Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / drivers / staging / bcm / Qos.c
1 /**
2 @file Qos.C
3 This file contains the routines related to Quality of Service.
4 */
5 #include "headers.h"
6
7 static void EThCSGetPktInfo(PMINI_ADAPTER Adapter,PVOID pvEthPayload,PS_ETHCS_PKT_INFO pstEthCsPktInfo);
8 static BOOLEAN EThCSClassifyPkt(PMINI_ADAPTER Adapter,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo,S_CLASSIFIER_RULE *pstClassifierRule, B_UINT8 EthCSCupport);
9
10 static USHORT IpVersion4(PMINI_ADAPTER Adapter, struct iphdr *iphd,
11 S_CLASSIFIER_RULE *pstClassifierRule );
12
13 static VOID PruneQueue(PMINI_ADAPTER Adapter, INT iIndex);
14
15
16 /*******************************************************************
17 * Function - MatchSrcIpAddress()
18 *
19 * Description - Checks whether the Source IP address from the packet
20 * matches with that of Queue.
21 *
22 * Parameters - pstClassifierRule: Pointer to the packet info structure.
23 * - ulSrcIP : Source IP address from the packet.
24 *
25 * Returns - TRUE(If address matches) else FAIL .
26 *********************************************************************/
27 BOOLEAN MatchSrcIpAddress(S_CLASSIFIER_RULE *pstClassifierRule,ULONG ulSrcIP)
28 {
29 UCHAR ucLoopIndex=0;
30
31 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
32
33 ulSrcIP=ntohl(ulSrcIP);
34 if(0 == pstClassifierRule->ucIPSourceAddressLength)
35 return TRUE;
36 for(ucLoopIndex=0; ucLoopIndex < (pstClassifierRule->ucIPSourceAddressLength);ucLoopIndex++)
37 {
38 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Ip Address Mask:0x%x PacketIp:0x%x and Classification:0x%x", (UINT)pstClassifierRule->stSrcIpAddress.ulIpv4Mask[ucLoopIndex], (UINT)ulSrcIP, (UINT)pstClassifierRule->stSrcIpAddress.ulIpv6Addr[ucLoopIndex]);
39 if((pstClassifierRule->stSrcIpAddress.ulIpv4Mask[ucLoopIndex] & ulSrcIP)==
40 (pstClassifierRule->stSrcIpAddress.ulIpv4Addr[ucLoopIndex] & pstClassifierRule->stSrcIpAddress.ulIpv4Mask[ucLoopIndex] ))
41 {
42 return TRUE;
43 }
44 }
45 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Ip Address Not Matched");
46 return FALSE;
47 }
48
49
50 /*******************************************************************
51 * Function - MatchDestIpAddress()
52 *
53 * Description - Checks whether the Destination IP address from the packet
54 * matches with that of Queue.
55 *
56 * Parameters - pstClassifierRule: Pointer to the packet info structure.
57 * - ulDestIP : Destination IP address from the packet.
58 *
59 * Returns - TRUE(If address matches) else FAIL .
60 *********************************************************************/
61 BOOLEAN MatchDestIpAddress(S_CLASSIFIER_RULE *pstClassifierRule,ULONG ulDestIP)
62 {
63 UCHAR ucLoopIndex=0;
64 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
65
66 ulDestIP=ntohl(ulDestIP);
67 if(0 == pstClassifierRule->ucIPDestinationAddressLength)
68 return TRUE;
69 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination Ip Address 0x%x 0x%x 0x%x ", (UINT)ulDestIP, (UINT)pstClassifierRule->stDestIpAddress.ulIpv4Mask[ucLoopIndex], (UINT)pstClassifierRule->stDestIpAddress.ulIpv4Addr[ucLoopIndex]);
70
71 for(ucLoopIndex=0;ucLoopIndex<(pstClassifierRule->ucIPDestinationAddressLength);ucLoopIndex++)
72 {
73 if((pstClassifierRule->stDestIpAddress.ulIpv4Mask[ucLoopIndex] & ulDestIP)==
74 (pstClassifierRule->stDestIpAddress.ulIpv4Addr[ucLoopIndex] & pstClassifierRule->stDestIpAddress.ulIpv4Mask[ucLoopIndex]))
75 {
76 return TRUE;
77 }
78 }
79 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination Ip Address Not Matched");
80 return FALSE;
81 }
82
83
84 /************************************************************************
85 * Function - MatchTos()
86 *
87 * Description - Checks the TOS from the packet matches with that of queue.
88 *
89 * Parameters - pstClassifierRule : Pointer to the packet info structure.
90 * - ucTypeOfService: TOS from the packet.
91 *
92 * Returns - TRUE(If address matches) else FAIL.
93 **************************************************************************/
94 BOOLEAN MatchTos(S_CLASSIFIER_RULE *pstClassifierRule,UCHAR ucTypeOfService)
95 {
96
97 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
98 if( 3 != pstClassifierRule->ucIPTypeOfServiceLength )
99 return TRUE;
100
101 if(((pstClassifierRule->ucTosMask & ucTypeOfService)<=pstClassifierRule->ucTosHigh) && ((pstClassifierRule->ucTosMask & ucTypeOfService)>=pstClassifierRule->ucTosLow))
102 {
103 return TRUE;
104 }
105 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Type Of Service Not Matched");
106 return FALSE;
107 }
108
109
110 /***************************************************************************
111 * Function - MatchProtocol()
112 *
113 * Description - Checks the protocol from the packet matches with that of queue.
114 *
115 * Parameters - pstClassifierRule: Pointer to the packet info structure.
116 * - ucProtocol : Protocol from the packet.
117 *
118 * Returns - TRUE(If address matches) else FAIL.
119 ****************************************************************************/
120 BOOLEAN MatchProtocol(S_CLASSIFIER_RULE *pstClassifierRule,UCHAR ucProtocol)
121 {
122 UCHAR ucLoopIndex=0;
123 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
124 if(0 == pstClassifierRule->ucProtocolLength)
125 return TRUE;
126 for(ucLoopIndex=0;ucLoopIndex<pstClassifierRule->ucProtocolLength;ucLoopIndex++)
127 {
128 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Protocol:0x%X Classification Protocol:0x%X",ucProtocol,pstClassifierRule->ucProtocol[ucLoopIndex]);
129 if(pstClassifierRule->ucProtocol[ucLoopIndex]==ucProtocol)
130 {
131 return TRUE;
132 }
133 }
134 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Protocol Not Matched");
135 return FALSE;
136 }
137
138
139 /***********************************************************************
140 * Function - MatchSrcPort()
141 *
142 * Description - Checks, Source port from the packet matches with that of queue.
143 *
144 * Parameters - pstClassifierRule: Pointer to the packet info structure.
145 * - ushSrcPort : Source port from the packet.
146 *
147 * Returns - TRUE(If address matches) else FAIL.
148 ***************************************************************************/
149 BOOLEAN MatchSrcPort(S_CLASSIFIER_RULE *pstClassifierRule,USHORT ushSrcPort)
150 {
151 UCHAR ucLoopIndex=0;
152
153 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
154
155
156 if(0 == pstClassifierRule->ucSrcPortRangeLength)
157 return TRUE;
158 for(ucLoopIndex=0;ucLoopIndex<pstClassifierRule->ucSrcPortRangeLength;ucLoopIndex++)
159 {
160 if(ushSrcPort <= pstClassifierRule->usSrcPortRangeHi[ucLoopIndex] &&
161 ushSrcPort >= pstClassifierRule->usSrcPortRangeLo[ucLoopIndex])
162 {
163 return TRUE;
164 }
165 }
166 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Port: %x Not Matched ",ushSrcPort);
167 return FALSE;
168 }
169
170
171 /***********************************************************************
172 * Function - MatchDestPort()
173 *
174 * Description - Checks, Destination port from packet matches with that of queue.
175 *
176 * Parameters - pstClassifierRule: Pointer to the packet info structure.
177 * - ushDestPort : Destination port from the packet.
178 *
179 * Returns - TRUE(If address matches) else FAIL.
180 ***************************************************************************/
181 BOOLEAN MatchDestPort(S_CLASSIFIER_RULE *pstClassifierRule,USHORT ushDestPort)
182 {
183 UCHAR ucLoopIndex=0;
184 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
185
186 if(0 == pstClassifierRule->ucDestPortRangeLength)
187 return TRUE;
188
189 for(ucLoopIndex=0;ucLoopIndex<pstClassifierRule->ucDestPortRangeLength;ucLoopIndex++)
190 {
191 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Matching Port:0x%X 0x%X 0x%X",ushDestPort,pstClassifierRule->usDestPortRangeLo[ucLoopIndex],pstClassifierRule->usDestPortRangeHi[ucLoopIndex]);
192
193 if(ushDestPort <= pstClassifierRule->usDestPortRangeHi[ucLoopIndex] &&
194 ushDestPort >= pstClassifierRule->usDestPortRangeLo[ucLoopIndex])
195 {
196 return TRUE;
197 }
198 }
199 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Dest Port: %x Not Matched",ushDestPort);
200 return FALSE;
201 }
202 /**
203 @ingroup tx_functions
204 Compares IPV4 Ip address and port number
205 @return Queue Index.
206 */
207 static USHORT IpVersion4(PMINI_ADAPTER Adapter,
208 struct iphdr *iphd,
209 S_CLASSIFIER_RULE *pstClassifierRule )
210 {
211 xporthdr *xprt_hdr=NULL;
212 BOOLEAN bClassificationSucceed=FALSE;
213
214 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "========>");
215
216 xprt_hdr=(xporthdr *)((PUCHAR)iphd + sizeof(struct iphdr));
217
218 do {
219 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Trying to see Direction = %d %d",
220 pstClassifierRule->ucDirection,
221 pstClassifierRule->usVCID_Value);
222
223 //Checking classifier validity
224 if(!pstClassifierRule->bUsed || pstClassifierRule->ucDirection == DOWNLINK_DIR)
225 {
226 bClassificationSucceed = FALSE;
227 break;
228 }
229
230 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "is IPv6 check!");
231 if(pstClassifierRule->bIpv6Protocol)
232 break;
233
234 //**************Checking IP header parameter**************************//
235 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Trying to match Source IP Address");
236 if(FALSE == (bClassificationSucceed =
237 MatchSrcIpAddress(pstClassifierRule, iphd->saddr)))
238 break;
239 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Source IP Address Matched");
240
241 if(FALSE == (bClassificationSucceed =
242 MatchDestIpAddress(pstClassifierRule, iphd->daddr)))
243 break;
244 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination IP Address Matched");
245
246 if(FALSE == (bClassificationSucceed =
247 MatchTos(pstClassifierRule, iphd->tos)))
248 {
249 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "TOS Match failed\n");
250 break;
251 }
252 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "TOS Matched");
253
254 if(FALSE == (bClassificationSucceed =
255 MatchProtocol(pstClassifierRule,iphd->protocol)))
256 break;
257 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Protocol Matched");
258
259 //if protocol is not TCP or UDP then no need of comparing source port and destination port
260 if(iphd->protocol!=TCP && iphd->protocol!=UDP)
261 break;
262 //******************Checking Transport Layer Header field if present *****************//
263 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Source Port %04x",
264 (iphd->protocol==UDP)?xprt_hdr->uhdr.source:xprt_hdr->thdr.source);
265
266 if(FALSE == (bClassificationSucceed =
267 MatchSrcPort(pstClassifierRule,
268 ntohs((iphd->protocol == UDP)?
269 xprt_hdr->uhdr.source:xprt_hdr->thdr.source))))
270 break;
271 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Port Matched");
272
273 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination Port %04x",
274 (iphd->protocol==UDP)?xprt_hdr->uhdr.dest:
275 xprt_hdr->thdr.dest);
276 if(FALSE == (bClassificationSucceed =
277 MatchDestPort(pstClassifierRule,
278 ntohs((iphd->protocol == UDP)?
279 xprt_hdr->uhdr.dest:xprt_hdr->thdr.dest))))
280 break;
281 } while(0);
282
283 if(TRUE==bClassificationSucceed)
284 {
285 INT iMatchedSFQueueIndex = 0;
286 iMatchedSFQueueIndex = SearchSfid(Adapter,pstClassifierRule->ulSFID);
287 if(iMatchedSFQueueIndex >= NO_OF_QUEUES)
288 {
289 bClassificationSucceed = FALSE;
290 }
291 else
292 {
293 if(FALSE == Adapter->PackInfo[iMatchedSFQueueIndex].bActive)
294 {
295 bClassificationSucceed = FALSE;
296 }
297 }
298 }
299
300 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "IpVersion4 <==========");
301
302 return bClassificationSucceed;
303 }
304
305 VOID PruneQueueAllSF(PMINI_ADAPTER Adapter)
306 {
307 UINT iIndex = 0;
308
309 for(iIndex = 0; iIndex < HiPriority; iIndex++)
310 {
311 if(!Adapter->PackInfo[iIndex].bValid)
312 continue;
313
314 PruneQueue(Adapter, iIndex);
315 }
316 }
317
318
319 /**
320 @ingroup tx_functions
321 This function checks if the max queue size for a queue
322 is less than number of bytes in the queue. If so -
323 drops packets from the Head till the number of bytes is
324 less than or equal to max queue size for the queue.
325 */
326 static VOID PruneQueue(PMINI_ADAPTER Adapter, INT iIndex)
327 {
328 struct sk_buff* PacketToDrop=NULL;
329 struct net_device_stats *netstats;
330
331 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "=====> Index %d",iIndex);
332
333 if(iIndex == HiPriority)
334 return;
335
336 if(!Adapter || (iIndex < 0) || (iIndex > HiPriority))
337 return;
338
339 /* To Store the netdevice statistic */
340 netstats = &Adapter->dev->stats;
341
342 spin_lock_bh(&Adapter->PackInfo[iIndex].SFQueueLock);
343
344 while(1)
345 // while((UINT)Adapter->PackInfo[iIndex].uiCurrentPacketsOnHost >
346 // SF_MAX_ALLOWED_PACKETS_TO_BACKUP)
347 {
348 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "uiCurrentBytesOnHost:%x uiMaxBucketSize :%x",
349 Adapter->PackInfo[iIndex].uiCurrentBytesOnHost,
350 Adapter->PackInfo[iIndex].uiMaxBucketSize);
351
352 PacketToDrop = Adapter->PackInfo[iIndex].FirstTxQueue;
353
354 if(PacketToDrop == NULL)
355 break;
356 if((Adapter->PackInfo[iIndex].uiCurrentPacketsOnHost < SF_MAX_ALLOWED_PACKETS_TO_BACKUP) &&
357 ((1000*(jiffies - *((B_UINT32 *)(PacketToDrop->cb)+SKB_CB_LATENCY_OFFSET))/HZ) <= Adapter->PackInfo[iIndex].uiMaxLatency))
358 break;
359
360 if(PacketToDrop)
361 {
362 struct netdev_queue *txq = netdev_get_tx_queue(Adapter->dev, iIndex);
363 if (netif_msg_tx_err(Adapter))
364 pr_info(PFX "%s: tx queue %d overlimit\n",
365 Adapter->dev->name, iIndex);
366
367 txq->tx_dropped++;
368
369 DEQUEUEPACKET(Adapter->PackInfo[iIndex].FirstTxQueue,
370 Adapter->PackInfo[iIndex].LastTxQueue);
371 /// update current bytes and packets count
372 Adapter->PackInfo[iIndex].uiCurrentBytesOnHost -=
373 PacketToDrop->len;
374 Adapter->PackInfo[iIndex].uiCurrentPacketsOnHost--;
375 /// update dropped bytes and packets counts
376 Adapter->PackInfo[iIndex].uiDroppedCountBytes += PacketToDrop->len;
377 Adapter->PackInfo[iIndex].uiDroppedCountPackets++;
378 dev_kfree_skb(PacketToDrop);
379
380 }
381
382 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "Dropped Bytes:%x Dropped Packets:%x",
383 Adapter->PackInfo[iIndex].uiDroppedCountBytes,
384 Adapter->PackInfo[iIndex].uiDroppedCountPackets);
385
386 atomic_dec(&Adapter->TotalPacketCount);
387 }
388
389 spin_unlock_bh(&Adapter->PackInfo[iIndex].SFQueueLock);
390
391 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "TotalPacketCount:%x",
392 atomic_read(&Adapter->TotalPacketCount));
393 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "<=====");
394 }
395
396 VOID flush_all_queues(PMINI_ADAPTER Adapter)
397 {
398 INT iQIndex;
399 UINT uiTotalPacketLength;
400 struct sk_buff* PacketToDrop=NULL;
401
402 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_OTHERS, DUMP_INFO, DBG_LVL_ALL, "=====>");
403
404 // down(&Adapter->data_packet_queue_lock);
405 for(iQIndex=LowPriority; iQIndex<HiPriority; iQIndex++)
406 {
407 struct netdev_queue *txq = netdev_get_tx_queue(Adapter->dev, iQIndex);
408
409 spin_lock_bh(&Adapter->PackInfo[iQIndex].SFQueueLock);
410 while(Adapter->PackInfo[iQIndex].FirstTxQueue)
411 {
412 PacketToDrop = Adapter->PackInfo[iQIndex].FirstTxQueue;
413 if(PacketToDrop)
414 {
415 uiTotalPacketLength = PacketToDrop->len;
416 txq->tx_dropped++;
417 }
418 else
419 uiTotalPacketLength = 0;
420
421 DEQUEUEPACKET(Adapter->PackInfo[iQIndex].FirstTxQueue,
422 Adapter->PackInfo[iQIndex].LastTxQueue);
423
424 /* Free the skb */
425 dev_kfree_skb(PacketToDrop);
426
427 /// update current bytes and packets count
428 Adapter->PackInfo[iQIndex].uiCurrentBytesOnHost -= uiTotalPacketLength;
429 Adapter->PackInfo[iQIndex].uiCurrentPacketsOnHost--;
430
431 /// update dropped bytes and packets counts
432 Adapter->PackInfo[iQIndex].uiDroppedCountBytes += uiTotalPacketLength;
433 Adapter->PackInfo[iQIndex].uiDroppedCountPackets++;
434
435 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_OTHERS, DUMP_INFO, DBG_LVL_ALL, "Dropped Bytes:%x Dropped Packets:%x",
436 Adapter->PackInfo[iQIndex].uiDroppedCountBytes,
437 Adapter->PackInfo[iQIndex].uiDroppedCountPackets);
438 atomic_dec(&Adapter->TotalPacketCount);
439 }
440 spin_unlock_bh(&Adapter->PackInfo[iQIndex].SFQueueLock);
441 }
442 // up(&Adapter->data_packet_queue_lock);
443 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_OTHERS, DUMP_INFO, DBG_LVL_ALL, "<=====");
444 }
445
446 USHORT ClassifyPacket(PMINI_ADAPTER Adapter,struct sk_buff* skb)
447 {
448 INT uiLoopIndex=0;
449 S_CLASSIFIER_RULE *pstClassifierRule = NULL;
450 S_ETHCS_PKT_INFO stEthCsPktInfo;
451 PVOID pvEThPayload = NULL;
452 struct iphdr *pIpHeader = NULL;
453 INT uiSfIndex=0;
454 USHORT usIndex=Adapter->usBestEffortQueueIndex;
455 BOOLEAN bFragmentedPkt=FALSE,bClassificationSucceed=FALSE;
456 USHORT usCurrFragment =0;
457
458 PTCP_HEADER pTcpHeader;
459 UCHAR IpHeaderLength;
460 UCHAR TcpHeaderLength;
461
462 pvEThPayload = skb->data;
463 *((UINT32*) (skb->cb) +SKB_CB_TCPACK_OFFSET ) = 0;
464 EThCSGetPktInfo(Adapter,pvEThPayload,&stEthCsPktInfo);
465
466 switch(stEthCsPktInfo.eNwpktEthFrameType)
467 {
468 case eEth802LLCFrame:
469 {
470 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : 802LLCFrame\n");
471 pIpHeader = pvEThPayload + sizeof(ETH_CS_802_LLC_FRAME);
472 break;
473 }
474
475 case eEth802LLCSNAPFrame:
476 {
477 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : 802LLC SNAP Frame\n");
478 pIpHeader = pvEThPayload + sizeof(ETH_CS_802_LLC_SNAP_FRAME);
479 break;
480 }
481 case eEth802QVLANFrame:
482 {
483 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : 802.1Q VLANFrame\n");
484 pIpHeader = pvEThPayload + sizeof(ETH_CS_802_Q_FRAME);
485 break;
486 }
487 case eEthOtherFrame:
488 {
489 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : ETH Other Frame\n");
490 pIpHeader = pvEThPayload + sizeof(ETH_CS_ETH2_FRAME);
491 break;
492 }
493 default:
494 {
495 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : Unrecognized ETH Frame\n");
496 pIpHeader = pvEThPayload + sizeof(ETH_CS_ETH2_FRAME);
497 break;
498 }
499 }
500
501 if(stEthCsPktInfo.eNwpktIPFrameType == eIPv4Packet)
502 {
503 usCurrFragment = (ntohs(pIpHeader->frag_off) & IP_OFFSET);
504 if((ntohs(pIpHeader->frag_off) & IP_MF) || usCurrFragment)
505 bFragmentedPkt = TRUE;
506
507 if(bFragmentedPkt)
508 {
509 //Fragmented Packet. Get Frag Classifier Entry.
510 pstClassifierRule = GetFragIPClsEntry(Adapter,pIpHeader->id, pIpHeader->saddr);
511 if(pstClassifierRule)
512 {
513 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,"It is next Fragmented pkt");
514 bClassificationSucceed=TRUE;
515 }
516 if(!(ntohs(pIpHeader->frag_off) & IP_MF))
517 {
518 //Fragmented Last packet . Remove Frag Classifier Entry
519 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,"This is the last fragmented Pkt");
520 DelFragIPClsEntry(Adapter,pIpHeader->id, pIpHeader->saddr);
521 }
522 }
523 }
524
525 for(uiLoopIndex = MAX_CLASSIFIERS - 1; uiLoopIndex >= 0; uiLoopIndex--)
526 {
527 if(bClassificationSucceed)
528 break;
529 //Iterate through all classifiers which are already in order of priority
530 //to classify the packet until match found
531 do
532 {
533 if(FALSE==Adapter->astClassifierTable[uiLoopIndex].bUsed)
534 {
535 bClassificationSucceed=FALSE;
536 break;
537 }
538 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Adapter->PackInfo[%d].bvalid=True\n",uiLoopIndex);
539
540 if(0 == Adapter->astClassifierTable[uiLoopIndex].ucDirection)
541 {
542 bClassificationSucceed=FALSE;//cannot be processed for classification.
543 break; // it is a down link connection
544 }
545
546 pstClassifierRule = &Adapter->astClassifierTable[uiLoopIndex];
547
548 uiSfIndex = SearchSfid(Adapter,pstClassifierRule->ulSFID);
549 if (uiSfIndex >= NO_OF_QUEUES) {
550 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Queue Not Valid. SearchSfid for this classifier Failed\n");
551 break;
552 }
553
554 if(Adapter->PackInfo[uiSfIndex].bEthCSSupport)
555 {
556
557 if(eEthUnsupportedFrame==stEthCsPktInfo.eNwpktEthFrameType)
558 {
559 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, " ClassifyPacket : Packet Not a Valid Supported Ethernet Frame \n");
560 bClassificationSucceed = FALSE;
561 break;
562 }
563
564
565
566 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Performing ETH CS Classification on Classifier Rule ID : %x Service Flow ID : %lx\n",pstClassifierRule->uiClassifierRuleIndex,Adapter->PackInfo[uiSfIndex].ulSFID);
567 bClassificationSucceed = EThCSClassifyPkt(Adapter,skb,&stEthCsPktInfo,pstClassifierRule, Adapter->PackInfo[uiSfIndex].bEthCSSupport);
568
569 if(!bClassificationSucceed)
570 {
571 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : Ethernet CS Classification Failed\n");
572 break;
573 }
574 }
575
576 else // No ETH Supported on this SF
577 {
578 if(eEthOtherFrame != stEthCsPktInfo.eNwpktEthFrameType)
579 {
580 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, " ClassifyPacket : Packet Not a 802.3 Ethernet Frame... hence not allowed over non-ETH CS SF \n");
581 bClassificationSucceed = FALSE;
582 break;
583 }
584 }
585
586 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Proceeding to IP CS Clasification");
587
588 if(Adapter->PackInfo[uiSfIndex].bIPCSSupport)
589 {
590
591 if(stEthCsPktInfo.eNwpktIPFrameType == eNonIPPacket)
592 {
593 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, " ClassifyPacket : Packet is Not an IP Packet \n");
594 bClassificationSucceed = FALSE;
595 break;
596 }
597 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Dump IP Header : \n");
598 DumpFullPacket((PUCHAR)pIpHeader,20);
599
600 if(stEthCsPktInfo.eNwpktIPFrameType == eIPv4Packet)
601 bClassificationSucceed = IpVersion4(Adapter,pIpHeader,pstClassifierRule);
602 else if(stEthCsPktInfo.eNwpktIPFrameType == eIPv6Packet)
603 bClassificationSucceed = IpVersion6(Adapter,pIpHeader,pstClassifierRule);
604 }
605
606 }while(0);
607 }
608
609 if(bClassificationSucceed == TRUE)
610 {
611 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "CF id : %d, SF ID is =%lu",pstClassifierRule->uiClassifierRuleIndex, pstClassifierRule->ulSFID);
612
613 //Store The matched Classifier in SKB
614 *((UINT32*)(skb->cb)+SKB_CB_CLASSIFICATION_OFFSET) = pstClassifierRule->uiClassifierRuleIndex;
615 if((TCP == pIpHeader->protocol ) && !bFragmentedPkt && (ETH_AND_IP_HEADER_LEN + TCP_HEADER_LEN <= skb->len) )
616 {
617 IpHeaderLength = pIpHeader->ihl;
618 pTcpHeader = (PTCP_HEADER)(((PUCHAR)pIpHeader)+(IpHeaderLength*4));
619 TcpHeaderLength = GET_TCP_HEADER_LEN(pTcpHeader->HeaderLength);
620
621 if((pTcpHeader->ucFlags & TCP_ACK) &&
622 (ntohs(pIpHeader->tot_len) == (IpHeaderLength*4)+(TcpHeaderLength*4)))
623 {
624 *((UINT32*) (skb->cb) +SKB_CB_TCPACK_OFFSET ) = TCP_ACK;
625 }
626 }
627
628 usIndex = SearchSfid(Adapter, pstClassifierRule->ulSFID);
629 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "index is =%d", usIndex);
630
631 //If this is the first fragment of a Fragmented pkt, add this CF. Only This CF should be used for all other fragment of this Pkt.
632 if(bFragmentedPkt && (usCurrFragment == 0))
633 {
634 //First Fragment of Fragmented Packet. Create Frag CLS Entry
635 S_FRAGMENTED_PACKET_INFO stFragPktInfo;
636 stFragPktInfo.bUsed = TRUE;
637 stFragPktInfo.ulSrcIpAddress = pIpHeader->saddr;
638 stFragPktInfo.usIpIdentification = pIpHeader->id;
639 stFragPktInfo.pstMatchedClassifierEntry = pstClassifierRule;
640 stFragPktInfo.bOutOfOrderFragment = FALSE;
641 AddFragIPClsEntry(Adapter,&stFragPktInfo);
642 }
643
644
645 }
646
647 if(bClassificationSucceed)
648 return usIndex;
649 else
650 return INVALID_QUEUE_INDEX;
651 }
652
653 static BOOLEAN EthCSMatchSrcMACAddress(S_CLASSIFIER_RULE *pstClassifierRule,PUCHAR Mac)
654 {
655 UINT i=0;
656 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
657 if(pstClassifierRule->ucEthCSSrcMACLen==0)
658 return TRUE;
659 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s \n",__FUNCTION__);
660 for(i=0;i<MAC_ADDRESS_SIZE;i++)
661 {
662 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "SRC MAC[%x] = %x ClassifierRuleSrcMAC = %x Mask : %x\n",i,Mac[i],pstClassifierRule->au8EThCSSrcMAC[i],pstClassifierRule->au8EThCSSrcMACMask[i]);
663 if((pstClassifierRule->au8EThCSSrcMAC[i] & pstClassifierRule->au8EThCSSrcMACMask[i])!=
664 (Mac[i] & pstClassifierRule->au8EThCSSrcMACMask[i]))
665 return FALSE;
666 }
667 return TRUE;
668 }
669
670 static BOOLEAN EthCSMatchDestMACAddress(S_CLASSIFIER_RULE *pstClassifierRule,PUCHAR Mac)
671 {
672 UINT i=0;
673 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
674 if(pstClassifierRule->ucEthCSDestMACLen==0)
675 return TRUE;
676 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s \n",__FUNCTION__);
677 for(i=0;i<MAC_ADDRESS_SIZE;i++)
678 {
679 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "SRC MAC[%x] = %x ClassifierRuleSrcMAC = %x Mask : %x\n",i,Mac[i],pstClassifierRule->au8EThCSDestMAC[i],pstClassifierRule->au8EThCSDestMACMask[i]);
680 if((pstClassifierRule->au8EThCSDestMAC[i] & pstClassifierRule->au8EThCSDestMACMask[i])!=
681 (Mac[i] & pstClassifierRule->au8EThCSDestMACMask[i]))
682 return FALSE;
683 }
684 return TRUE;
685 }
686
687 static BOOLEAN EthCSMatchEThTypeSAP(S_CLASSIFIER_RULE *pstClassifierRule,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo)
688 {
689 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
690 if((pstClassifierRule->ucEtherTypeLen==0)||
691 (pstClassifierRule->au8EthCSEtherType[0] == 0))
692 return TRUE;
693
694 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s SrcEtherType:%x CLS EtherType[0]:%x\n",__FUNCTION__,pstEthCsPktInfo->usEtherType,pstClassifierRule->au8EthCSEtherType[0]);
695 if(pstClassifierRule->au8EthCSEtherType[0] == 1)
696 {
697 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s CLS EtherType[1]:%x EtherType[2]:%x\n",__FUNCTION__,pstClassifierRule->au8EthCSEtherType[1],pstClassifierRule->au8EthCSEtherType[2]);
698
699 if(memcmp(&pstEthCsPktInfo->usEtherType,&pstClassifierRule->au8EthCSEtherType[1],2)==0)
700 return TRUE;
701 else
702 return FALSE;
703 }
704
705 if(pstClassifierRule->au8EthCSEtherType[0] == 2)
706 {
707 if(eEth802LLCFrame != pstEthCsPktInfo->eNwpktEthFrameType)
708 return FALSE;
709
710 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s EthCS DSAP:%x EtherType[2]:%x\n",__FUNCTION__,pstEthCsPktInfo->ucDSAP,pstClassifierRule->au8EthCSEtherType[2]);
711 if(pstEthCsPktInfo->ucDSAP == pstClassifierRule->au8EthCSEtherType[2])
712 return TRUE;
713 else
714 return FALSE;
715
716 }
717
718 return FALSE;
719
720 }
721
722 static BOOLEAN EthCSMatchVLANRules(S_CLASSIFIER_RULE *pstClassifierRule,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo)
723 {
724 BOOLEAN bClassificationSucceed = FALSE;
725 USHORT usVLANID;
726 B_UINT8 uPriority = 0;
727 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
728
729 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s CLS UserPrio:%x CLS VLANID:%x\n",__FUNCTION__,ntohs(*((USHORT *)pstClassifierRule->usUserPriority)),pstClassifierRule->usVLANID);
730
731 /* In case FW didn't recieve the TLV, the priority field should be ignored */
732 if(pstClassifierRule->usValidityBitMap & (1<<PKT_CLASSIFICATION_USER_PRIORITY_VALID))
733 {
734 if(pstEthCsPktInfo->eNwpktEthFrameType!=eEth802QVLANFrame)
735 return FALSE;
736
737 uPriority = (ntohs(*(USHORT *)(skb->data + sizeof(ETH_HEADER_STRUC))) & 0xF000) >> 13;
738
739 if((uPriority >= pstClassifierRule->usUserPriority[0]) && (uPriority <= pstClassifierRule->usUserPriority[1]))
740 bClassificationSucceed = TRUE;
741
742 if(!bClassificationSucceed)
743 return FALSE;
744 }
745
746 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ETH CS 802.1 D User Priority Rule Matched\n");
747
748 bClassificationSucceed = FALSE;
749
750 if(pstClassifierRule->usValidityBitMap & (1<<PKT_CLASSIFICATION_VLANID_VALID))
751 {
752 if(pstEthCsPktInfo->eNwpktEthFrameType!=eEth802QVLANFrame)
753 return FALSE;
754
755 usVLANID = ntohs(*(USHORT *)(skb->data + sizeof(ETH_HEADER_STRUC))) & 0xFFF;
756
757 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "%s Pkt VLANID %x Priority: %d\n",__FUNCTION__,usVLANID, uPriority);
758
759 if(usVLANID == ((pstClassifierRule->usVLANID & 0xFFF0) >> 4))
760 bClassificationSucceed = TRUE;
761
762 if(!bClassificationSucceed)
763 return FALSE;
764 }
765
766 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ETH CS 802.1 Q VLAN ID Rule Matched\n");
767
768 return TRUE;
769 }
770
771
772 static BOOLEAN EThCSClassifyPkt(PMINI_ADAPTER Adapter,struct sk_buff* skb,
773 PS_ETHCS_PKT_INFO pstEthCsPktInfo,
774 S_CLASSIFIER_RULE *pstClassifierRule,
775 B_UINT8 EthCSCupport)
776 {
777 BOOLEAN bClassificationSucceed = FALSE;
778 bClassificationSucceed = EthCSMatchSrcMACAddress(pstClassifierRule,((ETH_HEADER_STRUC *)(skb->data))->au8SourceAddress);
779 if(!bClassificationSucceed)
780 return FALSE;
781 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ETH CS SrcMAC Matched\n");
782
783 bClassificationSucceed = EthCSMatchDestMACAddress(pstClassifierRule,((ETH_HEADER_STRUC*)(skb->data))->au8DestinationAddress);
784 if(!bClassificationSucceed)
785 return FALSE;
786 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ETH CS DestMAC Matched\n");
787
788 //classify on ETHType/802.2SAP TLV
789 bClassificationSucceed = EthCSMatchEThTypeSAP(pstClassifierRule,skb,pstEthCsPktInfo);
790 if(!bClassificationSucceed)
791 return FALSE;
792
793 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ETH CS EthType/802.2SAP Matched\n");
794
795 //classify on 802.1VLAN Header Parameters
796
797 bClassificationSucceed = EthCSMatchVLANRules(pstClassifierRule,skb,pstEthCsPktInfo);
798 if(!bClassificationSucceed)
799 return FALSE;
800 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ETH CS 802.1 VLAN Rules Matched\n");
801
802 return bClassificationSucceed;
803 }
804
805 static void EThCSGetPktInfo(PMINI_ADAPTER Adapter,PVOID pvEthPayload,
806 PS_ETHCS_PKT_INFO pstEthCsPktInfo)
807 {
808 USHORT u16Etype = ntohs(((ETH_HEADER_STRUC*)pvEthPayload)->u16Etype);
809
810 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "EthCSGetPktInfo : Eth Hdr Type : %X\n",u16Etype);
811 if(u16Etype > 0x5dc)
812 {
813 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "EthCSGetPktInfo : ETH2 Frame \n");
814 //ETH2 Frame
815 if(u16Etype == ETHERNET_FRAMETYPE_802QVLAN)
816 {
817 //802.1Q VLAN Header
818 pstEthCsPktInfo->eNwpktEthFrameType = eEth802QVLANFrame;
819 u16Etype = ((ETH_CS_802_Q_FRAME*)pvEthPayload)->EthType;
820 //((ETH_CS_802_Q_FRAME*)pvEthPayload)->UserPriority
821 }
822 else
823 {
824 pstEthCsPktInfo->eNwpktEthFrameType = eEthOtherFrame;
825 u16Etype = ntohs(u16Etype);
826 }
827
828 }
829 else
830 {
831 //802.2 LLC
832 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "802.2 LLC Frame \n");
833 pstEthCsPktInfo->eNwpktEthFrameType = eEth802LLCFrame;
834 pstEthCsPktInfo->ucDSAP = ((ETH_CS_802_LLC_FRAME*)pvEthPayload)->DSAP;
835 if(pstEthCsPktInfo->ucDSAP == 0xAA && ((ETH_CS_802_LLC_FRAME*)pvEthPayload)->SSAP == 0xAA)
836 {
837 //SNAP Frame
838 pstEthCsPktInfo->eNwpktEthFrameType = eEth802LLCSNAPFrame;
839 u16Etype = ((ETH_CS_802_LLC_SNAP_FRAME*)pvEthPayload)->usEtherType;
840 }
841 }
842 if(u16Etype == ETHERNET_FRAMETYPE_IPV4)
843 pstEthCsPktInfo->eNwpktIPFrameType = eIPv4Packet;
844 else if(u16Etype == ETHERNET_FRAMETYPE_IPV6)
845 pstEthCsPktInfo->eNwpktIPFrameType = eIPv6Packet;
846 else
847 pstEthCsPktInfo->eNwpktIPFrameType = eNonIPPacket;
848
849 pstEthCsPktInfo->usEtherType = ((ETH_HEADER_STRUC*)pvEthPayload)->u16Etype;
850 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "EthCsPktInfo->eNwpktIPFrameType : %x\n",pstEthCsPktInfo->eNwpktIPFrameType);
851 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "EthCsPktInfo->eNwpktEthFrameType : %x\n",pstEthCsPktInfo->eNwpktEthFrameType);
852 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "EthCsPktInfo->usEtherType : %x\n",pstEthCsPktInfo->usEtherType);
853 }
854
855
856