]> git.karo-electronics.de Git - mv-sheeva.git/blob - drivers/staging/bcm/Qos.c
6e40646290464ea5ab3552171feed8a32b33ee29
[mv-sheeva.git] / drivers / staging / bcm / Qos.c
1 /**
2 @file Qos.C
3 This file contains the routines related to Quality of Service.
4 */
5 #include "headers.h"
6
7 BOOLEAN MatchSrcIpAddress(S_CLASSIFIER_RULE *pstClassifierRule,ULONG ulSrcIP);
8 BOOLEAN MatchTos(S_CLASSIFIER_RULE *pstClassifierRule,UCHAR ucTypeOfService);
9 BOOLEAN MatchSrcPort(S_CLASSIFIER_RULE *pstClassifierRule,USHORT ushSrcPort);
10 BOOLEAN MatchDestPort(S_CLASSIFIER_RULE *pstClassifierRule,USHORT ushDestPort);
11 BOOLEAN MatchProtocol(S_CLASSIFIER_RULE *pstClassifierRule,UCHAR ucProtocol);
12 BOOLEAN MatchDestIpAddress(S_CLASSIFIER_RULE *pstClassifierRule,ULONG ulDestIP);
13 USHORT ClassifyPacket(PMINI_ADAPTER Adapter,struct sk_buff* skb);
14 void EThCSGetPktInfo(PMINI_ADAPTER Adapter,PVOID pvEthPayload,PS_ETHCS_PKT_INFO pstEthCsPktInfo);
15 BOOLEAN EThCSClassifyPkt(PMINI_ADAPTER Adapter,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo,S_CLASSIFIER_RULE *pstClassifierRule, B_UINT8 EthCSCupport);
16
17 /*******************************************************************
18 * Function    - MatchSrcIpAddress()
19 *
20 * Description - Checks whether the Source IP address from the packet
21 *                               matches with that of Queue.
22 *
23 * Parameters  - pstClassifierRule: Pointer to the packet info structure.
24 *                         - ulSrcIP         : Source IP address from the packet.
25 *
26 * Returns     - TRUE(If address matches) else FAIL .
27 *********************************************************************/
28 BOOLEAN MatchSrcIpAddress(S_CLASSIFIER_RULE *pstClassifierRule,ULONG ulSrcIP)
29 {
30     UCHAR       ucLoopIndex=0;
31
32     PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
33
34     ulSrcIP=ntohl(ulSrcIP);
35     if(0 == pstClassifierRule->ucIPSourceAddressLength)
36         return TRUE;
37     for(ucLoopIndex=0; ucLoopIndex < (pstClassifierRule->ucIPSourceAddressLength);ucLoopIndex++)
38     {
39                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Ip Address Mask:0x%x PacketIp:0x%x and Classification:0x%x", (UINT)pstClassifierRule->stSrcIpAddress.ulIpv4Mask[ucLoopIndex], (UINT)ulSrcIP, (UINT)pstClassifierRule->stSrcIpAddress.ulIpv6Addr[ucLoopIndex]);
40                 if((pstClassifierRule->stSrcIpAddress.ulIpv4Mask[ucLoopIndex] & ulSrcIP)==
41                                 (pstClassifierRule->stSrcIpAddress.ulIpv4Addr[ucLoopIndex] & pstClassifierRule->stSrcIpAddress.ulIpv4Mask[ucLoopIndex] ))
42         {
43                 return TRUE;
44         }
45     }
46     BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Ip Address Not Matched");
47         return FALSE;
48 }
49
50
51 /*******************************************************************
52 * Function    - MatchDestIpAddress()
53 *
54 * Description - Checks whether the Destination IP address from the packet
55 *                               matches with that of Queue.
56 *
57 * Parameters  - pstClassifierRule: Pointer to the packet info structure.
58 *                         - ulDestIP    : Destination IP address from the packet.
59 *
60 * Returns     - TRUE(If address matches) else FAIL .
61 *********************************************************************/
62 BOOLEAN MatchDestIpAddress(S_CLASSIFIER_RULE *pstClassifierRule,ULONG ulDestIP)
63 {
64         UCHAR   ucLoopIndex=0;
65     PMINI_ADAPTER       Adapter = GET_BCM_ADAPTER(gblpnetdev);
66
67         ulDestIP=ntohl(ulDestIP);
68     if(0 == pstClassifierRule->ucIPDestinationAddressLength)
69         return TRUE;
70         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination Ip Address 0x%x 0x%x 0x%x  ", (UINT)ulDestIP, (UINT)pstClassifierRule->stDestIpAddress.ulIpv4Mask[ucLoopIndex], (UINT)pstClassifierRule->stDestIpAddress.ulIpv4Addr[ucLoopIndex]);
71
72     for(ucLoopIndex=0;ucLoopIndex<(pstClassifierRule->ucIPDestinationAddressLength);ucLoopIndex++)
73     {
74                 if((pstClassifierRule->stDestIpAddress.ulIpv4Mask[ucLoopIndex] & ulDestIP)==
75                                         (pstClassifierRule->stDestIpAddress.ulIpv4Addr[ucLoopIndex] & pstClassifierRule->stDestIpAddress.ulIpv4Mask[ucLoopIndex]))
76         {
77                 return TRUE;
78         }
79     }
80         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination Ip Address Not Matched");
81     return FALSE;
82 }
83
84
85 /************************************************************************
86 * Function    - MatchTos()
87 *
88 * Description - Checks the TOS from the packet matches with that of queue.
89 *
90 * Parameters  - pstClassifierRule   : Pointer to the packet info structure.
91 *                         - ucTypeOfService: TOS from the packet.
92 *
93 * Returns     - TRUE(If address matches) else FAIL.
94 **************************************************************************/
95 BOOLEAN MatchTos(S_CLASSIFIER_RULE *pstClassifierRule,UCHAR ucTypeOfService)
96 {
97
98         PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
99     if( 3 != pstClassifierRule->ucIPTypeOfServiceLength )
100         return TRUE;
101
102     if(((pstClassifierRule->ucTosMask & ucTypeOfService)<=pstClassifierRule->ucTosHigh) && ((pstClassifierRule->ucTosMask & ucTypeOfService)>=pstClassifierRule->ucTosLow))
103     {
104         return TRUE;
105     }
106     BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Type Of Service Not Matched");
107     return FALSE;
108 }
109
110
111 /***************************************************************************
112 * Function    - MatchProtocol()
113 *
114 * Description - Checks the protocol from the packet matches with that of queue.
115 *
116 * Parameters  - pstClassifierRule: Pointer to the packet info structure.
117 *                         - ucProtocol  : Protocol from the packet.
118 *
119 * Returns     - TRUE(If address matches) else FAIL.
120 ****************************************************************************/
121 BOOLEAN MatchProtocol(S_CLASSIFIER_RULE *pstClassifierRule,UCHAR ucProtocol)
122 {
123         UCHAR   ucLoopIndex=0;
124         PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
125         if(0 == pstClassifierRule->ucProtocolLength)
126         return TRUE;
127         for(ucLoopIndex=0;ucLoopIndex<pstClassifierRule->ucProtocolLength;ucLoopIndex++)
128     {
129         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Protocol:0x%X Classification Protocol:0x%X",ucProtocol,pstClassifierRule->ucProtocol[ucLoopIndex]);
130         if(pstClassifierRule->ucProtocol[ucLoopIndex]==ucProtocol)
131         {
132                 return TRUE;
133         }
134     }
135     BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Protocol Not Matched");
136         return FALSE;
137 }
138
139
140 /***********************************************************************
141 * Function    - MatchSrcPort()
142 *
143 * Description - Checks, Source port from the packet matches with that of queue.
144 *
145 * Parameters  - pstClassifierRule: Pointer to the packet info structure.
146 *                         - ushSrcPort  : Source port from the packet.
147 *
148 * Returns     - TRUE(If address matches) else FAIL.
149 ***************************************************************************/
150 BOOLEAN MatchSrcPort(S_CLASSIFIER_RULE *pstClassifierRule,USHORT ushSrcPort)
151 {
152         UCHAR   ucLoopIndex=0;
153
154                 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
155
156
157         if(0 == pstClassifierRule->ucSrcPortRangeLength)
158                 return TRUE;
159         for(ucLoopIndex=0;ucLoopIndex<pstClassifierRule->ucSrcPortRangeLength;ucLoopIndex++)
160         {
161                 if(ushSrcPort <= pstClassifierRule->usSrcPortRangeHi[ucLoopIndex] &&
162                     ushSrcPort >= pstClassifierRule->usSrcPortRangeLo[ucLoopIndex])
163                 {
164                         return TRUE;
165                 }
166         }
167                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Port: %x Not Matched ",ushSrcPort);
168         return FALSE;
169 }
170
171
172 /***********************************************************************
173 * Function    - MatchDestPort()
174 *
175 * Description - Checks, Destination port from packet matches with that of queue.
176 *
177 * Parameters  - pstClassifierRule: Pointer to the packet info structure.
178 *                         - ushDestPort : Destination port from the packet.
179 *
180 * Returns     - TRUE(If address matches) else FAIL.
181 ***************************************************************************/
182 BOOLEAN MatchDestPort(S_CLASSIFIER_RULE *pstClassifierRule,USHORT ushDestPort)
183 {
184         UCHAR   ucLoopIndex=0;
185                 PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
186
187         if(0 == pstClassifierRule->ucDestPortRangeLength)
188                 return TRUE;
189
190         for(ucLoopIndex=0;ucLoopIndex<pstClassifierRule->ucDestPortRangeLength;ucLoopIndex++)
191         {
192                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Matching Port:0x%X   0x%X  0x%X",ushDestPort,pstClassifierRule->usDestPortRangeLo[ucLoopIndex],pstClassifierRule->usDestPortRangeHi[ucLoopIndex]);
193
194                 if(ushDestPort <= pstClassifierRule->usDestPortRangeHi[ucLoopIndex] &&
195                     ushDestPort >= pstClassifierRule->usDestPortRangeLo[ucLoopIndex])
196                 {
197                     return TRUE;
198                 }
199         }
200                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Dest Port: %x Not Matched",ushDestPort);
201         return FALSE;
202 }
203 /**
204 @ingroup tx_functions
205 Compares IPV4 Ip address and port number
206 @return Queue Index.
207 */
208 USHORT  IpVersion4(PMINI_ADAPTER Adapter, /**< Pointer to the driver control structure */
209                                         struct iphdr *iphd, /**<Pointer to the IP Hdr of the packet*/
210                                         S_CLASSIFIER_RULE *pstClassifierRule )
211 {
212         //IPHeaderFormat                *pIpHeader=NULL;
213         xporthdr                *xprt_hdr=NULL;
214         BOOLEAN bClassificationSucceed=FALSE;
215
216         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "========>");
217
218         xprt_hdr=(xporthdr *)((PUCHAR)iphd + sizeof(struct iphdr));
219
220         do {
221                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Trying to see Direction = %d %d",
222                         pstClassifierRule->ucDirection,
223                         pstClassifierRule->usVCID_Value);
224
225                 //Checking classifier validity
226                 if(!pstClassifierRule->bUsed || pstClassifierRule->ucDirection == DOWNLINK_DIR)
227                 {
228                         bClassificationSucceed = FALSE;
229                         break;
230                 }
231
232                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "is IPv6 check!");
233                 if(pstClassifierRule->bIpv6Protocol)
234                         break;
235
236                 //**************Checking IP header parameter**************************//
237                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Trying to match Source IP Address");
238                 if(FALSE == (bClassificationSucceed =
239                         MatchSrcIpAddress(pstClassifierRule, iphd->saddr)))
240                         break;
241                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Source IP Address Matched");
242
243                 if(FALSE == (bClassificationSucceed =
244                         MatchDestIpAddress(pstClassifierRule, iphd->daddr)))
245                         break;
246                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination IP Address Matched");
247
248                 if(FALSE == (bClassificationSucceed =
249                         MatchTos(pstClassifierRule, iphd->tos)))
250                 {
251                         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "TOS Match failed\n");
252                         break;
253                 }
254                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "TOS Matched");
255
256                 if(FALSE == (bClassificationSucceed =
257                         MatchProtocol(pstClassifierRule,iphd->protocol)))
258                         break;
259                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Protocol Matched");
260
261                 //if protocol is not TCP or UDP then no need of comparing source port and destination port
262                 if(iphd->protocol!=TCP && iphd->protocol!=UDP)
263                         break;
264 #if 0
265                 //check if memory is available of src and Dest port
266                 if(ETH_AND_IP_HEADER_LEN + L4_SRC_PORT_LEN + L4_DEST_PORT_LEN > Packet->len)
267                 {
268                         //This is not an erroneous condition and pkt will be checked for next classification.
269                         bClassificationSucceed = FALSE;
270                         break;
271                 }
272 #endif
273                 //******************Checking Transport Layer Header field if present *****************//
274                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Source Port %04x",
275                         (iphd->protocol==UDP)?xprt_hdr->uhdr.source:xprt_hdr->thdr.source);
276
277                 if(FALSE == (bClassificationSucceed =
278                         MatchSrcPort(pstClassifierRule,
279                                 ntohs((iphd->protocol == UDP)?
280                                 xprt_hdr->uhdr.source:xprt_hdr->thdr.source))))
281                         break;
282                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Src Port Matched");
283
284                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "Destination Port %04x",
285                         (iphd->protocol==UDP)?xprt_hdr->uhdr.dest:
286                         xprt_hdr->thdr.dest);
287                 if(FALSE == (bClassificationSucceed =
288                         MatchDestPort(pstClassifierRule,
289                         ntohs((iphd->protocol == UDP)?
290                         xprt_hdr->uhdr.dest:xprt_hdr->thdr.dest))))
291                         break;
292         } while(0);
293
294         if(TRUE==bClassificationSucceed)
295         {
296                 INT iMatchedSFQueueIndex = 0;
297                 iMatchedSFQueueIndex = SearchSfid(Adapter,pstClassifierRule->ulSFID);
298                 if(iMatchedSFQueueIndex >= NO_OF_QUEUES)
299                 {
300                         bClassificationSucceed = FALSE;
301                 }
302                 else
303                 {
304                         if(FALSE == Adapter->PackInfo[iMatchedSFQueueIndex].bActive)
305                         {
306                                 bClassificationSucceed = FALSE;
307                         }
308                 }
309         }
310
311         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "IpVersion4 <==========");
312
313         return bClassificationSucceed;
314 }
315 /**
316 @ingroup tx_functions
317 @return  Queue Index based on priority.
318 */
319 USHORT GetPacketQueueIndex(PMINI_ADAPTER Adapter, /**<Pointer to the driver control structure */
320                                                                 struct sk_buff* Packet /**< Pointer to the Packet to be sent*/
321                                                                 )
322 {
323         USHORT                  usIndex=-1;
324         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, QUEUE_INDEX, DBG_LVL_ALL, "=====>");
325
326         if(NULL==Adapter || NULL==Packet)
327         {
328                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, QUEUE_INDEX, DBG_LVL_ALL, "Got NULL Values<======");
329                 return -1;
330         }
331
332         usIndex = ClassifyPacket(Adapter,Packet);
333
334         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, QUEUE_INDEX, DBG_LVL_ALL, "Got Queue Index %x",usIndex);
335         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, QUEUE_INDEX, DBG_LVL_ALL, "GetPacketQueueIndex <==============");
336         return usIndex;
337 }
338
339 VOID PruneQueueAllSF(PMINI_ADAPTER Adapter)
340 {
341         UINT iIndex = 0;
342
343         for(iIndex = 0; iIndex < HiPriority; iIndex++)
344         {
345                 if(!Adapter->PackInfo[iIndex].bValid)
346                         continue;
347
348                 PruneQueue(Adapter, iIndex);
349         }
350 }
351
352
353 /**
354 @ingroup tx_functions
355 This function checks if the max queue size for a queue
356 is less than number of bytes in the queue. If so -
357 drops packets from the Head till the number of bytes is
358 less than or equal to max queue size for the queue.
359 */
360 VOID PruneQueue(PMINI_ADAPTER Adapter,/**<Pointer to the driver control structure*/
361                                         INT iIndex/**<Queue Index*/
362                                         )
363 {
364         struct sk_buff* PacketToDrop=NULL;
365         struct net_device_stats *netstats;
366
367         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "=====> Index %d",iIndex);
368
369         if(iIndex == HiPriority)
370                 return;
371
372         if(!Adapter || (iIndex < 0) || (iIndex > HiPriority))
373                 return;
374
375         /* To Store the netdevice statistic */
376         netstats = &Adapter->dev->stats;
377
378         spin_lock_bh(&Adapter->PackInfo[iIndex].SFQueueLock);
379
380         while(1)
381 //      while((UINT)Adapter->PackInfo[iIndex].uiCurrentPacketsOnHost >
382 //              SF_MAX_ALLOWED_PACKETS_TO_BACKUP)
383         {
384                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "uiCurrentBytesOnHost:%x uiMaxBucketSize :%x",
385                 Adapter->PackInfo[iIndex].uiCurrentBytesOnHost,
386                 Adapter->PackInfo[iIndex].uiMaxBucketSize);
387
388                 PacketToDrop = Adapter->PackInfo[iIndex].FirstTxQueue;
389
390                 if(PacketToDrop == NULL)
391                         break;
392                 if((Adapter->PackInfo[iIndex].uiCurrentPacketsOnHost < SF_MAX_ALLOWED_PACKETS_TO_BACKUP) &&
393                         ((1000*(jiffies - *((B_UINT32 *)(PacketToDrop->cb)+SKB_CB_LATENCY_OFFSET))/HZ) <= Adapter->PackInfo[iIndex].uiMaxLatency))
394                         break;
395
396                 if(PacketToDrop)
397                 {
398                         if(netstats)
399                                 netstats->tx_dropped++;
400                         atomic_inc(&Adapter->TxDroppedPacketCount);
401                         DEQUEUEPACKET(Adapter->PackInfo[iIndex].FirstTxQueue,
402                                                 Adapter->PackInfo[iIndex].LastTxQueue);
403                         /// update current bytes and packets count
404                         Adapter->PackInfo[iIndex].uiCurrentBytesOnHost -=
405                                 PacketToDrop->len;
406                         Adapter->PackInfo[iIndex].uiCurrentPacketsOnHost--;
407                         /// update dropped bytes and packets counts
408                         Adapter->PackInfo[iIndex].uiDroppedCountBytes += PacketToDrop->len;
409                         Adapter->PackInfo[iIndex].uiDroppedCountPackets++;
410                         dev_kfree_skb(PacketToDrop);
411
412                 }
413
414                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "Dropped Bytes:%x Dropped Packets:%x",
415                         Adapter->PackInfo[iIndex].uiDroppedCountBytes,
416                         Adapter->PackInfo[iIndex].uiDroppedCountPackets);
417
418                 atomic_dec(&Adapter->TotalPacketCount);
419                 Adapter->bcm_jiffies = jiffies;
420         }
421
422         spin_unlock_bh(&Adapter->PackInfo[iIndex].SFQueueLock);
423
424         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "TotalPacketCount:%x",
425                 atomic_read(&Adapter->TotalPacketCount));
426         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, PRUNE_QUEUE, DBG_LVL_ALL, "<=====");
427 }
428
429 VOID flush_all_queues(PMINI_ADAPTER Adapter)
430 {
431         INT             iQIndex;
432         UINT    uiTotalPacketLength;
433         struct sk_buff*                         PacketToDrop=NULL;
434         struct net_device_stats*        netstats=&Adapter->dev->stats;
435
436         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_OTHERS, DUMP_INFO, DBG_LVL_ALL, "=====>");
437
438 //      down(&Adapter->data_packet_queue_lock);
439         for(iQIndex=LowPriority; iQIndex<HiPriority; iQIndex++)
440         {
441                 spin_lock_bh(&Adapter->PackInfo[iQIndex].SFQueueLock);
442                 while(Adapter->PackInfo[iQIndex].FirstTxQueue)
443                 {
444                         PacketToDrop = Adapter->PackInfo[iQIndex].FirstTxQueue;
445                         if(PacketToDrop)
446                         {
447                                 uiTotalPacketLength = PacketToDrop->len;
448                                 netstats->tx_dropped++;
449                                 atomic_inc(&Adapter->TxDroppedPacketCount);
450                         }
451                         else
452                                 uiTotalPacketLength = 0;
453
454                         DEQUEUEPACKET(Adapter->PackInfo[iQIndex].FirstTxQueue,
455                                                 Adapter->PackInfo[iQIndex].LastTxQueue);
456
457                         /* Free the skb */
458                         dev_kfree_skb(PacketToDrop);
459
460                         /// update current bytes and packets count
461                         Adapter->PackInfo[iQIndex].uiCurrentBytesOnHost -= uiTotalPacketLength;
462                         Adapter->PackInfo[iQIndex].uiCurrentPacketsOnHost--;
463
464                         /// update dropped bytes and packets counts
465                         Adapter->PackInfo[iQIndex].uiDroppedCountBytes += uiTotalPacketLength;
466                         Adapter->PackInfo[iQIndex].uiDroppedCountPackets++;
467
468                         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_OTHERS, DUMP_INFO, DBG_LVL_ALL, "Dropped Bytes:%x Dropped Packets:%x",
469                                         Adapter->PackInfo[iQIndex].uiDroppedCountBytes,
470                                         Adapter->PackInfo[iQIndex].uiDroppedCountPackets);
471                         atomic_dec(&Adapter->TotalPacketCount);
472                 }
473                 spin_unlock_bh(&Adapter->PackInfo[iQIndex].SFQueueLock);
474         }
475 //      up(&Adapter->data_packet_queue_lock);
476         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_OTHERS, DUMP_INFO, DBG_LVL_ALL, "<=====");
477 }
478
479 USHORT ClassifyPacket(PMINI_ADAPTER Adapter,struct sk_buff* skb)
480 {
481         INT                     uiLoopIndex=0;
482         S_CLASSIFIER_RULE *pstClassifierRule = NULL;
483         S_ETHCS_PKT_INFO stEthCsPktInfo;
484         PVOID pvEThPayload = NULL;
485         struct iphdr            *pIpHeader = NULL;
486         INT       uiSfIndex=0;
487         USHORT  usIndex=Adapter->usBestEffortQueueIndex;
488         BOOLEAN bFragmentedPkt=FALSE,bClassificationSucceed=FALSE;
489         USHORT  usCurrFragment =0;
490
491         PTCP_HEADER pTcpHeader;
492         UCHAR IpHeaderLength;
493         UCHAR TcpHeaderLength;
494
495         pvEThPayload = skb->data;
496         *((UINT32*) (skb->cb) +SKB_CB_TCPACK_OFFSET ) = 0;
497         EThCSGetPktInfo(Adapter,pvEThPayload,&stEthCsPktInfo);
498
499         switch(stEthCsPktInfo.eNwpktEthFrameType)
500         {
501                 case eEth802LLCFrame:
502                 {
503                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : 802LLCFrame\n");
504             pIpHeader = pvEThPayload + sizeof(ETH_CS_802_LLC_FRAME);
505                         break;
506                 }
507
508                 case eEth802LLCSNAPFrame:
509                 {
510                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : 802LLC SNAP Frame\n");
511                         pIpHeader = pvEThPayload + sizeof(ETH_CS_802_LLC_SNAP_FRAME);
512                         break;
513                 }
514                 case eEth802QVLANFrame:
515                 {
516                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : 802.1Q VLANFrame\n");
517                         pIpHeader = pvEThPayload + sizeof(ETH_CS_802_Q_FRAME);
518                         break;
519                 }
520                 case eEthOtherFrame:
521                 {
522                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : ETH Other Frame\n");
523                         pIpHeader = pvEThPayload + sizeof(ETH_CS_ETH2_FRAME);
524                         break;
525                 }
526                 default:
527                 {
528                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "ClassifyPacket : Unrecognized ETH Frame\n");
529                         pIpHeader = pvEThPayload + sizeof(ETH_CS_ETH2_FRAME);
530                         break;
531                 }
532         }
533
534         if(stEthCsPktInfo.eNwpktIPFrameType == eIPv4Packet)
535         {
536                 usCurrFragment = (ntohs(pIpHeader->frag_off) & IP_OFFSET);
537                 if((ntohs(pIpHeader->frag_off) & IP_MF) || usCurrFragment)
538                         bFragmentedPkt = TRUE;
539
540                 if(bFragmentedPkt)
541                 {
542                                 //Fragmented  Packet. Get Frag Classifier Entry.
543                         pstClassifierRule = GetFragIPClsEntry(Adapter,pIpHeader->id, pIpHeader->saddr);
544                         if(pstClassifierRule)
545                         {
546                                         BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,"It is next Fragmented pkt");
547                                         bClassificationSucceed=TRUE;
548                         }
549                         if(!(ntohs(pIpHeader->frag_off) & IP_MF))
550                         {
551                                 //Fragmented Last packet . Remove Frag Classifier Entry
552                                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,"This is the last fragmented Pkt");
553                                 DelFragIPClsEntry(Adapter,pIpHeader->id, pIpHeader->saddr);
554                         }
555                 }
556         }
557
558         for(uiLoopIndex = MAX_CLASSIFIERS - 1; uiLoopIndex >= 0; uiLoopIndex--)
559         {
560                 if (Adapter->device_removed)
561                 {
562                         bClassificationSucceed = FALSE;
563                         break;
564                 }
565
566                 if(bClassificationSucceed)
567                         break;
568                 //Iterate through all classifiers which are already in order of priority
569                 //to classify the packet until match found
570                 do
571                 {
572                         if(FALSE==Adapter->astClassifierTable[uiLoopIndex].bUsed)
573                         {
574                                 bClassificationSucceed=FALSE;
575                                 break;
576                         }
577                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "Adapter->PackInfo[%d].bvalid=True\n",uiLoopIndex);
578
579                         if(0 == Adapter->astClassifierTable[uiLoopIndex].ucDirection)
580                         {
581                                 bClassificationSucceed=FALSE;//cannot be processed for classification.
582                                 break;                                          // it is a down link connection
583                         }
584
585                         pstClassifierRule = &Adapter->astClassifierTable[uiLoopIndex];
586
587                         uiSfIndex = SearchSfid(Adapter,pstClassifierRule->ulSFID);
588                         if (uiSfIndex >= NO_OF_QUEUES) {
589                                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "Queue Not Valid. SearchSfid for this classifier Failed\n");
590                                 break;
591                         }
592
593                         if(Adapter->PackInfo[uiSfIndex].bEthCSSupport)
594                         {
595
596                                 if(eEthUnsupportedFrame==stEthCsPktInfo.eNwpktEthFrameType)
597                                 {
598                                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  " ClassifyPacket : Packet Not a Valid Supported Ethernet Frame \n");
599                                         bClassificationSucceed = FALSE;
600                                         break;
601                                 }
602
603
604
605                                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "Performing ETH CS Classification on Classifier Rule ID : %x Service Flow ID : %lx\n",pstClassifierRule->uiClassifierRuleIndex,Adapter->PackInfo[uiSfIndex].ulSFID);
606                                 bClassificationSucceed = EThCSClassifyPkt(Adapter,skb,&stEthCsPktInfo,pstClassifierRule, Adapter->PackInfo[uiSfIndex].bEthCSSupport);
607
608                                 if(!bClassificationSucceed)
609                                 {
610                                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ClassifyPacket : Ethernet CS Classification Failed\n");
611                                         break;
612                                 }
613                         }
614
615                         else // No ETH Supported on this SF
616                         {
617                                 if(eEthOtherFrame != stEthCsPktInfo.eNwpktEthFrameType)
618                                 {
619                                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  " ClassifyPacket : Packet Not a 802.3 Ethernet Frame... hence not allowed over non-ETH CS SF \n");
620                                         bClassificationSucceed = FALSE;
621                                         break;
622                                 }
623                         }
624
625                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "Proceeding to IP CS Clasification");
626
627                         if(Adapter->PackInfo[uiSfIndex].bIPCSSupport)
628                         {
629
630                                 if(stEthCsPktInfo.eNwpktIPFrameType == eNonIPPacket)
631                                 {
632                                         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  " ClassifyPacket : Packet is Not an IP Packet \n");
633                                         bClassificationSucceed = FALSE;
634                                         break;
635                                 }
636                                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "Dump IP Header : \n");
637                                 DumpFullPacket((PUCHAR)pIpHeader,20);
638
639                                 if(stEthCsPktInfo.eNwpktIPFrameType == eIPv4Packet)
640                                         bClassificationSucceed = IpVersion4(Adapter,pIpHeader,pstClassifierRule);
641                                 else if(stEthCsPktInfo.eNwpktIPFrameType == eIPv6Packet)
642                                         bClassificationSucceed = IpVersion6(Adapter,pIpHeader,pstClassifierRule);
643                         }
644
645                 }while(0);
646         }
647
648         if(bClassificationSucceed == TRUE)
649         {
650                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "CF id : %d, SF ID is =%lu",pstClassifierRule->uiClassifierRuleIndex, pstClassifierRule->ulSFID);
651
652                 //Store The matched Classifier in SKB
653                 *((UINT32*)(skb->cb)+SKB_CB_CLASSIFICATION_OFFSET) = pstClassifierRule->uiClassifierRuleIndex;
654                 if((TCP == pIpHeader->protocol ) && !bFragmentedPkt && (ETH_AND_IP_HEADER_LEN + TCP_HEADER_LEN <= skb->len) )
655                 {
656                          IpHeaderLength   = pIpHeader->ihl;
657                          pTcpHeader = (PTCP_HEADER)(((PUCHAR)pIpHeader)+(IpHeaderLength*4));
658                          TcpHeaderLength  = GET_TCP_HEADER_LEN(pTcpHeader->HeaderLength);
659
660                         if((pTcpHeader->ucFlags & TCP_ACK) &&
661                            (ntohs(pIpHeader->tot_len) == (IpHeaderLength*4)+(TcpHeaderLength*4)))
662                         {
663                         *((UINT32*) (skb->cb) +SKB_CB_TCPACK_OFFSET ) = TCP_ACK;
664                         }
665                 }
666
667                 usIndex = SearchSfid(Adapter, pstClassifierRule->ulSFID);
668                 BCM_DEBUG_PRINT(Adapter,DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL, "index is   =%d", usIndex);
669
670                 //If this is the first fragment of a Fragmented pkt, add this CF. Only This CF should be used for all other fragment of this Pkt.
671                 if(bFragmentedPkt && (usCurrFragment == 0))
672                 {
673                         //First Fragment of Fragmented Packet. Create Frag CLS Entry
674                         S_FRAGMENTED_PACKET_INFO stFragPktInfo;
675                         stFragPktInfo.bUsed = TRUE;
676                         stFragPktInfo.ulSrcIpAddress = pIpHeader->saddr;
677                         stFragPktInfo.usIpIdentification = pIpHeader->id;
678                         stFragPktInfo.pstMatchedClassifierEntry = pstClassifierRule;
679                         stFragPktInfo.bOutOfOrderFragment = FALSE;
680                         AddFragIPClsEntry(Adapter,&stFragPktInfo);
681                 }
682
683
684         }
685
686         if(bClassificationSucceed)
687                 return usIndex;
688         else
689                 return INVALID_QUEUE_INDEX;
690 }
691
692 static BOOLEAN EthCSMatchSrcMACAddress(S_CLASSIFIER_RULE *pstClassifierRule,PUCHAR Mac)
693 {
694         UINT i=0;
695     PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
696         if(pstClassifierRule->ucEthCSSrcMACLen==0)
697                 return TRUE;
698         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s \n",__FUNCTION__);
699         for(i=0;i<MAC_ADDRESS_SIZE;i++)
700         {
701                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "SRC MAC[%x] = %x ClassifierRuleSrcMAC = %x Mask : %x\n",i,Mac[i],pstClassifierRule->au8EThCSSrcMAC[i],pstClassifierRule->au8EThCSSrcMACMask[i]);
702                 if((pstClassifierRule->au8EThCSSrcMAC[i] & pstClassifierRule->au8EThCSSrcMACMask[i])!=
703                         (Mac[i] & pstClassifierRule->au8EThCSSrcMACMask[i]))
704                         return FALSE;
705         }
706         return TRUE;
707 }
708
709 static BOOLEAN EthCSMatchDestMACAddress(S_CLASSIFIER_RULE *pstClassifierRule,PUCHAR Mac)
710 {
711         UINT i=0;
712     PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
713         if(pstClassifierRule->ucEthCSDestMACLen==0)
714                 return TRUE;
715         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s \n",__FUNCTION__);
716         for(i=0;i<MAC_ADDRESS_SIZE;i++)
717         {
718                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "SRC MAC[%x] = %x ClassifierRuleSrcMAC = %x Mask : %x\n",i,Mac[i],pstClassifierRule->au8EThCSDestMAC[i],pstClassifierRule->au8EThCSDestMACMask[i]);
719                 if((pstClassifierRule->au8EThCSDestMAC[i] & pstClassifierRule->au8EThCSDestMACMask[i])!=
720                         (Mac[i] & pstClassifierRule->au8EThCSDestMACMask[i]))
721                         return FALSE;
722         }
723         return TRUE;
724 }
725
726 static BOOLEAN EthCSMatchEThTypeSAP(S_CLASSIFIER_RULE *pstClassifierRule,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo)
727 {
728     PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
729         if((pstClassifierRule->ucEtherTypeLen==0)||
730                 (pstClassifierRule->au8EthCSEtherType[0] == 0))
731                 return TRUE;
732
733         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s SrcEtherType:%x CLS EtherType[0]:%x\n",__FUNCTION__,pstEthCsPktInfo->usEtherType,pstClassifierRule->au8EthCSEtherType[0]);
734         if(pstClassifierRule->au8EthCSEtherType[0] == 1)
735         {
736                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s  CLS EtherType[1]:%x EtherType[2]:%x\n",__FUNCTION__,pstClassifierRule->au8EthCSEtherType[1],pstClassifierRule->au8EthCSEtherType[2]);
737
738                 if(memcmp(&pstEthCsPktInfo->usEtherType,&pstClassifierRule->au8EthCSEtherType[1],2)==0)
739                         return TRUE;
740                 else
741                         return FALSE;
742         }
743
744         if(pstClassifierRule->au8EthCSEtherType[0] == 2)
745         {
746                 if(eEth802LLCFrame != pstEthCsPktInfo->eNwpktEthFrameType)
747                         return FALSE;
748
749                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s  EthCS DSAP:%x EtherType[2]:%x\n",__FUNCTION__,pstEthCsPktInfo->ucDSAP,pstClassifierRule->au8EthCSEtherType[2]);
750                 if(pstEthCsPktInfo->ucDSAP == pstClassifierRule->au8EthCSEtherType[2])
751                         return TRUE;
752                 else
753                         return FALSE;
754
755         }
756
757         return FALSE;
758
759 }
760
761 static BOOLEAN EthCSMatchVLANRules(S_CLASSIFIER_RULE *pstClassifierRule,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo)
762 {
763         BOOLEAN bClassificationSucceed = FALSE;
764         USHORT usVLANID;
765         B_UINT8 uPriority = 0;
766     PMINI_ADAPTER Adapter = GET_BCM_ADAPTER(gblpnetdev);
767
768         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s  CLS UserPrio:%x CLS VLANID:%x\n",__FUNCTION__,ntohs(*((USHORT *)pstClassifierRule->usUserPriority)),pstClassifierRule->usVLANID);
769
770         /* In case FW didn't recieve the TLV, the priority field should be ignored */
771         if(pstClassifierRule->usValidityBitMap & (1<<PKT_CLASSIFICATION_USER_PRIORITY_VALID))
772         {
773                 if(pstEthCsPktInfo->eNwpktEthFrameType!=eEth802QVLANFrame)
774                                 return FALSE;
775
776                 uPriority = (ntohs(*(USHORT *)(skb->data + sizeof(ETH_HEADER_STRUC))) & 0xF000) >> 13;
777
778                 if((uPriority >= pstClassifierRule->usUserPriority[0]) && (uPriority <= pstClassifierRule->usUserPriority[1]))
779                                 bClassificationSucceed = TRUE;
780
781                 if(!bClassificationSucceed)
782                         return FALSE;
783         }
784
785         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ETH CS 802.1 D  User Priority Rule Matched\n");
786
787         bClassificationSucceed = FALSE;
788
789         if(pstClassifierRule->usValidityBitMap & (1<<PKT_CLASSIFICATION_VLANID_VALID))
790         {
791                 if(pstEthCsPktInfo->eNwpktEthFrameType!=eEth802QVLANFrame)
792                                 return FALSE;
793
794                 usVLANID = ntohs(*(USHORT *)(skb->data + sizeof(ETH_HEADER_STRUC))) & 0xFFF;
795
796                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "%s  Pkt VLANID %x Priority: %d\n",__FUNCTION__,usVLANID, uPriority);
797
798                 if(usVLANID == ((pstClassifierRule->usVLANID & 0xFFF0) >> 4))
799                         bClassificationSucceed = TRUE;
800
801                 if(!bClassificationSucceed)
802                         return FALSE;
803         }
804
805         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ETH CS 802.1 Q VLAN ID Rule Matched\n");
806
807         return TRUE;
808 }
809
810
811 BOOLEAN EThCSClassifyPkt(PMINI_ADAPTER Adapter,struct sk_buff* skb,PS_ETHCS_PKT_INFO pstEthCsPktInfo,S_CLASSIFIER_RULE *pstClassifierRule, B_UINT8 EthCSCupport)
812 {
813         BOOLEAN bClassificationSucceed = FALSE;
814         bClassificationSucceed = EthCSMatchSrcMACAddress(pstClassifierRule,((ETH_HEADER_STRUC *)(skb->data))->au8SourceAddress);
815         if(!bClassificationSucceed)
816                 return FALSE;
817         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ETH CS SrcMAC Matched\n");
818
819         bClassificationSucceed = EthCSMatchDestMACAddress(pstClassifierRule,((ETH_HEADER_STRUC*)(skb->data))->au8DestinationAddress);
820         if(!bClassificationSucceed)
821                 return FALSE;
822         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ETH CS DestMAC Matched\n");
823
824         //classify on ETHType/802.2SAP TLV
825         bClassificationSucceed = EthCSMatchEThTypeSAP(pstClassifierRule,skb,pstEthCsPktInfo);
826         if(!bClassificationSucceed)
827                 return FALSE;
828
829         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ETH CS EthType/802.2SAP Matched\n");
830
831         //classify on 802.1VLAN Header Parameters
832
833         bClassificationSucceed = EthCSMatchVLANRules(pstClassifierRule,skb,pstEthCsPktInfo);
834         if(!bClassificationSucceed)
835                 return FALSE;
836         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "ETH CS 802.1 VLAN Rules Matched\n");
837
838         return bClassificationSucceed;
839 }
840
841 void EThCSGetPktInfo(PMINI_ADAPTER Adapter,PVOID pvEthPayload,PS_ETHCS_PKT_INFO pstEthCsPktInfo)
842 {
843         USHORT u16Etype = ntohs(((ETH_HEADER_STRUC*)pvEthPayload)->u16Etype);
844         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "EthCSGetPktInfo : Eth Hdr Type : %X\n",u16Etype);
845         if(u16Etype > 0x5dc)
846         {
847                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "EthCSGetPktInfo : ETH2 Frame \n");
848                 //ETH2 Frame
849                 if(u16Etype == ETHERNET_FRAMETYPE_802QVLAN)
850                 {
851                         //802.1Q VLAN Header
852                         pstEthCsPktInfo->eNwpktEthFrameType = eEth802QVLANFrame;
853                         u16Etype = ((ETH_CS_802_Q_FRAME*)pvEthPayload)->EthType;
854                         //((ETH_CS_802_Q_FRAME*)pvEthPayload)->UserPriority
855                 }
856                 else
857                 {
858                         pstEthCsPktInfo->eNwpktEthFrameType = eEthOtherFrame;
859                         u16Etype = ntohs(u16Etype);
860                 }
861
862         }
863         else
864         {
865                 //802.2 LLC
866                 BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "802.2 LLC Frame \n");
867                 pstEthCsPktInfo->eNwpktEthFrameType = eEth802LLCFrame;
868                 pstEthCsPktInfo->ucDSAP = ((ETH_CS_802_LLC_FRAME*)pvEthPayload)->DSAP;
869                 if(pstEthCsPktInfo->ucDSAP == 0xAA && ((ETH_CS_802_LLC_FRAME*)pvEthPayload)->SSAP == 0xAA)
870                 {
871                         //SNAP Frame
872                         pstEthCsPktInfo->eNwpktEthFrameType = eEth802LLCSNAPFrame;
873                         u16Etype = ((ETH_CS_802_LLC_SNAP_FRAME*)pvEthPayload)->usEtherType;
874                 }
875         }
876         if(u16Etype == ETHERNET_FRAMETYPE_IPV4)
877                 pstEthCsPktInfo->eNwpktIPFrameType = eIPv4Packet;
878         else if(u16Etype == ETHERNET_FRAMETYPE_IPV6)
879                 pstEthCsPktInfo->eNwpktIPFrameType = eIPv6Packet;
880         else
881                 pstEthCsPktInfo->eNwpktIPFrameType = eNonIPPacket;
882
883         pstEthCsPktInfo->usEtherType = ((ETH_HEADER_STRUC*)pvEthPayload)->u16Etype;
884         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "EthCsPktInfo->eNwpktIPFrameType : %x\n",pstEthCsPktInfo->eNwpktIPFrameType);
885         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "EthCsPktInfo->eNwpktEthFrameType : %x\n",pstEthCsPktInfo->eNwpktEthFrameType);
886         BCM_DEBUG_PRINT(Adapter, DBG_TYPE_TX, IPV4_DBG, DBG_LVL_ALL,  "EthCsPktInfo->usEtherType : %x\n",pstEthCsPktInfo->usEtherType);
887 }
888
889
890