From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6BC52C433F5 for ; Fri, 31 Dec 2021 15:31:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230307AbhLaPbm (ORCPT ); Fri, 31 Dec 2021 10:31:42 -0500 Received: from vps0.lunn.ch ([185.16.172.187]:46416 "EHLO vps0.lunn.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbhLaPbl (ORCPT ); Fri, 31 Dec 2021 10:31:41 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lunn.ch; s=20171124; h=In-Reply-To:Content-Disposition:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:From:Sender:Reply-To:Subject: Date:Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Content-Disposition:In-Reply-To:References; bh=U9a1w8qQol8LUEcy9upSTRK+gPb4JQKArJVCCPnWXF4=; b=ffDpJxDklWi+1z/NVi3q1kGxbk IMoFAAf/eDhGsamw5K/pKD2egVHbAHZqPRNtxsPbfhUzguaup9YqWXZKBoxBsANnlLrc4Wum7jWRY lPpSoutkXdE3Dygyb1OBCn1GhzAxsp1nouTqdYNOiZ5SuDuHNe2eRoWDUuctvEayHiuU=; Received: from andrew by vps0.lunn.ch with local (Exim 4.94.2) (envelope-from ) id 1n3JsX-000ETa-8v; Fri, 31 Dec 2021 16:31:37 +0100 Date: Fri, 31 Dec 2021 16:31:37 +0100 From: Andrew Lunn To: Alexandre Belloni Cc: Colin Foster , netdev@vger.kernel.org, Vladimir Oltean , Horatiu Vultur Subject: Re: packets trickling out of STP-blocked ports Message-ID: References: <20211230230740.GA1510894@euler> <20211231150651.GA1657469@euler> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org > > > sysctl -w net.ipv6.conf.swp3.autoconf=0 > > > > That sounds very promising! Sorry you had to fix my system config, but > > glad that this all makes perfect sense. > > Hi Alexandre > > Let me know if this works ;) The bottom line being that you should > probably disable ipv6 autoconf on individual interfaces and then enable > it on the bridge. Does this also stop the interface getting a link local IPv6 address based on its MAC address? e.g. my wifi interface has MAC address b8:ae:ed:78:ef:9d and gets an IPv6 address inet6 fe80::baae:edff:fe78:ef9d/64 scope link It will also perform duplicate address detection, DAD, when the interface is brought up. That is probably hard to see with tcpdump on the host, since it happens very quickly, but a link peer should see the packets. Andrew