dp_txrx_wds.c 30 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061
  1. /*
  2. * Copyright (c) 2016-2020 The Linux Foundation. All rights reserved.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for
  5. * any purpose with or without fee is hereby granted, provided that the
  6. * above copyright notice and this permission notice appear in all
  7. * copies.
  8. *
  9. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL
  10. * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
  11. * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE
  12. * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
  13. * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
  14. * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
  15. * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  16. * PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "../../../cmn_dev/fw_hdr/fw/htt.h"
  19. #include "dp_peer.h"
  20. #include "hal_rx.h"
  21. #include "hal_api.h"
  22. #include "qdf_nbuf.h"
  23. #include "dp_types.h"
  24. #include "dp_internal.h"
  25. #include "dp_tx.h"
  26. #include "enet.h"
  27. #include "dp_txrx_wds.h"
  28. /* Generic AST entry aging timer value */
  29. #define DP_AST_AGING_TIMER_DEFAULT_MS 5000
  30. #define DP_VLAN_UNTAGGED 0
  31. #define DP_VLAN_TAGGED_MULTICAST 1
  32. #define DP_VLAN_TAGGED_UNICAST 2
  33. #define DP_MAX_VLAN_IDS 4096
  34. #define DP_INVALID_AST_IDX 0xffff
  35. #define DP_INVALID_FLOW_PRIORITY 0xff
  36. #define DP_PEER_AST0_FLOW_MASK 0x4
  37. #define DP_PEER_AST1_FLOW_MASK 0x8
  38. #define DP_PEER_AST2_FLOW_MASK 0x1
  39. #define DP_PEER_AST3_FLOW_MASK 0x2
  40. #define DP_MAX_AST_INDEX_PER_PEER 4
  41. static void dp_ast_aging_timer_fn(void *soc_hdl)
  42. {
  43. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  44. struct dp_pdev *pdev;
  45. struct dp_vdev *vdev;
  46. struct dp_peer *peer;
  47. struct dp_ast_entry *ase, *temp_ase;
  48. int i;
  49. bool check_wds_ase = false;
  50. if (soc->wds_ast_aging_timer_cnt++ >= DP_WDS_AST_AGING_TIMER_CNT) {
  51. soc->wds_ast_aging_timer_cnt = 0;
  52. check_wds_ase = true;
  53. }
  54. /* Peer list access lock */
  55. qdf_spin_lock_bh(&soc->peer_ref_mutex);
  56. /* AST list access lock */
  57. qdf_spin_lock_bh(&soc->ast_lock);
  58. for (i = 0; i < MAX_PDEV_CNT && soc->pdev_list[i]; i++) {
  59. pdev = soc->pdev_list[i];
  60. qdf_spin_lock_bh(&pdev->vdev_list_lock);
  61. DP_PDEV_ITERATE_VDEV_LIST(pdev, vdev) {
  62. DP_VDEV_ITERATE_PEER_LIST(vdev, peer) {
  63. DP_PEER_ITERATE_ASE_LIST(peer, ase, temp_ase) {
  64. /*
  65. * Do not expire static ast entries
  66. * and HM WDS entries
  67. */
  68. if (ase->type !=
  69. CDP_TXRX_AST_TYPE_WDS &&
  70. ase->type !=
  71. CDP_TXRX_AST_TYPE_MEC &&
  72. ase->type !=
  73. CDP_TXRX_AST_TYPE_DA)
  74. continue;
  75. /* Expire MEC entry every n sec.
  76. * This needs to be expired in
  77. * case if STA backbone is made as
  78. * AP backbone, In this case it needs
  79. * to be re-added as a WDS entry.
  80. */
  81. if (ase->is_active && ase->type ==
  82. CDP_TXRX_AST_TYPE_MEC) {
  83. ase->is_active = FALSE;
  84. continue;
  85. } else if (ase->is_active &&
  86. check_wds_ase) {
  87. ase->is_active = FALSE;
  88. continue;
  89. }
  90. if (ase->type ==
  91. CDP_TXRX_AST_TYPE_MEC) {
  92. DP_STATS_INC(soc,
  93. ast.aged_out, 1);
  94. dp_peer_del_ast(soc, ase);
  95. } else if (check_wds_ase) {
  96. DP_STATS_INC(soc,
  97. ast.aged_out, 1);
  98. dp_peer_del_ast(soc, ase);
  99. }
  100. }
  101. }
  102. }
  103. qdf_spin_unlock_bh(&pdev->vdev_list_lock);
  104. }
  105. qdf_spin_unlock_bh(&soc->ast_lock);
  106. qdf_spin_unlock_bh(&soc->peer_ref_mutex);
  107. if (qdf_atomic_read(&soc->cmn_init_done))
  108. qdf_timer_mod(&soc->ast_aging_timer,
  109. DP_AST_AGING_TIMER_DEFAULT_MS);
  110. }
  111. /*
  112. * dp_soc_wds_attach() - Setup WDS timer and AST table
  113. * @soc: Datapath SOC handle
  114. *
  115. * Return: None
  116. */
  117. void dp_soc_wds_attach(struct dp_soc *soc)
  118. {
  119. soc->wds_ast_aging_timer_cnt = 0;
  120. qdf_timer_init(soc->osdev, &soc->ast_aging_timer,
  121. dp_ast_aging_timer_fn, (void *)soc,
  122. QDF_TIMER_TYPE_WAKE_APPS);
  123. qdf_timer_mod(&soc->ast_aging_timer, DP_AST_AGING_TIMER_DEFAULT_MS);
  124. }
  125. /*
  126. * dp_soc_wds_detach() - Detach WDS data structures and timers
  127. * @txrx_soc: DP SOC handle
  128. *
  129. * Return: None
  130. */
  131. void dp_soc_wds_detach(struct dp_soc *soc)
  132. {
  133. qdf_timer_stop(&soc->ast_aging_timer);
  134. qdf_timer_free(&soc->ast_aging_timer);
  135. }
  136. /**
  137. * dp_rx_da_learn() - Add AST entry based on DA lookup
  138. * This is a WAR for HK 1.0 and will
  139. * be removed in HK 2.0
  140. *
  141. * @soc: core txrx main context
  142. * @rx_tlv_hdr : start address of rx tlvs
  143. * @ta_peer : Transmitter peer entry
  144. * @nbuf : nbuf to retrieve destination mac for which AST will be added
  145. *
  146. */
  147. void
  148. dp_rx_da_learn(struct dp_soc *soc,
  149. uint8_t *rx_tlv_hdr,
  150. struct dp_peer *ta_peer,
  151. qdf_nbuf_t nbuf)
  152. {
  153. /* For HKv2 DA port learing is not needed */
  154. if (qdf_likely(soc->ast_override_support))
  155. return;
  156. if (qdf_unlikely(!ta_peer))
  157. return;
  158. if (qdf_unlikely(ta_peer->vdev->opmode != wlan_op_mode_ap))
  159. return;
  160. if (!soc->da_war_enabled)
  161. return;
  162. if (qdf_unlikely(!qdf_nbuf_is_da_valid(nbuf) &&
  163. !qdf_nbuf_is_da_mcbc(nbuf))) {
  164. dp_peer_add_ast(soc,
  165. ta_peer,
  166. qdf_nbuf_data(nbuf),
  167. CDP_TXRX_AST_TYPE_DA,
  168. IEEE80211_NODE_F_WDS_HM);
  169. }
  170. }
  171. /**
  172. * dp_tx_mec_handler() - Tx MEC Notify Handler
  173. * @vdev: pointer to dp dev handler
  174. * @status : Tx completion status from HTT descriptor
  175. *
  176. * Handles MEC notify event sent from fw to Host
  177. *
  178. * Return: none
  179. */
  180. void dp_tx_mec_handler(struct dp_vdev *vdev, uint8_t *status)
  181. {
  182. struct dp_soc *soc;
  183. uint32_t flags = IEEE80211_NODE_F_WDS_HM;
  184. struct dp_peer *peer;
  185. uint8_t mac_addr[QDF_MAC_ADDR_SIZE], i;
  186. if (!vdev->mec_enabled)
  187. return;
  188. /* MEC required only in STA mode */
  189. if (vdev->opmode != wlan_op_mode_sta)
  190. return;
  191. soc = vdev->pdev->soc;
  192. peer = vdev->vap_bss_peer;
  193. if (!peer) {
  194. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  195. FL("peer is NULL"));
  196. return;
  197. }
  198. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_DEBUG,
  199. "%s Tx MEC Handler",
  200. __func__);
  201. for (i = 0; i < QDF_MAC_ADDR_SIZE; i++)
  202. mac_addr[(QDF_MAC_ADDR_SIZE - 1) - i] =
  203. status[(QDF_MAC_ADDR_SIZE - 2) + i];
  204. if (qdf_mem_cmp(mac_addr, vdev->mac_addr.raw, QDF_MAC_ADDR_SIZE))
  205. dp_peer_add_ast(soc,
  206. peer,
  207. mac_addr,
  208. CDP_TXRX_AST_TYPE_MEC,
  209. flags);
  210. }
  211. /**
  212. * dp_txrx_set_wds_rx_policy() - API to store datapath
  213. * config parameters
  214. * @soc - datapath soc handle
  215. * @vdev_id - id of datapath vdev handle
  216. * @cfg: ini parameter handle
  217. *
  218. * Return: status
  219. */
  220. #ifdef WDS_VENDOR_EXTENSION
  221. void
  222. dp_txrx_set_wds_rx_policy(struct cdp_soc_t *soc, uint8_t vdev_id, u_int32_t val)
  223. {
  224. struct dp_peer *peer;
  225. struct dp_vdev *vdev =
  226. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  227. vdev_id);
  228. if (!vdev) {
  229. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  230. FL("vdev is NULL for vdev_id %d"), vdev_id);
  231. return;
  232. }
  233. if (vdev->opmode == wlan_op_mode_ap) {
  234. /* for ap, set it on bss_peer */
  235. TAILQ_FOREACH(peer, &vdev->peer_list, peer_list_elem) {
  236. if (peer->bss_peer) {
  237. peer->wds_ecm.wds_rx_filter = 1;
  238. peer->wds_ecm.wds_rx_ucast_4addr =
  239. (val & WDS_POLICY_RX_UCAST_4ADDR) ?
  240. 1 : 0;
  241. peer->wds_ecm.wds_rx_mcast_4addr =
  242. (val & WDS_POLICY_RX_MCAST_4ADDR) ?
  243. 1 : 0;
  244. break;
  245. }
  246. }
  247. } else if (vdev->opmode == wlan_op_mode_sta) {
  248. peer = TAILQ_FIRST(&vdev->peer_list);
  249. peer->wds_ecm.wds_rx_filter = 1;
  250. peer->wds_ecm.wds_rx_ucast_4addr =
  251. (val & WDS_POLICY_RX_UCAST_4ADDR) ? 1 : 0;
  252. peer->wds_ecm.wds_rx_mcast_4addr =
  253. (val & WDS_POLICY_RX_MCAST_4ADDR) ? 1 : 0;
  254. }
  255. }
  256. /**
  257. * dp_txrx_peer_wds_tx_policy_update() - API to set tx wds policy
  258. *
  259. * @cdp_soc: DP soc handle
  260. * @vdev_id: id of vdev handle
  261. * @peer_mac: peer mac address
  262. * @wds_tx_ucast: policy for unicast transmission
  263. * @wds_tx_mcast: policy for multicast transmission
  264. *
  265. * Return: void
  266. */
  267. void
  268. dp_txrx_peer_wds_tx_policy_update(struct cdp_soc_t *soc, uint8_t vdev_id,
  269. uint8_t *peer_mac, int wds_tx_ucast,
  270. int wds_tx_mcast)
  271. {
  272. struct dp_peer *peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  273. peer_mac, 0,
  274. vdev_id);
  275. if (!peer) {
  276. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  277. FL("peer is NULL for mac %pM vdev_id %d"),
  278. peer_mac, vdev_id);
  279. return;
  280. }
  281. if (wds_tx_ucast || wds_tx_mcast) {
  282. peer->wds_enabled = 1;
  283. peer->wds_ecm.wds_tx_ucast_4addr = wds_tx_ucast;
  284. peer->wds_ecm.wds_tx_mcast_4addr = wds_tx_mcast;
  285. } else {
  286. peer->wds_enabled = 0;
  287. peer->wds_ecm.wds_tx_ucast_4addr = 0;
  288. peer->wds_ecm.wds_tx_mcast_4addr = 0;
  289. }
  290. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  291. "Policy Update set to :\n");
  292. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  293. "peer->wds_enabled %d\n", peer->wds_enabled);
  294. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  295. "peer->wds_ecm.wds_tx_ucast_4addr %d\n",
  296. peer->wds_ecm.wds_tx_ucast_4addr);
  297. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO,
  298. "peer->wds_ecm.wds_tx_mcast_4addr %d\n",
  299. peer->wds_ecm.wds_tx_mcast_4addr);
  300. dp_peer_unref_delete(peer);
  301. }
  302. int dp_wds_rx_policy_check(uint8_t *rx_tlv_hdr,
  303. struct dp_vdev *vdev,
  304. struct dp_peer *peer)
  305. {
  306. struct dp_peer *bss_peer;
  307. int fr_ds, to_ds, rx_3addr, rx_4addr;
  308. int rx_policy_ucast, rx_policy_mcast;
  309. int rx_mcast = hal_rx_msdu_end_da_is_mcbc_get(rx_tlv_hdr);
  310. if (vdev->opmode == wlan_op_mode_ap) {
  311. TAILQ_FOREACH(bss_peer, &vdev->peer_list, peer_list_elem) {
  312. if (bss_peer->bss_peer) {
  313. /* if wds policy check is not enabled on this vdev, accept all frames */
  314. if (!bss_peer->wds_ecm.wds_rx_filter) {
  315. return 1;
  316. }
  317. break;
  318. }
  319. }
  320. rx_policy_ucast = bss_peer->wds_ecm.wds_rx_ucast_4addr;
  321. rx_policy_mcast = bss_peer->wds_ecm.wds_rx_mcast_4addr;
  322. } else { /* sta mode */
  323. if (!peer->wds_ecm.wds_rx_filter) {
  324. return 1;
  325. }
  326. rx_policy_ucast = peer->wds_ecm.wds_rx_ucast_4addr;
  327. rx_policy_mcast = peer->wds_ecm.wds_rx_mcast_4addr;
  328. }
  329. /* ------------------------------------------------
  330. * self
  331. * peer- rx rx-
  332. * wds ucast mcast dir policy accept note
  333. * ------------------------------------------------
  334. * 1 1 0 11 x1 1 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint met; so, accept
  335. * 1 1 0 01 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  336. * 1 1 0 10 x1 0 AP configured to accept ds-to-ds Rx ucast from wds peers, constraint not met; so, drop
  337. * 1 1 0 00 x1 0 bad frame, won't see it
  338. * 1 0 1 11 1x 1 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint met; so, accept
  339. * 1 0 1 01 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  340. * 1 0 1 10 1x 0 AP configured to accept ds-to-ds Rx mcast from wds peers, constraint not met; so, drop
  341. * 1 0 1 00 1x 0 bad frame, won't see it
  342. * 1 1 0 11 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  343. * 1 1 0 01 x0 0 AP configured to accept from-ds Rx ucast from wds peers, constraint not met; so, drop
  344. * 1 1 0 10 x0 1 AP configured to accept from-ds Rx ucast from wds peers, constraint met; so, accept
  345. * 1 1 0 00 x0 0 bad frame, won't see it
  346. * 1 0 1 11 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  347. * 1 0 1 01 0x 0 AP configured to accept from-ds Rx mcast from wds peers, constraint not met; so, drop
  348. * 1 0 1 10 0x 1 AP configured to accept from-ds Rx mcast from wds peers, constraint met; so, accept
  349. * 1 0 1 00 0x 0 bad frame, won't see it
  350. *
  351. * 0 x x 11 xx 0 we only accept td-ds Rx frames from non-wds peers in mode.
  352. * 0 x x 01 xx 1
  353. * 0 x x 10 xx 0
  354. * 0 x x 00 xx 0 bad frame, won't see it
  355. * ------------------------------------------------
  356. */
  357. fr_ds = hal_rx_mpdu_get_fr_ds(rx_tlv_hdr);
  358. to_ds = hal_rx_mpdu_get_to_ds(rx_tlv_hdr);
  359. rx_3addr = fr_ds ^ to_ds;
  360. rx_4addr = fr_ds & to_ds;
  361. if (vdev->opmode == wlan_op_mode_ap) {
  362. if ((!peer->wds_enabled && rx_3addr && to_ds) ||
  363. (peer->wds_enabled && !rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  364. (peer->wds_enabled && rx_mcast && (rx_4addr == rx_policy_mcast))) {
  365. return 1;
  366. }
  367. } else { /* sta mode */
  368. if ((!rx_mcast && (rx_4addr == rx_policy_ucast)) ||
  369. (rx_mcast && (rx_4addr == rx_policy_mcast))) {
  370. return 1;
  371. }
  372. }
  373. return 0;
  374. }
  375. #endif
  376. /**
  377. * dp_tx_add_groupkey_metadata - Add group key in metadata
  378. * @vdev: DP vdev handle
  379. * @msdu_info: MSDU info to be setup in MSDU descriptor
  380. * @group_key: Group key index programmed in metadata
  381. *
  382. * Return: void
  383. */
  384. #ifdef QCA_MULTIPASS_SUPPORT
  385. static
  386. void dp_tx_add_groupkey_metadata(struct dp_vdev *vdev,
  387. struct dp_tx_msdu_info_s *msdu_info, uint16_t group_key)
  388. {
  389. struct htt_tx_msdu_desc_ext2_t *meta_data =
  390. (struct htt_tx_msdu_desc_ext2_t *)&msdu_info->meta_data[0];
  391. qdf_mem_zero(meta_data, sizeof(struct htt_tx_msdu_desc_ext2_t));
  392. /*
  393. * When attempting to send a multicast packet with multi-passphrase,
  394. * host shall add HTT EXT meta data "struct htt_tx_msdu_desc_ext2_t"
  395. * ref htt.h indicating the group_id field in "key_flags" also having
  396. * "valid_key_flags" as 1. Assign “key_flags = group_key_ix”.
  397. */
  398. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info->meta_data[0], 1);
  399. HTT_TX_MSDU_EXT2_DESC_KEY_FLAGS_SET(msdu_info->meta_data[2], group_key);
  400. }
  401. /**
  402. * dp_tx_remove_vlan_tag - Remove 4 bytes of vlan tag
  403. * @vdev: DP vdev handle
  404. * @tx_desc: Tx Descriptor Handle
  405. *
  406. * Return: void
  407. */
  408. static
  409. void dp_tx_remove_vlan_tag(struct dp_vdev *vdev, qdf_nbuf_t nbuf)
  410. {
  411. struct vlan_ethhdr veth_hdr;
  412. struct vlan_ethhdr *veh = (struct vlan_ethhdr *)nbuf->data;
  413. /*
  414. * Extract VLAN header of 4 bytes:
  415. * Frame Format : {dst_addr[6], src_addr[6], 802.1Q header[4], EtherType[2], Payload}
  416. * Before Removal : xx xx xx xx xx xx xx xx xx xx xx xx 81 00 00 02 08 00 45 00 00...
  417. * After Removal : xx xx xx xx xx xx xx xx xx xx xx xx 08 00 45 00 00...
  418. */
  419. qdf_mem_copy(&veth_hdr, veh, sizeof(veth_hdr));
  420. qdf_nbuf_pull_head(nbuf, ETHERTYPE_VLAN_LEN);
  421. veh = (struct vlan_ethhdr *)nbuf->data;
  422. qdf_mem_copy(veh, &veth_hdr, 2 * QDF_MAC_ADDR_SIZE);
  423. return;
  424. }
  425. /**
  426. * dp_tx_need_multipass_process - If frame needs multipass phrase processing
  427. * @vdev: DP vdev handle
  428. * @tx_desc: Tx Descriptor Handle
  429. * @vlan_id: vlan id of frame
  430. *
  431. * Return: whether peer is special or classic
  432. */
  433. static
  434. uint8_t dp_tx_need_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  435. qdf_nbuf_t buf, uint16_t *vlan_id)
  436. {
  437. struct dp_peer *peer = NULL;
  438. qdf_ether_header_t *eh = (qdf_ether_header_t *)qdf_nbuf_data(buf);
  439. struct vlan_ethhdr *veh = NULL;
  440. bool not_vlan = ((vdev->tx_encap_type == htt_cmn_pkt_type_raw) ||
  441. (htons(eh->ether_type) != ETH_P_8021Q));
  442. if (qdf_unlikely(not_vlan))
  443. return DP_VLAN_UNTAGGED;
  444. veh = (struct vlan_ethhdr *)eh;
  445. *vlan_id = (ntohs(veh->h_vlan_TCI) & VLAN_VID_MASK);
  446. if (qdf_unlikely(DP_FRAME_IS_MULTICAST((eh)->ether_dhost))) {
  447. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  448. TAILQ_FOREACH(peer, &vdev->mpass_peer_list,
  449. mpass_peer_list_elem) {
  450. if (*vlan_id == peer->vlan_id) {
  451. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  452. return DP_VLAN_TAGGED_MULTICAST;
  453. }
  454. }
  455. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  456. return DP_VLAN_UNTAGGED;
  457. }
  458. peer = dp_peer_find_hash_find(soc, eh->ether_dhost, 0, DP_VDEV_ALL);
  459. if (qdf_unlikely(peer == NULL))
  460. return DP_VLAN_UNTAGGED;
  461. /*
  462. * Do not drop the frame when vlan_id doesn't match.
  463. * Send the frame as it is.
  464. */
  465. if (*vlan_id == peer->vlan_id) {
  466. dp_peer_unref_delete(peer);
  467. return DP_VLAN_TAGGED_UNICAST;
  468. }
  469. dp_peer_unref_delete(peer);
  470. return DP_VLAN_UNTAGGED;
  471. }
  472. /**
  473. * dp_tx_multipass_process - Process vlan frames in tx path
  474. * @soc: dp soc handle
  475. * @vdev: DP vdev handle
  476. * @nbuf: skb
  477. * @msdu_info: msdu descriptor
  478. *
  479. * Return: status whether frame needs to be dropped or transmitted
  480. */
  481. bool dp_tx_multipass_process(struct dp_soc *soc, struct dp_vdev *vdev,
  482. qdf_nbuf_t nbuf,
  483. struct dp_tx_msdu_info_s *msdu_info)
  484. {
  485. uint16_t vlan_id = 0;
  486. uint16_t group_key = 0;
  487. uint8_t is_spcl_peer = DP_VLAN_UNTAGGED;
  488. qdf_nbuf_t nbuf_copy = NULL;
  489. if (HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_GET(msdu_info->meta_data[0])) {
  490. return true;
  491. }
  492. is_spcl_peer = dp_tx_need_multipass_process(soc, vdev, nbuf, &vlan_id);
  493. if ((is_spcl_peer != DP_VLAN_TAGGED_MULTICAST) &&
  494. (is_spcl_peer != DP_VLAN_TAGGED_UNICAST))
  495. return true;
  496. if (is_spcl_peer == DP_VLAN_TAGGED_UNICAST) {
  497. dp_tx_remove_vlan_tag(vdev, nbuf);
  498. return true;
  499. }
  500. /* AP can have classic clients, special clients &
  501. * classic repeaters.
  502. * 1. Classic clients & special client:
  503. * Remove vlan header, find corresponding group key
  504. * index, fill in metaheader and enqueue multicast
  505. * frame to TCL.
  506. * 2. Classic repeater:
  507. * Pass through to classic repeater with vlan tag
  508. * intact without any group key index. Hardware
  509. * will know which key to use to send frame to
  510. * repeater.
  511. */
  512. nbuf_copy = qdf_nbuf_copy(nbuf);
  513. /*
  514. * Send multicast frame to special peers even
  515. * if pass through to classic repeater fails.
  516. */
  517. if (nbuf_copy) {
  518. struct dp_tx_msdu_info_s msdu_info_copy;
  519. qdf_mem_zero(&msdu_info_copy, sizeof(msdu_info_copy));
  520. msdu_info_copy.tid = HTT_TX_EXT_TID_INVALID;
  521. HTT_TX_MSDU_EXT2_DESC_FLAG_VALID_KEY_FLAGS_SET(msdu_info_copy.meta_data[0], 1);
  522. nbuf_copy = dp_tx_send_msdu_single(vdev, nbuf_copy, &msdu_info_copy, HTT_INVALID_PEER, NULL);
  523. if (nbuf_copy) {
  524. qdf_nbuf_free(nbuf_copy);
  525. qdf_err("nbuf_copy send failed");
  526. }
  527. }
  528. group_key = vdev->iv_vlan_map[vlan_id];
  529. /*
  530. * If group key is not installed, drop the frame.
  531. */
  532. if (!group_key)
  533. return false;
  534. dp_tx_remove_vlan_tag(vdev, nbuf);
  535. dp_tx_add_groupkey_metadata(vdev, msdu_info, group_key);
  536. msdu_info->exception_fw = 1;
  537. return true;
  538. }
  539. /**
  540. * dp_rx_multipass_process - insert vlan tag on frames for traffic separation
  541. * @vdev: DP vdev handle
  542. * @nbuf: skb
  543. * @tid: traffic priority
  544. *
  545. * Return: bool: true in case of success else false
  546. * Success is considered if:
  547. * i. If frame has vlan header
  548. * ii. If the frame comes from different peer and dont need multipass processing
  549. * Failure is considered if:
  550. * i. Frame comes from multipass peer but doesn't contain vlan header.
  551. * In failure case, drop such frames.
  552. */
  553. bool dp_rx_multipass_process(struct dp_peer *peer, qdf_nbuf_t nbuf, uint8_t tid)
  554. {
  555. struct vlan_ethhdr *vethhdrp;
  556. if (qdf_unlikely(!peer->vlan_id))
  557. return true;
  558. vethhdrp = (struct vlan_ethhdr *)qdf_nbuf_data(nbuf);
  559. /*
  560. * h_vlan_proto & h_vlan_TCI should be 0x8100 & zero respectively
  561. * as it is expected to be padded by 0
  562. * return false if frame doesn't have above tag so that caller will
  563. * drop the frame.
  564. */
  565. if (qdf_unlikely(vethhdrp->h_vlan_proto != htons(QDF_ETH_TYPE_8021Q)) ||
  566. qdf_unlikely(vethhdrp->h_vlan_TCI != 0))
  567. return false;
  568. vethhdrp->h_vlan_TCI = htons(((tid & 0x7) << VLAN_PRIO_SHIFT) |
  569. (peer->vlan_id & VLAN_VID_MASK));
  570. return true;
  571. }
  572. /**
  573. * dp_peer_multipass_list_remove: remove peer from list
  574. * @peer: pointer to peer
  575. *
  576. * return: void
  577. */
  578. void dp_peer_multipass_list_remove(struct dp_peer *peer)
  579. {
  580. struct dp_vdev *vdev = peer->vdev;
  581. struct dp_peer *tpeer = NULL;
  582. bool found = 0;
  583. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  584. TAILQ_FOREACH(tpeer, &vdev->mpass_peer_list, mpass_peer_list_elem) {
  585. if (tpeer == peer) {
  586. found = 1;
  587. TAILQ_REMOVE(&vdev->mpass_peer_list, peer, mpass_peer_list_elem);
  588. break;
  589. }
  590. }
  591. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  592. if (found)
  593. dp_peer_unref_delete(peer);
  594. }
  595. /**
  596. * dp_peer_multipass_list_add: add to new multipass list
  597. * @dp_soc: soc handle
  598. * @peer: peer handle
  599. *
  600. * return: void
  601. */
  602. static void dp_peer_multipass_list_add(struct dp_soc *soc, struct dp_peer *peer)
  603. {
  604. /*
  605. * Ref_cnt is incremented inside dp_peer_find_hash_find().
  606. * Decrement it when element is deleted from the list.
  607. */
  608. qdf_spin_lock_bh(&peer->vdev->mpass_peer_mutex);
  609. TAILQ_INSERT_HEAD(&peer->vdev->mpass_peer_list, peer,
  610. mpass_peer_list_elem);
  611. qdf_spin_unlock_bh(&peer->vdev->mpass_peer_mutex);
  612. }
  613. /**
  614. * dp_peer_set_vlan_id: set vlan_id for this peer
  615. * @cdp_soc: soc handle
  616. * @peer_mac: mac address
  617. * @vlan_id: vlan id for peer
  618. *
  619. * return: void
  620. */
  621. void dp_peer_set_vlan_id(struct cdp_soc_t *cdp_soc,
  622. uint8_t vdev_id, uint8_t *peer_mac,
  623. uint16_t vlan_id)
  624. {
  625. struct dp_soc *soc = (struct dp_soc *)cdp_soc;
  626. struct dp_peer *peer = NULL;
  627. struct dp_vdev *vdev =
  628. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  629. vdev_id);
  630. if (!vdev || !vdev->multipass_en)
  631. return;
  632. peer = dp_peer_find_hash_find(soc, peer_mac, 0, vdev->vdev_id);
  633. if (qdf_unlikely(!peer)) {
  634. qdf_err("NULL peer");
  635. return;
  636. }
  637. peer->vlan_id = vlan_id;
  638. dp_peer_multipass_list_add(soc, peer);
  639. /* Ref_cnt is incremented inside dp_peer_find_hash_find().
  640. * Decrement it here.
  641. */
  642. dp_peer_unref_delete(peer);
  643. }
  644. /**
  645. * dp_set_vlan_groupkey: set vlan map for vdev
  646. * @soc: pointer to soc
  647. * @vdev_id : id of vdev
  648. * @vlan_id: vlan_id
  649. * @group_key: group key for vlan
  650. *
  651. * return: set success/failure
  652. */
  653. QDF_STATUS dp_set_vlan_groupkey(struct cdp_soc_t *soc, uint8_t vdev_id,
  654. uint16_t vlan_id, uint16_t group_key)
  655. {
  656. struct dp_vdev *vdev =
  657. dp_get_vdev_from_soc_vdev_id_wifi3((struct dp_soc *)soc,
  658. vdev_id);
  659. if (!vdev || !vdev->multipass_en)
  660. return QDF_STATUS_E_INVAL;
  661. if (!vdev->iv_vlan_map) {
  662. uint16_t vlan_map_size = (sizeof(uint16_t))*DP_MAX_VLAN_IDS;
  663. vdev->iv_vlan_map = (uint16_t *)qdf_mem_malloc(vlan_map_size);
  664. if (!vdev->iv_vlan_map) {
  665. QDF_TRACE_ERROR(QDF_MODULE_ID_DP, "iv_vlan_map");
  666. return QDF_STATUS_E_NOMEM;
  667. }
  668. /*
  669. * 0 is invalid group key.
  670. * Initilalize array with invalid group keys.
  671. */
  672. qdf_mem_zero(vdev->iv_vlan_map, vlan_map_size);
  673. }
  674. if (vlan_id >= DP_MAX_VLAN_IDS)
  675. return QDF_STATUS_E_INVAL;
  676. vdev->iv_vlan_map[vlan_id] = group_key;
  677. return QDF_STATUS_SUCCESS;
  678. }
  679. /**
  680. * dp_tx_vdev_multipass_deinit: set vlan map for vdev
  681. * @vdev_handle: pointer to vdev
  682. *
  683. * return: void
  684. */
  685. void dp_tx_vdev_multipass_deinit(struct dp_vdev *vdev)
  686. {
  687. struct dp_peer *peer = NULL;
  688. qdf_spin_lock_bh(&vdev->mpass_peer_mutex);
  689. TAILQ_FOREACH(peer, &vdev->mpass_peer_list, mpass_peer_list_elem)
  690. qdf_err("Peers present in mpass list : %llx",
  691. peer->mac_addr.raw);
  692. qdf_spin_unlock_bh(&vdev->mpass_peer_mutex);
  693. if (vdev->iv_vlan_map) {
  694. qdf_mem_free(vdev->iv_vlan_map);
  695. vdev->iv_vlan_map = NULL;
  696. }
  697. qdf_spinlock_destroy(&vdev->mpass_peer_mutex);
  698. }
  699. /**
  700. * dp_peer_multipass_list_init: initialize peer mulitpass list
  701. * @vdev_handle: pointer to vdev
  702. *
  703. * return: set success/failure
  704. */
  705. void dp_peer_multipass_list_init(struct dp_vdev *vdev)
  706. {
  707. /*
  708. * vdev->iv_vlan_map is allocated when the first configuration command
  709. * is issued to avoid unnecessary allocation for regular mode VAP.
  710. */
  711. TAILQ_INIT(&vdev->mpass_peer_list);
  712. qdf_spinlock_create(&vdev->mpass_peer_mutex);
  713. }
  714. #endif
  715. #ifdef QCA_PEER_MULTIQ_SUPPORT
  716. /**
  717. * dp_peer_reset_flowq_map() - reset peer flowq map table
  718. * @peer - dp peer handle
  719. *
  720. * Return: none
  721. */
  722. void dp_peer_reset_flowq_map(struct dp_peer *peer)
  723. {
  724. int i = 0;
  725. if (!peer)
  726. return;
  727. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  728. peer->peer_ast_flowq_idx[i].is_valid = false;
  729. peer->peer_ast_flowq_idx[i].valid_tid_mask = false;
  730. peer->peer_ast_flowq_idx[i].ast_idx = DP_INVALID_AST_IDX;
  731. peer->peer_ast_flowq_idx[i].flowQ = DP_INVALID_FLOW_PRIORITY;
  732. }
  733. }
  734. /**
  735. * dp_peer_get_flowid_from_flowmask() - get flow id from flow mask
  736. * @peer - dp peer handle
  737. * @mask - flow mask
  738. *
  739. * Return: flow id
  740. */
  741. static int dp_peer_get_flowid_from_flowmask(struct dp_peer *peer,
  742. uint8_t mask)
  743. {
  744. if (!peer) {
  745. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  746. "%s: Invalid peer\n", __func__);
  747. return -1;
  748. }
  749. if (mask & DP_PEER_AST0_FLOW_MASK)
  750. return DP_PEER_AST_FLOWQ_UDP;
  751. else if (mask & DP_PEER_AST1_FLOW_MASK)
  752. return DP_PEER_AST_FLOWQ_NON_UDP;
  753. else if (mask & DP_PEER_AST2_FLOW_MASK)
  754. return DP_PEER_AST_FLOWQ_HI_PRIO;
  755. else if (mask & DP_PEER_AST3_FLOW_MASK)
  756. return DP_PEER_AST_FLOWQ_LOW_PRIO;
  757. return DP_PEER_AST_FLOWQ_MAX;
  758. }
  759. /**
  760. * dp_peer_get_ast_valid() - get ast index valid from mask
  761. * @mask - mask for ast valid bits
  762. * @index - index for an ast
  763. *
  764. * Return - 1 if ast index is valid from mask else 0
  765. */
  766. static inline bool dp_peer_get_ast_valid(uint8_t mask, uint16_t index)
  767. {
  768. if (index == 0)
  769. return 1;
  770. return ((mask) & (1 << ((index) - 1)));
  771. }
  772. /**
  773. * dp_peer_ast_index_flow_queue_map_create() - create ast index flow queue map
  774. * @soc - genereic soc handle
  775. * @is_wds - flag to indicate if peer is wds
  776. * @peer_id - peer_id from htt peer map message
  777. * @peer_mac_addr - mac address of the peer
  778. * @ast_info - ast flow override information from peer map
  779. *
  780. * Return: none
  781. */
  782. void dp_peer_ast_index_flow_queue_map_create(void *soc_hdl,
  783. bool is_wds, uint16_t peer_id, uint8_t *peer_mac_addr,
  784. struct dp_ast_flow_override_info *ast_info)
  785. {
  786. struct dp_soc *soc = (struct dp_soc *)soc_hdl;
  787. struct dp_peer *peer = NULL;
  788. uint8_t i;
  789. /*
  790. * Ast flow override feature is supported
  791. * only for connected client
  792. */
  793. if (is_wds)
  794. return;
  795. peer = dp_peer_find_by_id(soc, peer_id);
  796. if (!peer) {
  797. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  798. "%s: Invalid peer\n", __func__);
  799. return;
  800. }
  801. /* Valid only in AP mode */
  802. if (peer->vdev->opmode != wlan_op_mode_ap) {
  803. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  804. "%s: Peer ast flow map not in STA mode\n", __func__);
  805. /* Release peer reference */
  806. dp_peer_unref_del_find_by_id(peer);
  807. return;
  808. }
  809. /* Making sure the peer is for this mac address */
  810. if (!qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  811. (struct qdf_mac_addr *)peer->mac_addr.raw)) {
  812. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  813. "%s: Peer mac address mismatch\n", __func__);
  814. dp_peer_unref_del_find_by_id(peer);
  815. return;
  816. }
  817. /* Ast entry flow mapping not valid for self peer map */
  818. if (qdf_is_macaddr_equal((struct qdf_mac_addr *)peer_mac_addr,
  819. (struct qdf_mac_addr *)peer->vdev->mac_addr.raw)) {
  820. QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR,
  821. "%s: Ast flow mapping not valid for self peer \n", __func__);
  822. dp_peer_unref_del_find_by_id(peer);
  823. return;
  824. }
  825. /* Fill up ast index <---> flow id mapping table for this peer */
  826. for (i = 0; i < DP_MAX_AST_INDEX_PER_PEER; i++) {
  827. /* Check if this ast index is valid */
  828. peer->peer_ast_flowq_idx[i].is_valid =
  829. dp_peer_get_ast_valid(ast_info->ast_valid_mask, i);
  830. if (!peer->peer_ast_flowq_idx[i].is_valid)
  831. continue;
  832. /* Get the flow queue id which is mapped to this ast index */
  833. peer->peer_ast_flowq_idx[i].flowQ =
  834. dp_peer_get_flowid_from_flowmask(peer,
  835. ast_info->ast_flow_mask[i]);
  836. /*
  837. * Update tid valid mask only if flow id HIGH or
  838. * Low priority
  839. */
  840. if (peer->peer_ast_flowq_idx[i].flowQ ==
  841. DP_PEER_AST_FLOWQ_HI_PRIO) {
  842. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  843. ast_info->tid_valid_hi_pri_mask;
  844. } else if (peer->peer_ast_flowq_idx[i].flowQ ==
  845. DP_PEER_AST_FLOWQ_LOW_PRIO) {
  846. peer->peer_ast_flowq_idx[i].valid_tid_mask =
  847. ast_info->tid_valid_low_pri_mask;
  848. }
  849. /* Save the ast index for this entry */
  850. peer->peer_ast_flowq_idx[i].ast_idx = ast_info->ast_idx[i];
  851. }
  852. if (soc->cdp_soc.ol_ops->peer_ast_flowid_map) {
  853. soc->cdp_soc.ol_ops->peer_ast_flowid_map(
  854. soc->ctrl_psoc, peer->peer_ids[0],
  855. peer->vdev->vdev_id, peer_mac_addr);
  856. }
  857. /* Release peer reference */
  858. dp_peer_unref_del_find_by_id(peer);
  859. }
  860. /**
  861. * dp_peer_find_ast_index_by_flowq_id() - API to get ast idx for a given flowid
  862. * @soc - soc handle
  863. * @peer_mac_addr - mac address of the peer
  864. * @flow_id - flow id to find ast index
  865. *
  866. * Return: ast index for a given flow id, -1 for fail cases
  867. */
  868. int dp_peer_find_ast_index_by_flowq_id(struct cdp_soc_t *soc,
  869. uint16_t vdev_id, uint8_t *peer_mac_addr,
  870. uint8_t flow_id, uint8_t tid)
  871. {
  872. struct dp_peer *peer = NULL;
  873. uint8_t i;
  874. uint16_t ast_index;
  875. if (flow_id >= DP_PEER_AST_FLOWQ_MAX) {
  876. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  877. "Invalid Flow ID %d\n", flow_id);
  878. return -1;
  879. }
  880. peer = dp_peer_find_hash_find((struct dp_soc *)soc,
  881. peer_mac_addr, 0, vdev_id);
  882. if (!peer) {
  883. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  884. "%s: Invalid peer\n", __func__);
  885. return -1;
  886. }
  887. /*
  888. * Loop over the ast entry <----> flow-id mapping to find
  889. * which ast index entry has this flow queue id enabled.
  890. */
  891. for (i = 0; i < DP_PEER_AST_FLOWQ_MAX; i++) {
  892. if (peer->peer_ast_flowq_idx[i].flowQ == flow_id)
  893. /*
  894. * Found the matching index for this flow id
  895. */
  896. break;
  897. }
  898. /*
  899. * No match found for this flow id
  900. */
  901. if (i == DP_PEER_AST_FLOWQ_MAX) {
  902. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  903. "%s: ast index not found for flow %d\n", __func__, flow_id);
  904. dp_peer_unref_delete(peer);
  905. return -1;
  906. }
  907. /* Check whether this ast entry is valid */
  908. if (!peer->peer_ast_flowq_idx[i].is_valid) {
  909. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  910. "%s: ast index is invalid for flow %d\n", __func__, flow_id);
  911. dp_peer_unref_delete(peer);
  912. return -1;
  913. }
  914. if (flow_id == DP_PEER_AST_FLOWQ_HI_PRIO ||
  915. flow_id == DP_PEER_AST_FLOWQ_LOW_PRIO) {
  916. /*
  917. * check if this tid is valid for Hi
  918. * and Low priority flow id
  919. */
  920. if ((peer->peer_ast_flowq_idx[i].valid_tid_mask
  921. & (1 << tid))) {
  922. /* Release peer reference */
  923. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  924. dp_peer_unref_delete(peer);
  925. return ast_index;
  926. } else {
  927. QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR,
  928. "%s: TID %d is not valid for flow %d\n",
  929. __func__, tid, flow_id);
  930. /*
  931. * TID is not valid for this flow
  932. * Return -1
  933. */
  934. dp_peer_unref_delete(peer);
  935. return -1;
  936. }
  937. }
  938. /*
  939. * TID valid check not required for
  940. * UDP/NON UDP flow id
  941. */
  942. ast_index = peer->peer_ast_flowq_idx[i].ast_idx;
  943. dp_peer_unref_delete(peer);
  944. return ast_index;
  945. }
  946. #endif