blob: a1c409cacec4e8bb298cc3a94fda55f8f02cc3cc [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Forwarding database
3 * Linux ethernet bridge
4 *
5 * Authors:
6 * Lennert Buytenhek <buytenh@gnu.org>
7 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version
11 * 2 of the License, or (at your option) any later version.
12 */
13
14#include <linux/kernel.h>
15#include <linux/init.h>
Franck Bui-Huu82524742008-05-12 21:21:05 +020016#include <linux/rculist.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/spinlock.h>
18#include <linux/times.h>
19#include <linux/netdevice.h>
20#include <linux/etherdevice.h>
21#include <linux/jhash.h>
Stephen Hemminger3f890922007-03-21 13:42:33 -070022#include <linux/random.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090023#include <linux/slab.h>
Arun Sharma600634972011-07-26 16:09:06 -070024#include <linux/atomic.h>
Stephen Hemminger3f890922007-03-21 13:42:33 -070025#include <asm/unaligned.h>
Vlad Yasevich2ba071e2013-02-13 12:00:16 +000026#include <linux/if_vlan.h>
Scott Feldmanb4ad7ba2015-06-14 11:33:11 -070027#include <net/switchdev.h>
Roopa Prabhub74fd302017-08-29 13:16:57 -070028#include <trace/events/bridge.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include "br_private.h"
30
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020031static const struct rhashtable_params br_fdb_rht_params = {
32 .head_offset = offsetof(struct net_bridge_fdb_entry, rhnode),
33 .key_offset = offsetof(struct net_bridge_fdb_entry, key),
34 .key_len = sizeof(struct net_bridge_fdb_key),
35 .automatic_shrinking = true,
36 .locks_mul = 1,
37};
38
Christoph Lametere18b8902006-12-06 20:33:20 -080039static struct kmem_cache *br_fdb_cache __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070040static int fdb_insert(struct net_bridge *br, struct net_bridge_port *source,
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +000041 const unsigned char *addr, u16 vid);
stephen hemminger31e8a49c2011-12-08 07:17:41 +000042static void fdb_notify(struct net_bridge *br,
43 const struct net_bridge_fdb_entry *, int);
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
Akinobu Mita87a596e2007-04-07 18:57:07 +090045int __init br_fdb_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -070046{
47 br_fdb_cache = kmem_cache_create("bridge_fdb_cache",
48 sizeof(struct net_bridge_fdb_entry),
49 0,
Paul Mundt20c2df82007-07-20 10:11:58 +090050 SLAB_HWCACHE_ALIGN, NULL);
Akinobu Mita87a596e2007-04-07 18:57:07 +090051 if (!br_fdb_cache)
52 return -ENOMEM;
53
Akinobu Mita87a596e2007-04-07 18:57:07 +090054 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070055}
56
Andrew Morton73afc902007-12-05 21:35:23 -080057void br_fdb_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -070058{
59 kmem_cache_destroy(br_fdb_cache);
60}
61
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020062int br_fdb_hash_init(struct net_bridge *br)
63{
64 return rhashtable_init(&br->fdb_hash_tbl, &br_fdb_rht_params);
65}
66
67void br_fdb_hash_fini(struct net_bridge *br)
68{
69 rhashtable_destroy(&br->fdb_hash_tbl);
70}
Linus Torvalds1da177e2005-04-16 15:20:36 -070071
72/* if topology_changing then use forward_delay (default 15 sec)
73 * otherwise keep longer (default 5 minutes)
74 */
Stephen Hemminger3f890922007-03-21 13:42:33 -070075static inline unsigned long hold_time(const struct net_bridge *br)
Linus Torvalds1da177e2005-04-16 15:20:36 -070076{
77 return br->topology_change ? br->forward_delay : br->ageing_time;
78}
79
Stephen Hemminger3f890922007-03-21 13:42:33 -070080static inline int has_expired(const struct net_bridge *br,
Linus Torvalds1da177e2005-04-16 15:20:36 -070081 const struct net_bridge_fdb_entry *fdb)
82{
Roopa Prabhueda7a5e2017-02-16 13:38:04 -080083 return !fdb->is_static && !fdb->added_by_external_learn &&
stephen hemminger7cd88612011-04-04 14:03:28 +000084 time_before_eq(fdb->updated + hold_time(br), jiffies);
Linus Torvalds1da177e2005-04-16 15:20:36 -070085}
86
Michał Mirosławda678292009-06-05 05:35:28 +000087static void fdb_rcu_free(struct rcu_head *head)
88{
89 struct net_bridge_fdb_entry *ent
90 = container_of(head, struct net_bridge_fdb_entry, rcu);
91 kmem_cache_free(br_fdb_cache, ent);
92}
93
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020094static struct net_bridge_fdb_entry *fdb_find_rcu(struct rhashtable *tbl,
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +010095 const unsigned char *addr,
96 __u16 vid)
97{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020098 struct net_bridge_fdb_key key;
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +010099
Nikolay Aleksandrov410b3d42017-02-13 14:59:10 +0100100 WARN_ON_ONCE(!rcu_read_lock_held());
101
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200102 key.vlan_id = vid;
103 memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100104
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200105 return rhashtable_lookup(tbl, &key, br_fdb_rht_params);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100106}
107
108/* requires bridge hash_lock */
109static struct net_bridge_fdb_entry *br_fdb_find(struct net_bridge *br,
110 const unsigned char *addr,
111 __u16 vid)
112{
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100113 struct net_bridge_fdb_entry *fdb;
114
WANG Congd12c9172017-03-16 10:32:42 -0700115 lockdep_assert_held_once(&br->hash_lock);
Nikolay Aleksandrov410b3d42017-02-13 14:59:10 +0100116
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100117 rcu_read_lock();
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200118 fdb = fdb_find_rcu(&br->fdb_hash_tbl, addr, vid);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100119 rcu_read_unlock();
120
121 return fdb;
122}
123
Petr Machata4d4fd362018-04-29 10:56:08 +0300124struct net_device *br_fdb_find_port(const struct net_device *br_dev,
125 const unsigned char *addr,
126 __u16 vid)
127{
128 struct net_bridge_fdb_entry *f;
129 struct net_device *dev = NULL;
130 struct net_bridge *br;
131
132 ASSERT_RTNL();
133
134 if (!netif_is_bridge_master(br_dev))
135 return NULL;
136
137 br = netdev_priv(br_dev);
138 f = br_fdb_find(br, addr, vid);
139 if (f && f->dst)
140 dev = f->dst->dev;
141
142 return dev;
143}
144EXPORT_SYMBOL_GPL(br_fdb_find_port);
145
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100146struct net_bridge_fdb_entry *br_fdb_find_rcu(struct net_bridge *br,
147 const unsigned char *addr,
148 __u16 vid)
149{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200150 return fdb_find_rcu(&br->fdb_hash_tbl, addr, vid);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100151}
152
Vlad Yasevich145beee2014-05-16 09:59:19 -0400153/* When a static FDB entry is added, the mac address from the entry is
154 * added to the bridge private HW address list and all required ports
155 * are then updated with the new information.
156 * Called under RTNL.
157 */
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100158static void fdb_add_hw_addr(struct net_bridge *br, const unsigned char *addr)
Vlad Yasevich145beee2014-05-16 09:59:19 -0400159{
160 int err;
Li RongQinga3f5ee72014-06-18 16:07:16 +0800161 struct net_bridge_port *p;
Vlad Yasevich145beee2014-05-16 09:59:19 -0400162
163 ASSERT_RTNL();
164
165 list_for_each_entry(p, &br->port_list, list) {
166 if (!br_promisc_port(p)) {
167 err = dev_uc_add(p->dev, addr);
168 if (err)
169 goto undo;
170 }
171 }
172
173 return;
174undo:
Li RongQinga3f5ee72014-06-18 16:07:16 +0800175 list_for_each_entry_continue_reverse(p, &br->port_list, list) {
176 if (!br_promisc_port(p))
177 dev_uc_del(p->dev, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400178 }
179}
180
181/* When a static FDB entry is deleted, the HW address from that entry is
182 * also removed from the bridge private HW address list and updates all
183 * the ports with needed information.
184 * Called under RTNL.
185 */
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100186static void fdb_del_hw_addr(struct net_bridge *br, const unsigned char *addr)
Vlad Yasevich145beee2014-05-16 09:59:19 -0400187{
188 struct net_bridge_port *p;
189
190 ASSERT_RTNL();
191
192 list_for_each_entry(p, &br->port_list, list) {
193 if (!br_promisc_port(p))
194 dev_uc_del(p->dev, addr);
195 }
196}
197
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000198static void fdb_delete(struct net_bridge *br, struct net_bridge_fdb_entry *f)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700199{
Roopa Prabhub74fd302017-08-29 13:16:57 -0700200 trace_fdb_delete(br, f);
201
Vlad Yasevich145beee2014-05-16 09:59:19 -0400202 if (f->is_static)
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200203 fdb_del_hw_addr(br, f->key.addr.addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400204
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200205 hlist_del_init_rcu(&f->fdb_node);
206 rhashtable_remove_fast(&br->fdb_hash_tbl, &f->rhnode,
207 br_fdb_rht_params);
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000208 fdb_notify(br, f, RTM_DELNEIGH);
Michał Mirosławda678292009-06-05 05:35:28 +0000209 call_rcu(&f->rcu, fdb_rcu_free);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700210}
211
Toshiaki Makita960b5892014-02-07 16:48:23 +0900212/* Delete a local entry if no other port had the same address. */
213static void fdb_delete_local(struct net_bridge *br,
214 const struct net_bridge_port *p,
215 struct net_bridge_fdb_entry *f)
216{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200217 const unsigned char *addr = f->key.addr.addr;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200218 struct net_bridge_vlan_group *vg;
219 const struct net_bridge_vlan *v;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900220 struct net_bridge_port *op;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200221 u16 vid = f->key.vlan_id;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900222
223 /* Maybe another port has same hw addr? */
224 list_for_each_entry(op, &br->port_list, list) {
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200225 vg = nbp_vlan_group(op);
Toshiaki Makita960b5892014-02-07 16:48:23 +0900226 if (op != p && ether_addr_equal(op->dev->dev_addr, addr) &&
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200227 (!vid || br_vlan_find(vg, vid))) {
Toshiaki Makita960b5892014-02-07 16:48:23 +0900228 f->dst = op;
Toshiaki Makitaa778e6d2014-02-07 16:48:24 +0900229 f->added_by_user = 0;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900230 return;
231 }
232 }
233
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200234 vg = br_vlan_group(br);
235 v = br_vlan_find(vg, vid);
Toshiaki Makita960b5892014-02-07 16:48:23 +0900236 /* Maybe bridge device has same hw addr? */
237 if (p && ether_addr_equal(br->dev->dev_addr, addr) &&
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200238 (!vid || (v && br_vlan_should_use(v)))) {
Toshiaki Makita960b5892014-02-07 16:48:23 +0900239 f->dst = NULL;
Toshiaki Makitaa778e6d2014-02-07 16:48:24 +0900240 f->added_by_user = 0;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900241 return;
242 }
243
244 fdb_delete(br, f);
245}
246
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900247void br_fdb_find_delete_local(struct net_bridge *br,
248 const struct net_bridge_port *p,
249 const unsigned char *addr, u16 vid)
250{
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900251 struct net_bridge_fdb_entry *f;
252
253 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100254 f = br_fdb_find(br, addr, vid);
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900255 if (f && f->is_local && !f->added_by_user && f->dst == p)
256 fdb_delete_local(br, p, f);
257 spin_unlock_bh(&br->hash_lock);
258}
259
Linus Torvalds1da177e2005-04-16 15:20:36 -0700260void br_fdb_changeaddr(struct net_bridge_port *p, const unsigned char *newaddr)
261{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200262 struct net_bridge_vlan_group *vg;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200263 struct net_bridge_fdb_entry *f;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264 struct net_bridge *br = p->br;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200265 struct net_bridge_vlan *v;
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900266
Linus Torvalds1da177e2005-04-16 15:20:36 -0700267 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200268 vg = nbp_vlan_group(p);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200269 hlist_for_each_entry(f, &br->fdb_list, fdb_node) {
270 if (f->dst == p && f->is_local && !f->added_by_user) {
271 /* delete old one */
272 fdb_delete_local(br, p, f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200274 /* if this port has no vlan information
275 * configured, we can safely be done at
276 * this point.
277 */
278 if (!vg || !vg->num_vlans)
279 goto insert;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700280 }
281 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700282
Toshiaki Makita28368822014-02-07 16:48:19 +0900283insert:
284 /* insert new address, may fail if invalid address or dup. */
285 fdb_insert(br, p, newaddr, 0);
286
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200287 if (!vg || !vg->num_vlans)
Toshiaki Makita28368822014-02-07 16:48:19 +0900288 goto done;
289
290 /* Now add entries for every VLAN configured on the port.
291 * This function runs under RTNL so the bitmap will not change
292 * from under us.
293 */
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200294 list_for_each_entry(v, &vg->vlan_list, vlist)
295 fdb_insert(br, p, newaddr, v->vid);
Toshiaki Makita28368822014-02-07 16:48:19 +0900296
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000297done:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298 spin_unlock_bh(&br->hash_lock);
299}
300
stephen hemminger43598812011-12-08 07:17:49 +0000301void br_fdb_change_mac_address(struct net_bridge *br, const u8 *newaddr)
302{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200303 struct net_bridge_vlan_group *vg;
stephen hemminger43598812011-12-08 07:17:49 +0000304 struct net_bridge_fdb_entry *f;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200305 struct net_bridge_vlan *v;
stephen hemminger43598812011-12-08 07:17:49 +0000306
Toshiaki Makitaac4c8862014-02-07 16:48:26 +0900307 spin_lock_bh(&br->hash_lock);
308
stephen hemminger43598812011-12-08 07:17:49 +0000309 /* If old entry was unassociated with any port, then delete it. */
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100310 f = br_fdb_find(br, br->dev->dev_addr, 0);
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900311 if (f && f->is_local && !f->dst && !f->added_by_user)
Toshiaki Makita960b5892014-02-07 16:48:23 +0900312 fdb_delete_local(br, NULL, f);
stephen hemminger43598812011-12-08 07:17:49 +0000313
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000314 fdb_insert(br, NULL, newaddr, 0);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200315 vg = br_vlan_group(br);
316 if (!vg || !vg->num_vlans)
317 goto out;
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000318 /* Now remove and add entries for every VLAN configured on the
319 * bridge. This function runs under RTNL so the bitmap will not
320 * change from under us.
321 */
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200322 list_for_each_entry(v, &vg->vlan_list, vlist) {
Toshiaki Makita0b148de2016-06-07 19:14:17 +0900323 if (!br_vlan_should_use(v))
324 continue;
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100325 f = br_fdb_find(br, br->dev->dev_addr, v->vid);
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900326 if (f && f->is_local && !f->dst && !f->added_by_user)
Toshiaki Makita960b5892014-02-07 16:48:23 +0900327 fdb_delete_local(br, NULL, f);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200328 fdb_insert(br, NULL, newaddr, v->vid);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000329 }
Toshiaki Makitaac4c8862014-02-07 16:48:26 +0900330out:
331 spin_unlock_bh(&br->hash_lock);
stephen hemminger43598812011-12-08 07:17:49 +0000332}
333
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100334void br_fdb_cleanup(struct work_struct *work)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700335{
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100336 struct net_bridge *br = container_of(work, struct net_bridge,
337 gc_work.work);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200338 struct net_bridge_fdb_entry *f = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700339 unsigned long delay = hold_time(br);
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100340 unsigned long work_delay = delay;
341 unsigned long now = jiffies;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700342
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200343 /* this part is tricky, in order to avoid blocking learning and
344 * consequently forwarding, we rely on rcu to delete objects with
345 * delayed freeing allowing us to continue traversing
346 */
347 rcu_read_lock();
348 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
349 unsigned long this_timer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700350
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200351 if (f->is_static || f->added_by_external_learn)
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100352 continue;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200353 this_timer = f->updated + delay;
354 if (time_after(this_timer, now)) {
355 work_delay = min(work_delay, this_timer - now);
356 } else {
357 spin_lock_bh(&br->hash_lock);
358 if (!hlist_unhashed(&f->fdb_node))
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000359 fdb_delete(br, f);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200360 spin_unlock_bh(&br->hash_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700361 }
362 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200363 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700364
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100365 /* Cleanup minimum 10 milliseconds apart */
366 work_delay = max_t(unsigned long, work_delay, msecs_to_jiffies(10));
367 mod_delayed_work(system_long_wq, &br->gc_work, work_delay);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368}
369
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700370/* Completely flush all dynamic entries in forwarding database.*/
371void br_fdb_flush(struct net_bridge *br)
372{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200373 struct net_bridge_fdb_entry *f;
374 struct hlist_node *tmp;
Stephen Hemminger1a620692006-10-12 14:45:38 -0700375
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700376 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200377 hlist_for_each_entry_safe(f, tmp, &br->fdb_list, fdb_node) {
378 if (!f->is_static)
379 fdb_delete(br, f);
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700380 }
381 spin_unlock_bh(&br->hash_lock);
382}
383
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300384/* Flush all entries referring to a specific port.
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700385 * if do_all is set also flush static entries
Nikolay Aleksandrov1ea2d022015-06-23 05:28:16 -0700386 * if vid is set delete all entries that match the vlan_id
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700387 */
Stephen Hemminger1a620692006-10-12 14:45:38 -0700388void br_fdb_delete_by_port(struct net_bridge *br,
389 const struct net_bridge_port *p,
Nikolay Aleksandrov1ea2d022015-06-23 05:28:16 -0700390 u16 vid,
Stephen Hemminger1a620692006-10-12 14:45:38 -0700391 int do_all)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700392{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200393 struct net_bridge_fdb_entry *f;
394 struct hlist_node *tmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395
396 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200397 hlist_for_each_entry_safe(f, tmp, &br->fdb_list, fdb_node) {
398 if (f->dst != p)
399 continue;
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900400
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200401 if (!do_all)
402 if (f->is_static || (vid && f->key.vlan_id != vid))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700403 continue;
404
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200405 if (f->is_local)
406 fdb_delete_local(br, p, f);
407 else
408 fdb_delete(br, f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 }
410 spin_unlock_bh(&br->hash_lock);
411}
412
Igor Maraviće6373c42011-12-12 02:58:25 +0000413#if IS_ENABLED(CONFIG_ATM_LANE)
Michał Mirosławda678292009-06-05 05:35:28 +0000414/* Interface used by ATM LANE hook to test
415 * if an addr is on some other bridge port */
416int br_fdb_test_addr(struct net_device *dev, unsigned char *addr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700417{
418 struct net_bridge_fdb_entry *fdb;
stephen hemmingerb5ed54e2010-11-15 06:38:13 +0000419 struct net_bridge_port *port;
Michał Mirosławda678292009-06-05 05:35:28 +0000420 int ret;
421
Linus Torvalds1da177e2005-04-16 15:20:36 -0700422 rcu_read_lock();
stephen hemmingerb5ed54e2010-11-15 06:38:13 +0000423 port = br_port_get_rcu(dev);
424 if (!port)
425 ret = 0;
426 else {
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100427 fdb = br_fdb_find_rcu(port->br, addr, 0);
stephen hemminger43598812011-12-08 07:17:49 +0000428 ret = fdb && fdb->dst && fdb->dst->dev != dev &&
stephen hemmingerb5ed54e2010-11-15 06:38:13 +0000429 fdb->dst->state == BR_STATE_FORWARDING;
430 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432
Michał Mirosławda678292009-06-05 05:35:28 +0000433 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434}
Michał Mirosławda678292009-06-05 05:35:28 +0000435#endif /* CONFIG_ATM_LANE */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700436
437/*
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900438 * Fill buffer with forwarding table records in
Linus Torvalds1da177e2005-04-16 15:20:36 -0700439 * the API format.
440 */
441int br_fdb_fillbuf(struct net_bridge *br, void *buf,
442 unsigned long maxnum, unsigned long skip)
443{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 struct net_bridge_fdb_entry *f;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200445 struct __fdb_entry *fe = buf;
446 int num = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447
448 memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
449
450 rcu_read_lock();
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200451 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
452 if (num >= maxnum)
453 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200455 if (has_expired(br, f))
456 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700457
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200458 /* ignore pseudo entry for local MAC address */
459 if (!f->dst)
460 continue;
stephen hemminger43598812011-12-08 07:17:49 +0000461
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200462 if (skip) {
463 --skip;
464 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200467 /* convert from internal format to API */
468 memcpy(fe->mac_addr, f->key.addr.addr, ETH_ALEN);
469
470 /* due to ABI compat need to split into hi/lo */
471 fe->port_no = f->dst->port_no;
472 fe->port_hi = f->dst->port_no >> 8;
473
474 fe->is_local = f->is_local;
475 if (!f->is_static)
476 fe->ageing_timer_value = jiffies_delta_to_clock_t(jiffies - f->updated);
477 ++fe;
478 ++num;
479 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700480 rcu_read_unlock();
481
482 return num;
483}
484
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200485static struct net_bridge_fdb_entry *fdb_create(struct net_bridge *br,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700486 struct net_bridge_port *source,
Vlad Yasevich2ba071e2013-02-13 12:00:16 +0000487 const unsigned char *addr,
Roopa Prabhub7af1472015-10-27 07:52:56 -0700488 __u16 vid,
489 unsigned char is_local,
490 unsigned char is_static)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491{
492 struct net_bridge_fdb_entry *fdb;
493
494 fdb = kmem_cache_alloc(br_fdb_cache, GFP_ATOMIC);
495 if (fdb) {
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200496 memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497 fdb->dst = source;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200498 fdb->key.vlan_id = vid;
Roopa Prabhub7af1472015-10-27 07:52:56 -0700499 fdb->is_local = is_local;
500 fdb->is_static = is_static;
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900501 fdb->added_by_user = 0;
Scott Feldmancf6b8e12014-11-28 14:34:21 +0100502 fdb->added_by_external_learn = 0;
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +0200503 fdb->offloaded = 0;
stephen hemminger7cd88612011-04-04 14:03:28 +0000504 fdb->updated = fdb->used = jiffies;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200505 if (rhashtable_lookup_insert_fast(&br->fdb_hash_tbl,
506 &fdb->rhnode,
507 br_fdb_rht_params)) {
508 kmem_cache_free(br_fdb_cache, fdb);
509 fdb = NULL;
510 } else {
511 hlist_add_head_rcu(&fdb->fdb_node, &br->fdb_list);
512 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513 }
514 return fdb;
515}
516
517static int fdb_insert(struct net_bridge *br, struct net_bridge_port *source,
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000518 const unsigned char *addr, u16 vid)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700520 struct net_bridge_fdb_entry *fdb;
521
522 if (!is_valid_ether_addr(addr))
523 return -EINVAL;
524
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100525 fdb = br_fdb_find(br, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700526 if (fdb) {
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900527 /* it is okay to have multiple ports with same
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528 * address, just use the first one.
529 */
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900530 if (fdb->is_local)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700531 return 0;
Roopa Prabhude1dfee2016-10-11 16:12:56 -0700532 br_warn(br, "adding interface %s with same address as a received packet (addr:%pM, vlan:%u)\n",
533 source ? source->dev->name : br->dev->name, addr, vid);
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000534 fdb_delete(br, fdb);
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900535 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700536
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200537 fdb = fdb_create(br, source, addr, vid, 1, 1);
stephen hemminger03e9b642011-04-04 14:03:27 +0000538 if (!fdb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539 return -ENOMEM;
540
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100541 fdb_add_hw_addr(br, addr);
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000542 fdb_notify(br, fdb, RTM_NEWNEIGH);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700543 return 0;
544}
545
stephen hemminger03e9b642011-04-04 14:03:27 +0000546/* Add entry for local address of interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700547int br_fdb_insert(struct net_bridge *br, struct net_bridge_port *source,
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000548 const unsigned char *addr, u16 vid)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700549{
550 int ret;
551
552 spin_lock_bh(&br->hash_lock);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000553 ret = fdb_insert(br, source, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700554 spin_unlock_bh(&br->hash_lock);
555 return ret;
556}
557
558void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900559 const unsigned char *addr, u16 vid, bool added_by_user)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700560{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700561 struct net_bridge_fdb_entry *fdb;
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000562 bool fdb_modified = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700563
564 /* some users want to always flood. */
565 if (hold_time(br) == 0)
566 return;
567
Stephen Hemmingerdf1c0b82007-08-30 22:15:35 -0700568 /* ignore packets unless we are using this port */
569 if (!(source->state == BR_STATE_LEARNING ||
570 source->state == BR_STATE_FORWARDING))
571 return;
572
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200573 fdb = fdb_find_rcu(&br->fdb_hash_tbl, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574 if (likely(fdb)) {
575 /* attempt to update an entry for a local interface */
576 if (unlikely(fdb->is_local)) {
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900577 if (net_ratelimit())
Roopa Prabhude1dfee2016-10-11 16:12:56 -0700578 br_warn(br, "received packet on %s with own address as source address (addr:%pM, vlan:%u)\n",
579 source->dev->name, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700580 } else {
stephen hemmingerca6d4482017-02-07 08:46:46 -0800581 unsigned long now = jiffies;
582
Linus Torvalds1da177e2005-04-16 15:20:36 -0700583 /* fastpath: update of existing entry */
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000584 if (unlikely(source != fdb->dst)) {
585 fdb->dst = source;
586 fdb_modified = true;
Arkadi Sharshevsky58073b32017-04-28 22:39:07 +0300587 /* Take over HW learned entry */
588 if (unlikely(fdb->added_by_external_learn))
589 fdb->added_by_external_learn = 0;
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000590 }
stephen hemmingerca6d4482017-02-07 08:46:46 -0800591 if (now != fdb->updated)
592 fdb->updated = now;
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900593 if (unlikely(added_by_user))
594 fdb->added_by_user = 1;
Roopa Prabhue3cfddd2017-08-30 22:18:13 -0700595 if (unlikely(fdb_modified)) {
596 trace_br_fdb_update(br, source, addr, vid, added_by_user);
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000597 fdb_notify(br, fdb, RTM_NEWNEIGH);
Roopa Prabhue3cfddd2017-08-30 22:18:13 -0700598 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700599 }
600 } else {
Stephen Hemmingerf8ae7372006-03-20 22:58:36 -0800601 spin_lock(&br->hash_lock);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200602 fdb = fdb_create(br, source, addr, vid, 0, 0);
603 if (fdb) {
604 if (unlikely(added_by_user))
605 fdb->added_by_user = 1;
606 trace_br_fdb_update(br, source, addr, vid,
607 added_by_user);
608 fdb_notify(br, fdb, RTM_NEWNEIGH);
stephen hemmingerf58ee4e2011-12-06 13:02:24 +0000609 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700610 /* else we lose race and someone else inserts
611 * it first, don't bother updating
612 */
Stephen Hemmingerf8ae7372006-03-20 22:58:36 -0800613 spin_unlock(&br->hash_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700615}
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000616
Roopa Prabhu37418732015-10-08 10:38:52 -0700617static int fdb_to_nud(const struct net_bridge *br,
618 const struct net_bridge_fdb_entry *fdb)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000619{
620 if (fdb->is_local)
621 return NUD_PERMANENT;
622 else if (fdb->is_static)
623 return NUD_NOARP;
Roopa Prabhu37418732015-10-08 10:38:52 -0700624 else if (has_expired(br, fdb))
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000625 return NUD_STALE;
626 else
627 return NUD_REACHABLE;
628}
629
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000630static int fdb_fill_info(struct sk_buff *skb, const struct net_bridge *br,
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000631 const struct net_bridge_fdb_entry *fdb,
Eric W. Biederman15e47302012-09-07 20:12:54 +0000632 u32 portid, u32 seq, int type, unsigned int flags)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000633{
634 unsigned long now = jiffies;
635 struct nda_cacheinfo ci;
636 struct nlmsghdr *nlh;
637 struct ndmsg *ndm;
638
Eric W. Biederman15e47302012-09-07 20:12:54 +0000639 nlh = nlmsg_put(skb, portid, seq, type, sizeof(*ndm), flags);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000640 if (nlh == NULL)
641 return -EMSGSIZE;
642
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000643 ndm = nlmsg_data(nlh);
644 ndm->ndm_family = AF_BRIDGE;
645 ndm->ndm_pad1 = 0;
646 ndm->ndm_pad2 = 0;
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +0200647 ndm->ndm_flags = 0;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000648 ndm->ndm_type = 0;
stephen hemminger43598812011-12-08 07:17:49 +0000649 ndm->ndm_ifindex = fdb->dst ? fdb->dst->dev->ifindex : br->dev->ifindex;
Roopa Prabhu37418732015-10-08 10:38:52 -0700650 ndm->ndm_state = fdb_to_nud(br, fdb);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000651
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +0200652 if (fdb->offloaded)
653 ndm->ndm_flags |= NTF_OFFLOADED;
654 if (fdb->added_by_external_learn)
655 ndm->ndm_flags |= NTF_EXT_LEARNED;
656
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200657 if (nla_put(skb, NDA_LLADDR, ETH_ALEN, &fdb->key.addr))
David S. Miller2eb812e2012-04-01 20:49:54 -0400658 goto nla_put_failure;
Roopa Prabhu41c389d2014-05-27 22:39:37 -0700659 if (nla_put_u32(skb, NDA_MASTER, br->dev->ifindex))
660 goto nla_put_failure;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000661 ci.ndm_used = jiffies_to_clock_t(now - fdb->used);
662 ci.ndm_confirmed = 0;
663 ci.ndm_updated = jiffies_to_clock_t(now - fdb->updated);
664 ci.ndm_refcnt = 0;
David S. Miller2eb812e2012-04-01 20:49:54 -0400665 if (nla_put(skb, NDA_CACHEINFO, sizeof(ci), &ci))
666 goto nla_put_failure;
Vlad Yasevich1690be62013-02-13 12:00:18 +0000667
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200668 if (fdb->key.vlan_id && nla_put(skb, NDA_VLAN, sizeof(u16),
669 &fdb->key.vlan_id))
Vlad Yasevich1690be62013-02-13 12:00:18 +0000670 goto nla_put_failure;
671
Johannes Berg053c0952015-01-16 22:09:00 +0100672 nlmsg_end(skb, nlh);
673 return 0;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000674
675nla_put_failure:
676 nlmsg_cancel(skb, nlh);
677 return -EMSGSIZE;
678}
679
680static inline size_t fdb_nlmsg_size(void)
681{
682 return NLMSG_ALIGN(sizeof(struct ndmsg))
683 + nla_total_size(ETH_ALEN) /* NDA_LLADDR */
Roopa Prabhu41c389d2014-05-27 22:39:37 -0700684 + nla_total_size(sizeof(u32)) /* NDA_MASTER */
Vlad Yasevich1690be62013-02-13 12:00:18 +0000685 + nla_total_size(sizeof(u16)) /* NDA_VLAN */
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000686 + nla_total_size(sizeof(struct nda_cacheinfo));
687}
688
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000689static void fdb_notify(struct net_bridge *br,
690 const struct net_bridge_fdb_entry *fdb, int type)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000691{
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000692 struct net *net = dev_net(br->dev);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000693 struct sk_buff *skb;
694 int err = -ENOBUFS;
695
Arkadi Sharshevsky6b26b512017-06-08 08:44:14 +0200696 br_switchdev_fdb_notify(fdb, type);
697
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000698 skb = nlmsg_new(fdb_nlmsg_size(), GFP_ATOMIC);
699 if (skb == NULL)
700 goto errout;
701
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000702 err = fdb_fill_info(skb, br, fdb, 0, 0, type, 0);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000703 if (err < 0) {
704 /* -EMSGSIZE implies BUG in fdb_nlmsg_size() */
705 WARN_ON(err == -EMSGSIZE);
706 kfree_skb(skb);
707 goto errout;
708 }
709 rtnl_notify(skb, net, 0, RTNLGRP_NEIGH, NULL, GFP_ATOMIC);
710 return;
711errout:
tanxiaojun87e823b2013-12-19 13:28:10 +0800712 rtnl_set_sk_err(net, RTNLGRP_NEIGH, err);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000713}
714
715/* Dump information about entries, in response to GETNEIGH */
John Fastabend77162022012-04-15 06:43:56 +0000716int br_fdb_dump(struct sk_buff *skb,
717 struct netlink_callback *cb,
718 struct net_device *dev,
Jamal Hadi Salim5d5eacb2014-07-10 07:01:58 -0400719 struct net_device *filter_dev,
Roopa Prabhud2976532016-08-30 21:56:45 -0700720 int *idx)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000721{
John Fastabend77162022012-04-15 06:43:56 +0000722 struct net_bridge *br = netdev_priv(dev);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200723 struct net_bridge_fdb_entry *f;
Roopa Prabhud2976532016-08-30 21:56:45 -0700724 int err = 0;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000725
John Fastabend77162022012-04-15 06:43:56 +0000726 if (!(dev->priv_flags & IFF_EBRIDGE))
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200727 return err;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000728
Roopa Prabhud2976532016-08-30 21:56:45 -0700729 if (!filter_dev) {
730 err = ndo_dflt_fdb_dump(skb, cb, dev, NULL, idx);
731 if (err < 0)
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200732 return err;
Roopa Prabhud2976532016-08-30 21:56:45 -0700733 }
Hubert Sokolowski6cb69742015-01-05 17:29:21 +0000734
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200735 rcu_read_lock();
736 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
737 if (*idx < cb->args[2])
738 goto skip;
739 if (filter_dev && (!f->dst || f->dst->dev != filter_dev)) {
740 if (filter_dev != dev)
John Fastabend77162022012-04-15 06:43:56 +0000741 goto skip;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200742 /* !f->dst is a special case for bridge
743 * It means the MAC belongs to the bridge
744 * Therefore need a little more filtering
745 * we only want to dump the !f->dst case
746 */
747 if (f->dst)
Hubert Sokolowski6cb69742015-01-05 17:29:21 +0000748 goto skip;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000749 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200750 if (!filter_dev && f->dst)
751 goto skip;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000752
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200753 err = fdb_fill_info(skb, br, f,
754 NETLINK_CB(cb->skb).portid,
755 cb->nlh->nlmsg_seq,
756 RTM_NEWNEIGH,
757 NLM_F_MULTI);
758 if (err < 0)
759 break;
760skip:
761 *idx += 1;
762 }
763 rcu_read_unlock();
764
Roopa Prabhud2976532016-08-30 21:56:45 -0700765 return err;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000766}
stephen hemminger36fd2b62011-04-04 14:03:31 +0000767
stephen hemminger292d1392011-11-09 18:30:08 +0000768/* Update (create or replace) forwarding database entry */
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900769static int fdb_add_entry(struct net_bridge *br, struct net_bridge_port *source,
770 const __u8 *addr, __u16 state, __u16 flags, __u16 vid)
stephen hemminger36fd2b62011-04-04 14:03:31 +0000771{
stephen hemminger36fd2b62011-04-04 14:03:31 +0000772 struct net_bridge_fdb_entry *fdb;
roopab0a397f2013-04-22 12:56:49 +0000773 bool modified = false;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000774
Wilson Kokeb8d7ba2015-05-25 06:39:31 -0700775 /* If the port cannot learn allow only local and static entries */
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900776 if (source && !(state & NUD_PERMANENT) && !(state & NUD_NOARP) &&
Wilson Kokeb8d7ba2015-05-25 06:39:31 -0700777 !(source->state == BR_STATE_LEARNING ||
778 source->state == BR_STATE_FORWARDING))
779 return -EPERM;
780
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900781 if (!source && !(state & NUD_PERMANENT)) {
782 pr_info("bridge: RTM_NEWNEIGH %s without NUD_PERMANENT\n",
783 br->dev->name);
784 return -EINVAL;
785 }
786
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100787 fdb = br_fdb_find(br, addr, vid);
stephen hemminger64af1ba2011-09-30 14:37:27 +0000788 if (fdb == NULL) {
789 if (!(flags & NLM_F_CREATE))
790 return -ENOENT;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000791
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200792 fdb = fdb_create(br, source, addr, vid, 0, 0);
stephen hemminger64af1ba2011-09-30 14:37:27 +0000793 if (!fdb)
794 return -ENOMEM;
roopab0a397f2013-04-22 12:56:49 +0000795
796 modified = true;
stephen hemminger64af1ba2011-09-30 14:37:27 +0000797 } else {
798 if (flags & NLM_F_EXCL)
799 return -EEXIST;
roopab0a397f2013-04-22 12:56:49 +0000800
801 if (fdb->dst != source) {
802 fdb->dst = source;
803 modified = true;
804 }
stephen hemminger64af1ba2011-09-30 14:37:27 +0000805 }
stephen hemminger36fd2b62011-04-04 14:03:31 +0000806
Roopa Prabhu37418732015-10-08 10:38:52 -0700807 if (fdb_to_nud(br, fdb) != state) {
Vlad Yasevich145beee2014-05-16 09:59:19 -0400808 if (state & NUD_PERMANENT) {
809 fdb->is_local = 1;
810 if (!fdb->is_static) {
811 fdb->is_static = 1;
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100812 fdb_add_hw_addr(br, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400813 }
814 } else if (state & NUD_NOARP) {
stephen hemminger292d1392011-11-09 18:30:08 +0000815 fdb->is_local = 0;
Vlad Yasevich145beee2014-05-16 09:59:19 -0400816 if (!fdb->is_static) {
817 fdb->is_static = 1;
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100818 fdb_add_hw_addr(br, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400819 }
820 } else {
821 fdb->is_local = 0;
822 if (fdb->is_static) {
823 fdb->is_static = 0;
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100824 fdb_del_hw_addr(br, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400825 }
826 }
stephen hemminger292d1392011-11-09 18:30:08 +0000827
roopab0a397f2013-04-22 12:56:49 +0000828 modified = true;
829 }
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900830 fdb->added_by_user = 1;
roopab0a397f2013-04-22 12:56:49 +0000831
832 fdb->used = jiffies;
833 if (modified) {
834 fdb->updated = jiffies;
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000835 fdb_notify(br, fdb, RTM_NEWNEIGH);
stephen hemminger292d1392011-11-09 18:30:08 +0000836 }
837
stephen hemminger36fd2b62011-04-04 14:03:31 +0000838 return 0;
839}
840
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900841static int __br_fdb_add(struct ndmsg *ndm, struct net_bridge *br,
842 struct net_bridge_port *p, const unsigned char *addr,
843 u16 nlh_flags, u16 vid)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000844{
845 int err = 0;
846
847 if (ndm->ndm_flags & NTF_USE) {
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900848 if (!p) {
849 pr_info("bridge: RTM_NEWNEIGH %s with NTF_USE is not supported\n",
850 br->dev->name);
851 return -EINVAL;
852 }
Nikolay Aleksandrovc4c832f2015-06-06 06:49:00 -0700853 local_bh_disable();
Vlad Yasevich1690be62013-02-13 12:00:18 +0000854 rcu_read_lock();
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900855 br_fdb_update(br, p, addr, vid, true);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000856 rcu_read_unlock();
Nikolay Aleksandrovc4c832f2015-06-06 06:49:00 -0700857 local_bh_enable();
Nikolay Aleksandroveb100e02017-03-23 12:27:13 +0200858 } else if (ndm->ndm_flags & NTF_EXT_LEARNED) {
859 err = br_fdb_external_learn_add(br, p, addr, vid);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000860 } else {
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900861 spin_lock_bh(&br->hash_lock);
862 err = fdb_add_entry(br, p, addr, ndm->ndm_state,
Vlad Yasevich1690be62013-02-13 12:00:18 +0000863 nlh_flags, vid);
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900864 spin_unlock_bh(&br->hash_lock);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000865 }
866
867 return err;
868}
869
stephen hemminger36fd2b62011-04-04 14:03:31 +0000870/* Add new permanent fdb entry with RTM_NEWNEIGH */
stephen hemmingeredc7d572012-10-01 12:32:33 +0000871int br_fdb_add(struct ndmsg *ndm, struct nlattr *tb[],
872 struct net_device *dev,
Jiri Pirkof6f64242014-11-28 14:34:15 +0100873 const unsigned char *addr, u16 vid, u16 nlh_flags)
stephen hemminger36fd2b62011-04-04 14:03:31 +0000874{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200875 struct net_bridge_vlan_group *vg;
Roopa Prabhu37418732015-10-08 10:38:52 -0700876 struct net_bridge_port *p = NULL;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200877 struct net_bridge_vlan *v;
Roopa Prabhu37418732015-10-08 10:38:52 -0700878 struct net_bridge *br = NULL;
John Fastabend77162022012-04-15 06:43:56 +0000879 int err = 0;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000880
Roopa Prabhub74fd302017-08-29 13:16:57 -0700881 trace_br_fdb_add(ndm, dev, addr, vid, nlh_flags);
882
stephen hemminger292d1392011-11-09 18:30:08 +0000883 if (!(ndm->ndm_state & (NUD_PERMANENT|NUD_NOARP|NUD_REACHABLE))) {
884 pr_info("bridge: RTM_NEWNEIGH with invalid state %#x\n", ndm->ndm_state);
885 return -EINVAL;
886 }
887
Stephen Hemminger537f7f82013-06-25 09:34:36 -0700888 if (is_zero_ether_addr(addr)) {
889 pr_info("bridge: RTM_NEWNEIGH with invalid ether address\n");
890 return -EINVAL;
891 }
892
Roopa Prabhu37418732015-10-08 10:38:52 -0700893 if (dev->priv_flags & IFF_EBRIDGE) {
894 br = netdev_priv(dev);
895 vg = br_vlan_group(br);
896 } else {
897 p = br_port_get_rtnl(dev);
898 if (!p) {
899 pr_info("bridge: RTM_NEWNEIGH %s not a bridge port\n",
900 dev->name);
901 return -EINVAL;
902 }
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900903 br = p->br;
Roopa Prabhu37418732015-10-08 10:38:52 -0700904 vg = nbp_vlan_group(p);
stephen hemminger36fd2b62011-04-04 14:03:31 +0000905 }
906
Jiri Pirkof6f64242014-11-28 14:34:15 +0100907 if (vid) {
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200908 v = br_vlan_find(vg, vid);
Roopa Prabhu37418732015-10-08 10:38:52 -0700909 if (!v || !br_vlan_should_use(v)) {
910 pr_info("bridge: RTM_NEWNEIGH with unconfigured vlan %d on %s\n", vid, dev->name);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000911 return -EINVAL;
912 }
913
914 /* VID was specified, so use it. */
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900915 err = __br_fdb_add(ndm, br, p, addr, nlh_flags, vid);
stephen hemminger292d1392011-11-09 18:30:08 +0000916 } else {
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900917 err = __br_fdb_add(ndm, br, p, addr, nlh_flags, 0);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200918 if (err || !vg || !vg->num_vlans)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000919 goto out;
Vlad Yasevich1690be62013-02-13 12:00:18 +0000920
921 /* We have vlans configured on this port and user didn't
922 * specify a VLAN. To be nice, add/update entry for every
923 * vlan on this port.
924 */
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200925 list_for_each_entry(v, &vg->vlan_list, vlist) {
Roopa Prabhu37418732015-10-08 10:38:52 -0700926 if (!br_vlan_should_use(v))
927 continue;
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900928 err = __br_fdb_add(ndm, br, p, addr, nlh_flags, v->vid);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000929 if (err)
930 goto out;
Vlad Yasevich1690be62013-02-13 12:00:18 +0000931 }
stephen hemminger292d1392011-11-09 18:30:08 +0000932 }
stephen hemminger36fd2b62011-04-04 14:03:31 +0000933
Vlad Yasevich1690be62013-02-13 12:00:18 +0000934out:
935 return err;
936}
937
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100938static int fdb_delete_by_addr_and_port(struct net_bridge *br,
939 const struct net_bridge_port *p,
Nikolay Aleksandrov8c86f962015-06-09 03:34:13 -0700940 const u8 *addr, u16 vlan)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000941{
Vlad Yasevich1690be62013-02-13 12:00:18 +0000942 struct net_bridge_fdb_entry *fdb;
943
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100944 fdb = br_fdb_find(br, addr, vlan);
Nikolay Aleksandrov8c86f962015-06-09 03:34:13 -0700945 if (!fdb || fdb->dst != p)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000946 return -ENOENT;
947
948 fdb_delete(br, fdb);
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100949
Vlad Yasevich1690be62013-02-13 12:00:18 +0000950 return 0;
951}
952
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100953static int __br_fdb_delete(struct net_bridge *br,
954 const struct net_bridge_port *p,
Vlad Yasevich1690be62013-02-13 12:00:18 +0000955 const unsigned char *addr, u16 vid)
956{
957 int err;
958
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100959 spin_lock_bh(&br->hash_lock);
960 err = fdb_delete_by_addr_and_port(br, p, addr, vid);
961 spin_unlock_bh(&br->hash_lock);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000962
stephen hemminger36fd2b62011-04-04 14:03:31 +0000963 return err;
964}
965
stephen hemminger36fd2b62011-04-04 14:03:31 +0000966/* Remove neighbor entry with RTM_DELNEIGH */
Vlad Yasevich1690be62013-02-13 12:00:18 +0000967int br_fdb_delete(struct ndmsg *ndm, struct nlattr *tb[],
968 struct net_device *dev,
Jiri Pirkof6f64242014-11-28 14:34:15 +0100969 const unsigned char *addr, u16 vid)
stephen hemminger36fd2b62011-04-04 14:03:31 +0000970{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200971 struct net_bridge_vlan_group *vg;
Roopa Prabhu37418732015-10-08 10:38:52 -0700972 struct net_bridge_port *p = NULL;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200973 struct net_bridge_vlan *v;
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100974 struct net_bridge *br;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000975 int err;
976
Roopa Prabhu37418732015-10-08 10:38:52 -0700977 if (dev->priv_flags & IFF_EBRIDGE) {
978 br = netdev_priv(dev);
979 vg = br_vlan_group(br);
980 } else {
981 p = br_port_get_rtnl(dev);
982 if (!p) {
983 pr_info("bridge: RTM_DELNEIGH %s not a bridge port\n",
984 dev->name);
985 return -EINVAL;
986 }
987 vg = nbp_vlan_group(p);
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100988 br = p->br;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000989 }
990
Jiri Pirkof6f64242014-11-28 14:34:15 +0100991 if (vid) {
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200992 v = br_vlan_find(vg, vid);
993 if (!v) {
Roopa Prabhu37418732015-10-08 10:38:52 -0700994 pr_info("bridge: RTM_DELNEIGH with unconfigured vlan %d on %s\n", vid, dev->name);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000995 return -EINVAL;
996 }
stephen hemminger36fd2b62011-04-04 14:03:31 +0000997
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100998 err = __br_fdb_delete(br, p, addr, vid);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000999 } else {
Toshiaki Makita25d3b492015-02-09 20:16:17 +09001000 err = -ENOENT;
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001001 err &= __br_fdb_delete(br, p, addr, 0);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +02001002 if (!vg || !vg->num_vlans)
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001003 return err;
Vlad Yasevich1690be62013-02-13 12:00:18 +00001004
Roopa Prabhu37418732015-10-08 10:38:52 -07001005 list_for_each_entry(v, &vg->vlan_list, vlist) {
1006 if (!br_vlan_should_use(v))
1007 continue;
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001008 err &= __br_fdb_delete(br, p, addr, v->vid);
Roopa Prabhu37418732015-10-08 10:38:52 -07001009 }
Vlad Yasevich1690be62013-02-13 12:00:18 +00001010 }
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001011
stephen hemminger36fd2b62011-04-04 14:03:31 +00001012 return err;
1013}
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001014
1015int br_fdb_sync_static(struct net_bridge *br, struct net_bridge_port *p)
1016{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001017 struct net_bridge_fdb_entry *f, *tmp;
Geert Uytterhoeven367dc652018-02-01 11:25:27 +01001018 int err = 0;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001019
1020 ASSERT_RTNL();
1021
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001022 /* the key here is that static entries change only under rtnl */
1023 rcu_read_lock();
1024 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
1025 /* We only care for static entries */
1026 if (!f->is_static)
1027 continue;
1028 err = dev_uc_add(p->dev, f->key.addr.addr);
1029 if (err)
1030 goto rollback;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001031 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001032done:
1033 rcu_read_unlock();
1034
1035 return err;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001036
1037rollback:
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001038 hlist_for_each_entry_rcu(tmp, &br->fdb_list, fdb_node) {
1039 /* We only care for static entries */
1040 if (!tmp->is_static)
1041 continue;
1042 if (tmp == f)
1043 break;
1044 dev_uc_del(p->dev, tmp->key.addr.addr);
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001045 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001046
1047 goto done;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001048}
1049
1050void br_fdb_unsync_static(struct net_bridge *br, struct net_bridge_port *p)
1051{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001052 struct net_bridge_fdb_entry *f;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001053
1054 ASSERT_RTNL();
1055
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001056 rcu_read_lock();
1057 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
1058 /* We only care for static entries */
1059 if (!f->is_static)
1060 continue;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001061
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001062 dev_uc_del(p->dev, f->key.addr.addr);
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001063 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001064 rcu_read_unlock();
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001065}
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001066
Jiri Pirko3aeb6612015-01-15 23:49:37 +01001067int br_fdb_external_learn_add(struct net_bridge *br, struct net_bridge_port *p,
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001068 const unsigned char *addr, u16 vid)
1069{
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001070 struct net_bridge_fdb_entry *fdb;
Nikolay Aleksandrov7597b262017-07-03 15:14:59 -07001071 bool modified = false;
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001072 int err = 0;
1073
Roopa Prabhub74fd302017-08-29 13:16:57 -07001074 trace_br_fdb_external_learn_add(br, p, addr, vid);
1075
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001076 spin_lock_bh(&br->hash_lock);
1077
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +01001078 fdb = br_fdb_find(br, addr, vid);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001079 if (!fdb) {
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001080 fdb = fdb_create(br, p, addr, vid, 0, 0);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001081 if (!fdb) {
1082 err = -ENOMEM;
1083 goto err_unlock;
1084 }
1085 fdb->added_by_external_learn = 1;
1086 fdb_notify(br, fdb, RTM_NEWNEIGH);
Nikolay Aleksandrov7597b262017-07-03 15:14:59 -07001087 } else {
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001088 fdb->updated = jiffies;
Nikolay Aleksandrov7597b262017-07-03 15:14:59 -07001089
1090 if (fdb->dst != p) {
1091 fdb->dst = p;
1092 modified = true;
1093 }
1094
1095 if (fdb->added_by_external_learn) {
1096 /* Refresh entry */
1097 fdb->used = jiffies;
1098 } else if (!fdb->added_by_user) {
1099 /* Take over SW learned entry */
1100 fdb->added_by_external_learn = 1;
1101 modified = true;
1102 }
1103
1104 if (modified)
1105 fdb_notify(br, fdb, RTM_NEWNEIGH);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001106 }
1107
1108err_unlock:
1109 spin_unlock_bh(&br->hash_lock);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001110
1111 return err;
1112}
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001113
Jiri Pirko3aeb6612015-01-15 23:49:37 +01001114int br_fdb_external_learn_del(struct net_bridge *br, struct net_bridge_port *p,
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001115 const unsigned char *addr, u16 vid)
1116{
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001117 struct net_bridge_fdb_entry *fdb;
1118 int err = 0;
1119
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001120 spin_lock_bh(&br->hash_lock);
1121
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +01001122 fdb = br_fdb_find(br, addr, vid);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001123 if (fdb && fdb->added_by_external_learn)
1124 fdb_delete(br, fdb);
1125 else
1126 err = -ENOENT;
1127
1128 spin_unlock_bh(&br->hash_lock);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001129
1130 return err;
1131}
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +02001132
1133void br_fdb_offloaded_set(struct net_bridge *br, struct net_bridge_port *p,
1134 const unsigned char *addr, u16 vid)
1135{
1136 struct net_bridge_fdb_entry *fdb;
1137
1138 spin_lock_bh(&br->hash_lock);
1139
1140 fdb = br_fdb_find(br, addr, vid);
1141 if (fdb)
1142 fdb->offloaded = 1;
1143
1144 spin_unlock_bh(&br->hash_lock);
1145}