blob: 13013fe8db246d2002944d25b61f4db612116d52 [file] [log] [blame]
Vlad Yasevich243a2e62013-02-13 12:00:09 +00001#include <linux/kernel.h>
2#include <linux/netdevice.h>
3#include <linux/rtnetlink.h>
4#include <linux/slab.h>
5
6#include "br_private.h"
7
Vlad Yasevich552406c2013-02-13 12:00:15 +00008static void __vlan_add_pvid(struct net_port_vlans *v, u16 vid)
9{
10 if (v->pvid == vid)
11 return;
12
13 smp_wmb();
14 v->pvid = vid;
15}
16
17static void __vlan_delete_pvid(struct net_port_vlans *v, u16 vid)
18{
19 if (v->pvid != vid)
20 return;
21
22 smp_wmb();
23 v->pvid = 0;
24}
25
Vlad Yasevich35e03f32013-02-13 12:00:20 +000026static void __vlan_add_flags(struct net_port_vlans *v, u16 vid, u16 flags)
27{
28 if (flags & BRIDGE_VLAN_INFO_PVID)
29 __vlan_add_pvid(v, vid);
Vlad Yasevich635126b2014-09-12 16:26:17 -040030 else
31 __vlan_delete_pvid(v, vid);
Vlad Yasevich35e03f32013-02-13 12:00:20 +000032
33 if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
34 set_bit(vid, v->untagged_bitmap);
Vlad Yasevich635126b2014-09-12 16:26:17 -040035 else
36 clear_bit(vid, v->untagged_bitmap);
Vlad Yasevich35e03f32013-02-13 12:00:20 +000037}
38
Vlad Yasevich552406c2013-02-13 12:00:15 +000039static int __vlan_add(struct net_port_vlans *v, u16 vid, u16 flags)
Vlad Yasevich243a2e62013-02-13 12:00:09 +000040{
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +000041 struct net_bridge_port *p = NULL;
42 struct net_bridge *br;
43 struct net_device *dev;
Vlad Yasevich243a2e62013-02-13 12:00:09 +000044 int err;
45
Vlad Yasevich552406c2013-02-13 12:00:15 +000046 if (test_bit(vid, v->vlan_bitmap)) {
Vlad Yasevich35e03f32013-02-13 12:00:20 +000047 __vlan_add_flags(v, vid, flags);
Vlad Yasevich552406c2013-02-13 12:00:15 +000048 return 0;
49 }
Vlad Yasevich243a2e62013-02-13 12:00:09 +000050
Toshiaki Makita8adff412013-10-16 17:07:13 +090051 if (v->port_idx) {
52 p = v->parent.port;
53 br = p->br;
54 dev = p->dev;
55 } else {
56 br = v->parent.br;
57 dev = br->dev;
58 }
Vlad Yasevich243a2e62013-02-13 12:00:09 +000059
Toshiaki Makita19236832013-11-13 17:26:12 +090060 if (p) {
Toshiaki Makita8adff412013-10-16 17:07:13 +090061 /* Add VLAN to the device filter if it is supported.
Toshiaki Makitafdb0a662014-08-05 15:57:15 +090062 * This ensures tagged traffic enters the bridge when
63 * promiscuous mode is disabled by br_manage_promisc().
Toshiaki Makita8adff412013-10-16 17:07:13 +090064 */
Toshiaki Makita8580e212014-06-10 20:59:23 +090065 err = vlan_vid_add(dev, br->vlan_proto, vid);
Toshiaki Makita8adff412013-10-16 17:07:13 +090066 if (err)
67 return err;
68 }
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +000069
Toshiaki Makita8adff412013-10-16 17:07:13 +090070 err = br_fdb_insert(br, p, dev->dev_addr, vid);
71 if (err) {
72 br_err(br, "failed insert local address into bridge "
73 "forwarding table\n");
74 goto out_filt;
Vlad Yasevich243a2e62013-02-13 12:00:09 +000075 }
76
77 set_bit(vid, v->vlan_bitmap);
Vlad Yasevich6cbdcee2013-02-13 12:00:13 +000078 v->num_vlans++;
Vlad Yasevich35e03f32013-02-13 12:00:20 +000079 __vlan_add_flags(v, vid, flags);
Vlad Yasevich552406c2013-02-13 12:00:15 +000080
Vlad Yasevich243a2e62013-02-13 12:00:09 +000081 return 0;
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +000082
83out_filt:
Toshiaki Makita19236832013-11-13 17:26:12 +090084 if (p)
Toshiaki Makita8580e212014-06-10 20:59:23 +090085 vlan_vid_del(dev, br->vlan_proto, vid);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +000086 return err;
Vlad Yasevich243a2e62013-02-13 12:00:09 +000087}
88
89static int __vlan_del(struct net_port_vlans *v, u16 vid)
90{
91 if (!test_bit(vid, v->vlan_bitmap))
92 return -EINVAL;
93
Vlad Yasevich552406c2013-02-13 12:00:15 +000094 __vlan_delete_pvid(v, vid);
Vlad Yasevich35e03f32013-02-13 12:00:20 +000095 clear_bit(vid, v->untagged_bitmap);
Vlad Yasevich552406c2013-02-13 12:00:15 +000096
Toshiaki Makita8580e212014-06-10 20:59:23 +090097 if (v->port_idx) {
98 struct net_bridge_port *p = v->parent.port;
99 vlan_vid_del(p->dev, p->br->vlan_proto, vid);
100 }
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000101
102 clear_bit(vid, v->vlan_bitmap);
Vlad Yasevich6cbdcee2013-02-13 12:00:13 +0000103 v->num_vlans--;
Toshiaki Makitaef40b7e2013-08-20 17:10:18 +0900104 if (bitmap_empty(v->vlan_bitmap, VLAN_N_VID)) {
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000105 if (v->port_idx)
Monam Agarwalcd187212014-03-24 00:41:13 +0530106 RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000107 else
Monam Agarwalcd187212014-03-24 00:41:13 +0530108 RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000109 kfree_rcu(v, rcu);
110 }
111 return 0;
112}
113
114static void __vlan_flush(struct net_port_vlans *v)
115{
Vlad Yasevich552406c2013-02-13 12:00:15 +0000116 smp_wmb();
117 v->pvid = 0;
Toshiaki Makitaef40b7e2013-08-20 17:10:18 +0900118 bitmap_zero(v->vlan_bitmap, VLAN_N_VID);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000119 if (v->port_idx)
Monam Agarwalcd187212014-03-24 00:41:13 +0530120 RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000121 else
Monam Agarwalcd187212014-03-24 00:41:13 +0530122 RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000123 kfree_rcu(v, rcu);
124}
125
Vlad Yasevich78851982013-02-13 12:00:14 +0000126struct sk_buff *br_handle_vlan(struct net_bridge *br,
127 const struct net_port_vlans *pv,
128 struct sk_buff *skb)
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000129{
130 u16 vid;
131
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400132 /* If this packet was not filtered at input, let it pass */
133 if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
Vlad Yasevich78851982013-02-13 12:00:14 +0000134 goto out;
135
Vlad Yasevichfc92f742014-03-27 21:51:18 -0400136 /* Vlan filter table must be configured at this point. The
137 * only exception is the bridge is set in promisc mode and the
138 * packet is destined for the bridge device. In this case
139 * pass the packet as is.
140 */
141 if (!pv) {
142 if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
143 goto out;
144 } else {
145 kfree_skb(skb);
146 return NULL;
147 }
148 }
149
Vlad Yasevich78851982013-02-13 12:00:14 +0000150 /* At this point, we know that the frame was filtered and contains
Vlad Yasevich35e03f32013-02-13 12:00:20 +0000151 * a valid vlan id. If the vlan id is set in the untagged bitmap,
tanxiaojun1a81a2e2013-12-16 21:32:46 +0800152 * send untagged; otherwise, send tagged.
Vlad Yasevich78851982013-02-13 12:00:14 +0000153 */
154 br_vlan_get_tag(skb, &vid);
Vlad Yasevich35e03f32013-02-13 12:00:20 +0000155 if (test_bit(vid, pv->untagged_bitmap))
Toshiaki Makita99b192d2014-03-27 21:46:56 +0900156 skb->vlan_tci = 0;
Vlad Yasevich78851982013-02-13 12:00:14 +0000157
158out:
159 return skb;
160}
161
162/* Called under RCU */
163bool br_allowed_ingress(struct net_bridge *br, struct net_port_vlans *v,
164 struct sk_buff *skb, u16 *vid)
165{
Toshiaki Makita8580e212014-06-10 20:59:23 +0900166 bool tagged;
167 __be16 proto;
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900168
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000169 /* If VLAN filtering is disabled on the bridge, all packets are
170 * permitted.
171 */
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400172 if (!br->vlan_enabled) {
173 BR_INPUT_SKB_CB(skb)->vlan_filtered = false;
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000174 return true;
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400175 }
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000176
177 /* If there are no vlan in the permitted list, all packets are
178 * rejected.
179 */
180 if (!v)
Toshiaki Makitaeb707612014-04-09 17:00:30 +0900181 goto drop;
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000182
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400183 BR_INPUT_SKB_CB(skb)->vlan_filtered = true;
Toshiaki Makita8580e212014-06-10 20:59:23 +0900184 proto = br->vlan_proto;
185
Toshiaki Makita12464bb2014-03-27 21:46:55 +0900186 /* If vlan tx offload is disabled on bridge device and frame was
187 * sent from vlan device on the bridge device, it does not have
188 * HW accelerated vlan tag.
189 */
Jiri Pirkodf8a39d2015-01-13 17:13:44 +0100190 if (unlikely(!skb_vlan_tag_present(skb) &&
Toshiaki Makita8580e212014-06-10 20:59:23 +0900191 skb->protocol == proto)) {
Vlad Yasevich0d5501c2014-08-08 14:42:13 -0400192 skb = skb_vlan_untag(skb);
Toshiaki Makita12464bb2014-03-27 21:46:55 +0900193 if (unlikely(!skb))
194 return false;
195 }
196
Toshiaki Makita8580e212014-06-10 20:59:23 +0900197 if (!br_vlan_get_tag(skb, vid)) {
198 /* Tagged frame */
199 if (skb->vlan_proto != proto) {
200 /* Protocol-mismatch, empty out vlan_tci for new tag */
201 skb_push(skb, ETH_HLEN);
Jiri Pirko62749e22014-11-19 14:04:58 +0100202 skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto,
Jiri Pirkodf8a39d2015-01-13 17:13:44 +0100203 skb_vlan_tag_get(skb));
Toshiaki Makita8580e212014-06-10 20:59:23 +0900204 if (unlikely(!skb))
205 return false;
206
207 skb_pull(skb, ETH_HLEN);
208 skb_reset_mac_len(skb);
209 *vid = 0;
210 tagged = false;
211 } else {
212 tagged = true;
213 }
214 } else {
215 /* Untagged frame */
216 tagged = false;
217 }
218
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900219 if (!*vid) {
Vlad Yasevich78851982013-02-13 12:00:14 +0000220 u16 pvid = br_get_pvid(v);
221
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900222 /* Frame had a tag with VID 0 or did not have a tag.
223 * See if pvid is set on this port. That tells us which
224 * vlan untagged or priority-tagged traffic belongs to.
Vlad Yasevich78851982013-02-13 12:00:14 +0000225 */
Vlad Yasevich3df6bf42014-10-03 11:29:17 -0400226 if (!pvid)
Toshiaki Makitaeb707612014-04-09 17:00:30 +0900227 goto drop;
Vlad Yasevich78851982013-02-13 12:00:14 +0000228
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900229 /* PVID is set on this port. Any untagged or priority-tagged
230 * ingress frame is considered to belong to this vlan.
Vlad Yasevich78851982013-02-13 12:00:14 +0000231 */
Toshiaki Makitadfb5fa32013-10-16 17:07:16 +0900232 *vid = pvid;
Toshiaki Makita8580e212014-06-10 20:59:23 +0900233 if (likely(!tagged))
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900234 /* Untagged Frame. */
Toshiaki Makita8580e212014-06-10 20:59:23 +0900235 __vlan_hwaccel_put_tag(skb, proto, pvid);
Toshiaki Makitab90356ce2013-10-16 17:07:14 +0900236 else
237 /* Priority-tagged Frame.
238 * At this point, We know that skb->vlan_tci had
239 * VLAN_TAG_PRESENT bit and its VID field was 0x000.
240 * We update only VID field and preserve PCP field.
241 */
242 skb->vlan_tci |= pvid;
243
Vlad Yasevich78851982013-02-13 12:00:14 +0000244 return true;
245 }
246
247 /* Frame had a valid vlan tag. See if vlan is allowed */
248 if (test_bit(*vid, v->vlan_bitmap))
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000249 return true;
Toshiaki Makitaeb707612014-04-09 17:00:30 +0900250drop:
251 kfree_skb(skb);
Vlad Yasevicha37b85c2013-02-13 12:00:10 +0000252 return false;
253}
254
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000255/* Called under RCU. */
256bool br_allowed_egress(struct net_bridge *br,
257 const struct net_port_vlans *v,
258 const struct sk_buff *skb)
259{
260 u16 vid;
261
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400262 /* If this packet was not filtered at input, let it pass */
263 if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
Vlad Yasevich85f46c62013-02-13 12:00:11 +0000264 return true;
265
266 if (!v)
267 return false;
268
269 br_vlan_get_tag(skb, &vid);
270 if (test_bit(vid, v->vlan_bitmap))
271 return true;
272
273 return false;
274}
275
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900276/* Called under RCU */
277bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
278{
279 struct net_bridge *br = p->br;
280 struct net_port_vlans *v;
281
Vlad Yasevich20adfa12014-09-12 16:26:16 -0400282 /* If filtering was disabled at input, let it pass. */
Vlad Yasevichc095f242014-09-15 15:24:26 -0400283 if (!br->vlan_enabled)
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900284 return true;
285
286 v = rcu_dereference(p->vlan_info);
287 if (!v)
288 return false;
289
Toshiaki Makita8580e212014-06-10 20:59:23 +0900290 if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
291 *vid = 0;
292
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900293 if (!*vid) {
294 *vid = br_get_pvid(v);
Vlad Yasevich3df6bf42014-10-03 11:29:17 -0400295 if (!*vid)
Toshiaki Makitae0d79682014-05-26 15:15:53 +0900296 return false;
297
298 return true;
299 }
300
301 if (test_bit(*vid, v->vlan_bitmap))
302 return true;
303
304 return false;
305}
306
Toshiaki Makita8adff412013-10-16 17:07:13 +0900307/* Must be protected by RTNL.
308 * Must be called with vid in range from 1 to 4094 inclusive.
309 */
Vlad Yasevich552406c2013-02-13 12:00:15 +0000310int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000311{
312 struct net_port_vlans *pv = NULL;
313 int err;
314
315 ASSERT_RTNL();
316
317 pv = rtnl_dereference(br->vlan_info);
318 if (pv)
Vlad Yasevich552406c2013-02-13 12:00:15 +0000319 return __vlan_add(pv, vid, flags);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000320
321 /* Create port vlan infomration
322 */
323 pv = kzalloc(sizeof(*pv), GFP_KERNEL);
324 if (!pv)
325 return -ENOMEM;
326
327 pv->parent.br = br;
Vlad Yasevich552406c2013-02-13 12:00:15 +0000328 err = __vlan_add(pv, vid, flags);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000329 if (err)
330 goto out;
331
332 rcu_assign_pointer(br->vlan_info, pv);
333 return 0;
334out:
335 kfree(pv);
336 return err;
337}
338
Toshiaki Makita8adff412013-10-16 17:07:13 +0900339/* Must be protected by RTNL.
340 * Must be called with vid in range from 1 to 4094 inclusive.
341 */
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000342int br_vlan_delete(struct net_bridge *br, u16 vid)
343{
344 struct net_port_vlans *pv;
345
346 ASSERT_RTNL();
347
348 pv = rtnl_dereference(br->vlan_info);
349 if (!pv)
350 return -EINVAL;
351
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900352 br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000353
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000354 __vlan_del(pv, vid);
355 return 0;
356}
357
358void br_vlan_flush(struct net_bridge *br)
359{
360 struct net_port_vlans *pv;
361
362 ASSERT_RTNL();
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000363 pv = rtnl_dereference(br->vlan_info);
364 if (!pv)
365 return;
366
367 __vlan_flush(pv);
368}
369
Toshiaki Makita2b292fb2014-02-07 16:48:22 +0900370bool br_vlan_find(struct net_bridge *br, u16 vid)
371{
372 struct net_port_vlans *pv;
373 bool found = false;
374
375 rcu_read_lock();
376 pv = rcu_dereference(br->vlan_info);
377
378 if (!pv)
379 goto out;
380
381 if (test_bit(vid, pv->vlan_bitmap))
382 found = true;
383
384out:
385 rcu_read_unlock();
386 return found;
387}
388
Toshiaki Makita204177f2014-06-10 20:59:25 +0900389/* Must be protected by RTNL. */
390static void recalculate_group_addr(struct net_bridge *br)
391{
392 if (br->group_addr_set)
393 return;
394
395 spin_lock_bh(&br->lock);
396 if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
397 /* Bridge Group Address */
398 br->group_addr[5] = 0x00;
399 } else { /* vlan_enabled && ETH_P_8021AD */
400 /* Provider Bridge Group Address */
401 br->group_addr[5] = 0x08;
402 }
403 spin_unlock_bh(&br->lock);
404}
405
406/* Must be protected by RTNL. */
407void br_recalculate_fwd_mask(struct net_bridge *br)
408{
409 if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
410 br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
411 else /* vlan_enabled && ETH_P_8021AD */
412 br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
413 ~(1u << br->group_addr[5]);
414}
415
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000416int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
417{
418 if (!rtnl_trylock())
419 return restart_syscall();
420
421 if (br->vlan_enabled == val)
422 goto unlock;
423
424 br->vlan_enabled = val;
Vlad Yasevich2796d0c2014-05-16 09:59:20 -0400425 br_manage_promisc(br);
Toshiaki Makita204177f2014-06-10 20:59:25 +0900426 recalculate_group_addr(br);
427 br_recalculate_fwd_mask(br);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000428
429unlock:
430 rtnl_unlock();
431 return 0;
432}
433
Toshiaki Makita204177f2014-06-10 20:59:25 +0900434int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
435{
436 int err = 0;
437 struct net_bridge_port *p;
438 struct net_port_vlans *pv;
439 __be16 proto, oldproto;
440 u16 vid, errvid;
441
442 if (val != ETH_P_8021Q && val != ETH_P_8021AD)
443 return -EPROTONOSUPPORT;
444
445 if (!rtnl_trylock())
446 return restart_syscall();
447
448 proto = htons(val);
449 if (br->vlan_proto == proto)
450 goto unlock;
451
452 /* Add VLANs for the new proto to the device filter. */
453 list_for_each_entry(p, &br->port_list, list) {
454 pv = rtnl_dereference(p->vlan_info);
455 if (!pv)
456 continue;
457
458 for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID) {
459 err = vlan_vid_add(p->dev, proto, vid);
460 if (err)
461 goto err_filt;
462 }
463 }
464
465 oldproto = br->vlan_proto;
466 br->vlan_proto = proto;
467
468 recalculate_group_addr(br);
469 br_recalculate_fwd_mask(br);
470
471 /* Delete VLANs for the old proto from the device filter. */
472 list_for_each_entry(p, &br->port_list, list) {
473 pv = rtnl_dereference(p->vlan_info);
474 if (!pv)
475 continue;
476
477 for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
478 vlan_vid_del(p->dev, oldproto, vid);
479 }
480
481unlock:
482 rtnl_unlock();
483 return err;
484
485err_filt:
486 errvid = vid;
487 for_each_set_bit(vid, pv->vlan_bitmap, errvid)
488 vlan_vid_del(p->dev, proto, vid);
489
490 list_for_each_entry_continue_reverse(p, &br->port_list, list) {
491 pv = rtnl_dereference(p->vlan_info);
492 if (!pv)
493 continue;
494
495 for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
496 vlan_vid_del(p->dev, proto, vid);
497 }
498
499 goto unlock;
500}
501
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400502static bool vlan_default_pvid(struct net_port_vlans *pv, u16 vid)
503{
504 return pv && vid == pv->pvid && test_bit(vid, pv->untagged_bitmap);
505}
506
507static void br_vlan_disable_default_pvid(struct net_bridge *br)
508{
509 struct net_bridge_port *p;
510 u16 pvid = br->default_pvid;
511
512 /* Disable default_pvid on all ports where it is still
513 * configured.
514 */
515 if (vlan_default_pvid(br_get_vlan_info(br), pvid))
516 br_vlan_delete(br, pvid);
517
518 list_for_each_entry(p, &br->port_list, list) {
519 if (vlan_default_pvid(nbp_get_vlan_info(p), pvid))
520 nbp_vlan_delete(p, pvid);
521 }
522
523 br->default_pvid = 0;
524}
525
526static int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid)
527{
528 struct net_bridge_port *p;
529 u16 old_pvid;
530 int err = 0;
531 unsigned long *changed;
532
533 changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long),
534 GFP_KERNEL);
535 if (!changed)
536 return -ENOMEM;
537
538 old_pvid = br->default_pvid;
539
540 /* Update default_pvid config only if we do not conflict with
541 * user configuration.
542 */
543 if ((!old_pvid || vlan_default_pvid(br_get_vlan_info(br), old_pvid)) &&
544 !br_vlan_find(br, pvid)) {
545 err = br_vlan_add(br, pvid,
546 BRIDGE_VLAN_INFO_PVID |
547 BRIDGE_VLAN_INFO_UNTAGGED);
548 if (err)
549 goto out;
550 br_vlan_delete(br, old_pvid);
551 set_bit(0, changed);
552 }
553
554 list_for_each_entry(p, &br->port_list, list) {
555 /* Update default_pvid config only if we do not conflict with
556 * user configuration.
557 */
558 if ((old_pvid &&
559 !vlan_default_pvid(nbp_get_vlan_info(p), old_pvid)) ||
560 nbp_vlan_find(p, pvid))
561 continue;
562
563 err = nbp_vlan_add(p, pvid,
564 BRIDGE_VLAN_INFO_PVID |
565 BRIDGE_VLAN_INFO_UNTAGGED);
566 if (err)
567 goto err_port;
568 nbp_vlan_delete(p, old_pvid);
569 set_bit(p->port_no, changed);
570 }
571
572 br->default_pvid = pvid;
573
574out:
575 kfree(changed);
576 return err;
577
578err_port:
579 list_for_each_entry_continue_reverse(p, &br->port_list, list) {
580 if (!test_bit(p->port_no, changed))
581 continue;
582
583 if (old_pvid)
584 nbp_vlan_add(p, old_pvid,
585 BRIDGE_VLAN_INFO_PVID |
586 BRIDGE_VLAN_INFO_UNTAGGED);
587 nbp_vlan_delete(p, pvid);
588 }
589
590 if (test_bit(0, changed)) {
591 if (old_pvid)
592 br_vlan_add(br, old_pvid,
593 BRIDGE_VLAN_INFO_PVID |
594 BRIDGE_VLAN_INFO_UNTAGGED);
595 br_vlan_delete(br, pvid);
596 }
597 goto out;
598}
599
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400600int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val)
601{
602 u16 pvid = val;
603 int err = 0;
604
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400605 if (val >= VLAN_VID_MASK)
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400606 return -EINVAL;
607
608 if (!rtnl_trylock())
609 return restart_syscall();
610
611 if (pvid == br->default_pvid)
612 goto unlock;
613
614 /* Only allow default pvid change when filtering is disabled */
615 if (br->vlan_enabled) {
616 pr_info_once("Please disable vlan filtering to change default_pvid\n");
617 err = -EPERM;
618 goto unlock;
619 }
620
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400621 if (!pvid)
622 br_vlan_disable_default_pvid(br);
623 else
624 err = __br_vlan_set_default_pvid(br, pvid);
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400625
626unlock:
627 rtnl_unlock();
628 return err;
629}
630
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400631int br_vlan_init(struct net_bridge *br)
Toshiaki Makita8580e212014-06-10 20:59:23 +0900632{
633 br->vlan_proto = htons(ETH_P_8021Q);
Vlad Yasevich96a20d92014-10-03 11:29:16 -0400634 br->default_pvid = 1;
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400635 return br_vlan_add(br, 1,
636 BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED);
Toshiaki Makita8580e212014-06-10 20:59:23 +0900637}
638
Toshiaki Makita8adff412013-10-16 17:07:13 +0900639/* Must be protected by RTNL.
640 * Must be called with vid in range from 1 to 4094 inclusive.
641 */
Vlad Yasevich552406c2013-02-13 12:00:15 +0000642int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000643{
644 struct net_port_vlans *pv = NULL;
645 int err;
646
647 ASSERT_RTNL();
648
649 pv = rtnl_dereference(port->vlan_info);
650 if (pv)
Vlad Yasevich552406c2013-02-13 12:00:15 +0000651 return __vlan_add(pv, vid, flags);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000652
653 /* Create port vlan infomration
654 */
655 pv = kzalloc(sizeof(*pv), GFP_KERNEL);
656 if (!pv) {
657 err = -ENOMEM;
658 goto clean_up;
659 }
660
661 pv->port_idx = port->port_no;
662 pv->parent.port = port;
Vlad Yasevich552406c2013-02-13 12:00:15 +0000663 err = __vlan_add(pv, vid, flags);
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000664 if (err)
665 goto clean_up;
666
667 rcu_assign_pointer(port->vlan_info, pv);
668 return 0;
669
670clean_up:
671 kfree(pv);
672 return err;
673}
674
Toshiaki Makita8adff412013-10-16 17:07:13 +0900675/* Must be protected by RTNL.
676 * Must be called with vid in range from 1 to 4094 inclusive.
677 */
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000678int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
679{
680 struct net_port_vlans *pv;
681
682 ASSERT_RTNL();
683
684 pv = rtnl_dereference(port->vlan_info);
685 if (!pv)
686 return -EINVAL;
687
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900688 br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000689
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000690 return __vlan_del(pv, vid);
691}
692
693void nbp_vlan_flush(struct net_bridge_port *port)
694{
695 struct net_port_vlans *pv;
Toshiaki Makitadbbaf942013-11-13 17:26:13 +0900696 u16 vid;
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000697
698 ASSERT_RTNL();
699
700 pv = rtnl_dereference(port->vlan_info);
701 if (!pv)
702 return;
703
Toshiaki Makitadbbaf942013-11-13 17:26:13 +0900704 for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
Toshiaki Makita8580e212014-06-10 20:59:23 +0900705 vlan_vid_del(port->dev, port->br->vlan_proto, vid);
Toshiaki Makitadbbaf942013-11-13 17:26:13 +0900706
Vlad Yasevich243a2e62013-02-13 12:00:09 +0000707 __vlan_flush(pv);
708}
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000709
710bool nbp_vlan_find(struct net_bridge_port *port, u16 vid)
711{
712 struct net_port_vlans *pv;
713 bool found = false;
714
715 rcu_read_lock();
716 pv = rcu_dereference(port->vlan_info);
717
718 if (!pv)
719 goto out;
720
721 if (test_bit(vid, pv->vlan_bitmap))
722 found = true;
723
724out:
725 rcu_read_unlock();
726 return found;
727}
Vlad Yasevich5be5a2d2014-10-03 11:29:18 -0400728
729int nbp_vlan_init(struct net_bridge_port *p)
730{
731 return p->br->default_pvid ?
732 nbp_vlan_add(p, p->br->default_pvid,
733 BRIDGE_VLAN_INFO_PVID |
734 BRIDGE_VLAN_INFO_UNTAGGED) :
735 0;
736}