From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 69F7EC43381 for ; Wed, 20 Feb 2019 23:35:21 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3881220855 for ; Wed, 20 Feb 2019 23:35:21 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="V6V/0acy" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726976AbfBTXfU (ORCPT ); Wed, 20 Feb 2019 18:35:20 -0500 Received: from mail-pl1-f196.google.com ([209.85.214.196]:45279 "EHLO mail-pl1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725804AbfBTXfU (ORCPT ); Wed, 20 Feb 2019 18:35:20 -0500 Received: by mail-pl1-f196.google.com with SMTP id r14so13077032pls.12 for ; Wed, 20 Feb 2019 15:35:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=cygwTiJfN7mOOEvz/BgpYf9sKev1XCOypBtWPCn8Cl8=; b=V6V/0acyEvL86i4vPXCkFtnFfYEWh6hxwpPJX6nwx4Ac9AVbrBolJJzAOSsrHp1hH+ prdDk6Zn4eyS8/t11wub9WvPuZMEayetXkn8Z+jyy+UWzAHHOAgqJMYiGHBFmr75iMbX OnCf+imxgyR1LpAFnOBfIWdjpp8SjoweWF/dW9e4xjXxw8YSoPD6vFyUIGr5+UdKJ9Kp saFl7zWGCalh8ncZVGF+tcO+llRf3sriSKrddR8oJvYH+c88Q93sx0LuyKI6BVhre7ov bj9d4jaDUTCkExdBCH9uZNUkgZHqzN52Ts2US7+6CwdkFmfXQWcfiA6aUcDVlnDgQ0D4 xOFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=cygwTiJfN7mOOEvz/BgpYf9sKev1XCOypBtWPCn8Cl8=; b=lMX941tXXKpm0hFLSdI8X83DYeG3ZfNGJzByYEIX54x28T6zDDFgIUtKJ8LKw5Lc62 cIDl87eqxtfmgkcG9Ebg57mS8raugWnuUiXwmfu6T8pkYpmbYQEgoYmF3AVpyaVHToBe Yp1pxJTjRhqMwvtmN06YieKeaVcKTywGZKA9+gl6O+5CKyWARiyo+XHA65YTiHBLh2FB oeZG96oE/ynwlT/ElesfEzx02ve1ubxxKO8TJWAQVjCG4PB0p1uuz+ZzvIDZvMYg45j1 4eUF3Ddzi7Hlf0/5LibmS884F8p6elfvovccmYv7d3Ml7RBt0XVJn6vg+yExsSvwy+I1 l0iw== X-Gm-Message-State: AHQUAub2qvFQM01zgpg0SjhOlmWVRoKhEsiJoYl4zY9Zxe+9v76pIkn9 CV4FgQGbQx+x5vtMMPHuM5owpFFL X-Google-Smtp-Source: AHgI3IbucEdP6RgKQZgGrMgANNYKgTSsfLs+VEsdjG880rxEZ+xHTRfKb9PsmZ+J3oyH9xkM1jJwPw== X-Received: by 2002:a17:902:584:: with SMTP id f4mr40364222plf.28.1550705718828; Wed, 20 Feb 2019 15:35:18 -0800 (PST) Received: from fainelli-desktop.igp.broadcom.net ([192.19.223.250]) by smtp.gmail.com with ESMTPSA id z67sm14716589pfi.152.2019.02.20.15.35.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 20 Feb 2019 15:35:17 -0800 (PST) From: Florian Fainelli To: netdev@vger.kernel.org Cc: Florian Fainelli , andrew@lunn.ch, vivien.didelot@gmail.com, davem@davemloft.net, rmk+kernel@armlinux.org.uk, hkallweit1@gmail.com Subject: [PATCH net-next v5 0/3] net: dsa: mv88e6xxx: fix IPv6 Date: Wed, 20 Feb 2019 15:35:03 -0800 Message-Id: <20190220233506.22210-1-f.fainelli@gmail.com> X-Mailer: git-send-email 2.17.1 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org We have had some emails in private over this issue, this is my current patch set rebased on top of net-next which provides working IPv6 (and probably other protocols as well) over mv88e6xxx DSA switches. The problem comes down to mv88e6xxx defaulting to not flood unknown unicast and multicast datagrams, as they would be by dumb switches, and as the Linux bridge code does by default. There is also the issue of IPv6 over a vlan that is transparent to the bridge; the multicast querier will not reach inside the vlan, and so the switch can not learn about multicast routing within the vlan. These flood settings can be disabled via the Linux bridge code if it's desired to make the switch behave more like a managed switch, eg, by enabling the multicast querier. However, the multicast querier defaults to being disabled which effectively means that by default, mv88e6xxx switches block all multicast traffic. This is at odds with the Linux bridge documentation, and the defaults that the Linux bridge code adopts. So, this patch set adds DSA support for Linux bridge flags, adds mv88e6xxx support for the unicast and multicast flooding flags, and lastly enables flooding of these frames by default to match the Linux bridge defaults. Russell King (3): net: dsa: add support for bridge flags net: dsa: mv88e6xxx: add support for bridge flags net: dsa: enable flooding for bridge ports drivers/net/dsa/mv88e6xxx/chip.c | 17 ++++++++++++++++ include/net/dsa.h | 2 ++ net/dsa/dsa_priv.h | 2 ++ net/dsa/port.c | 33 +++++++++++++++++++++++++++++--- net/dsa/slave.c | 9 +++++++++ 5 files changed, 60 insertions(+), 3 deletions(-) v2: fix a couple of compile errors in patch 2 and patch 3 (oops). v3: change interface between core DSA and drivers v4: fix comments from v3 v5: fix build failure in patch #1 -- 2.17.1