Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp2988685pxb; Mon, 18 Apr 2022 12:48:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJywJn6xESQaVTnchStfsEnMoo4Pk9kkx2xzn79JDolPmmYva3K5tUE0zOmMFO4slaf9EbSz X-Received: by 2002:a17:907:3fa6:b0:6e8:a222:3ba1 with SMTP id hr38-20020a1709073fa600b006e8a2223ba1mr10737154ejc.461.1650311303470; Mon, 18 Apr 2022 12:48:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650311303; cv=none; d=google.com; s=arc-20160816; b=05dGZtfiDmIMFNYcMFqykR40Kf9/wpZ7fHL0J+Qt3q727KajzjFcCS3spTWECcbbKh fROt0Jg9KbNHBJbuJYi3uY5bykaafmQsG+DZQ6YfkEBsjjpSR53Rz35TzR4z1T0gDl6Y JRNAQ0HQQrvFOnGMSkjn9toQDJJmBMoGlo5xwjKTRhoZxc9WZnX/iSRxwQieUXr+Q3co leyOw1T5XMtmZOm6p1HwiFN82df5TrfiHFT0H/Fp/o/L17zIHHLsO1pi7L4tBH7Mq3fB tnOLUjgVRqVKX07e49iMJIuyR9AeUgw66e5ZdamU9pfxL7J+qsGQ0MSg/Tao+61Xo8fS J9UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=36byMqdtDxWlQfqpZ7sPEK3Z5zba3G0UBE0hyTDvDfk=; b=Zg+ONZ2J6wMhOTFGZ3Ca2fyci54tkwMVTluvYwJMojNP7nAMKeLqky4SsOnKvrsExe XsaI22xYj919CAzBGUWM/jCwYaO6drQHX9cJh6O02yqdOvP2hgubd76wcJbQrR+5tLPm VPzpKZwZArnLi/C3JSpV2ZLUupiGagcwRg5WtBtHgqfiOX9GNVe4Rxj9hcNvjpT84siL V65JbPfwxv+x3UPyx7PkhW65NYwmmTLjs5R5/NLHEnQxGioz1C6LA4b0uNFNM92FPt0k edveOQnr/kzcHJkejP9zla7ifMHgBOQAimNvKr91aHJq3Gj7nRUXgFt/69WNhsdh+Liq O8EA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="n/8ZTNxu"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s17-20020a1709067b9100b006e8b30f5060si7259850ejo.981.2022.04.18.12.47.58; Mon, 18 Apr 2022 12:48:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="n/8ZTNxu"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235046AbiDRMeK (ORCPT + 99 others); Mon, 18 Apr 2022 08:34:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238972AbiDRM1f (ORCPT ); Mon, 18 Apr 2022 08:27:35 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E6A881D0CB; Mon, 18 Apr 2022 05:21:01 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id C9C7CB80EDB; Mon, 18 Apr 2022 12:20:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2086CC385A8; Mon, 18 Apr 2022 12:20:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1650284458; bh=wcPlPnh2qViyo5jp28WdnDo3WOOO2Zu7J2KmS57eJt0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=n/8ZTNxuc71KzKRGtdorkfs+7NSBQbrZp8ByxSNHb9fKK3rEcSDBAEwjGjEBx9yFh gRCruPtnD3CWZx/Y5h/HfykqD5bPNyjzyCDhsQGgbjt3WxXZaeCI0VHuo1VxYkkLdX 6siLUh5bD88uYbEGJj/0AIIpXUl5iBVrYkjzHc2o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Horatiu Vultur , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.17 104/219] net: lan966x: Fix when a ports upper is changed. Date: Mon, 18 Apr 2022 14:11:13 +0200 Message-Id: <20220418121209.804793703@linuxfoundation.org> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220418121203.462784814@linuxfoundation.org> References: <20220418121203.462784814@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Horatiu Vultur [ Upstream commit d7a947d289dc205fc717c004dcebe33b15305afd ] On lan966x it is not allowed to have foreign interfaces under a bridge which already contains lan966x ports. So when a port leaves the bridge it would call switchdev_bridge_port_unoffload which eventually will notify the other ports that bridge left the vlan group but that is not true because the bridge is still part of the vlan group. Therefore when a port leaves the bridge, stop generating replays because already the HW cleared after itself and the other ports don't need to do anything else. Fixes: cf2f60897e921e ("net: lan966x: Add support to offload the forwarding.") Signed-off-by: Horatiu Vultur Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/ethernet/microchip/lan966x/lan966x_switchdev.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/net/ethernet/microchip/lan966x/lan966x_switchdev.c b/drivers/net/ethernet/microchip/lan966x/lan966x_switchdev.c index 7de55f6a4da8..3c987fd6b9e2 100644 --- a/drivers/net/ethernet/microchip/lan966x/lan966x_switchdev.c +++ b/drivers/net/ethernet/microchip/lan966x/lan966x_switchdev.c @@ -261,8 +261,7 @@ static int lan966x_port_prechangeupper(struct net_device *dev, if (netif_is_bridge_master(info->upper_dev) && !info->linking) switchdev_bridge_port_unoffload(port->dev, port, - &lan966x_switchdev_nb, - &lan966x_switchdev_blocking_nb); + NULL, NULL); return NOTIFY_DONE; } -- 2.35.1