0001 ============
0002 Architecture
0003 ============
0004
0005 This document describes the **Distributed Switch Architecture (DSA)** subsystem
0006 design principles, limitations, interactions with other subsystems, and how to
0007 develop drivers for this subsystem as well as a TODO for developers interested
0008 in joining the effort.
0009
0010 Design principles
0011 =================
0012
0013 The Distributed Switch Architecture subsystem was primarily designed to
0014 support Marvell Ethernet switches (MV88E6xxx, a.k.a. Link Street product
0015 line) using Linux, but has since evolved to support other vendors as well.
0016
0017 The original philosophy behind this design was to be able to use unmodified
0018 Linux tools such as bridge, iproute2, ifconfig to work transparently whether
0019 they configured/queried a switch port network device or a regular network
0020 device.
0021
0022 An Ethernet switch typically comprises multiple front-panel ports and one
0023 or more CPU or management ports. The DSA subsystem currently relies on the
0024 presence of a management port connected to an Ethernet controller capable of
0025 receiving Ethernet frames from the switch. This is a very common setup for all
0026 kinds of Ethernet switches found in Small Home and Office products: routers,
0027 gateways, or even top-of-rack switches. This host Ethernet controller will
0028 be later referred to as "master" and "cpu" in DSA terminology and code.
0029
0030 The D in DSA stands for Distributed, because the subsystem has been designed
0031 with the ability to configure and manage cascaded switches on top of each other
0032 using upstream and downstream Ethernet links between switches. These specific
0033 ports are referred to as "dsa" ports in DSA terminology and code. A collection
0034 of multiple switches connected to each other is called a "switch tree".
0035
0036 For each front-panel port, DSA creates specialized network devices which are
0037 used as controlling and data-flowing endpoints for use by the Linux networking
0038 stack. These specialized network interfaces are referred to as "slave" network
0039 interfaces in DSA terminology and code.
0040
0041 The ideal case for using DSA is when an Ethernet switch supports a "switch tag"
0042 which is a hardware feature making the switch insert a specific tag for each
0043 Ethernet frame it receives to/from specific ports to help the management
0044 interface figure out:
0045
0046 - what port is this frame coming from
0047 - what was the reason why this frame got forwarded
0048 - how to send CPU originated traffic to specific ports
0049
0050 The subsystem does support switches not capable of inserting/stripping tags, but
0051 the features might be slightly limited in that case (traffic separation relies
0052 on Port-based VLAN IDs).
0053
0054 Note that DSA does not currently create network interfaces for the "cpu" and
0055 "dsa" ports because:
0056
0057 - the "cpu" port is the Ethernet switch facing side of the management
0058 controller, and as such, would create a duplication of feature, since you
0059 would get two interfaces for the same conduit: master netdev, and "cpu" netdev
0060
0061 - the "dsa" port(s) are just conduits between two or more switches, and as such
0062 cannot really be used as proper network interfaces either, only the
0063 downstream, or the top-most upstream interface makes sense with that model
0064
0065 Switch tagging protocols
0066 ------------------------
0067
0068 DSA supports many vendor-specific tagging protocols, one software-defined
0069 tagging protocol, and a tag-less mode as well (``DSA_TAG_PROTO_NONE``).
0070
0071 The exact format of the tag protocol is vendor specific, but in general, they
0072 all contain something which:
0073
0074 - identifies which port the Ethernet frame came from/should be sent to
0075 - provides a reason why this frame was forwarded to the management interface
0076
0077 All tagging protocols are in ``net/dsa/tag_*.c`` files and implement the
0078 methods of the ``struct dsa_device_ops`` structure, which are detailed below.
0079
0080 Tagging protocols generally fall in one of three categories:
0081
0082 1. The switch-specific frame header is located before the Ethernet header,
0083 shifting to the right (from the perspective of the DSA master's frame
0084 parser) the MAC DA, MAC SA, EtherType and the entire L2 payload.
0085 2. The switch-specific frame header is located before the EtherType, keeping
0086 the MAC DA and MAC SA in place from the DSA master's perspective, but
0087 shifting the 'real' EtherType and L2 payload to the right.
0088 3. The switch-specific frame header is located at the tail of the packet,
0089 keeping all frame headers in place and not altering the view of the packet
0090 that the DSA master's frame parser has.
0091
0092 A tagging protocol may tag all packets with switch tags of the same length, or
0093 the tag length might vary (for example packets with PTP timestamps might
0094 require an extended switch tag, or there might be one tag length on TX and a
0095 different one on RX). Either way, the tagging protocol driver must populate the
0096 ``struct dsa_device_ops::needed_headroom`` and/or ``struct dsa_device_ops::needed_tailroom``
0097 with the length in octets of the longest switch frame header/trailer. The DSA
0098 framework will automatically adjust the MTU of the master interface to
0099 accommodate for this extra size in order for DSA user ports to support the
0100 standard MTU (L2 payload length) of 1500 octets. The ``needed_headroom`` and
0101 ``needed_tailroom`` properties are also used to request from the network stack,
0102 on a best-effort basis, the allocation of packets with enough extra space such
0103 that the act of pushing the switch tag on transmission of a packet does not
0104 cause it to reallocate due to lack of memory.
0105
0106 Even though applications are not expected to parse DSA-specific frame headers,
0107 the format on the wire of the tagging protocol represents an Application Binary
0108 Interface exposed by the kernel towards user space, for decoders such as
0109 ``libpcap``. The tagging protocol driver must populate the ``proto`` member of
0110 ``struct dsa_device_ops`` with a value that uniquely describes the
0111 characteristics of the interaction required between the switch hardware and the
0112 data path driver: the offset of each bit field within the frame header and any
0113 stateful processing required to deal with the frames (as may be required for
0114 PTP timestamping).
0115
0116 From the perspective of the network stack, all switches within the same DSA
0117 switch tree use the same tagging protocol. In case of a packet transiting a
0118 fabric with more than one switch, the switch-specific frame header is inserted
0119 by the first switch in the fabric that the packet was received on. This header
0120 typically contains information regarding its type (whether it is a control
0121 frame that must be trapped to the CPU, or a data frame to be forwarded).
0122 Control frames should be decapsulated only by the software data path, whereas
0123 data frames might also be autonomously forwarded towards other user ports of
0124 other switches from the same fabric, and in this case, the outermost switch
0125 ports must decapsulate the packet.
0126
0127 Note that in certain cases, it might be the case that the tagging format used
0128 by a leaf switch (not connected directly to the CPU) is not the same as what
0129 the network stack sees. This can be seen with Marvell switch trees, where the
0130 CPU port can be configured to use either the DSA or the Ethertype DSA (EDSA)
0131 format, but the DSA links are configured to use the shorter (without Ethertype)
0132 DSA frame header, in order to reduce the autonomous packet forwarding overhead.
0133 It still remains the case that, if the DSA switch tree is configured for the
0134 EDSA tagging protocol, the operating system sees EDSA-tagged packets from the
0135 leaf switches that tagged them with the shorter DSA header. This can be done
0136 because the Marvell switch connected directly to the CPU is configured to
0137 perform tag translation between DSA and EDSA (which is simply the operation of
0138 adding or removing the ``ETH_P_EDSA`` EtherType and some padding octets).
0139
0140 It is possible to construct cascaded setups of DSA switches even if their
0141 tagging protocols are not compatible with one another. In this case, there are
0142 no DSA links in this fabric, and each switch constitutes a disjoint DSA switch
0143 tree. The DSA links are viewed as simply a pair of a DSA master (the out-facing
0144 port of the upstream DSA switch) and a CPU port (the in-facing port of the
0145 downstream DSA switch).
0146
0147 The tagging protocol of the attached DSA switch tree can be viewed through the
0148 ``dsa/tagging`` sysfs attribute of the DSA master::
0149
0150 cat /sys/class/net/eth0/dsa/tagging
0151
0152 If the hardware and driver are capable, the tagging protocol of the DSA switch
0153 tree can be changed at runtime. This is done by writing the new tagging
0154 protocol name to the same sysfs device attribute as above (the DSA master and
0155 all attached switch ports must be down while doing this).
0156
0157 It is desirable that all tagging protocols are testable with the ``dsa_loop``
0158 mockup driver, which can be attached to any network interface. The goal is that
0159 any network interface should be capable of transmitting the same packet in the
0160 same way, and the tagger should decode the same received packet in the same way
0161 regardless of the driver used for the switch control path, and the driver used
0162 for the DSA master.
0163
0164 The transmission of a packet goes through the tagger's ``xmit`` function.
0165 The passed ``struct sk_buff *skb`` has ``skb->data`` pointing at
0166 ``skb_mac_header(skb)``, i.e. at the destination MAC address, and the passed
0167 ``struct net_device *dev`` represents the virtual DSA user network interface
0168 whose hardware counterpart the packet must be steered to (i.e. ``swp0``).
0169 The job of this method is to prepare the skb in a way that the switch will
0170 understand what egress port the packet is for (and not deliver it towards other
0171 ports). Typically this is fulfilled by pushing a frame header. Checking for
0172 insufficient size in the skb headroom or tailroom is unnecessary provided that
0173 the ``needed_headroom`` and ``needed_tailroom`` properties were filled out
0174 properly, because DSA ensures there is enough space before calling this method.
0175
0176 The reception of a packet goes through the tagger's ``rcv`` function. The
0177 passed ``struct sk_buff *skb`` has ``skb->data`` pointing at
0178 ``skb_mac_header(skb) + ETH_ALEN`` octets, i.e. to where the first octet after
0179 the EtherType would have been, were this frame not tagged. The role of this
0180 method is to consume the frame header, adjust ``skb->data`` to really point at
0181 the first octet after the EtherType, and to change ``skb->dev`` to point to the
0182 virtual DSA user network interface corresponding to the physical front-facing
0183 switch port that the packet was received on.
0184
0185 Since tagging protocols in category 1 and 2 break software (and most often also
0186 hardware) packet dissection on the DSA master, features such as RPS (Receive
0187 Packet Steering) on the DSA master would be broken. The DSA framework deals
0188 with this by hooking into the flow dissector and shifting the offset at which
0189 the IP header is to be found in the tagged frame as seen by the DSA master.
0190 This behavior is automatic based on the ``overhead`` value of the tagging
0191 protocol. If not all packets are of equal size, the tagger can implement the
0192 ``flow_dissect`` method of the ``struct dsa_device_ops`` and override this
0193 default behavior by specifying the correct offset incurred by each individual
0194 RX packet. Tail taggers do not cause issues to the flow dissector.
0195
0196 Checksum offload should work with category 1 and 2 taggers when the DSA master
0197 driver declares NETIF_F_HW_CSUM in vlan_features and looks at csum_start and
0198 csum_offset. For those cases, DSA will shift the checksum start and offset by
0199 the tag size. If the DSA master driver still uses the legacy NETIF_F_IP_CSUM
0200 or NETIF_F_IPV6_CSUM in vlan_features, the offload might only work if the
0201 offload hardware already expects that specific tag (perhaps due to matching
0202 vendors). DSA slaves inherit those flags from the master port, and it is up to
0203 the driver to correctly fall back to software checksum when the IP header is not
0204 where the hardware expects. If that check is ineffective, the packets might go
0205 to the network without a proper checksum (the checksum field will have the
0206 pseudo IP header sum). For category 3, when the offload hardware does not
0207 already expect the switch tag in use, the checksum must be calculated before any
0208 tag is inserted (i.e. inside the tagger). Otherwise, the DSA master would
0209 include the tail tag in the (software or hardware) checksum calculation. Then,
0210 when the tag gets stripped by the switch during transmission, it will leave an
0211 incorrect IP checksum in place.
0212
0213 Due to various reasons (most common being category 1 taggers being associated
0214 with DSA-unaware masters, mangling what the master perceives as MAC DA), the
0215 tagging protocol may require the DSA master to operate in promiscuous mode, to
0216 receive all frames regardless of the value of the MAC DA. This can be done by
0217 setting the ``promisc_on_master`` property of the ``struct dsa_device_ops``.
0218 Note that this assumes a DSA-unaware master driver, which is the norm.
0219
0220 Master network devices
0221 ----------------------
0222
0223 Master network devices are regular, unmodified Linux network device drivers for
0224 the CPU/management Ethernet interface. Such a driver might occasionally need to
0225 know whether DSA is enabled (e.g.: to enable/disable specific offload features),
0226 but the DSA subsystem has been proven to work with industry standard drivers:
0227 ``e1000e,`` ``mv643xx_eth`` etc. without having to introduce modifications to these
0228 drivers. Such network devices are also often referred to as conduit network
0229 devices since they act as a pipe between the host processor and the hardware
0230 Ethernet switch.
0231
0232 Networking stack hooks
0233 ----------------------
0234
0235 When a master netdev is used with DSA, a small hook is placed in the
0236 networking stack is in order to have the DSA subsystem process the Ethernet
0237 switch specific tagging protocol. DSA accomplishes this by registering a
0238 specific (and fake) Ethernet type (later becoming ``skb->protocol``) with the
0239 networking stack, this is also known as a ``ptype`` or ``packet_type``. A typical
0240 Ethernet Frame receive sequence looks like this:
0241
0242 Master network device (e.g.: e1000e):
0243
0244 1. Receive interrupt fires:
0245
0246 - receive function is invoked
0247 - basic packet processing is done: getting length, status etc.
0248 - packet is prepared to be processed by the Ethernet layer by calling
0249 ``eth_type_trans``
0250
0251 2. net/ethernet/eth.c::
0252
0253 eth_type_trans(skb, dev)
0254 if (dev->dsa_ptr != NULL)
0255 -> skb->protocol = ETH_P_XDSA
0256
0257 3. drivers/net/ethernet/\*::
0258
0259 netif_receive_skb(skb)
0260 -> iterate over registered packet_type
0261 -> invoke handler for ETH_P_XDSA, calls dsa_switch_rcv()
0262
0263 4. net/dsa/dsa.c::
0264
0265 -> dsa_switch_rcv()
0266 -> invoke switch tag specific protocol handler in 'net/dsa/tag_*.c'
0267
0268 5. net/dsa/tag_*.c:
0269
0270 - inspect and strip switch tag protocol to determine originating port
0271 - locate per-port network device
0272 - invoke ``eth_type_trans()`` with the DSA slave network device
0273 - invoked ``netif_receive_skb()``
0274
0275 Past this point, the DSA slave network devices get delivered regular Ethernet
0276 frames that can be processed by the networking stack.
0277
0278 Slave network devices
0279 ---------------------
0280
0281 Slave network devices created by DSA are stacked on top of their master network
0282 device, each of these network interfaces will be responsible for being a
0283 controlling and data-flowing end-point for each front-panel port of the switch.
0284 These interfaces are specialized in order to:
0285
0286 - insert/remove the switch tag protocol (if it exists) when sending traffic
0287 to/from specific switch ports
0288 - query the switch for ethtool operations: statistics, link state,
0289 Wake-on-LAN, register dumps...
0290 - manage external/internal PHY: link, auto-negotiation, etc.
0291
0292 These slave network devices have custom net_device_ops and ethtool_ops function
0293 pointers which allow DSA to introduce a level of layering between the networking
0294 stack/ethtool and the switch driver implementation.
0295
0296 Upon frame transmission from these slave network devices, DSA will look up which
0297 switch tagging protocol is currently registered with these network devices and
0298 invoke a specific transmit routine which takes care of adding the relevant
0299 switch tag in the Ethernet frames.
0300
0301 These frames are then queued for transmission using the master network device
0302 ``ndo_start_xmit()`` function. Since they contain the appropriate switch tag, the
0303 Ethernet switch will be able to process these incoming frames from the
0304 management interface and deliver them to the physical switch port.
0305
0306 Graphical representation
0307 ------------------------
0308
0309 Summarized, this is basically how DSA looks like from a network device
0310 perspective::
0311
0312 Unaware application
0313 opens and binds socket
0314 | ^
0315 | |
0316 +-----------v--|--------------------+
0317 |+------+ +------+ +------+ +------+|
0318 || swp0 | | swp1 | | swp2 | | swp3 ||
0319 |+------+-+------+-+------+-+------+|
0320 | DSA switch driver |
0321 +-----------------------------------+
0322 | ^
0323 Tag added by | | Tag consumed by
0324 switch driver | | switch driver
0325 v |
0326 +-----------------------------------+
0327 | Unmodified host interface driver | Software
0328 --------+-----------------------------------+------------
0329 | Host interface (eth0) | Hardware
0330 +-----------------------------------+
0331 | ^
0332 Tag consumed by | | Tag added by
0333 switch hardware | | switch hardware
0334 v |
0335 +-----------------------------------+
0336 | Switch |
0337 |+------+ +------+ +------+ +------+|
0338 || swp0 | | swp1 | | swp2 | | swp3 ||
0339 ++------+-+------+-+------+-+------++
0340
0341 Slave MDIO bus
0342 --------------
0343
0344 In order to be able to read to/from a switch PHY built into it, DSA creates a
0345 slave MDIO bus which allows a specific switch driver to divert and intercept
0346 MDIO reads/writes towards specific PHY addresses. In most MDIO-connected
0347 switches, these functions would utilize direct or indirect PHY addressing mode
0348 to return standard MII registers from the switch builtin PHYs, allowing the PHY
0349 library and/or to return link status, link partner pages, auto-negotiation
0350 results, etc.
0351
0352 For Ethernet switches which have both external and internal MDIO buses, the
0353 slave MII bus can be utilized to mux/demux MDIO reads and writes towards either
0354 internal or external MDIO devices this switch might be connected to: internal
0355 PHYs, external PHYs, or even external switches.
0356
0357 Data structures
0358 ---------------
0359
0360 DSA data structures are defined in ``include/net/dsa.h`` as well as
0361 ``net/dsa/dsa_priv.h``:
0362
0363 - ``dsa_chip_data``: platform data configuration for a given switch device,
0364 this structure describes a switch device's parent device, its address, as
0365 well as various properties of its ports: names/labels, and finally a routing
0366 table indication (when cascading switches)
0367
0368 - ``dsa_platform_data``: platform device configuration data which can reference
0369 a collection of dsa_chip_data structures if multiple switches are cascaded,
0370 the master network device this switch tree is attached to needs to be
0371 referenced
0372
0373 - ``dsa_switch_tree``: structure assigned to the master network device under
0374 ``dsa_ptr``, this structure references a dsa_platform_data structure as well as
0375 the tagging protocol supported by the switch tree, and which receive/transmit
0376 function hooks should be invoked, information about the directly attached
0377 switch is also provided: CPU port. Finally, a collection of dsa_switch are
0378 referenced to address individual switches in the tree.
0379
0380 - ``dsa_switch``: structure describing a switch device in the tree, referencing
0381 a ``dsa_switch_tree`` as a backpointer, slave network devices, master network
0382 device, and a reference to the backing``dsa_switch_ops``
0383
0384 - ``dsa_switch_ops``: structure referencing function pointers, see below for a
0385 full description.
0386
0387 Design limitations
0388 ==================
0389
0390 Lack of CPU/DSA network devices
0391 -------------------------------
0392
0393 DSA does not currently create slave network devices for the CPU or DSA ports, as
0394 described before. This might be an issue in the following cases:
0395
0396 - inability to fetch switch CPU port statistics counters using ethtool, which
0397 can make it harder to debug MDIO switch connected using xMII interfaces
0398
0399 - inability to configure the CPU port link parameters based on the Ethernet
0400 controller capabilities attached to it: http://patchwork.ozlabs.org/patch/509806/
0401
0402 - inability to configure specific VLAN IDs / trunking VLANs between switches
0403 when using a cascaded setup
0404
0405 Common pitfalls using DSA setups
0406 --------------------------------
0407
0408 Once a master network device is configured to use DSA (dev->dsa_ptr becomes
0409 non-NULL), and the switch behind it expects a tagging protocol, this network
0410 interface can only exclusively be used as a conduit interface. Sending packets
0411 directly through this interface (e.g.: opening a socket using this interface)
0412 will not make us go through the switch tagging protocol transmit function, so
0413 the Ethernet switch on the other end, expecting a tag will typically drop this
0414 frame.
0415
0416 Interactions with other subsystems
0417 ==================================
0418
0419 DSA currently leverages the following subsystems:
0420
0421 - MDIO/PHY library: ``drivers/net/phy/phy.c``, ``mdio_bus.c``
0422 - Switchdev:``net/switchdev/*``
0423 - Device Tree for various of_* functions
0424 - Devlink: ``net/core/devlink.c``
0425
0426 MDIO/PHY library
0427 ----------------
0428
0429 Slave network devices exposed by DSA may or may not be interfacing with PHY
0430 devices (``struct phy_device`` as defined in ``include/linux/phy.h)``, but the DSA
0431 subsystem deals with all possible combinations:
0432
0433 - internal PHY devices, built into the Ethernet switch hardware
0434 - external PHY devices, connected via an internal or external MDIO bus
0435 - internal PHY devices, connected via an internal MDIO bus
0436 - special, non-autonegotiated or non MDIO-managed PHY devices: SFPs, MoCA; a.k.a
0437 fixed PHYs
0438
0439 The PHY configuration is done by the ``dsa_slave_phy_setup()`` function and the
0440 logic basically looks like this:
0441
0442 - if Device Tree is used, the PHY device is looked up using the standard
0443 "phy-handle" property, if found, this PHY device is created and registered
0444 using ``of_phy_connect()``
0445
0446 - if Device Tree is used and the PHY device is "fixed", that is, conforms to
0447 the definition of a non-MDIO managed PHY as defined in
0448 ``Documentation/devicetree/bindings/net/fixed-link.txt``, the PHY is registered
0449 and connected transparently using the special fixed MDIO bus driver
0450
0451 - finally, if the PHY is built into the switch, as is very common with
0452 standalone switch packages, the PHY is probed using the slave MII bus created
0453 by DSA
0454
0455
0456 SWITCHDEV
0457 ---------
0458
0459 DSA directly utilizes SWITCHDEV when interfacing with the bridge layer, and
0460 more specifically with its VLAN filtering portion when configuring VLANs on top
0461 of per-port slave network devices. As of today, the only SWITCHDEV objects
0462 supported by DSA are the FDB and VLAN objects.
0463
0464 Devlink
0465 -------
0466
0467 DSA registers one devlink device per physical switch in the fabric.
0468 For each devlink device, every physical port (i.e. user ports, CPU ports, DSA
0469 links or unused ports) is exposed as a devlink port.
0470
0471 DSA drivers can make use of the following devlink features:
0472
0473 - Regions: debugging feature which allows user space to dump driver-defined
0474 areas of hardware information in a low-level, binary format. Both global
0475 regions as well as per-port regions are supported. It is possible to export
0476 devlink regions even for pieces of data that are already exposed in some way
0477 to the standard iproute2 user space programs (ip-link, bridge), like address
0478 tables and VLAN tables. For example, this might be useful if the tables
0479 contain additional hardware-specific details which are not visible through
0480 the iproute2 abstraction, or it might be useful to inspect these tables on
0481 the non-user ports too, which are invisible to iproute2 because no network
0482 interface is registered for them.
0483 - Params: a feature which enables user to configure certain low-level tunable
0484 knobs pertaining to the device. Drivers may implement applicable generic
0485 devlink params, or may add new device-specific devlink params.
0486 - Resources: a monitoring feature which enables users to see the degree of
0487 utilization of certain hardware tables in the device, such as FDB, VLAN, etc.
0488 - Shared buffers: a QoS feature for adjusting and partitioning memory and frame
0489 reservations per port and per traffic class, in the ingress and egress
0490 directions, such that low-priority bulk traffic does not impede the
0491 processing of high-priority critical traffic.
0492
0493 For more details, consult ``Documentation/networking/devlink/``.
0494
0495 Device Tree
0496 -----------
0497
0498 DSA features a standardized binding which is documented in
0499 ``Documentation/devicetree/bindings/net/dsa/dsa.txt``. PHY/MDIO library helper
0500 functions such as ``of_get_phy_mode()``, ``of_phy_connect()`` are also used to query
0501 per-port PHY specific details: interface connection, MDIO bus location, etc.
0502
0503 Driver development
0504 ==================
0505
0506 DSA switch drivers need to implement a ``dsa_switch_ops`` structure which will
0507 contain the various members described below.
0508
0509 Probing, registration and device lifetime
0510 -----------------------------------------
0511
0512 DSA switches are regular ``device`` structures on buses (be they platform, SPI,
0513 I2C, MDIO or otherwise). The DSA framework is not involved in their probing
0514 with the device core.
0515
0516 Switch registration from the perspective of a driver means passing a valid
0517 ``struct dsa_switch`` pointer to ``dsa_register_switch()``, usually from the
0518 switch driver's probing function. The following members must be valid in the
0519 provided structure:
0520
0521 - ``ds->dev``: will be used to parse the switch's OF node or platform data.
0522
0523 - ``ds->num_ports``: will be used to create the port list for this switch, and
0524 to validate the port indices provided in the OF node.
0525
0526 - ``ds->ops``: a pointer to the ``dsa_switch_ops`` structure holding the DSA
0527 method implementations.
0528
0529 - ``ds->priv``: backpointer to a driver-private data structure which can be
0530 retrieved in all further DSA method callbacks.
0531
0532 In addition, the following flags in the ``dsa_switch`` structure may optionally
0533 be configured to obtain driver-specific behavior from the DSA core. Their
0534 behavior when set is documented through comments in ``include/net/dsa.h``.
0535
0536 - ``ds->vlan_filtering_is_global``
0537
0538 - ``ds->needs_standalone_vlan_filtering``
0539
0540 - ``ds->configure_vlan_while_not_filtering``
0541
0542 - ``ds->untag_bridge_pvid``
0543
0544 - ``ds->assisted_learning_on_cpu_port``
0545
0546 - ``ds->mtu_enforcement_ingress``
0547
0548 - ``ds->fdb_isolation``
0549
0550 Internally, DSA keeps an array of switch trees (group of switches) global to
0551 the kernel, and attaches a ``dsa_switch`` structure to a tree on registration.
0552 The tree ID to which the switch is attached is determined by the first u32
0553 number of the ``dsa,member`` property of the switch's OF node (0 if missing).
0554 The switch ID within the tree is determined by the second u32 number of the
0555 same OF property (0 if missing). Registering multiple switches with the same
0556 switch ID and tree ID is illegal and will cause an error. Using platform data,
0557 a single switch and a single switch tree is permitted.
0558
0559 In case of a tree with multiple switches, probing takes place asymmetrically.
0560 The first N-1 callers of ``dsa_register_switch()`` only add their ports to the
0561 port list of the tree (``dst->ports``), each port having a backpointer to its
0562 associated switch (``dp->ds``). Then, these switches exit their
0563 ``dsa_register_switch()`` call early, because ``dsa_tree_setup_routing_table()``
0564 has determined that the tree is not yet complete (not all ports referenced by
0565 DSA links are present in the tree's port list). The tree becomes complete when
0566 the last switch calls ``dsa_register_switch()``, and this triggers the effective
0567 continuation of initialization (including the call to ``ds->ops->setup()``) for
0568 all switches within that tree, all as part of the calling context of the last
0569 switch's probe function.
0570
0571 The opposite of registration takes place when calling ``dsa_unregister_switch()``,
0572 which removes a switch's ports from the port list of the tree. The entire tree
0573 is torn down when the first switch unregisters.
0574
0575 It is mandatory for DSA switch drivers to implement the ``shutdown()`` callback
0576 of their respective bus, and call ``dsa_switch_shutdown()`` from it (a minimal
0577 version of the full teardown performed by ``dsa_unregister_switch()``).
0578 The reason is that DSA keeps a reference on the master net device, and if the
0579 driver for the master device decides to unbind on shutdown, DSA's reference
0580 will block that operation from finalizing.
0581
0582 Either ``dsa_switch_shutdown()`` or ``dsa_unregister_switch()`` must be called,
0583 but not both, and the device driver model permits the bus' ``remove()`` method
0584 to be called even if ``shutdown()`` was already called. Therefore, drivers are
0585 expected to implement a mutual exclusion method between ``remove()`` and
0586 ``shutdown()`` by setting their drvdata to NULL after any of these has run, and
0587 checking whether the drvdata is NULL before proceeding to take any action.
0588
0589 After ``dsa_switch_shutdown()`` or ``dsa_unregister_switch()`` was called, no
0590 further callbacks via the provided ``dsa_switch_ops`` may take place, and the
0591 driver may free the data structures associated with the ``dsa_switch``.
0592
0593 Switch configuration
0594 --------------------
0595
0596 - ``get_tag_protocol``: this is to indicate what kind of tagging protocol is
0597 supported, should be a valid value from the ``dsa_tag_protocol`` enum.
0598 The returned information does not have to be static; the driver is passed the
0599 CPU port number, as well as the tagging protocol of a possibly stacked
0600 upstream switch, in case there are hardware limitations in terms of supported
0601 tag formats.
0602
0603 - ``change_tag_protocol``: when the default tagging protocol has compatibility
0604 problems with the master or other issues, the driver may support changing it
0605 at runtime, either through a device tree property or through sysfs. In that
0606 case, further calls to ``get_tag_protocol`` should report the protocol in
0607 current use.
0608
0609 - ``setup``: setup function for the switch, this function is responsible for setting
0610 up the ``dsa_switch_ops`` private structure with all it needs: register maps,
0611 interrupts, mutexes, locks, etc. This function is also expected to properly
0612 configure the switch to separate all network interfaces from each other, that
0613 is, they should be isolated by the switch hardware itself, typically by creating
0614 a Port-based VLAN ID for each port and allowing only the CPU port and the
0615 specific port to be in the forwarding vector. Ports that are unused by the
0616 platform should be disabled. Past this function, the switch is expected to be
0617 fully configured and ready to serve any kind of request. It is recommended
0618 to issue a software reset of the switch during this setup function in order to
0619 avoid relying on what a previous software agent such as a bootloader/firmware
0620 may have previously configured. The method responsible for undoing any
0621 applicable allocations or operations done here is ``teardown``.
0622
0623 - ``port_setup`` and ``port_teardown``: methods for initialization and
0624 destruction of per-port data structures. It is mandatory for some operations
0625 such as registering and unregistering devlink port regions to be done from
0626 these methods, otherwise they are optional. A port will be torn down only if
0627 it has been previously set up. It is possible for a port to be set up during
0628 probing only to be torn down immediately afterwards, for example in case its
0629 PHY cannot be found. In this case, probing of the DSA switch continues
0630 without that particular port.
0631
0632 PHY devices and link management
0633 -------------------------------
0634
0635 - ``get_phy_flags``: Some switches are interfaced to various kinds of Ethernet PHYs,
0636 if the PHY library PHY driver needs to know about information it cannot obtain
0637 on its own (e.g.: coming from switch memory mapped registers), this function
0638 should return a 32-bit bitmask of "flags" that is private between the switch
0639 driver and the Ethernet PHY driver in ``drivers/net/phy/\*``.
0640
0641 - ``phy_read``: Function invoked by the DSA slave MDIO bus when attempting to read
0642 the switch port MDIO registers. If unavailable, return 0xffff for each read.
0643 For builtin switch Ethernet PHYs, this function should allow reading the link
0644 status, auto-negotiation results, link partner pages, etc.
0645
0646 - ``phy_write``: Function invoked by the DSA slave MDIO bus when attempting to write
0647 to the switch port MDIO registers. If unavailable return a negative error
0648 code.
0649
0650 - ``adjust_link``: Function invoked by the PHY library when a slave network device
0651 is attached to a PHY device. This function is responsible for appropriately
0652 configuring the switch port link parameters: speed, duplex, pause based on
0653 what the ``phy_device`` is providing.
0654
0655 - ``fixed_link_update``: Function invoked by the PHY library, and specifically by
0656 the fixed PHY driver asking the switch driver for link parameters that could
0657 not be auto-negotiated, or obtained by reading the PHY registers through MDIO.
0658 This is particularly useful for specific kinds of hardware such as QSGMII,
0659 MoCA or other kinds of non-MDIO managed PHYs where out of band link
0660 information is obtained
0661
0662 Ethtool operations
0663 ------------------
0664
0665 - ``get_strings``: ethtool function used to query the driver's strings, will
0666 typically return statistics strings, private flags strings, etc.
0667
0668 - ``get_ethtool_stats``: ethtool function used to query per-port statistics and
0669 return their values. DSA overlays slave network devices general statistics:
0670 RX/TX counters from the network device, with switch driver specific statistics
0671 per port
0672
0673 - ``get_sset_count``: ethtool function used to query the number of statistics items
0674
0675 - ``get_wol``: ethtool function used to obtain Wake-on-LAN settings per-port, this
0676 function may for certain implementations also query the master network device
0677 Wake-on-LAN settings if this interface needs to participate in Wake-on-LAN
0678
0679 - ``set_wol``: ethtool function used to configure Wake-on-LAN settings per-port,
0680 direct counterpart to set_wol with similar restrictions
0681
0682 - ``set_eee``: ethtool function which is used to configure a switch port EEE (Green
0683 Ethernet) settings, can optionally invoke the PHY library to enable EEE at the
0684 PHY level if relevant. This function should enable EEE at the switch port MAC
0685 controller and data-processing logic
0686
0687 - ``get_eee``: ethtool function which is used to query a switch port EEE settings,
0688 this function should return the EEE state of the switch port MAC controller
0689 and data-processing logic as well as query the PHY for its currently configured
0690 EEE settings
0691
0692 - ``get_eeprom_len``: ethtool function returning for a given switch the EEPROM
0693 length/size in bytes
0694
0695 - ``get_eeprom``: ethtool function returning for a given switch the EEPROM contents
0696
0697 - ``set_eeprom``: ethtool function writing specified data to a given switch EEPROM
0698
0699 - ``get_regs_len``: ethtool function returning the register length for a given
0700 switch
0701
0702 - ``get_regs``: ethtool function returning the Ethernet switch internal register
0703 contents. This function might require user-land code in ethtool to
0704 pretty-print register values and registers
0705
0706 Power management
0707 ----------------
0708
0709 - ``suspend``: function invoked by the DSA platform device when the system goes to
0710 suspend, should quiesce all Ethernet switch activities, but keep ports
0711 participating in Wake-on-LAN active as well as additional wake-up logic if
0712 supported
0713
0714 - ``resume``: function invoked by the DSA platform device when the system resumes,
0715 should resume all Ethernet switch activities and re-configure the switch to be
0716 in a fully active state
0717
0718 - ``port_enable``: function invoked by the DSA slave network device ndo_open
0719 function when a port is administratively brought up, this function should
0720 fully enable a given switch port. DSA takes care of marking the port with
0721 ``BR_STATE_BLOCKING`` if the port is a bridge member, or ``BR_STATE_FORWARDING`` if it
0722 was not, and propagating these changes down to the hardware
0723
0724 - ``port_disable``: function invoked by the DSA slave network device ndo_close
0725 function when a port is administratively brought down, this function should
0726 fully disable a given switch port. DSA takes care of marking the port with
0727 ``BR_STATE_DISABLED`` and propagating changes to the hardware if this port is
0728 disabled while being a bridge member
0729
0730 Address databases
0731 -----------------
0732
0733 Switching hardware is expected to have a table for FDB entries, however not all
0734 of them are active at the same time. An address database is the subset (partition)
0735 of FDB entries that is active (can be matched by address learning on RX, or FDB
0736 lookup on TX) depending on the state of the port. An address database may
0737 occasionally be called "FID" (Filtering ID) in this document, although the
0738 underlying implementation may choose whatever is available to the hardware.
0739
0740 For example, all ports that belong to a VLAN-unaware bridge (which is
0741 *currently* VLAN-unaware) are expected to learn source addresses in the
0742 database associated by the driver with that bridge (and not with other
0743 VLAN-unaware bridges). During forwarding and FDB lookup, a packet received on a
0744 VLAN-unaware bridge port should be able to find a VLAN-unaware FDB entry having
0745 the same MAC DA as the packet, which is present on another port member of the
0746 same bridge. At the same time, the FDB lookup process must be able to not find
0747 an FDB entry having the same MAC DA as the packet, if that entry points towards
0748 a port which is a member of a different VLAN-unaware bridge (and is therefore
0749 associated with a different address database).
0750
0751 Similarly, each VLAN of each offloaded VLAN-aware bridge should have an
0752 associated address database, which is shared by all ports which are members of
0753 that VLAN, but not shared by ports belonging to different bridges that are
0754 members of the same VID.
0755
0756 In this context, a VLAN-unaware database means that all packets are expected to
0757 match on it irrespective of VLAN ID (only MAC address lookup), whereas a
0758 VLAN-aware database means that packets are supposed to match based on the VLAN
0759 ID from the classified 802.1Q header (or the pvid if untagged).
0760
0761 At the bridge layer, VLAN-unaware FDB entries have the special VID value of 0,
0762 whereas VLAN-aware FDB entries have non-zero VID values. Note that a
0763 VLAN-unaware bridge may have VLAN-aware (non-zero VID) FDB entries, and a
0764 VLAN-aware bridge may have VLAN-unaware FDB entries. As in hardware, the
0765 software bridge keeps separate address databases, and offloads to hardware the
0766 FDB entries belonging to these databases, through switchdev, asynchronously
0767 relative to the moment when the databases become active or inactive.
0768
0769 When a user port operates in standalone mode, its driver should configure it to
0770 use a separate database called a port private database. This is different from
0771 the databases described above, and should impede operation as standalone port
0772 (packet in, packet out to the CPU port) as little as possible. For example,
0773 on ingress, it should not attempt to learn the MAC SA of ingress traffic, since
0774 learning is a bridging layer service and this is a standalone port, therefore
0775 it would consume useless space. With no address learning, the port private
0776 database should be empty in a naive implementation, and in this case, all
0777 received packets should be trivially flooded to the CPU port.
0778
0779 DSA (cascade) and CPU ports are also called "shared" ports because they service
0780 multiple address databases, and the database that a packet should be associated
0781 to is usually embedded in the DSA tag. This means that the CPU port may
0782 simultaneously transport packets coming from a standalone port (which were
0783 classified by hardware in one address database), and from a bridge port (which
0784 were classified to a different address database).
0785
0786 Switch drivers which satisfy certain criteria are able to optimize the naive
0787 configuration by removing the CPU port from the flooding domain of the switch,
0788 and just program the hardware with FDB entries pointing towards the CPU port
0789 for which it is known that software is interested in those MAC addresses.
0790 Packets which do not match a known FDB entry will not be delivered to the CPU,
0791 which will save CPU cycles required for creating an skb just to drop it.
0792
0793 DSA is able to perform host address filtering for the following kinds of
0794 addresses:
0795
0796 - Primary unicast MAC addresses of ports (``dev->dev_addr``). These are
0797 associated with the port private database of the respective user port,
0798 and the driver is notified to install them through ``port_fdb_add`` towards
0799 the CPU port.
0800
0801 - Secondary unicast and multicast MAC addresses of ports (addresses added
0802 through ``dev_uc_add()`` and ``dev_mc_add()``). These are also associated
0803 with the port private database of the respective user port.
0804
0805 - Local/permanent bridge FDB entries (``BR_FDB_LOCAL``). These are the MAC
0806 addresses of the bridge ports, for which packets must be terminated locally
0807 and not forwarded. They are associated with the address database for that
0808 bridge.
0809
0810 - Static bridge FDB entries installed towards foreign (non-DSA) interfaces
0811 present in the same bridge as some DSA switch ports. These are also
0812 associated with the address database for that bridge.
0813
0814 - Dynamically learned FDB entries on foreign interfaces present in the same
0815 bridge as some DSA switch ports, only if ``ds->assisted_learning_on_cpu_port``
0816 is set to true by the driver. These are associated with the address database
0817 for that bridge.
0818
0819 For various operations detailed below, DSA provides a ``dsa_db`` structure
0820 which can be of the following types:
0821
0822 - ``DSA_DB_PORT``: the FDB (or MDB) entry to be installed or deleted belongs to
0823 the port private database of user port ``db->dp``.
0824 - ``DSA_DB_BRIDGE``: the entry belongs to one of the address databases of bridge
0825 ``db->bridge``. Separation between the VLAN-unaware database and the per-VID
0826 databases of this bridge is expected to be done by the driver.
0827 - ``DSA_DB_LAG``: the entry belongs to the address database of LAG ``db->lag``.
0828 Note: ``DSA_DB_LAG`` is currently unused and may be removed in the future.
0829
0830 The drivers which act upon the ``dsa_db`` argument in ``port_fdb_add``,
0831 ``port_mdb_add`` etc should declare ``ds->fdb_isolation`` as true.
0832
0833 DSA associates each offloaded bridge and each offloaded LAG with a one-based ID
0834 (``struct dsa_bridge :: num``, ``struct dsa_lag :: id``) for the purposes of
0835 refcounting addresses on shared ports. Drivers may piggyback on DSA's numbering
0836 scheme (the ID is readable through ``db->bridge.num`` and ``db->lag.id`` or may
0837 implement their own.
0838
0839 Only the drivers which declare support for FDB isolation are notified of FDB
0840 entries on the CPU port belonging to ``DSA_DB_PORT`` databases.
0841 For compatibility/legacy reasons, ``DSA_DB_BRIDGE`` addresses are notified to
0842 drivers even if they do not support FDB isolation. However, ``db->bridge.num``
0843 and ``db->lag.id`` are always set to 0 in that case (to denote the lack of
0844 isolation, for refcounting purposes).
0845
0846 Note that it is not mandatory for a switch driver to implement physically
0847 separate address databases for each standalone user port. Since FDB entries in
0848 the port private databases will always point to the CPU port, there is no risk
0849 for incorrect forwarding decisions. In this case, all standalone ports may
0850 share the same database, but the reference counting of host-filtered addresses
0851 (not deleting the FDB entry for a port's MAC address if it's still in use by
0852 another port) becomes the responsibility of the driver, because DSA is unaware
0853 that the port databases are in fact shared. This can be achieved by calling
0854 ``dsa_fdb_present_in_other_db()`` and ``dsa_mdb_present_in_other_db()``.
0855 The down side is that the RX filtering lists of each user port are in fact
0856 shared, which means that user port A may accept a packet with a MAC DA it
0857 shouldn't have, only because that MAC address was in the RX filtering list of
0858 user port B. These packets will still be dropped in software, however.
0859
0860 Bridge layer
0861 ------------
0862
0863 Offloading the bridge forwarding plane is optional and handled by the methods
0864 below. They may be absent, return -EOPNOTSUPP, or ``ds->max_num_bridges`` may
0865 be non-zero and exceeded, and in this case, joining a bridge port is still
0866 possible, but the packet forwarding will take place in software, and the ports
0867 under a software bridge must remain configured in the same way as for
0868 standalone operation, i.e. have all bridging service functions (address
0869 learning etc) disabled, and send all received packets to the CPU port only.
0870
0871 Concretely, a port starts offloading the forwarding plane of a bridge once it
0872 returns success to the ``port_bridge_join`` method, and stops doing so after
0873 ``port_bridge_leave`` has been called. Offloading the bridge means autonomously
0874 learning FDB entries in accordance with the software bridge port's state, and
0875 autonomously forwarding (or flooding) received packets without CPU intervention.
0876 This is optional even when offloading a bridge port. Tagging protocol drivers
0877 are expected to call ``dsa_default_offload_fwd_mark(skb)`` for packets which
0878 have already been autonomously forwarded in the forwarding domain of the
0879 ingress switch port. DSA, through ``dsa_port_devlink_setup()``, considers all
0880 switch ports part of the same tree ID to be part of the same bridge forwarding
0881 domain (capable of autonomous forwarding to each other).
0882
0883 Offloading the TX forwarding process of a bridge is a distinct concept from
0884 simply offloading its forwarding plane, and refers to the ability of certain
0885 driver and tag protocol combinations to transmit a single skb coming from the
0886 bridge device's transmit function to potentially multiple egress ports (and
0887 thereby avoid its cloning in software).
0888
0889 Packets for which the bridge requests this behavior are called data plane
0890 packets and have ``skb->offload_fwd_mark`` set to true in the tag protocol
0891 driver's ``xmit`` function. Data plane packets are subject to FDB lookup,
0892 hardware learning on the CPU port, and do not override the port STP state.
0893 Additionally, replication of data plane packets (multicast, flooding) is
0894 handled in hardware and the bridge driver will transmit a single skb for each
0895 packet that may or may not need replication.
0896
0897 When the TX forwarding offload is enabled, the tag protocol driver is
0898 responsible to inject packets into the data plane of the hardware towards the
0899 correct bridging domain (FID) that the port is a part of. The port may be
0900 VLAN-unaware, and in this case the FID must be equal to the FID used by the
0901 driver for its VLAN-unaware address database associated with that bridge.
0902 Alternatively, the bridge may be VLAN-aware, and in that case, it is guaranteed
0903 that the packet is also VLAN-tagged with the VLAN ID that the bridge processed
0904 this packet in. It is the responsibility of the hardware to untag the VID on
0905 the egress-untagged ports, or keep the tag on the egress-tagged ones.
0906
0907 - ``port_bridge_join``: bridge layer function invoked when a given switch port is
0908 added to a bridge, this function should do what's necessary at the switch
0909 level to permit the joining port to be added to the relevant logical
0910 domain for it to ingress/egress traffic with other members of the bridge.
0911 By setting the ``tx_fwd_offload`` argument to true, the TX forwarding process
0912 of this bridge is also offloaded.
0913
0914 - ``port_bridge_leave``: bridge layer function invoked when a given switch port is
0915 removed from a bridge, this function should do what's necessary at the
0916 switch level to deny the leaving port from ingress/egress traffic from the
0917 remaining bridge members.
0918
0919 - ``port_stp_state_set``: bridge layer function invoked when a given switch port STP
0920 state is computed by the bridge layer and should be propagated to switch
0921 hardware to forward/block/learn traffic.
0922
0923 - ``port_bridge_flags``: bridge layer function invoked when a port must
0924 configure its settings for e.g. flooding of unknown traffic or source address
0925 learning. The switch driver is responsible for initial setup of the
0926 standalone ports with address learning disabled and egress flooding of all
0927 types of traffic, then the DSA core notifies of any change to the bridge port
0928 flags when the port joins and leaves a bridge. DSA does not currently manage
0929 the bridge port flags for the CPU port. The assumption is that address
0930 learning should be statically enabled (if supported by the hardware) on the
0931 CPU port, and flooding towards the CPU port should also be enabled, due to a
0932 lack of an explicit address filtering mechanism in the DSA core.
0933
0934 - ``port_fast_age``: bridge layer function invoked when flushing the
0935 dynamically learned FDB entries on the port is necessary. This is called when
0936 transitioning from an STP state where learning should take place to an STP
0937 state where it shouldn't, or when leaving a bridge, or when address learning
0938 is turned off via ``port_bridge_flags``.
0939
0940 Bridge VLAN filtering
0941 ---------------------
0942
0943 - ``port_vlan_filtering``: bridge layer function invoked when the bridge gets
0944 configured for turning on or off VLAN filtering. If nothing specific needs to
0945 be done at the hardware level, this callback does not need to be implemented.
0946 When VLAN filtering is turned on, the hardware must be programmed with
0947 rejecting 802.1Q frames which have VLAN IDs outside of the programmed allowed
0948 VLAN ID map/rules. If there is no PVID programmed into the switch port,
0949 untagged frames must be rejected as well. When turned off the switch must
0950 accept any 802.1Q frames irrespective of their VLAN ID, and untagged frames are
0951 allowed.
0952
0953 - ``port_vlan_add``: bridge layer function invoked when a VLAN is configured
0954 (tagged or untagged) for the given switch port. The CPU port becomes a member
0955 of a VLAN only if a foreign bridge port is also a member of it (and
0956 forwarding needs to take place in software), or the VLAN is installed to the
0957 VLAN group of the bridge device itself, for termination purposes
0958 (``bridge vlan add dev br0 vid 100 self``). VLANs on shared ports are
0959 reference counted and removed when there is no user left. Drivers do not need
0960 to manually install a VLAN on the CPU port.
0961
0962 - ``port_vlan_del``: bridge layer function invoked when a VLAN is removed from the
0963 given switch port
0964
0965 - ``port_fdb_add``: bridge layer function invoked when the bridge wants to install a
0966 Forwarding Database entry, the switch hardware should be programmed with the
0967 specified address in the specified VLAN Id in the forwarding database
0968 associated with this VLAN ID.
0969
0970 - ``port_fdb_del``: bridge layer function invoked when the bridge wants to remove a
0971 Forwarding Database entry, the switch hardware should be programmed to delete
0972 the specified MAC address from the specified VLAN ID if it was mapped into
0973 this port forwarding database
0974
0975 - ``port_fdb_dump``: bridge bypass function invoked by ``ndo_fdb_dump`` on the
0976 physical DSA port interfaces. Since DSA does not attempt to keep in sync its
0977 hardware FDB entries with the software bridge, this method is implemented as
0978 a means to view the entries visible on user ports in the hardware database.
0979 The entries reported by this function have the ``self`` flag in the output of
0980 the ``bridge fdb show`` command.
0981
0982 - ``port_mdb_add``: bridge layer function invoked when the bridge wants to install
0983 a multicast database entry. The switch hardware should be programmed with the
0984 specified address in the specified VLAN ID in the forwarding database
0985 associated with this VLAN ID.
0986
0987 - ``port_mdb_del``: bridge layer function invoked when the bridge wants to remove a
0988 multicast database entry, the switch hardware should be programmed to delete
0989 the specified MAC address from the specified VLAN ID if it was mapped into
0990 this port forwarding database.
0991
0992 Link aggregation
0993 ----------------
0994
0995 Link aggregation is implemented in the Linux networking stack by the bonding
0996 and team drivers, which are modeled as virtual, stackable network interfaces.
0997 DSA is capable of offloading a link aggregation group (LAG) to hardware that
0998 supports the feature, and supports bridging between physical ports and LAGs,
0999 as well as between LAGs. A bonding/team interface which holds multiple physical
1000 ports constitutes a logical port, although DSA has no explicit concept of a
1001 logical port at the moment. Due to this, events where a LAG joins/leaves a
1002 bridge are treated as if all individual physical ports that are members of that
1003 LAG join/leave the bridge. Switchdev port attributes (VLAN filtering, STP
1004 state, etc) and objects (VLANs, MDB entries) offloaded to a LAG as bridge port
1005 are treated similarly: DSA offloads the same switchdev object / port attribute
1006 on all members of the LAG. Static bridge FDB entries on a LAG are not yet
1007 supported, since the DSA driver API does not have the concept of a logical port
1008 ID.
1009
1010 - ``port_lag_join``: function invoked when a given switch port is added to a
1011 LAG. The driver may return ``-EOPNOTSUPP``, and in this case, DSA will fall
1012 back to a software implementation where all traffic from this port is sent to
1013 the CPU.
1014 - ``port_lag_leave``: function invoked when a given switch port leaves a LAG
1015 and returns to operation as a standalone port.
1016 - ``port_lag_change``: function invoked when the link state of any member of
1017 the LAG changes, and the hashing function needs rebalancing to only make use
1018 of the subset of physical LAG member ports that are up.
1019
1020 Drivers that benefit from having an ID associated with each offloaded LAG
1021 can optionally populate ``ds->num_lag_ids`` from the ``dsa_switch_ops::setup``
1022 method. The LAG ID associated with a bonding/team interface can then be
1023 retrieved by a DSA switch driver using the ``dsa_lag_id`` function.
1024
1025 IEC 62439-2 (MRP)
1026 -----------------
1027
1028 The Media Redundancy Protocol is a topology management protocol optimized for
1029 fast fault recovery time for ring networks, which has some components
1030 implemented as a function of the bridge driver. MRP uses management PDUs
1031 (Test, Topology, LinkDown/Up, Option) sent at a multicast destination MAC
1032 address range of 01:15:4e:00:00:0x and with an EtherType of 0x88e3.
1033 Depending on the node's role in the ring (MRM: Media Redundancy Manager,
1034 MRC: Media Redundancy Client, MRA: Media Redundancy Automanager), certain MRP
1035 PDUs might need to be terminated locally and others might need to be forwarded.
1036 An MRM might also benefit from offloading to hardware the creation and
1037 transmission of certain MRP PDUs (Test).
1038
1039 Normally an MRP instance can be created on top of any network interface,
1040 however in the case of a device with an offloaded data path such as DSA, it is
1041 necessary for the hardware, even if it is not MRP-aware, to be able to extract
1042 the MRP PDUs from the fabric before the driver can proceed with the software
1043 implementation. DSA today has no driver which is MRP-aware, therefore it only
1044 listens for the bare minimum switchdev objects required for the software assist
1045 to work properly. The operations are detailed below.
1046
1047 - ``port_mrp_add`` and ``port_mrp_del``: notifies driver when an MRP instance
1048 with a certain ring ID, priority, primary port and secondary port is
1049 created/deleted.
1050 - ``port_mrp_add_ring_role`` and ``port_mrp_del_ring_role``: function invoked
1051 when an MRP instance changes ring roles between MRM or MRC. This affects
1052 which MRP PDUs should be trapped to software and which should be autonomously
1053 forwarded.
1054
1055 IEC 62439-3 (HSR/PRP)
1056 ---------------------
1057
1058 The Parallel Redundancy Protocol (PRP) is a network redundancy protocol which
1059 works by duplicating and sequence numbering packets through two independent L2
1060 networks (which are unaware of the PRP tail tags carried in the packets), and
1061 eliminating the duplicates at the receiver. The High-availability Seamless
1062 Redundancy (HSR) protocol is similar in concept, except all nodes that carry
1063 the redundant traffic are aware of the fact that it is HSR-tagged (because HSR
1064 uses a header with an EtherType of 0x892f) and are physically connected in a
1065 ring topology. Both HSR and PRP use supervision frames for monitoring the
1066 health of the network and for discovery of other nodes.
1067
1068 In Linux, both HSR and PRP are implemented in the hsr driver, which
1069 instantiates a virtual, stackable network interface with two member ports.
1070 The driver only implements the basic roles of DANH (Doubly Attached Node
1071 implementing HSR) and DANP (Doubly Attached Node implementing PRP); the roles
1072 of RedBox and QuadBox are not implemented (therefore, bridging a hsr network
1073 interface with a physical switch port does not produce the expected result).
1074
1075 A driver which is able of offloading certain functions of a DANP or DANH should
1076 declare the corresponding netdev features as indicated by the documentation at
1077 ``Documentation/networking/netdev-features.rst``. Additionally, the following
1078 methods must be implemented:
1079
1080 - ``port_hsr_join``: function invoked when a given switch port is added to a
1081 DANP/DANH. The driver may return ``-EOPNOTSUPP`` and in this case, DSA will
1082 fall back to a software implementation where all traffic from this port is
1083 sent to the CPU.
1084 - ``port_hsr_leave``: function invoked when a given switch port leaves a
1085 DANP/DANH and returns to normal operation as a standalone port.
1086
1087 TODO
1088 ====
1089
1090 Making SWITCHDEV and DSA converge towards an unified codebase
1091 -------------------------------------------------------------
1092
1093 SWITCHDEV properly takes care of abstracting the networking stack with offload
1094 capable hardware, but does not enforce a strict switch device driver model. On
1095 the other DSA enforces a fairly strict device driver model, and deals with most
1096 of the switch specific. At some point we should envision a merger between these
1097 two subsystems and get the best of both worlds.
1098
1099 Other hanging fruits
1100 --------------------
1101
1102 - allowing more than one CPU/management interface:
1103 http://comments.gmane.org/gmane.linux.network/365657