Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp1830111rdb; Thu, 7 Dec 2023 09:48:50 -0800 (PST) X-Google-Smtp-Source: AGHT+IF1BGxBTZhPIKIhov+LVvDice6YWP7/oXapbxt/pMeHqhGHubg5e0LXlt/jAR1UaquXT7tw X-Received: by 2002:a17:90a:cb88:b0:286:6cc1:2cce with SMTP id a8-20020a17090acb8800b002866cc12ccemr2624620pju.88.1701971330381; Thu, 07 Dec 2023 09:48:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701971330; cv=none; d=google.com; s=arc-20160816; b=hy5LSMmUDBm3CP2Wd8fl6wEb1+7JbeHf6moNDHAC/XLAjDVspHAWgLQ9fpUslcEVbn Aiz8IKmU1ksQP7JKc6f2ATKj0krOUjPZB0UfRFCT5LLi5LgJbtls77JTumw08xYsDmSy beH0UCAflDooyiFkntLx/g8gQxsm068BCLgwuF2sXRxUetnnyQjr6Su/g3gIrHshOLma y/vasLgc9dUKD3pBGOGNYl5WVKqJjm6KlsVm04MgB+bVUuW60rJhM4FVXE2TWtGU+Awy sarsJgV10yGdfv0SakehQ8Ru0iOG6t1GTcPHYOY5q5bmEGCSgqrlaOfhQ4rntmh800Cm m1Ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=eGdJaj+nipEQxTSveXAmiJV+rm4rc6npNn2uLL6bkbk=; fh=WETrUDnuvOCYsCJsPdS6NnV7iA07HpZzPDE1Btm3Nw0=; b=FlVnEMDq0EACxGR3SO+SN3G9YvqsPtImrLbcGD+GITYYByEdafOL5mE0B/6ttC2SbL RfUdJk1gRC0xSXYmVrXoks/UrRWf7D/hAWGdrdXnDA5Fl+Va3LYWiIGCi9a2HHot8Xox hGdZw+PXyYgsC8CtfGYqDsHNxmA6b5L+9NuzxkAi80ZYN0iWJ1yjjV1nXnbZ7mgIHbPY RixLDbEA5dMpqAoHThBhzsb5ougEXwBJLJ74VsZ7Yurum/6Dsg4PAgAu2uLF1gzOSBB4 uawjHRdKzi1coA1+YAMHejxYnx0Ya4DsZxFHtvNMWNmEBla5bHSck4m4SwWyFEP2+v19 Sd7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=an6VvtzU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id br16-20020a17090b0f1000b00288704afe2fsi186190pjb.67.2023.12.07.09.48.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 09:48:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=an6VvtzU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 6D31881C8D92; Thu, 7 Dec 2023 09:48:47 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1443560AbjLGRs3 (ORCPT + 99 others); Thu, 7 Dec 2023 12:48:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46802 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1443447AbjLGRs2 (ORCPT ); Thu, 7 Dec 2023 12:48:28 -0500 Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com [IPv6:2a00:1450:4864:20::631]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F0EA010D8; Thu, 7 Dec 2023 09:48:33 -0800 (PST) Received: by mail-ej1-x631.google.com with SMTP id a640c23a62f3a-a196f84d217so143860766b.3; Thu, 07 Dec 2023 09:48:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1701971312; x=1702576112; darn=vger.kernel.org; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date:from:to :cc:subject:date:message-id:reply-to; bh=eGdJaj+nipEQxTSveXAmiJV+rm4rc6npNn2uLL6bkbk=; b=an6VvtzU0EEaFRUlUuZLJoVHUwWcxJ8zwFF57JLsWwaDWofobR8N8yyuUzj0WpbCLN Jyb3Gqr+9DiqZD0IbB7dNUOKe4evMzbf1ETlZLnih2o+6qVT/619BWkV8XUlJDVHa+jr cJTit4ds4BkL4UDRNkjNrUCpdTqSKbJSRzwlpxA53xJwpM5tVQk+U3dH10bJPs2GY2MS M7ujvC6YCOFmirN0r72T+OBXMJiBGka7B86DHFPRMx0UnKHBhB7oTjBOOX03wVpQmJz1 BvU/4c6iSHgPtKQAOcoWMqWL6ad8JEDeyzqym4pEyWAdgJx2zxzD1b0dc/O8TcWd1BLn w0aQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701971312; x=1702576112; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=eGdJaj+nipEQxTSveXAmiJV+rm4rc6npNn2uLL6bkbk=; b=FqYrUOhL7AodBEvemskWWc6ZLrFMe0i74sCVf07NxyMY3Fe6g0Nh+Sqwecj5E0TxSL yoLD0bs8XO159YrxqkOCZauazweM7xUzY8LcLrisyWbNZLfmEjKenTocbfnaJi58jAIh HiAZCn8RQnQUS9jC0Wt1B1Ft9z0KtyUXuWmjY89cc5uM17fBXp9PAcCCPd8jAQ/4DzzB ptfNi1ujkVCYLZbvGMt0t5Qyq+8SElE2xAyfsD9aoHsJB6qO2A9I6SnfRFMOF4WP6Jsp XyB/wboY/Jat09Q4RpR1rCs/rwJQM6+gCMV5PsUvdxCXAF2KVBoVPRRDCzm1EEMX8rxE 2R6w== X-Gm-Message-State: AOJu0Yx9NBiCp9kry78FsL+RlDxdNMR9y+ROUAByR9NInV/q1HRaXOWA mpkb9sx95YOeup65U+Ks9tg= X-Received: by 2002:a17:906:c284:b0:a1d:2739:7772 with SMTP id r4-20020a170906c28400b00a1d27397772mr1598356ejz.147.1701971312110; Thu, 07 Dec 2023 09:48:32 -0800 (PST) Received: from skbuf ([188.27.185.68]) by smtp.gmail.com with ESMTPSA id vw11-20020a170907a70b00b00a1cbb055575sm17273ejc.180.2023.12.07.09.48.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 09:48:31 -0800 (PST) Date: Thu, 7 Dec 2023 19:48:29 +0200 From: Vladimir Oltean To: =?utf-8?B?QXLEsW7DpyDDnE5BTA==?= Cc: "Russell King (Oracle)" , Daniel Golle , Landen Chao , DENG Qingfang , Sean Wang , Andrew Lunn , Florian Fainelli , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Matthias Brugger , AngeloGioacchino Del Regno , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, Frank Wunderlich , Bartel Eerdekens , mithat.guner@xeront.com, erkin.bozoglu@xeront.com Subject: Re: [PATCH net-next 01/15] net: dsa: mt7530: always trap frames to active CPU port on MT7530 Message-ID: <20231207174829.jccyws7myhxbgr5k@skbuf> References: <20231118123205.266819-1-arinc.unal@arinc9.com> <20231118123205.266819-2-arinc.unal@arinc9.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Thu, 07 Dec 2023 09:48:47 -0800 (PST) On Sat, Dec 02, 2023 at 11:29:18AM +0300, Arınç ÜNAL wrote: > > I would be tempted to write this as: > > > > mask = BIT(cpu_dp->index); > > > > if (operational) > > priv->active_cpu_ports |= mask; > > else > > priv->active_cpu_ports &= ~mask; > > > > Now, what happens when active_cpu_ports is zero? Doesn't that mean there > > is no active CPU port? In which case, wouldn't disabling the CPU port > > direction be appropriate, such as: > > > > if (priv->active_cpu_ports) > > val = CPU_EN | CPU_PORT(__ffs(priv->active_cpu_ports)); > > else > > val = 0; > > > > mt7530_rmw(priv, MT7530_MFC, CPU_EN | CPU_PORT_MASK, val); > > > > ? > > In practice, it doesn't seem to matter. The CPU_EN bit enables the CPU port > defined on CPU_PORT_MASK which is used for trapping frames. No active CPU > ports would mean that all the DSA conduits are down. In that case, all the > user ports will be down also. So there won't be any traffic. But disabling > it is of course more appropriate here. Ack, DSA takes down the user ports which are affine to a certain conduit interface when that goes down. See the NETDEV_GOING_DOWN handling in net/dsa/user.c. > > > > > struct mt7530_priv { > > > struct device *dev; > > > @@ -786,6 +787,7 @@ struct mt7530_priv { > > > struct irq_domain *irq_domain; > > > u32 irq_enable; > > > int (*create_sgmii)(struct mt7530_priv *priv, bool dual_sgmii); > > > + unsigned long active_cpu_ports; > > > > So this will be 32 or 64 bit in size. Presumably you know how many CPU > > ports there can be, which looking at this code must be less than 8 as > > CPU_PORT_MASK is only 3 bits in size. So, maybe use a u8, and check > > that cpu_dp->index <= 7 ? We picked "unsigned long" as storage because that's also the size of the argument that __ffs() takes. But admittedly, we could have also stored a smaller variable and promote it to unsigned long when we pass it to __ffs(). > Aren't there other mechanisms to check that cpu_dp->index is a valid port? cpu_dp->index is guaranteed by DSA to be valid (according to the "reg" value from the device tree and smaller than ds->num_ports). It's just a question of balancing this kind of optimization with the possibility that a future switch appears which has more than MT7530_NUM_PORTS (7) ports. > At least with phylink_get_caps(), only ports lower than 7 will have proper > interface modes allowed. > > Here's the code after you and Vladimir's review: > > static void > mt753x_conduit_state_change(struct dsa_switch *ds, > const struct net_device *conduit, > bool operational) > { > struct dsa_port *cpu_dp = conduit->dsa_ptr; > struct mt7530_priv *priv = ds->priv; > u8 mask; > int val; > > /* Set the CPU port to trap frames to for MT7530. Trapped frames will be > * forwarded to the numerically smallest CPU port which the DSA conduit > * interface its affine to is up. > */ > if (priv->id != ID_MT7530 && priv->id != ID_MT7621) > return; > > mask = BIT(cpu_dp->index); > > if (operational) > priv->active_cpu_ports |= mask; > else > priv->active_cpu_ports &= ~mask; > > if (priv->active_cpu_ports) > val = CPU_EN | CPU_PORT(__ffs(priv->active_cpu_ports)); > else > val = 0; You could initialize "val" with 0 at declaration time and you wouldn't need the "else" branch. > > mt7530_rmw(priv, MT7530_MFC, CPU_EN | CPU_PORT_MASK, val); > } > > struct mt7530_priv { > [...] > u8 active_cpu_ports; > }; Actually, looking at the code now, I don't understand why we even keep track of the active_cpu_ports mask in the driver. We could read the MT7530_MFC register in mt753x_conduit_state_change(), flip the bit corresponding just to cpu_dp->index (rather than rmw all of CPU_PORT_MASK), and write back the result. And to address Russell's concern, we could test whether the resulting CPU_PORT_MASK portion of what we're going to write back is all-zeroes or not, and if it is, clear the CPU_EN bit, otherwise set it. > > > > > I would also suggest moving irq_enable after create_sgmii, to avoid > > holes in the struct. > > Sorry, I've got no idea about this. Could you explain why would there > possibly be holes in the struct with the current ordering of the members of > the mt7530_priv structure? > > Arınç FWIW: $ pahole -C mt7530_priv $KBUILD_OUTPUT/drivers/net/dsa/mt7530.o struct mt7530_priv { struct device * dev; /* 0 8 */ struct dsa_switch * ds; /* 8 8 */ struct mii_bus * bus; /* 16 8 */ struct regmap * regmap; /* 24 8 */ struct reset_control * rstc; /* 32 8 */ struct regulator * core_pwr; /* 40 8 */ struct regulator * io_pwr; /* 48 8 */ struct gpio_desc * reset; /* 56 8 */ /* --- cacheline 1 boundary (64 bytes) --- */ const struct mt753x_info * info; /* 64 8 */ unsigned int id; /* 72 4 */ bool mcm; /* 76 1 */ /* XXX 3 bytes hole, try to pack */ phy_interface_t p6_interface; /* 80 4 */ phy_interface_t p5_interface; /* 84 4 */ unsigned int p5_intf_sel; /* 88 4 */ u8 mirror_rx; /* 92 1 */ u8 mirror_tx; /* 93 1 */ /* XXX 2 bytes hole, try to pack */ struct mt7530_port ports[7]; /* 96 168 */ /* --- cacheline 4 boundary (256 bytes) was 8 bytes ago --- */ struct mt753x_pcs pcs[7]; /* 264 280 */ /* --- cacheline 8 boundary (512 bytes) was 32 bytes ago --- */ struct mutex reg_mutex; /* 544 32 */ /* --- cacheline 9 boundary (576 bytes) --- */ int irq; /* 576 4 */ /* XXX 4 bytes hole, try to pack */ struct irq_domain * irq_domain; /* 584 8 */ u32 irq_enable; /* 592 4 */ /* XXX 4 bytes hole, try to pack */ int (*create_sgmii)(struct mt7530_priv *, bool); /* 600 8 */ unsigned long active_cpu_ports; /* 608 8 */ /* size: 616, cachelines: 10, members: 24 */ /* sum members: 603, holes: 4, sum holes: 13 */ /* last cacheline: 40 bytes */ }; It's not like this makes any practical difference, as struct mt7530_priv isn't used from hot paths, but tidying it up is a good sign of clean, careful development, and of understanding memory alignment.