Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp1416063rwe; Sat, 27 Aug 2022 07:40:51 -0700 (PDT) X-Google-Smtp-Source: AA6agR649R2r3MHpXzwJ3QBKtt6bn3i+5p0Ly5M7ujUdZaNyz7wOZeA35ngJY8ksJWTwFHLFDmYq X-Received: by 2002:a17:907:2bce:b0:73d:dd00:9ced with SMTP id gv14-20020a1709072bce00b0073ddd009cedmr6136093ejc.739.1661611250749; Sat, 27 Aug 2022 07:40:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661611250; cv=none; d=google.com; s=arc-20160816; b=rTabyJBmWuQJ6RkMx/LNIeN7ax1XcpGrat/UB2L1HtBLD67BoYPdU34hmpEz3q3xyu 8EEQlYRXaD+GpXYj5dFaXt3XTzS+6Y1+atUqAqPE22ZclGMPh9XmPaslkewfwVk2p5gT oyP72jPNIZYJt9fSr04nSWoxHfiw6lMo2tYCZZE533A+pZXl/uvBI4HKY3fPv0Pwwoky cCc0xgy47+zko0Mqzkpp9mKaY0lU/EENXKf3pwFUMrdEyj9FP/ClKh8F6ht0IacV2qBO iWJjmWAEPjdsHOmNDTNuMGeTRw++Mvg9UWVi2BZYZppFfVKQtOEopbI7rtaZgYmsP0Zq qdDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=8CiaLkECx3krBdKp6oIvGxj9L4zpqrT521rHLsVwe9c=; b=TcKYOGeDaaIdx+RJnsW1pMhVJKVvqJJDCqMIamM9TIHFv5w9Zl0z737byqIBudTdx4 kcJ5vQH+BYrjGw3+iSzy4gEJI0apI22uQx/lnELkvCym3dqlmpi3Pme1a0BaBPGvOndL WJOwfnA6hECvL2pDpb+HgZrnGrN1HJg2IXnJkybRIXswPPRxA1s9jD4ihsAv3XD/dxf9 dEbezk3QbsUd0Je7kiIvTPAMNTqraiwLnvfUJ0L+GDT/EF05Y9icbFJbSosLElomqOXm ZfFzpvxvms3TRFGI0AYVghF0LdgqdtX4XOWpl7Zg71zb9hkgM36XBLQBVSSuxeaDn7vc 0QKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=g1jkYz6h; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cq15-20020a056402220f00b004483940b2b5si395767edb.234.2022.08.27.07.40.23; Sat, 27 Aug 2022 07:40:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@blackwall-org.20210112.gappssmtp.com header.s=20210112 header.b=g1jkYz6h; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231464AbiH0Ny2 (ORCPT + 99 others); Sat, 27 Aug 2022 09:54:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39462 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229677AbiH0Ny1 (ORCPT ); Sat, 27 Aug 2022 09:54:27 -0400 Received: from mail-ej1-x632.google.com (mail-ej1-x632.google.com [IPv6:2a00:1450:4864:20::632]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A55F22F662 for ; Sat, 27 Aug 2022 06:54:25 -0700 (PDT) Received: by mail-ej1-x632.google.com with SMTP id kk26so7743584ejc.11 for ; Sat, 27 Aug 2022 06:54:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=blackwall-org.20210112.gappssmtp.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc; bh=8CiaLkECx3krBdKp6oIvGxj9L4zpqrT521rHLsVwe9c=; b=g1jkYz6hbaud7MJPfP0jk8kKHIWsdovgRzcgSUPODZpbjnDzLbWqeUUvMfhcoOvP2o htWSK5oUojOo772tVxb2ovafBDv5nHDssuSAXh0GJ8cr7DNbVH/vcT15T6DsrywtkG5L 9N2MXav1SOO5iaoM2/si+QncOtmAC0ORMqsdfWEui/zHqOVusXm259fNbVucOTCO+opN 5uXJo1y/7kZboMlhv5jq7zi5Bl/1QIwfHlz+GnMU49Cg/+iICR3oJzR79/HXC4KyJO1N JcH24SsTQu4KQUwyRQaXQbX4+AADrP7Ie842gQXGkPCgI4H7n1r5lA5bPBLHy+glgCN6 L/Iw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc; bh=8CiaLkECx3krBdKp6oIvGxj9L4zpqrT521rHLsVwe9c=; b=6iJdtzcYSYD/O49Gs12cRvAxtJ6jm8+8PFq0KDCSv5lBbWp4inByxgUWJOoM/lkRrX j/C+cQmTNfyR/F1/dDdQsqae06K1deR8T1v9k+8B3Q79ZZVsB2/K3CgtnOoEHMPTLYWI 31VMrhFCsC3JooDdYAq6h3A/HwDGodhkgr/SF3Vzf96LSPDVvy7QC6eSMLhhtA7bYpjp u2c0b4LD8kb4N9Zggfh2SDg+zGmMVbSB4BLpahnQGqLFFRWqBtcaWfHu5H2lLJmNUoGn T9AwvLBPdvyOHYvGA0JRFM6nUTP1CEVWD99HPsoLujN/iPOrfj0qy84N7lhyfu4StvpY NecQ== X-Gm-Message-State: ACgBeo1OpgLnq1cJzoaeNDf6w3vq35L3n5r+T4ruEKeMCIHK9urzCAQo lH2OVH4zQ3NgKWBNIbqBNmkryg== X-Received: by 2002:a17:906:6a03:b0:730:a20e:cf33 with SMTP id qw3-20020a1709066a0300b00730a20ecf33mr8607603ejc.620.1661608464159; Sat, 27 Aug 2022 06:54:24 -0700 (PDT) Received: from [192.168.0.111] (87-243-81-1.ip.btc-net.bg. [87.243.81.1]) by smtp.gmail.com with ESMTPSA id c17-20020a17090618b100b007311eb42e40sm2107674ejf.54.2022.08.27.06.54.22 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 27 Aug 2022 06:54:23 -0700 (PDT) Message-ID: Date: Sat, 27 Aug 2022 16:54:21 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Subject: Re: [PATCH v5 net-next 1/6] net: bridge: add locked entry fdb flag to extend locked port feature Content-Language: en-US To: Ido Schimmel Cc: Hans Schultz , davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, Florian Fainelli , Andrew Lunn , Vivien Didelot , Vladimir Oltean , Eric Dumazet , Paolo Abeni , Kurt Kanzenbach , Hauke Mehrtens , Woojung Huh , UNGLinuxDriver@microchip.com, Sean Wang , Landen Chao , DENG Qingfang , Matthias Brugger , Claudiu Manoil , Alexandre Belloni , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Shuah Khan , Christian Marangi , Daniel Borkmann , Yuwei Wang , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, bridge@lists.linux-foundation.org, linux-kselftest@vger.kernel.org References: <20220826114538.705433-1-netdev@kapio-technology.com> <20220826114538.705433-2-netdev@kapio-technology.com> From: Nikolay Aleksandrov In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27/08/2022 16:17, Ido Schimmel wrote: > On Sat, Aug 27, 2022 at 02:30:25PM +0300, Nikolay Aleksandrov wrote: >> On 26/08/2022 14:45, Hans Schultz wrote: >> Please add the blackhole flag in a separate patch. > > +1 > > [...] > >>> @@ -185,6 +196,9 @@ int br_handle_frame_finish(struct net *net, struct sock *sk, struct sk_buff *skb >>> if (test_bit(BR_FDB_LOCAL, &dst->flags)) >>> return br_pass_frame_up(skb); >>> >>> + if (test_bit(BR_FDB_BLACKHOLE, &dst->flags)) >>> + goto drop; >>> + >> Not happy about adding a new test in arguably the most used fast-path, but I don't see >> a better way to do blackhole right now. Could you please make it an unlikely() ? >> >> I guess the blackhole flag will be allowed for user-space to set at some point, why >> not do it from the start? >> >> Actually adding a BR_FDB_LOCAL and BR_FDB_BLACKHOLE would be a conflict above - >> the packet will be received. So you should move the blackhole check above the >> BR_FDB_LOCAL one if user-space is allowed to set it to any entry. > > Agree about unlikely() and making it writeable from user space from the > start. This flag is different from the "locked" flag that should only be > ever set by the kernel. > > Regarding BR_FDB_LOCAL, I think BR_FDB_BLACKHOLE should only be allowed > with BR_FDB_LOCAL as these entries are similar in the following ways: > > 1. It doesn't make sense to associate a blackhole entry with a specific > port. The packet will never be forwarded to this port, but dropped by > the bridge. This means user space will add them on the bridge itself: > Right, good point. > # bridge fdb add 00:11:22:33:44:55 dev br0 self local blackhole > > 2. If you agree that these entries should not be associated with a > specific port, then it also does not make sense to subject them to > ageing and roaming, just like existing local/permanent entries. > > The above allows us to push the new check under the BR_FDB_LOCAL check: > hmm.. so only the driver will be allowed to add non-BR_FDB_LOCAL blackhole entries with locked flag set as well, that sounds ok as they will be extern_learn and enforced by it. It is a little discrepancy as we cannot add similar entries in SW but it really doesn't make any sense to have blackhole fdbs pointing to a port. SW won't be able to have a locked entry w/ blackhole set, but I like that it is hidden in the fdb local case when fwding and that's good enough for me. > diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c > index 68b3e850bcb9..4357445529a5 100644 > --- a/net/bridge/br_input.c > +++ b/net/bridge/br_input.c > @@ -182,8 +182,11 @@ int br_handle_frame_finish(struct net *net, struct sock *sk, struct sk_buff *skb > if (dst) { > unsigned long now = jiffies; > > - if (test_bit(BR_FDB_LOCAL, &dst->flags)) > + if (test_bit(BR_FDB_LOCAL, &dst->flags)) { > + if (unlikely(test_bit(BR_FDB_BLACKHOLE, &dst->flags))) > + goto drop; > return br_pass_frame_up(skb); > + } > > if (now != dst->used) > dst->used = now;