Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2801156pxp; Mon, 14 Mar 2022 05:21:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwFhE9bvNxf3YGVg4MOa88AlTCs6T3ytGjgCy08DG86swpjBQV3G9qFI78mAbjLbeGrd3x/ X-Received: by 2002:a05:6402:5106:b0:418:337a:506d with SMTP id m6-20020a056402510600b00418337a506dmr13191204edd.376.1647260501058; Mon, 14 Mar 2022 05:21:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647260501; cv=none; d=google.com; s=arc-20160816; b=R3Eo/pCYY0ll2YYUzds/7mdlaRcrREYCFUostAURB8OO8GTedoB/wU5Jm2L7jOX6Kg 2v8CZUMX47OPxKOXHoV1IxffLzvQeVDh6u0CKmywTd8YCZUYrwKxlATpK4aViweE7KXb d9rB6doBcfcKX4IeJzFZQUHuka/00SEHq9nJbRmQpp4qiDDPSpAXBrn6CoAMHzwG+78W njhl5D7q5XeWA46dOrlMblWFd+S5RUBdyfTfAuLWLCVhQhTfZNB36ZUDBkFi9JZ6cD5R 2TEgn8ZD10LWDmhGdeIxQDJK4uLqpTRtGP7Yg1AEAtHb1I+FHxbSZcHCHndjJWDA0xBi p9Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=MZp7gpnQ9sDMK3u9FGLF0DtfQSh/r7kXG58Sm7tKpYY=; b=ZtFmS0jqxdVH5cQEXNG/Jcmfv0R3eXAc8cc8wvnzKO0QpMKQh2ymav4lKO/Kd6eDOu FYuP7zTyvf1aehmzaarnOntPZnjWxHUUoLr6Bk1nP7VXWtx5/4hqyT82zq/TivhWJeOt X9hWMj/jPE6/z8DOqsd8ZpciKaODrKsVwYyy3ThrWXYmtKnZQEKrVQM54FtNtGlGxPV9 UIapqGkGfx+H53j/yKsuH2FaWEeOV2bnMzx00aIZsBEgmpVd7dxWySELg4BTUVI5uR/8 tRa14jYHSx8A/lHzS4/fAR/P/tjWP+0xzR7wfql0Mc+GmyFiqSnfaJXhxKh3xv0KxTWj a5EA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=saLhr5vF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l13-20020a170906794d00b006d8acc592efsi10266471ejo.299.2022.03.14.05.21.09; Mon, 14 Mar 2022 05:21:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=saLhr5vF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233819AbiCNKjG (ORCPT + 99 others); Mon, 14 Mar 2022 06:39:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238606AbiCNKjB (ORCPT ); Mon, 14 Mar 2022 06:39:01 -0400 Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com [IPv6:2a00:1450:4864:20::636]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 72DF713DF3 for ; Mon, 14 Mar 2022 03:37:50 -0700 (PDT) Received: by mail-ej1-x636.google.com with SMTP id yy13so32861014ejb.2 for ; Mon, 14 Mar 2022 03:37:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=blackwall-org.20210112.gappssmtp.com; s=20210112; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to:content-transfer-encoding; bh=MZp7gpnQ9sDMK3u9FGLF0DtfQSh/r7kXG58Sm7tKpYY=; b=saLhr5vFxCZrsjEj3zox8KF0Jb1MMbflR64Kb4l4U4tzSm3yiiVkIu+uDJS5QATHiw +lz3GSqr1atOyRu9wMyJSddeuHQfuT51ZKhx5MXqEaQwuT4mU0EpDw/EZf0OKtxz77k9 E1u92oMbVLni/4nwkwlmgAPyRXb2sJAeOYNkMiqFVWgHeTD/7FDa+CcVqS+dsCMaYNmZ 8vcD5L0hbgAhMnwckDw9FbuSlEXGVYKADhUqOsrUuhlNxZ8L+K0y1SDQUcZM3MCyD+M4 iDbXJ+YTY706sAufKQi8A9tZU7mX/5UGDJ9gg8pL1zaHxP1Y+57GunLctJxM6ahtSYqU ojfQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=MZp7gpnQ9sDMK3u9FGLF0DtfQSh/r7kXG58Sm7tKpYY=; b=tkYvvmS6+XMXnXV6TdmHaAgyn3rg/XFvYPtHWUR8vgCLa8yn74sl+UETP/QXZiBHiP vILdIYOEg/8yYKyotPn7Tz5osl9MF1q77GVoQudunQCYNrrQn48zpaN4SUkuvwZc0W/Y jjczJ9N0aWJXgSIdeGfhDbAi/OTtioHn6XaAW/8flRolY8CNpgx3aJTVU/9TrorW+URs UrsrYeNvOgsVvCIRZut8lObYhPE3KAVc9AfKZboPeOALw/zPPos85SP7YK4G1wFKqqA+ l1+DLPIMix1kohtuUfR4QJjuobnJylM2gY0zWmPlFGJ9q5i2h0JND64UzhOtE1jwrmkJ xkBw== X-Gm-Message-State: AOAM532Gg9qQPTEcEzepbNtGAKKfyNbEiKit12OZn+A3yGhqLOgQlTSe Yw7jwyhR6M6vGAy37O9CpBGHuQ== X-Received: by 2002:a17:906:3adb:b0:6b7:876c:d11b with SMTP id z27-20020a1709063adb00b006b7876cd11bmr17836590ejd.250.1647254268847; Mon, 14 Mar 2022 03:37:48 -0700 (PDT) Received: from [192.168.0.111] (87-243-81-1.ip.btc-net.bg. [87.243.81.1]) by smtp.gmail.com with ESMTPSA id cc20-20020a0564021b9400b00412f2502469sm7694617edb.23.2022.03.14.03.37.47 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 14 Mar 2022 03:37:48 -0700 (PDT) Message-ID: Date: Mon, 14 Mar 2022 12:37:46 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH v3 net-next 03/14] net: bridge: mst: Support setting and reporting MST port states Content-Language: en-US To: Tobias Waldekranz , davem@davemloft.net, kuba@kernel.org Cc: Andrew Lunn , Vivien Didelot , Florian Fainelli , Vladimir Oltean , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Russell King , Ido Schimmel , Petr Machata , Cooper Lees , Matt Johnston , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org References: <20220314095231.3486931-1-tobias@waldekranz.com> <20220314095231.3486931-4-tobias@waldekranz.com> From: Nikolay Aleksandrov In-Reply-To: <20220314095231.3486931-4-tobias@waldekranz.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 14/03/2022 11:52, Tobias Waldekranz wrote: > Make it possible to change the port state in a given MSTI by extending > the bridge port netlink interface (RTM_SETLINK on PF_BRIDGE).The > proposed iproute2 interface would be: > > bridge mst set dev msti state > > Current states in all applicable MSTIs can also be dumped via a > corresponding RTM_GETLINK. The proposed iproute interface looks like > this: > > $ bridge mst > port msti > vb1 0 > state forwarding > 100 > state disabled > vb2 0 > state forwarding > 100 > state forwarding > > The preexisting per-VLAN states are still valid in the MST > mode (although they are read-only), and can be queried as usual if one > is interested in knowing a particular VLAN's state without having to > care about the VID to MSTI mapping (in this example VLAN 20 and 30 are > bound to MSTI 100): > > $ bridge -d vlan > port vlan-id > vb1 10 > state forwarding mcast_router 1 > 20 > state disabled mcast_router 1 > 30 > state disabled mcast_router 1 > 40 > state forwarding mcast_router 1 > vb2 10 > state forwarding mcast_router 1 > 20 > state forwarding mcast_router 1 > 30 > state forwarding mcast_router 1 > 40 > state forwarding mcast_router 1 > > Signed-off-by: Tobias Waldekranz > --- Hi Tobias, A few comments below.. > include/uapi/linux/if_bridge.h | 17 ++++++ > include/uapi/linux/rtnetlink.h | 1 + > net/bridge/br_mst.c | 105 +++++++++++++++++++++++++++++++++ > net/bridge/br_netlink.c | 32 +++++++++- > net/bridge/br_private.h | 15 +++++ > 5 files changed, 169 insertions(+), 1 deletion(-) > > diff --git a/include/uapi/linux/if_bridge.h b/include/uapi/linux/if_bridge.h > index f60244b747ae..879dfaef8da0 100644 > --- a/include/uapi/linux/if_bridge.h > +++ b/include/uapi/linux/if_bridge.h > @@ -122,6 +122,7 @@ enum { > IFLA_BRIDGE_VLAN_TUNNEL_INFO, > IFLA_BRIDGE_MRP, > IFLA_BRIDGE_CFM, > + IFLA_BRIDGE_MST, > __IFLA_BRIDGE_MAX, > }; > #define IFLA_BRIDGE_MAX (__IFLA_BRIDGE_MAX - 1) > @@ -453,6 +454,21 @@ enum { > > #define IFLA_BRIDGE_CFM_CC_PEER_STATUS_MAX (__IFLA_BRIDGE_CFM_CC_PEER_STATUS_MAX - 1) > > +enum { > + IFLA_BRIDGE_MST_UNSPEC, > + IFLA_BRIDGE_MST_ENTRY, > + __IFLA_BRIDGE_MST_MAX, > +}; > +#define IFLA_BRIDGE_MST_MAX (__IFLA_BRIDGE_MST_MAX - 1) > + > +enum { > + IFLA_BRIDGE_MST_ENTRY_UNSPEC, > + IFLA_BRIDGE_MST_ENTRY_MSTI, > + IFLA_BRIDGE_MST_ENTRY_STATE, > + __IFLA_BRIDGE_MST_ENTRY_MAX, > +}; > +#define IFLA_BRIDGE_MST_ENTRY_MAX (__IFLA_BRIDGE_MST_ENTRY_MAX - 1) > + > struct bridge_stp_xstats { > __u64 transition_blk; > __u64 transition_fwd; > @@ -786,4 +802,5 @@ enum { > __BRIDGE_QUERIER_MAX > }; > #define BRIDGE_QUERIER_MAX (__BRIDGE_QUERIER_MAX - 1) > + stray new line > #endif /* _UAPI_LINUX_IF_BRIDGE_H */ > diff --git a/include/uapi/linux/rtnetlink.h b/include/uapi/linux/rtnetlink.h > index 51530aade46e..83849a37db5b 100644 > --- a/include/uapi/linux/rtnetlink.h > +++ b/include/uapi/linux/rtnetlink.h > @@ -817,6 +817,7 @@ enum { > #define RTEXT_FILTER_MRP (1 << 4) > #define RTEXT_FILTER_CFM_CONFIG (1 << 5) > #define RTEXT_FILTER_CFM_STATUS (1 << 6) > +#define RTEXT_FILTER_MST (1 << 7) > > /* End of information exported to user level */ > > diff --git a/net/bridge/br_mst.c b/net/bridge/br_mst.c > index 78ef5fea4d2b..df65aa7701c1 100644 > --- a/net/bridge/br_mst.c > +++ b/net/bridge/br_mst.c > @@ -124,3 +124,108 @@ int br_mst_set_enabled(struct net_bridge *br, bool on, > br_opt_toggle(br, BROPT_MST_ENABLED, on); > return 0; > } > + > +int br_mst_fill_info(struct sk_buff *skb, struct net_bridge_vlan_group *vg) const vg > +{ > + struct net_bridge_vlan *v; const v > + struct nlattr *nest; > + unsigned long *seen; > + int err = 0; > + > + seen = bitmap_zalloc(VLAN_N_VID, 0); > + if (!seen) > + return -ENOMEM; > + > + list_for_each_entry(v, &vg->vlan_list, vlist) { > + if (test_bit(v->brvlan->msti, seen)) > + continue; > + > + nest = nla_nest_start_noflag(skb, IFLA_BRIDGE_MST_ENTRY); > + if (!nest || > + nla_put_u16(skb, IFLA_BRIDGE_MST_ENTRY_MSTI, v->brvlan->msti) || > + nla_put_u8(skb, IFLA_BRIDGE_MST_ENTRY_STATE, v->state)) { > + err = -EMSGSIZE; > + break; > + } > + nla_nest_end(skb, nest); > + > + set_bit(v->brvlan->msti, seen); __set_bit() > + } > + > + kfree(seen); > + return err; > +} > + > +static const struct nla_policy br_mst_nl_policy[IFLA_BRIDGE_MST_ENTRY_MAX + 1] = { > + [IFLA_BRIDGE_MST_ENTRY_MSTI] = NLA_POLICY_RANGE(NLA_U16, > + 1, /* 0 reserved for CST */ > + VLAN_N_VID - 1), > + [IFLA_BRIDGE_MST_ENTRY_STATE] = NLA_POLICY_RANGE(NLA_U8, > + BR_STATE_DISABLED, > + BR_STATE_BLOCKING), > +}; > + > +static int br_mst_parse_one(struct net_bridge_port *p, > + const struct nlattr *attr, > + struct netlink_ext_ack *extack) > +{ I'd either set the state after parsing, so this function just does what it says (parse) or I'd rename it. > + struct nlattr *tb[IFLA_BRIDGE_MST_ENTRY_MAX + 1]; > + u16 msti; > + u8 state; > + int err; > + > + err = nla_parse_nested(tb, IFLA_BRIDGE_MST_ENTRY_MAX, attr, > + br_mst_nl_policy, extack); > + if (err) > + return err; > + > + if (!tb[IFLA_BRIDGE_MST_ENTRY_MSTI]) { > + NL_SET_ERR_MSG_MOD(extack, "MSTI not specified"); > + return -EINVAL; > + } > + > + if (!tb[IFLA_BRIDGE_MST_ENTRY_STATE]) { > + NL_SET_ERR_MSG_MOD(extack, "State not specified"); > + return -EINVAL; > + } > + > + msti = nla_get_u16(tb[IFLA_BRIDGE_MST_ENTRY_MSTI]); > + state = nla_get_u8(tb[IFLA_BRIDGE_MST_ENTRY_STATE]); > + > + br_mst_set_state(p, msti, state); > + return 0; > +} > + > +int br_mst_parse(struct net_bridge_port *p, struct nlattr *mst_attr, > + struct netlink_ext_ack *extack) This doesn't just parse though, it also sets the state. Please rename it to something more appropriate. const mst_attr > +{ > + struct nlattr *attr; > + int err, msts = 0; > + int rem; > + > + if (!br_opt_get(p->br, BROPT_MST_ENABLED)) { > + NL_SET_ERR_MSG_MOD(extack, "Can't modify MST state when MST is disabled"); > + return -EBUSY; > + } > + > + nla_for_each_nested(attr, mst_attr, rem) { > + switch (nla_type(attr)) { > + case IFLA_BRIDGE_MST_ENTRY: > + err = br_mst_parse_one(p, attr, extack); > + break; > + default: > + continue; > + } > + > + msts++; > + if (err) > + break; > + } > + > + if (!msts) { > + NL_SET_ERR_MSG_MOD(extack, "Found no MST entries to process"); > + err = -EINVAL; > + } > + > + return err; > +} > diff --git a/net/bridge/br_netlink.c b/net/bridge/br_netlink.c > index 7d4432ca9a20..d2b4550f30d6 100644 > --- a/net/bridge/br_netlink.c > +++ b/net/bridge/br_netlink.c > @@ -485,7 +485,8 @@ static int br_fill_ifinfo(struct sk_buff *skb, > RTEXT_FILTER_BRVLAN_COMPRESSED | > RTEXT_FILTER_MRP | > RTEXT_FILTER_CFM_CONFIG | > - RTEXT_FILTER_CFM_STATUS)) { > + RTEXT_FILTER_CFM_STATUS | > + RTEXT_FILTER_MST)) { > af = nla_nest_start_noflag(skb, IFLA_AF_SPEC); > if (!af) > goto nla_put_failure; > @@ -564,7 +565,28 @@ static int br_fill_ifinfo(struct sk_buff *skb, > nla_nest_end(skb, cfm_nest); > } > > + if ((filter_mask & RTEXT_FILTER_MST) && > + br_opt_get(br, BROPT_MST_ENABLED) && port) { > + struct net_bridge_vlan_group *vg = nbp_vlan_group(port); const vg > + struct nlattr *mst_nest; > + int err; > + > + if (!vg || !vg->num_vlans) > + goto done; > + > + mst_nest = nla_nest_start(skb, IFLA_BRIDGE_MST); > + if (!mst_nest) > + goto nla_put_failure; > + > + err = br_mst_fill_info(skb, vg); > + if (err) > + goto nla_put_failure; > + > + nla_nest_end(skb, mst_nest); > + } > + I think you should also update br_get_link_af_size_filtered() to account for the new dump attributes based on the filter. I'd adjust vinfo_sz based on the filter flag. > done: > + > if (af) > nla_nest_end(skb, af); > nlmsg_end(skb, nlh); > @@ -803,6 +825,14 @@ static int br_afspec(struct net_bridge *br, > if (err) > return err; > break; > + case IFLA_BRIDGE_MST: > + if (cmd != RTM_SETLINK || !p) > + return -EINVAL; These are two different errors, please set extack appropriately for each error. > + > + err = br_mst_parse(p, attr, extack); > + if (err) > + return err; > + break; > } > } > > diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h > index b907d389b63a..08d82578bd97 100644 > --- a/net/bridge/br_private.h > +++ b/net/bridge/br_private.h > @@ -1783,6 +1783,9 @@ int br_mst_vlan_set_msti(struct net_bridge_vlan *v, u16 msti); > void br_mst_vlan_init_state(struct net_bridge_vlan *v); > int br_mst_set_enabled(struct net_bridge *br, bool on, > struct netlink_ext_ack *extack); > +int br_mst_fill_info(struct sk_buff *skb, struct net_bridge_vlan_group *vg); > +int br_mst_parse(struct net_bridge_port *p, struct nlattr *mst_attr, > + struct netlink_ext_ack *extack); > #else > static inline bool br_mst_is_enabled(struct net_bridge *br) > { > @@ -1791,6 +1794,18 @@ static inline bool br_mst_is_enabled(struct net_bridge *br) > > static inline void br_mst_set_state(struct net_bridge_port *p, > u16 msti, u8 state) {} > +static inline int br_mst_fill_info(struct sk_buff *skb, > + struct net_bridge_vlan_group *vg) > +{ > + return -EOPNOTSUPP; > +} > + > +static inline int br_mst_parse(struct net_bridge_port *p, > + struct nlattr *mst_attr, > + struct netlink_ext_ack *extack) > +{ > + return -EOPNOTSUPP; > +} > #endif > > struct nf_br_ops {