Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp577735pxu; Thu, 15 Oct 2020 10:59:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCw5zG+1fPuLs41jxkU6gdgSpiA5KCSigR8h+tWCCsjkKyHFH71Cw1MLp9FEZW0OCFUzzw X-Received: by 2002:a17:906:2e8b:: with SMTP id o11mr5969300eji.128.1602784790477; Thu, 15 Oct 2020 10:59:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602784790; cv=none; d=google.com; s=arc-20160816; b=P3UvhpiTI1Kpn2UwANU60knY9eg1cgKwbC4z07u9dew/9HbK9d8al9Or0L9XlX5dTj pDOrYzLMh8UMcjKI3GEJpjia1bRF4ajfeiyxUSRuZLFNzKLefnIReWxX7E4g8eWs5f2X fUoyVZUZ5s/YJbsjmSzUGcPuIAYDtY06W25zPMzSZ5FsP70flEUiSDZHzJuY7ch8wd/W FGF985Xfw/mChD/O5FLM8AhBtUbYuI7Yko1G1HjR1ETJoJZoOrIsSfaPG8RMtaMDZO3E +WnRUfy21Z1omfkjzHqJmLW/UdFfwUJ9usxoq58o5ZwjyEHbhS59PepqurAxUioSZyNA QteA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:dkim-signature; bh=EnVSah1BIKlwy0amXhVMx/PtVo2zOuIya7TVZigc2FU=; b=Y7Z2G1UN9rosDhNfRbAUqfcOUVx1ps50Lt2NDgCpLpPfpvjABf6XpJjIxI4UcJRDBh o/gT1P1CDKpsHbOboK3+V21IuLqBznmPd4mgH804Qeb6U6hMgTwqBmBiXMTakvbv/CoX fqEJ5momlhya34Ryp9ZWY+D4WVj6bTDlHACfRcm84TsLVIzCXMGA+sgRg1mnRUrRvzr3 O55glhiUuggXCe2RFYz06aw1IljyWYQycM7RKdXLAR540sngXMFS6dU4YHDINKfeInM6 n7nCAim9OMAYGy3iiG/P6gz0iKkU46QzqLSwt0vN8oKzrTyRrKGeq0oMTnfKk9tjMrcd ouAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@microchip.com header.s=mchp header.b=D9egL6Z4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e24si2518212edc.488.2020.10.15.10.59.15; Thu, 15 Oct 2020 10:59:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@microchip.com header.s=mchp header.b=D9egL6Z4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730867AbgJOMAv (ORCPT + 99 others); Thu, 15 Oct 2020 08:00:51 -0400 Received: from esa1.microchip.iphmx.com ([68.232.147.91]:43471 "EHLO esa1.microchip.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730005AbgJOL4I (ORCPT ); Thu, 15 Oct 2020 07:56:08 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1602762967; x=1634298967; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=AX5ILQYqJRWeHAR7oYK44Hjs5w5Q2DJ98accN2OCBmQ=; b=D9egL6Z46Ctzt+1Hj5HoCaXyPQ7M3WfGDK4dFgiDOiAR9Od1QbkQh8Hf Y10G9oln2+ZOyPBka45oSnBlqG7bR6LL31MnxsAyRWsKVmC3CXcfMU1Au LaH8OhTboXQu3E9lFiu9PIf4bnzX9O6aS9WyEHhHIPcmnkAYm/Q82cSwJ FBUfhnfKAIYe8AyvbddebBm1OLynPakAW+MQY8znQg/PAuHczjqh/C9X2 lURhiK0J5LQAAEiU3vK6IkaSepkPIZG/sQAA/y3gZFj2SZrwOAaoMow4a dRWJ5coFZFtFsPpAwbjLVzZnsgHwtA3N6Ro4eo8xn9l3q4mSlw36EHFzD Q==; IronPort-SDR: lEAeIEjPil8Rawe9KaeobYTguBzBDL25qmYNSf6FaqZzKijuYgMX1uSAhbzpfmkfm6A34l0dOa 5WACXK+6GDQLmOi3tLtzb54pes9wvypfcbuSNfTM1e1qCBTyrI8QfGqGurt9h7ITDZenBHogxL 2siHVf6dkKmvzjCA03qheMyow3Uun4Xb44wdtI3GiSOaLnKHUEQTmwfePE5Qorl7H+RakMtdDN 3QiJavCr0I72kOpVT62ff/Ul0cM7AaQ4PhUPuj6DDzGaNx5CcbITrdBUSRNYx+xWMvpRYHoddl ciQ= X-IronPort-AV: E=Sophos;i="5.77,378,1596524400"; d="scan'208";a="99627350" Received: from smtpout.microchip.com (HELO email.microchip.com) ([198.175.253.82]) by esa1.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 15 Oct 2020 04:56:07 -0700 Received: from chn-vm-ex03.mchp-main.com (10.10.85.151) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1979.3; Thu, 15 Oct 2020 04:56:06 -0700 Received: from soft-test08.microsemi.net (10.10.115.15) by chn-vm-ex03.mchp-main.com (10.10.85.151) with Microsoft SMTP Server id 15.1.1979.3 via Frontend Transport; Thu, 15 Oct 2020 04:56:04 -0700 From: Henrik Bjoernlund To: , , , , , , , , , CC: Henrik Bjoernlund , Horatiu Vultur Subject: [PATCH net-next v6 01/10] net: bridge: extend the process of special frames Date: Thu, 15 Oct 2020 11:54:09 +0000 Message-ID: <20201015115418.2711454-2-henrik.bjoernlund@microchip.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201015115418.2711454-1-henrik.bjoernlund@microchip.com> References: <20201015115418.2711454-1-henrik.bjoernlund@microchip.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch extends the processing of frames in the bridge. Currently MRP frames needs special processing and the current implementation doesn't allow a nice way to process different frame types. Therefore try to improve this by adding a list that contains frame types that need special processing. This list is iterated for each input frame and if there is a match based on frame type then these functions will be called and decide what to do with the frame. It can process the frame then the bridge doesn't need to do anything or don't process so then the bridge will do normal forwarding. Signed-off-by: Henrik Bjoernlund Reviewed-by: Horatiu Vultur Acked-by: Nikolay Aleksandrov --- net/bridge/br_device.c | 1 + net/bridge/br_input.c | 33 ++++++++++++++++++++++++++++++++- net/bridge/br_mrp.c | 19 +++++++++++++++---- net/bridge/br_private.h | 19 ++++++++++++------- 4 files changed, 60 insertions(+), 12 deletions(-) diff --git a/net/bridge/br_device.c b/net/bridge/br_device.c index 6f742fee874a..15c6445fa998 100644 --- a/net/bridge/br_device.c +++ b/net/bridge/br_device.c @@ -454,6 +454,7 @@ void br_dev_setup(struct net_device *dev) spin_lock_init(&br->lock); INIT_LIST_HEAD(&br->port_list); INIT_HLIST_HEAD(&br->fdb_list); + INIT_HLIST_HEAD(&br->frame_type_list); #if IS_ENABLED(CONFIG_BRIDGE_MRP) INIT_LIST_HEAD(&br->mrp_list); #endif diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c index 59a318b9f646..bece03bf83c4 100644 --- a/net/bridge/br_input.c +++ b/net/bridge/br_input.c @@ -254,6 +254,21 @@ static int nf_hook_bridge_pre(struct sk_buff *skb, struct sk_buff **pskb) return RX_HANDLER_CONSUMED; } +/* Return 0 if the frame was not processed otherwise 1 + * note: already called with rcu_read_lock + */ +static int br_process_frame_type(struct net_bridge_port *p, + struct sk_buff *skb) +{ + struct br_frame_type *tmp; + + hlist_for_each_entry_rcu(tmp, &p->br->frame_type_list, list) + if (unlikely(tmp->type == skb->protocol)) + return tmp->frame_handler(p, skb); + + return 0; +} + /* * Return NULL if skb is handled * note: already called with rcu_read_lock @@ -343,7 +358,7 @@ static rx_handler_result_t br_handle_frame(struct sk_buff **pskb) } } - if (unlikely(br_mrp_process(p, skb))) + if (unlikely(br_process_frame_type(p, skb))) return RX_HANDLER_PASS; forward: @@ -380,3 +395,19 @@ rx_handler_func_t *br_get_rx_handler(const struct net_device *dev) return br_handle_frame; } + +void br_add_frame(struct net_bridge *br, struct br_frame_type *ft) +{ + hlist_add_head_rcu(&ft->list, &br->frame_type_list); +} + +void br_del_frame(struct net_bridge *br, struct br_frame_type *ft) +{ + struct br_frame_type *tmp; + + hlist_for_each_entry(tmp, &br->frame_type_list, list) + if (ft == tmp) { + hlist_del_rcu(&ft->list); + return; + } +} diff --git a/net/bridge/br_mrp.c b/net/bridge/br_mrp.c index b36689e6e7cb..f94d72bb7c32 100644 --- a/net/bridge/br_mrp.c +++ b/net/bridge/br_mrp.c @@ -6,6 +6,13 @@ static const u8 mrp_test_dmac[ETH_ALEN] = { 0x1, 0x15, 0x4e, 0x0, 0x0, 0x1 }; static const u8 mrp_in_test_dmac[ETH_ALEN] = { 0x1, 0x15, 0x4e, 0x0, 0x0, 0x3 }; +static int br_mrp_process(struct net_bridge_port *p, struct sk_buff *skb); + +static struct br_frame_type mrp_frame_type __read_mostly = { + .type = cpu_to_be16(ETH_P_MRP), + .frame_handler = br_mrp_process, +}; + static bool br_mrp_is_ring_port(struct net_bridge_port *p_port, struct net_bridge_port *s_port, struct net_bridge_port *port) @@ -445,6 +452,9 @@ static void br_mrp_del_impl(struct net_bridge *br, struct br_mrp *mrp) list_del_rcu(&mrp->list); kfree_rcu(mrp, rcu); + + if (list_empty(&br->mrp_list)) + br_del_frame(br, &mrp_frame_type); } /* Adds a new MRP instance. @@ -493,6 +503,9 @@ int br_mrp_add(struct net_bridge *br, struct br_mrp_instance *instance) spin_unlock_bh(&br->lock); rcu_assign_pointer(mrp->s_port, p); + if (list_empty(&br->mrp_list)) + br_add_frame(br, &mrp_frame_type); + INIT_DELAYED_WORK(&mrp->test_work, br_mrp_test_work_expired); INIT_DELAYED_WORK(&mrp->in_test_work, br_mrp_in_test_work_expired); list_add_tail_rcu(&mrp->list, &br->mrp_list); @@ -1172,15 +1185,13 @@ static int br_mrp_rcv(struct net_bridge_port *p, * normal forwarding. * note: already called with rcu_read_lock */ -int br_mrp_process(struct net_bridge_port *p, struct sk_buff *skb) +static int br_mrp_process(struct net_bridge_port *p, struct sk_buff *skb) { /* If there is no MRP instance do normal forwarding */ if (likely(!(p->flags & BR_MRP_AWARE))) goto out; - if (unlikely(skb->protocol == htons(ETH_P_MRP))) - return br_mrp_rcv(p, skb, p->dev); - + return br_mrp_rcv(p, skb, p->dev); out: return 0; } diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h index 345118e35c42..2fe8b88d090e 100644 --- a/net/bridge/br_private.h +++ b/net/bridge/br_private.h @@ -383,7 +383,7 @@ enum net_bridge_opts { struct net_bridge { spinlock_t lock; spinlock_t hash_lock; - struct list_head port_list; + struct hlist_head frame_type_list; struct net_device *dev; struct pcpu_sw_netstats __percpu *stats; unsigned long options; @@ -395,6 +395,7 @@ struct net_bridge { #endif struct rhashtable fdb_hash_tbl; + struct list_head port_list; #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER) union { struct rtable fake_rtable; @@ -755,6 +756,16 @@ int nbp_backup_change(struct net_bridge_port *p, struct net_device *backup_dev); int br_handle_frame_finish(struct net *net, struct sock *sk, struct sk_buff *skb); rx_handler_func_t *br_get_rx_handler(const struct net_device *dev); +struct br_frame_type { + __be16 type; + int (*frame_handler)(struct net_bridge_port *port, + struct sk_buff *skb); + struct hlist_node list; +}; + +void br_add_frame(struct net_bridge *br, struct br_frame_type *ft); +void br_del_frame(struct net_bridge *br, struct br_frame_type *ft); + static inline bool br_rx_handler_check_rcu(const struct net_device *dev) { return rcu_dereference(dev->rx_handler) == br_get_rx_handler(dev); @@ -1417,7 +1428,6 @@ extern int (*br_fdb_test_addr_hook)(struct net_device *dev, unsigned char *addr) #if IS_ENABLED(CONFIG_BRIDGE_MRP) int br_mrp_parse(struct net_bridge *br, struct net_bridge_port *p, struct nlattr *attr, int cmd, struct netlink_ext_ack *extack); -int br_mrp_process(struct net_bridge_port *p, struct sk_buff *skb); bool br_mrp_enabled(struct net_bridge *br); void br_mrp_port_del(struct net_bridge *br, struct net_bridge_port *p); int br_mrp_fill_info(struct sk_buff *skb, struct net_bridge *br); @@ -1429,11 +1439,6 @@ static inline int br_mrp_parse(struct net_bridge *br, struct net_bridge_port *p, return -EOPNOTSUPP; } -static inline int br_mrp_process(struct net_bridge_port *p, struct sk_buff *skb) -{ - return 0; -} - static inline bool br_mrp_enabled(struct net_bridge *br) { return false; -- 2.28.0