1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * net/dsa/user.c - user device handling 4 * Copyright (c) 2008-2009 Marvell Semiconductor 5 */ 6 7 #include <linux/list.h> 8 #include <linux/etherdevice.h> 9 #include <linux/netdevice.h> 10 #include <linux/phy.h> 11 #include <linux/phy_fixed.h> 12 #include <linux/phylink.h> 13 #include <linux/of_net.h> 14 #include <linux/of_mdio.h> 15 #include <linux/mdio.h> 16 #include <net/rtnetlink.h> 17 #include <net/pkt_cls.h> 18 #include <net/selftests.h> 19 #include <net/tc_act/tc_mirred.h> 20 #include <linux/if_bridge.h> 21 #include <linux/if_hsr.h> 22 #include <net/dcbnl.h> 23 #include <linux/netpoll.h> 24 #include <linux/string.h> 25 26 #include "conduit.h" 27 #include "dsa.h" 28 #include "netlink.h" 29 #include "port.h" 30 #include "switch.h" 31 #include "tag.h" 32 #include "user.h" 33 34 struct dsa_switchdev_event_work { 35 struct net_device *dev; 36 struct net_device *orig_dev; 37 struct work_struct work; 38 unsigned long event; 39 /* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and 40 * SWITCHDEV_FDB_DEL_TO_DEVICE 41 */ 42 unsigned char addr[ETH_ALEN]; 43 u16 vid; 44 bool host_addr; 45 }; 46 47 enum dsa_standalone_event { 48 DSA_UC_ADD, 49 DSA_UC_DEL, 50 DSA_MC_ADD, 51 DSA_MC_DEL, 52 }; 53 54 struct dsa_standalone_event_work { 55 struct work_struct work; 56 struct net_device *dev; 57 enum dsa_standalone_event event; 58 unsigned char addr[ETH_ALEN]; 59 u16 vid; 60 }; 61 62 struct dsa_host_vlan_rx_filtering_ctx { 63 struct net_device *dev; 64 const unsigned char *addr; 65 enum dsa_standalone_event event; 66 }; 67 68 static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds) 69 { 70 return ds->ops->port_fdb_add && ds->ops->port_fdb_del && 71 ds->fdb_isolation && !ds->vlan_filtering_is_global && 72 !ds->needs_standalone_vlan_filtering; 73 } 74 75 static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds) 76 { 77 return ds->ops->port_mdb_add && ds->ops->port_mdb_del && 78 ds->fdb_isolation && !ds->vlan_filtering_is_global && 79 !ds->needs_standalone_vlan_filtering; 80 } 81 82 static void dsa_user_standalone_event_work(struct work_struct *work) 83 { 84 struct dsa_standalone_event_work *standalone_work = 85 container_of(work, struct dsa_standalone_event_work, work); 86 const unsigned char *addr = standalone_work->addr; 87 struct net_device *dev = standalone_work->dev; 88 struct dsa_port *dp = dsa_user_to_port(dev); 89 struct switchdev_obj_port_mdb mdb; 90 struct dsa_switch *ds = dp->ds; 91 u16 vid = standalone_work->vid; 92 int err; 93 94 switch (standalone_work->event) { 95 case DSA_UC_ADD: 96 err = dsa_port_standalone_host_fdb_add(dp, addr, vid); 97 if (err) { 98 dev_err(ds->dev, 99 "port %d failed to add %pM vid %d to fdb: %d\n", 100 dp->index, addr, vid, err); 101 break; 102 } 103 break; 104 105 case DSA_UC_DEL: 106 err = dsa_port_standalone_host_fdb_del(dp, addr, vid); 107 if (err) { 108 dev_err(ds->dev, 109 "port %d failed to delete %pM vid %d from fdb: %d\n", 110 dp->index, addr, vid, err); 111 } 112 113 break; 114 case DSA_MC_ADD: 115 ether_addr_copy(mdb.addr, addr); 116 mdb.vid = vid; 117 118 err = dsa_port_standalone_host_mdb_add(dp, &mdb); 119 if (err) { 120 dev_err(ds->dev, 121 "port %d failed to add %pM vid %d to mdb: %d\n", 122 dp->index, addr, vid, err); 123 break; 124 } 125 break; 126 case DSA_MC_DEL: 127 ether_addr_copy(mdb.addr, addr); 128 mdb.vid = vid; 129 130 err = dsa_port_standalone_host_mdb_del(dp, &mdb); 131 if (err) { 132 dev_err(ds->dev, 133 "port %d failed to delete %pM vid %d from mdb: %d\n", 134 dp->index, addr, vid, err); 135 } 136 137 break; 138 } 139 140 kfree(standalone_work); 141 } 142 143 static int dsa_user_schedule_standalone_work(struct net_device *dev, 144 enum dsa_standalone_event event, 145 const unsigned char *addr, 146 u16 vid) 147 { 148 struct dsa_standalone_event_work *standalone_work; 149 150 standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC); 151 if (!standalone_work) 152 return -ENOMEM; 153 154 INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work); 155 standalone_work->event = event; 156 standalone_work->dev = dev; 157 158 ether_addr_copy(standalone_work->addr, addr); 159 standalone_work->vid = vid; 160 161 dsa_schedule_work(&standalone_work->work); 162 163 return 0; 164 } 165 166 static int dsa_user_host_vlan_rx_filtering(void *arg, int vid) 167 { 168 struct dsa_host_vlan_rx_filtering_ctx *ctx = arg; 169 170 return dsa_user_schedule_standalone_work(ctx->dev, ctx->event, 171 ctx->addr, vid); 172 } 173 174 static int dsa_user_vlan_for_each(struct net_device *dev, 175 int (*cb)(void *arg, int vid), void *arg) 176 { 177 struct dsa_port *dp = dsa_user_to_port(dev); 178 struct dsa_vlan *v; 179 int err; 180 181 lockdep_assert_held(&dev->addr_list_lock); 182 183 err = cb(arg, 0); 184 if (err) 185 return err; 186 187 list_for_each_entry(v, &dp->user_vlans, list) { 188 err = cb(arg, v->vid); 189 if (err) 190 return err; 191 } 192 193 return 0; 194 } 195 196 static int dsa_user_sync_uc(struct net_device *dev, 197 const unsigned char *addr) 198 { 199 struct net_device *conduit = dsa_user_to_conduit(dev); 200 struct dsa_port *dp = dsa_user_to_port(dev); 201 struct dsa_host_vlan_rx_filtering_ctx ctx = { 202 .dev = dev, 203 .addr = addr, 204 .event = DSA_UC_ADD, 205 }; 206 207 dev_uc_add(conduit, addr); 208 209 if (!dsa_switch_supports_uc_filtering(dp->ds)) 210 return 0; 211 212 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 213 &ctx); 214 } 215 216 static int dsa_user_unsync_uc(struct net_device *dev, 217 const unsigned char *addr) 218 { 219 struct net_device *conduit = dsa_user_to_conduit(dev); 220 struct dsa_port *dp = dsa_user_to_port(dev); 221 struct dsa_host_vlan_rx_filtering_ctx ctx = { 222 .dev = dev, 223 .addr = addr, 224 .event = DSA_UC_DEL, 225 }; 226 227 dev_uc_del(conduit, addr); 228 229 if (!dsa_switch_supports_uc_filtering(dp->ds)) 230 return 0; 231 232 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 233 &ctx); 234 } 235 236 static int dsa_user_sync_mc(struct net_device *dev, 237 const unsigned char *addr) 238 { 239 struct net_device *conduit = dsa_user_to_conduit(dev); 240 struct dsa_port *dp = dsa_user_to_port(dev); 241 struct dsa_host_vlan_rx_filtering_ctx ctx = { 242 .dev = dev, 243 .addr = addr, 244 .event = DSA_MC_ADD, 245 }; 246 247 dev_mc_add(conduit, addr); 248 249 if (!dsa_switch_supports_mc_filtering(dp->ds)) 250 return 0; 251 252 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 253 &ctx); 254 } 255 256 static int dsa_user_unsync_mc(struct net_device *dev, 257 const unsigned char *addr) 258 { 259 struct net_device *conduit = dsa_user_to_conduit(dev); 260 struct dsa_port *dp = dsa_user_to_port(dev); 261 struct dsa_host_vlan_rx_filtering_ctx ctx = { 262 .dev = dev, 263 .addr = addr, 264 .event = DSA_MC_DEL, 265 }; 266 267 dev_mc_del(conduit, addr); 268 269 if (!dsa_switch_supports_mc_filtering(dp->ds)) 270 return 0; 271 272 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 273 &ctx); 274 } 275 276 void dsa_user_sync_ha(struct net_device *dev) 277 { 278 struct dsa_port *dp = dsa_user_to_port(dev); 279 struct dsa_switch *ds = dp->ds; 280 struct netdev_hw_addr *ha; 281 282 netif_addr_lock_bh(dev); 283 284 netdev_for_each_synced_mc_addr(ha, dev) 285 dsa_user_sync_mc(dev, ha->addr); 286 287 netdev_for_each_synced_uc_addr(ha, dev) 288 dsa_user_sync_uc(dev, ha->addr); 289 290 netif_addr_unlock_bh(dev); 291 292 if (dsa_switch_supports_uc_filtering(ds) || 293 dsa_switch_supports_mc_filtering(ds)) 294 dsa_flush_workqueue(); 295 } 296 297 void dsa_user_unsync_ha(struct net_device *dev) 298 { 299 struct dsa_port *dp = dsa_user_to_port(dev); 300 struct dsa_switch *ds = dp->ds; 301 struct netdev_hw_addr *ha; 302 303 netif_addr_lock_bh(dev); 304 305 netdev_for_each_synced_uc_addr(ha, dev) 306 dsa_user_unsync_uc(dev, ha->addr); 307 308 netdev_for_each_synced_mc_addr(ha, dev) 309 dsa_user_unsync_mc(dev, ha->addr); 310 311 netif_addr_unlock_bh(dev); 312 313 if (dsa_switch_supports_uc_filtering(ds) || 314 dsa_switch_supports_mc_filtering(ds)) 315 dsa_flush_workqueue(); 316 } 317 318 /* user mii_bus handling ***************************************************/ 319 static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg) 320 { 321 struct dsa_switch *ds = bus->priv; 322 323 if (ds->phys_mii_mask & (1 << addr)) 324 return ds->ops->phy_read(ds, addr, reg); 325 326 return 0xffff; 327 } 328 329 static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val) 330 { 331 struct dsa_switch *ds = bus->priv; 332 333 if (ds->phys_mii_mask & (1 << addr)) 334 return ds->ops->phy_write(ds, addr, reg, val); 335 336 return 0; 337 } 338 339 void dsa_user_mii_bus_init(struct dsa_switch *ds) 340 { 341 ds->user_mii_bus->priv = (void *)ds; 342 ds->user_mii_bus->name = "dsa user smi"; 343 ds->user_mii_bus->read = dsa_user_phy_read; 344 ds->user_mii_bus->write = dsa_user_phy_write; 345 snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d", 346 ds->dst->index, ds->index); 347 ds->user_mii_bus->parent = ds->dev; 348 ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask; 349 } 350 351 352 /* user device handling ****************************************************/ 353 static int dsa_user_get_iflink(const struct net_device *dev) 354 { 355 return READ_ONCE(dsa_user_to_conduit(dev)->ifindex); 356 } 357 358 int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr) 359 { 360 struct net_device *conduit = dsa_user_to_conduit(dev); 361 struct dsa_port *dp = dsa_user_to_port(dev); 362 struct dsa_switch *ds = dp->ds; 363 int err; 364 365 if (dsa_switch_supports_uc_filtering(ds)) { 366 err = dsa_port_standalone_host_fdb_add(dp, addr, 0); 367 if (err) 368 goto out; 369 } 370 371 if (!ether_addr_equal(addr, conduit->dev_addr)) { 372 err = dev_uc_add(conduit, addr); 373 if (err < 0) 374 goto del_host_addr; 375 } 376 377 return 0; 378 379 del_host_addr: 380 if (dsa_switch_supports_uc_filtering(ds)) 381 dsa_port_standalone_host_fdb_del(dp, addr, 0); 382 out: 383 return err; 384 } 385 386 void dsa_user_host_uc_uninstall(struct net_device *dev) 387 { 388 struct net_device *conduit = dsa_user_to_conduit(dev); 389 struct dsa_port *dp = dsa_user_to_port(dev); 390 struct dsa_switch *ds = dp->ds; 391 392 if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr)) 393 dev_uc_del(conduit, dev->dev_addr); 394 395 if (dsa_switch_supports_uc_filtering(ds)) 396 dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0); 397 } 398 399 static int dsa_user_open(struct net_device *dev) 400 { 401 struct net_device *conduit = dsa_user_to_conduit(dev); 402 struct dsa_port *dp = dsa_user_to_port(dev); 403 int err; 404 405 err = dev_open(conduit, NULL); 406 if (err < 0) { 407 netdev_err(dev, "failed to open conduit %s\n", conduit->name); 408 goto out; 409 } 410 411 err = dsa_user_host_uc_install(dev, dev->dev_addr); 412 if (err) 413 goto out; 414 415 err = dsa_port_enable_rt(dp, dev->phydev); 416 if (err) 417 goto out_del_host_uc; 418 419 return 0; 420 421 out_del_host_uc: 422 dsa_user_host_uc_uninstall(dev); 423 out: 424 return err; 425 } 426 427 static int dsa_user_close(struct net_device *dev) 428 { 429 struct dsa_port *dp = dsa_user_to_port(dev); 430 431 dsa_port_disable_rt(dp); 432 433 dsa_user_host_uc_uninstall(dev); 434 435 return 0; 436 } 437 438 static void dsa_user_manage_host_flood(struct net_device *dev) 439 { 440 bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI); 441 struct dsa_port *dp = dsa_user_to_port(dev); 442 bool uc = dev->flags & IFF_PROMISC; 443 444 dsa_port_set_host_flood(dp, uc, mc); 445 } 446 447 static void dsa_user_change_rx_flags(struct net_device *dev, int change) 448 { 449 struct net_device *conduit = dsa_user_to_conduit(dev); 450 struct dsa_port *dp = dsa_user_to_port(dev); 451 struct dsa_switch *ds = dp->ds; 452 453 if (change & IFF_ALLMULTI) 454 dev_set_allmulti(conduit, 455 dev->flags & IFF_ALLMULTI ? 1 : -1); 456 if (change & IFF_PROMISC) 457 dev_set_promiscuity(conduit, 458 dev->flags & IFF_PROMISC ? 1 : -1); 459 460 if (dsa_switch_supports_uc_filtering(ds) && 461 dsa_switch_supports_mc_filtering(ds)) 462 dsa_user_manage_host_flood(dev); 463 } 464 465 static void dsa_user_set_rx_mode(struct net_device *dev) 466 { 467 __dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc); 468 __dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc); 469 } 470 471 static int dsa_user_set_mac_address(struct net_device *dev, void *a) 472 { 473 struct dsa_port *dp = dsa_user_to_port(dev); 474 struct dsa_switch *ds = dp->ds; 475 struct sockaddr *addr = a; 476 int err; 477 478 if (!is_valid_ether_addr(addr->sa_data)) 479 return -EADDRNOTAVAIL; 480 481 if (ds->ops->port_set_mac_address) { 482 err = ds->ops->port_set_mac_address(ds, dp->index, 483 addr->sa_data); 484 if (err) 485 return err; 486 } 487 488 /* If the port is down, the address isn't synced yet to hardware or 489 * to the DSA conduit, so there is nothing to change. 490 */ 491 if (!(dev->flags & IFF_UP)) 492 goto out_change_dev_addr; 493 494 err = dsa_user_host_uc_install(dev, addr->sa_data); 495 if (err) 496 return err; 497 498 dsa_user_host_uc_uninstall(dev); 499 500 out_change_dev_addr: 501 eth_hw_addr_set(dev, addr->sa_data); 502 503 return 0; 504 } 505 506 struct dsa_user_dump_ctx { 507 struct net_device *dev; 508 struct sk_buff *skb; 509 struct netlink_callback *cb; 510 int idx; 511 }; 512 513 static int 514 dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid, 515 bool is_static, void *data) 516 { 517 struct dsa_user_dump_ctx *dump = data; 518 u32 portid = NETLINK_CB(dump->cb->skb).portid; 519 u32 seq = dump->cb->nlh->nlmsg_seq; 520 struct nlmsghdr *nlh; 521 struct ndmsg *ndm; 522 523 if (dump->idx < dump->cb->args[2]) 524 goto skip; 525 526 nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH, 527 sizeof(*ndm), NLM_F_MULTI); 528 if (!nlh) 529 return -EMSGSIZE; 530 531 ndm = nlmsg_data(nlh); 532 ndm->ndm_family = AF_BRIDGE; 533 ndm->ndm_pad1 = 0; 534 ndm->ndm_pad2 = 0; 535 ndm->ndm_flags = NTF_SELF; 536 ndm->ndm_type = 0; 537 ndm->ndm_ifindex = dump->dev->ifindex; 538 ndm->ndm_state = is_static ? NUD_NOARP : NUD_REACHABLE; 539 540 if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr)) 541 goto nla_put_failure; 542 543 if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid)) 544 goto nla_put_failure; 545 546 nlmsg_end(dump->skb, nlh); 547 548 skip: 549 dump->idx++; 550 return 0; 551 552 nla_put_failure: 553 nlmsg_cancel(dump->skb, nlh); 554 return -EMSGSIZE; 555 } 556 557 static int 558 dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb, 559 struct net_device *dev, struct net_device *filter_dev, 560 int *idx) 561 { 562 struct dsa_port *dp = dsa_user_to_port(dev); 563 struct dsa_user_dump_ctx dump = { 564 .dev = dev, 565 .skb = skb, 566 .cb = cb, 567 .idx = *idx, 568 }; 569 int err; 570 571 err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump); 572 *idx = dump.idx; 573 574 return err; 575 } 576 577 static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) 578 { 579 struct dsa_user_priv *p = netdev_priv(dev); 580 struct dsa_switch *ds = p->dp->ds; 581 int port = p->dp->index; 582 583 /* Pass through to switch driver if it supports timestamping */ 584 switch (cmd) { 585 case SIOCGHWTSTAMP: 586 if (ds->ops->port_hwtstamp_get) 587 return ds->ops->port_hwtstamp_get(ds, port, ifr); 588 break; 589 case SIOCSHWTSTAMP: 590 if (ds->ops->port_hwtstamp_set) 591 return ds->ops->port_hwtstamp_set(ds, port, ifr); 592 break; 593 } 594 595 return phylink_mii_ioctl(p->dp->pl, ifr, cmd); 596 } 597 598 static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx, 599 const struct switchdev_attr *attr, 600 struct netlink_ext_ack *extack) 601 { 602 struct dsa_port *dp = dsa_user_to_port(dev); 603 int ret; 604 605 if (ctx && ctx != dp) 606 return 0; 607 608 switch (attr->id) { 609 case SWITCHDEV_ATTR_ID_PORT_STP_STATE: 610 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 611 return -EOPNOTSUPP; 612 613 ret = dsa_port_set_state(dp, attr->u.stp_state, true); 614 break; 615 case SWITCHDEV_ATTR_ID_PORT_MST_STATE: 616 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 617 return -EOPNOTSUPP; 618 619 ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack); 620 break; 621 case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING: 622 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 623 return -EOPNOTSUPP; 624 625 ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering, 626 extack); 627 break; 628 case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME: 629 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 630 return -EOPNOTSUPP; 631 632 ret = dsa_port_ageing_time(dp, attr->u.ageing_time); 633 break; 634 case SWITCHDEV_ATTR_ID_BRIDGE_MST: 635 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 636 return -EOPNOTSUPP; 637 638 ret = dsa_port_mst_enable(dp, attr->u.mst, extack); 639 break; 640 case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS: 641 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 642 return -EOPNOTSUPP; 643 644 ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags, 645 extack); 646 break; 647 case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS: 648 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 649 return -EOPNOTSUPP; 650 651 ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack); 652 break; 653 case SWITCHDEV_ATTR_ID_VLAN_MSTI: 654 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 655 return -EOPNOTSUPP; 656 657 ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti); 658 break; 659 default: 660 ret = -EOPNOTSUPP; 661 break; 662 } 663 664 return ret; 665 } 666 667 /* Must be called under rcu_read_lock() */ 668 static int 669 dsa_user_vlan_check_for_8021q_uppers(struct net_device *user, 670 const struct switchdev_obj_port_vlan *vlan) 671 { 672 struct net_device *upper_dev; 673 struct list_head *iter; 674 675 netdev_for_each_upper_dev_rcu(user, upper_dev, iter) { 676 u16 vid; 677 678 if (!is_vlan_dev(upper_dev)) 679 continue; 680 681 vid = vlan_dev_vlan_id(upper_dev); 682 if (vid == vlan->vid) 683 return -EBUSY; 684 } 685 686 return 0; 687 } 688 689 static int dsa_user_vlan_add(struct net_device *dev, 690 const struct switchdev_obj *obj, 691 struct netlink_ext_ack *extack) 692 { 693 struct dsa_port *dp = dsa_user_to_port(dev); 694 struct switchdev_obj_port_vlan *vlan; 695 int err; 696 697 if (dsa_port_skip_vlan_configuration(dp)) { 698 NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); 699 return 0; 700 } 701 702 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 703 704 /* Deny adding a bridge VLAN when there is already an 802.1Q upper with 705 * the same VID. 706 */ 707 if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) { 708 rcu_read_lock(); 709 err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan); 710 rcu_read_unlock(); 711 if (err) { 712 NL_SET_ERR_MSG_MOD(extack, 713 "Port already has a VLAN upper with this VID"); 714 return err; 715 } 716 } 717 718 return dsa_port_vlan_add(dp, vlan, extack); 719 } 720 721 /* Offload a VLAN installed on the bridge or on a foreign interface by 722 * installing it as a VLAN towards the CPU port. 723 */ 724 static int dsa_user_host_vlan_add(struct net_device *dev, 725 const struct switchdev_obj *obj, 726 struct netlink_ext_ack *extack) 727 { 728 struct dsa_port *dp = dsa_user_to_port(dev); 729 struct switchdev_obj_port_vlan vlan; 730 731 /* Do nothing if this is a software bridge */ 732 if (!dp->bridge) 733 return -EOPNOTSUPP; 734 735 if (dsa_port_skip_vlan_configuration(dp)) { 736 NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); 737 return 0; 738 } 739 740 vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj); 741 742 /* Even though drivers often handle CPU membership in special ways, 743 * it doesn't make sense to program a PVID, so clear this flag. 744 */ 745 vlan.flags &= ~BRIDGE_VLAN_INFO_PVID; 746 747 return dsa_port_host_vlan_add(dp, &vlan, extack); 748 } 749 750 static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx, 751 const struct switchdev_obj *obj, 752 struct netlink_ext_ack *extack) 753 { 754 struct dsa_port *dp = dsa_user_to_port(dev); 755 int err; 756 757 if (ctx && ctx != dp) 758 return 0; 759 760 switch (obj->id) { 761 case SWITCHDEV_OBJ_ID_PORT_MDB: 762 if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 763 return -EOPNOTSUPP; 764 765 err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 766 break; 767 case SWITCHDEV_OBJ_ID_HOST_MDB: 768 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 769 return -EOPNOTSUPP; 770 771 err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 772 break; 773 case SWITCHDEV_OBJ_ID_PORT_VLAN: 774 if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 775 err = dsa_user_vlan_add(dev, obj, extack); 776 else 777 err = dsa_user_host_vlan_add(dev, obj, extack); 778 break; 779 case SWITCHDEV_OBJ_ID_MRP: 780 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 781 return -EOPNOTSUPP; 782 783 err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj)); 784 break; 785 case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: 786 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 787 return -EOPNOTSUPP; 788 789 err = dsa_port_mrp_add_ring_role(dp, 790 SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); 791 break; 792 default: 793 err = -EOPNOTSUPP; 794 break; 795 } 796 797 return err; 798 } 799 800 static int dsa_user_vlan_del(struct net_device *dev, 801 const struct switchdev_obj *obj) 802 { 803 struct dsa_port *dp = dsa_user_to_port(dev); 804 struct switchdev_obj_port_vlan *vlan; 805 806 if (dsa_port_skip_vlan_configuration(dp)) 807 return 0; 808 809 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 810 811 return dsa_port_vlan_del(dp, vlan); 812 } 813 814 static int dsa_user_host_vlan_del(struct net_device *dev, 815 const struct switchdev_obj *obj) 816 { 817 struct dsa_port *dp = dsa_user_to_port(dev); 818 struct switchdev_obj_port_vlan *vlan; 819 820 /* Do nothing if this is a software bridge */ 821 if (!dp->bridge) 822 return -EOPNOTSUPP; 823 824 if (dsa_port_skip_vlan_configuration(dp)) 825 return 0; 826 827 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 828 829 return dsa_port_host_vlan_del(dp, vlan); 830 } 831 832 static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx, 833 const struct switchdev_obj *obj) 834 { 835 struct dsa_port *dp = dsa_user_to_port(dev); 836 int err; 837 838 if (ctx && ctx != dp) 839 return 0; 840 841 switch (obj->id) { 842 case SWITCHDEV_OBJ_ID_PORT_MDB: 843 if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 844 return -EOPNOTSUPP; 845 846 err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 847 break; 848 case SWITCHDEV_OBJ_ID_HOST_MDB: 849 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 850 return -EOPNOTSUPP; 851 852 err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 853 break; 854 case SWITCHDEV_OBJ_ID_PORT_VLAN: 855 if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 856 err = dsa_user_vlan_del(dev, obj); 857 else 858 err = dsa_user_host_vlan_del(dev, obj); 859 break; 860 case SWITCHDEV_OBJ_ID_MRP: 861 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 862 return -EOPNOTSUPP; 863 864 err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj)); 865 break; 866 case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: 867 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 868 return -EOPNOTSUPP; 869 870 err = dsa_port_mrp_del_ring_role(dp, 871 SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); 872 break; 873 default: 874 err = -EOPNOTSUPP; 875 break; 876 } 877 878 return err; 879 } 880 881 static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev, 882 struct sk_buff *skb) 883 { 884 #ifdef CONFIG_NET_POLL_CONTROLLER 885 struct dsa_user_priv *p = netdev_priv(dev); 886 887 return netpoll_send_skb(p->netpoll, skb); 888 #else 889 BUG(); 890 return NETDEV_TX_OK; 891 #endif 892 } 893 894 static void dsa_skb_tx_timestamp(struct dsa_user_priv *p, 895 struct sk_buff *skb) 896 { 897 struct dsa_switch *ds = p->dp->ds; 898 899 if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP)) 900 return; 901 902 if (!ds->ops->port_txtstamp) 903 return; 904 905 ds->ops->port_txtstamp(ds, p->dp->index, skb); 906 } 907 908 netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev) 909 { 910 /* SKB for netpoll still need to be mangled with the protocol-specific 911 * tag to be successfully transmitted 912 */ 913 if (unlikely(netpoll_tx_running(dev))) 914 return dsa_user_netpoll_send_skb(dev, skb); 915 916 /* Queue the SKB for transmission on the parent interface, but 917 * do not modify its EtherType 918 */ 919 skb->dev = dsa_user_to_conduit(dev); 920 dev_queue_xmit(skb); 921 922 return NETDEV_TX_OK; 923 } 924 EXPORT_SYMBOL_GPL(dsa_enqueue_skb); 925 926 static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev) 927 { 928 struct dsa_user_priv *p = netdev_priv(dev); 929 struct sk_buff *nskb; 930 931 dev_sw_netstats_tx_add(dev, 1, skb->len); 932 933 memset(skb->cb, 0, sizeof(skb->cb)); 934 935 /* Handle tx timestamp if any */ 936 dsa_skb_tx_timestamp(p, skb); 937 938 if (skb_ensure_writable_head_tail(skb, dev)) { 939 dev_kfree_skb_any(skb); 940 return NETDEV_TX_OK; 941 } 942 943 /* needed_tailroom should still be 'warm' in the cache line from 944 * skb_ensure_writable_head_tail(), which has also ensured that 945 * padding is safe. 946 */ 947 if (dev->needed_tailroom) 948 eth_skb_pad(skb); 949 950 /* Transmit function may have to reallocate the original SKB, 951 * in which case it must have freed it. Only free it here on error. 952 */ 953 nskb = p->xmit(skb, dev); 954 if (!nskb) { 955 kfree_skb(skb); 956 return NETDEV_TX_OK; 957 } 958 959 return dsa_enqueue_skb(nskb, dev); 960 } 961 962 /* ethtool operations *******************************************************/ 963 964 static void dsa_user_get_drvinfo(struct net_device *dev, 965 struct ethtool_drvinfo *drvinfo) 966 { 967 strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver)); 968 strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version)); 969 strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info)); 970 } 971 972 static int dsa_user_get_regs_len(struct net_device *dev) 973 { 974 struct dsa_port *dp = dsa_user_to_port(dev); 975 struct dsa_switch *ds = dp->ds; 976 977 if (ds->ops->get_regs_len) 978 return ds->ops->get_regs_len(ds, dp->index); 979 980 return -EOPNOTSUPP; 981 } 982 983 static void 984 dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p) 985 { 986 struct dsa_port *dp = dsa_user_to_port(dev); 987 struct dsa_switch *ds = dp->ds; 988 989 if (ds->ops->get_regs) 990 ds->ops->get_regs(ds, dp->index, regs, _p); 991 } 992 993 static int dsa_user_nway_reset(struct net_device *dev) 994 { 995 struct dsa_port *dp = dsa_user_to_port(dev); 996 997 return phylink_ethtool_nway_reset(dp->pl); 998 } 999 1000 static int dsa_user_get_eeprom_len(struct net_device *dev) 1001 { 1002 struct dsa_port *dp = dsa_user_to_port(dev); 1003 struct dsa_switch *ds = dp->ds; 1004 1005 if (ds->cd && ds->cd->eeprom_len) 1006 return ds->cd->eeprom_len; 1007 1008 if (ds->ops->get_eeprom_len) 1009 return ds->ops->get_eeprom_len(ds); 1010 1011 return 0; 1012 } 1013 1014 static int dsa_user_get_eeprom(struct net_device *dev, 1015 struct ethtool_eeprom *eeprom, u8 *data) 1016 { 1017 struct dsa_port *dp = dsa_user_to_port(dev); 1018 struct dsa_switch *ds = dp->ds; 1019 1020 if (ds->ops->get_eeprom) 1021 return ds->ops->get_eeprom(ds, eeprom, data); 1022 1023 return -EOPNOTSUPP; 1024 } 1025 1026 static int dsa_user_set_eeprom(struct net_device *dev, 1027 struct ethtool_eeprom *eeprom, u8 *data) 1028 { 1029 struct dsa_port *dp = dsa_user_to_port(dev); 1030 struct dsa_switch *ds = dp->ds; 1031 1032 if (ds->ops->set_eeprom) 1033 return ds->ops->set_eeprom(ds, eeprom, data); 1034 1035 return -EOPNOTSUPP; 1036 } 1037 1038 static void dsa_user_get_strings(struct net_device *dev, 1039 uint32_t stringset, uint8_t *data) 1040 { 1041 struct dsa_port *dp = dsa_user_to_port(dev); 1042 struct dsa_switch *ds = dp->ds; 1043 1044 if (stringset == ETH_SS_STATS) { 1045 int len = ETH_GSTRING_LEN; 1046 1047 strscpy_pad(data, "tx_packets", len); 1048 strscpy_pad(data + len, "tx_bytes", len); 1049 strscpy_pad(data + 2 * len, "rx_packets", len); 1050 strscpy_pad(data + 3 * len, "rx_bytes", len); 1051 if (ds->ops->get_strings) 1052 ds->ops->get_strings(ds, dp->index, stringset, 1053 data + 4 * len); 1054 } else if (stringset == ETH_SS_TEST) { 1055 net_selftest_get_strings(data); 1056 } 1057 1058 } 1059 1060 static void dsa_user_get_ethtool_stats(struct net_device *dev, 1061 struct ethtool_stats *stats, 1062 uint64_t *data) 1063 { 1064 struct dsa_port *dp = dsa_user_to_port(dev); 1065 struct dsa_switch *ds = dp->ds; 1066 struct pcpu_sw_netstats *s; 1067 unsigned int start; 1068 int i; 1069 1070 for_each_possible_cpu(i) { 1071 u64 tx_packets, tx_bytes, rx_packets, rx_bytes; 1072 1073 s = per_cpu_ptr(dev->tstats, i); 1074 do { 1075 start = u64_stats_fetch_begin(&s->syncp); 1076 tx_packets = u64_stats_read(&s->tx_packets); 1077 tx_bytes = u64_stats_read(&s->tx_bytes); 1078 rx_packets = u64_stats_read(&s->rx_packets); 1079 rx_bytes = u64_stats_read(&s->rx_bytes); 1080 } while (u64_stats_fetch_retry(&s->syncp, start)); 1081 data[0] += tx_packets; 1082 data[1] += tx_bytes; 1083 data[2] += rx_packets; 1084 data[3] += rx_bytes; 1085 } 1086 if (ds->ops->get_ethtool_stats) 1087 ds->ops->get_ethtool_stats(ds, dp->index, data + 4); 1088 } 1089 1090 static int dsa_user_get_sset_count(struct net_device *dev, int sset) 1091 { 1092 struct dsa_port *dp = dsa_user_to_port(dev); 1093 struct dsa_switch *ds = dp->ds; 1094 1095 if (sset == ETH_SS_STATS) { 1096 int count = 0; 1097 1098 if (ds->ops->get_sset_count) { 1099 count = ds->ops->get_sset_count(ds, dp->index, sset); 1100 if (count < 0) 1101 return count; 1102 } 1103 1104 return count + 4; 1105 } else if (sset == ETH_SS_TEST) { 1106 return net_selftest_get_count(); 1107 } 1108 1109 return -EOPNOTSUPP; 1110 } 1111 1112 static void dsa_user_get_eth_phy_stats(struct net_device *dev, 1113 struct ethtool_eth_phy_stats *phy_stats) 1114 { 1115 struct dsa_port *dp = dsa_user_to_port(dev); 1116 struct dsa_switch *ds = dp->ds; 1117 1118 if (ds->ops->get_eth_phy_stats) 1119 ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats); 1120 } 1121 1122 static void dsa_user_get_eth_mac_stats(struct net_device *dev, 1123 struct ethtool_eth_mac_stats *mac_stats) 1124 { 1125 struct dsa_port *dp = dsa_user_to_port(dev); 1126 struct dsa_switch *ds = dp->ds; 1127 1128 if (ds->ops->get_eth_mac_stats) 1129 ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats); 1130 } 1131 1132 static void 1133 dsa_user_get_eth_ctrl_stats(struct net_device *dev, 1134 struct ethtool_eth_ctrl_stats *ctrl_stats) 1135 { 1136 struct dsa_port *dp = dsa_user_to_port(dev); 1137 struct dsa_switch *ds = dp->ds; 1138 1139 if (ds->ops->get_eth_ctrl_stats) 1140 ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats); 1141 } 1142 1143 static void 1144 dsa_user_get_rmon_stats(struct net_device *dev, 1145 struct ethtool_rmon_stats *rmon_stats, 1146 const struct ethtool_rmon_hist_range **ranges) 1147 { 1148 struct dsa_port *dp = dsa_user_to_port(dev); 1149 struct dsa_switch *ds = dp->ds; 1150 1151 if (ds->ops->get_rmon_stats) 1152 ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges); 1153 } 1154 1155 static void dsa_user_net_selftest(struct net_device *ndev, 1156 struct ethtool_test *etest, u64 *buf) 1157 { 1158 struct dsa_port *dp = dsa_user_to_port(ndev); 1159 struct dsa_switch *ds = dp->ds; 1160 1161 if (ds->ops->self_test) { 1162 ds->ops->self_test(ds, dp->index, etest, buf); 1163 return; 1164 } 1165 1166 net_selftest(ndev, etest, buf); 1167 } 1168 1169 static int dsa_user_get_mm(struct net_device *dev, 1170 struct ethtool_mm_state *state) 1171 { 1172 struct dsa_port *dp = dsa_user_to_port(dev); 1173 struct dsa_switch *ds = dp->ds; 1174 1175 if (!ds->ops->get_mm) 1176 return -EOPNOTSUPP; 1177 1178 return ds->ops->get_mm(ds, dp->index, state); 1179 } 1180 1181 static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg, 1182 struct netlink_ext_ack *extack) 1183 { 1184 struct dsa_port *dp = dsa_user_to_port(dev); 1185 struct dsa_switch *ds = dp->ds; 1186 1187 if (!ds->ops->set_mm) 1188 return -EOPNOTSUPP; 1189 1190 return ds->ops->set_mm(ds, dp->index, cfg, extack); 1191 } 1192 1193 static void dsa_user_get_mm_stats(struct net_device *dev, 1194 struct ethtool_mm_stats *stats) 1195 { 1196 struct dsa_port *dp = dsa_user_to_port(dev); 1197 struct dsa_switch *ds = dp->ds; 1198 1199 if (ds->ops->get_mm_stats) 1200 ds->ops->get_mm_stats(ds, dp->index, stats); 1201 } 1202 1203 static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w) 1204 { 1205 struct dsa_port *dp = dsa_user_to_port(dev); 1206 struct dsa_switch *ds = dp->ds; 1207 1208 phylink_ethtool_get_wol(dp->pl, w); 1209 1210 if (ds->ops->get_wol) 1211 ds->ops->get_wol(ds, dp->index, w); 1212 } 1213 1214 static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w) 1215 { 1216 struct dsa_port *dp = dsa_user_to_port(dev); 1217 struct dsa_switch *ds = dp->ds; 1218 int ret = -EOPNOTSUPP; 1219 1220 phylink_ethtool_set_wol(dp->pl, w); 1221 1222 if (ds->ops->set_wol) 1223 ret = ds->ops->set_wol(ds, dp->index, w); 1224 1225 return ret; 1226 } 1227 1228 static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e) 1229 { 1230 struct dsa_port *dp = dsa_user_to_port(dev); 1231 struct dsa_switch *ds = dp->ds; 1232 int ret; 1233 1234 /* Port's PHY and MAC both need to be EEE capable */ 1235 if (!dev->phydev || !dp->pl) 1236 return -ENODEV; 1237 1238 if (!ds->ops->set_mac_eee) 1239 return -EOPNOTSUPP; 1240 1241 ret = ds->ops->set_mac_eee(ds, dp->index, e); 1242 if (ret) 1243 return ret; 1244 1245 return phylink_ethtool_set_eee(dp->pl, e); 1246 } 1247 1248 static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e) 1249 { 1250 struct dsa_port *dp = dsa_user_to_port(dev); 1251 struct dsa_switch *ds = dp->ds; 1252 int ret; 1253 1254 /* Port's PHY and MAC both need to be EEE capable */ 1255 if (!dev->phydev || !dp->pl) 1256 return -ENODEV; 1257 1258 if (!ds->ops->get_mac_eee) 1259 return -EOPNOTSUPP; 1260 1261 ret = ds->ops->get_mac_eee(ds, dp->index, e); 1262 if (ret) 1263 return ret; 1264 1265 return phylink_ethtool_get_eee(dp->pl, e); 1266 } 1267 1268 static int dsa_user_get_link_ksettings(struct net_device *dev, 1269 struct ethtool_link_ksettings *cmd) 1270 { 1271 struct dsa_port *dp = dsa_user_to_port(dev); 1272 1273 return phylink_ethtool_ksettings_get(dp->pl, cmd); 1274 } 1275 1276 static int dsa_user_set_link_ksettings(struct net_device *dev, 1277 const struct ethtool_link_ksettings *cmd) 1278 { 1279 struct dsa_port *dp = dsa_user_to_port(dev); 1280 1281 return phylink_ethtool_ksettings_set(dp->pl, cmd); 1282 } 1283 1284 static void dsa_user_get_pause_stats(struct net_device *dev, 1285 struct ethtool_pause_stats *pause_stats) 1286 { 1287 struct dsa_port *dp = dsa_user_to_port(dev); 1288 struct dsa_switch *ds = dp->ds; 1289 1290 if (ds->ops->get_pause_stats) 1291 ds->ops->get_pause_stats(ds, dp->index, pause_stats); 1292 } 1293 1294 static void dsa_user_get_pauseparam(struct net_device *dev, 1295 struct ethtool_pauseparam *pause) 1296 { 1297 struct dsa_port *dp = dsa_user_to_port(dev); 1298 1299 phylink_ethtool_get_pauseparam(dp->pl, pause); 1300 } 1301 1302 static int dsa_user_set_pauseparam(struct net_device *dev, 1303 struct ethtool_pauseparam *pause) 1304 { 1305 struct dsa_port *dp = dsa_user_to_port(dev); 1306 1307 return phylink_ethtool_set_pauseparam(dp->pl, pause); 1308 } 1309 1310 #ifdef CONFIG_NET_POLL_CONTROLLER 1311 static int dsa_user_netpoll_setup(struct net_device *dev) 1312 { 1313 struct net_device *conduit = dsa_user_to_conduit(dev); 1314 struct dsa_user_priv *p = netdev_priv(dev); 1315 struct netpoll *netpoll; 1316 int err = 0; 1317 1318 netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL); 1319 if (!netpoll) 1320 return -ENOMEM; 1321 1322 err = __netpoll_setup(netpoll, conduit); 1323 if (err) { 1324 kfree(netpoll); 1325 goto out; 1326 } 1327 1328 p->netpoll = netpoll; 1329 out: 1330 return err; 1331 } 1332 1333 static void dsa_user_netpoll_cleanup(struct net_device *dev) 1334 { 1335 struct dsa_user_priv *p = netdev_priv(dev); 1336 struct netpoll *netpoll = p->netpoll; 1337 1338 if (!netpoll) 1339 return; 1340 1341 p->netpoll = NULL; 1342 1343 __netpoll_free(netpoll); 1344 } 1345 1346 static void dsa_user_poll_controller(struct net_device *dev) 1347 { 1348 } 1349 #endif 1350 1351 static struct dsa_mall_tc_entry * 1352 dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie) 1353 { 1354 struct dsa_user_priv *p = netdev_priv(dev); 1355 struct dsa_mall_tc_entry *mall_tc_entry; 1356 1357 list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) 1358 if (mall_tc_entry->cookie == cookie) 1359 return mall_tc_entry; 1360 1361 return NULL; 1362 } 1363 1364 static int 1365 dsa_user_add_cls_matchall_mirred(struct net_device *dev, 1366 struct tc_cls_matchall_offload *cls, 1367 bool ingress, bool ingress_target) 1368 { 1369 struct netlink_ext_ack *extack = cls->common.extack; 1370 struct dsa_port *dp = dsa_user_to_port(dev); 1371 struct dsa_user_priv *p = netdev_priv(dev); 1372 struct dsa_mall_mirror_tc_entry *mirror; 1373 struct dsa_mall_tc_entry *mall_tc_entry; 1374 struct dsa_switch *ds = dp->ds; 1375 struct flow_action_entry *act; 1376 struct dsa_port *to_dp; 1377 int err; 1378 1379 if (cls->common.protocol != htons(ETH_P_ALL)) { 1380 NL_SET_ERR_MSG_MOD(extack, 1381 "Can only offload \"protocol all\" matchall filter"); 1382 return -EOPNOTSUPP; 1383 } 1384 1385 if (!ds->ops->port_mirror_add) { 1386 NL_SET_ERR_MSG_MOD(extack, 1387 "Switch does not support mirroring operation"); 1388 return -EOPNOTSUPP; 1389 } 1390 1391 if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack)) 1392 return -EOPNOTSUPP; 1393 1394 act = &cls->rule->action.entries[0]; 1395 1396 if (!act->dev) 1397 return -EINVAL; 1398 1399 if (dsa_user_dev_check(act->dev)) { 1400 if (ingress_target) { 1401 /* We can only fulfill this using software assist */ 1402 if (cls->common.skip_sw) { 1403 NL_SET_ERR_MSG_MOD(extack, 1404 "Can only mirred to ingress of DSA user port if filter also runs in software"); 1405 return -EOPNOTSUPP; 1406 } 1407 to_dp = dp->cpu_dp; 1408 } else { 1409 to_dp = dsa_user_to_port(act->dev); 1410 } 1411 } else { 1412 /* Handle mirroring to foreign target ports as a mirror towards 1413 * the CPU. The software tc rule will take the packets from 1414 * there. 1415 */ 1416 if (cls->common.skip_sw) { 1417 NL_SET_ERR_MSG_MOD(extack, 1418 "Can only mirred to CPU if filter also runs in software"); 1419 return -EOPNOTSUPP; 1420 } 1421 to_dp = dp->cpu_dp; 1422 } 1423 1424 if (dp->ds != to_dp->ds) { 1425 NL_SET_ERR_MSG_MOD(extack, 1426 "Cross-chip mirroring not implemented"); 1427 return -EOPNOTSUPP; 1428 } 1429 1430 mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); 1431 if (!mall_tc_entry) 1432 return -ENOMEM; 1433 1434 mall_tc_entry->cookie = cls->cookie; 1435 mall_tc_entry->type = DSA_PORT_MALL_MIRROR; 1436 mirror = &mall_tc_entry->mirror; 1437 mirror->to_local_port = to_dp->index; 1438 mirror->ingress = ingress; 1439 1440 err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack); 1441 if (err) { 1442 kfree(mall_tc_entry); 1443 return err; 1444 } 1445 1446 list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); 1447 1448 return err; 1449 } 1450 1451 static int 1452 dsa_user_add_cls_matchall_police(struct net_device *dev, 1453 struct tc_cls_matchall_offload *cls, 1454 bool ingress) 1455 { 1456 struct netlink_ext_ack *extack = cls->common.extack; 1457 struct dsa_port *dp = dsa_user_to_port(dev); 1458 struct dsa_user_priv *p = netdev_priv(dev); 1459 struct dsa_mall_policer_tc_entry *policer; 1460 struct dsa_mall_tc_entry *mall_tc_entry; 1461 struct dsa_switch *ds = dp->ds; 1462 struct flow_action_entry *act; 1463 int err; 1464 1465 if (!ds->ops->port_policer_add) { 1466 NL_SET_ERR_MSG_MOD(extack, 1467 "Policing offload not implemented"); 1468 return -EOPNOTSUPP; 1469 } 1470 1471 if (!ingress) { 1472 NL_SET_ERR_MSG_MOD(extack, 1473 "Only supported on ingress qdisc"); 1474 return -EOPNOTSUPP; 1475 } 1476 1477 if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack)) 1478 return -EOPNOTSUPP; 1479 1480 list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) { 1481 if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) { 1482 NL_SET_ERR_MSG_MOD(extack, 1483 "Only one port policer allowed"); 1484 return -EEXIST; 1485 } 1486 } 1487 1488 act = &cls->rule->action.entries[0]; 1489 1490 mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); 1491 if (!mall_tc_entry) 1492 return -ENOMEM; 1493 1494 mall_tc_entry->cookie = cls->cookie; 1495 mall_tc_entry->type = DSA_PORT_MALL_POLICER; 1496 policer = &mall_tc_entry->policer; 1497 policer->rate_bytes_per_sec = act->police.rate_bytes_ps; 1498 policer->burst = act->police.burst; 1499 1500 err = ds->ops->port_policer_add(ds, dp->index, policer); 1501 if (err) { 1502 kfree(mall_tc_entry); 1503 return err; 1504 } 1505 1506 list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); 1507 1508 return err; 1509 } 1510 1511 static int dsa_user_add_cls_matchall(struct net_device *dev, 1512 struct tc_cls_matchall_offload *cls, 1513 bool ingress) 1514 { 1515 const struct flow_action *action = &cls->rule->action; 1516 struct netlink_ext_ack *extack = cls->common.extack; 1517 1518 if (!flow_offload_has_one_action(action)) { 1519 NL_SET_ERR_MSG_MOD(extack, 1520 "Cannot offload matchall filter with more than one action"); 1521 return -EOPNOTSUPP; 1522 } 1523 1524 switch (action->entries[0].id) { 1525 case FLOW_ACTION_MIRRED: 1526 return dsa_user_add_cls_matchall_mirred(dev, cls, ingress, 1527 false); 1528 case FLOW_ACTION_MIRRED_INGRESS: 1529 return dsa_user_add_cls_matchall_mirred(dev, cls, ingress, 1530 true); 1531 case FLOW_ACTION_POLICE: 1532 return dsa_user_add_cls_matchall_police(dev, cls, ingress); 1533 default: 1534 NL_SET_ERR_MSG_MOD(extack, "Unknown action"); 1535 break; 1536 } 1537 1538 return -EOPNOTSUPP; 1539 } 1540 1541 static void dsa_user_del_cls_matchall(struct net_device *dev, 1542 struct tc_cls_matchall_offload *cls) 1543 { 1544 struct dsa_port *dp = dsa_user_to_port(dev); 1545 struct dsa_mall_tc_entry *mall_tc_entry; 1546 struct dsa_switch *ds = dp->ds; 1547 1548 mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie); 1549 if (!mall_tc_entry) 1550 return; 1551 1552 list_del(&mall_tc_entry->list); 1553 1554 switch (mall_tc_entry->type) { 1555 case DSA_PORT_MALL_MIRROR: 1556 if (ds->ops->port_mirror_del) 1557 ds->ops->port_mirror_del(ds, dp->index, 1558 &mall_tc_entry->mirror); 1559 break; 1560 case DSA_PORT_MALL_POLICER: 1561 if (ds->ops->port_policer_del) 1562 ds->ops->port_policer_del(ds, dp->index); 1563 break; 1564 default: 1565 WARN_ON(1); 1566 } 1567 1568 kfree(mall_tc_entry); 1569 } 1570 1571 static int dsa_user_setup_tc_cls_matchall(struct net_device *dev, 1572 struct tc_cls_matchall_offload *cls, 1573 bool ingress) 1574 { 1575 if (cls->common.chain_index) 1576 return -EOPNOTSUPP; 1577 1578 switch (cls->command) { 1579 case TC_CLSMATCHALL_REPLACE: 1580 return dsa_user_add_cls_matchall(dev, cls, ingress); 1581 case TC_CLSMATCHALL_DESTROY: 1582 dsa_user_del_cls_matchall(dev, cls); 1583 return 0; 1584 default: 1585 return -EOPNOTSUPP; 1586 } 1587 } 1588 1589 static int dsa_user_add_cls_flower(struct net_device *dev, 1590 struct flow_cls_offload *cls, 1591 bool ingress) 1592 { 1593 struct dsa_port *dp = dsa_user_to_port(dev); 1594 struct dsa_switch *ds = dp->ds; 1595 int port = dp->index; 1596 1597 if (!ds->ops->cls_flower_add) 1598 return -EOPNOTSUPP; 1599 1600 return ds->ops->cls_flower_add(ds, port, cls, ingress); 1601 } 1602 1603 static int dsa_user_del_cls_flower(struct net_device *dev, 1604 struct flow_cls_offload *cls, 1605 bool ingress) 1606 { 1607 struct dsa_port *dp = dsa_user_to_port(dev); 1608 struct dsa_switch *ds = dp->ds; 1609 int port = dp->index; 1610 1611 if (!ds->ops->cls_flower_del) 1612 return -EOPNOTSUPP; 1613 1614 return ds->ops->cls_flower_del(ds, port, cls, ingress); 1615 } 1616 1617 static int dsa_user_stats_cls_flower(struct net_device *dev, 1618 struct flow_cls_offload *cls, 1619 bool ingress) 1620 { 1621 struct dsa_port *dp = dsa_user_to_port(dev); 1622 struct dsa_switch *ds = dp->ds; 1623 int port = dp->index; 1624 1625 if (!ds->ops->cls_flower_stats) 1626 return -EOPNOTSUPP; 1627 1628 return ds->ops->cls_flower_stats(ds, port, cls, ingress); 1629 } 1630 1631 static int dsa_user_setup_tc_cls_flower(struct net_device *dev, 1632 struct flow_cls_offload *cls, 1633 bool ingress) 1634 { 1635 switch (cls->command) { 1636 case FLOW_CLS_REPLACE: 1637 return dsa_user_add_cls_flower(dev, cls, ingress); 1638 case FLOW_CLS_DESTROY: 1639 return dsa_user_del_cls_flower(dev, cls, ingress); 1640 case FLOW_CLS_STATS: 1641 return dsa_user_stats_cls_flower(dev, cls, ingress); 1642 default: 1643 return -EOPNOTSUPP; 1644 } 1645 } 1646 1647 static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data, 1648 void *cb_priv, bool ingress) 1649 { 1650 struct net_device *dev = cb_priv; 1651 1652 if (!tc_can_offload(dev)) 1653 return -EOPNOTSUPP; 1654 1655 switch (type) { 1656 case TC_SETUP_CLSMATCHALL: 1657 return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress); 1658 case TC_SETUP_CLSFLOWER: 1659 return dsa_user_setup_tc_cls_flower(dev, type_data, ingress); 1660 default: 1661 return -EOPNOTSUPP; 1662 } 1663 } 1664 1665 static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type, 1666 void *type_data, void *cb_priv) 1667 { 1668 return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true); 1669 } 1670 1671 static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type, 1672 void *type_data, void *cb_priv) 1673 { 1674 return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false); 1675 } 1676 1677 static LIST_HEAD(dsa_user_block_cb_list); 1678 1679 static int dsa_user_setup_tc_block(struct net_device *dev, 1680 struct flow_block_offload *f) 1681 { 1682 struct flow_block_cb *block_cb; 1683 flow_setup_cb_t *cb; 1684 1685 if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS) 1686 cb = dsa_user_setup_tc_block_cb_ig; 1687 else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS) 1688 cb = dsa_user_setup_tc_block_cb_eg; 1689 else 1690 return -EOPNOTSUPP; 1691 1692 f->driver_block_list = &dsa_user_block_cb_list; 1693 1694 switch (f->command) { 1695 case FLOW_BLOCK_BIND: 1696 if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list)) 1697 return -EBUSY; 1698 1699 block_cb = flow_block_cb_alloc(cb, dev, dev, NULL); 1700 if (IS_ERR(block_cb)) 1701 return PTR_ERR(block_cb); 1702 1703 flow_block_cb_add(block_cb, f); 1704 list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list); 1705 return 0; 1706 case FLOW_BLOCK_UNBIND: 1707 block_cb = flow_block_cb_lookup(f->block, cb, dev); 1708 if (!block_cb) 1709 return -ENOENT; 1710 1711 flow_block_cb_remove(block_cb, f); 1712 list_del(&block_cb->driver_list); 1713 return 0; 1714 default: 1715 return -EOPNOTSUPP; 1716 } 1717 } 1718 1719 static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port, 1720 void *type_data) 1721 { 1722 struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port)); 1723 1724 if (!conduit->netdev_ops->ndo_setup_tc) 1725 return -EOPNOTSUPP; 1726 1727 return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data); 1728 } 1729 1730 static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type, 1731 void *type_data) 1732 { 1733 struct dsa_port *dp = dsa_user_to_port(dev); 1734 struct dsa_switch *ds = dp->ds; 1735 1736 switch (type) { 1737 case TC_SETUP_BLOCK: 1738 return dsa_user_setup_tc_block(dev, type_data); 1739 case TC_SETUP_FT: 1740 return dsa_user_setup_ft_block(ds, dp->index, type_data); 1741 default: 1742 break; 1743 } 1744 1745 if (!ds->ops->port_setup_tc) 1746 return -EOPNOTSUPP; 1747 1748 return ds->ops->port_setup_tc(ds, dp->index, type, type_data); 1749 } 1750 1751 static int dsa_user_get_rxnfc(struct net_device *dev, 1752 struct ethtool_rxnfc *nfc, u32 *rule_locs) 1753 { 1754 struct dsa_port *dp = dsa_user_to_port(dev); 1755 struct dsa_switch *ds = dp->ds; 1756 1757 if (!ds->ops->get_rxnfc) 1758 return -EOPNOTSUPP; 1759 1760 return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs); 1761 } 1762 1763 static int dsa_user_set_rxnfc(struct net_device *dev, 1764 struct ethtool_rxnfc *nfc) 1765 { 1766 struct dsa_port *dp = dsa_user_to_port(dev); 1767 struct dsa_switch *ds = dp->ds; 1768 1769 if (!ds->ops->set_rxnfc) 1770 return -EOPNOTSUPP; 1771 1772 return ds->ops->set_rxnfc(ds, dp->index, nfc); 1773 } 1774 1775 static int dsa_user_get_ts_info(struct net_device *dev, 1776 struct kernel_ethtool_ts_info *ts) 1777 { 1778 struct dsa_user_priv *p = netdev_priv(dev); 1779 struct dsa_switch *ds = p->dp->ds; 1780 1781 if (!ds->ops->get_ts_info) 1782 return -EOPNOTSUPP; 1783 1784 return ds->ops->get_ts_info(ds, p->dp->index, ts); 1785 } 1786 1787 static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto, 1788 u16 vid) 1789 { 1790 struct dsa_port *dp = dsa_user_to_port(dev); 1791 struct switchdev_obj_port_vlan vlan = { 1792 .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, 1793 .vid = vid, 1794 /* This API only allows programming tagged, non-PVID VIDs */ 1795 .flags = 0, 1796 }; 1797 struct netlink_ext_ack extack = {0}; 1798 struct dsa_switch *ds = dp->ds; 1799 struct netdev_hw_addr *ha; 1800 struct dsa_vlan *v; 1801 int ret; 1802 1803 /* User port... */ 1804 ret = dsa_port_vlan_add(dp, &vlan, &extack); 1805 if (ret) { 1806 if (extack._msg) 1807 netdev_err(dev, "%s\n", extack._msg); 1808 return ret; 1809 } 1810 1811 /* And CPU port... */ 1812 ret = dsa_port_host_vlan_add(dp, &vlan, &extack); 1813 if (ret) { 1814 if (extack._msg) 1815 netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index, 1816 extack._msg); 1817 return ret; 1818 } 1819 1820 if (!dsa_switch_supports_uc_filtering(ds) && 1821 !dsa_switch_supports_mc_filtering(ds)) 1822 return 0; 1823 1824 v = kzalloc(sizeof(*v), GFP_KERNEL); 1825 if (!v) { 1826 ret = -ENOMEM; 1827 goto rollback; 1828 } 1829 1830 netif_addr_lock_bh(dev); 1831 1832 v->vid = vid; 1833 list_add_tail(&v->list, &dp->user_vlans); 1834 1835 if (dsa_switch_supports_mc_filtering(ds)) { 1836 netdev_for_each_synced_mc_addr(ha, dev) { 1837 dsa_user_schedule_standalone_work(dev, DSA_MC_ADD, 1838 ha->addr, vid); 1839 } 1840 } 1841 1842 if (dsa_switch_supports_uc_filtering(ds)) { 1843 netdev_for_each_synced_uc_addr(ha, dev) { 1844 dsa_user_schedule_standalone_work(dev, DSA_UC_ADD, 1845 ha->addr, vid); 1846 } 1847 } 1848 1849 netif_addr_unlock_bh(dev); 1850 1851 dsa_flush_workqueue(); 1852 1853 return 0; 1854 1855 rollback: 1856 dsa_port_host_vlan_del(dp, &vlan); 1857 dsa_port_vlan_del(dp, &vlan); 1858 1859 return ret; 1860 } 1861 1862 static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, 1863 u16 vid) 1864 { 1865 struct dsa_port *dp = dsa_user_to_port(dev); 1866 struct switchdev_obj_port_vlan vlan = { 1867 .vid = vid, 1868 /* This API only allows programming tagged, non-PVID VIDs */ 1869 .flags = 0, 1870 }; 1871 struct dsa_switch *ds = dp->ds; 1872 struct netdev_hw_addr *ha; 1873 struct dsa_vlan *v; 1874 int err; 1875 1876 err = dsa_port_vlan_del(dp, &vlan); 1877 if (err) 1878 return err; 1879 1880 err = dsa_port_host_vlan_del(dp, &vlan); 1881 if (err) 1882 return err; 1883 1884 if (!dsa_switch_supports_uc_filtering(ds) && 1885 !dsa_switch_supports_mc_filtering(ds)) 1886 return 0; 1887 1888 netif_addr_lock_bh(dev); 1889 1890 v = dsa_vlan_find(&dp->user_vlans, &vlan); 1891 if (!v) { 1892 netif_addr_unlock_bh(dev); 1893 return -ENOENT; 1894 } 1895 1896 list_del(&v->list); 1897 kfree(v); 1898 1899 if (dsa_switch_supports_mc_filtering(ds)) { 1900 netdev_for_each_synced_mc_addr(ha, dev) { 1901 dsa_user_schedule_standalone_work(dev, DSA_MC_DEL, 1902 ha->addr, vid); 1903 } 1904 } 1905 1906 if (dsa_switch_supports_uc_filtering(ds)) { 1907 netdev_for_each_synced_uc_addr(ha, dev) { 1908 dsa_user_schedule_standalone_work(dev, DSA_UC_DEL, 1909 ha->addr, vid); 1910 } 1911 } 1912 1913 netif_addr_unlock_bh(dev); 1914 1915 dsa_flush_workqueue(); 1916 1917 return 0; 1918 } 1919 1920 static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg) 1921 { 1922 __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); 1923 1924 return dsa_user_vlan_rx_add_vid(arg, proto, vid); 1925 } 1926 1927 static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg) 1928 { 1929 __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); 1930 1931 return dsa_user_vlan_rx_kill_vid(arg, proto, vid); 1932 } 1933 1934 /* Keep the VLAN RX filtering list in sync with the hardware only if VLAN 1935 * filtering is enabled. The baseline is that only ports that offload a 1936 * VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware, 1937 * but there are exceptions for quirky hardware. 1938 * 1939 * If ds->vlan_filtering_is_global = true, then standalone ports which share 1940 * the same switch with other ports that offload a VLAN-aware bridge are also 1941 * inevitably VLAN-aware. 1942 * 1943 * To summarize, a DSA switch port offloads: 1944 * 1945 * - If standalone (this includes software bridge, software LAG): 1946 * - if ds->needs_standalone_vlan_filtering = true, OR if 1947 * (ds->vlan_filtering_is_global = true AND there are bridges spanning 1948 * this switch chip which have vlan_filtering=1) 1949 * - the 8021q upper VLANs 1950 * - else (standalone VLAN filtering is not needed, VLAN filtering is not 1951 * global, or it is, but no port is under a VLAN-aware bridge): 1952 * - no VLAN (any 8021q upper is a software VLAN) 1953 * 1954 * - If under a vlan_filtering=0 bridge which it offload: 1955 * - if ds->configure_vlan_while_not_filtering = true (default): 1956 * - the bridge VLANs. These VLANs are committed to hardware but inactive. 1957 * - else (deprecated): 1958 * - no VLAN. The bridge VLANs are not restored when VLAN awareness is 1959 * enabled, so this behavior is broken and discouraged. 1960 * 1961 * - If under a vlan_filtering=1 bridge which it offload: 1962 * - the bridge VLANs 1963 * - the 8021q upper VLANs 1964 */ 1965 int dsa_user_manage_vlan_filtering(struct net_device *user, 1966 bool vlan_filtering) 1967 { 1968 int err; 1969 1970 if (vlan_filtering) { 1971 user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 1972 1973 err = vlan_for_each(user, dsa_user_restore_vlan, user); 1974 if (err) { 1975 vlan_for_each(user, dsa_user_clear_vlan, user); 1976 user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 1977 return err; 1978 } 1979 } else { 1980 err = vlan_for_each(user, dsa_user_clear_vlan, user); 1981 if (err) 1982 return err; 1983 1984 user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 1985 } 1986 1987 return 0; 1988 } 1989 1990 struct dsa_hw_port { 1991 struct list_head list; 1992 struct net_device *dev; 1993 int old_mtu; 1994 }; 1995 1996 static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu) 1997 { 1998 const struct dsa_hw_port *p; 1999 int err; 2000 2001 list_for_each_entry(p, hw_port_list, list) { 2002 if (p->dev->mtu == mtu) 2003 continue; 2004 2005 err = dev_set_mtu(p->dev, mtu); 2006 if (err) 2007 goto rollback; 2008 } 2009 2010 return 0; 2011 2012 rollback: 2013 list_for_each_entry_continue_reverse(p, hw_port_list, list) { 2014 if (p->dev->mtu == p->old_mtu) 2015 continue; 2016 2017 if (dev_set_mtu(p->dev, p->old_mtu)) 2018 netdev_err(p->dev, "Failed to restore MTU\n"); 2019 } 2020 2021 return err; 2022 } 2023 2024 static void dsa_hw_port_list_free(struct list_head *hw_port_list) 2025 { 2026 struct dsa_hw_port *p, *n; 2027 2028 list_for_each_entry_safe(p, n, hw_port_list, list) 2029 kfree(p); 2030 } 2031 2032 /* Make the hardware datapath to/from @dev limited to a common MTU */ 2033 static void dsa_bridge_mtu_normalization(struct dsa_port *dp) 2034 { 2035 struct list_head hw_port_list; 2036 struct dsa_switch_tree *dst; 2037 int min_mtu = ETH_MAX_MTU; 2038 struct dsa_port *other_dp; 2039 int err; 2040 2041 if (!dp->ds->mtu_enforcement_ingress) 2042 return; 2043 2044 if (!dp->bridge) 2045 return; 2046 2047 INIT_LIST_HEAD(&hw_port_list); 2048 2049 /* Populate the list of ports that are part of the same bridge 2050 * as the newly added/modified port 2051 */ 2052 list_for_each_entry(dst, &dsa_tree_list, list) { 2053 list_for_each_entry(other_dp, &dst->ports, list) { 2054 struct dsa_hw_port *hw_port; 2055 struct net_device *user; 2056 2057 if (other_dp->type != DSA_PORT_TYPE_USER) 2058 continue; 2059 2060 if (!dsa_port_bridge_same(dp, other_dp)) 2061 continue; 2062 2063 if (!other_dp->ds->mtu_enforcement_ingress) 2064 continue; 2065 2066 user = other_dp->user; 2067 2068 if (min_mtu > user->mtu) 2069 min_mtu = user->mtu; 2070 2071 hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL); 2072 if (!hw_port) 2073 goto out; 2074 2075 hw_port->dev = user; 2076 hw_port->old_mtu = user->mtu; 2077 2078 list_add(&hw_port->list, &hw_port_list); 2079 } 2080 } 2081 2082 /* Attempt to configure the entire hardware bridge to the newly added 2083 * interface's MTU first, regardless of whether the intention of the 2084 * user was to raise or lower it. 2085 */ 2086 err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu); 2087 if (!err) 2088 goto out; 2089 2090 /* Clearly that didn't work out so well, so just set the minimum MTU on 2091 * all hardware bridge ports now. If this fails too, then all ports will 2092 * still have their old MTU rolled back anyway. 2093 */ 2094 dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu); 2095 2096 out: 2097 dsa_hw_port_list_free(&hw_port_list); 2098 } 2099 2100 int dsa_user_change_mtu(struct net_device *dev, int new_mtu) 2101 { 2102 struct net_device *conduit = dsa_user_to_conduit(dev); 2103 struct dsa_port *dp = dsa_user_to_port(dev); 2104 struct dsa_port *cpu_dp = dp->cpu_dp; 2105 struct dsa_switch *ds = dp->ds; 2106 struct dsa_port *other_dp; 2107 int largest_mtu = 0; 2108 int new_conduit_mtu; 2109 int old_conduit_mtu; 2110 int mtu_limit; 2111 int overhead; 2112 int cpu_mtu; 2113 int err; 2114 2115 if (!ds->ops->port_change_mtu) 2116 return -EOPNOTSUPP; 2117 2118 dsa_tree_for_each_user_port(other_dp, ds->dst) { 2119 int user_mtu; 2120 2121 /* During probe, this function will be called for each user 2122 * device, while not all of them have been allocated. That's 2123 * ok, it doesn't change what the maximum is, so ignore it. 2124 */ 2125 if (!other_dp->user) 2126 continue; 2127 2128 /* Pretend that we already applied the setting, which we 2129 * actually haven't (still haven't done all integrity checks) 2130 */ 2131 if (dp == other_dp) 2132 user_mtu = new_mtu; 2133 else 2134 user_mtu = other_dp->user->mtu; 2135 2136 if (largest_mtu < user_mtu) 2137 largest_mtu = user_mtu; 2138 } 2139 2140 overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops); 2141 mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead); 2142 old_conduit_mtu = conduit->mtu; 2143 new_conduit_mtu = largest_mtu + overhead; 2144 if (new_conduit_mtu > mtu_limit) 2145 return -ERANGE; 2146 2147 /* If the conduit MTU isn't over limit, there's no need to check the CPU 2148 * MTU, since that surely isn't either. 2149 */ 2150 cpu_mtu = largest_mtu; 2151 2152 /* Start applying stuff */ 2153 if (new_conduit_mtu != old_conduit_mtu) { 2154 err = dev_set_mtu(conduit, new_conduit_mtu); 2155 if (err < 0) 2156 goto out_conduit_failed; 2157 2158 /* We only need to propagate the MTU of the CPU port to 2159 * upstream switches, so emit a notifier which updates them. 2160 */ 2161 err = dsa_port_mtu_change(cpu_dp, cpu_mtu); 2162 if (err) 2163 goto out_cpu_failed; 2164 } 2165 2166 err = ds->ops->port_change_mtu(ds, dp->index, new_mtu); 2167 if (err) 2168 goto out_port_failed; 2169 2170 WRITE_ONCE(dev->mtu, new_mtu); 2171 2172 dsa_bridge_mtu_normalization(dp); 2173 2174 return 0; 2175 2176 out_port_failed: 2177 if (new_conduit_mtu != old_conduit_mtu) 2178 dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead); 2179 out_cpu_failed: 2180 if (new_conduit_mtu != old_conduit_mtu) 2181 dev_set_mtu(conduit, old_conduit_mtu); 2182 out_conduit_failed: 2183 return err; 2184 } 2185 2186 static int __maybe_unused 2187 dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel) 2188 { 2189 struct dsa_port *dp = dsa_user_to_port(dev); 2190 struct dsa_switch *ds = dp->ds; 2191 int port = dp->index; 2192 2193 if (!ds->ops->port_set_apptrust) 2194 return -EOPNOTSUPP; 2195 2196 return ds->ops->port_set_apptrust(ds, port, sel, nsel); 2197 } 2198 2199 static int __maybe_unused 2200 dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel) 2201 { 2202 struct dsa_port *dp = dsa_user_to_port(dev); 2203 struct dsa_switch *ds = dp->ds; 2204 int port = dp->index; 2205 2206 if (!ds->ops->port_get_apptrust) 2207 return -EOPNOTSUPP; 2208 2209 return ds->ops->port_get_apptrust(ds, port, sel, nsel); 2210 } 2211 2212 static int __maybe_unused 2213 dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app) 2214 { 2215 struct dsa_port *dp = dsa_user_to_port(dev); 2216 struct dsa_switch *ds = dp->ds; 2217 unsigned long mask, new_prio; 2218 int err, port = dp->index; 2219 2220 if (!ds->ops->port_set_default_prio) 2221 return -EOPNOTSUPP; 2222 2223 err = dcb_ieee_setapp(dev, app); 2224 if (err) 2225 return err; 2226 2227 mask = dcb_ieee_getapp_mask(dev, app); 2228 new_prio = __fls(mask); 2229 2230 err = ds->ops->port_set_default_prio(ds, port, new_prio); 2231 if (err) { 2232 dcb_ieee_delapp(dev, app); 2233 return err; 2234 } 2235 2236 return 0; 2237 } 2238 2239 /* Update the DSCP prio entries on all user ports of the switch in case 2240 * the switch supports global DSCP prio instead of per port DSCP prios. 2241 */ 2242 static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev, 2243 struct dcb_app *app, bool del) 2244 { 2245 int (*setdel)(struct net_device *dev, struct dcb_app *app); 2246 struct dsa_port *dp = dsa_user_to_port(dev); 2247 struct dsa_switch *ds = dp->ds; 2248 struct dsa_port *other_dp; 2249 int err, restore_err; 2250 2251 if (del) 2252 setdel = dcb_ieee_delapp; 2253 else 2254 setdel = dcb_ieee_setapp; 2255 2256 dsa_switch_for_each_user_port(other_dp, ds) { 2257 struct net_device *user = other_dp->user; 2258 2259 if (!user || user == dev) 2260 continue; 2261 2262 err = setdel(user, app); 2263 if (err) 2264 goto err_try_to_restore; 2265 } 2266 2267 return 0; 2268 2269 err_try_to_restore: 2270 2271 /* Revert logic to restore previous state of app entries */ 2272 if (!del) 2273 setdel = dcb_ieee_delapp; 2274 else 2275 setdel = dcb_ieee_setapp; 2276 2277 dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) { 2278 struct net_device *user = other_dp->user; 2279 2280 if (!user || user == dev) 2281 continue; 2282 2283 restore_err = setdel(user, app); 2284 if (restore_err) 2285 netdev_err(user, "Failed to restore DSCP prio entry configuration\n"); 2286 } 2287 2288 return err; 2289 } 2290 2291 static int __maybe_unused 2292 dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app) 2293 { 2294 struct dsa_port *dp = dsa_user_to_port(dev); 2295 struct dsa_switch *ds = dp->ds; 2296 unsigned long mask, new_prio; 2297 int err, port = dp->index; 2298 u8 dscp = app->protocol; 2299 2300 if (!ds->ops->port_add_dscp_prio) 2301 return -EOPNOTSUPP; 2302 2303 if (dscp >= 64) { 2304 netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n", 2305 dscp); 2306 return -EINVAL; 2307 } 2308 2309 err = dcb_ieee_setapp(dev, app); 2310 if (err) 2311 return err; 2312 2313 mask = dcb_ieee_getapp_mask(dev, app); 2314 new_prio = __fls(mask); 2315 2316 err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio); 2317 if (err) { 2318 dcb_ieee_delapp(dev, app); 2319 return err; 2320 } 2321 2322 if (!ds->dscp_prio_mapping_is_global) 2323 return 0; 2324 2325 err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false); 2326 if (err) { 2327 if (ds->ops->port_del_dscp_prio) 2328 ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio); 2329 dcb_ieee_delapp(dev, app); 2330 return err; 2331 } 2332 2333 return 0; 2334 } 2335 2336 static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev, 2337 struct dcb_app *app) 2338 { 2339 switch (app->selector) { 2340 case IEEE_8021QAZ_APP_SEL_ETHERTYPE: 2341 switch (app->protocol) { 2342 case 0: 2343 return dsa_user_dcbnl_set_default_prio(dev, app); 2344 default: 2345 return -EOPNOTSUPP; 2346 } 2347 break; 2348 case IEEE_8021QAZ_APP_SEL_DSCP: 2349 return dsa_user_dcbnl_add_dscp_prio(dev, app); 2350 default: 2351 return -EOPNOTSUPP; 2352 } 2353 } 2354 2355 static int __maybe_unused 2356 dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app) 2357 { 2358 struct dsa_port *dp = dsa_user_to_port(dev); 2359 struct dsa_switch *ds = dp->ds; 2360 unsigned long mask, new_prio; 2361 int err, port = dp->index; 2362 2363 if (!ds->ops->port_set_default_prio) 2364 return -EOPNOTSUPP; 2365 2366 err = dcb_ieee_delapp(dev, app); 2367 if (err) 2368 return err; 2369 2370 mask = dcb_ieee_getapp_mask(dev, app); 2371 new_prio = mask ? __fls(mask) : 0; 2372 2373 err = ds->ops->port_set_default_prio(ds, port, new_prio); 2374 if (err) { 2375 dcb_ieee_setapp(dev, app); 2376 return err; 2377 } 2378 2379 return 0; 2380 } 2381 2382 static int __maybe_unused 2383 dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app) 2384 { 2385 struct dsa_port *dp = dsa_user_to_port(dev); 2386 struct dsa_switch *ds = dp->ds; 2387 int err, port = dp->index; 2388 u8 dscp = app->protocol; 2389 2390 if (!ds->ops->port_del_dscp_prio) 2391 return -EOPNOTSUPP; 2392 2393 err = dcb_ieee_delapp(dev, app); 2394 if (err) 2395 return err; 2396 2397 err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority); 2398 if (err) { 2399 dcb_ieee_setapp(dev, app); 2400 return err; 2401 } 2402 2403 if (!ds->dscp_prio_mapping_is_global) 2404 return 0; 2405 2406 err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true); 2407 if (err) { 2408 if (ds->ops->port_add_dscp_prio) 2409 ds->ops->port_add_dscp_prio(ds, port, dscp, 2410 app->priority); 2411 dcb_ieee_setapp(dev, app); 2412 return err; 2413 } 2414 2415 return 0; 2416 } 2417 2418 static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev, 2419 struct dcb_app *app) 2420 { 2421 switch (app->selector) { 2422 case IEEE_8021QAZ_APP_SEL_ETHERTYPE: 2423 switch (app->protocol) { 2424 case 0: 2425 return dsa_user_dcbnl_del_default_prio(dev, app); 2426 default: 2427 return -EOPNOTSUPP; 2428 } 2429 break; 2430 case IEEE_8021QAZ_APP_SEL_DSCP: 2431 return dsa_user_dcbnl_del_dscp_prio(dev, app); 2432 default: 2433 return -EOPNOTSUPP; 2434 } 2435 } 2436 2437 /* Pre-populate the DCB application priority table with the priorities 2438 * configured during switch setup, which we read from hardware here. 2439 */ 2440 static int dsa_user_dcbnl_init(struct net_device *dev) 2441 { 2442 struct dsa_port *dp = dsa_user_to_port(dev); 2443 struct dsa_switch *ds = dp->ds; 2444 int port = dp->index; 2445 int err; 2446 2447 if (ds->ops->port_get_default_prio) { 2448 int prio = ds->ops->port_get_default_prio(ds, port); 2449 struct dcb_app app = { 2450 .selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE, 2451 .protocol = 0, 2452 .priority = prio, 2453 }; 2454 2455 if (prio < 0) 2456 return prio; 2457 2458 err = dcb_ieee_setapp(dev, &app); 2459 if (err) 2460 return err; 2461 } 2462 2463 if (ds->ops->port_get_dscp_prio) { 2464 int protocol; 2465 2466 for (protocol = 0; protocol < 64; protocol++) { 2467 struct dcb_app app = { 2468 .selector = IEEE_8021QAZ_APP_SEL_DSCP, 2469 .protocol = protocol, 2470 }; 2471 int prio; 2472 2473 prio = ds->ops->port_get_dscp_prio(ds, port, protocol); 2474 if (prio == -EOPNOTSUPP) 2475 continue; 2476 if (prio < 0) 2477 return prio; 2478 2479 app.priority = prio; 2480 2481 err = dcb_ieee_setapp(dev, &app); 2482 if (err) 2483 return err; 2484 } 2485 } 2486 2487 return 0; 2488 } 2489 2490 static const struct ethtool_ops dsa_user_ethtool_ops = { 2491 .get_drvinfo = dsa_user_get_drvinfo, 2492 .get_regs_len = dsa_user_get_regs_len, 2493 .get_regs = dsa_user_get_regs, 2494 .nway_reset = dsa_user_nway_reset, 2495 .get_link = ethtool_op_get_link, 2496 .get_eeprom_len = dsa_user_get_eeprom_len, 2497 .get_eeprom = dsa_user_get_eeprom, 2498 .set_eeprom = dsa_user_set_eeprom, 2499 .get_strings = dsa_user_get_strings, 2500 .get_ethtool_stats = dsa_user_get_ethtool_stats, 2501 .get_sset_count = dsa_user_get_sset_count, 2502 .get_eth_phy_stats = dsa_user_get_eth_phy_stats, 2503 .get_eth_mac_stats = dsa_user_get_eth_mac_stats, 2504 .get_eth_ctrl_stats = dsa_user_get_eth_ctrl_stats, 2505 .get_rmon_stats = dsa_user_get_rmon_stats, 2506 .set_wol = dsa_user_set_wol, 2507 .get_wol = dsa_user_get_wol, 2508 .set_eee = dsa_user_set_eee, 2509 .get_eee = dsa_user_get_eee, 2510 .get_link_ksettings = dsa_user_get_link_ksettings, 2511 .set_link_ksettings = dsa_user_set_link_ksettings, 2512 .get_pause_stats = dsa_user_get_pause_stats, 2513 .get_pauseparam = dsa_user_get_pauseparam, 2514 .set_pauseparam = dsa_user_set_pauseparam, 2515 .get_rxnfc = dsa_user_get_rxnfc, 2516 .set_rxnfc = dsa_user_set_rxnfc, 2517 .get_ts_info = dsa_user_get_ts_info, 2518 .self_test = dsa_user_net_selftest, 2519 .get_mm = dsa_user_get_mm, 2520 .set_mm = dsa_user_set_mm, 2521 .get_mm_stats = dsa_user_get_mm_stats, 2522 }; 2523 2524 static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = { 2525 .ieee_setapp = dsa_user_dcbnl_ieee_setapp, 2526 .ieee_delapp = dsa_user_dcbnl_ieee_delapp, 2527 .dcbnl_setapptrust = dsa_user_dcbnl_set_apptrust, 2528 .dcbnl_getapptrust = dsa_user_dcbnl_get_apptrust, 2529 }; 2530 2531 static void dsa_user_get_stats64(struct net_device *dev, 2532 struct rtnl_link_stats64 *s) 2533 { 2534 struct dsa_port *dp = dsa_user_to_port(dev); 2535 struct dsa_switch *ds = dp->ds; 2536 2537 if (ds->ops->get_stats64) 2538 ds->ops->get_stats64(ds, dp->index, s); 2539 else 2540 dev_get_tstats64(dev, s); 2541 } 2542 2543 static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx, 2544 struct net_device_path *path) 2545 { 2546 struct dsa_port *dp = dsa_user_to_port(ctx->dev); 2547 struct net_device *conduit = dsa_port_to_conduit(dp); 2548 struct dsa_port *cpu_dp = dp->cpu_dp; 2549 2550 path->dev = ctx->dev; 2551 path->type = DEV_PATH_DSA; 2552 path->dsa.proto = cpu_dp->tag_ops->proto; 2553 path->dsa.port = dp->index; 2554 ctx->dev = conduit; 2555 2556 return 0; 2557 } 2558 2559 static const struct net_device_ops dsa_user_netdev_ops = { 2560 .ndo_open = dsa_user_open, 2561 .ndo_stop = dsa_user_close, 2562 .ndo_start_xmit = dsa_user_xmit, 2563 .ndo_change_rx_flags = dsa_user_change_rx_flags, 2564 .ndo_set_rx_mode = dsa_user_set_rx_mode, 2565 .ndo_set_mac_address = dsa_user_set_mac_address, 2566 .ndo_fdb_dump = dsa_user_fdb_dump, 2567 .ndo_eth_ioctl = dsa_user_ioctl, 2568 .ndo_get_iflink = dsa_user_get_iflink, 2569 #ifdef CONFIG_NET_POLL_CONTROLLER 2570 .ndo_netpoll_setup = dsa_user_netpoll_setup, 2571 .ndo_netpoll_cleanup = dsa_user_netpoll_cleanup, 2572 .ndo_poll_controller = dsa_user_poll_controller, 2573 #endif 2574 .ndo_setup_tc = dsa_user_setup_tc, 2575 .ndo_get_stats64 = dsa_user_get_stats64, 2576 .ndo_vlan_rx_add_vid = dsa_user_vlan_rx_add_vid, 2577 .ndo_vlan_rx_kill_vid = dsa_user_vlan_rx_kill_vid, 2578 .ndo_change_mtu = dsa_user_change_mtu, 2579 .ndo_fill_forward_path = dsa_user_fill_forward_path, 2580 }; 2581 2582 static const struct device_type dsa_type = { 2583 .name = "dsa", 2584 }; 2585 2586 void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up) 2587 { 2588 const struct dsa_port *dp = dsa_to_port(ds, port); 2589 2590 if (dp->pl) 2591 phylink_mac_change(dp->pl, up); 2592 } 2593 EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change); 2594 2595 static void dsa_user_phylink_fixed_state(struct phylink_config *config, 2596 struct phylink_link_state *state) 2597 { 2598 struct dsa_port *dp = dsa_phylink_to_port(config); 2599 struct dsa_switch *ds = dp->ds; 2600 2601 /* No need to check that this operation is valid, the callback would 2602 * not be called if it was not. 2603 */ 2604 ds->ops->phylink_fixed_state(ds, dp->index, state); 2605 } 2606 2607 /* user device setup *******************************************************/ 2608 static int dsa_user_phy_connect(struct net_device *user_dev, int addr, 2609 u32 flags) 2610 { 2611 struct dsa_port *dp = dsa_user_to_port(user_dev); 2612 struct dsa_switch *ds = dp->ds; 2613 2614 user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr); 2615 if (!user_dev->phydev) { 2616 netdev_err(user_dev, "no phy at %d\n", addr); 2617 return -ENODEV; 2618 } 2619 2620 user_dev->phydev->dev_flags |= flags; 2621 2622 return phylink_connect_phy(dp->pl, user_dev->phydev); 2623 } 2624 2625 static int dsa_user_phy_setup(struct net_device *user_dev) 2626 { 2627 struct dsa_port *dp = dsa_user_to_port(user_dev); 2628 struct device_node *port_dn = dp->dn; 2629 struct dsa_switch *ds = dp->ds; 2630 u32 phy_flags = 0; 2631 int ret; 2632 2633 dp->pl_config.dev = &user_dev->dev; 2634 dp->pl_config.type = PHYLINK_NETDEV; 2635 2636 /* The get_fixed_state callback takes precedence over polling the 2637 * link GPIO in PHYLINK (see phylink_get_fixed_state). Only set 2638 * this if the switch provides such a callback. 2639 */ 2640 if (ds->ops->phylink_fixed_state) { 2641 dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state; 2642 dp->pl_config.poll_fixed_state = true; 2643 } 2644 2645 ret = dsa_port_phylink_create(dp); 2646 if (ret) 2647 return ret; 2648 2649 if (ds->ops->get_phy_flags) 2650 phy_flags = ds->ops->get_phy_flags(ds, dp->index); 2651 2652 ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags); 2653 if (ret == -ENODEV && ds->user_mii_bus) { 2654 /* We could not connect to a designated PHY or SFP, so try to 2655 * use the switch internal MDIO bus instead 2656 */ 2657 ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags); 2658 } 2659 if (ret) { 2660 netdev_err(user_dev, "failed to connect to PHY: %pe\n", 2661 ERR_PTR(ret)); 2662 dsa_port_phylink_destroy(dp); 2663 } 2664 2665 return ret; 2666 } 2667 2668 void dsa_user_setup_tagger(struct net_device *user) 2669 { 2670 struct dsa_port *dp = dsa_user_to_port(user); 2671 struct net_device *conduit = dsa_port_to_conduit(dp); 2672 struct dsa_user_priv *p = netdev_priv(user); 2673 const struct dsa_port *cpu_dp = dp->cpu_dp; 2674 const struct dsa_switch *ds = dp->ds; 2675 2676 user->needed_headroom = cpu_dp->tag_ops->needed_headroom; 2677 user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom; 2678 /* Try to save one extra realloc later in the TX path (in the conduit) 2679 * by also inheriting the conduit's needed headroom and tailroom. 2680 * The 8021q driver also does this. 2681 */ 2682 user->needed_headroom += conduit->needed_headroom; 2683 user->needed_tailroom += conduit->needed_tailroom; 2684 2685 p->xmit = cpu_dp->tag_ops->xmit; 2686 2687 user->features = conduit->vlan_features | NETIF_F_HW_TC; 2688 user->hw_features |= NETIF_F_HW_TC; 2689 if (user->needed_tailroom) 2690 user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST); 2691 if (ds->needs_standalone_vlan_filtering) 2692 user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 2693 2694 user->lltx = true; 2695 } 2696 2697 int dsa_user_suspend(struct net_device *user_dev) 2698 { 2699 struct dsa_port *dp = dsa_user_to_port(user_dev); 2700 2701 if (!netif_running(user_dev)) 2702 return 0; 2703 2704 netif_device_detach(user_dev); 2705 2706 rtnl_lock(); 2707 phylink_stop(dp->pl); 2708 rtnl_unlock(); 2709 2710 return 0; 2711 } 2712 2713 int dsa_user_resume(struct net_device *user_dev) 2714 { 2715 struct dsa_port *dp = dsa_user_to_port(user_dev); 2716 2717 if (!netif_running(user_dev)) 2718 return 0; 2719 2720 netif_device_attach(user_dev); 2721 2722 rtnl_lock(); 2723 phylink_start(dp->pl); 2724 rtnl_unlock(); 2725 2726 return 0; 2727 } 2728 2729 int dsa_user_create(struct dsa_port *port) 2730 { 2731 struct net_device *conduit = dsa_port_to_conduit(port); 2732 struct dsa_switch *ds = port->ds; 2733 struct net_device *user_dev; 2734 struct dsa_user_priv *p; 2735 const char *name; 2736 int assign_type; 2737 int ret; 2738 2739 if (!ds->num_tx_queues) 2740 ds->num_tx_queues = 1; 2741 2742 if (port->name) { 2743 name = port->name; 2744 assign_type = NET_NAME_PREDICTABLE; 2745 } else { 2746 name = "eth%d"; 2747 assign_type = NET_NAME_ENUM; 2748 } 2749 2750 user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name, 2751 assign_type, ether_setup, 2752 ds->num_tx_queues, 1); 2753 if (user_dev == NULL) 2754 return -ENOMEM; 2755 2756 user_dev->rtnl_link_ops = &dsa_link_ops; 2757 user_dev->ethtool_ops = &dsa_user_ethtool_ops; 2758 #if IS_ENABLED(CONFIG_DCB) 2759 user_dev->dcbnl_ops = &dsa_user_dcbnl_ops; 2760 #endif 2761 if (!is_zero_ether_addr(port->mac)) 2762 eth_hw_addr_set(user_dev, port->mac); 2763 else 2764 eth_hw_addr_inherit(user_dev, conduit); 2765 user_dev->priv_flags |= IFF_NO_QUEUE; 2766 if (dsa_switch_supports_uc_filtering(ds)) 2767 user_dev->priv_flags |= IFF_UNICAST_FLT; 2768 user_dev->netdev_ops = &dsa_user_netdev_ops; 2769 if (ds->ops->port_max_mtu) 2770 user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index); 2771 SET_NETDEV_DEVTYPE(user_dev, &dsa_type); 2772 2773 SET_NETDEV_DEV(user_dev, port->ds->dev); 2774 SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port); 2775 user_dev->dev.of_node = port->dn; 2776 user_dev->vlan_features = conduit->vlan_features; 2777 2778 p = netdev_priv(user_dev); 2779 user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS; 2780 2781 ret = gro_cells_init(&p->gcells, user_dev); 2782 if (ret) 2783 goto out_free; 2784 2785 p->dp = port; 2786 INIT_LIST_HEAD(&p->mall_tc_list); 2787 port->user = user_dev; 2788 dsa_user_setup_tagger(user_dev); 2789 2790 netif_carrier_off(user_dev); 2791 2792 ret = dsa_user_phy_setup(user_dev); 2793 if (ret) { 2794 netdev_err(user_dev, 2795 "error %d setting up PHY for tree %d, switch %d, port %d\n", 2796 ret, ds->dst->index, ds->index, port->index); 2797 goto out_gcells; 2798 } 2799 2800 rtnl_lock(); 2801 2802 ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN); 2803 if (ret && ret != -EOPNOTSUPP) 2804 dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n", 2805 ret, ETH_DATA_LEN, port->index); 2806 2807 ret = register_netdevice(user_dev); 2808 if (ret) { 2809 netdev_err(conduit, "error %d registering interface %s\n", 2810 ret, user_dev->name); 2811 rtnl_unlock(); 2812 goto out_phy; 2813 } 2814 2815 if (IS_ENABLED(CONFIG_DCB)) { 2816 ret = dsa_user_dcbnl_init(user_dev); 2817 if (ret) { 2818 netdev_err(user_dev, 2819 "failed to initialize DCB: %pe\n", 2820 ERR_PTR(ret)); 2821 rtnl_unlock(); 2822 goto out_unregister; 2823 } 2824 } 2825 2826 ret = netdev_upper_dev_link(conduit, user_dev, NULL); 2827 2828 rtnl_unlock(); 2829 2830 if (ret) 2831 goto out_unregister; 2832 2833 return 0; 2834 2835 out_unregister: 2836 unregister_netdev(user_dev); 2837 out_phy: 2838 rtnl_lock(); 2839 phylink_disconnect_phy(p->dp->pl); 2840 rtnl_unlock(); 2841 dsa_port_phylink_destroy(p->dp); 2842 out_gcells: 2843 gro_cells_destroy(&p->gcells); 2844 out_free: 2845 free_netdev(user_dev); 2846 port->user = NULL; 2847 return ret; 2848 } 2849 2850 void dsa_user_destroy(struct net_device *user_dev) 2851 { 2852 struct net_device *conduit = dsa_user_to_conduit(user_dev); 2853 struct dsa_port *dp = dsa_user_to_port(user_dev); 2854 struct dsa_user_priv *p = netdev_priv(user_dev); 2855 2856 netif_carrier_off(user_dev); 2857 rtnl_lock(); 2858 netdev_upper_dev_unlink(conduit, user_dev); 2859 unregister_netdevice(user_dev); 2860 phylink_disconnect_phy(dp->pl); 2861 rtnl_unlock(); 2862 2863 dsa_port_phylink_destroy(dp); 2864 gro_cells_destroy(&p->gcells); 2865 free_netdev(user_dev); 2866 } 2867 2868 int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit, 2869 struct netlink_ext_ack *extack) 2870 { 2871 struct net_device *old_conduit = dsa_user_to_conduit(dev); 2872 struct dsa_port *dp = dsa_user_to_port(dev); 2873 struct dsa_switch *ds = dp->ds; 2874 struct net_device *upper; 2875 struct list_head *iter; 2876 int err; 2877 2878 if (conduit == old_conduit) 2879 return 0; 2880 2881 if (!ds->ops->port_change_conduit) { 2882 NL_SET_ERR_MSG_MOD(extack, 2883 "Driver does not support changing DSA conduit"); 2884 return -EOPNOTSUPP; 2885 } 2886 2887 if (!netdev_uses_dsa(conduit)) { 2888 NL_SET_ERR_MSG_MOD(extack, 2889 "Interface not eligible as DSA conduit"); 2890 return -EOPNOTSUPP; 2891 } 2892 2893 netdev_for_each_upper_dev_rcu(conduit, upper, iter) { 2894 if (dsa_user_dev_check(upper)) 2895 continue; 2896 if (netif_is_bridge_master(upper)) 2897 continue; 2898 NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers"); 2899 return -EOPNOTSUPP; 2900 } 2901 2902 /* Since we allow live-changing the DSA conduit, plus we auto-open the 2903 * DSA conduit when the user port opens => we need to ensure that the 2904 * new DSA conduit is open too. 2905 */ 2906 if (dev->flags & IFF_UP) { 2907 err = dev_open(conduit, extack); 2908 if (err) 2909 return err; 2910 } 2911 2912 netdev_upper_dev_unlink(old_conduit, dev); 2913 2914 err = netdev_upper_dev_link(conduit, dev, extack); 2915 if (err) 2916 goto out_revert_old_conduit_unlink; 2917 2918 err = dsa_port_change_conduit(dp, conduit, extack); 2919 if (err) 2920 goto out_revert_conduit_link; 2921 2922 /* Update the MTU of the new CPU port through cross-chip notifiers */ 2923 err = dsa_user_change_mtu(dev, dev->mtu); 2924 if (err && err != -EOPNOTSUPP) { 2925 netdev_warn(dev, 2926 "nonfatal error updating MTU with new conduit: %pe\n", 2927 ERR_PTR(err)); 2928 } 2929 2930 return 0; 2931 2932 out_revert_conduit_link: 2933 netdev_upper_dev_unlink(conduit, dev); 2934 out_revert_old_conduit_unlink: 2935 netdev_upper_dev_link(old_conduit, dev, NULL); 2936 return err; 2937 } 2938 2939 bool dsa_user_dev_check(const struct net_device *dev) 2940 { 2941 return dev->netdev_ops == &dsa_user_netdev_ops; 2942 } 2943 EXPORT_SYMBOL_GPL(dsa_user_dev_check); 2944 2945 static int dsa_user_changeupper(struct net_device *dev, 2946 struct netdev_notifier_changeupper_info *info) 2947 { 2948 struct netlink_ext_ack *extack; 2949 int err = NOTIFY_DONE; 2950 struct dsa_port *dp; 2951 2952 if (!dsa_user_dev_check(dev)) 2953 return err; 2954 2955 dp = dsa_user_to_port(dev); 2956 extack = netdev_notifier_info_to_extack(&info->info); 2957 2958 if (netif_is_bridge_master(info->upper_dev)) { 2959 if (info->linking) { 2960 err = dsa_port_bridge_join(dp, info->upper_dev, extack); 2961 if (!err) 2962 dsa_bridge_mtu_normalization(dp); 2963 if (err == -EOPNOTSUPP) { 2964 NL_SET_ERR_MSG_WEAK_MOD(extack, 2965 "Offloading not supported"); 2966 err = 0; 2967 } 2968 err = notifier_from_errno(err); 2969 } else { 2970 dsa_port_bridge_leave(dp, info->upper_dev); 2971 err = NOTIFY_OK; 2972 } 2973 } else if (netif_is_lag_master(info->upper_dev)) { 2974 if (info->linking) { 2975 err = dsa_port_lag_join(dp, info->upper_dev, 2976 info->upper_info, extack); 2977 if (err == -EOPNOTSUPP) { 2978 NL_SET_ERR_MSG_WEAK_MOD(extack, 2979 "Offloading not supported"); 2980 err = 0; 2981 } 2982 err = notifier_from_errno(err); 2983 } else { 2984 dsa_port_lag_leave(dp, info->upper_dev); 2985 err = NOTIFY_OK; 2986 } 2987 } else if (is_hsr_master(info->upper_dev)) { 2988 if (info->linking) { 2989 err = dsa_port_hsr_join(dp, info->upper_dev, extack); 2990 if (err == -EOPNOTSUPP) { 2991 NL_SET_ERR_MSG_WEAK_MOD(extack, 2992 "Offloading not supported"); 2993 err = 0; 2994 } 2995 err = notifier_from_errno(err); 2996 } else { 2997 dsa_port_hsr_leave(dp, info->upper_dev); 2998 err = NOTIFY_OK; 2999 } 3000 } 3001 3002 return err; 3003 } 3004 3005 static int dsa_user_prechangeupper(struct net_device *dev, 3006 struct netdev_notifier_changeupper_info *info) 3007 { 3008 struct dsa_port *dp; 3009 3010 if (!dsa_user_dev_check(dev)) 3011 return NOTIFY_DONE; 3012 3013 dp = dsa_user_to_port(dev); 3014 3015 if (netif_is_bridge_master(info->upper_dev) && !info->linking) 3016 dsa_port_pre_bridge_leave(dp, info->upper_dev); 3017 else if (netif_is_lag_master(info->upper_dev) && !info->linking) 3018 dsa_port_pre_lag_leave(dp, info->upper_dev); 3019 /* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot 3020 * meaningfully placed under a bridge yet 3021 */ 3022 3023 return NOTIFY_DONE; 3024 } 3025 3026 static int 3027 dsa_user_lag_changeupper(struct net_device *dev, 3028 struct netdev_notifier_changeupper_info *info) 3029 { 3030 struct net_device *lower; 3031 struct list_head *iter; 3032 int err = NOTIFY_DONE; 3033 struct dsa_port *dp; 3034 3035 if (!netif_is_lag_master(dev)) 3036 return err; 3037 3038 netdev_for_each_lower_dev(dev, lower, iter) { 3039 if (!dsa_user_dev_check(lower)) 3040 continue; 3041 3042 dp = dsa_user_to_port(lower); 3043 if (!dp->lag) 3044 /* Software LAG */ 3045 continue; 3046 3047 err = dsa_user_changeupper(lower, info); 3048 if (notifier_to_errno(err)) 3049 break; 3050 } 3051 3052 return err; 3053 } 3054 3055 /* Same as dsa_user_lag_changeupper() except that it calls 3056 * dsa_user_prechangeupper() 3057 */ 3058 static int 3059 dsa_user_lag_prechangeupper(struct net_device *dev, 3060 struct netdev_notifier_changeupper_info *info) 3061 { 3062 struct net_device *lower; 3063 struct list_head *iter; 3064 int err = NOTIFY_DONE; 3065 struct dsa_port *dp; 3066 3067 if (!netif_is_lag_master(dev)) 3068 return err; 3069 3070 netdev_for_each_lower_dev(dev, lower, iter) { 3071 if (!dsa_user_dev_check(lower)) 3072 continue; 3073 3074 dp = dsa_user_to_port(lower); 3075 if (!dp->lag) 3076 /* Software LAG */ 3077 continue; 3078 3079 err = dsa_user_prechangeupper(lower, info); 3080 if (notifier_to_errno(err)) 3081 break; 3082 } 3083 3084 return err; 3085 } 3086 3087 static int 3088 dsa_prevent_bridging_8021q_upper(struct net_device *dev, 3089 struct netdev_notifier_changeupper_info *info) 3090 { 3091 struct netlink_ext_ack *ext_ack; 3092 struct net_device *user, *br; 3093 struct dsa_port *dp; 3094 3095 ext_ack = netdev_notifier_info_to_extack(&info->info); 3096 3097 if (!is_vlan_dev(dev)) 3098 return NOTIFY_DONE; 3099 3100 user = vlan_dev_real_dev(dev); 3101 if (!dsa_user_dev_check(user)) 3102 return NOTIFY_DONE; 3103 3104 dp = dsa_user_to_port(user); 3105 br = dsa_port_bridge_dev_get(dp); 3106 if (!br) 3107 return NOTIFY_DONE; 3108 3109 /* Deny enslaving a VLAN device into a VLAN-aware bridge */ 3110 if (br_vlan_enabled(br) && 3111 netif_is_bridge_master(info->upper_dev) && info->linking) { 3112 NL_SET_ERR_MSG_MOD(ext_ack, 3113 "Cannot make VLAN device join VLAN-aware bridge"); 3114 return notifier_from_errno(-EINVAL); 3115 } 3116 3117 return NOTIFY_DONE; 3118 } 3119 3120 static int 3121 dsa_user_check_8021q_upper(struct net_device *dev, 3122 struct netdev_notifier_changeupper_info *info) 3123 { 3124 struct dsa_port *dp = dsa_user_to_port(dev); 3125 struct net_device *br = dsa_port_bridge_dev_get(dp); 3126 struct bridge_vlan_info br_info; 3127 struct netlink_ext_ack *extack; 3128 int err = NOTIFY_DONE; 3129 u16 vid; 3130 3131 if (!br || !br_vlan_enabled(br)) 3132 return NOTIFY_DONE; 3133 3134 extack = netdev_notifier_info_to_extack(&info->info); 3135 vid = vlan_dev_vlan_id(info->upper_dev); 3136 3137 /* br_vlan_get_info() returns -EINVAL or -ENOENT if the 3138 * device, respectively the VID is not found, returning 3139 * 0 means success, which is a failure for us here. 3140 */ 3141 err = br_vlan_get_info(br, vid, &br_info); 3142 if (err == 0) { 3143 NL_SET_ERR_MSG_MOD(extack, 3144 "This VLAN is already configured by the bridge"); 3145 return notifier_from_errno(-EBUSY); 3146 } 3147 3148 return NOTIFY_DONE; 3149 } 3150 3151 static int 3152 dsa_user_prechangeupper_sanity_check(struct net_device *dev, 3153 struct netdev_notifier_changeupper_info *info) 3154 { 3155 struct dsa_switch *ds; 3156 struct dsa_port *dp; 3157 int err; 3158 3159 if (!dsa_user_dev_check(dev)) 3160 return dsa_prevent_bridging_8021q_upper(dev, info); 3161 3162 dp = dsa_user_to_port(dev); 3163 ds = dp->ds; 3164 3165 if (ds->ops->port_prechangeupper) { 3166 err = ds->ops->port_prechangeupper(ds, dp->index, info); 3167 if (err) 3168 return notifier_from_errno(err); 3169 } 3170 3171 if (is_vlan_dev(info->upper_dev)) 3172 return dsa_user_check_8021q_upper(dev, info); 3173 3174 return NOTIFY_DONE; 3175 } 3176 3177 /* To be eligible as a DSA conduit, a LAG must have all lower interfaces be 3178 * eligible DSA conduits. Additionally, all LAG slaves must be DSA conduits of 3179 * switches in the same switch tree. 3180 */ 3181 static int dsa_lag_conduit_validate(struct net_device *lag_dev, 3182 struct netlink_ext_ack *extack) 3183 { 3184 struct net_device *lower1, *lower2; 3185 struct list_head *iter1, *iter2; 3186 3187 netdev_for_each_lower_dev(lag_dev, lower1, iter1) { 3188 netdev_for_each_lower_dev(lag_dev, lower2, iter2) { 3189 if (!netdev_uses_dsa(lower1) || 3190 !netdev_uses_dsa(lower2)) { 3191 NL_SET_ERR_MSG_MOD(extack, 3192 "All LAG ports must be eligible as DSA conduits"); 3193 return notifier_from_errno(-EINVAL); 3194 } 3195 3196 if (lower1 == lower2) 3197 continue; 3198 3199 if (!dsa_port_tree_same(lower1->dsa_ptr, 3200 lower2->dsa_ptr)) { 3201 NL_SET_ERR_MSG_MOD(extack, 3202 "LAG contains DSA conduits of disjoint switch trees"); 3203 return notifier_from_errno(-EINVAL); 3204 } 3205 } 3206 } 3207 3208 return NOTIFY_DONE; 3209 } 3210 3211 static int 3212 dsa_conduit_prechangeupper_sanity_check(struct net_device *conduit, 3213 struct netdev_notifier_changeupper_info *info) 3214 { 3215 struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info); 3216 3217 if (!netdev_uses_dsa(conduit)) 3218 return NOTIFY_DONE; 3219 3220 if (!info->linking) 3221 return NOTIFY_DONE; 3222 3223 /* Allow DSA switch uppers */ 3224 if (dsa_user_dev_check(info->upper_dev)) 3225 return NOTIFY_DONE; 3226 3227 /* Allow bridge uppers of DSA conduits, subject to further 3228 * restrictions in dsa_bridge_prechangelower_sanity_check() 3229 */ 3230 if (netif_is_bridge_master(info->upper_dev)) 3231 return NOTIFY_DONE; 3232 3233 /* Allow LAG uppers, subject to further restrictions in 3234 * dsa_lag_conduit_prechangelower_sanity_check() 3235 */ 3236 if (netif_is_lag_master(info->upper_dev)) 3237 return dsa_lag_conduit_validate(info->upper_dev, extack); 3238 3239 NL_SET_ERR_MSG_MOD(extack, 3240 "DSA conduit cannot join unknown upper interfaces"); 3241 return notifier_from_errno(-EBUSY); 3242 } 3243 3244 static int 3245 dsa_lag_conduit_prechangelower_sanity_check(struct net_device *dev, 3246 struct netdev_notifier_changeupper_info *info) 3247 { 3248 struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info); 3249 struct net_device *lag_dev = info->upper_dev; 3250 struct net_device *lower; 3251 struct list_head *iter; 3252 3253 if (!netdev_uses_dsa(lag_dev) || !netif_is_lag_master(lag_dev)) 3254 return NOTIFY_DONE; 3255 3256 if (!info->linking) 3257 return NOTIFY_DONE; 3258 3259 if (!netdev_uses_dsa(dev)) { 3260 NL_SET_ERR_MSG(extack, 3261 "Only DSA conduits can join a LAG DSA conduit"); 3262 return notifier_from_errno(-EINVAL); 3263 } 3264 3265 netdev_for_each_lower_dev(lag_dev, lower, iter) { 3266 if (!dsa_port_tree_same(dev->dsa_ptr, lower->dsa_ptr)) { 3267 NL_SET_ERR_MSG(extack, 3268 "Interface is DSA conduit for a different switch tree than this LAG"); 3269 return notifier_from_errno(-EINVAL); 3270 } 3271 3272 break; 3273 } 3274 3275 return NOTIFY_DONE; 3276 } 3277 3278 /* Don't allow bridging of DSA conduits, since the bridge layer rx_handler 3279 * prevents the DSA fake ethertype handler to be invoked, so we don't get the 3280 * chance to strip off and parse the DSA switch tag protocol header (the bridge 3281 * layer just returns RX_HANDLER_CONSUMED, stopping RX processing for these 3282 * frames). 3283 * The only case where that would not be an issue is when bridging can already 3284 * be offloaded, such as when the DSA conduit is itself a DSA or plain switchdev 3285 * port, and is bridged only with other ports from the same hardware device. 3286 */ 3287 static int 3288 dsa_bridge_prechangelower_sanity_check(struct net_device *new_lower, 3289 struct netdev_notifier_changeupper_info *info) 3290 { 3291 struct net_device *br = info->upper_dev; 3292 struct netlink_ext_ack *extack; 3293 struct net_device *lower; 3294 struct list_head *iter; 3295 3296 if (!netif_is_bridge_master(br)) 3297 return NOTIFY_DONE; 3298 3299 if (!info->linking) 3300 return NOTIFY_DONE; 3301 3302 extack = netdev_notifier_info_to_extack(&info->info); 3303 3304 netdev_for_each_lower_dev(br, lower, iter) { 3305 if (!netdev_uses_dsa(new_lower) && !netdev_uses_dsa(lower)) 3306 continue; 3307 3308 if (!netdev_port_same_parent_id(lower, new_lower)) { 3309 NL_SET_ERR_MSG(extack, 3310 "Cannot do software bridging with a DSA conduit"); 3311 return notifier_from_errno(-EINVAL); 3312 } 3313 } 3314 3315 return NOTIFY_DONE; 3316 } 3317 3318 static void dsa_tree_migrate_ports_from_lag_conduit(struct dsa_switch_tree *dst, 3319 struct net_device *lag_dev) 3320 { 3321 struct net_device *new_conduit = dsa_tree_find_first_conduit(dst); 3322 struct dsa_port *dp; 3323 int err; 3324 3325 dsa_tree_for_each_user_port(dp, dst) { 3326 if (dsa_port_to_conduit(dp) != lag_dev) 3327 continue; 3328 3329 err = dsa_user_change_conduit(dp->user, new_conduit, NULL); 3330 if (err) { 3331 netdev_err(dp->user, 3332 "failed to restore conduit to %s: %pe\n", 3333 new_conduit->name, ERR_PTR(err)); 3334 } 3335 } 3336 } 3337 3338 static int dsa_conduit_lag_join(struct net_device *conduit, 3339 struct net_device *lag_dev, 3340 struct netdev_lag_upper_info *uinfo, 3341 struct netlink_ext_ack *extack) 3342 { 3343 struct dsa_port *cpu_dp = conduit->dsa_ptr; 3344 struct dsa_switch_tree *dst = cpu_dp->dst; 3345 struct dsa_port *dp; 3346 int err; 3347 3348 err = dsa_conduit_lag_setup(lag_dev, cpu_dp, uinfo, extack); 3349 if (err) 3350 return err; 3351 3352 dsa_tree_for_each_user_port(dp, dst) { 3353 if (dsa_port_to_conduit(dp) != conduit) 3354 continue; 3355 3356 err = dsa_user_change_conduit(dp->user, lag_dev, extack); 3357 if (err) 3358 goto restore; 3359 } 3360 3361 return 0; 3362 3363 restore: 3364 dsa_tree_for_each_user_port_continue_reverse(dp, dst) { 3365 if (dsa_port_to_conduit(dp) != lag_dev) 3366 continue; 3367 3368 err = dsa_user_change_conduit(dp->user, conduit, NULL); 3369 if (err) { 3370 netdev_err(dp->user, 3371 "failed to restore conduit to %s: %pe\n", 3372 conduit->name, ERR_PTR(err)); 3373 } 3374 } 3375 3376 dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr); 3377 3378 return err; 3379 } 3380 3381 static void dsa_conduit_lag_leave(struct net_device *conduit, 3382 struct net_device *lag_dev) 3383 { 3384 struct dsa_port *dp, *cpu_dp = lag_dev->dsa_ptr; 3385 struct dsa_switch_tree *dst = cpu_dp->dst; 3386 struct dsa_port *new_cpu_dp = NULL; 3387 struct net_device *lower; 3388 struct list_head *iter; 3389 3390 netdev_for_each_lower_dev(lag_dev, lower, iter) { 3391 if (netdev_uses_dsa(lower)) { 3392 new_cpu_dp = lower->dsa_ptr; 3393 break; 3394 } 3395 } 3396 3397 if (new_cpu_dp) { 3398 /* Update the CPU port of the user ports still under the LAG 3399 * so that dsa_port_to_conduit() continues to work properly 3400 */ 3401 dsa_tree_for_each_user_port(dp, dst) 3402 if (dsa_port_to_conduit(dp) == lag_dev) 3403 dp->cpu_dp = new_cpu_dp; 3404 3405 /* Update the index of the virtual CPU port to match the lowest 3406 * physical CPU port 3407 */ 3408 lag_dev->dsa_ptr = new_cpu_dp; 3409 wmb(); 3410 } else { 3411 /* If the LAG DSA conduit has no ports left, migrate back all 3412 * user ports to the first physical CPU port 3413 */ 3414 dsa_tree_migrate_ports_from_lag_conduit(dst, lag_dev); 3415 } 3416 3417 /* This DSA conduit has left its LAG in any case, so let 3418 * the CPU port leave the hardware LAG as well 3419 */ 3420 dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr); 3421 } 3422 3423 static int dsa_conduit_changeupper(struct net_device *dev, 3424 struct netdev_notifier_changeupper_info *info) 3425 { 3426 struct netlink_ext_ack *extack; 3427 int err = NOTIFY_DONE; 3428 3429 if (!netdev_uses_dsa(dev)) 3430 return err; 3431 3432 extack = netdev_notifier_info_to_extack(&info->info); 3433 3434 if (netif_is_lag_master(info->upper_dev)) { 3435 if (info->linking) { 3436 err = dsa_conduit_lag_join(dev, info->upper_dev, 3437 info->upper_info, extack); 3438 err = notifier_from_errno(err); 3439 } else { 3440 dsa_conduit_lag_leave(dev, info->upper_dev); 3441 err = NOTIFY_OK; 3442 } 3443 } 3444 3445 return err; 3446 } 3447 3448 static int dsa_user_netdevice_event(struct notifier_block *nb, 3449 unsigned long event, void *ptr) 3450 { 3451 struct net_device *dev = netdev_notifier_info_to_dev(ptr); 3452 3453 switch (event) { 3454 case NETDEV_PRECHANGEUPPER: { 3455 struct netdev_notifier_changeupper_info *info = ptr; 3456 int err; 3457 3458 err = dsa_user_prechangeupper_sanity_check(dev, info); 3459 if (notifier_to_errno(err)) 3460 return err; 3461 3462 err = dsa_conduit_prechangeupper_sanity_check(dev, info); 3463 if (notifier_to_errno(err)) 3464 return err; 3465 3466 err = dsa_lag_conduit_prechangelower_sanity_check(dev, info); 3467 if (notifier_to_errno(err)) 3468 return err; 3469 3470 err = dsa_bridge_prechangelower_sanity_check(dev, info); 3471 if (notifier_to_errno(err)) 3472 return err; 3473 3474 err = dsa_user_prechangeupper(dev, ptr); 3475 if (notifier_to_errno(err)) 3476 return err; 3477 3478 err = dsa_user_lag_prechangeupper(dev, ptr); 3479 if (notifier_to_errno(err)) 3480 return err; 3481 3482 break; 3483 } 3484 case NETDEV_CHANGEUPPER: { 3485 int err; 3486 3487 err = dsa_user_changeupper(dev, ptr); 3488 if (notifier_to_errno(err)) 3489 return err; 3490 3491 err = dsa_user_lag_changeupper(dev, ptr); 3492 if (notifier_to_errno(err)) 3493 return err; 3494 3495 err = dsa_conduit_changeupper(dev, ptr); 3496 if (notifier_to_errno(err)) 3497 return err; 3498 3499 break; 3500 } 3501 case NETDEV_CHANGELOWERSTATE: { 3502 struct netdev_notifier_changelowerstate_info *info = ptr; 3503 struct dsa_port *dp; 3504 int err = 0; 3505 3506 if (dsa_user_dev_check(dev)) { 3507 dp = dsa_user_to_port(dev); 3508 3509 err = dsa_port_lag_change(dp, info->lower_state_info); 3510 } 3511 3512 /* Mirror LAG port events on DSA conduits that are in 3513 * a LAG towards their respective switch CPU ports 3514 */ 3515 if (netdev_uses_dsa(dev)) { 3516 dp = dev->dsa_ptr; 3517 3518 err = dsa_port_lag_change(dp, info->lower_state_info); 3519 } 3520 3521 return notifier_from_errno(err); 3522 } 3523 case NETDEV_CHANGE: 3524 case NETDEV_UP: { 3525 /* Track state of conduit port. 3526 * DSA driver may require the conduit port (and indirectly 3527 * the tagger) to be available for some special operation. 3528 */ 3529 if (netdev_uses_dsa(dev)) { 3530 struct dsa_port *cpu_dp = dev->dsa_ptr; 3531 struct dsa_switch_tree *dst = cpu_dp->ds->dst; 3532 3533 /* Track when the conduit port is UP */ 3534 dsa_tree_conduit_oper_state_change(dst, dev, 3535 netif_oper_up(dev)); 3536 3537 /* Track when the conduit port is ready and can accept 3538 * packet. 3539 * NETDEV_UP event is not enough to flag a port as ready. 3540 * We also have to wait for linkwatch_do_dev to dev_activate 3541 * and emit a NETDEV_CHANGE event. 3542 * We check if a conduit port is ready by checking if the dev 3543 * have a qdisc assigned and is not noop. 3544 */ 3545 dsa_tree_conduit_admin_state_change(dst, dev, 3546 !qdisc_tx_is_noop(dev)); 3547 3548 return NOTIFY_OK; 3549 } 3550 3551 return NOTIFY_DONE; 3552 } 3553 case NETDEV_GOING_DOWN: { 3554 struct dsa_port *dp, *cpu_dp; 3555 struct dsa_switch_tree *dst; 3556 LIST_HEAD(close_list); 3557 3558 if (!netdev_uses_dsa(dev)) 3559 return NOTIFY_DONE; 3560 3561 cpu_dp = dev->dsa_ptr; 3562 dst = cpu_dp->ds->dst; 3563 3564 dsa_tree_conduit_admin_state_change(dst, dev, false); 3565 3566 list_for_each_entry(dp, &dst->ports, list) { 3567 if (!dsa_port_is_user(dp)) 3568 continue; 3569 3570 if (dp->cpu_dp != cpu_dp) 3571 continue; 3572 3573 list_add(&dp->user->close_list, &close_list); 3574 } 3575 3576 dev_close_many(&close_list, true); 3577 3578 return NOTIFY_OK; 3579 } 3580 default: 3581 break; 3582 } 3583 3584 return NOTIFY_DONE; 3585 } 3586 3587 static void 3588 dsa_fdb_offload_notify(struct dsa_switchdev_event_work *switchdev_work) 3589 { 3590 struct switchdev_notifier_fdb_info info = {}; 3591 3592 info.addr = switchdev_work->addr; 3593 info.vid = switchdev_work->vid; 3594 info.offloaded = true; 3595 call_switchdev_notifiers(SWITCHDEV_FDB_OFFLOADED, 3596 switchdev_work->orig_dev, &info.info, NULL); 3597 } 3598 3599 static void dsa_user_switchdev_event_work(struct work_struct *work) 3600 { 3601 struct dsa_switchdev_event_work *switchdev_work = 3602 container_of(work, struct dsa_switchdev_event_work, work); 3603 const unsigned char *addr = switchdev_work->addr; 3604 struct net_device *dev = switchdev_work->dev; 3605 u16 vid = switchdev_work->vid; 3606 struct dsa_switch *ds; 3607 struct dsa_port *dp; 3608 int err; 3609 3610 dp = dsa_user_to_port(dev); 3611 ds = dp->ds; 3612 3613 switch (switchdev_work->event) { 3614 case SWITCHDEV_FDB_ADD_TO_DEVICE: 3615 if (switchdev_work->host_addr) 3616 err = dsa_port_bridge_host_fdb_add(dp, addr, vid); 3617 else if (dp->lag) 3618 err = dsa_port_lag_fdb_add(dp, addr, vid); 3619 else 3620 err = dsa_port_fdb_add(dp, addr, vid); 3621 if (err) { 3622 dev_err(ds->dev, 3623 "port %d failed to add %pM vid %d to fdb: %d\n", 3624 dp->index, addr, vid, err); 3625 break; 3626 } 3627 dsa_fdb_offload_notify(switchdev_work); 3628 break; 3629 3630 case SWITCHDEV_FDB_DEL_TO_DEVICE: 3631 if (switchdev_work->host_addr) 3632 err = dsa_port_bridge_host_fdb_del(dp, addr, vid); 3633 else if (dp->lag) 3634 err = dsa_port_lag_fdb_del(dp, addr, vid); 3635 else 3636 err = dsa_port_fdb_del(dp, addr, vid); 3637 if (err) { 3638 dev_err(ds->dev, 3639 "port %d failed to delete %pM vid %d from fdb: %d\n", 3640 dp->index, addr, vid, err); 3641 } 3642 3643 break; 3644 } 3645 3646 kfree(switchdev_work); 3647 } 3648 3649 static bool dsa_foreign_dev_check(const struct net_device *dev, 3650 const struct net_device *foreign_dev) 3651 { 3652 const struct dsa_port *dp = dsa_user_to_port(dev); 3653 struct dsa_switch_tree *dst = dp->ds->dst; 3654 3655 if (netif_is_bridge_master(foreign_dev)) 3656 return !dsa_tree_offloads_bridge_dev(dst, foreign_dev); 3657 3658 if (netif_is_bridge_port(foreign_dev)) 3659 return !dsa_tree_offloads_bridge_port(dst, foreign_dev); 3660 3661 /* Everything else is foreign */ 3662 return true; 3663 } 3664 3665 static int dsa_user_fdb_event(struct net_device *dev, 3666 struct net_device *orig_dev, 3667 unsigned long event, const void *ctx, 3668 const struct switchdev_notifier_fdb_info *fdb_info) 3669 { 3670 struct dsa_switchdev_event_work *switchdev_work; 3671 struct dsa_port *dp = dsa_user_to_port(dev); 3672 bool host_addr = fdb_info->is_local; 3673 struct dsa_switch *ds = dp->ds; 3674 3675 if (ctx && ctx != dp) 3676 return 0; 3677 3678 if (!dp->bridge) 3679 return 0; 3680 3681 if (switchdev_fdb_is_dynamically_learned(fdb_info)) { 3682 if (dsa_port_offloads_bridge_port(dp, orig_dev)) 3683 return 0; 3684 3685 /* FDB entries learned by the software bridge or by foreign 3686 * bridge ports should be installed as host addresses only if 3687 * the driver requests assisted learning. 3688 */ 3689 if (!ds->assisted_learning_on_cpu_port) 3690 return 0; 3691 } 3692 3693 /* Also treat FDB entries on foreign interfaces bridged with us as host 3694 * addresses. 3695 */ 3696 if (dsa_foreign_dev_check(dev, orig_dev)) 3697 host_addr = true; 3698 3699 /* Check early that we're not doing work in vain. 3700 * Host addresses on LAG ports still require regular FDB ops, 3701 * since the CPU port isn't in a LAG. 3702 */ 3703 if (dp->lag && !host_addr) { 3704 if (!ds->ops->lag_fdb_add || !ds->ops->lag_fdb_del) 3705 return -EOPNOTSUPP; 3706 } else { 3707 if (!ds->ops->port_fdb_add || !ds->ops->port_fdb_del) 3708 return -EOPNOTSUPP; 3709 } 3710 3711 switchdev_work = kzalloc(sizeof(*switchdev_work), GFP_ATOMIC); 3712 if (!switchdev_work) 3713 return -ENOMEM; 3714 3715 netdev_dbg(dev, "%s FDB entry towards %s, addr %pM vid %d%s\n", 3716 event == SWITCHDEV_FDB_ADD_TO_DEVICE ? "Adding" : "Deleting", 3717 orig_dev->name, fdb_info->addr, fdb_info->vid, 3718 host_addr ? " as host address" : ""); 3719 3720 INIT_WORK(&switchdev_work->work, dsa_user_switchdev_event_work); 3721 switchdev_work->event = event; 3722 switchdev_work->dev = dev; 3723 switchdev_work->orig_dev = orig_dev; 3724 3725 ether_addr_copy(switchdev_work->addr, fdb_info->addr); 3726 switchdev_work->vid = fdb_info->vid; 3727 switchdev_work->host_addr = host_addr; 3728 3729 dsa_schedule_work(&switchdev_work->work); 3730 3731 return 0; 3732 } 3733 3734 /* Called under rcu_read_lock() */ 3735 static int dsa_user_switchdev_event(struct notifier_block *unused, 3736 unsigned long event, void *ptr) 3737 { 3738 struct net_device *dev = switchdev_notifier_info_to_dev(ptr); 3739 int err; 3740 3741 switch (event) { 3742 case SWITCHDEV_PORT_ATTR_SET: 3743 err = switchdev_handle_port_attr_set(dev, ptr, 3744 dsa_user_dev_check, 3745 dsa_user_port_attr_set); 3746 return notifier_from_errno(err); 3747 case SWITCHDEV_FDB_ADD_TO_DEVICE: 3748 case SWITCHDEV_FDB_DEL_TO_DEVICE: 3749 err = switchdev_handle_fdb_event_to_device(dev, event, ptr, 3750 dsa_user_dev_check, 3751 dsa_foreign_dev_check, 3752 dsa_user_fdb_event); 3753 return notifier_from_errno(err); 3754 default: 3755 return NOTIFY_DONE; 3756 } 3757 3758 return NOTIFY_OK; 3759 } 3760 3761 static int dsa_user_switchdev_blocking_event(struct notifier_block *unused, 3762 unsigned long event, void *ptr) 3763 { 3764 struct net_device *dev = switchdev_notifier_info_to_dev(ptr); 3765 int err; 3766 3767 switch (event) { 3768 case SWITCHDEV_PORT_OBJ_ADD: 3769 err = switchdev_handle_port_obj_add_foreign(dev, ptr, 3770 dsa_user_dev_check, 3771 dsa_foreign_dev_check, 3772 dsa_user_port_obj_add); 3773 return notifier_from_errno(err); 3774 case SWITCHDEV_PORT_OBJ_DEL: 3775 err = switchdev_handle_port_obj_del_foreign(dev, ptr, 3776 dsa_user_dev_check, 3777 dsa_foreign_dev_check, 3778 dsa_user_port_obj_del); 3779 return notifier_from_errno(err); 3780 case SWITCHDEV_PORT_ATTR_SET: 3781 err = switchdev_handle_port_attr_set(dev, ptr, 3782 dsa_user_dev_check, 3783 dsa_user_port_attr_set); 3784 return notifier_from_errno(err); 3785 } 3786 3787 return NOTIFY_DONE; 3788 } 3789 3790 static struct notifier_block dsa_user_nb __read_mostly = { 3791 .notifier_call = dsa_user_netdevice_event, 3792 }; 3793 3794 struct notifier_block dsa_user_switchdev_notifier = { 3795 .notifier_call = dsa_user_switchdev_event, 3796 }; 3797 3798 struct notifier_block dsa_user_switchdev_blocking_notifier = { 3799 .notifier_call = dsa_user_switchdev_blocking_event, 3800 }; 3801 3802 int dsa_user_register_notifier(void) 3803 { 3804 struct notifier_block *nb; 3805 int err; 3806 3807 err = register_netdevice_notifier(&dsa_user_nb); 3808 if (err) 3809 return err; 3810 3811 err = register_switchdev_notifier(&dsa_user_switchdev_notifier); 3812 if (err) 3813 goto err_switchdev_nb; 3814 3815 nb = &dsa_user_switchdev_blocking_notifier; 3816 err = register_switchdev_blocking_notifier(nb); 3817 if (err) 3818 goto err_switchdev_blocking_nb; 3819 3820 return 0; 3821 3822 err_switchdev_blocking_nb: 3823 unregister_switchdev_notifier(&dsa_user_switchdev_notifier); 3824 err_switchdev_nb: 3825 unregister_netdevice_notifier(&dsa_user_nb); 3826 return err; 3827 } 3828 3829 void dsa_user_unregister_notifier(void) 3830 { 3831 struct notifier_block *nb; 3832 int err; 3833 3834 nb = &dsa_user_switchdev_blocking_notifier; 3835 err = unregister_switchdev_blocking_notifier(nb); 3836 if (err) 3837 pr_err("DSA: failed to unregister switchdev blocking notifier (%d)\n", err); 3838 3839 err = unregister_switchdev_notifier(&dsa_user_switchdev_notifier); 3840 if (err) 3841 pr_err("DSA: failed to unregister switchdev notifier (%d)\n", err); 3842 3843 err = unregister_netdevice_notifier(&dsa_user_nb); 3844 if (err) 3845 pr_err("DSA: failed to unregister user notifier (%d)\n", err); 3846 } 3847