Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1598647ybk; Thu, 21 May 2020 10:33:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy8eZHiGsUf/sDMAWfQSN4bFjsMGpcKQyYD03FzxWas08G79AFECZkVN8Z/bdhOGyt2GpKo X-Received: by 2002:a05:6402:946:: with SMTP id h6mr8872954edz.245.1590082381563; Thu, 21 May 2020 10:33:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590082381; cv=none; d=google.com; s=arc-20160816; b=J9qwiEVfzodJI1E6nPhmof1Svm7Xq6+BoF/+8S4zefZgTMLJFxM4TC1Z90az7U4PaT c2xWuTvHPgfcDwMvfpCyLVKwE07MVWjEHSyw8m2sS2Xq1RPvg4Gyb9avnL61Fyo8ugFF x1YuRVEG/NLQYhV2lcnKYo3BUy4RL+g+5mIh8/H3iddUKGv2VfDbk+BwzPffYM/Qc8LA E+Sg3vWeBF+tvlOyq4xCFK3yutZ1/jFW4xachWQoZ5gaS+SKZgZyQNCF8wboHeG2GpBX rHNzUE52e2AkdJrWoYLG9kgPY4HzOaWOMmaBGqQ7JiKoGzRwAAN4wn6NDg8A6G2Ki2yu 6Pdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :ironport-sdr:dkim-signature; bh=DVo9WENL8ilPNIeYODgMBVfKxFbMVmdTRudxVh8/nDc=; b=KqUm9kF7+jT4uI72rY5JzdM/gYGiOFb+Fgi8rqzjtu7Z4vJTjeK8qdPj44xBPHl6hM Uk8Zn84Tg5r5C6701ONDu6FKZIpXrrMpFTmM1Jmt213m8di/6rLgIHymMqgtlusE3+p9 NjyGAiYdrGEnGVc6d2jVjarWdYX2z/+oiYbcV4ytDUbmIfRBFz729mtf1HWKqlUjqeB0 db9UErEJPC7k0+lcHbqlp3+dp9phJ3clx42VvKhrqNW5DtqHQRpJLcZALzK5e1tPdx8h c652MA3Od/jZrr+GldZEtNJIo6onpIVuKqghWZgxZASG+SYzu12rmYJx9UoqhYARfKPR 9F5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@microchip.com header.s=mchp header.b=ULbE8NFE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=microchip.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cw7si2913556edb.2.2020.05.21.10.32.38; Thu, 21 May 2020 10:33:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@microchip.com header.s=mchp header.b=ULbE8NFE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728455AbgEURa4 (ORCPT + 99 others); Thu, 21 May 2020 13:30:56 -0400 Received: from esa5.microchip.iphmx.com ([216.71.150.166]:23378 "EHLO esa5.microchip.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726821AbgEURaz (ORCPT ); Thu, 21 May 2020 13:30:55 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1590082255; x=1621618255; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=Jy/N3rXBqaPkEkb9eg+3JzspSpEQo1U1nxztCbeYZ9U=; b=ULbE8NFEXrtZAeYWavM34nGAjZQL2VJIlOZuhwnAAFtnvEDjSnjoX/Z4 nHaWe6KBzWLIgiJnm2cyuOWhxoi89ejNUTyVv2q2Tqd6kSQ3+ym22Fflb lrqXvlACL5wRZrxMdmaVkeVBocGDaaZx8VzEmVTS4oHLNxIaDJDwPsHyW R7gqFjC6UDRnrZVNK8xAIeftUv7Yjzt3IZ/IkyNP/0TbqWChls/63erVj vO1nOlgzhlwc5ZEy82P+5sGClM6/k5XPTsC73EKE+iv1wnc13Dju8ttSD sHZwPGSRaL4tDpWurU74bhOKPeP2+8U8SxLl6ef+Q7sNcQM8U4dpBZ4Fr w==; IronPort-SDR: fQGe2TnqJy/y13jXVDIOYviAEYOuT8hwN8rTE5UdkE1usCD6xgCxudqs4v8nIN4lOtTkmdBAw4 E/dekCYJdfpF9kvvd9cJ+qeMrvEMFOLnuZeftgL4icKRrnfJzkyJoVo0w0bUzxsmzG72GlcaEz yC2v7OCyBdWBz8gbdgFdl4qKuI8CphAp5+XFJjUAMQD8CxkiUK4UtkhqX441gf18h5RnWzC2UX Gg/ibsiqFBc2qNhyegRe0coMnFGZrLKobSzkWTk7Wj9U0DZMFdSK1jhcV3yzYDcYHqxuUYIlm7 JIg= X-IronPort-AV: E=Sophos;i="5.73,418,1583218800"; d="scan'208";a="76664518" Received: from smtpout.microchip.com (HELO email.microchip.com) ([198.175.253.82]) by esa5.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 21 May 2020 10:30:55 -0700 Received: from chn-vm-ex02.mchp-main.com (10.10.85.144) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Thu, 21 May 2020 10:30:53 -0700 Received: from localhost (10.10.115.15) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server id 15.1.1713.5 via Frontend Transport; Thu, 21 May 2020 10:30:53 -0700 Date: Thu, 21 May 2020 19:30:33 +0000 From: Horatiu Vultur To: Nikolay Aleksandrov CC: , , , , , , , , , Subject: Re: [PATCH 1/3] bridge: mrp: Add br_mrp_unique_ifindex function Message-ID: <20200521193033.3f553xieh2a7eapl@soft-dev3.localdomain> References: <20200520130923.3196432-1-horatiu.vultur@microchip.com> <20200520130923.3196432-2-horatiu.vultur@microchip.com> <20200521181337.ory6lxyswatqhoej@soft-dev3.localdomain> <39ba5110-2c2a-6fd9-a3e3-000b52a366dc@cumulusnetworks.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Disposition: inline In-Reply-To: <39ba5110-2c2a-6fd9-a3e3-000b52a366dc@cumulusnetworks.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The 05/21/2020 19:58, Nikolay Aleksandrov wrote: > EXTERNAL EMAIL: Do not click links or open attachments unless you know the content is safe > > On 21/05/2020 21:49, Horatiu Vultur wrote: > > The 05/21/2020 11:16, Nikolay Aleksandrov wrote: > >> On 20/05/2020 16:09, Horatiu Vultur wrote: > >>> It is not allow to have the same net bridge port part of multiple MRP > >>> rings. Therefore add a check if the port is used already in a different > >>> MRP. In that case return failure. > >>> > >>> Fixes: 9a9f26e8f7ea ("bridge: mrp: Connect MRP API with the switchdev API") > >>> Signed-off-by: Horatiu Vultur > >>> --- > >>> net/bridge/br_mrp.c | 31 +++++++++++++++++++++++++++++++ > >>> 1 file changed, 31 insertions(+) > >>> > >>> diff --git a/net/bridge/br_mrp.c b/net/bridge/br_mrp.c > >>> index d7bc09de4c139..a5a3fa59c078a 100644 > >>> --- a/net/bridge/br_mrp.c > >>> +++ b/net/bridge/br_mrp.c > >>> @@ -37,6 +37,32 @@ static struct br_mrp *br_mrp_find_id(struct net_bridge *br, u32 ring_id) > >>> return res; > >>> } > >>> > >>> +static bool br_mrp_unique_ifindex(struct net_bridge *br, u32 ifindex) > >>> +{ > >>> + struct br_mrp *mrp; > >>> + bool res = true; > >>> + > >>> + rcu_read_lock(); > >> > >> Why do you need the rcu_read_lock() here when lockdep_rtnl_is_held() is used? > >> You should be able to just do rtnl_dereference() below as this is used only > >> under rtnl. > > > > Hi Nik, > > > > Also initially I thought that is not needed, but when I enabled all the > > RCU debug configs to see if I use correctly the RCU, I got a warning > > regarding suspicious RCU usage. > > And that is the reason why I have put it. > > > > Did you try using rtnl_dereference() instead of rcu_dereference() ? I have just tried it now and that seems to work fine. I will redo the patch and send a new patch series. > > >> > >>> + list_for_each_entry_rcu(mrp, &br->mrp_list, list, > >>> + lockdep_rtnl_is_held()) { > >>> + struct net_bridge_port *p; > >>> + > >>> + p = rcu_dereference(mrp->p_port); > >>> + if (p && p->dev->ifindex == ifindex) { > >>> + res = false; > >>> + break; > >>> + } > >>> + > >>> + p = rcu_dereference(mrp->s_port); > >>> + if (p && p->dev->ifindex == ifindex) { > >>> + res = false; > >>> + break; > >>> + } > >>> + } > >>> + rcu_read_unlock(); > >>> + return res; > >>> +} > >>> + > >>> static struct br_mrp *br_mrp_find_port(struct net_bridge *br, > >>> struct net_bridge_port *p) > >>> { > >>> @@ -255,6 +281,11 @@ int br_mrp_add(struct net_bridge *br, struct br_mrp_instance *instance) > >>> !br_mrp_get_port(br, instance->s_ifindex)) > >>> return -EINVAL; > >>> > >>> + /* It is not possible to have the same port part of multiple rings */ > >>> + if (!br_mrp_unique_ifindex(br, instance->p_ifindex) || > >>> + !br_mrp_unique_ifindex(br, instance->s_ifindex)) > >>> + return -EINVAL; > >>> + > >>> mrp = kzalloc(sizeof(*mrp), GFP_KERNEL); > >>> if (!mrp) > >>> return -ENOMEM; > >>> > >> > > > -- /Horatiu