Received: by 2002:a05:6a10:9afc:0:0:0:0 with SMTP id t28csp339505pxm; Tue, 1 Mar 2022 22:36:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJwCsd/f/pYjWOnbPiRr28quDhBkaf0YGYszJkiWhhNmrA874dQ7JrCAF5Rd/QUVJk47pZsD X-Received: by 2002:a63:e543:0:b0:373:efe3:6f46 with SMTP id z3-20020a63e543000000b00373efe36f46mr25114605pgj.183.1646202962874; Tue, 01 Mar 2022 22:36:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646202962; cv=none; d=google.com; s=arc-20160816; b=PMULXbvI8M8E+kf8c27fa2TBkR8s+L/TW7QE9IAB32D2FoWTpcJ4zUhFKMEKZh9dI3 UiacyjNCPeZ5AkDM9DAJglvgS0Cj1wn+KXomzJsgC1fvfDnxAxy21Q7ecHps/d+yGP0y PHQaX0W9rEIchYOsD9H8J9AAXJ3HFcU8f94dvTSsMhdqnj+GDFA2WfbWDNZX+S5oHJGk xueMBIHXdwnJOcVZFG8Y+gcTWSHYfFEeiqJ7VBN5yC6I3YPiW8lu9JD0w/hRMrQF0d79 Cs1xkRQLIEXtzKYZfy75rGns9C3ZaCI+70Gee4+djCWVf2ijccBWWkkZrCW4qL23cRbn xbnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:references:in-reply-to:user-agent:subject:cc:to:from :date:dkim-signature; bh=cl84KQHG0kLY2Y1AtHoZnag+g1VBQ0lA/b0TTIEWUMA=; b=GqKZ4hHE9OA+tG2ZtOFtVMTLPerFPtwQeg+mi9mVGJZRFwmsuE3EF/IWfavr94wePt WnS1an60kvqW3ZdVLaRnEjmf8N07NdnkuEsujWx0URARJ96zuRdFj/kp3CAZUDcNot1c 42CqLcgq+TO0dDaDkrH2u/4ZS1yS+npn1gB4u5cmnAb3vYOn8197cHeSW1FFR/6mgAws 4MnMVCHWR2T8+dKOkNnR8Jc9BzKS2wWWYipH7IUht7n5ufXU8bfdLwA71s7NkX7AMvri 5LHnE/xFQGfoGwQygkxx+iiJIs92HVd7FRViUxBmD0odBfEiYB2AJc6cYaMqFO81QVep 0iYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=G4WQZPeu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b4-20020a170903228400b0015160f484ebsi10060309plh.295.2022.03.01.22.35.41; Tue, 01 Mar 2022 22:36:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=G4WQZPeu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231694AbiCAXC0 (ORCPT + 99 others); Tue, 1 Mar 2022 18:02:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229572AbiCAXCZ (ORCPT ); Tue, 1 Mar 2022 18:02:25 -0500 Received: from mail-lf1-x130.google.com (mail-lf1-x130.google.com [IPv6:2a00:1450:4864:20::130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4ADF375E4C for ; Tue, 1 Mar 2022 15:01:43 -0800 (PST) Received: by mail-lf1-x130.google.com with SMTP id f37so29375093lfv.8 for ; Tue, 01 Mar 2022 15:01:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=blackwall-org.20210112.gappssmtp.com; s=20210112; h=date:from:to:cc:subject:user-agent:in-reply-to:references :message-id:mime-version:content-transfer-encoding; bh=cl84KQHG0kLY2Y1AtHoZnag+g1VBQ0lA/b0TTIEWUMA=; b=G4WQZPeuJ67KYxH1iyEWWP4afXHP1DbiGn9Z2EQAVY++9Bd2jTNI3gWI23hCxH5iw3 45Fx7Kx7ly0icPGy2Hjrkg+H8hekUuUVJRbrEqqg3e/27nqiJu29wGP46VuLOi6dYvD+ zcHmlv+zJhkgtutgJDrU2+3STeJo0LeUG5u/1TWT0b2Rr5v27VW7IZeyJeuIeRtO0Jze YH5zEk8x5yjLrefzFqaWwHEw1cZUxDZnwZLfAY6GCvp9kyJ+wYaAm8nKqNpu0Ye2zMHm F/RRP4AtnfD7vbeZ2W8HOIvb4MHj4E8FoOr1WHtdolp9yk/6iIz2QqikTnZ8bXu093By t8dA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:user-agent:in-reply-to :references:message-id:mime-version:content-transfer-encoding; bh=cl84KQHG0kLY2Y1AtHoZnag+g1VBQ0lA/b0TTIEWUMA=; b=6hn7IkZdxhEOP6EZLU6GYAcH1PMaFzo5/W0K80cyaAsruVJuBCjOhNYu+wqfINTnJQ 1+X7hf/GB13OUxvM9YSbWxF12Q5mo0du9QnRibu++L1OO3NbVujvCex4YRPQeSpVSC3g tsMAhs3089run2/6wbhSRIKuJEIz1REokBO5JDXGiANIyeCA8WINIXmylqJWa5p6jtCa ot8RhHnqfvlS0Pe05M+sHMpOyLpcw+IQUU3xtn9k4SJdsqo0I/KQ2zy1WRgeiuVmcMMV OX5lLaaBqRtQSqlkPPfQyZ1L6fu1QY/nKJZJDCtZNIANJVvlfu5dsmqFEHRmaPElZpEO sHZw== X-Gm-Message-State: AOAM532IXkhUB1jOMURYRuz8C1epyOknZ7YZPC3VX/X//Y2zWyFf37zc rYoUUuIULgOGA+tls+3cK2Y+qQ== X-Received: by 2002:a05:6512:2614:b0:445:777d:3530 with SMTP id bt20-20020a056512261400b00445777d3530mr14575512lfb.647.1646175694556; Tue, 01 Mar 2022 15:01:34 -0800 (PST) Received: from [127.0.0.1] ([213.239.67.158]) by smtp.gmail.com with ESMTPSA id g7-20020a19e047000000b0044395c894d2sm1718784lfj.163.2022.03.01.15.01.33 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 01 Mar 2022 15:01:34 -0800 (PST) Date: Wed, 02 Mar 2022 00:01:31 +0100 From: Nikolay Aleksandrov To: Tobias Waldekranz , davem@davemloft.net, kuba@kernel.org CC: Andrew Lunn , Vivien Didelot , Florian Fainelli , Vladimir Oltean , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Russell King , Petr Machata , Cooper Lees , Ido Schimmel , Matt Johnston , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org Subject: =?US-ASCII?Q?Re=3A_=5BPATCH_v2_net-next_01/10=5D_net=3A_bridg?= =?US-ASCII?Q?e=3A_mst=3A_Multiple_Spanning_Tree_=28MST=29_mode?= User-Agent: K-9 Mail for Android In-Reply-To: <20220301100321.951175-2-tobias@waldekranz.com> References: <20220301100321.951175-1-tobias@waldekranz.com> <20220301100321.951175-2-tobias@waldekranz.com> Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1 March 2022 11:03:12 CET, Tobias Waldekranz w= rote: >Allow the user to switch from the current per-VLAN STP mode to an MST >mode=2E > >Up to this point, per-VLAN STP states where always isolated from each >other=2E This is in contrast to the MSTP standard (802=2E1Q-2018, Clause >13=2E5), where VLANs are grouped into MST instances (MSTIs), and the >state is managed on a per-MSTI level, rather that at the per-VLAN >level=2E > >Perhaps due to the prevalence of the standard, many switching ASICs >are built after the same model=2E Therefore, add a corresponding MST >mode to the bridge, which we can later add offloading support for in a >straight-forward way=2E > >For now, all VLANs are fixed to MSTI 0, also called the Common >Spanning Tree (CST)=2E That is, all VLANs will follow the port-global >state=2E > >Upcoming changes will make this actually useful by allowing VLANs to >be mapped to arbitrary MSTIs and allow individual MSTI states to be >changed=2E > >Signed-off-by: Tobias Waldekranz >--- > include/uapi/linux/if_link=2Eh | 1 + > net/bridge/Makefile | 2 +- > net/bridge/br_input=2Ec | 17 +++++++- > net/bridge/br_mst=2Ec | 83 ++++++++++++++++++++++++++++++++++++ > net/bridge/br_netlink=2Ec | 14 +++++- > net/bridge/br_private=2Eh | 26 +++++++++++ > net/bridge/br_stp=2Ec | 3 ++ > net/bridge/br_vlan=2Ec | 20 ++++++++- > net/bridge/br_vlan_options=2Ec | 5 +++ > 9 files changed, 166 insertions(+), 5 deletions(-) > create mode 100644 net/bridge/br_mst=2Ec > Hi, As I mentioned in another review, I'm currently traveling and will have pc= access end of this week (Sun), I'll try to review the set as much as I can throug= h my phone in the meantime=2E Thanks for reworking it, generally looks good=2E A few comments below, >diff --git a/include/uapi/linux/if_link=2Eh b/include/uapi/linux/if_link= =2Eh >index e315e53125f4=2E=2E7e0a653aafa3 100644 >--- a/include/uapi/linux/if_link=2Eh >+++ b/include/uapi/linux/if_link=2Eh >@@ -482,6 +482,7 @@ enum { > IFLA_BR_VLAN_STATS_PER_PORT, > IFLA_BR_MULTI_BOOLOPT, > IFLA_BR_MCAST_QUERIER_STATE, >+ IFLA_BR_MST_ENABLED, Please use the boolopt api for new bridge boolean options like this one=2E > __IFLA_BR_MAX, > }; >=20 >diff --git a/net/bridge/Makefile b/net/bridge/Makefile >index 7fb9a021873b=2E=2E24bd1c0a9a5a 100644 >--- a/net/bridge/Makefile >+++ b/net/bridge/Makefile >@@ -20,7 +20,7 @@ obj-$(CONFIG_BRIDGE_NETFILTER) +=3D br_netfilter=2Eo >=20 > bridge-$(CONFIG_BRIDGE_IGMP_SNOOPING) +=3D br_multicast=2Eo br_mdb=2Eo b= r_multicast_eht=2Eo >=20 >-bridge-$(CONFIG_BRIDGE_VLAN_FILTERING) +=3D br_vlan=2Eo br_vlan_tunnel= =2Eo br_vlan_options=2Eo >+bridge-$(CONFIG_BRIDGE_VLAN_FILTERING) +=3D br_vlan=2Eo br_vlan_tunnel= =2Eo br_vlan_options=2Eo br_mst=2Eo >=20 > bridge-$(CONFIG_NET_SWITCHDEV) +=3D br_switchdev=2Eo >=20 >diff --git a/net/bridge/br_input=2Ec b/net/bridge/br_input=2Ec >index e0c13fcc50ed=2E=2E196417859c4a 100644 >--- a/net/bridge/br_input=2Ec >+++ b/net/bridge/br_input=2Ec >@@ -78,13 +78,22 @@ int br_handle_frame_finish(struct net *net, struct so= ck *sk, struct sk_buff *skb > u16 vid =3D 0; > u8 state; >=20 >- if (!p || p->state =3D=3D BR_STATE_DISABLED) >+ if (!p) > goto drop; >=20 > br =3D p->br; >+ >+ if (br_mst_is_enabled(br)) { >+ state =3D BR_STATE_FORWARDING; >+ } else { >+ if (p->state =3D=3D BR_STATE_DISABLED) >+ goto drop; >+ >+ state =3D p->state; >+ } >+ > brmctx =3D &p->br->multicast_ctx; > pmctx =3D &p->multicast_ctx; >- state =3D p->state; > if (!br_allowed_ingress(p->br, nbp_vlan_group_rcu(p), skb, &vid, > &state, &vlan)) > goto out; >@@ -370,9 +379,13 @@ static rx_handler_result_t br_handle_frame(struct sk= _buff **pskb) > return RX_HANDLER_PASS; >=20 > forward: >+ if (br_mst_is_enabled(p->br)) >+ goto defer_stp_filtering; >+ > switch (p->state) { > case BR_STATE_FORWARDING: > case BR_STATE_LEARNING: >+defer_stp_filtering: > if (ether_addr_equal(p->br->dev->dev_addr, dest)) > skb->pkt_type =3D PACKET_HOST; >=20 >diff --git a/net/bridge/br_mst=2Ec b/net/bridge/br_mst=2Ec >new file mode 100644 >index 000000000000=2E=2Ead6e91670fa8 >--- /dev/null >+++ b/net/bridge/br_mst=2Ec >@@ -0,0 +1,83 @@ >+// SPDX-License-Identifier: GPL-2=2E0-or-later >+/* >+ * Bridge Multiple Spanning Tree Support >+ * >+ * Authors: >+ * Tobias Waldekranz >+ */ >+ >+#include >+ >+#include "br_private=2Eh" >+ >+DEFINE_STATIC_KEY_FALSE(br_mst_used); >+ >+void br_mst_vlan_set_state(struct net_bridge_port *p, struct net_bridge_= vlan *v, >+ u8 state) >+{ >+ struct net_bridge_vlan_group *vg =3D nbp_vlan_group(p); >+ >+ if (v->state =3D=3D state) >+ return; >+ >+ br_vlan_set_state(v, state); >+ >+ if (v->vid =3D=3D vg->pvid) >+ br_vlan_set_pvid_state(vg, state); >+} >+ >+void br_mst_set_state(struct net_bridge_port *p, u16 msti, u8 state) >+{ >+ struct net_bridge_vlan_group *vg; >+ struct net_bridge_vlan *v; >+ >+ vg =3D nbp_vlan_group(p); >+ if (!vg) >+ return; >+ >+ list_for_each_entry(v, &vg->vlan_list, vlist) { >+ if (v->brvlan->msti !=3D msti) >+ continue; >+ >+ br_mst_vlan_set_state(p, v, state); >+ } >+} >+ >+void br_mst_vlan_init_state(struct net_bridge_vlan *v) >+{ >+ /* VLANs always start out in MSTI 0 (CST) */ >+ v->msti =3D 0; >+ >+ if (br_vlan_is_master(v)) >+ v->state =3D BR_STATE_FORWARDING; >+ else >+ v->state =3D v->port->state; >+} >+ >+int br_mst_set_enabled(struct net_bridge *br, unsigned long val) >+{ >+ struct net_bridge_vlan_group *vg; >+ struct net_bridge_port *p; >+ >+ /* Mode may only be changed when there are no port VLANs=2E */ >+ list_for_each_entry(p, &br->port_list, list) { >+ vg =3D nbp_vlan_group(p); >+ >+ if (vg->num_vlans) >+ return -EBUSY; >+ } >+ >+ if (val > 1) >+ return -EINVAL; >+ >+ if (!!val =3D=3D br_opt_get(br, BROPT_MST_ENABLED)) >+ return 0; >+ >+ if (val) >+ static_branch_enable(&br_mst_used); >+ else >+ static_branch_disable(&br_mst_used); >+ >+ br_opt_toggle(br, BROPT_MST_ENABLED, !!val); >+ return 0; >+} >diff --git a/net/bridge/br_netlink=2Ec b/net/bridge/br_netlink=2Ec >index 7d4432ca9a20=2E=2Ea17a0fe25a58 100644 >--- a/net/bridge/br_netlink=2Ec >+++ b/net/bridge/br_netlink=2Ec >@@ -1163,6 +1163,7 @@ static const struct nla_policy br_policy[IFLA_BR_MA= X + 1] =3D { > [IFLA_BR_MCAST_IGMP_VERSION] =3D { =2Etype =3D NLA_U8 }, > [IFLA_BR_MCAST_MLD_VERSION] =3D { =2Etype =3D NLA_U8 }, > [IFLA_BR_VLAN_STATS_PER_PORT] =3D { =2Etype =3D NLA_U8 }, >+ [IFLA_BR_MST_ENABLED] =3D { =2Etype =3D NLA_U8 }, > [IFLA_BR_MULTI_BOOLOPT] =3D > NLA_POLICY_EXACT_LEN(sizeof(struct br_boolopt_multi)), > }; >@@ -1255,6 +1256,14 @@ static int br_changelink(struct net_device *brdev,= struct nlattr *tb[], > if (err) > return err; > } >+ >+ if (data[IFLA_BR_MST_ENABLED]) { >+ __u8 mst =3D nla_get_u8(data[IFLA_BR_MST_ENABLED]); >+ >+ err =3D br_mst_set_enabled(br, mst); >+ if (err) >+ return err; >+ } > #endif >=20 > if (data[IFLA_BR_GROUP_FWD_MASK]) { >@@ -1475,6 +1484,7 @@ static size_t br_get_size(const struct net_device *= brdev) > nla_total_size(sizeof(u16)) + /* IFLA_BR_VLAN_DEFAULT_PVID */ > nla_total_size(sizeof(u8)) + /* IFLA_BR_VLAN_STATS_ENABLED *= / > nla_total_size(sizeof(u8)) + /* IFLA_BR_VLAN_STATS_PER_PORT */ >+ nla_total_size(sizeof(u8)) + /* IFLA_BR_MST_ENABLED */ > #endif > nla_total_size(sizeof(u16)) + /* IFLA_BR_GROUP_FWD_MASK */ > nla_total_size(sizeof(struct ifla_bridge_id)) + /* IFLA_BR_ROO= T_ID */ >@@ -1572,7 +1582,9 @@ static int br_fill_info(struct sk_buff *skb, const = struct net_device *brdev) > nla_put_u8(skb, IFLA_BR_VLAN_STATS_ENABLED, > br_opt_get(br, BROPT_VLAN_STATS_ENABLED)) || > nla_put_u8(skb, IFLA_BR_VLAN_STATS_PER_PORT, >- br_opt_get(br, BROPT_VLAN_STATS_PER_PORT))) >+ br_opt_get(br, BROPT_VLAN_STATS_PER_PORT)) || >+ nla_put_u8(skb, IFLA_BR_MST_ENABLED, >+ br_opt_get(br, BROPT_MST_ENABLED))) > return -EMSGSIZE; > #endif > #ifdef CONFIG_BRIDGE_IGMP_SNOOPING >diff --git a/net/bridge/br_private=2Eh b/net/bridge/br_private=2Eh >index 48bc61ebc211=2E=2Eaf50ad036b06 100644 >--- a/net/bridge/br_private=2Eh >+++ b/net/bridge/br_private=2Eh >@@ -178,6 +178,7 @@ enum { > * @br_mcast_ctx: if MASTER flag set, this is the global vlan multicast = context > * @port_mcast_ctx: if MASTER flag unset, this is the per-port/vlan mult= icast > * context >+ * @msti: if MASTER flag set, this holds the VLANs MST instance > * @vlist: sorted list of VLAN entries > * @rcu: used for entry destruction > * >@@ -210,6 +211,8 @@ struct net_bridge_vlan { > struct net_bridge_mcast_port port_mcast_ctx; > }; >=20 >+ u16 msti; >+ > struct list_head vlist; >=20 > struct rcu_head rcu; >@@ -445,6 +448,7 @@ enum net_bridge_opts { > BROPT_NO_LL_LEARN, > BROPT_VLAN_BRIDGE_BINDING, > BROPT_MCAST_VLAN_SNOOPING_ENABLED, >+ BROPT_MST_ENABLED, > }; >=20 > struct net_bridge { >@@ -1765,6 +1769,28 @@ static inline bool br_vlan_state_allowed(u8 state,= bool learn_allow) > } > #endif >=20 >+/* br_mst=2Ec */ >+#ifdef CONFIG_BRIDGE_VLAN_FILTERING >+DECLARE_STATIC_KEY_FALSE(br_mst_used); >+static inline bool br_mst_is_enabled(struct net_bridge *br) >+{ >+ return static_branch_unlikely(&br_mst_used) && >+ br_opt_get(br, BROPT_MST_ENABLED); >+} >+ >+void br_mst_set_state(struct net_bridge_port *p, u16 msti, u8 state); >+void br_mst_vlan_init_state(struct net_bridge_vlan *v); >+int br_mst_set_enabled(struct net_bridge *br, unsigned long val); >+#else >+static inline bool br_mst_is_enabled(struct net_bridge *br) >+{ >+ return false; >+} >+ >+static inline void br_mst_set_state(struct net_bridge_port *p, >+ u16 msti, u8 state) {} >+#endif >+ > struct nf_br_ops { > int (*br_dev_xmit_hook)(struct sk_buff *skb); > }; >diff --git a/net/bridge/br_stp=2Ec b/net/bridge/br_stp=2Ec >index 1d80f34a139c=2E=2E82a97a021a57 100644 >--- a/net/bridge/br_stp=2Ec >+++ b/net/bridge/br_stp=2Ec >@@ -43,6 +43,9 @@ void br_set_state(struct net_bridge_port *p, unsigned i= nt state) > return; >=20 > p->state =3D state; >+ if (br_opt_get(p->br, BROPT_MST_ENABLED)) >+ br_mst_set_state(p, 0, state); >+ > err =3D switchdev_port_attr_set(p->dev, &attr, NULL); > if (err && err !=3D -EOPNOTSUPP) > br_warn(p->br, "error setting offload STP state on port %u(%s)\n", >diff --git a/net/bridge/br_vlan=2Ec b/net/bridge/br_vlan=2Ec >index 7557e90b60e1=2E=2E0f5e75ccac79 100644 >--- a/net/bridge/br_vlan=2Ec >+++ b/net/bridge/br_vlan=2Ec >@@ -226,6 +226,24 @@ static void nbp_vlan_rcu_free(struct rcu_head *rcu) > kfree(v); > } >=20 >+static void br_vlan_init_state(struct net_bridge_vlan *v) >+{ >+ struct net_bridge *br; >+ >+ if (br_vlan_is_master(v)) >+ br =3D v->br; >+ else >+ br =3D v->port->br; >+ >+ if (br_opt_get(br, BROPT_MST_ENABLED)) { >+ br_mst_vlan_init_state(v); >+ return; >+ } >+ >+ v->state =3D BR_STATE_FORWARDING; >+ v->msti =3D 0; >+} >+ > /* This is the shared VLAN add function which works for both ports and b= ridge > * devices=2E There are four possible calls to this function in terms of= the > * vlan entry type: >@@ -322,7 +340,7 @@ static int __vlan_add(struct net_bridge_vlan *v, u16 = flags, > } >=20 > /* set the state before publishing */ >- v->state =3D BR_STATE_FORWARDING; >+ br_vlan_init_state(v); >=20 > err =3D rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode, > br_vlan_rht_params); >diff --git a/net/bridge/br_vlan_options=2Ec b/net/bridge/br_vlan_options= =2Ec >index a6382973b3e7=2E=2E09112b56e79c 100644 >--- a/net/bridge/br_vlan_options=2Ec >+++ b/net/bridge/br_vlan_options=2Ec >@@ -99,6 +99,11 @@ static int br_vlan_modify_state(struct net_bridge_vlan= _group *vg, > return -EBUSY; > } >=20 >+ if (br_opt_get(br, BROPT_MST_ENABLED)) { >+ NL_SET_ERR_MSG_MOD(extack, "Can't modify vlan state directly when MST = is enabled"); >+ return -EBUSY; >+ } >+ > if (v->state =3D=3D state) > return 0; >=20