blob: ad7e4f6b6d6b5bf01c95e59aeab2657113c386c8 [file] [log] [blame]
Vlad Yasevich243a2e62013-02-13 12:00:09 +00001#include <linux/kernel.h>
2#include <linux/netdevice.h>
3#include <linux/rtnetlink.h>
4#include <linux/slab.h>
Scott Feldman7f109532015-06-12 17:39:50 -07005#include <net/switchdev.h>
Vlad Yasevich243a2e62013-02-13 12:00:09 +00006
7#include "br_private.h"
8
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +02009static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg,
10 const void *ptr)
Vlad Yasevich552406c2013-02-13 12:00:15 +000011{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020012 const struct net_bridge_vlan *vle = ptr;
13 u16 vid = *(u16 *)arg->key;
14
15 return vle->vid != vid;
16}
17
18static const struct rhashtable_params br_vlan_rht_params = {
19 .head_offset = offsetof(struct net_bridge_vlan, vnode),
20 .key_offset = offsetof(struct net_bridge_vlan, vid),
21 .key_len = sizeof(u16),
Nikolay Aleksandrov8af78b62015-09-30 20:16:51 +020022 .nelem_hint = 3,
23 .locks_mul = 1,
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020024 .max_size = VLAN_N_VID,
25 .obj_cmpfn = br_vlan_cmp,
26 .automatic_shrinking = true,
27};
28
29static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid)
30{
31 return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params);
32}
33
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020034static void __vlan_add_pvid(struct net_bridge_vlan_group *vg, u16 vid)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020035{
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020036 if (vg->pvid == vid)
Vlad Yasevich552406c2013-02-13 12:00:15 +000037 return;
38
39 smp_wmb();
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020040 vg->pvid = vid;
Vlad Yasevich552406c2013-02-13 12:00:15 +000041}
42
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020043static void __vlan_delete_pvid(struct net_bridge_vlan_group *vg, u16 vid)
Vlad Yasevich552406c2013-02-13 12:00:15 +000044{
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020045 if (vg->pvid != vid)
Vlad Yasevich552406c2013-02-13 12:00:15 +000046 return;
47
48 smp_wmb();
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020049 vg->pvid = 0;
Vlad Yasevich552406c2013-02-13 12:00:15 +000050}
51
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020052static void __vlan_add_flags(struct net_bridge_vlan *v, u16 flags)
Vlad Yasevich35e03f32013-02-13 12:00:20 +000053{
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +020054 struct net_bridge_vlan_group *vg;
55
56 if (br_vlan_is_master(v))
57 vg = v->br->vlgrp;
58 else
59 vg = v->port->vlgrp;
60
61 if (flags & BRIDGE_VLAN_INFO_PVID)
62 __vlan_add_pvid(vg, v->vid);
63 else
64 __vlan_delete_pvid(vg, v->vid);
Vlad Yasevich35e03f32013-02-13 12:00:20 +000065
66 if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020067 v->flags |= BRIDGE_VLAN_INFO_UNTAGGED;
Vlad Yasevich635126b2014-09-12 16:26:17 -040068 else
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020069 v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED;
Vlad Yasevich35e03f32013-02-13 12:00:20 +000070}
71
Scott Feldman7f109532015-06-12 17:39:50 -070072static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br,
73 u16 vid, u16 flags)
74{
Jiri Pirko0944d6b2015-10-09 13:54:11 +020075 struct switchdev_obj_port_vlan v = {
76 .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
77 .flags = flags,
78 .vid_begin = vid,
79 .vid_end = vid,
80 };
Scott Feldman7f109532015-06-12 17:39:50 -070081 int err;
82
Jiri Pirko0944d6b2015-10-09 13:54:11 +020083 /* Try switchdev op first. In case it is not supported, fallback to
84 * 8021q add.
Scott Feldman7f109532015-06-12 17:39:50 -070085 */
Jiri Pirko0944d6b2015-10-09 13:54:11 +020086 err = switchdev_port_obj_add(dev, &v.obj);
87 if (err == -EOPNOTSUPP)
88 return vlan_vid_add(dev, br->vlan_proto, vid);
Scott Feldman7f109532015-06-12 17:39:50 -070089 return err;
90}
91
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020092static void __vlan_add_list(struct net_bridge_vlan *v)
Vlad Yasevich243a2e62013-02-13 12:00:09 +000093{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020094 struct list_head *headp, *hpos;
95 struct net_bridge_vlan *vent;
Vlad Yasevich243a2e62013-02-13 12:00:09 +000096
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020097 headp = br_vlan_is_master(v) ? &v->br->vlgrp->vlan_list :
98 &v->port->vlgrp->vlan_list;
99 list_for_each_prev(hpos, headp) {
100 vent = list_entry(hpos, struct net_bridge_vlan, vlist);
101 if (v->vid < vent->vid)
102 continue;
103 else
104 break;
Vlad Yasevich552406c2013-02-13 12:00:15 +0000105 }
Nikolay Aleksandrov586c2b52015-10-02 15:05:10 +0200106 list_add_rcu(&v->vlist, hpos);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200107}
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000108
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200109static void __vlan_del_list(struct net_bridge_vlan *v)
110{
Nikolay Aleksandrov586c2b52015-10-02 15:05:10 +0200111 list_del_rcu(&v->vlist);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000112}
113
Vivien Didelotbf361ad2015-09-05 21:27:57 -0400114static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br,
115 u16 vid)
Scott Feldman7f109532015-06-12 17:39:50 -0700116{
Jiri Pirko0944d6b2015-10-09 13:54:11 +0200117 struct switchdev_obj_port_vlan v = {
118 .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
119 .vid_begin = vid,
120 .vid_end = vid,
121 };
122 int err;
Scott Feldman7f109532015-06-12 17:39:50 -0700123
Jiri Pirko0944d6b2015-10-09 13:54:11 +0200124 /* Try switchdev op first. In case it is not supported, fallback to
125 * 8021q del.
Scott Feldman7f109532015-06-12 17:39:50 -0700126 */
Jiri Pirko0944d6b2015-10-09 13:54:11 +0200127 err = switchdev_port_obj_del(dev, &v.obj);
128 if (err == -EOPNOTSUPP) {
Scott Feldman7f109532015-06-12 17:39:50 -0700129 vlan_vid_del(dev, br->vlan_proto, vid);
Jiri Pirko0944d6b2015-10-09 13:54:11 +0200130 return 0;
Scott Feldman7f109532015-06-12 17:39:50 -0700131 }
Vivien Didelotbf361ad2015-09-05 21:27:57 -0400132 return err;
Scott Feldman7f109532015-06-12 17:39:50 -0700133}
134
Nikolay Aleksandrovf8ed2892015-10-02 15:05:11 +0200135/* Returns a master vlan, if it didn't exist it gets created. In all cases a
136 * a reference is taken to the master vlan before returning.
137 */
138static struct net_bridge_vlan *br_vlan_get_master(struct net_bridge *br, u16 vid)
139{
140 struct net_bridge_vlan *masterv;
141
142 masterv = br_vlan_find(br->vlgrp, vid);
143 if (!masterv) {
144 /* missing global ctx, create it now */
145 if (br_vlan_add(br, vid, 0))
146 return NULL;
147 masterv = br_vlan_find(br->vlgrp, vid);
148 if (WARN_ON(!masterv))
149 return NULL;
150 }
151 atomic_inc(&masterv->refcnt);
152
153 return masterv;
154}
155
156static void br_vlan_put_master(struct net_bridge_vlan *masterv)
157{
158 if (!br_vlan_is_master(masterv))
159 return;
160
161 if (atomic_dec_and_test(&masterv->refcnt)) {
162 rhashtable_remove_fast(&masterv->br->vlgrp->vlan_hash,
163 &masterv->vnode, br_vlan_rht_params);
164 __vlan_del_list(masterv);
165 kfree_rcu(masterv, rcu);
166 }
167}
168
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200169/* This is the shared VLAN add function which works for both ports and bridge
170 * devices. There are four possible calls to this function in terms of the
171 * vlan entry type:
172 * 1. vlan is being added on a port (no master flags, global entry exists)
173 * 2. vlan is being added on a bridge (both master and brvlan flags)
174 * 3. vlan is being added on a port, but a global entry didn't exist which
175 * is being created right now (master flag set, brvlan flag unset), the
176 * global entry is used for global per-vlan features, but not for filtering
177 * 4. same as 3 but with both master and brvlan flags set so the entry
178 * will be used for filtering in both the port and the bridge
179 */
180static int __vlan_add(struct net_bridge_vlan *v, u16 flags)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000181{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200182 struct net_bridge_vlan *masterv = NULL;
183 struct net_bridge_port *p = NULL;
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200184 struct net_bridge_vlan_group *vg;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200185 struct net_device *dev;
186 struct net_bridge *br;
187 int err;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000188
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200189 if (br_vlan_is_master(v)) {
190 br = v->br;
191 dev = br->dev;
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200192 vg = br->vlgrp;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200193 } else {
194 p = v->port;
195 br = p->br;
196 dev = p->dev;
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200197 vg = p->vlgrp;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200198 }
Vlad Yasevich552406c2013-02-13 12:00:15 +0000199
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200200 if (p) {
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200201 /* Add VLAN to the device filter if it is supported.
202 * This ensures tagged traffic enters the bridge when
203 * promiscuous mode is disabled by br_manage_promisc().
204 */
205 err = __vlan_vid_add(dev, br, v->vid, flags);
Vivien Didelotbf361ad2015-09-05 21:27:57 -0400206 if (err)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200207 goto out;
208
209 /* need to work on the master vlan too */
210 if (flags & BRIDGE_VLAN_INFO_MASTER) {
Nikolay Aleksandrov2ffdf5082015-10-02 15:05:12 +0200211 err = br_vlan_add(br, v->vid, flags |
212 BRIDGE_VLAN_INFO_BRENTRY);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200213 if (err)
214 goto out_filt;
215 }
216
Nikolay Aleksandrovf8ed2892015-10-02 15:05:11 +0200217 masterv = br_vlan_get_master(br, v->vid);
218 if (!masterv)
219 goto out_filt;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200220 v->brvlan = masterv;
Toshiaki Makita8580e212014-06-10 20:59:23 +0900221 }
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000222
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200223 /* Add the dev mac and count the vlan only if it's usable */
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200224 if (br_vlan_should_use(v)) {
225 err = br_fdb_insert(br, p, dev->dev_addr, v->vid);
226 if (err) {
227 br_err(br, "failed insert local address into bridge forwarding table\n");
228 goto out_filt;
229 }
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200230 vg->num_vlans++;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000231 }
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200232
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200233 err = rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode,
234 br_vlan_rht_params);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200235 if (err)
236 goto out_fdb_insert;
237
238 __vlan_add_list(v);
239 __vlan_add_flags(v, flags);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200240out:
241 return err;
242
243out_fdb_insert:
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200244 if (br_vlan_should_use(v)) {
245 br_fdb_find_delete_local(br, p, dev->dev_addr, v->vid);
246 vg->num_vlans--;
247 }
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200248
249out_filt:
250 if (p) {
251 __vlan_vid_del(dev, br, v->vid);
252 if (masterv) {
Nikolay Aleksandrovf8ed2892015-10-02 15:05:11 +0200253 br_vlan_put_master(masterv);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200254 v->brvlan = NULL;
255 }
256 }
257
258 goto out;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000259}
260
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200261static int __vlan_del(struct net_bridge_vlan *v)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000262{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200263 struct net_bridge_vlan *masterv = v;
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200264 struct net_bridge_vlan_group *vg;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200265 struct net_bridge_port *p = NULL;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200266 int err = 0;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200267
268 if (br_vlan_is_master(v)) {
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200269 vg = v->br->vlgrp;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200270 } else {
271 p = v->port;
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200272 vg = v->port->vlgrp;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200273 masterv = v->brvlan;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200274 }
275
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200276 __vlan_delete_pvid(vg, v->vid);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200277 if (p) {
278 err = __vlan_vid_del(p->dev, p->br, v->vid);
279 if (err)
280 goto out;
281 }
282
Nikolay Aleksandrov6be144f2015-10-02 15:05:13 +0200283 if (br_vlan_should_use(v)) {
284 v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY;
285 vg->num_vlans--;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200286 }
287
288 if (masterv != v) {
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200289 rhashtable_remove_fast(&vg->vlan_hash, &v->vnode,
290 br_vlan_rht_params);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200291 __vlan_del_list(v);
292 kfree_rcu(v, rcu);
293 }
294
Nikolay Aleksandrovf8ed2892015-10-02 15:05:11 +0200295 br_vlan_put_master(masterv);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200296out:
297 return err;
298}
299
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200300static void __vlan_flush(struct net_bridge_vlan_group *vlgrp)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200301{
302 struct net_bridge_vlan *vlan, *tmp;
303
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200304 __vlan_delete_pvid(vlgrp, vlgrp->pvid);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200305 list_for_each_entry_safe(vlan, tmp, &vlgrp->vlan_list, vlist)
306 __vlan_del(vlan);
307 rhashtable_destroy(&vlgrp->vlan_hash);
308 kfree(vlgrp);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000309}
310
Vlad Yasevich78851982013-02-13 12:00:14 +0000311struct sk_buff *br_handle_vlan(struct net_bridge *br,
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200312 struct net_bridge_vlan_group *vg,
Vlad Yasevich78851982013-02-13 12:00:14 +0000313 struct sk_buff *skb)
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000314{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200315 struct net_bridge_vlan *v;
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000316 u16 vid;
317
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400318 /* If this packet was not filtered at input, let it pass */
319 if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
Vlad Yasevich78851982013-02-13 12:00:14 +0000320 goto out;
321
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200322 /* At this point, we know that the frame was filtered and contains
323 * a valid vlan id. If the vlan id has untagged flag set,
324 * send untagged; otherwise, send tagged.
325 */
326 br_vlan_get_tag(skb, &vid);
327 v = br_vlan_find(vg, vid);
328 /* Vlan entry must be configured at this point. The
Vlad Yasevichfc92f742014-03-27 21:51:18 -0400329 * only exception is the bridge is set in promisc mode and the
330 * packet is destined for the bridge device. In this case
331 * pass the packet as is.
332 */
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200333 if (!v || !br_vlan_should_use(v)) {
Vlad Yasevichfc92f742014-03-27 21:51:18 -0400334 if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
335 goto out;
336 } else {
337 kfree_skb(skb);
338 return NULL;
339 }
340 }
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200341 if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)
Toshiaki Makita99b192d2014-03-27 21:46:56 +0900342 skb->vlan_tci = 0;
Vlad Yasevich78851982013-02-13 12:00:14 +0000343
344out:
345 return skb;
346}
347
348/* Called under RCU */
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200349static bool __allowed_ingress(struct net_bridge_vlan_group *vg, __be16 proto,
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200350 struct sk_buff *skb, u16 *vid)
Vlad Yasevich78851982013-02-13 12:00:14 +0000351{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200352 const struct net_bridge_vlan *v;
Toshiaki Makita8580e212014-06-10 20:59:23 +0900353 bool tagged;
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000354
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400355 BR_INPUT_SKB_CB(skb)->vlan_filtered = true;
Toshiaki Makita12464bb2014-03-27 21:46:55 +0900356 /* If vlan tx offload is disabled on bridge device and frame was
357 * sent from vlan device on the bridge device, it does not have
358 * HW accelerated vlan tag.
359 */
Jiri Pirkodf8a39d2015-01-13 17:13:44 +0100360 if (unlikely(!skb_vlan_tag_present(skb) &&
Toshiaki Makita8580e212014-06-10 20:59:23 +0900361 skb->protocol == proto)) {
Vlad Yasevich0d5501c2014-08-08 14:42:13 -0400362 skb = skb_vlan_untag(skb);
Toshiaki Makita12464bb2014-03-27 21:46:55 +0900363 if (unlikely(!skb))
364 return false;
365 }
366
Toshiaki Makita8580e212014-06-10 20:59:23 +0900367 if (!br_vlan_get_tag(skb, vid)) {
368 /* Tagged frame */
369 if (skb->vlan_proto != proto) {
370 /* Protocol-mismatch, empty out vlan_tci for new tag */
371 skb_push(skb, ETH_HLEN);
Jiri Pirko62749e22014-11-19 14:04:58 +0100372 skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto,
Jiri Pirkodf8a39d2015-01-13 17:13:44 +0100373 skb_vlan_tag_get(skb));
Toshiaki Makita8580e212014-06-10 20:59:23 +0900374 if (unlikely(!skb))
375 return false;
376
377 skb_pull(skb, ETH_HLEN);
378 skb_reset_mac_len(skb);
379 *vid = 0;
380 tagged = false;
381 } else {
382 tagged = true;
383 }
384 } else {
385 /* Untagged frame */
386 tagged = false;
387 }
388
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900389 if (!*vid) {
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200390 u16 pvid = br_get_pvid(vg);
391
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900392 /* Frame had a tag with VID 0 or did not have a tag.
393 * See if pvid is set on this port. That tells us which
394 * vlan untagged or priority-tagged traffic belongs to.
Vlad Yasevich78851982013-02-13 12:00:14 +0000395 */
Vlad Yasevich3df6bf42014-10-03 11:29:17 -0400396 if (!pvid)
Toshiaki Makitaeb707612014-04-09 17:00:30 +0900397 goto drop;
Vlad Yasevich78851982013-02-13 12:00:14 +0000398
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900399 /* PVID is set on this port. Any untagged or priority-tagged
400 * ingress frame is considered to belong to this vlan.
Vlad Yasevich78851982013-02-13 12:00:14 +0000401 */
Toshiaki Makitadfb5fa32013-10-16 17:07:16 +0900402 *vid = pvid;
Toshiaki Makita8580e212014-06-10 20:59:23 +0900403 if (likely(!tagged))
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900404 /* Untagged Frame. */
Toshiaki Makita8580e212014-06-10 20:59:23 +0900405 __vlan_hwaccel_put_tag(skb, proto, pvid);
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900406 else
407 /* Priority-tagged Frame.
408 * At this point, We know that skb->vlan_tci had
409 * VLAN_TAG_PRESENT bit and its VID field was 0x000.
410 * We update only VID field and preserve PCP field.
411 */
412 skb->vlan_tci |= pvid;
413
Vlad Yasevich78851982013-02-13 12:00:14 +0000414 return true;
415 }
416
417 /* Frame had a valid vlan tag. See if vlan is allowed */
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200418 v = br_vlan_find(vg, *vid);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200419 if (v && br_vlan_should_use(v))
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000420 return true;
Toshiaki Makitaeb707612014-04-09 17:00:30 +0900421drop:
422 kfree_skb(skb);
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000423 return false;
424}
425
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200426bool br_allowed_ingress(const struct net_bridge *br,
427 struct net_bridge_vlan_group *vg, struct sk_buff *skb,
428 u16 *vid)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200429{
430 /* If VLAN filtering is disabled on the bridge, all packets are
431 * permitted.
432 */
433 if (!br->vlan_enabled) {
434 BR_INPUT_SKB_CB(skb)->vlan_filtered = false;
435 return true;
436 }
437
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200438 return __allowed_ingress(vg, br->vlan_proto, skb, vid);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200439}
440
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000441/* Called under RCU. */
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200442bool br_allowed_egress(struct net_bridge_vlan_group *vg,
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000443 const struct sk_buff *skb)
444{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200445 const struct net_bridge_vlan *v;
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000446 u16 vid;
447
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400448 /* If this packet was not filtered at input, let it pass */
449 if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000450 return true;
451
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000452 br_vlan_get_tag(skb, &vid);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200453 v = br_vlan_find(vg, vid);
454 if (v && br_vlan_should_use(v))
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000455 return true;
456
457 return false;
458}
459
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900460/* Called under RCU */
461bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
462{
Nikolay Aleksandrov468e7942015-09-30 20:16:52 +0200463 struct net_bridge_vlan_group *vg;
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900464 struct net_bridge *br = p->br;
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900465
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400466 /* If filtering was disabled at input, let it pass. */
Vlad Yasevichc095f242014-09-15 15:24:26 -0400467 if (!br->vlan_enabled)
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900468 return true;
469
Nikolay Aleksandrov468e7942015-09-30 20:16:52 +0200470 vg = p->vlgrp;
471 if (!vg || !vg->num_vlans)
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900472 return false;
473
Toshiaki Makita8580e212014-06-10 20:59:23 +0900474 if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
475 *vid = 0;
476
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900477 if (!*vid) {
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200478 *vid = br_get_pvid(vg);
Vlad Yasevich3df6bf42014-10-03 11:29:17 -0400479 if (!*vid)
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900480 return false;
481
482 return true;
483 }
484
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200485 if (br_vlan_find(vg, *vid))
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900486 return true;
487
488 return false;
489}
490
Toshiaki Makita8adff412013-10-16 17:07:13 +0900491/* Must be protected by RTNL.
492 * Must be called with vid in range from 1 to 4094 inclusive.
493 */
Vlad Yasevich552406c2013-02-13 12:00:15 +0000494int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000495{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200496 struct net_bridge_vlan *vlan;
497 int ret;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000498
499 ASSERT_RTNL();
500
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200501 vlan = br_vlan_find(br->vlgrp, vid);
502 if (vlan) {
503 if (!br_vlan_is_brentry(vlan)) {
504 /* Trying to change flags of non-existent bridge vlan */
505 if (!(flags & BRIDGE_VLAN_INFO_BRENTRY))
506 return -EINVAL;
507 /* It was only kept for port vlans, now make it real */
508 ret = br_fdb_insert(br, NULL, br->dev->dev_addr,
509 vlan->vid);
510 if (ret) {
511 br_err(br, "failed insert local address into bridge forwarding table\n");
512 return ret;
513 }
514 atomic_inc(&vlan->refcnt);
515 vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY;
516 br->vlgrp->num_vlans++;
517 }
518 __vlan_add_flags(vlan, flags);
519 return 0;
520 }
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000521
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200522 vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
523 if (!vlan)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000524 return -ENOMEM;
525
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200526 vlan->vid = vid;
527 vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER;
528 vlan->flags &= ~BRIDGE_VLAN_INFO_PVID;
529 vlan->br = br;
530 if (flags & BRIDGE_VLAN_INFO_BRENTRY)
531 atomic_set(&vlan->refcnt, 1);
532 ret = __vlan_add(vlan, flags);
533 if (ret)
534 kfree(vlan);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000535
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200536 return ret;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000537}
538
Toshiaki Makita8adff412013-10-16 17:07:13 +0900539/* Must be protected by RTNL.
540 * Must be called with vid in range from 1 to 4094 inclusive.
541 */
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000542int br_vlan_delete(struct net_bridge *br, u16 vid)
543{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200544 struct net_bridge_vlan *v;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000545
546 ASSERT_RTNL();
547
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200548 v = br_vlan_find(br->vlgrp, vid);
549 if (!v || !br_vlan_is_brentry(v))
550 return -ENOENT;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000551
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900552 br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
Roopa Prabhu37418732015-10-08 10:38:52 -0700553 br_fdb_delete_by_port(br, NULL, vid, 0);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000554
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200555 return __vlan_del(v);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000556}
557
558void br_vlan_flush(struct net_bridge *br)
559{
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000560 ASSERT_RTNL();
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000561
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200562 __vlan_flush(br_vlan_group(br));
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000563}
564
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200565struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid)
Toshiaki Makita2b292fb2014-02-07 16:48:22 +0900566{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200567 if (!vg)
568 return NULL;
Toshiaki Makita2b292fb2014-02-07 16:48:22 +0900569
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200570 return br_vlan_lookup(&vg->vlan_hash, vid);
Toshiaki Makita2b292fb2014-02-07 16:48:22 +0900571}
572
Toshiaki Makita204177f2014-06-10 20:59:25 +0900573/* Must be protected by RTNL. */
574static void recalculate_group_addr(struct net_bridge *br)
575{
576 if (br->group_addr_set)
577 return;
578
579 spin_lock_bh(&br->lock);
580 if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
581 /* Bridge Group Address */
582 br->group_addr[5] = 0x00;
583 } else { /* vlan_enabled && ETH_P_8021AD */
584 /* Provider Bridge Group Address */
585 br->group_addr[5] = 0x08;
586 }
587 spin_unlock_bh(&br->lock);
588}
589
590/* Must be protected by RTNL. */
591void br_recalculate_fwd_mask(struct net_bridge *br)
592{
593 if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
594 br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
595 else /* vlan_enabled && ETH_P_8021AD */
596 br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
597 ~(1u << br->group_addr[5]);
598}
599
Nikolay Aleksandrova7854032015-08-07 19:40:45 +0300600int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000601{
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000602 if (br->vlan_enabled == val)
Nikolay Aleksandrova7854032015-08-07 19:40:45 +0300603 return 0;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000604
605 br->vlan_enabled = val;
Vlad Yasevich2796d0c2014-05-16 09:59:20 -0400606 br_manage_promisc(br);
Toshiaki Makita204177f2014-06-10 20:59:25 +0900607 recalculate_group_addr(br);
608 br_recalculate_fwd_mask(br);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000609
Nikolay Aleksandrova7854032015-08-07 19:40:45 +0300610 return 0;
611}
612
613int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
614{
615 if (!rtnl_trylock())
616 return restart_syscall();
617
618 __br_vlan_filter_toggle(br, val);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000619 rtnl_unlock();
Nikolay Aleksandrova7854032015-08-07 19:40:45 +0300620
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000621 return 0;
622}
623
Toshiaki Makitad2d427b2015-08-27 15:32:26 +0900624int __br_vlan_set_proto(struct net_bridge *br, __be16 proto)
Toshiaki Makita204177f2014-06-10 20:59:25 +0900625{
626 int err = 0;
627 struct net_bridge_port *p;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200628 struct net_bridge_vlan *vlan;
Toshiaki Makitad2d427b2015-08-27 15:32:26 +0900629 __be16 oldproto;
Toshiaki Makita204177f2014-06-10 20:59:25 +0900630
Toshiaki Makita204177f2014-06-10 20:59:25 +0900631 if (br->vlan_proto == proto)
Toshiaki Makitad2d427b2015-08-27 15:32:26 +0900632 return 0;
Toshiaki Makita204177f2014-06-10 20:59:25 +0900633
634 /* Add VLANs for the new proto to the device filter. */
635 list_for_each_entry(p, &br->port_list, list) {
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200636 list_for_each_entry(vlan, &p->vlgrp->vlan_list, vlist) {
637 err = vlan_vid_add(p->dev, proto, vlan->vid);
Toshiaki Makita204177f2014-06-10 20:59:25 +0900638 if (err)
639 goto err_filt;
640 }
641 }
642
643 oldproto = br->vlan_proto;
644 br->vlan_proto = proto;
645
646 recalculate_group_addr(br);
647 br_recalculate_fwd_mask(br);
648
649 /* Delete VLANs for the old proto from the device filter. */
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200650 list_for_each_entry(p, &br->port_list, list)
651 list_for_each_entry(vlan, &p->vlgrp->vlan_list, vlist)
652 vlan_vid_del(p->dev, oldproto, vlan->vid);
Toshiaki Makita204177f2014-06-10 20:59:25 +0900653
Toshiaki Makitad2d427b2015-08-27 15:32:26 +0900654 return 0;
Toshiaki Makita204177f2014-06-10 20:59:25 +0900655
656err_filt:
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200657 list_for_each_entry_continue_reverse(vlan, &p->vlgrp->vlan_list, vlist)
658 vlan_vid_del(p->dev, proto, vlan->vid);
Toshiaki Makita204177f2014-06-10 20:59:25 +0900659
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200660 list_for_each_entry_continue_reverse(p, &br->port_list, list)
661 list_for_each_entry(vlan, &p->vlgrp->vlan_list, vlist)
662 vlan_vid_del(p->dev, proto, vlan->vid);
Toshiaki Makita204177f2014-06-10 20:59:25 +0900663
Toshiaki Makitad2d427b2015-08-27 15:32:26 +0900664 return err;
665}
666
667int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
668{
669 int err;
670
671 if (val != ETH_P_8021Q && val != ETH_P_8021AD)
672 return -EPROTONOSUPPORT;
673
674 if (!rtnl_trylock())
675 return restart_syscall();
676
677 err = __br_vlan_set_proto(br, htons(val));
678 rtnl_unlock();
679
680 return err;
Toshiaki Makita204177f2014-06-10 20:59:25 +0900681}
682
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200683static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 vid)
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400684{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200685 struct net_bridge_vlan *v;
686
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200687 if (vid != vg->pvid)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200688 return false;
689
690 v = br_vlan_lookup(&vg->vlan_hash, vid);
691 if (v && br_vlan_should_use(v) &&
692 (v->flags & BRIDGE_VLAN_INFO_UNTAGGED))
693 return true;
694
695 return false;
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400696}
697
698static void br_vlan_disable_default_pvid(struct net_bridge *br)
699{
700 struct net_bridge_port *p;
701 u16 pvid = br->default_pvid;
702
703 /* Disable default_pvid on all ports where it is still
704 * configured.
705 */
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200706 if (vlan_default_pvid(br->vlgrp, pvid))
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400707 br_vlan_delete(br, pvid);
708
709 list_for_each_entry(p, &br->port_list, list) {
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200710 if (vlan_default_pvid(p->vlgrp, pvid))
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400711 nbp_vlan_delete(p, pvid);
712 }
713
714 br->default_pvid = 0;
715}
716
Nikolay Aleksandrov0f963b72015-10-04 14:23:47 +0200717int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid)
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400718{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200719 const struct net_bridge_vlan *pvent;
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400720 struct net_bridge_port *p;
721 u16 old_pvid;
722 int err = 0;
723 unsigned long *changed;
724
Nikolay Aleksandrov0f963b72015-10-04 14:23:47 +0200725 if (!pvid) {
726 br_vlan_disable_default_pvid(br);
727 return 0;
728 }
729
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400730 changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long),
731 GFP_KERNEL);
732 if (!changed)
733 return -ENOMEM;
734
735 old_pvid = br->default_pvid;
736
737 /* Update default_pvid config only if we do not conflict with
738 * user configuration.
739 */
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200740 pvent = br_vlan_find(br->vlgrp, pvid);
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200741 if ((!old_pvid || vlan_default_pvid(br->vlgrp, old_pvid)) &&
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200742 (!pvent || !br_vlan_should_use(pvent))) {
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400743 err = br_vlan_add(br, pvid,
744 BRIDGE_VLAN_INFO_PVID |
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200745 BRIDGE_VLAN_INFO_UNTAGGED |
746 BRIDGE_VLAN_INFO_BRENTRY);
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400747 if (err)
748 goto out;
749 br_vlan_delete(br, old_pvid);
750 set_bit(0, changed);
751 }
752
753 list_for_each_entry(p, &br->port_list, list) {
754 /* Update default_pvid config only if we do not conflict with
755 * user configuration.
756 */
757 if ((old_pvid &&
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200758 !vlan_default_pvid(p->vlgrp, old_pvid)) ||
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200759 br_vlan_find(p->vlgrp, pvid))
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400760 continue;
761
762 err = nbp_vlan_add(p, pvid,
763 BRIDGE_VLAN_INFO_PVID |
764 BRIDGE_VLAN_INFO_UNTAGGED);
765 if (err)
766 goto err_port;
767 nbp_vlan_delete(p, old_pvid);
768 set_bit(p->port_no, changed);
769 }
770
771 br->default_pvid = pvid;
772
773out:
774 kfree(changed);
775 return err;
776
777err_port:
778 list_for_each_entry_continue_reverse(p, &br->port_list, list) {
779 if (!test_bit(p->port_no, changed))
780 continue;
781
782 if (old_pvid)
783 nbp_vlan_add(p, old_pvid,
784 BRIDGE_VLAN_INFO_PVID |
785 BRIDGE_VLAN_INFO_UNTAGGED);
786 nbp_vlan_delete(p, pvid);
787 }
788
789 if (test_bit(0, changed)) {
790 if (old_pvid)
791 br_vlan_add(br, old_pvid,
792 BRIDGE_VLAN_INFO_PVID |
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200793 BRIDGE_VLAN_INFO_UNTAGGED |
794 BRIDGE_VLAN_INFO_BRENTRY);
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400795 br_vlan_delete(br, pvid);
796 }
797 goto out;
798}
799
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400800int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val)
801{
802 u16 pvid = val;
803 int err = 0;
804
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400805 if (val >= VLAN_VID_MASK)
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400806 return -EINVAL;
807
808 if (!rtnl_trylock())
809 return restart_syscall();
810
811 if (pvid == br->default_pvid)
812 goto unlock;
813
814 /* Only allow default pvid change when filtering is disabled */
815 if (br->vlan_enabled) {
816 pr_info_once("Please disable vlan filtering to change default_pvid\n");
817 err = -EPERM;
818 goto unlock;
819 }
Nikolay Aleksandrov0f963b72015-10-04 14:23:47 +0200820 err = __br_vlan_set_default_pvid(br, pvid);
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400821unlock:
822 rtnl_unlock();
823 return err;
824}
825
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400826int br_vlan_init(struct net_bridge *br)
Toshiaki Makita8580e212014-06-10 20:59:23 +0900827{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200828 int ret = -ENOMEM;
829
830 br->vlgrp = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL);
831 if (!br->vlgrp)
832 goto out;
833 ret = rhashtable_init(&br->vlgrp->vlan_hash, &br_vlan_rht_params);
834 if (ret)
835 goto err_rhtbl;
836 INIT_LIST_HEAD(&br->vlgrp->vlan_list);
Toshiaki Makita8580e212014-06-10 20:59:23 +0900837 br->vlan_proto = htons(ETH_P_8021Q);
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400838 br->default_pvid = 1;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200839 ret = br_vlan_add(br, 1,
840 BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED |
841 BRIDGE_VLAN_INFO_BRENTRY);
842 if (ret)
843 goto err_vlan_add;
844
845out:
846 return ret;
847
848err_vlan_add:
849 rhashtable_destroy(&br->vlgrp->vlan_hash);
850err_rhtbl:
851 kfree(br->vlgrp);
852
853 goto out;
854}
855
856int nbp_vlan_init(struct net_bridge_port *p)
857{
Nikolay Aleksandrov263344e2015-09-30 20:16:54 +0200858 struct net_bridge_vlan_group *vg;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200859 int ret = -ENOMEM;
860
Nikolay Aleksandrov263344e2015-09-30 20:16:54 +0200861 vg = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL);
862 if (!vg)
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200863 goto out;
864
Nikolay Aleksandrov263344e2015-09-30 20:16:54 +0200865 ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200866 if (ret)
867 goto err_rhtbl;
Nikolay Aleksandrov263344e2015-09-30 20:16:54 +0200868 INIT_LIST_HEAD(&vg->vlan_list);
869 /* Make sure everything's committed before publishing vg */
870 smp_wmb();
871 p->vlgrp = vg;
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200872 if (p->br->default_pvid) {
873 ret = nbp_vlan_add(p, p->br->default_pvid,
874 BRIDGE_VLAN_INFO_PVID |
875 BRIDGE_VLAN_INFO_UNTAGGED);
876 if (ret)
877 goto err_vlan_add;
878 }
879out:
880 return ret;
881
882err_vlan_add:
Nikolay Aleksandrov263344e2015-09-30 20:16:54 +0200883 rhashtable_destroy(&vg->vlan_hash);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200884err_rhtbl:
Nikolay Aleksandrov263344e2015-09-30 20:16:54 +0200885 kfree(vg);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200886
887 goto out;
Toshiaki Makita8580e212014-06-10 20:59:23 +0900888}
889
Toshiaki Makita8adff412013-10-16 17:07:13 +0900890/* Must be protected by RTNL.
891 * Must be called with vid in range from 1 to 4094 inclusive.
892 */
Vlad Yasevich552406c2013-02-13 12:00:15 +0000893int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000894{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200895 struct net_bridge_vlan *vlan;
896 int ret;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000897
898 ASSERT_RTNL();
899
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200900 vlan = br_vlan_find(port->vlgrp, vid);
901 if (vlan) {
902 __vlan_add_flags(vlan, flags);
903 return 0;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000904 }
905
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200906 vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
907 if (!vlan)
908 return -ENOMEM;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000909
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200910 vlan->vid = vid;
911 vlan->port = port;
912 ret = __vlan_add(vlan, flags);
913 if (ret)
914 kfree(vlan);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000915
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200916 return ret;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000917}
918
Toshiaki Makita8adff412013-10-16 17:07:13 +0900919/* Must be protected by RTNL.
920 * Must be called with vid in range from 1 to 4094 inclusive.
921 */
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000922int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
923{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200924 struct net_bridge_vlan *v;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000925
926 ASSERT_RTNL();
927
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200928 v = br_vlan_find(port->vlgrp, vid);
929 if (!v)
930 return -ENOENT;
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900931 br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
Nikolay Aleksandrov1ea2d022015-06-23 05:28:16 -0700932 br_fdb_delete_by_port(port->br, port, vid, 0);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000933
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200934 return __vlan_del(v);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000935}
936
937void nbp_vlan_flush(struct net_bridge_port *port)
938{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200939 struct net_bridge_vlan *vlan;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000940
941 ASSERT_RTNL();
942
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200943 list_for_each_entry(vlan, &port->vlgrp->vlan_list, vlist)
944 vlan_vid_del(port->dev, port->br->vlan_proto, vlan->vid);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000945
Nikolay Aleksandrov77751ee2015-09-30 20:16:53 +0200946 __vlan_flush(nbp_vlan_group(port));
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400947}