Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4164475rwb; Sat, 21 Jan 2023 06:57:51 -0800 (PST) X-Google-Smtp-Source: AMrXdXuu8ZPQB6KepHvBONgcq5CRb17Vp4FD+Pa8wr6Cizls4uBEaMWtp+y5EcF2grVdIT/Zf11w X-Received: by 2002:a05:6402:e9f:b0:49a:f52f:eed0 with SMTP id h31-20020a0564020e9f00b0049af52feed0mr19635224eda.13.1674313071082; Sat, 21 Jan 2023 06:57:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674313071; cv=none; d=google.com; s=arc-20160816; b=tw9HulINpVU3j9i97co1JV7nh1PbK/5yp/MV5ugdR1fdLht+ZTAIAMNrIGXyJlZWXt zOI+r8J1JhML5Xd7B+ZRH2/mGIGeN6hnxIlexDpMdxdu1WH0q36zyGukRYcoSHpR/c3f 7Zrxn6pJAt1mvC2z+tVtE39JcYyU3+CRaiCMSu6XAOINzm53pIvuVxvbBw0DemTveoYz SRStLDSG4ydBbbzw84Bres8dBlSedBFcyQyOz3vL2+amd3peEEXnyMS0KhxJUgVECy/S cbzgMmwPuVhig0mtqkSqmndYFWqQYhirmFnAzZbvfEuxTMuwlV7rgmPBhKwPPqddUSsF JCRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:ui-outboundreport :references:in-reply-to:sensitivity:importance:date:subject:cc:to :from:message-id:mime-version:dkim-signature; bh=EXqz70GQPIQCYT1nLHB6JIEG5NSP4ByZ1ECB2Q4fYpw=; b=fQPpiECqcnWG77o3XgCINAhfLwqwaozHkfe2Pcr8GbJgoBgMe9EatuDpz2OKlRW3TH BnrpWLa+i/igvf4lCCF7MVBEAt/070+DxZ6FZFhigciD1OpnXfd8MjYcm6DGNi34cxgW FPoRhs7ivRTEGfWQ//IEuiVYUinSrwMiQI6mCKYpjWQiczDx+69kjGVwjCbBxRx796RH TQq7S6r1FDQt+HE2bT5sDumxgWWm98tKspaF4HBXj+OUCoWjwjXzfST3NqGF6q5fakk+ zLXtBrUAEIkEXyisP7FE2O/dUXJ/Vd0wDnxTAUOBGKqmkz96V9tGb2SJrfsnqUqq/LiG 4uDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@public-files.de header.s=s31663417 header.b=rOD0FoAf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b14-20020a056402084e00b00458d1c48708si57351672edz.303.2023.01.21.06.57.38; Sat, 21 Jan 2023 06:57:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@public-files.de header.s=s31663417 header.b=rOD0FoAf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229698AbjAUONX (ORCPT + 50 others); Sat, 21 Jan 2023 09:13:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57142 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229450AbjAUONV (ORCPT ); Sat, 21 Jan 2023 09:13:21 -0500 Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A5BA23138; Sat, 21 Jan 2023 06:13:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=public-files.de; s=s31663417; t=1674310370; bh=EXqz70GQPIQCYT1nLHB6JIEG5NSP4ByZ1ECB2Q4fYpw=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date:In-Reply-To:References; b=rOD0FoAf5W+titksYeICIuZ90QQUup8CZLJV/SN3Xfkx9c31OoL1jZZxq1/JSgoUD ofS9rgWEPxVpHh/zjG6rG5sGQ+94Y/WIKsOe/UrXecslxDLvVEI8qAb8yGoal7RBi7 qWbiZ8kv39YKTiDXnV7zcEcgH/K0S+MkAXQJrLlTEV89J8EZZOl8HxrOIBSgt7qFAx 5ZJfagH2X6hfd/IoklfjsYyCxMoNtwHrRi/f7Ox9syRRlGTvIyWPrKglXyQwTHL5fD J25fMNREOC+lGA9UbNazIRNShbL9B1+SlElU7aEPOG5LgAliSwsPJEqVnitOljCcUZ 1L+bfOubsdaiQ== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from [217.61.152.198] ([217.61.152.198]) by web-mail.gmx.net (3c-app-gmx-bap60.server.lan [172.19.172.130]) (via HTTP); Sat, 21 Jan 2023 15:12:50 +0100 MIME-Version: 1.0 Message-ID: From: Frank Wunderlich To: Vladimir Oltean Cc: Andrew Lunn , Florian Fainelli , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Landen Chao , Sean Wang , DENG Qingfang , Matthias Brugger , Daniel Golle Subject: Aw: Re: [BUG] vlan-aware bridge breaks vlan on another port on same gmac Content-Type: text/plain; charset=UTF-8 Date: Sat, 21 Jan 2023 15:12:50 +0100 Importance: normal Sensitivity: Normal In-Reply-To: <20230121133549.vibz2infg5jwupdc@skbuf> References: <20230120172132.rfo3kf4fmkxtw4cl@skbuf> <20230121122223.3kfcwxqtqm3b6po5@skbuf> <20230121133549.vibz2infg5jwupdc@skbuf> X-UI-Message-Type: mail X-Priority: 3 X-Provags-ID: V03:K1:75DkVLOdpXIMLqBIY7SOwUCzgXxZYPyfo5cKr/3xL8SwwUsNLdGtV6cws8oydF8bN9O1a YPw1N41mWmqnBoM4H1SLjvGf7wReEsOxIYJf7LxfpiLESsoD7BGx/mkxLXqS2HkFMOZjX7s5ErQo 5OGa2YMcmXAyC6BsGBPdK9eKstyfaKte3eR2PDsLh0p6rl9qDgs3hISDKvYnj9Wr+taAKOuXPuGd QlQ27w8ODwRH5QHdKM0vzsp/+rxvPQxH87XdAvXoX7KQ0SIw1QGWUgYx/1CLa7KHXV6+3QuR12w2 v4= UI-OutboundReport: notjunk:1;M01:P0:wmk6B6aAZVQ=;J+QEXdqV5YCSowD2rT41GWI/15W ANNdU1r+EaPYx1m0uefzzmBGIPKHJ8krgl/s2qdQIcFTC3UwEykS2lHeSOxLBJjpTAUvNOaD7 oZgGmnCwoj08Sf+uazEre6Op3RmL7bhVqbPrJecpBkFfVPRCO1LcmFrjEupzHybA1HtFWHbib KfIb3FWy9sRRqvM3qWvloTC+xY5AKH2T18aZ+pr0F+ii3s0WhIreTxwABm2O/yf7duSSF9dZC caYmieU1phDZWzJ9s5geiKPGl/dnkEihtAaKI/t5Foy5j02UuIp0vFUwlGF7BT6ja5qJ474t0 jowKNArDRemdfGT5rGfXcc9jaRu6C64snaGRhAk8adoIquO1s5bg8sDaMNb3MlfN77Rbf3T1X TocKg/85mHUOhWKncnOw2bezKMhskj/pxjO1rfE4wr2dQ7Hl9Ww1h+1QQt/mmgQV2TFMMn2qR hJ3/0zbhWoC09Jgx+e2qL7U32TGEqvBoZHuTdy/rp8U7YmaekboldRp0HLcbtbCNGBDOUEot0 QGdhldj+7pWUnFPyygfd6l8LcIMgcAEtlZP2d0dawdEyEStzKA9L+H6bcFdas7oik+O4eHQ2k 748e/BNfea30yLLeOXmaObwi1dXz4wvtrRFVXYbqYfzEOTXeF8sg8X4cq+NP25qUMhCKDoprM VdAk+uyMduwnXOFBbxV4f5cebdvljoLuQPKn5P+MRf+UXPlceIkw9r41163MOrm5w/YiAT3/R cXxyl4O3YhrVT2PuAKizJ7uvngtNup6QuqDSdxsn9yxDW6jQ7RSV2XC4+NlCaJKwz9tTaMwBb r8gtt3JcGahtSdjjH4NwdkwQ== Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi > Gesendet: Samstag, 21. Januar 2023 um 14:35 Uhr > Von: "Vladimir Oltean" > An: "Frank Wunderlich" > Cc: "Andrew Lunn" , "Florian Fainelli" , "David S. Miller" , "Eric Dumazet" , "Jakub Kicinski" , "Paolo Abeni" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "Landen Cha= o" , "Sean Wang" , "DENG= Qingfang" , "Matthias Brugger" = , "Daniel Golle" > Betreff: Re: [BUG] vlan-aware bridge breaks vlan on another port on same= gmac > > On Sat, Jan 21, 2023 at 01:32:42PM +0100, Frank Wunderlich wrote: > > so first patch fixes the behaviour on bpi-r3 (mt7531)...but maybe mt75= 30 need the tagging on cpu-port > > > > > Can you try the second patch instead of the first one? Without diggi= ng > > > deeply into mt7530 hardware docs, that's the best chance of making > > > things work without changing how the hardware operates. > > > > second patch works for wan, but vlan on bridge is broken, no packets r= eceiving my laptop (also no untagged ones). > > It's hard for me to understand how applying only patch "tag_mtk only > combine VLAN tag with MTK tag is user port is VLAN aware" can produce > the results you describe... For packets sent to port lan0, nothing > should have been changed by that patch, because dsa_port_is_vlan_filteri= ng(dp) > should return true. > > If you can confirm there isn't any mistake in the testing procedure, > I'll take a look later today at the hardware documentation and try to > figure out why the CPU port is configured the way it is. ok, booted again the kernel with first patch ("mt7530 don't make the CPU p= ort a VLAN user port") and yes lan0-vlan is broken... seems i need to reboot after each lan/wan test to at least clean arp-cache= . but patch2 ("tag_mtk only combine VLAN tag with MTK tag is user port is VL= AN aware") still not works on lanbridge vlan (no packet received on target). regards Frank