2013-06-12 20:52:10 +03:00
/*
* Copyright ( c ) 2005 - 2011 Atheros Communications Inc .
* Copyright ( c ) 2011 - 2013 Qualcomm Atheros , Inc .
*
* Permission to use , copy , modify , and / or distribute this software for any
* purpose with or without fee is hereby granted , provided that the above
* copyright notice and this permission notice appear in all copies .
*
* THE SOFTWARE IS PROVIDED " AS IS " AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS . IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL , DIRECT , INDIRECT , OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE , DATA OR PROFITS , WHETHER IN AN
* ACTION OF CONTRACT , NEGLIGENCE OR OTHER TORTIOUS ACTION , ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE .
*/
# ifndef _CORE_H_
# define _CORE_H_
# include <linux/completion.h>
# include <linux/if_ether.h>
# include <linux/types.h>
# include <linux/pci.h>
2014-08-25 08:37:32 +03:00
# include <linux/uuid.h>
# include <linux/time.h>
2013-06-12 20:52:10 +03:00
2013-07-05 16:15:14 +03:00
# include "htt.h"
2013-06-12 20:52:10 +03:00
# include "htc.h"
# include "hw.h"
# include "targaddrs.h"
# include "wmi.h"
# include "../ath.h"
# include "../regd.h"
2013-11-20 09:59:41 +02:00
# include "../dfs_pattern_detector.h"
2014-08-02 09:12:54 +03:00
# include "spectral.h"
2014-12-17 12:22:07 +02:00
# include "thermal.h"
2015-03-23 17:32:53 +02:00
# include "wow.h"
2015-06-18 12:31:09 +05:30
# include "swap.h"
2013-06-12 20:52:10 +03:00
# define MS(_v, _f) (((_v) & _f##_MASK) >> _f##_LSB)
# define SM(_v, _f) (((_v) << _f##_LSB) & _f##_MASK)
# define WO(_f) ((_f##_OFFSET) >> 2)
# define ATH10K_SCAN_ID 0
# define WMI_READY_TIMEOUT (5 * HZ)
# define ATH10K_FLUSH_TIMEOUT_HZ (5*HZ)
2015-03-10 16:22:01 +02:00
# define ATH10K_CONNECTION_LOSS_HZ (3*HZ)
2015-03-24 12:38:11 +00:00
# define ATH10K_NUM_CHANS 39
2013-06-12 20:52:10 +03:00
/* Antenna noise floor */
# define ATH10K_DEFAULT_NOISE_FLOOR -95
2013-11-14 09:01:15 +01:00
# define ATH10K_MAX_NUM_MGMT_PENDING 128
2013-09-26 17:47:12 +02:00
2015-03-19 16:03:29 +02:00
/* number of failed packets (20 packets with 16 sw reties each) */
# define ATH10K_KICKOUT_THRESHOLD (20 * 16)
2014-01-20 11:01:46 +02:00
/*
* Use insanely high numbers to make sure that the firmware implementation
* won ' t start , we have the same functionality already in hostapd . Unit
* is seconds .
*/
# define ATH10K_KEEPALIVE_MIN_IDLE 3747
# define ATH10K_KEEPALIVE_MAX_IDLE 3895
# define ATH10K_KEEPALIVE_MAX_UNRESPONSIVE 3900
2013-06-12 20:52:10 +03:00
struct ath10k ;
2014-10-13 09:40:47 +03:00
enum ath10k_bus {
ATH10K_BUS_PCI ,
} ;
static inline const char * ath10k_bus_str ( enum ath10k_bus bus )
{
switch ( bus ) {
case ATH10K_BUS_PCI :
return " pci " ;
}
return " unknown " ;
}
2013-06-12 20:52:10 +03:00
struct ath10k_skb_cb {
dma_addr_t paddr ;
2014-11-27 11:09:37 +01:00
u8 eid ;
2013-09-26 17:47:12 +02:00
u8 vdev_id ;
2015-03-30 09:51:51 +03:00
enum ath10k_hw_txrx_mode txmode ;
bool is_protected ;
2013-06-12 20:52:10 +03:00
struct {
u8 tid ;
2014-11-24 14:58:31 +01:00
u16 freq ;
2013-06-12 20:52:10 +03:00
bool is_offchan ;
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
bool nohwcrypt ;
2014-02-27 18:50:04 +02:00
struct ath10k_htt_txbuf * txbuf ;
u32 txbuf_paddr ;
2013-06-12 20:52:10 +03:00
} __packed htt ;
2014-01-23 12:48:21 +01:00
struct {
bool dtim_zero ;
bool deliver_cab ;
} bcn ;
2013-06-12 20:52:10 +03:00
} __packed ;
2015-01-24 12:14:47 +02:00
struct ath10k_skb_rxcb {
dma_addr_t paddr ;
2015-01-24 12:14:48 +02:00
struct hlist_node hlist ;
2015-01-24 12:14:47 +02:00
} ;
2013-06-12 20:52:10 +03:00
static inline struct ath10k_skb_cb * ATH10K_SKB_CB ( struct sk_buff * skb )
{
BUILD_BUG_ON ( sizeof ( struct ath10k_skb_cb ) >
IEEE80211_TX_INFO_DRIVER_DATA_SIZE ) ;
return ( struct ath10k_skb_cb * ) & IEEE80211_SKB_CB ( skb ) - > driver_data ;
}
2015-01-24 12:14:47 +02:00
static inline struct ath10k_skb_rxcb * ATH10K_SKB_RXCB ( struct sk_buff * skb )
{
BUILD_BUG_ON ( sizeof ( struct ath10k_skb_rxcb ) > sizeof ( skb - > cb ) ) ;
return ( struct ath10k_skb_rxcb * ) skb - > cb ;
}
2015-01-24 12:14:48 +02:00
# define ATH10K_RXCB_SKB(rxcb) \
container_of ( ( void * ) rxcb , struct sk_buff , cb )
2013-06-12 20:52:10 +03:00
static inline u32 host_interest_item_address ( u32 item_offset )
{
return QCA988X_HOST_INTEREST_ADDRESS + item_offset ;
}
struct ath10k_bmi {
bool done_sent ;
} ;
2013-09-26 17:47:11 +02:00
struct ath10k_mem_chunk {
void * vaddr ;
dma_addr_t paddr ;
u32 len ;
u32 req_id ;
} ;
2013-06-12 20:52:10 +03:00
struct ath10k_wmi {
2014-12-03 10:10:08 +02:00
enum ath10k_fw_wmi_op_version op_version ;
2013-06-12 20:52:10 +03:00
enum ath10k_htc_ep_id eid ;
struct completion service_ready ;
struct completion unified_ready ;
2013-09-13 14:16:54 +02:00
wait_queue_head_t tx_credits_wq ;
2014-11-27 10:11:17 +01:00
DECLARE_BITMAP ( svc_map , WMI_SERVICE_MAX ) ;
2013-09-26 17:47:05 +02:00
struct wmi_cmd_map * cmd ;
2013-09-26 17:47:15 +02:00
struct wmi_vdev_param_map * vdev_param ;
2013-09-26 17:47:16 +02:00
struct wmi_pdev_param_map * pdev_param ;
2014-12-03 10:10:54 +02:00
const struct wmi_ops * ops ;
2013-09-26 17:47:11 +02:00
u32 num_mem_chunks ;
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
u32 rx_decap_mode ;
2014-09-18 15:21:24 +02:00
struct ath10k_mem_chunk mem_chunks [ WMI_MAX_MEM_REQS ] ;
2013-06-12 20:52:10 +03:00
} ;
2014-09-25 12:33:48 +02:00
struct ath10k_fw_stats_peer {
2014-09-25 12:33:50 +02:00
struct list_head list ;
2013-06-12 20:52:10 +03:00
u8 peer_macaddr [ ETH_ALEN ] ;
u32 peer_rssi ;
u32 peer_tx_rate ;
2014-03-28 14:35:15 +02:00
u32 peer_rx_rate ; /* 10x only */
2013-06-12 20:52:10 +03:00
} ;
2015-02-15 16:50:40 +02:00
struct ath10k_fw_stats_vdev {
struct list_head list ;
u32 vdev_id ;
u32 beacon_snr ;
u32 data_snr ;
u32 num_tx_frames [ 4 ] ;
u32 num_rx_frames ;
u32 num_tx_frames_retries [ 4 ] ;
u32 num_tx_frames_failures [ 4 ] ;
u32 num_rts_fail ;
u32 num_rts_success ;
u32 num_rx_err ;
u32 num_rx_discard ;
u32 num_tx_not_acked ;
u32 tx_rate_history [ 10 ] ;
u32 beacon_rssi_history [ 10 ] ;
} ;
2014-09-25 12:33:50 +02:00
struct ath10k_fw_stats_pdev {
struct list_head list ;
2013-06-12 20:52:10 +03:00
/* PDEV stats */
s32 ch_noise_floor ;
u32 tx_frame_count ;
u32 rx_frame_count ;
u32 rx_clear_count ;
u32 cycle_count ;
u32 phy_err_count ;
u32 chan_tx_power ;
2014-03-28 14:35:16 +02:00
u32 ack_rx_bad ;
u32 rts_bad ;
u32 rts_good ;
u32 fcs_bad ;
u32 no_beacons ;
u32 mib_int_count ;
2013-06-12 20:52:10 +03:00
/* PDEV TX stats */
s32 comp_queued ;
s32 comp_delivered ;
s32 msdu_enqued ;
s32 mpdu_enqued ;
s32 wmm_drop ;
s32 local_enqued ;
s32 local_freed ;
s32 hw_queued ;
s32 hw_reaped ;
s32 underrun ;
s32 tx_abort ;
s32 mpdus_requed ;
u32 tx_ko ;
u32 data_rc ;
u32 self_triggers ;
u32 sw_retry_failure ;
u32 illgl_rate_phy_err ;
u32 pdev_cont_xretry ;
u32 pdev_tx_timeout ;
u32 pdev_resets ;
u32 phy_underrun ;
u32 txop_ovf ;
/* PDEV RX stats */
s32 mid_ppdu_route_change ;
s32 status_rcvd ;
s32 r0_frags ;
s32 r1_frags ;
s32 r2_frags ;
s32 r3_frags ;
s32 htt_msdus ;
s32 htt_mpdus ;
s32 loc_msdus ;
s32 loc_mpdus ;
s32 oversize_amsdu ;
s32 phy_errs ;
s32 phy_err_drop ;
s32 mpdu_errs ;
2014-09-25 12:33:50 +02:00
} ;
2013-06-12 20:52:10 +03:00
2014-09-25 12:33:50 +02:00
struct ath10k_fw_stats {
struct list_head pdevs ;
2015-02-15 16:50:40 +02:00
struct list_head vdevs ;
2014-09-25 12:33:50 +02:00
struct list_head peers ;
2013-06-12 20:52:10 +03:00
} ;
2013-11-20 09:59:41 +02:00
struct ath10k_dfs_stats {
u32 phy_errors ;
u32 pulses_total ;
u32 pulses_detected ;
u32 pulses_discarded ;
u32 radar_detected ;
} ;
2013-06-12 20:52:10 +03:00
# define ATH10K_MAX_NUM_PEER_IDS (1 << 11) /* htt rx_desc limit */
struct ath10k_peer {
struct list_head list ;
int vdev_id ;
u8 addr [ ETH_ALEN ] ;
DECLARE_BITMAP ( peer_ids , ATH10K_MAX_NUM_PEER_IDS ) ;
2014-11-25 11:46:59 +05:30
/* protected by ar->data_lock */
2013-06-12 20:52:10 +03:00
struct ieee80211_key_conf * keys [ WMI_MAX_KEY_INDEX + 1 ] ;
} ;
2014-02-14 14:49:48 +01:00
struct ath10k_sta {
struct ath10k_vif * arvif ;
/* the following are protected by ar->data_lock */
u32 changed ; /* IEEE80211_RC_* */
u32 bw ;
u32 nss ;
u32 smps ;
struct work_struct update_wk ;
2015-01-12 14:07:27 +02:00
# ifdef CONFIG_MAC80211_DEBUGFS
/* protected by conf_mutex */
bool aggr_mode ;
# endif
2014-02-14 14:49:48 +01:00
} ;
2013-06-12 20:52:10 +03:00
# define ATH10K_VDEV_SETUP_TIMEOUT_HZ (5*HZ)
2015-01-29 14:29:52 +02:00
enum ath10k_beacon_state {
ATH10K_BEACON_SCHEDULED = 0 ,
ATH10K_BEACON_SENDING ,
ATH10K_BEACON_SENT ,
} ;
2013-06-12 20:52:10 +03:00
struct ath10k_vif {
2013-10-16 15:44:45 +03:00
struct list_head list ;
2013-06-12 20:52:10 +03:00
u32 vdev_id ;
enum wmi_vdev_type vdev_type ;
enum wmi_vdev_subtype vdev_subtype ;
u32 beacon_interval ;
u32 dtim_period ;
2013-09-13 14:16:56 +02:00
struct sk_buff * beacon ;
2014-01-23 12:48:21 +01:00
/* protected by data_lock */
2015-01-29 14:29:52 +02:00
enum ath10k_beacon_state beacon_state ;
2014-09-18 11:18:02 +03:00
void * beacon_buf ;
dma_addr_t beacon_paddr ;
2015-03-31 10:26:23 +00:00
unsigned long tx_paused ; /* arbitrary values defined by target */
2013-06-12 20:52:10 +03:00
struct ath10k * ar ;
struct ieee80211_vif * vif ;
2014-01-23 11:38:25 +01:00
bool is_started ;
bool is_up ;
2014-08-02 09:12:54 +03:00
bool spectral_enabled ;
2015-02-13 13:30:16 +01:00
bool ps ;
2014-01-23 11:38:25 +01:00
u32 aid ;
u8 bssid [ ETH_ALEN ] ;
2013-06-12 20:52:10 +03:00
struct ieee80211_key_conf * wep_keys [ WMI_MAX_KEY_INDEX + 1 ] ;
2015-01-29 13:50:38 +02:00
s8 def_wep_key_idx ;
2013-06-12 20:52:10 +03:00
u16 tx_seq_no ;
union {
struct {
u32 uapsd ;
} sta ;
struct {
2015-06-22 20:22:21 +05:30
/* 512 stations */
u8 tim_bitmap [ 64 ] ;
2013-06-12 20:52:10 +03:00
u8 tim_len ;
u32 ssid_len ;
u8 ssid [ IEEE80211_MAX_SSID_LEN ] ;
bool hidden_ssid ;
/* P2P_IE with NoA attribute for P2P_GO case */
u32 noa_len ;
u8 * noa_data ;
} ap ;
} u ;
2014-01-08 09:08:33 +01:00
2014-03-11 12:58:00 +02:00
bool use_cts_prot ;
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
bool nohwcrypt ;
2014-03-11 12:58:00 +02:00
int num_legacy_stations ;
2014-10-21 10:40:15 +03:00
int txpower ;
2015-01-19 09:53:41 +01:00
struct wmi_wmm_params_all_arg wmm_params ;
2015-03-05 16:02:17 +02:00
struct work_struct ap_csa_work ;
2015-03-10 16:22:01 +02:00
struct delayed_work connection_loss_work ;
2015-04-21 20:42:58 +03:00
struct cfg80211_bitrate_mask bitrate_mask ;
2013-06-12 20:52:10 +03:00
} ;
struct ath10k_vif_iter {
u32 vdev_id ;
struct ath10k_vif * arvif ;
} ;
2014-08-25 08:37:32 +03:00
/* used for crash-dump storage, protected by data-lock */
struct ath10k_fw_crash_data {
bool crashed_since_read ;
uuid_le uuid ;
struct timespec timestamp ;
__le32 registers [ REG_DUMP_COUNT_QCA988X ] ;
} ;
2013-06-12 20:52:10 +03:00
struct ath10k_debug {
struct dentry * debugfs_phy ;
2014-09-25 12:33:48 +02:00
struct ath10k_fw_stats fw_stats ;
struct completion fw_stats_complete ;
2014-09-25 12:33:50 +02:00
bool fw_stats_done ;
2013-06-12 20:52:10 +03:00
2013-09-03 11:44:10 +03:00
unsigned long htt_stats_mask ;
struct delayed_work htt_stats_dwork ;
2013-11-20 09:59:41 +02:00
struct ath10k_dfs_stats dfs_stats ;
struct ath_dfs_pool_stats dfs_pool_stats ;
2014-01-03 12:59:31 +02:00
2014-10-03 08:02:33 +03:00
/* protected by conf_mutex */
2014-01-03 12:59:31 +02:00
u32 fw_dbglog_mask ;
2015-01-29 14:36:52 +05:30
u32 fw_dbglog_level ;
2014-10-03 08:02:33 +03:00
u32 pktlog_filter ;
2014-11-25 12:24:33 +02:00
u32 reg_addr ;
2014-12-02 13:07:14 +02:00
u32 nf_cal_period ;
2014-06-02 21:19:46 +03:00
2014-08-25 08:37:32 +03:00
struct ath10k_fw_crash_data * fw_crash_data ;
2013-06-12 20:52:10 +03:00
} ;
2013-07-16 09:38:52 +02:00
enum ath10k_state {
ATH10K_STATE_OFF = 0 ,
ATH10K_STATE_ON ,
2013-07-16 09:54:35 +02:00
/* When doing firmware recovery the device is first powered down.
* mac80211 is supposed to call in to start ( ) hook later on . It is
* however possible that driver unloading and firmware crash overlap .
* mac80211 can wait on conf_mutex in stop ( ) while the device is
* stopped in ath10k_core_restart ( ) work holding conf_mutex . The state
* RESTARTED means that the device is up and mac80211 has started hw
* reconfiguration . Once mac80211 is done with the reconfiguration we
2014-11-04 11:43:54 +02:00
* set the state to STATE_ON in reconfig_complete ( ) . */
2013-07-16 09:54:35 +02:00
ATH10K_STATE_RESTARTING ,
ATH10K_STATE_RESTARTED ,
/* The device has crashed while restarting hw. This state is like ON
* but commands are blocked in HTC and - ECOMM response is given . This
* prevents completion timeouts and makes the driver more responsive to
* userspace commands . This is also prevents recursive recovery . */
ATH10K_STATE_WEDGED ,
2014-09-10 18:23:30 +03:00
/* factory tests */
ATH10K_STATE_UTF ,
} ;
enum ath10k_firmware_mode {
/* the default mode, standard 802.11 functionality */
ATH10K_FIRMWARE_MODE_NORMAL ,
/* factory tests etc */
ATH10K_FIRMWARE_MODE_UTF ,
2013-07-16 09:38:52 +02:00
} ;
2013-08-09 10:13:33 +02:00
enum ath10k_fw_features {
/* wmi_mgmt_rx_hdr contains extra RSSI information */
ATH10K_FW_FEATURE_EXT_WMI_MGMT_RX = 0 ,
2014-12-03 10:10:08 +02:00
/* Firmware from 10X branch. Deprecated, don't use in new code. */
2013-09-26 17:47:05 +02:00
ATH10K_FW_FEATURE_WMI_10X = 1 ,
2013-09-26 17:47:12 +02:00
/* firmware support tx frame management over WMI, otherwise it's HTT */
ATH10K_FW_FEATURE_HAS_WMI_MGMT_TX = 2 ,
2013-12-10 16:20:40 +01:00
/* Firmware does not support P2P */
ATH10K_FW_FEATURE_NO_P2P = 3 ,
2014-12-03 10:10:08 +02:00
/* Firmware 10.2 feature bit. The ATH10K_FW_FEATURE_WMI_10X feature
* bit is required to be set as well . Deprecated , don ' t use in new
* code .
2014-07-25 13:32:17 +02:00
*/
ATH10K_FW_FEATURE_WMI_10_2 = 4 ,
2015-02-13 13:30:16 +01:00
/* Some firmware revisions lack proper multi-interface client powersave
* implementation . Enabling PS could result in connection drops ,
* traffic stalls , etc .
*/
ATH10K_FW_FEATURE_MULTI_VIF_PS_SUPPORT = 5 ,
2015-03-23 17:32:53 +02:00
/* Some firmware revisions have an incomplete WoWLAN implementation
* despite WMI service bit being advertised . This feature flag is used
* to distinguish whether WoWLAN is really supported or not .
*/
ATH10K_FW_FEATURE_WOWLAN_SUPPORT = 6 ,
2015-04-28 20:19:30 +03:00
/* Don't trust error code from otp.bin */
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
ATH10K_FW_FEATURE_IGNORE_OTP_RESULT = 7 ,
2015-04-28 20:19:30 +03:00
2015-05-19 14:09:34 +02:00
/* Some firmware revisions pad 4th hw address to 4 byte boundary making
* it 8 bytes long in Native Wifi Rx decap .
*/
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
ATH10K_FW_FEATURE_NO_NWIFI_DECAP_4ADDR_PADDING = 8 ,
2015-05-19 14:09:34 +02:00
2015-05-29 17:51:53 +03:00
/* Firmware supports bypassing PLL setting on init. */
ATH10K_FW_FEATURE_SUPPORTS_SKIP_CLOCK_INIT = 9 ,
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
/* Raw mode support. If supported, FW supports receiving and trasmitting
* frames in raw mode .
*/
ATH10K_FW_FEATURE_RAW_MODE_SUPPORT = 10 ,
2013-08-09 10:13:33 +02:00
/* keep last */
ATH10K_FW_FEATURE_COUNT ,
} ;
2013-11-20 09:59:47 +02:00
enum ath10k_dev_flags {
/* Indicates that ath10k device is during CAC phase of DFS */
ATH10K_CAC_RUNNING ,
2014-05-23 12:28:47 +02:00
ATH10K_FLAG_CORE_REGISTERED ,
2014-10-28 10:34:38 +01:00
/* Device has crashed and needs to restart. This indicates any pending
* waiters should immediately cancel instead of waiting for a time out .
*/
ATH10K_FLAG_CRASH_FLUSH ,
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
/* Use Raw mode instead of native WiFi Tx/Rx encap mode.
* Raw mode supports both hardware and software crypto . Native WiFi only
* supports hardware crypto .
*/
ATH10K_FLAG_RAW_MODE ,
/* Disable HW crypto engine */
ATH10K_FLAG_HW_CRYPTO_DISABLED ,
2013-11-20 09:59:47 +02:00
} ;
2014-10-13 09:40:59 +03:00
enum ath10k_cal_mode {
ATH10K_CAL_MODE_FILE ,
ATH10K_CAL_MODE_OTP ,
2014-12-02 10:55:54 +02:00
ATH10K_CAL_MODE_DT ,
2014-10-13 09:40:59 +03:00
} ;
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-24 20:25:32 +03:00
enum ath10k_crypt_mode {
/* Only use hardware crypto engine */
ATH10K_CRYPT_MODE_HW ,
/* Only use software crypto engine */
ATH10K_CRYPT_MODE_SW ,
} ;
2014-10-13 09:40:59 +03:00
static inline const char * ath10k_cal_mode_str ( enum ath10k_cal_mode mode )
{
switch ( mode ) {
case ATH10K_CAL_MODE_FILE :
return " file " ;
case ATH10K_CAL_MODE_OTP :
return " otp " ;
2014-12-02 10:55:54 +02:00
case ATH10K_CAL_MODE_DT :
return " dt " ;
2014-10-13 09:40:59 +03:00
}
return " unknown " ;
}
2014-08-05 14:54:44 +02:00
enum ath10k_scan_state {
ATH10K_SCAN_IDLE ,
ATH10K_SCAN_STARTING ,
ATH10K_SCAN_RUNNING ,
ATH10K_SCAN_ABORTING ,
} ;
static inline const char * ath10k_scan_state_str ( enum ath10k_scan_state state )
{
switch ( state ) {
case ATH10K_SCAN_IDLE :
return " idle " ;
case ATH10K_SCAN_STARTING :
return " starting " ;
case ATH10K_SCAN_RUNNING :
return " running " ;
case ATH10K_SCAN_ABORTING :
return " aborting " ;
}
return " unknown " ;
}
2015-03-31 10:26:23 +00:00
enum ath10k_tx_pause_reason {
ATH10K_TX_PAUSE_Q_FULL ,
ATH10K_TX_PAUSE_MAX ,
} ;
2013-06-12 20:52:10 +03:00
struct ath10k {
struct ath_common ath_common ;
struct ieee80211_hw * hw ;
struct device * dev ;
u8 mac_addr [ ETH_ALEN ] ;
2015-01-24 12:14:49 +02:00
enum ath10k_hw_rev hw_rev ;
2015-08-13 14:32:26 +02:00
u16 dev_id ;
2013-09-01 11:22:14 +03:00
u32 chip_id ;
2013-06-12 20:52:10 +03:00
u32 target_version ;
u8 fw_version_major ;
u32 fw_version_minor ;
u16 fw_version_release ;
u16 fw_version_build ;
2015-04-01 22:53:21 +03:00
u32 fw_stats_req_mask ;
2013-06-12 20:52:10 +03:00
u32 phy_capability ;
u32 hw_min_tx_power ;
u32 hw_max_tx_power ;
u32 ht_cap_info ;
u32 vht_cap_info ;
2013-07-24 12:36:46 +02:00
u32 num_rf_chains ;
2015-06-22 20:22:26 +05:30
u32 max_spatial_stream ;
2015-03-19 16:38:00 +05:30
/* protected by conf_mutex */
bool ani_enabled ;
2013-06-12 20:52:10 +03:00
2013-08-09 10:13:33 +02:00
DECLARE_BITMAP ( fw_features , ATH10K_FW_FEATURE_COUNT ) ;
2013-06-12 20:52:10 +03:00
bool p2p ;
struct {
2014-10-13 09:40:47 +03:00
enum ath10k_bus bus ;
2013-06-12 20:52:10 +03:00
const struct ath10k_hif_ops * ops ;
} hif ;
2014-02-10 17:14:23 +01:00
struct completion target_suspend ;
2013-06-12 20:52:10 +03:00
2015-01-24 12:14:49 +02:00
const struct ath10k_hw_regs * regs ;
2015-06-18 12:31:01 +05:30
const struct ath10k_hw_values * hw_values ;
2013-06-12 20:52:10 +03:00
struct ath10k_bmi bmi ;
2013-07-05 16:15:14 +03:00
struct ath10k_wmi wmi ;
2013-07-05 16:15:13 +03:00
struct ath10k_htc htc ;
2013-07-05 16:15:14 +03:00
struct ath10k_htt htt ;
2013-06-12 20:52:10 +03:00
struct ath10k_hw_params {
u32 id ;
const char * name ;
u32 patch_load_addr ;
2014-12-02 10:55:55 +02:00
int uart_pin ;
2015-06-18 12:31:10 +05:30
u32 otp_exe_param ;
2013-06-12 20:52:10 +03:00
2015-05-25 14:06:18 +02:00
/* This is true if given HW chip has a quirky Cycle Counter
* wraparound which resets to 0x7fffffff instead of 0. All
* other CC related counters ( e . g . Rx Clear Count ) are divided
* by 2 so they never wraparound themselves .
*/
bool has_shifted_cc_wraparound ;
2015-06-22 20:22:27 +05:30
/* Some of chip expects fragment descriptor to be continuous
* memory for any TX operation . Set continuous_frag_desc flag
* for the hardware which have such requirement .
*/
bool continuous_frag_desc ;
2015-08-12 16:24:05 +05:30
u32 channel_counters_freq_hz ;
2013-06-12 20:52:10 +03:00
struct ath10k_hw_params_fw {
const char * dir ;
const char * fw ;
const char * otp ;
const char * board ;
2014-12-02 10:55:54 +02:00
size_t board_size ;
size_t board_ext_size ;
2013-06-12 20:52:10 +03:00
} fw ;
} hw_params ;
2013-09-27 19:54:55 +03:00
const struct firmware * board ;
2013-09-27 19:55:01 +03:00
const void * board_data ;
size_t board_len ;
2013-07-16 09:38:58 +02:00
const struct firmware * otp ;
2013-09-27 19:55:01 +03:00
const void * otp_data ;
size_t otp_len ;
2013-07-16 09:38:58 +02:00
const struct firmware * firmware ;
2013-09-27 19:55:01 +03:00
const void * firmware_data ;
size_t firmware_len ;
2013-07-16 09:38:58 +02:00
2014-10-13 09:40:59 +03:00
const struct firmware * cal_file ;
2015-06-18 12:31:09 +05:30
struct {
const void * firmware_codeswap_data ;
size_t firmware_codeswap_len ;
struct ath10k_swap_code_seg_info * firmware_swap_code_seg_info ;
} swap ;
2015-04-17 09:19:17 +00:00
char spec_board_id [ 100 ] ;
bool spec_board_loaded ;
2013-09-27 19:55:07 +03:00
int fw_api ;
2014-10-13 09:40:59 +03:00
enum ath10k_cal_mode cal_mode ;
2013-09-27 19:55:07 +03:00
2013-06-12 20:52:10 +03:00
struct {
struct completion started ;
struct completion completed ;
struct completion on_channel ;
2014-08-05 14:54:44 +02:00
struct delayed_work timeout ;
enum ath10k_scan_state state ;
2013-06-12 20:52:10 +03:00
bool is_roc ;
int vdev_id ;
int roc_freq ;
2015-07-09 13:08:36 +02:00
bool roc_notify ;
2013-06-12 20:52:10 +03:00
} scan ;
struct {
struct ieee80211_supported_band sbands [ IEEE80211_NUM_BANDS ] ;
} mac ;
/* should never be NULL; needed for regular htt rx */
struct ieee80211_channel * rx_channel ;
/* valid during scan; needed for mgmt rx during scan */
struct ieee80211_channel * scan_channel ;
2014-01-23 11:38:25 +01:00
/* current operating channel definition */
struct cfg80211_chan_def chandef ;
2014-09-23 14:17:16 -07:00
unsigned long long free_vdev_map ;
2015-03-31 10:26:21 +00:00
struct ath10k_vif * monitor_arvif ;
2014-04-08 09:45:47 +03:00
bool monitor ;
2013-06-12 20:52:10 +03:00
int monitor_vdev_id ;
2014-04-08 09:45:47 +03:00
bool monitor_started ;
2013-06-12 20:52:10 +03:00
unsigned int filter_flags ;
2013-11-20 09:59:47 +02:00
unsigned long dev_flags ;
2013-11-20 10:00:28 +02:00
u32 dfs_block_radar_events ;
2013-06-12 20:52:10 +03:00
2014-04-08 09:56:09 +03:00
/* protected by conf_mutex */
bool radar_enabled ;
int num_started_vdevs ;
2014-05-16 17:15:38 +03:00
/* Protected by conf-mutex */
u8 supp_tx_chainmask ;
u8 supp_rx_chainmask ;
u8 cfg_tx_chainmask ;
u8 cfg_rx_chainmask ;
2013-06-12 20:52:10 +03:00
struct completion install_key_done ;
struct completion vdev_setup_done ;
struct workqueue_struct * workqueue ;
2015-07-29 11:40:38 +03:00
/* Auxiliary workqueue */
struct workqueue_struct * workqueue_aux ;
2013-06-12 20:52:10 +03:00
/* prevents concurrent FW reconfiguration */
struct mutex conf_mutex ;
/* protects shared structure data */
spinlock_t data_lock ;
2013-10-16 15:44:45 +03:00
struct list_head arvifs ;
2013-06-12 20:52:10 +03:00
struct list_head peers ;
wait_queue_head_t peer_mapping_wq ;
2014-11-25 15:16:04 +01:00
/* protected by conf_mutex */
2014-01-02 14:38:33 +01:00
int num_peers ;
2014-11-25 15:16:05 +01:00
int num_stations ;
int max_num_peers ;
int max_num_stations ;
2014-12-17 12:20:45 +02:00
int max_num_vdevs ;
2015-03-30 09:51:52 +03:00
int max_num_tdls_vdevs ;
2015-06-22 20:10:15 +05:30
int num_active_peers ;
int num_tids ;
2014-01-02 14:38:33 +01:00
2015-07-29 11:40:38 +03:00
struct work_struct svc_rdy_work ;
struct sk_buff * svc_rdy_skb ;
2013-06-12 20:52:10 +03:00
struct work_struct offchan_tx_work ;
struct sk_buff_head offchan_tx_queue ;
struct completion offchan_tx_completed ;
struct sk_buff * offchan_tx_skb ;
2013-09-26 17:47:12 +02:00
struct work_struct wmi_mgmt_tx_work ;
struct sk_buff_head wmi_mgmt_tx_queue ;
2013-07-16 09:38:52 +02:00
enum ath10k_state state ;
2014-05-23 12:28:47 +02:00
struct work_struct register_work ;
2013-07-16 09:54:35 +02:00
struct work_struct restart_work ;
2013-07-31 10:32:40 +02:00
/* cycle count is reported twice for each visited channel during scan.
* access protected by data_lock */
u32 survey_last_rx_clear_count ;
u32 survey_last_cycle_count ;
struct survey_info survey [ ATH10K_NUM_CHANS ] ;
2015-05-25 14:06:19 +02:00
/* Channel info events are expected to come in pairs without and with
* COMPLETE flag set respectively for each channel visit during scan .
*
* However there are deviations from this rule . This flag is used to
* avoid reporting garbage data .
*/
bool ch_info_can_report_survey ;
2013-11-20 09:59:41 +02:00
struct dfs_pattern_detector * dfs_detector ;
2015-03-31 10:26:23 +00:00
unsigned long tx_paused ; /* see ATH10K_TX_PAUSE_ */
2013-06-12 20:52:10 +03:00
# ifdef CONFIG_ATH10K_DEBUGFS
struct ath10k_debug debug ;
# endif
2014-08-02 09:12:54 +03:00
struct {
/* relay(fs) channel for spectral scan */
struct rchan * rfs_chan_spec_scan ;
/* spectral_mode and spec_config are protected by conf_mutex */
enum ath10k_spectral_mode mode ;
struct ath10k_spec_scan config ;
} spectral ;
2014-08-07 11:03:27 +02:00
2014-09-10 18:23:30 +03:00
struct {
/* protected by conf_mutex */
const struct firmware * utf ;
DECLARE_BITMAP ( orig_fw_features , ATH10K_FW_FEATURE_COUNT ) ;
2014-12-03 10:10:54 +02:00
enum ath10k_fw_wmi_op_version orig_wmi_op_version ;
2014-09-10 18:23:30 +03:00
/* protected by data_lock */
bool utf_monitor ;
} testmode ;
2014-09-29 14:41:46 +03:00
struct {
/* protected by data_lock */
u32 fw_crash_counter ;
u32 fw_warm_reset_counter ;
u32 fw_cold_reset_counter ;
} stats ;
2014-12-17 12:22:07 +02:00
struct ath10k_thermal thermal ;
2015-03-23 17:32:53 +02:00
struct ath10k_wow wow ;
2014-12-17 12:22:07 +02:00
2014-08-07 11:03:27 +02:00
/* must be last */
u8 drv_priv [ 0 ] __aligned ( sizeof ( void * ) ) ;
2013-06-12 20:52:10 +03:00
} ;
2014-08-07 11:03:27 +02:00
struct ath10k * ath10k_core_create ( size_t priv_size , struct device * dev ,
2014-10-13 09:40:47 +03:00
enum ath10k_bus bus ,
2015-01-24 12:14:49 +02:00
enum ath10k_hw_rev hw_rev ,
2013-06-12 20:52:10 +03:00
const struct ath10k_hif_ops * hif_ops ) ;
void ath10k_core_destroy ( struct ath10k * ar ) ;
2015-06-15 14:46:40 +03:00
void ath10k_core_get_fw_features_str ( struct ath10k * ar ,
char * buf ,
size_t max_len ) ;
2013-06-12 20:52:10 +03:00
2014-09-10 18:23:30 +03:00
int ath10k_core_start ( struct ath10k * ar , enum ath10k_firmware_mode mode ) ;
2014-02-10 17:14:24 +01:00
int ath10k_wait_for_suspend ( struct ath10k * ar , u32 suspend_opt ) ;
2013-07-16 09:38:51 +02:00
void ath10k_core_stop ( struct ath10k * ar ) ;
2013-09-01 11:22:14 +03:00
int ath10k_core_register ( struct ath10k * ar , u32 chip_id ) ;
2013-06-12 20:52:10 +03:00
void ath10k_core_unregister ( struct ath10k * ar ) ;
# endif /* _CORE_H_ */