Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp7370137rwb; Tue, 6 Dec 2022 05:04:03 -0800 (PST) X-Google-Smtp-Source: AA0mqf6jshswP7ykbEp+fWysW98pQEwz4Z3HAxpW5JPIZ/9/k5zxqk8SXVrcXVXdjeGr4vS6qzHC X-Received: by 2002:a63:d52:0:b0:477:66cb:b99 with SMTP id 18-20020a630d52000000b0047766cb0b99mr61423643pgn.10.1670331843310; Tue, 06 Dec 2022 05:04:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670331843; cv=none; d=google.com; s=arc-20160816; b=c1MuwlPJue7Sz8wDBKoAs7tjdj6KLKpKPzVVwYrSZzd3jzDdvIFms8vr2dDCz0v4v2 SNnaKa4cO8kjZQA623afPoHKZ72Ti8FH0lG3vthpP3AImNmr3NTUBMaKYORoaQc9s47M xaw1UdI/WokIWygoqHl4R3aFjM5lfXjDz7FELuiGK3+CjNhE6WTfuyA6z9cmt+aSTOfJ jEqXCkC2wb+GPGbLh9eBH3KHzV/4x7XMHm2EnYannXDn2XnWhhiDfWQszFLKdGjIpWv1 cYkUKYiv7BRSO+Wb5Ucx2YWYSDCiCUYkmYlyR7il18TsTpdE15XEvq7q1S/7aNr4A6s/ 8GZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:feedback-id :dkim-signature; bh=jE2AKhiday7rIVXVatfMZmacEC94FeR0G3T3H1swJ8Y=; b=szLf6QKDiq6qnoQu9TJcyeLDY9vYvvpC0+lkBOzc/zn/7W1/iVONky8tkFDF/x1o6q uX/kDWtnZ0J5TOUQLM+4qdKVC6RYVtS97kc5o56ae2JgHCp8Kno9DZLL/t8k58kxjyD/ /siCJ3eCm9/1yfbqmOOY247sOnzfkf4jnsFOugR2Q+c564w6c5ykwfYnPHw3PxznCikY MSspYrR/vW524VLfXIFjk/Gj9EVvmR0qyOjZe2+fHc/kquy+1MWzg4dHkfDkNZWzpQ1T ULNMcqXuaiAqYUcfriL9rpAlx9HolEfNXDCZY3+TX6IufwB4PRpv5xkV/aZ5/GuVgEsI aAHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=Ny7jLi5P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z5-20020a62d105000000b005761cb3b171si14031649pfg.250.2022.12.06.05.03.52; Tue, 06 Dec 2022 05:04:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=Ny7jLi5P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232604AbiLFMam (ORCPT + 80 others); Tue, 6 Dec 2022 07:30:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44626 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231888AbiLFMak (ORCPT ); Tue, 6 Dec 2022 07:30:40 -0500 Received: from wout2-smtp.messagingengine.com (wout2-smtp.messagingengine.com [64.147.123.25]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 71EFD28E2C; Tue, 6 Dec 2022 04:30:38 -0800 (PST) Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.west.internal (Postfix) with ESMTP id D970C32009D6; Tue, 6 Dec 2022 07:30:36 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Tue, 06 Dec 2022 07:30:37 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:date:date:feedback-id :feedback-id:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; t=1670329836; x=1670416236; bh=jE2AKhiday7rIVXVatfMZmacEC94 FeR0G3T3H1swJ8Y=; b=Ny7jLi5P8j4TjF5rVK3gvSYaXgEW6vskaSmN3qdDP2iQ 5nmHAUY5r8RySL+guzL//8B9pYMy5aASBysH0BW4/wlAsJDqvAtHMKL3ABnsQgSa BMgKqhJgI36dhqlYSsQgcvyGxhPtaWJL1SqaUkDBV7gI+qezOd4AidpS964O90A0 zogMaWgu/FfmN7aD8YJi+Os6W/viOxWlCYkqIPeh1DpbhXUc7YZA3aspKRyD4TTS 3BnjrlpyuAXZhPfkytGsj2d9cGOrYa8Qi8e3yRF9N1TFGEm3CLyt7BWKsD6qdl/K Li7NE1Ul/MR80TvoctNk3f4qZcxP+PoC1qtRdMN2dg== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrudeigdegtdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpeffhffvvefukfhfgggtuggjsehttdertddttddvnecuhfhrohhmpefkughoucfu tghhihhmmhgvlhcuoehiughoshgthhesihguohhstghhrdhorhhgqeenucggtffrrghtth gvrhhnpedvudefveekheeugeeftddvveefgfduieefudeifefgleekheegleegjeejgeeg hfenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehiug hoshgthhesihguohhstghhrdhorhhg X-ME-Proxy: Feedback-ID: i494840e7:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Tue, 6 Dec 2022 07:30:34 -0500 (EST) Date: Tue, 6 Dec 2022 14:30:29 +0200 From: Ido Schimmel To: "Hans J. Schultz" Cc: davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, Andrew Lunn , Florian Fainelli , Vladimir Oltean , Eric Dumazet , Paolo Abeni , open list Subject: Re: [PATCH net-next 2/3] net: dsa: mv88e6xxx: change default return of mv88e6xxx_port_bridge_flags Message-ID: References: <20221205185908.217520-1-netdev@kapio-technology.com> <20221205185908.217520-3-netdev@kapio-technology.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221205185908.217520-3-netdev@kapio-technology.com> X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 05, 2022 at 07:59:07PM +0100, Hans J. Schultz wrote: > The default return value -EOPNOTSUPP of mv88e6xxx_port_bridge_flags() > came from the return value of the DSA method port_egress_floods() in > commit 4f85901f0063 ("net: dsa: mv88e6xxx: add support for bridge flags"), > but the DSA API was changed in commit a8b659e7ff75 ("net: dsa: act as > passthrough for bridge port flags"), resulting in the return value > -EOPNOTSUPP not being valid anymore. The commit message needs to explain the motivation for the change and why the change is not a bug fix / safe. I guess the motivation is the next patch where a change in the MAB flag cannot fail and therefore it has no reason to reset the 'err' variable. The change is only safe if upper layers only invoke the operation when supported bridge port flags are changed. That is, the default error code is never used.