mirror of
git://nv-tegra.nvidia.com/linux-nv-oot.git
synced 2025-12-24 10:11:26 +03:00
nvethernet: enable MAC filter
Functions added to support filter setting from Network stack as well as from customized app using ioctl. Bug 200512993 Change-Id: Id9a7712242ef229969d7c476c85171509ab53d73 Signed-off-by: Rakesh Goyal <rgoyal@nvidia.com> Reviewed-on: https://git-master.nvidia.com/r/2111084 Reviewed-by: Srinivas Ramachandran <srinivasra@nvidia.com> GVS: Gerrit_Virtual_Submit Reviewed-by: Narayan Reddy <narayanr@nvidia.com> Reviewed-by: Ashutosh Jha <ajha@nvidia.com> Reviewed-by: mobile promotions <svcmobile_promotions@nvidia.com> Tested-by: mobile promotions <svcmobile_promotions@nvidia.com>
This commit is contained in:
committed by
Revanth Kumar Uppala
parent
3565e0eb75
commit
6a3fdf61b3
@@ -162,6 +162,393 @@ static int ether_config_arp_offload(struct ether_priv_data *pdata,
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_config_l3_l4_filtering- This function is invoked by ioctl
|
||||
* when user issues an ioctl command to enable/disable L3/L4 filtering.
|
||||
*
|
||||
* @dev: pointer to net device structure.
|
||||
* @filter_flags: flag to indicate whether L3/L4 filtering to be
|
||||
* enabled/disabled.
|
||||
*
|
||||
* Algorithm:
|
||||
* 1) check if filter enalbed/disable already and return success.
|
||||
* 2) OSI call to update register
|
||||
*
|
||||
* Dependencies: MAC and PHY need to be initialized.
|
||||
*
|
||||
* Protection: None.
|
||||
*
|
||||
* Return 0- sucessful, non-zero - error
|
||||
*
|
||||
*/
|
||||
static int ether_config_l3_l4_filtering(struct net_device *dev,
|
||||
unsigned int filter_flags)
|
||||
{
|
||||
struct ether_priv_data *pdata = netdev_priv(dev);
|
||||
struct osi_core_priv_data *osi_core = pdata->osi_core;
|
||||
int ret = 0;
|
||||
|
||||
if (filter_flags == pdata->l3_l4_filter) {
|
||||
dev_err(pdata->dev, "L3/L4 filtering is already %d\n",
|
||||
filter_flags);
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = osi_config_l3_l4_filter_enable(osi_core, filter_flags);
|
||||
if (ret == 0) {
|
||||
spin_lock_bh(&pdata->ioctl_lock);
|
||||
pdata->l3_l4_filter = filter_flags;
|
||||
spin_unlock_bh(&pdata->ioctl_lock);
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_config_ip4_filters - this function is invoked by ioctl function
|
||||
* when user issues an ioctl command to configure L3(IPv4) filtering.
|
||||
*
|
||||
* @dev: Pointer to net device structure.
|
||||
* @ifdata: pointer to IOCTL specific structure.
|
||||
*
|
||||
* Algorithm:
|
||||
* 1) Enable/disable IPv4 filtering.
|
||||
* 2) Select source/destination address matching.
|
||||
* 3) Select perfect/inverse matching.
|
||||
* 4) Update the IPv4 address into MAC register.
|
||||
*
|
||||
* Dependencies: MAC and PHY need to be initialized.
|
||||
*
|
||||
* Protection: None.
|
||||
*
|
||||
* Return 0- sucessful, non-zero - error
|
||||
*/
|
||||
static int ether_config_ip4_filters(struct net_device *dev,
|
||||
struct ether_ifr_data *ifdata)
|
||||
{
|
||||
struct ether_priv_data *pdata = netdev_priv(dev);
|
||||
struct osi_core_priv_data *osi_core = pdata->osi_core;
|
||||
struct osi_l3_l4_filter *u_l3_filter =
|
||||
(struct osi_l3_l4_filter *)ifdata->ptr;
|
||||
struct osi_l3_l4_filter l_l3_filter;
|
||||
int ret = -EINVAL;
|
||||
|
||||
if (pdata->hw_feat.l3l4_filter_num == OSI_DISABLE) {
|
||||
dev_err(pdata->dev, "ip4 filter is not supported\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (ifdata->ptr == NULL) {
|
||||
dev_err(pdata->dev, "%s: Invalid data for priv ioctl %d\n",
|
||||
__func__, ifdata->ifcmd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (copy_from_user(&l_l3_filter, u_l3_filter,
|
||||
sizeof(struct osi_l3_l4_filter)) != 0U) {
|
||||
dev_err(pdata->dev, "%s copy from user failed\n", __func__);
|
||||
return -EFAULT;
|
||||
}
|
||||
|
||||
if (l_l3_filter.filter_no > (pdata->hw_feat.l3l4_filter_num - 1U)) {
|
||||
dev_err(pdata->dev, "%d filter is not supported in the HW\n",
|
||||
l_l3_filter.filter_no);
|
||||
return ret;
|
||||
}
|
||||
|
||||
spin_lock_bh(&pdata->ioctl_lock);
|
||||
if (pdata->l3_l4_filter == OSI_DISABLE) {
|
||||
ret = osi_config_l3_l4_filter_enable(osi_core, 1);
|
||||
if (ret == 0) {
|
||||
pdata->l3_l4_filter = OSI_ENABLE;
|
||||
}
|
||||
}
|
||||
spin_unlock_bh(&pdata->ioctl_lock);
|
||||
|
||||
/* configure the L3 filters */
|
||||
ret = osi_config_l3_filters(osi_core, l_l3_filter.filter_no,
|
||||
l_l3_filter.filter_enb_dis,
|
||||
OSI_IP4_FILTER,
|
||||
l_l3_filter.src_dst_addr_match,
|
||||
l_l3_filter.perfect_inverse_match);
|
||||
if (ret != 0) {
|
||||
dev_err(pdata->dev, "osi_config_l3_filters failed\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = osi_update_ip4_addr(osi_core, l_l3_filter.filter_no,
|
||||
l_l3_filter.ip4_addr,
|
||||
l_l3_filter.src_dst_addr_match);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_config_ip6_filters- This function is invoked by ioctl when user
|
||||
* issues an ioctl command to configure L3(IPv6) filtering.
|
||||
*
|
||||
* @dev: pointer to net device structure.
|
||||
* @ifdata:pointer to IOCTL specific structure.
|
||||
*
|
||||
* Algorithm:
|
||||
* 1) Enable/disable IPv6 filtering.
|
||||
* 2) Select source/destination address matching.
|
||||
* 3) Select perfect/inverse matching.
|
||||
* 4) Update the IPv6 address into MAC register.
|
||||
*
|
||||
* Dependencies: MAC and PHY need to be initialized.
|
||||
*
|
||||
* Protection: None.
|
||||
* Return 0- sucessful, non-zero - error
|
||||
*
|
||||
*/
|
||||
static int ether_config_ip6_filters(struct net_device *dev,
|
||||
struct ether_ifr_data *ifdata)
|
||||
{
|
||||
struct ether_priv_data *pdata = netdev_priv(dev);
|
||||
struct osi_core_priv_data *osi_core = pdata->osi_core;
|
||||
struct osi_l3_l4_filter *u_l3_filter =
|
||||
(struct osi_l3_l4_filter *)ifdata->ptr;
|
||||
struct osi_l3_l4_filter l_l3_filter;
|
||||
int ret = -EINVAL;
|
||||
|
||||
if (pdata->hw_feat.l3l4_filter_num == OSI_DISABLE) {
|
||||
dev_err(pdata->dev, "ip6 filter is not supported in the HW\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (ifdata->ptr == NULL) {
|
||||
dev_err(pdata->dev, "%s: Invalid data for priv ioctl %d\n",
|
||||
__func__, ifdata->ifcmd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (copy_from_user(&l_l3_filter, u_l3_filter,
|
||||
sizeof(struct osi_l3_l4_filter)) != 0U) {
|
||||
dev_err(pdata->dev, "%s copy from user failed\n", __func__);
|
||||
return -EFAULT;
|
||||
}
|
||||
|
||||
if (l_l3_filter.filter_no > (pdata->hw_feat.l3l4_filter_num - 1U)) {
|
||||
dev_err(pdata->dev, "%d filter is not supported in the HW\n",
|
||||
l_l3_filter.filter_no);
|
||||
return ret;
|
||||
}
|
||||
|
||||
spin_lock_bh(&pdata->ioctl_lock);
|
||||
if (pdata->l3_l4_filter == OSI_DISABLE) {
|
||||
ret = osi_config_l3_l4_filter_enable(osi_core, 1);
|
||||
if (ret == 0) {
|
||||
pdata->l3_l4_filter = OSI_ENABLE;
|
||||
}
|
||||
}
|
||||
spin_unlock_bh(&pdata->ioctl_lock);
|
||||
|
||||
/* configure the L3 filters */
|
||||
ret = osi_config_l3_filters(osi_core, l_l3_filter.filter_no,
|
||||
l_l3_filter.filter_enb_dis,
|
||||
OSI_IP6_FILTER,
|
||||
l_l3_filter.src_dst_addr_match,
|
||||
l_l3_filter.perfect_inverse_match);
|
||||
if (ret != 0) {
|
||||
dev_err(pdata->dev, "osi_config_l3_filters failed\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
return osi_update_ip6_addr(osi_core, l_l3_filter.filter_no,
|
||||
l_l3_filter.ip6_addr);
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_config_tcp_udp_filters- This function is invoked by
|
||||
* ioctl function when user issues an ioctl command to configure
|
||||
* L4(TCP/UDP) filtering.
|
||||
*
|
||||
* @dev: pointer to net device structure.
|
||||
* @ifdata: pointer to IOCTL specific structure.
|
||||
* @tcp_udp: flag to indicate TCP/UDP filtering.
|
||||
*
|
||||
* Algorithm:
|
||||
* 1) Enable/disable L4 filtering.
|
||||
* 2) Select TCP/UDP filtering.
|
||||
* 3) Select source/destination port matching.
|
||||
* 4) select perfect/inverse matching.
|
||||
* 5) Update the port number into MAC register.
|
||||
*
|
||||
* Dependencies: MAC and PHY need to be initialized.
|
||||
*
|
||||
* Protection: None.
|
||||
*
|
||||
* Return 0- sucessful, non-zero - error
|
||||
*
|
||||
*/
|
||||
static int ether_config_tcp_udp_filters(struct net_device *dev,
|
||||
struct ether_ifr_data *ifdata,
|
||||
unsigned int tcp_udp)
|
||||
{
|
||||
struct ether_priv_data *pdata = netdev_priv(dev);
|
||||
struct osi_core_priv_data *osi_core = pdata->osi_core;
|
||||
struct osi_l3_l4_filter *u_l4_filter =
|
||||
(struct osi_l3_l4_filter *)ifdata->ptr;
|
||||
struct osi_l3_l4_filter l_l4_filter;
|
||||
int ret = -EINVAL;
|
||||
|
||||
if (ifdata->ptr == NULL) {
|
||||
dev_err(pdata->dev, "%s: Invalid data for priv ioctl %d\n",
|
||||
__func__, ifdata->ifcmd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (pdata->hw_feat.l3l4_filter_num == OSI_DISABLE) {
|
||||
dev_err(pdata->dev,
|
||||
"L4 is not supported in the HW\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (copy_from_user(&l_l4_filter, u_l4_filter,
|
||||
sizeof(struct osi_l3_l4_filter)) != 0U) {
|
||||
dev_err(pdata->dev, "%s copy from user failed", __func__);
|
||||
return -EFAULT;
|
||||
}
|
||||
|
||||
if (l_l4_filter.filter_no > (pdata->hw_feat.l3l4_filter_num - 1U)) {
|
||||
dev_err(pdata->dev, "%d filter is not supported in the HW\n",
|
||||
l_l4_filter.filter_no);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/* configure the L4 filters */
|
||||
ret = osi_config_l4_filters(osi_core, l_l4_filter.filter_no,
|
||||
l_l4_filter.filter_enb_dis,
|
||||
tcp_udp,
|
||||
l_l4_filter.src_dst_addr_match,
|
||||
l_l4_filter.perfect_inverse_match);
|
||||
if (ret != 0) {
|
||||
dev_err(pdata->dev, "osi_config_l4_filters failed\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = osi_update_l4_port_no(osi_core, l_l4_filter.filter_no,
|
||||
l_l4_filter.port_no,
|
||||
l_l4_filter.src_dst_addr_match);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_config_vlan_filter- This function is invoked by ioctl function
|
||||
* when user issues an ioctl command to configure VALN filtering.
|
||||
*
|
||||
* @dev: pointer to net device structure.
|
||||
* @ifdata: pointer to IOCTL specific structure.
|
||||
*
|
||||
* Algorithm:
|
||||
* 1) enable/disable VLAN filtering.
|
||||
* 2) select perfect/hash filtering.
|
||||
*
|
||||
* Dependencies: MAC and PHY need to be initialized.
|
||||
*
|
||||
* Protection: None.
|
||||
*
|
||||
* Return 0- sucessful, non-zero - error
|
||||
*
|
||||
*/
|
||||
static int ether_config_vlan_filter(struct net_device *dev,
|
||||
struct ether_ifr_data *ifdata)
|
||||
{
|
||||
struct ether_priv_data *pdata = netdev_priv(dev);
|
||||
struct osi_core_priv_data *osi_core = pdata->osi_core;
|
||||
struct osi_vlan_filter *u_vlan_filter =
|
||||
(struct osi_vlan_filter *)ifdata->ptr;
|
||||
struct osi_vlan_filter l_vlan_filter;
|
||||
int ret = -EINVAL;
|
||||
|
||||
if (ifdata->ptr == NULL) {
|
||||
dev_err(pdata->dev, "%s: Invalid data for priv ioctl %d\n",
|
||||
__func__, ifdata->ifcmd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (copy_from_user(&l_vlan_filter, u_vlan_filter,
|
||||
sizeof(struct osi_vlan_filter)) != 0U) {
|
||||
dev_err(pdata->dev, "%s copy from user failed", __func__);
|
||||
return -EFAULT;
|
||||
}
|
||||
|
||||
/*0 - perfect and 1 - hash filtering */
|
||||
if ((l_vlan_filter.perfect_hash == OSI_HASH_FILTER_MODE) &&
|
||||
(pdata->hw_feat.vlan_hash_en == OSI_DISABLE)) {
|
||||
dev_err(pdata->dev, "VLAN HASH filtering is not supported\n");
|
||||
return ret;
|
||||
}
|
||||
/* configure the vlan filter FIXME: Current code supports VLAN
|
||||
filtering for last VLAN tag/id added or default tag/vid 1. */
|
||||
ret = osi_config_vlan_filtering(osi_core, l_vlan_filter.filter_enb_dis,
|
||||
l_vlan_filter.perfect_hash,
|
||||
l_vlan_filter.perfect_inverse_match);
|
||||
if (ret == 0) {
|
||||
pdata->vlan_hash_filtering = l_vlan_filter.perfect_hash;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_config_l2_da_filter- This function is invoked by ioctl function
|
||||
* when user issues an ioctl command to configure L2 destination
|
||||
* addressing filtering mode.
|
||||
*
|
||||
* @dev: Pointer to net device structure.
|
||||
* @ifdata: Pointer to IOCTL specific structure.
|
||||
*
|
||||
* Algorithm:
|
||||
* 1) Selects perfect/hash filtering.
|
||||
* 2) Selects perfect/inverse matching.
|
||||
*
|
||||
* Dependencies: MAC and PHY need to be initialized.
|
||||
*
|
||||
* Protection: None.
|
||||
*
|
||||
* Return 0- sucessful, non-zero - error
|
||||
*/
|
||||
static int ether_config_l2_da_filter(struct net_device *dev,
|
||||
struct ether_ifr_data *ifdata)
|
||||
{
|
||||
struct ether_priv_data *pdata = netdev_priv(dev);
|
||||
struct osi_core_priv_data *osi_core = pdata->osi_core;
|
||||
struct osi_l2_da_filter *u_l2_da_filter =
|
||||
(struct osi_l2_da_filter *)ifdata->ptr;
|
||||
struct osi_l2_da_filter l_l2_da_filter;
|
||||
int ret = -EINVAL;
|
||||
|
||||
if (ifdata->ptr == NULL) {
|
||||
dev_err(pdata->dev, "%s: Invalid data for priv ioctl %d\n",
|
||||
__func__, ifdata->ifcmd);
|
||||
return ret;
|
||||
}
|
||||
|
||||
if (copy_from_user(&l_l2_da_filter, u_l2_da_filter,
|
||||
sizeof(struct osi_l2_da_filter)) != 0U) {
|
||||
return -EFAULT;
|
||||
}
|
||||
if (l_l2_da_filter.perfect_hash == OSI_HASH_FILTER_MODE) {
|
||||
dev_err(pdata->dev,
|
||||
"select HASH FILTERING for L2 DA is not Supported in SW\n");
|
||||
return ret;
|
||||
} else {
|
||||
/* FIXME: Need to understand if filtering will work on addr0.
|
||||
* Do we need to have pdata->num_mac_addr_regs > 1 check?
|
||||
*/
|
||||
pdata->l2_filtering_mode = OSI_PERFECT_FILTER_MODE;
|
||||
}
|
||||
|
||||
/* configure L2 DA perfect/inverse_matching */
|
||||
ret = osi_config_l2_da_perfect_inverse_match(osi_core,
|
||||
l_l2_da_filter.perfect_inverse_match);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
/**
|
||||
* ether_priv_ioctl - Handle private IOCTLs
|
||||
* @ndev: network device structure
|
||||
@@ -202,6 +589,43 @@ int ether_handle_priv_ioctl(struct net_device *ndev,
|
||||
case ETHER_CONFIG_ARP_OFFLOAD:
|
||||
ret = ether_config_arp_offload(pdata, &ifdata);
|
||||
break;
|
||||
case EQOS_L3_L4_FILTER_CMD:
|
||||
/* flags should be 0x0 or 0x1, discard any other */
|
||||
if (pdata->hw_feat.l3l4_filter_num > 0U &&
|
||||
((ifdata.if_flags == OSI_ENABLE) ||
|
||||
(ifdata.if_flags == OSI_DISABLE))) {
|
||||
ret = ether_config_l3_l4_filtering(ndev,
|
||||
ifdata.if_flags);
|
||||
if (ret == 0) {
|
||||
ret = EQOS_CONFIG_SUCCESS;
|
||||
} else {
|
||||
ret = EQOS_CONFIG_FAIL;
|
||||
}
|
||||
} else {
|
||||
dev_err(pdata->dev, "L3/L4 filters are not supported\n");
|
||||
ret = -EOPNOTSUPP;
|
||||
}
|
||||
break;
|
||||
case EQOS_IPV4_FILTERING_CMD:
|
||||
ret = ether_config_ip4_filters(ndev, &ifdata);
|
||||
break;
|
||||
case EQOS_IPV6_FILTERING_CMD:
|
||||
ret = ether_config_ip6_filters(ndev, &ifdata);
|
||||
break;
|
||||
case EQOS_UDP_FILTERING_CMD:
|
||||
ret = ether_config_tcp_udp_filters(ndev, &ifdata,
|
||||
OSI_L4_FILTER_UDP);
|
||||
break;
|
||||
case EQOS_TCP_FILTERING_CMD:
|
||||
ret = ether_config_tcp_udp_filters(ndev, &ifdata,
|
||||
OSI_L4_FILTER_TCP);
|
||||
break;
|
||||
case EQOS_VLAN_FILTERING_CMD:
|
||||
ret = ether_config_vlan_filter(ndev, &ifdata);
|
||||
break;
|
||||
case EQOS_L2_DA_FILTERING_CMD:
|
||||
ret = ether_config_l2_da_filter(ndev, &ifdata);
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user