On Sat Jul 11 2020, Florian Fainelli wrote:
> On 7/10/2020 4:36 AM, Kurt Kanzenbach wrote:
>> Add a basic DSA driver for Hirschmann Hellcreek switches. Those switches are
>> implementing features needed for Time Sensitive Networking (TSN) such as 
>> support
>> for the Time Precision Protocol and various shapers like the Time Aware 
>> Shaper.
>> 
>> This driver includes basic support for networking:
>> 
>>   * VLAN handling
>>   * FDB handling
>>   * Port statistics
>>   * STP
>>   * Phylink
>> 
>> Signed-off-by: Kurt Kanzenbach <k...@linutronix.de>
>> ---
>
> [snip]
>
>> +++ b/drivers/net/dsa/hirschmann/Kconfig
>> @@ -0,0 +1,7 @@
>> +# SPDX-License-Identifier: GPL-2.0
>> +config NET_DSA_HIRSCHMANN_HELLCREEK
>> +    tristate "Hirschmann Hellcreek TSN Switch support"
>> +    depends on NET_DSA
>
> You most likely need a depends on HAS_IOMEM since this is a memory
> mapped interface.

OK.

>
> [snip]
>
>> +static void hellcreek_select_port(struct hellcreek *hellcreek, int port)
>> +{
>> +    u16 val = 0;
>> +
>> +    val |= port << HR_PSEL_PTWSEL_SHIFT;
>
> Why not just assign val to port << HR_PSEL_PTWSEL_SHIFT directly?

OK.

>
>> +
>> +    hellcreek_write(hellcreek, val, HR_PSEL);
>> +}
>> +
>> +static void hellcreek_select_prio(struct hellcreek *hellcreek, int prio)
>> +{
>> +    u16 val = 0;
>> +
>> +    val |= prio << HR_PSEL_PRTCWSEL_SHIFT;
>> +
>> +    hellcreek_write(hellcreek, val, HR_PSEL);
>
> Likewise
>
>> +}
>> +
>> +static void hellcreek_select_counter(struct hellcreek *hellcreek, int 
>> counter)
>> +{
>> +    u16 val = 0;
>> +
>> +    val |= counter << HR_CSEL_SHIFT;
>> +
>> +    hellcreek_write(hellcreek, val, HR_CSEL);
>> +
>> +    /* Data sheet states to wait at least 20 internal clock cycles */
>> +    ndelay(200);
>
> Likewise.
>
> [snip]
>
>> +static void hellcreek_feature_detect(struct hellcreek *hellcreek)
>> +{
>> +    u16 features;
>> +
>> +    features = hellcreek_read(hellcreek, HR_FEABITS0);
>> +
>> +    /* Currently we only detect the size of the FDB table */
>> +    hellcreek->fdb_entries = ((features & HR_FEABITS0_FDBBINS_MASK) >>
>> +                           HR_FEABITS0_FDBBINS_SHIFT) * 32;
>> +
>> +    dev_info(hellcreek->dev, "Feature detect: FDB entries=%zu\n",
>> +             hellcreek->fdb_entries);
>
> You may consider reporting this through devlink.
>
>> +}
>> +
>> +static enum dsa_tag_protocol hellcreek_get_tag_protocol(struct dsa_switch 
>> *ds,
>> +                                                    int port,
>> +                                                    enum dsa_tag_protocol 
>> mp)
>> +{
>> +    return DSA_TAG_PROTO_HELLCREEK;
>> +}
>> +
>> +static int hellcreek_port_enable(struct dsa_switch *ds, int port,
>> +                             struct phy_device *phy)
>> +{
>> +    struct hellcreek *hellcreek = ds->priv;
>> +    struct hellcreek_port *hellcreek_port;
>> +    unsigned long flags;
>> +    u16 val;
>> +
>> +    hellcreek_port = &hellcreek->ports[port];
>> +
>> +    dev_dbg(hellcreek->dev, "Enable port %d\n", port);
>> +
>> +    spin_lock_irqsave(&hellcreek->reg_lock, flags);
>
> Your usage of the spin lock is not entirely clear to me, but it protects
> more than just the register access, usually it has been sprinkled at the
> very beginning of the operations to be performed.
>
> DSA operations should always be RTNL protected and they can sleep. You
> do not appear to have an interrupt handler registered at all, so maybe
> you can replace this by a mutex, or drop the spin lock entirely?

Yes. However, the TAPRIO offloading patch adds hrtimers. Therefore, the
spin lock in the irq variant is needed.

>
> [snip]
>
>> +static int hellcreek_port_bridge_join(struct dsa_switch *ds, int port,
>> +                                  struct net_device *br)
>> +{
>> +    struct hellcreek *hellcreek = ds->priv;
>> +    u16 rx_vid = port;
>> +    int i;
>> +
>> +    dev_dbg(hellcreek->dev, "Port %d joins a bridge\n", port);
>> +
>> +    /* Configure port's vid to all other ports as egress untagged */
>> +    for (i = 2; i < NUM_PORTS; ++i) {
>> +            const struct switchdev_obj_port_vlan vlan = {
>> +                    .vid_begin = rx_vid,
>> +                    .vid_end = rx_vid,
>> +                    .flags = BRIDGE_VLAN_INFO_UNTAGGED,
>> +            };
>> +
>> +            if (i == port)
>> +                    continue;
>> +
>> +            hellcreek_vlan_add(ds, i, &vlan);
>
> Can you explain that part a little bit more what this VLAN programming
> does and why you need it?

Sure. To reflect the DSA port separation, I created two VLANs containing
each the CPU port and one front port. The bridge setup is now just
extending this to include all ports.

>
> The bridge will send a VLAN programming request with VLAN ID 1 as PVID,
> thus bringing all ports added to the bridge into the same broadcast
> domain.

I see. Maybe that works as well. I'll have to test it. Should the bridge
callbacks be removed then?

>
>> +    }
>> +
>> +    return 0;
>> +}
>> +
>> +static void hellcreek_port_bridge_leave(struct dsa_switch *ds, int port,
>> +                                    struct net_device *br)
>> +{
>> +    struct hellcreek *hellcreek = ds->priv;
>> +    u16 rx_vid = port;
>> +    int i, err;
>> +
>> +    dev_dbg(hellcreek->dev, "Port %d leaves a bridge\n", port);
>> +
>> +    /* Remove port's vid from all other ports */
>> +    for (i = 2; i < NUM_PORTS; ++i) {
>> +            const struct switchdev_obj_port_vlan vlan = {
>> +                    .vid_begin = rx_vid,
>> +                    .vid_end = rx_vid,
>> +            };
>> +
>> +            if (i == port)
>> +                    continue;
>> +
>> +            err = hellcreek_vlan_del(ds, i, &vlan);
>> +            if (err) {
>> +                    dev_err(hellcreek->dev, "Failed add vid %d to port 
>> %d\n",
>> +                            rx_vid, i);
>> +                    return;
>> +            }
>> +    }
>> +}
>> +
>> +static int __hellcreek_fdb_add(struct hellcreek *hellcreek,
>> +                           const struct hellcreek_fdb_entry *entry)
>> +{
>> +    int ret;
>> +    u16 meta = 0;
>> +
>> +    dev_dbg(hellcreek->dev, "Add static FDB entry: MAC=%pM, MASK=0x%02x, "
>> +            "OBT=%d, REPRIO_EN=%d, PRIO=%d\n", entry->mac, entry->portmask,
>> +            entry->is_obt, entry->reprio_en, entry->reprio_tc);
>> +
>> +    /* Add mac address */
>> +    hellcreek_write(hellcreek, entry->mac[1] | (entry->mac[0] << 8), 
>> HR_FDBWDH);
>> +    hellcreek_write(hellcreek, entry->mac[3] | (entry->mac[2] << 8), 
>> HR_FDBWDM);
>> +    hellcreek_write(hellcreek, entry->mac[5] | (entry->mac[4] << 8), 
>> HR_FDBWDL);
>> +
>> +    /* Meta data */
>> +    meta |= entry->portmask << HR_FDBWRM0_PORTMASK_SHIFT;
>> +    if (entry->is_obt)
>> +            meta |= HR_FDBWRM0_OBT;
>> +    if (entry->reprio_en) {
>> +            meta |= HR_FDBWRM0_REPRIO_EN;
>> +            meta |= entry->reprio_tc << HR_FDBWRM0_REPRIO_TC_SHIFT;
>> +    }
>> +    hellcreek_write(hellcreek, meta, HR_FDBWRM0);
>> +
>> +    /* Commit */
>> +    hellcreek_write(hellcreek, 0x00, HR_FDBWRCMD);
>> +
>> +    /* Wait until done */
>> +    ret = hellcreek_wait_fdb_ready(hellcreek);
>> +
>> +    return ret;
>
> Can you just do a tail call return here?

Sure.

>
>> +}
>> +
>> +static int __hellcreek_fdb_del(struct hellcreek *hellcreek,
>> +                           const struct hellcreek_fdb_entry *entry)
>> +{
>> +    int ret;
>> +
>> +    dev_dbg(hellcreek->dev, "Delete FDB entry: MAC=%pM!\n", entry->mac);
>> +
>> +    /* Delete by matching idx */
>> +    hellcreek_write(hellcreek, entry->idx | HR_FDBWRCMD_FDBDEL, 
>> HR_FDBWRCMD);
>> +
>> +    /* Wait until done */
>> +    ret = hellcreek_wait_fdb_ready(hellcreek);
>> +
>> +    return ret;
>
> Likewise
>
>> +}
>> +
>> +/* Retrieve the index of a FDB entry by mac address. Currently we search 
>> through
>> + * the complete table in hardware. If that's too slow, we might have to 
>> cache
>> + * the complete FDB table in software.
>> + */
>> +static int hellcreek_fdb_get(struct hellcreek *hellcreek,
>> +                         const unsigned char *dest,
>> +                         struct hellcreek_fdb_entry *entry)
>> +{
>> +    size_t i;
>> +
>> +    /* Set read pointer to zero: The read of HR_FDBMAX (read-only register)
>> +     * should reset the internal pointer. But, that doesn't work. The vendor
>> +     * suggested a subsequent write as workaround. Same for HR_FDBRDH below.
>> +     */
>> +    hellcreek_read(hellcreek, HR_FDBMAX);
>> +    hellcreek_write(hellcreek, 0x00, HR_FDBMAX);
>> +
>> +    /* We have to read the complete table, because the switch/driver might
>> +     * enter new entries anywhere.
>> +     */
>> +    for (i = 0; i < hellcreek->fdb_entries; ++i) {
>> +            unsigned char addr[ETH_ALEN];
>> +            u16 meta, mac;
>> +
>> +            meta    = hellcreek_read(hellcreek, HR_FDBMDRD);
>> +            mac     = hellcreek_read(hellcreek, HR_FDBRDL);
>> +            addr[5] = mac & 0xff;
>> +            addr[4] = (mac & 0xff00) >> 8;
>> +            mac     = hellcreek_read(hellcreek, HR_FDBRDM);
>> +            addr[3] = mac & 0xff;
>> +            addr[2] = (mac & 0xff00) >> 8;
>> +            mac     = hellcreek_read(hellcreek, HR_FDBRDH);
>> +            addr[1] = mac & 0xff;
>> +            addr[0] = (mac & 0xff00) >> 8;
>> +
>> +            /* Force next entry */
>> +            hellcreek_write(hellcreek, 0x00, HR_FDBRDH);
>> +
>> +            if (memcmp(addr, dest, 6))
>
> ETH_ALEN instead of 6 would make it obvious what this is about

Of course. I've simply missed that.

> , don't
> you also need to compare against a VLAN ID somehow?

The hardware doesn't provide VLAN information for fdb entries.

>
> [snip]
>
>> +
>> +/* Default setup for DSA:
>> + *  VLAN 2: CPU and Port 1 egress untagged.
>> + *  VLAN 3: CPU and Port 2 egress untagged.
>
> Can you use any of the DSA_TAG_8021Q services to help you with that?

Maybe dsa_port_setup_8021q_tagging() could be used. It does distinguish
between RX and TX, but I assume it'd also work. Needs to be tested.

>
> [snip]
>
>> +
>> +static const struct dsa_switch_ops hellcreek_ds_ops = {
>> +    .get_tag_protocol    = hellcreek_get_tag_protocol,
>> +    .setup               = hellcreek_setup,
>> +    .get_strings         = hellcreek_get_strings,
>> +    .get_ethtool_stats   = hellcreek_get_ethtool_stats,
>> +    .get_sset_count      = hellcreek_get_sset_count,
>> +    .port_enable         = hellcreek_port_enable,
>> +    .port_disable        = hellcreek_port_disable,
>> +    .port_vlan_filtering = hellcreek_vlan_filtering,
>> +    .port_vlan_prepare   = hellcreek_vlan_prepare,
>> +    .port_vlan_add       = hellcreek_vlan_add,
>> +    .port_vlan_del       = hellcreek_vlan_del,
>> +    .port_fdb_dump       = hellcreek_fdb_dump,
>> +    .port_fdb_add        = hellcreek_fdb_add,
>> +    .port_fdb_del        = hellcreek_fdb_del,
>> +    .port_bridge_join    = hellcreek_port_bridge_join,
>> +    .port_bridge_leave   = hellcreek_port_bridge_leave,
>> +    .port_stp_state_set  = hellcreek_port_stp_state_set,> + 
>> .phylink_validate    = hellcreek_phylink_validate,
>
> No mac_config, mac_link_up or mac_link_down operations?

No, they're not needed. Currently the hardware only does 100Mbit/s full
duplex. So, I've just created the phylink validate function to advertise
that mask.

Thanks,
Kurt

Attachment: signature.asc
Description: PGP signature

Reply via email to