From: Vladimir Oltean <olteanv@gmail.com>
To: Florian Fainelli <f.fainelli@gmail.com>
Cc: Andrew Lunn <andrew@lunn.ch>,
Vivien Didelot <vivien.didelot@gmail.com>,
"David S. Miller" <davem@davemloft.net>,
netdev <netdev@vger.kernel.org>
Subject: Re: [RFC PATCH net-next] net: dsa: tag_8021q: Allow DSA tags and VLAN filtering simultaneously
Date: Thu, 21 Nov 2019 12:29:44 +0200 [thread overview]
Message-ID: <CA+h21hpWXj9bFHg4sec2=8KEaXJ2sN4pvyftL4muBCEwrCzEDQ@mail.gmail.com> (raw)
In-Reply-To: <78f47c04-0758-50f6-ad59-2893849e7dea@gmail.com>
On Mon, 18 Nov 2019 at 06:30, Florian Fainelli <f.fainelli@gmail.com> wrote:
>
> On 11/17/2019 1:14 PM, Vladimir Oltean wrote:
> [snip]
>
> > +best_effort_vlan_filtering
[snip]
> > + - Cannot terminate VLAN-tagged traffic on local device.
> > + There is no way to deduce the source port from these.
> > + One could still use the DSA master though.
>
> Could we use QinQ to possibly solve these problems and would that work
> for your switch? I do not really mind being restricted to not being able
> to change the default_pvid or have a reduced VLAN range, but being able
> to test VLAN tags terminated on DSA slave network devices is a valuable
> thing to do.
> --
> Florian
I took another look at the hardware manual and there exists a feature
called the Retagging Table whose purpose I did not understand
originally. It can do classification on frames with a given { ingress
port mask, egress port mask, vlan id }, and clone them towards a given
list of destination ports with a new VID. The table only has space for
32 entries though. I think I can use it to keep the CPU copied to all
non-pvid VLANs received on the front-panel ports. The CPU will still
see a pvid-tagged frame for each of those, but with the PCP from the
original frame. The result is that VLAN filtering is still performed
correctly (non-member VIDs of the front-panel ports are dropped), but
the tag is consumed by DSA and sockets still see those frames as
untagged. To me that's fine except for the fact that the CPU will now
be spammed by offloaded flows even if the switch learns the
destination to be a front-panel. Just wanted to hear your opinion
before attempting to prototype this.
Thanks,
-Vladimir
next prev parent reply other threads:[~2019-11-21 10:30 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-11-17 21:14 [RFC PATCH net-next] net: dsa: tag_8021q: Allow DSA tags and VLAN filtering simultaneously Vladimir Oltean
2019-11-18 4:30 ` Florian Fainelli
2019-11-18 11:01 ` Vladimir Oltean
2019-11-21 10:29 ` Vladimir Oltean [this message]
2019-11-21 17:37 ` Florian Fainelli
2019-11-21 18:07 ` Vladimir Oltean
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CA+h21hpWXj9bFHg4sec2=8KEaXJ2sN4pvyftL4muBCEwrCzEDQ@mail.gmail.com' \
--to=olteanv@gmail.com \
--cc=andrew@lunn.ch \
--cc=davem@davemloft.net \
--cc=f.fainelli@gmail.com \
--cc=netdev@vger.kernel.org \
--cc=vivien.didelot@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).