Received: by 2002:a05:6a10:83d0:0:0:0:0 with SMTP id o16csp42626pxh; Thu, 7 Apr 2022 13:25:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw3+lUZ9PdhmTqaYSMY4GeduJge7KUdUeVtUKj3EkFktxB7EAvJUQdfHL+CEK33NK0v5EvH X-Received: by 2002:a63:8642:0:b0:398:9593:78b0 with SMTP id x63-20020a638642000000b00398959378b0mr12526381pgd.115.1649363114079; Thu, 07 Apr 2022 13:25:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649363114; cv=none; d=google.com; s=arc-20160816; b=tmplQWoro3/Wy+8khWvep10V8mQ98z7hU3Y/6AK/RWhkCEd1fIZ/4xwXariN1KhvIh B7IpFfNtT8b1QLabCOY17zGyNrLWH+EUmdCfQ9kpIoyBd3WMJBhYDSNo4d9DThw6j2vb y1Nf3+q5iPtHq3y7xPrp5tvsJmvQXuZYv1n4Q5MVrQYDC4QDdvJYwSn5O8Wy430c291l 7dROa2Nat/7snlkPizzSzW2wMmakaIGsvV2zzU3vi3M2ywT5ZknrNx6k2Lgd6TOZKTFL 9EWqzkl9ODnYtxzBbIQda1GuX3VmWHzT94eNx/0S1fvF2zVWtiO1kLUbYjtbX+r+xcRg R54A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:subject :from:references:cc:to:content-language:user-agent:mime-version:date :message-id:dkim-signature; bh=Hvq6027FtH85ONmGKsGW1jwR/CsjyO2CZL/2p3kxloI=; b=y0ck+15vjByPEWM3QgRp2bOzU+Y0uiKY4Y96wKTXDOR5SV6h54c/XLSGptiu38cDNw xODBl3DzIjtwx1QvLOcuVBO9UX6jy1MRqQMD62vn/L6uQe6naiu7DDULjVpk7+H+nHg0 04aZlGKz7s44XcbPLUD45ewBvXLXa3K3IhQZCF6DxWQ9pxyfBQCTFTyLuL58yIxQe5I7 oc0g7K8rCXWKNCldNOqAUYiQywvdERYHHUOa6n+e7e9C1wVnO2/K3KpC/+9ubzGe6VtC kTNB5il1wsVYdUQ+O+9d1VeoqOq5SuOfkBZCnXXgXXAys3JWHBUkYCRwbGnRo5YAZEXZ X5MA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@nbd.name header.s=20160729 header.b=oiOmswb2; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id y5-20020a056a00180500b004e1a25384f6si21530316pfa.3.2022.04.07.13.25.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Apr 2022 13:25:14 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=fail header.i=@nbd.name header.s=20160729 header.b=oiOmswb2; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id E920834B615; Thu, 7 Apr 2022 12:40:20 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346847AbiDGSYJ (ORCPT + 99 others); Thu, 7 Apr 2022 14:24:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346829AbiDGSX5 (ORCPT ); Thu, 7 Apr 2022 14:23:57 -0400 Received: from nbd.name (nbd.name [IPv6:2a01:4f8:221:3d45::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1DAB62300B1; Thu, 7 Apr 2022 11:21:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=nbd.name; s=20160729; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject: From:References:Cc:To:MIME-Version:Date:Message-ID:Sender:Reply-To:Content-ID :Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To: Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe :List-Post:List-Owner:List-Archive; bh=Hvq6027FtH85ONmGKsGW1jwR/CsjyO2CZL/2p3kxloI=; b=oiOmswb2ZQV2kPHfKsrQwQusYL YvlxFnePJ6hL7paJ21qL8S+Bcc/Cg330046WFp6soxyXX9tNz/re1oJ0FBbcvkTIZ4H6Zsau8oliG Nck5tv0dQH9/i8p9OCtfiLNFJQN3yWC1ty+LYIy8w7Yd4Vtx7omrBAcIWemRPsV2ky5s=; Received: from p200300daa70ef200411eb61494300c34.dip0.t-ipconnect.de ([2003:da:a70e:f200:411e:b614:9430:c34] helo=nf.local) by ds12 with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.89) (envelope-from ) id 1ncWlM-0001Zd-DW; Thu, 07 Apr 2022 20:21:44 +0200 Message-ID: Date: Thu, 7 Apr 2022 20:21:43 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 Content-Language: en-US To: Andrew Lunn Cc: netdev@vger.kernel.org, John Crispin , Sean Wang , Mark Lee , "David S. Miller" , Jakub Kicinski , Paolo Abeni , Matthias Brugger , linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, linux-kernel@vger.kernel.org References: <20220405195755.10817-1-nbd@nbd.name> <20220405195755.10817-15-nbd@nbd.name> From: Felix Fietkau Subject: Re: [PATCH v2 14/14] net: ethernet: mtk_eth_soc: support creating mac address based offload entries In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07.04.22 20:10, Andrew Lunn wrote: > On Tue, Apr 05, 2022 at 09:57:55PM +0200, Felix Fietkau wrote: >> This will be used to implement a limited form of bridge offloading. >> Since the hardware does not support flow table entries with just source >> and destination MAC address, the driver has to emulate it. >> >> The hardware automatically creates entries entries for incoming flows, even >> when they are bridged instead of routed, and reports when packets for these >> flows have reached the minimum PPS rate for offloading. >> >> After this happens, we look up the L2 flow offload entry based on the MAC >> header and fill in the output routing information in the flow table. >> The dynamically created per-flow entries are automatically removed when >> either the hardware flowtable entry expires, is replaced, or if the offload >> rule they belong to is removed > >> + >> + if (found) >> + goto out; >> + >> + eh = eth_hdr(skb); >> + ether_addr_copy(key.dest_mac, eh->h_dest); >> + ether_addr_copy(key.src_mac, eh->h_source); >> + tag = skb->data - 2; >> + key.vlan = 0; >> + switch (skb->protocol) { >> +#if IS_ENABLED(CONFIG_NET_DSA) >> + case htons(ETH_P_XDSA): >> + if (!netdev_uses_dsa(skb->dev) || >> + skb->dev->dsa_ptr->tag_ops->proto != DSA_TAG_PROTO_MTK) >> + goto out; >> + >> + tag += 4; >> + if (get_unaligned_be16(tag) != ETH_P_8021Q) >> + break; >> + >> + fallthrough; >> +#endif >> + case htons(ETH_P_8021Q): >> + key.vlan = get_unaligned_be16(tag + 2) & VLAN_VID_MASK; >> + break; >> + default: >> + break; >> + } > > I'm trying to understand the architecture here. > > We have an Ethernet interface and a Wireless interface. The slow path > is that frames ingress from one of these interfaces, Linux decides > what to do with them, either L2 or L3, and they then egress probably > out the other interface. > > The hardware will look at the frames and try to spot flows? It will > then report any it finds. You can then add an offload, telling it for > a flow it needs to perform L2 or L3 processing, and egress out a > specific port? Linux then no longer sees the frame, the hardware > handles it, until the flow times out? Yes, the hw handles it until either the flow times out, or the corresponding offload entry is removed. For OpenWrt I also wrote a daemon that uses tc classifier BPF to accelerate the software bridge and create hardware offload entries as well via hardware TC flower rules: https://github.com/nbd168/bridger It works in combination with these changes. > So i'm wondering what is going on here. So is this a frame which has > ingressed, either from the WiFi, or another switch port, gone to the > software bridge, bridges to a DSA slave interface, the DSA tagger has > added a tag and now it is in the master interface? Can you accelerate > such frames? What is adding the DSA tag on the fast path? And in the > opposite direction, frames which egress the switch which have a DSA > tag and are heading to the WiFi, what is removing the tag? Does the > accelerator also understand the tag and know what to do with it?WiFi -> Ethernet is not supported by MT7622, but will be added for newer SoCs like MT7986. The PPE supports both parsing and inserting MT7530 compatible DSA tags. For Ethernet->WiFi flows, the PPE will also add required metadata that is parsed by the MT7915 WiFi Firmware in order to figure out what vif/station the packets were meant for. - Felix