From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 35803C47255 for ; Mon, 11 May 2020 11:39:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0E4A320708 for ; Mon, 11 May 2020 11:39:00 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=armlinux.org.uk header.i=@armlinux.org.uk header.b="LC54BPGk" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729563AbgEKLjA (ORCPT ); Mon, 11 May 2020 07:39:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40902 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1727873AbgEKLi7 (ORCPT ); Mon, 11 May 2020 07:38:59 -0400 Received: from pandora.armlinux.org.uk (pandora.armlinux.org.uk [IPv6:2001:4d48:ad52:3201:214:fdff:fe10:1be6]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 08414C061A0C; Mon, 11 May 2020 04:38:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=armlinux.org.uk; s=pandora-2019; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=xeljQMsnW7Lnk6+iGt4XV00n22AvM7OMoQv1bQ9vBwU=; b=LC54BPGkN+lmC592opzE3XNq2 Kk4ZBZxCBDmkduYaIPpSn+6+LFRw9R97gVHqUlXEMpNbZbgbxmv4xhPyK8NeO7gK/texY64B2Qzke ST9e6puwhvKOioxE2TYKca7H4oJ/2/QcY2y3IyuQAO69UOm/dXKS6/qw8knreCxcW0kzwobC3L109 yvv3EyF8eXe0evb3Omug/f+GjIcv8eLWQAlR2gDCDM/Xo84e4E7vePQ+q45Z5XVUDIvLfp+FZZCX/ IfpKWaCHhjCtGdyNmBKqgwn9iaHosXrGo9laEeJ85fpSj5PgeQvZroov1aIdVdLSQFBmvLMF/DxZB 0o0qU7HEw==; Received: from shell.armlinux.org.uk ([2001:4d48:ad52:3201:5054:ff:fe00:4ec]:38872) by pandora.armlinux.org.uk with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jY6ln-00064P-Fo; Mon, 11 May 2020 12:38:51 +0100 Received: from linux by shell.armlinux.org.uk with local (Exim 4.92) (envelope-from ) id 1jY6lm-0005dF-Fw; Mon, 11 May 2020 12:38:50 +0100 Date: Mon, 11 May 2020 12:38:50 +0100 From: Russell King - ARM Linux admin To: Vladimir Oltean Cc: andrew@lunn.ch, f.fainelli@gmail.com, vivien.didelot@gmail.com, davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH net-next 01/15] net: dsa: provide an option for drivers to always receive bridge VLANs Message-ID: <20200511113850.GQ1551@shell.armlinux.org.uk> References: <20200510164255.19322-1-olteanv@gmail.com> <20200510164255.19322-2-olteanv@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200510164255.19322-2-olteanv@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, May 10, 2020 at 07:42:41PM +0300, Vladimir Oltean wrote: > From: Russell King > > DSA assumes that a bridge which has vlan filtering disabled is not > vlan aware, and ignores all vlan configuration. However, the kernel > software bridge code allows configuration in this state. > > This causes the kernel's idea of the bridge vlan state and the > hardware state to disagree, so "bridge vlan show" indicates a correct > configuration but the hardware lacks all configuration. Even worse, > enabling vlan filtering on a DSA bridge immediately blocks all traffic > which, given the output of "bridge vlan show", is very confusing. > > Provide an option that drivers can set to indicate they want to receive > vlan configuration even when vlan filtering is disabled. At the very > least, this is safe for Marvell DSA bridges, which do not look up > ingress traffic in the VTU if the port is in 8021Q disabled state. It is > also safe for the Ocelot switch family. Whether this change is suitable > for all DSA bridges is not known. > > Signed-off-by: Russell King > Signed-off-by: Vladimir Oltean This patch was NAK'd because of objections to the "vlan_bridge_vtu" name. Unfortunately, this means that the bug for Marvell switches remains unfixed to this day. -- RMK's Patch system: https://www.armlinux.org.uk/developer/patches/ FTTC broadband for 0.8mile line in suburbia: sync at 10.2Mbps down 587kbps up