From patchwork Tue Mar 14 10:09:25 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?b?w43DsWlnbyBIdWd1ZXQ=?= X-Patchwork-Id: 13173966 X-Patchwork-Delegate: kuba@kernel.org Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 77908C6FD1D for ; Tue, 14 Mar 2023 10:11:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230297AbjCNKLL (ORCPT ); Tue, 14 Mar 2023 06:11:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56182 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230216AbjCNKKu (ORCPT ); Tue, 14 Mar 2023 06:10:50 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 28EFD2FCF5 for ; Tue, 14 Mar 2023 03:09:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1678788587; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9jYvQus620O/ZBEANxNcFXMGajwl8xYYtAElNUjytiQ=; b=F796QtXPHMZjKxfvy5HhtAaC8KWlXmJzG1Reqn5p4DSQvWGgnbYifvWaCvktuiWC/nZ6yi 5Mzxg6gb/svamBWEkkrHhgSxwdZYCMkpRZTpS1BztBjQ7ZjWjXhG331HgsDbXfWjw16fjw XUrjzuRX25u5p98HOPEp5sUivQeKXdA= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-635-_BNopKlEP4qDAjfMYK26iQ-1; Tue, 14 Mar 2023 06:09:44 -0400 X-MC-Unique: _BNopKlEP4qDAjfMYK26iQ-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 8D4B41C04334; Tue, 14 Mar 2023 10:09:43 +0000 (UTC) Received: from localhost.localdomain (unknown [10.39.192.146]) by smtp.corp.redhat.com (Postfix) with ESMTP id CBE96492B00; Tue, 14 Mar 2023 10:09:41 +0000 (UTC) From: =?utf-8?b?w43DsWlnbyBIdWd1ZXQ=?= To: ecree.xilinx@gmail.com, habetsm.xilinx@gmail.com, richardcochran@gmail.com Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, netdev@vger.kernel.org, =?utf-8?b?w43DsWlnbyBIdWd1ZXQ=?= , Yalin Li Subject: [PATCH RESEND net-next v4 4/4] sfc: remove expired unicast PTP filters Date: Tue, 14 Mar 2023 11:09:25 +0100 Message-Id: <20230314100925.12040-5-ihuguet@redhat.com> In-Reply-To: <20230314100925.12040-1-ihuguet@redhat.com> References: <20230314100925.12040-1-ihuguet@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: kuba@kernel.org Filters inserted to support unicast PTP mode might become unused after some time, so we need to remove them to avoid accumulating many of them. Actually, it would be a very unusual situation that many different addresses are used, normally only a small set of predefined addresses are tried. Anyway, some cleanup is necessary because maintaining old filters forever makes very little sense. Reported-by: Yalin Li Signed-off-by: Íñigo Huguet Acked-by: Edward Cree --- drivers/net/ethernet/sfc/ptp.c | 83 ++++++++++++++++++++++++---------- 1 file changed, 60 insertions(+), 23 deletions(-) diff --git a/drivers/net/ethernet/sfc/ptp.c b/drivers/net/ethernet/sfc/ptp.c index 16686aa5bfb4..1447683dce31 100644 --- a/drivers/net/ethernet/sfc/ptp.c +++ b/drivers/net/ethernet/sfc/ptp.c @@ -75,6 +75,9 @@ /* How long an unmatched event or packet can be held */ #define PKT_EVENT_LIFETIME_MS 10 +/* How long unused unicast filters can be held */ +#define UCAST_FILTER_EXPIRY_JIFFIES msecs_to_jiffies(30000) + /* Offsets into PTP packet for identification. These offsets are from the * start of the IP header, not the MAC header. Note that neither PTP V1 nor * PTP V2 permit the use of IPV4 options. @@ -218,6 +221,7 @@ struct efx_ptp_timeset { * @ether_type: Network protocol of the filter (ETHER_P_IP / ETHER_P_IPV6) * @loc_port: UDP port of the filter (PTP_EVENT_PORT / PTP_GENERAL_PORT) * @loc_host: IPv4/v6 address of the filter + * @expiry: time when the filter expires, in jiffies * @handle: Handle ID for the MCDI filters table */ struct efx_ptp_rxfilter { @@ -225,6 +229,7 @@ struct efx_ptp_rxfilter { __be16 ether_type; __be16 loc_port; __be32 loc_host[4]; + unsigned long expiry; int handle; }; @@ -1318,8 +1323,8 @@ static inline void efx_ptp_process_rx(struct efx_nic *efx, struct sk_buff *skb) local_bh_enable(); } -static bool efx_ptp_filter_exists(struct list_head *ptp_list, - struct efx_filter_spec *spec) +static struct efx_ptp_rxfilter * +efx_ptp_find_filter(struct list_head *ptp_list, struct efx_filter_spec *spec) { struct efx_ptp_rxfilter *rxfilter; @@ -1327,10 +1332,19 @@ static bool efx_ptp_filter_exists(struct list_head *ptp_list, if (rxfilter->ether_type == spec->ether_type && rxfilter->loc_port == spec->loc_port && !memcmp(rxfilter->loc_host, spec->loc_host, sizeof(spec->loc_host))) - return true; + return rxfilter; } - return false; + return NULL; +} + +static void efx_ptp_remove_one_filter(struct efx_nic *efx, + struct efx_ptp_rxfilter *rxfilter) +{ + efx_filter_remove_id_safe(efx, EFX_FILTER_PRI_REQUIRED, + rxfilter->handle); + list_del(&rxfilter->list); + kfree(rxfilter); } static void efx_ptp_remove_filters(struct efx_nic *efx, @@ -1339,10 +1353,7 @@ static void efx_ptp_remove_filters(struct efx_nic *efx, struct efx_ptp_rxfilter *rxfilter, *tmp; list_for_each_entry_safe(rxfilter, tmp, ptp_list, list) { - efx_filter_remove_id_safe(efx, EFX_FILTER_PRI_REQUIRED, - rxfilter->handle); - list_del(&rxfilter->list); - kfree(rxfilter); + efx_ptp_remove_one_filter(efx, rxfilter); } } @@ -1358,13 +1369,17 @@ static void efx_ptp_init_filter(struct efx_nic *efx, static int efx_ptp_insert_filter(struct efx_nic *efx, struct list_head *ptp_list, - struct efx_filter_spec *spec) + struct efx_filter_spec *spec, + unsigned long expiry) { struct efx_ptp_rxfilter *rxfilter; int rc; - if (efx_ptp_filter_exists(ptp_list, spec)) + rxfilter = efx_ptp_find_filter(ptp_list, spec); + if (rxfilter) { + rxfilter->expiry = expiry; return 0; + } rxfilter = kzalloc(sizeof(*rxfilter), GFP_KERNEL); if (!rxfilter) @@ -1378,6 +1393,7 @@ static int efx_ptp_insert_filter(struct efx_nic *efx, rxfilter->ether_type = spec->ether_type; rxfilter->loc_port = spec->loc_port; memcpy(rxfilter->loc_host, spec->loc_host, sizeof(spec->loc_host)); + rxfilter->expiry = expiry; list_add(&rxfilter->list, ptp_list); return 0; @@ -1389,28 +1405,31 @@ static int efx_ptp_insert_filter(struct efx_nic *efx, static int efx_ptp_insert_ipv4_filter(struct efx_nic *efx, struct list_head *ptp_list, - __be32 addr, u16 port) + __be32 addr, u16 port, + unsigned long expiry) { struct efx_filter_spec spec; efx_ptp_init_filter(efx, &spec); efx_filter_set_ipv4_local(&spec, IPPROTO_UDP, addr, htons(port)); - return efx_ptp_insert_filter(efx, ptp_list, &spec); + return efx_ptp_insert_filter(efx, ptp_list, &spec, expiry); } static int efx_ptp_insert_ipv6_filter(struct efx_nic *efx, struct list_head *ptp_list, - struct in6_addr *addr, u16 port) + struct in6_addr *addr, u16 port, + unsigned long expiry) { struct efx_filter_spec spec; efx_ptp_init_filter(efx, &spec); efx_filter_set_ipv6_local(&spec, IPPROTO_UDP, addr, htons(port)); - return efx_ptp_insert_filter(efx, ptp_list, &spec); + return efx_ptp_insert_filter(efx, ptp_list, &spec, expiry); } static int efx_ptp_insert_eth_multicast_filter(struct efx_nic *efx) { + struct efx_ptp_data *ptp = efx->ptp_data; const u8 addr[ETH_ALEN] = PTP_ADDR_ETHER; struct efx_filter_spec spec; @@ -1418,7 +1437,7 @@ static int efx_ptp_insert_eth_multicast_filter(struct efx_nic *efx) efx_filter_set_eth_local(&spec, EFX_FILTER_VID_UNSPEC, addr); spec.match_flags |= EFX_FILTER_MATCH_ETHER_TYPE; spec.ether_type = htons(ETH_P_1588); - return efx_ptp_insert_filter(efx, &efx->ptp_data->rxfilters_mcast, &spec); + return efx_ptp_insert_filter(efx, &ptp->rxfilters_mcast, &spec, 0); } static int efx_ptp_insert_multicast_filters(struct efx_nic *efx) @@ -1433,12 +1452,14 @@ static int efx_ptp_insert_multicast_filters(struct efx_nic *efx) * that there is no packet re-ordering. */ rc = efx_ptp_insert_ipv4_filter(efx, &ptp->rxfilters_mcast, - htonl(PTP_ADDR_IPV4), PTP_EVENT_PORT); + htonl(PTP_ADDR_IPV4), PTP_EVENT_PORT, + 0); if (rc < 0) goto fail; rc = efx_ptp_insert_ipv4_filter(efx, &ptp->rxfilters_mcast, - htonl(PTP_ADDR_IPV4), PTP_GENERAL_PORT); + htonl(PTP_ADDR_IPV4), PTP_GENERAL_PORT, + 0); if (rc < 0) goto fail; @@ -1449,12 +1470,12 @@ static int efx_ptp_insert_multicast_filters(struct efx_nic *efx) struct in6_addr ipv6_addr = {{PTP_ADDR_IPV6}}; rc = efx_ptp_insert_ipv6_filter(efx, &ptp->rxfilters_mcast, - &ipv6_addr, PTP_EVENT_PORT); + &ipv6_addr, PTP_EVENT_PORT, 0); if (rc < 0) goto fail; rc = efx_ptp_insert_ipv6_filter(efx, &ptp->rxfilters_mcast, - &ipv6_addr, PTP_GENERAL_PORT); + &ipv6_addr, PTP_GENERAL_PORT, 0); if (rc < 0) goto fail; @@ -1490,21 +1511,24 @@ static int efx_ptp_insert_unicast_filter(struct efx_nic *efx, struct sk_buff *skb) { struct efx_ptp_data *ptp = efx->ptp_data; + unsigned long expiry; int rc; if (!efx_ptp_valid_unicast_event_pkt(skb)) return -EINVAL; + expiry = jiffies + UCAST_FILTER_EXPIRY_JIFFIES; + if (skb->protocol == htons(ETH_P_IP)) { __be32 addr = ip_hdr(skb)->saddr; rc = efx_ptp_insert_ipv4_filter(efx, &ptp->rxfilters_ucast, - addr, PTP_EVENT_PORT); + addr, PTP_EVENT_PORT, expiry); if (rc < 0) goto fail; rc = efx_ptp_insert_ipv4_filter(efx, &ptp->rxfilters_ucast, - addr, PTP_GENERAL_PORT); + addr, PTP_GENERAL_PORT, expiry); if (rc < 0) goto fail; } else if (efx_ptp_use_mac_tx_timestamps(efx)) { @@ -1512,12 +1536,12 @@ static int efx_ptp_insert_unicast_filter(struct efx_nic *efx, struct in6_addr *addr = &ipv6_hdr(skb)->saddr; rc = efx_ptp_insert_ipv6_filter(efx, &ptp->rxfilters_ucast, - addr, PTP_EVENT_PORT); + addr, PTP_EVENT_PORT, expiry); if (rc < 0) goto fail; rc = efx_ptp_insert_ipv6_filter(efx, &ptp->rxfilters_ucast, - addr, PTP_GENERAL_PORT); + addr, PTP_GENERAL_PORT, expiry); if (rc < 0) goto fail; } else { @@ -1531,6 +1555,17 @@ static int efx_ptp_insert_unicast_filter(struct efx_nic *efx, return rc; } +static void efx_ptp_drop_expired_unicast_filters(struct efx_nic *efx) +{ + struct efx_ptp_data *ptp = efx->ptp_data; + struct efx_ptp_rxfilter *rxfilter, *tmp; + + list_for_each_entry_safe(rxfilter, tmp, &ptp->rxfilters_ucast, list) { + if (time_is_before_jiffies(rxfilter->expiry)) + efx_ptp_remove_one_filter(efx, rxfilter); + } +} + static int efx_ptp_start(struct efx_nic *efx) { struct efx_ptp_data *ptp = efx->ptp_data; @@ -1631,6 +1666,8 @@ static void efx_ptp_worker(struct work_struct *work) while ((skb = __skb_dequeue(&tempq))) efx_ptp_process_rx(efx, skb); + + efx_ptp_drop_expired_unicast_filters(efx); } static const struct ptp_clock_info efx_phc_clock_info = {