1243a2e63SVlad Yasevich #include <linux/kernel.h> 2243a2e63SVlad Yasevich #include <linux/netdevice.h> 3243a2e63SVlad Yasevich #include <linux/rtnetlink.h> 4243a2e63SVlad Yasevich #include <linux/slab.h> 57f109539SScott Feldman #include <net/switchdev.h> 6243a2e63SVlad Yasevich 7243a2e63SVlad Yasevich #include "br_private.h" 8efa5356bSRoopa Prabhu #include "br_private_tunnel.h" 9243a2e63SVlad Yasevich 102594e906SNikolay Aleksandrov static inline int br_vlan_cmp(struct rhashtable_compare_arg *arg, 112594e906SNikolay Aleksandrov const void *ptr) 12552406c4SVlad Yasevich { 132594e906SNikolay Aleksandrov const struct net_bridge_vlan *vle = ptr; 142594e906SNikolay Aleksandrov u16 vid = *(u16 *)arg->key; 152594e906SNikolay Aleksandrov 162594e906SNikolay Aleksandrov return vle->vid != vid; 172594e906SNikolay Aleksandrov } 182594e906SNikolay Aleksandrov 192594e906SNikolay Aleksandrov static const struct rhashtable_params br_vlan_rht_params = { 202594e906SNikolay Aleksandrov .head_offset = offsetof(struct net_bridge_vlan, vnode), 212594e906SNikolay Aleksandrov .key_offset = offsetof(struct net_bridge_vlan, vid), 222594e906SNikolay Aleksandrov .key_len = sizeof(u16), 238af78b64SNikolay Aleksandrov .nelem_hint = 3, 248af78b64SNikolay Aleksandrov .locks_mul = 1, 252594e906SNikolay Aleksandrov .max_size = VLAN_N_VID, 262594e906SNikolay Aleksandrov .obj_cmpfn = br_vlan_cmp, 272594e906SNikolay Aleksandrov .automatic_shrinking = true, 282594e906SNikolay Aleksandrov }; 292594e906SNikolay Aleksandrov 302594e906SNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_lookup(struct rhashtable *tbl, u16 vid) 312594e906SNikolay Aleksandrov { 322594e906SNikolay Aleksandrov return rhashtable_lookup_fast(tbl, &vid, br_vlan_rht_params); 332594e906SNikolay Aleksandrov } 342594e906SNikolay Aleksandrov 3577751ee8SNikolay Aleksandrov static void __vlan_add_pvid(struct net_bridge_vlan_group *vg, u16 vid) 362594e906SNikolay Aleksandrov { 3777751ee8SNikolay Aleksandrov if (vg->pvid == vid) 38552406c4SVlad Yasevich return; 39552406c4SVlad Yasevich 40552406c4SVlad Yasevich smp_wmb(); 4177751ee8SNikolay Aleksandrov vg->pvid = vid; 42552406c4SVlad Yasevich } 43552406c4SVlad Yasevich 4477751ee8SNikolay Aleksandrov static void __vlan_delete_pvid(struct net_bridge_vlan_group *vg, u16 vid) 45552406c4SVlad Yasevich { 4677751ee8SNikolay Aleksandrov if (vg->pvid != vid) 47552406c4SVlad Yasevich return; 48552406c4SVlad Yasevich 49552406c4SVlad Yasevich smp_wmb(); 5077751ee8SNikolay Aleksandrov vg->pvid = 0; 51552406c4SVlad Yasevich } 52552406c4SVlad Yasevich 532594e906SNikolay Aleksandrov static void __vlan_add_flags(struct net_bridge_vlan *v, u16 flags) 5435e03f3aSVlad Yasevich { 5577751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 5677751ee8SNikolay Aleksandrov 572594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) 58907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 59635126b7SVlad Yasevich else 60907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 6177751ee8SNikolay Aleksandrov 6277751ee8SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_PVID) 6377751ee8SNikolay Aleksandrov __vlan_add_pvid(vg, v->vid); 642594e906SNikolay Aleksandrov else 6577751ee8SNikolay Aleksandrov __vlan_delete_pvid(vg, v->vid); 6635e03f3aSVlad Yasevich 6735e03f3aSVlad Yasevich if (flags & BRIDGE_VLAN_INFO_UNTAGGED) 682594e906SNikolay Aleksandrov v->flags |= BRIDGE_VLAN_INFO_UNTAGGED; 69635126b7SVlad Yasevich else 702594e906SNikolay Aleksandrov v->flags &= ~BRIDGE_VLAN_INFO_UNTAGGED; 7135e03f3aSVlad Yasevich } 7235e03f3aSVlad Yasevich 737f109539SScott Feldman static int __vlan_vid_add(struct net_device *dev, struct net_bridge *br, 747f109539SScott Feldman u16 vid, u16 flags) 757f109539SScott Feldman { 768f24f309SJiri Pirko struct switchdev_obj_port_vlan v = { 776ff64f6fSIdo Schimmel .obj.orig_dev = dev, 789e8f4a54SJiri Pirko .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, 797f109539SScott Feldman .flags = flags, 803e3a78b4SScott Feldman .vid_begin = vid, 817f109539SScott Feldman .vid_end = vid, 827f109539SScott Feldman }; 830944d6b5SJiri Pirko int err; 847f109539SScott Feldman 850944d6b5SJiri Pirko /* Try switchdev op first. In case it is not supported, fallback to 860944d6b5SJiri Pirko * 8021q add. 870944d6b5SJiri Pirko */ 889e8f4a54SJiri Pirko err = switchdev_port_obj_add(dev, &v.obj); 897f109539SScott Feldman if (err == -EOPNOTSUPP) 900944d6b5SJiri Pirko return vlan_vid_add(dev, br->vlan_proto, vid); 917f109539SScott Feldman return err; 927f109539SScott Feldman } 937f109539SScott Feldman 942594e906SNikolay Aleksandrov static void __vlan_add_list(struct net_bridge_vlan *v) 95243a2e63SVlad Yasevich { 96907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 972594e906SNikolay Aleksandrov struct list_head *headp, *hpos; 982594e906SNikolay Aleksandrov struct net_bridge_vlan *vent; 99243a2e63SVlad Yasevich 100907b1e6eSNikolay Aleksandrov if (br_vlan_is_master(v)) 101907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 102907b1e6eSNikolay Aleksandrov else 103907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 104907b1e6eSNikolay Aleksandrov 105907b1e6eSNikolay Aleksandrov headp = &vg->vlan_list; 1062594e906SNikolay Aleksandrov list_for_each_prev(hpos, headp) { 1072594e906SNikolay Aleksandrov vent = list_entry(hpos, struct net_bridge_vlan, vlist); 1082594e906SNikolay Aleksandrov if (v->vid < vent->vid) 1092594e906SNikolay Aleksandrov continue; 1102594e906SNikolay Aleksandrov else 1112594e906SNikolay Aleksandrov break; 1122594e906SNikolay Aleksandrov } 113586c2b57SNikolay Aleksandrov list_add_rcu(&v->vlist, hpos); 114552406c4SVlad Yasevich } 115243a2e63SVlad Yasevich 1162594e906SNikolay Aleksandrov static void __vlan_del_list(struct net_bridge_vlan *v) 1172594e906SNikolay Aleksandrov { 118586c2b57SNikolay Aleksandrov list_del_rcu(&v->vlist); 119243a2e63SVlad Yasevich } 120243a2e63SVlad Yasevich 121bf361ad3SVivien Didelot static int __vlan_vid_del(struct net_device *dev, struct net_bridge *br, 1227f109539SScott Feldman u16 vid) 1237f109539SScott Feldman { 1248f24f309SJiri Pirko struct switchdev_obj_port_vlan v = { 1256ff64f6fSIdo Schimmel .obj.orig_dev = dev, 1269e8f4a54SJiri Pirko .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, 1273e3a78b4SScott Feldman .vid_begin = vid, 1287f109539SScott Feldman .vid_end = vid, 1297f109539SScott Feldman }; 1300944d6b5SJiri Pirko int err; 1317f109539SScott Feldman 1320944d6b5SJiri Pirko /* Try switchdev op first. In case it is not supported, fallback to 1330944d6b5SJiri Pirko * 8021q del. 1340944d6b5SJiri Pirko */ 1359e8f4a54SJiri Pirko err = switchdev_port_obj_del(dev, &v.obj); 1360944d6b5SJiri Pirko if (err == -EOPNOTSUPP) { 1370944d6b5SJiri Pirko vlan_vid_del(dev, br->vlan_proto, vid); 1380944d6b5SJiri Pirko return 0; 1397f109539SScott Feldman } 140bf361ad3SVivien Didelot return err; 1417f109539SScott Feldman } 1427f109539SScott Feldman 143f8ed289fSNikolay Aleksandrov /* Returns a master vlan, if it didn't exist it gets created. In all cases a 144f8ed289fSNikolay Aleksandrov * a reference is taken to the master vlan before returning. 145f8ed289fSNikolay Aleksandrov */ 146f8ed289fSNikolay Aleksandrov static struct net_bridge_vlan *br_vlan_get_master(struct net_bridge *br, u16 vid) 147f8ed289fSNikolay Aleksandrov { 148907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 149f8ed289fSNikolay Aleksandrov struct net_bridge_vlan *masterv; 150f8ed289fSNikolay Aleksandrov 151907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 152907b1e6eSNikolay Aleksandrov masterv = br_vlan_find(vg, vid); 153f8ed289fSNikolay Aleksandrov if (!masterv) { 154f8ed289fSNikolay Aleksandrov /* missing global ctx, create it now */ 155f8ed289fSNikolay Aleksandrov if (br_vlan_add(br, vid, 0)) 156f8ed289fSNikolay Aleksandrov return NULL; 157907b1e6eSNikolay Aleksandrov masterv = br_vlan_find(vg, vid); 158f8ed289fSNikolay Aleksandrov if (WARN_ON(!masterv)) 159f8ed289fSNikolay Aleksandrov return NULL; 160f8ed289fSNikolay Aleksandrov } 161f8ed289fSNikolay Aleksandrov atomic_inc(&masterv->refcnt); 162f8ed289fSNikolay Aleksandrov 163f8ed289fSNikolay Aleksandrov return masterv; 164f8ed289fSNikolay Aleksandrov } 165f8ed289fSNikolay Aleksandrov 1666dada9b1SNikolay Aleksandrov static void br_master_vlan_rcu_free(struct rcu_head *rcu) 1676dada9b1SNikolay Aleksandrov { 1686dada9b1SNikolay Aleksandrov struct net_bridge_vlan *v; 1696dada9b1SNikolay Aleksandrov 1706dada9b1SNikolay Aleksandrov v = container_of(rcu, struct net_bridge_vlan, rcu); 1716dada9b1SNikolay Aleksandrov WARN_ON(!br_vlan_is_master(v)); 1726dada9b1SNikolay Aleksandrov free_percpu(v->stats); 1736dada9b1SNikolay Aleksandrov v->stats = NULL; 1746dada9b1SNikolay Aleksandrov kfree(v); 1756dada9b1SNikolay Aleksandrov } 1766dada9b1SNikolay Aleksandrov 177f8ed289fSNikolay Aleksandrov static void br_vlan_put_master(struct net_bridge_vlan *masterv) 178f8ed289fSNikolay Aleksandrov { 179907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 180907b1e6eSNikolay Aleksandrov 181f8ed289fSNikolay Aleksandrov if (!br_vlan_is_master(masterv)) 182f8ed289fSNikolay Aleksandrov return; 183f8ed289fSNikolay Aleksandrov 184907b1e6eSNikolay Aleksandrov vg = br_vlan_group(masterv->br); 185f8ed289fSNikolay Aleksandrov if (atomic_dec_and_test(&masterv->refcnt)) { 186907b1e6eSNikolay Aleksandrov rhashtable_remove_fast(&vg->vlan_hash, 187f8ed289fSNikolay Aleksandrov &masterv->vnode, br_vlan_rht_params); 188f8ed289fSNikolay Aleksandrov __vlan_del_list(masterv); 1896dada9b1SNikolay Aleksandrov call_rcu(&masterv->rcu, br_master_vlan_rcu_free); 190f8ed289fSNikolay Aleksandrov } 191f8ed289fSNikolay Aleksandrov } 192f8ed289fSNikolay Aleksandrov 1932594e906SNikolay Aleksandrov /* This is the shared VLAN add function which works for both ports and bridge 1942594e906SNikolay Aleksandrov * devices. There are four possible calls to this function in terms of the 1952594e906SNikolay Aleksandrov * vlan entry type: 1962594e906SNikolay Aleksandrov * 1. vlan is being added on a port (no master flags, global entry exists) 197ddd611d3SIdo Schimmel * 2. vlan is being added on a bridge (both master and brentry flags) 1982594e906SNikolay Aleksandrov * 3. vlan is being added on a port, but a global entry didn't exist which 199ddd611d3SIdo Schimmel * is being created right now (master flag set, brentry flag unset), the 2002594e906SNikolay Aleksandrov * global entry is used for global per-vlan features, but not for filtering 201ddd611d3SIdo Schimmel * 4. same as 3 but with both master and brentry flags set so the entry 2022594e906SNikolay Aleksandrov * will be used for filtering in both the port and the bridge 2032594e906SNikolay Aleksandrov */ 2042594e906SNikolay Aleksandrov static int __vlan_add(struct net_bridge_vlan *v, u16 flags) 205243a2e63SVlad Yasevich { 2062594e906SNikolay Aleksandrov struct net_bridge_vlan *masterv = NULL; 2072594e906SNikolay Aleksandrov struct net_bridge_port *p = NULL; 2086be144f6SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 2092594e906SNikolay Aleksandrov struct net_device *dev; 2102594e906SNikolay Aleksandrov struct net_bridge *br; 211bf361ad3SVivien Didelot int err; 212bf361ad3SVivien Didelot 2132594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) { 2142594e906SNikolay Aleksandrov br = v->br; 2152594e906SNikolay Aleksandrov dev = br->dev; 216907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 2172594e906SNikolay Aleksandrov } else { 2182594e906SNikolay Aleksandrov p = v->port; 2192594e906SNikolay Aleksandrov br = p->br; 2202594e906SNikolay Aleksandrov dev = p->dev; 221907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 2222594e906SNikolay Aleksandrov } 2232594e906SNikolay Aleksandrov 2242594e906SNikolay Aleksandrov if (p) { 2252594e906SNikolay Aleksandrov /* Add VLAN to the device filter if it is supported. 2262594e906SNikolay Aleksandrov * This ensures tagged traffic enters the bridge when 2272594e906SNikolay Aleksandrov * promiscuous mode is disabled by br_manage_promisc(). 2282594e906SNikolay Aleksandrov */ 2292594e906SNikolay Aleksandrov err = __vlan_vid_add(dev, br, v->vid, flags); 230bf361ad3SVivien Didelot if (err) 2312594e906SNikolay Aleksandrov goto out; 2322594e906SNikolay Aleksandrov 2332594e906SNikolay Aleksandrov /* need to work on the master vlan too */ 2342594e906SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_MASTER) { 2352ffdf508SNikolay Aleksandrov err = br_vlan_add(br, v->vid, flags | 2362ffdf508SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY); 2372594e906SNikolay Aleksandrov if (err) 2382594e906SNikolay Aleksandrov goto out_filt; 2392594e906SNikolay Aleksandrov } 2402594e906SNikolay Aleksandrov 241f8ed289fSNikolay Aleksandrov masterv = br_vlan_get_master(br, v->vid); 242f8ed289fSNikolay Aleksandrov if (!masterv) 2432594e906SNikolay Aleksandrov goto out_filt; 2442594e906SNikolay Aleksandrov v->brvlan = masterv; 2456dada9b1SNikolay Aleksandrov v->stats = masterv->stats; 2462594e906SNikolay Aleksandrov } 2472594e906SNikolay Aleksandrov 2486be144f6SNikolay Aleksandrov /* Add the dev mac and count the vlan only if it's usable */ 2492594e906SNikolay Aleksandrov if (br_vlan_should_use(v)) { 2502594e906SNikolay Aleksandrov err = br_fdb_insert(br, p, dev->dev_addr, v->vid); 2512594e906SNikolay Aleksandrov if (err) { 2522594e906SNikolay Aleksandrov br_err(br, "failed insert local address into bridge forwarding table\n"); 2532594e906SNikolay Aleksandrov goto out_filt; 2542594e906SNikolay Aleksandrov } 2556be144f6SNikolay Aleksandrov vg->num_vlans++; 2562594e906SNikolay Aleksandrov } 2572594e906SNikolay Aleksandrov 2586be144f6SNikolay Aleksandrov err = rhashtable_lookup_insert_fast(&vg->vlan_hash, &v->vnode, 2596be144f6SNikolay Aleksandrov br_vlan_rht_params); 2602594e906SNikolay Aleksandrov if (err) 2612594e906SNikolay Aleksandrov goto out_fdb_insert; 2622594e906SNikolay Aleksandrov 2632594e906SNikolay Aleksandrov __vlan_add_list(v); 2642594e906SNikolay Aleksandrov __vlan_add_flags(v, flags); 2652594e906SNikolay Aleksandrov out: 2662594e906SNikolay Aleksandrov return err; 2672594e906SNikolay Aleksandrov 2682594e906SNikolay Aleksandrov out_fdb_insert: 2696be144f6SNikolay Aleksandrov if (br_vlan_should_use(v)) { 2706be144f6SNikolay Aleksandrov br_fdb_find_delete_local(br, p, dev->dev_addr, v->vid); 2716be144f6SNikolay Aleksandrov vg->num_vlans--; 2726be144f6SNikolay Aleksandrov } 2732594e906SNikolay Aleksandrov 2742594e906SNikolay Aleksandrov out_filt: 2752594e906SNikolay Aleksandrov if (p) { 2762594e906SNikolay Aleksandrov __vlan_vid_del(dev, br, v->vid); 2772594e906SNikolay Aleksandrov if (masterv) { 278f8ed289fSNikolay Aleksandrov br_vlan_put_master(masterv); 2792594e906SNikolay Aleksandrov v->brvlan = NULL; 2802594e906SNikolay Aleksandrov } 2812594e906SNikolay Aleksandrov } 2822594e906SNikolay Aleksandrov 2832594e906SNikolay Aleksandrov goto out; 2842594e906SNikolay Aleksandrov } 2852594e906SNikolay Aleksandrov 2862594e906SNikolay Aleksandrov static int __vlan_del(struct net_bridge_vlan *v) 2872594e906SNikolay Aleksandrov { 2882594e906SNikolay Aleksandrov struct net_bridge_vlan *masterv = v; 28977751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 2902594e906SNikolay Aleksandrov struct net_bridge_port *p = NULL; 2912594e906SNikolay Aleksandrov int err = 0; 2922594e906SNikolay Aleksandrov 2932594e906SNikolay Aleksandrov if (br_vlan_is_master(v)) { 294907b1e6eSNikolay Aleksandrov vg = br_vlan_group(v->br); 2952594e906SNikolay Aleksandrov } else { 2962594e906SNikolay Aleksandrov p = v->port; 297907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(v->port); 2982594e906SNikolay Aleksandrov masterv = v->brvlan; 2992594e906SNikolay Aleksandrov } 3002594e906SNikolay Aleksandrov 30177751ee8SNikolay Aleksandrov __vlan_delete_pvid(vg, v->vid); 3022594e906SNikolay Aleksandrov if (p) { 3032594e906SNikolay Aleksandrov err = __vlan_vid_del(p->dev, p->br, v->vid); 3042594e906SNikolay Aleksandrov if (err) 3052594e906SNikolay Aleksandrov goto out; 3062594e906SNikolay Aleksandrov } 3072594e906SNikolay Aleksandrov 3086be144f6SNikolay Aleksandrov if (br_vlan_should_use(v)) { 3092594e906SNikolay Aleksandrov v->flags &= ~BRIDGE_VLAN_INFO_BRENTRY; 3106be144f6SNikolay Aleksandrov vg->num_vlans--; 3112594e906SNikolay Aleksandrov } 3122594e906SNikolay Aleksandrov 3132594e906SNikolay Aleksandrov if (masterv != v) { 314efa5356bSRoopa Prabhu vlan_tunnel_info_del(vg, v); 31577751ee8SNikolay Aleksandrov rhashtable_remove_fast(&vg->vlan_hash, &v->vnode, 31677751ee8SNikolay Aleksandrov br_vlan_rht_params); 3172594e906SNikolay Aleksandrov __vlan_del_list(v); 3182594e906SNikolay Aleksandrov kfree_rcu(v, rcu); 3192594e906SNikolay Aleksandrov } 3202594e906SNikolay Aleksandrov 321f8ed289fSNikolay Aleksandrov br_vlan_put_master(masterv); 3222594e906SNikolay Aleksandrov out: 323bf361ad3SVivien Didelot return err; 3248580e211SToshiaki Makita } 325243a2e63SVlad Yasevich 326f409d0edSNikolay Aleksandrov static void __vlan_group_free(struct net_bridge_vlan_group *vg) 327f409d0edSNikolay Aleksandrov { 328f409d0edSNikolay Aleksandrov WARN_ON(!list_empty(&vg->vlan_list)); 329f409d0edSNikolay Aleksandrov rhashtable_destroy(&vg->vlan_hash); 330efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 331f409d0edSNikolay Aleksandrov kfree(vg); 332f409d0edSNikolay Aleksandrov } 333f409d0edSNikolay Aleksandrov 334f409d0edSNikolay Aleksandrov static void __vlan_flush(struct net_bridge_vlan_group *vg) 335243a2e63SVlad Yasevich { 3362594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan, *tmp; 3372594e906SNikolay Aleksandrov 338f409d0edSNikolay Aleksandrov __vlan_delete_pvid(vg, vg->pvid); 339f409d0edSNikolay Aleksandrov list_for_each_entry_safe(vlan, tmp, &vg->vlan_list, vlist) 3402594e906SNikolay Aleksandrov __vlan_del(vlan); 341243a2e63SVlad Yasevich } 342243a2e63SVlad Yasevich 34378851988SVlad Yasevich struct sk_buff *br_handle_vlan(struct net_bridge *br, 3442594e906SNikolay Aleksandrov struct net_bridge_vlan_group *vg, 345a37b85c9SVlad Yasevich struct sk_buff *skb) 346a37b85c9SVlad Yasevich { 3476dada9b1SNikolay Aleksandrov struct br_vlan_stats *stats; 3482594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 349a37b85c9SVlad Yasevich u16 vid; 350a37b85c9SVlad Yasevich 35120adfa1aSVlad Yasevich /* If this packet was not filtered at input, let it pass */ 35220adfa1aSVlad Yasevich if (!BR_INPUT_SKB_CB(skb)->vlan_filtered) 35378851988SVlad Yasevich goto out; 35478851988SVlad Yasevich 3552594e906SNikolay Aleksandrov /* At this point, we know that the frame was filtered and contains 3562594e906SNikolay Aleksandrov * a valid vlan id. If the vlan id has untagged flag set, 3572594e906SNikolay Aleksandrov * send untagged; otherwise, send tagged. 3582594e906SNikolay Aleksandrov */ 3592594e906SNikolay Aleksandrov br_vlan_get_tag(skb, &vid); 3602594e906SNikolay Aleksandrov v = br_vlan_find(vg, vid); 3612594e906SNikolay Aleksandrov /* Vlan entry must be configured at this point. The 362fc92f745SVlad Yasevich * only exception is the bridge is set in promisc mode and the 363fc92f745SVlad Yasevich * packet is destined for the bridge device. In this case 364fc92f745SVlad Yasevich * pass the packet as is. 365fc92f745SVlad Yasevich */ 3662594e906SNikolay Aleksandrov if (!v || !br_vlan_should_use(v)) { 367fc92f745SVlad Yasevich if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) { 368fc92f745SVlad Yasevich goto out; 369fc92f745SVlad Yasevich } else { 370fc92f745SVlad Yasevich kfree_skb(skb); 371fc92f745SVlad Yasevich return NULL; 372fc92f745SVlad Yasevich } 373fc92f745SVlad Yasevich } 3746dada9b1SNikolay Aleksandrov if (br->vlan_stats_enabled) { 3756dada9b1SNikolay Aleksandrov stats = this_cpu_ptr(v->stats); 3766dada9b1SNikolay Aleksandrov u64_stats_update_begin(&stats->syncp); 3776dada9b1SNikolay Aleksandrov stats->tx_bytes += skb->len; 3786dada9b1SNikolay Aleksandrov stats->tx_packets++; 3796dada9b1SNikolay Aleksandrov u64_stats_update_end(&stats->syncp); 3806dada9b1SNikolay Aleksandrov } 3816dada9b1SNikolay Aleksandrov 3822594e906SNikolay Aleksandrov if (v->flags & BRIDGE_VLAN_INFO_UNTAGGED) 38399b192daSToshiaki Makita skb->vlan_tci = 0; 38478851988SVlad Yasevich out: 38578851988SVlad Yasevich return skb; 38678851988SVlad Yasevich } 38778851988SVlad Yasevich 38878851988SVlad Yasevich /* Called under RCU */ 3896dada9b1SNikolay Aleksandrov static bool __allowed_ingress(const struct net_bridge *br, 3906dada9b1SNikolay Aleksandrov struct net_bridge_vlan_group *vg, 39178851988SVlad Yasevich struct sk_buff *skb, u16 *vid) 39278851988SVlad Yasevich { 3936dada9b1SNikolay Aleksandrov struct br_vlan_stats *stats; 3946dada9b1SNikolay Aleksandrov struct net_bridge_vlan *v; 3958580e211SToshiaki Makita bool tagged; 396a37b85c9SVlad Yasevich 39720adfa1aSVlad Yasevich BR_INPUT_SKB_CB(skb)->vlan_filtered = true; 39812464bb8SToshiaki Makita /* If vlan tx offload is disabled on bridge device and frame was 39912464bb8SToshiaki Makita * sent from vlan device on the bridge device, it does not have 40012464bb8SToshiaki Makita * HW accelerated vlan tag. 40112464bb8SToshiaki Makita */ 402df8a39deSJiri Pirko if (unlikely(!skb_vlan_tag_present(skb) && 4036dada9b1SNikolay Aleksandrov skb->protocol == br->vlan_proto)) { 4040d5501c1SVlad Yasevich skb = skb_vlan_untag(skb); 40512464bb8SToshiaki Makita if (unlikely(!skb)) 40612464bb8SToshiaki Makita return false; 40712464bb8SToshiaki Makita } 40812464bb8SToshiaki Makita 4098580e211SToshiaki Makita if (!br_vlan_get_tag(skb, vid)) { 4108580e211SToshiaki Makita /* Tagged frame */ 4116dada9b1SNikolay Aleksandrov if (skb->vlan_proto != br->vlan_proto) { 4128580e211SToshiaki Makita /* Protocol-mismatch, empty out vlan_tci for new tag */ 4138580e211SToshiaki Makita skb_push(skb, ETH_HLEN); 41462749e2cSJiri Pirko skb = vlan_insert_tag_set_proto(skb, skb->vlan_proto, 415df8a39deSJiri Pirko skb_vlan_tag_get(skb)); 4168580e211SToshiaki Makita if (unlikely(!skb)) 4178580e211SToshiaki Makita return false; 4188580e211SToshiaki Makita 4198580e211SToshiaki Makita skb_pull(skb, ETH_HLEN); 4208580e211SToshiaki Makita skb_reset_mac_len(skb); 4218580e211SToshiaki Makita *vid = 0; 4228580e211SToshiaki Makita tagged = false; 4238580e211SToshiaki Makita } else { 4248580e211SToshiaki Makita tagged = true; 4258580e211SToshiaki Makita } 4268580e211SToshiaki Makita } else { 4278580e211SToshiaki Makita /* Untagged frame */ 4288580e211SToshiaki Makita tagged = false; 4298580e211SToshiaki Makita } 4308580e211SToshiaki Makita 431b90356ceSToshiaki Makita if (!*vid) { 43277751ee8SNikolay Aleksandrov u16 pvid = br_get_pvid(vg); 43377751ee8SNikolay Aleksandrov 434b90356ceSToshiaki Makita /* Frame had a tag with VID 0 or did not have a tag. 435b90356ceSToshiaki Makita * See if pvid is set on this port. That tells us which 436b90356ceSToshiaki Makita * vlan untagged or priority-tagged traffic belongs to. 43778851988SVlad Yasevich */ 4383df6bf45SVlad Yasevich if (!pvid) 439eb707618SToshiaki Makita goto drop; 44078851988SVlad Yasevich 441b90356ceSToshiaki Makita /* PVID is set on this port. Any untagged or priority-tagged 442b90356ceSToshiaki Makita * ingress frame is considered to belong to this vlan. 44378851988SVlad Yasevich */ 444dfb5fa32SToshiaki Makita *vid = pvid; 4458580e211SToshiaki Makita if (likely(!tagged)) 446b90356ceSToshiaki Makita /* Untagged Frame. */ 4476dada9b1SNikolay Aleksandrov __vlan_hwaccel_put_tag(skb, br->vlan_proto, pvid); 448b90356ceSToshiaki Makita else 449b90356ceSToshiaki Makita /* Priority-tagged Frame. 450b90356ceSToshiaki Makita * At this point, We know that skb->vlan_tci had 451b90356ceSToshiaki Makita * VLAN_TAG_PRESENT bit and its VID field was 0x000. 452b90356ceSToshiaki Makita * We update only VID field and preserve PCP field. 453b90356ceSToshiaki Makita */ 454b90356ceSToshiaki Makita skb->vlan_tci |= pvid; 455b90356ceSToshiaki Makita 4566dada9b1SNikolay Aleksandrov /* if stats are disabled we can avoid the lookup */ 4576dada9b1SNikolay Aleksandrov if (!br->vlan_stats_enabled) 45878851988SVlad Yasevich return true; 45978851988SVlad Yasevich } 46077751ee8SNikolay Aleksandrov v = br_vlan_find(vg, *vid); 4616dada9b1SNikolay Aleksandrov if (!v || !br_vlan_should_use(v)) 4626dada9b1SNikolay Aleksandrov goto drop; 4636dada9b1SNikolay Aleksandrov 4646dada9b1SNikolay Aleksandrov if (br->vlan_stats_enabled) { 4656dada9b1SNikolay Aleksandrov stats = this_cpu_ptr(v->stats); 4666dada9b1SNikolay Aleksandrov u64_stats_update_begin(&stats->syncp); 4676dada9b1SNikolay Aleksandrov stats->rx_bytes += skb->len; 4686dada9b1SNikolay Aleksandrov stats->rx_packets++; 4696dada9b1SNikolay Aleksandrov u64_stats_update_end(&stats->syncp); 4706dada9b1SNikolay Aleksandrov } 4716dada9b1SNikolay Aleksandrov 472a37b85c9SVlad Yasevich return true; 4736dada9b1SNikolay Aleksandrov 474eb707618SToshiaki Makita drop: 475eb707618SToshiaki Makita kfree_skb(skb); 476a37b85c9SVlad Yasevich return false; 477a37b85c9SVlad Yasevich } 478a37b85c9SVlad Yasevich 47977751ee8SNikolay Aleksandrov bool br_allowed_ingress(const struct net_bridge *br, 48077751ee8SNikolay Aleksandrov struct net_bridge_vlan_group *vg, struct sk_buff *skb, 4812594e906SNikolay Aleksandrov u16 *vid) 4822594e906SNikolay Aleksandrov { 4832594e906SNikolay Aleksandrov /* If VLAN filtering is disabled on the bridge, all packets are 4842594e906SNikolay Aleksandrov * permitted. 4852594e906SNikolay Aleksandrov */ 4862594e906SNikolay Aleksandrov if (!br->vlan_enabled) { 4872594e906SNikolay Aleksandrov BR_INPUT_SKB_CB(skb)->vlan_filtered = false; 4882594e906SNikolay Aleksandrov return true; 4892594e906SNikolay Aleksandrov } 4902594e906SNikolay Aleksandrov 4916dada9b1SNikolay Aleksandrov return __allowed_ingress(br, vg, skb, vid); 4922594e906SNikolay Aleksandrov } 4932594e906SNikolay Aleksandrov 49485f46c6bSVlad Yasevich /* Called under RCU. */ 4952594e906SNikolay Aleksandrov bool br_allowed_egress(struct net_bridge_vlan_group *vg, 49685f46c6bSVlad Yasevich const struct sk_buff *skb) 49785f46c6bSVlad Yasevich { 4982594e906SNikolay Aleksandrov const struct net_bridge_vlan *v; 49985f46c6bSVlad Yasevich u16 vid; 50085f46c6bSVlad Yasevich 50120adfa1aSVlad Yasevich /* If this packet was not filtered at input, let it pass */ 50220adfa1aSVlad Yasevich if (!BR_INPUT_SKB_CB(skb)->vlan_filtered) 50385f46c6bSVlad Yasevich return true; 50485f46c6bSVlad Yasevich 50585f46c6bSVlad Yasevich br_vlan_get_tag(skb, &vid); 5062594e906SNikolay Aleksandrov v = br_vlan_find(vg, vid); 5072594e906SNikolay Aleksandrov if (v && br_vlan_should_use(v)) 50885f46c6bSVlad Yasevich return true; 50985f46c6bSVlad Yasevich 51085f46c6bSVlad Yasevich return false; 51185f46c6bSVlad Yasevich } 51285f46c6bSVlad Yasevich 513e0d7968aSToshiaki Makita /* Called under RCU */ 514e0d7968aSToshiaki Makita bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid) 515e0d7968aSToshiaki Makita { 516468e7944SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 517e0d7968aSToshiaki Makita struct net_bridge *br = p->br; 518e0d7968aSToshiaki Makita 51920adfa1aSVlad Yasevich /* If filtering was disabled at input, let it pass. */ 520c095f248SVlad Yasevich if (!br->vlan_enabled) 521e0d7968aSToshiaki Makita return true; 522e0d7968aSToshiaki Makita 523eca1e006SIdo Schimmel vg = nbp_vlan_group_rcu(p); 524468e7944SNikolay Aleksandrov if (!vg || !vg->num_vlans) 525e0d7968aSToshiaki Makita return false; 526e0d7968aSToshiaki Makita 5278580e211SToshiaki Makita if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto) 5288580e211SToshiaki Makita *vid = 0; 5298580e211SToshiaki Makita 530e0d7968aSToshiaki Makita if (!*vid) { 53177751ee8SNikolay Aleksandrov *vid = br_get_pvid(vg); 5323df6bf45SVlad Yasevich if (!*vid) 533e0d7968aSToshiaki Makita return false; 534e0d7968aSToshiaki Makita 535e0d7968aSToshiaki Makita return true; 536e0d7968aSToshiaki Makita } 537e0d7968aSToshiaki Makita 53877751ee8SNikolay Aleksandrov if (br_vlan_find(vg, *vid)) 539e0d7968aSToshiaki Makita return true; 540e0d7968aSToshiaki Makita 541e0d7968aSToshiaki Makita return false; 542e0d7968aSToshiaki Makita } 543e0d7968aSToshiaki Makita 5448adff41cSToshiaki Makita /* Must be protected by RTNL. 5458adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 5468adff41cSToshiaki Makita */ 547552406c4SVlad Yasevich int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags) 548243a2e63SVlad Yasevich { 549907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 5502594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 5512594e906SNikolay Aleksandrov int ret; 552243a2e63SVlad Yasevich 553243a2e63SVlad Yasevich ASSERT_RTNL(); 554243a2e63SVlad Yasevich 555907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 556907b1e6eSNikolay Aleksandrov vlan = br_vlan_find(vg, vid); 5572594e906SNikolay Aleksandrov if (vlan) { 5582594e906SNikolay Aleksandrov if (!br_vlan_is_brentry(vlan)) { 5592594e906SNikolay Aleksandrov /* Trying to change flags of non-existent bridge vlan */ 5602594e906SNikolay Aleksandrov if (!(flags & BRIDGE_VLAN_INFO_BRENTRY)) 5612594e906SNikolay Aleksandrov return -EINVAL; 5622594e906SNikolay Aleksandrov /* It was only kept for port vlans, now make it real */ 5632594e906SNikolay Aleksandrov ret = br_fdb_insert(br, NULL, br->dev->dev_addr, 5642594e906SNikolay Aleksandrov vlan->vid); 5652594e906SNikolay Aleksandrov if (ret) { 5662594e906SNikolay Aleksandrov br_err(br, "failed insert local address into bridge forwarding table\n"); 5672594e906SNikolay Aleksandrov return ret; 5682594e906SNikolay Aleksandrov } 5692594e906SNikolay Aleksandrov atomic_inc(&vlan->refcnt); 5702594e906SNikolay Aleksandrov vlan->flags |= BRIDGE_VLAN_INFO_BRENTRY; 571907b1e6eSNikolay Aleksandrov vg->num_vlans++; 5722594e906SNikolay Aleksandrov } 5732594e906SNikolay Aleksandrov __vlan_add_flags(vlan, flags); 5742594e906SNikolay Aleksandrov return 0; 5752594e906SNikolay Aleksandrov } 576243a2e63SVlad Yasevich 5772594e906SNikolay Aleksandrov vlan = kzalloc(sizeof(*vlan), GFP_KERNEL); 5782594e906SNikolay Aleksandrov if (!vlan) 579243a2e63SVlad Yasevich return -ENOMEM; 580243a2e63SVlad Yasevich 5816dada9b1SNikolay Aleksandrov vlan->stats = netdev_alloc_pcpu_stats(struct br_vlan_stats); 5826dada9b1SNikolay Aleksandrov if (!vlan->stats) { 5836dada9b1SNikolay Aleksandrov kfree(vlan); 5846dada9b1SNikolay Aleksandrov return -ENOMEM; 5856dada9b1SNikolay Aleksandrov } 5862594e906SNikolay Aleksandrov vlan->vid = vid; 5872594e906SNikolay Aleksandrov vlan->flags = flags | BRIDGE_VLAN_INFO_MASTER; 5882594e906SNikolay Aleksandrov vlan->flags &= ~BRIDGE_VLAN_INFO_PVID; 5892594e906SNikolay Aleksandrov vlan->br = br; 5902594e906SNikolay Aleksandrov if (flags & BRIDGE_VLAN_INFO_BRENTRY) 5912594e906SNikolay Aleksandrov atomic_set(&vlan->refcnt, 1); 5922594e906SNikolay Aleksandrov ret = __vlan_add(vlan, flags); 5936dada9b1SNikolay Aleksandrov if (ret) { 5946dada9b1SNikolay Aleksandrov free_percpu(vlan->stats); 5952594e906SNikolay Aleksandrov kfree(vlan); 5966dada9b1SNikolay Aleksandrov } 597243a2e63SVlad Yasevich 5982594e906SNikolay Aleksandrov return ret; 599243a2e63SVlad Yasevich } 600243a2e63SVlad Yasevich 6018adff41cSToshiaki Makita /* Must be protected by RTNL. 6028adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 6038adff41cSToshiaki Makita */ 604243a2e63SVlad Yasevich int br_vlan_delete(struct net_bridge *br, u16 vid) 605243a2e63SVlad Yasevich { 606907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 6072594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 608243a2e63SVlad Yasevich 609243a2e63SVlad Yasevich ASSERT_RTNL(); 610243a2e63SVlad Yasevich 611907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 612907b1e6eSNikolay Aleksandrov v = br_vlan_find(vg, vid); 6132594e906SNikolay Aleksandrov if (!v || !br_vlan_is_brentry(v)) 6142594e906SNikolay Aleksandrov return -ENOENT; 615243a2e63SVlad Yasevich 616424bb9c9SToshiaki Makita br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid); 6173741873bSRoopa Prabhu br_fdb_delete_by_port(br, NULL, vid, 0); 618bc9a25d2SVlad Yasevich 619efa5356bSRoopa Prabhu vlan_tunnel_info_del(vg, v); 620efa5356bSRoopa Prabhu 6212594e906SNikolay Aleksandrov return __vlan_del(v); 622243a2e63SVlad Yasevich } 623243a2e63SVlad Yasevich 624243a2e63SVlad Yasevich void br_vlan_flush(struct net_bridge *br) 625243a2e63SVlad Yasevich { 626f409d0edSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 627f409d0edSNikolay Aleksandrov 628243a2e63SVlad Yasevich ASSERT_RTNL(); 629243a2e63SVlad Yasevich 630f409d0edSNikolay Aleksandrov vg = br_vlan_group(br); 631f409d0edSNikolay Aleksandrov __vlan_flush(vg); 632f409d0edSNikolay Aleksandrov RCU_INIT_POINTER(br->vlgrp, NULL); 633f409d0edSNikolay Aleksandrov synchronize_rcu(); 634f409d0edSNikolay Aleksandrov __vlan_group_free(vg); 635243a2e63SVlad Yasevich } 636243a2e63SVlad Yasevich 6372594e906SNikolay Aleksandrov struct net_bridge_vlan *br_vlan_find(struct net_bridge_vlan_group *vg, u16 vid) 6382b292fb4SToshiaki Makita { 6392594e906SNikolay Aleksandrov if (!vg) 6402594e906SNikolay Aleksandrov return NULL; 6412b292fb4SToshiaki Makita 6422594e906SNikolay Aleksandrov return br_vlan_lookup(&vg->vlan_hash, vid); 6432b292fb4SToshiaki Makita } 6442b292fb4SToshiaki Makita 645204177f3SToshiaki Makita /* Must be protected by RTNL. */ 646204177f3SToshiaki Makita static void recalculate_group_addr(struct net_bridge *br) 647204177f3SToshiaki Makita { 648204177f3SToshiaki Makita if (br->group_addr_set) 649204177f3SToshiaki Makita return; 650204177f3SToshiaki Makita 651204177f3SToshiaki Makita spin_lock_bh(&br->lock); 652204177f3SToshiaki Makita if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) { 653204177f3SToshiaki Makita /* Bridge Group Address */ 654204177f3SToshiaki Makita br->group_addr[5] = 0x00; 655204177f3SToshiaki Makita } else { /* vlan_enabled && ETH_P_8021AD */ 656204177f3SToshiaki Makita /* Provider Bridge Group Address */ 657204177f3SToshiaki Makita br->group_addr[5] = 0x08; 658204177f3SToshiaki Makita } 659204177f3SToshiaki Makita spin_unlock_bh(&br->lock); 660204177f3SToshiaki Makita } 661204177f3SToshiaki Makita 662204177f3SToshiaki Makita /* Must be protected by RTNL. */ 663204177f3SToshiaki Makita void br_recalculate_fwd_mask(struct net_bridge *br) 664204177f3SToshiaki Makita { 665204177f3SToshiaki Makita if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) 666204177f3SToshiaki Makita br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT; 667204177f3SToshiaki Makita else /* vlan_enabled && ETH_P_8021AD */ 668204177f3SToshiaki Makita br->group_fwd_mask_required = BR_GROUPFWD_8021AD & 669204177f3SToshiaki Makita ~(1u << br->group_addr[5]); 670204177f3SToshiaki Makita } 671204177f3SToshiaki Makita 672a7854037SNikolay Aleksandrov int __br_vlan_filter_toggle(struct net_bridge *br, unsigned long val) 673243a2e63SVlad Yasevich { 6746b72a770SElad Raz struct switchdev_attr attr = { 6756b72a770SElad Raz .orig_dev = br->dev, 6766b72a770SElad Raz .id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING, 6776b72a770SElad Raz .flags = SWITCHDEV_F_SKIP_EOPNOTSUPP, 6786b72a770SElad Raz .u.vlan_filtering = val, 6796b72a770SElad Raz }; 6806b72a770SElad Raz int err; 6816b72a770SElad Raz 682243a2e63SVlad Yasevich if (br->vlan_enabled == val) 683a7854037SNikolay Aleksandrov return 0; 684243a2e63SVlad Yasevich 6856b72a770SElad Raz err = switchdev_port_attr_set(br->dev, &attr); 6866b72a770SElad Raz if (err && err != -EOPNOTSUPP) 6876b72a770SElad Raz return err; 6886b72a770SElad Raz 689243a2e63SVlad Yasevich br->vlan_enabled = val; 6902796d0c6SVlad Yasevich br_manage_promisc(br); 691204177f3SToshiaki Makita recalculate_group_addr(br); 692204177f3SToshiaki Makita br_recalculate_fwd_mask(br); 693243a2e63SVlad Yasevich 694a7854037SNikolay Aleksandrov return 0; 695a7854037SNikolay Aleksandrov } 696a7854037SNikolay Aleksandrov 697a7854037SNikolay Aleksandrov int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val) 698a7854037SNikolay Aleksandrov { 699047831a9SXin Long return __br_vlan_filter_toggle(br, val); 700243a2e63SVlad Yasevich } 701243a2e63SVlad Yasevich 702d2d427b3SToshiaki Makita int __br_vlan_set_proto(struct net_bridge *br, __be16 proto) 703204177f3SToshiaki Makita { 704204177f3SToshiaki Makita int err = 0; 705204177f3SToshiaki Makita struct net_bridge_port *p; 7062594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 707907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 708d2d427b3SToshiaki Makita __be16 oldproto; 709204177f3SToshiaki Makita 710204177f3SToshiaki Makita if (br->vlan_proto == proto) 711d2d427b3SToshiaki Makita return 0; 712204177f3SToshiaki Makita 713204177f3SToshiaki Makita /* Add VLANs for the new proto to the device filter. */ 714204177f3SToshiaki Makita list_for_each_entry(p, &br->port_list, list) { 715907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 716907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) { 7172594e906SNikolay Aleksandrov err = vlan_vid_add(p->dev, proto, vlan->vid); 718204177f3SToshiaki Makita if (err) 719204177f3SToshiaki Makita goto err_filt; 720204177f3SToshiaki Makita } 721204177f3SToshiaki Makita } 722204177f3SToshiaki Makita 723204177f3SToshiaki Makita oldproto = br->vlan_proto; 724204177f3SToshiaki Makita br->vlan_proto = proto; 725204177f3SToshiaki Makita 726204177f3SToshiaki Makita recalculate_group_addr(br); 727204177f3SToshiaki Makita br_recalculate_fwd_mask(br); 728204177f3SToshiaki Makita 729204177f3SToshiaki Makita /* Delete VLANs for the old proto from the device filter. */ 730907b1e6eSNikolay Aleksandrov list_for_each_entry(p, &br->port_list, list) { 731907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 732907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) 7332594e906SNikolay Aleksandrov vlan_vid_del(p->dev, oldproto, vlan->vid); 734907b1e6eSNikolay Aleksandrov } 735204177f3SToshiaki Makita 736d2d427b3SToshiaki Makita return 0; 737204177f3SToshiaki Makita 738204177f3SToshiaki Makita err_filt: 739907b1e6eSNikolay Aleksandrov list_for_each_entry_continue_reverse(vlan, &vg->vlan_list, vlist) 7402594e906SNikolay Aleksandrov vlan_vid_del(p->dev, proto, vlan->vid); 741204177f3SToshiaki Makita 742907b1e6eSNikolay Aleksandrov list_for_each_entry_continue_reverse(p, &br->port_list, list) { 743907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 744907b1e6eSNikolay Aleksandrov list_for_each_entry(vlan, &vg->vlan_list, vlist) 7452594e906SNikolay Aleksandrov vlan_vid_del(p->dev, proto, vlan->vid); 746907b1e6eSNikolay Aleksandrov } 747204177f3SToshiaki Makita 748d2d427b3SToshiaki Makita return err; 749d2d427b3SToshiaki Makita } 750d2d427b3SToshiaki Makita 751d2d427b3SToshiaki Makita int br_vlan_set_proto(struct net_bridge *br, unsigned long val) 752d2d427b3SToshiaki Makita { 753d2d427b3SToshiaki Makita if (val != ETH_P_8021Q && val != ETH_P_8021AD) 754d2d427b3SToshiaki Makita return -EPROTONOSUPPORT; 755d2d427b3SToshiaki Makita 756047831a9SXin Long return __br_vlan_set_proto(br, htons(val)); 757204177f3SToshiaki Makita } 758204177f3SToshiaki Makita 7596dada9b1SNikolay Aleksandrov int br_vlan_set_stats(struct net_bridge *br, unsigned long val) 7606dada9b1SNikolay Aleksandrov { 7616dada9b1SNikolay Aleksandrov switch (val) { 7626dada9b1SNikolay Aleksandrov case 0: 7636dada9b1SNikolay Aleksandrov case 1: 7646dada9b1SNikolay Aleksandrov br->vlan_stats_enabled = val; 7656dada9b1SNikolay Aleksandrov break; 7666dada9b1SNikolay Aleksandrov default: 7676dada9b1SNikolay Aleksandrov return -EINVAL; 7686dada9b1SNikolay Aleksandrov } 7696dada9b1SNikolay Aleksandrov 7706dada9b1SNikolay Aleksandrov return 0; 7716dada9b1SNikolay Aleksandrov } 7726dada9b1SNikolay Aleksandrov 77377751ee8SNikolay Aleksandrov static bool vlan_default_pvid(struct net_bridge_vlan_group *vg, u16 vid) 7745be5a2dfSVlad Yasevich { 7752594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 7762594e906SNikolay Aleksandrov 77777751ee8SNikolay Aleksandrov if (vid != vg->pvid) 7782594e906SNikolay Aleksandrov return false; 7792594e906SNikolay Aleksandrov 7802594e906SNikolay Aleksandrov v = br_vlan_lookup(&vg->vlan_hash, vid); 7812594e906SNikolay Aleksandrov if (v && br_vlan_should_use(v) && 7822594e906SNikolay Aleksandrov (v->flags & BRIDGE_VLAN_INFO_UNTAGGED)) 7832594e906SNikolay Aleksandrov return true; 7842594e906SNikolay Aleksandrov 7852594e906SNikolay Aleksandrov return false; 7865be5a2dfSVlad Yasevich } 7875be5a2dfSVlad Yasevich 7885be5a2dfSVlad Yasevich static void br_vlan_disable_default_pvid(struct net_bridge *br) 7895be5a2dfSVlad Yasevich { 7905be5a2dfSVlad Yasevich struct net_bridge_port *p; 7915be5a2dfSVlad Yasevich u16 pvid = br->default_pvid; 7925be5a2dfSVlad Yasevich 7935be5a2dfSVlad Yasevich /* Disable default_pvid on all ports where it is still 7945be5a2dfSVlad Yasevich * configured. 7955be5a2dfSVlad Yasevich */ 796907b1e6eSNikolay Aleksandrov if (vlan_default_pvid(br_vlan_group(br), pvid)) 7975be5a2dfSVlad Yasevich br_vlan_delete(br, pvid); 7985be5a2dfSVlad Yasevich 7995be5a2dfSVlad Yasevich list_for_each_entry(p, &br->port_list, list) { 800907b1e6eSNikolay Aleksandrov if (vlan_default_pvid(nbp_vlan_group(p), pvid)) 8015be5a2dfSVlad Yasevich nbp_vlan_delete(p, pvid); 8025be5a2dfSVlad Yasevich } 8035be5a2dfSVlad Yasevich 8045be5a2dfSVlad Yasevich br->default_pvid = 0; 8055be5a2dfSVlad Yasevich } 8065be5a2dfSVlad Yasevich 8070f963b75SNikolay Aleksandrov int __br_vlan_set_default_pvid(struct net_bridge *br, u16 pvid) 8085be5a2dfSVlad Yasevich { 8092594e906SNikolay Aleksandrov const struct net_bridge_vlan *pvent; 810907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 8115be5a2dfSVlad Yasevich struct net_bridge_port *p; 8125be5a2dfSVlad Yasevich u16 old_pvid; 8135be5a2dfSVlad Yasevich int err = 0; 8145be5a2dfSVlad Yasevich unsigned long *changed; 8155be5a2dfSVlad Yasevich 8160f963b75SNikolay Aleksandrov if (!pvid) { 8170f963b75SNikolay Aleksandrov br_vlan_disable_default_pvid(br); 8180f963b75SNikolay Aleksandrov return 0; 8190f963b75SNikolay Aleksandrov } 8200f963b75SNikolay Aleksandrov 8215be5a2dfSVlad Yasevich changed = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long), 8225be5a2dfSVlad Yasevich GFP_KERNEL); 8235be5a2dfSVlad Yasevich if (!changed) 8245be5a2dfSVlad Yasevich return -ENOMEM; 8255be5a2dfSVlad Yasevich 8265be5a2dfSVlad Yasevich old_pvid = br->default_pvid; 8275be5a2dfSVlad Yasevich 8285be5a2dfSVlad Yasevich /* Update default_pvid config only if we do not conflict with 8295be5a2dfSVlad Yasevich * user configuration. 8305be5a2dfSVlad Yasevich */ 831907b1e6eSNikolay Aleksandrov vg = br_vlan_group(br); 832907b1e6eSNikolay Aleksandrov pvent = br_vlan_find(vg, pvid); 833907b1e6eSNikolay Aleksandrov if ((!old_pvid || vlan_default_pvid(vg, old_pvid)) && 8342594e906SNikolay Aleksandrov (!pvent || !br_vlan_should_use(pvent))) { 8355be5a2dfSVlad Yasevich err = br_vlan_add(br, pvid, 8365be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 8372594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED | 8382594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY); 8395be5a2dfSVlad Yasevich if (err) 8405be5a2dfSVlad Yasevich goto out; 8415be5a2dfSVlad Yasevich br_vlan_delete(br, old_pvid); 8425be5a2dfSVlad Yasevich set_bit(0, changed); 8435be5a2dfSVlad Yasevich } 8445be5a2dfSVlad Yasevich 8455be5a2dfSVlad Yasevich list_for_each_entry(p, &br->port_list, list) { 8465be5a2dfSVlad Yasevich /* Update default_pvid config only if we do not conflict with 8475be5a2dfSVlad Yasevich * user configuration. 8485be5a2dfSVlad Yasevich */ 849907b1e6eSNikolay Aleksandrov vg = nbp_vlan_group(p); 8505be5a2dfSVlad Yasevich if ((old_pvid && 851907b1e6eSNikolay Aleksandrov !vlan_default_pvid(vg, old_pvid)) || 852907b1e6eSNikolay Aleksandrov br_vlan_find(vg, pvid)) 8535be5a2dfSVlad Yasevich continue; 8545be5a2dfSVlad Yasevich 8555be5a2dfSVlad Yasevich err = nbp_vlan_add(p, pvid, 8565be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 8575be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_UNTAGGED); 8585be5a2dfSVlad Yasevich if (err) 8595be5a2dfSVlad Yasevich goto err_port; 8605be5a2dfSVlad Yasevich nbp_vlan_delete(p, old_pvid); 8615be5a2dfSVlad Yasevich set_bit(p->port_no, changed); 8625be5a2dfSVlad Yasevich } 8635be5a2dfSVlad Yasevich 8645be5a2dfSVlad Yasevich br->default_pvid = pvid; 8655be5a2dfSVlad Yasevich 8665be5a2dfSVlad Yasevich out: 8675be5a2dfSVlad Yasevich kfree(changed); 8685be5a2dfSVlad Yasevich return err; 8695be5a2dfSVlad Yasevich 8705be5a2dfSVlad Yasevich err_port: 8715be5a2dfSVlad Yasevich list_for_each_entry_continue_reverse(p, &br->port_list, list) { 8725be5a2dfSVlad Yasevich if (!test_bit(p->port_no, changed)) 8735be5a2dfSVlad Yasevich continue; 8745be5a2dfSVlad Yasevich 8755be5a2dfSVlad Yasevich if (old_pvid) 8765be5a2dfSVlad Yasevich nbp_vlan_add(p, old_pvid, 8775be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 8785be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_UNTAGGED); 8795be5a2dfSVlad Yasevich nbp_vlan_delete(p, pvid); 8805be5a2dfSVlad Yasevich } 8815be5a2dfSVlad Yasevich 8825be5a2dfSVlad Yasevich if (test_bit(0, changed)) { 8835be5a2dfSVlad Yasevich if (old_pvid) 8845be5a2dfSVlad Yasevich br_vlan_add(br, old_pvid, 8855be5a2dfSVlad Yasevich BRIDGE_VLAN_INFO_PVID | 8862594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED | 8872594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY); 8885be5a2dfSVlad Yasevich br_vlan_delete(br, pvid); 8895be5a2dfSVlad Yasevich } 8905be5a2dfSVlad Yasevich goto out; 8915be5a2dfSVlad Yasevich } 8925be5a2dfSVlad Yasevich 89396a20d9dSVlad Yasevich int br_vlan_set_default_pvid(struct net_bridge *br, unsigned long val) 89496a20d9dSVlad Yasevich { 89596a20d9dSVlad Yasevich u16 pvid = val; 89696a20d9dSVlad Yasevich int err = 0; 89796a20d9dSVlad Yasevich 8985be5a2dfSVlad Yasevich if (val >= VLAN_VID_MASK) 89996a20d9dSVlad Yasevich return -EINVAL; 90096a20d9dSVlad Yasevich 90196a20d9dSVlad Yasevich if (pvid == br->default_pvid) 902047831a9SXin Long goto out; 90396a20d9dSVlad Yasevich 90496a20d9dSVlad Yasevich /* Only allow default pvid change when filtering is disabled */ 90596a20d9dSVlad Yasevich if (br->vlan_enabled) { 90696a20d9dSVlad Yasevich pr_info_once("Please disable vlan filtering to change default_pvid\n"); 90796a20d9dSVlad Yasevich err = -EPERM; 908047831a9SXin Long goto out; 90996a20d9dSVlad Yasevich } 9105be5a2dfSVlad Yasevich err = __br_vlan_set_default_pvid(br, pvid); 911047831a9SXin Long out: 91296a20d9dSVlad Yasevich return err; 91396a20d9dSVlad Yasevich } 91496a20d9dSVlad Yasevich 9155be5a2dfSVlad Yasevich int br_vlan_init(struct net_bridge *br) 9168580e211SToshiaki Makita { 917907b1e6eSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 9182594e906SNikolay Aleksandrov int ret = -ENOMEM; 9192594e906SNikolay Aleksandrov 920907b1e6eSNikolay Aleksandrov vg = kzalloc(sizeof(*vg), GFP_KERNEL); 921907b1e6eSNikolay Aleksandrov if (!vg) 9222594e906SNikolay Aleksandrov goto out; 923907b1e6eSNikolay Aleksandrov ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params); 9242594e906SNikolay Aleksandrov if (ret) 9252594e906SNikolay Aleksandrov goto err_rhtbl; 926efa5356bSRoopa Prabhu ret = vlan_tunnel_init(vg); 927efa5356bSRoopa Prabhu if (ret) 928efa5356bSRoopa Prabhu goto err_tunnel_init; 929907b1e6eSNikolay Aleksandrov INIT_LIST_HEAD(&vg->vlan_list); 9308580e211SToshiaki Makita br->vlan_proto = htons(ETH_P_8021Q); 93196a20d9dSVlad Yasevich br->default_pvid = 1; 932907b1e6eSNikolay Aleksandrov rcu_assign_pointer(br->vlgrp, vg); 9332594e906SNikolay Aleksandrov ret = br_vlan_add(br, 1, 9342594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_PVID | BRIDGE_VLAN_INFO_UNTAGGED | 9352594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_BRENTRY); 9362594e906SNikolay Aleksandrov if (ret) 9372594e906SNikolay Aleksandrov goto err_vlan_add; 9382594e906SNikolay Aleksandrov 9392594e906SNikolay Aleksandrov out: 9402594e906SNikolay Aleksandrov return ret; 9412594e906SNikolay Aleksandrov 9422594e906SNikolay Aleksandrov err_vlan_add: 943efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 944efa5356bSRoopa Prabhu err_tunnel_init: 945907b1e6eSNikolay Aleksandrov rhashtable_destroy(&vg->vlan_hash); 9462594e906SNikolay Aleksandrov err_rhtbl: 947907b1e6eSNikolay Aleksandrov kfree(vg); 9482594e906SNikolay Aleksandrov 9492594e906SNikolay Aleksandrov goto out; 9502594e906SNikolay Aleksandrov } 9512594e906SNikolay Aleksandrov 9522594e906SNikolay Aleksandrov int nbp_vlan_init(struct net_bridge_port *p) 9532594e906SNikolay Aleksandrov { 954404cdbf0SElad Raz struct switchdev_attr attr = { 955404cdbf0SElad Raz .orig_dev = p->br->dev, 956404cdbf0SElad Raz .id = SWITCHDEV_ATTR_ID_BRIDGE_VLAN_FILTERING, 957404cdbf0SElad Raz .flags = SWITCHDEV_F_SKIP_EOPNOTSUPP, 958404cdbf0SElad Raz .u.vlan_filtering = p->br->vlan_enabled, 959404cdbf0SElad Raz }; 960263344e6SNikolay Aleksandrov struct net_bridge_vlan_group *vg; 9612594e906SNikolay Aleksandrov int ret = -ENOMEM; 9622594e906SNikolay Aleksandrov 963263344e6SNikolay Aleksandrov vg = kzalloc(sizeof(struct net_bridge_vlan_group), GFP_KERNEL); 964263344e6SNikolay Aleksandrov if (!vg) 9652594e906SNikolay Aleksandrov goto out; 9662594e906SNikolay Aleksandrov 967404cdbf0SElad Raz ret = switchdev_port_attr_set(p->dev, &attr); 968404cdbf0SElad Raz if (ret && ret != -EOPNOTSUPP) 969404cdbf0SElad Raz goto err_vlan_enabled; 970404cdbf0SElad Raz 971263344e6SNikolay Aleksandrov ret = rhashtable_init(&vg->vlan_hash, &br_vlan_rht_params); 9722594e906SNikolay Aleksandrov if (ret) 9732594e906SNikolay Aleksandrov goto err_rhtbl; 974efa5356bSRoopa Prabhu ret = vlan_tunnel_init(vg); 975efa5356bSRoopa Prabhu if (ret) 976efa5356bSRoopa Prabhu goto err_tunnel_init; 977263344e6SNikolay Aleksandrov INIT_LIST_HEAD(&vg->vlan_list); 978907b1e6eSNikolay Aleksandrov rcu_assign_pointer(p->vlgrp, vg); 9792594e906SNikolay Aleksandrov if (p->br->default_pvid) { 9802594e906SNikolay Aleksandrov ret = nbp_vlan_add(p, p->br->default_pvid, 9812594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_PVID | 9822594e906SNikolay Aleksandrov BRIDGE_VLAN_INFO_UNTAGGED); 9832594e906SNikolay Aleksandrov if (ret) 9842594e906SNikolay Aleksandrov goto err_vlan_add; 9852594e906SNikolay Aleksandrov } 9862594e906SNikolay Aleksandrov out: 9872594e906SNikolay Aleksandrov return ret; 9882594e906SNikolay Aleksandrov 9892594e906SNikolay Aleksandrov err_vlan_add: 99007bc588fSIdo Schimmel RCU_INIT_POINTER(p->vlgrp, NULL); 99107bc588fSIdo Schimmel synchronize_rcu(); 992efa5356bSRoopa Prabhu vlan_tunnel_deinit(vg); 993404cdbf0SElad Raz err_vlan_enabled: 994efa5356bSRoopa Prabhu err_tunnel_init: 995efa5356bSRoopa Prabhu rhashtable_destroy(&vg->vlan_hash); 9962594e906SNikolay Aleksandrov err_rhtbl: 997263344e6SNikolay Aleksandrov kfree(vg); 9982594e906SNikolay Aleksandrov 9992594e906SNikolay Aleksandrov goto out; 10008580e211SToshiaki Makita } 10018580e211SToshiaki Makita 10028adff41cSToshiaki Makita /* Must be protected by RTNL. 10038adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 10048adff41cSToshiaki Makita */ 1005552406c4SVlad Yasevich int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags) 1006243a2e63SVlad Yasevich { 10077fbac984SIdo Schimmel struct switchdev_obj_port_vlan v = { 10087fbac984SIdo Schimmel .obj.orig_dev = port->dev, 10097fbac984SIdo Schimmel .obj.id = SWITCHDEV_OBJ_ID_PORT_VLAN, 10107fbac984SIdo Schimmel .flags = flags, 10117fbac984SIdo Schimmel .vid_begin = vid, 10127fbac984SIdo Schimmel .vid_end = vid, 10137fbac984SIdo Schimmel }; 10142594e906SNikolay Aleksandrov struct net_bridge_vlan *vlan; 10152594e906SNikolay Aleksandrov int ret; 1016243a2e63SVlad Yasevich 1017243a2e63SVlad Yasevich ASSERT_RTNL(); 1018243a2e63SVlad Yasevich 1019907b1e6eSNikolay Aleksandrov vlan = br_vlan_find(nbp_vlan_group(port), vid); 10202594e906SNikolay Aleksandrov if (vlan) { 10217fbac984SIdo Schimmel /* Pass the flags to the hardware bridge */ 10227fbac984SIdo Schimmel ret = switchdev_port_obj_add(port->dev, &v.obj); 10237fbac984SIdo Schimmel if (ret && ret != -EOPNOTSUPP) 10247fbac984SIdo Schimmel return ret; 10252594e906SNikolay Aleksandrov __vlan_add_flags(vlan, flags); 10262594e906SNikolay Aleksandrov return 0; 1027243a2e63SVlad Yasevich } 1028243a2e63SVlad Yasevich 10292594e906SNikolay Aleksandrov vlan = kzalloc(sizeof(*vlan), GFP_KERNEL); 10302594e906SNikolay Aleksandrov if (!vlan) 10312594e906SNikolay Aleksandrov return -ENOMEM; 1032243a2e63SVlad Yasevich 10332594e906SNikolay Aleksandrov vlan->vid = vid; 10342594e906SNikolay Aleksandrov vlan->port = port; 10352594e906SNikolay Aleksandrov ret = __vlan_add(vlan, flags); 10362594e906SNikolay Aleksandrov if (ret) 10372594e906SNikolay Aleksandrov kfree(vlan); 1038243a2e63SVlad Yasevich 10392594e906SNikolay Aleksandrov return ret; 1040243a2e63SVlad Yasevich } 1041243a2e63SVlad Yasevich 10428adff41cSToshiaki Makita /* Must be protected by RTNL. 10438adff41cSToshiaki Makita * Must be called with vid in range from 1 to 4094 inclusive. 10448adff41cSToshiaki Makita */ 1045243a2e63SVlad Yasevich int nbp_vlan_delete(struct net_bridge_port *port, u16 vid) 1046243a2e63SVlad Yasevich { 10472594e906SNikolay Aleksandrov struct net_bridge_vlan *v; 1048243a2e63SVlad Yasevich 1049243a2e63SVlad Yasevich ASSERT_RTNL(); 1050243a2e63SVlad Yasevich 1051907b1e6eSNikolay Aleksandrov v = br_vlan_find(nbp_vlan_group(port), vid); 10522594e906SNikolay Aleksandrov if (!v) 10532594e906SNikolay Aleksandrov return -ENOENT; 1054424bb9c9SToshiaki Makita br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid); 10551ea2d020SNikolay Aleksandrov br_fdb_delete_by_port(port->br, port, vid, 0); 1056bc9a25d2SVlad Yasevich 10572594e906SNikolay Aleksandrov return __vlan_del(v); 1058243a2e63SVlad Yasevich } 1059243a2e63SVlad Yasevich 1060243a2e63SVlad Yasevich void nbp_vlan_flush(struct net_bridge_port *port) 1061243a2e63SVlad Yasevich { 1062f409d0edSNikolay Aleksandrov struct net_bridge_vlan_group *vg; 1063f409d0edSNikolay Aleksandrov 1064243a2e63SVlad Yasevich ASSERT_RTNL(); 1065243a2e63SVlad Yasevich 1066f409d0edSNikolay Aleksandrov vg = nbp_vlan_group(port); 1067f409d0edSNikolay Aleksandrov __vlan_flush(vg); 1068f409d0edSNikolay Aleksandrov RCU_INIT_POINTER(port->vlgrp, NULL); 1069f409d0edSNikolay Aleksandrov synchronize_rcu(); 1070f409d0edSNikolay Aleksandrov __vlan_group_free(vg); 10715be5a2dfSVlad Yasevich } 1072a60c0903SNikolay Aleksandrov 1073a60c0903SNikolay Aleksandrov void br_vlan_get_stats(const struct net_bridge_vlan *v, 1074a60c0903SNikolay Aleksandrov struct br_vlan_stats *stats) 1075a60c0903SNikolay Aleksandrov { 1076a60c0903SNikolay Aleksandrov int i; 1077a60c0903SNikolay Aleksandrov 1078a60c0903SNikolay Aleksandrov memset(stats, 0, sizeof(*stats)); 1079a60c0903SNikolay Aleksandrov for_each_possible_cpu(i) { 1080a60c0903SNikolay Aleksandrov u64 rxpackets, rxbytes, txpackets, txbytes; 1081a60c0903SNikolay Aleksandrov struct br_vlan_stats *cpu_stats; 1082a60c0903SNikolay Aleksandrov unsigned int start; 1083a60c0903SNikolay Aleksandrov 1084a60c0903SNikolay Aleksandrov cpu_stats = per_cpu_ptr(v->stats, i); 1085a60c0903SNikolay Aleksandrov do { 1086a60c0903SNikolay Aleksandrov start = u64_stats_fetch_begin_irq(&cpu_stats->syncp); 1087a60c0903SNikolay Aleksandrov rxpackets = cpu_stats->rx_packets; 1088a60c0903SNikolay Aleksandrov rxbytes = cpu_stats->rx_bytes; 1089a60c0903SNikolay Aleksandrov txbytes = cpu_stats->tx_bytes; 1090a60c0903SNikolay Aleksandrov txpackets = cpu_stats->tx_packets; 1091a60c0903SNikolay Aleksandrov } while (u64_stats_fetch_retry_irq(&cpu_stats->syncp, start)); 1092a60c0903SNikolay Aleksandrov 1093a60c0903SNikolay Aleksandrov stats->rx_packets += rxpackets; 1094a60c0903SNikolay Aleksandrov stats->rx_bytes += rxbytes; 1095a60c0903SNikolay Aleksandrov stats->tx_bytes += txbytes; 1096a60c0903SNikolay Aleksandrov stats->tx_packets += txpackets; 1097a60c0903SNikolay Aleksandrov } 1098a60c0903SNikolay Aleksandrov } 1099