dp_txrx_wds.c 42 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483
  1. /*
  2. * Copyright (c) 2016-2021 The Linux Foundation. All rights reserved.
  3. * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights reserved.
  4. *
  5. * Permission to use, copy, modify, and/or distribute this software for
  6. * any purpose with or without fee is hereby granted, provided that the
  7. * above copyright notice and this permission notice appear in all
  8. * copies.
  9. *
  10. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  11. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  12. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  13. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  14. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  15. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  16. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  17. * PERFORMANCE OF THIS SOFTWARE.
  18. */
  19. #include "htt.h"
  20. #include "dp_peer.h"
  21. #include "hal_rx.h"
  22. #include "hal_api.h"
  23. #include "qdf_nbuf.h"
  24. #include "dp_types.h"
  25. #include "dp_internal.h"
  26. #include "dp_tx.h"
  27. #include "enet.h"
  28. #ifdef WIFI_MONITOR_SUPPORT
  29. #include "dp_mon.h"
  30. #endif
  31. #include "dp_txrx_wds.h"
  32. /* Generic AST entry aging timer value */
  33. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  34. #define DP_VLAN_UNTAGGED 0
  35. #define DP_VLAN_TAGGED_MULTICAST 1
  36. #define DP_VLAN_TAGGED_UNICAST 2
  37. #define DP_MAX_VLAN_IDS 4096
  38. #define DP_INVALID_AST_IDX 0xffff
  39. #define DP_INVALID_FLOW_PRIORITY 0xff
  40. #define DP_PEER_AST0_FLOW_MASK 0x4
  41. #define DP_PEER_AST1_FLOW_MASK 0x8
  42. #define DP_PEER_AST2_FLOW_MASK 0x1
  43. #define DP_PEER_AST3_FLOW_MASK 0x2
  44. #define DP_MAX_AST_INDEX_PER_PEER 4
  45. #ifdef WLAN_FEATURE_MULTI_AST_DEL
  46. void dp_peer_free_peer_ase_list(struct dp_soc *soc,
  47. struct peer_del_multi_wds_entries *wds_list)
  48. {
  49. struct peer_wds_entry_list *wds_entry, *tmp_entry;
  50. TAILQ_FOREACH_SAFE(wds_entry, &wds_list->ase_list,
  51. ase_list_elem, tmp_entry) {
  52. dp_peer_debug("type: %d mac_addr: " QDF_MAC_ADDR_FMT,
  53. wds_entry->type,
  54. QDF_MAC_ADDR_REF(wds_entry->dest_addr));
  55. TAILQ_REMOVE(&wds_list->ase_list, wds_entry, ase_list_elem);
  56. wds_list->num_entries--;
  57. qdf_mem_free(wds_entry);
  58. }
  59. }
  60. static void
  61. dp_pdev_build_peer_ase_list(struct dp_soc *soc, struct dp_peer *peer,
  62. void *arg)
  63. {
  64. struct dp_ast_entry *ase, *temp_ase;
  65. struct peer_del_multi_wds_entries *list = arg;
  66. struct peer_wds_entry_list *wds_entry;
  67. if (!soc || !peer || !arg) {
  68. dp_peer_err("Invalid input");
  69. return;
  70. }
  71. list->vdev_id = peer->vdev->vdev_id;
  72. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  73. if (ase->type != CDP_TXRX_AST_TYPE_WDS &&
  74. ase->type != CDP_TXRX_AST_TYPE_DA)
  75. continue;
  76. if (ase->is_active) {
  77. ase->is_active = false;
  78. continue;
  79. }
  80. if (ase->delete_in_progress) {
  81. dp_info_rl("Del set addr:" QDF_MAC_ADDR_FMT " type:%d",
  82. QDF_MAC_ADDR_REF(ase->mac_addr.raw),
  83. ase->type);
  84. continue;
  85. }
  86. if (ase->is_mapped)
  87. soc->ast_table[ase->ast_idx] = NULL;
  88. if (!ase->next_hop) {
  89. dp_peer_unlink_ast_entry(soc, ase, peer);
  90. continue;
  91. }
  92. wds_entry = (struct peer_wds_entry_list *)
  93. qdf_mem_malloc(sizeof(*wds_entry));
  94. if (!wds_entry) {
  95. dp_peer_err("%pK: fail to allocate wds_entry", soc);
  96. dp_peer_free_peer_ase_list(soc, list);
  97. return;
  98. }
  99. DP_STATS_INC(soc, ast.aged_out, 1);
  100. ase->delete_in_progress = true;
  101. wds_entry->dest_addr = ase->mac_addr.raw;
  102. wds_entry->type = ase->type;
  103. if (dp_peer_state_cmp(peer, DP_PEER_STATE_LOGICAL_DELETE))
  104. wds_entry->delete_in_fw = false;
  105. else
  106. wds_entry->delete_in_fw = true;
  107. dp_peer_debug("ase->type: %d pdev: %u vdev: %u mac_addr: " QDF_MAC_ADDR_FMT " next_hop: %u peer: %u",
  108. ase->type, ase->pdev_id, ase->vdev_id,
  109. QDF_MAC_ADDR_REF(ase->mac_addr.raw),
  110. ase->next_hop, ase->peer_id);
  111. TAILQ_INSERT_TAIL(&list->ase_list, wds_entry, ase_list_elem);
  112. list->num_entries++;
  113. }
  114. dp_peer_info("Total num of entries :%d", list->num_entries);
  115. }
  116. static void
  117. dp_peer_age_multi_ast_entries(struct dp_soc *soc, void *arg,
  118. enum dp_mod_id mod_id)
  119. {
  120. uint8_t i;
  121. struct dp_pdev *pdev = NULL;
  122. struct peer_del_multi_wds_entries wds_list = {0};
  123. TAILQ_INIT(&wds_list.ase_list);
  124. for (i = 0; i < MAX_PDEV_CNT && soc->pdev_list[i]; i++) {
  125. pdev = soc->pdev_list[i];
  126. dp_pdev_iterate_peer(pdev, dp_pdev_build_peer_ase_list,
  127. &wds_list, mod_id);
  128. if (wds_list.num_entries > 0) {
  129. dp_peer_ast_send_multi_wds_del(soc, wds_list.vdev_id,
  130. &wds_list);
  131. dp_peer_free_peer_ase_list(soc, &wds_list);
  132. } else {
  133. dp_peer_debug("No AST entries for pdev:%u",
  134. pdev->pdev_id);
  135. }
  136. }
  137. }
  138. #endif /* WLAN_FEATURE_MULTI_AST_DEL */
  139. static void
  140. dp_peer_age_ast_entries(struct dp_soc *soc, struct dp_peer *peer, void *arg)
  141. {
  142. struct dp_ast_entry *ase, *temp_ase;
  143. struct ast_del_ctxt *del_ctxt = (struct ast_del_ctxt *)arg;
  144. if ((del_ctxt->del_count >= soc->max_ast_ageout_count) &&
  145. !del_ctxt->age) {
  146. return;
  147. }
  148. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  149. /*
  150. * Do not expire static ast entries and HM WDS entries
  151. */
  152. if (ase->type != CDP_TXRX_AST_TYPE_WDS &&
  153. ase->type != CDP_TXRX_AST_TYPE_DA)
  154. continue;
  155. if (ase->is_active) {
  156. if (del_ctxt->age)
  157. ase->is_active = FALSE;
  158. continue;
  159. }
  160. if (del_ctxt->del_count < soc->max_ast_ageout_count) {
  161. DP_STATS_INC(soc, ast.aged_out, 1);
  162. dp_peer_del_ast(soc, ase);
  163. del_ctxt->del_count++;
  164. } else {
  165. soc->pending_ageout = true;
  166. if (!del_ctxt->age)
  167. break;
  168. }
  169. }
  170. }
  171. static void
  172. dp_peer_age_mec_entries(struct dp_soc *soc)
  173. {
  174. uint32_t index;
  175. struct dp_mec_entry *mecentry, *mecentry_next;
  176. TAILQ_HEAD(, dp_mec_entry) free_list;
  177. TAILQ_INIT(&free_list);
  178. for (index = 0; index <= soc->mec_hash.mask; index++) {
  179. qdf_spin_lock_bh(&soc->mec_lock);
  180. /*
  181. * Expire MEC entry every n sec.
  182. */
  183. if (!TAILQ_EMPTY(&soc->mec_hash.bins[index])) {
  184. TAILQ_FOREACH_SAFE(mecentry, &soc->mec_hash.bins[index],
  185. hash_list_elem, mecentry_next) {
  186. if (mecentry->is_active) {
  187. mecentry->is_active = FALSE;
  188. continue;
  189. }
  190. dp_peer_mec_detach_entry(soc, mecentry,
  191. &free_list);
  192. }
  193. }
  194. qdf_spin_unlock_bh(&soc->mec_lock);
  195. }
  196. dp_peer_mec_free_list(soc, &free_list);
  197. }
  198. #ifdef WLAN_FEATURE_MULTI_AST_DEL
  199. static void dp_ast_aging_timer_fn(void *soc_hdl)
  200. {
  201. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  202. struct ast_del_ctxt del_ctxt = {0};
  203. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  204. del_ctxt.age = true;
  205. soc->wds_ast_aging_timer_cnt = 0;
  206. }
  207. if (soc->pending_ageout || del_ctxt.age) {
  208. soc->pending_ageout = false;
  209. /* AST list access lock */
  210. qdf_spin_lock_bh(&soc->ast_lock);
  211. if (soc->multi_peer_grp_cmd_supported)
  212. dp_peer_age_multi_ast_entries(soc, NULL, DP_MOD_ID_AST);
  213. else
  214. dp_soc_iterate_peer(soc, dp_peer_age_ast_entries,
  215. &del_ctxt, DP_MOD_ID_AST);
  216. qdf_spin_unlock_bh(&soc->ast_lock);
  217. }
  218. /*
  219. * If NSS offload is enabled, the MEC timeout
  220. * will be managed by NSS.
  221. */
  222. if (qdf_atomic_read(&soc->mec_cnt) &&
  223. !wlan_cfg_get_dp_soc_nss_cfg(soc->wlan_cfg_ctx))
  224. dp_peer_age_mec_entries(soc);
  225. if (qdf_atomic_read(&soc->cmn_init_done))
  226. qdf_timer_mod(&soc->ast_aging_timer,
  227. DP_AST_AGING_TIMER_DEFAULT_MS);
  228. }
  229. #else
  230. static void dp_ast_aging_timer_fn(void *soc_hdl)
  231. {
  232. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  233. struct ast_del_ctxt del_ctxt = {0};
  234. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  235. del_ctxt.age = true;
  236. soc->wds_ast_aging_timer_cnt = 0;
  237. }
  238. if (soc->pending_ageout || del_ctxt.age) {
  239. soc->pending_ageout = false;
  240. /* AST list access lock */
  241. qdf_spin_lock_bh(&soc->ast_lock);
  242. dp_soc_iterate_peer(soc, dp_peer_age_ast_entries,
  243. &del_ctxt, DP_MOD_ID_AST);
  244. qdf_spin_unlock_bh(&soc->ast_lock);
  245. }
  246. /*
  247. * If NSS offload is enabled, the MEC timeout
  248. * will be managed by NSS.
  249. */
  250. if (qdf_atomic_read(&soc->mec_cnt) &&
  251. !wlan_cfg_get_dp_soc_nss_cfg(soc->wlan_cfg_ctx))
  252. dp_peer_age_mec_entries(soc);
  253. if (qdf_atomic_read(&soc->cmn_init_done))
  254. qdf_timer_mod(&soc->ast_aging_timer,
  255. DP_AST_AGING_TIMER_DEFAULT_MS);
  256. }
  257. #endif /* WLAN_FEATURE_MULTI_AST_DEL */
  258. #ifndef IPA_WDS_EASYMESH_FEATURE
  259. /*
  260. * dp_soc_wds_attach() - Setup WDS timer and AST table
  261. * @soc: Datapath SOC handle
  262. *
  263. * Return: None
  264. */
  265. void dp_soc_wds_attach(struct dp_soc *soc)
  266. {
  267. if (soc->ast_offload_support)
  268. return;
  269. soc->wds_ast_aging_timer_cnt = 0;
  270. soc->pending_ageout = false;
  271. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  272. dp_ast_aging_timer_fn, (void *)soc,
  273. QDF_TIMER_TYPE_WAKE_APPS);
  274. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  275. }
  276. /*
  277. * dp_soc_wds_detach() - Detach WDS data structures and timers
  278. * @txrx_soc: DP SOC handle
  279. *
  280. * Return: None
  281. */
  282. void dp_soc_wds_detach(struct dp_soc *soc)
  283. {
  284. qdf_timer_stop(&soc->ast_aging_timer);
  285. qdf_timer_free(&soc->ast_aging_timer);
  286. }
  287. #else
  288. void dp_soc_wds_attach(struct dp_soc *soc)
  289. {
  290. }
  291. void dp_soc_wds_detach(struct dp_soc *soc)
  292. {
  293. }
  294. #endif
  295. /**
  296. * dp_tx_mec_handler() - Tx MEC Notify Handler
  297. * @vdev: pointer to dp dev handler
  298. * @status : Tx completion status from HTT descriptor
  299. *
  300. * Handles MEC notify event sent from fw to Host
  301. *
  302. * Return: none
  303. */
  304. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  305. {
  306. struct dp_soc *soc;
  307. QDF_STATUS add_mec_status;
  308. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  309. if (!vdev->mec_enabled)
  310. return;
  311. /* MEC required only in STA mode */
  312. if (vdev->opmode != wlan_op_mode_sta)
  313. return;
  314. soc = vdev->pdev->soc;
  315. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  316. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  317. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  318. dp_peer_debug("%pK: MEC add for mac_addr "QDF_MAC_ADDR_FMT,
  319. soc, QDF_MAC_ADDR_REF(mac_addr));
  320. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE)) {
  321. add_mec_status = dp_peer_mec_add_entry(soc, vdev, mac_addr);
  322. dp_peer_debug("%pK: MEC add status %d", vdev, add_mec_status);
  323. }
  324. }
  325. #ifndef QCA_HOST_MODE_WIFI_DISABLED
  326. /**
  327. * dp_rx_da_learn() - Add AST entry based on DA lookup
  328. * This is a WAR for HK 1.0 and will
  329. * be removed in HK 2.0
  330. *
  331. * @soc: core txrx main context
  332. * @rx_tlv_hdr : start address of rx tlvs
  333. * @ta_txrx_peer: Transmitter peer entry
  334. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  335. *
  336. */
  337. void
  338. dp_rx_da_learn(struct dp_soc *soc,
  339. uint8_t *rx_tlv_hdr,
  340. struct dp_txrx_peer *ta_txrx_peer,
  341. qdf_nbuf_t nbuf)
  342. {
  343. struct dp_peer *base_peer;
  344. /* For HKv2 DA port learing is not needed */
  345. if (qdf_likely(soc->ast_override_support))
  346. return;
  347. if (qdf_unlikely(!ta_txrx_peer))
  348. return;
  349. if (qdf_unlikely(ta_txrx_peer->vdev->opmode != wlan_op_mode_ap))
  350. return;
  351. if (!soc->da_war_enabled)
  352. return;
  353. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  354. !qdf_nbuf_is_da_mcbc(nbuf))) {
  355. base_peer = dp_peer_get_ref_by_id(soc, ta_txrx_peer->peer_id,
  356. DP_MOD_ID_AST);
  357. if (base_peer) {
  358. dp_peer_add_ast(soc,
  359. base_peer,
  360. qdf_nbuf_data(nbuf),
  361. CDP_TXRX_AST_TYPE_DA,
  362. DP_AST_FLAGS_HM);
  363. dp_peer_unref_delete(base_peer, DP_MOD_ID_AST);
  364. }
  365. }
  366. }
  367. /**
  368. * dp_txrx_set_wds_rx_policy() - API to store datapath
  369. * config parameters
  370. * @soc - datapath soc handle
  371. * @vdev_id - id of datapath vdev handle
  372. * @cfg: ini parameter handle
  373. *
  374. * Return: status
  375. */
  376. #ifdef WDS_VENDOR_EXTENSION
  377. QDF_STATUS
  378. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  379. u_int32_t val)
  380. {
  381. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  382. struct dp_peer *peer;
  383. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  384. DP_MOD_ID_MISC);
  385. if (!vdev) {
  386. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  387. FL("vdev is NULL for vdev_id %d"), vdev_id);
  388. return QDF_STATUS_E_INVAL;
  389. }
  390. peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  391. if (peer) {
  392. peer->txrx_peer->wds_ecm.wds_rx_filter = 1;
  393. peer->txrx_peer->wds_ecm.wds_rx_ucast_4addr =
  394. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  395. peer->txrx_peer->wds_ecm.wds_rx_mcast_4addr =
  396. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  397. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  398. }
  399. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_MISC);
  400. return QDF_STATUS_SUCCESS;
  401. }
  402. /**
  403. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  404. *
  405. * @cdp_soc: DP soc handle
  406. * @vdev_id: id of vdev handle
  407. * @peer_mac: peer mac address
  408. * @wds_tx_ucast: policy for unicast transmission
  409. * @wds_tx_mcast: policy for multicast transmission
  410. *
  411. * Return: void
  412. */
  413. QDF_STATUS
  414. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  415. uint8_t *peer_mac, int wds_tx_ucast,
  416. int wds_tx_mcast)
  417. {
  418. struct dp_peer *peer =
  419. dp_peer_get_tgt_peer_hash_find((struct dp_soc *)soc,
  420. peer_mac, 0,
  421. vdev_id,
  422. DP_MOD_ID_AST);
  423. if (!peer) {
  424. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  425. FL("peer is NULL for mac %pM vdev_id %d"),
  426. peer_mac, vdev_id);
  427. return QDF_STATUS_E_INVAL;
  428. }
  429. if (!peer->txrx_peer) {
  430. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  431. return QDF_STATUS_E_INVAL;
  432. }
  433. if (wds_tx_ucast || wds_tx_mcast) {
  434. peer->txrx_peer->wds_enabled = 1;
  435. peer->txrx_peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  436. peer->txrx_peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  437. } else {
  438. peer->txrx_peer->wds_enabled = 0;
  439. peer->txrx_peer->wds_ecm.wds_tx_ucast_4addr = 0;
  440. peer->txrx_peer->wds_ecm.wds_tx_mcast_4addr = 0;
  441. }
  442. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  443. "Policy Update set to :\n");
  444. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  445. "peer->wds_enabled %d\n", peer->wds_enabled);
  446. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  447. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  448. peer->txrx_peer->wds_ecm.wds_tx_ucast_4addr);
  449. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  450. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  451. peer->txrx_peer->wds_ecm.wds_tx_mcast_4addr);
  452. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  453. return QDF_STATUS_SUCCESS;
  454. }
  455. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  456. struct dp_vdev *vdev,
  457. struct dp_txrx_peer *txrx_peer)
  458. {
  459. struct dp_peer *bss_peer;
  460. int fr_ds, to_ds, rx_3addr, rx_4addr;
  461. int rx_policy_ucast, rx_policy_mcast;
  462. hal_soc_handle_t hal_soc = vdev->pdev->soc->hal_soc;
  463. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(hal_soc, rx_tlv_hdr);
  464. if (vdev->opmode == wlan_op_mode_ap) {
  465. bss_peer = dp_vdev_bss_peer_ref_n_get(vdev, DP_MOD_ID_AST);
  466. /* if wds policy check is not enabled on this vdev, accept all frames */
  467. if (bss_peer && !bss_peer->txrx_peer->wds_ecm.wds_rx_filter) {
  468. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  469. return 1;
  470. }
  471. rx_policy_ucast = bss_peer->txrx_peerwds_ecm.wds_rx_ucast_4addr;
  472. rx_policy_mcast = bss_peer->txrx_peerwds_ecm.wds_rx_mcast_4addr;
  473. dp_peer_unref_delete(bss_peer, DP_MOD_ID_AST);
  474. } else { /* sta mode */
  475. if (!txrx_peer->wds_ecm.wds_rx_filter)
  476. return 1;
  477. rx_policy_ucast = txrx_peer->wds_ecm.wds_rx_ucast_4addr;
  478. rx_policy_mcast = txrx_peer->wds_ecm.wds_rx_mcast_4addr;
  479. }
  480. /* ------------------------------------------------
  481. * self
  482. * peer- rx rx-
  483. * wds ucast mcast dir policy accept note
  484. * ------------------------------------------------
  485. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  486. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  487. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  488. * 1 1 0 00 x1 0 bad frame, won't see it
  489. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  490. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  491. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  492. * 1 0 1 00 1x 0 bad frame, won't see it
  493. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  494. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  495. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  496. * 1 1 0 00 x0 0 bad frame, won't see it
  497. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  498. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  499. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  500. * 1 0 1 00 0x 0 bad frame, won't see it
  501. *
  502. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  503. * 0 x x 01 xx 1
  504. * 0 x x 10 xx 0
  505. * 0 x x 00 xx 0 bad frame, won't see it
  506. * ------------------------------------------------
  507. */
  508. fr_ds = hal_rx_mpdu_get_fr_ds(hal_soc, rx_tlv_hdr);
  509. to_ds = hal_rx_mpdu_get_to_ds(hal_soc, rx_tlv_hdr);
  510. rx_3addr = fr_ds ^ to_ds;
  511. rx_4addr = fr_ds & to_ds;
  512. if (vdev->opmode == wlan_op_mode_ap) {
  513. if ((!txrx_peer->wds_enabled && rx_3addr && to_ds) ||
  514. (txrx_peer->wds_enabled && !rx_mcast &&
  515. (rx_4addr == rx_policy_ucast)) ||
  516. (txrx_peer->wds_enabled && rx_mcast &&
  517. (rx_4addr == rx_policy_mcast))) {
  518. return 1;
  519. }
  520. } else { /* sta mode */
  521. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  522. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  523. return 1;
  524. }
  525. }
  526. return 0;
  527. }
  528. #endif
  529. /**
  530. * dp_tx_add_groupkey_metadata - Add group key in metadata
  531. * @vdev: DP vdev handle
  532. * @msdu_info: MSDU info to be setup in MSDU descriptor
  533. * @group_key: Group key index programmed in metadata
  534. *
  535. * Return: void
  536. */
  537. #ifdef QCA_MULTIPASS_SUPPORT
  538. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  539. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  540. {
  541. struct htt_tx_msdu_desc_ext2_t *meta_data =
  542. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  543. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  544. /*
  545. * When attempting to send a multicast packet with multi-passphrase,
  546. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  547. * ref htt.h indicating the group_id field in "key_flags" also having
  548. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  549. */
  550. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  551. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  552. }
  553. /**
  554. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  555. * @vdev: DP vdev handle
  556. * @tx_desc: Tx Descriptor Handle
  557. *
  558. * Return: void
  559. */
  560. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  561. {
  562. struct vlan_ethhdr veth_hdr;
  563. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  564. /*
  565. * Extract VLAN header of 4 bytes:
  566. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  567. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  568. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  569. */
  570. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  571. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  572. veh = (struct vlan_ethhdr *)nbuf->data;
  573. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  574. return;
  575. }
  576. #if defined(WLAN_FEATURE_11BE_MLO) && defined(WLAN_MLO_MULTI_CHIP) && \
  577. defined(WLAN_MCAST_MLO)
  578. /**
  579. * dp_tx_need_mcast_reinject - If frame needs to be processed in reinject path
  580. * @vdev: DP vdev handle
  581. *
  582. * Return: true if reinject handling is required else false
  583. */
  584. static inline bool
  585. dp_tx_need_mcast_reinject(struct dp_vdev *vdev)
  586. {
  587. if (vdev->mlo_vdev && vdev->opmode == wlan_op_mode_ap)
  588. return true;
  589. return false;
  590. }
  591. #else
  592. static inline bool
  593. dp_tx_need_mcast_reinject(struct dp_vdev *vdev)
  594. {
  595. return false;
  596. }
  597. #endif
  598. /**
  599. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  600. * @vdev: DP vdev handle
  601. * @tx_desc: Tx Descriptor Handle
  602. * @vlan_id: vlan id of frame
  603. *
  604. * Return: whether peer is special or classic
  605. */
  606. static
  607. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  608. qdf_nbuf_t buf, uint16_t *vlan_id)
  609. {
  610. struct dp_txrx_peer *txrx_peer = NULL;
  611. struct dp_peer *peer = NULL;
  612. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  613. struct vlan_ethhdr *veh = NULL;
  614. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  615. (htons(eh->ether_type) != ETH_P_8021Q));
  616. if (qdf_unlikely(not_vlan))
  617. return DP_VLAN_UNTAGGED;
  618. veh = (struct vlan_ethhdr *)eh;
  619. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  620. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  621. /* look for handling of multicast packets in reinject path */
  622. if (dp_tx_need_mcast_reinject(vdev))
  623. return DP_VLAN_UNTAGGED;
  624. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  625. TAILQ_FOREACH(txrx_peer, &vdev->mpass_peer_list,
  626. mpass_peer_list_elem) {
  627. if (*vlan_id == txrx_peer->vlan_id) {
  628. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  629. return DP_VLAN_TAGGED_MULTICAST;
  630. }
  631. }
  632. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  633. return DP_VLAN_UNTAGGED;
  634. }
  635. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL,
  636. DP_MOD_ID_TX_MULTIPASS);
  637. if (qdf_unlikely(peer == NULL))
  638. return DP_VLAN_UNTAGGED;
  639. /*
  640. * Do not drop the frame when vlan_id doesn't match.
  641. * Send the frame as it is.
  642. */
  643. if (*vlan_id == peer->txrx_peer->vlan_id) {
  644. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  645. return DP_VLAN_TAGGED_UNICAST;
  646. }
  647. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  648. return DP_VLAN_UNTAGGED;
  649. }
  650. /**
  651. * dp_tx_multipass_process - Process vlan frames in tx path
  652. * @soc: dp soc handle
  653. * @vdev: DP vdev handle
  654. * @nbuf: skb
  655. * @msdu_info: msdu descriptor
  656. *
  657. * Return: status whether frame needs to be dropped or transmitted
  658. */
  659. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  660. qdf_nbuf_t nbuf,
  661. struct dp_tx_msdu_info_s *msdu_info)
  662. {
  663. uint16_t vlan_id = 0;
  664. uint16_t group_key = 0;
  665. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  666. qdf_nbuf_t nbuf_copy = NULL;
  667. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  668. return true;
  669. }
  670. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  671. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  672. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  673. return true;
  674. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  675. dp_tx_remove_vlan_tag(vdev, nbuf);
  676. return true;
  677. }
  678. /* AP can have classic clients, special clients &
  679. * classic repeaters.
  680. * 1. Classic clients & special client:
  681. * Remove vlan header, find corresponding group key
  682. * index, fill in metaheader and enqueue multicast
  683. * frame to TCL.
  684. * 2. Classic repeater:
  685. * Pass through to classic repeater with vlan tag
  686. * intact without any group key index. Hardware
  687. * will know which key to use to send frame to
  688. * repeater.
  689. */
  690. nbuf_copy = qdf_nbuf_copy(nbuf);
  691. /*
  692. * Send multicast frame to special peers even
  693. * if pass through to classic repeater fails.
  694. */
  695. if (nbuf_copy) {
  696. struct dp_tx_msdu_info_s msdu_info_copy;
  697. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  698. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  699. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  700. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  701. if (nbuf_copy) {
  702. qdf_nbuf_free(nbuf_copy);
  703. qdf_err("nbuf_copy send failed");
  704. }
  705. }
  706. group_key = vdev->iv_vlan_map[vlan_id];
  707. /*
  708. * If group key is not installed, drop the frame.
  709. */
  710. if (!group_key)
  711. return false;
  712. dp_tx_remove_vlan_tag(vdev, nbuf);
  713. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  714. msdu_info->exception_fw = 1;
  715. return true;
  716. }
  717. /**
  718. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  719. * @txrx_peer: DP txrx peer handle
  720. * @nbuf: skb
  721. * @tid: traffic priority
  722. *
  723. * Return: bool: true in case of success else false
  724. * Success is considered if:
  725. * i. If frame has vlan header
  726. * ii. If the frame comes from different peer and dont need multipass processing
  727. * Failure is considered if:
  728. * i. Frame comes from multipass peer but doesn't contain vlan header.
  729. * In failure case, drop such frames.
  730. */
  731. bool dp_rx_multipass_process(struct dp_txrx_peer *txrx_peer, qdf_nbuf_t nbuf,
  732. uint8_t tid)
  733. {
  734. struct vlan_ethhdr *vethhdrp;
  735. if (qdf_unlikely(!txrx_peer->vlan_id))
  736. return true;
  737. vethhdrp = (struct vlan_ethhdr *)qdf_nbuf_data(nbuf);
  738. /*
  739. * h_vlan_proto & h_vlan_TCI should be 0x8100 & zero respectively
  740. * as it is expected to be padded by 0
  741. * return false if frame doesn't have above tag so that caller will
  742. * drop the frame.
  743. */
  744. if (qdf_unlikely(vethhdrp->h_vlan_proto != htons(QDF_ETH_TYPE_8021Q)) ||
  745. qdf_unlikely(vethhdrp->h_vlan_TCI != 0))
  746. return false;
  747. vethhdrp->h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  748. (txrx_peer->vlan_id & VLAN_VID_MASK));
  749. if (vethhdrp->h_vlan_encapsulated_proto == htons(ETHERTYPE_PAE))
  750. dp_tx_remove_vlan_tag(txrx_peer->vdev, nbuf);
  751. return true;
  752. }
  753. #endif /* QCA_MULTIPASS_SUPPORT */
  754. #endif /* QCA_HOST_MODE_WIFI_DISABLED */
  755. #ifdef QCA_MULTIPASS_SUPPORT
  756. /**
  757. * dp_peer_multipass_list_remove: remove peer from list
  758. * @peer: pointer to peer
  759. *
  760. * return: void
  761. */
  762. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  763. {
  764. struct dp_vdev *vdev = peer->vdev;
  765. struct dp_txrx_peer *tpeer = NULL;
  766. bool found = 0;
  767. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  768. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  769. if (tpeer == peer->txrx_peer) {
  770. found = 1;
  771. TAILQ_REMOVE(&vdev->mpass_peer_list, peer->txrx_peer,
  772. mpass_peer_list_elem);
  773. break;
  774. }
  775. }
  776. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  777. if (found)
  778. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  779. }
  780. /**
  781. * dp_peer_multipass_list_add: add to new multipass list
  782. * @dp_soc: soc handle
  783. * @peer_mac: mac address
  784. * @vdev_id: vdev id for peer
  785. * @vlan_id: vlan_id
  786. *
  787. * return: void
  788. */
  789. static void dp_peer_multipass_list_add(struct dp_soc *soc, uint8_t *peer_mac,
  790. uint8_t vdev_id, uint16_t vlan_id)
  791. {
  792. struct dp_peer *peer =
  793. dp_peer_get_tgt_peer_hash_find(soc, peer_mac, 0,
  794. vdev_id,
  795. DP_MOD_ID_TX_MULTIPASS);
  796. if (qdf_unlikely(!peer)) {
  797. qdf_err("NULL peer");
  798. return;
  799. }
  800. if (qdf_unlikely(!peer->txrx_peer))
  801. goto fail;
  802. /* If peer already exists in vdev multipass list, do not add it.
  803. * This may happen if key install comes twice or re-key
  804. * happens for a peer.
  805. */
  806. if (peer->txrx_peer->vlan_id) {
  807. dp_debug("peer already added to vdev multipass list"
  808. "MAC: "QDF_MAC_ADDR_FMT" vlan: %d ",
  809. QDF_MAC_ADDR_REF(peer->mac_addr.raw),
  810. peer->txrx_peer->vlan_id);
  811. goto fail;
  812. }
  813. /*
  814. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  815. * Decrement it when element is deleted from the list.
  816. */
  817. peer->txrx_peer->vlan_id = vlan_id;
  818. qdf_spin_lock_bh(&peer->txrx_peer->vdev->mpass_peer_mutex);
  819. TAILQ_INSERT_HEAD(&peer->txrx_peer->vdev->mpass_peer_list,
  820. peer->txrx_peer,
  821. mpass_peer_list_elem);
  822. qdf_spin_unlock_bh(&peer->txrx_peer->vdev->mpass_peer_mutex);
  823. return;
  824. fail:
  825. dp_peer_unref_delete(peer, DP_MOD_ID_TX_MULTIPASS);
  826. return;
  827. }
  828. /**
  829. * dp_peer_set_vlan_id: set vlan_id for this peer
  830. * @cdp_soc: soc handle
  831. * @vdev_id: vdev id for peer
  832. * @peer_mac: mac address
  833. * @vlan_id: vlan id for peer
  834. *
  835. * return: void
  836. */
  837. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  838. uint8_t vdev_id, uint8_t *peer_mac,
  839. uint16_t vlan_id)
  840. {
  841. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  842. struct dp_vdev *vdev =
  843. dp_vdev_get_ref_by_id((struct dp_soc *)soc, vdev_id,
  844. DP_MOD_ID_TX_MULTIPASS);
  845. if (vdev && vdev->multipass_en) {
  846. dp_peer_multipass_list_add(soc, peer_mac, vdev_id, vlan_id);
  847. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  848. }
  849. }
  850. /**
  851. * dp_set_vlan_groupkey: set vlan map for vdev
  852. * @soc: pointer to soc
  853. * @vdev_id : id of vdev
  854. * @vlan_id: vlan_id
  855. * @group_key: group key for vlan
  856. *
  857. * return: set success/failure
  858. */
  859. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc_hdl, uint8_t vdev_id,
  860. uint16_t vlan_id, uint16_t group_key)
  861. {
  862. struct dp_soc *soc = cdp_soc_t_to_dp_soc(soc_hdl);
  863. struct dp_vdev *vdev = dp_vdev_get_ref_by_id(soc, vdev_id,
  864. DP_MOD_ID_TX_MULTIPASS);
  865. QDF_STATUS status;
  866. if (!vdev || !vdev->multipass_en) {
  867. status = QDF_STATUS_E_INVAL;
  868. goto fail;
  869. }
  870. if (!vdev->iv_vlan_map) {
  871. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  872. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  873. if (!vdev->iv_vlan_map) {
  874. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  875. status = QDF_STATUS_E_NOMEM;
  876. goto fail;
  877. }
  878. /*
  879. * 0 is invalid group key.
  880. * Initilalize array with invalid group keys.
  881. */
  882. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  883. }
  884. if (vlan_id >= DP_MAX_VLAN_IDS) {
  885. status = QDF_STATUS_E_INVAL;
  886. goto fail;
  887. }
  888. vdev->iv_vlan_map[vlan_id] = group_key;
  889. status = QDF_STATUS_SUCCESS;
  890. fail:
  891. if (vdev)
  892. dp_vdev_unref_delete(soc, vdev, DP_MOD_ID_TX_MULTIPASS);
  893. return status;
  894. }
  895. /**
  896. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  897. * @vdev_handle: pointer to vdev
  898. *
  899. * return: void
  900. */
  901. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  902. {
  903. struct dp_txrx_peer *txrx_peer = NULL;
  904. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  905. TAILQ_FOREACH(txrx_peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  906. qdf_err("Peers present in mpass list : %d", txrx_peer->peer_id);
  907. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  908. if (vdev->iv_vlan_map) {
  909. qdf_mem_free(vdev->iv_vlan_map);
  910. vdev->iv_vlan_map = NULL;
  911. }
  912. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  913. }
  914. /**
  915. * dp_peer_multipass_list_init: initialize peer mulitpass list
  916. * @vdev_handle: pointer to vdev
  917. *
  918. * return: set success/failure
  919. */
  920. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  921. {
  922. /*
  923. * vdev->iv_vlan_map is allocated when the first configuration command
  924. * is issued to avoid unnecessary allocation for regular mode VAP.
  925. */
  926. TAILQ_INIT(&vdev->mpass_peer_list);
  927. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  928. }
  929. #endif /* QCA_MULTIPASS_SUPPORT */
  930. #ifdef QCA_PEER_MULTIQ_SUPPORT
  931. /**
  932. * dp_peer_reset_flowq_map() - reset peer flowq map table
  933. * @peer - dp peer handle
  934. *
  935. * Return: none
  936. */
  937. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  938. {
  939. int i = 0;
  940. if (!peer)
  941. return;
  942. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  943. peer->peer_ast_flowq_idx[i].is_valid = false;
  944. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  945. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  946. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  947. }
  948. }
  949. /**
  950. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  951. * @peer - dp peer handle
  952. * @mask - flow mask
  953. *
  954. * Return: flow id
  955. */
  956. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  957. uint8_t mask)
  958. {
  959. if (!peer) {
  960. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  961. "%s: Invalid peer\n", __func__);
  962. return -1;
  963. }
  964. if (mask & DP_PEER_AST0_FLOW_MASK)
  965. return DP_PEER_AST_FLOWQ_UDP;
  966. else if (mask & DP_PEER_AST1_FLOW_MASK)
  967. return DP_PEER_AST_FLOWQ_NON_UDP;
  968. else if (mask & DP_PEER_AST2_FLOW_MASK)
  969. return DP_PEER_AST_FLOWQ_HI_PRIO;
  970. else if (mask & DP_PEER_AST3_FLOW_MASK)
  971. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  972. return DP_PEER_AST_FLOWQ_MAX;
  973. }
  974. /**
  975. * dp_peer_get_ast_valid() - get ast index valid from mask
  976. * @mask - mask for ast valid bits
  977. * @index - index for an ast
  978. *
  979. * Return - 1 if ast index is valid from mask else 0
  980. */
  981. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  982. {
  983. if (index == 0)
  984. return 1;
  985. return ((mask) & (1 << ((index) - 1)));
  986. }
  987. /**
  988. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  989. * @soc - genereic soc handle
  990. * @is_wds - flag to indicate if peer is wds
  991. * @peer_id - peer_id from htt peer map message
  992. * @peer_mac_addr - mac address of the peer
  993. * @ast_info - ast flow override information from peer map
  994. *
  995. * Return: none
  996. */
  997. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  998. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  999. struct dp_ast_flow_override_info *ast_info)
  1000. {
  1001. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  1002. struct dp_peer *peer = NULL;
  1003. uint8_t i;
  1004. /*
  1005. * Ast flow override feature is supported
  1006. * only for connected client
  1007. */
  1008. if (is_wds)
  1009. return;
  1010. peer = dp_peer_get_ref_by_id(soc, peer_id, DP_MOD_ID_AST);
  1011. if (!peer) {
  1012. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  1013. "%s: Invalid peer\n", __func__);
  1014. return;
  1015. }
  1016. /* Valid only in AP mode */
  1017. if (peer->vdev->opmode != wlan_op_mode_ap) {
  1018. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1019. "%s: Peer ast flow map not in STA mode\n", __func__);
  1020. goto end;
  1021. }
  1022. /* Making sure the peer is for this mac address */
  1023. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  1024. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  1025. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  1026. "%s: Peer mac address mismatch\n", __func__);
  1027. goto end;
  1028. }
  1029. /* Ast entry flow mapping not valid for self peer map */
  1030. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  1031. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  1032. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  1033. "%s: Ast flow mapping not valid for self peer \n", __func__);
  1034. goto end;
  1035. }
  1036. /* Fill up ast index <---> flow id mapping table for this peer */
  1037. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  1038. /* Check if this ast index is valid */
  1039. peer->peer_ast_flowq_idx[i].is_valid =
  1040. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  1041. if (!peer->peer_ast_flowq_idx[i].is_valid)
  1042. continue;
  1043. /* Get the flow queue id which is mapped to this ast index */
  1044. peer->peer_ast_flowq_idx[i].flowQ =
  1045. dp_peer_get_flowid_from_flowmask(peer,
  1046. ast_info->ast_flow_mask[i]);
  1047. /*
  1048. * Update tid valid mask only if flow id HIGH or
  1049. * Low priority
  1050. */
  1051. if (peer->peer_ast_flowq_idx[i].flowQ ==
  1052. DP_PEER_AST_FLOWQ_HI_PRIO) {
  1053. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  1054. ast_info->tid_valid_hi_pri_mask;
  1055. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  1056. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  1057. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  1058. ast_info->tid_valid_low_pri_mask;
  1059. }
  1060. /* Save the ast index for this entry */
  1061. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  1062. }
  1063. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  1064. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  1065. soc->ctrl_psoc, peer->peer_id,
  1066. peer->vdev->vdev_id, peer_mac_addr);
  1067. }
  1068. end:
  1069. /* Release peer reference */
  1070. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  1071. }
  1072. /**
  1073. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  1074. * @soc - soc handle
  1075. * @peer_mac_addr - mac address of the peer
  1076. * @flow_id - flow id to find ast index
  1077. *
  1078. * Return: ast index for a given flow id, -1 for fail cases
  1079. */
  1080. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  1081. uint16_t vdev_id, uint8_t *peer_mac_addr,
  1082. uint8_t flow_id, uint8_t tid)
  1083. {
  1084. struct dp_peer *peer = NULL;
  1085. uint8_t i;
  1086. uint16_t ast_index;
  1087. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  1088. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1089. "Invalid Flow ID %d\n", flow_id);
  1090. return -1;
  1091. }
  1092. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  1093. peer_mac_addr, 0, vdev_id,
  1094. DP_MOD_ID_AST);
  1095. if (!peer) {
  1096. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1097. "%s: Invalid peer\n", __func__);
  1098. return -1;
  1099. }
  1100. /*
  1101. * Loop over the ast entry <----> flow-id mapping to find
  1102. * which ast index entry has this flow queue id enabled.
  1103. */
  1104. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  1105. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  1106. /*
  1107. * Found the matching index for this flow id
  1108. */
  1109. break;
  1110. }
  1111. /*
  1112. * No match found for this flow id
  1113. */
  1114. if (i == DP_PEER_AST_FLOWQ_MAX) {
  1115. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1116. "%s: ast index not found for flow %d\n", __func__, flow_id);
  1117. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  1118. return -1;
  1119. }
  1120. /* Check whether this ast entry is valid */
  1121. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  1122. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1123. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  1124. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  1125. return -1;
  1126. }
  1127. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  1128. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  1129. /*
  1130. * check if this tid is valid for Hi
  1131. * and Low priority flow id
  1132. */
  1133. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  1134. & (1 << tid))) {
  1135. /* Release peer reference */
  1136. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  1137. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  1138. return ast_index;
  1139. } else {
  1140. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1141. "%s: TID %d is not valid for flow %d\n",
  1142. __func__, tid, flow_id);
  1143. /*
  1144. * TID is not valid for this flow
  1145. * Return -1
  1146. */
  1147. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  1148. return -1;
  1149. }
  1150. }
  1151. /*
  1152. * TID valid check not required for
  1153. * UDP/NON UDP flow id
  1154. */
  1155. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  1156. dp_peer_unref_delete(peer, DP_MOD_ID_AST);
  1157. return ast_index;
  1158. }
  1159. #endif
  1160. void dp_hmwds_ast_add_notify(struct dp_peer *peer,
  1161. uint8_t *mac_addr,
  1162. enum cdp_txrx_ast_entry_type type,
  1163. QDF_STATUS err,
  1164. bool is_peer_map)
  1165. {
  1166. struct dp_vdev *dp_vdev = peer->vdev;
  1167. struct dp_pdev *dp_pdev = dp_vdev->pdev;
  1168. struct cdp_peer_hmwds_ast_add_status add_status;
  1169. /* Ignore ast types other than HM */
  1170. if ((type != CDP_TXRX_AST_TYPE_WDS_HM) &&
  1171. (type != CDP_TXRX_AST_TYPE_WDS_HM_SEC))
  1172. return;
  1173. /* existing ast delete in progress, will be attempted
  1174. * to add again after delete is complete. Send status then.
  1175. */
  1176. if (err == QDF_STATUS_E_AGAIN)
  1177. return;
  1178. /* peer map pending, notify actual status
  1179. * when peer map is received.
  1180. */
  1181. if (!is_peer_map && (err == QDF_STATUS_SUCCESS))
  1182. return;
  1183. qdf_mem_zero(&add_status, sizeof(add_status));
  1184. add_status.vdev_id = dp_vdev->vdev_id;
  1185. /* For type CDP_TXRX_AST_TYPE_WDS_HM_SEC dp_peer_add_ast()
  1186. * returns QDF_STATUS_E_FAILURE as it is host only entry.
  1187. * In such cases set err as success. Also err code set to
  1188. * QDF_STATUS_E_ALREADY indicates entry already exist in
  1189. * such cases set err as success too. Any other error code
  1190. * is actual error.
  1191. */
  1192. if (((type == CDP_TXRX_AST_TYPE_WDS_HM_SEC) &&
  1193. (err == QDF_STATUS_E_FAILURE)) ||
  1194. (err == QDF_STATUS_E_ALREADY)) {
  1195. err = QDF_STATUS_SUCCESS;
  1196. }
  1197. add_status.status = err;
  1198. qdf_mem_copy(add_status.peer_mac, peer->mac_addr.raw,
  1199. QDF_MAC_ADDR_SIZE);
  1200. qdf_mem_copy(add_status.ast_mac, mac_addr,
  1201. QDF_MAC_ADDR_SIZE);
  1202. #ifdef WDI_EVENT_ENABLE
  1203. dp_wdi_event_handler(WDI_EVENT_HMWDS_AST_ADD_STATUS, dp_pdev->soc,
  1204. (void *)&add_status, 0,
  1205. WDI_NO_VAL, dp_pdev->pdev_id);
  1206. #endif
  1207. }
  1208. #if defined(QCA_SUPPORT_LATENCY_CAPTURE) || \
  1209. defined(QCA_TX_CAPTURE_SUPPORT) || \
  1210. defined(QCA_MCOPY_SUPPORT)
  1211. #ifdef FEATURE_PERPKT_INFO
  1212. /**
  1213. * dp_get_completion_indication_for_stack() - send completion to stack
  1214. * @soc : dp_soc handle
  1215. * @pdev: dp_pdev handle
  1216. * @peer: dp peer handle
  1217. * @ts: transmit completion status structure
  1218. * @netbuf: Buffer pointer for free
  1219. *
  1220. * This function is used for indication whether buffer needs to be
  1221. * sent to stack for freeing or not
  1222. */
  1223. QDF_STATUS
  1224. dp_get_completion_indication_for_stack(struct dp_soc *soc,
  1225. struct dp_pdev *pdev,
  1226. struct dp_txrx_peer *txrx_peer,
  1227. struct hal_tx_completion_status *ts,
  1228. qdf_nbuf_t netbuf,
  1229. uint64_t time_latency)
  1230. {
  1231. struct tx_capture_hdr *ppdu_hdr;
  1232. uint16_t peer_id = ts->peer_id;
  1233. uint32_t ppdu_id = ts->ppdu_id;
  1234. uint8_t first_msdu = ts->first_msdu;
  1235. uint8_t last_msdu = ts->last_msdu;
  1236. uint32_t txcap_hdr_size = sizeof(struct tx_capture_hdr);
  1237. struct dp_peer *peer;
  1238. if (qdf_unlikely(!dp_monitor_is_enable_tx_sniffer(pdev) &&
  1239. !dp_monitor_is_enable_mcopy_mode(pdev) &&
  1240. !pdev->latency_capture_enable))
  1241. return QDF_STATUS_E_NOSUPPORT;
  1242. if (!txrx_peer) {
  1243. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1244. FL("Peer Invalid"));
  1245. return QDF_STATUS_E_INVAL;
  1246. }
  1247. /* If mcopy is enabled and mcopy_mode is M_COPY deliver 1st MSDU
  1248. * per PPDU. If mcopy_mode is M_COPY_EXTENDED deliver 1st MSDU
  1249. * for each MPDU
  1250. */
  1251. if (dp_monitor_mcopy_check_deliver(pdev,
  1252. peer_id,
  1253. ppdu_id,
  1254. first_msdu) != QDF_STATUS_SUCCESS)
  1255. return QDF_STATUS_E_INVAL;
  1256. if (qdf_unlikely(qdf_nbuf_headroom(netbuf) < txcap_hdr_size)) {
  1257. netbuf = qdf_nbuf_realloc_headroom(netbuf, txcap_hdr_size);
  1258. if (!netbuf) {
  1259. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1260. FL("No headroom"));
  1261. return QDF_STATUS_E_NOMEM;
  1262. }
  1263. }
  1264. if (!qdf_nbuf_push_head(netbuf, txcap_hdr_size)) {
  1265. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  1266. FL("No headroom"));
  1267. return QDF_STATUS_E_NOMEM;
  1268. }
  1269. ppdu_hdr = (struct tx_capture_hdr *)qdf_nbuf_data(netbuf);
  1270. qdf_mem_copy(ppdu_hdr->ta, txrx_peer->vdev->mac_addr.raw,
  1271. QDF_MAC_ADDR_SIZE);
  1272. peer = dp_peer_get_ref_by_id(soc, peer_id, DP_MOD_ID_TX_COMP);
  1273. if (peer) {
  1274. qdf_mem_copy(ppdu_hdr->ra, peer->mac_addr.raw,
  1275. QDF_MAC_ADDR_SIZE);
  1276. dp_peer_unref_delete(peer, DP_MOD_ID_TX_COMP);
  1277. }
  1278. ppdu_hdr->ppdu_id = ppdu_id;
  1279. ppdu_hdr->peer_id = peer_id;
  1280. ppdu_hdr->first_msdu = first_msdu;
  1281. ppdu_hdr->last_msdu = last_msdu;
  1282. if (qdf_unlikely(pdev->latency_capture_enable)) {
  1283. ppdu_hdr->tsf = ts->tsf;
  1284. ppdu_hdr->time_latency = (uint32_t)time_latency;
  1285. }
  1286. return QDF_STATUS_SUCCESS;
  1287. }
  1288. /**
  1289. * dp_send_completion_to_stack() - send completion to stack
  1290. * @soc : dp_soc handle
  1291. * @pdev: dp_pdev handle
  1292. * @peer_id: peer_id of the peer for which completion came
  1293. * @ppdu_id: ppdu_id
  1294. * @netbuf: Buffer pointer for free
  1295. *
  1296. * This function is used to send completion to stack
  1297. * to free buffer
  1298. */
  1299. void dp_send_completion_to_stack(struct dp_soc *soc, struct dp_pdev *pdev,
  1300. uint16_t peer_id, uint32_t ppdu_id,
  1301. qdf_nbuf_t netbuf)
  1302. {
  1303. dp_wdi_event_handler(WDI_EVENT_TX_DATA, soc,
  1304. netbuf, peer_id,
  1305. WDI_NO_VAL, pdev->pdev_id);
  1306. }
  1307. #endif
  1308. #endif