Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7529166ybi; Thu, 1 Aug 2019 09:31:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqxe8fhN0URCR2slqtWGnuWEUvS12m+JUWBY5EjUr/PZ9qlMS+J6MQl7juCdG0vJhN+CyP6Q X-Received: by 2002:a17:90a:9301:: with SMTP id p1mr9599497pjo.22.1564677066142; Thu, 01 Aug 2019 09:31:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564677066; cv=none; d=google.com; s=arc-20160816; b=cV4mzXLP5CE9n9Zzl3Pe5tFPUMjdGyZsIeTTGL7wXONTvaEZrxIMwNzpX7nMmWenh2 1pam7Viwl8wkLbKffDODC0HxwzgyNbRFVnDr8DRBACWkjdn42x5JSqL96qPex5GApGee j15IeG7nxNW9K5uD9lWd4Vvr9br/3wdULv0nWt/if/dFbC1g6I+RUVo1fPKiIyeODpWm d+QrWBMq481bRp9kCg+W2cUGa778gSs+PwlL66v5jxGzZ4esBB5L6gmyShOZFHUFj6yq 7NSXG6pZ6HFFqnUrOD9wL6PUzf1Sb63aigZw6PUKxjpPFizl/4hibmf9gLHCY+uVkrLm ALfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr; bh=5do7RG4u2/krUOzqpjhhVDu1pzPwC4+A0cHEvl9et+o=; b=BjMF/tcCXPqyozgsPNgUz0Ht9/Qe6+f3jukvnsm5dRCKxixakTWyabctqzlD9zURKr tCKvV2T+oaYN7ZMhe0VJQ2zWgBLY2vX9syqC8KXlqE8DHaMOSErU9id3gCq4bQ4Ba4P5 qwrRaESZPpMeSymweeqYTFMAs9UbuyX2XKqeKAO+Uv7H3xeDW/P96pLh6B1J3VcLlG1A NX/wmvdPkEgXjI55jR0r+QTCxUgZJs15hBP6LWUFFjT4RfxLzY9M8Qi4FcysYMRJYusr hhZOaI6hFnyfyc+DYEBzSeIYT2Zmc5h+3V7/pKuU46fRgggH5+TAbBFn/33CaEPnIu+h CpRg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=microchip.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t63si34329893pfb.5.2019.08.01.09.30.50; Thu, 01 Aug 2019 09:31:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731966AbfHAOXH (ORCPT + 99 others); Thu, 1 Aug 2019 10:23:07 -0400 Received: from esa2.microchip.iphmx.com ([68.232.149.84]:39453 "EHLO esa2.microchip.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728129AbfHAOXG (ORCPT ); Thu, 1 Aug 2019 10:23:06 -0400 Received-SPF: Pass (esa2.microchip.iphmx.com: domain of Allan.Nielsen@microchip.com designates 198.175.253.82 as permitted sender) identity=mailfrom; client-ip=198.175.253.82; receiver=esa2.microchip.iphmx.com; envelope-from="Allan.Nielsen@microchip.com"; x-sender="Allan.Nielsen@microchip.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 mx a:ushub1.microchip.com a:smtpout.microchip.com a:mx1.microchip.iphmx.com a:mx2.microchip.iphmx.com include:servers.mcsv.net include:mktomail.com include:spf.protection.outlook.com ~all" Received-SPF: None (esa2.microchip.iphmx.com: no sender authenticity information available from domain of postmaster@email.microchip.com) identity=helo; client-ip=198.175.253.82; receiver=esa2.microchip.iphmx.com; envelope-from="Allan.Nielsen@microchip.com"; x-sender="postmaster@email.microchip.com"; x-conformance=spf_only Authentication-Results: esa2.microchip.iphmx.com; dkim=none (message not signed) header.i=none; spf=Pass smtp.mailfrom=Allan.Nielsen@microchip.com; spf=None smtp.helo=postmaster@email.microchip.com; dmarc=pass (p=none dis=none) d=microchip.com IronPort-SDR: qCQXWl0rF2TIuwU6rbtaA9K+cKeas9+r9q3FdUTb3SSRIKiCemqChIfNR/7wklaOPSvlQlZikL tuqP1+P29ChGmjdJHZVfaILoOLr1wb/ZlvpdErjbvq95T4F9+UJ3v8yCIxf8PyRr9xHXvohQah Z9hOyZp7KK7uTGxvbT4WZWMJKanykIAJsja4SSTGN6ChizfULt3LUP3pP64Ogi0OfHaPxnv0vr uBH/7KoEsXMPvZq8/eT04XEiOREQovMb27iNBKupNRc8xSZpCnzPBiurT7370iBenbXc+pWVgO f0w= X-IronPort-AV: E=Sophos;i="5.64,334,1559545200"; d="scan'208";a="43579779" Received: from smtpout.microchip.com (HELO email.microchip.com) ([198.175.253.82]) by esa2.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 01 Aug 2019 07:23:05 -0700 Received: from chn-vm-ex02.mchp-main.com (10.10.87.72) by chn-vm-ex02.mchp-main.com (10.10.87.72) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Thu, 1 Aug 2019 07:22:54 -0700 Received: from localhost (10.10.85.251) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server id 15.1.1713.5 via Frontend Transport; Thu, 1 Aug 2019 07:22:54 -0700 Date: Thu, 1 Aug 2019 16:22:53 +0200 From: "Allan W. Nielsen" To: Nikolay Aleksandrov CC: Horatiu Vultur , , , , , Subject: Re: [PATCH] net: bridge: Allow bridge to joing multicast groups Message-ID: <20190801142252.pdzd6knl2ytuty7h@lx-anielsen.microsemi.net> References: <1564055044-27593-1-git-send-email-horatiu.vultur@microchip.com> <7e7a7015-6072-d884-b2ba-0a51177245ab@cumulusnetworks.com> <20190725142101.65tusauc6fzxb2yp@soft-dev3.microsemi.net> <20190726120214.c26oj5vks7g5ntwu@soft-dev3.microsemi.net> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The 07/26/2019 15:31, Nikolay Aleksandrov wrote: ... > You know that in order to not run in promisc mode you'll have to disable > port flooding and port learning, right ? Otherwise they're always put in promisc. Yes, we have spend some time looking at nbp_update_port_count and trying to understand the reasoning behind it. Our understanding is that this is to make it work with a pure SW bridge implementation, and this is actually an optimization to allow disable promisc mode if all forwarding is static (no flooding and no learning). We also noticed that the Ocelot and the Rocker drivers avoids this "issue" by not implementing promisc mode. But promisc mode is a really nice feature for debugging, and we would actually like to have it, and when HW that can do learning/flooding it does not seem to be necessary. I tried to understand how this is handled in the Mellanox drivers, but gave up. Too big, and we lack the insight in their design. Do you know if there are better ways to prevent switchdev-offloaded-slave interfaces to go to promisc mode? /Allan