dp_txrx_wds.c 32 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129
  1. /*
  2. * Copyright (c) 2016-2020 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "../../../cmn_dev/fw_hdr/fw/htt.h"
  19. #include "dp_peer.h"
  20. #include "hal_rx.h"
  21. #include "hal_api.h"
  22. #include "qdf_nbuf.h"
  23. #include "dp_types.h"
  24. #include "dp_internal.h"
  25. #include "dp_tx.h"
  26. #include "enet.h"
  27. #include "dp_txrx_wds.h"
  28. /* Generic AST entry aging timer value */
  29. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  30. #define DP_VLAN_UNTAGGED 0
  31. #define DP_VLAN_TAGGED_MULTICAST 1
  32. #define DP_VLAN_TAGGED_UNICAST 2
  33. #define DP_MAX_VLAN_IDS 4096
  34. #define DP_INVALID_AST_IDX 0xffff
  35. #define DP_INVALID_FLOW_PRIORITY 0xff
  36. #define DP_PEER_AST0_FLOW_MASK 0x4
  37. #define DP_PEER_AST1_FLOW_MASK 0x8
  38. #define DP_PEER_AST2_FLOW_MASK 0x1
  39. #define DP_PEER_AST3_FLOW_MASK 0x2
  40. #define DP_MAX_AST_INDEX_PER_PEER 4
  41. static void dp_ast_aging_timer_fn(void *soc_hdl)
  42. {
  43. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  44. struct dp_pdev *pdev;
  45. struct dp_vdev *vdev;
  46. struct dp_peer *peer;
  47. struct dp_ast_entry *ase, *temp_ase;
  48. int i;
  49. bool check_wds_ase = false;
  50. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  51. soc->wds_ast_aging_timer_cnt = 0;
  52. check_wds_ase = true;
  53. }
  54. /* Peer list access lock */
  55. qdf_spin_lock_bh(&soc->peer_ref_mutex);
  56. /* AST list access lock */
  57. qdf_spin_lock_bh(&soc->ast_lock);
  58. for (i = 0; i < MAX_PDEV_CNT && soc->pdev_list[i]; i++) {
  59. pdev = soc->pdev_list[i];
  60. qdf_spin_lock_bh(&pdev->vdev_list_lock);
  61. DP_PDEV_ITERATE_VDEV_LIST(pdev, vdev) {
  62. DP_VDEV_ITERATE_PEER_LIST(vdev, peer) {
  63. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  64. /*
  65. * Do not expire static ast entries
  66. * and HM WDS entries
  67. */
  68. if (ase->type !=
  69. CDP_TXRX_AST_TYPE_WDS &&
  70. ase->type !=
  71. CDP_TXRX_AST_TYPE_MEC &&
  72. ase->type !=
  73. CDP_TXRX_AST_TYPE_DA)
  74. continue;
  75. /* Expire MEC entry every n sec.
  76. * This needs to be expired in
  77. * case if STA backbone is made as
  78. * AP backbone, In this case it needs
  79. * to be re-added as a WDS entry.
  80. */
  81. if (ase->is_active && ase->type ==
  82. CDP_TXRX_AST_TYPE_MEC) {
  83. ase->is_active = FALSE;
  84. continue;
  85. } else if (ase->is_active &&
  86. check_wds_ase) {
  87. ase->is_active = FALSE;
  88. continue;
  89. }
  90. if (ase->type ==
  91. CDP_TXRX_AST_TYPE_MEC) {
  92. DP_STATS_INC(soc,
  93. ast.aged_out, 1);
  94. dp_peer_del_ast(soc, ase);
  95. } else if (check_wds_ase) {
  96. DP_STATS_INC(soc,
  97. ast.aged_out, 1);
  98. dp_peer_del_ast(soc, ase);
  99. }
  100. }
  101. }
  102. }
  103. qdf_spin_unlock_bh(&pdev->vdev_list_lock);
  104. }
  105. qdf_spin_unlock_bh(&soc->ast_lock);
  106. qdf_spin_unlock_bh(&soc->peer_ref_mutex);
  107. if (qdf_atomic_read(&soc->cmn_init_done))
  108. qdf_timer_mod(&soc->ast_aging_timer,
  109. DP_AST_AGING_TIMER_DEFAULT_MS);
  110. }
  111. /*
  112. * dp_soc_wds_attach() - Setup WDS timer and AST table
  113. * @soc: Datapath SOC handle
  114. *
  115. * Return: None
  116. */
  117. void dp_soc_wds_attach(struct dp_soc *soc)
  118. {
  119. soc->wds_ast_aging_timer_cnt = 0;
  120. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  121. dp_ast_aging_timer_fn, (void *)soc,
  122. QDF_TIMER_TYPE_WAKE_APPS);
  123. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  124. }
  125. /*
  126. * dp_soc_wds_detach() - Detach WDS data structures and timers
  127. * @txrx_soc: DP SOC handle
  128. *
  129. * Return: None
  130. */
  131. void dp_soc_wds_detach(struct dp_soc *soc)
  132. {
  133. qdf_timer_stop(&soc->ast_aging_timer);
  134. qdf_timer_free(&soc->ast_aging_timer);
  135. }
  136. /**
  137. * dp_rx_da_learn() - Add AST entry based on DA lookup
  138. * This is a WAR for HK 1.0 and will
  139. * be removed in HK 2.0
  140. *
  141. * @soc: core txrx main context
  142. * @rx_tlv_hdr : start address of rx tlvs
  143. * @ta_peer : Transmitter peer entry
  144. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  145. *
  146. */
  147. void
  148. dp_rx_da_learn(struct dp_soc *soc,
  149. uint8_t *rx_tlv_hdr,
  150. struct dp_peer *ta_peer,
  151. qdf_nbuf_t nbuf)
  152. {
  153. /* For HKv2 DA port learing is not needed */
  154. if (qdf_likely(soc->ast_override_support))
  155. return;
  156. if (qdf_unlikely(!ta_peer))
  157. return;
  158. if (qdf_unlikely(ta_peer->vdev->opmode != wlan_op_mode_ap))
  159. return;
  160. if (!soc->da_war_enabled)
  161. return;
  162. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  163. !qdf_nbuf_is_da_mcbc(nbuf))) {
  164. dp_peer_add_ast(soc,
  165. ta_peer,
  166. qdf_nbuf_data(nbuf),
  167. CDP_TXRX_AST_TYPE_DA,
  168. IEEE80211_NODE_F_WDS_HM);
  169. }
  170. }
  171. /**
  172. * dp_tx_mec_handler() - Tx MEC Notify Handler
  173. * @vdev: pointer to dp dev handler
  174. * @status : Tx completion status from HTT descriptor
  175. *
  176. * Handles MEC notify event sent from fw to Host
  177. *
  178. * Return: none
  179. */
  180. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  181. {
  182. struct dp_soc *soc;
  183. uint32_t flags = IEEE80211_NODE_F_WDS_HM;
  184. struct dp_peer *peer;
  185. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  186. if (!vdev->mec_enabled)
  187. return;
  188. /* MEC required only in STA mode */
  189. if (vdev->opmode != wlan_op_mode_sta)
  190. return;
  191. soc = vdev->pdev->soc;
  192. peer = dp_vdev_bss_peer_ref_n_get(soc, vdev);
  193. if (!peer) {
  194. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  195. FL("peer is NULL"));
  196. return;
  197. }
  198. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  199. "%s Tx MEC Handler",
  200. __func__);
  201. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  202. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  203. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  204. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE))
  205. dp_peer_add_ast(soc,
  206. peer,
  207. mac_addr,
  208. CDP_TXRX_AST_TYPE_MEC,
  209. flags);
  210. dp_peer_unref_delete(peer);
  211. }
  212. /**
  213. * dp_txrx_set_wds_rx_policy() - API to store datapath
  214. * config parameters
  215. * @soc - datapath soc handle
  216. * @vdev_id - id of datapath vdev handle
  217. * @cfg: ini parameter handle
  218. *
  219. * Return: status
  220. */
  221. #ifdef WDS_VENDOR_EXTENSION
  222. QDF_STATUS
  223. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc, uint8_t vdev_id, u_int32_t val)
  224. {
  225. struct dp_peer *peer;
  226. struct dp_vdev *vdev =
  227. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  228. vdev_id);
  229. if (!vdev) {
  230. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  231. FL("vdev is NULL for vdev_id %d"), vdev_id);
  232. return QDF_STATUS_E_INVAL;
  233. }
  234. if (vdev->opmode == wlan_op_mode_ap) {
  235. /* for ap, set it on bss_peer */
  236. TAILQ_FOREACH(peer, &vdev->peer_list, peer_list_elem) {
  237. if (peer->bss_peer) {
  238. peer->wds_ecm.wds_rx_filter = 1;
  239. peer->wds_ecm.wds_rx_ucast_4addr =
  240. (val & WDS_POLICY_RX_UCAST_4ADDR) ?
  241. 1 : 0;
  242. peer->wds_ecm.wds_rx_mcast_4addr =
  243. (val & WDS_POLICY_RX_MCAST_4ADDR) ?
  244. 1 : 0;
  245. break;
  246. }
  247. }
  248. } else if (vdev->opmode == wlan_op_mode_sta) {
  249. peer = TAILQ_FIRST(&vdev->peer_list);
  250. peer->wds_ecm.wds_rx_filter = 1;
  251. peer->wds_ecm.wds_rx_ucast_4addr =
  252. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  253. peer->wds_ecm.wds_rx_mcast_4addr =
  254. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  255. }
  256. return QDF_STATUS_SUCCESS;
  257. }
  258. /**
  259. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  260. *
  261. * @cdp_soc: DP soc handle
  262. * @vdev_id: id of vdev handle
  263. * @peer_mac: peer mac address
  264. * @wds_tx_ucast: policy for unicast transmission
  265. * @wds_tx_mcast: policy for multicast transmission
  266. *
  267. * Return: void
  268. */
  269. QDF_STATUS
  270. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  271. uint8_t *peer_mac, int wds_tx_ucast,
  272. int wds_tx_mcast)
  273. {
  274. struct dp_peer *peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  275. peer_mac, 0,
  276. vdev_id);
  277. if (!peer) {
  278. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  279. FL("peer is NULL for mac %pM vdev_id %d"),
  280. peer_mac, vdev_id);
  281. return QDF_STATUS_E_INVAL;
  282. }
  283. if (wds_tx_ucast || wds_tx_mcast) {
  284. peer->wds_enabled = 1;
  285. peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  286. peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  287. } else {
  288. peer->wds_enabled = 0;
  289. peer->wds_ecm.wds_tx_ucast_4addr = 0;
  290. peer->wds_ecm.wds_tx_mcast_4addr = 0;
  291. }
  292. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  293. "Policy Update set to :\n");
  294. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  295. "peer->wds_enabled %d\n", peer->wds_enabled);
  296. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  297. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  298. peer->wds_ecm.wds_tx_ucast_4addr);
  299. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  300. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  301. peer->wds_ecm.wds_tx_mcast_4addr);
  302. dp_peer_unref_delete(peer);
  303. return QDF_STATUS_SUCCESS;
  304. }
  305. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  306. struct dp_vdev *vdev,
  307. struct dp_peer *peer)
  308. {
  309. struct dp_peer *bss_peer;
  310. int fr_ds, to_ds, rx_3addr, rx_4addr;
  311. int rx_policy_ucast, rx_policy_mcast;
  312. hal_soc_handle_t hal_soc = vdev->pdev->soc->hal_soc;
  313. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(hal_soc, rx_tlv_hdr);
  314. if (vdev->opmode == wlan_op_mode_ap) {
  315. TAILQ_FOREACH(bss_peer, &vdev->peer_list, peer_list_elem) {
  316. if (bss_peer->bss_peer) {
  317. /* if wds policy check is not enabled on this vdev, accept all frames */
  318. if (!bss_peer->wds_ecm.wds_rx_filter) {
  319. return 1;
  320. }
  321. break;
  322. }
  323. }
  324. rx_policy_ucast = bss_peer->wds_ecm.wds_rx_ucast_4addr;
  325. rx_policy_mcast = bss_peer->wds_ecm.wds_rx_mcast_4addr;
  326. } else { /* sta mode */
  327. if (!peer->wds_ecm.wds_rx_filter) {
  328. return 1;
  329. }
  330. rx_policy_ucast = peer->wds_ecm.wds_rx_ucast_4addr;
  331. rx_policy_mcast = peer->wds_ecm.wds_rx_mcast_4addr;
  332. }
  333. /* ------------------------------------------------
  334. * self
  335. * peer- rx rx-
  336. * wds ucast mcast dir policy accept note
  337. * ------------------------------------------------
  338. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  339. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  340. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  341. * 1 1 0 00 x1 0 bad frame, won't see it
  342. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  343. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  344. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  345. * 1 0 1 00 1x 0 bad frame, won't see it
  346. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  347. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  348. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  349. * 1 1 0 00 x0 0 bad frame, won't see it
  350. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  351. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  352. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  353. * 1 0 1 00 0x 0 bad frame, won't see it
  354. *
  355. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  356. * 0 x x 01 xx 1
  357. * 0 x x 10 xx 0
  358. * 0 x x 00 xx 0 bad frame, won't see it
  359. * ------------------------------------------------
  360. */
  361. fr_ds = hal_rx_mpdu_get_fr_ds(hal_soc, rx_tlv_hdr);
  362. to_ds = hal_rx_mpdu_get_to_ds(hal_soc, rx_tlv_hdr);
  363. rx_3addr = fr_ds ^ to_ds;
  364. rx_4addr = fr_ds & to_ds;
  365. if (vdev->opmode == wlan_op_mode_ap) {
  366. if ((!peer->wds_enabled && rx_3addr && to_ds) ||
  367. (peer->wds_enabled && !rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  368. (peer->wds_enabled && rx_mcast && (rx_4addr == rx_policy_mcast))) {
  369. return 1;
  370. }
  371. } else { /* sta mode */
  372. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  373. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  374. return 1;
  375. }
  376. }
  377. return 0;
  378. }
  379. #endif
  380. /**
  381. * dp_tx_add_groupkey_metadata - Add group key in metadata
  382. * @vdev: DP vdev handle
  383. * @msdu_info: MSDU info to be setup in MSDU descriptor
  384. * @group_key: Group key index programmed in metadata
  385. *
  386. * Return: void
  387. */
  388. #ifdef QCA_MULTIPASS_SUPPORT
  389. static
  390. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  391. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  392. {
  393. struct htt_tx_msdu_desc_ext2_t *meta_data =
  394. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  395. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  396. /*
  397. * When attempting to send a multicast packet with multi-passphrase,
  398. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  399. * ref htt.h indicating the group_id field in "key_flags" also having
  400. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  401. */
  402. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  403. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  404. }
  405. /**
  406. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  407. * @vdev: DP vdev handle
  408. * @tx_desc: Tx Descriptor Handle
  409. *
  410. * Return: void
  411. */
  412. static
  413. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  414. {
  415. struct vlan_ethhdr veth_hdr;
  416. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  417. /*
  418. * Extract VLAN header of 4 bytes:
  419. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  420. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  421. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  422. */
  423. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  424. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  425. veh = (struct vlan_ethhdr *)nbuf->data;
  426. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  427. return;
  428. }
  429. /**
  430. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  431. * @vdev: DP vdev handle
  432. * @tx_desc: Tx Descriptor Handle
  433. * @vlan_id: vlan id of frame
  434. *
  435. * Return: whether peer is special or classic
  436. */
  437. static
  438. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  439. qdf_nbuf_t buf, uint16_t *vlan_id)
  440. {
  441. struct dp_peer *peer = NULL;
  442. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  443. struct vlan_ethhdr *veh = NULL;
  444. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  445. (htons(eh->ether_type) != ETH_P_8021Q));
  446. if (qdf_unlikely(not_vlan))
  447. return DP_VLAN_UNTAGGED;
  448. veh = (struct vlan_ethhdr *)eh;
  449. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  450. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  451. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  452. TAILQ_FOREACH(peer, &vdev->mpass_peer_list,
  453. mpass_peer_list_elem) {
  454. if (*vlan_id == peer->vlan_id) {
  455. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  456. return DP_VLAN_TAGGED_MULTICAST;
  457. }
  458. }
  459. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  460. return DP_VLAN_UNTAGGED;
  461. }
  462. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL);
  463. if (qdf_unlikely(peer == NULL))
  464. return DP_VLAN_UNTAGGED;
  465. /*
  466. * Do not drop the frame when vlan_id doesn't match.
  467. * Send the frame as it is.
  468. */
  469. if (*vlan_id == peer->vlan_id) {
  470. dp_peer_unref_delete(peer);
  471. return DP_VLAN_TAGGED_UNICAST;
  472. }
  473. dp_peer_unref_delete(peer);
  474. return DP_VLAN_UNTAGGED;
  475. }
  476. /**
  477. * dp_tx_multipass_process - Process vlan frames in tx path
  478. * @soc: dp soc handle
  479. * @vdev: DP vdev handle
  480. * @nbuf: skb
  481. * @msdu_info: msdu descriptor
  482. *
  483. * Return: status whether frame needs to be dropped or transmitted
  484. */
  485. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  486. qdf_nbuf_t nbuf,
  487. struct dp_tx_msdu_info_s *msdu_info)
  488. {
  489. uint16_t vlan_id = 0;
  490. uint16_t group_key = 0;
  491. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  492. qdf_nbuf_t nbuf_copy = NULL;
  493. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  494. return true;
  495. }
  496. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  497. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  498. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  499. return true;
  500. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  501. dp_tx_remove_vlan_tag(vdev, nbuf);
  502. return true;
  503. }
  504. /* AP can have classic clients, special clients &
  505. * classic repeaters.
  506. * 1. Classic clients & special client:
  507. * Remove vlan header, find corresponding group key
  508. * index, fill in metaheader and enqueue multicast
  509. * frame to TCL.
  510. * 2. Classic repeater:
  511. * Pass through to classic repeater with vlan tag
  512. * intact without any group key index. Hardware
  513. * will know which key to use to send frame to
  514. * repeater.
  515. */
  516. nbuf_copy = qdf_nbuf_copy(nbuf);
  517. /*
  518. * Send multicast frame to special peers even
  519. * if pass through to classic repeater fails.
  520. */
  521. if (nbuf_copy) {
  522. struct dp_tx_msdu_info_s msdu_info_copy;
  523. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  524. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  525. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  526. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  527. if (nbuf_copy) {
  528. qdf_nbuf_free(nbuf_copy);
  529. qdf_err("nbuf_copy send failed");
  530. }
  531. }
  532. group_key = vdev->iv_vlan_map[vlan_id];
  533. /*
  534. * If group key is not installed, drop the frame.
  535. */
  536. if (!group_key)
  537. return false;
  538. dp_tx_remove_vlan_tag(vdev, nbuf);
  539. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  540. msdu_info->exception_fw = 1;
  541. return true;
  542. }
  543. /**
  544. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  545. * @vdev: DP vdev handle
  546. * @nbuf: skb
  547. * @tid: traffic priority
  548. *
  549. * Return: bool: true in case of success else false
  550. * Success is considered if:
  551. * i. If frame has vlan header
  552. * ii. If the frame comes from different peer and dont need multipass processing
  553. * Failure is considered if:
  554. * i. Frame comes from multipass peer but doesn't contain vlan header.
  555. * In failure case, drop such frames.
  556. */
  557. bool dp_rx_multipass_process(struct dp_peer *peer, qdf_nbuf_t nbuf, uint8_t tid)
  558. {
  559. struct vlan_ethhdr *vethhdrp;
  560. if (qdf_unlikely(!peer->vlan_id))
  561. return true;
  562. vethhdrp = (struct vlan_ethhdr *)qdf_nbuf_data(nbuf);
  563. /*
  564. * h_vlan_proto & h_vlan_TCI should be 0x8100 & zero respectively
  565. * as it is expected to be padded by 0
  566. * return false if frame doesn't have above tag so that caller will
  567. * drop the frame.
  568. */
  569. if (qdf_unlikely(vethhdrp->h_vlan_proto != htons(QDF_ETH_TYPE_8021Q)) ||
  570. qdf_unlikely(vethhdrp->h_vlan_TCI != 0))
  571. return false;
  572. vethhdrp->h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  573. (peer->vlan_id & VLAN_VID_MASK));
  574. return true;
  575. }
  576. /**
  577. * dp_peer_multipass_list_remove: remove peer from list
  578. * @peer: pointer to peer
  579. *
  580. * return: void
  581. */
  582. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  583. {
  584. struct dp_vdev *vdev = peer->vdev;
  585. struct dp_peer *tpeer = NULL;
  586. bool found = 0;
  587. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  588. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  589. if (tpeer == peer) {
  590. found = 1;
  591. TAILQ_REMOVE(&vdev->mpass_peer_list, peer, mpass_peer_list_elem);
  592. break;
  593. }
  594. }
  595. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  596. if (found)
  597. dp_peer_unref_delete(peer);
  598. }
  599. /**
  600. * dp_peer_multipass_list_add: add to new multipass list
  601. * @dp_soc: soc handle
  602. * @peer_mac: mac address
  603. * @vdev_id: vdev id for peer
  604. * @vlan_id: vlan_id
  605. *
  606. * return: void
  607. */
  608. static void dp_peer_multipass_list_add(struct dp_soc *soc, uint8_t *peer_mac,
  609. uint8_t vdev_id, uint16_t vlan_id)
  610. {
  611. struct dp_peer *peer =
  612. dp_peer_find_hash_find(soc, peer_mac, 0, vdev_id);
  613. if (qdf_unlikely(!peer)) {
  614. qdf_err("NULL peer");
  615. return;
  616. }
  617. /* If peer already exists in vdev multipass list, do not add it.
  618. * This may happen if key install comes twice or re-key
  619. * happens for a peer.
  620. */
  621. if (peer->vlan_id) {
  622. dp_debug("peer already added to vdev multipass list"
  623. "MAC: "QDF_MAC_ADDR_STR" vlan: %d ",
  624. QDF_MAC_ADDR_ARRAY(peer->mac_addr.raw), peer->vlan_id);
  625. dp_peer_unref_delete(peer);
  626. return;
  627. }
  628. /*
  629. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  630. * Decrement it when element is deleted from the list.
  631. */
  632. peer->vlan_id = vlan_id;
  633. qdf_spin_lock_bh(&peer->vdev->mpass_peer_mutex);
  634. TAILQ_INSERT_HEAD(&peer->vdev->mpass_peer_list, peer,
  635. mpass_peer_list_elem);
  636. qdf_spin_unlock_bh(&peer->vdev->mpass_peer_mutex);
  637. }
  638. /**
  639. * dp_peer_set_vlan_id: set vlan_id for this peer
  640. * @cdp_soc: soc handle
  641. * @vdev_id: vdev id for peer
  642. * @peer_mac: mac address
  643. * @vlan_id: vlan id for peer
  644. *
  645. * return: void
  646. */
  647. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  648. uint8_t vdev_id, uint8_t *peer_mac,
  649. uint16_t vlan_id)
  650. {
  651. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  652. struct dp_vdev *vdev =
  653. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  654. vdev_id);
  655. if (!vdev || !vdev->multipass_en)
  656. return;
  657. dp_peer_multipass_list_add(soc, peer_mac, vdev_id, vlan_id);
  658. }
  659. /**
  660. * dp_set_vlan_groupkey: set vlan map for vdev
  661. * @soc: pointer to soc
  662. * @vdev_id : id of vdev
  663. * @vlan_id: vlan_id
  664. * @group_key: group key for vlan
  665. *
  666. * return: set success/failure
  667. */
  668. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc, uint8_t vdev_id,
  669. uint16_t vlan_id, uint16_t group_key)
  670. {
  671. struct dp_vdev *vdev =
  672. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  673. vdev_id);
  674. if (!vdev || !vdev->multipass_en)
  675. return QDF_STATUS_E_INVAL;
  676. if (!vdev->iv_vlan_map) {
  677. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  678. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  679. if (!vdev->iv_vlan_map) {
  680. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  681. return QDF_STATUS_E_NOMEM;
  682. }
  683. /*
  684. * 0 is invalid group key.
  685. * Initilalize array with invalid group keys.
  686. */
  687. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  688. }
  689. if (vlan_id >= DP_MAX_VLAN_IDS)
  690. return QDF_STATUS_E_INVAL;
  691. vdev->iv_vlan_map[vlan_id] = group_key;
  692. return QDF_STATUS_SUCCESS;
  693. }
  694. /**
  695. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  696. * @vdev_handle: pointer to vdev
  697. *
  698. * return: void
  699. */
  700. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  701. {
  702. struct dp_peer *peer = NULL;
  703. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  704. TAILQ_FOREACH(peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  705. qdf_err("Peers present in mpass list : %llx",
  706. peer->mac_addr.raw);
  707. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  708. if (vdev->iv_vlan_map) {
  709. qdf_mem_free(vdev->iv_vlan_map);
  710. vdev->iv_vlan_map = NULL;
  711. }
  712. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  713. }
  714. /**
  715. * dp_peer_multipass_list_init: initialize peer mulitpass list
  716. * @vdev_handle: pointer to vdev
  717. *
  718. * return: set success/failure
  719. */
  720. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  721. {
  722. /*
  723. * vdev->iv_vlan_map is allocated when the first configuration command
  724. * is issued to avoid unnecessary allocation for regular mode VAP.
  725. */
  726. TAILQ_INIT(&vdev->mpass_peer_list);
  727. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  728. }
  729. #endif
  730. #ifdef QCA_PEER_MULTIQ_SUPPORT
  731. /**
  732. * dp_peer_reset_flowq_map() - reset peer flowq map table
  733. * @peer - dp peer handle
  734. *
  735. * Return: none
  736. */
  737. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  738. {
  739. int i = 0;
  740. if (!peer)
  741. return;
  742. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  743. peer->peer_ast_flowq_idx[i].is_valid = false;
  744. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  745. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  746. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  747. }
  748. }
  749. /**
  750. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  751. * @peer - dp peer handle
  752. * @mask - flow mask
  753. *
  754. * Return: flow id
  755. */
  756. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  757. uint8_t mask)
  758. {
  759. if (!peer) {
  760. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  761. "%s: Invalid peer\n", __func__);
  762. return -1;
  763. }
  764. if (mask & DP_PEER_AST0_FLOW_MASK)
  765. return DP_PEER_AST_FLOWQ_UDP;
  766. else if (mask & DP_PEER_AST1_FLOW_MASK)
  767. return DP_PEER_AST_FLOWQ_NON_UDP;
  768. else if (mask & DP_PEER_AST2_FLOW_MASK)
  769. return DP_PEER_AST_FLOWQ_HI_PRIO;
  770. else if (mask & DP_PEER_AST3_FLOW_MASK)
  771. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  772. return DP_PEER_AST_FLOWQ_MAX;
  773. }
  774. /**
  775. * dp_peer_get_ast_valid() - get ast index valid from mask
  776. * @mask - mask for ast valid bits
  777. * @index - index for an ast
  778. *
  779. * Return - 1 if ast index is valid from mask else 0
  780. */
  781. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  782. {
  783. if (index == 0)
  784. return 1;
  785. return ((mask) & (1 << ((index) - 1)));
  786. }
  787. /**
  788. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  789. * @soc - genereic soc handle
  790. * @is_wds - flag to indicate if peer is wds
  791. * @peer_id - peer_id from htt peer map message
  792. * @peer_mac_addr - mac address of the peer
  793. * @ast_info - ast flow override information from peer map
  794. *
  795. * Return: none
  796. */
  797. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  798. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  799. struct dp_ast_flow_override_info *ast_info)
  800. {
  801. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  802. struct dp_peer *peer = NULL;
  803. uint8_t i;
  804. /*
  805. * Ast flow override feature is supported
  806. * only for connected client
  807. */
  808. if (is_wds)
  809. return;
  810. peer = dp_peer_find_by_id(soc, peer_id);
  811. if (!peer) {
  812. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  813. "%s: Invalid peer\n", __func__);
  814. return;
  815. }
  816. /* Valid only in AP mode */
  817. if (peer->vdev->opmode != wlan_op_mode_ap) {
  818. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  819. "%s: Peer ast flow map not in STA mode\n", __func__);
  820. /* Release peer reference */
  821. dp_peer_unref_del_find_by_id(peer);
  822. return;
  823. }
  824. /* Making sure the peer is for this mac address */
  825. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  826. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  827. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  828. "%s: Peer mac address mismatch\n", __func__);
  829. dp_peer_unref_del_find_by_id(peer);
  830. return;
  831. }
  832. /* Ast entry flow mapping not valid for self peer map */
  833. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  834. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  835. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  836. "%s: Ast flow mapping not valid for self peer \n", __func__);
  837. dp_peer_unref_del_find_by_id(peer);
  838. return;
  839. }
  840. /* Fill up ast index <---> flow id mapping table for this peer */
  841. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  842. /* Check if this ast index is valid */
  843. peer->peer_ast_flowq_idx[i].is_valid =
  844. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  845. if (!peer->peer_ast_flowq_idx[i].is_valid)
  846. continue;
  847. /* Get the flow queue id which is mapped to this ast index */
  848. peer->peer_ast_flowq_idx[i].flowQ =
  849. dp_peer_get_flowid_from_flowmask(peer,
  850. ast_info->ast_flow_mask[i]);
  851. /*
  852. * Update tid valid mask only if flow id HIGH or
  853. * Low priority
  854. */
  855. if (peer->peer_ast_flowq_idx[i].flowQ ==
  856. DP_PEER_AST_FLOWQ_HI_PRIO) {
  857. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  858. ast_info->tid_valid_hi_pri_mask;
  859. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  860. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  861. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  862. ast_info->tid_valid_low_pri_mask;
  863. }
  864. /* Save the ast index for this entry */
  865. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  866. }
  867. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  868. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  869. soc->ctrl_psoc, peer->peer_id,
  870. peer->vdev->vdev_id, peer_mac_addr);
  871. }
  872. /* Release peer reference */
  873. dp_peer_unref_del_find_by_id(peer);
  874. }
  875. /**
  876. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  877. * @soc - soc handle
  878. * @peer_mac_addr - mac address of the peer
  879. * @flow_id - flow id to find ast index
  880. *
  881. * Return: ast index for a given flow id, -1 for fail cases
  882. */
  883. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  884. uint16_t vdev_id, uint8_t *peer_mac_addr,
  885. uint8_t flow_id, uint8_t tid)
  886. {
  887. struct dp_peer *peer = NULL;
  888. uint8_t i;
  889. uint16_t ast_index;
  890. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  891. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  892. "Invalid Flow ID %d\n", flow_id);
  893. return -1;
  894. }
  895. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  896. peer_mac_addr, 0, vdev_id);
  897. if (!peer) {
  898. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  899. "%s: Invalid peer\n", __func__);
  900. return -1;
  901. }
  902. /*
  903. * Loop over the ast entry <----> flow-id mapping to find
  904. * which ast index entry has this flow queue id enabled.
  905. */
  906. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  907. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  908. /*
  909. * Found the matching index for this flow id
  910. */
  911. break;
  912. }
  913. /*
  914. * No match found for this flow id
  915. */
  916. if (i == DP_PEER_AST_FLOWQ_MAX) {
  917. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  918. "%s: ast index not found for flow %d\n", __func__, flow_id);
  919. dp_peer_unref_delete(peer);
  920. return -1;
  921. }
  922. /* Check whether this ast entry is valid */
  923. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  924. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  925. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  926. dp_peer_unref_delete(peer);
  927. return -1;
  928. }
  929. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  930. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  931. /*
  932. * check if this tid is valid for Hi
  933. * and Low priority flow id
  934. */
  935. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  936. & (1 << tid))) {
  937. /* Release peer reference */
  938. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  939. dp_peer_unref_delete(peer);
  940. return ast_index;
  941. } else {
  942. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  943. "%s: TID %d is not valid for flow %d\n",
  944. __func__, tid, flow_id);
  945. /*
  946. * TID is not valid for this flow
  947. * Return -1
  948. */
  949. dp_peer_unref_delete(peer);
  950. return -1;
  951. }
  952. }
  953. /*
  954. * TID valid check not required for
  955. * UDP/NON UDP flow id
  956. */
  957. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  958. dp_peer_unref_delete(peer);
  959. return ast_index;
  960. }
  961. #endif
  962. void dp_hmwds_ast_add_notify(struct dp_peer *peer,
  963. uint8_t *mac_addr,
  964. enum cdp_txrx_ast_entry_type type,
  965. QDF_STATUS err,
  966. bool is_peer_map)
  967. {
  968. struct dp_vdev *dp_vdev = peer->vdev;
  969. struct dp_pdev *dp_pdev = dp_vdev->pdev;
  970. struct cdp_peer_hmwds_ast_add_status add_status;
  971. /* Ignore ast types other than HM */
  972. if ((type != CDP_TXRX_AST_TYPE_WDS_HM) &&
  973. (type != CDP_TXRX_AST_TYPE_WDS_HM_SEC))
  974. return;
  975. /* existing ast delete in progress, will be attempted
  976. * to add again after delete is complete. Send status then.
  977. */
  978. if (err == QDF_STATUS_E_AGAIN)
  979. return;
  980. /* peer map pending, notify actual status
  981. * when peer map is received.
  982. */
  983. if (!is_peer_map && (err == QDF_STATUS_SUCCESS))
  984. return;
  985. qdf_mem_zero(&add_status, sizeof(add_status));
  986. add_status.vdev_id = dp_vdev->vdev_id;
  987. /* For type CDP_TXRX_AST_TYPE_WDS_HM_SEC dp_peer_add_ast()
  988. * returns QDF_STATUS_E_FAILURE as it is host only entry.
  989. * In such cases set err as success. Also err code set to
  990. * QDF_STATUS_E_ALREADY indicates entry already exist in
  991. * such cases set err as success too. Any other error code
  992. * is actual error.
  993. */
  994. if (((type == CDP_TXRX_AST_TYPE_WDS_HM_SEC) &&
  995. (err == QDF_STATUS_E_FAILURE)) ||
  996. (err == QDF_STATUS_E_ALREADY)) {
  997. err = QDF_STATUS_SUCCESS;
  998. }
  999. add_status.status = err;
  1000. qdf_mem_copy(add_status.peer_mac, peer->mac_addr.raw,
  1001. QDF_MAC_ADDR_SIZE);
  1002. qdf_mem_copy(add_status.ast_mac, mac_addr,
  1003. QDF_MAC_ADDR_SIZE);
  1004. #ifdef WDI_EVENT_ENABLE
  1005. dp_wdi_event_handler(WDI_EVENT_HMWDS_AST_ADD_STATUS, dp_pdev->soc,
  1006. (void *)&add_status, 0,
  1007. WDI_NO_VAL, dp_pdev->pdev_id);
  1008. #endif
  1009. }