xref: /linux/net/dsa/user.c (revision c22ba07c827f2ac84573ac788383a8e1eafe21bc)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * net/dsa/user.c - user device handling
4  * Copyright (c) 2008-2009 Marvell Semiconductor
5  */
6 
7 #include <linux/list.h>
8 #include <linux/etherdevice.h>
9 #include <linux/netdevice.h>
10 #include <linux/phy.h>
11 #include <linux/phy_fixed.h>
12 #include <linux/phylink.h>
13 #include <linux/of_net.h>
14 #include <linux/of_mdio.h>
15 #include <linux/mdio.h>
16 #include <net/rtnetlink.h>
17 #include <net/pkt_cls.h>
18 #include <net/selftests.h>
19 #include <net/tc_act/tc_mirred.h>
20 #include <linux/if_bridge.h>
21 #include <linux/if_hsr.h>
22 #include <net/dcbnl.h>
23 #include <linux/netpoll.h>
24 #include <linux/string.h>
25 
26 #include "conduit.h"
27 #include "dsa.h"
28 #include "netlink.h"
29 #include "port.h"
30 #include "switch.h"
31 #include "tag.h"
32 #include "user.h"
33 
34 struct dsa_switchdev_event_work {
35 	struct net_device *dev;
36 	struct net_device *orig_dev;
37 	struct work_struct work;
38 	unsigned long event;
39 	/* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and
40 	 * SWITCHDEV_FDB_DEL_TO_DEVICE
41 	 */
42 	unsigned char addr[ETH_ALEN];
43 	u16 vid;
44 	bool host_addr;
45 };
46 
47 enum dsa_standalone_event {
48 	DSA_UC_ADD,
49 	DSA_UC_DEL,
50 	DSA_MC_ADD,
51 	DSA_MC_DEL,
52 };
53 
54 struct dsa_standalone_event_work {
55 	struct work_struct work;
56 	struct net_device *dev;
57 	enum dsa_standalone_event event;
58 	unsigned char addr[ETH_ALEN];
59 	u16 vid;
60 };
61 
62 struct dsa_host_vlan_rx_filtering_ctx {
63 	struct net_device *dev;
64 	const unsigned char *addr;
65 	enum dsa_standalone_event event;
66 };
67 
68 static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds)
69 {
70 	return ds->ops->port_fdb_add && ds->ops->port_fdb_del &&
71 	       ds->fdb_isolation && !ds->vlan_filtering_is_global &&
72 	       !ds->needs_standalone_vlan_filtering;
73 }
74 
75 static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds)
76 {
77 	return ds->ops->port_mdb_add && ds->ops->port_mdb_del &&
78 	       ds->fdb_isolation && !ds->vlan_filtering_is_global &&
79 	       !ds->needs_standalone_vlan_filtering;
80 }
81 
82 static void dsa_user_standalone_event_work(struct work_struct *work)
83 {
84 	struct dsa_standalone_event_work *standalone_work =
85 		container_of(work, struct dsa_standalone_event_work, work);
86 	const unsigned char *addr = standalone_work->addr;
87 	struct net_device *dev = standalone_work->dev;
88 	struct dsa_port *dp = dsa_user_to_port(dev);
89 	struct switchdev_obj_port_mdb mdb;
90 	struct dsa_switch *ds = dp->ds;
91 	u16 vid = standalone_work->vid;
92 	int err;
93 
94 	switch (standalone_work->event) {
95 	case DSA_UC_ADD:
96 		err = dsa_port_standalone_host_fdb_add(dp, addr, vid);
97 		if (err) {
98 			dev_err(ds->dev,
99 				"port %d failed to add %pM vid %d to fdb: %d\n",
100 				dp->index, addr, vid, err);
101 			break;
102 		}
103 		break;
104 
105 	case DSA_UC_DEL:
106 		err = dsa_port_standalone_host_fdb_del(dp, addr, vid);
107 		if (err) {
108 			dev_err(ds->dev,
109 				"port %d failed to delete %pM vid %d from fdb: %d\n",
110 				dp->index, addr, vid, err);
111 		}
112 
113 		break;
114 	case DSA_MC_ADD:
115 		ether_addr_copy(mdb.addr, addr);
116 		mdb.vid = vid;
117 
118 		err = dsa_port_standalone_host_mdb_add(dp, &mdb);
119 		if (err) {
120 			dev_err(ds->dev,
121 				"port %d failed to add %pM vid %d to mdb: %d\n",
122 				dp->index, addr, vid, err);
123 			break;
124 		}
125 		break;
126 	case DSA_MC_DEL:
127 		ether_addr_copy(mdb.addr, addr);
128 		mdb.vid = vid;
129 
130 		err = dsa_port_standalone_host_mdb_del(dp, &mdb);
131 		if (err) {
132 			dev_err(ds->dev,
133 				"port %d failed to delete %pM vid %d from mdb: %d\n",
134 				dp->index, addr, vid, err);
135 		}
136 
137 		break;
138 	}
139 
140 	kfree(standalone_work);
141 }
142 
143 static int dsa_user_schedule_standalone_work(struct net_device *dev,
144 					     enum dsa_standalone_event event,
145 					     const unsigned char *addr,
146 					     u16 vid)
147 {
148 	struct dsa_standalone_event_work *standalone_work;
149 
150 	standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC);
151 	if (!standalone_work)
152 		return -ENOMEM;
153 
154 	INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work);
155 	standalone_work->event = event;
156 	standalone_work->dev = dev;
157 
158 	ether_addr_copy(standalone_work->addr, addr);
159 	standalone_work->vid = vid;
160 
161 	dsa_schedule_work(&standalone_work->work);
162 
163 	return 0;
164 }
165 
166 static int dsa_user_host_vlan_rx_filtering(void *arg, int vid)
167 {
168 	struct dsa_host_vlan_rx_filtering_ctx *ctx = arg;
169 
170 	return dsa_user_schedule_standalone_work(ctx->dev, ctx->event,
171 						  ctx->addr, vid);
172 }
173 
174 static int dsa_user_vlan_for_each(struct net_device *dev,
175 				  int (*cb)(void *arg, int vid), void *arg)
176 {
177 	struct dsa_port *dp = dsa_user_to_port(dev);
178 	struct dsa_vlan *v;
179 	int err;
180 
181 	lockdep_assert_held(&dev->addr_list_lock);
182 
183 	err = cb(arg, 0);
184 	if (err)
185 		return err;
186 
187 	list_for_each_entry(v, &dp->user_vlans, list) {
188 		err = cb(arg, v->vid);
189 		if (err)
190 			return err;
191 	}
192 
193 	return 0;
194 }
195 
196 static int dsa_user_sync_uc(struct net_device *dev,
197 			    const unsigned char *addr)
198 {
199 	struct net_device *conduit = dsa_user_to_conduit(dev);
200 	struct dsa_port *dp = dsa_user_to_port(dev);
201 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
202 		.dev = dev,
203 		.addr = addr,
204 		.event = DSA_UC_ADD,
205 	};
206 
207 	dev_uc_add(conduit, addr);
208 
209 	if (!dsa_switch_supports_uc_filtering(dp->ds))
210 		return 0;
211 
212 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
213 				      &ctx);
214 }
215 
216 static int dsa_user_unsync_uc(struct net_device *dev,
217 			      const unsigned char *addr)
218 {
219 	struct net_device *conduit = dsa_user_to_conduit(dev);
220 	struct dsa_port *dp = dsa_user_to_port(dev);
221 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
222 		.dev = dev,
223 		.addr = addr,
224 		.event = DSA_UC_DEL,
225 	};
226 
227 	dev_uc_del(conduit, addr);
228 
229 	if (!dsa_switch_supports_uc_filtering(dp->ds))
230 		return 0;
231 
232 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
233 				      &ctx);
234 }
235 
236 static int dsa_user_sync_mc(struct net_device *dev,
237 			    const unsigned char *addr)
238 {
239 	struct net_device *conduit = dsa_user_to_conduit(dev);
240 	struct dsa_port *dp = dsa_user_to_port(dev);
241 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
242 		.dev = dev,
243 		.addr = addr,
244 		.event = DSA_MC_ADD,
245 	};
246 
247 	dev_mc_add(conduit, addr);
248 
249 	if (!dsa_switch_supports_mc_filtering(dp->ds))
250 		return 0;
251 
252 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
253 				      &ctx);
254 }
255 
256 static int dsa_user_unsync_mc(struct net_device *dev,
257 			      const unsigned char *addr)
258 {
259 	struct net_device *conduit = dsa_user_to_conduit(dev);
260 	struct dsa_port *dp = dsa_user_to_port(dev);
261 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
262 		.dev = dev,
263 		.addr = addr,
264 		.event = DSA_MC_DEL,
265 	};
266 
267 	dev_mc_del(conduit, addr);
268 
269 	if (!dsa_switch_supports_mc_filtering(dp->ds))
270 		return 0;
271 
272 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
273 				      &ctx);
274 }
275 
276 void dsa_user_sync_ha(struct net_device *dev)
277 {
278 	struct dsa_port *dp = dsa_user_to_port(dev);
279 	struct dsa_switch *ds = dp->ds;
280 	struct netdev_hw_addr *ha;
281 
282 	netif_addr_lock_bh(dev);
283 
284 	netdev_for_each_synced_mc_addr(ha, dev)
285 		dsa_user_sync_mc(dev, ha->addr);
286 
287 	netdev_for_each_synced_uc_addr(ha, dev)
288 		dsa_user_sync_uc(dev, ha->addr);
289 
290 	netif_addr_unlock_bh(dev);
291 
292 	if (dsa_switch_supports_uc_filtering(ds) ||
293 	    dsa_switch_supports_mc_filtering(ds))
294 		dsa_flush_workqueue();
295 }
296 
297 void dsa_user_unsync_ha(struct net_device *dev)
298 {
299 	struct dsa_port *dp = dsa_user_to_port(dev);
300 	struct dsa_switch *ds = dp->ds;
301 	struct netdev_hw_addr *ha;
302 
303 	netif_addr_lock_bh(dev);
304 
305 	netdev_for_each_synced_uc_addr(ha, dev)
306 		dsa_user_unsync_uc(dev, ha->addr);
307 
308 	netdev_for_each_synced_mc_addr(ha, dev)
309 		dsa_user_unsync_mc(dev, ha->addr);
310 
311 	netif_addr_unlock_bh(dev);
312 
313 	if (dsa_switch_supports_uc_filtering(ds) ||
314 	    dsa_switch_supports_mc_filtering(ds))
315 		dsa_flush_workqueue();
316 }
317 
318 /* user mii_bus handling ***************************************************/
319 static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg)
320 {
321 	struct dsa_switch *ds = bus->priv;
322 
323 	if (ds->phys_mii_mask & (1 << addr))
324 		return ds->ops->phy_read(ds, addr, reg);
325 
326 	return 0xffff;
327 }
328 
329 static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val)
330 {
331 	struct dsa_switch *ds = bus->priv;
332 
333 	if (ds->phys_mii_mask & (1 << addr))
334 		return ds->ops->phy_write(ds, addr, reg, val);
335 
336 	return 0;
337 }
338 
339 void dsa_user_mii_bus_init(struct dsa_switch *ds)
340 {
341 	ds->user_mii_bus->priv = (void *)ds;
342 	ds->user_mii_bus->name = "dsa user smi";
343 	ds->user_mii_bus->read = dsa_user_phy_read;
344 	ds->user_mii_bus->write = dsa_user_phy_write;
345 	snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d",
346 		 ds->dst->index, ds->index);
347 	ds->user_mii_bus->parent = ds->dev;
348 	ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask;
349 }
350 
351 
352 /* user device handling ****************************************************/
353 static int dsa_user_get_iflink(const struct net_device *dev)
354 {
355 	return READ_ONCE(dsa_user_to_conduit(dev)->ifindex);
356 }
357 
358 int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr)
359 {
360 	struct net_device *conduit = dsa_user_to_conduit(dev);
361 	struct dsa_port *dp = dsa_user_to_port(dev);
362 	struct dsa_switch *ds = dp->ds;
363 	int err;
364 
365 	if (dsa_switch_supports_uc_filtering(ds)) {
366 		err = dsa_port_standalone_host_fdb_add(dp, addr, 0);
367 		if (err)
368 			goto out;
369 	}
370 
371 	if (!ether_addr_equal(addr, conduit->dev_addr)) {
372 		err = dev_uc_add(conduit, addr);
373 		if (err < 0)
374 			goto del_host_addr;
375 	}
376 
377 	return 0;
378 
379 del_host_addr:
380 	if (dsa_switch_supports_uc_filtering(ds))
381 		dsa_port_standalone_host_fdb_del(dp, addr, 0);
382 out:
383 	return err;
384 }
385 
386 void dsa_user_host_uc_uninstall(struct net_device *dev)
387 {
388 	struct net_device *conduit = dsa_user_to_conduit(dev);
389 	struct dsa_port *dp = dsa_user_to_port(dev);
390 	struct dsa_switch *ds = dp->ds;
391 
392 	if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr))
393 		dev_uc_del(conduit, dev->dev_addr);
394 
395 	if (dsa_switch_supports_uc_filtering(ds))
396 		dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0);
397 }
398 
399 static int dsa_user_open(struct net_device *dev)
400 {
401 	struct net_device *conduit = dsa_user_to_conduit(dev);
402 	struct dsa_port *dp = dsa_user_to_port(dev);
403 	int err;
404 
405 	err = dev_open(conduit, NULL);
406 	if (err < 0) {
407 		netdev_err(dev, "failed to open conduit %s\n", conduit->name);
408 		goto out;
409 	}
410 
411 	err = dsa_user_host_uc_install(dev, dev->dev_addr);
412 	if (err)
413 		goto out;
414 
415 	err = dsa_port_enable_rt(dp, dev->phydev);
416 	if (err)
417 		goto out_del_host_uc;
418 
419 	return 0;
420 
421 out_del_host_uc:
422 	dsa_user_host_uc_uninstall(dev);
423 out:
424 	return err;
425 }
426 
427 static int dsa_user_close(struct net_device *dev)
428 {
429 	struct dsa_port *dp = dsa_user_to_port(dev);
430 
431 	dsa_port_disable_rt(dp);
432 
433 	dsa_user_host_uc_uninstall(dev);
434 
435 	return 0;
436 }
437 
438 static void dsa_user_manage_host_flood(struct net_device *dev)
439 {
440 	bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI);
441 	struct dsa_port *dp = dsa_user_to_port(dev);
442 	bool uc = dev->flags & IFF_PROMISC;
443 
444 	dsa_port_set_host_flood(dp, uc, mc);
445 }
446 
447 static void dsa_user_change_rx_flags(struct net_device *dev, int change)
448 {
449 	struct net_device *conduit = dsa_user_to_conduit(dev);
450 	struct dsa_port *dp = dsa_user_to_port(dev);
451 	struct dsa_switch *ds = dp->ds;
452 
453 	if (change & IFF_ALLMULTI)
454 		dev_set_allmulti(conduit,
455 				 dev->flags & IFF_ALLMULTI ? 1 : -1);
456 	if (change & IFF_PROMISC)
457 		dev_set_promiscuity(conduit,
458 				    dev->flags & IFF_PROMISC ? 1 : -1);
459 
460 	if (dsa_switch_supports_uc_filtering(ds) &&
461 	    dsa_switch_supports_mc_filtering(ds))
462 		dsa_user_manage_host_flood(dev);
463 }
464 
465 static void dsa_user_set_rx_mode(struct net_device *dev)
466 {
467 	__dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc);
468 	__dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc);
469 }
470 
471 static int dsa_user_set_mac_address(struct net_device *dev, void *a)
472 {
473 	struct dsa_port *dp = dsa_user_to_port(dev);
474 	struct dsa_switch *ds = dp->ds;
475 	struct sockaddr *addr = a;
476 	int err;
477 
478 	if (!is_valid_ether_addr(addr->sa_data))
479 		return -EADDRNOTAVAIL;
480 
481 	if (ds->ops->port_set_mac_address) {
482 		err = ds->ops->port_set_mac_address(ds, dp->index,
483 						    addr->sa_data);
484 		if (err)
485 			return err;
486 	}
487 
488 	/* If the port is down, the address isn't synced yet to hardware or
489 	 * to the DSA conduit, so there is nothing to change.
490 	 */
491 	if (!(dev->flags & IFF_UP))
492 		goto out_change_dev_addr;
493 
494 	err = dsa_user_host_uc_install(dev, addr->sa_data);
495 	if (err)
496 		return err;
497 
498 	dsa_user_host_uc_uninstall(dev);
499 
500 out_change_dev_addr:
501 	eth_hw_addr_set(dev, addr->sa_data);
502 
503 	return 0;
504 }
505 
506 struct dsa_user_dump_ctx {
507 	struct net_device *dev;
508 	struct sk_buff *skb;
509 	struct netlink_callback *cb;
510 	int idx;
511 };
512 
513 static int
514 dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid,
515 			  bool is_static, void *data)
516 {
517 	struct dsa_user_dump_ctx *dump = data;
518 	struct ndo_fdb_dump_context *ctx = (void *)dump->cb->ctx;
519 	u32 portid = NETLINK_CB(dump->cb->skb).portid;
520 	u32 seq = dump->cb->nlh->nlmsg_seq;
521 	struct nlmsghdr *nlh;
522 	struct ndmsg *ndm;
523 
524 	if (dump->idx < ctx->fdb_idx)
525 		goto skip;
526 
527 	nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH,
528 			sizeof(*ndm), NLM_F_MULTI);
529 	if (!nlh)
530 		return -EMSGSIZE;
531 
532 	ndm = nlmsg_data(nlh);
533 	ndm->ndm_family  = AF_BRIDGE;
534 	ndm->ndm_pad1    = 0;
535 	ndm->ndm_pad2    = 0;
536 	ndm->ndm_flags   = NTF_SELF;
537 	ndm->ndm_type    = 0;
538 	ndm->ndm_ifindex = dump->dev->ifindex;
539 	ndm->ndm_state   = is_static ? NUD_NOARP : NUD_REACHABLE;
540 
541 	if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr))
542 		goto nla_put_failure;
543 
544 	if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid))
545 		goto nla_put_failure;
546 
547 	nlmsg_end(dump->skb, nlh);
548 
549 skip:
550 	dump->idx++;
551 	return 0;
552 
553 nla_put_failure:
554 	nlmsg_cancel(dump->skb, nlh);
555 	return -EMSGSIZE;
556 }
557 
558 static int
559 dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb,
560 		  struct net_device *dev, struct net_device *filter_dev,
561 		  int *idx)
562 {
563 	struct dsa_port *dp = dsa_user_to_port(dev);
564 	struct dsa_user_dump_ctx dump = {
565 		.dev = dev,
566 		.skb = skb,
567 		.cb = cb,
568 		.idx = *idx,
569 	};
570 	int err;
571 
572 	err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump);
573 	*idx = dump.idx;
574 
575 	return err;
576 }
577 
578 static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
579 {
580 	struct dsa_user_priv *p = netdev_priv(dev);
581 
582 	return phylink_mii_ioctl(p->dp->pl, ifr, cmd);
583 }
584 
585 static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx,
586 				  const struct switchdev_attr *attr,
587 				  struct netlink_ext_ack *extack)
588 {
589 	struct dsa_port *dp = dsa_user_to_port(dev);
590 	int ret;
591 
592 	if (ctx && ctx != dp)
593 		return 0;
594 
595 	switch (attr->id) {
596 	case SWITCHDEV_ATTR_ID_PORT_STP_STATE:
597 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
598 			return -EOPNOTSUPP;
599 
600 		ret = dsa_port_set_state(dp, attr->u.stp_state, true);
601 		break;
602 	case SWITCHDEV_ATTR_ID_PORT_MST_STATE:
603 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
604 			return -EOPNOTSUPP;
605 
606 		ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack);
607 		break;
608 	case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING:
609 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
610 			return -EOPNOTSUPP;
611 
612 		ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering,
613 					      extack);
614 		break;
615 	case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME:
616 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
617 			return -EOPNOTSUPP;
618 
619 		ret = dsa_port_ageing_time(dp, attr->u.ageing_time);
620 		break;
621 	case SWITCHDEV_ATTR_ID_BRIDGE_MST:
622 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
623 			return -EOPNOTSUPP;
624 
625 		ret = dsa_port_mst_enable(dp, attr->u.mst, extack);
626 		break;
627 	case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS:
628 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
629 			return -EOPNOTSUPP;
630 
631 		ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags,
632 						extack);
633 		break;
634 	case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS:
635 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
636 			return -EOPNOTSUPP;
637 
638 		ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack);
639 		break;
640 	case SWITCHDEV_ATTR_ID_VLAN_MSTI:
641 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
642 			return -EOPNOTSUPP;
643 
644 		ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti);
645 		break;
646 	default:
647 		ret = -EOPNOTSUPP;
648 		break;
649 	}
650 
651 	return ret;
652 }
653 
654 /* Must be called under rcu_read_lock() */
655 static int
656 dsa_user_vlan_check_for_8021q_uppers(struct net_device *user,
657 				     const struct switchdev_obj_port_vlan *vlan)
658 {
659 	struct net_device *upper_dev;
660 	struct list_head *iter;
661 
662 	netdev_for_each_upper_dev_rcu(user, upper_dev, iter) {
663 		u16 vid;
664 
665 		if (!is_vlan_dev(upper_dev))
666 			continue;
667 
668 		vid = vlan_dev_vlan_id(upper_dev);
669 		if (vid == vlan->vid)
670 			return -EBUSY;
671 	}
672 
673 	return 0;
674 }
675 
676 static int dsa_user_vlan_add(struct net_device *dev,
677 			     const struct switchdev_obj *obj,
678 			     struct netlink_ext_ack *extack)
679 {
680 	struct dsa_port *dp = dsa_user_to_port(dev);
681 	struct switchdev_obj_port_vlan *vlan;
682 	int err;
683 
684 	if (dsa_port_skip_vlan_configuration(dp)) {
685 		NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN");
686 		return 0;
687 	}
688 
689 	vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
690 
691 	/* Deny adding a bridge VLAN when there is already an 802.1Q upper with
692 	 * the same VID.
693 	 */
694 	if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) {
695 		rcu_read_lock();
696 		err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan);
697 		rcu_read_unlock();
698 		if (err) {
699 			NL_SET_ERR_MSG_MOD(extack,
700 					   "Port already has a VLAN upper with this VID");
701 			return err;
702 		}
703 	}
704 
705 	return dsa_port_vlan_add(dp, vlan, extack);
706 }
707 
708 /* Offload a VLAN installed on the bridge or on a foreign interface by
709  * installing it as a VLAN towards the CPU port.
710  */
711 static int dsa_user_host_vlan_add(struct net_device *dev,
712 				  const struct switchdev_obj *obj,
713 				  struct netlink_ext_ack *extack)
714 {
715 	struct dsa_port *dp = dsa_user_to_port(dev);
716 	struct switchdev_obj_port_vlan vlan;
717 
718 	/* Do nothing if this is a software bridge */
719 	if (!dp->bridge)
720 		return -EOPNOTSUPP;
721 
722 	if (dsa_port_skip_vlan_configuration(dp)) {
723 		NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN");
724 		return 0;
725 	}
726 
727 	vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj);
728 
729 	/* Even though drivers often handle CPU membership in special ways,
730 	 * it doesn't make sense to program a PVID, so clear this flag.
731 	 */
732 	vlan.flags &= ~BRIDGE_VLAN_INFO_PVID;
733 
734 	return dsa_port_host_vlan_add(dp, &vlan, extack);
735 }
736 
737 static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx,
738 				 const struct switchdev_obj *obj,
739 				 struct netlink_ext_ack *extack)
740 {
741 	struct dsa_port *dp = dsa_user_to_port(dev);
742 	int err;
743 
744 	if (ctx && ctx != dp)
745 		return 0;
746 
747 	switch (obj->id) {
748 	case SWITCHDEV_OBJ_ID_PORT_MDB:
749 		if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev))
750 			return -EOPNOTSUPP;
751 
752 		err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
753 		break;
754 	case SWITCHDEV_OBJ_ID_HOST_MDB:
755 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
756 			return -EOPNOTSUPP;
757 
758 		err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
759 		break;
760 	case SWITCHDEV_OBJ_ID_PORT_VLAN:
761 		if (dsa_port_offloads_bridge_port(dp, obj->orig_dev))
762 			err = dsa_user_vlan_add(dev, obj, extack);
763 		else
764 			err = dsa_user_host_vlan_add(dev, obj, extack);
765 		break;
766 	case SWITCHDEV_OBJ_ID_MRP:
767 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
768 			return -EOPNOTSUPP;
769 
770 		err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj));
771 		break;
772 	case SWITCHDEV_OBJ_ID_RING_ROLE_MRP:
773 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
774 			return -EOPNOTSUPP;
775 
776 		err = dsa_port_mrp_add_ring_role(dp,
777 						 SWITCHDEV_OBJ_RING_ROLE_MRP(obj));
778 		break;
779 	default:
780 		err = -EOPNOTSUPP;
781 		break;
782 	}
783 
784 	return err;
785 }
786 
787 static int dsa_user_vlan_del(struct net_device *dev,
788 			     const struct switchdev_obj *obj)
789 {
790 	struct dsa_port *dp = dsa_user_to_port(dev);
791 	struct switchdev_obj_port_vlan *vlan;
792 
793 	if (dsa_port_skip_vlan_configuration(dp))
794 		return 0;
795 
796 	vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
797 
798 	return dsa_port_vlan_del(dp, vlan);
799 }
800 
801 static int dsa_user_host_vlan_del(struct net_device *dev,
802 				  const struct switchdev_obj *obj)
803 {
804 	struct dsa_port *dp = dsa_user_to_port(dev);
805 	struct switchdev_obj_port_vlan *vlan;
806 
807 	/* Do nothing if this is a software bridge */
808 	if (!dp->bridge)
809 		return -EOPNOTSUPP;
810 
811 	if (dsa_port_skip_vlan_configuration(dp))
812 		return 0;
813 
814 	vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
815 
816 	return dsa_port_host_vlan_del(dp, vlan);
817 }
818 
819 static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx,
820 				 const struct switchdev_obj *obj)
821 {
822 	struct dsa_port *dp = dsa_user_to_port(dev);
823 	int err;
824 
825 	if (ctx && ctx != dp)
826 		return 0;
827 
828 	switch (obj->id) {
829 	case SWITCHDEV_OBJ_ID_PORT_MDB:
830 		if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev))
831 			return -EOPNOTSUPP;
832 
833 		err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
834 		break;
835 	case SWITCHDEV_OBJ_ID_HOST_MDB:
836 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
837 			return -EOPNOTSUPP;
838 
839 		err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
840 		break;
841 	case SWITCHDEV_OBJ_ID_PORT_VLAN:
842 		if (dsa_port_offloads_bridge_port(dp, obj->orig_dev))
843 			err = dsa_user_vlan_del(dev, obj);
844 		else
845 			err = dsa_user_host_vlan_del(dev, obj);
846 		break;
847 	case SWITCHDEV_OBJ_ID_MRP:
848 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
849 			return -EOPNOTSUPP;
850 
851 		err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj));
852 		break;
853 	case SWITCHDEV_OBJ_ID_RING_ROLE_MRP:
854 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
855 			return -EOPNOTSUPP;
856 
857 		err = dsa_port_mrp_del_ring_role(dp,
858 						 SWITCHDEV_OBJ_RING_ROLE_MRP(obj));
859 		break;
860 	default:
861 		err = -EOPNOTSUPP;
862 		break;
863 	}
864 
865 	return err;
866 }
867 
868 static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev,
869 					     struct sk_buff *skb)
870 {
871 #ifdef CONFIG_NET_POLL_CONTROLLER
872 	struct dsa_user_priv *p = netdev_priv(dev);
873 
874 	return netpoll_send_skb(p->netpoll, skb);
875 #else
876 	BUG();
877 	return NETDEV_TX_OK;
878 #endif
879 }
880 
881 static void dsa_skb_tx_timestamp(struct dsa_user_priv *p,
882 				 struct sk_buff *skb)
883 {
884 	struct dsa_switch *ds = p->dp->ds;
885 
886 	if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP_NOBPF))
887 		return;
888 
889 	if (!ds->ops->port_txtstamp)
890 		return;
891 
892 	ds->ops->port_txtstamp(ds, p->dp->index, skb);
893 }
894 
895 netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev)
896 {
897 	/* SKB for netpoll still need to be mangled with the protocol-specific
898 	 * tag to be successfully transmitted
899 	 */
900 	if (unlikely(netpoll_tx_running(dev)))
901 		return dsa_user_netpoll_send_skb(dev, skb);
902 
903 	/* Queue the SKB for transmission on the parent interface, but
904 	 * do not modify its EtherType
905 	 */
906 	skb->dev = dsa_user_to_conduit(dev);
907 	dev_queue_xmit(skb);
908 
909 	return NETDEV_TX_OK;
910 }
911 EXPORT_SYMBOL_GPL(dsa_enqueue_skb);
912 
913 static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev)
914 {
915 	struct dsa_user_priv *p = netdev_priv(dev);
916 	struct sk_buff *nskb;
917 
918 	dev_sw_netstats_tx_add(dev, 1, skb->len);
919 
920 	memset(skb->cb, 0, sizeof(skb->cb));
921 
922 	/* Handle tx timestamp if any */
923 	dsa_skb_tx_timestamp(p, skb);
924 
925 	if (skb_ensure_writable_head_tail(skb, dev)) {
926 		dev_kfree_skb_any(skb);
927 		return NETDEV_TX_OK;
928 	}
929 
930 	/* needed_tailroom should still be 'warm' in the cache line from
931 	 * skb_ensure_writable_head_tail(), which has also ensured that
932 	 * padding is safe.
933 	 */
934 	if (dev->needed_tailroom)
935 		eth_skb_pad(skb);
936 
937 	/* Transmit function may have to reallocate the original SKB,
938 	 * in which case it must have freed it. Only free it here on error.
939 	 */
940 	nskb = p->xmit(skb, dev);
941 	if (!nskb) {
942 		kfree_skb(skb);
943 		return NETDEV_TX_OK;
944 	}
945 
946 	return dsa_enqueue_skb(nskb, dev);
947 }
948 
949 /* ethtool operations *******************************************************/
950 
951 static void dsa_user_get_drvinfo(struct net_device *dev,
952 				 struct ethtool_drvinfo *drvinfo)
953 {
954 	strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver));
955 	strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version));
956 	strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info));
957 }
958 
959 static int dsa_user_get_regs_len(struct net_device *dev)
960 {
961 	struct dsa_port *dp = dsa_user_to_port(dev);
962 	struct dsa_switch *ds = dp->ds;
963 
964 	if (ds->ops->get_regs_len)
965 		return ds->ops->get_regs_len(ds, dp->index);
966 
967 	return -EOPNOTSUPP;
968 }
969 
970 static void
971 dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p)
972 {
973 	struct dsa_port *dp = dsa_user_to_port(dev);
974 	struct dsa_switch *ds = dp->ds;
975 
976 	if (ds->ops->get_regs)
977 		ds->ops->get_regs(ds, dp->index, regs, _p);
978 }
979 
980 static int dsa_user_nway_reset(struct net_device *dev)
981 {
982 	struct dsa_port *dp = dsa_user_to_port(dev);
983 
984 	return phylink_ethtool_nway_reset(dp->pl);
985 }
986 
987 static int dsa_user_get_eeprom_len(struct net_device *dev)
988 {
989 	struct dsa_port *dp = dsa_user_to_port(dev);
990 	struct dsa_switch *ds = dp->ds;
991 
992 	if (ds->cd && ds->cd->eeprom_len)
993 		return ds->cd->eeprom_len;
994 
995 	if (ds->ops->get_eeprom_len)
996 		return ds->ops->get_eeprom_len(ds);
997 
998 	return 0;
999 }
1000 
1001 static int dsa_user_get_eeprom(struct net_device *dev,
1002 			       struct ethtool_eeprom *eeprom, u8 *data)
1003 {
1004 	struct dsa_port *dp = dsa_user_to_port(dev);
1005 	struct dsa_switch *ds = dp->ds;
1006 
1007 	if (ds->ops->get_eeprom)
1008 		return ds->ops->get_eeprom(ds, eeprom, data);
1009 
1010 	return -EOPNOTSUPP;
1011 }
1012 
1013 static int dsa_user_set_eeprom(struct net_device *dev,
1014 			       struct ethtool_eeprom *eeprom, u8 *data)
1015 {
1016 	struct dsa_port *dp = dsa_user_to_port(dev);
1017 	struct dsa_switch *ds = dp->ds;
1018 
1019 	if (ds->ops->set_eeprom)
1020 		return ds->ops->set_eeprom(ds, eeprom, data);
1021 
1022 	return -EOPNOTSUPP;
1023 }
1024 
1025 static void dsa_user_get_strings(struct net_device *dev,
1026 				 uint32_t stringset, uint8_t *data)
1027 {
1028 	struct dsa_port *dp = dsa_user_to_port(dev);
1029 	struct dsa_switch *ds = dp->ds;
1030 
1031 	if (stringset == ETH_SS_STATS) {
1032 		ethtool_puts(&data, "tx_packets");
1033 		ethtool_puts(&data, "tx_bytes");
1034 		ethtool_puts(&data, "rx_packets");
1035 		ethtool_puts(&data, "rx_bytes");
1036 		if (ds->ops->get_strings)
1037 			ds->ops->get_strings(ds, dp->index, stringset, data);
1038 	} else if (stringset ==  ETH_SS_TEST) {
1039 		net_selftest_get_strings(data);
1040 	}
1041 
1042 }
1043 
1044 static void dsa_user_get_ethtool_stats(struct net_device *dev,
1045 				       struct ethtool_stats *stats,
1046 				       uint64_t *data)
1047 {
1048 	struct dsa_port *dp = dsa_user_to_port(dev);
1049 	struct dsa_switch *ds = dp->ds;
1050 	struct pcpu_sw_netstats *s;
1051 	unsigned int start;
1052 	int i;
1053 
1054 	for_each_possible_cpu(i) {
1055 		u64 tx_packets, tx_bytes, rx_packets, rx_bytes;
1056 
1057 		s = per_cpu_ptr(dev->tstats, i);
1058 		do {
1059 			start = u64_stats_fetch_begin(&s->syncp);
1060 			tx_packets = u64_stats_read(&s->tx_packets);
1061 			tx_bytes = u64_stats_read(&s->tx_bytes);
1062 			rx_packets = u64_stats_read(&s->rx_packets);
1063 			rx_bytes = u64_stats_read(&s->rx_bytes);
1064 		} while (u64_stats_fetch_retry(&s->syncp, start));
1065 		data[0] += tx_packets;
1066 		data[1] += tx_bytes;
1067 		data[2] += rx_packets;
1068 		data[3] += rx_bytes;
1069 	}
1070 	if (ds->ops->get_ethtool_stats)
1071 		ds->ops->get_ethtool_stats(ds, dp->index, data + 4);
1072 }
1073 
1074 static int dsa_user_get_sset_count(struct net_device *dev, int sset)
1075 {
1076 	struct dsa_port *dp = dsa_user_to_port(dev);
1077 	struct dsa_switch *ds = dp->ds;
1078 
1079 	if (sset == ETH_SS_STATS) {
1080 		int count = 0;
1081 
1082 		if (ds->ops->get_sset_count) {
1083 			count = ds->ops->get_sset_count(ds, dp->index, sset);
1084 			if (count < 0)
1085 				return count;
1086 		}
1087 
1088 		return count + 4;
1089 	} else if (sset ==  ETH_SS_TEST) {
1090 		return net_selftest_get_count();
1091 	}
1092 
1093 	return -EOPNOTSUPP;
1094 }
1095 
1096 static void dsa_user_get_eth_phy_stats(struct net_device *dev,
1097 				       struct ethtool_eth_phy_stats *phy_stats)
1098 {
1099 	struct dsa_port *dp = dsa_user_to_port(dev);
1100 	struct dsa_switch *ds = dp->ds;
1101 
1102 	if (ds->ops->get_eth_phy_stats)
1103 		ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats);
1104 }
1105 
1106 static void dsa_user_get_eth_mac_stats(struct net_device *dev,
1107 				       struct ethtool_eth_mac_stats *mac_stats)
1108 {
1109 	struct dsa_port *dp = dsa_user_to_port(dev);
1110 	struct dsa_switch *ds = dp->ds;
1111 
1112 	if (ds->ops->get_eth_mac_stats)
1113 		ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats);
1114 }
1115 
1116 static void
1117 dsa_user_get_eth_ctrl_stats(struct net_device *dev,
1118 			    struct ethtool_eth_ctrl_stats *ctrl_stats)
1119 {
1120 	struct dsa_port *dp = dsa_user_to_port(dev);
1121 	struct dsa_switch *ds = dp->ds;
1122 
1123 	if (ds->ops->get_eth_ctrl_stats)
1124 		ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats);
1125 }
1126 
1127 static void
1128 dsa_user_get_rmon_stats(struct net_device *dev,
1129 			struct ethtool_rmon_stats *rmon_stats,
1130 			const struct ethtool_rmon_hist_range **ranges)
1131 {
1132 	struct dsa_port *dp = dsa_user_to_port(dev);
1133 	struct dsa_switch *ds = dp->ds;
1134 
1135 	if (ds->ops->get_rmon_stats)
1136 		ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges);
1137 }
1138 
1139 static void dsa_user_get_ts_stats(struct net_device *dev,
1140 				  struct ethtool_ts_stats *ts_stats)
1141 {
1142 	struct dsa_port *dp = dsa_user_to_port(dev);
1143 	struct dsa_switch *ds = dp->ds;
1144 
1145 	if (ds->ops->get_ts_stats)
1146 		ds->ops->get_ts_stats(ds, dp->index, ts_stats);
1147 }
1148 
1149 static void dsa_user_net_selftest(struct net_device *ndev,
1150 				  struct ethtool_test *etest, u64 *buf)
1151 {
1152 	struct dsa_port *dp = dsa_user_to_port(ndev);
1153 	struct dsa_switch *ds = dp->ds;
1154 
1155 	if (ds->ops->self_test) {
1156 		ds->ops->self_test(ds, dp->index, etest, buf);
1157 		return;
1158 	}
1159 
1160 	net_selftest(ndev, etest, buf);
1161 }
1162 
1163 static int dsa_user_get_mm(struct net_device *dev,
1164 			   struct ethtool_mm_state *state)
1165 {
1166 	struct dsa_port *dp = dsa_user_to_port(dev);
1167 	struct dsa_switch *ds = dp->ds;
1168 
1169 	if (!ds->ops->get_mm)
1170 		return -EOPNOTSUPP;
1171 
1172 	return ds->ops->get_mm(ds, dp->index, state);
1173 }
1174 
1175 static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg,
1176 			   struct netlink_ext_ack *extack)
1177 {
1178 	struct dsa_port *dp = dsa_user_to_port(dev);
1179 	struct dsa_switch *ds = dp->ds;
1180 
1181 	if (!ds->ops->set_mm)
1182 		return -EOPNOTSUPP;
1183 
1184 	return ds->ops->set_mm(ds, dp->index, cfg, extack);
1185 }
1186 
1187 static void dsa_user_get_mm_stats(struct net_device *dev,
1188 				  struct ethtool_mm_stats *stats)
1189 {
1190 	struct dsa_port *dp = dsa_user_to_port(dev);
1191 	struct dsa_switch *ds = dp->ds;
1192 
1193 	if (ds->ops->get_mm_stats)
1194 		ds->ops->get_mm_stats(ds, dp->index, stats);
1195 }
1196 
1197 static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w)
1198 {
1199 	struct dsa_port *dp = dsa_user_to_port(dev);
1200 	struct dsa_switch *ds = dp->ds;
1201 
1202 	phylink_ethtool_get_wol(dp->pl, w);
1203 
1204 	if (ds->ops->get_wol)
1205 		ds->ops->get_wol(ds, dp->index, w);
1206 }
1207 
1208 static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w)
1209 {
1210 	struct dsa_port *dp = dsa_user_to_port(dev);
1211 	struct dsa_switch *ds = dp->ds;
1212 	int ret = -EOPNOTSUPP;
1213 
1214 	phylink_ethtool_set_wol(dp->pl, w);
1215 
1216 	if (ds->ops->set_wol)
1217 		ret = ds->ops->set_wol(ds, dp->index, w);
1218 
1219 	return ret;
1220 }
1221 
1222 static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e)
1223 {
1224 	struct dsa_port *dp = dsa_user_to_port(dev);
1225 	struct dsa_switch *ds = dp->ds;
1226 	int ret;
1227 
1228 	/* Check whether the switch supports EEE */
1229 	if (!ds->ops->support_eee || !ds->ops->support_eee(ds, dp->index))
1230 		return -EOPNOTSUPP;
1231 
1232 	/* If the port is using phylink managed EEE, then an unimplemented
1233 	 * set_mac_eee() is permissible.
1234 	 */
1235 	if (!phylink_mac_implements_lpi(ds->phylink_mac_ops)) {
1236 		/* Port's PHY and MAC both need to be EEE capable */
1237 		if (!dev->phydev)
1238 			return -ENODEV;
1239 
1240 		if (!ds->ops->set_mac_eee)
1241 			return -EOPNOTSUPP;
1242 
1243 		ret = ds->ops->set_mac_eee(ds, dp->index, e);
1244 		if (ret)
1245 			return ret;
1246 	} else if (ds->ops->set_mac_eee) {
1247 		ret = ds->ops->set_mac_eee(ds, dp->index, e);
1248 		if (ret)
1249 			return ret;
1250 	}
1251 
1252 	return phylink_ethtool_set_eee(dp->pl, e);
1253 }
1254 
1255 static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e)
1256 {
1257 	struct dsa_port *dp = dsa_user_to_port(dev);
1258 	struct dsa_switch *ds = dp->ds;
1259 
1260 	/* Check whether the switch supports EEE */
1261 	if (!ds->ops->support_eee || !ds->ops->support_eee(ds, dp->index))
1262 		return -EOPNOTSUPP;
1263 
1264 	/* Port's PHY and MAC both need to be EEE capable */
1265 	if (!dev->phydev)
1266 		return -ENODEV;
1267 
1268 	return phylink_ethtool_get_eee(dp->pl, e);
1269 }
1270 
1271 static int dsa_user_get_link_ksettings(struct net_device *dev,
1272 				       struct ethtool_link_ksettings *cmd)
1273 {
1274 	struct dsa_port *dp = dsa_user_to_port(dev);
1275 
1276 	return phylink_ethtool_ksettings_get(dp->pl, cmd);
1277 }
1278 
1279 static int dsa_user_set_link_ksettings(struct net_device *dev,
1280 				       const struct ethtool_link_ksettings *cmd)
1281 {
1282 	struct dsa_port *dp = dsa_user_to_port(dev);
1283 
1284 	return phylink_ethtool_ksettings_set(dp->pl, cmd);
1285 }
1286 
1287 static void dsa_user_get_pause_stats(struct net_device *dev,
1288 				     struct ethtool_pause_stats *pause_stats)
1289 {
1290 	struct dsa_port *dp = dsa_user_to_port(dev);
1291 	struct dsa_switch *ds = dp->ds;
1292 
1293 	if (ds->ops->get_pause_stats)
1294 		ds->ops->get_pause_stats(ds, dp->index, pause_stats);
1295 }
1296 
1297 static void dsa_user_get_pauseparam(struct net_device *dev,
1298 				    struct ethtool_pauseparam *pause)
1299 {
1300 	struct dsa_port *dp = dsa_user_to_port(dev);
1301 
1302 	phylink_ethtool_get_pauseparam(dp->pl, pause);
1303 }
1304 
1305 static int dsa_user_set_pauseparam(struct net_device *dev,
1306 				   struct ethtool_pauseparam *pause)
1307 {
1308 	struct dsa_port *dp = dsa_user_to_port(dev);
1309 
1310 	return phylink_ethtool_set_pauseparam(dp->pl, pause);
1311 }
1312 
1313 #ifdef CONFIG_NET_POLL_CONTROLLER
1314 static int dsa_user_netpoll_setup(struct net_device *dev)
1315 {
1316 	struct net_device *conduit = dsa_user_to_conduit(dev);
1317 	struct dsa_user_priv *p = netdev_priv(dev);
1318 	struct netpoll *netpoll;
1319 	int err = 0;
1320 
1321 	netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL);
1322 	if (!netpoll)
1323 		return -ENOMEM;
1324 
1325 	err = __netpoll_setup(netpoll, conduit);
1326 	if (err) {
1327 		kfree(netpoll);
1328 		goto out;
1329 	}
1330 
1331 	p->netpoll = netpoll;
1332 out:
1333 	return err;
1334 }
1335 
1336 static void dsa_user_netpoll_cleanup(struct net_device *dev)
1337 {
1338 	struct dsa_user_priv *p = netdev_priv(dev);
1339 	struct netpoll *netpoll = p->netpoll;
1340 
1341 	if (!netpoll)
1342 		return;
1343 
1344 	p->netpoll = NULL;
1345 
1346 	__netpoll_free(netpoll);
1347 }
1348 
1349 static void dsa_user_poll_controller(struct net_device *dev)
1350 {
1351 }
1352 #endif
1353 
1354 static struct dsa_mall_tc_entry *
1355 dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie)
1356 {
1357 	struct dsa_user_priv *p = netdev_priv(dev);
1358 	struct dsa_mall_tc_entry *mall_tc_entry;
1359 
1360 	list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list)
1361 		if (mall_tc_entry->cookie == cookie)
1362 			return mall_tc_entry;
1363 
1364 	return NULL;
1365 }
1366 
1367 static int
1368 dsa_user_add_cls_matchall_mirred(struct net_device *dev,
1369 				 struct tc_cls_matchall_offload *cls,
1370 				 bool ingress, bool ingress_target)
1371 {
1372 	struct netlink_ext_ack *extack = cls->common.extack;
1373 	struct dsa_port *dp = dsa_user_to_port(dev);
1374 	struct dsa_user_priv *p = netdev_priv(dev);
1375 	struct dsa_mall_mirror_tc_entry *mirror;
1376 	struct dsa_mall_tc_entry *mall_tc_entry;
1377 	struct dsa_switch *ds = dp->ds;
1378 	struct flow_action_entry *act;
1379 	struct dsa_port *to_dp;
1380 	int err;
1381 
1382 	if (cls->common.protocol != htons(ETH_P_ALL)) {
1383 		NL_SET_ERR_MSG_MOD(extack,
1384 				   "Can only offload \"protocol all\" matchall filter");
1385 		return -EOPNOTSUPP;
1386 	}
1387 
1388 	if (!ds->ops->port_mirror_add) {
1389 		NL_SET_ERR_MSG_MOD(extack,
1390 				   "Switch does not support mirroring operation");
1391 		return -EOPNOTSUPP;
1392 	}
1393 
1394 	if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack))
1395 		return -EOPNOTSUPP;
1396 
1397 	act = &cls->rule->action.entries[0];
1398 
1399 	if (!act->dev)
1400 		return -EINVAL;
1401 
1402 	if (dsa_user_dev_check(act->dev)) {
1403 		if (ingress_target) {
1404 			/* We can only fulfill this using software assist */
1405 			if (cls->common.skip_sw) {
1406 				NL_SET_ERR_MSG_MOD(extack,
1407 						   "Can only mirred to ingress of DSA user port if filter also runs in software");
1408 				return -EOPNOTSUPP;
1409 			}
1410 			to_dp = dp->cpu_dp;
1411 		} else {
1412 			to_dp = dsa_user_to_port(act->dev);
1413 		}
1414 	} else {
1415 		/* Handle mirroring to foreign target ports as a mirror towards
1416 		 * the CPU. The software tc rule will take the packets from
1417 		 * there.
1418 		 */
1419 		if (cls->common.skip_sw) {
1420 			NL_SET_ERR_MSG_MOD(extack,
1421 					   "Can only mirred to CPU if filter also runs in software");
1422 			return -EOPNOTSUPP;
1423 		}
1424 		to_dp = dp->cpu_dp;
1425 	}
1426 
1427 	if (dp->ds != to_dp->ds) {
1428 		NL_SET_ERR_MSG_MOD(extack,
1429 				   "Cross-chip mirroring not implemented");
1430 		return -EOPNOTSUPP;
1431 	}
1432 
1433 	mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL);
1434 	if (!mall_tc_entry)
1435 		return -ENOMEM;
1436 
1437 	mall_tc_entry->cookie = cls->cookie;
1438 	mall_tc_entry->type = DSA_PORT_MALL_MIRROR;
1439 	mirror = &mall_tc_entry->mirror;
1440 	mirror->to_local_port = to_dp->index;
1441 	mirror->ingress = ingress;
1442 
1443 	err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack);
1444 	if (err) {
1445 		kfree(mall_tc_entry);
1446 		return err;
1447 	}
1448 
1449 	list_add_tail(&mall_tc_entry->list, &p->mall_tc_list);
1450 
1451 	return err;
1452 }
1453 
1454 static int
1455 dsa_user_add_cls_matchall_police(struct net_device *dev,
1456 				 struct tc_cls_matchall_offload *cls,
1457 				 bool ingress)
1458 {
1459 	struct netlink_ext_ack *extack = cls->common.extack;
1460 	struct dsa_port *dp = dsa_user_to_port(dev);
1461 	struct dsa_user_priv *p = netdev_priv(dev);
1462 	struct dsa_mall_tc_entry *mall_tc_entry;
1463 	struct flow_action_police *policer;
1464 	struct dsa_switch *ds = dp->ds;
1465 	struct flow_action_entry *act;
1466 	int err;
1467 
1468 	if (!ds->ops->port_policer_add) {
1469 		NL_SET_ERR_MSG_MOD(extack,
1470 				   "Policing offload not implemented");
1471 		return -EOPNOTSUPP;
1472 	}
1473 
1474 	if (!ingress) {
1475 		NL_SET_ERR_MSG_MOD(extack,
1476 				   "Only supported on ingress qdisc");
1477 		return -EOPNOTSUPP;
1478 	}
1479 
1480 	if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack))
1481 		return -EOPNOTSUPP;
1482 
1483 	list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) {
1484 		if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) {
1485 			NL_SET_ERR_MSG_MOD(extack,
1486 					   "Only one port policer allowed");
1487 			return -EEXIST;
1488 		}
1489 	}
1490 
1491 	act = &cls->rule->action.entries[0];
1492 
1493 	mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL);
1494 	if (!mall_tc_entry)
1495 		return -ENOMEM;
1496 
1497 	mall_tc_entry->cookie = cls->cookie;
1498 	mall_tc_entry->type = DSA_PORT_MALL_POLICER;
1499 	policer = &mall_tc_entry->policer;
1500 	*policer = act->police;
1501 
1502 	err = ds->ops->port_policer_add(ds, dp->index, policer);
1503 	if (err) {
1504 		kfree(mall_tc_entry);
1505 		return err;
1506 	}
1507 
1508 	list_add_tail(&mall_tc_entry->list, &p->mall_tc_list);
1509 
1510 	return err;
1511 }
1512 
1513 static int dsa_user_add_cls_matchall(struct net_device *dev,
1514 				     struct tc_cls_matchall_offload *cls,
1515 				     bool ingress)
1516 {
1517 	const struct flow_action *action = &cls->rule->action;
1518 	struct netlink_ext_ack *extack = cls->common.extack;
1519 
1520 	if (!flow_offload_has_one_action(action)) {
1521 		NL_SET_ERR_MSG_MOD(extack,
1522 				   "Cannot offload matchall filter with more than one action");
1523 		return -EOPNOTSUPP;
1524 	}
1525 
1526 	switch (action->entries[0].id) {
1527 	case FLOW_ACTION_MIRRED:
1528 		return dsa_user_add_cls_matchall_mirred(dev, cls, ingress,
1529 							false);
1530 	case FLOW_ACTION_MIRRED_INGRESS:
1531 		return dsa_user_add_cls_matchall_mirred(dev, cls, ingress,
1532 							true);
1533 	case FLOW_ACTION_POLICE:
1534 		return dsa_user_add_cls_matchall_police(dev, cls, ingress);
1535 	default:
1536 		NL_SET_ERR_MSG_MOD(extack, "Unknown action");
1537 		break;
1538 	}
1539 
1540 	return -EOPNOTSUPP;
1541 }
1542 
1543 static void dsa_user_del_cls_matchall(struct net_device *dev,
1544 				      struct tc_cls_matchall_offload *cls)
1545 {
1546 	struct dsa_port *dp = dsa_user_to_port(dev);
1547 	struct dsa_mall_tc_entry *mall_tc_entry;
1548 	struct dsa_switch *ds = dp->ds;
1549 
1550 	mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie);
1551 	if (!mall_tc_entry)
1552 		return;
1553 
1554 	list_del(&mall_tc_entry->list);
1555 
1556 	switch (mall_tc_entry->type) {
1557 	case DSA_PORT_MALL_MIRROR:
1558 		if (ds->ops->port_mirror_del)
1559 			ds->ops->port_mirror_del(ds, dp->index,
1560 						 &mall_tc_entry->mirror);
1561 		break;
1562 	case DSA_PORT_MALL_POLICER:
1563 		if (ds->ops->port_policer_del)
1564 			ds->ops->port_policer_del(ds, dp->index);
1565 		break;
1566 	default:
1567 		WARN_ON(1);
1568 	}
1569 
1570 	kfree(mall_tc_entry);
1571 }
1572 
1573 static int dsa_user_setup_tc_cls_matchall(struct net_device *dev,
1574 					  struct tc_cls_matchall_offload *cls,
1575 					  bool ingress)
1576 {
1577 	if (cls->common.chain_index)
1578 		return -EOPNOTSUPP;
1579 
1580 	switch (cls->command) {
1581 	case TC_CLSMATCHALL_REPLACE:
1582 		return dsa_user_add_cls_matchall(dev, cls, ingress);
1583 	case TC_CLSMATCHALL_DESTROY:
1584 		dsa_user_del_cls_matchall(dev, cls);
1585 		return 0;
1586 	default:
1587 		return -EOPNOTSUPP;
1588 	}
1589 }
1590 
1591 static int dsa_user_add_cls_flower(struct net_device *dev,
1592 				   struct flow_cls_offload *cls,
1593 				   bool ingress)
1594 {
1595 	struct dsa_port *dp = dsa_user_to_port(dev);
1596 	struct dsa_switch *ds = dp->ds;
1597 	int port = dp->index;
1598 
1599 	if (!ds->ops->cls_flower_add)
1600 		return -EOPNOTSUPP;
1601 
1602 	return ds->ops->cls_flower_add(ds, port, cls, ingress);
1603 }
1604 
1605 static int dsa_user_del_cls_flower(struct net_device *dev,
1606 				   struct flow_cls_offload *cls,
1607 				   bool ingress)
1608 {
1609 	struct dsa_port *dp = dsa_user_to_port(dev);
1610 	struct dsa_switch *ds = dp->ds;
1611 	int port = dp->index;
1612 
1613 	if (!ds->ops->cls_flower_del)
1614 		return -EOPNOTSUPP;
1615 
1616 	return ds->ops->cls_flower_del(ds, port, cls, ingress);
1617 }
1618 
1619 static int dsa_user_stats_cls_flower(struct net_device *dev,
1620 				     struct flow_cls_offload *cls,
1621 				     bool ingress)
1622 {
1623 	struct dsa_port *dp = dsa_user_to_port(dev);
1624 	struct dsa_switch *ds = dp->ds;
1625 	int port = dp->index;
1626 
1627 	if (!ds->ops->cls_flower_stats)
1628 		return -EOPNOTSUPP;
1629 
1630 	return ds->ops->cls_flower_stats(ds, port, cls, ingress);
1631 }
1632 
1633 static int dsa_user_setup_tc_cls_flower(struct net_device *dev,
1634 					struct flow_cls_offload *cls,
1635 					bool ingress)
1636 {
1637 	switch (cls->command) {
1638 	case FLOW_CLS_REPLACE:
1639 		return dsa_user_add_cls_flower(dev, cls, ingress);
1640 	case FLOW_CLS_DESTROY:
1641 		return dsa_user_del_cls_flower(dev, cls, ingress);
1642 	case FLOW_CLS_STATS:
1643 		return dsa_user_stats_cls_flower(dev, cls, ingress);
1644 	default:
1645 		return -EOPNOTSUPP;
1646 	}
1647 }
1648 
1649 static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data,
1650 				      void *cb_priv, bool ingress)
1651 {
1652 	struct net_device *dev = cb_priv;
1653 
1654 	if (!tc_can_offload(dev))
1655 		return -EOPNOTSUPP;
1656 
1657 	switch (type) {
1658 	case TC_SETUP_CLSMATCHALL:
1659 		return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress);
1660 	case TC_SETUP_CLSFLOWER:
1661 		return dsa_user_setup_tc_cls_flower(dev, type_data, ingress);
1662 	default:
1663 		return -EOPNOTSUPP;
1664 	}
1665 }
1666 
1667 static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type,
1668 					 void *type_data, void *cb_priv)
1669 {
1670 	return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true);
1671 }
1672 
1673 static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type,
1674 					 void *type_data, void *cb_priv)
1675 {
1676 	return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false);
1677 }
1678 
1679 static LIST_HEAD(dsa_user_block_cb_list);
1680 
1681 static int dsa_user_setup_tc_block(struct net_device *dev,
1682 				   struct flow_block_offload *f)
1683 {
1684 	struct flow_block_cb *block_cb;
1685 	flow_setup_cb_t *cb;
1686 
1687 	if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS)
1688 		cb = dsa_user_setup_tc_block_cb_ig;
1689 	else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS)
1690 		cb = dsa_user_setup_tc_block_cb_eg;
1691 	else
1692 		return -EOPNOTSUPP;
1693 
1694 	f->driver_block_list = &dsa_user_block_cb_list;
1695 
1696 	switch (f->command) {
1697 	case FLOW_BLOCK_BIND:
1698 		if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list))
1699 			return -EBUSY;
1700 
1701 		block_cb = flow_block_cb_alloc(cb, dev, dev, NULL);
1702 		if (IS_ERR(block_cb))
1703 			return PTR_ERR(block_cb);
1704 
1705 		flow_block_cb_add(block_cb, f);
1706 		list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list);
1707 		return 0;
1708 	case FLOW_BLOCK_UNBIND:
1709 		block_cb = flow_block_cb_lookup(f->block, cb, dev);
1710 		if (!block_cb)
1711 			return -ENOENT;
1712 
1713 		flow_block_cb_remove(block_cb, f);
1714 		list_del(&block_cb->driver_list);
1715 		return 0;
1716 	default:
1717 		return -EOPNOTSUPP;
1718 	}
1719 }
1720 
1721 static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port,
1722 				   void *type_data)
1723 {
1724 	struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port));
1725 
1726 	if (!conduit->netdev_ops->ndo_setup_tc)
1727 		return -EOPNOTSUPP;
1728 
1729 	return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data);
1730 }
1731 
1732 static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type,
1733 			     void *type_data)
1734 {
1735 	struct dsa_port *dp = dsa_user_to_port(dev);
1736 	struct dsa_switch *ds = dp->ds;
1737 
1738 	switch (type) {
1739 	case TC_SETUP_BLOCK:
1740 		return dsa_user_setup_tc_block(dev, type_data);
1741 	case TC_SETUP_FT:
1742 		return dsa_user_setup_ft_block(ds, dp->index, type_data);
1743 	default:
1744 		break;
1745 	}
1746 
1747 	if (!ds->ops->port_setup_tc)
1748 		return -EOPNOTSUPP;
1749 
1750 	return ds->ops->port_setup_tc(ds, dp->index, type, type_data);
1751 }
1752 
1753 static int dsa_user_get_rxnfc(struct net_device *dev,
1754 			      struct ethtool_rxnfc *nfc, u32 *rule_locs)
1755 {
1756 	struct dsa_port *dp = dsa_user_to_port(dev);
1757 	struct dsa_switch *ds = dp->ds;
1758 
1759 	if (!ds->ops->get_rxnfc)
1760 		return -EOPNOTSUPP;
1761 
1762 	return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs);
1763 }
1764 
1765 static int dsa_user_set_rxnfc(struct net_device *dev,
1766 			      struct ethtool_rxnfc *nfc)
1767 {
1768 	struct dsa_port *dp = dsa_user_to_port(dev);
1769 	struct dsa_switch *ds = dp->ds;
1770 
1771 	if (!ds->ops->set_rxnfc)
1772 		return -EOPNOTSUPP;
1773 
1774 	return ds->ops->set_rxnfc(ds, dp->index, nfc);
1775 }
1776 
1777 static int dsa_user_get_ts_info(struct net_device *dev,
1778 				struct kernel_ethtool_ts_info *ts)
1779 {
1780 	struct dsa_user_priv *p = netdev_priv(dev);
1781 	struct dsa_switch *ds = p->dp->ds;
1782 
1783 	if (!ds->ops->get_ts_info)
1784 		return -EOPNOTSUPP;
1785 
1786 	return ds->ops->get_ts_info(ds, p->dp->index, ts);
1787 }
1788 
1789 static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto,
1790 				    u16 vid)
1791 {
1792 	struct dsa_port *dp = dsa_user_to_port(dev);
1793 	struct switchdev_obj_port_vlan vlan = {
1794 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
1795 		.vid = vid,
1796 		/* This API only allows programming tagged, non-PVID VIDs */
1797 		.flags = 0,
1798 	};
1799 	struct netlink_ext_ack extack = {0};
1800 	struct dsa_switch *ds = dp->ds;
1801 	struct netdev_hw_addr *ha;
1802 	struct dsa_vlan *v;
1803 	int ret;
1804 
1805 	/* User port... */
1806 	ret = dsa_port_vlan_add(dp, &vlan, &extack);
1807 	if (ret) {
1808 		if (extack._msg)
1809 			netdev_err(dev, "%s\n", extack._msg);
1810 		return ret;
1811 	}
1812 
1813 	/* And CPU port... */
1814 	ret = dsa_port_host_vlan_add(dp, &vlan, &extack);
1815 	if (ret) {
1816 		if (extack._msg)
1817 			netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index,
1818 				   extack._msg);
1819 		return ret;
1820 	}
1821 
1822 	if (!dsa_switch_supports_uc_filtering(ds) &&
1823 	    !dsa_switch_supports_mc_filtering(ds))
1824 		return 0;
1825 
1826 	v = kzalloc(sizeof(*v), GFP_KERNEL);
1827 	if (!v) {
1828 		ret = -ENOMEM;
1829 		goto rollback;
1830 	}
1831 
1832 	netif_addr_lock_bh(dev);
1833 
1834 	v->vid = vid;
1835 	list_add_tail(&v->list, &dp->user_vlans);
1836 
1837 	if (dsa_switch_supports_mc_filtering(ds)) {
1838 		netdev_for_each_synced_mc_addr(ha, dev) {
1839 			dsa_user_schedule_standalone_work(dev, DSA_MC_ADD,
1840 							  ha->addr, vid);
1841 		}
1842 	}
1843 
1844 	if (dsa_switch_supports_uc_filtering(ds)) {
1845 		netdev_for_each_synced_uc_addr(ha, dev) {
1846 			dsa_user_schedule_standalone_work(dev, DSA_UC_ADD,
1847 							  ha->addr, vid);
1848 		}
1849 	}
1850 
1851 	netif_addr_unlock_bh(dev);
1852 
1853 	dsa_flush_workqueue();
1854 
1855 	return 0;
1856 
1857 rollback:
1858 	dsa_port_host_vlan_del(dp, &vlan);
1859 	dsa_port_vlan_del(dp, &vlan);
1860 
1861 	return ret;
1862 }
1863 
1864 static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto,
1865 				     u16 vid)
1866 {
1867 	struct dsa_port *dp = dsa_user_to_port(dev);
1868 	struct switchdev_obj_port_vlan vlan = {
1869 		.vid = vid,
1870 		/* This API only allows programming tagged, non-PVID VIDs */
1871 		.flags = 0,
1872 	};
1873 	struct dsa_switch *ds = dp->ds;
1874 	struct netdev_hw_addr *ha;
1875 	struct dsa_vlan *v;
1876 	int err;
1877 
1878 	err = dsa_port_vlan_del(dp, &vlan);
1879 	if (err)
1880 		return err;
1881 
1882 	err = dsa_port_host_vlan_del(dp, &vlan);
1883 	if (err)
1884 		return err;
1885 
1886 	if (!dsa_switch_supports_uc_filtering(ds) &&
1887 	    !dsa_switch_supports_mc_filtering(ds))
1888 		return 0;
1889 
1890 	netif_addr_lock_bh(dev);
1891 
1892 	v = dsa_vlan_find(&dp->user_vlans, &vlan);
1893 	if (!v) {
1894 		netif_addr_unlock_bh(dev);
1895 		return -ENOENT;
1896 	}
1897 
1898 	list_del(&v->list);
1899 	kfree(v);
1900 
1901 	if (dsa_switch_supports_mc_filtering(ds)) {
1902 		netdev_for_each_synced_mc_addr(ha, dev) {
1903 			dsa_user_schedule_standalone_work(dev, DSA_MC_DEL,
1904 							  ha->addr, vid);
1905 		}
1906 	}
1907 
1908 	if (dsa_switch_supports_uc_filtering(ds)) {
1909 		netdev_for_each_synced_uc_addr(ha, dev) {
1910 			dsa_user_schedule_standalone_work(dev, DSA_UC_DEL,
1911 							  ha->addr, vid);
1912 		}
1913 	}
1914 
1915 	netif_addr_unlock_bh(dev);
1916 
1917 	dsa_flush_workqueue();
1918 
1919 	return 0;
1920 }
1921 
1922 static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg)
1923 {
1924 	__be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q);
1925 
1926 	return dsa_user_vlan_rx_add_vid(arg, proto, vid);
1927 }
1928 
1929 static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg)
1930 {
1931 	__be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q);
1932 
1933 	return dsa_user_vlan_rx_kill_vid(arg, proto, vid);
1934 }
1935 
1936 /* Keep the VLAN RX filtering list in sync with the hardware only if VLAN
1937  * filtering is enabled. The baseline is that only ports that offload a
1938  * VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware,
1939  * but there are exceptions for quirky hardware.
1940  *
1941  * If ds->vlan_filtering_is_global = true, then standalone ports which share
1942  * the same switch with other ports that offload a VLAN-aware bridge are also
1943  * inevitably VLAN-aware.
1944  *
1945  * To summarize, a DSA switch port offloads:
1946  *
1947  * - If standalone (this includes software bridge, software LAG):
1948  *     - if ds->needs_standalone_vlan_filtering = true, OR if
1949  *       (ds->vlan_filtering_is_global = true AND there are bridges spanning
1950  *       this switch chip which have vlan_filtering=1)
1951  *         - the 8021q upper VLANs
1952  *     - else (standalone VLAN filtering is not needed, VLAN filtering is not
1953  *       global, or it is, but no port is under a VLAN-aware bridge):
1954  *         - no VLAN (any 8021q upper is a software VLAN)
1955  *
1956  * - If under a vlan_filtering=0 bridge which it offload:
1957  *     - if ds->configure_vlan_while_not_filtering = true (default):
1958  *         - the bridge VLANs. These VLANs are committed to hardware but inactive.
1959  *     - else (deprecated):
1960  *         - no VLAN. The bridge VLANs are not restored when VLAN awareness is
1961  *           enabled, so this behavior is broken and discouraged.
1962  *
1963  * - If under a vlan_filtering=1 bridge which it offload:
1964  *     - the bridge VLANs
1965  *     - the 8021q upper VLANs
1966  */
1967 int dsa_user_manage_vlan_filtering(struct net_device *user,
1968 				   bool vlan_filtering)
1969 {
1970 	int err;
1971 
1972 	if (vlan_filtering) {
1973 		user->features |= NETIF_F_HW_VLAN_CTAG_FILTER;
1974 
1975 		err = vlan_for_each(user, dsa_user_restore_vlan, user);
1976 		if (err) {
1977 			vlan_for_each(user, dsa_user_clear_vlan, user);
1978 			user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER;
1979 			return err;
1980 		}
1981 	} else {
1982 		err = vlan_for_each(user, dsa_user_clear_vlan, user);
1983 		if (err)
1984 			return err;
1985 
1986 		user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER;
1987 	}
1988 
1989 	return 0;
1990 }
1991 
1992 struct dsa_hw_port {
1993 	struct list_head list;
1994 	struct net_device *dev;
1995 	int old_mtu;
1996 };
1997 
1998 static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu)
1999 {
2000 	const struct dsa_hw_port *p;
2001 	int err;
2002 
2003 	list_for_each_entry(p, hw_port_list, list) {
2004 		if (p->dev->mtu == mtu)
2005 			continue;
2006 
2007 		err = dev_set_mtu(p->dev, mtu);
2008 		if (err)
2009 			goto rollback;
2010 	}
2011 
2012 	return 0;
2013 
2014 rollback:
2015 	list_for_each_entry_continue_reverse(p, hw_port_list, list) {
2016 		if (p->dev->mtu == p->old_mtu)
2017 			continue;
2018 
2019 		if (dev_set_mtu(p->dev, p->old_mtu))
2020 			netdev_err(p->dev, "Failed to restore MTU\n");
2021 	}
2022 
2023 	return err;
2024 }
2025 
2026 static void dsa_hw_port_list_free(struct list_head *hw_port_list)
2027 {
2028 	struct dsa_hw_port *p, *n;
2029 
2030 	list_for_each_entry_safe(p, n, hw_port_list, list)
2031 		kfree(p);
2032 }
2033 
2034 /* Make the hardware datapath to/from @dev limited to a common MTU */
2035 static void dsa_bridge_mtu_normalization(struct dsa_port *dp)
2036 {
2037 	struct list_head hw_port_list;
2038 	struct dsa_switch_tree *dst;
2039 	int min_mtu = ETH_MAX_MTU;
2040 	struct dsa_port *other_dp;
2041 	int err;
2042 
2043 	if (!dp->ds->mtu_enforcement_ingress)
2044 		return;
2045 
2046 	if (!dp->bridge)
2047 		return;
2048 
2049 	INIT_LIST_HEAD(&hw_port_list);
2050 
2051 	/* Populate the list of ports that are part of the same bridge
2052 	 * as the newly added/modified port
2053 	 */
2054 	list_for_each_entry(dst, &dsa_tree_list, list) {
2055 		list_for_each_entry(other_dp, &dst->ports, list) {
2056 			struct dsa_hw_port *hw_port;
2057 			struct net_device *user;
2058 
2059 			if (other_dp->type != DSA_PORT_TYPE_USER)
2060 				continue;
2061 
2062 			if (!dsa_port_bridge_same(dp, other_dp))
2063 				continue;
2064 
2065 			if (!other_dp->ds->mtu_enforcement_ingress)
2066 				continue;
2067 
2068 			user = other_dp->user;
2069 
2070 			if (min_mtu > user->mtu)
2071 				min_mtu = user->mtu;
2072 
2073 			hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL);
2074 			if (!hw_port)
2075 				goto out;
2076 
2077 			hw_port->dev = user;
2078 			hw_port->old_mtu = user->mtu;
2079 
2080 			list_add(&hw_port->list, &hw_port_list);
2081 		}
2082 	}
2083 
2084 	/* Attempt to configure the entire hardware bridge to the newly added
2085 	 * interface's MTU first, regardless of whether the intention of the
2086 	 * user was to raise or lower it.
2087 	 */
2088 	err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu);
2089 	if (!err)
2090 		goto out;
2091 
2092 	/* Clearly that didn't work out so well, so just set the minimum MTU on
2093 	 * all hardware bridge ports now. If this fails too, then all ports will
2094 	 * still have their old MTU rolled back anyway.
2095 	 */
2096 	dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu);
2097 
2098 out:
2099 	dsa_hw_port_list_free(&hw_port_list);
2100 }
2101 
2102 int dsa_user_change_mtu(struct net_device *dev, int new_mtu)
2103 {
2104 	struct net_device *conduit = dsa_user_to_conduit(dev);
2105 	struct dsa_port *dp = dsa_user_to_port(dev);
2106 	struct dsa_port *cpu_dp = dp->cpu_dp;
2107 	struct dsa_switch *ds = dp->ds;
2108 	struct dsa_port *other_dp;
2109 	int largest_mtu = 0;
2110 	int new_conduit_mtu;
2111 	int old_conduit_mtu;
2112 	int mtu_limit;
2113 	int overhead;
2114 	int cpu_mtu;
2115 	int err;
2116 
2117 	if (!ds->ops->port_change_mtu)
2118 		return -EOPNOTSUPP;
2119 
2120 	dsa_tree_for_each_user_port(other_dp, ds->dst) {
2121 		int user_mtu;
2122 
2123 		/* During probe, this function will be called for each user
2124 		 * device, while not all of them have been allocated. That's
2125 		 * ok, it doesn't change what the maximum is, so ignore it.
2126 		 */
2127 		if (!other_dp->user)
2128 			continue;
2129 
2130 		/* Pretend that we already applied the setting, which we
2131 		 * actually haven't (still haven't done all integrity checks)
2132 		 */
2133 		if (dp == other_dp)
2134 			user_mtu = new_mtu;
2135 		else
2136 			user_mtu = other_dp->user->mtu;
2137 
2138 		if (largest_mtu < user_mtu)
2139 			largest_mtu = user_mtu;
2140 	}
2141 
2142 	overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops);
2143 	mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead);
2144 	old_conduit_mtu = conduit->mtu;
2145 	new_conduit_mtu = largest_mtu + overhead;
2146 	if (new_conduit_mtu > mtu_limit)
2147 		return -ERANGE;
2148 
2149 	/* If the conduit MTU isn't over limit, there's no need to check the CPU
2150 	 * MTU, since that surely isn't either.
2151 	 */
2152 	cpu_mtu = largest_mtu;
2153 
2154 	/* Start applying stuff */
2155 	if (new_conduit_mtu != old_conduit_mtu) {
2156 		err = dev_set_mtu(conduit, new_conduit_mtu);
2157 		if (err < 0)
2158 			goto out_conduit_failed;
2159 
2160 		/* We only need to propagate the MTU of the CPU port to
2161 		 * upstream switches, so emit a notifier which updates them.
2162 		 */
2163 		err = dsa_port_mtu_change(cpu_dp, cpu_mtu);
2164 		if (err)
2165 			goto out_cpu_failed;
2166 	}
2167 
2168 	err = ds->ops->port_change_mtu(ds, dp->index, new_mtu);
2169 	if (err)
2170 		goto out_port_failed;
2171 
2172 	WRITE_ONCE(dev->mtu, new_mtu);
2173 
2174 	dsa_bridge_mtu_normalization(dp);
2175 
2176 	return 0;
2177 
2178 out_port_failed:
2179 	if (new_conduit_mtu != old_conduit_mtu)
2180 		dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead);
2181 out_cpu_failed:
2182 	if (new_conduit_mtu != old_conduit_mtu)
2183 		dev_set_mtu(conduit, old_conduit_mtu);
2184 out_conduit_failed:
2185 	return err;
2186 }
2187 
2188 static int __maybe_unused
2189 dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel)
2190 {
2191 	struct dsa_port *dp = dsa_user_to_port(dev);
2192 	struct dsa_switch *ds = dp->ds;
2193 	int port = dp->index;
2194 
2195 	if (!ds->ops->port_set_apptrust)
2196 		return -EOPNOTSUPP;
2197 
2198 	return ds->ops->port_set_apptrust(ds, port, sel, nsel);
2199 }
2200 
2201 static int __maybe_unused
2202 dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel)
2203 {
2204 	struct dsa_port *dp = dsa_user_to_port(dev);
2205 	struct dsa_switch *ds = dp->ds;
2206 	int port = dp->index;
2207 
2208 	if (!ds->ops->port_get_apptrust)
2209 		return -EOPNOTSUPP;
2210 
2211 	return ds->ops->port_get_apptrust(ds, port, sel, nsel);
2212 }
2213 
2214 static int __maybe_unused
2215 dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app)
2216 {
2217 	struct dsa_port *dp = dsa_user_to_port(dev);
2218 	struct dsa_switch *ds = dp->ds;
2219 	unsigned long mask, new_prio;
2220 	int err, port = dp->index;
2221 
2222 	if (!ds->ops->port_set_default_prio)
2223 		return -EOPNOTSUPP;
2224 
2225 	err = dcb_ieee_setapp(dev, app);
2226 	if (err)
2227 		return err;
2228 
2229 	mask = dcb_ieee_getapp_mask(dev, app);
2230 	new_prio = __fls(mask);
2231 
2232 	err = ds->ops->port_set_default_prio(ds, port, new_prio);
2233 	if (err) {
2234 		dcb_ieee_delapp(dev, app);
2235 		return err;
2236 	}
2237 
2238 	return 0;
2239 }
2240 
2241 /* Update the DSCP prio entries on all user ports of the switch in case
2242  * the switch supports global DSCP prio instead of per port DSCP prios.
2243  */
2244 static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev,
2245 						  struct dcb_app *app, bool del)
2246 {
2247 	int (*setdel)(struct net_device *dev, struct dcb_app *app);
2248 	struct dsa_port *dp = dsa_user_to_port(dev);
2249 	struct dsa_switch *ds = dp->ds;
2250 	struct dsa_port *other_dp;
2251 	int err, restore_err;
2252 
2253 	if (del)
2254 		setdel = dcb_ieee_delapp;
2255 	else
2256 		setdel = dcb_ieee_setapp;
2257 
2258 	dsa_switch_for_each_user_port(other_dp, ds) {
2259 		struct net_device *user = other_dp->user;
2260 
2261 		if (!user || user == dev)
2262 			continue;
2263 
2264 		err = setdel(user, app);
2265 		if (err)
2266 			goto err_try_to_restore;
2267 	}
2268 
2269 	return 0;
2270 
2271 err_try_to_restore:
2272 
2273 	/* Revert logic to restore previous state of app entries */
2274 	if (!del)
2275 		setdel = dcb_ieee_delapp;
2276 	else
2277 		setdel = dcb_ieee_setapp;
2278 
2279 	dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) {
2280 		struct net_device *user = other_dp->user;
2281 
2282 		if (!user || user == dev)
2283 			continue;
2284 
2285 		restore_err = setdel(user, app);
2286 		if (restore_err)
2287 			netdev_err(user, "Failed to restore DSCP prio entry configuration\n");
2288 	}
2289 
2290 	return err;
2291 }
2292 
2293 static int __maybe_unused
2294 dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app)
2295 {
2296 	struct dsa_port *dp = dsa_user_to_port(dev);
2297 	struct dsa_switch *ds = dp->ds;
2298 	unsigned long mask, new_prio;
2299 	int err, port = dp->index;
2300 	u8 dscp = app->protocol;
2301 
2302 	if (!ds->ops->port_add_dscp_prio)
2303 		return -EOPNOTSUPP;
2304 
2305 	if (dscp >= 64) {
2306 		netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n",
2307 			   dscp);
2308 		return -EINVAL;
2309 	}
2310 
2311 	err = dcb_ieee_setapp(dev, app);
2312 	if (err)
2313 		return err;
2314 
2315 	mask = dcb_ieee_getapp_mask(dev, app);
2316 	new_prio = __fls(mask);
2317 
2318 	err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio);
2319 	if (err) {
2320 		dcb_ieee_delapp(dev, app);
2321 		return err;
2322 	}
2323 
2324 	if (!ds->dscp_prio_mapping_is_global)
2325 		return 0;
2326 
2327 	err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false);
2328 	if (err) {
2329 		if (ds->ops->port_del_dscp_prio)
2330 			ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio);
2331 		dcb_ieee_delapp(dev, app);
2332 		return err;
2333 	}
2334 
2335 	return 0;
2336 }
2337 
2338 static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev,
2339 						     struct dcb_app *app)
2340 {
2341 	switch (app->selector) {
2342 	case IEEE_8021QAZ_APP_SEL_ETHERTYPE:
2343 		switch (app->protocol) {
2344 		case 0:
2345 			return dsa_user_dcbnl_set_default_prio(dev, app);
2346 		default:
2347 			return -EOPNOTSUPP;
2348 		}
2349 		break;
2350 	case IEEE_8021QAZ_APP_SEL_DSCP:
2351 		return dsa_user_dcbnl_add_dscp_prio(dev, app);
2352 	default:
2353 		return -EOPNOTSUPP;
2354 	}
2355 }
2356 
2357 static int __maybe_unused
2358 dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app)
2359 {
2360 	struct dsa_port *dp = dsa_user_to_port(dev);
2361 	struct dsa_switch *ds = dp->ds;
2362 	unsigned long mask, new_prio;
2363 	int err, port = dp->index;
2364 
2365 	if (!ds->ops->port_set_default_prio)
2366 		return -EOPNOTSUPP;
2367 
2368 	err = dcb_ieee_delapp(dev, app);
2369 	if (err)
2370 		return err;
2371 
2372 	mask = dcb_ieee_getapp_mask(dev, app);
2373 	new_prio = mask ? __fls(mask) : 0;
2374 
2375 	err = ds->ops->port_set_default_prio(ds, port, new_prio);
2376 	if (err) {
2377 		dcb_ieee_setapp(dev, app);
2378 		return err;
2379 	}
2380 
2381 	return 0;
2382 }
2383 
2384 static int __maybe_unused
2385 dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app)
2386 {
2387 	struct dsa_port *dp = dsa_user_to_port(dev);
2388 	struct dsa_switch *ds = dp->ds;
2389 	int err, port = dp->index;
2390 	u8 dscp = app->protocol;
2391 
2392 	if (!ds->ops->port_del_dscp_prio)
2393 		return -EOPNOTSUPP;
2394 
2395 	err = dcb_ieee_delapp(dev, app);
2396 	if (err)
2397 		return err;
2398 
2399 	err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority);
2400 	if (err) {
2401 		dcb_ieee_setapp(dev, app);
2402 		return err;
2403 	}
2404 
2405 	if (!ds->dscp_prio_mapping_is_global)
2406 		return 0;
2407 
2408 	err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true);
2409 	if (err) {
2410 		if (ds->ops->port_add_dscp_prio)
2411 			ds->ops->port_add_dscp_prio(ds, port, dscp,
2412 						    app->priority);
2413 		dcb_ieee_setapp(dev, app);
2414 		return err;
2415 	}
2416 
2417 	return 0;
2418 }
2419 
2420 static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev,
2421 						     struct dcb_app *app)
2422 {
2423 	switch (app->selector) {
2424 	case IEEE_8021QAZ_APP_SEL_ETHERTYPE:
2425 		switch (app->protocol) {
2426 		case 0:
2427 			return dsa_user_dcbnl_del_default_prio(dev, app);
2428 		default:
2429 			return -EOPNOTSUPP;
2430 		}
2431 		break;
2432 	case IEEE_8021QAZ_APP_SEL_DSCP:
2433 		return dsa_user_dcbnl_del_dscp_prio(dev, app);
2434 	default:
2435 		return -EOPNOTSUPP;
2436 	}
2437 }
2438 
2439 /* Pre-populate the DCB application priority table with the priorities
2440  * configured during switch setup, which we read from hardware here.
2441  */
2442 static int dsa_user_dcbnl_init(struct net_device *dev)
2443 {
2444 	struct dsa_port *dp = dsa_user_to_port(dev);
2445 	struct dsa_switch *ds = dp->ds;
2446 	int port = dp->index;
2447 	int err;
2448 
2449 	if (ds->ops->port_get_default_prio) {
2450 		int prio = ds->ops->port_get_default_prio(ds, port);
2451 		struct dcb_app app = {
2452 			.selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE,
2453 			.protocol = 0,
2454 			.priority = prio,
2455 		};
2456 
2457 		if (prio < 0)
2458 			return prio;
2459 
2460 		err = dcb_ieee_setapp(dev, &app);
2461 		if (err)
2462 			return err;
2463 	}
2464 
2465 	if (ds->ops->port_get_dscp_prio) {
2466 		int protocol;
2467 
2468 		for (protocol = 0; protocol < 64; protocol++) {
2469 			struct dcb_app app = {
2470 				.selector = IEEE_8021QAZ_APP_SEL_DSCP,
2471 				.protocol = protocol,
2472 			};
2473 			int prio;
2474 
2475 			prio = ds->ops->port_get_dscp_prio(ds, port, protocol);
2476 			if (prio == -EOPNOTSUPP)
2477 				continue;
2478 			if (prio < 0)
2479 				return prio;
2480 
2481 			app.priority = prio;
2482 
2483 			err = dcb_ieee_setapp(dev, &app);
2484 			if (err)
2485 				return err;
2486 		}
2487 	}
2488 
2489 	return 0;
2490 }
2491 
2492 static const struct ethtool_ops dsa_user_ethtool_ops = {
2493 	.get_drvinfo		= dsa_user_get_drvinfo,
2494 	.get_regs_len		= dsa_user_get_regs_len,
2495 	.get_regs		= dsa_user_get_regs,
2496 	.nway_reset		= dsa_user_nway_reset,
2497 	.get_link		= ethtool_op_get_link,
2498 	.get_eeprom_len		= dsa_user_get_eeprom_len,
2499 	.get_eeprom		= dsa_user_get_eeprom,
2500 	.set_eeprom		= dsa_user_set_eeprom,
2501 	.get_strings		= dsa_user_get_strings,
2502 	.get_ethtool_stats	= dsa_user_get_ethtool_stats,
2503 	.get_sset_count		= dsa_user_get_sset_count,
2504 	.get_eth_phy_stats	= dsa_user_get_eth_phy_stats,
2505 	.get_eth_mac_stats	= dsa_user_get_eth_mac_stats,
2506 	.get_eth_ctrl_stats	= dsa_user_get_eth_ctrl_stats,
2507 	.get_rmon_stats		= dsa_user_get_rmon_stats,
2508 	.get_ts_stats		= dsa_user_get_ts_stats,
2509 	.set_wol		= dsa_user_set_wol,
2510 	.get_wol		= dsa_user_get_wol,
2511 	.set_eee		= dsa_user_set_eee,
2512 	.get_eee		= dsa_user_get_eee,
2513 	.get_link_ksettings	= dsa_user_get_link_ksettings,
2514 	.set_link_ksettings	= dsa_user_set_link_ksettings,
2515 	.get_pause_stats	= dsa_user_get_pause_stats,
2516 	.get_pauseparam		= dsa_user_get_pauseparam,
2517 	.set_pauseparam		= dsa_user_set_pauseparam,
2518 	.get_rxnfc		= dsa_user_get_rxnfc,
2519 	.set_rxnfc		= dsa_user_set_rxnfc,
2520 	.get_ts_info		= dsa_user_get_ts_info,
2521 	.self_test		= dsa_user_net_selftest,
2522 	.get_mm			= dsa_user_get_mm,
2523 	.set_mm			= dsa_user_set_mm,
2524 	.get_mm_stats		= dsa_user_get_mm_stats,
2525 };
2526 
2527 static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = {
2528 	.ieee_setapp		= dsa_user_dcbnl_ieee_setapp,
2529 	.ieee_delapp		= dsa_user_dcbnl_ieee_delapp,
2530 	.dcbnl_setapptrust	= dsa_user_dcbnl_set_apptrust,
2531 	.dcbnl_getapptrust	= dsa_user_dcbnl_get_apptrust,
2532 };
2533 
2534 static void dsa_user_get_stats64(struct net_device *dev,
2535 				 struct rtnl_link_stats64 *s)
2536 {
2537 	struct dsa_port *dp = dsa_user_to_port(dev);
2538 	struct dsa_switch *ds = dp->ds;
2539 
2540 	if (ds->ops->get_stats64)
2541 		ds->ops->get_stats64(ds, dp->index, s);
2542 	else
2543 		dev_get_tstats64(dev, s);
2544 }
2545 
2546 static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx,
2547 				      struct net_device_path *path)
2548 {
2549 	struct dsa_port *dp = dsa_user_to_port(ctx->dev);
2550 	struct net_device *conduit = dsa_port_to_conduit(dp);
2551 	struct dsa_port *cpu_dp = dp->cpu_dp;
2552 
2553 	path->dev = ctx->dev;
2554 	path->type = DEV_PATH_DSA;
2555 	path->dsa.proto = cpu_dp->tag_ops->proto;
2556 	path->dsa.port = dp->index;
2557 	ctx->dev = conduit;
2558 
2559 	return 0;
2560 }
2561 
2562 static int dsa_user_hwtstamp_get(struct net_device *dev,
2563 				 struct kernel_hwtstamp_config *cfg)
2564 {
2565 	struct dsa_port *dp = dsa_user_to_port(dev);
2566 	struct dsa_switch *ds = dp->ds;
2567 
2568 	if (!ds->ops->port_hwtstamp_get)
2569 		return -EOPNOTSUPP;
2570 
2571 	return ds->ops->port_hwtstamp_get(ds, dp->index, cfg);
2572 }
2573 
2574 static int dsa_user_hwtstamp_set(struct net_device *dev,
2575 				 struct kernel_hwtstamp_config *cfg,
2576 				 struct netlink_ext_ack *extack)
2577 {
2578 	struct dsa_port *dp = dsa_user_to_port(dev);
2579 	struct dsa_switch *ds = dp->ds;
2580 
2581 	if (!ds->ops->port_hwtstamp_set)
2582 		return -EOPNOTSUPP;
2583 
2584 	return ds->ops->port_hwtstamp_set(ds, dp->index, cfg, extack);
2585 }
2586 
2587 static const struct net_device_ops dsa_user_netdev_ops = {
2588 	.ndo_open		= dsa_user_open,
2589 	.ndo_stop		= dsa_user_close,
2590 	.ndo_start_xmit		= dsa_user_xmit,
2591 	.ndo_change_rx_flags	= dsa_user_change_rx_flags,
2592 	.ndo_set_rx_mode	= dsa_user_set_rx_mode,
2593 	.ndo_set_mac_address	= dsa_user_set_mac_address,
2594 	.ndo_fdb_dump		= dsa_user_fdb_dump,
2595 	.ndo_eth_ioctl		= dsa_user_ioctl,
2596 	.ndo_get_iflink		= dsa_user_get_iflink,
2597 #ifdef CONFIG_NET_POLL_CONTROLLER
2598 	.ndo_netpoll_setup	= dsa_user_netpoll_setup,
2599 	.ndo_netpoll_cleanup	= dsa_user_netpoll_cleanup,
2600 	.ndo_poll_controller	= dsa_user_poll_controller,
2601 #endif
2602 	.ndo_setup_tc		= dsa_user_setup_tc,
2603 	.ndo_get_stats64	= dsa_user_get_stats64,
2604 	.ndo_vlan_rx_add_vid	= dsa_user_vlan_rx_add_vid,
2605 	.ndo_vlan_rx_kill_vid	= dsa_user_vlan_rx_kill_vid,
2606 	.ndo_change_mtu		= dsa_user_change_mtu,
2607 	.ndo_fill_forward_path	= dsa_user_fill_forward_path,
2608 	.ndo_hwtstamp_get	= dsa_user_hwtstamp_get,
2609 	.ndo_hwtstamp_set	= dsa_user_hwtstamp_set,
2610 };
2611 
2612 static const struct device_type dsa_type = {
2613 	.name	= "dsa",
2614 };
2615 
2616 void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up)
2617 {
2618 	const struct dsa_port *dp = dsa_to_port(ds, port);
2619 
2620 	if (dp->pl)
2621 		phylink_mac_change(dp->pl, up);
2622 }
2623 EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change);
2624 
2625 static void dsa_user_phylink_fixed_state(struct phylink_config *config,
2626 					 struct phylink_link_state *state)
2627 {
2628 	struct dsa_port *dp = dsa_phylink_to_port(config);
2629 	struct dsa_switch *ds = dp->ds;
2630 
2631 	/* No need to check that this operation is valid, the callback would
2632 	 * not be called if it was not.
2633 	 */
2634 	ds->ops->phylink_fixed_state(ds, dp->index, state);
2635 }
2636 
2637 /* user device setup *******************************************************/
2638 static int dsa_user_phy_connect(struct net_device *user_dev, int addr,
2639 				u32 flags)
2640 {
2641 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2642 	struct dsa_switch *ds = dp->ds;
2643 
2644 	user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr);
2645 	if (!user_dev->phydev) {
2646 		netdev_err(user_dev, "no phy at %d\n", addr);
2647 		return -ENODEV;
2648 	}
2649 
2650 	user_dev->phydev->dev_flags |= flags;
2651 
2652 	return phylink_connect_phy(dp->pl, user_dev->phydev);
2653 }
2654 
2655 static int dsa_user_phy_setup(struct net_device *user_dev)
2656 {
2657 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2658 	struct device_node *port_dn = dp->dn;
2659 	struct dsa_switch *ds = dp->ds;
2660 	u32 phy_flags = 0;
2661 	int ret;
2662 
2663 	dp->pl_config.dev = &user_dev->dev;
2664 	dp->pl_config.type = PHYLINK_NETDEV;
2665 
2666 	/* The get_fixed_state callback takes precedence over polling the
2667 	 * link GPIO in PHYLINK (see phylink_get_fixed_state).  Only set
2668 	 * this if the switch provides such a callback.
2669 	 */
2670 	if (ds->ops->phylink_fixed_state) {
2671 		dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state;
2672 		dp->pl_config.poll_fixed_state = true;
2673 	}
2674 
2675 	ret = dsa_port_phylink_create(dp);
2676 	if (ret)
2677 		return ret;
2678 
2679 	if (ds->ops->get_phy_flags)
2680 		phy_flags = ds->ops->get_phy_flags(ds, dp->index);
2681 
2682 	ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags);
2683 	if (ret == -ENODEV && ds->user_mii_bus) {
2684 		/* We could not connect to a designated PHY or SFP, so try to
2685 		 * use the switch internal MDIO bus instead
2686 		 */
2687 		ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags);
2688 	}
2689 	if (ret) {
2690 		netdev_err(user_dev, "failed to connect to PHY: %pe\n",
2691 			   ERR_PTR(ret));
2692 		dsa_port_phylink_destroy(dp);
2693 	}
2694 
2695 	return ret;
2696 }
2697 
2698 void dsa_user_setup_tagger(struct net_device *user)
2699 {
2700 	struct dsa_port *dp = dsa_user_to_port(user);
2701 	struct net_device *conduit = dsa_port_to_conduit(dp);
2702 	struct dsa_user_priv *p = netdev_priv(user);
2703 	const struct dsa_port *cpu_dp = dp->cpu_dp;
2704 	const struct dsa_switch *ds = dp->ds;
2705 
2706 	user->needed_headroom = cpu_dp->tag_ops->needed_headroom;
2707 	user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom;
2708 	/* Try to save one extra realloc later in the TX path (in the conduit)
2709 	 * by also inheriting the conduit's needed headroom and tailroom.
2710 	 * The 8021q driver also does this.
2711 	 */
2712 	user->needed_headroom += conduit->needed_headroom;
2713 	user->needed_tailroom += conduit->needed_tailroom;
2714 
2715 	p->xmit = cpu_dp->tag_ops->xmit;
2716 
2717 	user->features = conduit->vlan_features | NETIF_F_HW_TC;
2718 	user->hw_features |= NETIF_F_HW_TC;
2719 	if (user->needed_tailroom)
2720 		user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST);
2721 	if (ds->needs_standalone_vlan_filtering)
2722 		user->features |= NETIF_F_HW_VLAN_CTAG_FILTER;
2723 
2724 	user->lltx = true;
2725 }
2726 
2727 int dsa_user_suspend(struct net_device *user_dev)
2728 {
2729 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2730 
2731 	if (!netif_running(user_dev))
2732 		return 0;
2733 
2734 	netif_device_detach(user_dev);
2735 
2736 	rtnl_lock();
2737 	phylink_stop(dp->pl);
2738 	rtnl_unlock();
2739 
2740 	return 0;
2741 }
2742 
2743 int dsa_user_resume(struct net_device *user_dev)
2744 {
2745 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2746 
2747 	if (!netif_running(user_dev))
2748 		return 0;
2749 
2750 	netif_device_attach(user_dev);
2751 
2752 	rtnl_lock();
2753 	phylink_start(dp->pl);
2754 	rtnl_unlock();
2755 
2756 	return 0;
2757 }
2758 
2759 int dsa_user_create(struct dsa_port *port)
2760 {
2761 	struct net_device *conduit = dsa_port_to_conduit(port);
2762 	struct dsa_switch *ds = port->ds;
2763 	struct net_device *user_dev;
2764 	struct dsa_user_priv *p;
2765 	const char *name;
2766 	int assign_type;
2767 	int ret;
2768 
2769 	if (!ds->num_tx_queues)
2770 		ds->num_tx_queues = 1;
2771 
2772 	if (port->name) {
2773 		name = port->name;
2774 		assign_type = NET_NAME_PREDICTABLE;
2775 	} else {
2776 		name = "eth%d";
2777 		assign_type = NET_NAME_ENUM;
2778 	}
2779 
2780 	user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name,
2781 				    assign_type, ether_setup,
2782 				    ds->num_tx_queues, 1);
2783 	if (user_dev == NULL)
2784 		return -ENOMEM;
2785 
2786 	user_dev->rtnl_link_ops = &dsa_link_ops;
2787 	user_dev->ethtool_ops = &dsa_user_ethtool_ops;
2788 #if IS_ENABLED(CONFIG_DCB)
2789 	user_dev->dcbnl_ops = &dsa_user_dcbnl_ops;
2790 #endif
2791 	if (!is_zero_ether_addr(port->mac))
2792 		eth_hw_addr_set(user_dev, port->mac);
2793 	else
2794 		eth_hw_addr_inherit(user_dev, conduit);
2795 	user_dev->priv_flags |= IFF_NO_QUEUE;
2796 	if (dsa_switch_supports_uc_filtering(ds))
2797 		user_dev->priv_flags |= IFF_UNICAST_FLT;
2798 	user_dev->netdev_ops = &dsa_user_netdev_ops;
2799 	if (ds->ops->port_max_mtu)
2800 		user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index);
2801 	SET_NETDEV_DEVTYPE(user_dev, &dsa_type);
2802 
2803 	SET_NETDEV_DEV(user_dev, port->ds->dev);
2804 	SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port);
2805 	user_dev->dev.of_node = port->dn;
2806 	user_dev->vlan_features = conduit->vlan_features;
2807 
2808 	p = netdev_priv(user_dev);
2809 	user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS;
2810 
2811 	ret = gro_cells_init(&p->gcells, user_dev);
2812 	if (ret)
2813 		goto out_free;
2814 
2815 	p->dp = port;
2816 	INIT_LIST_HEAD(&p->mall_tc_list);
2817 	port->user = user_dev;
2818 	dsa_user_setup_tagger(user_dev);
2819 
2820 	netif_carrier_off(user_dev);
2821 
2822 	ret = dsa_user_phy_setup(user_dev);
2823 	if (ret) {
2824 		netdev_err(user_dev,
2825 			   "error %d setting up PHY for tree %d, switch %d, port %d\n",
2826 			   ret, ds->dst->index, ds->index, port->index);
2827 		goto out_gcells;
2828 	}
2829 
2830 	rtnl_lock();
2831 
2832 	ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN);
2833 	if (ret && ret != -EOPNOTSUPP)
2834 		dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n",
2835 			 ret, ETH_DATA_LEN, port->index);
2836 
2837 	ret = register_netdevice(user_dev);
2838 	if (ret) {
2839 		netdev_err(conduit, "error %d registering interface %s\n",
2840 			   ret, user_dev->name);
2841 		rtnl_unlock();
2842 		goto out_phy;
2843 	}
2844 
2845 	if (IS_ENABLED(CONFIG_DCB)) {
2846 		ret = dsa_user_dcbnl_init(user_dev);
2847 		if (ret) {
2848 			netdev_err(user_dev,
2849 				   "failed to initialize DCB: %pe\n",
2850 				   ERR_PTR(ret));
2851 			rtnl_unlock();
2852 			goto out_unregister;
2853 		}
2854 	}
2855 
2856 	ret = netdev_upper_dev_link(conduit, user_dev, NULL);
2857 
2858 	rtnl_unlock();
2859 
2860 	if (ret)
2861 		goto out_unregister;
2862 
2863 	return 0;
2864 
2865 out_unregister:
2866 	unregister_netdev(user_dev);
2867 out_phy:
2868 	rtnl_lock();
2869 	phylink_disconnect_phy(p->dp->pl);
2870 	rtnl_unlock();
2871 	dsa_port_phylink_destroy(p->dp);
2872 out_gcells:
2873 	gro_cells_destroy(&p->gcells);
2874 out_free:
2875 	free_netdev(user_dev);
2876 	port->user = NULL;
2877 	return ret;
2878 }
2879 
2880 void dsa_user_destroy(struct net_device *user_dev)
2881 {
2882 	struct net_device *conduit = dsa_user_to_conduit(user_dev);
2883 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2884 	struct dsa_user_priv *p = netdev_priv(user_dev);
2885 
2886 	netif_carrier_off(user_dev);
2887 	rtnl_lock();
2888 	netdev_upper_dev_unlink(conduit, user_dev);
2889 	unregister_netdevice(user_dev);
2890 	phylink_disconnect_phy(dp->pl);
2891 	rtnl_unlock();
2892 
2893 	dsa_port_phylink_destroy(dp);
2894 	gro_cells_destroy(&p->gcells);
2895 	free_netdev(user_dev);
2896 }
2897 
2898 int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit,
2899 			    struct netlink_ext_ack *extack)
2900 {
2901 	struct net_device *old_conduit = dsa_user_to_conduit(dev);
2902 	struct dsa_port *dp = dsa_user_to_port(dev);
2903 	struct dsa_switch *ds = dp->ds;
2904 	struct net_device *upper;
2905 	struct list_head *iter;
2906 	int err;
2907 
2908 	if (conduit == old_conduit)
2909 		return 0;
2910 
2911 	if (!ds->ops->port_change_conduit) {
2912 		NL_SET_ERR_MSG_MOD(extack,
2913 				   "Driver does not support changing DSA conduit");
2914 		return -EOPNOTSUPP;
2915 	}
2916 
2917 	if (!netdev_uses_dsa(conduit)) {
2918 		NL_SET_ERR_MSG_MOD(extack,
2919 				   "Interface not eligible as DSA conduit");
2920 		return -EOPNOTSUPP;
2921 	}
2922 
2923 	netdev_for_each_upper_dev_rcu(conduit, upper, iter) {
2924 		if (dsa_user_dev_check(upper))
2925 			continue;
2926 		if (netif_is_bridge_master(upper))
2927 			continue;
2928 		NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers");
2929 		return -EOPNOTSUPP;
2930 	}
2931 
2932 	/* Since we allow live-changing the DSA conduit, plus we auto-open the
2933 	 * DSA conduit when the user port opens => we need to ensure that the
2934 	 * new DSA conduit is open too.
2935 	 */
2936 	if (dev->flags & IFF_UP) {
2937 		err = dev_open(conduit, extack);
2938 		if (err)
2939 			return err;
2940 	}
2941 
2942 	netdev_upper_dev_unlink(old_conduit, dev);
2943 
2944 	err = netdev_upper_dev_link(conduit, dev, extack);
2945 	if (err)
2946 		goto out_revert_old_conduit_unlink;
2947 
2948 	err = dsa_port_change_conduit(dp, conduit, extack);
2949 	if (err)
2950 		goto out_revert_conduit_link;
2951 
2952 	/* Update the MTU of the new CPU port through cross-chip notifiers */
2953 	err = dsa_user_change_mtu(dev, dev->mtu);
2954 	if (err && err != -EOPNOTSUPP) {
2955 		netdev_warn(dev,
2956 			    "nonfatal error updating MTU with new conduit: %pe\n",
2957 			    ERR_PTR(err));
2958 	}
2959 
2960 	return 0;
2961 
2962 out_revert_conduit_link:
2963 	netdev_upper_dev_unlink(conduit, dev);
2964 out_revert_old_conduit_unlink:
2965 	netdev_upper_dev_link(old_conduit, dev, NULL);
2966 	return err;
2967 }
2968 
2969 bool dsa_user_dev_check(const struct net_device *dev)
2970 {
2971 	return dev->netdev_ops == &dsa_user_netdev_ops;
2972 }
2973 EXPORT_SYMBOL_GPL(dsa_user_dev_check);
2974 
2975 static int dsa_user_changeupper(struct net_device *dev,
2976 				struct netdev_notifier_changeupper_info *info)
2977 {
2978 	struct netlink_ext_ack *extack;
2979 	int err = NOTIFY_DONE;
2980 	struct dsa_port *dp;
2981 
2982 	if (!dsa_user_dev_check(dev))
2983 		return err;
2984 
2985 	dp = dsa_user_to_port(dev);
2986 	extack = netdev_notifier_info_to_extack(&info->info);
2987 
2988 	if (netif_is_bridge_master(info->upper_dev)) {
2989 		if (info->linking) {
2990 			err = dsa_port_bridge_join(dp, info->upper_dev, extack);
2991 			if (!err)
2992 				dsa_bridge_mtu_normalization(dp);
2993 			if (err == -EOPNOTSUPP) {
2994 				NL_SET_ERR_MSG_WEAK_MOD(extack,
2995 							"Offloading not supported");
2996 				err = 0;
2997 			}
2998 			err = notifier_from_errno(err);
2999 		} else {
3000 			dsa_port_bridge_leave(dp, info->upper_dev);
3001 			err = NOTIFY_OK;
3002 		}
3003 	} else if (netif_is_lag_master(info->upper_dev)) {
3004 		if (info->linking) {
3005 			err = dsa_port_lag_join(dp, info->upper_dev,
3006 						info->upper_info, extack);
3007 			if (err == -EOPNOTSUPP) {
3008 				NL_SET_ERR_MSG_WEAK_MOD(extack,
3009 							"Offloading not supported");
3010 				err = 0;
3011 			}
3012 			err = notifier_from_errno(err);
3013 		} else {
3014 			dsa_port_lag_leave(dp, info->upper_dev);
3015 			err = NOTIFY_OK;
3016 		}
3017 	} else if (is_hsr_master(info->upper_dev)) {
3018 		if (info->linking) {
3019 			err = dsa_port_hsr_join(dp, info->upper_dev, extack);
3020 			if (err == -EOPNOTSUPP) {
3021 				NL_SET_ERR_MSG_WEAK_MOD(extack,
3022 							"Offloading not supported");
3023 				err = 0;
3024 			}
3025 			err = notifier_from_errno(err);
3026 		} else {
3027 			dsa_port_hsr_leave(dp, info->upper_dev);
3028 			err = NOTIFY_OK;
3029 		}
3030 	}
3031 
3032 	return err;
3033 }
3034 
3035 static int dsa_user_prechangeupper(struct net_device *dev,
3036 				   struct netdev_notifier_changeupper_info *info)
3037 {
3038 	struct dsa_port *dp;
3039 
3040 	if (!dsa_user_dev_check(dev))
3041 		return NOTIFY_DONE;
3042 
3043 	dp = dsa_user_to_port(dev);
3044 
3045 	if (netif_is_bridge_master(info->upper_dev) && !info->linking)
3046 		dsa_port_pre_bridge_leave(dp, info->upper_dev);
3047 	else if (netif_is_lag_master(info->upper_dev) && !info->linking)
3048 		dsa_port_pre_lag_leave(dp, info->upper_dev);
3049 	/* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot
3050 	 * meaningfully placed under a bridge yet
3051 	 */
3052 
3053 	return NOTIFY_DONE;
3054 }
3055 
3056 static int
3057 dsa_user_lag_changeupper(struct net_device *dev,
3058 			 struct netdev_notifier_changeupper_info *info)
3059 {
3060 	struct net_device *lower;
3061 	struct list_head *iter;
3062 	int err = NOTIFY_DONE;
3063 	struct dsa_port *dp;
3064 
3065 	if (!netif_is_lag_master(dev))
3066 		return err;
3067 
3068 	netdev_for_each_lower_dev(dev, lower, iter) {
3069 		if (!dsa_user_dev_check(lower))
3070 			continue;
3071 
3072 		dp = dsa_user_to_port(lower);
3073 		if (!dp->lag)
3074 			/* Software LAG */
3075 			continue;
3076 
3077 		err = dsa_user_changeupper(lower, info);
3078 		if (notifier_to_errno(err))
3079 			break;
3080 	}
3081 
3082 	return err;
3083 }
3084 
3085 /* Same as dsa_user_lag_changeupper() except that it calls
3086  * dsa_user_prechangeupper()
3087  */
3088 static int
3089 dsa_user_lag_prechangeupper(struct net_device *dev,
3090 			    struct netdev_notifier_changeupper_info *info)
3091 {
3092 	struct net_device *lower;
3093 	struct list_head *iter;
3094 	int err = NOTIFY_DONE;
3095 	struct dsa_port *dp;
3096 
3097 	if (!netif_is_lag_master(dev))
3098 		return err;
3099 
3100 	netdev_for_each_lower_dev(dev, lower, iter) {
3101 		if (!dsa_user_dev_check(lower))
3102 			continue;
3103 
3104 		dp = dsa_user_to_port(lower);
3105 		if (!dp->lag)
3106 			/* Software LAG */
3107 			continue;
3108 
3109 		err = dsa_user_prechangeupper(lower, info);
3110 		if (notifier_to_errno(err))
3111 			break;
3112 	}
3113 
3114 	return err;
3115 }
3116 
3117 static int
3118 dsa_prevent_bridging_8021q_upper(struct net_device *dev,
3119 				 struct netdev_notifier_changeupper_info *info)
3120 {
3121 	struct netlink_ext_ack *ext_ack;
3122 	struct net_device *user, *br;
3123 	struct dsa_port *dp;
3124 
3125 	ext_ack = netdev_notifier_info_to_extack(&info->info);
3126 
3127 	if (!is_vlan_dev(dev))
3128 		return NOTIFY_DONE;
3129 
3130 	user = vlan_dev_real_dev(dev);
3131 	if (!dsa_user_dev_check(user))
3132 		return NOTIFY_DONE;
3133 
3134 	dp = dsa_user_to_port(user);
3135 	br = dsa_port_bridge_dev_get(dp);
3136 	if (!br)
3137 		return NOTIFY_DONE;
3138 
3139 	/* Deny enslaving a VLAN device into a VLAN-aware bridge */
3140 	if (br_vlan_enabled(br) &&
3141 	    netif_is_bridge_master(info->upper_dev) && info->linking) {
3142 		NL_SET_ERR_MSG_MOD(ext_ack,
3143 				   "Cannot make VLAN device join VLAN-aware bridge");
3144 		return notifier_from_errno(-EINVAL);
3145 	}
3146 
3147 	return NOTIFY_DONE;
3148 }
3149 
3150 static int
3151 dsa_user_check_8021q_upper(struct net_device *dev,
3152 			   struct netdev_notifier_changeupper_info *info)
3153 {
3154 	struct dsa_port *dp = dsa_user_to_port(dev);
3155 	struct net_device *br = dsa_port_bridge_dev_get(dp);
3156 	struct bridge_vlan_info br_info;
3157 	struct netlink_ext_ack *extack;
3158 	int err = NOTIFY_DONE;
3159 	u16 vid;
3160 
3161 	if (!br || !br_vlan_enabled(br))
3162 		return NOTIFY_DONE;
3163 
3164 	extack = netdev_notifier_info_to_extack(&info->info);
3165 	vid = vlan_dev_vlan_id(info->upper_dev);
3166 
3167 	/* br_vlan_get_info() returns -EINVAL or -ENOENT if the
3168 	 * device, respectively the VID is not found, returning
3169 	 * 0 means success, which is a failure for us here.
3170 	 */
3171 	err = br_vlan_get_info(br, vid, &br_info);
3172 	if (err == 0) {
3173 		NL_SET_ERR_MSG_MOD(extack,
3174 				   "This VLAN is already configured by the bridge");
3175 		return notifier_from_errno(-EBUSY);
3176 	}
3177 
3178 	return NOTIFY_DONE;
3179 }
3180 
3181 static int
3182 dsa_user_prechangeupper_sanity_check(struct net_device *dev,
3183 				     struct netdev_notifier_changeupper_info *info)
3184 {
3185 	struct dsa_switch *ds;
3186 	struct dsa_port *dp;
3187 	int err;
3188 
3189 	if (!dsa_user_dev_check(dev))
3190 		return dsa_prevent_bridging_8021q_upper(dev, info);
3191 
3192 	dp = dsa_user_to_port(dev);
3193 	ds = dp->ds;
3194 
3195 	if (ds->ops->port_prechangeupper) {
3196 		err = ds->ops->port_prechangeupper(ds, dp->index, info);
3197 		if (err)
3198 			return notifier_from_errno(err);
3199 	}
3200 
3201 	if (is_vlan_dev(info->upper_dev))
3202 		return dsa_user_check_8021q_upper(dev, info);
3203 
3204 	return NOTIFY_DONE;
3205 }
3206 
3207 /* To be eligible as a DSA conduit, a LAG must have all lower interfaces be
3208  * eligible DSA conduits. Additionally, all LAG slaves must be DSA conduits of
3209  * switches in the same switch tree.
3210  */
3211 static int dsa_lag_conduit_validate(struct net_device *lag_dev,
3212 				    struct netlink_ext_ack *extack)
3213 {
3214 	struct net_device *lower1, *lower2;
3215 	struct list_head *iter1, *iter2;
3216 
3217 	netdev_for_each_lower_dev(lag_dev, lower1, iter1) {
3218 		netdev_for_each_lower_dev(lag_dev, lower2, iter2) {
3219 			if (!netdev_uses_dsa(lower1) ||
3220 			    !netdev_uses_dsa(lower2)) {
3221 				NL_SET_ERR_MSG_MOD(extack,
3222 						   "All LAG ports must be eligible as DSA conduits");
3223 				return notifier_from_errno(-EINVAL);
3224 			}
3225 
3226 			if (lower1 == lower2)
3227 				continue;
3228 
3229 			if (!dsa_port_tree_same(lower1->dsa_ptr,
3230 						lower2->dsa_ptr)) {
3231 				NL_SET_ERR_MSG_MOD(extack,
3232 						   "LAG contains DSA conduits of disjoint switch trees");
3233 				return notifier_from_errno(-EINVAL);
3234 			}
3235 		}
3236 	}
3237 
3238 	return NOTIFY_DONE;
3239 }
3240 
3241 static int
3242 dsa_conduit_prechangeupper_sanity_check(struct net_device *conduit,
3243 					struct netdev_notifier_changeupper_info *info)
3244 {
3245 	struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info);
3246 
3247 	if (!netdev_uses_dsa(conduit))
3248 		return NOTIFY_DONE;
3249 
3250 	if (!info->linking)
3251 		return NOTIFY_DONE;
3252 
3253 	/* Allow DSA switch uppers */
3254 	if (dsa_user_dev_check(info->upper_dev))
3255 		return NOTIFY_DONE;
3256 
3257 	/* Allow bridge uppers of DSA conduits, subject to further
3258 	 * restrictions in dsa_bridge_prechangelower_sanity_check()
3259 	 */
3260 	if (netif_is_bridge_master(info->upper_dev))
3261 		return NOTIFY_DONE;
3262 
3263 	/* Allow LAG uppers, subject to further restrictions in
3264 	 * dsa_lag_conduit_prechangelower_sanity_check()
3265 	 */
3266 	if (netif_is_lag_master(info->upper_dev))
3267 		return dsa_lag_conduit_validate(info->upper_dev, extack);
3268 
3269 	NL_SET_ERR_MSG_MOD(extack,
3270 			   "DSA conduit cannot join unknown upper interfaces");
3271 	return notifier_from_errno(-EBUSY);
3272 }
3273 
3274 static int
3275 dsa_lag_conduit_prechangelower_sanity_check(struct net_device *dev,
3276 					    struct netdev_notifier_changeupper_info *info)
3277 {
3278 	struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info);
3279 	struct net_device *lag_dev = info->upper_dev;
3280 	struct net_device *lower;
3281 	struct list_head *iter;
3282 
3283 	if (!netdev_uses_dsa(lag_dev) || !netif_is_lag_master(lag_dev))
3284 		return NOTIFY_DONE;
3285 
3286 	if (!info->linking)
3287 		return NOTIFY_DONE;
3288 
3289 	if (!netdev_uses_dsa(dev)) {
3290 		NL_SET_ERR_MSG(extack,
3291 			       "Only DSA conduits can join a LAG DSA conduit");
3292 		return notifier_from_errno(-EINVAL);
3293 	}
3294 
3295 	netdev_for_each_lower_dev(lag_dev, lower, iter) {
3296 		if (!dsa_port_tree_same(dev->dsa_ptr, lower->dsa_ptr)) {
3297 			NL_SET_ERR_MSG(extack,
3298 				       "Interface is DSA conduit for a different switch tree than this LAG");
3299 			return notifier_from_errno(-EINVAL);
3300 		}
3301 
3302 		break;
3303 	}
3304 
3305 	return NOTIFY_DONE;
3306 }
3307 
3308 /* Don't allow bridging of DSA conduits, since the bridge layer rx_handler
3309  * prevents the DSA fake ethertype handler to be invoked, so we don't get the
3310  * chance to strip off and parse the DSA switch tag protocol header (the bridge
3311  * layer just returns RX_HANDLER_CONSUMED, stopping RX processing for these
3312  * frames).
3313  * The only case where that would not be an issue is when bridging can already
3314  * be offloaded, such as when the DSA conduit is itself a DSA or plain switchdev
3315  * port, and is bridged only with other ports from the same hardware device.
3316  */
3317 static int
3318 dsa_bridge_prechangelower_sanity_check(struct net_device *new_lower,
3319 				       struct netdev_notifier_changeupper_info *info)
3320 {
3321 	struct net_device *br = info->upper_dev;
3322 	struct netlink_ext_ack *extack;
3323 	struct net_device *lower;
3324 	struct list_head *iter;
3325 
3326 	if (!netif_is_bridge_master(br))
3327 		return NOTIFY_DONE;
3328 
3329 	if (!info->linking)
3330 		return NOTIFY_DONE;
3331 
3332 	extack = netdev_notifier_info_to_extack(&info->info);
3333 
3334 	netdev_for_each_lower_dev(br, lower, iter) {
3335 		if (!netdev_uses_dsa(new_lower) && !netdev_uses_dsa(lower))
3336 			continue;
3337 
3338 		if (!netdev_port_same_parent_id(lower, new_lower)) {
3339 			NL_SET_ERR_MSG(extack,
3340 				       "Cannot do software bridging with a DSA conduit");
3341 			return notifier_from_errno(-EINVAL);
3342 		}
3343 	}
3344 
3345 	return NOTIFY_DONE;
3346 }
3347 
3348 static void dsa_tree_migrate_ports_from_lag_conduit(struct dsa_switch_tree *dst,
3349 						    struct net_device *lag_dev)
3350 {
3351 	struct net_device *new_conduit = dsa_tree_find_first_conduit(dst);
3352 	struct dsa_port *dp;
3353 	int err;
3354 
3355 	dsa_tree_for_each_user_port(dp, dst) {
3356 		if (dsa_port_to_conduit(dp) != lag_dev)
3357 			continue;
3358 
3359 		err = dsa_user_change_conduit(dp->user, new_conduit, NULL);
3360 		if (err) {
3361 			netdev_err(dp->user,
3362 				   "failed to restore conduit to %s: %pe\n",
3363 				   new_conduit->name, ERR_PTR(err));
3364 		}
3365 	}
3366 }
3367 
3368 static int dsa_conduit_lag_join(struct net_device *conduit,
3369 				struct net_device *lag_dev,
3370 				struct netdev_lag_upper_info *uinfo,
3371 				struct netlink_ext_ack *extack)
3372 {
3373 	struct dsa_port *cpu_dp = conduit->dsa_ptr;
3374 	struct dsa_switch_tree *dst = cpu_dp->dst;
3375 	struct dsa_port *dp;
3376 	int err;
3377 
3378 	err = dsa_conduit_lag_setup(lag_dev, cpu_dp, uinfo, extack);
3379 	if (err)
3380 		return err;
3381 
3382 	dsa_tree_for_each_user_port(dp, dst) {
3383 		if (dsa_port_to_conduit(dp) != conduit)
3384 			continue;
3385 
3386 		err = dsa_user_change_conduit(dp->user, lag_dev, extack);
3387 		if (err)
3388 			goto restore;
3389 	}
3390 
3391 	return 0;
3392 
3393 restore:
3394 	dsa_tree_for_each_user_port_continue_reverse(dp, dst) {
3395 		if (dsa_port_to_conduit(dp) != lag_dev)
3396 			continue;
3397 
3398 		err = dsa_user_change_conduit(dp->user, conduit, NULL);
3399 		if (err) {
3400 			netdev_err(dp->user,
3401 				   "failed to restore conduit to %s: %pe\n",
3402 				   conduit->name, ERR_PTR(err));
3403 		}
3404 	}
3405 
3406 	dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr);
3407 
3408 	return err;
3409 }
3410 
3411 static void dsa_conduit_lag_leave(struct net_device *conduit,
3412 				  struct net_device *lag_dev)
3413 {
3414 	struct dsa_port *dp, *cpu_dp = lag_dev->dsa_ptr;
3415 	struct dsa_switch_tree *dst = cpu_dp->dst;
3416 	struct dsa_port *new_cpu_dp = NULL;
3417 	struct net_device *lower;
3418 	struct list_head *iter;
3419 
3420 	netdev_for_each_lower_dev(lag_dev, lower, iter) {
3421 		if (netdev_uses_dsa(lower)) {
3422 			new_cpu_dp = lower->dsa_ptr;
3423 			break;
3424 		}
3425 	}
3426 
3427 	if (new_cpu_dp) {
3428 		/* Update the CPU port of the user ports still under the LAG
3429 		 * so that dsa_port_to_conduit() continues to work properly
3430 		 */
3431 		dsa_tree_for_each_user_port(dp, dst)
3432 			if (dsa_port_to_conduit(dp) == lag_dev)
3433 				dp->cpu_dp = new_cpu_dp;
3434 
3435 		/* Update the index of the virtual CPU port to match the lowest
3436 		 * physical CPU port
3437 		 */
3438 		lag_dev->dsa_ptr = new_cpu_dp;
3439 		wmb();
3440 	} else {
3441 		/* If the LAG DSA conduit has no ports left, migrate back all
3442 		 * user ports to the first physical CPU port
3443 		 */
3444 		dsa_tree_migrate_ports_from_lag_conduit(dst, lag_dev);
3445 	}
3446 
3447 	/* This DSA conduit has left its LAG in any case, so let
3448 	 * the CPU port leave the hardware LAG as well
3449 	 */
3450 	dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr);
3451 }
3452 
3453 static int dsa_conduit_changeupper(struct net_device *dev,
3454 				   struct netdev_notifier_changeupper_info *info)
3455 {
3456 	struct netlink_ext_ack *extack;
3457 	int err = NOTIFY_DONE;
3458 
3459 	if (!netdev_uses_dsa(dev))
3460 		return err;
3461 
3462 	extack = netdev_notifier_info_to_extack(&info->info);
3463 
3464 	if (netif_is_lag_master(info->upper_dev)) {
3465 		if (info->linking) {
3466 			err = dsa_conduit_lag_join(dev, info->upper_dev,
3467 						   info->upper_info, extack);
3468 			err = notifier_from_errno(err);
3469 		} else {
3470 			dsa_conduit_lag_leave(dev, info->upper_dev);
3471 			err = NOTIFY_OK;
3472 		}
3473 	}
3474 
3475 	return err;
3476 }
3477 
3478 static int dsa_user_netdevice_event(struct notifier_block *nb,
3479 				    unsigned long event, void *ptr)
3480 {
3481 	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
3482 
3483 	switch (event) {
3484 	case NETDEV_PRECHANGEUPPER: {
3485 		struct netdev_notifier_changeupper_info *info = ptr;
3486 		int err;
3487 
3488 		err = dsa_user_prechangeupper_sanity_check(dev, info);
3489 		if (notifier_to_errno(err))
3490 			return err;
3491 
3492 		err = dsa_conduit_prechangeupper_sanity_check(dev, info);
3493 		if (notifier_to_errno(err))
3494 			return err;
3495 
3496 		err = dsa_lag_conduit_prechangelower_sanity_check(dev, info);
3497 		if (notifier_to_errno(err))
3498 			return err;
3499 
3500 		err = dsa_bridge_prechangelower_sanity_check(dev, info);
3501 		if (notifier_to_errno(err))
3502 			return err;
3503 
3504 		err = dsa_user_prechangeupper(dev, ptr);
3505 		if (notifier_to_errno(err))
3506 			return err;
3507 
3508 		err = dsa_user_lag_prechangeupper(dev, ptr);
3509 		if (notifier_to_errno(err))
3510 			return err;
3511 
3512 		break;
3513 	}
3514 	case NETDEV_CHANGEUPPER: {
3515 		int err;
3516 
3517 		err = dsa_user_changeupper(dev, ptr);
3518 		if (notifier_to_errno(err))
3519 			return err;
3520 
3521 		err = dsa_user_lag_changeupper(dev, ptr);
3522 		if (notifier_to_errno(err))
3523 			return err;
3524 
3525 		err = dsa_conduit_changeupper(dev, ptr);
3526 		if (notifier_to_errno(err))
3527 			return err;
3528 
3529 		break;
3530 	}
3531 	case NETDEV_CHANGELOWERSTATE: {
3532 		struct netdev_notifier_changelowerstate_info *info = ptr;
3533 		struct dsa_port *dp;
3534 		int err = 0;
3535 
3536 		if (dsa_user_dev_check(dev)) {
3537 			dp = dsa_user_to_port(dev);
3538 
3539 			err = dsa_port_lag_change(dp, info->lower_state_info);
3540 		}
3541 
3542 		/* Mirror LAG port events on DSA conduits that are in
3543 		 * a LAG towards their respective switch CPU ports
3544 		 */
3545 		if (netdev_uses_dsa(dev)) {
3546 			dp = dev->dsa_ptr;
3547 
3548 			err = dsa_port_lag_change(dp, info->lower_state_info);
3549 		}
3550 
3551 		return notifier_from_errno(err);
3552 	}
3553 	case NETDEV_CHANGE:
3554 	case NETDEV_UP: {
3555 		/* Track state of conduit port.
3556 		 * DSA driver may require the conduit port (and indirectly
3557 		 * the tagger) to be available for some special operation.
3558 		 */
3559 		if (netdev_uses_dsa(dev)) {
3560 			struct dsa_port *cpu_dp = dev->dsa_ptr;
3561 			struct dsa_switch_tree *dst = cpu_dp->ds->dst;
3562 
3563 			/* Track when the conduit port is UP */
3564 			dsa_tree_conduit_oper_state_change(dst, dev,
3565 							   netif_oper_up(dev));
3566 
3567 			/* Track when the conduit port is ready and can accept
3568 			 * packet.
3569 			 * NETDEV_UP event is not enough to flag a port as ready.
3570 			 * We also have to wait for linkwatch_do_dev to dev_activate
3571 			 * and emit a NETDEV_CHANGE event.
3572 			 * We check if a conduit port is ready by checking if the dev
3573 			 * have a qdisc assigned and is not noop.
3574 			 */
3575 			dsa_tree_conduit_admin_state_change(dst, dev,
3576 							    !qdisc_tx_is_noop(dev));
3577 
3578 			return NOTIFY_OK;
3579 		}
3580 
3581 		return NOTIFY_DONE;
3582 	}
3583 	case NETDEV_GOING_DOWN: {
3584 		struct dsa_port *dp, *cpu_dp;
3585 		struct dsa_switch_tree *dst;
3586 		LIST_HEAD(close_list);
3587 
3588 		if (!netdev_uses_dsa(dev))
3589 			return NOTIFY_DONE;
3590 
3591 		cpu_dp = dev->dsa_ptr;
3592 		dst = cpu_dp->ds->dst;
3593 
3594 		dsa_tree_conduit_admin_state_change(dst, dev, false);
3595 
3596 		list_for_each_entry(dp, &dst->ports, list) {
3597 			if (!dsa_port_is_user(dp))
3598 				continue;
3599 
3600 			if (dp->cpu_dp != cpu_dp)
3601 				continue;
3602 
3603 			list_add(&dp->user->close_list, &close_list);
3604 		}
3605 
3606 		netif_close_many(&close_list, true);
3607 
3608 		return NOTIFY_OK;
3609 	}
3610 	default:
3611 		break;
3612 	}
3613 
3614 	return NOTIFY_DONE;
3615 }
3616 
3617 static void
3618 dsa_fdb_offload_notify(struct dsa_switchdev_event_work *switchdev_work)
3619 {
3620 	struct switchdev_notifier_fdb_info info = {};
3621 
3622 	info.addr = switchdev_work->addr;
3623 	info.vid = switchdev_work->vid;
3624 	info.offloaded = true;
3625 	call_switchdev_notifiers(SWITCHDEV_FDB_OFFLOADED,
3626 				 switchdev_work->orig_dev, &info.info, NULL);
3627 }
3628 
3629 static void dsa_user_switchdev_event_work(struct work_struct *work)
3630 {
3631 	struct dsa_switchdev_event_work *switchdev_work =
3632 		container_of(work, struct dsa_switchdev_event_work, work);
3633 	const unsigned char *addr = switchdev_work->addr;
3634 	struct net_device *dev = switchdev_work->dev;
3635 	u16 vid = switchdev_work->vid;
3636 	struct dsa_switch *ds;
3637 	struct dsa_port *dp;
3638 	int err;
3639 
3640 	dp = dsa_user_to_port(dev);
3641 	ds = dp->ds;
3642 
3643 	switch (switchdev_work->event) {
3644 	case SWITCHDEV_FDB_ADD_TO_DEVICE:
3645 		if (switchdev_work->host_addr)
3646 			err = dsa_port_bridge_host_fdb_add(dp, addr, vid);
3647 		else if (dp->lag)
3648 			err = dsa_port_lag_fdb_add(dp, addr, vid);
3649 		else
3650 			err = dsa_port_fdb_add(dp, addr, vid);
3651 		if (err) {
3652 			dev_err(ds->dev,
3653 				"port %d failed to add %pM vid %d to fdb: %d\n",
3654 				dp->index, addr, vid, err);
3655 			break;
3656 		}
3657 		dsa_fdb_offload_notify(switchdev_work);
3658 		break;
3659 
3660 	case SWITCHDEV_FDB_DEL_TO_DEVICE:
3661 		if (switchdev_work->host_addr)
3662 			err = dsa_port_bridge_host_fdb_del(dp, addr, vid);
3663 		else if (dp->lag)
3664 			err = dsa_port_lag_fdb_del(dp, addr, vid);
3665 		else
3666 			err = dsa_port_fdb_del(dp, addr, vid);
3667 		if (err) {
3668 			dev_err(ds->dev,
3669 				"port %d failed to delete %pM vid %d from fdb: %d\n",
3670 				dp->index, addr, vid, err);
3671 		}
3672 
3673 		break;
3674 	}
3675 
3676 	kfree(switchdev_work);
3677 }
3678 
3679 static bool dsa_foreign_dev_check(const struct net_device *dev,
3680 				  const struct net_device *foreign_dev)
3681 {
3682 	const struct dsa_port *dp = dsa_user_to_port(dev);
3683 	struct dsa_switch_tree *dst = dp->ds->dst;
3684 
3685 	if (netif_is_bridge_master(foreign_dev))
3686 		return !dsa_tree_offloads_bridge_dev(dst, foreign_dev);
3687 
3688 	if (netif_is_bridge_port(foreign_dev))
3689 		return !dsa_tree_offloads_bridge_port(dst, foreign_dev);
3690 
3691 	/* Everything else is foreign */
3692 	return true;
3693 }
3694 
3695 static int dsa_user_fdb_event(struct net_device *dev,
3696 			      struct net_device *orig_dev,
3697 			      unsigned long event, const void *ctx,
3698 			      const struct switchdev_notifier_fdb_info *fdb_info)
3699 {
3700 	struct dsa_switchdev_event_work *switchdev_work;
3701 	struct dsa_port *dp = dsa_user_to_port(dev);
3702 	bool host_addr = fdb_info->is_local;
3703 	struct dsa_switch *ds = dp->ds;
3704 
3705 	if (ctx && ctx != dp)
3706 		return 0;
3707 
3708 	if (!dp->bridge)
3709 		return 0;
3710 
3711 	if (switchdev_fdb_is_dynamically_learned(fdb_info)) {
3712 		if (dsa_port_offloads_bridge_port(dp, orig_dev))
3713 			return 0;
3714 
3715 		/* FDB entries learned by the software bridge or by foreign
3716 		 * bridge ports should be installed as host addresses only if
3717 		 * the driver requests assisted learning.
3718 		 */
3719 		if (!ds->assisted_learning_on_cpu_port)
3720 			return 0;
3721 	}
3722 
3723 	/* Also treat FDB entries on foreign interfaces bridged with us as host
3724 	 * addresses.
3725 	 */
3726 	if (dsa_foreign_dev_check(dev, orig_dev))
3727 		host_addr = true;
3728 
3729 	/* Check early that we're not doing work in vain.
3730 	 * Host addresses on LAG ports still require regular FDB ops,
3731 	 * since the CPU port isn't in a LAG.
3732 	 */
3733 	if (dp->lag && !host_addr) {
3734 		if (!ds->ops->lag_fdb_add || !ds->ops->lag_fdb_del)
3735 			return -EOPNOTSUPP;
3736 	} else {
3737 		if (!ds->ops->port_fdb_add || !ds->ops->port_fdb_del)
3738 			return -EOPNOTSUPP;
3739 	}
3740 
3741 	switchdev_work = kzalloc(sizeof(*switchdev_work), GFP_ATOMIC);
3742 	if (!switchdev_work)
3743 		return -ENOMEM;
3744 
3745 	netdev_dbg(dev, "%s FDB entry towards %s, addr %pM vid %d%s\n",
3746 		   event == SWITCHDEV_FDB_ADD_TO_DEVICE ? "Adding" : "Deleting",
3747 		   orig_dev->name, fdb_info->addr, fdb_info->vid,
3748 		   host_addr ? " as host address" : "");
3749 
3750 	INIT_WORK(&switchdev_work->work, dsa_user_switchdev_event_work);
3751 	switchdev_work->event = event;
3752 	switchdev_work->dev = dev;
3753 	switchdev_work->orig_dev = orig_dev;
3754 
3755 	ether_addr_copy(switchdev_work->addr, fdb_info->addr);
3756 	switchdev_work->vid = fdb_info->vid;
3757 	switchdev_work->host_addr = host_addr;
3758 
3759 	dsa_schedule_work(&switchdev_work->work);
3760 
3761 	return 0;
3762 }
3763 
3764 /* Called under rcu_read_lock() */
3765 static int dsa_user_switchdev_event(struct notifier_block *unused,
3766 				    unsigned long event, void *ptr)
3767 {
3768 	struct net_device *dev = switchdev_notifier_info_to_dev(ptr);
3769 	int err;
3770 
3771 	switch (event) {
3772 	case SWITCHDEV_PORT_ATTR_SET:
3773 		err = switchdev_handle_port_attr_set(dev, ptr,
3774 						     dsa_user_dev_check,
3775 						     dsa_user_port_attr_set);
3776 		return notifier_from_errno(err);
3777 	case SWITCHDEV_FDB_ADD_TO_DEVICE:
3778 	case SWITCHDEV_FDB_DEL_TO_DEVICE:
3779 		err = switchdev_handle_fdb_event_to_device(dev, event, ptr,
3780 							   dsa_user_dev_check,
3781 							   dsa_foreign_dev_check,
3782 							   dsa_user_fdb_event);
3783 		return notifier_from_errno(err);
3784 	default:
3785 		return NOTIFY_DONE;
3786 	}
3787 
3788 	return NOTIFY_OK;
3789 }
3790 
3791 static int dsa_user_switchdev_blocking_event(struct notifier_block *unused,
3792 					     unsigned long event, void *ptr)
3793 {
3794 	struct net_device *dev = switchdev_notifier_info_to_dev(ptr);
3795 	int err;
3796 
3797 	switch (event) {
3798 	case SWITCHDEV_PORT_OBJ_ADD:
3799 		err = switchdev_handle_port_obj_add_foreign(dev, ptr,
3800 							    dsa_user_dev_check,
3801 							    dsa_foreign_dev_check,
3802 							    dsa_user_port_obj_add);
3803 		return notifier_from_errno(err);
3804 	case SWITCHDEV_PORT_OBJ_DEL:
3805 		err = switchdev_handle_port_obj_del_foreign(dev, ptr,
3806 							    dsa_user_dev_check,
3807 							    dsa_foreign_dev_check,
3808 							    dsa_user_port_obj_del);
3809 		return notifier_from_errno(err);
3810 	case SWITCHDEV_PORT_ATTR_SET:
3811 		err = switchdev_handle_port_attr_set(dev, ptr,
3812 						     dsa_user_dev_check,
3813 						     dsa_user_port_attr_set);
3814 		return notifier_from_errno(err);
3815 	}
3816 
3817 	return NOTIFY_DONE;
3818 }
3819 
3820 static struct notifier_block dsa_user_nb __read_mostly = {
3821 	.notifier_call  = dsa_user_netdevice_event,
3822 };
3823 
3824 struct notifier_block dsa_user_switchdev_notifier = {
3825 	.notifier_call = dsa_user_switchdev_event,
3826 };
3827 
3828 struct notifier_block dsa_user_switchdev_blocking_notifier = {
3829 	.notifier_call = dsa_user_switchdev_blocking_event,
3830 };
3831 
3832 int dsa_user_register_notifier(void)
3833 {
3834 	struct notifier_block *nb;
3835 	int err;
3836 
3837 	err = register_netdevice_notifier(&dsa_user_nb);
3838 	if (err)
3839 		return err;
3840 
3841 	err = register_switchdev_notifier(&dsa_user_switchdev_notifier);
3842 	if (err)
3843 		goto err_switchdev_nb;
3844 
3845 	nb = &dsa_user_switchdev_blocking_notifier;
3846 	err = register_switchdev_blocking_notifier(nb);
3847 	if (err)
3848 		goto err_switchdev_blocking_nb;
3849 
3850 	return 0;
3851 
3852 err_switchdev_blocking_nb:
3853 	unregister_switchdev_notifier(&dsa_user_switchdev_notifier);
3854 err_switchdev_nb:
3855 	unregister_netdevice_notifier(&dsa_user_nb);
3856 	return err;
3857 }
3858 
3859 void dsa_user_unregister_notifier(void)
3860 {
3861 	struct notifier_block *nb;
3862 	int err;
3863 
3864 	nb = &dsa_user_switchdev_blocking_notifier;
3865 	err = unregister_switchdev_blocking_notifier(nb);
3866 	if (err)
3867 		pr_err("DSA: failed to unregister switchdev blocking notifier (%d)\n", err);
3868 
3869 	err = unregister_switchdev_notifier(&dsa_user_switchdev_notifier);
3870 	if (err)
3871 		pr_err("DSA: failed to unregister switchdev notifier (%d)\n", err);
3872 
3873 	err = unregister_netdevice_notifier(&dsa_user_nb);
3874 	if (err)
3875 		pr_err("DSA: failed to unregister user notifier (%d)\n", err);
3876 }
3877