Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp516146iog; Thu, 30 Jun 2022 05:21:23 -0700 (PDT) X-Google-Smtp-Source: AGRyM1triRpLNp4U5TpDOa9oDT+Mh0Q/J3KQq3S3VahNHacbIgt6wqbS1tCO7XVGluA2TMfkLskH X-Received: by 2002:a63:fe09:0:b0:40d:34e6:7c69 with SMTP id p9-20020a63fe09000000b0040d34e67c69mr7297726pgh.368.1656591683702; Thu, 30 Jun 2022 05:21:23 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1656591683; cv=pass; d=google.com; s=arc-20160816; b=dBKG1TmzV39vbuU/ZtZBZFdxgQY8c/FpQBd8mDzMMWctJMePfcok+SSYcZ+bgUyIEO 1ZzGMINOKcR9T4iRfHhHP25khN5V2oM0zub/5CYoMM3Izl9GoK6/i9J9F6Wdxq4NWW5r 3o3lgE6wFzJsyplnJdEpDjTgZI3Sje2fb66mHBTToXqP1JZgkCtXRlVdTS4MxS7WGYmT 2yL/F/o+JH2tQWoOVSL9WBr+tDesqnQRtJ0JcJ0PL2jMpnZ9zfJO1/XwqZ1nj6mri0mV Ka7YwtMr7omPG1oh02lrnKzVNQDU547rHcybA5fvldwsSbab28Uu9fBChnxExtKDs1Ff d/fw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:in-reply-to:content-disposition :references:message-id:subject:cc:to:from:date:dkim-signature; bh=DKujan2IbH/dDqQkS1tM31TozdGPb8fajbOCPRIL1q4=; b=J2hJzIXSeun5wCbheqBZVw8d+woQv4eet2uwxxOVqo3KWV8pU9vraQdmO2r/LCOY0B KXXRG0VlSgLE3yrE4svQoSZZ5DuUh8rD/i45IJbHyrS9K4SXZj485Bz/NJCJIQh7WBKt yTDfx8591MKWwoaT8HI6KGifsqAv7YENeNnhPI7fic5ry5DZKj+dQ5DZEeNtkDuAH0NV XhrnDhwcpE90WsXBJdvK3BBuY6FvgvoXSRBbrMOb/wTrrUYlXo7dxUTkU5YEjzaYYPYu gr/P9cIoP0jIenaxayQCRtMRluX2Dfv7OPBO5dTqVnvgRmoXsC7YGgfL9U7yeaq0uESj 2QDg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=BiNzjnGL; arc=pass (i=1 spf=pass spfdomain=nvidia.com dkim=pass dkdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pj4-20020a17090b4f4400b001e895fed1e2si3292443pjb.130.2022.06.30.05.20.58; Thu, 30 Jun 2022 05:21:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=BiNzjnGL; arc=pass (i=1 spf=pass spfdomain=nvidia.com dkim=pass dkdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235151AbiF3LiL (ORCPT + 99 others); Thu, 30 Jun 2022 07:38:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53352 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234211AbiF3LiK (ORCPT ); Thu, 30 Jun 2022 07:38:10 -0400 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2040.outbound.protection.outlook.com [40.107.236.40]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C1BD7211; Thu, 30 Jun 2022 04:38:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Pv/MrnU/LrYOZTd4cC/4ZooyB5G39qwbNjjlZ82jsScTxbaqOdG08SeV2qj0uvPVlOmQHwGU/icKrgKjiKkNJZTKj9IFM2UhOo122bAVVEhB1058mIfykru3zLvCwWm5pxgFxLyC/mhqzICC2bDIhPbyoUsLUWoZm3XoAaIcWpe6gcieLLCwYA41PhdGieDS/iWB/+VPozKO1DZXsmgLrfgMU4QyNhD23otP9nfpnC6K8TlD23mU4f8IYsbN9lcBuw7SpaN9v0q9Iepmn+6q6Z57i3q3CC1ajXTlDQgxvQMn/N+W7PNuwrbZiX5MMqmUOpXQckFyI7GQszfs0pLuwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DKujan2IbH/dDqQkS1tM31TozdGPb8fajbOCPRIL1q4=; b=dS/7qxOVbEpmGrRxG1odZqThv5TNPnZIblbrr0HNS6auRgs2QirDWo/d+5SCXOgSRAEpFD1km5iAoR9/rS5I+V1Nry6hzAGeRKf3+/xPfOgitIWgoYbxepb5tIy5KNHseH/XE6Lopd/yeLkqmd9taPEVemb7MHZhso62DyNlXt37V1Eo3nqDaBj2G7rMj7EXFvvu181wEha8Q5phsPyuUqKk8hrHozBiRi1IWp7oIY24ZhQ/onF6bwwrwmGrlFDrji/9jg3Mo6zpwhWH3uNYHUCQSutcj8101kMPa8WG+wuxcCxFhdk70Vh/q32p3AZ0h+b++2AHX76JUx+adNw2fw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DKujan2IbH/dDqQkS1tM31TozdGPb8fajbOCPRIL1q4=; b=BiNzjnGL14vJE6QnbJ5LymQDSqNPZMIEwenj54sE2rgl8Z0H1w/7e4kMAR/bQ4oXq7cmeaDe3nkvDkOGjmUy80qHPJuknPKUKf+i2ci+w/6IbyGt0iYHi4CJ2Sm8Kg4GSj0zJ8PEv0VpLIKiwSl8ajH4RPhtHDoH8jbffesCgePzdaSgx1ovJD55W2HPcdaltHpwUGmbPhWl9VGHGuqM1PDp/jPUlFkrmutlGO9VMoz2Q4vkHJidZjjDk4LJV7vB8ujeiYfx/efTZww+phK0TFrq2T9zFoig+RKwxQ5+0iXUM3vxXPBusncg81bquthq/XTUiKVciau1+gMQ88NMWQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; Received: from CY5PR12MB6179.namprd12.prod.outlook.com (2603:10b6:930:24::22) by CH2PR12MB3894.namprd12.prod.outlook.com (2603:10b6:610:2b::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5373.18; Thu, 30 Jun 2022 11:38:02 +0000 Received: from CY5PR12MB6179.namprd12.prod.outlook.com ([fe80::611c:e609:d343:aa34]) by CY5PR12MB6179.namprd12.prod.outlook.com ([fe80::611c:e609:d343:aa34%5]) with mapi id 15.20.5395.014; Thu, 30 Jun 2022 11:38:02 +0000 Date: Thu, 30 Jun 2022 14:37:56 +0300 From: Ido Schimmel To: Hans Schultz Cc: davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, Andrew Lunn , Vivien Didelot , Florian Fainelli , Vladimir Oltean , Eric Dumazet , Paolo Abeni , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Nikolay Aleksandrov , Shuah Khan , Daniel Borkmann , Hans Schultz , linux-kernel@vger.kernel.org, bridge@lists.linux-foundation.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH net-next v1 1/1] net: bridge: ensure that link-local traffic cannot unlock a locked port Message-ID: References: <20220630111634.610320-1-hans@kapio-technology.com> Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220630111634.610320-1-hans@kapio-technology.com> X-ClientProxiedBy: VI1PR07CA0169.eurprd07.prod.outlook.com (2603:10a6:802:3e::17) To CY5PR12MB6179.namprd12.prod.outlook.com (2603:10b6:930:24::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: e244c5ad-d3cc-42e2-c0b8-08da5a8cfd98 X-MS-TrafficTypeDiagnostic: CH2PR12MB3894:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CY5PR12MB6179.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230016)(7916004)(4636009)(396003)(39860400002)(136003)(366004)(376002)(346002)(6506007)(6666004)(966005)(38100700002)(478600001)(41300700001)(6486002)(26005)(316002)(9686003)(54906003)(6512007)(6916009)(7416002)(4326008)(66946007)(33716001)(5660300002)(83380400001)(66556008)(8936002)(86362001)(186003)(8676002)(2906002)(66476007);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?lWHcmdMz/IBOxaGM2iAVoKoyHNlyQYQAGrRph9shcOAHjCAZ5c3t8dH2yvkL?= =?us-ascii?Q?XRwmqVXs1kQphrWj1njPvE1j88O4In25E474Zac3KD2I8RFnkXXmnzfSxNTs?= =?us-ascii?Q?87aeGoE7pIQNl4EMjjC3vilgl9AWJwi8Elp04MYro0WeZWx4d1XkBo7JQ8Nm?= =?us-ascii?Q?x0MEceQmxGoMinnTQqLknln+TSVVZRnUenS4vXMRsxp8TnhVZm2vXQhiB+rF?= =?us-ascii?Q?lv7VHmd4frUoYGHVvvQNF2MohCtV0c1gjLnhdcFClsi9maBAmk/TcWIHd58r?= =?us-ascii?Q?jlWJwKIUzzOmdUmmTjaeB9VQj0OBBrj+XuN8CgAGHq6MEDrsuurJf/00Hr1l?= =?us-ascii?Q?bBnCDY/YysYpbZpijn4JFb6aujoQ5X/krrPv81QU6ckvyp+oXfuRUl4pLN7e?= =?us-ascii?Q?0GZv0ddctkER7bF/vOqsm73AW1oeIasWnMPojMz59bZ7k2AQC0dvmssu4ez2?= =?us-ascii?Q?/KUQSqJ4xMkJHTKQAXIJoB/VYP1sYgS2g1U6uptuO6bg0LcYMz+EXt/t4ifG?= =?us-ascii?Q?sZWOCqE1pBD3vdqOEV6lg82YBX4LJftz5VkwJqWlX/328jO6C8tQFbLsp2Yn?= =?us-ascii?Q?ovL772le4GxHTUSDG2v66hSKo0SkJapPU6paLj4gtjrDTGg03DouVQUDGFPe?= =?us-ascii?Q?qlT/Hd97wmmUQ83AiTSkH189i9E2S5cPuqKsmU2VV4bj1NjYUu4XTlZJ8qjc?= =?us-ascii?Q?fyAC+H+qFwJ6p6MJyPXsHN7NeTwf0rSdMAVyZ5fc6ZwnLlOb0YuYa0oeF8Xo?= =?us-ascii?Q?GkRv3IVbPy+CChPtqKTy+cce2UzJRQIosaSlUCyXWDyk5hL9rlHKQYQDGw6C?= =?us-ascii?Q?+wrZvvKkyVxb5CuzeE1Dl5LWCe1o2Lc9Ez0MEHjr0fpcom+hh3mFID/x/7H2?= =?us-ascii?Q?UP2nbmsvqP2ii9GssLtP/+2U2z1jGO39ON81yTTnG/uMiyFzXoqLjGGsG1bl?= =?us-ascii?Q?X+DphnZftYHgEqhIAdpmJg8ChxM3tI46Ya2bocFz2lIO+wpw94ZcbkZQR9k2?= =?us-ascii?Q?w7qtzL7OBhwQBAy8r6DqgVo6poAi9TzjEiN6L7EoKol/wrDTrN5ykPwO7hz3?= =?us-ascii?Q?n9gj6cJcm9DAnr00cOh83Nag0L5kqmfjhPyQISr/PJgubFK3FgfSGiaTifBH?= =?us-ascii?Q?KPqCpbOorrOrY8ouByClFP7I6+13NLMwHffcEXxgPc6AGXEpntLxbHidT8wb?= =?us-ascii?Q?2/8BIcu7xWboptpUbKUVULDz9Q9PIXDMJ8J1KPLv5+yEk5ec+q1//IGhprqJ?= =?us-ascii?Q?vPZro2ptgw5I+mXjzqoCmI8sFnDkwJ8XvhxwSWGQEPKxtOtaEA7dpp6KKV7I?= =?us-ascii?Q?x9G0ZyVFNQxKuD7eR/7cxE+ixZm5dWQ4EBgDRvX9/yR/+S+Syaw8EDHynv4T?= =?us-ascii?Q?mH7IpHZ/A5I+fGtc+qdmTM2osb/gTEU2OoHRBtycQuOS/UgyC9HG6G0voyez?= =?us-ascii?Q?4sNrA+LB9ERbhpMvxg6asRzKgxWVpw00shZycfQDqDqSwnKXZ16wMBkwYNma?= =?us-ascii?Q?wO5bUT4f1RKQFxUwO8a0sB0lM/sb4dgZK0tfg+WFT65s38CiVnMCJkCbIpDt?= =?us-ascii?Q?Gp76T/mVrsZ5sMOGsdWBhWztD8R+dgzFeelJjY+2?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: e244c5ad-d3cc-42e2-c0b8-08da5a8cfd98 X-MS-Exchange-CrossTenant-AuthSource: CY5PR12MB6179.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jun 2022 11:38:02.5257 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 1HzybaR9/ARgc9OYYyyGFvFXgGQckcRkqLL+IsKfer/ZHkDoPs2tDLhQTDO6F2XvQgBGJJTp4YKP7LRp7M+SyQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB3894 X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 30, 2022 at 01:16:34PM +0200, Hans Schultz wrote: > This patch is related to the patch set > "Add support for locked bridge ports (for 802.1X)" > Link: https://lore.kernel.org/netdev/20220223101650.1212814-1-schultz.hans+netdev@gmail.com/ > > This patch makes the locked port feature work with learning turned on, > which is enabled with the command: > > bridge link set dev DEV learning on > > Without this patch, link local traffic (01:80:c2) like EAPOL packets will > create a fdb entry when ingressing on a locked port with learning turned > on, thus unintentionally opening up the port for traffic for the said MAC. > > Some switchcore features like Mac-Auth and refreshing of FDB entries, > require learning enables on some switchcores, f.ex. the mv88e6xxx family. > Other features may apply too. > > Since many switchcores trap or mirror various multicast packets to the > CPU, link local traffic will unintentionally unlock the port for the > SA mac in question unless prevented by this patch. Why not just teach hostapd to do: echo 1 > /sys/class/net/br0/bridge/no_linklocal_learn ?