Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp2912084rwl; Fri, 6 Jan 2023 12:36:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXvGrAjK1mXOGCAoqHwiH4tQymW8tnRc163OFzeyzVsXu2CPljpFJJPTljcB6+tmZyXLeUan X-Received: by 2002:a17:903:130a:b0:192:8425:641a with SMTP id iy10-20020a170903130a00b001928425641amr39845309plb.25.1673037390378; Fri, 06 Jan 2023 12:36:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673037390; cv=none; d=google.com; s=arc-20160816; b=S3ZGBuGyT9FYtA1Wcl/1PWPefrO04ERZFymXhTQHInjLhgBpzOMfiBWK+nNY1hEVra ZOzu3ct8q2s/Ay7l0Ob/18CtP88oeleivdh422JYewC1Tc1IJ3zpa6yzoA9/DRktnUm8 ra+3hw14afxCt0TU0m+lTAX4ZWUWJZ1eFrfIuEjK4+lfREo0V6xS+Axz8gIU+dHn7Um4 SxdG+FDASidESKEWfDCw5xvaX3RT+a4dms1oU8jk+aMqS3ZGJaaU1BbQVApt2iYa/27z Wy2mqEuf0cRBH9gxG3Zdhg38ubkGXSIzsfxXs+TtBegUf2yxEu0I0GSxsAPPZaFe/7qN RzSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=LtxE1WWcz2mwg+u+qXvN1LFM+etiuovAXABwARuW+Ug=; b=oDXsbSYJCJ6akeD7/4T0ix3O/1tiY5VVPrHFB0qRjwYMCfg4iHipunlptLNYIJY2ny lTQR5ouhU39W4DzMeWcacCQMFHvZnu7rqgK8BSU9fsozdwZLmo0xuKY85xjnbCyPwPjg HhanOvcrTUncAhdGFDctJk5sbANoBkEOpuBTgu5AGKyhoQYhFNvAbs2vtf8RY95LMFek HYLCWfdzDc+924dF+H3RtlN/oreM34Piok6semI2hu4bvjTXPnU853ak/KyyBx0+WIdp NKhhuR6jBpIKN6WgoJapM7A4ns8IDtqUifL642drRKfJAWfI1/CdXih48lfjj+Lgw2Ee 0B+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b=TrrLxCVR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b14-20020a170903228e00b0016ce3d67e7csi2007355plh.387.2023.01.06.12.36.23; Fri, 06 Jan 2023 12:36:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b=TrrLxCVR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236642AbjAFUMm (ORCPT + 55 others); Fri, 6 Jan 2023 15:12:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49032 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236639AbjAFULQ (ORCPT ); Fri, 6 Jan 2023 15:11:16 -0500 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4A4463AB02; Fri, 6 Jan 2023 12:11:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1673035863; x=1704571863; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=iNGgPBxl9mMcCW/EJLM/F3Imh9ZuEmThyhwpRRQ3fnM=; b=TrrLxCVR5nF8b+YuuDT6Hyh0FlKKeB2XlVwShV2CDDUIjzHKNBEiUtFS 5lfaJ9aM6JkwoVoAU3fRtUvK4c/GcT3deczxVmrH/yNSICtX4eY0iAGxc xrLwi59sX5+Wcz2wvz7QXcEnmqb5gOkGm/lxtFSEgDzhJiB2DJfLJX6qV VAm9Yz78nBXEt83TGfhXmMVJj6fBFacLgitV8jOTATXHVAXIccmY6pvmy IK0TwzJQ003PGKNZqGrJdHI+jlMD/YpVeuMBUI1uYZXaThJuBDxSfjh1o m2VCftpoldp40bDgqCcLbEYpONR3z9C/vqxfmhU5OFUta0wSJp0vZNwsA g==; X-IronPort-AV: E=Sophos;i="5.96,306,1665471600"; d="scan'208";a="191137480" Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa4.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 06 Jan 2023 13:11:00 -0700 Received: from chn-vm-ex04.mchp-main.com (10.10.85.152) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Fri, 6 Jan 2023 13:10:46 -0700 Received: from soft-dev3-1.microsemi.net (10.10.115.15) by chn-vm-ex04.mchp-main.com (10.10.85.152) with Microsoft SMTP Server id 15.1.2507.16 via Frontend Transport; Fri, 6 Jan 2023 13:10:44 -0700 From: Horatiu Vultur To: , CC: , , , , , , , Horatiu Vultur Subject: [PATCH] net: lan966x: Allow to add rules in TCAM even if not enabled Date: Fri, 6 Jan 2023 21:15:07 +0100 Message-ID: <20230106201507.2206113-1-horatiu.vultur@microchip.com> X-Mailer: git-send-email 2.38.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The blamed commit implemented the vcap_operations to allow to add an entry in the TCAM. One of the callbacks is to validate the supported keysets. If the TCAM lookup was not enabled, then this will return failure so no entries could be added. This doesn't make much sense, as you can enable at a later point the TCAM. Therefore change it such to allow entries in TCAM even it is not enabled. Fixes: 4426b78c626d ("net: lan966x: Add port keyset config and callback interface") Signed-off-by: Horatiu Vultur --- drivers/net/ethernet/microchip/lan966x/lan966x_vcap_impl.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/drivers/net/ethernet/microchip/lan966x/lan966x_vcap_impl.c b/drivers/net/ethernet/microchip/lan966x/lan966x_vcap_impl.c index d8dc9fbb81e1a..a54c0426a35f3 100644 --- a/drivers/net/ethernet/microchip/lan966x/lan966x_vcap_impl.c +++ b/drivers/net/ethernet/microchip/lan966x/lan966x_vcap_impl.c @@ -95,10 +95,7 @@ lan966x_vcap_is2_get_port_keysets(struct net_device *dev, int lookup, bool found = false; u32 val; - /* Check if the port keyset selection is enabled */ val = lan_rd(lan966x, ANA_VCAP_S2_CFG(port->chip_port)); - if (!ANA_VCAP_S2_CFG_ENA_GET(val)) - return -ENOENT; /* Collect all keysets for the port in a list */ if (l3_proto == ETH_P_ALL) -- 2.38.0