/**
 * @file Qos.C
 * This file contains the routines related to Quality of Service.
*/
#include "headers.h"

static void EThCSGetPktInfo(struct bcm_mini_adapter *Adapter,
			    PVOID pvEthPayload,
			    struct bcm_eth_packet_info *pstEthCsPktInfo);

static bool EThCSClassifyPkt(struct bcm_mini_adapter *Adapter,
			     struct sk_buff *skb,
			     struct bcm_eth_packet_info *pstEthCsPktInfo,
			     struct bcm_classifier_rule *pstClassifierRule,
			     B_UINT8 EthCSCupport);

static USHORT IpVersion4(struct bcm_mini_adapter *Adapter, struct iphdr *iphd,
			 struct bcm_classifier_rule *pstClassifierRule);

static VOID PruneQueue(struct bcm_mini_adapter *Adapter, INT iIndex);


/*******************************************************************
* Function    - MatchSrcIpAddress()
*
* Description - Checks whether the Source IP address from the packet
*				matches with that of Queue.
*
* Parameters  - pstClassifierRule: Pointer to the packet info structure.
*		- ulSrcIP	    : Source IP address from the packet.
*
* Returns     - TRUE(If address matches) else FAIL .
*********************************************************************/
static bool MatchSrcIpAddress(struct bcm_classifier_rule *pstClassifierRule,
			      ULONG ulSrcIP)
{
	UCHAR ucLoopIndex = 0;

	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);
	union u_ip_address	*src_addr;

	ulSrcIP = ntohl(ulSrcIP);
	if (0 == pstClassifierRule->ucIPSourceAddressLength)
		return TRUE;
	for (ucLoopIndex = 0;
	     ucLoopIndex < (pstClassifierRule->ucIPSourceAddressLength);
	     ucLoopIndex++) {
		src_addr = &pstClassifierRule->stSrcIpAddress;
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"Src Ip Address Mask:0x%x PacketIp:0x%x and Classification:0x%x",
				(UINT)src_addr->ulIpv4Mask[ucLoopIndex],
				(UINT)ulSrcIP,
				(UINT)src_addr->ulIpv6Addr[ucLoopIndex]);

		if ((src_addr->ulIpv4Mask[ucLoopIndex] & ulSrcIP) ==
				(src_addr->ulIpv4Addr[ucLoopIndex] &
				 src_addr->ulIpv4Mask[ucLoopIndex]))
			return TRUE;
	}
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Src Ip Address Not Matched");
	return false;
}


/*******************************************************************
* Function    - MatchDestIpAddress()
*
* Description - Checks whether the Destination IP address from the packet
*				matches with that of Queue.
*
* Parameters  - pstClassifierRule: Pointer to the packet info structure.
*		- ulDestIP    : Destination IP address from the packet.
*
* Returns     - TRUE(If address matches) else FAIL .
*********************************************************************/
static bool MatchDestIpAddress(struct bcm_classifier_rule *pstClassifierRule, ULONG ulDestIP)
{
	UCHAR ucLoopIndex = 0;
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);
	union u_ip_address	*dest_addr = &pstClassifierRule->stDestIpAddress;

	ulDestIP = ntohl(ulDestIP);
	if (0 == pstClassifierRule->ucIPDestinationAddressLength)
		return TRUE;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Destination Ip Address 0x%x 0x%x 0x%x  ",
			(UINT)ulDestIP,
			(UINT)dest_addr->ulIpv4Mask[ucLoopIndex],
			(UINT)dest_addr->ulIpv4Addr[ucLoopIndex]);

	for (ucLoopIndex = 0;
	     ucLoopIndex < (pstClassifierRule->ucIPDestinationAddressLength);
	     ucLoopIndex++) {
		if ((dest_addr->ulIpv4Mask[ucLoopIndex] & ulDestIP) ==
				(dest_addr->ulIpv4Addr[ucLoopIndex] &
				 dest_addr->ulIpv4Mask[ucLoopIndex]))
			return TRUE;
	}
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Destination Ip Address Not Matched");
	return false;
}


/************************************************************************
* Function    - MatchTos()
*
* Description - Checks the TOS from the packet matches with that of queue.
*
* Parameters  - pstClassifierRule   : Pointer to the packet info structure.
*		- ucTypeOfService: TOS from the packet.
*
* Returns     - TRUE(If address matches) else FAIL.
**************************************************************************/
static bool MatchTos(struct bcm_classifier_rule *pstClassifierRule,
		     UCHAR ucTypeOfService)
{
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	if (3 != pstClassifierRule->ucIPTypeOfServiceLength)
		return TRUE;

	if (((pstClassifierRule->ucTosMask & ucTypeOfService) <=
				pstClassifierRule->ucTosHigh) &&
			((pstClassifierRule->ucTosMask & ucTypeOfService) >=
				pstClassifierRule->ucTosLow))
		return TRUE;

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Type Of Service Not Matched");
	return false;
}


/***************************************************************************
* Function    - MatchProtocol()
*
* Description - Checks the protocol from the packet matches with that of queue.
*
* Parameters  - pstClassifierRule: Pointer to the packet info structure.
*		- ucProtocol	: Protocol from the packet.
*
* Returns     - TRUE(If address matches) else FAIL.
****************************************************************************/
bool MatchProtocol(struct bcm_classifier_rule *pstClassifierRule,
		   UCHAR ucProtocol)
{
	UCHAR ucLoopIndex = 0;
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	if (0 == pstClassifierRule->ucProtocolLength)
		return TRUE;
	for (ucLoopIndex = 0;
	     ucLoopIndex < pstClassifierRule->ucProtocolLength;
	     ucLoopIndex++) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"Protocol:0x%X Classification Protocol:0x%X",
				ucProtocol,
				pstClassifierRule->ucProtocol[ucLoopIndex]);
		if (pstClassifierRule->ucProtocol[ucLoopIndex] == ucProtocol)
			return TRUE;
	}
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Protocol Not Matched");
	return false;
}


/***********************************************************************
* Function    - MatchSrcPort()
*
* Description - Checks, Source port from the packet matches with that of queue.
*
* Parameters  - pstClassifierRule: Pointer to the packet info structure.
*		- ushSrcPort	: Source port from the packet.
*
* Returns     - TRUE(If address matches) else FAIL.
***************************************************************************/
bool MatchSrcPort(struct bcm_classifier_rule *pstClassifierRule,
		  USHORT ushSrcPort)
{
	UCHAR ucLoopIndex = 0;

	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);


	if (0 == pstClassifierRule->ucSrcPortRangeLength)
		return TRUE;
	for (ucLoopIndex = 0;
	     ucLoopIndex < pstClassifierRule->ucSrcPortRangeLength;
	     ucLoopIndex++) {
		if (ushSrcPort <= pstClassifierRule->usSrcPortRangeHi[ucLoopIndex] &&
			ushSrcPort >= pstClassifierRule->usSrcPortRangeLo[ucLoopIndex])
			return TRUE;
	}
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Src Port: %x Not Matched ",
			ushSrcPort);
	return false;
}


/***********************************************************************
* Function    - MatchDestPort()
*
* Description - Checks, Destination port from packet matches with that of queue.
*
* Parameters  - pstClassifierRule: Pointer to the packet info structure.
*		- ushDestPort	: Destination port from the packet.
*
* Returns     - TRUE(If address matches) else FAIL.
***************************************************************************/
bool MatchDestPort(struct bcm_classifier_rule *pstClassifierRule,
		   USHORT ushDestPort)
{
	UCHAR ucLoopIndex = 0;
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	if (0 == pstClassifierRule->ucDestPortRangeLength)
		return TRUE;

	for (ucLoopIndex = 0;
	     ucLoopIndex < pstClassifierRule->ucDestPortRangeLength;
	     ucLoopIndex++) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"Matching Port:0x%X   0x%X  0x%X",
				ushDestPort,
				pstClassifierRule->usDestPortRangeLo[ucLoopIndex],
				pstClassifierRule->usDestPortRangeHi[ucLoopIndex]);

		if (ushDestPort <= pstClassifierRule->usDestPortRangeHi[ucLoopIndex] &&
			ushDestPort >= pstClassifierRule->usDestPortRangeLo[ucLoopIndex])
			return TRUE;
	}
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Dest Port: %x Not Matched",
			ushDestPort);
	return false;
}
/**
 * @ingroup tx_functions
 * Compares IPV4 Ip address and port number
 * @return Queue Index.
*/
static USHORT	IpVersion4(struct bcm_mini_adapter *Adapter,
			   struct iphdr *iphd,
			   struct bcm_classifier_rule *pstClassifierRule)
{
	struct bcm_transport_header *xprt_hdr = NULL;
	bool	bClassificationSucceed = false;

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"========>");

	xprt_hdr = (struct bcm_transport_header *)((PUCHAR)iphd + sizeof(struct iphdr));

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Trying to see Direction = %d %d",
			pstClassifierRule->ucDirection,
			pstClassifierRule->usVCID_Value);

	/* Checking classifier validity */
	if (!pstClassifierRule->bUsed ||
			pstClassifierRule->ucDirection == DOWNLINK_DIR)
		goto out;

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"is IPv6 check!");
	if (pstClassifierRule->bIpv6Protocol)
		goto out;

	/* Checking IP header parameter */
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Trying to match Source IP Address");
	if (!MatchSrcIpAddress(pstClassifierRule, iphd->saddr))
		goto out;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Source IP Address Matched");

	if (!MatchDestIpAddress(pstClassifierRule, iphd->daddr))
		goto out;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Destination IP Address Matched");

	if (!MatchTos(pstClassifierRule, iphd->tos)) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"TOS Match failed\n");
		goto out;
	}
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"TOS Matched");

	if (!MatchProtocol(pstClassifierRule, iphd->protocol))
		goto out;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Protocol Matched");

	/*
	 * if protocol is not TCP or UDP then no
	 * need of comparing source port and destination port
	 */
	if (iphd->protocol != TCP && iphd->protocol != UDP) {
		bClassificationSucceed = TRUE;
		goto out;
	}
	/* Checking Transport Layer Header field if present */
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Source Port %04x",
			(iphd->protocol == UDP) ? xprt_hdr->uhdr.source : xprt_hdr->thdr.source);

	if (!MatchSrcPort(pstClassifierRule,
			  ntohs((iphd->protocol == UDP) ?
			  xprt_hdr->uhdr.source : xprt_hdr->thdr.source)))
		goto out;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Src Port Matched");

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"Destination Port %04x",
			(iphd->protocol == UDP) ? xprt_hdr->uhdr.dest :
				xprt_hdr->thdr.dest);

	if (!MatchDestPort(pstClassifierRule,
			   ntohs((iphd->protocol == UDP) ?
			   xprt_hdr->uhdr.dest : xprt_hdr->thdr.dest)))
		goto out;
	bClassificationSucceed = TRUE;

out:
	if (TRUE == bClassificationSucceed) {
		INT iMatchedSFQueueIndex = 0;

		iMatchedSFQueueIndex =
			SearchSfid(Adapter, pstClassifierRule->ulSFID);
		if (iMatchedSFQueueIndex >= NO_OF_QUEUES)
			bClassificationSucceed = false;
		else if (false == Adapter->PackInfo[iMatchedSFQueueIndex].bActive)
			bClassificationSucceed = false;
	}

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"IpVersion4 <==========");

	return bClassificationSucceed;
}

VOID PruneQueueAllSF(struct bcm_mini_adapter *Adapter)
{
	UINT iIndex = 0;

	for (iIndex = 0; iIndex < HiPriority; iIndex++) {
		if (!Adapter->PackInfo[iIndex].bValid)
			continue;

		PruneQueue(Adapter, iIndex);
	}
}


/**
 * @ingroup tx_functions
 * This function checks if the max queue size for a queue
 * is less than number of bytes in the queue. If so -
 * drops packets from the Head till the number of bytes is
 * less than or equal to max queue size for the queue.
 */
static VOID PruneQueue(struct bcm_mini_adapter *Adapter, INT iIndex)
{
	struct sk_buff *PacketToDrop = NULL;
	struct net_device_stats *netstats;
	struct bcm_packet_info	*curr_pack_info = &Adapter->PackInfo[iIndex];

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			PRUNE_QUEUE,
			DBG_LVL_ALL,
			"=====> Index %d",
			iIndex);

	if (iIndex == HiPriority)
		return;

	if (!Adapter || (iIndex < 0) || (iIndex > HiPriority))
		return;

	/* To Store the netdevice statistic */
	netstats = &Adapter->dev->stats;

	spin_lock_bh(&curr_pack_info->SFQueueLock);

	while (1) {
/*	while((UINT)curr_pack_info->uiCurrentPacketsOnHost >
		SF_MAX_ALLOWED_PACKETS_TO_BACKUP) { */

		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				PRUNE_QUEUE,
				DBG_LVL_ALL,
				"uiCurrentBytesOnHost:%x uiMaxBucketSize :%x",
				curr_pack_info->uiCurrentBytesOnHost,
				curr_pack_info->uiMaxBucketSize);

		PacketToDrop = curr_pack_info->FirstTxQueue;

		if (PacketToDrop == NULL)
			break;
		if ((curr_pack_info->uiCurrentPacketsOnHost <
					SF_MAX_ALLOWED_PACKETS_TO_BACKUP) &&
			((1000*(jiffies - *((B_UINT32 *)(PacketToDrop->cb) +
					    SKB_CB_LATENCY_OFFSET))/HZ) <=
				curr_pack_info->uiMaxLatency))
			break;

		if (PacketToDrop) {
			if (netif_msg_tx_err(Adapter))
				pr_info(PFX "%s: tx queue %d overlimit\n",
					Adapter->dev->name, iIndex);

			netstats->tx_dropped++;

			DEQUEUEPACKET(curr_pack_info->FirstTxQueue,
				      curr_pack_info->LastTxQueue);
			/* update current bytes and packets count */
			curr_pack_info->uiCurrentBytesOnHost -=
				PacketToDrop->len;
			curr_pack_info->uiCurrentPacketsOnHost--;
			/* update dropped bytes and packets counts */
			curr_pack_info->uiDroppedCountBytes += PacketToDrop->len;
			curr_pack_info->uiDroppedCountPackets++;
			dev_kfree_skb(PacketToDrop);

		}

		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				PRUNE_QUEUE,
				DBG_LVL_ALL,
				"Dropped Bytes:%x Dropped Packets:%x",
				curr_pack_info->uiDroppedCountBytes,
				curr_pack_info->uiDroppedCountPackets);

		atomic_dec(&Adapter->TotalPacketCount);
	}

	spin_unlock_bh(&curr_pack_info->SFQueueLock);

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			PRUNE_QUEUE,
			DBG_LVL_ALL,
			"TotalPacketCount:%x",
			atomic_read(&Adapter->TotalPacketCount));
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			PRUNE_QUEUE,
			DBG_LVL_ALL,
			"<=====");
}

VOID flush_all_queues(struct bcm_mini_adapter *Adapter)
{
	INT	iQIndex;
	UINT uiTotalPacketLength;
	struct sk_buff *PacketToDrop = NULL;
	struct bcm_packet_info *curr_packet_info;

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_OTHERS,
			DUMP_INFO,
			DBG_LVL_ALL,
			"=====>");

	/* down(&Adapter->data_packet_queue_lock); */
	for (iQIndex = LowPriority; iQIndex < HiPriority; iQIndex++) {
		struct net_device_stats *netstats = &Adapter->dev->stats;

		curr_packet_info = &Adapter->PackInfo[iQIndex];

		spin_lock_bh(&curr_packet_info->SFQueueLock);
		while (curr_packet_info->FirstTxQueue) {
			PacketToDrop = curr_packet_info->FirstTxQueue;
			if (PacketToDrop) {
				uiTotalPacketLength = PacketToDrop->len;
				netstats->tx_dropped++;
			} else
				uiTotalPacketLength = 0;

			DEQUEUEPACKET(curr_packet_info->FirstTxQueue,
				      curr_packet_info->LastTxQueue);

			/* Free the skb */
			dev_kfree_skb(PacketToDrop);

			/* update current bytes and packets count */
			curr_packet_info->uiCurrentBytesOnHost -= uiTotalPacketLength;
			curr_packet_info->uiCurrentPacketsOnHost--;

			/* update dropped bytes and packets counts */
			curr_packet_info->uiDroppedCountBytes += uiTotalPacketLength;
			curr_packet_info->uiDroppedCountPackets++;

			BCM_DEBUG_PRINT(Adapter,
					DBG_TYPE_OTHERS,
					DUMP_INFO,
					DBG_LVL_ALL,
					"Dropped Bytes:%x Dropped Packets:%x",
					curr_packet_info->uiDroppedCountBytes,
					curr_packet_info->uiDroppedCountPackets);
			atomic_dec(&Adapter->TotalPacketCount);
		}
		spin_unlock_bh(&curr_packet_info->SFQueueLock);
	}
	/* up(&Adapter->data_packet_queue_lock); */
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_OTHERS,
			DUMP_INFO,
			DBG_LVL_ALL,
			"<=====");
}

USHORT ClassifyPacket(struct bcm_mini_adapter *Adapter, struct sk_buff *skb)
{
	INT uiLoopIndex = 0;
	struct bcm_classifier_rule *pstClassifierRule = NULL;
	struct bcm_eth_packet_info stEthCsPktInfo;
	PVOID pvEThPayload = NULL;
	struct iphdr *pIpHeader = NULL;
	INT uiSfIndex = 0;
	USHORT usIndex = Adapter->usBestEffortQueueIndex;
	bool bFragmentedPkt = false, bClassificationSucceed = false;
	USHORT usCurrFragment = 0;

	struct bcm_tcp_header *pTcpHeader;
	UCHAR IpHeaderLength;
	UCHAR TcpHeaderLength;

	pvEThPayload = skb->data;
	*((UINT32 *) (skb->cb) + SKB_CB_TCPACK_OFFSET) = 0;
	EThCSGetPktInfo(Adapter, pvEThPayload, &stEthCsPktInfo);

	switch (stEthCsPktInfo.eNwpktEthFrameType) {
	case eEth802LLCFrame:
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"ClassifyPacket : 802LLCFrame\n");
		pIpHeader = pvEThPayload + sizeof(struct bcm_eth_llc_frame);
		break;
	case eEth802LLCSNAPFrame:
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"ClassifyPacket : 802LLC SNAP Frame\n");
		pIpHeader = pvEThPayload +
			sizeof(struct bcm_eth_llc_snap_frame);
		break;
	case eEth802QVLANFrame:
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"ClassifyPacket : 802.1Q VLANFrame\n");
		pIpHeader = pvEThPayload + sizeof(struct bcm_eth_q_frame);
		break;
	case eEthOtherFrame:
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"ClassifyPacket : ETH Other Frame\n");
		pIpHeader = pvEThPayload + sizeof(struct bcm_ethernet2_frame);
		break;
	default:
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"ClassifyPacket : Unrecognized ETH Frame\n");
		pIpHeader = pvEThPayload + sizeof(struct bcm_ethernet2_frame);
		break;
	}

	if (stEthCsPktInfo.eNwpktIPFrameType == eIPv4Packet) {
		usCurrFragment = (ntohs(pIpHeader->frag_off) & IP_OFFSET);
		if ((ntohs(pIpHeader->frag_off) & IP_MF) || usCurrFragment)
			bFragmentedPkt = TRUE;

		if (bFragmentedPkt) {
			/* Fragmented  Packet. Get Frag Classifier Entry. */
			pstClassifierRule = GetFragIPClsEntry(Adapter,
							      pIpHeader->id,
							      pIpHeader->saddr);
			if (pstClassifierRule) {
					BCM_DEBUG_PRINT(Adapter,
							DBG_TYPE_TX,
							IPV4_DBG,
							DBG_LVL_ALL,
							"It is next Fragmented pkt");
					bClassificationSucceed = TRUE;
			}
			if (!(ntohs(pIpHeader->frag_off) & IP_MF)) {
				/* Fragmented Last packet . Remove Frag Classifier Entry */
				BCM_DEBUG_PRINT(Adapter,
						DBG_TYPE_TX,
						IPV4_DBG,
						DBG_LVL_ALL,
						"This is the last fragmented Pkt");
				DelFragIPClsEntry(Adapter,
						  pIpHeader->id,
						  pIpHeader->saddr);
			}
		}
	}

	for (uiLoopIndex = MAX_CLASSIFIERS - 1; uiLoopIndex >= 0; uiLoopIndex--) {
		if (bClassificationSucceed)
			break;
		/*
		 * Iterate through all classifiers which are already in order of priority
		 * to classify the packet until match found
		 */
		if (false == Adapter->astClassifierTable[uiLoopIndex].bUsed) {
			bClassificationSucceed = false;
			continue;
		}
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"Adapter->PackInfo[%d].bvalid=True\n",
				uiLoopIndex);

		if (0 == Adapter->astClassifierTable[uiLoopIndex].ucDirection) {
			bClassificationSucceed = false; /* cannot be processed for classification. */
			continue;	/* it is a down link connection */
		}

		pstClassifierRule = &Adapter->astClassifierTable[uiLoopIndex];

		uiSfIndex = SearchSfid(Adapter, pstClassifierRule->ulSFID);
		if (uiSfIndex >= NO_OF_QUEUES) {
			BCM_DEBUG_PRINT(Adapter,
					DBG_TYPE_TX,
					IPV4_DBG,
					DBG_LVL_ALL,
					"Queue Not Valid. SearchSfid for this classifier Failed\n");
			continue;
		}

		if (Adapter->PackInfo[uiSfIndex].bEthCSSupport) {

			if (eEthUnsupportedFrame == stEthCsPktInfo.eNwpktEthFrameType) {
				BCM_DEBUG_PRINT(Adapter,
						DBG_TYPE_TX,
						IPV4_DBG,
						DBG_LVL_ALL,
						" ClassifyPacket : Packet Not a Valid Supported Ethernet Frame\n");
				bClassificationSucceed = false;
				continue;
			}



			BCM_DEBUG_PRINT(Adapter,
					DBG_TYPE_TX,
					IPV4_DBG,
					DBG_LVL_ALL,
					"Performing ETH CS Classification on Classifier Rule ID : %x Service Flow ID : %lx\n",
					pstClassifierRule->uiClassifierRuleIndex,
					Adapter->PackInfo[uiSfIndex].ulSFID);
			bClassificationSucceed = EThCSClassifyPkt(Adapter,
								  skb,
								  &stEthCsPktInfo,
								  pstClassifierRule,
								  Adapter->PackInfo[uiSfIndex].bEthCSSupport);

			if (!bClassificationSucceed) {
				BCM_DEBUG_PRINT(Adapter,
						DBG_TYPE_TX,
						IPV4_DBG,
						DBG_LVL_ALL,
						"ClassifyPacket : Ethernet CS Classification Failed\n");
				continue;
			}
		} else { /* No ETH Supported on this SF */
			if (eEthOtherFrame != stEthCsPktInfo.eNwpktEthFrameType) {
				BCM_DEBUG_PRINT(Adapter,
						DBG_TYPE_TX,
						IPV4_DBG,
						DBG_LVL_ALL,
						" ClassifyPacket : Packet Not a 802.3 Ethernet Frame... hence not allowed over non-ETH CS SF\n");
				bClassificationSucceed = false;
				continue;
			}
		}

		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"Proceeding to IP CS Clasification");

		if (Adapter->PackInfo[uiSfIndex].bIPCSSupport) {

			if (stEthCsPktInfo.eNwpktIPFrameType == eNonIPPacket) {
				BCM_DEBUG_PRINT(Adapter,
						DBG_TYPE_TX,
						IPV4_DBG,
						DBG_LVL_ALL,
						" ClassifyPacket : Packet is Not an IP Packet\n");
				bClassificationSucceed = false;
				continue;
			}
			BCM_DEBUG_PRINT(Adapter,
					DBG_TYPE_TX,
					IPV4_DBG,
					DBG_LVL_ALL,
					"Dump IP Header :\n");
			DumpFullPacket((PUCHAR)pIpHeader, 20);

			if (stEthCsPktInfo.eNwpktIPFrameType == eIPv4Packet)
				bClassificationSucceed = IpVersion4(Adapter,
								    pIpHeader,
								    pstClassifierRule);
			else if (stEthCsPktInfo.eNwpktIPFrameType == eIPv6Packet)
				bClassificationSucceed = IpVersion6(Adapter,
								    pIpHeader,
								    pstClassifierRule);
		}
	}

	if (bClassificationSucceed == TRUE) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"CF id : %d, SF ID is =%lu",
				pstClassifierRule->uiClassifierRuleIndex,
				pstClassifierRule->ulSFID);

		/* Store The matched Classifier in SKB */
		*((UINT32 *)(skb->cb)+SKB_CB_CLASSIFICATION_OFFSET) =
			pstClassifierRule->uiClassifierRuleIndex;
		if ((TCP == pIpHeader->protocol) && !bFragmentedPkt &&
				(ETH_AND_IP_HEADER_LEN + TCP_HEADER_LEN <=
					skb->len)) {
			IpHeaderLength = pIpHeader->ihl;
			pTcpHeader =
				(struct bcm_tcp_header *)(((PUCHAR)pIpHeader) +
						(IpHeaderLength*4));
			TcpHeaderLength = GET_TCP_HEADER_LEN(pTcpHeader->HeaderLength);

			if ((pTcpHeader->ucFlags & TCP_ACK) &&
				   (ntohs(pIpHeader->tot_len) ==
				    (IpHeaderLength*4)+(TcpHeaderLength*4)))
				*((UINT32 *) (skb->cb) + SKB_CB_TCPACK_OFFSET) =
					TCP_ACK;
		}

		usIndex = SearchSfid(Adapter, pstClassifierRule->ulSFID);
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"index is =%d",
				usIndex);

		/*
		 * If this is the first fragment of a Fragmented pkt,
		 * add this CF. Only This CF should be used for all other
		 * fragment of this Pkt.
		 */
		if (bFragmentedPkt && (usCurrFragment == 0)) {
			/*
			 * First Fragment of Fragmented Packet.
			 * Create Frag CLS Entry
			 */
			struct bcm_fragmented_packet_info stFragPktInfo;

			stFragPktInfo.bUsed = TRUE;
			stFragPktInfo.ulSrcIpAddress = pIpHeader->saddr;
			stFragPktInfo.usIpIdentification = pIpHeader->id;
			stFragPktInfo.pstMatchedClassifierEntry =
				pstClassifierRule;
			stFragPktInfo.bOutOfOrderFragment = false;
			AddFragIPClsEntry(Adapter, &stFragPktInfo);
		}


	}

	return bClassificationSucceed ? usIndex : INVALID_QUEUE_INDEX;
}

static bool EthCSMatchSrcMACAddress(struct bcm_classifier_rule *pstClassifierRule,
				    PUCHAR Mac)
{
	UINT i = 0;
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	if (pstClassifierRule->ucEthCSSrcMACLen == 0)
		return TRUE;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"%s\n", __func__);
	for (i = 0; i < MAC_ADDRESS_SIZE; i++) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"SRC MAC[%x] = %x ClassifierRuleSrcMAC = %x Mask : %x\n",
				i,
				Mac[i],
				pstClassifierRule->au8EThCSSrcMAC[i],
				pstClassifierRule->au8EThCSSrcMACMask[i]);
		if ((pstClassifierRule->au8EThCSSrcMAC[i] &
					pstClassifierRule->au8EThCSSrcMACMask[i]) !=
				(Mac[i] & pstClassifierRule->au8EThCSSrcMACMask[i]))
			return false;
	}
	return TRUE;
}

static bool EthCSMatchDestMACAddress(struct bcm_classifier_rule *pstClassifierRule,
				     PUCHAR Mac)
{
	UINT i = 0;
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	if (pstClassifierRule->ucEthCSDestMACLen == 0)
		return TRUE;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"%s\n",
			__func__);
	for (i = 0; i < MAC_ADDRESS_SIZE; i++) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"SRC MAC[%x] = %x ClassifierRuleSrcMAC = %x Mask : %x\n",
				i,
				Mac[i],
				pstClassifierRule->au8EThCSDestMAC[i],
				pstClassifierRule->au8EThCSDestMACMask[i]);
		if ((pstClassifierRule->au8EThCSDestMAC[i] &
					pstClassifierRule->au8EThCSDestMACMask[i]) !=
				(Mac[i] & pstClassifierRule->au8EThCSDestMACMask[i]))
			return false;
	}
	return TRUE;
}

static bool EthCSMatchEThTypeSAP(struct bcm_classifier_rule *pstClassifierRule,
				 struct sk_buff *skb,
				 struct bcm_eth_packet_info *pstEthCsPktInfo)
{
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	if ((pstClassifierRule->ucEtherTypeLen == 0) ||
		(pstClassifierRule->au8EthCSEtherType[0] == 0))
		return TRUE;

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"%s SrcEtherType:%x CLS EtherType[0]:%x\n",
			__func__,
			pstEthCsPktInfo->usEtherType,
			pstClassifierRule->au8EthCSEtherType[0]);
	if (pstClassifierRule->au8EthCSEtherType[0] == 1) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"%s  CLS EtherType[1]:%x EtherType[2]:%x\n",
				__func__,
				pstClassifierRule->au8EthCSEtherType[1],
				pstClassifierRule->au8EthCSEtherType[2]);

		if (memcmp(&pstEthCsPktInfo->usEtherType,
			   &pstClassifierRule->au8EthCSEtherType[1],
			   2) == 0)
			return TRUE;
		else
			return false;
	}

	if (pstClassifierRule->au8EthCSEtherType[0] == 2) {
		if (eEth802LLCFrame != pstEthCsPktInfo->eNwpktEthFrameType)
			return false;

		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"%s  EthCS DSAP:%x EtherType[2]:%x\n",
				__func__,
				pstEthCsPktInfo->ucDSAP,
				pstClassifierRule->au8EthCSEtherType[2]);
		if (pstEthCsPktInfo->ucDSAP ==
				pstClassifierRule->au8EthCSEtherType[2])
			return TRUE;
		else
			return false;

	}

	return false;

}

static bool EthCSMatchVLANRules(struct bcm_classifier_rule *pstClassifierRule,
				struct sk_buff *skb,
				struct bcm_eth_packet_info *pstEthCsPktInfo)
{
	bool bClassificationSucceed = false;
	USHORT usVLANID;
	B_UINT8 uPriority = 0;
	struct bcm_mini_adapter *Adapter = GET_BCM_ADAPTER(gblpnetdev);

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"%s  CLS UserPrio:%x CLS VLANID:%x\n",
			__func__,
			ntohs(*((USHORT *)pstClassifierRule->usUserPriority)),
			pstClassifierRule->usVLANID);

	/*
	 * In case FW didn't receive the TLV,
	 * the priority field should be ignored
	 */
	if (pstClassifierRule->usValidityBitMap &
			(1<<PKT_CLASSIFICATION_USER_PRIORITY_VALID)) {
		if (pstEthCsPktInfo->eNwpktEthFrameType != eEth802QVLANFrame)
				return false;

		uPriority = (ntohs(*(USHORT *)(skb->data +
				   sizeof(struct bcm_eth_header))) &
				   0xF000) >> 13;

		if ((uPriority >= pstClassifierRule->usUserPriority[0]) &&
				(uPriority <=
				 pstClassifierRule->usUserPriority[1]))
			bClassificationSucceed = TRUE;

		if (!bClassificationSucceed)
			return false;
	}

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"ETH CS 802.1 D  User Priority Rule Matched\n");

	bClassificationSucceed = false;

	if (pstClassifierRule->usValidityBitMap &
			(1<<PKT_CLASSIFICATION_VLANID_VALID)) {
		if (pstEthCsPktInfo->eNwpktEthFrameType != eEth802QVLANFrame)
				return false;

		usVLANID = ntohs(*(USHORT *)(skb->data +
					sizeof(struct bcm_eth_header))) & 0xFFF;

		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"%s  Pkt VLANID %x Priority: %d\n",
				__func__,
				usVLANID,
				uPriority);

		if (usVLANID == ((pstClassifierRule->usVLANID & 0xFFF0) >> 4))
			bClassificationSucceed = TRUE;

		if (!bClassificationSucceed)
			return false;
	}

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"ETH CS 802.1 Q VLAN ID Rule Matched\n");

	return TRUE;
}


static bool EThCSClassifyPkt(struct bcm_mini_adapter *Adapter,
			     struct sk_buff *skb,
			     struct bcm_eth_packet_info *pstEthCsPktInfo,
			     struct bcm_classifier_rule *pstClassifierRule,
			     B_UINT8 EthCSCupport)
{
	bool bClassificationSucceed = false;

	bClassificationSucceed = EthCSMatchSrcMACAddress(pstClassifierRule,
			((struct bcm_eth_header *)(skb->data))->au8SourceAddress);
	if (!bClassificationSucceed)
		return false;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"ETH CS SrcMAC Matched\n");

	bClassificationSucceed = EthCSMatchDestMACAddress(pstClassifierRule,
			((struct bcm_eth_header *)(skb->data))->au8DestinationAddress);
	if (!bClassificationSucceed)
		return false;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"ETH CS DestMAC Matched\n");

	/* classify on ETHType/802.2SAP TLV */
	bClassificationSucceed = EthCSMatchEThTypeSAP(pstClassifierRule,
						      skb,
						      pstEthCsPktInfo);
	if (!bClassificationSucceed)
		return false;

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"ETH CS EthType/802.2SAP Matched\n");

	/* classify on 802.1VLAN Header Parameters */
	bClassificationSucceed = EthCSMatchVLANRules(pstClassifierRule,
						     skb,
						     pstEthCsPktInfo);
	if (!bClassificationSucceed)
		return false;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"ETH CS 802.1 VLAN Rules Matched\n");

	return bClassificationSucceed;
}

static void EThCSGetPktInfo(struct bcm_mini_adapter *Adapter,
			    PVOID pvEthPayload,
			    struct bcm_eth_packet_info *pstEthCsPktInfo)
{
	USHORT u16Etype = ntohs(
			((struct bcm_eth_header *)pvEthPayload)->u16Etype);

	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"EthCSGetPktInfo : Eth Hdr Type : %X\n",
			u16Etype);
	if (u16Etype > 0x5dc) {
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"EthCSGetPktInfo : ETH2 Frame\n");
		/* ETH2 Frame */
		if (u16Etype == ETHERNET_FRAMETYPE_802QVLAN) {
			/* 802.1Q VLAN Header */
			pstEthCsPktInfo->eNwpktEthFrameType = eEth802QVLANFrame;
			u16Etype = ((struct bcm_eth_q_frame *)pvEthPayload)->EthType;
			/* ((ETH_CS_802_Q_FRAME*)pvEthPayload)->UserPriority */
		} else {
			pstEthCsPktInfo->eNwpktEthFrameType = eEthOtherFrame;
			u16Etype = ntohs(u16Etype);
		}
	} else {
		/* 802.2 LLC */
		BCM_DEBUG_PRINT(Adapter,
				DBG_TYPE_TX,
				IPV4_DBG,
				DBG_LVL_ALL,
				"802.2 LLC Frame\n");
		pstEthCsPktInfo->eNwpktEthFrameType = eEth802LLCFrame;
		pstEthCsPktInfo->ucDSAP =
			((struct bcm_eth_llc_frame *)pvEthPayload)->DSAP;
		if (pstEthCsPktInfo->ucDSAP == 0xAA && ((struct bcm_eth_llc_frame *)pvEthPayload)->SSAP == 0xAA) {
			/* SNAP Frame */
			pstEthCsPktInfo->eNwpktEthFrameType = eEth802LLCSNAPFrame;
			u16Etype = ((struct bcm_eth_llc_snap_frame *)pvEthPayload)->usEtherType;
		}
	}
	if (u16Etype == ETHERNET_FRAMETYPE_IPV4)
		pstEthCsPktInfo->eNwpktIPFrameType = eIPv4Packet;
	else if (u16Etype == ETHERNET_FRAMETYPE_IPV6)
		pstEthCsPktInfo->eNwpktIPFrameType = eIPv6Packet;
	else
		pstEthCsPktInfo->eNwpktIPFrameType = eNonIPPacket;

	pstEthCsPktInfo->usEtherType = ((struct bcm_eth_header *)pvEthPayload)->u16Etype;
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"EthCsPktInfo->eNwpktIPFrameType : %x\n",
			pstEthCsPktInfo->eNwpktIPFrameType);
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"EthCsPktInfo->eNwpktEthFrameType : %x\n",
			pstEthCsPktInfo->eNwpktEthFrameType);
	BCM_DEBUG_PRINT(Adapter,
			DBG_TYPE_TX,
			IPV4_DBG,
			DBG_LVL_ALL,
			"EthCsPktInfo->usEtherType : %x\n",
			pstEthCsPktInfo->usEtherType);
}