public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: "Greg Kroah-Hartman" <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev, "Daniel Golle" <daniel@makrotopia.org>,
	"Arınç ÜNAL" <arinc.unal@arinc9.com>,
	"Paolo Abeni" <pabeni@redhat.com>,
	"Sasha Levin" <sashal@kernel.org>
Subject: [PATCH 6.8 093/172] net: dsa: mt7530: trap link-local frames regardless of ST Port State
Date: Mon, 15 Apr 2024 16:19:52 +0200	[thread overview]
Message-ID: <20240415142003.217988974@linuxfoundation.org> (raw)
In-Reply-To: <20240415141959.976094777@linuxfoundation.org>

6.8-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Arınç ÜNAL <arinc.unal@arinc9.com>

[ Upstream commit 17c560113231ddc20088553c7b499b289b664311 ]

In Clause 5 of IEEE Std 802-2014, two sublayers of the data link layer
(DLL) of the Open Systems Interconnection basic reference model (OSI/RM)
are described; the medium access control (MAC) and logical link control
(LLC) sublayers. The MAC sublayer is the one facing the physical layer.

In 8.2 of IEEE Std 802.1Q-2022, the Bridge architecture is described. A
Bridge component comprises a MAC Relay Entity for interconnecting the Ports
of the Bridge, at least two Ports, and higher layer entities with at least
a Spanning Tree Protocol Entity included.

Each Bridge Port also functions as an end station and shall provide the MAC
Service to an LLC Entity. Each instance of the MAC Service is provided to a
distinct LLC Entity that supports protocol identification, multiplexing,
and demultiplexing, for protocol data unit (PDU) transmission and reception
by one or more higher layer entities.

It is described in 8.13.9 of IEEE Std 802.1Q-2022 that in a Bridge, the LLC
Entity associated with each Bridge Port is modeled as being directly
connected to the attached Local Area Network (LAN).

On the switch with CPU port architecture, CPU port functions as Management
Port, and the Management Port functionality is provided by software which
functions as an end station. Software is connected to an IEEE 802 LAN that
is wholly contained within the system that incorporates the Bridge.
Software provides access to the LLC Entity associated with each Bridge Port
by the value of the source port field on the special tag on the frame
received by software.

We call frames that carry control information to determine the active
topology and current extent of each Virtual Local Area Network (VLAN),
i.e., spanning tree or Shortest Path Bridging (SPB) and Multiple VLAN
Registration Protocol Data Units (MVRPDUs), and frames from other link
constrained protocols, such as Extensible Authentication Protocol over LAN
(EAPOL) and Link Layer Discovery Protocol (LLDP), link-local frames. They
are not forwarded by a Bridge. Permanently configured entries in the
filtering database (FDB) ensure that such frames are discarded by the
Forwarding Process. In 8.6.3 of IEEE Std 802.1Q-2022, this is described in
detail:

Each of the reserved MAC addresses specified in Table 8-1
(01-80-C2-00-00-[00,01,02,03,04,05,06,07,08,09,0A,0B,0C,0D,0E,0F]) shall be
permanently configured in the FDB in C-VLAN components and ERs.

Each of the reserved MAC addresses specified in Table 8-2
(01-80-C2-00-00-[01,02,03,04,05,06,07,08,09,0A,0E]) shall be permanently
configured in the FDB in S-VLAN components.

Each of the reserved MAC addresses specified in Table 8-3
(01-80-C2-00-00-[01,02,04,0E]) shall be permanently configured in the FDB
in TPMR components.

The FDB entries for reserved MAC addresses shall specify filtering for all
Bridge Ports and all VIDs. Management shall not provide the capability to
modify or remove entries for reserved MAC addresses.

The addresses in Table 8-1, Table 8-2, and Table 8-3 determine the scope of
propagation of PDUs within a Bridged Network, as follows:

  The Nearest Bridge group address (01-80-C2-00-00-0E) is an address that
  no conformant Two-Port MAC Relay (TPMR) component, Service VLAN (S-VLAN)
  component, Customer VLAN (C-VLAN) component, or MAC Bridge can forward.
  PDUs transmitted using this destination address, or any other addresses
  that appear in Table 8-1, Table 8-2, and Table 8-3
  (01-80-C2-00-00-[00,01,02,03,04,05,06,07,08,09,0A,0B,0C,0D,0E,0F]), can
  therefore travel no further than those stations that can be reached via a
  single individual LAN from the originating station.

  The Nearest non-TPMR Bridge group address (01-80-C2-00-00-03), is an
  address that no conformant S-VLAN component, C-VLAN component, or MAC
  Bridge can forward; however, this address is relayed by a TPMR component.
  PDUs using this destination address, or any of the other addresses that
  appear in both Table 8-1 and Table 8-2 but not in Table 8-3
  (01-80-C2-00-00-[00,03,05,06,07,08,09,0A,0B,0C,0D,0F]), will be relayed
  by any TPMRs but will propagate no further than the nearest S-VLAN
  component, C-VLAN component, or MAC Bridge.

  The Nearest Customer Bridge group address (01-80-C2-00-00-00) is an
  address that no conformant C-VLAN component, MAC Bridge can forward;
  however, it is relayed by TPMR components and S-VLAN components. PDUs
  using this destination address, or any of the other addresses that appear
  in Table 8-1 but not in either Table 8-2 or Table 8-3
  (01-80-C2-00-00-[00,0B,0C,0D,0F]), will be relayed by TPMR components and
  S-VLAN components but will propagate no further than the nearest C-VLAN
  component or MAC Bridge.

Because the LLC Entity associated with each Bridge Port is provided via CPU
port, we must not filter these frames but forward them to CPU port.

In a Bridge, the transmission Port is majorly decided by ingress and egress
rules, FDB, and spanning tree Port State functions of the Forwarding
Process. For link-local frames, only CPU port should be designated as
destination port in the FDB, and the other functions of the Forwarding
Process must not interfere with the decision of the transmission Port. We
call this process trapping frames to CPU port.

Therefore, on the switch with CPU port architecture, link-local frames must
be trapped to CPU port, and certain link-local frames received by a Port of
a Bridge comprising a TPMR component or an S-VLAN component must be
excluded from it.

A Bridge of the switch with CPU port architecture cannot comprise a
Two-Port MAC Relay (TPMR) component as a TPMR component supports only a
subset of the functionality of a MAC Bridge. A Bridge comprising two Ports
(Management Port doesn't count) of this architecture will either function
as a standard MAC Bridge or a standard VLAN Bridge.

Therefore, a Bridge of this architecture can only comprise S-VLAN
components, C-VLAN components, or MAC Bridge components. Since there's no
TPMR component, we don't need to relay PDUs using the destination addresses
specified on the Nearest non-TPMR section, and the proportion of the
Nearest Customer Bridge section where they must be relayed by TPMR
components.

One option to trap link-local frames to CPU port is to add static FDB
entries with CPU port designated as destination port. However, because that
Independent VLAN Learning (IVL) is being used on every VID, each entry only
applies to a single VLAN Identifier (VID). For a Bridge comprising a MAC
Bridge component or a C-VLAN component, there would have to be 16 times
4096 entries. This switch intellectual property can only hold a maximum of
2048 entries. Using this option, there also isn't a mechanism to prevent
link-local frames from being discarded when the spanning tree Port State of
the reception Port is discarding.

The remaining option is to utilise the BPC, RGAC1, RGAC2, RGAC3, and RGAC4
registers. Whilst this applies to every VID, it doesn't contain all of the
reserved MAC addresses without affecting the remaining Standard Group MAC
Addresses. The REV_UN frame tag utilised using the RGAC4 register covers
the remaining 01-80-C2-00-00-[04,05,06,07,08,09,0A,0B,0C,0D,0F] destination
addresses. It also includes the 01-80-C2-00-00-22 to 01-80-C2-00-00-FF
destination addresses which may be relayed by MAC Bridges or VLAN Bridges.
The latter option provides better but not complete conformance.

This switch intellectual property also does not provide a mechanism to trap
link-local frames with specific destination addresses to CPU port by
Bridge, to conform to the filtering rules for the distinct Bridge
components.

Therefore, regardless of the type of the Bridge component, link-local
frames with these destination addresses will be trapped to CPU port:

01-80-C2-00-00-[00,01,02,03,0E]

In a Bridge comprising a MAC Bridge component or a C-VLAN component:

  Link-local frames with these destination addresses won't be trapped to
  CPU port which won't conform to IEEE Std 802.1Q-2022:

  01-80-C2-00-00-[04,05,06,07,08,09,0A,0B,0C,0D,0F]

In a Bridge comprising an S-VLAN component:

  Link-local frames with these destination addresses will be trapped to CPU
  port which won't conform to IEEE Std 802.1Q-2022:

  01-80-C2-00-00-00

  Link-local frames with these destination addresses won't be trapped to
  CPU port which won't conform to IEEE Std 802.1Q-2022:

  01-80-C2-00-00-[04,05,06,07,08,09,0A]

Currently on this switch intellectual property, if the spanning tree Port
State of the reception Port is discarding, link-local frames will be
discarded.

To trap link-local frames regardless of the spanning tree Port State, make
the switch regard them as Bridge Protocol Data Units (BPDUs). This switch
intellectual property only lets the frames regarded as BPDUs bypass the
spanning tree Port State function of the Forwarding Process.

With this change, the only remaining interference is the ingress rules.
When the reception Port has no PVID assigned on software, VLAN-untagged
frames won't be allowed in. There doesn't seem to be a mechanism on the
switch intellectual property to have link-local frames bypass this function
of the Forwarding Process.

Fixes: b8f126a8d543 ("net-next: dsa: add dsa support for Mediatek MT7530 switch")
Reviewed-by: Daniel Golle <daniel@makrotopia.org>
Signed-off-by: Arınç ÜNAL <arinc.unal@arinc9.com>
Link: https://lore.kernel.org/r/20240409-b4-for-net-mt7530-fix-link-local-when-stp-discarding-v2-1-07b1150164ac@arinc9.com
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/dsa/mt7530.c | 229 +++++++++++++++++++++++++++++++++------
 drivers/net/dsa/mt7530.h |   5 +
 2 files changed, 200 insertions(+), 34 deletions(-)

diff --git a/drivers/net/dsa/mt7530.c b/drivers/net/dsa/mt7530.c
index 40ae44c9945b1..22b97505fa536 100644
--- a/drivers/net/dsa/mt7530.c
+++ b/drivers/net/dsa/mt7530.c
@@ -998,20 +998,173 @@ static void mt7530_setup_port5(struct dsa_switch *ds, phy_interface_t interface)
 	mutex_unlock(&priv->reg_mutex);
 }
 
-/* On page 205, section "8.6.3 Frame filtering" of the active standard, IEEE Std
- * 802.1Q™-2022, it is stated that frames with 01:80:C2:00:00:00-0F as MAC DA
- * must only be propagated to C-VLAN and MAC Bridge components. That means
- * VLAN-aware and VLAN-unaware bridges. On the switch designs with CPU ports,
- * these frames are supposed to be processed by the CPU (software). So we make
- * the switch only forward them to the CPU port. And if received from a CPU
- * port, forward to a single port. The software is responsible of making the
- * switch conform to the latter by setting a single port as destination port on
- * the special tag.
+/* In Clause 5 of IEEE Std 802-2014, two sublayers of the data link layer (DLL)
+ * of the Open Systems Interconnection basic reference model (OSI/RM) are
+ * described; the medium access control (MAC) and logical link control (LLC)
+ * sublayers. The MAC sublayer is the one facing the physical layer.
  *
- * This switch intellectual property cannot conform to this part of the standard
- * fully. Whilst the REV_UN frame tag covers the remaining :04-0D and :0F MAC
- * DAs, it also includes :22-FF which the scope of propagation is not supposed
- * to be restricted for these MAC DAs.
+ * In 8.2 of IEEE Std 802.1Q-2022, the Bridge architecture is described. A
+ * Bridge component comprises a MAC Relay Entity for interconnecting the Ports
+ * of the Bridge, at least two Ports, and higher layer entities with at least a
+ * Spanning Tree Protocol Entity included.
+ *
+ * Each Bridge Port also functions as an end station and shall provide the MAC
+ * Service to an LLC Entity. Each instance of the MAC Service is provided to a
+ * distinct LLC Entity that supports protocol identification, multiplexing, and
+ * demultiplexing, for protocol data unit (PDU) transmission and reception by
+ * one or more higher layer entities.
+ *
+ * It is described in 8.13.9 of IEEE Std 802.1Q-2022 that in a Bridge, the LLC
+ * Entity associated with each Bridge Port is modeled as being directly
+ * connected to the attached Local Area Network (LAN).
+ *
+ * On the switch with CPU port architecture, CPU port functions as Management
+ * Port, and the Management Port functionality is provided by software which
+ * functions as an end station. Software is connected to an IEEE 802 LAN that is
+ * wholly contained within the system that incorporates the Bridge. Software
+ * provides access to the LLC Entity associated with each Bridge Port by the
+ * value of the source port field on the special tag on the frame received by
+ * software.
+ *
+ * We call frames that carry control information to determine the active
+ * topology and current extent of each Virtual Local Area Network (VLAN), i.e.,
+ * spanning tree or Shortest Path Bridging (SPB) and Multiple VLAN Registration
+ * Protocol Data Units (MVRPDUs), and frames from other link constrained
+ * protocols, such as Extensible Authentication Protocol over LAN (EAPOL) and
+ * Link Layer Discovery Protocol (LLDP), link-local frames. They are not
+ * forwarded by a Bridge. Permanently configured entries in the filtering
+ * database (FDB) ensure that such frames are discarded by the Forwarding
+ * Process. In 8.6.3 of IEEE Std 802.1Q-2022, this is described in detail:
+ *
+ * Each of the reserved MAC addresses specified in Table 8-1
+ * (01-80-C2-00-00-[00,01,02,03,04,05,06,07,08,09,0A,0B,0C,0D,0E,0F]) shall be
+ * permanently configured in the FDB in C-VLAN components and ERs.
+ *
+ * Each of the reserved MAC addresses specified in Table 8-2
+ * (01-80-C2-00-00-[01,02,03,04,05,06,07,08,09,0A,0E]) shall be permanently
+ * configured in the FDB in S-VLAN components.
+ *
+ * Each of the reserved MAC addresses specified in Table 8-3
+ * (01-80-C2-00-00-[01,02,04,0E]) shall be permanently configured in the FDB in
+ * TPMR components.
+ *
+ * The FDB entries for reserved MAC addresses shall specify filtering for all
+ * Bridge Ports and all VIDs. Management shall not provide the capability to
+ * modify or remove entries for reserved MAC addresses.
+ *
+ * The addresses in Table 8-1, Table 8-2, and Table 8-3 determine the scope of
+ * propagation of PDUs within a Bridged Network, as follows:
+ *
+ *   The Nearest Bridge group address (01-80-C2-00-00-0E) is an address that no
+ *   conformant Two-Port MAC Relay (TPMR) component, Service VLAN (S-VLAN)
+ *   component, Customer VLAN (C-VLAN) component, or MAC Bridge can forward.
+ *   PDUs transmitted using this destination address, or any other addresses
+ *   that appear in Table 8-1, Table 8-2, and Table 8-3
+ *   (01-80-C2-00-00-[00,01,02,03,04,05,06,07,08,09,0A,0B,0C,0D,0E,0F]), can
+ *   therefore travel no further than those stations that can be reached via a
+ *   single individual LAN from the originating station.
+ *
+ *   The Nearest non-TPMR Bridge group address (01-80-C2-00-00-03), is an
+ *   address that no conformant S-VLAN component, C-VLAN component, or MAC
+ *   Bridge can forward; however, this address is relayed by a TPMR component.
+ *   PDUs using this destination address, or any of the other addresses that
+ *   appear in both Table 8-1 and Table 8-2 but not in Table 8-3
+ *   (01-80-C2-00-00-[00,03,05,06,07,08,09,0A,0B,0C,0D,0F]), will be relayed by
+ *   any TPMRs but will propagate no further than the nearest S-VLAN component,
+ *   C-VLAN component, or MAC Bridge.
+ *
+ *   The Nearest Customer Bridge group address (01-80-C2-00-00-00) is an address
+ *   that no conformant C-VLAN component, MAC Bridge can forward; however, it is
+ *   relayed by TPMR components and S-VLAN components. PDUs using this
+ *   destination address, or any of the other addresses that appear in Table 8-1
+ *   but not in either Table 8-2 or Table 8-3 (01-80-C2-00-00-[00,0B,0C,0D,0F]),
+ *   will be relayed by TPMR components and S-VLAN components but will propagate
+ *   no further than the nearest C-VLAN component or MAC Bridge.
+ *
+ * Because the LLC Entity associated with each Bridge Port is provided via CPU
+ * port, we must not filter these frames but forward them to CPU port.
+ *
+ * In a Bridge, the transmission Port is majorly decided by ingress and egress
+ * rules, FDB, and spanning tree Port State functions of the Forwarding Process.
+ * For link-local frames, only CPU port should be designated as destination port
+ * in the FDB, and the other functions of the Forwarding Process must not
+ * interfere with the decision of the transmission Port. We call this process
+ * trapping frames to CPU port.
+ *
+ * Therefore, on the switch with CPU port architecture, link-local frames must
+ * be trapped to CPU port, and certain link-local frames received by a Port of a
+ * Bridge comprising a TPMR component or an S-VLAN component must be excluded
+ * from it.
+ *
+ * A Bridge of the switch with CPU port architecture cannot comprise a Two-Port
+ * MAC Relay (TPMR) component as a TPMR component supports only a subset of the
+ * functionality of a MAC Bridge. A Bridge comprising two Ports (Management Port
+ * doesn't count) of this architecture will either function as a standard MAC
+ * Bridge or a standard VLAN Bridge.
+ *
+ * Therefore, a Bridge of this architecture can only comprise S-VLAN components,
+ * C-VLAN components, or MAC Bridge components. Since there's no TPMR component,
+ * we don't need to relay PDUs using the destination addresses specified on the
+ * Nearest non-TPMR section, and the proportion of the Nearest Customer Bridge
+ * section where they must be relayed by TPMR components.
+ *
+ * One option to trap link-local frames to CPU port is to add static FDB entries
+ * with CPU port designated as destination port. However, because that
+ * Independent VLAN Learning (IVL) is being used on every VID, each entry only
+ * applies to a single VLAN Identifier (VID). For a Bridge comprising a MAC
+ * Bridge component or a C-VLAN component, there would have to be 16 times 4096
+ * entries. This switch intellectual property can only hold a maximum of 2048
+ * entries. Using this option, there also isn't a mechanism to prevent
+ * link-local frames from being discarded when the spanning tree Port State of
+ * the reception Port is discarding.
+ *
+ * The remaining option is to utilise the BPC, RGAC1, RGAC2, RGAC3, and RGAC4
+ * registers. Whilst this applies to every VID, it doesn't contain all of the
+ * reserved MAC addresses without affecting the remaining Standard Group MAC
+ * Addresses. The REV_UN frame tag utilised using the RGAC4 register covers the
+ * remaining 01-80-C2-00-00-[04,05,06,07,08,09,0A,0B,0C,0D,0F] destination
+ * addresses. It also includes the 01-80-C2-00-00-22 to 01-80-C2-00-00-FF
+ * destination addresses which may be relayed by MAC Bridges or VLAN Bridges.
+ * The latter option provides better but not complete conformance.
+ *
+ * This switch intellectual property also does not provide a mechanism to trap
+ * link-local frames with specific destination addresses to CPU port by Bridge,
+ * to conform to the filtering rules for the distinct Bridge components.
+ *
+ * Therefore, regardless of the type of the Bridge component, link-local frames
+ * with these destination addresses will be trapped to CPU port:
+ *
+ * 01-80-C2-00-00-[00,01,02,03,0E]
+ *
+ * In a Bridge comprising a MAC Bridge component or a C-VLAN component:
+ *
+ *   Link-local frames with these destination addresses won't be trapped to CPU
+ *   port which won't conform to IEEE Std 802.1Q-2022:
+ *
+ *   01-80-C2-00-00-[04,05,06,07,08,09,0A,0B,0C,0D,0F]
+ *
+ * In a Bridge comprising an S-VLAN component:
+ *
+ *   Link-local frames with these destination addresses will be trapped to CPU
+ *   port which won't conform to IEEE Std 802.1Q-2022:
+ *
+ *   01-80-C2-00-00-00
+ *
+ *   Link-local frames with these destination addresses won't be trapped to CPU
+ *   port which won't conform to IEEE Std 802.1Q-2022:
+ *
+ *   01-80-C2-00-00-[04,05,06,07,08,09,0A]
+ *
+ * To trap link-local frames to CPU port as conformant as this switch
+ * intellectual property can allow, link-local frames are made to be regarded as
+ * Bridge Protocol Data Units (BPDUs). This is because this switch intellectual
+ * property only lets the frames regarded as BPDUs bypass the spanning tree Port
+ * State function of the Forwarding Process.
+ *
+ * The only remaining interference is the ingress rules. When the reception Port
+ * has no PVID assigned on software, VLAN-untagged frames won't be allowed in.
+ * There doesn't seem to be a mechanism on the switch intellectual property to
+ * have link-local frames bypass this function of the Forwarding Process.
  */
 static void
 mt753x_trap_frames(struct mt7530_priv *priv)
@@ -1019,35 +1172,43 @@ mt753x_trap_frames(struct mt7530_priv *priv)
 	/* Trap 802.1X PAE frames and BPDUs to the CPU port(s) and egress them
 	 * VLAN-untagged.
 	 */
-	mt7530_rmw(priv, MT753X_BPC, MT753X_PAE_EG_TAG_MASK |
-		   MT753X_PAE_PORT_FW_MASK | MT753X_BPDU_EG_TAG_MASK |
-		   MT753X_BPDU_PORT_FW_MASK,
-		   MT753X_PAE_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
-		   MT753X_PAE_PORT_FW(MT753X_BPDU_CPU_ONLY) |
-		   MT753X_BPDU_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
-		   MT753X_BPDU_CPU_ONLY);
+	mt7530_rmw(priv, MT753X_BPC,
+		   MT753X_PAE_BPDU_FR | MT753X_PAE_EG_TAG_MASK |
+			   MT753X_PAE_PORT_FW_MASK | MT753X_BPDU_EG_TAG_MASK |
+			   MT753X_BPDU_PORT_FW_MASK,
+		   MT753X_PAE_BPDU_FR |
+			   MT753X_PAE_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
+			   MT753X_PAE_PORT_FW(MT753X_BPDU_CPU_ONLY) |
+			   MT753X_BPDU_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
+			   MT753X_BPDU_CPU_ONLY);
 
 	/* Trap frames with :01 and :02 MAC DAs to the CPU port(s) and egress
 	 * them VLAN-untagged.
 	 */
-	mt7530_rmw(priv, MT753X_RGAC1, MT753X_R02_EG_TAG_MASK |
-		   MT753X_R02_PORT_FW_MASK | MT753X_R01_EG_TAG_MASK |
-		   MT753X_R01_PORT_FW_MASK,
-		   MT753X_R02_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
-		   MT753X_R02_PORT_FW(MT753X_BPDU_CPU_ONLY) |
-		   MT753X_R01_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
-		   MT753X_BPDU_CPU_ONLY);
+	mt7530_rmw(priv, MT753X_RGAC1,
+		   MT753X_R02_BPDU_FR | MT753X_R02_EG_TAG_MASK |
+			   MT753X_R02_PORT_FW_MASK | MT753X_R01_BPDU_FR |
+			   MT753X_R01_EG_TAG_MASK | MT753X_R01_PORT_FW_MASK,
+		   MT753X_R02_BPDU_FR |
+			   MT753X_R02_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
+			   MT753X_R02_PORT_FW(MT753X_BPDU_CPU_ONLY) |
+			   MT753X_R01_BPDU_FR |
+			   MT753X_R01_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
+			   MT753X_BPDU_CPU_ONLY);
 
 	/* Trap frames with :03 and :0E MAC DAs to the CPU port(s) and egress
 	 * them VLAN-untagged.
 	 */
-	mt7530_rmw(priv, MT753X_RGAC2, MT753X_R0E_EG_TAG_MASK |
-		   MT753X_R0E_PORT_FW_MASK | MT753X_R03_EG_TAG_MASK |
-		   MT753X_R03_PORT_FW_MASK,
-		   MT753X_R0E_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
-		   MT753X_R0E_PORT_FW(MT753X_BPDU_CPU_ONLY) |
-		   MT753X_R03_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
-		   MT753X_BPDU_CPU_ONLY);
+	mt7530_rmw(priv, MT753X_RGAC2,
+		   MT753X_R0E_BPDU_FR | MT753X_R0E_EG_TAG_MASK |
+			   MT753X_R0E_PORT_FW_MASK | MT753X_R03_BPDU_FR |
+			   MT753X_R03_EG_TAG_MASK | MT753X_R03_PORT_FW_MASK,
+		   MT753X_R0E_BPDU_FR |
+			   MT753X_R0E_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
+			   MT753X_R0E_PORT_FW(MT753X_BPDU_CPU_ONLY) |
+			   MT753X_R03_BPDU_FR |
+			   MT753X_R03_EG_TAG(MT7530_VLAN_EG_UNTAGGED) |
+			   MT753X_BPDU_CPU_ONLY);
 }
 
 static int
diff --git a/drivers/net/dsa/mt7530.h b/drivers/net/dsa/mt7530.h
index 75bc9043c8c0a..ddefeb69afda1 100644
--- a/drivers/net/dsa/mt7530.h
+++ b/drivers/net/dsa/mt7530.h
@@ -65,6 +65,7 @@ enum mt753x_id {
 
 /* Registers for BPDU and PAE frame control*/
 #define MT753X_BPC			0x24
+#define  MT753X_PAE_BPDU_FR		BIT(25)
 #define  MT753X_PAE_EG_TAG_MASK		GENMASK(24, 22)
 #define  MT753X_PAE_EG_TAG(x)		FIELD_PREP(MT753X_PAE_EG_TAG_MASK, x)
 #define  MT753X_PAE_PORT_FW_MASK	GENMASK(18, 16)
@@ -75,20 +76,24 @@ enum mt753x_id {
 
 /* Register for :01 and :02 MAC DA frame control */
 #define MT753X_RGAC1			0x28
+#define  MT753X_R02_BPDU_FR		BIT(25)
 #define  MT753X_R02_EG_TAG_MASK		GENMASK(24, 22)
 #define  MT753X_R02_EG_TAG(x)		FIELD_PREP(MT753X_R02_EG_TAG_MASK, x)
 #define  MT753X_R02_PORT_FW_MASK	GENMASK(18, 16)
 #define  MT753X_R02_PORT_FW(x)		FIELD_PREP(MT753X_R02_PORT_FW_MASK, x)
+#define  MT753X_R01_BPDU_FR		BIT(9)
 #define  MT753X_R01_EG_TAG_MASK		GENMASK(8, 6)
 #define  MT753X_R01_EG_TAG(x)		FIELD_PREP(MT753X_R01_EG_TAG_MASK, x)
 #define  MT753X_R01_PORT_FW_MASK	GENMASK(2, 0)
 
 /* Register for :03 and :0E MAC DA frame control */
 #define MT753X_RGAC2			0x2c
+#define  MT753X_R0E_BPDU_FR		BIT(25)
 #define  MT753X_R0E_EG_TAG_MASK		GENMASK(24, 22)
 #define  MT753X_R0E_EG_TAG(x)		FIELD_PREP(MT753X_R0E_EG_TAG_MASK, x)
 #define  MT753X_R0E_PORT_FW_MASK	GENMASK(18, 16)
 #define  MT753X_R0E_PORT_FW(x)		FIELD_PREP(MT753X_R0E_PORT_FW_MASK, x)
+#define  MT753X_R03_BPDU_FR		BIT(9)
 #define  MT753X_R03_EG_TAG_MASK		GENMASK(8, 6)
 #define  MT753X_R03_EG_TAG(x)		FIELD_PREP(MT753X_R03_EG_TAG_MASK, x)
 #define  MT753X_R03_PORT_FW_MASK	GENMASK(2, 0)
-- 
2.43.0




  parent reply	other threads:[~2024-04-15 14:29 UTC|newest]

Thread overview: 180+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-04-15 14:18 [PATCH 6.8 000/172] 6.8.7-rc1 review Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 001/172] smb3: fix Open files on server counter going negative Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 002/172] ata: libata-core: Allow command duration limits detection for ACS-4 drives Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 003/172] ata: libata-scsi: Fix ata_scsi_dev_rescan() error path Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 004/172] drm/amdgpu/vpe: power on vpe when hw_init Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 005/172] batman-adv: Avoid infinite loop trying to resize local TT Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 006/172] ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 007/172] ceph: switch to use cap_delay_lock for the unlink delay list Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 008/172] virtio_net: Do not send RSS key if it is not supported Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 009/172] arm64: tlb: Fix TLBI RANGE operand Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 010/172] ARM: dts: imx7s-warp: Pass OV2680 link-frequencies Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 011/172] raid1: fix use-after-free for original bio in raid1_write_request() Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 012/172] ring-buffer: Only update pages_touched when a new page is touched Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 013/172] Bluetooth: Fix memory leak in hci_req_sync_complete() Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 014/172] drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 015/172] platform/chrome: cros_ec_uart: properly fix race condition Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 016/172] ACPI: scan: Do not increase dep_unmet for already met dependencies Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 017/172] PM: s2idle: Make sure CPUs will wakeup directly on resume Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 018/172] media: cec: core: remove length check of Timer Status Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 019/172] btrfs: tests: allocate dummy fs_info and root in test_find_delalloc() Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 020/172] ARM: OMAP2+: fix bogus MMC GPIO labels on Nokia N8x0 Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 021/172] ARM: OMAP2+: fix N810 MMC gpiod table Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 022/172] mmc: omap: fix broken slot switch lookup Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 023/172] mmc: omap: fix deferred probe Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 024/172] mmc: omap: restore original power up/down steps Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 025/172] ARM: OMAP2+: fix USB regression on Nokia N8x0 Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 026/172] firmware: arm_ffa: Fix the partition ID check in ffa_notification_info_get() Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 027/172] firmware: arm_scmi: Make raw debugfs entries non-seekable Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 028/172] cxl/mem: Fix for the index of Clear Event Record Handle Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 029/172] cxl/core/regs: Fix usage of map->reg_type in cxl_decode_regblock() before assigned Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 030/172] arm64: dts: freescale: imx8mp-venice-gw72xx-2x: fix USB vbus regulator Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 031/172] arm64: dts: freescale: imx8mp-venice-gw73xx-2x: " Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 032/172] drm/msm: Add newlines to some debug prints Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 033/172] drm/msm/dpu: dont allow overriding data from catalog Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 034/172] drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more sensible Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 035/172] dt-bindings: display/msm: sm8150-mdss: add DP node Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 036/172] arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 037/172] cxl/core: Fix initialization of mbox_cmd.size_out in get event Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 038/172] Revert "drm/qxl: simplify qxl_fence_wait" Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 039/172] nouveau: fix function cast warning Greg Kroah-Hartman
2024-04-15 14:18 ` [PATCH 6.8 040/172] drm/msm/adreno: Set highest_bank_bit for A619 Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 041/172] scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 042/172] scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 043/172] net: openvswitch: fix unwanted error log on timeout policy probing Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 044/172] u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 045/172] xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 046/172] octeontx2-pf: Fix transmit scheduler resource leak Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 047/172] block: fix q->blkg_list corruption during disk rebind Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 048/172] lib: checksum: hide unused expected_csum_ipv6_magic[] Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 049/172] geneve: fix header validation in geneve[6]_xmit_skb Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 050/172] s390/ism: fix receive message buffer allocation Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 051/172] bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 052/172] bnxt_en: Fix error recovery for RoCE ulp client Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 053/172] bnxt_en: Reset PTP tx_avail after possible firmware reset Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 054/172] ACPI: bus: allow _UID matching for integer zero Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 055/172] base/node / ACPI: Enumerate node access class for struct access_coordinate Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 056/172] ACPI: HMAT: Introduce 2 levels of generic port access class Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 057/172] ACPI: HMAT / cxl: Add retrieval of generic port coordinates for both access classes Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 058/172] cxl: Split out combine_coordinates() for common shared usage Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 059/172] cxl: Split out host bridge access coordinates Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 060/172] cxl: Remove checking of iter in cxl_endpoint_get_perf_coordinates() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 061/172] cxl: Fix retrieving of access_coordinates in PCIe path Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 062/172] net: ks8851: Inline ks8851_rx_skb() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 063/172] net: ks8851: Handle softirqs at the end of IRQ thread to fix hang Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 064/172] af_unix: Clear stale u->oob_skb Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 065/172] octeontx2-af: Fix NIX SQ mode and BP config Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 066/172] ipv6: fib: hide unused pn variable Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 067/172] ipv4/route: avoid unused-but-set-variable warning Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 068/172] ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 069/172] pds_core: use pci_reset_function for health reset Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 070/172] pds_core: Fix pdsc_check_pci_health function to use work thread Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 071/172] Bluetooth: ISO: Align broadcast sync_timeout with connection timeout Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 072/172] Bluetooth: ISO: Dont reject BT_ISO_QOS if parameters are unset Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 073/172] Bluetooth: hci_sync: Use QoS to determine which PHY to scan Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 074/172] Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 075/172] Bluetooth: SCO: Fix not validating setsockopt user input Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 076/172] Bluetooth: RFCOMM: " Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 077/172] Bluetooth: L2CAP: " Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 078/172] Bluetooth: ISO: " Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 079/172] Bluetooth: hci_sock: " Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 080/172] Bluetooth: l2cap: Dont double set the HCI_CONN_MGMT_CONNECTED bit Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 081/172] netfilter: complete validation of user input Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 082/172] net/mlx5: SF, Stop waiting for FW as teardown was called Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 083/172] net/mlx5: Register devlink first under devlink lock Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 084/172] net/mlx5: offset comp irq index in name by one Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 085/172] net/mlx5: Properly link new fs rules into the tree Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 086/172] net/mlx5: Correctly compare pkt reformat ids Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 087/172] net/mlx5e: RSS, Block changing channels number when RXFH is configured Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 088/172] net/mlx5e: Fix mlx5e_priv_init() cleanup flow Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 089/172] net/mlx5e: HTB, Fix inconsistencies with QoS SQs number Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 090/172] net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 091/172] net: sparx5: fix wrong config being used when reconfiguring PCS Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 092/172] Revert "s390/ism: fix receive message buffer allocation" Greg Kroah-Hartman
2024-04-15 14:19 ` Greg Kroah-Hartman [this message]
2024-04-15 14:19 ` [PATCH 6.8 094/172] af_unix: Do not use atomic ops for unix_sk(sk)->inflight Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 095/172] af_unix: Fix garbage collector racing against connect() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 096/172] net: ena: Fix potential sign extension issue Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 097/172] net: ena: Wrong missing IO completions check order Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 098/172] net: ena: Fix incorrect descriptor free behavior Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 099/172] net: ena: Set tx_info->xdpf value to NULL Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.8 100/172] drm/xe/display: Fix double mutex initialization Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 101/172] drm/xe/hwmon: Cast result to output precision on left shift of operand Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 102/172] tracing: hide unused ftrace_event_id_fops Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 103/172] iommu/vt-d: Fix wrong use of pasid config Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 104/172] iommu/vt-d: Allocate local memory for page request queue Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 105/172] iommu/vt-d: Fix WARN_ON in iommu probe path Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 106/172] io_uring: refactor DEFER_TASKRUN multishot checks Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 107/172] io_uring: disable io-wq execution of multishot NOWAIT requests Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 108/172] btrfs: qgroup: correctly model root qgroup rsv in convert Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 109/172] btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 110/172] btrfs: record delayed inode root in transaction Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 111/172] btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 112/172] io_uring/net: restore msg_control on sendzc retry Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 113/172] kprobes: Fix possible use-after-free issue on kprobe registration Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 114/172] fs/proc: remove redundant comments from /proc/bootconfig Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 115/172] fs/proc: Skip bootloader comment if no embedded kernel parameters Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 116/172] scsi: sg: Avoid sg device teardown race Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 117/172] scsi: sg: Avoid race in error handling & drop bogus warn Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 118/172] accel/ivpu: Check return code of ipc->lock init Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 119/172] accel/ivpu: Fix PCI D0 state entry in resume Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 120/172] accel/ivpu: Put NPU back to D3hot after failed resume Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 121/172] accel/ivpu: Return max freq for DRM_IVPU_PARAM_CORE_CLOCK_RATE Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 122/172] accel/ivpu: Fix deadlock in context_xa Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 123/172] drm/vmwgfx: Enable DMA mappings with SEV Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 124/172] drm/i915/vrr: Disable VRR when using bigjoiner Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 125/172] drm/amdkfd: Reset GPU on queue preemption failure Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 126/172] drm/ast: Fix soft lockup Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 127/172] drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 128/172] drm/client: Fully protect modes[] with dev->mode_config.mutex Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 129/172] drm/msm/dp: fix runtime PM leak on disconnect Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 130/172] drm/msm/dp: fix runtime PM leak on connect failure Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 131/172] drm/amdgpu/umsch: reinitialize write pointer in hw init Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 132/172] arm64: dts: imx8qm-ss-dma: fix can lpcg indices Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 133/172] arm64: dts: imx8-ss-dma: " Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 134/172] arm64: dts: imx8-ss-dma: fix adc " Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 135/172] arm64: dts: imx8-ss-conn: fix usb " Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 136/172] arm64: dts: imx8-ss-dma: fix pwm " Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 137/172] arm64: dts: imx8-ss-lsio: " Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 138/172] arm64: dts: imx8-ss-dma: fix spi " Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 139/172] vhost: Add smp_rmb() in vhost_vq_avail_empty() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 140/172] vhost: Add smp_rmb() in vhost_enable_notify() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 141/172] perf/x86: Fix out of range data Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 142/172] x86/cpu: Actually turn off mitigations by default for SPECULATION_MITIGATIONS=n Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 143/172] selftests/timers/posix_timers: Reimplement check_timer_distribution() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 144/172] selftests: timers: Fix posix_timers ksft_print_msg() warning Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 145/172] selftests: timers: Fix abs() warning in posix_timers test Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 146/172] selftests: kselftest: Mark functions that unconditionally call exit() as __noreturn Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 147/172] x86/apic: Force native_apic_mem_read() to use the MOV instruction Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 148/172] irqflags: Explicitly ignore lockdep_hrtimer_exit() argument Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 149/172] selftests: kselftest: Fix build failure with NOLIBC Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 150/172] kernfs: annotate different lockdep class for of->mutex of writable files Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 151/172] x86/bugs: Fix return type of spectre_bhi_state() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 152/172] x86/bugs: Fix BHI documentation Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 153/172] x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 154/172] x86/bugs: Rename various ia32_cap variables to x86_arch_cap_msr Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 155/172] x86/bugs: Fix BHI handling of RRSBA Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 156/172] x86/bugs: Clarify that syscall hardening isnt a BHI mitigation Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 157/172] x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 158/172] x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 159/172] drm/i915/cdclk: Fix CDCLK programming order when pipes are active Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.8 160/172] drm/i915/psr: Disable PSR when bigjoiner is used Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 161/172] drm/i915: Disable port sync " Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 162/172] drm/i915: Disable live M/N updates when using bigjoiner Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 163/172] drm/amdgpu: Reset dGPU if suspend got aborted Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 164/172] drm/amdgpu: always force full reset for SOC21 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 165/172] drm/amdgpu: fix incorrect number of active RBs for gfx11 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 166/172] drm/amdgpu: differentiate external rev id for gfx 11.5.0 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 167/172] drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 168/172] drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 169/172] drm/amd/display: Do not recursively call manual trigger programming Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 170/172] drm/amd/display: Return max resolution supported by DWB Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 171/172] drm/amd/display: always reset ODM mode in context when adding first plane Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.8 172/172] drm/amd/display: fix disable otg wa logic in DCN316 Greg Kroah-Hartman
2024-04-15 18:41 ` [PATCH 6.8 000/172] 6.8.7-rc1 review Florian Fainelli
2024-04-16  0:17 ` Mark Brown
2024-04-16  3:51 ` Bagas Sanjaya
2024-04-16  6:18 ` Ron Economos
2024-04-16 10:39 ` Jon Hunter
2024-04-16 13:58 ` Pascal Ernster
2024-04-16 17:41 ` Naresh Kamboju

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240415142003.217988974@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=arinc.unal@arinc9.com \
    --cc=daniel@makrotopia.org \
    --cc=pabeni@redhat.com \
    --cc=patches@lists.linux.dev \
    --cc=sashal@kernel.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox