diff mbox series

[net-next] net: ocelot: Extend MRP

Message ID 20210310205140.1428791-1-horatiu.vultur@microchip.com (mailing list archive)
State Superseded
Delegated to: Netdev Maintainers
Headers show
Series [net-next] net: ocelot: Extend MRP | expand

Checks

Context Check Description
netdev/cover_letter success Link
netdev/fixes_present success Link
netdev/patch_count success Link
netdev/tree_selection success Clearly marked for net-next
netdev/subject_prefix success Link
netdev/cc_maintainers success CCed 7 of 7 maintainers
netdev/source_inline success Was 0 now: 0
netdev/verify_signedoff success Link
netdev/module_param success Was 0 now: 0
netdev/build_32bit success Errors and warnings before: 0 this patch: 0
netdev/kdoc success Errors and warnings before: 0 this patch: 0
netdev/verify_fixes success Link
netdev/checkpatch success total: 0 errors, 0 warnings, 0 checks, 352 lines checked
netdev/build_allmodconfig_warn success Errors and warnings before: 0 this patch: 0
netdev/header_inline success Link

Commit Message

Horatiu Vultur March 10, 2021, 8:51 p.m. UTC
This patch extends MRP support for Ocelot.  It allows to have multiple
rings and when the node has the MRC role it forwards MRP Test frames in
HW. For MRM there is no change.

Signed-off-by: Horatiu Vultur <horatiu.vultur@microchip.com>
---
 drivers/net/ethernet/mscc/ocelot.c     |   6 -
 drivers/net/ethernet/mscc/ocelot_mrp.c | 229 +++++++++++++++++--------
 include/soc/mscc/ocelot.h              |  10 +-
 3 files changed, 158 insertions(+), 87 deletions(-)

Comments

Vladimir Oltean March 11, 2021, 12:25 a.m. UTC | #1
On Wed, Mar 10, 2021 at 09:51:40PM +0100, Horatiu Vultur wrote:
> This patch extends MRP support for Ocelot.  It allows to have multiple
> rings and when the node has the MRC role it forwards MRP Test frames in
> HW. For MRM there is no change.
> 
> Signed-off-by: Horatiu Vultur <horatiu.vultur@microchip.com>
> ---
>  drivers/net/ethernet/mscc/ocelot.c     |   6 -
>  drivers/net/ethernet/mscc/ocelot_mrp.c | 229 +++++++++++++++++--------
>  include/soc/mscc/ocelot.h              |  10 +-
>  3 files changed, 158 insertions(+), 87 deletions(-)
> 
> diff --git a/drivers/net/ethernet/mscc/ocelot.c b/drivers/net/ethernet/mscc/ocelot.c
> index 46e5c9136bac..9b79363db17f 100644
> --- a/drivers/net/ethernet/mscc/ocelot.c
> +++ b/drivers/net/ethernet/mscc/ocelot.c
> @@ -772,12 +772,6 @@ int ocelot_xtr_poll_frame(struct ocelot *ocelot, int grp, struct sk_buff **nskb)
>  
>  	skb->protocol = eth_type_trans(skb, dev);
>  
> -#if IS_ENABLED(CONFIG_BRIDGE_MRP)
> -	if (skb->protocol == cpu_to_be16(ETH_P_MRP) &&
> -	    cpuq & BIT(OCELOT_MRP_CPUQ))
> -		skb->offload_fwd_mark = 0;
> -#endif
> -

I suppose net/dsa/tag_ocelot.c doesn't need it any longer either?

>  	*nskb = skb;
>  
>  	return 0;
> diff --git a/drivers/net/ethernet/mscc/ocelot_mrp.c b/drivers/net/ethernet/mscc/ocelot_mrp.c
> index 683da320bfd8..86b36e5d2279 100644
> --- a/drivers/net/ethernet/mscc/ocelot_mrp.c
> +++ b/drivers/net/ethernet/mscc/ocelot_mrp.c
> @@ -1,8 +1,5 @@
>  // SPDX-License-Identifier: (GPL-2.0 OR MIT)
>  /* Microsemi Ocelot Switch driver
> - *
> - * This contains glue logic between the switchdev driver operations and the
> - * mscc_ocelot_switch_lib.
>   *
>   * Copyright (c) 2017, 2019 Microsemi Corporation
>   * Copyright 2020-2021 NXP Semiconductors
> @@ -15,13 +12,33 @@
>  #include "ocelot.h"
>  #include "ocelot_vcap.h"
>  
> -static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int port)
> +static const u8 mrp_test_dmac[] = {0x01, 0x15, 0x4e, 0x00, 0x00, 0x01 };
> +static const u8 mrp_control_dmac[] = {0x01, 0x15, 0x4e, 0x00, 0x00, 0x02 };
> +
> +static int ocelot_mrp_find_port(struct ocelot *ocelot, struct ocelot_port *p)

Could this be named:
struct ocelot_port *ocelot_find_mrp_partner_port(struct ocelot_port *ocelot_port)

and return NULL instead of zero on "not found"? Zero is a perfectly
valid port number, definitely not what you want.

> +{
> +	int i;
> +
> +	for (i = 0; i < ocelot->num_phys_ports; ++i) {
> +		struct ocelot_port *ocelot_port = ocelot->ports[i];
> +
> +		if (!ocelot_port || p == ocelot_port)
> +			continue;
> +
> +		if (ocelot_port->mrp_ring_id == p->mrp_ring_id)
> +			return i;
> +	}
> +
> +	return 0;
> +}
> +
> +static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int id)
>  {
>  	struct ocelot_vcap_block *block_vcap_is2;
>  	struct ocelot_vcap_filter *filter;
>  
>  	block_vcap_is2 = &ocelot->block[VCAP_IS2];
> -	filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, port,
> +	filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id,
>  						     false);
>  	if (!filter)
>  		return 0;
> @@ -29,6 +46,87 @@ static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int port)
>  	return ocelot_vcap_filter_del(ocelot, filter);
>  }
>  
> +static int ocelot_mrp_redirect_add_vcap(struct ocelot *ocelot, int src_port,
> +					int dst_port)
> +{
> +	const u8 mrp_test_mask[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff };

OCD, but could you add a space between the opening bracket and the first
0xff? There's one more place where that should be done.

> +	struct ocelot_vcap_filter *filter;
> +	int err;
> +
> +	filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
> +	if (!filter)
> +		return -ENOMEM;

Why atomic? Isn't SWITCHDEV_OBJ_ID_RING_ROLE_MRP put on the blocking
notifier call chain?

> +
> +	filter->key_type = OCELOT_VCAP_KEY_ETYPE;
> +	filter->prio = 1;
> +	filter->id.cookie = src_port;
> +	filter->id.tc_offload = false;
> +	filter->block_id = VCAP_IS2;
> +	filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
> +	filter->ingress_port_mask = BIT(src_port);
> +	ether_addr_copy(filter->key.etype.dmac.value, mrp_test_dmac);
> +	ether_addr_copy(filter->key.etype.dmac.mask, mrp_test_mask);
> +	filter->action.mask_mode = OCELOT_MASK_MODE_REDIRECT;
> +	filter->action.port_mask = BIT(dst_port);
> +
> +	err = ocelot_vcap_filter_add(ocelot, filter, NULL);
> +	if (err)
> +		kfree(filter);
> +
> +	return err;
> +}
> +
> +static int ocelot_mrp_copy_add_vcap(struct ocelot *ocelot, int port,
> +				    int prio, int cookie)

"cookie" should be unsigned long I think?

> +{
> +	const u8 mrp_mask[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0x00 };
> +	struct ocelot_vcap_filter *filter;
> +	int err;
> +
> +	filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
> +	if (!filter)
> +		return -ENOMEM;
> +
> +	filter->key_type = OCELOT_VCAP_KEY_ETYPE;
> +	filter->prio = prio;
> +	filter->id.cookie = cookie;
> +	filter->id.tc_offload = false;
> +	filter->block_id = VCAP_IS2;
> +	filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
> +	filter->ingress_port_mask = BIT(port);
> +	/* Here is possible to use control or test dmac because the mask
> +	 * doesn't cover the LSB
> +	 */
> +	ether_addr_copy(filter->key.etype.dmac.value, mrp_test_dmac);
> +	ether_addr_copy(filter->key.etype.dmac.mask, mrp_mask);
> +	filter->action.mask_mode = OCELOT_MASK_MODE_PERMIT_DENY;
> +	filter->action.port_mask = 0x0;
> +	filter->action.cpu_copy_ena = true;
> +	filter->action.cpu_qu_num = OCELOT_MRP_CPUQ;
> +
> +	err = ocelot_vcap_filter_add(ocelot, filter, NULL);
> +	if (err)
> +		kfree(filter);
> +
> +	return err;
> +}
> +
> +static void ocelot_mrp_save_mac(struct ocelot *ocelot,
> +				struct ocelot_port *port)
> +{
> +	ocelot_mact_learn(ocelot, PGID_MRP, mrp_test_dmac,
> +			  port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> +	ocelot_mact_learn(ocelot, PGID_MRP, mrp_control_dmac,
> +			  port->pvid_vlan.vid, ENTRYTYPE_LOCKED);

Let me make sure I understand.
By learning these multicast addresses, you mark them as 'not unknown' in
the MAC table, because otherwise they will be flooded, including to the
CPU port module, and there's no way you can remove the CPU from the
flood mask, even if the packets get later redirected through VCAP IS2?
I mean that's the reason why we have the policer on the CPU port for the
drop action in ocelot_vcap_init, no?

> diff --git a/include/soc/mscc/ocelot.h b/include/soc/mscc/ocelot.h
> index 425ff29d9389..c41696d2e82b 100644
> --- a/include/soc/mscc/ocelot.h
> +++ b/include/soc/mscc/ocelot.h
> @@ -51,6 +51,7 @@
>   */
>  
>  /* Reserve some destination PGIDs at the end of the range:
> + * PGID_MRP: used for not flooding MRP frames to CPU

Could this be named PGID_BLACKHOLE or something? It isn't specific to
MRP if I understand correctly. We should also probably initialize it
with zero.

>   * PGID_CPU: used for whitelisting certain MAC addresses, such as the addresses
>   *           of the switch port net devices, towards the CPU port module.
>   * PGID_UC: the flooding destinations for unknown unicast traffic.
> @@ -59,6 +60,7 @@
>   * PGID_MCIPV6: the flooding destinations for IPv6 multicast traffic.
>   * PGID_BC: the flooding destinations for broadcast traffic.
>   */
> +#define PGID_MRP			57
>  #define PGID_CPU			58
>  #define PGID_UC				59
>  #define PGID_MC				60
> @@ -611,6 +613,8 @@ struct ocelot_port {
>  
>  	struct net_device		*bond;
>  	bool				lag_tx_active;
> +
> +	u16				mrp_ring_id;
>  };
>  
>  struct ocelot {
> @@ -679,12 +683,6 @@ struct ocelot {
>  	/* Protects the PTP clock */
>  	spinlock_t			ptp_clock_lock;
>  	struct ptp_pin_desc		ptp_pins[OCELOT_PTP_PINS_NUM];
> -
> -#if IS_ENABLED(CONFIG_BRIDGE_MRP)
> -	u16				mrp_ring_id;
> -	struct net_device		*mrp_p_port;
> -	struct net_device		*mrp_s_port;
> -#endif
>  };
>  
>  struct ocelot_policer {
> -- 
> 2.30.1
>
Horatiu Vultur March 11, 2021, 7:30 p.m. UTC | #2
The 03/11/2021 02:25, Vladimir Oltean wrote:

Hi Vladimir,

> 
> On Wed, Mar 10, 2021 at 09:51:40PM +0100, Horatiu Vultur wrote:
> > This patch extends MRP support for Ocelot.  It allows to have multiple
> > rings and when the node has the MRC role it forwards MRP Test frames in
> > HW. For MRM there is no change.
> >
> > Signed-off-by: Horatiu Vultur <horatiu.vultur@microchip.com>
> > ---
> >  drivers/net/ethernet/mscc/ocelot.c     |   6 -
> >  drivers/net/ethernet/mscc/ocelot_mrp.c | 229 +++++++++++++++++--------
> >  include/soc/mscc/ocelot.h              |  10 +-
> >  3 files changed, 158 insertions(+), 87 deletions(-)
> >
> > diff --git a/drivers/net/ethernet/mscc/ocelot.c b/drivers/net/ethernet/mscc/ocelot.c
> > index 46e5c9136bac..9b79363db17f 100644
> > --- a/drivers/net/ethernet/mscc/ocelot.c
> > +++ b/drivers/net/ethernet/mscc/ocelot.c
> > @@ -772,12 +772,6 @@ int ocelot_xtr_poll_frame(struct ocelot *ocelot, int grp, struct sk_buff **nskb)
> >
> >       skb->protocol = eth_type_trans(skb, dev);
> >
> > -#if IS_ENABLED(CONFIG_BRIDGE_MRP)
> > -     if (skb->protocol == cpu_to_be16(ETH_P_MRP) &&
> > -         cpuq & BIT(OCELOT_MRP_CPUQ))
> > -             skb->offload_fwd_mark = 0;
> > -#endif
> > -
> 
> I suppose net/dsa/tag_ocelot.c doesn't need it any longer either?

Yes, that should be removed.

> 
> >       *nskb = skb;
> >
> >       return 0;
> > diff --git a/drivers/net/ethernet/mscc/ocelot_mrp.c b/drivers/net/ethernet/mscc/ocelot_mrp.c
> > index 683da320bfd8..86b36e5d2279 100644
> > --- a/drivers/net/ethernet/mscc/ocelot_mrp.c
> > +++ b/drivers/net/ethernet/mscc/ocelot_mrp.c
> > @@ -1,8 +1,5 @@
> >  // SPDX-License-Identifier: (GPL-2.0 OR MIT)
> >  /* Microsemi Ocelot Switch driver
> > - *
> > - * This contains glue logic between the switchdev driver operations and the
> > - * mscc_ocelot_switch_lib.
> >   *
> >   * Copyright (c) 2017, 2019 Microsemi Corporation
> >   * Copyright 2020-2021 NXP Semiconductors
> > @@ -15,13 +12,33 @@
> >  #include "ocelot.h"
> >  #include "ocelot_vcap.h"
> >
> > -static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int port)
> > +static const u8 mrp_test_dmac[] = {0x01, 0x15, 0x4e, 0x00, 0x00, 0x01 };
> > +static const u8 mrp_control_dmac[] = {0x01, 0x15, 0x4e, 0x00, 0x00, 0x02 };
> > +
> > +static int ocelot_mrp_find_port(struct ocelot *ocelot, struct ocelot_port *p)
> 
> Could this be named:
> struct ocelot_port *ocelot_find_mrp_partner_port(struct ocelot_port *ocelot_port)
> 
> and return NULL instead of zero on "not found"? Zero is a perfectly
> valid port number, definitely not what you want.

I will rename it in the next version.

> 
> > +{
> > +     int i;
> > +
> > +     for (i = 0; i < ocelot->num_phys_ports; ++i) {
> > +             struct ocelot_port *ocelot_port = ocelot->ports[i];
> > +
> > +             if (!ocelot_port || p == ocelot_port)
> > +                     continue;
> > +
> > +             if (ocelot_port->mrp_ring_id == p->mrp_ring_id)
> > +                     return i;
> > +     }
> > +
> > +     return 0;
> > +}
> > +
> > +static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int id)
> >  {
> >       struct ocelot_vcap_block *block_vcap_is2;
> >       struct ocelot_vcap_filter *filter;
> >
> >       block_vcap_is2 = &ocelot->block[VCAP_IS2];
> > -     filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, port,
> > +     filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id,
> >                                                    false);
> >       if (!filter)
> >               return 0;
> > @@ -29,6 +46,87 @@ static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int port)
> >       return ocelot_vcap_filter_del(ocelot, filter);
> >  }
> >
> > +static int ocelot_mrp_redirect_add_vcap(struct ocelot *ocelot, int src_port,
> > +                                     int dst_port)
> > +{
> > +     const u8 mrp_test_mask[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
> 
> OCD, but could you add a space between the opening bracket and the first
> 0xff? There's one more place where that should be done.

Good catch, I will update it.

> 
> > +     struct ocelot_vcap_filter *filter;
> > +     int err;
> > +
> > +     filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
> > +     if (!filter)
> > +             return -ENOMEM;
> 
> Why atomic? Isn't SWITCHDEV_OBJ_ID_RING_ROLE_MRP put on the blocking
> notifier call chain?

Yes it is, so I shouldn't use GFP_ATOMIC.

> 
> > +
> > +     filter->key_type = OCELOT_VCAP_KEY_ETYPE;
> > +     filter->prio = 1;
> > +     filter->id.cookie = src_port;
> > +     filter->id.tc_offload = false;
> > +     filter->block_id = VCAP_IS2;
> > +     filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
> > +     filter->ingress_port_mask = BIT(src_port);
> > +     ether_addr_copy(filter->key.etype.dmac.value, mrp_test_dmac);
> > +     ether_addr_copy(filter->key.etype.dmac.mask, mrp_test_mask);
> > +     filter->action.mask_mode = OCELOT_MASK_MODE_REDIRECT;
> > +     filter->action.port_mask = BIT(dst_port);
> > +
> > +     err = ocelot_vcap_filter_add(ocelot, filter, NULL);
> > +     if (err)
> > +             kfree(filter);
> > +
> > +     return err;
> > +}
> > +
> > +static int ocelot_mrp_copy_add_vcap(struct ocelot *ocelot, int port,
> > +                                 int prio, int cookie)
> 
> "cookie" should be unsigned long I think?

Yes, it should be unsigned long.

> 
> > +{
> > +     const u8 mrp_mask[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0x00 };
> > +     struct ocelot_vcap_filter *filter;
> > +     int err;
> > +
> > +     filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
> > +     if (!filter)
> > +             return -ENOMEM;
> > +
> > +     filter->key_type = OCELOT_VCAP_KEY_ETYPE;
> > +     filter->prio = prio;
> > +     filter->id.cookie = cookie;
> > +     filter->id.tc_offload = false;
> > +     filter->block_id = VCAP_IS2;
> > +     filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
> > +     filter->ingress_port_mask = BIT(port);
> > +     /* Here is possible to use control or test dmac because the mask
> > +      * doesn't cover the LSB
> > +      */
> > +     ether_addr_copy(filter->key.etype.dmac.value, mrp_test_dmac);
> > +     ether_addr_copy(filter->key.etype.dmac.mask, mrp_mask);
> > +     filter->action.mask_mode = OCELOT_MASK_MODE_PERMIT_DENY;
> > +     filter->action.port_mask = 0x0;
> > +     filter->action.cpu_copy_ena = true;
> > +     filter->action.cpu_qu_num = OCELOT_MRP_CPUQ;
> > +
> > +     err = ocelot_vcap_filter_add(ocelot, filter, NULL);
> > +     if (err)
> > +             kfree(filter);
> > +
> > +     return err;
> > +}
> > +
> > +static void ocelot_mrp_save_mac(struct ocelot *ocelot,
> > +                             struct ocelot_port *port)
> > +{
> > +     ocelot_mact_learn(ocelot, PGID_MRP, mrp_test_dmac,
> > +                       port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> > +     ocelot_mact_learn(ocelot, PGID_MRP, mrp_control_dmac,
> > +                       port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> 
> Let me make sure I understand.
> By learning these multicast addresses, you mark them as 'not unknown' in
> the MAC table, because otherwise they will be flooded, including to the
> CPU port module, and there's no way you can remove the CPU from the
> flood mask, even if the packets get later redirected through VCAP IS2?

Yes, so far you are right.

> I mean that's the reason why we have the policer on the CPU port for the
> drop action in ocelot_vcap_init, no?

I am not sure that would work because I want the action to be redirect
and not policy. Or maybe I am missing something?

> 
> > diff --git a/include/soc/mscc/ocelot.h b/include/soc/mscc/ocelot.h
> > index 425ff29d9389..c41696d2e82b 100644
> > --- a/include/soc/mscc/ocelot.h
> > +++ b/include/soc/mscc/ocelot.h
> > @@ -51,6 +51,7 @@
> >   */
> >
> >  /* Reserve some destination PGIDs at the end of the range:
> > + * PGID_MRP: used for not flooding MRP frames to CPU
> 
> Could this be named PGID_BLACKHOLE or something? It isn't specific to
> MRP if I understand correctly. We should also probably initialize it
> with zero.

It shouldn't matter the value, what is important that the CPU port not
to be set. Because the value of this PGID will not be used in the
fowarding decision.
Currently only MRP is using it so that is the reason for naming it like
that but I can rename it and initialized it to 0 to be more clear.

> 
> >   * PGID_CPU: used for whitelisting certain MAC addresses, such as the addresses
> >   *           of the switch port net devices, towards the CPU port module.
> >   * PGID_UC: the flooding destinations for unknown unicast traffic.
> > @@ -59,6 +60,7 @@
> >   * PGID_MCIPV6: the flooding destinations for IPv6 multicast traffic.
> >   * PGID_BC: the flooding destinations for broadcast traffic.
> >   */
> > +#define PGID_MRP                     57
> >  #define PGID_CPU                     58
> >  #define PGID_UC                              59
> >  #define PGID_MC                              60
> > @@ -611,6 +613,8 @@ struct ocelot_port {
> >
> >       struct net_device               *bond;
> >       bool                            lag_tx_active;
> > +
> > +     u16                             mrp_ring_id;
> >  };
> >
> >  struct ocelot {
> > @@ -679,12 +683,6 @@ struct ocelot {
> >       /* Protects the PTP clock */
> >       spinlock_t                      ptp_clock_lock;
> >       struct ptp_pin_desc             ptp_pins[OCELOT_PTP_PINS_NUM];
> > -
> > -#if IS_ENABLED(CONFIG_BRIDGE_MRP)
> > -     u16                             mrp_ring_id;
> > -     struct net_device               *mrp_p_port;
> > -     struct net_device               *mrp_s_port;
> > -#endif
> >  };
> >
> >  struct ocelot_policer {
> > --
> > 2.30.1
> >
Vladimir Oltean March 11, 2021, 8:02 p.m. UTC | #3
On Thu, Mar 11, 2021 at 08:30:08PM +0100, Horatiu Vultur wrote:
> > > +static void ocelot_mrp_save_mac(struct ocelot *ocelot,
> > > +                             struct ocelot_port *port)
> > > +{
> > > +     ocelot_mact_learn(ocelot, PGID_MRP, mrp_test_dmac,
> > > +                       port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> > > +     ocelot_mact_learn(ocelot, PGID_MRP, mrp_control_dmac,
> > > +                       port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> >
> > Let me make sure I understand.
> > By learning these multicast addresses, you mark them as 'not unknown' in
> > the MAC table, because otherwise they will be flooded, including to the
> > CPU port module, and there's no way you can remove the CPU from the
> > flood mask, even if the packets get later redirected through VCAP IS2?
>
> Yes, so far you are right.
>
> > I mean that's the reason why we have the policer on the CPU port for the
> > drop action in ocelot_vcap_init, no?
>
> I am not sure that would work because I want the action to be redirect
> and not policy. Or maybe I am missing something?

Yes, it is not the same context as for tc-drop. The problem for tc-drop
was that the packets would get removed from the hardware datapath, but
they would still get copied to the CPU nonetheless. A policer there was
an OK solution because we wanted to kill those packets completely. Here,
the problem is the same, but we cannot use the same solution, since a
policer will also prevent the frames from being redirected.

> >
> > > diff --git a/include/soc/mscc/ocelot.h b/include/soc/mscc/ocelot.h
> > > index 425ff29d9389..c41696d2e82b 100644
> > > --- a/include/soc/mscc/ocelot.h
> > > +++ b/include/soc/mscc/ocelot.h
> > > @@ -51,6 +51,7 @@
> > >   */
> > >
> > >  /* Reserve some destination PGIDs at the end of the range:
> > > + * PGID_MRP: used for not flooding MRP frames to CPU
> >
> > Could this be named PGID_BLACKHOLE or something? It isn't specific to
> > MRP if I understand correctly. We should also probably initialize it
> > with zero.
>
> It shouldn't matter the value, what is important that the CPU port not
> to be set. Because the value of this PGID will not be used in the
> fowarding decision.
> Currently only MRP is using it so that is the reason for naming it like
> that but I can rename it and initialized it to 0 to be more clear.

So tell me more about this behavior.
Is there no way to suppress the flooding to CPU action, even if the
frame was hit by a TCAM rule? Let's forget about MRP, assume this is an
broadcast IPv4 packet, and we have a matching src_ip rule to perform
mirred egress redirect to another port.
Would the CPU be flooded with this traffic too? What would you do to
avoid that situation?
Horatiu Vultur March 12, 2021, 4:08 p.m. UTC | #4
The 03/11/2021 20:02, Vladimir Oltean wrote:
> 
> On Thu, Mar 11, 2021 at 08:30:08PM +0100, Horatiu Vultur wrote:
> > > > +static void ocelot_mrp_save_mac(struct ocelot *ocelot,
> > > > +                             struct ocelot_port *port)
> > > > +{
> > > > +     ocelot_mact_learn(ocelot, PGID_MRP, mrp_test_dmac,
> > > > +                       port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> > > > +     ocelot_mact_learn(ocelot, PGID_MRP, mrp_control_dmac,
> > > > +                       port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
> > >
> > > Let me make sure I understand.
> > > By learning these multicast addresses, you mark them as 'not unknown' in
> > > the MAC table, because otherwise they will be flooded, including to the
> > > CPU port module, and there's no way you can remove the CPU from the
> > > flood mask, even if the packets get later redirected through VCAP IS2?
> >
> > Yes, so far you are right.
> >
> > > I mean that's the reason why we have the policer on the CPU port for the
> > > drop action in ocelot_vcap_init, no?
> >
> > I am not sure that would work because I want the action to be redirect
> > and not policy. Or maybe I am missing something?
> 
> Yes, it is not the same context as for tc-drop. The problem for tc-drop
> was that the packets would get removed from the hardware datapath, but
> they would still get copied to the CPU nonetheless. A policer there was
> an OK solution because we wanted to kill those packets completely. Here,
> the problem is the same, but we cannot use the same solution, since a
> policer will also prevent the frames from being redirected.
> 
> > >
> > > > diff --git a/include/soc/mscc/ocelot.h b/include/soc/mscc/ocelot.h
> > > > index 425ff29d9389..c41696d2e82b 100644
> > > > --- a/include/soc/mscc/ocelot.h
> > > > +++ b/include/soc/mscc/ocelot.h
> > > > @@ -51,6 +51,7 @@
> > > >   */
> > > >
> > > >  /* Reserve some destination PGIDs at the end of the range:
> > > > + * PGID_MRP: used for not flooding MRP frames to CPU
> > >
> > > Could this be named PGID_BLACKHOLE or something? It isn't specific to
> > > MRP if I understand correctly. We should also probably initialize it
> > > with zero.
> >
> > It shouldn't matter the value, what is important that the CPU port not
> > to be set. Because the value of this PGID will not be used in the
> > fowarding decision.
> > Currently only MRP is using it so that is the reason for naming it like
> > that but I can rename it and initialized it to 0 to be more clear.
> 
> So tell me more about this behavior.
> Is there no way to suppress the flooding to CPU action, even if the
> frame was hit by a TCAM rule? Let's forget about MRP, assume this is an
> broadcast IPv4 packet, and we have a matching src_ip rule to perform
> mirred egress redirect to another port.
> Would the CPU be flooded with this traffic too? What would you do to
> avoid that situation?

I think so, I need to ask around to be able to answer your question.

You have to think about CPU port as a special port. If at any point
while the frame goes through the switch, there is a decision to copy the
frame to CPU, the frame will be copied to CPU regardless of the previous
or next decisions. That is at least my understanding.
diff mbox series

Patch

diff --git a/drivers/net/ethernet/mscc/ocelot.c b/drivers/net/ethernet/mscc/ocelot.c
index 46e5c9136bac..9b79363db17f 100644
--- a/drivers/net/ethernet/mscc/ocelot.c
+++ b/drivers/net/ethernet/mscc/ocelot.c
@@ -772,12 +772,6 @@  int ocelot_xtr_poll_frame(struct ocelot *ocelot, int grp, struct sk_buff **nskb)
 
 	skb->protocol = eth_type_trans(skb, dev);
 
-#if IS_ENABLED(CONFIG_BRIDGE_MRP)
-	if (skb->protocol == cpu_to_be16(ETH_P_MRP) &&
-	    cpuq & BIT(OCELOT_MRP_CPUQ))
-		skb->offload_fwd_mark = 0;
-#endif
-
 	*nskb = skb;
 
 	return 0;
diff --git a/drivers/net/ethernet/mscc/ocelot_mrp.c b/drivers/net/ethernet/mscc/ocelot_mrp.c
index 683da320bfd8..86b36e5d2279 100644
--- a/drivers/net/ethernet/mscc/ocelot_mrp.c
+++ b/drivers/net/ethernet/mscc/ocelot_mrp.c
@@ -1,8 +1,5 @@ 
 // SPDX-License-Identifier: (GPL-2.0 OR MIT)
 /* Microsemi Ocelot Switch driver
- *
- * This contains glue logic between the switchdev driver operations and the
- * mscc_ocelot_switch_lib.
  *
  * Copyright (c) 2017, 2019 Microsemi Corporation
  * Copyright 2020-2021 NXP Semiconductors
@@ -15,13 +12,33 @@ 
 #include "ocelot.h"
 #include "ocelot_vcap.h"
 
-static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int port)
+static const u8 mrp_test_dmac[] = {0x01, 0x15, 0x4e, 0x00, 0x00, 0x01 };
+static const u8 mrp_control_dmac[] = {0x01, 0x15, 0x4e, 0x00, 0x00, 0x02 };
+
+static int ocelot_mrp_find_port(struct ocelot *ocelot, struct ocelot_port *p)
+{
+	int i;
+
+	for (i = 0; i < ocelot->num_phys_ports; ++i) {
+		struct ocelot_port *ocelot_port = ocelot->ports[i];
+
+		if (!ocelot_port || p == ocelot_port)
+			continue;
+
+		if (ocelot_port->mrp_ring_id == p->mrp_ring_id)
+			return i;
+	}
+
+	return 0;
+}
+
+static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int id)
 {
 	struct ocelot_vcap_block *block_vcap_is2;
 	struct ocelot_vcap_filter *filter;
 
 	block_vcap_is2 = &ocelot->block[VCAP_IS2];
-	filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, port,
+	filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id,
 						     false);
 	if (!filter)
 		return 0;
@@ -29,6 +46,87 @@  static int ocelot_mrp_del_vcap(struct ocelot *ocelot, int port)
 	return ocelot_vcap_filter_del(ocelot, filter);
 }
 
+static int ocelot_mrp_redirect_add_vcap(struct ocelot *ocelot, int src_port,
+					int dst_port)
+{
+	const u8 mrp_test_mask[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
+	struct ocelot_vcap_filter *filter;
+	int err;
+
+	filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
+	if (!filter)
+		return -ENOMEM;
+
+	filter->key_type = OCELOT_VCAP_KEY_ETYPE;
+	filter->prio = 1;
+	filter->id.cookie = src_port;
+	filter->id.tc_offload = false;
+	filter->block_id = VCAP_IS2;
+	filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
+	filter->ingress_port_mask = BIT(src_port);
+	ether_addr_copy(filter->key.etype.dmac.value, mrp_test_dmac);
+	ether_addr_copy(filter->key.etype.dmac.mask, mrp_test_mask);
+	filter->action.mask_mode = OCELOT_MASK_MODE_REDIRECT;
+	filter->action.port_mask = BIT(dst_port);
+
+	err = ocelot_vcap_filter_add(ocelot, filter, NULL);
+	if (err)
+		kfree(filter);
+
+	return err;
+}
+
+static int ocelot_mrp_copy_add_vcap(struct ocelot *ocelot, int port,
+				    int prio, int cookie)
+{
+	const u8 mrp_mask[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0x00 };
+	struct ocelot_vcap_filter *filter;
+	int err;
+
+	filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
+	if (!filter)
+		return -ENOMEM;
+
+	filter->key_type = OCELOT_VCAP_KEY_ETYPE;
+	filter->prio = prio;
+	filter->id.cookie = cookie;
+	filter->id.tc_offload = false;
+	filter->block_id = VCAP_IS2;
+	filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
+	filter->ingress_port_mask = BIT(port);
+	/* Here is possible to use control or test dmac because the mask
+	 * doesn't cover the LSB
+	 */
+	ether_addr_copy(filter->key.etype.dmac.value, mrp_test_dmac);
+	ether_addr_copy(filter->key.etype.dmac.mask, mrp_mask);
+	filter->action.mask_mode = OCELOT_MASK_MODE_PERMIT_DENY;
+	filter->action.port_mask = 0x0;
+	filter->action.cpu_copy_ena = true;
+	filter->action.cpu_qu_num = OCELOT_MRP_CPUQ;
+
+	err = ocelot_vcap_filter_add(ocelot, filter, NULL);
+	if (err)
+		kfree(filter);
+
+	return err;
+}
+
+static void ocelot_mrp_save_mac(struct ocelot *ocelot,
+				struct ocelot_port *port)
+{
+	ocelot_mact_learn(ocelot, PGID_MRP, mrp_test_dmac,
+			  port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
+	ocelot_mact_learn(ocelot, PGID_MRP, mrp_control_dmac,
+			  port->pvid_vlan.vid, ENTRYTYPE_LOCKED);
+}
+
+static void ocelot_mrp_del_mac(struct ocelot *ocelot,
+			       struct ocelot_port *port)
+{
+	ocelot_mact_forget(ocelot, mrp_test_dmac, port->pvid_vlan.vid);
+	ocelot_mact_forget(ocelot, mrp_control_dmac, port->pvid_vlan.vid);
+}
+
 int ocelot_mrp_add(struct ocelot *ocelot, int port,
 		   const struct switchdev_obj_mrp *mrp)
 {
@@ -45,18 +143,7 @@  int ocelot_mrp_add(struct ocelot *ocelot, int port,
 	if (mrp->p_port != dev && mrp->s_port != dev)
 		return 0;
 
-	if (ocelot->mrp_ring_id != 0 &&
-	    ocelot->mrp_s_port &&
-	    ocelot->mrp_p_port)
-		return -EINVAL;
-
-	if (mrp->p_port == dev)
-		ocelot->mrp_p_port = dev;
-
-	if (mrp->s_port == dev)
-		ocelot->mrp_s_port = dev;
-
-	ocelot->mrp_ring_id = mrp->ring_id;
+	ocelot_port->mrp_ring_id = mrp->ring_id;
 
 	return 0;
 }
@@ -66,34 +153,31 @@  int ocelot_mrp_del(struct ocelot *ocelot, int port,
 		   const struct switchdev_obj_mrp *mrp)
 {
 	struct ocelot_port *ocelot_port = ocelot->ports[port];
-	struct ocelot_port_private *priv;
-	struct net_device *dev;
+	int i;
 
 	if (!ocelot_port)
 		return -EOPNOTSUPP;
 
-	priv = container_of(ocelot_port, struct ocelot_port_private, port);
-	dev = priv->dev;
-
-	if (ocelot->mrp_p_port != dev && ocelot->mrp_s_port != dev)
+	if (ocelot_port->mrp_ring_id != mrp->ring_id)
 		return 0;
 
-	if (ocelot->mrp_ring_id == 0 &&
-	    !ocelot->mrp_s_port &&
-	    !ocelot->mrp_p_port)
-		return -EINVAL;
+	ocelot_mrp_del_vcap(ocelot, port);
+	ocelot_mrp_del_vcap(ocelot, port + ocelot->num_phys_ports);
 
-	if (ocelot_mrp_del_vcap(ocelot, priv->chip_port))
-		return -EINVAL;
+	ocelot_port->mrp_ring_id = 0;
 
-	if (ocelot->mrp_p_port == dev)
-		ocelot->mrp_p_port = NULL;
+	for (i = 0; i < ocelot->num_phys_ports; ++i) {
+		ocelot_port = ocelot->ports[i];
 
-	if (ocelot->mrp_s_port == dev)
-		ocelot->mrp_s_port = NULL;
+		if (!ocelot_port)
+			continue;
 
-	ocelot->mrp_ring_id = 0;
+		if (ocelot_port->mrp_ring_id != 0)
+			goto out;
+	}
 
+	ocelot_mrp_del_mac(ocelot, ocelot->ports[port]);
+out:
 	return 0;
 }
 EXPORT_SYMBOL(ocelot_mrp_del);
@@ -102,49 +186,36 @@  int ocelot_mrp_add_ring_role(struct ocelot *ocelot, int port,
 			     const struct switchdev_obj_ring_role_mrp *mrp)
 {
 	struct ocelot_port *ocelot_port = ocelot->ports[port];
-	struct ocelot_vcap_filter *filter;
-	struct ocelot_port_private *priv;
-	struct net_device *dev;
+	int dst_port;
 	int err;
 
 	if (!ocelot_port)
 		return -EOPNOTSUPP;
 
-	priv = container_of(ocelot_port, struct ocelot_port_private, port);
-	dev = priv->dev;
-
-	if (ocelot->mrp_ring_id != mrp->ring_id)
-		return -EINVAL;
-
-	if (!mrp->sw_backup)
+	if (mrp->ring_role != BR_MRP_RING_ROLE_MRC && !mrp->sw_backup)
 		return -EOPNOTSUPP;
 
-	if (ocelot->mrp_p_port != dev && ocelot->mrp_s_port != dev)
+	if (ocelot_port->mrp_ring_id != mrp->ring_id)
 		return 0;
 
-	filter = kzalloc(sizeof(*filter), GFP_ATOMIC);
-	if (!filter)
-		return -ENOMEM;
+	ocelot_mrp_save_mac(ocelot, ocelot_port);
 
-	filter->key_type = OCELOT_VCAP_KEY_ETYPE;
-	filter->prio = 1;
-	filter->id.cookie = priv->chip_port;
-	filter->id.tc_offload = false;
-	filter->block_id = VCAP_IS2;
-	filter->type = OCELOT_VCAP_FILTER_OFFLOAD;
-	filter->ingress_port_mask = BIT(priv->chip_port);
-	*(__be16 *)filter->key.etype.etype.value = htons(ETH_P_MRP);
-	*(__be16 *)filter->key.etype.etype.mask = htons(0xffff);
-	filter->action.mask_mode = OCELOT_MASK_MODE_PERMIT_DENY;
-	filter->action.port_mask = 0x0;
-	filter->action.cpu_copy_ena = true;
-	filter->action.cpu_qu_num = OCELOT_MRP_CPUQ;
+	if (mrp->ring_role != BR_MRP_RING_ROLE_MRC)
+		return ocelot_mrp_copy_add_vcap(ocelot, port, 1, port);
 
-	err = ocelot_vcap_filter_add(ocelot, filter, NULL);
+	dst_port = ocelot_mrp_find_port(ocelot, ocelot_port);
+	err = ocelot_mrp_redirect_add_vcap(ocelot, port, dst_port);
 	if (err)
-		kfree(filter);
+		return err;
 
-	return err;
+	err = ocelot_mrp_copy_add_vcap(ocelot, port, 2,
+				       port + ocelot->num_phys_ports);
+	if (err) {
+		ocelot_mrp_del_vcap(ocelot, port);
+		return err;
+	}
+
+	return 0;
 }
 EXPORT_SYMBOL(ocelot_mrp_add_ring_role);
 
@@ -152,24 +223,32 @@  int ocelot_mrp_del_ring_role(struct ocelot *ocelot, int port,
 			     const struct switchdev_obj_ring_role_mrp *mrp)
 {
 	struct ocelot_port *ocelot_port = ocelot->ports[port];
-	struct ocelot_port_private *priv;
-	struct net_device *dev;
+	int i;
 
 	if (!ocelot_port)
 		return -EOPNOTSUPP;
 
-	priv = container_of(ocelot_port, struct ocelot_port_private, port);
-	dev = priv->dev;
-
-	if (ocelot->mrp_ring_id != mrp->ring_id)
-		return -EINVAL;
-
-	if (!mrp->sw_backup)
+	if (mrp->ring_role != BR_MRP_RING_ROLE_MRC && !mrp->sw_backup)
 		return -EOPNOTSUPP;
 
-	if (ocelot->mrp_p_port != dev && ocelot->mrp_s_port != dev)
+	if (ocelot_port->mrp_ring_id != mrp->ring_id)
 		return 0;
 
-	return ocelot_mrp_del_vcap(ocelot, priv->chip_port);
+	ocelot_mrp_del_vcap(ocelot, port);
+	ocelot_mrp_del_vcap(ocelot, port + ocelot->num_phys_ports);
+
+	for (i = 0; i < ocelot->num_phys_ports; ++i) {
+		ocelot_port = ocelot->ports[i];
+
+		if (!ocelot_port)
+			continue;
+
+		if (ocelot_port->mrp_ring_id != 0)
+			goto out;
+	}
+
+	ocelot_mrp_del_mac(ocelot, ocelot->ports[port]);
+out:
+	return 0;
 }
 EXPORT_SYMBOL(ocelot_mrp_del_ring_role);
diff --git a/include/soc/mscc/ocelot.h b/include/soc/mscc/ocelot.h
index 425ff29d9389..c41696d2e82b 100644
--- a/include/soc/mscc/ocelot.h
+++ b/include/soc/mscc/ocelot.h
@@ -51,6 +51,7 @@ 
  */
 
 /* Reserve some destination PGIDs at the end of the range:
+ * PGID_MRP: used for not flooding MRP frames to CPU
  * PGID_CPU: used for whitelisting certain MAC addresses, such as the addresses
  *           of the switch port net devices, towards the CPU port module.
  * PGID_UC: the flooding destinations for unknown unicast traffic.
@@ -59,6 +60,7 @@ 
  * PGID_MCIPV6: the flooding destinations for IPv6 multicast traffic.
  * PGID_BC: the flooding destinations for broadcast traffic.
  */
+#define PGID_MRP			57
 #define PGID_CPU			58
 #define PGID_UC				59
 #define PGID_MC				60
@@ -611,6 +613,8 @@  struct ocelot_port {
 
 	struct net_device		*bond;
 	bool				lag_tx_active;
+
+	u16				mrp_ring_id;
 };
 
 struct ocelot {
@@ -679,12 +683,6 @@  struct ocelot {
 	/* Protects the PTP clock */
 	spinlock_t			ptp_clock_lock;
 	struct ptp_pin_desc		ptp_pins[OCELOT_PTP_PINS_NUM];
-
-#if IS_ENABLED(CONFIG_BRIDGE_MRP)
-	u16				mrp_ring_id;
-	struct net_device		*mrp_p_port;
-	struct net_device		*mrp_s_port;
-#endif
 };
 
 struct ocelot_policer {