Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp796570pxp; Fri, 11 Mar 2022 15:23:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJxJQKHQYazeobYCIYuMiK9GekRmqEbTXQywFqHEad7sKnIzFEGg6NKodFPzn7T1gnEboWTN X-Received: by 2002:a63:c01:0:b0:37a:655b:84e with SMTP id b1-20020a630c01000000b0037a655b084emr10285585pgl.197.1647040986880; Fri, 11 Mar 2022 15:23:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647040986; cv=none; d=google.com; s=arc-20160816; b=CBiNEmux0Qel7A5PnlHtWSf5LURPv6FfLz9LE/N09t+sXwbAuROmWeTv3eXZ5Zj2Wr xUta5gQaMcgECl5qCdoKlStG8BukUJ+RE2cYmEXUJsRM1nhQmtpJxD3LpIP6qeYeZOLO HLBkFsQqtxZz1cwmVCpD/lHXzPEaQCCBWNre4Y5aCVv2VItNM7SNe4zmAIQEvNP+SjMy Dy0U2kPj/uSwB6/DoOvLJMYP2lLKBMH/Y0gs/jUnCePmG2medR/l3gaDK/cnXAsxKgxy +sJ7FEwK1FUpgWQ1qqK8r2xYB+g6M1XVLmsvqZ/iv+gbFvKmaDFUB02/Grpu8V4RrjLX eDRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=uv1ARUm9lyp+CQBIStJYjj77ryWDMuu9udI8j8V7TJc=; b=cNXFH9G0d/2Ydopj61sdW8thQMJJEFtX0SoB/7N30424OPnHFZHEUB3oxN19g24Nm/ NmEp05Md3Jqy/KSettEtyNydkqxqlMcPNjN3gDuQdI+qh6NkYn8yV657rmT6ZlBTCg9p OkuVvZpEssN56M1WVXSMCa3nAmYAPw3ycKZKB5j7dctb60I8qXvzCWpg5sG1RJsUlTBS Ycy3Bh1YgEW4O2JUOzFnti6rnlHe+f+tEHbtfoOZtGnDlXp3wd41shm4SwsaFYbwls5W eKbfX4/3Di6iAXUUy/XLdCVvXZG0l5Zljh4T6DH+bURgpL147uO86P19KK4Ws9aVZyYu 4eEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@waldekranz-com.20210112.gappssmtp.com header.s=20210112 header.b=Rni0RTtG; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id x16-20020a17090a0bd000b001bd6972fb35si6553485pjd.37.2022.03.11.15.23.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Mar 2022 15:23:06 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@waldekranz-com.20210112.gappssmtp.com header.s=20210112 header.b=Rni0RTtG; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 96BEB3AC0AB; Fri, 11 Mar 2022 14:09:29 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344627AbiCKABK (ORCPT + 99 others); Thu, 10 Mar 2022 19:01:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56732 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345151AbiCKABE (ORCPT ); Thu, 10 Mar 2022 19:01:04 -0500 Received: from mail-lj1-x229.google.com (mail-lj1-x229.google.com [IPv6:2a00:1450:4864:20::229]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76ACEE4D2C for ; Thu, 10 Mar 2022 15:59:58 -0800 (PST) Received: by mail-lj1-x229.google.com with SMTP id h11so10005827ljb.2 for ; Thu, 10 Mar 2022 15:59:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=waldekranz-com.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:in-reply-to:references:date:message-id :mime-version; bh=uv1ARUm9lyp+CQBIStJYjj77ryWDMuu9udI8j8V7TJc=; b=Rni0RTtGnmIflbR6+BQsLW0/KrHWFJIIfdNCKLIWk15qKmCOGP7bwaeqp8RKwvdb8k cZqel9Sw8mslp8JqaIYJDE2P5f2BoIEe1ZcMUl0GBpBSmjZQes8H0N5d3nhKsvxdZNQ7 sNQNvuDgnLTAiVA3kA70fq2vIDbufBYEAZ1N62jFtUhbWq4dH1ltK86FrJrUs8ToxQJN ydL+6oBC3oYJ0Tlbo4PWNqJEs9WA76AdOp+iCGUadgCQuurGhXb+CR4z+KrDx17llFj2 JC6j0xeux2yNo76YQRrH3nVY41FJhOyoWmm73QUtKiyWGJx3Gik/3WmbefsGgw54vD3b nuQg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=uv1ARUm9lyp+CQBIStJYjj77ryWDMuu9udI8j8V7TJc=; b=iE2ytl9+kOiApoLtcT//bkc44eKKjekhZxbw3tAXjQK/YGELmYh9xHoxma78y6HJ55 WS2KAECl200OAYD2OeDd3jGO7pk1njgIHTrcNdREqyi2WLJJkvk+AcUmgRgzIpt4EphP sEEogHF6isT8Z6nwTEFl1La0NpV7mJaFWJ3PjcE4NxPii2/hdiPnPaLJG1z+xbL50Xmo IOxbLAOA+FIg5nS4NFrF0LYyKe0EK00oAYnbpkBZZ1SkxGDCe8bVdpJNQT4TnOJVuxaS DyBNTRu5moHjHydERqYvRD/N3zLcJ78ddd7HS1qr1xjDgo/EuGUarEBNl2T7lBBs3nnH mDjg== X-Gm-Message-State: AOAM533IpIxNU3pUeQE0XX5J6mB7eUY4FjQ8InAhXfeKWsqS1NZL3SaY 9LMOJJhpmQNksgBmxpld1eugYw== X-Received: by 2002:a2e:b5b9:0:b0:246:b30:64c8 with SMTP id f25-20020a2eb5b9000000b002460b3064c8mr4379870ljn.17.1646956796325; Thu, 10 Mar 2022 15:59:56 -0800 (PST) Received: from wkz-x280 (h-212-85-90-115.A259.priv.bahnhof.se. [212.85.90.115]) by smtp.gmail.com with ESMTPSA id w23-20020a0565120b1700b0044829a6061esm1248938lfu.186.2022.03.10.15.59.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Mar 2022 15:59:55 -0800 (PST) From: Tobias Waldekranz To: Vladimir Oltean Cc: davem@davemloft.net, kuba@kernel.org, Andrew Lunn , Vivien Didelot , Florian Fainelli , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Nikolay Aleksandrov , Russell King , Petr Machata , Cooper Lees , Ido Schimmel , Matt Johnston , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org Subject: Re: [PATCH v2 net-next 07/10] net: dsa: Pass MST state changes to driver In-Reply-To: <20220310230828.fvx24zhoyue5mkb7@skbuf> References: <20220301100321.951175-1-tobias@waldekranz.com> <20220301100321.951175-8-tobias@waldekranz.com> <20220303222055.7a5pr4la3wmuuekc@skbuf> <87mthymblh.fsf@waldekranz.com> <20220310103509.g35syl776kyh5j2n@skbuf> <87h785n67k.fsf@waldekranz.com> <20220310161857.33owtynhm3pdyxiy@skbuf> <87bkydmnmy.fsf@waldekranz.com> <20220310230828.fvx24zhoyue5mkb7@skbuf> Date: Fri, 11 Mar 2022 00:59:54 +0100 Message-ID: <878rthmk91.fsf@waldekranz.com> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 11, 2022 at 01:08, Vladimir Oltean wrote: > On Thu, Mar 10, 2022 at 11:46:45PM +0100, Tobias Waldekranz wrote: >> On Thu, Mar 10, 2022 at 18:18, Vladimir Oltean wrote: >> > On Thu, Mar 10, 2022 at 05:05:35PM +0100, Tobias Waldekranz wrote: >> >> On Thu, Mar 10, 2022 at 12:35, Vladimir Oltean wrote: >> >> > On Thu, Mar 10, 2022 at 09:54:34AM +0100, Tobias Waldekranz wrote: >> >> >> >> + if (!dsa_port_can_configure_learning(dp) || dp->learning) { >> >> >> >> + switch (state->state) { >> >> >> >> + case BR_STATE_DISABLED: >> >> >> >> + case BR_STATE_BLOCKING: >> >> >> >> + case BR_STATE_LISTENING: >> >> >> >> + /* Ideally we would only fast age entries >> >> >> >> + * belonging to VLANs controlled by this >> >> >> >> + * MST. >> >> >> >> + */ >> >> >> >> + dsa_port_fast_age(dp); >> >> >> > >> >> >> > Does mv88e6xxx support this? If it does, you might just as well >> >> >> > introduce another variant of ds->ops->port_fast_age() for an msti. >> >> >> >> >> >> You can limit ATU operations to a particular FID. So the way I see it we >> >> >> could either have: >> >> >> >> >> >> int (*port_vlan_fast_age)(struct dsa_switch *ds, int port, u16 vid) >> >> >> >> >> >> + Maybe more generic. You could imagine there being a way to trigger >> >> >> this operation from userspace for example. >> >> >> - We would have to keep the VLAN<->MSTI mapping in the DSA layer in >> >> >> order to be able to do the fan-out in dsa_port_set_mst_state. >> >> >> >> >> >> or: >> >> >> >> >> >> int (*port_msti_fast_age)(struct dsa_switch *ds, int port, u16 msti) >> >> >> >> >> >> + Let's the mapping be an internal affair in the driver. >> >> >> - Perhaps, less generically useful. >> >> >> >> >> >> Which one do you prefer? Or is there a hidden third option? :) >> >> > >> >> > Yes, I was thinking of "port_msti_fast_age". I don't see a cheap way of >> >> > keeping VLAN to MSTI associations in the DSA layer. Only if we could >> >> > retrieve this mapping from the bridge layer - maybe with something >> >> > analogous to br_vlan_get_info(), but br_mst_get_info(), and this gets >> >> > passed a VLAN_N_VID sized bitmap, which the bridge populates with ones >> >> > and zeroes. >> >> >> >> That can easily be done. Given that, should we go for port_vlan_fast_age >> >> instead? port_msti_fast_age feels like an awkward interface, since I >> >> don't think there is any hardware out there that can actually perform >> >> that operation without internally fanning it out over all affected VIDs >> >> (or FIDs in the case of mv88e6xxx). >> > >> > Yup, yup. My previous email was all over the place with regard to the >> > available options, because I wrote it in multiple phases so it wasn't >> > chronologically ordered top-to-bottom. But port_vlan_fast_age() makes >> > the most sense if you can implement br_mst_get_info(). Same goes for >> > dsa_port_notify_bridge_fdb_flush(). >> > >> >> > The reason why I asked for this is because I'm not sure of the >> >> > implications of flushing the entire FDB of the port for a single MSTP >> >> > state change. It would trigger temporary useless flooding in other MSTIs >> >> > at the very least. There isn't any backwards compatibility concern to >> >> > speak of, so we can at least try from the beginning to limit the >> >> > flushing to the required VLANs. >> >> >> >> Aside from the performance implications of flows being temporarily >> >> flooded I don't think there are any. >> >> >> >> I suppose if you've disabled flooding of unknown unicast on that port, >> >> you would loose the flow until you see some return traffic (or when one >> >> side gives up and ARPs). While somewhat esoteric, it would be nice to >> >> handle this case if the hardware supports it. >> > >> > If by "handle this case" you mean "flush only the affected VLANs", then >> > yes, I fully agree. >> > >> >> > What I didn't think about, and will be a problem, is >> >> > dsa_port_notify_bridge_fdb_flush() - we don't know the vid to flush. >> >> > The easy way out here would be to export dsa_port_notify_bridge_fdb_flush(), >> >> > add a "vid" argument to it, and let drivers call it. Thoughts? >> >> >> >> To me, this seems to be another argument in favor of >> >> port_vlan_fast_age. That way you would know the VIDs being flushed at >> >> the DSA layer, and driver writers needn't concern themselves with having >> >> to remember to generate the proper notifications back to the bridge. >> > >> > See above. >> > >> >> > Alternatively, if you think that cross-flushing FDBs of multiple MSTIs >> >> > isn't a real problem, I suppose we could keep the "port_fast_age" method. >> >> >> >> What about falling back to it if the driver doesn't support per-VLAN >> >> flushing? Flushing all entries will work in most cases, at the cost of >> >> some temporary flooding. Seems more useful than refusing the offload >> >> completely. >> > >> > So here's what I don't understand. Do you expect a driver other than >> > mv88e6xxx to do something remotely reasonable under a bridge with MSTP >> > enabled? The idea being to handle gracefully the case where a port is >> > BLOCKING in an MSTI but FORWARDING in another. Because if not, let's >> > just outright not offload that kind of bridge, and only concern >> > ourselves with what MST-capable drivers can do. >> >> I think you're right. I was trying to make it easier for other driver >> writers, but it will just be more confusing and error prone. >> >> Alright, so v3 will have something like this: >> >> bool dsa_port_can_offload_mst(struct dsa_port *dp) >> { >> return ds->ops->vlan_msti_set && >> ds->ops->port_mst_state_set && >> ds->ops->port_vlan_fast_age && >> dsa_port_can_configure_learning(dp); >> } >> >> If this returns false, we have two options: >> >> 1. Return -EOPNOTSUPP, which the bridge will be unable to discriminate >> from a non-switchdev port saying "I have no idea what you're talking >> about". I.e. the bridge will happily apply the config, but the >> hardware won't match. I don't like this, but it lines up with most >> other stuff. >> >> 2. Return a hard error, e.g. -EINVAL/-ENOSYS. This will keep the bridge >> in sync with the hardware and also gives some feedback to the >> user. This seems like the better approach to me, but it is a new kind >> of paradigm. >> >> What do you think? > > Wait, what? It matters a lot where you place the call to > dsa_port_can_offload_mst(), too. You don't have to propagate a hard > error code, either, at least if you make dsa_port_bridge_join() return > -EOPNOTSUPP prior to calling switchdev_bridge_port_offload(), no? > DSA transforms this error code into 0, and dsa_port_offloads_bridge*() > starts returning false, which makes us ignore all MSTP related switchdev > notifiers. Right. So we also need: 1. A br_mst_enabled() that we can call from dsa_port_bridge_join to validate the initial state. 2. A switchdev attr event sent out when enabling/disabling MST on the bridge, so that we can NAK the change. > The important part will be to make sure that MSTP is enabled for this > bridge from the get-go (that being the only case in which we can offload > an MSTP aware bridge), and refusing to offload dynamic changes to its > MSTP state. I didn't re-check now, but I think I remember there being Hang on though. Won't that mean that this sequence... ip link add dev br0 type bridge \ vlan_filtering 1 vlan_default_pvid 0 mst_enable 1 ip link set dev swp1 master br0 ...will work, but offloading will be disabled on swp0; whereas this sequence... ip link add dev br0 type bridge \ vlan_filtering 1 vlan_default_pvid 0 ip link set dev swp1 master br0 ip link set dev br0 type bridge mst_enable 1 ...will fail on the final command? Even though they are logically equivalent? But maybe that's just the way the cookie crumbles. > limitations even in the software bridge related to dynamic MSTP mode > changes anyway - there had to not be any port VLANs, which IIUC means > that you actually need to _delete_ the port PVIDs which are automatically > created before you could change the MSTP mode. There are some ergonomic issues there, yes. I might look at it again and see if there is some reasonable way of allowing the mode to be changed even when VLANs are present. > This is the model, what's wrong with it? I said "don't offload the > bridge", not "don't offload specific MSTP operations". Nothing is wrong, I just couldn't see the whole picture. This is the way.