xref: /linux/net/dsa/user.c (revision c060f8168bdf22aa986970955af99702d142dfbe)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * net/dsa/user.c - user device handling
4  * Copyright (c) 2008-2009 Marvell Semiconductor
5  */
6 
7 #include <linux/list.h>
8 #include <linux/etherdevice.h>
9 #include <linux/netdevice.h>
10 #include <linux/phy.h>
11 #include <linux/phy_fixed.h>
12 #include <linux/phylink.h>
13 #include <linux/of_net.h>
14 #include <linux/of_mdio.h>
15 #include <linux/mdio.h>
16 #include <net/rtnetlink.h>
17 #include <net/pkt_cls.h>
18 #include <net/selftests.h>
19 #include <net/tc_act/tc_mirred.h>
20 #include <linux/if_bridge.h>
21 #include <linux/if_hsr.h>
22 #include <net/dcbnl.h>
23 #include <linux/netpoll.h>
24 #include <linux/string.h>
25 
26 #include "conduit.h"
27 #include "dsa.h"
28 #include "netlink.h"
29 #include "port.h"
30 #include "switch.h"
31 #include "tag.h"
32 #include "user.h"
33 
34 struct dsa_switchdev_event_work {
35 	struct net_device *dev;
36 	struct net_device *orig_dev;
37 	struct work_struct work;
38 	unsigned long event;
39 	/* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and
40 	 * SWITCHDEV_FDB_DEL_TO_DEVICE
41 	 */
42 	unsigned char addr[ETH_ALEN];
43 	u16 vid;
44 	bool host_addr;
45 };
46 
47 enum dsa_standalone_event {
48 	DSA_UC_ADD,
49 	DSA_UC_DEL,
50 	DSA_MC_ADD,
51 	DSA_MC_DEL,
52 };
53 
54 struct dsa_standalone_event_work {
55 	struct work_struct work;
56 	struct net_device *dev;
57 	enum dsa_standalone_event event;
58 	unsigned char addr[ETH_ALEN];
59 	u16 vid;
60 };
61 
62 struct dsa_host_vlan_rx_filtering_ctx {
63 	struct net_device *dev;
64 	const unsigned char *addr;
65 	enum dsa_standalone_event event;
66 };
67 
68 static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds)
69 {
70 	return ds->ops->port_fdb_add && ds->ops->port_fdb_del &&
71 	       ds->fdb_isolation && !ds->vlan_filtering_is_global &&
72 	       !ds->needs_standalone_vlan_filtering;
73 }
74 
75 static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds)
76 {
77 	return ds->ops->port_mdb_add && ds->ops->port_mdb_del &&
78 	       ds->fdb_isolation && !ds->vlan_filtering_is_global &&
79 	       !ds->needs_standalone_vlan_filtering;
80 }
81 
82 static void dsa_user_standalone_event_work(struct work_struct *work)
83 {
84 	struct dsa_standalone_event_work *standalone_work =
85 		container_of(work, struct dsa_standalone_event_work, work);
86 	const unsigned char *addr = standalone_work->addr;
87 	struct net_device *dev = standalone_work->dev;
88 	struct dsa_port *dp = dsa_user_to_port(dev);
89 	struct switchdev_obj_port_mdb mdb;
90 	struct dsa_switch *ds = dp->ds;
91 	u16 vid = standalone_work->vid;
92 	int err;
93 
94 	switch (standalone_work->event) {
95 	case DSA_UC_ADD:
96 		err = dsa_port_standalone_host_fdb_add(dp, addr, vid);
97 		if (err) {
98 			dev_err(ds->dev,
99 				"port %d failed to add %pM vid %d to fdb: %d\n",
100 				dp->index, addr, vid, err);
101 			break;
102 		}
103 		break;
104 
105 	case DSA_UC_DEL:
106 		err = dsa_port_standalone_host_fdb_del(dp, addr, vid);
107 		if (err) {
108 			dev_err(ds->dev,
109 				"port %d failed to delete %pM vid %d from fdb: %d\n",
110 				dp->index, addr, vid, err);
111 		}
112 
113 		break;
114 	case DSA_MC_ADD:
115 		ether_addr_copy(mdb.addr, addr);
116 		mdb.vid = vid;
117 
118 		err = dsa_port_standalone_host_mdb_add(dp, &mdb);
119 		if (err) {
120 			dev_err(ds->dev,
121 				"port %d failed to add %pM vid %d to mdb: %d\n",
122 				dp->index, addr, vid, err);
123 			break;
124 		}
125 		break;
126 	case DSA_MC_DEL:
127 		ether_addr_copy(mdb.addr, addr);
128 		mdb.vid = vid;
129 
130 		err = dsa_port_standalone_host_mdb_del(dp, &mdb);
131 		if (err) {
132 			dev_err(ds->dev,
133 				"port %d failed to delete %pM vid %d from mdb: %d\n",
134 				dp->index, addr, vid, err);
135 		}
136 
137 		break;
138 	}
139 
140 	kfree(standalone_work);
141 }
142 
143 static int dsa_user_schedule_standalone_work(struct net_device *dev,
144 					     enum dsa_standalone_event event,
145 					     const unsigned char *addr,
146 					     u16 vid)
147 {
148 	struct dsa_standalone_event_work *standalone_work;
149 
150 	standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC);
151 	if (!standalone_work)
152 		return -ENOMEM;
153 
154 	INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work);
155 	standalone_work->event = event;
156 	standalone_work->dev = dev;
157 
158 	ether_addr_copy(standalone_work->addr, addr);
159 	standalone_work->vid = vid;
160 
161 	dsa_schedule_work(&standalone_work->work);
162 
163 	return 0;
164 }
165 
166 static int dsa_user_host_vlan_rx_filtering(void *arg, int vid)
167 {
168 	struct dsa_host_vlan_rx_filtering_ctx *ctx = arg;
169 
170 	return dsa_user_schedule_standalone_work(ctx->dev, ctx->event,
171 						  ctx->addr, vid);
172 }
173 
174 static int dsa_user_vlan_for_each(struct net_device *dev,
175 				  int (*cb)(void *arg, int vid), void *arg)
176 {
177 	struct dsa_port *dp = dsa_user_to_port(dev);
178 	struct dsa_vlan *v;
179 	int err;
180 
181 	lockdep_assert_held(&dev->addr_list_lock);
182 
183 	err = cb(arg, 0);
184 	if (err)
185 		return err;
186 
187 	list_for_each_entry(v, &dp->user_vlans, list) {
188 		err = cb(arg, v->vid);
189 		if (err)
190 			return err;
191 	}
192 
193 	return 0;
194 }
195 
196 static int dsa_user_sync_uc(struct net_device *dev,
197 			    const unsigned char *addr)
198 {
199 	struct net_device *conduit = dsa_user_to_conduit(dev);
200 	struct dsa_port *dp = dsa_user_to_port(dev);
201 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
202 		.dev = dev,
203 		.addr = addr,
204 		.event = DSA_UC_ADD,
205 	};
206 
207 	dev_uc_add(conduit, addr);
208 
209 	if (!dsa_switch_supports_uc_filtering(dp->ds))
210 		return 0;
211 
212 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
213 				      &ctx);
214 }
215 
216 static int dsa_user_unsync_uc(struct net_device *dev,
217 			      const unsigned char *addr)
218 {
219 	struct net_device *conduit = dsa_user_to_conduit(dev);
220 	struct dsa_port *dp = dsa_user_to_port(dev);
221 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
222 		.dev = dev,
223 		.addr = addr,
224 		.event = DSA_UC_DEL,
225 	};
226 
227 	dev_uc_del(conduit, addr);
228 
229 	if (!dsa_switch_supports_uc_filtering(dp->ds))
230 		return 0;
231 
232 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
233 				      &ctx);
234 }
235 
236 static int dsa_user_sync_mc(struct net_device *dev,
237 			    const unsigned char *addr)
238 {
239 	struct net_device *conduit = dsa_user_to_conduit(dev);
240 	struct dsa_port *dp = dsa_user_to_port(dev);
241 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
242 		.dev = dev,
243 		.addr = addr,
244 		.event = DSA_MC_ADD,
245 	};
246 
247 	dev_mc_add(conduit, addr);
248 
249 	if (!dsa_switch_supports_mc_filtering(dp->ds))
250 		return 0;
251 
252 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
253 				      &ctx);
254 }
255 
256 static int dsa_user_unsync_mc(struct net_device *dev,
257 			      const unsigned char *addr)
258 {
259 	struct net_device *conduit = dsa_user_to_conduit(dev);
260 	struct dsa_port *dp = dsa_user_to_port(dev);
261 	struct dsa_host_vlan_rx_filtering_ctx ctx = {
262 		.dev = dev,
263 		.addr = addr,
264 		.event = DSA_MC_DEL,
265 	};
266 
267 	dev_mc_del(conduit, addr);
268 
269 	if (!dsa_switch_supports_mc_filtering(dp->ds))
270 		return 0;
271 
272 	return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering,
273 				      &ctx);
274 }
275 
276 void dsa_user_sync_ha(struct net_device *dev)
277 {
278 	struct dsa_port *dp = dsa_user_to_port(dev);
279 	struct dsa_switch *ds = dp->ds;
280 	struct netdev_hw_addr *ha;
281 
282 	netif_addr_lock_bh(dev);
283 
284 	netdev_for_each_synced_mc_addr(ha, dev)
285 		dsa_user_sync_mc(dev, ha->addr);
286 
287 	netdev_for_each_synced_uc_addr(ha, dev)
288 		dsa_user_sync_uc(dev, ha->addr);
289 
290 	netif_addr_unlock_bh(dev);
291 
292 	if (dsa_switch_supports_uc_filtering(ds) ||
293 	    dsa_switch_supports_mc_filtering(ds))
294 		dsa_flush_workqueue();
295 }
296 
297 void dsa_user_unsync_ha(struct net_device *dev)
298 {
299 	struct dsa_port *dp = dsa_user_to_port(dev);
300 	struct dsa_switch *ds = dp->ds;
301 	struct netdev_hw_addr *ha;
302 
303 	netif_addr_lock_bh(dev);
304 
305 	netdev_for_each_synced_uc_addr(ha, dev)
306 		dsa_user_unsync_uc(dev, ha->addr);
307 
308 	netdev_for_each_synced_mc_addr(ha, dev)
309 		dsa_user_unsync_mc(dev, ha->addr);
310 
311 	netif_addr_unlock_bh(dev);
312 
313 	if (dsa_switch_supports_uc_filtering(ds) ||
314 	    dsa_switch_supports_mc_filtering(ds))
315 		dsa_flush_workqueue();
316 }
317 
318 /* user mii_bus handling ***************************************************/
319 static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg)
320 {
321 	struct dsa_switch *ds = bus->priv;
322 
323 	if (ds->phys_mii_mask & (1 << addr))
324 		return ds->ops->phy_read(ds, addr, reg);
325 
326 	return 0xffff;
327 }
328 
329 static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val)
330 {
331 	struct dsa_switch *ds = bus->priv;
332 
333 	if (ds->phys_mii_mask & (1 << addr))
334 		return ds->ops->phy_write(ds, addr, reg, val);
335 
336 	return 0;
337 }
338 
339 void dsa_user_mii_bus_init(struct dsa_switch *ds)
340 {
341 	ds->user_mii_bus->priv = (void *)ds;
342 	ds->user_mii_bus->name = "dsa user smi";
343 	ds->user_mii_bus->read = dsa_user_phy_read;
344 	ds->user_mii_bus->write = dsa_user_phy_write;
345 	snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d",
346 		 ds->dst->index, ds->index);
347 	ds->user_mii_bus->parent = ds->dev;
348 	ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask;
349 }
350 
351 
352 /* user device handling ****************************************************/
353 static int dsa_user_get_iflink(const struct net_device *dev)
354 {
355 	return READ_ONCE(dsa_user_to_conduit(dev)->ifindex);
356 }
357 
358 int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr)
359 {
360 	struct net_device *conduit = dsa_user_to_conduit(dev);
361 	struct dsa_port *dp = dsa_user_to_port(dev);
362 	struct dsa_switch *ds = dp->ds;
363 	int err;
364 
365 	if (dsa_switch_supports_uc_filtering(ds)) {
366 		err = dsa_port_standalone_host_fdb_add(dp, addr, 0);
367 		if (err)
368 			goto out;
369 	}
370 
371 	if (!ether_addr_equal(addr, conduit->dev_addr)) {
372 		err = dev_uc_add(conduit, addr);
373 		if (err < 0)
374 			goto del_host_addr;
375 	}
376 
377 	return 0;
378 
379 del_host_addr:
380 	if (dsa_switch_supports_uc_filtering(ds))
381 		dsa_port_standalone_host_fdb_del(dp, addr, 0);
382 out:
383 	return err;
384 }
385 
386 void dsa_user_host_uc_uninstall(struct net_device *dev)
387 {
388 	struct net_device *conduit = dsa_user_to_conduit(dev);
389 	struct dsa_port *dp = dsa_user_to_port(dev);
390 	struct dsa_switch *ds = dp->ds;
391 
392 	if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr))
393 		dev_uc_del(conduit, dev->dev_addr);
394 
395 	if (dsa_switch_supports_uc_filtering(ds))
396 		dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0);
397 }
398 
399 static int dsa_user_open(struct net_device *dev)
400 {
401 	struct net_device *conduit = dsa_user_to_conduit(dev);
402 	struct dsa_port *dp = dsa_user_to_port(dev);
403 	int err;
404 
405 	err = dev_open(conduit, NULL);
406 	if (err < 0) {
407 		netdev_err(dev, "failed to open conduit %s\n", conduit->name);
408 		goto out;
409 	}
410 
411 	err = dsa_user_host_uc_install(dev, dev->dev_addr);
412 	if (err)
413 		goto out;
414 
415 	err = dsa_port_enable_rt(dp, dev->phydev);
416 	if (err)
417 		goto out_del_host_uc;
418 
419 	return 0;
420 
421 out_del_host_uc:
422 	dsa_user_host_uc_uninstall(dev);
423 out:
424 	return err;
425 }
426 
427 static int dsa_user_close(struct net_device *dev)
428 {
429 	struct dsa_port *dp = dsa_user_to_port(dev);
430 
431 	dsa_port_disable_rt(dp);
432 
433 	dsa_user_host_uc_uninstall(dev);
434 
435 	return 0;
436 }
437 
438 static void dsa_user_manage_host_flood(struct net_device *dev)
439 {
440 	bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI);
441 	struct dsa_port *dp = dsa_user_to_port(dev);
442 	bool uc = dev->flags & IFF_PROMISC;
443 
444 	dsa_port_set_host_flood(dp, uc, mc);
445 }
446 
447 static void dsa_user_change_rx_flags(struct net_device *dev, int change)
448 {
449 	struct net_device *conduit = dsa_user_to_conduit(dev);
450 	struct dsa_port *dp = dsa_user_to_port(dev);
451 	struct dsa_switch *ds = dp->ds;
452 
453 	if (change & IFF_ALLMULTI)
454 		dev_set_allmulti(conduit,
455 				 dev->flags & IFF_ALLMULTI ? 1 : -1);
456 	if (change & IFF_PROMISC)
457 		dev_set_promiscuity(conduit,
458 				    dev->flags & IFF_PROMISC ? 1 : -1);
459 
460 	if (dsa_switch_supports_uc_filtering(ds) &&
461 	    dsa_switch_supports_mc_filtering(ds))
462 		dsa_user_manage_host_flood(dev);
463 }
464 
465 static void dsa_user_set_rx_mode(struct net_device *dev)
466 {
467 	__dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc);
468 	__dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc);
469 }
470 
471 static int dsa_user_set_mac_address(struct net_device *dev, void *a)
472 {
473 	struct dsa_port *dp = dsa_user_to_port(dev);
474 	struct dsa_switch *ds = dp->ds;
475 	struct sockaddr *addr = a;
476 	int err;
477 
478 	if (!is_valid_ether_addr(addr->sa_data))
479 		return -EADDRNOTAVAIL;
480 
481 	if (ds->ops->port_set_mac_address) {
482 		err = ds->ops->port_set_mac_address(ds, dp->index,
483 						    addr->sa_data);
484 		if (err)
485 			return err;
486 	}
487 
488 	/* If the port is down, the address isn't synced yet to hardware or
489 	 * to the DSA conduit, so there is nothing to change.
490 	 */
491 	if (!(dev->flags & IFF_UP))
492 		goto out_change_dev_addr;
493 
494 	err = dsa_user_host_uc_install(dev, addr->sa_data);
495 	if (err)
496 		return err;
497 
498 	dsa_user_host_uc_uninstall(dev);
499 
500 out_change_dev_addr:
501 	eth_hw_addr_set(dev, addr->sa_data);
502 
503 	return 0;
504 }
505 
506 struct dsa_user_dump_ctx {
507 	struct net_device *dev;
508 	struct sk_buff *skb;
509 	struct netlink_callback *cb;
510 	int idx;
511 };
512 
513 static int
514 dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid,
515 			  bool is_static, void *data)
516 {
517 	struct dsa_user_dump_ctx *dump = data;
518 	u32 portid = NETLINK_CB(dump->cb->skb).portid;
519 	u32 seq = dump->cb->nlh->nlmsg_seq;
520 	struct nlmsghdr *nlh;
521 	struct ndmsg *ndm;
522 
523 	if (dump->idx < dump->cb->args[2])
524 		goto skip;
525 
526 	nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH,
527 			sizeof(*ndm), NLM_F_MULTI);
528 	if (!nlh)
529 		return -EMSGSIZE;
530 
531 	ndm = nlmsg_data(nlh);
532 	ndm->ndm_family  = AF_BRIDGE;
533 	ndm->ndm_pad1    = 0;
534 	ndm->ndm_pad2    = 0;
535 	ndm->ndm_flags   = NTF_SELF;
536 	ndm->ndm_type    = 0;
537 	ndm->ndm_ifindex = dump->dev->ifindex;
538 	ndm->ndm_state   = is_static ? NUD_NOARP : NUD_REACHABLE;
539 
540 	if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr))
541 		goto nla_put_failure;
542 
543 	if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid))
544 		goto nla_put_failure;
545 
546 	nlmsg_end(dump->skb, nlh);
547 
548 skip:
549 	dump->idx++;
550 	return 0;
551 
552 nla_put_failure:
553 	nlmsg_cancel(dump->skb, nlh);
554 	return -EMSGSIZE;
555 }
556 
557 static int
558 dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb,
559 		  struct net_device *dev, struct net_device *filter_dev,
560 		  int *idx)
561 {
562 	struct dsa_port *dp = dsa_user_to_port(dev);
563 	struct dsa_user_dump_ctx dump = {
564 		.dev = dev,
565 		.skb = skb,
566 		.cb = cb,
567 		.idx = *idx,
568 	};
569 	int err;
570 
571 	err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump);
572 	*idx = dump.idx;
573 
574 	return err;
575 }
576 
577 static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
578 {
579 	struct dsa_user_priv *p = netdev_priv(dev);
580 	struct dsa_switch *ds = p->dp->ds;
581 	int port = p->dp->index;
582 
583 	/* Pass through to switch driver if it supports timestamping */
584 	switch (cmd) {
585 	case SIOCGHWTSTAMP:
586 		if (ds->ops->port_hwtstamp_get)
587 			return ds->ops->port_hwtstamp_get(ds, port, ifr);
588 		break;
589 	case SIOCSHWTSTAMP:
590 		if (ds->ops->port_hwtstamp_set)
591 			return ds->ops->port_hwtstamp_set(ds, port, ifr);
592 		break;
593 	}
594 
595 	return phylink_mii_ioctl(p->dp->pl, ifr, cmd);
596 }
597 
598 static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx,
599 				  const struct switchdev_attr *attr,
600 				  struct netlink_ext_ack *extack)
601 {
602 	struct dsa_port *dp = dsa_user_to_port(dev);
603 	int ret;
604 
605 	if (ctx && ctx != dp)
606 		return 0;
607 
608 	switch (attr->id) {
609 	case SWITCHDEV_ATTR_ID_PORT_STP_STATE:
610 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
611 			return -EOPNOTSUPP;
612 
613 		ret = dsa_port_set_state(dp, attr->u.stp_state, true);
614 		break;
615 	case SWITCHDEV_ATTR_ID_PORT_MST_STATE:
616 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
617 			return -EOPNOTSUPP;
618 
619 		ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack);
620 		break;
621 	case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING:
622 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
623 			return -EOPNOTSUPP;
624 
625 		ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering,
626 					      extack);
627 		break;
628 	case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME:
629 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
630 			return -EOPNOTSUPP;
631 
632 		ret = dsa_port_ageing_time(dp, attr->u.ageing_time);
633 		break;
634 	case SWITCHDEV_ATTR_ID_BRIDGE_MST:
635 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
636 			return -EOPNOTSUPP;
637 
638 		ret = dsa_port_mst_enable(dp, attr->u.mst, extack);
639 		break;
640 	case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS:
641 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
642 			return -EOPNOTSUPP;
643 
644 		ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags,
645 						extack);
646 		break;
647 	case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS:
648 		if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev))
649 			return -EOPNOTSUPP;
650 
651 		ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack);
652 		break;
653 	case SWITCHDEV_ATTR_ID_VLAN_MSTI:
654 		if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev))
655 			return -EOPNOTSUPP;
656 
657 		ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti);
658 		break;
659 	default:
660 		ret = -EOPNOTSUPP;
661 		break;
662 	}
663 
664 	return ret;
665 }
666 
667 /* Must be called under rcu_read_lock() */
668 static int
669 dsa_user_vlan_check_for_8021q_uppers(struct net_device *user,
670 				     const struct switchdev_obj_port_vlan *vlan)
671 {
672 	struct net_device *upper_dev;
673 	struct list_head *iter;
674 
675 	netdev_for_each_upper_dev_rcu(user, upper_dev, iter) {
676 		u16 vid;
677 
678 		if (!is_vlan_dev(upper_dev))
679 			continue;
680 
681 		vid = vlan_dev_vlan_id(upper_dev);
682 		if (vid == vlan->vid)
683 			return -EBUSY;
684 	}
685 
686 	return 0;
687 }
688 
689 static int dsa_user_vlan_add(struct net_device *dev,
690 			     const struct switchdev_obj *obj,
691 			     struct netlink_ext_ack *extack)
692 {
693 	struct dsa_port *dp = dsa_user_to_port(dev);
694 	struct switchdev_obj_port_vlan *vlan;
695 	int err;
696 
697 	if (dsa_port_skip_vlan_configuration(dp)) {
698 		NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN");
699 		return 0;
700 	}
701 
702 	vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
703 
704 	/* Deny adding a bridge VLAN when there is already an 802.1Q upper with
705 	 * the same VID.
706 	 */
707 	if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) {
708 		rcu_read_lock();
709 		err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan);
710 		rcu_read_unlock();
711 		if (err) {
712 			NL_SET_ERR_MSG_MOD(extack,
713 					   "Port already has a VLAN upper with this VID");
714 			return err;
715 		}
716 	}
717 
718 	return dsa_port_vlan_add(dp, vlan, extack);
719 }
720 
721 /* Offload a VLAN installed on the bridge or on a foreign interface by
722  * installing it as a VLAN towards the CPU port.
723  */
724 static int dsa_user_host_vlan_add(struct net_device *dev,
725 				  const struct switchdev_obj *obj,
726 				  struct netlink_ext_ack *extack)
727 {
728 	struct dsa_port *dp = dsa_user_to_port(dev);
729 	struct switchdev_obj_port_vlan vlan;
730 
731 	/* Do nothing if this is a software bridge */
732 	if (!dp->bridge)
733 		return -EOPNOTSUPP;
734 
735 	if (dsa_port_skip_vlan_configuration(dp)) {
736 		NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN");
737 		return 0;
738 	}
739 
740 	vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj);
741 
742 	/* Even though drivers often handle CPU membership in special ways,
743 	 * it doesn't make sense to program a PVID, so clear this flag.
744 	 */
745 	vlan.flags &= ~BRIDGE_VLAN_INFO_PVID;
746 
747 	return dsa_port_host_vlan_add(dp, &vlan, extack);
748 }
749 
750 static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx,
751 				 const struct switchdev_obj *obj,
752 				 struct netlink_ext_ack *extack)
753 {
754 	struct dsa_port *dp = dsa_user_to_port(dev);
755 	int err;
756 
757 	if (ctx && ctx != dp)
758 		return 0;
759 
760 	switch (obj->id) {
761 	case SWITCHDEV_OBJ_ID_PORT_MDB:
762 		if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev))
763 			return -EOPNOTSUPP;
764 
765 		err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
766 		break;
767 	case SWITCHDEV_OBJ_ID_HOST_MDB:
768 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
769 			return -EOPNOTSUPP;
770 
771 		err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
772 		break;
773 	case SWITCHDEV_OBJ_ID_PORT_VLAN:
774 		if (dsa_port_offloads_bridge_port(dp, obj->orig_dev))
775 			err = dsa_user_vlan_add(dev, obj, extack);
776 		else
777 			err = dsa_user_host_vlan_add(dev, obj, extack);
778 		break;
779 	case SWITCHDEV_OBJ_ID_MRP:
780 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
781 			return -EOPNOTSUPP;
782 
783 		err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj));
784 		break;
785 	case SWITCHDEV_OBJ_ID_RING_ROLE_MRP:
786 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
787 			return -EOPNOTSUPP;
788 
789 		err = dsa_port_mrp_add_ring_role(dp,
790 						 SWITCHDEV_OBJ_RING_ROLE_MRP(obj));
791 		break;
792 	default:
793 		err = -EOPNOTSUPP;
794 		break;
795 	}
796 
797 	return err;
798 }
799 
800 static int dsa_user_vlan_del(struct net_device *dev,
801 			     const struct switchdev_obj *obj)
802 {
803 	struct dsa_port *dp = dsa_user_to_port(dev);
804 	struct switchdev_obj_port_vlan *vlan;
805 
806 	if (dsa_port_skip_vlan_configuration(dp))
807 		return 0;
808 
809 	vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
810 
811 	return dsa_port_vlan_del(dp, vlan);
812 }
813 
814 static int dsa_user_host_vlan_del(struct net_device *dev,
815 				  const struct switchdev_obj *obj)
816 {
817 	struct dsa_port *dp = dsa_user_to_port(dev);
818 	struct switchdev_obj_port_vlan *vlan;
819 
820 	/* Do nothing if this is a software bridge */
821 	if (!dp->bridge)
822 		return -EOPNOTSUPP;
823 
824 	if (dsa_port_skip_vlan_configuration(dp))
825 		return 0;
826 
827 	vlan = SWITCHDEV_OBJ_PORT_VLAN(obj);
828 
829 	return dsa_port_host_vlan_del(dp, vlan);
830 }
831 
832 static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx,
833 				 const struct switchdev_obj *obj)
834 {
835 	struct dsa_port *dp = dsa_user_to_port(dev);
836 	int err;
837 
838 	if (ctx && ctx != dp)
839 		return 0;
840 
841 	switch (obj->id) {
842 	case SWITCHDEV_OBJ_ID_PORT_MDB:
843 		if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev))
844 			return -EOPNOTSUPP;
845 
846 		err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
847 		break;
848 	case SWITCHDEV_OBJ_ID_HOST_MDB:
849 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
850 			return -EOPNOTSUPP;
851 
852 		err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj));
853 		break;
854 	case SWITCHDEV_OBJ_ID_PORT_VLAN:
855 		if (dsa_port_offloads_bridge_port(dp, obj->orig_dev))
856 			err = dsa_user_vlan_del(dev, obj);
857 		else
858 			err = dsa_user_host_vlan_del(dev, obj);
859 		break;
860 	case SWITCHDEV_OBJ_ID_MRP:
861 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
862 			return -EOPNOTSUPP;
863 
864 		err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj));
865 		break;
866 	case SWITCHDEV_OBJ_ID_RING_ROLE_MRP:
867 		if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev))
868 			return -EOPNOTSUPP;
869 
870 		err = dsa_port_mrp_del_ring_role(dp,
871 						 SWITCHDEV_OBJ_RING_ROLE_MRP(obj));
872 		break;
873 	default:
874 		err = -EOPNOTSUPP;
875 		break;
876 	}
877 
878 	return err;
879 }
880 
881 static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev,
882 					     struct sk_buff *skb)
883 {
884 #ifdef CONFIG_NET_POLL_CONTROLLER
885 	struct dsa_user_priv *p = netdev_priv(dev);
886 
887 	return netpoll_send_skb(p->netpoll, skb);
888 #else
889 	BUG();
890 	return NETDEV_TX_OK;
891 #endif
892 }
893 
894 static void dsa_skb_tx_timestamp(struct dsa_user_priv *p,
895 				 struct sk_buff *skb)
896 {
897 	struct dsa_switch *ds = p->dp->ds;
898 
899 	if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP))
900 		return;
901 
902 	if (!ds->ops->port_txtstamp)
903 		return;
904 
905 	ds->ops->port_txtstamp(ds, p->dp->index, skb);
906 }
907 
908 netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev)
909 {
910 	/* SKB for netpoll still need to be mangled with the protocol-specific
911 	 * tag to be successfully transmitted
912 	 */
913 	if (unlikely(netpoll_tx_running(dev)))
914 		return dsa_user_netpoll_send_skb(dev, skb);
915 
916 	/* Queue the SKB for transmission on the parent interface, but
917 	 * do not modify its EtherType
918 	 */
919 	skb->dev = dsa_user_to_conduit(dev);
920 	dev_queue_xmit(skb);
921 
922 	return NETDEV_TX_OK;
923 }
924 EXPORT_SYMBOL_GPL(dsa_enqueue_skb);
925 
926 static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev)
927 {
928 	struct dsa_user_priv *p = netdev_priv(dev);
929 	struct sk_buff *nskb;
930 
931 	dev_sw_netstats_tx_add(dev, 1, skb->len);
932 
933 	memset(skb->cb, 0, sizeof(skb->cb));
934 
935 	/* Handle tx timestamp if any */
936 	dsa_skb_tx_timestamp(p, skb);
937 
938 	if (skb_ensure_writable_head_tail(skb, dev)) {
939 		dev_kfree_skb_any(skb);
940 		return NETDEV_TX_OK;
941 	}
942 
943 	/* needed_tailroom should still be 'warm' in the cache line from
944 	 * skb_ensure_writable_head_tail(), which has also ensured that
945 	 * padding is safe.
946 	 */
947 	if (dev->needed_tailroom)
948 		eth_skb_pad(skb);
949 
950 	/* Transmit function may have to reallocate the original SKB,
951 	 * in which case it must have freed it. Only free it here on error.
952 	 */
953 	nskb = p->xmit(skb, dev);
954 	if (!nskb) {
955 		kfree_skb(skb);
956 		return NETDEV_TX_OK;
957 	}
958 
959 	return dsa_enqueue_skb(nskb, dev);
960 }
961 
962 /* ethtool operations *******************************************************/
963 
964 static void dsa_user_get_drvinfo(struct net_device *dev,
965 				 struct ethtool_drvinfo *drvinfo)
966 {
967 	strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver));
968 	strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version));
969 	strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info));
970 }
971 
972 static int dsa_user_get_regs_len(struct net_device *dev)
973 {
974 	struct dsa_port *dp = dsa_user_to_port(dev);
975 	struct dsa_switch *ds = dp->ds;
976 
977 	if (ds->ops->get_regs_len)
978 		return ds->ops->get_regs_len(ds, dp->index);
979 
980 	return -EOPNOTSUPP;
981 }
982 
983 static void
984 dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p)
985 {
986 	struct dsa_port *dp = dsa_user_to_port(dev);
987 	struct dsa_switch *ds = dp->ds;
988 
989 	if (ds->ops->get_regs)
990 		ds->ops->get_regs(ds, dp->index, regs, _p);
991 }
992 
993 static int dsa_user_nway_reset(struct net_device *dev)
994 {
995 	struct dsa_port *dp = dsa_user_to_port(dev);
996 
997 	return phylink_ethtool_nway_reset(dp->pl);
998 }
999 
1000 static int dsa_user_get_eeprom_len(struct net_device *dev)
1001 {
1002 	struct dsa_port *dp = dsa_user_to_port(dev);
1003 	struct dsa_switch *ds = dp->ds;
1004 
1005 	if (ds->cd && ds->cd->eeprom_len)
1006 		return ds->cd->eeprom_len;
1007 
1008 	if (ds->ops->get_eeprom_len)
1009 		return ds->ops->get_eeprom_len(ds);
1010 
1011 	return 0;
1012 }
1013 
1014 static int dsa_user_get_eeprom(struct net_device *dev,
1015 			       struct ethtool_eeprom *eeprom, u8 *data)
1016 {
1017 	struct dsa_port *dp = dsa_user_to_port(dev);
1018 	struct dsa_switch *ds = dp->ds;
1019 
1020 	if (ds->ops->get_eeprom)
1021 		return ds->ops->get_eeprom(ds, eeprom, data);
1022 
1023 	return -EOPNOTSUPP;
1024 }
1025 
1026 static int dsa_user_set_eeprom(struct net_device *dev,
1027 			       struct ethtool_eeprom *eeprom, u8 *data)
1028 {
1029 	struct dsa_port *dp = dsa_user_to_port(dev);
1030 	struct dsa_switch *ds = dp->ds;
1031 
1032 	if (ds->ops->set_eeprom)
1033 		return ds->ops->set_eeprom(ds, eeprom, data);
1034 
1035 	return -EOPNOTSUPP;
1036 }
1037 
1038 static void dsa_user_get_strings(struct net_device *dev,
1039 				 uint32_t stringset, uint8_t *data)
1040 {
1041 	struct dsa_port *dp = dsa_user_to_port(dev);
1042 	struct dsa_switch *ds = dp->ds;
1043 
1044 	if (stringset == ETH_SS_STATS) {
1045 		int len = ETH_GSTRING_LEN;
1046 
1047 		strscpy_pad(data, "tx_packets", len);
1048 		strscpy_pad(data + len, "tx_bytes", len);
1049 		strscpy_pad(data + 2 * len, "rx_packets", len);
1050 		strscpy_pad(data + 3 * len, "rx_bytes", len);
1051 		if (ds->ops->get_strings)
1052 			ds->ops->get_strings(ds, dp->index, stringset,
1053 					     data + 4 * len);
1054 	} else if (stringset ==  ETH_SS_TEST) {
1055 		net_selftest_get_strings(data);
1056 	}
1057 
1058 }
1059 
1060 static void dsa_user_get_ethtool_stats(struct net_device *dev,
1061 				       struct ethtool_stats *stats,
1062 				       uint64_t *data)
1063 {
1064 	struct dsa_port *dp = dsa_user_to_port(dev);
1065 	struct dsa_switch *ds = dp->ds;
1066 	struct pcpu_sw_netstats *s;
1067 	unsigned int start;
1068 	int i;
1069 
1070 	for_each_possible_cpu(i) {
1071 		u64 tx_packets, tx_bytes, rx_packets, rx_bytes;
1072 
1073 		s = per_cpu_ptr(dev->tstats, i);
1074 		do {
1075 			start = u64_stats_fetch_begin(&s->syncp);
1076 			tx_packets = u64_stats_read(&s->tx_packets);
1077 			tx_bytes = u64_stats_read(&s->tx_bytes);
1078 			rx_packets = u64_stats_read(&s->rx_packets);
1079 			rx_bytes = u64_stats_read(&s->rx_bytes);
1080 		} while (u64_stats_fetch_retry(&s->syncp, start));
1081 		data[0] += tx_packets;
1082 		data[1] += tx_bytes;
1083 		data[2] += rx_packets;
1084 		data[3] += rx_bytes;
1085 	}
1086 	if (ds->ops->get_ethtool_stats)
1087 		ds->ops->get_ethtool_stats(ds, dp->index, data + 4);
1088 }
1089 
1090 static int dsa_user_get_sset_count(struct net_device *dev, int sset)
1091 {
1092 	struct dsa_port *dp = dsa_user_to_port(dev);
1093 	struct dsa_switch *ds = dp->ds;
1094 
1095 	if (sset == ETH_SS_STATS) {
1096 		int count = 0;
1097 
1098 		if (ds->ops->get_sset_count) {
1099 			count = ds->ops->get_sset_count(ds, dp->index, sset);
1100 			if (count < 0)
1101 				return count;
1102 		}
1103 
1104 		return count + 4;
1105 	} else if (sset ==  ETH_SS_TEST) {
1106 		return net_selftest_get_count();
1107 	}
1108 
1109 	return -EOPNOTSUPP;
1110 }
1111 
1112 static void dsa_user_get_eth_phy_stats(struct net_device *dev,
1113 				       struct ethtool_eth_phy_stats *phy_stats)
1114 {
1115 	struct dsa_port *dp = dsa_user_to_port(dev);
1116 	struct dsa_switch *ds = dp->ds;
1117 
1118 	if (ds->ops->get_eth_phy_stats)
1119 		ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats);
1120 }
1121 
1122 static void dsa_user_get_eth_mac_stats(struct net_device *dev,
1123 				       struct ethtool_eth_mac_stats *mac_stats)
1124 {
1125 	struct dsa_port *dp = dsa_user_to_port(dev);
1126 	struct dsa_switch *ds = dp->ds;
1127 
1128 	if (ds->ops->get_eth_mac_stats)
1129 		ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats);
1130 }
1131 
1132 static void
1133 dsa_user_get_eth_ctrl_stats(struct net_device *dev,
1134 			    struct ethtool_eth_ctrl_stats *ctrl_stats)
1135 {
1136 	struct dsa_port *dp = dsa_user_to_port(dev);
1137 	struct dsa_switch *ds = dp->ds;
1138 
1139 	if (ds->ops->get_eth_ctrl_stats)
1140 		ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats);
1141 }
1142 
1143 static void
1144 dsa_user_get_rmon_stats(struct net_device *dev,
1145 			struct ethtool_rmon_stats *rmon_stats,
1146 			const struct ethtool_rmon_hist_range **ranges)
1147 {
1148 	struct dsa_port *dp = dsa_user_to_port(dev);
1149 	struct dsa_switch *ds = dp->ds;
1150 
1151 	if (ds->ops->get_rmon_stats)
1152 		ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges);
1153 }
1154 
1155 static void dsa_user_net_selftest(struct net_device *ndev,
1156 				  struct ethtool_test *etest, u64 *buf)
1157 {
1158 	struct dsa_port *dp = dsa_user_to_port(ndev);
1159 	struct dsa_switch *ds = dp->ds;
1160 
1161 	if (ds->ops->self_test) {
1162 		ds->ops->self_test(ds, dp->index, etest, buf);
1163 		return;
1164 	}
1165 
1166 	net_selftest(ndev, etest, buf);
1167 }
1168 
1169 static int dsa_user_get_mm(struct net_device *dev,
1170 			   struct ethtool_mm_state *state)
1171 {
1172 	struct dsa_port *dp = dsa_user_to_port(dev);
1173 	struct dsa_switch *ds = dp->ds;
1174 
1175 	if (!ds->ops->get_mm)
1176 		return -EOPNOTSUPP;
1177 
1178 	return ds->ops->get_mm(ds, dp->index, state);
1179 }
1180 
1181 static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg,
1182 			   struct netlink_ext_ack *extack)
1183 {
1184 	struct dsa_port *dp = dsa_user_to_port(dev);
1185 	struct dsa_switch *ds = dp->ds;
1186 
1187 	if (!ds->ops->set_mm)
1188 		return -EOPNOTSUPP;
1189 
1190 	return ds->ops->set_mm(ds, dp->index, cfg, extack);
1191 }
1192 
1193 static void dsa_user_get_mm_stats(struct net_device *dev,
1194 				  struct ethtool_mm_stats *stats)
1195 {
1196 	struct dsa_port *dp = dsa_user_to_port(dev);
1197 	struct dsa_switch *ds = dp->ds;
1198 
1199 	if (ds->ops->get_mm_stats)
1200 		ds->ops->get_mm_stats(ds, dp->index, stats);
1201 }
1202 
1203 static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w)
1204 {
1205 	struct dsa_port *dp = dsa_user_to_port(dev);
1206 	struct dsa_switch *ds = dp->ds;
1207 
1208 	phylink_ethtool_get_wol(dp->pl, w);
1209 
1210 	if (ds->ops->get_wol)
1211 		ds->ops->get_wol(ds, dp->index, w);
1212 }
1213 
1214 static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w)
1215 {
1216 	struct dsa_port *dp = dsa_user_to_port(dev);
1217 	struct dsa_switch *ds = dp->ds;
1218 	int ret = -EOPNOTSUPP;
1219 
1220 	phylink_ethtool_set_wol(dp->pl, w);
1221 
1222 	if (ds->ops->set_wol)
1223 		ret = ds->ops->set_wol(ds, dp->index, w);
1224 
1225 	return ret;
1226 }
1227 
1228 static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e)
1229 {
1230 	struct dsa_port *dp = dsa_user_to_port(dev);
1231 	struct dsa_switch *ds = dp->ds;
1232 	int ret;
1233 
1234 	/* Port's PHY and MAC both need to be EEE capable */
1235 	if (!dev->phydev || !dp->pl)
1236 		return -ENODEV;
1237 
1238 	if (!ds->ops->set_mac_eee)
1239 		return -EOPNOTSUPP;
1240 
1241 	ret = ds->ops->set_mac_eee(ds, dp->index, e);
1242 	if (ret)
1243 		return ret;
1244 
1245 	return phylink_ethtool_set_eee(dp->pl, e);
1246 }
1247 
1248 static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e)
1249 {
1250 	struct dsa_port *dp = dsa_user_to_port(dev);
1251 	struct dsa_switch *ds = dp->ds;
1252 	int ret;
1253 
1254 	/* Port's PHY and MAC both need to be EEE capable */
1255 	if (!dev->phydev || !dp->pl)
1256 		return -ENODEV;
1257 
1258 	if (!ds->ops->get_mac_eee)
1259 		return -EOPNOTSUPP;
1260 
1261 	ret = ds->ops->get_mac_eee(ds, dp->index, e);
1262 	if (ret)
1263 		return ret;
1264 
1265 	return phylink_ethtool_get_eee(dp->pl, e);
1266 }
1267 
1268 static int dsa_user_get_link_ksettings(struct net_device *dev,
1269 				       struct ethtool_link_ksettings *cmd)
1270 {
1271 	struct dsa_port *dp = dsa_user_to_port(dev);
1272 
1273 	return phylink_ethtool_ksettings_get(dp->pl, cmd);
1274 }
1275 
1276 static int dsa_user_set_link_ksettings(struct net_device *dev,
1277 				       const struct ethtool_link_ksettings *cmd)
1278 {
1279 	struct dsa_port *dp = dsa_user_to_port(dev);
1280 
1281 	return phylink_ethtool_ksettings_set(dp->pl, cmd);
1282 }
1283 
1284 static void dsa_user_get_pause_stats(struct net_device *dev,
1285 				     struct ethtool_pause_stats *pause_stats)
1286 {
1287 	struct dsa_port *dp = dsa_user_to_port(dev);
1288 	struct dsa_switch *ds = dp->ds;
1289 
1290 	if (ds->ops->get_pause_stats)
1291 		ds->ops->get_pause_stats(ds, dp->index, pause_stats);
1292 }
1293 
1294 static void dsa_user_get_pauseparam(struct net_device *dev,
1295 				    struct ethtool_pauseparam *pause)
1296 {
1297 	struct dsa_port *dp = dsa_user_to_port(dev);
1298 
1299 	phylink_ethtool_get_pauseparam(dp->pl, pause);
1300 }
1301 
1302 static int dsa_user_set_pauseparam(struct net_device *dev,
1303 				   struct ethtool_pauseparam *pause)
1304 {
1305 	struct dsa_port *dp = dsa_user_to_port(dev);
1306 
1307 	return phylink_ethtool_set_pauseparam(dp->pl, pause);
1308 }
1309 
1310 #ifdef CONFIG_NET_POLL_CONTROLLER
1311 static int dsa_user_netpoll_setup(struct net_device *dev,
1312 				  struct netpoll_info *ni)
1313 {
1314 	struct net_device *conduit = dsa_user_to_conduit(dev);
1315 	struct dsa_user_priv *p = netdev_priv(dev);
1316 	struct netpoll *netpoll;
1317 	int err = 0;
1318 
1319 	netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL);
1320 	if (!netpoll)
1321 		return -ENOMEM;
1322 
1323 	err = __netpoll_setup(netpoll, conduit);
1324 	if (err) {
1325 		kfree(netpoll);
1326 		goto out;
1327 	}
1328 
1329 	p->netpoll = netpoll;
1330 out:
1331 	return err;
1332 }
1333 
1334 static void dsa_user_netpoll_cleanup(struct net_device *dev)
1335 {
1336 	struct dsa_user_priv *p = netdev_priv(dev);
1337 	struct netpoll *netpoll = p->netpoll;
1338 
1339 	if (!netpoll)
1340 		return;
1341 
1342 	p->netpoll = NULL;
1343 
1344 	__netpoll_free(netpoll);
1345 }
1346 
1347 static void dsa_user_poll_controller(struct net_device *dev)
1348 {
1349 }
1350 #endif
1351 
1352 static struct dsa_mall_tc_entry *
1353 dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie)
1354 {
1355 	struct dsa_user_priv *p = netdev_priv(dev);
1356 	struct dsa_mall_tc_entry *mall_tc_entry;
1357 
1358 	list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list)
1359 		if (mall_tc_entry->cookie == cookie)
1360 			return mall_tc_entry;
1361 
1362 	return NULL;
1363 }
1364 
1365 static int
1366 dsa_user_add_cls_matchall_mirred(struct net_device *dev,
1367 				 struct tc_cls_matchall_offload *cls,
1368 				 bool ingress)
1369 {
1370 	struct netlink_ext_ack *extack = cls->common.extack;
1371 	struct dsa_port *dp = dsa_user_to_port(dev);
1372 	struct dsa_user_priv *p = netdev_priv(dev);
1373 	struct dsa_mall_mirror_tc_entry *mirror;
1374 	struct dsa_mall_tc_entry *mall_tc_entry;
1375 	struct dsa_switch *ds = dp->ds;
1376 	struct flow_action_entry *act;
1377 	struct dsa_port *to_dp;
1378 	int err;
1379 
1380 	if (!ds->ops->port_mirror_add)
1381 		return -EOPNOTSUPP;
1382 
1383 	if (!flow_action_basic_hw_stats_check(&cls->rule->action,
1384 					      cls->common.extack))
1385 		return -EOPNOTSUPP;
1386 
1387 	act = &cls->rule->action.entries[0];
1388 
1389 	if (!act->dev)
1390 		return -EINVAL;
1391 
1392 	if (!dsa_user_dev_check(act->dev))
1393 		return -EOPNOTSUPP;
1394 
1395 	to_dp = dsa_user_to_port(act->dev);
1396 
1397 	if (dp->ds != to_dp->ds) {
1398 		NL_SET_ERR_MSG_MOD(extack,
1399 				   "Cross-chip mirroring not implemented");
1400 		return -EOPNOTSUPP;
1401 	}
1402 
1403 	mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL);
1404 	if (!mall_tc_entry)
1405 		return -ENOMEM;
1406 
1407 	mall_tc_entry->cookie = cls->cookie;
1408 	mall_tc_entry->type = DSA_PORT_MALL_MIRROR;
1409 	mirror = &mall_tc_entry->mirror;
1410 	mirror->to_local_port = to_dp->index;
1411 	mirror->ingress = ingress;
1412 
1413 	err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack);
1414 	if (err) {
1415 		kfree(mall_tc_entry);
1416 		return err;
1417 	}
1418 
1419 	list_add_tail(&mall_tc_entry->list, &p->mall_tc_list);
1420 
1421 	return err;
1422 }
1423 
1424 static int
1425 dsa_user_add_cls_matchall_police(struct net_device *dev,
1426 				 struct tc_cls_matchall_offload *cls,
1427 				 bool ingress)
1428 {
1429 	struct netlink_ext_ack *extack = cls->common.extack;
1430 	struct dsa_port *dp = dsa_user_to_port(dev);
1431 	struct dsa_user_priv *p = netdev_priv(dev);
1432 	struct dsa_mall_policer_tc_entry *policer;
1433 	struct dsa_mall_tc_entry *mall_tc_entry;
1434 	struct dsa_switch *ds = dp->ds;
1435 	struct flow_action_entry *act;
1436 	int err;
1437 
1438 	if (!ds->ops->port_policer_add) {
1439 		NL_SET_ERR_MSG_MOD(extack,
1440 				   "Policing offload not implemented");
1441 		return -EOPNOTSUPP;
1442 	}
1443 
1444 	if (!ingress) {
1445 		NL_SET_ERR_MSG_MOD(extack,
1446 				   "Only supported on ingress qdisc");
1447 		return -EOPNOTSUPP;
1448 	}
1449 
1450 	if (!flow_action_basic_hw_stats_check(&cls->rule->action,
1451 					      cls->common.extack))
1452 		return -EOPNOTSUPP;
1453 
1454 	list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) {
1455 		if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) {
1456 			NL_SET_ERR_MSG_MOD(extack,
1457 					   "Only one port policer allowed");
1458 			return -EEXIST;
1459 		}
1460 	}
1461 
1462 	act = &cls->rule->action.entries[0];
1463 
1464 	mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL);
1465 	if (!mall_tc_entry)
1466 		return -ENOMEM;
1467 
1468 	mall_tc_entry->cookie = cls->cookie;
1469 	mall_tc_entry->type = DSA_PORT_MALL_POLICER;
1470 	policer = &mall_tc_entry->policer;
1471 	policer->rate_bytes_per_sec = act->police.rate_bytes_ps;
1472 	policer->burst = act->police.burst;
1473 
1474 	err = ds->ops->port_policer_add(ds, dp->index, policer);
1475 	if (err) {
1476 		kfree(mall_tc_entry);
1477 		return err;
1478 	}
1479 
1480 	list_add_tail(&mall_tc_entry->list, &p->mall_tc_list);
1481 
1482 	return err;
1483 }
1484 
1485 static int dsa_user_add_cls_matchall(struct net_device *dev,
1486 				     struct tc_cls_matchall_offload *cls,
1487 				     bool ingress)
1488 {
1489 	int err = -EOPNOTSUPP;
1490 
1491 	if (cls->common.protocol == htons(ETH_P_ALL) &&
1492 	    flow_offload_has_one_action(&cls->rule->action) &&
1493 	    cls->rule->action.entries[0].id == FLOW_ACTION_MIRRED)
1494 		err = dsa_user_add_cls_matchall_mirred(dev, cls, ingress);
1495 	else if (flow_offload_has_one_action(&cls->rule->action) &&
1496 		 cls->rule->action.entries[0].id == FLOW_ACTION_POLICE)
1497 		err = dsa_user_add_cls_matchall_police(dev, cls, ingress);
1498 
1499 	return err;
1500 }
1501 
1502 static void dsa_user_del_cls_matchall(struct net_device *dev,
1503 				      struct tc_cls_matchall_offload *cls)
1504 {
1505 	struct dsa_port *dp = dsa_user_to_port(dev);
1506 	struct dsa_mall_tc_entry *mall_tc_entry;
1507 	struct dsa_switch *ds = dp->ds;
1508 
1509 	mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie);
1510 	if (!mall_tc_entry)
1511 		return;
1512 
1513 	list_del(&mall_tc_entry->list);
1514 
1515 	switch (mall_tc_entry->type) {
1516 	case DSA_PORT_MALL_MIRROR:
1517 		if (ds->ops->port_mirror_del)
1518 			ds->ops->port_mirror_del(ds, dp->index,
1519 						 &mall_tc_entry->mirror);
1520 		break;
1521 	case DSA_PORT_MALL_POLICER:
1522 		if (ds->ops->port_policer_del)
1523 			ds->ops->port_policer_del(ds, dp->index);
1524 		break;
1525 	default:
1526 		WARN_ON(1);
1527 	}
1528 
1529 	kfree(mall_tc_entry);
1530 }
1531 
1532 static int dsa_user_setup_tc_cls_matchall(struct net_device *dev,
1533 					  struct tc_cls_matchall_offload *cls,
1534 					  bool ingress)
1535 {
1536 	if (cls->common.chain_index)
1537 		return -EOPNOTSUPP;
1538 
1539 	switch (cls->command) {
1540 	case TC_CLSMATCHALL_REPLACE:
1541 		return dsa_user_add_cls_matchall(dev, cls, ingress);
1542 	case TC_CLSMATCHALL_DESTROY:
1543 		dsa_user_del_cls_matchall(dev, cls);
1544 		return 0;
1545 	default:
1546 		return -EOPNOTSUPP;
1547 	}
1548 }
1549 
1550 static int dsa_user_add_cls_flower(struct net_device *dev,
1551 				   struct flow_cls_offload *cls,
1552 				   bool ingress)
1553 {
1554 	struct dsa_port *dp = dsa_user_to_port(dev);
1555 	struct dsa_switch *ds = dp->ds;
1556 	int port = dp->index;
1557 
1558 	if (!ds->ops->cls_flower_add)
1559 		return -EOPNOTSUPP;
1560 
1561 	return ds->ops->cls_flower_add(ds, port, cls, ingress);
1562 }
1563 
1564 static int dsa_user_del_cls_flower(struct net_device *dev,
1565 				   struct flow_cls_offload *cls,
1566 				   bool ingress)
1567 {
1568 	struct dsa_port *dp = dsa_user_to_port(dev);
1569 	struct dsa_switch *ds = dp->ds;
1570 	int port = dp->index;
1571 
1572 	if (!ds->ops->cls_flower_del)
1573 		return -EOPNOTSUPP;
1574 
1575 	return ds->ops->cls_flower_del(ds, port, cls, ingress);
1576 }
1577 
1578 static int dsa_user_stats_cls_flower(struct net_device *dev,
1579 				     struct flow_cls_offload *cls,
1580 				     bool ingress)
1581 {
1582 	struct dsa_port *dp = dsa_user_to_port(dev);
1583 	struct dsa_switch *ds = dp->ds;
1584 	int port = dp->index;
1585 
1586 	if (!ds->ops->cls_flower_stats)
1587 		return -EOPNOTSUPP;
1588 
1589 	return ds->ops->cls_flower_stats(ds, port, cls, ingress);
1590 }
1591 
1592 static int dsa_user_setup_tc_cls_flower(struct net_device *dev,
1593 					struct flow_cls_offload *cls,
1594 					bool ingress)
1595 {
1596 	switch (cls->command) {
1597 	case FLOW_CLS_REPLACE:
1598 		return dsa_user_add_cls_flower(dev, cls, ingress);
1599 	case FLOW_CLS_DESTROY:
1600 		return dsa_user_del_cls_flower(dev, cls, ingress);
1601 	case FLOW_CLS_STATS:
1602 		return dsa_user_stats_cls_flower(dev, cls, ingress);
1603 	default:
1604 		return -EOPNOTSUPP;
1605 	}
1606 }
1607 
1608 static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data,
1609 				      void *cb_priv, bool ingress)
1610 {
1611 	struct net_device *dev = cb_priv;
1612 
1613 	if (!tc_can_offload(dev))
1614 		return -EOPNOTSUPP;
1615 
1616 	switch (type) {
1617 	case TC_SETUP_CLSMATCHALL:
1618 		return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress);
1619 	case TC_SETUP_CLSFLOWER:
1620 		return dsa_user_setup_tc_cls_flower(dev, type_data, ingress);
1621 	default:
1622 		return -EOPNOTSUPP;
1623 	}
1624 }
1625 
1626 static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type,
1627 					 void *type_data, void *cb_priv)
1628 {
1629 	return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true);
1630 }
1631 
1632 static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type,
1633 					 void *type_data, void *cb_priv)
1634 {
1635 	return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false);
1636 }
1637 
1638 static LIST_HEAD(dsa_user_block_cb_list);
1639 
1640 static int dsa_user_setup_tc_block(struct net_device *dev,
1641 				   struct flow_block_offload *f)
1642 {
1643 	struct flow_block_cb *block_cb;
1644 	flow_setup_cb_t *cb;
1645 
1646 	if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS)
1647 		cb = dsa_user_setup_tc_block_cb_ig;
1648 	else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS)
1649 		cb = dsa_user_setup_tc_block_cb_eg;
1650 	else
1651 		return -EOPNOTSUPP;
1652 
1653 	f->driver_block_list = &dsa_user_block_cb_list;
1654 
1655 	switch (f->command) {
1656 	case FLOW_BLOCK_BIND:
1657 		if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list))
1658 			return -EBUSY;
1659 
1660 		block_cb = flow_block_cb_alloc(cb, dev, dev, NULL);
1661 		if (IS_ERR(block_cb))
1662 			return PTR_ERR(block_cb);
1663 
1664 		flow_block_cb_add(block_cb, f);
1665 		list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list);
1666 		return 0;
1667 	case FLOW_BLOCK_UNBIND:
1668 		block_cb = flow_block_cb_lookup(f->block, cb, dev);
1669 		if (!block_cb)
1670 			return -ENOENT;
1671 
1672 		flow_block_cb_remove(block_cb, f);
1673 		list_del(&block_cb->driver_list);
1674 		return 0;
1675 	default:
1676 		return -EOPNOTSUPP;
1677 	}
1678 }
1679 
1680 static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port,
1681 				   void *type_data)
1682 {
1683 	struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port));
1684 
1685 	if (!conduit->netdev_ops->ndo_setup_tc)
1686 		return -EOPNOTSUPP;
1687 
1688 	return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data);
1689 }
1690 
1691 static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type,
1692 			     void *type_data)
1693 {
1694 	struct dsa_port *dp = dsa_user_to_port(dev);
1695 	struct dsa_switch *ds = dp->ds;
1696 
1697 	switch (type) {
1698 	case TC_SETUP_BLOCK:
1699 		return dsa_user_setup_tc_block(dev, type_data);
1700 	case TC_SETUP_FT:
1701 		return dsa_user_setup_ft_block(ds, dp->index, type_data);
1702 	default:
1703 		break;
1704 	}
1705 
1706 	if (!ds->ops->port_setup_tc)
1707 		return -EOPNOTSUPP;
1708 
1709 	return ds->ops->port_setup_tc(ds, dp->index, type, type_data);
1710 }
1711 
1712 static int dsa_user_get_rxnfc(struct net_device *dev,
1713 			      struct ethtool_rxnfc *nfc, u32 *rule_locs)
1714 {
1715 	struct dsa_port *dp = dsa_user_to_port(dev);
1716 	struct dsa_switch *ds = dp->ds;
1717 
1718 	if (!ds->ops->get_rxnfc)
1719 		return -EOPNOTSUPP;
1720 
1721 	return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs);
1722 }
1723 
1724 static int dsa_user_set_rxnfc(struct net_device *dev,
1725 			      struct ethtool_rxnfc *nfc)
1726 {
1727 	struct dsa_port *dp = dsa_user_to_port(dev);
1728 	struct dsa_switch *ds = dp->ds;
1729 
1730 	if (!ds->ops->set_rxnfc)
1731 		return -EOPNOTSUPP;
1732 
1733 	return ds->ops->set_rxnfc(ds, dp->index, nfc);
1734 }
1735 
1736 static int dsa_user_get_ts_info(struct net_device *dev,
1737 				struct kernel_ethtool_ts_info *ts)
1738 {
1739 	struct dsa_user_priv *p = netdev_priv(dev);
1740 	struct dsa_switch *ds = p->dp->ds;
1741 
1742 	if (!ds->ops->get_ts_info)
1743 		return -EOPNOTSUPP;
1744 
1745 	return ds->ops->get_ts_info(ds, p->dp->index, ts);
1746 }
1747 
1748 static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto,
1749 				    u16 vid)
1750 {
1751 	struct dsa_port *dp = dsa_user_to_port(dev);
1752 	struct switchdev_obj_port_vlan vlan = {
1753 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
1754 		.vid = vid,
1755 		/* This API only allows programming tagged, non-PVID VIDs */
1756 		.flags = 0,
1757 	};
1758 	struct netlink_ext_ack extack = {0};
1759 	struct dsa_switch *ds = dp->ds;
1760 	struct netdev_hw_addr *ha;
1761 	struct dsa_vlan *v;
1762 	int ret;
1763 
1764 	/* User port... */
1765 	ret = dsa_port_vlan_add(dp, &vlan, &extack);
1766 	if (ret) {
1767 		if (extack._msg)
1768 			netdev_err(dev, "%s\n", extack._msg);
1769 		return ret;
1770 	}
1771 
1772 	/* And CPU port... */
1773 	ret = dsa_port_host_vlan_add(dp, &vlan, &extack);
1774 	if (ret) {
1775 		if (extack._msg)
1776 			netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index,
1777 				   extack._msg);
1778 		return ret;
1779 	}
1780 
1781 	if (!dsa_switch_supports_uc_filtering(ds) &&
1782 	    !dsa_switch_supports_mc_filtering(ds))
1783 		return 0;
1784 
1785 	v = kzalloc(sizeof(*v), GFP_KERNEL);
1786 	if (!v) {
1787 		ret = -ENOMEM;
1788 		goto rollback;
1789 	}
1790 
1791 	netif_addr_lock_bh(dev);
1792 
1793 	v->vid = vid;
1794 	list_add_tail(&v->list, &dp->user_vlans);
1795 
1796 	if (dsa_switch_supports_mc_filtering(ds)) {
1797 		netdev_for_each_synced_mc_addr(ha, dev) {
1798 			dsa_user_schedule_standalone_work(dev, DSA_MC_ADD,
1799 							  ha->addr, vid);
1800 		}
1801 	}
1802 
1803 	if (dsa_switch_supports_uc_filtering(ds)) {
1804 		netdev_for_each_synced_uc_addr(ha, dev) {
1805 			dsa_user_schedule_standalone_work(dev, DSA_UC_ADD,
1806 							  ha->addr, vid);
1807 		}
1808 	}
1809 
1810 	netif_addr_unlock_bh(dev);
1811 
1812 	dsa_flush_workqueue();
1813 
1814 	return 0;
1815 
1816 rollback:
1817 	dsa_port_host_vlan_del(dp, &vlan);
1818 	dsa_port_vlan_del(dp, &vlan);
1819 
1820 	return ret;
1821 }
1822 
1823 static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto,
1824 				     u16 vid)
1825 {
1826 	struct dsa_port *dp = dsa_user_to_port(dev);
1827 	struct switchdev_obj_port_vlan vlan = {
1828 		.vid = vid,
1829 		/* This API only allows programming tagged, non-PVID VIDs */
1830 		.flags = 0,
1831 	};
1832 	struct dsa_switch *ds = dp->ds;
1833 	struct netdev_hw_addr *ha;
1834 	struct dsa_vlan *v;
1835 	int err;
1836 
1837 	err = dsa_port_vlan_del(dp, &vlan);
1838 	if (err)
1839 		return err;
1840 
1841 	err = dsa_port_host_vlan_del(dp, &vlan);
1842 	if (err)
1843 		return err;
1844 
1845 	if (!dsa_switch_supports_uc_filtering(ds) &&
1846 	    !dsa_switch_supports_mc_filtering(ds))
1847 		return 0;
1848 
1849 	netif_addr_lock_bh(dev);
1850 
1851 	v = dsa_vlan_find(&dp->user_vlans, &vlan);
1852 	if (!v) {
1853 		netif_addr_unlock_bh(dev);
1854 		return -ENOENT;
1855 	}
1856 
1857 	list_del(&v->list);
1858 	kfree(v);
1859 
1860 	if (dsa_switch_supports_mc_filtering(ds)) {
1861 		netdev_for_each_synced_mc_addr(ha, dev) {
1862 			dsa_user_schedule_standalone_work(dev, DSA_MC_DEL,
1863 							  ha->addr, vid);
1864 		}
1865 	}
1866 
1867 	if (dsa_switch_supports_uc_filtering(ds)) {
1868 		netdev_for_each_synced_uc_addr(ha, dev) {
1869 			dsa_user_schedule_standalone_work(dev, DSA_UC_DEL,
1870 							  ha->addr, vid);
1871 		}
1872 	}
1873 
1874 	netif_addr_unlock_bh(dev);
1875 
1876 	dsa_flush_workqueue();
1877 
1878 	return 0;
1879 }
1880 
1881 static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg)
1882 {
1883 	__be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q);
1884 
1885 	return dsa_user_vlan_rx_add_vid(arg, proto, vid);
1886 }
1887 
1888 static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg)
1889 {
1890 	__be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q);
1891 
1892 	return dsa_user_vlan_rx_kill_vid(arg, proto, vid);
1893 }
1894 
1895 /* Keep the VLAN RX filtering list in sync with the hardware only if VLAN
1896  * filtering is enabled. The baseline is that only ports that offload a
1897  * VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware,
1898  * but there are exceptions for quirky hardware.
1899  *
1900  * If ds->vlan_filtering_is_global = true, then standalone ports which share
1901  * the same switch with other ports that offload a VLAN-aware bridge are also
1902  * inevitably VLAN-aware.
1903  *
1904  * To summarize, a DSA switch port offloads:
1905  *
1906  * - If standalone (this includes software bridge, software LAG):
1907  *     - if ds->needs_standalone_vlan_filtering = true, OR if
1908  *       (ds->vlan_filtering_is_global = true AND there are bridges spanning
1909  *       this switch chip which have vlan_filtering=1)
1910  *         - the 8021q upper VLANs
1911  *     - else (standalone VLAN filtering is not needed, VLAN filtering is not
1912  *       global, or it is, but no port is under a VLAN-aware bridge):
1913  *         - no VLAN (any 8021q upper is a software VLAN)
1914  *
1915  * - If under a vlan_filtering=0 bridge which it offload:
1916  *     - if ds->configure_vlan_while_not_filtering = true (default):
1917  *         - the bridge VLANs. These VLANs are committed to hardware but inactive.
1918  *     - else (deprecated):
1919  *         - no VLAN. The bridge VLANs are not restored when VLAN awareness is
1920  *           enabled, so this behavior is broken and discouraged.
1921  *
1922  * - If under a vlan_filtering=1 bridge which it offload:
1923  *     - the bridge VLANs
1924  *     - the 8021q upper VLANs
1925  */
1926 int dsa_user_manage_vlan_filtering(struct net_device *user,
1927 				   bool vlan_filtering)
1928 {
1929 	int err;
1930 
1931 	if (vlan_filtering) {
1932 		user->features |= NETIF_F_HW_VLAN_CTAG_FILTER;
1933 
1934 		err = vlan_for_each(user, dsa_user_restore_vlan, user);
1935 		if (err) {
1936 			vlan_for_each(user, dsa_user_clear_vlan, user);
1937 			user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER;
1938 			return err;
1939 		}
1940 	} else {
1941 		err = vlan_for_each(user, dsa_user_clear_vlan, user);
1942 		if (err)
1943 			return err;
1944 
1945 		user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER;
1946 	}
1947 
1948 	return 0;
1949 }
1950 
1951 struct dsa_hw_port {
1952 	struct list_head list;
1953 	struct net_device *dev;
1954 	int old_mtu;
1955 };
1956 
1957 static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu)
1958 {
1959 	const struct dsa_hw_port *p;
1960 	int err;
1961 
1962 	list_for_each_entry(p, hw_port_list, list) {
1963 		if (p->dev->mtu == mtu)
1964 			continue;
1965 
1966 		err = dev_set_mtu(p->dev, mtu);
1967 		if (err)
1968 			goto rollback;
1969 	}
1970 
1971 	return 0;
1972 
1973 rollback:
1974 	list_for_each_entry_continue_reverse(p, hw_port_list, list) {
1975 		if (p->dev->mtu == p->old_mtu)
1976 			continue;
1977 
1978 		if (dev_set_mtu(p->dev, p->old_mtu))
1979 			netdev_err(p->dev, "Failed to restore MTU\n");
1980 	}
1981 
1982 	return err;
1983 }
1984 
1985 static void dsa_hw_port_list_free(struct list_head *hw_port_list)
1986 {
1987 	struct dsa_hw_port *p, *n;
1988 
1989 	list_for_each_entry_safe(p, n, hw_port_list, list)
1990 		kfree(p);
1991 }
1992 
1993 /* Make the hardware datapath to/from @dev limited to a common MTU */
1994 static void dsa_bridge_mtu_normalization(struct dsa_port *dp)
1995 {
1996 	struct list_head hw_port_list;
1997 	struct dsa_switch_tree *dst;
1998 	int min_mtu = ETH_MAX_MTU;
1999 	struct dsa_port *other_dp;
2000 	int err;
2001 
2002 	if (!dp->ds->mtu_enforcement_ingress)
2003 		return;
2004 
2005 	if (!dp->bridge)
2006 		return;
2007 
2008 	INIT_LIST_HEAD(&hw_port_list);
2009 
2010 	/* Populate the list of ports that are part of the same bridge
2011 	 * as the newly added/modified port
2012 	 */
2013 	list_for_each_entry(dst, &dsa_tree_list, list) {
2014 		list_for_each_entry(other_dp, &dst->ports, list) {
2015 			struct dsa_hw_port *hw_port;
2016 			struct net_device *user;
2017 
2018 			if (other_dp->type != DSA_PORT_TYPE_USER)
2019 				continue;
2020 
2021 			if (!dsa_port_bridge_same(dp, other_dp))
2022 				continue;
2023 
2024 			if (!other_dp->ds->mtu_enforcement_ingress)
2025 				continue;
2026 
2027 			user = other_dp->user;
2028 
2029 			if (min_mtu > user->mtu)
2030 				min_mtu = user->mtu;
2031 
2032 			hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL);
2033 			if (!hw_port)
2034 				goto out;
2035 
2036 			hw_port->dev = user;
2037 			hw_port->old_mtu = user->mtu;
2038 
2039 			list_add(&hw_port->list, &hw_port_list);
2040 		}
2041 	}
2042 
2043 	/* Attempt to configure the entire hardware bridge to the newly added
2044 	 * interface's MTU first, regardless of whether the intention of the
2045 	 * user was to raise or lower it.
2046 	 */
2047 	err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu);
2048 	if (!err)
2049 		goto out;
2050 
2051 	/* Clearly that didn't work out so well, so just set the minimum MTU on
2052 	 * all hardware bridge ports now. If this fails too, then all ports will
2053 	 * still have their old MTU rolled back anyway.
2054 	 */
2055 	dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu);
2056 
2057 out:
2058 	dsa_hw_port_list_free(&hw_port_list);
2059 }
2060 
2061 int dsa_user_change_mtu(struct net_device *dev, int new_mtu)
2062 {
2063 	struct net_device *conduit = dsa_user_to_conduit(dev);
2064 	struct dsa_port *dp = dsa_user_to_port(dev);
2065 	struct dsa_port *cpu_dp = dp->cpu_dp;
2066 	struct dsa_switch *ds = dp->ds;
2067 	struct dsa_port *other_dp;
2068 	int largest_mtu = 0;
2069 	int new_conduit_mtu;
2070 	int old_conduit_mtu;
2071 	int mtu_limit;
2072 	int overhead;
2073 	int cpu_mtu;
2074 	int err;
2075 
2076 	if (!ds->ops->port_change_mtu)
2077 		return -EOPNOTSUPP;
2078 
2079 	dsa_tree_for_each_user_port(other_dp, ds->dst) {
2080 		int user_mtu;
2081 
2082 		/* During probe, this function will be called for each user
2083 		 * device, while not all of them have been allocated. That's
2084 		 * ok, it doesn't change what the maximum is, so ignore it.
2085 		 */
2086 		if (!other_dp->user)
2087 			continue;
2088 
2089 		/* Pretend that we already applied the setting, which we
2090 		 * actually haven't (still haven't done all integrity checks)
2091 		 */
2092 		if (dp == other_dp)
2093 			user_mtu = new_mtu;
2094 		else
2095 			user_mtu = other_dp->user->mtu;
2096 
2097 		if (largest_mtu < user_mtu)
2098 			largest_mtu = user_mtu;
2099 	}
2100 
2101 	overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops);
2102 	mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead);
2103 	old_conduit_mtu = conduit->mtu;
2104 	new_conduit_mtu = largest_mtu + overhead;
2105 	if (new_conduit_mtu > mtu_limit)
2106 		return -ERANGE;
2107 
2108 	/* If the conduit MTU isn't over limit, there's no need to check the CPU
2109 	 * MTU, since that surely isn't either.
2110 	 */
2111 	cpu_mtu = largest_mtu;
2112 
2113 	/* Start applying stuff */
2114 	if (new_conduit_mtu != old_conduit_mtu) {
2115 		err = dev_set_mtu(conduit, new_conduit_mtu);
2116 		if (err < 0)
2117 			goto out_conduit_failed;
2118 
2119 		/* We only need to propagate the MTU of the CPU port to
2120 		 * upstream switches, so emit a notifier which updates them.
2121 		 */
2122 		err = dsa_port_mtu_change(cpu_dp, cpu_mtu);
2123 		if (err)
2124 			goto out_cpu_failed;
2125 	}
2126 
2127 	err = ds->ops->port_change_mtu(ds, dp->index, new_mtu);
2128 	if (err)
2129 		goto out_port_failed;
2130 
2131 	WRITE_ONCE(dev->mtu, new_mtu);
2132 
2133 	dsa_bridge_mtu_normalization(dp);
2134 
2135 	return 0;
2136 
2137 out_port_failed:
2138 	if (new_conduit_mtu != old_conduit_mtu)
2139 		dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead);
2140 out_cpu_failed:
2141 	if (new_conduit_mtu != old_conduit_mtu)
2142 		dev_set_mtu(conduit, old_conduit_mtu);
2143 out_conduit_failed:
2144 	return err;
2145 }
2146 
2147 static int __maybe_unused
2148 dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel)
2149 {
2150 	struct dsa_port *dp = dsa_user_to_port(dev);
2151 	struct dsa_switch *ds = dp->ds;
2152 	int port = dp->index;
2153 
2154 	if (!ds->ops->port_set_apptrust)
2155 		return -EOPNOTSUPP;
2156 
2157 	return ds->ops->port_set_apptrust(ds, port, sel, nsel);
2158 }
2159 
2160 static int __maybe_unused
2161 dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel)
2162 {
2163 	struct dsa_port *dp = dsa_user_to_port(dev);
2164 	struct dsa_switch *ds = dp->ds;
2165 	int port = dp->index;
2166 
2167 	if (!ds->ops->port_get_apptrust)
2168 		return -EOPNOTSUPP;
2169 
2170 	return ds->ops->port_get_apptrust(ds, port, sel, nsel);
2171 }
2172 
2173 static int __maybe_unused
2174 dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app)
2175 {
2176 	struct dsa_port *dp = dsa_user_to_port(dev);
2177 	struct dsa_switch *ds = dp->ds;
2178 	unsigned long mask, new_prio;
2179 	int err, port = dp->index;
2180 
2181 	if (!ds->ops->port_set_default_prio)
2182 		return -EOPNOTSUPP;
2183 
2184 	err = dcb_ieee_setapp(dev, app);
2185 	if (err)
2186 		return err;
2187 
2188 	mask = dcb_ieee_getapp_mask(dev, app);
2189 	new_prio = __fls(mask);
2190 
2191 	err = ds->ops->port_set_default_prio(ds, port, new_prio);
2192 	if (err) {
2193 		dcb_ieee_delapp(dev, app);
2194 		return err;
2195 	}
2196 
2197 	return 0;
2198 }
2199 
2200 /* Update the DSCP prio entries on all user ports of the switch in case
2201  * the switch supports global DSCP prio instead of per port DSCP prios.
2202  */
2203 static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev,
2204 						  struct dcb_app *app, bool del)
2205 {
2206 	int (*setdel)(struct net_device *dev, struct dcb_app *app);
2207 	struct dsa_port *dp = dsa_user_to_port(dev);
2208 	struct dsa_switch *ds = dp->ds;
2209 	struct dsa_port *other_dp;
2210 	int err, restore_err;
2211 
2212 	if (del)
2213 		setdel = dcb_ieee_delapp;
2214 	else
2215 		setdel = dcb_ieee_setapp;
2216 
2217 	dsa_switch_for_each_user_port(other_dp, ds) {
2218 		struct net_device *user = other_dp->user;
2219 
2220 		if (!user || user == dev)
2221 			continue;
2222 
2223 		err = setdel(user, app);
2224 		if (err)
2225 			goto err_try_to_restore;
2226 	}
2227 
2228 	return 0;
2229 
2230 err_try_to_restore:
2231 
2232 	/* Revert logic to restore previous state of app entries */
2233 	if (!del)
2234 		setdel = dcb_ieee_delapp;
2235 	else
2236 		setdel = dcb_ieee_setapp;
2237 
2238 	dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) {
2239 		struct net_device *user = other_dp->user;
2240 
2241 		if (!user || user == dev)
2242 			continue;
2243 
2244 		restore_err = setdel(user, app);
2245 		if (restore_err)
2246 			netdev_err(user, "Failed to restore DSCP prio entry configuration\n");
2247 	}
2248 
2249 	return err;
2250 }
2251 
2252 static int __maybe_unused
2253 dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app)
2254 {
2255 	struct dsa_port *dp = dsa_user_to_port(dev);
2256 	struct dsa_switch *ds = dp->ds;
2257 	unsigned long mask, new_prio;
2258 	int err, port = dp->index;
2259 	u8 dscp = app->protocol;
2260 
2261 	if (!ds->ops->port_add_dscp_prio)
2262 		return -EOPNOTSUPP;
2263 
2264 	if (dscp >= 64) {
2265 		netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n",
2266 			   dscp);
2267 		return -EINVAL;
2268 	}
2269 
2270 	err = dcb_ieee_setapp(dev, app);
2271 	if (err)
2272 		return err;
2273 
2274 	mask = dcb_ieee_getapp_mask(dev, app);
2275 	new_prio = __fls(mask);
2276 
2277 	err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio);
2278 	if (err) {
2279 		dcb_ieee_delapp(dev, app);
2280 		return err;
2281 	}
2282 
2283 	if (!ds->dscp_prio_mapping_is_global)
2284 		return 0;
2285 
2286 	err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false);
2287 	if (err) {
2288 		if (ds->ops->port_del_dscp_prio)
2289 			ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio);
2290 		dcb_ieee_delapp(dev, app);
2291 		return err;
2292 	}
2293 
2294 	return 0;
2295 }
2296 
2297 static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev,
2298 						     struct dcb_app *app)
2299 {
2300 	switch (app->selector) {
2301 	case IEEE_8021QAZ_APP_SEL_ETHERTYPE:
2302 		switch (app->protocol) {
2303 		case 0:
2304 			return dsa_user_dcbnl_set_default_prio(dev, app);
2305 		default:
2306 			return -EOPNOTSUPP;
2307 		}
2308 		break;
2309 	case IEEE_8021QAZ_APP_SEL_DSCP:
2310 		return dsa_user_dcbnl_add_dscp_prio(dev, app);
2311 	default:
2312 		return -EOPNOTSUPP;
2313 	}
2314 }
2315 
2316 static int __maybe_unused
2317 dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app)
2318 {
2319 	struct dsa_port *dp = dsa_user_to_port(dev);
2320 	struct dsa_switch *ds = dp->ds;
2321 	unsigned long mask, new_prio;
2322 	int err, port = dp->index;
2323 
2324 	if (!ds->ops->port_set_default_prio)
2325 		return -EOPNOTSUPP;
2326 
2327 	err = dcb_ieee_delapp(dev, app);
2328 	if (err)
2329 		return err;
2330 
2331 	mask = dcb_ieee_getapp_mask(dev, app);
2332 	new_prio = mask ? __fls(mask) : 0;
2333 
2334 	err = ds->ops->port_set_default_prio(ds, port, new_prio);
2335 	if (err) {
2336 		dcb_ieee_setapp(dev, app);
2337 		return err;
2338 	}
2339 
2340 	return 0;
2341 }
2342 
2343 static int __maybe_unused
2344 dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app)
2345 {
2346 	struct dsa_port *dp = dsa_user_to_port(dev);
2347 	struct dsa_switch *ds = dp->ds;
2348 	int err, port = dp->index;
2349 	u8 dscp = app->protocol;
2350 
2351 	if (!ds->ops->port_del_dscp_prio)
2352 		return -EOPNOTSUPP;
2353 
2354 	err = dcb_ieee_delapp(dev, app);
2355 	if (err)
2356 		return err;
2357 
2358 	err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority);
2359 	if (err) {
2360 		dcb_ieee_setapp(dev, app);
2361 		return err;
2362 	}
2363 
2364 	if (!ds->dscp_prio_mapping_is_global)
2365 		return 0;
2366 
2367 	err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true);
2368 	if (err) {
2369 		if (ds->ops->port_add_dscp_prio)
2370 			ds->ops->port_add_dscp_prio(ds, port, dscp,
2371 						    app->priority);
2372 		dcb_ieee_setapp(dev, app);
2373 		return err;
2374 	}
2375 
2376 	return 0;
2377 }
2378 
2379 static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev,
2380 						     struct dcb_app *app)
2381 {
2382 	switch (app->selector) {
2383 	case IEEE_8021QAZ_APP_SEL_ETHERTYPE:
2384 		switch (app->protocol) {
2385 		case 0:
2386 			return dsa_user_dcbnl_del_default_prio(dev, app);
2387 		default:
2388 			return -EOPNOTSUPP;
2389 		}
2390 		break;
2391 	case IEEE_8021QAZ_APP_SEL_DSCP:
2392 		return dsa_user_dcbnl_del_dscp_prio(dev, app);
2393 	default:
2394 		return -EOPNOTSUPP;
2395 	}
2396 }
2397 
2398 /* Pre-populate the DCB application priority table with the priorities
2399  * configured during switch setup, which we read from hardware here.
2400  */
2401 static int dsa_user_dcbnl_init(struct net_device *dev)
2402 {
2403 	struct dsa_port *dp = dsa_user_to_port(dev);
2404 	struct dsa_switch *ds = dp->ds;
2405 	int port = dp->index;
2406 	int err;
2407 
2408 	if (ds->ops->port_get_default_prio) {
2409 		int prio = ds->ops->port_get_default_prio(ds, port);
2410 		struct dcb_app app = {
2411 			.selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE,
2412 			.protocol = 0,
2413 			.priority = prio,
2414 		};
2415 
2416 		if (prio < 0)
2417 			return prio;
2418 
2419 		err = dcb_ieee_setapp(dev, &app);
2420 		if (err)
2421 			return err;
2422 	}
2423 
2424 	if (ds->ops->port_get_dscp_prio) {
2425 		int protocol;
2426 
2427 		for (protocol = 0; protocol < 64; protocol++) {
2428 			struct dcb_app app = {
2429 				.selector = IEEE_8021QAZ_APP_SEL_DSCP,
2430 				.protocol = protocol,
2431 			};
2432 			int prio;
2433 
2434 			prio = ds->ops->port_get_dscp_prio(ds, port, protocol);
2435 			if (prio == -EOPNOTSUPP)
2436 				continue;
2437 			if (prio < 0)
2438 				return prio;
2439 
2440 			app.priority = prio;
2441 
2442 			err = dcb_ieee_setapp(dev, &app);
2443 			if (err)
2444 				return err;
2445 		}
2446 	}
2447 
2448 	return 0;
2449 }
2450 
2451 static const struct ethtool_ops dsa_user_ethtool_ops = {
2452 	.get_drvinfo		= dsa_user_get_drvinfo,
2453 	.get_regs_len		= dsa_user_get_regs_len,
2454 	.get_regs		= dsa_user_get_regs,
2455 	.nway_reset		= dsa_user_nway_reset,
2456 	.get_link		= ethtool_op_get_link,
2457 	.get_eeprom_len		= dsa_user_get_eeprom_len,
2458 	.get_eeprom		= dsa_user_get_eeprom,
2459 	.set_eeprom		= dsa_user_set_eeprom,
2460 	.get_strings		= dsa_user_get_strings,
2461 	.get_ethtool_stats	= dsa_user_get_ethtool_stats,
2462 	.get_sset_count		= dsa_user_get_sset_count,
2463 	.get_eth_phy_stats	= dsa_user_get_eth_phy_stats,
2464 	.get_eth_mac_stats	= dsa_user_get_eth_mac_stats,
2465 	.get_eth_ctrl_stats	= dsa_user_get_eth_ctrl_stats,
2466 	.get_rmon_stats		= dsa_user_get_rmon_stats,
2467 	.set_wol		= dsa_user_set_wol,
2468 	.get_wol		= dsa_user_get_wol,
2469 	.set_eee		= dsa_user_set_eee,
2470 	.get_eee		= dsa_user_get_eee,
2471 	.get_link_ksettings	= dsa_user_get_link_ksettings,
2472 	.set_link_ksettings	= dsa_user_set_link_ksettings,
2473 	.get_pause_stats	= dsa_user_get_pause_stats,
2474 	.get_pauseparam		= dsa_user_get_pauseparam,
2475 	.set_pauseparam		= dsa_user_set_pauseparam,
2476 	.get_rxnfc		= dsa_user_get_rxnfc,
2477 	.set_rxnfc		= dsa_user_set_rxnfc,
2478 	.get_ts_info		= dsa_user_get_ts_info,
2479 	.self_test		= dsa_user_net_selftest,
2480 	.get_mm			= dsa_user_get_mm,
2481 	.set_mm			= dsa_user_set_mm,
2482 	.get_mm_stats		= dsa_user_get_mm_stats,
2483 };
2484 
2485 static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = {
2486 	.ieee_setapp		= dsa_user_dcbnl_ieee_setapp,
2487 	.ieee_delapp		= dsa_user_dcbnl_ieee_delapp,
2488 	.dcbnl_setapptrust	= dsa_user_dcbnl_set_apptrust,
2489 	.dcbnl_getapptrust	= dsa_user_dcbnl_get_apptrust,
2490 };
2491 
2492 static void dsa_user_get_stats64(struct net_device *dev,
2493 				 struct rtnl_link_stats64 *s)
2494 {
2495 	struct dsa_port *dp = dsa_user_to_port(dev);
2496 	struct dsa_switch *ds = dp->ds;
2497 
2498 	if (ds->ops->get_stats64)
2499 		ds->ops->get_stats64(ds, dp->index, s);
2500 	else
2501 		dev_get_tstats64(dev, s);
2502 }
2503 
2504 static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx,
2505 				      struct net_device_path *path)
2506 {
2507 	struct dsa_port *dp = dsa_user_to_port(ctx->dev);
2508 	struct net_device *conduit = dsa_port_to_conduit(dp);
2509 	struct dsa_port *cpu_dp = dp->cpu_dp;
2510 
2511 	path->dev = ctx->dev;
2512 	path->type = DEV_PATH_DSA;
2513 	path->dsa.proto = cpu_dp->tag_ops->proto;
2514 	path->dsa.port = dp->index;
2515 	ctx->dev = conduit;
2516 
2517 	return 0;
2518 }
2519 
2520 static const struct net_device_ops dsa_user_netdev_ops = {
2521 	.ndo_open		= dsa_user_open,
2522 	.ndo_stop		= dsa_user_close,
2523 	.ndo_start_xmit		= dsa_user_xmit,
2524 	.ndo_change_rx_flags	= dsa_user_change_rx_flags,
2525 	.ndo_set_rx_mode	= dsa_user_set_rx_mode,
2526 	.ndo_set_mac_address	= dsa_user_set_mac_address,
2527 	.ndo_fdb_dump		= dsa_user_fdb_dump,
2528 	.ndo_eth_ioctl		= dsa_user_ioctl,
2529 	.ndo_get_iflink		= dsa_user_get_iflink,
2530 #ifdef CONFIG_NET_POLL_CONTROLLER
2531 	.ndo_netpoll_setup	= dsa_user_netpoll_setup,
2532 	.ndo_netpoll_cleanup	= dsa_user_netpoll_cleanup,
2533 	.ndo_poll_controller	= dsa_user_poll_controller,
2534 #endif
2535 	.ndo_setup_tc		= dsa_user_setup_tc,
2536 	.ndo_get_stats64	= dsa_user_get_stats64,
2537 	.ndo_vlan_rx_add_vid	= dsa_user_vlan_rx_add_vid,
2538 	.ndo_vlan_rx_kill_vid	= dsa_user_vlan_rx_kill_vid,
2539 	.ndo_change_mtu		= dsa_user_change_mtu,
2540 	.ndo_fill_forward_path	= dsa_user_fill_forward_path,
2541 };
2542 
2543 static const struct device_type dsa_type = {
2544 	.name	= "dsa",
2545 };
2546 
2547 void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up)
2548 {
2549 	const struct dsa_port *dp = dsa_to_port(ds, port);
2550 
2551 	if (dp->pl)
2552 		phylink_mac_change(dp->pl, up);
2553 }
2554 EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change);
2555 
2556 static void dsa_user_phylink_fixed_state(struct phylink_config *config,
2557 					 struct phylink_link_state *state)
2558 {
2559 	struct dsa_port *dp = dsa_phylink_to_port(config);
2560 	struct dsa_switch *ds = dp->ds;
2561 
2562 	/* No need to check that this operation is valid, the callback would
2563 	 * not be called if it was not.
2564 	 */
2565 	ds->ops->phylink_fixed_state(ds, dp->index, state);
2566 }
2567 
2568 /* user device setup *******************************************************/
2569 static int dsa_user_phy_connect(struct net_device *user_dev, int addr,
2570 				u32 flags)
2571 {
2572 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2573 	struct dsa_switch *ds = dp->ds;
2574 
2575 	user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr);
2576 	if (!user_dev->phydev) {
2577 		netdev_err(user_dev, "no phy at %d\n", addr);
2578 		return -ENODEV;
2579 	}
2580 
2581 	user_dev->phydev->dev_flags |= flags;
2582 
2583 	return phylink_connect_phy(dp->pl, user_dev->phydev);
2584 }
2585 
2586 static int dsa_user_phy_setup(struct net_device *user_dev)
2587 {
2588 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2589 	struct device_node *port_dn = dp->dn;
2590 	struct dsa_switch *ds = dp->ds;
2591 	u32 phy_flags = 0;
2592 	int ret;
2593 
2594 	dp->pl_config.dev = &user_dev->dev;
2595 	dp->pl_config.type = PHYLINK_NETDEV;
2596 
2597 	/* The get_fixed_state callback takes precedence over polling the
2598 	 * link GPIO in PHYLINK (see phylink_get_fixed_state).  Only set
2599 	 * this if the switch provides such a callback.
2600 	 */
2601 	if (ds->ops->phylink_fixed_state) {
2602 		dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state;
2603 		dp->pl_config.poll_fixed_state = true;
2604 	}
2605 
2606 	ret = dsa_port_phylink_create(dp);
2607 	if (ret)
2608 		return ret;
2609 
2610 	if (ds->ops->get_phy_flags)
2611 		phy_flags = ds->ops->get_phy_flags(ds, dp->index);
2612 
2613 	ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags);
2614 	if (ret == -ENODEV && ds->user_mii_bus) {
2615 		/* We could not connect to a designated PHY or SFP, so try to
2616 		 * use the switch internal MDIO bus instead
2617 		 */
2618 		ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags);
2619 	}
2620 	if (ret) {
2621 		netdev_err(user_dev, "failed to connect to PHY: %pe\n",
2622 			   ERR_PTR(ret));
2623 		dsa_port_phylink_destroy(dp);
2624 	}
2625 
2626 	return ret;
2627 }
2628 
2629 void dsa_user_setup_tagger(struct net_device *user)
2630 {
2631 	struct dsa_port *dp = dsa_user_to_port(user);
2632 	struct net_device *conduit = dsa_port_to_conduit(dp);
2633 	struct dsa_user_priv *p = netdev_priv(user);
2634 	const struct dsa_port *cpu_dp = dp->cpu_dp;
2635 	const struct dsa_switch *ds = dp->ds;
2636 
2637 	user->needed_headroom = cpu_dp->tag_ops->needed_headroom;
2638 	user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom;
2639 	/* Try to save one extra realloc later in the TX path (in the conduit)
2640 	 * by also inheriting the conduit's needed headroom and tailroom.
2641 	 * The 8021q driver also does this.
2642 	 */
2643 	user->needed_headroom += conduit->needed_headroom;
2644 	user->needed_tailroom += conduit->needed_tailroom;
2645 
2646 	p->xmit = cpu_dp->tag_ops->xmit;
2647 
2648 	user->features = conduit->vlan_features | NETIF_F_HW_TC;
2649 	user->hw_features |= NETIF_F_HW_TC;
2650 	if (user->needed_tailroom)
2651 		user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST);
2652 	if (ds->needs_standalone_vlan_filtering)
2653 		user->features |= NETIF_F_HW_VLAN_CTAG_FILTER;
2654 
2655 	user->lltx = true;
2656 }
2657 
2658 int dsa_user_suspend(struct net_device *user_dev)
2659 {
2660 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2661 
2662 	if (!netif_running(user_dev))
2663 		return 0;
2664 
2665 	netif_device_detach(user_dev);
2666 
2667 	rtnl_lock();
2668 	phylink_stop(dp->pl);
2669 	rtnl_unlock();
2670 
2671 	return 0;
2672 }
2673 
2674 int dsa_user_resume(struct net_device *user_dev)
2675 {
2676 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2677 
2678 	if (!netif_running(user_dev))
2679 		return 0;
2680 
2681 	netif_device_attach(user_dev);
2682 
2683 	rtnl_lock();
2684 	phylink_start(dp->pl);
2685 	rtnl_unlock();
2686 
2687 	return 0;
2688 }
2689 
2690 int dsa_user_create(struct dsa_port *port)
2691 {
2692 	struct net_device *conduit = dsa_port_to_conduit(port);
2693 	struct dsa_switch *ds = port->ds;
2694 	struct net_device *user_dev;
2695 	struct dsa_user_priv *p;
2696 	const char *name;
2697 	int assign_type;
2698 	int ret;
2699 
2700 	if (!ds->num_tx_queues)
2701 		ds->num_tx_queues = 1;
2702 
2703 	if (port->name) {
2704 		name = port->name;
2705 		assign_type = NET_NAME_PREDICTABLE;
2706 	} else {
2707 		name = "eth%d";
2708 		assign_type = NET_NAME_ENUM;
2709 	}
2710 
2711 	user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name,
2712 				    assign_type, ether_setup,
2713 				    ds->num_tx_queues, 1);
2714 	if (user_dev == NULL)
2715 		return -ENOMEM;
2716 
2717 	user_dev->rtnl_link_ops = &dsa_link_ops;
2718 	user_dev->ethtool_ops = &dsa_user_ethtool_ops;
2719 #if IS_ENABLED(CONFIG_DCB)
2720 	user_dev->dcbnl_ops = &dsa_user_dcbnl_ops;
2721 #endif
2722 	if (!is_zero_ether_addr(port->mac))
2723 		eth_hw_addr_set(user_dev, port->mac);
2724 	else
2725 		eth_hw_addr_inherit(user_dev, conduit);
2726 	user_dev->priv_flags |= IFF_NO_QUEUE;
2727 	if (dsa_switch_supports_uc_filtering(ds))
2728 		user_dev->priv_flags |= IFF_UNICAST_FLT;
2729 	user_dev->netdev_ops = &dsa_user_netdev_ops;
2730 	if (ds->ops->port_max_mtu)
2731 		user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index);
2732 	SET_NETDEV_DEVTYPE(user_dev, &dsa_type);
2733 
2734 	SET_NETDEV_DEV(user_dev, port->ds->dev);
2735 	SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port);
2736 	user_dev->dev.of_node = port->dn;
2737 	user_dev->vlan_features = conduit->vlan_features;
2738 
2739 	p = netdev_priv(user_dev);
2740 	user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS;
2741 
2742 	ret = gro_cells_init(&p->gcells, user_dev);
2743 	if (ret)
2744 		goto out_free;
2745 
2746 	p->dp = port;
2747 	INIT_LIST_HEAD(&p->mall_tc_list);
2748 	port->user = user_dev;
2749 	dsa_user_setup_tagger(user_dev);
2750 
2751 	netif_carrier_off(user_dev);
2752 
2753 	ret = dsa_user_phy_setup(user_dev);
2754 	if (ret) {
2755 		netdev_err(user_dev,
2756 			   "error %d setting up PHY for tree %d, switch %d, port %d\n",
2757 			   ret, ds->dst->index, ds->index, port->index);
2758 		goto out_gcells;
2759 	}
2760 
2761 	rtnl_lock();
2762 
2763 	ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN);
2764 	if (ret && ret != -EOPNOTSUPP)
2765 		dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n",
2766 			 ret, ETH_DATA_LEN, port->index);
2767 
2768 	ret = register_netdevice(user_dev);
2769 	if (ret) {
2770 		netdev_err(conduit, "error %d registering interface %s\n",
2771 			   ret, user_dev->name);
2772 		rtnl_unlock();
2773 		goto out_phy;
2774 	}
2775 
2776 	if (IS_ENABLED(CONFIG_DCB)) {
2777 		ret = dsa_user_dcbnl_init(user_dev);
2778 		if (ret) {
2779 			netdev_err(user_dev,
2780 				   "failed to initialize DCB: %pe\n",
2781 				   ERR_PTR(ret));
2782 			rtnl_unlock();
2783 			goto out_unregister;
2784 		}
2785 	}
2786 
2787 	ret = netdev_upper_dev_link(conduit, user_dev, NULL);
2788 
2789 	rtnl_unlock();
2790 
2791 	if (ret)
2792 		goto out_unregister;
2793 
2794 	return 0;
2795 
2796 out_unregister:
2797 	unregister_netdev(user_dev);
2798 out_phy:
2799 	rtnl_lock();
2800 	phylink_disconnect_phy(p->dp->pl);
2801 	rtnl_unlock();
2802 	dsa_port_phylink_destroy(p->dp);
2803 out_gcells:
2804 	gro_cells_destroy(&p->gcells);
2805 out_free:
2806 	free_netdev(user_dev);
2807 	port->user = NULL;
2808 	return ret;
2809 }
2810 
2811 void dsa_user_destroy(struct net_device *user_dev)
2812 {
2813 	struct net_device *conduit = dsa_user_to_conduit(user_dev);
2814 	struct dsa_port *dp = dsa_user_to_port(user_dev);
2815 	struct dsa_user_priv *p = netdev_priv(user_dev);
2816 
2817 	netif_carrier_off(user_dev);
2818 	rtnl_lock();
2819 	netdev_upper_dev_unlink(conduit, user_dev);
2820 	unregister_netdevice(user_dev);
2821 	phylink_disconnect_phy(dp->pl);
2822 	rtnl_unlock();
2823 
2824 	dsa_port_phylink_destroy(dp);
2825 	gro_cells_destroy(&p->gcells);
2826 	free_netdev(user_dev);
2827 }
2828 
2829 int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit,
2830 			    struct netlink_ext_ack *extack)
2831 {
2832 	struct net_device *old_conduit = dsa_user_to_conduit(dev);
2833 	struct dsa_port *dp = dsa_user_to_port(dev);
2834 	struct dsa_switch *ds = dp->ds;
2835 	struct net_device *upper;
2836 	struct list_head *iter;
2837 	int err;
2838 
2839 	if (conduit == old_conduit)
2840 		return 0;
2841 
2842 	if (!ds->ops->port_change_conduit) {
2843 		NL_SET_ERR_MSG_MOD(extack,
2844 				   "Driver does not support changing DSA conduit");
2845 		return -EOPNOTSUPP;
2846 	}
2847 
2848 	if (!netdev_uses_dsa(conduit)) {
2849 		NL_SET_ERR_MSG_MOD(extack,
2850 				   "Interface not eligible as DSA conduit");
2851 		return -EOPNOTSUPP;
2852 	}
2853 
2854 	netdev_for_each_upper_dev_rcu(conduit, upper, iter) {
2855 		if (dsa_user_dev_check(upper))
2856 			continue;
2857 		if (netif_is_bridge_master(upper))
2858 			continue;
2859 		NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers");
2860 		return -EOPNOTSUPP;
2861 	}
2862 
2863 	/* Since we allow live-changing the DSA conduit, plus we auto-open the
2864 	 * DSA conduit when the user port opens => we need to ensure that the
2865 	 * new DSA conduit is open too.
2866 	 */
2867 	if (dev->flags & IFF_UP) {
2868 		err = dev_open(conduit, extack);
2869 		if (err)
2870 			return err;
2871 	}
2872 
2873 	netdev_upper_dev_unlink(old_conduit, dev);
2874 
2875 	err = netdev_upper_dev_link(conduit, dev, extack);
2876 	if (err)
2877 		goto out_revert_old_conduit_unlink;
2878 
2879 	err = dsa_port_change_conduit(dp, conduit, extack);
2880 	if (err)
2881 		goto out_revert_conduit_link;
2882 
2883 	/* Update the MTU of the new CPU port through cross-chip notifiers */
2884 	err = dsa_user_change_mtu(dev, dev->mtu);
2885 	if (err && err != -EOPNOTSUPP) {
2886 		netdev_warn(dev,
2887 			    "nonfatal error updating MTU with new conduit: %pe\n",
2888 			    ERR_PTR(err));
2889 	}
2890 
2891 	return 0;
2892 
2893 out_revert_conduit_link:
2894 	netdev_upper_dev_unlink(conduit, dev);
2895 out_revert_old_conduit_unlink:
2896 	netdev_upper_dev_link(old_conduit, dev, NULL);
2897 	return err;
2898 }
2899 
2900 bool dsa_user_dev_check(const struct net_device *dev)
2901 {
2902 	return dev->netdev_ops == &dsa_user_netdev_ops;
2903 }
2904 EXPORT_SYMBOL_GPL(dsa_user_dev_check);
2905 
2906 static int dsa_user_changeupper(struct net_device *dev,
2907 				struct netdev_notifier_changeupper_info *info)
2908 {
2909 	struct netlink_ext_ack *extack;
2910 	int err = NOTIFY_DONE;
2911 	struct dsa_port *dp;
2912 
2913 	if (!dsa_user_dev_check(dev))
2914 		return err;
2915 
2916 	dp = dsa_user_to_port(dev);
2917 	extack = netdev_notifier_info_to_extack(&info->info);
2918 
2919 	if (netif_is_bridge_master(info->upper_dev)) {
2920 		if (info->linking) {
2921 			err = dsa_port_bridge_join(dp, info->upper_dev, extack);
2922 			if (!err)
2923 				dsa_bridge_mtu_normalization(dp);
2924 			if (err == -EOPNOTSUPP) {
2925 				NL_SET_ERR_MSG_WEAK_MOD(extack,
2926 							"Offloading not supported");
2927 				err = 0;
2928 			}
2929 			err = notifier_from_errno(err);
2930 		} else {
2931 			dsa_port_bridge_leave(dp, info->upper_dev);
2932 			err = NOTIFY_OK;
2933 		}
2934 	} else if (netif_is_lag_master(info->upper_dev)) {
2935 		if (info->linking) {
2936 			err = dsa_port_lag_join(dp, info->upper_dev,
2937 						info->upper_info, extack);
2938 			if (err == -EOPNOTSUPP) {
2939 				NL_SET_ERR_MSG_WEAK_MOD(extack,
2940 							"Offloading not supported");
2941 				err = 0;
2942 			}
2943 			err = notifier_from_errno(err);
2944 		} else {
2945 			dsa_port_lag_leave(dp, info->upper_dev);
2946 			err = NOTIFY_OK;
2947 		}
2948 	} else if (is_hsr_master(info->upper_dev)) {
2949 		if (info->linking) {
2950 			err = dsa_port_hsr_join(dp, info->upper_dev, extack);
2951 			if (err == -EOPNOTSUPP) {
2952 				NL_SET_ERR_MSG_WEAK_MOD(extack,
2953 							"Offloading not supported");
2954 				err = 0;
2955 			}
2956 			err = notifier_from_errno(err);
2957 		} else {
2958 			dsa_port_hsr_leave(dp, info->upper_dev);
2959 			err = NOTIFY_OK;
2960 		}
2961 	}
2962 
2963 	return err;
2964 }
2965 
2966 static int dsa_user_prechangeupper(struct net_device *dev,
2967 				   struct netdev_notifier_changeupper_info *info)
2968 {
2969 	struct dsa_port *dp;
2970 
2971 	if (!dsa_user_dev_check(dev))
2972 		return NOTIFY_DONE;
2973 
2974 	dp = dsa_user_to_port(dev);
2975 
2976 	if (netif_is_bridge_master(info->upper_dev) && !info->linking)
2977 		dsa_port_pre_bridge_leave(dp, info->upper_dev);
2978 	else if (netif_is_lag_master(info->upper_dev) && !info->linking)
2979 		dsa_port_pre_lag_leave(dp, info->upper_dev);
2980 	/* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot
2981 	 * meaningfully placed under a bridge yet
2982 	 */
2983 
2984 	return NOTIFY_DONE;
2985 }
2986 
2987 static int
2988 dsa_user_lag_changeupper(struct net_device *dev,
2989 			 struct netdev_notifier_changeupper_info *info)
2990 {
2991 	struct net_device *lower;
2992 	struct list_head *iter;
2993 	int err = NOTIFY_DONE;
2994 	struct dsa_port *dp;
2995 
2996 	if (!netif_is_lag_master(dev))
2997 		return err;
2998 
2999 	netdev_for_each_lower_dev(dev, lower, iter) {
3000 		if (!dsa_user_dev_check(lower))
3001 			continue;
3002 
3003 		dp = dsa_user_to_port(lower);
3004 		if (!dp->lag)
3005 			/* Software LAG */
3006 			continue;
3007 
3008 		err = dsa_user_changeupper(lower, info);
3009 		if (notifier_to_errno(err))
3010 			break;
3011 	}
3012 
3013 	return err;
3014 }
3015 
3016 /* Same as dsa_user_lag_changeupper() except that it calls
3017  * dsa_user_prechangeupper()
3018  */
3019 static int
3020 dsa_user_lag_prechangeupper(struct net_device *dev,
3021 			    struct netdev_notifier_changeupper_info *info)
3022 {
3023 	struct net_device *lower;
3024 	struct list_head *iter;
3025 	int err = NOTIFY_DONE;
3026 	struct dsa_port *dp;
3027 
3028 	if (!netif_is_lag_master(dev))
3029 		return err;
3030 
3031 	netdev_for_each_lower_dev(dev, lower, iter) {
3032 		if (!dsa_user_dev_check(lower))
3033 			continue;
3034 
3035 		dp = dsa_user_to_port(lower);
3036 		if (!dp->lag)
3037 			/* Software LAG */
3038 			continue;
3039 
3040 		err = dsa_user_prechangeupper(lower, info);
3041 		if (notifier_to_errno(err))
3042 			break;
3043 	}
3044 
3045 	return err;
3046 }
3047 
3048 static int
3049 dsa_prevent_bridging_8021q_upper(struct net_device *dev,
3050 				 struct netdev_notifier_changeupper_info *info)
3051 {
3052 	struct netlink_ext_ack *ext_ack;
3053 	struct net_device *user, *br;
3054 	struct dsa_port *dp;
3055 
3056 	ext_ack = netdev_notifier_info_to_extack(&info->info);
3057 
3058 	if (!is_vlan_dev(dev))
3059 		return NOTIFY_DONE;
3060 
3061 	user = vlan_dev_real_dev(dev);
3062 	if (!dsa_user_dev_check(user))
3063 		return NOTIFY_DONE;
3064 
3065 	dp = dsa_user_to_port(user);
3066 	br = dsa_port_bridge_dev_get(dp);
3067 	if (!br)
3068 		return NOTIFY_DONE;
3069 
3070 	/* Deny enslaving a VLAN device into a VLAN-aware bridge */
3071 	if (br_vlan_enabled(br) &&
3072 	    netif_is_bridge_master(info->upper_dev) && info->linking) {
3073 		NL_SET_ERR_MSG_MOD(ext_ack,
3074 				   "Cannot make VLAN device join VLAN-aware bridge");
3075 		return notifier_from_errno(-EINVAL);
3076 	}
3077 
3078 	return NOTIFY_DONE;
3079 }
3080 
3081 static int
3082 dsa_user_check_8021q_upper(struct net_device *dev,
3083 			   struct netdev_notifier_changeupper_info *info)
3084 {
3085 	struct dsa_port *dp = dsa_user_to_port(dev);
3086 	struct net_device *br = dsa_port_bridge_dev_get(dp);
3087 	struct bridge_vlan_info br_info;
3088 	struct netlink_ext_ack *extack;
3089 	int err = NOTIFY_DONE;
3090 	u16 vid;
3091 
3092 	if (!br || !br_vlan_enabled(br))
3093 		return NOTIFY_DONE;
3094 
3095 	extack = netdev_notifier_info_to_extack(&info->info);
3096 	vid = vlan_dev_vlan_id(info->upper_dev);
3097 
3098 	/* br_vlan_get_info() returns -EINVAL or -ENOENT if the
3099 	 * device, respectively the VID is not found, returning
3100 	 * 0 means success, which is a failure for us here.
3101 	 */
3102 	err = br_vlan_get_info(br, vid, &br_info);
3103 	if (err == 0) {
3104 		NL_SET_ERR_MSG_MOD(extack,
3105 				   "This VLAN is already configured by the bridge");
3106 		return notifier_from_errno(-EBUSY);
3107 	}
3108 
3109 	return NOTIFY_DONE;
3110 }
3111 
3112 static int
3113 dsa_user_prechangeupper_sanity_check(struct net_device *dev,
3114 				     struct netdev_notifier_changeupper_info *info)
3115 {
3116 	struct dsa_switch *ds;
3117 	struct dsa_port *dp;
3118 	int err;
3119 
3120 	if (!dsa_user_dev_check(dev))
3121 		return dsa_prevent_bridging_8021q_upper(dev, info);
3122 
3123 	dp = dsa_user_to_port(dev);
3124 	ds = dp->ds;
3125 
3126 	if (ds->ops->port_prechangeupper) {
3127 		err = ds->ops->port_prechangeupper(ds, dp->index, info);
3128 		if (err)
3129 			return notifier_from_errno(err);
3130 	}
3131 
3132 	if (is_vlan_dev(info->upper_dev))
3133 		return dsa_user_check_8021q_upper(dev, info);
3134 
3135 	return NOTIFY_DONE;
3136 }
3137 
3138 /* To be eligible as a DSA conduit, a LAG must have all lower interfaces be
3139  * eligible DSA conduits. Additionally, all LAG slaves must be DSA conduits of
3140  * switches in the same switch tree.
3141  */
3142 static int dsa_lag_conduit_validate(struct net_device *lag_dev,
3143 				    struct netlink_ext_ack *extack)
3144 {
3145 	struct net_device *lower1, *lower2;
3146 	struct list_head *iter1, *iter2;
3147 
3148 	netdev_for_each_lower_dev(lag_dev, lower1, iter1) {
3149 		netdev_for_each_lower_dev(lag_dev, lower2, iter2) {
3150 			if (!netdev_uses_dsa(lower1) ||
3151 			    !netdev_uses_dsa(lower2)) {
3152 				NL_SET_ERR_MSG_MOD(extack,
3153 						   "All LAG ports must be eligible as DSA conduits");
3154 				return notifier_from_errno(-EINVAL);
3155 			}
3156 
3157 			if (lower1 == lower2)
3158 				continue;
3159 
3160 			if (!dsa_port_tree_same(lower1->dsa_ptr,
3161 						lower2->dsa_ptr)) {
3162 				NL_SET_ERR_MSG_MOD(extack,
3163 						   "LAG contains DSA conduits of disjoint switch trees");
3164 				return notifier_from_errno(-EINVAL);
3165 			}
3166 		}
3167 	}
3168 
3169 	return NOTIFY_DONE;
3170 }
3171 
3172 static int
3173 dsa_conduit_prechangeupper_sanity_check(struct net_device *conduit,
3174 					struct netdev_notifier_changeupper_info *info)
3175 {
3176 	struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info);
3177 
3178 	if (!netdev_uses_dsa(conduit))
3179 		return NOTIFY_DONE;
3180 
3181 	if (!info->linking)
3182 		return NOTIFY_DONE;
3183 
3184 	/* Allow DSA switch uppers */
3185 	if (dsa_user_dev_check(info->upper_dev))
3186 		return NOTIFY_DONE;
3187 
3188 	/* Allow bridge uppers of DSA conduits, subject to further
3189 	 * restrictions in dsa_bridge_prechangelower_sanity_check()
3190 	 */
3191 	if (netif_is_bridge_master(info->upper_dev))
3192 		return NOTIFY_DONE;
3193 
3194 	/* Allow LAG uppers, subject to further restrictions in
3195 	 * dsa_lag_conduit_prechangelower_sanity_check()
3196 	 */
3197 	if (netif_is_lag_master(info->upper_dev))
3198 		return dsa_lag_conduit_validate(info->upper_dev, extack);
3199 
3200 	NL_SET_ERR_MSG_MOD(extack,
3201 			   "DSA conduit cannot join unknown upper interfaces");
3202 	return notifier_from_errno(-EBUSY);
3203 }
3204 
3205 static int
3206 dsa_lag_conduit_prechangelower_sanity_check(struct net_device *dev,
3207 					    struct netdev_notifier_changeupper_info *info)
3208 {
3209 	struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info);
3210 	struct net_device *lag_dev = info->upper_dev;
3211 	struct net_device *lower;
3212 	struct list_head *iter;
3213 
3214 	if (!netdev_uses_dsa(lag_dev) || !netif_is_lag_master(lag_dev))
3215 		return NOTIFY_DONE;
3216 
3217 	if (!info->linking)
3218 		return NOTIFY_DONE;
3219 
3220 	if (!netdev_uses_dsa(dev)) {
3221 		NL_SET_ERR_MSG(extack,
3222 			       "Only DSA conduits can join a LAG DSA conduit");
3223 		return notifier_from_errno(-EINVAL);
3224 	}
3225 
3226 	netdev_for_each_lower_dev(lag_dev, lower, iter) {
3227 		if (!dsa_port_tree_same(dev->dsa_ptr, lower->dsa_ptr)) {
3228 			NL_SET_ERR_MSG(extack,
3229 				       "Interface is DSA conduit for a different switch tree than this LAG");
3230 			return notifier_from_errno(-EINVAL);
3231 		}
3232 
3233 		break;
3234 	}
3235 
3236 	return NOTIFY_DONE;
3237 }
3238 
3239 /* Don't allow bridging of DSA conduits, since the bridge layer rx_handler
3240  * prevents the DSA fake ethertype handler to be invoked, so we don't get the
3241  * chance to strip off and parse the DSA switch tag protocol header (the bridge
3242  * layer just returns RX_HANDLER_CONSUMED, stopping RX processing for these
3243  * frames).
3244  * The only case where that would not be an issue is when bridging can already
3245  * be offloaded, such as when the DSA conduit is itself a DSA or plain switchdev
3246  * port, and is bridged only with other ports from the same hardware device.
3247  */
3248 static int
3249 dsa_bridge_prechangelower_sanity_check(struct net_device *new_lower,
3250 				       struct netdev_notifier_changeupper_info *info)
3251 {
3252 	struct net_device *br = info->upper_dev;
3253 	struct netlink_ext_ack *extack;
3254 	struct net_device *lower;
3255 	struct list_head *iter;
3256 
3257 	if (!netif_is_bridge_master(br))
3258 		return NOTIFY_DONE;
3259 
3260 	if (!info->linking)
3261 		return NOTIFY_DONE;
3262 
3263 	extack = netdev_notifier_info_to_extack(&info->info);
3264 
3265 	netdev_for_each_lower_dev(br, lower, iter) {
3266 		if (!netdev_uses_dsa(new_lower) && !netdev_uses_dsa(lower))
3267 			continue;
3268 
3269 		if (!netdev_port_same_parent_id(lower, new_lower)) {
3270 			NL_SET_ERR_MSG(extack,
3271 				       "Cannot do software bridging with a DSA conduit");
3272 			return notifier_from_errno(-EINVAL);
3273 		}
3274 	}
3275 
3276 	return NOTIFY_DONE;
3277 }
3278 
3279 static void dsa_tree_migrate_ports_from_lag_conduit(struct dsa_switch_tree *dst,
3280 						    struct net_device *lag_dev)
3281 {
3282 	struct net_device *new_conduit = dsa_tree_find_first_conduit(dst);
3283 	struct dsa_port *dp;
3284 	int err;
3285 
3286 	dsa_tree_for_each_user_port(dp, dst) {
3287 		if (dsa_port_to_conduit(dp) != lag_dev)
3288 			continue;
3289 
3290 		err = dsa_user_change_conduit(dp->user, new_conduit, NULL);
3291 		if (err) {
3292 			netdev_err(dp->user,
3293 				   "failed to restore conduit to %s: %pe\n",
3294 				   new_conduit->name, ERR_PTR(err));
3295 		}
3296 	}
3297 }
3298 
3299 static int dsa_conduit_lag_join(struct net_device *conduit,
3300 				struct net_device *lag_dev,
3301 				struct netdev_lag_upper_info *uinfo,
3302 				struct netlink_ext_ack *extack)
3303 {
3304 	struct dsa_port *cpu_dp = conduit->dsa_ptr;
3305 	struct dsa_switch_tree *dst = cpu_dp->dst;
3306 	struct dsa_port *dp;
3307 	int err;
3308 
3309 	err = dsa_conduit_lag_setup(lag_dev, cpu_dp, uinfo, extack);
3310 	if (err)
3311 		return err;
3312 
3313 	dsa_tree_for_each_user_port(dp, dst) {
3314 		if (dsa_port_to_conduit(dp) != conduit)
3315 			continue;
3316 
3317 		err = dsa_user_change_conduit(dp->user, lag_dev, extack);
3318 		if (err)
3319 			goto restore;
3320 	}
3321 
3322 	return 0;
3323 
3324 restore:
3325 	dsa_tree_for_each_user_port_continue_reverse(dp, dst) {
3326 		if (dsa_port_to_conduit(dp) != lag_dev)
3327 			continue;
3328 
3329 		err = dsa_user_change_conduit(dp->user, conduit, NULL);
3330 		if (err) {
3331 			netdev_err(dp->user,
3332 				   "failed to restore conduit to %s: %pe\n",
3333 				   conduit->name, ERR_PTR(err));
3334 		}
3335 	}
3336 
3337 	dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr);
3338 
3339 	return err;
3340 }
3341 
3342 static void dsa_conduit_lag_leave(struct net_device *conduit,
3343 				  struct net_device *lag_dev)
3344 {
3345 	struct dsa_port *dp, *cpu_dp = lag_dev->dsa_ptr;
3346 	struct dsa_switch_tree *dst = cpu_dp->dst;
3347 	struct dsa_port *new_cpu_dp = NULL;
3348 	struct net_device *lower;
3349 	struct list_head *iter;
3350 
3351 	netdev_for_each_lower_dev(lag_dev, lower, iter) {
3352 		if (netdev_uses_dsa(lower)) {
3353 			new_cpu_dp = lower->dsa_ptr;
3354 			break;
3355 		}
3356 	}
3357 
3358 	if (new_cpu_dp) {
3359 		/* Update the CPU port of the user ports still under the LAG
3360 		 * so that dsa_port_to_conduit() continues to work properly
3361 		 */
3362 		dsa_tree_for_each_user_port(dp, dst)
3363 			if (dsa_port_to_conduit(dp) == lag_dev)
3364 				dp->cpu_dp = new_cpu_dp;
3365 
3366 		/* Update the index of the virtual CPU port to match the lowest
3367 		 * physical CPU port
3368 		 */
3369 		lag_dev->dsa_ptr = new_cpu_dp;
3370 		wmb();
3371 	} else {
3372 		/* If the LAG DSA conduit has no ports left, migrate back all
3373 		 * user ports to the first physical CPU port
3374 		 */
3375 		dsa_tree_migrate_ports_from_lag_conduit(dst, lag_dev);
3376 	}
3377 
3378 	/* This DSA conduit has left its LAG in any case, so let
3379 	 * the CPU port leave the hardware LAG as well
3380 	 */
3381 	dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr);
3382 }
3383 
3384 static int dsa_conduit_changeupper(struct net_device *dev,
3385 				   struct netdev_notifier_changeupper_info *info)
3386 {
3387 	struct netlink_ext_ack *extack;
3388 	int err = NOTIFY_DONE;
3389 
3390 	if (!netdev_uses_dsa(dev))
3391 		return err;
3392 
3393 	extack = netdev_notifier_info_to_extack(&info->info);
3394 
3395 	if (netif_is_lag_master(info->upper_dev)) {
3396 		if (info->linking) {
3397 			err = dsa_conduit_lag_join(dev, info->upper_dev,
3398 						   info->upper_info, extack);
3399 			err = notifier_from_errno(err);
3400 		} else {
3401 			dsa_conduit_lag_leave(dev, info->upper_dev);
3402 			err = NOTIFY_OK;
3403 		}
3404 	}
3405 
3406 	return err;
3407 }
3408 
3409 static int dsa_user_netdevice_event(struct notifier_block *nb,
3410 				    unsigned long event, void *ptr)
3411 {
3412 	struct net_device *dev = netdev_notifier_info_to_dev(ptr);
3413 
3414 	switch (event) {
3415 	case NETDEV_PRECHANGEUPPER: {
3416 		struct netdev_notifier_changeupper_info *info = ptr;
3417 		int err;
3418 
3419 		err = dsa_user_prechangeupper_sanity_check(dev, info);
3420 		if (notifier_to_errno(err))
3421 			return err;
3422 
3423 		err = dsa_conduit_prechangeupper_sanity_check(dev, info);
3424 		if (notifier_to_errno(err))
3425 			return err;
3426 
3427 		err = dsa_lag_conduit_prechangelower_sanity_check(dev, info);
3428 		if (notifier_to_errno(err))
3429 			return err;
3430 
3431 		err = dsa_bridge_prechangelower_sanity_check(dev, info);
3432 		if (notifier_to_errno(err))
3433 			return err;
3434 
3435 		err = dsa_user_prechangeupper(dev, ptr);
3436 		if (notifier_to_errno(err))
3437 			return err;
3438 
3439 		err = dsa_user_lag_prechangeupper(dev, ptr);
3440 		if (notifier_to_errno(err))
3441 			return err;
3442 
3443 		break;
3444 	}
3445 	case NETDEV_CHANGEUPPER: {
3446 		int err;
3447 
3448 		err = dsa_user_changeupper(dev, ptr);
3449 		if (notifier_to_errno(err))
3450 			return err;
3451 
3452 		err = dsa_user_lag_changeupper(dev, ptr);
3453 		if (notifier_to_errno(err))
3454 			return err;
3455 
3456 		err = dsa_conduit_changeupper(dev, ptr);
3457 		if (notifier_to_errno(err))
3458 			return err;
3459 
3460 		break;
3461 	}
3462 	case NETDEV_CHANGELOWERSTATE: {
3463 		struct netdev_notifier_changelowerstate_info *info = ptr;
3464 		struct dsa_port *dp;
3465 		int err = 0;
3466 
3467 		if (dsa_user_dev_check(dev)) {
3468 			dp = dsa_user_to_port(dev);
3469 
3470 			err = dsa_port_lag_change(dp, info->lower_state_info);
3471 		}
3472 
3473 		/* Mirror LAG port events on DSA conduits that are in
3474 		 * a LAG towards their respective switch CPU ports
3475 		 */
3476 		if (netdev_uses_dsa(dev)) {
3477 			dp = dev->dsa_ptr;
3478 
3479 			err = dsa_port_lag_change(dp, info->lower_state_info);
3480 		}
3481 
3482 		return notifier_from_errno(err);
3483 	}
3484 	case NETDEV_CHANGE:
3485 	case NETDEV_UP: {
3486 		/* Track state of conduit port.
3487 		 * DSA driver may require the conduit port (and indirectly
3488 		 * the tagger) to be available for some special operation.
3489 		 */
3490 		if (netdev_uses_dsa(dev)) {
3491 			struct dsa_port *cpu_dp = dev->dsa_ptr;
3492 			struct dsa_switch_tree *dst = cpu_dp->ds->dst;
3493 
3494 			/* Track when the conduit port is UP */
3495 			dsa_tree_conduit_oper_state_change(dst, dev,
3496 							   netif_oper_up(dev));
3497 
3498 			/* Track when the conduit port is ready and can accept
3499 			 * packet.
3500 			 * NETDEV_UP event is not enough to flag a port as ready.
3501 			 * We also have to wait for linkwatch_do_dev to dev_activate
3502 			 * and emit a NETDEV_CHANGE event.
3503 			 * We check if a conduit port is ready by checking if the dev
3504 			 * have a qdisc assigned and is not noop.
3505 			 */
3506 			dsa_tree_conduit_admin_state_change(dst, dev,
3507 							    !qdisc_tx_is_noop(dev));
3508 
3509 			return NOTIFY_OK;
3510 		}
3511 
3512 		return NOTIFY_DONE;
3513 	}
3514 	case NETDEV_GOING_DOWN: {
3515 		struct dsa_port *dp, *cpu_dp;
3516 		struct dsa_switch_tree *dst;
3517 		LIST_HEAD(close_list);
3518 
3519 		if (!netdev_uses_dsa(dev))
3520 			return NOTIFY_DONE;
3521 
3522 		cpu_dp = dev->dsa_ptr;
3523 		dst = cpu_dp->ds->dst;
3524 
3525 		dsa_tree_conduit_admin_state_change(dst, dev, false);
3526 
3527 		list_for_each_entry(dp, &dst->ports, list) {
3528 			if (!dsa_port_is_user(dp))
3529 				continue;
3530 
3531 			if (dp->cpu_dp != cpu_dp)
3532 				continue;
3533 
3534 			list_add(&dp->user->close_list, &close_list);
3535 		}
3536 
3537 		dev_close_many(&close_list, true);
3538 
3539 		return NOTIFY_OK;
3540 	}
3541 	default:
3542 		break;
3543 	}
3544 
3545 	return NOTIFY_DONE;
3546 }
3547 
3548 static void
3549 dsa_fdb_offload_notify(struct dsa_switchdev_event_work *switchdev_work)
3550 {
3551 	struct switchdev_notifier_fdb_info info = {};
3552 
3553 	info.addr = switchdev_work->addr;
3554 	info.vid = switchdev_work->vid;
3555 	info.offloaded = true;
3556 	call_switchdev_notifiers(SWITCHDEV_FDB_OFFLOADED,
3557 				 switchdev_work->orig_dev, &info.info, NULL);
3558 }
3559 
3560 static void dsa_user_switchdev_event_work(struct work_struct *work)
3561 {
3562 	struct dsa_switchdev_event_work *switchdev_work =
3563 		container_of(work, struct dsa_switchdev_event_work, work);
3564 	const unsigned char *addr = switchdev_work->addr;
3565 	struct net_device *dev = switchdev_work->dev;
3566 	u16 vid = switchdev_work->vid;
3567 	struct dsa_switch *ds;
3568 	struct dsa_port *dp;
3569 	int err;
3570 
3571 	dp = dsa_user_to_port(dev);
3572 	ds = dp->ds;
3573 
3574 	switch (switchdev_work->event) {
3575 	case SWITCHDEV_FDB_ADD_TO_DEVICE:
3576 		if (switchdev_work->host_addr)
3577 			err = dsa_port_bridge_host_fdb_add(dp, addr, vid);
3578 		else if (dp->lag)
3579 			err = dsa_port_lag_fdb_add(dp, addr, vid);
3580 		else
3581 			err = dsa_port_fdb_add(dp, addr, vid);
3582 		if (err) {
3583 			dev_err(ds->dev,
3584 				"port %d failed to add %pM vid %d to fdb: %d\n",
3585 				dp->index, addr, vid, err);
3586 			break;
3587 		}
3588 		dsa_fdb_offload_notify(switchdev_work);
3589 		break;
3590 
3591 	case SWITCHDEV_FDB_DEL_TO_DEVICE:
3592 		if (switchdev_work->host_addr)
3593 			err = dsa_port_bridge_host_fdb_del(dp, addr, vid);
3594 		else if (dp->lag)
3595 			err = dsa_port_lag_fdb_del(dp, addr, vid);
3596 		else
3597 			err = dsa_port_fdb_del(dp, addr, vid);
3598 		if (err) {
3599 			dev_err(ds->dev,
3600 				"port %d failed to delete %pM vid %d from fdb: %d\n",
3601 				dp->index, addr, vid, err);
3602 		}
3603 
3604 		break;
3605 	}
3606 
3607 	kfree(switchdev_work);
3608 }
3609 
3610 static bool dsa_foreign_dev_check(const struct net_device *dev,
3611 				  const struct net_device *foreign_dev)
3612 {
3613 	const struct dsa_port *dp = dsa_user_to_port(dev);
3614 	struct dsa_switch_tree *dst = dp->ds->dst;
3615 
3616 	if (netif_is_bridge_master(foreign_dev))
3617 		return !dsa_tree_offloads_bridge_dev(dst, foreign_dev);
3618 
3619 	if (netif_is_bridge_port(foreign_dev))
3620 		return !dsa_tree_offloads_bridge_port(dst, foreign_dev);
3621 
3622 	/* Everything else is foreign */
3623 	return true;
3624 }
3625 
3626 static int dsa_user_fdb_event(struct net_device *dev,
3627 			      struct net_device *orig_dev,
3628 			      unsigned long event, const void *ctx,
3629 			      const struct switchdev_notifier_fdb_info *fdb_info)
3630 {
3631 	struct dsa_switchdev_event_work *switchdev_work;
3632 	struct dsa_port *dp = dsa_user_to_port(dev);
3633 	bool host_addr = fdb_info->is_local;
3634 	struct dsa_switch *ds = dp->ds;
3635 
3636 	if (ctx && ctx != dp)
3637 		return 0;
3638 
3639 	if (!dp->bridge)
3640 		return 0;
3641 
3642 	if (switchdev_fdb_is_dynamically_learned(fdb_info)) {
3643 		if (dsa_port_offloads_bridge_port(dp, orig_dev))
3644 			return 0;
3645 
3646 		/* FDB entries learned by the software bridge or by foreign
3647 		 * bridge ports should be installed as host addresses only if
3648 		 * the driver requests assisted learning.
3649 		 */
3650 		if (!ds->assisted_learning_on_cpu_port)
3651 			return 0;
3652 	}
3653 
3654 	/* Also treat FDB entries on foreign interfaces bridged with us as host
3655 	 * addresses.
3656 	 */
3657 	if (dsa_foreign_dev_check(dev, orig_dev))
3658 		host_addr = true;
3659 
3660 	/* Check early that we're not doing work in vain.
3661 	 * Host addresses on LAG ports still require regular FDB ops,
3662 	 * since the CPU port isn't in a LAG.
3663 	 */
3664 	if (dp->lag && !host_addr) {
3665 		if (!ds->ops->lag_fdb_add || !ds->ops->lag_fdb_del)
3666 			return -EOPNOTSUPP;
3667 	} else {
3668 		if (!ds->ops->port_fdb_add || !ds->ops->port_fdb_del)
3669 			return -EOPNOTSUPP;
3670 	}
3671 
3672 	switchdev_work = kzalloc(sizeof(*switchdev_work), GFP_ATOMIC);
3673 	if (!switchdev_work)
3674 		return -ENOMEM;
3675 
3676 	netdev_dbg(dev, "%s FDB entry towards %s, addr %pM vid %d%s\n",
3677 		   event == SWITCHDEV_FDB_ADD_TO_DEVICE ? "Adding" : "Deleting",
3678 		   orig_dev->name, fdb_info->addr, fdb_info->vid,
3679 		   host_addr ? " as host address" : "");
3680 
3681 	INIT_WORK(&switchdev_work->work, dsa_user_switchdev_event_work);
3682 	switchdev_work->event = event;
3683 	switchdev_work->dev = dev;
3684 	switchdev_work->orig_dev = orig_dev;
3685 
3686 	ether_addr_copy(switchdev_work->addr, fdb_info->addr);
3687 	switchdev_work->vid = fdb_info->vid;
3688 	switchdev_work->host_addr = host_addr;
3689 
3690 	dsa_schedule_work(&switchdev_work->work);
3691 
3692 	return 0;
3693 }
3694 
3695 /* Called under rcu_read_lock() */
3696 static int dsa_user_switchdev_event(struct notifier_block *unused,
3697 				    unsigned long event, void *ptr)
3698 {
3699 	struct net_device *dev = switchdev_notifier_info_to_dev(ptr);
3700 	int err;
3701 
3702 	switch (event) {
3703 	case SWITCHDEV_PORT_ATTR_SET:
3704 		err = switchdev_handle_port_attr_set(dev, ptr,
3705 						     dsa_user_dev_check,
3706 						     dsa_user_port_attr_set);
3707 		return notifier_from_errno(err);
3708 	case SWITCHDEV_FDB_ADD_TO_DEVICE:
3709 	case SWITCHDEV_FDB_DEL_TO_DEVICE:
3710 		err = switchdev_handle_fdb_event_to_device(dev, event, ptr,
3711 							   dsa_user_dev_check,
3712 							   dsa_foreign_dev_check,
3713 							   dsa_user_fdb_event);
3714 		return notifier_from_errno(err);
3715 	default:
3716 		return NOTIFY_DONE;
3717 	}
3718 
3719 	return NOTIFY_OK;
3720 }
3721 
3722 static int dsa_user_switchdev_blocking_event(struct notifier_block *unused,
3723 					     unsigned long event, void *ptr)
3724 {
3725 	struct net_device *dev = switchdev_notifier_info_to_dev(ptr);
3726 	int err;
3727 
3728 	switch (event) {
3729 	case SWITCHDEV_PORT_OBJ_ADD:
3730 		err = switchdev_handle_port_obj_add_foreign(dev, ptr,
3731 							    dsa_user_dev_check,
3732 							    dsa_foreign_dev_check,
3733 							    dsa_user_port_obj_add);
3734 		return notifier_from_errno(err);
3735 	case SWITCHDEV_PORT_OBJ_DEL:
3736 		err = switchdev_handle_port_obj_del_foreign(dev, ptr,
3737 							    dsa_user_dev_check,
3738 							    dsa_foreign_dev_check,
3739 							    dsa_user_port_obj_del);
3740 		return notifier_from_errno(err);
3741 	case SWITCHDEV_PORT_ATTR_SET:
3742 		err = switchdev_handle_port_attr_set(dev, ptr,
3743 						     dsa_user_dev_check,
3744 						     dsa_user_port_attr_set);
3745 		return notifier_from_errno(err);
3746 	}
3747 
3748 	return NOTIFY_DONE;
3749 }
3750 
3751 static struct notifier_block dsa_user_nb __read_mostly = {
3752 	.notifier_call  = dsa_user_netdevice_event,
3753 };
3754 
3755 struct notifier_block dsa_user_switchdev_notifier = {
3756 	.notifier_call = dsa_user_switchdev_event,
3757 };
3758 
3759 struct notifier_block dsa_user_switchdev_blocking_notifier = {
3760 	.notifier_call = dsa_user_switchdev_blocking_event,
3761 };
3762 
3763 int dsa_user_register_notifier(void)
3764 {
3765 	struct notifier_block *nb;
3766 	int err;
3767 
3768 	err = register_netdevice_notifier(&dsa_user_nb);
3769 	if (err)
3770 		return err;
3771 
3772 	err = register_switchdev_notifier(&dsa_user_switchdev_notifier);
3773 	if (err)
3774 		goto err_switchdev_nb;
3775 
3776 	nb = &dsa_user_switchdev_blocking_notifier;
3777 	err = register_switchdev_blocking_notifier(nb);
3778 	if (err)
3779 		goto err_switchdev_blocking_nb;
3780 
3781 	return 0;
3782 
3783 err_switchdev_blocking_nb:
3784 	unregister_switchdev_notifier(&dsa_user_switchdev_notifier);
3785 err_switchdev_nb:
3786 	unregister_netdevice_notifier(&dsa_user_nb);
3787 	return err;
3788 }
3789 
3790 void dsa_user_unregister_notifier(void)
3791 {
3792 	struct notifier_block *nb;
3793 	int err;
3794 
3795 	nb = &dsa_user_switchdev_blocking_notifier;
3796 	err = unregister_switchdev_blocking_notifier(nb);
3797 	if (err)
3798 		pr_err("DSA: failed to unregister switchdev blocking notifier (%d)\n", err);
3799 
3800 	err = unregister_switchdev_notifier(&dsa_user_switchdev_notifier);
3801 	if (err)
3802 		pr_err("DSA: failed to unregister switchdev notifier (%d)\n", err);
3803 
3804 	err = unregister_netdevice_notifier(&dsa_user_nb);
3805 	if (err)
3806 		pr_err("DSA: failed to unregister user notifier (%d)\n", err);
3807 }
3808