dp_txrx_wds.c 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257
  1. /*
  2. * Copyright (c) 2016-2021 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "htt.h"
  19. #include "dp_peer.h"
  20. #include "hal_rx.h"
  21. #include "hal_api.h"
  22. #include "qdf_nbuf.h"
  23. #include "dp_types.h"
  24. #include "dp_internal.h"
  25. #include "dp_tx.h"
  26. #include "enet.h"
  27. #ifdef WIFI_MONITOR_SUPPORT
  28. #include "dp_mon.h"
  29. #endif
  30. #include "dp_txrx_wds.h"
  31. /* Generic AST entry aging timer value */
  32. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  33. #define DP_VLAN_UNTAGGED 0
  34. #define DP_VLAN_TAGGED_MULTICAST 1
  35. #define DP_VLAN_TAGGED_UNICAST 2
  36. #define DP_MAX_VLAN_IDS 4096
  37. #define DP_INVALID_AST_IDX 0xffff
  38. #define DP_INVALID_FLOW_PRIORITY 0xff
  39. #define DP_PEER_AST0_FLOW_MASK 0x4
  40. #define DP_PEER_AST1_FLOW_MASK 0x8
  41. #define DP_PEER_AST2_FLOW_MASK 0x1
  42. #define DP_PEER_AST3_FLOW_MASK 0x2
  43. #define DP_MAX_AST_INDEX_PER_PEER 4
  44. static void
  45. dp_peer_age_ast_entries(struct dp_soc *soc, struct dp_peer *peer, void *arg)
  46. {
  47. struct dp_ast_entry *ase, *temp_ase;
  48. struct ast_del_ctxt *del_ctxt = (struct ast_del_ctxt *)arg;
  49. if ((del_ctxt->del_count >= soc->max_ast_ageout_count) &&
  50. !del_ctxt->age) {
  51. return;
  52. }
  53. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  54. /*
  55. * Do not expire static ast entries and HM WDS entries
  56. */
  57. if (ase->type != CDP_TXRX_AST_TYPE_WDS &&
  58. ase->type != CDP_TXRX_AST_TYPE_DA)
  59. continue;
  60. if (ase->is_active) {
  61. if (del_ctxt->age)
  62. ase->is_active = FALSE;
  63. continue;
  64. }
  65. if (del_ctxt->del_count < soc->max_ast_ageout_count) {
  66. DP_STATS_INC(soc, ast.aged_out, 1);
  67. dp_peer_del_ast(soc, ase);
  68. del_ctxt->del_count++;
  69. } else {
  70. soc->pending_ageout = true;
  71. if (!del_ctxt->age)
  72. break;
  73. }
  74. }
  75. }
  76. static void
  77. dp_peer_age_mec_entries(struct dp_soc *soc)
  78. {
  79. uint32_t index;
  80. struct dp_mec_entry *mecentry, *mecentry_next;
  81. TAILQ_HEAD(, dp_mec_entry) free_list;
  82. TAILQ_INIT(&free_list);
  83. for (index = 0; index <= soc->mec_hash.mask; index++) {
  84. qdf_spin_lock_bh(&soc->mec_lock);
  85. /*
  86. * Expire MEC entry every n sec.
  87. */
  88. if (!TAILQ_EMPTY(&soc->mec_hash.bins[index])) {
  89. TAILQ_FOREACH_SAFE(mecentry, &soc->mec_hash.bins[index],
  90. hash_list_elem, mecentry_next) {
  91. if (mecentry->is_active) {
  92. mecentry->is_active = FALSE;
  93. continue;
  94. }
  95. dp_peer_mec_detach_entry(soc, mecentry,
  96. &free_list);
  97. }
  98. }
  99. qdf_spin_unlock_bh(&soc->mec_lock);
  100. }
  101. dp_peer_mec_free_list(soc, &free_list);
  102. }
  103. static void dp_ast_aging_timer_fn(void *soc_hdl)
  104. {
  105. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  106. struct ast_del_ctxt del_ctxt = {0};
  107. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  108. del_ctxt.age = true;
  109. soc->wds_ast_aging_timer_cnt = 0;
  110. }
  111. if (soc->pending_ageout || del_ctxt.age) {
  112. soc->pending_ageout = false;
  113. /* AST list access lock */
  114. qdf_spin_lock_bh(&soc->ast_lock);
  115. dp_soc_iterate_peer(soc, dp_peer_age_ast_entries, &del_ctxt,
  116. DP_MOD_ID_AST);
  117. qdf_spin_unlock_bh(&soc->ast_lock);
  118. }
  119. /*
  120. * If NSS offload is enabled, the MEC timeout
  121. * will be managed by NSS.
  122. */
  123. if (qdf_atomic_read(&soc->mec_cnt) &&
  124. !wlan_cfg_get_dp_soc_nss_cfg(soc->wlan_cfg_ctx))
  125. dp_peer_age_mec_entries(soc);
  126. if (qdf_atomic_read(&soc->cmn_init_done))
  127. qdf_timer_mod(&soc->ast_aging_timer,
  128. DP_AST_AGING_TIMER_DEFAULT_MS);
  129. }
  130. /*
  131. * dp_soc_wds_attach() - Setup WDS timer and AST table
  132. * @soc: Datapath SOC handle
  133. *
  134. * Return: None
  135. */
  136. void dp_soc_wds_attach(struct dp_soc *soc)
  137. {
  138. if (soc->ast_offload_support)
  139. return;
  140. soc->wds_ast_aging_timer_cnt = 0;
  141. soc->pending_ageout = false;
  142. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  143. dp_ast_aging_timer_fn, (void *)soc,
  144. QDF_TIMER_TYPE_WAKE_APPS);
  145. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  146. }
  147. /*
  148. * dp_soc_wds_detach() - Detach WDS data structures and timers
  149. * @txrx_soc: DP SOC handle
  150. *
  151. * Return: None
  152. */
  153. void dp_soc_wds_detach(struct dp_soc *soc)
  154. {
  155. qdf_timer_stop(&soc->ast_aging_timer);
  156. qdf_timer_free(&soc->ast_aging_timer);
  157. }
  158. /**
  159. * dp_tx_mec_handler() - Tx MEC Notify Handler
  160. * @vdev: pointer to dp dev handler
  161. * @status : Tx completion status from HTT descriptor
  162. *
  163. * Handles MEC notify event sent from fw to Host
  164. *
  165. * Return: none
  166. */
  167. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  168. {
  169. struct dp_soc *soc;
  170. QDF_STATUS add_mec_status;
  171. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  172. if (!vdev->mec_enabled)
  173. return;
  174. /* MEC required only in STA mode */
  175. if (vdev->opmode != wlan_op_mode_sta)
  176. return;
  177. soc = vdev->pdev->soc;
  178. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  179. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  180. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  181. dp_peer_debug("%pK: MEC add for mac_addr "QDF_MAC_ADDR_FMT,
  182. soc, QDF_MAC_ADDR_REF(mac_addr));
  183. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE)) {
  184. add_mec_status = dp_peer_mec_add_entry(soc, vdev, mac_addr);
  185. dp_peer_debug("%pK: MEC add status %d", vdev, add_mec_status);
  186. }
  187. }
  188. #ifndef QCA_HOST_MODE_WIFI_DISABLED
  189. /**
  190. * dp_rx_da_learn() - Add AST entry based on DA lookup
  191. * This is a WAR for HK 1.0 and will
  192. * be removed in HK 2.0
  193. *
  194. * @soc: core txrx main context
  195. * @rx_tlv_hdr : start address of rx tlvs
  196. * @ta_peer : Transmitter peer entry
  197. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  198. *
  199. */
  200. void
  201. dp_rx_da_learn(struct dp_soc *soc,
  202. uint8_t *rx_tlv_hdr,
  203. struct dp_peer *ta_peer,
  204. qdf_nbuf_t nbuf)
  205. {
  206. /* For HKv2 DA port learing is not needed */
  207. if (qdf_likely(soc->ast_override_support))
  208. return;
  209. if (qdf_unlikely(!ta_peer))
  210. return;
  211. if (qdf_unlikely(ta_peer->vdev->opmode != wlan_op_mode_ap))
  212. return;
  213. if (!soc->da_war_enabled)
  214. return;
  215. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  216. !qdf_nbuf_is_da_mcbc(nbuf))) {
  217. dp_peer_add_ast(soc,
  218. ta_peer,
  219. qdf_nbuf_data(nbuf),
  220. CDP_TXRX_AST_TYPE_DA,
  221. DP_AST_FLAGS_HM);
  222. }
  223. }
  224. /**
  225. * dp_txrx_set_wds_rx_policy() - API to store datapath
  226. * config parameters
  227. * @soc - datapath soc handle
  228. * @vdev_id - id of datapath vdev handle
  229. * @cfg: ini parameter handle
  230. *
  231. * Return: status
  232. */
  233. #ifdef WDS_VENDOR_EXTENSION
  234. QDF_STATUS
  235. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  236. u_int32_t val)
  237. {
  238. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  239. struct dp_peer *peer;
  240. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  241. DP_MOD_ID_MISC);
  242. if (!vdev) {
  243. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  244. FL("vdev is NULL for vdev_id %d"), vdev_id);
  245. return QDF_STATUS_E_INVAL;
  246. }
  247. peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  248. if (peer) {
  249. peer->wds_ecm.wds_rx_filter = 1;
  250. peer->wds_ecm.wds_rx_ucast_4addr =
  251. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  252. peer->wds_ecm.wds_rx_mcast_4addr =
  253. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  254. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  255. }
  256. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_MISC);
  257. return QDF_STATUS_SUCCESS;
  258. }
  259. /**
  260. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  261. *
  262. * @cdp_soc: DP soc handle
  263. * @vdev_id: id of vdev handle
  264. * @peer_mac: peer mac address
  265. * @wds_tx_ucast: policy for unicast transmission
  266. * @wds_tx_mcast: policy for multicast transmission
  267. *
  268. * Return: void
  269. */
  270. QDF_STATUS
  271. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  272. uint8_t *peer_mac, int wds_tx_ucast,
  273. int wds_tx_mcast)
  274. {
  275. struct dp_peer *peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  276. peer_mac, 0,
  277. vdev_id,
  278. DP_MOD_ID_AST);
  279. if (!peer) {
  280. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  281. FL("peer is NULL for mac %pM vdev_id %d"),
  282. peer_mac, vdev_id);
  283. return QDF_STATUS_E_INVAL;
  284. }
  285. if (wds_tx_ucast || wds_tx_mcast) {
  286. peer->wds_enabled = 1;
  287. peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  288. peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  289. } else {
  290. peer->wds_enabled = 0;
  291. peer->wds_ecm.wds_tx_ucast_4addr = 0;
  292. peer->wds_ecm.wds_tx_mcast_4addr = 0;
  293. }
  294. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  295. "Policy Update set to :\n");
  296. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  297. "peer->wds_enabled %d\n", peer->wds_enabled);
  298. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  299. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  300. peer->wds_ecm.wds_tx_ucast_4addr);
  301. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  302. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  303. peer->wds_ecm.wds_tx_mcast_4addr);
  304. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  305. return QDF_STATUS_SUCCESS;
  306. }
  307. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  308. struct dp_vdev *vdev,
  309. struct dp_peer *peer)
  310. {
  311. struct dp_peer *bss_peer;
  312. int fr_ds, to_ds, rx_3addr, rx_4addr;
  313. int rx_policy_ucast, rx_policy_mcast;
  314. hal_soc_handle_t hal_soc = vdev->pdev->soc->hal_soc;
  315. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(hal_soc, rx_tlv_hdr);
  316. if (vdev->opmode == wlan_op_mode_ap) {
  317. bss_peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  318. /* if wds policy check is not enabled on this vdev, accept all frames */
  319. if (bss_peer && !bss_peer->wds_ecm.wds_rx_filter) {
  320. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  321. return 1;
  322. }
  323. rx_policy_ucast = bss_peer->wds_ecm.wds_rx_ucast_4addr;
  324. rx_policy_mcast = bss_peer->wds_ecm.wds_rx_mcast_4addr;
  325. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  326. } else { /* sta mode */
  327. if (!peer->wds_ecm.wds_rx_filter) {
  328. return 1;
  329. }
  330. rx_policy_ucast = peer->wds_ecm.wds_rx_ucast_4addr;
  331. rx_policy_mcast = peer->wds_ecm.wds_rx_mcast_4addr;
  332. }
  333. /* ------------------------------------------------
  334. * self
  335. * peer- rx rx-
  336. * wds ucast mcast dir policy accept note
  337. * ------------------------------------------------
  338. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  339. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  340. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  341. * 1 1 0 00 x1 0 bad frame, won't see it
  342. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  343. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  344. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  345. * 1 0 1 00 1x 0 bad frame, won't see it
  346. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  347. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  348. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  349. * 1 1 0 00 x0 0 bad frame, won't see it
  350. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  351. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  352. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  353. * 1 0 1 00 0x 0 bad frame, won't see it
  354. *
  355. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  356. * 0 x x 01 xx 1
  357. * 0 x x 10 xx 0
  358. * 0 x x 00 xx 0 bad frame, won't see it
  359. * ------------------------------------------------
  360. */
  361. fr_ds = hal_rx_mpdu_get_fr_ds(hal_soc, rx_tlv_hdr);
  362. to_ds = hal_rx_mpdu_get_to_ds(hal_soc, rx_tlv_hdr);
  363. rx_3addr = fr_ds ^ to_ds;
  364. rx_4addr = fr_ds & to_ds;
  365. if (vdev->opmode == wlan_op_mode_ap) {
  366. if ((!peer->wds_enabled && rx_3addr && to_ds) ||
  367. (peer->wds_enabled && !rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  368. (peer->wds_enabled && rx_mcast && (rx_4addr == rx_policy_mcast))) {
  369. return 1;
  370. }
  371. } else { /* sta mode */
  372. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  373. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  374. return 1;
  375. }
  376. }
  377. return 0;
  378. }
  379. #endif
  380. /**
  381. * dp_tx_add_groupkey_metadata - Add group key in metadata
  382. * @vdev: DP vdev handle
  383. * @msdu_info: MSDU info to be setup in MSDU descriptor
  384. * @group_key: Group key index programmed in metadata
  385. *
  386. * Return: void
  387. */
  388. #ifdef QCA_MULTIPASS_SUPPORT
  389. static
  390. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  391. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  392. {
  393. struct htt_tx_msdu_desc_ext2_t *meta_data =
  394. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  395. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  396. /*
  397. * When attempting to send a multicast packet with multi-passphrase,
  398. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  399. * ref htt.h indicating the group_id field in "key_flags" also having
  400. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  401. */
  402. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  403. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  404. }
  405. /**
  406. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  407. * @vdev: DP vdev handle
  408. * @tx_desc: Tx Descriptor Handle
  409. *
  410. * Return: void
  411. */
  412. static
  413. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  414. {
  415. struct vlan_ethhdr veth_hdr;
  416. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  417. /*
  418. * Extract VLAN header of 4 bytes:
  419. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  420. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  421. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  422. */
  423. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  424. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  425. veh = (struct vlan_ethhdr *)nbuf->data;
  426. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  427. return;
  428. }
  429. /**
  430. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  431. * @vdev: DP vdev handle
  432. * @tx_desc: Tx Descriptor Handle
  433. * @vlan_id: vlan id of frame
  434. *
  435. * Return: whether peer is special or classic
  436. */
  437. static
  438. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  439. qdf_nbuf_t buf, uint16_t *vlan_id)
  440. {
  441. struct dp_peer *peer = NULL;
  442. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  443. struct vlan_ethhdr *veh = NULL;
  444. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  445. (htons(eh->ether_type) != ETH_P_8021Q));
  446. if (qdf_unlikely(not_vlan))
  447. return DP_VLAN_UNTAGGED;
  448. veh = (struct vlan_ethhdr *)eh;
  449. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  450. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  451. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  452. TAILQ_FOREACH(peer, &vdev->mpass_peer_list,
  453. mpass_peer_list_elem) {
  454. if (*vlan_id == peer->vlan_id) {
  455. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  456. return DP_VLAN_TAGGED_MULTICAST;
  457. }
  458. }
  459. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  460. return DP_VLAN_UNTAGGED;
  461. }
  462. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL,
  463. DP_MOD_ID_TX_MULTIPASS);
  464. if (qdf_unlikely(peer == NULL))
  465. return DP_VLAN_UNTAGGED;
  466. /*
  467. * Do not drop the frame when vlan_id doesn't match.
  468. * Send the frame as it is.
  469. */
  470. if (*vlan_id == peer->vlan_id) {
  471. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  472. return DP_VLAN_TAGGED_UNICAST;
  473. }
  474. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  475. return DP_VLAN_UNTAGGED;
  476. }
  477. /**
  478. * dp_tx_multipass_process - Process vlan frames in tx path
  479. * @soc: dp soc handle
  480. * @vdev: DP vdev handle
  481. * @nbuf: skb
  482. * @msdu_info: msdu descriptor
  483. *
  484. * Return: status whether frame needs to be dropped or transmitted
  485. */
  486. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  487. qdf_nbuf_t nbuf,
  488. struct dp_tx_msdu_info_s *msdu_info)
  489. {
  490. uint16_t vlan_id = 0;
  491. uint16_t group_key = 0;
  492. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  493. qdf_nbuf_t nbuf_copy = NULL;
  494. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  495. return true;
  496. }
  497. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  498. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  499. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  500. return true;
  501. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  502. dp_tx_remove_vlan_tag(vdev, nbuf);
  503. return true;
  504. }
  505. /* AP can have classic clients, special clients &
  506. * classic repeaters.
  507. * 1. Classic clients & special client:
  508. * Remove vlan header, find corresponding group key
  509. * index, fill in metaheader and enqueue multicast
  510. * frame to TCL.
  511. * 2. Classic repeater:
  512. * Pass through to classic repeater with vlan tag
  513. * intact without any group key index. Hardware
  514. * will know which key to use to send frame to
  515. * repeater.
  516. */
  517. nbuf_copy = qdf_nbuf_copy(nbuf);
  518. /*
  519. * Send multicast frame to special peers even
  520. * if pass through to classic repeater fails.
  521. */
  522. if (nbuf_copy) {
  523. struct dp_tx_msdu_info_s msdu_info_copy;
  524. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  525. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  526. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  527. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  528. if (nbuf_copy) {
  529. qdf_nbuf_free(nbuf_copy);
  530. qdf_err("nbuf_copy send failed");
  531. }
  532. }
  533. group_key = vdev->iv_vlan_map[vlan_id];
  534. /*
  535. * If group key is not installed, drop the frame.
  536. */
  537. if (!group_key)
  538. return false;
  539. dp_tx_remove_vlan_tag(vdev, nbuf);
  540. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  541. msdu_info->exception_fw = 1;
  542. return true;
  543. }
  544. /**
  545. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  546. * @vdev: DP vdev handle
  547. * @nbuf: skb
  548. * @tid: traffic priority
  549. *
  550. * Return: bool: true in case of success else false
  551. * Success is considered if:
  552. * i. If frame has vlan header
  553. * ii. If the frame comes from different peer and dont need multipass processing
  554. * Failure is considered if:
  555. * i. Frame comes from multipass peer but doesn't contain vlan header.
  556. * In failure case, drop such frames.
  557. */
  558. bool dp_rx_multipass_process(struct dp_peer *peer, qdf_nbuf_t nbuf, uint8_t tid)
  559. {
  560. struct vlan_ethhdr *vethhdrp;
  561. if (qdf_unlikely(!peer->vlan_id))
  562. return true;
  563. vethhdrp = (struct vlan_ethhdr *)qdf_nbuf_data(nbuf);
  564. /*
  565. * h_vlan_proto & h_vlan_TCI should be 0x8100 & zero respectively
  566. * as it is expected to be padded by 0
  567. * return false if frame doesn't have above tag so that caller will
  568. * drop the frame.
  569. */
  570. if (qdf_unlikely(vethhdrp->h_vlan_proto != htons(QDF_ETH_TYPE_8021Q)) ||
  571. qdf_unlikely(vethhdrp->h_vlan_TCI != 0))
  572. return false;
  573. vethhdrp->h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  574. (peer->vlan_id & VLAN_VID_MASK));
  575. return true;
  576. }
  577. #endif /* QCA_MULTIPASS_SUPPORT */
  578. #endif /* QCA_HOST_MODE_WIFI_DISABLED */
  579. #ifdef QCA_MULTIPASS_SUPPORT
  580. /**
  581. * dp_peer_multipass_list_remove: remove peer from list
  582. * @peer: pointer to peer
  583. *
  584. * return: void
  585. */
  586. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  587. {
  588. struct dp_vdev *vdev = peer->vdev;
  589. struct dp_peer *tpeer = NULL;
  590. bool found = 0;
  591. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  592. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  593. if (tpeer == peer) {
  594. found = 1;
  595. TAILQ_REMOVE(&vdev->mpass_peer_list, peer, mpass_peer_list_elem);
  596. break;
  597. }
  598. }
  599. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  600. if (found)
  601. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  602. }
  603. /**
  604. * dp_peer_multipass_list_add: add to new multipass list
  605. * @dp_soc: soc handle
  606. * @peer_mac: mac address
  607. * @vdev_id: vdev id for peer
  608. * @vlan_id: vlan_id
  609. *
  610. * return: void
  611. */
  612. static void dp_peer_multipass_list_add(struct dp_soc *soc, uint8_t *peer_mac,
  613. uint8_t vdev_id, uint16_t vlan_id)
  614. {
  615. struct dp_peer *peer =
  616. dp_peer_find_hash_find(soc, peer_mac, 0, vdev_id,
  617. DP_MOD_ID_TX_MULTIPASS);
  618. if (qdf_unlikely(!peer)) {
  619. qdf_err("NULL peer");
  620. return;
  621. }
  622. /* If peer already exists in vdev multipass list, do not add it.
  623. * This may happen if key install comes twice or re-key
  624. * happens for a peer.
  625. */
  626. if (peer->vlan_id) {
  627. dp_debug("peer already added to vdev multipass list"
  628. "MAC: "QDF_MAC_ADDR_FMT" vlan: %d ",
  629. QDF_MAC_ADDR_REF(peer->mac_addr.raw), peer->vlan_id);
  630. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  631. return;
  632. }
  633. /*
  634. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  635. * Decrement it when element is deleted from the list.
  636. */
  637. peer->vlan_id = vlan_id;
  638. qdf_spin_lock_bh(&peer->vdev->mpass_peer_mutex);
  639. TAILQ_INSERT_HEAD(&peer->vdev->mpass_peer_list, peer,
  640. mpass_peer_list_elem);
  641. qdf_spin_unlock_bh(&peer->vdev->mpass_peer_mutex);
  642. }
  643. /**
  644. * dp_peer_set_vlan_id: set vlan_id for this peer
  645. * @cdp_soc: soc handle
  646. * @vdev_id: vdev id for peer
  647. * @peer_mac: mac address
  648. * @vlan_id: vlan id for peer
  649. *
  650. * return: void
  651. */
  652. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  653. uint8_t vdev_id, uint8_t *peer_mac,
  654. uint16_t vlan_id)
  655. {
  656. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  657. struct dp_vdev *vdev =
  658. dp_vdev_get_ref_by_id((struct dp_soc *)soc, vdev_id,
  659. DP_MOD_ID_TX_MULTIPASS);
  660. if (vdev && vdev->multipass_en) {
  661. dp_peer_multipass_list_add(soc, peer_mac, vdev_id, vlan_id);
  662. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  663. }
  664. }
  665. /**
  666. * dp_set_vlan_groupkey: set vlan map for vdev
  667. * @soc: pointer to soc
  668. * @vdev_id : id of vdev
  669. * @vlan_id: vlan_id
  670. * @group_key: group key for vlan
  671. *
  672. * return: set success/failure
  673. */
  674. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  675. uint16_t vlan_id, uint16_t group_key)
  676. {
  677. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  678. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  679. DP_MOD_ID_TX_MULTIPASS);
  680. QDF_STATUS status;
  681. if (!vdev || !vdev->multipass_en) {
  682. status = QDF_STATUS_E_INVAL;
  683. goto fail;
  684. }
  685. if (!vdev->iv_vlan_map) {
  686. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  687. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  688. if (!vdev->iv_vlan_map) {
  689. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  690. status = QDF_STATUS_E_NOMEM;
  691. goto fail;
  692. }
  693. /*
  694. * 0 is invalid group key.
  695. * Initilalize array with invalid group keys.
  696. */
  697. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  698. }
  699. if (vlan_id >= DP_MAX_VLAN_IDS) {
  700. status = QDF_STATUS_E_INVAL;
  701. goto fail;
  702. }
  703. vdev->iv_vlan_map[vlan_id] = group_key;
  704. status = QDF_STATUS_SUCCESS;
  705. fail:
  706. if (vdev)
  707. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  708. return status;
  709. }
  710. /**
  711. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  712. * @vdev_handle: pointer to vdev
  713. *
  714. * return: void
  715. */
  716. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  717. {
  718. struct dp_peer *peer = NULL;
  719. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  720. TAILQ_FOREACH(peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  721. qdf_err("Peers present in mpass list :" QDF_MAC_ADDR_FMT,
  722. QDF_MAC_ADDR_REF(peer->mac_addr.raw));
  723. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  724. if (vdev->iv_vlan_map) {
  725. qdf_mem_free(vdev->iv_vlan_map);
  726. vdev->iv_vlan_map = NULL;
  727. }
  728. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  729. }
  730. /**
  731. * dp_peer_multipass_list_init: initialize peer mulitpass list
  732. * @vdev_handle: pointer to vdev
  733. *
  734. * return: set success/failure
  735. */
  736. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  737. {
  738. /*
  739. * vdev->iv_vlan_map is allocated when the first configuration command
  740. * is issued to avoid unnecessary allocation for regular mode VAP.
  741. */
  742. TAILQ_INIT(&vdev->mpass_peer_list);
  743. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  744. }
  745. #endif /* QCA_MULTIPASS_SUPPORT */
  746. #ifdef QCA_PEER_MULTIQ_SUPPORT
  747. /**
  748. * dp_peer_reset_flowq_map() - reset peer flowq map table
  749. * @peer - dp peer handle
  750. *
  751. * Return: none
  752. */
  753. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  754. {
  755. int i = 0;
  756. if (!peer)
  757. return;
  758. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  759. peer->peer_ast_flowq_idx[i].is_valid = false;
  760. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  761. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  762. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  763. }
  764. }
  765. /**
  766. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  767. * @peer - dp peer handle
  768. * @mask - flow mask
  769. *
  770. * Return: flow id
  771. */
  772. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  773. uint8_t mask)
  774. {
  775. if (!peer) {
  776. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  777. "%s: Invalid peer\n", __func__);
  778. return -1;
  779. }
  780. if (mask & DP_PEER_AST0_FLOW_MASK)
  781. return DP_PEER_AST_FLOWQ_UDP;
  782. else if (mask & DP_PEER_AST1_FLOW_MASK)
  783. return DP_PEER_AST_FLOWQ_NON_UDP;
  784. else if (mask & DP_PEER_AST2_FLOW_MASK)
  785. return DP_PEER_AST_FLOWQ_HI_PRIO;
  786. else if (mask & DP_PEER_AST3_FLOW_MASK)
  787. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  788. return DP_PEER_AST_FLOWQ_MAX;
  789. }
  790. /**
  791. * dp_peer_get_ast_valid() - get ast index valid from mask
  792. * @mask - mask for ast valid bits
  793. * @index - index for an ast
  794. *
  795. * Return - 1 if ast index is valid from mask else 0
  796. */
  797. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  798. {
  799. if (index == 0)
  800. return 1;
  801. return ((mask) & (1 << ((index) - 1)));
  802. }
  803. /**
  804. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  805. * @soc - genereic soc handle
  806. * @is_wds - flag to indicate if peer is wds
  807. * @peer_id - peer_id from htt peer map message
  808. * @peer_mac_addr - mac address of the peer
  809. * @ast_info - ast flow override information from peer map
  810. *
  811. * Return: none
  812. */
  813. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  814. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  815. struct dp_ast_flow_override_info *ast_info)
  816. {
  817. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  818. struct dp_peer *peer = NULL;
  819. uint8_t i;
  820. /*
  821. * Ast flow override feature is supported
  822. * only for connected client
  823. */
  824. if (is_wds)
  825. return;
  826. peer = dp_peer_get_ref_by_id(soc, peer_id, DP_MOD_ID_AST);
  827. if (!peer) {
  828. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  829. "%s: Invalid peer\n", __func__);
  830. return;
  831. }
  832. /* Valid only in AP mode */
  833. if (peer->vdev->opmode != wlan_op_mode_ap) {
  834. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  835. "%s: Peer ast flow map not in STA mode\n", __func__);
  836. goto end;
  837. }
  838. /* Making sure the peer is for this mac address */
  839. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  840. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  841. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  842. "%s: Peer mac address mismatch\n", __func__);
  843. goto end;
  844. }
  845. /* Ast entry flow mapping not valid for self peer map */
  846. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  847. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  848. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  849. "%s: Ast flow mapping not valid for self peer \n", __func__);
  850. goto end;
  851. }
  852. /* Fill up ast index <---> flow id mapping table for this peer */
  853. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  854. /* Check if this ast index is valid */
  855. peer->peer_ast_flowq_idx[i].is_valid =
  856. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  857. if (!peer->peer_ast_flowq_idx[i].is_valid)
  858. continue;
  859. /* Get the flow queue id which is mapped to this ast index */
  860. peer->peer_ast_flowq_idx[i].flowQ =
  861. dp_peer_get_flowid_from_flowmask(peer,
  862. ast_info->ast_flow_mask[i]);
  863. /*
  864. * Update tid valid mask only if flow id HIGH or
  865. * Low priority
  866. */
  867. if (peer->peer_ast_flowq_idx[i].flowQ ==
  868. DP_PEER_AST_FLOWQ_HI_PRIO) {
  869. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  870. ast_info->tid_valid_hi_pri_mask;
  871. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  872. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  873. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  874. ast_info->tid_valid_low_pri_mask;
  875. }
  876. /* Save the ast index for this entry */
  877. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  878. }
  879. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  880. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  881. soc->ctrl_psoc, peer->peer_id,
  882. peer->vdev->vdev_id, peer_mac_addr);
  883. }
  884. end:
  885. /* Release peer reference */
  886. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  887. }
  888. /**
  889. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  890. * @soc - soc handle
  891. * @peer_mac_addr - mac address of the peer
  892. * @flow_id - flow id to find ast index
  893. *
  894. * Return: ast index for a given flow id, -1 for fail cases
  895. */
  896. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  897. uint16_t vdev_id, uint8_t *peer_mac_addr,
  898. uint8_t flow_id, uint8_t tid)
  899. {
  900. struct dp_peer *peer = NULL;
  901. uint8_t i;
  902. uint16_t ast_index;
  903. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  904. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  905. "Invalid Flow ID %d\n", flow_id);
  906. return -1;
  907. }
  908. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  909. peer_mac_addr, 0, vdev_id,
  910. DP_MOD_ID_AST);
  911. if (!peer) {
  912. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  913. "%s: Invalid peer\n", __func__);
  914. return -1;
  915. }
  916. /*
  917. * Loop over the ast entry <----> flow-id mapping to find
  918. * which ast index entry has this flow queue id enabled.
  919. */
  920. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  921. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  922. /*
  923. * Found the matching index for this flow id
  924. */
  925. break;
  926. }
  927. /*
  928. * No match found for this flow id
  929. */
  930. if (i == DP_PEER_AST_FLOWQ_MAX) {
  931. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  932. "%s: ast index not found for flow %d\n", __func__, flow_id);
  933. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  934. return -1;
  935. }
  936. /* Check whether this ast entry is valid */
  937. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  938. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  939. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  940. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  941. return -1;
  942. }
  943. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  944. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  945. /*
  946. * check if this tid is valid for Hi
  947. * and Low priority flow id
  948. */
  949. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  950. & (1 << tid))) {
  951. /* Release peer reference */
  952. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  953. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  954. return ast_index;
  955. } else {
  956. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  957. "%s: TID %d is not valid for flow %d\n",
  958. __func__, tid, flow_id);
  959. /*
  960. * TID is not valid for this flow
  961. * Return -1
  962. */
  963. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  964. return -1;
  965. }
  966. }
  967. /*
  968. * TID valid check not required for
  969. * UDP/NON UDP flow id
  970. */
  971. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  972. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  973. return ast_index;
  974. }
  975. #endif
  976. void dp_hmwds_ast_add_notify(struct dp_peer *peer,
  977. uint8_t *mac_addr,
  978. enum cdp_txrx_ast_entry_type type,
  979. QDF_STATUS err,
  980. bool is_peer_map)
  981. {
  982. struct dp_vdev *dp_vdev = peer->vdev;
  983. struct dp_pdev *dp_pdev = dp_vdev->pdev;
  984. struct cdp_peer_hmwds_ast_add_status add_status;
  985. /* Ignore ast types other than HM */
  986. if ((type != CDP_TXRX_AST_TYPE_WDS_HM) &&
  987. (type != CDP_TXRX_AST_TYPE_WDS_HM_SEC))
  988. return;
  989. /* existing ast delete in progress, will be attempted
  990. * to add again after delete is complete. Send status then.
  991. */
  992. if (err == QDF_STATUS_E_AGAIN)
  993. return;
  994. /* peer map pending, notify actual status
  995. * when peer map is received.
  996. */
  997. if (!is_peer_map && (err == QDF_STATUS_SUCCESS))
  998. return;
  999. qdf_mem_zero(&add_status, sizeof(add_status));
  1000. add_status.vdev_id = dp_vdev->vdev_id;
  1001. /* For type CDP_TXRX_AST_TYPE_WDS_HM_SEC dp_peer_add_ast()
  1002. * returns QDF_STATUS_E_FAILURE as it is host only entry.
  1003. * In such cases set err as success. Also err code set to
  1004. * QDF_STATUS_E_ALREADY indicates entry already exist in
  1005. * such cases set err as success too. Any other error code
  1006. * is actual error.
  1007. */
  1008. if (((type == CDP_TXRX_AST_TYPE_WDS_HM_SEC) &&
  1009. (err == QDF_STATUS_E_FAILURE)) ||
  1010. (err == QDF_STATUS_E_ALREADY)) {
  1011. err = QDF_STATUS_SUCCESS;
  1012. }
  1013. add_status.status = err;
  1014. qdf_mem_copy(add_status.peer_mac, peer->mac_addr.raw,
  1015. QDF_MAC_ADDR_SIZE);
  1016. qdf_mem_copy(add_status.ast_mac, mac_addr,
  1017. QDF_MAC_ADDR_SIZE);
  1018. #ifdef WDI_EVENT_ENABLE
  1019. dp_wdi_event_handler(WDI_EVENT_HMWDS_AST_ADD_STATUS, dp_pdev->soc,
  1020. (void *)&add_status, 0,
  1021. WDI_NO_VAL, dp_pdev->pdev_id);
  1022. #endif
  1023. }
  1024. #ifdef FEATURE_PERPKT_INFO
  1025. /**
  1026. * dp_get_completion_indication_for_stack() - send completion to stack
  1027. * @soc : dp_soc handle
  1028. * @pdev: dp_pdev handle
  1029. * @peer: dp peer handle
  1030. * @ts: transmit completion status structure
  1031. * @netbuf: Buffer pointer for free
  1032. *
  1033. * This function is used for indication whether buffer needs to be
  1034. * sent to stack for freeing or not
  1035. */
  1036. QDF_STATUS
  1037. dp_get_completion_indication_for_stack(struct dp_soc *soc,
  1038. struct dp_pdev *pdev,
  1039. struct dp_peer *peer,
  1040. struct hal_tx_completion_status *ts,
  1041. qdf_nbuf_t netbuf,
  1042. uint64_t time_latency)
  1043. {
  1044. struct tx_capture_hdr *ppdu_hdr;
  1045. uint16_t peer_id = ts->peer_id;
  1046. uint32_t ppdu_id = ts->ppdu_id;
  1047. uint8_t first_msdu = ts->first_msdu;
  1048. uint8_t last_msdu = ts->last_msdu;
  1049. uint32_t txcap_hdr_size = sizeof(struct tx_capture_hdr);
  1050. if (qdf_unlikely(!dp_monitor_is_enable_tx_sniffer(pdev) &&
  1051. !dp_monitor_is_enable_mcopy_mode(pdev) &&
  1052. !pdev->latency_capture_enable))
  1053. return QDF_STATUS_E_NOSUPPORT;
  1054. if (!peer) {
  1055. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1056. FL("Peer Invalid"));
  1057. return QDF_STATUS_E_INVAL;
  1058. }
  1059. /* If mcopy is enabled and mcopy_mode is M_COPY deliver 1st MSDU
  1060. * per PPDU. If mcopy_mode is M_COPY_EXTENDED deliver 1st MSDU
  1061. * for each MPDU
  1062. */
  1063. if (dp_monitor_mcopy_check_deliver(pdev,
  1064. peer_id,
  1065. ppdu_id,
  1066. first_msdu) != QDF_STATUS_SUCCESS)
  1067. return QDF_STATUS_E_INVAL;
  1068. if (qdf_unlikely(qdf_nbuf_headroom(netbuf) < txcap_hdr_size)) {
  1069. netbuf = qdf_nbuf_realloc_headroom(netbuf, txcap_hdr_size);
  1070. if (!netbuf) {
  1071. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1072. FL("No headroom"));
  1073. return QDF_STATUS_E_NOMEM;
  1074. }
  1075. }
  1076. if (!qdf_nbuf_push_head(netbuf, txcap_hdr_size)) {
  1077. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1078. FL("No headroom"));
  1079. return QDF_STATUS_E_NOMEM;
  1080. }
  1081. ppdu_hdr = (struct tx_capture_hdr *)qdf_nbuf_data(netbuf);
  1082. qdf_mem_copy(ppdu_hdr->ta, peer->vdev->mac_addr.raw,
  1083. QDF_MAC_ADDR_SIZE);
  1084. qdf_mem_copy(ppdu_hdr->ra, peer->mac_addr.raw,
  1085. QDF_MAC_ADDR_SIZE);
  1086. ppdu_hdr->ppdu_id = ppdu_id;
  1087. ppdu_hdr->peer_id = peer_id;
  1088. ppdu_hdr->first_msdu = first_msdu;
  1089. ppdu_hdr->last_msdu = last_msdu;
  1090. if (qdf_unlikely(pdev->latency_capture_enable)) {
  1091. ppdu_hdr->tsf = ts->tsf;
  1092. ppdu_hdr->time_latency = (uint32_t)time_latency;
  1093. }
  1094. return QDF_STATUS_SUCCESS;
  1095. }
  1096. /**
  1097. * dp_send_completion_to_stack() - send completion to stack
  1098. * @soc : dp_soc handle
  1099. * @pdev: dp_pdev handle
  1100. * @peer_id: peer_id of the peer for which completion came
  1101. * @ppdu_id: ppdu_id
  1102. * @netbuf: Buffer pointer for free
  1103. *
  1104. * This function is used to send completion to stack
  1105. * to free buffer
  1106. */
  1107. void dp_send_completion_to_stack(struct dp_soc *soc, struct dp_pdev *pdev,
  1108. uint16_t peer_id, uint32_t ppdu_id,
  1109. qdf_nbuf_t netbuf)
  1110. {
  1111. dp_wdi_event_handler(WDI_EVENT_TX_DATA, soc,
  1112. netbuf, peer_id,
  1113. WDI_NO_VAL, pdev->pdev_id);
  1114. }
  1115. #endif