1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  *  Copyright (C) 2020 Felix Fietkau <nbd@nbd.name>
4  */
5 
6 #include <linux/if_ether.h>
7 #include <linux/rhashtable.h>
8 #include <linux/ip.h>
9 #include <linux/ipv6.h>
10 #include <net/flow_offload.h>
11 #include <net/pkt_cls.h>
12 #include <net/dsa.h>
13 #include "mtk_eth_soc.h"
14 #include "mtk_wed.h"
15 
16 struct mtk_flow_data {
17 	struct ethhdr eth;
18 
19 	union {
20 		struct {
21 			__be32 src_addr;
22 			__be32 dst_addr;
23 		} v4;
24 
25 		struct {
26 			struct in6_addr src_addr;
27 			struct in6_addr dst_addr;
28 		} v6;
29 	};
30 
31 	__be16 src_port;
32 	__be16 dst_port;
33 
34 	u16 vlan_in;
35 
36 	struct {
37 		u16 id;
38 		__be16 proto;
39 		u8 num;
40 	} vlan;
41 	struct {
42 		u16 sid;
43 		u8 num;
44 	} pppoe;
45 };
46 
47 static const struct rhashtable_params mtk_flow_ht_params = {
48 	.head_offset = offsetof(struct mtk_flow_entry, node),
49 	.key_offset = offsetof(struct mtk_flow_entry, cookie),
50 	.key_len = sizeof(unsigned long),
51 	.automatic_shrinking = true,
52 };
53 
54 static int
55 mtk_flow_set_ipv4_addr(struct mtk_eth *eth, struct mtk_foe_entry *foe,
56 		       struct mtk_flow_data *data, bool egress)
57 {
58 	return mtk_foe_entry_set_ipv4_tuple(eth, foe, egress,
59 					    data->v4.src_addr, data->src_port,
60 					    data->v4.dst_addr, data->dst_port);
61 }
62 
63 static int
64 mtk_flow_set_ipv6_addr(struct mtk_eth *eth, struct mtk_foe_entry *foe,
65 		       struct mtk_flow_data *data)
66 {
67 	return mtk_foe_entry_set_ipv6_tuple(eth, foe,
68 					    data->v6.src_addr.s6_addr32, data->src_port,
69 					    data->v6.dst_addr.s6_addr32, data->dst_port);
70 }
71 
72 static void
73 mtk_flow_offload_mangle_eth(const struct flow_action_entry *act, void *eth)
74 {
75 	void *dest = eth + act->mangle.offset;
76 	const void *src = &act->mangle.val;
77 
78 	if (act->mangle.offset > 8)
79 		return;
80 
81 	if (act->mangle.mask == 0xffff) {
82 		src += 2;
83 		dest += 2;
84 	}
85 
86 	memcpy(dest, src, act->mangle.mask ? 2 : 4);
87 }
88 
89 static int
90 mtk_flow_get_wdma_info(struct net_device *dev, const u8 *addr, struct mtk_wdma_info *info)
91 {
92 	struct net_device_path_stack stack;
93 	struct net_device_path *path;
94 	int err;
95 
96 	if (!dev)
97 		return -ENODEV;
98 
99 	if (!IS_ENABLED(CONFIG_NET_MEDIATEK_SOC_WED))
100 		return -1;
101 
102 	err = dev_fill_forward_path(dev, addr, &stack);
103 	if (err)
104 		return err;
105 
106 	path = &stack.path[stack.num_paths - 1];
107 	if (path->type != DEV_PATH_MTK_WDMA)
108 		return -1;
109 
110 	info->wdma_idx = path->mtk_wdma.wdma_idx;
111 	info->queue = path->mtk_wdma.queue;
112 	info->bss = path->mtk_wdma.bss;
113 	info->wcid = path->mtk_wdma.wcid;
114 
115 	return 0;
116 }
117 
118 
119 static int
120 mtk_flow_mangle_ports(const struct flow_action_entry *act,
121 		      struct mtk_flow_data *data)
122 {
123 	u32 val = ntohl(act->mangle.val);
124 
125 	switch (act->mangle.offset) {
126 	case 0:
127 		if (act->mangle.mask == ~htonl(0xffff))
128 			data->dst_port = cpu_to_be16(val);
129 		else
130 			data->src_port = cpu_to_be16(val >> 16);
131 		break;
132 	case 2:
133 		data->dst_port = cpu_to_be16(val);
134 		break;
135 	default:
136 		return -EINVAL;
137 	}
138 
139 	return 0;
140 }
141 
142 static int
143 mtk_flow_mangle_ipv4(const struct flow_action_entry *act,
144 		     struct mtk_flow_data *data)
145 {
146 	__be32 *dest;
147 
148 	switch (act->mangle.offset) {
149 	case offsetof(struct iphdr, saddr):
150 		dest = &data->v4.src_addr;
151 		break;
152 	case offsetof(struct iphdr, daddr):
153 		dest = &data->v4.dst_addr;
154 		break;
155 	default:
156 		return -EINVAL;
157 	}
158 
159 	memcpy(dest, &act->mangle.val, sizeof(u32));
160 
161 	return 0;
162 }
163 
164 static int
165 mtk_flow_get_dsa_port(struct net_device **dev)
166 {
167 #if IS_ENABLED(CONFIG_NET_DSA)
168 	struct dsa_port *dp;
169 
170 	dp = dsa_port_from_netdev(*dev);
171 	if (IS_ERR(dp))
172 		return -ENODEV;
173 
174 	if (dp->cpu_dp->tag_ops->proto != DSA_TAG_PROTO_MTK)
175 		return -ENODEV;
176 
177 	*dev = dsa_port_to_master(dp);
178 
179 	return dp->index;
180 #else
181 	return -ENODEV;
182 #endif
183 }
184 
185 static int
186 mtk_flow_set_output_device(struct mtk_eth *eth, struct mtk_foe_entry *foe,
187 			   struct net_device *dev, const u8 *dest_mac,
188 			   int *wed_index)
189 {
190 	struct mtk_wdma_info info = {};
191 	int pse_port, dsa_port, queue;
192 
193 	if (mtk_flow_get_wdma_info(dev, dest_mac, &info) == 0) {
194 		mtk_foe_entry_set_wdma(eth, foe, info.wdma_idx, info.queue,
195 				       info.bss, info.wcid);
196 		if (MTK_HAS_CAPS(eth->soc->caps, MTK_NETSYS_V2)) {
197 			switch (info.wdma_idx) {
198 			case 0:
199 				pse_port = 8;
200 				break;
201 			case 1:
202 				pse_port = 9;
203 				break;
204 			default:
205 				return -EINVAL;
206 			}
207 		} else {
208 			pse_port = 3;
209 		}
210 		*wed_index = info.wdma_idx;
211 		goto out;
212 	}
213 
214 	dsa_port = mtk_flow_get_dsa_port(&dev);
215 
216 	if (dev == eth->netdev[0])
217 		pse_port = 1;
218 	else if (dev == eth->netdev[1])
219 		pse_port = 2;
220 	else
221 		return -EOPNOTSUPP;
222 
223 	if (dsa_port >= 0) {
224 		mtk_foe_entry_set_dsa(eth, foe, dsa_port);
225 		queue = 3 + dsa_port;
226 	} else {
227 		queue = pse_port - 1;
228 	}
229 	mtk_foe_entry_set_queue(eth, foe, queue);
230 
231 out:
232 	mtk_foe_entry_set_pse_port(eth, foe, pse_port);
233 
234 	return 0;
235 }
236 
237 static int
238 mtk_flow_offload_replace(struct mtk_eth *eth, struct flow_cls_offload *f)
239 {
240 	struct flow_rule *rule = flow_cls_offload_flow_rule(f);
241 	struct flow_action_entry *act;
242 	struct mtk_flow_data data = {};
243 	struct mtk_foe_entry foe;
244 	struct net_device *odev = NULL;
245 	struct mtk_flow_entry *entry;
246 	int offload_type = 0;
247 	int wed_index = -1;
248 	u16 addr_type = 0;
249 	u8 l4proto = 0;
250 	int err = 0;
251 	int i;
252 
253 	if (rhashtable_lookup(&eth->flow_table, &f->cookie, mtk_flow_ht_params))
254 		return -EEXIST;
255 
256 	if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_META)) {
257 		struct flow_match_meta match;
258 
259 		flow_rule_match_meta(rule, &match);
260 	} else {
261 		return -EOPNOTSUPP;
262 	}
263 
264 	if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_CONTROL)) {
265 		struct flow_match_control match;
266 
267 		flow_rule_match_control(rule, &match);
268 		addr_type = match.key->addr_type;
269 	} else {
270 		return -EOPNOTSUPP;
271 	}
272 
273 	if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_BASIC)) {
274 		struct flow_match_basic match;
275 
276 		flow_rule_match_basic(rule, &match);
277 		l4proto = match.key->ip_proto;
278 	} else {
279 		return -EOPNOTSUPP;
280 	}
281 
282 	switch (addr_type) {
283 	case 0:
284 		offload_type = MTK_PPE_PKT_TYPE_BRIDGE;
285 		if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_ETH_ADDRS)) {
286 			struct flow_match_eth_addrs match;
287 
288 			flow_rule_match_eth_addrs(rule, &match);
289 			memcpy(data.eth.h_dest, match.key->dst, ETH_ALEN);
290 			memcpy(data.eth.h_source, match.key->src, ETH_ALEN);
291 		} else {
292 			return -EOPNOTSUPP;
293 		}
294 
295 		if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_VLAN)) {
296 			struct flow_match_vlan match;
297 
298 			flow_rule_match_vlan(rule, &match);
299 
300 			if (match.key->vlan_tpid != cpu_to_be16(ETH_P_8021Q))
301 				return -EOPNOTSUPP;
302 
303 			data.vlan_in = match.key->vlan_id;
304 		}
305 		break;
306 	case FLOW_DISSECTOR_KEY_IPV4_ADDRS:
307 		offload_type = MTK_PPE_PKT_TYPE_IPV4_HNAPT;
308 		break;
309 	case FLOW_DISSECTOR_KEY_IPV6_ADDRS:
310 		offload_type = MTK_PPE_PKT_TYPE_IPV6_ROUTE_5T;
311 		break;
312 	default:
313 		return -EOPNOTSUPP;
314 	}
315 
316 	flow_action_for_each(i, act, &rule->action) {
317 		switch (act->id) {
318 		case FLOW_ACTION_MANGLE:
319 			if (offload_type == MTK_PPE_PKT_TYPE_BRIDGE)
320 				return -EOPNOTSUPP;
321 			if (act->mangle.htype == FLOW_ACT_MANGLE_HDR_TYPE_ETH)
322 				mtk_flow_offload_mangle_eth(act, &data.eth);
323 			break;
324 		case FLOW_ACTION_REDIRECT:
325 			odev = act->dev;
326 			break;
327 		case FLOW_ACTION_CSUM:
328 			break;
329 		case FLOW_ACTION_VLAN_PUSH:
330 			if (data.vlan.num == 1 ||
331 			    act->vlan.proto != htons(ETH_P_8021Q))
332 				return -EOPNOTSUPP;
333 
334 			data.vlan.id = act->vlan.vid;
335 			data.vlan.proto = act->vlan.proto;
336 			data.vlan.num++;
337 			break;
338 		case FLOW_ACTION_VLAN_POP:
339 			break;
340 		case FLOW_ACTION_PPPOE_PUSH:
341 			if (data.pppoe.num == 1)
342 				return -EOPNOTSUPP;
343 
344 			data.pppoe.sid = act->pppoe.sid;
345 			data.pppoe.num++;
346 			break;
347 		default:
348 			return -EOPNOTSUPP;
349 		}
350 	}
351 
352 	if (!is_valid_ether_addr(data.eth.h_source) ||
353 	    !is_valid_ether_addr(data.eth.h_dest))
354 		return -EINVAL;
355 
356 	err = mtk_foe_entry_prepare(eth, &foe, offload_type, l4proto, 0,
357 				    data.eth.h_source, data.eth.h_dest);
358 	if (err)
359 		return err;
360 
361 	if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_PORTS)) {
362 		struct flow_match_ports ports;
363 
364 		if (offload_type == MTK_PPE_PKT_TYPE_BRIDGE)
365 			return -EOPNOTSUPP;
366 
367 		flow_rule_match_ports(rule, &ports);
368 		data.src_port = ports.key->src;
369 		data.dst_port = ports.key->dst;
370 	} else if (offload_type != MTK_PPE_PKT_TYPE_BRIDGE) {
371 		return -EOPNOTSUPP;
372 	}
373 
374 	if (addr_type == FLOW_DISSECTOR_KEY_IPV4_ADDRS) {
375 		struct flow_match_ipv4_addrs addrs;
376 
377 		flow_rule_match_ipv4_addrs(rule, &addrs);
378 
379 		data.v4.src_addr = addrs.key->src;
380 		data.v4.dst_addr = addrs.key->dst;
381 
382 		mtk_flow_set_ipv4_addr(eth, &foe, &data, false);
383 	}
384 
385 	if (addr_type == FLOW_DISSECTOR_KEY_IPV6_ADDRS) {
386 		struct flow_match_ipv6_addrs addrs;
387 
388 		flow_rule_match_ipv6_addrs(rule, &addrs);
389 
390 		data.v6.src_addr = addrs.key->src;
391 		data.v6.dst_addr = addrs.key->dst;
392 
393 		mtk_flow_set_ipv6_addr(eth, &foe, &data);
394 	}
395 
396 	flow_action_for_each(i, act, &rule->action) {
397 		if (act->id != FLOW_ACTION_MANGLE)
398 			continue;
399 
400 		if (offload_type == MTK_PPE_PKT_TYPE_BRIDGE)
401 			return -EOPNOTSUPP;
402 
403 		switch (act->mangle.htype) {
404 		case FLOW_ACT_MANGLE_HDR_TYPE_TCP:
405 		case FLOW_ACT_MANGLE_HDR_TYPE_UDP:
406 			err = mtk_flow_mangle_ports(act, &data);
407 			break;
408 		case FLOW_ACT_MANGLE_HDR_TYPE_IP4:
409 			err = mtk_flow_mangle_ipv4(act, &data);
410 			break;
411 		case FLOW_ACT_MANGLE_HDR_TYPE_ETH:
412 			/* handled earlier */
413 			break;
414 		default:
415 			return -EOPNOTSUPP;
416 		}
417 
418 		if (err)
419 			return err;
420 	}
421 
422 	if (addr_type == FLOW_DISSECTOR_KEY_IPV4_ADDRS) {
423 		err = mtk_flow_set_ipv4_addr(eth, &foe, &data, true);
424 		if (err)
425 			return err;
426 	}
427 
428 	if (offload_type == MTK_PPE_PKT_TYPE_BRIDGE)
429 		foe.bridge.vlan = data.vlan_in;
430 
431 	if (data.vlan.num == 1) {
432 		if (data.vlan.proto != htons(ETH_P_8021Q))
433 			return -EOPNOTSUPP;
434 
435 		mtk_foe_entry_set_vlan(eth, &foe, data.vlan.id);
436 	}
437 	if (data.pppoe.num == 1)
438 		mtk_foe_entry_set_pppoe(eth, &foe, data.pppoe.sid);
439 
440 	err = mtk_flow_set_output_device(eth, &foe, odev, data.eth.h_dest,
441 					 &wed_index);
442 	if (err)
443 		return err;
444 
445 	if (wed_index >= 0 && (err = mtk_wed_flow_add(wed_index)) < 0)
446 		return err;
447 
448 	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
449 	if (!entry)
450 		return -ENOMEM;
451 
452 	entry->cookie = f->cookie;
453 	memcpy(&entry->data, &foe, sizeof(entry->data));
454 	entry->wed_index = wed_index;
455 
456 	err = mtk_foe_entry_commit(eth->ppe[entry->ppe_index], entry);
457 	if (err < 0)
458 		goto free;
459 
460 	err = rhashtable_insert_fast(&eth->flow_table, &entry->node,
461 				     mtk_flow_ht_params);
462 	if (err < 0)
463 		goto clear;
464 
465 	return 0;
466 
467 clear:
468 	mtk_foe_entry_clear(eth->ppe[entry->ppe_index], entry);
469 free:
470 	kfree(entry);
471 	if (wed_index >= 0)
472 	    mtk_wed_flow_remove(wed_index);
473 	return err;
474 }
475 
476 static int
477 mtk_flow_offload_destroy(struct mtk_eth *eth, struct flow_cls_offload *f)
478 {
479 	struct mtk_flow_entry *entry;
480 
481 	entry = rhashtable_lookup(&eth->flow_table, &f->cookie,
482 				  mtk_flow_ht_params);
483 	if (!entry)
484 		return -ENOENT;
485 
486 	mtk_foe_entry_clear(eth->ppe[entry->ppe_index], entry);
487 	rhashtable_remove_fast(&eth->flow_table, &entry->node,
488 			       mtk_flow_ht_params);
489 	if (entry->wed_index >= 0)
490 		mtk_wed_flow_remove(entry->wed_index);
491 	kfree(entry);
492 
493 	return 0;
494 }
495 
496 static int
497 mtk_flow_offload_stats(struct mtk_eth *eth, struct flow_cls_offload *f)
498 {
499 	struct mtk_flow_entry *entry;
500 	u32 idle;
501 
502 	entry = rhashtable_lookup(&eth->flow_table, &f->cookie,
503 				  mtk_flow_ht_params);
504 	if (!entry)
505 		return -ENOENT;
506 
507 	idle = mtk_foe_entry_idle_time(eth->ppe[entry->ppe_index], entry);
508 	f->stats.lastused = jiffies - idle * HZ;
509 
510 	return 0;
511 }
512 
513 static DEFINE_MUTEX(mtk_flow_offload_mutex);
514 
515 static int
516 mtk_eth_setup_tc_block_cb(enum tc_setup_type type, void *type_data, void *cb_priv)
517 {
518 	struct flow_cls_offload *cls = type_data;
519 	struct net_device *dev = cb_priv;
520 	struct mtk_mac *mac = netdev_priv(dev);
521 	struct mtk_eth *eth = mac->hw;
522 	int err;
523 
524 	if (!tc_can_offload(dev))
525 		return -EOPNOTSUPP;
526 
527 	if (type != TC_SETUP_CLSFLOWER)
528 		return -EOPNOTSUPP;
529 
530 	mutex_lock(&mtk_flow_offload_mutex);
531 	switch (cls->command) {
532 	case FLOW_CLS_REPLACE:
533 		err = mtk_flow_offload_replace(eth, cls);
534 		break;
535 	case FLOW_CLS_DESTROY:
536 		err = mtk_flow_offload_destroy(eth, cls);
537 		break;
538 	case FLOW_CLS_STATS:
539 		err = mtk_flow_offload_stats(eth, cls);
540 		break;
541 	default:
542 		err = -EOPNOTSUPP;
543 		break;
544 	}
545 	mutex_unlock(&mtk_flow_offload_mutex);
546 
547 	return err;
548 }
549 
550 static int
551 mtk_eth_setup_tc_block(struct net_device *dev, struct flow_block_offload *f)
552 {
553 	struct mtk_mac *mac = netdev_priv(dev);
554 	struct mtk_eth *eth = mac->hw;
555 	static LIST_HEAD(block_cb_list);
556 	struct flow_block_cb *block_cb;
557 	flow_setup_cb_t *cb;
558 
559 	if (!eth->soc->offload_version)
560 		return -EOPNOTSUPP;
561 
562 	if (f->binder_type != FLOW_BLOCK_BINDER_TYPE_CLSACT_INGRESS)
563 		return -EOPNOTSUPP;
564 
565 	cb = mtk_eth_setup_tc_block_cb;
566 	f->driver_block_list = &block_cb_list;
567 
568 	switch (f->command) {
569 	case FLOW_BLOCK_BIND:
570 		block_cb = flow_block_cb_lookup(f->block, cb, dev);
571 		if (block_cb) {
572 			flow_block_cb_incref(block_cb);
573 			return 0;
574 		}
575 		block_cb = flow_block_cb_alloc(cb, dev, dev, NULL);
576 		if (IS_ERR(block_cb))
577 			return PTR_ERR(block_cb);
578 
579 		flow_block_cb_incref(block_cb);
580 		flow_block_cb_add(block_cb, f);
581 		list_add_tail(&block_cb->driver_list, &block_cb_list);
582 		return 0;
583 	case FLOW_BLOCK_UNBIND:
584 		block_cb = flow_block_cb_lookup(f->block, cb, dev);
585 		if (!block_cb)
586 			return -ENOENT;
587 
588 		if (!flow_block_cb_decref(block_cb)) {
589 			flow_block_cb_remove(block_cb, f);
590 			list_del(&block_cb->driver_list);
591 		}
592 		return 0;
593 	default:
594 		return -EOPNOTSUPP;
595 	}
596 }
597 
598 int mtk_eth_setup_tc(struct net_device *dev, enum tc_setup_type type,
599 		     void *type_data)
600 {
601 	switch (type) {
602 	case TC_SETUP_BLOCK:
603 	case TC_SETUP_FT:
604 		return mtk_eth_setup_tc_block(dev, type_data);
605 	default:
606 		return -EOPNOTSUPP;
607 	}
608 }
609 
610 int mtk_eth_offload_init(struct mtk_eth *eth)
611 {
612 	return rhashtable_init(&eth->flow_table, &mtk_flow_ht_params);
613 }
614