From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6CB30334387; Thu, 20 Nov 2025 16:28:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656101; cv=none; b=qC4h9ZvTRnz0EpmoyRROI6yyaJHuXlx/PH9uh3xMzWAgZtFa/KLhWjSPG0gXputAYXcMU/TUKW8/d1/Sz3B3Op40FxoxIS2p+XVIyLigYQpQ4yM/0vQwuETudydFgPxsyPw41yaev37frHxfmtuy4g9jy77VaYDr6korpYITF2s= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656101; c=relaxed/simple; bh=Fq3t0sobCfSkZ8rkAOl15NszCcSbPhZftbWaCIEfhF0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=j8YbpgYVS+MxLJW05L1LRtV8lodZXWRyP1I4/9YXom7KlxtWJss/O604VCBiObVtD91EcnYx0i1m1J646/XpfwkLWqMQZwqiVTWldm8WZTPE5oL3ec1p+Lmx1nauZoe8tqzI/lqt9c2D/jCGgYh9ZyI4MJ5m7PdrAXYyR++mHPo= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=IEAD3apL; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="IEAD3apL" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656099; x=1795192099; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Fq3t0sobCfSkZ8rkAOl15NszCcSbPhZftbWaCIEfhF0=; b=IEAD3apLcpYruK6tFxERBJ5yUMUUQSR5DbQwtk/oJvW25Kv5+PXaOzFr hPuyyylC2DFTrTQekrIDKNi4eWT+dfkrypEGiB9ew6KTIIEfNtMTo6oVK 9XoU1aDySFmlYVed6rJ9pa7iVgPBBQXnCNsvfD9kOQ8tqkdefP1U1gc8j b6/iPyiDHp/h8xQeacbkI/g8m7mhwnsEIYE4uCme46tHux8pCxMssed3D VaI0PpspNQ0qvLDdMtLqhgFud4LPgImtuE94cMCSoe2r+bdGP786faG44 arEwcSlA3RmZCgFM6KOdavFbh8YV4jVBMfgXyTWxBQkamZ4rO1QaX6swx w==; X-CSE-ConnectionGUID: 4+tlg5upRliw5PdsZ3hYyA== X-CSE-MsgGUID: 3n0yCi5uR8CdgnkMMB0KQg== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599284" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599284" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:18 -0800 X-CSE-ConnectionGUID: Fq2BGUNARu2f/f/s3Bq9EA== X-CSE-MsgGUID: gSbIR6DNQG+Z1/wDh9w5+Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531281" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:17 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 1/8] ice: in dvm, use outer VLAN in MAC,VLAN lookup Date: Thu, 20 Nov 2025 17:28:06 +0100 Message-ID: <20251120162813.37942-2-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" In double VLAN mode (DVM), outer VLAN is located a word earlier in the field vector compared to the single VLAN mode. We already modify ICE_SW_LKUP_VLAN to use it but ICE_SW_LKUP_MAC_VLAN was left untouched, causing the lookup to match any packet with one or no layer of Dot1q. This change enables to fix cross-vlan loopback traffic using MAC,VLAN lookups. Reviewed-by: Aleksandr Loktionov Reviewed-by: Michal Swiatkowski Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_vlan_mode.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/net/ethernet/intel/ice/ice_vlan_mode.c b/drivers/net/e= thernet/intel/ice/ice_vlan_mode.c index fb526cb84776..68a7b05de44e 100644 --- a/drivers/net/ethernet/intel/ice/ice_vlan_mode.c +++ b/drivers/net/ethernet/intel/ice/ice_vlan_mode.c @@ -198,6 +198,7 @@ static bool ice_is_dvm_supported(struct ice_hw *hw) #define ICE_SW_LKUP_VLAN_LOC_LKUP_IDX 1 #define ICE_SW_LKUP_VLAN_PKT_FLAGS_LKUP_IDX 2 #define ICE_SW_LKUP_PROMISC_VLAN_LOC_LKUP_IDX 2 +#define ICE_SW_LKUP_MAC_VLAN_LOC_LKUP_IDX 4 #define ICE_PKT_FLAGS_0_TO_15_FV_IDX 1 static struct ice_update_recipe_lkup_idx_params ice_dvm_dflt_recipes[] =3D= { { @@ -234,6 +235,17 @@ static struct ice_update_recipe_lkup_idx_params ice_dv= m_dflt_recipes[] =3D { .mask_valid =3D false, /* use pre-existing mask */ .lkup_idx =3D ICE_SW_LKUP_PROMISC_VLAN_LOC_LKUP_IDX, }, + { + /* Similarly to ICE_SW_LKUP_VLAN, change to outer/single VLAN in + * DVM + */ + .rid =3D ICE_SW_LKUP_MAC_VLAN, + .fv_idx =3D ICE_EXTERNAL_VLAN_ID_FV_IDX, + .ignore_valid =3D true, + .mask =3D 0, + .mask_valid =3D false, + .lkup_idx =3D ICE_SW_LKUP_MAC_VLAN_LOC_LKUP_IDX, + }, }; =20 /** --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DC632369205; Thu, 20 Nov 2025 16:28:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656102; cv=none; b=OQ7ma+Z7bEH12W02NDFP2ev7KYK4tB0n5c8T7xITruFFm6K5nLQ8e6VpD6wCV0G8v1ZJRsG0TICyUVEU5ceYUOnrzI6lWKzg1PoKCaaNro/+Vb5oaMRroez9kxONALXiL+Mgdsmx3zJGGyx5+WPqMZruQF8khcCWa2CJVO+laRQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656102; c=relaxed/simple; bh=IlCI9jaErdowTVJH0J3loebUiNFI6chGcjpYkH/hVRY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ZfWuhT3EX1mXxN0DYV55TyiZLzd0tSgU8sEPD72B7m8I0nF6BaGYOWiSHLY94xIS5F4vwDIfc61a0qsIAeddX8eqZ9ec4+tSoMVyauLIbqxAg5hqgDoaNk5/48JkzioNN4ig5uDOlAPhEGNESqJVP1jPCVDp7Sw1XV4DyCZkkK0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=BrBCunHg; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="BrBCunHg" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656101; x=1795192101; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=IlCI9jaErdowTVJH0J3loebUiNFI6chGcjpYkH/hVRY=; b=BrBCunHgSY7xBNVekBBUbYWpZtsbw+06Mn1Ccd+JtHm8vXen5CJyRpxY IhYv4J2tMIK0v63bqeDs9UjY9hhRp5rl3fhdRC4m5JWJaJDlY4syil9UU G93HKSvdhAGuIQLhZZxScLXNPslytFZRrtbywBhPXO0hVjgSrHHeOVqHN d/7tLlr45UHBHiZCGY0OaODMrwN59IS96FkdZeCGm9/V2UIISg78N/tAw PRhNUPm4Y1WreoOAth4CcYjrl5G+kAYg84pA4DrOA6lBNefCHmzvcMoS/ 3DBv0QDybcxwXo5yqKd3G0QTKilZFs/wzkoV77hdKfBoZhzqsVXe0gKUB Q==; X-CSE-ConnectionGUID: RMUHXwZXTJOQeXZzSfHXww== X-CSE-MsgGUID: ilTSVWlWSxCIRQeSubTdnA== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599289" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599289" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:20 -0800 X-CSE-ConnectionGUID: LTFylGsoRDiOnwfTmwZHoQ== X-CSE-MsgGUID: DbeerV+WTZiNFO1gv6/IeA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531285" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:19 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 2/8] ice: allow creating mac,vlan filters along mac filters Date: Thu, 20 Nov 2025 17:28:07 +0100 Message-ID: <20251120162813.37942-3-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Among other uses, MAC filters are currently used to forward loopback traffic between VSIs. However, they only match destination MAC addresses making them prone to mistakes when handling traffic within multiple VLANs and especially across the boundaries. This patch allows the driver to create MAC,VLAN filters in the same flow as MAC-only filters completely interchangeably. This is intended to be used to forward the loopback traffic only within the boundaries of particular VLANs. Reviewed-by: Michal Swiatkowski Reviewed-by: Aleksandr Loktionov Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_switch.c | 48 ++++++++++++++++----- 1 file changed, 38 insertions(+), 10 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_switch.c b/drivers/net/ethe= rnet/intel/ice/ice_switch.c index 84848f0123e7..0275e2910c6b 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.c +++ b/drivers/net/ethernet/intel/ice/ice_switch.c @@ -3606,6 +3606,29 @@ bool ice_vlan_fltr_exist(struct ice_hw *hw, u16 vlan= _id, u16 vsi_handle) return false; } =20 +/** + * ice_fltr_mac_address - Find MAC in filter + * @dst: output MAC address + * @info: information struct for the filter in question + * + * Return: 0 for success, %-ENXIO if no address was found in the filter + * information. + */ +static +int ice_fltr_mac_address(u8 *dst, struct ice_fltr_info *info) +{ + switch (info->lkup_type) { + case ICE_SW_LKUP_MAC: + ether_addr_copy(dst, info->l_data.mac.mac_addr); + return 0; + case ICE_SW_LKUP_MAC_VLAN: + ether_addr_copy(dst, info->l_data.mac_vlan.mac_addr); + return 0; + default: + return -ENXIO; + } +} + /** * ice_add_mac - Add a MAC address based filter rule * @hw: pointer to the hardware structure @@ -3614,16 +3637,19 @@ bool ice_vlan_fltr_exist(struct ice_hw *hw, u16 vla= n_id, u16 vsi_handle) int ice_add_mac(struct ice_hw *hw, struct list_head *m_list) { struct ice_fltr_list_entry *m_list_itr; - int status =3D 0; + int err; =20 if (!m_list || !hw) return -EINVAL; =20 list_for_each_entry(m_list_itr, m_list, list_entry) { - u8 *add =3D &m_list_itr->fltr_info.l_data.mac.mac_addr[0]; + u8 addr[ETH_ALEN]; u16 vsi_handle; u16 hw_vsi_id; =20 + err =3D ice_fltr_mac_address(addr, &m_list_itr->fltr_info); + if (err || is_zero_ether_addr(addr)) + return -EINVAL; m_list_itr->fltr_info.flag =3D ICE_FLTR_TX; vsi_handle =3D m_list_itr->fltr_info.vsi_handle; if (!ice_is_vsi_valid(hw, vsi_handle)) @@ -3634,17 +3660,19 @@ int ice_add_mac(struct ice_hw *hw, struct list_head= *m_list) if (m_list_itr->fltr_info.src_id !=3D ICE_SRC_ID_VSI) return -EINVAL; m_list_itr->fltr_info.src =3D hw_vsi_id; - if (m_list_itr->fltr_info.lkup_type !=3D ICE_SW_LKUP_MAC || - is_zero_ether_addr(add)) + if (m_list_itr->fltr_info.lkup_type !=3D ICE_SW_LKUP_MAC && + m_list_itr->fltr_info.lkup_type !=3D ICE_SW_LKUP_MAC_VLAN) return -EINVAL; =20 - m_list_itr->status =3D ice_add_rule_internal(hw, ICE_SW_LKUP_MAC, - m_list_itr); + m_list_itr->status =3D + ice_add_rule_internal(hw, + m_list_itr->fltr_info.lkup_type, + m_list_itr); if (m_list_itr->status) return m_list_itr->status; } =20 - return status; + return 0; } =20 /** @@ -4055,7 +4083,7 @@ int ice_remove_mac(struct ice_hw *hw, struct list_hea= d *m_list) enum ice_sw_lkup_type l_type =3D list_itr->fltr_info.lkup_type; u16 vsi_handle; =20 - if (l_type !=3D ICE_SW_LKUP_MAC) + if (l_type !=3D ICE_SW_LKUP_MAC && l_type !=3D ICE_SW_LKUP_MAC_VLAN) return -EINVAL; =20 vsi_handle =3D list_itr->fltr_info.vsi_handle; @@ -4066,7 +4094,7 @@ int ice_remove_mac(struct ice_hw *hw, struct list_hea= d *m_list) ice_get_hw_vsi_num(hw, vsi_handle); =20 list_itr->status =3D ice_remove_rule_internal(hw, - ICE_SW_LKUP_MAC, + l_type, list_itr); if (list_itr->status) return list_itr->status; @@ -4507,6 +4535,7 @@ ice_remove_vsi_lkup_fltr(struct ice_hw *hw, u16 vsi_h= andle, =20 switch (lkup) { case ICE_SW_LKUP_MAC: + case ICE_SW_LKUP_MAC_VLAN: ice_remove_mac(hw, &remove_list_head); break; case ICE_SW_LKUP_VLAN: @@ -4516,7 +4545,6 @@ ice_remove_vsi_lkup_fltr(struct ice_hw *hw, u16 vsi_h= andle, case ICE_SW_LKUP_PROMISC_VLAN: ice_remove_promisc(hw, lkup, &remove_list_head); break; - case ICE_SW_LKUP_MAC_VLAN: case ICE_SW_LKUP_ETHERTYPE: case ICE_SW_LKUP_ETHERTYPE_MAC: case ICE_SW_LKUP_DFLT: --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C8D8836A00C; Thu, 20 Nov 2025 16:28:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656104; cv=none; b=KfVuiBuD7Nxro5Y8wgReWRIYx1pebrNfZJb3QmPczuHi8/v/cFan7DHh0KxjlJEmu9ASbi8dqsFPuDk2HLgYXGbJpR4CuiTvD1tteNft+SXywPrvOo9DffAVerMg5iamT3l90AIkOZEAWzk+fonSvEsWNyMzwxbiBKwKvQy5vdA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656104; c=relaxed/simple; bh=yNUqfimTfWaJ6b/2VGkU2qDZPeNFpXbHnaViLdbaEHo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=dLcopRBV9PDz00qQkTciQ57bgSY9PnNK+IEAI5KuRlKc1cRmApIicLRZzF7eQD1geAyhOiFqebIL+sYMw2mKVl9Je6jW77BullGBsuYKdLiYpdJ/purOmMv9z7eqzxRv5IpiLKJqTtbTH7BMDP4CKktXfbtfNcSdNry7YunOsXY= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=h8fWQRZo; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="h8fWQRZo" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656103; x=1795192103; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=yNUqfimTfWaJ6b/2VGkU2qDZPeNFpXbHnaViLdbaEHo=; b=h8fWQRZorWm3/7w+A11PBr3GPyH+FsXjf/FXSsiAbAb5Lv643QIEhUr7 qsgeGhapWhzat/kj0j7aE/T3YY5Nli80T4gdYUQvhK8Bh6rMSrkrJFSsh pI4fgN/ze4MCWBpuLCd1DUOFbGLK3Gk2ICBcNruJdDKhf2/BzxHUCBQ34 OW5jbEemFi12AXnUzgNThZK3sue7p0er0YXAJduVLYbX2R7QYrtXUaIZo 24tvz9lRTzrdCRZlgjugzLJVHfus1D4DQmA1fesS74xheDUcs/ZKcynVM 8fJyVP6v3OJToRzKtBZXUc5X8eVrrMY6jR1QS0aM4vVjpTO+Ykb7r8NLp A==; X-CSE-ConnectionGUID: V+Wu2bVfQym/3XIvflX13w== X-CSE-MsgGUID: B06Dob1dTCG+Y9P4HyejSw== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599295" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599295" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:22 -0800 X-CSE-ConnectionGUID: CWRQ7mu5QoalPH489aGJlg== X-CSE-MsgGUID: 1MwQ0+q8QB6T/ylMquaRkg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531288" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:21 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 3/8] ice: do not check for zero mac when creating mac filters Date: Thu, 20 Nov 2025 17:28:08 +0100 Message-ID: <20251120162813.37942-4-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" A zero MAC address was considered a special case while creating a new MAC filter. There is no particular reason for that other than the fact that the union containing it was assumed to be zeroed out. Now, address is pulled out of the union by ice_fltr_mac_address which checks all of the previously assumed zero-address cases and returns an error if they are hit. Reviewed-by: Aleksandr Loktionov Reviewed-by: Michal Swiatkowski Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_switch.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/ice/ice_switch.c b/drivers/net/ethe= rnet/intel/ice/ice_switch.c index 0275e2910c6b..04e5d653efce 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.c +++ b/drivers/net/ethernet/intel/ice/ice_switch.c @@ -3648,7 +3648,7 @@ int ice_add_mac(struct ice_hw *hw, struct list_head *= m_list) u16 hw_vsi_id; =20 err =3D ice_fltr_mac_address(addr, &m_list_itr->fltr_info); - if (err || is_zero_ether_addr(addr)) + if (err) return -EINVAL; m_list_itr->fltr_info.flag =3D ICE_FLTR_TX; vsi_handle =3D m_list_itr->fltr_info.vsi_handle; --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 748C936CDFE; Thu, 20 Nov 2025 16:28:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656107; cv=none; b=e8JxLtggNdxoj9IcjXNridytKNpVi1ygGSettkVwLK8rvCq4nP8cnH1FrEX7XqFlju105d1HbJYQdXf2XKQETUVZn6F7MXEQYBZeLtb4muTNOuHJ3jkgcI2fUWz+ratDqeBCUAziFK+64mDdXA2Gkbfdelc0uIrxgk/TN9ZQqFs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656107; c=relaxed/simple; bh=o05JNdB6D1vyiu/R+lX09CjA8bn5afRbx6R7I34pziA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ogbGzm1vzwhMV8FZYQCqpEFEsK4KW+BA2k/0nsEfJ+ISvyFQYftZo7wmJh92gGxo5c95jThPD7+vdM2+rVvaL8gLTmGYPEcD7E+blxBSExObZKG9icY6WJ81vsiwzQR98CFjkbaHPNXk1D1Py9HicaCDz734SUWCCqEWpVfcZYw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=JANfrB1N; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="JANfrB1N" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656105; x=1795192105; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=o05JNdB6D1vyiu/R+lX09CjA8bn5afRbx6R7I34pziA=; b=JANfrB1NNMPFrpc9psg6om9igVJDpLPZe0SUJF1/KYiLP93byWTRw45H MUYqQP2ZKEpJdCaCOl60IPazGiZHFSiavy5OSSupjlBTxrJxEYx60kHWI uKHtr926waUhjCVUCSRedHEYYuJqKB28SI15MIWX9FlE7JjNbQRWwFqgo raHjPQ4zR7HPX8mr+UCktIwICtdoZpMUiSx3e8TxcYRTjpkbM8aqryhO9 MkbkgydF/epS5qSVOeD16oXTptFpXnl9If2aY3tnIWPN/zy7eqalt+3va xPlksZn8K7tx0LJwYc3lux6mqaXhX+tUuzDTf/htjxfTBtEDdEfmMUMw4 Q==; X-CSE-ConnectionGUID: sZ+zW2I7RIabCl5NQiPrxQ== X-CSE-MsgGUID: vwW+PWDfSIinuD1dBCXtvA== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599299" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599299" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:24 -0800 X-CSE-ConnectionGUID: cFh5Fch8RdyJNL8o3Q64BQ== X-CSE-MsgGUID: jPuNL+t7QCOBlBJxb7w92Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531292" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:23 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 4/8] ice: allow overriding lan_en, lb_en in switch Date: Thu, 20 Nov 2025 17:28:09 +0100 Message-ID: <20251120162813.37942-5-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Currently, lan_en and lb_en are determined based on switching mode, destination MAC, and the lookup type, action type and flags of the rule in question. This gives little to no options for the user (such as ice_fltr.c) to enforce rules to behave in a specific way. Such functionality is needed to work with pairs of rules, for example, when handling MAC forward to LAN together with MAC,VLAN forward to loopback rules pair. This case could not be easily deduced in a context of a single filter without adding a specialized flag. Instead of adding a specialized flag to mark special scenario rules, we add a slightly more generic flag to the lan_en and lb_en themselves for the ice_fltr.c to request specific destination flags later on, for example, to override value: struct ice_fltr_info fi; fi.lb_en =3D ICE_FLTR_INFO_LB_LAN_FORCE_ENABLED; fi.lan_en =3D ICE_FLTR_INFO_LB_LAN_FORCE_DISABLED; Reviewed-by: Michal Swiatkowski Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_switch.c | 21 +++++++++++++-------- drivers/net/ethernet/intel/ice/ice_switch.h | 7 +++++++ 2 files changed, 20 insertions(+), 8 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_switch.c b/drivers/net/ethe= rnet/intel/ice/ice_switch.c index 04e5d653efce..7b63588948fd 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.c +++ b/drivers/net/ethernet/intel/ice/ice_switch.c @@ -2538,8 +2538,9 @@ int ice_get_initial_sw_cfg(struct ice_hw *hw) */ static void ice_fill_sw_info(struct ice_hw *hw, struct ice_fltr_info *fi) { - fi->lb_en =3D false; - fi->lan_en =3D false; + bool lan_en =3D false; + bool lb_en =3D false; + if ((fi->flag & ICE_FLTR_TX) && (fi->fltr_act =3D=3D ICE_FWD_TO_VSI || fi->fltr_act =3D=3D ICE_FWD_TO_VSI_LIST || @@ -2549,7 +2550,7 @@ static void ice_fill_sw_info(struct ice_hw *hw, struc= t ice_fltr_info *fi) * packets to the internal switch that will be dropped. */ if (fi->lkup_type !=3D ICE_SW_LKUP_VLAN) - fi->lb_en =3D true; + lb_en =3D true; =20 /* Set lan_en to TRUE if * 1. The switch is a VEB AND @@ -2578,14 +2579,18 @@ static void ice_fill_sw_info(struct ice_hw *hw, str= uct ice_fltr_info *fi) !is_unicast_ether_addr(fi->l_data.mac.mac_addr)) || (fi->lkup_type =3D=3D ICE_SW_LKUP_MAC_VLAN && !is_unicast_ether_addr(fi->l_data.mac.mac_addr))) - fi->lan_en =3D true; + lan_en =3D true; } else { - fi->lan_en =3D true; + lan_en =3D true; } } =20 if (fi->flag & ICE_FLTR_TX_ONLY) - fi->lan_en =3D false; + lan_en =3D false; + if (!(fi->lb_en & ICE_FLTR_INFO_LB_LAN_FORCE_MASK)) + fi->lb_en =3D lb_en; + if (!(fi->lan_en & ICE_FLTR_INFO_LB_LAN_FORCE_MASK)) + fi->lan_en =3D lan_en; } =20 /** @@ -2669,9 +2674,9 @@ ice_fill_sw_rule(struct ice_hw *hw, struct ice_fltr_i= nfo *f_info, return; } =20 - if (f_info->lb_en) + if (f_info->lb_en & ICE_FLTR_INFO_LB_LAN_VALUE_MASK) act |=3D ICE_SINGLE_ACT_LB_ENABLE; - if (f_info->lan_en) + if (f_info->lan_en & ICE_FLTR_INFO_LB_LAN_VALUE_MASK) act |=3D ICE_SINGLE_ACT_LAN_ENABLE; =20 switch (f_info->lkup_type) { diff --git a/drivers/net/ethernet/intel/ice/ice_switch.h b/drivers/net/ethe= rnet/intel/ice/ice_switch.h index 671d7a5f359f..a7dc4bfec3a0 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.h +++ b/drivers/net/ethernet/intel/ice/ice_switch.h @@ -72,6 +72,13 @@ enum ice_src_id { ICE_SRC_ID_LPORT, }; =20 +#define ICE_FLTR_INFO_LB_LAN_VALUE_MASK BIT(0) +#define ICE_FLTR_INFO_LB_LAN_FORCE_MASK BIT(1) +#define ICE_FLTR_INFO_LB_LAN_FORCE_ENABLED \ + (ICE_FLTR_INFO_LB_LAN_VALUE_MASK | \ + ICE_FLTR_INFO_LB_LAN_FORCE_MASK) +#define ICE_FLTR_INFO_LB_LAN_FORCE_DISABLED ICE_FLTR_INFO_LB_LAN_FORCE_MASK + struct ice_fltr_info { /* Look up information: how to look up packet */ enum ice_sw_lkup_type lkup_type; --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 919E836CE0F; Thu, 20 Nov 2025 16:28:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656109; cv=none; b=ek+2PA3t+PXEUPngM1EcLPBv505NqsWembQt1F9TjuDyMzbUw8NrKMDFUk4UyTzlAeG1lCKezvWIqXo1bHqA/tfkJ9QC9rHifjaRaRrP0LaOxBfDg4M5wD+GaPbBD72OvnHNtw/JEPPjIMrL04u1q1IDkeO4StlpThsWg/bdBxA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656109; c=relaxed/simple; bh=blYugHy6Y+vpD16wimuhQ7vAEzDULMbvdxJyg0IihBY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=PpH1dUN/54RvYjUHWDG2XjKiY137v3R1one/jUjK4VWRtqZjJhIogfhL1TkuKNPj2qXZcT2DVUTwqp8SQu2d2U6JzqkVlu4vNnXzXaF3MzvBVoRFXPWItTMO2uCa91LE8Z+5hyhmZ83zh3kS4abLbW269jWFiAyMcPp1WEccRAk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=facUANTf; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="facUANTf" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656107; x=1795192107; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=blYugHy6Y+vpD16wimuhQ7vAEzDULMbvdxJyg0IihBY=; b=facUANTf8Yhz+fZdycTNphGtfA/8gOdL/4frnsDnOGgTzrn/Yrf/LPGk E8XLF6nSfmBIVUf4kambiXe1x/QyxJTHuCbq3ASQz0ayyX+p8I5EAQJ4Y FvCfWgFWriI7bHrliDpCI9Vp6vna2LkqekVPqNl3HcI+zjHbB20U1RyGS +PHhzOY7LDQq1Cwclg/vayWJ99gMF4hMTZqq83Q3ESAClbS40yEKFtlIv hR/OffFTIZChse849kltIKnMuDwKQsxWLRGuGE8upmlB0goEs8mcyi7wd obsCXzAwxmHn1tws1z0rKLvag4PKbPFXGtieTxqPoHQKX3sSBvetk3Xnt g==; X-CSE-ConnectionGUID: xOtBfCUXRmu2zyDpKDvYkQ== X-CSE-MsgGUID: Tf6DeQE7RVi6KcwEe5wL+w== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599305" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599305" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:27 -0800 X-CSE-ConnectionGUID: EIRml9c9TsWL+ufx+DrWSQ== X-CSE-MsgGUID: lPeWA4ULR9ynRkwTKb6bPw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531295" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:25 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 5/8] ice: update mac,vlan rules when toggling between VEB and VEPA Date: Thu, 20 Nov 2025 17:28:10 +0100 Message-ID: <20251120162813.37942-6-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" When changing into VEPA mode MAC rules are modified to forward all traffic to the wire instead of allowing some packets to go into the loopback. MAC,VLAN rules may and will also be used to forward loopback traffic in VEB, so when we switch to VEPA, we want them to behave similarly to MAC-only rules. Reviewed-by: Michal Swiatkowski Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_main.c | 38 ++++++++++++++++----- drivers/net/ethernet/intel/ice/ice_switch.c | 8 +++-- drivers/net/ethernet/intel/ice/ice_switch.h | 3 +- 3 files changed, 37 insertions(+), 12 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_main.c b/drivers/net/ethern= et/intel/ice/ice_main.c index 0b6175ade40d..661af039bf4f 100644 --- a/drivers/net/ethernet/intel/ice/ice_main.c +++ b/drivers/net/ethernet/intel/ice/ice_main.c @@ -8115,8 +8115,8 @@ ice_bridge_setlink(struct net_device *dev, struct nlm= sghdr *nlh, struct ice_pf *pf =3D ice_netdev_to_pf(dev); struct nlattr *attr, *br_spec; struct ice_hw *hw =3D &pf->hw; + int rem, v, rb_err, err =3D 0; struct ice_sw *pf_sw; - int rem, v, err =3D 0; =20 pf_sw =3D pf->first_sw; /* find the attribute in the netlink message */ @@ -8126,6 +8126,7 @@ ice_bridge_setlink(struct net_device *dev, struct nlm= sghdr *nlh, =20 nla_for_each_nested_type(attr, IFLA_BRIDGE_MODE, br_spec, rem) { __u16 mode =3D nla_get_u16(attr); + u8 old_evb_veb =3D hw->evb_veb; =20 if (mode !=3D BRIDGE_MODE_VEPA && mode !=3D BRIDGE_MODE_VEB) return -EINVAL; @@ -8147,17 +8148,38 @@ ice_bridge_setlink(struct net_device *dev, struct n= lmsghdr *nlh, /* Update the unicast switch filter rules for the corresponding * switch of the netdev */ - err =3D ice_update_sw_rule_bridge_mode(hw); + err =3D ice_update_sw_rule_bridge_mode(hw, ICE_SW_LKUP_MAC); if (err) { - netdev_err(dev, "switch rule update failed, mode =3D %d err %d aq_err %= s\n", - mode, err, + /* evb_veb is expected to be already reverted in error + * path because of the potential rollback. + */ + hw->evb_veb =3D old_evb_veb; + goto err_without_rollback; + } + err =3D ice_update_sw_rule_bridge_mode(hw, ICE_SW_LKUP_MAC_VLAN); + if (err) { + /* ice_update_sw_rule_bridge_mode looks this up, so we + * must revert it before attempting a rollback. + */ + hw->evb_veb =3D old_evb_veb; + goto err_rollback_mac; + } + pf_sw->bridge_mode =3D mode; + continue; + +err_rollback_mac: + rb_err =3D ice_update_sw_rule_bridge_mode(hw, ICE_SW_LKUP_MAC); + if (rb_err) { + netdev_err(dev, "switch rule update failed, mode =3D %d err %d; rollbac= k failed, err %d aq_err %s\n", + mode, err, rb_err, libie_aq_str(hw->adminq.sq_last_status)); - /* revert hw->evb_veb */ - hw->evb_veb =3D (pf_sw->bridge_mode =3D=3D BRIDGE_MODE_VEB); - return err; + return rb_err; } =20 - pf_sw->bridge_mode =3D mode; +err_without_rollback: + netdev_err(dev, "switch rule update failed, mode =3D %d err %d aq_err %s= \n", + mode, err, libie_aq_str(hw->adminq.sq_last_status)); + return err; } =20 return 0; diff --git a/drivers/net/ethernet/intel/ice/ice_switch.c b/drivers/net/ethe= rnet/intel/ice/ice_switch.c index 7b63588948fd..b1445dfb1b64 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.c +++ b/drivers/net/ethernet/intel/ice/ice_switch.c @@ -3065,10 +3065,12 @@ ice_update_pkt_fwd_rule(struct ice_hw *hw, struct i= ce_fltr_info *f_info) /** * ice_update_sw_rule_bridge_mode * @hw: pointer to the HW struct + * @lkup: recipe/lookup type to update * * Updates unicast switch filter rules based on VEB/VEPA mode */ -int ice_update_sw_rule_bridge_mode(struct ice_hw *hw) +int ice_update_sw_rule_bridge_mode(struct ice_hw *hw, + enum ice_sw_lkup_type lkup) { struct ice_switch_info *sw =3D hw->switch_info; struct ice_fltr_mgmt_list_entry *fm_entry; @@ -3076,8 +3078,8 @@ int ice_update_sw_rule_bridge_mode(struct ice_hw *hw) struct mutex *rule_lock; /* Lock to protect filter rule list */ int status =3D 0; =20 - rule_lock =3D &sw->recp_list[ICE_SW_LKUP_MAC].filt_rule_lock; - rule_head =3D &sw->recp_list[ICE_SW_LKUP_MAC].filt_rules; + rule_lock =3D &sw->recp_list[lkup].filt_rule_lock; + rule_head =3D &sw->recp_list[lkup].filt_rules; =20 mutex_lock(rule_lock); list_for_each_entry(fm_entry, rule_head, list_entry) { diff --git a/drivers/net/ethernet/intel/ice/ice_switch.h b/drivers/net/ethe= rnet/intel/ice/ice_switch.h index a7dc4bfec3a0..60527475959b 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.h +++ b/drivers/net/ethernet/intel/ice/ice_switch.h @@ -360,7 +360,8 @@ int ice_add_adv_rule(struct ice_hw *hw, struct ice_adv_lkup_elem *lkups, u16 lkups_cnt, struct ice_adv_rule_info *rinfo, struct ice_rule_query_data *added_entry); -int ice_update_sw_rule_bridge_mode(struct ice_hw *hw); +int ice_update_sw_rule_bridge_mode(struct ice_hw *hw, + enum ice_sw_lkup_type lkup); int ice_add_vlan(struct ice_hw *hw, struct list_head *m_list); int ice_remove_vlan(struct ice_hw *hw, struct list_head *v_list); int ice_add_mac(struct ice_hw *hw, struct list_head *m_lst); --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 29616376BC0; Thu, 20 Nov 2025 16:28:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656110; cv=none; b=d+OzFMOCS5/1CuMqbNYAWd2I9jOsbZ1du3ubX6Oulz0pGv5oJNbAAXiMi1KuBtTwGEyTQHFYILmLoE3N5Gz/aBJ5V3en3jCX9X7AIkqA9L4v4jvADUxlQhaly+ph8uOJsigfnryK1/RUf8YUsFmDZYQR6ASBuiPywf96Q+H1x+g= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656110; c=relaxed/simple; bh=Lh+5jACMhiO/2Y5m+VvRKadn77MvcK31xvDS10Hga1g=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=fjEXW1U1BfJ/1MtfuxcGkyiQu7siz3ESTzfARszFKtadxeDY3hRtkySpKZf+iRTR+AB4SmsdE0E7W1g3VXEJk23IikDE80ZsfLxYIDNXv3uub2KishuNwvpxY0/KqQMXu1r/ubxA/3tDBKOYmiXdoIlWHjnB3oKYCCY+Q+g+0mA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=eeHWdSgE; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="eeHWdSgE" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656109; x=1795192109; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Lh+5jACMhiO/2Y5m+VvRKadn77MvcK31xvDS10Hga1g=; b=eeHWdSgEYXxCHpnkeGmCAHTQySUBZfcMCLDb+wfNbYhV/t9d8PGnkc3o Mm5txqosZmcc9ijLyWt7Lk7Xex6GcNUq04vjIGZgDIZDswnY3Sm863Ti+ LpwfpjadkvzBkg7Wmbnxijhbl+15Dvt4D2m08/7j7xWGkflWQHDRppI9K YFOlOIhIGzeKPU/Lm6prDgVTBzYKx1gpaGJNX/OYAWCQ0VGpEzkfmvUxN iRlZsRU1yAz8frIWnb2U2Vq5wHRzJybhkPxQWZDAthORI14yiBczONRbW In2nrkbDoStR3g+T6w81HY17DsO1PeoJ5pc9B53D0mIJcksJFyVXOvc81 g==; X-CSE-ConnectionGUID: jFAf6G+JQNCZt672X9YSRw== X-CSE-MsgGUID: SnrSC7q9RuWXtUU8XUYwsQ== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599308" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599308" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:29 -0800 X-CSE-ConnectionGUID: CQw5iJrYTVe8N6t16ut0pw== X-CSE-MsgGUID: be4QnUz6S4GKgwOXDdNJ+w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531300" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:27 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 6/8] ice: add functions to query for vsi's pvids Date: Thu, 20 Nov 2025 17:28:11 +0100 Message-ID: <20251120162813.37942-7-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" PVID information is set across two structs and several members depending primarily on DVM support and VSI type. This commit adds function that guess whether PVID is set and where and allow to access raw VLAN ID set. This is intended to be used later on to decide what MAC{,VLAN} filters to set for a VSI. Reviewed-by: Michal Swiatkowski Reviewed-by: Aleksandr Loktionov Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_lib.c | 56 ++++++++++++++++++++++++ drivers/net/ethernet/intel/ice/ice_lib.h | 2 + 2 files changed, 58 insertions(+) diff --git a/drivers/net/ethernet/intel/ice/ice_lib.c b/drivers/net/etherne= t/intel/ice/ice_lib.c index 44f3c2bab308..55ba043f8f5e 100644 --- a/drivers/net/ethernet/intel/ice/ice_lib.c +++ b/drivers/net/ethernet/intel/ice/ice_lib.c @@ -4059,3 +4059,59 @@ void ice_vsi_update_l2tsel(struct ice_vsi *vsi, enum= ice_l2tsel l2tsel) wr32(hw, qrx_context_offset, regval); } } + +/** + * ice_vsi_has_outer_pvid - check if VSI has outer Port VLAN ID assigned + * @info: props of VSI in question + * + * Return: true if VSI has outer PVID, false otherwise. + */ +static bool +ice_vsi_has_outer_pvid(const struct ice_aqc_vsi_props *info) +{ + return info->outer_vlan_flags & ICE_AQ_VSI_OUTER_VLAN_PORT_BASED_INSERT; +} + +/** + * ice_vsi_has_inner_pvid - check if VSI has inner Port VLAN ID assigned + * @info: props of VSI in question + * + * Return: true if VSI has inner PVID, false otherwise. + */ +static bool +ice_vsi_has_inner_pvid(const struct ice_aqc_vsi_props *info) +{ + return info->inner_vlan_flags & ICE_AQ_VSI_INNER_VLAN_INSERT_PVID; +} + +/** + * ice_vsi_has_pvid - check if VSI has Port VLAN ID assigned + * @vsi: VSI in question + * + * Return: true if VSI has either outer or inner PVID, false otherwise. + */ +bool +ice_vsi_has_pvid(struct ice_vsi *vsi) +{ + return ice_vsi_has_outer_pvid(&vsi->info) || + ice_vsi_has_inner_pvid(&vsi->info); +} + +/** + * ice_vsi_pvid - retrieve VSI's Port VLAN ID + * @vsi: VSI in question + * + * Return: VSI's PVID; it is valid only if ice_vsi_has_pvid is true. + */ +u16 +ice_vsi_pvid(struct ice_vsi *vsi) +{ + __le16 vlan_info =3D 0; + + if (ice_vsi_has_outer_pvid(&vsi->info)) + vlan_info =3D vsi->info.port_based_outer_vlan; + else if (ice_vsi_has_inner_pvid(&vsi->info)) + vlan_info =3D vsi->info.port_based_inner_vlan; + + return le16_to_cpu(vlan_info) & VLAN_VID_MASK; +} diff --git a/drivers/net/ethernet/intel/ice/ice_lib.h b/drivers/net/etherne= t/intel/ice/ice_lib.h index 2cb1eb98b9da..c28c69963946 100644 --- a/drivers/net/ethernet/intel/ice/ice_lib.h +++ b/drivers/net/ethernet/intel/ice/ice_lib.h @@ -124,4 +124,6 @@ void ice_clear_feature_support(struct ice_pf *pf, enum = ice_feature f); void ice_init_feature_support(struct ice_pf *pf); bool ice_vsi_is_rx_queue_active(struct ice_vsi *vsi); void ice_vsi_update_l2tsel(struct ice_vsi *vsi, enum ice_l2tsel l2tsel); +bool ice_vsi_has_pvid(struct ice_vsi *vsi); +u16 ice_vsi_pvid(struct ice_vsi *vsi); #endif /* !_ICE_LIB_H_ */ --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BF51F36E9AF; Thu, 20 Nov 2025 16:28:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656113; cv=none; b=SdGvEuoc/O5y4SxZxPg7kxmpa4y3ioGpns3qLbeud2VmfzWBd0qDLd8cMQsfLUBC+3bUGtze8/Ectu/cHlRWCDe69wgXi6OWhtVISUcGDfmyC9v7Kqaes8xgyYmLjxidpDhqc4X5rxxPmDaBokkCsSyaOidt0jyJhVQ+i8Z1LP0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656113; c=relaxed/simple; bh=7mr82eL2NhNrBA6h6yqN1TZWLz9fgZvkV9spAxbZY5U=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=EkOY65j8fP8bnriUeXuh9d+ztjHBMIZQ0maF7aTddevqRySrQekJ2nAKg5I2U1Awm2VCgs2IrbGTpeSrb9Lgz0DXaVVIe4xtxldEyzN35/QqsKL72gh1s34QHhKHP6W0SuL8tSh8/E3fwnjCQrMvfqt37uSdyrxhMO8YqhDxU6k= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=FKevzLuF; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="FKevzLuF" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656112; x=1795192112; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=7mr82eL2NhNrBA6h6yqN1TZWLz9fgZvkV9spAxbZY5U=; b=FKevzLuF5Y7KEd1x3ZD67GuJyUabIUMebonii2oyFAqYtyKj8e7t8/FD 3OfaU5idqEIoJ6uo2fAm/0XRjdgjl0t0wvI3Kx7TEVwD1I5P0U+L8td89 GquP8NA5ZidT2KHhe6lPNqv2xXpCDctT19IJRjmDIglP5XOynW6A2NWhT 4mdNko3TsSmPKsbpuxSMbOfctHj5iUXiwBl+X5Uvaf0tcYXfc0fm7pEdu M+DncOX8UTr0Bw93nNa5q7JZgKML5HHbzYBebUko419uImEvGrFUoML1F ZUHVa/Mw65pUl8G0rfjN+R9tVDyI29AIL2oqgiVJVp6CZzjZ9rWQj2Cjc w==; X-CSE-ConnectionGUID: 7EmPWkohQQydotw3C3NR5A== X-CSE-MsgGUID: WfuCvzsSSvmzFkwXzAxQyA== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599313" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599313" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:31 -0800 X-CSE-ConnectionGUID: hx1B/rSOQdG1wDYDhYEXiA== X-CSE-MsgGUID: 5nZDR4qRSCWfqbYicYwY1Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531308" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:29 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 7/8] ice: add mac vlan to filter API Date: Thu, 20 Nov 2025 17:28:12 +0100 Message-ID: <20251120162813.37942-8-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Michal Swiatkowski Allow mac vlan filters to be managed by filters API in ice driver. Together with mac-only filters they will be used to forward traffic intended for loopback in VEB mode. Signed-off-by: Michal Swiatkowski Reviewed-by: Aleksandr Loktionov Signed-off-by: Jakub Slepecki --- drivers/net/ethernet/intel/ice/ice_fltr.c | 33 +++++++++++++++++++++++ drivers/net/ethernet/intel/ice/ice_fltr.h | 4 +++ 2 files changed, 37 insertions(+) diff --git a/drivers/net/ethernet/intel/ice/ice_fltr.c b/drivers/net/ethern= et/intel/ice/ice_fltr.c index aff7a141c30d..96a4e4b1b3fc 100644 --- a/drivers/net/ethernet/intel/ice/ice_fltr.c +++ b/drivers/net/ethernet/intel/ice/ice_fltr.c @@ -240,6 +240,39 @@ ice_fltr_add_mac_to_list(struct ice_vsi *vsi, struct l= ist_head *list, list); } =20 +/** + * ice_fltr_add_mac_vlan_to_list - add MAC VLAN filter info to + * existing list + * @vsi: pointer to VSI struct + * @list: list to add filter info to + * @mac: MAC address to add + * @vlan_id: VLAN id to add + * @action: filter action + * + * Return: + * * 0 if entry for filter was added, or + * * %-ENOMEM if entry could not be allocated. + */ +int +ice_fltr_add_mac_vlan_to_list(struct ice_vsi *vsi, struct list_head *list, + const u8 *mac, u16 vlan_id, + enum ice_sw_fwd_act_type action) +{ + struct ice_fltr_info info =3D {}; + + info.flag =3D ICE_FLTR_TX; + info.src_id =3D ICE_SRC_ID_VSI; + info.lkup_type =3D ICE_SW_LKUP_MAC_VLAN; + info.fltr_act =3D action; + info.vsi_handle =3D vsi->idx; + + info.l_data.mac_vlan.vlan_id =3D vlan_id; + ether_addr_copy(info.l_data.mac_vlan.mac_addr, mac); + + return ice_fltr_add_entry_to_list(ice_pf_to_dev(vsi->back), &info, + list); +} + /** * ice_fltr_add_vlan_to_list - add VLAN filter info to exsisting list * @vsi: pointer to VSI struct diff --git a/drivers/net/ethernet/intel/ice/ice_fltr.h b/drivers/net/ethern= et/intel/ice/ice_fltr.h index 0f3dbc308eec..fb9ffb39be50 100644 --- a/drivers/net/ethernet/intel/ice/ice_fltr.h +++ b/drivers/net/ethernet/intel/ice/ice_fltr.h @@ -23,6 +23,10 @@ int ice_fltr_add_mac_to_list(struct ice_vsi *vsi, struct list_head *list, const u8 *mac, enum ice_sw_fwd_act_type action); int +ice_fltr_add_mac_vlan_to_list(struct ice_vsi *vsi, struct list_head *list, + const u8 *mac, u16 vlan_id, + enum ice_sw_fwd_act_type action); +int ice_fltr_add_mac(struct ice_vsi *vsi, const u8 *mac, enum ice_sw_fwd_act_type action); int --=20 2.43.0 From nobody Tue Dec 2 01:51:38 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 80CC6393DD1; Thu, 20 Nov 2025 16:28:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656116; cv=none; b=h5JuS+PJnLXHtRbjEwh7hZGjjImRQ21uqAPkN4auI2OFvFwAOXThJ751qfKL6/3f+HwnY0Xu0cR0/m1bZpE7AxHtwn6Hq4D//UixuIgJr8tJRCgMRd49x6u+VaULMHsy0teZ1IoSxRpPy+b2hWb81GEno119M+/fzw7+HK2zNDk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763656116; c=relaxed/simple; bh=Qkd9LXSWIdk8gvMSxBPQuHaRcheqZ5atL8hP2EBRycM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=ZpSorYHe46yWeO0wwX2T614SROPEMQOI6P3RAWc/6MgR3nd705aqnwf0hs2frUiqpacwmACWnylzaBEKsUQ5c6XNJfiJQ//JMM1puFX0cAwdeIfDSz97/1WS1B8HsXk7n3gj/WbVZueJmmsSX1ynnJQ8+lphxKqPKCwV2rdjWGU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=jXjhRGgf; arc=none smtp.client-ip=192.198.163.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="jXjhRGgf" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1763656114; x=1795192114; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Qkd9LXSWIdk8gvMSxBPQuHaRcheqZ5atL8hP2EBRycM=; b=jXjhRGgfTlFH54aOhGEXidfDrNci0YhqMmwyzwN/cpBEm9BFsxZUImeH cfS1wicOMZyzHFt0JYYJ+s7InQzZ73jkfioRVv1cfqG0g0wV7Zl6K1Zz8 tzVbyTm61+dNFxhMrCKB7Zep5YKyymDHexlZyA65zx95H0StlX/TyzUIn JGoN+c7BD8K0xr/cLoWyOatySv4X/f/AB6N+6Xi44O9Puuafkul5jjw1T vRzSWx7yHlGHn2kYKw6WnJ7vd3jwFMGj+HbA03QGKgE41RJGLIWfap7Vl 31+sa+O2ew7N2nsuU/ckjTofyVHcRdKzonW+t81spIbiCT5tWKZiZEKX5 g==; X-CSE-ConnectionGUID: I5aqdFS7SjuMghqTMAJ2LA== X-CSE-MsgGUID: TbWMjT9RT42hguDulsVSGg== X-IronPort-AV: E=McAfee;i="6800,10657,11619"; a="69599318" X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="69599318" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by fmvoesa106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2025 08:28:34 -0800 X-CSE-ConnectionGUID: /4wv4P5YTRunnpl/xwWfaA== X-CSE-MsgGUID: xLKBsfVrQqGscFBYtI4eEg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,213,1758610800"; d="scan'208";a="191531312" Received: from hpe-dl385gen10.igk.intel.com ([10.91.240.117]) by orviesa008.jf.intel.com with ESMTP; 20 Nov 2025 08:28:31 -0800 From: Jakub Slepecki To: intel-wired-lan@lists.osuosl.org Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, przemyslaw.kitszel@intel.com, anthony.l.nguyen@intel.com, michal.swiatkowski@linux.intel.com, jakub.slepecki@intel.com Subject: [PATCH iwl-next 8/8] ice: in VEB, prevent "cross-vlan" traffic from hitting loopback Date: Thu, 20 Nov 2025 17:28:13 +0100 Message-ID: <20251120162813.37942-9-jakub.slepecki@intel.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120162813.37942-1-jakub.slepecki@intel.com> References: <20251120162813.37942-1-jakub.slepecki@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" In Virtual Ethernet Bridge (VEB) mode, we use MAC filters to forward traffic between two VFs. We also use VLAN filters to prune potential destinations, so that they don't cross VLANs. In case a VF in VLAN X sends a packet to a MAC address matching another VF but in VLAN Y, both these filters will be hit. Packet will be sent to loopback-only to VF in VLAN Y, but VLAN filter will prune its VSI from the destination list leaving the packet stranded in the internal switch and thus dropped. Since there is no destination for the packet in the VLAN X, it should instead be sent to the wire. To fix this, we introduce MAC,VLAN filters in place of MAC-only filters if VSI is part of any VLAN. We consider VSI part of a VLAN if it has a PVID set, or if it has a specific VLAN filter and does not have a VLAN 0 filter. This approach does not attempt to fix interactions with upper devices. If an upper vlan device requests a separate MAC address filter resulting in a call to __dev_uc_sync, the VSI will start receiving all packets destined for this MAC and not just within the VLAN. I don't see a straight-forward way to resolve this: information about MAC and VLAN filters coming from kernel to driver is disconnected from one another and from the device that requests it. It could be worked around by, for example, tracking all upper devices with netdev notifications and adjusting the filters there. The scope of this patch is hence limited to VF traffic. Following situations were considered for VLAN filters additions, removal, or changes: 1. ice changes VF's vlan 2. VF is reset and rebuilt 3. vlan device attaches above a PF or a VF And same for MAC filters: 4. PF's MAC is changed 5. PF changes MAC of a VF 6. VF's MAC is changed 7. ndo_set_rx_mode et al When VLAN is assigned to a VF in (1), the affected VF is reset and rebuild. This makes (1) the same as (2). We end up with two cases where VLAN filters are added: (2) and (3). To correctly handle (1-2), we move the VLAN filters initialization before the MAC filters initialization, since MAC filters now depend on VLAN filters presence. These two handle PVID (or lack of thereof) and because they are always associated with a reset, we don't need to consider updating MAC and MAC,VLAN filters afterwards. In (3), we will always have a lower device that is expected to receive all packets for its MAC regardless of VLAN tag. Because of the caveat described above, we will do the same for each MAC address associated with the interface regardless of VLANs. The result is we only have MAC-only filters in this case. When we create MAC filters in (4-7) we now check for existing VLAN filters and depending on PVID and VLAN 0 presence we decide to create, respectively, a MAC and MAC,VLAN filter pair, or a MAC filter. This is done implicitly when requesting to remove old MAC and add new MAC, so no change is required to this flow. Reviewed-by: Michal Swiatkowski Reviewed-by: Aleksandr Loktionov Signed-off-by: Jakub Slepecki --- Note the /a.s. dead/ branch in ice_fltr.c. I decided to make it explicit, but it can be merged into VLAN 0 branch as well (with or without a comment), because their final effect is exactly the same. --- drivers/net/ethernet/intel/ice/ice_fltr.c | 71 +++++++++++++++++++-- drivers/net/ethernet/intel/ice/ice_fltr.h | 6 +- drivers/net/ethernet/intel/ice/ice_main.c | 8 +-- drivers/net/ethernet/intel/ice/ice_switch.c | 2 +- drivers/net/ethernet/intel/ice/ice_switch.h | 2 + drivers/net/ethernet/intel/ice/ice_vf_lib.c | 8 +-- 6 files changed, 83 insertions(+), 14 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_fltr.c b/drivers/net/ethern= et/intel/ice/ice_fltr.c index 96a4e4b1b3fc..c0fc1bced167 100644 --- a/drivers/net/ethernet/intel/ice/ice_fltr.c +++ b/drivers/net/ethernet/intel/ice/ice_fltr.c @@ -3,6 +3,7 @@ =20 #include "ice.h" #include "ice_fltr.h" +#include "ice_lib.h" =20 /** * ice_fltr_free_list - free filter lists helper @@ -221,10 +222,12 @@ void ice_fltr_remove_all(struct ice_vsi *vsi) * @list: list to add filter info to * @mac: MAC address to add * @action: filter action + * @external: force the filter to enable lan destination */ int ice_fltr_add_mac_to_list(struct ice_vsi *vsi, struct list_head *list, - const u8 *mac, enum ice_sw_fwd_act_type action) + const u8 *mac, enum ice_sw_fwd_act_type action, + bool external) { struct ice_fltr_info info =3D { 0 }; =20 @@ -233,6 +236,10 @@ ice_fltr_add_mac_to_list(struct ice_vsi *vsi, struct l= ist_head *list, info.lkup_type =3D ICE_SW_LKUP_MAC; info.fltr_act =3D action; info.vsi_handle =3D vsi->idx; + if (external) { + info.lb_en =3D ICE_FLTR_INFO_LB_LAN_FORCE_ENABLED; + info.lan_en =3D ICE_FLTR_INFO_LB_LAN_FORCE_ENABLED; + } =20 ether_addr_copy(info.l_data.mac.mac_addr, mac); =20 @@ -273,6 +280,62 @@ ice_fltr_add_mac_vlan_to_list(struct ice_vsi *vsi, str= uct list_head *list, list); } =20 +/** + * ice_fltr_add_macs_to_list - add MAC and MAC,VLAN filters info to an exi= sting + * list + * @vsi: pointer to VSI struct + * @list: list to add filter info to + * @mac: MAC address to add + * @action: filter action + * + * Return: + * * 0 on success, or + * * %-ENOMEM if entry for filter could not be allocated. + */ +int +ice_fltr_add_macs_to_list(struct ice_vsi *vsi, struct list_head *list, + const u8 *mac, enum ice_sw_fwd_act_type action) +{ + if (is_multicast_ether_addr(mac)) { + /* There is no point in doing the same gymnastics as below + * because multicast addresses are sent to both lan and lb then + * pruned as necessary. + */ + return ice_fltr_add_mac_to_list(vsi, list, mac, action, false); + } else if (ice_vsi_has_pvid(vsi)) { + u16 pvid =3D ice_vsi_pvid(vsi); + int ret; + + ret =3D ice_fltr_add_mac_to_list(vsi, list, mac, action, true); + if (ret) + return ret; + + return ice_fltr_add_mac_vlan_to_list(vsi, list, mac, pvid, + action); + } else if (vsi->num_vlan !=3D ice_vsi_num_non_zero_vlans(vsi)) { + /* If VSI has VLAN 0 filters, then the interface is prepared to + * receive untagged packets. As of now, we simply don't have + * heuristics to decide which MAC is and is not part of which + * VLAN so we put them all in the same bucket. + */ + return ice_fltr_add_mac_to_list(vsi, list, mac, action, false); + } + + /* This branch is a.s. dead. There are three cases that may happen: + * + * - no vlans in sight; this is the VLAN 0 branch, + * - VF is assigned PVID; this is ice_vsi_has_pvid branch, + * - PF or VF is under vlan device; this is the VLAN 0 branch. + * + * This is where you would implement support for multiple VLANs but + * without the VLAN 0. This could happen if vlan upper device is + * assigned a MAC that is unique compared to lower ice device that is + * forced to accept any VLAN. This would imply MAC-only filter for one + * MAC address (PF) and MAC,VLAN+MAC filters for another (vlan). + */ + return ice_fltr_add_mac_to_list(vsi, list, mac, action, false); +} + /** * ice_fltr_add_vlan_to_list - add VLAN filter info to exsisting list * @vsi: pointer to VSI struct @@ -343,7 +406,7 @@ ice_fltr_prepare_mac(struct ice_vsi *vsi, const u8 *mac, LIST_HEAD(tmp_list); int result; =20 - if (ice_fltr_add_mac_to_list(vsi, &tmp_list, mac, action)) { + if (ice_fltr_add_macs_to_list(vsi, &tmp_list, mac, action)) { ice_fltr_free_list(ice_pf_to_dev(vsi->back), &tmp_list); return -ENOMEM; } @@ -371,8 +434,8 @@ ice_fltr_prepare_mac_and_broadcast(struct ice_vsi *vsi,= const u8 *mac, int result; =20 eth_broadcast_addr(broadcast); - if (ice_fltr_add_mac_to_list(vsi, &tmp_list, mac, action) || - ice_fltr_add_mac_to_list(vsi, &tmp_list, broadcast, action)) { + if (ice_fltr_add_macs_to_list(vsi, &tmp_list, mac, action) || + ice_fltr_add_macs_to_list(vsi, &tmp_list, broadcast, action)) { ice_fltr_free_list(ice_pf_to_dev(vsi->back), &tmp_list); return -ENOMEM; } diff --git a/drivers/net/ethernet/intel/ice/ice_fltr.h b/drivers/net/ethern= et/intel/ice/ice_fltr.h index fb9ffb39be50..ed3371b0a71f 100644 --- a/drivers/net/ethernet/intel/ice/ice_fltr.h +++ b/drivers/net/ethernet/intel/ice/ice_fltr.h @@ -21,12 +21,16 @@ ice_fltr_set_vsi_promisc(struct ice_hw *hw, u16 vsi_han= dle, u8 promisc_mask, u16 vid); int ice_fltr_add_mac_to_list(struct ice_vsi *vsi, struct list_head *list, - const u8 *mac, enum ice_sw_fwd_act_type action); + const u8 *mac, enum ice_sw_fwd_act_type action, + bool external); int ice_fltr_add_mac_vlan_to_list(struct ice_vsi *vsi, struct list_head *list, const u8 *mac, u16 vlan_id, enum ice_sw_fwd_act_type action); int +ice_fltr_add_macs_to_list(struct ice_vsi *vsi, struct list_head *list, + const u8 *mac, enum ice_sw_fwd_act_type action); +int ice_fltr_add_mac(struct ice_vsi *vsi, const u8 *mac, enum ice_sw_fwd_act_type action); int diff --git a/drivers/net/ethernet/intel/ice/ice_main.c b/drivers/net/ethern= et/intel/ice/ice_main.c index 661af039bf4f..8325f06c41a8 100644 --- a/drivers/net/ethernet/intel/ice/ice_main.c +++ b/drivers/net/ethernet/intel/ice/ice_main.c @@ -212,8 +212,8 @@ static int ice_add_mac_to_sync_list(struct net_device *= netdev, const u8 *addr) struct ice_netdev_priv *np =3D netdev_priv(netdev); struct ice_vsi *vsi =3D np->vsi; =20 - if (ice_fltr_add_mac_to_list(vsi, &vsi->tmp_sync_list, addr, - ICE_FWD_TO_VSI)) + if (ice_fltr_add_macs_to_list(vsi, &vsi->tmp_sync_list, addr, + ICE_FWD_TO_VSI)) return -EINVAL; =20 return 0; @@ -242,8 +242,8 @@ static int ice_add_mac_to_unsync_list(struct net_device= *netdev, const u8 *addr) if (ether_addr_equal(addr, netdev->dev_addr)) return 0; =20 - if (ice_fltr_add_mac_to_list(vsi, &vsi->tmp_unsync_list, addr, - ICE_FWD_TO_VSI)) + if (ice_fltr_add_macs_to_list(vsi, &vsi->tmp_unsync_list, addr, + ICE_FWD_TO_VSI)) return -EINVAL; =20 return 0; diff --git a/drivers/net/ethernet/intel/ice/ice_switch.c b/drivers/net/ethe= rnet/intel/ice/ice_switch.c index b1445dfb1b64..ca19affbbf2a 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.c +++ b/drivers/net/ethernet/intel/ice/ice_switch.c @@ -4016,7 +4016,7 @@ ice_cfg_dflt_vsi(struct ice_port_info *pi, u16 vsi_ha= ndle, bool set, * @fm_entry: filter entry to inspect * @vsi_handle: VSI handle to compare with filter info */ -static bool +bool ice_vsi_uses_fltr(struct ice_fltr_mgmt_list_entry *fm_entry, u16 vsi_handl= e) { return ((fm_entry->fltr_info.fltr_act =3D=3D ICE_FWD_TO_VSI && diff --git a/drivers/net/ethernet/intel/ice/ice_switch.h b/drivers/net/ethe= rnet/intel/ice/ice_switch.h index 60527475959b..79648f525abf 100644 --- a/drivers/net/ethernet/intel/ice/ice_switch.h +++ b/drivers/net/ethernet/intel/ice/ice_switch.h @@ -340,6 +340,8 @@ ice_update_vsi(struct ice_hw *hw, u16 vsi_handle, struc= t ice_vsi_ctx *vsi_ctx, bool ice_is_vsi_valid(struct ice_hw *hw, u16 vsi_handle); struct ice_vsi_ctx *ice_get_vsi_ctx(struct ice_hw *hw, u16 vsi_handle); void ice_clear_all_vsi_ctx(struct ice_hw *hw); +bool ice_vsi_uses_fltr(struct ice_fltr_mgmt_list_entry *fm_entry, + u16 vsi_handle); /* Switch config */ int ice_get_initial_sw_cfg(struct ice_hw *hw); =20 diff --git a/drivers/net/ethernet/intel/ice/ice_vf_lib.c b/drivers/net/ethe= rnet/intel/ice/ice_vf_lib.c index de9e81ccee66..1031ce20bb60 100644 --- a/drivers/net/ethernet/intel/ice/ice_vf_lib.c +++ b/drivers/net/ethernet/intel/ice/ice_vf_lib.c @@ -501,14 +501,14 @@ static void ice_vf_rebuild_host_cfg(struct ice_vf *vf) =20 ice_vf_set_host_trust_cfg(vf); =20 - if (ice_vf_rebuild_host_mac_cfg(vf)) - dev_err(dev, "failed to rebuild default MAC configuration for VF %d\n", - vf->vf_id); - if (ice_vf_rebuild_host_vlan_cfg(vf, vsi)) dev_err(dev, "failed to rebuild VLAN configuration for VF %u\n", vf->vf_id); =20 + if (ice_vf_rebuild_host_mac_cfg(vf)) + dev_err(dev, "failed to rebuild default MAC configuration for VF %d\n", + vf->vf_id); + if (ice_vf_rebuild_host_tx_rate_cfg(vf)) dev_err(dev, "failed to rebuild Tx rate limiting configuration for VF %u= \n", vf->vf_id); --=20 2.43.0