1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * net/dsa/user.c - user device handling 4 * Copyright (c) 2008-2009 Marvell Semiconductor 5 */ 6 7 #include <linux/list.h> 8 #include <linux/etherdevice.h> 9 #include <linux/netdevice.h> 10 #include <linux/phy.h> 11 #include <linux/phy_fixed.h> 12 #include <linux/phylink.h> 13 #include <linux/of_net.h> 14 #include <linux/of_mdio.h> 15 #include <linux/mdio.h> 16 #include <net/rtnetlink.h> 17 #include <net/pkt_cls.h> 18 #include <net/selftests.h> 19 #include <net/tc_act/tc_mirred.h> 20 #include <linux/if_bridge.h> 21 #include <linux/if_hsr.h> 22 #include <net/dcbnl.h> 23 #include <linux/netpoll.h> 24 #include <linux/string.h> 25 26 #include "conduit.h" 27 #include "dsa.h" 28 #include "netlink.h" 29 #include "port.h" 30 #include "switch.h" 31 #include "tag.h" 32 #include "user.h" 33 34 struct dsa_switchdev_event_work { 35 struct net_device *dev; 36 struct net_device *orig_dev; 37 struct work_struct work; 38 unsigned long event; 39 /* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and 40 * SWITCHDEV_FDB_DEL_TO_DEVICE 41 */ 42 unsigned char addr[ETH_ALEN]; 43 u16 vid; 44 bool host_addr; 45 }; 46 47 enum dsa_standalone_event { 48 DSA_UC_ADD, 49 DSA_UC_DEL, 50 DSA_MC_ADD, 51 DSA_MC_DEL, 52 }; 53 54 struct dsa_standalone_event_work { 55 struct work_struct work; 56 struct net_device *dev; 57 enum dsa_standalone_event event; 58 unsigned char addr[ETH_ALEN]; 59 u16 vid; 60 }; 61 62 struct dsa_host_vlan_rx_filtering_ctx { 63 struct net_device *dev; 64 const unsigned char *addr; 65 enum dsa_standalone_event event; 66 }; 67 68 static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds) 69 { 70 return ds->ops->port_fdb_add && ds->ops->port_fdb_del && 71 ds->fdb_isolation && !ds->vlan_filtering_is_global && 72 !ds->needs_standalone_vlan_filtering; 73 } 74 75 static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds) 76 { 77 return ds->ops->port_mdb_add && ds->ops->port_mdb_del && 78 ds->fdb_isolation && !ds->vlan_filtering_is_global && 79 !ds->needs_standalone_vlan_filtering; 80 } 81 82 static void dsa_user_standalone_event_work(struct work_struct *work) 83 { 84 struct dsa_standalone_event_work *standalone_work = 85 container_of(work, struct dsa_standalone_event_work, work); 86 const unsigned char *addr = standalone_work->addr; 87 struct net_device *dev = standalone_work->dev; 88 struct dsa_port *dp = dsa_user_to_port(dev); 89 struct switchdev_obj_port_mdb mdb; 90 struct dsa_switch *ds = dp->ds; 91 u16 vid = standalone_work->vid; 92 int err; 93 94 switch (standalone_work->event) { 95 case DSA_UC_ADD: 96 err = dsa_port_standalone_host_fdb_add(dp, addr, vid); 97 if (err) { 98 dev_err(ds->dev, 99 "port %d failed to add %pM vid %d to fdb: %d\n", 100 dp->index, addr, vid, err); 101 break; 102 } 103 break; 104 105 case DSA_UC_DEL: 106 err = dsa_port_standalone_host_fdb_del(dp, addr, vid); 107 if (err) { 108 dev_err(ds->dev, 109 "port %d failed to delete %pM vid %d from fdb: %d\n", 110 dp->index, addr, vid, err); 111 } 112 113 break; 114 case DSA_MC_ADD: 115 ether_addr_copy(mdb.addr, addr); 116 mdb.vid = vid; 117 118 err = dsa_port_standalone_host_mdb_add(dp, &mdb); 119 if (err) { 120 dev_err(ds->dev, 121 "port %d failed to add %pM vid %d to mdb: %d\n", 122 dp->index, addr, vid, err); 123 break; 124 } 125 break; 126 case DSA_MC_DEL: 127 ether_addr_copy(mdb.addr, addr); 128 mdb.vid = vid; 129 130 err = dsa_port_standalone_host_mdb_del(dp, &mdb); 131 if (err) { 132 dev_err(ds->dev, 133 "port %d failed to delete %pM vid %d from mdb: %d\n", 134 dp->index, addr, vid, err); 135 } 136 137 break; 138 } 139 140 kfree(standalone_work); 141 } 142 143 static int dsa_user_schedule_standalone_work(struct net_device *dev, 144 enum dsa_standalone_event event, 145 const unsigned char *addr, 146 u16 vid) 147 { 148 struct dsa_standalone_event_work *standalone_work; 149 150 standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC); 151 if (!standalone_work) 152 return -ENOMEM; 153 154 INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work); 155 standalone_work->event = event; 156 standalone_work->dev = dev; 157 158 ether_addr_copy(standalone_work->addr, addr); 159 standalone_work->vid = vid; 160 161 dsa_schedule_work(&standalone_work->work); 162 163 return 0; 164 } 165 166 static int dsa_user_host_vlan_rx_filtering(void *arg, int vid) 167 { 168 struct dsa_host_vlan_rx_filtering_ctx *ctx = arg; 169 170 return dsa_user_schedule_standalone_work(ctx->dev, ctx->event, 171 ctx->addr, vid); 172 } 173 174 static int dsa_user_vlan_for_each(struct net_device *dev, 175 int (*cb)(void *arg, int vid), void *arg) 176 { 177 struct dsa_port *dp = dsa_user_to_port(dev); 178 struct dsa_vlan *v; 179 int err; 180 181 lockdep_assert_held(&dev->addr_list_lock); 182 183 err = cb(arg, 0); 184 if (err) 185 return err; 186 187 list_for_each_entry(v, &dp->user_vlans, list) { 188 err = cb(arg, v->vid); 189 if (err) 190 return err; 191 } 192 193 return 0; 194 } 195 196 static int dsa_user_sync_uc(struct net_device *dev, 197 const unsigned char *addr) 198 { 199 struct net_device *conduit = dsa_user_to_conduit(dev); 200 struct dsa_port *dp = dsa_user_to_port(dev); 201 struct dsa_host_vlan_rx_filtering_ctx ctx = { 202 .dev = dev, 203 .addr = addr, 204 .event = DSA_UC_ADD, 205 }; 206 207 dev_uc_add(conduit, addr); 208 209 if (!dsa_switch_supports_uc_filtering(dp->ds)) 210 return 0; 211 212 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 213 &ctx); 214 } 215 216 static int dsa_user_unsync_uc(struct net_device *dev, 217 const unsigned char *addr) 218 { 219 struct net_device *conduit = dsa_user_to_conduit(dev); 220 struct dsa_port *dp = dsa_user_to_port(dev); 221 struct dsa_host_vlan_rx_filtering_ctx ctx = { 222 .dev = dev, 223 .addr = addr, 224 .event = DSA_UC_DEL, 225 }; 226 227 dev_uc_del(conduit, addr); 228 229 if (!dsa_switch_supports_uc_filtering(dp->ds)) 230 return 0; 231 232 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 233 &ctx); 234 } 235 236 static int dsa_user_sync_mc(struct net_device *dev, 237 const unsigned char *addr) 238 { 239 struct net_device *conduit = dsa_user_to_conduit(dev); 240 struct dsa_port *dp = dsa_user_to_port(dev); 241 struct dsa_host_vlan_rx_filtering_ctx ctx = { 242 .dev = dev, 243 .addr = addr, 244 .event = DSA_MC_ADD, 245 }; 246 247 dev_mc_add(conduit, addr); 248 249 if (!dsa_switch_supports_mc_filtering(dp->ds)) 250 return 0; 251 252 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 253 &ctx); 254 } 255 256 static int dsa_user_unsync_mc(struct net_device *dev, 257 const unsigned char *addr) 258 { 259 struct net_device *conduit = dsa_user_to_conduit(dev); 260 struct dsa_port *dp = dsa_user_to_port(dev); 261 struct dsa_host_vlan_rx_filtering_ctx ctx = { 262 .dev = dev, 263 .addr = addr, 264 .event = DSA_MC_DEL, 265 }; 266 267 dev_mc_del(conduit, addr); 268 269 if (!dsa_switch_supports_mc_filtering(dp->ds)) 270 return 0; 271 272 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 273 &ctx); 274 } 275 276 void dsa_user_sync_ha(struct net_device *dev) 277 { 278 struct dsa_port *dp = dsa_user_to_port(dev); 279 struct dsa_switch *ds = dp->ds; 280 struct netdev_hw_addr *ha; 281 282 netif_addr_lock_bh(dev); 283 284 netdev_for_each_synced_mc_addr(ha, dev) 285 dsa_user_sync_mc(dev, ha->addr); 286 287 netdev_for_each_synced_uc_addr(ha, dev) 288 dsa_user_sync_uc(dev, ha->addr); 289 290 netif_addr_unlock_bh(dev); 291 292 if (dsa_switch_supports_uc_filtering(ds) || 293 dsa_switch_supports_mc_filtering(ds)) 294 dsa_flush_workqueue(); 295 } 296 297 void dsa_user_unsync_ha(struct net_device *dev) 298 { 299 struct dsa_port *dp = dsa_user_to_port(dev); 300 struct dsa_switch *ds = dp->ds; 301 struct netdev_hw_addr *ha; 302 303 netif_addr_lock_bh(dev); 304 305 netdev_for_each_synced_uc_addr(ha, dev) 306 dsa_user_unsync_uc(dev, ha->addr); 307 308 netdev_for_each_synced_mc_addr(ha, dev) 309 dsa_user_unsync_mc(dev, ha->addr); 310 311 netif_addr_unlock_bh(dev); 312 313 if (dsa_switch_supports_uc_filtering(ds) || 314 dsa_switch_supports_mc_filtering(ds)) 315 dsa_flush_workqueue(); 316 } 317 318 /* user mii_bus handling ***************************************************/ 319 static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg) 320 { 321 struct dsa_switch *ds = bus->priv; 322 323 if (ds->phys_mii_mask & (1 << addr)) 324 return ds->ops->phy_read(ds, addr, reg); 325 326 return 0xffff; 327 } 328 329 static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val) 330 { 331 struct dsa_switch *ds = bus->priv; 332 333 if (ds->phys_mii_mask & (1 << addr)) 334 return ds->ops->phy_write(ds, addr, reg, val); 335 336 return 0; 337 } 338 339 void dsa_user_mii_bus_init(struct dsa_switch *ds) 340 { 341 ds->user_mii_bus->priv = (void *)ds; 342 ds->user_mii_bus->name = "dsa user smi"; 343 ds->user_mii_bus->read = dsa_user_phy_read; 344 ds->user_mii_bus->write = dsa_user_phy_write; 345 snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d", 346 ds->dst->index, ds->index); 347 ds->user_mii_bus->parent = ds->dev; 348 ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask; 349 } 350 351 352 /* user device handling ****************************************************/ 353 static int dsa_user_get_iflink(const struct net_device *dev) 354 { 355 return READ_ONCE(dsa_user_to_conduit(dev)->ifindex); 356 } 357 358 int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr) 359 { 360 struct net_device *conduit = dsa_user_to_conduit(dev); 361 struct dsa_port *dp = dsa_user_to_port(dev); 362 struct dsa_switch *ds = dp->ds; 363 int err; 364 365 if (dsa_switch_supports_uc_filtering(ds)) { 366 err = dsa_port_standalone_host_fdb_add(dp, addr, 0); 367 if (err) 368 goto out; 369 } 370 371 if (!ether_addr_equal(addr, conduit->dev_addr)) { 372 err = dev_uc_add(conduit, addr); 373 if (err < 0) 374 goto del_host_addr; 375 } 376 377 return 0; 378 379 del_host_addr: 380 if (dsa_switch_supports_uc_filtering(ds)) 381 dsa_port_standalone_host_fdb_del(dp, addr, 0); 382 out: 383 return err; 384 } 385 386 void dsa_user_host_uc_uninstall(struct net_device *dev) 387 { 388 struct net_device *conduit = dsa_user_to_conduit(dev); 389 struct dsa_port *dp = dsa_user_to_port(dev); 390 struct dsa_switch *ds = dp->ds; 391 392 if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr)) 393 dev_uc_del(conduit, dev->dev_addr); 394 395 if (dsa_switch_supports_uc_filtering(ds)) 396 dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0); 397 } 398 399 static int dsa_user_open(struct net_device *dev) 400 { 401 struct net_device *conduit = dsa_user_to_conduit(dev); 402 struct dsa_port *dp = dsa_user_to_port(dev); 403 int err; 404 405 err = dev_open(conduit, NULL); 406 if (err < 0) { 407 netdev_err(dev, "failed to open conduit %s\n", conduit->name); 408 goto out; 409 } 410 411 err = dsa_user_host_uc_install(dev, dev->dev_addr); 412 if (err) 413 goto out; 414 415 err = dsa_port_enable_rt(dp, dev->phydev); 416 if (err) 417 goto out_del_host_uc; 418 419 return 0; 420 421 out_del_host_uc: 422 dsa_user_host_uc_uninstall(dev); 423 out: 424 return err; 425 } 426 427 static int dsa_user_close(struct net_device *dev) 428 { 429 struct dsa_port *dp = dsa_user_to_port(dev); 430 431 dsa_port_disable_rt(dp); 432 433 dsa_user_host_uc_uninstall(dev); 434 435 return 0; 436 } 437 438 static void dsa_user_manage_host_flood(struct net_device *dev) 439 { 440 bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI); 441 struct dsa_port *dp = dsa_user_to_port(dev); 442 bool uc = dev->flags & IFF_PROMISC; 443 444 dsa_port_set_host_flood(dp, uc, mc); 445 } 446 447 static void dsa_user_change_rx_flags(struct net_device *dev, int change) 448 { 449 struct net_device *conduit = dsa_user_to_conduit(dev); 450 struct dsa_port *dp = dsa_user_to_port(dev); 451 struct dsa_switch *ds = dp->ds; 452 453 if (change & IFF_ALLMULTI) 454 dev_set_allmulti(conduit, 455 dev->flags & IFF_ALLMULTI ? 1 : -1); 456 if (change & IFF_PROMISC) 457 dev_set_promiscuity(conduit, 458 dev->flags & IFF_PROMISC ? 1 : -1); 459 460 if (dsa_switch_supports_uc_filtering(ds) && 461 dsa_switch_supports_mc_filtering(ds)) 462 dsa_user_manage_host_flood(dev); 463 } 464 465 static void dsa_user_set_rx_mode(struct net_device *dev) 466 { 467 __dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc); 468 __dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc); 469 } 470 471 static int dsa_user_set_mac_address(struct net_device *dev, void *a) 472 { 473 struct dsa_port *dp = dsa_user_to_port(dev); 474 struct dsa_switch *ds = dp->ds; 475 struct sockaddr *addr = a; 476 int err; 477 478 if (!is_valid_ether_addr(addr->sa_data)) 479 return -EADDRNOTAVAIL; 480 481 if (ds->ops->port_set_mac_address) { 482 err = ds->ops->port_set_mac_address(ds, dp->index, 483 addr->sa_data); 484 if (err) 485 return err; 486 } 487 488 /* If the port is down, the address isn't synced yet to hardware or 489 * to the DSA conduit, so there is nothing to change. 490 */ 491 if (!(dev->flags & IFF_UP)) 492 goto out_change_dev_addr; 493 494 err = dsa_user_host_uc_install(dev, addr->sa_data); 495 if (err) 496 return err; 497 498 dsa_user_host_uc_uninstall(dev); 499 500 out_change_dev_addr: 501 eth_hw_addr_set(dev, addr->sa_data); 502 503 return 0; 504 } 505 506 struct dsa_user_dump_ctx { 507 struct net_device *dev; 508 struct sk_buff *skb; 509 struct netlink_callback *cb; 510 int idx; 511 }; 512 513 static int 514 dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid, 515 bool is_static, void *data) 516 { 517 struct dsa_user_dump_ctx *dump = data; 518 struct ndo_fdb_dump_context *ctx = (void *)dump->cb->ctx; 519 u32 portid = NETLINK_CB(dump->cb->skb).portid; 520 u32 seq = dump->cb->nlh->nlmsg_seq; 521 struct nlmsghdr *nlh; 522 struct ndmsg *ndm; 523 524 if (dump->idx < ctx->fdb_idx) 525 goto skip; 526 527 nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH, 528 sizeof(*ndm), NLM_F_MULTI); 529 if (!nlh) 530 return -EMSGSIZE; 531 532 ndm = nlmsg_data(nlh); 533 ndm->ndm_family = AF_BRIDGE; 534 ndm->ndm_pad1 = 0; 535 ndm->ndm_pad2 = 0; 536 ndm->ndm_flags = NTF_SELF; 537 ndm->ndm_type = 0; 538 ndm->ndm_ifindex = dump->dev->ifindex; 539 ndm->ndm_state = is_static ? NUD_NOARP : NUD_REACHABLE; 540 541 if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr)) 542 goto nla_put_failure; 543 544 if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid)) 545 goto nla_put_failure; 546 547 nlmsg_end(dump->skb, nlh); 548 549 skip: 550 dump->idx++; 551 return 0; 552 553 nla_put_failure: 554 nlmsg_cancel(dump->skb, nlh); 555 return -EMSGSIZE; 556 } 557 558 static int 559 dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb, 560 struct net_device *dev, struct net_device *filter_dev, 561 int *idx) 562 { 563 struct dsa_port *dp = dsa_user_to_port(dev); 564 struct dsa_user_dump_ctx dump = { 565 .dev = dev, 566 .skb = skb, 567 .cb = cb, 568 .idx = *idx, 569 }; 570 int err; 571 572 err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump); 573 *idx = dump.idx; 574 575 return err; 576 } 577 578 static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) 579 { 580 struct dsa_user_priv *p = netdev_priv(dev); 581 struct dsa_switch *ds = p->dp->ds; 582 int port = p->dp->index; 583 584 /* Pass through to switch driver if it supports timestamping */ 585 switch (cmd) { 586 case SIOCGHWTSTAMP: 587 if (ds->ops->port_hwtstamp_get) 588 return ds->ops->port_hwtstamp_get(ds, port, ifr); 589 break; 590 case SIOCSHWTSTAMP: 591 if (ds->ops->port_hwtstamp_set) 592 return ds->ops->port_hwtstamp_set(ds, port, ifr); 593 break; 594 } 595 596 return phylink_mii_ioctl(p->dp->pl, ifr, cmd); 597 } 598 599 static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx, 600 const struct switchdev_attr *attr, 601 struct netlink_ext_ack *extack) 602 { 603 struct dsa_port *dp = dsa_user_to_port(dev); 604 int ret; 605 606 if (ctx && ctx != dp) 607 return 0; 608 609 switch (attr->id) { 610 case SWITCHDEV_ATTR_ID_PORT_STP_STATE: 611 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 612 return -EOPNOTSUPP; 613 614 ret = dsa_port_set_state(dp, attr->u.stp_state, true); 615 break; 616 case SWITCHDEV_ATTR_ID_PORT_MST_STATE: 617 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 618 return -EOPNOTSUPP; 619 620 ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack); 621 break; 622 case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING: 623 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 624 return -EOPNOTSUPP; 625 626 ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering, 627 extack); 628 break; 629 case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME: 630 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 631 return -EOPNOTSUPP; 632 633 ret = dsa_port_ageing_time(dp, attr->u.ageing_time); 634 break; 635 case SWITCHDEV_ATTR_ID_BRIDGE_MST: 636 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 637 return -EOPNOTSUPP; 638 639 ret = dsa_port_mst_enable(dp, attr->u.mst, extack); 640 break; 641 case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS: 642 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 643 return -EOPNOTSUPP; 644 645 ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags, 646 extack); 647 break; 648 case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS: 649 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 650 return -EOPNOTSUPP; 651 652 ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack); 653 break; 654 case SWITCHDEV_ATTR_ID_VLAN_MSTI: 655 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 656 return -EOPNOTSUPP; 657 658 ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti); 659 break; 660 default: 661 ret = -EOPNOTSUPP; 662 break; 663 } 664 665 return ret; 666 } 667 668 /* Must be called under rcu_read_lock() */ 669 static int 670 dsa_user_vlan_check_for_8021q_uppers(struct net_device *user, 671 const struct switchdev_obj_port_vlan *vlan) 672 { 673 struct net_device *upper_dev; 674 struct list_head *iter; 675 676 netdev_for_each_upper_dev_rcu(user, upper_dev, iter) { 677 u16 vid; 678 679 if (!is_vlan_dev(upper_dev)) 680 continue; 681 682 vid = vlan_dev_vlan_id(upper_dev); 683 if (vid == vlan->vid) 684 return -EBUSY; 685 } 686 687 return 0; 688 } 689 690 static int dsa_user_vlan_add(struct net_device *dev, 691 const struct switchdev_obj *obj, 692 struct netlink_ext_ack *extack) 693 { 694 struct dsa_port *dp = dsa_user_to_port(dev); 695 struct switchdev_obj_port_vlan *vlan; 696 int err; 697 698 if (dsa_port_skip_vlan_configuration(dp)) { 699 NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); 700 return 0; 701 } 702 703 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 704 705 /* Deny adding a bridge VLAN when there is already an 802.1Q upper with 706 * the same VID. 707 */ 708 if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) { 709 rcu_read_lock(); 710 err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan); 711 rcu_read_unlock(); 712 if (err) { 713 NL_SET_ERR_MSG_MOD(extack, 714 "Port already has a VLAN upper with this VID"); 715 return err; 716 } 717 } 718 719 return dsa_port_vlan_add(dp, vlan, extack); 720 } 721 722 /* Offload a VLAN installed on the bridge or on a foreign interface by 723 * installing it as a VLAN towards the CPU port. 724 */ 725 static int dsa_user_host_vlan_add(struct net_device *dev, 726 const struct switchdev_obj *obj, 727 struct netlink_ext_ack *extack) 728 { 729 struct dsa_port *dp = dsa_user_to_port(dev); 730 struct switchdev_obj_port_vlan vlan; 731 732 /* Do nothing if this is a software bridge */ 733 if (!dp->bridge) 734 return -EOPNOTSUPP; 735 736 if (dsa_port_skip_vlan_configuration(dp)) { 737 NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); 738 return 0; 739 } 740 741 vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj); 742 743 /* Even though drivers often handle CPU membership in special ways, 744 * it doesn't make sense to program a PVID, so clear this flag. 745 */ 746 vlan.flags &= ~BRIDGE_VLAN_INFO_PVID; 747 748 return dsa_port_host_vlan_add(dp, &vlan, extack); 749 } 750 751 static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx, 752 const struct switchdev_obj *obj, 753 struct netlink_ext_ack *extack) 754 { 755 struct dsa_port *dp = dsa_user_to_port(dev); 756 int err; 757 758 if (ctx && ctx != dp) 759 return 0; 760 761 switch (obj->id) { 762 case SWITCHDEV_OBJ_ID_PORT_MDB: 763 if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 764 return -EOPNOTSUPP; 765 766 err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 767 break; 768 case SWITCHDEV_OBJ_ID_HOST_MDB: 769 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 770 return -EOPNOTSUPP; 771 772 err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 773 break; 774 case SWITCHDEV_OBJ_ID_PORT_VLAN: 775 if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 776 err = dsa_user_vlan_add(dev, obj, extack); 777 else 778 err = dsa_user_host_vlan_add(dev, obj, extack); 779 break; 780 case SWITCHDEV_OBJ_ID_MRP: 781 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 782 return -EOPNOTSUPP; 783 784 err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj)); 785 break; 786 case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: 787 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 788 return -EOPNOTSUPP; 789 790 err = dsa_port_mrp_add_ring_role(dp, 791 SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); 792 break; 793 default: 794 err = -EOPNOTSUPP; 795 break; 796 } 797 798 return err; 799 } 800 801 static int dsa_user_vlan_del(struct net_device *dev, 802 const struct switchdev_obj *obj) 803 { 804 struct dsa_port *dp = dsa_user_to_port(dev); 805 struct switchdev_obj_port_vlan *vlan; 806 807 if (dsa_port_skip_vlan_configuration(dp)) 808 return 0; 809 810 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 811 812 return dsa_port_vlan_del(dp, vlan); 813 } 814 815 static int dsa_user_host_vlan_del(struct net_device *dev, 816 const struct switchdev_obj *obj) 817 { 818 struct dsa_port *dp = dsa_user_to_port(dev); 819 struct switchdev_obj_port_vlan *vlan; 820 821 /* Do nothing if this is a software bridge */ 822 if (!dp->bridge) 823 return -EOPNOTSUPP; 824 825 if (dsa_port_skip_vlan_configuration(dp)) 826 return 0; 827 828 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 829 830 return dsa_port_host_vlan_del(dp, vlan); 831 } 832 833 static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx, 834 const struct switchdev_obj *obj) 835 { 836 struct dsa_port *dp = dsa_user_to_port(dev); 837 int err; 838 839 if (ctx && ctx != dp) 840 return 0; 841 842 switch (obj->id) { 843 case SWITCHDEV_OBJ_ID_PORT_MDB: 844 if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 845 return -EOPNOTSUPP; 846 847 err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 848 break; 849 case SWITCHDEV_OBJ_ID_HOST_MDB: 850 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 851 return -EOPNOTSUPP; 852 853 err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 854 break; 855 case SWITCHDEV_OBJ_ID_PORT_VLAN: 856 if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 857 err = dsa_user_vlan_del(dev, obj); 858 else 859 err = dsa_user_host_vlan_del(dev, obj); 860 break; 861 case SWITCHDEV_OBJ_ID_MRP: 862 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 863 return -EOPNOTSUPP; 864 865 err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj)); 866 break; 867 case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: 868 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 869 return -EOPNOTSUPP; 870 871 err = dsa_port_mrp_del_ring_role(dp, 872 SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); 873 break; 874 default: 875 err = -EOPNOTSUPP; 876 break; 877 } 878 879 return err; 880 } 881 882 static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev, 883 struct sk_buff *skb) 884 { 885 #ifdef CONFIG_NET_POLL_CONTROLLER 886 struct dsa_user_priv *p = netdev_priv(dev); 887 888 return netpoll_send_skb(p->netpoll, skb); 889 #else 890 BUG(); 891 return NETDEV_TX_OK; 892 #endif 893 } 894 895 static void dsa_skb_tx_timestamp(struct dsa_user_priv *p, 896 struct sk_buff *skb) 897 { 898 struct dsa_switch *ds = p->dp->ds; 899 900 if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP)) 901 return; 902 903 if (!ds->ops->port_txtstamp) 904 return; 905 906 ds->ops->port_txtstamp(ds, p->dp->index, skb); 907 } 908 909 netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev) 910 { 911 /* SKB for netpoll still need to be mangled with the protocol-specific 912 * tag to be successfully transmitted 913 */ 914 if (unlikely(netpoll_tx_running(dev))) 915 return dsa_user_netpoll_send_skb(dev, skb); 916 917 /* Queue the SKB for transmission on the parent interface, but 918 * do not modify its EtherType 919 */ 920 skb->dev = dsa_user_to_conduit(dev); 921 dev_queue_xmit(skb); 922 923 return NETDEV_TX_OK; 924 } 925 EXPORT_SYMBOL_GPL(dsa_enqueue_skb); 926 927 static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev) 928 { 929 struct dsa_user_priv *p = netdev_priv(dev); 930 struct sk_buff *nskb; 931 932 dev_sw_netstats_tx_add(dev, 1, skb->len); 933 934 memset(skb->cb, 0, sizeof(skb->cb)); 935 936 /* Handle tx timestamp if any */ 937 dsa_skb_tx_timestamp(p, skb); 938 939 if (skb_ensure_writable_head_tail(skb, dev)) { 940 dev_kfree_skb_any(skb); 941 return NETDEV_TX_OK; 942 } 943 944 /* needed_tailroom should still be 'warm' in the cache line from 945 * skb_ensure_writable_head_tail(), which has also ensured that 946 * padding is safe. 947 */ 948 if (dev->needed_tailroom) 949 eth_skb_pad(skb); 950 951 /* Transmit function may have to reallocate the original SKB, 952 * in which case it must have freed it. Only free it here on error. 953 */ 954 nskb = p->xmit(skb, dev); 955 if (!nskb) { 956 kfree_skb(skb); 957 return NETDEV_TX_OK; 958 } 959 960 return dsa_enqueue_skb(nskb, dev); 961 } 962 963 /* ethtool operations *******************************************************/ 964 965 static void dsa_user_get_drvinfo(struct net_device *dev, 966 struct ethtool_drvinfo *drvinfo) 967 { 968 strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver)); 969 strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version)); 970 strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info)); 971 } 972 973 static int dsa_user_get_regs_len(struct net_device *dev) 974 { 975 struct dsa_port *dp = dsa_user_to_port(dev); 976 struct dsa_switch *ds = dp->ds; 977 978 if (ds->ops->get_regs_len) 979 return ds->ops->get_regs_len(ds, dp->index); 980 981 return -EOPNOTSUPP; 982 } 983 984 static void 985 dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p) 986 { 987 struct dsa_port *dp = dsa_user_to_port(dev); 988 struct dsa_switch *ds = dp->ds; 989 990 if (ds->ops->get_regs) 991 ds->ops->get_regs(ds, dp->index, regs, _p); 992 } 993 994 static int dsa_user_nway_reset(struct net_device *dev) 995 { 996 struct dsa_port *dp = dsa_user_to_port(dev); 997 998 return phylink_ethtool_nway_reset(dp->pl); 999 } 1000 1001 static int dsa_user_get_eeprom_len(struct net_device *dev) 1002 { 1003 struct dsa_port *dp = dsa_user_to_port(dev); 1004 struct dsa_switch *ds = dp->ds; 1005 1006 if (ds->cd && ds->cd->eeprom_len) 1007 return ds->cd->eeprom_len; 1008 1009 if (ds->ops->get_eeprom_len) 1010 return ds->ops->get_eeprom_len(ds); 1011 1012 return 0; 1013 } 1014 1015 static int dsa_user_get_eeprom(struct net_device *dev, 1016 struct ethtool_eeprom *eeprom, u8 *data) 1017 { 1018 struct dsa_port *dp = dsa_user_to_port(dev); 1019 struct dsa_switch *ds = dp->ds; 1020 1021 if (ds->ops->get_eeprom) 1022 return ds->ops->get_eeprom(ds, eeprom, data); 1023 1024 return -EOPNOTSUPP; 1025 } 1026 1027 static int dsa_user_set_eeprom(struct net_device *dev, 1028 struct ethtool_eeprom *eeprom, u8 *data) 1029 { 1030 struct dsa_port *dp = dsa_user_to_port(dev); 1031 struct dsa_switch *ds = dp->ds; 1032 1033 if (ds->ops->set_eeprom) 1034 return ds->ops->set_eeprom(ds, eeprom, data); 1035 1036 return -EOPNOTSUPP; 1037 } 1038 1039 static void dsa_user_get_strings(struct net_device *dev, 1040 uint32_t stringset, uint8_t *data) 1041 { 1042 struct dsa_port *dp = dsa_user_to_port(dev); 1043 struct dsa_switch *ds = dp->ds; 1044 1045 if (stringset == ETH_SS_STATS) { 1046 ethtool_puts(&data, "tx_packets"); 1047 ethtool_puts(&data, "tx_bytes"); 1048 ethtool_puts(&data, "rx_packets"); 1049 ethtool_puts(&data, "rx_bytes"); 1050 if (ds->ops->get_strings) 1051 ds->ops->get_strings(ds, dp->index, stringset, data); 1052 } else if (stringset == ETH_SS_TEST) { 1053 net_selftest_get_strings(data); 1054 } 1055 1056 } 1057 1058 static void dsa_user_get_ethtool_stats(struct net_device *dev, 1059 struct ethtool_stats *stats, 1060 uint64_t *data) 1061 { 1062 struct dsa_port *dp = dsa_user_to_port(dev); 1063 struct dsa_switch *ds = dp->ds; 1064 struct pcpu_sw_netstats *s; 1065 unsigned int start; 1066 int i; 1067 1068 for_each_possible_cpu(i) { 1069 u64 tx_packets, tx_bytes, rx_packets, rx_bytes; 1070 1071 s = per_cpu_ptr(dev->tstats, i); 1072 do { 1073 start = u64_stats_fetch_begin(&s->syncp); 1074 tx_packets = u64_stats_read(&s->tx_packets); 1075 tx_bytes = u64_stats_read(&s->tx_bytes); 1076 rx_packets = u64_stats_read(&s->rx_packets); 1077 rx_bytes = u64_stats_read(&s->rx_bytes); 1078 } while (u64_stats_fetch_retry(&s->syncp, start)); 1079 data[0] += tx_packets; 1080 data[1] += tx_bytes; 1081 data[2] += rx_packets; 1082 data[3] += rx_bytes; 1083 } 1084 if (ds->ops->get_ethtool_stats) 1085 ds->ops->get_ethtool_stats(ds, dp->index, data + 4); 1086 } 1087 1088 static int dsa_user_get_sset_count(struct net_device *dev, int sset) 1089 { 1090 struct dsa_port *dp = dsa_user_to_port(dev); 1091 struct dsa_switch *ds = dp->ds; 1092 1093 if (sset == ETH_SS_STATS) { 1094 int count = 0; 1095 1096 if (ds->ops->get_sset_count) { 1097 count = ds->ops->get_sset_count(ds, dp->index, sset); 1098 if (count < 0) 1099 return count; 1100 } 1101 1102 return count + 4; 1103 } else if (sset == ETH_SS_TEST) { 1104 return net_selftest_get_count(); 1105 } 1106 1107 return -EOPNOTSUPP; 1108 } 1109 1110 static void dsa_user_get_eth_phy_stats(struct net_device *dev, 1111 struct ethtool_eth_phy_stats *phy_stats) 1112 { 1113 struct dsa_port *dp = dsa_user_to_port(dev); 1114 struct dsa_switch *ds = dp->ds; 1115 1116 if (ds->ops->get_eth_phy_stats) 1117 ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats); 1118 } 1119 1120 static void dsa_user_get_eth_mac_stats(struct net_device *dev, 1121 struct ethtool_eth_mac_stats *mac_stats) 1122 { 1123 struct dsa_port *dp = dsa_user_to_port(dev); 1124 struct dsa_switch *ds = dp->ds; 1125 1126 if (ds->ops->get_eth_mac_stats) 1127 ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats); 1128 } 1129 1130 static void 1131 dsa_user_get_eth_ctrl_stats(struct net_device *dev, 1132 struct ethtool_eth_ctrl_stats *ctrl_stats) 1133 { 1134 struct dsa_port *dp = dsa_user_to_port(dev); 1135 struct dsa_switch *ds = dp->ds; 1136 1137 if (ds->ops->get_eth_ctrl_stats) 1138 ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats); 1139 } 1140 1141 static void 1142 dsa_user_get_rmon_stats(struct net_device *dev, 1143 struct ethtool_rmon_stats *rmon_stats, 1144 const struct ethtool_rmon_hist_range **ranges) 1145 { 1146 struct dsa_port *dp = dsa_user_to_port(dev); 1147 struct dsa_switch *ds = dp->ds; 1148 1149 if (ds->ops->get_rmon_stats) 1150 ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges); 1151 } 1152 1153 static void dsa_user_net_selftest(struct net_device *ndev, 1154 struct ethtool_test *etest, u64 *buf) 1155 { 1156 struct dsa_port *dp = dsa_user_to_port(ndev); 1157 struct dsa_switch *ds = dp->ds; 1158 1159 if (ds->ops->self_test) { 1160 ds->ops->self_test(ds, dp->index, etest, buf); 1161 return; 1162 } 1163 1164 net_selftest(ndev, etest, buf); 1165 } 1166 1167 static int dsa_user_get_mm(struct net_device *dev, 1168 struct ethtool_mm_state *state) 1169 { 1170 struct dsa_port *dp = dsa_user_to_port(dev); 1171 struct dsa_switch *ds = dp->ds; 1172 1173 if (!ds->ops->get_mm) 1174 return -EOPNOTSUPP; 1175 1176 return ds->ops->get_mm(ds, dp->index, state); 1177 } 1178 1179 static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg, 1180 struct netlink_ext_ack *extack) 1181 { 1182 struct dsa_port *dp = dsa_user_to_port(dev); 1183 struct dsa_switch *ds = dp->ds; 1184 1185 if (!ds->ops->set_mm) 1186 return -EOPNOTSUPP; 1187 1188 return ds->ops->set_mm(ds, dp->index, cfg, extack); 1189 } 1190 1191 static void dsa_user_get_mm_stats(struct net_device *dev, 1192 struct ethtool_mm_stats *stats) 1193 { 1194 struct dsa_port *dp = dsa_user_to_port(dev); 1195 struct dsa_switch *ds = dp->ds; 1196 1197 if (ds->ops->get_mm_stats) 1198 ds->ops->get_mm_stats(ds, dp->index, stats); 1199 } 1200 1201 static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w) 1202 { 1203 struct dsa_port *dp = dsa_user_to_port(dev); 1204 struct dsa_switch *ds = dp->ds; 1205 1206 phylink_ethtool_get_wol(dp->pl, w); 1207 1208 if (ds->ops->get_wol) 1209 ds->ops->get_wol(ds, dp->index, w); 1210 } 1211 1212 static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w) 1213 { 1214 struct dsa_port *dp = dsa_user_to_port(dev); 1215 struct dsa_switch *ds = dp->ds; 1216 int ret = -EOPNOTSUPP; 1217 1218 phylink_ethtool_set_wol(dp->pl, w); 1219 1220 if (ds->ops->set_wol) 1221 ret = ds->ops->set_wol(ds, dp->index, w); 1222 1223 return ret; 1224 } 1225 1226 static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e) 1227 { 1228 struct dsa_port *dp = dsa_user_to_port(dev); 1229 struct dsa_switch *ds = dp->ds; 1230 int ret; 1231 1232 /* Check whether the switch supports EEE */ 1233 if (!ds->ops->support_eee || !ds->ops->support_eee(ds, dp->index)) 1234 return -EOPNOTSUPP; 1235 1236 /* Port's PHY and MAC both need to be EEE capable */ 1237 if (!dev->phydev) 1238 return -ENODEV; 1239 1240 if (!ds->ops->set_mac_eee) 1241 return -EOPNOTSUPP; 1242 1243 ret = ds->ops->set_mac_eee(ds, dp->index, e); 1244 if (ret) 1245 return ret; 1246 1247 return phylink_ethtool_set_eee(dp->pl, e); 1248 } 1249 1250 static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e) 1251 { 1252 struct dsa_port *dp = dsa_user_to_port(dev); 1253 struct dsa_switch *ds = dp->ds; 1254 1255 /* Check whether the switch supports EEE */ 1256 if (!ds->ops->support_eee || !ds->ops->support_eee(ds, dp->index)) 1257 return -EOPNOTSUPP; 1258 1259 /* Port's PHY and MAC both need to be EEE capable */ 1260 if (!dev->phydev) 1261 return -ENODEV; 1262 1263 return phylink_ethtool_get_eee(dp->pl, e); 1264 } 1265 1266 static int dsa_user_get_link_ksettings(struct net_device *dev, 1267 struct ethtool_link_ksettings *cmd) 1268 { 1269 struct dsa_port *dp = dsa_user_to_port(dev); 1270 1271 return phylink_ethtool_ksettings_get(dp->pl, cmd); 1272 } 1273 1274 static int dsa_user_set_link_ksettings(struct net_device *dev, 1275 const struct ethtool_link_ksettings *cmd) 1276 { 1277 struct dsa_port *dp = dsa_user_to_port(dev); 1278 1279 return phylink_ethtool_ksettings_set(dp->pl, cmd); 1280 } 1281 1282 static void dsa_user_get_pause_stats(struct net_device *dev, 1283 struct ethtool_pause_stats *pause_stats) 1284 { 1285 struct dsa_port *dp = dsa_user_to_port(dev); 1286 struct dsa_switch *ds = dp->ds; 1287 1288 if (ds->ops->get_pause_stats) 1289 ds->ops->get_pause_stats(ds, dp->index, pause_stats); 1290 } 1291 1292 static void dsa_user_get_pauseparam(struct net_device *dev, 1293 struct ethtool_pauseparam *pause) 1294 { 1295 struct dsa_port *dp = dsa_user_to_port(dev); 1296 1297 phylink_ethtool_get_pauseparam(dp->pl, pause); 1298 } 1299 1300 static int dsa_user_set_pauseparam(struct net_device *dev, 1301 struct ethtool_pauseparam *pause) 1302 { 1303 struct dsa_port *dp = dsa_user_to_port(dev); 1304 1305 return phylink_ethtool_set_pauseparam(dp->pl, pause); 1306 } 1307 1308 #ifdef CONFIG_NET_POLL_CONTROLLER 1309 static int dsa_user_netpoll_setup(struct net_device *dev) 1310 { 1311 struct net_device *conduit = dsa_user_to_conduit(dev); 1312 struct dsa_user_priv *p = netdev_priv(dev); 1313 struct netpoll *netpoll; 1314 int err = 0; 1315 1316 netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL); 1317 if (!netpoll) 1318 return -ENOMEM; 1319 1320 err = __netpoll_setup(netpoll, conduit); 1321 if (err) { 1322 kfree(netpoll); 1323 goto out; 1324 } 1325 1326 p->netpoll = netpoll; 1327 out: 1328 return err; 1329 } 1330 1331 static void dsa_user_netpoll_cleanup(struct net_device *dev) 1332 { 1333 struct dsa_user_priv *p = netdev_priv(dev); 1334 struct netpoll *netpoll = p->netpoll; 1335 1336 if (!netpoll) 1337 return; 1338 1339 p->netpoll = NULL; 1340 1341 __netpoll_free(netpoll); 1342 } 1343 1344 static void dsa_user_poll_controller(struct net_device *dev) 1345 { 1346 } 1347 #endif 1348 1349 static struct dsa_mall_tc_entry * 1350 dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie) 1351 { 1352 struct dsa_user_priv *p = netdev_priv(dev); 1353 struct dsa_mall_tc_entry *mall_tc_entry; 1354 1355 list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) 1356 if (mall_tc_entry->cookie == cookie) 1357 return mall_tc_entry; 1358 1359 return NULL; 1360 } 1361 1362 static int 1363 dsa_user_add_cls_matchall_mirred(struct net_device *dev, 1364 struct tc_cls_matchall_offload *cls, 1365 bool ingress, bool ingress_target) 1366 { 1367 struct netlink_ext_ack *extack = cls->common.extack; 1368 struct dsa_port *dp = dsa_user_to_port(dev); 1369 struct dsa_user_priv *p = netdev_priv(dev); 1370 struct dsa_mall_mirror_tc_entry *mirror; 1371 struct dsa_mall_tc_entry *mall_tc_entry; 1372 struct dsa_switch *ds = dp->ds; 1373 struct flow_action_entry *act; 1374 struct dsa_port *to_dp; 1375 int err; 1376 1377 if (cls->common.protocol != htons(ETH_P_ALL)) { 1378 NL_SET_ERR_MSG_MOD(extack, 1379 "Can only offload \"protocol all\" matchall filter"); 1380 return -EOPNOTSUPP; 1381 } 1382 1383 if (!ds->ops->port_mirror_add) { 1384 NL_SET_ERR_MSG_MOD(extack, 1385 "Switch does not support mirroring operation"); 1386 return -EOPNOTSUPP; 1387 } 1388 1389 if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack)) 1390 return -EOPNOTSUPP; 1391 1392 act = &cls->rule->action.entries[0]; 1393 1394 if (!act->dev) 1395 return -EINVAL; 1396 1397 if (dsa_user_dev_check(act->dev)) { 1398 if (ingress_target) { 1399 /* We can only fulfill this using software assist */ 1400 if (cls->common.skip_sw) { 1401 NL_SET_ERR_MSG_MOD(extack, 1402 "Can only mirred to ingress of DSA user port if filter also runs in software"); 1403 return -EOPNOTSUPP; 1404 } 1405 to_dp = dp->cpu_dp; 1406 } else { 1407 to_dp = dsa_user_to_port(act->dev); 1408 } 1409 } else { 1410 /* Handle mirroring to foreign target ports as a mirror towards 1411 * the CPU. The software tc rule will take the packets from 1412 * there. 1413 */ 1414 if (cls->common.skip_sw) { 1415 NL_SET_ERR_MSG_MOD(extack, 1416 "Can only mirred to CPU if filter also runs in software"); 1417 return -EOPNOTSUPP; 1418 } 1419 to_dp = dp->cpu_dp; 1420 } 1421 1422 if (dp->ds != to_dp->ds) { 1423 NL_SET_ERR_MSG_MOD(extack, 1424 "Cross-chip mirroring not implemented"); 1425 return -EOPNOTSUPP; 1426 } 1427 1428 mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); 1429 if (!mall_tc_entry) 1430 return -ENOMEM; 1431 1432 mall_tc_entry->cookie = cls->cookie; 1433 mall_tc_entry->type = DSA_PORT_MALL_MIRROR; 1434 mirror = &mall_tc_entry->mirror; 1435 mirror->to_local_port = to_dp->index; 1436 mirror->ingress = ingress; 1437 1438 err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack); 1439 if (err) { 1440 kfree(mall_tc_entry); 1441 return err; 1442 } 1443 1444 list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); 1445 1446 return err; 1447 } 1448 1449 static int 1450 dsa_user_add_cls_matchall_police(struct net_device *dev, 1451 struct tc_cls_matchall_offload *cls, 1452 bool ingress) 1453 { 1454 struct netlink_ext_ack *extack = cls->common.extack; 1455 struct dsa_port *dp = dsa_user_to_port(dev); 1456 struct dsa_user_priv *p = netdev_priv(dev); 1457 struct dsa_mall_policer_tc_entry *policer; 1458 struct dsa_mall_tc_entry *mall_tc_entry; 1459 struct dsa_switch *ds = dp->ds; 1460 struct flow_action_entry *act; 1461 int err; 1462 1463 if (!ds->ops->port_policer_add) { 1464 NL_SET_ERR_MSG_MOD(extack, 1465 "Policing offload not implemented"); 1466 return -EOPNOTSUPP; 1467 } 1468 1469 if (!ingress) { 1470 NL_SET_ERR_MSG_MOD(extack, 1471 "Only supported on ingress qdisc"); 1472 return -EOPNOTSUPP; 1473 } 1474 1475 if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack)) 1476 return -EOPNOTSUPP; 1477 1478 list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) { 1479 if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) { 1480 NL_SET_ERR_MSG_MOD(extack, 1481 "Only one port policer allowed"); 1482 return -EEXIST; 1483 } 1484 } 1485 1486 act = &cls->rule->action.entries[0]; 1487 1488 mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); 1489 if (!mall_tc_entry) 1490 return -ENOMEM; 1491 1492 mall_tc_entry->cookie = cls->cookie; 1493 mall_tc_entry->type = DSA_PORT_MALL_POLICER; 1494 policer = &mall_tc_entry->policer; 1495 policer->rate_bytes_per_sec = act->police.rate_bytes_ps; 1496 policer->burst = act->police.burst; 1497 1498 err = ds->ops->port_policer_add(ds, dp->index, policer); 1499 if (err) { 1500 kfree(mall_tc_entry); 1501 return err; 1502 } 1503 1504 list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); 1505 1506 return err; 1507 } 1508 1509 static int dsa_user_add_cls_matchall(struct net_device *dev, 1510 struct tc_cls_matchall_offload *cls, 1511 bool ingress) 1512 { 1513 const struct flow_action *action = &cls->rule->action; 1514 struct netlink_ext_ack *extack = cls->common.extack; 1515 1516 if (!flow_offload_has_one_action(action)) { 1517 NL_SET_ERR_MSG_MOD(extack, 1518 "Cannot offload matchall filter with more than one action"); 1519 return -EOPNOTSUPP; 1520 } 1521 1522 switch (action->entries[0].id) { 1523 case FLOW_ACTION_MIRRED: 1524 return dsa_user_add_cls_matchall_mirred(dev, cls, ingress, 1525 false); 1526 case FLOW_ACTION_MIRRED_INGRESS: 1527 return dsa_user_add_cls_matchall_mirred(dev, cls, ingress, 1528 true); 1529 case FLOW_ACTION_POLICE: 1530 return dsa_user_add_cls_matchall_police(dev, cls, ingress); 1531 default: 1532 NL_SET_ERR_MSG_MOD(extack, "Unknown action"); 1533 break; 1534 } 1535 1536 return -EOPNOTSUPP; 1537 } 1538 1539 static void dsa_user_del_cls_matchall(struct net_device *dev, 1540 struct tc_cls_matchall_offload *cls) 1541 { 1542 struct dsa_port *dp = dsa_user_to_port(dev); 1543 struct dsa_mall_tc_entry *mall_tc_entry; 1544 struct dsa_switch *ds = dp->ds; 1545 1546 mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie); 1547 if (!mall_tc_entry) 1548 return; 1549 1550 list_del(&mall_tc_entry->list); 1551 1552 switch (mall_tc_entry->type) { 1553 case DSA_PORT_MALL_MIRROR: 1554 if (ds->ops->port_mirror_del) 1555 ds->ops->port_mirror_del(ds, dp->index, 1556 &mall_tc_entry->mirror); 1557 break; 1558 case DSA_PORT_MALL_POLICER: 1559 if (ds->ops->port_policer_del) 1560 ds->ops->port_policer_del(ds, dp->index); 1561 break; 1562 default: 1563 WARN_ON(1); 1564 } 1565 1566 kfree(mall_tc_entry); 1567 } 1568 1569 static int dsa_user_setup_tc_cls_matchall(struct net_device *dev, 1570 struct tc_cls_matchall_offload *cls, 1571 bool ingress) 1572 { 1573 if (cls->common.chain_index) 1574 return -EOPNOTSUPP; 1575 1576 switch (cls->command) { 1577 case TC_CLSMATCHALL_REPLACE: 1578 return dsa_user_add_cls_matchall(dev, cls, ingress); 1579 case TC_CLSMATCHALL_DESTROY: 1580 dsa_user_del_cls_matchall(dev, cls); 1581 return 0; 1582 default: 1583 return -EOPNOTSUPP; 1584 } 1585 } 1586 1587 static int dsa_user_add_cls_flower(struct net_device *dev, 1588 struct flow_cls_offload *cls, 1589 bool ingress) 1590 { 1591 struct dsa_port *dp = dsa_user_to_port(dev); 1592 struct dsa_switch *ds = dp->ds; 1593 int port = dp->index; 1594 1595 if (!ds->ops->cls_flower_add) 1596 return -EOPNOTSUPP; 1597 1598 return ds->ops->cls_flower_add(ds, port, cls, ingress); 1599 } 1600 1601 static int dsa_user_del_cls_flower(struct net_device *dev, 1602 struct flow_cls_offload *cls, 1603 bool ingress) 1604 { 1605 struct dsa_port *dp = dsa_user_to_port(dev); 1606 struct dsa_switch *ds = dp->ds; 1607 int port = dp->index; 1608 1609 if (!ds->ops->cls_flower_del) 1610 return -EOPNOTSUPP; 1611 1612 return ds->ops->cls_flower_del(ds, port, cls, ingress); 1613 } 1614 1615 static int dsa_user_stats_cls_flower(struct net_device *dev, 1616 struct flow_cls_offload *cls, 1617 bool ingress) 1618 { 1619 struct dsa_port *dp = dsa_user_to_port(dev); 1620 struct dsa_switch *ds = dp->ds; 1621 int port = dp->index; 1622 1623 if (!ds->ops->cls_flower_stats) 1624 return -EOPNOTSUPP; 1625 1626 return ds->ops->cls_flower_stats(ds, port, cls, ingress); 1627 } 1628 1629 static int dsa_user_setup_tc_cls_flower(struct net_device *dev, 1630 struct flow_cls_offload *cls, 1631 bool ingress) 1632 { 1633 switch (cls->command) { 1634 case FLOW_CLS_REPLACE: 1635 return dsa_user_add_cls_flower(dev, cls, ingress); 1636 case FLOW_CLS_DESTROY: 1637 return dsa_user_del_cls_flower(dev, cls, ingress); 1638 case FLOW_CLS_STATS: 1639 return dsa_user_stats_cls_flower(dev, cls, ingress); 1640 default: 1641 return -EOPNOTSUPP; 1642 } 1643 } 1644 1645 static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data, 1646 void *cb_priv, bool ingress) 1647 { 1648 struct net_device *dev = cb_priv; 1649 1650 if (!tc_can_offload(dev)) 1651 return -EOPNOTSUPP; 1652 1653 switch (type) { 1654 case TC_SETUP_CLSMATCHALL: 1655 return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress); 1656 case TC_SETUP_CLSFLOWER: 1657 return dsa_user_setup_tc_cls_flower(dev, type_data, ingress); 1658 default: 1659 return -EOPNOTSUPP; 1660 } 1661 } 1662 1663 static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type, 1664 void *type_data, void *cb_priv) 1665 { 1666 return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true); 1667 } 1668 1669 static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type, 1670 void *type_data, void *cb_priv) 1671 { 1672 return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false); 1673 } 1674 1675 static LIST_HEAD(dsa_user_block_cb_list); 1676 1677 static int dsa_user_setup_tc_block(struct net_device *dev, 1678 struct flow_block_offload *f) 1679 { 1680 struct flow_block_cb *block_cb; 1681 flow_setup_cb_t *cb; 1682 1683 if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS) 1684 cb = dsa_user_setup_tc_block_cb_ig; 1685 else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS) 1686 cb = dsa_user_setup_tc_block_cb_eg; 1687 else 1688 return -EOPNOTSUPP; 1689 1690 f->driver_block_list = &dsa_user_block_cb_list; 1691 1692 switch (f->command) { 1693 case FLOW_BLOCK_BIND: 1694 if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list)) 1695 return -EBUSY; 1696 1697 block_cb = flow_block_cb_alloc(cb, dev, dev, NULL); 1698 if (IS_ERR(block_cb)) 1699 return PTR_ERR(block_cb); 1700 1701 flow_block_cb_add(block_cb, f); 1702 list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list); 1703 return 0; 1704 case FLOW_BLOCK_UNBIND: 1705 block_cb = flow_block_cb_lookup(f->block, cb, dev); 1706 if (!block_cb) 1707 return -ENOENT; 1708 1709 flow_block_cb_remove(block_cb, f); 1710 list_del(&block_cb->driver_list); 1711 return 0; 1712 default: 1713 return -EOPNOTSUPP; 1714 } 1715 } 1716 1717 static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port, 1718 void *type_data) 1719 { 1720 struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port)); 1721 1722 if (!conduit->netdev_ops->ndo_setup_tc) 1723 return -EOPNOTSUPP; 1724 1725 return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data); 1726 } 1727 1728 static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type, 1729 void *type_data) 1730 { 1731 struct dsa_port *dp = dsa_user_to_port(dev); 1732 struct dsa_switch *ds = dp->ds; 1733 1734 switch (type) { 1735 case TC_SETUP_BLOCK: 1736 return dsa_user_setup_tc_block(dev, type_data); 1737 case TC_SETUP_FT: 1738 return dsa_user_setup_ft_block(ds, dp->index, type_data); 1739 default: 1740 break; 1741 } 1742 1743 if (!ds->ops->port_setup_tc) 1744 return -EOPNOTSUPP; 1745 1746 return ds->ops->port_setup_tc(ds, dp->index, type, type_data); 1747 } 1748 1749 static int dsa_user_get_rxnfc(struct net_device *dev, 1750 struct ethtool_rxnfc *nfc, u32 *rule_locs) 1751 { 1752 struct dsa_port *dp = dsa_user_to_port(dev); 1753 struct dsa_switch *ds = dp->ds; 1754 1755 if (!ds->ops->get_rxnfc) 1756 return -EOPNOTSUPP; 1757 1758 return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs); 1759 } 1760 1761 static int dsa_user_set_rxnfc(struct net_device *dev, 1762 struct ethtool_rxnfc *nfc) 1763 { 1764 struct dsa_port *dp = dsa_user_to_port(dev); 1765 struct dsa_switch *ds = dp->ds; 1766 1767 if (!ds->ops->set_rxnfc) 1768 return -EOPNOTSUPP; 1769 1770 return ds->ops->set_rxnfc(ds, dp->index, nfc); 1771 } 1772 1773 static int dsa_user_get_ts_info(struct net_device *dev, 1774 struct kernel_ethtool_ts_info *ts) 1775 { 1776 struct dsa_user_priv *p = netdev_priv(dev); 1777 struct dsa_switch *ds = p->dp->ds; 1778 1779 if (!ds->ops->get_ts_info) 1780 return -EOPNOTSUPP; 1781 1782 return ds->ops->get_ts_info(ds, p->dp->index, ts); 1783 } 1784 1785 static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto, 1786 u16 vid) 1787 { 1788 struct dsa_port *dp = dsa_user_to_port(dev); 1789 struct switchdev_obj_port_vlan vlan = { 1790 .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, 1791 .vid = vid, 1792 /* This API only allows programming tagged, non-PVID VIDs */ 1793 .flags = 0, 1794 }; 1795 struct netlink_ext_ack extack = {0}; 1796 struct dsa_switch *ds = dp->ds; 1797 struct netdev_hw_addr *ha; 1798 struct dsa_vlan *v; 1799 int ret; 1800 1801 /* User port... */ 1802 ret = dsa_port_vlan_add(dp, &vlan, &extack); 1803 if (ret) { 1804 if (extack._msg) 1805 netdev_err(dev, "%s\n", extack._msg); 1806 return ret; 1807 } 1808 1809 /* And CPU port... */ 1810 ret = dsa_port_host_vlan_add(dp, &vlan, &extack); 1811 if (ret) { 1812 if (extack._msg) 1813 netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index, 1814 extack._msg); 1815 return ret; 1816 } 1817 1818 if (!dsa_switch_supports_uc_filtering(ds) && 1819 !dsa_switch_supports_mc_filtering(ds)) 1820 return 0; 1821 1822 v = kzalloc(sizeof(*v), GFP_KERNEL); 1823 if (!v) { 1824 ret = -ENOMEM; 1825 goto rollback; 1826 } 1827 1828 netif_addr_lock_bh(dev); 1829 1830 v->vid = vid; 1831 list_add_tail(&v->list, &dp->user_vlans); 1832 1833 if (dsa_switch_supports_mc_filtering(ds)) { 1834 netdev_for_each_synced_mc_addr(ha, dev) { 1835 dsa_user_schedule_standalone_work(dev, DSA_MC_ADD, 1836 ha->addr, vid); 1837 } 1838 } 1839 1840 if (dsa_switch_supports_uc_filtering(ds)) { 1841 netdev_for_each_synced_uc_addr(ha, dev) { 1842 dsa_user_schedule_standalone_work(dev, DSA_UC_ADD, 1843 ha->addr, vid); 1844 } 1845 } 1846 1847 netif_addr_unlock_bh(dev); 1848 1849 dsa_flush_workqueue(); 1850 1851 return 0; 1852 1853 rollback: 1854 dsa_port_host_vlan_del(dp, &vlan); 1855 dsa_port_vlan_del(dp, &vlan); 1856 1857 return ret; 1858 } 1859 1860 static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, 1861 u16 vid) 1862 { 1863 struct dsa_port *dp = dsa_user_to_port(dev); 1864 struct switchdev_obj_port_vlan vlan = { 1865 .vid = vid, 1866 /* This API only allows programming tagged, non-PVID VIDs */ 1867 .flags = 0, 1868 }; 1869 struct dsa_switch *ds = dp->ds; 1870 struct netdev_hw_addr *ha; 1871 struct dsa_vlan *v; 1872 int err; 1873 1874 err = dsa_port_vlan_del(dp, &vlan); 1875 if (err) 1876 return err; 1877 1878 err = dsa_port_host_vlan_del(dp, &vlan); 1879 if (err) 1880 return err; 1881 1882 if (!dsa_switch_supports_uc_filtering(ds) && 1883 !dsa_switch_supports_mc_filtering(ds)) 1884 return 0; 1885 1886 netif_addr_lock_bh(dev); 1887 1888 v = dsa_vlan_find(&dp->user_vlans, &vlan); 1889 if (!v) { 1890 netif_addr_unlock_bh(dev); 1891 return -ENOENT; 1892 } 1893 1894 list_del(&v->list); 1895 kfree(v); 1896 1897 if (dsa_switch_supports_mc_filtering(ds)) { 1898 netdev_for_each_synced_mc_addr(ha, dev) { 1899 dsa_user_schedule_standalone_work(dev, DSA_MC_DEL, 1900 ha->addr, vid); 1901 } 1902 } 1903 1904 if (dsa_switch_supports_uc_filtering(ds)) { 1905 netdev_for_each_synced_uc_addr(ha, dev) { 1906 dsa_user_schedule_standalone_work(dev, DSA_UC_DEL, 1907 ha->addr, vid); 1908 } 1909 } 1910 1911 netif_addr_unlock_bh(dev); 1912 1913 dsa_flush_workqueue(); 1914 1915 return 0; 1916 } 1917 1918 static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg) 1919 { 1920 __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); 1921 1922 return dsa_user_vlan_rx_add_vid(arg, proto, vid); 1923 } 1924 1925 static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg) 1926 { 1927 __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); 1928 1929 return dsa_user_vlan_rx_kill_vid(arg, proto, vid); 1930 } 1931 1932 /* Keep the VLAN RX filtering list in sync with the hardware only if VLAN 1933 * filtering is enabled. The baseline is that only ports that offload a 1934 * VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware, 1935 * but there are exceptions for quirky hardware. 1936 * 1937 * If ds->vlan_filtering_is_global = true, then standalone ports which share 1938 * the same switch with other ports that offload a VLAN-aware bridge are also 1939 * inevitably VLAN-aware. 1940 * 1941 * To summarize, a DSA switch port offloads: 1942 * 1943 * - If standalone (this includes software bridge, software LAG): 1944 * - if ds->needs_standalone_vlan_filtering = true, OR if 1945 * (ds->vlan_filtering_is_global = true AND there are bridges spanning 1946 * this switch chip which have vlan_filtering=1) 1947 * - the 8021q upper VLANs 1948 * - else (standalone VLAN filtering is not needed, VLAN filtering is not 1949 * global, or it is, but no port is under a VLAN-aware bridge): 1950 * - no VLAN (any 8021q upper is a software VLAN) 1951 * 1952 * - If under a vlan_filtering=0 bridge which it offload: 1953 * - if ds->configure_vlan_while_not_filtering = true (default): 1954 * - the bridge VLANs. These VLANs are committed to hardware but inactive. 1955 * - else (deprecated): 1956 * - no VLAN. The bridge VLANs are not restored when VLAN awareness is 1957 * enabled, so this behavior is broken and discouraged. 1958 * 1959 * - If under a vlan_filtering=1 bridge which it offload: 1960 * - the bridge VLANs 1961 * - the 8021q upper VLANs 1962 */ 1963 int dsa_user_manage_vlan_filtering(struct net_device *user, 1964 bool vlan_filtering) 1965 { 1966 int err; 1967 1968 if (vlan_filtering) { 1969 user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 1970 1971 err = vlan_for_each(user, dsa_user_restore_vlan, user); 1972 if (err) { 1973 vlan_for_each(user, dsa_user_clear_vlan, user); 1974 user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 1975 return err; 1976 } 1977 } else { 1978 err = vlan_for_each(user, dsa_user_clear_vlan, user); 1979 if (err) 1980 return err; 1981 1982 user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 1983 } 1984 1985 return 0; 1986 } 1987 1988 struct dsa_hw_port { 1989 struct list_head list; 1990 struct net_device *dev; 1991 int old_mtu; 1992 }; 1993 1994 static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu) 1995 { 1996 const struct dsa_hw_port *p; 1997 int err; 1998 1999 list_for_each_entry(p, hw_port_list, list) { 2000 if (p->dev->mtu == mtu) 2001 continue; 2002 2003 err = dev_set_mtu(p->dev, mtu); 2004 if (err) 2005 goto rollback; 2006 } 2007 2008 return 0; 2009 2010 rollback: 2011 list_for_each_entry_continue_reverse(p, hw_port_list, list) { 2012 if (p->dev->mtu == p->old_mtu) 2013 continue; 2014 2015 if (dev_set_mtu(p->dev, p->old_mtu)) 2016 netdev_err(p->dev, "Failed to restore MTU\n"); 2017 } 2018 2019 return err; 2020 } 2021 2022 static void dsa_hw_port_list_free(struct list_head *hw_port_list) 2023 { 2024 struct dsa_hw_port *p, *n; 2025 2026 list_for_each_entry_safe(p, n, hw_port_list, list) 2027 kfree(p); 2028 } 2029 2030 /* Make the hardware datapath to/from @dev limited to a common MTU */ 2031 static void dsa_bridge_mtu_normalization(struct dsa_port *dp) 2032 { 2033 struct list_head hw_port_list; 2034 struct dsa_switch_tree *dst; 2035 int min_mtu = ETH_MAX_MTU; 2036 struct dsa_port *other_dp; 2037 int err; 2038 2039 if (!dp->ds->mtu_enforcement_ingress) 2040 return; 2041 2042 if (!dp->bridge) 2043 return; 2044 2045 INIT_LIST_HEAD(&hw_port_list); 2046 2047 /* Populate the list of ports that are part of the same bridge 2048 * as the newly added/modified port 2049 */ 2050 list_for_each_entry(dst, &dsa_tree_list, list) { 2051 list_for_each_entry(other_dp, &dst->ports, list) { 2052 struct dsa_hw_port *hw_port; 2053 struct net_device *user; 2054 2055 if (other_dp->type != DSA_PORT_TYPE_USER) 2056 continue; 2057 2058 if (!dsa_port_bridge_same(dp, other_dp)) 2059 continue; 2060 2061 if (!other_dp->ds->mtu_enforcement_ingress) 2062 continue; 2063 2064 user = other_dp->user; 2065 2066 if (min_mtu > user->mtu) 2067 min_mtu = user->mtu; 2068 2069 hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL); 2070 if (!hw_port) 2071 goto out; 2072 2073 hw_port->dev = user; 2074 hw_port->old_mtu = user->mtu; 2075 2076 list_add(&hw_port->list, &hw_port_list); 2077 } 2078 } 2079 2080 /* Attempt to configure the entire hardware bridge to the newly added 2081 * interface's MTU first, regardless of whether the intention of the 2082 * user was to raise or lower it. 2083 */ 2084 err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu); 2085 if (!err) 2086 goto out; 2087 2088 /* Clearly that didn't work out so well, so just set the minimum MTU on 2089 * all hardware bridge ports now. If this fails too, then all ports will 2090 * still have their old MTU rolled back anyway. 2091 */ 2092 dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu); 2093 2094 out: 2095 dsa_hw_port_list_free(&hw_port_list); 2096 } 2097 2098 int dsa_user_change_mtu(struct net_device *dev, int new_mtu) 2099 { 2100 struct net_device *conduit = dsa_user_to_conduit(dev); 2101 struct dsa_port *dp = dsa_user_to_port(dev); 2102 struct dsa_port *cpu_dp = dp->cpu_dp; 2103 struct dsa_switch *ds = dp->ds; 2104 struct dsa_port *other_dp; 2105 int largest_mtu = 0; 2106 int new_conduit_mtu; 2107 int old_conduit_mtu; 2108 int mtu_limit; 2109 int overhead; 2110 int cpu_mtu; 2111 int err; 2112 2113 if (!ds->ops->port_change_mtu) 2114 return -EOPNOTSUPP; 2115 2116 dsa_tree_for_each_user_port(other_dp, ds->dst) { 2117 int user_mtu; 2118 2119 /* During probe, this function will be called for each user 2120 * device, while not all of them have been allocated. That's 2121 * ok, it doesn't change what the maximum is, so ignore it. 2122 */ 2123 if (!other_dp->user) 2124 continue; 2125 2126 /* Pretend that we already applied the setting, which we 2127 * actually haven't (still haven't done all integrity checks) 2128 */ 2129 if (dp == other_dp) 2130 user_mtu = new_mtu; 2131 else 2132 user_mtu = other_dp->user->mtu; 2133 2134 if (largest_mtu < user_mtu) 2135 largest_mtu = user_mtu; 2136 } 2137 2138 overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops); 2139 mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead); 2140 old_conduit_mtu = conduit->mtu; 2141 new_conduit_mtu = largest_mtu + overhead; 2142 if (new_conduit_mtu > mtu_limit) 2143 return -ERANGE; 2144 2145 /* If the conduit MTU isn't over limit, there's no need to check the CPU 2146 * MTU, since that surely isn't either. 2147 */ 2148 cpu_mtu = largest_mtu; 2149 2150 /* Start applying stuff */ 2151 if (new_conduit_mtu != old_conduit_mtu) { 2152 err = dev_set_mtu(conduit, new_conduit_mtu); 2153 if (err < 0) 2154 goto out_conduit_failed; 2155 2156 /* We only need to propagate the MTU of the CPU port to 2157 * upstream switches, so emit a notifier which updates them. 2158 */ 2159 err = dsa_port_mtu_change(cpu_dp, cpu_mtu); 2160 if (err) 2161 goto out_cpu_failed; 2162 } 2163 2164 err = ds->ops->port_change_mtu(ds, dp->index, new_mtu); 2165 if (err) 2166 goto out_port_failed; 2167 2168 WRITE_ONCE(dev->mtu, new_mtu); 2169 2170 dsa_bridge_mtu_normalization(dp); 2171 2172 return 0; 2173 2174 out_port_failed: 2175 if (new_conduit_mtu != old_conduit_mtu) 2176 dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead); 2177 out_cpu_failed: 2178 if (new_conduit_mtu != old_conduit_mtu) 2179 dev_set_mtu(conduit, old_conduit_mtu); 2180 out_conduit_failed: 2181 return err; 2182 } 2183 2184 static int __maybe_unused 2185 dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel) 2186 { 2187 struct dsa_port *dp = dsa_user_to_port(dev); 2188 struct dsa_switch *ds = dp->ds; 2189 int port = dp->index; 2190 2191 if (!ds->ops->port_set_apptrust) 2192 return -EOPNOTSUPP; 2193 2194 return ds->ops->port_set_apptrust(ds, port, sel, nsel); 2195 } 2196 2197 static int __maybe_unused 2198 dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel) 2199 { 2200 struct dsa_port *dp = dsa_user_to_port(dev); 2201 struct dsa_switch *ds = dp->ds; 2202 int port = dp->index; 2203 2204 if (!ds->ops->port_get_apptrust) 2205 return -EOPNOTSUPP; 2206 2207 return ds->ops->port_get_apptrust(ds, port, sel, nsel); 2208 } 2209 2210 static int __maybe_unused 2211 dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app) 2212 { 2213 struct dsa_port *dp = dsa_user_to_port(dev); 2214 struct dsa_switch *ds = dp->ds; 2215 unsigned long mask, new_prio; 2216 int err, port = dp->index; 2217 2218 if (!ds->ops->port_set_default_prio) 2219 return -EOPNOTSUPP; 2220 2221 err = dcb_ieee_setapp(dev, app); 2222 if (err) 2223 return err; 2224 2225 mask = dcb_ieee_getapp_mask(dev, app); 2226 new_prio = __fls(mask); 2227 2228 err = ds->ops->port_set_default_prio(ds, port, new_prio); 2229 if (err) { 2230 dcb_ieee_delapp(dev, app); 2231 return err; 2232 } 2233 2234 return 0; 2235 } 2236 2237 /* Update the DSCP prio entries on all user ports of the switch in case 2238 * the switch supports global DSCP prio instead of per port DSCP prios. 2239 */ 2240 static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev, 2241 struct dcb_app *app, bool del) 2242 { 2243 int (*setdel)(struct net_device *dev, struct dcb_app *app); 2244 struct dsa_port *dp = dsa_user_to_port(dev); 2245 struct dsa_switch *ds = dp->ds; 2246 struct dsa_port *other_dp; 2247 int err, restore_err; 2248 2249 if (del) 2250 setdel = dcb_ieee_delapp; 2251 else 2252 setdel = dcb_ieee_setapp; 2253 2254 dsa_switch_for_each_user_port(other_dp, ds) { 2255 struct net_device *user = other_dp->user; 2256 2257 if (!user || user == dev) 2258 continue; 2259 2260 err = setdel(user, app); 2261 if (err) 2262 goto err_try_to_restore; 2263 } 2264 2265 return 0; 2266 2267 err_try_to_restore: 2268 2269 /* Revert logic to restore previous state of app entries */ 2270 if (!del) 2271 setdel = dcb_ieee_delapp; 2272 else 2273 setdel = dcb_ieee_setapp; 2274 2275 dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) { 2276 struct net_device *user = other_dp->user; 2277 2278 if (!user || user == dev) 2279 continue; 2280 2281 restore_err = setdel(user, app); 2282 if (restore_err) 2283 netdev_err(user, "Failed to restore DSCP prio entry configuration\n"); 2284 } 2285 2286 return err; 2287 } 2288 2289 static int __maybe_unused 2290 dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app) 2291 { 2292 struct dsa_port *dp = dsa_user_to_port(dev); 2293 struct dsa_switch *ds = dp->ds; 2294 unsigned long mask, new_prio; 2295 int err, port = dp->index; 2296 u8 dscp = app->protocol; 2297 2298 if (!ds->ops->port_add_dscp_prio) 2299 return -EOPNOTSUPP; 2300 2301 if (dscp >= 64) { 2302 netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n", 2303 dscp); 2304 return -EINVAL; 2305 } 2306 2307 err = dcb_ieee_setapp(dev, app); 2308 if (err) 2309 return err; 2310 2311 mask = dcb_ieee_getapp_mask(dev, app); 2312 new_prio = __fls(mask); 2313 2314 err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio); 2315 if (err) { 2316 dcb_ieee_delapp(dev, app); 2317 return err; 2318 } 2319 2320 if (!ds->dscp_prio_mapping_is_global) 2321 return 0; 2322 2323 err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false); 2324 if (err) { 2325 if (ds->ops->port_del_dscp_prio) 2326 ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio); 2327 dcb_ieee_delapp(dev, app); 2328 return err; 2329 } 2330 2331 return 0; 2332 } 2333 2334 static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev, 2335 struct dcb_app *app) 2336 { 2337 switch (app->selector) { 2338 case IEEE_8021QAZ_APP_SEL_ETHERTYPE: 2339 switch (app->protocol) { 2340 case 0: 2341 return dsa_user_dcbnl_set_default_prio(dev, app); 2342 default: 2343 return -EOPNOTSUPP; 2344 } 2345 break; 2346 case IEEE_8021QAZ_APP_SEL_DSCP: 2347 return dsa_user_dcbnl_add_dscp_prio(dev, app); 2348 default: 2349 return -EOPNOTSUPP; 2350 } 2351 } 2352 2353 static int __maybe_unused 2354 dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app) 2355 { 2356 struct dsa_port *dp = dsa_user_to_port(dev); 2357 struct dsa_switch *ds = dp->ds; 2358 unsigned long mask, new_prio; 2359 int err, port = dp->index; 2360 2361 if (!ds->ops->port_set_default_prio) 2362 return -EOPNOTSUPP; 2363 2364 err = dcb_ieee_delapp(dev, app); 2365 if (err) 2366 return err; 2367 2368 mask = dcb_ieee_getapp_mask(dev, app); 2369 new_prio = mask ? __fls(mask) : 0; 2370 2371 err = ds->ops->port_set_default_prio(ds, port, new_prio); 2372 if (err) { 2373 dcb_ieee_setapp(dev, app); 2374 return err; 2375 } 2376 2377 return 0; 2378 } 2379 2380 static int __maybe_unused 2381 dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app) 2382 { 2383 struct dsa_port *dp = dsa_user_to_port(dev); 2384 struct dsa_switch *ds = dp->ds; 2385 int err, port = dp->index; 2386 u8 dscp = app->protocol; 2387 2388 if (!ds->ops->port_del_dscp_prio) 2389 return -EOPNOTSUPP; 2390 2391 err = dcb_ieee_delapp(dev, app); 2392 if (err) 2393 return err; 2394 2395 err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority); 2396 if (err) { 2397 dcb_ieee_setapp(dev, app); 2398 return err; 2399 } 2400 2401 if (!ds->dscp_prio_mapping_is_global) 2402 return 0; 2403 2404 err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true); 2405 if (err) { 2406 if (ds->ops->port_add_dscp_prio) 2407 ds->ops->port_add_dscp_prio(ds, port, dscp, 2408 app->priority); 2409 dcb_ieee_setapp(dev, app); 2410 return err; 2411 } 2412 2413 return 0; 2414 } 2415 2416 static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev, 2417 struct dcb_app *app) 2418 { 2419 switch (app->selector) { 2420 case IEEE_8021QAZ_APP_SEL_ETHERTYPE: 2421 switch (app->protocol) { 2422 case 0: 2423 return dsa_user_dcbnl_del_default_prio(dev, app); 2424 default: 2425 return -EOPNOTSUPP; 2426 } 2427 break; 2428 case IEEE_8021QAZ_APP_SEL_DSCP: 2429 return dsa_user_dcbnl_del_dscp_prio(dev, app); 2430 default: 2431 return -EOPNOTSUPP; 2432 } 2433 } 2434 2435 /* Pre-populate the DCB application priority table with the priorities 2436 * configured during switch setup, which we read from hardware here. 2437 */ 2438 static int dsa_user_dcbnl_init(struct net_device *dev) 2439 { 2440 struct dsa_port *dp = dsa_user_to_port(dev); 2441 struct dsa_switch *ds = dp->ds; 2442 int port = dp->index; 2443 int err; 2444 2445 if (ds->ops->port_get_default_prio) { 2446 int prio = ds->ops->port_get_default_prio(ds, port); 2447 struct dcb_app app = { 2448 .selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE, 2449 .protocol = 0, 2450 .priority = prio, 2451 }; 2452 2453 if (prio < 0) 2454 return prio; 2455 2456 err = dcb_ieee_setapp(dev, &app); 2457 if (err) 2458 return err; 2459 } 2460 2461 if (ds->ops->port_get_dscp_prio) { 2462 int protocol; 2463 2464 for (protocol = 0; protocol < 64; protocol++) { 2465 struct dcb_app app = { 2466 .selector = IEEE_8021QAZ_APP_SEL_DSCP, 2467 .protocol = protocol, 2468 }; 2469 int prio; 2470 2471 prio = ds->ops->port_get_dscp_prio(ds, port, protocol); 2472 if (prio == -EOPNOTSUPP) 2473 continue; 2474 if (prio < 0) 2475 return prio; 2476 2477 app.priority = prio; 2478 2479 err = dcb_ieee_setapp(dev, &app); 2480 if (err) 2481 return err; 2482 } 2483 } 2484 2485 return 0; 2486 } 2487 2488 static const struct ethtool_ops dsa_user_ethtool_ops = { 2489 .get_drvinfo = dsa_user_get_drvinfo, 2490 .get_regs_len = dsa_user_get_regs_len, 2491 .get_regs = dsa_user_get_regs, 2492 .nway_reset = dsa_user_nway_reset, 2493 .get_link = ethtool_op_get_link, 2494 .get_eeprom_len = dsa_user_get_eeprom_len, 2495 .get_eeprom = dsa_user_get_eeprom, 2496 .set_eeprom = dsa_user_set_eeprom, 2497 .get_strings = dsa_user_get_strings, 2498 .get_ethtool_stats = dsa_user_get_ethtool_stats, 2499 .get_sset_count = dsa_user_get_sset_count, 2500 .get_eth_phy_stats = dsa_user_get_eth_phy_stats, 2501 .get_eth_mac_stats = dsa_user_get_eth_mac_stats, 2502 .get_eth_ctrl_stats = dsa_user_get_eth_ctrl_stats, 2503 .get_rmon_stats = dsa_user_get_rmon_stats, 2504 .set_wol = dsa_user_set_wol, 2505 .get_wol = dsa_user_get_wol, 2506 .set_eee = dsa_user_set_eee, 2507 .get_eee = dsa_user_get_eee, 2508 .get_link_ksettings = dsa_user_get_link_ksettings, 2509 .set_link_ksettings = dsa_user_set_link_ksettings, 2510 .get_pause_stats = dsa_user_get_pause_stats, 2511 .get_pauseparam = dsa_user_get_pauseparam, 2512 .set_pauseparam = dsa_user_set_pauseparam, 2513 .get_rxnfc = dsa_user_get_rxnfc, 2514 .set_rxnfc = dsa_user_set_rxnfc, 2515 .get_ts_info = dsa_user_get_ts_info, 2516 .self_test = dsa_user_net_selftest, 2517 .get_mm = dsa_user_get_mm, 2518 .set_mm = dsa_user_set_mm, 2519 .get_mm_stats = dsa_user_get_mm_stats, 2520 }; 2521 2522 static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = { 2523 .ieee_setapp = dsa_user_dcbnl_ieee_setapp, 2524 .ieee_delapp = dsa_user_dcbnl_ieee_delapp, 2525 .dcbnl_setapptrust = dsa_user_dcbnl_set_apptrust, 2526 .dcbnl_getapptrust = dsa_user_dcbnl_get_apptrust, 2527 }; 2528 2529 static void dsa_user_get_stats64(struct net_device *dev, 2530 struct rtnl_link_stats64 *s) 2531 { 2532 struct dsa_port *dp = dsa_user_to_port(dev); 2533 struct dsa_switch *ds = dp->ds; 2534 2535 if (ds->ops->get_stats64) 2536 ds->ops->get_stats64(ds, dp->index, s); 2537 else 2538 dev_get_tstats64(dev, s); 2539 } 2540 2541 static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx, 2542 struct net_device_path *path) 2543 { 2544 struct dsa_port *dp = dsa_user_to_port(ctx->dev); 2545 struct net_device *conduit = dsa_port_to_conduit(dp); 2546 struct dsa_port *cpu_dp = dp->cpu_dp; 2547 2548 path->dev = ctx->dev; 2549 path->type = DEV_PATH_DSA; 2550 path->dsa.proto = cpu_dp->tag_ops->proto; 2551 path->dsa.port = dp->index; 2552 ctx->dev = conduit; 2553 2554 return 0; 2555 } 2556 2557 static const struct net_device_ops dsa_user_netdev_ops = { 2558 .ndo_open = dsa_user_open, 2559 .ndo_stop = dsa_user_close, 2560 .ndo_start_xmit = dsa_user_xmit, 2561 .ndo_change_rx_flags = dsa_user_change_rx_flags, 2562 .ndo_set_rx_mode = dsa_user_set_rx_mode, 2563 .ndo_set_mac_address = dsa_user_set_mac_address, 2564 .ndo_fdb_dump = dsa_user_fdb_dump, 2565 .ndo_eth_ioctl = dsa_user_ioctl, 2566 .ndo_get_iflink = dsa_user_get_iflink, 2567 #ifdef CONFIG_NET_POLL_CONTROLLER 2568 .ndo_netpoll_setup = dsa_user_netpoll_setup, 2569 .ndo_netpoll_cleanup = dsa_user_netpoll_cleanup, 2570 .ndo_poll_controller = dsa_user_poll_controller, 2571 #endif 2572 .ndo_setup_tc = dsa_user_setup_tc, 2573 .ndo_get_stats64 = dsa_user_get_stats64, 2574 .ndo_vlan_rx_add_vid = dsa_user_vlan_rx_add_vid, 2575 .ndo_vlan_rx_kill_vid = dsa_user_vlan_rx_kill_vid, 2576 .ndo_change_mtu = dsa_user_change_mtu, 2577 .ndo_fill_forward_path = dsa_user_fill_forward_path, 2578 }; 2579 2580 static const struct device_type dsa_type = { 2581 .name = "dsa", 2582 }; 2583 2584 void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up) 2585 { 2586 const struct dsa_port *dp = dsa_to_port(ds, port); 2587 2588 if (dp->pl) 2589 phylink_mac_change(dp->pl, up); 2590 } 2591 EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change); 2592 2593 static void dsa_user_phylink_fixed_state(struct phylink_config *config, 2594 struct phylink_link_state *state) 2595 { 2596 struct dsa_port *dp = dsa_phylink_to_port(config); 2597 struct dsa_switch *ds = dp->ds; 2598 2599 /* No need to check that this operation is valid, the callback would 2600 * not be called if it was not. 2601 */ 2602 ds->ops->phylink_fixed_state(ds, dp->index, state); 2603 } 2604 2605 /* user device setup *******************************************************/ 2606 static int dsa_user_phy_connect(struct net_device *user_dev, int addr, 2607 u32 flags) 2608 { 2609 struct dsa_port *dp = dsa_user_to_port(user_dev); 2610 struct dsa_switch *ds = dp->ds; 2611 2612 user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr); 2613 if (!user_dev->phydev) { 2614 netdev_err(user_dev, "no phy at %d\n", addr); 2615 return -ENODEV; 2616 } 2617 2618 user_dev->phydev->dev_flags |= flags; 2619 2620 return phylink_connect_phy(dp->pl, user_dev->phydev); 2621 } 2622 2623 static int dsa_user_phy_setup(struct net_device *user_dev) 2624 { 2625 struct dsa_port *dp = dsa_user_to_port(user_dev); 2626 struct device_node *port_dn = dp->dn; 2627 struct dsa_switch *ds = dp->ds; 2628 u32 phy_flags = 0; 2629 int ret; 2630 2631 dp->pl_config.dev = &user_dev->dev; 2632 dp->pl_config.type = PHYLINK_NETDEV; 2633 2634 /* The get_fixed_state callback takes precedence over polling the 2635 * link GPIO in PHYLINK (see phylink_get_fixed_state). Only set 2636 * this if the switch provides such a callback. 2637 */ 2638 if (ds->ops->phylink_fixed_state) { 2639 dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state; 2640 dp->pl_config.poll_fixed_state = true; 2641 } 2642 2643 ret = dsa_port_phylink_create(dp); 2644 if (ret) 2645 return ret; 2646 2647 if (ds->ops->get_phy_flags) 2648 phy_flags = ds->ops->get_phy_flags(ds, dp->index); 2649 2650 ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags); 2651 if (ret == -ENODEV && ds->user_mii_bus) { 2652 /* We could not connect to a designated PHY or SFP, so try to 2653 * use the switch internal MDIO bus instead 2654 */ 2655 ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags); 2656 } 2657 if (ret) { 2658 netdev_err(user_dev, "failed to connect to PHY: %pe\n", 2659 ERR_PTR(ret)); 2660 dsa_port_phylink_destroy(dp); 2661 } 2662 2663 return ret; 2664 } 2665 2666 void dsa_user_setup_tagger(struct net_device *user) 2667 { 2668 struct dsa_port *dp = dsa_user_to_port(user); 2669 struct net_device *conduit = dsa_port_to_conduit(dp); 2670 struct dsa_user_priv *p = netdev_priv(user); 2671 const struct dsa_port *cpu_dp = dp->cpu_dp; 2672 const struct dsa_switch *ds = dp->ds; 2673 2674 user->needed_headroom = cpu_dp->tag_ops->needed_headroom; 2675 user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom; 2676 /* Try to save one extra realloc later in the TX path (in the conduit) 2677 * by also inheriting the conduit's needed headroom and tailroom. 2678 * The 8021q driver also does this. 2679 */ 2680 user->needed_headroom += conduit->needed_headroom; 2681 user->needed_tailroom += conduit->needed_tailroom; 2682 2683 p->xmit = cpu_dp->tag_ops->xmit; 2684 2685 user->features = conduit->vlan_features | NETIF_F_HW_TC; 2686 user->hw_features |= NETIF_F_HW_TC; 2687 if (user->needed_tailroom) 2688 user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST); 2689 if (ds->needs_standalone_vlan_filtering) 2690 user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 2691 2692 user->lltx = true; 2693 } 2694 2695 int dsa_user_suspend(struct net_device *user_dev) 2696 { 2697 struct dsa_port *dp = dsa_user_to_port(user_dev); 2698 2699 if (!netif_running(user_dev)) 2700 return 0; 2701 2702 netif_device_detach(user_dev); 2703 2704 rtnl_lock(); 2705 phylink_stop(dp->pl); 2706 rtnl_unlock(); 2707 2708 return 0; 2709 } 2710 2711 int dsa_user_resume(struct net_device *user_dev) 2712 { 2713 struct dsa_port *dp = dsa_user_to_port(user_dev); 2714 2715 if (!netif_running(user_dev)) 2716 return 0; 2717 2718 netif_device_attach(user_dev); 2719 2720 rtnl_lock(); 2721 phylink_start(dp->pl); 2722 rtnl_unlock(); 2723 2724 return 0; 2725 } 2726 2727 int dsa_user_create(struct dsa_port *port) 2728 { 2729 struct net_device *conduit = dsa_port_to_conduit(port); 2730 struct dsa_switch *ds = port->ds; 2731 struct net_device *user_dev; 2732 struct dsa_user_priv *p; 2733 const char *name; 2734 int assign_type; 2735 int ret; 2736 2737 if (!ds->num_tx_queues) 2738 ds->num_tx_queues = 1; 2739 2740 if (port->name) { 2741 name = port->name; 2742 assign_type = NET_NAME_PREDICTABLE; 2743 } else { 2744 name = "eth%d"; 2745 assign_type = NET_NAME_ENUM; 2746 } 2747 2748 user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name, 2749 assign_type, ether_setup, 2750 ds->num_tx_queues, 1); 2751 if (user_dev == NULL) 2752 return -ENOMEM; 2753 2754 user_dev->rtnl_link_ops = &dsa_link_ops; 2755 user_dev->ethtool_ops = &dsa_user_ethtool_ops; 2756 #if IS_ENABLED(CONFIG_DCB) 2757 user_dev->dcbnl_ops = &dsa_user_dcbnl_ops; 2758 #endif 2759 if (!is_zero_ether_addr(port->mac)) 2760 eth_hw_addr_set(user_dev, port->mac); 2761 else 2762 eth_hw_addr_inherit(user_dev, conduit); 2763 user_dev->priv_flags |= IFF_NO_QUEUE; 2764 if (dsa_switch_supports_uc_filtering(ds)) 2765 user_dev->priv_flags |= IFF_UNICAST_FLT; 2766 user_dev->netdev_ops = &dsa_user_netdev_ops; 2767 if (ds->ops->port_max_mtu) 2768 user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index); 2769 SET_NETDEV_DEVTYPE(user_dev, &dsa_type); 2770 2771 SET_NETDEV_DEV(user_dev, port->ds->dev); 2772 SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port); 2773 user_dev->dev.of_node = port->dn; 2774 user_dev->vlan_features = conduit->vlan_features; 2775 2776 p = netdev_priv(user_dev); 2777 user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS; 2778 2779 ret = gro_cells_init(&p->gcells, user_dev); 2780 if (ret) 2781 goto out_free; 2782 2783 p->dp = port; 2784 INIT_LIST_HEAD(&p->mall_tc_list); 2785 port->user = user_dev; 2786 dsa_user_setup_tagger(user_dev); 2787 2788 netif_carrier_off(user_dev); 2789 2790 ret = dsa_user_phy_setup(user_dev); 2791 if (ret) { 2792 netdev_err(user_dev, 2793 "error %d setting up PHY for tree %d, switch %d, port %d\n", 2794 ret, ds->dst->index, ds->index, port->index); 2795 goto out_gcells; 2796 } 2797 2798 rtnl_lock(); 2799 2800 ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN); 2801 if (ret && ret != -EOPNOTSUPP) 2802 dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n", 2803 ret, ETH_DATA_LEN, port->index); 2804 2805 ret = register_netdevice(user_dev); 2806 if (ret) { 2807 netdev_err(conduit, "error %d registering interface %s\n", 2808 ret, user_dev->name); 2809 rtnl_unlock(); 2810 goto out_phy; 2811 } 2812 2813 if (IS_ENABLED(CONFIG_DCB)) { 2814 ret = dsa_user_dcbnl_init(user_dev); 2815 if (ret) { 2816 netdev_err(user_dev, 2817 "failed to initialize DCB: %pe\n", 2818 ERR_PTR(ret)); 2819 rtnl_unlock(); 2820 goto out_unregister; 2821 } 2822 } 2823 2824 ret = netdev_upper_dev_link(conduit, user_dev, NULL); 2825 2826 rtnl_unlock(); 2827 2828 if (ret) 2829 goto out_unregister; 2830 2831 return 0; 2832 2833 out_unregister: 2834 unregister_netdev(user_dev); 2835 out_phy: 2836 rtnl_lock(); 2837 phylink_disconnect_phy(p->dp->pl); 2838 rtnl_unlock(); 2839 dsa_port_phylink_destroy(p->dp); 2840 out_gcells: 2841 gro_cells_destroy(&p->gcells); 2842 out_free: 2843 free_netdev(user_dev); 2844 port->user = NULL; 2845 return ret; 2846 } 2847 2848 void dsa_user_destroy(struct net_device *user_dev) 2849 { 2850 struct net_device *conduit = dsa_user_to_conduit(user_dev); 2851 struct dsa_port *dp = dsa_user_to_port(user_dev); 2852 struct dsa_user_priv *p = netdev_priv(user_dev); 2853 2854 netif_carrier_off(user_dev); 2855 rtnl_lock(); 2856 netdev_upper_dev_unlink(conduit, user_dev); 2857 unregister_netdevice(user_dev); 2858 phylink_disconnect_phy(dp->pl); 2859 rtnl_unlock(); 2860 2861 dsa_port_phylink_destroy(dp); 2862 gro_cells_destroy(&p->gcells); 2863 free_netdev(user_dev); 2864 } 2865 2866 int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit, 2867 struct netlink_ext_ack *extack) 2868 { 2869 struct net_device *old_conduit = dsa_user_to_conduit(dev); 2870 struct dsa_port *dp = dsa_user_to_port(dev); 2871 struct dsa_switch *ds = dp->ds; 2872 struct net_device *upper; 2873 struct list_head *iter; 2874 int err; 2875 2876 if (conduit == old_conduit) 2877 return 0; 2878 2879 if (!ds->ops->port_change_conduit) { 2880 NL_SET_ERR_MSG_MOD(extack, 2881 "Driver does not support changing DSA conduit"); 2882 return -EOPNOTSUPP; 2883 } 2884 2885 if (!netdev_uses_dsa(conduit)) { 2886 NL_SET_ERR_MSG_MOD(extack, 2887 "Interface not eligible as DSA conduit"); 2888 return -EOPNOTSUPP; 2889 } 2890 2891 netdev_for_each_upper_dev_rcu(conduit, upper, iter) { 2892 if (dsa_user_dev_check(upper)) 2893 continue; 2894 if (netif_is_bridge_master(upper)) 2895 continue; 2896 NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers"); 2897 return -EOPNOTSUPP; 2898 } 2899 2900 /* Since we allow live-changing the DSA conduit, plus we auto-open the 2901 * DSA conduit when the user port opens => we need to ensure that the 2902 * new DSA conduit is open too. 2903 */ 2904 if (dev->flags & IFF_UP) { 2905 err = dev_open(conduit, extack); 2906 if (err) 2907 return err; 2908 } 2909 2910 netdev_upper_dev_unlink(old_conduit, dev); 2911 2912 err = netdev_upper_dev_link(conduit, dev, extack); 2913 if (err) 2914 goto out_revert_old_conduit_unlink; 2915 2916 err = dsa_port_change_conduit(dp, conduit, extack); 2917 if (err) 2918 goto out_revert_conduit_link; 2919 2920 /* Update the MTU of the new CPU port through cross-chip notifiers */ 2921 err = dsa_user_change_mtu(dev, dev->mtu); 2922 if (err && err != -EOPNOTSUPP) { 2923 netdev_warn(dev, 2924 "nonfatal error updating MTU with new conduit: %pe\n", 2925 ERR_PTR(err)); 2926 } 2927 2928 return 0; 2929 2930 out_revert_conduit_link: 2931 netdev_upper_dev_unlink(conduit, dev); 2932 out_revert_old_conduit_unlink: 2933 netdev_upper_dev_link(old_conduit, dev, NULL); 2934 return err; 2935 } 2936 2937 bool dsa_user_dev_check(const struct net_device *dev) 2938 { 2939 return dev->netdev_ops == &dsa_user_netdev_ops; 2940 } 2941 EXPORT_SYMBOL_GPL(dsa_user_dev_check); 2942 2943 static int dsa_user_changeupper(struct net_device *dev, 2944 struct netdev_notifier_changeupper_info *info) 2945 { 2946 struct netlink_ext_ack *extack; 2947 int err = NOTIFY_DONE; 2948 struct dsa_port *dp; 2949 2950 if (!dsa_user_dev_check(dev)) 2951 return err; 2952 2953 dp = dsa_user_to_port(dev); 2954 extack = netdev_notifier_info_to_extack(&info->info); 2955 2956 if (netif_is_bridge_master(info->upper_dev)) { 2957 if (info->linking) { 2958 err = dsa_port_bridge_join(dp, info->upper_dev, extack); 2959 if (!err) 2960 dsa_bridge_mtu_normalization(dp); 2961 if (err == -EOPNOTSUPP) { 2962 NL_SET_ERR_MSG_WEAK_MOD(extack, 2963 "Offloading not supported"); 2964 err = 0; 2965 } 2966 err = notifier_from_errno(err); 2967 } else { 2968 dsa_port_bridge_leave(dp, info->upper_dev); 2969 err = NOTIFY_OK; 2970 } 2971 } else if (netif_is_lag_master(info->upper_dev)) { 2972 if (info->linking) { 2973 err = dsa_port_lag_join(dp, info->upper_dev, 2974 info->upper_info, extack); 2975 if (err == -EOPNOTSUPP) { 2976 NL_SET_ERR_MSG_WEAK_MOD(extack, 2977 "Offloading not supported"); 2978 err = 0; 2979 } 2980 err = notifier_from_errno(err); 2981 } else { 2982 dsa_port_lag_leave(dp, info->upper_dev); 2983 err = NOTIFY_OK; 2984 } 2985 } else if (is_hsr_master(info->upper_dev)) { 2986 if (info->linking) { 2987 err = dsa_port_hsr_join(dp, info->upper_dev, extack); 2988 if (err == -EOPNOTSUPP) { 2989 NL_SET_ERR_MSG_WEAK_MOD(extack, 2990 "Offloading not supported"); 2991 err = 0; 2992 } 2993 err = notifier_from_errno(err); 2994 } else { 2995 dsa_port_hsr_leave(dp, info->upper_dev); 2996 err = NOTIFY_OK; 2997 } 2998 } 2999 3000 return err; 3001 } 3002 3003 static int dsa_user_prechangeupper(struct net_device *dev, 3004 struct netdev_notifier_changeupper_info *info) 3005 { 3006 struct dsa_port *dp; 3007 3008 if (!dsa_user_dev_check(dev)) 3009 return NOTIFY_DONE; 3010 3011 dp = dsa_user_to_port(dev); 3012 3013 if (netif_is_bridge_master(info->upper_dev) && !info->linking) 3014 dsa_port_pre_bridge_leave(dp, info->upper_dev); 3015 else if (netif_is_lag_master(info->upper_dev) && !info->linking) 3016 dsa_port_pre_lag_leave(dp, info->upper_dev); 3017 /* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot 3018 * meaningfully placed under a bridge yet 3019 */ 3020 3021 return NOTIFY_DONE; 3022 } 3023 3024 static int 3025 dsa_user_lag_changeupper(struct net_device *dev, 3026 struct netdev_notifier_changeupper_info *info) 3027 { 3028 struct net_device *lower; 3029 struct list_head *iter; 3030 int err = NOTIFY_DONE; 3031 struct dsa_port *dp; 3032 3033 if (!netif_is_lag_master(dev)) 3034 return err; 3035 3036 netdev_for_each_lower_dev(dev, lower, iter) { 3037 if (!dsa_user_dev_check(lower)) 3038 continue; 3039 3040 dp = dsa_user_to_port(lower); 3041 if (!dp->lag) 3042 /* Software LAG */ 3043 continue; 3044 3045 err = dsa_user_changeupper(lower, info); 3046 if (notifier_to_errno(err)) 3047 break; 3048 } 3049 3050 return err; 3051 } 3052 3053 /* Same as dsa_user_lag_changeupper() except that it calls 3054 * dsa_user_prechangeupper() 3055 */ 3056 static int 3057 dsa_user_lag_prechangeupper(struct net_device *dev, 3058 struct netdev_notifier_changeupper_info *info) 3059 { 3060 struct net_device *lower; 3061 struct list_head *iter; 3062 int err = NOTIFY_DONE; 3063 struct dsa_port *dp; 3064 3065 if (!netif_is_lag_master(dev)) 3066 return err; 3067 3068 netdev_for_each_lower_dev(dev, lower, iter) { 3069 if (!dsa_user_dev_check(lower)) 3070 continue; 3071 3072 dp = dsa_user_to_port(lower); 3073 if (!dp->lag) 3074 /* Software LAG */ 3075 continue; 3076 3077 err = dsa_user_prechangeupper(lower, info); 3078 if (notifier_to_errno(err)) 3079 break; 3080 } 3081 3082 return err; 3083 } 3084 3085 static int 3086 dsa_prevent_bridging_8021q_upper(struct net_device *dev, 3087 struct netdev_notifier_changeupper_info *info) 3088 { 3089 struct netlink_ext_ack *ext_ack; 3090 struct net_device *user, *br; 3091 struct dsa_port *dp; 3092 3093 ext_ack = netdev_notifier_info_to_extack(&info->info); 3094 3095 if (!is_vlan_dev(dev)) 3096 return NOTIFY_DONE; 3097 3098 user = vlan_dev_real_dev(dev); 3099 if (!dsa_user_dev_check(user)) 3100 return NOTIFY_DONE; 3101 3102 dp = dsa_user_to_port(user); 3103 br = dsa_port_bridge_dev_get(dp); 3104 if (!br) 3105 return NOTIFY_DONE; 3106 3107 /* Deny enslaving a VLAN device into a VLAN-aware bridge */ 3108 if (br_vlan_enabled(br) && 3109 netif_is_bridge_master(info->upper_dev) && info->linking) { 3110 NL_SET_ERR_MSG_MOD(ext_ack, 3111 "Cannot make VLAN device join VLAN-aware bridge"); 3112 return notifier_from_errno(-EINVAL); 3113 } 3114 3115 return NOTIFY_DONE; 3116 } 3117 3118 static int 3119 dsa_user_check_8021q_upper(struct net_device *dev, 3120 struct netdev_notifier_changeupper_info *info) 3121 { 3122 struct dsa_port *dp = dsa_user_to_port(dev); 3123 struct net_device *br = dsa_port_bridge_dev_get(dp); 3124 struct bridge_vlan_info br_info; 3125 struct netlink_ext_ack *extack; 3126 int err = NOTIFY_DONE; 3127 u16 vid; 3128 3129 if (!br || !br_vlan_enabled(br)) 3130 return NOTIFY_DONE; 3131 3132 extack = netdev_notifier_info_to_extack(&info->info); 3133 vid = vlan_dev_vlan_id(info->upper_dev); 3134 3135 /* br_vlan_get_info() returns -EINVAL or -ENOENT if the 3136 * device, respectively the VID is not found, returning 3137 * 0 means success, which is a failure for us here. 3138 */ 3139 err = br_vlan_get_info(br, vid, &br_info); 3140 if (err == 0) { 3141 NL_SET_ERR_MSG_MOD(extack, 3142 "This VLAN is already configured by the bridge"); 3143 return notifier_from_errno(-EBUSY); 3144 } 3145 3146 return NOTIFY_DONE; 3147 } 3148 3149 static int 3150 dsa_user_prechangeupper_sanity_check(struct net_device *dev, 3151 struct netdev_notifier_changeupper_info *info) 3152 { 3153 struct dsa_switch *ds; 3154 struct dsa_port *dp; 3155 int err; 3156 3157 if (!dsa_user_dev_check(dev)) 3158 return dsa_prevent_bridging_8021q_upper(dev, info); 3159 3160 dp = dsa_user_to_port(dev); 3161 ds = dp->ds; 3162 3163 if (ds->ops->port_prechangeupper) { 3164 err = ds->ops->port_prechangeupper(ds, dp->index, info); 3165 if (err) 3166 return notifier_from_errno(err); 3167 } 3168 3169 if (is_vlan_dev(info->upper_dev)) 3170 return dsa_user_check_8021q_upper(dev, info); 3171 3172 return NOTIFY_DONE; 3173 } 3174 3175 /* To be eligible as a DSA conduit, a LAG must have all lower interfaces be 3176 * eligible DSA conduits. Additionally, all LAG slaves must be DSA conduits of 3177 * switches in the same switch tree. 3178 */ 3179 static int dsa_lag_conduit_validate(struct net_device *lag_dev, 3180 struct netlink_ext_ack *extack) 3181 { 3182 struct net_device *lower1, *lower2; 3183 struct list_head *iter1, *iter2; 3184 3185 netdev_for_each_lower_dev(lag_dev, lower1, iter1) { 3186 netdev_for_each_lower_dev(lag_dev, lower2, iter2) { 3187 if (!netdev_uses_dsa(lower1) || 3188 !netdev_uses_dsa(lower2)) { 3189 NL_SET_ERR_MSG_MOD(extack, 3190 "All LAG ports must be eligible as DSA conduits"); 3191 return notifier_from_errno(-EINVAL); 3192 } 3193 3194 if (lower1 == lower2) 3195 continue; 3196 3197 if (!dsa_port_tree_same(lower1->dsa_ptr, 3198 lower2->dsa_ptr)) { 3199 NL_SET_ERR_MSG_MOD(extack, 3200 "LAG contains DSA conduits of disjoint switch trees"); 3201 return notifier_from_errno(-EINVAL); 3202 } 3203 } 3204 } 3205 3206 return NOTIFY_DONE; 3207 } 3208 3209 static int 3210 dsa_conduit_prechangeupper_sanity_check(struct net_device *conduit, 3211 struct netdev_notifier_changeupper_info *info) 3212 { 3213 struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info); 3214 3215 if (!netdev_uses_dsa(conduit)) 3216 return NOTIFY_DONE; 3217 3218 if (!info->linking) 3219 return NOTIFY_DONE; 3220 3221 /* Allow DSA switch uppers */ 3222 if (dsa_user_dev_check(info->upper_dev)) 3223 return NOTIFY_DONE; 3224 3225 /* Allow bridge uppers of DSA conduits, subject to further 3226 * restrictions in dsa_bridge_prechangelower_sanity_check() 3227 */ 3228 if (netif_is_bridge_master(info->upper_dev)) 3229 return NOTIFY_DONE; 3230 3231 /* Allow LAG uppers, subject to further restrictions in 3232 * dsa_lag_conduit_prechangelower_sanity_check() 3233 */ 3234 if (netif_is_lag_master(info->upper_dev)) 3235 return dsa_lag_conduit_validate(info->upper_dev, extack); 3236 3237 NL_SET_ERR_MSG_MOD(extack, 3238 "DSA conduit cannot join unknown upper interfaces"); 3239 return notifier_from_errno(-EBUSY); 3240 } 3241 3242 static int 3243 dsa_lag_conduit_prechangelower_sanity_check(struct net_device *dev, 3244 struct netdev_notifier_changeupper_info *info) 3245 { 3246 struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info); 3247 struct net_device *lag_dev = info->upper_dev; 3248 struct net_device *lower; 3249 struct list_head *iter; 3250 3251 if (!netdev_uses_dsa(lag_dev) || !netif_is_lag_master(lag_dev)) 3252 return NOTIFY_DONE; 3253 3254 if (!info->linking) 3255 return NOTIFY_DONE; 3256 3257 if (!netdev_uses_dsa(dev)) { 3258 NL_SET_ERR_MSG(extack, 3259 "Only DSA conduits can join a LAG DSA conduit"); 3260 return notifier_from_errno(-EINVAL); 3261 } 3262 3263 netdev_for_each_lower_dev(lag_dev, lower, iter) { 3264 if (!dsa_port_tree_same(dev->dsa_ptr, lower->dsa_ptr)) { 3265 NL_SET_ERR_MSG(extack, 3266 "Interface is DSA conduit for a different switch tree than this LAG"); 3267 return notifier_from_errno(-EINVAL); 3268 } 3269 3270 break; 3271 } 3272 3273 return NOTIFY_DONE; 3274 } 3275 3276 /* Don't allow bridging of DSA conduits, since the bridge layer rx_handler 3277 * prevents the DSA fake ethertype handler to be invoked, so we don't get the 3278 * chance to strip off and parse the DSA switch tag protocol header (the bridge 3279 * layer just returns RX_HANDLER_CONSUMED, stopping RX processing for these 3280 * frames). 3281 * The only case where that would not be an issue is when bridging can already 3282 * be offloaded, such as when the DSA conduit is itself a DSA or plain switchdev 3283 * port, and is bridged only with other ports from the same hardware device. 3284 */ 3285 static int 3286 dsa_bridge_prechangelower_sanity_check(struct net_device *new_lower, 3287 struct netdev_notifier_changeupper_info *info) 3288 { 3289 struct net_device *br = info->upper_dev; 3290 struct netlink_ext_ack *extack; 3291 struct net_device *lower; 3292 struct list_head *iter; 3293 3294 if (!netif_is_bridge_master(br)) 3295 return NOTIFY_DONE; 3296 3297 if (!info->linking) 3298 return NOTIFY_DONE; 3299 3300 extack = netdev_notifier_info_to_extack(&info->info); 3301 3302 netdev_for_each_lower_dev(br, lower, iter) { 3303 if (!netdev_uses_dsa(new_lower) && !netdev_uses_dsa(lower)) 3304 continue; 3305 3306 if (!netdev_port_same_parent_id(lower, new_lower)) { 3307 NL_SET_ERR_MSG(extack, 3308 "Cannot do software bridging with a DSA conduit"); 3309 return notifier_from_errno(-EINVAL); 3310 } 3311 } 3312 3313 return NOTIFY_DONE; 3314 } 3315 3316 static void dsa_tree_migrate_ports_from_lag_conduit(struct dsa_switch_tree *dst, 3317 struct net_device *lag_dev) 3318 { 3319 struct net_device *new_conduit = dsa_tree_find_first_conduit(dst); 3320 struct dsa_port *dp; 3321 int err; 3322 3323 dsa_tree_for_each_user_port(dp, dst) { 3324 if (dsa_port_to_conduit(dp) != lag_dev) 3325 continue; 3326 3327 err = dsa_user_change_conduit(dp->user, new_conduit, NULL); 3328 if (err) { 3329 netdev_err(dp->user, 3330 "failed to restore conduit to %s: %pe\n", 3331 new_conduit->name, ERR_PTR(err)); 3332 } 3333 } 3334 } 3335 3336 static int dsa_conduit_lag_join(struct net_device *conduit, 3337 struct net_device *lag_dev, 3338 struct netdev_lag_upper_info *uinfo, 3339 struct netlink_ext_ack *extack) 3340 { 3341 struct dsa_port *cpu_dp = conduit->dsa_ptr; 3342 struct dsa_switch_tree *dst = cpu_dp->dst; 3343 struct dsa_port *dp; 3344 int err; 3345 3346 err = dsa_conduit_lag_setup(lag_dev, cpu_dp, uinfo, extack); 3347 if (err) 3348 return err; 3349 3350 dsa_tree_for_each_user_port(dp, dst) { 3351 if (dsa_port_to_conduit(dp) != conduit) 3352 continue; 3353 3354 err = dsa_user_change_conduit(dp->user, lag_dev, extack); 3355 if (err) 3356 goto restore; 3357 } 3358 3359 return 0; 3360 3361 restore: 3362 dsa_tree_for_each_user_port_continue_reverse(dp, dst) { 3363 if (dsa_port_to_conduit(dp) != lag_dev) 3364 continue; 3365 3366 err = dsa_user_change_conduit(dp->user, conduit, NULL); 3367 if (err) { 3368 netdev_err(dp->user, 3369 "failed to restore conduit to %s: %pe\n", 3370 conduit->name, ERR_PTR(err)); 3371 } 3372 } 3373 3374 dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr); 3375 3376 return err; 3377 } 3378 3379 static void dsa_conduit_lag_leave(struct net_device *conduit, 3380 struct net_device *lag_dev) 3381 { 3382 struct dsa_port *dp, *cpu_dp = lag_dev->dsa_ptr; 3383 struct dsa_switch_tree *dst = cpu_dp->dst; 3384 struct dsa_port *new_cpu_dp = NULL; 3385 struct net_device *lower; 3386 struct list_head *iter; 3387 3388 netdev_for_each_lower_dev(lag_dev, lower, iter) { 3389 if (netdev_uses_dsa(lower)) { 3390 new_cpu_dp = lower->dsa_ptr; 3391 break; 3392 } 3393 } 3394 3395 if (new_cpu_dp) { 3396 /* Update the CPU port of the user ports still under the LAG 3397 * so that dsa_port_to_conduit() continues to work properly 3398 */ 3399 dsa_tree_for_each_user_port(dp, dst) 3400 if (dsa_port_to_conduit(dp) == lag_dev) 3401 dp->cpu_dp = new_cpu_dp; 3402 3403 /* Update the index of the virtual CPU port to match the lowest 3404 * physical CPU port 3405 */ 3406 lag_dev->dsa_ptr = new_cpu_dp; 3407 wmb(); 3408 } else { 3409 /* If the LAG DSA conduit has no ports left, migrate back all 3410 * user ports to the first physical CPU port 3411 */ 3412 dsa_tree_migrate_ports_from_lag_conduit(dst, lag_dev); 3413 } 3414 3415 /* This DSA conduit has left its LAG in any case, so let 3416 * the CPU port leave the hardware LAG as well 3417 */ 3418 dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr); 3419 } 3420 3421 static int dsa_conduit_changeupper(struct net_device *dev, 3422 struct netdev_notifier_changeupper_info *info) 3423 { 3424 struct netlink_ext_ack *extack; 3425 int err = NOTIFY_DONE; 3426 3427 if (!netdev_uses_dsa(dev)) 3428 return err; 3429 3430 extack = netdev_notifier_info_to_extack(&info->info); 3431 3432 if (netif_is_lag_master(info->upper_dev)) { 3433 if (info->linking) { 3434 err = dsa_conduit_lag_join(dev, info->upper_dev, 3435 info->upper_info, extack); 3436 err = notifier_from_errno(err); 3437 } else { 3438 dsa_conduit_lag_leave(dev, info->upper_dev); 3439 err = NOTIFY_OK; 3440 } 3441 } 3442 3443 return err; 3444 } 3445 3446 static int dsa_user_netdevice_event(struct notifier_block *nb, 3447 unsigned long event, void *ptr) 3448 { 3449 struct net_device *dev = netdev_notifier_info_to_dev(ptr); 3450 3451 switch (event) { 3452 case NETDEV_PRECHANGEUPPER: { 3453 struct netdev_notifier_changeupper_info *info = ptr; 3454 int err; 3455 3456 err = dsa_user_prechangeupper_sanity_check(dev, info); 3457 if (notifier_to_errno(err)) 3458 return err; 3459 3460 err = dsa_conduit_prechangeupper_sanity_check(dev, info); 3461 if (notifier_to_errno(err)) 3462 return err; 3463 3464 err = dsa_lag_conduit_prechangelower_sanity_check(dev, info); 3465 if (notifier_to_errno(err)) 3466 return err; 3467 3468 err = dsa_bridge_prechangelower_sanity_check(dev, info); 3469 if (notifier_to_errno(err)) 3470 return err; 3471 3472 err = dsa_user_prechangeupper(dev, ptr); 3473 if (notifier_to_errno(err)) 3474 return err; 3475 3476 err = dsa_user_lag_prechangeupper(dev, ptr); 3477 if (notifier_to_errno(err)) 3478 return err; 3479 3480 break; 3481 } 3482 case NETDEV_CHANGEUPPER: { 3483 int err; 3484 3485 err = dsa_user_changeupper(dev, ptr); 3486 if (notifier_to_errno(err)) 3487 return err; 3488 3489 err = dsa_user_lag_changeupper(dev, ptr); 3490 if (notifier_to_errno(err)) 3491 return err; 3492 3493 err = dsa_conduit_changeupper(dev, ptr); 3494 if (notifier_to_errno(err)) 3495 return err; 3496 3497 break; 3498 } 3499 case NETDEV_CHANGELOWERSTATE: { 3500 struct netdev_notifier_changelowerstate_info *info = ptr; 3501 struct dsa_port *dp; 3502 int err = 0; 3503 3504 if (dsa_user_dev_check(dev)) { 3505 dp = dsa_user_to_port(dev); 3506 3507 err = dsa_port_lag_change(dp, info->lower_state_info); 3508 } 3509 3510 /* Mirror LAG port events on DSA conduits that are in 3511 * a LAG towards their respective switch CPU ports 3512 */ 3513 if (netdev_uses_dsa(dev)) { 3514 dp = dev->dsa_ptr; 3515 3516 err = dsa_port_lag_change(dp, info->lower_state_info); 3517 } 3518 3519 return notifier_from_errno(err); 3520 } 3521 case NETDEV_CHANGE: 3522 case NETDEV_UP: { 3523 /* Track state of conduit port. 3524 * DSA driver may require the conduit port (and indirectly 3525 * the tagger) to be available for some special operation. 3526 */ 3527 if (netdev_uses_dsa(dev)) { 3528 struct dsa_port *cpu_dp = dev->dsa_ptr; 3529 struct dsa_switch_tree *dst = cpu_dp->ds->dst; 3530 3531 /* Track when the conduit port is UP */ 3532 dsa_tree_conduit_oper_state_change(dst, dev, 3533 netif_oper_up(dev)); 3534 3535 /* Track when the conduit port is ready and can accept 3536 * packet. 3537 * NETDEV_UP event is not enough to flag a port as ready. 3538 * We also have to wait for linkwatch_do_dev to dev_activate 3539 * and emit a NETDEV_CHANGE event. 3540 * We check if a conduit port is ready by checking if the dev 3541 * have a qdisc assigned and is not noop. 3542 */ 3543 dsa_tree_conduit_admin_state_change(dst, dev, 3544 !qdisc_tx_is_noop(dev)); 3545 3546 return NOTIFY_OK; 3547 } 3548 3549 return NOTIFY_DONE; 3550 } 3551 case NETDEV_GOING_DOWN: { 3552 struct dsa_port *dp, *cpu_dp; 3553 struct dsa_switch_tree *dst; 3554 LIST_HEAD(close_list); 3555 3556 if (!netdev_uses_dsa(dev)) 3557 return NOTIFY_DONE; 3558 3559 cpu_dp = dev->dsa_ptr; 3560 dst = cpu_dp->ds->dst; 3561 3562 dsa_tree_conduit_admin_state_change(dst, dev, false); 3563 3564 list_for_each_entry(dp, &dst->ports, list) { 3565 if (!dsa_port_is_user(dp)) 3566 continue; 3567 3568 if (dp->cpu_dp != cpu_dp) 3569 continue; 3570 3571 list_add(&dp->user->close_list, &close_list); 3572 } 3573 3574 dev_close_many(&close_list, true); 3575 3576 return NOTIFY_OK; 3577 } 3578 default: 3579 break; 3580 } 3581 3582 return NOTIFY_DONE; 3583 } 3584 3585 static void 3586 dsa_fdb_offload_notify(struct dsa_switchdev_event_work *switchdev_work) 3587 { 3588 struct switchdev_notifier_fdb_info info = {}; 3589 3590 info.addr = switchdev_work->addr; 3591 info.vid = switchdev_work->vid; 3592 info.offloaded = true; 3593 call_switchdev_notifiers(SWITCHDEV_FDB_OFFLOADED, 3594 switchdev_work->orig_dev, &info.info, NULL); 3595 } 3596 3597 static void dsa_user_switchdev_event_work(struct work_struct *work) 3598 { 3599 struct dsa_switchdev_event_work *switchdev_work = 3600 container_of(work, struct dsa_switchdev_event_work, work); 3601 const unsigned char *addr = switchdev_work->addr; 3602 struct net_device *dev = switchdev_work->dev; 3603 u16 vid = switchdev_work->vid; 3604 struct dsa_switch *ds; 3605 struct dsa_port *dp; 3606 int err; 3607 3608 dp = dsa_user_to_port(dev); 3609 ds = dp->ds; 3610 3611 switch (switchdev_work->event) { 3612 case SWITCHDEV_FDB_ADD_TO_DEVICE: 3613 if (switchdev_work->host_addr) 3614 err = dsa_port_bridge_host_fdb_add(dp, addr, vid); 3615 else if (dp->lag) 3616 err = dsa_port_lag_fdb_add(dp, addr, vid); 3617 else 3618 err = dsa_port_fdb_add(dp, addr, vid); 3619 if (err) { 3620 dev_err(ds->dev, 3621 "port %d failed to add %pM vid %d to fdb: %d\n", 3622 dp->index, addr, vid, err); 3623 break; 3624 } 3625 dsa_fdb_offload_notify(switchdev_work); 3626 break; 3627 3628 case SWITCHDEV_FDB_DEL_TO_DEVICE: 3629 if (switchdev_work->host_addr) 3630 err = dsa_port_bridge_host_fdb_del(dp, addr, vid); 3631 else if (dp->lag) 3632 err = dsa_port_lag_fdb_del(dp, addr, vid); 3633 else 3634 err = dsa_port_fdb_del(dp, addr, vid); 3635 if (err) { 3636 dev_err(ds->dev, 3637 "port %d failed to delete %pM vid %d from fdb: %d\n", 3638 dp->index, addr, vid, err); 3639 } 3640 3641 break; 3642 } 3643 3644 kfree(switchdev_work); 3645 } 3646 3647 static bool dsa_foreign_dev_check(const struct net_device *dev, 3648 const struct net_device *foreign_dev) 3649 { 3650 const struct dsa_port *dp = dsa_user_to_port(dev); 3651 struct dsa_switch_tree *dst = dp->ds->dst; 3652 3653 if (netif_is_bridge_master(foreign_dev)) 3654 return !dsa_tree_offloads_bridge_dev(dst, foreign_dev); 3655 3656 if (netif_is_bridge_port(foreign_dev)) 3657 return !dsa_tree_offloads_bridge_port(dst, foreign_dev); 3658 3659 /* Everything else is foreign */ 3660 return true; 3661 } 3662 3663 static int dsa_user_fdb_event(struct net_device *dev, 3664 struct net_device *orig_dev, 3665 unsigned long event, const void *ctx, 3666 const struct switchdev_notifier_fdb_info *fdb_info) 3667 { 3668 struct dsa_switchdev_event_work *switchdev_work; 3669 struct dsa_port *dp = dsa_user_to_port(dev); 3670 bool host_addr = fdb_info->is_local; 3671 struct dsa_switch *ds = dp->ds; 3672 3673 if (ctx && ctx != dp) 3674 return 0; 3675 3676 if (!dp->bridge) 3677 return 0; 3678 3679 if (switchdev_fdb_is_dynamically_learned(fdb_info)) { 3680 if (dsa_port_offloads_bridge_port(dp, orig_dev)) 3681 return 0; 3682 3683 /* FDB entries learned by the software bridge or by foreign 3684 * bridge ports should be installed as host addresses only if 3685 * the driver requests assisted learning. 3686 */ 3687 if (!ds->assisted_learning_on_cpu_port) 3688 return 0; 3689 } 3690 3691 /* Also treat FDB entries on foreign interfaces bridged with us as host 3692 * addresses. 3693 */ 3694 if (dsa_foreign_dev_check(dev, orig_dev)) 3695 host_addr = true; 3696 3697 /* Check early that we're not doing work in vain. 3698 * Host addresses on LAG ports still require regular FDB ops, 3699 * since the CPU port isn't in a LAG. 3700 */ 3701 if (dp->lag && !host_addr) { 3702 if (!ds->ops->lag_fdb_add || !ds->ops->lag_fdb_del) 3703 return -EOPNOTSUPP; 3704 } else { 3705 if (!ds->ops->port_fdb_add || !ds->ops->port_fdb_del) 3706 return -EOPNOTSUPP; 3707 } 3708 3709 switchdev_work = kzalloc(sizeof(*switchdev_work), GFP_ATOMIC); 3710 if (!switchdev_work) 3711 return -ENOMEM; 3712 3713 netdev_dbg(dev, "%s FDB entry towards %s, addr %pM vid %d%s\n", 3714 event == SWITCHDEV_FDB_ADD_TO_DEVICE ? "Adding" : "Deleting", 3715 orig_dev->name, fdb_info->addr, fdb_info->vid, 3716 host_addr ? " as host address" : ""); 3717 3718 INIT_WORK(&switchdev_work->work, dsa_user_switchdev_event_work); 3719 switchdev_work->event = event; 3720 switchdev_work->dev = dev; 3721 switchdev_work->orig_dev = orig_dev; 3722 3723 ether_addr_copy(switchdev_work->addr, fdb_info->addr); 3724 switchdev_work->vid = fdb_info->vid; 3725 switchdev_work->host_addr = host_addr; 3726 3727 dsa_schedule_work(&switchdev_work->work); 3728 3729 return 0; 3730 } 3731 3732 /* Called under rcu_read_lock() */ 3733 static int dsa_user_switchdev_event(struct notifier_block *unused, 3734 unsigned long event, void *ptr) 3735 { 3736 struct net_device *dev = switchdev_notifier_info_to_dev(ptr); 3737 int err; 3738 3739 switch (event) { 3740 case SWITCHDEV_PORT_ATTR_SET: 3741 err = switchdev_handle_port_attr_set(dev, ptr, 3742 dsa_user_dev_check, 3743 dsa_user_port_attr_set); 3744 return notifier_from_errno(err); 3745 case SWITCHDEV_FDB_ADD_TO_DEVICE: 3746 case SWITCHDEV_FDB_DEL_TO_DEVICE: 3747 err = switchdev_handle_fdb_event_to_device(dev, event, ptr, 3748 dsa_user_dev_check, 3749 dsa_foreign_dev_check, 3750 dsa_user_fdb_event); 3751 return notifier_from_errno(err); 3752 default: 3753 return NOTIFY_DONE; 3754 } 3755 3756 return NOTIFY_OK; 3757 } 3758 3759 static int dsa_user_switchdev_blocking_event(struct notifier_block *unused, 3760 unsigned long event, void *ptr) 3761 { 3762 struct net_device *dev = switchdev_notifier_info_to_dev(ptr); 3763 int err; 3764 3765 switch (event) { 3766 case SWITCHDEV_PORT_OBJ_ADD: 3767 err = switchdev_handle_port_obj_add_foreign(dev, ptr, 3768 dsa_user_dev_check, 3769 dsa_foreign_dev_check, 3770 dsa_user_port_obj_add); 3771 return notifier_from_errno(err); 3772 case SWITCHDEV_PORT_OBJ_DEL: 3773 err = switchdev_handle_port_obj_del_foreign(dev, ptr, 3774 dsa_user_dev_check, 3775 dsa_foreign_dev_check, 3776 dsa_user_port_obj_del); 3777 return notifier_from_errno(err); 3778 case SWITCHDEV_PORT_ATTR_SET: 3779 err = switchdev_handle_port_attr_set(dev, ptr, 3780 dsa_user_dev_check, 3781 dsa_user_port_attr_set); 3782 return notifier_from_errno(err); 3783 } 3784 3785 return NOTIFY_DONE; 3786 } 3787 3788 static struct notifier_block dsa_user_nb __read_mostly = { 3789 .notifier_call = dsa_user_netdevice_event, 3790 }; 3791 3792 struct notifier_block dsa_user_switchdev_notifier = { 3793 .notifier_call = dsa_user_switchdev_event, 3794 }; 3795 3796 struct notifier_block dsa_user_switchdev_blocking_notifier = { 3797 .notifier_call = dsa_user_switchdev_blocking_event, 3798 }; 3799 3800 int dsa_user_register_notifier(void) 3801 { 3802 struct notifier_block *nb; 3803 int err; 3804 3805 err = register_netdevice_notifier(&dsa_user_nb); 3806 if (err) 3807 return err; 3808 3809 err = register_switchdev_notifier(&dsa_user_switchdev_notifier); 3810 if (err) 3811 goto err_switchdev_nb; 3812 3813 nb = &dsa_user_switchdev_blocking_notifier; 3814 err = register_switchdev_blocking_notifier(nb); 3815 if (err) 3816 goto err_switchdev_blocking_nb; 3817 3818 return 0; 3819 3820 err_switchdev_blocking_nb: 3821 unregister_switchdev_notifier(&dsa_user_switchdev_notifier); 3822 err_switchdev_nb: 3823 unregister_netdevice_notifier(&dsa_user_nb); 3824 return err; 3825 } 3826 3827 void dsa_user_unregister_notifier(void) 3828 { 3829 struct notifier_block *nb; 3830 int err; 3831 3832 nb = &dsa_user_switchdev_blocking_notifier; 3833 err = unregister_switchdev_blocking_notifier(nb); 3834 if (err) 3835 pr_err("DSA: failed to unregister switchdev blocking notifier (%d)\n", err); 3836 3837 err = unregister_switchdev_notifier(&dsa_user_switchdev_notifier); 3838 if (err) 3839 pr_err("DSA: failed to unregister switchdev notifier (%d)\n", err); 3840 3841 err = unregister_netdevice_notifier(&dsa_user_nb); 3842 if (err) 3843 pr_err("DSA: failed to unregister user notifier (%d)\n", err); 3844 } 3845