dp_txrx_wds.c 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071
  1. /*
  2. * Copyright (c) 2016-2020 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "../../../cmn_dev/fw_hdr/fw/htt.h"
  19. #include "dp_peer.h"
  20. #include "hal_rx.h"
  21. #include "hal_api.h"
  22. #include "qdf_nbuf.h"
  23. #include "dp_types.h"
  24. #include "dp_internal.h"
  25. #include "dp_tx.h"
  26. #include "enet.h"
  27. #include "dp_txrx_wds.h"
  28. /* Generic AST entry aging timer value */
  29. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  30. #define DP_VLAN_UNTAGGED 0
  31. #define DP_VLAN_TAGGED_MULTICAST 1
  32. #define DP_VLAN_TAGGED_UNICAST 2
  33. #define DP_MAX_VLAN_IDS 4096
  34. #define DP_INVALID_AST_IDX 0xffff
  35. #define DP_INVALID_FLOW_PRIORITY 0xff
  36. #define DP_PEER_AST0_FLOW_MASK 0x4
  37. #define DP_PEER_AST1_FLOW_MASK 0x8
  38. #define DP_PEER_AST2_FLOW_MASK 0x1
  39. #define DP_PEER_AST3_FLOW_MASK 0x2
  40. #define DP_MAX_AST_INDEX_PER_PEER 4
  41. static void dp_ast_aging_timer_fn(void *soc_hdl)
  42. {
  43. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  44. struct dp_pdev *pdev;
  45. struct dp_vdev *vdev;
  46. struct dp_peer *peer;
  47. struct dp_ast_entry *ase, *temp_ase;
  48. int i;
  49. bool check_wds_ase = false;
  50. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  51. soc->wds_ast_aging_timer_cnt = 0;
  52. check_wds_ase = true;
  53. }
  54. /* Peer list access lock */
  55. qdf_spin_lock_bh(&soc->peer_ref_mutex);
  56. /* AST list access lock */
  57. qdf_spin_lock_bh(&soc->ast_lock);
  58. for (i = 0; i < MAX_PDEV_CNT && soc->pdev_list[i]; i++) {
  59. pdev = soc->pdev_list[i];
  60. qdf_spin_lock_bh(&pdev->vdev_list_lock);
  61. DP_PDEV_ITERATE_VDEV_LIST(pdev, vdev) {
  62. DP_VDEV_ITERATE_PEER_LIST(vdev, peer) {
  63. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  64. /*
  65. * Do not expire static ast entries
  66. * and HM WDS entries
  67. */
  68. if (ase->type !=
  69. CDP_TXRX_AST_TYPE_WDS &&
  70. ase->type !=
  71. CDP_TXRX_AST_TYPE_MEC &&
  72. ase->type !=
  73. CDP_TXRX_AST_TYPE_DA)
  74. continue;
  75. /* Expire MEC entry every n sec.
  76. * This needs to be expired in
  77. * case if STA backbone is made as
  78. * AP backbone, In this case it needs
  79. * to be re-added as a WDS entry.
  80. */
  81. if (ase->is_active && ase->type ==
  82. CDP_TXRX_AST_TYPE_MEC) {
  83. ase->is_active = FALSE;
  84. continue;
  85. } else if (ase->is_active &&
  86. check_wds_ase) {
  87. ase->is_active = FALSE;
  88. continue;
  89. }
  90. if (ase->type ==
  91. CDP_TXRX_AST_TYPE_MEC) {
  92. DP_STATS_INC(soc,
  93. ast.aged_out, 1);
  94. dp_peer_del_ast(soc, ase);
  95. } else if (check_wds_ase) {
  96. DP_STATS_INC(soc,
  97. ast.aged_out, 1);
  98. dp_peer_del_ast(soc, ase);
  99. }
  100. }
  101. }
  102. }
  103. qdf_spin_unlock_bh(&pdev->vdev_list_lock);
  104. }
  105. qdf_spin_unlock_bh(&soc->ast_lock);
  106. qdf_spin_unlock_bh(&soc->peer_ref_mutex);
  107. if (qdf_atomic_read(&soc->cmn_init_done))
  108. qdf_timer_mod(&soc->ast_aging_timer,
  109. DP_AST_AGING_TIMER_DEFAULT_MS);
  110. }
  111. /*
  112. * dp_soc_wds_attach() - Setup WDS timer and AST table
  113. * @soc: Datapath SOC handle
  114. *
  115. * Return: None
  116. */
  117. void dp_soc_wds_attach(struct dp_soc *soc)
  118. {
  119. soc->wds_ast_aging_timer_cnt = 0;
  120. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  121. dp_ast_aging_timer_fn, (void *)soc,
  122. QDF_TIMER_TYPE_WAKE_APPS);
  123. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  124. }
  125. /*
  126. * dp_soc_wds_detach() - Detach WDS data structures and timers
  127. * @txrx_soc: DP SOC handle
  128. *
  129. * Return: None
  130. */
  131. void dp_soc_wds_detach(struct dp_soc *soc)
  132. {
  133. qdf_timer_stop(&soc->ast_aging_timer);
  134. qdf_timer_free(&soc->ast_aging_timer);
  135. }
  136. /**
  137. * dp_rx_da_learn() - Add AST entry based on DA lookup
  138. * This is a WAR for HK 1.0 and will
  139. * be removed in HK 2.0
  140. *
  141. * @soc: core txrx main context
  142. * @rx_tlv_hdr : start address of rx tlvs
  143. * @ta_peer : Transmitter peer entry
  144. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  145. *
  146. */
  147. void
  148. dp_rx_da_learn(struct dp_soc *soc,
  149. uint8_t *rx_tlv_hdr,
  150. struct dp_peer *ta_peer,
  151. qdf_nbuf_t nbuf)
  152. {
  153. /* For HKv2 DA port learing is not needed */
  154. if (qdf_likely(soc->ast_override_support))
  155. return;
  156. if (qdf_unlikely(!ta_peer))
  157. return;
  158. if (qdf_unlikely(ta_peer->vdev->opmode != wlan_op_mode_ap))
  159. return;
  160. if (!soc->da_war_enabled)
  161. return;
  162. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  163. !qdf_nbuf_is_da_mcbc(nbuf))) {
  164. dp_peer_add_ast(soc,
  165. ta_peer,
  166. qdf_nbuf_data(nbuf),
  167. CDP_TXRX_AST_TYPE_DA,
  168. IEEE80211_NODE_F_WDS_HM);
  169. }
  170. }
  171. /**
  172. * dp_tx_mec_handler() - Tx MEC Notify Handler
  173. * @vdev: pointer to dp dev handler
  174. * @status : Tx completion status from HTT descriptor
  175. *
  176. * Handles MEC notify event sent from fw to Host
  177. *
  178. * Return: none
  179. */
  180. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  181. {
  182. struct dp_soc *soc;
  183. uint32_t flags = IEEE80211_NODE_F_WDS_HM;
  184. struct dp_peer *peer;
  185. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  186. if (!vdev->mec_enabled)
  187. return;
  188. /* MEC required only in STA mode */
  189. if (vdev->opmode != wlan_op_mode_sta)
  190. return;
  191. soc = vdev->pdev->soc;
  192. peer = vdev->vap_bss_peer;
  193. if (!peer) {
  194. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  195. FL("peer is NULL"));
  196. return;
  197. }
  198. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  199. "%s Tx MEC Handler",
  200. __func__);
  201. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  202. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  203. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  204. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE))
  205. dp_peer_add_ast(soc,
  206. peer,
  207. mac_addr,
  208. CDP_TXRX_AST_TYPE_MEC,
  209. flags);
  210. }
  211. /**
  212. * dp_txrx_set_wds_rx_policy() - API to store datapath
  213. * config parameters
  214. * @soc - datapath soc handle
  215. * @vdev_id - id of datapath vdev handle
  216. * @cfg: ini parameter handle
  217. *
  218. * Return: status
  219. */
  220. #ifdef WDS_VENDOR_EXTENSION
  221. void
  222. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc, uint8_t vdev_id, u_int32_t val)
  223. {
  224. struct dp_peer *peer;
  225. struct dp_vdev *vdev =
  226. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  227. vdev_id);
  228. if (!vdev) {
  229. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  230. FL("vdev is NULL for vdev_id %d"), vdev_id);
  231. return;
  232. }
  233. if (vdev->opmode == wlan_op_mode_ap) {
  234. /* for ap, set it on bss_peer */
  235. TAILQ_FOREACH(peer, &vdev->peer_list, peer_list_elem) {
  236. if (peer->bss_peer) {
  237. peer->wds_ecm.wds_rx_filter = 1;
  238. peer->wds_ecm.wds_rx_ucast_4addr =
  239. (val & WDS_POLICY_RX_UCAST_4ADDR) ?
  240. 1 : 0;
  241. peer->wds_ecm.wds_rx_mcast_4addr =
  242. (val & WDS_POLICY_RX_MCAST_4ADDR) ?
  243. 1 : 0;
  244. break;
  245. }
  246. }
  247. } else if (vdev->opmode == wlan_op_mode_sta) {
  248. peer = TAILQ_FIRST(&vdev->peer_list);
  249. peer->wds_ecm.wds_rx_filter = 1;
  250. peer->wds_ecm.wds_rx_ucast_4addr =
  251. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  252. peer->wds_ecm.wds_rx_mcast_4addr =
  253. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  254. }
  255. }
  256. /**
  257. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  258. *
  259. * @cdp_soc: DP soc handle
  260. * @vdev_id: id of vdev handle
  261. * @peer_mac: peer mac address
  262. * @wds_tx_ucast: policy for unicast transmission
  263. * @wds_tx_mcast: policy for multicast transmission
  264. *
  265. * Return: void
  266. */
  267. void
  268. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  269. uint8_t *peer_mac, int wds_tx_ucast,
  270. int wds_tx_mcast)
  271. {
  272. struct dp_peer *peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  273. peer_mac, 0,
  274. vdev_id);
  275. if (!peer) {
  276. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  277. FL("peer is NULL for mac %pM vdev_id %d"),
  278. peer_mac, vdev_id);
  279. return;
  280. }
  281. if (wds_tx_ucast || wds_tx_mcast) {
  282. peer->wds_enabled = 1;
  283. peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  284. peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  285. } else {
  286. peer->wds_enabled = 0;
  287. peer->wds_ecm.wds_tx_ucast_4addr = 0;
  288. peer->wds_ecm.wds_tx_mcast_4addr = 0;
  289. }
  290. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  291. "Policy Update set to :\n");
  292. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  293. "peer->wds_enabled %d\n", peer->wds_enabled);
  294. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  295. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  296. peer->wds_ecm.wds_tx_ucast_4addr);
  297. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  298. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  299. peer->wds_ecm.wds_tx_mcast_4addr);
  300. dp_peer_unref_delete(peer);
  301. }
  302. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  303. struct dp_vdev *vdev,
  304. struct dp_peer *peer)
  305. {
  306. struct dp_peer *bss_peer;
  307. int fr_ds, to_ds, rx_3addr, rx_4addr;
  308. int rx_policy_ucast, rx_policy_mcast;
  309. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(rx_tlv_hdr);
  310. if (vdev->opmode == wlan_op_mode_ap) {
  311. TAILQ_FOREACH(bss_peer, &vdev->peer_list, peer_list_elem) {
  312. if (bss_peer->bss_peer) {
  313. /* if wds policy check is not enabled on this vdev, accept all frames */
  314. if (!bss_peer->wds_ecm.wds_rx_filter) {
  315. return 1;
  316. }
  317. break;
  318. }
  319. }
  320. rx_policy_ucast = bss_peer->wds_ecm.wds_rx_ucast_4addr;
  321. rx_policy_mcast = bss_peer->wds_ecm.wds_rx_mcast_4addr;
  322. } else { /* sta mode */
  323. if (!peer->wds_ecm.wds_rx_filter) {
  324. return 1;
  325. }
  326. rx_policy_ucast = peer->wds_ecm.wds_rx_ucast_4addr;
  327. rx_policy_mcast = peer->wds_ecm.wds_rx_mcast_4addr;
  328. }
  329. /* ------------------------------------------------
  330. * self
  331. * peer- rx rx-
  332. * wds ucast mcast dir policy accept note
  333. * ------------------------------------------------
  334. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  335. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  336. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  337. * 1 1 0 00 x1 0 bad frame, won't see it
  338. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  339. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  340. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  341. * 1 0 1 00 1x 0 bad frame, won't see it
  342. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  343. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  344. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  345. * 1 1 0 00 x0 0 bad frame, won't see it
  346. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  347. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  348. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  349. * 1 0 1 00 0x 0 bad frame, won't see it
  350. *
  351. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  352. * 0 x x 01 xx 1
  353. * 0 x x 10 xx 0
  354. * 0 x x 00 xx 0 bad frame, won't see it
  355. * ------------------------------------------------
  356. */
  357. fr_ds = hal_rx_mpdu_get_fr_ds(rx_tlv_hdr);
  358. to_ds = hal_rx_mpdu_get_to_ds(rx_tlv_hdr);
  359. rx_3addr = fr_ds ^ to_ds;
  360. rx_4addr = fr_ds & to_ds;
  361. if (vdev->opmode == wlan_op_mode_ap) {
  362. if ((!peer->wds_enabled && rx_3addr && to_ds) ||
  363. (peer->wds_enabled && !rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  364. (peer->wds_enabled && rx_mcast && (rx_4addr == rx_policy_mcast))) {
  365. return 1;
  366. }
  367. } else { /* sta mode */
  368. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  369. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  370. return 1;
  371. }
  372. }
  373. return 0;
  374. }
  375. #endif
  376. /**
  377. * dp_tx_add_groupkey_metadata - Add group key in metadata
  378. * @vdev: DP vdev handle
  379. * @msdu_info: MSDU info to be setup in MSDU descriptor
  380. * @group_key: Group key index programmed in metadata
  381. *
  382. * Return: void
  383. */
  384. #ifdef QCA_MULTIPASS_SUPPORT
  385. static
  386. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  387. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  388. {
  389. struct htt_tx_msdu_desc_ext2_t *meta_data =
  390. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  391. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  392. /*
  393. * When attempting to send a multicast packet with multi-passphrase,
  394. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  395. * ref htt.h indicating the group_id field in "key_flags" also having
  396. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  397. */
  398. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  399. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  400. }
  401. /**
  402. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  403. * @vdev: DP vdev handle
  404. * @tx_desc: Tx Descriptor Handle
  405. *
  406. * Return: void
  407. */
  408. static
  409. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  410. {
  411. struct vlan_ethhdr veth_hdr;
  412. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  413. /*
  414. * Extract VLAN header of 4 bytes:
  415. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  416. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  417. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  418. */
  419. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  420. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  421. veh = (struct vlan_ethhdr *)nbuf->data;
  422. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  423. return;
  424. }
  425. /**
  426. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  427. * @vdev: DP vdev handle
  428. * @tx_desc: Tx Descriptor Handle
  429. * @vlan_id: vlan id of frame
  430. *
  431. * Return: whether peer is special or classic
  432. */
  433. static
  434. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  435. qdf_nbuf_t buf, uint16_t *vlan_id)
  436. {
  437. struct dp_peer *peer = NULL;
  438. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  439. struct vlan_ethhdr *veh = NULL;
  440. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  441. (htons(eh->ether_type) != ETH_P_8021Q));
  442. if (qdf_unlikely(not_vlan))
  443. return DP_VLAN_UNTAGGED;
  444. veh = (struct vlan_ethhdr *)eh;
  445. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  446. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  447. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  448. TAILQ_FOREACH(peer, &vdev->mpass_peer_list,
  449. mpass_peer_list_elem) {
  450. if (*vlan_id == peer->vlan_id) {
  451. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  452. return DP_VLAN_TAGGED_MULTICAST;
  453. }
  454. }
  455. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  456. return DP_VLAN_UNTAGGED;
  457. }
  458. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL);
  459. if (qdf_unlikely(peer == NULL))
  460. return DP_VLAN_UNTAGGED;
  461. /*
  462. * Do not drop the frame when vlan_id doesn't match.
  463. * Send the frame as it is.
  464. */
  465. if (*vlan_id == peer->vlan_id) {
  466. dp_peer_unref_delete(peer);
  467. return DP_VLAN_TAGGED_UNICAST;
  468. }
  469. dp_peer_unref_delete(peer);
  470. return DP_VLAN_UNTAGGED;
  471. }
  472. /**
  473. * dp_tx_multipass_process - Process vlan frames in tx path
  474. * @soc: dp soc handle
  475. * @vdev: DP vdev handle
  476. * @nbuf: skb
  477. * @msdu_info: msdu descriptor
  478. *
  479. * Return: status whether frame needs to be dropped or transmitted
  480. */
  481. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  482. qdf_nbuf_t nbuf,
  483. struct dp_tx_msdu_info_s *msdu_info)
  484. {
  485. uint16_t vlan_id = 0;
  486. uint16_t group_key = 0;
  487. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  488. qdf_nbuf_t nbuf_copy = NULL;
  489. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  490. return true;
  491. }
  492. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  493. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  494. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  495. return true;
  496. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  497. dp_tx_remove_vlan_tag(vdev, nbuf);
  498. return true;
  499. }
  500. /* AP can have classic clients, special clients &
  501. * classic repeaters.
  502. * 1. Classic clients & special client:
  503. * Remove vlan header, find corresponding group key
  504. * index, fill in metaheader and enqueue multicast
  505. * frame to TCL.
  506. * 2. Classic repeater:
  507. * Pass through to classic repeater with vlan tag
  508. * intact without any group key index. Hardware
  509. * will know which key to use to send frame to
  510. * repeater.
  511. */
  512. nbuf_copy = qdf_nbuf_copy(nbuf);
  513. /*
  514. * Send multicast frame to special peers even
  515. * if pass through to classic repeater fails.
  516. */
  517. if (nbuf_copy) {
  518. struct dp_tx_msdu_info_s msdu_info_copy;
  519. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  520. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  521. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  522. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  523. if (nbuf_copy) {
  524. qdf_nbuf_free(nbuf_copy);
  525. qdf_err("nbuf_copy send failed");
  526. }
  527. }
  528. group_key = vdev->iv_vlan_map[vlan_id];
  529. /*
  530. * If group key is not installed, drop the frame.
  531. */
  532. if (!group_key)
  533. return false;
  534. dp_tx_remove_vlan_tag(vdev, nbuf);
  535. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  536. msdu_info->exception_fw = 1;
  537. return true;
  538. }
  539. /**
  540. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  541. * @vdev: DP vdev handle
  542. * @nbuf: skb
  543. * @tid: traffic priority
  544. *
  545. * Return: bool: true in case of success else false
  546. * Success is considered if:
  547. * i. If frame doesn't come from special peer and do not need multipass processing.
  548. * ii. Successfully processed multipass processing.
  549. * Failure is considered if:
  550. * i. If frame needs to be dropped.
  551. */
  552. bool dp_rx_multipass_process(struct dp_peer *peer, qdf_nbuf_t nbuf, uint8_t tid)
  553. {
  554. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(nbuf);
  555. struct vlan_ethhdr vethhdr;
  556. if (qdf_unlikely(!peer->vlan_id))
  557. return true;
  558. if (qdf_unlikely(qdf_nbuf_headroom(nbuf) < ETHERTYPE_VLAN_LEN))
  559. return true;
  560. /*
  561. * Form the VLAN header and insert in nbuf
  562. */
  563. qdf_mem_copy(vethhdr.h_dest, eh->ether_dhost, QDF_MAC_ADDR_SIZE);
  564. qdf_mem_copy(vethhdr.h_source, eh->ether_shost, QDF_MAC_ADDR_SIZE);
  565. vethhdr.h_vlan_proto = htons(QDF_ETH_TYPE_8021Q);
  566. vethhdr.h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  567. (peer->vlan_id & VLAN_VID_MASK));
  568. /*
  569. * Packet format : DSTMAC | SRCMAC | <VLAN HEADERS TO BE INSERTED> | ETHERTYPE | IP HEADER
  570. * DSTMAC: 6 BYTES
  571. * SRCMAC: 6 BYTES
  572. * VLAN HEADER: 4 BYTES ( TPID | PCP | VLAN ID)
  573. * ETHERTYPE: 2 BYTES
  574. */
  575. qdf_nbuf_push_head(nbuf, sizeof(struct vlan_hdr));
  576. qdf_mem_copy(qdf_nbuf_data(nbuf), &vethhdr,
  577. sizeof(struct vlan_ethhdr)- ETHERNET_TYPE_LEN);
  578. return true;
  579. }
  580. /**
  581. * dp_peer_multipass_list_remove: remove peer from list
  582. * @peer: pointer to peer
  583. *
  584. * return: void
  585. */
  586. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  587. {
  588. struct dp_vdev *vdev = peer->vdev;
  589. struct dp_peer *tpeer = NULL;
  590. bool found = 0;
  591. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  592. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  593. if (tpeer == peer) {
  594. found = 1;
  595. TAILQ_REMOVE(&vdev->mpass_peer_list, peer, mpass_peer_list_elem);
  596. break;
  597. }
  598. }
  599. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  600. if (found)
  601. dp_peer_unref_delete(peer);
  602. }
  603. /**
  604. * dp_peer_multipass_list_add: add to new multipass list
  605. * @dp_soc: soc handle
  606. * @peer: peer handle
  607. *
  608. * return: void
  609. */
  610. static void dp_peer_multipass_list_add(struct dp_soc *soc, struct dp_peer *peer)
  611. {
  612. /*
  613. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  614. * Decrement it when element is deleted from the list.
  615. */
  616. qdf_spin_lock_bh(&peer->vdev->mpass_peer_mutex);
  617. TAILQ_INSERT_HEAD(&peer->vdev->mpass_peer_list, peer,
  618. mpass_peer_list_elem);
  619. qdf_spin_unlock_bh(&peer->vdev->mpass_peer_mutex);
  620. }
  621. /**
  622. * dp_peer_set_vlan_id: set vlan_id for this peer
  623. * @cdp_soc: soc handle
  624. * @peer_mac: mac address
  625. * @vlan_id: vlan id for peer
  626. *
  627. * return: void
  628. */
  629. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  630. uint8_t vdev_id, uint8_t *peer_mac,
  631. uint16_t vlan_id)
  632. {
  633. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  634. struct dp_peer *peer = NULL;
  635. struct dp_vdev *vdev =
  636. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  637. vdev_id);
  638. if (!vdev || !vdev->multipass_en)
  639. return;
  640. peer = dp_peer_find_hash_find(soc, peer_mac, 0, vdev->vdev_id);
  641. if (qdf_unlikely(!peer)) {
  642. qdf_err("NULL peer");
  643. return;
  644. }
  645. peer->vlan_id = vlan_id;
  646. dp_peer_multipass_list_add(soc, peer);
  647. /* Ref_cnt is incremented inside dp_peer_find_hash_find().
  648. * Decrement it here.
  649. */
  650. dp_peer_unref_delete(peer);
  651. }
  652. /**
  653. * dp_set_vlan_groupkey: set vlan map for vdev
  654. * @soc: pointer to soc
  655. * @vdev_id : id of vdev
  656. * @vlan_id: vlan_id
  657. * @group_key: group key for vlan
  658. *
  659. * return: set success/failure
  660. */
  661. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc, uint8_t vdev_id,
  662. uint16_t vlan_id, uint16_t group_key)
  663. {
  664. struct dp_vdev *vdev =
  665. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  666. vdev_id);
  667. if (!vdev || !vdev->multipass_en)
  668. return QDF_STATUS_E_INVAL;
  669. if (!vdev->iv_vlan_map) {
  670. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  671. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  672. if (!vdev->iv_vlan_map) {
  673. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  674. return QDF_STATUS_E_NOMEM;
  675. }
  676. /*
  677. * 0 is invalid group key.
  678. * Initilalize array with invalid group keys.
  679. */
  680. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  681. }
  682. if (vlan_id >= DP_MAX_VLAN_IDS)
  683. return QDF_STATUS_E_INVAL;
  684. vdev->iv_vlan_map[vlan_id] = group_key;
  685. return QDF_STATUS_SUCCESS;
  686. }
  687. /**
  688. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  689. * @vdev_handle: pointer to vdev
  690. *
  691. * return: void
  692. */
  693. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  694. {
  695. struct dp_peer *peer = NULL;
  696. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  697. TAILQ_FOREACH(peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  698. qdf_err("Peers present in mpass list : %llx",
  699. peer->mac_addr.raw);
  700. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  701. if (vdev->iv_vlan_map) {
  702. qdf_mem_free(vdev->iv_vlan_map);
  703. vdev->iv_vlan_map = NULL;
  704. }
  705. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  706. }
  707. /**
  708. * dp_peer_multipass_list_init: initialize peer mulitpass list
  709. * @vdev_handle: pointer to vdev
  710. *
  711. * return: set success/failure
  712. */
  713. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  714. {
  715. /*
  716. * vdev->iv_vlan_map is allocated when the first configuration command
  717. * is issued to avoid unnecessary allocation for regular mode VAP.
  718. */
  719. TAILQ_INIT(&vdev->mpass_peer_list);
  720. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  721. }
  722. #endif
  723. #ifdef QCA_PEER_MULTIQ_SUPPORT
  724. /**
  725. * dp_peer_reset_flowq_map() - reset peer flowq map table
  726. * @peer - dp peer handle
  727. *
  728. * Return: none
  729. */
  730. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  731. {
  732. int i = 0;
  733. if (!peer)
  734. return;
  735. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  736. peer->peer_ast_flowq_idx[i].is_valid = false;
  737. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  738. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  739. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  740. }
  741. }
  742. /**
  743. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  744. * @peer - dp peer handle
  745. * @mask - flow mask
  746. *
  747. * Return: flow id
  748. */
  749. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  750. uint8_t mask)
  751. {
  752. if (!peer) {
  753. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  754. "%s: Invalid peer\n", __func__);
  755. return -1;
  756. }
  757. if (mask & DP_PEER_AST0_FLOW_MASK)
  758. return DP_PEER_AST_FLOWQ_UDP;
  759. else if (mask & DP_PEER_AST1_FLOW_MASK)
  760. return DP_PEER_AST_FLOWQ_NON_UDP;
  761. else if (mask & DP_PEER_AST2_FLOW_MASK)
  762. return DP_PEER_AST_FLOWQ_HI_PRIO;
  763. else if (mask & DP_PEER_AST3_FLOW_MASK)
  764. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  765. return DP_PEER_AST_FLOWQ_MAX;
  766. }
  767. /**
  768. * dp_peer_get_ast_valid() - get ast index valid from mask
  769. * @mask - mask for ast valid bits
  770. * @index - index for an ast
  771. *
  772. * Return - 1 if ast index is valid from mask else 0
  773. */
  774. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  775. {
  776. if (index == 0)
  777. return 1;
  778. return ((mask) & (1 << ((index) - 1)));
  779. }
  780. /**
  781. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  782. * @soc - genereic soc handle
  783. * @is_wds - flag to indicate if peer is wds
  784. * @peer_id - peer_id from htt peer map message
  785. * @peer_mac_addr - mac address of the peer
  786. * @ast_info - ast flow override information from peer map
  787. *
  788. * Return: none
  789. */
  790. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  791. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  792. struct dp_ast_flow_override_info *ast_info)
  793. {
  794. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  795. struct dp_peer *peer = NULL;
  796. uint8_t i;
  797. /*
  798. * Ast flow override feature is supported
  799. * only for connected client
  800. */
  801. if (is_wds)
  802. return;
  803. peer = dp_peer_find_by_id(soc, peer_id);
  804. if (!peer) {
  805. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  806. "%s: Invalid peer\n", __func__);
  807. return;
  808. }
  809. /* Valid only in AP mode */
  810. if (peer->vdev->opmode != wlan_op_mode_ap) {
  811. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  812. "%s: Peer ast flow map not in STA mode\n", __func__);
  813. /* Release peer reference */
  814. dp_peer_unref_del_find_by_id(peer);
  815. return;
  816. }
  817. /* Making sure the peer is for this mac address */
  818. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  819. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  820. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  821. "%s: Peer mac address mismatch\n", __func__);
  822. dp_peer_unref_del_find_by_id(peer);
  823. return;
  824. }
  825. /* Ast entry flow mapping not valid for self peer map */
  826. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  827. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  828. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  829. "%s: Ast flow mapping not valid for self peer \n", __func__);
  830. dp_peer_unref_del_find_by_id(peer);
  831. return;
  832. }
  833. /* Fill up ast index <---> flow id mapping table for this peer */
  834. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  835. /* Check if this ast index is valid */
  836. peer->peer_ast_flowq_idx[i].is_valid =
  837. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  838. if (!peer->peer_ast_flowq_idx[i].is_valid)
  839. continue;
  840. /* Get the flow queue id which is mapped to this ast index */
  841. peer->peer_ast_flowq_idx[i].flowQ =
  842. dp_peer_get_flowid_from_flowmask(peer,
  843. ast_info->ast_flow_mask[i]);
  844. /*
  845. * Update tid valid mask only if flow id HIGH or
  846. * Low priority
  847. */
  848. if (peer->peer_ast_flowq_idx[i].flowQ ==
  849. DP_PEER_AST_FLOWQ_HI_PRIO) {
  850. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  851. ast_info->tid_valid_hi_pri_mask;
  852. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  853. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  854. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  855. ast_info->tid_valid_low_pri_mask;
  856. }
  857. /* Save the ast index for this entry */
  858. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  859. }
  860. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  861. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  862. soc->ctrl_psoc, peer->peer_ids[0],
  863. peer->vdev->vdev_id, peer_mac_addr);
  864. }
  865. /* Release peer reference */
  866. dp_peer_unref_del_find_by_id(peer);
  867. }
  868. /**
  869. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  870. * @soc - soc handle
  871. * @peer_mac_addr - mac address of the peer
  872. * @flow_id - flow id to find ast index
  873. *
  874. * Return: ast index for a given flow id, -1 for fail cases
  875. */
  876. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  877. uint16_t vdev_id, uint8_t *peer_mac_addr,
  878. uint8_t flow_id, uint8_t tid)
  879. {
  880. struct dp_peer *peer = NULL;
  881. uint8_t i;
  882. uint16_t ast_index;
  883. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  884. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  885. "Invalid Flow ID %d\n", flow_id);
  886. return -1;
  887. }
  888. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  889. peer_mac_addr, 0, vdev_id);
  890. if (!peer) {
  891. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  892. "%s: Invalid peer\n", __func__);
  893. return -1;
  894. }
  895. /*
  896. * Loop over the ast entry <----> flow-id mapping to find
  897. * which ast index entry has this flow queue id enabled.
  898. */
  899. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  900. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  901. /*
  902. * Found the matching index for this flow id
  903. */
  904. break;
  905. }
  906. /*
  907. * No match found for this flow id
  908. */
  909. if (i == DP_PEER_AST_FLOWQ_MAX) {
  910. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  911. "%s: ast index not found for flow %d\n", __func__, flow_id);
  912. dp_peer_unref_delete(peer);
  913. return -1;
  914. }
  915. /* Check whether this ast entry is valid */
  916. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  917. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  918. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  919. dp_peer_unref_delete(peer);
  920. return -1;
  921. }
  922. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  923. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  924. /*
  925. * check if this tid is valid for Hi
  926. * and Low priority flow id
  927. */
  928. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  929. & (1 << tid))) {
  930. /* Release peer reference */
  931. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  932. dp_peer_unref_delete(peer);
  933. return ast_index;
  934. } else {
  935. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  936. "%s: TID %d is not valid for flow %d\n",
  937. __func__, tid, flow_id);
  938. /*
  939. * TID is not valid for this flow
  940. * Return -1
  941. */
  942. dp_peer_unref_delete(peer);
  943. return -1;
  944. }
  945. }
  946. /*
  947. * TID valid check not required for
  948. * UDP/NON UDP flow id
  949. */
  950. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  951. dp_peer_unref_delete(peer);
  952. return ast_index;
  953. }
  954. #endif