Nikolay Aleksandrov
2022-Apr-11 20:34 UTC
[Bridge] [PATCH net-next v2 0/8] net: bridge: add flush filtering support
On 11/04/2022 22:49, Jakub Kicinski wrote:> On Mon, 11 Apr 2022 12:22:24 -0700 Roopa Prabhu wrote: >>>> I thought about that option, but I didn't like overloading delneigh like that. >>>> del currently requires a mac address and we need to either signal the device supports> a null mac, or we should push that verification to ndo_fdb_del users. Also we'll have >>> that's the only thing, overloading delneigh with a flush-behaviour (multi-del or whatever) >>> would require to push the mac check to ndo_fdb_del implementers >>> >>> I don't mind going that road if others agree that we should do it through delneigh >>> + a bit/option to signal flush, instead of a new rtm type. >>> >>>> attributes which are flush-specific and will work only when flushing as opposed to when >>>> deleting a specific mac, so handling them in the different cases can become a pain. >>> scratch the specific attributes, those can be adapted for both cases >>> >>>> MDBs will need DELMDB to be modified in a similar way. >>>> >>>> IMO a separate flush op is cleaner, but I don't have a strong preference. >>>> This can very easily be adapted to delneigh with just a bit more mechanical changes >>>> if the mac check is pushed to the ndo implementers. >>>> >>>> FLUSHNEIGH can easily work for neighs, just need another address family rtnl_register >>>> that implements it, the new ndo is just for PF_BRIDGE. :) >> >> all great points. My only reason to explore RTM_DELNEIGH is to see if we >> can find a recipe to support similar bulk deletes of other objects >> handled via rtm msgs in the future. Plus, it allows you to maintain >> symmetry between flush requests and object delete notification msg types. >> >> Lets see if there are other opinions. > > I'd vote for reusing RTM_DELNEIGH, but that's purely based onOK, I'll look into the delneigh solution. Note that for backwards compatibility we won't be able to return proper error because rtnl_fdb_del will be called without a mac address, so for old kernels with new iproute2 fdb flush will return "invalid address" as an error.> intuition, I don't know this code. I'd also lean towards core > creating struct net_bridge_fdb_flush_desc rather than piping > raw netlink attrs thru. Lastly feels like fdb ops should findI don't think the struct can really be centralized, at least for the bridge case it contains private fields which parsed attributes get mapped to, specifically the ndm flags and state, and their maps are all mapped into bridge-private flags. Or did you mean pass the raw attribute vals through a struct instead of a nlattr table?> a new home rather than ndos, but that's largely unrelated..I like separating the ops idea. I'll add that to my bridge todo list. :) Thanks, Nik
Jakub Kicinski
2022-Apr-11 20:48 UTC
[Bridge] [PATCH net-next v2 0/8] net: bridge: add flush filtering support
On Mon, 11 Apr 2022 23:34:23 +0300 Nikolay Aleksandrov wrote:> On 11/04/2022 22:49, Jakub Kicinski wrote: > >> all great points. My only reason to explore RTM_DELNEIGH is to see if we > >> can find a recipe to support similar bulk deletes of other objects > >> handled via rtm msgs in the future. Plus, it allows you to maintain > >> symmetry between flush requests and object delete notification msg types. > >> > >> Lets see if there are other opinions. > > > > I'd vote for reusing RTM_DELNEIGH, but that's purely based on > > OK, I'll look into the delneigh solution. Note that for backwards compatibility > we won't be able to return proper error because rtnl_fdb_del will be called without > a mac address, so for old kernels with new iproute2 fdb flush will return "invalid > address" as an error.If only we had policy dump for rtnl :) Another todo item, I guess.> > intuition, I don't know this code. I'd also lean towards core > > creating struct net_bridge_fdb_flush_desc rather than piping > > raw netlink attrs thru. Lastly feels like fdb ops should find > > I don't think the struct can really be centralized, at least for the > bridge case it contains private fields which parsed attributes get mapped to, > specifically the ndm flags and state, and their maps are all mapped into > bridge-private flags. Or did you mean pass the raw attribute vals through a > struct instead of a nlattr table?Yup, basically the policy is defined in the core, so the types are known. We can extract the fields from the message there, even if the exact meaning of the fields gets established in the callback. BTW setting NLA_REJECT policy is not required, NLA_REJECT is 0 so it will be set automatically per C standard.> > a new home rather than ndos, but that's largely unrelated.. > > I like separating the ops idea. I'll add that to my bridge todo list. :) > > Thanks, > Nik >