br_vlan.c 9.4 KB
Newer Older
1 2 3 4 5 6 7
#include <linux/kernel.h>
#include <linux/netdevice.h>
#include <linux/rtnetlink.h>
#include <linux/slab.h>

#include "br_private.h"

8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
static void __vlan_add_pvid(struct net_port_vlans *v, u16 vid)
{
	if (v->pvid == vid)
		return;

	smp_wmb();
	v->pvid = vid;
}

static void __vlan_delete_pvid(struct net_port_vlans *v, u16 vid)
{
	if (v->pvid != vid)
		return;

	smp_wmb();
	v->pvid = 0;
}

26 27 28 29 30 31 32 33 34
static void __vlan_add_flags(struct net_port_vlans *v, u16 vid, u16 flags)
{
	if (flags & BRIDGE_VLAN_INFO_PVID)
		__vlan_add_pvid(v, vid);

	if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
		set_bit(vid, v->untagged_bitmap);
}

35
static int __vlan_add(struct net_port_vlans *v, u16 vid, u16 flags)
36
{
37 38 39
	struct net_bridge_port *p = NULL;
	struct net_bridge *br;
	struct net_device *dev;
40 41
	int err;

42
	if (test_bit(vid, v->vlan_bitmap)) {
43
		__vlan_add_flags(v, vid, flags);
44 45
		return 0;
	}
46

47 48 49 50 51 52 53 54 55
	if (v->port_idx) {
		p = v->parent.port;
		br = p->br;
		dev = p->dev;
	} else {
		br = v->parent.br;
		dev = br->dev;
	}

56
	if (p) {
57 58 59 60 61 62
		/* Add VLAN to the device filter if it is supported.
		 * Stricly speaking, this is not necessary now, since
		 * devices are made promiscuous by the bridge, but if
		 * that ever changes this code will allow tagged
		 * traffic to enter the bridge.
		 */
63
		err = vlan_vid_add(dev, br->vlan_proto, vid);
64 65 66
		if (err)
			return err;
	}
67

68 69 70 71 72
	err = br_fdb_insert(br, p, dev->dev_addr, vid);
	if (err) {
		br_err(br, "failed insert local address into bridge "
		       "forwarding table\n");
		goto out_filt;
73 74 75
	}

	set_bit(vid, v->vlan_bitmap);
76
	v->num_vlans++;
77
	__vlan_add_flags(v, vid, flags);
78

79
	return 0;
80 81

out_filt:
82
	if (p)
83
		vlan_vid_del(dev, br->vlan_proto, vid);
84
	return err;
85 86 87 88 89 90 91
}

static int __vlan_del(struct net_port_vlans *v, u16 vid)
{
	if (!test_bit(vid, v->vlan_bitmap))
		return -EINVAL;

92
	__vlan_delete_pvid(v, vid);
93
	clear_bit(vid, v->untagged_bitmap);
94

95 96 97 98
	if (v->port_idx) {
		struct net_bridge_port *p = v->parent.port;
		vlan_vid_del(p->dev, p->br->vlan_proto, vid);
	}
99 100

	clear_bit(vid, v->vlan_bitmap);
101
	v->num_vlans--;
102
	if (bitmap_empty(v->vlan_bitmap, VLAN_N_VID)) {
103
		if (v->port_idx)
104
			RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
105
		else
106
			RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
107 108 109 110 111 112 113
		kfree_rcu(v, rcu);
	}
	return 0;
}

static void __vlan_flush(struct net_port_vlans *v)
{
114 115
	smp_wmb();
	v->pvid = 0;
116
	bitmap_zero(v->vlan_bitmap, VLAN_N_VID);
117
	if (v->port_idx)
118
		RCU_INIT_POINTER(v->parent.port->vlan_info, NULL);
119
	else
120
		RCU_INIT_POINTER(v->parent.br->vlan_info, NULL);
121 122 123
	kfree_rcu(v, rcu);
}

124 125 126
struct sk_buff *br_handle_vlan(struct net_bridge *br,
			       const struct net_port_vlans *pv,
			       struct sk_buff *skb)
127 128 129
{
	u16 vid;

130 131 132
	if (!br->vlan_enabled)
		goto out;

133 134 135 136 137 138 139 140 141 142 143 144 145 146
	/* Vlan filter table must be configured at this point.  The
	 * only exception is the bridge is set in promisc mode and the
	 * packet is destined for the bridge device.  In this case
	 * pass the packet as is.
	 */
	if (!pv) {
		if ((br->dev->flags & IFF_PROMISC) && skb->dev == br->dev) {
			goto out;
		} else {
			kfree_skb(skb);
			return NULL;
		}
	}

147
	/* At this point, we know that the frame was filtered and contains
148
	 * a valid vlan id.  If the vlan id is set in the untagged bitmap,
T
tanxiaojun 已提交
149
	 * send untagged; otherwise, send tagged.
150 151
	 */
	br_vlan_get_tag(skb, &vid);
152
	if (test_bit(vid, pv->untagged_bitmap))
153
		skb->vlan_tci = 0;
154 155 156 157 158 159 160 161 162

out:
	return skb;
}

/* Called under RCU */
bool br_allowed_ingress(struct net_bridge *br, struct net_port_vlans *v,
			struct sk_buff *skb, u16 *vid)
{
163 164
	bool tagged;
	__be16 proto;
165

166 167 168 169 170 171 172 173 174 175
	/* If VLAN filtering is disabled on the bridge, all packets are
	 * permitted.
	 */
	if (!br->vlan_enabled)
		return true;

	/* If there are no vlan in the permitted list, all packets are
	 * rejected.
	 */
	if (!v)
176
		goto drop;
177

178 179
	proto = br->vlan_proto;

180 181 182 183 184
	/* If vlan tx offload is disabled on bridge device and frame was
	 * sent from vlan device on the bridge device, it does not have
	 * HW accelerated vlan tag.
	 */
	if (unlikely(!vlan_tx_tag_present(skb) &&
185
		     skb->protocol == proto)) {
186 187 188 189 190
		skb = vlan_untag(skb);
		if (unlikely(!skb))
			return false;
	}

191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212
	if (!br_vlan_get_tag(skb, vid)) {
		/* Tagged frame */
		if (skb->vlan_proto != proto) {
			/* Protocol-mismatch, empty out vlan_tci for new tag */
			skb_push(skb, ETH_HLEN);
			skb = __vlan_put_tag(skb, skb->vlan_proto,
					     vlan_tx_tag_get(skb));
			if (unlikely(!skb))
				return false;

			skb_pull(skb, ETH_HLEN);
			skb_reset_mac_len(skb);
			*vid = 0;
			tagged = false;
		} else {
			tagged = true;
		}
	} else {
		/* Untagged frame */
		tagged = false;
	}

213
	if (!*vid) {
214 215
		u16 pvid = br_get_pvid(v);

216 217 218
		/* Frame had a tag with VID 0 or did not have a tag.
		 * See if pvid is set on this port.  That tells us which
		 * vlan untagged or priority-tagged traffic belongs to.
219 220
		 */
		if (pvid == VLAN_N_VID)
221
			goto drop;
222

223 224
		/* PVID is set on this port.  Any untagged or priority-tagged
		 * ingress frame is considered to belong to this vlan.
225
		 */
226
		*vid = pvid;
227
		if (likely(!tagged))
228
			/* Untagged Frame. */
229
			__vlan_hwaccel_put_tag(skb, proto, pvid);
230 231 232 233 234 235 236 237
		else
			/* Priority-tagged Frame.
			 * At this point, We know that skb->vlan_tci had
			 * VLAN_TAG_PRESENT bit and its VID field was 0x000.
			 * We update only VID field and preserve PCP field.
			 */
			skb->vlan_tci |= pvid;

238 239 240 241 242
		return true;
	}

	/* Frame had a valid vlan tag.  See if vlan is allowed */
	if (test_bit(*vid, v->vlan_bitmap))
243
		return true;
244 245
drop:
	kfree_skb(skb);
246 247 248
	return false;
}

249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268
/* Called under RCU. */
bool br_allowed_egress(struct net_bridge *br,
		       const struct net_port_vlans *v,
		       const struct sk_buff *skb)
{
	u16 vid;

	if (!br->vlan_enabled)
		return true;

	if (!v)
		return false;

	br_vlan_get_tag(skb, &vid);
	if (test_bit(vid, v->vlan_bitmap))
		return true;

	return false;
}

269 270 271 272 273 274 275 276 277 278 279 280 281
/* Called under RCU */
bool br_should_learn(struct net_bridge_port *p, struct sk_buff *skb, u16 *vid)
{
	struct net_bridge *br = p->br;
	struct net_port_vlans *v;

	if (!br->vlan_enabled)
		return true;

	v = rcu_dereference(p->vlan_info);
	if (!v)
		return false;

282 283 284
	if (!br_vlan_get_tag(skb, vid) && skb->vlan_proto != br->vlan_proto)
		*vid = 0;

285 286 287 288 289 290 291 292 293 294 295 296 297 298
	if (!*vid) {
		*vid = br_get_pvid(v);
		if (*vid == VLAN_N_VID)
			return false;

		return true;
	}

	if (test_bit(*vid, v->vlan_bitmap))
		return true;

	return false;
}

299 300 301
/* Must be protected by RTNL.
 * Must be called with vid in range from 1 to 4094 inclusive.
 */
302
int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
303 304 305 306 307 308 309 310
{
	struct net_port_vlans *pv = NULL;
	int err;

	ASSERT_RTNL();

	pv = rtnl_dereference(br->vlan_info);
	if (pv)
311
		return __vlan_add(pv, vid, flags);
312 313 314 315 316 317 318 319

	/* Create port vlan infomration
	 */
	pv = kzalloc(sizeof(*pv), GFP_KERNEL);
	if (!pv)
		return -ENOMEM;

	pv->parent.br = br;
320
	err = __vlan_add(pv, vid, flags);
321 322 323 324 325 326 327 328 329 330
	if (err)
		goto out;

	rcu_assign_pointer(br->vlan_info, pv);
	return 0;
out:
	kfree(pv);
	return err;
}

331 332 333
/* Must be protected by RTNL.
 * Must be called with vid in range from 1 to 4094 inclusive.
 */
334 335 336 337 338 339 340 341 342 343
int br_vlan_delete(struct net_bridge *br, u16 vid)
{
	struct net_port_vlans *pv;

	ASSERT_RTNL();

	pv = rtnl_dereference(br->vlan_info);
	if (!pv)
		return -EINVAL;

344
	br_fdb_find_delete_local(br, NULL, br->dev->dev_addr, vid);
345

346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
	__vlan_del(pv, vid);
	return 0;
}

void br_vlan_flush(struct net_bridge *br)
{
	struct net_port_vlans *pv;

	ASSERT_RTNL();
	pv = rtnl_dereference(br->vlan_info);
	if (!pv)
		return;

	__vlan_flush(pv);
}

362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380
bool br_vlan_find(struct net_bridge *br, u16 vid)
{
	struct net_port_vlans *pv;
	bool found = false;

	rcu_read_lock();
	pv = rcu_dereference(br->vlan_info);

	if (!pv)
		goto out;

	if (test_bit(vid, pv->vlan_bitmap))
		found = true;

out:
	rcu_read_unlock();
	return found;
}

381 382 383 384 385 386 387 388 389
int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
{
	if (!rtnl_trylock())
		return restart_syscall();

	if (br->vlan_enabled == val)
		goto unlock;

	br->vlan_enabled = val;
390
	br_manage_promisc(br);
391 392 393 394 395 396

unlock:
	rtnl_unlock();
	return 0;
}

397 398 399 400 401
void br_vlan_init(struct net_bridge *br)
{
	br->vlan_proto = htons(ETH_P_8021Q);
}

402 403 404
/* Must be protected by RTNL.
 * Must be called with vid in range from 1 to 4094 inclusive.
 */
405
int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
406 407 408 409 410 411 412 413
{
	struct net_port_vlans *pv = NULL;
	int err;

	ASSERT_RTNL();

	pv = rtnl_dereference(port->vlan_info);
	if (pv)
414
		return __vlan_add(pv, vid, flags);
415 416 417 418 419 420 421 422 423 424 425

	/* Create port vlan infomration
	 */
	pv = kzalloc(sizeof(*pv), GFP_KERNEL);
	if (!pv) {
		err = -ENOMEM;
		goto clean_up;
	}

	pv->port_idx = port->port_no;
	pv->parent.port = port;
426
	err = __vlan_add(pv, vid, flags);
427 428 429 430 431 432 433 434 435 436 437
	if (err)
		goto clean_up;

	rcu_assign_pointer(port->vlan_info, pv);
	return 0;

clean_up:
	kfree(pv);
	return err;
}

438 439 440
/* Must be protected by RTNL.
 * Must be called with vid in range from 1 to 4094 inclusive.
 */
441 442 443 444 445 446 447 448 449 450
int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
{
	struct net_port_vlans *pv;

	ASSERT_RTNL();

	pv = rtnl_dereference(port->vlan_info);
	if (!pv)
		return -EINVAL;

451
	br_fdb_find_delete_local(port->br, port, port->dev->dev_addr, vid);
452

453 454 455 456 457 458
	return __vlan_del(pv, vid);
}

void nbp_vlan_flush(struct net_bridge_port *port)
{
	struct net_port_vlans *pv;
459
	u16 vid;
460 461 462 463 464 465 466

	ASSERT_RTNL();

	pv = rtnl_dereference(port->vlan_info);
	if (!pv)
		return;

467
	for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
468
		vlan_vid_del(port->dev, port->br->vlan_proto, vid);
469

470 471
	__vlan_flush(pv);
}
472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490

bool nbp_vlan_find(struct net_bridge_port *port, u16 vid)
{
	struct net_port_vlans *pv;
	bool found = false;

	rcu_read_lock();
	pv = rcu_dereference(port->vlan_info);

	if (!pv)
		goto out;

	if (test_bit(vid, pv->vlan_bitmap))
		found = true;

out:
	rcu_read_unlock();
	return found;
}