* [PATCH net-next 0/2] net: dsa: mxl862xx: add support for bridge offloading
@ 2026-03-07 3:29 Daniel Golle
2026-03-07 3:30 ` [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Daniel Golle
` (2 more replies)
0 siblings, 3 replies; 13+ messages in thread
From: Daniel Golle @ 2026-03-07 3:29 UTC (permalink / raw)
To: Daniel Golle, Andrew Lunn, Vladimir Oltean, David S. Miller,
Eric Dumazet, Jakub Kicinski, Paolo Abeni, Simon Horman,
Russell King, netdev, linux-kernel
Cc: Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
As a next step to complete the mxl862xx DSA driver, add support for
offloading forwarding between bridged ports to the switch hardware.
This works pretty much without any big surprises, apart from two
subtleties:
* per-port control over flooding behavior has to be implemented by
(ab)using a 0-rate QoS meters as stopper in lack of any better
option.
* STP state transition unconditionally enables learning on a port
even if it was previously explicitely disabled (a firmware bug)
Note that as the driver is still lacking all VLAN features (which
are going to be added next), at this point some of the
bridge_vlan_aware.sh tests are failing after applying this series.
This is expected and cannot be avoided without implementing
port_vlan_filtering + port_vlan_add/del. And adding both bridge and
VLAN offloading at the same time would be too much for anyone to
review.
All other relevant selftests (including bridge_vlan_unaware.sh) are
still passing.
Daniel Golle (2):
dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
net: dsa: mxl862xx: implement bridge offloading
drivers/net/dsa/mxl862xx/mxl862xx-api.h | 171 +++++++
drivers/net/dsa/mxl862xx/mxl862xx-cmd.h | 19 +-
drivers/net/dsa/mxl862xx/mxl862xx.c | 576 ++++++++++++++++++++++--
drivers/net/dsa/mxl862xx/mxl862xx.h | 21 +
net/dsa/tag_mxl862xx.c | 2 +
5 files changed, 757 insertions(+), 32 deletions(-)
--
2.53.0
^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-07 3:29 [PATCH net-next 0/2] net: dsa: mxl862xx: add support for bridge offloading Daniel Golle
@ 2026-03-07 3:30 ` Daniel Golle
2026-03-07 9:57 ` Jonas Gorski
2026-03-07 3:31 ` [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading Daniel Golle
2026-03-07 3:39 ` [PATCH net-next 0/2] net: dsa: mxl862xx: add support for " Daniel Golle
2 siblings, 1 reply; 13+ messages in thread
From: Daniel Golle @ 2026-03-07 3:30 UTC (permalink / raw)
To: Daniel Golle, Andrew Lunn, Vladimir Oltean, David S. Miller,
Eric Dumazet, Jakub Kicinski, Paolo Abeni, Simon Horman,
Russell King, netdev, linux-kernel
Cc: Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
The MxL862xx offloads forwarding between bridged ports to the
hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
forwarding of packets of (eg. flooded) frames arriving at the CPU
port.
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
---
net/dsa/tag_mxl862xx.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
index 01f2158682718..c02f69de61cbb 100644
--- a/net/dsa/tag_mxl862xx.c
+++ b/net/dsa/tag_mxl862xx.c
@@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
skb_pull_rcsum(skb, MXL862_HEADER_LEN);
dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
+ dsa_default_offload_fwd_mark(skb);
+
return skb;
}
--
2.53.0
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading
2026-03-07 3:29 [PATCH net-next 0/2] net: dsa: mxl862xx: add support for bridge offloading Daniel Golle
2026-03-07 3:30 ` [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Daniel Golle
@ 2026-03-07 3:31 ` Daniel Golle
2026-03-09 23:22 ` Jakub Kicinski
2026-03-09 23:27 ` Vladimir Oltean
2026-03-07 3:39 ` [PATCH net-next 0/2] net: dsa: mxl862xx: add support for " Daniel Golle
2 siblings, 2 replies; 13+ messages in thread
From: Daniel Golle @ 2026-03-07 3:31 UTC (permalink / raw)
To: Daniel Golle, Andrew Lunn, Vladimir Oltean, David S. Miller,
Eric Dumazet, Jakub Kicinski, Paolo Abeni, Simon Horman,
Russell King, netdev, linux-kernel
Cc: Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
Add support for bridge offloading on the mxl862xx DSA driver.
Implement joining and leaving bridges as well as add, delete and dump
operations on isolated FDBs and setting a port's STP state.
The switch supports a maximum of 63 bridges, however, up to 12 may
be used as "single-port bridges" to isolate standalone ports.
Allowing up to 48 bridges to be offloaded seems more than enough on
that hardware, hence that is set as max_num_bridges.
A total of 128 bridge ports are supported in the bridge portmap, and
virtual bridge ports have to be used eg. for link-aggregation, hence
potentially exceeding the number of hardware ports.
As there are now more users of the BRIDGEPORT_CONFIG_SET API and the
state of each port is cached locally, introduce a helper function
mxl862xx_set_bridge_port(struct dsa_switch *ds, int port) which is
then also be used to replace the direct calls to the API in
mxl862xx_setup_cpu_bridge() and mxl862xx_add_single_port_bridge(),
while removing the accidentally added VLAN-aware-learning settings.
Note that there is no convenient way to control flooding on per-port
level, so the driver is using a QoS meter setup as a stopper in lack
of any better option. This works, but allows a single 64-byte packet
to pass once after reset. While this limitation doesn't seem to be a
problem in practice, it has the effect that the bridge_vlan_unaware.sh
selftest only passes the FDB test the 2nd time the test is run after
boot (and any subsequent time after that, of course).
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
---
drivers/net/dsa/mxl862xx/mxl862xx-api.h | 171 +++++++
drivers/net/dsa/mxl862xx/mxl862xx-cmd.h | 19 +-
drivers/net/dsa/mxl862xx/mxl862xx.c | 576 ++++++++++++++++++++++--
drivers/net/dsa/mxl862xx/mxl862xx.h | 21 +
4 files changed, 755 insertions(+), 32 deletions(-)
diff --git a/drivers/net/dsa/mxl862xx/mxl862xx-api.h b/drivers/net/dsa/mxl862xx/mxl862xx-api.h
index a9f599dbca25b..8136f6b1c32e6 100644
--- a/drivers/net/dsa/mxl862xx/mxl862xx-api.h
+++ b/drivers/net/dsa/mxl862xx/mxl862xx-api.h
@@ -34,6 +34,117 @@ struct mxl862xx_register_mod {
__le16 mask;
} __packed;
+/**
+ * enum mxl862xx_mac_table_filter - Source/Destination MAC address filtering
+ *
+ * @MXL862XX_MAC_FILTER_NONE: no filter
+ * @MXL862XX_MAC_FILTER_SRC: source address filter
+ * @MXL862XX_MAC_FILTER_DEST: destination address filter
+ * @MXL862XX_MAC_FILTER_BOTH: both source and destination filter
+ */
+enum mxl862xx_mac_table_filter {
+ MXL862XX_MAC_FILTER_NONE = 0,
+ MXL862XX_MAC_FILTER_SRC = BIT(0),
+ MXL862XX_MAC_FILTER_DEST = BIT(1),
+ MXL862XX_MAC_FILTER_BOTH = BIT(0) | BIT(1),
+};
+
+/**
+ * struct mxl862xx_mac_table_add - MAC Table Entry to be added
+ * @fid: Filtering Identifier (FID) (not supported by all switches)
+ * @port_id: Ethernet Port number
+ * @port_map: Bridge Port Map
+ * @sub_if_id: Sub-Interface Identifier Destination
+ * @age_timer: Aging Time in seconds
+ * @vlan_id: STAG VLAN Id
+ * @static_entry: Static Entry (value will be aged out if not set to static)
+ * @traffic_class: Egress queue traffic class
+ * @mac: MAC Address to add to the table
+ * @filter_flag: See &enum mxl862xx_mac_table_filter
+ * @igmp_controlled: Packet is marked as IGMP controlled if destination MAC
+ * address matche MAC in this entry
+ * @associated_mac: Associated Mac address
+ * @tci: TCI for B-Step
+ * Bit [0:11] - VLAN ID
+ * Bit [12] - VLAN CFI/DEI
+ * Bit [13:15] - VLAN PRI
+ */
+struct mxl862xx_mac_table_add {
+ __le16 fid;
+ __le32 port_id;
+ __le16 port_map[8];
+ __le16 sub_if_id;
+ int age_timer;
+ __le16 vlan_id;
+ u8 static_entry;
+ u8 traffic_class;
+ u8 mac[ETH_ALEN];
+ u8 filter_flag;
+ u8 igmp_controlled;
+ u8 associated_mac[ETH_ALEN];
+ __le16 tci;
+} __packed;
+
+/**
+ * struct mxl862xx_mac_table_remove - MAC Table Entry to be removed
+ * @fid: Filtering Identifier (FID)
+ * @mac: MAC Address to be removed from the table.
+ * @filter_flag: See &enum mxl862xx_mac_table_filter
+ * @tci: TCI for B-Step
+ * Bit [0:11] - VLAN ID
+ * Bit [12] - VLAN CFI/DEI
+ * Bit [13:15] - VLAN PRI
+ */
+struct mxl862xx_mac_table_remove {
+ __le16 fid;
+ u8 mac[ETH_ALEN];
+ u8 filter_flag;
+ __le16 tci;
+} __packed;
+
+/**
+ * struct mxl862xx_mac_table_read - MAC Table Entry to be read
+ * @initial: Restart the get operation from the beginning of the table
+ * @last: Indicates that the read operation returned last entry
+ * @fid: Get the MAC table entry belonging to the given Filtering Identifier
+ * @port_id: The Bridge Port ID
+ * @port_map: Bridge Port Map
+ * @age_timer: Aging Time
+ * @vlan_id: STAG VLAN Id
+ * @static_entry: Indicates if this is a Static Entry
+ * @sub_if_id: Sub-Interface Identifier Destination
+ * @mac: MAC Address. Filled out by the switch API implementation.
+ * @filter_flag: See &enum mxl862xx_mac_table_filter
+ * @igmp_controlled: Packet is marked as IGMP controlled if destination MAC
+ * address matches the MAC in this entry
+ * @entry_changed: Indicate if the Entry has Changed
+ * @associated_mac: Associated MAC address
+ * @hit_status: MAC Table Hit Status Update
+ * @tci: TCI for B-Step
+ * Bit [0:11] - VLAN ID
+ * Bit [12] - VLAN CFI/DEI
+ * Bit [13:15] - VLAN PRI
+ */
+struct mxl862xx_mac_table_read {
+ u8 initial;
+ u8 last;
+ __le16 fid;
+ __le32 port_id;
+ __le16 port_map[8];
+ int age_timer;
+ __le16 vlan_id;
+ u8 static_entry;
+ __le16 sub_if_id;
+ u8 mac[ETH_ALEN];
+ u8 filter_flag;
+ u8 igmp_controlled;
+ u8 entry_changed;
+ u8 associated_mac[ETH_ALEN];
+ u8 hit_status;
+ __le16 tci;
+ __le16 first_bridge_port_id;
+} __packed;
+
/**
* enum mxl862xx_mac_clear_type - MAC table clear type
* @MXL862XX_MAC_CLEAR_PHY_PORT: clear dynamic entries based on port_id
@@ -138,6 +249,40 @@ enum mxl862xx_bridge_port_egress_meter {
MXL862XX_BRIDGE_PORT_EGRESS_METER_MAX,
};
+/**
+ * struct mxl862xx_qos_meter_cfg - Rate meter configuration
+ * @enable: Enable/disable meter
+ * @meter_id: Meter ID (assigned by firmware on alloc)
+ * @meter_name: Meter name string
+ * @meter_type: Meter algorithm type (srTCM = 0, trTCM = 1)
+ * @cbs: Committed Burst Size (in bytes)
+ * @res1: Reserved
+ * @ebs: Excess Burst Size (in bytes)
+ * @res2: Reserved
+ * @rate: Committed Information Rate (in kbit/s)
+ * @pi_rate: Peak Information Rate (in kbit/s)
+ * @colour_blind_mode: Colour-blind mode enable
+ * @pkt_mode: Packet mode enable
+ * @local_overhd: Local overhead accounting enable
+ * @local_overhd_val: Local overhead accounting value
+ */
+struct mxl862xx_qos_meter_cfg {
+ u8 enable;
+ __le16 meter_id;
+ char meter_name[32];
+ __le32 meter_type;
+ __le32 cbs;
+ __le32 res1;
+ __le32 ebs;
+ __le32 res2;
+ __le32 rate;
+ __le32 pi_rate;
+ u8 colour_blind_mode;
+ u8 pkt_mode;
+ u8 local_overhd;
+ __le16 local_overhd_val;
+} __packed;
+
/**
* enum mxl862xx_bridge_forward_mode - Bridge forwarding type of packet
* @MXL862XX_BRIDGE_FORWARD_FLOOD: Packet is flooded to port members of
@@ -658,6 +803,32 @@ struct mxl862xx_ctp_port_assignment {
__le16 bridge_port_id;
} __packed;
+/**
+ * enum mxl862xx_stp_port_state
+ * @MXL862XX_STP_PORT_STATE_FORWARD: Forwarding state
+ * @MXL862XX_STP_PORT_STATE_DISABLE: Disabled/Discarding state
+ * @MXL862XX_STP_PORT_STATE_LEARNING: Learning state
+ * @MXL862XX_STP_PORT_STATE_BLOCKING: Blocking/Listening
+ */
+enum mxl862xx_stp_port_state {
+ MXL862XX_STP_PORT_STATE_FORWARD = 0,
+ MXL862XX_STP_PORT_STATE_DISABLE,
+ MXL862XX_STP_PORT_STATE_LEARNING,
+ MXL862XX_STP_PORT_STATE_BLOCKING,
+};
+
+/**
+ * struct mxl862xx_stp_port_cfg - Configures the Spanning Tree Protocol state of an Ethernet port
+ * @port_id: Port number
+ * @fid: Filtering Identifier (FID)
+ * @port_state: See &enum mxl862xx_stp_port_state
+ */
+struct mxl862xx_stp_port_cfg {
+ __le16 port_id;
+ __le16 fid;
+ __le32 port_state; /* enum mxl862xx_stp_port_state */
+} __packed;
+
/**
* struct mxl862xx_sys_fw_image_version - Firmware version information
* @iv_major: firmware major version
diff --git a/drivers/net/dsa/mxl862xx/mxl862xx-cmd.h b/drivers/net/dsa/mxl862xx/mxl862xx-cmd.h
index f6852ade64e7c..43d04c019b50c 100644
--- a/drivers/net/dsa/mxl862xx/mxl862xx-cmd.h
+++ b/drivers/net/dsa/mxl862xx/mxl862xx-cmd.h
@@ -15,12 +15,15 @@
#define MXL862XX_BRDG_MAGIC 0x300
#define MXL862XX_BRDGPORT_MAGIC 0x400
#define MXL862XX_CTP_MAGIC 0x500
+#define MXL862XX_QOS_MAGIC 0x600
#define MXL862XX_SWMAC_MAGIC 0xa00
+#define MXL862XX_STP_MAGIC 0xf00
#define MXL862XX_SS_MAGIC 0x1600
#define GPY_GPY2XX_MAGIC 0x1800
#define SYS_MISC_MAGIC 0x1900
#define MXL862XX_COMMON_CFGGET (MXL862XX_COMMON_MAGIC + 0x9)
+#define MXL862XX_COMMON_CFGSET (MXL862XX_COMMON_MAGIC + 0xa)
#define MXL862XX_COMMON_REGISTERMOD (MXL862XX_COMMON_MAGIC + 0x11)
#define MXL862XX_BRIDGE_ALLOC (MXL862XX_BRDG_MAGIC + 0x1)
@@ -35,14 +38,22 @@
#define MXL862XX_CTP_PORTASSIGNMENTSET (MXL862XX_CTP_MAGIC + 0x3)
+#define MXL862XX_QOS_METERCFGSET (MXL862XX_QOS_MAGIC + 0x2)
+#define MXL862XX_QOS_METERALLOC (MXL862XX_QOS_MAGIC + 0x2a)
+
+#define MXL862XX_MAC_TABLEENTRYADD (MXL862XX_SWMAC_MAGIC + 0x2)
+#define MXL862XX_MAC_TABLEENTRYREAD (MXL862XX_SWMAC_MAGIC + 0x3)
+#define MXL862XX_MAC_TABLEENTRYREMOVE (MXL862XX_SWMAC_MAGIC + 0x5)
#define MXL862XX_MAC_TABLECLEARCOND (MXL862XX_SWMAC_MAGIC + 0x8)
-#define MXL862XX_SS_SPTAG_SET (MXL862XX_SS_MAGIC + 0x02)
+#define MXL862XX_SS_SPTAG_SET (MXL862XX_SS_MAGIC + 0x2)
+
+#define MXL862XX_STP_PORTCFGSET (MXL862XX_STP_MAGIC + 0x2)
-#define INT_GPHY_READ (GPY_GPY2XX_MAGIC + 0x01)
-#define INT_GPHY_WRITE (GPY_GPY2XX_MAGIC + 0x02)
+#define INT_GPHY_READ (GPY_GPY2XX_MAGIC + 0x1)
+#define INT_GPHY_WRITE (GPY_GPY2XX_MAGIC + 0x2)
-#define SYS_MISC_FW_VERSION (SYS_MISC_MAGIC + 0x02)
+#define SYS_MISC_FW_VERSION (SYS_MISC_MAGIC + 0x2)
#define MMD_API_MAXIMUM_ID 0x7fff
diff --git a/drivers/net/dsa/mxl862xx/mxl862xx.c b/drivers/net/dsa/mxl862xx/mxl862xx.c
index b1e2094b58165..40f649b331365 100644
--- a/drivers/net/dsa/mxl862xx/mxl862xx.c
+++ b/drivers/net/dsa/mxl862xx/mxl862xx.c
@@ -9,6 +9,7 @@
#include <linux/module.h>
#include <linux/delay.h>
+#include <linux/if_bridge.h>
#include <linux/of_device.h>
#include <linux/of_mdio.h>
#include <linux/phy.h>
@@ -36,6 +37,13 @@
#define MXL862XX_READY_TIMEOUT_MS 10000
#define MXL862XX_READY_POLL_MS 100
+static const int mxl862xx_flood_meters[] = {
+ MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_UC,
+ MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_MC_IP,
+ MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_MC_NON_IP,
+ MXL862XX_BRIDGE_PORT_EGRESS_METER_BROADCAST,
+};
+
static enum dsa_tag_protocol mxl862xx_get_tag_protocol(struct dsa_switch *ds,
int port,
enum dsa_tag_protocol m)
@@ -169,6 +177,66 @@ static int mxl862xx_setup_mdio(struct dsa_switch *ds)
return ret;
}
+static int mxl862xx_bridge_config_fwd(struct dsa_switch *ds, u16 bridge_id,
+ bool ucast_flood, bool mcast_flood,
+ bool bcast_flood)
+{
+ struct mxl862xx_bridge_config bridge_config = { };
+ struct mxl862xx_priv *priv = ds->priv;
+ int ret;
+
+ bridge_config.mask = cpu_to_le32(MXL862XX_BRIDGE_CONFIG_MASK_FORWARDING_MODE);
+ bridge_config.bridge_id = cpu_to_le16(bridge_id);
+
+ bridge_config.forward_unknown_unicast = ucast_flood ?
+ MXL862XX_BRIDGE_FORWARD_FLOOD : MXL862XX_BRIDGE_FORWARD_DISCARD;
+
+ bridge_config.forward_unknown_multicast_ip = mcast_flood ?
+ MXL862XX_BRIDGE_FORWARD_FLOOD : MXL862XX_BRIDGE_FORWARD_DISCARD;
+ bridge_config.forward_unknown_multicast_non_ip =
+ bridge_config.forward_unknown_multicast_ip;
+
+ bridge_config.forward_broadcast = bcast_flood ?
+ MXL862XX_BRIDGE_FORWARD_FLOOD : MXL862XX_BRIDGE_FORWARD_DISCARD;
+
+ ret = MXL862XX_API_WRITE(priv, MXL862XX_BRIDGE_CONFIGSET, bridge_config);
+ if (ret)
+ dev_err(ds->dev, "failed to configure bridge %u forwarding: %d\n",
+ bridge_id, ret);
+
+ return ret;
+}
+
+/* Allocate a single zero-rate meter shared by all ports and flood types.
+ * All flood-blocking egress sub-meters point to this one meter so that
+ * the single CBS=64 token bucket fills as quickly as possible, minimising
+ * the one-packet leak inherent with the hardware minimum CBS.
+ */
+static int mxl862xx_setup_drop_meter(struct dsa_switch *ds)
+{
+ struct mxl862xx_qos_meter_cfg meter = {};
+ struct mxl862xx_priv *priv = ds->priv;
+ int ret;
+
+ /* meter_id=0 means auto-alloc */
+ ret = MXL862XX_API_READ(priv, MXL862XX_QOS_METERALLOC, meter);
+ if (ret)
+ return ret;
+
+ meter.enable = true;
+ meter.cbs = cpu_to_le32(64);
+ meter.ebs = cpu_to_le32(64);
+ snprintf(meter.meter_name, sizeof(meter.meter_name), "drop");
+
+ ret = MXL862XX_API_WRITE(priv, MXL862XX_QOS_METERCFGSET, meter);
+ if (ret)
+ return ret;
+
+ priv->drop_meter = le16_to_cpu(meter.meter_id);
+
+ return 0;
+}
+
static int mxl862xx_setup(struct dsa_switch *ds)
{
struct mxl862xx_priv *priv = ds->priv;
@@ -182,6 +250,15 @@ static int mxl862xx_setup(struct dsa_switch *ds)
if (ret)
return ret;
+ ret = mxl862xx_bridge_config_fwd(ds, MXL862XX_DEFAULT_BRIDGE,
+ false, false, true);
+ if (ret < 0)
+ return ret;
+
+ ret = mxl862xx_setup_drop_meter(ds);
+ if (ret)
+ return ret;
+
return mxl862xx_setup_mdio(ds);
}
@@ -259,64 +336,235 @@ static int mxl862xx_configure_sp_tag_proto(struct dsa_switch *ds, int port,
return MXL862XX_API_WRITE(ds->priv, MXL862XX_SS_SPTAG_SET, tag);
}
-static int mxl862xx_setup_cpu_bridge(struct dsa_switch *ds, int port)
+static int mxl862xx_set_bridge_port(struct dsa_switch *ds, int port)
{
struct mxl862xx_bridge_port_config br_port_cfg = {};
struct mxl862xx_priv *priv = ds->priv;
- u16 bridge_port_map = 0;
- struct dsa_port *dp;
+ struct mxl862xx_port *p = &priv->ports[port];
+ u16 bridge_id = p->bridge ? p->bridge->bridge_id : p->fid;
+ bool enable;
+ int i, idx;
- /* CPU port bridge setup */
- br_port_cfg.mask = cpu_to_le32(MXL862XX_BRIDGE_PORT_CONFIG_MASK_BRIDGE_PORT_MAP |
+ br_port_cfg.bridge_port_id = cpu_to_le16(port);
+ br_port_cfg.bridge_id = cpu_to_le16(bridge_id);
+ br_port_cfg.mask = cpu_to_le32(MXL862XX_BRIDGE_PORT_CONFIG_MASK_BRIDGE_ID |
+ MXL862XX_BRIDGE_PORT_CONFIG_MASK_BRIDGE_PORT_MAP |
MXL862XX_BRIDGE_PORT_CONFIG_MASK_MC_SRC_MAC_LEARNING |
- MXL862XX_BRIDGE_PORT_CONFIG_MASK_VLAN_BASED_MAC_LEARNING);
+ MXL862XX_BRIDGE_PORT_CONFIG_MASK_EGRESS_SUB_METER);
+ br_port_cfg.src_mac_learning_disable = !p->learning;
- br_port_cfg.bridge_port_id = cpu_to_le16(port);
- br_port_cfg.src_mac_learning_disable = false;
- br_port_cfg.vlan_src_mac_vid_enable = true;
- br_port_cfg.vlan_dst_mac_vid_enable = true;
+ for (i = 0; i < ARRAY_SIZE(br_port_cfg.bridge_port_map); i++)
+ br_port_cfg.bridge_port_map[i] =
+ cpu_to_le16(bitmap_read(p->portmap, i * 16, 16));
+
+ for (i = 0; i < ARRAY_SIZE(mxl862xx_flood_meters); i++) {
+ idx = mxl862xx_flood_meters[i];
+ enable = !!(p->flood_block & BIT(idx));
+
+ br_port_cfg.egress_traffic_sub_meter_id[idx] =
+ enable ? cpu_to_le16(priv->drop_meter) : 0;
+ br_port_cfg.egress_sub_metering_enable[idx] = enable;
+ }
+
+ return MXL862XX_API_WRITE(priv, MXL862XX_BRIDGEPORT_CONFIGSET,
+ br_port_cfg);
+}
+
+static int mxl862xx_setup_cpu_bridge(struct dsa_switch *ds, int port)
+{
+ struct mxl862xx_priv *priv = ds->priv;
+ struct dsa_port *dp;
+
+ priv->ports[port].fid = MXL862XX_DEFAULT_BRIDGE;
+ priv->ports[port].learning = true;
/* include all assigned user ports in the CPU portmap */
+ bitmap_zero(priv->ports[port].portmap, MXL862XX_MAX_BRIDGE_PORTS);
dsa_switch_for_each_user_port(dp, ds) {
/* it's safe to rely on cpu_dp being valid for user ports */
if (dp->cpu_dp->index != port)
continue;
- bridge_port_map |= BIT(dp->index);
+ __set_bit(dp->index, priv->ports[port].portmap);
}
- br_port_cfg.bridge_port_map[0] |= cpu_to_le16(bridge_port_map);
- return MXL862XX_API_WRITE(priv, MXL862XX_BRIDGEPORT_CONFIGSET, br_port_cfg);
+ return mxl862xx_set_bridge_port(ds, port);
}
static int mxl862xx_add_single_port_bridge(struct dsa_switch *ds, int port)
{
- struct mxl862xx_bridge_port_config br_port_cfg = {};
struct dsa_port *dp = dsa_to_port(ds, port);
struct mxl862xx_bridge_alloc br_alloc = {};
+ struct mxl862xx_priv *priv = ds->priv;
int ret;
- ret = MXL862XX_API_READ(ds->priv, MXL862XX_BRIDGE_ALLOC, br_alloc);
+ ret = MXL862XX_API_READ(priv, MXL862XX_BRIDGE_ALLOC, br_alloc);
if (ret) {
dev_err(ds->dev, "failed to allocate a bridge for port %d\n", port);
return ret;
}
- br_port_cfg.bridge_id = br_alloc.bridge_id;
- br_port_cfg.bridge_port_id = cpu_to_le16(port);
- br_port_cfg.mask = cpu_to_le32(MXL862XX_BRIDGE_PORT_CONFIG_MASK_BRIDGE_ID |
- MXL862XX_BRIDGE_PORT_CONFIG_MASK_BRIDGE_PORT_MAP |
- MXL862XX_BRIDGE_PORT_CONFIG_MASK_MC_SRC_MAC_LEARNING |
- MXL862XX_BRIDGE_PORT_CONFIG_MASK_VLAN_BASED_MAC_LEARNING);
- br_port_cfg.src_mac_learning_disable = true;
- br_port_cfg.vlan_src_mac_vid_enable = false;
- br_port_cfg.vlan_dst_mac_vid_enable = false;
- /* As this function is only called for user ports it is safe to rely on
- * cpu_dp being valid
+ priv->ports[port].fid = le16_to_cpu(br_alloc.bridge_id);
+ priv->ports[port].learning = false;
+ bitmap_zero(priv->ports[port].portmap, MXL862XX_MAX_BRIDGE_PORTS);
+ __set_bit(dp->cpu_dp->index, priv->ports[port].portmap);
+
+ ret = mxl862xx_set_bridge_port(ds, port);
+ if (ret)
+ return ret;
+
+ /* Standalone ports should not flood unknown unicast or multicast
+ * towards the CPU by default; only broadcast is needed initially.
*/
- br_port_cfg.bridge_port_map[0] = cpu_to_le16(BIT(dp->cpu_dp->index));
+ return mxl862xx_bridge_config_fwd(ds, priv->ports[port].fid,
+ false, false, true);
+}
+
+static struct mxl862xx_bridge *mxl862xx_allocate_bridge(struct dsa_switch *ds,
+ int num)
+{
+ struct mxl862xx_bridge_alloc br_alloc = {};
+ struct mxl862xx_priv *priv = ds->priv;
+ struct mxl862xx_bridge *mxlbridge;
+ int ret;
+
+ mxlbridge = kzalloc_obj(*mxlbridge);
+ if (!mxlbridge)
+ return ERR_PTR(-ENOMEM);
+
+ ret = MXL862XX_API_READ(priv, MXL862XX_BRIDGE_ALLOC, br_alloc);
+ if (ret) {
+ kfree(mxlbridge);
+ return ERR_PTR(ret);
+ }
+
+ mxlbridge->bridge_id = le16_to_cpu(br_alloc.bridge_id);
+ mxlbridge->dsa_bridge_num = num;
+
+ ret = mxl862xx_bridge_config_fwd(ds, mxlbridge->bridge_id,
+ true, true, true);
+ if (ret) {
+ br_alloc.bridge_id = cpu_to_le16(mxlbridge->bridge_id);
+ MXL862XX_API_WRITE(priv, MXL862XX_BRIDGE_FREE, br_alloc);
+ kfree(mxlbridge);
+ return ERR_PTR(ret);
+ }
+
+ list_add(&mxlbridge->list, &priv->bridges);
+
+ return mxlbridge;
+}
+
+static void mxl862xx_free_bridge(struct dsa_switch *ds,
+ struct mxl862xx_bridge *mxlbridge)
+{
+ struct mxl862xx_bridge_alloc br_alloc = {
+ .bridge_id = cpu_to_le16(mxlbridge->bridge_id),
+ };
+
+ MXL862XX_API_WRITE(ds->priv, MXL862XX_BRIDGE_FREE, br_alloc);
+ list_del(&mxlbridge->list);
+ kfree(mxlbridge);
+}
+
+static struct mxl862xx_bridge *mxl862xx_find_bridge(struct dsa_switch *ds,
+ struct dsa_bridge bridge)
+{
+ struct mxl862xx_priv *priv = ds->priv;
+ struct mxl862xx_bridge *mxlbridge;
+
+ if (!bridge.num)
+ return NULL;
+
+ list_for_each_entry(mxlbridge, &priv->bridges, list) {
+ if (mxlbridge->dsa_bridge_num == bridge.num)
+ return mxlbridge;
+ }
+
+ return NULL;
+}
+
+static int mxl862xx_update_bridge(struct dsa_switch *ds,
+ struct mxl862xx_bridge *mxlbridge,
+ int port, bool join)
+{
+ struct mxl862xx_priv *priv = ds->priv;
+ struct dsa_port *dp;
+ int member, ret;
+
+ if (join) {
+ __set_bit(port, mxlbridge->portmap);
+ priv->ports[port].bridge = mxlbridge;
+ } else {
+ __clear_bit(port, mxlbridge->portmap);
+ priv->ports[port].bridge = NULL;
+ }
+
+ /* Update all current bridge members' portmaps */
+ for_each_set_bit(member, mxlbridge->portmap,
+ MXL862XX_MAX_BRIDGE_PORTS) {
+ dp = dsa_to_port(ds, member);
+
+ /* Build portmap: CPU port + all bridge members except self */
+ bitmap_copy(priv->ports[member].portmap, mxlbridge->portmap,
+ MXL862XX_MAX_BRIDGE_PORTS);
+ __clear_bit(member, priv->ports[member].portmap);
+ __set_bit(dp->cpu_dp->index, priv->ports[member].portmap);
+
+ priv->ports[member].learning = true;
+ ret = mxl862xx_set_bridge_port(ds, member);
+ if (ret)
+ return ret;
+ }
+
+ /* Revert leaving port to its single-port bridge */
+ if (!join) {
+ dp = dsa_to_port(ds, port);
+
+ bitmap_zero(priv->ports[port].portmap, MXL862XX_MAX_BRIDGE_PORTS);
+ __set_bit(dp->cpu_dp->index, priv->ports[port].portmap);
+ priv->ports[port].flood_block = 0;
+ priv->ports[port].learning = false;
+ ret = mxl862xx_set_bridge_port(ds, port);
+ if (ret)
+ return ret;
+
+ mxl862xx_port_fast_age(ds, port);
+ }
+
+ return 0;
+}
+
+static int mxl862xx_port_bridge_join(struct dsa_switch *ds, int port,
+ struct dsa_bridge bridge,
+ bool *tx_fwd_offload,
+ struct netlink_ext_ack *extack)
+{
+ struct mxl862xx_bridge *mxlbridge;
- return MXL862XX_API_WRITE(ds->priv, MXL862XX_BRIDGEPORT_CONFIGSET, br_port_cfg);
+ mxlbridge = mxl862xx_find_bridge(ds, bridge);
+ if (!mxlbridge) {
+ mxlbridge = mxl862xx_allocate_bridge(ds, bridge.num);
+ if (IS_ERR(mxlbridge))
+ return PTR_ERR(mxlbridge);
+ }
+
+ return mxl862xx_update_bridge(ds, mxlbridge, port, true);
+}
+
+static void mxl862xx_port_bridge_leave(struct dsa_switch *ds, int port,
+ struct dsa_bridge bridge)
+{
+ struct mxl862xx_bridge *mxlbridge;
+
+ mxlbridge = mxl862xx_find_bridge(ds, bridge);
+ if (!mxlbridge)
+ return;
+
+ mxl862xx_update_bridge(ds, mxlbridge, port, false);
+
+ if (bitmap_empty(mxlbridge->portmap, MXL862XX_MAX_BRIDGE_PORTS))
+ mxl862xx_free_bridge(ds, mxlbridge);
}
static int mxl862xx_port_setup(struct dsa_switch *ds, int port)
@@ -366,6 +614,262 @@ static void mxl862xx_phylink_get_caps(struct dsa_switch *ds, int port,
config->supported_interfaces);
}
+static int mxl862xx_port_fdb_add(struct dsa_switch *ds, int port,
+ const unsigned char *addr, u16 vid, struct dsa_db db)
+{
+ struct mxl862xx_mac_table_add param = { };
+ struct mxl862xx_priv *priv = ds->priv;
+ struct mxl862xx_bridge *mxlbridge;
+ u16 fid;
+ int ret;
+
+ switch (db.type) {
+ case DSA_DB_PORT:
+ fid = priv->ports[db.dp->index].fid;
+ break;
+
+ case DSA_DB_BRIDGE:
+ mxlbridge = mxl862xx_find_bridge(ds, db.bridge);
+ if (!mxlbridge)
+ return -ENOENT;
+ fid = mxlbridge->bridge_id;
+ break;
+
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ param.port_id = cpu_to_le32(port);
+ param.fid = cpu_to_le16(fid);
+ param.static_entry = true;
+ param.tci = cpu_to_le16(vid & 0xFFF);
+ memcpy(param.mac, addr, ETH_ALEN);
+
+ ret = MXL862XX_API_WRITE(priv, MXL862XX_MAC_TABLEENTRYADD, param);
+ if (ret)
+ dev_err(ds->dev, "failed to add FDB entry on port %d\n", port);
+
+ return ret;
+}
+
+static int mxl862xx_port_fdb_del(struct dsa_switch *ds, int port,
+ const unsigned char *addr, u16 vid, struct dsa_db db)
+{
+ struct mxl862xx_mac_table_remove param = { };
+ struct mxl862xx_priv *priv = ds->priv;
+ struct mxl862xx_bridge *mxlbridge;
+ u16 fid;
+ int ret;
+
+ switch (db.type) {
+ case DSA_DB_PORT:
+ fid = priv->ports[db.dp->index].fid;
+ break;
+
+ case DSA_DB_BRIDGE:
+ /* Use multi-port bridge FID */
+ mxlbridge = mxl862xx_find_bridge(ds, db.bridge);
+ if (!mxlbridge)
+ return -ENOENT;
+ fid = mxlbridge->bridge_id;
+ break;
+
+ default:
+ return -EOPNOTSUPP;
+ }
+
+ param.fid = cpu_to_le16(fid);
+ param.tci = cpu_to_le16(vid & 0xFFF);
+ memcpy(param.mac, addr, ETH_ALEN);
+
+ ret = MXL862XX_API_WRITE(priv, MXL862XX_MAC_TABLEENTRYREMOVE, param);
+ if (ret)
+ dev_err(ds->dev, "failed to remove FDB entry on port %d\n", port);
+
+ return ret;
+}
+
+static int mxl862xx_port_fdb_dump(struct dsa_switch *ds, int port,
+ dsa_fdb_dump_cb_t *cb, void *data)
+{
+ struct mxl862xx_mac_table_read param = { };
+ struct mxl862xx_priv *priv = ds->priv;
+ u32 entry_port_id;
+ int ret;
+
+ while (true) {
+ ret = MXL862XX_API_READ(priv, MXL862XX_MAC_TABLEENTRYREAD, param);
+ if (ret)
+ return ret;
+
+ if (param.last)
+ break;
+
+ entry_port_id = le32_to_cpu(param.port_id);
+
+ if (entry_port_id == port)
+ cb(param.mac, param.tci & 0x0FFF,
+ param.static_entry, data);
+
+ memset(¶m, 0, sizeof(param));
+ }
+
+ return 0;
+}
+
+static int mxl862xx_port_mdb_add(struct dsa_switch *ds, int port,
+ const struct switchdev_obj_port_mdb *mdb,
+ struct dsa_db db)
+{
+ return mxl862xx_port_fdb_add(ds, port, mdb->addr, mdb->vid, db);
+}
+
+static int mxl862xx_port_mdb_del(struct dsa_switch *ds, int port,
+ const struct switchdev_obj_port_mdb *mdb,
+ struct dsa_db db)
+{
+ return mxl862xx_port_fdb_del(ds, port, mdb->addr, mdb->vid, db);
+}
+
+static int mxl862xx_set_ageing_time(struct dsa_switch *ds, unsigned int msecs)
+{
+ struct mxl862xx_cfg param;
+ int ret;
+
+ ret = MXL862XX_API_READ(ds->priv, MXL862XX_COMMON_CFGGET, param);
+ if (ret) {
+ dev_err(ds->dev, "failed to read switch config\n");
+ return ret;
+ }
+
+ param.mac_table_age_timer = cpu_to_le32(MXL862XX_AGETIMER_CUSTOM);
+ param.age_timer = cpu_to_le32(msecs / 1000);
+ ret = MXL862XX_API_WRITE(ds->priv, MXL862XX_COMMON_CFGSET, param);
+ if (ret)
+ dev_err(ds->dev, "failed to set ageing\n");
+
+ return ret;
+}
+
+static void mxl862xx_port_stp_state_set(struct dsa_switch *ds, int port,
+ u8 state)
+{
+ struct mxl862xx_stp_port_cfg param = {
+ .port_id = cpu_to_le16(port),
+ };
+ struct mxl862xx_priv *priv = ds->priv;
+ int ret;
+
+ switch (state) {
+ case BR_STATE_DISABLED:
+ param.port_state = MXL862XX_STP_PORT_STATE_DISABLE;
+ break;
+ case BR_STATE_BLOCKING:
+ case BR_STATE_LISTENING:
+ param.port_state = MXL862XX_STP_PORT_STATE_BLOCKING;
+ break;
+ case BR_STATE_LEARNING:
+ param.port_state = MXL862XX_STP_PORT_STATE_LEARNING;
+ break;
+ case BR_STATE_FORWARDING:
+ param.port_state = MXL862XX_STP_PORT_STATE_FORWARD;
+ break;
+ default:
+ dev_err(ds->dev, "invalid STP state: %d\n", state);
+ return;
+ }
+
+ ret = MXL862XX_API_WRITE(priv, MXL862XX_STP_PORTCFGSET, param);
+ if (ret) {
+ dev_err(ds->dev, "failed to set STP state on port %d\n", port);
+ return;
+ }
+
+ /* The firmware may re-enable MAC learning as a side-effect of
+ * entering LEARNING or FORWARDING state (per 802.1D defaults).
+ * Re-apply the driver's intended learning and metering config
+ * so that standalone ports keep learning disabled.
+ */
+ ret = mxl862xx_set_bridge_port(ds, port);
+ if (ret)
+ dev_err(ds->dev, "failed to reapply brport flags on port %d\n", port);
+}
+
+static void mxl862xx_port_set_host_flood(struct dsa_switch *ds, int port,
+ bool uc, bool mc)
+{
+ struct mxl862xx_priv *priv = ds->priv;
+
+ if (priv->ports[port].bridge)
+ return;
+
+ /* Standalone ports must always keep broadcast flooding enabled
+ * towards the CPU so that ARP and other broadcast protocols work.
+ * Only unknown unicast and multicast should follow the host flood
+ * knobs driven by IFF_PROMISC / IFF_ALLMULTI.
+ */
+ mxl862xx_bridge_config_fwd(ds, priv->ports[port].fid, uc, mc, true);
+}
+
+static int mxl862xx_port_pre_bridge_flags(struct dsa_switch *ds, int port,
+ struct switchdev_brport_flags flags,
+ struct netlink_ext_ack *extack)
+{
+ if (flags.mask & ~(BR_FLOOD | BR_MCAST_FLOOD | BR_BCAST_FLOOD |
+ BR_LEARNING))
+ return -EINVAL;
+
+ return 0;
+}
+
+static int mxl862xx_port_bridge_flags(struct dsa_switch *ds, int port,
+ struct switchdev_brport_flags flags,
+ struct netlink_ext_ack *extack)
+{
+ struct mxl862xx_priv *priv = ds->priv;
+ unsigned long old_block = priv->ports[port].flood_block;
+ unsigned long block = old_block;
+ bool need_update = false;
+ int ret;
+
+ if (flags.mask & BR_FLOOD) {
+ if (flags.val & BR_FLOOD)
+ block &= ~BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_UC);
+ else
+ block |= BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_UC);
+ }
+
+ if (flags.mask & BR_MCAST_FLOOD) {
+ if (flags.val & BR_MCAST_FLOOD) {
+ block &= ~BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_MC_IP);
+ block &= ~BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_MC_NON_IP);
+ } else {
+ block |= BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_MC_IP);
+ block |= BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_UNKNOWN_MC_NON_IP);
+ }
+ }
+
+ if (flags.mask & BR_BCAST_FLOOD) {
+ if (flags.val & BR_BCAST_FLOOD)
+ block &= ~BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_BROADCAST);
+ else
+ block |= BIT(MXL862XX_BRIDGE_PORT_EGRESS_METER_BROADCAST);
+ }
+
+ if (flags.mask & BR_LEARNING)
+ priv->ports[port].learning = !!(flags.val & BR_LEARNING);
+
+ need_update = (block != old_block) || (flags.mask & BR_LEARNING);
+ if (need_update) {
+ priv->ports[port].flood_block = block;
+ ret = mxl862xx_set_bridge_port(ds, port);
+ if (ret)
+ return ret;
+ }
+
+ return 0;
+}
+
static const struct dsa_switch_ops mxl862xx_switch_ops = {
.get_tag_protocol = mxl862xx_get_tag_protocol,
.setup = mxl862xx_setup,
@@ -374,6 +878,18 @@ static const struct dsa_switch_ops mxl862xx_switch_ops = {
.port_enable = mxl862xx_port_enable,
.port_disable = mxl862xx_port_disable,
.port_fast_age = mxl862xx_port_fast_age,
+ .set_ageing_time = mxl862xx_set_ageing_time,
+ .port_bridge_join = mxl862xx_port_bridge_join,
+ .port_bridge_leave = mxl862xx_port_bridge_leave,
+ .port_pre_bridge_flags = mxl862xx_port_pre_bridge_flags,
+ .port_bridge_flags = mxl862xx_port_bridge_flags,
+ .port_stp_state_set = mxl862xx_port_stp_state_set,
+ .port_set_host_flood = mxl862xx_port_set_host_flood,
+ .port_fdb_add = mxl862xx_port_fdb_add,
+ .port_fdb_del = mxl862xx_port_fdb_del,
+ .port_fdb_dump = mxl862xx_port_fdb_dump,
+ .port_mdb_add = mxl862xx_port_mdb_add,
+ .port_mdb_del = mxl862xx_port_mdb_del,
};
static void mxl862xx_phylink_mac_config(struct phylink_config *config,
@@ -415,6 +931,8 @@ static int mxl862xx_probe(struct mdio_device *mdiodev)
priv->mdiodev = mdiodev;
+ INIT_LIST_HEAD(&priv->bridges);
+
ds = devm_kzalloc(dev, sizeof(*ds), GFP_KERNEL);
if (!ds)
return -ENOMEM;
@@ -425,6 +943,8 @@ static int mxl862xx_probe(struct mdio_device *mdiodev)
ds->ops = &mxl862xx_switch_ops;
ds->phylink_mac_ops = &mxl862xx_phylink_mac_ops;
ds->num_ports = MXL862XX_MAX_PORTS;
+ ds->fdb_isolation = true;
+ ds->max_num_bridges = MXL862XX_MAX_BRIDGES;
dev_set_drvdata(dev, ds);
diff --git a/drivers/net/dsa/mxl862xx/mxl862xx.h b/drivers/net/dsa/mxl862xx/mxl862xx.h
index bfeb436942d5f..d5e1a4dee9ea7 100644
--- a/drivers/net/dsa/mxl862xx/mxl862xx.h
+++ b/drivers/net/dsa/mxl862xx/mxl862xx.h
@@ -7,10 +7,31 @@
#include <net/dsa.h>
#define MXL862XX_MAX_PORTS 17
+#define MXL862XX_DEFAULT_BRIDGE 0
+#define MXL862XX_MAX_BRIDGES 48
+#define MXL862XX_MAX_BRIDGE_PORTS 128
+
+struct mxl862xx_bridge {
+ unsigned int dsa_bridge_num;
+ u16 bridge_id;
+ DECLARE_BITMAP(portmap, MXL862XX_MAX_BRIDGE_PORTS);
+ struct list_head list;
+};
+
+struct mxl862xx_port {
+ u16 fid; /* single-port bridge ID (permanent) */
+ struct mxl862xx_bridge *bridge;
+ DECLARE_BITMAP(portmap, MXL862XX_MAX_BRIDGE_PORTS);
+ unsigned long flood_block; /* bitmask of meter indices with metering on */
+ bool learning;
+};
struct mxl862xx_priv {
struct dsa_switch *ds;
struct mdio_device *mdiodev;
+ u16 drop_meter; /* single zero-rate meter shared by all ports */
+ struct mxl862xx_port ports[MXL862XX_MAX_PORTS];
+ struct list_head bridges;
};
#endif /* __MXL862XX_H */
--
2.53.0
^ permalink raw reply related [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 0/2] net: dsa: mxl862xx: add support for bridge offloading
2026-03-07 3:29 [PATCH net-next 0/2] net: dsa: mxl862xx: add support for bridge offloading Daniel Golle
2026-03-07 3:30 ` [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Daniel Golle
2026-03-07 3:31 ` [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading Daniel Golle
@ 2026-03-07 3:39 ` Daniel Golle
2 siblings, 0 replies; 13+ messages in thread
From: Daniel Golle @ 2026-03-07 3:39 UTC (permalink / raw)
To: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel
Cc: Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
On Sat, Mar 07, 2026 at 03:29:15AM +0000, Daniel Golle wrote:
> As a next step to complete the mxl862xx DSA driver, add support for
> offloading forwarding between bridged ports to the switch hardware.
>
> This works pretty much without any big surprises, apart from two
> subtleties:
> * per-port control over flooding behavior has to be implemented by
> (ab)using a 0-rate QoS meters as stopper in lack of any better
> option.
> * STP state transition unconditionally enables learning on a port
> even if it was previously explicitely disabled (a firmware bug)
>
> Note that as the driver is still lacking all VLAN features (which
> are going to be added next), at this point some of the
> bridge_vlan_aware.sh tests are failing after applying this series.
>
> This is expected and cannot be avoided without implementing
> port_vlan_filtering + port_vlan_add/del. And adding both bridge and
> VLAN offloading at the same time would be too much for anyone to
> review.
>
> All other relevant selftests (including bridge_vlan_unaware.sh) are
> still passing.
I forgot to add that (as expected) also test
VLAN-aware bridge with different PVIDs: Checking which packets were received
now fails in no_forwarding.sh, and will be fixed by implementing VLAN
operations in the next series.
>
> Daniel Golle (2):
> dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
> net: dsa: mxl862xx: implement bridge offloading
>
> drivers/net/dsa/mxl862xx/mxl862xx-api.h | 171 +++++++
> drivers/net/dsa/mxl862xx/mxl862xx-cmd.h | 19 +-
> drivers/net/dsa/mxl862xx/mxl862xx.c | 576 ++++++++++++++++++++++--
> drivers/net/dsa/mxl862xx/mxl862xx.h | 21 +
> net/dsa/tag_mxl862xx.c | 2 +
> 5 files changed, 757 insertions(+), 32 deletions(-)
>
> --
> 2.53.0
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-07 3:30 ` [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Daniel Golle
@ 2026-03-07 9:57 ` Jonas Gorski
2026-03-08 15:18 ` Daniel Golle
0 siblings, 1 reply; 13+ messages in thread
From: Jonas Gorski @ 2026-03-07 9:57 UTC (permalink / raw)
To: Daniel Golle, Andrew Lunn, Vladimir Oltean, David S. Miller,
Eric Dumazet, Jakub Kicinski, Paolo Abeni, Simon Horman,
Russell King, netdev, linux-kernel
Cc: Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
Hi,
On 07/03/2026 04:30, Daniel Golle wrote:
> The MxL862xx offloads forwarding between bridged ports to the
> hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
> forwarding of packets of (eg. flooded) frames arriving at the CPU
> port.
>
> Signed-off-by: Daniel Golle <daniel@makrotopia.org>
> ---
> net/dsa/tag_mxl862xx.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
> index 01f2158682718..c02f69de61cbb 100644
> --- a/net/dsa/tag_mxl862xx.c
> +++ b/net/dsa/tag_mxl862xx.c
> @@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
> skb_pull_rcsum(skb, MXL862_HEADER_LEN);
> dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
>
> + dsa_default_offload_fwd_mark(skb);
Does the switch (by default) also flood link local traffic (e.g. STP, LACP,
etc)? If not, you should not mark these as fwd offloaded.
Is there is a bit in the header that says whether a packet was flooded or
trapped that you can check?
Best regards,
Jonas
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-07 9:57 ` Jonas Gorski
@ 2026-03-08 15:18 ` Daniel Golle
2026-03-08 20:15 ` Jonas Gorski
0 siblings, 1 reply; 13+ messages in thread
From: Daniel Golle @ 2026-03-08 15:18 UTC (permalink / raw)
To: Jonas Gorski
Cc: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel, Frank Wunderlich, Chad Monroe, Cezary Wilmanski,
Liang Xu, Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz,
Avinash Jayaraman, John Crispin
On Sat, Mar 07, 2026 at 10:57:56AM +0100, Jonas Gorski wrote:
> Hi,
>
> On 07/03/2026 04:30, Daniel Golle wrote:
> > The MxL862xx offloads forwarding between bridged ports to the
> > hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
> > forwarding of packets of (eg. flooded) frames arriving at the CPU
> > port.
> >
> > Signed-off-by: Daniel Golle <daniel@makrotopia.org>
> > ---
> > net/dsa/tag_mxl862xx.c | 2 ++
> > 1 file changed, 2 insertions(+)
> >
> > diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
> > index 01f2158682718..c02f69de61cbb 100644
> > --- a/net/dsa/tag_mxl862xx.c
> > +++ b/net/dsa/tag_mxl862xx.c
> > @@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
> > skb_pull_rcsum(skb, MXL862_HEADER_LEN);
> > dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
> >
> > + dsa_default_offload_fwd_mark(skb);
>
> Does the switch (by default) also flood link local traffic (e.g. STP, LACP,
> etc)? If not, you should not mark these as fwd offloaded.
No, it doesn't. Testing revealed that apparently it silently consumes them.
I assume we'll need something like
if (likely(!is_link_local_ether_addr(eth_hdr(skb)->h_dest)))
dsa_default_offload_fwd_mark(skb);
similar to tag_brcm.c, right?
> Is there is a bit in the header that says whether a packet was flooded or
> trapped that you can check?
Earlier testing showed that frames arriving at the microcontroller under
some conditions are relayed to the DSA CPU port -- and are destinguishable
as such. However, there is not bit directly indicating whether the packet
was (also) flooded already.
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-08 15:18 ` Daniel Golle
@ 2026-03-08 20:15 ` Jonas Gorski
2026-03-09 0:02 ` Daniel Golle
0 siblings, 1 reply; 13+ messages in thread
From: Jonas Gorski @ 2026-03-08 20:15 UTC (permalink / raw)
To: Daniel Golle
Cc: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel, Frank Wunderlich, Chad Monroe, Cezary Wilmanski,
Liang Xu, Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz,
Avinash Jayaraman, John Crispin
On Sun, Mar 8, 2026 at 4:19 PM Daniel Golle <daniel@makrotopia.org> wrote:
>
> On Sat, Mar 07, 2026 at 10:57:56AM +0100, Jonas Gorski wrote:
> > Hi,
> >
> > On 07/03/2026 04:30, Daniel Golle wrote:
> > > The MxL862xx offloads forwarding between bridged ports to the
> > > hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
> > > forwarding of packets of (eg. flooded) frames arriving at the CPU
> > > port.
> > >
> > > Signed-off-by: Daniel Golle <daniel@makrotopia.org>
> > > ---
> > > net/dsa/tag_mxl862xx.c | 2 ++
> > > 1 file changed, 2 insertions(+)
> > >
> > > diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
> > > index 01f2158682718..c02f69de61cbb 100644
> > > --- a/net/dsa/tag_mxl862xx.c
> > > +++ b/net/dsa/tag_mxl862xx.c
> > > @@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
> > > skb_pull_rcsum(skb, MXL862_HEADER_LEN);
> > > dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
> > >
> > > + dsa_default_offload_fwd_mark(skb);
> >
> > Does the switch (by default) also flood link local traffic (e.g. STP, LACP,
> > etc)? If not, you should not mark these as fwd offloaded.
>
> No, it doesn't. Testing revealed that apparently it silently consumes them.
> I assume we'll need something like
>
> if (likely(!is_link_local_ether_addr(eth_hdr(skb)->h_dest)))
> dsa_default_offload_fwd_mark(skb);
>
> similar to tag_brcm.c, right?
Yepp, that would have been my suggestion :-)
> > Is there is a bit in the header that says whether a packet was flooded or
> > trapped that you can check?
>
> Earlier testing showed that frames arriving at the microcontroller under
> some conditions are relayed to the DSA CPU port -- and are destinguishable
> as such. However, there is not bit directly indicating whether the packet
> was (also) flooded already.
So you know if they were copied to the cpu port due to some rules, but
not if they were snooped or trapped?
Best regards,
Jonas
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-08 20:15 ` Jonas Gorski
@ 2026-03-09 0:02 ` Daniel Golle
2026-03-09 8:07 ` Jonas Gorski
0 siblings, 1 reply; 13+ messages in thread
From: Daniel Golle @ 2026-03-09 0:02 UTC (permalink / raw)
To: Jonas Gorski
Cc: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel, Frank Wunderlich, Chad Monroe, Cezary Wilmanski,
Liang Xu, Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz,
Avinash Jayaraman, John Crispin
On Sun, Mar 08, 2026 at 09:15:42PM +0100, Jonas Gorski wrote:
> On Sun, Mar 8, 2026 at 4:19 PM Daniel Golle <daniel@makrotopia.org> wrote:
> >
> > On Sat, Mar 07, 2026 at 10:57:56AM +0100, Jonas Gorski wrote:
> > > Hi,
> > >
> > > On 07/03/2026 04:30, Daniel Golle wrote:
> > > > The MxL862xx offloads forwarding between bridged ports to the
> > > > hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
> > > > forwarding of packets of (eg. flooded) frames arriving at the CPU
> > > > port.
> > > >
> > > > Signed-off-by: Daniel Golle <daniel@makrotopia.org>
> > > > ---
> > > > net/dsa/tag_mxl862xx.c | 2 ++
> > > > 1 file changed, 2 insertions(+)
> > > >
> > > > diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
> > > > index 01f2158682718..c02f69de61cbb 100644
> > > > --- a/net/dsa/tag_mxl862xx.c
> > > > +++ b/net/dsa/tag_mxl862xx.c
> > > > @@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
> > > > skb_pull_rcsum(skb, MXL862_HEADER_LEN);
> > > > dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
> > > >
> > > > + dsa_default_offload_fwd_mark(skb);
> > >
> > > Does the switch (by default) also flood link local traffic (e.g. STP, LACP,
> > > etc)? If not, you should not mark these as fwd offloaded.
> >
> > No, it doesn't. Testing revealed that apparently it silently consumes them.
> > I assume we'll need something like
> >
> > if (likely(!is_link_local_ether_addr(eth_hdr(skb)->h_dest)))
> > dsa_default_offload_fwd_mark(skb);
> >
> > similar to tag_brcm.c, right?
>
> Yepp, that would have been my suggestion :-)
Ok, I'll do that then.
>
> > > Is there is a bit in the header that says whether a packet was flooded or
> > > trapped that you can check?
> >
> > Earlier testing showed that frames arriving at the microcontroller under
> > some conditions are relayed to the DSA CPU port -- and are destinguishable
> > as such. However, there is not bit directly indicating whether the packet
> > was (also) flooded already.
>
> So you know if they were copied to the cpu port due to some rules, but
> not if they were snooped or trapped?
I haven't found any details about that documented, and all I can say
is that in some cases (some of the IEEE1588v2 frames generated by the
local_termination.sh selftest, for example) the microcontroller seems
to send an additional copy of the frame to the DSA CPU port using
fields of the 8-byte tag which usually aren't used -- and that's why I
even noticed them. The initial driver now merged upstream disabled the
microcontroller SDMA and FMDA, effectively disconnecting it from the
switch datapath, so it would shut up, and this effect can now longer
be observed.
Now, when testing if link-local frames would be forwarded I noticed
that there is a set of default rules instatiated after reset which
trap link-local frames to the microcontroller port. I suppose it could
also be setup to snoop instead of trap by manually erasing these PCE
rules and setting new ones instead. In this case, however, there would
be no way to tell from the frame received on the DSA CPU port if the
frame had also been sent to the microcontroller.
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-09 0:02 ` Daniel Golle
@ 2026-03-09 8:07 ` Jonas Gorski
2026-03-09 12:23 ` Daniel Golle
2026-03-09 23:33 ` Vladimir Oltean
0 siblings, 2 replies; 13+ messages in thread
From: Jonas Gorski @ 2026-03-09 8:07 UTC (permalink / raw)
To: Daniel Golle
Cc: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel, Frank Wunderlich, Chad Monroe, Cezary Wilmanski,
Liang Xu, Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz,
Avinash Jayaraman, John Crispin
On Mon, Mar 9, 2026 at 1:02 AM Daniel Golle <daniel@makrotopia.org> wrote:
>
> On Sun, Mar 08, 2026 at 09:15:42PM +0100, Jonas Gorski wrote:
> > On Sun, Mar 8, 2026 at 4:19 PM Daniel Golle <daniel@makrotopia.org> wrote:
> > >
> > > On Sat, Mar 07, 2026 at 10:57:56AM +0100, Jonas Gorski wrote:
> > > > Hi,
> > > >
> > > > On 07/03/2026 04:30, Daniel Golle wrote:
> > > > > The MxL862xx offloads forwarding between bridged ports to the
> > > > > hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
> > > > > forwarding of packets of (eg. flooded) frames arriving at the CPU
> > > > > port.
> > > > >
> > > > > Signed-off-by: Daniel Golle <daniel@makrotopia.org>
> > > > > ---
> > > > > net/dsa/tag_mxl862xx.c | 2 ++
> > > > > 1 file changed, 2 insertions(+)
> > > > >
> > > > > diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
> > > > > index 01f2158682718..c02f69de61cbb 100644
> > > > > --- a/net/dsa/tag_mxl862xx.c
> > > > > +++ b/net/dsa/tag_mxl862xx.c
> > > > > @@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
> > > > > skb_pull_rcsum(skb, MXL862_HEADER_LEN);
> > > > > dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
> > > > >
> > > > > + dsa_default_offload_fwd_mark(skb);
> > > >
> > > > Does the switch (by default) also flood link local traffic (e.g. STP, LACP,
> > > > etc)? If not, you should not mark these as fwd offloaded.
> > >
> > > No, it doesn't. Testing revealed that apparently it silently consumes them.
> > > I assume we'll need something like
> > >
> > > if (likely(!is_link_local_ether_addr(eth_hdr(skb)->h_dest)))
> > > dsa_default_offload_fwd_mark(skb);
> > >
> > > similar to tag_brcm.c, right?
> >
> > Yepp, that would have been my suggestion :-)
>
> Ok, I'll do that then.
>
> >
> > > > Is there is a bit in the header that says whether a packet was flooded or
> > > > trapped that you can check?
> > >
> > > Earlier testing showed that frames arriving at the microcontroller under
> > > some conditions are relayed to the DSA CPU port -- and are destinguishable
> > > as such. However, there is not bit directly indicating whether the packet
> > > was (also) flooded already.
> >
> > So you know if they were copied to the cpu port due to some rules, but
> > not if they were snooped or trapped?
>
> I haven't found any details about that documented, and all I can say
> is that in some cases (some of the IEEE1588v2 frames generated by the
> local_termination.sh selftest, for example) the microcontroller seems
> to send an additional copy of the frame to the DSA CPU port using
> fields of the 8-byte tag which usually aren't used -- and that's why I
> even noticed them. The initial driver now merged upstream disabled the
> microcontroller SDMA and FMDA, effectively disconnecting it from the
> switch datapath, so it would shut up, and this effect can now longer
> be observed.
>
> Now, when testing if link-local frames would be forwarded I noticed
> that there is a set of default rules instatiated after reset which
> trap link-local frames to the microcontroller port. I suppose it could
> also be setup to snoop instead of trap by manually erasing these PCE
> rules and setting new ones instead. In this case, however, there would
> be no way to tell from the frame received on the DSA CPU port if the
> frame had also been sent to the microcontroller.
For dynamic configuration you would probably need to then check the
destination address, check if snooping or trapping is configured for
it, and then set (not) mark offloaded accordingly. While linux allows
you do dynamically configure some of the groups between
flooding/trapping, I'm not sure if this is propagated via dsa or even
switchdev.
I suggest sticking to the default of trapping and not marking as
offloaded. It's much easier to flood in software if needed than the
other way round.
Best regards,
Jonas
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-09 8:07 ` Jonas Gorski
@ 2026-03-09 12:23 ` Daniel Golle
2026-03-09 23:33 ` Vladimir Oltean
1 sibling, 0 replies; 13+ messages in thread
From: Daniel Golle @ 2026-03-09 12:23 UTC (permalink / raw)
To: Jonas Gorski
Cc: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel, Frank Wunderlich, Chad Monroe, Cezary Wilmanski,
Liang Xu, Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz,
Avinash Jayaraman, John Crispin
On Mon, Mar 09, 2026 at 09:07:07AM +0100, Jonas Gorski wrote:
> On Mon, Mar 9, 2026 at 1:02 AM Daniel Golle <daniel@makrotopia.org> wrote:
> >
> > On Sun, Mar 08, 2026 at 09:15:42PM +0100, Jonas Gorski wrote:
> > > On Sun, Mar 8, 2026 at 4:19 PM Daniel Golle <daniel@makrotopia.org> wrote:
> > > >
> > > > On Sat, Mar 07, 2026 at 10:57:56AM +0100, Jonas Gorski wrote:
> > > > > Hi,
> > > > >
> > > > > On 07/03/2026 04:30, Daniel Golle wrote:
> > > > > > The MxL862xx offloads forwarding between bridged ports to the
> > > > > > hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate
> > > > > > forwarding of packets of (eg. flooded) frames arriving at the CPU
> > > > > > port.
> > > > > >
> > > > > > Signed-off-by: Daniel Golle <daniel@makrotopia.org>
> > > > > > ---
> > > > > > net/dsa/tag_mxl862xx.c | 2 ++
> > > > > > 1 file changed, 2 insertions(+)
> > > > > >
> > > > > > diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c
> > > > > > index 01f2158682718..c02f69de61cbb 100644
> > > > > > --- a/net/dsa/tag_mxl862xx.c
> > > > > > +++ b/net/dsa/tag_mxl862xx.c
> > > > > > @@ -92,6 +92,8 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb,
> > > > > > skb_pull_rcsum(skb, MXL862_HEADER_LEN);
> > > > > > dsa_strip_etype_header(skb, MXL862_HEADER_LEN);
> > > > > >
> > > > > > + dsa_default_offload_fwd_mark(skb);
> > > > >
> > > > > Does the switch (by default) also flood link local traffic (e.g. STP, LACP,
> > > > > etc)? If not, you should not mark these as fwd offloaded.
> > > >
> > > > No, it doesn't. Testing revealed that apparently it silently consumes them.
> > > > I assume we'll need something like
> > > >
> > > > if (likely(!is_link_local_ether_addr(eth_hdr(skb)->h_dest)))
> > > > dsa_default_offload_fwd_mark(skb);
> > > >
> > > > similar to tag_brcm.c, right?
> > >
> > > Yepp, that would have been my suggestion :-)
> >
> > Ok, I'll do that then.
> >
> > >
> > > > > Is there is a bit in the header that says whether a packet was flooded or
> > > > > trapped that you can check?
> > > >
> > > > Earlier testing showed that frames arriving at the microcontroller under
> > > > some conditions are relayed to the DSA CPU port -- and are destinguishable
> > > > as such. However, there is not bit directly indicating whether the packet
> > > > was (also) flooded already.
> > >
> > > So you know if they were copied to the cpu port due to some rules, but
> > > not if they were snooped or trapped?
> >
> > I haven't found any details about that documented, and all I can say
> > is that in some cases (some of the IEEE1588v2 frames generated by the
> > local_termination.sh selftest, for example) the microcontroller seems
> > to send an additional copy of the frame to the DSA CPU port using
> > fields of the 8-byte tag which usually aren't used -- and that's why I
> > even noticed them. The initial driver now merged upstream disabled the
> > microcontroller SDMA and FMDA, effectively disconnecting it from the
> > switch datapath, so it would shut up, and this effect can now longer
> > be observed.
> >
> > Now, when testing if link-local frames would be forwarded I noticed
> > that there is a set of default rules instatiated after reset which
> > trap link-local frames to the microcontroller port. I suppose it could
> > also be setup to snoop instead of trap by manually erasing these PCE
> > rules and setting new ones instead. In this case, however, there would
> > be no way to tell from the frame received on the DSA CPU port if the
> > frame had also been sent to the microcontroller.
>
> For dynamic configuration you would probably need to then check the
> destination address, check if snooping or trapping is configured for
> it, and then set (not) mark offloaded accordingly. While linux allows
> you do dynamically configure some of the groups between
> flooding/trapping, I'm not sure if this is propagated via dsa or even
> switchdev.
>
> I suggest sticking to the default of trapping and not marking as
> offloaded. It's much easier to flood in software if needed than the
> other way round.
Yeah, I'll do that and right now I'm trying to come up with a set of
PCE rules which allow for link-local frames to even arrive at the
CPU port at all (which would allow software flooding or even doing
anything with them on the CPU)
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading
2026-03-07 3:31 ` [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading Daniel Golle
@ 2026-03-09 23:22 ` Jakub Kicinski
2026-03-09 23:27 ` Vladimir Oltean
1 sibling, 0 replies; 13+ messages in thread
From: Jakub Kicinski @ 2026-03-09 23:22 UTC (permalink / raw)
To: Daniel Golle
Cc: Andrew Lunn, Vladimir Oltean, David S. Miller, Eric Dumazet,
Paolo Abeni, Simon Horman, Russell King, netdev, linux-kernel,
Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
On Sat, 7 Mar 2026 03:31:17 +0000 Daniel Golle wrote:
> Add support for bridge offloading on the mxl862xx DSA driver.
>
> Implement joining and leaving bridges as well as add, delete and dump
> operations on isolated FDBs and setting a port's STP state.
>
> The switch supports a maximum of 63 bridges, however, up to 12 may
> be used as "single-port bridges" to isolate standalone ports.
> Allowing up to 48 bridges to be offloaded seems more than enough on
> that hardware, hence that is set as max_num_bridges.
>
> A total of 128 bridge ports are supported in the bridge portmap, and
> virtual bridge ports have to be used eg. for link-aggregation, hence
> potentially exceeding the number of hardware ports.
>
> As there are now more users of the BRIDGEPORT_CONFIG_SET API and the
> state of each port is cached locally, introduce a helper function
> mxl862xx_set_bridge_port(struct dsa_switch *ds, int port) which is
> then also be used to replace the direct calls to the API in
> mxl862xx_setup_cpu_bridge() and mxl862xx_add_single_port_bridge(),
> while removing the accidentally added VLAN-aware-learning settings.
>
> Note that there is no convenient way to control flooding on per-port
> level, so the driver is using a QoS meter setup as a stopper in lack
> of any better option. This works, but allows a single 64-byte packet
> to pass once after reset. While this limitation doesn't seem to be a
> problem in practice, it has the effect that the bridge_vlan_unaware.sh
> selftest only passes the FDB test the 2nd time the test is run after
> boot (and any subsequent time after that, of course).
Warning: drivers/net/dsa/mxl862xx/mxl862xx-api.h:145 struct member 'first_bridge_port_id' not described in 'mxl862xx_mac_table_read'
Warning: drivers/net/dsa/mxl862xx/mxl862xx-api.h:806 missing initial short description on line:
* enum mxl862xx_stp_port_state
Also AI has a bunch of endianness complaints:
https://netdev-ai.bots.linux.dev/ai-review.html?id=b924beb1-9dec-4afb-ae21-5585ec8e7667
--
pw-bot: cr
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading
2026-03-07 3:31 ` [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading Daniel Golle
2026-03-09 23:22 ` Jakub Kicinski
@ 2026-03-09 23:27 ` Vladimir Oltean
1 sibling, 0 replies; 13+ messages in thread
From: Vladimir Oltean @ 2026-03-09 23:27 UTC (permalink / raw)
To: Daniel Golle
Cc: Andrew Lunn, David S. Miller, Eric Dumazet, Jakub Kicinski,
Paolo Abeni, Simon Horman, Russell King, netdev, linux-kernel,
Frank Wunderlich, Chad Monroe, Cezary Wilmanski, Liang Xu,
Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz, Avinash Jayaraman,
John Crispin
On Sat, Mar 07, 2026 at 03:31:17AM +0000, Daniel Golle wrote:
> +static int mxl862xx_update_bridge(struct dsa_switch *ds,
> + struct mxl862xx_bridge *mxlbridge,
> + int port, bool join)
There's a lot of false sharing here. If you move the "if (join)" and
"if (!join)" blocks to their respective callers, you end up with a much
smaller truly common function.
> +{
> + struct mxl862xx_priv *priv = ds->priv;
> + struct dsa_port *dp;
> + int member, ret;
> +
> + if (join) {
> + __set_bit(port, mxlbridge->portmap);
> + priv->ports[port].bridge = mxlbridge;
> + } else {
> + __clear_bit(port, mxlbridge->portmap);
> + priv->ports[port].bridge = NULL;
> + }
> +
> + /* Update all current bridge members' portmaps */
> + for_each_set_bit(member, mxlbridge->portmap,
> + MXL862XX_MAX_BRIDGE_PORTS) {
> + dp = dsa_to_port(ds, member);
> +
> + /* Build portmap: CPU port + all bridge members except self */
> + bitmap_copy(priv->ports[member].portmap, mxlbridge->portmap,
> + MXL862XX_MAX_BRIDGE_PORTS);
> + __clear_bit(member, priv->ports[member].portmap);
> + __set_bit(dp->cpu_dp->index, priv->ports[member].portmap);
> +
> + priv->ports[member].learning = true;
Actually, dsa_port_inherit_brport_flags() / dsa_port_clear_brport_flags() ensures
the BR_LEARNING flag passed through mxl862xx_port_bridge_flags() will keep the
hardware in sync with the bridge. You don't need to set this to true or to false
at runtime. Just at initial probe time, before DSA has made any call.
> + ret = mxl862xx_set_bridge_port(ds, member);
> + if (ret)
> + return ret;
What about going through all ports anyway, and return error at the end
if any bridge member portmap update failed? I know this patch set is
written assuming FW I/O failure is catastrophic, but here you may be
failing for a different port than the one which is leaving the bridge.
You can at least make an attempt to disable forwarding to/from that port.
> + }
> +
> + /* Revert leaving port to its single-port bridge */
> + if (!join) {
> + dp = dsa_to_port(ds, port);
> +
> + bitmap_zero(priv->ports[port].portmap, MXL862XX_MAX_BRIDGE_PORTS);
> + __set_bit(dp->cpu_dp->index, priv->ports[port].portmap);
> + priv->ports[port].flood_block = 0;
> + priv->ports[port].learning = false;
> + ret = mxl862xx_set_bridge_port(ds, port);
> + if (ret)
> + return ret;
> +
> + mxl862xx_port_fast_age(ds, port);
> + }
> +
> + return 0;
> +}
> +
> +static int mxl862xx_port_bridge_join(struct dsa_switch *ds, int port,
> + struct dsa_bridge bridge,
> + bool *tx_fwd_offload,
> + struct netlink_ext_ack *extack)
> +{
> + struct mxl862xx_bridge *mxlbridge;
>
> - return MXL862XX_API_WRITE(ds->priv, MXL862XX_BRIDGEPORT_CONFIGSET, br_port_cfg);
> + mxlbridge = mxl862xx_find_bridge(ds, bridge);
> + if (!mxlbridge) {
> + mxlbridge = mxl862xx_allocate_bridge(ds, bridge.num);
> + if (IS_ERR(mxlbridge))
> + return PTR_ERR(mxlbridge);
> + }
> +
> + return mxl862xx_update_bridge(ds, mxlbridge, port, true);
> +}
> +
> +static void mxl862xx_port_bridge_leave(struct dsa_switch *ds, int port,
> + struct dsa_bridge bridge)
> +{
> + struct mxl862xx_bridge *mxlbridge;
> +
> + mxlbridge = mxl862xx_find_bridge(ds, bridge);
> + if (!mxlbridge)
> + return;
> +
> + mxl862xx_update_bridge(ds, mxlbridge, port, false);
Don't let this fail silently.
> +
> + if (bitmap_empty(mxlbridge->portmap, MXL862XX_MAX_BRIDGE_PORTS))
> + mxl862xx_free_bridge(ds, mxlbridge);
> }
>
> static int mxl862xx_port_setup(struct dsa_switch *ds, int port)
> @@ -366,6 +614,262 @@ static void mxl862xx_phylink_get_caps(struct dsa_switch *ds, int port,
> config->supported_interfaces);
> }
>
> +static int mxl862xx_port_fdb_add(struct dsa_switch *ds, int port,
> + const unsigned char *addr, u16 vid, struct dsa_db db)
> +{
> + struct mxl862xx_mac_table_add param = { };
> + struct mxl862xx_priv *priv = ds->priv;
> + struct mxl862xx_bridge *mxlbridge;
> + u16 fid;
> + int ret;
> +
> + switch (db.type) {
> + case DSA_DB_PORT:
> + fid = priv->ports[db.dp->index].fid;
> + break;
> +
> + case DSA_DB_BRIDGE:
> + mxlbridge = mxl862xx_find_bridge(ds, db.bridge);
> + if (!mxlbridge)
> + return -ENOENT;
> + fid = mxlbridge->bridge_id;
> + break;
> +
> + default:
> + return -EOPNOTSUPP;
> + }
> +
> + param.port_id = cpu_to_le32(port);
> + param.fid = cpu_to_le16(fid);
> + param.static_entry = true;
> + param.tci = cpu_to_le16(vid & 0xFFF);
> + memcpy(param.mac, addr, ETH_ALEN);
ether_addr_copy() - similar comment for port_fdb_del()
> +
> + ret = MXL862XX_API_WRITE(priv, MXL862XX_MAC_TABLEENTRYADD, param);
> + if (ret)
> + dev_err(ds->dev, "failed to add FDB entry on port %d\n", port);
> +
> + return ret;
> +}
> +
> +static int mxl862xx_port_fdb_del(struct dsa_switch *ds, int port,
> + const unsigned char *addr, u16 vid, struct dsa_db db)
> +{
> + struct mxl862xx_mac_table_remove param = { };
> + struct mxl862xx_priv *priv = ds->priv;
> + struct mxl862xx_bridge *mxlbridge;
> + u16 fid;
> + int ret;
> +
> + switch (db.type) {
> + case DSA_DB_PORT:
> + fid = priv->ports[db.dp->index].fid;
> + break;
> +
> + case DSA_DB_BRIDGE:
> + /* Use multi-port bridge FID */
> + mxlbridge = mxl862xx_find_bridge(ds, db.bridge);
> + if (!mxlbridge)
> + return -ENOENT;
> + fid = mxlbridge->bridge_id;
> + break;
> +
> + default:
> + return -EOPNOTSUPP;
> + }
Please group this together with the FID selection from port_fdb_add()
into a single helper.
> +
> + param.fid = cpu_to_le16(fid);
> + param.tci = cpu_to_le16(vid & 0xFFF);
> + memcpy(param.mac, addr, ETH_ALEN);
> +
> + ret = MXL862XX_API_WRITE(priv, MXL862XX_MAC_TABLEENTRYREMOVE, param);
> + if (ret)
> + dev_err(ds->dev, "failed to remove FDB entry on port %d\n", port);
> +
> + return ret;
> +}
> +
> +static int mxl862xx_port_fdb_dump(struct dsa_switch *ds, int port,
> + dsa_fdb_dump_cb_t *cb, void *data)
> +{
> + struct mxl862xx_mac_table_read param = { };
> + struct mxl862xx_priv *priv = ds->priv;
> + u32 entry_port_id;
> + int ret;
> +
> + while (true) {
> + ret = MXL862XX_API_READ(priv, MXL862XX_MAC_TABLEENTRYREAD, param);
> + if (ret)
> + return ret;
> +
> + if (param.last)
> + break;
> +
> + entry_port_id = le32_to_cpu(param.port_id);
> +
> + if (entry_port_id == port)
> + cb(param.mac, param.tci & 0x0FFF,
> + param.static_entry, data);
Catch and propagate the error from the FDB dump callback. See commit
21b52fed928e ("net: dsa: sja1105: fix broken backpressure in
.port_fdb_dump").
> +
> + memset(¶m, 0, sizeof(param));
> + }
> +
> + return 0;
> +}
> +
> +static int mxl862xx_port_mdb_add(struct dsa_switch *ds, int port,
> + const struct switchdev_obj_port_mdb *mdb,
> + struct dsa_db db)
> +{
> + return mxl862xx_port_fdb_add(ds, port, mdb->addr, mdb->vid, db);
> +}
> +
> +static int mxl862xx_port_mdb_del(struct dsa_switch *ds, int port,
> + const struct switchdev_obj_port_mdb *mdb,
> + struct dsa_db db)
> +{
> + return mxl862xx_port_fdb_del(ds, port, mdb->addr, mdb->vid, db);
> +}
> +
> +static int mxl862xx_set_ageing_time(struct dsa_switch *ds, unsigned int msecs)
> +{
> + struct mxl862xx_cfg param;
> + int ret;
> +
> + ret = MXL862XX_API_READ(ds->priv, MXL862XX_COMMON_CFGGET, param);
> + if (ret) {
> + dev_err(ds->dev, "failed to read switch config\n");
> + return ret;
> + }
> +
> + param.mac_table_age_timer = cpu_to_le32(MXL862XX_AGETIMER_CUSTOM);
> + param.age_timer = cpu_to_le32(msecs / 1000);
> + ret = MXL862XX_API_WRITE(ds->priv, MXL862XX_COMMON_CFGSET, param);
> + if (ret)
> + dev_err(ds->dev, "failed to set ageing\n");
> +
> + return ret;
> +}
> +
> +static void mxl862xx_port_stp_state_set(struct dsa_switch *ds, int port,
> + u8 state)
> +{
> + struct mxl862xx_stp_port_cfg param = {
> + .port_id = cpu_to_le16(port),
> + };
> + struct mxl862xx_priv *priv = ds->priv;
> + int ret;
> +
> + switch (state) {
> + case BR_STATE_DISABLED:
> + param.port_state = MXL862XX_STP_PORT_STATE_DISABLE;
> + break;
> + case BR_STATE_BLOCKING:
> + case BR_STATE_LISTENING:
> + param.port_state = MXL862XX_STP_PORT_STATE_BLOCKING;
> + break;
> + case BR_STATE_LEARNING:
> + param.port_state = MXL862XX_STP_PORT_STATE_LEARNING;
> + break;
> + case BR_STATE_FORWARDING:
> + param.port_state = MXL862XX_STP_PORT_STATE_FORWARD;
> + break;
> + default:
> + dev_err(ds->dev, "invalid STP state: %d\n", state);
> + return;
> + }
> +
> + ret = MXL862XX_API_WRITE(priv, MXL862XX_STP_PORTCFGSET, param);
> + if (ret) {
> + dev_err(ds->dev, "failed to set STP state on port %d\n", port);
> + return;
> + }
> +
> + /* The firmware may re-enable MAC learning as a side-effect of
> + * entering LEARNING or FORWARDING state (per 802.1D defaults).
> + * Re-apply the driver's intended learning and metering config
> + * so that standalone ports keep learning disabled.
> + */
> + ret = mxl862xx_set_bridge_port(ds, port);
> + if (ret)
> + dev_err(ds->dev, "failed to reapply brport flags on port %d\n", port);
Do you need to also manually fast-age the port if p->learning == false? Packets
may be coming in as soon as you put the port in MXL862XX_STP_PORT_STATE_LEARNING
already, and they will end up in the FDB even if from Linux' perspective,
it had learning off all along. It is a race condition.
> +}
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark()
2026-03-09 8:07 ` Jonas Gorski
2026-03-09 12:23 ` Daniel Golle
@ 2026-03-09 23:33 ` Vladimir Oltean
1 sibling, 0 replies; 13+ messages in thread
From: Vladimir Oltean @ 2026-03-09 23:33 UTC (permalink / raw)
To: Jonas Gorski
Cc: Daniel Golle, Andrew Lunn, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Russell King, netdev,
linux-kernel, Frank Wunderlich, Chad Monroe, Cezary Wilmanski,
Liang Xu, Benny (Ying-Tsan) Weng, Jose Maria Verdu Munoz,
Avinash Jayaraman, John Crispin
On Mon, Mar 09, 2026 at 09:07:07AM +0100, Jonas Gorski wrote:
> For dynamic configuration you would probably need to then check the
> destination address, check if snooping or trapping is configured for
> it, and then set (not) mark offloaded accordingly. While linux allows
> you do dynamically configure some of the groups between
> flooding/trapping, I'm not sure if this is propagated via dsa or even
> switchdev.
>
> I suggest sticking to the default of trapping and not marking as
> offloaded. It's much easier to flood in software if needed than the
> other way round.
>
> Best regards,
> Jonas
+1, good comments, thanks.
The group_fwd_mask isn't offloaded to switchdev.
^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2026-03-09 23:33 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-07 3:29 [PATCH net-next 0/2] net: dsa: mxl862xx: add support for bridge offloading Daniel Golle
2026-03-07 3:30 ` [PATCH net-next 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Daniel Golle
2026-03-07 9:57 ` Jonas Gorski
2026-03-08 15:18 ` Daniel Golle
2026-03-08 20:15 ` Jonas Gorski
2026-03-09 0:02 ` Daniel Golle
2026-03-09 8:07 ` Jonas Gorski
2026-03-09 12:23 ` Daniel Golle
2026-03-09 23:33 ` Vladimir Oltean
2026-03-07 3:31 ` [PATCH net-next 2/2] net: dsa: mxl862xx: implement bridge offloading Daniel Golle
2026-03-09 23:22 ` Jakub Kicinski
2026-03-09 23:27 ` Vladimir Oltean
2026-03-07 3:39 ` [PATCH net-next 0/2] net: dsa: mxl862xx: add support for " Daniel Golle
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox