Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1 | /* |
Chaithanya Garrepalli | 9cc562c | 2018-11-16 18:30:41 +0530 | [diff] [blame] | 2 | * Copyright (c) 2016-2019 The Linux Foundation. All rights reserved. |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 3 | * |
| 4 | * Permission to use, copy, modify, and/or distribute this software for |
| 5 | * any purpose with or without fee is hereby granted, provided that the |
| 6 | * above copyright notice and this permission notice appear in all |
| 7 | * copies. |
| 8 | * |
| 9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL |
| 10 | * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED |
| 11 | * WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE |
| 12 | * AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL |
| 13 | * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR |
| 14 | * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER |
| 15 | * TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR |
| 16 | * PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ |
| 18 | |
Balamurugan Mahalingam | d015964 | 2018-07-11 15:02:29 +0530 | [diff] [blame] | 19 | #include "hal_hw_headers.h" |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 20 | #include "dp_types.h" |
| 21 | #include "dp_rx.h" |
| 22 | #include "dp_peer.h" |
Karunakar Dasineni | a0f09ea | 2016-11-21 17:41:31 -0800 | [diff] [blame] | 23 | #include "dp_internal.h" |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 24 | #include "hal_api.h" |
| 25 | #include "qdf_trace.h" |
| 26 | #include "qdf_nbuf.h" |
Ravi Joshi | 36f68ad | 2016-11-09 17:09:47 -0800 | [diff] [blame] | 27 | #include "dp_rx_defrag.h" |
Amir Patel | cb99026 | 2019-05-28 15:12:48 +0530 | [diff] [blame] | 28 | #ifdef FEATURE_WDS |
| 29 | #include "dp_txrx_wds.h" |
| 30 | #endif |
Ravi Joshi | 36f68ad | 2016-11-09 17:09:47 -0800 | [diff] [blame] | 31 | #include <enet.h> /* LLC_SNAP_HDR_LEN */ |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 32 | #include "qdf_net_types.h" |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 33 | |
Chaithanya Garrepalli | d3c58a3 | 2019-05-24 19:41:05 +0530 | [diff] [blame] | 34 | /* Max buffer in invalid peer SG list*/ |
| 35 | #define DP_MAX_INVALID_BUFFERS 10 |
| 36 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 37 | /** |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 38 | * dp_rx_mcast_echo_check() - check if the mcast pkt is a loop |
| 39 | * back on same vap or a different vap. |
| 40 | * |
| 41 | * @soc: core DP main context |
| 42 | * @peer: dp peer handler |
| 43 | * @rx_tlv_hdr: start of the rx TLV header |
| 44 | * @nbuf: pkt buffer |
| 45 | * |
| 46 | * Return: bool (true if it is a looped back pkt else false) |
| 47 | * |
| 48 | */ |
| 49 | static inline bool dp_rx_mcast_echo_check(struct dp_soc *soc, |
| 50 | struct dp_peer *peer, |
| 51 | uint8_t *rx_tlv_hdr, |
| 52 | qdf_nbuf_t nbuf) |
| 53 | { |
| 54 | struct dp_vdev *vdev = peer->vdev; |
Amir Patel | cb99026 | 2019-05-28 15:12:48 +0530 | [diff] [blame] | 55 | struct dp_ast_entry *ase = NULL; |
Tallapragada Kalyan | 57b6bb3 | 2018-01-02 12:58:33 +0530 | [diff] [blame] | 56 | uint16_t sa_idx = 0; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 57 | uint8_t *data; |
| 58 | |
| 59 | /* |
| 60 | * Multicast Echo Check is required only if vdev is STA and |
| 61 | * received pkt is a multicast/broadcast pkt. otherwise |
| 62 | * skip the MEC check. |
| 63 | */ |
| 64 | if (vdev->opmode != wlan_op_mode_sta) |
| 65 | return false; |
| 66 | |
Venkata Sharath Chandra Manchala | ee90938 | 2019-09-20 10:52:37 -0700 | [diff] [blame] | 67 | if (!hal_rx_msdu_end_da_is_mcbc_get(soc->hal_soc, rx_tlv_hdr)) |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 68 | return false; |
| 69 | |
| 70 | data = qdf_nbuf_data(nbuf); |
| 71 | /* |
| 72 | * if the received pkts src mac addr matches with vdev |
| 73 | * mac address then drop the pkt as it is looped back |
| 74 | */ |
Srinivas Girigowda | 2751b6d | 2019-02-27 12:28:13 -0800 | [diff] [blame] | 75 | if (!(qdf_mem_cmp(&data[QDF_MAC_ADDR_SIZE], |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 76 | vdev->mac_addr.raw, |
Srinivas Girigowda | 2751b6d | 2019-02-27 12:28:13 -0800 | [diff] [blame] | 77 | QDF_MAC_ADDR_SIZE))) |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 78 | return true; |
| 79 | |
Nandha Kishore Easwaran | 3053dee | 2018-03-12 18:27:10 +0530 | [diff] [blame] | 80 | /* |
| 81 | * In case of qwrap isolation mode, donot drop loopback packets. |
| 82 | * In isolation mode, all packets from the wired stations need to go |
| 83 | * to rootap and loop back to reach the wireless stations and |
| 84 | * vice-versa. |
| 85 | */ |
| 86 | if (qdf_unlikely(vdev->isolation_vdev)) |
| 87 | return false; |
| 88 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 89 | /* if the received pkts src mac addr matches with the |
| 90 | * wired PCs MAC addr which is behind the STA or with |
| 91 | * wireless STAs MAC addr which are behind the Repeater, |
| 92 | * then drop the pkt as it is looped back |
| 93 | */ |
| 94 | qdf_spin_lock_bh(&soc->ast_lock); |
Venkata Sharath Chandra Manchala | 59ebd5e | 2019-09-20 15:52:55 -0700 | [diff] [blame] | 95 | if (hal_rx_msdu_end_sa_is_valid_get(soc->hal_soc, rx_tlv_hdr)) { |
Venkata Sharath Chandra Manchala | 5bf1e5a | 2019-09-20 16:18:42 -0700 | [diff] [blame] | 96 | sa_idx = hal_rx_msdu_end_sa_idx_get(soc->hal_soc, rx_tlv_hdr); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 97 | |
Tallapragada Kalyan | 57b6bb3 | 2018-01-02 12:58:33 +0530 | [diff] [blame] | 98 | if ((sa_idx < 0) || |
Tallapragada Kalyan | a702362 | 2018-12-03 19:29:52 +0530 | [diff] [blame] | 99 | (sa_idx >= wlan_cfg_get_max_ast_idx(soc->wlan_cfg_ctx))) { |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 100 | qdf_spin_unlock_bh(&soc->ast_lock); |
| 101 | QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR, |
| 102 | "invalid sa_idx: %d", sa_idx); |
| 103 | qdf_assert_always(0); |
| 104 | } |
| 105 | |
| 106 | ase = soc->ast_table[sa_idx]; |
Tallapragada Kalyan | 57b6bb3 | 2018-01-02 12:58:33 +0530 | [diff] [blame] | 107 | if (!ase) { |
| 108 | /* We do not get a peer map event for STA and without |
| 109 | * this event we don't know what is STA's sa_idx. |
| 110 | * For this reason the AST is still not associated to |
| 111 | * any index postion in ast_table. |
| 112 | * In these kind of scenarios where sa is valid but |
| 113 | * ast is not in ast_table, we use the below API to get |
| 114 | * AST entry for STA's own mac_address. |
| 115 | */ |
Chaithanya Garrepalli | 7c8cf12 | 2018-09-07 19:23:52 +0530 | [diff] [blame] | 116 | ase = dp_peer_ast_list_find(soc, peer, |
Srinivas Girigowda | 2751b6d | 2019-02-27 12:28:13 -0800 | [diff] [blame] | 117 | &data[QDF_MAC_ADDR_SIZE]); |
Chaithanya Garrepalli | 7c8cf12 | 2018-09-07 19:23:52 +0530 | [diff] [blame] | 118 | if (ase) { |
| 119 | ase->ast_idx = sa_idx; |
| 120 | soc->ast_table[sa_idx] = ase; |
Chaithanya Garrepalli | e10f87b | 2018-10-18 00:14:11 +0530 | [diff] [blame] | 121 | ase->is_mapped = TRUE; |
Chaithanya Garrepalli | 7c8cf12 | 2018-09-07 19:23:52 +0530 | [diff] [blame] | 122 | } |
Tallapragada Kalyan | 57b6bb3 | 2018-01-02 12:58:33 +0530 | [diff] [blame] | 123 | } |
Amir Patel | cb99026 | 2019-05-28 15:12:48 +0530 | [diff] [blame] | 124 | } else { |
Chaithanya Garrepalli | 9cc562c | 2018-11-16 18:30:41 +0530 | [diff] [blame] | 125 | ase = dp_peer_ast_hash_find_by_pdevid(soc, |
Srinivas Girigowda | 2751b6d | 2019-02-27 12:28:13 -0800 | [diff] [blame] | 126 | &data[QDF_MAC_ADDR_SIZE], |
Chaithanya Garrepalli | 9cc562c | 2018-11-16 18:30:41 +0530 | [diff] [blame] | 127 | vdev->pdev->pdev_id); |
Amir Patel | cb99026 | 2019-05-28 15:12:48 +0530 | [diff] [blame] | 128 | } |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 129 | |
| 130 | if (ase) { |
Tallapragada Kalyan | 57b6bb3 | 2018-01-02 12:58:33 +0530 | [diff] [blame] | 131 | |
| 132 | if (ase->pdev_id != vdev->pdev->pdev_id) { |
| 133 | qdf_spin_unlock_bh(&soc->ast_lock); |
| 134 | QDF_TRACE(QDF_MODULE_ID_DP, |
| 135 | QDF_TRACE_LEVEL_INFO, |
Pamidipati, Vijay | d3478ef | 2018-02-06 23:52:29 +0530 | [diff] [blame] | 136 | "Detected DBDC Root AP %pM, %d %d", |
Srinivas Girigowda | 2751b6d | 2019-02-27 12:28:13 -0800 | [diff] [blame] | 137 | &data[QDF_MAC_ADDR_SIZE], vdev->pdev->pdev_id, |
Pamidipati, Vijay | d3478ef | 2018-02-06 23:52:29 +0530 | [diff] [blame] | 138 | ase->pdev_id); |
Tallapragada Kalyan | 57b6bb3 | 2018-01-02 12:58:33 +0530 | [diff] [blame] | 139 | return false; |
| 140 | } |
| 141 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 142 | if ((ase->type == CDP_TXRX_AST_TYPE_MEC) || |
| 143 | (ase->peer != peer)) { |
| 144 | qdf_spin_unlock_bh(&soc->ast_lock); |
| 145 | QDF_TRACE(QDF_MODULE_ID_DP, |
| 146 | QDF_TRACE_LEVEL_INFO, |
| 147 | "received pkt with same src mac %pM", |
Srinivas Girigowda | 2751b6d | 2019-02-27 12:28:13 -0800 | [diff] [blame] | 148 | &data[QDF_MAC_ADDR_SIZE]); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 149 | |
| 150 | return true; |
| 151 | } |
| 152 | } |
| 153 | qdf_spin_unlock_bh(&soc->ast_lock); |
| 154 | return false; |
| 155 | } |
| 156 | |
| 157 | /** |
Aniruddha Paul | 80f52e7 | 2017-10-28 18:16:58 +0530 | [diff] [blame] | 158 | * dp_rx_link_desc_return_by_addr - Return a MPDU link descriptor to |
| 159 | * (WBM) by address |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 160 | * |
| 161 | * @soc: core DP main context |
Aniruddha Paul | 80f52e7 | 2017-10-28 18:16:58 +0530 | [diff] [blame] | 162 | * @link_desc_addr: link descriptor addr |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 163 | * |
| 164 | * Return: QDF_STATUS |
| 165 | */ |
psimha | 223883f | 2017-11-16 17:18:51 -0800 | [diff] [blame] | 166 | QDF_STATUS |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 167 | dp_rx_link_desc_return_by_addr(struct dp_soc *soc, |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 168 | hal_buff_addrinfo_t link_desc_addr, |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 169 | uint8_t bm_action) |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 170 | { |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 171 | struct dp_srng *wbm_desc_rel_ring = &soc->wbm_desc_rel_ring; |
Akshay Kosigi | a870c61 | 2019-07-08 23:10:30 +0530 | [diff] [blame] | 172 | hal_ring_handle_t wbm_rel_srng = wbm_desc_rel_ring->hal_srng; |
| 173 | hal_soc_handle_t hal_soc = soc->hal_soc; |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 174 | QDF_STATUS status = QDF_STATUS_E_FAILURE; |
| 175 | void *src_srng_desc; |
| 176 | |
| 177 | if (!wbm_rel_srng) { |
| 178 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 179 | "WBM RELEASE RING not initialized"); |
| 180 | return status; |
| 181 | } |
| 182 | |
| 183 | if (qdf_unlikely(hal_srng_access_start(hal_soc, wbm_rel_srng))) { |
| 184 | |
| 185 | /* TODO */ |
| 186 | /* |
| 187 | * Need API to convert from hal_ring pointer to |
| 188 | * Ring Type / Ring Id combo |
| 189 | */ |
| 190 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 191 | FL("HAL RING Access For WBM Release SRNG Failed - %pK"), |
| 192 | wbm_rel_srng); |
| 193 | DP_STATS_INC(soc, rx.err.hal_ring_access_fail, 1); |
| 194 | goto done; |
| 195 | } |
| 196 | src_srng_desc = hal_srng_src_get_next(hal_soc, wbm_rel_srng); |
| 197 | if (qdf_likely(src_srng_desc)) { |
| 198 | /* Return link descriptor through WBM ring (SW2WBM)*/ |
| 199 | hal_rx_msdu_link_desc_set(hal_soc, |
Aniruddha Paul | 80f52e7 | 2017-10-28 18:16:58 +0530 | [diff] [blame] | 200 | src_srng_desc, link_desc_addr, bm_action); |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 201 | status = QDF_STATUS_SUCCESS; |
| 202 | } else { |
| 203 | struct hal_srng *srng = (struct hal_srng *)wbm_rel_srng; |
| 204 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 205 | FL("WBM Release Ring (Id %d) Full"), srng->ring_id); |
| 206 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 207 | "HP 0x%x Reap HP 0x%x TP 0x%x Cached TP 0x%x", |
| 208 | *srng->u.src_ring.hp_addr, srng->u.src_ring.reap_hp, |
| 209 | *srng->u.src_ring.tp_addr, srng->u.src_ring.cached_tp); |
| 210 | } |
| 211 | done: |
| 212 | hal_srng_access_end(hal_soc, wbm_rel_srng); |
| 213 | return status; |
Aniruddha Paul | 80f52e7 | 2017-10-28 18:16:58 +0530 | [diff] [blame] | 214 | |
| 215 | } |
| 216 | |
| 217 | /** |
| 218 | * dp_rx_link_desc_return() - Return a MPDU link descriptor to HW |
| 219 | * (WBM), following error handling |
| 220 | * |
| 221 | * @soc: core DP main context |
| 222 | * @ring_desc: opaque pointer to the REO error ring descriptor |
| 223 | * |
| 224 | * Return: QDF_STATUS |
| 225 | */ |
| 226 | QDF_STATUS |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 227 | dp_rx_link_desc_return(struct dp_soc *soc, hal_ring_desc_t ring_desc, |
| 228 | uint8_t bm_action) |
Aniruddha Paul | 80f52e7 | 2017-10-28 18:16:58 +0530 | [diff] [blame] | 229 | { |
Akshay Kosigi | 8eda31c | 2019-07-10 14:42:42 +0530 | [diff] [blame] | 230 | void *buf_addr_info = HAL_RX_REO_BUF_ADDR_INFO_GET(ring_desc); |
| 231 | |
| 232 | return dp_rx_link_desc_return_by_addr(soc, buf_addr_info, bm_action); |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 233 | } |
| 234 | |
| 235 | /** |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 236 | * dp_rx_msdus_drop() - Drops all MSDU's per MPDU |
| 237 | * |
| 238 | * @soc: core txrx main context |
| 239 | * @ring_desc: opaque pointer to the REO error ring descriptor |
| 240 | * @mpdu_desc_info: MPDU descriptor information from ring descriptor |
| 241 | * @head: head of the local descriptor free-list |
| 242 | * @tail: tail of the local descriptor free-list |
| 243 | * @quota: No. of units (packets) that can be serviced in one shot. |
| 244 | * |
| 245 | * This function is used to drop all MSDU in an MPDU |
| 246 | * |
| 247 | * Return: uint32_t: No. of elements processed |
| 248 | */ |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 249 | static uint32_t |
| 250 | dp_rx_msdus_drop(struct dp_soc *soc, hal_ring_desc_t ring_desc, |
| 251 | struct hal_rx_mpdu_desc_info *mpdu_desc_info, |
| 252 | uint8_t *mac_id, |
| 253 | uint32_t quota) |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 254 | { |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 255 | uint32_t rx_bufs_used = 0; |
| 256 | void *link_desc_va; |
| 257 | struct hal_buf_info buf_info; |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 258 | struct dp_pdev *pdev; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 259 | struct hal_rx_msdu_list msdu_list; /* MSDU's per MPDU */ |
| 260 | int i; |
Gurumoorthi Gnanasambandhan | ed4bcf8 | 2017-05-24 00:10:59 +0530 | [diff] [blame] | 261 | uint8_t *rx_tlv_hdr; |
| 262 | uint32_t tid; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 263 | |
| 264 | hal_rx_reo_buf_paddr_get(ring_desc, &buf_info); |
| 265 | |
| 266 | link_desc_va = dp_rx_cookie_2_link_desc_va(soc, &buf_info); |
| 267 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 268 | /* No UNMAP required -- this is "malloc_consistent" memory */ |
Balamurugan Mahalingam | 3715aa4 | 2018-08-22 02:13:14 +0530 | [diff] [blame] | 269 | hal_rx_msdu_list_get(soc->hal_soc, link_desc_va, &msdu_list, |
| 270 | &mpdu_desc_info->msdu_count); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 271 | |
Karunakar Dasineni | 80cded8 | 2017-07-10 10:49:55 -0700 | [diff] [blame] | 272 | for (i = 0; (i < mpdu_desc_info->msdu_count) && quota--; i++) { |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 273 | struct dp_rx_desc *rx_desc = |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 274 | dp_rx_cookie_2_va_rxdma_buf(soc, |
| 275 | msdu_list.sw_cookie[i]); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 276 | |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 277 | qdf_assert_always(rx_desc); |
| 278 | |
| 279 | /* all buffers from a MSDU link link belong to same pdev */ |
| 280 | *mac_id = rx_desc->pool_id; |
| 281 | pdev = soc->pdev_list[rx_desc->pool_id]; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 282 | |
Pamidipati, Vijay | 5379474 | 2017-06-03 11:24:32 +0530 | [diff] [blame] | 283 | if (!dp_rx_desc_check_magic(rx_desc)) { |
| 284 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 285 | FL("Invalid rx_desc cookie=%d"), |
| 286 | msdu_list.sw_cookie[i]); |
| 287 | return rx_bufs_used; |
| 288 | } |
| 289 | |
Pamidipati, Vijay | c736e83 | 2019-03-21 22:24:10 +0530 | [diff] [blame] | 290 | qdf_nbuf_unmap_single(soc->osdev, |
Ankit Kumar | 0ae4abc | 2019-05-02 15:08:42 +0530 | [diff] [blame] | 291 | rx_desc->nbuf, QDF_DMA_FROM_DEVICE); |
Pamidipati, Vijay | c736e83 | 2019-03-21 22:24:10 +0530 | [diff] [blame] | 292 | |
| 293 | rx_desc->rx_buf_start = qdf_nbuf_data(rx_desc->nbuf); |
| 294 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 295 | rx_bufs_used++; |
Balamurugan Mahalingam | d015964 | 2018-07-11 15:02:29 +0530 | [diff] [blame] | 296 | tid = hal_rx_mpdu_start_tid_get(soc->hal_soc, |
| 297 | rx_desc->rx_buf_start); |
Gurumoorthi Gnanasambandhan | ed4bcf8 | 2017-05-24 00:10:59 +0530 | [diff] [blame] | 298 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 299 | "Packet received with PN error for tid :%d", tid); |
| 300 | |
| 301 | rx_tlv_hdr = qdf_nbuf_data(rx_desc->nbuf); |
Venkata Sharath Chandra Manchala | c1a4c8b | 2019-09-20 17:42:07 -0700 | [diff] [blame] | 302 | if (hal_rx_encryption_info_valid(soc->hal_soc, rx_tlv_hdr)) |
Venkata Sharath Chandra Manchala | a2d7497 | 2019-09-20 18:02:57 -0700 | [diff] [blame] | 303 | hal_rx_print_pn(soc->hal_soc, rx_tlv_hdr); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 304 | |
| 305 | /* Just free the buffers */ |
| 306 | qdf_nbuf_free(rx_desc->nbuf); |
| 307 | |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 308 | dp_rx_add_to_free_desc_list(&pdev->free_list_head, |
| 309 | &pdev->free_list_tail, rx_desc); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 310 | } |
| 311 | |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 312 | /* Return link descriptor through WBM ring (SW2WBM)*/ |
| 313 | dp_rx_link_desc_return(soc, ring_desc, HAL_BM_ACTION_PUT_IN_IDLE_LIST); |
| 314 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 315 | return rx_bufs_used; |
| 316 | } |
| 317 | |
| 318 | /** |
| 319 | * dp_rx_pn_error_handle() - Handles PN check errors |
| 320 | * |
| 321 | * @soc: core txrx main context |
| 322 | * @ring_desc: opaque pointer to the REO error ring descriptor |
| 323 | * @mpdu_desc_info: MPDU descriptor information from ring descriptor |
| 324 | * @head: head of the local descriptor free-list |
| 325 | * @tail: tail of the local descriptor free-list |
| 326 | * @quota: No. of units (packets) that can be serviced in one shot. |
| 327 | * |
| 328 | * This function implements PN error handling |
| 329 | * If the peer is configured to ignore the PN check errors |
| 330 | * or if DP feels, that this frame is still OK, the frame can be |
| 331 | * re-injected back to REO to use some of the other features |
| 332 | * of REO e.g. duplicate detection/routing to other cores |
| 333 | * |
| 334 | * Return: uint32_t: No. of elements processed |
| 335 | */ |
Jeff Johnson | 8a4fd9b | 2017-01-05 16:33:40 -0800 | [diff] [blame] | 336 | static uint32_t |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 337 | dp_rx_pn_error_handle(struct dp_soc *soc, hal_ring_desc_t ring_desc, |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 338 | struct hal_rx_mpdu_desc_info *mpdu_desc_info, |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 339 | uint8_t *mac_id, |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 340 | uint32_t quota) |
| 341 | { |
| 342 | uint16_t peer_id; |
| 343 | uint32_t rx_bufs_used = 0; |
| 344 | struct dp_peer *peer; |
| 345 | bool peer_pn_policy = false; |
| 346 | |
| 347 | peer_id = DP_PEER_METADATA_PEER_ID_GET( |
| 348 | mpdu_desc_info->peer_meta_data); |
| 349 | |
Gurumoorthi Gnanasambandhan | ed4bcf8 | 2017-05-24 00:10:59 +0530 | [diff] [blame] | 350 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 351 | peer = dp_peer_find_by_id(soc, peer_id); |
| 352 | |
| 353 | if (qdf_likely(peer)) { |
| 354 | /* |
| 355 | * TODO: Check for peer specific policies & set peer_pn_policy |
| 356 | */ |
Tallapragada Kalyan | bc62989 | 2018-04-04 11:34:55 +0530 | [diff] [blame] | 357 | QDF_TRACE(QDF_MODULE_ID_TXRX, QDF_TRACE_LEVEL_ERROR, |
| 358 | "discard rx due to PN error for peer %pK " |
Aditya Sathish | ded018e | 2018-07-02 16:25:21 +0530 | [diff] [blame] | 359 | "(%02x:%02x:%02x:%02x:%02x:%02x)", |
Tallapragada Kalyan | bc62989 | 2018-04-04 11:34:55 +0530 | [diff] [blame] | 360 | peer, |
| 361 | peer->mac_addr.raw[0], peer->mac_addr.raw[1], |
| 362 | peer->mac_addr.raw[2], peer->mac_addr.raw[3], |
| 363 | peer->mac_addr.raw[4], peer->mac_addr.raw[5]); |
| 364 | |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 365 | dp_peer_unref_del_find_by_id(peer); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 366 | } |
Gurumoorthi Gnanasambandhan | ed4bcf8 | 2017-05-24 00:10:59 +0530 | [diff] [blame] | 367 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 368 | "Packet received with PN error"); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 369 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 370 | /* No peer PN policy -- definitely drop */ |
| 371 | if (!peer_pn_policy) |
| 372 | rx_bufs_used = dp_rx_msdus_drop(soc, ring_desc, |
| 373 | mpdu_desc_info, |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 374 | mac_id, quota); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 375 | |
| 376 | return rx_bufs_used; |
| 377 | } |
| 378 | |
| 379 | /** |
| 380 | * dp_rx_2k_jump_handle() - Handles Sequence Number Jump by 2K |
| 381 | * |
| 382 | * @soc: core txrx main context |
| 383 | * @ring_desc: opaque pointer to the REO error ring descriptor |
| 384 | * @mpdu_desc_info: MPDU descriptor information from ring descriptor |
| 385 | * @head: head of the local descriptor free-list |
| 386 | * @tail: tail of the local descriptor free-list |
| 387 | * @quota: No. of units (packets) that can be serviced in one shot. |
| 388 | * |
| 389 | * This function implements the error handling when sequence number |
| 390 | * of the MPDU jumps suddenly by 2K.Today there are 2 cases that |
| 391 | * need to be handled: |
| 392 | * A) CSN (Current Sequence Number) = Last Valid SN (LSN) + 2K |
| 393 | * B) CSN = LSN + 2K, but falls within a "BA sized window" of the SSN |
| 394 | * For case A) the protocol stack is invoked to generate DELBA/DEAUTH frame |
| 395 | * For case B), the frame is normally dropped, no more action is taken |
| 396 | * |
| 397 | * Return: uint32_t: No. of elements processed |
| 398 | */ |
Jeff Johnson | 8a4fd9b | 2017-01-05 16:33:40 -0800 | [diff] [blame] | 399 | static uint32_t |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 400 | dp_rx_2k_jump_handle(struct dp_soc *soc, hal_ring_desc_t ring_desc, |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 401 | struct hal_rx_mpdu_desc_info *mpdu_desc_info, |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 402 | uint8_t *mac_id, uint32_t quota) |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 403 | { |
| 404 | return dp_rx_msdus_drop(soc, ring_desc, mpdu_desc_info, |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 405 | mac_id, quota); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 406 | } |
| 407 | |
Vevek Venkatesan | de31ff6 | 2019-06-11 12:50:49 +0530 | [diff] [blame] | 408 | #ifdef DP_INVALID_PEER_ASSERT |
Jinwei Chen | 214590a | 2018-12-06 16:45:44 +0800 | [diff] [blame] | 409 | #define DP_PDEV_INVALID_PEER_MSDU_CHECK(head, tail) \ |
| 410 | do { \ |
| 411 | qdf_assert_always(!(head)); \ |
| 412 | qdf_assert_always(!(tail)); \ |
| 413 | } while (0) |
| 414 | #else |
| 415 | #define DP_PDEV_INVALID_PEER_MSDU_CHECK(head, tail) /* no op */ |
| 416 | #endif |
| 417 | |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 418 | /** |
| 419 | * dp_rx_chain_msdus() - Function to chain all msdus of a mpdu |
| 420 | * to pdev invalid peer list |
| 421 | * |
| 422 | * @soc: core DP main context |
| 423 | * @nbuf: Buffer pointer |
| 424 | * @rx_tlv_hdr: start of rx tlv header |
| 425 | * @mac_id: mac id |
| 426 | * |
| 427 | * Return: bool: true for last msdu of mpdu |
| 428 | */ |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 429 | static bool |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 430 | dp_rx_chain_msdus(struct dp_soc *soc, qdf_nbuf_t nbuf, uint8_t *rx_tlv_hdr, |
| 431 | uint8_t mac_id) |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 432 | { |
| 433 | bool mpdu_done = false; |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 434 | qdf_nbuf_t curr_nbuf = NULL; |
| 435 | qdf_nbuf_t tmp_nbuf = NULL; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 436 | |
Pratik Gandhi | 4fbe3fe | 2017-07-20 15:31:26 +0530 | [diff] [blame] | 437 | /* TODO: Currently only single radio is supported, hence |
| 438 | * pdev hard coded to '0' index |
| 439 | */ |
Pratik Gandhi | 7613908 | 2017-07-28 19:18:02 +0530 | [diff] [blame] | 440 | struct dp_pdev *dp_pdev = soc->pdev_list[mac_id]; |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 441 | |
Chaithanya Garrepalli | d3c58a3 | 2019-05-24 19:41:05 +0530 | [diff] [blame] | 442 | /* if invalid peer SG list has max values free the buffers in list |
| 443 | * and treat current buffer as start of list |
| 444 | * |
| 445 | * current logic to detect the last buffer from attn_tlv is not reliable |
| 446 | * in OFDMA UL scenario hence add max buffers check to avoid list pile |
| 447 | * up |
| 448 | */ |
| 449 | if (!dp_pdev->first_nbuf || |
| 450 | QDF_NBUF_CB_RX_NUM_ELEMENTS_IN_LIST |
| 451 | (dp_pdev->invalid_peer_head_msdu) >= DP_MAX_INVALID_BUFFERS) { |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 452 | qdf_nbuf_set_rx_chfrag_start(nbuf, 1); |
Venkata Sharath Chandra Manchala | 84d5092 | 2019-09-21 16:48:04 -0700 | [diff] [blame] | 453 | dp_pdev->ppdu_id = hal_rx_hw_desc_get_ppduid_get(soc->hal_soc, |
| 454 | rx_tlv_hdr); |
Tallapragada Kalyan | 7053951 | 2018-03-29 16:19:43 +0530 | [diff] [blame] | 455 | dp_pdev->first_nbuf = true; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 456 | |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 457 | /* If the new nbuf received is the first msdu of the |
| 458 | * amsdu and there are msdus in the invalid peer msdu |
| 459 | * list, then let us free all the msdus of the invalid |
| 460 | * peer msdu list. |
| 461 | * This scenario can happen when we start receiving |
| 462 | * new a-msdu even before the previous a-msdu is completely |
| 463 | * received. |
| 464 | */ |
| 465 | curr_nbuf = dp_pdev->invalid_peer_head_msdu; |
| 466 | while (curr_nbuf) { |
| 467 | tmp_nbuf = curr_nbuf->next; |
| 468 | qdf_nbuf_free(curr_nbuf); |
| 469 | curr_nbuf = tmp_nbuf; |
| 470 | } |
| 471 | |
Pratik Gandhi | 7613908 | 2017-07-28 19:18:02 +0530 | [diff] [blame] | 472 | dp_pdev->invalid_peer_head_msdu = NULL; |
| 473 | dp_pdev->invalid_peer_tail_msdu = NULL; |
Balamurugan Mahalingam | d015964 | 2018-07-11 15:02:29 +0530 | [diff] [blame] | 474 | hal_rx_mon_hw_desc_get_mpdu_status(soc->hal_soc, rx_tlv_hdr, |
Pratik Gandhi | 4fbe3fe | 2017-07-20 15:31:26 +0530 | [diff] [blame] | 475 | &(dp_pdev->ppdu_info.rx_status)); |
| 476 | |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 477 | } |
| 478 | |
Tallapragada Kalyan | 7053951 | 2018-03-29 16:19:43 +0530 | [diff] [blame] | 479 | if (dp_pdev->ppdu_id == hal_rx_attn_phy_ppdu_id_get(rx_tlv_hdr) && |
| 480 | hal_rx_attn_msdu_done_get(rx_tlv_hdr)) { |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 481 | qdf_nbuf_set_rx_chfrag_end(nbuf, 1); |
Tallapragada Kalyan | 7053951 | 2018-03-29 16:19:43 +0530 | [diff] [blame] | 482 | qdf_assert_always(dp_pdev->first_nbuf == true); |
| 483 | dp_pdev->first_nbuf = false; |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 484 | mpdu_done = true; |
| 485 | } |
| 486 | |
Jinwei Chen | 214590a | 2018-12-06 16:45:44 +0800 | [diff] [blame] | 487 | /* |
| 488 | * For MCL, invalid_peer_head_msdu and invalid_peer_tail_msdu |
| 489 | * should be NULL here, add the checking for debugging purpose |
| 490 | * in case some corner case. |
| 491 | */ |
| 492 | DP_PDEV_INVALID_PEER_MSDU_CHECK(dp_pdev->invalid_peer_head_msdu, |
| 493 | dp_pdev->invalid_peer_tail_msdu); |
Pratik Gandhi | 7613908 | 2017-07-28 19:18:02 +0530 | [diff] [blame] | 494 | DP_RX_LIST_APPEND(dp_pdev->invalid_peer_head_msdu, |
| 495 | dp_pdev->invalid_peer_tail_msdu, |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 496 | nbuf); |
| 497 | |
| 498 | return mpdu_done; |
| 499 | } |
| 500 | |
Mohit Khanna | 82382b3 | 2019-12-09 19:15:27 -0800 | [diff] [blame] | 501 | static |
| 502 | void dp_rx_wbm_err_handle_bar(struct dp_soc *soc, |
| 503 | struct dp_peer *peer, |
| 504 | qdf_nbuf_t nbuf) |
| 505 | { |
| 506 | uint8_t *rx_tlv_hdr; |
| 507 | unsigned char type, subtype; |
| 508 | uint16_t start_seq_num; |
| 509 | uint32_t tid; |
| 510 | struct ieee80211_frame_bar *bar; |
| 511 | |
| 512 | /* |
| 513 | * 1. Is this a BAR frame. If not Discard it. |
| 514 | * 2. If it is, get the peer id, tid, ssn |
| 515 | * 2a Do a tid update |
| 516 | */ |
| 517 | |
| 518 | rx_tlv_hdr = qdf_nbuf_data(nbuf); |
| 519 | bar = (struct ieee80211_frame_bar *)(rx_tlv_hdr + |
| 520 | sizeof(struct rx_pkt_tlvs)); |
| 521 | |
| 522 | type = bar->i_fc[0] & IEEE80211_FC0_TYPE_MASK; |
| 523 | subtype = bar->i_fc[0] & IEEE80211_FC0_SUBTYPE_MASK; |
| 524 | |
| 525 | if (!(type == IEEE80211_FC0_TYPE_CTL && |
| 526 | subtype == QDF_IEEE80211_FC0_SUBTYPE_BAR)) { |
| 527 | dp_err_rl("Not a BAR frame!"); |
| 528 | return; |
| 529 | } |
| 530 | |
| 531 | tid = hal_rx_mpdu_start_tid_get(soc->hal_soc, rx_tlv_hdr); |
| 532 | qdf_assert_always(tid < DP_MAX_TIDS); |
| 533 | |
| 534 | start_seq_num = le16toh(bar->i_seq) >> IEEE80211_SEQ_SEQ_SHIFT; |
| 535 | |
| 536 | dp_info_rl("tid %u window_size %u start_seq_num %u", |
| 537 | tid, peer->rx_tid[tid].ba_win_size, start_seq_num); |
| 538 | |
| 539 | dp_rx_tid_update_wifi3(peer, tid, |
| 540 | peer->rx_tid[tid].ba_win_size, |
| 541 | start_seq_num); |
| 542 | } |
| 543 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 544 | /** |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 545 | * dp_2k_jump_handle() - Function to handle 2k jump exception |
| 546 | * on WBM ring |
| 547 | * |
| 548 | * @soc: core DP main context |
| 549 | * @nbuf: buffer pointer |
| 550 | * @rx_tlv_hdr: start of rx tlv header |
| 551 | * @peer_id: peer id of first msdu |
| 552 | * @tid: Tid for which exception occurred |
| 553 | * |
| 554 | * This function handles 2k jump violations arising out |
| 555 | * of receiving aggregates in non BA case. This typically |
| 556 | * may happen if aggregates are received on a QOS enabled TID |
| 557 | * while Rx window size is still initialized to value of 2. Or |
| 558 | * it may also happen if negotiated window size is 1 but peer |
| 559 | * sends aggregates. |
| 560 | * |
| 561 | */ |
| 562 | |
Aniruddha Paul | a2e7c93 | 2018-12-03 19:10:12 +0530 | [diff] [blame] | 563 | void |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 564 | dp_2k_jump_handle(struct dp_soc *soc, |
| 565 | qdf_nbuf_t nbuf, |
| 566 | uint8_t *rx_tlv_hdr, |
| 567 | uint16_t peer_id, |
| 568 | uint8_t tid) |
| 569 | { |
| 570 | uint32_t ppdu_id; |
| 571 | struct dp_peer *peer = NULL; |
| 572 | struct dp_rx_tid *rx_tid = NULL; |
| 573 | |
| 574 | peer = dp_peer_find_by_id(soc, peer_id); |
| 575 | if (!peer || peer->delete_in_progress) { |
| 576 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 577 | "peer not found"); |
| 578 | goto free_nbuf; |
| 579 | } |
| 580 | rx_tid = &peer->rx_tid[tid]; |
Jeff Johnson | a8edf33 | 2019-03-18 09:51:52 -0700 | [diff] [blame] | 581 | if (qdf_unlikely(!rx_tid)) { |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 582 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 583 | "rx_tid is NULL!!"); |
| 584 | goto free_nbuf; |
| 585 | } |
| 586 | qdf_spin_lock_bh(&rx_tid->tid_lock); |
| 587 | ppdu_id = hal_rx_attn_phy_ppdu_id_get(rx_tlv_hdr); |
Prathyusha Guduri | 9e4bb95 | 2019-03-15 17:41:19 +0530 | [diff] [blame] | 588 | |
| 589 | /* |
| 590 | * If BA session is created and a non-aggregate packet is |
| 591 | * landing here then the issue is with sequence number mismatch. |
| 592 | * Proceed with delba even in that case |
| 593 | */ |
| 594 | if (rx_tid->ppdu_id_2k != ppdu_id && |
| 595 | rx_tid->ba_status != DP_RX_BA_ACTIVE) { |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 596 | rx_tid->ppdu_id_2k = ppdu_id; |
| 597 | qdf_spin_unlock_bh(&rx_tid->tid_lock); |
| 598 | goto free_nbuf; |
| 599 | } |
| 600 | if (!rx_tid->delba_tx_status) { |
| 601 | rx_tid->delba_tx_retry++; |
| 602 | rx_tid->delba_tx_status = 1; |
sumedh baikady | faadbb6 | 2018-08-21 21:13:42 -0700 | [diff] [blame] | 603 | rx_tid->delba_rcode = |
| 604 | IEEE80211_REASON_QOS_SETUP_REQUIRED; |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 605 | qdf_spin_unlock_bh(&rx_tid->tid_lock); |
Venkata Sharath Chandra Manchala | a6c0470 | 2019-06-20 15:27:58 -0700 | [diff] [blame] | 606 | if (soc->cdp_soc.ol_ops->send_delba) |
Pavankumar Nandeshwar | 715fdc3 | 2019-10-03 20:51:01 +0530 | [diff] [blame] | 607 | soc->cdp_soc.ol_ops->send_delba( |
| 608 | peer->vdev->pdev->soc->ctrl_psoc, |
| 609 | peer->vdev->vdev_id, |
| 610 | peer->mac_addr.raw, |
| 611 | tid, |
| 612 | rx_tid->delba_rcode); |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 613 | } else { |
| 614 | qdf_spin_unlock_bh(&rx_tid->tid_lock); |
| 615 | } |
| 616 | |
| 617 | free_nbuf: |
Aniruddha Paul | a2e7c93 | 2018-12-03 19:10:12 +0530 | [diff] [blame] | 618 | if (peer) |
| 619 | dp_peer_unref_del_find_by_id(peer); |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 620 | qdf_nbuf_free(nbuf); |
| 621 | return; |
| 622 | } |
| 623 | |
Venkata Sharath Chandra Manchala | e69c9c2 | 2019-09-23 18:31:36 -0700 | [diff] [blame] | 624 | #if defined(QCA_WIFI_QCA6390) || defined(QCA_WIFI_QCA6490) |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 625 | /** |
| 626 | * dp_rx_null_q_handle_invalid_peer_id_exception() - to find exception |
| 627 | * @soc: pointer to dp_soc struct |
| 628 | * @pool_id: Pool id to find dp_pdev |
| 629 | * @rx_tlv_hdr: TLV header of received packet |
| 630 | * @nbuf: SKB |
| 631 | * |
| 632 | * In certain types of packets if peer_id is not correct then |
| 633 | * driver may not be able find. Try finding peer by addr_2 of |
| 634 | * received MPDU. If you find the peer then most likely sw_peer_id & |
| 635 | * ast_idx is corrupted. |
| 636 | * |
| 637 | * Return: True if you find the peer by addr_2 of received MPDU else false |
| 638 | */ |
| 639 | static bool |
| 640 | dp_rx_null_q_handle_invalid_peer_id_exception(struct dp_soc *soc, |
| 641 | uint8_t pool_id, |
| 642 | uint8_t *rx_tlv_hdr, |
| 643 | qdf_nbuf_t nbuf) |
| 644 | { |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 645 | struct dp_peer *peer = NULL; |
| 646 | uint8_t *rx_pkt_hdr = hal_rx_pkt_hdr_get(rx_tlv_hdr); |
| 647 | struct dp_pdev *pdev = soc->pdev_list[pool_id]; |
| 648 | struct ieee80211_frame *wh = (struct ieee80211_frame *)rx_pkt_hdr; |
| 649 | |
| 650 | /* |
| 651 | * WAR- In certain types of packets if peer_id is not correct then |
| 652 | * driver may not be able find. Try finding peer by addr_2 of |
| 653 | * received MPDU |
| 654 | */ |
| 655 | if (wh) |
| 656 | peer = dp_find_peer_by_addr((struct cdp_pdev *)pdev, |
Yeshwanth Sriram Guntuka | 65d5477 | 2019-11-22 14:50:02 +0530 | [diff] [blame] | 657 | wh->i_addr2); |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 658 | if (peer) { |
Krunal Soni | c96a116 | 2019-02-21 11:33:26 -0800 | [diff] [blame] | 659 | dp_verbose_debug("MPDU sw_peer_id & ast_idx is corrupted"); |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 660 | hal_rx_dump_pkt_tlvs(soc->hal_soc, rx_tlv_hdr, |
Jinwei Chen | 2f79dd9 | 2019-03-27 10:34:18 +0800 | [diff] [blame] | 661 | QDF_TRACE_LEVEL_DEBUG); |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 662 | DP_STATS_INC_PKT(soc, rx.err.rx_invalid_peer_id, |
| 663 | 1, qdf_nbuf_len(nbuf)); |
| 664 | qdf_nbuf_free(nbuf); |
| 665 | |
| 666 | return true; |
| 667 | } |
| 668 | return false; |
| 669 | } |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 670 | |
| 671 | /** |
| 672 | * dp_rx_null_q_check_pkt_len_exception() - Check for pktlen validity |
| 673 | * @soc: DP SOC context |
| 674 | * @pkt_len: computed length of the pkt from caller in bytes |
| 675 | * |
| 676 | * Return: true if pktlen > RX_BUFFER_SIZE, else return false |
| 677 | * |
| 678 | */ |
| 679 | static inline |
| 680 | bool dp_rx_null_q_check_pkt_len_exception(struct dp_soc *soc, uint32_t pkt_len) |
| 681 | { |
| 682 | if (qdf_unlikely(pkt_len > RX_BUFFER_SIZE)) { |
| 683 | DP_STATS_INC_PKT(soc, rx.err.rx_invalid_pkt_len, |
| 684 | 1, pkt_len); |
| 685 | return true; |
| 686 | } else { |
| 687 | return false; |
| 688 | } |
| 689 | } |
| 690 | |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 691 | #else |
| 692 | static inline bool |
| 693 | dp_rx_null_q_handle_invalid_peer_id_exception(struct dp_soc *soc, |
| 694 | uint8_t pool_id, |
| 695 | uint8_t *rx_tlv_hdr, |
| 696 | qdf_nbuf_t nbuf) |
| 697 | { |
| 698 | return false; |
| 699 | } |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 700 | |
| 701 | static inline |
| 702 | bool dp_rx_null_q_check_pkt_len_exception(struct dp_soc *soc, uint32_t pkt_len) |
| 703 | { |
| 704 | return false; |
| 705 | } |
| 706 | |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 707 | #endif |
| 708 | |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 709 | /** |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 710 | * dp_rx_null_q_desc_handle() - Function to handle NULL Queue |
| 711 | * descriptor violation on either a |
| 712 | * REO or WBM ring |
| 713 | * |
| 714 | * @soc: core DP main context |
| 715 | * @nbuf: buffer pointer |
| 716 | * @rx_tlv_hdr: start of rx tlv header |
| 717 | * @pool_id: mac id |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 718 | * @peer: peer handle |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 719 | * |
| 720 | * This function handles NULL queue descriptor violations arising out |
| 721 | * a missing REO queue for a given peer or a given TID. This typically |
| 722 | * may happen if a packet is received on a QOS enabled TID before the |
| 723 | * ADDBA negotiation for that TID, when the TID queue is setup. Or |
| 724 | * it may also happen for MC/BC frames if they are not routed to the |
| 725 | * non-QOS TID queue, in the absence of any other default TID queue. |
| 726 | * This error can show up both in a REO destination or WBM release ring. |
| 727 | * |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 728 | * Return: QDF_STATUS_SUCCESS, if nbuf handled successfully. QDF status code |
| 729 | * if nbuf could not be handled or dropped. |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 730 | */ |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 731 | static QDF_STATUS |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 732 | dp_rx_null_q_desc_handle(struct dp_soc *soc, qdf_nbuf_t nbuf, |
| 733 | uint8_t *rx_tlv_hdr, uint8_t pool_id, |
| 734 | struct dp_peer *peer) |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 735 | { |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 736 | uint32_t pkt_len, l2_hdr_offset; |
| 737 | uint16_t msdu_len; |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 738 | struct dp_vdev *vdev; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 739 | uint8_t tid; |
Srinivas Girigowda | 03bd4b6 | 2019-02-25 10:57:08 -0800 | [diff] [blame] | 740 | qdf_ether_header_t *eh; |
Pratik Gandhi | 7613908 | 2017-07-28 19:18:02 +0530 | [diff] [blame] | 741 | |
Tallapragada Kalyan | c5ac638 | 2017-12-11 15:40:04 +0530 | [diff] [blame] | 742 | qdf_nbuf_set_rx_chfrag_start(nbuf, |
Venkata Sharath Chandra Manchala | cb255b4 | 2019-09-21 11:03:38 -0700 | [diff] [blame] | 743 | hal_rx_msdu_end_first_msdu_get(soc->hal_soc, |
| 744 | rx_tlv_hdr)); |
Tallapragada Kalyan | c5ac638 | 2017-12-11 15:40:04 +0530 | [diff] [blame] | 745 | qdf_nbuf_set_rx_chfrag_end(nbuf, |
Venkata Sharath Chandra Manchala | 55f2d92 | 2019-09-21 11:37:01 -0700 | [diff] [blame] | 746 | hal_rx_msdu_end_last_msdu_get(soc->hal_soc, |
| 747 | rx_tlv_hdr)); |
Venkata Sharath Chandra Manchala | ee90938 | 2019-09-20 10:52:37 -0700 | [diff] [blame] | 748 | qdf_nbuf_set_da_mcbc(nbuf, hal_rx_msdu_end_da_is_mcbc_get(soc->hal_soc, |
| 749 | rx_tlv_hdr)); |
Tallapragada Kalyan | 7147b3c | 2019-03-27 18:40:27 +0530 | [diff] [blame] | 750 | qdf_nbuf_set_da_valid(nbuf, |
Venkata Sharath Chandra Manchala | 7905538 | 2019-09-21 11:22:30 -0700 | [diff] [blame] | 751 | hal_rx_msdu_end_da_is_valid_get(soc->hal_soc, |
| 752 | rx_tlv_hdr)); |
Tallapragada Kalyan | 7147b3c | 2019-03-27 18:40:27 +0530 | [diff] [blame] | 753 | qdf_nbuf_set_sa_valid(nbuf, |
Venkata Sharath Chandra Manchala | 59ebd5e | 2019-09-20 15:52:55 -0700 | [diff] [blame] | 754 | hal_rx_msdu_end_sa_is_valid_get(soc->hal_soc, |
| 755 | rx_tlv_hdr)); |
Tallapragada Kalyan | c5ac638 | 2017-12-11 15:40:04 +0530 | [diff] [blame] | 756 | |
Venkata Sharath Chandra Manchala | f05b2ae | 2019-09-20 17:25:21 -0700 | [diff] [blame] | 757 | l2_hdr_offset = hal_rx_msdu_end_l3_hdr_padding_get(soc->hal_soc, |
| 758 | rx_tlv_hdr); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 759 | msdu_len = hal_rx_msdu_start_msdu_len_get(rx_tlv_hdr); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 760 | pkt_len = msdu_len + l2_hdr_offset + RX_PKT_TLVS_LEN; |
| 761 | |
Tallapragada Kalyan | 7147b3c | 2019-03-27 18:40:27 +0530 | [diff] [blame] | 762 | if (qdf_likely(!qdf_nbuf_is_frag(nbuf))) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 763 | if (dp_rx_null_q_check_pkt_len_exception(soc, pkt_len)) |
| 764 | goto drop_nbuf; |
| 765 | |
| 766 | /* Set length in nbuf */ |
| 767 | qdf_nbuf_set_pktlen(nbuf, |
| 768 | qdf_min(pkt_len, (uint32_t)RX_BUFFER_SIZE)); |
| 769 | qdf_assert_always(nbuf->data == rx_tlv_hdr); |
| 770 | } |
| 771 | |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 772 | /* |
| 773 | * Check if DMA completed -- msdu_done is the last bit |
| 774 | * to be written |
| 775 | */ |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 776 | if (!hal_rx_attn_msdu_done_get(rx_tlv_hdr)) { |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 777 | |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 778 | dp_err_rl("MSDU DONE failure"); |
Balamurugan Mahalingam | d015964 | 2018-07-11 15:02:29 +0530 | [diff] [blame] | 779 | hal_rx_dump_pkt_tlvs(soc->hal_soc, rx_tlv_hdr, |
| 780 | QDF_TRACE_LEVEL_INFO); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 781 | qdf_assert(0); |
| 782 | } |
| 783 | |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 784 | if (!peer && |
| 785 | dp_rx_null_q_handle_invalid_peer_id_exception(soc, pool_id, |
| 786 | rx_tlv_hdr, nbuf)) |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 787 | return QDF_STATUS_E_FAILURE; |
Krunal Soni | 53add65 | 2018-10-05 22:42:35 -0700 | [diff] [blame] | 788 | |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 789 | if (!peer) { |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 790 | bool mpdu_done = false; |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 791 | struct dp_pdev *pdev = soc->pdev_list[pool_id]; |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 792 | |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 793 | dp_err_rl("peer is NULL"); |
| 794 | DP_STATS_INC_PKT(soc, rx.err.rx_invalid_peer, 1, |
Tallapragada Kalyan | 5deeef2 | 2018-08-24 18:19:41 +0530 | [diff] [blame] | 795 | qdf_nbuf_len(nbuf)); |
| 796 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 797 | mpdu_done = dp_rx_chain_msdus(soc, nbuf, rx_tlv_hdr, pool_id); |
chenguo | 91c9010 | 2017-12-12 16:16:37 +0800 | [diff] [blame] | 798 | /* Trigger invalid peer handler wrapper */ |
nobelj | 7dfc8cc | 2019-03-06 18:25:56 -0800 | [diff] [blame] | 799 | dp_rx_process_invalid_peer_wrapper(soc, |
| 800 | pdev->invalid_peer_head_msdu, |
Keyur Parekh | b8149a5 | 2019-04-16 21:30:25 -0700 | [diff] [blame] | 801 | mpdu_done, pool_id); |
Pratik Gandhi | 3da3bc7 | 2017-03-16 18:20:22 +0530 | [diff] [blame] | 802 | |
Tallapragada Kalyan | 084a46d | 2018-03-15 10:51:35 +0530 | [diff] [blame] | 803 | if (mpdu_done) { |
| 804 | pdev->invalid_peer_head_msdu = NULL; |
| 805 | pdev->invalid_peer_tail_msdu = NULL; |
| 806 | } |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 807 | return QDF_STATUS_E_FAILURE; |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 808 | } |
| 809 | |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 810 | vdev = peer->vdev; |
| 811 | if (!vdev) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 812 | dp_err_rl("Null vdev!"); |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 813 | DP_STATS_INC(soc, rx.err.invalid_vdev, 1); |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 814 | goto drop_nbuf; |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 815 | } |
| 816 | |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 817 | /* |
| 818 | * Advance the packet start pointer by total size of |
| 819 | * pre-header TLV's |
| 820 | */ |
Tallapragada Kalyan | 7147b3c | 2019-03-27 18:40:27 +0530 | [diff] [blame] | 821 | if (qdf_nbuf_is_frag(nbuf)) |
Pramod Simha | 21e69f5 | 2018-07-03 16:45:00 -0700 | [diff] [blame] | 822 | qdf_nbuf_pull_head(nbuf, RX_PKT_TLVS_LEN); |
| 823 | else |
| 824 | qdf_nbuf_pull_head(nbuf, (l2_hdr_offset + RX_PKT_TLVS_LEN)); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 825 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 826 | if (dp_rx_mcast_echo_check(soc, peer, rx_tlv_hdr, nbuf)) { |
| 827 | /* this is a looped back MCBC pkt, drop it */ |
Tallapragada Kalyan | 5deeef2 | 2018-08-24 18:19:41 +0530 | [diff] [blame] | 828 | DP_STATS_INC_PKT(peer, rx.mec_drop, 1, qdf_nbuf_len(nbuf)); |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 829 | goto drop_nbuf; |
Tallapragada Kalyan | 71cc01b | 2017-08-23 12:47:06 +0530 | [diff] [blame] | 830 | } |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 831 | |
Nandha Kishore Easwaran | 47e7416 | 2017-12-12 11:54:01 +0530 | [diff] [blame] | 832 | /* |
| 833 | * In qwrap mode if the received packet matches with any of the vdev |
| 834 | * mac addresses, drop it. Donot receive multicast packets originated |
| 835 | * from any proxysta. |
| 836 | */ |
| 837 | if (check_qwrap_multicast_loopback(vdev, nbuf)) { |
Tallapragada Kalyan | 5deeef2 | 2018-08-24 18:19:41 +0530 | [diff] [blame] | 838 | DP_STATS_INC_PKT(peer, rx.mec_drop, 1, qdf_nbuf_len(nbuf)); |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 839 | goto drop_nbuf; |
Nandha Kishore Easwaran | 47e7416 | 2017-12-12 11:54:01 +0530 | [diff] [blame] | 840 | } |
| 841 | |
Tallapragada Kalyan | 71cc01b | 2017-08-23 12:47:06 +0530 | [diff] [blame] | 842 | |
Ruchi, Agrawal | bd894b3 | 2017-11-03 17:24:56 +0530 | [diff] [blame] | 843 | if (qdf_unlikely((peer->nawds_enabled == true) && |
Venkata Sharath Chandra Manchala | ee90938 | 2019-09-20 10:52:37 -0700 | [diff] [blame] | 844 | hal_rx_msdu_end_da_is_mcbc_get(soc->hal_soc, |
| 845 | rx_tlv_hdr))) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 846 | dp_err_rl("free buffer for multicast packet"); |
Ruchi, Agrawal | 2755048 | 2018-02-20 19:43:41 +0530 | [diff] [blame] | 847 | DP_STATS_INC(peer, rx.nawds_mcast_drop, 1); |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 848 | goto drop_nbuf; |
Ruchi, Agrawal | bd894b3 | 2017-11-03 17:24:56 +0530 | [diff] [blame] | 849 | } |
| 850 | |
Tallapragada Kalyan | 7147b3c | 2019-03-27 18:40:27 +0530 | [diff] [blame] | 851 | if (!dp_wds_rx_policy_check(rx_tlv_hdr, vdev, peer)) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 852 | dp_err_rl("mcast Policy Check Drop pkt"); |
| 853 | goto drop_nbuf; |
Tallapragada Kalyan | 2a5fc62 | 2017-12-08 21:07:43 +0530 | [diff] [blame] | 854 | } |
Tallapragada Kalyan | 274eb9e | 2017-05-16 18:59:10 +0530 | [diff] [blame] | 855 | /* WDS Source Port Learning */ |
Pamidipati, Vijay | d3478ef | 2018-02-06 23:52:29 +0530 | [diff] [blame] | 856 | if (qdf_likely(vdev->rx_decap_type == htt_cmn_pkt_type_ethernet && |
| 857 | vdev->wds_enabled)) |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 858 | dp_rx_wds_srcport_learn(soc, rx_tlv_hdr, peer, nbuf); |
Tallapragada Kalyan | 274eb9e | 2017-05-16 18:59:10 +0530 | [diff] [blame] | 859 | |
Venkata Sharath Chandra Manchala | 5ddc518 | 2019-09-21 15:53:03 -0700 | [diff] [blame] | 860 | if (hal_rx_is_unicast(soc->hal_soc, rx_tlv_hdr)) { |
nobelj | 2b861f8 | 2019-03-20 20:23:59 -0700 | [diff] [blame] | 861 | tid = hal_rx_tid_get(soc->hal_soc, rx_tlv_hdr); |
| 862 | if (!peer->rx_tid[tid].hw_qdesc_vaddr_unaligned) |
Karunakar Dasineni | a0f09ea | 2016-11-21 17:41:31 -0800 | [diff] [blame] | 863 | dp_rx_tid_setup_wifi3(peer, tid, 1, IEEE80211_SEQ_MAX); |
nobelj | 2b861f8 | 2019-03-20 20:23:59 -0700 | [diff] [blame] | 864 | /* IEEE80211_SEQ_MAX indicates invalid start_seq */ |
Karunakar Dasineni | a0f09ea | 2016-11-21 17:41:31 -0800 | [diff] [blame] | 865 | } |
| 866 | |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 867 | if (qdf_unlikely(vdev->rx_decap_type == htt_cmn_pkt_type_raw)) { |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 868 | qdf_nbuf_set_next(nbuf, NULL); |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 869 | dp_rx_deliver_raw(vdev, nbuf, peer); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 870 | } else { |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 871 | if (vdev->osif_rx) { |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 872 | qdf_nbuf_set_next(nbuf, NULL); |
Amir Patel | 3217ade | 2018-09-07 12:21:35 +0530 | [diff] [blame] | 873 | DP_STATS_INC_PKT(peer, rx.to_stack, 1, |
| 874 | qdf_nbuf_len(nbuf)); |
Neil Zhao | fca0919 | 2018-11-27 15:16:19 -0800 | [diff] [blame] | 875 | |
Karunakar Dasineni | 142f9ba | 2019-03-19 23:04:59 -0700 | [diff] [blame] | 876 | /* |
| 877 | * Update the protocol tag in SKB based on |
| 878 | * CCE metadata |
| 879 | */ |
Karunakar Dasineni | d8c7ad2 | 2019-04-18 18:15:02 -0700 | [diff] [blame] | 880 | dp_rx_update_protocol_tag(soc, vdev, nbuf, rx_tlv_hdr, |
| 881 | EXCEPTION_DEST_RING_ID, |
| 882 | true, true); |
Karunakar Dasineni | 142f9ba | 2019-03-19 23:04:59 -0700 | [diff] [blame] | 883 | |
Sumeet Rao | c4fa4df | 2019-07-05 02:11:19 -0700 | [diff] [blame] | 884 | /* Update the flow tag in SKB based on FSE metadata */ |
| 885 | dp_rx_update_flow_tag(soc, vdev, nbuf, |
| 886 | rx_tlv_hdr, true); |
| 887 | |
Amir Patel | 3217ade | 2018-09-07 12:21:35 +0530 | [diff] [blame] | 888 | if (qdf_unlikely(hal_rx_msdu_end_da_is_mcbc_get( |
Venkata Sharath Chandra Manchala | ee90938 | 2019-09-20 10:52:37 -0700 | [diff] [blame] | 889 | soc->hal_soc, rx_tlv_hdr) && |
Amir Patel | 3217ade | 2018-09-07 12:21:35 +0530 | [diff] [blame] | 890 | (vdev->rx_decap_type == |
| 891 | htt_cmn_pkt_type_ethernet))) { |
Srinivas Girigowda | 03bd4b6 | 2019-02-25 10:57:08 -0800 | [diff] [blame] | 892 | eh = (qdf_ether_header_t *)qdf_nbuf_data(nbuf); |
Amir Patel | 3217ade | 2018-09-07 12:21:35 +0530 | [diff] [blame] | 893 | |
| 894 | DP_STATS_INC_PKT(peer, rx.multicast, 1, |
| 895 | qdf_nbuf_len(nbuf)); |
Srinivas Girigowda | 7950297 | 2019-02-11 12:25:12 -0800 | [diff] [blame] | 896 | if (QDF_IS_ADDR_BROADCAST(eh->ether_dhost)) { |
Amir Patel | 3217ade | 2018-09-07 12:21:35 +0530 | [diff] [blame] | 897 | DP_STATS_INC_PKT(peer, rx.bcast, 1, |
| 898 | qdf_nbuf_len(nbuf)); |
| 899 | } |
| 900 | } |
Neil Zhao | fca0919 | 2018-11-27 15:16:19 -0800 | [diff] [blame] | 901 | |
| 902 | vdev->osif_rx(vdev->osif_vdev, nbuf); |
| 903 | |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 904 | } else { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 905 | dp_err_rl("INVALID osif_rx. vdev %pK", vdev); |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 906 | DP_STATS_INC(soc, rx.err.invalid_vdev, 1); |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 907 | goto drop_nbuf; |
Tallapragada Kalyan | 3a0005c | 2017-03-10 15:22:57 +0530 | [diff] [blame] | 908 | } |
| 909 | } |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 910 | return QDF_STATUS_SUCCESS; |
| 911 | |
| 912 | drop_nbuf: |
| 913 | qdf_nbuf_free(nbuf); |
| 914 | return QDF_STATUS_E_FAILURE; |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 915 | } |
| 916 | |
| 917 | /** |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 918 | * dp_rx_process_rxdma_err() - Function to deliver rxdma unencrypted_err |
| 919 | * frames to OS or wifi parse errors. |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 920 | * @soc: core DP main context |
| 921 | * @nbuf: buffer pointer |
| 922 | * @rx_tlv_hdr: start of rx tlv header |
| 923 | * @peer: peer reference |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 924 | * @err_code: rxdma err code |
Keyur Parekh | b8149a5 | 2019-04-16 21:30:25 -0700 | [diff] [blame] | 925 | * @mac_id: mac_id which is one of 3 mac_ids(Assuming mac_id and |
| 926 | * pool_id has same mapping) |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 927 | * |
| 928 | * Return: None |
| 929 | */ |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 930 | void |
| 931 | dp_rx_process_rxdma_err(struct dp_soc *soc, qdf_nbuf_t nbuf, |
| 932 | uint8_t *rx_tlv_hdr, struct dp_peer *peer, |
Keyur Parekh | b8149a5 | 2019-04-16 21:30:25 -0700 | [diff] [blame] | 933 | uint8_t err_code, uint8_t mac_id) |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 934 | { |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 935 | uint32_t pkt_len, l2_hdr_offset; |
| 936 | uint16_t msdu_len; |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 937 | struct dp_vdev *vdev; |
Srinivas Girigowda | 03bd4b6 | 2019-02-25 10:57:08 -0800 | [diff] [blame] | 938 | qdf_ether_header_t *eh; |
Gurumoorthi Gnanasambandhan | e1334b3 | 2018-12-07 12:14:17 +0530 | [diff] [blame] | 939 | bool is_broadcast; |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 940 | |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 941 | /* |
| 942 | * Check if DMA completed -- msdu_done is the last bit |
| 943 | * to be written |
| 944 | */ |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 945 | if (!hal_rx_attn_msdu_done_get(rx_tlv_hdr)) { |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 946 | |
| 947 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 948 | FL("MSDU DONE failure")); |
| 949 | |
Balamurugan Mahalingam | d015964 | 2018-07-11 15:02:29 +0530 | [diff] [blame] | 950 | hal_rx_dump_pkt_tlvs(soc->hal_soc, rx_tlv_hdr, |
| 951 | QDF_TRACE_LEVEL_INFO); |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 952 | qdf_assert(0); |
| 953 | } |
| 954 | |
Venkata Sharath Chandra Manchala | f05b2ae | 2019-09-20 17:25:21 -0700 | [diff] [blame] | 955 | l2_hdr_offset = hal_rx_msdu_end_l3_hdr_padding_get(soc->hal_soc, |
| 956 | rx_tlv_hdr); |
Gurumoorthi Gnanasambandhan | 8387311 | 2018-03-15 14:42:51 +0530 | [diff] [blame] | 957 | msdu_len = hal_rx_msdu_start_msdu_len_get(rx_tlv_hdr); |
| 958 | pkt_len = msdu_len + l2_hdr_offset + RX_PKT_TLVS_LEN; |
| 959 | |
| 960 | /* Set length in nbuf */ |
| 961 | qdf_nbuf_set_pktlen(nbuf, pkt_len); |
| 962 | |
| 963 | qdf_nbuf_set_next(nbuf, NULL); |
| 964 | |
| 965 | qdf_nbuf_set_rx_chfrag_start(nbuf, 1); |
| 966 | qdf_nbuf_set_rx_chfrag_end(nbuf, 1); |
| 967 | |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 968 | if (!peer) { |
Jinwei Chen | a1f5304 | 2018-08-29 15:54:29 +0800 | [diff] [blame] | 969 | QDF_TRACE_ERROR_RL(QDF_MODULE_ID_DP, "peer is NULL"); |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 970 | DP_STATS_INC_PKT(soc, rx.err.rx_invalid_peer, 1, |
| 971 | qdf_nbuf_len(nbuf)); |
Gurumoorthi Gnanasambandhan | 8387311 | 2018-03-15 14:42:51 +0530 | [diff] [blame] | 972 | /* Trigger invalid peer handler wrapper */ |
Keyur Parekh | b8149a5 | 2019-04-16 21:30:25 -0700 | [diff] [blame] | 973 | dp_rx_process_invalid_peer_wrapper(soc, nbuf, true, mac_id); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 974 | return; |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 975 | } |
| 976 | |
| 977 | vdev = peer->vdev; |
| 978 | if (!vdev) { |
| 979 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
Jeff Johnson | 3f217e2 | 2017-09-18 10:13:35 -0700 | [diff] [blame] | 980 | FL("INVALID vdev %pK OR osif_rx"), vdev); |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 981 | /* Drop & free packet */ |
| 982 | qdf_nbuf_free(nbuf); |
| 983 | DP_STATS_INC(soc, rx.err.invalid_vdev, 1); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 984 | return; |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 985 | } |
| 986 | |
jiad | 268579c | 2018-11-28 16:42:28 +0800 | [diff] [blame] | 987 | /* |
| 988 | * Advance the packet start pointer by total size of |
| 989 | * pre-header TLV's |
| 990 | */ |
| 991 | qdf_nbuf_pull_head(nbuf, l2_hdr_offset + RX_PKT_TLVS_LEN); |
| 992 | |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 993 | if (err_code == HAL_RXDMA_ERR_WIFI_PARSE) { |
| 994 | uint8_t *pkt_type; |
| 995 | |
| 996 | pkt_type = qdf_nbuf_data(nbuf) + (2 * QDF_MAC_ADDR_SIZE); |
Tallapragada Kalyan | ab357a9 | 2019-08-14 20:28:03 +0530 | [diff] [blame] | 997 | if (*(uint16_t *)pkt_type == htons(QDF_ETH_TYPE_8021Q)) { |
| 998 | if (*(uint16_t *)(pkt_type + DP_SKIP_VLAN) == |
| 999 | htons(QDF_LLC_STP)) { |
| 1000 | DP_STATS_INC(vdev->pdev, vlan_tag_stp_cnt, 1); |
| 1001 | goto process_mesh; |
| 1002 | } else { |
| 1003 | goto process_rx; |
| 1004 | } |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1005 | } |
| 1006 | } |
Gurumoorthi Gnanasambandhan | e1334b3 | 2018-12-07 12:14:17 +0530 | [diff] [blame] | 1007 | if (vdev->rx_decap_type == htt_cmn_pkt_type_raw) |
| 1008 | goto process_mesh; |
| 1009 | |
jiad | 268579c | 2018-11-28 16:42:28 +0800 | [diff] [blame] | 1010 | /* |
| 1011 | * WAPI cert AP sends rekey frames as unencrypted. |
| 1012 | * Thus RXDMA will report unencrypted frame error. |
| 1013 | * To pass WAPI cert case, SW needs to pass unencrypted |
| 1014 | * rekey frame to stack. |
| 1015 | */ |
| 1016 | if (qdf_nbuf_is_ipv4_wapi_pkt(nbuf)) { |
Gurumoorthi Gnanasambandhan | e1334b3 | 2018-12-07 12:14:17 +0530 | [diff] [blame] | 1017 | goto process_rx; |
jiad | 268579c | 2018-11-28 16:42:28 +0800 | [diff] [blame] | 1018 | } |
Gurumoorthi Gnanasambandhan | e1334b3 | 2018-12-07 12:14:17 +0530 | [diff] [blame] | 1019 | /* |
| 1020 | * In dynamic WEP case rekey frames are not encrypted |
| 1021 | * similar to WAPI. Allow EAPOL when 8021+wep is enabled and |
| 1022 | * key install is already done |
| 1023 | */ |
| 1024 | if ((vdev->sec_type == cdp_sec_type_wep104) && |
| 1025 | (qdf_nbuf_is_ipv4_eapol_pkt(nbuf))) |
| 1026 | goto process_rx; |
| 1027 | |
| 1028 | process_mesh: |
jiad | 268579c | 2018-11-28 16:42:28 +0800 | [diff] [blame] | 1029 | |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1030 | if (!vdev->mesh_vdev && err_code == HAL_RXDMA_ERR_UNENCRYPTED) { |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1031 | qdf_nbuf_free(nbuf); |
| 1032 | DP_STATS_INC(soc, rx.err.invalid_vdev, 1); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1033 | return; |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1034 | } |
| 1035 | |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1036 | if (vdev->mesh_vdev) { |
| 1037 | if (dp_rx_filter_mesh_packets(vdev, nbuf, rx_tlv_hdr) |
| 1038 | == QDF_STATUS_SUCCESS) { |
| 1039 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_INFO_MED, |
| 1040 | FL("mesh pkt filtered")); |
| 1041 | DP_STATS_INC(vdev->pdev, dropped.mesh_filter, 1); |
Venkateswara Swamy Bandaru | 1fecd15 | 2017-07-04 17:26:18 +0530 | [diff] [blame] | 1042 | |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1043 | qdf_nbuf_free(nbuf); |
| 1044 | return; |
| 1045 | } |
| 1046 | dp_rx_fill_mesh_stats(vdev, nbuf, rx_tlv_hdr, peer); |
Venkateswara Swamy Bandaru | 1fecd15 | 2017-07-04 17:26:18 +0530 | [diff] [blame] | 1047 | } |
Gurumoorthi Gnanasambandhan | e1334b3 | 2018-12-07 12:14:17 +0530 | [diff] [blame] | 1048 | process_rx: |
Venkata Sharath Chandra Manchala | ee90938 | 2019-09-20 10:52:37 -0700 | [diff] [blame] | 1049 | if (qdf_unlikely(hal_rx_msdu_end_da_is_mcbc_get(soc->hal_soc, |
| 1050 | rx_tlv_hdr) && |
| 1051 | (vdev->rx_decap_type == |
Pranita Solanke | a5a3ae7 | 2018-01-18 21:45:27 +0530 | [diff] [blame] | 1052 | htt_cmn_pkt_type_ethernet))) { |
Srinivas Girigowda | 03bd4b6 | 2019-02-25 10:57:08 -0800 | [diff] [blame] | 1053 | eh = (qdf_ether_header_t *)qdf_nbuf_data(nbuf); |
Srinivas Girigowda | 7950297 | 2019-02-11 12:25:12 -0800 | [diff] [blame] | 1054 | is_broadcast = (QDF_IS_ADDR_BROADCAST |
Pranita Solanke | a5a3ae7 | 2018-01-18 21:45:27 +0530 | [diff] [blame] | 1055 | (eh->ether_dhost)) ? 1 : 0 ; |
Amir Patel | 3217ade | 2018-09-07 12:21:35 +0530 | [diff] [blame] | 1056 | DP_STATS_INC_PKT(peer, rx.multicast, 1, qdf_nbuf_len(nbuf)); |
Gurumoorthi Gnanasambandhan | e1334b3 | 2018-12-07 12:14:17 +0530 | [diff] [blame] | 1057 | if (is_broadcast) { |
Pranita Solanke | a5a3ae7 | 2018-01-18 21:45:27 +0530 | [diff] [blame] | 1058 | DP_STATS_INC_PKT(peer, rx.bcast, 1, |
| 1059 | qdf_nbuf_len(nbuf)); |
| 1060 | } |
| 1061 | } |
| 1062 | |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1063 | if (qdf_unlikely(vdev->rx_decap_type == htt_cmn_pkt_type_raw)) { |
| 1064 | dp_rx_deliver_raw(vdev, nbuf, peer); |
| 1065 | } else { |
Karunakar Dasineni | 142f9ba | 2019-03-19 23:04:59 -0700 | [diff] [blame] | 1066 | /* Update the protocol tag in SKB based on CCE metadata */ |
Karunakar Dasineni | d8c7ad2 | 2019-04-18 18:15:02 -0700 | [diff] [blame] | 1067 | dp_rx_update_protocol_tag(soc, vdev, nbuf, rx_tlv_hdr, |
| 1068 | EXCEPTION_DEST_RING_ID, true, true); |
Sumeet Rao | c4fa4df | 2019-07-05 02:11:19 -0700 | [diff] [blame] | 1069 | /* Update the flow tag in SKB based on FSE metadata */ |
| 1070 | dp_rx_update_flow_tag(soc, vdev, nbuf, rx_tlv_hdr, true); |
Tallapragada Kalyan | 5deeef2 | 2018-08-24 18:19:41 +0530 | [diff] [blame] | 1071 | DP_STATS_INC(peer, rx.to_stack.num, 1); |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1072 | vdev->osif_rx(vdev->osif_vdev, nbuf); |
| 1073 | } |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1074 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1075 | return; |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1076 | } |
| 1077 | |
| 1078 | /** |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1079 | * dp_rx_process_mic_error(): Function to pass mic error indication to umac |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1080 | * @soc: core DP main context |
| 1081 | * @nbuf: buffer pointer |
| 1082 | * @rx_tlv_hdr: start of rx tlv header |
| 1083 | * @peer: peer handle |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1084 | * |
| 1085 | * return: void |
| 1086 | */ |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1087 | void dp_rx_process_mic_error(struct dp_soc *soc, qdf_nbuf_t nbuf, |
| 1088 | uint8_t *rx_tlv_hdr, struct dp_peer *peer) |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1089 | { |
| 1090 | struct dp_vdev *vdev = NULL; |
| 1091 | struct dp_pdev *pdev = NULL; |
| 1092 | struct ol_if_ops *tops = NULL; |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1093 | uint16_t rx_seq, fragno; |
Prathyusha Guduri | 244eeac | 2019-10-23 13:13:58 +0530 | [diff] [blame] | 1094 | uint8_t is_raw; |
Pramod Simha | 366c1e0 | 2018-06-20 11:55:50 -0700 | [diff] [blame] | 1095 | unsigned int tid; |
| 1096 | QDF_STATUS status; |
Rakshith Suresh Patkar | d863f8d | 2019-07-16 16:30:59 +0530 | [diff] [blame] | 1097 | struct cdp_rx_mic_err_info mic_failure_info; |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1098 | |
Venkata Sharath Chandra Manchala | cb255b4 | 2019-09-21 11:03:38 -0700 | [diff] [blame] | 1099 | if (!hal_rx_msdu_end_first_msdu_get(soc->hal_soc, |
| 1100 | rx_tlv_hdr)) |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1101 | return; |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1102 | |
jiad | 9dee72a | 2017-12-05 13:39:25 +0800 | [diff] [blame] | 1103 | if (!peer) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1104 | dp_err_rl("peer not found"); |
jiad | 9dee72a | 2017-12-05 13:39:25 +0800 | [diff] [blame] | 1105 | goto fail; |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1106 | } |
| 1107 | |
jiad | 9dee72a | 2017-12-05 13:39:25 +0800 | [diff] [blame] | 1108 | vdev = peer->vdev; |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1109 | if (!vdev) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1110 | dp_err_rl("VDEV not found"); |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1111 | goto fail; |
| 1112 | } |
| 1113 | |
jiad | 9dee72a | 2017-12-05 13:39:25 +0800 | [diff] [blame] | 1114 | pdev = vdev->pdev; |
| 1115 | if (!pdev) { |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1116 | dp_err_rl("PDEV not found"); |
jiad | 9dee72a | 2017-12-05 13:39:25 +0800 | [diff] [blame] | 1117 | goto fail; |
| 1118 | } |
| 1119 | |
Prathyusha Guduri | 244eeac | 2019-10-23 13:13:58 +0530 | [diff] [blame] | 1120 | is_raw = HAL_IS_DECAP_FORMAT_RAW(soc->hal_soc, qdf_nbuf_data(nbuf)); |
| 1121 | if (is_raw) { |
| 1122 | fragno = dp_rx_frag_get_mpdu_frag_number(qdf_nbuf_data(nbuf)); |
| 1123 | /* Can get only last fragment */ |
| 1124 | if (fragno) { |
| 1125 | tid = hal_rx_mpdu_start_tid_get(soc->hal_soc, |
| 1126 | qdf_nbuf_data(nbuf)); |
| 1127 | rx_seq = hal_rx_get_rx_sequence(soc->hal_soc, |
| 1128 | qdf_nbuf_data(nbuf)); |
Shashikala Prabhu | ecec78c | 2019-09-17 12:01:24 +0530 | [diff] [blame] | 1129 | |
Prathyusha Guduri | 244eeac | 2019-10-23 13:13:58 +0530 | [diff] [blame] | 1130 | status = dp_rx_defrag_add_last_frag(soc, peer, |
| 1131 | tid, rx_seq, nbuf); |
| 1132 | dp_info_rl("Frag pkt seq# %d frag# %d consumed " |
| 1133 | "status %d !", rx_seq, fragno, status); |
| 1134 | return; |
| 1135 | } |
Pramod Simha | 366c1e0 | 2018-06-20 11:55:50 -0700 | [diff] [blame] | 1136 | } |
| 1137 | |
Venkata Sharath Chandra Manchala | aa76283 | 2019-09-21 15:13:47 -0700 | [diff] [blame] | 1138 | if (hal_rx_mpdu_get_addr1(soc->hal_soc, qdf_nbuf_data(nbuf), |
Shashikala Prabhu | ecec78c | 2019-09-17 12:01:24 +0530 | [diff] [blame] | 1139 | &mic_failure_info.da_mac_addr.bytes[0])) { |
| 1140 | dp_err_rl("Failed to get da_mac_addr"); |
| 1141 | goto fail; |
| 1142 | } |
| 1143 | |
Venkata Sharath Chandra Manchala | aa76283 | 2019-09-21 15:13:47 -0700 | [diff] [blame] | 1144 | if (hal_rx_mpdu_get_addr2(soc->hal_soc, qdf_nbuf_data(nbuf), |
Shashikala Prabhu | ecec78c | 2019-09-17 12:01:24 +0530 | [diff] [blame] | 1145 | &mic_failure_info.ta_mac_addr.bytes[0])) { |
| 1146 | dp_err_rl("Failed to get ta_mac_addr"); |
| 1147 | goto fail; |
| 1148 | } |
| 1149 | |
Rakshith Suresh Patkar | d863f8d | 2019-07-16 16:30:59 +0530 | [diff] [blame] | 1150 | mic_failure_info.key_id = 0; |
| 1151 | mic_failure_info.multicast = |
Shashikala Prabhu | ecec78c | 2019-09-17 12:01:24 +0530 | [diff] [blame] | 1152 | IEEE80211_IS_MULTICAST(mic_failure_info.da_mac_addr.bytes); |
Rakshith Suresh Patkar | d863f8d | 2019-07-16 16:30:59 +0530 | [diff] [blame] | 1153 | qdf_mem_zero(mic_failure_info.tsc, MIC_SEQ_CTR_SIZE); |
| 1154 | mic_failure_info.frame_type = cdp_rx_frame_type_802_11; |
Shashikala Prabhu | ecec78c | 2019-09-17 12:01:24 +0530 | [diff] [blame] | 1155 | mic_failure_info.data = NULL; |
Rakshith Suresh Patkar | d863f8d | 2019-07-16 16:30:59 +0530 | [diff] [blame] | 1156 | mic_failure_info.vdev_id = vdev->vdev_id; |
| 1157 | |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1158 | tops = pdev->soc->cdp_soc.ol_ops; |
| 1159 | if (tops->rx_mic_error) |
Pavankumar Nandeshwar | 4c7b81b | 2019-09-27 11:27:12 +0530 | [diff] [blame] | 1160 | tops->rx_mic_error(soc->ctrl_psoc, pdev->pdev_id, |
| 1161 | &mic_failure_info); |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1162 | |
| 1163 | fail: |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1164 | qdf_nbuf_free(nbuf); |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1165 | return; |
| 1166 | } |
| 1167 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1168 | uint32_t |
Rakesh Pillai | 2529ae1 | 2019-05-31 20:28:30 +0530 | [diff] [blame] | 1169 | dp_rx_err_process(struct dp_intr *int_ctx, struct dp_soc *soc, |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1170 | hal_ring_handle_t hal_ring_hdl, uint32_t quota) |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1171 | { |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 1172 | hal_ring_desc_t ring_desc; |
Akshay Kosigi | a870c61 | 2019-07-08 23:10:30 +0530 | [diff] [blame] | 1173 | hal_soc_handle_t hal_soc; |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1174 | uint32_t count = 0; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1175 | uint32_t rx_bufs_used = 0; |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1176 | uint32_t rx_bufs_reaped[MAX_PDEV_CNT] = { 0 }; |
| 1177 | uint8_t mac_id = 0; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1178 | uint8_t buf_type; |
| 1179 | uint8_t error, rbm; |
| 1180 | struct hal_rx_mpdu_desc_info mpdu_desc_info; |
| 1181 | struct hal_buf_info hbi; |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 1182 | struct dp_pdev *dp_pdev; |
| 1183 | struct dp_srng *dp_rxdma_srng; |
| 1184 | struct rx_desc_pool *rx_desc_pool; |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 1185 | uint32_t cookie = 0; |
| 1186 | void *link_desc_va; |
| 1187 | struct hal_rx_msdu_list msdu_list; /* MSDU's per MPDU */ |
| 1188 | uint16_t num_msdus; |
Tallapragada Kalyan | fe278d5 | 2019-02-13 17:12:43 +0530 | [diff] [blame] | 1189 | struct dp_rx_desc *rx_desc = NULL; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1190 | |
| 1191 | /* Debug -- Remove later */ |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1192 | qdf_assert(soc && hal_ring_hdl); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1193 | |
| 1194 | hal_soc = soc->hal_soc; |
| 1195 | |
| 1196 | /* Debug -- Remove later */ |
| 1197 | qdf_assert(hal_soc); |
| 1198 | |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1199 | if (qdf_unlikely(dp_srng_access_start(int_ctx, soc, hal_ring_hdl))) { |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1200 | |
| 1201 | /* TODO */ |
| 1202 | /* |
| 1203 | * Need API to convert from hal_ring pointer to |
| 1204 | * Ring Type / Ring Id combo |
| 1205 | */ |
Venkata Sharath Chandra Manchala | a405eb7 | 2017-03-06 14:35:00 -0800 | [diff] [blame] | 1206 | DP_STATS_INC(soc, rx.err.hal_ring_access_fail, 1); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 1207 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1208 | FL("HAL RING Access Failed -- %pK"), hal_ring_hdl); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1209 | goto done; |
| 1210 | } |
| 1211 | |
Pamidipati, Vijay | 3379c74 | 2017-11-01 18:50:43 +0530 | [diff] [blame] | 1212 | while (qdf_likely(quota-- && (ring_desc = |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1213 | hal_srng_dst_get_next(hal_soc, |
| 1214 | hal_ring_hdl)))) { |
Pamidipati, Vijay | 3379c74 | 2017-11-01 18:50:43 +0530 | [diff] [blame] | 1215 | |
Ishank Jain | 57c42a1 | 2017-04-12 10:42:22 +0530 | [diff] [blame] | 1216 | DP_STATS_INC(soc, rx.err_ring_pkts, 1); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1217 | |
| 1218 | error = HAL_RX_ERROR_STATUS_GET(ring_desc); |
| 1219 | |
| 1220 | qdf_assert(error == HAL_REO_ERROR_DETECTED); |
| 1221 | |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 1222 | buf_type = HAL_RX_REO_BUF_TYPE_GET(ring_desc); |
| 1223 | /* |
| 1224 | * For REO error ring, expect only MSDU LINK DESC |
| 1225 | */ |
| 1226 | qdf_assert_always(buf_type == HAL_RX_REO_MSDU_LINK_DESC_TYPE); |
| 1227 | |
| 1228 | cookie = HAL_RX_REO_BUF_COOKIE_GET(ring_desc); |
| 1229 | /* |
| 1230 | * check for the magic number in the sw cookie |
| 1231 | */ |
| 1232 | qdf_assert_always((cookie >> LINK_DESC_ID_SHIFT) & |
| 1233 | LINK_DESC_ID_START); |
| 1234 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1235 | /* |
| 1236 | * Check if the buffer is to be processed on this processor |
| 1237 | */ |
| 1238 | rbm = hal_rx_ret_buf_manager_get(ring_desc); |
| 1239 | |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 1240 | hal_rx_reo_buf_paddr_get(ring_desc, &hbi); |
| 1241 | link_desc_va = dp_rx_cookie_2_link_desc_va(soc, &hbi); |
Balamurugan Mahalingam | 3715aa4 | 2018-08-22 02:13:14 +0530 | [diff] [blame] | 1242 | hal_rx_msdu_list_get(soc->hal_soc, link_desc_va, &msdu_list, |
| 1243 | &num_msdus); |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 1244 | |
jiad | c26dfc8 | 2018-05-03 16:09:03 +0800 | [diff] [blame] | 1245 | if (qdf_unlikely((msdu_list.rbm[0] != DP_WBM2SW_RBM) && |
psimha | 223883f | 2017-11-16 17:18:51 -0800 | [diff] [blame] | 1246 | (msdu_list.rbm[0] != |
| 1247 | HAL_RX_BUF_RBM_WBM_IDLE_DESC_LIST))) { |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1248 | /* TODO */ |
| 1249 | /* Call appropriate handler */ |
syed touqeer pasha | 576972b | 2019-03-12 14:49:27 +0530 | [diff] [blame] | 1250 | if (!wlan_cfg_get_dp_soc_nss_cfg(soc->wlan_cfg_ctx)) { |
| 1251 | DP_STATS_INC(soc, rx.err.invalid_rbm, 1); |
| 1252 | QDF_TRACE(QDF_MODULE_ID_DP, |
| 1253 | QDF_TRACE_LEVEL_ERROR, |
| 1254 | FL("Invalid RBM %d"), |
| 1255 | msdu_list.rbm[0]); |
| 1256 | } |
Tallapragada Kalyan | a7010a6 | 2017-10-20 12:20:19 +0530 | [diff] [blame] | 1257 | |
| 1258 | /* Return link descriptor through WBM ring (SW2WBM)*/ |
| 1259 | dp_rx_link_desc_return(soc, ring_desc, |
| 1260 | HAL_BM_ACTION_RELEASE_MSDU_LIST); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1261 | continue; |
| 1262 | } |
| 1263 | |
syed touqeer pasha | 576972b | 2019-03-12 14:49:27 +0530 | [diff] [blame] | 1264 | rx_desc = dp_rx_cookie_2_va_rxdma_buf(soc, |
| 1265 | msdu_list.sw_cookie[0]); |
| 1266 | qdf_assert_always(rx_desc); |
| 1267 | |
| 1268 | mac_id = rx_desc->pool_id; |
| 1269 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1270 | /* Get the MPDU DESC info */ |
Tallapragada Kalyan | 603c594 | 2016-12-07 21:30:44 +0530 | [diff] [blame] | 1271 | hal_rx_mpdu_desc_info_get(ring_desc, &mpdu_desc_info); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1272 | |
| 1273 | if (mpdu_desc_info.mpdu_flags & HAL_MPDU_F_FRAGMENT) { |
Tallapragada Kalyan | fe278d5 | 2019-02-13 17:12:43 +0530 | [diff] [blame] | 1274 | /* |
| 1275 | * We only handle one msdu per link desc for fragmented |
| 1276 | * case. We drop the msdus and release the link desc |
| 1277 | * back if there are more than one msdu in link desc. |
| 1278 | */ |
| 1279 | if (qdf_unlikely(num_msdus > 1)) { |
| 1280 | count = dp_rx_msdus_drop(soc, ring_desc, |
| 1281 | &mpdu_desc_info, |
| 1282 | &mac_id, quota); |
| 1283 | rx_bufs_reaped[mac_id] += count; |
| 1284 | continue; |
| 1285 | } |
| 1286 | |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1287 | count = dp_rx_frag_handle(soc, |
| 1288 | ring_desc, &mpdu_desc_info, |
Tallapragada Kalyan | fe278d5 | 2019-02-13 17:12:43 +0530 | [diff] [blame] | 1289 | rx_desc, &mac_id, quota); |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1290 | |
| 1291 | rx_bufs_reaped[mac_id] += count; |
Ishank Jain | 57c42a1 | 2017-04-12 10:42:22 +0530 | [diff] [blame] | 1292 | DP_STATS_INC(soc, rx.rx_frags, 1); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1293 | continue; |
| 1294 | } |
| 1295 | |
| 1296 | if (hal_rx_reo_is_pn_error(ring_desc)) { |
| 1297 | /* TOD0 */ |
Venkata Sharath Chandra Manchala | a405eb7 | 2017-03-06 14:35:00 -0800 | [diff] [blame] | 1298 | DP_STATS_INC(soc, |
| 1299 | rx.err. |
| 1300 | reo_error[HAL_REO_ERR_PN_CHECK_FAILED], |
| 1301 | 1); |
Ankit Kumar | 1c69ca1 | 2019-07-30 14:03:12 +0530 | [diff] [blame] | 1302 | /* increment @pdev level */ |
| 1303 | dp_pdev = dp_get_pdev_for_mac_id(soc, mac_id); |
| 1304 | if (dp_pdev) |
| 1305 | DP_STATS_INC(dp_pdev, err.reo_error, 1); |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1306 | count = dp_rx_pn_error_handle(soc, |
| 1307 | ring_desc, |
| 1308 | &mpdu_desc_info, &mac_id, |
| 1309 | quota); |
| 1310 | |
| 1311 | rx_bufs_reaped[mac_id] += count; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1312 | continue; |
| 1313 | } |
| 1314 | |
| 1315 | if (hal_rx_reo_is_2k_jump(ring_desc)) { |
| 1316 | /* TOD0 */ |
Venkata Sharath Chandra Manchala | a405eb7 | 2017-03-06 14:35:00 -0800 | [diff] [blame] | 1317 | DP_STATS_INC(soc, |
| 1318 | rx.err. |
| 1319 | reo_error[HAL_REO_ERR_REGULAR_FRAME_2K_JUMP], |
| 1320 | 1); |
Ankit Kumar | 1c69ca1 | 2019-07-30 14:03:12 +0530 | [diff] [blame] | 1321 | /* increment @pdev level */ |
| 1322 | dp_pdev = dp_get_pdev_for_mac_id(soc, mac_id); |
| 1323 | if (dp_pdev) |
| 1324 | DP_STATS_INC(dp_pdev, err.reo_error, 1); |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1325 | |
| 1326 | count = dp_rx_2k_jump_handle(soc, |
| 1327 | ring_desc, &mpdu_desc_info, |
| 1328 | &mac_id, quota); |
| 1329 | |
| 1330 | rx_bufs_reaped[mac_id] += count; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1331 | continue; |
| 1332 | } |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1333 | } |
| 1334 | |
| 1335 | done: |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1336 | dp_srng_access_end(int_ctx, soc, hal_ring_hdl); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1337 | |
Karunakar Dasineni | f8ec0cb | 2019-01-29 13:07:05 -0800 | [diff] [blame] | 1338 | if (soc->rx.flags.defrag_timeout_check) { |
| 1339 | uint32_t now_ms = |
| 1340 | qdf_system_ticks_to_msecs(qdf_system_ticks()); |
| 1341 | |
| 1342 | if (now_ms >= soc->rx.defrag.next_flush_ms) |
| 1343 | dp_rx_defrag_waitlist_flush(soc); |
| 1344 | } |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 1345 | |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1346 | for (mac_id = 0; mac_id < MAX_PDEV_CNT; mac_id++) { |
| 1347 | if (rx_bufs_reaped[mac_id]) { |
| 1348 | dp_pdev = soc->pdev_list[mac_id]; |
| 1349 | dp_rxdma_srng = &dp_pdev->rx_refill_buf_ring; |
| 1350 | rx_desc_pool = &soc->rx_desc_buf[mac_id]; |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 1351 | |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1352 | dp_rx_buffers_replenish(soc, mac_id, dp_rxdma_srng, |
| 1353 | rx_desc_pool, |
| 1354 | rx_bufs_reaped[mac_id], |
| 1355 | &dp_pdev->free_list_head, |
| 1356 | &dp_pdev->free_list_tail); |
| 1357 | rx_bufs_used += rx_bufs_reaped[mac_id]; |
| 1358 | } |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 1359 | } |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1360 | |
| 1361 | return rx_bufs_used; /* Assume no scale factor for now */ |
| 1362 | } |
| 1363 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1364 | uint32_t |
Rakesh Pillai | 2529ae1 | 2019-05-31 20:28:30 +0530 | [diff] [blame] | 1365 | dp_rx_wbm_err_process(struct dp_intr *int_ctx, struct dp_soc *soc, |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1366 | hal_ring_handle_t hal_ring_hdl, uint32_t quota) |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1367 | { |
Akshay Kosigi | 91c5652 | 2019-07-02 11:49:39 +0530 | [diff] [blame] | 1368 | hal_ring_desc_t ring_desc; |
Akshay Kosigi | a870c61 | 2019-07-08 23:10:30 +0530 | [diff] [blame] | 1369 | hal_soc_handle_t hal_soc; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1370 | struct dp_rx_desc *rx_desc; |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 1371 | union dp_rx_desc_list_elem_t *head[MAX_PDEV_CNT] = { NULL }; |
| 1372 | union dp_rx_desc_list_elem_t *tail[MAX_PDEV_CNT] = { NULL }; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1373 | uint32_t rx_bufs_used = 0; |
| 1374 | uint32_t rx_bufs_reaped[MAX_PDEV_CNT] = { 0 }; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1375 | uint8_t buf_type, rbm; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1376 | uint32_t rx_buf_cookie; |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 1377 | uint8_t mac_id; |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 1378 | struct dp_pdev *dp_pdev; |
| 1379 | struct dp_srng *dp_rxdma_srng; |
| 1380 | struct rx_desc_pool *rx_desc_pool; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1381 | uint8_t *rx_tlv_hdr; |
| 1382 | qdf_nbuf_t nbuf_head = NULL; |
| 1383 | qdf_nbuf_t nbuf_tail = NULL; |
| 1384 | qdf_nbuf_t nbuf, next; |
| 1385 | struct hal_wbm_err_desc_info wbm_err_info = { 0 }; |
| 1386 | uint8_t pool_id; |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 1387 | uint8_t tid = 0; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1388 | |
| 1389 | /* Debug -- Remove later */ |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1390 | qdf_assert(soc && hal_ring_hdl); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1391 | |
| 1392 | hal_soc = soc->hal_soc; |
| 1393 | |
| 1394 | /* Debug -- Remove later */ |
| 1395 | qdf_assert(hal_soc); |
| 1396 | |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1397 | if (qdf_unlikely(dp_srng_access_start(int_ctx, soc, hal_ring_hdl))) { |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1398 | |
| 1399 | /* TODO */ |
| 1400 | /* |
| 1401 | * Need API to convert from hal_ring pointer to |
| 1402 | * Ring Type / Ring Id combo |
| 1403 | */ |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 1404 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1405 | FL("HAL RING Access Failed -- %pK"), hal_ring_hdl); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1406 | goto done; |
| 1407 | } |
| 1408 | |
Pamidipati, Vijay | 3379c74 | 2017-11-01 18:50:43 +0530 | [diff] [blame] | 1409 | while (qdf_likely(quota-- && (ring_desc = |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1410 | hal_srng_dst_get_next(hal_soc, |
| 1411 | hal_ring_hdl)))) { |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1412 | |
| 1413 | /* XXX */ |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1414 | buf_type = HAL_RX_WBM_BUF_TYPE_GET(ring_desc); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1415 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1416 | /* |
| 1417 | * For WBM ring, expect only MSDU buffers |
| 1418 | */ |
| 1419 | qdf_assert_always(buf_type == HAL_RX_WBM_BUF_TYPE_REL_BUF); |
| 1420 | |
| 1421 | qdf_assert((HAL_RX_WBM_ERR_SRC_GET(ring_desc) |
| 1422 | == HAL_RX_WBM_ERR_SRC_RXDMA) || |
| 1423 | (HAL_RX_WBM_ERR_SRC_GET(ring_desc) |
| 1424 | == HAL_RX_WBM_ERR_SRC_REO)); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1425 | |
| 1426 | /* |
| 1427 | * Check if the buffer is to be processed on this processor |
| 1428 | */ |
| 1429 | rbm = hal_rx_ret_buf_manager_get(ring_desc); |
| 1430 | |
| 1431 | if (qdf_unlikely(rbm != HAL_RX_BUF_RBM_SW3_BM)) { |
| 1432 | /* TODO */ |
| 1433 | /* Call appropriate handler */ |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1434 | DP_STATS_INC(soc, rx.err.invalid_rbm, 1); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 1435 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 1436 | FL("Invalid RBM %d"), rbm); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1437 | continue; |
| 1438 | } |
| 1439 | |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 1440 | rx_buf_cookie = HAL_RX_WBM_BUF_COOKIE_GET(ring_desc); |
| 1441 | |
Kai Chen | 6eca1a6 | 2017-01-12 10:17:53 -0800 | [diff] [blame] | 1442 | rx_desc = dp_rx_cookie_2_va_rxdma_buf(soc, rx_buf_cookie); |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1443 | qdf_assert_always(rx_desc); |
Tallapragada Kalyan | aae8c41 | 2017-02-13 12:00:17 +0530 | [diff] [blame] | 1444 | |
Pamidipati, Vijay | 5379474 | 2017-06-03 11:24:32 +0530 | [diff] [blame] | 1445 | if (!dp_rx_desc_check_magic(rx_desc)) { |
| 1446 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 1447 | FL("Invalid rx_desc cookie=%d"), |
| 1448 | rx_buf_cookie); |
| 1449 | continue; |
| 1450 | } |
| 1451 | |
Tallapragada Kalyan | eff377a | 2019-01-09 19:13:19 +0530 | [diff] [blame] | 1452 | /* |
| 1453 | * this is a unlikely scenario where the host is reaping |
| 1454 | * a descriptor which it already reaped just a while ago |
| 1455 | * but is yet to replenish it back to HW. |
| 1456 | * In this case host will dump the last 128 descriptors |
| 1457 | * including the software descriptor rx_desc and assert. |
| 1458 | */ |
| 1459 | if (qdf_unlikely(!rx_desc->in_use)) { |
| 1460 | DP_STATS_INC(soc, rx.err.hal_wbm_rel_dup, 1); |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1461 | dp_rx_dump_info_and_assert(soc, hal_ring_hdl, |
Tallapragada Kalyan | eff377a | 2019-01-09 19:13:19 +0530 | [diff] [blame] | 1462 | ring_desc, rx_desc); |
| 1463 | } |
| 1464 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1465 | nbuf = rx_desc->nbuf; |
Ankit Kumar | 0ae4abc | 2019-05-02 15:08:42 +0530 | [diff] [blame] | 1466 | qdf_nbuf_unmap_single(soc->osdev, nbuf, QDF_DMA_FROM_DEVICE); |
Pamidipati, Vijay | 5379474 | 2017-06-03 11:24:32 +0530 | [diff] [blame] | 1467 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1468 | /* |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1469 | * save the wbm desc info in nbuf TLV. We will need this |
| 1470 | * info when we do the actual nbuf processing |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1471 | */ |
Balamurugan Mahalingam | 764219e | 2018-09-17 15:34:25 +0530 | [diff] [blame] | 1472 | hal_rx_wbm_err_info_get(ring_desc, &wbm_err_info, hal_soc); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1473 | wbm_err_info.pool_id = rx_desc->pool_id; |
| 1474 | hal_rx_wbm_err_info_set_in_tlv(qdf_nbuf_data(nbuf), |
| 1475 | &wbm_err_info); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1476 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1477 | rx_bufs_reaped[rx_desc->pool_id]++; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1478 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1479 | DP_RX_LIST_APPEND(nbuf_head, nbuf_tail, rx_desc->nbuf); |
| 1480 | dp_rx_add_to_free_desc_list(&head[rx_desc->pool_id], |
| 1481 | &tail[rx_desc->pool_id], |
| 1482 | rx_desc); |
| 1483 | } |
| 1484 | done: |
Akshay Kosigi | 0bca9fb | 2019-06-27 15:26:13 +0530 | [diff] [blame] | 1485 | dp_srng_access_end(int_ctx, soc, hal_ring_hdl); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1486 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1487 | for (mac_id = 0; mac_id < MAX_PDEV_CNT; mac_id++) { |
| 1488 | if (rx_bufs_reaped[mac_id]) { |
| 1489 | dp_pdev = soc->pdev_list[mac_id]; |
| 1490 | dp_rxdma_srng = &dp_pdev->rx_refill_buf_ring; |
| 1491 | rx_desc_pool = &soc->rx_desc_buf[mac_id]; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1492 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1493 | dp_rx_buffers_replenish(soc, mac_id, dp_rxdma_srng, |
| 1494 | rx_desc_pool, rx_bufs_reaped[mac_id], |
Venkata Sharath Chandra Manchala | 16fcceb | 2018-01-03 11:27:15 -0800 | [diff] [blame] | 1495 | &head[mac_id], &tail[mac_id]); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1496 | rx_bufs_used += rx_bufs_reaped[mac_id]; |
| 1497 | } |
| 1498 | } |
Ishank Jain | e73c403 | 2017-03-16 11:48:15 +0530 | [diff] [blame] | 1499 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1500 | nbuf = nbuf_head; |
| 1501 | while (nbuf) { |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1502 | struct dp_peer *peer; |
| 1503 | uint16_t peer_id; |
Vinay Adella | 5c1b788 | 2019-06-13 18:19:29 +0530 | [diff] [blame] | 1504 | uint8_t e_code; |
| 1505 | uint8_t *tlv_hdr; |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1506 | rx_tlv_hdr = qdf_nbuf_data(nbuf); |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1507 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1508 | /* |
| 1509 | * retrieve the wbm desc info from nbuf TLV, so we can |
| 1510 | * handle error cases appropriately |
| 1511 | */ |
| 1512 | hal_rx_wbm_err_info_get_from_tlv(rx_tlv_hdr, &wbm_err_info); |
| 1513 | |
Mohit Khanna | 82382b3 | 2019-12-09 19:15:27 -0800 | [diff] [blame] | 1514 | peer_id = hal_rx_mpdu_start_sw_peer_id_get(soc->hal_soc, |
| 1515 | rx_tlv_hdr); |
| 1516 | peer = dp_peer_find_by_id(soc, peer_id); |
| 1517 | |
| 1518 | if (!peer) |
| 1519 | dp_err_rl("peer is null! peer_id %u err_src %u err_rsn %u", |
| 1520 | peer_id, wbm_err_info.wbm_err_src, |
| 1521 | wbm_err_info.reo_psh_rsn); |
| 1522 | |
Prathyusha Guduri | 02ed948 | 2018-04-17 19:06:30 +0530 | [diff] [blame] | 1523 | /* Set queue_mapping in nbuf to 0 */ |
| 1524 | dp_set_rx_queue(nbuf, 0); |
| 1525 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1526 | next = nbuf->next; |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1527 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1528 | if (wbm_err_info.wbm_err_src == HAL_RX_WBM_ERR_SRC_REO) { |
| 1529 | if (wbm_err_info.reo_psh_rsn |
| 1530 | == HAL_RX_WBM_REO_PSH_RSN_ERROR) { |
| 1531 | |
| 1532 | DP_STATS_INC(soc, |
| 1533 | rx.err.reo_error |
| 1534 | [wbm_err_info.reo_err_code], 1); |
Ankit Kumar | 1c69ca1 | 2019-07-30 14:03:12 +0530 | [diff] [blame] | 1535 | /* increment @pdev level */ |
| 1536 | pool_id = wbm_err_info.pool_id; |
| 1537 | dp_pdev = dp_get_pdev_for_mac_id(soc, pool_id); |
| 1538 | if (dp_pdev) |
| 1539 | DP_STATS_INC(dp_pdev, err.reo_error, |
| 1540 | 1); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1541 | |
| 1542 | switch (wbm_err_info.reo_err_code) { |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 1543 | /* |
| 1544 | * Handling for packets which have NULL REO |
| 1545 | * queue descriptor |
| 1546 | */ |
| 1547 | case HAL_REO_ERR_QUEUE_DESC_ADDR_0: |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1548 | pool_id = wbm_err_info.pool_id; |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1549 | dp_rx_null_q_desc_handle(soc, nbuf, |
| 1550 | rx_tlv_hdr, |
| 1551 | pool_id, peer); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1552 | nbuf = next; |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1553 | if (peer) |
| 1554 | dp_peer_unref_del_find_by_id( |
| 1555 | peer); |
Tallapragada Kalyan | 1ef5480 | 2016-11-30 12:54:55 +0530 | [diff] [blame] | 1556 | continue; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1557 | /* TODO */ |
| 1558 | /* Add per error code accounting */ |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 1559 | case HAL_REO_ERR_REGULAR_FRAME_2K_JUMP: |
| 1560 | pool_id = wbm_err_info.pool_id; |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1561 | |
Venkata Sharath Chandra Manchala | cb255b4 | 2019-09-21 11:03:38 -0700 | [diff] [blame] | 1562 | if (hal_rx_msdu_end_first_msdu_get(soc->hal_soc, |
| 1563 | rx_tlv_hdr)) { |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 1564 | peer_id = |
Venkata Sharath Chandra Manchala | 96ed623 | 2019-09-21 12:11:19 -0700 | [diff] [blame] | 1565 | hal_rx_mpdu_start_sw_peer_id_get(soc->hal_soc, |
| 1566 | rx_tlv_hdr); |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 1567 | tid = |
| 1568 | hal_rx_mpdu_start_tid_get(hal_soc, rx_tlv_hdr); |
| 1569 | } |
| 1570 | dp_2k_jump_handle(soc, nbuf, rx_tlv_hdr, |
| 1571 | peer_id, tid); |
| 1572 | nbuf = next; |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1573 | if (peer) |
| 1574 | dp_peer_unref_del_find_by_id( |
| 1575 | peer); |
sumedh baikady | df4a57c | 2018-04-08 22:19:22 -0700 | [diff] [blame] | 1576 | continue; |
Mohit Khanna | 82382b3 | 2019-12-09 19:15:27 -0800 | [diff] [blame] | 1577 | case HAL_REO_ERR_BAR_FRAME_2K_JUMP: |
| 1578 | case HAL_REO_ERR_BAR_FRAME_OOR: |
| 1579 | if (peer) |
| 1580 | dp_rx_wbm_err_handle_bar(soc, |
| 1581 | peer, |
| 1582 | nbuf); |
| 1583 | break; |
| 1584 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1585 | default: |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1586 | dp_err_rl("Got pkt with REO ERROR: %d", |
| 1587 | wbm_err_info.reo_err_code); |
| 1588 | break; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1589 | } |
| 1590 | } |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1591 | } else if (wbm_err_info.wbm_err_src == |
| 1592 | HAL_RX_WBM_ERR_SRC_RXDMA) { |
| 1593 | if (wbm_err_info.rxdma_psh_rsn |
| 1594 | == HAL_RX_WBM_RXDMA_PSH_RSN_ERROR) { |
| 1595 | DP_STATS_INC(soc, |
| 1596 | rx.err.rxdma_error |
| 1597 | [wbm_err_info.rxdma_err_code], 1); |
Ankit Kumar | 1c69ca1 | 2019-07-30 14:03:12 +0530 | [diff] [blame] | 1598 | /* increment @pdev level */ |
| 1599 | pool_id = wbm_err_info.pool_id; |
| 1600 | dp_pdev = dp_get_pdev_for_mac_id(soc, pool_id); |
| 1601 | if (dp_pdev) |
| 1602 | DP_STATS_INC(dp_pdev, |
| 1603 | err.rxdma_error, 1); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1604 | |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1605 | switch (wbm_err_info.rxdma_err_code) { |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1606 | case HAL_RXDMA_ERR_UNENCRYPTED: |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1607 | |
| 1608 | case HAL_RXDMA_ERR_WIFI_PARSE: |
Keyur Parekh | b8149a5 | 2019-04-16 21:30:25 -0700 | [diff] [blame] | 1609 | pool_id = wbm_err_info.pool_id; |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1610 | dp_rx_process_rxdma_err(soc, nbuf, |
Keyur Parekh | b8149a5 | 2019-04-16 21:30:25 -0700 | [diff] [blame] | 1611 | rx_tlv_hdr, |
| 1612 | peer, |
| 1613 | wbm_err_info. |
| 1614 | rxdma_err_code, |
| 1615 | pool_id); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1616 | nbuf = next; |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1617 | if (peer) |
sumedh baikady | c2fa7c9 | 2018-12-28 15:26:08 -0800 | [diff] [blame] | 1618 | dp_peer_unref_del_find_by_id(peer); |
Pamidipati, Vijay | eb8a92c | 2017-05-01 00:55:56 +0530 | [diff] [blame] | 1619 | continue; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1620 | |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1621 | case HAL_RXDMA_ERR_TKIP_MIC: |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1622 | dp_rx_process_mic_error(soc, nbuf, |
| 1623 | rx_tlv_hdr, |
| 1624 | peer); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1625 | nbuf = next; |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1626 | if (peer) { |
Gurumoorthi Gnanasambandhan | 306de84 | 2017-12-19 08:47:40 +0530 | [diff] [blame] | 1627 | DP_STATS_INC(peer, rx.err.mic_err, 1); |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1628 | dp_peer_unref_del_find_by_id( |
| 1629 | peer); |
| 1630 | } |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1631 | continue; |
| 1632 | |
| 1633 | case HAL_RXDMA_ERR_DECRYPT: |
Vinay Adella | 5c1b788 | 2019-06-13 18:19:29 +0530 | [diff] [blame] | 1634 | pool_id = wbm_err_info.pool_id; |
| 1635 | e_code = wbm_err_info.rxdma_err_code; |
| 1636 | tlv_hdr = rx_tlv_hdr; |
| 1637 | if (peer) { |
| 1638 | DP_STATS_INC(peer, rx.err. |
| 1639 | decrypt_err, 1); |
| 1640 | } else { |
| 1641 | dp_rx_process_rxdma_err(soc, |
| 1642 | nbuf, |
| 1643 | tlv_hdr, |
| 1644 | NULL, |
| 1645 | e_code, |
| 1646 | pool_id |
| 1647 | ); |
| 1648 | nbuf = next; |
| 1649 | continue; |
| 1650 | } |
| 1651 | |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1652 | QDF_TRACE(QDF_MODULE_ID_DP, |
Karunakar Dasineni | 87f0c5d | 2017-10-29 21:54:21 -0700 | [diff] [blame] | 1653 | QDF_TRACE_LEVEL_DEBUG, |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1654 | "Packet received with Decrypt error"); |
| 1655 | break; |
| 1656 | |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1657 | default: |
Mohit Khanna | f085b61 | 2019-04-02 14:43:10 -0700 | [diff] [blame] | 1658 | dp_err_rl("RXDMA error %d", |
| 1659 | wbm_err_info.rxdma_err_code); |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1660 | } |
| 1661 | } |
| 1662 | } else { |
| 1663 | /* Should not come here */ |
| 1664 | qdf_assert(0); |
| 1665 | } |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1666 | |
Sravan Kumar Kairam | 26d471e | 2018-08-14 23:51:58 +0530 | [diff] [blame] | 1667 | if (peer) |
| 1668 | dp_peer_unref_del_find_by_id(peer); |
| 1669 | |
Balamurugan Mahalingam | d015964 | 2018-07-11 15:02:29 +0530 | [diff] [blame] | 1670 | hal_rx_dump_pkt_tlvs(hal_soc, rx_tlv_hdr, |
| 1671 | QDF_TRACE_LEVEL_DEBUG); |
chenguo | d70b7d9 | 2018-01-13 17:40:27 +0800 | [diff] [blame] | 1672 | qdf_nbuf_free(nbuf); |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1673 | nbuf = next; |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1674 | } |
Tallapragada Kalyan | 9403463 | 2017-12-07 17:29:13 +0530 | [diff] [blame] | 1675 | return rx_bufs_used; /* Assume no scale factor for now */ |
Debashis Dutt | 390645c | 2016-10-04 17:31:45 -0700 | [diff] [blame] | 1676 | } |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1677 | |
| 1678 | /** |
nwzhao | ea2ffbb | 2019-01-31 11:43:17 -0800 | [diff] [blame] | 1679 | * dup_desc_dbg() - dump and assert if duplicate rx desc found |
| 1680 | * |
| 1681 | * @soc: core DP main context |
| 1682 | * @rxdma_dst_ring_desc: void pointer to monitor link descriptor buf addr info |
| 1683 | * @rx_desc: void pointer to rx descriptor |
| 1684 | * |
| 1685 | * Return: void |
| 1686 | */ |
| 1687 | static void dup_desc_dbg(struct dp_soc *soc, |
Akshay Kosigi | 8eda31c | 2019-07-10 14:42:42 +0530 | [diff] [blame] | 1688 | hal_rxdma_desc_t rxdma_dst_ring_desc, |
nwzhao | ea2ffbb | 2019-01-31 11:43:17 -0800 | [diff] [blame] | 1689 | void *rx_desc) |
| 1690 | { |
| 1691 | DP_STATS_INC(soc, rx.err.hal_rxdma_err_dup, 1); |
Akshay Kosigi | 8eda31c | 2019-07-10 14:42:42 +0530 | [diff] [blame] | 1692 | dp_rx_dump_info_and_assert( |
| 1693 | soc, |
| 1694 | soc->rx_rel_ring.hal_srng, |
| 1695 | hal_rxdma_desc_to_hal_ring_desc(rxdma_dst_ring_desc), |
| 1696 | rx_desc); |
nwzhao | ea2ffbb | 2019-01-31 11:43:17 -0800 | [diff] [blame] | 1697 | } |
| 1698 | |
| 1699 | /** |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1700 | * dp_rx_err_mpdu_pop() - extract the MSDU's from link descs |
| 1701 | * |
| 1702 | * @soc: core DP main context |
| 1703 | * @mac_id: mac id which is one of 3 mac_ids |
| 1704 | * @rxdma_dst_ring_desc: void pointer to monitor link descriptor buf addr info |
| 1705 | * @head: head of descs list to be freed |
| 1706 | * @tail: tail of decs list to be freed |
| 1707 | |
| 1708 | * Return: number of msdu in MPDU to be popped |
| 1709 | */ |
| 1710 | static inline uint32_t |
| 1711 | dp_rx_err_mpdu_pop(struct dp_soc *soc, uint32_t mac_id, |
Akshay Kosigi | 8eda31c | 2019-07-10 14:42:42 +0530 | [diff] [blame] | 1712 | hal_rxdma_desc_t rxdma_dst_ring_desc, |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1713 | union dp_rx_desc_list_elem_t **head, |
| 1714 | union dp_rx_desc_list_elem_t **tail) |
| 1715 | { |
| 1716 | void *rx_msdu_link_desc; |
| 1717 | qdf_nbuf_t msdu; |
| 1718 | qdf_nbuf_t last; |
| 1719 | struct hal_rx_msdu_list msdu_list; |
Karunakar Dasineni | 80cded8 | 2017-07-10 10:49:55 -0700 | [diff] [blame] | 1720 | uint16_t num_msdus; |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1721 | struct hal_buf_info buf_info; |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1722 | uint32_t rx_bufs_used = 0; |
| 1723 | uint32_t msdu_cnt; |
| 1724 | uint32_t i; |
Karunakar Dasineni | 15a3d48 | 2017-07-12 19:19:40 -0700 | [diff] [blame] | 1725 | uint8_t push_reason; |
| 1726 | uint8_t rxdma_error_code = 0; |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1727 | uint8_t bm_action = HAL_BM_ACTION_PUT_IN_IDLE_LIST; |
Manjunathappa Prakash | d9ce350 | 2018-02-05 14:09:17 -0800 | [diff] [blame] | 1728 | struct dp_pdev *pdev = dp_get_pdev_for_mac_id(soc, mac_id); |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1729 | uint32_t rx_link_buf_info[HAL_RX_BUFFINFO_NUM_DWORDS]; |
Akshay Kosigi | 8eda31c | 2019-07-10 14:42:42 +0530 | [diff] [blame] | 1730 | hal_rxdma_desc_t ring_desc; |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1731 | |
| 1732 | msdu = 0; |
| 1733 | |
| 1734 | last = NULL; |
| 1735 | |
| 1736 | hal_rx_reo_ent_buf_paddr_get(rxdma_dst_ring_desc, &buf_info, |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1737 | &msdu_cnt); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1738 | |
Karunakar Dasineni | 15a3d48 | 2017-07-12 19:19:40 -0700 | [diff] [blame] | 1739 | push_reason = |
| 1740 | hal_rx_reo_ent_rxdma_push_reason_get(rxdma_dst_ring_desc); |
| 1741 | if (push_reason == HAL_RX_WBM_RXDMA_PSH_RSN_ERROR) { |
| 1742 | rxdma_error_code = |
| 1743 | hal_rx_reo_ent_rxdma_error_code_get(rxdma_dst_ring_desc); |
| 1744 | } |
| 1745 | |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1746 | do { |
| 1747 | rx_msdu_link_desc = |
| 1748 | dp_rx_cookie_2_link_desc_va(soc, &buf_info); |
| 1749 | |
| 1750 | qdf_assert(rx_msdu_link_desc); |
| 1751 | |
Balamurugan Mahalingam | 3715aa4 | 2018-08-22 02:13:14 +0530 | [diff] [blame] | 1752 | hal_rx_msdu_list_get(soc->hal_soc, rx_msdu_link_desc, |
| 1753 | &msdu_list, &num_msdus); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1754 | |
Karunakar Dasineni | 15a3d48 | 2017-07-12 19:19:40 -0700 | [diff] [blame] | 1755 | if (msdu_list.sw_cookie[0] != HAL_RX_COOKIE_SPECIAL) { |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1756 | /* if the msdus belongs to NSS offloaded radio && |
Venkata Sharath Chandra Manchala | 16fcceb | 2018-01-03 11:27:15 -0800 | [diff] [blame] | 1757 | * the rbm is not SW1_BM then return the msdu_link |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1758 | * descriptor without freeing the msdus (nbufs). let |
| 1759 | * these buffers be given to NSS completion ring for |
| 1760 | * NSS to free them. |
| 1761 | * else iterate through the msdu link desc list and |
| 1762 | * free each msdu in the list. |
| 1763 | */ |
| 1764 | if (msdu_list.rbm[0] != HAL_RX_BUF_RBM_SW3_BM && |
| 1765 | wlan_cfg_get_dp_pdev_nss_enabled( |
| 1766 | pdev->wlan_cfg_ctx)) |
| 1767 | bm_action = HAL_BM_ACTION_RELEASE_MSDU_LIST; |
| 1768 | else { |
| 1769 | for (i = 0; i < num_msdus; i++) { |
| 1770 | struct dp_rx_desc *rx_desc = |
| 1771 | dp_rx_cookie_2_va_rxdma_buf(soc, |
| 1772 | msdu_list.sw_cookie[i]); |
Pamidipati, Vijay | b75e810 | 2018-11-05 12:41:18 +0530 | [diff] [blame] | 1773 | qdf_assert_always(rx_desc); |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1774 | msdu = rx_desc->nbuf; |
nwzhao | ea2ffbb | 2019-01-31 11:43:17 -0800 | [diff] [blame] | 1775 | /* |
| 1776 | * this is a unlikely scenario |
| 1777 | * where the host is reaping |
| 1778 | * a descriptor which |
| 1779 | * it already reaped just a while ago |
| 1780 | * but is yet to replenish |
| 1781 | * it back to HW. |
| 1782 | * In this case host will dump |
| 1783 | * the last 128 descriptors |
| 1784 | * including the software descriptor |
| 1785 | * rx_desc and assert. |
| 1786 | */ |
| 1787 | ring_desc = rxdma_dst_ring_desc; |
| 1788 | if (qdf_unlikely(!rx_desc->in_use)) { |
| 1789 | dup_desc_dbg(soc, |
| 1790 | ring_desc, |
| 1791 | rx_desc); |
| 1792 | continue; |
| 1793 | } |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1794 | |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1795 | qdf_nbuf_unmap_single(soc->osdev, msdu, |
| 1796 | QDF_DMA_FROM_DEVICE); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1797 | |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1798 | QDF_TRACE(QDF_MODULE_ID_DP, |
| 1799 | QDF_TRACE_LEVEL_DEBUG, |
Aditya Sathish | ded018e | 2018-07-02 16:25:21 +0530 | [diff] [blame] | 1800 | "[%s][%d] msdu_nbuf=%pK ", |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1801 | __func__, __LINE__, msdu); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1802 | |
Tallapragada Kalyan | 0017291 | 2017-09-26 21:04:24 +0530 | [diff] [blame] | 1803 | qdf_nbuf_free(msdu); |
| 1804 | rx_bufs_used++; |
| 1805 | dp_rx_add_to_free_desc_list(head, |
| 1806 | tail, rx_desc); |
| 1807 | } |
Karunakar Dasineni | 15a3d48 | 2017-07-12 19:19:40 -0700 | [diff] [blame] | 1808 | } |
| 1809 | } else { |
| 1810 | rxdma_error_code = HAL_RXDMA_ERR_WAR; |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1811 | } |
| 1812 | |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1813 | /* |
| 1814 | * Store the current link buffer into to the local structure |
| 1815 | * to be used for release purpose. |
| 1816 | */ |
| 1817 | hal_rxdma_buff_addr_info_set(rx_link_buf_info, buf_info.paddr, |
| 1818 | buf_info.sw_cookie, buf_info.rbm); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1819 | |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1820 | hal_rx_mon_next_link_desc_get(rx_msdu_link_desc, &buf_info); |
| 1821 | dp_rx_link_desc_return_by_addr(soc, |
| 1822 | (hal_buff_addrinfo_t) |
| 1823 | rx_link_buf_info, |
| 1824 | bm_action); |
Karunakar Dasineni | a7ee2c6 | 2017-10-31 09:05:44 -0700 | [diff] [blame] | 1825 | } while (buf_info.paddr); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1826 | |
Karunakar Dasineni | 15a3d48 | 2017-07-12 19:19:40 -0700 | [diff] [blame] | 1827 | DP_STATS_INC(soc, rx.err.rxdma_error[rxdma_error_code], 1); |
Ankit Kumar | 1c69ca1 | 2019-07-30 14:03:12 +0530 | [diff] [blame] | 1828 | if (pdev) |
| 1829 | DP_STATS_INC(pdev, err.rxdma_error, 1); |
Karunakar Dasineni | 15a3d48 | 2017-07-12 19:19:40 -0700 | [diff] [blame] | 1830 | |
Gurumoorthi Gnanasambandhan | 25607a7 | 2017-08-07 11:53:16 +0530 | [diff] [blame] | 1831 | if (rxdma_error_code == HAL_RXDMA_ERR_DECRYPT) { |
| 1832 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 1833 | "Packet received with Decrypt error"); |
| 1834 | } |
| 1835 | |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1836 | return rx_bufs_used; |
| 1837 | } |
| 1838 | |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1839 | uint32_t |
Rakesh Pillai | 2529ae1 | 2019-05-31 20:28:30 +0530 | [diff] [blame] | 1840 | dp_rxdma_err_process(struct dp_intr *int_ctx, struct dp_soc *soc, |
| 1841 | uint32_t mac_id, uint32_t quota) |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1842 | { |
Manjunathappa Prakash | e23acaf | 2017-11-10 00:17:24 -0800 | [diff] [blame] | 1843 | struct dp_pdev *pdev = dp_get_pdev_for_mac_id(soc, mac_id); |
Manjunathappa Prakash | d9ce350 | 2018-02-05 14:09:17 -0800 | [diff] [blame] | 1844 | int mac_for_pdev = dp_get_mac_id_for_mac(soc, mac_id); |
Akshay Kosigi | 8eda31c | 2019-07-10 14:42:42 +0530 | [diff] [blame] | 1845 | hal_rxdma_desc_t rxdma_dst_ring_desc; |
Akshay Kosigi | a870c61 | 2019-07-08 23:10:30 +0530 | [diff] [blame] | 1846 | hal_soc_handle_t hal_soc; |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1847 | void *err_dst_srng; |
| 1848 | union dp_rx_desc_list_elem_t *head = NULL; |
| 1849 | union dp_rx_desc_list_elem_t *tail = NULL; |
| 1850 | struct dp_srng *dp_rxdma_srng; |
| 1851 | struct rx_desc_pool *rx_desc_pool; |
| 1852 | uint32_t work_done = 0; |
| 1853 | uint32_t rx_bufs_used = 0; |
| 1854 | |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1855 | if (!pdev) |
| 1856 | return 0; |
Nandha Kishore Easwaran | e03102f | 2018-08-22 22:23:00 +0530 | [diff] [blame] | 1857 | |
Manjunathappa Prakash | d9ce350 | 2018-02-05 14:09:17 -0800 | [diff] [blame] | 1858 | err_dst_srng = pdev->rxdma_err_dst_ring[mac_for_pdev].hal_srng; |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1859 | |
| 1860 | if (!err_dst_srng) { |
| 1861 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 1862 | "%s %d : HAL Monitor Destination Ring Init \ |
Aditya Sathish | ded018e | 2018-07-02 16:25:21 +0530 | [diff] [blame] | 1863 | Failed -- %pK", |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1864 | __func__, __LINE__, err_dst_srng); |
| 1865 | return 0; |
| 1866 | } |
| 1867 | |
| 1868 | hal_soc = soc->hal_soc; |
| 1869 | |
| 1870 | qdf_assert(hal_soc); |
| 1871 | |
Rakesh Pillai | 2529ae1 | 2019-05-31 20:28:30 +0530 | [diff] [blame] | 1872 | if (qdf_unlikely(dp_srng_access_start(int_ctx, soc, err_dst_srng))) { |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1873 | QDF_TRACE(QDF_MODULE_ID_DP, QDF_TRACE_LEVEL_ERROR, |
| 1874 | "%s %d : HAL Monitor Destination Ring Init \ |
Aditya Sathish | ded018e | 2018-07-02 16:25:21 +0530 | [diff] [blame] | 1875 | Failed -- %pK", |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1876 | __func__, __LINE__, err_dst_srng); |
| 1877 | return 0; |
| 1878 | } |
| 1879 | |
Pamidipati, Vijay | 3379c74 | 2017-11-01 18:50:43 +0530 | [diff] [blame] | 1880 | while (qdf_likely(quota-- && (rxdma_dst_ring_desc = |
| 1881 | hal_srng_dst_get_next(hal_soc, err_dst_srng)))) { |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1882 | |
| 1883 | rx_bufs_used += dp_rx_err_mpdu_pop(soc, mac_id, |
| 1884 | rxdma_dst_ring_desc, |
| 1885 | &head, &tail); |
| 1886 | } |
| 1887 | |
Rakesh Pillai | 2529ae1 | 2019-05-31 20:28:30 +0530 | [diff] [blame] | 1888 | dp_srng_access_end(int_ctx, soc, err_dst_srng); |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1889 | |
| 1890 | if (rx_bufs_used) { |
| 1891 | dp_rxdma_srng = &pdev->rx_refill_buf_ring; |
| 1892 | rx_desc_pool = &soc->rx_desc_buf[mac_id]; |
| 1893 | |
Manjunathappa Prakash | d9ce350 | 2018-02-05 14:09:17 -0800 | [diff] [blame] | 1894 | dp_rx_buffers_replenish(soc, mac_id, dp_rxdma_srng, |
Venkata Sharath Chandra Manchala | 16fcceb | 2018-01-03 11:27:15 -0800 | [diff] [blame] | 1895 | rx_desc_pool, rx_bufs_used, &head, &tail); |
| 1896 | |
Pramod Simha | e382ff8 | 2017-06-05 18:09:26 -0700 | [diff] [blame] | 1897 | work_done += rx_bufs_used; |
| 1898 | } |
| 1899 | |
| 1900 | return work_done; |
| 1901 | } |
Pavankumar Nandeshwar | b86ddaf | 2019-10-07 12:55:16 +0530 | [diff] [blame] | 1902 | |
| 1903 | static inline uint32_t |
| 1904 | dp_wbm_int_err_mpdu_pop(struct dp_soc *soc, uint32_t mac_id, |
| 1905 | hal_rxdma_desc_t rxdma_dst_ring_desc, |
| 1906 | union dp_rx_desc_list_elem_t **head, |
| 1907 | union dp_rx_desc_list_elem_t **tail) |
| 1908 | { |
| 1909 | void *rx_msdu_link_desc; |
| 1910 | qdf_nbuf_t msdu; |
| 1911 | qdf_nbuf_t last; |
| 1912 | struct hal_rx_msdu_list msdu_list; |
| 1913 | uint16_t num_msdus; |
| 1914 | struct hal_buf_info buf_info; |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1915 | uint32_t rx_bufs_used = 0, msdu_cnt, i; |
| 1916 | uint32_t rx_link_buf_info[HAL_RX_BUFFINFO_NUM_DWORDS]; |
Pavankumar Nandeshwar | b86ddaf | 2019-10-07 12:55:16 +0530 | [diff] [blame] | 1917 | |
| 1918 | msdu = 0; |
| 1919 | |
| 1920 | last = NULL; |
| 1921 | |
| 1922 | hal_rx_reo_ent_buf_paddr_get(rxdma_dst_ring_desc, &buf_info, |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1923 | &msdu_cnt); |
Pavankumar Nandeshwar | b86ddaf | 2019-10-07 12:55:16 +0530 | [diff] [blame] | 1924 | |
| 1925 | do { |
| 1926 | rx_msdu_link_desc = |
| 1927 | dp_rx_cookie_2_link_desc_va(soc, &buf_info); |
| 1928 | |
| 1929 | if (!rx_msdu_link_desc) { |
| 1930 | DP_STATS_INC(soc, tx.wbm_internal_error[WBM_INT_ERROR_REO_NULL_LINK_DESC], 1); |
| 1931 | break; |
| 1932 | } |
| 1933 | |
| 1934 | hal_rx_msdu_list_get(soc->hal_soc, rx_msdu_link_desc, |
| 1935 | &msdu_list, &num_msdus); |
| 1936 | |
| 1937 | if (msdu_list.sw_cookie[0] != HAL_RX_COOKIE_SPECIAL) { |
| 1938 | for (i = 0; i < num_msdus; i++) { |
| 1939 | struct dp_rx_desc *rx_desc = |
| 1940 | dp_rx_cookie_2_va_rxdma_buf( |
| 1941 | soc, |
| 1942 | msdu_list.sw_cookie[i]); |
| 1943 | qdf_assert_always(rx_desc); |
| 1944 | msdu = rx_desc->nbuf; |
| 1945 | |
| 1946 | qdf_nbuf_unmap_single(soc->osdev, msdu, |
| 1947 | QDF_DMA_FROM_DEVICE); |
| 1948 | |
| 1949 | qdf_nbuf_free(msdu); |
| 1950 | rx_bufs_used++; |
| 1951 | dp_rx_add_to_free_desc_list(head, |
| 1952 | tail, rx_desc); |
| 1953 | } |
| 1954 | } |
| 1955 | |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1956 | /* |
| 1957 | * Store the current link buffer into to the local structure |
| 1958 | * to be used for release purpose. |
| 1959 | */ |
| 1960 | hal_rxdma_buff_addr_info_set(rx_link_buf_info, buf_info.paddr, |
| 1961 | buf_info.sw_cookie, buf_info.rbm); |
Pavankumar Nandeshwar | b86ddaf | 2019-10-07 12:55:16 +0530 | [diff] [blame] | 1962 | |
Aniruddha Paul | 33fce95 | 2019-11-27 18:48:04 +0530 | [diff] [blame^] | 1963 | hal_rx_mon_next_link_desc_get(rx_msdu_link_desc, &buf_info); |
| 1964 | dp_rx_link_desc_return_by_addr(soc, (hal_buff_addrinfo_t) |
| 1965 | rx_link_buf_info, |
Pavankumar Nandeshwar | b86ddaf | 2019-10-07 12:55:16 +0530 | [diff] [blame] | 1966 | HAL_BM_ACTION_PUT_IN_IDLE_LIST); |
Pavankumar Nandeshwar | b86ddaf | 2019-10-07 12:55:16 +0530 | [diff] [blame] | 1967 | } while (buf_info.paddr); |
| 1968 | |
| 1969 | return rx_bufs_used; |
| 1970 | } |
| 1971 | |
| 1972 | /* |
| 1973 | * |
| 1974 | * dp_handle_wbm_internal_error() - handles wbm_internal_error case |
| 1975 | * |
| 1976 | * @soc: core DP main context |
| 1977 | * @hal_desc: hal descriptor |
| 1978 | * @buf_type: indicates if the buffer is of type link disc or msdu |
| 1979 | * Return: None |
| 1980 | * |
| 1981 | * wbm_internal_error is seen in following scenarios : |
| 1982 | * |
| 1983 | * 1. Null pointers detected in WBM_RELEASE_RING descriptors |
| 1984 | * 2. Null pointers detected during delinking process |
| 1985 | * |
| 1986 | * Some null pointer cases: |
| 1987 | * |
| 1988 | * a. MSDU buffer pointer is NULL |
| 1989 | * b. Next_MSDU_Link_Desc pointer is NULL, with no last msdu flag |
| 1990 | * c. MSDU buffer pointer is NULL or Next_Link_Desc pointer is NULL |
| 1991 | */ |
| 1992 | void |
| 1993 | dp_handle_wbm_internal_error(struct dp_soc *soc, void *hal_desc, |
| 1994 | uint32_t buf_type) |
| 1995 | { |
| 1996 | struct hal_buf_info buf_info = {0}; |
| 1997 | struct dp_pdev *dp_pdev; |
| 1998 | struct dp_rx_desc *rx_desc = NULL; |
| 1999 | uint32_t rx_buf_cookie; |
| 2000 | uint32_t rx_bufs_reaped = 0; |
| 2001 | union dp_rx_desc_list_elem_t *head = NULL; |
| 2002 | union dp_rx_desc_list_elem_t *tail = NULL; |
| 2003 | uint8_t pool_id; |
| 2004 | |
| 2005 | hal_rx_reo_buf_paddr_get(hal_desc, &buf_info); |
| 2006 | |
| 2007 | if (!buf_info.paddr) { |
| 2008 | DP_STATS_INC(soc, tx.wbm_internal_error[WBM_INT_ERROR_REO_NULL_BUFFER], 1); |
| 2009 | return; |
| 2010 | } |
| 2011 | |
| 2012 | rx_buf_cookie = HAL_RX_REO_BUF_COOKIE_GET(hal_desc); |
| 2013 | pool_id = DP_RX_DESC_COOKIE_POOL_ID_GET(rx_buf_cookie); |
| 2014 | |
| 2015 | if (buf_type == HAL_WBM_RELEASE_RING_2_BUFFER_TYPE) { |
| 2016 | DP_STATS_INC(soc, tx.wbm_internal_error[WBM_INT_ERROR_REO_NULL_MSDU_BUFF], 1); |
| 2017 | rx_desc = dp_rx_cookie_2_va_rxdma_buf(soc, rx_buf_cookie); |
| 2018 | |
| 2019 | if (rx_desc && rx_desc->nbuf) { |
| 2020 | qdf_nbuf_unmap_single(soc->osdev, rx_desc->nbuf, |
| 2021 | QDF_DMA_FROM_DEVICE); |
| 2022 | |
| 2023 | rx_desc->unmapped = 1; |
| 2024 | |
| 2025 | qdf_nbuf_free(rx_desc->nbuf); |
| 2026 | dp_rx_add_to_free_desc_list(&head, |
| 2027 | &tail, |
| 2028 | rx_desc); |
| 2029 | |
| 2030 | rx_bufs_reaped++; |
| 2031 | } |
| 2032 | } else if (buf_type == HAL_WBM_RELEASE_RING_2_DESC_TYPE) { |
| 2033 | rx_bufs_reaped = dp_wbm_int_err_mpdu_pop(soc, pool_id, |
| 2034 | hal_desc, |
| 2035 | &head, &tail); |
| 2036 | } |
| 2037 | |
| 2038 | if (rx_bufs_reaped) { |
| 2039 | struct rx_desc_pool *rx_desc_pool; |
| 2040 | struct dp_srng *dp_rxdma_srng; |
| 2041 | |
| 2042 | DP_STATS_INC(soc, tx.wbm_internal_error[WBM_INT_ERROR_REO_BUFF_REAPED], 1); |
| 2043 | dp_pdev = soc->pdev_list[pool_id]; |
| 2044 | dp_rxdma_srng = &dp_pdev->rx_refill_buf_ring; |
| 2045 | rx_desc_pool = &soc->rx_desc_buf[pool_id]; |
| 2046 | |
| 2047 | dp_rx_buffers_replenish(soc, pool_id, dp_rxdma_srng, |
| 2048 | rx_desc_pool, |
| 2049 | rx_bufs_reaped, |
| 2050 | &head, &tail); |
| 2051 | } |
| 2052 | } |