• Vladimir Oltean's avatar
    net: dsa: manage flooding on the CPU ports · 7569459a
    Vladimir Oltean authored
    DSA can treat IFF_PROMISC and IFF_ALLMULTI on standalone user ports as
    signifying whether packets with an unknown MAC DA will be received or
    not. Since known MAC DAs are handled by FDB/MDB entries, this means that
    promiscuity is analogous to including/excluding the CPU port from the
    flood domain of those packets.
    
    There are two ways to signal CPU flooding to drivers.
    
    The first (chosen here) is to synthesize a call to
    ds->ops->port_bridge_flags() for the CPU port, with a mask of
    BR_FLOOD | BR_MCAST_FLOOD. This has the effect of turning on egress
    flooding on the CPU port regardless of source.
    
    The alternative would be to create a new ds->ops->port_host_flood()
    which is called per user port. Some switches (sja1105) have a flood
    domain that is managed per {ingress port, egress port} pair, so it would
    make more sense for this kind of switch to not flood the CPU from port A
    if just port B requires it. Nonetheless, the sja1105 has other quirks
    that prevent it from making use of unicast filtering, and without a
    concrete user making use of this feature, I chose not to implement it.
    Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
    Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
    7569459a
slave.c 69.8 KB