mirror of
https://github.com/torvalds/linux.git
synced 2024-11-22 12:11:40 +00:00
8c924369cb
In case of a tc mirred action from one switch to another, the behavior
is not correct. We simply tell the source switch driver to program a
mirroring entry towards mirror->to_local_port = to_dp->index, but it is
not even guaranteed that the to_dp belongs to the same switch as dp.
For proper cross-chip support, we would need to go through the
cross-chip notifier layer in switch.c, program the entry on cascade
ports, and introduce new, explicit API for cross-chip mirroring, given
that intermediary switches should have introspection into the DSA tags
passed through the cascade port (and not just program a port mirror on
the entire cascade port). None of that exists today.
Reject what is not implemented so that user space is not misled into
thinking it works.
Fixes: f50f212749
("net: dsa: Add plumbing for port mirroring")
Signed-off-by: Vladimir Oltean <vladimir.oltean@nxp.com>
Reviewed-by: Andrew Lunn <andrew@lunn.ch>
Link: https://patch.msgid.link/20241008094320.3340980-1-vladimir.oltean@nxp.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
3808 lines
93 KiB
C
3808 lines
93 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* net/dsa/user.c - user device handling
|
|
* Copyright (c) 2008-2009 Marvell Semiconductor
|
|
*/
|
|
|
|
#include <linux/list.h>
|
|
#include <linux/etherdevice.h>
|
|
#include <linux/netdevice.h>
|
|
#include <linux/phy.h>
|
|
#include <linux/phy_fixed.h>
|
|
#include <linux/phylink.h>
|
|
#include <linux/of_net.h>
|
|
#include <linux/of_mdio.h>
|
|
#include <linux/mdio.h>
|
|
#include <net/rtnetlink.h>
|
|
#include <net/pkt_cls.h>
|
|
#include <net/selftests.h>
|
|
#include <net/tc_act/tc_mirred.h>
|
|
#include <linux/if_bridge.h>
|
|
#include <linux/if_hsr.h>
|
|
#include <net/dcbnl.h>
|
|
#include <linux/netpoll.h>
|
|
#include <linux/string.h>
|
|
|
|
#include "conduit.h"
|
|
#include "dsa.h"
|
|
#include "netlink.h"
|
|
#include "port.h"
|
|
#include "switch.h"
|
|
#include "tag.h"
|
|
#include "user.h"
|
|
|
|
struct dsa_switchdev_event_work {
|
|
struct net_device *dev;
|
|
struct net_device *orig_dev;
|
|
struct work_struct work;
|
|
unsigned long event;
|
|
/* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and
|
|
* SWITCHDEV_FDB_DEL_TO_DEVICE
|
|
*/
|
|
unsigned char addr[ETH_ALEN];
|
|
u16 vid;
|
|
bool host_addr;
|
|
};
|
|
|
|
enum dsa_standalone_event {
|
|
DSA_UC_ADD,
|
|
DSA_UC_DEL,
|
|
DSA_MC_ADD,
|
|
DSA_MC_DEL,
|
|
};
|
|
|
|
struct dsa_standalone_event_work {
|
|
struct work_struct work;
|
|
struct net_device *dev;
|
|
enum dsa_standalone_event event;
|
|
unsigned char addr[ETH_ALEN];
|
|
u16 vid;
|
|
};
|
|
|
|
struct dsa_host_vlan_rx_filtering_ctx {
|
|
struct net_device *dev;
|
|
const unsigned char *addr;
|
|
enum dsa_standalone_event event;
|
|
};
|
|
|
|
static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds)
|
|
{
|
|
return ds->ops->port_fdb_add && ds->ops->port_fdb_del &&
|
|
ds->fdb_isolation && !ds->vlan_filtering_is_global &&
|
|
!ds->needs_standalone_vlan_filtering;
|
|
}
|
|
|
|
static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds)
|
|
{
|
|
return ds->ops->port_mdb_add && ds->ops->port_mdb_del &&
|
|
ds->fdb_isolation && !ds->vlan_filtering_is_global &&
|
|
!ds->needs_standalone_vlan_filtering;
|
|
}
|
|
|
|
static void dsa_user_standalone_event_work(struct work_struct *work)
|
|
{
|
|
struct dsa_standalone_event_work *standalone_work =
|
|
container_of(work, struct dsa_standalone_event_work, work);
|
|
const unsigned char *addr = standalone_work->addr;
|
|
struct net_device *dev = standalone_work->dev;
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_mdb mdb;
|
|
struct dsa_switch *ds = dp->ds;
|
|
u16 vid = standalone_work->vid;
|
|
int err;
|
|
|
|
switch (standalone_work->event) {
|
|
case DSA_UC_ADD:
|
|
err = dsa_port_standalone_host_fdb_add(dp, addr, vid);
|
|
if (err) {
|
|
dev_err(ds->dev,
|
|
"port %d failed to add %pM vid %d to fdb: %d\n",
|
|
dp->index, addr, vid, err);
|
|
break;
|
|
}
|
|
break;
|
|
|
|
case DSA_UC_DEL:
|
|
err = dsa_port_standalone_host_fdb_del(dp, addr, vid);
|
|
if (err) {
|
|
dev_err(ds->dev,
|
|
"port %d failed to delete %pM vid %d from fdb: %d\n",
|
|
dp->index, addr, vid, err);
|
|
}
|
|
|
|
break;
|
|
case DSA_MC_ADD:
|
|
ether_addr_copy(mdb.addr, addr);
|
|
mdb.vid = vid;
|
|
|
|
err = dsa_port_standalone_host_mdb_add(dp, &mdb);
|
|
if (err) {
|
|
dev_err(ds->dev,
|
|
"port %d failed to add %pM vid %d to mdb: %d\n",
|
|
dp->index, addr, vid, err);
|
|
break;
|
|
}
|
|
break;
|
|
case DSA_MC_DEL:
|
|
ether_addr_copy(mdb.addr, addr);
|
|
mdb.vid = vid;
|
|
|
|
err = dsa_port_standalone_host_mdb_del(dp, &mdb);
|
|
if (err) {
|
|
dev_err(ds->dev,
|
|
"port %d failed to delete %pM vid %d from mdb: %d\n",
|
|
dp->index, addr, vid, err);
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
kfree(standalone_work);
|
|
}
|
|
|
|
static int dsa_user_schedule_standalone_work(struct net_device *dev,
|
|
enum dsa_standalone_event event,
|
|
const unsigned char *addr,
|
|
u16 vid)
|
|
{
|
|
struct dsa_standalone_event_work *standalone_work;
|
|
|
|
standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC);
|
|
if (!standalone_work)
|
|
return -ENOMEM;
|
|
|
|
INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work);
|
|
standalone_work->event = event;
|
|
standalone_work->dev = dev;
|
|
|
|
ether_addr_copy(standalone_work->addr, addr);
|
|
standalone_work->vid = vid;
|
|
|
|
dsa_schedule_work(&standalone_work->work);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dsa_user_host_vlan_rx_filtering(void *arg, int vid)
|
|
{
|
|
struct dsa_host_vlan_rx_filtering_ctx *ctx = arg;
|
|
|
|
return dsa_user_schedule_standalone_work(ctx->dev, ctx->event,
|
|
ctx->addr, vid);
|
|
}
|
|
|
|
static int dsa_user_vlan_for_each(struct net_device *dev,
|
|
int (*cb)(void *arg, int vid), void *arg)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_vlan *v;
|
|
int err;
|
|
|
|
lockdep_assert_held(&dev->addr_list_lock);
|
|
|
|
err = cb(arg, 0);
|
|
if (err)
|
|
return err;
|
|
|
|
list_for_each_entry(v, &dp->user_vlans, list) {
|
|
err = cb(arg, v->vid);
|
|
if (err)
|
|
return err;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dsa_user_sync_uc(struct net_device *dev,
|
|
const unsigned char *addr)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_host_vlan_rx_filtering_ctx ctx = {
|
|
.dev = dev,
|
|
.addr = addr,
|
|
.event = DSA_UC_ADD,
|
|
};
|
|
|
|
dev_uc_add(conduit, addr);
|
|
|
|
if (!dsa_switch_supports_uc_filtering(dp->ds))
|
|
return 0;
|
|
|
|
return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
|
|
&ctx);
|
|
}
|
|
|
|
static int dsa_user_unsync_uc(struct net_device *dev,
|
|
const unsigned char *addr)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_host_vlan_rx_filtering_ctx ctx = {
|
|
.dev = dev,
|
|
.addr = addr,
|
|
.event = DSA_UC_DEL,
|
|
};
|
|
|
|
dev_uc_del(conduit, addr);
|
|
|
|
if (!dsa_switch_supports_uc_filtering(dp->ds))
|
|
return 0;
|
|
|
|
return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
|
|
&ctx);
|
|
}
|
|
|
|
static int dsa_user_sync_mc(struct net_device *dev,
|
|
const unsigned char *addr)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_host_vlan_rx_filtering_ctx ctx = {
|
|
.dev = dev,
|
|
.addr = addr,
|
|
.event = DSA_MC_ADD,
|
|
};
|
|
|
|
dev_mc_add(conduit, addr);
|
|
|
|
if (!dsa_switch_supports_mc_filtering(dp->ds))
|
|
return 0;
|
|
|
|
return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
|
|
&ctx);
|
|
}
|
|
|
|
static int dsa_user_unsync_mc(struct net_device *dev,
|
|
const unsigned char *addr)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_host_vlan_rx_filtering_ctx ctx = {
|
|
.dev = dev,
|
|
.addr = addr,
|
|
.event = DSA_MC_DEL,
|
|
};
|
|
|
|
dev_mc_del(conduit, addr);
|
|
|
|
if (!dsa_switch_supports_mc_filtering(dp->ds))
|
|
return 0;
|
|
|
|
return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
|
|
&ctx);
|
|
}
|
|
|
|
void dsa_user_sync_ha(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct netdev_hw_addr *ha;
|
|
|
|
netif_addr_lock_bh(dev);
|
|
|
|
netdev_for_each_synced_mc_addr(ha, dev)
|
|
dsa_user_sync_mc(dev, ha->addr);
|
|
|
|
netdev_for_each_synced_uc_addr(ha, dev)
|
|
dsa_user_sync_uc(dev, ha->addr);
|
|
|
|
netif_addr_unlock_bh(dev);
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds) ||
|
|
dsa_switch_supports_mc_filtering(ds))
|
|
dsa_flush_workqueue();
|
|
}
|
|
|
|
void dsa_user_unsync_ha(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct netdev_hw_addr *ha;
|
|
|
|
netif_addr_lock_bh(dev);
|
|
|
|
netdev_for_each_synced_uc_addr(ha, dev)
|
|
dsa_user_unsync_uc(dev, ha->addr);
|
|
|
|
netdev_for_each_synced_mc_addr(ha, dev)
|
|
dsa_user_unsync_mc(dev, ha->addr);
|
|
|
|
netif_addr_unlock_bh(dev);
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds) ||
|
|
dsa_switch_supports_mc_filtering(ds))
|
|
dsa_flush_workqueue();
|
|
}
|
|
|
|
/* user mii_bus handling ***************************************************/
|
|
static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg)
|
|
{
|
|
struct dsa_switch *ds = bus->priv;
|
|
|
|
if (ds->phys_mii_mask & (1 << addr))
|
|
return ds->ops->phy_read(ds, addr, reg);
|
|
|
|
return 0xffff;
|
|
}
|
|
|
|
static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val)
|
|
{
|
|
struct dsa_switch *ds = bus->priv;
|
|
|
|
if (ds->phys_mii_mask & (1 << addr))
|
|
return ds->ops->phy_write(ds, addr, reg, val);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void dsa_user_mii_bus_init(struct dsa_switch *ds)
|
|
{
|
|
ds->user_mii_bus->priv = (void *)ds;
|
|
ds->user_mii_bus->name = "dsa user smi";
|
|
ds->user_mii_bus->read = dsa_user_phy_read;
|
|
ds->user_mii_bus->write = dsa_user_phy_write;
|
|
snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d",
|
|
ds->dst->index, ds->index);
|
|
ds->user_mii_bus->parent = ds->dev;
|
|
ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask;
|
|
}
|
|
|
|
|
|
/* user device handling ****************************************************/
|
|
static int dsa_user_get_iflink(const struct net_device *dev)
|
|
{
|
|
return READ_ONCE(dsa_user_to_conduit(dev)->ifindex);
|
|
}
|
|
|
|
int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int err;
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds)) {
|
|
err = dsa_port_standalone_host_fdb_add(dp, addr, 0);
|
|
if (err)
|
|
goto out;
|
|
}
|
|
|
|
if (!ether_addr_equal(addr, conduit->dev_addr)) {
|
|
err = dev_uc_add(conduit, addr);
|
|
if (err < 0)
|
|
goto del_host_addr;
|
|
}
|
|
|
|
return 0;
|
|
|
|
del_host_addr:
|
|
if (dsa_switch_supports_uc_filtering(ds))
|
|
dsa_port_standalone_host_fdb_del(dp, addr, 0);
|
|
out:
|
|
return err;
|
|
}
|
|
|
|
void dsa_user_host_uc_uninstall(struct net_device *dev)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr))
|
|
dev_uc_del(conduit, dev->dev_addr);
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds))
|
|
dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0);
|
|
}
|
|
|
|
static int dsa_user_open(struct net_device *dev)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
int err;
|
|
|
|
err = dev_open(conduit, NULL);
|
|
if (err < 0) {
|
|
netdev_err(dev, "failed to open conduit %s\n", conduit->name);
|
|
goto out;
|
|
}
|
|
|
|
err = dsa_user_host_uc_install(dev, dev->dev_addr);
|
|
if (err)
|
|
goto out;
|
|
|
|
err = dsa_port_enable_rt(dp, dev->phydev);
|
|
if (err)
|
|
goto out_del_host_uc;
|
|
|
|
return 0;
|
|
|
|
out_del_host_uc:
|
|
dsa_user_host_uc_uninstall(dev);
|
|
out:
|
|
return err;
|
|
}
|
|
|
|
static int dsa_user_close(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
|
|
dsa_port_disable_rt(dp);
|
|
|
|
dsa_user_host_uc_uninstall(dev);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void dsa_user_manage_host_flood(struct net_device *dev)
|
|
{
|
|
bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
bool uc = dev->flags & IFF_PROMISC;
|
|
|
|
dsa_port_set_host_flood(dp, uc, mc);
|
|
}
|
|
|
|
static void dsa_user_change_rx_flags(struct net_device *dev, int change)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (change & IFF_ALLMULTI)
|
|
dev_set_allmulti(conduit,
|
|
dev->flags & IFF_ALLMULTI ? 1 : -1);
|
|
if (change & IFF_PROMISC)
|
|
dev_set_promiscuity(conduit,
|
|
dev->flags & IFF_PROMISC ? 1 : -1);
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds) &&
|
|
dsa_switch_supports_mc_filtering(ds))
|
|
dsa_user_manage_host_flood(dev);
|
|
}
|
|
|
|
static void dsa_user_set_rx_mode(struct net_device *dev)
|
|
{
|
|
__dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc);
|
|
__dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc);
|
|
}
|
|
|
|
static int dsa_user_set_mac_address(struct net_device *dev, void *a)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct sockaddr *addr = a;
|
|
int err;
|
|
|
|
if (!is_valid_ether_addr(addr->sa_data))
|
|
return -EADDRNOTAVAIL;
|
|
|
|
if (ds->ops->port_set_mac_address) {
|
|
err = ds->ops->port_set_mac_address(ds, dp->index,
|
|
addr->sa_data);
|
|
if (err)
|
|
return err;
|
|
}
|
|
|
|
/* If the port is down, the address isn't synced yet to hardware or
|
|
* to the DSA conduit, so there is nothing to change.
|
|
*/
|
|
if (!(dev->flags & IFF_UP))
|
|
goto out_change_dev_addr;
|
|
|
|
err = dsa_user_host_uc_install(dev, addr->sa_data);
|
|
if (err)
|
|
return err;
|
|
|
|
dsa_user_host_uc_uninstall(dev);
|
|
|
|
out_change_dev_addr:
|
|
eth_hw_addr_set(dev, addr->sa_data);
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct dsa_user_dump_ctx {
|
|
struct net_device *dev;
|
|
struct sk_buff *skb;
|
|
struct netlink_callback *cb;
|
|
int idx;
|
|
};
|
|
|
|
static int
|
|
dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid,
|
|
bool is_static, void *data)
|
|
{
|
|
struct dsa_user_dump_ctx *dump = data;
|
|
u32 portid = NETLINK_CB(dump->cb->skb).portid;
|
|
u32 seq = dump->cb->nlh->nlmsg_seq;
|
|
struct nlmsghdr *nlh;
|
|
struct ndmsg *ndm;
|
|
|
|
if (dump->idx < dump->cb->args[2])
|
|
goto skip;
|
|
|
|
nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH,
|
|
sizeof(*ndm), NLM_F_MULTI);
|
|
if (!nlh)
|
|
return -EMSGSIZE;
|
|
|
|
ndm = nlmsg_data(nlh);
|
|
ndm->ndm_family = AF_BRIDGE;
|
|
ndm->ndm_pad1 = 0;
|
|
ndm->ndm_pad2 = 0;
|
|
ndm->ndm_flags = NTF_SELF;
|
|
ndm->ndm_type = 0;
|
|
ndm->ndm_ifindex = dump->dev->ifindex;
|
|
ndm->ndm_state = is_static ? NUD_NOARP : NUD_REACHABLE;
|
|
|
|
if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr))
|
|
goto nla_put_failure;
|
|
|
|
if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid))
|
|
goto nla_put_failure;
|
|
|
|
nlmsg_end(dump->skb, nlh);
|
|
|
|
skip:
|
|
dump->idx++;
|
|
return 0;
|
|
|
|
nla_put_failure:
|
|
nlmsg_cancel(dump->skb, nlh);
|
|
return -EMSGSIZE;
|
|
}
|
|
|
|
static int
|
|
dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb,
|
|
struct net_device *dev, struct net_device *filter_dev,
|
|
int *idx)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_user_dump_ctx dump = {
|
|
.dev = dev,
|
|
.skb = skb,
|
|
.cb = cb,
|
|
.idx = *idx,
|
|
};
|
|
int err;
|
|
|
|
err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump);
|
|
*idx = dump.idx;
|
|
|
|
return err;
|
|
}
|
|
|
|
static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
|
|
{
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct dsa_switch *ds = p->dp->ds;
|
|
int port = p->dp->index;
|
|
|
|
/* Pass through to switch driver if it supports timestamping */
|
|
switch (cmd) {
|
|
case SIOCGHWTSTAMP:
|
|
if (ds->ops->port_hwtstamp_get)
|
|
return ds->ops->port_hwtstamp_get(ds, port, ifr);
|
|
break;
|
|
case SIOCSHWTSTAMP:
|
|
if (ds->ops->port_hwtstamp_set)
|
|
return ds->ops->port_hwtstamp_set(ds, port, ifr);
|
|
break;
|
|
}
|
|
|
|
return phylink_mii_ioctl(p->dp->pl, ifr, cmd);
|
|
}
|
|
|
|
static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx,
|
|
const struct switchdev_attr *attr,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
int ret;
|
|
|
|
if (ctx && ctx != dp)
|
|
return 0;
|
|
|
|
switch (attr->id) {
|
|
case SWITCHDEV_ATTR_ID_PORT_STP_STATE:
|
|
if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_set_state(dp, attr->u.stp_state, true);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_PORT_MST_STATE:
|
|
if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING:
|
|
if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering,
|
|
extack);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME:
|
|
if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_ageing_time(dp, attr->u.ageing_time);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_BRIDGE_MST:
|
|
if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_mst_enable(dp, attr->u.mst, extack);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS:
|
|
if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags,
|
|
extack);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS:
|
|
if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack);
|
|
break;
|
|
case SWITCHDEV_ATTR_ID_VLAN_MSTI:
|
|
if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti);
|
|
break;
|
|
default:
|
|
ret = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Must be called under rcu_read_lock() */
|
|
static int
|
|
dsa_user_vlan_check_for_8021q_uppers(struct net_device *user,
|
|
const struct switchdev_obj_port_vlan *vlan)
|
|
{
|
|
struct net_device *upper_dev;
|
|
struct list_head *iter;
|
|
|
|
netdev_for_each_upper_dev_rcu(user, upper_dev, iter) {
|
|
u16 vid;
|
|
|
|
if (!is_vlan_dev(upper_dev))
|
|
continue;
|
|
|
|
vid = vlan_dev_vlan_id(upper_dev);
|
|
if (vid == vlan->vid)
|
|
return -EBUSY;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dsa_user_vlan_add(struct net_device *dev,
|
|
const struct switchdev_obj *obj,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_vlan *vlan;
|
|
int err;
|
|
|
|
if (dsa_port_skip_vlan_configuration(dp)) {
|
|
NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN");
|
|
return 0;
|
|
}
|
|
|
|
vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
|
|
|
|
/* Deny adding a bridge VLAN when there is already an 802.1Q upper with
|
|
* the same VID.
|
|
*/
|
|
if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) {
|
|
rcu_read_lock();
|
|
err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan);
|
|
rcu_read_unlock();
|
|
if (err) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Port already has a VLAN upper with this VID");
|
|
return err;
|
|
}
|
|
}
|
|
|
|
return dsa_port_vlan_add(dp, vlan, extack);
|
|
}
|
|
|
|
/* Offload a VLAN installed on the bridge or on a foreign interface by
|
|
* installing it as a VLAN towards the CPU port.
|
|
*/
|
|
static int dsa_user_host_vlan_add(struct net_device *dev,
|
|
const struct switchdev_obj *obj,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_vlan vlan;
|
|
|
|
/* Do nothing if this is a software bridge */
|
|
if (!dp->bridge)
|
|
return -EOPNOTSUPP;
|
|
|
|
if (dsa_port_skip_vlan_configuration(dp)) {
|
|
NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN");
|
|
return 0;
|
|
}
|
|
|
|
vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj);
|
|
|
|
/* Even though drivers often handle CPU membership in special ways,
|
|
* it doesn't make sense to program a PVID, so clear this flag.
|
|
*/
|
|
vlan.flags &= ~BRIDGE_VLAN_INFO_PVID;
|
|
|
|
return dsa_port_host_vlan_add(dp, &vlan, extack);
|
|
}
|
|
|
|
static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx,
|
|
const struct switchdev_obj *obj,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
int err;
|
|
|
|
if (ctx && ctx != dp)
|
|
return 0;
|
|
|
|
switch (obj->id) {
|
|
case SWITCHDEV_OBJ_ID_PORT_MDB:
|
|
if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_HOST_MDB:
|
|
if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_PORT_VLAN:
|
|
if (dsa_port_offloads_bridge_port(dp, obj->orig_dev))
|
|
err = dsa_user_vlan_add(dev, obj, extack);
|
|
else
|
|
err = dsa_user_host_vlan_add(dev, obj, extack);
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_MRP:
|
|
if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj));
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_RING_ROLE_MRP:
|
|
if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_mrp_add_ring_role(dp,
|
|
SWITCHDEV_OBJ_RING_ROLE_MRP(obj));
|
|
break;
|
|
default:
|
|
err = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int dsa_user_vlan_del(struct net_device *dev,
|
|
const struct switchdev_obj *obj)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_vlan *vlan;
|
|
|
|
if (dsa_port_skip_vlan_configuration(dp))
|
|
return 0;
|
|
|
|
vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
|
|
|
|
return dsa_port_vlan_del(dp, vlan);
|
|
}
|
|
|
|
static int dsa_user_host_vlan_del(struct net_device *dev,
|
|
const struct switchdev_obj *obj)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_vlan *vlan;
|
|
|
|
/* Do nothing if this is a software bridge */
|
|
if (!dp->bridge)
|
|
return -EOPNOTSUPP;
|
|
|
|
if (dsa_port_skip_vlan_configuration(dp))
|
|
return 0;
|
|
|
|
vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
|
|
|
|
return dsa_port_host_vlan_del(dp, vlan);
|
|
}
|
|
|
|
static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx,
|
|
const struct switchdev_obj *obj)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
int err;
|
|
|
|
if (ctx && ctx != dp)
|
|
return 0;
|
|
|
|
switch (obj->id) {
|
|
case SWITCHDEV_OBJ_ID_PORT_MDB:
|
|
if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_HOST_MDB:
|
|
if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_PORT_VLAN:
|
|
if (dsa_port_offloads_bridge_port(dp, obj->orig_dev))
|
|
err = dsa_user_vlan_del(dev, obj);
|
|
else
|
|
err = dsa_user_host_vlan_del(dev, obj);
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_MRP:
|
|
if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj));
|
|
break;
|
|
case SWITCHDEV_OBJ_ID_RING_ROLE_MRP:
|
|
if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dsa_port_mrp_del_ring_role(dp,
|
|
SWITCHDEV_OBJ_RING_ROLE_MRP(obj));
|
|
break;
|
|
default:
|
|
err = -EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev,
|
|
struct sk_buff *skb)
|
|
{
|
|
#ifdef CONFIG_NET_POLL_CONTROLLER
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
|
|
return netpoll_send_skb(p->netpoll, skb);
|
|
#else
|
|
BUG();
|
|
return NETDEV_TX_OK;
|
|
#endif
|
|
}
|
|
|
|
static void dsa_skb_tx_timestamp(struct dsa_user_priv *p,
|
|
struct sk_buff *skb)
|
|
{
|
|
struct dsa_switch *ds = p->dp->ds;
|
|
|
|
if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP))
|
|
return;
|
|
|
|
if (!ds->ops->port_txtstamp)
|
|
return;
|
|
|
|
ds->ops->port_txtstamp(ds, p->dp->index, skb);
|
|
}
|
|
|
|
netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev)
|
|
{
|
|
/* SKB for netpoll still need to be mangled with the protocol-specific
|
|
* tag to be successfully transmitted
|
|
*/
|
|
if (unlikely(netpoll_tx_running(dev)))
|
|
return dsa_user_netpoll_send_skb(dev, skb);
|
|
|
|
/* Queue the SKB for transmission on the parent interface, but
|
|
* do not modify its EtherType
|
|
*/
|
|
skb->dev = dsa_user_to_conduit(dev);
|
|
dev_queue_xmit(skb);
|
|
|
|
return NETDEV_TX_OK;
|
|
}
|
|
EXPORT_SYMBOL_GPL(dsa_enqueue_skb);
|
|
|
|
static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev)
|
|
{
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct sk_buff *nskb;
|
|
|
|
dev_sw_netstats_tx_add(dev, 1, skb->len);
|
|
|
|
memset(skb->cb, 0, sizeof(skb->cb));
|
|
|
|
/* Handle tx timestamp if any */
|
|
dsa_skb_tx_timestamp(p, skb);
|
|
|
|
if (skb_ensure_writable_head_tail(skb, dev)) {
|
|
dev_kfree_skb_any(skb);
|
|
return NETDEV_TX_OK;
|
|
}
|
|
|
|
/* needed_tailroom should still be 'warm' in the cache line from
|
|
* skb_ensure_writable_head_tail(), which has also ensured that
|
|
* padding is safe.
|
|
*/
|
|
if (dev->needed_tailroom)
|
|
eth_skb_pad(skb);
|
|
|
|
/* Transmit function may have to reallocate the original SKB,
|
|
* in which case it must have freed it. Only free it here on error.
|
|
*/
|
|
nskb = p->xmit(skb, dev);
|
|
if (!nskb) {
|
|
kfree_skb(skb);
|
|
return NETDEV_TX_OK;
|
|
}
|
|
|
|
return dsa_enqueue_skb(nskb, dev);
|
|
}
|
|
|
|
/* ethtool operations *******************************************************/
|
|
|
|
static void dsa_user_get_drvinfo(struct net_device *dev,
|
|
struct ethtool_drvinfo *drvinfo)
|
|
{
|
|
strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver));
|
|
strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version));
|
|
strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info));
|
|
}
|
|
|
|
static int dsa_user_get_regs_len(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_regs_len)
|
|
return ds->ops->get_regs_len(ds, dp->index);
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static void
|
|
dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_regs)
|
|
ds->ops->get_regs(ds, dp->index, regs, _p);
|
|
}
|
|
|
|
static int dsa_user_nway_reset(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
|
|
return phylink_ethtool_nway_reset(dp->pl);
|
|
}
|
|
|
|
static int dsa_user_get_eeprom_len(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->cd && ds->cd->eeprom_len)
|
|
return ds->cd->eeprom_len;
|
|
|
|
if (ds->ops->get_eeprom_len)
|
|
return ds->ops->get_eeprom_len(ds);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dsa_user_get_eeprom(struct net_device *dev,
|
|
struct ethtool_eeprom *eeprom, u8 *data)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_eeprom)
|
|
return ds->ops->get_eeprom(ds, eeprom, data);
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static int dsa_user_set_eeprom(struct net_device *dev,
|
|
struct ethtool_eeprom *eeprom, u8 *data)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->set_eeprom)
|
|
return ds->ops->set_eeprom(ds, eeprom, data);
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static void dsa_user_get_strings(struct net_device *dev,
|
|
uint32_t stringset, uint8_t *data)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (stringset == ETH_SS_STATS) {
|
|
int len = ETH_GSTRING_LEN;
|
|
|
|
strscpy_pad(data, "tx_packets", len);
|
|
strscpy_pad(data + len, "tx_bytes", len);
|
|
strscpy_pad(data + 2 * len, "rx_packets", len);
|
|
strscpy_pad(data + 3 * len, "rx_bytes", len);
|
|
if (ds->ops->get_strings)
|
|
ds->ops->get_strings(ds, dp->index, stringset,
|
|
data + 4 * len);
|
|
} else if (stringset == ETH_SS_TEST) {
|
|
net_selftest_get_strings(data);
|
|
}
|
|
|
|
}
|
|
|
|
static void dsa_user_get_ethtool_stats(struct net_device *dev,
|
|
struct ethtool_stats *stats,
|
|
uint64_t *data)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct pcpu_sw_netstats *s;
|
|
unsigned int start;
|
|
int i;
|
|
|
|
for_each_possible_cpu(i) {
|
|
u64 tx_packets, tx_bytes, rx_packets, rx_bytes;
|
|
|
|
s = per_cpu_ptr(dev->tstats, i);
|
|
do {
|
|
start = u64_stats_fetch_begin(&s->syncp);
|
|
tx_packets = u64_stats_read(&s->tx_packets);
|
|
tx_bytes = u64_stats_read(&s->tx_bytes);
|
|
rx_packets = u64_stats_read(&s->rx_packets);
|
|
rx_bytes = u64_stats_read(&s->rx_bytes);
|
|
} while (u64_stats_fetch_retry(&s->syncp, start));
|
|
data[0] += tx_packets;
|
|
data[1] += tx_bytes;
|
|
data[2] += rx_packets;
|
|
data[3] += rx_bytes;
|
|
}
|
|
if (ds->ops->get_ethtool_stats)
|
|
ds->ops->get_ethtool_stats(ds, dp->index, data + 4);
|
|
}
|
|
|
|
static int dsa_user_get_sset_count(struct net_device *dev, int sset)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (sset == ETH_SS_STATS) {
|
|
int count = 0;
|
|
|
|
if (ds->ops->get_sset_count) {
|
|
count = ds->ops->get_sset_count(ds, dp->index, sset);
|
|
if (count < 0)
|
|
return count;
|
|
}
|
|
|
|
return count + 4;
|
|
} else if (sset == ETH_SS_TEST) {
|
|
return net_selftest_get_count();
|
|
}
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static void dsa_user_get_eth_phy_stats(struct net_device *dev,
|
|
struct ethtool_eth_phy_stats *phy_stats)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_eth_phy_stats)
|
|
ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats);
|
|
}
|
|
|
|
static void dsa_user_get_eth_mac_stats(struct net_device *dev,
|
|
struct ethtool_eth_mac_stats *mac_stats)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_eth_mac_stats)
|
|
ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats);
|
|
}
|
|
|
|
static void
|
|
dsa_user_get_eth_ctrl_stats(struct net_device *dev,
|
|
struct ethtool_eth_ctrl_stats *ctrl_stats)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_eth_ctrl_stats)
|
|
ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats);
|
|
}
|
|
|
|
static void
|
|
dsa_user_get_rmon_stats(struct net_device *dev,
|
|
struct ethtool_rmon_stats *rmon_stats,
|
|
const struct ethtool_rmon_hist_range **ranges)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_rmon_stats)
|
|
ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges);
|
|
}
|
|
|
|
static void dsa_user_net_selftest(struct net_device *ndev,
|
|
struct ethtool_test *etest, u64 *buf)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(ndev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->self_test) {
|
|
ds->ops->self_test(ds, dp->index, etest, buf);
|
|
return;
|
|
}
|
|
|
|
net_selftest(ndev, etest, buf);
|
|
}
|
|
|
|
static int dsa_user_get_mm(struct net_device *dev,
|
|
struct ethtool_mm_state *state)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (!ds->ops->get_mm)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->get_mm(ds, dp->index, state);
|
|
}
|
|
|
|
static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (!ds->ops->set_mm)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->set_mm(ds, dp->index, cfg, extack);
|
|
}
|
|
|
|
static void dsa_user_get_mm_stats(struct net_device *dev,
|
|
struct ethtool_mm_stats *stats)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_mm_stats)
|
|
ds->ops->get_mm_stats(ds, dp->index, stats);
|
|
}
|
|
|
|
static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
phylink_ethtool_get_wol(dp->pl, w);
|
|
|
|
if (ds->ops->get_wol)
|
|
ds->ops->get_wol(ds, dp->index, w);
|
|
}
|
|
|
|
static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int ret = -EOPNOTSUPP;
|
|
|
|
phylink_ethtool_set_wol(dp->pl, w);
|
|
|
|
if (ds->ops->set_wol)
|
|
ret = ds->ops->set_wol(ds, dp->index, w);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int ret;
|
|
|
|
/* Port's PHY and MAC both need to be EEE capable */
|
|
if (!dev->phydev || !dp->pl)
|
|
return -ENODEV;
|
|
|
|
if (!ds->ops->set_mac_eee)
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = ds->ops->set_mac_eee(ds, dp->index, e);
|
|
if (ret)
|
|
return ret;
|
|
|
|
return phylink_ethtool_set_eee(dp->pl, e);
|
|
}
|
|
|
|
static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int ret;
|
|
|
|
/* Port's PHY and MAC both need to be EEE capable */
|
|
if (!dev->phydev || !dp->pl)
|
|
return -ENODEV;
|
|
|
|
if (!ds->ops->get_mac_eee)
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = ds->ops->get_mac_eee(ds, dp->index, e);
|
|
if (ret)
|
|
return ret;
|
|
|
|
return phylink_ethtool_get_eee(dp->pl, e);
|
|
}
|
|
|
|
static int dsa_user_get_link_ksettings(struct net_device *dev,
|
|
struct ethtool_link_ksettings *cmd)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
|
|
return phylink_ethtool_ksettings_get(dp->pl, cmd);
|
|
}
|
|
|
|
static int dsa_user_set_link_ksettings(struct net_device *dev,
|
|
const struct ethtool_link_ksettings *cmd)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
|
|
return phylink_ethtool_ksettings_set(dp->pl, cmd);
|
|
}
|
|
|
|
static void dsa_user_get_pause_stats(struct net_device *dev,
|
|
struct ethtool_pause_stats *pause_stats)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_pause_stats)
|
|
ds->ops->get_pause_stats(ds, dp->index, pause_stats);
|
|
}
|
|
|
|
static void dsa_user_get_pauseparam(struct net_device *dev,
|
|
struct ethtool_pauseparam *pause)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
|
|
phylink_ethtool_get_pauseparam(dp->pl, pause);
|
|
}
|
|
|
|
static int dsa_user_set_pauseparam(struct net_device *dev,
|
|
struct ethtool_pauseparam *pause)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
|
|
return phylink_ethtool_set_pauseparam(dp->pl, pause);
|
|
}
|
|
|
|
#ifdef CONFIG_NET_POLL_CONTROLLER
|
|
static int dsa_user_netpoll_setup(struct net_device *dev,
|
|
struct netpoll_info *ni)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct netpoll *netpoll;
|
|
int err = 0;
|
|
|
|
netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL);
|
|
if (!netpoll)
|
|
return -ENOMEM;
|
|
|
|
err = __netpoll_setup(netpoll, conduit);
|
|
if (err) {
|
|
kfree(netpoll);
|
|
goto out;
|
|
}
|
|
|
|
p->netpoll = netpoll;
|
|
out:
|
|
return err;
|
|
}
|
|
|
|
static void dsa_user_netpoll_cleanup(struct net_device *dev)
|
|
{
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct netpoll *netpoll = p->netpoll;
|
|
|
|
if (!netpoll)
|
|
return;
|
|
|
|
p->netpoll = NULL;
|
|
|
|
__netpoll_free(netpoll);
|
|
}
|
|
|
|
static void dsa_user_poll_controller(struct net_device *dev)
|
|
{
|
|
}
|
|
#endif
|
|
|
|
static struct dsa_mall_tc_entry *
|
|
dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie)
|
|
{
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct dsa_mall_tc_entry *mall_tc_entry;
|
|
|
|
list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list)
|
|
if (mall_tc_entry->cookie == cookie)
|
|
return mall_tc_entry;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static int
|
|
dsa_user_add_cls_matchall_mirred(struct net_device *dev,
|
|
struct tc_cls_matchall_offload *cls,
|
|
bool ingress)
|
|
{
|
|
struct netlink_ext_ack *extack = cls->common.extack;
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct dsa_mall_mirror_tc_entry *mirror;
|
|
struct dsa_mall_tc_entry *mall_tc_entry;
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct flow_action_entry *act;
|
|
struct dsa_port *to_dp;
|
|
int err;
|
|
|
|
if (!ds->ops->port_mirror_add)
|
|
return -EOPNOTSUPP;
|
|
|
|
if (!flow_action_basic_hw_stats_check(&cls->rule->action,
|
|
cls->common.extack))
|
|
return -EOPNOTSUPP;
|
|
|
|
act = &cls->rule->action.entries[0];
|
|
|
|
if (!act->dev)
|
|
return -EINVAL;
|
|
|
|
if (!dsa_user_dev_check(act->dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
to_dp = dsa_user_to_port(act->dev);
|
|
|
|
if (dp->ds != to_dp->ds) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Cross-chip mirroring not implemented");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL);
|
|
if (!mall_tc_entry)
|
|
return -ENOMEM;
|
|
|
|
mall_tc_entry->cookie = cls->cookie;
|
|
mall_tc_entry->type = DSA_PORT_MALL_MIRROR;
|
|
mirror = &mall_tc_entry->mirror;
|
|
mirror->to_local_port = to_dp->index;
|
|
mirror->ingress = ingress;
|
|
|
|
err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack);
|
|
if (err) {
|
|
kfree(mall_tc_entry);
|
|
return err;
|
|
}
|
|
|
|
list_add_tail(&mall_tc_entry->list, &p->mall_tc_list);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int
|
|
dsa_user_add_cls_matchall_police(struct net_device *dev,
|
|
struct tc_cls_matchall_offload *cls,
|
|
bool ingress)
|
|
{
|
|
struct netlink_ext_ack *extack = cls->common.extack;
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct dsa_mall_policer_tc_entry *policer;
|
|
struct dsa_mall_tc_entry *mall_tc_entry;
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct flow_action_entry *act;
|
|
int err;
|
|
|
|
if (!ds->ops->port_policer_add) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Policing offload not implemented");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
if (!ingress) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Only supported on ingress qdisc");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
if (!flow_action_basic_hw_stats_check(&cls->rule->action,
|
|
cls->common.extack))
|
|
return -EOPNOTSUPP;
|
|
|
|
list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) {
|
|
if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Only one port policer allowed");
|
|
return -EEXIST;
|
|
}
|
|
}
|
|
|
|
act = &cls->rule->action.entries[0];
|
|
|
|
mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL);
|
|
if (!mall_tc_entry)
|
|
return -ENOMEM;
|
|
|
|
mall_tc_entry->cookie = cls->cookie;
|
|
mall_tc_entry->type = DSA_PORT_MALL_POLICER;
|
|
policer = &mall_tc_entry->policer;
|
|
policer->rate_bytes_per_sec = act->police.rate_bytes_ps;
|
|
policer->burst = act->police.burst;
|
|
|
|
err = ds->ops->port_policer_add(ds, dp->index, policer);
|
|
if (err) {
|
|
kfree(mall_tc_entry);
|
|
return err;
|
|
}
|
|
|
|
list_add_tail(&mall_tc_entry->list, &p->mall_tc_list);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int dsa_user_add_cls_matchall(struct net_device *dev,
|
|
struct tc_cls_matchall_offload *cls,
|
|
bool ingress)
|
|
{
|
|
int err = -EOPNOTSUPP;
|
|
|
|
if (cls->common.protocol == htons(ETH_P_ALL) &&
|
|
flow_offload_has_one_action(&cls->rule->action) &&
|
|
cls->rule->action.entries[0].id == FLOW_ACTION_MIRRED)
|
|
err = dsa_user_add_cls_matchall_mirred(dev, cls, ingress);
|
|
else if (flow_offload_has_one_action(&cls->rule->action) &&
|
|
cls->rule->action.entries[0].id == FLOW_ACTION_POLICE)
|
|
err = dsa_user_add_cls_matchall_police(dev, cls, ingress);
|
|
|
|
return err;
|
|
}
|
|
|
|
static void dsa_user_del_cls_matchall(struct net_device *dev,
|
|
struct tc_cls_matchall_offload *cls)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_mall_tc_entry *mall_tc_entry;
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie);
|
|
if (!mall_tc_entry)
|
|
return;
|
|
|
|
list_del(&mall_tc_entry->list);
|
|
|
|
switch (mall_tc_entry->type) {
|
|
case DSA_PORT_MALL_MIRROR:
|
|
if (ds->ops->port_mirror_del)
|
|
ds->ops->port_mirror_del(ds, dp->index,
|
|
&mall_tc_entry->mirror);
|
|
break;
|
|
case DSA_PORT_MALL_POLICER:
|
|
if (ds->ops->port_policer_del)
|
|
ds->ops->port_policer_del(ds, dp->index);
|
|
break;
|
|
default:
|
|
WARN_ON(1);
|
|
}
|
|
|
|
kfree(mall_tc_entry);
|
|
}
|
|
|
|
static int dsa_user_setup_tc_cls_matchall(struct net_device *dev,
|
|
struct tc_cls_matchall_offload *cls,
|
|
bool ingress)
|
|
{
|
|
if (cls->common.chain_index)
|
|
return -EOPNOTSUPP;
|
|
|
|
switch (cls->command) {
|
|
case TC_CLSMATCHALL_REPLACE:
|
|
return dsa_user_add_cls_matchall(dev, cls, ingress);
|
|
case TC_CLSMATCHALL_DESTROY:
|
|
dsa_user_del_cls_matchall(dev, cls);
|
|
return 0;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
static int dsa_user_add_cls_flower(struct net_device *dev,
|
|
struct flow_cls_offload *cls,
|
|
bool ingress)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int port = dp->index;
|
|
|
|
if (!ds->ops->cls_flower_add)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->cls_flower_add(ds, port, cls, ingress);
|
|
}
|
|
|
|
static int dsa_user_del_cls_flower(struct net_device *dev,
|
|
struct flow_cls_offload *cls,
|
|
bool ingress)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int port = dp->index;
|
|
|
|
if (!ds->ops->cls_flower_del)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->cls_flower_del(ds, port, cls, ingress);
|
|
}
|
|
|
|
static int dsa_user_stats_cls_flower(struct net_device *dev,
|
|
struct flow_cls_offload *cls,
|
|
bool ingress)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int port = dp->index;
|
|
|
|
if (!ds->ops->cls_flower_stats)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->cls_flower_stats(ds, port, cls, ingress);
|
|
}
|
|
|
|
static int dsa_user_setup_tc_cls_flower(struct net_device *dev,
|
|
struct flow_cls_offload *cls,
|
|
bool ingress)
|
|
{
|
|
switch (cls->command) {
|
|
case FLOW_CLS_REPLACE:
|
|
return dsa_user_add_cls_flower(dev, cls, ingress);
|
|
case FLOW_CLS_DESTROY:
|
|
return dsa_user_del_cls_flower(dev, cls, ingress);
|
|
case FLOW_CLS_STATS:
|
|
return dsa_user_stats_cls_flower(dev, cls, ingress);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data,
|
|
void *cb_priv, bool ingress)
|
|
{
|
|
struct net_device *dev = cb_priv;
|
|
|
|
if (!tc_can_offload(dev))
|
|
return -EOPNOTSUPP;
|
|
|
|
switch (type) {
|
|
case TC_SETUP_CLSMATCHALL:
|
|
return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress);
|
|
case TC_SETUP_CLSFLOWER:
|
|
return dsa_user_setup_tc_cls_flower(dev, type_data, ingress);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type,
|
|
void *type_data, void *cb_priv)
|
|
{
|
|
return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true);
|
|
}
|
|
|
|
static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type,
|
|
void *type_data, void *cb_priv)
|
|
{
|
|
return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false);
|
|
}
|
|
|
|
static LIST_HEAD(dsa_user_block_cb_list);
|
|
|
|
static int dsa_user_setup_tc_block(struct net_device *dev,
|
|
struct flow_block_offload *f)
|
|
{
|
|
struct flow_block_cb *block_cb;
|
|
flow_setup_cb_t *cb;
|
|
|
|
if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS)
|
|
cb = dsa_user_setup_tc_block_cb_ig;
|
|
else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS)
|
|
cb = dsa_user_setup_tc_block_cb_eg;
|
|
else
|
|
return -EOPNOTSUPP;
|
|
|
|
f->driver_block_list = &dsa_user_block_cb_list;
|
|
|
|
switch (f->command) {
|
|
case FLOW_BLOCK_BIND:
|
|
if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list))
|
|
return -EBUSY;
|
|
|
|
block_cb = flow_block_cb_alloc(cb, dev, dev, NULL);
|
|
if (IS_ERR(block_cb))
|
|
return PTR_ERR(block_cb);
|
|
|
|
flow_block_cb_add(block_cb, f);
|
|
list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list);
|
|
return 0;
|
|
case FLOW_BLOCK_UNBIND:
|
|
block_cb = flow_block_cb_lookup(f->block, cb, dev);
|
|
if (!block_cb)
|
|
return -ENOENT;
|
|
|
|
flow_block_cb_remove(block_cb, f);
|
|
list_del(&block_cb->driver_list);
|
|
return 0;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port,
|
|
void *type_data)
|
|
{
|
|
struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port));
|
|
|
|
if (!conduit->netdev_ops->ndo_setup_tc)
|
|
return -EOPNOTSUPP;
|
|
|
|
return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data);
|
|
}
|
|
|
|
static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type,
|
|
void *type_data)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
switch (type) {
|
|
case TC_SETUP_BLOCK:
|
|
return dsa_user_setup_tc_block(dev, type_data);
|
|
case TC_SETUP_FT:
|
|
return dsa_user_setup_ft_block(ds, dp->index, type_data);
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (!ds->ops->port_setup_tc)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->port_setup_tc(ds, dp->index, type, type_data);
|
|
}
|
|
|
|
static int dsa_user_get_rxnfc(struct net_device *dev,
|
|
struct ethtool_rxnfc *nfc, u32 *rule_locs)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (!ds->ops->get_rxnfc)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs);
|
|
}
|
|
|
|
static int dsa_user_set_rxnfc(struct net_device *dev,
|
|
struct ethtool_rxnfc *nfc)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (!ds->ops->set_rxnfc)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->set_rxnfc(ds, dp->index, nfc);
|
|
}
|
|
|
|
static int dsa_user_get_ts_info(struct net_device *dev,
|
|
struct kernel_ethtool_ts_info *ts)
|
|
{
|
|
struct dsa_user_priv *p = netdev_priv(dev);
|
|
struct dsa_switch *ds = p->dp->ds;
|
|
|
|
if (!ds->ops->get_ts_info)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->get_ts_info(ds, p->dp->index, ts);
|
|
}
|
|
|
|
static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto,
|
|
u16 vid)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_vlan vlan = {
|
|
.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
|
|
.vid = vid,
|
|
/* This API only allows programming tagged, non-PVID VIDs */
|
|
.flags = 0,
|
|
};
|
|
struct netlink_ext_ack extack = {0};
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct netdev_hw_addr *ha;
|
|
struct dsa_vlan *v;
|
|
int ret;
|
|
|
|
/* User port... */
|
|
ret = dsa_port_vlan_add(dp, &vlan, &extack);
|
|
if (ret) {
|
|
if (extack._msg)
|
|
netdev_err(dev, "%s\n", extack._msg);
|
|
return ret;
|
|
}
|
|
|
|
/* And CPU port... */
|
|
ret = dsa_port_host_vlan_add(dp, &vlan, &extack);
|
|
if (ret) {
|
|
if (extack._msg)
|
|
netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index,
|
|
extack._msg);
|
|
return ret;
|
|
}
|
|
|
|
if (!dsa_switch_supports_uc_filtering(ds) &&
|
|
!dsa_switch_supports_mc_filtering(ds))
|
|
return 0;
|
|
|
|
v = kzalloc(sizeof(*v), GFP_KERNEL);
|
|
if (!v) {
|
|
ret = -ENOMEM;
|
|
goto rollback;
|
|
}
|
|
|
|
netif_addr_lock_bh(dev);
|
|
|
|
v->vid = vid;
|
|
list_add_tail(&v->list, &dp->user_vlans);
|
|
|
|
if (dsa_switch_supports_mc_filtering(ds)) {
|
|
netdev_for_each_synced_mc_addr(ha, dev) {
|
|
dsa_user_schedule_standalone_work(dev, DSA_MC_ADD,
|
|
ha->addr, vid);
|
|
}
|
|
}
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds)) {
|
|
netdev_for_each_synced_uc_addr(ha, dev) {
|
|
dsa_user_schedule_standalone_work(dev, DSA_UC_ADD,
|
|
ha->addr, vid);
|
|
}
|
|
}
|
|
|
|
netif_addr_unlock_bh(dev);
|
|
|
|
dsa_flush_workqueue();
|
|
|
|
return 0;
|
|
|
|
rollback:
|
|
dsa_port_host_vlan_del(dp, &vlan);
|
|
dsa_port_vlan_del(dp, &vlan);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto,
|
|
u16 vid)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct switchdev_obj_port_vlan vlan = {
|
|
.vid = vid,
|
|
/* This API only allows programming tagged, non-PVID VIDs */
|
|
.flags = 0,
|
|
};
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct netdev_hw_addr *ha;
|
|
struct dsa_vlan *v;
|
|
int err;
|
|
|
|
err = dsa_port_vlan_del(dp, &vlan);
|
|
if (err)
|
|
return err;
|
|
|
|
err = dsa_port_host_vlan_del(dp, &vlan);
|
|
if (err)
|
|
return err;
|
|
|
|
if (!dsa_switch_supports_uc_filtering(ds) &&
|
|
!dsa_switch_supports_mc_filtering(ds))
|
|
return 0;
|
|
|
|
netif_addr_lock_bh(dev);
|
|
|
|
v = dsa_vlan_find(&dp->user_vlans, &vlan);
|
|
if (!v) {
|
|
netif_addr_unlock_bh(dev);
|
|
return -ENOENT;
|
|
}
|
|
|
|
list_del(&v->list);
|
|
kfree(v);
|
|
|
|
if (dsa_switch_supports_mc_filtering(ds)) {
|
|
netdev_for_each_synced_mc_addr(ha, dev) {
|
|
dsa_user_schedule_standalone_work(dev, DSA_MC_DEL,
|
|
ha->addr, vid);
|
|
}
|
|
}
|
|
|
|
if (dsa_switch_supports_uc_filtering(ds)) {
|
|
netdev_for_each_synced_uc_addr(ha, dev) {
|
|
dsa_user_schedule_standalone_work(dev, DSA_UC_DEL,
|
|
ha->addr, vid);
|
|
}
|
|
}
|
|
|
|
netif_addr_unlock_bh(dev);
|
|
|
|
dsa_flush_workqueue();
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg)
|
|
{
|
|
__be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q);
|
|
|
|
return dsa_user_vlan_rx_add_vid(arg, proto, vid);
|
|
}
|
|
|
|
static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg)
|
|
{
|
|
__be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q);
|
|
|
|
return dsa_user_vlan_rx_kill_vid(arg, proto, vid);
|
|
}
|
|
|
|
/* Keep the VLAN RX filtering list in sync with the hardware only if VLAN
|
|
* filtering is enabled. The baseline is that only ports that offload a
|
|
* VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware,
|
|
* but there are exceptions for quirky hardware.
|
|
*
|
|
* If ds->vlan_filtering_is_global = true, then standalone ports which share
|
|
* the same switch with other ports that offload a VLAN-aware bridge are also
|
|
* inevitably VLAN-aware.
|
|
*
|
|
* To summarize, a DSA switch port offloads:
|
|
*
|
|
* - If standalone (this includes software bridge, software LAG):
|
|
* - if ds->needs_standalone_vlan_filtering = true, OR if
|
|
* (ds->vlan_filtering_is_global = true AND there are bridges spanning
|
|
* this switch chip which have vlan_filtering=1)
|
|
* - the 8021q upper VLANs
|
|
* - else (standalone VLAN filtering is not needed, VLAN filtering is not
|
|
* global, or it is, but no port is under a VLAN-aware bridge):
|
|
* - no VLAN (any 8021q upper is a software VLAN)
|
|
*
|
|
* - If under a vlan_filtering=0 bridge which it offload:
|
|
* - if ds->configure_vlan_while_not_filtering = true (default):
|
|
* - the bridge VLANs. These VLANs are committed to hardware but inactive.
|
|
* - else (deprecated):
|
|
* - no VLAN. The bridge VLANs are not restored when VLAN awareness is
|
|
* enabled, so this behavior is broken and discouraged.
|
|
*
|
|
* - If under a vlan_filtering=1 bridge which it offload:
|
|
* - the bridge VLANs
|
|
* - the 8021q upper VLANs
|
|
*/
|
|
int dsa_user_manage_vlan_filtering(struct net_device *user,
|
|
bool vlan_filtering)
|
|
{
|
|
int err;
|
|
|
|
if (vlan_filtering) {
|
|
user->features |= NETIF_F_HW_VLAN_CTAG_FILTER;
|
|
|
|
err = vlan_for_each(user, dsa_user_restore_vlan, user);
|
|
if (err) {
|
|
vlan_for_each(user, dsa_user_clear_vlan, user);
|
|
user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER;
|
|
return err;
|
|
}
|
|
} else {
|
|
err = vlan_for_each(user, dsa_user_clear_vlan, user);
|
|
if (err)
|
|
return err;
|
|
|
|
user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct dsa_hw_port {
|
|
struct list_head list;
|
|
struct net_device *dev;
|
|
int old_mtu;
|
|
};
|
|
|
|
static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu)
|
|
{
|
|
const struct dsa_hw_port *p;
|
|
int err;
|
|
|
|
list_for_each_entry(p, hw_port_list, list) {
|
|
if (p->dev->mtu == mtu)
|
|
continue;
|
|
|
|
err = dev_set_mtu(p->dev, mtu);
|
|
if (err)
|
|
goto rollback;
|
|
}
|
|
|
|
return 0;
|
|
|
|
rollback:
|
|
list_for_each_entry_continue_reverse(p, hw_port_list, list) {
|
|
if (p->dev->mtu == p->old_mtu)
|
|
continue;
|
|
|
|
if (dev_set_mtu(p->dev, p->old_mtu))
|
|
netdev_err(p->dev, "Failed to restore MTU\n");
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static void dsa_hw_port_list_free(struct list_head *hw_port_list)
|
|
{
|
|
struct dsa_hw_port *p, *n;
|
|
|
|
list_for_each_entry_safe(p, n, hw_port_list, list)
|
|
kfree(p);
|
|
}
|
|
|
|
/* Make the hardware datapath to/from @dev limited to a common MTU */
|
|
static void dsa_bridge_mtu_normalization(struct dsa_port *dp)
|
|
{
|
|
struct list_head hw_port_list;
|
|
struct dsa_switch_tree *dst;
|
|
int min_mtu = ETH_MAX_MTU;
|
|
struct dsa_port *other_dp;
|
|
int err;
|
|
|
|
if (!dp->ds->mtu_enforcement_ingress)
|
|
return;
|
|
|
|
if (!dp->bridge)
|
|
return;
|
|
|
|
INIT_LIST_HEAD(&hw_port_list);
|
|
|
|
/* Populate the list of ports that are part of the same bridge
|
|
* as the newly added/modified port
|
|
*/
|
|
list_for_each_entry(dst, &dsa_tree_list, list) {
|
|
list_for_each_entry(other_dp, &dst->ports, list) {
|
|
struct dsa_hw_port *hw_port;
|
|
struct net_device *user;
|
|
|
|
if (other_dp->type != DSA_PORT_TYPE_USER)
|
|
continue;
|
|
|
|
if (!dsa_port_bridge_same(dp, other_dp))
|
|
continue;
|
|
|
|
if (!other_dp->ds->mtu_enforcement_ingress)
|
|
continue;
|
|
|
|
user = other_dp->user;
|
|
|
|
if (min_mtu > user->mtu)
|
|
min_mtu = user->mtu;
|
|
|
|
hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL);
|
|
if (!hw_port)
|
|
goto out;
|
|
|
|
hw_port->dev = user;
|
|
hw_port->old_mtu = user->mtu;
|
|
|
|
list_add(&hw_port->list, &hw_port_list);
|
|
}
|
|
}
|
|
|
|
/* Attempt to configure the entire hardware bridge to the newly added
|
|
* interface's MTU first, regardless of whether the intention of the
|
|
* user was to raise or lower it.
|
|
*/
|
|
err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu);
|
|
if (!err)
|
|
goto out;
|
|
|
|
/* Clearly that didn't work out so well, so just set the minimum MTU on
|
|
* all hardware bridge ports now. If this fails too, then all ports will
|
|
* still have their old MTU rolled back anyway.
|
|
*/
|
|
dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu);
|
|
|
|
out:
|
|
dsa_hw_port_list_free(&hw_port_list);
|
|
}
|
|
|
|
int dsa_user_change_mtu(struct net_device *dev, int new_mtu)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_port *cpu_dp = dp->cpu_dp;
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct dsa_port *other_dp;
|
|
int largest_mtu = 0;
|
|
int new_conduit_mtu;
|
|
int old_conduit_mtu;
|
|
int mtu_limit;
|
|
int overhead;
|
|
int cpu_mtu;
|
|
int err;
|
|
|
|
if (!ds->ops->port_change_mtu)
|
|
return -EOPNOTSUPP;
|
|
|
|
dsa_tree_for_each_user_port(other_dp, ds->dst) {
|
|
int user_mtu;
|
|
|
|
/* During probe, this function will be called for each user
|
|
* device, while not all of them have been allocated. That's
|
|
* ok, it doesn't change what the maximum is, so ignore it.
|
|
*/
|
|
if (!other_dp->user)
|
|
continue;
|
|
|
|
/* Pretend that we already applied the setting, which we
|
|
* actually haven't (still haven't done all integrity checks)
|
|
*/
|
|
if (dp == other_dp)
|
|
user_mtu = new_mtu;
|
|
else
|
|
user_mtu = other_dp->user->mtu;
|
|
|
|
if (largest_mtu < user_mtu)
|
|
largest_mtu = user_mtu;
|
|
}
|
|
|
|
overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops);
|
|
mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead);
|
|
old_conduit_mtu = conduit->mtu;
|
|
new_conduit_mtu = largest_mtu + overhead;
|
|
if (new_conduit_mtu > mtu_limit)
|
|
return -ERANGE;
|
|
|
|
/* If the conduit MTU isn't over limit, there's no need to check the CPU
|
|
* MTU, since that surely isn't either.
|
|
*/
|
|
cpu_mtu = largest_mtu;
|
|
|
|
/* Start applying stuff */
|
|
if (new_conduit_mtu != old_conduit_mtu) {
|
|
err = dev_set_mtu(conduit, new_conduit_mtu);
|
|
if (err < 0)
|
|
goto out_conduit_failed;
|
|
|
|
/* We only need to propagate the MTU of the CPU port to
|
|
* upstream switches, so emit a notifier which updates them.
|
|
*/
|
|
err = dsa_port_mtu_change(cpu_dp, cpu_mtu);
|
|
if (err)
|
|
goto out_cpu_failed;
|
|
}
|
|
|
|
err = ds->ops->port_change_mtu(ds, dp->index, new_mtu);
|
|
if (err)
|
|
goto out_port_failed;
|
|
|
|
WRITE_ONCE(dev->mtu, new_mtu);
|
|
|
|
dsa_bridge_mtu_normalization(dp);
|
|
|
|
return 0;
|
|
|
|
out_port_failed:
|
|
if (new_conduit_mtu != old_conduit_mtu)
|
|
dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead);
|
|
out_cpu_failed:
|
|
if (new_conduit_mtu != old_conduit_mtu)
|
|
dev_set_mtu(conduit, old_conduit_mtu);
|
|
out_conduit_failed:
|
|
return err;
|
|
}
|
|
|
|
static int __maybe_unused
|
|
dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int port = dp->index;
|
|
|
|
if (!ds->ops->port_set_apptrust)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->port_set_apptrust(ds, port, sel, nsel);
|
|
}
|
|
|
|
static int __maybe_unused
|
|
dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int port = dp->index;
|
|
|
|
if (!ds->ops->port_get_apptrust)
|
|
return -EOPNOTSUPP;
|
|
|
|
return ds->ops->port_get_apptrust(ds, port, sel, nsel);
|
|
}
|
|
|
|
static int __maybe_unused
|
|
dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
unsigned long mask, new_prio;
|
|
int err, port = dp->index;
|
|
|
|
if (!ds->ops->port_set_default_prio)
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dcb_ieee_setapp(dev, app);
|
|
if (err)
|
|
return err;
|
|
|
|
mask = dcb_ieee_getapp_mask(dev, app);
|
|
new_prio = __fls(mask);
|
|
|
|
err = ds->ops->port_set_default_prio(ds, port, new_prio);
|
|
if (err) {
|
|
dcb_ieee_delapp(dev, app);
|
|
return err;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Update the DSCP prio entries on all user ports of the switch in case
|
|
* the switch supports global DSCP prio instead of per port DSCP prios.
|
|
*/
|
|
static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev,
|
|
struct dcb_app *app, bool del)
|
|
{
|
|
int (*setdel)(struct net_device *dev, struct dcb_app *app);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct dsa_port *other_dp;
|
|
int err, restore_err;
|
|
|
|
if (del)
|
|
setdel = dcb_ieee_delapp;
|
|
else
|
|
setdel = dcb_ieee_setapp;
|
|
|
|
dsa_switch_for_each_user_port(other_dp, ds) {
|
|
struct net_device *user = other_dp->user;
|
|
|
|
if (!user || user == dev)
|
|
continue;
|
|
|
|
err = setdel(user, app);
|
|
if (err)
|
|
goto err_try_to_restore;
|
|
}
|
|
|
|
return 0;
|
|
|
|
err_try_to_restore:
|
|
|
|
/* Revert logic to restore previous state of app entries */
|
|
if (!del)
|
|
setdel = dcb_ieee_delapp;
|
|
else
|
|
setdel = dcb_ieee_setapp;
|
|
|
|
dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) {
|
|
struct net_device *user = other_dp->user;
|
|
|
|
if (!user || user == dev)
|
|
continue;
|
|
|
|
restore_err = setdel(user, app);
|
|
if (restore_err)
|
|
netdev_err(user, "Failed to restore DSCP prio entry configuration\n");
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int __maybe_unused
|
|
dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
unsigned long mask, new_prio;
|
|
int err, port = dp->index;
|
|
u8 dscp = app->protocol;
|
|
|
|
if (!ds->ops->port_add_dscp_prio)
|
|
return -EOPNOTSUPP;
|
|
|
|
if (dscp >= 64) {
|
|
netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n",
|
|
dscp);
|
|
return -EINVAL;
|
|
}
|
|
|
|
err = dcb_ieee_setapp(dev, app);
|
|
if (err)
|
|
return err;
|
|
|
|
mask = dcb_ieee_getapp_mask(dev, app);
|
|
new_prio = __fls(mask);
|
|
|
|
err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio);
|
|
if (err) {
|
|
dcb_ieee_delapp(dev, app);
|
|
return err;
|
|
}
|
|
|
|
if (!ds->dscp_prio_mapping_is_global)
|
|
return 0;
|
|
|
|
err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false);
|
|
if (err) {
|
|
if (ds->ops->port_del_dscp_prio)
|
|
ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio);
|
|
dcb_ieee_delapp(dev, app);
|
|
return err;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev,
|
|
struct dcb_app *app)
|
|
{
|
|
switch (app->selector) {
|
|
case IEEE_8021QAZ_APP_SEL_ETHERTYPE:
|
|
switch (app->protocol) {
|
|
case 0:
|
|
return dsa_user_dcbnl_set_default_prio(dev, app);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
break;
|
|
case IEEE_8021QAZ_APP_SEL_DSCP:
|
|
return dsa_user_dcbnl_add_dscp_prio(dev, app);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
static int __maybe_unused
|
|
dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
unsigned long mask, new_prio;
|
|
int err, port = dp->index;
|
|
|
|
if (!ds->ops->port_set_default_prio)
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dcb_ieee_delapp(dev, app);
|
|
if (err)
|
|
return err;
|
|
|
|
mask = dcb_ieee_getapp_mask(dev, app);
|
|
new_prio = mask ? __fls(mask) : 0;
|
|
|
|
err = ds->ops->port_set_default_prio(ds, port, new_prio);
|
|
if (err) {
|
|
dcb_ieee_setapp(dev, app);
|
|
return err;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int __maybe_unused
|
|
dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int err, port = dp->index;
|
|
u8 dscp = app->protocol;
|
|
|
|
if (!ds->ops->port_del_dscp_prio)
|
|
return -EOPNOTSUPP;
|
|
|
|
err = dcb_ieee_delapp(dev, app);
|
|
if (err)
|
|
return err;
|
|
|
|
err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority);
|
|
if (err) {
|
|
dcb_ieee_setapp(dev, app);
|
|
return err;
|
|
}
|
|
|
|
if (!ds->dscp_prio_mapping_is_global)
|
|
return 0;
|
|
|
|
err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true);
|
|
if (err) {
|
|
if (ds->ops->port_add_dscp_prio)
|
|
ds->ops->port_add_dscp_prio(ds, port, dscp,
|
|
app->priority);
|
|
dcb_ieee_setapp(dev, app);
|
|
return err;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev,
|
|
struct dcb_app *app)
|
|
{
|
|
switch (app->selector) {
|
|
case IEEE_8021QAZ_APP_SEL_ETHERTYPE:
|
|
switch (app->protocol) {
|
|
case 0:
|
|
return dsa_user_dcbnl_del_default_prio(dev, app);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
break;
|
|
case IEEE_8021QAZ_APP_SEL_DSCP:
|
|
return dsa_user_dcbnl_del_dscp_prio(dev, app);
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
/* Pre-populate the DCB application priority table with the priorities
|
|
* configured during switch setup, which we read from hardware here.
|
|
*/
|
|
static int dsa_user_dcbnl_init(struct net_device *dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
int port = dp->index;
|
|
int err;
|
|
|
|
if (ds->ops->port_get_default_prio) {
|
|
int prio = ds->ops->port_get_default_prio(ds, port);
|
|
struct dcb_app app = {
|
|
.selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE,
|
|
.protocol = 0,
|
|
.priority = prio,
|
|
};
|
|
|
|
if (prio < 0)
|
|
return prio;
|
|
|
|
err = dcb_ieee_setapp(dev, &app);
|
|
if (err)
|
|
return err;
|
|
}
|
|
|
|
if (ds->ops->port_get_dscp_prio) {
|
|
int protocol;
|
|
|
|
for (protocol = 0; protocol < 64; protocol++) {
|
|
struct dcb_app app = {
|
|
.selector = IEEE_8021QAZ_APP_SEL_DSCP,
|
|
.protocol = protocol,
|
|
};
|
|
int prio;
|
|
|
|
prio = ds->ops->port_get_dscp_prio(ds, port, protocol);
|
|
if (prio == -EOPNOTSUPP)
|
|
continue;
|
|
if (prio < 0)
|
|
return prio;
|
|
|
|
app.priority = prio;
|
|
|
|
err = dcb_ieee_setapp(dev, &app);
|
|
if (err)
|
|
return err;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct ethtool_ops dsa_user_ethtool_ops = {
|
|
.get_drvinfo = dsa_user_get_drvinfo,
|
|
.get_regs_len = dsa_user_get_regs_len,
|
|
.get_regs = dsa_user_get_regs,
|
|
.nway_reset = dsa_user_nway_reset,
|
|
.get_link = ethtool_op_get_link,
|
|
.get_eeprom_len = dsa_user_get_eeprom_len,
|
|
.get_eeprom = dsa_user_get_eeprom,
|
|
.set_eeprom = dsa_user_set_eeprom,
|
|
.get_strings = dsa_user_get_strings,
|
|
.get_ethtool_stats = dsa_user_get_ethtool_stats,
|
|
.get_sset_count = dsa_user_get_sset_count,
|
|
.get_eth_phy_stats = dsa_user_get_eth_phy_stats,
|
|
.get_eth_mac_stats = dsa_user_get_eth_mac_stats,
|
|
.get_eth_ctrl_stats = dsa_user_get_eth_ctrl_stats,
|
|
.get_rmon_stats = dsa_user_get_rmon_stats,
|
|
.set_wol = dsa_user_set_wol,
|
|
.get_wol = dsa_user_get_wol,
|
|
.set_eee = dsa_user_set_eee,
|
|
.get_eee = dsa_user_get_eee,
|
|
.get_link_ksettings = dsa_user_get_link_ksettings,
|
|
.set_link_ksettings = dsa_user_set_link_ksettings,
|
|
.get_pause_stats = dsa_user_get_pause_stats,
|
|
.get_pauseparam = dsa_user_get_pauseparam,
|
|
.set_pauseparam = dsa_user_set_pauseparam,
|
|
.get_rxnfc = dsa_user_get_rxnfc,
|
|
.set_rxnfc = dsa_user_set_rxnfc,
|
|
.get_ts_info = dsa_user_get_ts_info,
|
|
.self_test = dsa_user_net_selftest,
|
|
.get_mm = dsa_user_get_mm,
|
|
.set_mm = dsa_user_set_mm,
|
|
.get_mm_stats = dsa_user_get_mm_stats,
|
|
};
|
|
|
|
static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = {
|
|
.ieee_setapp = dsa_user_dcbnl_ieee_setapp,
|
|
.ieee_delapp = dsa_user_dcbnl_ieee_delapp,
|
|
.dcbnl_setapptrust = dsa_user_dcbnl_set_apptrust,
|
|
.dcbnl_getapptrust = dsa_user_dcbnl_get_apptrust,
|
|
};
|
|
|
|
static void dsa_user_get_stats64(struct net_device *dev,
|
|
struct rtnl_link_stats64 *s)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ds->ops->get_stats64)
|
|
ds->ops->get_stats64(ds, dp->index, s);
|
|
else
|
|
dev_get_tstats64(dev, s);
|
|
}
|
|
|
|
static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx,
|
|
struct net_device_path *path)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(ctx->dev);
|
|
struct net_device *conduit = dsa_port_to_conduit(dp);
|
|
struct dsa_port *cpu_dp = dp->cpu_dp;
|
|
|
|
path->dev = ctx->dev;
|
|
path->type = DEV_PATH_DSA;
|
|
path->dsa.proto = cpu_dp->tag_ops->proto;
|
|
path->dsa.port = dp->index;
|
|
ctx->dev = conduit;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct net_device_ops dsa_user_netdev_ops = {
|
|
.ndo_open = dsa_user_open,
|
|
.ndo_stop = dsa_user_close,
|
|
.ndo_start_xmit = dsa_user_xmit,
|
|
.ndo_change_rx_flags = dsa_user_change_rx_flags,
|
|
.ndo_set_rx_mode = dsa_user_set_rx_mode,
|
|
.ndo_set_mac_address = dsa_user_set_mac_address,
|
|
.ndo_fdb_dump = dsa_user_fdb_dump,
|
|
.ndo_eth_ioctl = dsa_user_ioctl,
|
|
.ndo_get_iflink = dsa_user_get_iflink,
|
|
#ifdef CONFIG_NET_POLL_CONTROLLER
|
|
.ndo_netpoll_setup = dsa_user_netpoll_setup,
|
|
.ndo_netpoll_cleanup = dsa_user_netpoll_cleanup,
|
|
.ndo_poll_controller = dsa_user_poll_controller,
|
|
#endif
|
|
.ndo_setup_tc = dsa_user_setup_tc,
|
|
.ndo_get_stats64 = dsa_user_get_stats64,
|
|
.ndo_vlan_rx_add_vid = dsa_user_vlan_rx_add_vid,
|
|
.ndo_vlan_rx_kill_vid = dsa_user_vlan_rx_kill_vid,
|
|
.ndo_change_mtu = dsa_user_change_mtu,
|
|
.ndo_fill_forward_path = dsa_user_fill_forward_path,
|
|
};
|
|
|
|
static const struct device_type dsa_type = {
|
|
.name = "dsa",
|
|
};
|
|
|
|
void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up)
|
|
{
|
|
const struct dsa_port *dp = dsa_to_port(ds, port);
|
|
|
|
if (dp->pl)
|
|
phylink_mac_change(dp->pl, up);
|
|
}
|
|
EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change);
|
|
|
|
static void dsa_user_phylink_fixed_state(struct phylink_config *config,
|
|
struct phylink_link_state *state)
|
|
{
|
|
struct dsa_port *dp = dsa_phylink_to_port(config);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
/* No need to check that this operation is valid, the callback would
|
|
* not be called if it was not.
|
|
*/
|
|
ds->ops->phylink_fixed_state(ds, dp->index, state);
|
|
}
|
|
|
|
/* user device setup *******************************************************/
|
|
static int dsa_user_phy_connect(struct net_device *user_dev, int addr,
|
|
u32 flags)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(user_dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr);
|
|
if (!user_dev->phydev) {
|
|
netdev_err(user_dev, "no phy at %d\n", addr);
|
|
return -ENODEV;
|
|
}
|
|
|
|
user_dev->phydev->dev_flags |= flags;
|
|
|
|
return phylink_connect_phy(dp->pl, user_dev->phydev);
|
|
}
|
|
|
|
static int dsa_user_phy_setup(struct net_device *user_dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(user_dev);
|
|
struct device_node *port_dn = dp->dn;
|
|
struct dsa_switch *ds = dp->ds;
|
|
u32 phy_flags = 0;
|
|
int ret;
|
|
|
|
dp->pl_config.dev = &user_dev->dev;
|
|
dp->pl_config.type = PHYLINK_NETDEV;
|
|
|
|
/* The get_fixed_state callback takes precedence over polling the
|
|
* link GPIO in PHYLINK (see phylink_get_fixed_state). Only set
|
|
* this if the switch provides such a callback.
|
|
*/
|
|
if (ds->ops->phylink_fixed_state) {
|
|
dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state;
|
|
dp->pl_config.poll_fixed_state = true;
|
|
}
|
|
|
|
ret = dsa_port_phylink_create(dp);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (ds->ops->get_phy_flags)
|
|
phy_flags = ds->ops->get_phy_flags(ds, dp->index);
|
|
|
|
ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags);
|
|
if (ret == -ENODEV && ds->user_mii_bus) {
|
|
/* We could not connect to a designated PHY or SFP, so try to
|
|
* use the switch internal MDIO bus instead
|
|
*/
|
|
ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags);
|
|
}
|
|
if (ret) {
|
|
netdev_err(user_dev, "failed to connect to PHY: %pe\n",
|
|
ERR_PTR(ret));
|
|
dsa_port_phylink_destroy(dp);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
void dsa_user_setup_tagger(struct net_device *user)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(user);
|
|
struct net_device *conduit = dsa_port_to_conduit(dp);
|
|
struct dsa_user_priv *p = netdev_priv(user);
|
|
const struct dsa_port *cpu_dp = dp->cpu_dp;
|
|
const struct dsa_switch *ds = dp->ds;
|
|
|
|
user->needed_headroom = cpu_dp->tag_ops->needed_headroom;
|
|
user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom;
|
|
/* Try to save one extra realloc later in the TX path (in the conduit)
|
|
* by also inheriting the conduit's needed headroom and tailroom.
|
|
* The 8021q driver also does this.
|
|
*/
|
|
user->needed_headroom += conduit->needed_headroom;
|
|
user->needed_tailroom += conduit->needed_tailroom;
|
|
|
|
p->xmit = cpu_dp->tag_ops->xmit;
|
|
|
|
user->features = conduit->vlan_features | NETIF_F_HW_TC;
|
|
user->hw_features |= NETIF_F_HW_TC;
|
|
if (user->needed_tailroom)
|
|
user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST);
|
|
if (ds->needs_standalone_vlan_filtering)
|
|
user->features |= NETIF_F_HW_VLAN_CTAG_FILTER;
|
|
|
|
user->lltx = true;
|
|
}
|
|
|
|
int dsa_user_suspend(struct net_device *user_dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(user_dev);
|
|
|
|
if (!netif_running(user_dev))
|
|
return 0;
|
|
|
|
netif_device_detach(user_dev);
|
|
|
|
rtnl_lock();
|
|
phylink_stop(dp->pl);
|
|
rtnl_unlock();
|
|
|
|
return 0;
|
|
}
|
|
|
|
int dsa_user_resume(struct net_device *user_dev)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(user_dev);
|
|
|
|
if (!netif_running(user_dev))
|
|
return 0;
|
|
|
|
netif_device_attach(user_dev);
|
|
|
|
rtnl_lock();
|
|
phylink_start(dp->pl);
|
|
rtnl_unlock();
|
|
|
|
return 0;
|
|
}
|
|
|
|
int dsa_user_create(struct dsa_port *port)
|
|
{
|
|
struct net_device *conduit = dsa_port_to_conduit(port);
|
|
struct dsa_switch *ds = port->ds;
|
|
struct net_device *user_dev;
|
|
struct dsa_user_priv *p;
|
|
const char *name;
|
|
int assign_type;
|
|
int ret;
|
|
|
|
if (!ds->num_tx_queues)
|
|
ds->num_tx_queues = 1;
|
|
|
|
if (port->name) {
|
|
name = port->name;
|
|
assign_type = NET_NAME_PREDICTABLE;
|
|
} else {
|
|
name = "eth%d";
|
|
assign_type = NET_NAME_ENUM;
|
|
}
|
|
|
|
user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name,
|
|
assign_type, ether_setup,
|
|
ds->num_tx_queues, 1);
|
|
if (user_dev == NULL)
|
|
return -ENOMEM;
|
|
|
|
user_dev->rtnl_link_ops = &dsa_link_ops;
|
|
user_dev->ethtool_ops = &dsa_user_ethtool_ops;
|
|
#if IS_ENABLED(CONFIG_DCB)
|
|
user_dev->dcbnl_ops = &dsa_user_dcbnl_ops;
|
|
#endif
|
|
if (!is_zero_ether_addr(port->mac))
|
|
eth_hw_addr_set(user_dev, port->mac);
|
|
else
|
|
eth_hw_addr_inherit(user_dev, conduit);
|
|
user_dev->priv_flags |= IFF_NO_QUEUE;
|
|
if (dsa_switch_supports_uc_filtering(ds))
|
|
user_dev->priv_flags |= IFF_UNICAST_FLT;
|
|
user_dev->netdev_ops = &dsa_user_netdev_ops;
|
|
if (ds->ops->port_max_mtu)
|
|
user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index);
|
|
SET_NETDEV_DEVTYPE(user_dev, &dsa_type);
|
|
|
|
SET_NETDEV_DEV(user_dev, port->ds->dev);
|
|
SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port);
|
|
user_dev->dev.of_node = port->dn;
|
|
user_dev->vlan_features = conduit->vlan_features;
|
|
|
|
p = netdev_priv(user_dev);
|
|
user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS;
|
|
|
|
ret = gro_cells_init(&p->gcells, user_dev);
|
|
if (ret)
|
|
goto out_free;
|
|
|
|
p->dp = port;
|
|
INIT_LIST_HEAD(&p->mall_tc_list);
|
|
port->user = user_dev;
|
|
dsa_user_setup_tagger(user_dev);
|
|
|
|
netif_carrier_off(user_dev);
|
|
|
|
ret = dsa_user_phy_setup(user_dev);
|
|
if (ret) {
|
|
netdev_err(user_dev,
|
|
"error %d setting up PHY for tree %d, switch %d, port %d\n",
|
|
ret, ds->dst->index, ds->index, port->index);
|
|
goto out_gcells;
|
|
}
|
|
|
|
rtnl_lock();
|
|
|
|
ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN);
|
|
if (ret && ret != -EOPNOTSUPP)
|
|
dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n",
|
|
ret, ETH_DATA_LEN, port->index);
|
|
|
|
ret = register_netdevice(user_dev);
|
|
if (ret) {
|
|
netdev_err(conduit, "error %d registering interface %s\n",
|
|
ret, user_dev->name);
|
|
rtnl_unlock();
|
|
goto out_phy;
|
|
}
|
|
|
|
if (IS_ENABLED(CONFIG_DCB)) {
|
|
ret = dsa_user_dcbnl_init(user_dev);
|
|
if (ret) {
|
|
netdev_err(user_dev,
|
|
"failed to initialize DCB: %pe\n",
|
|
ERR_PTR(ret));
|
|
rtnl_unlock();
|
|
goto out_unregister;
|
|
}
|
|
}
|
|
|
|
ret = netdev_upper_dev_link(conduit, user_dev, NULL);
|
|
|
|
rtnl_unlock();
|
|
|
|
if (ret)
|
|
goto out_unregister;
|
|
|
|
return 0;
|
|
|
|
out_unregister:
|
|
unregister_netdev(user_dev);
|
|
out_phy:
|
|
rtnl_lock();
|
|
phylink_disconnect_phy(p->dp->pl);
|
|
rtnl_unlock();
|
|
dsa_port_phylink_destroy(p->dp);
|
|
out_gcells:
|
|
gro_cells_destroy(&p->gcells);
|
|
out_free:
|
|
free_netdev(user_dev);
|
|
port->user = NULL;
|
|
return ret;
|
|
}
|
|
|
|
void dsa_user_destroy(struct net_device *user_dev)
|
|
{
|
|
struct net_device *conduit = dsa_user_to_conduit(user_dev);
|
|
struct dsa_port *dp = dsa_user_to_port(user_dev);
|
|
struct dsa_user_priv *p = netdev_priv(user_dev);
|
|
|
|
netif_carrier_off(user_dev);
|
|
rtnl_lock();
|
|
netdev_upper_dev_unlink(conduit, user_dev);
|
|
unregister_netdevice(user_dev);
|
|
phylink_disconnect_phy(dp->pl);
|
|
rtnl_unlock();
|
|
|
|
dsa_port_phylink_destroy(dp);
|
|
gro_cells_destroy(&p->gcells);
|
|
free_netdev(user_dev);
|
|
}
|
|
|
|
int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct net_device *old_conduit = dsa_user_to_conduit(dev);
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch *ds = dp->ds;
|
|
struct net_device *upper;
|
|
struct list_head *iter;
|
|
int err;
|
|
|
|
if (conduit == old_conduit)
|
|
return 0;
|
|
|
|
if (!ds->ops->port_change_conduit) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Driver does not support changing DSA conduit");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
if (!netdev_uses_dsa(conduit)) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"Interface not eligible as DSA conduit");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
netdev_for_each_upper_dev_rcu(conduit, upper, iter) {
|
|
if (dsa_user_dev_check(upper))
|
|
continue;
|
|
if (netif_is_bridge_master(upper))
|
|
continue;
|
|
NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
/* Since we allow live-changing the DSA conduit, plus we auto-open the
|
|
* DSA conduit when the user port opens => we need to ensure that the
|
|
* new DSA conduit is open too.
|
|
*/
|
|
if (dev->flags & IFF_UP) {
|
|
err = dev_open(conduit, extack);
|
|
if (err)
|
|
return err;
|
|
}
|
|
|
|
netdev_upper_dev_unlink(old_conduit, dev);
|
|
|
|
err = netdev_upper_dev_link(conduit, dev, extack);
|
|
if (err)
|
|
goto out_revert_old_conduit_unlink;
|
|
|
|
err = dsa_port_change_conduit(dp, conduit, extack);
|
|
if (err)
|
|
goto out_revert_conduit_link;
|
|
|
|
/* Update the MTU of the new CPU port through cross-chip notifiers */
|
|
err = dsa_user_change_mtu(dev, dev->mtu);
|
|
if (err && err != -EOPNOTSUPP) {
|
|
netdev_warn(dev,
|
|
"nonfatal error updating MTU with new conduit: %pe\n",
|
|
ERR_PTR(err));
|
|
}
|
|
|
|
return 0;
|
|
|
|
out_revert_conduit_link:
|
|
netdev_upper_dev_unlink(conduit, dev);
|
|
out_revert_old_conduit_unlink:
|
|
netdev_upper_dev_link(old_conduit, dev, NULL);
|
|
return err;
|
|
}
|
|
|
|
bool dsa_user_dev_check(const struct net_device *dev)
|
|
{
|
|
return dev->netdev_ops == &dsa_user_netdev_ops;
|
|
}
|
|
EXPORT_SYMBOL_GPL(dsa_user_dev_check);
|
|
|
|
static int dsa_user_changeupper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct netlink_ext_ack *extack;
|
|
int err = NOTIFY_DONE;
|
|
struct dsa_port *dp;
|
|
|
|
if (!dsa_user_dev_check(dev))
|
|
return err;
|
|
|
|
dp = dsa_user_to_port(dev);
|
|
extack = netdev_notifier_info_to_extack(&info->info);
|
|
|
|
if (netif_is_bridge_master(info->upper_dev)) {
|
|
if (info->linking) {
|
|
err = dsa_port_bridge_join(dp, info->upper_dev, extack);
|
|
if (!err)
|
|
dsa_bridge_mtu_normalization(dp);
|
|
if (err == -EOPNOTSUPP) {
|
|
NL_SET_ERR_MSG_WEAK_MOD(extack,
|
|
"Offloading not supported");
|
|
err = 0;
|
|
}
|
|
err = notifier_from_errno(err);
|
|
} else {
|
|
dsa_port_bridge_leave(dp, info->upper_dev);
|
|
err = NOTIFY_OK;
|
|
}
|
|
} else if (netif_is_lag_master(info->upper_dev)) {
|
|
if (info->linking) {
|
|
err = dsa_port_lag_join(dp, info->upper_dev,
|
|
info->upper_info, extack);
|
|
if (err == -EOPNOTSUPP) {
|
|
NL_SET_ERR_MSG_WEAK_MOD(extack,
|
|
"Offloading not supported");
|
|
err = 0;
|
|
}
|
|
err = notifier_from_errno(err);
|
|
} else {
|
|
dsa_port_lag_leave(dp, info->upper_dev);
|
|
err = NOTIFY_OK;
|
|
}
|
|
} else if (is_hsr_master(info->upper_dev)) {
|
|
if (info->linking) {
|
|
err = dsa_port_hsr_join(dp, info->upper_dev, extack);
|
|
if (err == -EOPNOTSUPP) {
|
|
NL_SET_ERR_MSG_WEAK_MOD(extack,
|
|
"Offloading not supported");
|
|
err = 0;
|
|
}
|
|
err = notifier_from_errno(err);
|
|
} else {
|
|
dsa_port_hsr_leave(dp, info->upper_dev);
|
|
err = NOTIFY_OK;
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int dsa_user_prechangeupper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct dsa_port *dp;
|
|
|
|
if (!dsa_user_dev_check(dev))
|
|
return NOTIFY_DONE;
|
|
|
|
dp = dsa_user_to_port(dev);
|
|
|
|
if (netif_is_bridge_master(info->upper_dev) && !info->linking)
|
|
dsa_port_pre_bridge_leave(dp, info->upper_dev);
|
|
else if (netif_is_lag_master(info->upper_dev) && !info->linking)
|
|
dsa_port_pre_lag_leave(dp, info->upper_dev);
|
|
/* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot
|
|
* meaningfully placed under a bridge yet
|
|
*/
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static int
|
|
dsa_user_lag_changeupper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct net_device *lower;
|
|
struct list_head *iter;
|
|
int err = NOTIFY_DONE;
|
|
struct dsa_port *dp;
|
|
|
|
if (!netif_is_lag_master(dev))
|
|
return err;
|
|
|
|
netdev_for_each_lower_dev(dev, lower, iter) {
|
|
if (!dsa_user_dev_check(lower))
|
|
continue;
|
|
|
|
dp = dsa_user_to_port(lower);
|
|
if (!dp->lag)
|
|
/* Software LAG */
|
|
continue;
|
|
|
|
err = dsa_user_changeupper(lower, info);
|
|
if (notifier_to_errno(err))
|
|
break;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
/* Same as dsa_user_lag_changeupper() except that it calls
|
|
* dsa_user_prechangeupper()
|
|
*/
|
|
static int
|
|
dsa_user_lag_prechangeupper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct net_device *lower;
|
|
struct list_head *iter;
|
|
int err = NOTIFY_DONE;
|
|
struct dsa_port *dp;
|
|
|
|
if (!netif_is_lag_master(dev))
|
|
return err;
|
|
|
|
netdev_for_each_lower_dev(dev, lower, iter) {
|
|
if (!dsa_user_dev_check(lower))
|
|
continue;
|
|
|
|
dp = dsa_user_to_port(lower);
|
|
if (!dp->lag)
|
|
/* Software LAG */
|
|
continue;
|
|
|
|
err = dsa_user_prechangeupper(lower, info);
|
|
if (notifier_to_errno(err))
|
|
break;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int
|
|
dsa_prevent_bridging_8021q_upper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct netlink_ext_ack *ext_ack;
|
|
struct net_device *user, *br;
|
|
struct dsa_port *dp;
|
|
|
|
ext_ack = netdev_notifier_info_to_extack(&info->info);
|
|
|
|
if (!is_vlan_dev(dev))
|
|
return NOTIFY_DONE;
|
|
|
|
user = vlan_dev_real_dev(dev);
|
|
if (!dsa_user_dev_check(user))
|
|
return NOTIFY_DONE;
|
|
|
|
dp = dsa_user_to_port(user);
|
|
br = dsa_port_bridge_dev_get(dp);
|
|
if (!br)
|
|
return NOTIFY_DONE;
|
|
|
|
/* Deny enslaving a VLAN device into a VLAN-aware bridge */
|
|
if (br_vlan_enabled(br) &&
|
|
netif_is_bridge_master(info->upper_dev) && info->linking) {
|
|
NL_SET_ERR_MSG_MOD(ext_ack,
|
|
"Cannot make VLAN device join VLAN-aware bridge");
|
|
return notifier_from_errno(-EINVAL);
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static int
|
|
dsa_user_check_8021q_upper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct net_device *br = dsa_port_bridge_dev_get(dp);
|
|
struct bridge_vlan_info br_info;
|
|
struct netlink_ext_ack *extack;
|
|
int err = NOTIFY_DONE;
|
|
u16 vid;
|
|
|
|
if (!br || !br_vlan_enabled(br))
|
|
return NOTIFY_DONE;
|
|
|
|
extack = netdev_notifier_info_to_extack(&info->info);
|
|
vid = vlan_dev_vlan_id(info->upper_dev);
|
|
|
|
/* br_vlan_get_info() returns -EINVAL or -ENOENT if the
|
|
* device, respectively the VID is not found, returning
|
|
* 0 means success, which is a failure for us here.
|
|
*/
|
|
err = br_vlan_get_info(br, vid, &br_info);
|
|
if (err == 0) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"This VLAN is already configured by the bridge");
|
|
return notifier_from_errno(-EBUSY);
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static int
|
|
dsa_user_prechangeupper_sanity_check(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct dsa_switch *ds;
|
|
struct dsa_port *dp;
|
|
int err;
|
|
|
|
if (!dsa_user_dev_check(dev))
|
|
return dsa_prevent_bridging_8021q_upper(dev, info);
|
|
|
|
dp = dsa_user_to_port(dev);
|
|
ds = dp->ds;
|
|
|
|
if (ds->ops->port_prechangeupper) {
|
|
err = ds->ops->port_prechangeupper(ds, dp->index, info);
|
|
if (err)
|
|
return notifier_from_errno(err);
|
|
}
|
|
|
|
if (is_vlan_dev(info->upper_dev))
|
|
return dsa_user_check_8021q_upper(dev, info);
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
/* To be eligible as a DSA conduit, a LAG must have all lower interfaces be
|
|
* eligible DSA conduits. Additionally, all LAG slaves must be DSA conduits of
|
|
* switches in the same switch tree.
|
|
*/
|
|
static int dsa_lag_conduit_validate(struct net_device *lag_dev,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct net_device *lower1, *lower2;
|
|
struct list_head *iter1, *iter2;
|
|
|
|
netdev_for_each_lower_dev(lag_dev, lower1, iter1) {
|
|
netdev_for_each_lower_dev(lag_dev, lower2, iter2) {
|
|
if (!netdev_uses_dsa(lower1) ||
|
|
!netdev_uses_dsa(lower2)) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"All LAG ports must be eligible as DSA conduits");
|
|
return notifier_from_errno(-EINVAL);
|
|
}
|
|
|
|
if (lower1 == lower2)
|
|
continue;
|
|
|
|
if (!dsa_port_tree_same(lower1->dsa_ptr,
|
|
lower2->dsa_ptr)) {
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"LAG contains DSA conduits of disjoint switch trees");
|
|
return notifier_from_errno(-EINVAL);
|
|
}
|
|
}
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static int
|
|
dsa_conduit_prechangeupper_sanity_check(struct net_device *conduit,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info);
|
|
|
|
if (!netdev_uses_dsa(conduit))
|
|
return NOTIFY_DONE;
|
|
|
|
if (!info->linking)
|
|
return NOTIFY_DONE;
|
|
|
|
/* Allow DSA switch uppers */
|
|
if (dsa_user_dev_check(info->upper_dev))
|
|
return NOTIFY_DONE;
|
|
|
|
/* Allow bridge uppers of DSA conduits, subject to further
|
|
* restrictions in dsa_bridge_prechangelower_sanity_check()
|
|
*/
|
|
if (netif_is_bridge_master(info->upper_dev))
|
|
return NOTIFY_DONE;
|
|
|
|
/* Allow LAG uppers, subject to further restrictions in
|
|
* dsa_lag_conduit_prechangelower_sanity_check()
|
|
*/
|
|
if (netif_is_lag_master(info->upper_dev))
|
|
return dsa_lag_conduit_validate(info->upper_dev, extack);
|
|
|
|
NL_SET_ERR_MSG_MOD(extack,
|
|
"DSA conduit cannot join unknown upper interfaces");
|
|
return notifier_from_errno(-EBUSY);
|
|
}
|
|
|
|
static int
|
|
dsa_lag_conduit_prechangelower_sanity_check(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info);
|
|
struct net_device *lag_dev = info->upper_dev;
|
|
struct net_device *lower;
|
|
struct list_head *iter;
|
|
|
|
if (!netdev_uses_dsa(lag_dev) || !netif_is_lag_master(lag_dev))
|
|
return NOTIFY_DONE;
|
|
|
|
if (!info->linking)
|
|
return NOTIFY_DONE;
|
|
|
|
if (!netdev_uses_dsa(dev)) {
|
|
NL_SET_ERR_MSG(extack,
|
|
"Only DSA conduits can join a LAG DSA conduit");
|
|
return notifier_from_errno(-EINVAL);
|
|
}
|
|
|
|
netdev_for_each_lower_dev(lag_dev, lower, iter) {
|
|
if (!dsa_port_tree_same(dev->dsa_ptr, lower->dsa_ptr)) {
|
|
NL_SET_ERR_MSG(extack,
|
|
"Interface is DSA conduit for a different switch tree than this LAG");
|
|
return notifier_from_errno(-EINVAL);
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
/* Don't allow bridging of DSA conduits, since the bridge layer rx_handler
|
|
* prevents the DSA fake ethertype handler to be invoked, so we don't get the
|
|
* chance to strip off and parse the DSA switch tag protocol header (the bridge
|
|
* layer just returns RX_HANDLER_CONSUMED, stopping RX processing for these
|
|
* frames).
|
|
* The only case where that would not be an issue is when bridging can already
|
|
* be offloaded, such as when the DSA conduit is itself a DSA or plain switchdev
|
|
* port, and is bridged only with other ports from the same hardware device.
|
|
*/
|
|
static int
|
|
dsa_bridge_prechangelower_sanity_check(struct net_device *new_lower,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct net_device *br = info->upper_dev;
|
|
struct netlink_ext_ack *extack;
|
|
struct net_device *lower;
|
|
struct list_head *iter;
|
|
|
|
if (!netif_is_bridge_master(br))
|
|
return NOTIFY_DONE;
|
|
|
|
if (!info->linking)
|
|
return NOTIFY_DONE;
|
|
|
|
extack = netdev_notifier_info_to_extack(&info->info);
|
|
|
|
netdev_for_each_lower_dev(br, lower, iter) {
|
|
if (!netdev_uses_dsa(new_lower) && !netdev_uses_dsa(lower))
|
|
continue;
|
|
|
|
if (!netdev_port_same_parent_id(lower, new_lower)) {
|
|
NL_SET_ERR_MSG(extack,
|
|
"Cannot do software bridging with a DSA conduit");
|
|
return notifier_from_errno(-EINVAL);
|
|
}
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static void dsa_tree_migrate_ports_from_lag_conduit(struct dsa_switch_tree *dst,
|
|
struct net_device *lag_dev)
|
|
{
|
|
struct net_device *new_conduit = dsa_tree_find_first_conduit(dst);
|
|
struct dsa_port *dp;
|
|
int err;
|
|
|
|
dsa_tree_for_each_user_port(dp, dst) {
|
|
if (dsa_port_to_conduit(dp) != lag_dev)
|
|
continue;
|
|
|
|
err = dsa_user_change_conduit(dp->user, new_conduit, NULL);
|
|
if (err) {
|
|
netdev_err(dp->user,
|
|
"failed to restore conduit to %s: %pe\n",
|
|
new_conduit->name, ERR_PTR(err));
|
|
}
|
|
}
|
|
}
|
|
|
|
static int dsa_conduit_lag_join(struct net_device *conduit,
|
|
struct net_device *lag_dev,
|
|
struct netdev_lag_upper_info *uinfo,
|
|
struct netlink_ext_ack *extack)
|
|
{
|
|
struct dsa_port *cpu_dp = conduit->dsa_ptr;
|
|
struct dsa_switch_tree *dst = cpu_dp->dst;
|
|
struct dsa_port *dp;
|
|
int err;
|
|
|
|
err = dsa_conduit_lag_setup(lag_dev, cpu_dp, uinfo, extack);
|
|
if (err)
|
|
return err;
|
|
|
|
dsa_tree_for_each_user_port(dp, dst) {
|
|
if (dsa_port_to_conduit(dp) != conduit)
|
|
continue;
|
|
|
|
err = dsa_user_change_conduit(dp->user, lag_dev, extack);
|
|
if (err)
|
|
goto restore;
|
|
}
|
|
|
|
return 0;
|
|
|
|
restore:
|
|
dsa_tree_for_each_user_port_continue_reverse(dp, dst) {
|
|
if (dsa_port_to_conduit(dp) != lag_dev)
|
|
continue;
|
|
|
|
err = dsa_user_change_conduit(dp->user, conduit, NULL);
|
|
if (err) {
|
|
netdev_err(dp->user,
|
|
"failed to restore conduit to %s: %pe\n",
|
|
conduit->name, ERR_PTR(err));
|
|
}
|
|
}
|
|
|
|
dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr);
|
|
|
|
return err;
|
|
}
|
|
|
|
static void dsa_conduit_lag_leave(struct net_device *conduit,
|
|
struct net_device *lag_dev)
|
|
{
|
|
struct dsa_port *dp, *cpu_dp = lag_dev->dsa_ptr;
|
|
struct dsa_switch_tree *dst = cpu_dp->dst;
|
|
struct dsa_port *new_cpu_dp = NULL;
|
|
struct net_device *lower;
|
|
struct list_head *iter;
|
|
|
|
netdev_for_each_lower_dev(lag_dev, lower, iter) {
|
|
if (netdev_uses_dsa(lower)) {
|
|
new_cpu_dp = lower->dsa_ptr;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (new_cpu_dp) {
|
|
/* Update the CPU port of the user ports still under the LAG
|
|
* so that dsa_port_to_conduit() continues to work properly
|
|
*/
|
|
dsa_tree_for_each_user_port(dp, dst)
|
|
if (dsa_port_to_conduit(dp) == lag_dev)
|
|
dp->cpu_dp = new_cpu_dp;
|
|
|
|
/* Update the index of the virtual CPU port to match the lowest
|
|
* physical CPU port
|
|
*/
|
|
lag_dev->dsa_ptr = new_cpu_dp;
|
|
wmb();
|
|
} else {
|
|
/* If the LAG DSA conduit has no ports left, migrate back all
|
|
* user ports to the first physical CPU port
|
|
*/
|
|
dsa_tree_migrate_ports_from_lag_conduit(dst, lag_dev);
|
|
}
|
|
|
|
/* This DSA conduit has left its LAG in any case, so let
|
|
* the CPU port leave the hardware LAG as well
|
|
*/
|
|
dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr);
|
|
}
|
|
|
|
static int dsa_conduit_changeupper(struct net_device *dev,
|
|
struct netdev_notifier_changeupper_info *info)
|
|
{
|
|
struct netlink_ext_ack *extack;
|
|
int err = NOTIFY_DONE;
|
|
|
|
if (!netdev_uses_dsa(dev))
|
|
return err;
|
|
|
|
extack = netdev_notifier_info_to_extack(&info->info);
|
|
|
|
if (netif_is_lag_master(info->upper_dev)) {
|
|
if (info->linking) {
|
|
err = dsa_conduit_lag_join(dev, info->upper_dev,
|
|
info->upper_info, extack);
|
|
err = notifier_from_errno(err);
|
|
} else {
|
|
dsa_conduit_lag_leave(dev, info->upper_dev);
|
|
err = NOTIFY_OK;
|
|
}
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int dsa_user_netdevice_event(struct notifier_block *nb,
|
|
unsigned long event, void *ptr)
|
|
{
|
|
struct net_device *dev = netdev_notifier_info_to_dev(ptr);
|
|
|
|
switch (event) {
|
|
case NETDEV_PRECHANGEUPPER: {
|
|
struct netdev_notifier_changeupper_info *info = ptr;
|
|
int err;
|
|
|
|
err = dsa_user_prechangeupper_sanity_check(dev, info);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_conduit_prechangeupper_sanity_check(dev, info);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_lag_conduit_prechangelower_sanity_check(dev, info);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_bridge_prechangelower_sanity_check(dev, info);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_user_prechangeupper(dev, ptr);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_user_lag_prechangeupper(dev, ptr);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
break;
|
|
}
|
|
case NETDEV_CHANGEUPPER: {
|
|
int err;
|
|
|
|
err = dsa_user_changeupper(dev, ptr);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_user_lag_changeupper(dev, ptr);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
err = dsa_conduit_changeupper(dev, ptr);
|
|
if (notifier_to_errno(err))
|
|
return err;
|
|
|
|
break;
|
|
}
|
|
case NETDEV_CHANGELOWERSTATE: {
|
|
struct netdev_notifier_changelowerstate_info *info = ptr;
|
|
struct dsa_port *dp;
|
|
int err = 0;
|
|
|
|
if (dsa_user_dev_check(dev)) {
|
|
dp = dsa_user_to_port(dev);
|
|
|
|
err = dsa_port_lag_change(dp, info->lower_state_info);
|
|
}
|
|
|
|
/* Mirror LAG port events on DSA conduits that are in
|
|
* a LAG towards their respective switch CPU ports
|
|
*/
|
|
if (netdev_uses_dsa(dev)) {
|
|
dp = dev->dsa_ptr;
|
|
|
|
err = dsa_port_lag_change(dp, info->lower_state_info);
|
|
}
|
|
|
|
return notifier_from_errno(err);
|
|
}
|
|
case NETDEV_CHANGE:
|
|
case NETDEV_UP: {
|
|
/* Track state of conduit port.
|
|
* DSA driver may require the conduit port (and indirectly
|
|
* the tagger) to be available for some special operation.
|
|
*/
|
|
if (netdev_uses_dsa(dev)) {
|
|
struct dsa_port *cpu_dp = dev->dsa_ptr;
|
|
struct dsa_switch_tree *dst = cpu_dp->ds->dst;
|
|
|
|
/* Track when the conduit port is UP */
|
|
dsa_tree_conduit_oper_state_change(dst, dev,
|
|
netif_oper_up(dev));
|
|
|
|
/* Track when the conduit port is ready and can accept
|
|
* packet.
|
|
* NETDEV_UP event is not enough to flag a port as ready.
|
|
* We also have to wait for linkwatch_do_dev to dev_activate
|
|
* and emit a NETDEV_CHANGE event.
|
|
* We check if a conduit port is ready by checking if the dev
|
|
* have a qdisc assigned and is not noop.
|
|
*/
|
|
dsa_tree_conduit_admin_state_change(dst, dev,
|
|
!qdisc_tx_is_noop(dev));
|
|
|
|
return NOTIFY_OK;
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
case NETDEV_GOING_DOWN: {
|
|
struct dsa_port *dp, *cpu_dp;
|
|
struct dsa_switch_tree *dst;
|
|
LIST_HEAD(close_list);
|
|
|
|
if (!netdev_uses_dsa(dev))
|
|
return NOTIFY_DONE;
|
|
|
|
cpu_dp = dev->dsa_ptr;
|
|
dst = cpu_dp->ds->dst;
|
|
|
|
dsa_tree_conduit_admin_state_change(dst, dev, false);
|
|
|
|
list_for_each_entry(dp, &dst->ports, list) {
|
|
if (!dsa_port_is_user(dp))
|
|
continue;
|
|
|
|
if (dp->cpu_dp != cpu_dp)
|
|
continue;
|
|
|
|
list_add(&dp->user->close_list, &close_list);
|
|
}
|
|
|
|
dev_close_many(&close_list, true);
|
|
|
|
return NOTIFY_OK;
|
|
}
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static void
|
|
dsa_fdb_offload_notify(struct dsa_switchdev_event_work *switchdev_work)
|
|
{
|
|
struct switchdev_notifier_fdb_info info = {};
|
|
|
|
info.addr = switchdev_work->addr;
|
|
info.vid = switchdev_work->vid;
|
|
info.offloaded = true;
|
|
call_switchdev_notifiers(SWITCHDEV_FDB_OFFLOADED,
|
|
switchdev_work->orig_dev, &info.info, NULL);
|
|
}
|
|
|
|
static void dsa_user_switchdev_event_work(struct work_struct *work)
|
|
{
|
|
struct dsa_switchdev_event_work *switchdev_work =
|
|
container_of(work, struct dsa_switchdev_event_work, work);
|
|
const unsigned char *addr = switchdev_work->addr;
|
|
struct net_device *dev = switchdev_work->dev;
|
|
u16 vid = switchdev_work->vid;
|
|
struct dsa_switch *ds;
|
|
struct dsa_port *dp;
|
|
int err;
|
|
|
|
dp = dsa_user_to_port(dev);
|
|
ds = dp->ds;
|
|
|
|
switch (switchdev_work->event) {
|
|
case SWITCHDEV_FDB_ADD_TO_DEVICE:
|
|
if (switchdev_work->host_addr)
|
|
err = dsa_port_bridge_host_fdb_add(dp, addr, vid);
|
|
else if (dp->lag)
|
|
err = dsa_port_lag_fdb_add(dp, addr, vid);
|
|
else
|
|
err = dsa_port_fdb_add(dp, addr, vid);
|
|
if (err) {
|
|
dev_err(ds->dev,
|
|
"port %d failed to add %pM vid %d to fdb: %d\n",
|
|
dp->index, addr, vid, err);
|
|
break;
|
|
}
|
|
dsa_fdb_offload_notify(switchdev_work);
|
|
break;
|
|
|
|
case SWITCHDEV_FDB_DEL_TO_DEVICE:
|
|
if (switchdev_work->host_addr)
|
|
err = dsa_port_bridge_host_fdb_del(dp, addr, vid);
|
|
else if (dp->lag)
|
|
err = dsa_port_lag_fdb_del(dp, addr, vid);
|
|
else
|
|
err = dsa_port_fdb_del(dp, addr, vid);
|
|
if (err) {
|
|
dev_err(ds->dev,
|
|
"port %d failed to delete %pM vid %d from fdb: %d\n",
|
|
dp->index, addr, vid, err);
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
kfree(switchdev_work);
|
|
}
|
|
|
|
static bool dsa_foreign_dev_check(const struct net_device *dev,
|
|
const struct net_device *foreign_dev)
|
|
{
|
|
const struct dsa_port *dp = dsa_user_to_port(dev);
|
|
struct dsa_switch_tree *dst = dp->ds->dst;
|
|
|
|
if (netif_is_bridge_master(foreign_dev))
|
|
return !dsa_tree_offloads_bridge_dev(dst, foreign_dev);
|
|
|
|
if (netif_is_bridge_port(foreign_dev))
|
|
return !dsa_tree_offloads_bridge_port(dst, foreign_dev);
|
|
|
|
/* Everything else is foreign */
|
|
return true;
|
|
}
|
|
|
|
static int dsa_user_fdb_event(struct net_device *dev,
|
|
struct net_device *orig_dev,
|
|
unsigned long event, const void *ctx,
|
|
const struct switchdev_notifier_fdb_info *fdb_info)
|
|
{
|
|
struct dsa_switchdev_event_work *switchdev_work;
|
|
struct dsa_port *dp = dsa_user_to_port(dev);
|
|
bool host_addr = fdb_info->is_local;
|
|
struct dsa_switch *ds = dp->ds;
|
|
|
|
if (ctx && ctx != dp)
|
|
return 0;
|
|
|
|
if (!dp->bridge)
|
|
return 0;
|
|
|
|
if (switchdev_fdb_is_dynamically_learned(fdb_info)) {
|
|
if (dsa_port_offloads_bridge_port(dp, orig_dev))
|
|
return 0;
|
|
|
|
/* FDB entries learned by the software bridge or by foreign
|
|
* bridge ports should be installed as host addresses only if
|
|
* the driver requests assisted learning.
|
|
*/
|
|
if (!ds->assisted_learning_on_cpu_port)
|
|
return 0;
|
|
}
|
|
|
|
/* Also treat FDB entries on foreign interfaces bridged with us as host
|
|
* addresses.
|
|
*/
|
|
if (dsa_foreign_dev_check(dev, orig_dev))
|
|
host_addr = true;
|
|
|
|
/* Check early that we're not doing work in vain.
|
|
* Host addresses on LAG ports still require regular FDB ops,
|
|
* since the CPU port isn't in a LAG.
|
|
*/
|
|
if (dp->lag && !host_addr) {
|
|
if (!ds->ops->lag_fdb_add || !ds->ops->lag_fdb_del)
|
|
return -EOPNOTSUPP;
|
|
} else {
|
|
if (!ds->ops->port_fdb_add || !ds->ops->port_fdb_del)
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
switchdev_work = kzalloc(sizeof(*switchdev_work), GFP_ATOMIC);
|
|
if (!switchdev_work)
|
|
return -ENOMEM;
|
|
|
|
netdev_dbg(dev, "%s FDB entry towards %s, addr %pM vid %d%s\n",
|
|
event == SWITCHDEV_FDB_ADD_TO_DEVICE ? "Adding" : "Deleting",
|
|
orig_dev->name, fdb_info->addr, fdb_info->vid,
|
|
host_addr ? " as host address" : "");
|
|
|
|
INIT_WORK(&switchdev_work->work, dsa_user_switchdev_event_work);
|
|
switchdev_work->event = event;
|
|
switchdev_work->dev = dev;
|
|
switchdev_work->orig_dev = orig_dev;
|
|
|
|
ether_addr_copy(switchdev_work->addr, fdb_info->addr);
|
|
switchdev_work->vid = fdb_info->vid;
|
|
switchdev_work->host_addr = host_addr;
|
|
|
|
dsa_schedule_work(&switchdev_work->work);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Called under rcu_read_lock() */
|
|
static int dsa_user_switchdev_event(struct notifier_block *unused,
|
|
unsigned long event, void *ptr)
|
|
{
|
|
struct net_device *dev = switchdev_notifier_info_to_dev(ptr);
|
|
int err;
|
|
|
|
switch (event) {
|
|
case SWITCHDEV_PORT_ATTR_SET:
|
|
err = switchdev_handle_port_attr_set(dev, ptr,
|
|
dsa_user_dev_check,
|
|
dsa_user_port_attr_set);
|
|
return notifier_from_errno(err);
|
|
case SWITCHDEV_FDB_ADD_TO_DEVICE:
|
|
case SWITCHDEV_FDB_DEL_TO_DEVICE:
|
|
err = switchdev_handle_fdb_event_to_device(dev, event, ptr,
|
|
dsa_user_dev_check,
|
|
dsa_foreign_dev_check,
|
|
dsa_user_fdb_event);
|
|
return notifier_from_errno(err);
|
|
default:
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
return NOTIFY_OK;
|
|
}
|
|
|
|
static int dsa_user_switchdev_blocking_event(struct notifier_block *unused,
|
|
unsigned long event, void *ptr)
|
|
{
|
|
struct net_device *dev = switchdev_notifier_info_to_dev(ptr);
|
|
int err;
|
|
|
|
switch (event) {
|
|
case SWITCHDEV_PORT_OBJ_ADD:
|
|
err = switchdev_handle_port_obj_add_foreign(dev, ptr,
|
|
dsa_user_dev_check,
|
|
dsa_foreign_dev_check,
|
|
dsa_user_port_obj_add);
|
|
return notifier_from_errno(err);
|
|
case SWITCHDEV_PORT_OBJ_DEL:
|
|
err = switchdev_handle_port_obj_del_foreign(dev, ptr,
|
|
dsa_user_dev_check,
|
|
dsa_foreign_dev_check,
|
|
dsa_user_port_obj_del);
|
|
return notifier_from_errno(err);
|
|
case SWITCHDEV_PORT_ATTR_SET:
|
|
err = switchdev_handle_port_attr_set(dev, ptr,
|
|
dsa_user_dev_check,
|
|
dsa_user_port_attr_set);
|
|
return notifier_from_errno(err);
|
|
}
|
|
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static struct notifier_block dsa_user_nb __read_mostly = {
|
|
.notifier_call = dsa_user_netdevice_event,
|
|
};
|
|
|
|
struct notifier_block dsa_user_switchdev_notifier = {
|
|
.notifier_call = dsa_user_switchdev_event,
|
|
};
|
|
|
|
struct notifier_block dsa_user_switchdev_blocking_notifier = {
|
|
.notifier_call = dsa_user_switchdev_blocking_event,
|
|
};
|
|
|
|
int dsa_user_register_notifier(void)
|
|
{
|
|
struct notifier_block *nb;
|
|
int err;
|
|
|
|
err = register_netdevice_notifier(&dsa_user_nb);
|
|
if (err)
|
|
return err;
|
|
|
|
err = register_switchdev_notifier(&dsa_user_switchdev_notifier);
|
|
if (err)
|
|
goto err_switchdev_nb;
|
|
|
|
nb = &dsa_user_switchdev_blocking_notifier;
|
|
err = register_switchdev_blocking_notifier(nb);
|
|
if (err)
|
|
goto err_switchdev_blocking_nb;
|
|
|
|
return 0;
|
|
|
|
err_switchdev_blocking_nb:
|
|
unregister_switchdev_notifier(&dsa_user_switchdev_notifier);
|
|
err_switchdev_nb:
|
|
unregister_netdevice_notifier(&dsa_user_nb);
|
|
return err;
|
|
}
|
|
|
|
void dsa_user_unregister_notifier(void)
|
|
{
|
|
struct notifier_block *nb;
|
|
int err;
|
|
|
|
nb = &dsa_user_switchdev_blocking_notifier;
|
|
err = unregister_switchdev_blocking_notifier(nb);
|
|
if (err)
|
|
pr_err("DSA: failed to unregister switchdev blocking notifier (%d)\n", err);
|
|
|
|
err = unregister_switchdev_notifier(&dsa_user_switchdev_notifier);
|
|
if (err)
|
|
pr_err("DSA: failed to unregister switchdev notifier (%d)\n", err);
|
|
|
|
err = unregister_netdevice_notifier(&dsa_user_nb);
|
|
if (err)
|
|
pr_err("DSA: failed to unregister user notifier (%d)\n", err);
|
|
}
|