br_vlan.c 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424
  1. #include <linux/kernel.h>
  2. #include <linux/netdevice.h>
  3. #include <linux/rtnetlink.h>
  4. #include <linux/slab.h>
  5. #include "br_private.h"
  6. static void __vlan_add_pvid(struct net_port_vlans *v, u16 vid)
  7. {
  8. if (v->pvid == vid)
  9. return;
  10. smp_wmb();
  11. v->pvid = vid;
  12. }
  13. static void __vlan_delete_pvid(struct net_port_vlans *v, u16 vid)
  14. {
  15. if (v->pvid != vid)
  16. return;
  17. smp_wmb();
  18. v->pvid = 0;
  19. }
  20. static void __vlan_add_flags(struct net_port_vlans *v, u16 vid, u16 flags)
  21. {
  22. if (flags & BRIDGE_VLAN_INFO_PVID)
  23. __vlan_add_pvid(v, vid);
  24. if (flags & BRIDGE_VLAN_INFO_UNTAGGED)
  25. set_bit(vid, v->untagged_bitmap);
  26. }
  27. static int __vlan_add(struct net_port_vlans *v, u16 vid, u16 flags)
  28. {
  29. struct net_bridge_port *p = NULL;
  30. struct net_bridge *br;
  31. struct net_device *dev;
  32. int err;
  33. if (test_bit(vid, v->vlan_bitmap)) {
  34. __vlan_add_flags(v, vid, flags);
  35. return 0;
  36. }
  37. if (v->port_idx) {
  38. p = v->parent.port;
  39. br = p->br;
  40. dev = p->dev;
  41. } else {
  42. br = v->parent.br;
  43. dev = br->dev;
  44. }
  45. if (p) {
  46. /* Add VLAN to the device filter if it is supported.
  47. * Stricly speaking, this is not necessary now, since
  48. * devices are made promiscuous by the bridge, but if
  49. * that ever changes this code will allow tagged
  50. * traffic to enter the bridge.
  51. */
  52. err = vlan_vid_add(dev, htons(ETH_P_8021Q), vid);
  53. if (err)
  54. return err;
  55. }
  56. err = br_fdb_insert(br, p, dev->dev_addr, vid);
  57. if (err) {
  58. br_err(br, "failed insert local address into bridge "
  59. "forwarding table\n");
  60. goto out_filt;
  61. }
  62. set_bit(vid, v->vlan_bitmap);
  63. v->num_vlans++;
  64. __vlan_add_flags(v, vid, flags);
  65. return 0;
  66. out_filt:
  67. if (p)
  68. vlan_vid_del(dev, htons(ETH_P_8021Q), vid);
  69. return err;
  70. }
  71. static int __vlan_del(struct net_port_vlans *v, u16 vid)
  72. {
  73. if (!test_bit(vid, v->vlan_bitmap))
  74. return -EINVAL;
  75. __vlan_delete_pvid(v, vid);
  76. clear_bit(vid, v->untagged_bitmap);
  77. if (v->port_idx)
  78. vlan_vid_del(v->parent.port->dev, htons(ETH_P_8021Q), vid);
  79. clear_bit(vid, v->vlan_bitmap);
  80. v->num_vlans--;
  81. if (bitmap_empty(v->vlan_bitmap, VLAN_N_VID)) {
  82. if (v->port_idx)
  83. rcu_assign_pointer(v->parent.port->vlan_info, NULL);
  84. else
  85. rcu_assign_pointer(v->parent.br->vlan_info, NULL);
  86. kfree_rcu(v, rcu);
  87. }
  88. return 0;
  89. }
  90. static void __vlan_flush(struct net_port_vlans *v)
  91. {
  92. smp_wmb();
  93. v->pvid = 0;
  94. bitmap_zero(v->vlan_bitmap, VLAN_N_VID);
  95. if (v->port_idx)
  96. rcu_assign_pointer(v->parent.port->vlan_info, NULL);
  97. else
  98. rcu_assign_pointer(v->parent.br->vlan_info, NULL);
  99. kfree_rcu(v, rcu);
  100. }
  101. /* Strip the tag from the packet. Will return skb with tci set 0. */
  102. static struct sk_buff *br_vlan_untag(struct sk_buff *skb)
  103. {
  104. if (skb->protocol != htons(ETH_P_8021Q)) {
  105. skb->vlan_tci = 0;
  106. return skb;
  107. }
  108. skb->vlan_tci = 0;
  109. skb = vlan_untag(skb);
  110. if (skb)
  111. skb->vlan_tci = 0;
  112. return skb;
  113. }
  114. struct sk_buff *br_handle_vlan(struct net_bridge *br,
  115. const struct net_port_vlans *pv,
  116. struct sk_buff *skb)
  117. {
  118. u16 vid;
  119. if (!br->vlan_enabled)
  120. goto out;
  121. /* At this point, we know that the frame was filtered and contains
  122. * a valid vlan id. If the vlan id is set in the untagged bitmap,
  123. * send untagged; otherwise, send taged.
  124. */
  125. br_vlan_get_tag(skb, &vid);
  126. if (test_bit(vid, pv->untagged_bitmap))
  127. skb = br_vlan_untag(skb);
  128. else {
  129. /* Egress policy says "send tagged". If output device
  130. * is the bridge, we need to add the VLAN header
  131. * ourselves since we'll be going through the RX path.
  132. * Sending to ports puts the frame on the TX path and
  133. * we let dev_hard_start_xmit() add the header.
  134. */
  135. if (skb->protocol != htons(ETH_P_8021Q) &&
  136. pv->port_idx == 0) {
  137. /* vlan_put_tag expects skb->data to point to
  138. * mac header.
  139. */
  140. skb_push(skb, ETH_HLEN);
  141. skb = __vlan_put_tag(skb, skb->vlan_proto, skb->vlan_tci);
  142. if (!skb)
  143. goto out;
  144. /* put skb->data back to where it was */
  145. skb_pull(skb, ETH_HLEN);
  146. skb->vlan_tci = 0;
  147. }
  148. }
  149. out:
  150. return skb;
  151. }
  152. /* Called under RCU */
  153. bool br_allowed_ingress(struct net_bridge *br, struct net_port_vlans *v,
  154. struct sk_buff *skb, u16 *vid)
  155. {
  156. int err;
  157. /* If VLAN filtering is disabled on the bridge, all packets are
  158. * permitted.
  159. */
  160. if (!br->vlan_enabled)
  161. return true;
  162. /* If there are no vlan in the permitted list, all packets are
  163. * rejected.
  164. */
  165. if (!v)
  166. return false;
  167. err = br_vlan_get_tag(skb, vid);
  168. if (!*vid) {
  169. u16 pvid = br_get_pvid(v);
  170. /* Frame had a tag with VID 0 or did not have a tag.
  171. * See if pvid is set on this port. That tells us which
  172. * vlan untagged or priority-tagged traffic belongs to.
  173. */
  174. if (pvid == VLAN_N_VID)
  175. return false;
  176. /* PVID is set on this port. Any untagged or priority-tagged
  177. * ingress frame is considered to belong to this vlan.
  178. */
  179. *vid = pvid;
  180. if (likely(err))
  181. /* Untagged Frame. */
  182. __vlan_hwaccel_put_tag(skb, htons(ETH_P_8021Q), pvid);
  183. else
  184. /* Priority-tagged Frame.
  185. * At this point, We know that skb->vlan_tci had
  186. * VLAN_TAG_PRESENT bit and its VID field was 0x000.
  187. * We update only VID field and preserve PCP field.
  188. */
  189. skb->vlan_tci |= pvid;
  190. return true;
  191. }
  192. /* Frame had a valid vlan tag. See if vlan is allowed */
  193. if (test_bit(*vid, v->vlan_bitmap))
  194. return true;
  195. return false;
  196. }
  197. /* Called under RCU. */
  198. bool br_allowed_egress(struct net_bridge *br,
  199. const struct net_port_vlans *v,
  200. const struct sk_buff *skb)
  201. {
  202. u16 vid;
  203. if (!br->vlan_enabled)
  204. return true;
  205. if (!v)
  206. return false;
  207. br_vlan_get_tag(skb, &vid);
  208. if (test_bit(vid, v->vlan_bitmap))
  209. return true;
  210. return false;
  211. }
  212. /* Must be protected by RTNL.
  213. * Must be called with vid in range from 1 to 4094 inclusive.
  214. */
  215. int br_vlan_add(struct net_bridge *br, u16 vid, u16 flags)
  216. {
  217. struct net_port_vlans *pv = NULL;
  218. int err;
  219. ASSERT_RTNL();
  220. pv = rtnl_dereference(br->vlan_info);
  221. if (pv)
  222. return __vlan_add(pv, vid, flags);
  223. /* Create port vlan infomration
  224. */
  225. pv = kzalloc(sizeof(*pv), GFP_KERNEL);
  226. if (!pv)
  227. return -ENOMEM;
  228. pv->parent.br = br;
  229. err = __vlan_add(pv, vid, flags);
  230. if (err)
  231. goto out;
  232. rcu_assign_pointer(br->vlan_info, pv);
  233. return 0;
  234. out:
  235. kfree(pv);
  236. return err;
  237. }
  238. /* Must be protected by RTNL.
  239. * Must be called with vid in range from 1 to 4094 inclusive.
  240. */
  241. int br_vlan_delete(struct net_bridge *br, u16 vid)
  242. {
  243. struct net_port_vlans *pv;
  244. ASSERT_RTNL();
  245. pv = rtnl_dereference(br->vlan_info);
  246. if (!pv)
  247. return -EINVAL;
  248. spin_lock_bh(&br->hash_lock);
  249. fdb_delete_by_addr(br, br->dev->dev_addr, vid);
  250. spin_unlock_bh(&br->hash_lock);
  251. __vlan_del(pv, vid);
  252. return 0;
  253. }
  254. void br_vlan_flush(struct net_bridge *br)
  255. {
  256. struct net_port_vlans *pv;
  257. ASSERT_RTNL();
  258. pv = rtnl_dereference(br->vlan_info);
  259. if (!pv)
  260. return;
  261. __vlan_flush(pv);
  262. }
  263. int br_vlan_filter_toggle(struct net_bridge *br, unsigned long val)
  264. {
  265. if (!rtnl_trylock())
  266. return restart_syscall();
  267. if (br->vlan_enabled == val)
  268. goto unlock;
  269. br->vlan_enabled = val;
  270. unlock:
  271. rtnl_unlock();
  272. return 0;
  273. }
  274. /* Must be protected by RTNL.
  275. * Must be called with vid in range from 1 to 4094 inclusive.
  276. */
  277. int nbp_vlan_add(struct net_bridge_port *port, u16 vid, u16 flags)
  278. {
  279. struct net_port_vlans *pv = NULL;
  280. int err;
  281. ASSERT_RTNL();
  282. pv = rtnl_dereference(port->vlan_info);
  283. if (pv)
  284. return __vlan_add(pv, vid, flags);
  285. /* Create port vlan infomration
  286. */
  287. pv = kzalloc(sizeof(*pv), GFP_KERNEL);
  288. if (!pv) {
  289. err = -ENOMEM;
  290. goto clean_up;
  291. }
  292. pv->port_idx = port->port_no;
  293. pv->parent.port = port;
  294. err = __vlan_add(pv, vid, flags);
  295. if (err)
  296. goto clean_up;
  297. rcu_assign_pointer(port->vlan_info, pv);
  298. return 0;
  299. clean_up:
  300. kfree(pv);
  301. return err;
  302. }
  303. /* Must be protected by RTNL.
  304. * Must be called with vid in range from 1 to 4094 inclusive.
  305. */
  306. int nbp_vlan_delete(struct net_bridge_port *port, u16 vid)
  307. {
  308. struct net_port_vlans *pv;
  309. ASSERT_RTNL();
  310. pv = rtnl_dereference(port->vlan_info);
  311. if (!pv)
  312. return -EINVAL;
  313. spin_lock_bh(&port->br->hash_lock);
  314. fdb_delete_by_addr(port->br, port->dev->dev_addr, vid);
  315. spin_unlock_bh(&port->br->hash_lock);
  316. return __vlan_del(pv, vid);
  317. }
  318. void nbp_vlan_flush(struct net_bridge_port *port)
  319. {
  320. struct net_port_vlans *pv;
  321. u16 vid;
  322. ASSERT_RTNL();
  323. pv = rtnl_dereference(port->vlan_info);
  324. if (!pv)
  325. return;
  326. for_each_set_bit(vid, pv->vlan_bitmap, VLAN_N_VID)
  327. vlan_vid_del(port->dev, htons(ETH_P_8021Q), vid);
  328. __vlan_flush(pv);
  329. }
  330. bool nbp_vlan_find(struct net_bridge_port *port, u16 vid)
  331. {
  332. struct net_port_vlans *pv;
  333. bool found = false;
  334. rcu_read_lock();
  335. pv = rcu_dereference(port->vlan_info);
  336. if (!pv)
  337. goto out;
  338. if (test_bit(vid, pv->vlan_bitmap))
  339. found = true;
  340. out:
  341. rcu_read_unlock();
  342. return found;
  343. }