Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp289538pxp; Fri, 11 Mar 2022 04:31:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJyuisgcxYXWJLNo+cHanMvUfiZ7aUjML8DQadjNbaNmozKcdPwRAJzARcZsakF4IODzGQUj X-Received: by 2002:a17:906:d115:b0:6db:ad2f:bffb with SMTP id b21-20020a170906d11500b006dbad2fbffbmr1647954ejz.124.1647001911664; Fri, 11 Mar 2022 04:31:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647001911; cv=none; d=google.com; s=arc-20160816; b=EyFy/bCTtECo97wLVd4H4hk+YdEcEgPABhcOMEFkylxN+1O/SSTyCtUHT843aCWwYh ByKds/9NT00H5SsPvx8YRI4R4w3ix74ekSyj0lhyXEX71mUCWs+wYdwxpcXRtgWR/6YB L5UDgfxtBjyBnS6iYmxXqlCxgOoiefMqvBF/fPXLddG/gJ03qkhI/rB4nbpWbhEj/oaD 5dsJ9ZwCPMARw0MT6DIKHJdlhSNaqHd4f5Xs5wlNgHpURD1aWpXS0oYYQCgCtKMyU1M+ W6lSPRQjPcZteKw5MOH9Vwa+g+FkJm2rDYD6JqrVf3DBYOqFtKfwNJc83JTiOJjhDExt kcmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=ZnfzIl/XKnXSQq2KD9VQO6H3UQ7J9fUV7zmQlLiotKs=; b=aMfU/QIyKkhKYW/kdMhFqb2MIM4dCN+xf3qd2JeJpmK/QWOKT7svvhbHew/dFnIeVd df0S8XybhoOVWiquarYTJH30JQKvbMWPciIYN9hOV9P4gxYCHYGU3PugAqmZir6Sdjjf Bf2nEvcdCXa8XlLm1J/ZkWitCxj+r+rgp3d5Y+8+zEcunapb/21sOlpTd54igvSgxXBQ rZNZW7xAnTt+quxrJXkFbEhRZmYMztbj1UUSuzcDnFZa35Ig4eaXudeSEDc9B+2o9pIZ ZhzT+E48+w+9nPhtEeaG2iNejtlMKIPpWwIz+mz2Bsx3/es5YuYi89AtxJoCvhVS6pwL V6jg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=aTALYhu3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n10-20020a1709062bca00b006b66ac8983fsi4536441ejg.509.2022.03.11.04.31.18; Fri, 11 Mar 2022 04:31:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=aTALYhu3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242113AbiCJQV1 (ORCPT + 99 others); Thu, 10 Mar 2022 11:21:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44778 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241984AbiCJQUl (ORCPT ); Thu, 10 Mar 2022 11:20:41 -0500 Received: from mail-ej1-x633.google.com (mail-ej1-x633.google.com [IPv6:2a00:1450:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7C853192E19; Thu, 10 Mar 2022 08:19:04 -0800 (PST) Received: by mail-ej1-x633.google.com with SMTP id r13so13240251ejd.5; Thu, 10 Mar 2022 08:19:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=ZnfzIl/XKnXSQq2KD9VQO6H3UQ7J9fUV7zmQlLiotKs=; b=aTALYhu38lknVv7BfYemP6WiHW/GFkCSGNdbnorghVU13Psbuj2T7cfar5d9OyBVST PY59zXV+CAGveUnRCnTqNt6Z3KTaH1ToDHxtzFZhPSrlZKSLXMjCyadeQIMNWkOaP/d9 nSXAeaOm3w1iseNHF6cyT6+D6j0XjbtbpfGwIoXKYzvS2skP40grTKbowPAKuZBIT8TU CMiwOwYYEMOnHV7Un7g7eN8IOCt1pgM1GbnoQ6ekqy5H+4ie4mhPMWzlHXxawqfgnCEN 4L/nbeMHZUV7uYGP5qfUULJfA0fiHSI/fNhEnRqWK2cYau5O5qUQVvDD2eyHUhcpgCCx bBXQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=ZnfzIl/XKnXSQq2KD9VQO6H3UQ7J9fUV7zmQlLiotKs=; b=LDOHWjCFVwV9+jQV8UbjD4sLJJZznl3yxxGW21bbVJrfLplIdt2o95g4UiW5aZBsPG GauABlDx7EIU/XW14Tp2zaRHhfKcJqgj6VEom2jfb8xRbdWlxCRz7J/3NkP/93eV4H7j Ni4wr5mnbtImmfkL46txLLA7HOiW9PWeWMMn1JrPXkgf8+of+T6cVOLVfwpVYCxIZ3dU 9VF+qv6FKM5yLNbpbBXBcEZgVbwlPcaF9krofnGdAOb4SxLQpoO+rkYCYymGbqW5+Wo6 41THPCvcA7QC32N1QNl1Qtm2wJU1NUnc32GBhOS/NF6EBs8CJdBuXvz6yYinEfRcZ/JM ezmg== X-Gm-Message-State: AOAM533k53poIZYh+2R1T55/3QoGCj542oJGbtumqJ5ALc2zKWdSwEgv bZt6DII0NFWjcxwJ2aJdy+E= X-Received: by 2002:a17:906:c0c9:b0:6db:207:c41f with SMTP id bn9-20020a170906c0c900b006db0207c41fmr5175917ejb.292.1646929139399; Thu, 10 Mar 2022 08:18:59 -0800 (PST) Received: from skbuf ([188.25.231.156]) by smtp.gmail.com with ESMTPSA id l24-20020a170906231800b006d69a771a34sm1935088eja.93.2022.03.10.08.18.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Mar 2022 08:18:58 -0800 (PST) Date: Thu, 10 Mar 2022 18:18:57 +0200 From: Vladimir Oltean To: Tobias Waldekranz Cc: davem@davemloft.net, kuba@kernel.org, Andrew Lunn , Vivien Didelot , Florian Fainelli , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Nikolay Aleksandrov , Russell King , Petr Machata , Cooper Lees , Ido Schimmel , Matt Johnston , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org Subject: Re: [PATCH v2 net-next 07/10] net: dsa: Pass MST state changes to driver Message-ID: <20220310161857.33owtynhm3pdyxiy@skbuf> References: <20220301100321.951175-1-tobias@waldekranz.com> <20220301100321.951175-8-tobias@waldekranz.com> <20220303222055.7a5pr4la3wmuuekc@skbuf> <87mthymblh.fsf@waldekranz.com> <20220310103509.g35syl776kyh5j2n@skbuf> <87h785n67k.fsf@waldekranz.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87h785n67k.fsf@waldekranz.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 10, 2022 at 05:05:35PM +0100, Tobias Waldekranz wrote: > On Thu, Mar 10, 2022 at 12:35, Vladimir Oltean wrote: > > On Thu, Mar 10, 2022 at 09:54:34AM +0100, Tobias Waldekranz wrote: > >> >> + if (!dsa_port_can_configure_learning(dp) || dp->learning) { > >> >> + switch (state->state) { > >> >> + case BR_STATE_DISABLED: > >> >> + case BR_STATE_BLOCKING: > >> >> + case BR_STATE_LISTENING: > >> >> + /* Ideally we would only fast age entries > >> >> + * belonging to VLANs controlled by this > >> >> + * MST. > >> >> + */ > >> >> + dsa_port_fast_age(dp); > >> > > >> > Does mv88e6xxx support this? If it does, you might just as well > >> > introduce another variant of ds->ops->port_fast_age() for an msti. > >> > >> You can limit ATU operations to a particular FID. So the way I see it we > >> could either have: > >> > >> int (*port_vlan_fast_age)(struct dsa_switch *ds, int port, u16 vid) > >> > >> + Maybe more generic. You could imagine there being a way to trigger > >> this operation from userspace for example. > >> - We would have to keep the VLAN<->MSTI mapping in the DSA layer in > >> order to be able to do the fan-out in dsa_port_set_mst_state. > >> > >> or: > >> > >> int (*port_msti_fast_age)(struct dsa_switch *ds, int port, u16 msti) > >> > >> + Let's the mapping be an internal affair in the driver. > >> - Perhaps, less generically useful. > >> > >> Which one do you prefer? Or is there a hidden third option? :) > > > > Yes, I was thinking of "port_msti_fast_age". I don't see a cheap way of > > keeping VLAN to MSTI associations in the DSA layer. Only if we could > > retrieve this mapping from the bridge layer - maybe with something > > analogous to br_vlan_get_info(), but br_mst_get_info(), and this gets > > passed a VLAN_N_VID sized bitmap, which the bridge populates with ones > > and zeroes. > > That can easily be done. Given that, should we go for port_vlan_fast_age > instead? port_msti_fast_age feels like an awkward interface, since I > don't think there is any hardware out there that can actually perform > that operation without internally fanning it out over all affected VIDs > (or FIDs in the case of mv88e6xxx). Yup, yup. My previous email was all over the place with regard to the available options, because I wrote it in multiple phases so it wasn't chronologically ordered top-to-bottom. But port_vlan_fast_age() makes the most sense if you can implement br_mst_get_info(). Same goes for dsa_port_notify_bridge_fdb_flush(). > > The reason why I asked for this is because I'm not sure of the > > implications of flushing the entire FDB of the port for a single MSTP > > state change. It would trigger temporary useless flooding in other MSTIs > > at the very least. There isn't any backwards compatibility concern to > > speak of, so we can at least try from the beginning to limit the > > flushing to the required VLANs. > > Aside from the performance implications of flows being temporarily > flooded I don't think there are any. > > I suppose if you've disabled flooding of unknown unicast on that port, > you would loose the flow until you see some return traffic (or when one > side gives up and ARPs). While somewhat esoteric, it would be nice to > handle this case if the hardware supports it. If by "handle this case" you mean "flush only the affected VLANs", then yes, I fully agree. > > What I didn't think about, and will be a problem, is > > dsa_port_notify_bridge_fdb_flush() - we don't know the vid to flush. > > The easy way out here would be to export dsa_port_notify_bridge_fdb_flush(), > > add a "vid" argument to it, and let drivers call it. Thoughts? > > To me, this seems to be another argument in favor of > port_vlan_fast_age. That way you would know the VIDs being flushed at > the DSA layer, and driver writers needn't concern themselves with having > to remember to generate the proper notifications back to the bridge. See above. > > Alternatively, if you think that cross-flushing FDBs of multiple MSTIs > > isn't a real problem, I suppose we could keep the "port_fast_age" method. > > What about falling back to it if the driver doesn't support per-VLAN > flushing? Flushing all entries will work in most cases, at the cost of > some temporary flooding. Seems more useful than refusing the offload > completely. So here's what I don't understand. Do you expect a driver other than mv88e6xxx to do something remotely reasonable under a bridge with MSTP enabled? The idea being to handle gracefully the case where a port is BLOCKING in an MSTI but FORWARDING in another. Because if not, let's just outright not offload that kind of bridge, and only concern ourselves with what MST-capable drivers can do. I'm shadowing you with a prototype (and untested so far) MSTP implementation for the ocelot/felix drivers, and those switches can flush the MAC table per VLAN too. So I don't see an immediate need to have a fallback implementation if you'll also provide it for mv88e6xxx. Let's treat that only if the need arises. > >> > And since it is new code, you could require that drivers _do_ support > >> > configuring learning before they could support MSTP. After all, we don't > >> > want to keep legacy mechanisms in place forever. > >> > >> By "configuring learning", do you mean this new fast-age-per-vid/msti, > >> or being able to enable/disable learning per port? If it's the latter, > >> I'm not sure I understand how those two are related. > > > > The code from dsa_port_set_state() which you've copied: > > > > if (!dsa_port_can_configure_learning(dp) || > > (do_fast_age && dp->learning)) { > > > > has this explanation: > > > > 1. DSA keeps standalone ports in the FORWARDING state. > > 2. DSA also disables address learning on standalone ports, where this is > > possible (dsa_port_can_configure_learning(dp) == true). > > 3. When a port joins a bridge, it leaves its FORWARDING state from > > standalone mode and inherits the bridge port's BLOCKING state > > 4. dsa_port_set_state() treats a port transition from FORWARDING to > > BLOCKING as a transition requiring an FDB flush > > 5. due to (2), the FDB flush at stage (4) is in fact not needed, because > > the FDB of that port should already be empty. Flushing the FDB may be > > a costly operation for some drivers, so it is avoided if possible. > > > > So this is why the "dsa_port_can_configure_learning()" check is there - > > for compatibility with drivers that can't configure learning => they > > keep learning enabled also in standalone mode => they need an FDB flush > > when a standalone port joins a bridge. > > > > What I'm saying is: for drivers that offload MSTP, let's force them to > > get the basics right first (have configurable learning), rather than go > > forward forever with a backwards compatibility mode. > > Makes sense, I'll just move it up to the initial capability check.