Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4037826rwb; Sat, 21 Jan 2023 04:58:04 -0800 (PST) X-Google-Smtp-Source: AMrXdXsC8HLd54lFTsZq9W98lyy8YdVwExZCnocAYHHmfk+Rlj/dJDWlpL7xYgxBNHQp4KThprd7 X-Received: by 2002:a17:90a:778a:b0:229:dce8:18f7 with SMTP id v10-20020a17090a778a00b00229dce818f7mr11456187pjk.37.1674305884169; Sat, 21 Jan 2023 04:58:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674305884; cv=none; d=google.com; s=arc-20160816; b=jFipjpSK0gLytaXBrFccWdPXtnV+2fiz5oWz+9/cMDySFFxZ+Y56LGHSlxS1i7ch1+ QdVW+TtUKprd34yO1pLiP63BUKU2U/43mJmdfb4Ekh4U8sA6baUruy1Us10u8vV7feUE Jxn8R7X+bRaK2va0dtaATjkVtXkzxfPv7MrNTwezK9o98atT5qxDJk6uq3K4u0oiho4o qiCLDuhi69wo0TynOENALFAhQaNouhbpAl/zvCSaciV/6Gsqg3R8doWIXNTepd3yjkbi MJRaUn4QEFV8GXal5e659KxVQxL1JTlYOjzKAP/3HC4kXKWo/zq2wC855WqBygOGfOJ7 RR5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:ui-outboundreport :references:in-reply-to:sensitivity:importance:date:subject:cc:to :from:message-id:mime-version:dkim-signature; bh=vBtVxlBQTKRdLfDfHoFiPbklR+U2cvnnBHmUhpztInY=; b=xaAjfFykoCASVqcrtTNXsu9I53fHI+juF1I/2xGmfU+Q3O0UX9cNocwIpJ6okcTrM5 lzGElkNrMqHKuDaFqOmp2LY8YSIKa635UHHV+dIXLQ9+Lgct8t1BY1vwzT4Nb1gregbc xfFT/nwTgfjLMT2TwMWfUvvEEcuEZCjIKz2Xbsx9yAJzuOANLU4r/jjUFXJPcCM0TeeS moBtwIGkMZNlOrvHFvNGh6hc6ycGbmhBCtb+HfDhg7JwmcJmKjM3XmU8UBtNPHfU9HUQ cVbu2pV+fvq75c7nt7YcPWF2yml7wGQf10Kh3UCoG8MRD9UoPvl4PrN5IRXzkutChd4g 4nWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@public-files.de header.s=s31663417 header.b=YnqJ8Seu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hg12-20020a17090b300c00b002298cb34320si5527934pjb.116.2023.01.21.04.57.57; Sat, 21 Jan 2023 04:58:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@public-files.de header.s=s31663417 header.b=YnqJ8Seu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229450AbjAUMdM (ORCPT + 52 others); Sat, 21 Jan 2023 07:33:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33372 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229661AbjAUMdK (ORCPT ); Sat, 21 Jan 2023 07:33:10 -0500 Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5379465BA; Sat, 21 Jan 2023 04:33:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=public-files.de; s=s31663417; t=1674304362; bh=vBtVxlBQTKRdLfDfHoFiPbklR+U2cvnnBHmUhpztInY=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date:In-Reply-To:References; b=YnqJ8Seu+ykWRJA+ac59p+aaj2Av66jeGglWuxtCKgbodlqWgylu+r3YagsyTzHp6 v60HE8zl+f2KPOf1pHfjAg42HeAtwBRhVQ9cWhHlM5E/zJpzUVUQgl0ANbsmB38SHR HRuh7QhUULQ/PKxqSQErnPZ3fZIC7KikaO9+CmwGNyy2Oc8d1cT6Oi54InyPlGgkbe PYNEoySHswi41seK97o9FndJJv79JnTb8tk3VwC3MCxID7s9ordc2PXdE5AHVwXxlt fnKpAVY8MCxsQyvrZnvwDhOrrr+YKFcjMuUo4w3afScJfwFZ5LBaVXkAMOd5xjdgc4 yq/+Fyiw7MlXg== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [217.61.152.198] ([217.61.152.198]) by web-mail.gmx.net (3c-app-gmx-bap60.server.lan [172.19.172.130]) (via HTTP); Sat, 21 Jan 2023 13:32:42 +0100 MIME-Version: 1.0 Message-ID: From: Frank Wunderlich To: Vladimir Oltean Cc: Andrew Lunn , Florian Fainelli , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Landen Chao , Sean Wang , DENG Qingfang , Matthias Brugger , Daniel Golle Subject: Aw: Re: [BUG] vlan-aware bridge breaks vlan on another port on same gmac Content-Type: text/plain; charset=UTF-8 Date: Sat, 21 Jan 2023 13:32:42 +0100 Importance: normal Sensitivity: Normal In-Reply-To: <20230121122223.3kfcwxqtqm3b6po5@skbuf> References: <20230120172132.rfo3kf4fmkxtw4cl@skbuf> <20230121122223.3kfcwxqtqm3b6po5@skbuf> X-UI-Message-Type: mail X-Priority: 3 X-Provags-ID: V03:K1:AOWOCB8Mr75GGlwxuVkL2eoESjRi85AN23FMrWIwDLrwQIIx86jAdlRSEfnTQq3r3i6zo TUSjbpYThtSjGONxtkMeXOsJ1wLQBLCZKW2sswBqZi6ccc25bV7scoKHPz2KwP69O/coCL1QkbL1 qmhpuafh4JFn1d0DFxMccEIZPyyHyAfECpDz8Aq7GIlfNdarxcqvovXZ23UBOHaZqEis7x6LrK+x S2w+yF2oMqqkXohzvfGMZqOFLENBeHnGQeqzQ5Z4EyGgEKz3JgZT4CFekagw3YjBlFkdYfQKjBOu kE= UI-OutboundReport: notjunk:1;M01:P0:V7elQmlp5QU=;Bo6zAsBDpPtn0ABb8sb5fe/C81J SUbn0TQ0eG18/+HqKhoJ2pmfUfgVkhAl23msUNARujaiixteOO6YAreNBX1QfV6tlgnjWQ33M 4FiZHBgNbnzle7YLPmqtBPy1PcSbykfK5Vbh1K0fpUgCnWEfEeiHv4gB6o3vJQVwZT0NG8HWJ e2k4RcNlYglnMZa5MgNgdoOioNTvDV7SQi8cVXKi8AdvJMq953bPvERbed5Hvlz1lWb7RTaj6 W2D01jgLNbOuSoCXiFfcyV0TSW5LkYZ3OgM2mefUZJ0njEj4cdNqnzl7xmPI6gZ3UFLoI+D/s rzro4/SBr8V9DAeWazrBaYAm+pAvL+4joPYqpyN5+TevioZrG36c31ZaFppXEBnp6A5hzmyyg Sp2z1hA9ifgq+J90RAw6MO78o3lrApjIOZI9wHEVoh8EXUwKXCjuB8vIC+MKZop9M8Fn6KEsK Uv1ZhcCnxTdY51PS601T+B1p4MGgHteq//EGdvivnsBGGxkBf3tDlaXclpwM80vPZ42/BR/tU Esrg6G+IyEeGP9tSbjF7X6P9hDTDMwbM85oxqpq8oeYqyiHYQOOCpaOrSJetiW0ZFiFfG/NJB YKSh0BZJce8EYlEFyC+phvmGmeo3kK21mkNZW4ckXSYXgf/s0TATSUAbmnojQoRW0D0aOvU6d Uxyutb8xNJ/WRcmr+4a5wZOsLsXaIQG/vxVCdmZHcyUxTEhNqrITm24mLaZR0pdzzOv7AivYm pSQiYUWjFpZh7AUnuj2q44Zg31daeZoBflw8vuBgZ/EO2xPNSGBsVFyNEFQYeu1JTqSSMUhuW ovwESZEH4dDFMnSDMenFMfjcyl7dVHSziYEXNS1s0Wdpk= Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Gesendet: Samstag, 21. Januar 2023 um 13:22 Uhr > Von: "Vladimir Oltean" > > On Sat, Jan 21, 2023 at 01:11:43PM +0100, Frank Wunderlich wrote: > > > What happens in mt7530_port_vlan_filtering() is that the user port (= lan0) > > > *and* the CPU port become VLAN aware. I guess it is the change on th= e > > > CPU port that affects the traffic to "wan". > > > > interesting, and funny to see that vlan_aware on gmac is added, but no= t removed in else branch :p > > it is... see "if (all_user_ports_removed)" in mt7530_port_set_vlan_unawa= re(). > > > > If this works, I expect it will break VLAN tagged traffic over lan0 = now :) > > > So I would then like you to remove the first patch and try the next = one > > > > tried first patch, and wan stays working, now i try to figure out how = i can access the vlan in the bridge to set ip-address.. > > > > ip link del vlan110 #delete vlan-interface from wan to have clean rout= ing > > bridge vlan add vid 110 dev lan0 > > bridge vlan add vid 110 dev lanbr0 self > > > > how can i now set ip-address to the vlan110 (imho need to extract the = vlan as separate netdev) for testing that lan0 still works? > > ip link add link lanbr0 name lanbr0.110 type vlan id 110 thanks found it already ;) found out how to get access to the vlan from the bridge and it is still wo= rking > If this works, I expect it will break VLAN tagged traffic over lan0 now = :) > So I would then like you to remove the first patch and try the next one > tried first patch, and wan stays working, now i try to figure out how i = can access the vlan in the bridge to set ip-address.. > ip link del vlan110 #delete vlan-interface from wan to have clean routin= g > bridge vlan add vid 110 dev lan0 > bridge vlan add vid 110 dev lanbr0 self > how can i now set ip-address to the vlan110 (imho need to extract the vl= an as separate netdev) for testing that lan0 still works? root@bpi-r3:~# ip link add link lanbr0 name lanbr0.100 type vlan id 110 root@bpi-r3:~# ip a a 192.168.110.5/24 dev lanbr0.100 root@bpi-r3:~# ip link set lanbr0.100 up did "ping" and look at the remote side root@frank-G5:~# tcpdump -i enp3s0 -nn -e vlan tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on enp3s0, link-type EN10MB (Ethernet), snapshot length 262144 b= ytes 13:20:39.908845 96:3f:c5:84:65:f0 > e4:b9:7a:f7:c4:8b, ethertype 802.1Q (0= x8100), length 102: vlan 110, p 0, ethertype IPv4 (0x0800), 192.168.110.5 = > 192.168.110.3: ICMP echo request, id 48077, seq 1, length 64 13:20:39.908878 e4:b9:7a:f7:c4:8b > 96:3f:c5:84:65:f0, ethertype 802.1Q (0= x8100), length 102: vlan 110, p 0, ethertype IPv4 (0x0800), 192.168.110.3 = > 192.168.110.5: ICMP echo reply, id 48077, seq 1, length 64 so first patch fixes the behaviour on bpi-r3 (mt7531)...but maybe mt7530 n= eed the tagging on cpu-port > Can you try the second patch instead of the first one? Without digging > deeply into mt7530 hardware docs, that's the best chance of making > things work without changing how the hardware operates. second patch works for wan, but vlan on bridge is broken, no packets recei= ving my laptop (also no untagged ones). regards Frank