xref: /openbmc/linux/net/bridge/br_vlan.c (revision 07bc588f)
1243a2e63SVlad Yasevich #include <linux/kernel.h>
2243a2e63SVlad Yasevich #include <linux/netdevice.h>
3243a2e63SVlad Yasevich #include <linux/rtnetlink.h>
4243a2e63SVlad Yasevich #include <linux/slab.h>
57f109539SScott Feldman #include <net/switchdev.h>
6243a2e63SVlad Yasevich 
7243a2e63SVlad Yasevich #include "br_private.h"
8243a2e63SVlad Yasevich 
92594e906SNikolay Aleksandrov static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg,
102594e906SNikolay Aleksandrov 			      const void *ptr)
11552406c4SVlad Yasevich {
122594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *vle = ptr;
132594e906SNikolay Aleksandrov 	u16 vid = *(u16 *)arg->key;
142594e906SNikolay Aleksandrov 
152594e906SNikolay Aleksandrov 	return vle->vid != vid;
162594e906SNikolay Aleksandrov }
172594e906SNikolay Aleksandrov 
182594e906SNikolay Aleksandrov static const struct rhashtable_params br_vlan_rht_params = {
192594e906SNikolay Aleksandrov 	.head_offset = offsetof(struct net_bridge_vlan, vnode),
202594e906SNikolay Aleksandrov 	.key_offset = offsetof(struct net_bridge_vlan, vid),
212594e906SNikolay Aleksandrov 	.key_len = sizeof(u16),
228af78b64SNikolay Aleksandrov 	.nelem_hint = 3,
238af78b64SNikolay Aleksandrov 	.locks_mul = 1,
242594e906SNikolay Aleksandrov 	.max_size = VLAN_N_VID,
252594e906SNikolay Aleksandrov 	.obj_cmpfn = br_vlan_cmp,
262594e906SNikolay Aleksandrov 	.automatic_shrinking = true,
272594e906SNikolay Aleksandrov };
282594e906SNikolay Aleksandrov 
292594e906SNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid)
302594e906SNikolay Aleksandrov {
312594e906SNikolay Aleksandrov 	return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params);
322594e906SNikolay Aleksandrov }
332594e906SNikolay Aleksandrov 
3477751ee8SNikolay Aleksandrov static void __vlan_add_pvid(struct net_bridge_vlan_group *vg, u16 vid)
352594e906SNikolay Aleksandrov {
3677751ee8SNikolay Aleksandrov 	if (vg->pvid == vid)
37552406c4SVlad Yasevich 		return;
38552406c4SVlad Yasevich 
39552406c4SVlad Yasevich 	smp_wmb();
4077751ee8SNikolay Aleksandrov 	vg->pvid = vid;
41552406c4SVlad Yasevich }
42552406c4SVlad Yasevich 
4377751ee8SNikolay Aleksandrov static void __vlan_delete_pvid(struct net_bridge_vlan_group *vg, u16 vid)
44552406c4SVlad Yasevich {
4577751ee8SNikolay Aleksandrov 	if (vg->pvid != vid)
46552406c4SVlad Yasevich 		return;
47552406c4SVlad Yasevich 
48552406c4SVlad Yasevich 	smp_wmb();
4977751ee8SNikolay Aleksandrov 	vg->pvid = 0;
50552406c4SVlad Yasevich }
51552406c4SVlad Yasevich 
522594e906SNikolay Aleksandrov static void __vlan_add_flags(struct net_bridge_vlan *v, u16 flags)
5335e03f3aSVlad Yasevich {
5477751ee8SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
5577751ee8SNikolay Aleksandrov 
562594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v))
57907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(v->br);
58635126b7SVlad Yasevich 	else
59907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(v->port);
6077751ee8SNikolay Aleksandrov 
6177751ee8SNikolay Aleksandrov 	if (flags & BRIDGE_VLAN_INFO_PVID)
6277751ee8SNikolay Aleksandrov 		__vlan_add_pvid(vg, v->vid);
632594e906SNikolay Aleksandrov 	else
6477751ee8SNikolay Aleksandrov 		__vlan_delete_pvid(vg, v->vid);
6535e03f3aSVlad Yasevich 
6635e03f3aSVlad Yasevich 	if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
672594e906SNikolay Aleksandrov 		v->flags |= BRIDGE_VLAN_INFO_UNTAGGED;
68635126b7SVlad Yasevich 	else
692594e906SNikolay Aleksandrov 		v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED;
7035e03f3aSVlad Yasevich }
7135e03f3aSVlad Yasevich 
727f109539SScott Feldman static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br,
737f109539SScott Feldman 			  u16 vid, u16 flags)
747f109539SScott Feldman {
758f24f309SJiri Pirko 	struct switchdev_obj_port_vlan v = {
769e8f4a54SJiri Pirko 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
777f109539SScott Feldman 		.flags = flags,
783e3a78b4SScott Feldman 		.vid_begin = vid,
797f109539SScott Feldman 		.vid_end = vid,
807f109539SScott Feldman 	};
810944d6b5SJiri Pirko 	int err;
827f109539SScott Feldman 
830944d6b5SJiri Pirko 	/* Try switchdev op first. In case it is not supported, fallback to
840944d6b5SJiri Pirko 	 * 8021q add.
850944d6b5SJiri Pirko 	 */
869e8f4a54SJiri Pirko 	err = switchdev_port_obj_add(dev, &v.obj);
877f109539SScott Feldman 	if (err == -EOPNOTSUPP)
880944d6b5SJiri Pirko 		return vlan_vid_add(dev, br->vlan_proto, vid);
897f109539SScott Feldman 	return err;
907f109539SScott Feldman }
917f109539SScott Feldman 
922594e906SNikolay Aleksandrov static void __vlan_add_list(struct net_bridge_vlan *v)
93243a2e63SVlad Yasevich {
94907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
952594e906SNikolay Aleksandrov 	struct list_head *headp, *hpos;
962594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vent;
97243a2e63SVlad Yasevich 
98907b1e6eSNikolay Aleksandrov 	if (br_vlan_is_master(v))
99907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(v->br);
100907b1e6eSNikolay Aleksandrov 	else
101907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(v->port);
102907b1e6eSNikolay Aleksandrov 
103907b1e6eSNikolay Aleksandrov 	headp = &vg->vlan_list;
1042594e906SNikolay Aleksandrov 	list_for_each_prev(hpos, headp) {
1052594e906SNikolay Aleksandrov 		vent = list_entry(hpos, struct net_bridge_vlan, vlist);
1062594e906SNikolay Aleksandrov 		if (v->vid < vent->vid)
1072594e906SNikolay Aleksandrov 			continue;
1082594e906SNikolay Aleksandrov 		else
1092594e906SNikolay Aleksandrov 			break;
1102594e906SNikolay Aleksandrov 	}
111586c2b57SNikolay Aleksandrov 	list_add_rcu(&v->vlist, hpos);
112552406c4SVlad Yasevich }
113243a2e63SVlad Yasevich 
1142594e906SNikolay Aleksandrov static void __vlan_del_list(struct net_bridge_vlan *v)
1152594e906SNikolay Aleksandrov {
116586c2b57SNikolay Aleksandrov 	list_del_rcu(&v->vlist);
117243a2e63SVlad Yasevich }
118243a2e63SVlad Yasevich 
119bf361ad3SVivien Didelot static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br,
1207f109539SScott Feldman 			  u16 vid)
1217f109539SScott Feldman {
1228f24f309SJiri Pirko 	struct switchdev_obj_port_vlan v = {
1239e8f4a54SJiri Pirko 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
1243e3a78b4SScott Feldman 		.vid_begin = vid,
1257f109539SScott Feldman 		.vid_end = vid,
1267f109539SScott Feldman 	};
1270944d6b5SJiri Pirko 	int err;
1287f109539SScott Feldman 
1290944d6b5SJiri Pirko 	/* Try switchdev op first. In case it is not supported, fallback to
1300944d6b5SJiri Pirko 	 * 8021q del.
1310944d6b5SJiri Pirko 	 */
1329e8f4a54SJiri Pirko 	err = switchdev_port_obj_del(dev, &v.obj);
1330944d6b5SJiri Pirko 	if (err == -EOPNOTSUPP) {
1340944d6b5SJiri Pirko 		vlan_vid_del(dev, br->vlan_proto, vid);
1350944d6b5SJiri Pirko 		return 0;
1367f109539SScott Feldman 	}
137bf361ad3SVivien Didelot 	return err;
1387f109539SScott Feldman }
1397f109539SScott Feldman 
140f8ed289fSNikolay Aleksandrov /* Returns a master vlan, if it didn't exist it gets created. In all cases a
141f8ed289fSNikolay Aleksandrov  * a reference is taken to the master vlan before returning.
142f8ed289fSNikolay Aleksandrov  */
143f8ed289fSNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_get_master(struct net_bridge *br, u16 vid)
144f8ed289fSNikolay Aleksandrov {
145907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
146f8ed289fSNikolay Aleksandrov 	struct net_bridge_vlan *masterv;
147f8ed289fSNikolay Aleksandrov 
148907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
149907b1e6eSNikolay Aleksandrov 	masterv = br_vlan_find(vg, vid);
150f8ed289fSNikolay Aleksandrov 	if (!masterv) {
151f8ed289fSNikolay Aleksandrov 		/* missing global ctx, create it now */
152f8ed289fSNikolay Aleksandrov 		if (br_vlan_add(br, vid, 0))
153f8ed289fSNikolay Aleksandrov 			return NULL;
154907b1e6eSNikolay Aleksandrov 		masterv = br_vlan_find(vg, vid);
155f8ed289fSNikolay Aleksandrov 		if (WARN_ON(!masterv))
156f8ed289fSNikolay Aleksandrov 			return NULL;
157f8ed289fSNikolay Aleksandrov 	}
158f8ed289fSNikolay Aleksandrov 	atomic_inc(&masterv->refcnt);
159f8ed289fSNikolay Aleksandrov 
160f8ed289fSNikolay Aleksandrov 	return masterv;
161f8ed289fSNikolay Aleksandrov }
162f8ed289fSNikolay Aleksandrov 
163f8ed289fSNikolay Aleksandrov static void br_vlan_put_master(struct net_bridge_vlan *masterv)
164f8ed289fSNikolay Aleksandrov {
165907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
166907b1e6eSNikolay Aleksandrov 
167f8ed289fSNikolay Aleksandrov 	if (!br_vlan_is_master(masterv))
168f8ed289fSNikolay Aleksandrov 		return;
169f8ed289fSNikolay Aleksandrov 
170907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(masterv->br);
171f8ed289fSNikolay Aleksandrov 	if (atomic_dec_and_test(&masterv->refcnt)) {
172907b1e6eSNikolay Aleksandrov 		rhashtable_remove_fast(&vg->vlan_hash,
173f8ed289fSNikolay Aleksandrov 				       &masterv->vnode, br_vlan_rht_params);
174f8ed289fSNikolay Aleksandrov 		__vlan_del_list(masterv);
175f8ed289fSNikolay Aleksandrov 		kfree_rcu(masterv, rcu);
176f8ed289fSNikolay Aleksandrov 	}
177f8ed289fSNikolay Aleksandrov }
178f8ed289fSNikolay Aleksandrov 
1792594e906SNikolay Aleksandrov /* This is the shared VLAN add function which works for both ports and bridge
1802594e906SNikolay Aleksandrov  * devices. There are four possible calls to this function in terms of the
1812594e906SNikolay Aleksandrov  * vlan entry type:
1822594e906SNikolay Aleksandrov  * 1. vlan is being added on a port (no master flags, global entry exists)
1832594e906SNikolay Aleksandrov  * 2. vlan is being added on a bridge (both master and brvlan flags)
1842594e906SNikolay Aleksandrov  * 3. vlan is being added on a port, but a global entry didn't exist which
1852594e906SNikolay Aleksandrov  *    is being created right now (master flag set, brvlan flag unset), the
1862594e906SNikolay Aleksandrov  *    global entry is used for global per-vlan features, but not for filtering
1872594e906SNikolay Aleksandrov  * 4. same as 3 but with both master and brvlan flags set so the entry
1882594e906SNikolay Aleksandrov  *    will be used for filtering in both the port and the bridge
1892594e906SNikolay Aleksandrov  */
1902594e906SNikolay Aleksandrov static int __vlan_add(struct net_bridge_vlan *v, u16 flags)
191243a2e63SVlad Yasevich {
1922594e906SNikolay Aleksandrov 	struct net_bridge_vlan *masterv = NULL;
1932594e906SNikolay Aleksandrov 	struct net_bridge_port *p = NULL;
1946be144f6SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
1952594e906SNikolay Aleksandrov 	struct net_device *dev;
1962594e906SNikolay Aleksandrov 	struct net_bridge *br;
197bf361ad3SVivien Didelot 	int err;
198bf361ad3SVivien Didelot 
1992594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
2002594e906SNikolay Aleksandrov 		br = v->br;
2012594e906SNikolay Aleksandrov 		dev = br->dev;
202907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(br);
2032594e906SNikolay Aleksandrov 	} else {
2042594e906SNikolay Aleksandrov 		p = v->port;
2052594e906SNikolay Aleksandrov 		br = p->br;
2062594e906SNikolay Aleksandrov 		dev = p->dev;
207907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
2082594e906SNikolay Aleksandrov 	}
2092594e906SNikolay Aleksandrov 
2102594e906SNikolay Aleksandrov 	if (p) {
2112594e906SNikolay Aleksandrov 		/* Add VLAN to the device filter if it is supported.
2122594e906SNikolay Aleksandrov 		 * This ensures tagged traffic enters the bridge when
2132594e906SNikolay Aleksandrov 		 * promiscuous mode is disabled by br_manage_promisc().
2142594e906SNikolay Aleksandrov 		 */
2152594e906SNikolay Aleksandrov 		err = __vlan_vid_add(dev, br, v->vid, flags);
216bf361ad3SVivien Didelot 		if (err)
2172594e906SNikolay Aleksandrov 			goto out;
2182594e906SNikolay Aleksandrov 
2192594e906SNikolay Aleksandrov 		/* need to work on the master vlan too */
2202594e906SNikolay Aleksandrov 		if (flags & BRIDGE_VLAN_INFO_MASTER) {
2212ffdf508SNikolay Aleksandrov 			err = br_vlan_add(br, v->vid, flags |
2222ffdf508SNikolay Aleksandrov 						      BRIDGE_VLAN_INFO_BRENTRY);
2232594e906SNikolay Aleksandrov 			if (err)
2242594e906SNikolay Aleksandrov 				goto out_filt;
2252594e906SNikolay Aleksandrov 		}
2262594e906SNikolay Aleksandrov 
227f8ed289fSNikolay Aleksandrov 		masterv = br_vlan_get_master(br, v->vid);
228f8ed289fSNikolay Aleksandrov 		if (!masterv)
2292594e906SNikolay Aleksandrov 			goto out_filt;
2302594e906SNikolay Aleksandrov 		v->brvlan = masterv;
2312594e906SNikolay Aleksandrov 	}
2322594e906SNikolay Aleksandrov 
2336be144f6SNikolay Aleksandrov 	/* Add the dev mac and count the vlan only if it's usable */
2342594e906SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
2352594e906SNikolay Aleksandrov 		err = br_fdb_insert(br, p, dev->dev_addr, v->vid);
2362594e906SNikolay Aleksandrov 		if (err) {
2372594e906SNikolay Aleksandrov 			br_err(br, "failed insert local address into bridge forwarding table\n");
2382594e906SNikolay Aleksandrov 			goto out_filt;
2392594e906SNikolay Aleksandrov 		}
2406be144f6SNikolay Aleksandrov 		vg->num_vlans++;
2412594e906SNikolay Aleksandrov 	}
2422594e906SNikolay Aleksandrov 
2436be144f6SNikolay Aleksandrov 	err = rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode,
2446be144f6SNikolay Aleksandrov 					    br_vlan_rht_params);
2452594e906SNikolay Aleksandrov 	if (err)
2462594e906SNikolay Aleksandrov 		goto out_fdb_insert;
2472594e906SNikolay Aleksandrov 
2482594e906SNikolay Aleksandrov 	__vlan_add_list(v);
2492594e906SNikolay Aleksandrov 	__vlan_add_flags(v, flags);
2502594e906SNikolay Aleksandrov out:
2512594e906SNikolay Aleksandrov 	return err;
2522594e906SNikolay Aleksandrov 
2532594e906SNikolay Aleksandrov out_fdb_insert:
2546be144f6SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
2556be144f6SNikolay Aleksandrov 		br_fdb_find_delete_local(br, p, dev->dev_addr, v->vid);
2566be144f6SNikolay Aleksandrov 		vg->num_vlans--;
2576be144f6SNikolay Aleksandrov 	}
2582594e906SNikolay Aleksandrov 
2592594e906SNikolay Aleksandrov out_filt:
2602594e906SNikolay Aleksandrov 	if (p) {
2612594e906SNikolay Aleksandrov 		__vlan_vid_del(dev, br, v->vid);
2622594e906SNikolay Aleksandrov 		if (masterv) {
263f8ed289fSNikolay Aleksandrov 			br_vlan_put_master(masterv);
2642594e906SNikolay Aleksandrov 			v->brvlan = NULL;
2652594e906SNikolay Aleksandrov 		}
2662594e906SNikolay Aleksandrov 	}
2672594e906SNikolay Aleksandrov 
2682594e906SNikolay Aleksandrov 	goto out;
2692594e906SNikolay Aleksandrov }
2702594e906SNikolay Aleksandrov 
2712594e906SNikolay Aleksandrov static int __vlan_del(struct net_bridge_vlan *v)
2722594e906SNikolay Aleksandrov {
2732594e906SNikolay Aleksandrov 	struct net_bridge_vlan *masterv = v;
27477751ee8SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
2752594e906SNikolay Aleksandrov 	struct net_bridge_port *p = NULL;
2762594e906SNikolay Aleksandrov 	int err = 0;
2772594e906SNikolay Aleksandrov 
2782594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
279907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(v->br);
2802594e906SNikolay Aleksandrov 	} else {
2812594e906SNikolay Aleksandrov 		p = v->port;
282907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(v->port);
2832594e906SNikolay Aleksandrov 		masterv = v->brvlan;
2842594e906SNikolay Aleksandrov 	}
2852594e906SNikolay Aleksandrov 
28677751ee8SNikolay Aleksandrov 	__vlan_delete_pvid(vg, v->vid);
2872594e906SNikolay Aleksandrov 	if (p) {
2882594e906SNikolay Aleksandrov 		err = __vlan_vid_del(p->dev, p->br, v->vid);
2892594e906SNikolay Aleksandrov 		if (err)
2902594e906SNikolay Aleksandrov 			goto out;
2912594e906SNikolay Aleksandrov 	}
2922594e906SNikolay Aleksandrov 
2936be144f6SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
2942594e906SNikolay Aleksandrov 		v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY;
2956be144f6SNikolay Aleksandrov 		vg->num_vlans--;
2962594e906SNikolay Aleksandrov 	}
2972594e906SNikolay Aleksandrov 
2982594e906SNikolay Aleksandrov 	if (masterv != v) {
29977751ee8SNikolay Aleksandrov 		rhashtable_remove_fast(&vg->vlan_hash, &v->vnode,
30077751ee8SNikolay Aleksandrov 				       br_vlan_rht_params);
3012594e906SNikolay Aleksandrov 		__vlan_del_list(v);
3022594e906SNikolay Aleksandrov 		kfree_rcu(v, rcu);
3032594e906SNikolay Aleksandrov 	}
3042594e906SNikolay Aleksandrov 
305f8ed289fSNikolay Aleksandrov 	br_vlan_put_master(masterv);
3062594e906SNikolay Aleksandrov out:
307bf361ad3SVivien Didelot 	return err;
3088580e211SToshiaki Makita }
309243a2e63SVlad Yasevich 
310f409d0edSNikolay Aleksandrov static void __vlan_group_free(struct net_bridge_vlan_group *vg)
311f409d0edSNikolay Aleksandrov {
312f409d0edSNikolay Aleksandrov 	WARN_ON(!list_empty(&vg->vlan_list));
313f409d0edSNikolay Aleksandrov 	rhashtable_destroy(&vg->vlan_hash);
314f409d0edSNikolay Aleksandrov 	kfree(vg);
315f409d0edSNikolay Aleksandrov }
316f409d0edSNikolay Aleksandrov 
317f409d0edSNikolay Aleksandrov static void __vlan_flush(struct net_bridge_vlan_group *vg)
318243a2e63SVlad Yasevich {
3192594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan, *tmp;
3202594e906SNikolay Aleksandrov 
321f409d0edSNikolay Aleksandrov 	__vlan_delete_pvid(vg, vg->pvid);
322f409d0edSNikolay Aleksandrov 	list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
3232594e906SNikolay Aleksandrov 		__vlan_del(vlan);
324243a2e63SVlad Yasevich }
325243a2e63SVlad Yasevich 
32678851988SVlad Yasevich struct sk_buff *br_handle_vlan(struct net_bridge *br,
3272594e906SNikolay Aleksandrov 			       struct net_bridge_vlan_group *vg,
328a37b85c9SVlad Yasevich 			       struct sk_buff *skb)
329a37b85c9SVlad Yasevich {
3302594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
331a37b85c9SVlad Yasevich 	u16 vid;
332a37b85c9SVlad Yasevich 
33320adfa1aSVlad Yasevich 	/* If this packet was not filtered at input, let it pass */
33420adfa1aSVlad Yasevich 	if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
33578851988SVlad Yasevich 		goto out;
33678851988SVlad Yasevich 
3372594e906SNikolay Aleksandrov 	/* At this point, we know that the frame was filtered and contains
3382594e906SNikolay Aleksandrov 	 * a valid vlan id.  If the vlan id has untagged flag set,
3392594e906SNikolay Aleksandrov 	 * send untagged; otherwise, send tagged.
3402594e906SNikolay Aleksandrov 	 */
3412594e906SNikolay Aleksandrov 	br_vlan_get_tag(skb, &vid);
3422594e906SNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
3432594e906SNikolay Aleksandrov 	/* Vlan entry must be configured at this point.  The
344fc92f745SVlad Yasevich 	 * only exception is the bridge is set in promisc mode and the
345fc92f745SVlad Yasevich 	 * packet is destined for the bridge device.  In this case
346fc92f745SVlad Yasevich 	 * pass the packet as is.
347fc92f745SVlad Yasevich 	 */
3482594e906SNikolay Aleksandrov 	if (!v || !br_vlan_should_use(v)) {
349fc92f745SVlad Yasevich 		if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
350fc92f745SVlad Yasevich 			goto out;
351fc92f745SVlad Yasevich 		} else {
352fc92f745SVlad Yasevich 			kfree_skb(skb);
353fc92f745SVlad Yasevich 			return NULL;
354fc92f745SVlad Yasevich 		}
355fc92f745SVlad Yasevich 	}
3562594e906SNikolay Aleksandrov 	if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)
35799b192daSToshiaki Makita 		skb->vlan_tci = 0;
35878851988SVlad Yasevich 
35978851988SVlad Yasevich out:
36078851988SVlad Yasevich 	return skb;
36178851988SVlad Yasevich }
36278851988SVlad Yasevich 
36378851988SVlad Yasevich /* Called under RCU */
36477751ee8SNikolay Aleksandrov static bool __allowed_ingress(struct net_bridge_vlan_group *vg, __be16 proto,
36578851988SVlad Yasevich 			      struct sk_buff *skb, u16 *vid)
36678851988SVlad Yasevich {
3672594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *v;
3688580e211SToshiaki Makita 	bool tagged;
369a37b85c9SVlad Yasevich 
37020adfa1aSVlad Yasevich 	BR_INPUT_SKB_CB(skb)->vlan_filtered = true;
37112464bb8SToshiaki Makita 	/* If vlan tx offload is disabled on bridge device and frame was
37212464bb8SToshiaki Makita 	 * sent from vlan device on the bridge device, it does not have
37312464bb8SToshiaki Makita 	 * HW accelerated vlan tag.
37412464bb8SToshiaki Makita 	 */
375df8a39deSJiri Pirko 	if (unlikely(!skb_vlan_tag_present(skb) &&
3768580e211SToshiaki Makita 		     skb->protocol == proto)) {
3770d5501c1SVlad Yasevich 		skb = skb_vlan_untag(skb);
37812464bb8SToshiaki Makita 		if (unlikely(!skb))
37912464bb8SToshiaki Makita 			return false;
38012464bb8SToshiaki Makita 	}
38112464bb8SToshiaki Makita 
3828580e211SToshiaki Makita 	if (!br_vlan_get_tag(skb, vid)) {
3838580e211SToshiaki Makita 		/* Tagged frame */
3848580e211SToshiaki Makita 		if (skb->vlan_proto != proto) {
3858580e211SToshiaki Makita 			/* Protocol-mismatch, empty out vlan_tci for new tag */
3868580e211SToshiaki Makita 			skb_push(skb, ETH_HLEN);
38762749e2cSJiri Pirko 			skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto,
388df8a39deSJiri Pirko 							skb_vlan_tag_get(skb));
3898580e211SToshiaki Makita 			if (unlikely(!skb))
3908580e211SToshiaki Makita 				return false;
3918580e211SToshiaki Makita 
3928580e211SToshiaki Makita 			skb_pull(skb, ETH_HLEN);
3938580e211SToshiaki Makita 			skb_reset_mac_len(skb);
3948580e211SToshiaki Makita 			*vid = 0;
3958580e211SToshiaki Makita 			tagged = false;
3968580e211SToshiaki Makita 		} else {
3978580e211SToshiaki Makita 			tagged = true;
3988580e211SToshiaki Makita 		}
3998580e211SToshiaki Makita 	} else {
4008580e211SToshiaki Makita 		/* Untagged frame */
4018580e211SToshiaki Makita 		tagged = false;
4028580e211SToshiaki Makita 	}
4038580e211SToshiaki Makita 
404b90356ceSToshiaki Makita 	if (!*vid) {
40577751ee8SNikolay Aleksandrov 		u16 pvid = br_get_pvid(vg);
40677751ee8SNikolay Aleksandrov 
407b90356ceSToshiaki Makita 		/* Frame had a tag with VID 0 or did not have a tag.
408b90356ceSToshiaki Makita 		 * See if pvid is set on this port.  That tells us which
409b90356ceSToshiaki Makita 		 * vlan untagged or priority-tagged traffic belongs to.
41078851988SVlad Yasevich 		 */
4113df6bf45SVlad Yasevich 		if (!pvid)
412eb707618SToshiaki Makita 			goto drop;
41378851988SVlad Yasevich 
414b90356ceSToshiaki Makita 		/* PVID is set on this port.  Any untagged or priority-tagged
415b90356ceSToshiaki Makita 		 * ingress frame is considered to belong to this vlan.
41678851988SVlad Yasevich 		 */
417dfb5fa32SToshiaki Makita 		*vid = pvid;
4188580e211SToshiaki Makita 		if (likely(!tagged))
419b90356ceSToshiaki Makita 			/* Untagged Frame. */
4208580e211SToshiaki Makita 			__vlan_hwaccel_put_tag(skb, proto, pvid);
421b90356ceSToshiaki Makita 		else
422b90356ceSToshiaki Makita 			/* Priority-tagged Frame.
423b90356ceSToshiaki Makita 			 * At this point, We know that skb->vlan_tci had
424b90356ceSToshiaki Makita 			 * VLAN_TAG_PRESENT bit and its VID field was 0x000.
425b90356ceSToshiaki Makita 			 * We update only VID field and preserve PCP field.
426b90356ceSToshiaki Makita 			 */
427b90356ceSToshiaki Makita 			skb->vlan_tci |= pvid;
428b90356ceSToshiaki Makita 
42978851988SVlad Yasevich 		return true;
43078851988SVlad Yasevich 	}
43178851988SVlad Yasevich 
43278851988SVlad Yasevich 	/* Frame had a valid vlan tag.  See if vlan is allowed */
43377751ee8SNikolay Aleksandrov 	v = br_vlan_find(vg, *vid);
4342594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v))
435a37b85c9SVlad Yasevich 		return true;
436eb707618SToshiaki Makita drop:
437eb707618SToshiaki Makita 	kfree_skb(skb);
438a37b85c9SVlad Yasevich 	return false;
439a37b85c9SVlad Yasevich }
440a37b85c9SVlad Yasevich 
44177751ee8SNikolay Aleksandrov bool br_allowed_ingress(const struct net_bridge *br,
44277751ee8SNikolay Aleksandrov 			struct net_bridge_vlan_group *vg, struct sk_buff *skb,
4432594e906SNikolay Aleksandrov 			u16 *vid)
4442594e906SNikolay Aleksandrov {
4452594e906SNikolay Aleksandrov 	/* If VLAN filtering is disabled on the bridge, all packets are
4462594e906SNikolay Aleksandrov 	 * permitted.
4472594e906SNikolay Aleksandrov 	 */
4482594e906SNikolay Aleksandrov 	if (!br->vlan_enabled) {
4492594e906SNikolay Aleksandrov 		BR_INPUT_SKB_CB(skb)->vlan_filtered = false;
4502594e906SNikolay Aleksandrov 		return true;
4512594e906SNikolay Aleksandrov 	}
4522594e906SNikolay Aleksandrov 
45377751ee8SNikolay Aleksandrov 	return __allowed_ingress(vg, br->vlan_proto, skb, vid);
4542594e906SNikolay Aleksandrov }
4552594e906SNikolay Aleksandrov 
45685f46c6bSVlad Yasevich /* Called under RCU. */
4572594e906SNikolay Aleksandrov bool br_allowed_egress(struct net_bridge_vlan_group *vg,
45885f46c6bSVlad Yasevich 		       const struct sk_buff *skb)
45985f46c6bSVlad Yasevich {
4602594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *v;
46185f46c6bSVlad Yasevich 	u16 vid;
46285f46c6bSVlad Yasevich 
46320adfa1aSVlad Yasevich 	/* If this packet was not filtered at input, let it pass */
46420adfa1aSVlad Yasevich 	if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
46585f46c6bSVlad Yasevich 		return true;
46685f46c6bSVlad Yasevich 
46785f46c6bSVlad Yasevich 	br_vlan_get_tag(skb, &vid);
4682594e906SNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
4692594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v))
47085f46c6bSVlad Yasevich 		return true;
47185f46c6bSVlad Yasevich 
47285f46c6bSVlad Yasevich 	return false;
47385f46c6bSVlad Yasevich }
47485f46c6bSVlad Yasevich 
475e0d7968aSToshiaki Makita /* Called under RCU */
476e0d7968aSToshiaki Makita bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
477e0d7968aSToshiaki Makita {
478468e7944SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
479e0d7968aSToshiaki Makita 	struct net_bridge *br = p->br;
480e0d7968aSToshiaki Makita 
48120adfa1aSVlad Yasevich 	/* If filtering was disabled at input, let it pass. */
482c095f248SVlad Yasevich 	if (!br->vlan_enabled)
483e0d7968aSToshiaki Makita 		return true;
484e0d7968aSToshiaki Makita 
485907b1e6eSNikolay Aleksandrov 	vg = nbp_vlan_group(p);
486468e7944SNikolay Aleksandrov 	if (!vg || !vg->num_vlans)
487e0d7968aSToshiaki Makita 		return false;
488e0d7968aSToshiaki Makita 
4898580e211SToshiaki Makita 	if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
4908580e211SToshiaki Makita 		*vid = 0;
4918580e211SToshiaki Makita 
492e0d7968aSToshiaki Makita 	if (!*vid) {
49377751ee8SNikolay Aleksandrov 		*vid = br_get_pvid(vg);
4943df6bf45SVlad Yasevich 		if (!*vid)
495e0d7968aSToshiaki Makita 			return false;
496e0d7968aSToshiaki Makita 
497e0d7968aSToshiaki Makita 		return true;
498e0d7968aSToshiaki Makita 	}
499e0d7968aSToshiaki Makita 
50077751ee8SNikolay Aleksandrov 	if (br_vlan_find(vg, *vid))
501e0d7968aSToshiaki Makita 		return true;
502e0d7968aSToshiaki Makita 
503e0d7968aSToshiaki Makita 	return false;
504e0d7968aSToshiaki Makita }
505e0d7968aSToshiaki Makita 
5068adff41cSToshiaki Makita /* Must be protected by RTNL.
5078adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
5088adff41cSToshiaki Makita  */
509552406c4SVlad Yasevich int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
510243a2e63SVlad Yasevich {
511907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
5122594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
5132594e906SNikolay Aleksandrov 	int ret;
514243a2e63SVlad Yasevich 
515243a2e63SVlad Yasevich 	ASSERT_RTNL();
516243a2e63SVlad Yasevich 
517907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
518907b1e6eSNikolay Aleksandrov 	vlan = br_vlan_find(vg, vid);
5192594e906SNikolay Aleksandrov 	if (vlan) {
5202594e906SNikolay Aleksandrov 		if (!br_vlan_is_brentry(vlan)) {
5212594e906SNikolay Aleksandrov 			/* Trying to change flags of non-existent bridge vlan */
5222594e906SNikolay Aleksandrov 			if (!(flags & BRIDGE_VLAN_INFO_BRENTRY))
5232594e906SNikolay Aleksandrov 				return -EINVAL;
5242594e906SNikolay Aleksandrov 			/* It was only kept for port vlans, now make it real */
5252594e906SNikolay Aleksandrov 			ret = br_fdb_insert(br, NULL, br->dev->dev_addr,
5262594e906SNikolay Aleksandrov 					    vlan->vid);
5272594e906SNikolay Aleksandrov 			if (ret) {
5282594e906SNikolay Aleksandrov 				br_err(br, "failed insert local address into bridge forwarding table\n");
5292594e906SNikolay Aleksandrov 				return ret;
5302594e906SNikolay Aleksandrov 			}
5312594e906SNikolay Aleksandrov 			atomic_inc(&vlan->refcnt);
5322594e906SNikolay Aleksandrov 			vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY;
533907b1e6eSNikolay Aleksandrov 			vg->num_vlans++;
5342594e906SNikolay Aleksandrov 		}
5352594e906SNikolay Aleksandrov 		__vlan_add_flags(vlan, flags);
5362594e906SNikolay Aleksandrov 		return 0;
5372594e906SNikolay Aleksandrov 	}
538243a2e63SVlad Yasevich 
5392594e906SNikolay Aleksandrov 	vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
5402594e906SNikolay Aleksandrov 	if (!vlan)
541243a2e63SVlad Yasevich 		return -ENOMEM;
542243a2e63SVlad Yasevich 
5432594e906SNikolay Aleksandrov 	vlan->vid = vid;
5442594e906SNikolay Aleksandrov 	vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER;
5452594e906SNikolay Aleksandrov 	vlan->flags &= ~BRIDGE_VLAN_INFO_PVID;
5462594e906SNikolay Aleksandrov 	vlan->br = br;
5472594e906SNikolay Aleksandrov 	if (flags & BRIDGE_VLAN_INFO_BRENTRY)
5482594e906SNikolay Aleksandrov 		atomic_set(&vlan->refcnt, 1);
5492594e906SNikolay Aleksandrov 	ret = __vlan_add(vlan, flags);
5502594e906SNikolay Aleksandrov 	if (ret)
5512594e906SNikolay Aleksandrov 		kfree(vlan);
552243a2e63SVlad Yasevich 
5532594e906SNikolay Aleksandrov 	return ret;
554243a2e63SVlad Yasevich }
555243a2e63SVlad Yasevich 
5568adff41cSToshiaki Makita /* Must be protected by RTNL.
5578adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
5588adff41cSToshiaki Makita  */
559243a2e63SVlad Yasevich int br_vlan_delete(struct net_bridge *br, u16 vid)
560243a2e63SVlad Yasevich {
561907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
5622594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
563243a2e63SVlad Yasevich 
564243a2e63SVlad Yasevich 	ASSERT_RTNL();
565243a2e63SVlad Yasevich 
566907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
567907b1e6eSNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
5682594e906SNikolay Aleksandrov 	if (!v || !br_vlan_is_brentry(v))
5692594e906SNikolay Aleksandrov 		return -ENOENT;
570243a2e63SVlad Yasevich 
571424bb9c9SToshiaki Makita 	br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
5723741873bSRoopa Prabhu 	br_fdb_delete_by_port(br, NULL, vid, 0);
573bc9a25d2SVlad Yasevich 
5742594e906SNikolay Aleksandrov 	return __vlan_del(v);
575243a2e63SVlad Yasevich }
576243a2e63SVlad Yasevich 
577243a2e63SVlad Yasevich void br_vlan_flush(struct net_bridge *br)
578243a2e63SVlad Yasevich {
579f409d0edSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
580f409d0edSNikolay Aleksandrov 
581243a2e63SVlad Yasevich 	ASSERT_RTNL();
582243a2e63SVlad Yasevich 
583f409d0edSNikolay Aleksandrov 	vg = br_vlan_group(br);
584f409d0edSNikolay Aleksandrov 	__vlan_flush(vg);
585f409d0edSNikolay Aleksandrov 	RCU_INIT_POINTER(br->vlgrp, NULL);
586f409d0edSNikolay Aleksandrov 	synchronize_rcu();
587f409d0edSNikolay Aleksandrov 	__vlan_group_free(vg);
588243a2e63SVlad Yasevich }
589243a2e63SVlad Yasevich 
5902594e906SNikolay Aleksandrov struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid)
5912b292fb4SToshiaki Makita {
5922594e906SNikolay Aleksandrov 	if (!vg)
5932594e906SNikolay Aleksandrov 		return NULL;
5942b292fb4SToshiaki Makita 
5952594e906SNikolay Aleksandrov 	return br_vlan_lookup(&vg->vlan_hash, vid);
5962b292fb4SToshiaki Makita }
5972b292fb4SToshiaki Makita 
598204177f3SToshiaki Makita /* Must be protected by RTNL. */
599204177f3SToshiaki Makita static void recalculate_group_addr(struct net_bridge *br)
600204177f3SToshiaki Makita {
601204177f3SToshiaki Makita 	if (br->group_addr_set)
602204177f3SToshiaki Makita 		return;
603204177f3SToshiaki Makita 
604204177f3SToshiaki Makita 	spin_lock_bh(&br->lock);
605204177f3SToshiaki Makita 	if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
606204177f3SToshiaki Makita 		/* Bridge Group Address */
607204177f3SToshiaki Makita 		br->group_addr[5] = 0x00;
608204177f3SToshiaki Makita 	} else { /* vlan_enabled && ETH_P_8021AD */
609204177f3SToshiaki Makita 		/* Provider Bridge Group Address */
610204177f3SToshiaki Makita 		br->group_addr[5] = 0x08;
611204177f3SToshiaki Makita 	}
612204177f3SToshiaki Makita 	spin_unlock_bh(&br->lock);
613204177f3SToshiaki Makita }
614204177f3SToshiaki Makita 
615204177f3SToshiaki Makita /* Must be protected by RTNL. */
616204177f3SToshiaki Makita void br_recalculate_fwd_mask(struct net_bridge *br)
617204177f3SToshiaki Makita {
618204177f3SToshiaki Makita 	if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
619204177f3SToshiaki Makita 		br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
620204177f3SToshiaki Makita 	else /* vlan_enabled && ETH_P_8021AD */
621204177f3SToshiaki Makita 		br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
622204177f3SToshiaki Makita 					      ~(1u << br->group_addr[5]);
623204177f3SToshiaki Makita }
624204177f3SToshiaki Makita 
625a7854037SNikolay Aleksandrov int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
626243a2e63SVlad Yasevich {
627243a2e63SVlad Yasevich 	if (br->vlan_enabled == val)
628a7854037SNikolay Aleksandrov 		return 0;
629243a2e63SVlad Yasevich 
630243a2e63SVlad Yasevich 	br->vlan_enabled = val;
6312796d0c6SVlad Yasevich 	br_manage_promisc(br);
632204177f3SToshiaki Makita 	recalculate_group_addr(br);
633204177f3SToshiaki Makita 	br_recalculate_fwd_mask(br);
634243a2e63SVlad Yasevich 
635a7854037SNikolay Aleksandrov 	return 0;
636a7854037SNikolay Aleksandrov }
637a7854037SNikolay Aleksandrov 
638a7854037SNikolay Aleksandrov int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
639a7854037SNikolay Aleksandrov {
640a7854037SNikolay Aleksandrov 	if (!rtnl_trylock())
641a7854037SNikolay Aleksandrov 		return restart_syscall();
642a7854037SNikolay Aleksandrov 
643a7854037SNikolay Aleksandrov 	__br_vlan_filter_toggle(br, val);
644243a2e63SVlad Yasevich 	rtnl_unlock();
645a7854037SNikolay Aleksandrov 
646243a2e63SVlad Yasevich 	return 0;
647243a2e63SVlad Yasevich }
648243a2e63SVlad Yasevich 
649d2d427b3SToshiaki Makita int __br_vlan_set_proto(struct net_bridge *br, __be16 proto)
650204177f3SToshiaki Makita {
651204177f3SToshiaki Makita 	int err = 0;
652204177f3SToshiaki Makita 	struct net_bridge_port *p;
6532594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
654907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
655d2d427b3SToshiaki Makita 	__be16 oldproto;
656204177f3SToshiaki Makita 
657204177f3SToshiaki Makita 	if (br->vlan_proto == proto)
658d2d427b3SToshiaki Makita 		return 0;
659204177f3SToshiaki Makita 
660204177f3SToshiaki Makita 	/* Add VLANs for the new proto to the device filter. */
661204177f3SToshiaki Makita 	list_for_each_entry(p, &br->port_list, list) {
662907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
663907b1e6eSNikolay Aleksandrov 		list_for_each_entry(vlan, &vg->vlan_list, vlist) {
6642594e906SNikolay Aleksandrov 			err = vlan_vid_add(p->dev, proto, vlan->vid);
665204177f3SToshiaki Makita 			if (err)
666204177f3SToshiaki Makita 				goto err_filt;
667204177f3SToshiaki Makita 		}
668204177f3SToshiaki Makita 	}
669204177f3SToshiaki Makita 
670204177f3SToshiaki Makita 	oldproto = br->vlan_proto;
671204177f3SToshiaki Makita 	br->vlan_proto = proto;
672204177f3SToshiaki Makita 
673204177f3SToshiaki Makita 	recalculate_group_addr(br);
674204177f3SToshiaki Makita 	br_recalculate_fwd_mask(br);
675204177f3SToshiaki Makita 
676204177f3SToshiaki Makita 	/* Delete VLANs for the old proto from the device filter. */
677907b1e6eSNikolay Aleksandrov 	list_for_each_entry(p, &br->port_list, list) {
678907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
679907b1e6eSNikolay Aleksandrov 		list_for_each_entry(vlan, &vg->vlan_list, vlist)
6802594e906SNikolay Aleksandrov 			vlan_vid_del(p->dev, oldproto, vlan->vid);
681907b1e6eSNikolay Aleksandrov 	}
682204177f3SToshiaki Makita 
683d2d427b3SToshiaki Makita 	return 0;
684204177f3SToshiaki Makita 
685204177f3SToshiaki Makita err_filt:
686907b1e6eSNikolay Aleksandrov 	list_for_each_entry_continue_reverse(vlan, &vg->vlan_list, vlist)
6872594e906SNikolay Aleksandrov 		vlan_vid_del(p->dev, proto, vlan->vid);
688204177f3SToshiaki Makita 
689907b1e6eSNikolay Aleksandrov 	list_for_each_entry_continue_reverse(p, &br->port_list, list) {
690907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
691907b1e6eSNikolay Aleksandrov 		list_for_each_entry(vlan, &vg->vlan_list, vlist)
6922594e906SNikolay Aleksandrov 			vlan_vid_del(p->dev, proto, vlan->vid);
693907b1e6eSNikolay Aleksandrov 	}
694204177f3SToshiaki Makita 
695d2d427b3SToshiaki Makita 	return err;
696d2d427b3SToshiaki Makita }
697d2d427b3SToshiaki Makita 
698d2d427b3SToshiaki Makita int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
699d2d427b3SToshiaki Makita {
700d2d427b3SToshiaki Makita 	int err;
701d2d427b3SToshiaki Makita 
702d2d427b3SToshiaki Makita 	if (val != ETH_P_8021Q && val != ETH_P_8021AD)
703d2d427b3SToshiaki Makita 		return -EPROTONOSUPPORT;
704d2d427b3SToshiaki Makita 
705d2d427b3SToshiaki Makita 	if (!rtnl_trylock())
706d2d427b3SToshiaki Makita 		return restart_syscall();
707d2d427b3SToshiaki Makita 
708d2d427b3SToshiaki Makita 	err = __br_vlan_set_proto(br, htons(val));
709d2d427b3SToshiaki Makita 	rtnl_unlock();
710d2d427b3SToshiaki Makita 
711d2d427b3SToshiaki Makita 	return err;
712204177f3SToshiaki Makita }
713204177f3SToshiaki Makita 
71477751ee8SNikolay Aleksandrov static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 vid)
7155be5a2dfSVlad Yasevich {
7162594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
7172594e906SNikolay Aleksandrov 
71877751ee8SNikolay Aleksandrov 	if (vid != vg->pvid)
7192594e906SNikolay Aleksandrov 		return false;
7202594e906SNikolay Aleksandrov 
7212594e906SNikolay Aleksandrov 	v = br_vlan_lookup(&vg->vlan_hash, vid);
7222594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v) &&
7232594e906SNikolay Aleksandrov 	    (v->flags & BRIDGE_VLAN_INFO_UNTAGGED))
7242594e906SNikolay Aleksandrov 		return true;
7252594e906SNikolay Aleksandrov 
7262594e906SNikolay Aleksandrov 	return false;
7275be5a2dfSVlad Yasevich }
7285be5a2dfSVlad Yasevich 
7295be5a2dfSVlad Yasevich static void br_vlan_disable_default_pvid(struct net_bridge *br)
7305be5a2dfSVlad Yasevich {
7315be5a2dfSVlad Yasevich 	struct net_bridge_port *p;
7325be5a2dfSVlad Yasevich 	u16 pvid = br->default_pvid;
7335be5a2dfSVlad Yasevich 
7345be5a2dfSVlad Yasevich 	/* Disable default_pvid on all ports where it is still
7355be5a2dfSVlad Yasevich 	 * configured.
7365be5a2dfSVlad Yasevich 	 */
737907b1e6eSNikolay Aleksandrov 	if (vlan_default_pvid(br_vlan_group(br), pvid))
7385be5a2dfSVlad Yasevich 		br_vlan_delete(br, pvid);
7395be5a2dfSVlad Yasevich 
7405be5a2dfSVlad Yasevich 	list_for_each_entry(p, &br->port_list, list) {
741907b1e6eSNikolay Aleksandrov 		if (vlan_default_pvid(nbp_vlan_group(p), pvid))
7425be5a2dfSVlad Yasevich 			nbp_vlan_delete(p, pvid);
7435be5a2dfSVlad Yasevich 	}
7445be5a2dfSVlad Yasevich 
7455be5a2dfSVlad Yasevich 	br->default_pvid = 0;
7465be5a2dfSVlad Yasevich }
7475be5a2dfSVlad Yasevich 
7480f963b75SNikolay Aleksandrov int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid)
7495be5a2dfSVlad Yasevich {
7502594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *pvent;
751907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
7525be5a2dfSVlad Yasevich 	struct net_bridge_port *p;
7535be5a2dfSVlad Yasevich 	u16 old_pvid;
7545be5a2dfSVlad Yasevich 	int err = 0;
7555be5a2dfSVlad Yasevich 	unsigned long *changed;
7565be5a2dfSVlad Yasevich 
7570f963b75SNikolay Aleksandrov 	if (!pvid) {
7580f963b75SNikolay Aleksandrov 		br_vlan_disable_default_pvid(br);
7590f963b75SNikolay Aleksandrov 		return 0;
7600f963b75SNikolay Aleksandrov 	}
7610f963b75SNikolay Aleksandrov 
7625be5a2dfSVlad Yasevich 	changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long),
7635be5a2dfSVlad Yasevich 			  GFP_KERNEL);
7645be5a2dfSVlad Yasevich 	if (!changed)
7655be5a2dfSVlad Yasevich 		return -ENOMEM;
7665be5a2dfSVlad Yasevich 
7675be5a2dfSVlad Yasevich 	old_pvid = br->default_pvid;
7685be5a2dfSVlad Yasevich 
7695be5a2dfSVlad Yasevich 	/* Update default_pvid config only if we do not conflict with
7705be5a2dfSVlad Yasevich 	 * user configuration.
7715be5a2dfSVlad Yasevich 	 */
772907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
773907b1e6eSNikolay Aleksandrov 	pvent = br_vlan_find(vg, pvid);
774907b1e6eSNikolay Aleksandrov 	if ((!old_pvid || vlan_default_pvid(vg, old_pvid)) &&
7752594e906SNikolay Aleksandrov 	    (!pvent || !br_vlan_should_use(pvent))) {
7765be5a2dfSVlad Yasevich 		err = br_vlan_add(br, pvid,
7775be5a2dfSVlad Yasevich 				  BRIDGE_VLAN_INFO_PVID |
7782594e906SNikolay Aleksandrov 				  BRIDGE_VLAN_INFO_UNTAGGED |
7792594e906SNikolay Aleksandrov 				  BRIDGE_VLAN_INFO_BRENTRY);
7805be5a2dfSVlad Yasevich 		if (err)
7815be5a2dfSVlad Yasevich 			goto out;
7825be5a2dfSVlad Yasevich 		br_vlan_delete(br, old_pvid);
7835be5a2dfSVlad Yasevich 		set_bit(0, changed);
7845be5a2dfSVlad Yasevich 	}
7855be5a2dfSVlad Yasevich 
7865be5a2dfSVlad Yasevich 	list_for_each_entry(p, &br->port_list, list) {
7875be5a2dfSVlad Yasevich 		/* Update default_pvid config only if we do not conflict with
7885be5a2dfSVlad Yasevich 		 * user configuration.
7895be5a2dfSVlad Yasevich 		 */
790907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
7915be5a2dfSVlad Yasevich 		if ((old_pvid &&
792907b1e6eSNikolay Aleksandrov 		     !vlan_default_pvid(vg, old_pvid)) ||
793907b1e6eSNikolay Aleksandrov 		    br_vlan_find(vg, pvid))
7945be5a2dfSVlad Yasevich 			continue;
7955be5a2dfSVlad Yasevich 
7965be5a2dfSVlad Yasevich 		err = nbp_vlan_add(p, pvid,
7975be5a2dfSVlad Yasevich 				   BRIDGE_VLAN_INFO_PVID |
7985be5a2dfSVlad Yasevich 				   BRIDGE_VLAN_INFO_UNTAGGED);
7995be5a2dfSVlad Yasevich 		if (err)
8005be5a2dfSVlad Yasevich 			goto err_port;
8015be5a2dfSVlad Yasevich 		nbp_vlan_delete(p, old_pvid);
8025be5a2dfSVlad Yasevich 		set_bit(p->port_no, changed);
8035be5a2dfSVlad Yasevich 	}
8045be5a2dfSVlad Yasevich 
8055be5a2dfSVlad Yasevich 	br->default_pvid = pvid;
8065be5a2dfSVlad Yasevich 
8075be5a2dfSVlad Yasevich out:
8085be5a2dfSVlad Yasevich 	kfree(changed);
8095be5a2dfSVlad Yasevich 	return err;
8105be5a2dfSVlad Yasevich 
8115be5a2dfSVlad Yasevich err_port:
8125be5a2dfSVlad Yasevich 	list_for_each_entry_continue_reverse(p, &br->port_list, list) {
8135be5a2dfSVlad Yasevich 		if (!test_bit(p->port_no, changed))
8145be5a2dfSVlad Yasevich 			continue;
8155be5a2dfSVlad Yasevich 
8165be5a2dfSVlad Yasevich 		if (old_pvid)
8175be5a2dfSVlad Yasevich 			nbp_vlan_add(p, old_pvid,
8185be5a2dfSVlad Yasevich 				     BRIDGE_VLAN_INFO_PVID |
8195be5a2dfSVlad Yasevich 				     BRIDGE_VLAN_INFO_UNTAGGED);
8205be5a2dfSVlad Yasevich 		nbp_vlan_delete(p, pvid);
8215be5a2dfSVlad Yasevich 	}
8225be5a2dfSVlad Yasevich 
8235be5a2dfSVlad Yasevich 	if (test_bit(0, changed)) {
8245be5a2dfSVlad Yasevich 		if (old_pvid)
8255be5a2dfSVlad Yasevich 			br_vlan_add(br, old_pvid,
8265be5a2dfSVlad Yasevich 				    BRIDGE_VLAN_INFO_PVID |
8272594e906SNikolay Aleksandrov 				    BRIDGE_VLAN_INFO_UNTAGGED |
8282594e906SNikolay Aleksandrov 				    BRIDGE_VLAN_INFO_BRENTRY);
8295be5a2dfSVlad Yasevich 		br_vlan_delete(br, pvid);
8305be5a2dfSVlad Yasevich 	}
8315be5a2dfSVlad Yasevich 	goto out;
8325be5a2dfSVlad Yasevich }
8335be5a2dfSVlad Yasevich 
83496a20d9dSVlad Yasevich int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val)
83596a20d9dSVlad Yasevich {
83696a20d9dSVlad Yasevich 	u16 pvid = val;
83796a20d9dSVlad Yasevich 	int err = 0;
83896a20d9dSVlad Yasevich 
8395be5a2dfSVlad Yasevich 	if (val >= VLAN_VID_MASK)
84096a20d9dSVlad Yasevich 		return -EINVAL;
84196a20d9dSVlad Yasevich 
84296a20d9dSVlad Yasevich 	if (!rtnl_trylock())
84396a20d9dSVlad Yasevich 		return restart_syscall();
84496a20d9dSVlad Yasevich 
84596a20d9dSVlad Yasevich 	if (pvid == br->default_pvid)
84696a20d9dSVlad Yasevich 		goto unlock;
84796a20d9dSVlad Yasevich 
84896a20d9dSVlad Yasevich 	/* Only allow default pvid change when filtering is disabled */
84996a20d9dSVlad Yasevich 	if (br->vlan_enabled) {
85096a20d9dSVlad Yasevich 		pr_info_once("Please disable vlan filtering to change default_pvid\n");
85196a20d9dSVlad Yasevich 		err = -EPERM;
85296a20d9dSVlad Yasevich 		goto unlock;
85396a20d9dSVlad Yasevich 	}
8545be5a2dfSVlad Yasevich 	err = __br_vlan_set_default_pvid(br, pvid);
85596a20d9dSVlad Yasevich unlock:
85696a20d9dSVlad Yasevich 	rtnl_unlock();
85796a20d9dSVlad Yasevich 	return err;
85896a20d9dSVlad Yasevich }
85996a20d9dSVlad Yasevich 
8605be5a2dfSVlad Yasevich int br_vlan_init(struct net_bridge *br)
8618580e211SToshiaki Makita {
862907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
8632594e906SNikolay Aleksandrov 	int ret = -ENOMEM;
8642594e906SNikolay Aleksandrov 
865907b1e6eSNikolay Aleksandrov 	vg = kzalloc(sizeof(*vg), GFP_KERNEL);
866907b1e6eSNikolay Aleksandrov 	if (!vg)
8672594e906SNikolay Aleksandrov 		goto out;
868907b1e6eSNikolay Aleksandrov 	ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params);
8692594e906SNikolay Aleksandrov 	if (ret)
8702594e906SNikolay Aleksandrov 		goto err_rhtbl;
871907b1e6eSNikolay Aleksandrov 	INIT_LIST_HEAD(&vg->vlan_list);
8728580e211SToshiaki Makita 	br->vlan_proto = htons(ETH_P_8021Q);
87396a20d9dSVlad Yasevich 	br->default_pvid = 1;
874907b1e6eSNikolay Aleksandrov 	rcu_assign_pointer(br->vlgrp, vg);
8752594e906SNikolay Aleksandrov 	ret = br_vlan_add(br, 1,
8762594e906SNikolay Aleksandrov 			  BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED |
8772594e906SNikolay Aleksandrov 			  BRIDGE_VLAN_INFO_BRENTRY);
8782594e906SNikolay Aleksandrov 	if (ret)
8792594e906SNikolay Aleksandrov 		goto err_vlan_add;
8802594e906SNikolay Aleksandrov 
8812594e906SNikolay Aleksandrov out:
8822594e906SNikolay Aleksandrov 	return ret;
8832594e906SNikolay Aleksandrov 
8842594e906SNikolay Aleksandrov err_vlan_add:
885907b1e6eSNikolay Aleksandrov 	rhashtable_destroy(&vg->vlan_hash);
8862594e906SNikolay Aleksandrov err_rhtbl:
887907b1e6eSNikolay Aleksandrov 	kfree(vg);
8882594e906SNikolay Aleksandrov 
8892594e906SNikolay Aleksandrov 	goto out;
8902594e906SNikolay Aleksandrov }
8912594e906SNikolay Aleksandrov 
8922594e906SNikolay Aleksandrov int nbp_vlan_init(struct net_bridge_port *p)
8932594e906SNikolay Aleksandrov {
894263344e6SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
8952594e906SNikolay Aleksandrov 	int ret = -ENOMEM;
8962594e906SNikolay Aleksandrov 
897263344e6SNikolay Aleksandrov 	vg = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL);
898263344e6SNikolay Aleksandrov 	if (!vg)
8992594e906SNikolay Aleksandrov 		goto out;
9002594e906SNikolay Aleksandrov 
901263344e6SNikolay Aleksandrov 	ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params);
9022594e906SNikolay Aleksandrov 	if (ret)
9032594e906SNikolay Aleksandrov 		goto err_rhtbl;
904263344e6SNikolay Aleksandrov 	INIT_LIST_HEAD(&vg->vlan_list);
905907b1e6eSNikolay Aleksandrov 	rcu_assign_pointer(p->vlgrp, vg);
9062594e906SNikolay Aleksandrov 	if (p->br->default_pvid) {
9072594e906SNikolay Aleksandrov 		ret = nbp_vlan_add(p, p->br->default_pvid,
9082594e906SNikolay Aleksandrov 				   BRIDGE_VLAN_INFO_PVID |
9092594e906SNikolay Aleksandrov 				   BRIDGE_VLAN_INFO_UNTAGGED);
9102594e906SNikolay Aleksandrov 		if (ret)
9112594e906SNikolay Aleksandrov 			goto err_vlan_add;
9122594e906SNikolay Aleksandrov 	}
9132594e906SNikolay Aleksandrov out:
9142594e906SNikolay Aleksandrov 	return ret;
9152594e906SNikolay Aleksandrov 
9162594e906SNikolay Aleksandrov err_vlan_add:
91707bc588fSIdo Schimmel 	RCU_INIT_POINTER(p->vlgrp, NULL);
91807bc588fSIdo Schimmel 	synchronize_rcu();
919263344e6SNikolay Aleksandrov 	rhashtable_destroy(&vg->vlan_hash);
9202594e906SNikolay Aleksandrov err_rhtbl:
921263344e6SNikolay Aleksandrov 	kfree(vg);
9222594e906SNikolay Aleksandrov 
9232594e906SNikolay Aleksandrov 	goto out;
9248580e211SToshiaki Makita }
9258580e211SToshiaki Makita 
9268adff41cSToshiaki Makita /* Must be protected by RTNL.
9278adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
9288adff41cSToshiaki Makita  */
929552406c4SVlad Yasevich int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
930243a2e63SVlad Yasevich {
9312594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
9322594e906SNikolay Aleksandrov 	int ret;
933243a2e63SVlad Yasevich 
934243a2e63SVlad Yasevich 	ASSERT_RTNL();
935243a2e63SVlad Yasevich 
936907b1e6eSNikolay Aleksandrov 	vlan = br_vlan_find(nbp_vlan_group(port), vid);
9372594e906SNikolay Aleksandrov 	if (vlan) {
9382594e906SNikolay Aleksandrov 		__vlan_add_flags(vlan, flags);
9392594e906SNikolay Aleksandrov 		return 0;
940243a2e63SVlad Yasevich 	}
941243a2e63SVlad Yasevich 
9422594e906SNikolay Aleksandrov 	vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
9432594e906SNikolay Aleksandrov 	if (!vlan)
9442594e906SNikolay Aleksandrov 		return -ENOMEM;
945243a2e63SVlad Yasevich 
9462594e906SNikolay Aleksandrov 	vlan->vid = vid;
9472594e906SNikolay Aleksandrov 	vlan->port = port;
9482594e906SNikolay Aleksandrov 	ret = __vlan_add(vlan, flags);
9492594e906SNikolay Aleksandrov 	if (ret)
9502594e906SNikolay Aleksandrov 		kfree(vlan);
951243a2e63SVlad Yasevich 
9522594e906SNikolay Aleksandrov 	return ret;
953243a2e63SVlad Yasevich }
954243a2e63SVlad Yasevich 
9558adff41cSToshiaki Makita /* Must be protected by RTNL.
9568adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
9578adff41cSToshiaki Makita  */
958243a2e63SVlad Yasevich int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
959243a2e63SVlad Yasevich {
9602594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
961243a2e63SVlad Yasevich 
962243a2e63SVlad Yasevich 	ASSERT_RTNL();
963243a2e63SVlad Yasevich 
964907b1e6eSNikolay Aleksandrov 	v = br_vlan_find(nbp_vlan_group(port), vid);
9652594e906SNikolay Aleksandrov 	if (!v)
9662594e906SNikolay Aleksandrov 		return -ENOENT;
967424bb9c9SToshiaki Makita 	br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
9681ea2d020SNikolay Aleksandrov 	br_fdb_delete_by_port(port->br, port, vid, 0);
969bc9a25d2SVlad Yasevich 
9702594e906SNikolay Aleksandrov 	return __vlan_del(v);
971243a2e63SVlad Yasevich }
972243a2e63SVlad Yasevich 
973243a2e63SVlad Yasevich void nbp_vlan_flush(struct net_bridge_port *port)
974243a2e63SVlad Yasevich {
975f409d0edSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
976f409d0edSNikolay Aleksandrov 
977243a2e63SVlad Yasevich 	ASSERT_RTNL();
978243a2e63SVlad Yasevich 
979f409d0edSNikolay Aleksandrov 	vg = nbp_vlan_group(port);
980f409d0edSNikolay Aleksandrov 	__vlan_flush(vg);
981f409d0edSNikolay Aleksandrov 	RCU_INIT_POINTER(port->vlgrp, NULL);
982f409d0edSNikolay Aleksandrov 	synchronize_rcu();
983f409d0edSNikolay Aleksandrov 	__vlan_group_free(vg);
9845be5a2dfSVlad Yasevich }
985