Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp734633pxk; Wed, 23 Sep 2020 14:55:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiSXha6FTbULLm2+qeTeZw0AvN9AUgA5+nKNWUshQBq5Nyer28NdGEb+MdKdfjNLPwFTmq X-Received: by 2002:a50:ce06:: with SMTP id y6mr1442706edi.273.1600898102275; Wed, 23 Sep 2020 14:55:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600898102; cv=none; d=google.com; s=arc-20160816; b=HAgUsZXNZeOA3IOzePbKTQfi5DMLAic5zd8jgUM69pMiQkitl/65sYyl3xhTWU2Is4 a+BZrUgt+uIsT3vNNZ6wDFaK/Su6cJb3gvcKFVv7guLvQO1Tw4n+y3lbX4Teuh66E2JC UexcuwdbR4zpBS58qvI9PdkIe4BXczXAc+DKERSpIn4wSXRzfGZxL10t6QX89bD4BDep 0UsNUt4Nlm5EOm9HpcZLnhqsW1VvOut1zQXrNsZI9C/hYRjQcp+vjYS6PnRTOVtJVGDd o7qQGdVO7YotQV5GvWRbTQdPKgmcJjZGzSE3m4TTUk4a3fMb81vlKTRsiYxpu5hw8me4 BCxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:autocrypt:from :references:cc:to:subject:dkim-signature; bh=+6ZNaEzg/r1v4niD/rVaHjGaoWqx1/ApGOfBdEsegA8=; b=mS5afhHR1JNIprxYKUngJawJHfEAsTDRxkVTljE1QM8/ms9XADsEZu9PWtt9bMs0ua v/y51VK9KwItgUnH0diRlmIvxmVGzjlA9zfX5jwuZ1g/Fqrhzhn2crbD51GShDMZJyOl qvRN/hevJinznEa5p0PU/ow+DnkQk3yK/XOTdIEaqusl6vC2Y8BrkUhXZfIiBfKJsL9m nYylYpuEw+JddU4RoWcrLRhZx2gCtoiwpU+yiHr0I31gkY+yPUgvfXrqKhlph/owNaP8 ejCfKsibXWSdal37LDytDdZGl+n7qymIDSjtNMtEPE8HsdXpWKRef8H8GV0EzFz5W1+g vqRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=kWAWkkCY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o9si992920ejr.108.2020.09.23.14.54.38; Wed, 23 Sep 2020 14:55:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=kWAWkkCY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726711AbgIWVvR (ORCPT + 99 others); Wed, 23 Sep 2020 17:51:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45240 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726199AbgIWVvR (ORCPT ); Wed, 23 Sep 2020 17:51:17 -0400 Received: from mail-pf1-x444.google.com (mail-pf1-x444.google.com [IPv6:2607:f8b0:4864:20::444]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4BE10C0613CE; Wed, 23 Sep 2020 14:51:17 -0700 (PDT) Received: by mail-pf1-x444.google.com with SMTP id l126so498358pfd.5; Wed, 23 Sep 2020 14:51:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:autocrypt:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=+6ZNaEzg/r1v4niD/rVaHjGaoWqx1/ApGOfBdEsegA8=; b=kWAWkkCYCYOABV+VV9013ES550pbVm2+51GItp8Rp7sPkICTNL1kB6T8RHiEblT5Oa SMPL4MZgU3RgwLB/3R+sGCHDyMBVZoeuLLIModY7YpSwlt8CpAC4bmLyBNTakODH6n4+ XfYT6u/niRUjgbY3WlOjhN2M4onj5HVBe4LroJqjacrTNyFh/fn40hb+3XNTJ1XPrxH0 nLU+vs42r/HfDkqTxnqrbgh7Ie5lTgHCXJmGjUtq4hNzBGJgW7Co/dwjxP1+ONeZZKOo Az5YUGhnQPJESewARFC2febw+QJToXobNwQf9QqmAnLtw3M6cl6iCmSJRqG3O0mzUOtl GzOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=+6ZNaEzg/r1v4niD/rVaHjGaoWqx1/ApGOfBdEsegA8=; b=mCdDsz4q2hYyYJJJ1GtmPbxpdPPCsnNXO0Hhye55+Mua0vscMhccGhUpslGArBk6u/ S4H4WU6vlC3qMwp7WcN/ykLJavkW+44Yk5CoE9g2RmSqr9mTzT+PArEJC3/3Gqz0TCCE 6u9gD7/sjc2remb1gFNM7aQJp1hMFQL9qBkZROCcA4LajP3h1ImEgdpZVKkYJnWw9pq1 BNKjCkTaDihqqNjtO8eM5P20dLfWWpNxkonf301uqPx50H3ruyc2ycRV4LBNuI0EyrED q9bLvN4WZx14N0uATaWA5XpTgUUtLya1rRQiNuC9kmt4cWVgK8Czhk3yfUtnvem5Lgxm 6JFA== X-Gm-Message-State: AOAM532DLHO8QdQRQ0Rr8AQHMM9IAy5i2kjgWcoVhbaS9NrFESXeyz9O n37odDqzdYVDkLHnFr8hRn4= X-Received: by 2002:a63:806:: with SMTP id 6mr1390540pgi.71.1600897876757; Wed, 23 Sep 2020 14:51:16 -0700 (PDT) Received: from [10.67.49.188] ([192.19.223.252]) by smtp.googlemail.com with ESMTPSA id q4sm551814pfs.193.2020.09.23.14.51.12 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 23 Sep 2020 14:51:16 -0700 (PDT) Subject: Re: [PATCH net-next v3 1/2] net: dsa: untag the bridge pvid from rx skbs To: Vladimir Oltean Cc: "netdev@vger.kernel.org" , Andrew Lunn , Vivien Didelot , "David S. Miller" , Jakub Kicinski , open list , "olteanv@gmail.com" , "nikolay@nvidia.com" References: <20200923214038.3671566-1-f.fainelli@gmail.com> <20200923214038.3671566-2-f.fainelli@gmail.com> <20200923214852.x2z5gb6pzaphpfvv@skbuf> From: Florian Fainelli Autocrypt: addr=f.fainelli@gmail.com; prefer-encrypt=mutual; keydata= mQGiBEjPuBIRBACW9MxSJU9fvEOCTnRNqG/13rAGsj+vJqontvoDSNxRgmafP8d3nesnqPyR xGlkaOSDuu09rxuW+69Y2f1TzjFuGpBk4ysWOR85O2Nx8AJ6fYGCoeTbovrNlGT1M9obSFGQ X3IzRnWoqlfudjTO5TKoqkbOgpYqIo5n1QbEjCCwCwCg3DOH/4ug2AUUlcIT9/l3pGvoRJ0E AICDzi3l7pmC5IWn2n1mvP5247urtHFs/uusE827DDj3K8Upn2vYiOFMBhGsxAk6YKV6IP0d ZdWX6fqkJJlu9cSDvWtO1hXeHIfQIE/xcqvlRH783KrihLcsmnBqOiS6rJDO2x1eAgC8meAX SAgsrBhcgGl2Rl5gh/jkeA5ykwbxA/9u1eEuL70Qzt5APJmqVXR+kWvrqdBVPoUNy/tQ8mYc nzJJ63ng3tHhnwHXZOu8hL4nqwlYHRa9eeglXYhBqja4ZvIvCEqSmEukfivk+DlIgVoOAJbh qIWgvr3SIEuR6ayY3f5j0f2ejUMYlYYnKdiHXFlF9uXm1ELrb0YX4GMHz7QnRmxvcmlhbiBG YWluZWxsaSA8Zi5mYWluZWxsaUBnbWFpbC5jb20+iGYEExECACYCGyMGCwkIBwMCBBUCCAME FgIDAQIeAQIXgAUCVF/S8QUJHlwd3wAKCRBhV5kVtWN2DvCVAJ4u4/bPF4P3jxb4qEY8I2gS 6hG0gACffNWlqJ2T4wSSn+3o7CCZNd7SLSC5BA0ESM+4EhAQAL/o09boR9D3Vk1Tt7+gpYr3 WQ6hgYVON905q2ndEoA2J0dQxJNRw3snabHDDzQBAcqOvdi7YidfBVdKi0wxHhSuRBfuOppu pdXkb7zxuPQuSveCLqqZWRQ+Cc2QgF7SBqgznbe6Ngout5qXY5Dcagk9LqFNGhJQzUGHAsIs hap1f0B1PoUyUNeEInV98D8Xd/edM3mhO9nRpUXRK9Bvt4iEZUXGuVtZLT52nK6Wv2EZ1TiT OiqZlf1P+vxYLBx9eKmabPdm3yjalhY8yr1S1vL0gSA/C6W1o/TowdieF1rWN/MYHlkpyj9c Rpc281gAO0AP3V1G00YzBEdYyi0gaJbCEQnq8Vz1vDXFxHzyhgGz7umBsVKmYwZgA8DrrB0M oaP35wuGR3RJcaG30AnJpEDkBYHznI2apxdcuTPOHZyEilIRrBGzDwGtAhldzlBoBwE3Z3MY 31TOpACu1ZpNOMysZ6xiE35pWkwc0KYm4hJA5GFfmWSN6DniimW3pmdDIiw4Ifcx8b3mFrRO BbDIW13E51j9RjbO/nAaK9ndZ5LRO1B/8Fwat7bLzmsCiEXOJY7NNpIEpkoNoEUfCcZwmLrU +eOTPzaF6drw6ayewEi5yzPg3TAT6FV3oBsNg3xlwU0gPK3v6gYPX5w9+ovPZ1/qqNfOrbsE FRuiSVsZQ5s3AAMFD/9XjlnnVDh9GX/r/6hjmr4U9tEsM+VQXaVXqZuHKaSmojOLUCP/YVQo 7IiYaNssCS4FCPe4yrL4FJJfJAsbeyDykMN7wAnBcOkbZ9BPJPNCbqU6dowLOiy8AuTYQ48m vIyQ4Ijnb6GTrtxIUDQeOBNuQC/gyyx3nbL/lVlHbxr4tb6YkhkO6shjXhQh7nQb33FjGO4P WU11Nr9i/qoV8QCo12MQEo244RRA6VMud06y/E449rWZFSTwGqb0FS0seTcYNvxt8PB2izX+ HZA8SL54j479ubxhfuoTu5nXdtFYFj5Lj5x34LKPx7MpgAmj0H7SDhpFWF2FzcC1bjiW9mjW HaKaX23Awt97AqQZXegbfkJwX2Y53ufq8Np3e1542lh3/mpiGSilCsaTahEGrHK+lIusl6mz Joil+u3k01ofvJMK0ZdzGUZ/aPMZ16LofjFA+MNxWrZFrkYmiGdv+LG45zSlZyIvzSiG2lKy kuVag+IijCIom78P9jRtB1q1Q5lwZp2TLAJlz92DmFwBg1hyFzwDADjZ2nrDxKUiybXIgZp9 aU2d++ptEGCVJOfEW4qpWCCLPbOT7XBr+g/4H3qWbs3j/cDDq7LuVYIe+wchy/iXEJaQVeTC y5arMQorqTFWlEOgRA8OP47L9knl9i4xuR0euV6DChDrguup2aJVU4hPBBgRAgAPAhsMBQJU X9LxBQkeXB3fAAoJEGFXmRW1Y3YOj4UAn3nrFLPZekMeqX5aD/aq/dsbXSfyAKC45Go0YyxV HGuUuzv+GKZ6nsysJ7kCDQRXG8fwARAA6q/pqBi5PjHcOAUgk2/2LR5LjjesK50bCaD4JuNc YDhFR7Vs108diBtsho3w8WRd9viOqDrhLJTroVckkk74OY8r+3t1E0Dd4wHWHQZsAeUvOwDM PQMqTUBFuMi6ydzTZpFA2wBR9x6ofl8Ax+zaGBcFrRlQnhsuXLnM1uuvS39+pmzIjasZBP2H UPk5ifigXcpelKmj6iskP3c8QN6x6GjUSmYx+xUfs/GNVSU1XOZn61wgPDbgINJd/THGdqiO iJxCLuTMqlSsmh1+E1dSdfYkCb93R/0ZHvMKWlAx7MnaFgBfsG8FqNtZu3PCLfizyVYYjXbV WO1A23riZKqwrSJAATo5iTS65BuYxrFsFNPrf7TitM8E76BEBZk0OZBvZxMuOs6Z1qI8YKVK UrHVGFq3NbuPWCdRul9SX3VfOunr9Gv0GABnJ0ET+K7nspax0xqq7zgnM71QEaiaH17IFYGS sG34V7Wo3vyQzsk7qLf9Ajno0DhJ+VX43g8+AjxOMNVrGCt9RNXSBVpyv2AMTlWCdJ5KI6V4 KEzWM4HJm7QlNKE6RPoBxJVbSQLPd9St3h7mxLcne4l7NK9eNgNnneT7QZL8fL//s9K8Ns1W t60uQNYvbhKDG7+/yLcmJgjF74XkGvxCmTA1rW2bsUriM533nG9gAOUFQjURkwI8jvMAEQEA AYkCaAQYEQIACQUCVxvH8AIbAgIpCRBhV5kVtWN2DsFdIAQZAQIABgUCVxvH8AAKCRCH0Jac RAcHBIkHD/9nmfog7X2ZXMzL9ktT++7x+W/QBrSTCTmq8PK+69+INN1ZDOrY8uz6htfTLV9+ e2W6G8/7zIvODuHk7r+yQ585XbplgP0V5Xc8iBHdBgXbqnY5zBrcH+Q/oQ2STalEvaGHqNoD UGyLQ/fiKoLZTPMur57Fy1c9rTuKiSdMgnT0FPfWVDfpR2Ds0gpqWePlRuRGOoCln5GnREA/ 2MW2rWf+CO9kbIR+66j8b4RUJqIK3dWn9xbENh/aqxfonGTCZQ2zC4sLd25DQA4w1itPo+f5 V/SQxuhnlQkTOCdJ7b/mby/pNRz1lsLkjnXueLILj7gNjwTabZXYtL16z24qkDTI1x3g98R/ xunb3/fQwR8FY5/zRvXJq5us/nLvIvOmVwZFkwXc+AF+LSIajqQz9XbXeIP/BDjlBNXRZNdo dVuSU51ENcMcilPr2EUnqEAqeczsCGpnvRCLfVQeSZr2L9N4svNhhfPOEscYhhpHTh0VPyxI pPBNKq+byuYPMyk3nj814NKhImK0O4gTyCK9b+gZAVvQcYAXvSouCnTZeJRrNHJFTgTgu6E0 caxTGgc5zzQHeX67eMzrGomG3ZnIxmd1sAbgvJUDaD2GrYlulfwGWwWyTNbWRvMighVdPkSF 6XFgQaosWxkV0OELLy2N485YrTr2Uq64VKyxpncLh50e2RnyAJ9Za0Dx0yyp44iD1OvHtkEI M5kY0ACeNhCZJvZ5g4C2Lc9fcTHu8jxmEkI= Message-ID: <7fce7ddd-14a3-8301-d927-1dd4b4431ffb@gmail.com> Date: Wed, 23 Sep 2020 14:51:09 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200923214852.x2z5gb6pzaphpfvv@skbuf> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/23/20 2:48 PM, Vladimir Oltean wrote: > On Wed, Sep 23, 2020 at 02:40:37PM -0700, Florian Fainelli wrote: >> From: Vladimir Oltean >> + /* The sad part about attempting to untag from DSA is that we >> + * don't know, unless we check, if the skb will end up in >> + * the bridge's data path - br_allowed_ingress() - or not. >> + * For example, there might be an 8021q upper for the >> + * default_pvid of the bridge, which will steal VLAN-tagged traffic >> + * from the bridge's data path. This is a configuration that DSA >> + * supports because vlan_filtering is 0. In that case, we should >> + * definitely keep the tag, to make sure it keeps working. >> + */ >> + netdev_for_each_upper_dev_rcu(dev, upper_dev, iter) { >> + if (!is_vlan_dev(upper_dev)) >> + continue; >> + >> + if (vid == vlan_dev_vlan_id(upper_dev)) >> + return skb; >> + } > > Argh... > So I wanted to ask you how's performance with a few 8021q uppers, then I > remembered that vlan_do_receive() probably does something more efficient > here than a complete lookup, like hashing or something, then I found the > vlan_find_dev() helper function.... Sorry for not noticing it in the > first place. Given the platforms I am using this is not even noticeable, but I did not test with more than 10 uppers being added to the switch port. Speaking of that part of the code, I was also wondering whether you wanted this to be netdev_for_each_upper_dev_rcu(br, upper_dev, iter) and catch a bridge device upper as opposed to a switch port upper? Either way is fine and there are possibly use cases for either. -- Florian