From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 888ED11C84 for ; Mon, 3 Jul 2023 20:33:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D274CC433CC; Mon, 3 Jul 2023 20:33:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1688416437; bh=qg8LE55Eb5eQTL/7iZUZZnwLSbL18eGO83l+uTl/wTg=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=nSt0gbtkjNVYR7WMHsuvkGTOLGmKAKUQk+paGFQsvXTryxi/NI6qMqVPxK2eh7LaW HpNBxIW04g1n2iyU+K4ndVDmafmQaXNLWChN/SiaQJYDDx4QhySMSoA7TtQ4xase1I fNd+0Gd919wHYzkyqmJAQTw+V5IDnoE/3E9ZOBY0Tzi7dzMojJScClKqfAa2yYrdbB DRIG+flWrfBdxykMNDhhrb1pOWUd6ofO5VF3KMlnr5IdK8cHyjzPLuaR7AndNw7+dw Z/p2v24gdYyoTvc43rY6sVemrq0u7qOf9HUwCDaZEghYAx40bCmA1qkpIDWPvkiQPk fnVLFu/gNEG1g== Date: Mon, 3 Jul 2023 13:33:55 -0700 From: Jakub Kicinski To: Vladimir Oltean Cc: netdev@vger.kernel.org, Andrew Lunn , Florian Fainelli , "David S. Miller" , Eric Dumazet , Paolo Abeni , linux-kernel@vger.kernel.org Subject: Re: [PATCH net 0/2] Fix mangled link-local MAC DAs with SJA1105 DSA Message-ID: <20230703133355.479c6651@kernel.org> In-Reply-To: <20230629141453.1112919-1-vladimir.oltean@nxp.com> References: <20230629141453.1112919-1-vladimir.oltean@nxp.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 29 Jun 2023 17:14:51 +0300 Vladimir Oltean wrote: > The SJA1105 hardware tagging protocol is weird and will put DSA > information (source port, switch ID) in the MAC DA of the packets sent > to the CPU, and then send some additional (meta) packets which contain > the original bytes from the previous packet's MAC DA. > > The tagging protocol driver contains logic to handle this, but the meta > frames are optional functionality, and there are configurations when > they aren't received (no PTP RX timestamping). Thus, the MAC DA from > packets sent to the stack is not correct in all cases. > > Also, during testing it was found that the MAC DA patching procedure was > incorrect. > > The investigation comes as a result of this discussion with Paolo: > https://lore.kernel.org/netdev/f494387c8d55d9b1d5a3e88beedeeb448f2e6cc3.camel@redhat.com/ This series got eaten by vger, I think. Could you repost?