From nobody Sat Apr 4 01:34:07 2026 Received: from pidgin.makrotopia.org (pidgin.makrotopia.org [185.142.180.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7372313A258; Sun, 22 Mar 2026 00:19:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.142.180.65 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774138746; cv=none; b=pso//OgrgWhJ2w364pPWj7EMWUW9pF20PsqCootdFkFKz6UiRmXhj6jGPWj3SxSRL1WSTgCIUeZMyFgCt7rLWe8WsMnkVsRIDit9csMKr0U876q0ZC/WrIM5F3WJfRlOboxQap23DZ8LHFdV9IjkFk0YJFPz6CrqXSOmTTyiRQo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774138746; c=relaxed/simple; bh=kHUh4DMK4hSNQjOELR5Ln745QI5cflC4Va03ziUL0Bc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=lNrqMISvH8Gw4vrWW6Zmv8p8h4YTnYYWHMNxzZVBtby28++HP7DytcXkJiWekGDpjQbe2734xXG8QkLxgZCn5O5f+GIAOwzKzPkAINfOVUy92CyEALAd/W4VSSZzgXruVd224MQ4rrnMGsHgp2jjyQpDSCL8dildz8H98YBGucg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=makrotopia.org; spf=pass smtp.mailfrom=makrotopia.org; arc=none smtp.client-ip=185.142.180.65 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=makrotopia.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=makrotopia.org Received: from local by pidgin.makrotopia.org with esmtpsa (TLS1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.99) (envelope-from ) id 1w46Wz-000000001MM-2iNr; Sun, 22 Mar 2026 00:19:01 +0000 Date: Sun, 22 Mar 2026 00:18:58 +0000 From: Daniel Golle To: Daniel Golle , Andrew Lunn , Vladimir Oltean , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Russell King , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Frank Wunderlich , Chad Monroe , Cezary Wilmanski , Liang Xu , "Benny (Ying-Tsan) Weng" , Jose Maria Verdu Munoz , Avinash Jayaraman , John Crispin Subject: [PATCH net-next v6 1/4] net: dsa: add driver-private pointer to struct dsa_bridge Message-ID: <4ff5b936b1f4ad31ffe132aaef798d247a8ac812.1774136876.git.daniel@makrotopia.org> References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" When a DSA driver offloads a bridge to firmware, it typically receives a firmware-assigned bridge identifier (e.g. a FID) that must be stored and retrieved by subsequent operations. Without a place to store this in the DSA core's bridge structure, drivers must maintain a parallel list of bridge objects and search it on every join, leave, and FDB operation. Add a void *priv field to struct dsa_bridge so drivers can store their firmware bridge identifier directly, eliminating the need for driver-side bridge tracking structures. Signed-off-by: Daniel Golle --- v6: new patch include/net/dsa.h | 1 + 1 file changed, 1 insertion(+) diff --git a/include/net/dsa.h b/include/net/dsa.h index 6c17446f3dcc2..1c6f6c3b88e86 100644 --- a/include/net/dsa.h +++ b/include/net/dsa.h @@ -234,6 +234,7 @@ struct dsa_bridge { unsigned int num; bool tx_fwd_offload; refcount_t refcount; + void *priv; }; =20 struct dsa_port { --=20 2.53.0