Re: [PATCH RFC/RFT] ath10k: use xmit encapsulation offloading

2022-05-18 Thread Ansuel Smith
Il giorno gio 19 mag 2022 alle ore 01:17 Edward Matijevic
 ha scritto:
>
> Reporting an issue running these patches with the ath10k-ct driver
> from OpenWrt 22.03-rc1 crashing repeatedly on my IPQ8064+QCA9980
> router
> The patches only require an edit to the file locations to the
> directory ath10k-5.15/ and the offsets apply without issue
> Below is a log from the hardware crashing repeatedly, only lines
> removed included MACs
>
> ieee80211 phy0: Hardware restart was requested
> ath10k_pci :01:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
> ath10k_pci :01:00.0: msdu-desc: 2500  skid: 32
> ath10k_pci :01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186
> msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
> ath10k_pci :01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
> ath10k_pci :01:00.0: rts threshold -1
> ath10k_pci :01:00.0: Firmware lacks feature flag indicating a
> retry limit of > 2 is OK, requested limit: 4
> ath10k_pci :01:00.0: device successfully recovered
> ath10k_pci :01:00.0: firmware crashed! (guid
> dacbb411-7d89-4a0b-b4a8-1e25f10d9838)
> ath10k_pci :01:00.0: qca99x0 hw2.0 target 0x0100 chip_id
> 0x003b01ff sub 168c:0002
> ath10k_pci :01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
> ath10k_pci :01:00.0: firmware ver 10.4b-ct-9980-fW-13-5ae337bb1
> api 5 features 
> mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT
> crc32 b36a12bf
> ath10k_pci :01:00.0: board_file api 2 bmi_id 1:1 crc32 e4a0f655
> ath10k_pci :01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal
> pre-cal-nvmem max-sta 32 raw 0 hwcrypto 1
> ath10k_pci :01:00.0: firmware register dump:
> ath10k_pci :01:00.0: [00]: 0x0009 0x 0x0098C64F 0x
> ath10k_pci :01:00.0: [04]: 0x 0x00060124 0x 0x
> ath10k_pci :01:00.0: [08]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [12]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [16]: 0x009BFE03 0x009C0489 0x0097F8C6 0x0098C64F
> ath10k_pci :01:00.0: [20]: 0x 0x00401C20 0x 0x
> ath10k_pci :01:00.0: [24]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [28]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [32]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [36]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [40]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [44]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [48]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [52]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: [56]: 0x 0x 0x 0x
> ath10k_pci :01:00.0: Copy Engine register dump:
> ath10k_pci :01:00.0: [00]: 0x0004a000   0   0   3   3
> ath10k_pci :01:00.0: [01]: 0x0004a400   3   3  73  74
> ath10k_pci :01:00.0: [02]: 0x0004a800  51  51  50  51
> ath10k_pci :01:00.0: [03]: 0x0004ac00  29  29   1  29
> ath10k_pci :01:00.0: [04]: 0x0004b000  23  23  52  14
> ath10k_pci :01:00.0: [05]: 0x0004b400  22  22  53  54
> ath10k_pci :01:00.0: [06]: 0x0004b800   8   8   8   8
> ath10k_pci :01:00.0: [07]: 0x0004bc00   1   1   1   1
> ath10k_pci :01:00.0: [08]: 0x0004c000   0   0 127   0
> ath10k_pci :01:00.0: [09]: 0x0004c400   1   1   1   1
> ath10k_pci :01:00.0: [10]: 0x0004c800   0   0   0   0
> ath10k_pci :01:00.0: [11]: 0x0004cc00   0   0   0   0
> ath10k_pci :01:00.0: debug log header, dbuf: 0x4197f8  dropped: 0
> ath10k_pci :01:00.0: [0] next: 0x4197e0 buf: 0x4158b0 sz: 1500
> len: 0 count: 0 free: 0
> ath10k_pci :01:00.0: [1] next: 0x4197f8 buf: 0x4152c0 sz: 1500
> len: 0 count: 0 free: 0
>

There should be a beta firmware with the crash fixed...
But anyway the ct firmware doesn't work with offload and
this is the main reason i never actually put effort in getting
this merged. Openwrt use ath10k-ct and offload doesn't work,
the dev didn't bother to fix it so rip any use of this since the
original ath10k is not usable for some user.

> ___
> openwrt-devel mailing list
> openwrt-devel@lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-devel

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


[PATCH RFC/RFT] ath10k: use xmit encapsulation offloading

2022-05-18 Thread Edward Matijevic
Reporting an issue running these patches with the ath10k-ct driver
from OpenWrt 22.03-rc1 crashing repeatedly on my IPQ8064+QCA9980
router
The patches only require an edit to the file locations to the
directory ath10k-5.15/ and the offsets apply without issue
Below is a log from the hardware crashing repeatedly, only lines
removed included MACs

ieee80211 phy0: Hardware restart was requested
ath10k_pci :01:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
ath10k_pci :01:00.0: msdu-desc: 2500  skid: 32
ath10k_pci :01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186
msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
ath10k_pci :01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
ath10k_pci :01:00.0: rts threshold -1
ath10k_pci :01:00.0: Firmware lacks feature flag indicating a
retry limit of > 2 is OK, requested limit: 4
ath10k_pci :01:00.0: device successfully recovered
ath10k_pci :01:00.0: firmware crashed! (guid
dacbb411-7d89-4a0b-b4a8-1e25f10d9838)
ath10k_pci :01:00.0: qca99x0 hw2.0 target 0x0100 chip_id
0x003b01ff sub 168c:0002
ath10k_pci :01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
ath10k_pci :01:00.0: firmware ver 10.4b-ct-9980-fW-13-5ae337bb1
api 5 features 
mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT
crc32 b36a12bf
ath10k_pci :01:00.0: board_file api 2 bmi_id 1:1 crc32 e4a0f655
ath10k_pci :01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal
pre-cal-nvmem max-sta 32 raw 0 hwcrypto 1
ath10k_pci :01:00.0: firmware register dump:
ath10k_pci :01:00.0: [00]: 0x0009 0x 0x0098C64F 0x
ath10k_pci :01:00.0: [04]: 0x 0x00060124 0x 0x
ath10k_pci :01:00.0: [08]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [12]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [16]: 0x009BFE03 0x009C0489 0x0097F8C6 0x0098C64F
ath10k_pci :01:00.0: [20]: 0x 0x00401C20 0x 0x
ath10k_pci :01:00.0: [24]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [28]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [32]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [36]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [40]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [44]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [48]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [52]: 0x 0x 0x 0x
ath10k_pci :01:00.0: [56]: 0x 0x 0x 0x
ath10k_pci :01:00.0: Copy Engine register dump:
ath10k_pci :01:00.0: [00]: 0x0004a000   0   0   3   3
ath10k_pci :01:00.0: [01]: 0x0004a400   3   3  73  74
ath10k_pci :01:00.0: [02]: 0x0004a800  51  51  50  51
ath10k_pci :01:00.0: [03]: 0x0004ac00  29  29   1  29
ath10k_pci :01:00.0: [04]: 0x0004b000  23  23  52  14
ath10k_pci :01:00.0: [05]: 0x0004b400  22  22  53  54
ath10k_pci :01:00.0: [06]: 0x0004b800   8   8   8   8
ath10k_pci :01:00.0: [07]: 0x0004bc00   1   1   1   1
ath10k_pci :01:00.0: [08]: 0x0004c000   0   0 127   0
ath10k_pci :01:00.0: [09]: 0x0004c400   1   1   1   1
ath10k_pci :01:00.0: [10]: 0x0004c800   0   0   0   0
ath10k_pci :01:00.0: [11]: 0x0004cc00   0   0   0   0
ath10k_pci :01:00.0: debug log header, dbuf: 0x4197f8  dropped: 0
ath10k_pci :01:00.0: [0] next: 0x4197e0 buf: 0x4158b0 sz: 1500
len: 0 count: 0 free: 0
ath10k_pci :01:00.0: [1] next: 0x4197f8 buf: 0x4152c0 sz: 1500
len: 0 count: 0 free: 0

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


Re: [PATCH] ramips: use hotplug script for EAP615-Wall MACs

2022-05-18 Thread Stijn Segers

Hi Stijn,

Op dinsdag 17 mei 2022 om 17u57 schreef Stijn Tintel 
:

Using nvmem-cells to set the MAC address for a DBDC device results in
both PHY devices using the same MAC address. This in turn will result 
in

multiple BSSes using the same BSSID, which can cause various problems.

Use the hotplug script for the EAP615-Wall instead to avoid this.

Fixes: a1b8a4d7b3ff ("ramips: support TP-Link EAP615-Wall")
Signed-off-by: Stijn Tintel 



As advertised ;-). Tested on 22.03 branch, both radios use different 
MAC now.


Tested-by: Stijn Segers 


---
 target/linux/ramips/dts/mt7621_tplink_eap615-wall-v1.dts  | 2 --
 .../mt7621/base-files/etc/hotplug.d/ieee80211/10_fix_wifi_mac | 4 


 2 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/target/linux/ramips/dts/mt7621_tplink_eap615-wall-v1.dts 
b/target/linux/ramips/dts/mt7621_tplink_eap615-wall-v1.dts

index a0c3912d8e..0be4af39e8 100644
--- a/target/linux/ramips/dts/mt7621_tplink_eap615-wall-v1.dts
+++ b/target/linux/ramips/dts/mt7621_tplink_eap615-wall-v1.dts
@@ -144,8 +144,6 @@
compatible = "mediatek,mt76";
reg = <0x 0 0 0 0>;
mediatek,mtd-eeprom = < 0x0>;
-   nvmem-cells = <_info_8>;
-   nvmem-cell-names = "mac-address";
};
 };

diff --git 
a/target/linux/ramips/mt7621/base-files/etc/hotplug.d/ieee80211/10_fix_wifi_mac 
b/target/linux/ramips/mt7621/base-files/etc/hotplug.d/ieee80211/10_fix_wifi_mac

index a35e9dcc28..5b12416872 100644
--- 
a/target/linux/ramips/mt7621/base-files/etc/hotplug.d/ieee80211/10_fix_wifi_mac
+++ 
b/target/linux/ramips/mt7621/base-files/etc/hotplug.d/ieee80211/10_fix_wifi_mac

@@ -90,6 +90,10 @@ case "$board" in
hw_mac_addr="$(mtd_get_mac_binary factory 0x4)"
 		[ "$PHYNBR" = "1" ] &&  macaddr_add $hw_mac_addr "0x10" > 
/sys${DEVPATH}/macaddress

;;
+   tplink,eap615-wall-v1)
+   hw_mac_addr="$(mtd_get_mac_binary product-info 0x8)"
+   macaddr_add "$hw_mac_addr" "$PHYNBR" > 
"/sys${DEVPATH}/macaddress"
+   ;;
yuncore,ax820)
[ "$PHYNBR" = "1" ] && \
 			macaddr_setbit_la "$(mtd_get_mac_binary Factory 0xe000)" > 
/sys${DEVPATH}/macaddress

--
2.35.1


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel




___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


Re: [PATCH firewall4] ruleset: add missing pre_* chains

2022-05-18 Thread Jo-Philipp Wich
Hi,

can't you do the same by dropping a snippet into /etc/nftables.d/ which simply
registers chain with lower priority hooks? In fact there already is an example
[1].

So in order to achieve what you want, create an
`/etc/nftables.d/10-pre-chains.nft with the following contents:

-- 8< --
chain pre_input {
  type filter hook input priority -1; policy accept;
}

chain pre_forward {
  type filter hook forward priority -1; policy accept;
}

chain pre_output {
  type filter hook output priority -1; policy accept;
}
-- >8 --


Since nftables makes it easy to have many hooks, I doubt that such a generic,
mostly unused facility is needed at all. If your package/process/use case
requires staging custom rules before the default ones, drop a partial into
/etc/nftables.d/ which declares own chains with lower priority hooks along
with the rules you need.

~ Jo


1:
https://git.openwrt.org/?p=project/firewall4.git;a=blob;f=root/etc/nftables.d/10-custom-filter-chains.nft;h=4cb421308f2f8b084add77fc51f8430596d83abf;hb=b2682251a173103490a4a2556fb87e4df1d627b3#l8



signature.asc
Description: OpenPGP digital signature
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


[PATCH firewall4] ruleset: add missing pre_* chains

2022-05-18 Thread Florian Eckert
There is the option to add a user change, but if the rule applies, the
fw4 rules are still processed. This is because these chains are
top-level chains that only have a different priority.

This priority indicates whether they are processed before or after the
fw4 chains.

So that rules can also be processed in the context of the fw4 and are
not passed on to the next toplevel chain in the event of an apply. The
rule must be processed in the context of the fw4 tables. This commit
adds a pre chain for input, output and forward.

Firewall rules, that are not handeled by the fw4  can then be hooked into
this, which are then processed in the context of the fw4 and are thus
allowed through by the fw4 in the event of an accept.

Signed-off-by: Florian Eckert 
(cherry picked from commit 596f9f7973560210a8ccf386d7017aaa07ea77d2)
---
 root/usr/share/firewall4/templates/ruleset.uc | 15 +++
 1 file changed, 15 insertions(+)

diff --git a/root/usr/share/firewall4/templates/ruleset.uc 
b/root/usr/share/firewall4/templates/ruleset.uc
index 0142d5a..79401d2 100644
--- a/root/usr/share/firewall4/templates/ruleset.uc
+++ b/root/usr/share/firewall4/templates/ruleset.uc
@@ -67,11 +67,16 @@ table inet fw4 {
# Filter rules
#
 
+   chain pre_input {
+
+   }
+
chain input {
type filter hook input priority filter; policy {{ 
fw4.input_policy(true) }};
 
iifname "lo" accept comment "!fw4: Accept traffic from loopback"
 
+   jump pre_input
ct state established,related accept comment "!fw4: Allow 
inbound established and related flows"
 {% if (fw4.default_option("drop_invalid")): %}
ct state invalid drop comment "!fw4: Drop flows with invalid 
conntrack state"
@@ -90,9 +95,14 @@ table inet fw4 {
 {% endif %}
}
 
+   chain pre_forward {
+
+   }
+
chain forward {
type filter hook forward priority filter; policy {{ 
fw4.forward_policy(true) }};
 
+   jump pre_forward
 {% if (length(flowtable_devices) > 0): %}
meta l4proto { tcp, udp } flow offload @ft;
 {% endif %}
@@ -111,11 +121,16 @@ table inet fw4 {
 {% endif %}
}
 
+   chain pre_output {
+
+   }
+
chain output {
type filter hook output priority filter; policy {{ 
fw4.output_policy(true) }};
 
oifname "lo" accept comment "!fw4: Accept traffic towards 
loopback"
 
+   jump pre_output
ct state established,related accept comment "!fw4: Allow 
outbound established and related flows"
 {% if (fw4.default_option("drop_invalid")): %}
ct state invalid drop comment "!fw4: Drop flows with invalid 
conntrack state"
-- 
2.30.2


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel