xref: /openbmc/linux/net/bridge/br_vlan.c (revision efa5356b)
1243a2e63SVlad Yasevich #include <linux/kernel.h>
2243a2e63SVlad Yasevich #include <linux/netdevice.h>
3243a2e63SVlad Yasevich #include <linux/rtnetlink.h>
4243a2e63SVlad Yasevich #include <linux/slab.h>
57f109539SScott Feldman #include <net/switchdev.h>
6243a2e63SVlad Yasevich 
7243a2e63SVlad Yasevich #include "br_private.h"
8efa5356bSRoopa Prabhu #include "br_private_tunnel.h"
9243a2e63SVlad Yasevich 
102594e906SNikolay Aleksandrov static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg,
112594e906SNikolay Aleksandrov 			      const void *ptr)
12552406c4SVlad Yasevich {
132594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *vle = ptr;
142594e906SNikolay Aleksandrov 	u16 vid = *(u16 *)arg->key;
152594e906SNikolay Aleksandrov 
162594e906SNikolay Aleksandrov 	return vle->vid != vid;
172594e906SNikolay Aleksandrov }
182594e906SNikolay Aleksandrov 
192594e906SNikolay Aleksandrov static const struct rhashtable_params br_vlan_rht_params = {
202594e906SNikolay Aleksandrov 	.head_offset = offsetof(struct net_bridge_vlan, vnode),
212594e906SNikolay Aleksandrov 	.key_offset = offsetof(struct net_bridge_vlan, vid),
222594e906SNikolay Aleksandrov 	.key_len = sizeof(u16),
238af78b64SNikolay Aleksandrov 	.nelem_hint = 3,
248af78b64SNikolay Aleksandrov 	.locks_mul = 1,
252594e906SNikolay Aleksandrov 	.max_size = VLAN_N_VID,
262594e906SNikolay Aleksandrov 	.obj_cmpfn = br_vlan_cmp,
272594e906SNikolay Aleksandrov 	.automatic_shrinking = true,
282594e906SNikolay Aleksandrov };
292594e906SNikolay Aleksandrov 
302594e906SNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid)
312594e906SNikolay Aleksandrov {
322594e906SNikolay Aleksandrov 	return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params);
332594e906SNikolay Aleksandrov }
342594e906SNikolay Aleksandrov 
3577751ee8SNikolay Aleksandrov static void __vlan_add_pvid(struct net_bridge_vlan_group *vg, u16 vid)
362594e906SNikolay Aleksandrov {
3777751ee8SNikolay Aleksandrov 	if (vg->pvid == vid)
38552406c4SVlad Yasevich 		return;
39552406c4SVlad Yasevich 
40552406c4SVlad Yasevich 	smp_wmb();
4177751ee8SNikolay Aleksandrov 	vg->pvid = vid;
42552406c4SVlad Yasevich }
43552406c4SVlad Yasevich 
4477751ee8SNikolay Aleksandrov static void __vlan_delete_pvid(struct net_bridge_vlan_group *vg, u16 vid)
45552406c4SVlad Yasevich {
4677751ee8SNikolay Aleksandrov 	if (vg->pvid != vid)
47552406c4SVlad Yasevich 		return;
48552406c4SVlad Yasevich 
49552406c4SVlad Yasevich 	smp_wmb();
5077751ee8SNikolay Aleksandrov 	vg->pvid = 0;
51552406c4SVlad Yasevich }
52552406c4SVlad Yasevich 
532594e906SNikolay Aleksandrov static void __vlan_add_flags(struct net_bridge_vlan *v, u16 flags)
5435e03f3aSVlad Yasevich {
5577751ee8SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
5677751ee8SNikolay Aleksandrov 
572594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v))
58907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(v->br);
59635126b7SVlad Yasevich 	else
60907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(v->port);
6177751ee8SNikolay Aleksandrov 
6277751ee8SNikolay Aleksandrov 	if (flags & BRIDGE_VLAN_INFO_PVID)
6377751ee8SNikolay Aleksandrov 		__vlan_add_pvid(vg, v->vid);
642594e906SNikolay Aleksandrov 	else
6577751ee8SNikolay Aleksandrov 		__vlan_delete_pvid(vg, v->vid);
6635e03f3aSVlad Yasevich 
6735e03f3aSVlad Yasevich 	if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
682594e906SNikolay Aleksandrov 		v->flags |= BRIDGE_VLAN_INFO_UNTAGGED;
69635126b7SVlad Yasevich 	else
702594e906SNikolay Aleksandrov 		v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED;
7135e03f3aSVlad Yasevich }
7235e03f3aSVlad Yasevich 
737f109539SScott Feldman static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br,
747f109539SScott Feldman 			  u16 vid, u16 flags)
757f109539SScott Feldman {
768f24f309SJiri Pirko 	struct switchdev_obj_port_vlan v = {
776ff64f6fSIdo Schimmel 		.obj.orig_dev = dev,
789e8f4a54SJiri Pirko 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
797f109539SScott Feldman 		.flags = flags,
803e3a78b4SScott Feldman 		.vid_begin = vid,
817f109539SScott Feldman 		.vid_end = vid,
827f109539SScott Feldman 	};
830944d6b5SJiri Pirko 	int err;
847f109539SScott Feldman 
850944d6b5SJiri Pirko 	/* Try switchdev op first. In case it is not supported, fallback to
860944d6b5SJiri Pirko 	 * 8021q add.
870944d6b5SJiri Pirko 	 */
889e8f4a54SJiri Pirko 	err = switchdev_port_obj_add(dev, &v.obj);
897f109539SScott Feldman 	if (err == -EOPNOTSUPP)
900944d6b5SJiri Pirko 		return vlan_vid_add(dev, br->vlan_proto, vid);
917f109539SScott Feldman 	return err;
927f109539SScott Feldman }
937f109539SScott Feldman 
942594e906SNikolay Aleksandrov static void __vlan_add_list(struct net_bridge_vlan *v)
95243a2e63SVlad Yasevich {
96907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
972594e906SNikolay Aleksandrov 	struct list_head *headp, *hpos;
982594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vent;
99243a2e63SVlad Yasevich 
100907b1e6eSNikolay Aleksandrov 	if (br_vlan_is_master(v))
101907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(v->br);
102907b1e6eSNikolay Aleksandrov 	else
103907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(v->port);
104907b1e6eSNikolay Aleksandrov 
105907b1e6eSNikolay Aleksandrov 	headp = &vg->vlan_list;
1062594e906SNikolay Aleksandrov 	list_for_each_prev(hpos, headp) {
1072594e906SNikolay Aleksandrov 		vent = list_entry(hpos, struct net_bridge_vlan, vlist);
1082594e906SNikolay Aleksandrov 		if (v->vid < vent->vid)
1092594e906SNikolay Aleksandrov 			continue;
1102594e906SNikolay Aleksandrov 		else
1112594e906SNikolay Aleksandrov 			break;
1122594e906SNikolay Aleksandrov 	}
113586c2b57SNikolay Aleksandrov 	list_add_rcu(&v->vlist, hpos);
114552406c4SVlad Yasevich }
115243a2e63SVlad Yasevich 
1162594e906SNikolay Aleksandrov static void __vlan_del_list(struct net_bridge_vlan *v)
1172594e906SNikolay Aleksandrov {
118586c2b57SNikolay Aleksandrov 	list_del_rcu(&v->vlist);
119243a2e63SVlad Yasevich }
120243a2e63SVlad Yasevich 
121bf361ad3SVivien Didelot static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br,
1227f109539SScott Feldman 			  u16 vid)
1237f109539SScott Feldman {
1248f24f309SJiri Pirko 	struct switchdev_obj_port_vlan v = {
1256ff64f6fSIdo Schimmel 		.obj.orig_dev = dev,
1269e8f4a54SJiri Pirko 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
1273e3a78b4SScott Feldman 		.vid_begin = vid,
1287f109539SScott Feldman 		.vid_end = vid,
1297f109539SScott Feldman 	};
1300944d6b5SJiri Pirko 	int err;
1317f109539SScott Feldman 
1320944d6b5SJiri Pirko 	/* Try switchdev op first. In case it is not supported, fallback to
1330944d6b5SJiri Pirko 	 * 8021q del.
1340944d6b5SJiri Pirko 	 */
1359e8f4a54SJiri Pirko 	err = switchdev_port_obj_del(dev, &v.obj);
1360944d6b5SJiri Pirko 	if (err == -EOPNOTSUPP) {
1370944d6b5SJiri Pirko 		vlan_vid_del(dev, br->vlan_proto, vid);
1380944d6b5SJiri Pirko 		return 0;
1397f109539SScott Feldman 	}
140bf361ad3SVivien Didelot 	return err;
1417f109539SScott Feldman }
1427f109539SScott Feldman 
143f8ed289fSNikolay Aleksandrov /* Returns a master vlan, if it didn't exist it gets created. In all cases a
144f8ed289fSNikolay Aleksandrov  * a reference is taken to the master vlan before returning.
145f8ed289fSNikolay Aleksandrov  */
146f8ed289fSNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_get_master(struct net_bridge *br, u16 vid)
147f8ed289fSNikolay Aleksandrov {
148907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
149f8ed289fSNikolay Aleksandrov 	struct net_bridge_vlan *masterv;
150f8ed289fSNikolay Aleksandrov 
151907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
152907b1e6eSNikolay Aleksandrov 	masterv = br_vlan_find(vg, vid);
153f8ed289fSNikolay Aleksandrov 	if (!masterv) {
154f8ed289fSNikolay Aleksandrov 		/* missing global ctx, create it now */
155f8ed289fSNikolay Aleksandrov 		if (br_vlan_add(br, vid, 0))
156f8ed289fSNikolay Aleksandrov 			return NULL;
157907b1e6eSNikolay Aleksandrov 		masterv = br_vlan_find(vg, vid);
158f8ed289fSNikolay Aleksandrov 		if (WARN_ON(!masterv))
159f8ed289fSNikolay Aleksandrov 			return NULL;
160f8ed289fSNikolay Aleksandrov 	}
161f8ed289fSNikolay Aleksandrov 	atomic_inc(&masterv->refcnt);
162f8ed289fSNikolay Aleksandrov 
163f8ed289fSNikolay Aleksandrov 	return masterv;
164f8ed289fSNikolay Aleksandrov }
165f8ed289fSNikolay Aleksandrov 
1666dada9b1SNikolay Aleksandrov static void br_master_vlan_rcu_free(struct rcu_head *rcu)
1676dada9b1SNikolay Aleksandrov {
1686dada9b1SNikolay Aleksandrov 	struct net_bridge_vlan *v;
1696dada9b1SNikolay Aleksandrov 
1706dada9b1SNikolay Aleksandrov 	v = container_of(rcu, struct net_bridge_vlan, rcu);
1716dada9b1SNikolay Aleksandrov 	WARN_ON(!br_vlan_is_master(v));
1726dada9b1SNikolay Aleksandrov 	free_percpu(v->stats);
1736dada9b1SNikolay Aleksandrov 	v->stats = NULL;
1746dada9b1SNikolay Aleksandrov 	kfree(v);
1756dada9b1SNikolay Aleksandrov }
1766dada9b1SNikolay Aleksandrov 
177f8ed289fSNikolay Aleksandrov static void br_vlan_put_master(struct net_bridge_vlan *masterv)
178f8ed289fSNikolay Aleksandrov {
179907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
180907b1e6eSNikolay Aleksandrov 
181f8ed289fSNikolay Aleksandrov 	if (!br_vlan_is_master(masterv))
182f8ed289fSNikolay Aleksandrov 		return;
183f8ed289fSNikolay Aleksandrov 
184907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(masterv->br);
185f8ed289fSNikolay Aleksandrov 	if (atomic_dec_and_test(&masterv->refcnt)) {
186907b1e6eSNikolay Aleksandrov 		rhashtable_remove_fast(&vg->vlan_hash,
187f8ed289fSNikolay Aleksandrov 				       &masterv->vnode, br_vlan_rht_params);
188f8ed289fSNikolay Aleksandrov 		__vlan_del_list(masterv);
1896dada9b1SNikolay Aleksandrov 		call_rcu(&masterv->rcu, br_master_vlan_rcu_free);
190f8ed289fSNikolay Aleksandrov 	}
191f8ed289fSNikolay Aleksandrov }
192f8ed289fSNikolay Aleksandrov 
1932594e906SNikolay Aleksandrov /* This is the shared VLAN add function which works for both ports and bridge
1942594e906SNikolay Aleksandrov  * devices. There are four possible calls to this function in terms of the
1952594e906SNikolay Aleksandrov  * vlan entry type:
1962594e906SNikolay Aleksandrov  * 1. vlan is being added on a port (no master flags, global entry exists)
197ddd611d3SIdo Schimmel  * 2. vlan is being added on a bridge (both master and brentry flags)
1982594e906SNikolay Aleksandrov  * 3. vlan is being added on a port, but a global entry didn't exist which
199ddd611d3SIdo Schimmel  *    is being created right now (master flag set, brentry flag unset), the
2002594e906SNikolay Aleksandrov  *    global entry is used for global per-vlan features, but not for filtering
201ddd611d3SIdo Schimmel  * 4. same as 3 but with both master and brentry flags set so the entry
2022594e906SNikolay Aleksandrov  *    will be used for filtering in both the port and the bridge
2032594e906SNikolay Aleksandrov  */
2042594e906SNikolay Aleksandrov static int __vlan_add(struct net_bridge_vlan *v, u16 flags)
205243a2e63SVlad Yasevich {
2062594e906SNikolay Aleksandrov 	struct net_bridge_vlan *masterv = NULL;
2072594e906SNikolay Aleksandrov 	struct net_bridge_port *p = NULL;
2086be144f6SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
2092594e906SNikolay Aleksandrov 	struct net_device *dev;
2102594e906SNikolay Aleksandrov 	struct net_bridge *br;
211bf361ad3SVivien Didelot 	int err;
212bf361ad3SVivien Didelot 
2132594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
2142594e906SNikolay Aleksandrov 		br = v->br;
2152594e906SNikolay Aleksandrov 		dev = br->dev;
216907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(br);
2172594e906SNikolay Aleksandrov 	} else {
2182594e906SNikolay Aleksandrov 		p = v->port;
2192594e906SNikolay Aleksandrov 		br = p->br;
2202594e906SNikolay Aleksandrov 		dev = p->dev;
221907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
2222594e906SNikolay Aleksandrov 	}
2232594e906SNikolay Aleksandrov 
2242594e906SNikolay Aleksandrov 	if (p) {
2252594e906SNikolay Aleksandrov 		/* Add VLAN to the device filter if it is supported.
2262594e906SNikolay Aleksandrov 		 * This ensures tagged traffic enters the bridge when
2272594e906SNikolay Aleksandrov 		 * promiscuous mode is disabled by br_manage_promisc().
2282594e906SNikolay Aleksandrov 		 */
2292594e906SNikolay Aleksandrov 		err = __vlan_vid_add(dev, br, v->vid, flags);
230bf361ad3SVivien Didelot 		if (err)
2312594e906SNikolay Aleksandrov 			goto out;
2322594e906SNikolay Aleksandrov 
2332594e906SNikolay Aleksandrov 		/* need to work on the master vlan too */
2342594e906SNikolay Aleksandrov 		if (flags & BRIDGE_VLAN_INFO_MASTER) {
2352ffdf508SNikolay Aleksandrov 			err = br_vlan_add(br, v->vid, flags |
2362ffdf508SNikolay Aleksandrov 						      BRIDGE_VLAN_INFO_BRENTRY);
2372594e906SNikolay Aleksandrov 			if (err)
2382594e906SNikolay Aleksandrov 				goto out_filt;
2392594e906SNikolay Aleksandrov 		}
2402594e906SNikolay Aleksandrov 
241f8ed289fSNikolay Aleksandrov 		masterv = br_vlan_get_master(br, v->vid);
242f8ed289fSNikolay Aleksandrov 		if (!masterv)
2432594e906SNikolay Aleksandrov 			goto out_filt;
2442594e906SNikolay Aleksandrov 		v->brvlan = masterv;
2456dada9b1SNikolay Aleksandrov 		v->stats = masterv->stats;
2462594e906SNikolay Aleksandrov 	}
2472594e906SNikolay Aleksandrov 
2486be144f6SNikolay Aleksandrov 	/* Add the dev mac and count the vlan only if it's usable */
2492594e906SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
2502594e906SNikolay Aleksandrov 		err = br_fdb_insert(br, p, dev->dev_addr, v->vid);
2512594e906SNikolay Aleksandrov 		if (err) {
2522594e906SNikolay Aleksandrov 			br_err(br, "failed insert local address into bridge forwarding table\n");
2532594e906SNikolay Aleksandrov 			goto out_filt;
2542594e906SNikolay Aleksandrov 		}
2556be144f6SNikolay Aleksandrov 		vg->num_vlans++;
2562594e906SNikolay Aleksandrov 	}
2572594e906SNikolay Aleksandrov 
2586be144f6SNikolay Aleksandrov 	err = rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode,
2596be144f6SNikolay Aleksandrov 					    br_vlan_rht_params);
2602594e906SNikolay Aleksandrov 	if (err)
2612594e906SNikolay Aleksandrov 		goto out_fdb_insert;
2622594e906SNikolay Aleksandrov 
2632594e906SNikolay Aleksandrov 	__vlan_add_list(v);
2642594e906SNikolay Aleksandrov 	__vlan_add_flags(v, flags);
2652594e906SNikolay Aleksandrov out:
2662594e906SNikolay Aleksandrov 	return err;
2672594e906SNikolay Aleksandrov 
2682594e906SNikolay Aleksandrov out_fdb_insert:
2696be144f6SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
2706be144f6SNikolay Aleksandrov 		br_fdb_find_delete_local(br, p, dev->dev_addr, v->vid);
2716be144f6SNikolay Aleksandrov 		vg->num_vlans--;
2726be144f6SNikolay Aleksandrov 	}
2732594e906SNikolay Aleksandrov 
2742594e906SNikolay Aleksandrov out_filt:
2752594e906SNikolay Aleksandrov 	if (p) {
2762594e906SNikolay Aleksandrov 		__vlan_vid_del(dev, br, v->vid);
2772594e906SNikolay Aleksandrov 		if (masterv) {
278f8ed289fSNikolay Aleksandrov 			br_vlan_put_master(masterv);
2792594e906SNikolay Aleksandrov 			v->brvlan = NULL;
2802594e906SNikolay Aleksandrov 		}
2812594e906SNikolay Aleksandrov 	}
2822594e906SNikolay Aleksandrov 
2832594e906SNikolay Aleksandrov 	goto out;
2842594e906SNikolay Aleksandrov }
2852594e906SNikolay Aleksandrov 
2862594e906SNikolay Aleksandrov static int __vlan_del(struct net_bridge_vlan *v)
2872594e906SNikolay Aleksandrov {
2882594e906SNikolay Aleksandrov 	struct net_bridge_vlan *masterv = v;
28977751ee8SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
2902594e906SNikolay Aleksandrov 	struct net_bridge_port *p = NULL;
2912594e906SNikolay Aleksandrov 	int err = 0;
2922594e906SNikolay Aleksandrov 
2932594e906SNikolay Aleksandrov 	if (br_vlan_is_master(v)) {
294907b1e6eSNikolay Aleksandrov 		vg = br_vlan_group(v->br);
2952594e906SNikolay Aleksandrov 	} else {
2962594e906SNikolay Aleksandrov 		p = v->port;
297907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(v->port);
2982594e906SNikolay Aleksandrov 		masterv = v->brvlan;
2992594e906SNikolay Aleksandrov 	}
3002594e906SNikolay Aleksandrov 
30177751ee8SNikolay Aleksandrov 	__vlan_delete_pvid(vg, v->vid);
3022594e906SNikolay Aleksandrov 	if (p) {
3032594e906SNikolay Aleksandrov 		err = __vlan_vid_del(p->dev, p->br, v->vid);
3042594e906SNikolay Aleksandrov 		if (err)
3052594e906SNikolay Aleksandrov 			goto out;
3062594e906SNikolay Aleksandrov 	}
3072594e906SNikolay Aleksandrov 
3086be144f6SNikolay Aleksandrov 	if (br_vlan_should_use(v)) {
3092594e906SNikolay Aleksandrov 		v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY;
3106be144f6SNikolay Aleksandrov 		vg->num_vlans--;
3112594e906SNikolay Aleksandrov 	}
3122594e906SNikolay Aleksandrov 
3132594e906SNikolay Aleksandrov 	if (masterv != v) {
314efa5356bSRoopa Prabhu 		vlan_tunnel_info_del(vg, v);
31577751ee8SNikolay Aleksandrov 		rhashtable_remove_fast(&vg->vlan_hash, &v->vnode,
31677751ee8SNikolay Aleksandrov 				       br_vlan_rht_params);
3172594e906SNikolay Aleksandrov 		__vlan_del_list(v);
3182594e906SNikolay Aleksandrov 		kfree_rcu(v, rcu);
3192594e906SNikolay Aleksandrov 	}
3202594e906SNikolay Aleksandrov 
321f8ed289fSNikolay Aleksandrov 	br_vlan_put_master(masterv);
3222594e906SNikolay Aleksandrov out:
323bf361ad3SVivien Didelot 	return err;
3248580e211SToshiaki Makita }
325243a2e63SVlad Yasevich 
326f409d0edSNikolay Aleksandrov static void __vlan_group_free(struct net_bridge_vlan_group *vg)
327f409d0edSNikolay Aleksandrov {
328f409d0edSNikolay Aleksandrov 	WARN_ON(!list_empty(&vg->vlan_list));
329f409d0edSNikolay Aleksandrov 	rhashtable_destroy(&vg->vlan_hash);
330efa5356bSRoopa Prabhu 	vlan_tunnel_deinit(vg);
331f409d0edSNikolay Aleksandrov 	kfree(vg);
332f409d0edSNikolay Aleksandrov }
333f409d0edSNikolay Aleksandrov 
334f409d0edSNikolay Aleksandrov static void __vlan_flush(struct net_bridge_vlan_group *vg)
335243a2e63SVlad Yasevich {
3362594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan, *tmp;
3372594e906SNikolay Aleksandrov 
338f409d0edSNikolay Aleksandrov 	__vlan_delete_pvid(vg, vg->pvid);
339f409d0edSNikolay Aleksandrov 	list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist)
3402594e906SNikolay Aleksandrov 		__vlan_del(vlan);
341243a2e63SVlad Yasevich }
342243a2e63SVlad Yasevich 
34378851988SVlad Yasevich struct sk_buff *br_handle_vlan(struct net_bridge *br,
3442594e906SNikolay Aleksandrov 			       struct net_bridge_vlan_group *vg,
345a37b85c9SVlad Yasevich 			       struct sk_buff *skb)
346a37b85c9SVlad Yasevich {
3476dada9b1SNikolay Aleksandrov 	struct br_vlan_stats *stats;
3482594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
349a37b85c9SVlad Yasevich 	u16 vid;
350a37b85c9SVlad Yasevich 
35120adfa1aSVlad Yasevich 	/* If this packet was not filtered at input, let it pass */
35220adfa1aSVlad Yasevich 	if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
35378851988SVlad Yasevich 		goto out;
35478851988SVlad Yasevich 
3552594e906SNikolay Aleksandrov 	/* At this point, we know that the frame was filtered and contains
3562594e906SNikolay Aleksandrov 	 * a valid vlan id.  If the vlan id has untagged flag set,
3572594e906SNikolay Aleksandrov 	 * send untagged; otherwise, send tagged.
3582594e906SNikolay Aleksandrov 	 */
3592594e906SNikolay Aleksandrov 	br_vlan_get_tag(skb, &vid);
3602594e906SNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
3612594e906SNikolay Aleksandrov 	/* Vlan entry must be configured at this point.  The
362fc92f745SVlad Yasevich 	 * only exception is the bridge is set in promisc mode and the
363fc92f745SVlad Yasevich 	 * packet is destined for the bridge device.  In this case
364fc92f745SVlad Yasevich 	 * pass the packet as is.
365fc92f745SVlad Yasevich 	 */
3662594e906SNikolay Aleksandrov 	if (!v || !br_vlan_should_use(v)) {
367fc92f745SVlad Yasevich 		if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
368fc92f745SVlad Yasevich 			goto out;
369fc92f745SVlad Yasevich 		} else {
370fc92f745SVlad Yasevich 			kfree_skb(skb);
371fc92f745SVlad Yasevich 			return NULL;
372fc92f745SVlad Yasevich 		}
373fc92f745SVlad Yasevich 	}
3746dada9b1SNikolay Aleksandrov 	if (br->vlan_stats_enabled) {
3756dada9b1SNikolay Aleksandrov 		stats = this_cpu_ptr(v->stats);
3766dada9b1SNikolay Aleksandrov 		u64_stats_update_begin(&stats->syncp);
3776dada9b1SNikolay Aleksandrov 		stats->tx_bytes += skb->len;
3786dada9b1SNikolay Aleksandrov 		stats->tx_packets++;
3796dada9b1SNikolay Aleksandrov 		u64_stats_update_end(&stats->syncp);
3806dada9b1SNikolay Aleksandrov 	}
3816dada9b1SNikolay Aleksandrov 
3822594e906SNikolay Aleksandrov 	if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)
38399b192daSToshiaki Makita 		skb->vlan_tci = 0;
38478851988SVlad Yasevich out:
38578851988SVlad Yasevich 	return skb;
38678851988SVlad Yasevich }
38778851988SVlad Yasevich 
38878851988SVlad Yasevich /* Called under RCU */
3896dada9b1SNikolay Aleksandrov static bool __allowed_ingress(const struct net_bridge *br,
3906dada9b1SNikolay Aleksandrov 			      struct net_bridge_vlan_group *vg,
39178851988SVlad Yasevich 			      struct sk_buff *skb, u16 *vid)
39278851988SVlad Yasevich {
3936dada9b1SNikolay Aleksandrov 	struct br_vlan_stats *stats;
3946dada9b1SNikolay Aleksandrov 	struct net_bridge_vlan *v;
3958580e211SToshiaki Makita 	bool tagged;
396a37b85c9SVlad Yasevich 
39720adfa1aSVlad Yasevich 	BR_INPUT_SKB_CB(skb)->vlan_filtered = true;
39812464bb8SToshiaki Makita 	/* If vlan tx offload is disabled on bridge device and frame was
39912464bb8SToshiaki Makita 	 * sent from vlan device on the bridge device, it does not have
40012464bb8SToshiaki Makita 	 * HW accelerated vlan tag.
40112464bb8SToshiaki Makita 	 */
402df8a39deSJiri Pirko 	if (unlikely(!skb_vlan_tag_present(skb) &&
4036dada9b1SNikolay Aleksandrov 		     skb->protocol == br->vlan_proto)) {
4040d5501c1SVlad Yasevich 		skb = skb_vlan_untag(skb);
40512464bb8SToshiaki Makita 		if (unlikely(!skb))
40612464bb8SToshiaki Makita 			return false;
40712464bb8SToshiaki Makita 	}
40812464bb8SToshiaki Makita 
4098580e211SToshiaki Makita 	if (!br_vlan_get_tag(skb, vid)) {
4108580e211SToshiaki Makita 		/* Tagged frame */
4116dada9b1SNikolay Aleksandrov 		if (skb->vlan_proto != br->vlan_proto) {
4128580e211SToshiaki Makita 			/* Protocol-mismatch, empty out vlan_tci for new tag */
4138580e211SToshiaki Makita 			skb_push(skb, ETH_HLEN);
41462749e2cSJiri Pirko 			skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto,
415df8a39deSJiri Pirko 							skb_vlan_tag_get(skb));
4168580e211SToshiaki Makita 			if (unlikely(!skb))
4178580e211SToshiaki Makita 				return false;
4188580e211SToshiaki Makita 
4198580e211SToshiaki Makita 			skb_pull(skb, ETH_HLEN);
4208580e211SToshiaki Makita 			skb_reset_mac_len(skb);
4218580e211SToshiaki Makita 			*vid = 0;
4228580e211SToshiaki Makita 			tagged = false;
4238580e211SToshiaki Makita 		} else {
4248580e211SToshiaki Makita 			tagged = true;
4258580e211SToshiaki Makita 		}
4268580e211SToshiaki Makita 	} else {
4278580e211SToshiaki Makita 		/* Untagged frame */
4288580e211SToshiaki Makita 		tagged = false;
4298580e211SToshiaki Makita 	}
4308580e211SToshiaki Makita 
431b90356ceSToshiaki Makita 	if (!*vid) {
43277751ee8SNikolay Aleksandrov 		u16 pvid = br_get_pvid(vg);
43377751ee8SNikolay Aleksandrov 
434b90356ceSToshiaki Makita 		/* Frame had a tag with VID 0 or did not have a tag.
435b90356ceSToshiaki Makita 		 * See if pvid is set on this port.  That tells us which
436b90356ceSToshiaki Makita 		 * vlan untagged or priority-tagged traffic belongs to.
43778851988SVlad Yasevich 		 */
4383df6bf45SVlad Yasevich 		if (!pvid)
439eb707618SToshiaki Makita 			goto drop;
44078851988SVlad Yasevich 
441b90356ceSToshiaki Makita 		/* PVID is set on this port.  Any untagged or priority-tagged
442b90356ceSToshiaki Makita 		 * ingress frame is considered to belong to this vlan.
44378851988SVlad Yasevich 		 */
444dfb5fa32SToshiaki Makita 		*vid = pvid;
4458580e211SToshiaki Makita 		if (likely(!tagged))
446b90356ceSToshiaki Makita 			/* Untagged Frame. */
4476dada9b1SNikolay Aleksandrov 			__vlan_hwaccel_put_tag(skb, br->vlan_proto, pvid);
448b90356ceSToshiaki Makita 		else
449b90356ceSToshiaki Makita 			/* Priority-tagged Frame.
450b90356ceSToshiaki Makita 			 * At this point, We know that skb->vlan_tci had
451b90356ceSToshiaki Makita 			 * VLAN_TAG_PRESENT bit and its VID field was 0x000.
452b90356ceSToshiaki Makita 			 * We update only VID field and preserve PCP field.
453b90356ceSToshiaki Makita 			 */
454b90356ceSToshiaki Makita 			skb->vlan_tci |= pvid;
455b90356ceSToshiaki Makita 
4566dada9b1SNikolay Aleksandrov 		/* if stats are disabled we can avoid the lookup */
4576dada9b1SNikolay Aleksandrov 		if (!br->vlan_stats_enabled)
45878851988SVlad Yasevich 			return true;
45978851988SVlad Yasevich 	}
46077751ee8SNikolay Aleksandrov 	v = br_vlan_find(vg, *vid);
4616dada9b1SNikolay Aleksandrov 	if (!v || !br_vlan_should_use(v))
4626dada9b1SNikolay Aleksandrov 		goto drop;
4636dada9b1SNikolay Aleksandrov 
4646dada9b1SNikolay Aleksandrov 	if (br->vlan_stats_enabled) {
4656dada9b1SNikolay Aleksandrov 		stats = this_cpu_ptr(v->stats);
4666dada9b1SNikolay Aleksandrov 		u64_stats_update_begin(&stats->syncp);
4676dada9b1SNikolay Aleksandrov 		stats->rx_bytes += skb->len;
4686dada9b1SNikolay Aleksandrov 		stats->rx_packets++;
4696dada9b1SNikolay Aleksandrov 		u64_stats_update_end(&stats->syncp);
4706dada9b1SNikolay Aleksandrov 	}
4716dada9b1SNikolay Aleksandrov 
472a37b85c9SVlad Yasevich 	return true;
4736dada9b1SNikolay Aleksandrov 
474eb707618SToshiaki Makita drop:
475eb707618SToshiaki Makita 	kfree_skb(skb);
476a37b85c9SVlad Yasevich 	return false;
477a37b85c9SVlad Yasevich }
478a37b85c9SVlad Yasevich 
47977751ee8SNikolay Aleksandrov bool br_allowed_ingress(const struct net_bridge *br,
48077751ee8SNikolay Aleksandrov 			struct net_bridge_vlan_group *vg, struct sk_buff *skb,
4812594e906SNikolay Aleksandrov 			u16 *vid)
4822594e906SNikolay Aleksandrov {
4832594e906SNikolay Aleksandrov 	/* If VLAN filtering is disabled on the bridge, all packets are
4842594e906SNikolay Aleksandrov 	 * permitted.
4852594e906SNikolay Aleksandrov 	 */
4862594e906SNikolay Aleksandrov 	if (!br->vlan_enabled) {
4872594e906SNikolay Aleksandrov 		BR_INPUT_SKB_CB(skb)->vlan_filtered = false;
4882594e906SNikolay Aleksandrov 		return true;
4892594e906SNikolay Aleksandrov 	}
4902594e906SNikolay Aleksandrov 
4916dada9b1SNikolay Aleksandrov 	return __allowed_ingress(br, vg, skb, vid);
4922594e906SNikolay Aleksandrov }
4932594e906SNikolay Aleksandrov 
49485f46c6bSVlad Yasevich /* Called under RCU. */
4952594e906SNikolay Aleksandrov bool br_allowed_egress(struct net_bridge_vlan_group *vg,
49685f46c6bSVlad Yasevich 		       const struct sk_buff *skb)
49785f46c6bSVlad Yasevich {
4982594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *v;
49985f46c6bSVlad Yasevich 	u16 vid;
50085f46c6bSVlad Yasevich 
50120adfa1aSVlad Yasevich 	/* If this packet was not filtered at input, let it pass */
50220adfa1aSVlad Yasevich 	if (!BR_INPUT_SKB_CB(skb)->vlan_filtered)
50385f46c6bSVlad Yasevich 		return true;
50485f46c6bSVlad Yasevich 
50585f46c6bSVlad Yasevich 	br_vlan_get_tag(skb, &vid);
5062594e906SNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
5072594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v))
50885f46c6bSVlad Yasevich 		return true;
50985f46c6bSVlad Yasevich 
51085f46c6bSVlad Yasevich 	return false;
51185f46c6bSVlad Yasevich }
51285f46c6bSVlad Yasevich 
513e0d7968aSToshiaki Makita /* Called under RCU */
514e0d7968aSToshiaki Makita bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
515e0d7968aSToshiaki Makita {
516468e7944SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
517e0d7968aSToshiaki Makita 	struct net_bridge *br = p->br;
518e0d7968aSToshiaki Makita 
51920adfa1aSVlad Yasevich 	/* If filtering was disabled at input, let it pass. */
520c095f248SVlad Yasevich 	if (!br->vlan_enabled)
521e0d7968aSToshiaki Makita 		return true;
522e0d7968aSToshiaki Makita 
523eca1e006SIdo Schimmel 	vg = nbp_vlan_group_rcu(p);
524468e7944SNikolay Aleksandrov 	if (!vg || !vg->num_vlans)
525e0d7968aSToshiaki Makita 		return false;
526e0d7968aSToshiaki Makita 
5278580e211SToshiaki Makita 	if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
5288580e211SToshiaki Makita 		*vid = 0;
5298580e211SToshiaki Makita 
530e0d7968aSToshiaki Makita 	if (!*vid) {
53177751ee8SNikolay Aleksandrov 		*vid = br_get_pvid(vg);
5323df6bf45SVlad Yasevich 		if (!*vid)
533e0d7968aSToshiaki Makita 			return false;
534e0d7968aSToshiaki Makita 
535e0d7968aSToshiaki Makita 		return true;
536e0d7968aSToshiaki Makita 	}
537e0d7968aSToshiaki Makita 
53877751ee8SNikolay Aleksandrov 	if (br_vlan_find(vg, *vid))
539e0d7968aSToshiaki Makita 		return true;
540e0d7968aSToshiaki Makita 
541e0d7968aSToshiaki Makita 	return false;
542e0d7968aSToshiaki Makita }
543e0d7968aSToshiaki Makita 
5448adff41cSToshiaki Makita /* Must be protected by RTNL.
5458adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
5468adff41cSToshiaki Makita  */
547552406c4SVlad Yasevich int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
548243a2e63SVlad Yasevich {
549907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
5502594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
5512594e906SNikolay Aleksandrov 	int ret;
552243a2e63SVlad Yasevich 
553243a2e63SVlad Yasevich 	ASSERT_RTNL();
554243a2e63SVlad Yasevich 
555907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
556907b1e6eSNikolay Aleksandrov 	vlan = br_vlan_find(vg, vid);
5572594e906SNikolay Aleksandrov 	if (vlan) {
5582594e906SNikolay Aleksandrov 		if (!br_vlan_is_brentry(vlan)) {
5592594e906SNikolay Aleksandrov 			/* Trying to change flags of non-existent bridge vlan */
5602594e906SNikolay Aleksandrov 			if (!(flags & BRIDGE_VLAN_INFO_BRENTRY))
5612594e906SNikolay Aleksandrov 				return -EINVAL;
5622594e906SNikolay Aleksandrov 			/* It was only kept for port vlans, now make it real */
5632594e906SNikolay Aleksandrov 			ret = br_fdb_insert(br, NULL, br->dev->dev_addr,
5642594e906SNikolay Aleksandrov 					    vlan->vid);
5652594e906SNikolay Aleksandrov 			if (ret) {
5662594e906SNikolay Aleksandrov 				br_err(br, "failed insert local address into bridge forwarding table\n");
5672594e906SNikolay Aleksandrov 				return ret;
5682594e906SNikolay Aleksandrov 			}
5692594e906SNikolay Aleksandrov 			atomic_inc(&vlan->refcnt);
5702594e906SNikolay Aleksandrov 			vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY;
571907b1e6eSNikolay Aleksandrov 			vg->num_vlans++;
5722594e906SNikolay Aleksandrov 		}
5732594e906SNikolay Aleksandrov 		__vlan_add_flags(vlan, flags);
5742594e906SNikolay Aleksandrov 		return 0;
5752594e906SNikolay Aleksandrov 	}
576243a2e63SVlad Yasevich 
5772594e906SNikolay Aleksandrov 	vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
5782594e906SNikolay Aleksandrov 	if (!vlan)
579243a2e63SVlad Yasevich 		return -ENOMEM;
580243a2e63SVlad Yasevich 
5816dada9b1SNikolay Aleksandrov 	vlan->stats = netdev_alloc_pcpu_stats(struct br_vlan_stats);
5826dada9b1SNikolay Aleksandrov 	if (!vlan->stats) {
5836dada9b1SNikolay Aleksandrov 		kfree(vlan);
5846dada9b1SNikolay Aleksandrov 		return -ENOMEM;
5856dada9b1SNikolay Aleksandrov 	}
5862594e906SNikolay Aleksandrov 	vlan->vid = vid;
5872594e906SNikolay Aleksandrov 	vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER;
5882594e906SNikolay Aleksandrov 	vlan->flags &= ~BRIDGE_VLAN_INFO_PVID;
5892594e906SNikolay Aleksandrov 	vlan->br = br;
5902594e906SNikolay Aleksandrov 	if (flags & BRIDGE_VLAN_INFO_BRENTRY)
5912594e906SNikolay Aleksandrov 		atomic_set(&vlan->refcnt, 1);
5922594e906SNikolay Aleksandrov 	ret = __vlan_add(vlan, flags);
5936dada9b1SNikolay Aleksandrov 	if (ret) {
5946dada9b1SNikolay Aleksandrov 		free_percpu(vlan->stats);
5952594e906SNikolay Aleksandrov 		kfree(vlan);
5966dada9b1SNikolay Aleksandrov 	}
597243a2e63SVlad Yasevich 
5982594e906SNikolay Aleksandrov 	return ret;
599243a2e63SVlad Yasevich }
600243a2e63SVlad Yasevich 
6018adff41cSToshiaki Makita /* Must be protected by RTNL.
6028adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
6038adff41cSToshiaki Makita  */
604243a2e63SVlad Yasevich int br_vlan_delete(struct net_bridge *br, u16 vid)
605243a2e63SVlad Yasevich {
606907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
6072594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
608243a2e63SVlad Yasevich 
609243a2e63SVlad Yasevich 	ASSERT_RTNL();
610243a2e63SVlad Yasevich 
611907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
612907b1e6eSNikolay Aleksandrov 	v = br_vlan_find(vg, vid);
6132594e906SNikolay Aleksandrov 	if (!v || !br_vlan_is_brentry(v))
6142594e906SNikolay Aleksandrov 		return -ENOENT;
615243a2e63SVlad Yasevich 
616424bb9c9SToshiaki Makita 	br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
6173741873bSRoopa Prabhu 	br_fdb_delete_by_port(br, NULL, vid, 0);
618bc9a25d2SVlad Yasevich 
619efa5356bSRoopa Prabhu 	vlan_tunnel_info_del(vg, v);
620efa5356bSRoopa Prabhu 
6212594e906SNikolay Aleksandrov 	return __vlan_del(v);
622243a2e63SVlad Yasevich }
623243a2e63SVlad Yasevich 
624243a2e63SVlad Yasevich void br_vlan_flush(struct net_bridge *br)
625243a2e63SVlad Yasevich {
626f409d0edSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
627f409d0edSNikolay Aleksandrov 
628243a2e63SVlad Yasevich 	ASSERT_RTNL();
629243a2e63SVlad Yasevich 
630f409d0edSNikolay Aleksandrov 	vg = br_vlan_group(br);
631f409d0edSNikolay Aleksandrov 	__vlan_flush(vg);
632f409d0edSNikolay Aleksandrov 	RCU_INIT_POINTER(br->vlgrp, NULL);
633f409d0edSNikolay Aleksandrov 	synchronize_rcu();
634f409d0edSNikolay Aleksandrov 	__vlan_group_free(vg);
635243a2e63SVlad Yasevich }
636243a2e63SVlad Yasevich 
6372594e906SNikolay Aleksandrov struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid)
6382b292fb4SToshiaki Makita {
6392594e906SNikolay Aleksandrov 	if (!vg)
6402594e906SNikolay Aleksandrov 		return NULL;
6412b292fb4SToshiaki Makita 
6422594e906SNikolay Aleksandrov 	return br_vlan_lookup(&vg->vlan_hash, vid);
6432b292fb4SToshiaki Makita }
6442b292fb4SToshiaki Makita 
645204177f3SToshiaki Makita /* Must be protected by RTNL. */
646204177f3SToshiaki Makita static void recalculate_group_addr(struct net_bridge *br)
647204177f3SToshiaki Makita {
648204177f3SToshiaki Makita 	if (br->group_addr_set)
649204177f3SToshiaki Makita 		return;
650204177f3SToshiaki Makita 
651204177f3SToshiaki Makita 	spin_lock_bh(&br->lock);
652204177f3SToshiaki Makita 	if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
653204177f3SToshiaki Makita 		/* Bridge Group Address */
654204177f3SToshiaki Makita 		br->group_addr[5] = 0x00;
655204177f3SToshiaki Makita 	} else { /* vlan_enabled && ETH_P_8021AD */
656204177f3SToshiaki Makita 		/* Provider Bridge Group Address */
657204177f3SToshiaki Makita 		br->group_addr[5] = 0x08;
658204177f3SToshiaki Makita 	}
659204177f3SToshiaki Makita 	spin_unlock_bh(&br->lock);
660204177f3SToshiaki Makita }
661204177f3SToshiaki Makita 
662204177f3SToshiaki Makita /* Must be protected by RTNL. */
663204177f3SToshiaki Makita void br_recalculate_fwd_mask(struct net_bridge *br)
664204177f3SToshiaki Makita {
665204177f3SToshiaki Makita 	if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
666204177f3SToshiaki Makita 		br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
667204177f3SToshiaki Makita 	else /* vlan_enabled && ETH_P_8021AD */
668204177f3SToshiaki Makita 		br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
669204177f3SToshiaki Makita 					      ~(1u << br->group_addr[5]);
670204177f3SToshiaki Makita }
671204177f3SToshiaki Makita 
672a7854037SNikolay Aleksandrov int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
673243a2e63SVlad Yasevich {
6746b72a770SElad Raz 	struct switchdev_attr attr = {
6756b72a770SElad Raz 		.orig_dev = br->dev,
6766b72a770SElad Raz 		.id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING,
6776b72a770SElad Raz 		.flags = SWITCHDEV_F_SKIP_EOPNOTSUPP,
6786b72a770SElad Raz 		.u.vlan_filtering = val,
6796b72a770SElad Raz 	};
6806b72a770SElad Raz 	int err;
6816b72a770SElad Raz 
682243a2e63SVlad Yasevich 	if (br->vlan_enabled == val)
683a7854037SNikolay Aleksandrov 		return 0;
684243a2e63SVlad Yasevich 
6856b72a770SElad Raz 	err = switchdev_port_attr_set(br->dev, &attr);
6866b72a770SElad Raz 	if (err && err != -EOPNOTSUPP)
6876b72a770SElad Raz 		return err;
6886b72a770SElad Raz 
689243a2e63SVlad Yasevich 	br->vlan_enabled = val;
6902796d0c6SVlad Yasevich 	br_manage_promisc(br);
691204177f3SToshiaki Makita 	recalculate_group_addr(br);
692204177f3SToshiaki Makita 	br_recalculate_fwd_mask(br);
693243a2e63SVlad Yasevich 
694a7854037SNikolay Aleksandrov 	return 0;
695a7854037SNikolay Aleksandrov }
696a7854037SNikolay Aleksandrov 
697a7854037SNikolay Aleksandrov int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
698a7854037SNikolay Aleksandrov {
699047831a9SXin Long 	return __br_vlan_filter_toggle(br, val);
700243a2e63SVlad Yasevich }
701243a2e63SVlad Yasevich 
702d2d427b3SToshiaki Makita int __br_vlan_set_proto(struct net_bridge *br, __be16 proto)
703204177f3SToshiaki Makita {
704204177f3SToshiaki Makita 	int err = 0;
705204177f3SToshiaki Makita 	struct net_bridge_port *p;
7062594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
707907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
708d2d427b3SToshiaki Makita 	__be16 oldproto;
709204177f3SToshiaki Makita 
710204177f3SToshiaki Makita 	if (br->vlan_proto == proto)
711d2d427b3SToshiaki Makita 		return 0;
712204177f3SToshiaki Makita 
713204177f3SToshiaki Makita 	/* Add VLANs for the new proto to the device filter. */
714204177f3SToshiaki Makita 	list_for_each_entry(p, &br->port_list, list) {
715907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
716907b1e6eSNikolay Aleksandrov 		list_for_each_entry(vlan, &vg->vlan_list, vlist) {
7172594e906SNikolay Aleksandrov 			err = vlan_vid_add(p->dev, proto, vlan->vid);
718204177f3SToshiaki Makita 			if (err)
719204177f3SToshiaki Makita 				goto err_filt;
720204177f3SToshiaki Makita 		}
721204177f3SToshiaki Makita 	}
722204177f3SToshiaki Makita 
723204177f3SToshiaki Makita 	oldproto = br->vlan_proto;
724204177f3SToshiaki Makita 	br->vlan_proto = proto;
725204177f3SToshiaki Makita 
726204177f3SToshiaki Makita 	recalculate_group_addr(br);
727204177f3SToshiaki Makita 	br_recalculate_fwd_mask(br);
728204177f3SToshiaki Makita 
729204177f3SToshiaki Makita 	/* Delete VLANs for the old proto from the device filter. */
730907b1e6eSNikolay Aleksandrov 	list_for_each_entry(p, &br->port_list, list) {
731907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
732907b1e6eSNikolay Aleksandrov 		list_for_each_entry(vlan, &vg->vlan_list, vlist)
7332594e906SNikolay Aleksandrov 			vlan_vid_del(p->dev, oldproto, vlan->vid);
734907b1e6eSNikolay Aleksandrov 	}
735204177f3SToshiaki Makita 
736d2d427b3SToshiaki Makita 	return 0;
737204177f3SToshiaki Makita 
738204177f3SToshiaki Makita err_filt:
739907b1e6eSNikolay Aleksandrov 	list_for_each_entry_continue_reverse(vlan, &vg->vlan_list, vlist)
7402594e906SNikolay Aleksandrov 		vlan_vid_del(p->dev, proto, vlan->vid);
741204177f3SToshiaki Makita 
742907b1e6eSNikolay Aleksandrov 	list_for_each_entry_continue_reverse(p, &br->port_list, list) {
743907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
744907b1e6eSNikolay Aleksandrov 		list_for_each_entry(vlan, &vg->vlan_list, vlist)
7452594e906SNikolay Aleksandrov 			vlan_vid_del(p->dev, proto, vlan->vid);
746907b1e6eSNikolay Aleksandrov 	}
747204177f3SToshiaki Makita 
748d2d427b3SToshiaki Makita 	return err;
749d2d427b3SToshiaki Makita }
750d2d427b3SToshiaki Makita 
751d2d427b3SToshiaki Makita int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
752d2d427b3SToshiaki Makita {
753d2d427b3SToshiaki Makita 	if (val != ETH_P_8021Q && val != ETH_P_8021AD)
754d2d427b3SToshiaki Makita 		return -EPROTONOSUPPORT;
755d2d427b3SToshiaki Makita 
756047831a9SXin Long 	return __br_vlan_set_proto(br, htons(val));
757204177f3SToshiaki Makita }
758204177f3SToshiaki Makita 
7596dada9b1SNikolay Aleksandrov int br_vlan_set_stats(struct net_bridge *br, unsigned long val)
7606dada9b1SNikolay Aleksandrov {
7616dada9b1SNikolay Aleksandrov 	switch (val) {
7626dada9b1SNikolay Aleksandrov 	case 0:
7636dada9b1SNikolay Aleksandrov 	case 1:
7646dada9b1SNikolay Aleksandrov 		br->vlan_stats_enabled = val;
7656dada9b1SNikolay Aleksandrov 		break;
7666dada9b1SNikolay Aleksandrov 	default:
7676dada9b1SNikolay Aleksandrov 		return -EINVAL;
7686dada9b1SNikolay Aleksandrov 	}
7696dada9b1SNikolay Aleksandrov 
7706dada9b1SNikolay Aleksandrov 	return 0;
7716dada9b1SNikolay Aleksandrov }
7726dada9b1SNikolay Aleksandrov 
77377751ee8SNikolay Aleksandrov static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 vid)
7745be5a2dfSVlad Yasevich {
7752594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
7762594e906SNikolay Aleksandrov 
77777751ee8SNikolay Aleksandrov 	if (vid != vg->pvid)
7782594e906SNikolay Aleksandrov 		return false;
7792594e906SNikolay Aleksandrov 
7802594e906SNikolay Aleksandrov 	v = br_vlan_lookup(&vg->vlan_hash, vid);
7812594e906SNikolay Aleksandrov 	if (v && br_vlan_should_use(v) &&
7822594e906SNikolay Aleksandrov 	    (v->flags & BRIDGE_VLAN_INFO_UNTAGGED))
7832594e906SNikolay Aleksandrov 		return true;
7842594e906SNikolay Aleksandrov 
7852594e906SNikolay Aleksandrov 	return false;
7865be5a2dfSVlad Yasevich }
7875be5a2dfSVlad Yasevich 
7885be5a2dfSVlad Yasevich static void br_vlan_disable_default_pvid(struct net_bridge *br)
7895be5a2dfSVlad Yasevich {
7905be5a2dfSVlad Yasevich 	struct net_bridge_port *p;
7915be5a2dfSVlad Yasevich 	u16 pvid = br->default_pvid;
7925be5a2dfSVlad Yasevich 
7935be5a2dfSVlad Yasevich 	/* Disable default_pvid on all ports where it is still
7945be5a2dfSVlad Yasevich 	 * configured.
7955be5a2dfSVlad Yasevich 	 */
796907b1e6eSNikolay Aleksandrov 	if (vlan_default_pvid(br_vlan_group(br), pvid))
7975be5a2dfSVlad Yasevich 		br_vlan_delete(br, pvid);
7985be5a2dfSVlad Yasevich 
7995be5a2dfSVlad Yasevich 	list_for_each_entry(p, &br->port_list, list) {
800907b1e6eSNikolay Aleksandrov 		if (vlan_default_pvid(nbp_vlan_group(p), pvid))
8015be5a2dfSVlad Yasevich 			nbp_vlan_delete(p, pvid);
8025be5a2dfSVlad Yasevich 	}
8035be5a2dfSVlad Yasevich 
8045be5a2dfSVlad Yasevich 	br->default_pvid = 0;
8055be5a2dfSVlad Yasevich }
8065be5a2dfSVlad Yasevich 
8070f963b75SNikolay Aleksandrov int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid)
8085be5a2dfSVlad Yasevich {
8092594e906SNikolay Aleksandrov 	const struct net_bridge_vlan *pvent;
810907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
8115be5a2dfSVlad Yasevich 	struct net_bridge_port *p;
8125be5a2dfSVlad Yasevich 	u16 old_pvid;
8135be5a2dfSVlad Yasevich 	int err = 0;
8145be5a2dfSVlad Yasevich 	unsigned long *changed;
8155be5a2dfSVlad Yasevich 
8160f963b75SNikolay Aleksandrov 	if (!pvid) {
8170f963b75SNikolay Aleksandrov 		br_vlan_disable_default_pvid(br);
8180f963b75SNikolay Aleksandrov 		return 0;
8190f963b75SNikolay Aleksandrov 	}
8200f963b75SNikolay Aleksandrov 
8215be5a2dfSVlad Yasevich 	changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long),
8225be5a2dfSVlad Yasevich 			  GFP_KERNEL);
8235be5a2dfSVlad Yasevich 	if (!changed)
8245be5a2dfSVlad Yasevich 		return -ENOMEM;
8255be5a2dfSVlad Yasevich 
8265be5a2dfSVlad Yasevich 	old_pvid = br->default_pvid;
8275be5a2dfSVlad Yasevich 
8285be5a2dfSVlad Yasevich 	/* Update default_pvid config only if we do not conflict with
8295be5a2dfSVlad Yasevich 	 * user configuration.
8305be5a2dfSVlad Yasevich 	 */
831907b1e6eSNikolay Aleksandrov 	vg = br_vlan_group(br);
832907b1e6eSNikolay Aleksandrov 	pvent = br_vlan_find(vg, pvid);
833907b1e6eSNikolay Aleksandrov 	if ((!old_pvid || vlan_default_pvid(vg, old_pvid)) &&
8342594e906SNikolay Aleksandrov 	    (!pvent || !br_vlan_should_use(pvent))) {
8355be5a2dfSVlad Yasevich 		err = br_vlan_add(br, pvid,
8365be5a2dfSVlad Yasevich 				  BRIDGE_VLAN_INFO_PVID |
8372594e906SNikolay Aleksandrov 				  BRIDGE_VLAN_INFO_UNTAGGED |
8382594e906SNikolay Aleksandrov 				  BRIDGE_VLAN_INFO_BRENTRY);
8395be5a2dfSVlad Yasevich 		if (err)
8405be5a2dfSVlad Yasevich 			goto out;
8415be5a2dfSVlad Yasevich 		br_vlan_delete(br, old_pvid);
8425be5a2dfSVlad Yasevich 		set_bit(0, changed);
8435be5a2dfSVlad Yasevich 	}
8445be5a2dfSVlad Yasevich 
8455be5a2dfSVlad Yasevich 	list_for_each_entry(p, &br->port_list, list) {
8465be5a2dfSVlad Yasevich 		/* Update default_pvid config only if we do not conflict with
8475be5a2dfSVlad Yasevich 		 * user configuration.
8485be5a2dfSVlad Yasevich 		 */
849907b1e6eSNikolay Aleksandrov 		vg = nbp_vlan_group(p);
8505be5a2dfSVlad Yasevich 		if ((old_pvid &&
851907b1e6eSNikolay Aleksandrov 		     !vlan_default_pvid(vg, old_pvid)) ||
852907b1e6eSNikolay Aleksandrov 		    br_vlan_find(vg, pvid))
8535be5a2dfSVlad Yasevich 			continue;
8545be5a2dfSVlad Yasevich 
8555be5a2dfSVlad Yasevich 		err = nbp_vlan_add(p, pvid,
8565be5a2dfSVlad Yasevich 				   BRIDGE_VLAN_INFO_PVID |
8575be5a2dfSVlad Yasevich 				   BRIDGE_VLAN_INFO_UNTAGGED);
8585be5a2dfSVlad Yasevich 		if (err)
8595be5a2dfSVlad Yasevich 			goto err_port;
8605be5a2dfSVlad Yasevich 		nbp_vlan_delete(p, old_pvid);
8615be5a2dfSVlad Yasevich 		set_bit(p->port_no, changed);
8625be5a2dfSVlad Yasevich 	}
8635be5a2dfSVlad Yasevich 
8645be5a2dfSVlad Yasevich 	br->default_pvid = pvid;
8655be5a2dfSVlad Yasevich 
8665be5a2dfSVlad Yasevich out:
8675be5a2dfSVlad Yasevich 	kfree(changed);
8685be5a2dfSVlad Yasevich 	return err;
8695be5a2dfSVlad Yasevich 
8705be5a2dfSVlad Yasevich err_port:
8715be5a2dfSVlad Yasevich 	list_for_each_entry_continue_reverse(p, &br->port_list, list) {
8725be5a2dfSVlad Yasevich 		if (!test_bit(p->port_no, changed))
8735be5a2dfSVlad Yasevich 			continue;
8745be5a2dfSVlad Yasevich 
8755be5a2dfSVlad Yasevich 		if (old_pvid)
8765be5a2dfSVlad Yasevich 			nbp_vlan_add(p, old_pvid,
8775be5a2dfSVlad Yasevich 				     BRIDGE_VLAN_INFO_PVID |
8785be5a2dfSVlad Yasevich 				     BRIDGE_VLAN_INFO_UNTAGGED);
8795be5a2dfSVlad Yasevich 		nbp_vlan_delete(p, pvid);
8805be5a2dfSVlad Yasevich 	}
8815be5a2dfSVlad Yasevich 
8825be5a2dfSVlad Yasevich 	if (test_bit(0, changed)) {
8835be5a2dfSVlad Yasevich 		if (old_pvid)
8845be5a2dfSVlad Yasevich 			br_vlan_add(br, old_pvid,
8855be5a2dfSVlad Yasevich 				    BRIDGE_VLAN_INFO_PVID |
8862594e906SNikolay Aleksandrov 				    BRIDGE_VLAN_INFO_UNTAGGED |
8872594e906SNikolay Aleksandrov 				    BRIDGE_VLAN_INFO_BRENTRY);
8885be5a2dfSVlad Yasevich 		br_vlan_delete(br, pvid);
8895be5a2dfSVlad Yasevich 	}
8905be5a2dfSVlad Yasevich 	goto out;
8915be5a2dfSVlad Yasevich }
8925be5a2dfSVlad Yasevich 
89396a20d9dSVlad Yasevich int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val)
89496a20d9dSVlad Yasevich {
89596a20d9dSVlad Yasevich 	u16 pvid = val;
89696a20d9dSVlad Yasevich 	int err = 0;
89796a20d9dSVlad Yasevich 
8985be5a2dfSVlad Yasevich 	if (val >= VLAN_VID_MASK)
89996a20d9dSVlad Yasevich 		return -EINVAL;
90096a20d9dSVlad Yasevich 
90196a20d9dSVlad Yasevich 	if (pvid == br->default_pvid)
902047831a9SXin Long 		goto out;
90396a20d9dSVlad Yasevich 
90496a20d9dSVlad Yasevich 	/* Only allow default pvid change when filtering is disabled */
90596a20d9dSVlad Yasevich 	if (br->vlan_enabled) {
90696a20d9dSVlad Yasevich 		pr_info_once("Please disable vlan filtering to change default_pvid\n");
90796a20d9dSVlad Yasevich 		err = -EPERM;
908047831a9SXin Long 		goto out;
90996a20d9dSVlad Yasevich 	}
9105be5a2dfSVlad Yasevich 	err = __br_vlan_set_default_pvid(br, pvid);
911047831a9SXin Long out:
91296a20d9dSVlad Yasevich 	return err;
91396a20d9dSVlad Yasevich }
91496a20d9dSVlad Yasevich 
9155be5a2dfSVlad Yasevich int br_vlan_init(struct net_bridge *br)
9168580e211SToshiaki Makita {
917907b1e6eSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
9182594e906SNikolay Aleksandrov 	int ret = -ENOMEM;
9192594e906SNikolay Aleksandrov 
920907b1e6eSNikolay Aleksandrov 	vg = kzalloc(sizeof(*vg), GFP_KERNEL);
921907b1e6eSNikolay Aleksandrov 	if (!vg)
9222594e906SNikolay Aleksandrov 		goto out;
923907b1e6eSNikolay Aleksandrov 	ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params);
9242594e906SNikolay Aleksandrov 	if (ret)
9252594e906SNikolay Aleksandrov 		goto err_rhtbl;
926efa5356bSRoopa Prabhu 	ret = vlan_tunnel_init(vg);
927efa5356bSRoopa Prabhu 	if (ret)
928efa5356bSRoopa Prabhu 		goto err_tunnel_init;
929907b1e6eSNikolay Aleksandrov 	INIT_LIST_HEAD(&vg->vlan_list);
9308580e211SToshiaki Makita 	br->vlan_proto = htons(ETH_P_8021Q);
93196a20d9dSVlad Yasevich 	br->default_pvid = 1;
932907b1e6eSNikolay Aleksandrov 	rcu_assign_pointer(br->vlgrp, vg);
9332594e906SNikolay Aleksandrov 	ret = br_vlan_add(br, 1,
9342594e906SNikolay Aleksandrov 			  BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED |
9352594e906SNikolay Aleksandrov 			  BRIDGE_VLAN_INFO_BRENTRY);
9362594e906SNikolay Aleksandrov 	if (ret)
9372594e906SNikolay Aleksandrov 		goto err_vlan_add;
9382594e906SNikolay Aleksandrov 
9392594e906SNikolay Aleksandrov out:
9402594e906SNikolay Aleksandrov 	return ret;
9412594e906SNikolay Aleksandrov 
9422594e906SNikolay Aleksandrov err_vlan_add:
943efa5356bSRoopa Prabhu 	vlan_tunnel_deinit(vg);
944efa5356bSRoopa Prabhu err_tunnel_init:
945907b1e6eSNikolay Aleksandrov 	rhashtable_destroy(&vg->vlan_hash);
9462594e906SNikolay Aleksandrov err_rhtbl:
947907b1e6eSNikolay Aleksandrov 	kfree(vg);
9482594e906SNikolay Aleksandrov 
9492594e906SNikolay Aleksandrov 	goto out;
9502594e906SNikolay Aleksandrov }
9512594e906SNikolay Aleksandrov 
9522594e906SNikolay Aleksandrov int nbp_vlan_init(struct net_bridge_port *p)
9532594e906SNikolay Aleksandrov {
954404cdbf0SElad Raz 	struct switchdev_attr attr = {
955404cdbf0SElad Raz 		.orig_dev = p->br->dev,
956404cdbf0SElad Raz 		.id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING,
957404cdbf0SElad Raz 		.flags = SWITCHDEV_F_SKIP_EOPNOTSUPP,
958404cdbf0SElad Raz 		.u.vlan_filtering = p->br->vlan_enabled,
959404cdbf0SElad Raz 	};
960263344e6SNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
9612594e906SNikolay Aleksandrov 	int ret = -ENOMEM;
9622594e906SNikolay Aleksandrov 
963263344e6SNikolay Aleksandrov 	vg = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL);
964263344e6SNikolay Aleksandrov 	if (!vg)
9652594e906SNikolay Aleksandrov 		goto out;
9662594e906SNikolay Aleksandrov 
967404cdbf0SElad Raz 	ret = switchdev_port_attr_set(p->dev, &attr);
968404cdbf0SElad Raz 	if (ret && ret != -EOPNOTSUPP)
969404cdbf0SElad Raz 		goto err_vlan_enabled;
970404cdbf0SElad Raz 
971263344e6SNikolay Aleksandrov 	ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params);
9722594e906SNikolay Aleksandrov 	if (ret)
9732594e906SNikolay Aleksandrov 		goto err_rhtbl;
974efa5356bSRoopa Prabhu 	ret = vlan_tunnel_init(vg);
975efa5356bSRoopa Prabhu 	if (ret)
976efa5356bSRoopa Prabhu 		goto err_tunnel_init;
977263344e6SNikolay Aleksandrov 	INIT_LIST_HEAD(&vg->vlan_list);
978907b1e6eSNikolay Aleksandrov 	rcu_assign_pointer(p->vlgrp, vg);
9792594e906SNikolay Aleksandrov 	if (p->br->default_pvid) {
9802594e906SNikolay Aleksandrov 		ret = nbp_vlan_add(p, p->br->default_pvid,
9812594e906SNikolay Aleksandrov 				   BRIDGE_VLAN_INFO_PVID |
9822594e906SNikolay Aleksandrov 				   BRIDGE_VLAN_INFO_UNTAGGED);
9832594e906SNikolay Aleksandrov 		if (ret)
9842594e906SNikolay Aleksandrov 			goto err_vlan_add;
9852594e906SNikolay Aleksandrov 	}
9862594e906SNikolay Aleksandrov out:
9872594e906SNikolay Aleksandrov 	return ret;
9882594e906SNikolay Aleksandrov 
9892594e906SNikolay Aleksandrov err_vlan_add:
99007bc588fSIdo Schimmel 	RCU_INIT_POINTER(p->vlgrp, NULL);
99107bc588fSIdo Schimmel 	synchronize_rcu();
992efa5356bSRoopa Prabhu 	vlan_tunnel_deinit(vg);
993404cdbf0SElad Raz err_vlan_enabled:
994efa5356bSRoopa Prabhu err_tunnel_init:
995efa5356bSRoopa Prabhu 	rhashtable_destroy(&vg->vlan_hash);
9962594e906SNikolay Aleksandrov err_rhtbl:
997263344e6SNikolay Aleksandrov 	kfree(vg);
9982594e906SNikolay Aleksandrov 
9992594e906SNikolay Aleksandrov 	goto out;
10008580e211SToshiaki Makita }
10018580e211SToshiaki Makita 
10028adff41cSToshiaki Makita /* Must be protected by RTNL.
10038adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
10048adff41cSToshiaki Makita  */
1005552406c4SVlad Yasevich int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
1006243a2e63SVlad Yasevich {
10077fbac984SIdo Schimmel 	struct switchdev_obj_port_vlan v = {
10087fbac984SIdo Schimmel 		.obj.orig_dev = port->dev,
10097fbac984SIdo Schimmel 		.obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN,
10107fbac984SIdo Schimmel 		.flags = flags,
10117fbac984SIdo Schimmel 		.vid_begin = vid,
10127fbac984SIdo Schimmel 		.vid_end = vid,
10137fbac984SIdo Schimmel 	};
10142594e906SNikolay Aleksandrov 	struct net_bridge_vlan *vlan;
10152594e906SNikolay Aleksandrov 	int ret;
1016243a2e63SVlad Yasevich 
1017243a2e63SVlad Yasevich 	ASSERT_RTNL();
1018243a2e63SVlad Yasevich 
1019907b1e6eSNikolay Aleksandrov 	vlan = br_vlan_find(nbp_vlan_group(port), vid);
10202594e906SNikolay Aleksandrov 	if (vlan) {
10217fbac984SIdo Schimmel 		/* Pass the flags to the hardware bridge */
10227fbac984SIdo Schimmel 		ret = switchdev_port_obj_add(port->dev, &v.obj);
10237fbac984SIdo Schimmel 		if (ret && ret != -EOPNOTSUPP)
10247fbac984SIdo Schimmel 			return ret;
10252594e906SNikolay Aleksandrov 		__vlan_add_flags(vlan, flags);
10262594e906SNikolay Aleksandrov 		return 0;
1027243a2e63SVlad Yasevich 	}
1028243a2e63SVlad Yasevich 
10292594e906SNikolay Aleksandrov 	vlan = kzalloc(sizeof(*vlan), GFP_KERNEL);
10302594e906SNikolay Aleksandrov 	if (!vlan)
10312594e906SNikolay Aleksandrov 		return -ENOMEM;
1032243a2e63SVlad Yasevich 
10332594e906SNikolay Aleksandrov 	vlan->vid = vid;
10342594e906SNikolay Aleksandrov 	vlan->port = port;
10352594e906SNikolay Aleksandrov 	ret = __vlan_add(vlan, flags);
10362594e906SNikolay Aleksandrov 	if (ret)
10372594e906SNikolay Aleksandrov 		kfree(vlan);
1038243a2e63SVlad Yasevich 
10392594e906SNikolay Aleksandrov 	return ret;
1040243a2e63SVlad Yasevich }
1041243a2e63SVlad Yasevich 
10428adff41cSToshiaki Makita /* Must be protected by RTNL.
10438adff41cSToshiaki Makita  * Must be called with vid in range from 1 to 4094 inclusive.
10448adff41cSToshiaki Makita  */
1045243a2e63SVlad Yasevich int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
1046243a2e63SVlad Yasevich {
10472594e906SNikolay Aleksandrov 	struct net_bridge_vlan *v;
1048243a2e63SVlad Yasevich 
1049243a2e63SVlad Yasevich 	ASSERT_RTNL();
1050243a2e63SVlad Yasevich 
1051907b1e6eSNikolay Aleksandrov 	v = br_vlan_find(nbp_vlan_group(port), vid);
10522594e906SNikolay Aleksandrov 	if (!v)
10532594e906SNikolay Aleksandrov 		return -ENOENT;
1054424bb9c9SToshiaki Makita 	br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
10551ea2d020SNikolay Aleksandrov 	br_fdb_delete_by_port(port->br, port, vid, 0);
1056bc9a25d2SVlad Yasevich 
10572594e906SNikolay Aleksandrov 	return __vlan_del(v);
1058243a2e63SVlad Yasevich }
1059243a2e63SVlad Yasevich 
1060243a2e63SVlad Yasevich void nbp_vlan_flush(struct net_bridge_port *port)
1061243a2e63SVlad Yasevich {
1062f409d0edSNikolay Aleksandrov 	struct net_bridge_vlan_group *vg;
1063f409d0edSNikolay Aleksandrov 
1064243a2e63SVlad Yasevich 	ASSERT_RTNL();
1065243a2e63SVlad Yasevich 
1066f409d0edSNikolay Aleksandrov 	vg = nbp_vlan_group(port);
1067f409d0edSNikolay Aleksandrov 	__vlan_flush(vg);
1068f409d0edSNikolay Aleksandrov 	RCU_INIT_POINTER(port->vlgrp, NULL);
1069f409d0edSNikolay Aleksandrov 	synchronize_rcu();
1070f409d0edSNikolay Aleksandrov 	__vlan_group_free(vg);
10715be5a2dfSVlad Yasevich }
1072a60c0903SNikolay Aleksandrov 
1073a60c0903SNikolay Aleksandrov void br_vlan_get_stats(const struct net_bridge_vlan *v,
1074a60c0903SNikolay Aleksandrov 		       struct br_vlan_stats *stats)
1075a60c0903SNikolay Aleksandrov {
1076a60c0903SNikolay Aleksandrov 	int i;
1077a60c0903SNikolay Aleksandrov 
1078a60c0903SNikolay Aleksandrov 	memset(stats, 0, sizeof(*stats));
1079a60c0903SNikolay Aleksandrov 	for_each_possible_cpu(i) {
1080a60c0903SNikolay Aleksandrov 		u64 rxpackets, rxbytes, txpackets, txbytes;
1081a60c0903SNikolay Aleksandrov 		struct br_vlan_stats *cpu_stats;
1082a60c0903SNikolay Aleksandrov 		unsigned int start;
1083a60c0903SNikolay Aleksandrov 
1084a60c0903SNikolay Aleksandrov 		cpu_stats = per_cpu_ptr(v->stats, i);
1085a60c0903SNikolay Aleksandrov 		do {
1086a60c0903SNikolay Aleksandrov 			start = u64_stats_fetch_begin_irq(&cpu_stats->syncp);
1087a60c0903SNikolay Aleksandrov 			rxpackets = cpu_stats->rx_packets;
1088a60c0903SNikolay Aleksandrov 			rxbytes = cpu_stats->rx_bytes;
1089a60c0903SNikolay Aleksandrov 			txbytes = cpu_stats->tx_bytes;
1090a60c0903SNikolay Aleksandrov 			txpackets = cpu_stats->tx_packets;
1091a60c0903SNikolay Aleksandrov 		} while (u64_stats_fetch_retry_irq(&cpu_stats->syncp, start));
1092a60c0903SNikolay Aleksandrov 
1093a60c0903SNikolay Aleksandrov 		stats->rx_packets += rxpackets;
1094a60c0903SNikolay Aleksandrov 		stats->rx_bytes += rxbytes;
1095a60c0903SNikolay Aleksandrov 		stats->tx_bytes += txbytes;
1096a60c0903SNikolay Aleksandrov 		stats->tx_packets += txpackets;
1097a60c0903SNikolay Aleksandrov 	}
1098a60c0903SNikolay Aleksandrov }
1099