dp_peer.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841
  1. /*
  2. * Copyright (c) 2016 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include <qdf_types.h>
  19. #include <qdf_lock.h>
  20. #include "dp_htt.h"
  21. #include "dp_types.h"
  22. #include "dp_internal.h"
  23. #include <hal_api.h>
  24. /* Temporary definitions to be moved to wlan_cfg */
  25. static inline uint32_t wlan_cfg_max_peer_id(void *wlan_cfg_ctx)
  26. {
  27. /* TODO: This should be calculated based on target capabilities */
  28. return 2048;
  29. }
  30. static inline int dp_peer_find_mac_addr_cmp(
  31. union dp_align_mac_addr *mac_addr1,
  32. union dp_align_mac_addr *mac_addr2)
  33. {
  34. return !((mac_addr1->align4.bytes_abcd == mac_addr2->align4.bytes_abcd)
  35. /*
  36. * Intentionally use & rather than &&.
  37. * because the operands are binary rather than generic boolean,
  38. * the functionality is equivalent.
  39. * Using && has the advantage of short-circuited evaluation,
  40. * but using & has the advantage of no conditional branching,
  41. * which is a more significant benefit.
  42. */
  43. &
  44. (mac_addr1->align4.bytes_ef == mac_addr2->align4.bytes_ef));
  45. }
  46. static inline struct dp_peer *dp_peer_find_by_id(
  47. struct dp_soc *soc, uint16_t peer_id)
  48. {
  49. struct dp_peer *peer;
  50. peer = (peer_id == HTT_INVALID_PEER) ? NULL :
  51. soc->peer_id_to_obj_map[peer_id];
  52. /*
  53. * Currently, peer IDs are assigned to vdevs as well as peers.
  54. * If the peer ID is for a vdev, the peer_id_to_obj_map entry
  55. * will hold NULL rather than a valid peer pointer.
  56. */
  57. return peer;
  58. }
  59. static int dp_peer_find_map_attach(struct dp_soc *soc)
  60. {
  61. uint32_t max_peers, peer_map_size;
  62. /* allocate the peer ID -> peer object map */
  63. max_peers = wlan_cfg_max_peer_id(soc->wlan_cfg_ctx) + 1;
  64. soc->max_peers = max_peers;
  65. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_INFO,
  66. "\n<=== cfg max peer id %d ====>\n", max_peers);
  67. peer_map_size = max_peers * sizeof(soc->peer_id_to_obj_map[0]);
  68. soc->peer_id_to_obj_map = qdf_mem_malloc(peer_map_size);
  69. if (!soc->peer_id_to_obj_map) {
  70. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  71. "%s: peer map memory allocation failed\n", __func__);
  72. return QDF_STATUS_E_NOMEM;
  73. }
  74. /*
  75. * The peer_id_to_obj_map doesn't really need to be initialized,
  76. * since elements are only used after they have been individually
  77. * initialized.
  78. * However, it is convenient for debugging to have all elements
  79. * that are not in use set to 0.
  80. */
  81. qdf_mem_zero(soc->peer_id_to_obj_map, peer_map_size);
  82. #ifdef notyet /* ATH_BAND_STEERING */
  83. OS_INIT_TIMER(soc->osdev, &(soc->bs_inact_timer),
  84. dp_peer_find_inact_timeout_handler, (void *)soc,
  85. QDF_TIMER_TYPE_WAKE_APPS);
  86. #endif
  87. return 0; /* success */
  88. }
  89. static int dp_log2_ceil(unsigned value)
  90. {
  91. unsigned tmp = value;
  92. int log2 = -1;
  93. while (tmp) {
  94. log2++;
  95. tmp >>= 1;
  96. }
  97. if (1 << log2 != value)
  98. log2++;
  99. return log2;
  100. }
  101. static int dp_peer_find_add_id_to_obj(
  102. struct dp_peer *peer,
  103. uint16_t peer_id)
  104. {
  105. int i;
  106. for (i = 0; i < MAX_NUM_PEER_ID_PER_PEER; i++) {
  107. if (peer->peer_ids[i] == HTT_INVALID_PEER) {
  108. peer->peer_ids[i] = peer_id;
  109. return 0; /* success */
  110. }
  111. }
  112. return QDF_STATUS_E_FAILURE; /* failure */
  113. }
  114. #define DP_PEER_HASH_LOAD_MULT 2
  115. #define DP_PEER_HASH_LOAD_SHIFT 0
  116. static int dp_peer_find_hash_attach(struct dp_soc *soc)
  117. {
  118. int i, hash_elems, log2;
  119. /* allocate the peer MAC address -> peer object hash table */
  120. hash_elems = wlan_cfg_max_peer_id(soc->wlan_cfg_ctx) + 1;
  121. hash_elems *= DP_PEER_HASH_LOAD_MULT;
  122. hash_elems >>= DP_PEER_HASH_LOAD_SHIFT;
  123. log2 = dp_log2_ceil(hash_elems);
  124. hash_elems = 1 << log2;
  125. soc->peer_hash.mask = hash_elems - 1;
  126. soc->peer_hash.idx_bits = log2;
  127. /* allocate an array of TAILQ peer object lists */
  128. soc->peer_hash.bins = qdf_mem_malloc(
  129. hash_elems * sizeof(TAILQ_HEAD(anonymous_tail_q, dp_peer)));
  130. if (!soc->peer_hash.bins)
  131. return QDF_STATUS_E_NOMEM;
  132. for (i = 0; i < hash_elems; i++)
  133. TAILQ_INIT(&soc->peer_hash.bins[i]);
  134. return 0;
  135. }
  136. static void dp_peer_find_hash_detach(struct dp_soc *soc)
  137. {
  138. qdf_mem_free(soc->peer_hash.bins);
  139. }
  140. static inline unsigned dp_peer_find_hash_index(struct dp_soc *soc,
  141. union dp_align_mac_addr *mac_addr)
  142. {
  143. unsigned index;
  144. index =
  145. mac_addr->align2.bytes_ab ^
  146. mac_addr->align2.bytes_cd ^
  147. mac_addr->align2.bytes_ef;
  148. index ^= index >> soc->peer_hash.idx_bits;
  149. index &= soc->peer_hash.mask;
  150. return index;
  151. }
  152. void dp_peer_find_hash_add(struct dp_soc *soc, struct dp_peer *peer)
  153. {
  154. unsigned index;
  155. index = dp_peer_find_hash_index(soc, &peer->mac_addr);
  156. qdf_spin_lock_bh(&soc->peer_ref_mutex);
  157. /*
  158. * It is important to add the new peer at the tail of the peer list
  159. * with the bin index. Together with having the hash_find function
  160. * search from head to tail, this ensures that if two entries with
  161. * the same MAC address are stored, the one added first will be
  162. * found first.
  163. */
  164. TAILQ_INSERT_TAIL(&soc->peer_hash.bins[index], peer, hash_list_elem);
  165. qdf_spin_unlock_bh(&soc->peer_ref_mutex);
  166. }
  167. #if ATH_SUPPORT_WRAP
  168. struct dp_peer *dp_peer_find_hash_find(struct dp_soc *soc,
  169. uint8_t *peer_mac_addr, int mac_addr_is_aligned, uint8_t vdev_id)
  170. #else
  171. struct dp_peer *dp_peer_find_hash_find(struct dp_soc *soc,
  172. uint8_t *peer_mac_addr, int mac_addr_is_aligned)
  173. #endif
  174. {
  175. union dp_align_mac_addr local_mac_addr_aligned, *mac_addr;
  176. unsigned index;
  177. struct dp_peer *peer;
  178. if (mac_addr_is_aligned) {
  179. mac_addr = (union dp_align_mac_addr *) peer_mac_addr;
  180. } else {
  181. qdf_mem_copy(
  182. &local_mac_addr_aligned.raw[0],
  183. peer_mac_addr, DP_MAC_ADDR_LEN);
  184. mac_addr = &local_mac_addr_aligned;
  185. }
  186. index = dp_peer_find_hash_index(soc, mac_addr);
  187. qdf_spin_lock_bh(&soc->peer_ref_mutex);
  188. TAILQ_FOREACH(peer, &soc->peer_hash.bins[index], hash_list_elem) {
  189. #if ATH_SUPPORT_WRAP
  190. /* ProxySTA may have multiple BSS peer with same MAC address,
  191. * modified find will take care of finding the correct BSS peer.
  192. */
  193. if (dp_peer_find_mac_addr_cmp(mac_addr, &peer->mac_addr) == 0 &&
  194. (peer->vdev->vdev_id == vdev_id)) {
  195. #else
  196. if (dp_peer_find_mac_addr_cmp(mac_addr, &peer->mac_addr) == 0) {
  197. #endif
  198. /* found it - increment the ref count before releasing
  199. * the lock
  200. */
  201. qdf_atomic_inc(&peer->ref_cnt);
  202. qdf_spin_unlock_bh(&soc->peer_ref_mutex);
  203. return peer;
  204. }
  205. }
  206. qdf_spin_unlock_bh(&soc->peer_ref_mutex);
  207. return NULL; /* failure */
  208. }
  209. void dp_peer_find_hash_remove(struct dp_soc *soc, struct dp_peer *peer)
  210. {
  211. unsigned index;
  212. struct dp_peer *tmppeer = NULL;
  213. int found = 0;
  214. index = dp_peer_find_hash_index(soc, &peer->mac_addr);
  215. /* Check if tail is not empty before delete*/
  216. QDF_ASSERT(!TAILQ_EMPTY(&soc->peer_hash.bins[index]));
  217. /*
  218. * DO NOT take the peer_ref_mutex lock here - it needs to be taken
  219. * by the caller.
  220. * The caller needs to hold the lock from the time the peer object's
  221. * reference count is decremented and tested up through the time the
  222. * reference to the peer object is removed from the hash table, by
  223. * this function.
  224. * Holding the lock only while removing the peer object reference
  225. * from the hash table keeps the hash table consistent, but does not
  226. * protect against a new HL tx context starting to use the peer object
  227. * if it looks up the peer object from its MAC address just after the
  228. * peer ref count is decremented to zero, but just before the peer
  229. * object reference is removed from the hash table.
  230. */
  231. TAILQ_FOREACH(tmppeer, &soc->peer_hash.bins[index], hash_list_elem) {
  232. if (tmppeer == peer) {
  233. found = 1;
  234. break;
  235. }
  236. }
  237. QDF_ASSERT(found);
  238. TAILQ_REMOVE(&soc->peer_hash.bins[index], peer, hash_list_elem);
  239. }
  240. void dp_peer_find_hash_erase(struct dp_soc *soc)
  241. {
  242. int i;
  243. /*
  244. * Not really necessary to take peer_ref_mutex lock - by this point,
  245. * it's known that the soc is no longer in use.
  246. */
  247. for (i = 0; i <= soc->peer_hash.mask; i++) {
  248. if (!TAILQ_EMPTY(&soc->peer_hash.bins[i])) {
  249. struct dp_peer *peer, *peer_next;
  250. /*
  251. * TAILQ_FOREACH_SAFE must be used here to avoid any
  252. * memory access violation after peer is freed
  253. */
  254. TAILQ_FOREACH_SAFE(peer, &soc->peer_hash.bins[i],
  255. hash_list_elem, peer_next) {
  256. /*
  257. * Don't remove the peer from the hash table -
  258. * that would modify the list we are currently
  259. * traversing, and it's not necessary anyway.
  260. */
  261. /*
  262. * Artificially adjust the peer's ref count to
  263. * 1, so it will get deleted by
  264. * dp_peer_unref_delete.
  265. */
  266. /* set to zero */
  267. qdf_atomic_init(&peer->ref_cnt);
  268. /* incr to one */
  269. qdf_atomic_inc(&peer->ref_cnt);
  270. dp_peer_unref_delete(peer);
  271. }
  272. }
  273. }
  274. }
  275. static void dp_peer_find_map_detach(struct dp_soc *soc)
  276. {
  277. #ifdef notyet /* ATH_BAND_STEERING */
  278. OS_FREE_TIMER(&(soc->bs_inact_timer));
  279. #endif
  280. qdf_mem_free(soc->peer_id_to_obj_map);
  281. }
  282. int dp_peer_find_attach(struct dp_soc *soc)
  283. {
  284. if (dp_peer_find_map_attach(soc))
  285. return 1;
  286. if (dp_peer_find_hash_attach(soc)) {
  287. dp_peer_find_map_detach(soc);
  288. return 1;
  289. }
  290. return 0; /* success */
  291. }
  292. static inline void dp_peer_find_add_id(struct dp_soc *soc,
  293. uint8_t *peer_mac_addr, uint16_t peer_id, uint8_t vdev_id)
  294. {
  295. struct dp_peer *peer;
  296. QDF_ASSERT(peer_id <= wlan_cfg_max_peer_id(soc->wlan_cfg_ctx) + 1);
  297. /* check if there's already a peer object with this MAC address */
  298. #if ATH_SUPPORT_WRAP
  299. peer = dp_peer_find_hash_find(soc, peer_mac_addr,
  300. 0 /* is aligned */, vdev_id);
  301. #else
  302. peer = dp_peer_find_hash_find(soc, peer_mac_addr, 0 /* is aligned */);
  303. #endif
  304. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  305. "%s: peer %p ID %d vid %d mac %02x:%02x:%02x:%02x:%02x:%02x\n",
  306. __func__, peer, peer_id, vdev_id, peer_mac_addr[0],
  307. peer_mac_addr[1], peer_mac_addr[2], peer_mac_addr[3],
  308. peer_mac_addr[4], peer_mac_addr[5]);
  309. if (peer) {
  310. /* peer's ref count was already incremented by
  311. * peer_find_hash_find
  312. */
  313. soc->peer_id_to_obj_map[peer_id] = peer;
  314. if (dp_peer_find_add_id_to_obj(peer, peer_id)) {
  315. /* TBDXXX: assert for now */
  316. QDF_ASSERT(0);
  317. }
  318. return;
  319. }
  320. }
  321. void
  322. dp_rx_peer_map_handler(void *soc_handle, uint16_t peer_id, uint8_t vdev_id,
  323. uint8_t *peer_mac_addr)
  324. {
  325. struct dp_soc *soc = (struct dp_soc *)soc_handle;
  326. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_INFO_HIGH,
  327. "peer_map_event (soc:%p): peer_id %d, peer_mac "
  328. "%02x:%02x:%02x:%02x:%02x:%02x, vdev_id %d\n", soc, peer_id,
  329. peer_mac_addr[0], peer_mac_addr[1], peer_mac_addr[2],
  330. peer_mac_addr[3], peer_mac_addr[4], peer_mac_addr[5], vdev_id);
  331. dp_peer_find_add_id(soc, peer_mac_addr, peer_id, vdev_id);
  332. }
  333. void
  334. dp_rx_peer_unmap_handler(void *soc_handle, uint16_t peer_id)
  335. {
  336. struct dp_peer *peer;
  337. struct dp_soc *soc = (struct dp_soc *)soc_handle;
  338. uint8_t i;
  339. peer = dp_peer_find_by_id(soc, peer_id);
  340. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_INFO_HIGH,
  341. "peer_unmap_event (soc:%p) peer_id %d peer %p\n",
  342. soc, peer_id, peer);
  343. /*
  344. * Currently peer IDs are assigned for vdevs as well as peers.
  345. * If the peer ID is for a vdev, then the peer pointer stored
  346. * in peer_id_to_obj_map will be NULL.
  347. */
  348. if (!peer)
  349. return;
  350. soc->peer_id_to_obj_map[peer_id] = NULL;
  351. for (i = 0; i < MAX_NUM_PEER_ID_PER_PEER; i++) {
  352. if (peer->peer_ids[i] == peer_id) {
  353. peer->peer_ids[i] = HTT_INVALID_PEER;
  354. break;
  355. }
  356. }
  357. /*
  358. * Remove a reference to the peer.
  359. * If there are no more references, delete the peer object.
  360. */
  361. dp_peer_unref_delete(peer);
  362. }
  363. void
  364. dp_peer_find_detach(struct dp_soc *soc)
  365. {
  366. dp_peer_find_map_detach(soc);
  367. dp_peer_find_hash_detach(soc);
  368. }
  369. /*
  370. * dp_rx_tid_update_wifi3() – Update receive TID state
  371. * @peer: Datapath peer handle
  372. * @tid: TID
  373. * @ba_window_size: BlockAck window size
  374. * @start_seq: Starting sequence number
  375. *
  376. * Return: 0 on success, error code on failure
  377. */
  378. int dp_rx_tid_update_wifi3(struct dp_peer *peer, int tid, uint32_t
  379. ba_window_size, uint32_t start_seq)
  380. {
  381. /* TODO: Implement this once REO command API is available */
  382. return 0;
  383. }
  384. /*
  385. * dp_rx_tid_setup_wifi3() – Setup receive TID state
  386. * @peer: Datapath peer handle
  387. * @tid: TID
  388. * @ba_window_size: BlockAck window size
  389. * @start_seq: Starting sequence number
  390. *
  391. * Return: 0 on success, error code on failure
  392. */
  393. int dp_rx_tid_setup_wifi3(struct dp_peer *peer, int tid,
  394. uint32_t ba_window_size, uint32_t start_seq)
  395. {
  396. struct dp_rx_tid *rx_tid = &peer->rx_tid[tid];
  397. struct dp_vdev *vdev = peer->vdev;
  398. struct dp_soc *soc = vdev->pdev->soc;
  399. uint32_t hw_qdesc_size;
  400. uint32_t hw_qdesc_align;
  401. int hal_pn_type;
  402. void *hw_qdesc_vaddr;
  403. if (rx_tid->hw_qdesc_vaddr_unaligned != NULL)
  404. return dp_rx_tid_update_wifi3(peer, tid, ba_window_size,
  405. start_seq);
  406. #ifdef notyet
  407. hw_qdesc_size = hal_get_reo_qdesc_size(soc->hal_soc, ba_window_size);
  408. #else
  409. /* TODO: Allocating HW queue descriptors based on max BA window size
  410. * for all QOS TIDs so that same descriptor can be used later when
  411. * ADDBA request is recevied. This should be changed to allocate HW
  412. * queue descriptors based on BA window size being negotiated (0 for
  413. * non BA cases), and reallocate when BA window size changes and also
  414. * send WMI message to FW to change the REO queue descriptor in Rx
  415. * peer entry as part of dp_rx_tid_update.
  416. */
  417. if (tid != DP_NON_QOS_TID)
  418. hw_qdesc_size = hal_get_reo_qdesc_size(soc->hal_soc,
  419. HAL_RX_MAX_BA_WINDOW);
  420. else
  421. hw_qdesc_size = hal_get_reo_qdesc_size(soc->hal_soc,
  422. ba_window_size);
  423. #endif
  424. hw_qdesc_align = hal_get_reo_qdesc_align(soc->hal_soc);
  425. /* To avoid unnecessary extra allocation for alignment, try allocating
  426. * exact size and see if we already have aligned address.
  427. */
  428. rx_tid->hw_qdesc_alloc_size = hw_qdesc_size;
  429. rx_tid->hw_qdesc_vaddr_unaligned = qdf_mem_alloc_consistent(
  430. soc->osdev, NULL, rx_tid->hw_qdesc_alloc_size,
  431. &(rx_tid->hw_qdesc_paddr_unaligned));
  432. if (!rx_tid->hw_qdesc_vaddr_unaligned) {
  433. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  434. "%s: Rx tid HW desc alloc failed: tid %d\n",
  435. __func__, tid);
  436. return QDF_STATUS_E_NOMEM;
  437. }
  438. if ((unsigned long)(rx_tid->hw_qdesc_vaddr_unaligned) %
  439. hw_qdesc_align) {
  440. /* Address allocated above is not alinged. Allocate extra
  441. * memory for alignment
  442. */
  443. qdf_mem_free_consistent(soc->osdev, NULL,
  444. rx_tid->hw_qdesc_alloc_size,
  445. rx_tid->hw_qdesc_vaddr_unaligned,
  446. rx_tid->hw_qdesc_paddr_unaligned, 0);
  447. rx_tid->hw_qdesc_alloc_size =
  448. hw_qdesc_size + hw_qdesc_align - 1;
  449. rx_tid->hw_qdesc_vaddr_unaligned = qdf_mem_alloc_consistent(
  450. soc->osdev, NULL, rx_tid->hw_qdesc_alloc_size,
  451. &(rx_tid->hw_qdesc_paddr_unaligned));
  452. if (!rx_tid->hw_qdesc_vaddr_unaligned) {
  453. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  454. "%s: Rx tid HW desc alloc failed: tid %d\n",
  455. __func__, tid);
  456. return QDF_STATUS_E_NOMEM;
  457. }
  458. hw_qdesc_vaddr = rx_tid->hw_qdesc_vaddr_unaligned +
  459. ((unsigned long)(rx_tid->hw_qdesc_vaddr_unaligned) %
  460. hw_qdesc_align);
  461. rx_tid->hw_qdesc_paddr = rx_tid->hw_qdesc_paddr_unaligned +
  462. ((unsigned long)hw_qdesc_vaddr -
  463. (unsigned long)(rx_tid->hw_qdesc_vaddr_unaligned));
  464. } else {
  465. hw_qdesc_vaddr = rx_tid->hw_qdesc_vaddr_unaligned;
  466. rx_tid->hw_qdesc_paddr = rx_tid->hw_qdesc_paddr_unaligned;
  467. }
  468. /* TODO: Ensure that sec_type is set before ADDBA is received.
  469. * Currently this is set based on htt indication
  470. * HTT_T2H_MSG_TYPE_SEC_IND from target
  471. */
  472. switch (peer->security[dp_sec_ucast].sec_type) {
  473. case htt_sec_type_tkip_nomic:
  474. case htt_sec_type_aes_ccmp:
  475. case htt_sec_type_aes_ccmp_256:
  476. case htt_sec_type_aes_gcmp:
  477. case htt_sec_type_aes_gcmp_256:
  478. hal_pn_type = HAL_PN_WPA;
  479. break;
  480. case htt_sec_type_wapi:
  481. if (vdev->opmode == wlan_op_mode_ap)
  482. hal_pn_type = HAL_PN_WAPI_EVEN;
  483. else
  484. hal_pn_type = HAL_PN_WAPI_UNEVEN;
  485. break;
  486. default:
  487. hal_pn_type = HAL_PN_NONE;
  488. break;
  489. }
  490. hal_reo_qdesc_setup(soc->hal_soc, tid, ba_window_size, start_seq,
  491. hw_qdesc_vaddr, rx_tid->hw_qdesc_paddr, hal_pn_type);
  492. if (soc->ol_ops->peer_rx_reorder_queue_setup) {
  493. soc->ol_ops->peer_rx_reorder_queue_setup(soc->osif_soc,
  494. peer->vdev->vdev_id, peer->mac_addr.raw,
  495. rx_tid->hw_qdesc_paddr, tid, tid);
  496. }
  497. return 0;
  498. }
  499. /*
  500. * Rx TID deletion callback to free memory allocated for HW queue descriptor
  501. */
  502. static void dp_rx_tid_delete_cb(struct dp_pdev *pdev, void *cb_ctxt, int status)
  503. {
  504. struct dp_soc *soc = pdev->soc;
  505. struct dp_rx_tid *rx_tid = (struct dp_rx_tid *)cb_ctxt;
  506. if (status) {
  507. /* Should not happen normally. Just print error for now */
  508. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  509. "%s: Rx tid HW desc deletion failed: tid %d\n",
  510. __func__, rx_tid->tid);
  511. }
  512. qdf_mem_free_consistent(soc->osdev, NULL,
  513. rx_tid->hw_qdesc_alloc_size,
  514. rx_tid->hw_qdesc_vaddr_unaligned,
  515. rx_tid->hw_qdesc_paddr_unaligned, 0);
  516. rx_tid->hw_qdesc_vaddr_unaligned = NULL;
  517. rx_tid->hw_qdesc_alloc_size = 0;
  518. }
  519. /*
  520. * dp_rx_tid_delete_wifi3() – Delete receive TID queue
  521. * @peer: Datapath peer handle
  522. * @tid: TID
  523. *
  524. * Return: 0 on success, error code on failure
  525. */
  526. int dp_rx_tid_delete_wifi3(struct dp_peer *peer, int tid)
  527. {
  528. #ifdef notyet /* TBD: Enable this once REO command interface is available */
  529. struct dp_rx_tid *rx_tid = peer->rx_tid[tid];
  530. dp_rx_tid_hw_update_valid(rx_tid->hw_qdesc_paddr, 0,
  531. dp_rx_tid_delete_cb, (void *)rx_tid);
  532. #endif
  533. return 0;
  534. }
  535. /*
  536. * dp_peer_rx_init() – Initialize receive TID state
  537. * @pdev: Datapath pdev
  538. * @peer: Datapath peer
  539. *
  540. */
  541. void dp_peer_rx_init(struct dp_pdev *pdev, struct dp_peer *peer)
  542. {
  543. int tid;
  544. struct dp_rx_tid *rx_tid;
  545. for (tid = 0; tid < DP_MAX_TIDS; tid++) {
  546. rx_tid = &peer->rx_tid[tid];
  547. rx_tid->array = &rx_tid->base;
  548. rx_tid->base.head = rx_tid->base.tail = NULL;
  549. rx_tid->tid = tid;
  550. rx_tid->defrag_timeout_ms = 0;
  551. rx_tid->ba_win_size = 0;
  552. rx_tid->ba_status = DP_RX_BA_INACTIVE;
  553. rx_tid->defrag_waitlist_elem.tqe_next = NULL;
  554. rx_tid->defrag_waitlist_elem.tqe_prev = NULL;
  555. #ifdef notyet /* TODO: See if this is required for exception handling */
  556. /* invalid sequence number */
  557. peer->tids_last_seq[tid] = 0xffff;
  558. #endif
  559. }
  560. /* Setup default (non-qos) rx tid queue */
  561. dp_rx_tid_setup_wifi3(peer, DP_NON_QOS_TID, 1, 0);
  562. /*
  563. * Set security defaults: no PN check, no security. The target may
  564. * send a HTT SEC_IND message to overwrite these defaults.
  565. */
  566. peer->security[dp_sec_ucast].sec_type =
  567. peer->security[dp_sec_mcast].sec_type = htt_sec_type_none;
  568. }
  569. /*
  570. * dp_peer_rx_cleanup() – Cleanup receive TID state
  571. * @vdev: Datapath vdev
  572. * @peer: Datapath peer
  573. *
  574. */
  575. void dp_peer_rx_cleanup(struct dp_vdev *vdev, struct dp_peer *peer)
  576. {
  577. int tid;
  578. struct dp_rx_tid *rx_tid;
  579. uint32_t tid_delete_mask = 0;
  580. for (tid = 0; tid < DP_MAX_TIDS; tid++) {
  581. if (rx_tid->hw_qdesc_vaddr_unaligned != NULL) {
  582. dp_rx_tid_delete_wifi3(peer, tid);
  583. tid_delete_mask |= (1 << tid);
  584. }
  585. }
  586. #ifdef notyet /* See if FW can remove queues as part of peer cleanup */
  587. if (soc->ol_ops->peer_rx_reorder_queue_remove) {
  588. soc->ol_ops->peer_rx_reorder_queue_remove(soc->osif_soc,
  589. peer->vdev->vdev_id, peer->mac_addr.raw,
  590. tid_delete_mask);
  591. }
  592. #endif
  593. }
  594. /*
  595. * dp_rx_addba_requestprocess_wifi3() – Process ADDBA request from peer
  596. *
  597. * @peer: Datapath peer handle
  598. * @dialogtoken: dialogtoken from ADDBA frame
  599. * @baparamset: BlockAck parameters received in ADDBA frame
  600. * @basequencectrl: BA sequence control received in ADDBA frame
  601. *
  602. * Return: 0 on success, error code on failure
  603. */
  604. int dp_addba_requestprocess_wifi3(void *peer_handle, uint8_t dialogtoken,
  605. struct ieee80211_ba_parameterset *baparamset, uint16_t batimeout,
  606. struct ieee80211_ba_seqctrl basequencectrl)
  607. {
  608. struct dp_peer *peer = (struct dp_peer *)peer_handle;
  609. uint16_t tid = baparamset->tid;
  610. struct dp_rx_tid *rx_tid = &peer->rx_tid[tid];
  611. if ((rx_tid->ba_status == DP_RX_BA_ACTIVE) &&
  612. (rx_tid->hw_qdesc_vaddr_unaligned != NULL))
  613. rx_tid->ba_status = DP_RX_BA_INACTIVE;
  614. if (dp_rx_tid_setup_wifi3(peer, tid, baparamset->buffersize,
  615. basequencectrl.startseqnum)) {
  616. /* TODO: Should we send addba reject in this case */
  617. return QDF_STATUS_E_FAILURE;
  618. }
  619. rx_tid->ba_win_size = baparamset->buffersize;
  620. rx_tid->dialogtoken = dialogtoken;
  621. rx_tid->statuscode = IEEE80211_STATUS_SUCCESS;
  622. rx_tid->ba_status = DP_RX_BA_ACTIVE;
  623. return 0;
  624. }
  625. /*
  626. * dp_rx_addba_responsesetup_wifi3() – Process ADDBA request from peer
  627. *
  628. * @peer: Datapath peer handle
  629. * @tid: TID number
  630. * @dialogtoken: output dialogtoken
  631. * @statuscode: output dialogtoken
  632. * @baparamset: Ouput structure to populate BA response parameters
  633. * @batimeout: Ouput BA timeout
  634. */
  635. void dp_addba_responsesetup_wifi3(void *peer_handle, uint8_t tid,
  636. uint8_t *dialogtoken, uint16_t *statuscode,
  637. struct ieee80211_ba_parameterset *baparamset, uint16_t *batimeout)
  638. {
  639. struct dp_peer *peer = (struct dp_peer *)peer_handle;
  640. struct dp_rx_tid *rx_tid = &peer->rx_tid[tid];
  641. /* setup ADDBA response paramters */
  642. *dialogtoken = rx_tid->dialogtoken;
  643. *statuscode = rx_tid->statuscode;
  644. baparamset->amsdusupported = IEEE80211_BA_AMSDU_SUPPORTED;
  645. baparamset->bapolicy = IEEE80211_BA_POLICY_IMMEDIATE;
  646. baparamset->tid = rx_tid->ba_win_size;
  647. baparamset->buffersize = rx_tid->ba_win_size;
  648. *batimeout = 0;
  649. }
  650. /*
  651. * dp_rx_delba_process_wifi3() – Process DELBA from peer
  652. * @peer: Datapath peer handle
  653. * @delbaparamset: DELBA parameters received in DELBA frame
  654. * @reasoncode: Reason code received in DELBA frame
  655. *
  656. * Return: 0 on success, error code on failure
  657. */
  658. int dp_delba_process_wifi3(void *peer_handle,
  659. struct ieee80211_delba_parameterset *delbaparamset, uint16_t reasoncode)
  660. {
  661. struct dp_peer *peer = (struct dp_peer *)peer_handle;
  662. uint16_t tid = delbaparamset->tid;
  663. struct dp_rx_tid *rx_tid = &peer->rx_tid[tid];
  664. if (rx_tid->ba_status != DP_RX_BA_ACTIVE)
  665. return QDF_STATUS_E_FAILURE;
  666. /* TODO: See if we can delete the existing REO queue descriptor and
  667. * replace with a new one without queue extenstion descript to save
  668. * memory
  669. */
  670. dp_rx_tid_update_wifi3(peer, tid, 0, 0);
  671. rx_tid->ba_status = DP_RX_BA_INACTIVE;
  672. return 0;
  673. }
  674. void dp_rx_discard(struct dp_vdev *vdev, struct dp_peer *peer, unsigned tid,
  675. qdf_nbuf_t msdu_list)
  676. {
  677. while (msdu_list) {
  678. qdf_nbuf_t msdu = msdu_list;
  679. msdu_list = qdf_nbuf_next(msdu_list);
  680. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_INFO_HIGH,
  681. "discard rx %p from partly-deleted peer %p "
  682. "(%02x:%02x:%02x:%02x:%02x:%02x)\n",
  683. msdu, peer,
  684. peer->mac_addr.raw[0], peer->mac_addr.raw[1],
  685. peer->mac_addr.raw[2], peer->mac_addr.raw[3],
  686. peer->mac_addr.raw[4], peer->mac_addr.raw[5]);
  687. qdf_nbuf_free(msdu);
  688. }
  689. }
  690. void
  691. dp_rx_sec_ind_handler(void *soc_handle, uint16_t peer_id,
  692. enum htt_sec_type sec_type, int is_unicast, u_int32_t *michael_key,
  693. u_int32_t *rx_pn)
  694. {
  695. struct dp_soc *soc = (struct dp_soc *)soc_handle;
  696. struct dp_peer *peer;
  697. int sec_index;
  698. peer = dp_peer_find_by_id(soc, peer_id);
  699. if (!peer) {
  700. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  701. "Couldn't find peer from ID %d - skipping security inits\n",
  702. peer_id);
  703. return;
  704. }
  705. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_INFO_HIGH,
  706. "sec spec for peer %p (%02x:%02x:%02x:%02x:%02x:%02x): "
  707. "%s key of type %d\n",
  708. peer,
  709. peer->mac_addr.raw[0], peer->mac_addr.raw[1],
  710. peer->mac_addr.raw[2], peer->mac_addr.raw[3],
  711. peer->mac_addr.raw[4], peer->mac_addr.raw[5],
  712. is_unicast ? "ucast" : "mcast",
  713. sec_type);
  714. sec_index = is_unicast ? dp_sec_ucast : dp_sec_mcast;
  715. peer->security[sec_index].sec_type = sec_type;
  716. #if notyet /* TODO: See if this is required for defrag support */
  717. /* michael key only valid for TKIP, but for simplicity,
  718. * copy it anyway
  719. */
  720. qdf_mem_copy(
  721. &peer->security[sec_index].michael_key[0],
  722. michael_key,
  723. sizeof(peer->security[sec_index].michael_key));
  724. #ifdef BIG_ENDIAN_HOST
  725. OL_IF_SWAPBO(peer->security[sec_index].michael_key[0],
  726. sizeof(peer->security[sec_index].michael_key));
  727. #endif /* BIG_ENDIAN_HOST */
  728. #endif
  729. #ifdef notyet /* TODO: Check if this is required for wifi3.0 */
  730. if (sec_type != htt_sec_type_wapi) {
  731. qdf_mem_set(peer->tids_last_pn_valid, _EXT_TIDS, 0x00);
  732. } else {
  733. for (i = 0; i < DP_MAX_TIDS; i++) {
  734. /*
  735. * Setting PN valid bit for WAPI sec_type,
  736. * since WAPI PN has to be started with predefined value
  737. */
  738. peer->tids_last_pn_valid[i] = 1;
  739. qdf_mem_copy(
  740. (u_int8_t *) &peer->tids_last_pn[i],
  741. (u_int8_t *) rx_pn, sizeof(union htt_rx_pn_t));
  742. peer->tids_last_pn[i].pn128[1] =
  743. qdf_cpu_to_le64(peer->tids_last_pn[i].pn128[1]);
  744. peer->tids_last_pn[i].pn128[0] =
  745. qdf_cpu_to_le64(peer->tids_last_pn[i].pn128[0]);
  746. }
  747. }
  748. #endif
  749. /* TODO: Update HW TID queue with PN check parameters (pn type for
  750. * all security types and last pn for WAPI) once REO command API
  751. * is available
  752. */
  753. }