2013-06-13 01:52:10 +08:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2005-2011 Atheros Communications Inc.
|
|
|
|
* Copyright (c) 2011-2013 Qualcomm Atheros, Inc.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _CORE_H_
|
|
|
|
#define _CORE_H_
|
|
|
|
|
|
|
|
#include <linux/completion.h>
|
|
|
|
#include <linux/if_ether.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/pci.h>
|
2014-08-25 13:37:32 +08:00
|
|
|
#include <linux/uuid.h>
|
|
|
|
#include <linux/time.h>
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2013-07-05 21:15:14 +08:00
|
|
|
#include "htt.h"
|
2013-06-13 01:52:10 +08:00
|
|
|
#include "htc.h"
|
|
|
|
#include "hw.h"
|
|
|
|
#include "targaddrs.h"
|
|
|
|
#include "wmi.h"
|
|
|
|
#include "../ath.h"
|
|
|
|
#include "../regd.h"
|
2013-11-20 15:59:41 +08:00
|
|
|
#include "../dfs_pattern_detector.h"
|
2014-08-02 14:12:54 +08:00
|
|
|
#include "spectral.h"
|
2014-12-17 18:22:07 +08:00
|
|
|
#include "thermal.h"
|
2015-03-23 23:32:53 +08:00
|
|
|
#include "wow.h"
|
2015-06-18 15:01:09 +08:00
|
|
|
#include "swap.h"
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
#define MS(_v, _f) (((_v) & _f##_MASK) >> _f##_LSB)
|
|
|
|
#define SM(_v, _f) (((_v) << _f##_LSB) & _f##_MASK)
|
|
|
|
#define WO(_f) ((_f##_OFFSET) >> 2)
|
|
|
|
|
|
|
|
#define ATH10K_SCAN_ID 0
|
|
|
|
#define WMI_READY_TIMEOUT (5 * HZ)
|
|
|
|
#define ATH10K_FLUSH_TIMEOUT_HZ (5*HZ)
|
2015-03-10 22:22:01 +08:00
|
|
|
#define ATH10K_CONNECTION_LOSS_HZ (3*HZ)
|
2015-03-24 20:38:11 +08:00
|
|
|
#define ATH10K_NUM_CHANS 39
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
/* Antenna noise floor */
|
|
|
|
#define ATH10K_DEFAULT_NOISE_FLOOR -95
|
|
|
|
|
2013-11-14 16:01:15 +08:00
|
|
|
#define ATH10K_MAX_NUM_MGMT_PENDING 128
|
2013-09-26 23:47:12 +08:00
|
|
|
|
2015-03-19 22:03:29 +08:00
|
|
|
/* number of failed packets (20 packets with 16 sw reties each) */
|
|
|
|
#define ATH10K_KICKOUT_THRESHOLD (20 * 16)
|
2014-01-20 17:01:46 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Use insanely high numbers to make sure that the firmware implementation
|
|
|
|
* won't start, we have the same functionality already in hostapd. Unit
|
|
|
|
* is seconds.
|
|
|
|
*/
|
|
|
|
#define ATH10K_KEEPALIVE_MIN_IDLE 3747
|
|
|
|
#define ATH10K_KEEPALIVE_MAX_IDLE 3895
|
|
|
|
#define ATH10K_KEEPALIVE_MAX_UNRESPONSIVE 3900
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k;
|
|
|
|
|
2014-10-13 14:40:47 +08:00
|
|
|
enum ath10k_bus {
|
|
|
|
ATH10K_BUS_PCI,
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline const char *ath10k_bus_str(enum ath10k_bus bus)
|
|
|
|
{
|
|
|
|
switch (bus) {
|
|
|
|
case ATH10K_BUS_PCI:
|
|
|
|
return "pci";
|
|
|
|
}
|
|
|
|
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k_skb_cb {
|
|
|
|
dma_addr_t paddr;
|
2014-11-27 18:09:37 +08:00
|
|
|
u8 eid;
|
2013-09-26 23:47:12 +08:00
|
|
|
u8 vdev_id;
|
2015-03-30 14:51:51 +08:00
|
|
|
enum ath10k_hw_txrx_mode txmode;
|
|
|
|
bool is_protected;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
struct {
|
|
|
|
u8 tid;
|
2014-11-24 21:58:31 +08:00
|
|
|
u16 freq;
|
2013-06-13 01:52:10 +08:00
|
|
|
bool is_offchan;
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
bool nohwcrypt;
|
2014-02-28 00:50:04 +08:00
|
|
|
struct ath10k_htt_txbuf *txbuf;
|
|
|
|
u32 txbuf_paddr;
|
2013-06-13 01:52:10 +08:00
|
|
|
} __packed htt;
|
2014-01-23 19:48:21 +08:00
|
|
|
|
|
|
|
struct {
|
|
|
|
bool dtim_zero;
|
|
|
|
bool deliver_cab;
|
|
|
|
} bcn;
|
2013-06-13 01:52:10 +08:00
|
|
|
} __packed;
|
|
|
|
|
2015-01-24 18:14:47 +08:00
|
|
|
struct ath10k_skb_rxcb {
|
|
|
|
dma_addr_t paddr;
|
2015-01-24 18:14:48 +08:00
|
|
|
struct hlist_node hlist;
|
2015-01-24 18:14:47 +08:00
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
static inline struct ath10k_skb_cb *ATH10K_SKB_CB(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
BUILD_BUG_ON(sizeof(struct ath10k_skb_cb) >
|
|
|
|
IEEE80211_TX_INFO_DRIVER_DATA_SIZE);
|
|
|
|
return (struct ath10k_skb_cb *)&IEEE80211_SKB_CB(skb)->driver_data;
|
|
|
|
}
|
|
|
|
|
2015-01-24 18:14:47 +08:00
|
|
|
static inline struct ath10k_skb_rxcb *ATH10K_SKB_RXCB(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
BUILD_BUG_ON(sizeof(struct ath10k_skb_rxcb) > sizeof(skb->cb));
|
|
|
|
return (struct ath10k_skb_rxcb *)skb->cb;
|
|
|
|
}
|
|
|
|
|
2015-01-24 18:14:48 +08:00
|
|
|
#define ATH10K_RXCB_SKB(rxcb) \
|
|
|
|
container_of((void *)rxcb, struct sk_buff, cb)
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
static inline u32 host_interest_item_address(u32 item_offset)
|
|
|
|
{
|
|
|
|
return QCA988X_HOST_INTEREST_ADDRESS + item_offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ath10k_bmi {
|
|
|
|
bool done_sent;
|
|
|
|
};
|
|
|
|
|
2013-09-26 23:47:11 +08:00
|
|
|
struct ath10k_mem_chunk {
|
|
|
|
void *vaddr;
|
|
|
|
dma_addr_t paddr;
|
|
|
|
u32 len;
|
|
|
|
u32 req_id;
|
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k_wmi {
|
2014-12-03 16:10:08 +08:00
|
|
|
enum ath10k_fw_wmi_op_version op_version;
|
2013-06-13 01:52:10 +08:00
|
|
|
enum ath10k_htc_ep_id eid;
|
|
|
|
struct completion service_ready;
|
|
|
|
struct completion unified_ready;
|
2013-09-13 20:16:54 +08:00
|
|
|
wait_queue_head_t tx_credits_wq;
|
2014-11-27 17:11:17 +08:00
|
|
|
DECLARE_BITMAP(svc_map, WMI_SERVICE_MAX);
|
2013-09-26 23:47:05 +08:00
|
|
|
struct wmi_cmd_map *cmd;
|
2013-09-26 23:47:15 +08:00
|
|
|
struct wmi_vdev_param_map *vdev_param;
|
2013-09-26 23:47:16 +08:00
|
|
|
struct wmi_pdev_param_map *pdev_param;
|
2014-12-03 16:10:54 +08:00
|
|
|
const struct wmi_ops *ops;
|
2013-09-26 23:47:11 +08:00
|
|
|
|
|
|
|
u32 num_mem_chunks;
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
u32 rx_decap_mode;
|
2014-09-18 21:21:24 +08:00
|
|
|
struct ath10k_mem_chunk mem_chunks[WMI_MAX_MEM_REQS];
|
2013-06-13 01:52:10 +08:00
|
|
|
};
|
|
|
|
|
2014-09-25 18:33:48 +08:00
|
|
|
struct ath10k_fw_stats_peer {
|
2014-09-25 18:33:50 +08:00
|
|
|
struct list_head list;
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
u8 peer_macaddr[ETH_ALEN];
|
|
|
|
u32 peer_rssi;
|
|
|
|
u32 peer_tx_rate;
|
2014-03-28 20:35:15 +08:00
|
|
|
u32 peer_rx_rate; /* 10x only */
|
2013-06-13 01:52:10 +08:00
|
|
|
};
|
|
|
|
|
2015-02-15 22:50:40 +08:00
|
|
|
struct ath10k_fw_stats_vdev {
|
|
|
|
struct list_head list;
|
|
|
|
|
|
|
|
u32 vdev_id;
|
|
|
|
u32 beacon_snr;
|
|
|
|
u32 data_snr;
|
|
|
|
u32 num_tx_frames[4];
|
|
|
|
u32 num_rx_frames;
|
|
|
|
u32 num_tx_frames_retries[4];
|
|
|
|
u32 num_tx_frames_failures[4];
|
|
|
|
u32 num_rts_fail;
|
|
|
|
u32 num_rts_success;
|
|
|
|
u32 num_rx_err;
|
|
|
|
u32 num_rx_discard;
|
|
|
|
u32 num_tx_not_acked;
|
|
|
|
u32 tx_rate_history[10];
|
|
|
|
u32 beacon_rssi_history[10];
|
|
|
|
};
|
|
|
|
|
2014-09-25 18:33:50 +08:00
|
|
|
struct ath10k_fw_stats_pdev {
|
|
|
|
struct list_head list;
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
/* PDEV stats */
|
|
|
|
s32 ch_noise_floor;
|
|
|
|
u32 tx_frame_count;
|
|
|
|
u32 rx_frame_count;
|
|
|
|
u32 rx_clear_count;
|
|
|
|
u32 cycle_count;
|
|
|
|
u32 phy_err_count;
|
|
|
|
u32 chan_tx_power;
|
2014-03-28 20:35:16 +08:00
|
|
|
u32 ack_rx_bad;
|
|
|
|
u32 rts_bad;
|
|
|
|
u32 rts_good;
|
|
|
|
u32 fcs_bad;
|
|
|
|
u32 no_beacons;
|
|
|
|
u32 mib_int_count;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
/* PDEV TX stats */
|
|
|
|
s32 comp_queued;
|
|
|
|
s32 comp_delivered;
|
|
|
|
s32 msdu_enqued;
|
|
|
|
s32 mpdu_enqued;
|
|
|
|
s32 wmm_drop;
|
|
|
|
s32 local_enqued;
|
|
|
|
s32 local_freed;
|
|
|
|
s32 hw_queued;
|
|
|
|
s32 hw_reaped;
|
|
|
|
s32 underrun;
|
|
|
|
s32 tx_abort;
|
|
|
|
s32 mpdus_requed;
|
|
|
|
u32 tx_ko;
|
|
|
|
u32 data_rc;
|
|
|
|
u32 self_triggers;
|
|
|
|
u32 sw_retry_failure;
|
|
|
|
u32 illgl_rate_phy_err;
|
|
|
|
u32 pdev_cont_xretry;
|
|
|
|
u32 pdev_tx_timeout;
|
|
|
|
u32 pdev_resets;
|
|
|
|
u32 phy_underrun;
|
|
|
|
u32 txop_ovf;
|
|
|
|
|
|
|
|
/* PDEV RX stats */
|
|
|
|
s32 mid_ppdu_route_change;
|
|
|
|
s32 status_rcvd;
|
|
|
|
s32 r0_frags;
|
|
|
|
s32 r1_frags;
|
|
|
|
s32 r2_frags;
|
|
|
|
s32 r3_frags;
|
|
|
|
s32 htt_msdus;
|
|
|
|
s32 htt_mpdus;
|
|
|
|
s32 loc_msdus;
|
|
|
|
s32 loc_mpdus;
|
|
|
|
s32 oversize_amsdu;
|
|
|
|
s32 phy_errs;
|
|
|
|
s32 phy_err_drop;
|
|
|
|
s32 mpdu_errs;
|
2014-09-25 18:33:50 +08:00
|
|
|
};
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2014-09-25 18:33:50 +08:00
|
|
|
struct ath10k_fw_stats {
|
|
|
|
struct list_head pdevs;
|
2015-02-15 22:50:40 +08:00
|
|
|
struct list_head vdevs;
|
2014-09-25 18:33:50 +08:00
|
|
|
struct list_head peers;
|
2013-06-13 01:52:10 +08:00
|
|
|
};
|
|
|
|
|
2015-10-05 22:56:38 +08:00
|
|
|
#define ATH10K_TPC_TABLE_TYPE_FLAG 1
|
|
|
|
#define ATH10K_TPC_PREAM_TABLE_END 0xFFFF
|
|
|
|
|
|
|
|
struct ath10k_tpc_table {
|
|
|
|
u32 pream_idx[WMI_TPC_RATE_MAX];
|
|
|
|
u8 rate_code[WMI_TPC_RATE_MAX];
|
|
|
|
char tpc_value[WMI_TPC_RATE_MAX][WMI_TPC_TX_N_CHAIN * WMI_TPC_BUF_SIZE];
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ath10k_tpc_stats {
|
|
|
|
u32 reg_domain;
|
|
|
|
u32 chan_freq;
|
|
|
|
u32 phy_mode;
|
|
|
|
u32 twice_antenna_reduction;
|
|
|
|
u32 twice_max_rd_power;
|
|
|
|
s32 twice_antenna_gain;
|
|
|
|
u32 power_limit;
|
|
|
|
u32 num_tx_chain;
|
|
|
|
u32 ctl;
|
|
|
|
u32 rate_max;
|
|
|
|
u8 flag[WMI_TPC_FLAG];
|
|
|
|
struct ath10k_tpc_table tpc_table[WMI_TPC_FLAG];
|
|
|
|
};
|
|
|
|
|
2013-11-20 15:59:41 +08:00
|
|
|
struct ath10k_dfs_stats {
|
|
|
|
u32 phy_errors;
|
|
|
|
u32 pulses_total;
|
|
|
|
u32 pulses_detected;
|
|
|
|
u32 pulses_discarded;
|
|
|
|
u32 radar_detected;
|
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
#define ATH10K_MAX_NUM_PEER_IDS (1 << 11) /* htt rx_desc limit */
|
|
|
|
|
|
|
|
struct ath10k_peer {
|
|
|
|
struct list_head list;
|
|
|
|
int vdev_id;
|
|
|
|
u8 addr[ETH_ALEN];
|
|
|
|
DECLARE_BITMAP(peer_ids, ATH10K_MAX_NUM_PEER_IDS);
|
2014-11-25 14:16:59 +08:00
|
|
|
|
|
|
|
/* protected by ar->data_lock */
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ieee80211_key_conf *keys[WMI_MAX_KEY_INDEX + 1];
|
|
|
|
};
|
|
|
|
|
2014-02-14 21:49:48 +08:00
|
|
|
struct ath10k_sta {
|
|
|
|
struct ath10k_vif *arvif;
|
|
|
|
|
|
|
|
/* the following are protected by ar->data_lock */
|
|
|
|
u32 changed; /* IEEE80211_RC_* */
|
|
|
|
u32 bw;
|
|
|
|
u32 nss;
|
|
|
|
u32 smps;
|
|
|
|
|
|
|
|
struct work_struct update_wk;
|
2015-01-12 20:07:27 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_MAC80211_DEBUGFS
|
|
|
|
/* protected by conf_mutex */
|
|
|
|
bool aggr_mode;
|
|
|
|
#endif
|
2014-02-14 21:49:48 +08:00
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
#define ATH10K_VDEV_SETUP_TIMEOUT_HZ (5*HZ)
|
|
|
|
|
2015-01-29 20:29:52 +08:00
|
|
|
enum ath10k_beacon_state {
|
|
|
|
ATH10K_BEACON_SCHEDULED = 0,
|
|
|
|
ATH10K_BEACON_SENDING,
|
|
|
|
ATH10K_BEACON_SENT,
|
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k_vif {
|
2013-10-16 20:44:45 +08:00
|
|
|
struct list_head list;
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
u32 vdev_id;
|
|
|
|
enum wmi_vdev_type vdev_type;
|
|
|
|
enum wmi_vdev_subtype vdev_subtype;
|
|
|
|
u32 beacon_interval;
|
|
|
|
u32 dtim_period;
|
2013-09-13 20:16:56 +08:00
|
|
|
struct sk_buff *beacon;
|
2014-01-23 19:48:21 +08:00
|
|
|
/* protected by data_lock */
|
2015-01-29 20:29:52 +08:00
|
|
|
enum ath10k_beacon_state beacon_state;
|
2014-09-18 16:18:02 +08:00
|
|
|
void *beacon_buf;
|
|
|
|
dma_addr_t beacon_paddr;
|
2015-03-31 18:26:23 +08:00
|
|
|
unsigned long tx_paused; /* arbitrary values defined by target */
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
struct ath10k *ar;
|
|
|
|
struct ieee80211_vif *vif;
|
|
|
|
|
2014-01-23 18:38:25 +08:00
|
|
|
bool is_started;
|
|
|
|
bool is_up;
|
2014-08-02 14:12:54 +08:00
|
|
|
bool spectral_enabled;
|
2015-02-13 20:30:16 +08:00
|
|
|
bool ps;
|
2014-01-23 18:38:25 +08:00
|
|
|
u32 aid;
|
|
|
|
u8 bssid[ETH_ALEN];
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ieee80211_key_conf *wep_keys[WMI_MAX_KEY_INDEX + 1];
|
2015-01-29 19:50:38 +08:00
|
|
|
s8 def_wep_key_idx;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
u16 tx_seq_no;
|
|
|
|
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
u32 uapsd;
|
|
|
|
} sta;
|
|
|
|
struct {
|
2015-06-22 22:52:21 +08:00
|
|
|
/* 512 stations */
|
|
|
|
u8 tim_bitmap[64];
|
2013-06-13 01:52:10 +08:00
|
|
|
u8 tim_len;
|
|
|
|
u32 ssid_len;
|
|
|
|
u8 ssid[IEEE80211_MAX_SSID_LEN];
|
|
|
|
bool hidden_ssid;
|
|
|
|
/* P2P_IE with NoA attribute for P2P_GO case */
|
|
|
|
u32 noa_len;
|
|
|
|
u8 *noa_data;
|
|
|
|
} ap;
|
|
|
|
} u;
|
2014-01-08 16:08:33 +08:00
|
|
|
|
2014-03-11 18:58:00 +08:00
|
|
|
bool use_cts_prot;
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
bool nohwcrypt;
|
2014-03-11 18:58:00 +08:00
|
|
|
int num_legacy_stations;
|
2014-10-21 15:40:15 +08:00
|
|
|
int txpower;
|
2015-01-19 16:53:41 +08:00
|
|
|
struct wmi_wmm_params_all_arg wmm_params;
|
2015-03-05 22:02:17 +08:00
|
|
|
struct work_struct ap_csa_work;
|
2015-03-10 22:22:01 +08:00
|
|
|
struct delayed_work connection_loss_work;
|
2015-04-22 01:42:58 +08:00
|
|
|
struct cfg80211_bitrate_mask bitrate_mask;
|
2013-06-13 01:52:10 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct ath10k_vif_iter {
|
|
|
|
u32 vdev_id;
|
|
|
|
struct ath10k_vif *arvif;
|
|
|
|
};
|
|
|
|
|
2014-08-25 13:37:32 +08:00
|
|
|
/* used for crash-dump storage, protected by data-lock */
|
|
|
|
struct ath10k_fw_crash_data {
|
|
|
|
bool crashed_since_read;
|
|
|
|
|
|
|
|
uuid_le uuid;
|
|
|
|
struct timespec timestamp;
|
|
|
|
__le32 registers[REG_DUMP_COUNT_QCA988X];
|
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k_debug {
|
|
|
|
struct dentry *debugfs_phy;
|
|
|
|
|
2014-09-25 18:33:48 +08:00
|
|
|
struct ath10k_fw_stats fw_stats;
|
|
|
|
struct completion fw_stats_complete;
|
2014-09-25 18:33:50 +08:00
|
|
|
bool fw_stats_done;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2013-09-03 16:44:10 +08:00
|
|
|
unsigned long htt_stats_mask;
|
|
|
|
struct delayed_work htt_stats_dwork;
|
2013-11-20 15:59:41 +08:00
|
|
|
struct ath10k_dfs_stats dfs_stats;
|
|
|
|
struct ath_dfs_pool_stats dfs_pool_stats;
|
2014-01-03 18:59:31 +08:00
|
|
|
|
2015-10-05 22:56:38 +08:00
|
|
|
/* used for tpc-dump storage, protected by data-lock */
|
|
|
|
struct ath10k_tpc_stats *tpc_stats;
|
|
|
|
|
|
|
|
struct completion tpc_complete;
|
|
|
|
|
2014-10-03 13:02:33 +08:00
|
|
|
/* protected by conf_mutex */
|
2014-01-03 18:59:31 +08:00
|
|
|
u32 fw_dbglog_mask;
|
2015-01-29 17:06:52 +08:00
|
|
|
u32 fw_dbglog_level;
|
2014-10-03 13:02:33 +08:00
|
|
|
u32 pktlog_filter;
|
2014-11-25 18:24:33 +08:00
|
|
|
u32 reg_addr;
|
2014-12-02 19:07:14 +08:00
|
|
|
u32 nf_cal_period;
|
2014-06-03 02:19:46 +08:00
|
|
|
|
2014-08-25 13:37:32 +08:00
|
|
|
struct ath10k_fw_crash_data *fw_crash_data;
|
2013-06-13 01:52:10 +08:00
|
|
|
};
|
|
|
|
|
2013-07-16 15:38:52 +08:00
|
|
|
enum ath10k_state {
|
|
|
|
ATH10K_STATE_OFF = 0,
|
|
|
|
ATH10K_STATE_ON,
|
2013-07-16 15:54:35 +08:00
|
|
|
|
|
|
|
/* When doing firmware recovery the device is first powered down.
|
|
|
|
* mac80211 is supposed to call in to start() hook later on. It is
|
|
|
|
* however possible that driver unloading and firmware crash overlap.
|
|
|
|
* mac80211 can wait on conf_mutex in stop() while the device is
|
|
|
|
* stopped in ath10k_core_restart() work holding conf_mutex. The state
|
|
|
|
* RESTARTED means that the device is up and mac80211 has started hw
|
|
|
|
* reconfiguration. Once mac80211 is done with the reconfiguration we
|
2014-11-04 17:43:54 +08:00
|
|
|
* set the state to STATE_ON in reconfig_complete(). */
|
2013-07-16 15:54:35 +08:00
|
|
|
ATH10K_STATE_RESTARTING,
|
|
|
|
ATH10K_STATE_RESTARTED,
|
|
|
|
|
|
|
|
/* The device has crashed while restarting hw. This state is like ON
|
|
|
|
* but commands are blocked in HTC and -ECOMM response is given. This
|
|
|
|
* prevents completion timeouts and makes the driver more responsive to
|
|
|
|
* userspace commands. This is also prevents recursive recovery. */
|
|
|
|
ATH10K_STATE_WEDGED,
|
2014-09-10 23:23:30 +08:00
|
|
|
|
|
|
|
/* factory tests */
|
|
|
|
ATH10K_STATE_UTF,
|
|
|
|
};
|
|
|
|
|
|
|
|
enum ath10k_firmware_mode {
|
|
|
|
/* the default mode, standard 802.11 functionality */
|
|
|
|
ATH10K_FIRMWARE_MODE_NORMAL,
|
|
|
|
|
|
|
|
/* factory tests etc */
|
|
|
|
ATH10K_FIRMWARE_MODE_UTF,
|
2013-07-16 15:38:52 +08:00
|
|
|
};
|
|
|
|
|
2013-08-09 16:13:33 +08:00
|
|
|
enum ath10k_fw_features {
|
|
|
|
/* wmi_mgmt_rx_hdr contains extra RSSI information */
|
|
|
|
ATH10K_FW_FEATURE_EXT_WMI_MGMT_RX = 0,
|
|
|
|
|
2014-12-03 16:10:08 +08:00
|
|
|
/* Firmware from 10X branch. Deprecated, don't use in new code. */
|
2013-09-26 23:47:05 +08:00
|
|
|
ATH10K_FW_FEATURE_WMI_10X = 1,
|
|
|
|
|
2013-09-26 23:47:12 +08:00
|
|
|
/* firmware support tx frame management over WMI, otherwise it's HTT */
|
|
|
|
ATH10K_FW_FEATURE_HAS_WMI_MGMT_TX = 2,
|
|
|
|
|
2013-12-10 23:20:40 +08:00
|
|
|
/* Firmware does not support P2P */
|
|
|
|
ATH10K_FW_FEATURE_NO_P2P = 3,
|
|
|
|
|
2014-12-03 16:10:08 +08:00
|
|
|
/* Firmware 10.2 feature bit. The ATH10K_FW_FEATURE_WMI_10X feature
|
|
|
|
* bit is required to be set as well. Deprecated, don't use in new
|
|
|
|
* code.
|
2014-07-25 19:32:17 +08:00
|
|
|
*/
|
|
|
|
ATH10K_FW_FEATURE_WMI_10_2 = 4,
|
|
|
|
|
2015-02-13 20:30:16 +08:00
|
|
|
/* Some firmware revisions lack proper multi-interface client powersave
|
|
|
|
* implementation. Enabling PS could result in connection drops,
|
|
|
|
* traffic stalls, etc.
|
|
|
|
*/
|
|
|
|
ATH10K_FW_FEATURE_MULTI_VIF_PS_SUPPORT = 5,
|
|
|
|
|
2015-03-23 23:32:53 +08:00
|
|
|
/* Some firmware revisions have an incomplete WoWLAN implementation
|
|
|
|
* despite WMI service bit being advertised. This feature flag is used
|
|
|
|
* to distinguish whether WoWLAN is really supported or not.
|
|
|
|
*/
|
|
|
|
ATH10K_FW_FEATURE_WOWLAN_SUPPORT = 6,
|
|
|
|
|
2015-04-29 01:19:30 +08:00
|
|
|
/* Don't trust error code from otp.bin */
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
ATH10K_FW_FEATURE_IGNORE_OTP_RESULT = 7,
|
2015-04-29 01:19:30 +08:00
|
|
|
|
2015-05-19 20:09:34 +08:00
|
|
|
/* Some firmware revisions pad 4th hw address to 4 byte boundary making
|
|
|
|
* it 8 bytes long in Native Wifi Rx decap.
|
|
|
|
*/
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
ATH10K_FW_FEATURE_NO_NWIFI_DECAP_4ADDR_PADDING = 8,
|
2015-05-19 20:09:34 +08:00
|
|
|
|
2015-05-29 22:51:53 +08:00
|
|
|
/* Firmware supports bypassing PLL setting on init. */
|
|
|
|
ATH10K_FW_FEATURE_SUPPORTS_SKIP_CLOCK_INIT = 9,
|
|
|
|
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
/* Raw mode support. If supported, FW supports receiving and trasmitting
|
|
|
|
* frames in raw mode.
|
|
|
|
*/
|
|
|
|
ATH10K_FW_FEATURE_RAW_MODE_SUPPORT = 10,
|
|
|
|
|
2013-08-09 16:13:33 +08:00
|
|
|
/* keep last */
|
|
|
|
ATH10K_FW_FEATURE_COUNT,
|
|
|
|
};
|
|
|
|
|
2013-11-20 15:59:47 +08:00
|
|
|
enum ath10k_dev_flags {
|
|
|
|
/* Indicates that ath10k device is during CAC phase of DFS */
|
|
|
|
ATH10K_CAC_RUNNING,
|
2014-05-23 18:28:47 +08:00
|
|
|
ATH10K_FLAG_CORE_REGISTERED,
|
2014-10-28 17:34:38 +08:00
|
|
|
|
|
|
|
/* Device has crashed and needs to restart. This indicates any pending
|
|
|
|
* waiters should immediately cancel instead of waiting for a time out.
|
|
|
|
*/
|
|
|
|
ATH10K_FLAG_CRASH_FLUSH,
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
|
|
|
|
/* Use Raw mode instead of native WiFi Tx/Rx encap mode.
|
|
|
|
* Raw mode supports both hardware and software crypto. Native WiFi only
|
|
|
|
* supports hardware crypto.
|
|
|
|
*/
|
|
|
|
ATH10K_FLAG_RAW_MODE,
|
|
|
|
|
|
|
|
/* Disable HW crypto engine */
|
|
|
|
ATH10K_FLAG_HW_CRYPTO_DISABLED,
|
2013-11-20 15:59:47 +08:00
|
|
|
};
|
|
|
|
|
2014-10-13 14:40:59 +08:00
|
|
|
enum ath10k_cal_mode {
|
|
|
|
ATH10K_CAL_MODE_FILE,
|
|
|
|
ATH10K_CAL_MODE_OTP,
|
2014-12-02 16:55:54 +08:00
|
|
|
ATH10K_CAL_MODE_DT,
|
2014-10-13 14:40:59 +08:00
|
|
|
};
|
|
|
|
|
ath10k: enable raw encap mode and software crypto engine
This patch enables raw Rx/Tx encap mode to support software based
crypto engine. This patch introduces a new module param 'cryptmode'.
cryptmode:
0: Use hardware crypto engine globally with native Wi-Fi mode TX/RX
encapsulation to the firmware. This is the default mode.
1: Use sofware crypto engine globally with raw mode TX/RX
encapsulation to the firmware.
Known limitation:
A-MSDU must be disabled for RAW Tx encap mode to perform well when
heavy traffic is applied.
Testing: (by Michal Kazior <michal.kazior@tieto.com>)
a) Performance Testing
cryptmode=1
ap=qca988x sta=killer1525
killer1525 -> qca988x 194.496 mbps [tcp1 ip4]
killer1525 -> qca988x 238.309 mbps [tcp5 ip4]
killer1525 -> qca988x 266.958 mbps [udp1 ip4]
killer1525 -> qca988x 477.468 mbps [udp5 ip4]
qca988x -> killer1525 301.378 mbps [tcp1 ip4]
qca988x -> killer1525 297.949 mbps [tcp5 ip4]
qca988x -> killer1525 331.351 mbps [udp1 ip4]
qca988x -> killer1525 371.528 mbps [udp5 ip4]
ap=killer1525 sta=qca988x
qca988x -> killer1525 331.447 mbps [tcp1 ip4]
qca988x -> killer1525 328.783 mbps [tcp5 ip4]
qca988x -> killer1525 375.309 mbps [udp1 ip4]
qca988x -> killer1525 403.379 mbps [udp5 ip4]
killer1525 -> qca988x 203.689 mbps [tcp1 ip4]
killer1525 -> qca988x 222.339 mbps [tcp5 ip4]
killer1525 -> qca988x 264.199 mbps [udp1 ip4]
killer1525 -> qca988x 479.371 mbps [udp5 ip4]
Note:
- only open network tested for RAW vs nwifi performance comparison
- killer1525 (qca6174 hw2.2) is 2x2 device (hence max 866mbps)
- used iperf
- OTA, devices a few cm apart from each other, no shielding
- tcpX/udpX, X - means number of threads used
Overview:
- relative Tx performance drop is seen but is within reasonable and
expected threshold (A-MSDU must be disabled with RAW Tx)
b) Connectivity Testing
cryptmode=1
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br OK
ap=iwl6205 sta1=qca988x crypto=open topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wep1 topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa topology-1ap1sta2br1vlan OK
ap=iwl6205 sta1=qca988x crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=open topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wep1 topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa topology-1ap1sta2br1vlan OK
ap=qca988x sta1=iwl6205 crypto=wpa-ccmp topology-1ap1sta2br1vlan OK
Note:
- each test takes all possible endpoint pairs and pings
- each pair-ping flushes arp table
- ip6 is used
c) Testbed Topology:
1ap1sta:
[ap] ---- [sta]
endpoints: ap, sta
1ap1sta2br:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
endpoints: veth0, veth2, br0, br1
note: STA works in 4addr mode, AP has wds_sta=1
1ap1sta2br1vlan:
[veth0] [ap] ---- [sta] [veth2]
| | | |
[veth1] | \ [veth3]
\ / \ /
[br0] [br1]
| |
[vlan0_id2] [vlan1_id2]
endpoints: vlan0_id2, vlan1_id2
note: STA works in 4addr mode, AP has wds_sta=1
Credits:
Thanks to Michal Kazior <michal.kazior@tieto.com> who helped find the
amsdu issue, contributed a workaround (already squashed into this
patch), and contributed the throughput and connectivity tests results.
Signed-off-by: David Liu <cfliu.tw@gmail.com>
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Tested-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
2015-07-25 01:25:32 +08:00
|
|
|
enum ath10k_crypt_mode {
|
|
|
|
/* Only use hardware crypto engine */
|
|
|
|
ATH10K_CRYPT_MODE_HW,
|
|
|
|
/* Only use software crypto engine */
|
|
|
|
ATH10K_CRYPT_MODE_SW,
|
|
|
|
};
|
|
|
|
|
2014-10-13 14:40:59 +08:00
|
|
|
static inline const char *ath10k_cal_mode_str(enum ath10k_cal_mode mode)
|
|
|
|
{
|
|
|
|
switch (mode) {
|
|
|
|
case ATH10K_CAL_MODE_FILE:
|
|
|
|
return "file";
|
|
|
|
case ATH10K_CAL_MODE_OTP:
|
|
|
|
return "otp";
|
2014-12-02 16:55:54 +08:00
|
|
|
case ATH10K_CAL_MODE_DT:
|
|
|
|
return "dt";
|
2014-10-13 14:40:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
|
2014-08-05 20:54:44 +08:00
|
|
|
enum ath10k_scan_state {
|
|
|
|
ATH10K_SCAN_IDLE,
|
|
|
|
ATH10K_SCAN_STARTING,
|
|
|
|
ATH10K_SCAN_RUNNING,
|
|
|
|
ATH10K_SCAN_ABORTING,
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline const char *ath10k_scan_state_str(enum ath10k_scan_state state)
|
|
|
|
{
|
|
|
|
switch (state) {
|
|
|
|
case ATH10K_SCAN_IDLE:
|
|
|
|
return "idle";
|
|
|
|
case ATH10K_SCAN_STARTING:
|
|
|
|
return "starting";
|
|
|
|
case ATH10K_SCAN_RUNNING:
|
|
|
|
return "running";
|
|
|
|
case ATH10K_SCAN_ABORTING:
|
|
|
|
return "aborting";
|
|
|
|
}
|
|
|
|
|
|
|
|
return "unknown";
|
|
|
|
}
|
|
|
|
|
2015-03-31 18:26:23 +08:00
|
|
|
enum ath10k_tx_pause_reason {
|
|
|
|
ATH10K_TX_PAUSE_Q_FULL,
|
|
|
|
ATH10K_TX_PAUSE_MAX,
|
|
|
|
};
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k {
|
|
|
|
struct ath_common ath_common;
|
|
|
|
struct ieee80211_hw *hw;
|
|
|
|
struct device *dev;
|
|
|
|
u8 mac_addr[ETH_ALEN];
|
|
|
|
|
2015-01-24 18:14:49 +08:00
|
|
|
enum ath10k_hw_rev hw_rev;
|
2015-08-13 20:32:26 +08:00
|
|
|
u16 dev_id;
|
2013-09-01 16:22:14 +08:00
|
|
|
u32 chip_id;
|
2013-06-13 01:52:10 +08:00
|
|
|
u32 target_version;
|
|
|
|
u8 fw_version_major;
|
|
|
|
u32 fw_version_minor;
|
|
|
|
u16 fw_version_release;
|
|
|
|
u16 fw_version_build;
|
2015-04-02 03:53:21 +08:00
|
|
|
u32 fw_stats_req_mask;
|
2013-06-13 01:52:10 +08:00
|
|
|
u32 phy_capability;
|
|
|
|
u32 hw_min_tx_power;
|
|
|
|
u32 hw_max_tx_power;
|
|
|
|
u32 ht_cap_info;
|
|
|
|
u32 vht_cap_info;
|
2013-07-24 18:36:46 +08:00
|
|
|
u32 num_rf_chains;
|
2015-06-22 22:52:26 +08:00
|
|
|
u32 max_spatial_stream;
|
2015-03-19 19:08:00 +08:00
|
|
|
/* protected by conf_mutex */
|
|
|
|
bool ani_enabled;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2013-08-09 16:13:33 +08:00
|
|
|
DECLARE_BITMAP(fw_features, ATH10K_FW_FEATURE_COUNT);
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
bool p2p;
|
|
|
|
|
|
|
|
struct {
|
2014-10-13 14:40:47 +08:00
|
|
|
enum ath10k_bus bus;
|
2013-06-13 01:52:10 +08:00
|
|
|
const struct ath10k_hif_ops *ops;
|
|
|
|
} hif;
|
|
|
|
|
2014-02-11 00:14:23 +08:00
|
|
|
struct completion target_suspend;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2015-01-24 18:14:49 +08:00
|
|
|
const struct ath10k_hw_regs *regs;
|
2015-06-18 15:01:01 +08:00
|
|
|
const struct ath10k_hw_values *hw_values;
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k_bmi bmi;
|
2013-07-05 21:15:14 +08:00
|
|
|
struct ath10k_wmi wmi;
|
2013-07-05 21:15:13 +08:00
|
|
|
struct ath10k_htc htc;
|
2013-07-05 21:15:14 +08:00
|
|
|
struct ath10k_htt htt;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
struct ath10k_hw_params {
|
|
|
|
u32 id;
|
|
|
|
const char *name;
|
|
|
|
u32 patch_load_addr;
|
2014-12-02 16:55:55 +08:00
|
|
|
int uart_pin;
|
2015-06-18 15:01:10 +08:00
|
|
|
u32 otp_exe_param;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2015-05-25 20:06:18 +08:00
|
|
|
/* This is true if given HW chip has a quirky Cycle Counter
|
|
|
|
* wraparound which resets to 0x7fffffff instead of 0. All
|
|
|
|
* other CC related counters (e.g. Rx Clear Count) are divided
|
|
|
|
* by 2 so they never wraparound themselves.
|
|
|
|
*/
|
|
|
|
bool has_shifted_cc_wraparound;
|
|
|
|
|
2015-06-22 22:52:27 +08:00
|
|
|
/* Some of chip expects fragment descriptor to be continuous
|
|
|
|
* memory for any TX operation. Set continuous_frag_desc flag
|
|
|
|
* for the hardware which have such requirement.
|
|
|
|
*/
|
|
|
|
bool continuous_frag_desc;
|
|
|
|
|
2015-08-12 18:54:05 +08:00
|
|
|
u32 channel_counters_freq_hz;
|
|
|
|
|
2015-08-31 19:04:55 +08:00
|
|
|
/* Mgmt tx descriptors threshold for limiting probe response
|
|
|
|
* frames.
|
|
|
|
*/
|
|
|
|
u32 max_probe_resp_desc_thres;
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct ath10k_hw_params_fw {
|
|
|
|
const char *dir;
|
|
|
|
const char *fw;
|
|
|
|
const char *otp;
|
|
|
|
const char *board;
|
2014-12-02 16:55:54 +08:00
|
|
|
size_t board_size;
|
|
|
|
size_t board_ext_size;
|
2013-06-13 01:52:10 +08:00
|
|
|
} fw;
|
|
|
|
} hw_params;
|
|
|
|
|
2013-09-28 00:54:55 +08:00
|
|
|
const struct firmware *board;
|
2013-09-28 00:55:01 +08:00
|
|
|
const void *board_data;
|
|
|
|
size_t board_len;
|
|
|
|
|
2013-07-16 15:38:58 +08:00
|
|
|
const struct firmware *otp;
|
2013-09-28 00:55:01 +08:00
|
|
|
const void *otp_data;
|
|
|
|
size_t otp_len;
|
|
|
|
|
2013-07-16 15:38:58 +08:00
|
|
|
const struct firmware *firmware;
|
2013-09-28 00:55:01 +08:00
|
|
|
const void *firmware_data;
|
|
|
|
size_t firmware_len;
|
2013-07-16 15:38:58 +08:00
|
|
|
|
2014-10-13 14:40:59 +08:00
|
|
|
const struct firmware *cal_file;
|
|
|
|
|
2015-06-18 15:01:09 +08:00
|
|
|
struct {
|
|
|
|
const void *firmware_codeswap_data;
|
|
|
|
size_t firmware_codeswap_len;
|
|
|
|
struct ath10k_swap_code_seg_info *firmware_swap_code_seg_info;
|
|
|
|
} swap;
|
|
|
|
|
2015-04-17 17:19:17 +08:00
|
|
|
char spec_board_id[100];
|
|
|
|
bool spec_board_loaded;
|
|
|
|
|
2013-09-28 00:55:07 +08:00
|
|
|
int fw_api;
|
2014-10-13 14:40:59 +08:00
|
|
|
enum ath10k_cal_mode cal_mode;
|
2013-09-28 00:55:07 +08:00
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct {
|
|
|
|
struct completion started;
|
|
|
|
struct completion completed;
|
|
|
|
struct completion on_channel;
|
2014-08-05 20:54:44 +08:00
|
|
|
struct delayed_work timeout;
|
|
|
|
enum ath10k_scan_state state;
|
2013-06-13 01:52:10 +08:00
|
|
|
bool is_roc;
|
|
|
|
int vdev_id;
|
|
|
|
int roc_freq;
|
2015-07-09 19:08:36 +08:00
|
|
|
bool roc_notify;
|
2013-06-13 01:52:10 +08:00
|
|
|
} scan;
|
|
|
|
|
|
|
|
struct {
|
|
|
|
struct ieee80211_supported_band sbands[IEEE80211_NUM_BANDS];
|
|
|
|
} mac;
|
|
|
|
|
|
|
|
/* should never be NULL; needed for regular htt rx */
|
|
|
|
struct ieee80211_channel *rx_channel;
|
|
|
|
|
|
|
|
/* valid during scan; needed for mgmt rx during scan */
|
|
|
|
struct ieee80211_channel *scan_channel;
|
|
|
|
|
2014-01-23 18:38:25 +08:00
|
|
|
/* current operating channel definition */
|
|
|
|
struct cfg80211_chan_def chandef;
|
|
|
|
|
2014-09-24 05:17:16 +08:00
|
|
|
unsigned long long free_vdev_map;
|
2015-03-31 18:26:21 +08:00
|
|
|
struct ath10k_vif *monitor_arvif;
|
2014-04-08 14:45:47 +08:00
|
|
|
bool monitor;
|
2013-06-13 01:52:10 +08:00
|
|
|
int monitor_vdev_id;
|
2014-04-08 14:45:47 +08:00
|
|
|
bool monitor_started;
|
2013-06-13 01:52:10 +08:00
|
|
|
unsigned int filter_flags;
|
2013-11-20 15:59:47 +08:00
|
|
|
unsigned long dev_flags;
|
2013-11-20 16:00:28 +08:00
|
|
|
u32 dfs_block_radar_events;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2014-04-08 14:56:09 +08:00
|
|
|
/* protected by conf_mutex */
|
|
|
|
bool radar_enabled;
|
|
|
|
int num_started_vdevs;
|
|
|
|
|
2014-05-16 22:15:38 +08:00
|
|
|
/* Protected by conf-mutex */
|
|
|
|
u8 supp_tx_chainmask;
|
|
|
|
u8 supp_rx_chainmask;
|
|
|
|
u8 cfg_tx_chainmask;
|
|
|
|
u8 cfg_rx_chainmask;
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct completion install_key_done;
|
|
|
|
|
|
|
|
struct completion vdev_setup_done;
|
|
|
|
|
|
|
|
struct workqueue_struct *workqueue;
|
2015-07-29 16:40:38 +08:00
|
|
|
/* Auxiliary workqueue */
|
|
|
|
struct workqueue_struct *workqueue_aux;
|
2013-06-13 01:52:10 +08:00
|
|
|
|
|
|
|
/* prevents concurrent FW reconfiguration */
|
|
|
|
struct mutex conf_mutex;
|
|
|
|
|
|
|
|
/* protects shared structure data */
|
|
|
|
spinlock_t data_lock;
|
|
|
|
|
2013-10-16 20:44:45 +08:00
|
|
|
struct list_head arvifs;
|
2013-06-13 01:52:10 +08:00
|
|
|
struct list_head peers;
|
|
|
|
wait_queue_head_t peer_mapping_wq;
|
|
|
|
|
2014-11-25 22:16:04 +08:00
|
|
|
/* protected by conf_mutex */
|
2014-01-02 21:38:33 +08:00
|
|
|
int num_peers;
|
2014-11-25 22:16:05 +08:00
|
|
|
int num_stations;
|
|
|
|
|
|
|
|
int max_num_peers;
|
|
|
|
int max_num_stations;
|
2014-12-17 18:20:45 +08:00
|
|
|
int max_num_vdevs;
|
2015-03-30 14:51:52 +08:00
|
|
|
int max_num_tdls_vdevs;
|
2015-06-22 22:40:15 +08:00
|
|
|
int num_active_peers;
|
|
|
|
int num_tids;
|
2014-01-02 21:38:33 +08:00
|
|
|
|
2015-07-29 16:40:38 +08:00
|
|
|
struct work_struct svc_rdy_work;
|
|
|
|
struct sk_buff *svc_rdy_skb;
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
struct work_struct offchan_tx_work;
|
|
|
|
struct sk_buff_head offchan_tx_queue;
|
|
|
|
struct completion offchan_tx_completed;
|
|
|
|
struct sk_buff *offchan_tx_skb;
|
|
|
|
|
2013-09-26 23:47:12 +08:00
|
|
|
struct work_struct wmi_mgmt_tx_work;
|
|
|
|
struct sk_buff_head wmi_mgmt_tx_queue;
|
|
|
|
|
2013-07-16 15:38:52 +08:00
|
|
|
enum ath10k_state state;
|
|
|
|
|
2014-05-23 18:28:47 +08:00
|
|
|
struct work_struct register_work;
|
2013-07-16 15:54:35 +08:00
|
|
|
struct work_struct restart_work;
|
|
|
|
|
2013-07-31 16:32:40 +08:00
|
|
|
/* cycle count is reported twice for each visited channel during scan.
|
|
|
|
* access protected by data_lock */
|
|
|
|
u32 survey_last_rx_clear_count;
|
|
|
|
u32 survey_last_cycle_count;
|
|
|
|
struct survey_info survey[ATH10K_NUM_CHANS];
|
|
|
|
|
2015-05-25 20:06:19 +08:00
|
|
|
/* Channel info events are expected to come in pairs without and with
|
|
|
|
* COMPLETE flag set respectively for each channel visit during scan.
|
|
|
|
*
|
|
|
|
* However there are deviations from this rule. This flag is used to
|
|
|
|
* avoid reporting garbage data.
|
|
|
|
*/
|
|
|
|
bool ch_info_can_report_survey;
|
|
|
|
|
2013-11-20 15:59:41 +08:00
|
|
|
struct dfs_pattern_detector *dfs_detector;
|
|
|
|
|
2015-03-31 18:26:23 +08:00
|
|
|
unsigned long tx_paused; /* see ATH10K_TX_PAUSE_ */
|
|
|
|
|
2013-06-13 01:52:10 +08:00
|
|
|
#ifdef CONFIG_ATH10K_DEBUGFS
|
|
|
|
struct ath10k_debug debug;
|
|
|
|
#endif
|
2014-08-02 14:12:54 +08:00
|
|
|
|
|
|
|
struct {
|
|
|
|
/* relay(fs) channel for spectral scan */
|
|
|
|
struct rchan *rfs_chan_spec_scan;
|
|
|
|
|
|
|
|
/* spectral_mode and spec_config are protected by conf_mutex */
|
|
|
|
enum ath10k_spectral_mode mode;
|
|
|
|
struct ath10k_spec_scan config;
|
|
|
|
} spectral;
|
2014-08-07 17:03:27 +08:00
|
|
|
|
2014-09-10 23:23:30 +08:00
|
|
|
struct {
|
|
|
|
/* protected by conf_mutex */
|
|
|
|
const struct firmware *utf;
|
|
|
|
DECLARE_BITMAP(orig_fw_features, ATH10K_FW_FEATURE_COUNT);
|
2014-12-03 16:10:54 +08:00
|
|
|
enum ath10k_fw_wmi_op_version orig_wmi_op_version;
|
2014-09-10 23:23:30 +08:00
|
|
|
|
|
|
|
/* protected by data_lock */
|
|
|
|
bool utf_monitor;
|
|
|
|
} testmode;
|
|
|
|
|
2014-09-29 19:41:46 +08:00
|
|
|
struct {
|
|
|
|
/* protected by data_lock */
|
|
|
|
u32 fw_crash_counter;
|
|
|
|
u32 fw_warm_reset_counter;
|
|
|
|
u32 fw_cold_reset_counter;
|
|
|
|
} stats;
|
|
|
|
|
2014-12-17 18:22:07 +08:00
|
|
|
struct ath10k_thermal thermal;
|
2015-03-23 23:32:53 +08:00
|
|
|
struct ath10k_wow wow;
|
2014-12-17 18:22:07 +08:00
|
|
|
|
2014-08-07 17:03:27 +08:00
|
|
|
/* must be last */
|
|
|
|
u8 drv_priv[0] __aligned(sizeof(void *));
|
2013-06-13 01:52:10 +08:00
|
|
|
};
|
|
|
|
|
2014-08-07 17:03:27 +08:00
|
|
|
struct ath10k *ath10k_core_create(size_t priv_size, struct device *dev,
|
2014-10-13 14:40:47 +08:00
|
|
|
enum ath10k_bus bus,
|
2015-01-24 18:14:49 +08:00
|
|
|
enum ath10k_hw_rev hw_rev,
|
2013-06-13 01:52:10 +08:00
|
|
|
const struct ath10k_hif_ops *hif_ops);
|
|
|
|
void ath10k_core_destroy(struct ath10k *ar);
|
2015-06-15 19:46:40 +08:00
|
|
|
void ath10k_core_get_fw_features_str(struct ath10k *ar,
|
|
|
|
char *buf,
|
|
|
|
size_t max_len);
|
2013-06-13 01:52:10 +08:00
|
|
|
|
2014-09-10 23:23:30 +08:00
|
|
|
int ath10k_core_start(struct ath10k *ar, enum ath10k_firmware_mode mode);
|
2014-02-11 00:14:24 +08:00
|
|
|
int ath10k_wait_for_suspend(struct ath10k *ar, u32 suspend_opt);
|
2013-07-16 15:38:51 +08:00
|
|
|
void ath10k_core_stop(struct ath10k *ar);
|
2013-09-01 16:22:14 +08:00
|
|
|
int ath10k_core_register(struct ath10k *ar, u32 chip_id);
|
2013-06-13 01:52:10 +08:00
|
|
|
void ath10k_core_unregister(struct ath10k *ar);
|
|
|
|
|
|
|
|
#endif /* _CORE_H_ */
|