Contributors: 13
Author Tokens Token Proportion Commits Commit Proportion
Vladimir Oltean 1873 80.98% 6 22.22%
Furong Xu 248 10.72% 3 11.11%
Michal Kubeček 72 3.11% 3 11.11%
Jakub Kiciński 69 2.98% 2 7.41%
Heiner Kallweit 14 0.61% 2 7.41%
Scott Feldman 12 0.52% 1 3.70%
Faizal Rahim 7 0.30% 1 3.70%
Ong Boon Leong 6 0.26% 1 3.70%
Linus Torvalds (pre-git) 5 0.22% 3 11.11%
Stephen Hemminger 3 0.13% 1 3.70%
Giuseppe Cavallaro 2 0.09% 2 7.41%
Andy Shevchenko 1 0.04% 1 3.70%
Ingo Molnar 1 0.04% 1 3.70%
Total 2313 27


// SPDX-License-Identifier: GPL-2.0-only
/*
 * Copyright 2022-2025 NXP
 * Copyright 2024 Furong Xu <0x1207@gmail.com>
 */
#include "common.h"
#include "netlink.h"

struct mm_req_info {
	struct ethnl_req_info		base;
};

struct mm_reply_data {
	struct ethnl_reply_data		base;
	struct ethtool_mm_state		state;
	struct ethtool_mm_stats		stats;
};

#define MM_REPDATA(__reply_base) \
	container_of(__reply_base, struct mm_reply_data, base)

#define ETHTOOL_MM_STAT_CNT \
	(__ETHTOOL_A_MM_STAT_CNT - (ETHTOOL_A_MM_STAT_PAD + 1))

const struct nla_policy ethnl_mm_get_policy[ETHTOOL_A_MM_HEADER + 1] = {
	[ETHTOOL_A_MM_HEADER] = NLA_POLICY_NESTED(ethnl_header_policy_stats),
};

static int mm_prepare_data(const struct ethnl_req_info *req_base,
			   struct ethnl_reply_data *reply_base,
			   const struct genl_info *info)
{
	struct mm_reply_data *data = MM_REPDATA(reply_base);
	struct net_device *dev = reply_base->dev;
	const struct ethtool_ops *ops;
	int ret;

	ops = dev->ethtool_ops;

	if (!ops->get_mm)
		return -EOPNOTSUPP;

	ethtool_stats_init((u64 *)&data->stats,
			   sizeof(data->stats) / sizeof(u64));

	ret = ethnl_ops_begin(dev);
	if (ret < 0)
		return ret;

	ret = ops->get_mm(dev, &data->state);
	if (ret)
		goto out_complete;

	if (ops->get_mm_stats && (req_base->flags & ETHTOOL_FLAG_STATS))
		ops->get_mm_stats(dev, &data->stats);

out_complete:
	ethnl_ops_complete(dev);

	return ret;
}

static int mm_reply_size(const struct ethnl_req_info *req_base,
			 const struct ethnl_reply_data *reply_base)
{
	int len = 0;

	len += nla_total_size(sizeof(u8)); /* _MM_PMAC_ENABLED */
	len += nla_total_size(sizeof(u8)); /* _MM_TX_ENABLED */
	len += nla_total_size(sizeof(u8)); /* _MM_TX_ACTIVE */
	len += nla_total_size(sizeof(u8)); /* _MM_VERIFY_ENABLED */
	len += nla_total_size(sizeof(u8)); /* _MM_VERIFY_STATUS */
	len += nla_total_size(sizeof(u32)); /* _MM_VERIFY_TIME */
	len += nla_total_size(sizeof(u32)); /* _MM_MAX_VERIFY_TIME */
	len += nla_total_size(sizeof(u32)); /* _MM_TX_MIN_FRAG_SIZE */
	len += nla_total_size(sizeof(u32)); /* _MM_RX_MIN_FRAG_SIZE */

	if (req_base->flags & ETHTOOL_FLAG_STATS)
		len += nla_total_size(0) + /* _MM_STATS */
		       nla_total_size_64bit(sizeof(u64)) * ETHTOOL_MM_STAT_CNT;

	return len;
}

static int mm_put_stat(struct sk_buff *skb, u64 val, u16 attrtype)
{
	if (val == ETHTOOL_STAT_NOT_SET)
		return 0;
	if (nla_put_u64_64bit(skb, attrtype, val, ETHTOOL_A_MM_STAT_PAD))
		return -EMSGSIZE;
	return 0;
}

static int mm_put_stats(struct sk_buff *skb,
			const struct ethtool_mm_stats *stats)
{
	struct nlattr *nest;

	nest = nla_nest_start(skb, ETHTOOL_A_MM_STATS);
	if (!nest)
		return -EMSGSIZE;

	if (mm_put_stat(skb, stats->MACMergeFrameAssErrorCount,
			ETHTOOL_A_MM_STAT_REASSEMBLY_ERRORS) ||
	    mm_put_stat(skb, stats->MACMergeFrameSmdErrorCount,
			ETHTOOL_A_MM_STAT_SMD_ERRORS) ||
	    mm_put_stat(skb, stats->MACMergeFrameAssOkCount,
			ETHTOOL_A_MM_STAT_REASSEMBLY_OK) ||
	    mm_put_stat(skb, stats->MACMergeFragCountRx,
			ETHTOOL_A_MM_STAT_RX_FRAG_COUNT) ||
	    mm_put_stat(skb, stats->MACMergeFragCountTx,
			ETHTOOL_A_MM_STAT_TX_FRAG_COUNT) ||
	    mm_put_stat(skb, stats->MACMergeHoldCount,
			ETHTOOL_A_MM_STAT_HOLD_COUNT))
		goto err_cancel;

	nla_nest_end(skb, nest);
	return 0;

err_cancel:
	nla_nest_cancel(skb, nest);
	return -EMSGSIZE;
}

static int mm_fill_reply(struct sk_buff *skb,
			 const struct ethnl_req_info *req_base,
			 const struct ethnl_reply_data *reply_base)
{
	const struct mm_reply_data *data = MM_REPDATA(reply_base);
	const struct ethtool_mm_state *state = &data->state;

	if (nla_put_u8(skb, ETHTOOL_A_MM_TX_ENABLED, state->tx_enabled) ||
	    nla_put_u8(skb, ETHTOOL_A_MM_TX_ACTIVE, state->tx_active) ||
	    nla_put_u8(skb, ETHTOOL_A_MM_PMAC_ENABLED, state->pmac_enabled) ||
	    nla_put_u8(skb, ETHTOOL_A_MM_VERIFY_ENABLED, state->verify_enabled) ||
	    nla_put_u8(skb, ETHTOOL_A_MM_VERIFY_STATUS, state->verify_status) ||
	    nla_put_u32(skb, ETHTOOL_A_MM_VERIFY_TIME, state->verify_time) ||
	    nla_put_u32(skb, ETHTOOL_A_MM_MAX_VERIFY_TIME, state->max_verify_time) ||
	    nla_put_u32(skb, ETHTOOL_A_MM_TX_MIN_FRAG_SIZE, state->tx_min_frag_size) ||
	    nla_put_u32(skb, ETHTOOL_A_MM_RX_MIN_FRAG_SIZE, state->rx_min_frag_size))
		return -EMSGSIZE;

	if (req_base->flags & ETHTOOL_FLAG_STATS &&
	    mm_put_stats(skb, &data->stats))
		return -EMSGSIZE;

	return 0;
}

const struct nla_policy ethnl_mm_set_policy[ETHTOOL_A_MM_MAX + 1] = {
	[ETHTOOL_A_MM_HEADER]		= NLA_POLICY_NESTED(ethnl_header_policy),
	[ETHTOOL_A_MM_VERIFY_ENABLED]	= NLA_POLICY_MAX(NLA_U8, 1),
	[ETHTOOL_A_MM_VERIFY_TIME]	= NLA_POLICY_RANGE(NLA_U32, 1, 128),
	[ETHTOOL_A_MM_TX_ENABLED]	= NLA_POLICY_MAX(NLA_U8, 1),
	[ETHTOOL_A_MM_PMAC_ENABLED]	= NLA_POLICY_MAX(NLA_U8, 1),
	[ETHTOOL_A_MM_TX_MIN_FRAG_SIZE]	= NLA_POLICY_RANGE(NLA_U32, 60, 252),
};

static void mm_state_to_cfg(const struct ethtool_mm_state *state,
			    struct ethtool_mm_cfg *cfg)
{
	/* We could also compare state->verify_status against
	 * ETHTOOL_MM_VERIFY_STATUS_DISABLED, but state->verify_enabled
	 * is more like an administrative state which should be seen in
	 * ETHTOOL_MSG_MM_GET replies. For example, a port with verification
	 * disabled might be in the ETHTOOL_MM_VERIFY_STATUS_INITIAL
	 * if it's down.
	 */
	cfg->verify_enabled = state->verify_enabled;
	cfg->verify_time = state->verify_time;
	cfg->tx_enabled = state->tx_enabled;
	cfg->pmac_enabled = state->pmac_enabled;
	cfg->tx_min_frag_size = state->tx_min_frag_size;
}

static int
ethnl_set_mm_validate(struct ethnl_req_info *req_info, struct genl_info *info)
{
	const struct ethtool_ops *ops = req_info->dev->ethtool_ops;

	return ops->get_mm && ops->set_mm ? 1 : -EOPNOTSUPP;
}

static int ethnl_set_mm(struct ethnl_req_info *req_info, struct genl_info *info)
{
	struct netlink_ext_ack *extack = info->extack;
	struct net_device *dev = req_info->dev;
	struct ethtool_mm_state state = {};
	struct nlattr **tb = info->attrs;
	struct ethtool_mm_cfg cfg = {};
	bool mod = false;
	int ret;

	ret = dev->ethtool_ops->get_mm(dev, &state);
	if (ret)
		return ret;

	mm_state_to_cfg(&state, &cfg);

	ethnl_update_bool(&cfg.verify_enabled, tb[ETHTOOL_A_MM_VERIFY_ENABLED],
			  &mod);
	ethnl_update_u32(&cfg.verify_time, tb[ETHTOOL_A_MM_VERIFY_TIME], &mod);
	ethnl_update_bool(&cfg.tx_enabled, tb[ETHTOOL_A_MM_TX_ENABLED], &mod);
	ethnl_update_bool(&cfg.pmac_enabled, tb[ETHTOOL_A_MM_PMAC_ENABLED],
			  &mod);
	ethnl_update_u32(&cfg.tx_min_frag_size,
			 tb[ETHTOOL_A_MM_TX_MIN_FRAG_SIZE], &mod);

	if (!mod)
		return 0;

	if (cfg.verify_time > state.max_verify_time) {
		NL_SET_ERR_MSG_ATTR(extack, tb[ETHTOOL_A_MM_VERIFY_TIME],
				    "verifyTime exceeds device maximum");
		return -ERANGE;
	}

	if (cfg.verify_enabled && !cfg.tx_enabled) {
		NL_SET_ERR_MSG(extack, "Verification requires TX enabled");
		return -EINVAL;
	}

	if (cfg.tx_enabled && !cfg.pmac_enabled) {
		NL_SET_ERR_MSG(extack, "TX enabled requires pMAC enabled");
		return -EINVAL;
	}

	ret = dev->ethtool_ops->set_mm(dev, &cfg, extack);
	return ret < 0 ? ret : 1;
}

const struct ethnl_request_ops ethnl_mm_request_ops = {
	.request_cmd		= ETHTOOL_MSG_MM_GET,
	.reply_cmd		= ETHTOOL_MSG_MM_GET_REPLY,
	.hdr_attr		= ETHTOOL_A_MM_HEADER,
	.req_info_size		= sizeof(struct mm_req_info),
	.reply_data_size	= sizeof(struct mm_reply_data),

	.prepare_data		= mm_prepare_data,
	.reply_size		= mm_reply_size,
	.fill_reply		= mm_fill_reply,

	.set_validate		= ethnl_set_mm_validate,
	.set			= ethnl_set_mm,
	.set_ntf_cmd		= ETHTOOL_MSG_MM_NTF,
};

/* Returns whether a given device supports the MAC merge layer
 * (has an eMAC and a pMAC). Must be called under rtnl_lock() and
 * ethnl_ops_begin().
 */
bool __ethtool_dev_mm_supported(struct net_device *dev)
{
	const struct ethtool_ops *ops = dev->ethtool_ops;
	struct ethtool_mm_state state = {};
	int ret = -EOPNOTSUPP;

	if (ops && ops->get_mm)
		ret = ops->get_mm(dev, &state);

	return !ret;
}

bool ethtool_dev_mm_supported(struct net_device *dev)
{
	const struct ethtool_ops *ops = dev->ethtool_ops;
	bool supported;
	int ret;

	ASSERT_RTNL();

	if (!ops)
		return false;

	ret = ethnl_ops_begin(dev);
	if (ret < 0)
		return false;

	supported = __ethtool_dev_mm_supported(dev);

	ethnl_ops_complete(dev);

	return supported;
}
EXPORT_SYMBOL_GPL(ethtool_dev_mm_supported);

static void ethtool_mmsv_configure_tx(struct ethtool_mmsv *mmsv,
				      bool tx_active)
{
	if (mmsv->ops->configure_tx)
		mmsv->ops->configure_tx(mmsv, tx_active);
}

static void ethtool_mmsv_configure_pmac(struct ethtool_mmsv *mmsv,
					bool pmac_enabled)
{
	if (mmsv->ops->configure_pmac)
		mmsv->ops->configure_pmac(mmsv, pmac_enabled);
}

static void ethtool_mmsv_send_mpacket(struct ethtool_mmsv *mmsv,
				      enum ethtool_mpacket mpacket)
{
	if (mmsv->ops->send_mpacket)
		mmsv->ops->send_mpacket(mmsv, mpacket);
}

/**
 * ethtool_mmsv_verify_timer - Timer for MAC Merge verification
 * @t: timer_list struct containing private info
 *
 * Verify the MAC Merge capability in the local TX direction, by
 * transmitting Verify mPackets up to 3 times. Wait until link
 * partner responds with a Response mPacket, otherwise fail.
 */
static void ethtool_mmsv_verify_timer(struct timer_list *t)
{
	struct ethtool_mmsv *mmsv = timer_container_of(mmsv, t, verify_timer);
	unsigned long flags;
	bool rearm = false;

	spin_lock_irqsave(&mmsv->lock, flags);

	switch (mmsv->status) {
	case ETHTOOL_MM_VERIFY_STATUS_INITIAL:
	case ETHTOOL_MM_VERIFY_STATUS_VERIFYING:
		if (mmsv->verify_retries != 0) {
			ethtool_mmsv_send_mpacket(mmsv, ETHTOOL_MPACKET_VERIFY);
			rearm = true;
		} else {
			mmsv->status = ETHTOOL_MM_VERIFY_STATUS_FAILED;
		}

		mmsv->verify_retries--;
		break;

	case ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED:
		ethtool_mmsv_configure_tx(mmsv, true);
		break;

	default:
		break;
	}

	if (rearm) {
		mod_timer(&mmsv->verify_timer,
			  jiffies + msecs_to_jiffies(mmsv->verify_time));
	}

	spin_unlock_irqrestore(&mmsv->lock, flags);
}

static void ethtool_mmsv_verify_timer_arm(struct ethtool_mmsv *mmsv)
{
	if (mmsv->pmac_enabled && mmsv->tx_enabled && mmsv->verify_enabled &&
	    mmsv->status != ETHTOOL_MM_VERIFY_STATUS_FAILED &&
	    mmsv->status != ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED) {
		timer_setup(&mmsv->verify_timer, ethtool_mmsv_verify_timer, 0);
		mod_timer(&mmsv->verify_timer, jiffies);
	}
}

static void ethtool_mmsv_apply(struct ethtool_mmsv *mmsv)
{
	/* If verification is disabled, configure FPE right away.
	 * Otherwise let the timer code do it.
	 */
	if (!mmsv->verify_enabled) {
		ethtool_mmsv_configure_pmac(mmsv, mmsv->pmac_enabled);
		ethtool_mmsv_configure_tx(mmsv, mmsv->tx_enabled);
	} else {
		mmsv->status = ETHTOOL_MM_VERIFY_STATUS_INITIAL;
		mmsv->verify_retries = ETHTOOL_MM_MAX_VERIFY_RETRIES;

		if (netif_running(mmsv->dev))
			ethtool_mmsv_verify_timer_arm(mmsv);
	}
}

/**
 * ethtool_mmsv_stop() - Stop MAC Merge Software Verification
 * @mmsv: MAC Merge Software Verification state
 *
 * Drivers should call this method in a state where the hardware is
 * about to lose state, like ndo_stop() or suspend(), and turning off
 * MAC Merge features would be superfluous. Otherwise, prefer
 * ethtool_mmsv_link_state_handle() with up=false.
 */
void ethtool_mmsv_stop(struct ethtool_mmsv *mmsv)
{
	timer_shutdown_sync(&mmsv->verify_timer);
}
EXPORT_SYMBOL_GPL(ethtool_mmsv_stop);

/**
 * ethtool_mmsv_link_state_handle() - Inform MAC Merge Software Verification
 *				      of link state changes
 * @mmsv: MAC Merge Software Verification state
 * @up: True if device carrier is up and able to pass verification packets
 *
 * Calling context is expected to be from a task, interrupts enabled.
 */
void ethtool_mmsv_link_state_handle(struct ethtool_mmsv *mmsv, bool up)
{
	unsigned long flags;

	ethtool_mmsv_stop(mmsv);

	spin_lock_irqsave(&mmsv->lock, flags);

	if (up && mmsv->pmac_enabled) {
		/* VERIFY process requires pMAC enabled when NIC comes up */
		ethtool_mmsv_configure_pmac(mmsv, true);

		/* New link => maybe new partner => new verification process */
		ethtool_mmsv_apply(mmsv);
	} else {
		/* Reset the reported verification state while the link is down */
		if (mmsv->verify_enabled)
			mmsv->status = ETHTOOL_MM_VERIFY_STATUS_INITIAL;

		/* No link or pMAC not enabled */
		ethtool_mmsv_configure_pmac(mmsv, false);
		ethtool_mmsv_configure_tx(mmsv, false);
	}

	spin_unlock_irqrestore(&mmsv->lock, flags);
}
EXPORT_SYMBOL_GPL(ethtool_mmsv_link_state_handle);

/**
 * ethtool_mmsv_event_handle() - Inform MAC Merge Software Verification
 *				 of interrupt-based events
 * @mmsv: MAC Merge Software Verification state
 * @event: Event which took place (packet transmission or reception)
 *
 * Calling context expects to have interrupts disabled.
 */
void ethtool_mmsv_event_handle(struct ethtool_mmsv *mmsv,
			       enum ethtool_mmsv_event event)
{
	/* This is interrupt context, just spin_lock() */
	spin_lock(&mmsv->lock);

	if (!mmsv->pmac_enabled)
		goto unlock;

	switch (event) {
	case ETHTOOL_MMSV_LP_SENT_VERIFY_MPACKET:
		/* Link partner has sent verify mPacket */
		ethtool_mmsv_send_mpacket(mmsv, ETHTOOL_MPACKET_RESPONSE);
		break;
	case ETHTOOL_MMSV_LD_SENT_VERIFY_MPACKET:
		/* Local device has sent verify mPacket */
		if (mmsv->status != ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED)
			mmsv->status = ETHTOOL_MM_VERIFY_STATUS_VERIFYING;
		break;
	case ETHTOOL_MMSV_LP_SENT_RESPONSE_MPACKET:
		/* Link partner has sent response mPacket */
		if (mmsv->status == ETHTOOL_MM_VERIFY_STATUS_VERIFYING)
			mmsv->status = ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED;
		break;
	}

unlock:
	spin_unlock(&mmsv->lock);
}
EXPORT_SYMBOL_GPL(ethtool_mmsv_event_handle);

static bool ethtool_mmsv_is_tx_active(struct ethtool_mmsv *mmsv)
{
	/* TX is active if administratively enabled, and verification either
	 * succeeded, or was administratively disabled.
	 */
	return mmsv->tx_enabled &&
	       (mmsv->status == ETHTOOL_MM_VERIFY_STATUS_SUCCEEDED ||
	       mmsv->status == ETHTOOL_MM_VERIFY_STATUS_DISABLED);
}

/**
 * ethtool_mmsv_get_mm() - get_mm() hook for MAC Merge Software Verification
 * @mmsv: MAC Merge Software Verification state
 * @state: see struct ethtool_mm_state
 *
 * Drivers are expected to call this from their ethtool_ops :: get_mm()
 * method.
 */
void ethtool_mmsv_get_mm(struct ethtool_mmsv *mmsv,
			 struct ethtool_mm_state *state)
{
	unsigned long flags;

	spin_lock_irqsave(&mmsv->lock, flags);

	state->max_verify_time = ETHTOOL_MM_MAX_VERIFY_TIME_MS;
	state->verify_enabled = mmsv->verify_enabled;
	state->pmac_enabled = mmsv->pmac_enabled;
	state->verify_time = mmsv->verify_time;
	state->tx_enabled = mmsv->tx_enabled;
	state->verify_status = mmsv->status;
	state->tx_active = ethtool_mmsv_is_tx_active(mmsv);

	spin_unlock_irqrestore(&mmsv->lock, flags);
}
EXPORT_SYMBOL_GPL(ethtool_mmsv_get_mm);

/**
 * ethtool_mmsv_set_mm() - set_mm() hook for MAC Merge Software Verification
 * @mmsv: MAC Merge Software Verification state
 * @cfg: see struct ethtool_mm_cfg
 *
 * Drivers are expected to call this from their ethtool_ops :: set_mm()
 * method.
 */
void ethtool_mmsv_set_mm(struct ethtool_mmsv *mmsv, struct ethtool_mm_cfg *cfg)
{
	unsigned long flags;

	/* Wait for the verification that's currently in progress to finish */
	ethtool_mmsv_stop(mmsv);

	spin_lock_irqsave(&mmsv->lock, flags);

	mmsv->verify_enabled = cfg->verify_enabled;
	mmsv->pmac_enabled = cfg->pmac_enabled;
	mmsv->verify_time = cfg->verify_time;
	mmsv->tx_enabled = cfg->tx_enabled;

	if (!cfg->verify_enabled)
		mmsv->status = ETHTOOL_MM_VERIFY_STATUS_DISABLED;

	ethtool_mmsv_apply(mmsv);

	spin_unlock_irqrestore(&mmsv->lock, flags);
}
EXPORT_SYMBOL_GPL(ethtool_mmsv_set_mm);

/**
 * ethtool_mmsv_init() - Initialize MAC Merge Software Verification state
 * @mmsv: MAC Merge Software Verification state
 * @dev: Pointer to network interface
 * @ops: Methods for implementing the generic functionality
 *
 * The MAC Merge Software Verification is a timer- and event-based state
 * machine intended for network interfaces which lack a hardware-based
 * TX verification process (as per IEEE 802.3 clause 99.4.3). The timer
 * is managed by the core code, whereas events are supplied by the
 * driver explicitly calling one of the other API functions.
 */
void ethtool_mmsv_init(struct ethtool_mmsv *mmsv, struct net_device *dev,
		       const struct ethtool_mmsv_ops *ops)
{
	mmsv->ops = ops;
	mmsv->dev = dev;
	mmsv->verify_retries = ETHTOOL_MM_MAX_VERIFY_RETRIES;
	mmsv->verify_time = ETHTOOL_MM_MAX_VERIFY_TIME_MS;
	mmsv->status = ETHTOOL_MM_VERIFY_STATUS_DISABLED;
	timer_setup(&mmsv->verify_timer, ethtool_mmsv_verify_timer, 0);
	spin_lock_init(&mmsv->lock);
}
EXPORT_SYMBOL_GPL(ethtool_mmsv_init);