dp_txrx_wds.c 35 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226
  1. /*
  2. * Copyright (c) 2016-2021 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "../../../cmn_dev/fw_hdr/fw/htt.h"
  19. #include "dp_peer.h"
  20. #include "hal_rx.h"
  21. #include "hal_api.h"
  22. #include "qdf_nbuf.h"
  23. #include "dp_types.h"
  24. #include "dp_internal.h"
  25. #include "dp_tx.h"
  26. #include "enet.h"
  27. #include "dp_txrx_wds.h"
  28. /* Generic AST entry aging timer value */
  29. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  30. #define DP_VLAN_UNTAGGED 0
  31. #define DP_VLAN_TAGGED_MULTICAST 1
  32. #define DP_VLAN_TAGGED_UNICAST 2
  33. #define DP_MAX_VLAN_IDS 4096
  34. #define DP_INVALID_AST_IDX 0xffff
  35. #define DP_INVALID_FLOW_PRIORITY 0xff
  36. #define DP_PEER_AST0_FLOW_MASK 0x4
  37. #define DP_PEER_AST1_FLOW_MASK 0x8
  38. #define DP_PEER_AST2_FLOW_MASK 0x1
  39. #define DP_PEER_AST3_FLOW_MASK 0x2
  40. #define DP_MAX_AST_INDEX_PER_PEER 4
  41. static void
  42. dp_peer_age_ast_entries(struct dp_soc *soc, struct dp_peer *peer, void *arg)
  43. {
  44. struct dp_ast_entry *ase, *temp_ase;
  45. bool check_wds_ase = *(bool *)arg;
  46. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  47. /*
  48. * Do not expire static ast entries and HM WDS entries
  49. */
  50. if (ase->type != CDP_TXRX_AST_TYPE_WDS &&
  51. ase->type != CDP_TXRX_AST_TYPE_MEC &&
  52. ase->type != CDP_TXRX_AST_TYPE_DA)
  53. continue;
  54. /* Expire MEC entry every n sec. This needs to be expired in
  55. * case if STA backbone is made as AP backbone, In this case
  56. * it needs to be re-added as a WDS entry.
  57. */
  58. if (ase->is_active && ase->type == CDP_TXRX_AST_TYPE_MEC) {
  59. ase->is_active = FALSE;
  60. continue;
  61. } else if (ase->is_active && check_wds_ase) {
  62. ase->is_active = FALSE;
  63. continue;
  64. }
  65. if (ase->type == CDP_TXRX_AST_TYPE_MEC) {
  66. DP_STATS_INC(soc, ast.aged_out, 1);
  67. dp_peer_del_ast(soc, ase);
  68. } else if (check_wds_ase) {
  69. DP_STATS_INC(soc, ast.aged_out, 1);
  70. dp_peer_del_ast(soc, ase);
  71. }
  72. }
  73. }
  74. static void dp_ast_aging_timer_fn(void *soc_hdl)
  75. {
  76. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  77. bool check_wds_ase = false;
  78. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  79. soc->wds_ast_aging_timer_cnt = 0;
  80. check_wds_ase = true;
  81. }
  82. /* AST list access lock */
  83. qdf_spin_lock_bh(&soc->ast_lock);
  84. dp_soc_iterate_peer(soc, dp_peer_age_ast_entries, (void *)&check_wds_ase,
  85. DP_MOD_ID_AST);
  86. qdf_spin_unlock_bh(&soc->ast_lock);
  87. if (qdf_atomic_read(&soc->cmn_init_done))
  88. qdf_timer_mod(&soc->ast_aging_timer,
  89. DP_AST_AGING_TIMER_DEFAULT_MS);
  90. }
  91. /*
  92. * dp_soc_wds_attach() - Setup WDS timer and AST table
  93. * @soc: Datapath SOC handle
  94. *
  95. * Return: None
  96. */
  97. void dp_soc_wds_attach(struct dp_soc *soc)
  98. {
  99. soc->wds_ast_aging_timer_cnt = 0;
  100. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  101. dp_ast_aging_timer_fn, (void *)soc,
  102. QDF_TIMER_TYPE_WAKE_APPS);
  103. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  104. }
  105. /*
  106. * dp_soc_wds_detach() - Detach WDS data structures and timers
  107. * @txrx_soc: DP SOC handle
  108. *
  109. * Return: None
  110. */
  111. void dp_soc_wds_detach(struct dp_soc *soc)
  112. {
  113. qdf_timer_stop(&soc->ast_aging_timer);
  114. qdf_timer_free(&soc->ast_aging_timer);
  115. }
  116. /**
  117. * dp_tx_mec_handler() - Tx MEC Notify Handler
  118. * @vdev: pointer to dp dev handler
  119. * @status : Tx completion status from HTT descriptor
  120. *
  121. * Handles MEC notify event sent from fw to Host
  122. *
  123. * Return: none
  124. */
  125. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  126. {
  127. struct dp_soc *soc;
  128. uint32_t flags = IEEE80211_NODE_F_WDS_HM;
  129. struct dp_peer *peer;
  130. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  131. if (!vdev->mec_enabled)
  132. return;
  133. /* MEC required only in STA mode */
  134. if (vdev->opmode != wlan_op_mode_sta)
  135. return;
  136. soc = vdev->pdev->soc;
  137. peer = dp_vdev_bss_peer_ref_n_get(soc, vdev,
  138. DP_MOD_ID_AST);
  139. if (!peer) {
  140. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  141. FL("peer is NULL"));
  142. return;
  143. }
  144. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  145. "%s Tx MEC Handler",
  146. __func__);
  147. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  148. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  149. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  150. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE))
  151. dp_peer_add_ast(soc,
  152. peer,
  153. mac_addr,
  154. CDP_TXRX_AST_TYPE_MEC,
  155. flags);
  156. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  157. }
  158. #ifndef QCA_HOST_MODE_WIFI_DISABLED
  159. /**
  160. * dp_rx_da_learn() - Add AST entry based on DA lookup
  161. * This is a WAR for HK 1.0 and will
  162. * be removed in HK 2.0
  163. *
  164. * @soc: core txrx main context
  165. * @rx_tlv_hdr : start address of rx tlvs
  166. * @ta_peer : Transmitter peer entry
  167. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  168. *
  169. */
  170. void
  171. dp_rx_da_learn(struct dp_soc *soc,
  172. uint8_t *rx_tlv_hdr,
  173. struct dp_peer *ta_peer,
  174. qdf_nbuf_t nbuf)
  175. {
  176. /* For HKv2 DA port learing is not needed */
  177. if (qdf_likely(soc->ast_override_support))
  178. return;
  179. if (qdf_unlikely(!ta_peer))
  180. return;
  181. if (qdf_unlikely(ta_peer->vdev->opmode != wlan_op_mode_ap))
  182. return;
  183. if (!soc->da_war_enabled)
  184. return;
  185. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  186. !qdf_nbuf_is_da_mcbc(nbuf))) {
  187. dp_peer_add_ast(soc,
  188. ta_peer,
  189. qdf_nbuf_data(nbuf),
  190. CDP_TXRX_AST_TYPE_DA,
  191. IEEE80211_NODE_F_WDS_HM);
  192. }
  193. }
  194. /**
  195. * dp_txrx_set_wds_rx_policy() - API to store datapath
  196. * config parameters
  197. * @soc - datapath soc handle
  198. * @vdev_id - id of datapath vdev handle
  199. * @cfg: ini parameter handle
  200. *
  201. * Return: status
  202. */
  203. #ifdef WDS_VENDOR_EXTENSION
  204. QDF_STATUS
  205. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  206. u_int32_t val)
  207. {
  208. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  209. struct dp_peer *peer;
  210. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  211. DP_MOD_ID_MISC);
  212. if (!vdev) {
  213. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  214. FL("vdev is NULL for vdev_id %d"), vdev_id);
  215. return QDF_STATUS_E_INVAL;
  216. }
  217. peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  218. if (peer) {
  219. peer->wds_ecm.wds_rx_filter = 1;
  220. peer->wds_ecm.wds_rx_ucast_4addr =
  221. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  222. peer->wds_ecm.wds_rx_mcast_4addr =
  223. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  224. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  225. }
  226. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_MISC);
  227. return QDF_STATUS_SUCCESS;
  228. }
  229. /**
  230. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  231. *
  232. * @cdp_soc: DP soc handle
  233. * @vdev_id: id of vdev handle
  234. * @peer_mac: peer mac address
  235. * @wds_tx_ucast: policy for unicast transmission
  236. * @wds_tx_mcast: policy for multicast transmission
  237. *
  238. * Return: void
  239. */
  240. QDF_STATUS
  241. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  242. uint8_t *peer_mac, int wds_tx_ucast,
  243. int wds_tx_mcast)
  244. {
  245. struct dp_peer *peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  246. peer_mac, 0,
  247. vdev_id,
  248. DP_MOD_ID_AST);
  249. if (!peer) {
  250. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  251. FL("peer is NULL for mac %pM vdev_id %d"),
  252. peer_mac, vdev_id);
  253. return QDF_STATUS_E_INVAL;
  254. }
  255. if (wds_tx_ucast || wds_tx_mcast) {
  256. peer->wds_enabled = 1;
  257. peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  258. peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  259. } else {
  260. peer->wds_enabled = 0;
  261. peer->wds_ecm.wds_tx_ucast_4addr = 0;
  262. peer->wds_ecm.wds_tx_mcast_4addr = 0;
  263. }
  264. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  265. "Policy Update set to :\n");
  266. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  267. "peer->wds_enabled %d\n", peer->wds_enabled);
  268. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  269. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  270. peer->wds_ecm.wds_tx_ucast_4addr);
  271. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  272. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  273. peer->wds_ecm.wds_tx_mcast_4addr);
  274. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  275. return QDF_STATUS_SUCCESS;
  276. }
  277. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  278. struct dp_vdev *vdev,
  279. struct dp_peer *peer)
  280. {
  281. struct dp_peer *bss_peer;
  282. int fr_ds, to_ds, rx_3addr, rx_4addr;
  283. int rx_policy_ucast, rx_policy_mcast;
  284. hal_soc_handle_t hal_soc = vdev->pdev->soc->hal_soc;
  285. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(hal_soc, rx_tlv_hdr);
  286. if (vdev->opmode == wlan_op_mode_ap) {
  287. bss_peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  288. /* if wds policy check is not enabled on this vdev, accept all frames */
  289. if (bss_peer && !bss_peer->wds_ecm.wds_rx_filter) {
  290. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  291. return 1;
  292. }
  293. rx_policy_ucast = bss_peer->wds_ecm.wds_rx_ucast_4addr;
  294. rx_policy_mcast = bss_peer->wds_ecm.wds_rx_mcast_4addr;
  295. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  296. } else { /* sta mode */
  297. if (!peer->wds_ecm.wds_rx_filter) {
  298. return 1;
  299. }
  300. rx_policy_ucast = peer->wds_ecm.wds_rx_ucast_4addr;
  301. rx_policy_mcast = peer->wds_ecm.wds_rx_mcast_4addr;
  302. }
  303. /* ------------------------------------------------
  304. * self
  305. * peer- rx rx-
  306. * wds ucast mcast dir policy accept note
  307. * ------------------------------------------------
  308. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  309. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  310. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  311. * 1 1 0 00 x1 0 bad frame, won't see it
  312. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  313. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  314. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  315. * 1 0 1 00 1x 0 bad frame, won't see it
  316. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  317. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  318. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  319. * 1 1 0 00 x0 0 bad frame, won't see it
  320. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  321. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  322. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  323. * 1 0 1 00 0x 0 bad frame, won't see it
  324. *
  325. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  326. * 0 x x 01 xx 1
  327. * 0 x x 10 xx 0
  328. * 0 x x 00 xx 0 bad frame, won't see it
  329. * ------------------------------------------------
  330. */
  331. fr_ds = hal_rx_mpdu_get_fr_ds(hal_soc, rx_tlv_hdr);
  332. to_ds = hal_rx_mpdu_get_to_ds(hal_soc, rx_tlv_hdr);
  333. rx_3addr = fr_ds ^ to_ds;
  334. rx_4addr = fr_ds & to_ds;
  335. if (vdev->opmode == wlan_op_mode_ap) {
  336. if ((!peer->wds_enabled && rx_3addr && to_ds) ||
  337. (peer->wds_enabled && !rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  338. (peer->wds_enabled && rx_mcast && (rx_4addr == rx_policy_mcast))) {
  339. return 1;
  340. }
  341. } else { /* sta mode */
  342. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  343. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  344. return 1;
  345. }
  346. }
  347. return 0;
  348. }
  349. #endif
  350. /**
  351. * dp_tx_add_groupkey_metadata - Add group key in metadata
  352. * @vdev: DP vdev handle
  353. * @msdu_info: MSDU info to be setup in MSDU descriptor
  354. * @group_key: Group key index programmed in metadata
  355. *
  356. * Return: void
  357. */
  358. #ifdef QCA_MULTIPASS_SUPPORT
  359. static
  360. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  361. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  362. {
  363. struct htt_tx_msdu_desc_ext2_t *meta_data =
  364. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  365. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  366. /*
  367. * When attempting to send a multicast packet with multi-passphrase,
  368. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  369. * ref htt.h indicating the group_id field in "key_flags" also having
  370. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  371. */
  372. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  373. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  374. }
  375. /**
  376. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  377. * @vdev: DP vdev handle
  378. * @tx_desc: Tx Descriptor Handle
  379. *
  380. * Return: void
  381. */
  382. static
  383. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  384. {
  385. struct vlan_ethhdr veth_hdr;
  386. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  387. /*
  388. * Extract VLAN header of 4 bytes:
  389. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  390. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  391. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  392. */
  393. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  394. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  395. veh = (struct vlan_ethhdr *)nbuf->data;
  396. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  397. return;
  398. }
  399. /**
  400. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  401. * @vdev: DP vdev handle
  402. * @tx_desc: Tx Descriptor Handle
  403. * @vlan_id: vlan id of frame
  404. *
  405. * Return: whether peer is special or classic
  406. */
  407. static
  408. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  409. qdf_nbuf_t buf, uint16_t *vlan_id)
  410. {
  411. struct dp_peer *peer = NULL;
  412. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  413. struct vlan_ethhdr *veh = NULL;
  414. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  415. (htons(eh->ether_type) != ETH_P_8021Q));
  416. if (qdf_unlikely(not_vlan))
  417. return DP_VLAN_UNTAGGED;
  418. veh = (struct vlan_ethhdr *)eh;
  419. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  420. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  421. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  422. TAILQ_FOREACH(peer, &vdev->mpass_peer_list,
  423. mpass_peer_list_elem) {
  424. if (*vlan_id == peer->vlan_id) {
  425. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  426. return DP_VLAN_TAGGED_MULTICAST;
  427. }
  428. }
  429. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  430. return DP_VLAN_UNTAGGED;
  431. }
  432. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL,
  433. DP_MOD_ID_TX_MULTIPASS);
  434. if (qdf_unlikely(peer == NULL))
  435. return DP_VLAN_UNTAGGED;
  436. /*
  437. * Do not drop the frame when vlan_id doesn't match.
  438. * Send the frame as it is.
  439. */
  440. if (*vlan_id == peer->vlan_id) {
  441. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  442. return DP_VLAN_TAGGED_UNICAST;
  443. }
  444. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  445. return DP_VLAN_UNTAGGED;
  446. }
  447. /**
  448. * dp_tx_multipass_process - Process vlan frames in tx path
  449. * @soc: dp soc handle
  450. * @vdev: DP vdev handle
  451. * @nbuf: skb
  452. * @msdu_info: msdu descriptor
  453. *
  454. * Return: status whether frame needs to be dropped or transmitted
  455. */
  456. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  457. qdf_nbuf_t nbuf,
  458. struct dp_tx_msdu_info_s *msdu_info)
  459. {
  460. uint16_t vlan_id = 0;
  461. uint16_t group_key = 0;
  462. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  463. qdf_nbuf_t nbuf_copy = NULL;
  464. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  465. return true;
  466. }
  467. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  468. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  469. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  470. return true;
  471. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  472. dp_tx_remove_vlan_tag(vdev, nbuf);
  473. return true;
  474. }
  475. /* AP can have classic clients, special clients &
  476. * classic repeaters.
  477. * 1. Classic clients & special client:
  478. * Remove vlan header, find corresponding group key
  479. * index, fill in metaheader and enqueue multicast
  480. * frame to TCL.
  481. * 2. Classic repeater:
  482. * Pass through to classic repeater with vlan tag
  483. * intact without any group key index. Hardware
  484. * will know which key to use to send frame to
  485. * repeater.
  486. */
  487. nbuf_copy = qdf_nbuf_copy(nbuf);
  488. /*
  489. * Send multicast frame to special peers even
  490. * if pass through to classic repeater fails.
  491. */
  492. if (nbuf_copy) {
  493. struct dp_tx_msdu_info_s msdu_info_copy;
  494. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  495. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  496. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  497. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  498. if (nbuf_copy) {
  499. qdf_nbuf_free(nbuf_copy);
  500. qdf_err("nbuf_copy send failed");
  501. }
  502. }
  503. group_key = vdev->iv_vlan_map[vlan_id];
  504. /*
  505. * If group key is not installed, drop the frame.
  506. */
  507. if (!group_key)
  508. return false;
  509. dp_tx_remove_vlan_tag(vdev, nbuf);
  510. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  511. msdu_info->exception_fw = 1;
  512. return true;
  513. }
  514. /**
  515. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  516. * @vdev: DP vdev handle
  517. * @nbuf: skb
  518. * @tid: traffic priority
  519. *
  520. * Return: bool: true in case of success else false
  521. * Success is considered if:
  522. * i. If frame has vlan header
  523. * ii. If the frame comes from different peer and dont need multipass processing
  524. * Failure is considered if:
  525. * i. Frame comes from multipass peer but doesn't contain vlan header.
  526. * In failure case, drop such frames.
  527. */
  528. bool dp_rx_multipass_process(struct dp_peer *peer, qdf_nbuf_t nbuf, uint8_t tid)
  529. {
  530. struct vlan_ethhdr *vethhdrp;
  531. if (qdf_unlikely(!peer->vlan_id))
  532. return true;
  533. vethhdrp = (struct vlan_ethhdr *)qdf_nbuf_data(nbuf);
  534. /*
  535. * h_vlan_proto & h_vlan_TCI should be 0x8100 & zero respectively
  536. * as it is expected to be padded by 0
  537. * return false if frame doesn't have above tag so that caller will
  538. * drop the frame.
  539. */
  540. if (qdf_unlikely(vethhdrp->h_vlan_proto != htons(QDF_ETH_TYPE_8021Q)) ||
  541. qdf_unlikely(vethhdrp->h_vlan_TCI != 0))
  542. return false;
  543. vethhdrp->h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  544. (peer->vlan_id & VLAN_VID_MASK));
  545. return true;
  546. }
  547. #endif /* QCA_MULTIPASS_SUPPORT */
  548. #endif /* QCA_HOST_MODE_WIFI_DISABLED */
  549. #ifdef QCA_MULTIPASS_SUPPORT
  550. /**
  551. * dp_peer_multipass_list_remove: remove peer from list
  552. * @peer: pointer to peer
  553. *
  554. * return: void
  555. */
  556. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  557. {
  558. struct dp_vdev *vdev = peer->vdev;
  559. struct dp_peer *tpeer = NULL;
  560. bool found = 0;
  561. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  562. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  563. if (tpeer == peer) {
  564. found = 1;
  565. TAILQ_REMOVE(&vdev->mpass_peer_list, peer, mpass_peer_list_elem);
  566. break;
  567. }
  568. }
  569. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  570. if (found)
  571. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  572. }
  573. /**
  574. * dp_peer_multipass_list_add: add to new multipass list
  575. * @dp_soc: soc handle
  576. * @peer_mac: mac address
  577. * @vdev_id: vdev id for peer
  578. * @vlan_id: vlan_id
  579. *
  580. * return: void
  581. */
  582. static void dp_peer_multipass_list_add(struct dp_soc *soc, uint8_t *peer_mac,
  583. uint8_t vdev_id, uint16_t vlan_id)
  584. {
  585. struct dp_peer *peer =
  586. dp_peer_find_hash_find(soc, peer_mac, 0, vdev_id,
  587. DP_MOD_ID_TX_MULTIPASS);
  588. if (qdf_unlikely(!peer)) {
  589. qdf_err("NULL peer");
  590. return;
  591. }
  592. /* If peer already exists in vdev multipass list, do not add it.
  593. * This may happen if key install comes twice or re-key
  594. * happens for a peer.
  595. */
  596. if (peer->vlan_id) {
  597. dp_debug("peer already added to vdev multipass list"
  598. "MAC: "QDF_MAC_ADDR_FMT" vlan: %d ",
  599. QDF_MAC_ADDR_REF(peer->mac_addr.raw), peer->vlan_id);
  600. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  601. return;
  602. }
  603. /*
  604. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  605. * Decrement it when element is deleted from the list.
  606. */
  607. peer->vlan_id = vlan_id;
  608. qdf_spin_lock_bh(&peer->vdev->mpass_peer_mutex);
  609. TAILQ_INSERT_HEAD(&peer->vdev->mpass_peer_list, peer,
  610. mpass_peer_list_elem);
  611. qdf_spin_unlock_bh(&peer->vdev->mpass_peer_mutex);
  612. }
  613. /**
  614. * dp_peer_set_vlan_id: set vlan_id for this peer
  615. * @cdp_soc: soc handle
  616. * @vdev_id: vdev id for peer
  617. * @peer_mac: mac address
  618. * @vlan_id: vlan id for peer
  619. *
  620. * return: void
  621. */
  622. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  623. uint8_t vdev_id, uint8_t *peer_mac,
  624. uint16_t vlan_id)
  625. {
  626. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  627. struct dp_vdev *vdev =
  628. dp_vdev_get_ref_by_id((struct dp_soc *)soc, vdev_id,
  629. DP_MOD_ID_TX_MULTIPASS);
  630. if (vdev && vdev->multipass_en) {
  631. dp_peer_multipass_list_add(soc, peer_mac, vdev_id, vlan_id);
  632. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  633. }
  634. }
  635. /**
  636. * dp_set_vlan_groupkey: set vlan map for vdev
  637. * @soc: pointer to soc
  638. * @vdev_id : id of vdev
  639. * @vlan_id: vlan_id
  640. * @group_key: group key for vlan
  641. *
  642. * return: set success/failure
  643. */
  644. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  645. uint16_t vlan_id, uint16_t group_key)
  646. {
  647. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  648. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  649. DP_MOD_ID_TX_MULTIPASS);
  650. QDF_STATUS status;
  651. if (!vdev || !vdev->multipass_en) {
  652. status = QDF_STATUS_E_INVAL;
  653. goto fail;
  654. }
  655. if (!vdev->iv_vlan_map) {
  656. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  657. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  658. if (!vdev->iv_vlan_map) {
  659. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  660. status = QDF_STATUS_E_NOMEM;
  661. goto fail;
  662. }
  663. /*
  664. * 0 is invalid group key.
  665. * Initilalize array with invalid group keys.
  666. */
  667. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  668. }
  669. if (vlan_id >= DP_MAX_VLAN_IDS) {
  670. status = QDF_STATUS_E_INVAL;
  671. goto fail;
  672. }
  673. vdev->iv_vlan_map[vlan_id] = group_key;
  674. status = QDF_STATUS_SUCCESS;
  675. fail:
  676. if (vdev)
  677. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  678. return status;
  679. }
  680. /**
  681. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  682. * @vdev_handle: pointer to vdev
  683. *
  684. * return: void
  685. */
  686. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  687. {
  688. struct dp_peer *peer = NULL;
  689. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  690. TAILQ_FOREACH(peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  691. qdf_err("Peers present in mpass list :" QDF_MAC_ADDR_FMT,
  692. QDF_MAC_ADDR_REF(peer->mac_addr.raw));
  693. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  694. if (vdev->iv_vlan_map) {
  695. qdf_mem_free(vdev->iv_vlan_map);
  696. vdev->iv_vlan_map = NULL;
  697. }
  698. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  699. }
  700. /**
  701. * dp_peer_multipass_list_init: initialize peer mulitpass list
  702. * @vdev_handle: pointer to vdev
  703. *
  704. * return: set success/failure
  705. */
  706. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  707. {
  708. /*
  709. * vdev->iv_vlan_map is allocated when the first configuration command
  710. * is issued to avoid unnecessary allocation for regular mode VAP.
  711. */
  712. TAILQ_INIT(&vdev->mpass_peer_list);
  713. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  714. }
  715. #endif /* QCA_MULTIPASS_SUPPORT */
  716. #ifdef QCA_PEER_MULTIQ_SUPPORT
  717. /**
  718. * dp_peer_reset_flowq_map() - reset peer flowq map table
  719. * @peer - dp peer handle
  720. *
  721. * Return: none
  722. */
  723. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  724. {
  725. int i = 0;
  726. if (!peer)
  727. return;
  728. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  729. peer->peer_ast_flowq_idx[i].is_valid = false;
  730. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  731. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  732. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  733. }
  734. }
  735. /**
  736. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  737. * @peer - dp peer handle
  738. * @mask - flow mask
  739. *
  740. * Return: flow id
  741. */
  742. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  743. uint8_t mask)
  744. {
  745. if (!peer) {
  746. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  747. "%s: Invalid peer\n", __func__);
  748. return -1;
  749. }
  750. if (mask & DP_PEER_AST0_FLOW_MASK)
  751. return DP_PEER_AST_FLOWQ_UDP;
  752. else if (mask & DP_PEER_AST1_FLOW_MASK)
  753. return DP_PEER_AST_FLOWQ_NON_UDP;
  754. else if (mask & DP_PEER_AST2_FLOW_MASK)
  755. return DP_PEER_AST_FLOWQ_HI_PRIO;
  756. else if (mask & DP_PEER_AST3_FLOW_MASK)
  757. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  758. return DP_PEER_AST_FLOWQ_MAX;
  759. }
  760. /**
  761. * dp_peer_get_ast_valid() - get ast index valid from mask
  762. * @mask - mask for ast valid bits
  763. * @index - index for an ast
  764. *
  765. * Return - 1 if ast index is valid from mask else 0
  766. */
  767. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  768. {
  769. if (index == 0)
  770. return 1;
  771. return ((mask) & (1 << ((index) - 1)));
  772. }
  773. /**
  774. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  775. * @soc - genereic soc handle
  776. * @is_wds - flag to indicate if peer is wds
  777. * @peer_id - peer_id from htt peer map message
  778. * @peer_mac_addr - mac address of the peer
  779. * @ast_info - ast flow override information from peer map
  780. *
  781. * Return: none
  782. */
  783. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  784. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  785. struct dp_ast_flow_override_info *ast_info)
  786. {
  787. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  788. struct dp_peer *peer = NULL;
  789. uint8_t i;
  790. /*
  791. * Ast flow override feature is supported
  792. * only for connected client
  793. */
  794. if (is_wds)
  795. return;
  796. peer = dp_peer_get_ref_by_id(soc, peer_id, DP_MOD_ID_AST);
  797. if (!peer) {
  798. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  799. "%s: Invalid peer\n", __func__);
  800. return;
  801. }
  802. /* Valid only in AP mode */
  803. if (peer->vdev->opmode != wlan_op_mode_ap) {
  804. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  805. "%s: Peer ast flow map not in STA mode\n", __func__);
  806. goto end;
  807. }
  808. /* Making sure the peer is for this mac address */
  809. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  810. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  811. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  812. "%s: Peer mac address mismatch\n", __func__);
  813. goto end;
  814. }
  815. /* Ast entry flow mapping not valid for self peer map */
  816. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  817. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  818. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  819. "%s: Ast flow mapping not valid for self peer \n", __func__);
  820. goto end;
  821. }
  822. /* Fill up ast index <---> flow id mapping table for this peer */
  823. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  824. /* Check if this ast index is valid */
  825. peer->peer_ast_flowq_idx[i].is_valid =
  826. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  827. if (!peer->peer_ast_flowq_idx[i].is_valid)
  828. continue;
  829. /* Get the flow queue id which is mapped to this ast index */
  830. peer->peer_ast_flowq_idx[i].flowQ =
  831. dp_peer_get_flowid_from_flowmask(peer,
  832. ast_info->ast_flow_mask[i]);
  833. /*
  834. * Update tid valid mask only if flow id HIGH or
  835. * Low priority
  836. */
  837. if (peer->peer_ast_flowq_idx[i].flowQ ==
  838. DP_PEER_AST_FLOWQ_HI_PRIO) {
  839. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  840. ast_info->tid_valid_hi_pri_mask;
  841. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  842. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  843. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  844. ast_info->tid_valid_low_pri_mask;
  845. }
  846. /* Save the ast index for this entry */
  847. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  848. }
  849. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  850. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  851. soc->ctrl_psoc, peer->peer_id,
  852. peer->vdev->vdev_id, peer_mac_addr);
  853. }
  854. end:
  855. /* Release peer reference */
  856. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  857. }
  858. /**
  859. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  860. * @soc - soc handle
  861. * @peer_mac_addr - mac address of the peer
  862. * @flow_id - flow id to find ast index
  863. *
  864. * Return: ast index for a given flow id, -1 for fail cases
  865. */
  866. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  867. uint16_t vdev_id, uint8_t *peer_mac_addr,
  868. uint8_t flow_id, uint8_t tid)
  869. {
  870. struct dp_peer *peer = NULL;
  871. uint8_t i;
  872. uint16_t ast_index;
  873. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  874. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  875. "Invalid Flow ID %d\n", flow_id);
  876. return -1;
  877. }
  878. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  879. peer_mac_addr, 0, vdev_id,
  880. DP_MOD_ID_AST);
  881. if (!peer) {
  882. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  883. "%s: Invalid peer\n", __func__);
  884. return -1;
  885. }
  886. /*
  887. * Loop over the ast entry <----> flow-id mapping to find
  888. * which ast index entry has this flow queue id enabled.
  889. */
  890. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  891. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  892. /*
  893. * Found the matching index for this flow id
  894. */
  895. break;
  896. }
  897. /*
  898. * No match found for this flow id
  899. */
  900. if (i == DP_PEER_AST_FLOWQ_MAX) {
  901. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  902. "%s: ast index not found for flow %d\n", __func__, flow_id);
  903. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  904. return -1;
  905. }
  906. /* Check whether this ast entry is valid */
  907. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  908. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  909. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  910. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  911. return -1;
  912. }
  913. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  914. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  915. /*
  916. * check if this tid is valid for Hi
  917. * and Low priority flow id
  918. */
  919. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  920. & (1 << tid))) {
  921. /* Release peer reference */
  922. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  923. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  924. return ast_index;
  925. } else {
  926. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  927. "%s: TID %d is not valid for flow %d\n",
  928. __func__, tid, flow_id);
  929. /*
  930. * TID is not valid for this flow
  931. * Return -1
  932. */
  933. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  934. return -1;
  935. }
  936. }
  937. /*
  938. * TID valid check not required for
  939. * UDP/NON UDP flow id
  940. */
  941. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  942. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  943. return ast_index;
  944. }
  945. #endif
  946. void dp_hmwds_ast_add_notify(struct dp_peer *peer,
  947. uint8_t *mac_addr,
  948. enum cdp_txrx_ast_entry_type type,
  949. QDF_STATUS err,
  950. bool is_peer_map)
  951. {
  952. struct dp_vdev *dp_vdev = peer->vdev;
  953. struct dp_pdev *dp_pdev = dp_vdev->pdev;
  954. struct cdp_peer_hmwds_ast_add_status add_status;
  955. /* Ignore ast types other than HM */
  956. if ((type != CDP_TXRX_AST_TYPE_WDS_HM) &&
  957. (type != CDP_TXRX_AST_TYPE_WDS_HM_SEC))
  958. return;
  959. /* existing ast delete in progress, will be attempted
  960. * to add again after delete is complete. Send status then.
  961. */
  962. if (err == QDF_STATUS_E_AGAIN)
  963. return;
  964. /* peer map pending, notify actual status
  965. * when peer map is received.
  966. */
  967. if (!is_peer_map && (err == QDF_STATUS_SUCCESS))
  968. return;
  969. qdf_mem_zero(&add_status, sizeof(add_status));
  970. add_status.vdev_id = dp_vdev->vdev_id;
  971. /* For type CDP_TXRX_AST_TYPE_WDS_HM_SEC dp_peer_add_ast()
  972. * returns QDF_STATUS_E_FAILURE as it is host only entry.
  973. * In such cases set err as success. Also err code set to
  974. * QDF_STATUS_E_ALREADY indicates entry already exist in
  975. * such cases set err as success too. Any other error code
  976. * is actual error.
  977. */
  978. if (((type == CDP_TXRX_AST_TYPE_WDS_HM_SEC) &&
  979. (err == QDF_STATUS_E_FAILURE)) ||
  980. (err == QDF_STATUS_E_ALREADY)) {
  981. err = QDF_STATUS_SUCCESS;
  982. }
  983. add_status.status = err;
  984. qdf_mem_copy(add_status.peer_mac, peer->mac_addr.raw,
  985. QDF_MAC_ADDR_SIZE);
  986. qdf_mem_copy(add_status.ast_mac, mac_addr,
  987. QDF_MAC_ADDR_SIZE);
  988. #ifdef WDI_EVENT_ENABLE
  989. dp_wdi_event_handler(WDI_EVENT_HMWDS_AST_ADD_STATUS, dp_pdev->soc,
  990. (void *)&add_status, 0,
  991. WDI_NO_VAL, dp_pdev->pdev_id);
  992. #endif
  993. }
  994. #ifdef FEATURE_PERPKT_INFO
  995. /**
  996. * dp_get_completion_indication_for_stack() - send completion to stack
  997. * @soc : dp_soc handle
  998. * @pdev: dp_pdev handle
  999. * @peer: dp peer handle
  1000. * @ts: transmit completion status structure
  1001. * @netbuf: Buffer pointer for free
  1002. *
  1003. * This function is used for indication whether buffer needs to be
  1004. * sent to stack for freeing or not
  1005. */
  1006. QDF_STATUS
  1007. dp_get_completion_indication_for_stack(struct dp_soc *soc,
  1008. struct dp_pdev *pdev,
  1009. struct dp_peer *peer,
  1010. struct hal_tx_completion_status *ts,
  1011. qdf_nbuf_t netbuf,
  1012. uint64_t time_latency)
  1013. {
  1014. struct tx_capture_hdr *ppdu_hdr;
  1015. uint16_t peer_id = ts->peer_id;
  1016. uint32_t ppdu_id = ts->ppdu_id;
  1017. uint8_t first_msdu = ts->first_msdu;
  1018. uint8_t last_msdu = ts->last_msdu;
  1019. uint32_t txcap_hdr_size = sizeof(struct tx_capture_hdr);
  1020. if (qdf_unlikely(!pdev->tx_sniffer_enable && !pdev->mcopy_mode &&
  1021. !pdev->latency_capture_enable))
  1022. return QDF_STATUS_E_NOSUPPORT;
  1023. if (!peer) {
  1024. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1025. FL("Peer Invalid"));
  1026. return QDF_STATUS_E_INVAL;
  1027. }
  1028. if (pdev->mcopy_mode) {
  1029. /* If mcopy is enabled and mcopy_mode is M_COPY deliver 1st MSDU
  1030. * per PPDU. If mcopy_mode is M_COPY_EXTENDED deliver 1st MSDU
  1031. * for each MPDU
  1032. */
  1033. if (pdev->mcopy_mode == M_COPY) {
  1034. if ((pdev->m_copy_id.tx_ppdu_id == ppdu_id) &&
  1035. (pdev->m_copy_id.tx_peer_id == peer_id)) {
  1036. return QDF_STATUS_E_INVAL;
  1037. }
  1038. }
  1039. if (!first_msdu)
  1040. return QDF_STATUS_E_INVAL;
  1041. pdev->m_copy_id.tx_ppdu_id = ppdu_id;
  1042. pdev->m_copy_id.tx_peer_id = peer_id;
  1043. }
  1044. if (qdf_unlikely(qdf_nbuf_headroom(netbuf) < txcap_hdr_size)) {
  1045. netbuf = qdf_nbuf_realloc_headroom(netbuf, txcap_hdr_size);
  1046. if (!netbuf) {
  1047. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1048. FL("No headroom"));
  1049. return QDF_STATUS_E_NOMEM;
  1050. }
  1051. }
  1052. if (!qdf_nbuf_push_head(netbuf, txcap_hdr_size)) {
  1053. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1054. FL("No headroom"));
  1055. return QDF_STATUS_E_NOMEM;
  1056. }
  1057. ppdu_hdr = (struct tx_capture_hdr *)qdf_nbuf_data(netbuf);
  1058. qdf_mem_copy(ppdu_hdr->ta, peer->vdev->mac_addr.raw,
  1059. QDF_MAC_ADDR_SIZE);
  1060. qdf_mem_copy(ppdu_hdr->ra, peer->mac_addr.raw,
  1061. QDF_MAC_ADDR_SIZE);
  1062. ppdu_hdr->ppdu_id = ppdu_id;
  1063. ppdu_hdr->peer_id = peer_id;
  1064. ppdu_hdr->first_msdu = first_msdu;
  1065. ppdu_hdr->last_msdu = last_msdu;
  1066. if (qdf_unlikely(pdev->latency_capture_enable)) {
  1067. ppdu_hdr->tsf = ts->tsf;
  1068. ppdu_hdr->time_latency = time_latency;
  1069. }
  1070. return QDF_STATUS_SUCCESS;
  1071. }
  1072. /**
  1073. * dp_send_completion_to_stack() - send completion to stack
  1074. * @soc : dp_soc handle
  1075. * @pdev: dp_pdev handle
  1076. * @peer_id: peer_id of the peer for which completion came
  1077. * @ppdu_id: ppdu_id
  1078. * @netbuf: Buffer pointer for free
  1079. *
  1080. * This function is used to send completion to stack
  1081. * to free buffer
  1082. */
  1083. void dp_send_completion_to_stack(struct dp_soc *soc, struct dp_pdev *pdev,
  1084. uint16_t peer_id, uint32_t ppdu_id,
  1085. qdf_nbuf_t netbuf)
  1086. {
  1087. dp_wdi_event_handler(WDI_EVENT_TX_DATA, soc,
  1088. netbuf, peer_id,
  1089. WDI_NO_VAL, pdev->pdev_id);
  1090. }
  1091. #endif