2 * Copyright (c) 2005-2011 Atheros Communications Inc.
3 * Copyright (c) 2011-2013 Qualcomm Atheros, Inc.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
26 #include <linux/log2.h>
28 /* slightly larger than one large A-MPDU */
29 #define HTT_RX_RING_SIZE_MIN 128
31 /* roughly 20 ms @ 1 Gbps of 1500B MSDUs */
32 #define HTT_RX_RING_SIZE_MAX 2048
34 #define HTT_RX_AVG_FRM_BYTES 1000
36 /* ms, very conservative */
37 #define HTT_RX_HOST_LATENCY_MAX_MS 20
39 /* ms, conservative */
40 #define HTT_RX_HOST_LATENCY_WORST_LIKELY_MS 10
42 /* when under memory pressure rx ring refill may fail and needs a retry */
43 #define HTT_RX_RING_REFILL_RETRY_MS 50
45 static int ath10k_htt_rx_get_csum_state(struct sk_buff *skb);
46 static void ath10k_htt_txrx_compl_task(unsigned long ptr);
48 static int ath10k_htt_rx_ring_size(struct ath10k_htt *htt)
53 * It is expected that the host CPU will typically be able to
54 * service the rx indication from one A-MPDU before the rx
55 * indication from the subsequent A-MPDU happens, roughly 1-2 ms
56 * later. However, the rx ring should be sized very conservatively,
57 * to accomodate the worst reasonable delay before the host CPU
58 * services a rx indication interrupt.
60 * The rx ring need not be kept full of empty buffers. In theory,
61 * the htt host SW can dynamically track the low-water mark in the
62 * rx ring, and dynamically adjust the level to which the rx ring
63 * is filled with empty buffers, to dynamically meet the desired
66 * In contrast, it's difficult to resize the rx ring itself, once
67 * it's in use. Thus, the ring itself should be sized very
68 * conservatively, while the degree to which the ring is filled
69 * with empty buffers should be sized moderately conservatively.
72 /* 1e6 bps/mbps / 1e3 ms per sec = 1000 */
74 htt->max_throughput_mbps +
76 (8 * HTT_RX_AVG_FRM_BYTES) * HTT_RX_HOST_LATENCY_MAX_MS;
78 if (size < HTT_RX_RING_SIZE_MIN)
79 size = HTT_RX_RING_SIZE_MIN;
81 if (size > HTT_RX_RING_SIZE_MAX)
82 size = HTT_RX_RING_SIZE_MAX;
84 size = roundup_pow_of_two(size);
89 static int ath10k_htt_rx_ring_fill_level(struct ath10k_htt *htt)
93 /* 1e6 bps/mbps / 1e3 ms per sec = 1000 */
95 htt->max_throughput_mbps *
97 (8 * HTT_RX_AVG_FRM_BYTES) * HTT_RX_HOST_LATENCY_WORST_LIKELY_MS;
100 * Make sure the fill level is at least 1 less than the ring size.
101 * Leaving 1 element empty allows the SW to easily distinguish
102 * between a full ring vs. an empty ring.
104 if (size >= htt->rx_ring.size)
105 size = htt->rx_ring.size - 1;
110 static void ath10k_htt_rx_ring_free(struct ath10k_htt *htt)
113 struct ath10k_skb_cb *cb;
116 for (i = 0; i < htt->rx_ring.fill_cnt; i++) {
117 skb = htt->rx_ring.netbufs_ring[i];
118 cb = ATH10K_SKB_CB(skb);
119 dma_unmap_single(htt->ar->dev, cb->paddr,
120 skb->len + skb_tailroom(skb),
122 dev_kfree_skb_any(skb);
125 htt->rx_ring.fill_cnt = 0;
128 static int __ath10k_htt_rx_ring_fill_n(struct ath10k_htt *htt, int num)
130 struct htt_rx_desc *rx_desc;
135 idx = __le32_to_cpu(*htt->rx_ring.alloc_idx.vaddr);
137 skb = dev_alloc_skb(HTT_RX_BUF_SIZE + HTT_RX_DESC_ALIGN);
143 if (!IS_ALIGNED((unsigned long)skb->data, HTT_RX_DESC_ALIGN))
145 PTR_ALIGN(skb->data, HTT_RX_DESC_ALIGN) -
148 /* Clear rx_desc attention word before posting to Rx ring */
149 rx_desc = (struct htt_rx_desc *)skb->data;
150 rx_desc->attention.flags = __cpu_to_le32(0);
152 paddr = dma_map_single(htt->ar->dev, skb->data,
153 skb->len + skb_tailroom(skb),
156 if (unlikely(dma_mapping_error(htt->ar->dev, paddr))) {
157 dev_kfree_skb_any(skb);
162 ATH10K_SKB_CB(skb)->paddr = paddr;
163 htt->rx_ring.netbufs_ring[idx] = skb;
164 htt->rx_ring.paddrs_ring[idx] = __cpu_to_le32(paddr);
165 htt->rx_ring.fill_cnt++;
169 idx &= htt->rx_ring.size_mask;
173 *htt->rx_ring.alloc_idx.vaddr = __cpu_to_le32(idx);
177 static int ath10k_htt_rx_ring_fill_n(struct ath10k_htt *htt, int num)
179 lockdep_assert_held(&htt->rx_ring.lock);
180 return __ath10k_htt_rx_ring_fill_n(htt, num);
183 static void ath10k_htt_rx_msdu_buff_replenish(struct ath10k_htt *htt)
185 int ret, num_deficit, num_to_fill;
187 /* Refilling the whole RX ring buffer proves to be a bad idea. The
188 * reason is RX may take up significant amount of CPU cycles and starve
189 * other tasks, e.g. TX on an ethernet device while acting as a bridge
190 * with ath10k wlan interface. This ended up with very poor performance
191 * once CPU the host system was overwhelmed with RX on ath10k.
193 * By limiting the number of refills the replenishing occurs
194 * progressively. This in turns makes use of the fact tasklets are
195 * processed in FIFO order. This means actual RX processing can starve
196 * out refilling. If there's not enough buffers on RX ring FW will not
197 * report RX until it is refilled with enough buffers. This
198 * automatically balances load wrt to CPU power.
200 * This probably comes at a cost of lower maximum throughput but
201 * improves the avarage and stability. */
202 spin_lock_bh(&htt->rx_ring.lock);
203 num_deficit = htt->rx_ring.fill_level - htt->rx_ring.fill_cnt;
204 num_to_fill = min(ATH10K_HTT_MAX_NUM_REFILL, num_deficit);
205 num_deficit -= num_to_fill;
206 ret = ath10k_htt_rx_ring_fill_n(htt, num_to_fill);
207 if (ret == -ENOMEM) {
209 * Failed to fill it to the desired level -
210 * we'll start a timer and try again next time.
211 * As long as enough buffers are left in the ring for
212 * another A-MPDU rx, no special recovery is needed.
214 mod_timer(&htt->rx_ring.refill_retry_timer, jiffies +
215 msecs_to_jiffies(HTT_RX_RING_REFILL_RETRY_MS));
216 } else if (num_deficit > 0) {
217 tasklet_schedule(&htt->rx_replenish_task);
219 spin_unlock_bh(&htt->rx_ring.lock);
222 static void ath10k_htt_rx_ring_refill_retry(unsigned long arg)
224 struct ath10k_htt *htt = (struct ath10k_htt *)arg;
226 ath10k_htt_rx_msdu_buff_replenish(htt);
229 static void ath10k_htt_rx_ring_clean_up(struct ath10k_htt *htt)
234 for (i = 0; i < htt->rx_ring.size; i++) {
235 skb = htt->rx_ring.netbufs_ring[i];
239 dma_unmap_single(htt->ar->dev, ATH10K_SKB_CB(skb)->paddr,
240 skb->len + skb_tailroom(skb),
242 dev_kfree_skb_any(skb);
243 htt->rx_ring.netbufs_ring[i] = NULL;
247 void ath10k_htt_rx_free(struct ath10k_htt *htt)
249 del_timer_sync(&htt->rx_ring.refill_retry_timer);
250 tasklet_kill(&htt->rx_replenish_task);
251 tasklet_kill(&htt->txrx_compl_task);
253 skb_queue_purge(&htt->tx_compl_q);
254 skb_queue_purge(&htt->rx_compl_q);
256 ath10k_htt_rx_ring_clean_up(htt);
258 dma_free_coherent(htt->ar->dev,
260 sizeof(htt->rx_ring.paddrs_ring)),
261 htt->rx_ring.paddrs_ring,
262 htt->rx_ring.base_paddr);
264 dma_free_coherent(htt->ar->dev,
265 sizeof(*htt->rx_ring.alloc_idx.vaddr),
266 htt->rx_ring.alloc_idx.vaddr,
267 htt->rx_ring.alloc_idx.paddr);
269 kfree(htt->rx_ring.netbufs_ring);
272 static inline struct sk_buff *ath10k_htt_rx_netbuf_pop(struct ath10k_htt *htt)
274 struct ath10k *ar = htt->ar;
276 struct sk_buff *msdu;
278 lockdep_assert_held(&htt->rx_ring.lock);
280 if (htt->rx_ring.fill_cnt == 0) {
281 ath10k_warn(ar, "tried to pop sk_buff from an empty rx ring\n");
285 idx = htt->rx_ring.sw_rd_idx.msdu_payld;
286 msdu = htt->rx_ring.netbufs_ring[idx];
287 htt->rx_ring.netbufs_ring[idx] = NULL;
290 idx &= htt->rx_ring.size_mask;
291 htt->rx_ring.sw_rd_idx.msdu_payld = idx;
292 htt->rx_ring.fill_cnt--;
294 trace_ath10k_htt_rx_pop_msdu(ar, msdu->data, msdu->len +
300 static void ath10k_htt_rx_free_msdu_chain(struct sk_buff *skb)
302 struct sk_buff *next;
306 dev_kfree_skb_any(skb);
311 /* return: < 0 fatal error, 0 - non chained msdu, 1 chained msdu */
312 static int ath10k_htt_rx_amsdu_pop(struct ath10k_htt *htt,
313 u8 **fw_desc, int *fw_desc_len,
314 struct sk_buff **head_msdu,
315 struct sk_buff **tail_msdu,
318 struct ath10k *ar = htt->ar;
319 int msdu_len, msdu_chaining = 0;
320 struct sk_buff *msdu, *next;
321 struct htt_rx_desc *rx_desc;
324 lockdep_assert_held(&htt->rx_ring.lock);
326 if (htt->rx_confused) {
327 ath10k_warn(ar, "htt is confused. refusing rx\n");
331 msdu = *head_msdu = ath10k_htt_rx_netbuf_pop(htt);
333 int last_msdu, msdu_len_invalid, msdu_chained;
335 dma_unmap_single(htt->ar->dev,
336 ATH10K_SKB_CB(msdu)->paddr,
337 msdu->len + skb_tailroom(msdu),
340 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL, "htt rx pop: ",
341 msdu->data, msdu->len + skb_tailroom(msdu));
343 rx_desc = (struct htt_rx_desc *)msdu->data;
345 /* FIXME: we must report msdu payload since this is what caller
347 skb_put(msdu, offsetof(struct htt_rx_desc, msdu_payload));
348 skb_pull(msdu, offsetof(struct htt_rx_desc, msdu_payload));
351 * Sanity check - confirm the HW is finished filling in the
353 * If the HW and SW are working correctly, then it's guaranteed
354 * that the HW's MAC DMA is done before this point in the SW.
355 * To prevent the case that we handle a stale Rx descriptor,
356 * just assert for now until we have a way to recover.
358 if (!(__le32_to_cpu(rx_desc->attention.flags)
359 & RX_ATTENTION_FLAGS_MSDU_DONE)) {
360 ath10k_htt_rx_free_msdu_chain(*head_msdu);
363 ath10k_err(ar, "htt rx stopped. cannot recover\n");
364 htt->rx_confused = true;
368 *attention |= __le32_to_cpu(rx_desc->attention.flags) &
369 (RX_ATTENTION_FLAGS_TKIP_MIC_ERR |
370 RX_ATTENTION_FLAGS_DECRYPT_ERR |
371 RX_ATTENTION_FLAGS_FCS_ERR |
372 RX_ATTENTION_FLAGS_MGMT_TYPE);
374 * Copy the FW rx descriptor for this MSDU from the rx
375 * indication message into the MSDU's netbuf. HL uses the
376 * same rx indication message definition as LL, and simply
377 * appends new info (fields from the HW rx desc, and the
378 * MSDU payload itself). So, the offset into the rx
379 * indication message only has to account for the standard
380 * offset of the per-MSDU FW rx desc info within the
381 * message, and how many bytes of the per-MSDU FW rx desc
382 * info have already been consumed. (And the endianness of
383 * the host, since for a big-endian host, the rx ind
384 * message contents, including the per-MSDU rx desc bytes,
385 * were byteswapped during upload.)
387 if (*fw_desc_len > 0) {
388 rx_desc->fw_desc.info0 = **fw_desc;
390 * The target is expected to only provide the basic
391 * per-MSDU rx descriptors. Just to be sure, verify
392 * that the target has not attached extension data
393 * (e.g. LRO flow ID).
396 /* or more, if there's extension data */
401 * When an oversized AMSDU happened, FW will lost
402 * some of MSDU status - in this case, the FW
403 * descriptors provided will be less than the
404 * actual MSDUs inside this MPDU. Mark the FW
405 * descriptors so that it will still deliver to
406 * upper stack, if no CRC error for this MPDU.
408 * FIX THIS - the FW descriptors are actually for
409 * MSDUs in the end of this A-MSDU instead of the
412 rx_desc->fw_desc.info0 = 0;
415 msdu_len_invalid = !!(__le32_to_cpu(rx_desc->attention.flags)
416 & (RX_ATTENTION_FLAGS_MPDU_LENGTH_ERR |
417 RX_ATTENTION_FLAGS_MSDU_LENGTH_ERR));
418 msdu_len = MS(__le32_to_cpu(rx_desc->msdu_start.info0),
419 RX_MSDU_START_INFO0_MSDU_LENGTH);
420 msdu_chained = rx_desc->frag_info.ring2_more_count;
422 if (msdu_len_invalid)
426 skb_put(msdu, min(msdu_len, HTT_RX_MSDU_SIZE));
427 msdu_len -= msdu->len;
429 /* FIXME: Do chained buffers include htt_rx_desc or not? */
430 while (msdu_chained--) {
431 struct sk_buff *next = ath10k_htt_rx_netbuf_pop(htt);
433 dma_unmap_single(htt->ar->dev,
434 ATH10K_SKB_CB(next)->paddr,
435 next->len + skb_tailroom(next),
438 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL,
439 "htt rx chained: ", next->data,
440 next->len + skb_tailroom(next));
443 skb_put(next, min(msdu_len, HTT_RX_BUF_SIZE));
444 msdu_len -= next->len;
451 last_msdu = __le32_to_cpu(rx_desc->msdu_end.info0) &
452 RX_MSDU_END_INFO0_LAST_MSDU;
454 tsf = __le32_to_cpu(rx_desc->ppdu_end.tsf_timestamp);
455 trace_ath10k_htt_rx_desc(ar, tsf, &rx_desc->attention,
456 sizeof(*rx_desc) - sizeof(u32));
462 next = ath10k_htt_rx_netbuf_pop(htt);
468 if (*head_msdu == NULL)
472 * Don't refill the ring yet.
474 * First, the elements popped here are still in use - it is not
475 * safe to overwrite them until the matching call to
476 * mpdu_desc_list_next. Second, for efficiency it is preferable to
477 * refill the rx ring with 1 PPDU's worth of rx buffers (something
478 * like 32 x 3 buffers), rather than one MPDU's worth of rx buffers
479 * (something like 3 buffers). Consequently, we'll rely on the txrx
480 * SW to tell us when it is done pulling all the PPDU's rx buffers
481 * out of the rx ring, and then refill it just once.
484 return msdu_chaining;
487 static void ath10k_htt_rx_replenish_task(unsigned long ptr)
489 struct ath10k_htt *htt = (struct ath10k_htt *)ptr;
491 ath10k_htt_rx_msdu_buff_replenish(htt);
494 int ath10k_htt_rx_alloc(struct ath10k_htt *htt)
496 struct ath10k *ar = htt->ar;
500 struct timer_list *timer = &htt->rx_ring.refill_retry_timer;
502 htt->rx_ring.size = ath10k_htt_rx_ring_size(htt);
503 if (!is_power_of_2(htt->rx_ring.size)) {
504 ath10k_warn(ar, "htt rx ring size is not power of 2\n");
508 htt->rx_ring.size_mask = htt->rx_ring.size - 1;
511 * Set the initial value for the level to which the rx ring
512 * should be filled, based on the max throughput and the
513 * worst likely latency for the host to fill the rx ring
514 * with new buffers. In theory, this fill level can be
515 * dynamically adjusted from the initial value set here, to
516 * reflect the actual host latency rather than a
517 * conservative assumption about the host latency.
519 htt->rx_ring.fill_level = ath10k_htt_rx_ring_fill_level(htt);
521 htt->rx_ring.netbufs_ring =
522 kzalloc(htt->rx_ring.size * sizeof(struct sk_buff *),
524 if (!htt->rx_ring.netbufs_ring)
527 size = htt->rx_ring.size * sizeof(htt->rx_ring.paddrs_ring);
529 vaddr = dma_alloc_coherent(htt->ar->dev, size, &paddr, GFP_DMA);
533 htt->rx_ring.paddrs_ring = vaddr;
534 htt->rx_ring.base_paddr = paddr;
536 vaddr = dma_alloc_coherent(htt->ar->dev,
537 sizeof(*htt->rx_ring.alloc_idx.vaddr),
542 htt->rx_ring.alloc_idx.vaddr = vaddr;
543 htt->rx_ring.alloc_idx.paddr = paddr;
544 htt->rx_ring.sw_rd_idx.msdu_payld = 0;
545 *htt->rx_ring.alloc_idx.vaddr = 0;
547 /* Initialize the Rx refill retry timer */
548 setup_timer(timer, ath10k_htt_rx_ring_refill_retry, (unsigned long)htt);
550 spin_lock_init(&htt->rx_ring.lock);
552 htt->rx_ring.fill_cnt = 0;
553 if (__ath10k_htt_rx_ring_fill_n(htt, htt->rx_ring.fill_level))
556 tasklet_init(&htt->rx_replenish_task, ath10k_htt_rx_replenish_task,
559 skb_queue_head_init(&htt->tx_compl_q);
560 skb_queue_head_init(&htt->rx_compl_q);
562 tasklet_init(&htt->txrx_compl_task, ath10k_htt_txrx_compl_task,
565 ath10k_dbg(ar, ATH10K_DBG_BOOT, "htt rx ring size %d fill_level %d\n",
566 htt->rx_ring.size, htt->rx_ring.fill_level);
570 ath10k_htt_rx_ring_free(htt);
571 dma_free_coherent(htt->ar->dev,
572 sizeof(*htt->rx_ring.alloc_idx.vaddr),
573 htt->rx_ring.alloc_idx.vaddr,
574 htt->rx_ring.alloc_idx.paddr);
576 dma_free_coherent(htt->ar->dev,
578 sizeof(htt->rx_ring.paddrs_ring)),
579 htt->rx_ring.paddrs_ring,
580 htt->rx_ring.base_paddr);
582 kfree(htt->rx_ring.netbufs_ring);
587 static int ath10k_htt_rx_crypto_param_len(struct ath10k *ar,
588 enum htt_rx_mpdu_encrypt_type type)
591 case HTT_RX_MPDU_ENCRYPT_WEP40:
592 case HTT_RX_MPDU_ENCRYPT_WEP104:
594 case HTT_RX_MPDU_ENCRYPT_TKIP_WITHOUT_MIC:
595 case HTT_RX_MPDU_ENCRYPT_WEP128: /* not tested */
596 case HTT_RX_MPDU_ENCRYPT_TKIP_WPA:
597 case HTT_RX_MPDU_ENCRYPT_WAPI: /* not tested */
598 case HTT_RX_MPDU_ENCRYPT_AES_CCM_WPA2:
600 case HTT_RX_MPDU_ENCRYPT_NONE:
604 ath10k_warn(ar, "unknown encryption type %d\n", type);
608 static int ath10k_htt_rx_crypto_tail_len(struct ath10k *ar,
609 enum htt_rx_mpdu_encrypt_type type)
612 case HTT_RX_MPDU_ENCRYPT_NONE:
613 case HTT_RX_MPDU_ENCRYPT_WEP40:
614 case HTT_RX_MPDU_ENCRYPT_WEP104:
615 case HTT_RX_MPDU_ENCRYPT_WEP128:
616 case HTT_RX_MPDU_ENCRYPT_WAPI:
618 case HTT_RX_MPDU_ENCRYPT_TKIP_WITHOUT_MIC:
619 case HTT_RX_MPDU_ENCRYPT_TKIP_WPA:
621 case HTT_RX_MPDU_ENCRYPT_AES_CCM_WPA2:
625 ath10k_warn(ar, "unknown encryption type %d\n", type);
629 /* Applies for first msdu in chain, before altering it. */
630 static struct ieee80211_hdr *ath10k_htt_rx_skb_get_hdr(struct sk_buff *skb)
632 struct htt_rx_desc *rxd;
633 enum rx_msdu_decap_format fmt;
635 rxd = (void *)skb->data - sizeof(*rxd);
636 fmt = MS(__le32_to_cpu(rxd->msdu_start.info1),
637 RX_MSDU_START_INFO1_DECAP_FORMAT);
639 if (fmt == RX_MSDU_DECAP_RAW)
640 return (void *)skb->data;
642 return (void *)skb->data - RX_HTT_HDR_STATUS_LEN;
645 /* This function only applies for first msdu in an msdu chain */
646 static bool ath10k_htt_rx_hdr_is_amsdu(struct ieee80211_hdr *hdr)
650 if (ieee80211_is_data_qos(hdr->frame_control)) {
651 qc = ieee80211_get_qos_ctl(hdr);
666 struct amsdu_subframe_hdr {
672 static const u8 rx_legacy_rate_idx[] = {
673 3, /* 0x00 - 11Mbps */
674 2, /* 0x01 - 5.5Mbps */
675 1, /* 0x02 - 2Mbps */
676 0, /* 0x03 - 1Mbps */
677 3, /* 0x04 - 11Mbps */
678 2, /* 0x05 - 5.5Mbps */
679 1, /* 0x06 - 2Mbps */
680 0, /* 0x07 - 1Mbps */
681 10, /* 0x08 - 48Mbps */
682 8, /* 0x09 - 24Mbps */
683 6, /* 0x0A - 12Mbps */
684 4, /* 0x0B - 6Mbps */
685 11, /* 0x0C - 54Mbps */
686 9, /* 0x0D - 36Mbps */
687 7, /* 0x0E - 18Mbps */
688 5, /* 0x0F - 9Mbps */
691 static void ath10k_htt_rx_h_rates(struct ath10k *ar,
692 enum ieee80211_band band,
693 u8 info0, u32 info1, u32 info2,
694 struct ieee80211_rx_status *status)
696 u8 cck, rate, rate_idx, bw, sgi, mcs, nss;
699 /* Check if valid fields */
700 if (!(info0 & HTT_RX_INDICATION_INFO0_START_VALID))
703 preamble = MS(info1, HTT_RX_INDICATION_INFO1_PREAMBLE_TYPE);
707 cck = info0 & HTT_RX_INDICATION_INFO0_LEGACY_RATE_CCK;
708 rate = MS(info0, HTT_RX_INDICATION_INFO0_LEGACY_RATE);
711 if (rate < 0x08 || rate > 0x0F)
715 case IEEE80211_BAND_2GHZ:
718 rate_idx = rx_legacy_rate_idx[rate];
720 case IEEE80211_BAND_5GHZ:
721 rate_idx = rx_legacy_rate_idx[rate];
722 /* We are using same rate table registering
723 HW - ath10k_rates[]. In case of 5GHz skip
724 CCK rates, so -4 here */
731 status->rate_idx = rate_idx;
734 case HTT_RX_HT_WITH_TXBF:
735 /* HT-SIG - Table 20-11 in info1 and info2 */
738 bw = (info1 >> 7) & 1;
739 sgi = (info2 >> 7) & 1;
741 status->rate_idx = mcs;
742 status->flag |= RX_FLAG_HT;
744 status->flag |= RX_FLAG_SHORT_GI;
746 status->flag |= RX_FLAG_40MHZ;
749 case HTT_RX_VHT_WITH_TXBF:
750 /* VHT-SIG-A1 in info 1, VHT-SIG-A2 in info2
752 mcs = (info2 >> 4) & 0x0F;
753 nss = ((info1 >> 10) & 0x07) + 1;
757 status->rate_idx = mcs;
758 status->vht_nss = nss;
761 status->flag |= RX_FLAG_SHORT_GI;
769 status->flag |= RX_FLAG_40MHZ;
773 status->vht_flag |= RX_VHT_FLAG_80MHZ;
776 status->flag |= RX_FLAG_VHT;
783 static void ath10k_htt_rx_h_protected(struct ath10k_htt *htt,
784 struct ieee80211_rx_status *rx_status,
786 enum htt_rx_mpdu_encrypt_type enctype,
787 enum rx_msdu_decap_format fmt,
790 struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
792 rx_status->flag &= ~(RX_FLAG_DECRYPTED |
793 RX_FLAG_IV_STRIPPED |
794 RX_FLAG_MMIC_STRIPPED);
796 if (enctype == HTT_RX_MPDU_ENCRYPT_NONE)
800 * There's no explicit rx descriptor flag to indicate whether a given
801 * frame has been decrypted or not. We're forced to use the decap
802 * format as an implicit indication. However fragmentation rx is always
803 * raw and it probably never reports undecrypted raws.
805 * This makes sure sniffed frames are reported as-is without stripping
806 * the protected flag.
808 if (fmt == RX_MSDU_DECAP_RAW && !dot11frag)
811 rx_status->flag |= RX_FLAG_DECRYPTED |
812 RX_FLAG_IV_STRIPPED |
813 RX_FLAG_MMIC_STRIPPED;
814 hdr->frame_control = __cpu_to_le16(__le16_to_cpu(hdr->frame_control) &
815 ~IEEE80211_FCTL_PROTECTED);
818 static bool ath10k_htt_rx_h_channel(struct ath10k *ar,
819 struct ieee80211_rx_status *status)
821 struct ieee80211_channel *ch;
823 spin_lock_bh(&ar->data_lock);
824 ch = ar->scan_channel;
827 spin_unlock_bh(&ar->data_lock);
832 status->band = ch->band;
833 status->freq = ch->center_freq;
838 static const char * const tid_to_ac[] = {
849 static char *ath10k_get_tid(struct ieee80211_hdr *hdr, char *out, size_t size)
854 if (!ieee80211_is_data_qos(hdr->frame_control))
857 qc = ieee80211_get_qos_ctl(hdr);
858 tid = *qc & IEEE80211_QOS_CTL_TID_MASK;
860 snprintf(out, size, "tid %d (%s)", tid, tid_to_ac[tid]);
862 snprintf(out, size, "tid %d", tid);
867 static void ath10k_process_rx(struct ath10k *ar,
868 struct ieee80211_rx_status *rx_status,
871 struct ieee80211_rx_status *status;
872 struct ieee80211_hdr *hdr = (struct ieee80211_hdr *)skb->data;
875 status = IEEE80211_SKB_RXCB(skb);
876 *status = *rx_status;
878 ath10k_dbg(ar, ATH10K_DBG_DATA,
879 "rx skb %p len %u peer %pM %s %s sn %u %s%s%s%s%s %srate_idx %u vht_nss %u freq %u band %u flag 0x%x fcs-err %i mic-err %i amsdu-more %i\n",
882 ieee80211_get_SA(hdr),
883 ath10k_get_tid(hdr, tid, sizeof(tid)),
884 is_multicast_ether_addr(ieee80211_get_DA(hdr)) ?
886 (__le16_to_cpu(hdr->seq_ctrl) & IEEE80211_SCTL_SEQ) >> 4,
887 status->flag == 0 ? "legacy" : "",
888 status->flag & RX_FLAG_HT ? "ht" : "",
889 status->flag & RX_FLAG_VHT ? "vht" : "",
890 status->flag & RX_FLAG_40MHZ ? "40" : "",
891 status->vht_flag & RX_VHT_FLAG_80MHZ ? "80" : "",
892 status->flag & RX_FLAG_SHORT_GI ? "sgi " : "",
896 status->band, status->flag,
897 !!(status->flag & RX_FLAG_FAILED_FCS_CRC),
898 !!(status->flag & RX_FLAG_MMIC_ERROR),
899 !!(status->flag & RX_FLAG_AMSDU_MORE));
900 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL, "rx skb: ",
901 skb->data, skb->len);
903 ieee80211_rx(ar->hw, skb);
906 static int ath10k_htt_rx_nwifi_hdrlen(struct ieee80211_hdr *hdr)
908 /* nwifi header is padded to 4 bytes. this fixes 4addr rx */
909 return round_up(ieee80211_hdrlen(hdr->frame_control), 4);
912 static void ath10k_htt_rx_amsdu(struct ath10k_htt *htt,
913 struct ieee80211_rx_status *rx_status,
914 struct sk_buff *skb_in)
916 struct ath10k *ar = htt->ar;
917 struct htt_rx_desc *rxd;
918 struct sk_buff *skb = skb_in;
919 struct sk_buff *first;
920 enum rx_msdu_decap_format fmt;
921 enum htt_rx_mpdu_encrypt_type enctype;
922 struct ieee80211_hdr *hdr;
923 u8 hdr_buf[64], da[ETH_ALEN], sa[ETH_ALEN], *qos;
924 unsigned int hdr_len;
926 rxd = (void *)skb->data - sizeof(*rxd);
927 enctype = MS(__le32_to_cpu(rxd->mpdu_start.info0),
928 RX_MPDU_START_INFO0_ENCRYPT_TYPE);
930 hdr = (struct ieee80211_hdr *)rxd->rx_hdr_status;
931 hdr_len = ieee80211_hdrlen(hdr->frame_control);
932 memcpy(hdr_buf, hdr, hdr_len);
933 hdr = (struct ieee80211_hdr *)hdr_buf;
940 rxd = (void *)skb->data - sizeof(*rxd);
941 fmt = MS(__le32_to_cpu(rxd->msdu_start.info1),
942 RX_MSDU_START_INFO1_DECAP_FORMAT);
943 decap_hdr = (void *)rxd->rx_hdr_status;
945 skb->ip_summed = ath10k_htt_rx_get_csum_state(skb);
947 /* First frame in an A-MSDU chain has more decapped data. */
949 len = round_up(ieee80211_hdrlen(hdr->frame_control), 4);
950 len += round_up(ath10k_htt_rx_crypto_param_len(ar,
956 case RX_MSDU_DECAP_RAW:
957 /* remove trailing FCS */
958 skb_trim(skb, skb->len - FCS_LEN);
960 case RX_MSDU_DECAP_NATIVE_WIFI:
961 /* pull decapped header and copy SA & DA */
962 hdr = (struct ieee80211_hdr *)skb->data;
963 hdr_len = ath10k_htt_rx_nwifi_hdrlen(hdr);
964 ether_addr_copy(da, ieee80211_get_DA(hdr));
965 ether_addr_copy(sa, ieee80211_get_SA(hdr));
966 skb_pull(skb, hdr_len);
968 /* push original 802.11 header */
969 hdr = (struct ieee80211_hdr *)hdr_buf;
970 hdr_len = ieee80211_hdrlen(hdr->frame_control);
971 memcpy(skb_push(skb, hdr_len), hdr, hdr_len);
973 /* original A-MSDU header has the bit set but we're
974 * not including A-MSDU subframe header */
975 hdr = (struct ieee80211_hdr *)skb->data;
976 qos = ieee80211_get_qos_ctl(hdr);
977 qos[0] &= ~IEEE80211_QOS_CTL_A_MSDU_PRESENT;
979 /* original 802.11 header has a different DA and in
980 * case of 4addr it may also have different SA
982 ether_addr_copy(ieee80211_get_DA(hdr), da);
983 ether_addr_copy(ieee80211_get_SA(hdr), sa);
985 case RX_MSDU_DECAP_ETHERNET2_DIX:
986 /* strip ethernet header and insert decapped 802.11
987 * header, amsdu subframe header and rfc1042 header */
990 len += sizeof(struct rfc1042_hdr);
991 len += sizeof(struct amsdu_subframe_hdr);
993 skb_pull(skb, sizeof(struct ethhdr));
994 memcpy(skb_push(skb, len), decap_hdr, len);
995 memcpy(skb_push(skb, hdr_len), hdr, hdr_len);
997 case RX_MSDU_DECAP_8023_SNAP_LLC:
998 /* insert decapped 802.11 header making a singly
1000 memcpy(skb_push(skb, hdr_len), hdr, hdr_len);
1005 ath10k_htt_rx_h_protected(htt, rx_status, skb_in, enctype, fmt,
1008 skb_in->next = NULL;
1011 rx_status->flag |= RX_FLAG_AMSDU_MORE;
1013 rx_status->flag &= ~RX_FLAG_AMSDU_MORE;
1015 ath10k_process_rx(htt->ar, rx_status, skb_in);
1018 /* FIXME: It might be nice to re-assemble the A-MSDU when there's a
1019 * monitor interface active for sniffing purposes. */
1022 static void ath10k_htt_rx_msdu(struct ath10k_htt *htt,
1023 struct ieee80211_rx_status *rx_status,
1024 struct sk_buff *skb)
1026 struct ath10k *ar = htt->ar;
1027 struct htt_rx_desc *rxd;
1028 struct ieee80211_hdr *hdr;
1029 enum rx_msdu_decap_format fmt;
1030 enum htt_rx_mpdu_encrypt_type enctype;
1034 /* This shouldn't happen. If it does than it may be a FW bug. */
1036 ath10k_warn(ar, "htt rx received chained non A-MSDU frame\n");
1037 ath10k_htt_rx_free_msdu_chain(skb->next);
1041 rxd = (void *)skb->data - sizeof(*rxd);
1042 fmt = MS(__le32_to_cpu(rxd->msdu_start.info1),
1043 RX_MSDU_START_INFO1_DECAP_FORMAT);
1044 enctype = MS(__le32_to_cpu(rxd->mpdu_start.info0),
1045 RX_MPDU_START_INFO0_ENCRYPT_TYPE);
1046 hdr = (struct ieee80211_hdr *)rxd->rx_hdr_status;
1047 hdr_len = ieee80211_hdrlen(hdr->frame_control);
1049 skb->ip_summed = ath10k_htt_rx_get_csum_state(skb);
1052 case RX_MSDU_DECAP_RAW:
1053 /* remove trailing FCS */
1054 skb_trim(skb, skb->len - FCS_LEN);
1056 case RX_MSDU_DECAP_NATIVE_WIFI:
1057 /* Pull decapped header */
1058 hdr = (struct ieee80211_hdr *)skb->data;
1059 hdr_len = ath10k_htt_rx_nwifi_hdrlen(hdr);
1060 skb_pull(skb, hdr_len);
1062 /* Push original header */
1063 hdr = (struct ieee80211_hdr *)rxd->rx_hdr_status;
1064 hdr_len = ieee80211_hdrlen(hdr->frame_control);
1065 memcpy(skb_push(skb, hdr_len), hdr, hdr_len);
1067 case RX_MSDU_DECAP_ETHERNET2_DIX:
1068 /* strip ethernet header and insert decapped 802.11 header and
1072 rfc1042 += roundup(hdr_len, 4);
1073 rfc1042 += roundup(ath10k_htt_rx_crypto_param_len(ar,
1076 skb_pull(skb, sizeof(struct ethhdr));
1077 memcpy(skb_push(skb, sizeof(struct rfc1042_hdr)),
1078 rfc1042, sizeof(struct rfc1042_hdr));
1079 memcpy(skb_push(skb, hdr_len), hdr, hdr_len);
1081 case RX_MSDU_DECAP_8023_SNAP_LLC:
1082 /* remove A-MSDU subframe header and insert
1083 * decapped 802.11 header. rfc1042 header is already there */
1085 skb_pull(skb, sizeof(struct amsdu_subframe_hdr));
1086 memcpy(skb_push(skb, hdr_len), hdr, hdr_len);
1090 ath10k_htt_rx_h_protected(htt, rx_status, skb, enctype, fmt, false);
1092 ath10k_process_rx(htt->ar, rx_status, skb);
1095 static int ath10k_htt_rx_get_csum_state(struct sk_buff *skb)
1097 struct htt_rx_desc *rxd;
1099 bool is_ip4, is_ip6;
1100 bool is_tcp, is_udp;
1101 bool ip_csum_ok, tcpudp_csum_ok;
1103 rxd = (void *)skb->data - sizeof(*rxd);
1104 flags = __le32_to_cpu(rxd->attention.flags);
1105 info = __le32_to_cpu(rxd->msdu_start.info1);
1107 is_ip4 = !!(info & RX_MSDU_START_INFO1_IPV4_PROTO);
1108 is_ip6 = !!(info & RX_MSDU_START_INFO1_IPV6_PROTO);
1109 is_tcp = !!(info & RX_MSDU_START_INFO1_TCP_PROTO);
1110 is_udp = !!(info & RX_MSDU_START_INFO1_UDP_PROTO);
1111 ip_csum_ok = !(flags & RX_ATTENTION_FLAGS_IP_CHKSUM_FAIL);
1112 tcpudp_csum_ok = !(flags & RX_ATTENTION_FLAGS_TCP_UDP_CHKSUM_FAIL);
1114 if (!is_ip4 && !is_ip6)
1115 return CHECKSUM_NONE;
1116 if (!is_tcp && !is_udp)
1117 return CHECKSUM_NONE;
1119 return CHECKSUM_NONE;
1120 if (!tcpudp_csum_ok)
1121 return CHECKSUM_NONE;
1123 return CHECKSUM_UNNECESSARY;
1126 static int ath10k_unchain_msdu(struct sk_buff *msdu_head)
1128 struct sk_buff *next = msdu_head->next;
1129 struct sk_buff *to_free = next;
1133 /* TODO: Might could optimize this by using
1134 * skb_try_coalesce or similar method to
1135 * decrease copying, or maybe get mac80211 to
1136 * provide a way to just receive a list of
1140 msdu_head->next = NULL;
1142 /* Allocate total length all at once. */
1144 total_len += next->len;
1148 space = total_len - skb_tailroom(msdu_head);
1150 (pskb_expand_head(msdu_head, 0, space, GFP_ATOMIC) < 0)) {
1151 /* TODO: bump some rx-oom error stat */
1152 /* put it back together so we can free the
1153 * whole list at once.
1155 msdu_head->next = to_free;
1159 /* Walk list again, copying contents into
1164 skb_copy_from_linear_data(next, skb_put(msdu_head, next->len),
1169 /* If here, we have consolidated skb. Free the
1170 * fragments and pass the main skb on up the
1173 ath10k_htt_rx_free_msdu_chain(to_free);
1177 static bool ath10k_htt_rx_amsdu_allowed(struct ath10k_htt *htt,
1178 struct sk_buff *head,
1179 enum htt_rx_mpdu_status status,
1183 struct ath10k *ar = htt->ar;
1185 if (head->len == 0) {
1186 ath10k_dbg(ar, ATH10K_DBG_HTT,
1187 "htt rx dropping due to zero-len\n");
1191 if (attention & RX_ATTENTION_FLAGS_DECRYPT_ERR) {
1192 ath10k_dbg(ar, ATH10K_DBG_HTT,
1193 "htt rx dropping due to decrypt-err\n");
1198 ath10k_warn(ar, "no channel configured; ignoring frame!\n");
1202 /* Skip mgmt frames while we handle this in WMI */
1203 if (attention & RX_ATTENTION_FLAGS_MGMT_TYPE) {
1204 ath10k_dbg(ar, ATH10K_DBG_HTT, "htt rx mgmt ctrl\n");
1208 if (status != HTT_RX_IND_MPDU_STATUS_OK &&
1209 status != HTT_RX_IND_MPDU_STATUS_TKIP_MIC_ERR &&
1210 status != HTT_RX_IND_MPDU_STATUS_ERR_INV_PEER &&
1211 !htt->ar->monitor_started) {
1212 ath10k_dbg(ar, ATH10K_DBG_HTT,
1213 "htt rx ignoring frame w/ status %d\n",
1218 if (test_bit(ATH10K_CAC_RUNNING, &htt->ar->dev_flags)) {
1219 ath10k_dbg(ar, ATH10K_DBG_HTT,
1220 "htt rx CAC running\n");
1227 static void ath10k_htt_rx_handler(struct ath10k_htt *htt,
1228 struct htt_rx_indication *rx)
1230 struct ath10k *ar = htt->ar;
1231 struct ieee80211_rx_status *rx_status = &htt->rx_status;
1232 struct htt_rx_indication_mpdu_range *mpdu_ranges;
1233 enum htt_rx_mpdu_status status;
1234 struct ieee80211_hdr *hdr;
1235 int num_mpdu_ranges;
1243 lockdep_assert_held(&htt->rx_ring.lock);
1245 fw_desc_len = __le16_to_cpu(rx->prefix.fw_rx_desc_bytes);
1246 fw_desc = (u8 *)&rx->fw_desc;
1248 num_mpdu_ranges = MS(__le32_to_cpu(rx->hdr.info1),
1249 HTT_RX_INDICATION_INFO1_NUM_MPDU_RANGES);
1250 mpdu_ranges = htt_rx_ind_get_mpdu_ranges(rx);
1252 /* Fill this once, while this is per-ppdu */
1253 if (rx->ppdu.info0 & HTT_RX_INDICATION_INFO0_START_VALID) {
1254 memset(rx_status, 0, sizeof(*rx_status));
1255 rx_status->signal = ATH10K_DEFAULT_NOISE_FLOOR +
1256 rx->ppdu.combined_rssi;
1259 if (rx->ppdu.info0 & HTT_RX_INDICATION_INFO0_END_VALID) {
1260 /* TSF available only in 32-bit */
1261 rx_status->mactime = __le32_to_cpu(rx->ppdu.tsf) & 0xffffffff;
1262 rx_status->flag |= RX_FLAG_MACTIME_END;
1265 channel_set = ath10k_htt_rx_h_channel(htt->ar, rx_status);
1268 ath10k_htt_rx_h_rates(htt->ar, rx_status->band,
1270 __le32_to_cpu(rx->ppdu.info1),
1271 __le32_to_cpu(rx->ppdu.info2),
1275 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL, "htt rx ind: ",
1277 (sizeof(struct htt_rx_indication_mpdu_range) *
1280 for (i = 0; i < num_mpdu_ranges; i++) {
1281 status = mpdu_ranges[i].mpdu_range_status;
1283 for (j = 0; j < mpdu_ranges[i].mpdu_count; j++) {
1284 struct sk_buff *msdu_head, *msdu_tail;
1289 ret = ath10k_htt_rx_amsdu_pop(htt,
1297 ath10k_warn(ar, "failed to pop amsdu from htt rx ring %d\n",
1299 ath10k_htt_rx_free_msdu_chain(msdu_head);
1303 if (!ath10k_htt_rx_amsdu_allowed(htt, msdu_head,
1307 ath10k_htt_rx_free_msdu_chain(msdu_head);
1312 ath10k_unchain_msdu(msdu_head) < 0) {
1313 ath10k_htt_rx_free_msdu_chain(msdu_head);
1317 if (attention & RX_ATTENTION_FLAGS_FCS_ERR)
1318 rx_status->flag |= RX_FLAG_FAILED_FCS_CRC;
1320 rx_status->flag &= ~RX_FLAG_FAILED_FCS_CRC;
1322 if (attention & RX_ATTENTION_FLAGS_TKIP_MIC_ERR)
1323 rx_status->flag |= RX_FLAG_MMIC_ERROR;
1325 rx_status->flag &= ~RX_FLAG_MMIC_ERROR;
1327 hdr = ath10k_htt_rx_skb_get_hdr(msdu_head);
1329 if (ath10k_htt_rx_hdr_is_amsdu(hdr))
1330 ath10k_htt_rx_amsdu(htt, rx_status, msdu_head);
1332 ath10k_htt_rx_msdu(htt, rx_status, msdu_head);
1336 tasklet_schedule(&htt->rx_replenish_task);
1339 static void ath10k_htt_rx_frag_handler(struct ath10k_htt *htt,
1340 struct htt_rx_fragment_indication *frag)
1342 struct ath10k *ar = htt->ar;
1343 struct sk_buff *msdu_head, *msdu_tail;
1344 enum htt_rx_mpdu_encrypt_type enctype;
1345 struct htt_rx_desc *rxd;
1346 enum rx_msdu_decap_format fmt;
1347 struct ieee80211_rx_status *rx_status = &htt->rx_status;
1348 struct ieee80211_hdr *hdr;
1353 int fw_desc_len, hdrlen, paramlen;
1357 fw_desc_len = __le16_to_cpu(frag->fw_rx_desc_bytes);
1358 fw_desc = (u8 *)frag->fw_msdu_rx_desc;
1363 spin_lock_bh(&htt->rx_ring.lock);
1364 ret = ath10k_htt_rx_amsdu_pop(htt, &fw_desc, &fw_desc_len,
1365 &msdu_head, &msdu_tail,
1367 spin_unlock_bh(&htt->rx_ring.lock);
1369 ath10k_dbg(ar, ATH10K_DBG_HTT_DUMP, "htt rx frag ahead\n");
1372 ath10k_warn(ar, "failed to pop amsdu from httr rx ring for fragmented rx %d\n",
1374 ath10k_htt_rx_free_msdu_chain(msdu_head);
1378 /* FIXME: implement signal strength */
1379 rx_status->flag |= RX_FLAG_NO_SIGNAL_VAL;
1381 hdr = (struct ieee80211_hdr *)msdu_head->data;
1382 rxd = (void *)msdu_head->data - sizeof(*rxd);
1383 tkip_mic_err = !!(attention & RX_ATTENTION_FLAGS_TKIP_MIC_ERR);
1384 decrypt_err = !!(attention & RX_ATTENTION_FLAGS_DECRYPT_ERR);
1385 fmt = MS(__le32_to_cpu(rxd->msdu_start.info1),
1386 RX_MSDU_START_INFO1_DECAP_FORMAT);
1388 if (fmt != RX_MSDU_DECAP_RAW) {
1389 ath10k_warn(ar, "we dont support non-raw fragmented rx yet\n");
1390 dev_kfree_skb_any(msdu_head);
1394 enctype = MS(__le32_to_cpu(rxd->mpdu_start.info0),
1395 RX_MPDU_START_INFO0_ENCRYPT_TYPE);
1396 ath10k_htt_rx_h_protected(htt, rx_status, msdu_head, enctype, fmt,
1398 msdu_head->ip_summed = ath10k_htt_rx_get_csum_state(msdu_head);
1401 ath10k_warn(ar, "tkip mic error\n");
1404 ath10k_warn(ar, "decryption err in fragmented rx\n");
1405 dev_kfree_skb_any(msdu_head);
1409 if (enctype != HTT_RX_MPDU_ENCRYPT_NONE) {
1410 hdrlen = ieee80211_hdrlen(hdr->frame_control);
1411 paramlen = ath10k_htt_rx_crypto_param_len(ar, enctype);
1413 /* It is more efficient to move the header than the payload */
1414 memmove((void *)msdu_head->data + paramlen,
1415 (void *)msdu_head->data,
1417 skb_pull(msdu_head, paramlen);
1418 hdr = (struct ieee80211_hdr *)msdu_head->data;
1421 /* remove trailing FCS */
1424 /* remove crypto trailer */
1425 trim += ath10k_htt_rx_crypto_tail_len(ar, enctype);
1427 /* last fragment of TKIP frags has MIC */
1428 if (!ieee80211_has_morefrags(hdr->frame_control) &&
1429 enctype == HTT_RX_MPDU_ENCRYPT_TKIP_WPA)
1432 if (trim > msdu_head->len) {
1433 ath10k_warn(ar, "htt rx fragment: trailer longer than the frame itself? drop\n");
1434 dev_kfree_skb_any(msdu_head);
1438 skb_trim(msdu_head, msdu_head->len - trim);
1440 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL, "htt rx frag mpdu: ",
1441 msdu_head->data, msdu_head->len);
1442 ath10k_process_rx(htt->ar, rx_status, msdu_head);
1445 if (fw_desc_len > 0) {
1446 ath10k_dbg(ar, ATH10K_DBG_HTT,
1447 "expecting more fragmented rx in one indication %d\n",
1452 static void ath10k_htt_rx_frm_tx_compl(struct ath10k *ar,
1453 struct sk_buff *skb)
1455 struct ath10k_htt *htt = &ar->htt;
1456 struct htt_resp *resp = (struct htt_resp *)skb->data;
1457 struct htt_tx_done tx_done = {};
1458 int status = MS(resp->data_tx_completion.flags, HTT_DATA_TX_STATUS);
1462 lockdep_assert_held(&htt->tx_lock);
1465 case HTT_DATA_TX_STATUS_NO_ACK:
1466 tx_done.no_ack = true;
1468 case HTT_DATA_TX_STATUS_OK:
1470 case HTT_DATA_TX_STATUS_DISCARD:
1471 case HTT_DATA_TX_STATUS_POSTPONE:
1472 case HTT_DATA_TX_STATUS_DOWNLOAD_FAIL:
1473 tx_done.discard = true;
1476 ath10k_warn(ar, "unhandled tx completion status %d\n", status);
1477 tx_done.discard = true;
1481 ath10k_dbg(ar, ATH10K_DBG_HTT, "htt tx completion num_msdus %d\n",
1482 resp->data_tx_completion.num_msdus);
1484 for (i = 0; i < resp->data_tx_completion.num_msdus; i++) {
1485 msdu_id = resp->data_tx_completion.msdus[i];
1486 tx_done.msdu_id = __le16_to_cpu(msdu_id);
1487 ath10k_txrx_tx_unref(htt, &tx_done);
1491 static void ath10k_htt_rx_addba(struct ath10k *ar, struct htt_resp *resp)
1493 struct htt_rx_addba *ev = &resp->rx_addba;
1494 struct ath10k_peer *peer;
1495 struct ath10k_vif *arvif;
1496 u16 info0, tid, peer_id;
1498 info0 = __le16_to_cpu(ev->info0);
1499 tid = MS(info0, HTT_RX_BA_INFO0_TID);
1500 peer_id = MS(info0, HTT_RX_BA_INFO0_PEER_ID);
1502 ath10k_dbg(ar, ATH10K_DBG_HTT,
1503 "htt rx addba tid %hu peer_id %hu size %hhu\n",
1504 tid, peer_id, ev->window_size);
1506 spin_lock_bh(&ar->data_lock);
1507 peer = ath10k_peer_find_by_id(ar, peer_id);
1509 ath10k_warn(ar, "received addba event for invalid peer_id: %hu\n",
1511 spin_unlock_bh(&ar->data_lock);
1515 arvif = ath10k_get_arvif(ar, peer->vdev_id);
1517 ath10k_warn(ar, "received addba event for invalid vdev_id: %u\n",
1519 spin_unlock_bh(&ar->data_lock);
1523 ath10k_dbg(ar, ATH10K_DBG_HTT,
1524 "htt rx start rx ba session sta %pM tid %hu size %hhu\n",
1525 peer->addr, tid, ev->window_size);
1527 ieee80211_start_rx_ba_session_offl(arvif->vif, peer->addr, tid);
1528 spin_unlock_bh(&ar->data_lock);
1531 static void ath10k_htt_rx_delba(struct ath10k *ar, struct htt_resp *resp)
1533 struct htt_rx_delba *ev = &resp->rx_delba;
1534 struct ath10k_peer *peer;
1535 struct ath10k_vif *arvif;
1536 u16 info0, tid, peer_id;
1538 info0 = __le16_to_cpu(ev->info0);
1539 tid = MS(info0, HTT_RX_BA_INFO0_TID);
1540 peer_id = MS(info0, HTT_RX_BA_INFO0_PEER_ID);
1542 ath10k_dbg(ar, ATH10K_DBG_HTT,
1543 "htt rx delba tid %hu peer_id %hu\n",
1546 spin_lock_bh(&ar->data_lock);
1547 peer = ath10k_peer_find_by_id(ar, peer_id);
1549 ath10k_warn(ar, "received addba event for invalid peer_id: %hu\n",
1551 spin_unlock_bh(&ar->data_lock);
1555 arvif = ath10k_get_arvif(ar, peer->vdev_id);
1557 ath10k_warn(ar, "received addba event for invalid vdev_id: %u\n",
1559 spin_unlock_bh(&ar->data_lock);
1563 ath10k_dbg(ar, ATH10K_DBG_HTT,
1564 "htt rx stop rx ba session sta %pM tid %hu\n",
1567 ieee80211_stop_rx_ba_session_offl(arvif->vif, peer->addr, tid);
1568 spin_unlock_bh(&ar->data_lock);
1571 void ath10k_htt_t2h_msg_handler(struct ath10k *ar, struct sk_buff *skb)
1573 struct ath10k_htt *htt = &ar->htt;
1574 struct htt_resp *resp = (struct htt_resp *)skb->data;
1576 /* confirm alignment */
1577 if (!IS_ALIGNED((unsigned long)skb->data, 4))
1578 ath10k_warn(ar, "unaligned htt message, expect trouble\n");
1580 ath10k_dbg(ar, ATH10K_DBG_HTT, "htt rx, msg_type: 0x%0X\n",
1581 resp->hdr.msg_type);
1582 switch (resp->hdr.msg_type) {
1583 case HTT_T2H_MSG_TYPE_VERSION_CONF: {
1584 htt->target_version_major = resp->ver_resp.major;
1585 htt->target_version_minor = resp->ver_resp.minor;
1586 complete(&htt->target_version_received);
1589 case HTT_T2H_MSG_TYPE_RX_IND:
1590 spin_lock_bh(&htt->rx_ring.lock);
1591 __skb_queue_tail(&htt->rx_compl_q, skb);
1592 spin_unlock_bh(&htt->rx_ring.lock);
1593 tasklet_schedule(&htt->txrx_compl_task);
1595 case HTT_T2H_MSG_TYPE_PEER_MAP: {
1596 struct htt_peer_map_event ev = {
1597 .vdev_id = resp->peer_map.vdev_id,
1598 .peer_id = __le16_to_cpu(resp->peer_map.peer_id),
1600 memcpy(ev.addr, resp->peer_map.addr, sizeof(ev.addr));
1601 ath10k_peer_map_event(htt, &ev);
1604 case HTT_T2H_MSG_TYPE_PEER_UNMAP: {
1605 struct htt_peer_unmap_event ev = {
1606 .peer_id = __le16_to_cpu(resp->peer_unmap.peer_id),
1608 ath10k_peer_unmap_event(htt, &ev);
1611 case HTT_T2H_MSG_TYPE_MGMT_TX_COMPLETION: {
1612 struct htt_tx_done tx_done = {};
1613 int status = __le32_to_cpu(resp->mgmt_tx_completion.status);
1616 __le32_to_cpu(resp->mgmt_tx_completion.desc_id);
1619 case HTT_MGMT_TX_STATUS_OK:
1621 case HTT_MGMT_TX_STATUS_RETRY:
1622 tx_done.no_ack = true;
1624 case HTT_MGMT_TX_STATUS_DROP:
1625 tx_done.discard = true;
1629 spin_lock_bh(&htt->tx_lock);
1630 ath10k_txrx_tx_unref(htt, &tx_done);
1631 spin_unlock_bh(&htt->tx_lock);
1634 case HTT_T2H_MSG_TYPE_TX_COMPL_IND:
1635 spin_lock_bh(&htt->tx_lock);
1636 __skb_queue_tail(&htt->tx_compl_q, skb);
1637 spin_unlock_bh(&htt->tx_lock);
1638 tasklet_schedule(&htt->txrx_compl_task);
1640 case HTT_T2H_MSG_TYPE_SEC_IND: {
1641 struct ath10k *ar = htt->ar;
1642 struct htt_security_indication *ev = &resp->security_indication;
1644 ath10k_dbg(ar, ATH10K_DBG_HTT,
1645 "sec ind peer_id %d unicast %d type %d\n",
1646 __le16_to_cpu(ev->peer_id),
1647 !!(ev->flags & HTT_SECURITY_IS_UNICAST),
1648 MS(ev->flags, HTT_SECURITY_TYPE));
1649 complete(&ar->install_key_done);
1652 case HTT_T2H_MSG_TYPE_RX_FRAG_IND: {
1653 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL, "htt event: ",
1654 skb->data, skb->len);
1655 ath10k_htt_rx_frag_handler(htt, &resp->rx_frag_ind);
1658 case HTT_T2H_MSG_TYPE_TEST:
1661 case HTT_T2H_MSG_TYPE_STATS_CONF:
1662 trace_ath10k_htt_stats(ar, skb->data, skb->len);
1664 case HTT_T2H_MSG_TYPE_TX_INSPECT_IND:
1665 /* Firmware can return tx frames if it's unable to fully
1666 * process them and suspects host may be able to fix it. ath10k
1667 * sends all tx frames as already inspected so this shouldn't
1668 * happen unless fw has a bug.
1670 ath10k_warn(ar, "received an unexpected htt tx inspect event\n");
1672 case HTT_T2H_MSG_TYPE_RX_ADDBA:
1673 ath10k_htt_rx_addba(ar, resp);
1675 case HTT_T2H_MSG_TYPE_RX_DELBA:
1676 ath10k_htt_rx_delba(ar, resp);
1678 case HTT_T2H_MSG_TYPE_PKTLOG: {
1679 struct ath10k_pktlog_hdr *hdr =
1680 (struct ath10k_pktlog_hdr *)resp->pktlog_msg.payload;
1682 trace_ath10k_htt_pktlog(ar, resp->pktlog_msg.payload,
1684 __le16_to_cpu(hdr->size));
1687 case HTT_T2H_MSG_TYPE_RX_FLUSH: {
1688 /* Ignore this event because mac80211 takes care of Rx
1689 * aggregation reordering.
1694 ath10k_warn(ar, "htt event (%d) not handled\n",
1695 resp->hdr.msg_type);
1696 ath10k_dbg_dump(ar, ATH10K_DBG_HTT_DUMP, NULL, "htt event: ",
1697 skb->data, skb->len);
1701 /* Free the indication buffer */
1702 dev_kfree_skb_any(skb);
1705 static void ath10k_htt_txrx_compl_task(unsigned long ptr)
1707 struct ath10k_htt *htt = (struct ath10k_htt *)ptr;
1708 struct htt_resp *resp;
1709 struct sk_buff *skb;
1711 spin_lock_bh(&htt->tx_lock);
1712 while ((skb = __skb_dequeue(&htt->tx_compl_q))) {
1713 ath10k_htt_rx_frm_tx_compl(htt->ar, skb);
1714 dev_kfree_skb_any(skb);
1716 spin_unlock_bh(&htt->tx_lock);
1718 spin_lock_bh(&htt->rx_ring.lock);
1719 while ((skb = __skb_dequeue(&htt->rx_compl_q))) {
1720 resp = (struct htt_resp *)skb->data;
1721 ath10k_htt_rx_handler(htt, &resp->rx_ind);
1722 dev_kfree_skb_any(skb);
1724 spin_unlock_bh(&htt->rx_ring.lock);