon with
1437   * current
1438   * @mac_ctx      Pointer to Global MAC structure
1439   * @bcn          Pointer to parsed Beacon structure
1440   * @session      PE session entry
1441   *
1442   * This function matches security type of incoming beracon with current
1443   *
1444   * @return true if matched, false otherwise
1445   */
1446  static bool
lim_enc_type_matched(struct mac_context * mac_ctx,tpSchBeaconStruct bcn,struct pe_session * session)1447  lim_enc_type_matched(struct mac_context *mac_ctx,
1448  		     tpSchBeaconStruct bcn,
1449  		     struct pe_session *session)
1450  {
1451  	if (!bcn || !session)
1452  		return false;
1453  
1454  	/*
1455  	 * This is handled by sending probe req due to IOT issues so
1456  	 * return TRUE
1457  	 */
1458  	if ((bcn->capabilityInfo.privacy) !=
1459  		SIR_MAC_GET_PRIVACY(session->limCurrentBssCaps)) {
1460  		pe_warn("Privacy bit miss match");
1461  		return true;
1462  	}
1463  
1464  	/* Open */
1465  	if ((bcn->capabilityInfo.privacy == 0) &&
1466  	    (session->encryptType == eSIR_ED_NONE))
1467  		return true;
1468  
1469  	/* WEP */
1470  	if ((bcn->capabilityInfo.privacy == 1) &&
1471  	    (bcn->wpaPresent == 0) && (bcn->rsnPresent == 0) &&
1472  	    ((session->encryptType == eSIR_ED_WEP40) ||
1473  		(session->encryptType == eSIR_ED_WEP104)
1474  #ifdef FEATURE_WLAN_WAPI
1475  		|| (session->encryptType == eSIR_ED_WPI)
1476  #endif
1477  	    ))
1478  		return true;
1479  
1480  	/* WPA OR RSN*/
1481  	if ((bcn->capabilityInfo.privacy == 1) &&
1482  	    ((bcn->wpaPresent == 1) || (bcn->rsnPresent == 1)) &&
1483  	    ((session->encryptType == eSIR_ED_TKIP) ||
1484  		(session->encryptType == eSIR_ED_CCMP) ||
1485  		(session->encryptType == eSIR_ED_GCMP) ||
1486  		(session->encryptType == eSIR_ED_GCMP_256) ||
1487  		(session->encryptType == eSIR_ED_AES_128_CMAC)))
1488  		return true;
1489  
1490  	/*
1491  	 * For HS2.0, RSN ie is not present
1492  	 * in beacon. Therefore no need to
1493  	 * check for security type in case
1494  	 * OSEN session.
1495  	 * For WPS registration session no need to detect
1496  	 * detect security mismatch as it won't match and
1497  	 * driver may end up sending probe request without
1498  	 * WPS IE during WPS registration process.
1499  	 */
1500  	if (session->isOSENConnection ||
1501  	   session->wps_registration)
1502  		return true;
1503  
1504  	pe_debug("AP:: Privacy %d WPA %d RSN %d, SELF:: Privacy %d Enc %d OSEN %d WPS %d",
1505  		 bcn->capabilityInfo.privacy, bcn->wpaPresent, bcn->rsnPresent,
1506  		 SIR_MAC_GET_PRIVACY(session->limCurrentBssCaps),
1507  		 session->encryptType, session->isOSENConnection,
1508  		 session->wps_registration);
1509  
1510  	return false;
1511  }
1512  
1513  void
lim_detect_change_in_ap_capabilities(struct mac_context * mac,tpSirProbeRespBeacon pBeacon,struct pe_session * pe_session,bool is_bcn)1514  lim_detect_change_in_ap_capabilities(struct mac_context *mac,
1515  				     tpSirProbeRespBeacon pBeacon,
1516  				     struct pe_session *pe_session,
1517  				     bool is_bcn)
1518  {
1519  	uint8_t len;
1520  	uint32_t new_chan_freq;
1521  	QDF_STATUS status = QDF_STATUS_SUCCESS;
1522  	bool security_caps_matched = true;
1523  	uint16_t ap_cap;
1524  
1525  	ap_cap = lim_get_u16((uint8_t *) &pBeacon->capabilityInfo);
1526  	new_chan_freq = pBeacon->chan_freq;
1527  
1528  	security_caps_matched = lim_enc_type_matched(mac, pBeacon,
1529  						     pe_session);
1530  	if ((false == pe_session->limSentCapsChangeNtf) &&
1531  	    (((!lim_is_null_ssid(&pBeacon->ssId)) &&
1532  	       lim_cmp_ssid(&pBeacon->ssId, pe_session)) ||
1533  	     ((SIR_MAC_GET_ESS(ap_cap) !=
1534  	       SIR_MAC_GET_ESS(pe_session->limCurrentBssCaps)) ||
1535  	      (SIR_MAC_GET_PRIVACY(ap_cap) !=
1536  	       SIR_MAC_GET_PRIVACY(pe_session->limCurrentBssCaps)) ||
1537  	      (SIR_MAC_GET_QOS(ap_cap) !=
1538  	       SIR_MAC_GET_QOS(pe_session->limCurrentBssCaps)) ||
1539  	      ((new_chan_freq != pe_session->curr_op_freq) &&
1540  		(new_chan_freq != 0)) ||
1541  	      (false == security_caps_matched)
1542  	     ))) {
1543  		if (!pe_session->fWaitForProbeRsp || is_bcn) {
1544  			/* If Beacon capabilities is not matching with the current capability,
1545  			 * then send unicast probe request to AP and take decision after
1546  			 * receiving probe response */
1547  			if (pe_session->fIgnoreCapsChange) {
1548  				pe_debug_rl("Ignore the Capability change as probe rsp Capability matched");
1549  				return;
1550  			}
1551  			pe_session->fWaitForProbeRsp = true;
1552  			pe_info(QDF_MAC_ADDR_FMT ": capabilities are not matching, sending directed probe request",
1553  				QDF_MAC_ADDR_REF(pe_session->bssId));
1554  			status =
1555  				lim_send_probe_req_mgmt_frame(
1556  					mac, &pe_session->ssId,
1557  					pe_session->bssId,
1558  					pe_session->curr_op_freq,
1559  					pe_session->self_mac_addr,
1560  					pe_session->dot11mode,
1561  					NULL, NULL);
1562  
1563  			if (QDF_STATUS_SUCCESS != status) {
1564  				pe_err("send ProbeReq failed");
1565  				pe_session->fWaitForProbeRsp = false;
1566  			}
1567  			return;
1568  		}
1569  		/**
1570  		 * BSS capabilities have changed.
1571  		 * Inform Roaming.
1572  		 */
1573  		len = sizeof(tSirMacCapabilityInfo) + sizeof(tSirMacAddr) + sizeof(uint8_t) + 3 * sizeof(uint8_t) + /* reserved fields */
1574  		      pBeacon->ssId.length + 1;
1575  
1576  		if (new_chan_freq != pe_session->curr_op_freq) {
1577  			pe_info(QDF_MAC_ADDR_FMT ": Channel freq Change from %d --> %d Ignoring beacon!",
1578  				QDF_MAC_ADDR_REF(pe_session->bssId),
1579  				pe_session->curr_op_freq, new_chan_freq);
1580  			return;
1581  		}
1582  
1583  		/**
1584  		 * When Cisco 1262 Enterprise APs are configured with WPA2-PSK with
1585  		 * AES+TKIP Pairwise ciphers and WEP-40 Group cipher, they do not set
1586  		 * the privacy bit in Beacons (wpa/rsnie is still present in beacons),
1587  		 * the privacy bit is set in Probe and association responses.
1588  		 * Due to this anomaly, we detect a change in
1589  		 * AP capabilities when we receive a beacon after association and
1590  		 * disconnect from the AP. The following check makes sure that we can
1591  		 * connect to such APs
1592  		 */
1593  		else if ((SIR_MAC_GET_PRIVACY(ap_cap) == 0) &&
1594  			 (pBeacon->rsnPresent || pBeacon->wpaPresent)) {
1595  			pe_info_rl(QDF_MAC_ADDR_FMT ": BSS Caps (Privacy) bit 0 in beacon, but WPA or RSN IE present, Ignore Beacon!",
1596  				   QDF_MAC_ADDR_REF(pe_session->bssId));
1597  			return;
1598  		}
1599  
1600  		pe_session->fIgnoreCapsChange = false;
1601  		pe_session->fWaitForProbeRsp = false;
1602  		pe_session->limSentCapsChangeNtf = true;
1603  		pe_info(QDF_MAC_ADDR_FMT ": initiate Disconnect due to cap mismatch!",
1604  			QDF_MAC_ADDR_REF(pe_session->bssId));
1605  		lim_send_deauth_mgmt_frame(mac, REASON_UNSPEC_FAILURE,
1606  					   pe_session->bssId, pe_session,
1607  					   false);
1608  		lim_tear_down_link_with_ap(mac, pe_session->peSessionId,
1609  					   REASON_UNSPEC_FAILURE,
1610  					   eLIM_HOST_DISASSOC);
1611  	} else if (pe_session->fWaitForProbeRsp) {
1612  		/* Only for probe response frames and matching capabilities the control
1613  		 * will come here. If beacon is with broadcast ssid then fWaitForProbeRsp
1614  		 * will be false, the control will not come here*/
1615  
1616  		pe_debug(QDF_MAC_ADDR_FMT ": capabilities in probe rsp are matching, so ignoring capability mismatch",
1617  			 QDF_MAC_ADDR_REF(pe_session->bssId));
1618  		pe_session->fIgnoreCapsChange = true;
1619  		pe_session->fWaitForProbeRsp = false;
1620  	}
1621  
1622  } /*** lim_detect_change_in_ap_capabilities() ***/
1623  
1624  /* --------------------------------------------------------------------- */
1625  /**
1626   * lim_update_short_slot
1627   *
1628   * FUNCTION:
1629   * Enable/Disable short slot
1630   *
1631   * LOGIC:
1632   *
1633   * ASSUMPTIONS:
1634   *
1635   * NOTE:
1636   *
1637   * @param enable        Flag to enable/disable short slot
1638   * @return None
1639   */
1640  
lim_update_short_slot(struct mac_context * mac,tpSirProbeRespBeacon pBeacon,tpUpdateBeaconParams pBeaconParams,struct pe_session * pe_session)1641  QDF_STATUS lim_update_short_slot(struct mac_context *mac,
1642  				    tpSirProbeRespBeacon pBeacon,
1643  				    tpUpdateBeaconParams pBeaconParams,
1644  				    struct pe_session *pe_session)
1645  {
1646  
1647  	uint16_t ap_cap;
1648  	uint32_t nShortSlot;
1649  	uint32_t phyMode;
1650  
1651  	/* Check Admin mode first. If it is disabled just return */
1652  	if (!mac->mlme_cfg->feature_flags.enable_short_slot_time_11g)
1653  		return QDF_STATUS_SUCCESS;
1654  
1655  	/* Check for 11a mode or 11b mode. In both cases return since slot time is constant and cannot/should not change in beacon */
1656  	lim_get_phy_mode(mac, &phyMode, pe_session);
1657  	if ((phyMode == WNI_CFG_PHY_MODE_11A)
1658  	    || (phyMode == WNI_CFG_PHY_MODE_11B))
1659  		return QDF_STATUS_SUCCESS;
1660  
1661  	ap_cap = lim_get_u16((uint8_t *) &pBeacon->capabilityInfo);
1662  
1663  	/*  Earlier implementation: determine the appropriate short slot mode based on AP advertised modes */
1664  	/* when erp is present, apply short slot always unless, prot=on  && shortSlot=off */
1665  	/* if no erp present, use short slot based on current ap caps */
1666  
1667  	/* Issue with earlier implementation : Cisco 1231 BG has shortSlot = 0, erpIEPresent and useProtection = 0 (Case4); */
1668  
1669  	/* Resolution : always use the shortSlot setting the capability info to decide slot time. */
1670  	/* The difference between the earlier implementation and the new one is only Case4. */
1671  	/*
1672  	   ERP IE Present  |   useProtection   |   shortSlot   =   QC STA Short Slot
1673  	   Case1        1                                   1                       1                       1           //AP should not advertise this combination.
1674  	   Case2        1                                   1                       0                       0
1675  	   Case3        1                                   0                       1                       1
1676  	   Case4        1                                   0                       0                       0
1677  	   Case5        0                                   1                       1                       1
1678  	   Case6        0                                   1                       0                       0
1679  	   Case7        0                                   0                       1                       1
1680  	   Case8        0                                   0                       0                       0
1681  	 */
1682  	nShortSlot = SIR_MAC_GET_SHORT_SLOT_TIME(ap_cap);
1683  
1684  	if (nShortSlot != pe_session->shortSlotTimeSupported) {
1685  		/* Short slot time capability of AP has changed. Adopt to it. */
1686  		pe_debug("Shortslot capability of AP changed: %d",
1687  			       nShortSlot);
1688  			((tpSirMacCapabilityInfo) & pe_session->
1689  			limCurrentBssCaps)->shortSlotTime = (uint16_t) nShortSlot;
1690  		pe_session->shortSlotTimeSupported = nShortSlot;
1691  		pBeaconParams->fShortSlotTime = (uint8_t) nShortSlot;
1692  		pBeaconParams->paramChangeBitmap |=
1693  			PARAM_SHORT_SLOT_TIME_CHANGED;
1694  	}
1695  	return QDF_STATUS_SUCCESS;
1696  }
1697  
1698  
lim_send_heart_beat_timeout_ind(struct mac_context * mac,struct pe_session * pe_session)1699  void lim_send_heart_beat_timeout_ind(struct mac_context *mac,
1700  				     struct pe_session *pe_session)
1701  {
1702  	QDF_STATUS status;
1703  	struct scheduler_msg msg = {0};
1704  
1705  	/* Prepare and post message to LIM Message Queue */
1706  	msg.type = (uint16_t) SIR_LIM_HEART_BEAT_TIMEOUT;
1707  	msg.bodyptr = pe_session;
1708  	msg.bodyval = 0;
1709  	pe_err("Heartbeat failure from Fw");
1710  
1711  	status = lim_post_msg_api(mac, &msg);
1712  
1713  	if (status != QDF_STATUS_SUCCESS) {
1714  		pe_err("posting message: %X to LIM failed, reason: %d",
1715  			msg.type, status);
1716  	}
1717  }
1718  
lim_ps_offload_handle_missed_beacon_ind(struct mac_context * mac,struct scheduler_msg * msg)1719  void lim_ps_offload_handle_missed_beacon_ind(struct mac_context *mac,
1720  					     struct scheduler_msg *msg)
1721  {
1722  	struct missed_beacon_ind *missed_beacon_ind = msg->bodyptr;
1723  	struct pe_session *pe_session =
1724  		pe_find_session_by_vdev_id(mac, missed_beacon_ind->bss_idx);
1725  
1726  	if (!pe_session) {
1727  		pe_err("session does not exist for vdev_id %d",
1728  			missed_beacon_ind->bss_idx);
1729  		return;
1730  	}
1731  
1732  	/* Set Beacon Miss in Powersave Offload */
1733  	pe_session->pmmOffloadInfo.bcnmiss = true;
1734  	pe_err("Received Heart Beat Failure");
1735  
1736  	/*  Do AP probing immediately */
1737  	lim_send_heart_beat_timeout_ind(mac, pe_session);
1738  }
1739  
lim_is_sb_disconnect_allowed_fl(struct pe_session * session,const char * func,uint32_t line)1740  bool lim_is_sb_disconnect_allowed_fl(struct pe_session *session,
1741  				     const char *func, uint32_t line)
1742  {
1743  	if (session->limMlmState == eLIM_MLM_LINK_ESTABLISHED_STATE &&
1744  	    session->limSmeState != eLIM_SME_WT_DISASSOC_STATE &&
1745  	    session->limSmeState != eLIM_SME_WT_DEAUTH_STATE)
1746  		return true;
1747  
1748  	pe_nofl_info("%s:%u: Vdev %d (%d): limMlmState %s(%x) limSmeState %s(%x)",
1749  		     func, line, session->vdev_id, session->peSessionId,
1750  		     lim_mlm_state_str(session->limMlmState),
1751  		     session->limMlmState,
1752  		     lim_sme_state_str(session->limSmeState),
1753  		     session->limSmeState);
1754  
1755  	return false;
1756  }
1757  
1758  #ifdef WLAN_SUPPORT_TWT
1759  #ifdef WLAN_TWT_CONV_SUPPORTED
lim_set_twt_peer_capabilities(struct mac_context * mac_ctx,struct qdf_mac_addr * peer_mac,tDot11fIEhe_cap * he_cap,tDot11fIEhe_op * he_op)1760  void lim_set_twt_peer_capabilities(struct mac_context *mac_ctx,
1761  				   struct qdf_mac_addr *peer_mac,
1762  				   tDot11fIEhe_cap *he_cap,
1763  				   tDot11fIEhe_op *he_op)
1764  {
1765  	uint8_t caps = 0;
1766  
1767  	if (he_cap->twt_request)
1768  		caps |= WLAN_TWT_CAPA_REQUESTOR;
1769  
1770  	if (he_cap->twt_responder)
1771  		caps |= WLAN_TWT_CAPA_RESPONDER;
1772  
1773  	if (he_cap->broadcast_twt)
1774  		caps |= WLAN_TWT_CAPA_BROADCAST;
1775  
1776  	if (he_cap->flex_twt_sched)
1777  		caps |= WLAN_TWT_CAPA_FLEXIBLE;
1778  
1779  	if (he_op->twt_required)
1780  		caps |= WLAN_TWT_CAPA_REQUIRED;
1781  
1782  	wlan_set_peer_twt_capabilities(mac_ctx->psoc, peer_mac, caps);
1783  }
1784  
lim_set_twt_ext_capabilities(struct mac_context * mac_ctx,struct qdf_mac_addr * peer_mac,struct s_ext_cap * ext_cap)1785  void lim_set_twt_ext_capabilities(struct mac_context *mac_ctx,
1786  				  struct qdf_mac_addr *peer_mac,
1787  				  struct s_ext_cap *ext_cap)
1788  {
1789  	uint8_t caps = 0;
1790  
1791  	if (ext_cap->twt_requestor_support)
1792  		caps |= WLAN_TWT_CAPA_REQUESTOR;
1793  
1794  	if (ext_cap->twt_responder_support)
1795  		caps |= WLAN_TWT_CAPA_RESPONDER;
1796  
1797  	wlan_set_peer_twt_capabilities(mac_ctx->psoc, peer_mac, caps);
1798  }
1799  #else
lim_set_twt_peer_capabilities(struct mac_context * mac_ctx,struct qdf_mac_addr * peer_mac,tDot11fIEhe_cap * he_cap,tDot11fIEhe_op * he_op)1800  void lim_set_twt_peer_capabilities(struct mac_context *mac_ctx,
1801  				   struct qdf_mac_addr *peer_mac,
1802  				   tDot11fIEhe_cap *he_cap,
1803  				   tDot11fIEhe_op *he_op)
1804  {
1805  	uint8_t caps = 0;
1806  
1807  	if (he_cap->twt_request)
1808  		caps |= WLAN_TWT_CAPA_REQUESTOR;
1809  
1810  	if (he_cap->twt_responder)
1811  		caps |= WLAN_TWT_CAPA_RESPONDER;
1812  
1813  	if (he_cap->broadcast_twt)
1814  		caps |= WLAN_TWT_CAPA_BROADCAST;
1815  
1816  	if (he_cap->flex_twt_sched)
1817  		caps |= WLAN_TWT_CAPA_FLEXIBLE;
1818  
1819  	if (he_op->twt_required)
1820  		caps |= WLAN_TWT_CAPA_REQUIRED;
1821  
1822  	mlme_set_twt_peer_capabilities(mac_ctx->psoc, peer_mac,
1823  				       caps);
1824  }
1825  
lim_set_twt_ext_capabilities(struct mac_context * mac_ctx,struct qdf_mac_addr * peer_mac,struct s_ext_cap * ext_cap)1826  void lim_set_twt_ext_capabilities(struct mac_context *mac_ctx,
1827  				  struct qdf_mac_addr *peer_mac,
1828  				  struct s_ext_cap *ext_cap)
1829  {
1830  	uint8_t caps = 0;
1831  
1832  	if (ext_cap->twt_requestor_support)
1833  		caps |= WLAN_TWT_CAPA_REQUESTOR;
1834  
1835  	if (ext_cap->twt_responder_support)
1836  		caps |= WLAN_TWT_CAPA_RESPONDER;
1837  
1838  	mlme_set_twt_peer_capabilities(mac_ctx->psoc, peer_mac, caps);
1839  }
1840  #endif /* WLAN_TWT_CONV_SUPPORTED */
1841  #endif /* WLAN_SUPPORT_TWT */
1842  
1843  #ifdef WLAN_FEATURE_ROAM_OFFLOAD
pe_update_crypto_params(struct mac_context * mac_ctx,struct pe_session * ft_session,struct roam_offload_synch_ind * roam_synch)1844  static void pe_update_crypto_params(struct mac_context *mac_ctx,
1845  				    struct pe_session *ft_session,
1846  				    struct roam_offload_synch_ind *roam_synch)
1847  {
1848  	uint8_t *assoc_ies;
1849  	uint32_t assoc_ies_len;
1850  	uint8_t ies_offset = WLAN_REASSOC_REQ_IES_OFFSET;
1851  	tpSirMacMgmtHdr hdr;
1852  	const uint8_t *wpa_ie, *rsn_ie;
1853  	uint32_t wpa_oui;
1854  	struct wlan_crypto_params *crypto_params;
1855  
1856  	hdr = (tpSirMacMgmtHdr)((uint8_t *)roam_synch +
1857  		roam_synch->reassoc_req_offset);
1858  	if (hdr->fc.type == SIR_MAC_MGMT_FRAME &&
1859  	    hdr->fc.subType == SIR_MAC_MGMT_ASSOC_REQ)
1860  		ies_offset = WLAN_ASSOC_REQ_IES_OFFSET;
1861  
1862  	if (roam_synch->reassoc_req_length <
1863  	    (sizeof(tSirMacMgmtHdr) + ies_offset)) {
1864  		pe_err("invalid reassoc req len %d",
1865  		       roam_synch->reassoc_req_length);
1866  		return;
1867  	}
1868  
1869  	ft_session->limRmfEnabled = false;
1870  
1871  	assoc_ies = (uint8_t *)roam_synch + roam_synch->reassoc_req_offset +
1872  				sizeof(tSirMacMgmtHdr) + ies_offset;
1873  	assoc_ies_len = roam_synch->reassoc_req_length -
1874  				sizeof(tSirMacMgmtHdr) - ies_offset;
1875  
1876  	rsn_ie = wlan_get_ie_ptr_from_eid(WLAN_ELEMID_RSN, assoc_ies,
1877  					  assoc_ies_len);
1878  	wpa_oui = WLAN_WPA_SEL(WLAN_WPA_OUI_TYPE);
1879  	wpa_ie = wlan_get_vendor_ie_ptr_from_oui((uint8_t *)&wpa_oui,
1880  						 WLAN_OUI_SIZE, assoc_ies,
1881  						 assoc_ies_len);
1882  	if (!wpa_ie && !rsn_ie) {
1883  		pe_nofl_debug("RSN and WPA IE not present");
1884  		return;
1885  	}
1886  
1887  	wlan_set_vdev_crypto_prarams_from_ie(ft_session->vdev, assoc_ies,
1888  					     assoc_ies_len);
1889  	ft_session->limRmfEnabled =
1890  		lim_get_vdev_rmf_capable(mac_ctx, ft_session);
1891  	crypto_params = wlan_crypto_vdev_get_crypto_params(ft_session->vdev);
1892  	if (!crypto_params) {
1893  		pe_err("crypto params is null");
1894  		return;
1895  	}
1896  
1897  	ft_session->connected_akm =
1898  		lim_get_connected_akm(ft_session, crypto_params->ucastcipherset,
1899  				      crypto_params->authmodeset,
1900  				      crypto_params->key_mgmt);
1901  	ft_session->encryptType =
1902  		lim_get_encrypt_ed_type(crypto_params->ucastcipherset);
1903  	pe_nofl_debug("vdev %d roam auth 0x%x akm 0x%0x rsn_caps 0x%x ucastcipher 0x%x akm %d enc: %d",
1904  		      ft_session->vdev_id,
1905  		      crypto_params->authmodeset,
1906  		      crypto_params->key_mgmt,
1907  		      crypto_params->rsn_caps,
1908  		      crypto_params->ucastcipherset,
1909  		      ft_session->connected_akm,
1910  		      ft_session->encryptType);
1911  }
1912  
1913  /**
1914   * sir_parse_bcn_fixed_fields() - Parse fixed fields in Beacon IE's
1915   *
1916   * @mac_ctx: MAC Context
1917   * @beacon_struct: Beacon/Probe Response structure
1918   * @buf: Fixed Fields buffer
1919   */
sir_parse_bcn_fixed_fields(struct mac_context * mac_ctx,tpSirProbeRespBeacon beacon_struct,uint8_t * buf)1920  static void sir_parse_bcn_fixed_fields(struct mac_context *mac_ctx,
1921  					tpSirProbeRespBeacon beacon_struct,
1922  					uint8_t *buf)
1923  {
1924  	tDot11fFfCapabilities dst;
1925  
1926  	beacon_struct->timeStamp[0] = lim_get_u32(buf);
1927  	beacon_struct->timeStamp[1] = lim_get_u32(buf + 4);
1928  	buf += 8;
1929  
1930  	beacon_struct->beaconInterval = lim_get_u16(buf);
1931  	buf += 2;
1932  
1933  	dot11f_unpack_ff_capabilities(mac_ctx, buf, &dst);
1934  
1935  	sir_copy_caps_info(mac_ctx, dst, beacon_struct);
1936  }
1937  
1938  static QDF_STATUS
lim_roam_gen_mbssid_beacon(struct mac_context * mac,struct roam_offload_synch_ind * roam_ind,tpSirProbeRespBeacon parsed_frm,uint8_t ** ie,uint32_t * ie_len)1939  lim_roam_gen_mbssid_beacon(struct mac_context *mac,
1940  			   struct roam_offload_synch_ind *roam_ind,
1941  			   tpSirProbeRespBeacon parsed_frm,
1942  			   uint8_t **ie, uint32_t *ie_len)
1943  {
1944  	qdf_list_t *scan_list;
1945  	struct mgmt_rx_event_params rx_param = {0};
1946  	uint8_t list_count = 0, i;
1947  	QDF_STATUS status = QDF_STATUS_E_FAILURE;
1948  	qdf_list_node_t *next_node = NULL, *cur_node = NULL;
1949  	struct scan_cache_node *scan_node;
1950  	struct scan_cache_entry *scan_entry;
1951  	uint8_t *bcn_prb_ptr;
1952  	uint32_t nontx_bcn_prbrsp_len = 0, offset, length;
1953  	uint8_t *nontx_bcn_prbrsp = NULL;
1954  	uint8_t ie_offset;
1955  
1956  	ie_offset = SIR_MAC_HDR_LEN_3A + SIR_MAC_B_PR_SSID_OFFSET;
1957  	bcn_prb_ptr = (uint8_t *)roam_ind +
1958  				roam_ind->beacon_probe_resp_offset;
1959  
1960  	rx_param.chan_freq = roam_ind->chan_freq;
1961  	rx_param.pdev_id = wlan_objmgr_pdev_get_pdev_id(mac->pdev);
1962  	rx_param.rssi = roam_ind->rssi;
1963  
1964  	/* Set all per chain rssi as invalid */
1965  	for (i = 0; i < WLAN_MGMT_TXRX_HOST_MAX_ANTENNA; i++)
1966  		rx_param.rssi_ctl[i] = WLAN_INVALID_PER_CHAIN_RSSI;
1967  
1968  	scan_list = util_scan_unpack_beacon_frame(mac->pdev, bcn_prb_ptr,
1969  						  roam_ind->beacon_probe_resp_length,
1970  						  MGMT_SUBTYPE_BEACON, &rx_param);
1971  	if (!scan_list) {
1972  		pe_err("failed to parse");
1973  		return QDF_STATUS_E_FAILURE;
1974  	}
1975  
1976  	list_count = qdf_list_size(scan_list);
1977  	status = qdf_list_peek_front(scan_list, &cur_node);
1978  	if (QDF_IS_STATUS_ERROR(status) || !cur_node) {
1979  		pe_debug("list peek front failure. list size %d", list_count);
1980  		goto error;
1981  	}
1982  
1983  	for (i = 1; i < list_count; i++) {
1984  		scan_node = qdf_container_of(cur_node,
1985  					     struct scan_cache_node, node);
1986  		scan_entry = scan_node->entry;
1987  		if (qdf_is_macaddr_equal(&roam_ind->bssid,
1988  					 &scan_entry->bssid)) {
1989  			pe_debug("matched BSSID "QDF_MAC_ADDR_FMT" bcn len %d profiles %d",
1990  				 QDF_MAC_ADDR_REF(scan_entry->bssid.bytes),
1991  				 scan_entry->raw_frame.len,
1992  				 list_count);
1993  			nontx_bcn_prbrsp = scan_entry->raw_frame.ptr;
1994  			nontx_bcn_prbrsp_len = scan_entry->raw_frame.len;
1995  			QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE,
1996  					   QDF_TRACE_LEVEL_DEBUG,
1997  					   scan_entry->raw_frame.ptr,
1998  					   nontx_bcn_prbrsp_len);
1999  			break;
2000  		}
2001  		status = qdf_list_peek_next(scan_list, cur_node, &next_node);
2002  		if (QDF_IS_STATUS_ERROR(status) || !next_node) {
2003  			pe_debug("list remove failure i:%d, lsize:%d",
2004  				 i, list_count);
2005  			goto error;
2006  		}
2007  		cur_node = next_node;
2008  	}
2009  
2010  	if (!nontx_bcn_prbrsp_len) {
2011  		pe_debug("failed to generate/find MBSSID beacon");
2012  		goto error;
2013  	}
2014  
2015  	if (roam_ind->is_beacon) {
2016  		offset = SIR_MAC_HDR_LEN_3A + SIR_MAC_B_PR_SSID_OFFSET;
2017  		length = nontx_bcn_prbrsp_len - SIR_MAC_HDR_LEN_3A;
2018  		if (sir_parse_beacon_ie(mac, parsed_frm,
2019  					&nontx_bcn_prbrsp[offset],
2020  					length) != QDF_STATUS_SUCCESS ||
2021  			!parsed_frm->ssidPresent) {
2022  			pe_err("Parse error Beacon, length: %d",
2023  			       roam_ind->beacon_probe_resp_length);
2024  			status =  QDF_STATUS_E_FAILURE;
2025  			goto error;
2026  		}
2027  	} else {
2028  		offset = SIR_MAC_HDR_LEN_3A;
2029  		length = nontx_bcn_prbrsp_len - SIR_MAC_HDR_LEN_3A;
2030  		if (sir_convert_probe_frame2_struct(mac,
2031  					    &nontx_bcn_prbrsp[offset],
2032  					    length,
2033  					    parsed_frm) != QDF_STATUS_SUCCESS ||
2034  			!parsed_frm->ssidPresent) {
2035  			pe_err("Parse error ProbeResponse, length: %d",
2036  			       roam_ind->beacon_probe_resp_length);
2037  			status = QDF_STATUS_E_FAILURE;
2038  			goto error;
2039  		}
2040  	}
2041  
2042  	*ie_len = nontx_bcn_prbrsp_len - ie_offset;
2043  	if (*ie_len) {
2044  		*ie = qdf_mem_malloc(*ie_len);
2045  		if (!*ie)
2046  			return QDF_STATUS_E_NOMEM;
2047  		qdf_mem_copy(*ie, nontx_bcn_prbrsp + ie_offset, *ie_len);
2048  		pe_debug("beacon/probe Ie length: %d", *ie_len);
2049  	}
2050  error:
2051  	for (i = 0; i < list_count; i++) {
2052  		status = qdf_list_remove_front(scan_list, &next_node);
2053  		if (QDF_IS_STATUS_ERROR(status) || !next_node) {
2054  			pe_debug("list remove failure i:%d, lsize:%d",
2055  				 i, list_count);
2056  			break;
2057  		}
2058  		scan_node = qdf_container_of(next_node,
2059  					     struct scan_cache_node, node);
2060  		util_scan_free_cache_entry(scan_node->entry);
2061  		qdf_mem_free(scan_node);
2062  	}
2063  	qdf_mem_free(scan_list);
2064  
2065  	return status;
2066  }
2067  
2068  static QDF_STATUS
lim_roam_gen_beacon_descr(struct mac_context * mac,uint8_t * bcn_prb_ptr,uint16_t bcn_prb_len,bool is_mlo_link,struct roam_offload_synch_ind * roam_ind,tpSirProbeRespBeacon parsed_frm,uint8_t ** ie,uint32_t * ie_len,struct qdf_mac_addr * bssid)2069  lim_roam_gen_beacon_descr(struct mac_context *mac,
2070  			  uint8_t *bcn_prb_ptr,
2071  			  uint16_t bcn_prb_len, bool is_mlo_link,
2072  			  struct roam_offload_synch_ind *roam_ind,
2073  			  tpSirProbeRespBeacon parsed_frm,
2074  			  uint8_t **ie, uint32_t *ie_len,
2075  			  struct qdf_mac_addr *bssid)
2076  {
2077  	QDF_STATUS status;
2078  	tpSirMacMgmtHdr mac_hdr;
2079  	uint8_t ie_offset;
2080  	bool is_beacon;
2081  
2082  	mac_hdr = (tpSirMacMgmtHdr)bcn_prb_ptr;
2083  	ie_offset = SIR_MAC_HDR_LEN_3A + SIR_MAC_B_PR_SSID_OFFSET;
2084  
2085  	if (qdf_is_macaddr_zero((struct qdf_mac_addr *)mac_hdr->bssId)) {
2086  		pe_debug("bssid is 0 in beacon/probe update it with bssId"
2087  			 QDF_MAC_ADDR_FMT "in sync ind",
2088  			 QDF_MAC_ADDR_REF(bssid->bytes));
2089  		qdf_mem_copy(mac_hdr->bssId, bssid->bytes,
2090  			     sizeof(tSirMacAddr));
2091  	}
2092  
2093  	is_beacon = is_mlo_link ? roam_ind->is_link_beacon : roam_ind->is_beacon;
2094  
2095  	if ((!is_multi_link_roam(roam_ind)) &&
2096  	    (qdf_mem_cmp(bssid->bytes,
2097  			 &mac_hdr->bssId, QDF_MAC_ADDR_SIZE) != 0)) {
2098  		pe_debug("LFR3:MBSSID Beacon/Prb Rsp: %d bssid "
2099  			 QDF_MAC_ADDR_FMT,
2100  			 roam_ind->is_beacon,
2101  			 QDF_MAC_ADDR_REF(mac_hdr->bssId));
2102  		/*
2103  		 * Its a MBSSID non-tx BSS roaming scenario.
2104  		 * Generate non tx BSS beacon/probe response
2105  		 */
2106  		status = lim_roam_gen_mbssid_beacon(mac,
2107  						    roam_ind,
2108  						    parsed_frm,
2109  						    ie, ie_len);
2110  		if (QDF_IS_STATUS_ERROR(status)) {
2111  			pe_err("failed to gen mbssid beacon");
2112  			return QDF_STATUS_E_FAILURE;
2113  		}
2114  	} else {
2115  		if (is_beacon) {
2116  			if (sir_parse_beacon_ie(mac, parsed_frm,
2117  				&bcn_prb_ptr[SIR_MAC_HDR_LEN_3A +
2118  				SIR_MAC_B_PR_SSID_OFFSET],
2119  				bcn_prb_len - SIR_MAC_HDR_LEN_3A) !=
2120  						QDF_STATUS_SUCCESS ||
2121  			    !parsed_frm->ssidPresent) {
2122  				pe_err("Parse error Beacon, length: %d",
2123  				       bcn_prb_len);
2124  				return QDF_STATUS_E_FAILURE;
2125  			}
2126  		} else {
2127  			if (sir_convert_probe_frame2_struct(mac,
2128  				&bcn_prb_ptr[SIR_MAC_HDR_LEN_3A],
2129  				bcn_prb_len -
2130  				SIR_MAC_HDR_LEN_3A, parsed_frm) !=
2131  				QDF_STATUS_SUCCESS ||
2132  				!parsed_frm->ssidPresent) {
2133  				pe_err("Parse error ProbeResponse, length: %d",
2134  				       bcn_prb_len);
2135  				return QDF_STATUS_E_FAILURE;
2136  			}
2137  		}
2138  		/* 24 byte MAC header and 12 byte to ssid IE */
2139  		if (bcn_prb_len > ie_offset) {
2140  			*ie_len = bcn_prb_len - ie_offset;
2141  			*ie = qdf_mem_malloc(*ie_len);
2142  			if (!*ie)
2143  				return QDF_STATUS_E_NOMEM;
2144  			qdf_mem_copy(*ie, bcn_prb_ptr + ie_offset, *ie_len);
2145  			pe_debug("beacon/probe Ie length: %d", *ie_len);
2146  		}
2147  	}
2148  	/*
2149  	 * For probe response, unpack core parses beacon interval, capabilities,
2150  	 * timestamp. For beacon IEs, these fields are not parsed.
2151  	 */
2152  	if (is_beacon)
2153  		sir_parse_bcn_fixed_fields(mac, parsed_frm,
2154  			&bcn_prb_ptr[SIR_MAC_HDR_LEN_3A]);
2155  
2156  	return QDF_STATUS_SUCCESS;
2157  }
2158  
2159  static QDF_STATUS
lim_roam_fill_bss_descr(struct mac_context * mac,struct roam_offload_synch_ind * roam_synch_ind,struct bss_description * bss_desc_ptr,struct pe_session * session)2160  lim_roam_fill_bss_descr(struct mac_context *mac,
2161  			struct roam_offload_synch_ind *roam_synch_ind,
2162  			struct bss_description *bss_desc_ptr,
2163  			struct pe_session *session)
2164  {
2165  	uint32_t ie_len = 0;
2166  	tpSirProbeRespBeacon parsed_frm_ptr = NULL;
2167  	tpSirMacMgmtHdr mac_hdr;
2168  	uint8_t *bcn_proberesp_ptr = NULL;
2169  	uint16_t bcn_proberesp_len = 0;
2170  	QDF_STATUS status = QDF_STATUS_SUCCESS;
2171  	uint8_t *ie = NULL;
2172  	struct qdf_mac_addr bssid;
2173  	bool is_mlo_link;
2174  	uint8_t vdev_id = session->vdev_id;
2175  	struct element_info frame;
2176  	struct cm_roam_values_copy mdie_cfg = {0};
2177  
2178  	bcn_proberesp_ptr = (uint8_t *)roam_synch_ind +
2179  		roam_synch_ind->beacon_probe_resp_offset;
2180  	bcn_proberesp_len = roam_synch_ind->beacon_probe_resp_length;
2181  
2182  	frame.ptr = NULL;
2183  	frame.len = 0;
2184  	if (is_multi_link_roam(roam_synch_ind)) {
2185  		mlo_get_sta_link_mac_addr(vdev_id, roam_synch_ind, &bssid);
2186  		is_mlo_link = wlan_vdev_mlme_get_is_mlo_link(mac->psoc, vdev_id);
2187  
2188  		status = wlan_scan_get_entry_by_mac_addr(mac->pdev, &bssid,
2189  							 &frame);
2190  		if (QDF_IS_STATUS_ERROR(status) || !frame.len) {
2191  			pe_err("Failed to get scan entry for " QDF_MAC_ADDR_FMT,
2192  			       QDF_MAC_ADDR_REF(bssid.bytes));
2193  			return status;
2194  		}
2195  		bcn_proberesp_ptr = frame.ptr;
2196  		bcn_proberesp_len = frame.len;
2197  	} else {
2198  		bssid = roam_synch_ind->bssid;
2199  		is_mlo_link = false;
2200  	}
2201  
2202  	mac_hdr = (tpSirMacMgmtHdr)bcn_proberesp_ptr;
2203  	parsed_frm_ptr = qdf_mem_malloc(sizeof(tSirProbeRespBeacon));
2204  	if (!parsed_frm_ptr) {
2205  		status = QDF_STATUS_E_NOMEM;
2206  		goto done;
2207  	}
2208  
2209  	if (bcn_proberesp_len <= SIR_MAC_HDR_LEN_3A) {
2210  		pe_err("very few bytes in synchInd %s beacon / probe resp frame! length: %d",
2211  		       is_mlo_link ? "link" : "", bcn_proberesp_len);
2212  		status = QDF_STATUS_E_FAILURE;
2213  		goto done;
2214  	}
2215  
2216  	pe_debug("LFR3:Beacon/Prb Rsp: %d bssid " QDF_MAC_ADDR_FMT
2217  		 " beacon " QDF_MAC_ADDR_FMT,
2218  		 is_mlo_link ? roam_synch_ind->is_link_beacon :
2219  			roam_synch_ind->is_beacon,
2220  		 QDF_MAC_ADDR_REF(bssid.bytes),
2221  		 QDF_MAC_ADDR_REF(mac_hdr->bssId));
2222  	mgmt_txrx_frame_hex_dump(bcn_proberesp_ptr, bcn_proberesp_len, false);
2223  
2224  	status = lim_roam_gen_beacon_descr(mac, bcn_proberesp_ptr,
2225  					   bcn_proberesp_len, is_mlo_link,
2226  					   roam_synch_ind, parsed_frm_ptr,
2227  					   &ie, &ie_len,
2228  					   &bssid);
2229  	if (QDF_IS_STATUS_ERROR(status)) {
2230  		pe_err("Failed to parse beacon");
2231  		status = QDF_STATUS_E_FAILURE;
2232  		goto done;
2233  	}
2234  
2235  	/*
2236  	 * Length of BSS description is without length of
2237  	 * length itself and length of pointer
2238  	 * that holds ieFields
2239  	 *
2240  	 * struct bss_description
2241  	 * +--------+---------------------------------+---------------+
2242  	 * | length | other fields                    | pointer to IEs|
2243  	 * +--------+---------------------------------+---------------+
2244  	 *                                            ^
2245  	 *                                            ieFields
2246  	 */
2247  	bss_desc_ptr->length = (uint16_t) (offsetof(struct bss_description,
2248  					   ieFields[0]) -
2249  				sizeof(bss_desc_ptr->length) + ie_len);
2250  
2251  	bss_desc_ptr->fProbeRsp = !(is_mlo_link ?
2252  					roam_synch_ind->is_link_beacon :
2253  					roam_synch_ind->is_beacon);
2254  	bss_desc_ptr->rssi = roam_synch_ind->rssi;
2255  	/* Copy Timestamp */
2256  	bss_desc_ptr->scansystimensec = qdf_get_monotonic_boottime_ns();
2257  
2258  	if (is_multi_link_roam(roam_synch_ind)) {
2259  		bss_desc_ptr->chan_freq =
2260  				mlo_roam_get_chan_freq(vdev_id, roam_synch_ind);
2261  	} else if (parsed_frm_ptr->he_op.oper_info_6g_present) {
2262  		bss_desc_ptr->chan_freq = wlan_reg_chan_band_to_freq(mac->pdev,
2263  			parsed_frm_ptr->he_op.oper_info_6g.info.primary_ch,
2264  			BIT(REG_BAND_6G));
2265  	} else if (parsed_frm_ptr->dsParamsPresent) {
2266  		bss_desc_ptr->chan_freq = parsed_frm_ptr->chan_freq;
2267  	} else if (parsed_frm_ptr->HTInfo.present) {
2268  		bss_desc_ptr->chan_freq =
2269  			wlan_reg_legacy_chan_to_freq(mac->pdev,
2270  						     parsed_frm_ptr->HTInfo.primaryChannel);
2271  	} else {
2272  		/*
2273  		 * If DS Params or HTIE is not present in the probe resp or
2274  		 * beacon, then use the channel frequency provided by firmware
2275  		 * to fill the channel in the BSS descriptor.*/
2276  		bss_desc_ptr->chan_freq = roam_synch_ind->chan_freq;
2277  	}
2278  
2279  	bss_desc_ptr->nwType = lim_get_nw_type(mac, bss_desc_ptr->chan_freq,
2280  					       SIR_MAC_MGMT_FRAME,
2281  					       parsed_frm_ptr);
2282  
2283  	bss_desc_ptr->sinr = 0;
2284  	bss_desc_ptr->beaconInterval = parsed_frm_ptr->beaconInterval;
2285  	bss_desc_ptr->timeStamp[0]   = parsed_frm_ptr->timeStamp[0];
2286  	bss_desc_ptr->timeStamp[1]   = parsed_frm_ptr->timeStamp[1];
2287  	qdf_mem_copy(&bss_desc_ptr->capabilityInfo,
2288  	&bcn_proberesp_ptr[SIR_MAC_HDR_LEN_3A + SIR_MAC_B_PR_CAPAB_OFFSET], 2);
2289  
2290  	qdf_mem_copy((uint8_t *) &bss_desc_ptr->bssId,
2291  		     (uint8_t *)&bssid.bytes,
2292  		     sizeof(tSirMacAddr));
2293  
2294  	qdf_mem_copy((uint8_t *)&bss_desc_ptr->seq_ctrl,
2295  		     (uint8_t *)&mac_hdr->seqControl,
2296  		     sizeof(tSirMacSeqCtl));
2297  
2298  	bss_desc_ptr->received_time =
2299  		      (uint64_t)qdf_mc_timer_get_system_time();
2300  	if (parsed_frm_ptr->mdiePresent) {
2301  		bss_desc_ptr->mdiePresent = parsed_frm_ptr->mdiePresent;
2302  		qdf_mem_copy((uint8_t *)bss_desc_ptr->mdie,
2303  				(uint8_t *)parsed_frm_ptr->mdie,
2304  				SIR_MDIE_SIZE);
2305  
2306  		mdie_cfg.bool_value = true;
2307  		mdie_cfg.uint_value =
2308  			(bss_desc_ptr->mdie[1] << 8) | (bss_desc_ptr->mdie[0]);
2309  
2310  		wlan_cm_roam_cfg_set_value(mac->psoc, vdev_id,
2311  					   MOBILITY_DOMAIN, &mdie_cfg);
2312  	}
2313  	pe_debug("chan: %d rssi: %d ie_len %d mdie_present:%d mdie = %02x %02x %02x",
2314  		 bss_desc_ptr->chan_freq,
2315  		 bss_desc_ptr->rssi, ie_len, bss_desc_ptr->mdiePresent,
2316  		 bss_desc_ptr->mdie[0], bss_desc_ptr->mdie[1], bss_desc_ptr->mdie[2]);
2317  
2318  	if (ie_len) {
2319  		qdf_mem_copy(&bss_desc_ptr->ieFields,
2320  			     ie, ie_len);
2321  		qdf_mem_free(ie);
2322  	} else {
2323  		pe_err("Beacon/Probe rsp doesn't have any IEs");
2324  		status = QDF_STATUS_E_FAILURE;
2325  		goto done;
2326  	}
2327  done:
2328  	qdf_mem_free(frame.ptr);
2329  	qdf_mem_free(parsed_frm_ptr);
2330  	return status;
2331  }
2332  
2333  #if defined(WLAN_FEATURE_FILS_SK)
2334  /**
2335   * lim_copy_and_free_hlp_data_from_session - Copy HLP info
2336   * @session_ptr: PE session
2337   * @roam_sync_ind_ptr: Roam Synch Indication pointer
2338   *
2339   * This API is used to copy the parsed HLP info from PE session
2340   * to roam synch indication data. THe HLP info is expected to be
2341   * parsed/stored in PE session already from assoc IE's received
2342   * from fw as part of Roam Synch Indication.
2343   *
2344   * Return: None
2345   */
2346  static void
lim_copy_and_free_hlp_data_from_session(struct pe_session * session_ptr,struct roam_offload_synch_ind * roam_sync_ind_ptr)2347  lim_copy_and_free_hlp_data_from_session(struct pe_session *session_ptr,
2348  					struct roam_offload_synch_ind
2349  					*roam_sync_ind_ptr)
2350  {
2351  	if (session_ptr->fils_info->hlp_data &&
2352  	    session_ptr->fils_info->hlp_data_len) {
2353  		cds_copy_hlp_info(&session_ptr->fils_info->dst_mac,
2354  				  &session_ptr->fils_info->src_mac,
2355  				  session_ptr->fils_info->hlp_data_len,
2356  				  session_ptr->fils_info->hlp_data,
2357  				  &roam_sync_ind_ptr->dst_mac,
2358  				  &roam_sync_ind_ptr->src_mac,
2359  				  &roam_sync_ind_ptr->hlp_data_len,
2360  				  roam_sync_ind_ptr->hlp_data);
2361  
2362  		qdf_mem_free(session_ptr->fils_info->hlp_data);
2363  		session_ptr->fils_info->hlp_data = NULL;
2364  		session_ptr->fils_info->hlp_data_len = 0;
2365  	}
2366  }
2367  #else
2368  static inline void
lim_copy_and_free_hlp_data_from_session(struct pe_session * session_ptr,struct roam_offload_synch_ind * roam_sync_ind_ptr)2369  lim_copy_and_free_hlp_data_from_session(struct pe_session *session_ptr,
2370  					struct roam_offload_synch_ind
2371  					*roam_sync_ind_ptr)
2372  {}
2373  #endif
2374  
2375  static
lim_process_rmf_disconnect_frame(struct mac_context * mac,struct pe_session * session,uint8_t * deauth_disassoc_frame,uint16_t deauth_disassoc_frame_len,uint16_t * extracted_length)2376  uint8_t *lim_process_rmf_disconnect_frame(struct mac_context *mac,
2377  					  struct pe_session *session,
2378  					  uint8_t *deauth_disassoc_frame,
2379  					  uint16_t deauth_disassoc_frame_len,
2380  					  uint16_t *extracted_length)
2381  {
2382  	struct wlan_frame_hdr *mac_hdr;
2383  	uint8_t mic_len, hdr_len, pdev_id;
2384  	uint8_t *orig_ptr, *efrm;
2385  	int32_t mgmtcipherset;
2386  	uint32_t mmie_len;
2387  	QDF_STATUS status;
2388  
2389  	mac_hdr = (struct wlan_frame_hdr *)deauth_disassoc_frame;
2390  	orig_ptr = (uint8_t *)mac_hdr;
2391  
2392  	if (mac_hdr->i_fc[1] & IEEE80211_FC1_WEP) {
2393  		if (QDF_IS_ADDR_BROADCAST(mac_hdr->i_addr1) ||
2394  		    IEEE80211_IS_MULTICAST(mac_hdr->i_addr1)) {
2395  			pe_err("Encrypted BC/MC frame dropping the frame");
2396  			*extracted_length = 0;
2397  			return NULL;
2398  		}
2399  
2400  		pdev_id = wlan_objmgr_pdev_get_pdev_id(mac->pdev);
2401  		status = mlme_get_peer_mic_len(mac->psoc, pdev_id,
2402  					       mac_hdr->i_addr2, &mic_len,
2403  					       &hdr_len);
2404  		if (QDF_IS_STATUS_ERROR(status)) {
2405  			pe_err("Failed to get mic hdr and length");
2406  			*extracted_length = 0;
2407  			return NULL;
2408  		}
2409  
2410  		if (deauth_disassoc_frame_len <
2411  		    (sizeof(*mac_hdr) + hdr_len + mic_len)) {
2412  			pe_err("Frame len less than expected %d",
2413  			       deauth_disassoc_frame_len);
2414  			*extracted_length = 0;
2415  			return NULL;
2416  		}
2417  
2418  		/*
2419  		 * Strip the privacy headers and trailer
2420  		 * for the received deauth/disassoc frame
2421  		 */
2422  		qdf_mem_move(orig_ptr + hdr_len, mac_hdr,
2423  			     sizeof(*mac_hdr));
2424  		*extracted_length = deauth_disassoc_frame_len -
2425  				    (hdr_len + mic_len);
2426  		return orig_ptr + hdr_len;
2427  	}
2428  
2429  	if (!(QDF_IS_ADDR_BROADCAST(mac_hdr->i_addr1) ||
2430  	      IEEE80211_IS_MULTICAST(mac_hdr->i_addr1))) {
2431  		pe_err("Rx unprotected unicast mgmt frame");
2432  		*extracted_length = 0;
2433  		return NULL;
2434  	}
2435  
2436  	mgmtcipherset = wlan_crypto_get_param(session->vdev,
2437  					      WLAN_CRYPTO_PARAM_MGMT_CIPHER);
2438  	if (mgmtcipherset < 0) {
2439  		pe_err("Invalid mgmt cipher");
2440  		*extracted_length = 0;
2441  		return NULL;
2442  	}
2443  
2444  	mmie_len = (mgmtcipherset & (1 << WLAN_CRYPTO_CIPHER_AES_CMAC) ?
2445  		    cds_get_mmie_size() : cds_get_gmac_mmie_size());
2446  
2447  	efrm = orig_ptr + deauth_disassoc_frame_len;
2448  	if (!mac->pmf_offload &&
2449  	    !wlan_crypto_is_mmie_valid(session->vdev, orig_ptr, efrm)) {
2450  		pe_err("Invalid MMIE");
2451  		*extracted_length = 0;
2452  		return NULL;
2453  	}
2454  
2455  	*extracted_length = deauth_disassoc_frame_len - mmie_len;
2456  
2457  	return deauth_disassoc_frame;
2458  }
2459  
2460  QDF_STATUS
pe_disconnect_callback(struct mac_context * mac,uint8_t vdev_id,uint8_t * deauth_disassoc_frame,uint16_t deauth_disassoc_frame_len,uint16_t reason_code)2461  pe_disconnect_callback(struct mac_context *mac, uint8_t vdev_id,
2462  		       uint8_t *deauth_disassoc_frame,
2463  		       uint16_t deauth_disassoc_frame_len,
2464  		       uint16_t reason_code)
2465  {
2466  	struct pe_session *session;
2467  	uint8_t *extracted_frm = NULL;
2468  	uint16_t extracted_frm_len;
2469  	bool is_pmf_connection;
2470  
2471  	session = pe_find_session_by_vdev_id(mac, vdev_id);
2472  	if (!session) {
2473  		pe_err("LFR3: Vdev %d doesn't exist", vdev_id);
2474  		return QDF_STATUS_E_FAILURE;
2475  	}
2476  
2477  	if (!lim_is_sb_disconnect_allowed(session))
2478  		return QDF_STATUS_SUCCESS;
2479  
2480  	if (!deauth_disassoc_frame ||
2481  	    deauth_disassoc_frame_len <
2482  	    (sizeof(struct wlan_frame_hdr) + sizeof(reason_code))) {
2483  		pe_err_rl("Discard invalid disconnect evt. frame len:%d",
2484  			  deauth_disassoc_frame_len);
2485  		goto end;
2486  	}
2487  
2488  	/*
2489  	 * Use vdev pmf status instead of peer pmf capability as
2490  	 * the firmware might roam to new AP in powersave case and
2491  	 * roam synch can come before emergency deauth event.
2492  	 * In that case, get peer will fail and reason code received
2493  	 * from the WMI_ROAM_EVENTID  will be sent to upper layers.
2494  	 */
2495  	is_pmf_connection = lim_get_vdev_rmf_capable(mac, session);
2496  	if (is_pmf_connection) {
2497  		extracted_frm = lim_process_rmf_disconnect_frame(
2498  						mac, session,
2499  						deauth_disassoc_frame,
2500  						deauth_disassoc_frame_len,
2501  						&extracted_frm_len);
2502  		if (!extracted_frm) {
2503  			pe_err("PMF frame validation failed");
2504  			goto end;
2505  		}
2506  	} else {
2507  		extracted_frm = deauth_disassoc_frame;
2508  		extracted_frm_len = deauth_disassoc_frame_len;
2509  	}
2510  
2511  	lim_extract_ies_from_deauth_disassoc(session, extracted_frm,
2512  					     extracted_frm_len);
2513  
2514  	reason_code = sir_read_u16(extracted_frm +
2515  				   sizeof(struct wlan_frame_hdr));
2516  end:
2517  	lim_tear_down_link_with_ap(mac, session->peSessionId,
2518  				   reason_code,
2519  				   eLIM_PEER_ENTITY_DEAUTH);
2520  
2521  	return QDF_STATUS_SUCCESS;
2522  }
2523  
2524  #ifdef WLAN_FEATURE_FILS_SK
2525  static void
lim_fill_fils_ft(struct pe_session * src_session,struct pe_session * dst_session)2526  lim_fill_fils_ft(struct pe_session *src_session,
2527  		 struct pe_session *dst_session)
2528  {
2529        if (src_session->fils_info &&
2530            src_session->fils_info->fils_ft_len) {
2531                dst_session->fils_info->fils_ft_len =
2532                        src_session->fils_info->fils_ft_len;
2533                qdf_mem_copy(dst_session->fils_info->fils_ft,
2534                             src_session->fils_info->fils_ft,
2535                             src_session->fils_info->fils_ft_len);
2536        }
2537  }
2538  #else
2539  static inline void
lim_fill_fils_ft(struct pe_session * src_session,struct pe_session * dst_session)2540  lim_fill_fils_ft(struct pe_session *src_session,
2541  		 struct pe_session *dst_session)
2542  {}
2543  #endif
2544  
2545  #ifdef WLAN_SUPPORT_TWT
2546  void
lim_fill_roamed_peer_twt_caps(struct mac_context * mac_ctx,uint8_t vdev_id,struct roam_offload_synch_ind * roam_synch)2547  lim_fill_roamed_peer_twt_caps(struct mac_context *mac_ctx,
2548  			      uint8_t vdev_id,
2549  			      struct roam_offload_synch_ind *roam_synch)
2550  {
2551  	uint8_t *reassoc_body;
2552  	uint16_t len;
2553  	uint32_t status;
2554  	tDot11fReAssocResponse *reassoc_rsp;
2555  	struct pe_session *pe_session;
2556  	struct qdf_mac_addr mac_addr;
2557  
2558  	pe_session = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
2559  	if (!pe_session) {
2560  		pe_err("session not found for given vdev_id %d", vdev_id);
2561  		return;
2562  	}
2563  
2564  	reassoc_rsp = qdf_mem_malloc(sizeof(*reassoc_rsp));
2565  	if (!reassoc_rsp)
2566  		return;
2567  
2568  	len = roam_synch->reassoc_resp_length - sizeof(tSirMacMgmtHdr);
2569  	reassoc_body = (uint8_t *)roam_synch + sizeof(tSirMacMgmtHdr) +
2570  			roam_synch->reassoc_resp_offset;
2571  
2572  	status = dot11f_unpack_re_assoc_response(mac_ctx, reassoc_body, len,
2573  						 reassoc_rsp, false);
2574  	if (DOT11F_FAILED(status)) {
2575  		pe_err("Failed to parse a Re-association Rsp (0x%08x, %d bytes):",
2576  		       status, len);
2577  		QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE, QDF_TRACE_LEVEL_INFO,
2578  				   reassoc_body, len);
2579  		qdf_mem_free(reassoc_rsp);
2580  		return;
2581  	} else if (DOT11F_WARNED(status)) {
2582  		pe_debug("Warnings while unpacking a Re-association Rsp (0x%08x, %d bytes):",
2583  			 status, len);
2584  	}
2585  
2586  	if (lim_is_session_he_capable(pe_session)) {
2587  		if (is_multi_link_roam(roam_synch))
2588  			mlo_get_sta_link_mac_addr(vdev_id, roam_synch,
2589  						  &mac_addr);
2590  		else
2591  			qdf_copy_macaddr(&mac_addr, &roam_synch->bssid);
2592  		lim_set_twt_peer_capabilities(mac_ctx,
2593  					      &mac_addr,
2594  					      &reassoc_rsp->he_cap,
2595  					      &reassoc_rsp->he_op);
2596  	}
2597  	qdf_mem_free(reassoc_rsp);
2598  }
2599  #endif
2600  
2601  /**
2602   * lim_check_ft_initial_im_association() - To check FT initial mobility(im)
2603   * association
2604   * @roam_synch: A pointer to roam sync ind structure
2605   * @session_entry: pe session
2606   *
2607   * This function is to check ft_initial_im_association.
2608   *
2609   * Return: None
2610   */
2611  void
lim_check_ft_initial_im_association(struct roam_offload_synch_ind * roam_synch,struct pe_session * session_entry)2612  lim_check_ft_initial_im_association(struct roam_offload_synch_ind *roam_synch,
2613  				    struct pe_session *session_entry)
2614  {
2615  	tpSirMacMgmtHdr hdr;
2616  	uint8_t *assoc_req_ptr;
2617  
2618  	assoc_req_ptr = (uint8_t *) roam_synch + roam_synch->reassoc_req_offset;
2619  	hdr = (tpSirMacMgmtHdr) assoc_req_ptr;
2620  
2621  	if (hdr->fc.type == SIR_MAC_MGMT_FRAME &&
2622  	    hdr->fc.subType == SIR_MAC_MGMT_ASSOC_REQ) {
2623  		roam_synch->is_assoc = true;
2624  		if (session_entry->is11Rconnection) {
2625  			pe_debug("Frame subtype: %d and connection is %d",
2626  				 hdr->fc.subType,
2627  				 session_entry->is11Rconnection);
2628  			roam_synch->is_ft_im_roam = true;
2629  		}
2630  	}
2631  }
2632  
2633  #ifdef WLAN_FEATURE_11BE_MLO
2634  static void
lim_mlo_roam_copy_partner_info_to_session(struct pe_session * session,struct roam_offload_synch_ind * sync_ind)2635  lim_mlo_roam_copy_partner_info_to_session(struct pe_session *session,
2636  					  struct roam_offload_synch_ind *sync_ind)
2637  {
2638  	mlo_roam_copy_partner_info(&session->ml_partner_info,
2639  				   sync_ind, sync_ind->roamed_vdev_id, false);
2640  }
2641  
2642  static QDF_STATUS
lim_gen_link_specific_assoc_rsp(struct mac_context * mac_ctx,struct pe_session * session_entry,uint8_t * reassoc_rsp,uint32_t reassoc_rsp_len)2643  lim_gen_link_specific_assoc_rsp(struct mac_context *mac_ctx,
2644  				struct pe_session *session_entry,
2645  				uint8_t *reassoc_rsp,
2646  				uint32_t reassoc_rsp_len)
2647  {
2648  	struct element_info link_reassoc_rsp;
2649  	struct qdf_mac_addr sta_link_addr;
2650  	struct mlo_partner_info *ml_partner_info;
2651  	QDF_STATUS status = QDF_STATUS_SUCCESS;
2652  	uint8_t idx = 0, num_partner_links, link_id, link_vdev_id;
2653  
2654  	link_reassoc_rsp.ptr = qdf_mem_malloc(reassoc_rsp_len);
2655  	if (!link_reassoc_rsp.ptr)
2656  		return QDF_STATUS_E_NOMEM;
2657  
2658  	qdf_mem_copy(&sta_link_addr, session_entry->self_mac_addr,
2659  		     QDF_MAC_ADDR_SIZE);
2660  
2661  	link_reassoc_rsp.len = reassoc_rsp_len;
2662  
2663  	ml_partner_info = &session_entry->ml_partner_info;
2664  	num_partner_links = ml_partner_info->num_partner_links;
2665  	for (idx = 0; idx < num_partner_links; idx++) {
2666  		link_vdev_id = ml_partner_info->partner_link_info[idx].vdev_id;
2667  		if (link_vdev_id == WLAN_INVALID_VDEV_ID)
2668  			continue;
2669  
2670  		if (link_vdev_id != session_entry->vdev_id)
2671  			continue;
2672  
2673  		link_id = ml_partner_info->partner_link_info[idx].link_id;
2674  		status = util_gen_link_assoc_rsp(
2675  					reassoc_rsp + WLAN_MAC_HDR_LEN_3A,
2676  					reassoc_rsp_len - WLAN_MAC_HDR_LEN_3A,
2677  					true, link_id, sta_link_addr,
2678  					link_reassoc_rsp.ptr, reassoc_rsp_len,
2679  					(qdf_size_t *)&link_reassoc_rsp.len);
2680  		if (QDF_IS_STATUS_ERROR(status)) {
2681  			pe_err("MLO ROAM: link_id:%d vdev:%d Reassoc generation failed %d",
2682  			       link_id, link_vdev_id, status);
2683  			goto end;
2684  		}
2685  
2686  		lim_process_assoc_rsp_frame(mac_ctx, link_reassoc_rsp.ptr,
2687  					    link_reassoc_rsp.len - WLAN_MAC_HDR_LEN_3A,
2688  					    LIM_REASSOC, session_entry);
2689  	}
2690  end:
2691  	qdf_mem_free(link_reassoc_rsp.ptr);
2692  	link_reassoc_rsp.len = 0;
2693  	return status;
2694  }
2695  
2696  #else
2697  static inline void
lim_mlo_roam_copy_partner_info_to_session(struct pe_session * session,struct roam_offload_synch_ind * sync_ind)2698  lim_mlo_roam_copy_partner_info_to_session(struct pe_session *session,
2699  					struct roam_offload_synch_ind *sync_ind)
2700  {}
2701  
2702  static QDF_STATUS
lim_gen_link_specific_assoc_rsp(struct mac_context * mac_ctx,struct pe_session * session_entry,uint8_t * reassoc_rsp,uint32_t reassoc_rsp_len)2703  lim_gen_link_specific_assoc_rsp(struct mac_context *mac_ctx,
2704  				struct pe_session *session_entry,
2705  				uint8_t *reassoc_rsp,
2706  				uint32_t reassoc_rsp_len)
2707  {
2708  	return QDF_STATUS_E_NOSUPPORT;
2709  }
2710  #endif
2711  
2712  #ifdef WLAN_FEATURE_11AX
pe_roam_fill_obss_scan_param(struct pe_session * src_session,struct pe_session * dst_session)2713  static void pe_roam_fill_obss_scan_param(struct pe_session *src_session,
2714  					 struct pe_session *dst_session)
2715  {
2716  	dst_session->obss_color_collision_dec_evt =
2717  				src_session->obss_color_collision_dec_evt;
2718  	dst_session->he_op.bss_color = src_session->he_op.bss_color;
2719  }
2720  #else
pe_roam_fill_obss_scan_param(struct pe_session * src_session,struct pe_session * dst_session)2721  static inline void pe_roam_fill_obss_scan_param(struct pe_session *src_session,
2722  						struct pe_session *dst_session)
2723  {
2724  }
2725  #endif
2726  
2727  #ifdef WLAN_FEATURE_SR
lim_handle_sr_cap(struct wlan_objmgr_vdev * vdev,enum sr_osif_reason_code reason)2728  void lim_handle_sr_cap(struct wlan_objmgr_vdev *vdev,
2729  		       enum sr_osif_reason_code reason)
2730  {
2731  	int32_t non_srg_pd_threshold = 0;
2732  	int32_t srg_pd_threshold = 0;
2733  	uint8_t non_srg_pd_offset = 0;
2734  	uint8_t srg_max_pd_offset = 0;
2735  	uint8_t srg_min_pd_offset = 0;
2736  	uint8_t sr_ctrl, sr_enable_modes;
2737  	bool is_pd_threshold_present = false;
2738  	struct wlan_objmgr_pdev *pdev;
2739  	enum sr_status_of_roamed_ap sr_status;
2740  	enum sr_osif_operation sr_op;
2741  	enum QDF_OPMODE opmode;
2742  	struct mac_context *mac = cds_get_context(QDF_MODULE_ID_PE);
2743  
2744  	if (!mac) {
2745  		pe_err("mac ctx is null");
2746  		return;
2747  	}
2748  	pdev = wlan_vdev_get_pdev(vdev);
2749  	if (!pdev) {
2750  		pe_err("invalid pdev");
2751  		return;
2752  	}
2753  
2754  	opmode = wlan_vdev_mlme_get_opmode(vdev);
2755  	/* If SR is disabled in INI for the session-operating mode
2756  	 * Then return.
2757  	 */
2758  	wlan_mlme_get_sr_enable_modes(mac->psoc, &sr_enable_modes);
2759  	if (!(sr_enable_modes & (1 << opmode))) {
2760  		pe_debug("SR is disabled in INI for mode: %d", opmode);
2761  		return;
2762  	}
2763  	if (!wlan_vdev_mlme_get_he_spr_enabled(vdev)) {
2764  		pe_debug("SR is not enabled");
2765  		return;
2766  	}
2767  	non_srg_pd_offset = wlan_vdev_mlme_get_non_srg_pd_offset(vdev);
2768  	wlan_vdev_mlme_get_srg_pd_offset(vdev, &srg_max_pd_offset,
2769  					 &srg_min_pd_offset);
2770  	wlan_vdev_mlme_get_current_non_srg_pd_threshold(vdev,
2771  							&non_srg_pd_threshold);
2772  	wlan_vdev_mlme_get_current_srg_pd_threshold(vdev,
2773  						    &srg_pd_threshold);
2774  
2775  	sr_ctrl = wlan_vdev_mlme_get_sr_ctrl(vdev);
2776  	if ((sr_ctrl & NON_SRG_PD_SR_DISALLOWED) &&
2777  	    (!(sr_ctrl & SRG_INFO_PRESENT))) {
2778  		sr_status = SR_DISALLOW;
2779  	} else {
2780  		if ((!(sr_ctrl & NON_SRG_PD_SR_DISALLOWED) &&
2781  		     (non_srg_pd_threshold > non_srg_pd_offset +
2782  		      SR_PD_THRESHOLD_MIN)) ||
2783  		     ((sr_ctrl & SRG_INFO_PRESENT) &&
2784  		      ((srg_pd_threshold > srg_max_pd_offset +
2785  		     SR_PD_THRESHOLD_MIN) ||
2786  		      (srg_pd_threshold < srg_min_pd_offset +
2787  		       SR_PD_THRESHOLD_MIN))))
2788  			sr_status = SR_THRESHOLD_NOT_IN_RANGE;
2789  		else
2790  			sr_status = SR_THRESHOLD_IN_RANGE;
2791  	}
2792  	pe_debug("sr status %d reason %d existing thresholds srg: %d non-srg: %d New: sr offset srg: max %d min %d non-srg: %d",
2793  		 sr_status, reason, srg_pd_threshold, non_srg_pd_threshold,
2794  		 srg_max_pd_offset, srg_min_pd_offset, non_srg_pd_offset);
2795  	switch (sr_status) {
2796  	case SR_DISALLOW:
2797  		/** clear thresholds set by previous AP **/
2798  		wlan_vdev_mlme_set_current_non_srg_pd_threshold(vdev, 0);
2799  		wlan_vdev_mlme_set_current_srg_pd_threshold(vdev, 0);
2800  		wlan_spatial_reuse_osif_event(vdev,
2801  					      SR_OPERATION_SUSPEND,
2802  					      reason);
2803  		/*
2804  		 * If SR is disabled due to beacon update,
2805  		 * notify the firmware to disable SR
2806  		 */
2807  		if (reason == SR_REASON_CODE_BCN_IE_CHANGE)
2808  			wlan_sr_setup_req(vdev, pdev, false, 0, 0);
2809  	break;
2810  	case SR_THRESHOLD_NOT_IN_RANGE:
2811  		wlan_vdev_mlme_get_pd_threshold_present(
2812  						vdev, &is_pd_threshold_present);
2813  		/*
2814  		 * if userspace gives pd threshold then check if its within
2815  		 * range of roamed AP's min and max thresholds, if not in
2816  		 * range disable and let userspace decide to re-enable.
2817  		 * if userspace dosesnt give PD threshold then always enable
2818  		 * SRG based on AP's recommendation of thresholds.
2819  		 */
2820  		if (is_pd_threshold_present) {
2821  			wlan_vdev_mlme_set_current_non_srg_pd_threshold(vdev,
2822  									0);
2823  			wlan_vdev_mlme_set_current_srg_pd_threshold(vdev, 0);
2824  			wlan_spatial_reuse_osif_event(vdev,
2825  						      SR_OPERATION_SUSPEND,
2826  						      reason);
2827  		} else {
2828  			sr_op = (reason == SR_REASON_CODE_ROAMING) ?
2829  				SR_OPERATION_RESUME :
2830  				SR_OPERATION_UPDATE_PARAMS;
2831  			wlan_sr_setup_req(
2832  				vdev, pdev, true,
2833  				srg_max_pd_offset + SR_PD_THRESHOLD_MIN,
2834  				non_srg_pd_threshold + SR_PD_THRESHOLD_MIN);
2835  			wlan_spatial_reuse_osif_event(vdev, sr_op, reason);
2836  		}
2837  	break;
2838  	case SR_THRESHOLD_IN_RANGE:
2839  		/* Send enable command to fw, as fw disables SR on roaming */
2840  		wlan_sr_setup_req(vdev, pdev, true, srg_pd_threshold,
2841  				  non_srg_pd_threshold);
2842  	break;
2843  	}
2844  }
2845  #endif
2846  
2847  QDF_STATUS
pe_roam_synch_callback(struct mac_context * mac_ctx,uint8_t vdev_id,struct roam_offload_synch_ind * roam_sync_ind_ptr,uint16_t ie_len,enum sir_roam_op_code reason)2848  pe_roam_synch_callback(struct mac_context *mac_ctx,
2849  		       uint8_t vdev_id,
2850  		       struct roam_offload_synch_ind *roam_sync_ind_ptr,
2851  		       uint16_t ie_len,
2852  		       enum sir_roam_op_code reason)
2853  {
2854  	struct pe_session *session_ptr;
2855  	struct pe_session *ft_session_ptr;
2856  	uint8_t session_id;
2857  	uint8_t *reassoc_resp;
2858  	tpDphHashNode curr_sta_ds = NULL, sta_ds = NULL;
2859  	uint16_t aid;
2860  	struct bss_params *add_bss_params;
2861  	QDF_STATUS status = QDF_STATUS_E_FAILURE;
2862  	struct bss_description *bss_desc = NULL;
2863  	uint16_t ric_tspec_len;
2864  	struct qdf_mac_addr bssid;
2865  	uint8_t *oui_ie_ptr;
2866  	uint16_t oui_ie_len;
2867  
2868  	if (!roam_sync_ind_ptr) {
2869  		pe_err("LFR3:roam_sync_ind_ptr is NULL");
2870  		return status;
2871  	}
2872  	session_ptr = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
2873  	if (!session_ptr) {
2874  		pe_err("LFR3:Unable to find session");
2875  		return status;
2876  	}
2877  
2878  	if (!LIM_IS_STA_ROLE(session_ptr)) {
2879  		pe_err("LFR3:session is not in STA mode");
2880  		return status;
2881  	}
2882  
2883  	if (is_multi_link_roam(roam_sync_ind_ptr))
2884  		mlo_get_sta_link_mac_addr(vdev_id, roam_sync_ind_ptr, &bssid);
2885  	else
2886  		bssid = roam_sync_ind_ptr->bssid;
2887  
2888  	pe_debug("LFR3: PE callback reason: %d", reason);
2889  	switch (reason) {
2890  	case SIR_ROAMING_ABORT:
2891  		/*
2892  		 * If there was a disassoc or deauth that was received
2893  		 * during roaming and it was not honored, then we have
2894  		 * to internally initiate a disconnect because with
2895  		 * ROAM_ABORT we come back to original AP.
2896  		 */
2897  		if (session_ptr->recvd_deauth_while_roaming)
2898  			lim_perform_deauth(mac_ctx, session_ptr,
2899  					   session_ptr->deauth_disassoc_rc,
2900  					   session_ptr->bssId, 0);
2901  		if (session_ptr->recvd_disassoc_while_roaming) {
2902  			lim_disassoc_tdls_peers(mac_ctx, session_ptr,
2903  						session_ptr->bssId);
2904  			lim_perform_disassoc(mac_ctx, 0,
2905  					     session_ptr->deauth_disassoc_rc,
2906  					     session_ptr, session_ptr->bssId);
2907  		}
2908  		return QDF_STATUS_SUCCESS;
2909  	case SIR_ROAM_SYNCH_PROPAGATION:
2910  		break;
2911  	default:
2912  		return status;
2913  	}
2914  
2915  	pe_debug("LFR3:Received ROAM SYNCH IND bssid "QDF_MAC_ADDR_FMT" auth: %d vdevId: %d",
2916  		 QDF_MAC_ADDR_REF(roam_sync_ind_ptr->bssid.bytes),
2917  		 roam_sync_ind_ptr->auth_status,
2918  		 vdev_id);
2919  
2920  	/*
2921  	 * If deauth from AP already in progress, ignore Roam Synch Indication
2922  	 * from firmware.
2923  	 */
2924  	if (session_ptr->limSmeState != eLIM_SME_LINK_EST_STATE) {
2925  		pe_err("LFR3: Not in Link est state");
2926  		return status;
2927  	}
2928  
2929  	bss_desc = qdf_mem_malloc(sizeof(struct bss_description) + ie_len);
2930  	if (!bss_desc) {
2931  		QDF_ASSERT(bss_desc);
2932  		status = -QDF_STATUS_E_NOMEM;
2933  		return status;
2934  	}
2935  
2936  	status = lim_roam_fill_bss_descr(mac_ctx, roam_sync_ind_ptr,
2937  					 bss_desc, session_ptr);
2938  	if (!QDF_IS_STATUS_SUCCESS(status)) {
2939  		pe_err("LFR3:Failed to fill Bss Descr");
2940  		qdf_mem_free(bss_desc);
2941  		return status;
2942  	}
2943  	status = QDF_STATUS_E_FAILURE;
2944  	ft_session_ptr = pe_create_session(mac_ctx, bss_desc->bssId,
2945  					   &session_id,
2946  					   mac_ctx->lim.max_sta_of_pe_session,
2947  					   session_ptr->bssType,
2948  					   session_ptr->vdev_id);
2949  	if (!ft_session_ptr) {
2950  		pe_err("LFR3:Cannot create PE Session bssid: "QDF_MAC_ADDR_FMT,
2951  		       QDF_MAC_ADDR_REF(bss_desc->bssId));
2952  		qdf_mem_free(bss_desc);
2953  		return status;
2954  	}
2955  	/* Update the beacon/probe filter in mac_ctx */
2956  	lim_set_bcn_probe_filter(mac_ctx, ft_session_ptr, 0);
2957  	sir_copy_mac_addr(ft_session_ptr->limReAssocbssId, bss_desc->bssId);
2958  	session_ptr->bRoamSynchInProgress = true;
2959  	ft_session_ptr->bRoamSynchInProgress = true;
2960  	ft_session_ptr->limSystemRole = eLIM_STA_ROLE;
2961  	sir_copy_mac_addr(session_ptr->limReAssocbssId, bss_desc->bssId);
2962  	ft_session_ptr->csaOffloadEnable = session_ptr->csaOffloadEnable;
2963  
2964  	/* Next routine will update nss and vdev_nss with AP's capabilities */
2965  	status = lim_fill_ft_session(mac_ctx, bss_desc, ft_session_ptr,
2966  				     session_ptr, roam_sync_ind_ptr->phy_mode);
2967  	if (QDF_IS_STATUS_ERROR(status)) {
2968  		pe_err("Failed to fill ft session for vdev id %d",
2969  		       ft_session_ptr->vdev_id);
2970  		qdf_mem_free(bss_desc);
2971  		goto roam_sync_fail;
2972  	}
2973  
2974  	roam_sync_ind_ptr->ssid.length =
2975  		qdf_min((qdf_size_t)ft_session_ptr->ssId.length,
2976  			sizeof(roam_sync_ind_ptr->ssid.ssid));
2977  	qdf_mem_copy(roam_sync_ind_ptr->ssid.ssid, ft_session_ptr->ssId.ssId,
2978  		     roam_sync_ind_ptr->ssid.length);
2979  	pe_update_crypto_params(mac_ctx, ft_session_ptr, roam_sync_ind_ptr);
2980  
2981  	/* Reset the SPMK global cache */
2982  	wlan_mlme_set_sae_single_pmk_bss_cap(mac_ctx->psoc, vdev_id, false);
2983  
2984  	/* Next routine may update nss based on dot11Mode */
2985  
2986  	lim_ft_prepare_add_bss_req(mac_ctx, ft_session_ptr, bss_desc);
2987  	lim_set_tpc_power(mac_ctx, ft_session_ptr, bss_desc);
2988  
2989  	if (session_ptr->is11Rconnection)
2990  		lim_fill_fils_ft(session_ptr, ft_session_ptr);
2991  
2992  	roam_sync_ind_ptr->add_bss_params =
2993  		(struct bss_params *) ft_session_ptr->ftPEContext.pAddBssReq;
2994  	add_bss_params = ft_session_ptr->ftPEContext.pAddBssReq;
2995  	lim_delete_tdls_peers(mac_ctx, session_ptr);
2996  	/*
2997  	 * After deleting the TDLS peers notify the Firmware about TDLS STA
2998  	 * disconnection due to roaming
2999  	 */
3000  	wlan_tdls_notify_sta_disconnect(vdev_id, true,
3001  					false, session_ptr->vdev);
3002  
3003  	sta_ds = dph_lookup_hash_entry(mac_ctx, session_ptr->bssId, &aid,
3004  				       &session_ptr->dph.dphHashTable);
3005  	if (!sta_ds && !is_multi_link_roam(roam_sync_ind_ptr)) {
3006  		pe_err("LFR3:failed to lookup hash entry");
3007  		ft_session_ptr->bRoamSynchInProgress = false;
3008  		qdf_mem_free(bss_desc);
3009  		goto roam_sync_fail;
3010  	}
3011  
3012  	/* update OBSS scan param */
3013  	pe_roam_fill_obss_scan_param(session_ptr, ft_session_ptr);
3014  
3015  	curr_sta_ds = dph_add_hash_entry(mac_ctx,
3016  					 bssid.bytes,
3017  					 DPH_STA_HASH_INDEX_PEER,
3018  					 &ft_session_ptr->dph.dphHashTable);
3019  	if (!curr_sta_ds) {
3020  		pe_err("LFR3:failed to add hash entry for "QDF_MAC_ADDR_FMT,
3021  		       QDF_MAC_ADDR_REF(add_bss_params->staContext.staMac));
3022  		ft_session_ptr->bRoamSynchInProgress = false;
3023  		qdf_mem_free(bss_desc);
3024  		goto roam_sync_fail;
3025  	}
3026  
3027  	if (roam_sync_ind_ptr->auth_status == ROAM_AUTH_STATUS_AUTHENTICATED)
3028  		curr_sta_ds->is_key_installed = true;
3029  
3030  	lim_mlo_roam_copy_partner_info_to_session(ft_session_ptr,
3031  						  roam_sync_ind_ptr);
3032  
3033  	reassoc_resp = (uint8_t *)roam_sync_ind_ptr +
3034  			roam_sync_ind_ptr->reassoc_resp_offset;
3035  	mgmt_txrx_frame_hex_dump(reassoc_resp,
3036  				 roam_sync_ind_ptr->reassoc_resp_length, false);
3037  	if (wlan_vdev_mlme_get_is_mlo_link(mac_ctx->psoc, vdev_id)) {
3038  		status = lim_gen_link_specific_assoc_rsp(mac_ctx,
3039  						ft_session_ptr,
3040  						reassoc_resp,
3041  						roam_sync_ind_ptr->reassoc_resp_length);
3042  		if (ft_session_ptr->is_unexpected_peer_error)
3043  			status = QDF_STATUS_E_FAILURE;
3044  
3045  		if (QDF_IS_STATUS_ERROR(status)) {
3046  			qdf_mem_free(bss_desc);
3047  			goto roam_sync_fail;
3048  		}
3049  	} else {
3050  		lim_process_assoc_rsp_frame(mac_ctx, reassoc_resp,
3051  					    roam_sync_ind_ptr->reassoc_resp_length - SIR_MAC_HDR_LEN_3A,
3052  					    LIM_REASSOC, ft_session_ptr);
3053  		if (ft_session_ptr->is_unexpected_peer_error) {
3054  			status = QDF_STATUS_E_FAILURE;
3055  			qdf_mem_free(bss_desc);
3056  			goto roam_sync_fail;
3057  		}
3058  	}
3059  
3060  	oui_ie_ptr = (uint8_t *)&bss_desc->ieFields[0];
3061  	oui_ie_len = wlan_get_ielen_from_bss_description(bss_desc);
3062  	lim_enable_cts_to_self_for_exempted_iot_ap(mac_ctx,
3063  						   ft_session_ptr,
3064  						   oui_ie_ptr, oui_ie_len);
3065  	qdf_mem_free(bss_desc);
3066  	oui_ie_len = 0;
3067  	oui_ie_ptr = NULL;
3068  
3069  	lim_check_ft_initial_im_association(roam_sync_ind_ptr, ft_session_ptr);
3070  
3071  	lim_copy_and_free_hlp_data_from_session(ft_session_ptr,
3072  						roam_sync_ind_ptr);
3073  	roam_sync_ind_ptr->aid = ft_session_ptr->limAID;
3074  	curr_sta_ds->mlmStaContext.mlmState = eLIM_MLM_LINK_ESTABLISHED_STATE;
3075  	curr_sta_ds->nss = ft_session_ptr->nss;
3076  	roam_sync_ind_ptr->nss = ft_session_ptr->nss;
3077  	ft_session_ptr->limMlmState = eLIM_MLM_LINK_ESTABLISHED_STATE;
3078  	ft_session_ptr->limPrevMlmState = ft_session_ptr->limMlmState;
3079  	lim_init_tdls_data(mac_ctx, ft_session_ptr);
3080  	ric_tspec_len = ft_session_ptr->RICDataLen;
3081  	pe_debug("LFR3: Session RicLength: %d", ft_session_ptr->RICDataLen);
3082  	lim_handle_sr_cap(ft_session_ptr->vdev, SR_REASON_CODE_ROAMING);
3083  #ifdef FEATURE_WLAN_ESE
3084  	ric_tspec_len += ft_session_ptr->tspecLen;
3085  	pe_debug("LFR3: tspecLen: %d", ft_session_ptr->tspecLen);
3086  #endif
3087  	if (ric_tspec_len) {
3088  		roam_sync_ind_ptr->ric_tspec_data =
3089  				qdf_mem_malloc(ric_tspec_len);
3090  		if (!roam_sync_ind_ptr->ric_tspec_data) {
3091  			ft_session_ptr->bRoamSynchInProgress = false;
3092  			status = QDF_STATUS_E_NOMEM;
3093  			goto roam_sync_fail;
3094  		}
3095  
3096  		if (ft_session_ptr->ricData) {
3097  			roam_sync_ind_ptr->ric_data_len =
3098  					ft_session_ptr->RICDataLen;
3099  			qdf_mem_copy(roam_sync_ind_ptr->ric_tspec_data,
3100  				     ft_session_ptr->ricData,
3101  				     roam_sync_ind_ptr->ric_data_len);
3102  			qdf_mem_free(ft_session_ptr->ricData);
3103  			ft_session_ptr->ricData = NULL;
3104  			ft_session_ptr->RICDataLen = 0;
3105  		}
3106  #ifdef FEATURE_WLAN_ESE
3107  		if (ft_session_ptr->tspecIes) {
3108  			roam_sync_ind_ptr->tspec_len = ft_session_ptr->tspecLen;
3109  			qdf_mem_copy(roam_sync_ind_ptr->ric_tspec_data +
3110  				     roam_sync_ind_ptr->ric_data_len,
3111  				     ft_session_ptr->tspecIes,
3112  				     roam_sync_ind_ptr->tspec_len);
3113  			qdf_mem_free(ft_session_ptr->tspecIes);
3114  			ft_session_ptr->tspecIes = NULL;
3115  			ft_session_ptr->tspecLen = 0;
3116  		}
3117  #endif
3118  	}
3119  	roam_sync_ind_ptr->chan_width = ft_session_ptr->ch_width;
3120  	roam_sync_ind_ptr->max_rate_flags =
3121  			lim_get_max_rate_flags(mac_ctx, curr_sta_ds);
3122  	ft_session_ptr->limSmeState = eLIM_SME_LINK_EST_STATE;
3123  	ft_session_ptr->limPrevSmeState = ft_session_ptr->limSmeState;
3124  	ft_session_ptr->bRoamSynchInProgress = false;
3125  
3126  	/* Cleanup the old session */
3127  	session_ptr->limSmeState = eLIM_SME_IDLE_STATE;
3128  
3129  	/*
3130  	 * Delete the ml_peer only if DUT is roamed to a non-11BE candidate.
3131  	 * ml_peer is already cleaned up in wma_delete_all_peers() at the
3132  	 * beginning of roam_sync handling for 11BE candidates.
3133  	 */
3134  	if (sta_ds) {
3135  		if (!wlan_vdev_mlme_is_mlo_vdev(session_ptr->vdev)) {
3136  			lim_mlo_notify_peer_disconn(session_ptr, sta_ds);
3137  			lim_mlo_roam_delete_link_peer(session_ptr, sta_ds);
3138  		}
3139  		lim_cleanup_rx_path(mac_ctx, sta_ds, session_ptr, false);
3140  		lim_delete_dph_hash_entry(mac_ctx, sta_ds->staAddr, aid,
3141  					  session_ptr);
3142  	}
3143  
3144  	pe_delete_session(mac_ctx, session_ptr);
3145  
3146  	return QDF_STATUS_SUCCESS;
3147  
3148  roam_sync_fail:
3149  	pe_err("Roam sync failure status %d session vdev %d", status,
3150  	       session_ptr->vdev_id);
3151  	/*
3152  	 * Cleanup the new session upon roam sync failure.
3153  	 * Retain the old session for graceful HO failure handling.
3154  	 */
3155  	if (curr_sta_ds) {
3156  		lim_cleanup_rx_path(mac_ctx, curr_sta_ds, ft_session_ptr,
3157  				    false);
3158  		lim_delete_dph_hash_entry(mac_ctx, curr_sta_ds->staAddr,
3159  					  curr_sta_ds->assocId, ft_session_ptr);
3160  	}
3161  	pe_delete_session(mac_ctx, ft_session_ptr);
3162  	return status;
3163  }
3164  
3165  QDF_STATUS
pe_set_ie_for_roam_invoke(struct mac_context * mac_ctx,uint8_t vdev_id,uint16_t dot11_mode,enum QDF_OPMODE opmode)3166  pe_set_ie_for_roam_invoke(struct mac_context *mac_ctx, uint8_t vdev_id,
3167  			  uint16_t dot11_mode, enum QDF_OPMODE opmode)
3168  {
3169  	QDF_STATUS status;
3170  
3171  	if (!mac_ctx)
3172  		return QDF_STATUS_E_FAILURE;
3173  
3174  	status = lim_send_ies_per_band(mac_ctx, vdev_id, dot11_mode, opmode);
3175  	return status;
3176  }
3177  
3178  #endif
3179  
lim_is_beacon_miss_scenario(struct mac_context * mac,uint8_t * pRxPacketInfo)3180  static bool lim_is_beacon_miss_scenario(struct mac_context *mac,
3181  					uint8_t *pRxPacketInfo)
3182  {
3183  	tpSirMacMgmtHdr pHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
3184  	uint8_t sessionId;
3185  	struct pe_session *pe_session =
3186  		pe_find_session_by_bssid(mac, pHdr->bssId, &sessionId);
3187  
3188  	if (pe_session && pe_session->pmmOffloadInfo.bcnmiss)
3189  		return true;
3190  	return false;
3191  }
3192  
3193  /** -----------------------------------------------------------------
3194     \brief lim_is_pkt_candidate_for_drop() - decides whether to drop the frame or not
3195  
3196     This function is called before enqueuing the frame to PE queue for further processing.
3197     This prevents unnecessary frames getting into PE Queue and drops them right away.
3198     Frames will be dropped in the following scenarios:
3199  
3200     - In Scan State, drop the frames which are not marked as scan frames
3201     - In non-Scan state, drop the frames which are marked as scan frames.
3202  
3203     \param mac - global mac structure
3204     \return - none
3205     \sa
3206     ----------------------------------------------------------------- */
3207  
lim_is_pkt_candidate_for_drop(struct mac_context * mac,uint8_t * pRxPacketInfo,uint32_t subType)3208  tMgmtFrmDropReason lim_is_pkt_candidate_for_drop(struct mac_context *mac,
3209  						 uint8_t *pRxPacketInfo,
3210  						 uint32_t subType)
3211  {
3212  	uint32_t framelen;
3213  	uint8_t *pBody;
3214  	tSirMacCapabilityInfo capabilityInfo;
3215  	tpSirMacMgmtHdr pHdr = NULL;
3216  	struct wlan_objmgr_vdev *vdev;
3217  
3218  	/*
3219  	 *
3220  	 * In scan mode, drop only Beacon/Probe Response which are NOT marked as scan-frames.
3221  	 * In non-scan mode, drop only Beacon/Probe Response which are marked as scan frames.
3222  	 * Allow other mgmt frames, they must be from our own AP, as we don't allow
3223  	 * other than beacons or probe responses in scan state.
3224  	 */
3225  	if ((subType == SIR_MAC_MGMT_BEACON) ||
3226  	    (subType == SIR_MAC_MGMT_PROBE_RSP)) {
3227  		if (lim_is_beacon_miss_scenario(mac, pRxPacketInfo)) {
3228  			MTRACE(mac_trace(mac, TRACE_CODE_INFO_LOG, 0,
3229  					 eLOG_NODROP_MISSED_BEACON_SCENARIO));
3230  			return eMGMT_DROP_NO_DROP;
3231  		}
3232  
3233  		framelen = WMA_GET_RX_PAYLOAD_LEN(pRxPacketInfo);
3234  		pBody = WMA_GET_RX_MPDU_DATA(pRxPacketInfo);
3235  		/* drop the frame if length is less than 12 */
3236  		if (framelen < LIM_MIN_BCN_PR_LENGTH)
3237  			return eMGMT_DROP_INVALID_SIZE;
3238  
3239  		*((uint16_t *) &capabilityInfo) =
3240  			sir_read_u16(pBody + LIM_BCN_PR_CAPABILITY_OFFSET);
3241  
3242  		/* Note sure if this is sufficient, basically this condition allows all probe responses and
3243  		 *   beacons from an infrastructure network
3244  		 */
3245  		if (!capabilityInfo.ibss)
3246  			return eMGMT_DROP_NO_DROP;
3247  
3248  		/* Drop INFRA Beacons and Probe Responses in IBSS Mode */
3249  		/* This can be enhanced to even check the SSID before deciding to enqueue the frame. */
3250  		if (capabilityInfo.ess)
3251  			return eMGMT_DROP_INFRA_BCN_IN_IBSS;
3252  
3253  	} else if (subType == SIR_MAC_MGMT_AUTH) {
3254  		uint16_t curr_seq_num = 0;
3255  		struct tLimPreAuthNode *auth_node;
3256  
3257  		pHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
3258  		vdev = wlan_objmgr_get_vdev_by_macaddr_from_pdev(mac->pdev,
3259  								 pHdr->da,
3260  								 WLAN_LEGACY_MAC_ID);
3261  		if (!vdev)
3262  			return eMGMT_DROP_NO_DROP;
3263  		wlan_objmgr_vdev_release_ref(vdev, WLAN_LEGACY_MAC_ID);
3264  
3265  		curr_seq_num = ((pHdr->seqControl.seqNumHi << 4) |
3266  				(pHdr->seqControl.seqNumLo));
3267  		auth_node = lim_search_pre_auth_list(mac, pHdr->sa);
3268  		if (auth_node && pHdr->fc.retry &&
3269  		    (auth_node->seq_num == curr_seq_num)) {
3270  			pe_err_rl("auth frame, seq num: %d is already processed, drop it",
3271  				  curr_seq_num);
3272  			return eMGMT_DROP_DUPLICATE_AUTH_FRAME;
3273  		}
3274  	} else if ((subType == SIR_MAC_MGMT_ASSOC_REQ) ||
3275  		   (subType == SIR_MAC_MGMT_DISASSOC) ||
3276  		   (subType == SIR_MAC_MGMT_DEAUTH)) {
3277  		struct peer_mlme_priv_obj *peer_priv;
3278  		struct wlan_objmgr_peer *peer;
3279  		qdf_time_t *timestamp;
3280  
3281  		pHdr = WMA_GET_RX_MAC_HEADER(pRxPacketInfo);
3282  		vdev = wlan_objmgr_get_vdev_by_macaddr_from_pdev(mac->pdev,
3283  								 pHdr->da,
3284  								 WLAN_LEGACY_MAC_ID);
3285  		if (!vdev)
3286  			return eMGMT_DROP_SPURIOUS_FRAME;
3287  
3288  		if (wlan_vdev_mlme_get_opmode(vdev) == QDF_STA_MODE &&
3289  		    wlan_cm_is_vdev_roam_started(vdev) &&
3290  		    (subType == SIR_MAC_MGMT_DISASSOC ||
3291  		     subType == SIR_MAC_MGMT_DEAUTH)) {
3292  			wlan_objmgr_vdev_release_ref(vdev, WLAN_LEGACY_MAC_ID);
3293  			return eMGMT_DROP_DEAUTH_DURING_ROAM_STARTED;
3294  		}
3295  		wlan_objmgr_vdev_release_ref(vdev, WLAN_LEGACY_MAC_ID);
3296  
3297  		peer = wlan_objmgr_get_peer_by_mac(mac->psoc,
3298  						   pHdr->sa,
3299  						   WLAN_LEGACY_MAC_ID);
3300  		if (!peer) {
3301  			if (subType == SIR_MAC_MGMT_ASSOC_REQ)
3302  				return eMGMT_DROP_NO_DROP;
3303  			return eMGMT_DROP_SPURIOUS_FRAME;
3304  		}
3305  
3306  		peer_priv = wlan_objmgr_peer_get_comp_private_obj(peer,
3307  							WLAN_UMAC_COMP_MLME);
3308  		if (!peer_priv) {
3309  			wlan_objmgr_peer_release_ref(peer, WLAN_LEGACY_MAC_ID);
3310  			if (subType == SIR_MAC_MGMT_ASSOC_REQ)
3311  				return eMGMT_DROP_NO_DROP;
3312  			return eMGMT_DROP_SPURIOUS_FRAME;
3313  		}
3314  
3315  		if (subType == SIR_MAC_MGMT_ASSOC_REQ)
3316  			timestamp =
3317  			   &peer_priv->last_assoc_received_time;
3318  		else
3319  			timestamp =
3320  			   &peer_priv->last_disassoc_deauth_received_time;
3321  
3322  		if (*timestamp > 0 &&
3323  		    qdf_system_time_before(qdf_get_system_timestamp(),
3324  					   *timestamp +
3325  					   LIM_DOS_PROTECTION_TIME)) {
3326  			pe_debug_rl(FL("Dropping subtype 0x%x frame. %s %d ms %s %d ms"),
3327  				    subType, "It is received after",
3328  				    (int)(qdf_get_system_timestamp() - *timestamp),
3329  				    "of last frame. Allow it only after",
3330  				    LIM_DOS_PROTECTION_TIME);
3331  			wlan_objmgr_peer_release_ref(peer, WLAN_LEGACY_MAC_ID);
3332  			return eMGMT_DROP_EXCESSIVE_MGMT_FRAME;
3333  		}
3334  
3335  		*timestamp = qdf_get_system_timestamp();
3336  		wlan_objmgr_peer_release_ref(peer, WLAN_LEGACY_MAC_ID);
3337  
3338  	}
3339  
3340  	return eMGMT_DROP_NO_DROP;
3341  }
3342  
lim_update_lost_link_info(struct mac_context * mac,struct pe_session * session,int32_t rssi)3343  void lim_update_lost_link_info(struct mac_context *mac, struct pe_session *session,
3344  				int32_t rssi)
3345  {
3346  	struct sir_lost_link_info *lost_link_info;
3347  	struct scheduler_msg mmh_msg = {0};
3348  
3349  	if ((!mac) || (!session)) {
3350  		pe_err("parameter NULL");
3351  		return;
3352  	}
3353  	if (!LIM_IS_STA_ROLE(session))
3354  		return;
3355  
3356  	lost_link_info = qdf_mem_malloc(sizeof(*lost_link_info));
3357  	if (!lost_link_info)
3358  		return;
3359  
3360  	lost_link_info->vdev_id = session->smeSessionId;
3361  	lost_link_info->rssi = rssi;
3362  	mmh_msg.type = eWNI_SME_LOST_LINK_INFO_IND;
3363  	mmh_msg.bodyptr = lost_link_info;
3364  	mmh_msg.bodyval = 0;
3365  	pe_debug("post eWNI_SME_LOST_LINK_INFO_IND, bss_idx: %d rssi: %d",
3366  		lost_link_info->vdev_id, lost_link_info->rssi);
3367  
3368  	lim_sys_process_mmh_msg_api(mac, &mmh_msg);
3369  }
3370  
3371  /**
3372   * lim_mon_init_session() - create PE session for monitor mode operation
3373   * @mac_ptr: mac pointer
3374   * @msg: Pointer to struct sir_create_session type.
3375   *
3376   * Return: NONE
3377   */
lim_mon_init_session(struct mac_context * mac_ptr,struct sir_create_session * msg)3378  void lim_mon_init_session(struct mac_context *mac_ptr,
3379  			  struct sir_create_session *msg)
3380  {
3381  	struct pe_session *psession_entry;
3382  	uint8_t session_id;
3383  
3384  	psession_entry = pe_create_session(mac_ptr, msg->bss_id.bytes,
3385  					   &session_id,
3386  					   mac_ptr->lim.max_sta_of_pe_session,
3387  					   eSIR_MONITOR_MODE,
3388  					   msg->vdev_id);
3389  	if (!psession_entry) {
3390  		pe_err("Monitor mode: Session Can not be created bssid: "
3391  			QDF_MAC_ADDR_FMT, QDF_MAC_ADDR_REF(msg->bss_id.bytes));
3392  		return;
3393  	}
3394  	psession_entry->vhtCapability = 1;
3395  }
3396  
lim_mon_deinit_session(struct mac_context * mac_ptr,struct sir_delete_session * msg)3397  void lim_mon_deinit_session(struct mac_context *mac_ptr,
3398  			    struct sir_delete_session *msg)
3399  {
3400  	struct pe_session *session;
3401  
3402  	session = pe_find_session_by_vdev_id(mac_ptr, msg->vdev_id);
3403  
3404  	if (session && session->bssType == eSIR_MONITOR_MODE)
3405  		pe_delete_session(mac_ptr, session);
3406  }
3407  
3408  /**
3409   * lim_update_ext_cap_ie() - Update Extended capabilities IE(if present)
3410   *          with capabilities of Fine Time measurements(FTM) if set in driver
3411   *
3412   * @mac_ctx: Pointer to Global MAC structure
3413   * @ie_data: Default Scan IE data
3414   * @local_ie_buf: Local Scan IE data
3415   * @local_ie_len: Pointer to length of @ie_data
3416   * @session: Pointer to pe session
3417   *
3418   * Return: QDF_STATUS
3419   */
lim_update_ext_cap_ie(struct mac_context * mac_ctx,uint8_t * ie_data,uint8_t * local_ie_buf,uint16_t * local_ie_len,struct pe_session * session)3420  QDF_STATUS lim_update_ext_cap_ie(struct mac_context *mac_ctx, uint8_t *ie_data,
3421  				 uint8_t *local_ie_buf, uint16_t *local_ie_len,
3422  				 struct pe_session *session)
3423  {
3424  	uint32_t dot11mode;
3425  	bool vht_enabled = false;
3426  	tDot11fIEExtCap default_scan_ext_cap = {0}, driver_ext_cap = {0};
3427  	QDF_STATUS status;
3428  
3429  	status = lim_strip_extcap_update_struct(mac_ctx, ie_data,
3430  				   local_ie_len, &default_scan_ext_cap);
3431  	if (QDF_STATUS_SUCCESS != status) {
3432  		pe_err("Strip ext cap fails %d", status);
3433  		return QDF_STATUS_E_FAILURE;
3434  	}
3435  
3436  	if ((*local_ie_len) > (MAX_DEFAULT_SCAN_IE_LEN - EXT_CAP_IE_HDR_LEN)) {
3437  		pe_err("Invalid Scan IE length");
3438  		return QDF_STATUS_E_FAILURE;
3439  	}
3440  	/* copy ie prior to ext cap to local buffer */
3441  	qdf_mem_copy(local_ie_buf, ie_data, (*local_ie_len));
3442  
3443  	/* from here ext cap ie starts, set EID */
3444  	local_ie_buf[*local_ie_len] = DOT11F_EID_EXTCAP;
3445  
3446  	dot11mode = mac_ctx->mlme_cfg->dot11_mode.dot11_mode;
3447  	if (IS_DOT11_MODE_VHT(dot11mode))
3448  		vht_enabled = true;
3449  
3450  	status = populate_dot11f_ext_cap(mac_ctx, vht_enabled,
3451  					&driver_ext_cap, NULL);
3452  	if (QDF_STATUS_SUCCESS != status) {
3453  		pe_err("Failed %d to create ext cap IE. Use default value instead",
3454  				status);
3455  		local_ie_buf[*local_ie_len + 1] = DOT11F_IE_EXTCAP_MAX_LEN;
3456  
3457  		if ((*local_ie_len) > (MAX_DEFAULT_SCAN_IE_LEN -
3458  		    (DOT11F_IE_EXTCAP_MAX_LEN + EXT_CAP_IE_HDR_LEN))) {
3459  			pe_err("Invalid Scan IE length");
3460  			return QDF_STATUS_E_FAILURE;
3461  		}
3462  		(*local_ie_len) += EXT_CAP_IE_HDR_LEN;
3463  		qdf_mem_copy(local_ie_buf + (*local_ie_len),
3464  				default_scan_ext_cap.bytes,
3465  				DOT11F_IE_EXTCAP_MAX_LEN);
3466  		(*local_ie_len) += DOT11F_IE_EXTCAP_MAX_LEN;
3467  		return QDF_STATUS_SUCCESS;
3468  	}
3469  	lim_merge_extcap_struct(&driver_ext_cap, &default_scan_ext_cap, true);
3470  
3471  	if (session)
3472  		populate_dot11f_twt_extended_caps(mac_ctx, session,
3473  						  &driver_ext_cap);
3474  	else
3475  		pe_debug("Session NULL, cannot set TWT caps");
3476  
3477  	local_ie_buf[*local_ie_len + 1] = driver_ext_cap.num_bytes;
3478  
3479  	if ((*local_ie_len) > (MAX_DEFAULT_SCAN_IE_LEN -
3480  	    (EXT_CAP_IE_HDR_LEN + driver_ext_cap.num_bytes))) {
3481  		pe_err("Invalid Scan IE length");
3482  		return QDF_STATUS_E_FAILURE;
3483  	}
3484  	(*local_ie_len) += EXT_CAP_IE_HDR_LEN;
3485  	qdf_mem_copy(local_ie_buf + (*local_ie_len),
3486  			driver_ext_cap.bytes, driver_ext_cap.num_bytes);
3487  	(*local_ie_len) += driver_ext_cap.num_bytes;
3488  	return QDF_STATUS_SUCCESS;
3489  }
3490  
3491  #define LIM_RSN_OUI_SIZE 4
3492  
3493  struct rsn_oui_akm_type_map {
3494  	enum ani_akm_type akm_type;
3495  	uint8_t rsn_oui[LIM_RSN_OUI_SIZE];
3496  };
3497  
3498  static const struct rsn_oui_akm_type_map rsn_oui_akm_type_mapping_table[] = {
3499  	{ANI_AKM_TYPE_RSN,                  {0x00, 0x0F, 0xAC, 0x01} },
3500  	{ANI_AKM_TYPE_RSN_PSK,              {0x00, 0x0F, 0xAC, 0x02} },
3501  	{ANI_AKM_TYPE_FT_RSN,               {0x00, 0x0F, 0xAC, 0x03} },
3502  	{ANI_AKM_TYPE_FT_RSN_PSK,           {0x00, 0x0F, 0xAC, 0x04} },
3503  	{ANI_AKM_TYPE_RSN_8021X_SHA256,     {0x00, 0x0F, 0xAC, 0x05} },
3504  	{ANI_AKM_TYPE_RSN_PSK_SHA256,       {0x00, 0x0F, 0xAC, 0x06} },
3505  #ifdef WLAN_FEATURE_SAE
3506  	{ANI_AKM_TYPE_SAE,                  {0x00, 0x0F, 0xAC, 0x08} },
3507  	{ANI_AKM_TYPE_FT_SAE,               {0x00, 0x0F, 0xAC, 0x09} },
3508  #endif
3509  	{ANI_AKM_TYPE_SUITEB_EAP_SHA256,    {0x00, 0x0F, 0xAC, 0x0B} },
3510  	{ANI_AKM_TYPE_SUITEB_EAP_SHA384,    {0x00, 0x0F, 0xAC, 0x0C} },
3511  	{ANI_AKM_TYPE_FT_SUITEB_EAP_SHA384, {0x00, 0x0F, 0xAC, 0x0D} },
3512  	{ANI_AKM_TYPE_FILS_SHA256,          {0x00, 0x0F, 0xAC, 0x0E} },
3513  	{ANI_AKM_TYPE_FILS_SHA384,          {0x00, 0x0F, 0xAC, 0x0F} },
3514  	{ANI_AKM_TYPE_FT_FILS_SHA256,       {0x00, 0x0F, 0xAC, 0x10} },
3515  	{ANI_AKM_TYPE_FT_FILS_SHA384,       {0x00, 0x0F, 0xAC, 0x11} },
3516  	{ANI_AKM_TYPE_OWE,                  {0x00, 0x0F, 0xAC, 0x12} },
3517  #ifdef FEATURE_WLAN_ESE
3518  	{ANI_AKM_TYPE_CCKM,                 {0x00, 0x40, 0x96, 0x00} },
3519  #endif
3520  	{ANI_AKM_TYPE_OSEN,                 {0x50, 0x6F, 0x9A, 0x01} },
3521  	{ANI_AKM_TYPE_DPP_RSN,              {0x50, 0x6F, 0x9A, 0x02} },
3522  	{ANI_AKM_TYPE_WPA,                  {0x00, 0x50, 0xF2, 0x01} },
3523  	{ANI_AKM_TYPE_WPA_PSK,              {0x00, 0x50, 0xF2, 0x02} },
3524  	{ANI_AKM_TYPE_SAE_EXT_KEY,          {0x00, 0x0F, 0xAC, 0x18} },
3525  	{ANI_AKM_TYPE_FT_SAE_EXT_KEY,       {0x00, 0x0F, 0xAC, 0x19} },
3526  	/* Add akm type above here */
3527  	{ANI_AKM_TYPE_UNKNOWN, {0} },
3528  };
3529  
lim_translate_rsn_oui_to_akm_type(uint8_t auth_suite[4])3530  enum ani_akm_type lim_translate_rsn_oui_to_akm_type(uint8_t auth_suite[4])
3531  {
3532  	const struct rsn_oui_akm_type_map *map;
3533  	enum ani_akm_type akm_type;
3534  
3535  	map = rsn_oui_akm_type_mapping_table;
3536  	while (true) {
3537  		akm_type = map->akm_type;
3538  		if ((akm_type == ANI_AKM_TYPE_UNKNOWN) ||
3539  		    (qdf_mem_cmp(auth_suite, map->rsn_oui, 4) == 0))
3540  			break;
3541  		map++;
3542  	}
3543  
3544  	pe_debug("akm_type: %d", akm_type);
3545  
3546  	return akm_type;
3547  }
3548  
3549  #if defined(WLAN_FEATURE_ROAM_OFFLOAD) && defined(WLAN_FEATURE_11BE_MLO)
3550  QDF_STATUS
lim_cm_fill_link_session(struct mac_context * mac_ctx,uint8_t vdev_id,struct pe_session * pe_session,struct roam_offload_synch_ind * sync_ind,uint16_t ie_len)3551  lim_cm_fill_link_session(struct mac_context *mac_ctx,
3552  			 uint8_t vdev_id,
3553  			 struct pe_session *pe_session,
3554  			 struct roam_offload_synch_ind *sync_ind,
3555  			 uint16_t ie_len)
3556  {
3557  	struct wlan_objmgr_vdev *vdev;
3558  	struct wlan_objmgr_vdev *assoc_vdev;
3559  	QDF_STATUS status = QDF_STATUS_SUCCESS;
3560  	struct bss_description *bss_desc = NULL;
3561  	uint32_t bss_len;
3562  	struct join_req *pe_join_req;
3563  
3564  	vdev = wlan_objmgr_get_vdev_by_id_from_psoc(mac_ctx->psoc,
3565  						    vdev_id,
3566  						    WLAN_LEGACY_MAC_ID);
3567  	if (!vdev) {
3568  		pe_err("Vdev is NULL");
3569  		return QDF_STATUS_E_NULL_VALUE;
3570  	}
3571  
3572  	bss_len = (uint16_t)(offsetof(struct bss_description,
3573  			   ieFields[0]) + ie_len);
3574  
3575  	assoc_vdev = wlan_mlo_get_assoc_link_vdev(vdev);
3576  
3577  	if (!assoc_vdev) {
3578  		pe_err("Assoc vdev is NULL");
3579  		status = QDF_STATUS_E_FAILURE;
3580  		goto end;
3581  	}
3582  
3583  	status = wlan_vdev_mlme_get_ssid(assoc_vdev,
3584  					 pe_session->ssId.ssId,
3585  					 &pe_session->ssId.length);
3586  
3587  	if (QDF_IS_STATUS_ERROR(status)) {
3588  		pe_err("Failed to get ssid vdev id %d",
3589  		       vdev_id);
3590  		status = QDF_STATUS_E_FAILURE;
3591  		goto end;
3592  	}
3593  
3594  	pe_session->lim_join_req =
3595  		qdf_mem_malloc(sizeof(*pe_session->lim_join_req) + bss_len);
3596  	if (!pe_session->lim_join_req) {
3597  		status = QDF_STATUS_E_NOMEM;
3598  		goto end;
3599  	}
3600  
3601  	pe_join_req = pe_session->lim_join_req;
3602  
3603  	mlo_roam_copy_partner_info(&pe_join_req->partner_info,
3604  				   sync_ind, vdev_id, false);
3605  
3606  	bss_desc = &pe_session->lim_join_req->bssDescription;
3607  
3608  	status = lim_roam_fill_bss_descr(mac_ctx, sync_ind, bss_desc,
3609  					 pe_session);
3610  	if (!QDF_IS_STATUS_SUCCESS(status)) {
3611  		pe_err("LFR3:Failed to fill Bss Descr");
3612  		goto end;
3613  	}
3614  
3615  	status = lim_fill_pe_session(mac_ctx, pe_session, bss_desc);
3616  	if (QDF_IS_STATUS_ERROR(status)) {
3617  		pe_err("Failed to fill pe session vdev id %d",
3618  		       pe_session->vdev_id);
3619  		goto end;
3620  	}
3621  
3622  	if (pe_session->limSmeState == eLIM_SME_WT_JOIN_STATE) {
3623  		pe_session->limSmeState = eLIM_SME_LINK_EST_STATE;
3624  		pe_session->limMlmState = eLIM_MLM_WT_REASSOC_RSP_STATE;
3625  	}
3626  end:
3627  	if (QDF_IS_STATUS_ERROR(status)) {
3628  		qdf_mem_free(pe_session->lim_join_req);
3629  		pe_session->lim_join_req = NULL;
3630  	}
3631  	wlan_objmgr_vdev_release_ref(vdev, WLAN_LEGACY_MAC_ID);
3632  
3633  	return status;
3634  }
3635  
3636  struct pe_session *
lim_cm_roam_create_session(struct mac_context * mac_ctx,uint8_t vdev_id,struct roam_offload_synch_ind * sync_ind)3637  lim_cm_roam_create_session(struct mac_context *mac_ctx,
3638  			   uint8_t vdev_id,
3639  			   struct roam_offload_synch_ind *sync_ind)
3640  {
3641  	struct pe_session *pe_session = NULL;
3642  	struct qdf_mac_addr link_mac_addr;
3643  	bool is_link_vdev = false;
3644  	QDF_STATUS status = QDF_STATUS_E_FAILURE;
3645  	uint8_t session_id;
3646  
3647  	is_link_vdev = wlan_vdev_mlme_get_is_mlo_link(mac_ctx->psoc, vdev_id);
3648  	status = mlo_get_sta_link_mac_addr(vdev_id, sync_ind,
3649  					   &link_mac_addr);
3650  
3651  	if (QDF_IS_STATUS_ERROR(status))
3652  		return NULL;
3653  
3654  	/* In case of legacy to mlo roaming, create pe session */
3655  	if (!pe_session && is_link_vdev) {
3656  		pe_session = pe_create_session(mac_ctx, &link_mac_addr.bytes[0],
3657  					       &session_id,
3658  					       mac_ctx->lim.max_sta_of_pe_session,
3659  					       eSIR_INFRASTRUCTURE_MODE,
3660  					       vdev_id);
3661  		if (!pe_session) {
3662  			pe_err("vdev_id %d : pe session create failed BSSID"
3663  			       QDF_MAC_ADDR_FMT, vdev_id,
3664  			       QDF_MAC_ADDR_REF(link_mac_addr.bytes));
3665  			return NULL;
3666  		}
3667  	}
3668  
3669  	return pe_session;
3670  }
3671  
3672  QDF_STATUS
lim_create_and_fill_link_session(struct mac_context * mac_ctx,uint8_t vdev_id,struct roam_offload_synch_ind * sync_ind,uint16_t ie_len)3673  lim_create_and_fill_link_session(struct mac_context *mac_ctx,
3674  				 uint8_t vdev_id,
3675  				 struct roam_offload_synch_ind *sync_ind,
3676  				 uint16_t ie_len)
3677  {
3678  	struct pe_session *pe_session;
3679  	QDF_STATUS status;
3680  
3681  	if (!mac_ctx)
3682  		return QDF_STATUS_E_INVAL;
3683  
3684  	pe_session = lim_cm_roam_create_session(mac_ctx, vdev_id, sync_ind);
3685  	if (!pe_session)
3686  		goto fail;
3687  
3688  	status = lim_cm_fill_link_session(mac_ctx, vdev_id,
3689  					  pe_session, sync_ind, ie_len);
3690  	if (QDF_IS_STATUS_ERROR(status))
3691  		goto fail;
3692  
3693  	return QDF_STATUS_SUCCESS;
3694  
3695  fail:
3696  	if (pe_session)
3697  		pe_delete_session(mac_ctx, pe_session);
3698  
3699  	pe_err("MLO ROAM: Link session creation failed");
3700  	return QDF_STATUS_E_FAILURE;
3701  }
3702  
lim_roam_mlo_create_peer(struct mac_context * mac,struct roam_offload_synch_ind * sync_ind,uint8_t vdev_id,uint8_t * peer_mac)3703  QDF_STATUS lim_roam_mlo_create_peer(struct mac_context *mac,
3704  				    struct roam_offload_synch_ind *sync_ind,
3705  				    uint8_t vdev_id, uint8_t *peer_mac)
3706  {
3707  	struct wlan_objmgr_vdev *vdev;
3708  	struct wlan_objmgr_peer *link_peer = NULL;
3709  	uint8_t link_id;
3710  	struct mlo_partner_info partner_info;
3711  	struct qdf_mac_addr link_addr;
3712  	QDF_STATUS status = QDF_STATUS_SUCCESS;
3713  
3714  	vdev = wlan_objmgr_get_vdev_by_id_from_psoc(mac->psoc,
3715  						    vdev_id,
3716  						    WLAN_LEGACY_MAC_ID);
3717  	if (!vdev)
3718  		return QDF_STATUS_E_INVAL;
3719  
3720  	if (!wlan_vdev_mlme_is_mlo_vdev(vdev))
3721  		goto end;
3722  
3723  	link_id = mlo_roam_get_link_id(vdev_id, sync_ind);
3724  	/* currently only 2 link MLO supported */
3725  	partner_info.num_partner_links = 1;
3726  	status = mlo_get_sta_link_mac_addr(vdev_id, sync_ind, &link_addr);
3727  	if (QDF_IS_STATUS_ERROR(status)) {
3728  		pe_err("Link mac address not found");
3729  		goto end;
3730  	}
3731  
3732  	qdf_mem_copy(partner_info.partner_link_info[0].link_addr.bytes,
3733  		     link_addr.bytes, QDF_MAC_ADDR_SIZE);
3734  	partner_info.partner_link_info[0].link_id = link_id;
3735  	pe_debug("link_addr " QDF_MAC_ADDR_FMT,
3736  		 QDF_MAC_ADDR_REF(
3737  			partner_info.partner_link_info[0].link_addr.bytes));
3738  
3739  	/* Get the bss peer obj */
3740  	link_peer = wlan_objmgr_get_peer_by_mac(mac->psoc, peer_mac,
3741  						WLAN_LEGACY_MAC_ID);
3742  	if (!link_peer) {
3743  		status = QDF_STATUS_E_INVAL;
3744  		goto end;
3745  	}
3746  
3747  	status = wlan_mlo_peer_create(vdev, link_peer, &partner_info, NULL, 0);
3748  	if (QDF_IS_STATUS_ERROR(status))
3749  		pe_err("MLO peer creation failed");
3750  
3751  	wlan_objmgr_peer_release_ref(link_peer, WLAN_LEGACY_MAC_ID);
3752  
3753  end:
3754  	wlan_objmgr_vdev_release_ref(vdev, WLAN_LEGACY_MAC_ID);
3755  
3756  	return status;
3757  }
3758  
3759  void
lim_mlo_roam_delete_link_peer(struct pe_session * pe_session,tpDphHashNode sta_ds)3760  lim_mlo_roam_delete_link_peer(struct pe_session *pe_session,
3761  			      tpDphHashNode sta_ds)
3762  {
3763  	struct wlan_objmgr_peer *peer = NULL;
3764  	struct mac_context *mac;
3765  
3766  	mac = cds_get_context(QDF_MODULE_ID_PE);
3767  	if (!mac) {
3768  		pe_err("mac ctx is null");
3769  		return;
3770  	}
3771  	if (!pe_session) {
3772  		pe_err("pe session is null");
3773  		return;
3774  	}
3775  	if (!sta_ds) {
3776  		pe_err("sta ds is null");
3777  		return;
3778  	}
3779  
3780  	peer = wlan_objmgr_get_peer_by_mac(mac->psoc,
3781  					   sta_ds->staAddr,
3782  					   WLAN_LEGACY_MAC_ID);
3783  	if (!peer) {
3784  		mlo_err("Peer is null");
3785  		return;
3786  	}
3787  
3788  	wlan_mlo_link_peer_delete(peer);
3789  
3790  	wlan_objmgr_peer_release_ref(peer, WLAN_LEGACY_MAC_ID);
3791  }
3792  #endif
3793  
lim_update_omn_ie_ch_width(struct wlan_objmgr_vdev * vdev,enum phy_ch_width ch_width)3794  void lim_update_omn_ie_ch_width(struct wlan_objmgr_vdev *vdev,
3795  				enum phy_ch_width ch_width)
3796  {
3797  	struct mlme_legacy_priv *mlme_priv;
3798  
3799  	mlme_priv = wlan_vdev_mlme_get_ext_hdl(vdev);
3800  	if (!mlme_priv) {
3801  		mlme_legacy_err("vdev legacy private object is NULL");
3802  		return;
3803  	}
3804  
3805  	mlme_priv->connect_info.assoc_chan_info.omn_ie_ch_width = ch_width;
3806  }
3807  
3808  #ifdef WLAN_FEATURE_11BE_MLO
3809  static bool
lim_match_link_info(uint8_t req_link_id,struct qdf_mac_addr * link_addr,struct mlo_partner_info * partner_info)3810  lim_match_link_info(uint8_t req_link_id,
3811  		    struct qdf_mac_addr *link_addr,
3812  		    struct mlo_partner_info *partner_info)
3813  {
3814  	uint8_t i;
3815  
3816  	for (i = 0; i < partner_info->num_partner_links; i++) {
3817  		if (partner_info->partner_link_info[i].link_id == req_link_id &&
3818  		    (qdf_is_macaddr_equal(link_addr,
3819  					  &partner_info->partner_link_info[i].link_addr)))
3820  			return true;
3821  	}
3822  
3823  	return false;
3824  }
3825  
3826  QDF_STATUS
lim_add_bcn_probe(struct wlan_objmgr_vdev * vdev,uint8_t * bcn_probe,uint32_t len,qdf_freq_t freq,int32_t rssi)3827  lim_add_bcn_probe(struct wlan_objmgr_vdev *vdev, uint8_t *bcn_probe,
3828  		  uint32_t len, qdf_freq_t freq, int32_t rssi)
3829  {
3830  	qdf_nbuf_t buf;
3831  	struct wlan_objmgr_pdev *pdev;
3832  	uint8_t *data, i, vdev_id;
3833  	struct mgmt_rx_event_params rx_param = {0};
3834  	struct wlan_frame_hdr *hdr;
3835  	enum mgmt_frame_type frm_type = MGMT_BEACON;
3836  	QDF_STATUS status = QDF_STATUS_SUCCESS;
3837  
3838  	vdev_id = wlan_vdev_get_id(vdev);
3839  	if (!bcn_probe || !len || (len < sizeof(*hdr)) ||
3840  	    len > MAX_MGMT_MPDU_LEN) {
3841  		pe_err("bcn_probe is null or invalid len %d",
3842  		       len);
3843  		return QDF_STATUS_E_FAILURE;
3844  	}
3845  
3846  	pdev = wlan_vdev_get_pdev(vdev);
3847  	if (!pdev) {
3848  		pe_err("Failed to find pdev");
3849  		return QDF_STATUS_E_FAILURE;
3850  	}
3851  
3852  	hdr = (struct wlan_frame_hdr *)bcn_probe;
3853  	if ((hdr->i_fc[0] & QDF_IEEE80211_FC0_SUBTYPE_MASK) ==
3854  	    MGMT_SUBTYPE_PROBE_RESP)
3855  		frm_type = MGMT_PROBE_RESP;
3856  
3857  	rx_param.pdev_id = wlan_objmgr_pdev_get_pdev_id(pdev);
3858  	rx_param.chan_freq = freq;
3859  	rx_param.rssi = rssi;
3860  
3861  	/* Set all per chain rssi as invalid */
3862  	for (i = 0; i < WLAN_MGMT_TXRX_HOST_MAX_ANTENNA; i++)
3863  		rx_param.rssi_ctl[i] = WLAN_INVALID_PER_CHAIN_RSSI;
3864  
3865  	buf = qdf_nbuf_alloc(NULL, qdf_roundup(len, 4), 0, 4, false);
3866  	if (!buf)
3867  		return QDF_STATUS_E_FAILURE;
3868  
3869  	qdf_nbuf_put_tail(buf, len);
3870  	qdf_nbuf_set_protocol(buf, ETH_P_CONTROL);
3871  
3872  	data = qdf_nbuf_data(buf);
3873  	qdf_mem_copy(data, bcn_probe, len);
3874  
3875  	pe_debug("MLO: add prb rsp to scan db");
3876  	/* buf will be freed by scan module in error or success case */
3877  	status = wlan_scan_process_bcn_probe_rx_sync(wlan_pdev_get_psoc(pdev), buf,
3878  			&rx_param, frm_type);
3879  
3880  	return status;
3881  }
3882  
3883  #ifdef WLAN_FEATURE_11BE_MLO
3884  static QDF_STATUS
lim_validate_probe_rsp_link_info(struct pe_session * session_entry,uint8_t * probe_rsp,uint32_t probe_rsp_len)3885  lim_validate_probe_rsp_link_info(struct pe_session *session_entry,
3886  				 uint8_t *probe_rsp,
3887  				 uint32_t probe_rsp_len)
3888  {
3889  	QDF_STATUS status = QDF_STATUS_SUCCESS;
3890  	uint8_t *ml_ie = NULL;
3891  	qdf_size_t ml_ie_total_len;
3892  	struct mlo_partner_info partner_info;
3893  	uint8_t i;
3894  	struct mlo_partner_info ml_partner_info;
3895  
3896  	status = util_find_mlie(probe_rsp + WLAN_PROBE_RESP_IES_OFFSET,
3897  				probe_rsp_len - WLAN_PROBE_RESP_IES_OFFSET,
3898  				&ml_ie, &ml_ie_total_len);
3899  	if (QDF_IS_STATUS_ERROR(status)) {
3900  		pe_err("Mlo ie not found in Probe response");
3901  		return status;
3902  	}
3903  	status = util_get_bvmlie_persta_partner_info(ml_ie,
3904  						     ml_ie_total_len,
3905  						     &partner_info);
3906  
3907  	if (QDF_IS_STATUS_ERROR(status)) {
3908  		pe_err("Per STA profile parsing failed");
3909  		return status;
3910  	}
3911  
3912  	ml_partner_info = session_entry->lim_join_req->partner_info;
3913  	for (i = 0; i < ml_partner_info.num_partner_links; i++) {
3914  		if (!lim_match_link_info(ml_partner_info.partner_link_info[i].link_id,
3915  					 &ml_partner_info.partner_link_info[i].link_addr,
3916  					 &partner_info)) {
3917  			pe_err("Atleast one Per-STA profile is missing in the ML-probe response");
3918  			return QDF_STATUS_E_PROTO;
3919  		}
3920  	}
3921  
3922  	return status;
3923  }
3924  
3925  static void
lim_clear_ml_partner_info(struct pe_session * session_entry)3926  lim_clear_ml_partner_info(struct pe_session *session_entry)
3927  {
3928  	uint8_t idx;
3929  	struct mlo_partner_info *partner_info = NULL;
3930  
3931  	if (!session_entry || !session_entry->lim_join_req)
3932  		return;
3933  
3934  	partner_info = &session_entry->lim_join_req->partner_info;
3935  	if (!partner_info) {
3936  		pe_err("Partner link info not present");
3937  		return;
3938  	}
3939  	pe_debug_rl("Clear Partner Link/s information");
3940  	for (idx = 0; idx < partner_info->num_partner_links; idx++) {
3941  		mlo_mgr_clear_ap_link_info(session_entry->vdev,
3942  			partner_info->partner_link_info[idx].link_addr.bytes);
3943  
3944  		partner_info->partner_link_info[idx].link_id = 0;
3945  		qdf_zero_macaddr(
3946  			&partner_info->partner_link_info[idx].link_addr);
3947  	}
3948  	partner_info->num_partner_links = 0;
3949  }
3950  
3951  static QDF_STATUS
lim_check_scan_db_for_join_req_partner_info(struct pe_session * session_entry,struct mac_context * mac_ctx)3952  lim_check_scan_db_for_join_req_partner_info(struct pe_session *session_entry,
3953  					    struct mac_context *mac_ctx)
3954  {
3955  	struct join_req *lim_join_req;
3956  	struct wlan_objmgr_pdev *pdev;
3957  	struct mlo_partner_info *partner_info;
3958  	struct mlo_link_info *link_info;
3959  	struct scan_cache_entry *partner_entry;
3960  	uint8_t i;
3961  
3962  	if (!session_entry) {
3963  		pe_err("session entry is NULL");
3964  		return QDF_STATUS_E_NULL_VALUE;
3965  	}
3966  
3967  	if (!mac_ctx) {
3968  		pe_err("mac context is NULL");
3969  		return QDF_STATUS_E_NULL_VALUE;
3970  	}
3971  
3972  	lim_join_req = session_entry->lim_join_req;
3973  	if (!lim_join_req) {
3974  		pe_err("join req is NULL");
3975  		return QDF_STATUS_E_NULL_VALUE;
3976  	}
3977  
3978  	pdev = mac_ctx->pdev;
3979  	if (!pdev) {
3980  		pe_err("pdev is NULL");
3981  		return QDF_STATUS_E_NULL_VALUE;
3982  	}
3983  
3984  	partner_info = &lim_join_req->partner_info;
3985  	for (i = 0; i < partner_info->num_partner_links; i++) {
3986  		link_info = &partner_info->partner_link_info[i];
3987  		partner_entry =
3988  			wlan_scan_get_entry_by_bssid(pdev,
3989  						     &link_info->link_addr);
3990  		if (!partner_entry) {
3991  			pe_err("Scan entry is not found for partner link %d "
3992  			       QDF_MAC_ADDR_FMT,
3993  			       link_info->link_id,
3994  			       QDF_MAC_ADDR_REF(link_info->link_addr.bytes));
3995  			return QDF_STATUS_E_FAILURE;
3996  		}
3997  		util_scan_free_cache_entry(partner_entry);
3998  	}
3999  
4000  	return QDF_STATUS_SUCCESS;
4001  }
4002  
lim_update_mlo_mgr_info(struct mac_context * mac_ctx,struct wlan_objmgr_vdev * vdev,struct qdf_mac_addr * link_addr,uint8_t link_id,uint16_t freq)4003  QDF_STATUS lim_update_mlo_mgr_info(struct mac_context *mac_ctx,
4004  				   struct wlan_objmgr_vdev *vdev,
4005  				   struct qdf_mac_addr *link_addr,
4006  				   uint8_t link_id, uint16_t freq)
4007  {
4008  	struct wlan_objmgr_pdev *pdev;
4009  	struct scan_cache_entry *cache_entry;
4010  	struct wlan_channel channel;
4011  	bool is_security_allowed;
4012  
4013  	pdev = mac_ctx->pdev;
4014  	if (!pdev) {
4015  		pe_err("pdev is NULL");
4016  		return QDF_STATUS_E_NULL_VALUE;
4017  	}
4018  
4019  	cache_entry = wlan_scan_get_scan_entry_by_mac_freq(pdev, link_addr,
4020  							   freq);
4021  	if (!cache_entry)
4022  		return QDF_STATUS_E_FAILURE;
4023  
4024  	/**
4025  	 * Reject all the partner link if any partner link  doesn’t pass the
4026  	 * security check and proceed connection with single link.
4027  	 */
4028  	is_security_allowed =
4029  		wlan_cm_is_eht_allowed_for_current_security(
4030  					wlan_pdev_get_psoc(mac_ctx->pdev),
4031  					cache_entry, true);
4032  
4033  	if (!is_security_allowed) {
4034  		mlme_debug("current security is not valid for partner link link_addr:" QDF_MAC_ADDR_FMT,
4035  			   QDF_MAC_ADDR_REF(link_addr->bytes));
4036  		util_scan_free_cache_entry(cache_entry);
4037  		return QDF_STATUS_E_FAILURE;
4038  	}
4039  
4040  	channel.ch_freq = cache_entry->channel.chan_freq;
4041  	channel.ch_ieee = wlan_reg_freq_to_chan(pdev, channel.ch_freq);
4042  	channel.ch_phymode = cache_entry->phy_mode;
4043  	channel.ch_cfreq1 = cache_entry->channel.cfreq0;
4044  	channel.ch_cfreq2 = cache_entry->channel.cfreq1;
4045  	channel.ch_width =
4046  		wlan_mlme_get_ch_width_from_phymode(cache_entry->phy_mode);
4047  
4048  	/*
4049  	 * Supplicant needs non zero center_freq1 in case of 20 MHz connection
4050  	 * also as a response of get_channel request. In case of 20 MHz channel
4051  	 * width central frequency is same as channel frequency
4052  	 */
4053  	if (channel.ch_width == CH_WIDTH_20MHZ)
4054  		channel.ch_cfreq1 = channel.ch_freq;
4055  
4056  	util_scan_free_cache_entry(cache_entry);
4057  
4058  	mlo_mgr_update_ap_channel_info(vdev, link_id, (uint8_t *)link_addr,
4059  				       channel);
4060  
4061  	return QDF_STATUS_SUCCESS;
4062  }
4063  #else
4064  static inline void
lim_clear_ml_partner_info(struct pe_session * session_entry)4065  lim_clear_ml_partner_info(struct pe_session *session_entry)
4066  {
4067  }
4068  
4069  static QDF_STATUS
lim_check_db_for_join_req_partner_info(struct pe_session * session_entry,struct mac_context * mac_ctx)4070  lim_check_db_for_join_req_partner_info(struct pe_session *session_entry,
4071  				       struct mac_context *mac_ctx)
4072  {
4073  
4074  	return QDF_STATUS_E_FAILURE;
4075  }
4076  #endif
4077  
lim_check_for_ml_probe_req(struct pe_session * session)4078  QDF_STATUS lim_check_for_ml_probe_req(struct pe_session *session)
4079  {
4080  	if (!session || !session->lim_join_req)
4081  		return QDF_STATUS_E_NULL_VALUE;
4082  
4083  	if (session->lim_join_req->is_ml_probe_req_sent)
4084  		return QDF_STATUS_SUCCESS;
4085  
4086  	return QDF_STATUS_E_FAILURE;
4087  }
4088  
lim_check_partner_link_for_cmn_akm(struct pe_session * session)4089  static QDF_STATUS lim_check_partner_link_for_cmn_akm(struct pe_session *session)
4090  {
4091  	struct scan_filter *filter;
4092  	qdf_list_t *scan_list = NULL;
4093  	struct wlan_objmgr_pdev *pdev;
4094  	uint8_t idx;
4095  	struct mlo_link_info *link_info;
4096  	struct scan_cache_entry *cur_entry;
4097  	struct scan_cache_node *link_node;
4098  	struct mlo_partner_info *partner_info;
4099  	qdf_list_node_t *cur_node = NULL, *next_node = NULL;
4100  	QDF_STATUS status = QDF_STATUS_SUCCESS;
4101  
4102  	pdev =  wlan_vdev_get_pdev(session->vdev);
4103  	if (!pdev) {
4104  		pe_err("PDEV NULL");
4105  		return QDF_STATUS_E_NULL_VALUE;
4106  	}
4107  
4108  	cur_entry =
4109  		wlan_cm_get_curr_candidate_entry(session->vdev, session->cm_id);
4110  	if (!cur_entry) {
4111  		pe_err("Current candidate NULL");
4112  		return QDF_STATUS_E_NULL_VALUE;
4113  	}
4114  
4115  	filter = qdf_mem_malloc(sizeof(*filter));
4116  	if (!filter) {
4117  		status = QDF_STATUS_E_NOMEM;
4118  		goto mem_free;
4119  	}
4120  
4121  	partner_info = &session->lim_join_req->partner_info;
4122  	for (idx = 0; idx < partner_info->num_partner_links; idx++) {
4123  		link_info = &partner_info->partner_link_info[idx];
4124  		qdf_copy_macaddr(&filter->bssid_list[idx],
4125  				 &link_info->link_addr);
4126  		filter->num_of_bssid++;
4127  
4128  		filter->chan_freq_list[idx] = link_info->chan_freq;
4129  		filter->num_of_channels++;
4130  	}
4131  
4132  	/* If no.of. scan entries fetched not equal to no.of partner links
4133  	 * then fail as common AKM is not determined.
4134  	 */
4135  	scan_list = wlan_scan_get_result(pdev, filter);
4136  	qdf_mem_free(filter);
4137  	if (!scan_list ||
4138  	    (qdf_list_size(scan_list) != partner_info->num_partner_links)) {
4139  		status = QDF_STATUS_E_INVAL;
4140  		goto mem_free;
4141  	}
4142  
4143  	qdf_list_peek_front(scan_list, &cur_node);
4144  	while (cur_node) {
4145  		qdf_list_peek_next(scan_list, cur_node, &next_node);
4146  		link_node = qdf_container_of(cur_node, struct scan_cache_node,
4147  					     node);
4148  
4149  		if (!wlan_scan_entries_contain_cmn_akm(cur_entry,
4150  						       link_node->entry)) {
4151  			status = QDF_STATUS_E_FAILURE;
4152  			break;
4153  		}
4154  
4155  		cur_node = next_node;
4156  		next_node = NULL;
4157  	}
4158  
4159  mem_free:
4160  	if (scan_list)
4161  		wlan_scan_purge_results(scan_list);
4162  	util_scan_free_cache_entry(cur_entry);
4163  	return status;
4164  }
4165  
lim_gen_link_specific_probe_rsp(struct mac_context * mac_ctx,struct pe_session * session_entry,tpSirProbeRespBeacon rcvd_probe_resp,uint8_t * probe_rsp,uint32_t probe_rsp_len,int32_t rssi)4166  QDF_STATUS lim_gen_link_specific_probe_rsp(struct mac_context *mac_ctx,
4167  					   struct pe_session *session_entry,
4168  					   tpSirProbeRespBeacon rcvd_probe_resp,
4169  					   uint8_t *probe_rsp,
4170  					   uint32_t probe_rsp_len, int32_t rssi)
4171  {
4172  	struct element_info link_probe_rsp = {0};
4173  	struct qdf_mac_addr sta_link_addr;
4174  	QDF_STATUS status = QDF_STATUS_E_FAILURE;
4175  	struct mlo_link_info *link_info = NULL;
4176  	struct mlo_partner_info *partner_info;
4177  	uint8_t chan;
4178  	uint8_t op_class;
4179  	uint16_t chan_freq, gen_frame_len;
4180  	uint8_t idx;
4181  	uint8_t req_link_id;
4182  
4183  	if (!session_entry)
4184  		return QDF_STATUS_E_NULL_VALUE;
4185  
4186  	if (!session_entry->lim_join_req)
4187  		return status;
4188  
4189  	partner_info = &session_entry->lim_join_req->partner_info;
4190  	if (!partner_info->num_partner_links) {
4191  		pe_debug("No partner link info since supports 1 link only");
4192  		return status;
4193  	}
4194  
4195  	if (session_entry->lim_join_req->is_ml_probe_req_sent &&
4196  	    rcvd_probe_resp->mlo_ie.mlo_ie_present) {
4197  		session_entry->lim_join_req->is_ml_probe_req_sent = false;
4198  
4199  		partner_info = &session_entry->lim_join_req->partner_info;
4200  		if (!partner_info->num_partner_links) {
4201  			pe_err("STA doesn't have any partner link information");
4202  			return QDF_STATUS_E_FAILURE;
4203  		}
4204  
4205  		status = lim_validate_probe_rsp_link_info(session_entry,
4206  							  probe_rsp,
4207  							  probe_rsp_len);
4208  		if (QDF_IS_STATUS_ERROR(status)) {
4209  			if(QDF_IS_STATUS_ERROR(
4210  				lim_check_scan_db_for_join_req_partner_info(
4211  						session_entry,
4212  						mac_ctx)))
4213  				lim_clear_ml_partner_info(session_entry);
4214  			return status;
4215  		}
4216  
4217  		/*
4218  		 * When an MLO probe response is received from a link,
4219  		 * the other link might be superior in features compared to the
4220  		 * link that sent ML probe rsp and the per-STA profile
4221  		 * info may carry corresponding IEs. These IEs are extracted
4222  		 * and added to IE list of link probe response while generating
4223  		 * it. So, the new link probe response generated might be of
4224  		 * more size than the original link probe rsp. Allocate buffer
4225  		 * for the scan entry to accommodate all of the IEs got
4226  		 * generated as part of link probe rsp generation. Allocate
4227  		 * MAX_MGMT_MPDU_LEN bytes for IEs as the max frame size that
4228  		 * can be received from AP is MAX_MGMT_MPDU_LEN bytes.
4229  		 */
4230  		gen_frame_len = MAX_MGMT_MPDU_LEN;
4231  
4232  		link_probe_rsp.ptr = qdf_mem_malloc(gen_frame_len);
4233  		if (!link_probe_rsp.ptr) {
4234  			if(QDF_IS_STATUS_ERROR(
4235  				lim_check_scan_db_for_join_req_partner_info(
4236  					session_entry,
4237  					mac_ctx)))
4238  				lim_clear_ml_partner_info(session_entry);
4239  			return QDF_STATUS_E_NOMEM;
4240  		}
4241  
4242  		link_probe_rsp.len = gen_frame_len;
4243  		qdf_mem_copy(&sta_link_addr, session_entry->self_mac_addr,
4244  			     QDF_MAC_ADDR_SIZE);
4245  
4246  		for (idx = 0; idx < partner_info->num_partner_links; idx++) {
4247  			req_link_id =
4248  				partner_info->partner_link_info[idx].link_id;
4249  			status = util_gen_link_probe_rsp(probe_rsp,
4250  					probe_rsp_len, req_link_id,
4251  					sta_link_addr, link_probe_rsp.ptr,
4252  					gen_frame_len,
4253  					(qdf_size_t *)&link_probe_rsp.len);
4254  
4255  			if (QDF_IS_STATUS_ERROR(status)) {
4256  				pe_err("MLO: Link %d probe resp gen failed %d",
4257  				       req_link_id, status);
4258  				status =
4259  				   lim_check_scan_db_for_join_req_partner_info(
4260  							session_entry, mac_ctx);
4261  				if (QDF_IS_STATUS_ERROR(status))
4262  				       lim_clear_ml_partner_info(session_entry);
4263  
4264  				goto end;
4265  			}
4266  
4267  			pe_debug("MLO:link probe rsp size:%u orig probe rsp:%u",
4268  				 link_probe_rsp.len, probe_rsp_len);
4269  
4270  			link_info = &partner_info->partner_link_info[idx];
4271  			wlan_get_chan_by_bssid_from_rnr(session_entry->vdev,
4272  							session_entry->cm_id,
4273  							&link_info->link_addr,
4274  							&chan, &op_class);
4275  			if (!chan)
4276  				wlan_get_chan_by_link_id_from_rnr(
4277  							session_entry->vdev,
4278  							session_entry->cm_id,
4279  							link_info->link_id,
4280  							&chan, &op_class);
4281  			if (!chan) {
4282  				pe_err("Invalid link id %d link mac: " QDF_MAC_ADDR_FMT,
4283  				  link_info->link_id,
4284  				  QDF_MAC_ADDR_REF(link_info->link_addr.bytes));
4285  				status =
4286  				   lim_check_scan_db_for_join_req_partner_info(
4287  					session_entry, mac_ctx);
4288  				if (QDF_IS_STATUS_ERROR(status))
4289  				       lim_clear_ml_partner_info(session_entry);
4290  
4291  				status = QDF_STATUS_E_FAILURE;
4292  				goto end;
4293  			}
4294  			chan_freq =
4295  				wlan_reg_chan_opclass_to_freq(chan, op_class,
4296  							      true);
4297  
4298  			status = lim_add_bcn_probe(session_entry->vdev,
4299  						   link_probe_rsp.ptr,
4300  						   link_probe_rsp.len,
4301  						   chan_freq, rssi);
4302  			if (QDF_IS_STATUS_ERROR(status)) {
4303  				pe_err("failed to add bcn probe %d", status);
4304  				status =
4305  				   lim_check_scan_db_for_join_req_partner_info(
4306  					session_entry, mac_ctx);
4307  				if (QDF_IS_STATUS_ERROR(status))
4308  				       lim_clear_ml_partner_info(session_entry);
4309  
4310  				goto end;
4311  			}
4312  
4313  			status = lim_update_mlo_mgr_info(mac_ctx,
4314  							 session_entry->vdev,
4315  							 &link_info->link_addr,
4316  							 link_info->link_id,
4317  							 link_info->chan_freq);
4318  			if (QDF_IS_STATUS_ERROR(status)) {
4319  				pe_err("failed to update mlo_mgr %d", status);
4320  				lim_clear_ml_partner_info(session_entry);
4321  
4322  				goto end;
4323  			}
4324  		}
4325  		/*
4326  		 * If the partner link's AKM not matching current candidate
4327  		 * remove the partner links for this association.
4328  		 */
4329  		status = lim_check_partner_link_for_cmn_akm(session_entry);
4330  		if (QDF_IS_STATUS_ERROR(status)) {
4331  			pe_debug("Non overlapping partner link AKM %d",
4332  				 status);
4333  			lim_clear_ml_partner_info(session_entry);
4334  			goto end;
4335  		}
4336  	} else if (session_entry->lim_join_req->is_ml_probe_req_sent &&
4337  		   !rcvd_probe_resp->mlo_ie.mlo_ie_present) {
4338  		status =
4339  			lim_check_scan_db_for_join_req_partner_info(
4340  						session_entry, mac_ctx);
4341  		if (QDF_IS_STATUS_ERROR(status))
4342  			lim_clear_ml_partner_info(session_entry);
4343  
4344  		return QDF_STATUS_E_FAILURE;
4345  	} else {
4346  		return status;
4347  	}
4348  end:
4349  	if (link_probe_rsp.ptr)
4350  		qdf_mem_free(link_probe_rsp.ptr);
4351  	link_probe_rsp.ptr = NULL;
4352  	link_probe_rsp.len = 0;
4353  	return status;
4354  }
4355  
4356  QDF_STATUS
lim_process_cu_for_probe_rsp(struct mac_context * mac_ctx,struct pe_session * session,uint8_t * probe_rsp,uint32_t probe_rsp_len)4357  lim_process_cu_for_probe_rsp(struct mac_context *mac_ctx,
4358  			     struct pe_session *session,
4359  			     uint8_t *probe_rsp,
4360  			     uint32_t probe_rsp_len)
4361  {
4362  	struct element_info link_probe_rsp;
4363  	struct qdf_mac_addr sta_link_addr;
4364  	struct wlan_objmgr_vdev *vdev;
4365  	struct wlan_objmgr_vdev *partner_vdev;
4366  	uint8_t *ml_ie = NULL;
4367  	qdf_size_t ml_ie_total_len = 0;
4368  	struct mlo_partner_info partner_info;
4369  	uint8_t i, link_id, vdev_id;
4370  	uint8_t bpcc, aui;
4371  	bool cu_flag = false;
4372  	const uint8_t *rnr;
4373  	bool msd_cap_found = false;
4374  	QDF_STATUS status = QDF_STATUS_E_INVAL;
4375  
4376  	vdev = session->vdev;
4377  	if (!vdev || !wlan_vdev_mlme_is_mlo_vdev(vdev))
4378  		return status;
4379  
4380  	rnr = wlan_get_ie_ptr_from_eid(WLAN_ELEMID_REDUCED_NEIGHBOR_REPORT,
4381  				   probe_rsp + WLAN_PROBE_RESP_IES_OFFSET,
4382  				   probe_rsp_len - WLAN_PROBE_RESP_IES_OFFSET);
4383  	if (!rnr)
4384  		return status;
4385  
4386  	status = util_find_mlie(probe_rsp + WLAN_PROBE_RESP_IES_OFFSET,
4387  				probe_rsp_len - WLAN_PROBE_RESP_IES_OFFSET,
4388  				&ml_ie, &ml_ie_total_len);
4389  	if (QDF_IS_STATUS_ERROR(status)) {
4390  		pe_err("Mlo ie not found in Probe response");
4391  		return status;
4392  	}
4393  
4394  	util_get_bvmlie_msd_cap(ml_ie, ml_ie_total_len, &msd_cap_found,
4395  				NULL);
4396  	if (msd_cap_found) {
4397  		wlan_vdev_mlme_cap_clear(vdev, WLAN_VDEV_C_EMLSR_CAP);
4398  		pe_debug("EMLSR not supported with D2.0 AP");
4399  	}
4400  
4401  	status = util_get_bvmlie_persta_partner_info(ml_ie,
4402  						     ml_ie_total_len,
4403  						     &partner_info);
4404  	if (QDF_IS_STATUS_ERROR(status)) {
4405  		pe_err("Per STA profile parsing failed");
4406  		return status;
4407  	}
4408  
4409  	link_probe_rsp.ptr = qdf_mem_malloc(probe_rsp_len);
4410  	if (!link_probe_rsp.ptr)
4411  		return QDF_STATUS_E_NOMEM;
4412  
4413  	for (i = 0; i < partner_info.num_partner_links; i++) {
4414  		link_id = partner_info.partner_link_info[i].link_id;
4415  		partner_vdev = mlo_get_vdev_by_link_id(vdev, link_id,
4416  						       WLAN_LEGACY_MAC_ID);
4417  		if (!partner_vdev) {
4418  			pe_debug("No partner vdev for link id %d", link_id);
4419  			continue;
4420  		}
4421  
4422  		status = lim_cu_info_from_rnr_per_link_id(rnr, link_id,
4423  							  &bpcc, &aui);
4424  		if (QDF_IS_STATUS_ERROR(status)) {
4425  			pe_debug("no cu info in rnr for link id %d", link_id);
4426  			goto ref_rel;
4427  		}
4428  
4429  		cu_flag = lim_check_cu_happens(partner_vdev, bpcc);
4430  		if (!cu_flag)
4431  			goto ref_rel;
4432  
4433  		vdev_id = wlan_vdev_get_id(partner_vdev);
4434  		session = pe_find_session_by_vdev_id(mac_ctx, vdev_id);
4435  		if (!session) {
4436  			pe_debug("session is null for vdev id %d", vdev_id);
4437  			goto ref_rel;
4438  		}
4439  
4440  		qdf_mem_copy(&sta_link_addr, session->self_mac_addr,
4441  			     QDF_MAC_ADDR_SIZE);
4442  
4443  		link_probe_rsp.len = probe_rsp_len;
4444  		/* Todo:
4445  		 * it needs to use link_id as parameter to generate
4446  		 * specific probe rsp frame when api util_gen_link_probe_rsp
4447  		 * updated.
4448  		 */
4449  		status =
4450  		     util_gen_link_probe_rsp(probe_rsp, probe_rsp_len, link_id,
4451  					     sta_link_addr, link_probe_rsp.ptr,
4452  					     probe_rsp_len,
4453  					     (qdf_size_t *)&link_probe_rsp.len);
4454  		if (QDF_IS_STATUS_ERROR(status)) {
4455  			pe_err("MLO: Link probe response generation failed %d",
4456  			       status);
4457  			goto ref_rel;
4458  		}
4459  
4460  		lim_process_gen_probe_rsp_frame(mac_ctx, session,
4461  						link_probe_rsp.ptr,
4462  						link_probe_rsp.len);
4463  
4464  ref_rel:
4465  		wlan_objmgr_vdev_release_ref(partner_vdev, WLAN_LEGACY_MAC_ID);
4466  	}
4467  
4468  	qdf_mem_free(link_probe_rsp.ptr);
4469  	link_probe_rsp.ptr = NULL;
4470  	link_probe_rsp.len = 0;
4471  	return status;
4472  }
4473  #endif
4474  
4475  #ifdef WLAN_FEATURE_SR
4476  static
lim_store_array_to_bit_map(uint64_t * val,uint8_t array[8])4477  void lim_store_array_to_bit_map(uint64_t *val, uint8_t array[8])
4478  {
4479  	uint32_t bit_map_0 = 0;
4480  	uint32_t bit_map_1 = 0;
4481  
4482  	QDF_SET_BITS(bit_map_0, 0, SR_PADDING_BYTE, array[0]);
4483  	QDF_SET_BITS(bit_map_0, 8, SR_PADDING_BYTE, array[1]);
4484  	QDF_SET_BITS(bit_map_0, 16, SR_PADDING_BYTE, array[2]);
4485  	QDF_SET_BITS(bit_map_0, 24, SR_PADDING_BYTE, array[3]);
4486  	QDF_SET_BITS(bit_map_1, 0, SR_PADDING_BYTE, array[4]);
4487  	QDF_SET_BITS(bit_map_1, 8, SR_PADDING_BYTE, array[5]);
4488  	QDF_SET_BITS(bit_map_1, 16, SR_PADDING_BYTE, array[6]);
4489  	QDF_SET_BITS(bit_map_1, 24, SR_PADDING_BYTE, array[7]);
4490  	*val = (uint64_t) bit_map_0 |
4491  	       (((uint64_t)bit_map_1) << 32);
4492  }
4493  
lim_update_vdev_sr_elements(struct pe_session * session_entry,tpDphHashNode sta_ds)4494  void lim_update_vdev_sr_elements(struct pe_session *session_entry,
4495  				 tpDphHashNode sta_ds)
4496  {
4497  	uint8_t sr_ctrl;
4498  	uint8_t non_srg_max_pd_offset, srg_min_pd_offset, srg_max_pd_offset;
4499  	uint64_t srg_color_bit_map = 0;
4500  	uint64_t srg_partial_bssid_bit_map = 0;
4501  	tDot11fIEspatial_reuse *srp_ie = &sta_ds->parsed_ies.srp_ie;
4502  
4503  	sr_ctrl = srp_ie->sr_value15_allow << 4 |
4504  		  srp_ie->srg_info_present << 3 |
4505  		  srp_ie->non_srg_offset_present << 2 |
4506  		  srp_ie->non_srg_pd_sr_disallow << 1 |
4507  		  srp_ie->psr_disallow;
4508  	non_srg_max_pd_offset =
4509  		srp_ie->non_srg_offset.info.non_srg_pd_max_offset;
4510  	srg_min_pd_offset = srp_ie->srg_info.info.srg_pd_min_offset;
4511  	srg_max_pd_offset = srp_ie->srg_info.info.srg_pd_max_offset;
4512  	lim_store_array_to_bit_map(&srg_color_bit_map,
4513  				   srp_ie->srg_info.info.srg_color);
4514  	lim_store_array_to_bit_map(&srg_partial_bssid_bit_map,
4515  				   srp_ie->srg_info.info.srg_partial_bssid);
4516  	pe_debug("Spatial Reuse Control field: %x Non-SRG Max PD Offset: %x SRG range %d - %d srg_color_bit_map:%llu srg_partial_bssid_bit_map: %llu",
4517  		 sr_ctrl, non_srg_max_pd_offset, srg_min_pd_offset,
4518  		 srg_max_pd_offset, srg_color_bit_map,
4519  		 srg_partial_bssid_bit_map);
4520  	wlan_vdev_mlme_set_srg_partial_bssid_bit_map(session_entry->vdev,
4521  						     srg_partial_bssid_bit_map);
4522  	wlan_vdev_mlme_set_srg_bss_color_bit_map(session_entry->vdev,
4523  						 srg_color_bit_map);
4524  	wlan_vdev_mlme_set_sr_ctrl(session_entry->vdev, sr_ctrl);
4525  	wlan_vdev_mlme_set_non_srg_pd_offset(session_entry->vdev,
4526  					     non_srg_max_pd_offset);
4527  	wlan_vdev_mlme_set_srg_pd_offset(session_entry->vdev, srg_max_pd_offset,
4528  					 srg_min_pd_offset);
4529  
4530  }
4531  #endif
4532