1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * net/dsa/user.c - user device handling 4 * Copyright (c) 2008-2009 Marvell Semiconductor 5 */ 6 7 #include <linux/list.h> 8 #include <linux/etherdevice.h> 9 #include <linux/netdevice.h> 10 #include <linux/phy.h> 11 #include <linux/phy_fixed.h> 12 #include <linux/phylink.h> 13 #include <linux/of_net.h> 14 #include <linux/of_mdio.h> 15 #include <linux/mdio.h> 16 #include <net/rtnetlink.h> 17 #include <net/pkt_cls.h> 18 #include <net/selftests.h> 19 #include <net/tc_act/tc_mirred.h> 20 #include <linux/if_bridge.h> 21 #include <linux/if_hsr.h> 22 #include <net/dcbnl.h> 23 #include <linux/netpoll.h> 24 #include <linux/string.h> 25 26 #include "conduit.h" 27 #include "dsa.h" 28 #include "netlink.h" 29 #include "port.h" 30 #include "switch.h" 31 #include "tag.h" 32 #include "user.h" 33 34 struct dsa_switchdev_event_work { 35 struct net_device *dev; 36 struct net_device *orig_dev; 37 struct work_struct work; 38 unsigned long event; 39 /* Specific for SWITCHDEV_FDB_ADD_TO_DEVICE and 40 * SWITCHDEV_FDB_DEL_TO_DEVICE 41 */ 42 unsigned char addr[ETH_ALEN]; 43 u16 vid; 44 bool host_addr; 45 }; 46 47 enum dsa_standalone_event { 48 DSA_UC_ADD, 49 DSA_UC_DEL, 50 DSA_MC_ADD, 51 DSA_MC_DEL, 52 }; 53 54 struct dsa_standalone_event_work { 55 struct work_struct work; 56 struct net_device *dev; 57 enum dsa_standalone_event event; 58 unsigned char addr[ETH_ALEN]; 59 u16 vid; 60 }; 61 62 struct dsa_host_vlan_rx_filtering_ctx { 63 struct net_device *dev; 64 const unsigned char *addr; 65 enum dsa_standalone_event event; 66 }; 67 68 static bool dsa_switch_supports_uc_filtering(struct dsa_switch *ds) 69 { 70 return ds->ops->port_fdb_add && ds->ops->port_fdb_del && 71 ds->fdb_isolation && !ds->vlan_filtering_is_global && 72 !ds->needs_standalone_vlan_filtering; 73 } 74 75 static bool dsa_switch_supports_mc_filtering(struct dsa_switch *ds) 76 { 77 return ds->ops->port_mdb_add && ds->ops->port_mdb_del && 78 ds->fdb_isolation && !ds->vlan_filtering_is_global && 79 !ds->needs_standalone_vlan_filtering; 80 } 81 82 static void dsa_user_standalone_event_work(struct work_struct *work) 83 { 84 struct dsa_standalone_event_work *standalone_work = 85 container_of(work, struct dsa_standalone_event_work, work); 86 const unsigned char *addr = standalone_work->addr; 87 struct net_device *dev = standalone_work->dev; 88 struct dsa_port *dp = dsa_user_to_port(dev); 89 struct switchdev_obj_port_mdb mdb; 90 struct dsa_switch *ds = dp->ds; 91 u16 vid = standalone_work->vid; 92 int err; 93 94 switch (standalone_work->event) { 95 case DSA_UC_ADD: 96 err = dsa_port_standalone_host_fdb_add(dp, addr, vid); 97 if (err) { 98 dev_err(ds->dev, 99 "port %d failed to add %pM vid %d to fdb: %d\n", 100 dp->index, addr, vid, err); 101 break; 102 } 103 break; 104 105 case DSA_UC_DEL: 106 err = dsa_port_standalone_host_fdb_del(dp, addr, vid); 107 if (err) { 108 dev_err(ds->dev, 109 "port %d failed to delete %pM vid %d from fdb: %d\n", 110 dp->index, addr, vid, err); 111 } 112 113 break; 114 case DSA_MC_ADD: 115 ether_addr_copy(mdb.addr, addr); 116 mdb.vid = vid; 117 118 err = dsa_port_standalone_host_mdb_add(dp, &mdb); 119 if (err) { 120 dev_err(ds->dev, 121 "port %d failed to add %pM vid %d to mdb: %d\n", 122 dp->index, addr, vid, err); 123 break; 124 } 125 break; 126 case DSA_MC_DEL: 127 ether_addr_copy(mdb.addr, addr); 128 mdb.vid = vid; 129 130 err = dsa_port_standalone_host_mdb_del(dp, &mdb); 131 if (err) { 132 dev_err(ds->dev, 133 "port %d failed to delete %pM vid %d from mdb: %d\n", 134 dp->index, addr, vid, err); 135 } 136 137 break; 138 } 139 140 kfree(standalone_work); 141 } 142 143 static int dsa_user_schedule_standalone_work(struct net_device *dev, 144 enum dsa_standalone_event event, 145 const unsigned char *addr, 146 u16 vid) 147 { 148 struct dsa_standalone_event_work *standalone_work; 149 150 standalone_work = kzalloc(sizeof(*standalone_work), GFP_ATOMIC); 151 if (!standalone_work) 152 return -ENOMEM; 153 154 INIT_WORK(&standalone_work->work, dsa_user_standalone_event_work); 155 standalone_work->event = event; 156 standalone_work->dev = dev; 157 158 ether_addr_copy(standalone_work->addr, addr); 159 standalone_work->vid = vid; 160 161 dsa_schedule_work(&standalone_work->work); 162 163 return 0; 164 } 165 166 static int dsa_user_host_vlan_rx_filtering(void *arg, int vid) 167 { 168 struct dsa_host_vlan_rx_filtering_ctx *ctx = arg; 169 170 return dsa_user_schedule_standalone_work(ctx->dev, ctx->event, 171 ctx->addr, vid); 172 } 173 174 static int dsa_user_vlan_for_each(struct net_device *dev, 175 int (*cb)(void *arg, int vid), void *arg) 176 { 177 struct dsa_port *dp = dsa_user_to_port(dev); 178 struct dsa_vlan *v; 179 int err; 180 181 lockdep_assert_held(&dev->addr_list_lock); 182 183 err = cb(arg, 0); 184 if (err) 185 return err; 186 187 list_for_each_entry(v, &dp->user_vlans, list) { 188 err = cb(arg, v->vid); 189 if (err) 190 return err; 191 } 192 193 return 0; 194 } 195 196 static int dsa_user_sync_uc(struct net_device *dev, 197 const unsigned char *addr) 198 { 199 struct net_device *conduit = dsa_user_to_conduit(dev); 200 struct dsa_port *dp = dsa_user_to_port(dev); 201 struct dsa_host_vlan_rx_filtering_ctx ctx = { 202 .dev = dev, 203 .addr = addr, 204 .event = DSA_UC_ADD, 205 }; 206 207 dev_uc_add(conduit, addr); 208 209 if (!dsa_switch_supports_uc_filtering(dp->ds)) 210 return 0; 211 212 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 213 &ctx); 214 } 215 216 static int dsa_user_unsync_uc(struct net_device *dev, 217 const unsigned char *addr) 218 { 219 struct net_device *conduit = dsa_user_to_conduit(dev); 220 struct dsa_port *dp = dsa_user_to_port(dev); 221 struct dsa_host_vlan_rx_filtering_ctx ctx = { 222 .dev = dev, 223 .addr = addr, 224 .event = DSA_UC_DEL, 225 }; 226 227 dev_uc_del(conduit, addr); 228 229 if (!dsa_switch_supports_uc_filtering(dp->ds)) 230 return 0; 231 232 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 233 &ctx); 234 } 235 236 static int dsa_user_sync_mc(struct net_device *dev, 237 const unsigned char *addr) 238 { 239 struct net_device *conduit = dsa_user_to_conduit(dev); 240 struct dsa_port *dp = dsa_user_to_port(dev); 241 struct dsa_host_vlan_rx_filtering_ctx ctx = { 242 .dev = dev, 243 .addr = addr, 244 .event = DSA_MC_ADD, 245 }; 246 247 dev_mc_add(conduit, addr); 248 249 if (!dsa_switch_supports_mc_filtering(dp->ds)) 250 return 0; 251 252 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 253 &ctx); 254 } 255 256 static int dsa_user_unsync_mc(struct net_device *dev, 257 const unsigned char *addr) 258 { 259 struct net_device *conduit = dsa_user_to_conduit(dev); 260 struct dsa_port *dp = dsa_user_to_port(dev); 261 struct dsa_host_vlan_rx_filtering_ctx ctx = { 262 .dev = dev, 263 .addr = addr, 264 .event = DSA_MC_DEL, 265 }; 266 267 dev_mc_del(conduit, addr); 268 269 if (!dsa_switch_supports_mc_filtering(dp->ds)) 270 return 0; 271 272 return dsa_user_vlan_for_each(dev, dsa_user_host_vlan_rx_filtering, 273 &ctx); 274 } 275 276 void dsa_user_sync_ha(struct net_device *dev) 277 { 278 struct dsa_port *dp = dsa_user_to_port(dev); 279 struct dsa_switch *ds = dp->ds; 280 struct netdev_hw_addr *ha; 281 282 netif_addr_lock_bh(dev); 283 284 netdev_for_each_synced_mc_addr(ha, dev) 285 dsa_user_sync_mc(dev, ha->addr); 286 287 netdev_for_each_synced_uc_addr(ha, dev) 288 dsa_user_sync_uc(dev, ha->addr); 289 290 netif_addr_unlock_bh(dev); 291 292 if (dsa_switch_supports_uc_filtering(ds) || 293 dsa_switch_supports_mc_filtering(ds)) 294 dsa_flush_workqueue(); 295 } 296 297 void dsa_user_unsync_ha(struct net_device *dev) 298 { 299 struct dsa_port *dp = dsa_user_to_port(dev); 300 struct dsa_switch *ds = dp->ds; 301 struct netdev_hw_addr *ha; 302 303 netif_addr_lock_bh(dev); 304 305 netdev_for_each_synced_uc_addr(ha, dev) 306 dsa_user_unsync_uc(dev, ha->addr); 307 308 netdev_for_each_synced_mc_addr(ha, dev) 309 dsa_user_unsync_mc(dev, ha->addr); 310 311 netif_addr_unlock_bh(dev); 312 313 if (dsa_switch_supports_uc_filtering(ds) || 314 dsa_switch_supports_mc_filtering(ds)) 315 dsa_flush_workqueue(); 316 } 317 318 /* user mii_bus handling ***************************************************/ 319 static int dsa_user_phy_read(struct mii_bus *bus, int addr, int reg) 320 { 321 struct dsa_switch *ds = bus->priv; 322 323 if (ds->phys_mii_mask & (1 << addr)) 324 return ds->ops->phy_read(ds, addr, reg); 325 326 return 0xffff; 327 } 328 329 static int dsa_user_phy_write(struct mii_bus *bus, int addr, int reg, u16 val) 330 { 331 struct dsa_switch *ds = bus->priv; 332 333 if (ds->phys_mii_mask & (1 << addr)) 334 return ds->ops->phy_write(ds, addr, reg, val); 335 336 return 0; 337 } 338 339 void dsa_user_mii_bus_init(struct dsa_switch *ds) 340 { 341 ds->user_mii_bus->priv = (void *)ds; 342 ds->user_mii_bus->name = "dsa user smi"; 343 ds->user_mii_bus->read = dsa_user_phy_read; 344 ds->user_mii_bus->write = dsa_user_phy_write; 345 snprintf(ds->user_mii_bus->id, MII_BUS_ID_SIZE, "dsa-%d.%d", 346 ds->dst->index, ds->index); 347 ds->user_mii_bus->parent = ds->dev; 348 ds->user_mii_bus->phy_mask = ~ds->phys_mii_mask; 349 } 350 351 352 /* user device handling ****************************************************/ 353 static int dsa_user_get_iflink(const struct net_device *dev) 354 { 355 return READ_ONCE(dsa_user_to_conduit(dev)->ifindex); 356 } 357 358 int dsa_user_host_uc_install(struct net_device *dev, const u8 *addr) 359 { 360 struct net_device *conduit = dsa_user_to_conduit(dev); 361 struct dsa_port *dp = dsa_user_to_port(dev); 362 struct dsa_switch *ds = dp->ds; 363 int err; 364 365 if (dsa_switch_supports_uc_filtering(ds)) { 366 err = dsa_port_standalone_host_fdb_add(dp, addr, 0); 367 if (err) 368 goto out; 369 } 370 371 if (!ether_addr_equal(addr, conduit->dev_addr)) { 372 err = dev_uc_add(conduit, addr); 373 if (err < 0) 374 goto del_host_addr; 375 } 376 377 return 0; 378 379 del_host_addr: 380 if (dsa_switch_supports_uc_filtering(ds)) 381 dsa_port_standalone_host_fdb_del(dp, addr, 0); 382 out: 383 return err; 384 } 385 386 void dsa_user_host_uc_uninstall(struct net_device *dev) 387 { 388 struct net_device *conduit = dsa_user_to_conduit(dev); 389 struct dsa_port *dp = dsa_user_to_port(dev); 390 struct dsa_switch *ds = dp->ds; 391 392 if (!ether_addr_equal(dev->dev_addr, conduit->dev_addr)) 393 dev_uc_del(conduit, dev->dev_addr); 394 395 if (dsa_switch_supports_uc_filtering(ds)) 396 dsa_port_standalone_host_fdb_del(dp, dev->dev_addr, 0); 397 } 398 399 static int dsa_user_open(struct net_device *dev) 400 { 401 struct net_device *conduit = dsa_user_to_conduit(dev); 402 struct dsa_port *dp = dsa_user_to_port(dev); 403 int err; 404 405 err = dev_open(conduit, NULL); 406 if (err < 0) { 407 netdev_err(dev, "failed to open conduit %s\n", conduit->name); 408 goto out; 409 } 410 411 err = dsa_user_host_uc_install(dev, dev->dev_addr); 412 if (err) 413 goto out; 414 415 err = dsa_port_enable_rt(dp, dev->phydev); 416 if (err) 417 goto out_del_host_uc; 418 419 return 0; 420 421 out_del_host_uc: 422 dsa_user_host_uc_uninstall(dev); 423 out: 424 return err; 425 } 426 427 static int dsa_user_close(struct net_device *dev) 428 { 429 struct dsa_port *dp = dsa_user_to_port(dev); 430 431 dsa_port_disable_rt(dp); 432 433 dsa_user_host_uc_uninstall(dev); 434 435 return 0; 436 } 437 438 static void dsa_user_manage_host_flood(struct net_device *dev) 439 { 440 bool mc = dev->flags & (IFF_PROMISC | IFF_ALLMULTI); 441 struct dsa_port *dp = dsa_user_to_port(dev); 442 bool uc = dev->flags & IFF_PROMISC; 443 444 dsa_port_set_host_flood(dp, uc, mc); 445 } 446 447 static void dsa_user_change_rx_flags(struct net_device *dev, int change) 448 { 449 struct net_device *conduit = dsa_user_to_conduit(dev); 450 struct dsa_port *dp = dsa_user_to_port(dev); 451 struct dsa_switch *ds = dp->ds; 452 453 if (change & IFF_ALLMULTI) 454 dev_set_allmulti(conduit, 455 dev->flags & IFF_ALLMULTI ? 1 : -1); 456 if (change & IFF_PROMISC) 457 dev_set_promiscuity(conduit, 458 dev->flags & IFF_PROMISC ? 1 : -1); 459 460 if (dsa_switch_supports_uc_filtering(ds) && 461 dsa_switch_supports_mc_filtering(ds)) 462 dsa_user_manage_host_flood(dev); 463 } 464 465 static void dsa_user_set_rx_mode(struct net_device *dev) 466 { 467 __dev_mc_sync(dev, dsa_user_sync_mc, dsa_user_unsync_mc); 468 __dev_uc_sync(dev, dsa_user_sync_uc, dsa_user_unsync_uc); 469 } 470 471 static int dsa_user_set_mac_address(struct net_device *dev, void *a) 472 { 473 struct dsa_port *dp = dsa_user_to_port(dev); 474 struct dsa_switch *ds = dp->ds; 475 struct sockaddr *addr = a; 476 int err; 477 478 if (!is_valid_ether_addr(addr->sa_data)) 479 return -EADDRNOTAVAIL; 480 481 if (ds->ops->port_set_mac_address) { 482 err = ds->ops->port_set_mac_address(ds, dp->index, 483 addr->sa_data); 484 if (err) 485 return err; 486 } 487 488 /* If the port is down, the address isn't synced yet to hardware or 489 * to the DSA conduit, so there is nothing to change. 490 */ 491 if (!(dev->flags & IFF_UP)) 492 goto out_change_dev_addr; 493 494 err = dsa_user_host_uc_install(dev, addr->sa_data); 495 if (err) 496 return err; 497 498 dsa_user_host_uc_uninstall(dev); 499 500 out_change_dev_addr: 501 eth_hw_addr_set(dev, addr->sa_data); 502 503 return 0; 504 } 505 506 struct dsa_user_dump_ctx { 507 struct net_device *dev; 508 struct sk_buff *skb; 509 struct netlink_callback *cb; 510 int idx; 511 }; 512 513 static int 514 dsa_user_port_fdb_do_dump(const unsigned char *addr, u16 vid, 515 bool is_static, void *data) 516 { 517 struct dsa_user_dump_ctx *dump = data; 518 struct ndo_fdb_dump_context *ctx = (void *)dump->cb->ctx; 519 u32 portid = NETLINK_CB(dump->cb->skb).portid; 520 u32 seq = dump->cb->nlh->nlmsg_seq; 521 struct nlmsghdr *nlh; 522 struct ndmsg *ndm; 523 524 if (dump->idx < ctx->fdb_idx) 525 goto skip; 526 527 nlh = nlmsg_put(dump->skb, portid, seq, RTM_NEWNEIGH, 528 sizeof(*ndm), NLM_F_MULTI); 529 if (!nlh) 530 return -EMSGSIZE; 531 532 ndm = nlmsg_data(nlh); 533 ndm->ndm_family = AF_BRIDGE; 534 ndm->ndm_pad1 = 0; 535 ndm->ndm_pad2 = 0; 536 ndm->ndm_flags = NTF_SELF; 537 ndm->ndm_type = 0; 538 ndm->ndm_ifindex = dump->dev->ifindex; 539 ndm->ndm_state = is_static ? NUD_NOARP : NUD_REACHABLE; 540 541 if (nla_put(dump->skb, NDA_LLADDR, ETH_ALEN, addr)) 542 goto nla_put_failure; 543 544 if (vid && nla_put_u16(dump->skb, NDA_VLAN, vid)) 545 goto nla_put_failure; 546 547 nlmsg_end(dump->skb, nlh); 548 549 skip: 550 dump->idx++; 551 return 0; 552 553 nla_put_failure: 554 nlmsg_cancel(dump->skb, nlh); 555 return -EMSGSIZE; 556 } 557 558 static int 559 dsa_user_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb, 560 struct net_device *dev, struct net_device *filter_dev, 561 int *idx) 562 { 563 struct dsa_port *dp = dsa_user_to_port(dev); 564 struct dsa_user_dump_ctx dump = { 565 .dev = dev, 566 .skb = skb, 567 .cb = cb, 568 .idx = *idx, 569 }; 570 int err; 571 572 err = dsa_port_fdb_dump(dp, dsa_user_port_fdb_do_dump, &dump); 573 *idx = dump.idx; 574 575 return err; 576 } 577 578 static int dsa_user_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) 579 { 580 struct dsa_user_priv *p = netdev_priv(dev); 581 struct dsa_switch *ds = p->dp->ds; 582 int port = p->dp->index; 583 584 /* Pass through to switch driver if it supports timestamping */ 585 switch (cmd) { 586 case SIOCGHWTSTAMP: 587 if (ds->ops->port_hwtstamp_get) 588 return ds->ops->port_hwtstamp_get(ds, port, ifr); 589 break; 590 case SIOCSHWTSTAMP: 591 if (ds->ops->port_hwtstamp_set) 592 return ds->ops->port_hwtstamp_set(ds, port, ifr); 593 break; 594 } 595 596 return phylink_mii_ioctl(p->dp->pl, ifr, cmd); 597 } 598 599 static int dsa_user_port_attr_set(struct net_device *dev, const void *ctx, 600 const struct switchdev_attr *attr, 601 struct netlink_ext_ack *extack) 602 { 603 struct dsa_port *dp = dsa_user_to_port(dev); 604 int ret; 605 606 if (ctx && ctx != dp) 607 return 0; 608 609 switch (attr->id) { 610 case SWITCHDEV_ATTR_ID_PORT_STP_STATE: 611 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 612 return -EOPNOTSUPP; 613 614 ret = dsa_port_set_state(dp, attr->u.stp_state, true); 615 break; 616 case SWITCHDEV_ATTR_ID_PORT_MST_STATE: 617 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 618 return -EOPNOTSUPP; 619 620 ret = dsa_port_set_mst_state(dp, &attr->u.mst_state, extack); 621 break; 622 case SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING: 623 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 624 return -EOPNOTSUPP; 625 626 ret = dsa_port_vlan_filtering(dp, attr->u.vlan_filtering, 627 extack); 628 break; 629 case SWITCHDEV_ATTR_ID_BRIDGE_AGEING_TIME: 630 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 631 return -EOPNOTSUPP; 632 633 ret = dsa_port_ageing_time(dp, attr->u.ageing_time); 634 break; 635 case SWITCHDEV_ATTR_ID_BRIDGE_MST: 636 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 637 return -EOPNOTSUPP; 638 639 ret = dsa_port_mst_enable(dp, attr->u.mst, extack); 640 break; 641 case SWITCHDEV_ATTR_ID_PORT_PRE_BRIDGE_FLAGS: 642 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 643 return -EOPNOTSUPP; 644 645 ret = dsa_port_pre_bridge_flags(dp, attr->u.brport_flags, 646 extack); 647 break; 648 case SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS: 649 if (!dsa_port_offloads_bridge_port(dp, attr->orig_dev)) 650 return -EOPNOTSUPP; 651 652 ret = dsa_port_bridge_flags(dp, attr->u.brport_flags, extack); 653 break; 654 case SWITCHDEV_ATTR_ID_VLAN_MSTI: 655 if (!dsa_port_offloads_bridge_dev(dp, attr->orig_dev)) 656 return -EOPNOTSUPP; 657 658 ret = dsa_port_vlan_msti(dp, &attr->u.vlan_msti); 659 break; 660 default: 661 ret = -EOPNOTSUPP; 662 break; 663 } 664 665 return ret; 666 } 667 668 /* Must be called under rcu_read_lock() */ 669 static int 670 dsa_user_vlan_check_for_8021q_uppers(struct net_device *user, 671 const struct switchdev_obj_port_vlan *vlan) 672 { 673 struct net_device *upper_dev; 674 struct list_head *iter; 675 676 netdev_for_each_upper_dev_rcu(user, upper_dev, iter) { 677 u16 vid; 678 679 if (!is_vlan_dev(upper_dev)) 680 continue; 681 682 vid = vlan_dev_vlan_id(upper_dev); 683 if (vid == vlan->vid) 684 return -EBUSY; 685 } 686 687 return 0; 688 } 689 690 static int dsa_user_vlan_add(struct net_device *dev, 691 const struct switchdev_obj *obj, 692 struct netlink_ext_ack *extack) 693 { 694 struct dsa_port *dp = dsa_user_to_port(dev); 695 struct switchdev_obj_port_vlan *vlan; 696 int err; 697 698 if (dsa_port_skip_vlan_configuration(dp)) { 699 NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); 700 return 0; 701 } 702 703 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 704 705 /* Deny adding a bridge VLAN when there is already an 802.1Q upper with 706 * the same VID. 707 */ 708 if (br_vlan_enabled(dsa_port_bridge_dev_get(dp))) { 709 rcu_read_lock(); 710 err = dsa_user_vlan_check_for_8021q_uppers(dev, vlan); 711 rcu_read_unlock(); 712 if (err) { 713 NL_SET_ERR_MSG_MOD(extack, 714 "Port already has a VLAN upper with this VID"); 715 return err; 716 } 717 } 718 719 return dsa_port_vlan_add(dp, vlan, extack); 720 } 721 722 /* Offload a VLAN installed on the bridge or on a foreign interface by 723 * installing it as a VLAN towards the CPU port. 724 */ 725 static int dsa_user_host_vlan_add(struct net_device *dev, 726 const struct switchdev_obj *obj, 727 struct netlink_ext_ack *extack) 728 { 729 struct dsa_port *dp = dsa_user_to_port(dev); 730 struct switchdev_obj_port_vlan vlan; 731 732 /* Do nothing if this is a software bridge */ 733 if (!dp->bridge) 734 return -EOPNOTSUPP; 735 736 if (dsa_port_skip_vlan_configuration(dp)) { 737 NL_SET_ERR_MSG_MOD(extack, "skipping configuration of VLAN"); 738 return 0; 739 } 740 741 vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj); 742 743 /* Even though drivers often handle CPU membership in special ways, 744 * it doesn't make sense to program a PVID, so clear this flag. 745 */ 746 vlan.flags &= ~BRIDGE_VLAN_INFO_PVID; 747 748 return dsa_port_host_vlan_add(dp, &vlan, extack); 749 } 750 751 static int dsa_user_port_obj_add(struct net_device *dev, const void *ctx, 752 const struct switchdev_obj *obj, 753 struct netlink_ext_ack *extack) 754 { 755 struct dsa_port *dp = dsa_user_to_port(dev); 756 int err; 757 758 if (ctx && ctx != dp) 759 return 0; 760 761 switch (obj->id) { 762 case SWITCHDEV_OBJ_ID_PORT_MDB: 763 if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 764 return -EOPNOTSUPP; 765 766 err = dsa_port_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 767 break; 768 case SWITCHDEV_OBJ_ID_HOST_MDB: 769 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 770 return -EOPNOTSUPP; 771 772 err = dsa_port_bridge_host_mdb_add(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 773 break; 774 case SWITCHDEV_OBJ_ID_PORT_VLAN: 775 if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 776 err = dsa_user_vlan_add(dev, obj, extack); 777 else 778 err = dsa_user_host_vlan_add(dev, obj, extack); 779 break; 780 case SWITCHDEV_OBJ_ID_MRP: 781 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 782 return -EOPNOTSUPP; 783 784 err = dsa_port_mrp_add(dp, SWITCHDEV_OBJ_MRP(obj)); 785 break; 786 case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: 787 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 788 return -EOPNOTSUPP; 789 790 err = dsa_port_mrp_add_ring_role(dp, 791 SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); 792 break; 793 default: 794 err = -EOPNOTSUPP; 795 break; 796 } 797 798 return err; 799 } 800 801 static int dsa_user_vlan_del(struct net_device *dev, 802 const struct switchdev_obj *obj) 803 { 804 struct dsa_port *dp = dsa_user_to_port(dev); 805 struct switchdev_obj_port_vlan *vlan; 806 807 if (dsa_port_skip_vlan_configuration(dp)) 808 return 0; 809 810 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 811 812 return dsa_port_vlan_del(dp, vlan); 813 } 814 815 static int dsa_user_host_vlan_del(struct net_device *dev, 816 const struct switchdev_obj *obj) 817 { 818 struct dsa_port *dp = dsa_user_to_port(dev); 819 struct switchdev_obj_port_vlan *vlan; 820 821 /* Do nothing if this is a software bridge */ 822 if (!dp->bridge) 823 return -EOPNOTSUPP; 824 825 if (dsa_port_skip_vlan_configuration(dp)) 826 return 0; 827 828 vlan = SWITCHDEV_OBJ_PORT_VLAN(obj); 829 830 return dsa_port_host_vlan_del(dp, vlan); 831 } 832 833 static int dsa_user_port_obj_del(struct net_device *dev, const void *ctx, 834 const struct switchdev_obj *obj) 835 { 836 struct dsa_port *dp = dsa_user_to_port(dev); 837 int err; 838 839 if (ctx && ctx != dp) 840 return 0; 841 842 switch (obj->id) { 843 case SWITCHDEV_OBJ_ID_PORT_MDB: 844 if (!dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 845 return -EOPNOTSUPP; 846 847 err = dsa_port_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 848 break; 849 case SWITCHDEV_OBJ_ID_HOST_MDB: 850 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 851 return -EOPNOTSUPP; 852 853 err = dsa_port_bridge_host_mdb_del(dp, SWITCHDEV_OBJ_PORT_MDB(obj)); 854 break; 855 case SWITCHDEV_OBJ_ID_PORT_VLAN: 856 if (dsa_port_offloads_bridge_port(dp, obj->orig_dev)) 857 err = dsa_user_vlan_del(dev, obj); 858 else 859 err = dsa_user_host_vlan_del(dev, obj); 860 break; 861 case SWITCHDEV_OBJ_ID_MRP: 862 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 863 return -EOPNOTSUPP; 864 865 err = dsa_port_mrp_del(dp, SWITCHDEV_OBJ_MRP(obj)); 866 break; 867 case SWITCHDEV_OBJ_ID_RING_ROLE_MRP: 868 if (!dsa_port_offloads_bridge_dev(dp, obj->orig_dev)) 869 return -EOPNOTSUPP; 870 871 err = dsa_port_mrp_del_ring_role(dp, 872 SWITCHDEV_OBJ_RING_ROLE_MRP(obj)); 873 break; 874 default: 875 err = -EOPNOTSUPP; 876 break; 877 } 878 879 return err; 880 } 881 882 static netdev_tx_t dsa_user_netpoll_send_skb(struct net_device *dev, 883 struct sk_buff *skb) 884 { 885 #ifdef CONFIG_NET_POLL_CONTROLLER 886 struct dsa_user_priv *p = netdev_priv(dev); 887 888 return netpoll_send_skb(p->netpoll, skb); 889 #else 890 BUG(); 891 return NETDEV_TX_OK; 892 #endif 893 } 894 895 static void dsa_skb_tx_timestamp(struct dsa_user_priv *p, 896 struct sk_buff *skb) 897 { 898 struct dsa_switch *ds = p->dp->ds; 899 900 if (!(skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP)) 901 return; 902 903 if (!ds->ops->port_txtstamp) 904 return; 905 906 ds->ops->port_txtstamp(ds, p->dp->index, skb); 907 } 908 909 netdev_tx_t dsa_enqueue_skb(struct sk_buff *skb, struct net_device *dev) 910 { 911 /* SKB for netpoll still need to be mangled with the protocol-specific 912 * tag to be successfully transmitted 913 */ 914 if (unlikely(netpoll_tx_running(dev))) 915 return dsa_user_netpoll_send_skb(dev, skb); 916 917 /* Queue the SKB for transmission on the parent interface, but 918 * do not modify its EtherType 919 */ 920 skb->dev = dsa_user_to_conduit(dev); 921 dev_queue_xmit(skb); 922 923 return NETDEV_TX_OK; 924 } 925 EXPORT_SYMBOL_GPL(dsa_enqueue_skb); 926 927 static netdev_tx_t dsa_user_xmit(struct sk_buff *skb, struct net_device *dev) 928 { 929 struct dsa_user_priv *p = netdev_priv(dev); 930 struct sk_buff *nskb; 931 932 dev_sw_netstats_tx_add(dev, 1, skb->len); 933 934 memset(skb->cb, 0, sizeof(skb->cb)); 935 936 /* Handle tx timestamp if any */ 937 dsa_skb_tx_timestamp(p, skb); 938 939 if (skb_ensure_writable_head_tail(skb, dev)) { 940 dev_kfree_skb_any(skb); 941 return NETDEV_TX_OK; 942 } 943 944 /* needed_tailroom should still be 'warm' in the cache line from 945 * skb_ensure_writable_head_tail(), which has also ensured that 946 * padding is safe. 947 */ 948 if (dev->needed_tailroom) 949 eth_skb_pad(skb); 950 951 /* Transmit function may have to reallocate the original SKB, 952 * in which case it must have freed it. Only free it here on error. 953 */ 954 nskb = p->xmit(skb, dev); 955 if (!nskb) { 956 kfree_skb(skb); 957 return NETDEV_TX_OK; 958 } 959 960 return dsa_enqueue_skb(nskb, dev); 961 } 962 963 /* ethtool operations *******************************************************/ 964 965 static void dsa_user_get_drvinfo(struct net_device *dev, 966 struct ethtool_drvinfo *drvinfo) 967 { 968 strscpy(drvinfo->driver, "dsa", sizeof(drvinfo->driver)); 969 strscpy(drvinfo->fw_version, "N/A", sizeof(drvinfo->fw_version)); 970 strscpy(drvinfo->bus_info, "platform", sizeof(drvinfo->bus_info)); 971 } 972 973 static int dsa_user_get_regs_len(struct net_device *dev) 974 { 975 struct dsa_port *dp = dsa_user_to_port(dev); 976 struct dsa_switch *ds = dp->ds; 977 978 if (ds->ops->get_regs_len) 979 return ds->ops->get_regs_len(ds, dp->index); 980 981 return -EOPNOTSUPP; 982 } 983 984 static void 985 dsa_user_get_regs(struct net_device *dev, struct ethtool_regs *regs, void *_p) 986 { 987 struct dsa_port *dp = dsa_user_to_port(dev); 988 struct dsa_switch *ds = dp->ds; 989 990 if (ds->ops->get_regs) 991 ds->ops->get_regs(ds, dp->index, regs, _p); 992 } 993 994 static int dsa_user_nway_reset(struct net_device *dev) 995 { 996 struct dsa_port *dp = dsa_user_to_port(dev); 997 998 return phylink_ethtool_nway_reset(dp->pl); 999 } 1000 1001 static int dsa_user_get_eeprom_len(struct net_device *dev) 1002 { 1003 struct dsa_port *dp = dsa_user_to_port(dev); 1004 struct dsa_switch *ds = dp->ds; 1005 1006 if (ds->cd && ds->cd->eeprom_len) 1007 return ds->cd->eeprom_len; 1008 1009 if (ds->ops->get_eeprom_len) 1010 return ds->ops->get_eeprom_len(ds); 1011 1012 return 0; 1013 } 1014 1015 static int dsa_user_get_eeprom(struct net_device *dev, 1016 struct ethtool_eeprom *eeprom, u8 *data) 1017 { 1018 struct dsa_port *dp = dsa_user_to_port(dev); 1019 struct dsa_switch *ds = dp->ds; 1020 1021 if (ds->ops->get_eeprom) 1022 return ds->ops->get_eeprom(ds, eeprom, data); 1023 1024 return -EOPNOTSUPP; 1025 } 1026 1027 static int dsa_user_set_eeprom(struct net_device *dev, 1028 struct ethtool_eeprom *eeprom, u8 *data) 1029 { 1030 struct dsa_port *dp = dsa_user_to_port(dev); 1031 struct dsa_switch *ds = dp->ds; 1032 1033 if (ds->ops->set_eeprom) 1034 return ds->ops->set_eeprom(ds, eeprom, data); 1035 1036 return -EOPNOTSUPP; 1037 } 1038 1039 static void dsa_user_get_strings(struct net_device *dev, 1040 uint32_t stringset, uint8_t *data) 1041 { 1042 struct dsa_port *dp = dsa_user_to_port(dev); 1043 struct dsa_switch *ds = dp->ds; 1044 1045 if (stringset == ETH_SS_STATS) { 1046 ethtool_puts(&data, "tx_packets"); 1047 ethtool_puts(&data, "tx_bytes"); 1048 ethtool_puts(&data, "rx_packets"); 1049 ethtool_puts(&data, "rx_bytes"); 1050 if (ds->ops->get_strings) 1051 ds->ops->get_strings(ds, dp->index, stringset, data); 1052 } else if (stringset == ETH_SS_TEST) { 1053 net_selftest_get_strings(data); 1054 } 1055 1056 } 1057 1058 static void dsa_user_get_ethtool_stats(struct net_device *dev, 1059 struct ethtool_stats *stats, 1060 uint64_t *data) 1061 { 1062 struct dsa_port *dp = dsa_user_to_port(dev); 1063 struct dsa_switch *ds = dp->ds; 1064 struct pcpu_sw_netstats *s; 1065 unsigned int start; 1066 int i; 1067 1068 for_each_possible_cpu(i) { 1069 u64 tx_packets, tx_bytes, rx_packets, rx_bytes; 1070 1071 s = per_cpu_ptr(dev->tstats, i); 1072 do { 1073 start = u64_stats_fetch_begin(&s->syncp); 1074 tx_packets = u64_stats_read(&s->tx_packets); 1075 tx_bytes = u64_stats_read(&s->tx_bytes); 1076 rx_packets = u64_stats_read(&s->rx_packets); 1077 rx_bytes = u64_stats_read(&s->rx_bytes); 1078 } while (u64_stats_fetch_retry(&s->syncp, start)); 1079 data[0] += tx_packets; 1080 data[1] += tx_bytes; 1081 data[2] += rx_packets; 1082 data[3] += rx_bytes; 1083 } 1084 if (ds->ops->get_ethtool_stats) 1085 ds->ops->get_ethtool_stats(ds, dp->index, data + 4); 1086 } 1087 1088 static int dsa_user_get_sset_count(struct net_device *dev, int sset) 1089 { 1090 struct dsa_port *dp = dsa_user_to_port(dev); 1091 struct dsa_switch *ds = dp->ds; 1092 1093 if (sset == ETH_SS_STATS) { 1094 int count = 0; 1095 1096 if (ds->ops->get_sset_count) { 1097 count = ds->ops->get_sset_count(ds, dp->index, sset); 1098 if (count < 0) 1099 return count; 1100 } 1101 1102 return count + 4; 1103 } else if (sset == ETH_SS_TEST) { 1104 return net_selftest_get_count(); 1105 } 1106 1107 return -EOPNOTSUPP; 1108 } 1109 1110 static void dsa_user_get_eth_phy_stats(struct net_device *dev, 1111 struct ethtool_eth_phy_stats *phy_stats) 1112 { 1113 struct dsa_port *dp = dsa_user_to_port(dev); 1114 struct dsa_switch *ds = dp->ds; 1115 1116 if (ds->ops->get_eth_phy_stats) 1117 ds->ops->get_eth_phy_stats(ds, dp->index, phy_stats); 1118 } 1119 1120 static void dsa_user_get_eth_mac_stats(struct net_device *dev, 1121 struct ethtool_eth_mac_stats *mac_stats) 1122 { 1123 struct dsa_port *dp = dsa_user_to_port(dev); 1124 struct dsa_switch *ds = dp->ds; 1125 1126 if (ds->ops->get_eth_mac_stats) 1127 ds->ops->get_eth_mac_stats(ds, dp->index, mac_stats); 1128 } 1129 1130 static void 1131 dsa_user_get_eth_ctrl_stats(struct net_device *dev, 1132 struct ethtool_eth_ctrl_stats *ctrl_stats) 1133 { 1134 struct dsa_port *dp = dsa_user_to_port(dev); 1135 struct dsa_switch *ds = dp->ds; 1136 1137 if (ds->ops->get_eth_ctrl_stats) 1138 ds->ops->get_eth_ctrl_stats(ds, dp->index, ctrl_stats); 1139 } 1140 1141 static void 1142 dsa_user_get_rmon_stats(struct net_device *dev, 1143 struct ethtool_rmon_stats *rmon_stats, 1144 const struct ethtool_rmon_hist_range **ranges) 1145 { 1146 struct dsa_port *dp = dsa_user_to_port(dev); 1147 struct dsa_switch *ds = dp->ds; 1148 1149 if (ds->ops->get_rmon_stats) 1150 ds->ops->get_rmon_stats(ds, dp->index, rmon_stats, ranges); 1151 } 1152 1153 static void dsa_user_get_ts_stats(struct net_device *dev, 1154 struct ethtool_ts_stats *ts_stats) 1155 { 1156 struct dsa_port *dp = dsa_user_to_port(dev); 1157 struct dsa_switch *ds = dp->ds; 1158 1159 if (ds->ops->get_ts_stats) 1160 ds->ops->get_ts_stats(ds, dp->index, ts_stats); 1161 } 1162 1163 static void dsa_user_net_selftest(struct net_device *ndev, 1164 struct ethtool_test *etest, u64 *buf) 1165 { 1166 struct dsa_port *dp = dsa_user_to_port(ndev); 1167 struct dsa_switch *ds = dp->ds; 1168 1169 if (ds->ops->self_test) { 1170 ds->ops->self_test(ds, dp->index, etest, buf); 1171 return; 1172 } 1173 1174 net_selftest(ndev, etest, buf); 1175 } 1176 1177 static int dsa_user_get_mm(struct net_device *dev, 1178 struct ethtool_mm_state *state) 1179 { 1180 struct dsa_port *dp = dsa_user_to_port(dev); 1181 struct dsa_switch *ds = dp->ds; 1182 1183 if (!ds->ops->get_mm) 1184 return -EOPNOTSUPP; 1185 1186 return ds->ops->get_mm(ds, dp->index, state); 1187 } 1188 1189 static int dsa_user_set_mm(struct net_device *dev, struct ethtool_mm_cfg *cfg, 1190 struct netlink_ext_ack *extack) 1191 { 1192 struct dsa_port *dp = dsa_user_to_port(dev); 1193 struct dsa_switch *ds = dp->ds; 1194 1195 if (!ds->ops->set_mm) 1196 return -EOPNOTSUPP; 1197 1198 return ds->ops->set_mm(ds, dp->index, cfg, extack); 1199 } 1200 1201 static void dsa_user_get_mm_stats(struct net_device *dev, 1202 struct ethtool_mm_stats *stats) 1203 { 1204 struct dsa_port *dp = dsa_user_to_port(dev); 1205 struct dsa_switch *ds = dp->ds; 1206 1207 if (ds->ops->get_mm_stats) 1208 ds->ops->get_mm_stats(ds, dp->index, stats); 1209 } 1210 1211 static void dsa_user_get_wol(struct net_device *dev, struct ethtool_wolinfo *w) 1212 { 1213 struct dsa_port *dp = dsa_user_to_port(dev); 1214 struct dsa_switch *ds = dp->ds; 1215 1216 phylink_ethtool_get_wol(dp->pl, w); 1217 1218 if (ds->ops->get_wol) 1219 ds->ops->get_wol(ds, dp->index, w); 1220 } 1221 1222 static int dsa_user_set_wol(struct net_device *dev, struct ethtool_wolinfo *w) 1223 { 1224 struct dsa_port *dp = dsa_user_to_port(dev); 1225 struct dsa_switch *ds = dp->ds; 1226 int ret = -EOPNOTSUPP; 1227 1228 phylink_ethtool_set_wol(dp->pl, w); 1229 1230 if (ds->ops->set_wol) 1231 ret = ds->ops->set_wol(ds, dp->index, w); 1232 1233 return ret; 1234 } 1235 1236 static int dsa_user_set_eee(struct net_device *dev, struct ethtool_keee *e) 1237 { 1238 struct dsa_port *dp = dsa_user_to_port(dev); 1239 struct dsa_switch *ds = dp->ds; 1240 int ret; 1241 1242 /* Check whether the switch supports EEE */ 1243 if (!ds->ops->support_eee || !ds->ops->support_eee(ds, dp->index)) 1244 return -EOPNOTSUPP; 1245 1246 /* Port's PHY and MAC both need to be EEE capable */ 1247 if (!dev->phydev) 1248 return -ENODEV; 1249 1250 if (!ds->ops->set_mac_eee) 1251 return -EOPNOTSUPP; 1252 1253 ret = ds->ops->set_mac_eee(ds, dp->index, e); 1254 if (ret) 1255 return ret; 1256 1257 return phylink_ethtool_set_eee(dp->pl, e); 1258 } 1259 1260 static int dsa_user_get_eee(struct net_device *dev, struct ethtool_keee *e) 1261 { 1262 struct dsa_port *dp = dsa_user_to_port(dev); 1263 struct dsa_switch *ds = dp->ds; 1264 1265 /* Check whether the switch supports EEE */ 1266 if (!ds->ops->support_eee || !ds->ops->support_eee(ds, dp->index)) 1267 return -EOPNOTSUPP; 1268 1269 /* Port's PHY and MAC both need to be EEE capable */ 1270 if (!dev->phydev) 1271 return -ENODEV; 1272 1273 return phylink_ethtool_get_eee(dp->pl, e); 1274 } 1275 1276 static int dsa_user_get_link_ksettings(struct net_device *dev, 1277 struct ethtool_link_ksettings *cmd) 1278 { 1279 struct dsa_port *dp = dsa_user_to_port(dev); 1280 1281 return phylink_ethtool_ksettings_get(dp->pl, cmd); 1282 } 1283 1284 static int dsa_user_set_link_ksettings(struct net_device *dev, 1285 const struct ethtool_link_ksettings *cmd) 1286 { 1287 struct dsa_port *dp = dsa_user_to_port(dev); 1288 1289 return phylink_ethtool_ksettings_set(dp->pl, cmd); 1290 } 1291 1292 static void dsa_user_get_pause_stats(struct net_device *dev, 1293 struct ethtool_pause_stats *pause_stats) 1294 { 1295 struct dsa_port *dp = dsa_user_to_port(dev); 1296 struct dsa_switch *ds = dp->ds; 1297 1298 if (ds->ops->get_pause_stats) 1299 ds->ops->get_pause_stats(ds, dp->index, pause_stats); 1300 } 1301 1302 static void dsa_user_get_pauseparam(struct net_device *dev, 1303 struct ethtool_pauseparam *pause) 1304 { 1305 struct dsa_port *dp = dsa_user_to_port(dev); 1306 1307 phylink_ethtool_get_pauseparam(dp->pl, pause); 1308 } 1309 1310 static int dsa_user_set_pauseparam(struct net_device *dev, 1311 struct ethtool_pauseparam *pause) 1312 { 1313 struct dsa_port *dp = dsa_user_to_port(dev); 1314 1315 return phylink_ethtool_set_pauseparam(dp->pl, pause); 1316 } 1317 1318 #ifdef CONFIG_NET_POLL_CONTROLLER 1319 static int dsa_user_netpoll_setup(struct net_device *dev) 1320 { 1321 struct net_device *conduit = dsa_user_to_conduit(dev); 1322 struct dsa_user_priv *p = netdev_priv(dev); 1323 struct netpoll *netpoll; 1324 int err = 0; 1325 1326 netpoll = kzalloc(sizeof(*netpoll), GFP_KERNEL); 1327 if (!netpoll) 1328 return -ENOMEM; 1329 1330 err = __netpoll_setup(netpoll, conduit); 1331 if (err) { 1332 kfree(netpoll); 1333 goto out; 1334 } 1335 1336 p->netpoll = netpoll; 1337 out: 1338 return err; 1339 } 1340 1341 static void dsa_user_netpoll_cleanup(struct net_device *dev) 1342 { 1343 struct dsa_user_priv *p = netdev_priv(dev); 1344 struct netpoll *netpoll = p->netpoll; 1345 1346 if (!netpoll) 1347 return; 1348 1349 p->netpoll = NULL; 1350 1351 __netpoll_free(netpoll); 1352 } 1353 1354 static void dsa_user_poll_controller(struct net_device *dev) 1355 { 1356 } 1357 #endif 1358 1359 static struct dsa_mall_tc_entry * 1360 dsa_user_mall_tc_entry_find(struct net_device *dev, unsigned long cookie) 1361 { 1362 struct dsa_user_priv *p = netdev_priv(dev); 1363 struct dsa_mall_tc_entry *mall_tc_entry; 1364 1365 list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) 1366 if (mall_tc_entry->cookie == cookie) 1367 return mall_tc_entry; 1368 1369 return NULL; 1370 } 1371 1372 static int 1373 dsa_user_add_cls_matchall_mirred(struct net_device *dev, 1374 struct tc_cls_matchall_offload *cls, 1375 bool ingress, bool ingress_target) 1376 { 1377 struct netlink_ext_ack *extack = cls->common.extack; 1378 struct dsa_port *dp = dsa_user_to_port(dev); 1379 struct dsa_user_priv *p = netdev_priv(dev); 1380 struct dsa_mall_mirror_tc_entry *mirror; 1381 struct dsa_mall_tc_entry *mall_tc_entry; 1382 struct dsa_switch *ds = dp->ds; 1383 struct flow_action_entry *act; 1384 struct dsa_port *to_dp; 1385 int err; 1386 1387 if (cls->common.protocol != htons(ETH_P_ALL)) { 1388 NL_SET_ERR_MSG_MOD(extack, 1389 "Can only offload \"protocol all\" matchall filter"); 1390 return -EOPNOTSUPP; 1391 } 1392 1393 if (!ds->ops->port_mirror_add) { 1394 NL_SET_ERR_MSG_MOD(extack, 1395 "Switch does not support mirroring operation"); 1396 return -EOPNOTSUPP; 1397 } 1398 1399 if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack)) 1400 return -EOPNOTSUPP; 1401 1402 act = &cls->rule->action.entries[0]; 1403 1404 if (!act->dev) 1405 return -EINVAL; 1406 1407 if (dsa_user_dev_check(act->dev)) { 1408 if (ingress_target) { 1409 /* We can only fulfill this using software assist */ 1410 if (cls->common.skip_sw) { 1411 NL_SET_ERR_MSG_MOD(extack, 1412 "Can only mirred to ingress of DSA user port if filter also runs in software"); 1413 return -EOPNOTSUPP; 1414 } 1415 to_dp = dp->cpu_dp; 1416 } else { 1417 to_dp = dsa_user_to_port(act->dev); 1418 } 1419 } else { 1420 /* Handle mirroring to foreign target ports as a mirror towards 1421 * the CPU. The software tc rule will take the packets from 1422 * there. 1423 */ 1424 if (cls->common.skip_sw) { 1425 NL_SET_ERR_MSG_MOD(extack, 1426 "Can only mirred to CPU if filter also runs in software"); 1427 return -EOPNOTSUPP; 1428 } 1429 to_dp = dp->cpu_dp; 1430 } 1431 1432 if (dp->ds != to_dp->ds) { 1433 NL_SET_ERR_MSG_MOD(extack, 1434 "Cross-chip mirroring not implemented"); 1435 return -EOPNOTSUPP; 1436 } 1437 1438 mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); 1439 if (!mall_tc_entry) 1440 return -ENOMEM; 1441 1442 mall_tc_entry->cookie = cls->cookie; 1443 mall_tc_entry->type = DSA_PORT_MALL_MIRROR; 1444 mirror = &mall_tc_entry->mirror; 1445 mirror->to_local_port = to_dp->index; 1446 mirror->ingress = ingress; 1447 1448 err = ds->ops->port_mirror_add(ds, dp->index, mirror, ingress, extack); 1449 if (err) { 1450 kfree(mall_tc_entry); 1451 return err; 1452 } 1453 1454 list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); 1455 1456 return err; 1457 } 1458 1459 static int 1460 dsa_user_add_cls_matchall_police(struct net_device *dev, 1461 struct tc_cls_matchall_offload *cls, 1462 bool ingress) 1463 { 1464 struct netlink_ext_ack *extack = cls->common.extack; 1465 struct dsa_port *dp = dsa_user_to_port(dev); 1466 struct dsa_user_priv *p = netdev_priv(dev); 1467 struct dsa_mall_policer_tc_entry *policer; 1468 struct dsa_mall_tc_entry *mall_tc_entry; 1469 struct dsa_switch *ds = dp->ds; 1470 struct flow_action_entry *act; 1471 int err; 1472 1473 if (!ds->ops->port_policer_add) { 1474 NL_SET_ERR_MSG_MOD(extack, 1475 "Policing offload not implemented"); 1476 return -EOPNOTSUPP; 1477 } 1478 1479 if (!ingress) { 1480 NL_SET_ERR_MSG_MOD(extack, 1481 "Only supported on ingress qdisc"); 1482 return -EOPNOTSUPP; 1483 } 1484 1485 if (!flow_action_basic_hw_stats_check(&cls->rule->action, extack)) 1486 return -EOPNOTSUPP; 1487 1488 list_for_each_entry(mall_tc_entry, &p->mall_tc_list, list) { 1489 if (mall_tc_entry->type == DSA_PORT_MALL_POLICER) { 1490 NL_SET_ERR_MSG_MOD(extack, 1491 "Only one port policer allowed"); 1492 return -EEXIST; 1493 } 1494 } 1495 1496 act = &cls->rule->action.entries[0]; 1497 1498 mall_tc_entry = kzalloc(sizeof(*mall_tc_entry), GFP_KERNEL); 1499 if (!mall_tc_entry) 1500 return -ENOMEM; 1501 1502 mall_tc_entry->cookie = cls->cookie; 1503 mall_tc_entry->type = DSA_PORT_MALL_POLICER; 1504 policer = &mall_tc_entry->policer; 1505 policer->rate_bytes_per_sec = act->police.rate_bytes_ps; 1506 policer->burst = act->police.burst; 1507 1508 err = ds->ops->port_policer_add(ds, dp->index, policer); 1509 if (err) { 1510 kfree(mall_tc_entry); 1511 return err; 1512 } 1513 1514 list_add_tail(&mall_tc_entry->list, &p->mall_tc_list); 1515 1516 return err; 1517 } 1518 1519 static int dsa_user_add_cls_matchall(struct net_device *dev, 1520 struct tc_cls_matchall_offload *cls, 1521 bool ingress) 1522 { 1523 const struct flow_action *action = &cls->rule->action; 1524 struct netlink_ext_ack *extack = cls->common.extack; 1525 1526 if (!flow_offload_has_one_action(action)) { 1527 NL_SET_ERR_MSG_MOD(extack, 1528 "Cannot offload matchall filter with more than one action"); 1529 return -EOPNOTSUPP; 1530 } 1531 1532 switch (action->entries[0].id) { 1533 case FLOW_ACTION_MIRRED: 1534 return dsa_user_add_cls_matchall_mirred(dev, cls, ingress, 1535 false); 1536 case FLOW_ACTION_MIRRED_INGRESS: 1537 return dsa_user_add_cls_matchall_mirred(dev, cls, ingress, 1538 true); 1539 case FLOW_ACTION_POLICE: 1540 return dsa_user_add_cls_matchall_police(dev, cls, ingress); 1541 default: 1542 NL_SET_ERR_MSG_MOD(extack, "Unknown action"); 1543 break; 1544 } 1545 1546 return -EOPNOTSUPP; 1547 } 1548 1549 static void dsa_user_del_cls_matchall(struct net_device *dev, 1550 struct tc_cls_matchall_offload *cls) 1551 { 1552 struct dsa_port *dp = dsa_user_to_port(dev); 1553 struct dsa_mall_tc_entry *mall_tc_entry; 1554 struct dsa_switch *ds = dp->ds; 1555 1556 mall_tc_entry = dsa_user_mall_tc_entry_find(dev, cls->cookie); 1557 if (!mall_tc_entry) 1558 return; 1559 1560 list_del(&mall_tc_entry->list); 1561 1562 switch (mall_tc_entry->type) { 1563 case DSA_PORT_MALL_MIRROR: 1564 if (ds->ops->port_mirror_del) 1565 ds->ops->port_mirror_del(ds, dp->index, 1566 &mall_tc_entry->mirror); 1567 break; 1568 case DSA_PORT_MALL_POLICER: 1569 if (ds->ops->port_policer_del) 1570 ds->ops->port_policer_del(ds, dp->index); 1571 break; 1572 default: 1573 WARN_ON(1); 1574 } 1575 1576 kfree(mall_tc_entry); 1577 } 1578 1579 static int dsa_user_setup_tc_cls_matchall(struct net_device *dev, 1580 struct tc_cls_matchall_offload *cls, 1581 bool ingress) 1582 { 1583 if (cls->common.chain_index) 1584 return -EOPNOTSUPP; 1585 1586 switch (cls->command) { 1587 case TC_CLSMATCHALL_REPLACE: 1588 return dsa_user_add_cls_matchall(dev, cls, ingress); 1589 case TC_CLSMATCHALL_DESTROY: 1590 dsa_user_del_cls_matchall(dev, cls); 1591 return 0; 1592 default: 1593 return -EOPNOTSUPP; 1594 } 1595 } 1596 1597 static int dsa_user_add_cls_flower(struct net_device *dev, 1598 struct flow_cls_offload *cls, 1599 bool ingress) 1600 { 1601 struct dsa_port *dp = dsa_user_to_port(dev); 1602 struct dsa_switch *ds = dp->ds; 1603 int port = dp->index; 1604 1605 if (!ds->ops->cls_flower_add) 1606 return -EOPNOTSUPP; 1607 1608 return ds->ops->cls_flower_add(ds, port, cls, ingress); 1609 } 1610 1611 static int dsa_user_del_cls_flower(struct net_device *dev, 1612 struct flow_cls_offload *cls, 1613 bool ingress) 1614 { 1615 struct dsa_port *dp = dsa_user_to_port(dev); 1616 struct dsa_switch *ds = dp->ds; 1617 int port = dp->index; 1618 1619 if (!ds->ops->cls_flower_del) 1620 return -EOPNOTSUPP; 1621 1622 return ds->ops->cls_flower_del(ds, port, cls, ingress); 1623 } 1624 1625 static int dsa_user_stats_cls_flower(struct net_device *dev, 1626 struct flow_cls_offload *cls, 1627 bool ingress) 1628 { 1629 struct dsa_port *dp = dsa_user_to_port(dev); 1630 struct dsa_switch *ds = dp->ds; 1631 int port = dp->index; 1632 1633 if (!ds->ops->cls_flower_stats) 1634 return -EOPNOTSUPP; 1635 1636 return ds->ops->cls_flower_stats(ds, port, cls, ingress); 1637 } 1638 1639 static int dsa_user_setup_tc_cls_flower(struct net_device *dev, 1640 struct flow_cls_offload *cls, 1641 bool ingress) 1642 { 1643 switch (cls->command) { 1644 case FLOW_CLS_REPLACE: 1645 return dsa_user_add_cls_flower(dev, cls, ingress); 1646 case FLOW_CLS_DESTROY: 1647 return dsa_user_del_cls_flower(dev, cls, ingress); 1648 case FLOW_CLS_STATS: 1649 return dsa_user_stats_cls_flower(dev, cls, ingress); 1650 default: 1651 return -EOPNOTSUPP; 1652 } 1653 } 1654 1655 static int dsa_user_setup_tc_block_cb(enum tc_setup_type type, void *type_data, 1656 void *cb_priv, bool ingress) 1657 { 1658 struct net_device *dev = cb_priv; 1659 1660 if (!tc_can_offload(dev)) 1661 return -EOPNOTSUPP; 1662 1663 switch (type) { 1664 case TC_SETUP_CLSMATCHALL: 1665 return dsa_user_setup_tc_cls_matchall(dev, type_data, ingress); 1666 case TC_SETUP_CLSFLOWER: 1667 return dsa_user_setup_tc_cls_flower(dev, type_data, ingress); 1668 default: 1669 return -EOPNOTSUPP; 1670 } 1671 } 1672 1673 static int dsa_user_setup_tc_block_cb_ig(enum tc_setup_type type, 1674 void *type_data, void *cb_priv) 1675 { 1676 return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, true); 1677 } 1678 1679 static int dsa_user_setup_tc_block_cb_eg(enum tc_setup_type type, 1680 void *type_data, void *cb_priv) 1681 { 1682 return dsa_user_setup_tc_block_cb(type, type_data, cb_priv, false); 1683 } 1684 1685 static LIST_HEAD(dsa_user_block_cb_list); 1686 1687 static int dsa_user_setup_tc_block(struct net_device *dev, 1688 struct flow_block_offload *f) 1689 { 1690 struct flow_block_cb *block_cb; 1691 flow_setup_cb_t *cb; 1692 1693 if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS) 1694 cb = dsa_user_setup_tc_block_cb_ig; 1695 else if (f->binder_type == FLOW_BLOCK_BINDER_TYPE_CLSACT_EGRESS) 1696 cb = dsa_user_setup_tc_block_cb_eg; 1697 else 1698 return -EOPNOTSUPP; 1699 1700 f->driver_block_list = &dsa_user_block_cb_list; 1701 1702 switch (f->command) { 1703 case FLOW_BLOCK_BIND: 1704 if (flow_block_cb_is_busy(cb, dev, &dsa_user_block_cb_list)) 1705 return -EBUSY; 1706 1707 block_cb = flow_block_cb_alloc(cb, dev, dev, NULL); 1708 if (IS_ERR(block_cb)) 1709 return PTR_ERR(block_cb); 1710 1711 flow_block_cb_add(block_cb, f); 1712 list_add_tail(&block_cb->driver_list, &dsa_user_block_cb_list); 1713 return 0; 1714 case FLOW_BLOCK_UNBIND: 1715 block_cb = flow_block_cb_lookup(f->block, cb, dev); 1716 if (!block_cb) 1717 return -ENOENT; 1718 1719 flow_block_cb_remove(block_cb, f); 1720 list_del(&block_cb->driver_list); 1721 return 0; 1722 default: 1723 return -EOPNOTSUPP; 1724 } 1725 } 1726 1727 static int dsa_user_setup_ft_block(struct dsa_switch *ds, int port, 1728 void *type_data) 1729 { 1730 struct net_device *conduit = dsa_port_to_conduit(dsa_to_port(ds, port)); 1731 1732 if (!conduit->netdev_ops->ndo_setup_tc) 1733 return -EOPNOTSUPP; 1734 1735 return conduit->netdev_ops->ndo_setup_tc(conduit, TC_SETUP_FT, type_data); 1736 } 1737 1738 static int dsa_user_setup_tc(struct net_device *dev, enum tc_setup_type type, 1739 void *type_data) 1740 { 1741 struct dsa_port *dp = dsa_user_to_port(dev); 1742 struct dsa_switch *ds = dp->ds; 1743 1744 switch (type) { 1745 case TC_SETUP_BLOCK: 1746 return dsa_user_setup_tc_block(dev, type_data); 1747 case TC_SETUP_FT: 1748 return dsa_user_setup_ft_block(ds, dp->index, type_data); 1749 default: 1750 break; 1751 } 1752 1753 if (!ds->ops->port_setup_tc) 1754 return -EOPNOTSUPP; 1755 1756 return ds->ops->port_setup_tc(ds, dp->index, type, type_data); 1757 } 1758 1759 static int dsa_user_get_rxnfc(struct net_device *dev, 1760 struct ethtool_rxnfc *nfc, u32 *rule_locs) 1761 { 1762 struct dsa_port *dp = dsa_user_to_port(dev); 1763 struct dsa_switch *ds = dp->ds; 1764 1765 if (!ds->ops->get_rxnfc) 1766 return -EOPNOTSUPP; 1767 1768 return ds->ops->get_rxnfc(ds, dp->index, nfc, rule_locs); 1769 } 1770 1771 static int dsa_user_set_rxnfc(struct net_device *dev, 1772 struct ethtool_rxnfc *nfc) 1773 { 1774 struct dsa_port *dp = dsa_user_to_port(dev); 1775 struct dsa_switch *ds = dp->ds; 1776 1777 if (!ds->ops->set_rxnfc) 1778 return -EOPNOTSUPP; 1779 1780 return ds->ops->set_rxnfc(ds, dp->index, nfc); 1781 } 1782 1783 static int dsa_user_get_ts_info(struct net_device *dev, 1784 struct kernel_ethtool_ts_info *ts) 1785 { 1786 struct dsa_user_priv *p = netdev_priv(dev); 1787 struct dsa_switch *ds = p->dp->ds; 1788 1789 if (!ds->ops->get_ts_info) 1790 return -EOPNOTSUPP; 1791 1792 return ds->ops->get_ts_info(ds, p->dp->index, ts); 1793 } 1794 1795 static int dsa_user_vlan_rx_add_vid(struct net_device *dev, __be16 proto, 1796 u16 vid) 1797 { 1798 struct dsa_port *dp = dsa_user_to_port(dev); 1799 struct switchdev_obj_port_vlan vlan = { 1800 .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, 1801 .vid = vid, 1802 /* This API only allows programming tagged, non-PVID VIDs */ 1803 .flags = 0, 1804 }; 1805 struct netlink_ext_ack extack = {0}; 1806 struct dsa_switch *ds = dp->ds; 1807 struct netdev_hw_addr *ha; 1808 struct dsa_vlan *v; 1809 int ret; 1810 1811 /* User port... */ 1812 ret = dsa_port_vlan_add(dp, &vlan, &extack); 1813 if (ret) { 1814 if (extack._msg) 1815 netdev_err(dev, "%s\n", extack._msg); 1816 return ret; 1817 } 1818 1819 /* And CPU port... */ 1820 ret = dsa_port_host_vlan_add(dp, &vlan, &extack); 1821 if (ret) { 1822 if (extack._msg) 1823 netdev_err(dev, "CPU port %d: %s\n", dp->cpu_dp->index, 1824 extack._msg); 1825 return ret; 1826 } 1827 1828 if (!dsa_switch_supports_uc_filtering(ds) && 1829 !dsa_switch_supports_mc_filtering(ds)) 1830 return 0; 1831 1832 v = kzalloc(sizeof(*v), GFP_KERNEL); 1833 if (!v) { 1834 ret = -ENOMEM; 1835 goto rollback; 1836 } 1837 1838 netif_addr_lock_bh(dev); 1839 1840 v->vid = vid; 1841 list_add_tail(&v->list, &dp->user_vlans); 1842 1843 if (dsa_switch_supports_mc_filtering(ds)) { 1844 netdev_for_each_synced_mc_addr(ha, dev) { 1845 dsa_user_schedule_standalone_work(dev, DSA_MC_ADD, 1846 ha->addr, vid); 1847 } 1848 } 1849 1850 if (dsa_switch_supports_uc_filtering(ds)) { 1851 netdev_for_each_synced_uc_addr(ha, dev) { 1852 dsa_user_schedule_standalone_work(dev, DSA_UC_ADD, 1853 ha->addr, vid); 1854 } 1855 } 1856 1857 netif_addr_unlock_bh(dev); 1858 1859 dsa_flush_workqueue(); 1860 1861 return 0; 1862 1863 rollback: 1864 dsa_port_host_vlan_del(dp, &vlan); 1865 dsa_port_vlan_del(dp, &vlan); 1866 1867 return ret; 1868 } 1869 1870 static int dsa_user_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, 1871 u16 vid) 1872 { 1873 struct dsa_port *dp = dsa_user_to_port(dev); 1874 struct switchdev_obj_port_vlan vlan = { 1875 .vid = vid, 1876 /* This API only allows programming tagged, non-PVID VIDs */ 1877 .flags = 0, 1878 }; 1879 struct dsa_switch *ds = dp->ds; 1880 struct netdev_hw_addr *ha; 1881 struct dsa_vlan *v; 1882 int err; 1883 1884 err = dsa_port_vlan_del(dp, &vlan); 1885 if (err) 1886 return err; 1887 1888 err = dsa_port_host_vlan_del(dp, &vlan); 1889 if (err) 1890 return err; 1891 1892 if (!dsa_switch_supports_uc_filtering(ds) && 1893 !dsa_switch_supports_mc_filtering(ds)) 1894 return 0; 1895 1896 netif_addr_lock_bh(dev); 1897 1898 v = dsa_vlan_find(&dp->user_vlans, &vlan); 1899 if (!v) { 1900 netif_addr_unlock_bh(dev); 1901 return -ENOENT; 1902 } 1903 1904 list_del(&v->list); 1905 kfree(v); 1906 1907 if (dsa_switch_supports_mc_filtering(ds)) { 1908 netdev_for_each_synced_mc_addr(ha, dev) { 1909 dsa_user_schedule_standalone_work(dev, DSA_MC_DEL, 1910 ha->addr, vid); 1911 } 1912 } 1913 1914 if (dsa_switch_supports_uc_filtering(ds)) { 1915 netdev_for_each_synced_uc_addr(ha, dev) { 1916 dsa_user_schedule_standalone_work(dev, DSA_UC_DEL, 1917 ha->addr, vid); 1918 } 1919 } 1920 1921 netif_addr_unlock_bh(dev); 1922 1923 dsa_flush_workqueue(); 1924 1925 return 0; 1926 } 1927 1928 static int dsa_user_restore_vlan(struct net_device *vdev, int vid, void *arg) 1929 { 1930 __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); 1931 1932 return dsa_user_vlan_rx_add_vid(arg, proto, vid); 1933 } 1934 1935 static int dsa_user_clear_vlan(struct net_device *vdev, int vid, void *arg) 1936 { 1937 __be16 proto = vdev ? vlan_dev_vlan_proto(vdev) : htons(ETH_P_8021Q); 1938 1939 return dsa_user_vlan_rx_kill_vid(arg, proto, vid); 1940 } 1941 1942 /* Keep the VLAN RX filtering list in sync with the hardware only if VLAN 1943 * filtering is enabled. The baseline is that only ports that offload a 1944 * VLAN-aware bridge are VLAN-aware, and standalone ports are VLAN-unaware, 1945 * but there are exceptions for quirky hardware. 1946 * 1947 * If ds->vlan_filtering_is_global = true, then standalone ports which share 1948 * the same switch with other ports that offload a VLAN-aware bridge are also 1949 * inevitably VLAN-aware. 1950 * 1951 * To summarize, a DSA switch port offloads: 1952 * 1953 * - If standalone (this includes software bridge, software LAG): 1954 * - if ds->needs_standalone_vlan_filtering = true, OR if 1955 * (ds->vlan_filtering_is_global = true AND there are bridges spanning 1956 * this switch chip which have vlan_filtering=1) 1957 * - the 8021q upper VLANs 1958 * - else (standalone VLAN filtering is not needed, VLAN filtering is not 1959 * global, or it is, but no port is under a VLAN-aware bridge): 1960 * - no VLAN (any 8021q upper is a software VLAN) 1961 * 1962 * - If under a vlan_filtering=0 bridge which it offload: 1963 * - if ds->configure_vlan_while_not_filtering = true (default): 1964 * - the bridge VLANs. These VLANs are committed to hardware but inactive. 1965 * - else (deprecated): 1966 * - no VLAN. The bridge VLANs are not restored when VLAN awareness is 1967 * enabled, so this behavior is broken and discouraged. 1968 * 1969 * - If under a vlan_filtering=1 bridge which it offload: 1970 * - the bridge VLANs 1971 * - the 8021q upper VLANs 1972 */ 1973 int dsa_user_manage_vlan_filtering(struct net_device *user, 1974 bool vlan_filtering) 1975 { 1976 int err; 1977 1978 if (vlan_filtering) { 1979 user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 1980 1981 err = vlan_for_each(user, dsa_user_restore_vlan, user); 1982 if (err) { 1983 vlan_for_each(user, dsa_user_clear_vlan, user); 1984 user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 1985 return err; 1986 } 1987 } else { 1988 err = vlan_for_each(user, dsa_user_clear_vlan, user); 1989 if (err) 1990 return err; 1991 1992 user->features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 1993 } 1994 1995 return 0; 1996 } 1997 1998 struct dsa_hw_port { 1999 struct list_head list; 2000 struct net_device *dev; 2001 int old_mtu; 2002 }; 2003 2004 static int dsa_hw_port_list_set_mtu(struct list_head *hw_port_list, int mtu) 2005 { 2006 const struct dsa_hw_port *p; 2007 int err; 2008 2009 list_for_each_entry(p, hw_port_list, list) { 2010 if (p->dev->mtu == mtu) 2011 continue; 2012 2013 err = dev_set_mtu(p->dev, mtu); 2014 if (err) 2015 goto rollback; 2016 } 2017 2018 return 0; 2019 2020 rollback: 2021 list_for_each_entry_continue_reverse(p, hw_port_list, list) { 2022 if (p->dev->mtu == p->old_mtu) 2023 continue; 2024 2025 if (dev_set_mtu(p->dev, p->old_mtu)) 2026 netdev_err(p->dev, "Failed to restore MTU\n"); 2027 } 2028 2029 return err; 2030 } 2031 2032 static void dsa_hw_port_list_free(struct list_head *hw_port_list) 2033 { 2034 struct dsa_hw_port *p, *n; 2035 2036 list_for_each_entry_safe(p, n, hw_port_list, list) 2037 kfree(p); 2038 } 2039 2040 /* Make the hardware datapath to/from @dev limited to a common MTU */ 2041 static void dsa_bridge_mtu_normalization(struct dsa_port *dp) 2042 { 2043 struct list_head hw_port_list; 2044 struct dsa_switch_tree *dst; 2045 int min_mtu = ETH_MAX_MTU; 2046 struct dsa_port *other_dp; 2047 int err; 2048 2049 if (!dp->ds->mtu_enforcement_ingress) 2050 return; 2051 2052 if (!dp->bridge) 2053 return; 2054 2055 INIT_LIST_HEAD(&hw_port_list); 2056 2057 /* Populate the list of ports that are part of the same bridge 2058 * as the newly added/modified port 2059 */ 2060 list_for_each_entry(dst, &dsa_tree_list, list) { 2061 list_for_each_entry(other_dp, &dst->ports, list) { 2062 struct dsa_hw_port *hw_port; 2063 struct net_device *user; 2064 2065 if (other_dp->type != DSA_PORT_TYPE_USER) 2066 continue; 2067 2068 if (!dsa_port_bridge_same(dp, other_dp)) 2069 continue; 2070 2071 if (!other_dp->ds->mtu_enforcement_ingress) 2072 continue; 2073 2074 user = other_dp->user; 2075 2076 if (min_mtu > user->mtu) 2077 min_mtu = user->mtu; 2078 2079 hw_port = kzalloc(sizeof(*hw_port), GFP_KERNEL); 2080 if (!hw_port) 2081 goto out; 2082 2083 hw_port->dev = user; 2084 hw_port->old_mtu = user->mtu; 2085 2086 list_add(&hw_port->list, &hw_port_list); 2087 } 2088 } 2089 2090 /* Attempt to configure the entire hardware bridge to the newly added 2091 * interface's MTU first, regardless of whether the intention of the 2092 * user was to raise or lower it. 2093 */ 2094 err = dsa_hw_port_list_set_mtu(&hw_port_list, dp->user->mtu); 2095 if (!err) 2096 goto out; 2097 2098 /* Clearly that didn't work out so well, so just set the minimum MTU on 2099 * all hardware bridge ports now. If this fails too, then all ports will 2100 * still have their old MTU rolled back anyway. 2101 */ 2102 dsa_hw_port_list_set_mtu(&hw_port_list, min_mtu); 2103 2104 out: 2105 dsa_hw_port_list_free(&hw_port_list); 2106 } 2107 2108 int dsa_user_change_mtu(struct net_device *dev, int new_mtu) 2109 { 2110 struct net_device *conduit = dsa_user_to_conduit(dev); 2111 struct dsa_port *dp = dsa_user_to_port(dev); 2112 struct dsa_port *cpu_dp = dp->cpu_dp; 2113 struct dsa_switch *ds = dp->ds; 2114 struct dsa_port *other_dp; 2115 int largest_mtu = 0; 2116 int new_conduit_mtu; 2117 int old_conduit_mtu; 2118 int mtu_limit; 2119 int overhead; 2120 int cpu_mtu; 2121 int err; 2122 2123 if (!ds->ops->port_change_mtu) 2124 return -EOPNOTSUPP; 2125 2126 dsa_tree_for_each_user_port(other_dp, ds->dst) { 2127 int user_mtu; 2128 2129 /* During probe, this function will be called for each user 2130 * device, while not all of them have been allocated. That's 2131 * ok, it doesn't change what the maximum is, so ignore it. 2132 */ 2133 if (!other_dp->user) 2134 continue; 2135 2136 /* Pretend that we already applied the setting, which we 2137 * actually haven't (still haven't done all integrity checks) 2138 */ 2139 if (dp == other_dp) 2140 user_mtu = new_mtu; 2141 else 2142 user_mtu = other_dp->user->mtu; 2143 2144 if (largest_mtu < user_mtu) 2145 largest_mtu = user_mtu; 2146 } 2147 2148 overhead = dsa_tag_protocol_overhead(cpu_dp->tag_ops); 2149 mtu_limit = min_t(int, conduit->max_mtu, dev->max_mtu + overhead); 2150 old_conduit_mtu = conduit->mtu; 2151 new_conduit_mtu = largest_mtu + overhead; 2152 if (new_conduit_mtu > mtu_limit) 2153 return -ERANGE; 2154 2155 /* If the conduit MTU isn't over limit, there's no need to check the CPU 2156 * MTU, since that surely isn't either. 2157 */ 2158 cpu_mtu = largest_mtu; 2159 2160 /* Start applying stuff */ 2161 if (new_conduit_mtu != old_conduit_mtu) { 2162 err = dev_set_mtu(conduit, new_conduit_mtu); 2163 if (err < 0) 2164 goto out_conduit_failed; 2165 2166 /* We only need to propagate the MTU of the CPU port to 2167 * upstream switches, so emit a notifier which updates them. 2168 */ 2169 err = dsa_port_mtu_change(cpu_dp, cpu_mtu); 2170 if (err) 2171 goto out_cpu_failed; 2172 } 2173 2174 err = ds->ops->port_change_mtu(ds, dp->index, new_mtu); 2175 if (err) 2176 goto out_port_failed; 2177 2178 WRITE_ONCE(dev->mtu, new_mtu); 2179 2180 dsa_bridge_mtu_normalization(dp); 2181 2182 return 0; 2183 2184 out_port_failed: 2185 if (new_conduit_mtu != old_conduit_mtu) 2186 dsa_port_mtu_change(cpu_dp, old_conduit_mtu - overhead); 2187 out_cpu_failed: 2188 if (new_conduit_mtu != old_conduit_mtu) 2189 dev_set_mtu(conduit, old_conduit_mtu); 2190 out_conduit_failed: 2191 return err; 2192 } 2193 2194 static int __maybe_unused 2195 dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel) 2196 { 2197 struct dsa_port *dp = dsa_user_to_port(dev); 2198 struct dsa_switch *ds = dp->ds; 2199 int port = dp->index; 2200 2201 if (!ds->ops->port_set_apptrust) 2202 return -EOPNOTSUPP; 2203 2204 return ds->ops->port_set_apptrust(ds, port, sel, nsel); 2205 } 2206 2207 static int __maybe_unused 2208 dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel) 2209 { 2210 struct dsa_port *dp = dsa_user_to_port(dev); 2211 struct dsa_switch *ds = dp->ds; 2212 int port = dp->index; 2213 2214 if (!ds->ops->port_get_apptrust) 2215 return -EOPNOTSUPP; 2216 2217 return ds->ops->port_get_apptrust(ds, port, sel, nsel); 2218 } 2219 2220 static int __maybe_unused 2221 dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app) 2222 { 2223 struct dsa_port *dp = dsa_user_to_port(dev); 2224 struct dsa_switch *ds = dp->ds; 2225 unsigned long mask, new_prio; 2226 int err, port = dp->index; 2227 2228 if (!ds->ops->port_set_default_prio) 2229 return -EOPNOTSUPP; 2230 2231 err = dcb_ieee_setapp(dev, app); 2232 if (err) 2233 return err; 2234 2235 mask = dcb_ieee_getapp_mask(dev, app); 2236 new_prio = __fls(mask); 2237 2238 err = ds->ops->port_set_default_prio(ds, port, new_prio); 2239 if (err) { 2240 dcb_ieee_delapp(dev, app); 2241 return err; 2242 } 2243 2244 return 0; 2245 } 2246 2247 /* Update the DSCP prio entries on all user ports of the switch in case 2248 * the switch supports global DSCP prio instead of per port DSCP prios. 2249 */ 2250 static int dsa_user_dcbnl_ieee_global_dscp_setdel(struct net_device *dev, 2251 struct dcb_app *app, bool del) 2252 { 2253 int (*setdel)(struct net_device *dev, struct dcb_app *app); 2254 struct dsa_port *dp = dsa_user_to_port(dev); 2255 struct dsa_switch *ds = dp->ds; 2256 struct dsa_port *other_dp; 2257 int err, restore_err; 2258 2259 if (del) 2260 setdel = dcb_ieee_delapp; 2261 else 2262 setdel = dcb_ieee_setapp; 2263 2264 dsa_switch_for_each_user_port(other_dp, ds) { 2265 struct net_device *user = other_dp->user; 2266 2267 if (!user || user == dev) 2268 continue; 2269 2270 err = setdel(user, app); 2271 if (err) 2272 goto err_try_to_restore; 2273 } 2274 2275 return 0; 2276 2277 err_try_to_restore: 2278 2279 /* Revert logic to restore previous state of app entries */ 2280 if (!del) 2281 setdel = dcb_ieee_delapp; 2282 else 2283 setdel = dcb_ieee_setapp; 2284 2285 dsa_switch_for_each_user_port_continue_reverse(other_dp, ds) { 2286 struct net_device *user = other_dp->user; 2287 2288 if (!user || user == dev) 2289 continue; 2290 2291 restore_err = setdel(user, app); 2292 if (restore_err) 2293 netdev_err(user, "Failed to restore DSCP prio entry configuration\n"); 2294 } 2295 2296 return err; 2297 } 2298 2299 static int __maybe_unused 2300 dsa_user_dcbnl_add_dscp_prio(struct net_device *dev, struct dcb_app *app) 2301 { 2302 struct dsa_port *dp = dsa_user_to_port(dev); 2303 struct dsa_switch *ds = dp->ds; 2304 unsigned long mask, new_prio; 2305 int err, port = dp->index; 2306 u8 dscp = app->protocol; 2307 2308 if (!ds->ops->port_add_dscp_prio) 2309 return -EOPNOTSUPP; 2310 2311 if (dscp >= 64) { 2312 netdev_err(dev, "DSCP APP entry with protocol value %u is invalid\n", 2313 dscp); 2314 return -EINVAL; 2315 } 2316 2317 err = dcb_ieee_setapp(dev, app); 2318 if (err) 2319 return err; 2320 2321 mask = dcb_ieee_getapp_mask(dev, app); 2322 new_prio = __fls(mask); 2323 2324 err = ds->ops->port_add_dscp_prio(ds, port, dscp, new_prio); 2325 if (err) { 2326 dcb_ieee_delapp(dev, app); 2327 return err; 2328 } 2329 2330 if (!ds->dscp_prio_mapping_is_global) 2331 return 0; 2332 2333 err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, false); 2334 if (err) { 2335 if (ds->ops->port_del_dscp_prio) 2336 ds->ops->port_del_dscp_prio(ds, port, dscp, new_prio); 2337 dcb_ieee_delapp(dev, app); 2338 return err; 2339 } 2340 2341 return 0; 2342 } 2343 2344 static int __maybe_unused dsa_user_dcbnl_ieee_setapp(struct net_device *dev, 2345 struct dcb_app *app) 2346 { 2347 switch (app->selector) { 2348 case IEEE_8021QAZ_APP_SEL_ETHERTYPE: 2349 switch (app->protocol) { 2350 case 0: 2351 return dsa_user_dcbnl_set_default_prio(dev, app); 2352 default: 2353 return -EOPNOTSUPP; 2354 } 2355 break; 2356 case IEEE_8021QAZ_APP_SEL_DSCP: 2357 return dsa_user_dcbnl_add_dscp_prio(dev, app); 2358 default: 2359 return -EOPNOTSUPP; 2360 } 2361 } 2362 2363 static int __maybe_unused 2364 dsa_user_dcbnl_del_default_prio(struct net_device *dev, struct dcb_app *app) 2365 { 2366 struct dsa_port *dp = dsa_user_to_port(dev); 2367 struct dsa_switch *ds = dp->ds; 2368 unsigned long mask, new_prio; 2369 int err, port = dp->index; 2370 2371 if (!ds->ops->port_set_default_prio) 2372 return -EOPNOTSUPP; 2373 2374 err = dcb_ieee_delapp(dev, app); 2375 if (err) 2376 return err; 2377 2378 mask = dcb_ieee_getapp_mask(dev, app); 2379 new_prio = mask ? __fls(mask) : 0; 2380 2381 err = ds->ops->port_set_default_prio(ds, port, new_prio); 2382 if (err) { 2383 dcb_ieee_setapp(dev, app); 2384 return err; 2385 } 2386 2387 return 0; 2388 } 2389 2390 static int __maybe_unused 2391 dsa_user_dcbnl_del_dscp_prio(struct net_device *dev, struct dcb_app *app) 2392 { 2393 struct dsa_port *dp = dsa_user_to_port(dev); 2394 struct dsa_switch *ds = dp->ds; 2395 int err, port = dp->index; 2396 u8 dscp = app->protocol; 2397 2398 if (!ds->ops->port_del_dscp_prio) 2399 return -EOPNOTSUPP; 2400 2401 err = dcb_ieee_delapp(dev, app); 2402 if (err) 2403 return err; 2404 2405 err = ds->ops->port_del_dscp_prio(ds, port, dscp, app->priority); 2406 if (err) { 2407 dcb_ieee_setapp(dev, app); 2408 return err; 2409 } 2410 2411 if (!ds->dscp_prio_mapping_is_global) 2412 return 0; 2413 2414 err = dsa_user_dcbnl_ieee_global_dscp_setdel(dev, app, true); 2415 if (err) { 2416 if (ds->ops->port_add_dscp_prio) 2417 ds->ops->port_add_dscp_prio(ds, port, dscp, 2418 app->priority); 2419 dcb_ieee_setapp(dev, app); 2420 return err; 2421 } 2422 2423 return 0; 2424 } 2425 2426 static int __maybe_unused dsa_user_dcbnl_ieee_delapp(struct net_device *dev, 2427 struct dcb_app *app) 2428 { 2429 switch (app->selector) { 2430 case IEEE_8021QAZ_APP_SEL_ETHERTYPE: 2431 switch (app->protocol) { 2432 case 0: 2433 return dsa_user_dcbnl_del_default_prio(dev, app); 2434 default: 2435 return -EOPNOTSUPP; 2436 } 2437 break; 2438 case IEEE_8021QAZ_APP_SEL_DSCP: 2439 return dsa_user_dcbnl_del_dscp_prio(dev, app); 2440 default: 2441 return -EOPNOTSUPP; 2442 } 2443 } 2444 2445 /* Pre-populate the DCB application priority table with the priorities 2446 * configured during switch setup, which we read from hardware here. 2447 */ 2448 static int dsa_user_dcbnl_init(struct net_device *dev) 2449 { 2450 struct dsa_port *dp = dsa_user_to_port(dev); 2451 struct dsa_switch *ds = dp->ds; 2452 int port = dp->index; 2453 int err; 2454 2455 if (ds->ops->port_get_default_prio) { 2456 int prio = ds->ops->port_get_default_prio(ds, port); 2457 struct dcb_app app = { 2458 .selector = IEEE_8021QAZ_APP_SEL_ETHERTYPE, 2459 .protocol = 0, 2460 .priority = prio, 2461 }; 2462 2463 if (prio < 0) 2464 return prio; 2465 2466 err = dcb_ieee_setapp(dev, &app); 2467 if (err) 2468 return err; 2469 } 2470 2471 if (ds->ops->port_get_dscp_prio) { 2472 int protocol; 2473 2474 for (protocol = 0; protocol < 64; protocol++) { 2475 struct dcb_app app = { 2476 .selector = IEEE_8021QAZ_APP_SEL_DSCP, 2477 .protocol = protocol, 2478 }; 2479 int prio; 2480 2481 prio = ds->ops->port_get_dscp_prio(ds, port, protocol); 2482 if (prio == -EOPNOTSUPP) 2483 continue; 2484 if (prio < 0) 2485 return prio; 2486 2487 app.priority = prio; 2488 2489 err = dcb_ieee_setapp(dev, &app); 2490 if (err) 2491 return err; 2492 } 2493 } 2494 2495 return 0; 2496 } 2497 2498 static const struct ethtool_ops dsa_user_ethtool_ops = { 2499 .get_drvinfo = dsa_user_get_drvinfo, 2500 .get_regs_len = dsa_user_get_regs_len, 2501 .get_regs = dsa_user_get_regs, 2502 .nway_reset = dsa_user_nway_reset, 2503 .get_link = ethtool_op_get_link, 2504 .get_eeprom_len = dsa_user_get_eeprom_len, 2505 .get_eeprom = dsa_user_get_eeprom, 2506 .set_eeprom = dsa_user_set_eeprom, 2507 .get_strings = dsa_user_get_strings, 2508 .get_ethtool_stats = dsa_user_get_ethtool_stats, 2509 .get_sset_count = dsa_user_get_sset_count, 2510 .get_eth_phy_stats = dsa_user_get_eth_phy_stats, 2511 .get_eth_mac_stats = dsa_user_get_eth_mac_stats, 2512 .get_eth_ctrl_stats = dsa_user_get_eth_ctrl_stats, 2513 .get_rmon_stats = dsa_user_get_rmon_stats, 2514 .get_ts_stats = dsa_user_get_ts_stats, 2515 .set_wol = dsa_user_set_wol, 2516 .get_wol = dsa_user_get_wol, 2517 .set_eee = dsa_user_set_eee, 2518 .get_eee = dsa_user_get_eee, 2519 .get_link_ksettings = dsa_user_get_link_ksettings, 2520 .set_link_ksettings = dsa_user_set_link_ksettings, 2521 .get_pause_stats = dsa_user_get_pause_stats, 2522 .get_pauseparam = dsa_user_get_pauseparam, 2523 .set_pauseparam = dsa_user_set_pauseparam, 2524 .get_rxnfc = dsa_user_get_rxnfc, 2525 .set_rxnfc = dsa_user_set_rxnfc, 2526 .get_ts_info = dsa_user_get_ts_info, 2527 .self_test = dsa_user_net_selftest, 2528 .get_mm = dsa_user_get_mm, 2529 .set_mm = dsa_user_set_mm, 2530 .get_mm_stats = dsa_user_get_mm_stats, 2531 }; 2532 2533 static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = { 2534 .ieee_setapp = dsa_user_dcbnl_ieee_setapp, 2535 .ieee_delapp = dsa_user_dcbnl_ieee_delapp, 2536 .dcbnl_setapptrust = dsa_user_dcbnl_set_apptrust, 2537 .dcbnl_getapptrust = dsa_user_dcbnl_get_apptrust, 2538 }; 2539 2540 static void dsa_user_get_stats64(struct net_device *dev, 2541 struct rtnl_link_stats64 *s) 2542 { 2543 struct dsa_port *dp = dsa_user_to_port(dev); 2544 struct dsa_switch *ds = dp->ds; 2545 2546 if (ds->ops->get_stats64) 2547 ds->ops->get_stats64(ds, dp->index, s); 2548 else 2549 dev_get_tstats64(dev, s); 2550 } 2551 2552 static int dsa_user_fill_forward_path(struct net_device_path_ctx *ctx, 2553 struct net_device_path *path) 2554 { 2555 struct dsa_port *dp = dsa_user_to_port(ctx->dev); 2556 struct net_device *conduit = dsa_port_to_conduit(dp); 2557 struct dsa_port *cpu_dp = dp->cpu_dp; 2558 2559 path->dev = ctx->dev; 2560 path->type = DEV_PATH_DSA; 2561 path->dsa.proto = cpu_dp->tag_ops->proto; 2562 path->dsa.port = dp->index; 2563 ctx->dev = conduit; 2564 2565 return 0; 2566 } 2567 2568 static const struct net_device_ops dsa_user_netdev_ops = { 2569 .ndo_open = dsa_user_open, 2570 .ndo_stop = dsa_user_close, 2571 .ndo_start_xmit = dsa_user_xmit, 2572 .ndo_change_rx_flags = dsa_user_change_rx_flags, 2573 .ndo_set_rx_mode = dsa_user_set_rx_mode, 2574 .ndo_set_mac_address = dsa_user_set_mac_address, 2575 .ndo_fdb_dump = dsa_user_fdb_dump, 2576 .ndo_eth_ioctl = dsa_user_ioctl, 2577 .ndo_get_iflink = dsa_user_get_iflink, 2578 #ifdef CONFIG_NET_POLL_CONTROLLER 2579 .ndo_netpoll_setup = dsa_user_netpoll_setup, 2580 .ndo_netpoll_cleanup = dsa_user_netpoll_cleanup, 2581 .ndo_poll_controller = dsa_user_poll_controller, 2582 #endif 2583 .ndo_setup_tc = dsa_user_setup_tc, 2584 .ndo_get_stats64 = dsa_user_get_stats64, 2585 .ndo_vlan_rx_add_vid = dsa_user_vlan_rx_add_vid, 2586 .ndo_vlan_rx_kill_vid = dsa_user_vlan_rx_kill_vid, 2587 .ndo_change_mtu = dsa_user_change_mtu, 2588 .ndo_fill_forward_path = dsa_user_fill_forward_path, 2589 }; 2590 2591 static const struct device_type dsa_type = { 2592 .name = "dsa", 2593 }; 2594 2595 void dsa_port_phylink_mac_change(struct dsa_switch *ds, int port, bool up) 2596 { 2597 const struct dsa_port *dp = dsa_to_port(ds, port); 2598 2599 if (dp->pl) 2600 phylink_mac_change(dp->pl, up); 2601 } 2602 EXPORT_SYMBOL_GPL(dsa_port_phylink_mac_change); 2603 2604 static void dsa_user_phylink_fixed_state(struct phylink_config *config, 2605 struct phylink_link_state *state) 2606 { 2607 struct dsa_port *dp = dsa_phylink_to_port(config); 2608 struct dsa_switch *ds = dp->ds; 2609 2610 /* No need to check that this operation is valid, the callback would 2611 * not be called if it was not. 2612 */ 2613 ds->ops->phylink_fixed_state(ds, dp->index, state); 2614 } 2615 2616 /* user device setup *******************************************************/ 2617 static int dsa_user_phy_connect(struct net_device *user_dev, int addr, 2618 u32 flags) 2619 { 2620 struct dsa_port *dp = dsa_user_to_port(user_dev); 2621 struct dsa_switch *ds = dp->ds; 2622 2623 user_dev->phydev = mdiobus_get_phy(ds->user_mii_bus, addr); 2624 if (!user_dev->phydev) { 2625 netdev_err(user_dev, "no phy at %d\n", addr); 2626 return -ENODEV; 2627 } 2628 2629 user_dev->phydev->dev_flags |= flags; 2630 2631 return phylink_connect_phy(dp->pl, user_dev->phydev); 2632 } 2633 2634 static int dsa_user_phy_setup(struct net_device *user_dev) 2635 { 2636 struct dsa_port *dp = dsa_user_to_port(user_dev); 2637 struct device_node *port_dn = dp->dn; 2638 struct dsa_switch *ds = dp->ds; 2639 u32 phy_flags = 0; 2640 int ret; 2641 2642 dp->pl_config.dev = &user_dev->dev; 2643 dp->pl_config.type = PHYLINK_NETDEV; 2644 2645 /* The get_fixed_state callback takes precedence over polling the 2646 * link GPIO in PHYLINK (see phylink_get_fixed_state). Only set 2647 * this if the switch provides such a callback. 2648 */ 2649 if (ds->ops->phylink_fixed_state) { 2650 dp->pl_config.get_fixed_state = dsa_user_phylink_fixed_state; 2651 dp->pl_config.poll_fixed_state = true; 2652 } 2653 2654 ret = dsa_port_phylink_create(dp); 2655 if (ret) 2656 return ret; 2657 2658 if (ds->ops->get_phy_flags) 2659 phy_flags = ds->ops->get_phy_flags(ds, dp->index); 2660 2661 ret = phylink_of_phy_connect(dp->pl, port_dn, phy_flags); 2662 if (ret == -ENODEV && ds->user_mii_bus) { 2663 /* We could not connect to a designated PHY or SFP, so try to 2664 * use the switch internal MDIO bus instead 2665 */ 2666 ret = dsa_user_phy_connect(user_dev, dp->index, phy_flags); 2667 } 2668 if (ret) { 2669 netdev_err(user_dev, "failed to connect to PHY: %pe\n", 2670 ERR_PTR(ret)); 2671 dsa_port_phylink_destroy(dp); 2672 } 2673 2674 return ret; 2675 } 2676 2677 void dsa_user_setup_tagger(struct net_device *user) 2678 { 2679 struct dsa_port *dp = dsa_user_to_port(user); 2680 struct net_device *conduit = dsa_port_to_conduit(dp); 2681 struct dsa_user_priv *p = netdev_priv(user); 2682 const struct dsa_port *cpu_dp = dp->cpu_dp; 2683 const struct dsa_switch *ds = dp->ds; 2684 2685 user->needed_headroom = cpu_dp->tag_ops->needed_headroom; 2686 user->needed_tailroom = cpu_dp->tag_ops->needed_tailroom; 2687 /* Try to save one extra realloc later in the TX path (in the conduit) 2688 * by also inheriting the conduit's needed headroom and tailroom. 2689 * The 8021q driver also does this. 2690 */ 2691 user->needed_headroom += conduit->needed_headroom; 2692 user->needed_tailroom += conduit->needed_tailroom; 2693 2694 p->xmit = cpu_dp->tag_ops->xmit; 2695 2696 user->features = conduit->vlan_features | NETIF_F_HW_TC; 2697 user->hw_features |= NETIF_F_HW_TC; 2698 if (user->needed_tailroom) 2699 user->features &= ~(NETIF_F_SG | NETIF_F_FRAGLIST); 2700 if (ds->needs_standalone_vlan_filtering) 2701 user->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 2702 2703 user->lltx = true; 2704 } 2705 2706 int dsa_user_suspend(struct net_device *user_dev) 2707 { 2708 struct dsa_port *dp = dsa_user_to_port(user_dev); 2709 2710 if (!netif_running(user_dev)) 2711 return 0; 2712 2713 netif_device_detach(user_dev); 2714 2715 rtnl_lock(); 2716 phylink_stop(dp->pl); 2717 rtnl_unlock(); 2718 2719 return 0; 2720 } 2721 2722 int dsa_user_resume(struct net_device *user_dev) 2723 { 2724 struct dsa_port *dp = dsa_user_to_port(user_dev); 2725 2726 if (!netif_running(user_dev)) 2727 return 0; 2728 2729 netif_device_attach(user_dev); 2730 2731 rtnl_lock(); 2732 phylink_start(dp->pl); 2733 rtnl_unlock(); 2734 2735 return 0; 2736 } 2737 2738 int dsa_user_create(struct dsa_port *port) 2739 { 2740 struct net_device *conduit = dsa_port_to_conduit(port); 2741 struct dsa_switch *ds = port->ds; 2742 struct net_device *user_dev; 2743 struct dsa_user_priv *p; 2744 const char *name; 2745 int assign_type; 2746 int ret; 2747 2748 if (!ds->num_tx_queues) 2749 ds->num_tx_queues = 1; 2750 2751 if (port->name) { 2752 name = port->name; 2753 assign_type = NET_NAME_PREDICTABLE; 2754 } else { 2755 name = "eth%d"; 2756 assign_type = NET_NAME_ENUM; 2757 } 2758 2759 user_dev = alloc_netdev_mqs(sizeof(struct dsa_user_priv), name, 2760 assign_type, ether_setup, 2761 ds->num_tx_queues, 1); 2762 if (user_dev == NULL) 2763 return -ENOMEM; 2764 2765 user_dev->rtnl_link_ops = &dsa_link_ops; 2766 user_dev->ethtool_ops = &dsa_user_ethtool_ops; 2767 #if IS_ENABLED(CONFIG_DCB) 2768 user_dev->dcbnl_ops = &dsa_user_dcbnl_ops; 2769 #endif 2770 if (!is_zero_ether_addr(port->mac)) 2771 eth_hw_addr_set(user_dev, port->mac); 2772 else 2773 eth_hw_addr_inherit(user_dev, conduit); 2774 user_dev->priv_flags |= IFF_NO_QUEUE; 2775 if (dsa_switch_supports_uc_filtering(ds)) 2776 user_dev->priv_flags |= IFF_UNICAST_FLT; 2777 user_dev->netdev_ops = &dsa_user_netdev_ops; 2778 if (ds->ops->port_max_mtu) 2779 user_dev->max_mtu = ds->ops->port_max_mtu(ds, port->index); 2780 SET_NETDEV_DEVTYPE(user_dev, &dsa_type); 2781 2782 SET_NETDEV_DEV(user_dev, port->ds->dev); 2783 SET_NETDEV_DEVLINK_PORT(user_dev, &port->devlink_port); 2784 user_dev->dev.of_node = port->dn; 2785 user_dev->vlan_features = conduit->vlan_features; 2786 2787 p = netdev_priv(user_dev); 2788 user_dev->pcpu_stat_type = NETDEV_PCPU_STAT_TSTATS; 2789 2790 ret = gro_cells_init(&p->gcells, user_dev); 2791 if (ret) 2792 goto out_free; 2793 2794 p->dp = port; 2795 INIT_LIST_HEAD(&p->mall_tc_list); 2796 port->user = user_dev; 2797 dsa_user_setup_tagger(user_dev); 2798 2799 netif_carrier_off(user_dev); 2800 2801 ret = dsa_user_phy_setup(user_dev); 2802 if (ret) { 2803 netdev_err(user_dev, 2804 "error %d setting up PHY for tree %d, switch %d, port %d\n", 2805 ret, ds->dst->index, ds->index, port->index); 2806 goto out_gcells; 2807 } 2808 2809 rtnl_lock(); 2810 2811 ret = dsa_user_change_mtu(user_dev, ETH_DATA_LEN); 2812 if (ret && ret != -EOPNOTSUPP) 2813 dev_warn(ds->dev, "nonfatal error %d setting MTU to %d on port %d\n", 2814 ret, ETH_DATA_LEN, port->index); 2815 2816 ret = register_netdevice(user_dev); 2817 if (ret) { 2818 netdev_err(conduit, "error %d registering interface %s\n", 2819 ret, user_dev->name); 2820 rtnl_unlock(); 2821 goto out_phy; 2822 } 2823 2824 if (IS_ENABLED(CONFIG_DCB)) { 2825 ret = dsa_user_dcbnl_init(user_dev); 2826 if (ret) { 2827 netdev_err(user_dev, 2828 "failed to initialize DCB: %pe\n", 2829 ERR_PTR(ret)); 2830 rtnl_unlock(); 2831 goto out_unregister; 2832 } 2833 } 2834 2835 ret = netdev_upper_dev_link(conduit, user_dev, NULL); 2836 2837 rtnl_unlock(); 2838 2839 if (ret) 2840 goto out_unregister; 2841 2842 return 0; 2843 2844 out_unregister: 2845 unregister_netdev(user_dev); 2846 out_phy: 2847 rtnl_lock(); 2848 phylink_disconnect_phy(p->dp->pl); 2849 rtnl_unlock(); 2850 dsa_port_phylink_destroy(p->dp); 2851 out_gcells: 2852 gro_cells_destroy(&p->gcells); 2853 out_free: 2854 free_netdev(user_dev); 2855 port->user = NULL; 2856 return ret; 2857 } 2858 2859 void dsa_user_destroy(struct net_device *user_dev) 2860 { 2861 struct net_device *conduit = dsa_user_to_conduit(user_dev); 2862 struct dsa_port *dp = dsa_user_to_port(user_dev); 2863 struct dsa_user_priv *p = netdev_priv(user_dev); 2864 2865 netif_carrier_off(user_dev); 2866 rtnl_lock(); 2867 netdev_upper_dev_unlink(conduit, user_dev); 2868 unregister_netdevice(user_dev); 2869 phylink_disconnect_phy(dp->pl); 2870 rtnl_unlock(); 2871 2872 dsa_port_phylink_destroy(dp); 2873 gro_cells_destroy(&p->gcells); 2874 free_netdev(user_dev); 2875 } 2876 2877 int dsa_user_change_conduit(struct net_device *dev, struct net_device *conduit, 2878 struct netlink_ext_ack *extack) 2879 { 2880 struct net_device *old_conduit = dsa_user_to_conduit(dev); 2881 struct dsa_port *dp = dsa_user_to_port(dev); 2882 struct dsa_switch *ds = dp->ds; 2883 struct net_device *upper; 2884 struct list_head *iter; 2885 int err; 2886 2887 if (conduit == old_conduit) 2888 return 0; 2889 2890 if (!ds->ops->port_change_conduit) { 2891 NL_SET_ERR_MSG_MOD(extack, 2892 "Driver does not support changing DSA conduit"); 2893 return -EOPNOTSUPP; 2894 } 2895 2896 if (!netdev_uses_dsa(conduit)) { 2897 NL_SET_ERR_MSG_MOD(extack, 2898 "Interface not eligible as DSA conduit"); 2899 return -EOPNOTSUPP; 2900 } 2901 2902 netdev_for_each_upper_dev_rcu(conduit, upper, iter) { 2903 if (dsa_user_dev_check(upper)) 2904 continue; 2905 if (netif_is_bridge_master(upper)) 2906 continue; 2907 NL_SET_ERR_MSG_MOD(extack, "Cannot join conduit with unknown uppers"); 2908 return -EOPNOTSUPP; 2909 } 2910 2911 /* Since we allow live-changing the DSA conduit, plus we auto-open the 2912 * DSA conduit when the user port opens => we need to ensure that the 2913 * new DSA conduit is open too. 2914 */ 2915 if (dev->flags & IFF_UP) { 2916 err = dev_open(conduit, extack); 2917 if (err) 2918 return err; 2919 } 2920 2921 netdev_upper_dev_unlink(old_conduit, dev); 2922 2923 err = netdev_upper_dev_link(conduit, dev, extack); 2924 if (err) 2925 goto out_revert_old_conduit_unlink; 2926 2927 err = dsa_port_change_conduit(dp, conduit, extack); 2928 if (err) 2929 goto out_revert_conduit_link; 2930 2931 /* Update the MTU of the new CPU port through cross-chip notifiers */ 2932 err = dsa_user_change_mtu(dev, dev->mtu); 2933 if (err && err != -EOPNOTSUPP) { 2934 netdev_warn(dev, 2935 "nonfatal error updating MTU with new conduit: %pe\n", 2936 ERR_PTR(err)); 2937 } 2938 2939 return 0; 2940 2941 out_revert_conduit_link: 2942 netdev_upper_dev_unlink(conduit, dev); 2943 out_revert_old_conduit_unlink: 2944 netdev_upper_dev_link(old_conduit, dev, NULL); 2945 return err; 2946 } 2947 2948 bool dsa_user_dev_check(const struct net_device *dev) 2949 { 2950 return dev->netdev_ops == &dsa_user_netdev_ops; 2951 } 2952 EXPORT_SYMBOL_GPL(dsa_user_dev_check); 2953 2954 static int dsa_user_changeupper(struct net_device *dev, 2955 struct netdev_notifier_changeupper_info *info) 2956 { 2957 struct netlink_ext_ack *extack; 2958 int err = NOTIFY_DONE; 2959 struct dsa_port *dp; 2960 2961 if (!dsa_user_dev_check(dev)) 2962 return err; 2963 2964 dp = dsa_user_to_port(dev); 2965 extack = netdev_notifier_info_to_extack(&info->info); 2966 2967 if (netif_is_bridge_master(info->upper_dev)) { 2968 if (info->linking) { 2969 err = dsa_port_bridge_join(dp, info->upper_dev, extack); 2970 if (!err) 2971 dsa_bridge_mtu_normalization(dp); 2972 if (err == -EOPNOTSUPP) { 2973 NL_SET_ERR_MSG_WEAK_MOD(extack, 2974 "Offloading not supported"); 2975 err = 0; 2976 } 2977 err = notifier_from_errno(err); 2978 } else { 2979 dsa_port_bridge_leave(dp, info->upper_dev); 2980 err = NOTIFY_OK; 2981 } 2982 } else if (netif_is_lag_master(info->upper_dev)) { 2983 if (info->linking) { 2984 err = dsa_port_lag_join(dp, info->upper_dev, 2985 info->upper_info, extack); 2986 if (err == -EOPNOTSUPP) { 2987 NL_SET_ERR_MSG_WEAK_MOD(extack, 2988 "Offloading not supported"); 2989 err = 0; 2990 } 2991 err = notifier_from_errno(err); 2992 } else { 2993 dsa_port_lag_leave(dp, info->upper_dev); 2994 err = NOTIFY_OK; 2995 } 2996 } else if (is_hsr_master(info->upper_dev)) { 2997 if (info->linking) { 2998 err = dsa_port_hsr_join(dp, info->upper_dev, extack); 2999 if (err == -EOPNOTSUPP) { 3000 NL_SET_ERR_MSG_WEAK_MOD(extack, 3001 "Offloading not supported"); 3002 err = 0; 3003 } 3004 err = notifier_from_errno(err); 3005 } else { 3006 dsa_port_hsr_leave(dp, info->upper_dev); 3007 err = NOTIFY_OK; 3008 } 3009 } 3010 3011 return err; 3012 } 3013 3014 static int dsa_user_prechangeupper(struct net_device *dev, 3015 struct netdev_notifier_changeupper_info *info) 3016 { 3017 struct dsa_port *dp; 3018 3019 if (!dsa_user_dev_check(dev)) 3020 return NOTIFY_DONE; 3021 3022 dp = dsa_user_to_port(dev); 3023 3024 if (netif_is_bridge_master(info->upper_dev) && !info->linking) 3025 dsa_port_pre_bridge_leave(dp, info->upper_dev); 3026 else if (netif_is_lag_master(info->upper_dev) && !info->linking) 3027 dsa_port_pre_lag_leave(dp, info->upper_dev); 3028 /* dsa_port_pre_hsr_leave is not yet necessary since hsr devices cannot 3029 * meaningfully placed under a bridge yet 3030 */ 3031 3032 return NOTIFY_DONE; 3033 } 3034 3035 static int 3036 dsa_user_lag_changeupper(struct net_device *dev, 3037 struct netdev_notifier_changeupper_info *info) 3038 { 3039 struct net_device *lower; 3040 struct list_head *iter; 3041 int err = NOTIFY_DONE; 3042 struct dsa_port *dp; 3043 3044 if (!netif_is_lag_master(dev)) 3045 return err; 3046 3047 netdev_for_each_lower_dev(dev, lower, iter) { 3048 if (!dsa_user_dev_check(lower)) 3049 continue; 3050 3051 dp = dsa_user_to_port(lower); 3052 if (!dp->lag) 3053 /* Software LAG */ 3054 continue; 3055 3056 err = dsa_user_changeupper(lower, info); 3057 if (notifier_to_errno(err)) 3058 break; 3059 } 3060 3061 return err; 3062 } 3063 3064 /* Same as dsa_user_lag_changeupper() except that it calls 3065 * dsa_user_prechangeupper() 3066 */ 3067 static int 3068 dsa_user_lag_prechangeupper(struct net_device *dev, 3069 struct netdev_notifier_changeupper_info *info) 3070 { 3071 struct net_device *lower; 3072 struct list_head *iter; 3073 int err = NOTIFY_DONE; 3074 struct dsa_port *dp; 3075 3076 if (!netif_is_lag_master(dev)) 3077 return err; 3078 3079 netdev_for_each_lower_dev(dev, lower, iter) { 3080 if (!dsa_user_dev_check(lower)) 3081 continue; 3082 3083 dp = dsa_user_to_port(lower); 3084 if (!dp->lag) 3085 /* Software LAG */ 3086 continue; 3087 3088 err = dsa_user_prechangeupper(lower, info); 3089 if (notifier_to_errno(err)) 3090 break; 3091 } 3092 3093 return err; 3094 } 3095 3096 static int 3097 dsa_prevent_bridging_8021q_upper(struct net_device *dev, 3098 struct netdev_notifier_changeupper_info *info) 3099 { 3100 struct netlink_ext_ack *ext_ack; 3101 struct net_device *user, *br; 3102 struct dsa_port *dp; 3103 3104 ext_ack = netdev_notifier_info_to_extack(&info->info); 3105 3106 if (!is_vlan_dev(dev)) 3107 return NOTIFY_DONE; 3108 3109 user = vlan_dev_real_dev(dev); 3110 if (!dsa_user_dev_check(user)) 3111 return NOTIFY_DONE; 3112 3113 dp = dsa_user_to_port(user); 3114 br = dsa_port_bridge_dev_get(dp); 3115 if (!br) 3116 return NOTIFY_DONE; 3117 3118 /* Deny enslaving a VLAN device into a VLAN-aware bridge */ 3119 if (br_vlan_enabled(br) && 3120 netif_is_bridge_master(info->upper_dev) && info->linking) { 3121 NL_SET_ERR_MSG_MOD(ext_ack, 3122 "Cannot make VLAN device join VLAN-aware bridge"); 3123 return notifier_from_errno(-EINVAL); 3124 } 3125 3126 return NOTIFY_DONE; 3127 } 3128 3129 static int 3130 dsa_user_check_8021q_upper(struct net_device *dev, 3131 struct netdev_notifier_changeupper_info *info) 3132 { 3133 struct dsa_port *dp = dsa_user_to_port(dev); 3134 struct net_device *br = dsa_port_bridge_dev_get(dp); 3135 struct bridge_vlan_info br_info; 3136 struct netlink_ext_ack *extack; 3137 int err = NOTIFY_DONE; 3138 u16 vid; 3139 3140 if (!br || !br_vlan_enabled(br)) 3141 return NOTIFY_DONE; 3142 3143 extack = netdev_notifier_info_to_extack(&info->info); 3144 vid = vlan_dev_vlan_id(info->upper_dev); 3145 3146 /* br_vlan_get_info() returns -EINVAL or -ENOENT if the 3147 * device, respectively the VID is not found, returning 3148 * 0 means success, which is a failure for us here. 3149 */ 3150 err = br_vlan_get_info(br, vid, &br_info); 3151 if (err == 0) { 3152 NL_SET_ERR_MSG_MOD(extack, 3153 "This VLAN is already configured by the bridge"); 3154 return notifier_from_errno(-EBUSY); 3155 } 3156 3157 return NOTIFY_DONE; 3158 } 3159 3160 static int 3161 dsa_user_prechangeupper_sanity_check(struct net_device *dev, 3162 struct netdev_notifier_changeupper_info *info) 3163 { 3164 struct dsa_switch *ds; 3165 struct dsa_port *dp; 3166 int err; 3167 3168 if (!dsa_user_dev_check(dev)) 3169 return dsa_prevent_bridging_8021q_upper(dev, info); 3170 3171 dp = dsa_user_to_port(dev); 3172 ds = dp->ds; 3173 3174 if (ds->ops->port_prechangeupper) { 3175 err = ds->ops->port_prechangeupper(ds, dp->index, info); 3176 if (err) 3177 return notifier_from_errno(err); 3178 } 3179 3180 if (is_vlan_dev(info->upper_dev)) 3181 return dsa_user_check_8021q_upper(dev, info); 3182 3183 return NOTIFY_DONE; 3184 } 3185 3186 /* To be eligible as a DSA conduit, a LAG must have all lower interfaces be 3187 * eligible DSA conduits. Additionally, all LAG slaves must be DSA conduits of 3188 * switches in the same switch tree. 3189 */ 3190 static int dsa_lag_conduit_validate(struct net_device *lag_dev, 3191 struct netlink_ext_ack *extack) 3192 { 3193 struct net_device *lower1, *lower2; 3194 struct list_head *iter1, *iter2; 3195 3196 netdev_for_each_lower_dev(lag_dev, lower1, iter1) { 3197 netdev_for_each_lower_dev(lag_dev, lower2, iter2) { 3198 if (!netdev_uses_dsa(lower1) || 3199 !netdev_uses_dsa(lower2)) { 3200 NL_SET_ERR_MSG_MOD(extack, 3201 "All LAG ports must be eligible as DSA conduits"); 3202 return notifier_from_errno(-EINVAL); 3203 } 3204 3205 if (lower1 == lower2) 3206 continue; 3207 3208 if (!dsa_port_tree_same(lower1->dsa_ptr, 3209 lower2->dsa_ptr)) { 3210 NL_SET_ERR_MSG_MOD(extack, 3211 "LAG contains DSA conduits of disjoint switch trees"); 3212 return notifier_from_errno(-EINVAL); 3213 } 3214 } 3215 } 3216 3217 return NOTIFY_DONE; 3218 } 3219 3220 static int 3221 dsa_conduit_prechangeupper_sanity_check(struct net_device *conduit, 3222 struct netdev_notifier_changeupper_info *info) 3223 { 3224 struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info); 3225 3226 if (!netdev_uses_dsa(conduit)) 3227 return NOTIFY_DONE; 3228 3229 if (!info->linking) 3230 return NOTIFY_DONE; 3231 3232 /* Allow DSA switch uppers */ 3233 if (dsa_user_dev_check(info->upper_dev)) 3234 return NOTIFY_DONE; 3235 3236 /* Allow bridge uppers of DSA conduits, subject to further 3237 * restrictions in dsa_bridge_prechangelower_sanity_check() 3238 */ 3239 if (netif_is_bridge_master(info->upper_dev)) 3240 return NOTIFY_DONE; 3241 3242 /* Allow LAG uppers, subject to further restrictions in 3243 * dsa_lag_conduit_prechangelower_sanity_check() 3244 */ 3245 if (netif_is_lag_master(info->upper_dev)) 3246 return dsa_lag_conduit_validate(info->upper_dev, extack); 3247 3248 NL_SET_ERR_MSG_MOD(extack, 3249 "DSA conduit cannot join unknown upper interfaces"); 3250 return notifier_from_errno(-EBUSY); 3251 } 3252 3253 static int 3254 dsa_lag_conduit_prechangelower_sanity_check(struct net_device *dev, 3255 struct netdev_notifier_changeupper_info *info) 3256 { 3257 struct netlink_ext_ack *extack = netdev_notifier_info_to_extack(&info->info); 3258 struct net_device *lag_dev = info->upper_dev; 3259 struct net_device *lower; 3260 struct list_head *iter; 3261 3262 if (!netdev_uses_dsa(lag_dev) || !netif_is_lag_master(lag_dev)) 3263 return NOTIFY_DONE; 3264 3265 if (!info->linking) 3266 return NOTIFY_DONE; 3267 3268 if (!netdev_uses_dsa(dev)) { 3269 NL_SET_ERR_MSG(extack, 3270 "Only DSA conduits can join a LAG DSA conduit"); 3271 return notifier_from_errno(-EINVAL); 3272 } 3273 3274 netdev_for_each_lower_dev(lag_dev, lower, iter) { 3275 if (!dsa_port_tree_same(dev->dsa_ptr, lower->dsa_ptr)) { 3276 NL_SET_ERR_MSG(extack, 3277 "Interface is DSA conduit for a different switch tree than this LAG"); 3278 return notifier_from_errno(-EINVAL); 3279 } 3280 3281 break; 3282 } 3283 3284 return NOTIFY_DONE; 3285 } 3286 3287 /* Don't allow bridging of DSA conduits, since the bridge layer rx_handler 3288 * prevents the DSA fake ethertype handler to be invoked, so we don't get the 3289 * chance to strip off and parse the DSA switch tag protocol header (the bridge 3290 * layer just returns RX_HANDLER_CONSUMED, stopping RX processing for these 3291 * frames). 3292 * The only case where that would not be an issue is when bridging can already 3293 * be offloaded, such as when the DSA conduit is itself a DSA or plain switchdev 3294 * port, and is bridged only with other ports from the same hardware device. 3295 */ 3296 static int 3297 dsa_bridge_prechangelower_sanity_check(struct net_device *new_lower, 3298 struct netdev_notifier_changeupper_info *info) 3299 { 3300 struct net_device *br = info->upper_dev; 3301 struct netlink_ext_ack *extack; 3302 struct net_device *lower; 3303 struct list_head *iter; 3304 3305 if (!netif_is_bridge_master(br)) 3306 return NOTIFY_DONE; 3307 3308 if (!info->linking) 3309 return NOTIFY_DONE; 3310 3311 extack = netdev_notifier_info_to_extack(&info->info); 3312 3313 netdev_for_each_lower_dev(br, lower, iter) { 3314 if (!netdev_uses_dsa(new_lower) && !netdev_uses_dsa(lower)) 3315 continue; 3316 3317 if (!netdev_port_same_parent_id(lower, new_lower)) { 3318 NL_SET_ERR_MSG(extack, 3319 "Cannot do software bridging with a DSA conduit"); 3320 return notifier_from_errno(-EINVAL); 3321 } 3322 } 3323 3324 return NOTIFY_DONE; 3325 } 3326 3327 static void dsa_tree_migrate_ports_from_lag_conduit(struct dsa_switch_tree *dst, 3328 struct net_device *lag_dev) 3329 { 3330 struct net_device *new_conduit = dsa_tree_find_first_conduit(dst); 3331 struct dsa_port *dp; 3332 int err; 3333 3334 dsa_tree_for_each_user_port(dp, dst) { 3335 if (dsa_port_to_conduit(dp) != lag_dev) 3336 continue; 3337 3338 err = dsa_user_change_conduit(dp->user, new_conduit, NULL); 3339 if (err) { 3340 netdev_err(dp->user, 3341 "failed to restore conduit to %s: %pe\n", 3342 new_conduit->name, ERR_PTR(err)); 3343 } 3344 } 3345 } 3346 3347 static int dsa_conduit_lag_join(struct net_device *conduit, 3348 struct net_device *lag_dev, 3349 struct netdev_lag_upper_info *uinfo, 3350 struct netlink_ext_ack *extack) 3351 { 3352 struct dsa_port *cpu_dp = conduit->dsa_ptr; 3353 struct dsa_switch_tree *dst = cpu_dp->dst; 3354 struct dsa_port *dp; 3355 int err; 3356 3357 err = dsa_conduit_lag_setup(lag_dev, cpu_dp, uinfo, extack); 3358 if (err) 3359 return err; 3360 3361 dsa_tree_for_each_user_port(dp, dst) { 3362 if (dsa_port_to_conduit(dp) != conduit) 3363 continue; 3364 3365 err = dsa_user_change_conduit(dp->user, lag_dev, extack); 3366 if (err) 3367 goto restore; 3368 } 3369 3370 return 0; 3371 3372 restore: 3373 dsa_tree_for_each_user_port_continue_reverse(dp, dst) { 3374 if (dsa_port_to_conduit(dp) != lag_dev) 3375 continue; 3376 3377 err = dsa_user_change_conduit(dp->user, conduit, NULL); 3378 if (err) { 3379 netdev_err(dp->user, 3380 "failed to restore conduit to %s: %pe\n", 3381 conduit->name, ERR_PTR(err)); 3382 } 3383 } 3384 3385 dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr); 3386 3387 return err; 3388 } 3389 3390 static void dsa_conduit_lag_leave(struct net_device *conduit, 3391 struct net_device *lag_dev) 3392 { 3393 struct dsa_port *dp, *cpu_dp = lag_dev->dsa_ptr; 3394 struct dsa_switch_tree *dst = cpu_dp->dst; 3395 struct dsa_port *new_cpu_dp = NULL; 3396 struct net_device *lower; 3397 struct list_head *iter; 3398 3399 netdev_for_each_lower_dev(lag_dev, lower, iter) { 3400 if (netdev_uses_dsa(lower)) { 3401 new_cpu_dp = lower->dsa_ptr; 3402 break; 3403 } 3404 } 3405 3406 if (new_cpu_dp) { 3407 /* Update the CPU port of the user ports still under the LAG 3408 * so that dsa_port_to_conduit() continues to work properly 3409 */ 3410 dsa_tree_for_each_user_port(dp, dst) 3411 if (dsa_port_to_conduit(dp) == lag_dev) 3412 dp->cpu_dp = new_cpu_dp; 3413 3414 /* Update the index of the virtual CPU port to match the lowest 3415 * physical CPU port 3416 */ 3417 lag_dev->dsa_ptr = new_cpu_dp; 3418 wmb(); 3419 } else { 3420 /* If the LAG DSA conduit has no ports left, migrate back all 3421 * user ports to the first physical CPU port 3422 */ 3423 dsa_tree_migrate_ports_from_lag_conduit(dst, lag_dev); 3424 } 3425 3426 /* This DSA conduit has left its LAG in any case, so let 3427 * the CPU port leave the hardware LAG as well 3428 */ 3429 dsa_conduit_lag_teardown(lag_dev, conduit->dsa_ptr); 3430 } 3431 3432 static int dsa_conduit_changeupper(struct net_device *dev, 3433 struct netdev_notifier_changeupper_info *info) 3434 { 3435 struct netlink_ext_ack *extack; 3436 int err = NOTIFY_DONE; 3437 3438 if (!netdev_uses_dsa(dev)) 3439 return err; 3440 3441 extack = netdev_notifier_info_to_extack(&info->info); 3442 3443 if (netif_is_lag_master(info->upper_dev)) { 3444 if (info->linking) { 3445 err = dsa_conduit_lag_join(dev, info->upper_dev, 3446 info->upper_info, extack); 3447 err = notifier_from_errno(err); 3448 } else { 3449 dsa_conduit_lag_leave(dev, info->upper_dev); 3450 err = NOTIFY_OK; 3451 } 3452 } 3453 3454 return err; 3455 } 3456 3457 static int dsa_user_netdevice_event(struct notifier_block *nb, 3458 unsigned long event, void *ptr) 3459 { 3460 struct net_device *dev = netdev_notifier_info_to_dev(ptr); 3461 3462 switch (event) { 3463 case NETDEV_PRECHANGEUPPER: { 3464 struct netdev_notifier_changeupper_info *info = ptr; 3465 int err; 3466 3467 err = dsa_user_prechangeupper_sanity_check(dev, info); 3468 if (notifier_to_errno(err)) 3469 return err; 3470 3471 err = dsa_conduit_prechangeupper_sanity_check(dev, info); 3472 if (notifier_to_errno(err)) 3473 return err; 3474 3475 err = dsa_lag_conduit_prechangelower_sanity_check(dev, info); 3476 if (notifier_to_errno(err)) 3477 return err; 3478 3479 err = dsa_bridge_prechangelower_sanity_check(dev, info); 3480 if (notifier_to_errno(err)) 3481 return err; 3482 3483 err = dsa_user_prechangeupper(dev, ptr); 3484 if (notifier_to_errno(err)) 3485 return err; 3486 3487 err = dsa_user_lag_prechangeupper(dev, ptr); 3488 if (notifier_to_errno(err)) 3489 return err; 3490 3491 break; 3492 } 3493 case NETDEV_CHANGEUPPER: { 3494 int err; 3495 3496 err = dsa_user_changeupper(dev, ptr); 3497 if (notifier_to_errno(err)) 3498 return err; 3499 3500 err = dsa_user_lag_changeupper(dev, ptr); 3501 if (notifier_to_errno(err)) 3502 return err; 3503 3504 err = dsa_conduit_changeupper(dev, ptr); 3505 if (notifier_to_errno(err)) 3506 return err; 3507 3508 break; 3509 } 3510 case NETDEV_CHANGELOWERSTATE: { 3511 struct netdev_notifier_changelowerstate_info *info = ptr; 3512 struct dsa_port *dp; 3513 int err = 0; 3514 3515 if (dsa_user_dev_check(dev)) { 3516 dp = dsa_user_to_port(dev); 3517 3518 err = dsa_port_lag_change(dp, info->lower_state_info); 3519 } 3520 3521 /* Mirror LAG port events on DSA conduits that are in 3522 * a LAG towards their respective switch CPU ports 3523 */ 3524 if (netdev_uses_dsa(dev)) { 3525 dp = dev->dsa_ptr; 3526 3527 err = dsa_port_lag_change(dp, info->lower_state_info); 3528 } 3529 3530 return notifier_from_errno(err); 3531 } 3532 case NETDEV_CHANGE: 3533 case NETDEV_UP: { 3534 /* Track state of conduit port. 3535 * DSA driver may require the conduit port (and indirectly 3536 * the tagger) to be available for some special operation. 3537 */ 3538 if (netdev_uses_dsa(dev)) { 3539 struct dsa_port *cpu_dp = dev->dsa_ptr; 3540 struct dsa_switch_tree *dst = cpu_dp->ds->dst; 3541 3542 /* Track when the conduit port is UP */ 3543 dsa_tree_conduit_oper_state_change(dst, dev, 3544 netif_oper_up(dev)); 3545 3546 /* Track when the conduit port is ready and can accept 3547 * packet. 3548 * NETDEV_UP event is not enough to flag a port as ready. 3549 * We also have to wait for linkwatch_do_dev to dev_activate 3550 * and emit a NETDEV_CHANGE event. 3551 * We check if a conduit port is ready by checking if the dev 3552 * have a qdisc assigned and is not noop. 3553 */ 3554 dsa_tree_conduit_admin_state_change(dst, dev, 3555 !qdisc_tx_is_noop(dev)); 3556 3557 return NOTIFY_OK; 3558 } 3559 3560 return NOTIFY_DONE; 3561 } 3562 case NETDEV_GOING_DOWN: { 3563 struct dsa_port *dp, *cpu_dp; 3564 struct dsa_switch_tree *dst; 3565 LIST_HEAD(close_list); 3566 3567 if (!netdev_uses_dsa(dev)) 3568 return NOTIFY_DONE; 3569 3570 cpu_dp = dev->dsa_ptr; 3571 dst = cpu_dp->ds->dst; 3572 3573 dsa_tree_conduit_admin_state_change(dst, dev, false); 3574 3575 list_for_each_entry(dp, &dst->ports, list) { 3576 if (!dsa_port_is_user(dp)) 3577 continue; 3578 3579 if (dp->cpu_dp != cpu_dp) 3580 continue; 3581 3582 list_add(&dp->user->close_list, &close_list); 3583 } 3584 3585 dev_close_many(&close_list, true); 3586 3587 return NOTIFY_OK; 3588 } 3589 default: 3590 break; 3591 } 3592 3593 return NOTIFY_DONE; 3594 } 3595 3596 static void 3597 dsa_fdb_offload_notify(struct dsa_switchdev_event_work *switchdev_work) 3598 { 3599 struct switchdev_notifier_fdb_info info = {}; 3600 3601 info.addr = switchdev_work->addr; 3602 info.vid = switchdev_work->vid; 3603 info.offloaded = true; 3604 call_switchdev_notifiers(SWITCHDEV_FDB_OFFLOADED, 3605 switchdev_work->orig_dev, &info.info, NULL); 3606 } 3607 3608 static void dsa_user_switchdev_event_work(struct work_struct *work) 3609 { 3610 struct dsa_switchdev_event_work *switchdev_work = 3611 container_of(work, struct dsa_switchdev_event_work, work); 3612 const unsigned char *addr = switchdev_work->addr; 3613 struct net_device *dev = switchdev_work->dev; 3614 u16 vid = switchdev_work->vid; 3615 struct dsa_switch *ds; 3616 struct dsa_port *dp; 3617 int err; 3618 3619 dp = dsa_user_to_port(dev); 3620 ds = dp->ds; 3621 3622 switch (switchdev_work->event) { 3623 case SWITCHDEV_FDB_ADD_TO_DEVICE: 3624 if (switchdev_work->host_addr) 3625 err = dsa_port_bridge_host_fdb_add(dp, addr, vid); 3626 else if (dp->lag) 3627 err = dsa_port_lag_fdb_add(dp, addr, vid); 3628 else 3629 err = dsa_port_fdb_add(dp, addr, vid); 3630 if (err) { 3631 dev_err(ds->dev, 3632 "port %d failed to add %pM vid %d to fdb: %d\n", 3633 dp->index, addr, vid, err); 3634 break; 3635 } 3636 dsa_fdb_offload_notify(switchdev_work); 3637 break; 3638 3639 case SWITCHDEV_FDB_DEL_TO_DEVICE: 3640 if (switchdev_work->host_addr) 3641 err = dsa_port_bridge_host_fdb_del(dp, addr, vid); 3642 else if (dp->lag) 3643 err = dsa_port_lag_fdb_del(dp, addr, vid); 3644 else 3645 err = dsa_port_fdb_del(dp, addr, vid); 3646 if (err) { 3647 dev_err(ds->dev, 3648 "port %d failed to delete %pM vid %d from fdb: %d\n", 3649 dp->index, addr, vid, err); 3650 } 3651 3652 break; 3653 } 3654 3655 kfree(switchdev_work); 3656 } 3657 3658 static bool dsa_foreign_dev_check(const struct net_device *dev, 3659 const struct net_device *foreign_dev) 3660 { 3661 const struct dsa_port *dp = dsa_user_to_port(dev); 3662 struct dsa_switch_tree *dst = dp->ds->dst; 3663 3664 if (netif_is_bridge_master(foreign_dev)) 3665 return !dsa_tree_offloads_bridge_dev(dst, foreign_dev); 3666 3667 if (netif_is_bridge_port(foreign_dev)) 3668 return !dsa_tree_offloads_bridge_port(dst, foreign_dev); 3669 3670 /* Everything else is foreign */ 3671 return true; 3672 } 3673 3674 static int dsa_user_fdb_event(struct net_device *dev, 3675 struct net_device *orig_dev, 3676 unsigned long event, const void *ctx, 3677 const struct switchdev_notifier_fdb_info *fdb_info) 3678 { 3679 struct dsa_switchdev_event_work *switchdev_work; 3680 struct dsa_port *dp = dsa_user_to_port(dev); 3681 bool host_addr = fdb_info->is_local; 3682 struct dsa_switch *ds = dp->ds; 3683 3684 if (ctx && ctx != dp) 3685 return 0; 3686 3687 if (!dp->bridge) 3688 return 0; 3689 3690 if (switchdev_fdb_is_dynamically_learned(fdb_info)) { 3691 if (dsa_port_offloads_bridge_port(dp, orig_dev)) 3692 return 0; 3693 3694 /* FDB entries learned by the software bridge or by foreign 3695 * bridge ports should be installed as host addresses only if 3696 * the driver requests assisted learning. 3697 */ 3698 if (!ds->assisted_learning_on_cpu_port) 3699 return 0; 3700 } 3701 3702 /* Also treat FDB entries on foreign interfaces bridged with us as host 3703 * addresses. 3704 */ 3705 if (dsa_foreign_dev_check(dev, orig_dev)) 3706 host_addr = true; 3707 3708 /* Check early that we're not doing work in vain. 3709 * Host addresses on LAG ports still require regular FDB ops, 3710 * since the CPU port isn't in a LAG. 3711 */ 3712 if (dp->lag && !host_addr) { 3713 if (!ds->ops->lag_fdb_add || !ds->ops->lag_fdb_del) 3714 return -EOPNOTSUPP; 3715 } else { 3716 if (!ds->ops->port_fdb_add || !ds->ops->port_fdb_del) 3717 return -EOPNOTSUPP; 3718 } 3719 3720 switchdev_work = kzalloc(sizeof(*switchdev_work), GFP_ATOMIC); 3721 if (!switchdev_work) 3722 return -ENOMEM; 3723 3724 netdev_dbg(dev, "%s FDB entry towards %s, addr %pM vid %d%s\n", 3725 event == SWITCHDEV_FDB_ADD_TO_DEVICE ? "Adding" : "Deleting", 3726 orig_dev->name, fdb_info->addr, fdb_info->vid, 3727 host_addr ? " as host address" : ""); 3728 3729 INIT_WORK(&switchdev_work->work, dsa_user_switchdev_event_work); 3730 switchdev_work->event = event; 3731 switchdev_work->dev = dev; 3732 switchdev_work->orig_dev = orig_dev; 3733 3734 ether_addr_copy(switchdev_work->addr, fdb_info->addr); 3735 switchdev_work->vid = fdb_info->vid; 3736 switchdev_work->host_addr = host_addr; 3737 3738 dsa_schedule_work(&switchdev_work->work); 3739 3740 return 0; 3741 } 3742 3743 /* Called under rcu_read_lock() */ 3744 static int dsa_user_switchdev_event(struct notifier_block *unused, 3745 unsigned long event, void *ptr) 3746 { 3747 struct net_device *dev = switchdev_notifier_info_to_dev(ptr); 3748 int err; 3749 3750 switch (event) { 3751 case SWITCHDEV_PORT_ATTR_SET: 3752 err = switchdev_handle_port_attr_set(dev, ptr, 3753 dsa_user_dev_check, 3754 dsa_user_port_attr_set); 3755 return notifier_from_errno(err); 3756 case SWITCHDEV_FDB_ADD_TO_DEVICE: 3757 case SWITCHDEV_FDB_DEL_TO_DEVICE: 3758 err = switchdev_handle_fdb_event_to_device(dev, event, ptr, 3759 dsa_user_dev_check, 3760 dsa_foreign_dev_check, 3761 dsa_user_fdb_event); 3762 return notifier_from_errno(err); 3763 default: 3764 return NOTIFY_DONE; 3765 } 3766 3767 return NOTIFY_OK; 3768 } 3769 3770 static int dsa_user_switchdev_blocking_event(struct notifier_block *unused, 3771 unsigned long event, void *ptr) 3772 { 3773 struct net_device *dev = switchdev_notifier_info_to_dev(ptr); 3774 int err; 3775 3776 switch (event) { 3777 case SWITCHDEV_PORT_OBJ_ADD: 3778 err = switchdev_handle_port_obj_add_foreign(dev, ptr, 3779 dsa_user_dev_check, 3780 dsa_foreign_dev_check, 3781 dsa_user_port_obj_add); 3782 return notifier_from_errno(err); 3783 case SWITCHDEV_PORT_OBJ_DEL: 3784 err = switchdev_handle_port_obj_del_foreign(dev, ptr, 3785 dsa_user_dev_check, 3786 dsa_foreign_dev_check, 3787 dsa_user_port_obj_del); 3788 return notifier_from_errno(err); 3789 case SWITCHDEV_PORT_ATTR_SET: 3790 err = switchdev_handle_port_attr_set(dev, ptr, 3791 dsa_user_dev_check, 3792 dsa_user_port_attr_set); 3793 return notifier_from_errno(err); 3794 } 3795 3796 return NOTIFY_DONE; 3797 } 3798 3799 static struct notifier_block dsa_user_nb __read_mostly = { 3800 .notifier_call = dsa_user_netdevice_event, 3801 }; 3802 3803 struct notifier_block dsa_user_switchdev_notifier = { 3804 .notifier_call = dsa_user_switchdev_event, 3805 }; 3806 3807 struct notifier_block dsa_user_switchdev_blocking_notifier = { 3808 .notifier_call = dsa_user_switchdev_blocking_event, 3809 }; 3810 3811 int dsa_user_register_notifier(void) 3812 { 3813 struct notifier_block *nb; 3814 int err; 3815 3816 err = register_netdevice_notifier(&dsa_user_nb); 3817 if (err) 3818 return err; 3819 3820 err = register_switchdev_notifier(&dsa_user_switchdev_notifier); 3821 if (err) 3822 goto err_switchdev_nb; 3823 3824 nb = &dsa_user_switchdev_blocking_notifier; 3825 err = register_switchdev_blocking_notifier(nb); 3826 if (err) 3827 goto err_switchdev_blocking_nb; 3828 3829 return 0; 3830 3831 err_switchdev_blocking_nb: 3832 unregister_switchdev_notifier(&dsa_user_switchdev_notifier); 3833 err_switchdev_nb: 3834 unregister_netdevice_notifier(&dsa_user_nb); 3835 return err; 3836 } 3837 3838 void dsa_user_unregister_notifier(void) 3839 { 3840 struct notifier_block *nb; 3841 int err; 3842 3843 nb = &dsa_user_switchdev_blocking_notifier; 3844 err = unregister_switchdev_blocking_notifier(nb); 3845 if (err) 3846 pr_err("DSA: failed to unregister switchdev blocking notifier (%d)\n", err); 3847 3848 err = unregister_switchdev_notifier(&dsa_user_switchdev_notifier); 3849 if (err) 3850 pr_err("DSA: failed to unregister switchdev notifier (%d)\n", err); 3851 3852 err = unregister_netdevice_notifier(&dsa_user_nb); 3853 if (err) 3854 pr_err("DSA: failed to unregister user notifier (%d)\n", err); 3855 } 3856