2013-05-08 21:45:39 +00:00
|
|
|
/******************************************************************************
|
|
|
|
*
|
|
|
|
* Copyright(c) 2007 - 2011 Realtek Corporation. All rights reserved.
|
2014-12-19 06:59:46 +00:00
|
|
|
*
|
2013-05-08 21:45:39 +00:00
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of version 2 of the GNU General Public License as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along with
|
|
|
|
* this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
|
|
|
|
*
|
|
|
|
*
|
|
|
|
******************************************************************************/
|
|
|
|
#define _RTW_STA_MGT_C_
|
|
|
|
|
|
|
|
#include <drv_types.h>
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#if defined(PLATFORM_LINUX) && defined (PLATFORM_WINDOWS)
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#error "Shall be Linux or Windows, but not both!\n"
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
bool test_st_match_rule(_adapter *adapter, u8 *local_naddr, u8 *local_port, u8 *remote_naddr, u8 *remote_port)
|
|
|
|
{
|
|
|
|
if (ntohs(*((u16 *)local_port)) == 5001 || ntohs(*((u16 *)remote_port)) == 5001)
|
|
|
|
return _TRUE;
|
|
|
|
return _FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct st_register test_st_reg = {
|
|
|
|
.s_proto = 0x06,
|
|
|
|
.rule = test_st_match_rule,
|
|
|
|
};
|
|
|
|
|
|
|
|
inline void rtw_st_ctl_init(struct st_ctl_t *st_ctl)
|
|
|
|
{
|
|
|
|
_rtw_memset(st_ctl->reg, 0 , sizeof(struct st_register) * SESSION_TRACKER_REG_ID_NUM);
|
|
|
|
_rtw_init_queue(&st_ctl->tracker_q);
|
|
|
|
}
|
|
|
|
|
|
|
|
inline void rtw_st_ctl_clear_tracker_q(struct st_ctl_t *st_ctl)
|
|
|
|
{
|
|
|
|
_irqL irqL;
|
|
|
|
_list *plist, *phead;
|
|
|
|
struct session_tracker *st;
|
|
|
|
|
|
|
|
_enter_critical_bh(&st_ctl->tracker_q.lock, &irqL);
|
|
|
|
phead = &st_ctl->tracker_q.queue;
|
|
|
|
plist = get_next(phead);
|
|
|
|
while (rtw_end_of_queue_search(phead, plist) == _FALSE) {
|
|
|
|
st = LIST_CONTAINOR(plist, struct session_tracker, list);
|
|
|
|
plist = get_next(plist);
|
|
|
|
rtw_list_delete(&st->list);
|
|
|
|
rtw_mfree((u8 *)st, sizeof(struct session_tracker));
|
|
|
|
}
|
|
|
|
_exit_critical_bh(&st_ctl->tracker_q.lock, &irqL);
|
|
|
|
}
|
|
|
|
|
|
|
|
inline void rtw_st_ctl_deinit(struct st_ctl_t *st_ctl)
|
|
|
|
{
|
|
|
|
rtw_st_ctl_clear_tracker_q(st_ctl);
|
|
|
|
_rtw_deinit_queue(&st_ctl->tracker_q);
|
|
|
|
}
|
|
|
|
|
|
|
|
inline void rtw_st_ctl_register(struct st_ctl_t *st_ctl, u8 st_reg_id, struct st_register *reg)
|
|
|
|
{
|
|
|
|
if (st_reg_id >= SESSION_TRACKER_REG_ID_NUM) {
|
|
|
|
rtw_warn_on(1);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
st_ctl->reg[st_reg_id].s_proto = reg->s_proto;
|
|
|
|
st_ctl->reg[st_reg_id].rule = reg->rule;
|
|
|
|
}
|
|
|
|
|
|
|
|
inline void rtw_st_ctl_unregister(struct st_ctl_t *st_ctl, u8 st_reg_id)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (st_reg_id >= SESSION_TRACKER_REG_ID_NUM) {
|
|
|
|
rtw_warn_on(1);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
st_ctl->reg[st_reg_id].s_proto = 0;
|
|
|
|
st_ctl->reg[st_reg_id].rule = NULL;
|
|
|
|
|
|
|
|
/* clear tracker queue if no session trecker registered */
|
|
|
|
for (i = 0; i < SESSION_TRACKER_REG_ID_NUM; i++)
|
|
|
|
if (st_ctl->reg[i].s_proto != 0)
|
|
|
|
break;
|
|
|
|
if (i >= SESSION_TRACKER_REG_ID_NUM)
|
|
|
|
rtw_st_ctl_clear_tracker_q(st_ctl);
|
|
|
|
}
|
|
|
|
|
|
|
|
inline bool rtw_st_ctl_chk_reg_s_proto(struct st_ctl_t *st_ctl, u8 s_proto)
|
|
|
|
{
|
|
|
|
bool ret = _FALSE;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < SESSION_TRACKER_REG_ID_NUM; i++) {
|
|
|
|
if (st_ctl->reg[i].s_proto == s_proto) {
|
|
|
|
ret = _TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
inline bool rtw_st_ctl_chk_reg_rule(struct st_ctl_t *st_ctl, _adapter *adapter, u8 *local_naddr, u8 *local_port, u8 *remote_naddr, u8 *remote_port)
|
|
|
|
{
|
|
|
|
bool ret = _FALSE;
|
|
|
|
int i;
|
|
|
|
st_match_rule rule;
|
|
|
|
|
|
|
|
for (i = 0; i < SESSION_TRACKER_REG_ID_NUM; i++) {
|
|
|
|
rule = st_ctl->reg[i].rule;
|
|
|
|
if (rule && rule(adapter, local_naddr, local_port, remote_naddr, remote_port) == _TRUE) {
|
|
|
|
ret = _TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define SESSION_TRACKER_FMT IP_FMT":"PORT_FMT" "IP_FMT":"PORT_FMT" %u %d"
|
|
|
|
#define SESSION_TRACKER_ARG(st) IP_ARG(&(st)->local_naddr), PORT_ARG(&(st)->local_port), IP_ARG(&(st)->remote_naddr), PORT_ARG(&(st)->remote_port), (st)->status, rtw_get_passing_time_ms((st)->set_time)
|
|
|
|
|
|
|
|
void dump_st_ctl(void *sel, struct st_ctl_t *st_ctl)
|
2013-05-08 21:45:39 +00:00
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
int i;
|
|
|
|
_irqL irqL;
|
|
|
|
_list *plist, *phead;
|
|
|
|
struct session_tracker *st;
|
|
|
|
|
|
|
|
if (!DBG_SESSION_TRACKER)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < SESSION_TRACKER_REG_ID_NUM; i++)
|
|
|
|
RTW_PRINT_SEL(sel, "reg%d: %u %p\n", i, st_ctl->reg[i].s_proto, st_ctl->reg[i].rule);
|
|
|
|
|
|
|
|
_enter_critical_bh(&st_ctl->tracker_q.lock, &irqL);
|
|
|
|
phead = &st_ctl->tracker_q.queue;
|
|
|
|
plist = get_next(phead);
|
|
|
|
while (rtw_end_of_queue_search(phead, plist) == _FALSE) {
|
|
|
|
st = LIST_CONTAINOR(plist, struct session_tracker, list);
|
|
|
|
plist = get_next(plist);
|
|
|
|
|
|
|
|
RTW_PRINT_SEL(sel, SESSION_TRACKER_FMT"\n", SESSION_TRACKER_ARG(st));
|
|
|
|
}
|
|
|
|
_exit_critical_bh(&st_ctl->tracker_q.lock, &irqL);
|
|
|
|
|
|
|
|
}
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
void _rtw_init_stainfo(struct sta_info *psta);
|
|
|
|
void _rtw_init_stainfo(struct sta_info *psta)
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
|
|
_rtw_memset((u8 *)psta, 0, sizeof(struct sta_info));
|
|
|
|
|
2018-10-19 16:48:13 +00:00
|
|
|
spin_lock_init(&psta->lock);
|
2013-05-08 21:45:39 +00:00
|
|
|
_rtw_init_listhead(&psta->list);
|
|
|
|
_rtw_init_listhead(&psta->hash_list);
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _rtw_init_listhead(&psta->asoc_list); */
|
|
|
|
/* _rtw_init_listhead(&psta->sleep_list); */
|
|
|
|
/* _rtw_init_listhead(&psta->wakeup_list); */
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
_rtw_init_queue(&psta->sleep_q);
|
|
|
|
psta->sleepq_len = 0;
|
|
|
|
|
|
|
|
_rtw_init_sta_xmit_priv(&psta->sta_xmitpriv);
|
|
|
|
_rtw_init_sta_recv_priv(&psta->sta_recvpriv);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
#ifdef CONFIG_AP_MODE
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
_rtw_init_listhead(&psta->asoc_list);
|
|
|
|
|
|
|
|
_rtw_init_listhead(&psta->auth_list);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->expire_to = 0;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->flags = 0;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->capability = 0;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
psta->bpairwise_key_installed = _FALSE;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_RTW_80211R
|
|
|
|
psta->ft_pairwise_key_installed = _FALSE;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NATIVEAP_MLME
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->nonerp_set = 0;
|
|
|
|
psta->no_short_slot_time_set = 0;
|
|
|
|
psta->no_short_preamble_set = 0;
|
|
|
|
psta->no_ht_gf_set = 0;
|
|
|
|
psta->no_ht_set = 0;
|
|
|
|
psta->ht_20mhz_set = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
psta->ht_40mhz_intolerant = 0;
|
|
|
|
#endif
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_TX_MCAST2UNI
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->under_exist_checking = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
#endif /* CONFIG_TX_MCAST2UNI */
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->keep_alive_trycnt = 0;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#endif /* CONFIG_AP_MODE */
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
rtw_st_ctl_init(&psta->st_ctl);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
u32 _rtw_init_sta_priv(struct sta_priv *pstapriv)
|
|
|
|
{
|
|
|
|
struct sta_info *psta;
|
|
|
|
s32 i;
|
|
|
|
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
pstapriv->pallocated_stainfo_buf = rtw_zvmalloc(sizeof(struct sta_info) * NUM_STA + 4);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2015-08-15 18:02:34 +00:00
|
|
|
if (!pstapriv->pallocated_stainfo_buf)
|
2013-05-08 21:45:39 +00:00
|
|
|
return _FAIL;
|
|
|
|
|
2014-12-19 06:59:46 +00:00
|
|
|
pstapriv->pstainfo_buf = pstapriv->pallocated_stainfo_buf + 4 -
|
2018-10-15 00:07:45 +00:00
|
|
|
((SIZE_PTR)(pstapriv->pallocated_stainfo_buf) & 3);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
_rtw_init_queue(&pstapriv->free_sta_queue);
|
|
|
|
|
2018-10-19 16:48:13 +00:00
|
|
|
spin_lock_init(&pstapriv->sta_hash_lock);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _rtw_init_queue(&pstapriv->asoc_q); */
|
2013-05-08 21:45:39 +00:00
|
|
|
pstapriv->asoc_sta_count = 0;
|
|
|
|
_rtw_init_queue(&pstapriv->sleep_q);
|
|
|
|
_rtw_init_queue(&pstapriv->wakeup_q);
|
|
|
|
|
|
|
|
psta = (struct sta_info *)(pstapriv->pstainfo_buf);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2015-08-15 18:06:32 +00:00
|
|
|
for (i = 0; i < NUM_STA; i++) {
|
2013-05-08 21:45:39 +00:00
|
|
|
_rtw_init_stainfo(psta);
|
|
|
|
|
|
|
|
_rtw_init_listhead(&(pstapriv->sta_hash[i]));
|
|
|
|
|
|
|
|
rtw_list_insert_tail(&psta->list, get_list_head(&pstapriv->free_sta_queue));
|
|
|
|
|
|
|
|
psta++;
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
pstapriv->adhoc_expire_to = 4; /* 4 * 2 = 8 sec */
|
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
#ifdef CONFIG_AP_MODE
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
pstapriv->sta_dz_bitmap = 0;
|
|
|
|
pstapriv->tim_bitmap = 0;
|
|
|
|
|
|
|
|
_rtw_init_listhead(&pstapriv->asoc_list);
|
|
|
|
_rtw_init_listhead(&pstapriv->auth_list);
|
2018-10-19 16:48:13 +00:00
|
|
|
spin_lock_init(&pstapriv->asoc_list_lock);
|
|
|
|
spin_lock_init(&pstapriv->auth_list_lock);
|
2013-05-08 21:45:39 +00:00
|
|
|
pstapriv->asoc_list_cnt = 0;
|
|
|
|
pstapriv->auth_list_cnt = 0;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
pstapriv->auth_to = 3; /* 3*2 = 6 sec */
|
2013-05-08 21:45:39 +00:00
|
|
|
pstapriv->assoc_to = 3;
|
2018-10-15 00:07:45 +00:00
|
|
|
/* pstapriv->expire_to = 900; */ /* 900*2 = 1800 sec = 30 min, expire after no any traffic. */
|
|
|
|
/* pstapriv->expire_to = 30; */ /* 30*2 = 60 sec = 1 min, expire after no any traffic. */
|
|
|
|
#ifdef CONFIG_ACTIVE_KEEP_ALIVE_CHECK
|
|
|
|
pstapriv->expire_to = 3; /* 3*2 = 6 sec */
|
|
|
|
#else
|
|
|
|
pstapriv->expire_to = 60;/* 60*2 = 120 sec = 2 min, expire after no any traffic. */
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_ATMEL_RC_PATCH
|
|
|
|
_rtw_memset(pstapriv->atmel_rc_pattern, 0, ETH_ALEN);
|
|
|
|
#endif
|
2013-05-08 21:45:39 +00:00
|
|
|
pstapriv->max_num_sta = NUM_STA;
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_RTW_MACADDR_ACL
|
|
|
|
_rtw_init_queue(&(pstapriv->acl_list.acl_node_q));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_RTW_PRE_LINK_STA
|
|
|
|
rtw_pre_link_sta_ctl_init(pstapriv);
|
2013-05-08 21:45:39 +00:00
|
|
|
#endif
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
return _SUCCESS;
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
inline int rtw_stainfo_offset(struct sta_priv *stapriv, struct sta_info *sta)
|
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
int offset = (((u8 *)sta) - stapriv->pstainfo_buf) / sizeof(struct sta_info);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
if (!stainfo_offset_valid(offset))
|
2018-10-15 00:07:45 +00:00
|
|
|
RTW_INFO("%s invalid offset(%d), out of range!!!", __func__, offset);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
inline struct sta_info *rtw_get_stainfo_by_offset(struct sta_priv *stapriv, int offset)
|
|
|
|
{
|
|
|
|
if (!stainfo_offset_valid(offset))
|
2018-10-15 00:07:45 +00:00
|
|
|
RTW_INFO("%s invalid offset(%d), out of range!!!", __func__, offset);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
return (struct sta_info *)(stapriv->pstainfo_buf + offset * sizeof(struct sta_info));
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
void _rtw_free_sta_xmit_priv_lock(struct sta_xmit_priv *psta_xmitpriv);
|
|
|
|
void _rtw_free_sta_xmit_priv_lock(struct sta_xmit_priv *psta_xmitpriv)
|
|
|
|
{
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&psta_xmitpriv->lock);
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&(psta_xmitpriv->be_q.sta_pending.lock));
|
|
|
|
_rtw_spinlock_free(&(psta_xmitpriv->bk_q.sta_pending.lock));
|
|
|
|
_rtw_spinlock_free(&(psta_xmitpriv->vi_q.sta_pending.lock));
|
|
|
|
_rtw_spinlock_free(&(psta_xmitpriv->vo_q.sta_pending.lock));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void _rtw_free_sta_recv_priv_lock(struct sta_recv_priv *psta_recvpriv)
|
|
|
|
{
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&psta_recvpriv->lock);
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&(psta_recvpriv->defrag_q.lock));
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
void rtw_mfree_stainfo(struct sta_info *psta);
|
|
|
|
void rtw_mfree_stainfo(struct sta_info *psta)
|
2013-05-08 21:45:39 +00:00
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
if (&psta->lock != NULL)
|
|
|
|
_rtw_spinlock_free(&psta->lock);
|
|
|
|
|
|
|
|
_rtw_free_sta_xmit_priv_lock(&psta->sta_xmitpriv);
|
|
|
|
_rtw_free_sta_recv_priv_lock(&psta->sta_recvpriv);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* this function is used to free the memory of lock || sema for all stainfos */
|
|
|
|
void rtw_mfree_all_stainfo(struct sta_priv *pstapriv);
|
|
|
|
void rtw_mfree_all_stainfo(struct sta_priv *pstapriv)
|
|
|
|
{
|
|
|
|
_irqL irqL;
|
|
|
|
_list *plist, *phead;
|
2013-05-08 21:45:39 +00:00
|
|
|
struct sta_info *psta = NULL;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_enter_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
phead = get_list_head(&pstapriv->free_sta_queue);
|
|
|
|
plist = get_next(phead);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
while ((rtw_end_of_queue_search(phead, plist)) == _FALSE) {
|
2015-08-15 18:19:16 +00:00
|
|
|
psta = LIST_CONTAINOR(plist, struct sta_info , list);
|
2013-05-08 21:45:39 +00:00
|
|
|
plist = get_next(plist);
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
rtw_mfree_stainfo(psta);
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
void rtw_mfree_sta_priv_lock(struct sta_priv *pstapriv);
|
|
|
|
void rtw_mfree_sta_priv_lock(struct sta_priv *pstapriv)
|
2013-05-08 21:45:39 +00:00
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
rtw_mfree_all_stainfo(pstapriv); /* be done before free sta_hash_lock */
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&pstapriv->free_sta_queue.lock);
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&pstapriv->sta_hash_lock);
|
|
|
|
_rtw_spinlock_free(&pstapriv->wakeup_q.lock);
|
|
|
|
_rtw_spinlock_free(&pstapriv->sleep_q.lock);
|
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
#ifdef CONFIG_AP_MODE
|
2018-10-15 00:07:45 +00:00
|
|
|
_rtw_spinlock_free(&pstapriv->asoc_list_lock);
|
|
|
|
_rtw_spinlock_free(&pstapriv->auth_list_lock);
|
2013-05-08 21:45:39 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
u32 _rtw_free_sta_priv(struct sta_priv *pstapriv)
|
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
_irqL irqL;
|
|
|
|
_list *phead, *plist;
|
2013-05-08 21:45:39 +00:00
|
|
|
struct sta_info *psta = NULL;
|
|
|
|
struct recv_reorder_ctrl *preorder_ctrl;
|
2014-12-19 06:59:46 +00:00
|
|
|
int index;
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2015-08-15 18:24:16 +00:00
|
|
|
if (pstapriv) {
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2014-12-19 06:59:46 +00:00
|
|
|
/* delete all reordering_ctrl_timer */
|
2018-10-15 00:07:45 +00:00
|
|
|
_enter_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
|
|
|
for (index = 0; index < NUM_STA; index++) {
|
2013-05-08 21:45:39 +00:00
|
|
|
phead = &(pstapriv->sta_hash[index]);
|
|
|
|
plist = get_next(phead);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
while ((rtw_end_of_queue_search(phead, plist)) == _FALSE) {
|
2014-12-19 06:59:46 +00:00
|
|
|
int i;
|
2015-08-15 18:19:16 +00:00
|
|
|
psta = LIST_CONTAINOR(plist, struct sta_info , hash_list);
|
2013-05-08 21:45:39 +00:00
|
|
|
plist = get_next(plist);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
for (i = 0; i < 16 ; i++) {
|
2013-05-08 21:45:39 +00:00
|
|
|
preorder_ctrl = &psta->recvreorder_ctrl[i];
|
2014-12-19 06:59:46 +00:00
|
|
|
_cancel_timer_ex(&preorder_ctrl->reordering_ctrl_timer);
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2013-05-08 21:45:39 +00:00
|
|
|
/*===============================*/
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_mfree_sta_priv_lock(pstapriv);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#if CONFIG_RTW_MACADDR_ACL
|
|
|
|
_rtw_deinit_queue(&(pstapriv->acl_list.acl_node_q));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_RTW_PRE_LINK_STA
|
|
|
|
rtw_pre_link_sta_ctl_deinit(pstapriv);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (pstapriv->pallocated_stainfo_buf)
|
|
|
|
rtw_vmfree(pstapriv->pallocated_stainfo_buf, sizeof(struct sta_info) * NUM_STA + 4);
|
2014-12-11 21:15:04 +00:00
|
|
|
}
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
return _SUCCESS;
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
/* struct sta_info *rtw_alloc_stainfo(_queue *pfree_sta_queue, unsigned char *hwaddr) */
|
2014-12-19 06:59:46 +00:00
|
|
|
struct sta_info *rtw_alloc_stainfo(struct sta_priv *pstapriv, u8 *hwaddr)
|
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
_irqL irqL, irqL2;
|
2014-12-11 21:15:04 +00:00
|
|
|
uint tmp_aid;
|
2013-05-08 21:45:39 +00:00
|
|
|
s32 index;
|
2018-10-15 00:07:45 +00:00
|
|
|
_list *phash_list;
|
2013-05-08 21:45:39 +00:00
|
|
|
struct sta_info *psta;
|
2018-10-15 00:07:45 +00:00
|
|
|
_queue *pfree_sta_queue;
|
2013-05-08 21:45:39 +00:00
|
|
|
struct recv_reorder_ctrl *preorder_ctrl;
|
|
|
|
int i = 0;
|
|
|
|
u16 wRxSeqInitialValue = 0xffff;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
pfree_sta_queue = &pstapriv->free_sta_queue;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _enter_critical_bh(&(pfree_sta_queue->lock), &irqL); */
|
|
|
|
_enter_critical_bh(&(pstapriv->sta_hash_lock), &irqL2);
|
|
|
|
if (_rtw_queue_empty(pfree_sta_queue) == _TRUE) {
|
|
|
|
/* _exit_critical_bh(&(pfree_sta_queue->lock), &irqL); */
|
|
|
|
_exit_critical_bh(&(pstapriv->sta_hash_lock), &irqL2);
|
2013-05-08 21:45:39 +00:00
|
|
|
psta = NULL;
|
2015-01-29 21:27:28 +00:00
|
|
|
} else {
|
2013-05-08 21:45:39 +00:00
|
|
|
psta = LIST_CONTAINOR(get_next(&pfree_sta_queue->queue), struct sta_info, list);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_list_delete(&(psta->list));
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _exit_critical_bh(&(pfree_sta_queue->lock), &irqL); */
|
|
|
|
|
2014-12-19 06:59:46 +00:00
|
|
|
tmp_aid = psta->aid;
|
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
_rtw_init_stainfo(psta);
|
2014-12-11 21:15:04 +00:00
|
|
|
|
|
|
|
psta->padapter = pstapriv->padapter;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_rtw_memcpy(psta->hwaddr, hwaddr, ETH_ALEN);
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
index = wifi_mac_hash(hwaddr);
|
2014-12-11 21:15:04 +00:00
|
|
|
|
|
|
|
|
2015-08-15 18:24:16 +00:00
|
|
|
if (index >= NUM_STA) {
|
2015-08-15 18:19:16 +00:00
|
|
|
psta = NULL;
|
2013-05-08 21:45:39 +00:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
phash_list = &(pstapriv->sta_hash[index]);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _enter_critical_bh(&(pstapriv->sta_hash_lock), &irqL2); */
|
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_list_insert_tail(&psta->hash_list, phash_list);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
pstapriv->asoc_sta_count++;
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _exit_critical_bh(&(pstapriv->sta_hash_lock), &irqL2); */
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* Commented by Albert 2009/08/13
|
|
|
|
* For the SMC router, the sequence number of first packet of WPS handshake will be 0.
|
|
|
|
* In this case, this packet will be dropped by recv_decache function if we use the 0x00 as the default value for tid_rxseq variable.
|
|
|
|
* So, we initialize the tid_rxseq variable as the 0xffff. */
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
_rtw_memcpy(&psta->sta_recvpriv.rxcache.tid_rxseq[i], &wRxSeqInitialValue, 2);
|
|
|
|
_rtw_memset(&psta->sta_recvpriv.rxcache.iv[i], 0, sizeof(psta->sta_recvpriv.rxcache.iv[i]));
|
|
|
|
}
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
init_addba_retry_timer(pstapriv->padapter, psta);
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_IEEE80211W
|
|
|
|
init_dot11w_expire_timer(pstapriv->padapter, psta);
|
|
|
|
#endif /* CONFIG_IEEE80211W */
|
|
|
|
#ifdef CONFIG_TDLS
|
|
|
|
rtw_init_tdls_timer(pstapriv->padapter, psta);
|
|
|
|
#endif /* CONFIG_TDLS */
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* for A-MPDU Rx reordering buffer control */
|
2018-10-15 00:07:45 +00:00
|
|
|
for (i = 0; i < 16 ; i++) {
|
2013-05-08 21:45:39 +00:00
|
|
|
preorder_ctrl = &psta->recvreorder_ctrl[i];
|
|
|
|
|
|
|
|
preorder_ctrl->padapter = pstapriv->padapter;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
preorder_ctrl->enable = _FALSE;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
preorder_ctrl->indicate_seq = 0xffff;
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef DBG_RX_SEQ
|
|
|
|
RTW_INFO("DBG_RX_SEQ %s:%d IndicateSeq: %d\n", __FUNCTION__, __LINE__,
|
|
|
|
preorder_ctrl->indicate_seq);
|
|
|
|
#endif
|
2015-08-15 18:19:16 +00:00
|
|
|
preorder_ctrl->wend_b = 0xffff;
|
2015-02-19 21:34:32 +00:00
|
|
|
/* preorder_ctrl->wsize_b = (NR_RECVBUFF-2); */
|
|
|
|
preorder_ctrl->wsize_b = 64;/* 64; */
|
2018-10-15 00:07:45 +00:00
|
|
|
preorder_ctrl->ampdu_size = RX_AMPDU_SIZE_INVALID;
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
_rtw_init_queue(&preorder_ctrl->pending_recvframe_queue);
|
|
|
|
|
|
|
|
rtw_init_recv_timer(preorder_ctrl);
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* init for DM */
|
2018-10-15 00:07:45 +00:00
|
|
|
psta->rssi_stat.undecorated_smoothed_pwdb = (-1);
|
|
|
|
psta->rssi_stat.undecorated_smoothed_cck = (-1);
|
|
|
|
#ifdef CONFIG_ATMEL_RC_PATCH
|
|
|
|
psta->flag_atmel_rc = 0;
|
|
|
|
#endif
|
2013-05-08 21:45:39 +00:00
|
|
|
/* init for the sequence number of received management frame */
|
|
|
|
psta->RxMgmtFrameSeqNum = 0xffff;
|
2018-10-15 00:07:45 +00:00
|
|
|
psta->ra_rpt_linked = _FALSE;
|
|
|
|
|
|
|
|
rtw_alloc_macid(pstapriv->padapter, psta);
|
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
exit:
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
_exit_critical_bh(&(pstapriv->sta_hash_lock), &irqL2);
|
|
|
|
|
|
|
|
|
|
|
|
if (psta)
|
|
|
|
rtw_mi_update_iface_status(&(pstapriv->padapter->mlmepriv), 0);
|
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
return psta;
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
/* using pstapriv->sta_hash_lock to protect */
|
|
|
|
u32 rtw_free_stainfo(_adapter *padapter , struct sta_info *psta)
|
2014-12-19 06:59:46 +00:00
|
|
|
{
|
2013-05-08 21:45:39 +00:00
|
|
|
int i;
|
2018-10-15 00:07:45 +00:00
|
|
|
_irqL irqL0;
|
|
|
|
_queue *pfree_sta_queue;
|
2013-05-08 21:45:39 +00:00
|
|
|
struct recv_reorder_ctrl *preorder_ctrl;
|
|
|
|
struct sta_xmit_priv *pstaxmitpriv;
|
2015-08-15 18:19:16 +00:00
|
|
|
struct xmit_priv *pxmitpriv = &padapter->xmitpriv;
|
2013-05-08 21:45:39 +00:00
|
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
2014-12-11 21:15:04 +00:00
|
|
|
struct hw_xmit *phwxmit;
|
2018-10-15 00:07:45 +00:00
|
|
|
int pending_qcnt[4];
|
|
|
|
u8 is_pre_link_sta = _FALSE;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
if (psta == NULL)
|
|
|
|
goto exit;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
is_pre_link_sta = rtw_is_pre_link_sta(pstapriv, psta->hwaddr);
|
|
|
|
|
|
|
|
if (is_pre_link_sta == _FALSE) {
|
|
|
|
_enter_critical_bh(&(pstapriv->sta_hash_lock), &irqL0);
|
|
|
|
rtw_list_delete(&psta->hash_list);
|
|
|
|
pstapriv->asoc_sta_count--;
|
|
|
|
_exit_critical_bh(&(pstapriv->sta_hash_lock), &irqL0);
|
|
|
|
rtw_mi_update_iface_status(&(padapter->mlmepriv), 0);
|
|
|
|
} else {
|
|
|
|
_enter_critical_bh(&psta->lock, &irqL0);
|
|
|
|
psta->state = WIFI_FW_PRE_LINK;
|
|
|
|
_exit_critical_bh(&psta->lock, &irqL0);
|
|
|
|
}
|
|
|
|
|
|
|
|
_enter_critical_bh(&psta->lock, &irqL0);
|
2014-12-11 21:15:04 +00:00
|
|
|
psta->state &= ~_FW_LINKED;
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&psta->lock, &irqL0);
|
2014-12-11 21:15:04 +00:00
|
|
|
|
|
|
|
pfree_sta_queue = &pstapriv->free_sta_queue;
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
pstaxmitpriv = &psta->sta_xmitpriv;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* rtw_list_delete(&psta->sleep_list); */
|
|
|
|
|
|
|
|
/* rtw_list_delete(&psta->wakeup_list); */
|
|
|
|
|
|
|
|
_enter_critical_bh(&pxmitpriv->lock, &irqL0);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_free_xmitframe_queue(pxmitpriv, &psta->sleep_q);
|
|
|
|
psta->sleepq_len = 0;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* vo */
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _enter_critical_bh(&(pxmitpriv->vo_pending.lock), &irqL0); */
|
|
|
|
rtw_free_xmitframe_queue(pxmitpriv, &pstaxmitpriv->vo_q.sta_pending);
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_list_delete(&(pstaxmitpriv->vo_q.tx_pending));
|
2014-12-11 21:15:04 +00:00
|
|
|
phwxmit = pxmitpriv->hwxmits;
|
|
|
|
phwxmit->accnt -= pstaxmitpriv->vo_q.qcnt;
|
2018-10-15 00:07:45 +00:00
|
|
|
pending_qcnt[0] = pstaxmitpriv->vo_q.qcnt;
|
2014-12-11 21:15:04 +00:00
|
|
|
pstaxmitpriv->vo_q.qcnt = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _exit_critical_bh(&(pxmitpriv->vo_pending.lock), &irqL0); */
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* vi */
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _enter_critical_bh(&(pxmitpriv->vi_pending.lock), &irqL0); */
|
|
|
|
rtw_free_xmitframe_queue(pxmitpriv, &pstaxmitpriv->vi_q.sta_pending);
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_list_delete(&(pstaxmitpriv->vi_q.tx_pending));
|
2018-10-15 00:07:45 +00:00
|
|
|
phwxmit = pxmitpriv->hwxmits + 1;
|
2014-12-11 21:15:04 +00:00
|
|
|
phwxmit->accnt -= pstaxmitpriv->vi_q.qcnt;
|
2018-10-15 00:07:45 +00:00
|
|
|
pending_qcnt[1] = pstaxmitpriv->vi_q.qcnt;
|
2014-12-11 21:15:04 +00:00
|
|
|
pstaxmitpriv->vi_q.qcnt = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _exit_critical_bh(&(pxmitpriv->vi_pending.lock), &irqL0); */
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* be */
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _enter_critical_bh(&(pxmitpriv->be_pending.lock), &irqL0); */
|
|
|
|
rtw_free_xmitframe_queue(pxmitpriv, &pstaxmitpriv->be_q.sta_pending);
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_list_delete(&(pstaxmitpriv->be_q.tx_pending));
|
2018-10-15 00:07:45 +00:00
|
|
|
phwxmit = pxmitpriv->hwxmits + 2;
|
2014-12-11 21:15:04 +00:00
|
|
|
phwxmit->accnt -= pstaxmitpriv->be_q.qcnt;
|
2018-10-15 00:07:45 +00:00
|
|
|
pending_qcnt[2] = pstaxmitpriv->be_q.qcnt;
|
2014-12-11 21:15:04 +00:00
|
|
|
pstaxmitpriv->be_q.qcnt = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _exit_critical_bh(&(pxmitpriv->be_pending.lock), &irqL0); */
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* bk */
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _enter_critical_bh(&(pxmitpriv->bk_pending.lock), &irqL0); */
|
|
|
|
rtw_free_xmitframe_queue(pxmitpriv, &pstaxmitpriv->bk_q.sta_pending);
|
2014-12-11 21:15:04 +00:00
|
|
|
rtw_list_delete(&(pstaxmitpriv->bk_q.tx_pending));
|
2018-10-15 00:07:45 +00:00
|
|
|
phwxmit = pxmitpriv->hwxmits + 3;
|
2014-12-11 21:15:04 +00:00
|
|
|
phwxmit->accnt -= pstaxmitpriv->bk_q.qcnt;
|
2018-10-15 00:07:45 +00:00
|
|
|
pending_qcnt[3] = pstaxmitpriv->bk_q.qcnt;
|
2014-12-11 21:15:04 +00:00
|
|
|
pstaxmitpriv->bk_q.qcnt = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _exit_critical_bh(&(pxmitpriv->bk_pending.lock), &irqL0); */
|
|
|
|
|
|
|
|
rtw_os_wake_queue_at_free_stainfo(padapter, pending_qcnt);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&pxmitpriv->lock, &irqL0);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
/* re-init sta_info; 20061114 */ /* will be init in alloc_stainfo */
|
|
|
|
/* _rtw_init_sta_xmit_priv(&psta->sta_xmitpriv); */
|
|
|
|
/* _rtw_init_sta_recv_priv(&psta->sta_recvpriv); */
|
|
|
|
#ifdef CONFIG_IEEE80211W
|
|
|
|
_cancel_timer_ex(&psta->dot11w_expire_timer);
|
|
|
|
#endif /* CONFIG_IEEE80211W */
|
2013-05-08 21:45:39 +00:00
|
|
|
_cancel_timer_ex(&psta->addba_retry_timer);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_TDLS
|
|
|
|
psta->tdls_sta_state = TDLS_STATE_NONE;
|
|
|
|
rtw_free_tdls_timer(psta);
|
|
|
|
#endif /* CONFIG_TDLS */
|
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* for A-MPDU Rx reordering buffer control, cancel reordering_ctrl_timer */
|
2018-10-15 00:07:45 +00:00
|
|
|
for (i = 0; i < 16 ; i++) {
|
|
|
|
_irqL irqL;
|
|
|
|
_list *phead, *plist;
|
2013-05-08 21:45:39 +00:00
|
|
|
union recv_frame *prframe;
|
2018-10-15 00:07:45 +00:00
|
|
|
_queue *ppending_recvframe_queue;
|
|
|
|
_queue *pfree_recv_queue = &padapter->recvpriv.free_recv_queue;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
preorder_ctrl = &psta->recvreorder_ctrl[i];
|
|
|
|
|
2014-12-19 06:59:46 +00:00
|
|
|
_cancel_timer_ex(&preorder_ctrl->reordering_ctrl_timer);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
ppending_recvframe_queue = &preorder_ctrl->pending_recvframe_queue;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_enter_critical_bh(&ppending_recvframe_queue->lock, &irqL);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
phead = get_list_head(ppending_recvframe_queue);
|
2013-05-08 21:45:39 +00:00
|
|
|
plist = get_next(phead);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
while (!rtw_is_list_empty(phead)) {
|
2013-05-08 21:45:39 +00:00
|
|
|
prframe = LIST_CONTAINOR(plist, union recv_frame, u);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
plist = get_next(plist);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
rtw_list_delete(&(prframe->u.hdr.list));
|
|
|
|
|
|
|
|
rtw_free_recvframe(prframe, pfree_recv_queue);
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&ppending_recvframe_queue->lock, &irqL);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if (!((psta->state & WIFI_AP_STATE) || MacAddr_isBcst(psta->hwaddr)) && is_pre_link_sta == _FALSE)
|
|
|
|
rtw_hal_set_odm_var(padapter, HAL_ODM_STA_INFO, psta, _FALSE);
|
|
|
|
|
|
|
|
|
|
|
|
/* release mac id for non-bc/mc station, */
|
|
|
|
if (is_pre_link_sta == _FALSE)
|
|
|
|
rtw_release_macid(pstapriv->padapter, psta);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
#ifdef CONFIG_AP_MODE
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/*
|
|
|
|
_enter_critical_bh(&pstapriv->asoc_list_lock, &irqL0);
|
|
|
|
rtw_list_delete(&psta->asoc_list);
|
|
|
|
_exit_critical_bh(&pstapriv->asoc_list_lock, &irqL0);
|
|
|
|
*/
|
|
|
|
_enter_critical_bh(&pstapriv->auth_list_lock, &irqL0);
|
2013-05-08 21:45:39 +00:00
|
|
|
if (!rtw_is_list_empty(&psta->auth_list)) {
|
|
|
|
rtw_list_delete(&psta->auth_list);
|
|
|
|
pstapriv->auth_list_cnt--;
|
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&pstapriv->auth_list_lock, &irqL0);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->expire_to = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_ATMEL_RC_PATCH
|
|
|
|
psta->flag_atmel_rc = 0;
|
|
|
|
#endif
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->sleepq_ac_len = 0;
|
|
|
|
psta->qos_info = 0;
|
|
|
|
|
|
|
|
psta->max_sp_len = 0;
|
|
|
|
psta->uapsd_bk = 0;
|
|
|
|
psta->uapsd_be = 0;
|
|
|
|
psta->uapsd_vi = 0;
|
|
|
|
psta->uapsd_vo = 0;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->has_legacy_ac = 0;
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_NATIVEAP_MLME
|
|
|
|
|
|
|
|
pstapriv->sta_dz_bitmap &= ~BIT(psta->aid);
|
|
|
|
pstapriv->tim_bitmap &= ~BIT(psta->aid);
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2015-02-19 21:34:32 +00:00
|
|
|
/* rtw_indicate_sta_disassoc_event(padapter, psta); */
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if ((psta->aid > 0) && (pstapriv->sta_aid[psta->aid - 1] == psta)) {
|
2013-05-08 21:45:39 +00:00
|
|
|
pstapriv->sta_aid[psta->aid - 1] = NULL;
|
|
|
|
psta->aid = 0;
|
2014-12-19 06:59:46 +00:00
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#endif /* CONFIG_NATIVEAP_MLME */
|
|
|
|
|
|
|
|
#ifdef CONFIG_TX_MCAST2UNI
|
2013-05-08 21:45:39 +00:00
|
|
|
psta->under_exist_checking = 0;
|
2018-10-15 00:07:45 +00:00
|
|
|
#endif /* CONFIG_TX_MCAST2UNI */
|
|
|
|
|
|
|
|
#endif /* CONFIG_AP_MODE */
|
|
|
|
|
|
|
|
rtw_st_ctl_deinit(&psta->st_ctl);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if (is_pre_link_sta == _FALSE) {
|
|
|
|
_rtw_spinlock_free(&psta->lock);
|
|
|
|
|
|
|
|
/* _enter_critical_bh(&(pfree_sta_queue->lock), &irqL0); */
|
|
|
|
_enter_critical_bh(&(pstapriv->sta_hash_lock), &irqL0);
|
|
|
|
rtw_list_insert_tail(&psta->list, get_list_head(pfree_sta_queue));
|
|
|
|
_exit_critical_bh(&(pstapriv->sta_hash_lock), &irqL0);
|
|
|
|
/* _exit_critical_bh(&(pfree_sta_queue->lock), &irqL0); */
|
|
|
|
}
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
exit:
|
|
|
|
return _SUCCESS;
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/* free all stainfo which in sta_hash[all] */
|
|
|
|
void rtw_free_all_stainfo(_adapter *padapter)
|
2013-05-08 21:45:39 +00:00
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
_irqL irqL;
|
|
|
|
_list *plist, *phead;
|
2013-05-08 21:45:39 +00:00
|
|
|
s32 index;
|
|
|
|
struct sta_info *psta = NULL;
|
|
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
2018-10-15 00:07:45 +00:00
|
|
|
struct sta_info *pbcmc_stainfo = rtw_get_bcmc_stainfo(padapter);
|
|
|
|
u8 free_sta_num = 0;
|
|
|
|
char free_sta_list[NUM_STA];
|
|
|
|
int stainfo_offset;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if (pstapriv->asoc_sta_count == 1)
|
2014-12-11 21:15:04 +00:00
|
|
|
goto exit;
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_enter_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
for (index = 0; index < NUM_STA; index++) {
|
2013-05-08 21:45:39 +00:00
|
|
|
phead = &(pstapriv->sta_hash[index]);
|
|
|
|
plist = get_next(phead);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
while ((rtw_end_of_queue_search(phead, plist)) == _FALSE) {
|
2015-08-15 18:19:16 +00:00
|
|
|
psta = LIST_CONTAINOR(plist, struct sta_info , hash_list);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
|
|
|
plist = get_next(plist);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if (pbcmc_stainfo != psta) {
|
|
|
|
if (rtw_is_pre_link_sta(pstapriv, psta->hwaddr) == _FALSE)
|
|
|
|
rtw_list_delete(&psta->hash_list);
|
|
|
|
|
|
|
|
stainfo_offset = rtw_stainfo_offset(pstapriv, psta);
|
|
|
|
if (stainfo_offset_valid(stainfo_offset))
|
|
|
|
free_sta_list[free_sta_num++] = stainfo_offset;
|
|
|
|
}
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
}
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
for (index = 0; index < free_sta_num; index++) {
|
|
|
|
psta = rtw_get_stainfo_by_offset(pstapriv, free_sta_list[index]);
|
|
|
|
rtw_free_stainfo(padapter , psta);
|
|
|
|
}
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
exit:
|
|
|
|
return;
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* any station allocated can be searched by hash list */
|
|
|
|
struct sta_info *rtw_get_stainfo(struct sta_priv *pstapriv, u8 *hwaddr)
|
|
|
|
{
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_irqL irqL;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_list *plist, *phead;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
struct sta_info *psta = NULL;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
u32 index;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
u8 *addr;
|
|
|
|
|
2015-08-15 18:19:16 +00:00
|
|
|
u8 bc_addr[ETH_ALEN] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2015-08-15 18:22:58 +00:00
|
|
|
if (hwaddr == NULL)
|
2014-12-11 21:15:04 +00:00
|
|
|
return NULL;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2015-08-15 18:02:34 +00:00
|
|
|
if (IS_MCAST(hwaddr))
|
2013-05-08 21:45:39 +00:00
|
|
|
addr = bc_addr;
|
|
|
|
else
|
|
|
|
addr = hwaddr;
|
|
|
|
|
|
|
|
index = wifi_mac_hash(addr);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_enter_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
phead = &(pstapriv->sta_hash[index]);
|
|
|
|
plist = get_next(phead);
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
while ((rtw_end_of_queue_search(phead, plist)) == _FALSE) {
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2014-12-11 21:15:04 +00:00
|
|
|
psta = LIST_CONTAINOR(plist, struct sta_info, hash_list);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if ((_rtw_memcmp(psta->hwaddr, addr, ETH_ALEN)) == _TRUE) {
|
|
|
|
/* if found the matched address */
|
2013-05-08 21:45:39 +00:00
|
|
|
break;
|
|
|
|
}
|
2015-08-15 18:31:56 +00:00
|
|
|
psta = NULL;
|
2013-05-08 21:45:39 +00:00
|
|
|
plist = get_next(plist);
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&pstapriv->sta_hash_lock, &irqL);
|
2013-05-08 21:45:39 +00:00
|
|
|
return psta;
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
u32 rtw_init_bcmc_stainfo(_adapter *padapter)
|
2013-05-08 21:45:39 +00:00
|
|
|
{
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
struct sta_info *psta;
|
2014-12-11 21:15:04 +00:00
|
|
|
struct tx_servq *ptxservq;
|
2018-10-15 00:07:45 +00:00
|
|
|
u32 res = _SUCCESS;
|
|
|
|
NDIS_802_11_MAC_ADDRESS bcast_addr = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
2018-10-15 00:07:45 +00:00
|
|
|
/* _queue *pstapending = &padapter->xmitpriv.bm_pending; */
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2013-05-19 04:28:07 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
psta = rtw_alloc_stainfo(pstapriv, bcast_addr);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2015-08-15 18:24:16 +00:00
|
|
|
if (psta == NULL) {
|
2018-10-15 00:07:45 +00:00
|
|
|
res = _FAIL;
|
2013-05-08 21:45:39 +00:00
|
|
|
goto exit;
|
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
#ifdef CONFIG_BEAMFORMING
|
|
|
|
psta->txbf_gid = 63;
|
|
|
|
psta->txbf_paid = 0;
|
|
|
|
#endif
|
|
|
|
ptxservq = &(psta->sta_xmitpriv.be_q);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
/*
|
|
|
|
_enter_critical(&pstapending->lock, &irqL0);
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if (rtw_is_list_empty(&ptxservq->tx_pending))
|
|
|
|
rtw_list_insert_tail(&ptxservq->tx_pending, get_list_head(pstapending));
|
|
|
|
|
|
|
|
_exit_critical(&pstapending->lock, &irqL0);
|
|
|
|
*/
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
exit:
|
2014-12-11 21:15:04 +00:00
|
|
|
return _SUCCESS;
|
2018-10-15 00:07:45 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
struct sta_info *rtw_get_bcmc_stainfo(_adapter *padapter)
|
2014-12-11 21:15:04 +00:00
|
|
|
{
|
2018-10-15 00:07:45 +00:00
|
|
|
struct sta_info *psta;
|
|
|
|
struct sta_priv *pstapriv = &padapter->stapriv;
|
2015-08-15 18:19:16 +00:00
|
|
|
u8 bc_addr[ETH_ALEN] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
|
2018-10-15 00:07:45 +00:00
|
|
|
psta = rtw_get_stainfo(pstapriv, bc_addr);
|
|
|
|
return psta;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#if CONFIG_RTW_MACADDR_ACL
|
|
|
|
const char *const _acl_mode_str[] = {
|
|
|
|
"DISABLED",
|
|
|
|
"ACCEPT_UNLESS_LISTED",
|
|
|
|
"DENY_UNLESS_LISTED",
|
|
|
|
};
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
u8 rtw_access_ctrl(_adapter *adapter, u8 *mac_addr)
|
|
|
|
{
|
|
|
|
u8 res = _TRUE;
|
|
|
|
_irqL irqL;
|
|
|
|
_list *list, *head;
|
|
|
|
struct rtw_wlan_acl_node *acl_node;
|
|
|
|
u8 match = _FALSE;
|
|
|
|
struct sta_priv *stapriv = &adapter->stapriv;
|
|
|
|
struct wlan_acl_pool *acl = &stapriv->acl_list;
|
|
|
|
_queue *acl_node_q = &acl->acl_node_q;
|
|
|
|
|
|
|
|
_enter_critical_bh(&(acl_node_q->lock), &irqL);
|
|
|
|
head = get_list_head(acl_node_q);
|
|
|
|
list = get_next(head);
|
|
|
|
while (rtw_end_of_queue_search(head, list) == _FALSE) {
|
|
|
|
acl_node = LIST_CONTAINOR(list, struct rtw_wlan_acl_node, list);
|
|
|
|
list = get_next(list);
|
|
|
|
|
|
|
|
if (_rtw_memcmp(acl_node->addr, mac_addr, ETH_ALEN)) {
|
|
|
|
if (acl_node->valid == _TRUE) {
|
|
|
|
match = _TRUE;
|
2013-05-08 21:45:39 +00:00
|
|
|
break;
|
|
|
|
}
|
2014-12-19 06:59:46 +00:00
|
|
|
}
|
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
_exit_critical_bh(&(acl_node_q->lock), &irqL);
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
if (acl->mode == RTW_ACL_MODE_ACCEPT_UNLESS_LISTED)
|
|
|
|
res = (match == _TRUE) ? _FALSE : _TRUE;
|
|
|
|
else if (acl->mode == RTW_ACL_MODE_DENY_UNLESS_LISTED)
|
|
|
|
res = (match == _TRUE) ? _TRUE : _FALSE;
|
2013-05-08 21:45:39 +00:00
|
|
|
else
|
2018-10-15 00:07:45 +00:00
|
|
|
res = _TRUE;
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
void dump_macaddr_acl(void *sel, _adapter *adapter)
|
|
|
|
{
|
|
|
|
struct sta_priv *stapriv = &adapter->stapriv;
|
|
|
|
struct wlan_acl_pool *acl = &stapriv->acl_list;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
RTW_PRINT_SEL(sel, "mode:%s(%d)\n", acl_mode_str(acl->mode), acl->mode);
|
|
|
|
RTW_PRINT_SEL(sel, "num:%d/%d\n", acl->num, NUM_ACL);
|
|
|
|
for (i = 0; i < NUM_ACL; i++) {
|
|
|
|
if (acl->aclnode[i].valid == _FALSE)
|
|
|
|
continue;
|
|
|
|
RTW_PRINT_SEL(sel, MAC_FMT"\n", MAC_ARG(acl->aclnode[i].addr));
|
2014-12-19 06:59:46 +00:00
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_RTW_MACADDR_ACL */
|
2014-12-19 06:59:46 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
bool rtw_is_pre_link_sta(struct sta_priv *stapriv, u8 *addr)
|
|
|
|
{
|
|
|
|
#if CONFIG_RTW_PRE_LINK_STA
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
struct sta_info *sta = NULL;
|
|
|
|
u8 exist = _FALSE;
|
|
|
|
int i;
|
|
|
|
_irqL irqL;
|
|
|
|
|
|
|
|
_enter_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
for (i = 0; i < RTW_PRE_LINK_STA_NUM; i++) {
|
|
|
|
if (pre_link_sta_ctl->node[i].valid == _TRUE
|
|
|
|
&& _rtw_memcmp(pre_link_sta_ctl->node[i].addr, addr, ETH_ALEN) == _TRUE
|
|
|
|
) {
|
|
|
|
exist = _TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_exit_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
|
|
|
|
return exist;
|
|
|
|
#else
|
|
|
|
return _FALSE;
|
2013-05-08 21:45:39 +00:00
|
|
|
#endif
|
2018-10-15 00:07:45 +00:00
|
|
|
}
|
2013-05-08 21:45:39 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
#if CONFIG_RTW_PRE_LINK_STA
|
|
|
|
struct sta_info *rtw_pre_link_sta_add(struct sta_priv *stapriv, u8 *hwaddr)
|
|
|
|
{
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
struct pre_link_sta_node_t *node = NULL;
|
|
|
|
struct sta_info *sta = NULL;
|
|
|
|
u8 exist = _FALSE;
|
|
|
|
int i;
|
|
|
|
_irqL irqL;
|
|
|
|
|
|
|
|
if (rtw_check_invalid_mac_address(hwaddr, _FALSE) == _TRUE)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
_enter_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
for (i = 0; i < RTW_PRE_LINK_STA_NUM; i++) {
|
|
|
|
if (pre_link_sta_ctl->node[i].valid == _TRUE
|
|
|
|
&& _rtw_memcmp(pre_link_sta_ctl->node[i].addr, hwaddr, ETH_ALEN) == _TRUE
|
|
|
|
) {
|
|
|
|
node = &pre_link_sta_ctl->node[i];
|
|
|
|
exist = _TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (node == NULL && pre_link_sta_ctl->node[i].valid == _FALSE)
|
|
|
|
node = &pre_link_sta_ctl->node[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (exist == _FALSE && node) {
|
|
|
|
_rtw_memcpy(node->addr, hwaddr, ETH_ALEN);
|
|
|
|
node->valid = _TRUE;
|
|
|
|
pre_link_sta_ctl->num++;
|
|
|
|
}
|
|
|
|
_exit_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
|
|
|
|
if (node == NULL)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
sta = rtw_get_stainfo(stapriv, hwaddr);
|
|
|
|
if (sta)
|
|
|
|
goto odm_hook;
|
|
|
|
|
|
|
|
sta = rtw_alloc_stainfo(stapriv, hwaddr);
|
|
|
|
if (!sta)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
sta->state = WIFI_FW_PRE_LINK;
|
2014-12-11 21:15:04 +00:00
|
|
|
|
2018-10-15 00:07:45 +00:00
|
|
|
odm_hook:
|
|
|
|
rtw_hal_set_odm_var(stapriv->padapter, HAL_ODM_STA_INFO, sta, _TRUE);
|
|
|
|
|
|
|
|
exit:
|
|
|
|
return sta;
|
2013-05-08 21:45:39 +00:00
|
|
|
}
|
2018-10-15 00:07:45 +00:00
|
|
|
|
|
|
|
void rtw_pre_link_sta_del(struct sta_priv *stapriv, u8 *hwaddr)
|
|
|
|
{
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
struct pre_link_sta_node_t *node = NULL;
|
|
|
|
struct sta_info *sta = NULL;
|
|
|
|
u8 exist = _FALSE;
|
|
|
|
int i;
|
|
|
|
_irqL irqL;
|
|
|
|
|
|
|
|
if (rtw_check_invalid_mac_address(hwaddr, _FALSE) == _TRUE)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
_enter_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
for (i = 0; i < RTW_PRE_LINK_STA_NUM; i++) {
|
|
|
|
if (pre_link_sta_ctl->node[i].valid == _TRUE
|
|
|
|
&& _rtw_memcmp(pre_link_sta_ctl->node[i].addr, hwaddr, ETH_ALEN) == _TRUE
|
|
|
|
) {
|
|
|
|
node = &pre_link_sta_ctl->node[i];
|
|
|
|
exist = _TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (exist == _TRUE && node) {
|
|
|
|
node->valid = _FALSE;
|
|
|
|
pre_link_sta_ctl->num--;
|
|
|
|
}
|
|
|
|
_exit_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
|
|
|
|
if (exist == _FALSE)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
sta = rtw_get_stainfo(stapriv, hwaddr);
|
|
|
|
if (!sta)
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
if (sta->state == WIFI_FW_PRE_LINK)
|
|
|
|
rtw_free_stainfo(stapriv->padapter, sta);
|
|
|
|
|
|
|
|
exit:
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
void rtw_pre_link_sta_ctl_reset(struct sta_priv *stapriv)
|
|
|
|
{
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
struct pre_link_sta_node_t *node = NULL;
|
|
|
|
struct sta_info *sta = NULL;
|
|
|
|
int i, j = 0;
|
|
|
|
_irqL irqL;
|
|
|
|
|
|
|
|
u8 addrs[RTW_PRE_LINK_STA_NUM][ETH_ALEN];
|
|
|
|
|
|
|
|
_rtw_memset(addrs, 0, RTW_PRE_LINK_STA_NUM * ETH_ALEN);
|
|
|
|
|
|
|
|
_enter_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
for (i = 0; i < RTW_PRE_LINK_STA_NUM; i++) {
|
|
|
|
if (pre_link_sta_ctl->node[i].valid == _FALSE)
|
|
|
|
continue;
|
|
|
|
_rtw_memcpy(&(addrs[j][0]), pre_link_sta_ctl->node[i].addr, ETH_ALEN);
|
|
|
|
pre_link_sta_ctl->node[i].valid = _FALSE;
|
|
|
|
pre_link_sta_ctl->num--;
|
|
|
|
j++;
|
|
|
|
}
|
|
|
|
_exit_critical_bh(&(pre_link_sta_ctl->lock), &irqL);
|
|
|
|
|
|
|
|
for (i = 0; i < j; i++) {
|
|
|
|
sta = rtw_get_stainfo(stapriv, &(addrs[i][0]));
|
|
|
|
if (!sta)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (sta->state == WIFI_FW_PRE_LINK)
|
|
|
|
rtw_free_stainfo(stapriv->padapter, sta);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void rtw_pre_link_sta_ctl_init(struct sta_priv *stapriv)
|
|
|
|
{
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
int i;
|
|
|
|
|
2018-10-19 16:48:13 +00:00
|
|
|
spin_lock_init(&pre_link_sta_ctl->lock);
|
2018-10-15 00:07:45 +00:00
|
|
|
pre_link_sta_ctl->num = 0;
|
|
|
|
for (i = 0; i < RTW_PRE_LINK_STA_NUM; i++)
|
|
|
|
pre_link_sta_ctl->node[i].valid = _FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
void rtw_pre_link_sta_ctl_deinit(struct sta_priv *stapriv)
|
|
|
|
{
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
rtw_pre_link_sta_ctl_reset(stapriv);
|
|
|
|
|
|
|
|
_rtw_spinlock_free(&pre_link_sta_ctl->lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
void dump_pre_link_sta_ctl(void *sel, struct sta_priv *stapriv)
|
|
|
|
{
|
|
|
|
struct pre_link_sta_ctl_t *pre_link_sta_ctl = &stapriv->pre_link_sta_ctl;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
RTW_PRINT_SEL(sel, "num:%d/%d\n", pre_link_sta_ctl->num, RTW_PRE_LINK_STA_NUM);
|
|
|
|
|
|
|
|
for (i = 0; i < RTW_PRE_LINK_STA_NUM; i++) {
|
|
|
|
if (pre_link_sta_ctl->node[i].valid == _FALSE)
|
|
|
|
continue;
|
|
|
|
RTW_PRINT_SEL(sel, MAC_FMT"\n", MAC_ARG(pre_link_sta_ctl->node[i].addr));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_RTW_PRE_LINK_STA */
|
|
|
|
|