Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp2224612pxf; Sat, 3 Apr 2021 16:26:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzOVs8kM5ksMsxav5z+IQNV/r2K5sGEmaRim4SmBDqxHZ3iMZiOQZKo4C+zK5Bj6gAyiUju X-Received: by 2002:a02:b890:: with SMTP id p16mr17873364jam.138.1617492408014; Sat, 03 Apr 2021 16:26:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617492408; cv=none; d=google.com; s=arc-20160816; b=F85StiX8SdVR/rE3iKgeWq15M8c37fFFtpOIeA7lGKSK/t+FQtw6edqivfn2sCuDkV i1eADTE/dqamQflDhEDPntdKevYQeS+tLQNkt3Jm3n6DD3iBOkW+Zs5CUGAhQM38ODut lWzlAv7XyZ3CRcbpnS/5lIWlIyArUPG8r5fqn7fdZcev4fWHeXt1h7W7MWUEeZtac6dE eHhuwQ+E6lGxbzZrV9o3grYEhmQxrq39Ar51Jf6x/EF2cZG+DwfZwpYMdwSV9L6D+665 EuL6RCR2za6RWRyF/zB77L0l26DbMfb8ZOEkSyXZ25E9Azs+ML8so7D9YZadkwoFUhs1 r84A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3NYy65r3sNSaZ6qP4wGJkqF3C1hb3ikExN3QUcThn4Y=; b=OqujVmtQInSySwlzVM242mXw8Ngn5g0c0OA+fmQ9c4f+62hmAVp8S28mzWMZ3JlDWy 687/57oer9LN4UOM30epitqoH7NbCb+KYN3fqSE+jrHWnZ9vE9nmJFswxyGGl2/Z59oZ r+RPJ4Q7hoOuVmUYZsh2nuY9gpyiwnnLSom9q5EgpF9y72IqnMZFHtowR/B5qPijcm+8 IiRncqO0cK6JOiykh2eoE42dOjY+XpfCwh92aIlaea9tUx1ANUw+/Rakp5AHwH9l/601 J3jwCGfg8lvGN7z94KPO+A1LrPLik6z/yrneK4Vn9/AgnwxTPj6dstMViE7G/Dcq17of pb+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Z9/V/L7p"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t7si12436542jaj.40.2021.04.03.16.26.32; Sat, 03 Apr 2021 16:26:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="Z9/V/L7p"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236870AbhDCXV1 (ORCPT + 99 others); Sat, 3 Apr 2021 19:21:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45084 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236625AbhDCXV0 (ORCPT ); Sat, 3 Apr 2021 19:21:26 -0400 Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 15979C061756; Sat, 3 Apr 2021 16:21:23 -0700 (PDT) Received: by mail-ej1-x62c.google.com with SMTP id mh7so2047740ejb.12; Sat, 03 Apr 2021 16:21:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=3NYy65r3sNSaZ6qP4wGJkqF3C1hb3ikExN3QUcThn4Y=; b=Z9/V/L7pqpGWFrNgdJRjtggv+DGlfFxvJOiufHVoRZM/DaB512rUHckbLnUCpfmLAQ M+s8mSgP/suD0MXZu86RLMclNsOrphw+m6QWjdIglcVFZgNwhIQlaf6Oasi/hPXSRA7s khOlkoHppjoERcATHT6bie/E1KVNW75MU83wMbBVGWpJFsIPZlwtbthhPgdNCB6CPiil TJ4LYoeoqoA/enR8z24jiQQpntwHMiv/3Pbwho1gyklQJVidsCXD6i+sOEluI3+0DLOD ISpG7wLxHibwmpt29tcCQpeEyEnlXIkwt+62C3uuNBE9fNdi2dRrt8F+IUozIkk1gvCH CjpA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=3NYy65r3sNSaZ6qP4wGJkqF3C1hb3ikExN3QUcThn4Y=; b=naRJ7yPrrzUQa1t6REJ4xxH57rQ5KrQ9A/pboR4PBxiwE0nyiLbyPxY9n3R8bE5jKP Jx4n6JpNMSOWshudfvYNkB5p2RWiHtpqy/7WrX1vTz5X65ZAeCZFPdS3Bq4xL5JM6NyQ uGtHHPUt8MOpO2bF2S3I7VSB6572FKP30KqcHhliipAdHk1tdivNN1ZhDPE1dlAnVVDL yf3RRqjV6JyTPVAvdaKGtnYHEK4XM+7iDX0iwyBpJjlnn/p1nfZievafx3wvgysnELth kK3Ocsn6smggnnAli+cflAZ1qCFK+iEfcczymRDDca29ddalDFIcMskF5eFznri4gOUl hdgQ== X-Gm-Message-State: AOAM530r4yb8ZYZbC1lpbDGJjtthyY/tb74mvUrdQw8wnMO/DOnfrnLa N7zajw8XS+rMb+uslkcLgO1aHwHCBbA= X-Received: by 2002:a17:906:2312:: with SMTP id l18mr21557405eja.468.1617492079098; Sat, 03 Apr 2021 16:21:19 -0700 (PDT) Received: from skbuf (5-12-16-165.residential.rdsnet.ro. [5.12.16.165]) by smtp.gmail.com with ESMTPSA id mp36sm5804153ejc.48.2021.04.03.16.21.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 03 Apr 2021 16:21:18 -0700 (PDT) Date: Sun, 4 Apr 2021 02:21:16 +0300 From: Vladimir Oltean To: Oleksij Rempel Cc: Andrew Lunn , Vivien Didelot , Florian Fainelli , "David S. Miller" , Jakub Kicinski , Russell King , Pengutronix Kernel Team , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mips@vger.kernel.org Subject: Re: [PATCH net-next v1 1/9] net: dsa: add rcv_post call back Message-ID: <20210403232116.knf6d7gdrvamk2lj@skbuf> References: <20210403114848.30528-1-o.rempel@pengutronix.de> <20210403114848.30528-2-o.rempel@pengutronix.de> <20210403140534.c4ydlgu5hqh7bmcq@skbuf> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210403140534.c4ydlgu5hqh7bmcq@skbuf> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Apr 03, 2021 at 05:05:34PM +0300, Vladimir Oltean wrote: > On Sat, Apr 03, 2021 at 01:48:40PM +0200, Oleksij Rempel wrote: > > Some switches (for example ar9331) do not provide enough information > > about forwarded packets. If the switch decision was made based on IPv4 > > or IPv6 header, we need to analyze it and set proper flag. > > > > Potentially we can do it in existing rcv path, on other hand we can > > avoid part of duplicated work and let the dsa framework set skb header > > pointers and then use preprocessed skb one step later withing the rcv_post > > call back. > > > > This patch is needed for ar9331 switch. > > > > Signed-off-by: Oleksij Rempel > > --- > > I don't necessarily disagree with this, perhaps we can even move > Florian's dsa_untag_bridge_pvid() call inside a rcv_post() method > implemented by the DSA_TAG_PROTO_BRCM_LEGACY, DSA_TAG_PROTO_BRCM_PREPEND > and DSA_TAG_PROTO_BRCM taggers. Or even better, because Oleksij's > rcv_post is already prototype-compatible with dsa_untag_bridge_pvid, we > can already do: > > .rcv_post = dsa_untag_bridge_pvid, > > This should be generally useful for stuff that DSA taggers need to do > which is easiest done after eth_type_trans() was called. I had some fun with an alternative method of parsing the frame for IGMP so that you can clear skb->offload_fwd_mark, which doesn't rely on the introduction of a new method in DSA. It should also have several other advantages compared to your solution such as the fact that it should work with VLAN-tagged packets. Background: we made Receive Packet Steering work on DSA master interfaces (echo 3 > /sys/class/net/eth0/queues/rx-1/rps_cpus) even when the DSA tag shifts to the right the IP headers and everything that comes afterwards. The flow dissector had to be patched for that, just grep for DSA in net/core/flow_dissector.c. The problem you're facing is that you can't parse the IP and IGMP headers in the tagger's rcv() method, since the network header, transport header offsets and skb->protocol are all messed up, since eth_type_trans hasn't been called yet. And that's the trick right there, you're between a rock and a hard place: too early because eth_type_trans wasn't called yet, and too late because skb->dev was changed and no longer points to the DSA master, so the flow dissector adjustment we made doesn't apply. But if you call the flow dissector _before_ you call "skb->dev = dsa_master_find_slave" (and yes, while the DSA tag is still there), then it's virtually as if you had called that while the skb belonged to the DSA master, so it should work with __skb_flow_dissect. In fact I prototyped this idea below. I wanted to check whether I can match something as fine-grained as an IGMPv2 Membership Report message, and I could. I prototyped it inside the ocelot tagging protocol driver because that's what I had handy. I used __skb_flow_dissect with my own flow dissector which had to be initialized at the tagger module_init time, even though I think I could have probably just called skb_flow_dissect_flow_keys with a standard dissector, and that would have removed the need for the custom module_init in tag_ocelot.c. One thing that is interesting is that I had to add the bits for IGMP parsing to the flow dissector myself (based on the existing ICMP code). I was too lazy to do that for MLD as well, but it is really not hard. Or even better, if you don't need to look at all inside the IGMP/MLD header, I think you can even omit adding this parsing code to the flow dissector and just look at basic.n_proto and basic.ip_proto. See the snippet below. Hope it helps. -----------------------------[ cut here ]----------------------------- diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h index ffd386ea0dbb..4c25fa47637a 100644 --- a/include/net/flow_dissector.h +++ b/include/net/flow_dissector.h @@ -190,6 +190,20 @@ struct flow_dissector_key_icmp { u16 id; }; +/** + * flow_dissector_key_igmp: + * type: indicates the message type, see include/uapi/linux/igmp.h + * code: Max Resp Code, the maximum time in 1/10 second + * increments before sending a responding report + * group: the multicast address being queried when sending a + * Group-Specific or Group-and-Source-Specific Query. + */ +struct flow_dissector_key_igmp { + u8 type; + u8 code; /* Max Resp Time in IGMPv2 */ + __be32 group; +}; + /** * struct flow_dissector_key_eth_addrs: * @src: source Ethernet address @@ -259,6 +273,7 @@ enum flow_dissector_key_id { FLOW_DISSECTOR_KEY_PORTS, /* struct flow_dissector_key_ports */ FLOW_DISSECTOR_KEY_PORTS_RANGE, /* struct flow_dissector_key_ports */ FLOW_DISSECTOR_KEY_ICMP, /* struct flow_dissector_key_icmp */ + FLOW_DISSECTOR_KEY_IGMP, /* struct flow_dissector_key_igmp */ FLOW_DISSECTOR_KEY_ETH_ADDRS, /* struct flow_dissector_key_eth_addrs */ FLOW_DISSECTOR_KEY_TIPC, /* struct flow_dissector_key_tipc */ FLOW_DISSECTOR_KEY_ARP, /* struct flow_dissector_key_arp */ @@ -314,6 +329,7 @@ struct flow_keys { struct flow_dissector_key_keyid keyid; struct flow_dissector_key_ports ports; struct flow_dissector_key_icmp icmp; + struct flow_dissector_key_igmp igmp; /* 'addrs' must be the last member */ struct flow_dissector_key_addrs addrs; }; diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c index 5985029e43d4..8cc8c34ea5cd 100644 --- a/net/core/flow_dissector.c +++ b/net/core/flow_dissector.c @@ -202,6 +202,30 @@ static void __skb_flow_dissect_icmp(const struct sk_buff *skb, skb_flow_get_icmp_tci(skb, key_icmp, data, thoff, hlen); } +static void __skb_flow_dissect_igmp(const struct sk_buff *skb, + struct flow_dissector *flow_dissector, + void *target_container, const void *data, + int thoff, int hlen) +{ + struct flow_dissector_key_igmp *key_igmp; + struct igmphdr *ih, _ih; + + if (!dissector_uses_key(flow_dissector, FLOW_DISSECTOR_KEY_IGMP)) + return; + + ih = __skb_header_pointer(skb, thoff, sizeof(_ih), data, hlen, &_ih); + if (!ih) + return; + + key_igmp = skb_flow_dissector_target(flow_dissector, + FLOW_DISSECTOR_KEY_IGMP, + target_container); + + key_igmp->type = ih->type; + key_igmp->code = ih->code; + key_igmp->group = ih->group; +} + void skb_flow_dissect_meta(const struct sk_buff *skb, struct flow_dissector *flow_dissector, void *target_container) @@ -1398,6 +1422,11 @@ bool __skb_flow_dissect(const struct net *net, data, nhoff, hlen); break; + case IPPROTO_IGMP: + __skb_flow_dissect_igmp(skb, flow_dissector, target_container, + data, nhoff, hlen); + break; + default: break; } diff --git a/net/dsa/tag_ocelot.c b/net/dsa/tag_ocelot.c index f9df9cac81c5..a2cc824ddeec 100644 --- a/net/dsa/tag_ocelot.c +++ b/net/dsa/tag_ocelot.c @@ -2,9 +2,51 @@ /* Copyright 2019 NXP Semiconductors */ #include +#include #include #include "dsa_priv.h" +static const struct flow_dissector_key ocelot_flow_keys[] = { + { + .key_id = FLOW_DISSECTOR_KEY_CONTROL, + .offset = offsetof(struct flow_keys, control), + }, + { + .key_id = FLOW_DISSECTOR_KEY_BASIC, + .offset = offsetof(struct flow_keys, basic), + }, + { + .key_id = FLOW_DISSECTOR_KEY_IGMP, + .offset = offsetof(struct flow_keys, igmp), + }, +}; + +static struct flow_dissector ocelot_flow_dissector __read_mostly; + +static struct sk_buff *ocelot_drop_igmp(struct sk_buff *skb) +{ + struct flow_keys fk; + + memset(&fk, 0, sizeof(fk)); + + if (!__skb_flow_dissect(NULL, skb, &ocelot_flow_dissector, + &fk, NULL, 0, 0, 0, 0)) + return skb; + + if (fk.basic.n_proto != htons(ETH_P_IP)) + return skb; + + if (fk.basic.ip_proto != IPPROTO_IGMP) + return skb; + + if (fk.igmp.type != IGMPV2_HOST_MEMBERSHIP_REPORT) + return skb; + + skb_dump(KERN_ERR, skb, true); + + return NULL; +} + static void ocelot_xmit_ptp(struct dsa_port *dp, void *injection, struct sk_buff *clone) { @@ -84,6 +126,10 @@ static struct sk_buff *ocelot_rcv(struct sk_buff *skb, u8 *extraction; u16 vlan_tpid; + skb = ocelot_drop_igmp(skb); + if (!skb) + return NULL; + /* Revert skb->data by the amount consumed by the DSA master, * so it points to the beginning of the frame. */ @@ -186,6 +232,23 @@ static struct dsa_tag_driver *ocelot_tag_driver_array[] = { &DSA_TAG_DRIVER_NAME(seville_netdev_ops), }; -module_dsa_tag_drivers(ocelot_tag_driver_array); +static int __init dsa_tag_driver_module_init(void) +{ + skb_flow_dissector_init(&ocelot_flow_dissector, ocelot_flow_keys, + ARRAY_SIZE(ocelot_flow_keys)); + + dsa_tag_drivers_register(ocelot_tag_driver_array, + ARRAY_SIZE(ocelot_tag_driver_array), + THIS_MODULE); + return 0; +} +module_init(dsa_tag_driver_module_init); + +static void __exit dsa_tag_driver_module_exit(void) +{ + dsa_tag_drivers_unregister(ocelot_tag_driver_array, + ARRAY_SIZE(ocelot_tag_driver_array)); +} +module_exit(dsa_tag_driver_module_exit) MODULE_LICENSE("GPL v2"); -----------------------------[ cut here ]-----------------------------