Commit 3068d466 authored by Vladimir Oltean's avatar Vladimir Oltean Committed by David S. Miller

net: dsa: sync static FDB entries on foreign interfaces to hardware

DSA is able to install FDB entries towards the CPU port for addresses
which were dynamically learnt by the software bridge on foreign
interfaces that are in the same bridge with a DSA switch interface.
Since this behavior is opportunistic, it is guarded by the
"assisted_learning_on_cpu_port" property which can be enabled by drivers
and is not done automatically (since certain switches may support
address learning of packets coming from the CPU port).

But if those FDB entries added on the foreign interfaces are static
(added by the user) instead of dynamically learnt, currently DSA does
not do anything (and arguably it should).

Because static FDB entries are not supposed to move on their own, there
is no downside in reusing the "assisted_learning_on_cpu_port" logic to
sync static FDB entries to the DSA CPU port unconditionally, even if
assisted_learning_on_cpu_port is not requested by the driver.

For example, this situation:

   br0
   / \
swp0 dummy0

$ bridge fdb add 02:00:de:ad:00:01 dev dummy0 vlan 1 master static

Results in DSA adding an entry in the hardware FDB, pointing this
address towards the CPU port.

The same is true for entries added to the bridge itself, e.g:

$ bridge fdb add 02:00:de:ad:00:01 dev br0 vlan 1 self local

(except that right now, DSA still ignores 'local' FDB entries, this will
be changed in a later patch)
Signed-off-by: default avatarTobias Waldekranz <tobias@waldekranz.com>
Signed-off-by: default avatarVladimir Oltean <vladimir.oltean@nxp.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 26ee7b06
...@@ -2403,9 +2403,12 @@ static int dsa_slave_switchdev_event(struct notifier_block *unused, ...@@ -2403,9 +2403,12 @@ static int dsa_slave_switchdev_event(struct notifier_block *unused,
dp = dsa_slave_to_port(dev); dp = dsa_slave_to_port(dev);
} else { } else {
/* Snoop addresses learnt on foreign interfaces /* Snoop addresses added to foreign interfaces
* bridged with us, for switches that don't * bridged with us, or the bridge
* automatically learn SA from CPU-injected traffic * itself. Dynamically learned addresses can
* also be added for switches that don't
* automatically learn SA from CPU-injected
* traffic.
*/ */
struct net_device *br_dev; struct net_device *br_dev;
struct dsa_slave_priv *p; struct dsa_slave_priv *p;
...@@ -2424,7 +2427,8 @@ static int dsa_slave_switchdev_event(struct notifier_block *unused, ...@@ -2424,7 +2427,8 @@ static int dsa_slave_switchdev_event(struct notifier_block *unused,
dp = p->dp; dp = p->dp;
host_addr = true; host_addr = true;
if (!dp->ds->assisted_learning_on_cpu_port) if (!fdb_info->added_by_user &&
!dp->ds->assisted_learning_on_cpu_port)
return NOTIFY_DONE; return NOTIFY_DONE;
/* When the bridge learns an address on an offloaded /* When the bridge learns an address on an offloaded
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment