1243a2e63SVlad Yasevich #include <linux/kernel.h> 2243a2e63SVlad Yasevich #include <linux/netdevice.h> 3243a2e63SVlad Yasevich #include <linux/rtnetlink.h> 4243a2e63SVlad Yasevich #include <linux/slab.h> 57f109539SScott Feldman #include <net/switchdev.h> 6243a2e63SVlad Yasevich 7243a2e63SVlad Yasevich #include "br_private.h" 8efa5356bSRoopa Prabhu #include "br_private_tunnel.h" 9243a2e63SVlad Yasevich 102594e906SNikolay Aleksandrov static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg, 112594e906SNikolay Aleksandrov const void *ptr) 12552406c4SVlad Yasevich { 132594e906SNikolay Aleksandrov const struct net_bridge_vlan *vle = ptr; 142594e906SNikolay Aleksandrov u16 vid = *(u16 *)arg->key; 152594e906SNikolay Aleksandrov 162594e906SNikolay Aleksandrov return vle->vid != vid; 172594e906SNikolay Aleksandrov } 182594e906SNikolay Aleksandrov 192594e906SNikolay Aleksandrov static const struct rhashtable_params br_vlan_rht_params = { 202594e906SNikolay Aleksandrov .head_offset = offsetof(struct net_bridge_vlan, vnode), 212594e906SNikolay Aleksandrov .key_offset = offsetof(struct net_bridge_vlan, vid), 222594e906SNikolay Aleksandrov .key_len = sizeof(u16), 238af78b64SNikolay Aleksandrov .nelem_hint = 3, 248af78b64SNikolay Aleksandrov .locks_mul = 1, 252594e906SNikolay Aleksandrov .max_size = VLAN_N_VID, 262594e906SNikolay Aleksandrov .obj_cmpfn = br_vlan_cmp, 272594e906SNikolay Aleksandrov .automatic_shrinking = true, 282594e906SNikolay Aleksandrov }; 292594e906SNikolay Aleksandrov 302594e906SNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid) 312594e906SNikolay Aleksandrov { 322594e906SNikolay Aleksandrov return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params); 332594e906SNikolay Aleksandrov } 342594e906SNikolay Aleksandrov 35f418af63SNikolay Aleksandrov static bool __vlan_add_pvid(struct net_bridge_vlan_group *vg, u16 vid) 362594e906SNikolay Aleksandrov { 3777751ee8SNikolay Aleksandrov if (vg->pvid == vid) 38f418af63SNikolay Aleksandrov return false; 39552406c4SVlad Yasevich 40552406c4SVlad Yasevich smp_wmb(); 4177751ee8SNikolay Aleksandrov vg->pvid = vid; 42f418af63SNikolay Aleksandrov 43f418af63SNikolay Aleksandrov return true; 44552406c4SVlad Yasevich } 45552406c4SVlad Yasevich 46f418af63SNikolay Aleksandrov static bool __vlan_delete_pvid(struct net_bridge_vlan_group *vg, u16 vid) 47552406c4SVlad Yasevich { 4877751ee8SNikolay Aleksandrov if (vg->pvid != vid) 49f418af63SNikolay Aleksandrov return false; 50552406c4SVlad Yasevich 51552406c4SVlad Yasevich smp_wmb(); 5277751ee8SNikolay Aleksandrov vg->pvid = 0; 53f418af63SNikolay Aleksandrov 54f418af63SNikolay Aleksandrov return true; 55552406c4SVlad Yasevich } 56552406c4SVlad Yasevich 57f418af63SNikolay Aleksandrov /* return true if anything changed, false otherwise */ 58f418af63SNikolay Aleksandrov static bool __vlan_add_flags(struct net_bridge_vlan *v, u16 flags) 5935e03f3aSVlad Yasevich { 6077751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 61f418af63SNikolay Aleksandrov u16 old_flags = v->flags; 62f418af63SNikolay Aleksandrov bool ret; 6377751ee8SNikolay Aleksandrov 642594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) 65907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 66635126b7SVlad Yasevich else 67907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 6877751ee8SNikolay Aleksandrov 6977751ee8SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_PVID) 70f418af63SNikolay Aleksandrov ret = __vlan_add_pvid(vg, v->vid); 712594e906SNikolay Aleksandrov else 72f418af63SNikolay Aleksandrov ret = __vlan_delete_pvid(vg, v->vid); 7335e03f3aSVlad Yasevich 7435e03f3aSVlad Yasevich if (flags & BRIDGE_VLAN_INFO_UNTAGGED) 752594e906SNikolay Aleksandrov v->flags |= BRIDGE_VLAN_INFO_UNTAGGED; 76635126b7SVlad Yasevich else 772594e906SNikolay Aleksandrov v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED; 78f418af63SNikolay Aleksandrov 79f418af63SNikolay Aleksandrov return ret || !!(old_flags ^ v->flags); 8035e03f3aSVlad Yasevich } 8135e03f3aSVlad Yasevich 827f109539SScott Feldman static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br, 837f109539SScott Feldman u16 vid, u16 flags) 847f109539SScott Feldman { 850944d6b5SJiri Pirko int err; 867f109539SScott Feldman 870944d6b5SJiri Pirko /* Try switchdev op first. In case it is not supported, fallback to 880944d6b5SJiri Pirko * 8021q add. 890944d6b5SJiri Pirko */ 90d66e4348SPetr Machata err = br_switchdev_port_vlan_add(dev, vid, flags); 917f109539SScott Feldman if (err == -EOPNOTSUPP) 920944d6b5SJiri Pirko return vlan_vid_add(dev, br->vlan_proto, vid); 937f109539SScott Feldman return err; 947f109539SScott Feldman } 957f109539SScott Feldman 962594e906SNikolay Aleksandrov static void __vlan_add_list(struct net_bridge_vlan *v) 97243a2e63SVlad Yasevich { 98907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 992594e906SNikolay Aleksandrov struct list_head *headp, *hpos; 1002594e906SNikolay Aleksandrov struct net_bridge_vlan *vent; 101243a2e63SVlad Yasevich 102907b1e6eSNikolay Aleksandrov if (br_vlan_is_master(v)) 103907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 104907b1e6eSNikolay Aleksandrov else 105907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 106907b1e6eSNikolay Aleksandrov 107907b1e6eSNikolay Aleksandrov headp = &vg->vlan_list; 1082594e906SNikolay Aleksandrov list_for_each_prev(hpos, headp) { 1092594e906SNikolay Aleksandrov vent = list_entry(hpos, struct net_bridge_vlan, vlist); 1102594e906SNikolay Aleksandrov if (v->vid < vent->vid) 1112594e906SNikolay Aleksandrov continue; 1122594e906SNikolay Aleksandrov else 1132594e906SNikolay Aleksandrov break; 1142594e906SNikolay Aleksandrov } 115586c2b57SNikolay Aleksandrov list_add_rcu(&v->vlist, hpos); 116552406c4SVlad Yasevich } 117243a2e63SVlad Yasevich 1182594e906SNikolay Aleksandrov static void __vlan_del_list(struct net_bridge_vlan *v) 1192594e906SNikolay Aleksandrov { 120586c2b57SNikolay Aleksandrov list_del_rcu(&v->vlist); 121243a2e63SVlad Yasevich } 122243a2e63SVlad Yasevich 123bf361ad3SVivien Didelot static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br, 1247f109539SScott Feldman u16 vid) 1257f109539SScott Feldman { 1260944d6b5SJiri Pirko int err; 1277f109539SScott Feldman 1280944d6b5SJiri Pirko /* Try switchdev op first. In case it is not supported, fallback to 1290944d6b5SJiri Pirko * 8021q del. 1300944d6b5SJiri Pirko */ 131d66e4348SPetr Machata err = br_switchdev_port_vlan_del(dev, vid); 1320944d6b5SJiri Pirko if (err == -EOPNOTSUPP) { 1330944d6b5SJiri Pirko vlan_vid_del(dev, br->vlan_proto, vid); 1340944d6b5SJiri Pirko return 0; 1357f109539SScott Feldman } 136bf361ad3SVivien Didelot return err; 1377f109539SScott Feldman } 1387f109539SScott Feldman 139f8ed289fSNikolay Aleksandrov /* Returns a master vlan, if it didn't exist it gets created. In all cases a 140f8ed289fSNikolay Aleksandrov * a reference is taken to the master vlan before returning. 141f8ed289fSNikolay Aleksandrov */ 142f8ed289fSNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_get_master(struct net_bridge *br, u16 vid) 143f8ed289fSNikolay Aleksandrov { 144907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 145f8ed289fSNikolay Aleksandrov struct net_bridge_vlan *masterv; 146f8ed289fSNikolay Aleksandrov 147907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 148907b1e6eSNikolay Aleksandrov masterv = br_vlan_find(vg, vid); 149f8ed289fSNikolay Aleksandrov if (!masterv) { 150f418af63SNikolay Aleksandrov bool changed; 151f418af63SNikolay Aleksandrov 152f8ed289fSNikolay Aleksandrov /* missing global ctx, create it now */ 153f418af63SNikolay Aleksandrov if (br_vlan_add(br, vid, 0, &changed)) 154f8ed289fSNikolay Aleksandrov return NULL; 155907b1e6eSNikolay Aleksandrov masterv = br_vlan_find(vg, vid); 156f8ed289fSNikolay Aleksandrov if (WARN_ON(!masterv)) 157f8ed289fSNikolay Aleksandrov return NULL; 1580e5a82efSIdo Schimmel refcount_set(&masterv->refcnt, 1); 1590e5a82efSIdo Schimmel return masterv; 160f8ed289fSNikolay Aleksandrov } 16125127759SReshetova, Elena refcount_inc(&masterv->refcnt); 162f8ed289fSNikolay Aleksandrov 163f8ed289fSNikolay Aleksandrov return masterv; 164f8ed289fSNikolay Aleksandrov } 165f8ed289fSNikolay Aleksandrov 1666dada9b1SNikolay Aleksandrov static void br_master_vlan_rcu_free(struct rcu_head *rcu) 1676dada9b1SNikolay Aleksandrov { 1686dada9b1SNikolay Aleksandrov struct net_bridge_vlan *v; 1696dada9b1SNikolay Aleksandrov 1706dada9b1SNikolay Aleksandrov v = container_of(rcu, struct net_bridge_vlan, rcu); 1716dada9b1SNikolay Aleksandrov WARN_ON(!br_vlan_is_master(v)); 1726dada9b1SNikolay Aleksandrov free_percpu(v->stats); 1736dada9b1SNikolay Aleksandrov v->stats = NULL; 1746dada9b1SNikolay Aleksandrov kfree(v); 1756dada9b1SNikolay Aleksandrov } 1766dada9b1SNikolay Aleksandrov 177f8ed289fSNikolay Aleksandrov static void br_vlan_put_master(struct net_bridge_vlan *masterv) 178f8ed289fSNikolay Aleksandrov { 179907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 180907b1e6eSNikolay Aleksandrov 181f8ed289fSNikolay Aleksandrov if (!br_vlan_is_master(masterv)) 182f8ed289fSNikolay Aleksandrov return; 183f8ed289fSNikolay Aleksandrov 184907b1e6eSNikolay Aleksandrov vg = br_vlan_group(masterv->br); 18525127759SReshetova, Elena if (refcount_dec_and_test(&masterv->refcnt)) { 186907b1e6eSNikolay Aleksandrov rhashtable_remove_fast(&vg->vlan_hash, 187f8ed289fSNikolay Aleksandrov &masterv->vnode, br_vlan_rht_params); 188f8ed289fSNikolay Aleksandrov __vlan_del_list(masterv); 1896dada9b1SNikolay Aleksandrov call_rcu(&masterv->rcu, br_master_vlan_rcu_free); 190f8ed289fSNikolay Aleksandrov } 191f8ed289fSNikolay Aleksandrov } 192f8ed289fSNikolay Aleksandrov 1939163a0fcSNikolay Aleksandrov static void nbp_vlan_rcu_free(struct rcu_head *rcu) 1949163a0fcSNikolay Aleksandrov { 1959163a0fcSNikolay Aleksandrov struct net_bridge_vlan *v; 1969163a0fcSNikolay Aleksandrov 1979163a0fcSNikolay Aleksandrov v = container_of(rcu, struct net_bridge_vlan, rcu); 1989163a0fcSNikolay Aleksandrov WARN_ON(br_vlan_is_master(v)); 1999163a0fcSNikolay Aleksandrov /* if we had per-port stats configured then free them here */ 2009d332e69SNikolay Aleksandrov if (v->priv_flags & BR_VLFLAG_PER_PORT_STATS) 2019163a0fcSNikolay Aleksandrov free_percpu(v->stats); 2029163a0fcSNikolay Aleksandrov v->stats = NULL; 2039163a0fcSNikolay Aleksandrov kfree(v); 2049163a0fcSNikolay Aleksandrov } 2059163a0fcSNikolay Aleksandrov 2062594e906SNikolay Aleksandrov /* This is the shared VLAN add function which works for both ports and bridge 2072594e906SNikolay Aleksandrov * devices. There are four possible calls to this function in terms of the 2082594e906SNikolay Aleksandrov * vlan entry type: 2092594e906SNikolay Aleksandrov * 1. vlan is being added on a port (no master flags, global entry exists) 210ddd611d3SIdo Schimmel * 2. vlan is being added on a bridge (both master and brentry flags) 2112594e906SNikolay Aleksandrov * 3. vlan is being added on a port, but a global entry didn't exist which 212ddd611d3SIdo Schimmel * is being created right now (master flag set, brentry flag unset), the 2132594e906SNikolay Aleksandrov * global entry is used for global per-vlan features, but not for filtering 214ddd611d3SIdo Schimmel * 4. same as 3 but with both master and brentry flags set so the entry 2152594e906SNikolay Aleksandrov * will be used for filtering in both the port and the bridge 2162594e906SNikolay Aleksandrov */ 2172594e906SNikolay Aleksandrov static int __vlan_add(struct net_bridge_vlan *v, u16 flags) 218243a2e63SVlad Yasevich { 2192594e906SNikolay Aleksandrov struct net_bridge_vlan *masterv = NULL; 2202594e906SNikolay Aleksandrov struct net_bridge_port *p = NULL; 2216be144f6SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 2222594e906SNikolay Aleksandrov struct net_device *dev; 2232594e906SNikolay Aleksandrov struct net_bridge *br; 224bf361ad3SVivien Didelot int err; 225bf361ad3SVivien Didelot 2262594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) { 2272594e906SNikolay Aleksandrov br = v->br; 2282594e906SNikolay Aleksandrov dev = br->dev; 229907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 2302594e906SNikolay Aleksandrov } else { 2312594e906SNikolay Aleksandrov p = v->port; 2322594e906SNikolay Aleksandrov br = p->br; 2332594e906SNikolay Aleksandrov dev = p->dev; 234907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 2352594e906SNikolay Aleksandrov } 2362594e906SNikolay Aleksandrov 2372594e906SNikolay Aleksandrov if (p) { 2382594e906SNikolay Aleksandrov /* Add VLAN to the device filter if it is supported. 2392594e906SNikolay Aleksandrov * This ensures tagged traffic enters the bridge when 2402594e906SNikolay Aleksandrov * promiscuous mode is disabled by br_manage_promisc(). 2412594e906SNikolay Aleksandrov */ 2422594e906SNikolay Aleksandrov err = __vlan_vid_add(dev, br, v->vid, flags); 243bf361ad3SVivien Didelot if (err) 2442594e906SNikolay Aleksandrov goto out; 2452594e906SNikolay Aleksandrov 2462594e906SNikolay Aleksandrov /* need to work on the master vlan too */ 2472594e906SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_MASTER) { 248f418af63SNikolay Aleksandrov bool changed; 249f418af63SNikolay Aleksandrov 250f418af63SNikolay Aleksandrov err = br_vlan_add(br, v->vid, 251f418af63SNikolay Aleksandrov flags | BRIDGE_VLAN_INFO_BRENTRY, 252f418af63SNikolay Aleksandrov &changed); 2532594e906SNikolay Aleksandrov if (err) 2542594e906SNikolay Aleksandrov goto out_filt; 2552594e906SNikolay Aleksandrov } 2562594e906SNikolay Aleksandrov 257f8ed289fSNikolay Aleksandrov masterv = br_vlan_get_master(br, v->vid); 258f8ed289fSNikolay Aleksandrov if (!masterv) 2592594e906SNikolay Aleksandrov goto out_filt; 2602594e906SNikolay Aleksandrov v->brvlan = masterv; 2619163a0fcSNikolay Aleksandrov if (br_opt_get(br, BROPT_VLAN_STATS_PER_PORT)) { 2629163a0fcSNikolay Aleksandrov v->stats = netdev_alloc_pcpu_stats(struct br_vlan_stats); 2639163a0fcSNikolay Aleksandrov if (!v->stats) { 2649163a0fcSNikolay Aleksandrov err = -ENOMEM; 2659163a0fcSNikolay Aleksandrov goto out_filt; 2669163a0fcSNikolay Aleksandrov } 2679d332e69SNikolay Aleksandrov v->priv_flags |= BR_VLFLAG_PER_PORT_STATS; 2689163a0fcSNikolay Aleksandrov } else { 2696dada9b1SNikolay Aleksandrov v->stats = masterv->stats; 2709163a0fcSNikolay Aleksandrov } 2719c86ce2cSPetr Machata } else { 2729c86ce2cSPetr Machata err = br_switchdev_port_vlan_add(dev, v->vid, flags); 2739c86ce2cSPetr Machata if (err && err != -EOPNOTSUPP) 2749c86ce2cSPetr Machata goto out; 2752594e906SNikolay Aleksandrov } 2762594e906SNikolay Aleksandrov 2776be144f6SNikolay Aleksandrov /* Add the dev mac and count the vlan only if it's usable */ 2782594e906SNikolay Aleksandrov if (br_vlan_should_use(v)) { 2792594e906SNikolay Aleksandrov err = br_fdb_insert(br, p, dev->dev_addr, v->vid); 2802594e906SNikolay Aleksandrov if (err) { 2812594e906SNikolay Aleksandrov br_err(br, "failed insert local address into bridge forwarding table\n"); 2822594e906SNikolay Aleksandrov goto out_filt; 2832594e906SNikolay Aleksandrov } 2846be144f6SNikolay Aleksandrov vg->num_vlans++; 2852594e906SNikolay Aleksandrov } 2862594e906SNikolay Aleksandrov 2876be144f6SNikolay Aleksandrov err = rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode, 2886be144f6SNikolay Aleksandrov br_vlan_rht_params); 2892594e906SNikolay Aleksandrov if (err) 2902594e906SNikolay Aleksandrov goto out_fdb_insert; 2912594e906SNikolay Aleksandrov 2922594e906SNikolay Aleksandrov __vlan_add_list(v); 2932594e906SNikolay Aleksandrov __vlan_add_flags(v, flags); 2942594e906SNikolay Aleksandrov out: 2952594e906SNikolay Aleksandrov return err; 2962594e906SNikolay Aleksandrov 2972594e906SNikolay Aleksandrov out_fdb_insert: 2986be144f6SNikolay Aleksandrov if (br_vlan_should_use(v)) { 2996be144f6SNikolay Aleksandrov br_fdb_find_delete_local(br, p, dev->dev_addr, v->vid); 3006be144f6SNikolay Aleksandrov vg->num_vlans--; 3016be144f6SNikolay Aleksandrov } 3022594e906SNikolay Aleksandrov 3032594e906SNikolay Aleksandrov out_filt: 3042594e906SNikolay Aleksandrov if (p) { 3052594e906SNikolay Aleksandrov __vlan_vid_del(dev, br, v->vid); 3062594e906SNikolay Aleksandrov if (masterv) { 3071a3aea25SLi RongQing if (v->stats && masterv->stats != v->stats) 3081a3aea25SLi RongQing free_percpu(v->stats); 3091a3aea25SLi RongQing v->stats = NULL; 3101a3aea25SLi RongQing 311f8ed289fSNikolay Aleksandrov br_vlan_put_master(masterv); 3122594e906SNikolay Aleksandrov v->brvlan = NULL; 3132594e906SNikolay Aleksandrov } 3149c86ce2cSPetr Machata } else { 3159c86ce2cSPetr Machata br_switchdev_port_vlan_del(dev, v->vid); 3162594e906SNikolay Aleksandrov } 3172594e906SNikolay Aleksandrov 3182594e906SNikolay Aleksandrov goto out; 3192594e906SNikolay Aleksandrov } 3202594e906SNikolay Aleksandrov 3212594e906SNikolay Aleksandrov static int __vlan_del(struct net_bridge_vlan *v) 3222594e906SNikolay Aleksandrov { 3232594e906SNikolay Aleksandrov struct net_bridge_vlan *masterv = v; 32477751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 3252594e906SNikolay Aleksandrov struct net_bridge_port *p = NULL; 3262594e906SNikolay Aleksandrov int err = 0; 3272594e906SNikolay Aleksandrov 3282594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) { 329907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 3302594e906SNikolay Aleksandrov } else { 3312594e906SNikolay Aleksandrov p = v->port; 332907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 3332594e906SNikolay Aleksandrov masterv = v->brvlan; 3342594e906SNikolay Aleksandrov } 3352594e906SNikolay Aleksandrov 33677751ee8SNikolay Aleksandrov __vlan_delete_pvid(vg, v->vid); 3372594e906SNikolay Aleksandrov if (p) { 3382594e906SNikolay Aleksandrov err = __vlan_vid_del(p->dev, p->br, v->vid); 3392594e906SNikolay Aleksandrov if (err) 3402594e906SNikolay Aleksandrov goto out; 3419c86ce2cSPetr Machata } else { 3429c86ce2cSPetr Machata err = br_switchdev_port_vlan_del(v->br->dev, v->vid); 3439c86ce2cSPetr Machata if (err && err != -EOPNOTSUPP) 3449c86ce2cSPetr Machata goto out; 3459c86ce2cSPetr Machata err = 0; 3462594e906SNikolay Aleksandrov } 3472594e906SNikolay Aleksandrov 3486be144f6SNikolay Aleksandrov if (br_vlan_should_use(v)) { 3492594e906SNikolay Aleksandrov v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY; 3506be144f6SNikolay Aleksandrov vg->num_vlans--; 3512594e906SNikolay Aleksandrov } 3522594e906SNikolay Aleksandrov 3532594e906SNikolay Aleksandrov if (masterv != v) { 354efa5356bSRoopa Prabhu vlan_tunnel_info_del(vg, v); 35577751ee8SNikolay Aleksandrov rhashtable_remove_fast(&vg->vlan_hash, &v->vnode, 35677751ee8SNikolay Aleksandrov br_vlan_rht_params); 3572594e906SNikolay Aleksandrov __vlan_del_list(v); 3589163a0fcSNikolay Aleksandrov call_rcu(&v->rcu, nbp_vlan_rcu_free); 3592594e906SNikolay Aleksandrov } 3602594e906SNikolay Aleksandrov 361f8ed289fSNikolay Aleksandrov br_vlan_put_master(masterv); 3622594e906SNikolay Aleksandrov out: 363bf361ad3SVivien Didelot return err; 3648580e211SToshiaki Makita } 365243a2e63SVlad Yasevich 366f409d0edSNikolay Aleksandrov static void __vlan_group_free(struct net_bridge_vlan_group *vg) 367f409d0edSNikolay Aleksandrov { 368f409d0edSNikolay Aleksandrov WARN_ON(!list_empty(&vg->vlan_list)); 369f409d0edSNikolay Aleksandrov rhashtable_destroy(&vg->vlan_hash); 370efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 371f409d0edSNikolay Aleksandrov kfree(vg); 372f409d0edSNikolay Aleksandrov } 373f409d0edSNikolay Aleksandrov 374f409d0edSNikolay Aleksandrov static void __vlan_flush(struct net_bridge_vlan_group *vg) 375243a2e63SVlad Yasevich { 3762594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan, *tmp; 3772594e906SNikolay Aleksandrov 378f409d0edSNikolay Aleksandrov __vlan_delete_pvid(vg, vg->pvid); 379f409d0edSNikolay Aleksandrov list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist) 3802594e906SNikolay Aleksandrov __vlan_del(vlan); 381243a2e63SVlad Yasevich } 382243a2e63SVlad Yasevich 38378851988SVlad Yasevich struct sk_buff *br_handle_vlan(struct net_bridge *br, 38411538d03SRoopa Prabhu const struct net_bridge_port *p, 3852594e906SNikolay Aleksandrov struct net_bridge_vlan_group *vg, 386a37b85c9SVlad Yasevich struct sk_buff *skb) 387a37b85c9SVlad Yasevich { 3886dada9b1SNikolay Aleksandrov struct br_vlan_stats *stats; 3892594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 390a37b85c9SVlad Yasevich u16 vid; 391a37b85c9SVlad Yasevich 39220adfa1aSVlad Yasevich /* If this packet was not filtered at input, let it pass */ 39320adfa1aSVlad Yasevich if (!BR_INPUT_SKB_CB(skb)->vlan_filtered) 39478851988SVlad Yasevich goto out; 39578851988SVlad Yasevich 3962594e906SNikolay Aleksandrov /* At this point, we know that the frame was filtered and contains 3972594e906SNikolay Aleksandrov * a valid vlan id. If the vlan id has untagged flag set, 3982594e906SNikolay Aleksandrov * send untagged; otherwise, send tagged. 3992594e906SNikolay Aleksandrov */ 4002594e906SNikolay Aleksandrov br_vlan_get_tag(skb, &vid); 4012594e906SNikolay Aleksandrov v = br_vlan_find(vg, vid); 4022594e906SNikolay Aleksandrov /* Vlan entry must be configured at this point. The 403fc92f745SVlad Yasevich * only exception is the bridge is set in promisc mode and the 404fc92f745SVlad Yasevich * packet is destined for the bridge device. In this case 405fc92f745SVlad Yasevich * pass the packet as is. 406fc92f745SVlad Yasevich */ 4072594e906SNikolay Aleksandrov if (!v || !br_vlan_should_use(v)) { 408fc92f745SVlad Yasevich if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) { 409fc92f745SVlad Yasevich goto out; 410fc92f745SVlad Yasevich } else { 411fc92f745SVlad Yasevich kfree_skb(skb); 412fc92f745SVlad Yasevich return NULL; 413fc92f745SVlad Yasevich } 414fc92f745SVlad Yasevich } 415ae75767eSNikolay Aleksandrov if (br_opt_get(br, BROPT_VLAN_STATS_ENABLED)) { 4166dada9b1SNikolay Aleksandrov stats = this_cpu_ptr(v->stats); 4176dada9b1SNikolay Aleksandrov u64_stats_update_begin(&stats->syncp); 4186dada9b1SNikolay Aleksandrov stats->tx_bytes += skb->len; 4196dada9b1SNikolay Aleksandrov stats->tx_packets++; 4206dada9b1SNikolay Aleksandrov u64_stats_update_end(&stats->syncp); 4216dada9b1SNikolay Aleksandrov } 4226dada9b1SNikolay Aleksandrov 4232594e906SNikolay Aleksandrov if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED) 4245978f8a9SMichał Mirosław __vlan_hwaccel_clear_tag(skb); 42511538d03SRoopa Prabhu 42611538d03SRoopa Prabhu if (p && (p->flags & BR_VLAN_TUNNEL) && 42711538d03SRoopa Prabhu br_handle_egress_vlan_tunnel(skb, v)) { 42811538d03SRoopa Prabhu kfree_skb(skb); 42911538d03SRoopa Prabhu return NULL; 43011538d03SRoopa Prabhu } 43178851988SVlad Yasevich out: 43278851988SVlad Yasevich return skb; 43378851988SVlad Yasevich } 43478851988SVlad Yasevich 43578851988SVlad Yasevich /* Called under RCU */ 4366dada9b1SNikolay Aleksandrov static bool __allowed_ingress(const struct net_bridge *br, 4376dada9b1SNikolay Aleksandrov struct net_bridge_vlan_group *vg, 43878851988SVlad Yasevich struct sk_buff *skb, u16 *vid) 43978851988SVlad Yasevich { 4406dada9b1SNikolay Aleksandrov struct br_vlan_stats *stats; 4416dada9b1SNikolay Aleksandrov struct net_bridge_vlan *v; 4428580e211SToshiaki Makita bool tagged; 443a37b85c9SVlad Yasevich 44420adfa1aSVlad Yasevich BR_INPUT_SKB_CB(skb)->vlan_filtered = true; 44512464bb8SToshiaki Makita /* If vlan tx offload is disabled on bridge device and frame was 44612464bb8SToshiaki Makita * sent from vlan device on the bridge device, it does not have 44712464bb8SToshiaki Makita * HW accelerated vlan tag. 44812464bb8SToshiaki Makita */ 449df8a39deSJiri Pirko if (unlikely(!skb_vlan_tag_present(skb) && 4506dada9b1SNikolay Aleksandrov skb->protocol == br->vlan_proto)) { 4510d5501c1SVlad Yasevich skb = skb_vlan_untag(skb); 45212464bb8SToshiaki Makita if (unlikely(!skb)) 45312464bb8SToshiaki Makita return false; 45412464bb8SToshiaki Makita } 45512464bb8SToshiaki Makita 4568580e211SToshiaki Makita if (!br_vlan_get_tag(skb, vid)) { 4578580e211SToshiaki Makita /* Tagged frame */ 4586dada9b1SNikolay Aleksandrov if (skb->vlan_proto != br->vlan_proto) { 4598580e211SToshiaki Makita /* Protocol-mismatch, empty out vlan_tci for new tag */ 4608580e211SToshiaki Makita skb_push(skb, ETH_HLEN); 46162749e2cSJiri Pirko skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto, 462df8a39deSJiri Pirko skb_vlan_tag_get(skb)); 4638580e211SToshiaki Makita if (unlikely(!skb)) 4648580e211SToshiaki Makita return false; 4658580e211SToshiaki Makita 4668580e211SToshiaki Makita skb_pull(skb, ETH_HLEN); 4678580e211SToshiaki Makita skb_reset_mac_len(skb); 4688580e211SToshiaki Makita *vid = 0; 4698580e211SToshiaki Makita tagged = false; 4708580e211SToshiaki Makita } else { 4718580e211SToshiaki Makita tagged = true; 4728580e211SToshiaki Makita } 4738580e211SToshiaki Makita } else { 4748580e211SToshiaki Makita /* Untagged frame */ 4758580e211SToshiaki Makita tagged = false; 4768580e211SToshiaki Makita } 4778580e211SToshiaki Makita 478b90356ceSToshiaki Makita if (!*vid) { 47977751ee8SNikolay Aleksandrov u16 pvid = br_get_pvid(vg); 48077751ee8SNikolay Aleksandrov 481b90356ceSToshiaki Makita /* Frame had a tag with VID 0 or did not have a tag. 482b90356ceSToshiaki Makita * See if pvid is set on this port. That tells us which 483b90356ceSToshiaki Makita * vlan untagged or priority-tagged traffic belongs to. 48478851988SVlad Yasevich */ 4853df6bf45SVlad Yasevich if (!pvid) 486eb707618SToshiaki Makita goto drop; 48778851988SVlad Yasevich 488b90356ceSToshiaki Makita /* PVID is set on this port. Any untagged or priority-tagged 489b90356ceSToshiaki Makita * ingress frame is considered to belong to this vlan. 49078851988SVlad Yasevich */ 491dfb5fa32SToshiaki Makita *vid = pvid; 4928580e211SToshiaki Makita if (likely(!tagged)) 493b90356ceSToshiaki Makita /* Untagged Frame. */ 4946dada9b1SNikolay Aleksandrov __vlan_hwaccel_put_tag(skb, br->vlan_proto, pvid); 495b90356ceSToshiaki Makita else 496b90356ceSToshiaki Makita /* Priority-tagged Frame. 4975978f8a9SMichał Mirosław * At this point, we know that skb->vlan_tci VID 4985978f8a9SMichał Mirosław * field was 0. 499b90356ceSToshiaki Makita * We update only VID field and preserve PCP field. 500b90356ceSToshiaki Makita */ 501b90356ceSToshiaki Makita skb->vlan_tci |= pvid; 502b90356ceSToshiaki Makita 5036dada9b1SNikolay Aleksandrov /* if stats are disabled we can avoid the lookup */ 504ae75767eSNikolay Aleksandrov if (!br_opt_get(br, BROPT_VLAN_STATS_ENABLED)) 50578851988SVlad Yasevich return true; 50678851988SVlad Yasevich } 50777751ee8SNikolay Aleksandrov v = br_vlan_find(vg, *vid); 5086dada9b1SNikolay Aleksandrov if (!v || !br_vlan_should_use(v)) 5096dada9b1SNikolay Aleksandrov goto drop; 5106dada9b1SNikolay Aleksandrov 511ae75767eSNikolay Aleksandrov if (br_opt_get(br, BROPT_VLAN_STATS_ENABLED)) { 5126dada9b1SNikolay Aleksandrov stats = this_cpu_ptr(v->stats); 5136dada9b1SNikolay Aleksandrov u64_stats_update_begin(&stats->syncp); 5146dada9b1SNikolay Aleksandrov stats->rx_bytes += skb->len; 5156dada9b1SNikolay Aleksandrov stats->rx_packets++; 5166dada9b1SNikolay Aleksandrov u64_stats_update_end(&stats->syncp); 5176dada9b1SNikolay Aleksandrov } 5186dada9b1SNikolay Aleksandrov 519a37b85c9SVlad Yasevich return true; 5206dada9b1SNikolay Aleksandrov 521eb707618SToshiaki Makita drop: 522eb707618SToshiaki Makita kfree_skb(skb); 523a37b85c9SVlad Yasevich return false; 524a37b85c9SVlad Yasevich } 525a37b85c9SVlad Yasevich 52677751ee8SNikolay Aleksandrov bool br_allowed_ingress(const struct net_bridge *br, 52777751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg, struct sk_buff *skb, 5282594e906SNikolay Aleksandrov u16 *vid) 5292594e906SNikolay Aleksandrov { 5302594e906SNikolay Aleksandrov /* If VLAN filtering is disabled on the bridge, all packets are 5312594e906SNikolay Aleksandrov * permitted. 5322594e906SNikolay Aleksandrov */ 533ae75767eSNikolay Aleksandrov if (!br_opt_get(br, BROPT_VLAN_ENABLED)) { 5342594e906SNikolay Aleksandrov BR_INPUT_SKB_CB(skb)->vlan_filtered = false; 5352594e906SNikolay Aleksandrov return true; 5362594e906SNikolay Aleksandrov } 5372594e906SNikolay Aleksandrov 5386dada9b1SNikolay Aleksandrov return __allowed_ingress(br, vg, skb, vid); 5392594e906SNikolay Aleksandrov } 5402594e906SNikolay Aleksandrov 54185f46c6bSVlad Yasevich /* Called under RCU. */ 5422594e906SNikolay Aleksandrov bool br_allowed_egress(struct net_bridge_vlan_group *vg, 54385f46c6bSVlad Yasevich const struct sk_buff *skb) 54485f46c6bSVlad Yasevich { 5452594e906SNikolay Aleksandrov const struct net_bridge_vlan *v; 54685f46c6bSVlad Yasevich u16 vid; 54785f46c6bSVlad Yasevich 54820adfa1aSVlad Yasevich /* If this packet was not filtered at input, let it pass */ 54920adfa1aSVlad Yasevich if (!BR_INPUT_SKB_CB(skb)->vlan_filtered) 55085f46c6bSVlad Yasevich return true; 55185f46c6bSVlad Yasevich 55285f46c6bSVlad Yasevich br_vlan_get_tag(skb, &vid); 5532594e906SNikolay Aleksandrov v = br_vlan_find(vg, vid); 5542594e906SNikolay Aleksandrov if (v && br_vlan_should_use(v)) 55585f46c6bSVlad Yasevich return true; 55685f46c6bSVlad Yasevich 55785f46c6bSVlad Yasevich return false; 55885f46c6bSVlad Yasevich } 55985f46c6bSVlad Yasevich 560e0d7968aSToshiaki Makita /* Called under RCU */ 561e0d7968aSToshiaki Makita bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid) 562e0d7968aSToshiaki Makita { 563468e7944SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 564e0d7968aSToshiaki Makita struct net_bridge *br = p->br; 565e0d7968aSToshiaki Makita 56620adfa1aSVlad Yasevich /* If filtering was disabled at input, let it pass. */ 567ae75767eSNikolay Aleksandrov if (!br_opt_get(br, BROPT_VLAN_ENABLED)) 568e0d7968aSToshiaki Makita return true; 569e0d7968aSToshiaki Makita 570eca1e006SIdo Schimmel vg = nbp_vlan_group_rcu(p); 571468e7944SNikolay Aleksandrov if (!vg || !vg->num_vlans) 572e0d7968aSToshiaki Makita return false; 573e0d7968aSToshiaki Makita 5748580e211SToshiaki Makita if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto) 5758580e211SToshiaki Makita *vid = 0; 5768580e211SToshiaki Makita 577e0d7968aSToshiaki Makita if (!*vid) { 57877751ee8SNikolay Aleksandrov *vid = br_get_pvid(vg); 5793df6bf45SVlad Yasevich if (!*vid) 580e0d7968aSToshiaki Makita return false; 581e0d7968aSToshiaki Makita 582e0d7968aSToshiaki Makita return true; 583e0d7968aSToshiaki Makita } 584e0d7968aSToshiaki Makita 58577751ee8SNikolay Aleksandrov if (br_vlan_find(vg, *vid)) 586e0d7968aSToshiaki Makita return true; 587e0d7968aSToshiaki Makita 588e0d7968aSToshiaki Makita return false; 589e0d7968aSToshiaki Makita } 590e0d7968aSToshiaki Makita 591dbd6dc75SPetr Machata static int br_vlan_add_existing(struct net_bridge *br, 592dbd6dc75SPetr Machata struct net_bridge_vlan_group *vg, 593dbd6dc75SPetr Machata struct net_bridge_vlan *vlan, 594dbd6dc75SPetr Machata u16 flags, bool *changed) 595dbd6dc75SPetr Machata { 596dbd6dc75SPetr Machata int err; 597dbd6dc75SPetr Machata 5989c86ce2cSPetr Machata err = br_switchdev_port_vlan_add(br->dev, vlan->vid, flags); 5999c86ce2cSPetr Machata if (err && err != -EOPNOTSUPP) 6009c86ce2cSPetr Machata return err; 6019c86ce2cSPetr Machata 602dbd6dc75SPetr Machata if (!br_vlan_is_brentry(vlan)) { 603dbd6dc75SPetr Machata /* Trying to change flags of non-existent bridge vlan */ 6049c86ce2cSPetr Machata if (!(flags & BRIDGE_VLAN_INFO_BRENTRY)) { 6059c86ce2cSPetr Machata err = -EINVAL; 6069c86ce2cSPetr Machata goto err_flags; 6079c86ce2cSPetr Machata } 608dbd6dc75SPetr Machata /* It was only kept for port vlans, now make it real */ 609dbd6dc75SPetr Machata err = br_fdb_insert(br, NULL, br->dev->dev_addr, 610dbd6dc75SPetr Machata vlan->vid); 611dbd6dc75SPetr Machata if (err) { 612dbd6dc75SPetr Machata br_err(br, "failed to insert local address into bridge forwarding table\n"); 6139c86ce2cSPetr Machata goto err_fdb_insert; 614dbd6dc75SPetr Machata } 615dbd6dc75SPetr Machata 616dbd6dc75SPetr Machata refcount_inc(&vlan->refcnt); 617dbd6dc75SPetr Machata vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY; 618dbd6dc75SPetr Machata vg->num_vlans++; 619dbd6dc75SPetr Machata *changed = true; 620dbd6dc75SPetr Machata } 621dbd6dc75SPetr Machata 622dbd6dc75SPetr Machata if (__vlan_add_flags(vlan, flags)) 623dbd6dc75SPetr Machata *changed = true; 624dbd6dc75SPetr Machata 625dbd6dc75SPetr Machata return 0; 6269c86ce2cSPetr Machata 6279c86ce2cSPetr Machata err_fdb_insert: 6289c86ce2cSPetr Machata err_flags: 6299c86ce2cSPetr Machata br_switchdev_port_vlan_del(br->dev, vlan->vid); 6309c86ce2cSPetr Machata return err; 631dbd6dc75SPetr Machata } 632dbd6dc75SPetr Machata 6338adff41cSToshiaki Makita /* Must be protected by RTNL. 6348adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 635f418af63SNikolay Aleksandrov * changed must be true only if the vlan was created or updated 6368adff41cSToshiaki Makita */ 637f418af63SNikolay Aleksandrov int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags, bool *changed) 638243a2e63SVlad Yasevich { 639907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 6402594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 6412594e906SNikolay Aleksandrov int ret; 642243a2e63SVlad Yasevich 643243a2e63SVlad Yasevich ASSERT_RTNL(); 644243a2e63SVlad Yasevich 645f418af63SNikolay Aleksandrov *changed = false; 646907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 647907b1e6eSNikolay Aleksandrov vlan = br_vlan_find(vg, vid); 648dbd6dc75SPetr Machata if (vlan) 649dbd6dc75SPetr Machata return br_vlan_add_existing(br, vg, vlan, flags, changed); 650243a2e63SVlad Yasevich 6512594e906SNikolay Aleksandrov vlan = kzalloc(sizeof(*vlan), GFP_KERNEL); 6522594e906SNikolay Aleksandrov if (!vlan) 653243a2e63SVlad Yasevich return -ENOMEM; 654243a2e63SVlad Yasevich 6556dada9b1SNikolay Aleksandrov vlan->stats = netdev_alloc_pcpu_stats(struct br_vlan_stats); 6566dada9b1SNikolay Aleksandrov if (!vlan->stats) { 6576dada9b1SNikolay Aleksandrov kfree(vlan); 6586dada9b1SNikolay Aleksandrov return -ENOMEM; 6596dada9b1SNikolay Aleksandrov } 6602594e906SNikolay Aleksandrov vlan->vid = vid; 6612594e906SNikolay Aleksandrov vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER; 6622594e906SNikolay Aleksandrov vlan->flags &= ~BRIDGE_VLAN_INFO_PVID; 6632594e906SNikolay Aleksandrov vlan->br = br; 6642594e906SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_BRENTRY) 66525127759SReshetova, Elena refcount_set(&vlan->refcnt, 1); 6662594e906SNikolay Aleksandrov ret = __vlan_add(vlan, flags); 6676dada9b1SNikolay Aleksandrov if (ret) { 6686dada9b1SNikolay Aleksandrov free_percpu(vlan->stats); 6692594e906SNikolay Aleksandrov kfree(vlan); 670f418af63SNikolay Aleksandrov } else { 671f418af63SNikolay Aleksandrov *changed = true; 6726dada9b1SNikolay Aleksandrov } 673243a2e63SVlad Yasevich 6742594e906SNikolay Aleksandrov return ret; 675243a2e63SVlad Yasevich } 676243a2e63SVlad Yasevich 6778adff41cSToshiaki Makita /* Must be protected by RTNL. 6788adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 6798adff41cSToshiaki Makita */ 680243a2e63SVlad Yasevich int br_vlan_delete(struct net_bridge *br, u16 vid) 681243a2e63SVlad Yasevich { 682907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 6832594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 684243a2e63SVlad Yasevich 685243a2e63SVlad Yasevich ASSERT_RTNL(); 686243a2e63SVlad Yasevich 687907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 688907b1e6eSNikolay Aleksandrov v = br_vlan_find(vg, vid); 6892594e906SNikolay Aleksandrov if (!v || !br_vlan_is_brentry(v)) 6902594e906SNikolay Aleksandrov return -ENOENT; 691243a2e63SVlad Yasevich 692424bb9c9SToshiaki Makita br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid); 6933741873bSRoopa Prabhu br_fdb_delete_by_port(br, NULL, vid, 0); 694bc9a25d2SVlad Yasevich 695efa5356bSRoopa Prabhu vlan_tunnel_info_del(vg, v); 696efa5356bSRoopa Prabhu 6972594e906SNikolay Aleksandrov return __vlan_del(v); 698243a2e63SVlad Yasevich } 699243a2e63SVlad Yasevich 700243a2e63SVlad Yasevich void br_vlan_flush(struct net_bridge *br) 701243a2e63SVlad Yasevich { 702f409d0edSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 703f409d0edSNikolay Aleksandrov 704243a2e63SVlad Yasevich ASSERT_RTNL(); 705243a2e63SVlad Yasevich 706f409d0edSNikolay Aleksandrov vg = br_vlan_group(br); 707f409d0edSNikolay Aleksandrov __vlan_flush(vg); 708f409d0edSNikolay Aleksandrov RCU_INIT_POINTER(br->vlgrp, NULL); 709f409d0edSNikolay Aleksandrov synchronize_rcu(); 710f409d0edSNikolay Aleksandrov __vlan_group_free(vg); 711243a2e63SVlad Yasevich } 712243a2e63SVlad Yasevich 7132594e906SNikolay Aleksandrov struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid) 7142b292fb4SToshiaki Makita { 7152594e906SNikolay Aleksandrov if (!vg) 7162594e906SNikolay Aleksandrov return NULL; 7172b292fb4SToshiaki Makita 7182594e906SNikolay Aleksandrov return br_vlan_lookup(&vg->vlan_hash, vid); 7192b292fb4SToshiaki Makita } 7202b292fb4SToshiaki Makita 721204177f3SToshiaki Makita /* Must be protected by RTNL. */ 722204177f3SToshiaki Makita static void recalculate_group_addr(struct net_bridge *br) 723204177f3SToshiaki Makita { 724be3664a0SNikolay Aleksandrov if (br_opt_get(br, BROPT_GROUP_ADDR_SET)) 725204177f3SToshiaki Makita return; 726204177f3SToshiaki Makita 727204177f3SToshiaki Makita spin_lock_bh(&br->lock); 728ae75767eSNikolay Aleksandrov if (!br_opt_get(br, BROPT_VLAN_ENABLED) || 729ae75767eSNikolay Aleksandrov br->vlan_proto == htons(ETH_P_8021Q)) { 730204177f3SToshiaki Makita /* Bridge Group Address */ 731204177f3SToshiaki Makita br->group_addr[5] = 0x00; 732204177f3SToshiaki Makita } else { /* vlan_enabled && ETH_P_8021AD */ 733204177f3SToshiaki Makita /* Provider Bridge Group Address */ 734204177f3SToshiaki Makita br->group_addr[5] = 0x08; 735204177f3SToshiaki Makita } 736204177f3SToshiaki Makita spin_unlock_bh(&br->lock); 737204177f3SToshiaki Makita } 738204177f3SToshiaki Makita 739204177f3SToshiaki Makita /* Must be protected by RTNL. */ 740204177f3SToshiaki Makita void br_recalculate_fwd_mask(struct net_bridge *br) 741204177f3SToshiaki Makita { 742ae75767eSNikolay Aleksandrov if (!br_opt_get(br, BROPT_VLAN_ENABLED) || 743ae75767eSNikolay Aleksandrov br->vlan_proto == htons(ETH_P_8021Q)) 744204177f3SToshiaki Makita br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT; 745204177f3SToshiaki Makita else /* vlan_enabled && ETH_P_8021AD */ 746204177f3SToshiaki Makita br->group_fwd_mask_required = BR_GROUPFWD_8021AD & 747204177f3SToshiaki Makita ~(1u << br->group_addr[5]); 748204177f3SToshiaki Makita } 749204177f3SToshiaki Makita 750a7854037SNikolay Aleksandrov int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val) 751243a2e63SVlad Yasevich { 7526b72a770SElad Raz struct switchdev_attr attr = { 7536b72a770SElad Raz .orig_dev = br->dev, 7546b72a770SElad Raz .id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING, 7556b72a770SElad Raz .flags = SWITCHDEV_F_SKIP_EOPNOTSUPP, 7566b72a770SElad Raz .u.vlan_filtering = val, 7576b72a770SElad Raz }; 7586b72a770SElad Raz int err; 7596b72a770SElad Raz 760ae75767eSNikolay Aleksandrov if (br_opt_get(br, BROPT_VLAN_ENABLED) == !!val) 761a7854037SNikolay Aleksandrov return 0; 762243a2e63SVlad Yasevich 7636b72a770SElad Raz err = switchdev_port_attr_set(br->dev, &attr); 7646b72a770SElad Raz if (err && err != -EOPNOTSUPP) 7656b72a770SElad Raz return err; 7666b72a770SElad Raz 767ae75767eSNikolay Aleksandrov br_opt_toggle(br, BROPT_VLAN_ENABLED, !!val); 7682796d0c6SVlad Yasevich br_manage_promisc(br); 769204177f3SToshiaki Makita recalculate_group_addr(br); 770204177f3SToshiaki Makita br_recalculate_fwd_mask(br); 771243a2e63SVlad Yasevich 772a7854037SNikolay Aleksandrov return 0; 773a7854037SNikolay Aleksandrov } 774a7854037SNikolay Aleksandrov 775a7854037SNikolay Aleksandrov int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val) 776a7854037SNikolay Aleksandrov { 777047831a9SXin Long return __br_vlan_filter_toggle(br, val); 778243a2e63SVlad Yasevich } 779243a2e63SVlad Yasevich 7801f51445aSIdo Schimmel bool br_vlan_enabled(const struct net_device *dev) 7811f51445aSIdo Schimmel { 7821f51445aSIdo Schimmel struct net_bridge *br = netdev_priv(dev); 7831f51445aSIdo Schimmel 784ae75767eSNikolay Aleksandrov return br_opt_get(br, BROPT_VLAN_ENABLED); 7851f51445aSIdo Schimmel } 7861f51445aSIdo Schimmel EXPORT_SYMBOL_GPL(br_vlan_enabled); 7871f51445aSIdo Schimmel 788d2d427b3SToshiaki Makita int __br_vlan_set_proto(struct net_bridge *br, __be16 proto) 789204177f3SToshiaki Makita { 790204177f3SToshiaki Makita int err = 0; 791204177f3SToshiaki Makita struct net_bridge_port *p; 7922594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 793907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 794d2d427b3SToshiaki Makita __be16 oldproto; 795204177f3SToshiaki Makita 796204177f3SToshiaki Makita if (br->vlan_proto == proto) 797d2d427b3SToshiaki Makita return 0; 798204177f3SToshiaki Makita 799204177f3SToshiaki Makita /* Add VLANs for the new proto to the device filter. */ 800204177f3SToshiaki Makita list_for_each_entry(p, &br->port_list, list) { 801907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 802907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) { 8032594e906SNikolay Aleksandrov err = vlan_vid_add(p->dev, proto, vlan->vid); 804204177f3SToshiaki Makita if (err) 805204177f3SToshiaki Makita goto err_filt; 806204177f3SToshiaki Makita } 807204177f3SToshiaki Makita } 808204177f3SToshiaki Makita 809204177f3SToshiaki Makita oldproto = br->vlan_proto; 810204177f3SToshiaki Makita br->vlan_proto = proto; 811204177f3SToshiaki Makita 812204177f3SToshiaki Makita recalculate_group_addr(br); 813204177f3SToshiaki Makita br_recalculate_fwd_mask(br); 814204177f3SToshiaki Makita 815204177f3SToshiaki Makita /* Delete VLANs for the old proto from the device filter. */ 816907b1e6eSNikolay Aleksandrov list_for_each_entry(p, &br->port_list, list) { 817907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 818907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) 8192594e906SNikolay Aleksandrov vlan_vid_del(p->dev, oldproto, vlan->vid); 820907b1e6eSNikolay Aleksandrov } 821204177f3SToshiaki Makita 822d2d427b3SToshiaki Makita return 0; 823204177f3SToshiaki Makita 824204177f3SToshiaki Makita err_filt: 825907b1e6eSNikolay Aleksandrov list_for_each_entry_continue_reverse(vlan, &vg->vlan_list, vlist) 8262594e906SNikolay Aleksandrov vlan_vid_del(p->dev, proto, vlan->vid); 827204177f3SToshiaki Makita 828907b1e6eSNikolay Aleksandrov list_for_each_entry_continue_reverse(p, &br->port_list, list) { 829907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 830907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) 8312594e906SNikolay Aleksandrov vlan_vid_del(p->dev, proto, vlan->vid); 832907b1e6eSNikolay Aleksandrov } 833204177f3SToshiaki Makita 834d2d427b3SToshiaki Makita return err; 835d2d427b3SToshiaki Makita } 836d2d427b3SToshiaki Makita 837d2d427b3SToshiaki Makita int br_vlan_set_proto(struct net_bridge *br, unsigned long val) 838d2d427b3SToshiaki Makita { 839d2d427b3SToshiaki Makita if (val != ETH_P_8021Q && val != ETH_P_8021AD) 840d2d427b3SToshiaki Makita return -EPROTONOSUPPORT; 841d2d427b3SToshiaki Makita 842047831a9SXin Long return __br_vlan_set_proto(br, htons(val)); 843204177f3SToshiaki Makita } 844204177f3SToshiaki Makita 8456dada9b1SNikolay Aleksandrov int br_vlan_set_stats(struct net_bridge *br, unsigned long val) 8466dada9b1SNikolay Aleksandrov { 8476dada9b1SNikolay Aleksandrov switch (val) { 8486dada9b1SNikolay Aleksandrov case 0: 8496dada9b1SNikolay Aleksandrov case 1: 850ae75767eSNikolay Aleksandrov br_opt_toggle(br, BROPT_VLAN_STATS_ENABLED, !!val); 8516dada9b1SNikolay Aleksandrov break; 8526dada9b1SNikolay Aleksandrov default: 8536dada9b1SNikolay Aleksandrov return -EINVAL; 8546dada9b1SNikolay Aleksandrov } 8556dada9b1SNikolay Aleksandrov 8566dada9b1SNikolay Aleksandrov return 0; 8576dada9b1SNikolay Aleksandrov } 8586dada9b1SNikolay Aleksandrov 8599163a0fcSNikolay Aleksandrov int br_vlan_set_stats_per_port(struct net_bridge *br, unsigned long val) 8609163a0fcSNikolay Aleksandrov { 8619163a0fcSNikolay Aleksandrov struct net_bridge_port *p; 8629163a0fcSNikolay Aleksandrov 8639163a0fcSNikolay Aleksandrov /* allow to change the option if there are no port vlans configured */ 8649163a0fcSNikolay Aleksandrov list_for_each_entry(p, &br->port_list, list) { 8659163a0fcSNikolay Aleksandrov struct net_bridge_vlan_group *vg = nbp_vlan_group(p); 8669163a0fcSNikolay Aleksandrov 8679163a0fcSNikolay Aleksandrov if (vg->num_vlans) 8689163a0fcSNikolay Aleksandrov return -EBUSY; 8699163a0fcSNikolay Aleksandrov } 8709163a0fcSNikolay Aleksandrov 8719163a0fcSNikolay Aleksandrov switch (val) { 8729163a0fcSNikolay Aleksandrov case 0: 8739163a0fcSNikolay Aleksandrov case 1: 8749163a0fcSNikolay Aleksandrov br_opt_toggle(br, BROPT_VLAN_STATS_PER_PORT, !!val); 8759163a0fcSNikolay Aleksandrov break; 8769163a0fcSNikolay Aleksandrov default: 8779163a0fcSNikolay Aleksandrov return -EINVAL; 8789163a0fcSNikolay Aleksandrov } 8799163a0fcSNikolay Aleksandrov 8809163a0fcSNikolay Aleksandrov return 0; 8819163a0fcSNikolay Aleksandrov } 8829163a0fcSNikolay Aleksandrov 88377751ee8SNikolay Aleksandrov static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 vid) 8845be5a2dfSVlad Yasevich { 8852594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 8862594e906SNikolay Aleksandrov 88777751ee8SNikolay Aleksandrov if (vid != vg->pvid) 8882594e906SNikolay Aleksandrov return false; 8892594e906SNikolay Aleksandrov 8902594e906SNikolay Aleksandrov v = br_vlan_lookup(&vg->vlan_hash, vid); 8912594e906SNikolay Aleksandrov if (v && br_vlan_should_use(v) && 8922594e906SNikolay Aleksandrov (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)) 8932594e906SNikolay Aleksandrov return true; 8942594e906SNikolay Aleksandrov 8952594e906SNikolay Aleksandrov return false; 8965be5a2dfSVlad Yasevich } 8975be5a2dfSVlad Yasevich 8985be5a2dfSVlad Yasevich static void br_vlan_disable_default_pvid(struct net_bridge *br) 8995be5a2dfSVlad Yasevich { 9005be5a2dfSVlad Yasevich struct net_bridge_port *p; 9015be5a2dfSVlad Yasevich u16 pvid = br->default_pvid; 9025be5a2dfSVlad Yasevich 9035be5a2dfSVlad Yasevich /* Disable default_pvid on all ports where it is still 9045be5a2dfSVlad Yasevich * configured. 9055be5a2dfSVlad Yasevich */ 906907b1e6eSNikolay Aleksandrov if (vlan_default_pvid(br_vlan_group(br), pvid)) 9075be5a2dfSVlad Yasevich br_vlan_delete(br, pvid); 9085be5a2dfSVlad Yasevich 9095be5a2dfSVlad Yasevich list_for_each_entry(p, &br->port_list, list) { 910907b1e6eSNikolay Aleksandrov if (vlan_default_pvid(nbp_vlan_group(p), pvid)) 9115be5a2dfSVlad Yasevich nbp_vlan_delete(p, pvid); 9125be5a2dfSVlad Yasevich } 9135be5a2dfSVlad Yasevich 9145be5a2dfSVlad Yasevich br->default_pvid = 0; 9155be5a2dfSVlad Yasevich } 9165be5a2dfSVlad Yasevich 9170f963b75SNikolay Aleksandrov int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid) 9185be5a2dfSVlad Yasevich { 9192594e906SNikolay Aleksandrov const struct net_bridge_vlan *pvent; 920907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 9215be5a2dfSVlad Yasevich struct net_bridge_port *p; 922f418af63SNikolay Aleksandrov unsigned long *changed; 923f418af63SNikolay Aleksandrov bool vlchange; 9245be5a2dfSVlad Yasevich u16 old_pvid; 9255be5a2dfSVlad Yasevich int err = 0; 9265be5a2dfSVlad Yasevich 9270f963b75SNikolay Aleksandrov if (!pvid) { 9280f963b75SNikolay Aleksandrov br_vlan_disable_default_pvid(br); 9290f963b75SNikolay Aleksandrov return 0; 9300f963b75SNikolay Aleksandrov } 9310f963b75SNikolay Aleksandrov 932459479daSAndy Shevchenko changed = bitmap_zalloc(BR_MAX_PORTS, GFP_KERNEL); 9335be5a2dfSVlad Yasevich if (!changed) 9345be5a2dfSVlad Yasevich return -ENOMEM; 9355be5a2dfSVlad Yasevich 9365be5a2dfSVlad Yasevich old_pvid = br->default_pvid; 9375be5a2dfSVlad Yasevich 9385be5a2dfSVlad Yasevich /* Update default_pvid config only if we do not conflict with 9395be5a2dfSVlad Yasevich * user configuration. 9405be5a2dfSVlad Yasevich */ 941907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 942907b1e6eSNikolay Aleksandrov pvent = br_vlan_find(vg, pvid); 943907b1e6eSNikolay Aleksandrov if ((!old_pvid || vlan_default_pvid(vg, old_pvid)) && 9442594e906SNikolay Aleksandrov (!pvent || !br_vlan_should_use(pvent))) { 9455be5a2dfSVlad Yasevich err = br_vlan_add(br, pvid, 9465be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 9472594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED | 948f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY, 949f418af63SNikolay Aleksandrov &vlchange); 9505be5a2dfSVlad Yasevich if (err) 9515be5a2dfSVlad Yasevich goto out; 9525be5a2dfSVlad Yasevich br_vlan_delete(br, old_pvid); 9535be5a2dfSVlad Yasevich set_bit(0, changed); 9545be5a2dfSVlad Yasevich } 9555be5a2dfSVlad Yasevich 9565be5a2dfSVlad Yasevich list_for_each_entry(p, &br->port_list, list) { 9575be5a2dfSVlad Yasevich /* Update default_pvid config only if we do not conflict with 9585be5a2dfSVlad Yasevich * user configuration. 9595be5a2dfSVlad Yasevich */ 960907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 9615be5a2dfSVlad Yasevich if ((old_pvid && 962907b1e6eSNikolay Aleksandrov !vlan_default_pvid(vg, old_pvid)) || 963907b1e6eSNikolay Aleksandrov br_vlan_find(vg, pvid)) 9645be5a2dfSVlad Yasevich continue; 9655be5a2dfSVlad Yasevich 9665be5a2dfSVlad Yasevich err = nbp_vlan_add(p, pvid, 9675be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 968f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED, 969f418af63SNikolay Aleksandrov &vlchange); 9705be5a2dfSVlad Yasevich if (err) 9715be5a2dfSVlad Yasevich goto err_port; 9725be5a2dfSVlad Yasevich nbp_vlan_delete(p, old_pvid); 9735be5a2dfSVlad Yasevich set_bit(p->port_no, changed); 9745be5a2dfSVlad Yasevich } 9755be5a2dfSVlad Yasevich 9765be5a2dfSVlad Yasevich br->default_pvid = pvid; 9775be5a2dfSVlad Yasevich 9785be5a2dfSVlad Yasevich out: 979459479daSAndy Shevchenko bitmap_free(changed); 9805be5a2dfSVlad Yasevich return err; 9815be5a2dfSVlad Yasevich 9825be5a2dfSVlad Yasevich err_port: 9835be5a2dfSVlad Yasevich list_for_each_entry_continue_reverse(p, &br->port_list, list) { 9845be5a2dfSVlad Yasevich if (!test_bit(p->port_no, changed)) 9855be5a2dfSVlad Yasevich continue; 9865be5a2dfSVlad Yasevich 9875be5a2dfSVlad Yasevich if (old_pvid) 9885be5a2dfSVlad Yasevich nbp_vlan_add(p, old_pvid, 9895be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 990f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED, 991f418af63SNikolay Aleksandrov &vlchange); 9925be5a2dfSVlad Yasevich nbp_vlan_delete(p, pvid); 9935be5a2dfSVlad Yasevich } 9945be5a2dfSVlad Yasevich 9955be5a2dfSVlad Yasevich if (test_bit(0, changed)) { 9965be5a2dfSVlad Yasevich if (old_pvid) 9975be5a2dfSVlad Yasevich br_vlan_add(br, old_pvid, 9985be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 9992594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED | 1000f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY, 1001f418af63SNikolay Aleksandrov &vlchange); 10025be5a2dfSVlad Yasevich br_vlan_delete(br, pvid); 10035be5a2dfSVlad Yasevich } 10045be5a2dfSVlad Yasevich goto out; 10055be5a2dfSVlad Yasevich } 10065be5a2dfSVlad Yasevich 100796a20d9dSVlad Yasevich int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val) 100896a20d9dSVlad Yasevich { 100996a20d9dSVlad Yasevich u16 pvid = val; 101096a20d9dSVlad Yasevich int err = 0; 101196a20d9dSVlad Yasevich 10125be5a2dfSVlad Yasevich if (val >= VLAN_VID_MASK) 101396a20d9dSVlad Yasevich return -EINVAL; 101496a20d9dSVlad Yasevich 101596a20d9dSVlad Yasevich if (pvid == br->default_pvid) 1016047831a9SXin Long goto out; 101796a20d9dSVlad Yasevich 101896a20d9dSVlad Yasevich /* Only allow default pvid change when filtering is disabled */ 1019ae75767eSNikolay Aleksandrov if (br_opt_get(br, BROPT_VLAN_ENABLED)) { 102096a20d9dSVlad Yasevich pr_info_once("Please disable vlan filtering to change default_pvid\n"); 102196a20d9dSVlad Yasevich err = -EPERM; 1022047831a9SXin Long goto out; 102396a20d9dSVlad Yasevich } 10245be5a2dfSVlad Yasevich err = __br_vlan_set_default_pvid(br, pvid); 1025047831a9SXin Long out: 102696a20d9dSVlad Yasevich return err; 102796a20d9dSVlad Yasevich } 102896a20d9dSVlad Yasevich 10295be5a2dfSVlad Yasevich int br_vlan_init(struct net_bridge *br) 10308580e211SToshiaki Makita { 1031907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 10322594e906SNikolay Aleksandrov int ret = -ENOMEM; 1033f418af63SNikolay Aleksandrov bool changed; 10342594e906SNikolay Aleksandrov 1035907b1e6eSNikolay Aleksandrov vg = kzalloc(sizeof(*vg), GFP_KERNEL); 1036907b1e6eSNikolay Aleksandrov if (!vg) 10372594e906SNikolay Aleksandrov goto out; 1038907b1e6eSNikolay Aleksandrov ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params); 10392594e906SNikolay Aleksandrov if (ret) 10402594e906SNikolay Aleksandrov goto err_rhtbl; 1041efa5356bSRoopa Prabhu ret = vlan_tunnel_init(vg); 1042efa5356bSRoopa Prabhu if (ret) 1043efa5356bSRoopa Prabhu goto err_tunnel_init; 1044907b1e6eSNikolay Aleksandrov INIT_LIST_HEAD(&vg->vlan_list); 10458580e211SToshiaki Makita br->vlan_proto = htons(ETH_P_8021Q); 104696a20d9dSVlad Yasevich br->default_pvid = 1; 1047907b1e6eSNikolay Aleksandrov rcu_assign_pointer(br->vlgrp, vg); 10482594e906SNikolay Aleksandrov ret = br_vlan_add(br, 1, 10492594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED | 1050f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY, &changed); 10512594e906SNikolay Aleksandrov if (ret) 10522594e906SNikolay Aleksandrov goto err_vlan_add; 10532594e906SNikolay Aleksandrov 10542594e906SNikolay Aleksandrov out: 10552594e906SNikolay Aleksandrov return ret; 10562594e906SNikolay Aleksandrov 10572594e906SNikolay Aleksandrov err_vlan_add: 1058efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 1059efa5356bSRoopa Prabhu err_tunnel_init: 1060907b1e6eSNikolay Aleksandrov rhashtable_destroy(&vg->vlan_hash); 10612594e906SNikolay Aleksandrov err_rhtbl: 1062907b1e6eSNikolay Aleksandrov kfree(vg); 10632594e906SNikolay Aleksandrov 10642594e906SNikolay Aleksandrov goto out; 10652594e906SNikolay Aleksandrov } 10662594e906SNikolay Aleksandrov 10672594e906SNikolay Aleksandrov int nbp_vlan_init(struct net_bridge_port *p) 10682594e906SNikolay Aleksandrov { 1069404cdbf0SElad Raz struct switchdev_attr attr = { 1070404cdbf0SElad Raz .orig_dev = p->br->dev, 1071404cdbf0SElad Raz .id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING, 1072404cdbf0SElad Raz .flags = SWITCHDEV_F_SKIP_EOPNOTSUPP, 1073ae75767eSNikolay Aleksandrov .u.vlan_filtering = br_opt_get(p->br, BROPT_VLAN_ENABLED), 1074404cdbf0SElad Raz }; 1075263344e6SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 10762594e906SNikolay Aleksandrov int ret = -ENOMEM; 10772594e906SNikolay Aleksandrov 1078263344e6SNikolay Aleksandrov vg = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL); 1079263344e6SNikolay Aleksandrov if (!vg) 10802594e906SNikolay Aleksandrov goto out; 10812594e906SNikolay Aleksandrov 1082404cdbf0SElad Raz ret = switchdev_port_attr_set(p->dev, &attr); 1083404cdbf0SElad Raz if (ret && ret != -EOPNOTSUPP) 1084404cdbf0SElad Raz goto err_vlan_enabled; 1085404cdbf0SElad Raz 1086263344e6SNikolay Aleksandrov ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params); 10872594e906SNikolay Aleksandrov if (ret) 10882594e906SNikolay Aleksandrov goto err_rhtbl; 1089efa5356bSRoopa Prabhu ret = vlan_tunnel_init(vg); 1090efa5356bSRoopa Prabhu if (ret) 1091efa5356bSRoopa Prabhu goto err_tunnel_init; 1092263344e6SNikolay Aleksandrov INIT_LIST_HEAD(&vg->vlan_list); 1093907b1e6eSNikolay Aleksandrov rcu_assign_pointer(p->vlgrp, vg); 10942594e906SNikolay Aleksandrov if (p->br->default_pvid) { 1095f418af63SNikolay Aleksandrov bool changed; 1096f418af63SNikolay Aleksandrov 10972594e906SNikolay Aleksandrov ret = nbp_vlan_add(p, p->br->default_pvid, 10982594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_PVID | 1099f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED, 1100f418af63SNikolay Aleksandrov &changed); 11012594e906SNikolay Aleksandrov if (ret) 11022594e906SNikolay Aleksandrov goto err_vlan_add; 11032594e906SNikolay Aleksandrov } 11042594e906SNikolay Aleksandrov out: 11052594e906SNikolay Aleksandrov return ret; 11062594e906SNikolay Aleksandrov 11072594e906SNikolay Aleksandrov err_vlan_add: 110807bc588fSIdo Schimmel RCU_INIT_POINTER(p->vlgrp, NULL); 110907bc588fSIdo Schimmel synchronize_rcu(); 1110efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 1111efa5356bSRoopa Prabhu err_tunnel_init: 1112efa5356bSRoopa Prabhu rhashtable_destroy(&vg->vlan_hash); 11132594e906SNikolay Aleksandrov err_rhtbl: 1114df2c4334SYotam Gigi err_vlan_enabled: 1115263344e6SNikolay Aleksandrov kfree(vg); 11162594e906SNikolay Aleksandrov 11172594e906SNikolay Aleksandrov goto out; 11188580e211SToshiaki Makita } 11198580e211SToshiaki Makita 11208adff41cSToshiaki Makita /* Must be protected by RTNL. 11218adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 1122f418af63SNikolay Aleksandrov * changed must be true only if the vlan was created or updated 11238adff41cSToshiaki Makita */ 1124f418af63SNikolay Aleksandrov int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags, 1125f418af63SNikolay Aleksandrov bool *changed) 1126243a2e63SVlad Yasevich { 11272594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 11282594e906SNikolay Aleksandrov int ret; 1129243a2e63SVlad Yasevich 1130243a2e63SVlad Yasevich ASSERT_RTNL(); 1131243a2e63SVlad Yasevich 1132f418af63SNikolay Aleksandrov *changed = false; 1133907b1e6eSNikolay Aleksandrov vlan = br_vlan_find(nbp_vlan_group(port), vid); 11342594e906SNikolay Aleksandrov if (vlan) { 11357fbac984SIdo Schimmel /* Pass the flags to the hardware bridge */ 1136d66e4348SPetr Machata ret = br_switchdev_port_vlan_add(port->dev, vid, flags); 11377fbac984SIdo Schimmel if (ret && ret != -EOPNOTSUPP) 11387fbac984SIdo Schimmel return ret; 1139f418af63SNikolay Aleksandrov *changed = __vlan_add_flags(vlan, flags); 1140f418af63SNikolay Aleksandrov 11412594e906SNikolay Aleksandrov return 0; 1142243a2e63SVlad Yasevich } 1143243a2e63SVlad Yasevich 11442594e906SNikolay Aleksandrov vlan = kzalloc(sizeof(*vlan), GFP_KERNEL); 11452594e906SNikolay Aleksandrov if (!vlan) 11462594e906SNikolay Aleksandrov return -ENOMEM; 1147243a2e63SVlad Yasevich 11482594e906SNikolay Aleksandrov vlan->vid = vid; 11492594e906SNikolay Aleksandrov vlan->port = port; 11502594e906SNikolay Aleksandrov ret = __vlan_add(vlan, flags); 11512594e906SNikolay Aleksandrov if (ret) 11522594e906SNikolay Aleksandrov kfree(vlan); 1153f418af63SNikolay Aleksandrov else 1154f418af63SNikolay Aleksandrov *changed = true; 1155243a2e63SVlad Yasevich 11562594e906SNikolay Aleksandrov return ret; 1157243a2e63SVlad Yasevich } 1158243a2e63SVlad Yasevich 11598adff41cSToshiaki Makita /* Must be protected by RTNL. 11608adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 11618adff41cSToshiaki Makita */ 1162243a2e63SVlad Yasevich int nbp_vlan_delete(struct net_bridge_port *port, u16 vid) 1163243a2e63SVlad Yasevich { 11642594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 1165243a2e63SVlad Yasevich 1166243a2e63SVlad Yasevich ASSERT_RTNL(); 1167243a2e63SVlad Yasevich 1168907b1e6eSNikolay Aleksandrov v = br_vlan_find(nbp_vlan_group(port), vid); 11692594e906SNikolay Aleksandrov if (!v) 11702594e906SNikolay Aleksandrov return -ENOENT; 1171424bb9c9SToshiaki Makita br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid); 11721ea2d020SNikolay Aleksandrov br_fdb_delete_by_port(port->br, port, vid, 0); 1173bc9a25d2SVlad Yasevich 11742594e906SNikolay Aleksandrov return __vlan_del(v); 1175243a2e63SVlad Yasevich } 1176243a2e63SVlad Yasevich 1177243a2e63SVlad Yasevich void nbp_vlan_flush(struct net_bridge_port *port) 1178243a2e63SVlad Yasevich { 1179f409d0edSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 1180f409d0edSNikolay Aleksandrov 1181243a2e63SVlad Yasevich ASSERT_RTNL(); 1182243a2e63SVlad Yasevich 1183f409d0edSNikolay Aleksandrov vg = nbp_vlan_group(port); 1184f409d0edSNikolay Aleksandrov __vlan_flush(vg); 1185f409d0edSNikolay Aleksandrov RCU_INIT_POINTER(port->vlgrp, NULL); 1186f409d0edSNikolay Aleksandrov synchronize_rcu(); 1187f409d0edSNikolay Aleksandrov __vlan_group_free(vg); 11885be5a2dfSVlad Yasevich } 1189a60c0903SNikolay Aleksandrov 1190a60c0903SNikolay Aleksandrov void br_vlan_get_stats(const struct net_bridge_vlan *v, 1191a60c0903SNikolay Aleksandrov struct br_vlan_stats *stats) 1192a60c0903SNikolay Aleksandrov { 1193a60c0903SNikolay Aleksandrov int i; 1194a60c0903SNikolay Aleksandrov 1195a60c0903SNikolay Aleksandrov memset(stats, 0, sizeof(*stats)); 1196a60c0903SNikolay Aleksandrov for_each_possible_cpu(i) { 1197a60c0903SNikolay Aleksandrov u64 rxpackets, rxbytes, txpackets, txbytes; 1198a60c0903SNikolay Aleksandrov struct br_vlan_stats *cpu_stats; 1199a60c0903SNikolay Aleksandrov unsigned int start; 1200a60c0903SNikolay Aleksandrov 1201a60c0903SNikolay Aleksandrov cpu_stats = per_cpu_ptr(v->stats, i); 1202a60c0903SNikolay Aleksandrov do { 1203a60c0903SNikolay Aleksandrov start = u64_stats_fetch_begin_irq(&cpu_stats->syncp); 1204a60c0903SNikolay Aleksandrov rxpackets = cpu_stats->rx_packets; 1205a60c0903SNikolay Aleksandrov rxbytes = cpu_stats->rx_bytes; 1206a60c0903SNikolay Aleksandrov txbytes = cpu_stats->tx_bytes; 1207a60c0903SNikolay Aleksandrov txpackets = cpu_stats->tx_packets; 1208a60c0903SNikolay Aleksandrov } while (u64_stats_fetch_retry_irq(&cpu_stats->syncp, start)); 1209a60c0903SNikolay Aleksandrov 1210a60c0903SNikolay Aleksandrov stats->rx_packets += rxpackets; 1211a60c0903SNikolay Aleksandrov stats->rx_bytes += rxbytes; 1212a60c0903SNikolay Aleksandrov stats->tx_bytes += txbytes; 1213a60c0903SNikolay Aleksandrov stats->tx_packets += txpackets; 1214a60c0903SNikolay Aleksandrov } 1215a60c0903SNikolay Aleksandrov } 12164d4fd361SPetr Machata 12174d4fd361SPetr Machata int br_vlan_get_pvid(const struct net_device *dev, u16 *p_pvid) 12184d4fd361SPetr Machata { 12194d4fd361SPetr Machata struct net_bridge_vlan_group *vg; 12205a6db04cSIdo Schimmel struct net_bridge_port *p; 12214d4fd361SPetr Machata 12224d4fd361SPetr Machata ASSERT_RTNL(); 12235a6db04cSIdo Schimmel p = br_port_get_check_rtnl(dev); 12245a6db04cSIdo Schimmel if (p) 12255a6db04cSIdo Schimmel vg = nbp_vlan_group(p); 12265a6db04cSIdo Schimmel else if (netif_is_bridge_master(dev)) 12274d4fd361SPetr Machata vg = br_vlan_group(netdev_priv(dev)); 12284d4fd361SPetr Machata else 12294d4fd361SPetr Machata return -EINVAL; 12304d4fd361SPetr Machata 12314d4fd361SPetr Machata *p_pvid = br_get_pvid(vg); 12324d4fd361SPetr Machata return 0; 12334d4fd361SPetr Machata } 12344d4fd361SPetr Machata EXPORT_SYMBOL_GPL(br_vlan_get_pvid); 12354d4fd361SPetr Machata 12364d4fd361SPetr Machata int br_vlan_get_info(const struct net_device *dev, u16 vid, 12374d4fd361SPetr Machata struct bridge_vlan_info *p_vinfo) 12384d4fd361SPetr Machata { 12394d4fd361SPetr Machata struct net_bridge_vlan_group *vg; 12404d4fd361SPetr Machata struct net_bridge_vlan *v; 12414d4fd361SPetr Machata struct net_bridge_port *p; 12424d4fd361SPetr Machata 12434d4fd361SPetr Machata ASSERT_RTNL(); 12444d4fd361SPetr Machata p = br_port_get_check_rtnl(dev); 12454d4fd361SPetr Machata if (p) 12464d4fd361SPetr Machata vg = nbp_vlan_group(p); 12472b18d79eSPetr Machata else if (netif_is_bridge_master(dev)) 12482b18d79eSPetr Machata vg = br_vlan_group(netdev_priv(dev)); 12494d4fd361SPetr Machata else 12504d4fd361SPetr Machata return -EINVAL; 12514d4fd361SPetr Machata 12524d4fd361SPetr Machata v = br_vlan_find(vg, vid); 12534d4fd361SPetr Machata if (!v) 12544d4fd361SPetr Machata return -ENOENT; 12554d4fd361SPetr Machata 12564d4fd361SPetr Machata p_vinfo->vid = vid; 12574d4fd361SPetr Machata p_vinfo->flags = v->flags; 12584d4fd361SPetr Machata return 0; 12594d4fd361SPetr Machata } 12604d4fd361SPetr Machata EXPORT_SYMBOL_GPL(br_vlan_get_info); 1261