| // SPDX-License-Identifier: GPL-2.0-or-later |
| /* |
| * net/dsa/user.c - user device handling |
| * Copyright (c) 2008-2009 Marvell Semiconductor |
| */ |
| |
| #include <linux/list.h> |
| #include <linux/etherdevice.h> |
| #include <linux/netdevice.h> |
| #include <linux/phy.h> |
| #include <linux/phy_fixed.h> |
| #include <linux/phylink.h> |
| #include <linux/of_net.h> |
| #include <linux/of_mdio.h> |
| #include <linux/mdio.h> |
| #include <net/rtnetlink.h> |
| #include <net/pkt_cls.h> |
| #include <net/selftests.h> |
| #include <net/tc_act/tc_mirred.h> |
| #include <linux/if_bridge.h> |
| #include <linux/if_hsr.h> |
| #include <net/dcbnl.h> |
| #include <linux/netpoll.h> |
| #include <linux/string.h> |
| |
| #include "conduit.h" |
| #include "dsa.h" |
| #include "netlink.h" |
| #include "port.h" |
| #include "switch.h" |
| #include "tag.h" |
| #include "user.h" |
| |
| struct dsa_switchdev_event_work { |
| struct net_device *dev; |
| struct net_device *orig_dev; |
| struct work_struct work; |
| unsigned long event; |
| /* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and |
| * SWITCHDEV_FDB_DEL_TO_DEVICE |
| */ |
| unsigned char addr[ETH_ALEN]; |
| u16 vid; |
| bool host_addr; |
| }; |
| |
| enum dsa_standalone_event { |
| DSA_UC_ADD, |
| DSA_UC_DEL, |
| DSA_MC_ADD, |
| DSA_MC_DEL, |
| }; |
| |
| struct dsa_standalone_event_work { |
| struct work_struct work; |
| struct net_device *dev; |
| enum dsa_standalone_event event; |
| unsigned char addr[ETH_ALEN]; |
| u16 vid; |
| }; |
| |
| struct dsa_host_vlan_rx_filtering_ctx { |
| struct net_device *dev; |
| const unsigned char *addr; |
| enum dsa_standalone_event event; |
| }; |
| |
| static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds) |
| { |
| return ds->ops->port_fdb_add && ds->ops->port_fdb_del && |
| ds->fdb_isolation && !ds->vlan_filtering_is_global && |
| !ds->needs_standalone_vlan_filtering; |
| } |
| |
| static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds) |
| { |
| return ds->ops->port_mdb_add && ds->ops->port_mdb_del && |
| ds->fdb_isolation && !ds->vlan_filtering_is_global && |
| !ds->needs_standalone_vlan_filtering; |
| } |
| |
| static void dsa_user_standalone_event_work(struct work_struct *work) |
| { |
| struct dsa_standalone_event_work *standalone_work = |
| container_of(work, struct dsa_standalone_event_work, work); |
| const unsigned char *addr = standalone_work->addr; |
| struct net_device *dev = standalone_work->dev; |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_mdb mdb; |
| struct dsa_switch *ds = dp->ds; |
| u16 vid = standalone_work->vid; |
| int err; |
| |
| switch (standalone_work->event) { |
| case DSA_UC_ADD: |
| err = dsa_port_standalone_host_fdb_add(dp, addr, vid); |
| if (err) { |
| dev_err(ds->dev, |
| "port %d failed to add %pM vid %d to fdb: %d\n", |
| dp->index, addr, vid, err); |
| break; |
| } |
| break; |
| |
| case DSA_UC_DEL: |
| err = dsa_port_standalone_host_fdb_del(dp, addr, vid); |
| if (err) { |
| dev_err(ds->dev, |
| "port %d failed to delete %pM vid %d from fdb: %d\n", |
| dp->index, addr, vid, err); |
| } |
| |
| break; |
| case DSA_MC_ADD: |
| ether_addr_copy(mdb.addr, addr); |
| mdb.vid = vid; |
| |
| err = dsa_port_standalone_host_mdb_add(dp, &mdb); |
| if (err) { |
| dev_err(ds->dev, |
| "port %d failed to add %pM vid %d to mdb: %d\n", |
| dp->index, addr, vid, err); |
| break; |
| } |
| break; |
| case DSA_MC_DEL: |
| ether_addr_copy(mdb.addr, addr); |
| mdb.vid = vid; |
| |
| err = dsa_port_standalone_host_mdb_del(dp, &mdb); |
| if (err) { |
| dev_err(ds->dev, |
| "port %d failed to delete %pM vid %d from mdb: %d\n", |
| dp->index, addr, vid, err); |
| } |
| |
| break; |
| } |
| |
| kfree(standalone_work); |
| } |
| |
| static int dsa_user_schedule_standalone_work(struct net_device *dev, |
| enum dsa_standalone_event event, |
| const unsigned char *addr, |
| u16 vid) |
| { |
| struct dsa_standalone_event_work *standalone_work; |
| |
| standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC); |
| if (!standalone_work) |
| return -ENOMEM; |
| |
| INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work); |
| standalone_work->event = event; |
| standalone_work->dev = dev; |
| |
| ether_addr_copy(standalone_work->addr, addr); |
| standalone_work->vid = vid; |
| |
| dsa_schedule_work(&standalone_work->work); |
| |
| return 0; |
| } |
| |
| static int dsa_user_host_vlan_rx_filtering(void *arg, int vid) |
| { |
| struct dsa_host_vlan_rx_filtering_ctx *ctx = arg; |
| |
| return dsa_user_schedule_standalone_work(ctx->dev, ctx->event, |
| ctx->addr, vid); |
| } |
| |
| static int dsa_user_vlan_for_each(struct net_device *dev, |
| int (*cb)(void *arg, int vid), void *arg) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_vlan *v; |
| int err; |
| |
| lockdep_assert_held(&dev->addr_list_lock); |
| |
| err = cb(arg, 0); |
| if (err) |
| return err; |
| |
| list_for_each_entry(v, &dp->user_vlans, list) { |
| err = cb(arg, v->vid); |
| if (err) |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| static int dsa_user_sync_uc(struct net_device *dev, |
| const unsigned char *addr) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_host_vlan_rx_filtering_ctx ctx = { |
| .dev = dev, |
| .addr = addr, |
| .event = DSA_UC_ADD, |
| }; |
| |
| dev_uc_add(conduit, addr); |
| |
| if (!dsa_switch_supports_uc_filtering(dp->ds)) |
| return 0; |
| |
| return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, |
| &ctx); |
| } |
| |
| static int dsa_user_unsync_uc(struct net_device *dev, |
| const unsigned char *addr) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_host_vlan_rx_filtering_ctx ctx = { |
| .dev = dev, |
| .addr = addr, |
| .event = DSA_UC_DEL, |
| }; |
| |
| dev_uc_del(conduit, addr); |
| |
| if (!dsa_switch_supports_uc_filtering(dp->ds)) |
| return 0; |
| |
| return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, |
| &ctx); |
| } |
| |
| static int dsa_user_sync_mc(struct net_device *dev, |
| const unsigned char *addr) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_host_vlan_rx_filtering_ctx ctx = { |
| .dev = dev, |
| .addr = addr, |
| .event = DSA_MC_ADD, |
| }; |
| |
| dev_mc_add(conduit, addr); |
| |
| if (!dsa_switch_supports_mc_filtering(dp->ds)) |
| return 0; |
| |
| return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, |
| &ctx); |
| } |
| |
| static int dsa_user_unsync_mc(struct net_device *dev, |
| const unsigned char *addr) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_host_vlan_rx_filtering_ctx ctx = { |
| .dev = dev, |
| .addr = addr, |
| .event = DSA_MC_DEL, |
| }; |
| |
| dev_mc_del(conduit, addr); |
| |
| if (!dsa_switch_supports_mc_filtering(dp->ds)) |
| return 0; |
| |
| return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, |
| &ctx); |
| } |
| |
| void dsa_user_sync_ha(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| struct netdev_hw_addr *ha; |
| |
| netif_addr_lock_bh(dev); |
| |
| netdev_for_each_synced_mc_addr(ha, dev) |
| dsa_user_sync_mc(dev, ha->addr); |
| |
| netdev_for_each_synced_uc_addr(ha, dev) |
| dsa_user_sync_uc(dev, ha->addr); |
| |
| netif_addr_unlock_bh(dev); |
| |
| if (dsa_switch_supports_uc_filtering(ds) || |
| dsa_switch_supports_mc_filtering(ds)) |
| dsa_flush_workqueue(); |
| } |
| |
| void dsa_user_unsync_ha(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| struct netdev_hw_addr *ha; |
| |
| netif_addr_lock_bh(dev); |
| |
| netdev_for_each_synced_uc_addr(ha, dev) |
| dsa_user_unsync_uc(dev, ha->addr); |
| |
| netdev_for_each_synced_mc_addr(ha, dev) |
| dsa_user_unsync_mc(dev, ha->addr); |
| |
| netif_addr_unlock_bh(dev); |
| |
| if (dsa_switch_supports_uc_filtering(ds) || |
| dsa_switch_supports_mc_filtering(ds)) |
| dsa_flush_workqueue(); |
| } |
| |
| /* user mii_bus handling ***************************************************/ |
| static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg) |
| { |
| struct dsa_switch *ds = bus->priv; |
| |
| if (ds->phys_mii_mask & (1 << addr)) |
| return ds->ops->phy_read(ds, addr, reg); |
| |
| return 0xffff; |
| } |
| |
| static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val) |
| { |
| struct dsa_switch *ds = bus->priv; |
| |
| if (ds->phys_mii_mask & (1 << addr)) |
| return ds->ops->phy_write(ds, addr, reg, val); |
| |
| return 0; |
| } |
| |
| void dsa_user_mii_bus_init(struct dsa_switch *ds) |
| { |
| ds->user_mii_bus->priv = (void *)ds; |
| ds->user_mii_bus->name = "dsa user smi"; |
| ds->user_mii_bus->read = dsa_user_phy_read; |
| ds->user_mii_bus->write = dsa_user_phy_write; |
| snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d", |
| ds->dst->index, ds->index); |
| ds->user_mii_bus->parent = ds->dev; |
| ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask; |
| } |
| |
| |
| /* user device handling ****************************************************/ |
| static int dsa_user_get_iflink(const struct net_device *dev) |
| { |
| return READ_ONCE(dsa_user_to_conduit(dev)->ifindex); |
| } |
| |
| int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int err; |
| |
| if (dsa_switch_supports_uc_filtering(ds)) { |
| err = dsa_port_standalone_host_fdb_add(dp, addr, 0); |
| if (err) |
| goto out; |
| } |
| |
| if (!ether_addr_equal(addr, conduit->dev_addr)) { |
| err = dev_uc_add(conduit, addr); |
| if (err < 0) |
| goto del_host_addr; |
| } |
| |
| return 0; |
| |
| del_host_addr: |
| if (dsa_switch_supports_uc_filtering(ds)) |
| dsa_port_standalone_host_fdb_del(dp, addr, 0); |
| out: |
| return err; |
| } |
| |
| void dsa_user_host_uc_uninstall(struct net_device *dev) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr)) |
| dev_uc_del(conduit, dev->dev_addr); |
| |
| if (dsa_switch_supports_uc_filtering(ds)) |
| dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0); |
| } |
| |
| static int dsa_user_open(struct net_device *dev) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| int err; |
| |
| err = dev_open(conduit, NULL); |
| if (err < 0) { |
| netdev_err(dev, "failed to open conduit %s\n", conduit->name); |
| goto out; |
| } |
| |
| err = dsa_user_host_uc_install(dev, dev->dev_addr); |
| if (err) |
| goto out; |
| |
| err = dsa_port_enable_rt(dp, dev->phydev); |
| if (err) |
| goto out_del_host_uc; |
| |
| return 0; |
| |
| out_del_host_uc: |
| dsa_user_host_uc_uninstall(dev); |
| out: |
| return err; |
| } |
| |
| static int dsa_user_close(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| |
| dsa_port_disable_rt(dp); |
| |
| dsa_user_host_uc_uninstall(dev); |
| |
| return 0; |
| } |
| |
| static void dsa_user_manage_host_flood(struct net_device *dev) |
| { |
| bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| bool uc = dev->flags & IFF_PROMISC; |
| |
| dsa_port_set_host_flood(dp, uc, mc); |
| } |
| |
| static void dsa_user_change_rx_flags(struct net_device *dev, int change) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (change & IFF_ALLMULTI) |
| dev_set_allmulti(conduit, |
| dev->flags & IFF_ALLMULTI ? 1 : -1); |
| if (change & IFF_PROMISC) |
| dev_set_promiscuity(conduit, |
| dev->flags & IFF_PROMISC ? 1 : -1); |
| |
| if (dsa_switch_supports_uc_filtering(ds) && |
| dsa_switch_supports_mc_filtering(ds)) |
| dsa_user_manage_host_flood(dev); |
| } |
| |
| static void dsa_user_set_rx_mode(struct net_device *dev) |
| { |
| __dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc); |
| __dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc); |
| } |
| |
| static int dsa_user_set_mac_address(struct net_device *dev, void *a) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| struct sockaddr *addr = a; |
| int err; |
| |
| if (!is_valid_ether_addr(addr->sa_data)) |
| return -EADDRNOTAVAIL; |
| |
| if (ds->ops->port_set_mac_address) { |
| err = ds->ops->port_set_mac_address(ds, dp->index, |
| addr->sa_data); |
| if (err) |
| return err; |
| } |
| |
| /* If the port is down, the address isn't synced yet to hardware or |
| * to the DSA conduit, so there is nothing to change. |
| */ |
| if (!(dev->flags & IFF_UP)) |
| goto out_change_dev_addr; |
| |
| err = dsa_user_host_uc_install(dev, addr->sa_data); |
| if (err) |
| return err; |
| |
| dsa_user_host_uc_uninstall(dev); |
| |
| out_change_dev_addr: |
| eth_hw_addr_set(dev, addr->sa_data); |
| |
| return 0; |
| } |
| |
| struct dsa_user_dump_ctx { |
| struct net_device *dev; |
| struct sk_buff *skb; |
| struct netlink_callback *cb; |
| int idx; |
| }; |
| |
| static int |
| dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid, |
| bool is_static, void *data) |
| { |
| struct dsa_user_dump_ctx *dump = data; |
| u32 portid = NETLINK_CB(dump->cb->skb).portid; |
| u32 seq = dump->cb->nlh->nlmsg_seq; |
| struct nlmsghdr *nlh; |
| struct ndmsg *ndm; |
| |
| if (dump->idx < dump->cb->args[2]) |
| goto skip; |
| |
| nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH, |
| sizeof(*ndm), NLM_F_MULTI); |
| if (!nlh) |
| return -EMSGSIZE; |
| |
| ndm = nlmsg_data(nlh); |
| ndm->ndm_family = AF_BRIDGE; |
| ndm->ndm_pad1 = 0; |
| ndm->ndm_pad2 = 0; |
| ndm->ndm_flags = NTF_SELF; |
| ndm->ndm_type = 0; |
| ndm->ndm_ifindex = dump->dev->ifindex; |
| ndm->ndm_state = is_static ? NUD_NOARP : NUD_REACHABLE; |
| |
| if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr)) |
| goto nla_put_failure; |
| |
| if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid)) |
| goto nla_put_failure; |
| |
| nlmsg_end(dump->skb, nlh); |
| |
| skip: |
| dump->idx++; |
| return 0; |
| |
| nla_put_failure: |
| nlmsg_cancel(dump->skb, nlh); |
| return -EMSGSIZE; |
| } |
| |
| static int |
| dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb, |
| struct net_device *dev, struct net_device *filter_dev, |
| int *idx) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_user_dump_ctx dump = { |
| .dev = dev, |
| .skb = skb, |
| .cb = cb, |
| .idx = *idx, |
| }; |
| int err; |
| |
| err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump); |
| *idx = dump.idx; |
| |
| return err; |
| } |
| |
| static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) |
| { |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct dsa_switch *ds = p->dp->ds; |
| int port = p->dp->index; |
| |
| /* Pass through to switch driver if it supports timestamping */ |
| switch (cmd) { |
| case SIOCGHWTSTAMP: |
| if (ds->ops->port_hwtstamp_get) |
| return ds->ops->port_hwtstamp_get(ds, port, ifr); |
| break; |
| case SIOCSHWTSTAMP: |
| if (ds->ops->port_hwtstamp_set) |
| return ds->ops->port_hwtstamp_set(ds, port, ifr); |
| break; |
| } |
| |
| return phylink_mii_ioctl(p->dp->pl, ifr, cmd); |
| } |
| |
| static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx, |
| const struct switchdev_attr *attr, |
| struct netlink_ext_ack *extack) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| int ret; |
| |
| if (ctx && ctx != dp) |
| return 0; |
| |
| switch (attr->id) { |
| case SWITCHDEV_ATTR_ID_PORT_STP_STATE: |
| if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_set_state(dp, attr->u.stp_state, true); |
| break; |
| case SWITCHDEV_ATTR_ID_PORT_MST_STATE: |
| if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack); |
| break; |
| case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING: |
| if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering, |
| extack); |
| break; |
| case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME: |
| if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_ageing_time(dp, attr->u.ageing_time); |
| break; |
| case SWITCHDEV_ATTR_ID_BRIDGE_MST: |
| if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_mst_enable(dp, attr->u.mst, extack); |
| break; |
| case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS: |
| if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags, |
| extack); |
| break; |
| case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS: |
| if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack); |
| break; |
| case SWITCHDEV_ATTR_ID_VLAN_MSTI: |
| if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti); |
| break; |
| default: |
| ret = -EOPNOTSUPP; |
| break; |
| } |
| |
| return ret; |
| } |
| |
| /* Must be called under rcu_read_lock() */ |
| static int |
| dsa_user_vlan_check_for_8021q_uppers(struct net_device *user, |
| const struct switchdev_obj_port_vlan *vlan) |
| { |
| struct net_device *upper_dev; |
| struct list_head *iter; |
| |
| netdev_for_each_upper_dev_rcu(user, upper_dev, iter) { |
| u16 vid; |
| |
| if (!is_vlan_dev(upper_dev)) |
| continue; |
| |
| vid = vlan_dev_vlan_id(upper_dev); |
| if (vid == vlan->vid) |
| return -EBUSY; |
| } |
| |
| return 0; |
| } |
| |
| static int dsa_user_vlan_add(struct net_device *dev, |
| const struct switchdev_obj *obj, |
| struct netlink_ext_ack *extack) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_vlan *vlan; |
| int err; |
| |
| if (dsa_port_skip_vlan_configuration(dp)) { |
| NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); |
| return 0; |
| } |
| |
| vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); |
| |
| /* Deny adding a bridge VLAN when there is already an 802.1Q upper with |
| * the same VID. |
| */ |
| if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) { |
| rcu_read_lock(); |
| err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan); |
| rcu_read_unlock(); |
| if (err) { |
| NL_SET_ERR_MSG_MOD(extack, |
| "Port already has a VLAN upper with this VID"); |
| return err; |
| } |
| } |
| |
| return dsa_port_vlan_add(dp, vlan, extack); |
| } |
| |
| /* Offload a VLAN installed on the bridge or on a foreign interface by |
| * installing it as a VLAN towards the CPU port. |
| */ |
| static int dsa_user_host_vlan_add(struct net_device *dev, |
| const struct switchdev_obj *obj, |
| struct netlink_ext_ack *extack) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_vlan vlan; |
| |
| /* Do nothing if this is a software bridge */ |
| if (!dp->bridge) |
| return -EOPNOTSUPP; |
| |
| if (dsa_port_skip_vlan_configuration(dp)) { |
| NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); |
| return 0; |
| } |
| |
| vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj); |
| |
| /* Even though drivers often handle CPU membership in special ways, |
| * it doesn't make sense to program a PVID, so clear this flag. |
| */ |
| vlan.flags &= ~BRIDGE_VLAN_INFO_PVID; |
| |
| return dsa_port_host_vlan_add(dp, &vlan, extack); |
| } |
| |
| static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx, |
| const struct switchdev_obj *obj, |
| struct netlink_ext_ack *extack) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| int err; |
| |
| if (ctx && ctx != dp) |
| return 0; |
| |
| switch (obj->id) { |
| case SWITCHDEV_OBJ_ID_PORT_MDB: |
| if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); |
| break; |
| case SWITCHDEV_OBJ_ID_HOST_MDB: |
| if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); |
| break; |
| case SWITCHDEV_OBJ_ID_PORT_VLAN: |
| if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) |
| err = dsa_user_vlan_add(dev, obj, extack); |
| else |
| err = dsa_user_host_vlan_add(dev, obj, extack); |
| break; |
| case SWITCHDEV_OBJ_ID_MRP: |
| if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj)); |
| break; |
| case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: |
| if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_mrp_add_ring_role(dp, |
| SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); |
| break; |
| default: |
| err = -EOPNOTSUPP; |
| break; |
| } |
| |
| return err; |
| } |
| |
| static int dsa_user_vlan_del(struct net_device *dev, |
| const struct switchdev_obj *obj) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_vlan *vlan; |
| |
| if (dsa_port_skip_vlan_configuration(dp)) |
| return 0; |
| |
| vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); |
| |
| return dsa_port_vlan_del(dp, vlan); |
| } |
| |
| static int dsa_user_host_vlan_del(struct net_device *dev, |
| const struct switchdev_obj *obj) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_vlan *vlan; |
| |
| /* Do nothing if this is a software bridge */ |
| if (!dp->bridge) |
| return -EOPNOTSUPP; |
| |
| if (dsa_port_skip_vlan_configuration(dp)) |
| return 0; |
| |
| vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); |
| |
| return dsa_port_host_vlan_del(dp, vlan); |
| } |
| |
| static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx, |
| const struct switchdev_obj *obj) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| int err; |
| |
| if (ctx && ctx != dp) |
| return 0; |
| |
| switch (obj->id) { |
| case SWITCHDEV_OBJ_ID_PORT_MDB: |
| if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); |
| break; |
| case SWITCHDEV_OBJ_ID_HOST_MDB: |
| if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); |
| break; |
| case SWITCHDEV_OBJ_ID_PORT_VLAN: |
| if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) |
| err = dsa_user_vlan_del(dev, obj); |
| else |
| err = dsa_user_host_vlan_del(dev, obj); |
| break; |
| case SWITCHDEV_OBJ_ID_MRP: |
| if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj)); |
| break; |
| case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: |
| if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) |
| return -EOPNOTSUPP; |
| |
| err = dsa_port_mrp_del_ring_role(dp, |
| SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); |
| break; |
| default: |
| err = -EOPNOTSUPP; |
| break; |
| } |
| |
| return err; |
| } |
| |
| static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev, |
| struct sk_buff *skb) |
| { |
| #ifdef CONFIG_NET_POLL_CONTROLLER |
| struct dsa_user_priv *p = netdev_priv(dev); |
| |
| return netpoll_send_skb(p->netpoll, skb); |
| #else |
| BUG(); |
| return NETDEV_TX_OK; |
| #endif |
| } |
| |
| static void dsa_skb_tx_timestamp(struct dsa_user_priv *p, |
| struct sk_buff *skb) |
| { |
| struct dsa_switch *ds = p->dp->ds; |
| |
| if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP)) |
| return; |
| |
| if (!ds->ops->port_txtstamp) |
| return; |
| |
| ds->ops->port_txtstamp(ds, p->dp->index, skb); |
| } |
| |
| netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev) |
| { |
| /* SKB for netpoll still need to be mangled with the protocol-specific |
| * tag to be successfully transmitted |
| */ |
| if (unlikely(netpoll_tx_running(dev))) |
| return dsa_user_netpoll_send_skb(dev, skb); |
| |
| /* Queue the SKB for transmission on the parent interface, but |
| * do not modify its EtherType |
| */ |
| skb->dev = dsa_user_to_conduit(dev); |
| dev_queue_xmit(skb); |
| |
| return NETDEV_TX_OK; |
| } |
| EXPORT_SYMBOL_GPL(dsa_enqueue_skb); |
| |
| static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev) |
| { |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct sk_buff *nskb; |
| |
| dev_sw_netstats_tx_add(dev, 1, skb->len); |
| |
| memset(skb->cb, 0, sizeof(skb->cb)); |
| |
| /* Handle tx timestamp if any */ |
| dsa_skb_tx_timestamp(p, skb); |
| |
| if (skb_ensure_writable_head_tail(skb, dev)) { |
| dev_kfree_skb_any(skb); |
| return NETDEV_TX_OK; |
| } |
| |
| /* needed_tailroom should still be 'warm' in the cache line from |
| * skb_ensure_writable_head_tail(), which has also ensured that |
| * padding is safe. |
| */ |
| if (dev->needed_tailroom) |
| eth_skb_pad(skb); |
| |
| /* Transmit function may have to reallocate the original SKB, |
| * in which case it must have freed it. Only free it here on error. |
| */ |
| nskb = p->xmit(skb, dev); |
| if (!nskb) { |
| kfree_skb(skb); |
| return NETDEV_TX_OK; |
| } |
| |
| return dsa_enqueue_skb(nskb, dev); |
| } |
| |
| /* ethtool operations *******************************************************/ |
| |
| static void dsa_user_get_drvinfo(struct net_device *dev, |
| struct ethtool_drvinfo *drvinfo) |
| { |
| strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver)); |
| strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version)); |
| strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info)); |
| } |
| |
| static int dsa_user_get_regs_len(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_regs_len) |
| return ds->ops->get_regs_len(ds, dp->index); |
| |
| return -EOPNOTSUPP; |
| } |
| |
| static void |
| dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_regs) |
| ds->ops->get_regs(ds, dp->index, regs, _p); |
| } |
| |
| static int dsa_user_nway_reset(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| |
| return phylink_ethtool_nway_reset(dp->pl); |
| } |
| |
| static int dsa_user_get_eeprom_len(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->cd && ds->cd->eeprom_len) |
| return ds->cd->eeprom_len; |
| |
| if (ds->ops->get_eeprom_len) |
| return ds->ops->get_eeprom_len(ds); |
| |
| return 0; |
| } |
| |
| static int dsa_user_get_eeprom(struct net_device *dev, |
| struct ethtool_eeprom *eeprom, u8 *data) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_eeprom) |
| return ds->ops->get_eeprom(ds, eeprom, data); |
| |
| return -EOPNOTSUPP; |
| } |
| |
| static int dsa_user_set_eeprom(struct net_device *dev, |
| struct ethtool_eeprom *eeprom, u8 *data) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->set_eeprom) |
| return ds->ops->set_eeprom(ds, eeprom, data); |
| |
| return -EOPNOTSUPP; |
| } |
| |
| static void dsa_user_get_strings(struct net_device *dev, |
| uint32_t stringset, uint8_t *data) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (stringset == ETH_SS_STATS) { |
| int len = ETH_GSTRING_LEN; |
| |
| strscpy_pad(data, "tx_packets", len); |
| strscpy_pad(data + len, "tx_bytes", len); |
| strscpy_pad(data + 2 * len, "rx_packets", len); |
| strscpy_pad(data + 3 * len, "rx_bytes", len); |
| if (ds->ops->get_strings) |
| ds->ops->get_strings(ds, dp->index, stringset, |
| data + 4 * len); |
| } else if (stringset == ETH_SS_TEST) { |
| net_selftest_get_strings(data); |
| } |
| |
| } |
| |
| static void dsa_user_get_ethtool_stats(struct net_device *dev, |
| struct ethtool_stats *stats, |
| uint64_t *data) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| struct pcpu_sw_netstats *s; |
| unsigned int start; |
| int i; |
| |
| for_each_possible_cpu(i) { |
| u64 tx_packets, tx_bytes, rx_packets, rx_bytes; |
| |
| s = per_cpu_ptr(dev->tstats, i); |
| do { |
| start = u64_stats_fetch_begin(&s->syncp); |
| tx_packets = u64_stats_read(&s->tx_packets); |
| tx_bytes = u64_stats_read(&s->tx_bytes); |
| rx_packets = u64_stats_read(&s->rx_packets); |
| rx_bytes = u64_stats_read(&s->rx_bytes); |
| } while (u64_stats_fetch_retry(&s->syncp, start)); |
| data[0] += tx_packets; |
| data[1] += tx_bytes; |
| data[2] += rx_packets; |
| data[3] += rx_bytes; |
| } |
| if (ds->ops->get_ethtool_stats) |
| ds->ops->get_ethtool_stats(ds, dp->index, data + 4); |
| } |
| |
| static int dsa_user_get_sset_count(struct net_device *dev, int sset) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (sset == ETH_SS_STATS) { |
| int count = 0; |
| |
| if (ds->ops->get_sset_count) { |
| count = ds->ops->get_sset_count(ds, dp->index, sset); |
| if (count < 0) |
| return count; |
| } |
| |
| return count + 4; |
| } else if (sset == ETH_SS_TEST) { |
| return net_selftest_get_count(); |
| } |
| |
| return -EOPNOTSUPP; |
| } |
| |
| static void dsa_user_get_eth_phy_stats(struct net_device *dev, |
| struct ethtool_eth_phy_stats *phy_stats) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_eth_phy_stats) |
| ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats); |
| } |
| |
| static void dsa_user_get_eth_mac_stats(struct net_device *dev, |
| struct ethtool_eth_mac_stats *mac_stats) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_eth_mac_stats) |
| ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats); |
| } |
| |
| static void |
| dsa_user_get_eth_ctrl_stats(struct net_device *dev, |
| struct ethtool_eth_ctrl_stats *ctrl_stats) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_eth_ctrl_stats) |
| ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats); |
| } |
| |
| static void |
| dsa_user_get_rmon_stats(struct net_device *dev, |
| struct ethtool_rmon_stats *rmon_stats, |
| const struct ethtool_rmon_hist_range **ranges) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_rmon_stats) |
| ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges); |
| } |
| |
| static void dsa_user_net_selftest(struct net_device *ndev, |
| struct ethtool_test *etest, u64 *buf) |
| { |
| struct dsa_port *dp = dsa_user_to_port(ndev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->self_test) { |
| ds->ops->self_test(ds, dp->index, etest, buf); |
| return; |
| } |
| |
| net_selftest(ndev, etest, buf); |
| } |
| |
| static int dsa_user_get_mm(struct net_device *dev, |
| struct ethtool_mm_state *state) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (!ds->ops->get_mm) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->get_mm(ds, dp->index, state); |
| } |
| |
| static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg, |
| struct netlink_ext_ack *extack) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (!ds->ops->set_mm) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->set_mm(ds, dp->index, cfg, extack); |
| } |
| |
| static void dsa_user_get_mm_stats(struct net_device *dev, |
| struct ethtool_mm_stats *stats) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_mm_stats) |
| ds->ops->get_mm_stats(ds, dp->index, stats); |
| } |
| |
| static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| phylink_ethtool_get_wol(dp->pl, w); |
| |
| if (ds->ops->get_wol) |
| ds->ops->get_wol(ds, dp->index, w); |
| } |
| |
| static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int ret = -EOPNOTSUPP; |
| |
| phylink_ethtool_set_wol(dp->pl, w); |
| |
| if (ds->ops->set_wol) |
| ret = ds->ops->set_wol(ds, dp->index, w); |
| |
| return ret; |
| } |
| |
| static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int ret; |
| |
| /* Port's PHY and MAC both need to be EEE capable */ |
| if (!dev->phydev || !dp->pl) |
| return -ENODEV; |
| |
| if (!ds->ops->set_mac_eee) |
| return -EOPNOTSUPP; |
| |
| ret = ds->ops->set_mac_eee(ds, dp->index, e); |
| if (ret) |
| return ret; |
| |
| return phylink_ethtool_set_eee(dp->pl, e); |
| } |
| |
| static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int ret; |
| |
| /* Port's PHY and MAC both need to be EEE capable */ |
| if (!dev->phydev || !dp->pl) |
| return -ENODEV; |
| |
| if (!ds->ops->get_mac_eee) |
| return -EOPNOTSUPP; |
| |
| ret = ds->ops->get_mac_eee(ds, dp->index, e); |
| if (ret) |
| return ret; |
| |
| return phylink_ethtool_get_eee(dp->pl, e); |
| } |
| |
| static int dsa_user_get_link_ksettings(struct net_device *dev, |
| struct ethtool_link_ksettings *cmd) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| |
| return phylink_ethtool_ksettings_get(dp->pl, cmd); |
| } |
| |
| static int dsa_user_set_link_ksettings(struct net_device *dev, |
| const struct ethtool_link_ksettings *cmd) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| |
| return phylink_ethtool_ksettings_set(dp->pl, cmd); |
| } |
| |
| static void dsa_user_get_pause_stats(struct net_device *dev, |
| struct ethtool_pause_stats *pause_stats) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_pause_stats) |
| ds->ops->get_pause_stats(ds, dp->index, pause_stats); |
| } |
| |
| static void dsa_user_get_pauseparam(struct net_device *dev, |
| struct ethtool_pauseparam *pause) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| |
| phylink_ethtool_get_pauseparam(dp->pl, pause); |
| } |
| |
| static int dsa_user_set_pauseparam(struct net_device *dev, |
| struct ethtool_pauseparam *pause) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| |
| return phylink_ethtool_set_pauseparam(dp->pl, pause); |
| } |
| |
| #ifdef CONFIG_NET_POLL_CONTROLLER |
| static int dsa_user_netpoll_setup(struct net_device *dev, |
| struct netpoll_info *ni) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct netpoll *netpoll; |
| int err = 0; |
| |
| netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL); |
| if (!netpoll) |
| return -ENOMEM; |
| |
| err = __netpoll_setup(netpoll, conduit); |
| if (err) { |
| kfree(netpoll); |
| goto out; |
| } |
| |
| p->netpoll = netpoll; |
| out: |
| return err; |
| } |
| |
| static void dsa_user_netpoll_cleanup(struct net_device *dev) |
| { |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct netpoll *netpoll = p->netpoll; |
| |
| if (!netpoll) |
| return; |
| |
| p->netpoll = NULL; |
| |
| __netpoll_free(netpoll); |
| } |
| |
| static void dsa_user_poll_controller(struct net_device *dev) |
| { |
| } |
| #endif |
| |
| static struct dsa_mall_tc_entry * |
| dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie) |
| { |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct dsa_mall_tc_entry *mall_tc_entry; |
| |
| list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) |
| if (mall_tc_entry->cookie == cookie) |
| return mall_tc_entry; |
| |
| return NULL; |
| } |
| |
| static int |
| dsa_user_add_cls_matchall_mirred(struct net_device *dev, |
| struct tc_cls_matchall_offload *cls, |
| bool ingress) |
| { |
| struct netlink_ext_ack *extack = cls->common.extack; |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct dsa_mall_mirror_tc_entry *mirror; |
| struct dsa_mall_tc_entry *mall_tc_entry; |
| struct dsa_switch *ds = dp->ds; |
| struct flow_action_entry *act; |
| struct dsa_port *to_dp; |
| int err; |
| |
| if (!ds->ops->port_mirror_add) |
| return -EOPNOTSUPP; |
| |
| if (!flow_action_basic_hw_stats_check(&cls->rule->action, |
| cls->common.extack)) |
| return -EOPNOTSUPP; |
| |
| act = &cls->rule->action.entries[0]; |
| |
| if (!act->dev) |
| return -EINVAL; |
| |
| if (!dsa_user_dev_check(act->dev)) |
| return -EOPNOTSUPP; |
| |
| mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); |
| if (!mall_tc_entry) |
| return -ENOMEM; |
| |
| mall_tc_entry->cookie = cls->cookie; |
| mall_tc_entry->type = DSA_PORT_MALL_MIRROR; |
| mirror = &mall_tc_entry->mirror; |
| |
| to_dp = dsa_user_to_port(act->dev); |
| |
| mirror->to_local_port = to_dp->index; |
| mirror->ingress = ingress; |
| |
| err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack); |
| if (err) { |
| kfree(mall_tc_entry); |
| return err; |
| } |
| |
| list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); |
| |
| return err; |
| } |
| |
| static int |
| dsa_user_add_cls_matchall_police(struct net_device *dev, |
| struct tc_cls_matchall_offload *cls, |
| bool ingress) |
| { |
| struct netlink_ext_ack *extack = cls->common.extack; |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct dsa_mall_policer_tc_entry *policer; |
| struct dsa_mall_tc_entry *mall_tc_entry; |
| struct dsa_switch *ds = dp->ds; |
| struct flow_action_entry *act; |
| int err; |
| |
| if (!ds->ops->port_policer_add) { |
| NL_SET_ERR_MSG_MOD(extack, |
| "Policing offload not implemented"); |
| return -EOPNOTSUPP; |
| } |
| |
| if (!ingress) { |
| NL_SET_ERR_MSG_MOD(extack, |
| "Only supported on ingress qdisc"); |
| return -EOPNOTSUPP; |
| } |
| |
| if (!flow_action_basic_hw_stats_check(&cls->rule->action, |
| cls->common.extack)) |
| return -EOPNOTSUPP; |
| |
| list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) { |
| if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) { |
| NL_SET_ERR_MSG_MOD(extack, |
| "Only one port policer allowed"); |
| return -EEXIST; |
| } |
| } |
| |
| act = &cls->rule->action.entries[0]; |
| |
| mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); |
| if (!mall_tc_entry) |
| return -ENOMEM; |
| |
| mall_tc_entry->cookie = cls->cookie; |
| mall_tc_entry->type = DSA_PORT_MALL_POLICER; |
| policer = &mall_tc_entry->policer; |
| policer->rate_bytes_per_sec = act->police.rate_bytes_ps; |
| policer->burst = act->police.burst; |
| |
| err = ds->ops->port_policer_add(ds, dp->index, policer); |
| if (err) { |
| kfree(mall_tc_entry); |
| return err; |
| } |
| |
| list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); |
| |
| return err; |
| } |
| |
| static int dsa_user_add_cls_matchall(struct net_device *dev, |
| struct tc_cls_matchall_offload *cls, |
| bool ingress) |
| { |
| int err = -EOPNOTSUPP; |
| |
| if (cls->common.protocol == htons(ETH_P_ALL) && |
| flow_offload_has_one_action(&cls->rule->action) && |
| cls->rule->action.entries[0].id == FLOW_ACTION_MIRRED) |
| err = dsa_user_add_cls_matchall_mirred(dev, cls, ingress); |
| else if (flow_offload_has_one_action(&cls->rule->action) && |
| cls->rule->action.entries[0].id == FLOW_ACTION_POLICE) |
| err = dsa_user_add_cls_matchall_police(dev, cls, ingress); |
| |
| return err; |
| } |
| |
| static void dsa_user_del_cls_matchall(struct net_device *dev, |
| struct tc_cls_matchall_offload *cls) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_mall_tc_entry *mall_tc_entry; |
| struct dsa_switch *ds = dp->ds; |
| |
| mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie); |
| if (!mall_tc_entry) |
| return; |
| |
| list_del(&mall_tc_entry->list); |
| |
| switch (mall_tc_entry->type) { |
| case DSA_PORT_MALL_MIRROR: |
| if (ds->ops->port_mirror_del) |
| ds->ops->port_mirror_del(ds, dp->index, |
| &mall_tc_entry->mirror); |
| break; |
| case DSA_PORT_MALL_POLICER: |
| if (ds->ops->port_policer_del) |
| ds->ops->port_policer_del(ds, dp->index); |
| break; |
| default: |
| WARN_ON(1); |
| } |
| |
| kfree(mall_tc_entry); |
| } |
| |
| static int dsa_user_setup_tc_cls_matchall(struct net_device *dev, |
| struct tc_cls_matchall_offload *cls, |
| bool ingress) |
| { |
| if (cls->common.chain_index) |
| return -EOPNOTSUPP; |
| |
| switch (cls->command) { |
| case TC_CLSMATCHALL_REPLACE: |
| return dsa_user_add_cls_matchall(dev, cls, ingress); |
| case TC_CLSMATCHALL_DESTROY: |
| dsa_user_del_cls_matchall(dev, cls); |
| return 0; |
| default: |
| return -EOPNOTSUPP; |
| } |
| } |
| |
| static int dsa_user_add_cls_flower(struct net_device *dev, |
| struct flow_cls_offload *cls, |
| bool ingress) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int port = dp->index; |
| |
| if (!ds->ops->cls_flower_add) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->cls_flower_add(ds, port, cls, ingress); |
| } |
| |
| static int dsa_user_del_cls_flower(struct net_device *dev, |
| struct flow_cls_offload *cls, |
| bool ingress) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int port = dp->index; |
| |
| if (!ds->ops->cls_flower_del) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->cls_flower_del(ds, port, cls, ingress); |
| } |
| |
| static int dsa_user_stats_cls_flower(struct net_device *dev, |
| struct flow_cls_offload *cls, |
| bool ingress) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int port = dp->index; |
| |
| if (!ds->ops->cls_flower_stats) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->cls_flower_stats(ds, port, cls, ingress); |
| } |
| |
| static int dsa_user_setup_tc_cls_flower(struct net_device *dev, |
| struct flow_cls_offload *cls, |
| bool ingress) |
| { |
| switch (cls->command) { |
| case FLOW_CLS_REPLACE: |
| return dsa_user_add_cls_flower(dev, cls, ingress); |
| case FLOW_CLS_DESTROY: |
| return dsa_user_del_cls_flower(dev, cls, ingress); |
| case FLOW_CLS_STATS: |
| return dsa_user_stats_cls_flower(dev, cls, ingress); |
| default: |
| return -EOPNOTSUPP; |
| } |
| } |
| |
| static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data, |
| void *cb_priv, bool ingress) |
| { |
| struct net_device *dev = cb_priv; |
| |
| if (!tc_can_offload(dev)) |
| return -EOPNOTSUPP; |
| |
| switch (type) { |
| case TC_SETUP_CLSMATCHALL: |
| return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress); |
| case TC_SETUP_CLSFLOWER: |
| return dsa_user_setup_tc_cls_flower(dev, type_data, ingress); |
| default: |
| return -EOPNOTSUPP; |
| } |
| } |
| |
| static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type, |
| void *type_data, void *cb_priv) |
| { |
| return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true); |
| } |
| |
| static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type, |
| void *type_data, void *cb_priv) |
| { |
| return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false); |
| } |
| |
| static LIST_HEAD(dsa_user_block_cb_list); |
| |
| static int dsa_user_setup_tc_block(struct net_device *dev, |
| struct flow_block_offload *f) |
| { |
| struct flow_block_cb *block_cb; |
| flow_setup_cb_t *cb; |
| |
| if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS) |
| cb = dsa_user_setup_tc_block_cb_ig; |
| else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS) |
| cb = dsa_user_setup_tc_block_cb_eg; |
| else |
| return -EOPNOTSUPP; |
| |
| f->driver_block_list = &dsa_user_block_cb_list; |
| |
| switch (f->command) { |
| case FLOW_BLOCK_BIND: |
| if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list)) |
| return -EBUSY; |
| |
| block_cb = flow_block_cb_alloc(cb, dev, dev, NULL); |
| if (IS_ERR(block_cb)) |
| return PTR_ERR(block_cb); |
| |
| flow_block_cb_add(block_cb, f); |
| list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list); |
| return 0; |
| case FLOW_BLOCK_UNBIND: |
| block_cb = flow_block_cb_lookup(f->block, cb, dev); |
| if (!block_cb) |
| return -ENOENT; |
| |
| flow_block_cb_remove(block_cb, f); |
| list_del(&block_cb->driver_list); |
| return 0; |
| default: |
| return -EOPNOTSUPP; |
| } |
| } |
| |
| static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port, |
| void *type_data) |
| { |
| struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port)); |
| |
| if (!conduit->netdev_ops->ndo_setup_tc) |
| return -EOPNOTSUPP; |
| |
| return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data); |
| } |
| |
| static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type, |
| void *type_data) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| switch (type) { |
| case TC_SETUP_BLOCK: |
| return dsa_user_setup_tc_block(dev, type_data); |
| case TC_SETUP_FT: |
| return dsa_user_setup_ft_block(ds, dp->index, type_data); |
| default: |
| break; |
| } |
| |
| if (!ds->ops->port_setup_tc) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->port_setup_tc(ds, dp->index, type, type_data); |
| } |
| |
| static int dsa_user_get_rxnfc(struct net_device *dev, |
| struct ethtool_rxnfc *nfc, u32 *rule_locs) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (!ds->ops->get_rxnfc) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs); |
| } |
| |
| static int dsa_user_set_rxnfc(struct net_device *dev, |
| struct ethtool_rxnfc *nfc) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (!ds->ops->set_rxnfc) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->set_rxnfc(ds, dp->index, nfc); |
| } |
| |
| static int dsa_user_get_ts_info(struct net_device *dev, |
| struct kernel_ethtool_ts_info *ts) |
| { |
| struct dsa_user_priv *p = netdev_priv(dev); |
| struct dsa_switch *ds = p->dp->ds; |
| |
| if (!ds->ops->get_ts_info) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->get_ts_info(ds, p->dp->index, ts); |
| } |
| |
| static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto, |
| u16 vid) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_vlan vlan = { |
| .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, |
| .vid = vid, |
| /* This API only allows programming tagged, non-PVID VIDs */ |
| .flags = 0, |
| }; |
| struct netlink_ext_ack extack = {0}; |
| struct dsa_switch *ds = dp->ds; |
| struct netdev_hw_addr *ha; |
| struct dsa_vlan *v; |
| int ret; |
| |
| /* User port... */ |
| ret = dsa_port_vlan_add(dp, &vlan, &extack); |
| if (ret) { |
| if (extack._msg) |
| netdev_err(dev, "%s\n", extack._msg); |
| return ret; |
| } |
| |
| /* And CPU port... */ |
| ret = dsa_port_host_vlan_add(dp, &vlan, &extack); |
| if (ret) { |
| if (extack._msg) |
| netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index, |
| extack._msg); |
| return ret; |
| } |
| |
| if (!dsa_switch_supports_uc_filtering(ds) && |
| !dsa_switch_supports_mc_filtering(ds)) |
| return 0; |
| |
| v = kzalloc(sizeof(*v), GFP_KERNEL); |
| if (!v) { |
| ret = -ENOMEM; |
| goto rollback; |
| } |
| |
| netif_addr_lock_bh(dev); |
| |
| v->vid = vid; |
| list_add_tail(&v->list, &dp->user_vlans); |
| |
| if (dsa_switch_supports_mc_filtering(ds)) { |
| netdev_for_each_synced_mc_addr(ha, dev) { |
| dsa_user_schedule_standalone_work(dev, DSA_MC_ADD, |
| ha->addr, vid); |
| } |
| } |
| |
| if (dsa_switch_supports_uc_filtering(ds)) { |
| netdev_for_each_synced_uc_addr(ha, dev) { |
| dsa_user_schedule_standalone_work(dev, DSA_UC_ADD, |
| ha->addr, vid); |
| } |
| } |
| |
| netif_addr_unlock_bh(dev); |
| |
| dsa_flush_workqueue(); |
| |
| return 0; |
| |
| rollback: |
| dsa_port_host_vlan_del(dp, &vlan); |
| dsa_port_vlan_del(dp, &vlan); |
| |
| return ret; |
| } |
| |
| static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, |
| u16 vid) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct switchdev_obj_port_vlan vlan = { |
| .vid = vid, |
| /* This API only allows programming tagged, non-PVID VIDs */ |
| .flags = 0, |
| }; |
| struct dsa_switch *ds = dp->ds; |
| struct netdev_hw_addr *ha; |
| struct dsa_vlan *v; |
| int err; |
| |
| err = dsa_port_vlan_del(dp, &vlan); |
| if (err) |
| return err; |
| |
| err = dsa_port_host_vlan_del(dp, &vlan); |
| if (err) |
| return err; |
| |
| if (!dsa_switch_supports_uc_filtering(ds) && |
| !dsa_switch_supports_mc_filtering(ds)) |
| return 0; |
| |
| netif_addr_lock_bh(dev); |
| |
| v = dsa_vlan_find(&dp->user_vlans, &vlan); |
| if (!v) { |
| netif_addr_unlock_bh(dev); |
| return -ENOENT; |
| } |
| |
| list_del(&v->list); |
| kfree(v); |
| |
| if (dsa_switch_supports_mc_filtering(ds)) { |
| netdev_for_each_synced_mc_addr(ha, dev) { |
| dsa_user_schedule_standalone_work(dev, DSA_MC_DEL, |
| ha->addr, vid); |
| } |
| } |
| |
| if (dsa_switch_supports_uc_filtering(ds)) { |
| netdev_for_each_synced_uc_addr(ha, dev) { |
| dsa_user_schedule_standalone_work(dev, DSA_UC_DEL, |
| ha->addr, vid); |
| } |
| } |
| |
| netif_addr_unlock_bh(dev); |
| |
| dsa_flush_workqueue(); |
| |
| return 0; |
| } |
| |
| static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg) |
| { |
| __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); |
| |
| return dsa_user_vlan_rx_add_vid(arg, proto, vid); |
| } |
| |
| static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg) |
| { |
| __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); |
| |
| return dsa_user_vlan_rx_kill_vid(arg, proto, vid); |
| } |
| |
| /* Keep the VLAN RX filtering list in sync with the hardware only if VLAN |
| * filtering is enabled. The baseline is that only ports that offload a |
| * VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware, |
| * but there are exceptions for quirky hardware. |
| * |
| * If ds->vlan_filtering_is_global = true, then standalone ports which share |
| * the same switch with other ports that offload a VLAN-aware bridge are also |
| * inevitably VLAN-aware. |
| * |
| * To summarize, a DSA switch port offloads: |
| * |
| * - If standalone (this includes software bridge, software LAG): |
| * - if ds->needs_standalone_vlan_filtering = true, OR if |
| * (ds->vlan_filtering_is_global = true AND there are bridges spanning |
| * this switch chip which have vlan_filtering=1) |
| * - the 8021q upper VLANs |
| * - else (standalone VLAN filtering is not needed, VLAN filtering is not |
| * global, or it is, but no port is under a VLAN-aware bridge): |
| * - no VLAN (any 8021q upper is a software VLAN) |
| * |
| * - If under a vlan_filtering=0 bridge which it offload: |
| * - if ds->configure_vlan_while_not_filtering = true (default): |
| * - the bridge VLANs. These VLANs are committed to hardware but inactive. |
| * - else (deprecated): |
| * - no VLAN. The bridge VLANs are not restored when VLAN awareness is |
| * enabled, so this behavior is broken and discouraged. |
| * |
| * - If under a vlan_filtering=1 bridge which it offload: |
| * - the bridge VLANs |
| * - the 8021q upper VLANs |
| */ |
| int dsa_user_manage_vlan_filtering(struct net_device *user, |
| bool vlan_filtering) |
| { |
| int err; |
| |
| if (vlan_filtering) { |
| user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; |
| |
| err = vlan_for_each(user, dsa_user_restore_vlan, user); |
| if (err) { |
| vlan_for_each(user, dsa_user_clear_vlan, user); |
| user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; |
| return err; |
| } |
| } else { |
| err = vlan_for_each(user, dsa_user_clear_vlan, user); |
| if (err) |
| return err; |
| |
| user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; |
| } |
| |
| return 0; |
| } |
| |
| struct dsa_hw_port { |
| struct list_head list; |
| struct net_device *dev; |
| int old_mtu; |
| }; |
| |
| static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu) |
| { |
| const struct dsa_hw_port *p; |
| int err; |
| |
| list_for_each_entry(p, hw_port_list, list) { |
| if (p->dev->mtu == mtu) |
| continue; |
| |
| err = dev_set_mtu(p->dev, mtu); |
| if (err) |
| goto rollback; |
| } |
| |
| return 0; |
| |
| rollback: |
| list_for_each_entry_continue_reverse(p, hw_port_list, list) { |
| if (p->dev->mtu == p->old_mtu) |
| continue; |
| |
| if (dev_set_mtu(p->dev, p->old_mtu)) |
| netdev_err(p->dev, "Failed to restore MTU\n"); |
| } |
| |
| return err; |
| } |
| |
| static void dsa_hw_port_list_free(struct list_head *hw_port_list) |
| { |
| struct dsa_hw_port *p, *n; |
| |
| list_for_each_entry_safe(p, n, hw_port_list, list) |
| kfree(p); |
| } |
| |
| /* Make the hardware datapath to/from @dev limited to a common MTU */ |
| static void dsa_bridge_mtu_normalization(struct dsa_port *dp) |
| { |
| struct list_head hw_port_list; |
| struct dsa_switch_tree *dst; |
| int min_mtu = ETH_MAX_MTU; |
| struct dsa_port *other_dp; |
| int err; |
| |
| if (!dp->ds->mtu_enforcement_ingress) |
| return; |
| |
| if (!dp->bridge) |
| return; |
| |
| INIT_LIST_HEAD(&hw_port_list); |
| |
| /* Populate the list of ports that are part of the same bridge |
| * as the newly added/modified port |
| */ |
| list_for_each_entry(dst, &dsa_tree_list, list) { |
| list_for_each_entry(other_dp, &dst->ports, list) { |
| struct dsa_hw_port *hw_port; |
| struct net_device *user; |
| |
| if (other_dp->type != DSA_PORT_TYPE_USER) |
| continue; |
| |
| if (!dsa_port_bridge_same(dp, other_dp)) |
| continue; |
| |
| if (!other_dp->ds->mtu_enforcement_ingress) |
| continue; |
| |
| user = other_dp->user; |
| |
| if (min_mtu > user->mtu) |
| min_mtu = user->mtu; |
| |
| hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL); |
| if (!hw_port) |
| goto out; |
| |
| hw_port->dev = user; |
| hw_port->old_mtu = user->mtu; |
| |
| list_add(&hw_port->list, &hw_port_list); |
| } |
| } |
| |
| /* Attempt to configure the entire hardware bridge to the newly added |
| * interface's MTU first, regardless of whether the intention of the |
| * user was to raise or lower it. |
| */ |
| err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu); |
| if (!err) |
| goto out; |
| |
| /* Clearly that didn't work out so well, so just set the minimum MTU on |
| * all hardware bridge ports now. If this fails too, then all ports will |
| * still have their old MTU rolled back anyway. |
| */ |
| dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu); |
| |
| out: |
| dsa_hw_port_list_free(&hw_port_list); |
| } |
| |
| int dsa_user_change_mtu(struct net_device *dev, int new_mtu) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_port *cpu_dp = dp->cpu_dp; |
| struct dsa_switch *ds = dp->ds; |
| struct dsa_port *other_dp; |
| int largest_mtu = 0; |
| int new_conduit_mtu; |
| int old_conduit_mtu; |
| int mtu_limit; |
| int overhead; |
| int cpu_mtu; |
| int err; |
| |
| if (!ds->ops->port_change_mtu) |
| return -EOPNOTSUPP; |
| |
| dsa_tree_for_each_user_port(other_dp, ds->dst) { |
| int user_mtu; |
| |
| /* During probe, this function will be called for each user |
| * device, while not all of them have been allocated. That's |
| * ok, it doesn't change what the maximum is, so ignore it. |
| */ |
| if (!other_dp->user) |
| continue; |
| |
| /* Pretend that we already applied the setting, which we |
| * actually haven't (still haven't done all integrity checks) |
| */ |
| if (dp == other_dp) |
| user_mtu = new_mtu; |
| else |
| user_mtu = other_dp->user->mtu; |
| |
| if (largest_mtu < user_mtu) |
| largest_mtu = user_mtu; |
| } |
| |
| overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops); |
| mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead); |
| old_conduit_mtu = conduit->mtu; |
| new_conduit_mtu = largest_mtu + overhead; |
| if (new_conduit_mtu > mtu_limit) |
| return -ERANGE; |
| |
| /* If the conduit MTU isn't over limit, there's no need to check the CPU |
| * MTU, since that surely isn't either. |
| */ |
| cpu_mtu = largest_mtu; |
| |
| /* Start applying stuff */ |
| if (new_conduit_mtu != old_conduit_mtu) { |
| err = dev_set_mtu(conduit, new_conduit_mtu); |
| if (err < 0) |
| goto out_conduit_failed; |
| |
| /* We only need to propagate the MTU of the CPU port to |
| * upstream switches, so emit a notifier which updates them. |
| */ |
| err = dsa_port_mtu_change(cpu_dp, cpu_mtu); |
| if (err) |
| goto out_cpu_failed; |
| } |
| |
| err = ds->ops->port_change_mtu(ds, dp->index, new_mtu); |
| if (err) |
| goto out_port_failed; |
| |
| WRITE_ONCE(dev->mtu, new_mtu); |
| |
| dsa_bridge_mtu_normalization(dp); |
| |
| return 0; |
| |
| out_port_failed: |
| if (new_conduit_mtu != old_conduit_mtu) |
| dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead); |
| out_cpu_failed: |
| if (new_conduit_mtu != old_conduit_mtu) |
| dev_set_mtu(conduit, old_conduit_mtu); |
| out_conduit_failed: |
| return err; |
| } |
| |
| static int __maybe_unused |
| dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int port = dp->index; |
| |
| if (!ds->ops->port_set_apptrust) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->port_set_apptrust(ds, port, sel, nsel); |
| } |
| |
| static int __maybe_unused |
| dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int port = dp->index; |
| |
| if (!ds->ops->port_get_apptrust) |
| return -EOPNOTSUPP; |
| |
| return ds->ops->port_get_apptrust(ds, port, sel, nsel); |
| } |
| |
| static int __maybe_unused |
| dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| unsigned long mask, new_prio; |
| int err, port = dp->index; |
| |
| if (!ds->ops->port_set_default_prio) |
| return -EOPNOTSUPP; |
| |
| err = dcb_ieee_setapp(dev, app); |
| if (err) |
| return err; |
| |
| mask = dcb_ieee_getapp_mask(dev, app); |
| new_prio = __fls(mask); |
| |
| err = ds->ops->port_set_default_prio(ds, port, new_prio); |
| if (err) { |
| dcb_ieee_delapp(dev, app); |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| /* Update the DSCP prio entries on all user ports of the switch in case |
| * the switch supports global DSCP prio instead of per port DSCP prios. |
| */ |
| static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev, |
| struct dcb_app *app, bool del) |
| { |
| int (*setdel)(struct net_device *dev, struct dcb_app *app); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| struct dsa_port *other_dp; |
| int err, restore_err; |
| |
| if (del) |
| setdel = dcb_ieee_delapp; |
| else |
| setdel = dcb_ieee_setapp; |
| |
| dsa_switch_for_each_user_port(other_dp, ds) { |
| struct net_device *user = other_dp->user; |
| |
| if (!user || user == dev) |
| continue; |
| |
| err = setdel(user, app); |
| if (err) |
| goto err_try_to_restore; |
| } |
| |
| return 0; |
| |
| err_try_to_restore: |
| |
| /* Revert logic to restore previous state of app entries */ |
| if (!del) |
| setdel = dcb_ieee_delapp; |
| else |
| setdel = dcb_ieee_setapp; |
| |
| dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) { |
| struct net_device *user = other_dp->user; |
| |
| if (!user || user == dev) |
| continue; |
| |
| restore_err = setdel(user, app); |
| if (restore_err) |
| netdev_err(user, "Failed to restore DSCP prio entry configuration\n"); |
| } |
| |
| return err; |
| } |
| |
| static int __maybe_unused |
| dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| unsigned long mask, new_prio; |
| int err, port = dp->index; |
| u8 dscp = app->protocol; |
| |
| if (!ds->ops->port_add_dscp_prio) |
| return -EOPNOTSUPP; |
| |
| if (dscp >= 64) { |
| netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n", |
| dscp); |
| return -EINVAL; |
| } |
| |
| err = dcb_ieee_setapp(dev, app); |
| if (err) |
| return err; |
| |
| mask = dcb_ieee_getapp_mask(dev, app); |
| new_prio = __fls(mask); |
| |
| err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio); |
| if (err) { |
| dcb_ieee_delapp(dev, app); |
| return err; |
| } |
| |
| if (!ds->dscp_prio_mapping_is_global) |
| return 0; |
| |
| err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false); |
| if (err) { |
| if (ds->ops->port_del_dscp_prio) |
| ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio); |
| dcb_ieee_delapp(dev, app); |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev, |
| struct dcb_app *app) |
| { |
| switch (app->selector) { |
| case IEEE_8021QAZ_APP_SEL_ETHERTYPE: |
| switch (app->protocol) { |
| case 0: |
| return dsa_user_dcbnl_set_default_prio(dev, app); |
| default: |
| return -EOPNOTSUPP; |
| } |
| break; |
| case IEEE_8021QAZ_APP_SEL_DSCP: |
| return dsa_user_dcbnl_add_dscp_prio(dev, app); |
| default: |
| return -EOPNOTSUPP; |
| } |
| } |
| |
| static int __maybe_unused |
| dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| unsigned long mask, new_prio; |
| int err, port = dp->index; |
| |
| if (!ds->ops->port_set_default_prio) |
| return -EOPNOTSUPP; |
| |
| err = dcb_ieee_delapp(dev, app); |
| if (err) |
| return err; |
| |
| mask = dcb_ieee_getapp_mask(dev, app); |
| new_prio = mask ? __fls(mask) : 0; |
| |
| err = ds->ops->port_set_default_prio(ds, port, new_prio); |
| if (err) { |
| dcb_ieee_setapp(dev, app); |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| static int __maybe_unused |
| dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int err, port = dp->index; |
| u8 dscp = app->protocol; |
| |
| if (!ds->ops->port_del_dscp_prio) |
| return -EOPNOTSUPP; |
| |
| err = dcb_ieee_delapp(dev, app); |
| if (err) |
| return err; |
| |
| err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority); |
| if (err) { |
| dcb_ieee_setapp(dev, app); |
| return err; |
| } |
| |
| if (!ds->dscp_prio_mapping_is_global) |
| return 0; |
| |
| err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true); |
| if (err) { |
| if (ds->ops->port_add_dscp_prio) |
| ds->ops->port_add_dscp_prio(ds, port, dscp, |
| app->priority); |
| dcb_ieee_setapp(dev, app); |
| return err; |
| } |
| |
| return 0; |
| } |
| |
| static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev, |
| struct dcb_app *app) |
| { |
| switch (app->selector) { |
| case IEEE_8021QAZ_APP_SEL_ETHERTYPE: |
| switch (app->protocol) { |
| case 0: |
| return dsa_user_dcbnl_del_default_prio(dev, app); |
| default: |
| return -EOPNOTSUPP; |
| } |
| break; |
| case IEEE_8021QAZ_APP_SEL_DSCP: |
| return dsa_user_dcbnl_del_dscp_prio(dev, app); |
| default: |
| return -EOPNOTSUPP; |
| } |
| } |
| |
| /* Pre-populate the DCB application priority table with the priorities |
| * configured during switch setup, which we read from hardware here. |
| */ |
| static int dsa_user_dcbnl_init(struct net_device *dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| int port = dp->index; |
| int err; |
| |
| if (ds->ops->port_get_default_prio) { |
| int prio = ds->ops->port_get_default_prio(ds, port); |
| struct dcb_app app = { |
| .selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE, |
| .protocol = 0, |
| .priority = prio, |
| }; |
| |
| if (prio < 0) |
| return prio; |
| |
| err = dcb_ieee_setapp(dev, &app); |
| if (err) |
| return err; |
| } |
| |
| if (ds->ops->port_get_dscp_prio) { |
| int protocol; |
| |
| for (protocol = 0; protocol < 64; protocol++) { |
| struct dcb_app app = { |
| .selector = IEEE_8021QAZ_APP_SEL_DSCP, |
| .protocol = protocol, |
| }; |
| int prio; |
| |
| prio = ds->ops->port_get_dscp_prio(ds, port, protocol); |
| if (prio == -EOPNOTSUPP) |
| continue; |
| if (prio < 0) |
| return prio; |
| |
| app.priority = prio; |
| |
| err = dcb_ieee_setapp(dev, &app); |
| if (err) |
| return err; |
| } |
| } |
| |
| return 0; |
| } |
| |
| static const struct ethtool_ops dsa_user_ethtool_ops = { |
| .get_drvinfo = dsa_user_get_drvinfo, |
| .get_regs_len = dsa_user_get_regs_len, |
| .get_regs = dsa_user_get_regs, |
| .nway_reset = dsa_user_nway_reset, |
| .get_link = ethtool_op_get_link, |
| .get_eeprom_len = dsa_user_get_eeprom_len, |
| .get_eeprom = dsa_user_get_eeprom, |
| .set_eeprom = dsa_user_set_eeprom, |
| .get_strings = dsa_user_get_strings, |
| .get_ethtool_stats = dsa_user_get_ethtool_stats, |
| .get_sset_count = dsa_user_get_sset_count, |
| .get_eth_phy_stats = dsa_user_get_eth_phy_stats, |
| .get_eth_mac_stats = dsa_user_get_eth_mac_stats, |
| .get_eth_ctrl_stats = dsa_user_get_eth_ctrl_stats, |
| .get_rmon_stats = dsa_user_get_rmon_stats, |
| .set_wol = dsa_user_set_wol, |
| .get_wol = dsa_user_get_wol, |
| .set_eee = dsa_user_set_eee, |
| .get_eee = dsa_user_get_eee, |
| .get_link_ksettings = dsa_user_get_link_ksettings, |
| .set_link_ksettings = dsa_user_set_link_ksettings, |
| .get_pause_stats = dsa_user_get_pause_stats, |
| .get_pauseparam = dsa_user_get_pauseparam, |
| .set_pauseparam = dsa_user_set_pauseparam, |
| .get_rxnfc = dsa_user_get_rxnfc, |
| .set_rxnfc = dsa_user_set_rxnfc, |
| .get_ts_info = dsa_user_get_ts_info, |
| .self_test = dsa_user_net_selftest, |
| .get_mm = dsa_user_get_mm, |
| .set_mm = dsa_user_set_mm, |
| .get_mm_stats = dsa_user_get_mm_stats, |
| }; |
| |
| static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = { |
| .ieee_setapp = dsa_user_dcbnl_ieee_setapp, |
| .ieee_delapp = dsa_user_dcbnl_ieee_delapp, |
| .dcbnl_setapptrust = dsa_user_dcbnl_set_apptrust, |
| .dcbnl_getapptrust = dsa_user_dcbnl_get_apptrust, |
| }; |
| |
| static void dsa_user_get_stats64(struct net_device *dev, |
| struct rtnl_link_stats64 *s) |
| { |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| if (ds->ops->get_stats64) |
| ds->ops->get_stats64(ds, dp->index, s); |
| else |
| dev_get_tstats64(dev, s); |
| } |
| |
| static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx, |
| struct net_device_path *path) |
| { |
| struct dsa_port *dp = dsa_user_to_port(ctx->dev); |
| struct net_device *conduit = dsa_port_to_conduit(dp); |
| struct dsa_port *cpu_dp = dp->cpu_dp; |
| |
| path->dev = ctx->dev; |
| path->type = DEV_PATH_DSA; |
| path->dsa.proto = cpu_dp->tag_ops->proto; |
| path->dsa.port = dp->index; |
| ctx->dev = conduit; |
| |
| return 0; |
| } |
| |
| static const struct net_device_ops dsa_user_netdev_ops = { |
| .ndo_open = dsa_user_open, |
| .ndo_stop = dsa_user_close, |
| .ndo_start_xmit = dsa_user_xmit, |
| .ndo_change_rx_flags = dsa_user_change_rx_flags, |
| .ndo_set_rx_mode = dsa_user_set_rx_mode, |
| .ndo_set_mac_address = dsa_user_set_mac_address, |
| .ndo_fdb_dump = dsa_user_fdb_dump, |
| .ndo_eth_ioctl = dsa_user_ioctl, |
| .ndo_get_iflink = dsa_user_get_iflink, |
| #ifdef CONFIG_NET_POLL_CONTROLLER |
| .ndo_netpoll_setup = dsa_user_netpoll_setup, |
| .ndo_netpoll_cleanup = dsa_user_netpoll_cleanup, |
| .ndo_poll_controller = dsa_user_poll_controller, |
| #endif |
| .ndo_setup_tc = dsa_user_setup_tc, |
| .ndo_get_stats64 = dsa_user_get_stats64, |
| .ndo_vlan_rx_add_vid = dsa_user_vlan_rx_add_vid, |
| .ndo_vlan_rx_kill_vid = dsa_user_vlan_rx_kill_vid, |
| .ndo_change_mtu = dsa_user_change_mtu, |
| .ndo_fill_forward_path = dsa_user_fill_forward_path, |
| }; |
| |
| static const struct device_type dsa_type = { |
| .name = "dsa", |
| }; |
| |
| void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up) |
| { |
| const struct dsa_port *dp = dsa_to_port(ds, port); |
| |
| if (dp->pl) |
| phylink_mac_change(dp->pl, up); |
| } |
| EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change); |
| |
| static void dsa_user_phylink_fixed_state(struct phylink_config *config, |
| struct phylink_link_state *state) |
| { |
| struct dsa_port *dp = dsa_phylink_to_port(config); |
| struct dsa_switch *ds = dp->ds; |
| |
| /* No need to check that this operation is valid, the callback would |
| * not be called if it was not. |
| */ |
| ds->ops->phylink_fixed_state(ds, dp->index, state); |
| } |
| |
| /* user device setup *******************************************************/ |
| static int dsa_user_phy_connect(struct net_device *user_dev, int addr, |
| u32 flags) |
| { |
| struct dsa_port *dp = dsa_user_to_port(user_dev); |
| struct dsa_switch *ds = dp->ds; |
| |
| user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr); |
| if (!user_dev->phydev) { |
| netdev_err(user_dev, "no phy at %d\n", addr); |
| return -ENODEV; |
| } |
| |
| user_dev->phydev->dev_flags |= flags; |
| |
| return phylink_connect_phy(dp->pl, user_dev->phydev); |
| } |
| |
| static int dsa_user_phy_setup(struct net_device *user_dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(user_dev); |
| struct device_node *port_dn = dp->dn; |
| struct dsa_switch *ds = dp->ds; |
| u32 phy_flags = 0; |
| int ret; |
| |
| dp->pl_config.dev = &user_dev->dev; |
| dp->pl_config.type = PHYLINK_NETDEV; |
| |
| /* The get_fixed_state callback takes precedence over polling the |
| * link GPIO in PHYLINK (see phylink_get_fixed_state). Only set |
| * this if the switch provides such a callback. |
| */ |
| if (ds->ops->phylink_fixed_state) { |
| dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state; |
| dp->pl_config.poll_fixed_state = true; |
| } |
| |
| ret = dsa_port_phylink_create(dp); |
| if (ret) |
| return ret; |
| |
| if (ds->ops->get_phy_flags) |
| phy_flags = ds->ops->get_phy_flags(ds, dp->index); |
| |
| ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags); |
| if (ret == -ENODEV && ds->user_mii_bus) { |
| /* We could not connect to a designated PHY or SFP, so try to |
| * use the switch internal MDIO bus instead |
| */ |
| ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags); |
| } |
| if (ret) { |
| netdev_err(user_dev, "failed to connect to PHY: %pe\n", |
| ERR_PTR(ret)); |
| dsa_port_phylink_destroy(dp); |
| } |
| |
| return ret; |
| } |
| |
| void dsa_user_setup_tagger(struct net_device *user) |
| { |
| struct dsa_port *dp = dsa_user_to_port(user); |
| struct net_device *conduit = dsa_port_to_conduit(dp); |
| struct dsa_user_priv *p = netdev_priv(user); |
| const struct dsa_port *cpu_dp = dp->cpu_dp; |
| const struct dsa_switch *ds = dp->ds; |
| |
| user->needed_headroom = cpu_dp->tag_ops->needed_headroom; |
| user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom; |
| /* Try to save one extra realloc later in the TX path (in the conduit) |
| * by also inheriting the conduit's needed headroom and tailroom. |
| * The 8021q driver also does this. |
| */ |
| user->needed_headroom += conduit->needed_headroom; |
| user->needed_tailroom += conduit->needed_tailroom; |
| |
| p->xmit = cpu_dp->tag_ops->xmit; |
| |
| user->features = conduit->vlan_features | NETIF_F_HW_TC; |
| user->hw_features |= NETIF_F_HW_TC; |
| if (user->needed_tailroom) |
| user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST); |
| if (ds->needs_standalone_vlan_filtering) |
| user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; |
| |
| user->lltx = true; |
| } |
| |
| int dsa_user_suspend(struct net_device *user_dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(user_dev); |
| |
| if (!netif_running(user_dev)) |
| return 0; |
| |
| netif_device_detach(user_dev); |
| |
| rtnl_lock(); |
| phylink_stop(dp->pl); |
| rtnl_unlock(); |
| |
| return 0; |
| } |
| |
| int dsa_user_resume(struct net_device *user_dev) |
| { |
| struct dsa_port *dp = dsa_user_to_port(user_dev); |
| |
| if (!netif_running(user_dev)) |
| return 0; |
| |
| netif_device_attach(user_dev); |
| |
| rtnl_lock(); |
| phylink_start(dp->pl); |
| rtnl_unlock(); |
| |
| return 0; |
| } |
| |
| int dsa_user_create(struct dsa_port *port) |
| { |
| struct net_device *conduit = dsa_port_to_conduit(port); |
| struct dsa_switch *ds = port->ds; |
| struct net_device *user_dev; |
| struct dsa_user_priv *p; |
| const char *name; |
| int assign_type; |
| int ret; |
| |
| if (!ds->num_tx_queues) |
| ds->num_tx_queues = 1; |
| |
| if (port->name) { |
| name = port->name; |
| assign_type = NET_NAME_PREDICTABLE; |
| } else { |
| name = "eth%d"; |
| assign_type = NET_NAME_ENUM; |
| } |
| |
| user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name, |
| assign_type, ether_setup, |
| ds->num_tx_queues, 1); |
| if (user_dev == NULL) |
| return -ENOMEM; |
| |
| user_dev->rtnl_link_ops = &dsa_link_ops; |
| user_dev->ethtool_ops = &dsa_user_ethtool_ops; |
| #if IS_ENABLED(CONFIG_DCB) |
| user_dev->dcbnl_ops = &dsa_user_dcbnl_ops; |
| #endif |
| if (!is_zero_ether_addr(port->mac)) |
| eth_hw_addr_set(user_dev, port->mac); |
| else |
| eth_hw_addr_inherit(user_dev, conduit); |
| user_dev->priv_flags |= IFF_NO_QUEUE; |
| if (dsa_switch_supports_uc_filtering(ds)) |
| user_dev->priv_flags |= IFF_UNICAST_FLT; |
| user_dev->netdev_ops = &dsa_user_netdev_ops; |
| if (ds->ops->port_max_mtu) |
| user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index); |
| SET_NETDEV_DEVTYPE(user_dev, &dsa_type); |
| |
| SET_NETDEV_DEV(user_dev, port->ds->dev); |
| SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port); |
| user_dev->dev.of_node = port->dn; |
| user_dev->vlan_features = conduit->vlan_features; |
| |
| p = netdev_priv(user_dev); |
| user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS; |
| |
| ret = gro_cells_init(&p->gcells, user_dev); |
| if (ret) |
| goto out_free; |
| |
| p->dp = port; |
| INIT_LIST_HEAD(&p->mall_tc_list); |
| port->user = user_dev; |
| dsa_user_setup_tagger(user_dev); |
| |
| netif_carrier_off(user_dev); |
| |
| ret = dsa_user_phy_setup(user_dev); |
| if (ret) { |
| netdev_err(user_dev, |
| "error %d setting up PHY for tree %d, switch %d, port %d\n", |
| ret, ds->dst->index, ds->index, port->index); |
| goto out_gcells; |
| } |
| |
| rtnl_lock(); |
| |
| ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN); |
| if (ret && ret != -EOPNOTSUPP) |
| dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n", |
| ret, ETH_DATA_LEN, port->index); |
| |
| ret = register_netdevice(user_dev); |
| if (ret) { |
| netdev_err(conduit, "error %d registering interface %s\n", |
| ret, user_dev->name); |
| rtnl_unlock(); |
| goto out_phy; |
| } |
| |
| if (IS_ENABLED(CONFIG_DCB)) { |
| ret = dsa_user_dcbnl_init(user_dev); |
| if (ret) { |
| netdev_err(user_dev, |
| "failed to initialize DCB: %pe\n", |
| ERR_PTR(ret)); |
| rtnl_unlock(); |
| goto out_unregister; |
| } |
| } |
| |
| ret = netdev_upper_dev_link(conduit, user_dev, NULL); |
| |
| rtnl_unlock(); |
| |
| if (ret) |
| goto out_unregister; |
| |
| return 0; |
| |
| out_unregister: |
| unregister_netdev(user_dev); |
| out_phy: |
| rtnl_lock(); |
| phylink_disconnect_phy(p->dp->pl); |
| rtnl_unlock(); |
| dsa_port_phylink_destroy(p->dp); |
| out_gcells: |
| gro_cells_destroy(&p->gcells); |
| out_free: |
| free_netdev(user_dev); |
| port->user = NULL; |
| return ret; |
| } |
| |
| void dsa_user_destroy(struct net_device *user_dev) |
| { |
| struct net_device *conduit = dsa_user_to_conduit(user_dev); |
| struct dsa_port *dp = dsa_user_to_port(user_dev); |
| struct dsa_user_priv *p = netdev_priv(user_dev); |
| |
| netif_carrier_off(user_dev); |
| rtnl_lock(); |
| netdev_upper_dev_unlink(conduit, user_dev); |
| unregister_netdevice(user_dev); |
| phylink_disconnect_phy(dp->pl); |
| rtnl_unlock(); |
| |
| dsa_port_phylink_destroy(dp); |
| gro_cells_destroy(&p->gcells); |
| free_netdev(user_dev); |
| } |
| |
| int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit, |
| struct netlink_ext_ack *extack) |
| { |
| struct net_device *old_conduit = dsa_user_to_conduit(dev); |
| struct dsa_port *dp = dsa_user_to_port(dev); |
| struct dsa_switch *ds = dp->ds; |
| struct net_device *upper; |
| struct list_head *iter; |
| int err; |
| |
| if (conduit == old_conduit) |
| return 0; |
| |
| if (!ds->ops->port_change_conduit) { |
| NL_SET_ERR_MSG_MOD(extack, |
| "Driver does not support changing DSA conduit"); |
| return -EOPNOTSUPP; |
| } |
| |
| if (!netdev_uses_dsa(conduit)) { |
| NL_SET_ERR_MSG_MOD(extack, |
| "Interface not eligible as DSA conduit"); |
| return -EOPNOTSUPP; |
| } |
| |
| netdev_for_each_upper_dev_rcu(conduit, upper, iter) { |
| if (dsa_user_dev_check(upper)) |
| continue; |
| if (netif_is_bridge_master(upper)) |
| continue; |
| NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers"); |
| return -EOPNOTSUPP; |
| } |
| |
| /* Since we allow live-changing the DSA conduit, plus we auto-open the |
| * DSA conduit when the user port opens => we need to ensure that the |
| * new DSA conduit is open too. |
| */ |
| if (dev->flags & IFF_UP) { |
| err = dev_open(conduit, extack); |
| if (err) |
| return err; |
| } |
| |
| netdev_upper_dev_unlink(old_conduit, dev); |
| |
| err = netdev_upper_dev_link(conduit, dev, extack); |
| if (err) |
| goto out_revert_old_conduit_unlink; |
| |
| err = dsa_port_change_conduit(dp, conduit, extack); |
| if (err) |
| goto out_revert_conduit_link; |
| |
| /* Update the MTU of the new CPU port through cross-chip notifiers */ |
| err = dsa_user_change_mtu(dev, dev->mtu); |
| if (err && err != -EOPNOTSUPP) { |
| netdev_warn(dev, |
| "nonfatal error updating MTU with new conduit: %pe\n", |
| ERR_PTR(err)); |
| } |
| |
| return 0; |
| |
| out_revert_conduit_link: |
| netdev_upper_dev_unlink(conduit, dev); |
| out_revert_old_conduit_unlink: |
| netdev_upper_dev_link(old_conduit, dev, NULL); |
| return err; |
| } |
| |
| bool dsa_user_dev_check(const struct net_device *dev) |
| { |
| return dev->netdev_ops == &dsa_user_netdev_ops; |
| } |
| EXPORT_SYMBOL_GPL(dsa_user_dev_check); |
| |
| static int dsa_user_changeupper(struct net_device *dev, |
| struct netdev_notifier_changeupper_info *info) |
| { |
| struct netlink_ext_ack *extack; |
| int err = NOTIFY_DONE; |
| struct dsa_port *dp; |
| |
| if (!dsa_user_dev_check(dev)) |
| return err; |
| |
| dp = dsa_user_to_port(dev); |
| extack = netdev_notifier_info_to_extack(&info->info); |
| |
| if (netif_is_bridge_master(info->upper_dev)) { |
| if (info->linking) { |
| err = dsa_port_bridge_join(dp, info->upper_dev, extack); |
| if (!err) |
| dsa_bridge_mtu_normalization(dp); |
| if (err == -EOPNOTSUPP) { |
| NL_SET_ERR_MSG_WEAK_MOD(extack, |
| "Offloading not supported"); |
| err = 0; |
| } |
| err = notifier_from_errno(err); |
| } else { |
| dsa_port_bridge_leave(dp, info->upper_dev); |
| err = NOTIFY_OK; |
| } |
| } else if (netif_is_lag_master(info->upper_dev)) { |
| if (info->linking) { |
| err = dsa_port_lag_join(dp, info->upper_dev, |
| info->upper_info, extack); |
| if (err == -EOPNOTSUPP) { |
| NL_SET_ERR_MSG_WEAK_MOD(extack, |
| "Offloading not supported"); |
| err = 0; |
| } |
| err = notifier_from_errno(err); |
| } else { |
| dsa_port_lag_leave(dp, info->upper_dev); |
| err = NOTIFY_OK; |
| } |
| } else if (is_hsr_master(info->upper_dev)) { |
| if (info->linking) { |
| err = dsa_port_hsr_join(dp, info->upper_dev, extack); |
| if (err == -EOPNOTSUPP) { |
| NL_SET_ERR_MSG_WEAK_MOD(extack, |
| "Offloading not supported"); |
| err = 0; |
| } |
| err = notifier_from_errno(err); |
| } else { |
| dsa_port_hsr_leave(dp, info->upper_dev); |
| err = NOTIFY_OK; |
| } |
| } |
| |
| return err; |
| } |
| |
| static int dsa_user_prechangeupper(struct net_device *dev, |
| struct netdev_notifier_changeupper_info *info) |
| { |
| struct dsa_port *dp; |
| |
| if (!dsa_user_dev_check(dev)) |
| return NOTIFY_DONE; |
| |
| dp = dsa_user_to_port(dev); |
| |
| if (netif_is_bridge_master(info->upper_dev) && !info->linking) |
| dsa_port_pre_bridge_leave(dp, info->upper_dev); |
| else if (netif_is_lag_master(info->upper_dev) && !info->linking) |
| dsa_port_pre_lag_leave(dp, info->upper_dev); |
| /* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot |
| * meaningfully placed under a bridge yet |
| */ |
| |
| return NOTIFY_DONE; |
| } |
| |
| static int |
| dsa_user_lag_changeupper(struct net_device *dev, |
| struct netdev_notifier_changeupper_info *info) |
| { |
| struct net_device *lower; |
| struct list_head *iter; |
| int err = NOTIFY_DONE; |
| struct dsa_port *dp; |
| |
| if (!netif_is_lag_master(dev)) |
| return err; |
| |
| netdev_for_each_lower_dev(dev, lower, iter) { |
| if (!dsa_user_dev_check(lower)) |
| continue; |
| |
| dp = dsa_user_to_port(lower); |
| if (!dp->lag) |
| /* Software LAG */ |
| continue; |
| |
| err = dsa_user_changeupper(lower, info); |
| if (notifier_to_errno(err)) |
| break; |
| } |
| |
| return err; |
| } |
| |
| /* Same as dsa_user_lag_changeupper() except that it calls |
| * dsa_user_prechangeupper() |
| */ |
| static int |
| dsa_user_lag_prechangeupper(struct net_device *dev, |
| struct netdev_notifier_changeupper_info *info) |
| { |
| struct net_device *lower; |
| struct list_head *iter; |
| int err = NOTIFY_DONE; |
| struct dsa_port *dp; |
| |
| if (!netif_is_lag_master(dev)) |
| return err; |
| |
| netdev_for_each_lower_dev(dev, lower, iter) { |
| if (!dsa_user_dev_check(lower)) |
| continue; |
| |
| dp = dsa_user_to_port(lower); |
| if (!dp->lag) |
| /* Software LAG */ |
| continue; |
| |
| err = dsa_user_prechangeupper(lower, info); |
| if (notifier_to_errno(err)) |
| break; |
| } |
| |
| return err; |
| } |
| |
| static int |
| dsa_prevent_bridging_8021q_upper(struct net_device *dev, |
| struct netdev_notifier_changeupper_info *info) |
| { |
| struct netlink_ext_ack *ext_ack; |
| struct net_device *user, *br; |
| struct dsa_port *dp; |
| |
| ext_ack = netdev_notifier_info_to_extack(&info->info); |
| |
| if (!is_vlan_dev(dev)) |
| return NOTIFY_DONE; |
| |
| user = vlan_dev_real_dev(dev); |
| if (!dsa_user_dev_check(user)) |
| return NOTIFY_DONE; |
| |
| dp = dsa_user_to_port(user); |
| br = dsa_port_bridge_dev_get(dp); |
| if (!br) |
| return NOTIFY_DONE; |
| |
| /* Deny enslaving a VLAN device into a VLAN-aware bridge */ |
| if (br_vlan_enabled(br) && |
| netif_is_bridge_master(info->upper_dev) && info->linking) { |
| NL_SET_ERR_MSG_MOD(ext_ack, |
| "Cannot make VLAN device join VLAN-aware bridge"); |
| return notifier_from_errno(-EINVAL); |
| } |
| |
| return NOTIFY_DONE; |
| } |
| |
| static int |
| dsa_user_check_8021q_upper(struct net_device *dev, |
| struct netdev_notifier_changeupper_info *info) |
| { |
| struct dsa_port *dp = dsa_user_to_port(
|