Commit 6ef4f409 authored by David S. Miller's avatar David S. Miller

Merge branch 'dsa-doc-fixups'

Vladimir Oltean says:

====================
DSA/switchdev documentation fixups

These are some small fixups after the recently merged documentation
update.
====================
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parents f1656942 0929ff71
...@@ -464,6 +464,7 @@ For each devlink device, every physical port (i.e. user ports, CPU ports, DSA ...@@ -464,6 +464,7 @@ For each devlink device, every physical port (i.e. user ports, CPU ports, DSA
links or unused ports) is exposed as a devlink port. links or unused ports) is exposed as a devlink port.
DSA drivers can make use of the following devlink features: DSA drivers can make use of the following devlink features:
- Regions: debugging feature which allows user space to dump driver-defined - Regions: debugging feature which allows user space to dump driver-defined
areas of hardware information in a low-level, binary format. Both global areas of hardware information in a low-level, binary format. Both global
regions as well as per-port regions are supported. It is possible to export regions as well as per-port regions are supported. It is possible to export
......
...@@ -479,6 +479,7 @@ is not possible. ...@@ -479,6 +479,7 @@ is not possible.
be added to a second bridge, which includes other switch ports or software be added to a second bridge, which includes other switch ports or software
interfaces. Some approaches to ensure that the forwarding domain for traffic interfaces. Some approaches to ensure that the forwarding domain for traffic
belonging to the VLAN upper interfaces are managed properly: belonging to the VLAN upper interfaces are managed properly:
* If forwarding destinations can be managed per VLAN, the hardware could be * If forwarding destinations can be managed per VLAN, the hardware could be
configured to map all traffic, except the packets tagged with a VID configured to map all traffic, except the packets tagged with a VID
belonging to a VLAN upper interface, to an internal VID corresponding to belonging to a VLAN upper interface, to an internal VID corresponding to
...@@ -522,7 +523,7 @@ as untagged packets, since the bridge device does not allow the manipulation of ...@@ -522,7 +523,7 @@ as untagged packets, since the bridge device does not allow the manipulation of
VID 0 in its database. VID 0 in its database.
When the bridge has VLAN filtering enabled and a PVID is not configured on the When the bridge has VLAN filtering enabled and a PVID is not configured on the
ingress port, untagged 802.1p tagged packets must be dropped. When the bridge ingress port, untagged and 802.1p tagged packets must be dropped. When the bridge
has VLAN filtering enabled and a PVID exists on the ingress port, untagged and has VLAN filtering enabled and a PVID exists on the ingress port, untagged and
priority-tagged packets must be accepted and forwarded according to the priority-tagged packets must be accepted and forwarded according to the
bridge's port membership of the PVID VLAN. When the bridge has VLAN filtering bridge's port membership of the PVID VLAN. When the bridge has VLAN filtering
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment