Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp611646ybz; Fri, 24 Apr 2020 06:22:57 -0700 (PDT) X-Google-Smtp-Source: APiQypJcDpYn4Rsiyyh8wDH7ASEk+0XtJYRyk+jV2jHo1k1kCbUWF2ErtcPAv4+GzimuBoycxjSr X-Received: by 2002:a17:906:748c:: with SMTP id e12mr6796764ejl.375.1587734577079; Fri, 24 Apr 2020 06:22:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587734577; cv=none; d=google.com; s=arc-20160816; b=KK+YMa78WoY0uscuhBAe2zEZfkQGwJ+MkH5Oh8IFJ9FG2DNoFdoRHtllPoUVkHJYzF 0VOxFgcwDdFpK0xqR28lJ+5XSpR3ltmcpahnobUpP7pZN63jTUZBL+xF1CF9t/G0SVaX nFQkIMepv0MC+/7P4B34O6imOwPuJZA6VQMEyHmEUh4mQ8dVDzFnbQtc8YtEWuqNwUpt KW/LU4tXjOG+oBwwylbzFSfWFFxD8aggQMkzFvYDfR+JYVElzFft8JAZ9r38xS1OUXef SGfFS8LLCXxjN6H8NIG5uozjZYwme4FBUKvsENz1j1qF1fYzPFFzu8OUPyxGU9tFHumW GSWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=E4cbnT6iD9NKF/pSlrfjp2r6UpANFg0iv/kYrzOZLes=; b=byUIx+hYUlD44JSt1gBFuKlcY1v0J06FZvoDt5ITaVGsWknKyLsE+a8648/RHnGq86 rr25YaqhXHN/gwPX5hJ4fJ3Yad650zUaddZMl9yuq7XNDHWBmNrF+VdeD2LMTtxJbvLz slgPfipRdfRNftl/ZH15jb9YEA+lBgIgIDI87j/vzIC4/cqNdGUVCQf6uDKf8HvxWanL cyQxS5OhUhKGjP35IZR2kQ4DII2Kc1AfRNU1MFtFI5AiHIGAWzn3G/HEd0HBtuY1Xkw6 gpisgJjqZOixDW8tgLeL2OwfWWv8UZ5+TwNeZLm04QpdfVEaLo3K8y/etcDj1XinKoVl X7Jw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cumulusnetworks.com header.s=google header.b=Sr+iKy2B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=cumulusnetworks.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w22si3041466edu.568.2020.04.24.06.22.32; Fri, 24 Apr 2020 06:22:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@cumulusnetworks.com header.s=google header.b=Sr+iKy2B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=cumulusnetworks.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728082AbgDXNUn (ORCPT + 99 others); Fri, 24 Apr 2020 09:20:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728059AbgDXNUk (ORCPT ); Fri, 24 Apr 2020 09:20:40 -0400 Received: from mail-lf1-x142.google.com (mail-lf1-x142.google.com [IPv6:2a00:1450:4864:20::142]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 17A6CC09B045 for ; Fri, 24 Apr 2020 06:20:40 -0700 (PDT) Received: by mail-lf1-x142.google.com with SMTP id l11so7659287lfc.5 for ; Fri, 24 Apr 2020 06:20:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cumulusnetworks.com; s=google; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=E4cbnT6iD9NKF/pSlrfjp2r6UpANFg0iv/kYrzOZLes=; b=Sr+iKy2By/lSo0Y94e7vCAmXPlw3o+frOpginSSqvNVDZKz+8JKWDI9IEMVKNbDKin sURo8CzDQuMEUkRmGLUfCdMh3p8Feax72WCiViNKCpYXaXN6nP/Q8a/3i5Z03Dn5R5kO JQyEN1R+eU3eC5UtW4Hy4qrr2u7VxIL7zpjkM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=E4cbnT6iD9NKF/pSlrfjp2r6UpANFg0iv/kYrzOZLes=; b=JjJBsQ4EnS7ajJC7gENALvO+HybQ/3lFIeNCXvuAlE0BxmajTijpCQRzDA9iJ9MkoD NIwVrXWGZVJ/RblsKOI/U2Cg6NZaZgCmRryMTBHeq+Lqg8zj7PUy7xaN2VDbQDvUlqs9 srbrW+pBePEHrfH6O3fKen3U3W1PKIFEDMEfJKju2kC7yU6dR99sVX1cpEXrZI9N47Jb hk3uybU12IQVKz3GnSMAhouh9stSr1kdnu4F8vojTmWr1G0QOHE93xO76Z0AcEed5osl sqmuX7vlU9w82oUWX1U8DObMswXM1NGgJrAk+wuYRgK383JqXchu4ZOJvTFeSoD4TBQb 4npA== X-Gm-Message-State: AGi0PuY/BSfPJGtaghDwn9LCHdkl7jIp2T2pm+VsEYqk0N/KWTMOYhzT 0ureu+Ag1Do3HTMOxJT7KQbONw== X-Received: by 2002:a19:230c:: with SMTP id j12mr6327801lfj.109.1587734438545; Fri, 24 Apr 2020 06:20:38 -0700 (PDT) Received: from [192.168.0.109] (84-238-136-197.ip.btc-net.bg. [84.238.136.197]) by smtp.gmail.com with ESMTPSA id j22sm4120697ljh.107.2020.04.24.06.20.36 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 24 Apr 2020 06:20:37 -0700 (PDT) Subject: Re: [PATCH net-next v3 11/11] net: bridge: Add checks for enabling the STP. To: Horatiu Vultur , davem@davemloft.net, jiri@resnulli.us, ivecera@redhat.com, kuba@kernel.org, roopa@cumulusnetworks.com, olteanv@gmail.com, andrew@lunn.ch, UNGLinuxDriver@microchip.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org References: <20200422161833.1123-1-horatiu.vultur@microchip.com> <20200422161833.1123-12-horatiu.vultur@microchip.com> From: Nikolay Aleksandrov Message-ID: <2d97fea6-8f24-89ba-a97b-99a12cf41b09@cumulusnetworks.com> Date: Fri, 24 Apr 2020 16:20:35 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <20200422161833.1123-12-horatiu.vultur@microchip.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/04/2020 19:18, Horatiu Vultur wrote: > It is not possible to have the MRP and STP running at the same time on the > bridge, therefore add check when enabling the STP to check if MRP is already > enabled. In that case return error. > > Signed-off-by: Horatiu Vultur > --- > net/bridge/br_ioctl.c | 3 +-- > net/bridge/br_netlink.c | 4 +++- > net/bridge/br_private.h | 3 ++- > net/bridge/br_stp.c | 6 ++++++ > net/bridge/br_stp_if.c | 11 ++++++++++- > net/bridge/br_sysfs_br.c | 4 +--- > 6 files changed, 23 insertions(+), 8 deletions(-) > > diff --git a/net/bridge/br_ioctl.c b/net/bridge/br_ioctl.c > index ae22d784b88a..5e71fc8b826f 100644 > --- a/net/bridge/br_ioctl.c > +++ b/net/bridge/br_ioctl.c > @@ -242,8 +242,7 @@ static int old_dev_ioctl(struct net_device *dev, struct ifreq *rq, int cmd) > if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) > return -EPERM; > > - br_stp_set_enabled(br, args[1]); > - ret = 0; > + ret = br_stp_set_enabled(br, args[1], NULL); > break; > > case BRCTL_SET_BRIDGE_PRIORITY: > diff --git a/net/bridge/br_netlink.c b/net/bridge/br_netlink.c > index 1a5e681a626a..a774e19c41bb 100644 > --- a/net/bridge/br_netlink.c > +++ b/net/bridge/br_netlink.c > @@ -1109,7 +1109,9 @@ static int br_changelink(struct net_device *brdev, struct nlattr *tb[], > if (data[IFLA_BR_STP_STATE]) { > u32 stp_enabled = nla_get_u32(data[IFLA_BR_STP_STATE]); > > - br_stp_set_enabled(br, stp_enabled); > + err = br_stp_set_enabled(br, stp_enabled, extack); > + if (err) > + return err; > } > > if (data[IFLA_BR_PRIORITY]) { > diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h > index 5835828320b6..c35647cb138a 100644 > --- a/net/bridge/br_private.h > +++ b/net/bridge/br_private.h > @@ -1283,7 +1283,8 @@ int br_set_ageing_time(struct net_bridge *br, clock_t ageing_time); > /* br_stp_if.c */ > void br_stp_enable_bridge(struct net_bridge *br); > void br_stp_disable_bridge(struct net_bridge *br); > -void br_stp_set_enabled(struct net_bridge *br, unsigned long val); > +int br_stp_set_enabled(struct net_bridge *br, unsigned long val, > + struct netlink_ext_ack *extack); > void br_stp_enable_port(struct net_bridge_port *p); > void br_stp_disable_port(struct net_bridge_port *p); > bool br_stp_recalculate_bridge_id(struct net_bridge *br); > diff --git a/net/bridge/br_stp.c b/net/bridge/br_stp.c > index 1f14b8455345..3e88be7aa269 100644 > --- a/net/bridge/br_stp.c > +++ b/net/bridge/br_stp.c > @@ -36,6 +36,12 @@ void br_set_state(struct net_bridge_port *p, unsigned int state) > }; > int err; > > + /* Don't change the state of the ports if they are driven by a different > + * protocol. > + */ > + if (p->flags & BR_MRP_AWARE) > + return; > + > p->state = state; > err = switchdev_port_attr_set(p->dev, &attr); > if (err && err != -EOPNOTSUPP) > diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c > index d174d3a566aa..a42850b7eb9a 100644 > --- a/net/bridge/br_stp_if.c > +++ b/net/bridge/br_stp_if.c > @@ -196,10 +196,17 @@ static void br_stp_stop(struct net_bridge *br) > br->stp_enabled = BR_NO_STP; > } > > -void br_stp_set_enabled(struct net_bridge *br, unsigned long val) > +int br_stp_set_enabled(struct net_bridge *br, unsigned long val, > + struct netlink_ext_ack *extack) > { > ASSERT_RTNL(); > > + if (br_mrp_enabled(br)) { > + NL_SET_ERR_MSG_MOD(extack, > + "STP can't be enabled if MRP is already enabled\n"); The operation could be disable (noop in case it's already disabled) and this will still return an error. > + return -EINVAL; > + } > + > if (val) { > if (br->stp_enabled == BR_NO_STP) > br_stp_start(br); > @@ -207,6 +214,8 @@ void br_stp_set_enabled(struct net_bridge *br, unsigned long val) > if (br->stp_enabled != BR_NO_STP) > br_stp_stop(br); > } > + > + return 0; > } > > /* called under bridge lock */ > diff --git a/net/bridge/br_sysfs_br.c b/net/bridge/br_sysfs_br.c > index 9ab0f00b1081..7db06e3f642a 100644 > --- a/net/bridge/br_sysfs_br.c > +++ b/net/bridge/br_sysfs_br.c > @@ -126,9 +126,7 @@ static ssize_t stp_state_show(struct device *d, > > static int set_stp_state(struct net_bridge *br, unsigned long val) > { > - br_stp_set_enabled(br, val); > - > - return 0; > + return br_stp_set_enabled(br, val, NULL); > } > > static ssize_t stp_state_store(struct device *d, >