Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp70589ybz; Tue, 21 Apr 2020 04:59:02 -0700 (PDT) X-Google-Smtp-Source: APiQypK7GSi4BNqqZk4m+zlB36nwKrXQnxcAQdV98e5tVtagbEwU9stqCdHynrDPsue/kS6RBeNK X-Received: by 2002:a17:907:2645:: with SMTP id ar5mr21105993ejc.75.1587470341806; Tue, 21 Apr 2020 04:59:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587470341; cv=none; d=google.com; s=arc-20160816; b=0BEoI+RTsBX74NeU02YJzprBVTHA+vCbX87OU1Eyc2c4rag897jp+GYLcLFPxHSz7q 4fNRLZLivjm4UEgTgoNZC/s1sXugAIDcMBNE05WetJTwTCwYqKre8HO4e9Pc8xGtBM+c 2Ck6qFZO2TCZfAdRZ59nOAo7lCTlnLjDuLCwRuLmH37i7Ag8p2gI+K5n/5ekMjBlhkYv qgrtStsYOWj3KhjSNG+16liU2/wyaQ4HAdD3uwXSO4Ep8TZrGJYm8Hsk1AgyLmKBDcq1 QAcGIjVWbmKomb2dLR5XxbCOC4S+nmxvufgE2+IqEfmVJ+4+qfaHOrPiTWndFwqusPi9 S+/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=HDl4PcryGuPjgJh8iajtlR3OBsl1Kn7J0vY5z+ZmlDQ=; b=FmJgar11nzVklkCVqi1I43tpfBR+oWj8zvS8c2XecOviR+FO3qvWvwyHnzYT6atnKW C8ggz0nxh5b+nsQJVDzjPyFsNFy08U9NWaEpptIEtDNl2/6ShAzBFdeDQ1VUOAN2sLmE hMqg2XSLsgj1UovkzJDiQSJ9N1nXmWUHB0ZIL7AeTrECNWDFJDQYceRqngfSpRON2Ybr OzGV/t6jEhJl8xL9xBjDdR1wTCZPFSWKUpjxJSfRKU1afsbobACu+PdPkOyRv9uXM2Nz hXunToJ7xckuGq/5POzdWE/fz71XAFt0MUru9BaTyOwP6bdj9BvRU+v6OxaXJ+qEfL2s hdYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=FQK8jSBm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h10si1355483ejt.278.2020.04.21.04.58.38; Tue, 21 Apr 2020 04:59:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=FQK8jSBm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728689AbgDUL4u (ORCPT + 99 others); Tue, 21 Apr 2020 07:56:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53184 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726403AbgDUL4t (ORCPT ); Tue, 21 Apr 2020 07:56:49 -0400 Received: from mail-ed1-x542.google.com (mail-ed1-x542.google.com [IPv6:2a00:1450:4864:20::542]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 95F6DC061A0F; Tue, 21 Apr 2020 04:56:49 -0700 (PDT) Received: by mail-ed1-x542.google.com with SMTP id l3so7081752edq.13; Tue, 21 Apr 2020 04:56:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HDl4PcryGuPjgJh8iajtlR3OBsl1Kn7J0vY5z+ZmlDQ=; b=FQK8jSBm3fq1kmBDwPBY92h9XWiG4/47OGHLQx7mjNgD0YuiMeLzKlLHV06th5Tghl 6JjDzkbBNWH/jxmQj8kpLLjdS9cvxmYVMQA7jxf5ljQc7AKr6e6MzSS/l2bbPXopaAXS DmsWdo9943w3scHjLvFOHDfDeCffjlY6DnAIkAS5Ulqoa6D5fzZ5bTjAlYzbklCHQ66T 95wzL4IsPparxs0UYYk1qMEfk6KMAX9sGf3tZE6vELjjTNA11Wdh7tFW7HV5vQjr3BYX 6eGc9lgmpO7uY/aVX66i3Hv24F2PhKOALyHOq2GZBEu7J0kGPkU8zk6DCqNjJ7msUrl+ +Gjg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HDl4PcryGuPjgJh8iajtlR3OBsl1Kn7J0vY5z+ZmlDQ=; b=mVT8omN+WM0vFHfE/ykTNzrW0FgQpXUTIRujsMji8zTODdE14+JO2xI7vSQVEbInoz Ofn9eVB7PccBmQos6qI1o/Kx0wYn9fcZ7dOr/qBpNEJx9E4lx3GXRG3JtVw+3mNiwCCr M6gIwS5WDUmyR2nWuO+HY/ulXDrO5Nkp13tasVgun/F5sy8RF+aTOgf5RLCVltgFjaC+ W8JbrVKpNw+Q/1LJ7YAT4SL7LJ4cQMsckpEJDuyOmnSeH4GrltXqc+wxnn+WFUICO4zY MOAuJ6w3heeea8fx8T2Bu75FZ67PmRh6Fw2ujtsTlUTeEwdh+26YaIFOKjcflN6W2R8D vV9w== X-Gm-Message-State: AGi0Pua540wdUV1mi7ahtO3D0WsyKnMJU9w4txZWkbqGyHkr4qBN/iXq yvMKmc6b3S2j6625y/fkoCT3mU3yqfeDNwdoKec= X-Received: by 2002:a50:f288:: with SMTP id f8mr13696974edm.337.1587470208280; Tue, 21 Apr 2020 04:56:48 -0700 (PDT) MIME-Version: 1.0 References: <20200421113324.vxh2lyasylf5kgkz@pengutronix.de> In-Reply-To: <20200421113324.vxh2lyasylf5kgkz@pengutronix.de> From: Vladimir Oltean Date: Tue, 21 Apr 2020 14:56:37 +0300 Message-ID: Subject: Re: dsa: sja1105: regression after patch: "net: dsa: configure the MTU for switch ports" To: Oleksij Rempel Cc: mkl@pengutronix.de, Andrew Lunn , Vivien Didelot , Florian Fainelli , kernel@pengutronix.de, netdev , lkml , David Jander , Russell King - ARM Linux admin , "David S. Miller" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Oleksij, On Tue, 21 Apr 2020 at 14:33, Oleksij Rempel wrote: > > Hi Vladimir, > > I have a regression after this patch: > |commit bfcb813203e619a8960a819bf533ad2a108d8105 > |Author: Vladimir Oltean > | > | net: dsa: configure the MTU for switch ports > > with following log: > [ 3.044065] sja1105 spi1.0: Probed switch chip: SJA1105Q > [ 3.071385] sja1105 spi1.0: Enabled switch tagging > [ 3.076484] sja1105 spi1.0: error -34 setting MTU on port 0 > [ 3.082795] sja1105: probe of spi1.0 failed with error -34 > > this is devicetree snippet for the port 0: > port@0 { > reg = <0>; > label = "usb"; > phy-handle = <&usbeth_phy>; > phy-mode = "rmii"; > }; > > > Is it know issue? > > Regards, > Oleksij > -- > Pengutronix e.K. | | > Steuerwalder Str. 21 | http://www.pengutronix.de/ | > 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | > Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 | The code which is causing problems seems to be this one: mtu_limit = min_t(int, master->max_mtu, dev->max_mtu); old_master_mtu = master->mtu; new_master_mtu = largest_mtu + cpu_dp->tag_ops->overhead; if (new_master_mtu > mtu_limit) return -ERANGE; called from rtnl_lock(); ret = dsa_slave_change_mtu(slave_dev, ETH_DATA_LEN); rtnl_unlock(); if (ret && ret != -EOPNOTSUPP) { dev_err(ds->dev, "error %d setting MTU on port %d\n", ret, port->index); goto out_free; } Before this patch, it was silently failing, now it's preventing the probing of the ports which I might agree with you is not better. Andrew warned about this, and I guess that during probe, we should warn but ignore any nonzero return code, not just EOPNOTSUPP. I'll send a patch out shortly to correct this. Out of curiosity, what DSA master port do you have? Does it not support an MTU of 1504 bytes? Does MTU-sized traffic pass correctly through your interface? (you can test with iperf3) Thanks, -Vladimir