Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp7137531pxv; Fri, 30 Jul 2021 10:55:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVqGmFeQg2jZrwIJb4i8XjeTgv4MFv4yZEwH3j4xfenPM+ixfSnh4bQ4T6mbxB43kTKJVd X-Received: by 2002:a17:906:ed1:: with SMTP id u17mr3644579eji.304.1627667713034; Fri, 30 Jul 2021 10:55:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627667713; cv=none; d=google.com; s=arc-20160816; b=WDpo5rUu8K0jm+yYtSmKdJIPerP/fni/a05Pujn+MN3cIR3ObSNPiIF1yqADmhxBL/ EbcXHip/o5WJu0ZV8xf0Gl7KWzopTitch4qODAuzvv53fS3e95pnMXefzXt1TliOlXpP QBPc+ubHEOK5yMUDlqj9PhTjoBwY/CtR62owlGo1ccPw9IPB6zGtwsJ5DQIhn0INtM6U tWkAjAzR9LCatLI7IhTbmFblcovR1cGbKibLsTLw98bI94mextpcG2lqGOj39Q8RLLPq fDCNSzsbkBb9l2dpY5riJs8hIgWz7qkMocKlfJoiB/q9EbPFrTZtgMknsJp6Lob2kDst 4hbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-disposition :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sAh2TyVPupc4SlO/7+ZRZndIoKJA5QlMvjRl7Cc62vo=; b=cK6mMOKJmJGY4r2jEdDCGs8AqVkwux5AZraqg7JQNYLbKiZjyp7g34irBbrRbjkas7 GuhAjziL2uNNbeKhUzalmNtshXmYueDF8h+lzaamLZz/nT/2VKQFxvMaIbycBZ3j/fnA zOnMJSI6GG0ox5E+auLLXfHxJGXahMMNf82CFx/6PeZ3SxTmTbW4ylHkp6ncfHeOaGpT OUvqlx+x39lLkPR++rVZmcFf2XDkohE5c0fo2Y3orYzFaZI9uyTh9g2IxIVnFuwCib5s Mshf7noav9xVz6gLo7oOOYz3ZMRFw1Hob3UWzKT4QbgovJYAxmCsFnN7cV+m2KpFmyNr ZQ5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=vZaWUIG9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o13si2297380eje.67.2021.07.30.10.54.48; Fri, 30 Jul 2021 10:55:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=vZaWUIG9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230117AbhG3Rvz (ORCPT + 99 others); Fri, 30 Jul 2021 13:51:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38370 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229921AbhG3Rvy (ORCPT ); Fri, 30 Jul 2021 13:51:54 -0400 Received: from mail-il1-x129.google.com (mail-il1-x129.google.com [IPv6:2607:f8b0:4864:20::129]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 92912C06175F; Fri, 30 Jul 2021 10:51:48 -0700 (PDT) Received: by mail-il1-x129.google.com with SMTP id q18so10236797ile.9; Fri, 30 Jul 2021 10:51:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-disposition:content-transfer-encoding; bh=sAh2TyVPupc4SlO/7+ZRZndIoKJA5QlMvjRl7Cc62vo=; b=vZaWUIG9YhzoHq/DrESu1sNvIu/+WtI93Ev4/7u26zHEJwAkhM9T/x0vyZhjWIEfpW drknizjaupZUrwoTTO5eXxZKB+MduPyzoZ2+qul0opbUSFMl0STzKHlp72bIb5YbBGUa mU35xosjPM3VJA6kzSqxJX+PLQMfiYWSolg5DKrAWvqWhRPG+nUea+PEnyggSofkrKLZ S3GCYrkb1UeGgCfiGO/6zPnZmDnREVbMY1H5VmYfTR2qG0FS4AU98lkDnGt/WYXbWlcT vVX500xSOkVAUUoAKm2q/tZJHqyPTlTGxGWgUzJNHLjOkY/j+ZivlXUotWvw4LmauAVZ 4GGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-disposition :content-transfer-encoding; bh=sAh2TyVPupc4SlO/7+ZRZndIoKJA5QlMvjRl7Cc62vo=; b=np+Man5lgTn60jHl7RrOclJH84oao4i1l+2DPKDHsUrRgQHm+r/ARuUsWJnjnY7EcP sCNKLDzsqGcZ/vyacHAZ2fWcP4hRoK3aZTdW3XY5JDSIpwgNVH41STbfO9s4p2GGdM4y I4C5JFK7+tJuofa7n67jOKJBL5gDXoxmIaUf3j/tyHlodXRYDr8C6MsML2ui8juG7yuc m3R+Dv7HNH1S8WsV6N4QWDo649/At9TMPOKbC48HBPd4+NJGI/Tz4Vf+hZ3PZm1X+8K6 5/lCRnkXvP1Cs0iA6AWLiPVHFvLFbaVtUGWJxZuX05srJrxj9hH3YIDZmivfg4u1wXCF SEsQ== X-Gm-Message-State: AOAM532MGy5ElOmIpshh60nHl03rSUf7LfBCkfqsEBMCzEdft25fP6E7 GmxRPB3vBM6+YJ20AlDb5u4= X-Received: by 2002:a92:bf11:: with SMTP id z17mr1793894ilh.3.1627667508071; Fri, 30 Jul 2021 10:51:48 -0700 (PDT) Received: from haswell-ubuntu20.lan ([138.197.212.246]) by smtp.gmail.com with ESMTPSA id t11sm1427256ioc.4.2021.07.30.10.51.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jul 2021 10:51:47 -0700 (PDT) From: DENG Qingfang To: Vladimir Oltean Cc: Sean Wang , Landen Chao , Andrew Lunn , Vivien Didelot , Florian Fainelli , "David S. Miller" , Jakub Kicinski , Matthias Brugger , netdev , Linux ARM , "moderated list:ARM/Mediatek SoC support" , linux-kernel Subject: Re: [RFC net-next 2/2] net: dsa: mt7530: trap packets from standalone ports to the CPU Date: Sat, 31 Jul 2021 01:51:39 +0800 Message-Id: <20210730175139.518992-1-dqfext@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210730173511.ulsv7wfogk5cpx5j@skbuf> References: <20210728175327.1150120-1-dqfext@gmail.com> <20210728175327.1150120-3-dqfext@gmail.com> <20210729152805.o2pur7pp2kpxvvnq@skbuf> <20210729165027.okmfa3ulpd3e6gte@skbuf> <20210730161852.4weylgdkcyacxhci@skbuf> <20210730171935.GA517710@haswell-ubuntu20> <20210730173511.ulsv7wfogk5cpx5j@skbuf> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 30, 2021 at 08:35:11PM +0300, Vladimir Oltean wrote: > On Sat, Jul 31, 2021 at 01:21:14AM +0800, DENG Qingfang wrote: > > I just found a cleaner solution: Leaving standalone ports in port matrix > > mode. As all bridges use independent VLAN learning, standalone ports' > > FDB lookup with FID 0 won't hit. > > So standalone ports are completely VLAN-unaware and always use a FID of > 0, ports under a VLAN-unaware bridge are in fallback mode (look up the > VLAN table but don't drop on miss), use a FID of 1-7, and ports under a > VLAN-aware bridge are in the security mode and use the CVID instead of > the FID for VLAN classification? No. Both VLAN-unaware and VLAN-aware bridges use independent VLAN learning i.e. use CVID for FDB lookup. > > Make sure to test a mix of standalone, VLAN-unaware bridge and > VLAN-aware bridge with the same MAC address in all 3 domains. If that > works well this should be really good.