Received: by 2002:ab2:687:0:b0:1f4:6588:b3a7 with SMTP id s7csp265427lqe; Wed, 10 Apr 2024 01:06:21 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWoKrLmAk4O/JRCrnYGMOIC/P+FkueWO543ggA+MG3OSAdp/9Kt+VooWK3TYZOSuMvxZ1xn7gvvxPEvqF3YOsEt3PeCDS6DA62m2u0iBA== X-Google-Smtp-Source: AGHT+IGEqV3niX/xs2N1SBfR+eY6cAE7WGpqlxuaH/zAFI84eqd4U+OIt1PcDmkeqy1V7weVrjoE X-Received: by 2002:a05:6a00:9384:b0:6ec:fdfe:9bea with SMTP id ka4-20020a056a00938400b006ecfdfe9beamr1763481pfb.26.1712736380677; Wed, 10 Apr 2024 01:06:20 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712736380; cv=pass; d=google.com; s=arc-20160816; b=jiXBgcYNE1M3f68enHKWo3k2+QH3vevd9XwKjUZyzc+rXDbKF35rN19vEjXlaHhP3S i36BuOYIiR8KvSqEa4f/2oGpC9Om86p5xyZ4xewPZ0aTZ2NXzHoBC7z9oQI5Y1SR5Q0w cqY4tBFd327hie+WYM4sH3m9FchBmP+r4Go32y99kXgi4+cbf5vfO9bI8stS6ppUPa/b Hbbn24FlbWUkYTx12TMyNaQI86lrd1xIUKygZ28arP520zdde37EY27ewOblb6eTB0Tx 1m13m0UUgtEUp60NbUVM1ylJJFvueeXRzMq0XsgOVexhFDPUBR4lNn99srK3FQTd8YCr dYNQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=xncpLcB8/odIl/D6+utsSKxdJxZiyrerpqNf4bqgAwM=; fh=xy3EDVSRMNlSFVsP5Wn2j5SWi/RhhBunByN2Qm789Fk=; b=xdfV4uGMS7uhWBAM4n3AoZNceT6avPXxBvETqzvv6QxuBCFNDE2nk2gBkf2wKT+fXN WdWm0gltOQHTyMEbqd5ry5hdTQnoyhBPZqp/yv6R+v9uNkbk0pK0gKsyJX+8DD7/lHHY EiScvAuVYfXTf4fpzMjeHn23KL44a44+T3W1JddB+w/cGh7ciGpEb4d9LusLFOMcAZGm /hCj0+llOC+mMYESNNpVdSt7RJKb31mw4nLanQ08StOf/n/0Mo15Tbg6ObelwQxRfDvC GGdXLmWRlUEWY90IRDUdHYhXdRZ+DYdOaQ9ko/bWUpCO/wgGf2lCEqvA/3LxuJfPU+GO Qe5Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=pengutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-138132-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-138132-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id s36-20020a056a0017a400b006ed4fd36aebsi5217154pfg.196.2024.04.10.01.06.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Apr 2024 01:06:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-138132-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=pengutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-138132-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-138132-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 5910A283029 for ; Wed, 10 Apr 2024 08:06:20 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7B67513D617; Wed, 10 Apr 2024 08:06:08 +0000 (UTC) Received: from metis.whiteo.stw.pengutronix.de (metis.whiteo.stw.pengutronix.de [185.203.201.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 96A7213D2BE for ; Wed, 10 Apr 2024 08:06:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.203.201.7 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712736367; cv=none; b=V9GurM5JjN9TaINwLLGWpVSpdw5XCura9bexTZ0Q0u6e2/pZqhZj8v0KkoAUmqoWjVgzu+dCiVEgSkrF3NQAEIR0g9U/i2MHzHq3W9gjELl34WDuIvWkfrLNIckOjbpAK9AfkmAyTN20Qm+NthZ2Fr4Oz+SJFxwRwQSuUDUx/Dw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712736367; c=relaxed/simple; bh=QPq++0oGGAhF9jWbCS3UVNaYuVdly7/+G7Nn1QU2JyM=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=izmlHSXtBPkE4Y5yV6HAZBwl2m5ZBjReJoojgCGmDCVFDgKf9BamRf9QGDn0DstXzn5oXLwjjuWfzDlCm3TE100SI1yO0N+l7zpCakJcGTiXkhjzSSRtH2qKRMgANVpNXb0WwANbYkM+ZN/usgu2AjPnN/9U4COi8KjJ0CyXUp0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=pengutronix.de; spf=pass smtp.mailfrom=pengutronix.de; arc=none smtp.client-ip=185.203.201.7 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=pengutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=pengutronix.de Received: from drehscheibe.grey.stw.pengutronix.de ([2a0a:edc0:0:c01:1d::a2]) by metis.whiteo.stw.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1ruSy0-0004NN-Bg; Wed, 10 Apr 2024 10:06:00 +0200 Received: from [2a0a:edc0:0:1101:1d::ac] (helo=dude04.red.stw.pengutronix.de) by drehscheibe.grey.stw.pengutronix.de with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1ruSxx-00BSav-Rm; Wed, 10 Apr 2024 10:05:57 +0200 Received: from ore by dude04.red.stw.pengutronix.de with local (Exim 4.96) (envelope-from ) id 1ruSxx-005Ctk-2V; Wed, 10 Apr 2024 10:05:57 +0200 From: Oleksij Rempel To: "David S. Miller" , Andrew Lunn , Eric Dumazet , Florian Fainelli , Jakub Kicinski , Paolo Abeni , Vladimir Oltean , Woojung Huh , Arun Ramadoss Cc: Oleksij Rempel , Florian Fainelli , kernel@pengutronix.de, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, UNGLinuxDriver@microchip.com, David Ahern , Simon Horman , Willem de Bruijn , =?UTF-8?q?S=C3=B8ren=20Andersen?= Subject: [PATCH net-next v6 1/9] net: dsa: add support for DCB get/set apptrust configuration Date: Wed, 10 Apr 2024 10:05:48 +0200 Message-Id: <20240410080556.1241048-2-o.rempel@pengutronix.de> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240410080556.1241048-1-o.rempel@pengutronix.de> References: <20240410080556.1241048-1-o.rempel@pengutronix.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:c01:1d::a2 X-SA-Exim-Mail-From: ore@pengutronix.de X-SA-Exim-Scanned: No (on metis.whiteo.stw.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Add DCB support to get/set trust configuration for different packet priority information sources. Some switch allow to chose different source of packet priority classification. For example on KSZ switches it is possible to configure VLAN PCP and/or DSCP sources. Signed-off-by: Oleksij Rempel Reviewed-by: Florian Fainelli --- changes v6: - port_set_apptrust pointer should be tested in dsa_user_dcbnl_set_apptrust() changes v3: - s/to choice/to chose/ --- include/net/dsa.h | 4 ++++ net/dsa/user.c | 28 ++++++++++++++++++++++++++++ 2 files changed, 32 insertions(+) diff --git a/include/net/dsa.h b/include/net/dsa.h index 7c0da9effe4e9..96bde2aa86efd 100644 --- a/include/net/dsa.h +++ b/include/net/dsa.h @@ -955,6 +955,10 @@ struct dsa_switch_ops { u8 prio); int (*port_del_dscp_prio)(struct dsa_switch *ds, int port, u8 dscp, u8 prio); + int (*port_set_apptrust)(struct dsa_switch *ds, int port, + const u8 *sel, int nsel); + int (*port_get_apptrust)(struct dsa_switch *ds, int port, u8 *sel, + int *nsel); /* * Suspend and resume diff --git a/net/dsa/user.c b/net/dsa/user.c index 16d395bb1a1fe..aa6c26cd63f56 100644 --- a/net/dsa/user.c +++ b/net/dsa/user.c @@ -2136,6 +2136,32 @@ int dsa_user_change_mtu(struct net_device *dev, int new_mtu) return err; } +static int __maybe_unused +dsa_user_dcbnl_set_apptrust(struct net_device *dev, u8 *sel, int nsel) +{ + struct dsa_port *dp = dsa_user_to_port(dev); + struct dsa_switch *ds = dp->ds; + int port = dp->index; + + if (!ds->ops->port_set_apptrust) + return -EOPNOTSUPP; + + return ds->ops->port_set_apptrust(ds, port, sel, nsel); +} + +static int __maybe_unused +dsa_user_dcbnl_get_apptrust(struct net_device *dev, u8 *sel, int *nsel) +{ + struct dsa_port *dp = dsa_user_to_port(dev); + struct dsa_switch *ds = dp->ds; + int port = dp->index; + + if (!ds->ops->port_get_apptrust) + return -EOPNOTSUPP; + + return ds->ops->port_get_apptrust(ds, port, sel, nsel); +} + static int __maybe_unused dsa_user_dcbnl_set_default_prio(struct net_device *dev, struct dcb_app *app) { @@ -2376,6 +2402,8 @@ static const struct ethtool_ops dsa_user_ethtool_ops = { static const struct dcbnl_rtnl_ops __maybe_unused dsa_user_dcbnl_ops = { .ieee_setapp = dsa_user_dcbnl_ieee_setapp, .ieee_delapp = dsa_user_dcbnl_ieee_delapp, + .dcbnl_setapptrust = dsa_user_dcbnl_set_apptrust, + .dcbnl_getapptrust = dsa_user_dcbnl_get_apptrust, }; static void dsa_user_get_stats64(struct net_device *dev, -- 2.39.2