Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp974741pxp; Wed, 16 Mar 2022 23:09:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzZCO9rp/h5L5Y4JdbT2d09NfdZcq8cAjhovvzyy1oixcV3Fx0uup4Xmq5R/5LPiYlGPLLK X-Received: by 2002:a17:902:f70f:b0:153:ebfe:21b3 with SMTP id h15-20020a170902f70f00b00153ebfe21b3mr1691511plo.119.1647497384687; Wed, 16 Mar 2022 23:09:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647497384; cv=none; d=google.com; s=arc-20160816; b=z/03imW0KARi9N2YKCi7baI+R10KZhU/A0fuKd4Pq9gTrKmr5g5qDptf2hwf0WnXQ1 N4pVZP0A0ItmDBQ7RjrlS9y+C8czlGoidfdF+UR4BIyO0eUqFQTuxrZKB44jQa3Vzay9 vR7uzk49FYpx7RCF30z8/9I4caUbuc3hZZ0A1QFAe6s7/8UekDWT/JDmnYk4U3zGCQEP mf4BRrqjgV5i/38jPvYPp8QM0GK2tErIjzuEsAdaOsbYxy0cQuySgG7aSuHoRZ4hRUer 3Enw++wi5rOpvPSUhU/SF7Lb8mKlCM3qGGpW+nCmJjHEPQyS6TVLwiWgWlFqT3CUtB/M Nwow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=niZ0dixE3Q2j3/AHI21Azov9Ljg7nx7JugA2Xkl5Xhk=; b=dvSNovj5XBZ5NxkZ4sMrFg6yIJTigbR+tSQUos+pYylsJJkrvs688dnKOdJYqgumjG bsloo7ZAzOXHGC/lLtZ12DFS5JtD8m2DzT2ANNPQBRqaVlbnFSh2dgd15cHahjMmedCN gyKYTgf/n28EaDz6HkXjfzRBqEMq5AmT+X7as9BnYr2kfk1B2RUjd1tPXnKazK1y6Ppr 1uovEU0Gnjdy/WJIfIUIFoDMcyU0DXe62CJqyrpSPUJGUynlaQUSf9vK5DWGglW2MbeP CQDT4YpEdXPIjeVuuLW93nduDphM+yK4zJQ9IgY79ZMGNI4R0Q8G8h6KPH5yNEsVHWKA 0wQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@waldekranz-com.20210112.gappssmtp.com header.s=20210112 header.b=08QF6+AE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id w6-20020a170902d70600b00153204b1f1esi3554559ply.144.2022.03.16.23.09.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Mar 2022 23:09:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@waldekranz-com.20210112.gappssmtp.com header.s=20210112 header.b=08QF6+AE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B357528E347; Wed, 16 Mar 2022 22:22:02 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235701AbiCNMrd (ORCPT + 99 others); Mon, 14 Mar 2022 08:47:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53824 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233338AbiCNMrN (ORCPT ); Mon, 14 Mar 2022 08:47:13 -0400 Received: from mail-lf1-x12e.google.com (mail-lf1-x12e.google.com [IPv6:2a00:1450:4864:20::12e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7780B3BF8F for ; Mon, 14 Mar 2022 05:38:45 -0700 (PDT) Received: by mail-lf1-x12e.google.com with SMTP id g17so26855158lfh.2 for ; Mon, 14 Mar 2022 05:38:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=waldekranz-com.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:in-reply-to:references:date:message-id :mime-version; bh=niZ0dixE3Q2j3/AHI21Azov9Ljg7nx7JugA2Xkl5Xhk=; b=08QF6+AE2N28+Eq+ppMSO58vJr/awzbHs6G8E9smJ8HhqPbOJkm/QpOt0yARry8Kpo uF2UpOvAIeuiYghNANjlLHbWwbhxNFP1DekCO5i+cOQmgcoa+uzrZLFDNNSldaW4G5sj Ax7sZ6Jnrt60eY/7q89BfAxFRB9haFemgc+qeep3NQCk4BovUaz83voUnQnO7yTkPWXY mjm4Di1fEe8zClqvZzJrg8Q/v+wbxsZpOmZwcmlRz9nI7eP8JDY+0FDrfqE/lXHd6hcP xp1beTVlCfDhlA/NngZYgjn5puYtrxia6vXY+cOlEuiTppxGwevEDk68dkIIIi73qg2Z l0bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=niZ0dixE3Q2j3/AHI21Azov9Ljg7nx7JugA2Xkl5Xhk=; b=dslG4e6Izt7XwlTE3v++0pb6mIw6R1/y1za17q4vwYCY9oHUT+gPdZChWTMNG0S2FK fMJ0Zn/Sd5RyEf1x7Cww0Bm02yqHuzGWLSqDlWr0l06ATiBsXX5a4/KxXJG9QENqW4kQ 3R2kRw8y0vROHpb2tkVO7uO82Ri842piCVxhK8LG8RHTAAT9qx7WCcxxx+tVvew/LT2l +Z5hqBOyZ+7QpAA4CJ2RQj60FE+jBPoRV2c/zlhNsrdhGmwGxqeDRpIq8t37XyRfk75g MYdxEziLMb0hyyb4AbTgc/FmcQzQ/E9iWUjKD5lLulY1VfmWcCreSBEmglUJYh9otNDL YfTQ== X-Gm-Message-State: AOAM532NGH7TGfqsQUBP+i0/szPNS4+ou8BhFpwV/kXm9jpKz4G2zPEg fVEUMjs9WxQJHUPZ4l8DSpKFDg== X-Received: by 2002:a05:6512:3e21:b0:448:53c7:178e with SMTP id i33-20020a0565123e2100b0044853c7178emr14304913lfv.374.1647261515942; Mon, 14 Mar 2022 05:38:35 -0700 (PDT) Received: from wkz-x280 (a124.broadband3.quicknet.se. [46.17.184.124]) by smtp.gmail.com with ESMTPSA id e3-20020a196743000000b0044311216c42sm3258657lfj.307.2022.03.14.05.38.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 14 Mar 2022 05:38:35 -0700 (PDT) From: Tobias Waldekranz To: Nikolay Aleksandrov , davem@davemloft.net, kuba@kernel.org Cc: Andrew Lunn , Vivien Didelot , Florian Fainelli , Vladimir Oltean , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Russell King , Ido Schimmel , Petr Machata , Cooper Lees , Matt Johnston , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org Subject: Re: [PATCH v3 net-next 03/14] net: bridge: mst: Support setting and reporting MST port states In-Reply-To: References: <20220314095231.3486931-1-tobias@waldekranz.com> <20220314095231.3486931-4-tobias@waldekranz.com> Date: Mon, 14 Mar 2022 13:38:34 +0100 Message-ID: <8735jkn1yt.fsf@waldekranz.com> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 14, 2022 at 12:37, Nikolay Aleksandrov wrote: > On 14/03/2022 11:52, Tobias Waldekranz wrote: >> Make it possible to change the port state in a given MSTI by extending >> the bridge port netlink interface (RTM_SETLINK on PF_BRIDGE).The >> proposed iproute2 interface would be: >> >> bridge mst set dev msti state >> >> Current states in all applicable MSTIs can also be dumped via a >> corresponding RTM_GETLINK. The proposed iproute interface looks like >> this: >> >> $ bridge mst >> port msti >> vb1 0 >> state forwarding >> 100 >> state disabled >> vb2 0 >> state forwarding >> 100 >> state forwarding >> >> The preexisting per-VLAN states are still valid in the MST >> mode (although they are read-only), and can be queried as usual if one >> is interested in knowing a particular VLAN's state without having to >> care about the VID to MSTI mapping (in this example VLAN 20 and 30 are >> bound to MSTI 100): >> >> $ bridge -d vlan >> port vlan-id >> vb1 10 >> state forwarding mcast_router 1 >> 20 >> state disabled mcast_router 1 >> 30 >> state disabled mcast_router 1 >> 40 >> state forwarding mcast_router 1 >> vb2 10 >> state forwarding mcast_router 1 >> 20 >> state forwarding mcast_router 1 >> 30 >> state forwarding mcast_router 1 >> 40 >> state forwarding mcast_router 1 >> >> Signed-off-by: Tobias Waldekranz >> --- > > Hi Tobias, > A few comments below.. > >> include/uapi/linux/if_bridge.h | 17 ++++++ >> include/uapi/linux/rtnetlink.h | 1 + >> net/bridge/br_mst.c | 105 +++++++++++++++++++++++++++++++++ >> net/bridge/br_netlink.c | 32 +++++++++- >> net/bridge/br_private.h | 15 +++++ >> 5 files changed, 169 insertions(+), 1 deletion(-) >> >> diff --git a/include/uapi/linux/if_bridge.h b/include/uapi/linux/if_bridge.h >> index f60244b747ae..879dfaef8da0 100644 >> --- a/include/uapi/linux/if_bridge.h >> +++ b/include/uapi/linux/if_bridge.h >> @@ -122,6 +122,7 @@ enum { >> IFLA_BRIDGE_VLAN_TUNNEL_INFO, >> IFLA_BRIDGE_MRP, >> IFLA_BRIDGE_CFM, >> + IFLA_BRIDGE_MST, >> __IFLA_BRIDGE_MAX, >> }; >> #define IFLA_BRIDGE_MAX (__IFLA_BRIDGE_MAX - 1) >> @@ -453,6 +454,21 @@ enum { >> >> #define IFLA_BRIDGE_CFM_CC_PEER_STATUS_MAX (__IFLA_BRIDGE_CFM_CC_PEER_STATUS_MAX - 1) >> >> +enum { >> + IFLA_BRIDGE_MST_UNSPEC, >> + IFLA_BRIDGE_MST_ENTRY, >> + __IFLA_BRIDGE_MST_MAX, >> +}; >> +#define IFLA_BRIDGE_MST_MAX (__IFLA_BRIDGE_MST_MAX - 1) >> + >> +enum { >> + IFLA_BRIDGE_MST_ENTRY_UNSPEC, >> + IFLA_BRIDGE_MST_ENTRY_MSTI, >> + IFLA_BRIDGE_MST_ENTRY_STATE, >> + __IFLA_BRIDGE_MST_ENTRY_MAX, >> +}; >> +#define IFLA_BRIDGE_MST_ENTRY_MAX (__IFLA_BRIDGE_MST_ENTRY_MAX - 1) >> + >> struct bridge_stp_xstats { >> __u64 transition_blk; >> __u64 transition_fwd; >> @@ -786,4 +802,5 @@ enum { >> __BRIDGE_QUERIER_MAX >> }; >> #define BRIDGE_QUERIER_MAX (__BRIDGE_QUERIER_MAX - 1) >> + > > stray new line Well that's embarrassing :) >> #endif /* _UAPI_LINUX_IF_BRIDGE_H */ >> diff --git a/include/uapi/linux/rtnetlink.h b/include/uapi/linux/rtnetlink.h >> index 51530aade46e..83849a37db5b 100644 >> --- a/include/uapi/linux/rtnetlink.h >> +++ b/include/uapi/linux/rtnetlink.h >> @@ -817,6 +817,7 @@ enum { >> #define RTEXT_FILTER_MRP (1 << 4) >> #define RTEXT_FILTER_CFM_CONFIG (1 << 5) >> #define RTEXT_FILTER_CFM_STATUS (1 << 6) >> +#define RTEXT_FILTER_MST (1 << 7) >> >> /* End of information exported to user level */ >> >> diff --git a/net/bridge/br_mst.c b/net/bridge/br_mst.c >> index 78ef5fea4d2b..df65aa7701c1 100644 >> --- a/net/bridge/br_mst.c >> +++ b/net/bridge/br_mst.c >> @@ -124,3 +124,108 @@ int br_mst_set_enabled(struct net_bridge *br, bool on, >> br_opt_toggle(br, BROPT_MST_ENABLED, on); >> return 0; >> } >> + >> +int br_mst_fill_info(struct sk_buff *skb, struct net_bridge_vlan_group *vg) > > const vg > >> +{ >> + struct net_bridge_vlan *v; > > const v > >> + struct nlattr *nest; >> + unsigned long *seen; >> + int err = 0; >> + >> + seen = bitmap_zalloc(VLAN_N_VID, 0); >> + if (!seen) >> + return -ENOMEM; >> + >> + list_for_each_entry(v, &vg->vlan_list, vlist) { >> + if (test_bit(v->brvlan->msti, seen)) >> + continue; >> + >> + nest = nla_nest_start_noflag(skb, IFLA_BRIDGE_MST_ENTRY); >> + if (!nest || >> + nla_put_u16(skb, IFLA_BRIDGE_MST_ENTRY_MSTI, v->brvlan->msti) || >> + nla_put_u8(skb, IFLA_BRIDGE_MST_ENTRY_STATE, v->state)) { >> + err = -EMSGSIZE; >> + break; >> + } >> + nla_nest_end(skb, nest); >> + >> + set_bit(v->brvlan->msti, seen); > > __set_bit() > >> + } >> + >> + kfree(seen); >> + return err; >> +} >> + >> +static const struct nla_policy br_mst_nl_policy[IFLA_BRIDGE_MST_ENTRY_MAX + 1] = { >> + [IFLA_BRIDGE_MST_ENTRY_MSTI] = NLA_POLICY_RANGE(NLA_U16, >> + 1, /* 0 reserved for CST */ >> + VLAN_N_VID - 1), >> + [IFLA_BRIDGE_MST_ENTRY_STATE] = NLA_POLICY_RANGE(NLA_U8, >> + BR_STATE_DISABLED, >> + BR_STATE_BLOCKING), >> +}; >> + >> +static int br_mst_parse_one(struct net_bridge_port *p, >> + const struct nlattr *attr, >> + struct netlink_ext_ack *extack) >> +{ > > I'd either set the state after parsing, so this function just does what it > says (parse) or I'd rename it. > >> + struct nlattr *tb[IFLA_BRIDGE_MST_ENTRY_MAX + 1]; >> + u16 msti; >> + u8 state; >> + int err; >> + >> + err = nla_parse_nested(tb, IFLA_BRIDGE_MST_ENTRY_MAX, attr, >> + br_mst_nl_policy, extack); >> + if (err) >> + return err; >> + >> + if (!tb[IFLA_BRIDGE_MST_ENTRY_MSTI]) { >> + NL_SET_ERR_MSG_MOD(extack, "MSTI not specified"); >> + return -EINVAL; >> + } >> + >> + if (!tb[IFLA_BRIDGE_MST_ENTRY_STATE]) { >> + NL_SET_ERR_MSG_MOD(extack, "State not specified"); >> + return -EINVAL; >> + } >> + >> + msti = nla_get_u16(tb[IFLA_BRIDGE_MST_ENTRY_MSTI]); >> + state = nla_get_u8(tb[IFLA_BRIDGE_MST_ENTRY_STATE]); >> + >> + br_mst_set_state(p, msti, state); >> + return 0; >> +} >> + >> +int br_mst_parse(struct net_bridge_port *p, struct nlattr *mst_attr, >> + struct netlink_ext_ack *extack) > > This doesn't just parse though, it also sets the state. Please rename it to > something more appropriate. > > const mst_attr > >> +{ >> + struct nlattr *attr; >> + int err, msts = 0; >> + int rem; >> + >> + if (!br_opt_get(p->br, BROPT_MST_ENABLED)) { >> + NL_SET_ERR_MSG_MOD(extack, "Can't modify MST state when MST is disabled"); >> + return -EBUSY; >> + } >> + >> + nla_for_each_nested(attr, mst_attr, rem) { >> + switch (nla_type(attr)) { >> + case IFLA_BRIDGE_MST_ENTRY: >> + err = br_mst_parse_one(p, attr, extack); >> + break; >> + default: >> + continue; >> + } >> + >> + msts++; >> + if (err) >> + break; >> + } >> + >> + if (!msts) { >> + NL_SET_ERR_MSG_MOD(extack, "Found no MST entries to process"); >> + err = -EINVAL; >> + } >> + >> + return err; >> +} >> diff --git a/net/bridge/br_netlink.c b/net/bridge/br_netlink.c >> index 7d4432ca9a20..d2b4550f30d6 100644 >> --- a/net/bridge/br_netlink.c >> +++ b/net/bridge/br_netlink.c >> @@ -485,7 +485,8 @@ static int br_fill_ifinfo(struct sk_buff *skb, >> RTEXT_FILTER_BRVLAN_COMPRESSED | >> RTEXT_FILTER_MRP | >> RTEXT_FILTER_CFM_CONFIG | >> - RTEXT_FILTER_CFM_STATUS)) { >> + RTEXT_FILTER_CFM_STATUS | >> + RTEXT_FILTER_MST)) { >> af = nla_nest_start_noflag(skb, IFLA_AF_SPEC); >> if (!af) >> goto nla_put_failure; >> @@ -564,7 +565,28 @@ static int br_fill_ifinfo(struct sk_buff *skb, >> nla_nest_end(skb, cfm_nest); >> } >> >> + if ((filter_mask & RTEXT_FILTER_MST) && >> + br_opt_get(br, BROPT_MST_ENABLED) && port) { >> + struct net_bridge_vlan_group *vg = nbp_vlan_group(port); > > const vg > >> + struct nlattr *mst_nest; >> + int err; >> + >> + if (!vg || !vg->num_vlans) >> + goto done; >> + >> + mst_nest = nla_nest_start(skb, IFLA_BRIDGE_MST); >> + if (!mst_nest) >> + goto nla_put_failure; >> + >> + err = br_mst_fill_info(skb, vg); >> + if (err) >> + goto nla_put_failure; >> + >> + nla_nest_end(skb, mst_nest); >> + } >> + > > I think you should also update br_get_link_af_size_filtered() to account for the > new dump attributes based on the filter. I'd adjust vinfo_sz based on the filter > flag. > >> done: >> + >> if (af) >> nla_nest_end(skb, af); >> nlmsg_end(skb, nlh); >> @@ -803,6 +825,14 @@ static int br_afspec(struct net_bridge *br, >> if (err) >> return err; >> break; >> + case IFLA_BRIDGE_MST: >> + if (cmd != RTM_SETLINK || !p) >> + return -EINVAL; > > These are two different errors, please set extack appropriately > for each error. Thanks for the review, all of the above will be fixed in v4.