Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Forwarding database | |
3 | * Linux ethernet bridge | |
4 | * | |
5 | * Authors: | |
6 | * Lennert Buytenhek <buytenh@gnu.org> | |
7 | * | |
1da177e4 LT |
8 | * This program is free software; you can redistribute it and/or |
9 | * modify it under the terms of the GNU General Public License | |
10 | * as published by the Free Software Foundation; either version | |
11 | * 2 of the License, or (at your option) any later version. | |
12 | */ | |
13 | ||
14 | #include <linux/kernel.h> | |
15 | #include <linux/init.h> | |
82524746 | 16 | #include <linux/rculist.h> |
1da177e4 LT |
17 | #include <linux/spinlock.h> |
18 | #include <linux/times.h> | |
19 | #include <linux/netdevice.h> | |
20 | #include <linux/etherdevice.h> | |
21 | #include <linux/jhash.h> | |
3f890923 | 22 | #include <linux/random.h> |
5a0e3ad6 | 23 | #include <linux/slab.h> |
60063497 | 24 | #include <linux/atomic.h> |
3f890923 | 25 | #include <asm/unaligned.h> |
2ba071ec | 26 | #include <linux/if_vlan.h> |
b4ad7baa | 27 | #include <net/switchdev.h> |
b74fd306 | 28 | #include <trace/events/bridge.h> |
1da177e4 LT |
29 | #include "br_private.h" |
30 | ||
eb793583 NA |
31 | static const struct rhashtable_params br_fdb_rht_params = { |
32 | .head_offset = offsetof(struct net_bridge_fdb_entry, rhnode), | |
33 | .key_offset = offsetof(struct net_bridge_fdb_entry, key), | |
34 | .key_len = sizeof(struct net_bridge_fdb_key), | |
35 | .automatic_shrinking = true, | |
36 | .locks_mul = 1, | |
37 | }; | |
38 | ||
e18b890b | 39 | static struct kmem_cache *br_fdb_cache __read_mostly; |
1da177e4 | 40 | static int fdb_insert(struct net_bridge *br, struct net_bridge_port *source, |
bc9a25d2 | 41 | const unsigned char *addr, u16 vid); |
31e8a49c | 42 | static void fdb_notify(struct net_bridge *br, |
43 | const struct net_bridge_fdb_entry *, int); | |
1da177e4 | 44 | |
87a596e0 | 45 | int __init br_fdb_init(void) |
1da177e4 LT |
46 | { |
47 | br_fdb_cache = kmem_cache_create("bridge_fdb_cache", | |
48 | sizeof(struct net_bridge_fdb_entry), | |
49 | 0, | |
20c2df83 | 50 | SLAB_HWCACHE_ALIGN, NULL); |
87a596e0 AM |
51 | if (!br_fdb_cache) |
52 | return -ENOMEM; | |
53 | ||
87a596e0 | 54 | return 0; |
1da177e4 LT |
55 | } |
56 | ||
73afc906 | 57 | void br_fdb_fini(void) |
1da177e4 LT |
58 | { |
59 | kmem_cache_destroy(br_fdb_cache); | |
60 | } | |
61 | ||
eb793583 NA |
62 | int br_fdb_hash_init(struct net_bridge *br) |
63 | { | |
64 | return rhashtable_init(&br->fdb_hash_tbl, &br_fdb_rht_params); | |
65 | } | |
66 | ||
67 | void br_fdb_hash_fini(struct net_bridge *br) | |
68 | { | |
69 | rhashtable_destroy(&br->fdb_hash_tbl); | |
70 | } | |
1da177e4 LT |
71 | |
72 | /* if topology_changing then use forward_delay (default 15 sec) | |
73 | * otherwise keep longer (default 5 minutes) | |
74 | */ | |
3f890923 | 75 | static inline unsigned long hold_time(const struct net_bridge *br) |
1da177e4 LT |
76 | { |
77 | return br->topology_change ? br->forward_delay : br->ageing_time; | |
78 | } | |
79 | ||
3f890923 | 80 | static inline int has_expired(const struct net_bridge *br, |
1da177e4 LT |
81 | const struct net_bridge_fdb_entry *fdb) |
82 | { | |
eda7a5e8 | 83 | return !fdb->is_static && !fdb->added_by_external_learn && |
7cd8861a | 84 | time_before_eq(fdb->updated + hold_time(br), jiffies); |
1da177e4 LT |
85 | } |
86 | ||
da678292 MM |
87 | static void fdb_rcu_free(struct rcu_head *head) |
88 | { | |
89 | struct net_bridge_fdb_entry *ent | |
90 | = container_of(head, struct net_bridge_fdb_entry, rcu); | |
91 | kmem_cache_free(br_fdb_cache, ent); | |
92 | } | |
93 | ||
eb793583 | 94 | static struct net_bridge_fdb_entry *fdb_find_rcu(struct rhashtable *tbl, |
bfd0aeac NA |
95 | const unsigned char *addr, |
96 | __u16 vid) | |
97 | { | |
eb793583 | 98 | struct net_bridge_fdb_key key; |
bfd0aeac | 99 | |
410b3d48 NA |
100 | WARN_ON_ONCE(!rcu_read_lock_held()); |
101 | ||
eb793583 NA |
102 | key.vlan_id = vid; |
103 | memcpy(key.addr.addr, addr, sizeof(key.addr.addr)); | |
bfd0aeac | 104 | |
eb793583 | 105 | return rhashtable_lookup(tbl, &key, br_fdb_rht_params); |
bfd0aeac NA |
106 | } |
107 | ||
108 | /* requires bridge hash_lock */ | |
109 | static struct net_bridge_fdb_entry *br_fdb_find(struct net_bridge *br, | |
110 | const unsigned char *addr, | |
111 | __u16 vid) | |
112 | { | |
bfd0aeac NA |
113 | struct net_bridge_fdb_entry *fdb; |
114 | ||
d12c9176 | 115 | lockdep_assert_held_once(&br->hash_lock); |
410b3d48 | 116 | |
bfd0aeac | 117 | rcu_read_lock(); |
eb793583 | 118 | fdb = fdb_find_rcu(&br->fdb_hash_tbl, addr, vid); |
bfd0aeac NA |
119 | rcu_read_unlock(); |
120 | ||
121 | return fdb; | |
122 | } | |
123 | ||
124 | struct net_bridge_fdb_entry *br_fdb_find_rcu(struct net_bridge *br, | |
125 | const unsigned char *addr, | |
126 | __u16 vid) | |
127 | { | |
eb793583 | 128 | return fdb_find_rcu(&br->fdb_hash_tbl, addr, vid); |
bfd0aeac NA |
129 | } |
130 | ||
145beee8 VY |
131 | /* When a static FDB entry is added, the mac address from the entry is |
132 | * added to the bridge private HW address list and all required ports | |
133 | * are then updated with the new information. | |
134 | * Called under RTNL. | |
135 | */ | |
020ec6ba | 136 | static void fdb_add_hw_addr(struct net_bridge *br, const unsigned char *addr) |
145beee8 VY |
137 | { |
138 | int err; | |
a3f5ee71 | 139 | struct net_bridge_port *p; |
145beee8 VY |
140 | |
141 | ASSERT_RTNL(); | |
142 | ||
143 | list_for_each_entry(p, &br->port_list, list) { | |
144 | if (!br_promisc_port(p)) { | |
145 | err = dev_uc_add(p->dev, addr); | |
146 | if (err) | |
147 | goto undo; | |
148 | } | |
149 | } | |
150 | ||
151 | return; | |
152 | undo: | |
a3f5ee71 LR |
153 | list_for_each_entry_continue_reverse(p, &br->port_list, list) { |
154 | if (!br_promisc_port(p)) | |
155 | dev_uc_del(p->dev, addr); | |
145beee8 VY |
156 | } |
157 | } | |
158 | ||
159 | /* When a static FDB entry is deleted, the HW address from that entry is | |
160 | * also removed from the bridge private HW address list and updates all | |
161 | * the ports with needed information. | |
162 | * Called under RTNL. | |
163 | */ | |
020ec6ba | 164 | static void fdb_del_hw_addr(struct net_bridge *br, const unsigned char *addr) |
145beee8 VY |
165 | { |
166 | struct net_bridge_port *p; | |
167 | ||
168 | ASSERT_RTNL(); | |
169 | ||
170 | list_for_each_entry(p, &br->port_list, list) { | |
171 | if (!br_promisc_port(p)) | |
172 | dev_uc_del(p->dev, addr); | |
173 | } | |
174 | } | |
175 | ||
31e8a49c | 176 | static void fdb_delete(struct net_bridge *br, struct net_bridge_fdb_entry *f) |
1da177e4 | 177 | { |
b74fd306 RP |
178 | trace_fdb_delete(br, f); |
179 | ||
145beee8 | 180 | if (f->is_static) |
eb793583 | 181 | fdb_del_hw_addr(br, f->key.addr.addr); |
145beee8 | 182 | |
eb793583 NA |
183 | hlist_del_init_rcu(&f->fdb_node); |
184 | rhashtable_remove_fast(&br->fdb_hash_tbl, &f->rhnode, | |
185 | br_fdb_rht_params); | |
31e8a49c | 186 | fdb_notify(br, f, RTM_DELNEIGH); |
da678292 | 187 | call_rcu(&f->rcu, fdb_rcu_free); |
1da177e4 LT |
188 | } |
189 | ||
960b589f TM |
190 | /* Delete a local entry if no other port had the same address. */ |
191 | static void fdb_delete_local(struct net_bridge *br, | |
192 | const struct net_bridge_port *p, | |
193 | struct net_bridge_fdb_entry *f) | |
194 | { | |
eb793583 | 195 | const unsigned char *addr = f->key.addr.addr; |
2594e906 NA |
196 | struct net_bridge_vlan_group *vg; |
197 | const struct net_bridge_vlan *v; | |
960b589f | 198 | struct net_bridge_port *op; |
eb793583 | 199 | u16 vid = f->key.vlan_id; |
960b589f TM |
200 | |
201 | /* Maybe another port has same hw addr? */ | |
202 | list_for_each_entry(op, &br->port_list, list) { | |
2594e906 | 203 | vg = nbp_vlan_group(op); |
960b589f | 204 | if (op != p && ether_addr_equal(op->dev->dev_addr, addr) && |
2594e906 | 205 | (!vid || br_vlan_find(vg, vid))) { |
960b589f | 206 | f->dst = op; |
a778e6d1 | 207 | f->added_by_user = 0; |
960b589f TM |
208 | return; |
209 | } | |
210 | } | |
211 | ||
2594e906 NA |
212 | vg = br_vlan_group(br); |
213 | v = br_vlan_find(vg, vid); | |
960b589f TM |
214 | /* Maybe bridge device has same hw addr? */ |
215 | if (p && ether_addr_equal(br->dev->dev_addr, addr) && | |
2594e906 | 216 | (!vid || (v && br_vlan_should_use(v)))) { |
960b589f | 217 | f->dst = NULL; |
a778e6d1 | 218 | f->added_by_user = 0; |
960b589f TM |
219 | return; |
220 | } | |
221 | ||
222 | fdb_delete(br, f); | |
223 | } | |
224 | ||
424bb9c9 TM |
225 | void br_fdb_find_delete_local(struct net_bridge *br, |
226 | const struct net_bridge_port *p, | |
227 | const unsigned char *addr, u16 vid) | |
228 | { | |
424bb9c9 TM |
229 | struct net_bridge_fdb_entry *f; |
230 | ||
231 | spin_lock_bh(&br->hash_lock); | |
bfd0aeac | 232 | f = br_fdb_find(br, addr, vid); |
424bb9c9 TM |
233 | if (f && f->is_local && !f->added_by_user && f->dst == p) |
234 | fdb_delete_local(br, p, f); | |
235 | spin_unlock_bh(&br->hash_lock); | |
236 | } | |
237 | ||
1da177e4 LT |
238 | void br_fdb_changeaddr(struct net_bridge_port *p, const unsigned char *newaddr) |
239 | { | |
2594e906 | 240 | struct net_bridge_vlan_group *vg; |
eb793583 | 241 | struct net_bridge_fdb_entry *f; |
1da177e4 | 242 | struct net_bridge *br = p->br; |
2594e906 | 243 | struct net_bridge_vlan *v; |
9d6f229f | 244 | |
1da177e4 | 245 | spin_lock_bh(&br->hash_lock); |
2594e906 | 246 | vg = nbp_vlan_group(p); |
eb793583 NA |
247 | hlist_for_each_entry(f, &br->fdb_list, fdb_node) { |
248 | if (f->dst == p && f->is_local && !f->added_by_user) { | |
249 | /* delete old one */ | |
250 | fdb_delete_local(br, p, f); | |
251 | ||
252 | /* if this port has no vlan information | |
253 | * configured, we can safely be done at | |
254 | * this point. | |
255 | */ | |
256 | if (!vg || !vg->num_vlans) | |
257 | goto insert; | |
1da177e4 LT |
258 | } |
259 | } | |
1da177e4 | 260 | |
2836882f TM |
261 | insert: |
262 | /* insert new address, may fail if invalid address or dup. */ | |
263 | fdb_insert(br, p, newaddr, 0); | |
264 | ||
2594e906 | 265 | if (!vg || !vg->num_vlans) |
2836882f TM |
266 | goto done; |
267 | ||
268 | /* Now add entries for every VLAN configured on the port. | |
269 | * This function runs under RTNL so the bitmap will not change | |
270 | * from under us. | |
271 | */ | |
2594e906 NA |
272 | list_for_each_entry(v, &vg->vlan_list, vlist) |
273 | fdb_insert(br, p, newaddr, v->vid); | |
2836882f | 274 | |
bc9a25d2 | 275 | done: |
1da177e4 LT |
276 | spin_unlock_bh(&br->hash_lock); |
277 | } | |
278 | ||
43598813 | 279 | void br_fdb_change_mac_address(struct net_bridge *br, const u8 *newaddr) |
280 | { | |
2594e906 | 281 | struct net_bridge_vlan_group *vg; |
43598813 | 282 | struct net_bridge_fdb_entry *f; |
2594e906 | 283 | struct net_bridge_vlan *v; |
43598813 | 284 | |
ac4c8868 TM |
285 | spin_lock_bh(&br->hash_lock); |
286 | ||
43598813 | 287 | /* If old entry was unassociated with any port, then delete it. */ |
bfd0aeac | 288 | f = br_fdb_find(br, br->dev->dev_addr, 0); |
7bb90c37 | 289 | if (f && f->is_local && !f->dst && !f->added_by_user) |
960b589f | 290 | fdb_delete_local(br, NULL, f); |
43598813 | 291 | |
bc9a25d2 | 292 | fdb_insert(br, NULL, newaddr, 0); |
2594e906 NA |
293 | vg = br_vlan_group(br); |
294 | if (!vg || !vg->num_vlans) | |
295 | goto out; | |
bc9a25d2 VY |
296 | /* Now remove and add entries for every VLAN configured on the |
297 | * bridge. This function runs under RTNL so the bitmap will not | |
298 | * change from under us. | |
299 | */ | |
2594e906 | 300 | list_for_each_entry(v, &vg->vlan_list, vlist) { |
0b148def TM |
301 | if (!br_vlan_should_use(v)) |
302 | continue; | |
bfd0aeac | 303 | f = br_fdb_find(br, br->dev->dev_addr, v->vid); |
7bb90c37 | 304 | if (f && f->is_local && !f->dst && !f->added_by_user) |
960b589f | 305 | fdb_delete_local(br, NULL, f); |
2594e906 | 306 | fdb_insert(br, NULL, newaddr, v->vid); |
bc9a25d2 | 307 | } |
ac4c8868 TM |
308 | out: |
309 | spin_unlock_bh(&br->hash_lock); | |
43598813 | 310 | } |
311 | ||
f7cdee8a | 312 | void br_fdb_cleanup(struct work_struct *work) |
1da177e4 | 313 | { |
f7cdee8a NA |
314 | struct net_bridge *br = container_of(work, struct net_bridge, |
315 | gc_work.work); | |
eb793583 | 316 | struct net_bridge_fdb_entry *f = NULL; |
1da177e4 | 317 | unsigned long delay = hold_time(br); |
f7cdee8a NA |
318 | unsigned long work_delay = delay; |
319 | unsigned long now = jiffies; | |
1da177e4 | 320 | |
eb793583 NA |
321 | /* this part is tricky, in order to avoid blocking learning and |
322 | * consequently forwarding, we rely on rcu to delete objects with | |
323 | * delayed freeing allowing us to continue traversing | |
324 | */ | |
325 | rcu_read_lock(); | |
326 | hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) { | |
327 | unsigned long this_timer; | |
1da177e4 | 328 | |
eb793583 | 329 | if (f->is_static || f->added_by_external_learn) |
f7cdee8a | 330 | continue; |
eb793583 NA |
331 | this_timer = f->updated + delay; |
332 | if (time_after(this_timer, now)) { | |
333 | work_delay = min(work_delay, this_timer - now); | |
334 | } else { | |
335 | spin_lock_bh(&br->hash_lock); | |
336 | if (!hlist_unhashed(&f->fdb_node)) | |
31e8a49c | 337 | fdb_delete(br, f); |
eb793583 | 338 | spin_unlock_bh(&br->hash_lock); |
1da177e4 LT |
339 | } |
340 | } | |
eb793583 | 341 | rcu_read_unlock(); |
1da177e4 | 342 | |
f7cdee8a NA |
343 | /* Cleanup minimum 10 milliseconds apart */ |
344 | work_delay = max_t(unsigned long, work_delay, msecs_to_jiffies(10)); | |
345 | mod_delayed_work(system_long_wq, &br->gc_work, work_delay); | |
1da177e4 LT |
346 | } |
347 | ||
9cf63747 SH |
348 | /* Completely flush all dynamic entries in forwarding database.*/ |
349 | void br_fdb_flush(struct net_bridge *br) | |
350 | { | |
eb793583 NA |
351 | struct net_bridge_fdb_entry *f; |
352 | struct hlist_node *tmp; | |
9cf63747 SH |
353 | |
354 | spin_lock_bh(&br->hash_lock); | |
eb793583 NA |
355 | hlist_for_each_entry_safe(f, tmp, &br->fdb_list, fdb_node) { |
356 | if (!f->is_static) | |
357 | fdb_delete(br, f); | |
9cf63747 SH |
358 | } |
359 | spin_unlock_bh(&br->hash_lock); | |
360 | } | |
1a620698 | 361 | |
25985edc | 362 | /* Flush all entries referring to a specific port. |
9cf63747 | 363 | * if do_all is set also flush static entries |
1ea2d020 | 364 | * if vid is set delete all entries that match the vlan_id |
9cf63747 | 365 | */ |
1a620698 SH |
366 | void br_fdb_delete_by_port(struct net_bridge *br, |
367 | const struct net_bridge_port *p, | |
1ea2d020 | 368 | u16 vid, |
1a620698 | 369 | int do_all) |
1da177e4 | 370 | { |
eb793583 NA |
371 | struct net_bridge_fdb_entry *f; |
372 | struct hlist_node *tmp; | |
1da177e4 LT |
373 | |
374 | spin_lock_bh(&br->hash_lock); | |
eb793583 NA |
375 | hlist_for_each_entry_safe(f, tmp, &br->fdb_list, fdb_node) { |
376 | if (f->dst != p) | |
377 | continue; | |
9d6f229f | 378 | |
eb793583 NA |
379 | if (!do_all) |
380 | if (f->is_static || (vid && f->key.vlan_id != vid)) | |
1da177e4 LT |
381 | continue; |
382 | ||
eb793583 NA |
383 | if (f->is_local) |
384 | fdb_delete_local(br, p, f); | |
385 | else | |
386 | fdb_delete(br, f); | |
1da177e4 LT |
387 | } |
388 | spin_unlock_bh(&br->hash_lock); | |
389 | } | |
390 | ||
e6373c4c | 391 | #if IS_ENABLED(CONFIG_ATM_LANE) |
da678292 MM |
392 | /* Interface used by ATM LANE hook to test |
393 | * if an addr is on some other bridge port */ | |
394 | int br_fdb_test_addr(struct net_device *dev, unsigned char *addr) | |
1da177e4 LT |
395 | { |
396 | struct net_bridge_fdb_entry *fdb; | |
b5ed54e9 | 397 | struct net_bridge_port *port; |
da678292 MM |
398 | int ret; |
399 | ||
1da177e4 | 400 | rcu_read_lock(); |
b5ed54e9 | 401 | port = br_port_get_rcu(dev); |
402 | if (!port) | |
403 | ret = 0; | |
404 | else { | |
bfd0aeac | 405 | fdb = br_fdb_find_rcu(port->br, addr, 0); |
43598813 | 406 | ret = fdb && fdb->dst && fdb->dst->dev != dev && |
b5ed54e9 | 407 | fdb->dst->state == BR_STATE_FORWARDING; |
408 | } | |
1da177e4 | 409 | rcu_read_unlock(); |
1da177e4 | 410 | |
da678292 | 411 | return ret; |
1da177e4 | 412 | } |
da678292 | 413 | #endif /* CONFIG_ATM_LANE */ |
1da177e4 LT |
414 | |
415 | /* | |
9d6f229f | 416 | * Fill buffer with forwarding table records in |
1da177e4 LT |
417 | * the API format. |
418 | */ | |
419 | int br_fdb_fillbuf(struct net_bridge *br, void *buf, | |
420 | unsigned long maxnum, unsigned long skip) | |
421 | { | |
1da177e4 | 422 | struct net_bridge_fdb_entry *f; |
eb793583 NA |
423 | struct __fdb_entry *fe = buf; |
424 | int num = 0; | |
1da177e4 LT |
425 | |
426 | memset(buf, 0, maxnum*sizeof(struct __fdb_entry)); | |
427 | ||
428 | rcu_read_lock(); | |
eb793583 NA |
429 | hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) { |
430 | if (num >= maxnum) | |
431 | break; | |
1da177e4 | 432 | |
eb793583 NA |
433 | if (has_expired(br, f)) |
434 | continue; | |
1da177e4 | 435 | |
eb793583 NA |
436 | /* ignore pseudo entry for local MAC address */ |
437 | if (!f->dst) | |
438 | continue; | |
43598813 | 439 | |
eb793583 NA |
440 | if (skip) { |
441 | --skip; | |
442 | continue; | |
443 | } | |
1da177e4 | 444 | |
eb793583 NA |
445 | /* convert from internal format to API */ |
446 | memcpy(fe->mac_addr, f->key.addr.addr, ETH_ALEN); | |
ae4f8fca | 447 | |
eb793583 NA |
448 | /* due to ABI compat need to split into hi/lo */ |
449 | fe->port_no = f->dst->port_no; | |
450 | fe->port_hi = f->dst->port_no >> 8; | |
ae4f8fca | 451 | |
eb793583 NA |
452 | fe->is_local = f->is_local; |
453 | if (!f->is_static) | |
454 | fe->ageing_timer_value = jiffies_delta_to_clock_t(jiffies - f->updated); | |
455 | ++fe; | |
456 | ++num; | |
1da177e4 | 457 | } |
1da177e4 LT |
458 | rcu_read_unlock(); |
459 | ||
460 | return num; | |
461 | } | |
462 | ||
eb793583 | 463 | static struct net_bridge_fdb_entry *fdb_create(struct net_bridge *br, |
1da177e4 | 464 | struct net_bridge_port *source, |
2ba071ec | 465 | const unsigned char *addr, |
b7af1472 RP |
466 | __u16 vid, |
467 | unsigned char is_local, | |
468 | unsigned char is_static) | |
1da177e4 LT |
469 | { |
470 | struct net_bridge_fdb_entry *fdb; | |
471 | ||
472 | fdb = kmem_cache_alloc(br_fdb_cache, GFP_ATOMIC); | |
473 | if (fdb) { | |
eb793583 | 474 | memcpy(fdb->key.addr.addr, addr, ETH_ALEN); |
1da177e4 | 475 | fdb->dst = source; |
eb793583 | 476 | fdb->key.vlan_id = vid; |
b7af1472 RP |
477 | fdb->is_local = is_local; |
478 | fdb->is_static = is_static; | |
a5642ab4 | 479 | fdb->added_by_user = 0; |
cf6b8e1e | 480 | fdb->added_by_external_learn = 0; |
9fe8bcec | 481 | fdb->offloaded = 0; |
7cd8861a | 482 | fdb->updated = fdb->used = jiffies; |
eb793583 NA |
483 | if (rhashtable_lookup_insert_fast(&br->fdb_hash_tbl, |
484 | &fdb->rhnode, | |
485 | br_fdb_rht_params)) { | |
486 | kmem_cache_free(br_fdb_cache, fdb); | |
487 | fdb = NULL; | |
488 | } else { | |
489 | hlist_add_head_rcu(&fdb->fdb_node, &br->fdb_list); | |
490 | } | |
1da177e4 LT |
491 | } |
492 | return fdb; | |
493 | } | |
494 | ||
495 | static int fdb_insert(struct net_bridge *br, struct net_bridge_port *source, | |
bc9a25d2 | 496 | const unsigned char *addr, u16 vid) |
1da177e4 | 497 | { |
1da177e4 LT |
498 | struct net_bridge_fdb_entry *fdb; |
499 | ||
500 | if (!is_valid_ether_addr(addr)) | |
501 | return -EINVAL; | |
502 | ||
bfd0aeac | 503 | fdb = br_fdb_find(br, addr, vid); |
1da177e4 | 504 | if (fdb) { |
9d6f229f | 505 | /* it is okay to have multiple ports with same |
1da177e4 LT |
506 | * address, just use the first one. |
507 | */ | |
9d6f229f | 508 | if (fdb->is_local) |
1da177e4 | 509 | return 0; |
de1dfeef RP |
510 | br_warn(br, "adding interface %s with same address as a received packet (addr:%pM, vlan:%u)\n", |
511 | source ? source->dev->name : br->dev->name, addr, vid); | |
31e8a49c | 512 | fdb_delete(br, fdb); |
9d6f229f | 513 | } |
1da177e4 | 514 | |
eb793583 | 515 | fdb = fdb_create(br, source, addr, vid, 1, 1); |
03e9b64b | 516 | if (!fdb) |
1da177e4 LT |
517 | return -ENOMEM; |
518 | ||
020ec6ba | 519 | fdb_add_hw_addr(br, addr); |
31e8a49c | 520 | fdb_notify(br, fdb, RTM_NEWNEIGH); |
1da177e4 LT |
521 | return 0; |
522 | } | |
523 | ||
03e9b64b | 524 | /* Add entry for local address of interface */ |
1da177e4 | 525 | int br_fdb_insert(struct net_bridge *br, struct net_bridge_port *source, |
bc9a25d2 | 526 | const unsigned char *addr, u16 vid) |
1da177e4 LT |
527 | { |
528 | int ret; | |
529 | ||
530 | spin_lock_bh(&br->hash_lock); | |
bc9a25d2 | 531 | ret = fdb_insert(br, source, addr, vid); |
1da177e4 LT |
532 | spin_unlock_bh(&br->hash_lock); |
533 | return ret; | |
534 | } | |
535 | ||
536 | void br_fdb_update(struct net_bridge *br, struct net_bridge_port *source, | |
a5642ab4 | 537 | const unsigned char *addr, u16 vid, bool added_by_user) |
1da177e4 | 538 | { |
1da177e4 | 539 | struct net_bridge_fdb_entry *fdb; |
c65c7a30 | 540 | bool fdb_modified = false; |
1da177e4 LT |
541 | |
542 | /* some users want to always flood. */ | |
543 | if (hold_time(br) == 0) | |
544 | return; | |
545 | ||
df1c0b84 SH |
546 | /* ignore packets unless we are using this port */ |
547 | if (!(source->state == BR_STATE_LEARNING || | |
548 | source->state == BR_STATE_FORWARDING)) | |
549 | return; | |
550 | ||
eb793583 | 551 | fdb = fdb_find_rcu(&br->fdb_hash_tbl, addr, vid); |
1da177e4 LT |
552 | if (likely(fdb)) { |
553 | /* attempt to update an entry for a local interface */ | |
554 | if (unlikely(fdb->is_local)) { | |
9d6f229f | 555 | if (net_ratelimit()) |
de1dfeef RP |
556 | br_warn(br, "received packet on %s with own address as source address (addr:%pM, vlan:%u)\n", |
557 | source->dev->name, addr, vid); | |
1da177e4 | 558 | } else { |
ca6d4480 | 559 | unsigned long now = jiffies; |
560 | ||
1da177e4 | 561 | /* fastpath: update of existing entry */ |
c65c7a30 JM |
562 | if (unlikely(source != fdb->dst)) { |
563 | fdb->dst = source; | |
564 | fdb_modified = true; | |
58073b32 AS |
565 | /* Take over HW learned entry */ |
566 | if (unlikely(fdb->added_by_external_learn)) | |
567 | fdb->added_by_external_learn = 0; | |
c65c7a30 | 568 | } |
ca6d4480 | 569 | if (now != fdb->updated) |
570 | fdb->updated = now; | |
a5642ab4 TM |
571 | if (unlikely(added_by_user)) |
572 | fdb->added_by_user = 1; | |
e3cfddd5 RP |
573 | if (unlikely(fdb_modified)) { |
574 | trace_br_fdb_update(br, source, addr, vid, added_by_user); | |
c65c7a30 | 575 | fdb_notify(br, fdb, RTM_NEWNEIGH); |
e3cfddd5 | 576 | } |
1da177e4 LT |
577 | } |
578 | } else { | |
f8ae737d | 579 | spin_lock(&br->hash_lock); |
eb793583 NA |
580 | fdb = fdb_create(br, source, addr, vid, 0, 0); |
581 | if (fdb) { | |
582 | if (unlikely(added_by_user)) | |
583 | fdb->added_by_user = 1; | |
584 | trace_br_fdb_update(br, source, addr, vid, | |
585 | added_by_user); | |
586 | fdb_notify(br, fdb, RTM_NEWNEIGH); | |
f58ee4e1 | 587 | } |
1da177e4 LT |
588 | /* else we lose race and someone else inserts |
589 | * it first, don't bother updating | |
590 | */ | |
f8ae737d | 591 | spin_unlock(&br->hash_lock); |
1da177e4 | 592 | } |
1da177e4 | 593 | } |
b078f0df | 594 | |
3741873b RP |
595 | static int fdb_to_nud(const struct net_bridge *br, |
596 | const struct net_bridge_fdb_entry *fdb) | |
b078f0df | 597 | { |
598 | if (fdb->is_local) | |
599 | return NUD_PERMANENT; | |
600 | else if (fdb->is_static) | |
601 | return NUD_NOARP; | |
3741873b | 602 | else if (has_expired(br, fdb)) |
b078f0df | 603 | return NUD_STALE; |
604 | else | |
605 | return NUD_REACHABLE; | |
606 | } | |
607 | ||
31e8a49c | 608 | static int fdb_fill_info(struct sk_buff *skb, const struct net_bridge *br, |
b078f0df | 609 | const struct net_bridge_fdb_entry *fdb, |
15e47304 | 610 | u32 portid, u32 seq, int type, unsigned int flags) |
b078f0df | 611 | { |
612 | unsigned long now = jiffies; | |
613 | struct nda_cacheinfo ci; | |
614 | struct nlmsghdr *nlh; | |
615 | struct ndmsg *ndm; | |
616 | ||
15e47304 | 617 | nlh = nlmsg_put(skb, portid, seq, type, sizeof(*ndm), flags); |
b078f0df | 618 | if (nlh == NULL) |
619 | return -EMSGSIZE; | |
620 | ||
b078f0df | 621 | ndm = nlmsg_data(nlh); |
622 | ndm->ndm_family = AF_BRIDGE; | |
623 | ndm->ndm_pad1 = 0; | |
624 | ndm->ndm_pad2 = 0; | |
9fe8bcec | 625 | ndm->ndm_flags = 0; |
b078f0df | 626 | ndm->ndm_type = 0; |
43598813 | 627 | ndm->ndm_ifindex = fdb->dst ? fdb->dst->dev->ifindex : br->dev->ifindex; |
3741873b | 628 | ndm->ndm_state = fdb_to_nud(br, fdb); |
b078f0df | 629 | |
9fe8bcec AS |
630 | if (fdb->offloaded) |
631 | ndm->ndm_flags |= NTF_OFFLOADED; | |
632 | if (fdb->added_by_external_learn) | |
633 | ndm->ndm_flags |= NTF_EXT_LEARNED; | |
634 | ||
eb793583 | 635 | if (nla_put(skb, NDA_LLADDR, ETH_ALEN, &fdb->key.addr)) |
2eb812e6 | 636 | goto nla_put_failure; |
41c389d7 RP |
637 | if (nla_put_u32(skb, NDA_MASTER, br->dev->ifindex)) |
638 | goto nla_put_failure; | |
b078f0df | 639 | ci.ndm_used = jiffies_to_clock_t(now - fdb->used); |
640 | ci.ndm_confirmed = 0; | |
641 | ci.ndm_updated = jiffies_to_clock_t(now - fdb->updated); | |
642 | ci.ndm_refcnt = 0; | |
2eb812e6 DM |
643 | if (nla_put(skb, NDA_CACHEINFO, sizeof(ci), &ci)) |
644 | goto nla_put_failure; | |
1690be63 | 645 | |
eb793583 NA |
646 | if (fdb->key.vlan_id && nla_put(skb, NDA_VLAN, sizeof(u16), |
647 | &fdb->key.vlan_id)) | |
1690be63 VY |
648 | goto nla_put_failure; |
649 | ||
053c095a JB |
650 | nlmsg_end(skb, nlh); |
651 | return 0; | |
b078f0df | 652 | |
653 | nla_put_failure: | |
654 | nlmsg_cancel(skb, nlh); | |
655 | return -EMSGSIZE; | |
656 | } | |
657 | ||
658 | static inline size_t fdb_nlmsg_size(void) | |
659 | { | |
660 | return NLMSG_ALIGN(sizeof(struct ndmsg)) | |
661 | + nla_total_size(ETH_ALEN) /* NDA_LLADDR */ | |
41c389d7 | 662 | + nla_total_size(sizeof(u32)) /* NDA_MASTER */ |
1690be63 | 663 | + nla_total_size(sizeof(u16)) /* NDA_VLAN */ |
b078f0df | 664 | + nla_total_size(sizeof(struct nda_cacheinfo)); |
665 | } | |
666 | ||
31e8a49c | 667 | static void fdb_notify(struct net_bridge *br, |
668 | const struct net_bridge_fdb_entry *fdb, int type) | |
b078f0df | 669 | { |
31e8a49c | 670 | struct net *net = dev_net(br->dev); |
b078f0df | 671 | struct sk_buff *skb; |
672 | int err = -ENOBUFS; | |
673 | ||
6b26b51b AS |
674 | br_switchdev_fdb_notify(fdb, type); |
675 | ||
b078f0df | 676 | skb = nlmsg_new(fdb_nlmsg_size(), GFP_ATOMIC); |
677 | if (skb == NULL) | |
678 | goto errout; | |
679 | ||
31e8a49c | 680 | err = fdb_fill_info(skb, br, fdb, 0, 0, type, 0); |
b078f0df | 681 | if (err < 0) { |
682 | /* -EMSGSIZE implies BUG in fdb_nlmsg_size() */ | |
683 | WARN_ON(err == -EMSGSIZE); | |
684 | kfree_skb(skb); | |
685 | goto errout; | |
686 | } | |
687 | rtnl_notify(skb, net, 0, RTNLGRP_NEIGH, NULL, GFP_ATOMIC); | |
688 | return; | |
689 | errout: | |
87e823b3 | 690 | rtnl_set_sk_err(net, RTNLGRP_NEIGH, err); |
b078f0df | 691 | } |
692 | ||
693 | /* Dump information about entries, in response to GETNEIGH */ | |
77162022 JF |
694 | int br_fdb_dump(struct sk_buff *skb, |
695 | struct netlink_callback *cb, | |
696 | struct net_device *dev, | |
5d5eacb3 | 697 | struct net_device *filter_dev, |
d297653d | 698 | int *idx) |
b078f0df | 699 | { |
77162022 | 700 | struct net_bridge *br = netdev_priv(dev); |
eb793583 | 701 | struct net_bridge_fdb_entry *f; |
d297653d | 702 | int err = 0; |
b078f0df | 703 | |
77162022 | 704 | if (!(dev->priv_flags & IFF_EBRIDGE)) |
eb793583 | 705 | return err; |
b078f0df | 706 | |
d297653d RP |
707 | if (!filter_dev) { |
708 | err = ndo_dflt_fdb_dump(skb, cb, dev, NULL, idx); | |
709 | if (err < 0) | |
eb793583 | 710 | return err; |
d297653d | 711 | } |
6cb69742 | 712 | |
eb793583 NA |
713 | rcu_read_lock(); |
714 | hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) { | |
715 | if (*idx < cb->args[2]) | |
716 | goto skip; | |
717 | if (filter_dev && (!f->dst || f->dst->dev != filter_dev)) { | |
718 | if (filter_dev != dev) | |
77162022 | 719 | goto skip; |
eb793583 NA |
720 | /* !f->dst is a special case for bridge |
721 | * It means the MAC belongs to the bridge | |
722 | * Therefore need a little more filtering | |
723 | * we only want to dump the !f->dst case | |
724 | */ | |
725 | if (f->dst) | |
6cb69742 | 726 | goto skip; |
b078f0df | 727 | } |
eb793583 NA |
728 | if (!filter_dev && f->dst) |
729 | goto skip; | |
730 | ||
731 | err = fdb_fill_info(skb, br, f, | |
732 | NETLINK_CB(cb->skb).portid, | |
733 | cb->nlh->nlmsg_seq, | |
734 | RTM_NEWNEIGH, | |
735 | NLM_F_MULTI); | |
736 | if (err < 0) | |
737 | break; | |
738 | skip: | |
739 | *idx += 1; | |
b078f0df | 740 | } |
eb793583 | 741 | rcu_read_unlock(); |
b078f0df | 742 | |
d297653d | 743 | return err; |
b078f0df | 744 | } |
36fd2b63 | 745 | |
292d1398 | 746 | /* Update (create or replace) forwarding database entry */ |
7bb90c37 TM |
747 | static int fdb_add_entry(struct net_bridge *br, struct net_bridge_port *source, |
748 | const __u8 *addr, __u16 state, __u16 flags, __u16 vid) | |
36fd2b63 | 749 | { |
36fd2b63 | 750 | struct net_bridge_fdb_entry *fdb; |
b0a397fb | 751 | bool modified = false; |
36fd2b63 | 752 | |
eb8d7baa | 753 | /* If the port cannot learn allow only local and static entries */ |
7bb90c37 | 754 | if (source && !(state & NUD_PERMANENT) && !(state & NUD_NOARP) && |
eb8d7baa WK |
755 | !(source->state == BR_STATE_LEARNING || |
756 | source->state == BR_STATE_FORWARDING)) | |
757 | return -EPERM; | |
758 | ||
7bb90c37 TM |
759 | if (!source && !(state & NUD_PERMANENT)) { |
760 | pr_info("bridge: RTM_NEWNEIGH %s without NUD_PERMANENT\n", | |
761 | br->dev->name); | |
762 | return -EINVAL; | |
763 | } | |
764 | ||
bfd0aeac | 765 | fdb = br_fdb_find(br, addr, vid); |
64af1bac | 766 | if (fdb == NULL) { |
767 | if (!(flags & NLM_F_CREATE)) | |
768 | return -ENOENT; | |
36fd2b63 | 769 | |
eb793583 | 770 | fdb = fdb_create(br, source, addr, vid, 0, 0); |
64af1bac | 771 | if (!fdb) |
772 | return -ENOMEM; | |
b0a397fb | 773 | |
774 | modified = true; | |
64af1bac | 775 | } else { |
776 | if (flags & NLM_F_EXCL) | |
777 | return -EEXIST; | |
b0a397fb | 778 | |
779 | if (fdb->dst != source) { | |
780 | fdb->dst = source; | |
781 | modified = true; | |
782 | } | |
292d1398 | 783 | } |
784 | ||
3741873b | 785 | if (fdb_to_nud(br, fdb) != state) { |
145beee8 VY |
786 | if (state & NUD_PERMANENT) { |
787 | fdb->is_local = 1; | |
788 | if (!fdb->is_static) { | |
789 | fdb->is_static = 1; | |
020ec6ba | 790 | fdb_add_hw_addr(br, addr); |
145beee8 VY |
791 | } |
792 | } else if (state & NUD_NOARP) { | |
793 | fdb->is_local = 0; | |
794 | if (!fdb->is_static) { | |
795 | fdb->is_static = 1; | |
020ec6ba | 796 | fdb_add_hw_addr(br, addr); |
145beee8 VY |
797 | } |
798 | } else { | |
292d1398 | 799 | fdb->is_local = 0; |
145beee8 VY |
800 | if (fdb->is_static) { |
801 | fdb->is_static = 0; | |
020ec6ba | 802 | fdb_del_hw_addr(br, addr); |
145beee8 VY |
803 | } |
804 | } | |
64af1bac | 805 | |
b0a397fb | 806 | modified = true; |
807 | } | |
a5642ab4 | 808 | fdb->added_by_user = 1; |
b0a397fb | 809 | |
810 | fdb->used = jiffies; | |
811 | if (modified) { | |
812 | fdb->updated = jiffies; | |
31e8a49c | 813 | fdb_notify(br, fdb, RTM_NEWNEIGH); |
64af1bac | 814 | } |
36fd2b63 | 815 | |
36fd2b63 | 816 | return 0; |
817 | } | |
818 | ||
7bb90c37 TM |
819 | static int __br_fdb_add(struct ndmsg *ndm, struct net_bridge *br, |
820 | struct net_bridge_port *p, const unsigned char *addr, | |
821 | u16 nlh_flags, u16 vid) | |
1690be63 VY |
822 | { |
823 | int err = 0; | |
824 | ||
825 | if (ndm->ndm_flags & NTF_USE) { | |
7bb90c37 TM |
826 | if (!p) { |
827 | pr_info("bridge: RTM_NEWNEIGH %s with NTF_USE is not supported\n", | |
828 | br->dev->name); | |
829 | return -EINVAL; | |
830 | } | |
c4c832f8 | 831 | local_bh_disable(); |
1690be63 | 832 | rcu_read_lock(); |
7bb90c37 | 833 | br_fdb_update(br, p, addr, vid, true); |
1690be63 | 834 | rcu_read_unlock(); |
c4c832f8 | 835 | local_bh_enable(); |
eb100e0e NA |
836 | } else if (ndm->ndm_flags & NTF_EXT_LEARNED) { |
837 | err = br_fdb_external_learn_add(br, p, addr, vid); | |
1690be63 | 838 | } else { |
7bb90c37 TM |
839 | spin_lock_bh(&br->hash_lock); |
840 | err = fdb_add_entry(br, p, addr, ndm->ndm_state, | |
1690be63 | 841 | nlh_flags, vid); |
7bb90c37 | 842 | spin_unlock_bh(&br->hash_lock); |
1690be63 VY |
843 | } |
844 | ||
845 | return err; | |
846 | } | |
847 | ||
36fd2b63 | 848 | /* Add new permanent fdb entry with RTM_NEWNEIGH */ |
edc7d573 | 849 | int br_fdb_add(struct ndmsg *ndm, struct nlattr *tb[], |
850 | struct net_device *dev, | |
f6f6424b | 851 | const unsigned char *addr, u16 vid, u16 nlh_flags) |
36fd2b63 | 852 | { |
2594e906 | 853 | struct net_bridge_vlan_group *vg; |
3741873b | 854 | struct net_bridge_port *p = NULL; |
2594e906 | 855 | struct net_bridge_vlan *v; |
3741873b | 856 | struct net_bridge *br = NULL; |
77162022 | 857 | int err = 0; |
36fd2b63 | 858 | |
b74fd306 RP |
859 | trace_br_fdb_add(ndm, dev, addr, vid, nlh_flags); |
860 | ||
292d1398 | 861 | if (!(ndm->ndm_state & (NUD_PERMANENT|NUD_NOARP|NUD_REACHABLE))) { |
862 | pr_info("bridge: RTM_NEWNEIGH with invalid state %#x\n", ndm->ndm_state); | |
863 | return -EINVAL; | |
864 | } | |
865 | ||
537f7f84 SH |
866 | if (is_zero_ether_addr(addr)) { |
867 | pr_info("bridge: RTM_NEWNEIGH with invalid ether address\n"); | |
868 | return -EINVAL; | |
869 | } | |
870 | ||
3741873b RP |
871 | if (dev->priv_flags & IFF_EBRIDGE) { |
872 | br = netdev_priv(dev); | |
873 | vg = br_vlan_group(br); | |
874 | } else { | |
875 | p = br_port_get_rtnl(dev); | |
876 | if (!p) { | |
877 | pr_info("bridge: RTM_NEWNEIGH %s not a bridge port\n", | |
878 | dev->name); | |
879 | return -EINVAL; | |
880 | } | |
7bb90c37 | 881 | br = p->br; |
3741873b | 882 | vg = nbp_vlan_group(p); |
36fd2b63 | 883 | } |
884 | ||
f6f6424b | 885 | if (vid) { |
2594e906 | 886 | v = br_vlan_find(vg, vid); |
3741873b RP |
887 | if (!v || !br_vlan_should_use(v)) { |
888 | pr_info("bridge: RTM_NEWNEIGH with unconfigured vlan %d on %s\n", vid, dev->name); | |
1690be63 VY |
889 | return -EINVAL; |
890 | } | |
891 | ||
892 | /* VID was specified, so use it. */ | |
7bb90c37 | 893 | err = __br_fdb_add(ndm, br, p, addr, nlh_flags, vid); |
292d1398 | 894 | } else { |
7bb90c37 | 895 | err = __br_fdb_add(ndm, br, p, addr, nlh_flags, 0); |
2594e906 | 896 | if (err || !vg || !vg->num_vlans) |
1690be63 | 897 | goto out; |
1690be63 VY |
898 | |
899 | /* We have vlans configured on this port and user didn't | |
900 | * specify a VLAN. To be nice, add/update entry for every | |
901 | * vlan on this port. | |
902 | */ | |
2594e906 | 903 | list_for_each_entry(v, &vg->vlan_list, vlist) { |
3741873b RP |
904 | if (!br_vlan_should_use(v)) |
905 | continue; | |
7bb90c37 | 906 | err = __br_fdb_add(ndm, br, p, addr, nlh_flags, v->vid); |
1690be63 VY |
907 | if (err) |
908 | goto out; | |
1690be63 | 909 | } |
292d1398 | 910 | } |
36fd2b63 | 911 | |
1690be63 | 912 | out: |
36fd2b63 | 913 | return err; |
914 | } | |
915 | ||
5019ab50 NA |
916 | static int fdb_delete_by_addr_and_port(struct net_bridge *br, |
917 | const struct net_bridge_port *p, | |
8c86f967 | 918 | const u8 *addr, u16 vlan) |
36fd2b63 | 919 | { |
36fd2b63 | 920 | struct net_bridge_fdb_entry *fdb; |
921 | ||
bfd0aeac | 922 | fdb = br_fdb_find(br, addr, vlan); |
8c86f967 | 923 | if (!fdb || fdb->dst != p) |
36fd2b63 | 924 | return -ENOENT; |
925 | ||
1690be63 | 926 | fdb_delete(br, fdb); |
5019ab50 | 927 | |
36fd2b63 | 928 | return 0; |
929 | } | |
930 | ||
5019ab50 NA |
931 | static int __br_fdb_delete(struct net_bridge *br, |
932 | const struct net_bridge_port *p, | |
1690be63 VY |
933 | const unsigned char *addr, u16 vid) |
934 | { | |
935 | int err; | |
936 | ||
5019ab50 NA |
937 | spin_lock_bh(&br->hash_lock); |
938 | err = fdb_delete_by_addr_and_port(br, p, addr, vid); | |
939 | spin_unlock_bh(&br->hash_lock); | |
1690be63 VY |
940 | |
941 | return err; | |
942 | } | |
943 | ||
36fd2b63 | 944 | /* Remove neighbor entry with RTM_DELNEIGH */ |
1690be63 VY |
945 | int br_fdb_delete(struct ndmsg *ndm, struct nlattr *tb[], |
946 | struct net_device *dev, | |
f6f6424b | 947 | const unsigned char *addr, u16 vid) |
36fd2b63 | 948 | { |
2594e906 | 949 | struct net_bridge_vlan_group *vg; |
3741873b | 950 | struct net_bridge_port *p = NULL; |
2594e906 | 951 | struct net_bridge_vlan *v; |
5019ab50 | 952 | struct net_bridge *br; |
36fd2b63 | 953 | int err; |
1690be63 | 954 | |
3741873b RP |
955 | if (dev->priv_flags & IFF_EBRIDGE) { |
956 | br = netdev_priv(dev); | |
957 | vg = br_vlan_group(br); | |
958 | } else { | |
959 | p = br_port_get_rtnl(dev); | |
960 | if (!p) { | |
961 | pr_info("bridge: RTM_DELNEIGH %s not a bridge port\n", | |
962 | dev->name); | |
963 | return -EINVAL; | |
964 | } | |
965 | vg = nbp_vlan_group(p); | |
5019ab50 | 966 | br = p->br; |
36fd2b63 | 967 | } |
968 | ||
f6f6424b | 969 | if (vid) { |
2594e906 NA |
970 | v = br_vlan_find(vg, vid); |
971 | if (!v) { | |
3741873b | 972 | pr_info("bridge: RTM_DELNEIGH with unconfigured vlan %d on %s\n", vid, dev->name); |
1690be63 VY |
973 | return -EINVAL; |
974 | } | |
36fd2b63 | 975 | |
5019ab50 | 976 | err = __br_fdb_delete(br, p, addr, vid); |
1690be63 | 977 | } else { |
25d3b493 | 978 | err = -ENOENT; |
5019ab50 | 979 | err &= __br_fdb_delete(br, p, addr, 0); |
2594e906 | 980 | if (!vg || !vg->num_vlans) |
5019ab50 | 981 | return err; |
1690be63 | 982 | |
3741873b RP |
983 | list_for_each_entry(v, &vg->vlan_list, vlist) { |
984 | if (!br_vlan_should_use(v)) | |
985 | continue; | |
5019ab50 | 986 | err &= __br_fdb_delete(br, p, addr, v->vid); |
3741873b | 987 | } |
1690be63 | 988 | } |
5019ab50 | 989 | |
36fd2b63 | 990 | return err; |
991 | } | |
8db24af7 VY |
992 | |
993 | int br_fdb_sync_static(struct net_bridge *br, struct net_bridge_port *p) | |
994 | { | |
eb793583 | 995 | struct net_bridge_fdb_entry *f, *tmp; |
367dc658 | 996 | int err = 0; |
8db24af7 VY |
997 | |
998 | ASSERT_RTNL(); | |
999 | ||
eb793583 NA |
1000 | /* the key here is that static entries change only under rtnl */ |
1001 | rcu_read_lock(); | |
1002 | hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) { | |
1003 | /* We only care for static entries */ | |
1004 | if (!f->is_static) | |
1005 | continue; | |
1006 | err = dev_uc_add(p->dev, f->key.addr.addr); | |
1007 | if (err) | |
1008 | goto rollback; | |
8db24af7 | 1009 | } |
eb793583 NA |
1010 | done: |
1011 | rcu_read_unlock(); | |
8db24af7 | 1012 | |
eb793583 | 1013 | return err; |
8db24af7 | 1014 | |
eb793583 NA |
1015 | rollback: |
1016 | hlist_for_each_entry_rcu(tmp, &br->fdb_list, fdb_node) { | |
1017 | /* We only care for static entries */ | |
1018 | if (!tmp->is_static) | |
1019 | continue; | |
1020 | if (tmp == f) | |
1021 | break; | |
1022 | dev_uc_del(p->dev, tmp->key.addr.addr); | |
8db24af7 | 1023 | } |
eb793583 NA |
1024 | |
1025 | goto done; | |
8db24af7 VY |
1026 | } |
1027 | ||
1028 | void br_fdb_unsync_static(struct net_bridge *br, struct net_bridge_port *p) | |
1029 | { | |
eb793583 | 1030 | struct net_bridge_fdb_entry *f; |
8db24af7 VY |
1031 | |
1032 | ASSERT_RTNL(); | |
1033 | ||
eb793583 NA |
1034 | rcu_read_lock(); |
1035 | hlist_for_each_entry_rcu(f, &br->fdb_list, fdb_node) { | |
1036 | /* We only care for static entries */ | |
1037 | if (!f->is_static) | |
1038 | continue; | |
8db24af7 | 1039 | |
eb793583 | 1040 | dev_uc_del(p->dev, f->key.addr.addr); |
8db24af7 | 1041 | } |
eb793583 | 1042 | rcu_read_unlock(); |
8db24af7 | 1043 | } |
cf6b8e1e | 1044 | |
3aeb6617 | 1045 | int br_fdb_external_learn_add(struct net_bridge *br, struct net_bridge_port *p, |
cf6b8e1e SF |
1046 | const unsigned char *addr, u16 vid) |
1047 | { | |
cf6b8e1e | 1048 | struct net_bridge_fdb_entry *fdb; |
7597b266 | 1049 | bool modified = false; |
cf6b8e1e SF |
1050 | int err = 0; |
1051 | ||
b74fd306 RP |
1052 | trace_br_fdb_external_learn_add(br, p, addr, vid); |
1053 | ||
cf6b8e1e SF |
1054 | spin_lock_bh(&br->hash_lock); |
1055 | ||
bfd0aeac | 1056 | fdb = br_fdb_find(br, addr, vid); |
cf6b8e1e | 1057 | if (!fdb) { |
eb793583 | 1058 | fdb = fdb_create(br, p, addr, vid, 0, 0); |
cf6b8e1e SF |
1059 | if (!fdb) { |
1060 | err = -ENOMEM; | |
1061 | goto err_unlock; | |
1062 | } | |
1063 | fdb->added_by_external_learn = 1; | |
1064 | fdb_notify(br, fdb, RTM_NEWNEIGH); | |
7597b266 | 1065 | } else { |
cf6b8e1e | 1066 | fdb->updated = jiffies; |
7597b266 NA |
1067 | |
1068 | if (fdb->dst != p) { | |
1069 | fdb->dst = p; | |
1070 | modified = true; | |
1071 | } | |
1072 | ||
1073 | if (fdb->added_by_external_learn) { | |
1074 | /* Refresh entry */ | |
1075 | fdb->used = jiffies; | |
1076 | } else if (!fdb->added_by_user) { | |
1077 | /* Take over SW learned entry */ | |
1078 | fdb->added_by_external_learn = 1; | |
1079 | modified = true; | |
1080 | } | |
1081 | ||
1082 | if (modified) | |
1083 | fdb_notify(br, fdb, RTM_NEWNEIGH); | |
cf6b8e1e SF |
1084 | } |
1085 | ||
1086 | err_unlock: | |
1087 | spin_unlock_bh(&br->hash_lock); | |
cf6b8e1e SF |
1088 | |
1089 | return err; | |
1090 | } | |
cf6b8e1e | 1091 | |
3aeb6617 | 1092 | int br_fdb_external_learn_del(struct net_bridge *br, struct net_bridge_port *p, |
cf6b8e1e SF |
1093 | const unsigned char *addr, u16 vid) |
1094 | { | |
cf6b8e1e SF |
1095 | struct net_bridge_fdb_entry *fdb; |
1096 | int err = 0; | |
1097 | ||
cf6b8e1e SF |
1098 | spin_lock_bh(&br->hash_lock); |
1099 | ||
bfd0aeac | 1100 | fdb = br_fdb_find(br, addr, vid); |
cf6b8e1e SF |
1101 | if (fdb && fdb->added_by_external_learn) |
1102 | fdb_delete(br, fdb); | |
1103 | else | |
1104 | err = -ENOENT; | |
1105 | ||
1106 | spin_unlock_bh(&br->hash_lock); | |
cf6b8e1e SF |
1107 | |
1108 | return err; | |
1109 | } | |
9fe8bcec AS |
1110 | |
1111 | void br_fdb_offloaded_set(struct net_bridge *br, struct net_bridge_port *p, | |
1112 | const unsigned char *addr, u16 vid) | |
1113 | { | |
1114 | struct net_bridge_fdb_entry *fdb; | |
1115 | ||
1116 | spin_lock_bh(&br->hash_lock); | |
1117 | ||
1118 | fdb = br_fdb_find(br, addr, vid); | |
1119 | if (fdb) | |
1120 | fdb->offloaded = 1; | |
1121 | ||
1122 | spin_unlock_bh(&br->hash_lock); | |
1123 | } |