br_vlan.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587
  1. #include <linux/kernel.h>
  2. #include <linux/netdevice.h>
  3. #include <linux/rtnetlink.h>
  4. #include <linux/slab.h>
  5. #include "br_private.h"
  6. static void __vlan_add_pvid(struct net_port_vlans *v, u16 vid)
  7. {
  8. if (v->pvid == vid)
  9. return;
  10. smp_wmb();
  11. v->pvid = vid;
  12. }
  13. static void __vlan_delete_pvid(struct net_port_vlans *v, u16 vid)
  14. {
  15. if (v->pvid != vid)
  16. return;
  17. smp_wmb();
  18. v->pvid = 0;
  19. }
  20. static void __vlan_add_flags(struct net_port_vlans *v, u16 vid, u16 flags)
  21. {
  22. if (flags & BRIDGE_VLAN_INFO_PVID)
  23. __vlan_add_pvid(v, vid);
  24. if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
  25. set_bit(vid, v->untagged_bitmap);
  26. }
  27. static int __vlan_add(struct net_port_vlans *v, u16 vid, u16 flags)
  28. {
  29. struct net_bridge_port *p = NULL;
  30. struct net_bridge *br;
  31. struct net_device *dev;
  32. int err;
  33. if (test_bit(vid, v->vlan_bitmap)) {
  34. __vlan_add_flags(v, vid, flags);
  35. return 0;
  36. }
  37. if (v->port_idx) {
  38. p = v->parent.port;
  39. br = p->br;
  40. dev = p->dev;
  41. } else {
  42. br = v->parent.br;
  43. dev = br->dev;
  44. }
  45. if (p) {
  46. /* Add VLAN to the device filter if it is supported.
  47. * Stricly speaking, this is not necessary now, since
  48. * devices are made promiscuous by the bridge, but if
  49. * that ever changes this code will allow tagged
  50. * traffic to enter the bridge.
  51. */
  52. err = vlan_vid_add(dev, br->vlan_proto, vid);
  53. if (err)
  54. return err;
  55. }
  56. err = br_fdb_insert(br, p, dev->dev_addr, vid);
  57. if (err) {
  58. br_err(br, "failed insert local address into bridge "
  59. "forwarding table\n");
  60. goto out_filt;
  61. }
  62. set_bit(vid, v->vlan_bitmap);
  63. v->num_vlans++;
  64. __vlan_add_flags(v, vid, flags);
  65. return 0;
  66. out_filt:
  67. if (p)
  68. vlan_vid_del(dev, br->vlan_proto, vid);
  69. return err;
  70. }
  71. static int __vlan_del(struct net_port_vlans *v, u16 vid)
  72. {
  73. if (!test_bit(vid, v->vlan_bitmap))
  74. return -EINVAL;
  75. __vlan_delete_pvid(v, vid);
  76. clear_bit(vid, v->untagged_bitmap);
  77. if (v->port_idx) {
  78. struct net_bridge_port *p = v->parent.port;
  79. vlan_vid_del(p->dev, p->br->vlan_proto, vid);
  80. }
  81. clear_bit(vid, v->vlan_bitmap);
  82. v->num_vlans--;
  83. if (bitmap_empty(v->vlan_bitmap, VLAN_N_VID)) {
  84. if (v->port_idx)
  85. RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
  86. else
  87. RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
  88. kfree_rcu(v, rcu);
  89. }
  90. return 0;
  91. }
  92. static void __vlan_flush(struct net_port_vlans *v)
  93. {
  94. smp_wmb();
  95. v->pvid = 0;
  96. bitmap_zero(v->vlan_bitmap, VLAN_N_VID);
  97. if (v->port_idx)
  98. RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
  99. else
  100. RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
  101. kfree_rcu(v, rcu);
  102. }
  103. struct sk_buff *br_handle_vlan(struct net_bridge *br,
  104. const struct net_port_vlans *pv,
  105. struct sk_buff *skb)
  106. {
  107. u16 vid;
  108. if (!br->vlan_enabled)
  109. goto out;
  110. /* Vlan filter table must be configured at this point. The
  111. * only exception is the bridge is set in promisc mode and the
  112. * packet is destined for the bridge device. In this case
  113. * pass the packet as is.
  114. */
  115. if (!pv) {
  116. if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
  117. goto out;
  118. } else {
  119. kfree_skb(skb);
  120. return NULL;
  121. }
  122. }
  123. /* At this point, we know that the frame was filtered and contains
  124. * a valid vlan id. If the vlan id is set in the untagged bitmap,
  125. * send untagged; otherwise, send tagged.
  126. */
  127. br_vlan_get_tag(skb, &vid);
  128. if (test_bit(vid, pv->untagged_bitmap))
  129. skb->vlan_tci = 0;
  130. out:
  131. return skb;
  132. }
  133. /* Called under RCU */
  134. bool br_allowed_ingress(struct net_bridge *br, struct net_port_vlans *v,
  135. struct sk_buff *skb, u16 *vid)
  136. {
  137. bool tagged;
  138. __be16 proto;
  139. /* If VLAN filtering is disabled on the bridge, all packets are
  140. * permitted.
  141. */
  142. if (!br->vlan_enabled)
  143. return true;
  144. /* If there are no vlan in the permitted list, all packets are
  145. * rejected.
  146. */
  147. if (!v)
  148. goto drop;
  149. proto = br->vlan_proto;
  150. /* If vlan tx offload is disabled on bridge device and frame was
  151. * sent from vlan device on the bridge device, it does not have
  152. * HW accelerated vlan tag.
  153. */
  154. if (unlikely(!vlan_tx_tag_present(skb) &&
  155. skb->protocol == proto)) {
  156. skb = vlan_untag(skb);
  157. if (unlikely(!skb))
  158. return false;
  159. }
  160. if (!br_vlan_get_tag(skb, vid)) {
  161. /* Tagged frame */
  162. if (skb->vlan_proto != proto) {
  163. /* Protocol-mismatch, empty out vlan_tci for new tag */
  164. skb_push(skb, ETH_HLEN);
  165. skb = __vlan_put_tag(skb, skb->vlan_proto,
  166. vlan_tx_tag_get(skb));
  167. if (unlikely(!skb))
  168. return false;
  169. skb_pull(skb, ETH_HLEN);
  170. skb_reset_mac_len(skb);
  171. *vid = 0;
  172. tagged = false;
  173. } else {
  174. tagged = true;
  175. }
  176. } else {
  177. /* Untagged frame */
  178. tagged = false;
  179. }
  180. if (!*vid) {
  181. u16 pvid = br_get_pvid(v);
  182. /* Frame had a tag with VID 0 or did not have a tag.
  183. * See if pvid is set on this port. That tells us which
  184. * vlan untagged or priority-tagged traffic belongs to.
  185. */
  186. if (pvid == VLAN_N_VID)
  187. goto drop;
  188. /* PVID is set on this port. Any untagged or priority-tagged
  189. * ingress frame is considered to belong to this vlan.
  190. */
  191. *vid = pvid;
  192. if (likely(!tagged))
  193. /* Untagged Frame. */
  194. __vlan_hwaccel_put_tag(skb, proto, pvid);
  195. else
  196. /* Priority-tagged Frame.
  197. * At this point, We know that skb->vlan_tci had
  198. * VLAN_TAG_PRESENT bit and its VID field was 0x000.
  199. * We update only VID field and preserve PCP field.
  200. */
  201. skb->vlan_tci |= pvid;
  202. return true;
  203. }
  204. /* Frame had a valid vlan tag. See if vlan is allowed */
  205. if (test_bit(*vid, v->vlan_bitmap))
  206. return true;
  207. drop:
  208. kfree_skb(skb);
  209. return false;
  210. }
  211. /* Called under RCU. */
  212. bool br_allowed_egress(struct net_bridge *br,
  213. const struct net_port_vlans *v,
  214. const struct sk_buff *skb)
  215. {
  216. u16 vid;
  217. if (!br->vlan_enabled)
  218. return true;
  219. if (!v)
  220. return false;
  221. br_vlan_get_tag(skb, &vid);
  222. if (test_bit(vid, v->vlan_bitmap))
  223. return true;
  224. return false;
  225. }
  226. /* Called under RCU */
  227. bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
  228. {
  229. struct net_bridge *br = p->br;
  230. struct net_port_vlans *v;
  231. if (!br->vlan_enabled)
  232. return true;
  233. v = rcu_dereference(p->vlan_info);
  234. if (!v)
  235. return false;
  236. if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
  237. *vid = 0;
  238. if (!*vid) {
  239. *vid = br_get_pvid(v);
  240. if (*vid == VLAN_N_VID)
  241. return false;
  242. return true;
  243. }
  244. if (test_bit(*vid, v->vlan_bitmap))
  245. return true;
  246. return false;
  247. }
  248. /* Must be protected by RTNL.
  249. * Must be called with vid in range from 1 to 4094 inclusive.
  250. */
  251. int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
  252. {
  253. struct net_port_vlans *pv = NULL;
  254. int err;
  255. ASSERT_RTNL();
  256. pv = rtnl_dereference(br->vlan_info);
  257. if (pv)
  258. return __vlan_add(pv, vid, flags);
  259. /* Create port vlan infomration
  260. */
  261. pv = kzalloc(sizeof(*pv), GFP_KERNEL);
  262. if (!pv)
  263. return -ENOMEM;
  264. pv->parent.br = br;
  265. err = __vlan_add(pv, vid, flags);
  266. if (err)
  267. goto out;
  268. rcu_assign_pointer(br->vlan_info, pv);
  269. return 0;
  270. out:
  271. kfree(pv);
  272. return err;
  273. }
  274. /* Must be protected by RTNL.
  275. * Must be called with vid in range from 1 to 4094 inclusive.
  276. */
  277. int br_vlan_delete(struct net_bridge *br, u16 vid)
  278. {
  279. struct net_port_vlans *pv;
  280. ASSERT_RTNL();
  281. pv = rtnl_dereference(br->vlan_info);
  282. if (!pv)
  283. return -EINVAL;
  284. br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
  285. __vlan_del(pv, vid);
  286. return 0;
  287. }
  288. void br_vlan_flush(struct net_bridge *br)
  289. {
  290. struct net_port_vlans *pv;
  291. ASSERT_RTNL();
  292. pv = rtnl_dereference(br->vlan_info);
  293. if (!pv)
  294. return;
  295. __vlan_flush(pv);
  296. }
  297. bool br_vlan_find(struct net_bridge *br, u16 vid)
  298. {
  299. struct net_port_vlans *pv;
  300. bool found = false;
  301. rcu_read_lock();
  302. pv = rcu_dereference(br->vlan_info);
  303. if (!pv)
  304. goto out;
  305. if (test_bit(vid, pv->vlan_bitmap))
  306. found = true;
  307. out:
  308. rcu_read_unlock();
  309. return found;
  310. }
  311. /* Must be protected by RTNL. */
  312. static void recalculate_group_addr(struct net_bridge *br)
  313. {
  314. if (br->group_addr_set)
  315. return;
  316. spin_lock_bh(&br->lock);
  317. if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
  318. /* Bridge Group Address */
  319. br->group_addr[5] = 0x00;
  320. } else { /* vlan_enabled && ETH_P_8021AD */
  321. /* Provider Bridge Group Address */
  322. br->group_addr[5] = 0x08;
  323. }
  324. spin_unlock_bh(&br->lock);
  325. }
  326. /* Must be protected by RTNL. */
  327. void br_recalculate_fwd_mask(struct net_bridge *br)
  328. {
  329. if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
  330. br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
  331. else /* vlan_enabled && ETH_P_8021AD */
  332. br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
  333. ~(1u << br->group_addr[5]);
  334. }
  335. int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
  336. {
  337. if (!rtnl_trylock())
  338. return restart_syscall();
  339. if (br->vlan_enabled == val)
  340. goto unlock;
  341. br->vlan_enabled = val;
  342. br_manage_promisc(br);
  343. recalculate_group_addr(br);
  344. br_recalculate_fwd_mask(br);
  345. unlock:
  346. rtnl_unlock();
  347. return 0;
  348. }
  349. int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
  350. {
  351. int err = 0;
  352. struct net_bridge_port *p;
  353. struct net_port_vlans *pv;
  354. __be16 proto, oldproto;
  355. u16 vid, errvid;
  356. if (val != ETH_P_8021Q && val != ETH_P_8021AD)
  357. return -EPROTONOSUPPORT;
  358. if (!rtnl_trylock())
  359. return restart_syscall();
  360. proto = htons(val);
  361. if (br->vlan_proto == proto)
  362. goto unlock;
  363. /* Add VLANs for the new proto to the device filter. */
  364. list_for_each_entry(p, &br->port_list, list) {
  365. pv = rtnl_dereference(p->vlan_info);
  366. if (!pv)
  367. continue;
  368. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID) {
  369. err = vlan_vid_add(p->dev, proto, vid);
  370. if (err)
  371. goto err_filt;
  372. }
  373. }
  374. oldproto = br->vlan_proto;
  375. br->vlan_proto = proto;
  376. recalculate_group_addr(br);
  377. br_recalculate_fwd_mask(br);
  378. /* Delete VLANs for the old proto from the device filter. */
  379. list_for_each_entry(p, &br->port_list, list) {
  380. pv = rtnl_dereference(p->vlan_info);
  381. if (!pv)
  382. continue;
  383. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  384. vlan_vid_del(p->dev, oldproto, vid);
  385. }
  386. unlock:
  387. rtnl_unlock();
  388. return err;
  389. err_filt:
  390. errvid = vid;
  391. for_each_set_bit(vid, pv->vlan_bitmap, errvid)
  392. vlan_vid_del(p->dev, proto, vid);
  393. list_for_each_entry_continue_reverse(p, &br->port_list, list) {
  394. pv = rtnl_dereference(p->vlan_info);
  395. if (!pv)
  396. continue;
  397. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  398. vlan_vid_del(p->dev, proto, vid);
  399. }
  400. goto unlock;
  401. }
  402. void br_vlan_init(struct net_bridge *br)
  403. {
  404. br->vlan_proto = htons(ETH_P_8021Q);
  405. }
  406. /* Must be protected by RTNL.
  407. * Must be called with vid in range from 1 to 4094 inclusive.
  408. */
  409. int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
  410. {
  411. struct net_port_vlans *pv = NULL;
  412. int err;
  413. ASSERT_RTNL();
  414. pv = rtnl_dereference(port->vlan_info);
  415. if (pv)
  416. return __vlan_add(pv, vid, flags);
  417. /* Create port vlan infomration
  418. */
  419. pv = kzalloc(sizeof(*pv), GFP_KERNEL);
  420. if (!pv) {
  421. err = -ENOMEM;
  422. goto clean_up;
  423. }
  424. pv->port_idx = port->port_no;
  425. pv->parent.port = port;
  426. err = __vlan_add(pv, vid, flags);
  427. if (err)
  428. goto clean_up;
  429. rcu_assign_pointer(port->vlan_info, pv);
  430. return 0;
  431. clean_up:
  432. kfree(pv);
  433. return err;
  434. }
  435. /* Must be protected by RTNL.
  436. * Must be called with vid in range from 1 to 4094 inclusive.
  437. */
  438. int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
  439. {
  440. struct net_port_vlans *pv;
  441. ASSERT_RTNL();
  442. pv = rtnl_dereference(port->vlan_info);
  443. if (!pv)
  444. return -EINVAL;
  445. br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
  446. return __vlan_del(pv, vid);
  447. }
  448. void nbp_vlan_flush(struct net_bridge_port *port)
  449. {
  450. struct net_port_vlans *pv;
  451. u16 vid;
  452. ASSERT_RTNL();
  453. pv = rtnl_dereference(port->vlan_info);
  454. if (!pv)
  455. return;
  456. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  457. vlan_vid_del(port->dev, port->br->vlan_proto, vid);
  458. __vlan_flush(pv);
  459. }
  460. bool nbp_vlan_find(struct net_bridge_port *port, u16 vid)
  461. {
  462. struct net_port_vlans *pv;
  463. bool found = false;
  464. rcu_read_lock();
  465. pv = rcu_dereference(port->vlan_info);
  466. if (!pv)
  467. goto out;
  468. if (test_bit(vid, pv->vlan_bitmap))
  469. found = true;
  470. out:
  471. rcu_read_unlock();
  472. return found;
  473. }