lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2072564647.943921.1433292355649.JavaMail.zimbra@savoirfairelinux.com>
Date:	Tue, 2 Jun 2015 20:45:55 -0400 (EDT)
From:	Vivien Didelot <vivien.didelot@...oirfairelinux.com>
To:	Guenter Roeck <linux@...ck-us.net>
Cc:	netdev <netdev@...r.kernel.org>, David <davem@...emloft.net>,
	Florian Fainelli <f.fainelli@...il.com>,
	Andrew Lunn <andrew@...n.ch>,
	Scott Feldman <sfeldma@...il.com>,
	Jiri Pirko <jiri@...nulli.us>,
	Jérome Oufella 
	<jerome.oufella@...oirfairelinux.com>,
	linux-kernel <linux-kernel@...r.kernel.org>,
	kernel <kernel@...oirfairelinux.com>,
	Chris Healy <cphealy@...il.com>
Subject: Re: [RFC 2/9] net: dsa: add basic support for VLAN operations

Hi Guenter,

On Jun 2, 2015, at 10:42 AM, Guenter Roeck linux@...ck-us.net wrote:
On 06/01/2015 06:27 PM, Vivien Didelot wrote:
>> This patch adds the glue between DSA and switchdev to add and delete
>> SWITCHDEV_OBJ_PORT_VLAN objects.
>>
>> This will allow the DSA switch drivers implementing the port_vlan_add
>> and port_vlan_del functions to access the switch VLAN database through
>> userspace commands such as "bridge vlan".
>>
>> Signed-off-by: Vivien Didelot <vivien.didelot@...oirfairelinux.com>
>> ---
>>   include/net/dsa.h |  7 +++++++
>>   net/dsa/slave.c   | 61 +++++++++++++++++++++++++++++++++++++++++++++++++++++--
>>   2 files changed, 66 insertions(+), 2 deletions(-)
>>
>> diff --git a/include/net/dsa.h b/include/net/dsa.h
>> index fbca63b..726357b 100644
>> --- a/include/net/dsa.h
>> +++ b/include/net/dsa.h
>> @@ -302,6 +302,13 @@ struct dsa_switch_driver {
>>                 const unsigned char *addr, u16 vid);
>>      int (*fdb_getnext)(struct dsa_switch *ds, int port,
>>                     unsigned char *addr, bool *is_static);
>> +
>> +    /*
>> +     * VLAN support
>> +     */
>> +    int (*port_vlan_add)(struct dsa_switch *ds, int port, u16 vid,
>> +                 u16 bridge_flags);
>> +    int (*port_vlan_del)(struct dsa_switch *ds, int port, u16 vid);
>>   };
>>
>>   void register_switch_driver(struct dsa_switch_driver *type);
>> diff --git a/net/dsa/slave.c b/net/dsa/slave.c
>> index cbda00a..52ba5a1 100644
>> --- a/net/dsa/slave.c
>> +++ b/net/dsa/slave.c
>> @@ -363,6 +363,25 @@ static int dsa_slave_port_attr_set(struct net_device *dev,
>>      return ret;
>>   }
>>
>> +static int dsa_slave_port_vlans_add(struct net_device *dev,
>> +                    struct switchdev_obj_vlan *vlan)
>> +{
>> +    struct dsa_slave_priv *p = netdev_priv(dev);
>> +    struct dsa_switch *ds = p->parent;
>> +    int vid, err = 0;
>> +
>> +    if (!ds->drv->port_vlan_add)
>> +        return -ENOTSUPP;
>> +
>> +    for (vid = vlan->vid_start; vid <= vlan->vid_end; ++vid) {
>> +        err = ds->drv->port_vlan_add(ds, p->port, vid, vlan->flags);
>> +        if (err)
>> +            break;
>> +    }
>> +
>> +    return err;
>> +}
>> +
>>   static int dsa_slave_port_obj_add(struct net_device *dev,
>>                    struct switchdev_obj *obj)
>>   {
>> @@ -378,6 +397,9 @@ static int dsa_slave_port_obj_add(struct net_device *dev,
>>          return 0;
>>
>>      switch (obj->id) {
>> +    case SWITCHDEV_OBJ_PORT_VLAN:
>> +        err = dsa_slave_port_vlans_add(dev, &obj->u.vlan);
>> +        break;
>>      default:
>>          err = -ENOTSUPP;
>>          break;
>> @@ -386,12 +408,34 @@ static int dsa_slave_port_obj_add(struct net_device *dev,
>>      return err;
>>   }
>>
>> +static int dsa_slave_port_vlans_del(struct net_device *dev,
>> +                    struct switchdev_obj_vlan *vlan)
>> +{
>> +    struct dsa_slave_priv *p = netdev_priv(dev);
>> +    struct dsa_switch *ds = p->parent;
>> +    int vid, err = 0;
>> +
>> +    if (!ds->drv->port_vlan_del)
>> +        return -ENOTSUPP;
>> +
>> +    for (vid = vlan->vid_start; vid <= vlan->vid_end; ++vid) {
>> +        err = ds->drv->port_vlan_del(ds, p->port, vid);
>> +        if (err)
>> +            break;
>> +    }
>> +
>> +    return err;
>> +}
>> +
>>   static int dsa_slave_port_obj_del(struct net_device *dev,
>>                    struct switchdev_obj *obj)
>>   {
>>      int err;
>>
>>      switch (obj->id) {
>> +    case SWITCHDEV_OBJ_PORT_VLAN:
>> +        err = dsa_slave_port_vlans_del(dev, &obj->u.vlan);
>> +        break;
>>      default:
>>          err = -EOPNOTSUPP;
>>          break;
>> @@ -473,6 +517,15 @@ static netdev_tx_t dsa_slave_notag_xmit(struct sk_buff
>> *skb,
>>      return NETDEV_TX_OK;
>>   }
>>
>> +static int dsa_slave_vlan_noop(struct net_device *dev, __be16 proto, u16 vid)
>> +{
>> +    /* NETIF_F_HW_VLAN_CTAG_FILTER requires ndo_vlan_rx_add_vid and
>> +     * ndo_vlan_rx_kill_vid, otherwise the VLAN acceleration is considered
>> +     * buggy (see net/core/dev.c).
>> +     */
>> +    return 0;
>> +}
>> +
>>
>>   /* ethtool operations *******************************************************/
>>   static int
>> @@ -734,6 +787,10 @@ static const struct net_device_ops dsa_slave_netdev_ops = {
>>      .ndo_fdb_dump       = dsa_slave_fdb_dump,
>>      .ndo_do_ioctl       = dsa_slave_ioctl,
>>      .ndo_get_iflink     = dsa_slave_get_iflink,
>> +    .ndo_vlan_rx_add_vid    = dsa_slave_vlan_noop,
>> +    .ndo_vlan_rx_kill_vid   = dsa_slave_vlan_noop,
>> +    .ndo_bridge_setlink = switchdev_port_bridge_setlink,
>> +    .ndo_bridge_dellink = switchdev_port_bridge_dellink,
>>   };
>>
>>   static const struct switchdev_ops dsa_slave_switchdev_ops = {
>> @@ -924,7 +981,7 @@ int dsa_slave_create(struct dsa_switch *ds, struct device
>> *parent,
>>      if (slave_dev == NULL)
>>          return -ENOMEM;
>>
>> -    slave_dev->features = master->vlan_features;
>> +    slave_dev->features = master->vlan_features | NETIF_F_VLAN_FEATURES;
> 
> Hi Vivien,
> 
> NETIF_F_VLAN_FEATURES declares that the device supports receive and transmit
> tagging offload. We do this on transmit, by calling vlan_hwaccel_push_inside()
> with patch 9, but not on the receive side.
> 
> I think you may need to add matching code on the receive side to remove
> the VLAN tag and move it into the skb with __vlan_hwaccel_put_tag().
> It may also be necessary to add the same code for the other tag handlers.
> 
> Overall I wonder if it really makes sense to add those flags. Seems to me
> that would only make sense if the resulting code gets more efficient,
> which at least currently is not the case. Am I missing something ?

I initially added those flags because without them, bridge didn't call
my ndo_vlan_rx_add_vid. But with the switchdev abstraction, they seem
unrelevant.

I just undo this change (keeping slave_dev->{vlan_,}features to
master->vlan_features) and I am able to create VLANs through bridge.

TBH, I'm not familiar at all with these flags. Seems like I must revert
this feature changes.

Thanks,
-v
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ