[net-next,2/3] net: dsa: mv88e6xxx: change default return of mv88e6xxx_port_bridge_flags
Message ID | 20221205185908.217520-3-netdev@kapio-technology.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp2424321wrr; Mon, 5 Dec 2022 11:02:31 -0800 (PST) X-Google-Smtp-Source: AA0mqf4ZJxkbWGPnn9MuYqzTJ4lRASaJjEdNFoj/PeFtdzjY1QSDKYoMqMGa5DlBv5KSOo0O8T07 X-Received: by 2002:a05:6402:2b8c:b0:468:ebc8:7476 with SMTP id fj12-20020a0564022b8c00b00468ebc87476mr57548592edb.223.1670266951579; Mon, 05 Dec 2022 11:02:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670266951; cv=none; d=google.com; s=arc-20160816; b=yli0Fe8Kddg8YS89mw94H8B/fuYwxVgGUc3ahuPZjsgwNXZNkiQgst4+faSObv1E6d TpuRVnSX1Aij8QsMD+iTd57CtJ4vHMz3EPcc+Zk1TUbOcaA2frN6HVdHZaVJRR6ZevJW hgYA9U0DoIRrIlOcnUW2ppbx/gfA/zv36muHpzZ1t0nBc5ZhgoSKIYvMXAOdSl2L49To 7F7FDuXPMdNnS9pIyJnwxVSoxYTRSupvfOSLONmThwtOdclGJE6XNZFWa33ygCmHdbBs rYmLttUyR0K+74wS9TCJ1/zRg4dkS7xIkiwqwb5SBGYHGmui6KuLM/A+AjX6WH4dNg0O 3LXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:organization :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from; bh=jogchyXzs3z3ZUxwEKIbrPReG7aCrvJMf2pMDRE/iOc=; b=vHesENMgjGJdLi6w+peyD32Cp/2qd6EJi3RFe8DwyHQtLZbWqCGh85e29WY1fkQ1m3 P+WGlAEK2ytCNK6aJtBKknf/7j/vHpjvgTb4uYQd1ebdxY72ed/NaO/8CZAl/fbozlmW /elVnQNZSnPc07EQpdyc8bDk0FGRFwU19ueMelFpVLR/uZImWZo8bGRsAljaZfr/4Ip5 Ry5mFtHyF6GAG9xVEiCOJA86DN53fVtUl45aMhwZtmV64xN3SwExiAhq8PS7AEnFca2S JWULABFwMX0pv4KyhttuOWgufnlrYs2jdSkk2CjSnArRpGICkypLGUoq2dj2uARND4Og f6ZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hs4-20020a1709073e8400b007bd71f57fddsi13101606ejc.803.2022.12.05.11.02.07; Mon, 05 Dec 2022 11:02:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233254AbiLETAd (ORCPT <rfc822;jaysivo@gmail.com> + 99 others); Mon, 5 Dec 2022 14:00:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49770 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230090AbiLETA1 (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 5 Dec 2022 14:00:27 -0500 Received: from mailout-taastrup.gigahost.dk (mailout-taastrup.gigahost.dk [46.183.139.199]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 16299266A; Mon, 5 Dec 2022 11:00:21 -0800 (PST) Received: from mailout.gigahost.dk (mailout.gigahost.dk [89.186.169.112]) by mailout-taastrup.gigahost.dk (Postfix) with ESMTP id 13A861883898; Mon, 5 Dec 2022 19:00:19 +0000 (UTC) Received: from smtp.gigahost.dk (smtp.gigahost.dk [89.186.169.109]) by mailout.gigahost.dk (Postfix) with ESMTP id 0D4BD25002E1; Mon, 5 Dec 2022 19:00:19 +0000 (UTC) Received: by smtp.gigahost.dk (Postfix, from userid 1000) id 025BC9EC0020; Mon, 5 Dec 2022 19:00:18 +0000 (UTC) X-Screener-Id: 413d8c6ce5bf6eab4824d0abaab02863e8e3f662 Received: from fujitsu.vestervang (2-104-116-184-cable.dk.customer.tdc.net [2.104.116.184]) by smtp.gigahost.dk (Postfix) with ESMTPSA id AEF6591201E3; Mon, 5 Dec 2022 19:00:18 +0000 (UTC) From: "Hans J. Schultz" <netdev@kapio-technology.com> To: davem@davemloft.net, kuba@kernel.org Cc: netdev@vger.kernel.org, "Hans J. Schultz" <netdev@kapio-technology.com>, Andrew Lunn <andrew@lunn.ch>, Florian Fainelli <f.fainelli@gmail.com>, Vladimir Oltean <olteanv@gmail.com>, Eric Dumazet <edumazet@google.com>, Paolo Abeni <pabeni@redhat.com>, linux-kernel@vger.kernel.org (open list) Subject: [PATCH net-next 2/3] net: dsa: mv88e6xxx: change default return of mv88e6xxx_port_bridge_flags Date: Mon, 5 Dec 2022 19:59:07 +0100 Message-Id: <20221205185908.217520-3-netdev@kapio-technology.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221205185908.217520-1-netdev@kapio-technology.com> References: <20221205185908.217520-1-netdev@kapio-technology.com> MIME-Version: 1.0 Organization: Westermo Network Technologies AB Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1751401839042081439?= X-GMAIL-MSGID: =?utf-8?q?1751401839042081439?= |
Series |
mv88e6xxx: Add MAB offload support
|
|
Commit Message
Hans Schultz
Dec. 5, 2022, 6:59 p.m. UTC
The default return value -EOPNOTSUPP of mv88e6xxx_port_bridge_flags()
came from the return value of the DSA method port_egress_floods() in
commit 4f85901f0063 ("net: dsa: mv88e6xxx: add support for bridge flags"),
but the DSA API was changed in commit a8b659e7ff75 ("net: dsa: act as
passthrough for bridge port flags"), resulting in the return value
-EOPNOTSUPP not being valid anymore.
Signed-off-by: Hans J. Schultz <netdev@kapio-technology.com>
---
drivers/net/dsa/mv88e6xxx/chip.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Comments
On Mon, Dec 05, 2022 at 07:59:07PM +0100, Hans J. Schultz wrote: > The default return value -EOPNOTSUPP of mv88e6xxx_port_bridge_flags() > came from the return value of the DSA method port_egress_floods() in > commit 4f85901f0063 ("net: dsa: mv88e6xxx: add support for bridge flags"), > but the DSA API was changed in commit a8b659e7ff75 ("net: dsa: act as > passthrough for bridge port flags"), resulting in the return value > -EOPNOTSUPP not being valid anymore. The commit message needs to explain the motivation for the change and why the change is not a bug fix / safe. I guess the motivation is the next patch where a change in the MAB flag cannot fail and therefore it has no reason to reset the 'err' variable. The change is only safe if upper layers only invoke the operation when supported bridge port flags are changed. That is, the default error code is never used.
diff --git a/drivers/net/dsa/mv88e6xxx/chip.c b/drivers/net/dsa/mv88e6xxx/chip.c index ccfa4751d3b7..66d7eae24ce0 100644 --- a/drivers/net/dsa/mv88e6xxx/chip.c +++ b/drivers/net/dsa/mv88e6xxx/chip.c @@ -6543,7 +6543,7 @@ static int mv88e6xxx_port_bridge_flags(struct dsa_switch *ds, int port, struct netlink_ext_ack *extack) { struct mv88e6xxx_chip *chip = ds->priv; - int err = -EOPNOTSUPP; + int err = 0; mv88e6xxx_reg_lock(chip);