[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170907004308.GA30089@lunn.ch>
Date: Thu, 7 Sep 2017 02:43:08 +0200
From: Andrew Lunn <andrew@...n.ch>
To: Woojung.Huh@...rochip.com
Cc: f.fainelli@...il.com, roopa@...ulusnetworks.com,
netdev@...r.kernel.org, vivien.didelot@...oirfairelinux.com,
jbe@...gutronix.de, sean.wang@...iatek.com, john@...ozen.org
Subject: Re: [PATCH v2 rfc 0/8] IGMP snooping for local traffic
On Wed, Sep 06, 2017 at 11:44:47PM +0000, Woojung.Huh@...rochip.com wrote:
> > That being said, I have a feeling that the Marvell switches behave a
> > tiny bit differently than others in that they do not flood broadcast by
> > default in a given L2 domain.
> Florian,
>
> Because some DSA switches from Marvell & Microchip can do IGMP snooping,
> can we propose switch layer another flag what to do when HW support it?
Hi Woojung
I expect all the current DSA devices should be able to do IGMP
snooping, with some modifications.
Two things are required:
1) The .port_mdb_prepare, .port_mdb_add and .port_mdb_del ops, so that
mdb entries can be added. As you said, only Marvell and Microchip
support these, but i expect the other switch can do this, it just
needs implementing.
2) The switch needs to identify and forward IGMP packets to the host,
even when they would normally be blocked.
And for the implementation, i don't think it actually matters. For
switches which don't implement the port_mdb operations, IGMP packets
will get forwarded to the software bridge. It will attempt to put in
an mdb, but the request will come back with EOPNOTSUPP. The switch
should continue to flood multicast out all ports. No harm done.
Andrew
Powered by blists - more mailing lists