Commit 71afb45a authored by Ido Schimmel's avatar Ido Schimmel Committed by David S. Miller

mlxsw: spectrum_switchdev: Have VXLAN device take reference on FID

Up until now only local ports and the router port (which is also a local
port) took a reference on the corresponding FID (Filtering Identifier)
when joining a bridge. For example:

        192.0.2.1/24
            br0
             |
      +------+------+
      |             |
     swp1        vxlan0

In this case the reference count of the FID will be '2'. Since the VXLAN
device does not take a reference on the FID, whenever a local port joins
the bridge it needs to check if a VXLAN device is already enslaved. If
the VXLAN device should be mapped to the FID in question, then the VXLAN
device's VNI is set on the FID.

Beside the fact that this scheme special-cases the VXLAN device, it also
creates an unnecessary dependency between the routing and bridge code:

1. [R] IP address is added on 'br0', which prompts the creation of a RIF
   and a backing FID
2. [B] VNI is enabled on backing FID
3. [R] Host route corresponding to VXLAN device's source address is
   promoted to perform NVE decapsulation

[R] - Routing code
[B] - Bridge code

This back and forth dependency will become problematic when a lock is
added in the routing code instead of relying on RTNL, as it will result
in an AA deadlock.

Instead, have the VXLAN device take a reference on the FID just like all
the other netdev members of the bridge. In order to correctly handle the
case where VXLAN devices are already enslaved to the bridge when it is
offloaded, walk the bridge's slaves and replay the configuration.
Signed-off-by: default avatarIdo Schimmel <idosch@mellanox.com>
Acked-by: default avatarJiri Pirko <jiri@mellanox.com>
Reviewed-by: default avatarPetr Machata <petrm@mellanox.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 23a1a0b3
...@@ -153,6 +153,51 @@ static void mlxsw_sp_bridge_device_rifs_destroy(struct mlxsw_sp *mlxsw_sp, ...@@ -153,6 +153,51 @@ static void mlxsw_sp_bridge_device_rifs_destroy(struct mlxsw_sp *mlxsw_sp,
mlxsw_sp); mlxsw_sp);
} }
static int mlxsw_sp_bridge_device_vxlan_init(struct mlxsw_sp_bridge *bridge,
struct net_device *br_dev,
struct netlink_ext_ack *extack)
{
struct net_device *dev, *stop_dev;
struct list_head *iter;
int err;
netdev_for_each_lower_dev(br_dev, dev, iter) {
if (netif_is_vxlan(dev) && netif_running(dev)) {
err = mlxsw_sp_bridge_vxlan_join(bridge->mlxsw_sp,
br_dev, dev, 0,
extack);
if (err) {
stop_dev = dev;
goto err_vxlan_join;
}
}
}
return 0;
err_vxlan_join:
netdev_for_each_lower_dev(br_dev, dev, iter) {
if (netif_is_vxlan(dev) && netif_running(dev)) {
if (stop_dev == dev)
break;
mlxsw_sp_bridge_vxlan_leave(bridge->mlxsw_sp, dev);
}
}
return err;
}
static void mlxsw_sp_bridge_device_vxlan_fini(struct mlxsw_sp_bridge *bridge,
struct net_device *br_dev)
{
struct net_device *dev;
struct list_head *iter;
netdev_for_each_lower_dev(br_dev, dev, iter) {
if (netif_is_vxlan(dev) && netif_running(dev))
mlxsw_sp_bridge_vxlan_leave(bridge->mlxsw_sp, dev);
}
}
static struct mlxsw_sp_bridge_device * static struct mlxsw_sp_bridge_device *
mlxsw_sp_bridge_device_create(struct mlxsw_sp_bridge *bridge, mlxsw_sp_bridge_device_create(struct mlxsw_sp_bridge *bridge,
struct net_device *br_dev, struct net_device *br_dev,
...@@ -161,6 +206,7 @@ mlxsw_sp_bridge_device_create(struct mlxsw_sp_bridge *bridge, ...@@ -161,6 +206,7 @@ mlxsw_sp_bridge_device_create(struct mlxsw_sp_bridge *bridge,
struct device *dev = bridge->mlxsw_sp->bus_info->dev; struct device *dev = bridge->mlxsw_sp->bus_info->dev;
struct mlxsw_sp_bridge_device *bridge_device; struct mlxsw_sp_bridge_device *bridge_device;
bool vlan_enabled = br_vlan_enabled(br_dev); bool vlan_enabled = br_vlan_enabled(br_dev);
int err;
if (vlan_enabled && bridge->vlan_enabled_exists) { if (vlan_enabled && bridge->vlan_enabled_exists) {
dev_err(dev, "Only one VLAN-aware bridge is supported\n"); dev_err(dev, "Only one VLAN-aware bridge is supported\n");
...@@ -186,13 +232,29 @@ mlxsw_sp_bridge_device_create(struct mlxsw_sp_bridge *bridge, ...@@ -186,13 +232,29 @@ mlxsw_sp_bridge_device_create(struct mlxsw_sp_bridge *bridge,
INIT_LIST_HEAD(&bridge_device->mids_list); INIT_LIST_HEAD(&bridge_device->mids_list);
list_add(&bridge_device->list, &bridge->bridges_list); list_add(&bridge_device->list, &bridge->bridges_list);
/* It is possible we already have VXLAN devices enslaved to the bridge.
* In which case, we need to replay their configuration as if they were
* just now enslaved to the bridge.
*/
err = mlxsw_sp_bridge_device_vxlan_init(bridge, br_dev, extack);
if (err)
goto err_vxlan_init;
return bridge_device; return bridge_device;
err_vxlan_init:
list_del(&bridge_device->list);
if (bridge_device->vlan_enabled)
bridge->vlan_enabled_exists = false;
kfree(bridge_device);
return ERR_PTR(err);
} }
static void static void
mlxsw_sp_bridge_device_destroy(struct mlxsw_sp_bridge *bridge, mlxsw_sp_bridge_device_destroy(struct mlxsw_sp_bridge *bridge,
struct mlxsw_sp_bridge_device *bridge_device) struct mlxsw_sp_bridge_device *bridge_device)
{ {
mlxsw_sp_bridge_device_vxlan_fini(bridge, bridge_device->dev);
mlxsw_sp_bridge_device_rifs_destroy(bridge->mlxsw_sp, mlxsw_sp_bridge_device_rifs_destroy(bridge->mlxsw_sp,
bridge_device->dev); bridge_device->dev);
list_del(&bridge_device->list); list_del(&bridge_device->list);
...@@ -1994,12 +2056,11 @@ mlxsw_sp_bridge_8021q_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device, ...@@ -1994,12 +2056,11 @@ mlxsw_sp_bridge_8021q_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device,
return err; return err;
} }
/* If no other port is member in the VLAN, then the FID does not exist. fid = mlxsw_sp_fid_8021q_get(mlxsw_sp, vid);
* NVE will be enabled on the FID once a port joins the VLAN if (IS_ERR(fid)) {
*/ NL_SET_ERR_MSG_MOD(extack, "Failed to create 802.1Q FID");
fid = mlxsw_sp_fid_8021q_lookup(mlxsw_sp, vid); return PTR_ERR(fid);
if (!fid) }
return 0;
if (mlxsw_sp_fid_vni_is_set(fid)) { if (mlxsw_sp_fid_vni_is_set(fid)) {
NL_SET_ERR_MSG_MOD(extack, "VNI is already set on FID"); NL_SET_ERR_MSG_MOD(extack, "VNI is already set on FID");
...@@ -2011,11 +2072,6 @@ mlxsw_sp_bridge_8021q_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device, ...@@ -2011,11 +2072,6 @@ mlxsw_sp_bridge_8021q_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device,
if (err) if (err)
goto err_nve_fid_enable; goto err_nve_fid_enable;
/* The tunnel port does not hold a reference on the FID. Only
* local ports and the router port
*/
mlxsw_sp_fid_put(fid);
return 0; return 0;
err_nve_fid_enable: err_nve_fid_enable:
...@@ -2188,9 +2244,9 @@ mlxsw_sp_bridge_8021d_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device, ...@@ -2188,9 +2244,9 @@ mlxsw_sp_bridge_8021d_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device,
struct mlxsw_sp_fid *fid; struct mlxsw_sp_fid *fid;
int err; int err;
fid = mlxsw_sp_fid_8021d_lookup(mlxsw_sp, bridge_device->dev->ifindex); fid = mlxsw_sp_fid_8021d_get(mlxsw_sp, bridge_device->dev->ifindex);
if (!fid) { if (IS_ERR(fid)) {
NL_SET_ERR_MSG_MOD(extack, "Did not find a corresponding FID"); NL_SET_ERR_MSG_MOD(extack, "Failed to create 802.1D FID");
return -EINVAL; return -EINVAL;
} }
...@@ -2204,11 +2260,6 @@ mlxsw_sp_bridge_8021d_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device, ...@@ -2204,11 +2260,6 @@ mlxsw_sp_bridge_8021d_vxlan_join(struct mlxsw_sp_bridge_device *bridge_device,
if (err) if (err)
goto err_nve_fid_enable; goto err_nve_fid_enable;
/* The tunnel port does not hold a reference on the FID. Only
* local ports and the router port
*/
mlxsw_sp_fid_put(fid);
return 0; return 0;
err_nve_fid_enable: err_nve_fid_enable:
...@@ -2356,6 +2407,10 @@ void mlxsw_sp_bridge_vxlan_leave(struct mlxsw_sp *mlxsw_sp, ...@@ -2356,6 +2407,10 @@ void mlxsw_sp_bridge_vxlan_leave(struct mlxsw_sp *mlxsw_sp,
return; return;
mlxsw_sp_nve_fid_disable(mlxsw_sp, fid); mlxsw_sp_nve_fid_disable(mlxsw_sp, fid);
/* Drop both the reference we just took during lookup and the reference
* the VXLAN device took.
*/
mlxsw_sp_fid_put(fid);
mlxsw_sp_fid_put(fid); mlxsw_sp_fid_put(fid);
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment