From nobody Wed Apr 8 04:41:22 2026 Received: from pidgin.makrotopia.org (pidgin.makrotopia.org [185.142.180.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E038936308D; Wed, 11 Mar 2026 00:49:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.142.180.65 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773190180; cv=none; b=K1Qq+7T/RhWzdXf/Gvj9hIpZhFmfF5a728amyvDOn6x7kPhtH6KqXTm/M840pxAkAnkOpIv/zqQVSRDl+LoFXKWm8wc5TzgDSWv/td0dfS7ITRwOLsrnff95DLXgi22h9uRwiVun8bRoqChqxf/tfnkCADJRyPXo+r9Q5ft47Bc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773190180; c=relaxed/simple; bh=gSqxp2rXDLPdJqNgMgvveupUcgxnyKWPffpGOobEqMQ=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ixnwLFYL4c9Gh22X977ETT6TTufj1Dx1deZLBsdQ0DOZJfo5CqkO1sDRCtcQmOgdeNj4ZKhYAMG+4nG1rtuT0DzmzCkQIrxfRkrDOP6MtKFjIVE06k/AO4E1tP7gXKKsy6eY+aVKfcmFnygqu8zIo1ottnER2b23FQZS+LpOj+s= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=makrotopia.org; spf=pass smtp.mailfrom=makrotopia.org; arc=none smtp.client-ip=185.142.180.65 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=makrotopia.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=makrotopia.org Received: from local by pidgin.makrotopia.org with esmtpsa (TLS1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.99) (envelope-from ) id 1w07lX-000000007J8-25gu; Wed, 11 Mar 2026 00:49:35 +0000 Date: Wed, 11 Mar 2026 00:49:32 +0000 From: Daniel Golle To: Daniel Golle , Andrew Lunn , Vladimir Oltean , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Russell King , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Frank Wunderlich , Chad Monroe , Cezary Wilmanski , Liang Xu , "Benny (Ying-Tsan) Weng" , Jose Maria Verdu Munoz , Avinash Jayaraman , John Crispin Subject: [PATCH net-next v3 1/2] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Message-ID: <20a238999b0d1e7d9ec6e70630c0822c26f38649.1773187776.git.daniel@makrotopia.org> References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The MxL862xx offloads bridge forwarding in hardware, so set dsa_default_offload_fwd_mark() to avoid duplicate forwarding of packets of (eg. flooded) frames arriving at the CPU port. Link-local frames are directly trapped to the CPU port only, so don't set dsa_default_offload_fwd_mark() on those. Signed-off-by: Daniel Golle --- v3: no changes v2: don't set dsa_default_offload_fwd_mark() on link-local frames --- net/dsa/tag_mxl862xx.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/dsa/tag_mxl862xx.c b/net/dsa/tag_mxl862xx.c index 01f2158682718..ec949d44fc91c 100644 --- a/net/dsa/tag_mxl862xx.c +++ b/net/dsa/tag_mxl862xx.c @@ -92,6 +92,9 @@ static struct sk_buff *mxl862_tag_rcv(struct sk_buff *skb, skb_pull_rcsum(skb, MXL862_HEADER_LEN); dsa_strip_etype_header(skb, MXL862_HEADER_LEN); =20 + if (likely(!is_link_local_ether_addr(eth_hdr(skb)->h_dest))) + dsa_default_offload_fwd_mark(skb); + return skb; } =20 --=20 2.53.0