Commit 49259301 authored by David S. Miller's avatar David S. Miller

Merge branch 'dsa-core-vlan'

Vladimir Oltean says:

====================
Improvements to DSA core VLAN manipulation

In preparation of submitting the NXP SJA1105 driver, the Broadcom b53
and Mediatek mt7530 drivers have been found to apply some VLAN
workarounds that are needed in the new driver as well.

Therefore this patchset is mostly simply promoting the DSA driver
workarounds for VLAN to the generic code.

The b53 driver was applying a few workarounds in order to convince DSA
that its vlan_filtering setting is not really per-port. This is now
simply set by the driver via a DSA variable at probe time. The sja1105
driver will be a second user of this.

The mt7530 was also keeping track of when the .port_vlan_filtering
callback was being called. Remove the kept state from this driver
and simplify dealing with vlan_filtering in the generic case.

TODO:

Find the best way to deal generically with the situation described below
(discussion at https://lkml.org/lkml/2019/4/16/1355):

> > +Segregating the switch ports in multiple bridges is supported (e.g. 2 + 2), but
> > +all bridges should have the same level of VLAN awareness (either both have
> > +``vlan_filtering`` 0, or both 1). Also an inevitable limitation of the fact
> > +that VLAN awareness is global at the switch level is that once a bridge with
> > +``vlan_filtering`` enslaves at least one switch port, the other un-bridged
> > +ports are no longer available for standalone traffic termination.
>
> That is quite a limitation that I don't think I had fully grasped until
> reading your different patches. Since enslaving ports into a bridge
> comes after the network device was already made available for use, maybe
> you should force the carrier down or something along those lines as soon
> as a port is enslaved into a bridge with vlan_filtering=1 to make this
> more predictable for the user?
====================
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parents a658a3f2 314f76d7
...@@ -428,7 +428,6 @@ static void b53_enable_vlan(struct b53_device *dev, bool enable, ...@@ -428,7 +428,6 @@ static void b53_enable_vlan(struct b53_device *dev, bool enable,
b53_write8(dev, B53_CTRL_PAGE, B53_SWITCH_MODE, mgmt); b53_write8(dev, B53_CTRL_PAGE, B53_SWITCH_MODE, mgmt);
dev->vlan_enabled = enable; dev->vlan_enabled = enable;
dev->vlan_filtering_enabled = enable_filtering;
} }
static int b53_set_jumbo(struct b53_device *dev, bool enable, bool allow_10_100) static int b53_set_jumbo(struct b53_device *dev, bool enable, bool allow_10_100)
...@@ -665,7 +664,7 @@ int b53_configure_vlan(struct dsa_switch *ds) ...@@ -665,7 +664,7 @@ int b53_configure_vlan(struct dsa_switch *ds)
b53_do_vlan_op(dev, VTA_CMD_CLEAR); b53_do_vlan_op(dev, VTA_CMD_CLEAR);
} }
b53_enable_vlan(dev, false, dev->vlan_filtering_enabled); b53_enable_vlan(dev, false, ds->vlan_filtering);
b53_for_each_port(dev, i) b53_for_each_port(dev, i)
b53_write16(dev, B53_VLAN_PAGE, b53_write16(dev, B53_VLAN_PAGE,
...@@ -966,6 +965,13 @@ static int b53_setup(struct dsa_switch *ds) ...@@ -966,6 +965,13 @@ static int b53_setup(struct dsa_switch *ds)
b53_disable_port(ds, port); b53_disable_port(ds, port);
} }
/* Let DSA handle the case were multiple bridges span the same switch
* device and different VLAN awareness settings are requested, which
* would be breaking filtering semantics for any of the other bridge
* devices. (not hardware supported)
*/
ds->vlan_filtering_is_global = true;
return ret; return ret;
} }
...@@ -1275,35 +1281,17 @@ EXPORT_SYMBOL(b53_phylink_mac_link_up); ...@@ -1275,35 +1281,17 @@ EXPORT_SYMBOL(b53_phylink_mac_link_up);
int b53_vlan_filtering(struct dsa_switch *ds, int port, bool vlan_filtering) int b53_vlan_filtering(struct dsa_switch *ds, int port, bool vlan_filtering)
{ {
struct b53_device *dev = ds->priv; struct b53_device *dev = ds->priv;
struct net_device *bridge_dev;
unsigned int i;
u16 pvid, new_pvid; u16 pvid, new_pvid;
/* Handle the case were multiple bridges span the same switch device
* and one of them has a different setting than what is being requested
* which would be breaking filtering semantics for any of the other
* bridge devices.
*/
b53_for_each_port(dev, i) {
bridge_dev = dsa_to_port(ds, i)->bridge_dev;
if (bridge_dev &&
bridge_dev != dsa_to_port(ds, port)->bridge_dev &&
br_vlan_enabled(bridge_dev) != vlan_filtering) {
netdev_err(bridge_dev,
"VLAN filtering is global to the switch!\n");
return -EINVAL;
}
}
b53_read16(dev, B53_VLAN_PAGE, B53_VLAN_PORT_DEF_TAG(port), &pvid); b53_read16(dev, B53_VLAN_PAGE, B53_VLAN_PORT_DEF_TAG(port), &pvid);
new_pvid = pvid; new_pvid = pvid;
if (dev->vlan_filtering_enabled && !vlan_filtering) { if (!vlan_filtering) {
/* Filtering is currently enabled, use the default PVID since /* Filtering is currently enabled, use the default PVID since
* the bridge does not expect tagging anymore * the bridge does not expect tagging anymore
*/ */
dev->ports[port].pvid = pvid; dev->ports[port].pvid = pvid;
new_pvid = b53_default_pvid(dev); new_pvid = b53_default_pvid(dev);
} else if (!dev->vlan_filtering_enabled && vlan_filtering) { } else {
/* Filtering is currently disabled, restore the previous PVID */ /* Filtering is currently disabled, restore the previous PVID */
new_pvid = dev->ports[port].pvid; new_pvid = dev->ports[port].pvid;
} }
...@@ -1329,7 +1317,7 @@ int b53_vlan_prepare(struct dsa_switch *ds, int port, ...@@ -1329,7 +1317,7 @@ int b53_vlan_prepare(struct dsa_switch *ds, int port,
if (vlan->vid_end > dev->num_vlans) if (vlan->vid_end > dev->num_vlans)
return -ERANGE; return -ERANGE;
b53_enable_vlan(dev, true, dev->vlan_filtering_enabled); b53_enable_vlan(dev, true, ds->vlan_filtering);
return 0; return 0;
} }
......
...@@ -139,7 +139,6 @@ struct b53_device { ...@@ -139,7 +139,6 @@ struct b53_device {
unsigned int num_vlans; unsigned int num_vlans;
struct b53_vlan *vlans; struct b53_vlan *vlans;
bool vlan_enabled; bool vlan_enabled;
bool vlan_filtering_enabled;
unsigned int num_ports; unsigned int num_ports;
struct b53_port *ports; struct b53_port *ports;
}; };
......
...@@ -828,11 +828,9 @@ mt7530_port_set_vlan_unaware(struct dsa_switch *ds, int port) ...@@ -828,11 +828,9 @@ mt7530_port_set_vlan_unaware(struct dsa_switch *ds, int port)
mt7530_rmw(priv, MT7530_PVC_P(port), VLAN_ATTR_MASK, mt7530_rmw(priv, MT7530_PVC_P(port), VLAN_ATTR_MASK,
VLAN_ATTR(MT7530_VLAN_TRANSPARENT)); VLAN_ATTR(MT7530_VLAN_TRANSPARENT));
priv->ports[port].vlan_filtering = false;
for (i = 0; i < MT7530_NUM_PORTS; i++) { for (i = 0; i < MT7530_NUM_PORTS; i++) {
if (dsa_is_user_port(ds, i) && if (dsa_is_user_port(ds, i) &&
priv->ports[i].vlan_filtering) { dsa_port_is_vlan_filtering(&ds->ports[i])) {
all_user_ports_removed = false; all_user_ports_removed = false;
break; break;
} }
...@@ -891,8 +889,8 @@ mt7530_port_bridge_leave(struct dsa_switch *ds, int port, ...@@ -891,8 +889,8 @@ mt7530_port_bridge_leave(struct dsa_switch *ds, int port,
* And the other port's port matrix cannot be broken when the * And the other port's port matrix cannot be broken when the
* other port is still a VLAN-aware port. * other port is still a VLAN-aware port.
*/ */
if (!priv->ports[i].vlan_filtering && if (dsa_is_user_port(ds, i) && i != port &&
dsa_is_user_port(ds, i) && i != port) { !dsa_port_is_vlan_filtering(&ds->ports[i])) {
if (dsa_to_port(ds, i)->bridge_dev != bridge) if (dsa_to_port(ds, i)->bridge_dev != bridge)
continue; continue;
if (priv->ports[i].enable) if (priv->ports[i].enable)
...@@ -910,8 +908,6 @@ mt7530_port_bridge_leave(struct dsa_switch *ds, int port, ...@@ -910,8 +908,6 @@ mt7530_port_bridge_leave(struct dsa_switch *ds, int port,
PCR_MATRIX(BIT(MT7530_CPU_PORT))); PCR_MATRIX(BIT(MT7530_CPU_PORT)));
priv->ports[port].pm = PCR_MATRIX(BIT(MT7530_CPU_PORT)); priv->ports[port].pm = PCR_MATRIX(BIT(MT7530_CPU_PORT));
mt7530_port_set_vlan_unaware(ds, port);
mutex_unlock(&priv->reg_mutex); mutex_unlock(&priv->reg_mutex);
} }
...@@ -1013,10 +1009,6 @@ static int ...@@ -1013,10 +1009,6 @@ static int
mt7530_port_vlan_filtering(struct dsa_switch *ds, int port, mt7530_port_vlan_filtering(struct dsa_switch *ds, int port,
bool vlan_filtering) bool vlan_filtering)
{ {
struct mt7530_priv *priv = ds->priv;
priv->ports[port].vlan_filtering = vlan_filtering;
if (vlan_filtering) { if (vlan_filtering) {
/* The port is being kept as VLAN-unaware port when bridge is /* The port is being kept as VLAN-unaware port when bridge is
* set up with vlan_filtering not being set, Otherwise, the * set up with vlan_filtering not being set, Otherwise, the
...@@ -1025,6 +1017,8 @@ mt7530_port_vlan_filtering(struct dsa_switch *ds, int port, ...@@ -1025,6 +1017,8 @@ mt7530_port_vlan_filtering(struct dsa_switch *ds, int port,
*/ */
mt7530_port_set_vlan_aware(ds, port); mt7530_port_set_vlan_aware(ds, port);
mt7530_port_set_vlan_aware(ds, MT7530_CPU_PORT); mt7530_port_set_vlan_aware(ds, MT7530_CPU_PORT);
} else {
mt7530_port_set_vlan_unaware(ds, port);
} }
return 0; return 0;
...@@ -1139,7 +1133,7 @@ mt7530_port_vlan_add(struct dsa_switch *ds, int port, ...@@ -1139,7 +1133,7 @@ mt7530_port_vlan_add(struct dsa_switch *ds, int port,
/* The port is kept as VLAN-unaware if bridge with vlan_filtering not /* The port is kept as VLAN-unaware if bridge with vlan_filtering not
* being set. * being set.
*/ */
if (!priv->ports[port].vlan_filtering) if (!dsa_port_is_vlan_filtering(&ds->ports[port]))
return; return;
mutex_lock(&priv->reg_mutex); mutex_lock(&priv->reg_mutex);
...@@ -1170,7 +1164,7 @@ mt7530_port_vlan_del(struct dsa_switch *ds, int port, ...@@ -1170,7 +1164,7 @@ mt7530_port_vlan_del(struct dsa_switch *ds, int port,
/* The port is kept as VLAN-unaware if bridge with vlan_filtering not /* The port is kept as VLAN-unaware if bridge with vlan_filtering not
* being set. * being set.
*/ */
if (!priv->ports[port].vlan_filtering) if (!dsa_port_is_vlan_filtering(&ds->ports[port]))
return 0; return 0;
mutex_lock(&priv->reg_mutex); mutex_lock(&priv->reg_mutex);
......
...@@ -410,7 +410,6 @@ struct mt7530_port { ...@@ -410,7 +410,6 @@ struct mt7530_port {
bool enable; bool enable;
u32 pm; u32 pm;
u16 pvid; u16 pvid;
bool vlan_filtering;
}; };
/* struct mt7530_priv - This is the main data structure for holding the state /* struct mt7530_priv - This is the main data structure for holding the state
......
...@@ -161,6 +161,7 @@ struct dsa_port { ...@@ -161,6 +161,7 @@ struct dsa_port {
const char *mac; const char *mac;
struct device_node *dn; struct device_node *dn;
unsigned int ageing_time; unsigned int ageing_time;
bool vlan_filtering;
u8 stp_state; u8 stp_state;
struct net_device *bridge_dev; struct net_device *bridge_dev;
struct devlink_port devlink_port; struct devlink_port devlink_port;
...@@ -227,6 +228,16 @@ struct dsa_switch { ...@@ -227,6 +228,16 @@ struct dsa_switch {
/* Number of switch port queues */ /* Number of switch port queues */
unsigned int num_tx_queues; unsigned int num_tx_queues;
/* Disallow bridge core from requesting different VLAN awareness
* settings on ports if not hardware-supported
*/
bool vlan_filtering_is_global;
/* In case vlan_filtering_is_global is set, the VLAN awareness state
* should be retrieved from here and not from the per-port settings.
*/
bool vlan_filtering;
unsigned long *bitmap; unsigned long *bitmap;
unsigned long _bitmap; unsigned long _bitmap;
...@@ -294,6 +305,16 @@ static inline unsigned int dsa_upstream_port(struct dsa_switch *ds, int port) ...@@ -294,6 +305,16 @@ static inline unsigned int dsa_upstream_port(struct dsa_switch *ds, int port)
return dsa_towards_port(ds, cpu_dp->ds->index, cpu_dp->index); return dsa_towards_port(ds, cpu_dp->ds->index, cpu_dp->index);
} }
static inline bool dsa_port_is_vlan_filtering(const struct dsa_port *dp)
{
const struct dsa_switch *ds = dp->ds;
if (ds->vlan_filtering_is_global)
return ds->vlan_filtering;
else
return dp->vlan_filtering;
}
typedef int dsa_fdb_dump_cb_t(const unsigned char *addr, u16 vid, typedef int dsa_fdb_dump_cb_t(const unsigned char *addr, u16 vid,
bool is_static, void *data); bool is_static, void *data);
struct dsa_switch_ops { struct dsa_switch_ops {
......
...@@ -171,6 +171,8 @@ int dsa_port_vlan_add(struct dsa_port *dp, ...@@ -171,6 +171,8 @@ int dsa_port_vlan_add(struct dsa_port *dp,
struct switchdev_trans *trans); struct switchdev_trans *trans);
int dsa_port_vlan_del(struct dsa_port *dp, int dsa_port_vlan_del(struct dsa_port *dp,
const struct switchdev_obj_port_vlan *vlan); const struct switchdev_obj_port_vlan *vlan);
int dsa_port_vid_add(struct dsa_port *dp, u16 vid, u16 flags);
int dsa_port_vid_del(struct dsa_port *dp, u16 vid);
int dsa_port_link_register_of(struct dsa_port *dp); int dsa_port_link_register_of(struct dsa_port *dp);
void dsa_port_link_unregister_of(struct dsa_port *dp); void dsa_port_link_unregister_of(struct dsa_port *dp);
......
...@@ -154,19 +154,67 @@ void dsa_port_bridge_leave(struct dsa_port *dp, struct net_device *br) ...@@ -154,19 +154,67 @@ void dsa_port_bridge_leave(struct dsa_port *dp, struct net_device *br)
dsa_port_set_state_now(dp, BR_STATE_FORWARDING); dsa_port_set_state_now(dp, BR_STATE_FORWARDING);
} }
static bool dsa_port_can_apply_vlan_filtering(struct dsa_port *dp,
bool vlan_filtering)
{
struct dsa_switch *ds = dp->ds;
int i;
if (!ds->vlan_filtering_is_global)
return true;
/* For cases where enabling/disabling VLAN awareness is global to the
* switch, we need to handle the case where multiple bridges span
* different ports of the same switch device and one of them has a
* different setting than what is being requested.
*/
for (i = 0; i < ds->num_ports; i++) {
struct net_device *other_bridge;
other_bridge = dsa_to_port(ds, i)->bridge_dev;
if (!other_bridge)
continue;
/* If it's the same bridge, it also has same
* vlan_filtering setting => no need to check
*/
if (other_bridge == dp->bridge_dev)
continue;
if (br_vlan_enabled(other_bridge) != vlan_filtering) {
dev_err(ds->dev, "VLAN filtering is a global setting\n");
return false;
}
}
return true;
}
int dsa_port_vlan_filtering(struct dsa_port *dp, bool vlan_filtering, int dsa_port_vlan_filtering(struct dsa_port *dp, bool vlan_filtering,
struct switchdev_trans *trans) struct switchdev_trans *trans)
{ {
struct dsa_switch *ds = dp->ds; struct dsa_switch *ds = dp->ds;
int err;
/* bridge skips -EOPNOTSUPP, so skip the prepare phase */ /* bridge skips -EOPNOTSUPP, so skip the prepare phase */
if (switchdev_trans_ph_prepare(trans)) if (switchdev_trans_ph_prepare(trans))
return 0; return 0;
if (ds->ops->port_vlan_filtering) if (!ds->ops->port_vlan_filtering)
return ds->ops->port_vlan_filtering(ds, dp->index, return 0;
vlan_filtering);
if (!dsa_port_can_apply_vlan_filtering(dp, vlan_filtering))
return -EINVAL;
if (dsa_port_is_vlan_filtering(dp) == vlan_filtering)
return 0;
err = ds->ops->port_vlan_filtering(ds, dp->index,
vlan_filtering);
if (err)
return err;
if (ds->vlan_filtering_is_global)
ds->vlan_filtering = vlan_filtering;
else
dp->vlan_filtering = vlan_filtering;
return 0; return 0;
} }
...@@ -322,6 +370,37 @@ int dsa_port_vlan_del(struct dsa_port *dp, ...@@ -322,6 +370,37 @@ int dsa_port_vlan_del(struct dsa_port *dp,
return 0; return 0;
} }
int dsa_port_vid_add(struct dsa_port *dp, u16 vid, u16 flags)
{
struct switchdev_obj_port_vlan vlan = {
.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
.flags = flags,
.vid_begin = vid,
.vid_end = vid,
};
struct switchdev_trans trans;
int err;
trans.ph_prepare = true;
err = dsa_port_vlan_add(dp, &vlan, &trans);
if (err == -EOPNOTSUPP)
return 0;
trans.ph_prepare = false;
return dsa_port_vlan_add(dp, &vlan, &trans);
}
int dsa_port_vid_del(struct dsa_port *dp, u16 vid)
{
struct switchdev_obj_port_vlan vlan = {
.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
.vid_begin = vid,
.vid_end = vid,
};
return dsa_port_vlan_del(dp, &vlan);
}
static struct phy_device *dsa_port_get_phy_device(struct dsa_port *dp) static struct phy_device *dsa_port_get_phy_device(struct dsa_port *dp)
{ {
struct device_node *phy_dn; struct device_node *phy_dn;
......
...@@ -1001,13 +1001,6 @@ static int dsa_slave_vlan_rx_add_vid(struct net_device *dev, __be16 proto, ...@@ -1001,13 +1001,6 @@ static int dsa_slave_vlan_rx_add_vid(struct net_device *dev, __be16 proto,
u16 vid) u16 vid)
{ {
struct dsa_port *dp = dsa_slave_to_port(dev); struct dsa_port *dp = dsa_slave_to_port(dev);
struct switchdev_obj_port_vlan vlan = {
.vid_begin = vid,
.vid_end = vid,
/* This API only allows programming tagged, non-PVID VIDs */
.flags = 0,
};
struct switchdev_trans trans;
struct bridge_vlan_info info; struct bridge_vlan_info info;
int ret; int ret;
...@@ -1024,25 +1017,14 @@ static int dsa_slave_vlan_rx_add_vid(struct net_device *dev, __be16 proto, ...@@ -1024,25 +1017,14 @@ static int dsa_slave_vlan_rx_add_vid(struct net_device *dev, __be16 proto,
return -EBUSY; return -EBUSY;
} }
trans.ph_prepare = true; /* This API only allows programming tagged, non-PVID VIDs */
ret = dsa_port_vlan_add(dp, &vlan, &trans); return dsa_port_vid_add(dp, vid, 0);
if (ret == -EOPNOTSUPP)
return 0;
trans.ph_prepare = false;
return dsa_port_vlan_add(dp, &vlan, &trans);
} }
static int dsa_slave_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, static int dsa_slave_vlan_rx_kill_vid(struct net_device *dev, __be16 proto,
u16 vid) u16 vid)
{ {
struct dsa_port *dp = dsa_slave_to_port(dev); struct dsa_port *dp = dsa_slave_to_port(dev);
struct switchdev_obj_port_vlan vlan = {
.vid_begin = vid,
.vid_end = vid,
/* This API only allows programming tagged, non-PVID VIDs */
.flags = 0,
};
struct bridge_vlan_info info; struct bridge_vlan_info info;
int ret; int ret;
...@@ -1059,7 +1041,7 @@ static int dsa_slave_vlan_rx_kill_vid(struct net_device *dev, __be16 proto, ...@@ -1059,7 +1041,7 @@ static int dsa_slave_vlan_rx_kill_vid(struct net_device *dev, __be16 proto,
return -EBUSY; return -EBUSY;
} }
ret = dsa_port_vlan_del(dp, &vlan); ret = dsa_port_vid_del(dp, vid);
if (ret == -EOPNOTSUPP) if (ret == -EOPNOTSUPP)
ret = 0; ret = 0;
......
...@@ -10,6 +10,7 @@ ...@@ -10,6 +10,7 @@
* (at your option) any later version. * (at your option) any later version.
*/ */
#include <linux/if_bridge.h>
#include <linux/netdevice.h> #include <linux/netdevice.h>
#include <linux/notifier.h> #include <linux/notifier.h>
#include <linux/if_vlan.h> #include <linux/if_vlan.h>
...@@ -71,6 +72,9 @@ static int dsa_switch_bridge_join(struct dsa_switch *ds, ...@@ -71,6 +72,9 @@ static int dsa_switch_bridge_join(struct dsa_switch *ds,
static int dsa_switch_bridge_leave(struct dsa_switch *ds, static int dsa_switch_bridge_leave(struct dsa_switch *ds,
struct dsa_notifier_bridge_info *info) struct dsa_notifier_bridge_info *info)
{ {
bool unset_vlan_filtering = br_vlan_enabled(info->br);
int err, i;
if (ds->index == info->sw_index && ds->ops->port_bridge_leave) if (ds->index == info->sw_index && ds->ops->port_bridge_leave)
ds->ops->port_bridge_leave(ds, info->port, info->br); ds->ops->port_bridge_leave(ds, info->port, info->br);
...@@ -78,6 +82,31 @@ static int dsa_switch_bridge_leave(struct dsa_switch *ds, ...@@ -78,6 +82,31 @@ static int dsa_switch_bridge_leave(struct dsa_switch *ds,
ds->ops->crosschip_bridge_leave(ds, info->sw_index, info->port, ds->ops->crosschip_bridge_leave(ds, info->sw_index, info->port,
info->br); info->br);
/* If the bridge was vlan_filtering, the bridge core doesn't trigger an
* event for changing vlan_filtering setting upon slave ports leaving
* it. That is a good thing, because that lets us handle it and also
* handle the case where the switch's vlan_filtering setting is global
* (not per port). When that happens, the correct moment to trigger the
* vlan_filtering callback is only when the last port left this bridge.
*/
if (unset_vlan_filtering && ds->vlan_filtering_is_global) {
for (i = 0; i < ds->num_ports; i++) {
if (i == info->port)
continue;
if (dsa_to_port(ds, i)->bridge_dev == info->br) {
unset_vlan_filtering = false;
break;
}
}
}
if (unset_vlan_filtering) {
struct switchdev_trans trans = {0};
err = dsa_port_vlan_filtering(&ds->ports[info->port],
false, &trans);
if (err && err != EOPNOTSUPP)
return err;
}
return 0; return 0;
} }
...@@ -196,7 +225,7 @@ static int dsa_port_vlan_check(struct dsa_switch *ds, int port, ...@@ -196,7 +225,7 @@ static int dsa_port_vlan_check(struct dsa_switch *ds, int port,
if (!dp->bridge_dev) if (!dp->bridge_dev)
return err; return err;
/* dsa_slave_vlan_rx_{add,kill}_vid() cannot use the prepare pharse and /* dsa_slave_vlan_rx_{add,kill}_vid() cannot use the prepare phase and
* already checks whether there is an overlapping bridge VLAN entry * already checks whether there is an overlapping bridge VLAN entry
* with the same VID, so here we only need to check that if we are * with the same VID, so here we only need to check that if we are
* adding a bridge VLAN entry there is not an overlapping VLAN device * adding a bridge VLAN entry there is not an overlapping VLAN device
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment