dp_txrx_wds.c 35 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237
  1. /*
  2. * Copyright (c) 2016-2021 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "htt.h"
  19. #include "dp_peer.h"
  20. #include "hal_rx.h"
  21. #include "hal_api.h"
  22. #include "qdf_nbuf.h"
  23. #include "dp_types.h"
  24. #include "dp_internal.h"
  25. #include "dp_tx.h"
  26. #include "enet.h"
  27. #include "dp_txrx_wds.h"
  28. /* Generic AST entry aging timer value */
  29. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  30. #define DP_VLAN_UNTAGGED 0
  31. #define DP_VLAN_TAGGED_MULTICAST 1
  32. #define DP_VLAN_TAGGED_UNICAST 2
  33. #define DP_MAX_VLAN_IDS 4096
  34. #define DP_INVALID_AST_IDX 0xffff
  35. #define DP_INVALID_FLOW_PRIORITY 0xff
  36. #define DP_PEER_AST0_FLOW_MASK 0x4
  37. #define DP_PEER_AST1_FLOW_MASK 0x8
  38. #define DP_PEER_AST2_FLOW_MASK 0x1
  39. #define DP_PEER_AST3_FLOW_MASK 0x2
  40. #define DP_MAX_AST_INDEX_PER_PEER 4
  41. static void
  42. dp_peer_age_ast_entries(struct dp_soc *soc, struct dp_peer *peer, void *arg)
  43. {
  44. struct dp_ast_entry *ase, *temp_ase;
  45. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  46. /*
  47. * Do not expire static ast entries and HM WDS entries
  48. */
  49. if (ase->type != CDP_TXRX_AST_TYPE_WDS &&
  50. ase->type != CDP_TXRX_AST_TYPE_DA)
  51. continue;
  52. if (ase->is_active) {
  53. ase->is_active = FALSE;
  54. continue;
  55. }
  56. DP_STATS_INC(soc, ast.aged_out, 1);
  57. dp_peer_del_ast(soc, ase);
  58. }
  59. }
  60. static void
  61. dp_peer_age_mec_entries(struct dp_soc *soc)
  62. {
  63. uint32_t index;
  64. struct dp_mec_entry *mecentry, *mecentry_next;
  65. TAILQ_HEAD(, dp_mec_entry) free_list;
  66. TAILQ_INIT(&free_list);
  67. for (index = 0; index <= soc->mec_hash.mask; index++) {
  68. qdf_spin_lock_bh(&soc->mec_lock);
  69. /*
  70. * Expire MEC entry every n sec.
  71. */
  72. if (!TAILQ_EMPTY(&soc->mec_hash.bins[index])) {
  73. TAILQ_FOREACH_SAFE(mecentry, &soc->mec_hash.bins[index],
  74. hash_list_elem, mecentry_next) {
  75. if (mecentry->is_active) {
  76. mecentry->is_active = FALSE;
  77. continue;
  78. }
  79. dp_peer_mec_detach_entry(soc, mecentry,
  80. &free_list);
  81. }
  82. }
  83. qdf_spin_unlock_bh(&soc->mec_lock);
  84. }
  85. dp_peer_mec_free_list(soc, &free_list);
  86. }
  87. static void dp_ast_aging_timer_fn(void *soc_hdl)
  88. {
  89. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  90. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  91. soc->wds_ast_aging_timer_cnt = 0;
  92. /* AST list access lock */
  93. qdf_spin_lock_bh(&soc->ast_lock);
  94. dp_soc_iterate_peer(soc, dp_peer_age_ast_entries, NULL,
  95. DP_MOD_ID_AST);
  96. qdf_spin_unlock_bh(&soc->ast_lock);
  97. }
  98. /*
  99. * If NSS offload is enabled, the MEC timeout
  100. * will be managed by NSS.
  101. */
  102. if (qdf_atomic_read(&soc->mec_cnt) &&
  103. !wlan_cfg_get_dp_soc_nss_cfg(soc->wlan_cfg_ctx))
  104. dp_peer_age_mec_entries(soc);
  105. if (qdf_atomic_read(&soc->cmn_init_done))
  106. qdf_timer_mod(&soc->ast_aging_timer,
  107. DP_AST_AGING_TIMER_DEFAULT_MS);
  108. }
  109. /*
  110. * dp_soc_wds_attach() - Setup WDS timer and AST table
  111. * @soc: Datapath SOC handle
  112. *
  113. * Return: None
  114. */
  115. void dp_soc_wds_attach(struct dp_soc *soc)
  116. {
  117. soc->wds_ast_aging_timer_cnt = 0;
  118. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  119. dp_ast_aging_timer_fn, (void *)soc,
  120. QDF_TIMER_TYPE_WAKE_APPS);
  121. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  122. }
  123. /*
  124. * dp_soc_wds_detach() - Detach WDS data structures and timers
  125. * @txrx_soc: DP SOC handle
  126. *
  127. * Return: None
  128. */
  129. void dp_soc_wds_detach(struct dp_soc *soc)
  130. {
  131. qdf_timer_stop(&soc->ast_aging_timer);
  132. qdf_timer_free(&soc->ast_aging_timer);
  133. }
  134. /**
  135. * dp_tx_mec_handler() - Tx MEC Notify Handler
  136. * @vdev: pointer to dp dev handler
  137. * @status : Tx completion status from HTT descriptor
  138. *
  139. * Handles MEC notify event sent from fw to Host
  140. *
  141. * Return: none
  142. */
  143. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  144. {
  145. struct dp_soc *soc;
  146. QDF_STATUS add_mec_status;
  147. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  148. if (!vdev->mec_enabled)
  149. return;
  150. /* MEC required only in STA mode */
  151. if (vdev->opmode != wlan_op_mode_sta)
  152. return;
  153. soc = vdev->pdev->soc;
  154. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  155. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  156. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  157. dp_peer_debug("%pK: MEC add for mac_addr "QDF_MAC_ADDR_FMT,
  158. soc, QDF_MAC_ADDR_REF(mac_addr));
  159. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE)) {
  160. add_mec_status = dp_peer_mec_add_entry(soc, vdev, mac_addr);
  161. dp_peer_debug("%pK: MEC add status %d", vdev, add_mec_status);
  162. }
  163. }
  164. #ifndef QCA_HOST_MODE_WIFI_DISABLED
  165. /**
  166. * dp_rx_da_learn() - Add AST entry based on DA lookup
  167. * This is a WAR for HK 1.0 and will
  168. * be removed in HK 2.0
  169. *
  170. * @soc: core txrx main context
  171. * @rx_tlv_hdr : start address of rx tlvs
  172. * @ta_peer : Transmitter peer entry
  173. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  174. *
  175. */
  176. void
  177. dp_rx_da_learn(struct dp_soc *soc,
  178. uint8_t *rx_tlv_hdr,
  179. struct dp_peer *ta_peer,
  180. qdf_nbuf_t nbuf)
  181. {
  182. /* For HKv2 DA port learing is not needed */
  183. if (qdf_likely(soc->ast_override_support))
  184. return;
  185. if (qdf_unlikely(!ta_peer))
  186. return;
  187. if (qdf_unlikely(ta_peer->vdev->opmode != wlan_op_mode_ap))
  188. return;
  189. if (!soc->da_war_enabled)
  190. return;
  191. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  192. !qdf_nbuf_is_da_mcbc(nbuf))) {
  193. dp_peer_add_ast(soc,
  194. ta_peer,
  195. qdf_nbuf_data(nbuf),
  196. CDP_TXRX_AST_TYPE_DA,
  197. DP_AST_FLAGS_HM);
  198. }
  199. }
  200. /**
  201. * dp_txrx_set_wds_rx_policy() - API to store datapath
  202. * config parameters
  203. * @soc - datapath soc handle
  204. * @vdev_id - id of datapath vdev handle
  205. * @cfg: ini parameter handle
  206. *
  207. * Return: status
  208. */
  209. #ifdef WDS_VENDOR_EXTENSION
  210. QDF_STATUS
  211. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  212. u_int32_t val)
  213. {
  214. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  215. struct dp_peer *peer;
  216. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  217. DP_MOD_ID_MISC);
  218. if (!vdev) {
  219. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  220. FL("vdev is NULL for vdev_id %d"), vdev_id);
  221. return QDF_STATUS_E_INVAL;
  222. }
  223. peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  224. if (peer) {
  225. peer->wds_ecm.wds_rx_filter = 1;
  226. peer->wds_ecm.wds_rx_ucast_4addr =
  227. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  228. peer->wds_ecm.wds_rx_mcast_4addr =
  229. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  230. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  231. }
  232. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_MISC);
  233. return QDF_STATUS_SUCCESS;
  234. }
  235. /**
  236. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  237. *
  238. * @cdp_soc: DP soc handle
  239. * @vdev_id: id of vdev handle
  240. * @peer_mac: peer mac address
  241. * @wds_tx_ucast: policy for unicast transmission
  242. * @wds_tx_mcast: policy for multicast transmission
  243. *
  244. * Return: void
  245. */
  246. QDF_STATUS
  247. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  248. uint8_t *peer_mac, int wds_tx_ucast,
  249. int wds_tx_mcast)
  250. {
  251. struct dp_peer *peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  252. peer_mac, 0,
  253. vdev_id,
  254. DP_MOD_ID_AST);
  255. if (!peer) {
  256. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  257. FL("peer is NULL for mac %pM vdev_id %d"),
  258. peer_mac, vdev_id);
  259. return QDF_STATUS_E_INVAL;
  260. }
  261. if (wds_tx_ucast || wds_tx_mcast) {
  262. peer->wds_enabled = 1;
  263. peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  264. peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  265. } else {
  266. peer->wds_enabled = 0;
  267. peer->wds_ecm.wds_tx_ucast_4addr = 0;
  268. peer->wds_ecm.wds_tx_mcast_4addr = 0;
  269. }
  270. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  271. "Policy Update set to :\n");
  272. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  273. "peer->wds_enabled %d\n", peer->wds_enabled);
  274. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  275. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  276. peer->wds_ecm.wds_tx_ucast_4addr);
  277. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  278. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  279. peer->wds_ecm.wds_tx_mcast_4addr);
  280. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  281. return QDF_STATUS_SUCCESS;
  282. }
  283. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  284. struct dp_vdev *vdev,
  285. struct dp_peer *peer)
  286. {
  287. struct dp_peer *bss_peer;
  288. int fr_ds, to_ds, rx_3addr, rx_4addr;
  289. int rx_policy_ucast, rx_policy_mcast;
  290. hal_soc_handle_t hal_soc = vdev->pdev->soc->hal_soc;
  291. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(hal_soc, rx_tlv_hdr);
  292. if (vdev->opmode == wlan_op_mode_ap) {
  293. bss_peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  294. /* if wds policy check is not enabled on this vdev, accept all frames */
  295. if (bss_peer && !bss_peer->wds_ecm.wds_rx_filter) {
  296. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  297. return 1;
  298. }
  299. rx_policy_ucast = bss_peer->wds_ecm.wds_rx_ucast_4addr;
  300. rx_policy_mcast = bss_peer->wds_ecm.wds_rx_mcast_4addr;
  301. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  302. } else { /* sta mode */
  303. if (!peer->wds_ecm.wds_rx_filter) {
  304. return 1;
  305. }
  306. rx_policy_ucast = peer->wds_ecm.wds_rx_ucast_4addr;
  307. rx_policy_mcast = peer->wds_ecm.wds_rx_mcast_4addr;
  308. }
  309. /* ------------------------------------------------
  310. * self
  311. * peer- rx rx-
  312. * wds ucast mcast dir policy accept note
  313. * ------------------------------------------------
  314. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  315. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  316. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  317. * 1 1 0 00 x1 0 bad frame, won't see it
  318. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  319. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  320. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  321. * 1 0 1 00 1x 0 bad frame, won't see it
  322. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  323. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  324. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  325. * 1 1 0 00 x0 0 bad frame, won't see it
  326. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  327. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  328. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  329. * 1 0 1 00 0x 0 bad frame, won't see it
  330. *
  331. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  332. * 0 x x 01 xx 1
  333. * 0 x x 10 xx 0
  334. * 0 x x 00 xx 0 bad frame, won't see it
  335. * ------------------------------------------------
  336. */
  337. fr_ds = hal_rx_mpdu_get_fr_ds(hal_soc, rx_tlv_hdr);
  338. to_ds = hal_rx_mpdu_get_to_ds(hal_soc, rx_tlv_hdr);
  339. rx_3addr = fr_ds ^ to_ds;
  340. rx_4addr = fr_ds & to_ds;
  341. if (vdev->opmode == wlan_op_mode_ap) {
  342. if ((!peer->wds_enabled && rx_3addr && to_ds) ||
  343. (peer->wds_enabled && !rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  344. (peer->wds_enabled && rx_mcast && (rx_4addr == rx_policy_mcast))) {
  345. return 1;
  346. }
  347. } else { /* sta mode */
  348. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  349. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  350. return 1;
  351. }
  352. }
  353. return 0;
  354. }
  355. #endif
  356. /**
  357. * dp_tx_add_groupkey_metadata - Add group key in metadata
  358. * @vdev: DP vdev handle
  359. * @msdu_info: MSDU info to be setup in MSDU descriptor
  360. * @group_key: Group key index programmed in metadata
  361. *
  362. * Return: void
  363. */
  364. #ifdef QCA_MULTIPASS_SUPPORT
  365. static
  366. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  367. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  368. {
  369. struct htt_tx_msdu_desc_ext2_t *meta_data =
  370. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  371. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  372. /*
  373. * When attempting to send a multicast packet with multi-passphrase,
  374. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  375. * ref htt.h indicating the group_id field in "key_flags" also having
  376. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  377. */
  378. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  379. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  380. }
  381. /**
  382. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  383. * @vdev: DP vdev handle
  384. * @tx_desc: Tx Descriptor Handle
  385. *
  386. * Return: void
  387. */
  388. static
  389. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  390. {
  391. struct vlan_ethhdr veth_hdr;
  392. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  393. /*
  394. * Extract VLAN header of 4 bytes:
  395. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  396. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  397. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  398. */
  399. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  400. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  401. veh = (struct vlan_ethhdr *)nbuf->data;
  402. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  403. return;
  404. }
  405. /**
  406. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  407. * @vdev: DP vdev handle
  408. * @tx_desc: Tx Descriptor Handle
  409. * @vlan_id: vlan id of frame
  410. *
  411. * Return: whether peer is special or classic
  412. */
  413. static
  414. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  415. qdf_nbuf_t buf, uint16_t *vlan_id)
  416. {
  417. struct dp_peer *peer = NULL;
  418. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  419. struct vlan_ethhdr *veh = NULL;
  420. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  421. (htons(eh->ether_type) != ETH_P_8021Q));
  422. if (qdf_unlikely(not_vlan))
  423. return DP_VLAN_UNTAGGED;
  424. veh = (struct vlan_ethhdr *)eh;
  425. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  426. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  427. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  428. TAILQ_FOREACH(peer, &vdev->mpass_peer_list,
  429. mpass_peer_list_elem) {
  430. if (*vlan_id == peer->vlan_id) {
  431. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  432. return DP_VLAN_TAGGED_MULTICAST;
  433. }
  434. }
  435. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  436. return DP_VLAN_UNTAGGED;
  437. }
  438. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL,
  439. DP_MOD_ID_TX_MULTIPASS);
  440. if (qdf_unlikely(peer == NULL))
  441. return DP_VLAN_UNTAGGED;
  442. /*
  443. * Do not drop the frame when vlan_id doesn't match.
  444. * Send the frame as it is.
  445. */
  446. if (*vlan_id == peer->vlan_id) {
  447. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  448. return DP_VLAN_TAGGED_UNICAST;
  449. }
  450. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  451. return DP_VLAN_UNTAGGED;
  452. }
  453. /**
  454. * dp_tx_multipass_process - Process vlan frames in tx path
  455. * @soc: dp soc handle
  456. * @vdev: DP vdev handle
  457. * @nbuf: skb
  458. * @msdu_info: msdu descriptor
  459. *
  460. * Return: status whether frame needs to be dropped or transmitted
  461. */
  462. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  463. qdf_nbuf_t nbuf,
  464. struct dp_tx_msdu_info_s *msdu_info)
  465. {
  466. uint16_t vlan_id = 0;
  467. uint16_t group_key = 0;
  468. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  469. qdf_nbuf_t nbuf_copy = NULL;
  470. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  471. return true;
  472. }
  473. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  474. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  475. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  476. return true;
  477. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  478. dp_tx_remove_vlan_tag(vdev, nbuf);
  479. return true;
  480. }
  481. /* AP can have classic clients, special clients &
  482. * classic repeaters.
  483. * 1. Classic clients & special client:
  484. * Remove vlan header, find corresponding group key
  485. * index, fill in metaheader and enqueue multicast
  486. * frame to TCL.
  487. * 2. Classic repeater:
  488. * Pass through to classic repeater with vlan tag
  489. * intact without any group key index. Hardware
  490. * will know which key to use to send frame to
  491. * repeater.
  492. */
  493. nbuf_copy = qdf_nbuf_copy(nbuf);
  494. /*
  495. * Send multicast frame to special peers even
  496. * if pass through to classic repeater fails.
  497. */
  498. if (nbuf_copy) {
  499. struct dp_tx_msdu_info_s msdu_info_copy;
  500. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  501. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  502. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  503. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  504. if (nbuf_copy) {
  505. qdf_nbuf_free(nbuf_copy);
  506. qdf_err("nbuf_copy send failed");
  507. }
  508. }
  509. group_key = vdev->iv_vlan_map[vlan_id];
  510. /*
  511. * If group key is not installed, drop the frame.
  512. */
  513. if (!group_key)
  514. return false;
  515. dp_tx_remove_vlan_tag(vdev, nbuf);
  516. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  517. msdu_info->exception_fw = 1;
  518. return true;
  519. }
  520. /**
  521. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  522. * @vdev: DP vdev handle
  523. * @nbuf: skb
  524. * @tid: traffic priority
  525. *
  526. * Return: bool: true in case of success else false
  527. * Success is considered if:
  528. * i. If frame has vlan header
  529. * ii. If the frame comes from different peer and dont need multipass processing
  530. * Failure is considered if:
  531. * i. Frame comes from multipass peer but doesn't contain vlan header.
  532. * In failure case, drop such frames.
  533. */
  534. bool dp_rx_multipass_process(struct dp_peer *peer, qdf_nbuf_t nbuf, uint8_t tid)
  535. {
  536. struct vlan_ethhdr *vethhdrp;
  537. if (qdf_unlikely(!peer->vlan_id))
  538. return true;
  539. vethhdrp = (struct vlan_ethhdr *)qdf_nbuf_data(nbuf);
  540. /*
  541. * h_vlan_proto & h_vlan_TCI should be 0x8100 & zero respectively
  542. * as it is expected to be padded by 0
  543. * return false if frame doesn't have above tag so that caller will
  544. * drop the frame.
  545. */
  546. if (qdf_unlikely(vethhdrp->h_vlan_proto != htons(QDF_ETH_TYPE_8021Q)) ||
  547. qdf_unlikely(vethhdrp->h_vlan_TCI != 0))
  548. return false;
  549. vethhdrp->h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  550. (peer->vlan_id & VLAN_VID_MASK));
  551. return true;
  552. }
  553. #endif /* QCA_MULTIPASS_SUPPORT */
  554. #endif /* QCA_HOST_MODE_WIFI_DISABLED */
  555. #ifdef QCA_MULTIPASS_SUPPORT
  556. /**
  557. * dp_peer_multipass_list_remove: remove peer from list
  558. * @peer: pointer to peer
  559. *
  560. * return: void
  561. */
  562. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  563. {
  564. struct dp_vdev *vdev = peer->vdev;
  565. struct dp_peer *tpeer = NULL;
  566. bool found = 0;
  567. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  568. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  569. if (tpeer == peer) {
  570. found = 1;
  571. TAILQ_REMOVE(&vdev->mpass_peer_list, peer, mpass_peer_list_elem);
  572. break;
  573. }
  574. }
  575. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  576. if (found)
  577. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  578. }
  579. /**
  580. * dp_peer_multipass_list_add: add to new multipass list
  581. * @dp_soc: soc handle
  582. * @peer_mac: mac address
  583. * @vdev_id: vdev id for peer
  584. * @vlan_id: vlan_id
  585. *
  586. * return: void
  587. */
  588. static void dp_peer_multipass_list_add(struct dp_soc *soc, uint8_t *peer_mac,
  589. uint8_t vdev_id, uint16_t vlan_id)
  590. {
  591. struct dp_peer *peer =
  592. dp_peer_find_hash_find(soc, peer_mac, 0, vdev_id,
  593. DP_MOD_ID_TX_MULTIPASS);
  594. if (qdf_unlikely(!peer)) {
  595. qdf_err("NULL peer");
  596. return;
  597. }
  598. /* If peer already exists in vdev multipass list, do not add it.
  599. * This may happen if key install comes twice or re-key
  600. * happens for a peer.
  601. */
  602. if (peer->vlan_id) {
  603. dp_debug("peer already added to vdev multipass list"
  604. "MAC: "QDF_MAC_ADDR_FMT" vlan: %d ",
  605. QDF_MAC_ADDR_REF(peer->mac_addr.raw), peer->vlan_id);
  606. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  607. return;
  608. }
  609. /*
  610. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  611. * Decrement it when element is deleted from the list.
  612. */
  613. peer->vlan_id = vlan_id;
  614. qdf_spin_lock_bh(&peer->vdev->mpass_peer_mutex);
  615. TAILQ_INSERT_HEAD(&peer->vdev->mpass_peer_list, peer,
  616. mpass_peer_list_elem);
  617. qdf_spin_unlock_bh(&peer->vdev->mpass_peer_mutex);
  618. }
  619. /**
  620. * dp_peer_set_vlan_id: set vlan_id for this peer
  621. * @cdp_soc: soc handle
  622. * @vdev_id: vdev id for peer
  623. * @peer_mac: mac address
  624. * @vlan_id: vlan id for peer
  625. *
  626. * return: void
  627. */
  628. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  629. uint8_t vdev_id, uint8_t *peer_mac,
  630. uint16_t vlan_id)
  631. {
  632. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  633. struct dp_vdev *vdev =
  634. dp_vdev_get_ref_by_id((struct dp_soc *)soc, vdev_id,
  635. DP_MOD_ID_TX_MULTIPASS);
  636. if (vdev && vdev->multipass_en) {
  637. dp_peer_multipass_list_add(soc, peer_mac, vdev_id, vlan_id);
  638. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  639. }
  640. }
  641. /**
  642. * dp_set_vlan_groupkey: set vlan map for vdev
  643. * @soc: pointer to soc
  644. * @vdev_id : id of vdev
  645. * @vlan_id: vlan_id
  646. * @group_key: group key for vlan
  647. *
  648. * return: set success/failure
  649. */
  650. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  651. uint16_t vlan_id, uint16_t group_key)
  652. {
  653. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  654. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  655. DP_MOD_ID_TX_MULTIPASS);
  656. QDF_STATUS status;
  657. if (!vdev || !vdev->multipass_en) {
  658. status = QDF_STATUS_E_INVAL;
  659. goto fail;
  660. }
  661. if (!vdev->iv_vlan_map) {
  662. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  663. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  664. if (!vdev->iv_vlan_map) {
  665. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  666. status = QDF_STATUS_E_NOMEM;
  667. goto fail;
  668. }
  669. /*
  670. * 0 is invalid group key.
  671. * Initilalize array with invalid group keys.
  672. */
  673. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  674. }
  675. if (vlan_id >= DP_MAX_VLAN_IDS) {
  676. status = QDF_STATUS_E_INVAL;
  677. goto fail;
  678. }
  679. vdev->iv_vlan_map[vlan_id] = group_key;
  680. status = QDF_STATUS_SUCCESS;
  681. fail:
  682. if (vdev)
  683. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  684. return status;
  685. }
  686. /**
  687. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  688. * @vdev_handle: pointer to vdev
  689. *
  690. * return: void
  691. */
  692. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  693. {
  694. struct dp_peer *peer = NULL;
  695. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  696. TAILQ_FOREACH(peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  697. qdf_err("Peers present in mpass list :" QDF_MAC_ADDR_FMT,
  698. QDF_MAC_ADDR_REF(peer->mac_addr.raw));
  699. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  700. if (vdev->iv_vlan_map) {
  701. qdf_mem_free(vdev->iv_vlan_map);
  702. vdev->iv_vlan_map = NULL;
  703. }
  704. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  705. }
  706. /**
  707. * dp_peer_multipass_list_init: initialize peer mulitpass list
  708. * @vdev_handle: pointer to vdev
  709. *
  710. * return: set success/failure
  711. */
  712. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  713. {
  714. /*
  715. * vdev->iv_vlan_map is allocated when the first configuration command
  716. * is issued to avoid unnecessary allocation for regular mode VAP.
  717. */
  718. TAILQ_INIT(&vdev->mpass_peer_list);
  719. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  720. }
  721. #endif /* QCA_MULTIPASS_SUPPORT */
  722. #ifdef QCA_PEER_MULTIQ_SUPPORT
  723. /**
  724. * dp_peer_reset_flowq_map() - reset peer flowq map table
  725. * @peer - dp peer handle
  726. *
  727. * Return: none
  728. */
  729. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  730. {
  731. int i = 0;
  732. if (!peer)
  733. return;
  734. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  735. peer->peer_ast_flowq_idx[i].is_valid = false;
  736. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  737. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  738. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  739. }
  740. }
  741. /**
  742. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  743. * @peer - dp peer handle
  744. * @mask - flow mask
  745. *
  746. * Return: flow id
  747. */
  748. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  749. uint8_t mask)
  750. {
  751. if (!peer) {
  752. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  753. "%s: Invalid peer\n", __func__);
  754. return -1;
  755. }
  756. if (mask & DP_PEER_AST0_FLOW_MASK)
  757. return DP_PEER_AST_FLOWQ_UDP;
  758. else if (mask & DP_PEER_AST1_FLOW_MASK)
  759. return DP_PEER_AST_FLOWQ_NON_UDP;
  760. else if (mask & DP_PEER_AST2_FLOW_MASK)
  761. return DP_PEER_AST_FLOWQ_HI_PRIO;
  762. else if (mask & DP_PEER_AST3_FLOW_MASK)
  763. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  764. return DP_PEER_AST_FLOWQ_MAX;
  765. }
  766. /**
  767. * dp_peer_get_ast_valid() - get ast index valid from mask
  768. * @mask - mask for ast valid bits
  769. * @index - index for an ast
  770. *
  771. * Return - 1 if ast index is valid from mask else 0
  772. */
  773. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  774. {
  775. if (index == 0)
  776. return 1;
  777. return ((mask) & (1 << ((index) - 1)));
  778. }
  779. /**
  780. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  781. * @soc - genereic soc handle
  782. * @is_wds - flag to indicate if peer is wds
  783. * @peer_id - peer_id from htt peer map message
  784. * @peer_mac_addr - mac address of the peer
  785. * @ast_info - ast flow override information from peer map
  786. *
  787. * Return: none
  788. */
  789. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  790. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  791. struct dp_ast_flow_override_info *ast_info)
  792. {
  793. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  794. struct dp_peer *peer = NULL;
  795. uint8_t i;
  796. /*
  797. * Ast flow override feature is supported
  798. * only for connected client
  799. */
  800. if (is_wds)
  801. return;
  802. peer = dp_peer_get_ref_by_id(soc, peer_id, DP_MOD_ID_AST);
  803. if (!peer) {
  804. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  805. "%s: Invalid peer\n", __func__);
  806. return;
  807. }
  808. /* Valid only in AP mode */
  809. if (peer->vdev->opmode != wlan_op_mode_ap) {
  810. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  811. "%s: Peer ast flow map not in STA mode\n", __func__);
  812. goto end;
  813. }
  814. /* Making sure the peer is for this mac address */
  815. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  816. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  817. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  818. "%s: Peer mac address mismatch\n", __func__);
  819. goto end;
  820. }
  821. /* Ast entry flow mapping not valid for self peer map */
  822. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  823. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  824. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  825. "%s: Ast flow mapping not valid for self peer \n", __func__);
  826. goto end;
  827. }
  828. /* Fill up ast index <---> flow id mapping table for this peer */
  829. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  830. /* Check if this ast index is valid */
  831. peer->peer_ast_flowq_idx[i].is_valid =
  832. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  833. if (!peer->peer_ast_flowq_idx[i].is_valid)
  834. continue;
  835. /* Get the flow queue id which is mapped to this ast index */
  836. peer->peer_ast_flowq_idx[i].flowQ =
  837. dp_peer_get_flowid_from_flowmask(peer,
  838. ast_info->ast_flow_mask[i]);
  839. /*
  840. * Update tid valid mask only if flow id HIGH or
  841. * Low priority
  842. */
  843. if (peer->peer_ast_flowq_idx[i].flowQ ==
  844. DP_PEER_AST_FLOWQ_HI_PRIO) {
  845. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  846. ast_info->tid_valid_hi_pri_mask;
  847. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  848. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  849. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  850. ast_info->tid_valid_low_pri_mask;
  851. }
  852. /* Save the ast index for this entry */
  853. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  854. }
  855. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  856. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  857. soc->ctrl_psoc, peer->peer_id,
  858. peer->vdev->vdev_id, peer_mac_addr);
  859. }
  860. end:
  861. /* Release peer reference */
  862. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  863. }
  864. /**
  865. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  866. * @soc - soc handle
  867. * @peer_mac_addr - mac address of the peer
  868. * @flow_id - flow id to find ast index
  869. *
  870. * Return: ast index for a given flow id, -1 for fail cases
  871. */
  872. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  873. uint16_t vdev_id, uint8_t *peer_mac_addr,
  874. uint8_t flow_id, uint8_t tid)
  875. {
  876. struct dp_peer *peer = NULL;
  877. uint8_t i;
  878. uint16_t ast_index;
  879. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  880. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  881. "Invalid Flow ID %d\n", flow_id);
  882. return -1;
  883. }
  884. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  885. peer_mac_addr, 0, vdev_id,
  886. DP_MOD_ID_AST);
  887. if (!peer) {
  888. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  889. "%s: Invalid peer\n", __func__);
  890. return -1;
  891. }
  892. /*
  893. * Loop over the ast entry <----> flow-id mapping to find
  894. * which ast index entry has this flow queue id enabled.
  895. */
  896. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  897. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  898. /*
  899. * Found the matching index for this flow id
  900. */
  901. break;
  902. }
  903. /*
  904. * No match found for this flow id
  905. */
  906. if (i == DP_PEER_AST_FLOWQ_MAX) {
  907. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  908. "%s: ast index not found for flow %d\n", __func__, flow_id);
  909. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  910. return -1;
  911. }
  912. /* Check whether this ast entry is valid */
  913. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  914. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  915. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  916. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  917. return -1;
  918. }
  919. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  920. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  921. /*
  922. * check if this tid is valid for Hi
  923. * and Low priority flow id
  924. */
  925. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  926. & (1 << tid))) {
  927. /* Release peer reference */
  928. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  929. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  930. return ast_index;
  931. } else {
  932. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  933. "%s: TID %d is not valid for flow %d\n",
  934. __func__, tid, flow_id);
  935. /*
  936. * TID is not valid for this flow
  937. * Return -1
  938. */
  939. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  940. return -1;
  941. }
  942. }
  943. /*
  944. * TID valid check not required for
  945. * UDP/NON UDP flow id
  946. */
  947. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  948. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  949. return ast_index;
  950. }
  951. #endif
  952. void dp_hmwds_ast_add_notify(struct dp_peer *peer,
  953. uint8_t *mac_addr,
  954. enum cdp_txrx_ast_entry_type type,
  955. QDF_STATUS err,
  956. bool is_peer_map)
  957. {
  958. struct dp_vdev *dp_vdev = peer->vdev;
  959. struct dp_pdev *dp_pdev = dp_vdev->pdev;
  960. struct cdp_peer_hmwds_ast_add_status add_status;
  961. /* Ignore ast types other than HM */
  962. if ((type != CDP_TXRX_AST_TYPE_WDS_HM) &&
  963. (type != CDP_TXRX_AST_TYPE_WDS_HM_SEC))
  964. return;
  965. /* existing ast delete in progress, will be attempted
  966. * to add again after delete is complete. Send status then.
  967. */
  968. if (err == QDF_STATUS_E_AGAIN)
  969. return;
  970. /* peer map pending, notify actual status
  971. * when peer map is received.
  972. */
  973. if (!is_peer_map && (err == QDF_STATUS_SUCCESS))
  974. return;
  975. qdf_mem_zero(&add_status, sizeof(add_status));
  976. add_status.vdev_id = dp_vdev->vdev_id;
  977. /* For type CDP_TXRX_AST_TYPE_WDS_HM_SEC dp_peer_add_ast()
  978. * returns QDF_STATUS_E_FAILURE as it is host only entry.
  979. * In such cases set err as success. Also err code set to
  980. * QDF_STATUS_E_ALREADY indicates entry already exist in
  981. * such cases set err as success too. Any other error code
  982. * is actual error.
  983. */
  984. if (((type == CDP_TXRX_AST_TYPE_WDS_HM_SEC) &&
  985. (err == QDF_STATUS_E_FAILURE)) ||
  986. (err == QDF_STATUS_E_ALREADY)) {
  987. err = QDF_STATUS_SUCCESS;
  988. }
  989. add_status.status = err;
  990. qdf_mem_copy(add_status.peer_mac, peer->mac_addr.raw,
  991. QDF_MAC_ADDR_SIZE);
  992. qdf_mem_copy(add_status.ast_mac, mac_addr,
  993. QDF_MAC_ADDR_SIZE);
  994. #ifdef WDI_EVENT_ENABLE
  995. dp_wdi_event_handler(WDI_EVENT_HMWDS_AST_ADD_STATUS, dp_pdev->soc,
  996. (void *)&add_status, 0,
  997. WDI_NO_VAL, dp_pdev->pdev_id);
  998. #endif
  999. }
  1000. #ifdef FEATURE_PERPKT_INFO
  1001. /**
  1002. * dp_get_completion_indication_for_stack() - send completion to stack
  1003. * @soc : dp_soc handle
  1004. * @pdev: dp_pdev handle
  1005. * @peer: dp peer handle
  1006. * @ts: transmit completion status structure
  1007. * @netbuf: Buffer pointer for free
  1008. *
  1009. * This function is used for indication whether buffer needs to be
  1010. * sent to stack for freeing or not
  1011. */
  1012. QDF_STATUS
  1013. dp_get_completion_indication_for_stack(struct dp_soc *soc,
  1014. struct dp_pdev *pdev,
  1015. struct dp_peer *peer,
  1016. struct hal_tx_completion_status *ts,
  1017. qdf_nbuf_t netbuf,
  1018. uint64_t time_latency)
  1019. {
  1020. struct tx_capture_hdr *ppdu_hdr;
  1021. uint16_t peer_id = ts->peer_id;
  1022. uint32_t ppdu_id = ts->ppdu_id;
  1023. uint8_t first_msdu = ts->first_msdu;
  1024. uint8_t last_msdu = ts->last_msdu;
  1025. uint32_t txcap_hdr_size = sizeof(struct tx_capture_hdr);
  1026. if (qdf_unlikely(!pdev->tx_sniffer_enable && !pdev->mcopy_mode &&
  1027. !pdev->latency_capture_enable))
  1028. return QDF_STATUS_E_NOSUPPORT;
  1029. if (!peer) {
  1030. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1031. FL("Peer Invalid"));
  1032. return QDF_STATUS_E_INVAL;
  1033. }
  1034. if (pdev->mcopy_mode) {
  1035. /* If mcopy is enabled and mcopy_mode is M_COPY deliver 1st MSDU
  1036. * per PPDU. If mcopy_mode is M_COPY_EXTENDED deliver 1st MSDU
  1037. * for each MPDU
  1038. */
  1039. if (pdev->mcopy_mode == M_COPY) {
  1040. if ((pdev->m_copy_id.tx_ppdu_id == ppdu_id) &&
  1041. (pdev->m_copy_id.tx_peer_id == peer_id)) {
  1042. return QDF_STATUS_E_INVAL;
  1043. }
  1044. }
  1045. if (!first_msdu)
  1046. return QDF_STATUS_E_INVAL;
  1047. pdev->m_copy_id.tx_ppdu_id = ppdu_id;
  1048. pdev->m_copy_id.tx_peer_id = peer_id;
  1049. }
  1050. if (qdf_unlikely(qdf_nbuf_headroom(netbuf) < txcap_hdr_size)) {
  1051. netbuf = qdf_nbuf_realloc_headroom(netbuf, txcap_hdr_size);
  1052. if (!netbuf) {
  1053. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1054. FL("No headroom"));
  1055. return QDF_STATUS_E_NOMEM;
  1056. }
  1057. }
  1058. if (!qdf_nbuf_push_head(netbuf, txcap_hdr_size)) {
  1059. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1060. FL("No headroom"));
  1061. return QDF_STATUS_E_NOMEM;
  1062. }
  1063. ppdu_hdr = (struct tx_capture_hdr *)qdf_nbuf_data(netbuf);
  1064. qdf_mem_copy(ppdu_hdr->ta, peer->vdev->mac_addr.raw,
  1065. QDF_MAC_ADDR_SIZE);
  1066. qdf_mem_copy(ppdu_hdr->ra, peer->mac_addr.raw,
  1067. QDF_MAC_ADDR_SIZE);
  1068. ppdu_hdr->ppdu_id = ppdu_id;
  1069. ppdu_hdr->peer_id = peer_id;
  1070. ppdu_hdr->first_msdu = first_msdu;
  1071. ppdu_hdr->last_msdu = last_msdu;
  1072. if (qdf_unlikely(pdev->latency_capture_enable)) {
  1073. ppdu_hdr->tsf = ts->tsf;
  1074. ppdu_hdr->time_latency = time_latency;
  1075. }
  1076. return QDF_STATUS_SUCCESS;
  1077. }
  1078. /**
  1079. * dp_send_completion_to_stack() - send completion to stack
  1080. * @soc : dp_soc handle
  1081. * @pdev: dp_pdev handle
  1082. * @peer_id: peer_id of the peer for which completion came
  1083. * @ppdu_id: ppdu_id
  1084. * @netbuf: Buffer pointer for free
  1085. *
  1086. * This function is used to send completion to stack
  1087. * to free buffer
  1088. */
  1089. void dp_send_completion_to_stack(struct dp_soc *soc, struct dp_pdev *pdev,
  1090. uint16_t peer_id, uint32_t ppdu_id,
  1091. qdf_nbuf_t netbuf)
  1092. {
  1093. dp_wdi_event_handler(WDI_EVENT_TX_DATA, soc,
  1094. netbuf, peer_id,
  1095. WDI_NO_VAL, pdev->pdev_id);
  1096. }
  1097. #endif