qcacmn: Skip sanity of sw_cookie in RX error for KIWI

Currently the sw_cookie is validated in RX error path
using the pool_id logic, which is not valid for KIWI target.
Kiwi target has a different logic to assign rx sw_cookie, as
compared to other legacy chipsets.

Hence this sanity of sw_cookie fails always for RX error
packets on KIWI target, and these corresponding buffers are
never released/replenished back. Eventually as more RX error
packets are received, the device runs out of buffers in the
refill ring and induces a backpressure.

Hence disable this sanity check for sw_cookie in rx error
path for KIWI target.

Change-Id: I320fcb268c1fe24695daeb4677af6cc0cbc445ed
CRs-Fixed: 3228792
This commit is contained in:
Rakesh Pillai
2022-06-24 19:26:52 +05:30
committed by Madan Koyyalamudi
orang tua edd1669c23
melakukan 4b31289715
2 mengubah file dengan 2 tambahan dan 2 penghapusan

Melihat File

@@ -656,7 +656,8 @@ dp_rx_cookie_reset_invalid_bit(hal_ring_desc_t ring_desc)
#endif /* QCA_HOST_MODE_WIFI_DISABLED */
#ifdef RX_DESC_MULTI_PAGE_ALLOC
#if defined(RX_DESC_MULTI_PAGE_ALLOC) && \
defined(DP_WAR_VALIDATE_RX_ERR_MSDU_COOKIE)
/**
* dp_rx_is_sw_cookie_valid() - check whether SW cookie valid
* @soc: dp soc ref