| 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
| 2 | /* |
| 3 | * Handling of a single switch port |
| 4 | * |
| 5 | * Copyright (c) 2017 Savoir-faire Linux Inc. |
| 6 | * Vivien Didelot <vivien.didelot@savoirfairelinux.com> |
| 7 | */ |
| 8 | |
| 9 | #include <linux/if_bridge.h> |
| 10 | #include <linux/netdevice.h> |
| 11 | #include <linux/notifier.h> |
| 12 | #include <linux/of_mdio.h> |
| 13 | #include <linux/of_net.h> |
| 14 | |
| 15 | #include "dsa.h" |
| 16 | #include "port.h" |
| 17 | #include "switch.h" |
| 18 | #include "tag_8021q.h" |
| 19 | #include "user.h" |
| 20 | |
| 21 | /** |
| 22 | * dsa_port_notify - Notify the switching fabric of changes to a port |
| 23 | * @dp: port on which change occurred |
| 24 | * @e: event, must be of type DSA_NOTIFIER_* |
| 25 | * @v: event-specific value. |
| 26 | * |
| 27 | * Notify all switches in the DSA tree that this port's switch belongs to, |
| 28 | * including this switch itself, of an event. Allows the other switches to |
| 29 | * reconfigure themselves for cross-chip operations. Can also be used to |
| 30 | * reconfigure ports without net_devices (CPU ports, DSA links) whenever |
| 31 | * a user port's state changes. |
| 32 | */ |
| 33 | static int dsa_port_notify(const struct dsa_port *dp, unsigned long e, void *v) |
| 34 | { |
| 35 | return dsa_tree_notify(dp->ds->dst, e, v); |
| 36 | } |
| 37 | |
| 38 | static void dsa_port_notify_bridge_fdb_flush(const struct dsa_port *dp, u16 vid) |
| 39 | { |
| 40 | struct net_device *brport_dev = dsa_port_to_bridge_port(dp); |
| 41 | struct switchdev_notifier_fdb_info info = { |
| 42 | .vid = vid, |
| 43 | }; |
| 44 | |
| 45 | /* When the port becomes standalone it has already left the bridge. |
| 46 | * Don't notify the bridge in that case. |
| 47 | */ |
| 48 | if (!brport_dev) |
| 49 | return; |
| 50 | |
| 51 | call_switchdev_notifiers(SWITCHDEV_FDB_FLUSH_TO_BRIDGE, |
| 52 | brport_dev, &info.info, NULL); |
| 53 | } |
| 54 | |
| 55 | static void dsa_port_fast_age(const struct dsa_port *dp) |
| 56 | { |
| 57 | struct dsa_switch *ds = dp->ds; |
| 58 | |
| 59 | if (!ds->ops->port_fast_age) |
| 60 | return; |
| 61 | |
| 62 | ds->ops->port_fast_age(ds, dp->index); |
| 63 | |
| 64 | /* flush all VLANs */ |
| 65 | dsa_port_notify_bridge_fdb_flush(dp, 0); |
| 66 | } |
| 67 | |
| 68 | static int dsa_port_vlan_fast_age(const struct dsa_port *dp, u16 vid) |
| 69 | { |
| 70 | struct dsa_switch *ds = dp->ds; |
| 71 | int err; |
| 72 | |
| 73 | if (!ds->ops->port_vlan_fast_age) |
| 74 | return -EOPNOTSUPP; |
| 75 | |
| 76 | err = ds->ops->port_vlan_fast_age(ds, dp->index, vid); |
| 77 | |
| 78 | if (!err) |
| 79 | dsa_port_notify_bridge_fdb_flush(dp, vid); |
| 80 | |
| 81 | return err; |
| 82 | } |
| 83 | |
| 84 | static int dsa_port_msti_fast_age(const struct dsa_port *dp, u16 msti) |
| 85 | { |
| 86 | DECLARE_BITMAP(vids, VLAN_N_VID) = { 0 }; |
| 87 | int err, vid; |
| 88 | |
| 89 | err = br_mst_get_info(dsa_port_bridge_dev_get(dp), msti, vids); |
| 90 | if (err) |
| 91 | return err; |
| 92 | |
| 93 | for_each_set_bit(vid, vids, VLAN_N_VID) { |
| 94 | err = dsa_port_vlan_fast_age(dp, vid); |
| 95 | if (err) |
| 96 | return err; |
| 97 | } |
| 98 | |
| 99 | return 0; |
| 100 | } |
| 101 | |
| 102 | static bool dsa_port_can_configure_learning(struct dsa_port *dp) |
| 103 | { |
| 104 | struct switchdev_brport_flags flags = { |
| 105 | .mask = BR_LEARNING, |
| 106 | }; |
| 107 | struct dsa_switch *ds = dp->ds; |
| 108 | int err; |
| 109 | |
| 110 | if (!ds->ops->port_bridge_flags || !ds->ops->port_pre_bridge_flags) |
| 111 | return false; |
| 112 | |
| 113 | err = ds->ops->port_pre_bridge_flags(ds, dp->index, flags, NULL); |
| 114 | return !err; |
| 115 | } |
| 116 | |
| 117 | bool dsa_port_supports_hwtstamp(struct dsa_port *dp) |
| 118 | { |
| 119 | struct kernel_hwtstamp_config config = {}; |
| 120 | struct dsa_switch *ds = dp->ds; |
| 121 | int err; |
| 122 | |
| 123 | if (!ds->ops->port_hwtstamp_get || !ds->ops->port_hwtstamp_set) |
| 124 | return false; |
| 125 | |
| 126 | /* "See through" shim implementations of the "get" method. */ |
| 127 | err = ds->ops->port_hwtstamp_get(ds, dp->index, &config); |
| 128 | return err != -EOPNOTSUPP; |
| 129 | } |
| 130 | |
| 131 | int dsa_port_set_state(struct dsa_port *dp, u8 state, bool do_fast_age) |
| 132 | { |
| 133 | struct dsa_switch *ds = dp->ds; |
| 134 | int port = dp->index; |
| 135 | |
| 136 | if (!ds->ops->port_stp_state_set) |
| 137 | return -EOPNOTSUPP; |
| 138 | |
| 139 | ds->ops->port_stp_state_set(ds, port, state); |
| 140 | |
| 141 | if (!dsa_port_can_configure_learning(dp) || |
| 142 | (do_fast_age && dp->learning)) { |
| 143 | /* Fast age FDB entries or flush appropriate forwarding database |
| 144 | * for the given port, if we are moving it from Learning or |
| 145 | * Forwarding state, to Disabled or Blocking or Listening state. |
| 146 | * Ports that were standalone before the STP state change don't |
| 147 | * need to fast age the FDB, since address learning is off in |
| 148 | * standalone mode. |
| 149 | */ |
| 150 | |
| 151 | if ((dp->stp_state == BR_STATE_LEARNING || |
| 152 | dp->stp_state == BR_STATE_FORWARDING) && |
| 153 | (state == BR_STATE_DISABLED || |
| 154 | state == BR_STATE_BLOCKING || |
| 155 | state == BR_STATE_LISTENING)) |
| 156 | dsa_port_fast_age(dp); |
| 157 | } |
| 158 | |
| 159 | dp->stp_state = state; |
| 160 | |
| 161 | return 0; |
| 162 | } |
| 163 | |
| 164 | static void dsa_port_set_state_now(struct dsa_port *dp, u8 state, |
| 165 | bool do_fast_age) |
| 166 | { |
| 167 | struct dsa_switch *ds = dp->ds; |
| 168 | int err; |
| 169 | |
| 170 | err = dsa_port_set_state(dp, state, do_fast_age); |
| 171 | if (err && err != -EOPNOTSUPP) { |
| 172 | dev_err(ds->dev, "port %d failed to set STP state %u: %pe\n", |
| 173 | dp->index, state, ERR_PTR(err)); |
| 174 | } |
| 175 | } |
| 176 | |
| 177 | int dsa_port_set_mst_state(struct dsa_port *dp, |
| 178 | const struct switchdev_mst_state *state, |
| 179 | struct netlink_ext_ack *extack) |
| 180 | { |
| 181 | struct dsa_switch *ds = dp->ds; |
| 182 | u8 prev_state; |
| 183 | int err; |
| 184 | |
| 185 | if (!ds->ops->port_mst_state_set) |
| 186 | return -EOPNOTSUPP; |
| 187 | |
| 188 | err = br_mst_get_state(dsa_port_to_bridge_port(dp), state->msti, |
| 189 | &prev_state); |
| 190 | if (err) |
| 191 | return err; |
| 192 | |
| 193 | err = ds->ops->port_mst_state_set(ds, dp->index, state); |
| 194 | if (err) |
| 195 | return err; |
| 196 | |
| 197 | if (!(dp->learning && |
| 198 | (prev_state == BR_STATE_LEARNING || |
| 199 | prev_state == BR_STATE_FORWARDING) && |
| 200 | (state->state == BR_STATE_DISABLED || |
| 201 | state->state == BR_STATE_BLOCKING || |
| 202 | state->state == BR_STATE_LISTENING))) |
| 203 | return 0; |
| 204 | |
| 205 | err = dsa_port_msti_fast_age(dp, state->msti); |
| 206 | if (err) |
| 207 | NL_SET_ERR_MSG_MOD(extack, |
| 208 | "Unable to flush associated VLANs"); |
| 209 | |
| 210 | return 0; |
| 211 | } |
| 212 | |
| 213 | int dsa_port_enable_rt(struct dsa_port *dp, struct phy_device *phy) |
| 214 | { |
| 215 | struct dsa_switch *ds = dp->ds; |
| 216 | int port = dp->index; |
| 217 | int err; |
| 218 | |
| 219 | if (ds->ops->port_enable) { |
| 220 | err = ds->ops->port_enable(ds, port, phy); |
| 221 | if (err) |
| 222 | return err; |
| 223 | } |
| 224 | |
| 225 | if (!dp->bridge) |
| 226 | dsa_port_set_state_now(dp, BR_STATE_FORWARDING, false); |
| 227 | |
| 228 | if (dp->pl) |
| 229 | phylink_start(dp->pl); |
| 230 | |
| 231 | return 0; |
| 232 | } |
| 233 | |
| 234 | int dsa_port_enable(struct dsa_port *dp, struct phy_device *phy) |
| 235 | { |
| 236 | int err; |
| 237 | |
| 238 | rtnl_lock(); |
| 239 | err = dsa_port_enable_rt(dp, phy); |
| 240 | rtnl_unlock(); |
| 241 | |
| 242 | return err; |
| 243 | } |
| 244 | |
| 245 | void dsa_port_disable_rt(struct dsa_port *dp) |
| 246 | { |
| 247 | struct dsa_switch *ds = dp->ds; |
| 248 | int port = dp->index; |
| 249 | |
| 250 | if (dp->pl) |
| 251 | phylink_stop(dp->pl); |
| 252 | |
| 253 | if (!dp->bridge) |
| 254 | dsa_port_set_state_now(dp, BR_STATE_DISABLED, false); |
| 255 | |
| 256 | if (ds->ops->port_disable) |
| 257 | ds->ops->port_disable(ds, port); |
| 258 | } |
| 259 | |
| 260 | void dsa_port_disable(struct dsa_port *dp) |
| 261 | { |
| 262 | rtnl_lock(); |
| 263 | dsa_port_disable_rt(dp); |
| 264 | rtnl_unlock(); |
| 265 | } |
| 266 | |
| 267 | static void dsa_port_reset_vlan_filtering(struct dsa_port *dp, |
| 268 | struct dsa_bridge bridge) |
| 269 | { |
| 270 | struct netlink_ext_ack extack = {0}; |
| 271 | bool change_vlan_filtering = false; |
| 272 | struct dsa_switch *ds = dp->ds; |
| 273 | struct dsa_port *other_dp; |
| 274 | bool vlan_filtering; |
| 275 | int err; |
| 276 | |
| 277 | if (ds->needs_standalone_vlan_filtering && |
| 278 | !br_vlan_enabled(bridge.dev)) { |
| 279 | change_vlan_filtering = true; |
| 280 | vlan_filtering = true; |
| 281 | } else if (!ds->needs_standalone_vlan_filtering && |
| 282 | br_vlan_enabled(bridge.dev)) { |
| 283 | change_vlan_filtering = true; |
| 284 | vlan_filtering = false; |
| 285 | } |
| 286 | |
| 287 | /* If the bridge was vlan_filtering, the bridge core doesn't trigger an |
| 288 | * event for changing vlan_filtering setting upon user ports leaving |
| 289 | * it. That is a good thing, because that lets us handle it and also |
| 290 | * handle the case where the switch's vlan_filtering setting is global |
| 291 | * (not per port). When that happens, the correct moment to trigger the |
| 292 | * vlan_filtering callback is only when the last port leaves the last |
| 293 | * VLAN-aware bridge. |
| 294 | */ |
| 295 | if (change_vlan_filtering && ds->vlan_filtering_is_global) { |
| 296 | dsa_switch_for_each_port(other_dp, ds) { |
| 297 | struct net_device *br = dsa_port_bridge_dev_get(other_dp); |
| 298 | |
| 299 | if (br && br_vlan_enabled(br)) { |
| 300 | change_vlan_filtering = false; |
| 301 | break; |
| 302 | } |
| 303 | } |
| 304 | } |
| 305 | |
| 306 | if (!change_vlan_filtering) |
| 307 | return; |
| 308 | |
| 309 | err = dsa_port_vlan_filtering(dp, vlan_filtering, &extack); |
| 310 | if (extack._msg) { |
| 311 | dev_err(ds->dev, "port %d: %s\n", dp->index, |
| 312 | extack._msg); |
| 313 | } |
| 314 | if (err && err != -EOPNOTSUPP) { |
| 315 | dev_err(ds->dev, |
| 316 | "port %d failed to reset VLAN filtering to %d: %pe\n", |
| 317 | dp->index, vlan_filtering, ERR_PTR(err)); |
| 318 | } |
| 319 | } |
| 320 | |
| 321 | static int dsa_port_inherit_brport_flags(struct dsa_port *dp, |
| 322 | struct netlink_ext_ack *extack) |
| 323 | { |
| 324 | const unsigned long mask = BR_LEARNING | BR_FLOOD | BR_MCAST_FLOOD | |
| 325 | BR_BCAST_FLOOD | BR_PORT_LOCKED; |
| 326 | struct net_device *brport_dev = dsa_port_to_bridge_port(dp); |
| 327 | int flag, err; |
| 328 | |
| 329 | for_each_set_bit(flag, &mask, 32) { |
| 330 | struct switchdev_brport_flags flags = {0}; |
| 331 | |
| 332 | flags.mask = BIT(flag); |
| 333 | |
| 334 | if (br_port_flag_is_set(brport_dev, BIT(flag))) |
| 335 | flags.val = BIT(flag); |
| 336 | |
| 337 | err = dsa_port_bridge_flags(dp, flags, extack); |
| 338 | if (err && err != -EOPNOTSUPP) |
| 339 | return err; |
| 340 | } |
| 341 | |
| 342 | return 0; |
| 343 | } |
| 344 | |
| 345 | static void dsa_port_clear_brport_flags(struct dsa_port *dp) |
| 346 | { |
| 347 | const unsigned long val = BR_FLOOD | BR_MCAST_FLOOD | BR_BCAST_FLOOD; |
| 348 | const unsigned long mask = BR_LEARNING | BR_FLOOD | BR_MCAST_FLOOD | |
| 349 | BR_BCAST_FLOOD | BR_PORT_LOCKED; |
| 350 | int flag, err; |
| 351 | |
| 352 | for_each_set_bit(flag, &mask, 32) { |
| 353 | struct switchdev_brport_flags flags = {0}; |
| 354 | |
| 355 | flags.mask = BIT(flag); |
| 356 | flags.val = val & BIT(flag); |
| 357 | |
| 358 | err = dsa_port_bridge_flags(dp, flags, NULL); |
| 359 | if (err && err != -EOPNOTSUPP) |
| 360 | dev_err(dp->ds->dev, |
| 361 | "failed to clear bridge port flag %lu: %pe\n", |
| 362 | flags.val, ERR_PTR(err)); |
| 363 | } |
| 364 | } |
| 365 | |
| 366 | static int dsa_port_switchdev_sync_attrs(struct dsa_port *dp, |
| 367 | struct netlink_ext_ack *extack) |
| 368 | { |
| 369 | struct net_device *brport_dev = dsa_port_to_bridge_port(dp); |
| 370 | struct net_device *br = dsa_port_bridge_dev_get(dp); |
| 371 | int err; |
| 372 | |
| 373 | err = dsa_port_inherit_brport_flags(dp, extack); |
| 374 | if (err) |
| 375 | return err; |
| 376 | |
| 377 | err = dsa_port_set_state(dp, br_port_get_stp_state(brport_dev), false); |
| 378 | if (err && err != -EOPNOTSUPP) |
| 379 | return err; |
| 380 | |
| 381 | err = dsa_port_vlan_filtering(dp, br_vlan_enabled(br), extack); |
| 382 | if (err && err != -EOPNOTSUPP) |
| 383 | return err; |
| 384 | |
| 385 | err = dsa_port_ageing_time(dp, br_get_ageing_time(br)); |
| 386 | if (err && err != -EOPNOTSUPP) |
| 387 | return err; |
| 388 | |
| 389 | return 0; |
| 390 | } |
| 391 | |
| 392 | static void dsa_port_switchdev_unsync_attrs(struct dsa_port *dp, |
| 393 | struct dsa_bridge bridge) |
| 394 | { |
| 395 | /* Configure the port for standalone mode (no address learning, |
| 396 | * flood everything). |
| 397 | * The bridge only emits SWITCHDEV_ATTR_ID_PORT_BRIDGE_FLAGS events |
| 398 | * when the user requests it through netlink or sysfs, but not |
| 399 | * automatically at port join or leave, so we need to handle resetting |
| 400 | * the brport flags ourselves. But we even prefer it that way, because |
| 401 | * otherwise, some setups might never get the notification they need, |
| 402 | * for example, when a port leaves a LAG that offloads the bridge, |
| 403 | * it becomes standalone, but as far as the bridge is concerned, no |
| 404 | * port ever left. |
| 405 | */ |
| 406 | dsa_port_clear_brport_flags(dp); |
| 407 | |
| 408 | /* Port left the bridge, put in BR_STATE_DISABLED by the bridge layer, |
| 409 | * so allow it to be in BR_STATE_FORWARDING to be kept functional |
| 410 | */ |
| 411 | dsa_port_set_state_now(dp, BR_STATE_FORWARDING, true); |
| 412 | |
| 413 | dsa_port_reset_vlan_filtering(dp, bridge); |
| 414 | |
| 415 | /* Ageing time may be global to the switch chip, so don't change it |
| 416 | * here because we have no good reason (or value) to change it to. |
| 417 | */ |
| 418 | } |
| 419 | |
| 420 | static int dsa_port_bridge_create(struct dsa_port *dp, |
| 421 | struct net_device *br, |
| 422 | struct netlink_ext_ack *extack) |
| 423 | { |
| 424 | struct dsa_switch *ds = dp->ds; |
| 425 | struct dsa_bridge *bridge; |
| 426 | |
| 427 | bridge = dsa_tree_bridge_find(ds->dst, br); |
| 428 | if (bridge) { |
| 429 | refcount_inc(&bridge->refcount); |
| 430 | dp->bridge = bridge; |
| 431 | return 0; |
| 432 | } |
| 433 | |
| 434 | bridge = kzalloc(sizeof(*bridge), GFP_KERNEL); |
| 435 | if (!bridge) |
| 436 | return -ENOMEM; |
| 437 | |
| 438 | refcount_set(&bridge->refcount, 1); |
| 439 | |
| 440 | bridge->dev = br; |
| 441 | |
| 442 | bridge->num = dsa_bridge_num_get(br, ds->max_num_bridges); |
| 443 | if (ds->max_num_bridges && !bridge->num) { |
| 444 | NL_SET_ERR_MSG_MOD(extack, |
| 445 | "Range of offloadable bridges exceeded"); |
| 446 | kfree(bridge); |
| 447 | return -EOPNOTSUPP; |
| 448 | } |
| 449 | |
| 450 | dp->bridge = bridge; |
| 451 | |
| 452 | return 0; |
| 453 | } |
| 454 | |
| 455 | static void dsa_port_bridge_destroy(struct dsa_port *dp, |
| 456 | const struct net_device *br) |
| 457 | { |
| 458 | struct dsa_bridge *bridge = dp->bridge; |
| 459 | |
| 460 | dp->bridge = NULL; |
| 461 | |
| 462 | if (!refcount_dec_and_test(&bridge->refcount)) |
| 463 | return; |
| 464 | |
| 465 | if (bridge->num) |
| 466 | dsa_bridge_num_put(br, bridge->num); |
| 467 | |
| 468 | kfree(bridge); |
| 469 | } |
| 470 | |
| 471 | static bool dsa_port_supports_mst(struct dsa_port *dp) |
| 472 | { |
| 473 | struct dsa_switch *ds = dp->ds; |
| 474 | |
| 475 | return ds->ops->vlan_msti_set && |
| 476 | ds->ops->port_mst_state_set && |
| 477 | ds->ops->port_vlan_fast_age && |
| 478 | dsa_port_can_configure_learning(dp); |
| 479 | } |
| 480 | |
| 481 | int dsa_port_bridge_join(struct dsa_port *dp, struct net_device *br, |
| 482 | struct netlink_ext_ack *extack) |
| 483 | { |
| 484 | struct dsa_notifier_bridge_info info = { |
| 485 | .dp = dp, |
| 486 | .extack = extack, |
| 487 | }; |
| 488 | struct net_device *dev = dp->user; |
| 489 | struct net_device *brport_dev; |
| 490 | int err; |
| 491 | |
| 492 | if (br_mst_enabled(br) && !dsa_port_supports_mst(dp)) |
| 493 | return -EOPNOTSUPP; |
| 494 | |
| 495 | /* Here the interface is already bridged. Reflect the current |
| 496 | * configuration so that drivers can program their chips accordingly. |
| 497 | */ |
| 498 | err = dsa_port_bridge_create(dp, br, extack); |
| 499 | if (err) |
| 500 | return err; |
| 501 | |
| 502 | brport_dev = dsa_port_to_bridge_port(dp); |
| 503 | |
| 504 | info.bridge = *dp->bridge; |
| 505 | err = dsa_broadcast(DSA_NOTIFIER_BRIDGE_JOIN, &info); |
| 506 | if (err) |
| 507 | goto out_rollback; |
| 508 | |
| 509 | /* Drivers which support bridge TX forwarding should set this */ |
| 510 | dp->bridge->tx_fwd_offload = info.tx_fwd_offload; |
| 511 | |
| 512 | err = switchdev_bridge_port_offload(brport_dev, dev, dp, |
| 513 | &dsa_user_switchdev_notifier, |
| 514 | &dsa_user_switchdev_blocking_notifier, |
| 515 | dp->bridge->tx_fwd_offload, extack); |
| 516 | if (err) |
| 517 | goto out_rollback_unbridge; |
| 518 | |
| 519 | err = dsa_port_switchdev_sync_attrs(dp, extack); |
| 520 | if (err) |
| 521 | goto out_rollback_unoffload; |
| 522 | |
| 523 | return 0; |
| 524 | |
| 525 | out_rollback_unoffload: |
| 526 | switchdev_bridge_port_unoffload(brport_dev, dp, |
| 527 | &dsa_user_switchdev_notifier, |
| 528 | &dsa_user_switchdev_blocking_notifier); |
| 529 | dsa_flush_workqueue(); |
| 530 | out_rollback_unbridge: |
| 531 | dsa_broadcast(DSA_NOTIFIER_BRIDGE_LEAVE, &info); |
| 532 | out_rollback: |
| 533 | dsa_port_bridge_destroy(dp, br); |
| 534 | return err; |
| 535 | } |
| 536 | |
| 537 | void dsa_port_pre_bridge_leave(struct dsa_port *dp, struct net_device *br) |
| 538 | { |
| 539 | struct net_device *brport_dev = dsa_port_to_bridge_port(dp); |
| 540 | |
| 541 | /* Don't try to unoffload something that is not offloaded */ |
| 542 | if (!brport_dev) |
| 543 | return; |
| 544 | |
| 545 | switchdev_bridge_port_unoffload(brport_dev, dp, |
| 546 | &dsa_user_switchdev_notifier, |
| 547 | &dsa_user_switchdev_blocking_notifier); |
| 548 | |
| 549 | dsa_flush_workqueue(); |
| 550 | } |
| 551 | |
| 552 | void dsa_port_bridge_leave(struct dsa_port *dp, struct net_device *br) |
| 553 | { |
| 554 | struct dsa_notifier_bridge_info info = { |
| 555 | .dp = dp, |
| 556 | }; |
| 557 | int err; |
| 558 | |
| 559 | /* If the port could not be offloaded to begin with, then |
| 560 | * there is nothing to do. |
| 561 | */ |
| 562 | if (!dp->bridge) |
| 563 | return; |
| 564 | |
| 565 | info.bridge = *dp->bridge; |
| 566 | |
| 567 | /* Here the port is already unbridged. Reflect the current configuration |
| 568 | * so that drivers can program their chips accordingly. |
| 569 | */ |
| 570 | dsa_port_bridge_destroy(dp, br); |
| 571 | |
| 572 | err = dsa_broadcast(DSA_NOTIFIER_BRIDGE_LEAVE, &info); |
| 573 | if (err) |
| 574 | dev_err(dp->ds->dev, |
| 575 | "port %d failed to notify DSA_NOTIFIER_BRIDGE_LEAVE: %pe\n", |
| 576 | dp->index, ERR_PTR(err)); |
| 577 | |
| 578 | dsa_port_switchdev_unsync_attrs(dp, info.bridge); |
| 579 | } |
| 580 | |
| 581 | int dsa_port_lag_change(struct dsa_port *dp, |
| 582 | struct netdev_lag_lower_state_info *linfo) |
| 583 | { |
| 584 | struct dsa_notifier_lag_info info = { |
| 585 | .dp = dp, |
| 586 | }; |
| 587 | bool tx_enabled; |
| 588 | |
| 589 | if (!dp->lag) |
| 590 | return 0; |
| 591 | |
| 592 | /* On statically configured aggregates (e.g. loadbalance |
| 593 | * without LACP) ports will always be tx_enabled, even if the |
| 594 | * link is down. Thus we require both link_up and tx_enabled |
| 595 | * in order to include it in the tx set. |
| 596 | */ |
| 597 | tx_enabled = linfo->link_up && linfo->tx_enabled; |
| 598 | |
| 599 | if (tx_enabled == dp->lag_tx_enabled) |
| 600 | return 0; |
| 601 | |
| 602 | dp->lag_tx_enabled = tx_enabled; |
| 603 | |
| 604 | return dsa_port_notify(dp, DSA_NOTIFIER_LAG_CHANGE, &info); |
| 605 | } |
| 606 | |
| 607 | static int dsa_port_lag_create(struct dsa_port *dp, |
| 608 | struct net_device *lag_dev) |
| 609 | { |
| 610 | struct dsa_switch *ds = dp->ds; |
| 611 | struct dsa_lag *lag; |
| 612 | |
| 613 | lag = dsa_tree_lag_find(ds->dst, lag_dev); |
| 614 | if (lag) { |
| 615 | refcount_inc(&lag->refcount); |
| 616 | dp->lag = lag; |
| 617 | return 0; |
| 618 | } |
| 619 | |
| 620 | lag = kzalloc(sizeof(*lag), GFP_KERNEL); |
| 621 | if (!lag) |
| 622 | return -ENOMEM; |
| 623 | |
| 624 | refcount_set(&lag->refcount, 1); |
| 625 | mutex_init(&lag->fdb_lock); |
| 626 | INIT_LIST_HEAD(&lag->fdbs); |
| 627 | lag->dev = lag_dev; |
| 628 | dsa_lag_map(ds->dst, lag); |
| 629 | dp->lag = lag; |
| 630 | |
| 631 | return 0; |
| 632 | } |
| 633 | |
| 634 | static void dsa_port_lag_destroy(struct dsa_port *dp) |
| 635 | { |
| 636 | struct dsa_lag *lag = dp->lag; |
| 637 | |
| 638 | dp->lag = NULL; |
| 639 | dp->lag_tx_enabled = false; |
| 640 | |
| 641 | if (!refcount_dec_and_test(&lag->refcount)) |
| 642 | return; |
| 643 | |
| 644 | WARN_ON(!list_empty(&lag->fdbs)); |
| 645 | dsa_lag_unmap(dp->ds->dst, lag); |
| 646 | kfree(lag); |
| 647 | } |
| 648 | |
| 649 | int dsa_port_lag_join(struct dsa_port *dp, struct net_device *lag_dev, |
| 650 | struct netdev_lag_upper_info *uinfo, |
| 651 | struct netlink_ext_ack *extack) |
| 652 | { |
| 653 | struct dsa_notifier_lag_info info = { |
| 654 | .dp = dp, |
| 655 | .info = uinfo, |
| 656 | .extack = extack, |
| 657 | }; |
| 658 | struct net_device *bridge_dev; |
| 659 | int err; |
| 660 | |
| 661 | err = dsa_port_lag_create(dp, lag_dev); |
| 662 | if (err) |
| 663 | goto err_lag_create; |
| 664 | |
| 665 | info.lag = *dp->lag; |
| 666 | err = dsa_port_notify(dp, DSA_NOTIFIER_LAG_JOIN, &info); |
| 667 | if (err) |
| 668 | goto err_lag_join; |
| 669 | |
| 670 | bridge_dev = netdev_master_upper_dev_get(lag_dev); |
| 671 | if (!bridge_dev || !netif_is_bridge_master(bridge_dev)) |
| 672 | return 0; |
| 673 | |
| 674 | err = dsa_port_bridge_join(dp, bridge_dev, extack); |
| 675 | if (err) |
| 676 | goto err_bridge_join; |
| 677 | |
| 678 | return 0; |
| 679 | |
| 680 | err_bridge_join: |
| 681 | dsa_port_notify(dp, DSA_NOTIFIER_LAG_LEAVE, &info); |
| 682 | err_lag_join: |
| 683 | dsa_port_lag_destroy(dp); |
| 684 | err_lag_create: |
| 685 | return err; |
| 686 | } |
| 687 | |
| 688 | void dsa_port_pre_lag_leave(struct dsa_port *dp, struct net_device *lag_dev) |
| 689 | { |
| 690 | struct net_device *br = dsa_port_bridge_dev_get(dp); |
| 691 | |
| 692 | if (br) |
| 693 | dsa_port_pre_bridge_leave(dp, br); |
| 694 | } |
| 695 | |
| 696 | void dsa_port_lag_leave(struct dsa_port *dp, struct net_device *lag_dev) |
| 697 | { |
| 698 | struct net_device *br = dsa_port_bridge_dev_get(dp); |
| 699 | struct dsa_notifier_lag_info info = { |
| 700 | .dp = dp, |
| 701 | }; |
| 702 | int err; |
| 703 | |
| 704 | if (!dp->lag) |
| 705 | return; |
| 706 | |
| 707 | /* Port might have been part of a LAG that in turn was |
| 708 | * attached to a bridge. |
| 709 | */ |
| 710 | if (br) |
| 711 | dsa_port_bridge_leave(dp, br); |
| 712 | |
| 713 | info.lag = *dp->lag; |
| 714 | |
| 715 | dsa_port_lag_destroy(dp); |
| 716 | |
| 717 | err = dsa_port_notify(dp, DSA_NOTIFIER_LAG_LEAVE, &info); |
| 718 | if (err) |
| 719 | dev_err(dp->ds->dev, |
| 720 | "port %d failed to notify DSA_NOTIFIER_LAG_LEAVE: %pe\n", |
| 721 | dp->index, ERR_PTR(err)); |
| 722 | } |
| 723 | |
| 724 | /* Must be called under rcu_read_lock() */ |
| 725 | static bool dsa_port_can_apply_vlan_filtering(struct dsa_port *dp, |
| 726 | bool vlan_filtering, |
| 727 | struct netlink_ext_ack *extack) |
| 728 | { |
| 729 | struct dsa_switch *ds = dp->ds; |
| 730 | struct dsa_port *other_dp; |
| 731 | int err; |
| 732 | |
| 733 | /* VLAN awareness was off, so the question is "can we turn it on". |
| 734 | * We may have had 8021q uppers, those need to go. Make sure we don't |
| 735 | * enter an inconsistent state: deny changing the VLAN awareness state |
| 736 | * as long as we have 8021q uppers. |
| 737 | */ |
| 738 | if (vlan_filtering && dsa_port_is_user(dp)) { |
| 739 | struct net_device *br = dsa_port_bridge_dev_get(dp); |
| 740 | struct net_device *upper_dev, *user = dp->user; |
| 741 | struct list_head *iter; |
| 742 | |
| 743 | netdev_for_each_upper_dev_rcu(user, upper_dev, iter) { |
| 744 | struct bridge_vlan_info br_info; |
| 745 | u16 vid; |
| 746 | |
| 747 | if (!is_vlan_dev(upper_dev)) |
| 748 | continue; |
| 749 | |
| 750 | vid = vlan_dev_vlan_id(upper_dev); |
| 751 | |
| 752 | /* br_vlan_get_info() returns -EINVAL or -ENOENT if the |
| 753 | * device, respectively the VID is not found, returning |
| 754 | * 0 means success, which is a failure for us here. |
| 755 | */ |
| 756 | err = br_vlan_get_info(br, vid, &br_info); |
| 757 | if (err == 0) { |
| 758 | NL_SET_ERR_MSG_MOD(extack, |
| 759 | "Must first remove VLAN uppers having VIDs also present in bridge"); |
| 760 | return false; |
| 761 | } |
| 762 | } |
| 763 | } |
| 764 | |
| 765 | if (!ds->vlan_filtering_is_global) |
| 766 | return true; |
| 767 | |
| 768 | /* For cases where enabling/disabling VLAN awareness is global to the |
| 769 | * switch, we need to handle the case where multiple bridges span |
| 770 | * different ports of the same switch device and one of them has a |
| 771 | * different setting than what is being requested. |
| 772 | */ |
| 773 | dsa_switch_for_each_port(other_dp, ds) { |
| 774 | struct net_device *other_br = dsa_port_bridge_dev_get(other_dp); |
| 775 | |
| 776 | /* If it's the same bridge, it also has same |
| 777 | * vlan_filtering setting => no need to check |
| 778 | */ |
| 779 | if (!other_br || other_br == dsa_port_bridge_dev_get(dp)) |
| 780 | continue; |
| 781 | |
| 782 | if (br_vlan_enabled(other_br) != vlan_filtering) { |
| 783 | NL_SET_ERR_MSG_MOD(extack, |
| 784 | "VLAN filtering is a global setting"); |
| 785 | return false; |
| 786 | } |
| 787 | } |
| 788 | return true; |
| 789 | } |
| 790 | |
| 791 | int dsa_port_vlan_filtering(struct dsa_port *dp, bool vlan_filtering, |
| 792 | struct netlink_ext_ack *extack) |
| 793 | { |
| 794 | bool old_vlan_filtering = dsa_port_is_vlan_filtering(dp); |
| 795 | struct dsa_switch *ds = dp->ds; |
| 796 | bool apply; |
| 797 | int err; |
| 798 | |
| 799 | if (!ds->ops->port_vlan_filtering) |
| 800 | return -EOPNOTSUPP; |
| 801 | |
| 802 | /* We are called from dsa_user_switchdev_blocking_event(), |
| 803 | * which is not under rcu_read_lock(), unlike |
| 804 | * dsa_user_switchdev_event(). |
| 805 | */ |
| 806 | rcu_read_lock(); |
| 807 | apply = dsa_port_can_apply_vlan_filtering(dp, vlan_filtering, extack); |
| 808 | rcu_read_unlock(); |
| 809 | if (!apply) |
| 810 | return -EINVAL; |
| 811 | |
| 812 | if (dsa_port_is_vlan_filtering(dp) == vlan_filtering) |
| 813 | return 0; |
| 814 | |
| 815 | err = ds->ops->port_vlan_filtering(ds, dp->index, vlan_filtering, |
| 816 | extack); |
| 817 | if (err) |
| 818 | return err; |
| 819 | |
| 820 | if (ds->vlan_filtering_is_global) { |
| 821 | struct dsa_port *other_dp; |
| 822 | |
| 823 | ds->vlan_filtering = vlan_filtering; |
| 824 | |
| 825 | dsa_switch_for_each_user_port(other_dp, ds) { |
| 826 | struct net_device *user = other_dp->user; |
| 827 | |
| 828 | /* We might be called in the unbind path, so not |
| 829 | * all user devices might still be registered. |
| 830 | */ |
| 831 | if (!user) |
| 832 | continue; |
| 833 | |
| 834 | err = dsa_user_manage_vlan_filtering(user, |
| 835 | vlan_filtering); |
| 836 | if (err) |
| 837 | goto restore; |
| 838 | } |
| 839 | } else { |
| 840 | dp->vlan_filtering = vlan_filtering; |
| 841 | |
| 842 | err = dsa_user_manage_vlan_filtering(dp->user, |
| 843 | vlan_filtering); |
| 844 | if (err) |
| 845 | goto restore; |
| 846 | } |
| 847 | |
| 848 | return 0; |
| 849 | |
| 850 | restore: |
| 851 | ds->ops->port_vlan_filtering(ds, dp->index, old_vlan_filtering, NULL); |
| 852 | |
| 853 | if (ds->vlan_filtering_is_global) |
| 854 | ds->vlan_filtering = old_vlan_filtering; |
| 855 | else |
| 856 | dp->vlan_filtering = old_vlan_filtering; |
| 857 | |
| 858 | return err; |
| 859 | } |
| 860 | |
| 861 | /* This enforces legacy behavior for switch drivers which assume they can't |
| 862 | * receive VLAN configuration when joining a bridge with vlan_filtering=0 |
| 863 | */ |
| 864 | bool dsa_port_skip_vlan_configuration(struct dsa_port *dp) |
| 865 | { |
| 866 | struct net_device *br = dsa_port_bridge_dev_get(dp); |
| 867 | struct dsa_switch *ds = dp->ds; |
| 868 | |
| 869 | if (!br) |
| 870 | return false; |
| 871 | |
| 872 | return !ds->configure_vlan_while_not_filtering && !br_vlan_enabled(br); |
| 873 | } |
| 874 | |
| 875 | int dsa_port_ageing_time(struct dsa_port *dp, clock_t ageing_clock) |
| 876 | { |
| 877 | unsigned long ageing_jiffies = clock_t_to_jiffies(ageing_clock); |
| 878 | unsigned int ageing_time = jiffies_to_msecs(ageing_jiffies); |
| 879 | struct dsa_notifier_ageing_time_info info; |
| 880 | int err; |
| 881 | |
| 882 | info.ageing_time = ageing_time; |
| 883 | |
| 884 | err = dsa_port_notify(dp, DSA_NOTIFIER_AGEING_TIME, &info); |
| 885 | if (err) |
| 886 | return err; |
| 887 | |
| 888 | dp->ageing_time = ageing_time; |
| 889 | |
| 890 | return 0; |
| 891 | } |
| 892 | |
| 893 | int dsa_port_mst_enable(struct dsa_port *dp, bool on, |
| 894 | struct netlink_ext_ack *extack) |
| 895 | { |
| 896 | if (on && !dsa_port_supports_mst(dp)) { |
| 897 | NL_SET_ERR_MSG_MOD(extack, "Hardware does not support MST"); |
| 898 | return -EINVAL; |
| 899 | } |
| 900 | |
| 901 | return 0; |
| 902 | } |
| 903 | |
| 904 | int dsa_port_pre_bridge_flags(const struct dsa_port *dp, |
| 905 | struct switchdev_brport_flags flags, |
| 906 | struct netlink_ext_ack *extack) |
| 907 | { |
| 908 | struct dsa_switch *ds = dp->ds; |
| 909 | |
| 910 | if (!ds->ops->port_pre_bridge_flags) |
| 911 | return -EINVAL; |
| 912 | |
| 913 | return ds->ops->port_pre_bridge_flags(ds, dp->index, flags, extack); |
| 914 | } |
| 915 | |
| 916 | int dsa_port_bridge_flags(struct dsa_port *dp, |
| 917 | struct switchdev_brport_flags flags, |
| 918 | struct netlink_ext_ack *extack) |
| 919 | { |
| 920 | struct dsa_switch *ds = dp->ds; |
| 921 | int err; |
| 922 | |
| 923 | if (!ds->ops->port_bridge_flags) |
| 924 | return -EOPNOTSUPP; |
| 925 | |
| 926 | err = ds->ops->port_bridge_flags(ds, dp->index, flags, extack); |
| 927 | if (err) |
| 928 | return err; |
| 929 | |
| 930 | if (flags.mask & BR_LEARNING) { |
| 931 | bool learning = flags.val & BR_LEARNING; |
| 932 | |
| 933 | if (learning == dp->learning) |
| 934 | return 0; |
| 935 | |
| 936 | if ((dp->learning && !learning) && |
| 937 | (dp->stp_state == BR_STATE_LEARNING || |
| 938 | dp->stp_state == BR_STATE_FORWARDING)) |
| 939 | dsa_port_fast_age(dp); |
| 940 | |
| 941 | dp->learning = learning; |
| 942 | } |
| 943 | |
| 944 | return 0; |
| 945 | } |
| 946 | |
| 947 | void dsa_port_set_host_flood(struct dsa_port *dp, bool uc, bool mc) |
| 948 | { |
| 949 | struct dsa_switch *ds = dp->ds; |
| 950 | |
| 951 | if (ds->ops->port_set_host_flood) |
| 952 | ds->ops->port_set_host_flood(ds, dp->index, uc, mc); |
| 953 | } |
| 954 | |
| 955 | int dsa_port_vlan_msti(struct dsa_port *dp, |
| 956 | const struct switchdev_vlan_msti *msti) |
| 957 | { |
| 958 | struct dsa_switch *ds = dp->ds; |
| 959 | |
| 960 | if (!ds->ops->vlan_msti_set) |
| 961 | return -EOPNOTSUPP; |
| 962 | |
| 963 | return ds->ops->vlan_msti_set(ds, *dp->bridge, msti); |
| 964 | } |
| 965 | |
| 966 | int dsa_port_mtu_change(struct dsa_port *dp, int new_mtu) |
| 967 | { |
| 968 | struct dsa_notifier_mtu_info info = { |
| 969 | .dp = dp, |
| 970 | .mtu = new_mtu, |
| 971 | }; |
| 972 | |
| 973 | return dsa_port_notify(dp, DSA_NOTIFIER_MTU, &info); |
| 974 | } |
| 975 | |
| 976 | int dsa_port_fdb_add(struct dsa_port *dp, const unsigned char *addr, |
| 977 | u16 vid) |
| 978 | { |
| 979 | struct dsa_notifier_fdb_info info = { |
| 980 | .dp = dp, |
| 981 | .addr = addr, |
| 982 | .vid = vid, |
| 983 | .db = { |
| 984 | .type = DSA_DB_BRIDGE, |
| 985 | .bridge = *dp->bridge, |
| 986 | }, |
| 987 | }; |
| 988 | |
| 989 | /* Refcounting takes bridge.num as a key, and should be global for all |
| 990 | * bridges in the absence of FDB isolation, and per bridge otherwise. |
| 991 | * Force the bridge.num to zero here in the absence of FDB isolation. |
| 992 | */ |
| 993 | if (!dp->ds->fdb_isolation) |
| 994 | info.db.bridge.num = 0; |
| 995 | |
| 996 | return dsa_port_notify(dp, DSA_NOTIFIER_FDB_ADD, &info); |
| 997 | } |
| 998 | |
| 999 | int dsa_port_fdb_del(struct dsa_port *dp, const unsigned char *addr, |
| 1000 | u16 vid) |
| 1001 | { |
| 1002 | struct dsa_notifier_fdb_info info = { |
| 1003 | .dp = dp, |
| 1004 | .addr = addr, |
| 1005 | .vid = vid, |
| 1006 | .db = { |
| 1007 | .type = DSA_DB_BRIDGE, |
| 1008 | .bridge = *dp->bridge, |
| 1009 | }, |
| 1010 | }; |
| 1011 | |
| 1012 | if (!dp->ds->fdb_isolation) |
| 1013 | info.db.bridge.num = 0; |
| 1014 | |
| 1015 | return dsa_port_notify(dp, DSA_NOTIFIER_FDB_DEL, &info); |
| 1016 | } |
| 1017 | |
| 1018 | static int dsa_port_host_fdb_add(struct dsa_port *dp, |
| 1019 | const unsigned char *addr, u16 vid, |
| 1020 | struct dsa_db db) |
| 1021 | { |
| 1022 | struct dsa_notifier_fdb_info info = { |
| 1023 | .dp = dp, |
| 1024 | .addr = addr, |
| 1025 | .vid = vid, |
| 1026 | .db = db, |
| 1027 | }; |
| 1028 | |
| 1029 | return dsa_port_notify(dp, DSA_NOTIFIER_HOST_FDB_ADD, &info); |
| 1030 | } |
| 1031 | |
| 1032 | int dsa_port_standalone_host_fdb_add(struct dsa_port *dp, |
| 1033 | const unsigned char *addr, u16 vid) |
| 1034 | { |
| 1035 | struct dsa_db db = { |
| 1036 | .type = DSA_DB_PORT, |
| 1037 | .dp = dp, |
| 1038 | }; |
| 1039 | |
| 1040 | return dsa_port_host_fdb_add(dp, addr, vid, db); |
| 1041 | } |
| 1042 | |
| 1043 | int dsa_port_bridge_host_fdb_add(struct dsa_port *dp, |
| 1044 | const unsigned char *addr, u16 vid) |
| 1045 | { |
| 1046 | struct net_device *conduit = dsa_port_to_conduit(dp); |
| 1047 | struct dsa_db db = { |
| 1048 | .type = DSA_DB_BRIDGE, |
| 1049 | .bridge = *dp->bridge, |
| 1050 | }; |
| 1051 | int err; |
| 1052 | |
| 1053 | if (!dp->ds->fdb_isolation) |
| 1054 | db.bridge.num = 0; |
| 1055 | |
| 1056 | /* Avoid a call to __dev_set_promiscuity() on the conduit, which |
| 1057 | * requires rtnl_lock(), since we can't guarantee that is held here, |
| 1058 | * and we can't take it either. |
| 1059 | */ |
| 1060 | if (conduit->priv_flags & IFF_UNICAST_FLT) { |
| 1061 | err = dev_uc_add(conduit, addr); |
| 1062 | if (err) |
| 1063 | return err; |
| 1064 | } |
| 1065 | |
| 1066 | return dsa_port_host_fdb_add(dp, addr, vid, db); |
| 1067 | } |
| 1068 | |
| 1069 | static int dsa_port_host_fdb_del(struct dsa_port *dp, |
| 1070 | const unsigned char *addr, u16 vid, |
| 1071 | struct dsa_db db) |
| 1072 | { |
| 1073 | struct dsa_notifier_fdb_info info = { |
| 1074 | .dp = dp, |
| 1075 | .addr = addr, |
| 1076 | .vid = vid, |
| 1077 | .db = db, |
| 1078 | }; |
| 1079 | |
| 1080 | return dsa_port_notify(dp, DSA_NOTIFIER_HOST_FDB_DEL, &info); |
| 1081 | } |
| 1082 | |
| 1083 | int dsa_port_standalone_host_fdb_del(struct dsa_port *dp, |
| 1084 | const unsigned char *addr, u16 vid) |
| 1085 | { |
| 1086 | struct dsa_db db = { |
| 1087 | .type = DSA_DB_PORT, |
| 1088 | .dp = dp, |
| 1089 | }; |
| 1090 | |
| 1091 | return dsa_port_host_fdb_del(dp, addr, vid, db); |
| 1092 | } |
| 1093 | |
| 1094 | int dsa_port_bridge_host_fdb_del(struct dsa_port *dp, |
| 1095 | const unsigned char *addr, u16 vid) |
| 1096 | { |
| 1097 | struct net_device *conduit = dsa_port_to_conduit(dp); |
| 1098 | struct dsa_db db = { |
| 1099 | .type = DSA_DB_BRIDGE, |
| 1100 | .bridge = *dp->bridge, |
| 1101 | }; |
| 1102 | int err; |
| 1103 | |
| 1104 | if (!dp->ds->fdb_isolation) |
| 1105 | db.bridge.num = 0; |
| 1106 | |
| 1107 | if (conduit->priv_flags & IFF_UNICAST_FLT) { |
| 1108 | err = dev_uc_del(conduit, addr); |
| 1109 | if (err) |
| 1110 | return err; |
| 1111 | } |
| 1112 | |
| 1113 | return dsa_port_host_fdb_del(dp, addr, vid, db); |
| 1114 | } |
| 1115 | |
| 1116 | int dsa_port_lag_fdb_add(struct dsa_port *dp, const unsigned char *addr, |
| 1117 | u16 vid) |
| 1118 | { |
| 1119 | struct dsa_notifier_lag_fdb_info info = { |
| 1120 | .lag = dp->lag, |
| 1121 | .addr = addr, |
| 1122 | .vid = vid, |
| 1123 | .db = { |
| 1124 | .type = DSA_DB_BRIDGE, |
| 1125 | .bridge = *dp->bridge, |
| 1126 | }, |
| 1127 | }; |
| 1128 | |
| 1129 | if (!dp->ds->fdb_isolation) |
| 1130 | info.db.bridge.num = 0; |
| 1131 | |
| 1132 | return dsa_port_notify(dp, DSA_NOTIFIER_LAG_FDB_ADD, &info); |
| 1133 | } |
| 1134 | |
| 1135 | int dsa_port_lag_fdb_del(struct dsa_port *dp, const unsigned char *addr, |
| 1136 | u16 vid) |
| 1137 | { |
| 1138 | struct dsa_notifier_lag_fdb_info info = { |
| 1139 | .lag = dp->lag, |
| 1140 | .addr = addr, |
| 1141 | .vid = vid, |
| 1142 | .db = { |
| 1143 | .type = DSA_DB_BRIDGE, |
| 1144 | .bridge = *dp->bridge, |
| 1145 | }, |
| 1146 | }; |
| 1147 | |
| 1148 | if (!dp->ds->fdb_isolation) |
| 1149 | info.db.bridge.num = 0; |
| 1150 | |
| 1151 | return dsa_port_notify(dp, DSA_NOTIFIER_LAG_FDB_DEL, &info); |
| 1152 | } |
| 1153 | |
| 1154 | int dsa_port_fdb_dump(struct dsa_port *dp, dsa_fdb_dump_cb_t *cb, void *data) |
| 1155 | { |
| 1156 | struct dsa_switch *ds = dp->ds; |
| 1157 | int port = dp->index; |
| 1158 | |
| 1159 | if (!ds->ops->port_fdb_dump) |
| 1160 | return -EOPNOTSUPP; |
| 1161 | |
| 1162 | return ds->ops->port_fdb_dump(ds, port, cb, data); |
| 1163 | } |
| 1164 | |
| 1165 | int dsa_port_mdb_add(const struct dsa_port *dp, |
| 1166 | const struct switchdev_obj_port_mdb *mdb) |
| 1167 | { |
| 1168 | struct dsa_notifier_mdb_info info = { |
| 1169 | .dp = dp, |
| 1170 | .mdb = mdb, |
| 1171 | .db = { |
| 1172 | .type = DSA_DB_BRIDGE, |
| 1173 | .bridge = *dp->bridge, |
| 1174 | }, |
| 1175 | }; |
| 1176 | |
| 1177 | if (!dp->ds->fdb_isolation) |
| 1178 | info.db.bridge.num = 0; |
| 1179 | |
| 1180 | return dsa_port_notify(dp, DSA_NOTIFIER_MDB_ADD, &info); |
| 1181 | } |
| 1182 | |
| 1183 | int dsa_port_mdb_del(const struct dsa_port *dp, |
| 1184 | const struct switchdev_obj_port_mdb *mdb) |
| 1185 | { |
| 1186 | struct dsa_notifier_mdb_info info = { |
| 1187 | .dp = dp, |
| 1188 | .mdb = mdb, |
| 1189 | .db = { |
| 1190 | .type = DSA_DB_BRIDGE, |
| 1191 | .bridge = *dp->bridge, |
| 1192 | }, |
| 1193 | }; |
| 1194 | |
| 1195 | if (!dp->ds->fdb_isolation) |
| 1196 | info.db.bridge.num = 0; |
| 1197 | |
| 1198 | return dsa_port_notify(dp, DSA_NOTIFIER_MDB_DEL, &info); |
| 1199 | } |
| 1200 | |
| 1201 | static int dsa_port_host_mdb_add(const struct dsa_port *dp, |
| 1202 | const struct switchdev_obj_port_mdb *mdb, |
| 1203 | struct dsa_db db) |
| 1204 | { |
| 1205 | struct dsa_notifier_mdb_info info = { |
| 1206 | .dp = dp, |
| 1207 | .mdb = mdb, |
| 1208 | .db = db, |
| 1209 | }; |
| 1210 | |
| 1211 | return dsa_port_notify(dp, DSA_NOTIFIER_HOST_MDB_ADD, &info); |
| 1212 | } |
| 1213 | |
| 1214 | int dsa_port_standalone_host_mdb_add(const struct dsa_port *dp, |
| 1215 | const struct switchdev_obj_port_mdb *mdb) |
| 1216 | { |
| 1217 | struct dsa_db db = { |
| 1218 | .type = DSA_DB_PORT, |
| 1219 | .dp = dp, |
| 1220 | }; |
| 1221 | |
| 1222 | return dsa_port_host_mdb_add(dp, mdb, db); |
| 1223 | } |
| 1224 | |
| 1225 | int dsa_port_bridge_host_mdb_add(const struct dsa_port *dp, |
| 1226 | const struct switchdev_obj_port_mdb *mdb) |
| 1227 | { |
| 1228 | struct net_device *conduit = dsa_port_to_conduit(dp); |
| 1229 | struct dsa_db db = { |
| 1230 | .type = DSA_DB_BRIDGE, |
| 1231 | .bridge = *dp->bridge, |
| 1232 | }; |
| 1233 | int err; |
| 1234 | |
| 1235 | if (!dp->ds->fdb_isolation) |
| 1236 | db.bridge.num = 0; |
| 1237 | |
| 1238 | err = dev_mc_add(conduit, mdb->addr); |
| 1239 | if (err) |
| 1240 | return err; |
| 1241 | |
| 1242 | return dsa_port_host_mdb_add(dp, mdb, db); |
| 1243 | } |
| 1244 | |
| 1245 | static int dsa_port_host_mdb_del(const struct dsa_port *dp, |
| 1246 | const struct switchdev_obj_port_mdb *mdb, |
| 1247 | struct dsa_db db) |
| 1248 | { |
| 1249 | struct dsa_notifier_mdb_info info = { |
| 1250 | .dp = dp, |
| 1251 | .mdb = mdb, |
| 1252 | .db = db, |
| 1253 | }; |
| 1254 | |
| 1255 | return dsa_port_notify(dp, DSA_NOTIFIER_HOST_MDB_DEL, &info); |
| 1256 | } |
| 1257 | |
| 1258 | int dsa_port_standalone_host_mdb_del(const struct dsa_port *dp, |
| 1259 | const struct switchdev_obj_port_mdb *mdb) |
| 1260 | { |
| 1261 | struct dsa_db db = { |
| 1262 | .type = DSA_DB_PORT, |
| 1263 | .dp = dp, |
| 1264 | }; |
| 1265 | |
| 1266 | return dsa_port_host_mdb_del(dp, mdb, db); |
| 1267 | } |
| 1268 | |
| 1269 | int dsa_port_bridge_host_mdb_del(const struct dsa_port *dp, |
| 1270 | const struct switchdev_obj_port_mdb *mdb) |
| 1271 | { |
| 1272 | struct net_device *conduit = dsa_port_to_conduit(dp); |
| 1273 | struct dsa_db db = { |
| 1274 | .type = DSA_DB_BRIDGE, |
| 1275 | .bridge = *dp->bridge, |
| 1276 | }; |
| 1277 | int err; |
| 1278 | |
| 1279 | if (!dp->ds->fdb_isolation) |
| 1280 | db.bridge.num = 0; |
| 1281 | |
| 1282 | err = dev_mc_del(conduit, mdb->addr); |
| 1283 | if (err) |
| 1284 | return err; |
| 1285 | |
| 1286 | return dsa_port_host_mdb_del(dp, mdb, db); |
| 1287 | } |
| 1288 | |
| 1289 | int dsa_port_vlan_add(struct dsa_port *dp, |
| 1290 | const struct switchdev_obj_port_vlan *vlan, |
| 1291 | struct netlink_ext_ack *extack) |
| 1292 | { |
| 1293 | struct dsa_notifier_vlan_info info = { |
| 1294 | .dp = dp, |
| 1295 | .vlan = vlan, |
| 1296 | .extack = extack, |
| 1297 | }; |
| 1298 | |
| 1299 | return dsa_port_notify(dp, DSA_NOTIFIER_VLAN_ADD, &info); |
| 1300 | } |
| 1301 | |
| 1302 | int dsa_port_vlan_del(struct dsa_port *dp, |
| 1303 | const struct switchdev_obj_port_vlan *vlan) |
| 1304 | { |
| 1305 | struct dsa_notifier_vlan_info info = { |
| 1306 | .dp = dp, |
| 1307 | .vlan = vlan, |
| 1308 | }; |
| 1309 | |
| 1310 | return dsa_port_notify(dp, DSA_NOTIFIER_VLAN_DEL, &info); |
| 1311 | } |
| 1312 | |
| 1313 | int dsa_port_host_vlan_add(struct dsa_port *dp, |
| 1314 | const struct switchdev_obj_port_vlan *vlan, |
| 1315 | struct netlink_ext_ack *extack) |
| 1316 | { |
| 1317 | struct net_device *conduit = dsa_port_to_conduit(dp); |
| 1318 | struct dsa_notifier_vlan_info info = { |
| 1319 | .dp = dp, |
| 1320 | .vlan = vlan, |
| 1321 | .extack = extack, |
| 1322 | }; |
| 1323 | int err; |
| 1324 | |
| 1325 | err = dsa_port_notify(dp, DSA_NOTIFIER_HOST_VLAN_ADD, &info); |
| 1326 | if (err && err != -EOPNOTSUPP) |
| 1327 | return err; |
| 1328 | |
| 1329 | vlan_vid_add(conduit, htons(ETH_P_8021Q), vlan->vid); |
| 1330 | |
| 1331 | return err; |
| 1332 | } |
| 1333 | |
| 1334 | int dsa_port_host_vlan_del(struct dsa_port *dp, |
| 1335 | const struct switchdev_obj_port_vlan *vlan) |
| 1336 | { |
| 1337 | struct net_device *conduit = dsa_port_to_conduit(dp); |
| 1338 | struct dsa_notifier_vlan_info info = { |
| 1339 | .dp = dp, |
| 1340 | .vlan = vlan, |
| 1341 | }; |
| 1342 | int err; |
| 1343 | |
| 1344 | err = dsa_port_notify(dp, DSA_NOTIFIER_HOST_VLAN_DEL, &info); |
| 1345 | if (err && err != -EOPNOTSUPP) |
| 1346 | return err; |
| 1347 | |
| 1348 | vlan_vid_del(conduit, htons(ETH_P_8021Q), vlan->vid); |
| 1349 | |
| 1350 | return err; |
| 1351 | } |
| 1352 | |
| 1353 | int dsa_port_mrp_add(const struct dsa_port *dp, |
| 1354 | const struct switchdev_obj_mrp *mrp) |
| 1355 | { |
| 1356 | struct dsa_switch *ds = dp->ds; |
| 1357 | |
| 1358 | if (!ds->ops->port_mrp_add) |
| 1359 | return -EOPNOTSUPP; |
| 1360 | |
| 1361 | return ds->ops->port_mrp_add(ds, dp->index, mrp); |
| 1362 | } |
| 1363 | |
| 1364 | int dsa_port_mrp_del(const struct dsa_port *dp, |
| 1365 | const struct switchdev_obj_mrp *mrp) |
| 1366 | { |
| 1367 | struct dsa_switch *ds = dp->ds; |
| 1368 | |
| 1369 | if (!ds->ops->port_mrp_del) |
| 1370 | return -EOPNOTSUPP; |
| 1371 | |
| 1372 | return ds->ops->port_mrp_del(ds, dp->index, mrp); |
| 1373 | } |
| 1374 | |
| 1375 | int dsa_port_mrp_add_ring_role(const struct dsa_port *dp, |
| 1376 | const struct switchdev_obj_ring_role_mrp *mrp) |
| 1377 | { |
| 1378 | struct dsa_switch *ds = dp->ds; |
| 1379 | |
| 1380 | if (!ds->ops->port_mrp_add_ring_role) |
| 1381 | return -EOPNOTSUPP; |
| 1382 | |
| 1383 | return ds->ops->port_mrp_add_ring_role(ds, dp->index, mrp); |
| 1384 | } |
| 1385 | |
| 1386 | int dsa_port_mrp_del_ring_role(const struct dsa_port *dp, |
| 1387 | const struct switchdev_obj_ring_role_mrp *mrp) |
| 1388 | { |
| 1389 | struct dsa_switch *ds = dp->ds; |
| 1390 | |
| 1391 | if (!ds->ops->port_mrp_del_ring_role) |
| 1392 | return -EOPNOTSUPP; |
| 1393 | |
| 1394 | return ds->ops->port_mrp_del_ring_role(ds, dp->index, mrp); |
| 1395 | } |
| 1396 | |
| 1397 | static int dsa_port_assign_conduit(struct dsa_port *dp, |
| 1398 | struct net_device *conduit, |
| 1399 | struct netlink_ext_ack *extack, |
| 1400 | bool fail_on_err) |
| 1401 | { |
| 1402 | struct dsa_switch *ds = dp->ds; |
| 1403 | int port = dp->index, err; |
| 1404 | |
| 1405 | err = ds->ops->port_change_conduit(ds, port, conduit, extack); |
| 1406 | if (err && !fail_on_err) |
| 1407 | dev_err(ds->dev, "port %d failed to assign conduit %s: %pe\n", |
| 1408 | port, conduit->name, ERR_PTR(err)); |
| 1409 | |
| 1410 | if (err && fail_on_err) |
| 1411 | return err; |
| 1412 | |
| 1413 | dp->cpu_dp = conduit->dsa_ptr; |
| 1414 | dp->cpu_port_in_lag = netif_is_lag_master(conduit); |
| 1415 | |
| 1416 | return 0; |
| 1417 | } |
| 1418 | |
| 1419 | /* Change the dp->cpu_dp affinity for a user port. Note that both cross-chip |
| 1420 | * notifiers and drivers have implicit assumptions about user-to-CPU-port |
| 1421 | * mappings, so we unfortunately cannot delay the deletion of the objects |
| 1422 | * (switchdev, standalone addresses, standalone VLANs) on the old CPU port |
| 1423 | * until the new CPU port has been set up. So we need to completely tear down |
| 1424 | * the old CPU port before changing it, and restore it on errors during the |
| 1425 | * bringup of the new one. |
| 1426 | */ |
| 1427 | int dsa_port_change_conduit(struct dsa_port *dp, struct net_device *conduit, |
| 1428 | struct netlink_ext_ack *extack) |
| 1429 | { |
| 1430 | struct net_device *bridge_dev = dsa_port_bridge_dev_get(dp); |
| 1431 | struct net_device *old_conduit = dsa_port_to_conduit(dp); |
| 1432 | struct net_device *dev = dp->user; |
| 1433 | struct dsa_switch *ds = dp->ds; |
| 1434 | bool vlan_filtering; |
| 1435 | int err, tmp; |
| 1436 | |
| 1437 | /* Bridges may hold host FDB, MDB and VLAN objects. These need to be |
| 1438 | * migrated, so dynamically unoffload and later reoffload the bridge |
| 1439 | * port. |
| 1440 | */ |
| 1441 | if (bridge_dev) { |
| 1442 | dsa_port_pre_bridge_leave(dp, bridge_dev); |
| 1443 | dsa_port_bridge_leave(dp, bridge_dev); |
| 1444 | } |
| 1445 | |
| 1446 | /* The port might still be VLAN filtering even if it's no longer |
| 1447 | * under a bridge, either due to ds->vlan_filtering_is_global or |
| 1448 | * ds->needs_standalone_vlan_filtering. In turn this means VLANs |
| 1449 | * on the CPU port. |
| 1450 | */ |
| 1451 | vlan_filtering = dsa_port_is_vlan_filtering(dp); |
| 1452 | if (vlan_filtering) { |
| 1453 | err = dsa_user_manage_vlan_filtering(dev, false); |
| 1454 | if (err) { |
| 1455 | NL_SET_ERR_MSG_MOD(extack, |
| 1456 | "Failed to remove standalone VLANs"); |
| 1457 | goto rewind_old_bridge; |
| 1458 | } |
| 1459 | } |
| 1460 | |
| 1461 | /* Standalone addresses, and addresses of upper interfaces like |
| 1462 | * VLAN, LAG, HSR need to be migrated. |
| 1463 | */ |
| 1464 | dsa_user_unsync_ha(dev); |
| 1465 | |
| 1466 | /* If live-changing, we also need to uninstall the user device address |
| 1467 | * from the port FDB and the conduit interface. |
| 1468 | */ |
| 1469 | if (dev->flags & IFF_UP) |
| 1470 | dsa_user_host_uc_uninstall(dev); |
| 1471 | |
| 1472 | err = dsa_port_assign_conduit(dp, conduit, extack, true); |
| 1473 | if (err) |
| 1474 | goto rewind_old_addrs; |
| 1475 | |
| 1476 | /* If the port doesn't have its own MAC address and relies on the DSA |
| 1477 | * conduit's one, inherit it again from the new DSA conduit. |
| 1478 | */ |
| 1479 | if (is_zero_ether_addr(dp->mac)) |
| 1480 | eth_hw_addr_inherit(dev, conduit); |
| 1481 | |
| 1482 | /* If live-changing, we need to install the user device address to the |
| 1483 | * port FDB and the conduit interface. |
| 1484 | */ |
| 1485 | if (dev->flags & IFF_UP) { |
| 1486 | err = dsa_user_host_uc_install(dev, dev->dev_addr); |
| 1487 | if (err) { |
| 1488 | NL_SET_ERR_MSG_MOD(extack, |
| 1489 | "Failed to install host UC address"); |
| 1490 | goto rewind_addr_inherit; |
| 1491 | } |
| 1492 | } |
| 1493 | |
| 1494 | dsa_user_sync_ha(dev); |
| 1495 | |
| 1496 | if (vlan_filtering) { |
| 1497 | err = dsa_user_manage_vlan_filtering(dev, true); |
| 1498 | if (err) { |
| 1499 | NL_SET_ERR_MSG_MOD(extack, |
| 1500 | "Failed to restore standalone VLANs"); |
| 1501 | goto rewind_new_addrs; |
| 1502 | } |
| 1503 | } |
| 1504 | |
| 1505 | if (bridge_dev) { |
| 1506 | err = dsa_port_bridge_join(dp, bridge_dev, extack); |
| 1507 | if (err && err == -EOPNOTSUPP) { |
| 1508 | NL_SET_ERR_MSG_MOD(extack, |
| 1509 | "Failed to reoffload bridge"); |
| 1510 | goto rewind_new_vlan; |
| 1511 | } |
| 1512 | } |
| 1513 | |
| 1514 | return 0; |
| 1515 | |
| 1516 | rewind_new_vlan: |
| 1517 | if (vlan_filtering) |
| 1518 | dsa_user_manage_vlan_filtering(dev, false); |
| 1519 | |
| 1520 | rewind_new_addrs: |
| 1521 | dsa_user_unsync_ha(dev); |
| 1522 | |
| 1523 | if (dev->flags & IFF_UP) |
| 1524 | dsa_user_host_uc_uninstall(dev); |
| 1525 | |
| 1526 | rewind_addr_inherit: |
| 1527 | if (is_zero_ether_addr(dp->mac)) |
| 1528 | eth_hw_addr_inherit(dev, old_conduit); |
| 1529 | |
| 1530 | dsa_port_assign_conduit(dp, old_conduit, NULL, false); |
| 1531 | |
| 1532 | /* Restore the objects on the old CPU port */ |
| 1533 | rewind_old_addrs: |
| 1534 | if (dev->flags & IFF_UP) { |
| 1535 | tmp = dsa_user_host_uc_install(dev, dev->dev_addr); |
| 1536 | if (tmp) { |
| 1537 | dev_err(ds->dev, |
| 1538 | "port %d failed to restore host UC address: %pe\n", |
| 1539 | dp->index, ERR_PTR(tmp)); |
| 1540 | } |
| 1541 | } |
| 1542 | |
| 1543 | dsa_user_sync_ha(dev); |
| 1544 | |
| 1545 | if (vlan_filtering) { |
| 1546 | tmp = dsa_user_manage_vlan_filtering(dev, true); |
| 1547 | if (tmp) { |
| 1548 | dev_err(ds->dev, |
| 1549 | "port %d failed to restore standalone VLANs: %pe\n", |
| 1550 | dp->index, ERR_PTR(tmp)); |
| 1551 | } |
| 1552 | } |
| 1553 | |
| 1554 | rewind_old_bridge: |
| 1555 | if (bridge_dev) { |
| 1556 | tmp = dsa_port_bridge_join(dp, bridge_dev, extack); |
| 1557 | if (tmp) { |
| 1558 | dev_err(ds->dev, |
| 1559 | "port %d failed to rejoin bridge %s: %pe\n", |
| 1560 | dp->index, bridge_dev->name, ERR_PTR(tmp)); |
| 1561 | } |
| 1562 | } |
| 1563 | |
| 1564 | return err; |
| 1565 | } |
| 1566 | |
| 1567 | void dsa_port_set_tag_protocol(struct dsa_port *cpu_dp, |
| 1568 | const struct dsa_device_ops *tag_ops) |
| 1569 | { |
| 1570 | cpu_dp->rcv = tag_ops->rcv; |
| 1571 | cpu_dp->tag_ops = tag_ops; |
| 1572 | } |
| 1573 | |
| 1574 | /* dsa_supports_eee - indicate that EEE is supported |
| 1575 | * @ds: pointer to &struct dsa_switch |
| 1576 | * @port: port index |
| 1577 | * |
| 1578 | * A default implementation for the .support_eee() DSA operations member, |
| 1579 | * which drivers can use to indicate that they support EEE on all of their |
| 1580 | * user ports. |
| 1581 | * |
| 1582 | * Returns: true |
| 1583 | */ |
| 1584 | bool dsa_supports_eee(struct dsa_switch *ds, int port) |
| 1585 | { |
| 1586 | return true; |
| 1587 | } |
| 1588 | EXPORT_SYMBOL_GPL(dsa_supports_eee); |
| 1589 | |
| 1590 | static void dsa_port_phylink_mac_config(struct phylink_config *config, |
| 1591 | unsigned int mode, |
| 1592 | const struct phylink_link_state *state) |
| 1593 | { |
| 1594 | } |
| 1595 | |
| 1596 | static void dsa_port_phylink_mac_link_down(struct phylink_config *config, |
| 1597 | unsigned int mode, |
| 1598 | phy_interface_t interface) |
| 1599 | { |
| 1600 | } |
| 1601 | |
| 1602 | static void dsa_port_phylink_mac_link_up(struct phylink_config *config, |
| 1603 | struct phy_device *phydev, |
| 1604 | unsigned int mode, |
| 1605 | phy_interface_t interface, |
| 1606 | int speed, int duplex, |
| 1607 | bool tx_pause, bool rx_pause) |
| 1608 | { |
| 1609 | } |
| 1610 | |
| 1611 | static const struct phylink_mac_ops dsa_port_phylink_mac_ops = { |
| 1612 | .mac_config = dsa_port_phylink_mac_config, |
| 1613 | .mac_link_down = dsa_port_phylink_mac_link_down, |
| 1614 | .mac_link_up = dsa_port_phylink_mac_link_up, |
| 1615 | }; |
| 1616 | |
| 1617 | int dsa_port_phylink_create(struct dsa_port *dp) |
| 1618 | { |
| 1619 | const struct phylink_mac_ops *mac_ops; |
| 1620 | struct dsa_switch *ds = dp->ds; |
| 1621 | phy_interface_t mode; |
| 1622 | struct phylink *pl; |
| 1623 | int err; |
| 1624 | |
| 1625 | err = of_get_phy_mode(dp->dn, &mode); |
| 1626 | if (err) |
| 1627 | mode = PHY_INTERFACE_MODE_NA; |
| 1628 | |
| 1629 | if (ds->ops->phylink_get_caps) { |
| 1630 | ds->ops->phylink_get_caps(ds, dp->index, &dp->pl_config); |
| 1631 | } else { |
| 1632 | /* For legacy drivers */ |
| 1633 | if (mode != PHY_INTERFACE_MODE_NA) { |
| 1634 | __set_bit(mode, dp->pl_config.supported_interfaces); |
| 1635 | } else { |
| 1636 | __set_bit(PHY_INTERFACE_MODE_INTERNAL, |
| 1637 | dp->pl_config.supported_interfaces); |
| 1638 | __set_bit(PHY_INTERFACE_MODE_GMII, |
| 1639 | dp->pl_config.supported_interfaces); |
| 1640 | } |
| 1641 | } |
| 1642 | |
| 1643 | mac_ops = &dsa_port_phylink_mac_ops; |
| 1644 | if (ds->phylink_mac_ops) |
| 1645 | mac_ops = ds->phylink_mac_ops; |
| 1646 | |
| 1647 | pl = phylink_create(&dp->pl_config, of_fwnode_handle(dp->dn), mode, |
| 1648 | mac_ops); |
| 1649 | if (IS_ERR(pl)) { |
| 1650 | pr_err("error creating PHYLINK: %ld\n", PTR_ERR(pl)); |
| 1651 | return PTR_ERR(pl); |
| 1652 | } |
| 1653 | |
| 1654 | dp->pl = pl; |
| 1655 | |
| 1656 | return 0; |
| 1657 | } |
| 1658 | |
| 1659 | void dsa_port_phylink_destroy(struct dsa_port *dp) |
| 1660 | { |
| 1661 | phylink_destroy(dp->pl); |
| 1662 | dp->pl = NULL; |
| 1663 | } |
| 1664 | |
| 1665 | static int dsa_shared_port_phylink_register(struct dsa_port *dp) |
| 1666 | { |
| 1667 | struct dsa_switch *ds = dp->ds; |
| 1668 | struct device_node *port_dn = dp->dn; |
| 1669 | int err; |
| 1670 | |
| 1671 | dp->pl_config.dev = ds->dev; |
| 1672 | dp->pl_config.type = PHYLINK_DEV; |
| 1673 | |
| 1674 | err = dsa_port_phylink_create(dp); |
| 1675 | if (err) |
| 1676 | return err; |
| 1677 | |
| 1678 | err = phylink_of_phy_connect(dp->pl, port_dn, 0); |
| 1679 | if (err && err != -ENODEV) { |
| 1680 | pr_err("could not attach to PHY: %d\n", err); |
| 1681 | goto err_phy_connect; |
| 1682 | } |
| 1683 | |
| 1684 | return 0; |
| 1685 | |
| 1686 | err_phy_connect: |
| 1687 | dsa_port_phylink_destroy(dp); |
| 1688 | return err; |
| 1689 | } |
| 1690 | |
| 1691 | /* During the initial DSA driver migration to OF, port nodes were sometimes |
| 1692 | * added to device trees with no indication of how they should operate from a |
| 1693 | * link management perspective (phy-handle, fixed-link, etc). Additionally, the |
| 1694 | * phy-mode may be absent. The interpretation of these port OF nodes depends on |
| 1695 | * their type. |
| 1696 | * |
| 1697 | * User ports with no phy-handle or fixed-link are expected to connect to an |
| 1698 | * internal PHY located on the ds->user_mii_bus at an MDIO address equal to |
| 1699 | * the port number. This description is still actively supported. |
| 1700 | * |
| 1701 | * Shared (CPU and DSA) ports with no phy-handle or fixed-link are expected to |
| 1702 | * operate at the maximum speed that their phy-mode is capable of. If the |
| 1703 | * phy-mode is absent, they are expected to operate using the phy-mode |
| 1704 | * supported by the port that gives the highest link speed. It is unspecified |
| 1705 | * if the port should use flow control or not, half duplex or full duplex, or |
| 1706 | * if the phy-mode is a SERDES link, whether in-band autoneg is expected to be |
| 1707 | * enabled or not. |
| 1708 | * |
| 1709 | * In the latter case of shared ports, omitting the link management description |
| 1710 | * from the firmware node is deprecated and strongly discouraged. DSA uses |
| 1711 | * phylink, which rejects the firmware nodes of these ports for lacking |
| 1712 | * required properties. |
| 1713 | * |
| 1714 | * For switches in this table, DSA will skip enforcing validation and will |
| 1715 | * later omit registering a phylink instance for the shared ports, if they lack |
| 1716 | * a fixed-link, a phy-handle, or a managed = "in-band-status" property. |
| 1717 | * It becomes the responsibility of the driver to ensure that these ports |
| 1718 | * operate at the maximum speed (whatever this means) and will interoperate |
| 1719 | * with the DSA conduit or other cascade port, since phylink methods will not be |
| 1720 | * invoked for them. |
| 1721 | * |
| 1722 | * If you are considering expanding this table for newly introduced switches, |
| 1723 | * think again. It is OK to remove switches from this table if there aren't DT |
| 1724 | * blobs in circulation which rely on defaulting the shared ports. |
| 1725 | */ |
| 1726 | static const char * const dsa_switches_apply_workarounds[] = { |
| 1727 | #if IS_ENABLED(CONFIG_NET_DSA_XRS700X) |
| 1728 | "arrow,xrs7003e", |
| 1729 | "arrow,xrs7003f", |
| 1730 | "arrow,xrs7004e", |
| 1731 | "arrow,xrs7004f", |
| 1732 | #endif |
| 1733 | #if IS_ENABLED(CONFIG_B53) |
| 1734 | "brcm,bcm5325", |
| 1735 | "brcm,bcm53115", |
| 1736 | "brcm,bcm53125", |
| 1737 | "brcm,bcm53128", |
| 1738 | "brcm,bcm5365", |
| 1739 | "brcm,bcm5389", |
| 1740 | "brcm,bcm5395", |
| 1741 | "brcm,bcm5397", |
| 1742 | "brcm,bcm5398", |
| 1743 | "brcm,bcm53010-srab", |
| 1744 | "brcm,bcm53011-srab", |
| 1745 | "brcm,bcm53012-srab", |
| 1746 | "brcm,bcm53018-srab", |
| 1747 | "brcm,bcm53019-srab", |
| 1748 | "brcm,bcm5301x-srab", |
| 1749 | "brcm,bcm11360-srab", |
| 1750 | "brcm,bcm58522-srab", |
| 1751 | "brcm,bcm58525-srab", |
| 1752 | "brcm,bcm58535-srab", |
| 1753 | "brcm,bcm58622-srab", |
| 1754 | "brcm,bcm58623-srab", |
| 1755 | "brcm,bcm58625-srab", |
| 1756 | "brcm,bcm88312-srab", |
| 1757 | "brcm,cygnus-srab", |
| 1758 | "brcm,nsp-srab", |
| 1759 | "brcm,omega-srab", |
| 1760 | "brcm,bcm3384-switch", |
| 1761 | "brcm,bcm6328-switch", |
| 1762 | "brcm,bcm6368-switch", |
| 1763 | "brcm,bcm63xx-switch", |
| 1764 | #endif |
| 1765 | #if IS_ENABLED(CONFIG_NET_DSA_BCM_SF2) |
| 1766 | "brcm,bcm7445-switch-v4.0", |
| 1767 | "brcm,bcm7278-switch-v4.0", |
| 1768 | "brcm,bcm7278-switch-v4.8", |
| 1769 | #endif |
| 1770 | #if IS_ENABLED(CONFIG_NET_DSA_LANTIQ_GSWIP) |
| 1771 | "lantiq,xrx200-gswip", |
| 1772 | "lantiq,xrx300-gswip", |
| 1773 | "lantiq,xrx330-gswip", |
| 1774 | #endif |
| 1775 | #if IS_ENABLED(CONFIG_NET_DSA_MV88E6060) |
| 1776 | "marvell,mv88e6060", |
| 1777 | #endif |
| 1778 | #if IS_ENABLED(CONFIG_NET_DSA_MV88E6XXX) |
| 1779 | "marvell,mv88e6085", |
| 1780 | "marvell,mv88e6190", |
| 1781 | "marvell,mv88e6250", |
| 1782 | #endif |
| 1783 | #if IS_ENABLED(CONFIG_NET_DSA_MICROCHIP_KSZ_COMMON) |
| 1784 | "microchip,ksz8765", |
| 1785 | "microchip,ksz8794", |
| 1786 | "microchip,ksz8795", |
| 1787 | "microchip,ksz8863", |
| 1788 | "microchip,ksz8873", |
| 1789 | "microchip,ksz9477", |
| 1790 | "microchip,ksz9897", |
| 1791 | "microchip,ksz9893", |
| 1792 | "microchip,ksz9563", |
| 1793 | "microchip,ksz8563", |
| 1794 | "microchip,ksz9567", |
| 1795 | #endif |
| 1796 | #if IS_ENABLED(CONFIG_NET_DSA_SMSC_LAN9303_MDIO) |
| 1797 | "smsc,lan9303-mdio", |
| 1798 | #endif |
| 1799 | #if IS_ENABLED(CONFIG_NET_DSA_SMSC_LAN9303_I2C) |
| 1800 | "smsc,lan9303-i2c", |
| 1801 | #endif |
| 1802 | NULL, |
| 1803 | }; |
| 1804 | |
| 1805 | static void dsa_shared_port_validate_of(struct dsa_port *dp, |
| 1806 | bool *missing_phy_mode, |
| 1807 | bool *missing_link_description) |
| 1808 | { |
| 1809 | struct device_node *dn = dp->dn, *phy_np; |
| 1810 | struct dsa_switch *ds = dp->ds; |
| 1811 | phy_interface_t mode; |
| 1812 | |
| 1813 | *missing_phy_mode = false; |
| 1814 | *missing_link_description = false; |
| 1815 | |
| 1816 | if (of_get_phy_mode(dn, &mode)) { |
| 1817 | *missing_phy_mode = true; |
| 1818 | dev_err(ds->dev, |
| 1819 | "OF node %pOF of %s port %d lacks the required \"phy-mode\" property\n", |
| 1820 | dn, dsa_port_is_cpu(dp) ? "CPU" : "DSA", dp->index); |
| 1821 | } |
| 1822 | |
| 1823 | /* Note: of_phy_is_fixed_link() also returns true for |
| 1824 | * managed = "in-band-status" |
| 1825 | */ |
| 1826 | if (of_phy_is_fixed_link(dn)) |
| 1827 | return; |
| 1828 | |
| 1829 | phy_np = of_parse_phandle(dn, "phy-handle", 0); |
| 1830 | if (phy_np) { |
| 1831 | of_node_put(phy_np); |
| 1832 | return; |
| 1833 | } |
| 1834 | |
| 1835 | *missing_link_description = true; |
| 1836 | |
| 1837 | dev_err(ds->dev, |
| 1838 | "OF node %pOF of %s port %d lacks the required \"phy-handle\", \"fixed-link\" or \"managed\" properties\n", |
| 1839 | dn, dsa_port_is_cpu(dp) ? "CPU" : "DSA", dp->index); |
| 1840 | } |
| 1841 | |
| 1842 | static void dsa_shared_port_link_down(struct dsa_port *dp) |
| 1843 | { |
| 1844 | struct dsa_switch *ds = dp->ds; |
| 1845 | |
| 1846 | if (ds->phylink_mac_ops && ds->phylink_mac_ops->mac_link_down) |
| 1847 | ds->phylink_mac_ops->mac_link_down(&dp->pl_config, MLO_AN_FIXED, |
| 1848 | PHY_INTERFACE_MODE_NA); |
| 1849 | } |
| 1850 | |
| 1851 | int dsa_shared_port_link_register_of(struct dsa_port *dp) |
| 1852 | { |
| 1853 | struct dsa_switch *ds = dp->ds; |
| 1854 | bool missing_link_description; |
| 1855 | bool missing_phy_mode; |
| 1856 | |
| 1857 | dsa_shared_port_validate_of(dp, &missing_phy_mode, |
| 1858 | &missing_link_description); |
| 1859 | |
| 1860 | if ((missing_phy_mode || missing_link_description) && |
| 1861 | !of_device_compatible_match(ds->dev->of_node, |
| 1862 | dsa_switches_apply_workarounds)) |
| 1863 | return -EINVAL; |
| 1864 | |
| 1865 | if (missing_link_description) { |
| 1866 | dev_warn(ds->dev, |
| 1867 | "Skipping phylink registration for %s port %d\n", |
| 1868 | dsa_port_is_cpu(dp) ? "CPU" : "DSA", dp->index); |
| 1869 | } else { |
| 1870 | dsa_shared_port_link_down(dp); |
| 1871 | |
| 1872 | return dsa_shared_port_phylink_register(dp); |
| 1873 | } |
| 1874 | |
| 1875 | return 0; |
| 1876 | } |
| 1877 | |
| 1878 | void dsa_shared_port_link_unregister_of(struct dsa_port *dp) |
| 1879 | { |
| 1880 | if (dp->pl) { |
| 1881 | rtnl_lock(); |
| 1882 | phylink_disconnect_phy(dp->pl); |
| 1883 | rtnl_unlock(); |
| 1884 | dsa_port_phylink_destroy(dp); |
| 1885 | return; |
| 1886 | } |
| 1887 | } |
| 1888 | |
| 1889 | int dsa_port_hsr_join(struct dsa_port *dp, struct net_device *hsr, |
| 1890 | struct netlink_ext_ack *extack) |
| 1891 | { |
| 1892 | struct dsa_switch *ds = dp->ds; |
| 1893 | int err; |
| 1894 | |
| 1895 | if (!ds->ops->port_hsr_join) |
| 1896 | return -EOPNOTSUPP; |
| 1897 | |
| 1898 | dp->hsr_dev = hsr; |
| 1899 | |
| 1900 | err = ds->ops->port_hsr_join(ds, dp->index, hsr, extack); |
| 1901 | if (err) |
| 1902 | dp->hsr_dev = NULL; |
| 1903 | |
| 1904 | return err; |
| 1905 | } |
| 1906 | |
| 1907 | void dsa_port_hsr_leave(struct dsa_port *dp, struct net_device *hsr) |
| 1908 | { |
| 1909 | struct dsa_switch *ds = dp->ds; |
| 1910 | int err; |
| 1911 | |
| 1912 | dp->hsr_dev = NULL; |
| 1913 | |
| 1914 | if (ds->ops->port_hsr_leave) { |
| 1915 | err = ds->ops->port_hsr_leave(ds, dp->index, hsr); |
| 1916 | if (err) |
| 1917 | dev_err(dp->ds->dev, |
| 1918 | "port %d failed to leave HSR %s: %pe\n", |
| 1919 | dp->index, hsr->name, ERR_PTR(err)); |
| 1920 | } |
| 1921 | } |
| 1922 | |
| 1923 | int dsa_port_tag_8021q_vlan_add(struct dsa_port *dp, u16 vid, bool broadcast) |
| 1924 | { |
| 1925 | struct dsa_notifier_tag_8021q_vlan_info info = { |
| 1926 | .dp = dp, |
| 1927 | .vid = vid, |
| 1928 | }; |
| 1929 | |
| 1930 | if (broadcast) |
| 1931 | return dsa_broadcast(DSA_NOTIFIER_TAG_8021Q_VLAN_ADD, &info); |
| 1932 | |
| 1933 | return dsa_port_notify(dp, DSA_NOTIFIER_TAG_8021Q_VLAN_ADD, &info); |
| 1934 | } |
| 1935 | |
| 1936 | void dsa_port_tag_8021q_vlan_del(struct dsa_port *dp, u16 vid, bool broadcast) |
| 1937 | { |
| 1938 | struct dsa_notifier_tag_8021q_vlan_info info = { |
| 1939 | .dp = dp, |
| 1940 | .vid = vid, |
| 1941 | }; |
| 1942 | int err; |
| 1943 | |
| 1944 | if (broadcast) |
| 1945 | err = dsa_broadcast(DSA_NOTIFIER_TAG_8021Q_VLAN_DEL, &info); |
| 1946 | else |
| 1947 | err = dsa_port_notify(dp, DSA_NOTIFIER_TAG_8021Q_VLAN_DEL, &info); |
| 1948 | if (err) |
| 1949 | dev_err(dp->ds->dev, |
| 1950 | "port %d failed to notify tag_8021q VLAN %d deletion: %pe\n", |
| 1951 | dp->index, vid, ERR_PTR(err)); |
| 1952 | } |