xref: /openbmc/linux/net/bridge/br_vlan.c (revision 2594e906)
1243a2e63SVlad Yasevich #include <linux/kernel.h>
2243a2e63SVlad Yasevich #include <linux/netdevice.h>
3243a2e63SVlad Yasevich #include <linux/rtnetlink.h>
4243a2e63SVlad Yasevich #include <linux/slab.h>
57f109539SScott Feldman #include <net/switchdev.h>
6243a2e63SVlad Yasevich 
7243a2e63SVlad Yasevich #include "br_private.h"
8243a2e63SVlad Yasevich 
92594e906SNikolay Aleksandrov static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg,
102594e906SNikolay Aleksandrov 			      const void *ptr)
11552406c4SVlad Yasevich {
122594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *vle = ptr;
132594e906SNikolay Aleksandrov 	u16 vid = *(u16 *)arg->key;
142594e906SNikolay Aleksandrov 
152594e906SNikolay Aleksandrov 	return vle->vid != vid;
162594e906SNikolay Aleksandrov }
172594e906SNikolay Aleksandrov 
182594e906SNikolay Aleksandrov static const struct rhashtable_params br_vlan_rht_params = {
192594e906SNikolay Aleksandrov 	.head_offset = offsetof(struct net_bridge_vlan, vnode),
202594e906SNikolay Aleksandrov 	.key_offset = offsetof(struct net_bridge_vlan, vid),
212594e906SNikolay Aleksandrov 	.key_len = sizeof(u16),
222594e906SNikolay Aleksandrov 	.max_size = VLAN_N_VID,
232594e906SNikolay Aleksandrov 	.obj_cmpfn = br_vlan_cmp,
242594e906SNikolay Aleksandrov 	.automatic_shrinking = true,
252594e906SNikolay Aleksandrov };
262594e906SNikolay Aleksandrov 
272594e906SNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid)
282594e906SNikolay Aleksandrov {
292594e906SNikolay Aleksandrov 	return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params);
302594e906SNikolay Aleksandrov }
312594e906SNikolay Aleksandrov 
322594e906SNikolay Aleksandrov static void __vlan_add_pvid(u16 *pvid, u16 vid)
332594e906SNikolay Aleksandrov {
342594e906SNikolay Aleksandrov 	if (*pvid == vid)
35552406c4SVlad Yasevich 		return;
36552406c4SVlad Yasevich 
37552406c4SVlad Yasevich 	smp_wmb();
382594e906SNikolay Aleksandrov 	*pvid = vid;
39552406c4SVlad Yasevich }
40552406c4SVlad Yasevich 
412594e906SNikolay Aleksandrov static void __vlan_delete_pvid(u16 *pvid, u16 vid)
42552406c4SVlad Yasevich {
432594e906SNikolay Aleksandrov 	if (*pvid != vid)
44552406c4SVlad Yasevich 		return;
45552406c4SVlad Yasevich 
46552406c4SVlad Yasevich 	smp_wmb();
472594e906SNikolay Aleksandrov 	*pvid = 0;
48552406c4SVlad Yasevich }
49552406c4SVlad Yasevich 
502594e906SNikolay Aleksandrov static void __vlan_add_flags(struct net_bridge_vlan *v, u16 flags)
5135e03f3aSVlad Yasevich {
522594e906SNikolay Aleksandrov 	if (flags & BRIDGE_VLAN_INFO_PVID) {
532594e906SNikolay Aleksandrov 		if (br_vlan_is_master(v))
542594e906SNikolay Aleksandrov 			__vlan_add_pvid(&v->br->pvid, v->vid);
55635126b7SVlad Yasevich 		else
562594e906SNikolay Aleksandrov 			__vlan_add_pvid(&v->port->pvid, v->vid);
572594e906SNikolay Aleksandrov 	} else {
582594e906SNikolay Aleksandrov 		if (br_vlan_is_master(v))
592594e906SNikolay Aleksandrov 			__vlan_delete_pvid(&v->br->pvid, v->vid);
602594e906SNikolay Aleksandrov 		else
612594e906SNikolay Aleksandrov 			__vlan_delete_pvid(&v->port->pvid, v->vid);
622594e906SNikolay Aleksandrov 	}
6335e03f3aSVlad Yasevich 
6435e03f3aSVlad Yasevich 	if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
652594e906SNikolay Aleksandrov 		v->flags |= BRIDGE_VLAN_INFO_UNTAGGED;
66635126b7SVlad Yasevich 	else
672594e906SNikolay Aleksandrov 		v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED;
6835e03f3aSVlad Yasevich }
6935e03f3aSVlad Yasevich 
707f109539SScott Feldman static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br,
717f109539SScott Feldman 			  u16 vid, u16 flags)
727f109539SScott Feldman {
737f109539SScott Feldman 	const struct net_device_ops *ops = dev->netdev_ops;
747f109539SScott Feldman 	int err;
757f109539SScott Feldman 
767f109539SScott Feldman 	/* If driver uses VLAN ndo ops, use 8021q to install vid
777f109539SScott Feldman 	 * on device, otherwise try switchdev ops to install vid.
787f109539SScott Feldman 	 */
797f109539SScott Feldman 
807f109539SScott Feldman 	if (ops->ndo_vlan_rx_add_vid) {
817f109539SScott Feldman 		err = vlan_vid_add(dev, br->vlan_proto, vid);
827f109539SScott Feldman 	} else {
837f109539SScott Feldman 		struct switchdev_obj vlan_obj = {
847f109539SScott Feldman 			.id = SWITCHDEV_OBJ_PORT_VLAN,
857f109539SScott Feldman 			.u.vlan = {
867f109539SScott Feldman 				.flags = flags,
873e3a78b4SScott Feldman 				.vid_begin = vid,
887f109539SScott Feldman 				.vid_end = vid,
897f109539SScott Feldman 			},
907f109539SScott Feldman 		};
917f109539SScott Feldman 
927f109539SScott Feldman 		err = switchdev_port_obj_add(dev, &vlan_obj);
937f109539SScott Feldman 		if (err == -EOPNOTSUPP)
947f109539SScott Feldman 			err = 0;
957f109539SScott Feldman 	}
967f109539SScott Feldman 
977f109539SScott Feldman 	return err;
987f109539SScott Feldman }
997f109539SScott Feldman 
1002594e906SNikolay Aleksandrov static void __vlan_add_list(struct net_bridge_vlan *v)
101243a2e63SVlad Yasevich {
1022594e906SNikolay Aleksandrov 	struct list_head *headp, *hpos;
1032594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vent;
104243a2e63SVlad Yasevich 
1052594e906SNikolay Aleksandrov 	headp = br_vlan_is_master(v) ? &v->br->vlgrp->vlan_list :
1062594e906SNikolay Aleksandrov 				       &v->port->vlgrp->vlan_list;
1072594e906SNikolay Aleksandrov 	list_for_each_prev(hpos, headp) {
1082594e906SNikolay Aleksandrov 		vent = list_entry(hpos, struct net_bridge_vlan, vlist);
1092594e906SNikolay Aleksandrov 		if (v->vid < vent->vid)
1102594e906SNikolay Aleksandrov 			continue;
1112594e906SNikolay Aleksandrov 		else
1122594e906SNikolay Aleksandrov 			break;
1132594e906SNikolay Aleksandrov 	}
1142594e906SNikolay Aleksandrov 	list_add(&v->vlist, hpos);
115552406c4SVlad Yasevich }
116243a2e63SVlad Yasevich 
1172594e906SNikolay Aleksandrov static void __vlan_del_list(struct net_bridge_vlan *v)
1182594e906SNikolay Aleksandrov {
1192594e906SNikolay Aleksandrov 	list_del(&v->vlist);
120243a2e63SVlad Yasevich }
121243a2e63SVlad Yasevich 
122bf361ad3SVivien Didelot static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br,
1237f109539SScott Feldman 			  u16 vid)
1247f109539SScott Feldman {
1257f109539SScott Feldman 	const struct net_device_ops *ops = dev->netdev_ops;
126bf361ad3SVivien Didelot 	int err = 0;
1277f109539SScott Feldman 
1287f109539SScott Feldman 	/* If driver uses VLAN ndo ops, use 8021q to delete vid
1297f109539SScott Feldman 	 * on device, otherwise try switchdev ops to delete vid.
1307f109539SScott Feldman 	 */
1317f109539SScott Feldman 
1327f109539SScott Feldman 	if (ops->ndo_vlan_rx_kill_vid) {
1337f109539SScott Feldman 		vlan_vid_del(dev, br->vlan_proto, vid);
1347f109539SScott Feldman 	} else {
1357f109539SScott Feldman 		struct switchdev_obj vlan_obj = {
1367f109539SScott Feldman 			.id = SWITCHDEV_OBJ_PORT_VLAN,
1377f109539SScott Feldman 			.u.vlan = {
1383e3a78b4SScott Feldman 				.vid_begin = vid,
1397f109539SScott Feldman 				.vid_end = vid,
1407f109539SScott Feldman 			},
1417f109539SScott Feldman 		};
1427f109539SScott Feldman 
143bf361ad3SVivien Didelot 		err = switchdev_port_obj_del(dev, &vlan_obj);
144bf361ad3SVivien Didelot 		if (err == -EOPNOTSUPP)
145bf361ad3SVivien Didelot 			err = 0;
1467f109539SScott Feldman 	}
147bf361ad3SVivien Didelot 
148bf361ad3SVivien Didelot 	return err;
1497f109539SScott Feldman }
1507f109539SScott Feldman 
1512594e906SNikolay Aleksandrov /* This is the shared VLAN add function which works for both ports and bridge
1522594e906SNikolay Aleksandrov  * devices. There are four possible calls to this function in terms of the
1532594e906SNikolay Aleksandrov  * vlan entry type:
1542594e906SNikolay Aleksandrov  * 1. vlan is being added on a port (no master flags, global entry exists)
1552594e906SNikolay Aleksandrov  * 2. vlan is being added on a bridge (both master and brvlan flags)
1562594e906SNikolay Aleksandrov  * 3. vlan is being added on a port, but a global entry didn't exist which
1572594e906SNikolay Aleksandrov  *    is being created right now (master flag set, brvlan flag unset), the
1582594e906SNikolay Aleksandrov  *    global entry is used for global per-vlan features, but not for filtering
1592594e906SNikolay Aleksandrov  * 4. same as 3 but with both master and brvlan flags set so the entry
1602594e906SNikolay Aleksandrov  *    will be used for filtering in both the port and the bridge
1612594e906SNikolay Aleksandrov  */
1622594e906SNikolay Aleksandrov static int __vlan_add(struct net_bridge_vlan *v, u16 flags)
163243a2e63SVlad Yasevich {
1642594e906SNikolay Aleksandrov 	struct net_bridge_vlan *masterv = NULL;
1652594e906SNikolay Aleksandrov 	struct net_bridge_port *p = NULL;
1662594e906SNikolay Aleksandrov 	struct rhashtable *tbl;
1672594e906SNikolay Aleksandrov 	struct net_device *dev;
1682594e906SNikolay Aleksandrov 	struct net_bridge *br;
169bf361ad3SVivien Didelot 	int err;
170bf361ad3SVivien Didelot 
1712594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
1722594e906SNikolay Aleksandrov 		br = v->br;
1732594e906SNikolay Aleksandrov 		dev = br->dev;
1742594e906SNikolay Aleksandrov 		tbl = &br->vlgrp->vlan_hash;
1752594e906SNikolay Aleksandrov 	} else {
1762594e906SNikolay Aleksandrov 		p = v->port;
1772594e906SNikolay Aleksandrov 		br = p->br;
1782594e906SNikolay Aleksandrov 		dev = p->dev;
1792594e906SNikolay Aleksandrov 		tbl = &p->vlgrp->vlan_hash;
1802594e906SNikolay Aleksandrov 	}
1812594e906SNikolay Aleksandrov 
1822594e906SNikolay Aleksandrov 	if (p) {
1832594e906SNikolay Aleksandrov 		u16 master_flags = flags;
1842594e906SNikolay Aleksandrov 
1852594e906SNikolay Aleksandrov 		/* Add VLAN to the device filter if it is supported.
1862594e906SNikolay Aleksandrov 		 * This ensures tagged traffic enters the bridge when
1872594e906SNikolay Aleksandrov 		 * promiscuous mode is disabled by br_manage_promisc().
1882594e906SNikolay Aleksandrov 		 */
1892594e906SNikolay Aleksandrov 		err = __vlan_vid_add(dev, br, v->vid, flags);
190bf361ad3SVivien Didelot 		if (err)
1912594e906SNikolay Aleksandrov 			goto out;
1922594e906SNikolay Aleksandrov 
1932594e906SNikolay Aleksandrov 		/* need to work on the master vlan too */
1942594e906SNikolay Aleksandrov 		if (flags & BRIDGE_VLAN_INFO_MASTER) {
1952594e906SNikolay Aleksandrov 			master_flags |= BRIDGE_VLAN_INFO_BRENTRY;
1962594e906SNikolay Aleksandrov 			err = br_vlan_add(br, v->vid, master_flags);
1972594e906SNikolay Aleksandrov 			if (err)
1982594e906SNikolay Aleksandrov 				goto out_filt;
1992594e906SNikolay Aleksandrov 		}
2002594e906SNikolay Aleksandrov 
2012594e906SNikolay Aleksandrov 		masterv = br_vlan_find(br->vlgrp, v->vid);
2022594e906SNikolay Aleksandrov 		if (!masterv) {
2032594e906SNikolay Aleksandrov 			/* missing global ctx, create it now */
2042594e906SNikolay Aleksandrov 			err = br_vlan_add(br, v->vid, master_flags);
2052594e906SNikolay Aleksandrov 			if (err)
2062594e906SNikolay Aleksandrov 				goto out_filt;
2072594e906SNikolay Aleksandrov 			masterv = br_vlan_find(br->vlgrp, v->vid);
2082594e906SNikolay Aleksandrov 			WARN_ON(!masterv);
2092594e906SNikolay Aleksandrov 		}
2102594e906SNikolay Aleksandrov 		atomic_inc(&masterv->refcnt);
2112594e906SNikolay Aleksandrov 		v->brvlan = masterv;
2122594e906SNikolay Aleksandrov 	}
2132594e906SNikolay Aleksandrov 
2142594e906SNikolay Aleksandrov 	/* Add the dev mac only if it's a usable vlan */
2152594e906SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
2162594e906SNikolay Aleksandrov 		err = br_fdb_insert(br, p, dev->dev_addr, v->vid);
2172594e906SNikolay Aleksandrov 		if (err) {
2182594e906SNikolay Aleksandrov 			br_err(br, "failed insert local address into bridge forwarding table\n");
2192594e906SNikolay Aleksandrov 			goto out_filt;
2202594e906SNikolay Aleksandrov 		}
2212594e906SNikolay Aleksandrov 	}
2222594e906SNikolay Aleksandrov 
2232594e906SNikolay Aleksandrov 	err = rhashtable_lookup_insert_fast(tbl, &v->vnode, br_vlan_rht_params);
2242594e906SNikolay Aleksandrov 	if (err)
2252594e906SNikolay Aleksandrov 		goto out_fdb_insert;
2262594e906SNikolay Aleksandrov 
2272594e906SNikolay Aleksandrov 	__vlan_add_list(v);
2282594e906SNikolay Aleksandrov 	__vlan_add_flags(v, flags);
2292594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
2302594e906SNikolay Aleksandrov 		if (br_vlan_is_brentry(v))
2312594e906SNikolay Aleksandrov 			br->vlgrp->num_vlans++;
2322594e906SNikolay Aleksandrov 	} else {
2332594e906SNikolay Aleksandrov 		p->vlgrp->num_vlans++;
2342594e906SNikolay Aleksandrov 	}
2352594e906SNikolay Aleksandrov out:
2362594e906SNikolay Aleksandrov 	return err;
2372594e906SNikolay Aleksandrov 
2382594e906SNikolay Aleksandrov out_fdb_insert:
2392594e906SNikolay Aleksandrov 	br_fdb_find_delete_local(br, p, br->dev->dev_addr, v->vid);
2402594e906SNikolay Aleksandrov 
2412594e906SNikolay Aleksandrov out_filt:
2422594e906SNikolay Aleksandrov 	if (p) {
2432594e906SNikolay Aleksandrov 		__vlan_vid_del(dev, br, v->vid);
2442594e906SNikolay Aleksandrov 		if (masterv) {
2452594e906SNikolay Aleksandrov 			atomic_dec(&masterv->refcnt);
2462594e906SNikolay Aleksandrov 			v->brvlan = NULL;
2472594e906SNikolay Aleksandrov 		}
2482594e906SNikolay Aleksandrov 	}
2492594e906SNikolay Aleksandrov 
2502594e906SNikolay Aleksandrov 	goto out;
2512594e906SNikolay Aleksandrov }
2522594e906SNikolay Aleksandrov 
2532594e906SNikolay Aleksandrov static int __vlan_del(struct net_bridge_vlan *v)
2542594e906SNikolay Aleksandrov {
2552594e906SNikolay Aleksandrov 	struct net_bridge_vlan *masterv = v;
2562594e906SNikolay Aleksandrov 	struct net_bridge_port *p = NULL;
2572594e906SNikolay Aleksandrov 	struct net_bridge *br;
2582594e906SNikolay Aleksandrov 	int err = 0;
2592594e906SNikolay Aleksandrov 	struct rhashtable *tbl;
2602594e906SNikolay Aleksandrov 	u16 *pvid;
2612594e906SNikolay Aleksandrov 
2622594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
2632594e906SNikolay Aleksandrov 		br = v->br;
2642594e906SNikolay Aleksandrov 		tbl = &v->br->vlgrp->vlan_hash;
2652594e906SNikolay Aleksandrov 		pvid = &v->br->pvid;
2662594e906SNikolay Aleksandrov 	} else {
2672594e906SNikolay Aleksandrov 		p = v->port;
2682594e906SNikolay Aleksandrov 		br = p->br;
2692594e906SNikolay Aleksandrov 		tbl = &p->vlgrp->vlan_hash;
2702594e906SNikolay Aleksandrov 		masterv = v->brvlan;
2712594e906SNikolay Aleksandrov 		pvid = &p->pvid;
2722594e906SNikolay Aleksandrov 	}
2732594e906SNikolay Aleksandrov 
2742594e906SNikolay Aleksandrov 	__vlan_delete_pvid(pvid, v->vid);
2752594e906SNikolay Aleksandrov 	if (p) {
2762594e906SNikolay Aleksandrov 		err = __vlan_vid_del(p->dev, p->br, v->vid);
2772594e906SNikolay Aleksandrov 		if (err)
2782594e906SNikolay Aleksandrov 			goto out;
2792594e906SNikolay Aleksandrov 	}
2802594e906SNikolay Aleksandrov 
2812594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
2822594e906SNikolay Aleksandrov 		if (br_vlan_is_brentry(v)) {
2832594e906SNikolay Aleksandrov 			v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY;
2842594e906SNikolay Aleksandrov 			br->vlgrp->num_vlans--;
2852594e906SNikolay Aleksandrov 		}
2862594e906SNikolay Aleksandrov 	} else {
2872594e906SNikolay Aleksandrov 		p->vlgrp->num_vlans--;
2882594e906SNikolay Aleksandrov 	}
2892594e906SNikolay Aleksandrov 
2902594e906SNikolay Aleksandrov 	if (masterv != v) {
2912594e906SNikolay Aleksandrov 		rhashtable_remove_fast(tbl, &v->vnode, br_vlan_rht_params);
2922594e906SNikolay Aleksandrov 		__vlan_del_list(v);
2932594e906SNikolay Aleksandrov 		kfree_rcu(v, rcu);
2942594e906SNikolay Aleksandrov 	}
2952594e906SNikolay Aleksandrov 
2962594e906SNikolay Aleksandrov 	if (atomic_dec_and_test(&masterv->refcnt)) {
2972594e906SNikolay Aleksandrov 		rhashtable_remove_fast(&masterv->br->vlgrp->vlan_hash,
2982594e906SNikolay Aleksandrov 				       &masterv->vnode, br_vlan_rht_params);
2992594e906SNikolay Aleksandrov 		__vlan_del_list(masterv);
3002594e906SNikolay Aleksandrov 		kfree_rcu(masterv, rcu);
3012594e906SNikolay Aleksandrov 	}
3022594e906SNikolay Aleksandrov out:
303bf361ad3SVivien Didelot 	return err;
3048580e211SToshiaki Makita }
305243a2e63SVlad Yasevich 
3062594e906SNikolay Aleksandrov static void __vlan_flush(struct net_bridge_vlan_group *vlgrp, u16 *pvid)
307243a2e63SVlad Yasevich {
3082594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan, *tmp;
3092594e906SNikolay Aleksandrov 
3102594e906SNikolay Aleksandrov 	__vlan_delete_pvid(pvid, *pvid);
3112594e906SNikolay Aleksandrov 	list_for_each_entry_safe(vlan, tmp, &vlgrp->vlan_list, vlist)
3122594e906SNikolay Aleksandrov 		__vlan_del(vlan);
3132594e906SNikolay Aleksandrov 	rhashtable_destroy(&vlgrp->vlan_hash);
3142594e906SNikolay Aleksandrov 	kfree(vlgrp);
315243a2e63SVlad Yasevich }
316243a2e63SVlad Yasevich 
31778851988SVlad Yasevich struct sk_buff *br_handle_vlan(struct net_bridge *br,
3182594e906SNikolay Aleksandrov 			       struct net_bridge_vlan_group *vg,
319a37b85c9SVlad Yasevich 			       struct sk_buff *skb)
320a37b85c9SVlad Yasevich {
3212594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
322a37b85c9SVlad Yasevich 	u16 vid;
323a37b85c9SVlad Yasevich 
32420adfa1aSVlad Yasevich 	/* If this packet was not filtered at input, let it pass */
32520adfa1aSVlad Yasevich 	if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
32678851988SVlad Yasevich 		goto out;
32778851988SVlad Yasevich 
3282594e906SNikolay Aleksandrov 	/* At this point, we know that the frame was filtered and contains
3292594e906SNikolay Aleksandrov 	 * a valid vlan id.  If the vlan id has untagged flag set,
3302594e906SNikolay Aleksandrov 	 * send untagged; otherwise, send tagged.
3312594e906SNikolay Aleksandrov 	 */
3322594e906SNikolay Aleksandrov 	br_vlan_get_tag(skb, &vid);
3332594e906SNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
3342594e906SNikolay Aleksandrov 	/* Vlan entry must be configured at this point.  The
335fc92f745SVlad Yasevich 	 * only exception is the bridge is set in promisc mode and the
336fc92f745SVlad Yasevich 	 * packet is destined for the bridge device.  In this case
337fc92f745SVlad Yasevich 	 * pass the packet as is.
338fc92f745SVlad Yasevich 	 */
3392594e906SNikolay Aleksandrov 	if (!v || !br_vlan_should_use(v)) {
340fc92f745SVlad Yasevich 		if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
341fc92f745SVlad Yasevich 			goto out;
342fc92f745SVlad Yasevich 		} else {
343fc92f745SVlad Yasevich 			kfree_skb(skb);
344fc92f745SVlad Yasevich 			return NULL;
345fc92f745SVlad Yasevich 		}
346fc92f745SVlad Yasevich 	}
3472594e906SNikolay Aleksandrov 	if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)
34899b192daSToshiaki Makita 		skb->vlan_tci = 0;
34978851988SVlad Yasevich 
35078851988SVlad Yasevich out:
35178851988SVlad Yasevich 	return skb;
35278851988SVlad Yasevich }
35378851988SVlad Yasevich 
35478851988SVlad Yasevich /* Called under RCU */
3552594e906SNikolay Aleksandrov static bool __allowed_ingress(struct rhashtable *tbl, u16 pvid, __be16 proto,
35678851988SVlad Yasevich 			      struct sk_buff *skb, u16 *vid)
35778851988SVlad Yasevich {
3582594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *v;
3598580e211SToshiaki Makita 	bool tagged;
360a37b85c9SVlad Yasevich 
36120adfa1aSVlad Yasevich 	BR_INPUT_SKB_CB(skb)->vlan_filtered = true;
36212464bb8SToshiaki Makita 	/* If vlan tx offload is disabled on bridge device and frame was
36312464bb8SToshiaki Makita 	 * sent from vlan device on the bridge device, it does not have
36412464bb8SToshiaki Makita 	 * HW accelerated vlan tag.
36512464bb8SToshiaki Makita 	 */
366df8a39deSJiri Pirko 	if (unlikely(!skb_vlan_tag_present(skb) &&
3678580e211SToshiaki Makita 		     skb->protocol == proto)) {
3680d5501c1SVlad Yasevich 		skb = skb_vlan_untag(skb);
36912464bb8SToshiaki Makita 		if (unlikely(!skb))
37012464bb8SToshiaki Makita 			return false;
37112464bb8SToshiaki Makita 	}
37212464bb8SToshiaki Makita 
3738580e211SToshiaki Makita 	if (!br_vlan_get_tag(skb, vid)) {
3748580e211SToshiaki Makita 		/* Tagged frame */
3758580e211SToshiaki Makita 		if (skb->vlan_proto != proto) {
3768580e211SToshiaki Makita 			/* Protocol-mismatch, empty out vlan_tci for new tag */
3778580e211SToshiaki Makita 			skb_push(skb, ETH_HLEN);
37862749e2cSJiri Pirko 			skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto,
379df8a39deSJiri Pirko 							skb_vlan_tag_get(skb));
3808580e211SToshiaki Makita 			if (unlikely(!skb))
3818580e211SToshiaki Makita 				return false;
3828580e211SToshiaki Makita 
3838580e211SToshiaki Makita 			skb_pull(skb, ETH_HLEN);
3848580e211SToshiaki Makita 			skb_reset_mac_len(skb);
3858580e211SToshiaki Makita 			*vid = 0;
3868580e211SToshiaki Makita 			tagged = false;
3878580e211SToshiaki Makita 		} else {
3888580e211SToshiaki Makita 			tagged = true;
3898580e211SToshiaki Makita 		}
3908580e211SToshiaki Makita 	} else {
3918580e211SToshiaki Makita 		/* Untagged frame */
3928580e211SToshiaki Makita 		tagged = false;
3938580e211SToshiaki Makita 	}
3948580e211SToshiaki Makita 
395b90356ceSToshiaki Makita 	if (!*vid) {
396b90356ceSToshiaki Makita 		/* Frame had a tag with VID 0 or did not have a tag.
397b90356ceSToshiaki Makita 		 * See if pvid is set on this port.  That tells us which
398b90356ceSToshiaki Makita 		 * vlan untagged or priority-tagged traffic belongs to.
39978851988SVlad Yasevich 		 */
4003df6bf45SVlad Yasevich 		if (!pvid)
401eb707618SToshiaki Makita 			goto drop;
40278851988SVlad Yasevich 
403b90356ceSToshiaki Makita 		/* PVID is set on this port.  Any untagged or priority-tagged
404b90356ceSToshiaki Makita 		 * ingress frame is considered to belong to this vlan.
40578851988SVlad Yasevich 		 */
406dfb5fa32SToshiaki Makita 		*vid = pvid;
4078580e211SToshiaki Makita 		if (likely(!tagged))
408b90356ceSToshiaki Makita 			/* Untagged Frame. */
4098580e211SToshiaki Makita 			__vlan_hwaccel_put_tag(skb, proto, pvid);
410b90356ceSToshiaki Makita 		else
411b90356ceSToshiaki Makita 			/* Priority-tagged Frame.
412b90356ceSToshiaki Makita 			 * At this point, We know that skb->vlan_tci had
413b90356ceSToshiaki Makita 			 * VLAN_TAG_PRESENT bit and its VID field was 0x000.
414b90356ceSToshiaki Makita 			 * We update only VID field and preserve PCP field.
415b90356ceSToshiaki Makita 			 */
416b90356ceSToshiaki Makita 			skb->vlan_tci |= pvid;
417b90356ceSToshiaki Makita 
41878851988SVlad Yasevich 		return true;
41978851988SVlad Yasevich 	}
42078851988SVlad Yasevich 
42178851988SVlad Yasevich 	/* Frame had a valid vlan tag.  See if vlan is allowed */
4222594e906SNikolay Aleksandrov 	v = br_vlan_lookup(tbl, *vid);
4232594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v))
424a37b85c9SVlad Yasevich 		return true;
425eb707618SToshiaki Makita drop:
426eb707618SToshiaki Makita 	kfree_skb(skb);
427a37b85c9SVlad Yasevich 	return false;
428a37b85c9SVlad Yasevich }
429a37b85c9SVlad Yasevich 
4302594e906SNikolay Aleksandrov bool br_allowed_ingress(struct net_bridge *br, struct sk_buff *skb, u16 *vid)
4312594e906SNikolay Aleksandrov {
4322594e906SNikolay Aleksandrov 	/* If VLAN filtering is disabled on the bridge, all packets are
4332594e906SNikolay Aleksandrov 	 * permitted.
4342594e906SNikolay Aleksandrov 	 */
4352594e906SNikolay Aleksandrov 	if (!br->vlan_enabled) {
4362594e906SNikolay Aleksandrov 		BR_INPUT_SKB_CB(skb)->vlan_filtered = false;
4372594e906SNikolay Aleksandrov 		return true;
4382594e906SNikolay Aleksandrov 	}
4392594e906SNikolay Aleksandrov 
4402594e906SNikolay Aleksandrov 	return __allowed_ingress(&br->vlgrp->vlan_hash, br->pvid,
4412594e906SNikolay Aleksandrov 				 br->vlan_proto, skb, vid);
4422594e906SNikolay Aleksandrov }
4432594e906SNikolay Aleksandrov 
4442594e906SNikolay Aleksandrov bool nbp_allowed_ingress(struct net_bridge_port *p, struct sk_buff *skb,
4452594e906SNikolay Aleksandrov 			 u16 *vid)
4462594e906SNikolay Aleksandrov {
4472594e906SNikolay Aleksandrov 	struct net_bridge *br = p->br;
4482594e906SNikolay Aleksandrov 
4492594e906SNikolay Aleksandrov 	/* If VLAN filtering is disabled on the bridge, all packets are
4502594e906SNikolay Aleksandrov 	 * permitted.
4512594e906SNikolay Aleksandrov 	 */
4522594e906SNikolay Aleksandrov 	if (!br->vlan_enabled) {
4532594e906SNikolay Aleksandrov 		BR_INPUT_SKB_CB(skb)->vlan_filtered = false;
4542594e906SNikolay Aleksandrov 		return true;
4552594e906SNikolay Aleksandrov 	}
4562594e906SNikolay Aleksandrov 
4572594e906SNikolay Aleksandrov 	return __allowed_ingress(&p->vlgrp->vlan_hash, p->pvid, br->vlan_proto,
4582594e906SNikolay Aleksandrov 				 skb, vid);
4592594e906SNikolay Aleksandrov }
4602594e906SNikolay Aleksandrov 
46185f46c6bSVlad Yasevich /* Called under RCU. */
4622594e906SNikolay Aleksandrov bool br_allowed_egress(struct net_bridge_vlan_group *vg,
46385f46c6bSVlad Yasevich 		       const struct sk_buff *skb)
46485f46c6bSVlad Yasevich {
4652594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *v;
46685f46c6bSVlad Yasevich 	u16 vid;
46785f46c6bSVlad Yasevich 
46820adfa1aSVlad Yasevich 	/* If this packet was not filtered at input, let it pass */
46920adfa1aSVlad Yasevich 	if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
47085f46c6bSVlad Yasevich 		return true;
47185f46c6bSVlad Yasevich 
47285f46c6bSVlad Yasevich 	br_vlan_get_tag(skb, &vid);
4732594e906SNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
4742594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v))
47585f46c6bSVlad Yasevich 		return true;
47685f46c6bSVlad Yasevich 
47785f46c6bSVlad Yasevich 	return false;
47885f46c6bSVlad Yasevich }
47985f46c6bSVlad Yasevich 
480e0d7968aSToshiaki Makita /* Called under RCU */
481e0d7968aSToshiaki Makita bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
482e0d7968aSToshiaki Makita {
483e0d7968aSToshiaki Makita 	struct net_bridge *br = p->br;
484e0d7968aSToshiaki Makita 
48520adfa1aSVlad Yasevich 	/* If filtering was disabled at input, let it pass. */
486c095f248SVlad Yasevich 	if (!br->vlan_enabled)
487e0d7968aSToshiaki Makita 		return true;
488e0d7968aSToshiaki Makita 
4892594e906SNikolay Aleksandrov 	if (!p->vlgrp->num_vlans)
490e0d7968aSToshiaki Makita 		return false;
491e0d7968aSToshiaki Makita 
4928580e211SToshiaki Makita 	if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
4938580e211SToshiaki Makita 		*vid = 0;
4948580e211SToshiaki Makita 
495e0d7968aSToshiaki Makita 	if (!*vid) {
4962594e906SNikolay Aleksandrov 		*vid = nbp_get_pvid(p);
4973df6bf45SVlad Yasevich 		if (!*vid)
498e0d7968aSToshiaki Makita 			return false;
499e0d7968aSToshiaki Makita 
500e0d7968aSToshiaki Makita 		return true;
501e0d7968aSToshiaki Makita 	}
502e0d7968aSToshiaki Makita 
5032594e906SNikolay Aleksandrov 	if (br_vlan_find(p->vlgrp, *vid))
504e0d7968aSToshiaki Makita 		return true;
505e0d7968aSToshiaki Makita 
506e0d7968aSToshiaki Makita 	return false;
507e0d7968aSToshiaki Makita }
508e0d7968aSToshiaki Makita 
5098adff41cSToshiaki Makita /* Must be protected by RTNL.
5108adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
5118adff41cSToshiaki Makita  */
512552406c4SVlad Yasevich int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
513243a2e63SVlad Yasevich {
5142594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
5152594e906SNikolay Aleksandrov 	int ret;
516243a2e63SVlad Yasevich 
517243a2e63SVlad Yasevich 	ASSERT_RTNL();
518243a2e63SVlad Yasevich 
5192594e906SNikolay Aleksandrov 	vlan = br_vlan_find(br->vlgrp, vid);
5202594e906SNikolay Aleksandrov 	if (vlan) {
5212594e906SNikolay Aleksandrov 		if (!br_vlan_is_brentry(vlan)) {
5222594e906SNikolay Aleksandrov 			/* Trying to change flags of non-existent bridge vlan */
5232594e906SNikolay Aleksandrov 			if (!(flags & BRIDGE_VLAN_INFO_BRENTRY))
5242594e906SNikolay Aleksandrov 				return -EINVAL;
5252594e906SNikolay Aleksandrov 			/* It was only kept for port vlans, now make it real */
5262594e906SNikolay Aleksandrov 			ret = br_fdb_insert(br, NULL, br->dev->dev_addr,
5272594e906SNikolay Aleksandrov 					    vlan->vid);
5282594e906SNikolay Aleksandrov 			if (ret) {
5292594e906SNikolay Aleksandrov 				br_err(br, "failed insert local address into bridge forwarding table\n");
5302594e906SNikolay Aleksandrov 				return ret;
5312594e906SNikolay Aleksandrov 			}
5322594e906SNikolay Aleksandrov 			atomic_inc(&vlan->refcnt);
5332594e906SNikolay Aleksandrov 			vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY;
5342594e906SNikolay Aleksandrov 			br->vlgrp->num_vlans++;
5352594e906SNikolay Aleksandrov 		}
5362594e906SNikolay Aleksandrov 		__vlan_add_flags(vlan, flags);
5372594e906SNikolay Aleksandrov 		return 0;
5382594e906SNikolay Aleksandrov 	}
539243a2e63SVlad Yasevich 
5402594e906SNikolay Aleksandrov 	vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
5412594e906SNikolay Aleksandrov 	if (!vlan)
542243a2e63SVlad Yasevich 		return -ENOMEM;
543243a2e63SVlad Yasevich 
5442594e906SNikolay Aleksandrov 	vlan->vid = vid;
5452594e906SNikolay Aleksandrov 	vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER;
5462594e906SNikolay Aleksandrov 	vlan->flags &= ~BRIDGE_VLAN_INFO_PVID;
5472594e906SNikolay Aleksandrov 	vlan->br = br;
5482594e906SNikolay Aleksandrov 	if (flags & BRIDGE_VLAN_INFO_BRENTRY)
5492594e906SNikolay Aleksandrov 		atomic_set(&vlan->refcnt, 1);
5502594e906SNikolay Aleksandrov 	ret = __vlan_add(vlan, flags);
5512594e906SNikolay Aleksandrov 	if (ret)
5522594e906SNikolay Aleksandrov 		kfree(vlan);
553243a2e63SVlad Yasevich 
5542594e906SNikolay Aleksandrov 	return ret;
555243a2e63SVlad Yasevich }
556243a2e63SVlad Yasevich 
5578adff41cSToshiaki Makita /* Must be protected by RTNL.
5588adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
5598adff41cSToshiaki Makita  */
560243a2e63SVlad Yasevich int br_vlan_delete(struct net_bridge *br, u16 vid)
561243a2e63SVlad Yasevich {
5622594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
563243a2e63SVlad Yasevich 
564243a2e63SVlad Yasevich 	ASSERT_RTNL();
565243a2e63SVlad Yasevich 
5662594e906SNikolay Aleksandrov 	v = br_vlan_find(br->vlgrp, vid);
5672594e906SNikolay Aleksandrov 	if (!v || !br_vlan_is_brentry(v))
5682594e906SNikolay Aleksandrov 		return -ENOENT;
569243a2e63SVlad Yasevich 
570424bb9c9SToshiaki Makita 	br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
571bc9a25d2SVlad Yasevich 
5722594e906SNikolay Aleksandrov 	return __vlan_del(v);
573243a2e63SVlad Yasevich }
574243a2e63SVlad Yasevich 
575243a2e63SVlad Yasevich void br_vlan_flush(struct net_bridge *br)
576243a2e63SVlad Yasevich {
577243a2e63SVlad Yasevich 	ASSERT_RTNL();
578243a2e63SVlad Yasevich 
5792594e906SNikolay Aleksandrov 	__vlan_flush(br_vlan_group(br), &br->pvid);
580243a2e63SVlad Yasevich }
581243a2e63SVlad Yasevich 
5822594e906SNikolay Aleksandrov struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid)
5832b292fb4SToshiaki Makita {
5842594e906SNikolay Aleksandrov 	if (!vg)
5852594e906SNikolay Aleksandrov 		return NULL;
5862b292fb4SToshiaki Makita 
5872594e906SNikolay Aleksandrov 	return br_vlan_lookup(&vg->vlan_hash, vid);
5882b292fb4SToshiaki Makita }
5892b292fb4SToshiaki Makita 
590204177f3SToshiaki Makita /* Must be protected by RTNL. */
591204177f3SToshiaki Makita static void recalculate_group_addr(struct net_bridge *br)
592204177f3SToshiaki Makita {
593204177f3SToshiaki Makita 	if (br->group_addr_set)
594204177f3SToshiaki Makita 		return;
595204177f3SToshiaki Makita 
596204177f3SToshiaki Makita 	spin_lock_bh(&br->lock);
597204177f3SToshiaki Makita 	if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
598204177f3SToshiaki Makita 		/* Bridge Group Address */
599204177f3SToshiaki Makita 		br->group_addr[5] = 0x00;
600204177f3SToshiaki Makita 	} else { /* vlan_enabled && ETH_P_8021AD */
601204177f3SToshiaki Makita 		/* Provider Bridge Group Address */
602204177f3SToshiaki Makita 		br->group_addr[5] = 0x08;
603204177f3SToshiaki Makita 	}
604204177f3SToshiaki Makita 	spin_unlock_bh(&br->lock);
605204177f3SToshiaki Makita }
606204177f3SToshiaki Makita 
607204177f3SToshiaki Makita /* Must be protected by RTNL. */
608204177f3SToshiaki Makita void br_recalculate_fwd_mask(struct net_bridge *br)
609204177f3SToshiaki Makita {
610204177f3SToshiaki Makita 	if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
611204177f3SToshiaki Makita 		br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
612204177f3SToshiaki Makita 	else /* vlan_enabled && ETH_P_8021AD */
613204177f3SToshiaki Makita 		br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
614204177f3SToshiaki Makita 					      ~(1u << br->group_addr[5]);
615204177f3SToshiaki Makita }
616204177f3SToshiaki Makita 
617a7854037SNikolay Aleksandrov int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
618243a2e63SVlad Yasevich {
619243a2e63SVlad Yasevich 	if (br->vlan_enabled == val)
620a7854037SNikolay Aleksandrov 		return 0;
621243a2e63SVlad Yasevich 
622243a2e63SVlad Yasevich 	br->vlan_enabled = val;
6232796d0c6SVlad Yasevich 	br_manage_promisc(br);
624204177f3SToshiaki Makita 	recalculate_group_addr(br);
625204177f3SToshiaki Makita 	br_recalculate_fwd_mask(br);
626243a2e63SVlad Yasevich 
627a7854037SNikolay Aleksandrov 	return 0;
628a7854037SNikolay Aleksandrov }
629a7854037SNikolay Aleksandrov 
630a7854037SNikolay Aleksandrov int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
631a7854037SNikolay Aleksandrov {
632a7854037SNikolay Aleksandrov 	if (!rtnl_trylock())
633a7854037SNikolay Aleksandrov 		return restart_syscall();
634a7854037SNikolay Aleksandrov 
635a7854037SNikolay Aleksandrov 	__br_vlan_filter_toggle(br, val);
636243a2e63SVlad Yasevich 	rtnl_unlock();
637a7854037SNikolay Aleksandrov 
638243a2e63SVlad Yasevich 	return 0;
639243a2e63SVlad Yasevich }
640243a2e63SVlad Yasevich 
641d2d427b3SToshiaki Makita int __br_vlan_set_proto(struct net_bridge *br, __be16 proto)
642204177f3SToshiaki Makita {
643204177f3SToshiaki Makita 	int err = 0;
644204177f3SToshiaki Makita 	struct net_bridge_port *p;
6452594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
646d2d427b3SToshiaki Makita 	__be16 oldproto;
647204177f3SToshiaki Makita 
648204177f3SToshiaki Makita 	if (br->vlan_proto == proto)
649d2d427b3SToshiaki Makita 		return 0;
650204177f3SToshiaki Makita 
651204177f3SToshiaki Makita 	/* Add VLANs for the new proto to the device filter. */
652204177f3SToshiaki Makita 	list_for_each_entry(p, &br->port_list, list) {
6532594e906SNikolay Aleksandrov 		list_for_each_entry(vlan, &p->vlgrp->vlan_list, vlist) {
6542594e906SNikolay Aleksandrov 			err = vlan_vid_add(p->dev, proto, vlan->vid);
655204177f3SToshiaki Makita 			if (err)
656204177f3SToshiaki Makita 				goto err_filt;
657204177f3SToshiaki Makita 		}
658204177f3SToshiaki Makita 	}
659204177f3SToshiaki Makita 
660204177f3SToshiaki Makita 	oldproto = br->vlan_proto;
661204177f3SToshiaki Makita 	br->vlan_proto = proto;
662204177f3SToshiaki Makita 
663204177f3SToshiaki Makita 	recalculate_group_addr(br);
664204177f3SToshiaki Makita 	br_recalculate_fwd_mask(br);
665204177f3SToshiaki Makita 
666204177f3SToshiaki Makita 	/* Delete VLANs for the old proto from the device filter. */
6672594e906SNikolay Aleksandrov 	list_for_each_entry(p, &br->port_list, list)
6682594e906SNikolay Aleksandrov 		list_for_each_entry(vlan, &p->vlgrp->vlan_list, vlist)
6692594e906SNikolay Aleksandrov 			vlan_vid_del(p->dev, oldproto, vlan->vid);
670204177f3SToshiaki Makita 
671d2d427b3SToshiaki Makita 	return 0;
672204177f3SToshiaki Makita 
673204177f3SToshiaki Makita err_filt:
6742594e906SNikolay Aleksandrov 	list_for_each_entry_continue_reverse(vlan, &p->vlgrp->vlan_list, vlist)
6752594e906SNikolay Aleksandrov 		vlan_vid_del(p->dev, proto, vlan->vid);
676204177f3SToshiaki Makita 
6772594e906SNikolay Aleksandrov 	list_for_each_entry_continue_reverse(p, &br->port_list, list)
6782594e906SNikolay Aleksandrov 		list_for_each_entry(vlan, &p->vlgrp->vlan_list, vlist)
6792594e906SNikolay Aleksandrov 			vlan_vid_del(p->dev, proto, vlan->vid);
680204177f3SToshiaki Makita 
681d2d427b3SToshiaki Makita 	return err;
682d2d427b3SToshiaki Makita }
683d2d427b3SToshiaki Makita 
684d2d427b3SToshiaki Makita int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
685d2d427b3SToshiaki Makita {
686d2d427b3SToshiaki Makita 	int err;
687d2d427b3SToshiaki Makita 
688d2d427b3SToshiaki Makita 	if (val != ETH_P_8021Q && val != ETH_P_8021AD)
689d2d427b3SToshiaki Makita 		return -EPROTONOSUPPORT;
690d2d427b3SToshiaki Makita 
691d2d427b3SToshiaki Makita 	if (!rtnl_trylock())
692d2d427b3SToshiaki Makita 		return restart_syscall();
693d2d427b3SToshiaki Makita 
694d2d427b3SToshiaki Makita 	err = __br_vlan_set_proto(br, htons(val));
695d2d427b3SToshiaki Makita 	rtnl_unlock();
696d2d427b3SToshiaki Makita 
697d2d427b3SToshiaki Makita 	return err;
698204177f3SToshiaki Makita }
699204177f3SToshiaki Makita 
7002594e906SNikolay Aleksandrov static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 pvid,
7012594e906SNikolay Aleksandrov 			      u16 vid)
7025be5a2dfSVlad Yasevich {
7032594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
7042594e906SNikolay Aleksandrov 
7052594e906SNikolay Aleksandrov 	if (vid != pvid)
7062594e906SNikolay Aleksandrov 		return false;
7072594e906SNikolay Aleksandrov 
7082594e906SNikolay Aleksandrov 	v = br_vlan_lookup(&vg->vlan_hash, vid);
7092594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v) &&
7102594e906SNikolay Aleksandrov 	    (v->flags & BRIDGE_VLAN_INFO_UNTAGGED))
7112594e906SNikolay Aleksandrov 		return true;
7122594e906SNikolay Aleksandrov 
7132594e906SNikolay Aleksandrov 	return false;
7145be5a2dfSVlad Yasevich }
7155be5a2dfSVlad Yasevich 
7165be5a2dfSVlad Yasevich static void br_vlan_disable_default_pvid(struct net_bridge *br)
7175be5a2dfSVlad Yasevich {
7185be5a2dfSVlad Yasevich 	struct net_bridge_port *p;
7195be5a2dfSVlad Yasevich 	u16 pvid = br->default_pvid;
7205be5a2dfSVlad Yasevich 
7215be5a2dfSVlad Yasevich 	/* Disable default_pvid on all ports where it is still
7225be5a2dfSVlad Yasevich 	 * configured.
7235be5a2dfSVlad Yasevich 	 */
7242594e906SNikolay Aleksandrov 	if (vlan_default_pvid(br->vlgrp, br->pvid, pvid))
7255be5a2dfSVlad Yasevich 		br_vlan_delete(br, pvid);
7265be5a2dfSVlad Yasevich 
7275be5a2dfSVlad Yasevich 	list_for_each_entry(p, &br->port_list, list) {
7282594e906SNikolay Aleksandrov 		if (vlan_default_pvid(p->vlgrp, p->pvid, pvid))
7295be5a2dfSVlad Yasevich 			nbp_vlan_delete(p, pvid);
7305be5a2dfSVlad Yasevich 	}
7315be5a2dfSVlad Yasevich 
7325be5a2dfSVlad Yasevich 	br->default_pvid = 0;
7335be5a2dfSVlad Yasevich }
7345be5a2dfSVlad Yasevich 
7355be5a2dfSVlad Yasevich static int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid)
7365be5a2dfSVlad Yasevich {
7372594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *pvent;
7385be5a2dfSVlad Yasevich 	struct net_bridge_port *p;
7395be5a2dfSVlad Yasevich 	u16 old_pvid;
7405be5a2dfSVlad Yasevich 	int err = 0;
7415be5a2dfSVlad Yasevich 	unsigned long *changed;
7425be5a2dfSVlad Yasevich 
7435be5a2dfSVlad Yasevich 	changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long),
7445be5a2dfSVlad Yasevich 			  GFP_KERNEL);
7455be5a2dfSVlad Yasevich 	if (!changed)
7465be5a2dfSVlad Yasevich 		return -ENOMEM;
7475be5a2dfSVlad Yasevich 
7485be5a2dfSVlad Yasevich 	old_pvid = br->default_pvid;
7495be5a2dfSVlad Yasevich 
7505be5a2dfSVlad Yasevich 	/* Update default_pvid config only if we do not conflict with
7515be5a2dfSVlad Yasevich 	 * user configuration.
7525be5a2dfSVlad Yasevich 	 */
7532594e906SNikolay Aleksandrov 	pvent = br_vlan_find(br->vlgrp, pvid);
7542594e906SNikolay Aleksandrov 	if ((!old_pvid || vlan_default_pvid(br->vlgrp, br->pvid, old_pvid)) &&
7552594e906SNikolay Aleksandrov 	    (!pvent || !br_vlan_should_use(pvent))) {
7565be5a2dfSVlad Yasevich 		err = br_vlan_add(br, pvid,
7575be5a2dfSVlad Yasevich 				  BRIDGE_VLAN_INFO_PVID |
7582594e906SNikolay Aleksandrov 				  BRIDGE_VLAN_INFO_UNTAGGED |
7592594e906SNikolay Aleksandrov 				  BRIDGE_VLAN_INFO_BRENTRY);
7605be5a2dfSVlad Yasevich 		if (err)
7615be5a2dfSVlad Yasevich 			goto out;
7625be5a2dfSVlad Yasevich 		br_vlan_delete(br, old_pvid);
7635be5a2dfSVlad Yasevich 		set_bit(0, changed);
7645be5a2dfSVlad Yasevich 	}
7655be5a2dfSVlad Yasevich 
7665be5a2dfSVlad Yasevich 	list_for_each_entry(p, &br->port_list, list) {
7675be5a2dfSVlad Yasevich 		/* Update default_pvid config only if we do not conflict with
7685be5a2dfSVlad Yasevich 		 * user configuration.
7695be5a2dfSVlad Yasevich 		 */
7705be5a2dfSVlad Yasevich 		if ((old_pvid &&
7712594e906SNikolay Aleksandrov 		     !vlan_default_pvid(p->vlgrp, p->pvid, old_pvid)) ||
7722594e906SNikolay Aleksandrov 		    br_vlan_find(p->vlgrp, pvid))
7735be5a2dfSVlad Yasevich 			continue;
7745be5a2dfSVlad Yasevich 
7755be5a2dfSVlad Yasevich 		err = nbp_vlan_add(p, pvid,
7765be5a2dfSVlad Yasevich 				   BRIDGE_VLAN_INFO_PVID |
7775be5a2dfSVlad Yasevich 				   BRIDGE_VLAN_INFO_UNTAGGED);
7785be5a2dfSVlad Yasevich 		if (err)
7795be5a2dfSVlad Yasevich 			goto err_port;
7805be5a2dfSVlad Yasevich 		nbp_vlan_delete(p, old_pvid);
7815be5a2dfSVlad Yasevich 		set_bit(p->port_no, changed);
7825be5a2dfSVlad Yasevich 	}
7835be5a2dfSVlad Yasevich 
7845be5a2dfSVlad Yasevich 	br->default_pvid = pvid;
7855be5a2dfSVlad Yasevich 
7865be5a2dfSVlad Yasevich out:
7875be5a2dfSVlad Yasevich 	kfree(changed);
7885be5a2dfSVlad Yasevich 	return err;
7895be5a2dfSVlad Yasevich 
7905be5a2dfSVlad Yasevich err_port:
7915be5a2dfSVlad Yasevich 	list_for_each_entry_continue_reverse(p, &br->port_list, list) {
7925be5a2dfSVlad Yasevich 		if (!test_bit(p->port_no, changed))
7935be5a2dfSVlad Yasevich 			continue;
7945be5a2dfSVlad Yasevich 
7955be5a2dfSVlad Yasevich 		if (old_pvid)
7965be5a2dfSVlad Yasevich 			nbp_vlan_add(p, old_pvid,
7975be5a2dfSVlad Yasevich 				     BRIDGE_VLAN_INFO_PVID |
7985be5a2dfSVlad Yasevich 				     BRIDGE_VLAN_INFO_UNTAGGED);
7995be5a2dfSVlad Yasevich 		nbp_vlan_delete(p, pvid);
8005be5a2dfSVlad Yasevich 	}
8015be5a2dfSVlad Yasevich 
8025be5a2dfSVlad Yasevich 	if (test_bit(0, changed)) {
8035be5a2dfSVlad Yasevich 		if (old_pvid)
8045be5a2dfSVlad Yasevich 			br_vlan_add(br, old_pvid,
8055be5a2dfSVlad Yasevich 				    BRIDGE_VLAN_INFO_PVID |
8062594e906SNikolay Aleksandrov 				    BRIDGE_VLAN_INFO_UNTAGGED |
8072594e906SNikolay Aleksandrov 				    BRIDGE_VLAN_INFO_BRENTRY);
8085be5a2dfSVlad Yasevich 		br_vlan_delete(br, pvid);
8095be5a2dfSVlad Yasevich 	}
8105be5a2dfSVlad Yasevich 	goto out;
8115be5a2dfSVlad Yasevich }
8125be5a2dfSVlad Yasevich 
81396a20d9dSVlad Yasevich int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val)
81496a20d9dSVlad Yasevich {
81596a20d9dSVlad Yasevich 	u16 pvid = val;
81696a20d9dSVlad Yasevich 	int err = 0;
81796a20d9dSVlad Yasevich 
8185be5a2dfSVlad Yasevich 	if (val >= VLAN_VID_MASK)
81996a20d9dSVlad Yasevich 		return -EINVAL;
82096a20d9dSVlad Yasevich 
82196a20d9dSVlad Yasevich 	if (!rtnl_trylock())
82296a20d9dSVlad Yasevich 		return restart_syscall();
82396a20d9dSVlad Yasevich 
82496a20d9dSVlad Yasevich 	if (pvid == br->default_pvid)
82596a20d9dSVlad Yasevich 		goto unlock;
82696a20d9dSVlad Yasevich 
82796a20d9dSVlad Yasevich 	/* Only allow default pvid change when filtering is disabled */
82896a20d9dSVlad Yasevich 	if (br->vlan_enabled) {
82996a20d9dSVlad Yasevich 		pr_info_once("Please disable vlan filtering to change default_pvid\n");
83096a20d9dSVlad Yasevich 		err = -EPERM;
83196a20d9dSVlad Yasevich 		goto unlock;
83296a20d9dSVlad Yasevich 	}
83396a20d9dSVlad Yasevich 
8345be5a2dfSVlad Yasevich 	if (!pvid)
8355be5a2dfSVlad Yasevich 		br_vlan_disable_default_pvid(br);
8365be5a2dfSVlad Yasevich 	else
8375be5a2dfSVlad Yasevich 		err = __br_vlan_set_default_pvid(br, pvid);
83896a20d9dSVlad Yasevich 
83996a20d9dSVlad Yasevich unlock:
84096a20d9dSVlad Yasevich 	rtnl_unlock();
84196a20d9dSVlad Yasevich 	return err;
84296a20d9dSVlad Yasevich }
84396a20d9dSVlad Yasevich 
8445be5a2dfSVlad Yasevich int br_vlan_init(struct net_bridge *br)
8458580e211SToshiaki Makita {
8462594e906SNikolay Aleksandrov 	int ret = -ENOMEM;
8472594e906SNikolay Aleksandrov 
8482594e906SNikolay Aleksandrov 	br->vlgrp = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL);
8492594e906SNikolay Aleksandrov 	if (!br->vlgrp)
8502594e906SNikolay Aleksandrov 		goto out;
8512594e906SNikolay Aleksandrov 	ret = rhashtable_init(&br->vlgrp->vlan_hash, &br_vlan_rht_params);
8522594e906SNikolay Aleksandrov 	if (ret)
8532594e906SNikolay Aleksandrov 		goto err_rhtbl;
8542594e906SNikolay Aleksandrov 	INIT_LIST_HEAD(&br->vlgrp->vlan_list);
8558580e211SToshiaki Makita 	br->vlan_proto = htons(ETH_P_8021Q);
85696a20d9dSVlad Yasevich 	br->default_pvid = 1;
8572594e906SNikolay Aleksandrov 	ret = br_vlan_add(br, 1,
8582594e906SNikolay Aleksandrov 			  BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED |
8592594e906SNikolay Aleksandrov 			  BRIDGE_VLAN_INFO_BRENTRY);
8602594e906SNikolay Aleksandrov 	if (ret)
8612594e906SNikolay Aleksandrov 		goto err_vlan_add;
8622594e906SNikolay Aleksandrov 
8632594e906SNikolay Aleksandrov out:
8642594e906SNikolay Aleksandrov 	return ret;
8652594e906SNikolay Aleksandrov 
8662594e906SNikolay Aleksandrov err_vlan_add:
8672594e906SNikolay Aleksandrov 	rhashtable_destroy(&br->vlgrp->vlan_hash);
8682594e906SNikolay Aleksandrov err_rhtbl:
8692594e906SNikolay Aleksandrov 	kfree(br->vlgrp);
8702594e906SNikolay Aleksandrov 
8712594e906SNikolay Aleksandrov 	goto out;
8722594e906SNikolay Aleksandrov }
8732594e906SNikolay Aleksandrov 
8742594e906SNikolay Aleksandrov int nbp_vlan_init(struct net_bridge_port *p)
8752594e906SNikolay Aleksandrov {
8762594e906SNikolay Aleksandrov 	int ret = -ENOMEM;
8772594e906SNikolay Aleksandrov 
8782594e906SNikolay Aleksandrov 	p->vlgrp = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL);
8792594e906SNikolay Aleksandrov 	if (!p->vlgrp)
8802594e906SNikolay Aleksandrov 		goto out;
8812594e906SNikolay Aleksandrov 
8822594e906SNikolay Aleksandrov 	ret = rhashtable_init(&p->vlgrp->vlan_hash, &br_vlan_rht_params);
8832594e906SNikolay Aleksandrov 	if (ret)
8842594e906SNikolay Aleksandrov 		goto err_rhtbl;
8852594e906SNikolay Aleksandrov 	INIT_LIST_HEAD(&p->vlgrp->vlan_list);
8862594e906SNikolay Aleksandrov 	if (p->br->default_pvid) {
8872594e906SNikolay Aleksandrov 		ret = nbp_vlan_add(p, p->br->default_pvid,
8882594e906SNikolay Aleksandrov 				   BRIDGE_VLAN_INFO_PVID |
8892594e906SNikolay Aleksandrov 				   BRIDGE_VLAN_INFO_UNTAGGED);
8902594e906SNikolay Aleksandrov 		if (ret)
8912594e906SNikolay Aleksandrov 			goto err_vlan_add;
8922594e906SNikolay Aleksandrov 	}
8932594e906SNikolay Aleksandrov out:
8942594e906SNikolay Aleksandrov 	return ret;
8952594e906SNikolay Aleksandrov 
8962594e906SNikolay Aleksandrov err_vlan_add:
8972594e906SNikolay Aleksandrov 	rhashtable_destroy(&p->vlgrp->vlan_hash);
8982594e906SNikolay Aleksandrov err_rhtbl:
8992594e906SNikolay Aleksandrov 	kfree(p->vlgrp);
9002594e906SNikolay Aleksandrov 
9012594e906SNikolay Aleksandrov 	goto out;
9028580e211SToshiaki Makita }
9038580e211SToshiaki Makita 
9048adff41cSToshiaki Makita /* Must be protected by RTNL.
9058adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
9068adff41cSToshiaki Makita  */
907552406c4SVlad Yasevich int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
908243a2e63SVlad Yasevich {
9092594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
9102594e906SNikolay Aleksandrov 	int ret;
911243a2e63SVlad Yasevich 
912243a2e63SVlad Yasevich 	ASSERT_RTNL();
913243a2e63SVlad Yasevich 
9142594e906SNikolay Aleksandrov 	vlan = br_vlan_find(port->vlgrp, vid);
9152594e906SNikolay Aleksandrov 	if (vlan) {
9162594e906SNikolay Aleksandrov 		__vlan_add_flags(vlan, flags);
9172594e906SNikolay Aleksandrov 		return 0;
918243a2e63SVlad Yasevich 	}
919243a2e63SVlad Yasevich 
9202594e906SNikolay Aleksandrov 	vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
9212594e906SNikolay Aleksandrov 	if (!vlan)
9222594e906SNikolay Aleksandrov 		return -ENOMEM;
923243a2e63SVlad Yasevich 
9242594e906SNikolay Aleksandrov 	vlan->vid = vid;
9252594e906SNikolay Aleksandrov 	vlan->port = port;
9262594e906SNikolay Aleksandrov 	ret = __vlan_add(vlan, flags);
9272594e906SNikolay Aleksandrov 	if (ret)
9282594e906SNikolay Aleksandrov 		kfree(vlan);
929243a2e63SVlad Yasevich 
9302594e906SNikolay Aleksandrov 	return ret;
931243a2e63SVlad Yasevich }
932243a2e63SVlad Yasevich 
9338adff41cSToshiaki Makita /* Must be protected by RTNL.
9348adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
9358adff41cSToshiaki Makita  */
936243a2e63SVlad Yasevich int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
937243a2e63SVlad Yasevich {
9382594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
939243a2e63SVlad Yasevich 
940243a2e63SVlad Yasevich 	ASSERT_RTNL();
941243a2e63SVlad Yasevich 
9422594e906SNikolay Aleksandrov 	v = br_vlan_find(port->vlgrp, vid);
9432594e906SNikolay Aleksandrov 	if (!v)
9442594e906SNikolay Aleksandrov 		return -ENOENT;
945424bb9c9SToshiaki Makita 	br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
9461ea2d020SNikolay Aleksandrov 	br_fdb_delete_by_port(port->br, port, vid, 0);
947bc9a25d2SVlad Yasevich 
9482594e906SNikolay Aleksandrov 	return __vlan_del(v);
949243a2e63SVlad Yasevich }
950243a2e63SVlad Yasevich 
951243a2e63SVlad Yasevich void nbp_vlan_flush(struct net_bridge_port *port)
952243a2e63SVlad Yasevich {
9532594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
954243a2e63SVlad Yasevich 
955243a2e63SVlad Yasevich 	ASSERT_RTNL();
956243a2e63SVlad Yasevich 
9572594e906SNikolay Aleksandrov 	list_for_each_entry(vlan, &port->vlgrp->vlan_list, vlist)
9582594e906SNikolay Aleksandrov 		vlan_vid_del(port->dev, port->br->vlan_proto, vlan->vid);
959243a2e63SVlad Yasevich 
9602594e906SNikolay Aleksandrov 	__vlan_flush(nbp_vlan_group(port), &port->pvid);
9615be5a2dfSVlad Yasevich }
962