blob: b19e3104afd6bf512d9b98f8350cc0f37d9880ea [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Forwarding database
3 * Linux ethernet bridge
4 *
5 * Authors:
6 * Lennert Buytenhek <buytenh@gnu.org>
7 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version
11 * 2 of the License, or (at your option) any later version.
12 */
13
14#include <linux/kernel.h>
15#include <linux/init.h>
Franck Bui-Huu82524742008-05-12 21:21:05 +020016#include <linux/rculist.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/spinlock.h>
18#include <linux/times.h>
19#include <linux/netdevice.h>
20#include <linux/etherdevice.h>
21#include <linux/jhash.h>
Stephen Hemminger3f890922007-03-21 13:42:33 -070022#include <linux/random.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090023#include <linux/slab.h>
Arun Sharma600634972011-07-26 16:09:06 -070024#include <linux/atomic.h>
Stephen Hemminger3f890922007-03-21 13:42:33 -070025#include <asm/unaligned.h>
Vlad Yasevich2ba071e2013-02-13 12:00:16 +000026#include <linux/if_vlan.h>
Scott Feldmanb4ad7ba2015-06-14 11:33:11 -070027#include <net/switchdev.h>
Roopa Prabhub74fd302017-08-29 13:16:57 -070028#include <trace/events/bridge.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include "br_private.h"
30
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020031static const struct rhashtable_params br_fdb_rht_params = {
32 .head_offset = offsetof(struct net_bridge_fdb_entry, rhnode),
33 .key_offset = offsetof(struct net_bridge_fdb_entry, key),
34 .key_len = sizeof(struct net_bridge_fdb_key),
35 .automatic_shrinking = true,
36 .locks_mul = 1,
37};
38
Christoph Lametere18b8902006-12-06 20:33:20 -080039static struct kmem_cache *br_fdb_cache __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070040static int fdb_insert(struct net_bridge *br, struct net_bridge_port *source,
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +000041 const unsigned char *addr, u16 vid);
stephen hemminger31e8a49c2011-12-08 07:17:41 +000042static void fdb_notify(struct net_bridge *br,
Petr Machata161d82d2018-05-03 14:43:53 +020043 const struct net_bridge_fdb_entry *, int, bool);
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
Akinobu Mita87a596e2007-04-07 18:57:07 +090045int __init br_fdb_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -070046{
47 br_fdb_cache = kmem_cache_create("bridge_fdb_cache",
48 sizeof(struct net_bridge_fdb_entry),
49 0,
Paul Mundt20c2df82007-07-20 10:11:58 +090050 SLAB_HWCACHE_ALIGN, NULL);
Akinobu Mita87a596e2007-04-07 18:57:07 +090051 if (!br_fdb_cache)
52 return -ENOMEM;
53
Akinobu Mita87a596e2007-04-07 18:57:07 +090054 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070055}
56
Andrew Morton73afc902007-12-05 21:35:23 -080057void br_fdb_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -070058{
59 kmem_cache_destroy(br_fdb_cache);
60}
61
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020062int br_fdb_hash_init(struct net_bridge *br)
63{
64 return rhashtable_init(&br->fdb_hash_tbl, &br_fdb_rht_params);
65}
66
67void br_fdb_hash_fini(struct net_bridge *br)
68{
69 rhashtable_destroy(&br->fdb_hash_tbl);
70}
Linus Torvalds1da177e2005-04-16 15:20:36 -070071
72/* if topology_changing then use forward_delay (default 15 sec)
73 * otherwise keep longer (default 5 minutes)
74 */
Stephen Hemminger3f890922007-03-21 13:42:33 -070075static inline unsigned long hold_time(const struct net_bridge *br)
Linus Torvalds1da177e2005-04-16 15:20:36 -070076{
77 return br->topology_change ? br->forward_delay : br->ageing_time;
78}
79
Stephen Hemminger3f890922007-03-21 13:42:33 -070080static inline int has_expired(const struct net_bridge *br,
Linus Torvalds1da177e2005-04-16 15:20:36 -070081 const struct net_bridge_fdb_entry *fdb)
82{
Roopa Prabhueda7a5e2017-02-16 13:38:04 -080083 return !fdb->is_static && !fdb->added_by_external_learn &&
stephen hemminger7cd88612011-04-04 14:03:28 +000084 time_before_eq(fdb->updated + hold_time(br), jiffies);
Linus Torvalds1da177e2005-04-16 15:20:36 -070085}
86
Michał Mirosławda678292009-06-05 05:35:28 +000087static void fdb_rcu_free(struct rcu_head *head)
88{
89 struct net_bridge_fdb_entry *ent
90 = container_of(head, struct net_bridge_fdb_entry, rcu);
91 kmem_cache_free(br_fdb_cache, ent);
92}
93
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020094static struct net_bridge_fdb_entry *fdb_find_rcu(struct rhashtable *tbl,
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +010095 const unsigned char *addr,
96 __u16 vid)
97{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +020098 struct net_bridge_fdb_key key;
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +010099
Nikolay Aleksandrov410b3d42017-02-13 14:59:10 +0100100 WARN_ON_ONCE(!rcu_read_lock_held());
101
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200102 key.vlan_id = vid;
103 memcpy(key.addr.addr, addr, sizeof(key.addr.addr));
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100104
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200105 return rhashtable_lookup(tbl, &key, br_fdb_rht_params);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100106}
107
108/* requires bridge hash_lock */
109static struct net_bridge_fdb_entry *br_fdb_find(struct net_bridge *br,
110 const unsigned char *addr,
111 __u16 vid)
112{
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100113 struct net_bridge_fdb_entry *fdb;
114
WANG Congd12c9172017-03-16 10:32:42 -0700115 lockdep_assert_held_once(&br->hash_lock);
Nikolay Aleksandrov410b3d42017-02-13 14:59:10 +0100116
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100117 rcu_read_lock();
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200118 fdb = fdb_find_rcu(&br->fdb_hash_tbl, addr, vid);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100119 rcu_read_unlock();
120
121 return fdb;
122}
123
Petr Machata4d4fd362018-04-29 10:56:08 +0300124struct net_device *br_fdb_find_port(const struct net_device *br_dev,
125 const unsigned char *addr,
126 __u16 vid)
127{
128 struct net_bridge_fdb_entry *f;
129 struct net_device *dev = NULL;
130 struct net_bridge *br;
131
132 ASSERT_RTNL();
133
134 if (!netif_is_bridge_master(br_dev))
135 return NULL;
136
137 br = netdev_priv(br_dev);
138 f = br_fdb_find(br, addr, vid);
139 if (f && f->dst)
140 dev = f->dst->dev;
141
142 return dev;
143}
144EXPORT_SYMBOL_GPL(br_fdb_find_port);
145
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100146struct net_bridge_fdb_entry *br_fdb_find_rcu(struct net_bridge *br,
147 const unsigned char *addr,
148 __u16 vid)
149{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200150 return fdb_find_rcu(&br->fdb_hash_tbl, addr, vid);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100151}
152
Vlad Yasevich145beee2014-05-16 09:59:19 -0400153/* When a static FDB entry is added, the mac address from the entry is
154 * added to the bridge private HW address list and all required ports
155 * are then updated with the new information.
156 * Called under RTNL.
157 */
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100158static void fdb_add_hw_addr(struct net_bridge *br, const unsigned char *addr)
Vlad Yasevich145beee2014-05-16 09:59:19 -0400159{
160 int err;
Li RongQinga3f5ee72014-06-18 16:07:16 +0800161 struct net_bridge_port *p;
Vlad Yasevich145beee2014-05-16 09:59:19 -0400162
163 ASSERT_RTNL();
164
165 list_for_each_entry(p, &br->port_list, list) {
166 if (!br_promisc_port(p)) {
167 err = dev_uc_add(p->dev, addr);
168 if (err)
169 goto undo;
170 }
171 }
172
173 return;
174undo:
Li RongQinga3f5ee72014-06-18 16:07:16 +0800175 list_for_each_entry_continue_reverse(p, &br->port_list, list) {
176 if (!br_promisc_port(p))
177 dev_uc_del(p->dev, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400178 }
179}
180
181/* When a static FDB entry is deleted, the HW address from that entry is
182 * also removed from the bridge private HW address list and updates all
183 * the ports with needed information.
184 * Called under RTNL.
185 */
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100186static void fdb_del_hw_addr(struct net_bridge *br, const unsigned char *addr)
Vlad Yasevich145beee2014-05-16 09:59:19 -0400187{
188 struct net_bridge_port *p;
189
190 ASSERT_RTNL();
191
192 list_for_each_entry(p, &br->port_list, list) {
193 if (!br_promisc_port(p))
194 dev_uc_del(p->dev, addr);
195 }
196}
197
Petr Machata161d82d2018-05-03 14:43:53 +0200198static void fdb_delete(struct net_bridge *br, struct net_bridge_fdb_entry *f,
199 bool swdev_notify)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200{
Roopa Prabhub74fd302017-08-29 13:16:57 -0700201 trace_fdb_delete(br, f);
202
Vlad Yasevich145beee2014-05-16 09:59:19 -0400203 if (f->is_static)
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200204 fdb_del_hw_addr(br, f->key.addr.addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400205
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200206 hlist_del_init_rcu(&f->fdb_node);
207 rhashtable_remove_fast(&br->fdb_hash_tbl, &f->rhnode,
208 br_fdb_rht_params);
Petr Machata161d82d2018-05-03 14:43:53 +0200209 fdb_notify(br, f, RTM_DELNEIGH, swdev_notify);
Michał Mirosławda678292009-06-05 05:35:28 +0000210 call_rcu(&f->rcu, fdb_rcu_free);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211}
212
Toshiaki Makita960b5892014-02-07 16:48:23 +0900213/* Delete a local entry if no other port had the same address. */
214static void fdb_delete_local(struct net_bridge *br,
215 const struct net_bridge_port *p,
216 struct net_bridge_fdb_entry *f)
217{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200218 const unsigned char *addr = f->key.addr.addr;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200219 struct net_bridge_vlan_group *vg;
220 const struct net_bridge_vlan *v;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900221 struct net_bridge_port *op;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200222 u16 vid = f->key.vlan_id;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900223
224 /* Maybe another port has same hw addr? */
225 list_for_each_entry(op, &br->port_list, list) {
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200226 vg = nbp_vlan_group(op);
Toshiaki Makita960b5892014-02-07 16:48:23 +0900227 if (op != p && ether_addr_equal(op->dev->dev_addr, addr) &&
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200228 (!vid || br_vlan_find(vg, vid))) {
Toshiaki Makita960b5892014-02-07 16:48:23 +0900229 f->dst = op;
Toshiaki Makitaa778e6d2014-02-07 16:48:24 +0900230 f->added_by_user = 0;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900231 return;
232 }
233 }
234
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200235 vg = br_vlan_group(br);
236 v = br_vlan_find(vg, vid);
Toshiaki Makita960b5892014-02-07 16:48:23 +0900237 /* Maybe bridge device has same hw addr? */
238 if (p && ether_addr_equal(br->dev->dev_addr, addr) &&
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200239 (!vid || (v && br_vlan_should_use(v)))) {
Toshiaki Makita960b5892014-02-07 16:48:23 +0900240 f->dst = NULL;
Toshiaki Makitaa778e6d2014-02-07 16:48:24 +0900241 f->added_by_user = 0;
Toshiaki Makita960b5892014-02-07 16:48:23 +0900242 return;
243 }
244
Petr Machata161d82d2018-05-03 14:43:53 +0200245 fdb_delete(br, f, true);
Toshiaki Makita960b5892014-02-07 16:48:23 +0900246}
247
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900248void br_fdb_find_delete_local(struct net_bridge *br,
249 const struct net_bridge_port *p,
250 const unsigned char *addr, u16 vid)
251{
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900252 struct net_bridge_fdb_entry *f;
253
254 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100255 f = br_fdb_find(br, addr, vid);
Toshiaki Makita424bb9c2014-02-07 16:48:25 +0900256 if (f && f->is_local && !f->added_by_user && f->dst == p)
257 fdb_delete_local(br, p, f);
258 spin_unlock_bh(&br->hash_lock);
259}
260
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261void br_fdb_changeaddr(struct net_bridge_port *p, const unsigned char *newaddr)
262{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200263 struct net_bridge_vlan_group *vg;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200264 struct net_bridge_fdb_entry *f;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265 struct net_bridge *br = p->br;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200266 struct net_bridge_vlan *v;
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900267
Linus Torvalds1da177e2005-04-16 15:20:36 -0700268 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200269 vg = nbp_vlan_group(p);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200270 hlist_for_each_entry(f, &br->fdb_list, fdb_node) {
271 if (f->dst == p && f->is_local && !f->added_by_user) {
272 /* delete old one */
273 fdb_delete_local(br, p, f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700274
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200275 /* if this port has no vlan information
276 * configured, we can safely be done at
277 * this point.
278 */
279 if (!vg || !vg->num_vlans)
280 goto insert;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700281 }
282 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283
Toshiaki Makita28368822014-02-07 16:48:19 +0900284insert:
285 /* insert new address, may fail if invalid address or dup. */
286 fdb_insert(br, p, newaddr, 0);
287
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200288 if (!vg || !vg->num_vlans)
Toshiaki Makita28368822014-02-07 16:48:19 +0900289 goto done;
290
291 /* Now add entries for every VLAN configured on the port.
292 * This function runs under RTNL so the bitmap will not change
293 * from under us.
294 */
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200295 list_for_each_entry(v, &vg->vlan_list, vlist)
296 fdb_insert(br, p, newaddr, v->vid);
Toshiaki Makita28368822014-02-07 16:48:19 +0900297
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000298done:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299 spin_unlock_bh(&br->hash_lock);
300}
301
stephen hemminger43598812011-12-08 07:17:49 +0000302void br_fdb_change_mac_address(struct net_bridge *br, const u8 *newaddr)
303{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200304 struct net_bridge_vlan_group *vg;
stephen hemminger43598812011-12-08 07:17:49 +0000305 struct net_bridge_fdb_entry *f;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200306 struct net_bridge_vlan *v;
stephen hemminger43598812011-12-08 07:17:49 +0000307
Toshiaki Makitaac4c8862014-02-07 16:48:26 +0900308 spin_lock_bh(&br->hash_lock);
309
stephen hemminger43598812011-12-08 07:17:49 +0000310 /* If old entry was unassociated with any port, then delete it. */
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100311 f = br_fdb_find(br, br->dev->dev_addr, 0);
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900312 if (f && f->is_local && !f->dst && !f->added_by_user)
Toshiaki Makita960b5892014-02-07 16:48:23 +0900313 fdb_delete_local(br, NULL, f);
stephen hemminger43598812011-12-08 07:17:49 +0000314
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000315 fdb_insert(br, NULL, newaddr, 0);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200316 vg = br_vlan_group(br);
317 if (!vg || !vg->num_vlans)
318 goto out;
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000319 /* Now remove and add entries for every VLAN configured on the
320 * bridge. This function runs under RTNL so the bitmap will not
321 * change from under us.
322 */
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200323 list_for_each_entry(v, &vg->vlan_list, vlist) {
Toshiaki Makita0b148de2016-06-07 19:14:17 +0900324 if (!br_vlan_should_use(v))
325 continue;
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100326 f = br_fdb_find(br, br->dev->dev_addr, v->vid);
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900327 if (f && f->is_local && !f->dst && !f->added_by_user)
Toshiaki Makita960b5892014-02-07 16:48:23 +0900328 fdb_delete_local(br, NULL, f);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200329 fdb_insert(br, NULL, newaddr, v->vid);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000330 }
Toshiaki Makitaac4c8862014-02-07 16:48:26 +0900331out:
332 spin_unlock_bh(&br->hash_lock);
stephen hemminger43598812011-12-08 07:17:49 +0000333}
334
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100335void br_fdb_cleanup(struct work_struct *work)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336{
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100337 struct net_bridge *br = container_of(work, struct net_bridge,
338 gc_work.work);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200339 struct net_bridge_fdb_entry *f = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700340 unsigned long delay = hold_time(br);
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100341 unsigned long work_delay = delay;
342 unsigned long now = jiffies;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700343
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200344 /* this part is tricky, in order to avoid blocking learning and
345 * consequently forwarding, we rely on rcu to delete objects with
346 * delayed freeing allowing us to continue traversing
347 */
348 rcu_read_lock();
349 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
350 unsigned long this_timer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200352 if (f->is_static || f->added_by_external_learn)
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100353 continue;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200354 this_timer = f->updated + delay;
355 if (time_after(this_timer, now)) {
356 work_delay = min(work_delay, this_timer - now);
357 } else {
358 spin_lock_bh(&br->hash_lock);
359 if (!hlist_unhashed(&f->fdb_node))
Petr Machata161d82d2018-05-03 14:43:53 +0200360 fdb_delete(br, f, true);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200361 spin_unlock_bh(&br->hash_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700362 }
363 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200364 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700365
Nikolay Aleksandrovf7cdee82017-02-04 18:05:07 +0100366 /* Cleanup minimum 10 milliseconds apart */
367 work_delay = max_t(unsigned long, work_delay, msecs_to_jiffies(10));
368 mod_delayed_work(system_long_wq, &br->gc_work, work_delay);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369}
370
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700371/* Completely flush all dynamic entries in forwarding database.*/
372void br_fdb_flush(struct net_bridge *br)
373{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200374 struct net_bridge_fdb_entry *f;
375 struct hlist_node *tmp;
Stephen Hemminger1a620692006-10-12 14:45:38 -0700376
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700377 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200378 hlist_for_each_entry_safe(f, tmp, &br->fdb_list, fdb_node) {
379 if (!f->is_static)
Petr Machata161d82d2018-05-03 14:43:53 +0200380 fdb_delete(br, f, true);
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700381 }
382 spin_unlock_bh(&br->hash_lock);
383}
384
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300385/* Flush all entries referring to a specific port.
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700386 * if do_all is set also flush static entries
Nikolay Aleksandrov1ea2d022015-06-23 05:28:16 -0700387 * if vid is set delete all entries that match the vlan_id
Stephen Hemminger9cf63742007-04-09 12:57:54 -0700388 */
Stephen Hemminger1a620692006-10-12 14:45:38 -0700389void br_fdb_delete_by_port(struct net_bridge *br,
390 const struct net_bridge_port *p,
Nikolay Aleksandrov1ea2d022015-06-23 05:28:16 -0700391 u16 vid,
Stephen Hemminger1a620692006-10-12 14:45:38 -0700392 int do_all)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200394 struct net_bridge_fdb_entry *f;
395 struct hlist_node *tmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700396
397 spin_lock_bh(&br->hash_lock);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200398 hlist_for_each_entry_safe(f, tmp, &br->fdb_list, fdb_node) {
399 if (f->dst != p)
400 continue;
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900401
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200402 if (!do_all)
403 if (f->is_static || (vid && f->key.vlan_id != vid))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404 continue;
405
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200406 if (f->is_local)
407 fdb_delete_local(br, p, f);
408 else
Petr Machata161d82d2018-05-03 14:43:53 +0200409 fdb_delete(br, f, true);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410 }
411 spin_unlock_bh(&br->hash_lock);
412}
413
Igor Maraviće6373c42011-12-12 02:58:25 +0000414#if IS_ENABLED(CONFIG_ATM_LANE)
Michał Mirosławda678292009-06-05 05:35:28 +0000415/* Interface used by ATM LANE hook to test
416 * if an addr is on some other bridge port */
417int br_fdb_test_addr(struct net_device *dev, unsigned char *addr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418{
419 struct net_bridge_fdb_entry *fdb;
stephen hemmingerb5ed54e2010-11-15 06:38:13 +0000420 struct net_bridge_port *port;
Michał Mirosławda678292009-06-05 05:35:28 +0000421 int ret;
422
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423 rcu_read_lock();
stephen hemmingerb5ed54e2010-11-15 06:38:13 +0000424 port = br_port_get_rcu(dev);
425 if (!port)
426 ret = 0;
427 else {
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100428 fdb = br_fdb_find_rcu(port->br, addr, 0);
stephen hemminger43598812011-12-08 07:17:49 +0000429 ret = fdb && fdb->dst && fdb->dst->dev != dev &&
stephen hemmingerb5ed54e2010-11-15 06:38:13 +0000430 fdb->dst->state == BR_STATE_FORWARDING;
431 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700433
Michał Mirosławda678292009-06-05 05:35:28 +0000434 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435}
Michał Mirosławda678292009-06-05 05:35:28 +0000436#endif /* CONFIG_ATM_LANE */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437
438/*
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900439 * Fill buffer with forwarding table records in
Linus Torvalds1da177e2005-04-16 15:20:36 -0700440 * the API format.
441 */
442int br_fdb_fillbuf(struct net_bridge *br, void *buf,
443 unsigned long maxnum, unsigned long skip)
444{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700445 struct net_bridge_fdb_entry *f;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200446 struct __fdb_entry *fe = buf;
447 int num = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700448
449 memset(buf, 0, maxnum*sizeof(struct __fdb_entry));
450
451 rcu_read_lock();
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200452 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
453 if (num >= maxnum)
454 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700455
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200456 if (has_expired(br, f))
457 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700458
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200459 /* ignore pseudo entry for local MAC address */
460 if (!f->dst)
461 continue;
stephen hemminger43598812011-12-08 07:17:49 +0000462
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200463 if (skip) {
464 --skip;
465 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200468 /* convert from internal format to API */
469 memcpy(fe->mac_addr, f->key.addr.addr, ETH_ALEN);
470
471 /* due to ABI compat need to split into hi/lo */
472 fe->port_no = f->dst->port_no;
473 fe->port_hi = f->dst->port_no >> 8;
474
475 fe->is_local = f->is_local;
476 if (!f->is_static)
477 fe->ageing_timer_value = jiffies_delta_to_clock_t(jiffies - f->updated);
478 ++fe;
479 ++num;
480 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700481 rcu_read_unlock();
482
483 return num;
484}
485
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200486static struct net_bridge_fdb_entry *fdb_create(struct net_bridge *br,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700487 struct net_bridge_port *source,
Vlad Yasevich2ba071e2013-02-13 12:00:16 +0000488 const unsigned char *addr,
Roopa Prabhub7af1472015-10-27 07:52:56 -0700489 __u16 vid,
490 unsigned char is_local,
491 unsigned char is_static)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700492{
493 struct net_bridge_fdb_entry *fdb;
494
495 fdb = kmem_cache_alloc(br_fdb_cache, GFP_ATOMIC);
496 if (fdb) {
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200497 memcpy(fdb->key.addr.addr, addr, ETH_ALEN);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498 fdb->dst = source;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200499 fdb->key.vlan_id = vid;
Roopa Prabhub7af1472015-10-27 07:52:56 -0700500 fdb->is_local = is_local;
501 fdb->is_static = is_static;
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900502 fdb->added_by_user = 0;
Scott Feldmancf6b8e12014-11-28 14:34:21 +0100503 fdb->added_by_external_learn = 0;
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +0200504 fdb->offloaded = 0;
stephen hemminger7cd88612011-04-04 14:03:28 +0000505 fdb->updated = fdb->used = jiffies;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200506 if (rhashtable_lookup_insert_fast(&br->fdb_hash_tbl,
507 &fdb->rhnode,
508 br_fdb_rht_params)) {
509 kmem_cache_free(br_fdb_cache, fdb);
510 fdb = NULL;
511 } else {
512 hlist_add_head_rcu(&fdb->fdb_node, &br->fdb_list);
513 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700514 }
515 return fdb;
516}
517
518static int fdb_insert(struct net_bridge *br, struct net_bridge_port *source,
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000519 const unsigned char *addr, u16 vid)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700520{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700521 struct net_bridge_fdb_entry *fdb;
522
523 if (!is_valid_ether_addr(addr))
524 return -EINVAL;
525
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100526 fdb = br_fdb_find(br, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700527 if (fdb) {
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900528 /* it is okay to have multiple ports with same
Linus Torvalds1da177e2005-04-16 15:20:36 -0700529 * address, just use the first one.
530 */
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900531 if (fdb->is_local)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700532 return 0;
Roopa Prabhude1dfee2016-10-11 16:12:56 -0700533 br_warn(br, "adding interface %s with same address as a received packet (addr:%pM, vlan:%u)\n",
534 source ? source->dev->name : br->dev->name, addr, vid);
Petr Machata161d82d2018-05-03 14:43:53 +0200535 fdb_delete(br, fdb, true);
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900536 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700537
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200538 fdb = fdb_create(br, source, addr, vid, 1, 1);
stephen hemminger03e9b642011-04-04 14:03:27 +0000539 if (!fdb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700540 return -ENOMEM;
541
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100542 fdb_add_hw_addr(br, addr);
Petr Machata161d82d2018-05-03 14:43:53 +0200543 fdb_notify(br, fdb, RTM_NEWNEIGH, true);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700544 return 0;
545}
546
stephen hemminger03e9b642011-04-04 14:03:27 +0000547/* Add entry for local address of interface */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700548int br_fdb_insert(struct net_bridge *br, struct net_bridge_port *source,
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000549 const unsigned char *addr, u16 vid)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700550{
551 int ret;
552
553 spin_lock_bh(&br->hash_lock);
Vlad Yasevichbc9a25d2013-02-13 12:00:19 +0000554 ret = fdb_insert(br, source, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700555 spin_unlock_bh(&br->hash_lock);
556 return ret;
557}
558
559void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source,
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900560 const unsigned char *addr, u16 vid, bool added_by_user)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700561{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700562 struct net_bridge_fdb_entry *fdb;
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000563 bool fdb_modified = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700564
565 /* some users want to always flood. */
566 if (hold_time(br) == 0)
567 return;
568
Stephen Hemmingerdf1c0b82007-08-30 22:15:35 -0700569 /* ignore packets unless we are using this port */
570 if (!(source->state == BR_STATE_LEARNING ||
571 source->state == BR_STATE_FORWARDING))
572 return;
573
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200574 fdb = fdb_find_rcu(&br->fdb_hash_tbl, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700575 if (likely(fdb)) {
576 /* attempt to update an entry for a local interface */
577 if (unlikely(fdb->is_local)) {
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +0900578 if (net_ratelimit())
Roopa Prabhude1dfee2016-10-11 16:12:56 -0700579 br_warn(br, "received packet on %s with own address as source address (addr:%pM, vlan:%u)\n",
580 source->dev->name, addr, vid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700581 } else {
stephen hemmingerca6d4482017-02-07 08:46:46 -0800582 unsigned long now = jiffies;
583
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584 /* fastpath: update of existing entry */
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000585 if (unlikely(source != fdb->dst)) {
586 fdb->dst = source;
587 fdb_modified = true;
Arkadi Sharshevsky58073b32017-04-28 22:39:07 +0300588 /* Take over HW learned entry */
589 if (unlikely(fdb->added_by_external_learn))
590 fdb->added_by_external_learn = 0;
Jon Maxwellc65c7a32014-05-29 17:27:16 +1000591 }
stephen hemmingerca6d4482017-02-07 08:46:46 -0800592 if (now != fdb->updated)
593 fdb->updated = now;
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900594 if (unlikely(added_by_user))
595 fdb->added_by_user = 1;
Roopa Prabhue3cfddd2017-08-30 22:18:13 -0700596 if (unlikely(fdb_modified)) {
597 trace_br_fdb_update(br, source, addr, vid, added_by_user);
Petr Machata161d82d2018-05-03 14:43:53 +0200598 fdb_notify(br, fdb, RTM_NEWNEIGH, true);
Roopa Prabhue3cfddd2017-08-30 22:18:13 -0700599 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 }
601 } else {
Stephen Hemmingerf8ae7372006-03-20 22:58:36 -0800602 spin_lock(&br->hash_lock);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200603 fdb = fdb_create(br, source, addr, vid, 0, 0);
604 if (fdb) {
605 if (unlikely(added_by_user))
606 fdb->added_by_user = 1;
607 trace_br_fdb_update(br, source, addr, vid,
608 added_by_user);
Petr Machata161d82d2018-05-03 14:43:53 +0200609 fdb_notify(br, fdb, RTM_NEWNEIGH, true);
stephen hemmingerf58ee4e2011-12-06 13:02:24 +0000610 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700611 /* else we lose race and someone else inserts
612 * it first, don't bother updating
613 */
Stephen Hemmingerf8ae7372006-03-20 22:58:36 -0800614 spin_unlock(&br->hash_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700615 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700616}
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000617
Roopa Prabhu37418732015-10-08 10:38:52 -0700618static int fdb_to_nud(const struct net_bridge *br,
619 const struct net_bridge_fdb_entry *fdb)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000620{
621 if (fdb->is_local)
622 return NUD_PERMANENT;
623 else if (fdb->is_static)
624 return NUD_NOARP;
Roopa Prabhu37418732015-10-08 10:38:52 -0700625 else if (has_expired(br, fdb))
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000626 return NUD_STALE;
627 else
628 return NUD_REACHABLE;
629}
630
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000631static int fdb_fill_info(struct sk_buff *skb, const struct net_bridge *br,
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000632 const struct net_bridge_fdb_entry *fdb,
Eric W. Biederman15e47302012-09-07 20:12:54 +0000633 u32 portid, u32 seq, int type, unsigned int flags)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000634{
635 unsigned long now = jiffies;
636 struct nda_cacheinfo ci;
637 struct nlmsghdr *nlh;
638 struct ndmsg *ndm;
639
Eric W. Biederman15e47302012-09-07 20:12:54 +0000640 nlh = nlmsg_put(skb, portid, seq, type, sizeof(*ndm), flags);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000641 if (nlh == NULL)
642 return -EMSGSIZE;
643
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000644 ndm = nlmsg_data(nlh);
645 ndm->ndm_family = AF_BRIDGE;
646 ndm->ndm_pad1 = 0;
647 ndm->ndm_pad2 = 0;
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +0200648 ndm->ndm_flags = 0;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000649 ndm->ndm_type = 0;
stephen hemminger43598812011-12-08 07:17:49 +0000650 ndm->ndm_ifindex = fdb->dst ? fdb->dst->dev->ifindex : br->dev->ifindex;
Roopa Prabhu37418732015-10-08 10:38:52 -0700651 ndm->ndm_state = fdb_to_nud(br, fdb);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000652
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +0200653 if (fdb->offloaded)
654 ndm->ndm_flags |= NTF_OFFLOADED;
655 if (fdb->added_by_external_learn)
656 ndm->ndm_flags |= NTF_EXT_LEARNED;
657
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200658 if (nla_put(skb, NDA_LLADDR, ETH_ALEN, &fdb->key.addr))
David S. Miller2eb812e2012-04-01 20:49:54 -0400659 goto nla_put_failure;
Roopa Prabhu41c389d2014-05-27 22:39:37 -0700660 if (nla_put_u32(skb, NDA_MASTER, br->dev->ifindex))
661 goto nla_put_failure;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000662 ci.ndm_used = jiffies_to_clock_t(now - fdb->used);
663 ci.ndm_confirmed = 0;
664 ci.ndm_updated = jiffies_to_clock_t(now - fdb->updated);
665 ci.ndm_refcnt = 0;
David S. Miller2eb812e2012-04-01 20:49:54 -0400666 if (nla_put(skb, NDA_CACHEINFO, sizeof(ci), &ci))
667 goto nla_put_failure;
Vlad Yasevich1690be62013-02-13 12:00:18 +0000668
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200669 if (fdb->key.vlan_id && nla_put(skb, NDA_VLAN, sizeof(u16),
670 &fdb->key.vlan_id))
Vlad Yasevich1690be62013-02-13 12:00:18 +0000671 goto nla_put_failure;
672
Johannes Berg053c0952015-01-16 22:09:00 +0100673 nlmsg_end(skb, nlh);
674 return 0;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000675
676nla_put_failure:
677 nlmsg_cancel(skb, nlh);
678 return -EMSGSIZE;
679}
680
681static inline size_t fdb_nlmsg_size(void)
682{
683 return NLMSG_ALIGN(sizeof(struct ndmsg))
684 + nla_total_size(ETH_ALEN) /* NDA_LLADDR */
Roopa Prabhu41c389d2014-05-27 22:39:37 -0700685 + nla_total_size(sizeof(u32)) /* NDA_MASTER */
Vlad Yasevich1690be62013-02-13 12:00:18 +0000686 + nla_total_size(sizeof(u16)) /* NDA_VLAN */
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000687 + nla_total_size(sizeof(struct nda_cacheinfo));
688}
689
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000690static void fdb_notify(struct net_bridge *br,
Petr Machata161d82d2018-05-03 14:43:53 +0200691 const struct net_bridge_fdb_entry *fdb, int type,
692 bool swdev_notify)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000693{
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000694 struct net *net = dev_net(br->dev);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000695 struct sk_buff *skb;
696 int err = -ENOBUFS;
697
Petr Machata161d82d2018-05-03 14:43:53 +0200698 if (swdev_notify)
699 br_switchdev_fdb_notify(fdb, type);
Arkadi Sharshevsky6b26b512017-06-08 08:44:14 +0200700
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000701 skb = nlmsg_new(fdb_nlmsg_size(), GFP_ATOMIC);
702 if (skb == NULL)
703 goto errout;
704
stephen hemminger31e8a49c2011-12-08 07:17:41 +0000705 err = fdb_fill_info(skb, br, fdb, 0, 0, type, 0);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000706 if (err < 0) {
707 /* -EMSGSIZE implies BUG in fdb_nlmsg_size() */
708 WARN_ON(err == -EMSGSIZE);
709 kfree_skb(skb);
710 goto errout;
711 }
712 rtnl_notify(skb, net, 0, RTNLGRP_NEIGH, NULL, GFP_ATOMIC);
713 return;
714errout:
tanxiaojun87e823b2013-12-19 13:28:10 +0800715 rtnl_set_sk_err(net, RTNLGRP_NEIGH, err);
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000716}
717
718/* Dump information about entries, in response to GETNEIGH */
John Fastabend77162022012-04-15 06:43:56 +0000719int br_fdb_dump(struct sk_buff *skb,
720 struct netlink_callback *cb,
721 struct net_device *dev,
Jamal Hadi Salim5d5eacb2014-07-10 07:01:58 -0400722 struct net_device *filter_dev,
Roopa Prabhud2976532016-08-30 21:56:45 -0700723 int *idx)
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000724{
John Fastabend77162022012-04-15 06:43:56 +0000725 struct net_bridge *br = netdev_priv(dev);
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200726 struct net_bridge_fdb_entry *f;
Roopa Prabhud2976532016-08-30 21:56:45 -0700727 int err = 0;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000728
John Fastabend77162022012-04-15 06:43:56 +0000729 if (!(dev->priv_flags & IFF_EBRIDGE))
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200730 return err;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000731
Roopa Prabhud2976532016-08-30 21:56:45 -0700732 if (!filter_dev) {
733 err = ndo_dflt_fdb_dump(skb, cb, dev, NULL, idx);
734 if (err < 0)
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200735 return err;
Roopa Prabhud2976532016-08-30 21:56:45 -0700736 }
Hubert Sokolowski6cb69742015-01-05 17:29:21 +0000737
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200738 rcu_read_lock();
739 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
740 if (*idx < cb->args[2])
741 goto skip;
742 if (filter_dev && (!f->dst || f->dst->dev != filter_dev)) {
743 if (filter_dev != dev)
John Fastabend77162022012-04-15 06:43:56 +0000744 goto skip;
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200745 /* !f->dst is a special case for bridge
746 * It means the MAC belongs to the bridge
747 * Therefore need a little more filtering
748 * we only want to dump the !f->dst case
749 */
750 if (f->dst)
Hubert Sokolowski6cb69742015-01-05 17:29:21 +0000751 goto skip;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000752 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200753 if (!filter_dev && f->dst)
754 goto skip;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000755
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200756 err = fdb_fill_info(skb, br, f,
757 NETLINK_CB(cb->skb).portid,
758 cb->nlh->nlmsg_seq,
759 RTM_NEWNEIGH,
760 NLM_F_MULTI);
761 if (err < 0)
762 break;
763skip:
764 *idx += 1;
765 }
766 rcu_read_unlock();
767
Roopa Prabhud2976532016-08-30 21:56:45 -0700768 return err;
stephen hemmingerb078f0d2011-04-04 14:03:30 +0000769}
stephen hemminger36fd2b62011-04-04 14:03:31 +0000770
stephen hemminger292d1392011-11-09 18:30:08 +0000771/* Update (create or replace) forwarding database entry */
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900772static int fdb_add_entry(struct net_bridge *br, struct net_bridge_port *source,
773 const __u8 *addr, __u16 state, __u16 flags, __u16 vid)
stephen hemminger36fd2b62011-04-04 14:03:31 +0000774{
stephen hemminger36fd2b62011-04-04 14:03:31 +0000775 struct net_bridge_fdb_entry *fdb;
roopab0a397f2013-04-22 12:56:49 +0000776 bool modified = false;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000777
Wilson Kokeb8d7ba2015-05-25 06:39:31 -0700778 /* If the port cannot learn allow only local and static entries */
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900779 if (source && !(state & NUD_PERMANENT) && !(state & NUD_NOARP) &&
Wilson Kokeb8d7ba2015-05-25 06:39:31 -0700780 !(source->state == BR_STATE_LEARNING ||
781 source->state == BR_STATE_FORWARDING))
782 return -EPERM;
783
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900784 if (!source && !(state & NUD_PERMANENT)) {
785 pr_info("bridge: RTM_NEWNEIGH %s without NUD_PERMANENT\n",
786 br->dev->name);
787 return -EINVAL;
788 }
789
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100790 fdb = br_fdb_find(br, addr, vid);
stephen hemminger64af1ba2011-09-30 14:37:27 +0000791 if (fdb == NULL) {
792 if (!(flags & NLM_F_CREATE))
793 return -ENOENT;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000794
Nikolay Aleksandroveb793582017-12-12 16:02:50 +0200795 fdb = fdb_create(br, source, addr, vid, 0, 0);
stephen hemminger64af1ba2011-09-30 14:37:27 +0000796 if (!fdb)
797 return -ENOMEM;
roopab0a397f2013-04-22 12:56:49 +0000798
799 modified = true;
stephen hemminger64af1ba2011-09-30 14:37:27 +0000800 } else {
801 if (flags & NLM_F_EXCL)
802 return -EEXIST;
roopab0a397f2013-04-22 12:56:49 +0000803
804 if (fdb->dst != source) {
805 fdb->dst = source;
806 modified = true;
807 }
stephen hemminger64af1ba2011-09-30 14:37:27 +0000808 }
stephen hemminger36fd2b62011-04-04 14:03:31 +0000809
Roopa Prabhu37418732015-10-08 10:38:52 -0700810 if (fdb_to_nud(br, fdb) != state) {
Vlad Yasevich145beee2014-05-16 09:59:19 -0400811 if (state & NUD_PERMANENT) {
812 fdb->is_local = 1;
813 if (!fdb->is_static) {
814 fdb->is_static = 1;
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100815 fdb_add_hw_addr(br, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400816 }
817 } else if (state & NUD_NOARP) {
stephen hemminger292d1392011-11-09 18:30:08 +0000818 fdb->is_local = 0;
Vlad Yasevich145beee2014-05-16 09:59:19 -0400819 if (!fdb->is_static) {
820 fdb->is_static = 1;
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100821 fdb_add_hw_addr(br, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400822 }
823 } else {
824 fdb->is_local = 0;
825 if (fdb->is_static) {
826 fdb->is_static = 0;
Jiri Pirko020ec6b2014-11-28 14:34:12 +0100827 fdb_del_hw_addr(br, addr);
Vlad Yasevich145beee2014-05-16 09:59:19 -0400828 }
829 }
stephen hemminger292d1392011-11-09 18:30:08 +0000830
roopab0a397f2013-04-22 12:56:49 +0000831 modified = true;
832 }
Toshiaki Makitaa5642ab2014-02-07 16:48:18 +0900833 fdb->added_by_user = 1;
roopab0a397f2013-04-22 12:56:49 +0000834
835 fdb->used = jiffies;
836 if (modified) {
837 fdb->updated = jiffies;
Petr Machata161d82d2018-05-03 14:43:53 +0200838 fdb_notify(br, fdb, RTM_NEWNEIGH, true);
stephen hemminger292d1392011-11-09 18:30:08 +0000839 }
840
stephen hemminger36fd2b62011-04-04 14:03:31 +0000841 return 0;
842}
843
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900844static int __br_fdb_add(struct ndmsg *ndm, struct net_bridge *br,
845 struct net_bridge_port *p, const unsigned char *addr,
846 u16 nlh_flags, u16 vid)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000847{
848 int err = 0;
849
850 if (ndm->ndm_flags & NTF_USE) {
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900851 if (!p) {
852 pr_info("bridge: RTM_NEWNEIGH %s with NTF_USE is not supported\n",
853 br->dev->name);
854 return -EINVAL;
855 }
Nikolay Aleksandrovc4c832f2015-06-06 06:49:00 -0700856 local_bh_disable();
Vlad Yasevich1690be62013-02-13 12:00:18 +0000857 rcu_read_lock();
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900858 br_fdb_update(br, p, addr, vid, true);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000859 rcu_read_unlock();
Nikolay Aleksandrovc4c832f2015-06-06 06:49:00 -0700860 local_bh_enable();
Nikolay Aleksandroveb100e02017-03-23 12:27:13 +0200861 } else if (ndm->ndm_flags & NTF_EXT_LEARNED) {
Petr Machata161d82d2018-05-03 14:43:53 +0200862 err = br_fdb_external_learn_add(br, p, addr, vid, true);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000863 } else {
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900864 spin_lock_bh(&br->hash_lock);
865 err = fdb_add_entry(br, p, addr, ndm->ndm_state,
Vlad Yasevich1690be62013-02-13 12:00:18 +0000866 nlh_flags, vid);
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900867 spin_unlock_bh(&br->hash_lock);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000868 }
869
870 return err;
871}
872
stephen hemminger36fd2b62011-04-04 14:03:31 +0000873/* Add new permanent fdb entry with RTM_NEWNEIGH */
stephen hemmingeredc7d572012-10-01 12:32:33 +0000874int br_fdb_add(struct ndmsg *ndm, struct nlattr *tb[],
875 struct net_device *dev,
Jiri Pirkof6f64242014-11-28 14:34:15 +0100876 const unsigned char *addr, u16 vid, u16 nlh_flags)
stephen hemminger36fd2b62011-04-04 14:03:31 +0000877{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200878 struct net_bridge_vlan_group *vg;
Roopa Prabhu37418732015-10-08 10:38:52 -0700879 struct net_bridge_port *p = NULL;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200880 struct net_bridge_vlan *v;
Roopa Prabhu37418732015-10-08 10:38:52 -0700881 struct net_bridge *br = NULL;
John Fastabend77162022012-04-15 06:43:56 +0000882 int err = 0;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000883
Roopa Prabhub74fd302017-08-29 13:16:57 -0700884 trace_br_fdb_add(ndm, dev, addr, vid, nlh_flags);
885
stephen hemminger292d1392011-11-09 18:30:08 +0000886 if (!(ndm->ndm_state & (NUD_PERMANENT|NUD_NOARP|NUD_REACHABLE))) {
887 pr_info("bridge: RTM_NEWNEIGH with invalid state %#x\n", ndm->ndm_state);
888 return -EINVAL;
889 }
890
Stephen Hemminger537f7f82013-06-25 09:34:36 -0700891 if (is_zero_ether_addr(addr)) {
892 pr_info("bridge: RTM_NEWNEIGH with invalid ether address\n");
893 return -EINVAL;
894 }
895
Roopa Prabhu37418732015-10-08 10:38:52 -0700896 if (dev->priv_flags & IFF_EBRIDGE) {
897 br = netdev_priv(dev);
898 vg = br_vlan_group(br);
899 } else {
900 p = br_port_get_rtnl(dev);
901 if (!p) {
902 pr_info("bridge: RTM_NEWNEIGH %s not a bridge port\n",
903 dev->name);
904 return -EINVAL;
905 }
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900906 br = p->br;
Roopa Prabhu37418732015-10-08 10:38:52 -0700907 vg = nbp_vlan_group(p);
stephen hemminger36fd2b62011-04-04 14:03:31 +0000908 }
909
Jiri Pirkof6f64242014-11-28 14:34:15 +0100910 if (vid) {
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200911 v = br_vlan_find(vg, vid);
Roopa Prabhu37418732015-10-08 10:38:52 -0700912 if (!v || !br_vlan_should_use(v)) {
913 pr_info("bridge: RTM_NEWNEIGH with unconfigured vlan %d on %s\n", vid, dev->name);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000914 return -EINVAL;
915 }
916
917 /* VID was specified, so use it. */
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900918 err = __br_fdb_add(ndm, br, p, addr, nlh_flags, vid);
stephen hemminger292d1392011-11-09 18:30:08 +0000919 } else {
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900920 err = __br_fdb_add(ndm, br, p, addr, nlh_flags, 0);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200921 if (err || !vg || !vg->num_vlans)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000922 goto out;
Vlad Yasevich1690be62013-02-13 12:00:18 +0000923
924 /* We have vlans configured on this port and user didn't
925 * specify a VLAN. To be nice, add/update entry for every
926 * vlan on this port.
927 */
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200928 list_for_each_entry(v, &vg->vlan_list, vlist) {
Roopa Prabhu37418732015-10-08 10:38:52 -0700929 if (!br_vlan_should_use(v))
930 continue;
Toshiaki Makita7bb90c32016-08-04 11:11:19 +0900931 err = __br_fdb_add(ndm, br, p, addr, nlh_flags, v->vid);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000932 if (err)
933 goto out;
Vlad Yasevich1690be62013-02-13 12:00:18 +0000934 }
stephen hemminger292d1392011-11-09 18:30:08 +0000935 }
stephen hemminger36fd2b62011-04-04 14:03:31 +0000936
Vlad Yasevich1690be62013-02-13 12:00:18 +0000937out:
938 return err;
939}
940
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100941static int fdb_delete_by_addr_and_port(struct net_bridge *br,
942 const struct net_bridge_port *p,
Nikolay Aleksandrov8c86f962015-06-09 03:34:13 -0700943 const u8 *addr, u16 vlan)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000944{
Vlad Yasevich1690be62013-02-13 12:00:18 +0000945 struct net_bridge_fdb_entry *fdb;
946
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +0100947 fdb = br_fdb_find(br, addr, vlan);
Nikolay Aleksandrov8c86f962015-06-09 03:34:13 -0700948 if (!fdb || fdb->dst != p)
Vlad Yasevich1690be62013-02-13 12:00:18 +0000949 return -ENOENT;
950
Petr Machata161d82d2018-05-03 14:43:53 +0200951 fdb_delete(br, fdb, true);
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100952
Vlad Yasevich1690be62013-02-13 12:00:18 +0000953 return 0;
954}
955
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100956static int __br_fdb_delete(struct net_bridge *br,
957 const struct net_bridge_port *p,
Vlad Yasevich1690be62013-02-13 12:00:18 +0000958 const unsigned char *addr, u16 vid)
959{
960 int err;
961
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100962 spin_lock_bh(&br->hash_lock);
963 err = fdb_delete_by_addr_and_port(br, p, addr, vid);
964 spin_unlock_bh(&br->hash_lock);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000965
stephen hemminger36fd2b62011-04-04 14:03:31 +0000966 return err;
967}
968
stephen hemminger36fd2b62011-04-04 14:03:31 +0000969/* Remove neighbor entry with RTM_DELNEIGH */
Vlad Yasevich1690be62013-02-13 12:00:18 +0000970int br_fdb_delete(struct ndmsg *ndm, struct nlattr *tb[],
971 struct net_device *dev,
Jiri Pirkof6f64242014-11-28 14:34:15 +0100972 const unsigned char *addr, u16 vid)
stephen hemminger36fd2b62011-04-04 14:03:31 +0000973{
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200974 struct net_bridge_vlan_group *vg;
Roopa Prabhu37418732015-10-08 10:38:52 -0700975 struct net_bridge_port *p = NULL;
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200976 struct net_bridge_vlan *v;
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100977 struct net_bridge *br;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000978 int err;
979
Roopa Prabhu37418732015-10-08 10:38:52 -0700980 if (dev->priv_flags & IFF_EBRIDGE) {
981 br = netdev_priv(dev);
982 vg = br_vlan_group(br);
983 } else {
984 p = br_port_get_rtnl(dev);
985 if (!p) {
986 pr_info("bridge: RTM_DELNEIGH %s not a bridge port\n",
987 dev->name);
988 return -EINVAL;
989 }
990 vg = nbp_vlan_group(p);
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +0100991 br = p->br;
stephen hemminger36fd2b62011-04-04 14:03:31 +0000992 }
993
Jiri Pirkof6f64242014-11-28 14:34:15 +0100994 if (vid) {
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +0200995 v = br_vlan_find(vg, vid);
996 if (!v) {
Roopa Prabhu37418732015-10-08 10:38:52 -0700997 pr_info("bridge: RTM_DELNEIGH with unconfigured vlan %d on %s\n", vid, dev->name);
Vlad Yasevich1690be62013-02-13 12:00:18 +0000998 return -EINVAL;
999 }
stephen hemminger36fd2b62011-04-04 14:03:31 +00001000
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001001 err = __br_fdb_delete(br, p, addr, vid);
Vlad Yasevich1690be62013-02-13 12:00:18 +00001002 } else {
Toshiaki Makita25d3b492015-02-09 20:16:17 +09001003 err = -ENOENT;
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001004 err &= __br_fdb_delete(br, p, addr, 0);
Nikolay Aleksandrov2594e9062015-09-25 19:00:11 +02001005 if (!vg || !vg->num_vlans)
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001006 return err;
Vlad Yasevich1690be62013-02-13 12:00:18 +00001007
Roopa Prabhu37418732015-10-08 10:38:52 -07001008 list_for_each_entry(v, &vg->vlan_list, vlist) {
1009 if (!br_vlan_should_use(v))
1010 continue;
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001011 err &= __br_fdb_delete(br, p, addr, v->vid);
Roopa Prabhu37418732015-10-08 10:38:52 -07001012 }
Vlad Yasevich1690be62013-02-13 12:00:18 +00001013 }
Nikolay Aleksandrov5019ab52017-02-13 14:59:11 +01001014
stephen hemminger36fd2b62011-04-04 14:03:31 +00001015 return err;
1016}
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001017
1018int br_fdb_sync_static(struct net_bridge *br, struct net_bridge_port *p)
1019{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001020 struct net_bridge_fdb_entry *f, *tmp;
Geert Uytterhoeven367dc652018-02-01 11:25:27 +01001021 int err = 0;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001022
1023 ASSERT_RTNL();
1024
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001025 /* the key here is that static entries change only under rtnl */
1026 rcu_read_lock();
1027 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
1028 /* We only care for static entries */
1029 if (!f->is_static)
1030 continue;
1031 err = dev_uc_add(p->dev, f->key.addr.addr);
1032 if (err)
1033 goto rollback;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001034 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001035done:
1036 rcu_read_unlock();
1037
1038 return err;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001039
1040rollback:
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001041 hlist_for_each_entry_rcu(tmp, &br->fdb_list, fdb_node) {
1042 /* We only care for static entries */
1043 if (!tmp->is_static)
1044 continue;
1045 if (tmp == f)
1046 break;
1047 dev_uc_del(p->dev, tmp->key.addr.addr);
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001048 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001049
1050 goto done;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001051}
1052
1053void br_fdb_unsync_static(struct net_bridge *br, struct net_bridge_port *p)
1054{
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001055 struct net_bridge_fdb_entry *f;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001056
1057 ASSERT_RTNL();
1058
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001059 rcu_read_lock();
1060 hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) {
1061 /* We only care for static entries */
1062 if (!f->is_static)
1063 continue;
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001064
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001065 dev_uc_del(p->dev, f->key.addr.addr);
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001066 }
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001067 rcu_read_unlock();
Vlad Yasevich8db24af2014-05-16 09:59:17 -04001068}
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001069
Jiri Pirko3aeb6612015-01-15 23:49:37 +01001070int br_fdb_external_learn_add(struct net_bridge *br, struct net_bridge_port *p,
Petr Machata161d82d2018-05-03 14:43:53 +02001071 const unsigned char *addr, u16 vid,
1072 bool swdev_notify)
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001073{
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001074 struct net_bridge_fdb_entry *fdb;
Nikolay Aleksandrov7597b262017-07-03 15:14:59 -07001075 bool modified = false;
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001076 int err = 0;
1077
Roopa Prabhub74fd302017-08-29 13:16:57 -07001078 trace_br_fdb_external_learn_add(br, p, addr, vid);
1079
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001080 spin_lock_bh(&br->hash_lock);
1081
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +01001082 fdb = br_fdb_find(br, addr, vid);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001083 if (!fdb) {
Nikolay Aleksandroveb793582017-12-12 16:02:50 +02001084 fdb = fdb_create(br, p, addr, vid, 0, 0);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001085 if (!fdb) {
1086 err = -ENOMEM;
1087 goto err_unlock;
1088 }
1089 fdb->added_by_external_learn = 1;
Petr Machata161d82d2018-05-03 14:43:53 +02001090 fdb_notify(br, fdb, RTM_NEWNEIGH, swdev_notify);
Nikolay Aleksandrov7597b262017-07-03 15:14:59 -07001091 } else {
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001092 fdb->updated = jiffies;
Nikolay Aleksandrov7597b262017-07-03 15:14:59 -07001093
1094 if (fdb->dst != p) {
1095 fdb->dst = p;
1096 modified = true;
1097 }
1098
1099 if (fdb->added_by_external_learn) {
1100 /* Refresh entry */
1101 fdb->used = jiffies;
1102 } else if (!fdb->added_by_user) {
1103 /* Take over SW learned entry */
1104 fdb->added_by_external_learn = 1;
1105 modified = true;
1106 }
1107
1108 if (modified)
Petr Machata161d82d2018-05-03 14:43:53 +02001109 fdb_notify(br, fdb, RTM_NEWNEIGH, swdev_notify);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001110 }
1111
1112err_unlock:
1113 spin_unlock_bh(&br->hash_lock);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001114
1115 return err;
1116}
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001117
Jiri Pirko3aeb6612015-01-15 23:49:37 +01001118int br_fdb_external_learn_del(struct net_bridge *br, struct net_bridge_port *p,
Petr Machata161d82d2018-05-03 14:43:53 +02001119 const unsigned char *addr, u16 vid,
1120 bool swdev_notify)
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001121{
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001122 struct net_bridge_fdb_entry *fdb;
1123 int err = 0;
1124
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001125 spin_lock_bh(&br->hash_lock);
1126
Nikolay Aleksandrovbfd0aea2017-02-13 14:59:09 +01001127 fdb = br_fdb_find(br, addr, vid);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001128 if (fdb && fdb->added_by_external_learn)
Petr Machata161d82d2018-05-03 14:43:53 +02001129 fdb_delete(br, fdb, swdev_notify);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001130 else
1131 err = -ENOENT;
1132
1133 spin_unlock_bh(&br->hash_lock);
Scott Feldmancf6b8e12014-11-28 14:34:21 +01001134
1135 return err;
1136}
Arkadi Sharshevsky9fe8bce2017-06-08 08:44:15 +02001137
1138void br_fdb_offloaded_set(struct net_bridge *br, struct net_bridge_port *p,
1139 const unsigned char *addr, u16 vid)
1140{
1141 struct net_bridge_fdb_entry *fdb;
1142
1143 spin_lock_bh(&br->hash_lock);
1144
1145 fdb = br_fdb_find(br, addr, vid);
1146 if (fdb)
1147 fdb->offloaded = 1;
1148
1149 spin_unlock_bh(&br->hash_lock);
1150}