br_vlan.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585
  1. #include <linux/kernel.h>
  2. #include <linux/netdevice.h>
  3. #include <linux/rtnetlink.h>
  4. #include <linux/slab.h>
  5. #include "br_private.h"
  6. static void __vlan_add_pvid(struct net_port_vlans *v, u16 vid)
  7. {
  8. if (v->pvid == vid)
  9. return;
  10. smp_wmb();
  11. v->pvid = vid;
  12. }
  13. static void __vlan_delete_pvid(struct net_port_vlans *v, u16 vid)
  14. {
  15. if (v->pvid != vid)
  16. return;
  17. smp_wmb();
  18. v->pvid = 0;
  19. }
  20. static void __vlan_add_flags(struct net_port_vlans *v, u16 vid, u16 flags)
  21. {
  22. if (flags & BRIDGE_VLAN_INFO_PVID)
  23. __vlan_add_pvid(v, vid);
  24. if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
  25. set_bit(vid, v->untagged_bitmap);
  26. }
  27. static int __vlan_add(struct net_port_vlans *v, u16 vid, u16 flags)
  28. {
  29. struct net_bridge_port *p = NULL;
  30. struct net_bridge *br;
  31. struct net_device *dev;
  32. int err;
  33. if (test_bit(vid, v->vlan_bitmap)) {
  34. __vlan_add_flags(v, vid, flags);
  35. return 0;
  36. }
  37. if (v->port_idx) {
  38. p = v->parent.port;
  39. br = p->br;
  40. dev = p->dev;
  41. } else {
  42. br = v->parent.br;
  43. dev = br->dev;
  44. }
  45. if (p) {
  46. /* Add VLAN to the device filter if it is supported.
  47. * This ensures tagged traffic enters the bridge when
  48. * promiscuous mode is disabled by br_manage_promisc().
  49. */
  50. err = vlan_vid_add(dev, br->vlan_proto, vid);
  51. if (err)
  52. return err;
  53. }
  54. err = br_fdb_insert(br, p, dev->dev_addr, vid);
  55. if (err) {
  56. br_err(br, "failed insert local address into bridge "
  57. "forwarding table\n");
  58. goto out_filt;
  59. }
  60. set_bit(vid, v->vlan_bitmap);
  61. v->num_vlans++;
  62. __vlan_add_flags(v, vid, flags);
  63. return 0;
  64. out_filt:
  65. if (p)
  66. vlan_vid_del(dev, br->vlan_proto, vid);
  67. return err;
  68. }
  69. static int __vlan_del(struct net_port_vlans *v, u16 vid)
  70. {
  71. if (!test_bit(vid, v->vlan_bitmap))
  72. return -EINVAL;
  73. __vlan_delete_pvid(v, vid);
  74. clear_bit(vid, v->untagged_bitmap);
  75. if (v->port_idx) {
  76. struct net_bridge_port *p = v->parent.port;
  77. vlan_vid_del(p->dev, p->br->vlan_proto, vid);
  78. }
  79. clear_bit(vid, v->vlan_bitmap);
  80. v->num_vlans--;
  81. if (bitmap_empty(v->vlan_bitmap, VLAN_N_VID)) {
  82. if (v->port_idx)
  83. RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
  84. else
  85. RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
  86. kfree_rcu(v, rcu);
  87. }
  88. return 0;
  89. }
  90. static void __vlan_flush(struct net_port_vlans *v)
  91. {
  92. smp_wmb();
  93. v->pvid = 0;
  94. bitmap_zero(v->vlan_bitmap, VLAN_N_VID);
  95. if (v->port_idx)
  96. RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
  97. else
  98. RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
  99. kfree_rcu(v, rcu);
  100. }
  101. struct sk_buff *br_handle_vlan(struct net_bridge *br,
  102. const struct net_port_vlans *pv,
  103. struct sk_buff *skb)
  104. {
  105. u16 vid;
  106. if (!br->vlan_enabled)
  107. goto out;
  108. /* Vlan filter table must be configured at this point. The
  109. * only exception is the bridge is set in promisc mode and the
  110. * packet is destined for the bridge device. In this case
  111. * pass the packet as is.
  112. */
  113. if (!pv) {
  114. if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
  115. goto out;
  116. } else {
  117. kfree_skb(skb);
  118. return NULL;
  119. }
  120. }
  121. /* At this point, we know that the frame was filtered and contains
  122. * a valid vlan id. If the vlan id is set in the untagged bitmap,
  123. * send untagged; otherwise, send tagged.
  124. */
  125. br_vlan_get_tag(skb, &vid);
  126. if (test_bit(vid, pv->untagged_bitmap))
  127. skb->vlan_tci = 0;
  128. out:
  129. return skb;
  130. }
  131. /* Called under RCU */
  132. bool br_allowed_ingress(struct net_bridge *br, struct net_port_vlans *v,
  133. struct sk_buff *skb, u16 *vid)
  134. {
  135. bool tagged;
  136. __be16 proto;
  137. /* If VLAN filtering is disabled on the bridge, all packets are
  138. * permitted.
  139. */
  140. if (!br->vlan_enabled)
  141. return true;
  142. /* If there are no vlan in the permitted list, all packets are
  143. * rejected.
  144. */
  145. if (!v)
  146. goto drop;
  147. proto = br->vlan_proto;
  148. /* If vlan tx offload is disabled on bridge device and frame was
  149. * sent from vlan device on the bridge device, it does not have
  150. * HW accelerated vlan tag.
  151. */
  152. if (unlikely(!vlan_tx_tag_present(skb) &&
  153. skb->protocol == proto)) {
  154. skb = skb_vlan_untag(skb);
  155. if (unlikely(!skb))
  156. return false;
  157. }
  158. if (!br_vlan_get_tag(skb, vid)) {
  159. /* Tagged frame */
  160. if (skb->vlan_proto != proto) {
  161. /* Protocol-mismatch, empty out vlan_tci for new tag */
  162. skb_push(skb, ETH_HLEN);
  163. skb = __vlan_put_tag(skb, skb->vlan_proto,
  164. vlan_tx_tag_get(skb));
  165. if (unlikely(!skb))
  166. return false;
  167. skb_pull(skb, ETH_HLEN);
  168. skb_reset_mac_len(skb);
  169. *vid = 0;
  170. tagged = false;
  171. } else {
  172. tagged = true;
  173. }
  174. } else {
  175. /* Untagged frame */
  176. tagged = false;
  177. }
  178. if (!*vid) {
  179. u16 pvid = br_get_pvid(v);
  180. /* Frame had a tag with VID 0 or did not have a tag.
  181. * See if pvid is set on this port. That tells us which
  182. * vlan untagged or priority-tagged traffic belongs to.
  183. */
  184. if (pvid == VLAN_N_VID)
  185. goto drop;
  186. /* PVID is set on this port. Any untagged or priority-tagged
  187. * ingress frame is considered to belong to this vlan.
  188. */
  189. *vid = pvid;
  190. if (likely(!tagged))
  191. /* Untagged Frame. */
  192. __vlan_hwaccel_put_tag(skb, proto, pvid);
  193. else
  194. /* Priority-tagged Frame.
  195. * At this point, We know that skb->vlan_tci had
  196. * VLAN_TAG_PRESENT bit and its VID field was 0x000.
  197. * We update only VID field and preserve PCP field.
  198. */
  199. skb->vlan_tci |= pvid;
  200. return true;
  201. }
  202. /* Frame had a valid vlan tag. See if vlan is allowed */
  203. if (test_bit(*vid, v->vlan_bitmap))
  204. return true;
  205. drop:
  206. kfree_skb(skb);
  207. return false;
  208. }
  209. /* Called under RCU. */
  210. bool br_allowed_egress(struct net_bridge *br,
  211. const struct net_port_vlans *v,
  212. const struct sk_buff *skb)
  213. {
  214. u16 vid;
  215. if (!br->vlan_enabled)
  216. return true;
  217. if (!v)
  218. return false;
  219. br_vlan_get_tag(skb, &vid);
  220. if (test_bit(vid, v->vlan_bitmap))
  221. return true;
  222. return false;
  223. }
  224. /* Called under RCU */
  225. bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
  226. {
  227. struct net_bridge *br = p->br;
  228. struct net_port_vlans *v;
  229. if (!br->vlan_enabled)
  230. return true;
  231. v = rcu_dereference(p->vlan_info);
  232. if (!v)
  233. return false;
  234. if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
  235. *vid = 0;
  236. if (!*vid) {
  237. *vid = br_get_pvid(v);
  238. if (*vid == VLAN_N_VID)
  239. return false;
  240. return true;
  241. }
  242. if (test_bit(*vid, v->vlan_bitmap))
  243. return true;
  244. return false;
  245. }
  246. /* Must be protected by RTNL.
  247. * Must be called with vid in range from 1 to 4094 inclusive.
  248. */
  249. int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
  250. {
  251. struct net_port_vlans *pv = NULL;
  252. int err;
  253. ASSERT_RTNL();
  254. pv = rtnl_dereference(br->vlan_info);
  255. if (pv)
  256. return __vlan_add(pv, vid, flags);
  257. /* Create port vlan infomration
  258. */
  259. pv = kzalloc(sizeof(*pv), GFP_KERNEL);
  260. if (!pv)
  261. return -ENOMEM;
  262. pv->parent.br = br;
  263. err = __vlan_add(pv, vid, flags);
  264. if (err)
  265. goto out;
  266. rcu_assign_pointer(br->vlan_info, pv);
  267. return 0;
  268. out:
  269. kfree(pv);
  270. return err;
  271. }
  272. /* Must be protected by RTNL.
  273. * Must be called with vid in range from 1 to 4094 inclusive.
  274. */
  275. int br_vlan_delete(struct net_bridge *br, u16 vid)
  276. {
  277. struct net_port_vlans *pv;
  278. ASSERT_RTNL();
  279. pv = rtnl_dereference(br->vlan_info);
  280. if (!pv)
  281. return -EINVAL;
  282. br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
  283. __vlan_del(pv, vid);
  284. return 0;
  285. }
  286. void br_vlan_flush(struct net_bridge *br)
  287. {
  288. struct net_port_vlans *pv;
  289. ASSERT_RTNL();
  290. pv = rtnl_dereference(br->vlan_info);
  291. if (!pv)
  292. return;
  293. __vlan_flush(pv);
  294. }
  295. bool br_vlan_find(struct net_bridge *br, u16 vid)
  296. {
  297. struct net_port_vlans *pv;
  298. bool found = false;
  299. rcu_read_lock();
  300. pv = rcu_dereference(br->vlan_info);
  301. if (!pv)
  302. goto out;
  303. if (test_bit(vid, pv->vlan_bitmap))
  304. found = true;
  305. out:
  306. rcu_read_unlock();
  307. return found;
  308. }
  309. /* Must be protected by RTNL. */
  310. static void recalculate_group_addr(struct net_bridge *br)
  311. {
  312. if (br->group_addr_set)
  313. return;
  314. spin_lock_bh(&br->lock);
  315. if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q)) {
  316. /* Bridge Group Address */
  317. br->group_addr[5] = 0x00;
  318. } else { /* vlan_enabled && ETH_P_8021AD */
  319. /* Provider Bridge Group Address */
  320. br->group_addr[5] = 0x08;
  321. }
  322. spin_unlock_bh(&br->lock);
  323. }
  324. /* Must be protected by RTNL. */
  325. void br_recalculate_fwd_mask(struct net_bridge *br)
  326. {
  327. if (!br->vlan_enabled || br->vlan_proto == htons(ETH_P_8021Q))
  328. br->group_fwd_mask_required = BR_GROUPFWD_DEFAULT;
  329. else /* vlan_enabled && ETH_P_8021AD */
  330. br->group_fwd_mask_required = BR_GROUPFWD_8021AD &
  331. ~(1u << br->group_addr[5]);
  332. }
  333. int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
  334. {
  335. if (!rtnl_trylock())
  336. return restart_syscall();
  337. if (br->vlan_enabled == val)
  338. goto unlock;
  339. br->vlan_enabled = val;
  340. br_manage_promisc(br);
  341. recalculate_group_addr(br);
  342. br_recalculate_fwd_mask(br);
  343. unlock:
  344. rtnl_unlock();
  345. return 0;
  346. }
  347. int br_vlan_set_proto(struct net_bridge *br, unsigned long val)
  348. {
  349. int err = 0;
  350. struct net_bridge_port *p;
  351. struct net_port_vlans *pv;
  352. __be16 proto, oldproto;
  353. u16 vid, errvid;
  354. if (val != ETH_P_8021Q && val != ETH_P_8021AD)
  355. return -EPROTONOSUPPORT;
  356. if (!rtnl_trylock())
  357. return restart_syscall();
  358. proto = htons(val);
  359. if (br->vlan_proto == proto)
  360. goto unlock;
  361. /* Add VLANs for the new proto to the device filter. */
  362. list_for_each_entry(p, &br->port_list, list) {
  363. pv = rtnl_dereference(p->vlan_info);
  364. if (!pv)
  365. continue;
  366. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID) {
  367. err = vlan_vid_add(p->dev, proto, vid);
  368. if (err)
  369. goto err_filt;
  370. }
  371. }
  372. oldproto = br->vlan_proto;
  373. br->vlan_proto = proto;
  374. recalculate_group_addr(br);
  375. br_recalculate_fwd_mask(br);
  376. /* Delete VLANs for the old proto from the device filter. */
  377. list_for_each_entry(p, &br->port_list, list) {
  378. pv = rtnl_dereference(p->vlan_info);
  379. if (!pv)
  380. continue;
  381. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  382. vlan_vid_del(p->dev, oldproto, vid);
  383. }
  384. unlock:
  385. rtnl_unlock();
  386. return err;
  387. err_filt:
  388. errvid = vid;
  389. for_each_set_bit(vid, pv->vlan_bitmap, errvid)
  390. vlan_vid_del(p->dev, proto, vid);
  391. list_for_each_entry_continue_reverse(p, &br->port_list, list) {
  392. pv = rtnl_dereference(p->vlan_info);
  393. if (!pv)
  394. continue;
  395. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  396. vlan_vid_del(p->dev, proto, vid);
  397. }
  398. goto unlock;
  399. }
  400. void br_vlan_init(struct net_bridge *br)
  401. {
  402. br->vlan_proto = htons(ETH_P_8021Q);
  403. }
  404. /* Must be protected by RTNL.
  405. * Must be called with vid in range from 1 to 4094 inclusive.
  406. */
  407. int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
  408. {
  409. struct net_port_vlans *pv = NULL;
  410. int err;
  411. ASSERT_RTNL();
  412. pv = rtnl_dereference(port->vlan_info);
  413. if (pv)
  414. return __vlan_add(pv, vid, flags);
  415. /* Create port vlan infomration
  416. */
  417. pv = kzalloc(sizeof(*pv), GFP_KERNEL);
  418. if (!pv) {
  419. err = -ENOMEM;
  420. goto clean_up;
  421. }
  422. pv->port_idx = port->port_no;
  423. pv->parent.port = port;
  424. err = __vlan_add(pv, vid, flags);
  425. if (err)
  426. goto clean_up;
  427. rcu_assign_pointer(port->vlan_info, pv);
  428. return 0;
  429. clean_up:
  430. kfree(pv);
  431. return err;
  432. }
  433. /* Must be protected by RTNL.
  434. * Must be called with vid in range from 1 to 4094 inclusive.
  435. */
  436. int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
  437. {
  438. struct net_port_vlans *pv;
  439. ASSERT_RTNL();
  440. pv = rtnl_dereference(port->vlan_info);
  441. if (!pv)
  442. return -EINVAL;
  443. br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
  444. return __vlan_del(pv, vid);
  445. }
  446. void nbp_vlan_flush(struct net_bridge_port *port)
  447. {
  448. struct net_port_vlans *pv;
  449. u16 vid;
  450. ASSERT_RTNL();
  451. pv = rtnl_dereference(port->vlan_info);
  452. if (!pv)
  453. return;
  454. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  455. vlan_vid_del(port->dev, port->br->vlan_proto, vid);
  456. __vlan_flush(pv);
  457. }
  458. bool nbp_vlan_find(struct net_bridge_port *port, u16 vid)
  459. {
  460. struct net_port_vlans *pv;
  461. bool found = false;
  462. rcu_read_lock();
  463. pv = rcu_dereference(port->vlan_info);
  464. if (!pv)
  465. goto out;
  466. if (test_bit(vid, pv->vlan_bitmap))
  467. found = true;
  468. out:
  469. rcu_read_unlock();
  470. return found;
  471. }