1243a2e63SVlad Yasevich #include <linux/kernel.h> 2243a2e63SVlad Yasevich #include <linux/netdevice.h> 3243a2e63SVlad Yasevich #include <linux/rtnetlink.h> 4243a2e63SVlad Yasevich #include <linux/slab.h> 57f109539SScott Feldman #include <net/switchdev.h> 6243a2e63SVlad Yasevich 7243a2e63SVlad Yasevich #include "br_private.h" 8efa5356bSRoopa Prabhu #include "br_private_tunnel.h" 9243a2e63SVlad Yasevich 102594e906SNikolay Aleksandrov static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg, 112594e906SNikolay Aleksandrov const void *ptr) 12552406c4SVlad Yasevich { 132594e906SNikolay Aleksandrov const struct net_bridge_vlan *vle = ptr; 142594e906SNikolay Aleksandrov u16 vid = *(u16 *)arg->key; 152594e906SNikolay Aleksandrov 162594e906SNikolay Aleksandrov return vle->vid != vid; 172594e906SNikolay Aleksandrov } 182594e906SNikolay Aleksandrov 192594e906SNikolay Aleksandrov static const struct rhashtable_params br_vlan_rht_params = { 202594e906SNikolay Aleksandrov .head_offset = offsetof(struct net_bridge_vlan, vnode), 212594e906SNikolay Aleksandrov .key_offset = offsetof(struct net_bridge_vlan, vid), 222594e906SNikolay Aleksandrov .key_len = sizeof(u16), 238af78b64SNikolay Aleksandrov .nelem_hint = 3, 248af78b64SNikolay Aleksandrov .locks_mul = 1, 252594e906SNikolay Aleksandrov .max_size = VLAN_N_VID, 262594e906SNikolay Aleksandrov .obj_cmpfn = br_vlan_cmp, 272594e906SNikolay Aleksandrov .automatic_shrinking = true, 282594e906SNikolay Aleksandrov }; 292594e906SNikolay Aleksandrov 302594e906SNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid) 312594e906SNikolay Aleksandrov { 322594e906SNikolay Aleksandrov return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params); 332594e906SNikolay Aleksandrov } 342594e906SNikolay Aleksandrov 35f418af63SNikolay Aleksandrov static bool __vlan_add_pvid(struct net_bridge_vlan_group *vg, u16 vid) 362594e906SNikolay Aleksandrov { 3777751ee8SNikolay Aleksandrov if (vg->pvid == vid) 38f418af63SNikolay Aleksandrov return false; 39552406c4SVlad Yasevich 40552406c4SVlad Yasevich smp_wmb(); 4177751ee8SNikolay Aleksandrov vg->pvid = vid; 42f418af63SNikolay Aleksandrov 43f418af63SNikolay Aleksandrov return true; 44552406c4SVlad Yasevich } 45552406c4SVlad Yasevich 46f418af63SNikolay Aleksandrov static bool __vlan_delete_pvid(struct net_bridge_vlan_group *vg, u16 vid) 47552406c4SVlad Yasevich { 4877751ee8SNikolay Aleksandrov if (vg->pvid != vid) 49f418af63SNikolay Aleksandrov return false; 50552406c4SVlad Yasevich 51552406c4SVlad Yasevich smp_wmb(); 5277751ee8SNikolay Aleksandrov vg->pvid = 0; 53f418af63SNikolay Aleksandrov 54f418af63SNikolay Aleksandrov return true; 55552406c4SVlad Yasevich } 56552406c4SVlad Yasevich 57f418af63SNikolay Aleksandrov /* return true if anything changed, false otherwise */ 58f418af63SNikolay Aleksandrov static bool __vlan_add_flags(struct net_bridge_vlan *v, u16 flags) 5935e03f3aSVlad Yasevich { 6077751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 61f418af63SNikolay Aleksandrov u16 old_flags = v->flags; 62f418af63SNikolay Aleksandrov bool ret; 6377751ee8SNikolay Aleksandrov 642594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) 65907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 66635126b7SVlad Yasevich else 67907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 6877751ee8SNikolay Aleksandrov 6977751ee8SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_PVID) 70f418af63SNikolay Aleksandrov ret = __vlan_add_pvid(vg, v->vid); 712594e906SNikolay Aleksandrov else 72f418af63SNikolay Aleksandrov ret = __vlan_delete_pvid(vg, v->vid); 7335e03f3aSVlad Yasevich 7435e03f3aSVlad Yasevich if (flags & BRIDGE_VLAN_INFO_UNTAGGED) 752594e906SNikolay Aleksandrov v->flags |= BRIDGE_VLAN_INFO_UNTAGGED; 76635126b7SVlad Yasevich else 772594e906SNikolay Aleksandrov v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED; 78f418af63SNikolay Aleksandrov 79f418af63SNikolay Aleksandrov return ret || !!(old_flags ^ v->flags); 8035e03f3aSVlad Yasevich } 8135e03f3aSVlad Yasevich 827f109539SScott Feldman static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br, 837f109539SScott Feldman u16 vid, u16 flags) 847f109539SScott Feldman { 850944d6b5SJiri Pirko int err; 867f109539SScott Feldman 870944d6b5SJiri Pirko /* Try switchdev op first. In case it is not supported, fallback to 880944d6b5SJiri Pirko * 8021q add. 890944d6b5SJiri Pirko */ 90d66e4348SPetr Machata err = br_switchdev_port_vlan_add(dev, vid, flags); 917f109539SScott Feldman if (err == -EOPNOTSUPP) 920944d6b5SJiri Pirko return vlan_vid_add(dev, br->vlan_proto, vid); 937f109539SScott Feldman return err; 947f109539SScott Feldman } 957f109539SScott Feldman 962594e906SNikolay Aleksandrov static void __vlan_add_list(struct net_bridge_vlan *v) 97243a2e63SVlad Yasevich { 98907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 992594e906SNikolay Aleksandrov struct list_head *headp, *hpos; 1002594e906SNikolay Aleksandrov struct net_bridge_vlan *vent; 101243a2e63SVlad Yasevich 102907b1e6eSNikolay Aleksandrov if (br_vlan_is_master(v)) 103907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 104907b1e6eSNikolay Aleksandrov else 105907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 106907b1e6eSNikolay Aleksandrov 107907b1e6eSNikolay Aleksandrov headp = &vg->vlan_list; 1082594e906SNikolay Aleksandrov list_for_each_prev(hpos, headp) { 1092594e906SNikolay Aleksandrov vent = list_entry(hpos, struct net_bridge_vlan, vlist); 1102594e906SNikolay Aleksandrov if (v->vid < vent->vid) 1112594e906SNikolay Aleksandrov continue; 1122594e906SNikolay Aleksandrov else 1132594e906SNikolay Aleksandrov break; 1142594e906SNikolay Aleksandrov } 115586c2b57SNikolay Aleksandrov list_add_rcu(&v->vlist, hpos); 116552406c4SVlad Yasevich } 117243a2e63SVlad Yasevich 1182594e906SNikolay Aleksandrov static void __vlan_del_list(struct net_bridge_vlan *v) 1192594e906SNikolay Aleksandrov { 120586c2b57SNikolay Aleksandrov list_del_rcu(&v->vlist); 121243a2e63SVlad Yasevich } 122243a2e63SVlad Yasevich 123bf361ad3SVivien Didelot static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br, 1247f109539SScott Feldman u16 vid) 1257f109539SScott Feldman { 1260944d6b5SJiri Pirko int err; 1277f109539SScott Feldman 1280944d6b5SJiri Pirko /* Try switchdev op first. In case it is not supported, fallback to 1290944d6b5SJiri Pirko * 8021q del. 1300944d6b5SJiri Pirko */ 131d66e4348SPetr Machata err = br_switchdev_port_vlan_del(dev, vid); 1320944d6b5SJiri Pirko if (err == -EOPNOTSUPP) { 1330944d6b5SJiri Pirko vlan_vid_del(dev, br->vlan_proto, vid); 1340944d6b5SJiri Pirko return 0; 1357f109539SScott Feldman } 136bf361ad3SVivien Didelot return err; 1377f109539SScott Feldman } 1387f109539SScott Feldman 139f8ed289fSNikolay Aleksandrov /* Returns a master vlan, if it didn't exist it gets created. In all cases a 140f8ed289fSNikolay Aleksandrov * a reference is taken to the master vlan before returning. 141f8ed289fSNikolay Aleksandrov */ 142f8ed289fSNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_get_master(struct net_bridge *br, u16 vid) 143f8ed289fSNikolay Aleksandrov { 144907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 145f8ed289fSNikolay Aleksandrov struct net_bridge_vlan *masterv; 146f8ed289fSNikolay Aleksandrov 147907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 148907b1e6eSNikolay Aleksandrov masterv = br_vlan_find(vg, vid); 149f8ed289fSNikolay Aleksandrov if (!masterv) { 150f418af63SNikolay Aleksandrov bool changed; 151f418af63SNikolay Aleksandrov 152f8ed289fSNikolay Aleksandrov /* missing global ctx, create it now */ 153f418af63SNikolay Aleksandrov if (br_vlan_add(br, vid, 0, &changed)) 154f8ed289fSNikolay Aleksandrov return NULL; 155907b1e6eSNikolay Aleksandrov masterv = br_vlan_find(vg, vid); 156f8ed289fSNikolay Aleksandrov if (WARN_ON(!masterv)) 157f8ed289fSNikolay Aleksandrov return NULL; 1580e5a82efSIdo Schimmel refcount_set(&masterv->refcnt, 1); 1590e5a82efSIdo Schimmel return masterv; 160f8ed289fSNikolay Aleksandrov } 16125127759SReshetova, Elena refcount_inc(&masterv->refcnt); 162f8ed289fSNikolay Aleksandrov 163f8ed289fSNikolay Aleksandrov return masterv; 164f8ed289fSNikolay Aleksandrov } 165f8ed289fSNikolay Aleksandrov 1666dada9b1SNikolay Aleksandrov static void br_master_vlan_rcu_free(struct rcu_head *rcu) 1676dada9b1SNikolay Aleksandrov { 1686dada9b1SNikolay Aleksandrov struct net_bridge_vlan *v; 1696dada9b1SNikolay Aleksandrov 1706dada9b1SNikolay Aleksandrov v = container_of(rcu, struct net_bridge_vlan, rcu); 1716dada9b1SNikolay Aleksandrov WARN_ON(!br_vlan_is_master(v)); 1726dada9b1SNikolay Aleksandrov free_percpu(v->stats); 1736dada9b1SNikolay Aleksandrov v->stats = NULL; 1746dada9b1SNikolay Aleksandrov kfree(v); 1756dada9b1SNikolay Aleksandrov } 1766dada9b1SNikolay Aleksandrov 177f8ed289fSNikolay Aleksandrov static void br_vlan_put_master(struct net_bridge_vlan *masterv) 178f8ed289fSNikolay Aleksandrov { 179907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 180907b1e6eSNikolay Aleksandrov 181f8ed289fSNikolay Aleksandrov if (!br_vlan_is_master(masterv)) 182f8ed289fSNikolay Aleksandrov return; 183f8ed289fSNikolay Aleksandrov 184907b1e6eSNikolay Aleksandrov vg = br_vlan_group(masterv->br); 18525127759SReshetova, Elena if (refcount_dec_and_test(&masterv->refcnt)) { 186907b1e6eSNikolay Aleksandrov rhashtable_remove_fast(&vg->vlan_hash, 187f8ed289fSNikolay Aleksandrov &masterv->vnode, br_vlan_rht_params); 188f8ed289fSNikolay Aleksandrov __vlan_del_list(masterv); 1896dada9b1SNikolay Aleksandrov call_rcu(&masterv->rcu, br_master_vlan_rcu_free); 190f8ed289fSNikolay Aleksandrov } 191f8ed289fSNikolay Aleksandrov } 192f8ed289fSNikolay Aleksandrov 1932594e906SNikolay Aleksandrov /* This is the shared VLAN add function which works for both ports and bridge 1942594e906SNikolay Aleksandrov * devices. There are four possible calls to this function in terms of the 1952594e906SNikolay Aleksandrov * vlan entry type: 1962594e906SNikolay Aleksandrov * 1. vlan is being added on a port (no master flags, global entry exists) 197ddd611d3SIdo Schimmel * 2. vlan is being added on a bridge (both master and brentry flags) 1982594e906SNikolay Aleksandrov * 3. vlan is being added on a port, but a global entry didn't exist which 199ddd611d3SIdo Schimmel * is being created right now (master flag set, brentry flag unset), the 2002594e906SNikolay Aleksandrov * global entry is used for global per-vlan features, but not for filtering 201ddd611d3SIdo Schimmel * 4. same as 3 but with both master and brentry flags set so the entry 2022594e906SNikolay Aleksandrov * will be used for filtering in both the port and the bridge 2032594e906SNikolay Aleksandrov */ 2042594e906SNikolay Aleksandrov static int __vlan_add(struct net_bridge_vlan *v, u16 flags) 205243a2e63SVlad Yasevich { 2062594e906SNikolay Aleksandrov struct net_bridge_vlan *masterv = NULL; 2072594e906SNikolay Aleksandrov struct net_bridge_port *p = NULL; 2086be144f6SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 2092594e906SNikolay Aleksandrov struct net_device *dev; 2102594e906SNikolay Aleksandrov struct net_bridge *br; 211bf361ad3SVivien Didelot int err; 212bf361ad3SVivien Didelot 2132594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) { 2142594e906SNikolay Aleksandrov br = v->br; 2152594e906SNikolay Aleksandrov dev = br->dev; 216907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 2172594e906SNikolay Aleksandrov } else { 2182594e906SNikolay Aleksandrov p = v->port; 2192594e906SNikolay Aleksandrov br = p->br; 2202594e906SNikolay Aleksandrov dev = p->dev; 221907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 2222594e906SNikolay Aleksandrov } 2232594e906SNikolay Aleksandrov 2242594e906SNikolay Aleksandrov if (p) { 2252594e906SNikolay Aleksandrov /* Add VLAN to the device filter if it is supported. 2262594e906SNikolay Aleksandrov * This ensures tagged traffic enters the bridge when 2272594e906SNikolay Aleksandrov * promiscuous mode is disabled by br_manage_promisc(). 2282594e906SNikolay Aleksandrov */ 2292594e906SNikolay Aleksandrov err = __vlan_vid_add(dev, br, v->vid, flags); 230bf361ad3SVivien Didelot if (err) 2312594e906SNikolay Aleksandrov goto out; 2322594e906SNikolay Aleksandrov 2332594e906SNikolay Aleksandrov /* need to work on the master vlan too */ 2342594e906SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_MASTER) { 235f418af63SNikolay Aleksandrov bool changed; 236f418af63SNikolay Aleksandrov 237f418af63SNikolay Aleksandrov err = br_vlan_add(br, v->vid, 238f418af63SNikolay Aleksandrov flags | BRIDGE_VLAN_INFO_BRENTRY, 239f418af63SNikolay Aleksandrov &changed); 2402594e906SNikolay Aleksandrov if (err) 2412594e906SNikolay Aleksandrov goto out_filt; 2422594e906SNikolay Aleksandrov } 2432594e906SNikolay Aleksandrov 244f8ed289fSNikolay Aleksandrov masterv = br_vlan_get_master(br, v->vid); 245f8ed289fSNikolay Aleksandrov if (!masterv) 2462594e906SNikolay Aleksandrov goto out_filt; 2472594e906SNikolay Aleksandrov v->brvlan = masterv; 2486dada9b1SNikolay Aleksandrov v->stats = masterv->stats; 2492594e906SNikolay Aleksandrov } 2502594e906SNikolay Aleksandrov 2516be144f6SNikolay Aleksandrov /* Add the dev mac and count the vlan only if it's usable */ 2522594e906SNikolay Aleksandrov if (br_vlan_should_use(v)) { 2532594e906SNikolay Aleksandrov err = br_fdb_insert(br, p, dev->dev_addr, v->vid); 2542594e906SNikolay Aleksandrov if (err) { 2552594e906SNikolay Aleksandrov br_err(br, "failed insert local address into bridge forwarding table\n"); 2562594e906SNikolay Aleksandrov goto out_filt; 2572594e906SNikolay Aleksandrov } 2586be144f6SNikolay Aleksandrov vg->num_vlans++; 2592594e906SNikolay Aleksandrov } 2602594e906SNikolay Aleksandrov 2616be144f6SNikolay Aleksandrov err = rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode, 2626be144f6SNikolay Aleksandrov br_vlan_rht_params); 2632594e906SNikolay Aleksandrov if (err) 2642594e906SNikolay Aleksandrov goto out_fdb_insert; 2652594e906SNikolay Aleksandrov 2662594e906SNikolay Aleksandrov __vlan_add_list(v); 2672594e906SNikolay Aleksandrov __vlan_add_flags(v, flags); 2682594e906SNikolay Aleksandrov out: 2692594e906SNikolay Aleksandrov return err; 2702594e906SNikolay Aleksandrov 2712594e906SNikolay Aleksandrov out_fdb_insert: 2726be144f6SNikolay Aleksandrov if (br_vlan_should_use(v)) { 2736be144f6SNikolay Aleksandrov br_fdb_find_delete_local(br, p, dev->dev_addr, v->vid); 2746be144f6SNikolay Aleksandrov vg->num_vlans--; 2756be144f6SNikolay Aleksandrov } 2762594e906SNikolay Aleksandrov 2772594e906SNikolay Aleksandrov out_filt: 2782594e906SNikolay Aleksandrov if (p) { 2792594e906SNikolay Aleksandrov __vlan_vid_del(dev, br, v->vid); 2802594e906SNikolay Aleksandrov if (masterv) { 281f8ed289fSNikolay Aleksandrov br_vlan_put_master(masterv); 2822594e906SNikolay Aleksandrov v->brvlan = NULL; 2832594e906SNikolay Aleksandrov } 2842594e906SNikolay Aleksandrov } 2852594e906SNikolay Aleksandrov 2862594e906SNikolay Aleksandrov goto out; 2872594e906SNikolay Aleksandrov } 2882594e906SNikolay Aleksandrov 2892594e906SNikolay Aleksandrov static int __vlan_del(struct net_bridge_vlan *v) 2902594e906SNikolay Aleksandrov { 2912594e906SNikolay Aleksandrov struct net_bridge_vlan *masterv = v; 29277751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 2932594e906SNikolay Aleksandrov struct net_bridge_port *p = NULL; 2942594e906SNikolay Aleksandrov int err = 0; 2952594e906SNikolay Aleksandrov 2962594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) { 297907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 2982594e906SNikolay Aleksandrov } else { 2992594e906SNikolay Aleksandrov p = v->port; 300907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 3012594e906SNikolay Aleksandrov masterv = v->brvlan; 3022594e906SNikolay Aleksandrov } 3032594e906SNikolay Aleksandrov 30477751ee8SNikolay Aleksandrov __vlan_delete_pvid(vg, v->vid); 3052594e906SNikolay Aleksandrov if (p) { 3062594e906SNikolay Aleksandrov err = __vlan_vid_del(p->dev, p->br, v->vid); 3072594e906SNikolay Aleksandrov if (err) 3082594e906SNikolay Aleksandrov goto out; 3092594e906SNikolay Aleksandrov } 3102594e906SNikolay Aleksandrov 3116be144f6SNikolay Aleksandrov if (br_vlan_should_use(v)) { 3122594e906SNikolay Aleksandrov v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY; 3136be144f6SNikolay Aleksandrov vg->num_vlans--; 3142594e906SNikolay Aleksandrov } 3152594e906SNikolay Aleksandrov 3162594e906SNikolay Aleksandrov if (masterv != v) { 317efa5356bSRoopa Prabhu vlan_tunnel_info_del(vg, v); 31877751ee8SNikolay Aleksandrov rhashtable_remove_fast(&vg->vlan_hash, &v->vnode, 31977751ee8SNikolay Aleksandrov br_vlan_rht_params); 3202594e906SNikolay Aleksandrov __vlan_del_list(v); 3212594e906SNikolay Aleksandrov kfree_rcu(v, rcu); 3222594e906SNikolay Aleksandrov } 3232594e906SNikolay Aleksandrov 324f8ed289fSNikolay Aleksandrov br_vlan_put_master(masterv); 3252594e906SNikolay Aleksandrov out: 326bf361ad3SVivien Didelot return err; 3278580e211SToshiaki Makita } 328243a2e63SVlad Yasevich 329f409d0edSNikolay Aleksandrov static void __vlan_group_free(struct net_bridge_vlan_group *vg) 330f409d0edSNikolay Aleksandrov { 331f409d0edSNikolay Aleksandrov WARN_ON(!list_empty(&vg->vlan_list)); 332f409d0edSNikolay Aleksandrov rhashtable_destroy(&vg->vlan_hash); 333efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 334f409d0edSNikolay Aleksandrov kfree(vg); 335f409d0edSNikolay Aleksandrov } 336f409d0edSNikolay Aleksandrov 337f409d0edSNikolay Aleksandrov static void __vlan_flush(struct net_bridge_vlan_group *vg) 338243a2e63SVlad Yasevich { 3392594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan, *tmp; 3402594e906SNikolay Aleksandrov 341f409d0edSNikolay Aleksandrov __vlan_delete_pvid(vg, vg->pvid); 342f409d0edSNikolay Aleksandrov list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist) 3432594e906SNikolay Aleksandrov __vlan_del(vlan); 344243a2e63SVlad Yasevich } 345243a2e63SVlad Yasevich 34678851988SVlad Yasevich struct sk_buff *br_handle_vlan(struct net_bridge *br, 34711538d03SRoopa Prabhu const struct net_bridge_port *p, 3482594e906SNikolay Aleksandrov struct net_bridge_vlan_group *vg, 349a37b85c9SVlad Yasevich struct sk_buff *skb) 350a37b85c9SVlad Yasevich { 3516dada9b1SNikolay Aleksandrov struct br_vlan_stats *stats; 3522594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 353a37b85c9SVlad Yasevich u16 vid; 354a37b85c9SVlad Yasevich 35520adfa1aSVlad Yasevich /* If this packet was not filtered at input, let it pass */ 35620adfa1aSVlad Yasevich if (!BR_INPUT_SKB_CB(skb)->vlan_filtered) 35778851988SVlad Yasevich goto out; 35878851988SVlad Yasevich 3592594e906SNikolay Aleksandrov /* At this point, we know that the frame was filtered and contains 3602594e906SNikolay Aleksandrov * a valid vlan id. If the vlan id has untagged flag set, 3612594e906SNikolay Aleksandrov * send untagged; otherwise, send tagged. 3622594e906SNikolay Aleksandrov */ 3632594e906SNikolay Aleksandrov br_vlan_get_tag(skb, &vid); 3642594e906SNikolay Aleksandrov v = br_vlan_find(vg, vid); 3652594e906SNikolay Aleksandrov /* Vlan entry must be configured at this point. The 366fc92f745SVlad Yasevich * only exception is the bridge is set in promisc mode and the 367fc92f745SVlad Yasevich * packet is destined for the bridge device. In this case 368fc92f745SVlad Yasevich * pass the packet as is. 369fc92f745SVlad Yasevich */ 3702594e906SNikolay Aleksandrov if (!v || !br_vlan_should_use(v)) { 371fc92f745SVlad Yasevich if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) { 372fc92f745SVlad Yasevich goto out; 373fc92f745SVlad Yasevich } else { 374fc92f745SVlad Yasevich kfree_skb(skb); 375fc92f745SVlad Yasevich return NULL; 376fc92f745SVlad Yasevich } 377fc92f745SVlad Yasevich } 3786dada9b1SNikolay Aleksandrov if (br->vlan_stats_enabled) { 3796dada9b1SNikolay Aleksandrov stats = this_cpu_ptr(v->stats); 3806dada9b1SNikolay Aleksandrov u64_stats_update_begin(&stats->syncp); 3816dada9b1SNikolay Aleksandrov stats->tx_bytes += skb->len; 3826dada9b1SNikolay Aleksandrov stats->tx_packets++; 3836dada9b1SNikolay Aleksandrov u64_stats_update_end(&stats->syncp); 3846dada9b1SNikolay Aleksandrov } 3856dada9b1SNikolay Aleksandrov 3862594e906SNikolay Aleksandrov if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED) 38799b192daSToshiaki Makita skb->vlan_tci = 0; 38811538d03SRoopa Prabhu 38911538d03SRoopa Prabhu if (p && (p->flags & BR_VLAN_TUNNEL) && 39011538d03SRoopa Prabhu br_handle_egress_vlan_tunnel(skb, v)) { 39111538d03SRoopa Prabhu kfree_skb(skb); 39211538d03SRoopa Prabhu return NULL; 39311538d03SRoopa Prabhu } 39478851988SVlad Yasevich out: 39578851988SVlad Yasevich return skb; 39678851988SVlad Yasevich } 39778851988SVlad Yasevich 39878851988SVlad Yasevich /* Called under RCU */ 3996dada9b1SNikolay Aleksandrov static bool __allowed_ingress(const struct net_bridge *br, 4006dada9b1SNikolay Aleksandrov struct net_bridge_vlan_group *vg, 40178851988SVlad Yasevich struct sk_buff *skb, u16 *vid) 40278851988SVlad Yasevich { 4036dada9b1SNikolay Aleksandrov struct br_vlan_stats *stats; 4046dada9b1SNikolay Aleksandrov struct net_bridge_vlan *v; 4058580e211SToshiaki Makita bool tagged; 406a37b85c9SVlad Yasevich 40720adfa1aSVlad Yasevich BR_INPUT_SKB_CB(skb)->vlan_filtered = true; 40812464bb8SToshiaki Makita /* If vlan tx offload is disabled on bridge device and frame was 40912464bb8SToshiaki Makita * sent from vlan device on the bridge device, it does not have 41012464bb8SToshiaki Makita * HW accelerated vlan tag. 41112464bb8SToshiaki Makita */ 412df8a39deSJiri Pirko if (unlikely(!skb_vlan_tag_present(skb) && 4136dada9b1SNikolay Aleksandrov skb->protocol == br->vlan_proto)) { 4140d5501c1SVlad Yasevich skb = skb_vlan_untag(skb); 41512464bb8SToshiaki Makita if (unlikely(!skb)) 41612464bb8SToshiaki Makita return false; 41712464bb8SToshiaki Makita } 41812464bb8SToshiaki Makita 4198580e211SToshiaki Makita if (!br_vlan_get_tag(skb, vid)) { 4208580e211SToshiaki Makita /* Tagged frame */ 4216dada9b1SNikolay Aleksandrov if (skb->vlan_proto != br->vlan_proto) { 4228580e211SToshiaki Makita /* Protocol-mismatch, empty out vlan_tci for new tag */ 4238580e211SToshiaki Makita skb_push(skb, ETH_HLEN); 42462749e2cSJiri Pirko skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto, 425df8a39deSJiri Pirko skb_vlan_tag_get(skb)); 4268580e211SToshiaki Makita if (unlikely(!skb)) 4278580e211SToshiaki Makita return false; 4288580e211SToshiaki Makita 4298580e211SToshiaki Makita skb_pull(skb, ETH_HLEN); 4308580e211SToshiaki Makita skb_reset_mac_len(skb); 4318580e211SToshiaki Makita *vid = 0; 4328580e211SToshiaki Makita tagged = false; 4338580e211SToshiaki Makita } else { 4348580e211SToshiaki Makita tagged = true; 4358580e211SToshiaki Makita } 4368580e211SToshiaki Makita } else { 4378580e211SToshiaki Makita /* Untagged frame */ 4388580e211SToshiaki Makita tagged = false; 4398580e211SToshiaki Makita } 4408580e211SToshiaki Makita 441b90356ceSToshiaki Makita if (!*vid) { 44277751ee8SNikolay Aleksandrov u16 pvid = br_get_pvid(vg); 44377751ee8SNikolay Aleksandrov 444b90356ceSToshiaki Makita /* Frame had a tag with VID 0 or did not have a tag. 445b90356ceSToshiaki Makita * See if pvid is set on this port. That tells us which 446b90356ceSToshiaki Makita * vlan untagged or priority-tagged traffic belongs to. 44778851988SVlad Yasevich */ 4483df6bf45SVlad Yasevich if (!pvid) 449eb707618SToshiaki Makita goto drop; 45078851988SVlad Yasevich 451b90356ceSToshiaki Makita /* PVID is set on this port. Any untagged or priority-tagged 452b90356ceSToshiaki Makita * ingress frame is considered to belong to this vlan. 45378851988SVlad Yasevich */ 454dfb5fa32SToshiaki Makita *vid = pvid; 4558580e211SToshiaki Makita if (likely(!tagged)) 456b90356ceSToshiaki Makita /* Untagged Frame. */ 4576dada9b1SNikolay Aleksandrov __vlan_hwaccel_put_tag(skb, br->vlan_proto, pvid); 458b90356ceSToshiaki Makita else 459b90356ceSToshiaki Makita /* Priority-tagged Frame. 460b90356ceSToshiaki Makita * At this point, We know that skb->vlan_tci had 461b90356ceSToshiaki Makita * VLAN_TAG_PRESENT bit and its VID field was 0x000. 462b90356ceSToshiaki Makita * We update only VID field and preserve PCP field. 463b90356ceSToshiaki Makita */ 464b90356ceSToshiaki Makita skb->vlan_tci |= pvid; 465b90356ceSToshiaki Makita 4666dada9b1SNikolay Aleksandrov /* if stats are disabled we can avoid the lookup */ 4676dada9b1SNikolay Aleksandrov if (!br->vlan_stats_enabled) 46878851988SVlad Yasevich return true; 46978851988SVlad Yasevich } 47077751ee8SNikolay Aleksandrov v = br_vlan_find(vg, *vid); 4716dada9b1SNikolay Aleksandrov if (!v || !br_vlan_should_use(v)) 4726dada9b1SNikolay Aleksandrov goto drop; 4736dada9b1SNikolay Aleksandrov 4746dada9b1SNikolay Aleksandrov if (br->vlan_stats_enabled) { 4756dada9b1SNikolay Aleksandrov stats = this_cpu_ptr(v->stats); 4766dada9b1SNikolay Aleksandrov u64_stats_update_begin(&stats->syncp); 4776dada9b1SNikolay Aleksandrov stats->rx_bytes += skb->len; 4786dada9b1SNikolay Aleksandrov stats->rx_packets++; 4796dada9b1SNikolay Aleksandrov u64_stats_update_end(&stats->syncp); 4806dada9b1SNikolay Aleksandrov } 4816dada9b1SNikolay Aleksandrov 482a37b85c9SVlad Yasevich return true; 4836dada9b1SNikolay Aleksandrov 484eb707618SToshiaki Makita drop: 485eb707618SToshiaki Makita kfree_skb(skb); 486a37b85c9SVlad Yasevich return false; 487a37b85c9SVlad Yasevich } 488a37b85c9SVlad Yasevich 48977751ee8SNikolay Aleksandrov bool br_allowed_ingress(const struct net_bridge *br, 49077751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg, struct sk_buff *skb, 4912594e906SNikolay Aleksandrov u16 *vid) 4922594e906SNikolay Aleksandrov { 4932594e906SNikolay Aleksandrov /* If VLAN filtering is disabled on the bridge, all packets are 4942594e906SNikolay Aleksandrov * permitted. 4952594e906SNikolay Aleksandrov */ 4962594e906SNikolay Aleksandrov if (!br->vlan_enabled) { 4972594e906SNikolay Aleksandrov BR_INPUT_SKB_CB(skb)->vlan_filtered = false; 4982594e906SNikolay Aleksandrov return true; 4992594e906SNikolay Aleksandrov } 5002594e906SNikolay Aleksandrov 5016dada9b1SNikolay Aleksandrov return __allowed_ingress(br, vg, skb, vid); 5022594e906SNikolay Aleksandrov } 5032594e906SNikolay Aleksandrov 50485f46c6bSVlad Yasevich /* Called under RCU. */ 5052594e906SNikolay Aleksandrov bool br_allowed_egress(struct net_bridge_vlan_group *vg, 50685f46c6bSVlad Yasevich const struct sk_buff *skb) 50785f46c6bSVlad Yasevich { 5082594e906SNikolay Aleksandrov const struct net_bridge_vlan *v; 50985f46c6bSVlad Yasevich u16 vid; 51085f46c6bSVlad Yasevich 51120adfa1aSVlad Yasevich /* If this packet was not filtered at input, let it pass */ 51220adfa1aSVlad Yasevich if (!BR_INPUT_SKB_CB(skb)->vlan_filtered) 51385f46c6bSVlad Yasevich return true; 51485f46c6bSVlad Yasevich 51585f46c6bSVlad Yasevich br_vlan_get_tag(skb, &vid); 5162594e906SNikolay Aleksandrov v = br_vlan_find(vg, vid); 5172594e906SNikolay Aleksandrov if (v && br_vlan_should_use(v)) 51885f46c6bSVlad Yasevich return true; 51985f46c6bSVlad Yasevich 52085f46c6bSVlad Yasevich return false; 52185f46c6bSVlad Yasevich } 52285f46c6bSVlad Yasevich 523e0d7968aSToshiaki Makita /* Called under RCU */ 524e0d7968aSToshiaki Makita bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid) 525e0d7968aSToshiaki Makita { 526468e7944SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 527e0d7968aSToshiaki Makita struct net_bridge *br = p->br; 528e0d7968aSToshiaki Makita 52920adfa1aSVlad Yasevich /* If filtering was disabled at input, let it pass. */ 530c095f248SVlad Yasevich if (!br->vlan_enabled) 531e0d7968aSToshiaki Makita return true; 532e0d7968aSToshiaki Makita 533eca1e006SIdo Schimmel vg = nbp_vlan_group_rcu(p); 534468e7944SNikolay Aleksandrov if (!vg || !vg->num_vlans) 535e0d7968aSToshiaki Makita return false; 536e0d7968aSToshiaki Makita 5378580e211SToshiaki Makita if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto) 5388580e211SToshiaki Makita *vid = 0; 5398580e211SToshiaki Makita 540e0d7968aSToshiaki Makita if (!*vid) { 54177751ee8SNikolay Aleksandrov *vid = br_get_pvid(vg); 5423df6bf45SVlad Yasevich if (!*vid) 543e0d7968aSToshiaki Makita return false; 544e0d7968aSToshiaki Makita 545e0d7968aSToshiaki Makita return true; 546e0d7968aSToshiaki Makita } 547e0d7968aSToshiaki Makita 54877751ee8SNikolay Aleksandrov if (br_vlan_find(vg, *vid)) 549e0d7968aSToshiaki Makita return true; 550e0d7968aSToshiaki Makita 551e0d7968aSToshiaki Makita return false; 552e0d7968aSToshiaki Makita } 553e0d7968aSToshiaki Makita 5548adff41cSToshiaki Makita /* Must be protected by RTNL. 5558adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 556f418af63SNikolay Aleksandrov * changed must be true only if the vlan was created or updated 5578adff41cSToshiaki Makita */ 558f418af63SNikolay Aleksandrov int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags, bool *changed) 559243a2e63SVlad Yasevich { 560907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 5612594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 5622594e906SNikolay Aleksandrov int ret; 563243a2e63SVlad Yasevich 564243a2e63SVlad Yasevich ASSERT_RTNL(); 565243a2e63SVlad Yasevich 566f418af63SNikolay Aleksandrov *changed = false; 567907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 568907b1e6eSNikolay Aleksandrov vlan = br_vlan_find(vg, vid); 5692594e906SNikolay Aleksandrov if (vlan) { 5702594e906SNikolay Aleksandrov if (!br_vlan_is_brentry(vlan)) { 5712594e906SNikolay Aleksandrov /* Trying to change flags of non-existent bridge vlan */ 5722594e906SNikolay Aleksandrov if (!(flags & BRIDGE_VLAN_INFO_BRENTRY)) 5732594e906SNikolay Aleksandrov return -EINVAL; 5742594e906SNikolay Aleksandrov /* It was only kept for port vlans, now make it real */ 5752594e906SNikolay Aleksandrov ret = br_fdb_insert(br, NULL, br->dev->dev_addr, 5762594e906SNikolay Aleksandrov vlan->vid); 5772594e906SNikolay Aleksandrov if (ret) { 5782594e906SNikolay Aleksandrov br_err(br, "failed insert local address into bridge forwarding table\n"); 5792594e906SNikolay Aleksandrov return ret; 5802594e906SNikolay Aleksandrov } 58125127759SReshetova, Elena refcount_inc(&vlan->refcnt); 5822594e906SNikolay Aleksandrov vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY; 583907b1e6eSNikolay Aleksandrov vg->num_vlans++; 584f418af63SNikolay Aleksandrov *changed = true; 5852594e906SNikolay Aleksandrov } 586f418af63SNikolay Aleksandrov if (__vlan_add_flags(vlan, flags)) 587f418af63SNikolay Aleksandrov *changed = true; 588f418af63SNikolay Aleksandrov 5892594e906SNikolay Aleksandrov return 0; 5902594e906SNikolay Aleksandrov } 591243a2e63SVlad Yasevich 5922594e906SNikolay Aleksandrov vlan = kzalloc(sizeof(*vlan), GFP_KERNEL); 5932594e906SNikolay Aleksandrov if (!vlan) 594243a2e63SVlad Yasevich return -ENOMEM; 595243a2e63SVlad Yasevich 5966dada9b1SNikolay Aleksandrov vlan->stats = netdev_alloc_pcpu_stats(struct br_vlan_stats); 5976dada9b1SNikolay Aleksandrov if (!vlan->stats) { 5986dada9b1SNikolay Aleksandrov kfree(vlan); 5996dada9b1SNikolay Aleksandrov return -ENOMEM; 6006dada9b1SNikolay Aleksandrov } 6012594e906SNikolay Aleksandrov vlan->vid = vid; 6022594e906SNikolay Aleksandrov vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER; 6032594e906SNikolay Aleksandrov vlan->flags &= ~BRIDGE_VLAN_INFO_PVID; 6042594e906SNikolay Aleksandrov vlan->br = br; 6052594e906SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_BRENTRY) 60625127759SReshetova, Elena refcount_set(&vlan->refcnt, 1); 6072594e906SNikolay Aleksandrov ret = __vlan_add(vlan, flags); 6086dada9b1SNikolay Aleksandrov if (ret) { 6096dada9b1SNikolay Aleksandrov free_percpu(vlan->stats); 6102594e906SNikolay Aleksandrov kfree(vlan); 611f418af63SNikolay Aleksandrov } else { 612f418af63SNikolay Aleksandrov *changed = true; 6136dada9b1SNikolay Aleksandrov } 614243a2e63SVlad Yasevich 6152594e906SNikolay Aleksandrov return ret; 616243a2e63SVlad Yasevich } 617243a2e63SVlad Yasevich 6188adff41cSToshiaki Makita /* Must be protected by RTNL. 6198adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 6208adff41cSToshiaki Makita */ 621243a2e63SVlad Yasevich int br_vlan_delete(struct net_bridge *br, u16 vid) 622243a2e63SVlad Yasevich { 623907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 6242594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 625243a2e63SVlad Yasevich 626243a2e63SVlad Yasevich ASSERT_RTNL(); 627243a2e63SVlad Yasevich 628907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 629907b1e6eSNikolay Aleksandrov v = br_vlan_find(vg, vid); 6302594e906SNikolay Aleksandrov if (!v || !br_vlan_is_brentry(v)) 6312594e906SNikolay Aleksandrov return -ENOENT; 632243a2e63SVlad Yasevich 633424bb9c9SToshiaki Makita br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid); 6343741873bSRoopa Prabhu br_fdb_delete_by_port(br, NULL, vid, 0); 635bc9a25d2SVlad Yasevich 636efa5356bSRoopa Prabhu vlan_tunnel_info_del(vg, v); 637efa5356bSRoopa Prabhu 6382594e906SNikolay Aleksandrov return __vlan_del(v); 639243a2e63SVlad Yasevich } 640243a2e63SVlad Yasevich 641243a2e63SVlad Yasevich void br_vlan_flush(struct net_bridge *br) 642243a2e63SVlad Yasevich { 643f409d0edSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 644f409d0edSNikolay Aleksandrov 645243a2e63SVlad Yasevich ASSERT_RTNL(); 646243a2e63SVlad Yasevich 647f409d0edSNikolay Aleksandrov vg = br_vlan_group(br); 648f409d0edSNikolay Aleksandrov __vlan_flush(vg); 649f409d0edSNikolay Aleksandrov RCU_INIT_POINTER(br->vlgrp, NULL); 650f409d0edSNikolay Aleksandrov synchronize_rcu(); 651f409d0edSNikolay Aleksandrov __vlan_group_free(vg); 652243a2e63SVlad Yasevich } 653243a2e63SVlad Yasevich 6542594e906SNikolay Aleksandrov struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid) 6552b292fb4SToshiaki Makita { 6562594e906SNikolay Aleksandrov if (!vg) 6572594e906SNikolay Aleksandrov return NULL; 6582b292fb4SToshiaki Makita 6592594e906SNikolay Aleksandrov return br_vlan_lookup(&vg->vlan_hash, vid); 6602b292fb4SToshiaki Makita } 6612b292fb4SToshiaki Makita 662204177f3SToshiaki Makita /* Must be protected by RTNL. */ 663204177f3SToshiaki Makita static void recalculate_group_addr(struct net_bridge *br) 664204177f3SToshiaki Makita { 665204177f3SToshiaki Makita if (br->group_addr_set) 666204177f3SToshiaki Makita return; 667204177f3SToshiaki Makita 668204177f3SToshiaki Makita spin_lock_bh(&br->lock); 669204177f3SToshiaki Makita if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) { 670204177f3SToshiaki Makita /* Bridge Group Address */ 671204177f3SToshiaki Makita br->group_addr[5] = 0x00; 672204177f3SToshiaki Makita } else { /* vlan_enabled && ETH_P_8021AD */ 673204177f3SToshiaki Makita /* Provider Bridge Group Address */ 674204177f3SToshiaki Makita br->group_addr[5] = 0x08; 675204177f3SToshiaki Makita } 676204177f3SToshiaki Makita spin_unlock_bh(&br->lock); 677204177f3SToshiaki Makita } 678204177f3SToshiaki Makita 679204177f3SToshiaki Makita /* Must be protected by RTNL. */ 680204177f3SToshiaki Makita void br_recalculate_fwd_mask(struct net_bridge *br) 681204177f3SToshiaki Makita { 682204177f3SToshiaki Makita if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) 683204177f3SToshiaki Makita br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT; 684204177f3SToshiaki Makita else /* vlan_enabled && ETH_P_8021AD */ 685204177f3SToshiaki Makita br->group_fwd_mask_required = BR_GROUPFWD_8021AD & 686204177f3SToshiaki Makita ~(1u << br->group_addr[5]); 687204177f3SToshiaki Makita } 688204177f3SToshiaki Makita 689a7854037SNikolay Aleksandrov int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val) 690243a2e63SVlad Yasevich { 6916b72a770SElad Raz struct switchdev_attr attr = { 6926b72a770SElad Raz .orig_dev = br->dev, 6936b72a770SElad Raz .id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING, 6946b72a770SElad Raz .flags = SWITCHDEV_F_SKIP_EOPNOTSUPP, 6956b72a770SElad Raz .u.vlan_filtering = val, 6966b72a770SElad Raz }; 6976b72a770SElad Raz int err; 6986b72a770SElad Raz 699243a2e63SVlad Yasevich if (br->vlan_enabled == val) 700a7854037SNikolay Aleksandrov return 0; 701243a2e63SVlad Yasevich 7026b72a770SElad Raz err = switchdev_port_attr_set(br->dev, &attr); 7036b72a770SElad Raz if (err && err != -EOPNOTSUPP) 7046b72a770SElad Raz return err; 7056b72a770SElad Raz 706243a2e63SVlad Yasevich br->vlan_enabled = val; 7072796d0c6SVlad Yasevich br_manage_promisc(br); 708204177f3SToshiaki Makita recalculate_group_addr(br); 709204177f3SToshiaki Makita br_recalculate_fwd_mask(br); 710243a2e63SVlad Yasevich 711a7854037SNikolay Aleksandrov return 0; 712a7854037SNikolay Aleksandrov } 713a7854037SNikolay Aleksandrov 714a7854037SNikolay Aleksandrov int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val) 715a7854037SNikolay Aleksandrov { 716047831a9SXin Long return __br_vlan_filter_toggle(br, val); 717243a2e63SVlad Yasevich } 718243a2e63SVlad Yasevich 7191f51445aSIdo Schimmel bool br_vlan_enabled(const struct net_device *dev) 7201f51445aSIdo Schimmel { 7211f51445aSIdo Schimmel struct net_bridge *br = netdev_priv(dev); 7221f51445aSIdo Schimmel 7231f51445aSIdo Schimmel return !!br->vlan_enabled; 7241f51445aSIdo Schimmel } 7251f51445aSIdo Schimmel EXPORT_SYMBOL_GPL(br_vlan_enabled); 7261f51445aSIdo Schimmel 727d2d427b3SToshiaki Makita int __br_vlan_set_proto(struct net_bridge *br, __be16 proto) 728204177f3SToshiaki Makita { 729204177f3SToshiaki Makita int err = 0; 730204177f3SToshiaki Makita struct net_bridge_port *p; 7312594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 732907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 733d2d427b3SToshiaki Makita __be16 oldproto; 734204177f3SToshiaki Makita 735204177f3SToshiaki Makita if (br->vlan_proto == proto) 736d2d427b3SToshiaki Makita return 0; 737204177f3SToshiaki Makita 738204177f3SToshiaki Makita /* Add VLANs for the new proto to the device filter. */ 739204177f3SToshiaki Makita list_for_each_entry(p, &br->port_list, list) { 740907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 741907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) { 7422594e906SNikolay Aleksandrov err = vlan_vid_add(p->dev, proto, vlan->vid); 743204177f3SToshiaki Makita if (err) 744204177f3SToshiaki Makita goto err_filt; 745204177f3SToshiaki Makita } 746204177f3SToshiaki Makita } 747204177f3SToshiaki Makita 748204177f3SToshiaki Makita oldproto = br->vlan_proto; 749204177f3SToshiaki Makita br->vlan_proto = proto; 750204177f3SToshiaki Makita 751204177f3SToshiaki Makita recalculate_group_addr(br); 752204177f3SToshiaki Makita br_recalculate_fwd_mask(br); 753204177f3SToshiaki Makita 754204177f3SToshiaki Makita /* Delete VLANs for the old proto from the device filter. */ 755907b1e6eSNikolay Aleksandrov list_for_each_entry(p, &br->port_list, list) { 756907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 757907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) 7582594e906SNikolay Aleksandrov vlan_vid_del(p->dev, oldproto, vlan->vid); 759907b1e6eSNikolay Aleksandrov } 760204177f3SToshiaki Makita 761d2d427b3SToshiaki Makita return 0; 762204177f3SToshiaki Makita 763204177f3SToshiaki Makita err_filt: 764907b1e6eSNikolay Aleksandrov list_for_each_entry_continue_reverse(vlan, &vg->vlan_list, vlist) 7652594e906SNikolay Aleksandrov vlan_vid_del(p->dev, proto, vlan->vid); 766204177f3SToshiaki Makita 767907b1e6eSNikolay Aleksandrov list_for_each_entry_continue_reverse(p, &br->port_list, list) { 768907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 769907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) 7702594e906SNikolay Aleksandrov vlan_vid_del(p->dev, proto, vlan->vid); 771907b1e6eSNikolay Aleksandrov } 772204177f3SToshiaki Makita 773d2d427b3SToshiaki Makita return err; 774d2d427b3SToshiaki Makita } 775d2d427b3SToshiaki Makita 776d2d427b3SToshiaki Makita int br_vlan_set_proto(struct net_bridge *br, unsigned long val) 777d2d427b3SToshiaki Makita { 778d2d427b3SToshiaki Makita if (val != ETH_P_8021Q && val != ETH_P_8021AD) 779d2d427b3SToshiaki Makita return -EPROTONOSUPPORT; 780d2d427b3SToshiaki Makita 781047831a9SXin Long return __br_vlan_set_proto(br, htons(val)); 782204177f3SToshiaki Makita } 783204177f3SToshiaki Makita 7846dada9b1SNikolay Aleksandrov int br_vlan_set_stats(struct net_bridge *br, unsigned long val) 7856dada9b1SNikolay Aleksandrov { 7866dada9b1SNikolay Aleksandrov switch (val) { 7876dada9b1SNikolay Aleksandrov case 0: 7886dada9b1SNikolay Aleksandrov case 1: 7896dada9b1SNikolay Aleksandrov br->vlan_stats_enabled = val; 7906dada9b1SNikolay Aleksandrov break; 7916dada9b1SNikolay Aleksandrov default: 7926dada9b1SNikolay Aleksandrov return -EINVAL; 7936dada9b1SNikolay Aleksandrov } 7946dada9b1SNikolay Aleksandrov 7956dada9b1SNikolay Aleksandrov return 0; 7966dada9b1SNikolay Aleksandrov } 7976dada9b1SNikolay Aleksandrov 79877751ee8SNikolay Aleksandrov static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 vid) 7995be5a2dfSVlad Yasevich { 8002594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 8012594e906SNikolay Aleksandrov 80277751ee8SNikolay Aleksandrov if (vid != vg->pvid) 8032594e906SNikolay Aleksandrov return false; 8042594e906SNikolay Aleksandrov 8052594e906SNikolay Aleksandrov v = br_vlan_lookup(&vg->vlan_hash, vid); 8062594e906SNikolay Aleksandrov if (v && br_vlan_should_use(v) && 8072594e906SNikolay Aleksandrov (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)) 8082594e906SNikolay Aleksandrov return true; 8092594e906SNikolay Aleksandrov 8102594e906SNikolay Aleksandrov return false; 8115be5a2dfSVlad Yasevich } 8125be5a2dfSVlad Yasevich 8135be5a2dfSVlad Yasevich static void br_vlan_disable_default_pvid(struct net_bridge *br) 8145be5a2dfSVlad Yasevich { 8155be5a2dfSVlad Yasevich struct net_bridge_port *p; 8165be5a2dfSVlad Yasevich u16 pvid = br->default_pvid; 8175be5a2dfSVlad Yasevich 8185be5a2dfSVlad Yasevich /* Disable default_pvid on all ports where it is still 8195be5a2dfSVlad Yasevich * configured. 8205be5a2dfSVlad Yasevich */ 821907b1e6eSNikolay Aleksandrov if (vlan_default_pvid(br_vlan_group(br), pvid)) 8225be5a2dfSVlad Yasevich br_vlan_delete(br, pvid); 8235be5a2dfSVlad Yasevich 8245be5a2dfSVlad Yasevich list_for_each_entry(p, &br->port_list, list) { 825907b1e6eSNikolay Aleksandrov if (vlan_default_pvid(nbp_vlan_group(p), pvid)) 8265be5a2dfSVlad Yasevich nbp_vlan_delete(p, pvid); 8275be5a2dfSVlad Yasevich } 8285be5a2dfSVlad Yasevich 8295be5a2dfSVlad Yasevich br->default_pvid = 0; 8305be5a2dfSVlad Yasevich } 8315be5a2dfSVlad Yasevich 8320f963b75SNikolay Aleksandrov int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid) 8335be5a2dfSVlad Yasevich { 8342594e906SNikolay Aleksandrov const struct net_bridge_vlan *pvent; 835907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 8365be5a2dfSVlad Yasevich struct net_bridge_port *p; 837f418af63SNikolay Aleksandrov unsigned long *changed; 838f418af63SNikolay Aleksandrov bool vlchange; 8395be5a2dfSVlad Yasevich u16 old_pvid; 8405be5a2dfSVlad Yasevich int err = 0; 8415be5a2dfSVlad Yasevich 8420f963b75SNikolay Aleksandrov if (!pvid) { 8430f963b75SNikolay Aleksandrov br_vlan_disable_default_pvid(br); 8440f963b75SNikolay Aleksandrov return 0; 8450f963b75SNikolay Aleksandrov } 8460f963b75SNikolay Aleksandrov 8475be5a2dfSVlad Yasevich changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long), 8485be5a2dfSVlad Yasevich GFP_KERNEL); 8495be5a2dfSVlad Yasevich if (!changed) 8505be5a2dfSVlad Yasevich return -ENOMEM; 8515be5a2dfSVlad Yasevich 8525be5a2dfSVlad Yasevich old_pvid = br->default_pvid; 8535be5a2dfSVlad Yasevich 8545be5a2dfSVlad Yasevich /* Update default_pvid config only if we do not conflict with 8555be5a2dfSVlad Yasevich * user configuration. 8565be5a2dfSVlad Yasevich */ 857907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 858907b1e6eSNikolay Aleksandrov pvent = br_vlan_find(vg, pvid); 859907b1e6eSNikolay Aleksandrov if ((!old_pvid || vlan_default_pvid(vg, old_pvid)) && 8602594e906SNikolay Aleksandrov (!pvent || !br_vlan_should_use(pvent))) { 8615be5a2dfSVlad Yasevich err = br_vlan_add(br, pvid, 8625be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 8632594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED | 864f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY, 865f418af63SNikolay Aleksandrov &vlchange); 8665be5a2dfSVlad Yasevich if (err) 8675be5a2dfSVlad Yasevich goto out; 8685be5a2dfSVlad Yasevich br_vlan_delete(br, old_pvid); 8695be5a2dfSVlad Yasevich set_bit(0, changed); 8705be5a2dfSVlad Yasevich } 8715be5a2dfSVlad Yasevich 8725be5a2dfSVlad Yasevich list_for_each_entry(p, &br->port_list, list) { 8735be5a2dfSVlad Yasevich /* Update default_pvid config only if we do not conflict with 8745be5a2dfSVlad Yasevich * user configuration. 8755be5a2dfSVlad Yasevich */ 876907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 8775be5a2dfSVlad Yasevich if ((old_pvid && 878907b1e6eSNikolay Aleksandrov !vlan_default_pvid(vg, old_pvid)) || 879907b1e6eSNikolay Aleksandrov br_vlan_find(vg, pvid)) 8805be5a2dfSVlad Yasevich continue; 8815be5a2dfSVlad Yasevich 8825be5a2dfSVlad Yasevich err = nbp_vlan_add(p, pvid, 8835be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 884f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED, 885f418af63SNikolay Aleksandrov &vlchange); 8865be5a2dfSVlad Yasevich if (err) 8875be5a2dfSVlad Yasevich goto err_port; 8885be5a2dfSVlad Yasevich nbp_vlan_delete(p, old_pvid); 8895be5a2dfSVlad Yasevich set_bit(p->port_no, changed); 8905be5a2dfSVlad Yasevich } 8915be5a2dfSVlad Yasevich 8925be5a2dfSVlad Yasevich br->default_pvid = pvid; 8935be5a2dfSVlad Yasevich 8945be5a2dfSVlad Yasevich out: 8955be5a2dfSVlad Yasevich kfree(changed); 8965be5a2dfSVlad Yasevich return err; 8975be5a2dfSVlad Yasevich 8985be5a2dfSVlad Yasevich err_port: 8995be5a2dfSVlad Yasevich list_for_each_entry_continue_reverse(p, &br->port_list, list) { 9005be5a2dfSVlad Yasevich if (!test_bit(p->port_no, changed)) 9015be5a2dfSVlad Yasevich continue; 9025be5a2dfSVlad Yasevich 9035be5a2dfSVlad Yasevich if (old_pvid) 9045be5a2dfSVlad Yasevich nbp_vlan_add(p, old_pvid, 9055be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 906f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED, 907f418af63SNikolay Aleksandrov &vlchange); 9085be5a2dfSVlad Yasevich nbp_vlan_delete(p, pvid); 9095be5a2dfSVlad Yasevich } 9105be5a2dfSVlad Yasevich 9115be5a2dfSVlad Yasevich if (test_bit(0, changed)) { 9125be5a2dfSVlad Yasevich if (old_pvid) 9135be5a2dfSVlad Yasevich br_vlan_add(br, old_pvid, 9145be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 9152594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED | 916f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY, 917f418af63SNikolay Aleksandrov &vlchange); 9185be5a2dfSVlad Yasevich br_vlan_delete(br, pvid); 9195be5a2dfSVlad Yasevich } 9205be5a2dfSVlad Yasevich goto out; 9215be5a2dfSVlad Yasevich } 9225be5a2dfSVlad Yasevich 92396a20d9dSVlad Yasevich int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val) 92496a20d9dSVlad Yasevich { 92596a20d9dSVlad Yasevich u16 pvid = val; 92696a20d9dSVlad Yasevich int err = 0; 92796a20d9dSVlad Yasevich 9285be5a2dfSVlad Yasevich if (val >= VLAN_VID_MASK) 92996a20d9dSVlad Yasevich return -EINVAL; 93096a20d9dSVlad Yasevich 93196a20d9dSVlad Yasevich if (pvid == br->default_pvid) 932047831a9SXin Long goto out; 93396a20d9dSVlad Yasevich 93496a20d9dSVlad Yasevich /* Only allow default pvid change when filtering is disabled */ 93596a20d9dSVlad Yasevich if (br->vlan_enabled) { 93696a20d9dSVlad Yasevich pr_info_once("Please disable vlan filtering to change default_pvid\n"); 93796a20d9dSVlad Yasevich err = -EPERM; 938047831a9SXin Long goto out; 93996a20d9dSVlad Yasevich } 9405be5a2dfSVlad Yasevich err = __br_vlan_set_default_pvid(br, pvid); 941047831a9SXin Long out: 94296a20d9dSVlad Yasevich return err; 94396a20d9dSVlad Yasevich } 94496a20d9dSVlad Yasevich 9455be5a2dfSVlad Yasevich int br_vlan_init(struct net_bridge *br) 9468580e211SToshiaki Makita { 947907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 9482594e906SNikolay Aleksandrov int ret = -ENOMEM; 949f418af63SNikolay Aleksandrov bool changed; 9502594e906SNikolay Aleksandrov 951907b1e6eSNikolay Aleksandrov vg = kzalloc(sizeof(*vg), GFP_KERNEL); 952907b1e6eSNikolay Aleksandrov if (!vg) 9532594e906SNikolay Aleksandrov goto out; 954907b1e6eSNikolay Aleksandrov ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params); 9552594e906SNikolay Aleksandrov if (ret) 9562594e906SNikolay Aleksandrov goto err_rhtbl; 957efa5356bSRoopa Prabhu ret = vlan_tunnel_init(vg); 958efa5356bSRoopa Prabhu if (ret) 959efa5356bSRoopa Prabhu goto err_tunnel_init; 960907b1e6eSNikolay Aleksandrov INIT_LIST_HEAD(&vg->vlan_list); 9618580e211SToshiaki Makita br->vlan_proto = htons(ETH_P_8021Q); 96296a20d9dSVlad Yasevich br->default_pvid = 1; 963907b1e6eSNikolay Aleksandrov rcu_assign_pointer(br->vlgrp, vg); 9642594e906SNikolay Aleksandrov ret = br_vlan_add(br, 1, 9652594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED | 966f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY, &changed); 9672594e906SNikolay Aleksandrov if (ret) 9682594e906SNikolay Aleksandrov goto err_vlan_add; 9692594e906SNikolay Aleksandrov 9702594e906SNikolay Aleksandrov out: 9712594e906SNikolay Aleksandrov return ret; 9722594e906SNikolay Aleksandrov 9732594e906SNikolay Aleksandrov err_vlan_add: 974efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 975efa5356bSRoopa Prabhu err_tunnel_init: 976907b1e6eSNikolay Aleksandrov rhashtable_destroy(&vg->vlan_hash); 9772594e906SNikolay Aleksandrov err_rhtbl: 978907b1e6eSNikolay Aleksandrov kfree(vg); 9792594e906SNikolay Aleksandrov 9802594e906SNikolay Aleksandrov goto out; 9812594e906SNikolay Aleksandrov } 9822594e906SNikolay Aleksandrov 9832594e906SNikolay Aleksandrov int nbp_vlan_init(struct net_bridge_port *p) 9842594e906SNikolay Aleksandrov { 985404cdbf0SElad Raz struct switchdev_attr attr = { 986404cdbf0SElad Raz .orig_dev = p->br->dev, 987404cdbf0SElad Raz .id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING, 988404cdbf0SElad Raz .flags = SWITCHDEV_F_SKIP_EOPNOTSUPP, 989404cdbf0SElad Raz .u.vlan_filtering = p->br->vlan_enabled, 990404cdbf0SElad Raz }; 991263344e6SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 9922594e906SNikolay Aleksandrov int ret = -ENOMEM; 9932594e906SNikolay Aleksandrov 994263344e6SNikolay Aleksandrov vg = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL); 995263344e6SNikolay Aleksandrov if (!vg) 9962594e906SNikolay Aleksandrov goto out; 9972594e906SNikolay Aleksandrov 998404cdbf0SElad Raz ret = switchdev_port_attr_set(p->dev, &attr); 999404cdbf0SElad Raz if (ret && ret != -EOPNOTSUPP) 1000404cdbf0SElad Raz goto err_vlan_enabled; 1001404cdbf0SElad Raz 1002263344e6SNikolay Aleksandrov ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params); 10032594e906SNikolay Aleksandrov if (ret) 10042594e906SNikolay Aleksandrov goto err_rhtbl; 1005efa5356bSRoopa Prabhu ret = vlan_tunnel_init(vg); 1006efa5356bSRoopa Prabhu if (ret) 1007efa5356bSRoopa Prabhu goto err_tunnel_init; 1008263344e6SNikolay Aleksandrov INIT_LIST_HEAD(&vg->vlan_list); 1009907b1e6eSNikolay Aleksandrov rcu_assign_pointer(p->vlgrp, vg); 10102594e906SNikolay Aleksandrov if (p->br->default_pvid) { 1011f418af63SNikolay Aleksandrov bool changed; 1012f418af63SNikolay Aleksandrov 10132594e906SNikolay Aleksandrov ret = nbp_vlan_add(p, p->br->default_pvid, 10142594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_PVID | 1015f418af63SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED, 1016f418af63SNikolay Aleksandrov &changed); 10172594e906SNikolay Aleksandrov if (ret) 10182594e906SNikolay Aleksandrov goto err_vlan_add; 10192594e906SNikolay Aleksandrov } 10202594e906SNikolay Aleksandrov out: 10212594e906SNikolay Aleksandrov return ret; 10222594e906SNikolay Aleksandrov 10232594e906SNikolay Aleksandrov err_vlan_add: 102407bc588fSIdo Schimmel RCU_INIT_POINTER(p->vlgrp, NULL); 102507bc588fSIdo Schimmel synchronize_rcu(); 1026efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 1027efa5356bSRoopa Prabhu err_tunnel_init: 1028efa5356bSRoopa Prabhu rhashtable_destroy(&vg->vlan_hash); 10292594e906SNikolay Aleksandrov err_rhtbl: 1030df2c4334SYotam Gigi err_vlan_enabled: 1031263344e6SNikolay Aleksandrov kfree(vg); 10322594e906SNikolay Aleksandrov 10332594e906SNikolay Aleksandrov goto out; 10348580e211SToshiaki Makita } 10358580e211SToshiaki Makita 10368adff41cSToshiaki Makita /* Must be protected by RTNL. 10378adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 1038f418af63SNikolay Aleksandrov * changed must be true only if the vlan was created or updated 10398adff41cSToshiaki Makita */ 1040f418af63SNikolay Aleksandrov int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags, 1041f418af63SNikolay Aleksandrov bool *changed) 1042243a2e63SVlad Yasevich { 10432594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 10442594e906SNikolay Aleksandrov int ret; 1045243a2e63SVlad Yasevich 1046243a2e63SVlad Yasevich ASSERT_RTNL(); 1047243a2e63SVlad Yasevich 1048f418af63SNikolay Aleksandrov *changed = false; 1049907b1e6eSNikolay Aleksandrov vlan = br_vlan_find(nbp_vlan_group(port), vid); 10502594e906SNikolay Aleksandrov if (vlan) { 10517fbac984SIdo Schimmel /* Pass the flags to the hardware bridge */ 1052d66e4348SPetr Machata ret = br_switchdev_port_vlan_add(port->dev, vid, flags); 10537fbac984SIdo Schimmel if (ret && ret != -EOPNOTSUPP) 10547fbac984SIdo Schimmel return ret; 1055f418af63SNikolay Aleksandrov *changed = __vlan_add_flags(vlan, flags); 1056f418af63SNikolay Aleksandrov 10572594e906SNikolay Aleksandrov return 0; 1058243a2e63SVlad Yasevich } 1059243a2e63SVlad Yasevich 10602594e906SNikolay Aleksandrov vlan = kzalloc(sizeof(*vlan), GFP_KERNEL); 10612594e906SNikolay Aleksandrov if (!vlan) 10622594e906SNikolay Aleksandrov return -ENOMEM; 1063243a2e63SVlad Yasevich 10642594e906SNikolay Aleksandrov vlan->vid = vid; 10652594e906SNikolay Aleksandrov vlan->port = port; 10662594e906SNikolay Aleksandrov ret = __vlan_add(vlan, flags); 10672594e906SNikolay Aleksandrov if (ret) 10682594e906SNikolay Aleksandrov kfree(vlan); 1069f418af63SNikolay Aleksandrov else 1070f418af63SNikolay Aleksandrov *changed = true; 1071243a2e63SVlad Yasevich 10722594e906SNikolay Aleksandrov return ret; 1073243a2e63SVlad Yasevich } 1074243a2e63SVlad Yasevich 10758adff41cSToshiaki Makita /* Must be protected by RTNL. 10768adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 10778adff41cSToshiaki Makita */ 1078243a2e63SVlad Yasevich int nbp_vlan_delete(struct net_bridge_port *port, u16 vid) 1079243a2e63SVlad Yasevich { 10802594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 1081243a2e63SVlad Yasevich 1082243a2e63SVlad Yasevich ASSERT_RTNL(); 1083243a2e63SVlad Yasevich 1084907b1e6eSNikolay Aleksandrov v = br_vlan_find(nbp_vlan_group(port), vid); 10852594e906SNikolay Aleksandrov if (!v) 10862594e906SNikolay Aleksandrov return -ENOENT; 1087424bb9c9SToshiaki Makita br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid); 10881ea2d020SNikolay Aleksandrov br_fdb_delete_by_port(port->br, port, vid, 0); 1089bc9a25d2SVlad Yasevich 10902594e906SNikolay Aleksandrov return __vlan_del(v); 1091243a2e63SVlad Yasevich } 1092243a2e63SVlad Yasevich 1093243a2e63SVlad Yasevich void nbp_vlan_flush(struct net_bridge_port *port) 1094243a2e63SVlad Yasevich { 1095f409d0edSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 1096f409d0edSNikolay Aleksandrov 1097243a2e63SVlad Yasevich ASSERT_RTNL(); 1098243a2e63SVlad Yasevich 1099f409d0edSNikolay Aleksandrov vg = nbp_vlan_group(port); 1100f409d0edSNikolay Aleksandrov __vlan_flush(vg); 1101f409d0edSNikolay Aleksandrov RCU_INIT_POINTER(port->vlgrp, NULL); 1102f409d0edSNikolay Aleksandrov synchronize_rcu(); 1103f409d0edSNikolay Aleksandrov __vlan_group_free(vg); 11045be5a2dfSVlad Yasevich } 1105a60c0903SNikolay Aleksandrov 1106a60c0903SNikolay Aleksandrov void br_vlan_get_stats(const struct net_bridge_vlan *v, 1107a60c0903SNikolay Aleksandrov struct br_vlan_stats *stats) 1108a60c0903SNikolay Aleksandrov { 1109a60c0903SNikolay Aleksandrov int i; 1110a60c0903SNikolay Aleksandrov 1111a60c0903SNikolay Aleksandrov memset(stats, 0, sizeof(*stats)); 1112a60c0903SNikolay Aleksandrov for_each_possible_cpu(i) { 1113a60c0903SNikolay Aleksandrov u64 rxpackets, rxbytes, txpackets, txbytes; 1114a60c0903SNikolay Aleksandrov struct br_vlan_stats *cpu_stats; 1115a60c0903SNikolay Aleksandrov unsigned int start; 1116a60c0903SNikolay Aleksandrov 1117a60c0903SNikolay Aleksandrov cpu_stats = per_cpu_ptr(v->stats, i); 1118a60c0903SNikolay Aleksandrov do { 1119a60c0903SNikolay Aleksandrov start = u64_stats_fetch_begin_irq(&cpu_stats->syncp); 1120a60c0903SNikolay Aleksandrov rxpackets = cpu_stats->rx_packets; 1121a60c0903SNikolay Aleksandrov rxbytes = cpu_stats->rx_bytes; 1122a60c0903SNikolay Aleksandrov txbytes = cpu_stats->tx_bytes; 1123a60c0903SNikolay Aleksandrov txpackets = cpu_stats->tx_packets; 1124a60c0903SNikolay Aleksandrov } while (u64_stats_fetch_retry_irq(&cpu_stats->syncp, start)); 1125a60c0903SNikolay Aleksandrov 1126a60c0903SNikolay Aleksandrov stats->rx_packets += rxpackets; 1127a60c0903SNikolay Aleksandrov stats->rx_bytes += rxbytes; 1128a60c0903SNikolay Aleksandrov stats->tx_bytes += txbytes; 1129a60c0903SNikolay Aleksandrov stats->tx_packets += txpackets; 1130a60c0903SNikolay Aleksandrov } 1131a60c0903SNikolay Aleksandrov } 11324d4fd361SPetr Machata 11334d4fd361SPetr Machata int br_vlan_get_pvid(const struct net_device *dev, u16 *p_pvid) 11344d4fd361SPetr Machata { 11354d4fd361SPetr Machata struct net_bridge_vlan_group *vg; 11364d4fd361SPetr Machata 11374d4fd361SPetr Machata ASSERT_RTNL(); 11384d4fd361SPetr Machata if (netif_is_bridge_master(dev)) 11394d4fd361SPetr Machata vg = br_vlan_group(netdev_priv(dev)); 11404d4fd361SPetr Machata else 11414d4fd361SPetr Machata return -EINVAL; 11424d4fd361SPetr Machata 11434d4fd361SPetr Machata *p_pvid = br_get_pvid(vg); 11444d4fd361SPetr Machata return 0; 11454d4fd361SPetr Machata } 11464d4fd361SPetr Machata EXPORT_SYMBOL_GPL(br_vlan_get_pvid); 11474d4fd361SPetr Machata 11484d4fd361SPetr Machata int br_vlan_get_info(const struct net_device *dev, u16 vid, 11494d4fd361SPetr Machata struct bridge_vlan_info *p_vinfo) 11504d4fd361SPetr Machata { 11514d4fd361SPetr Machata struct net_bridge_vlan_group *vg; 11524d4fd361SPetr Machata struct net_bridge_vlan *v; 11534d4fd361SPetr Machata struct net_bridge_port *p; 11544d4fd361SPetr Machata 11554d4fd361SPetr Machata ASSERT_RTNL(); 11564d4fd361SPetr Machata p = br_port_get_check_rtnl(dev); 11574d4fd361SPetr Machata if (p) 11584d4fd361SPetr Machata vg = nbp_vlan_group(p); 11592b18d79eSPetr Machata else if (netif_is_bridge_master(dev)) 11602b18d79eSPetr Machata vg = br_vlan_group(netdev_priv(dev)); 11614d4fd361SPetr Machata else 11624d4fd361SPetr Machata return -EINVAL; 11634d4fd361SPetr Machata 11644d4fd361SPetr Machata v = br_vlan_find(vg, vid); 11654d4fd361SPetr Machata if (!v) 11664d4fd361SPetr Machata return -ENOENT; 11674d4fd361SPetr Machata 11684d4fd361SPetr Machata p_vinfo->vid = vid; 11694d4fd361SPetr Machata p_vinfo->flags = v->flags; 11704d4fd361SPetr Machata return 0; 11714d4fd361SPetr Machata } 11724d4fd361SPetr Machata EXPORT_SYMBOL_GPL(br_vlan_get_info); 1173