bridge: Verify that a vlan is allowed to egress on given port
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / bridge / br_if.c
CommitLineData
1da177e4
LT
1/*
2 * Userspace interface
3 * Linux ethernet bridge
4 *
5 * Authors:
6 * Lennert Buytenhek <buytenh@gnu.org>
7 *
1da177e4
LT
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version
11 * 2 of the License, or (at your option) any later version.
12 */
13
14#include <linux/kernel.h>
15#include <linux/netdevice.h>
77f98598 16#include <linux/etherdevice.h>
c06ee961 17#include <linux/netpoll.h>
1da177e4
LT
18#include <linux/ethtool.h>
19#include <linux/if_arp.h>
20#include <linux/module.h>
21#include <linux/init.h>
22#include <linux/rtnetlink.h>
46f25dff 23#include <linux/if_ether.h>
5a0e3ad6 24#include <linux/slab.h>
1da177e4
LT
25#include <net/sock.h>
26
27#include "br_private.h"
28
29/*
30 * Determine initial path cost based on speed.
31 * using recommendations from 802.1d standard
32 *
61a44b9c 33 * Since driver might sleep need to not be holding any locks.
1da177e4 34 */
4433f420 35static int port_cost(struct net_device *dev)
1da177e4 36{
fa3df928 37 struct ethtool_cmd ecmd;
b4a488d1 38
4bc71cb9 39 if (!__ethtool_get_settings(dev, &ecmd)) {
fa3df928
JP
40 switch (ethtool_cmd_speed(&ecmd)) {
41 case SPEED_10000:
42 return 2;
43 case SPEED_1000:
44 return 4;
45 case SPEED_100:
46 return 19;
47 case SPEED_10:
48 return 100;
1da177e4
LT
49 }
50 }
51
52 /* Old silly heuristics based on name */
53 if (!strncmp(dev->name, "lec", 3))
54 return 7;
55
56 if (!strncmp(dev->name, "plip", 4))
57 return 2500;
58
59 return 100; /* assume old 10Mbps */
60}
61
4433f420 62
944c794d 63/* Check for port carrier transistions. */
269def7c 64void br_port_carrier_check(struct net_bridge_port *p)
4433f420 65{
269def7c
SH
66 struct net_device *dev = p->dev;
67 struct net_bridge *br = p->br;
6e86b890 68
576eb625 69 if (netif_running(dev) && netif_oper_up(dev))
6e86b890
SH
70 p->path_cost = port_cost(dev);
71
aa7c6e5f 72 if (!netif_running(br->dev))
73 return;
74
75 spin_lock_bh(&br->lock);
576eb625 76 if (netif_running(dev) && netif_oper_up(dev)) {
aa7c6e5f 77 if (p->state == BR_STATE_DISABLED)
78 br_stp_enable_port(p);
79 } else {
80 if (p->state != BR_STATE_DISABLED)
81 br_stp_disable_port(p);
4433f420 82 }
aa7c6e5f 83 spin_unlock_bh(&br->lock);
4433f420
SH
84}
85
bab1deea
SH
86static void release_nbp(struct kobject *kobj)
87{
88 struct net_bridge_port *p
89 = container_of(kobj, struct net_bridge_port, kobj);
90 kfree(p);
91}
92
93static struct kobj_type brport_ktype = {
94#ifdef CONFIG_SYSFS
95 .sysfs_ops = &brport_sysfs_ops,
96#endif
97 .release = release_nbp,
98};
99
1da177e4
LT
100static void destroy_nbp(struct net_bridge_port *p)
101{
102 struct net_device *dev = p->dev;
103
1da177e4
LT
104 p->br = NULL;
105 p->dev = NULL;
106 dev_put(dev);
107
bab1deea 108 kobject_put(&p->kobj);
1da177e4
LT
109}
110
111static void destroy_nbp_rcu(struct rcu_head *head)
112{
113 struct net_bridge_port *p =
114 container_of(head, struct net_bridge_port, rcu);
115 destroy_nbp(p);
116}
117
3f4cfc2d
SH
118/* Delete port(interface) from bridge is done in two steps.
119 * via RCU. First step, marks device as down. That deletes
120 * all the timers and stops new packets from flowing through.
121 *
122 * Final cleanup doesn't occur until after all CPU's finished
123 * processing packets.
124 *
125 * Protected from multiple admin operations by RTNL mutex
126 */
1da177e4
LT
127static void del_nbp(struct net_bridge_port *p)
128{
129 struct net_bridge *br = p->br;
130 struct net_device *dev = p->dev;
131
b3bcb72e 132 sysfs_remove_link(br->ifobj, p->dev->name);
bab1deea 133
1da177e4
LT
134 dev_set_promiscuity(dev, -1);
135
136 spin_lock_bh(&br->lock);
137 br_stp_disable_port(p);
138 spin_unlock_bh(&br->lock);
139
b86c4503
SH
140 br_ifinfo_notify(RTM_DELLINK, p);
141
243a2e63 142 nbp_vlan_flush(p);
1a620698 143 br_fdb_delete_by_port(br, p, 1);
1da177e4
LT
144
145 list_del_rcu(&p->list);
146
f350a0a8
JP
147 dev->priv_flags &= ~IFF_BRIDGE_PORT;
148
ab95bfe0 149 netdev_rx_handler_unregister(dev);
6df427fe 150 synchronize_net();
b3f1be4b 151
74fdd93f 152 netdev_upper_dev_unlink(dev, br->dev);
afc6151a 153
3fe2d7c7
HX
154 br_multicast_del_port(p);
155
125a12cc 156 kobject_uevent(&p->kobj, KOBJ_REMOVE);
bab1deea
SH
157 kobject_del(&p->kobj);
158
91d2c34a
HX
159 br_netpoll_disable(p);
160
1da177e4
LT
161 call_rcu(&p->rcu, destroy_nbp_rcu);
162}
163
1ce5cce8 164/* Delete bridge device */
165void br_dev_delete(struct net_device *dev, struct list_head *head)
1da177e4 166{
1ce5cce8 167 struct net_bridge *br = netdev_priv(dev);
1da177e4
LT
168 struct net_bridge_port *p, *n;
169
170 list_for_each_entry_safe(p, n, &br->port_list, list) {
1da177e4
LT
171 del_nbp(p);
172 }
173
174 del_timer_sync(&br->gc_timer);
175
176 br_sysfs_delbr(br->dev);
8c56ba05 177 unregister_netdevice_queue(br->dev, head);
1da177e4
LT
178}
179
1da177e4
LT
180/* find an available port number */
181static int find_portno(struct net_bridge *br)
182{
183 int index;
184 struct net_bridge_port *p;
185 unsigned long *inuse;
186
3b781fa1 187 inuse = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long),
1da177e4
LT
188 GFP_KERNEL);
189 if (!inuse)
190 return -ENOMEM;
191
1da177e4
LT
192 set_bit(0, inuse); /* zero is reserved */
193 list_for_each_entry(p, &br->port_list, list) {
194 set_bit(p->port_no, inuse);
195 }
196 index = find_first_zero_bit(inuse, BR_MAX_PORTS);
197 kfree(inuse);
198
199 return (index >= BR_MAX_PORTS) ? -EXFULL : index;
200}
201
4433f420 202/* called with RTNL but without bridge lock */
9d6f229f 203static struct net_bridge_port *new_nbp(struct net_bridge *br,
4433f420 204 struct net_device *dev)
1da177e4
LT
205{
206 int index;
207 struct net_bridge_port *p;
9d6f229f 208
1da177e4
LT
209 index = find_portno(br);
210 if (index < 0)
211 return ERR_PTR(index);
212
cee48541 213 p = kzalloc(sizeof(*p), GFP_KERNEL);
1da177e4
LT
214 if (p == NULL)
215 return ERR_PTR(-ENOMEM);
216
1da177e4
LT
217 p->br = br;
218 dev_hold(dev);
219 p->dev = dev;
4433f420 220 p->path_cost = port_cost(dev);
9d6f229f 221 p->priority = 0x8000 >> BR_PORT_BITS;
1da177e4 222 p->port_no = index;
3982d3d2 223 p->flags = 0;
1da177e4
LT
224 br_init_port(p);
225 p->state = BR_STATE_DISABLED;
d32439c0 226 br_stp_port_timer_init(p);
3fe2d7c7 227 br_multicast_add_port(p);
1da177e4
LT
228
229 return p;
230}
231
4aa678ba 232int br_add_bridge(struct net *net, const char *name)
1da177e4
LT
233{
234 struct net_device *dev;
11f3a6bd 235 int res;
1da177e4 236
bb900b27 237 dev = alloc_netdev(sizeof(struct net_bridge), name,
238 br_dev_setup);
239
9d6f229f 240 if (!dev)
1da177e4
LT
241 return -ENOMEM;
242
bb900b27 243 dev_net_set(dev, net);
149ddd83 244 dev->rtnl_link_ops = &br_link_ops;
e340a90e 245
11f3a6bd
ED
246 res = register_netdev(dev);
247 if (res)
248 free_netdev(dev);
249 return res;
1da177e4
LT
250}
251
4aa678ba 252int br_del_bridge(struct net *net, const char *name)
1da177e4
LT
253{
254 struct net_device *dev;
255 int ret = 0;
256
257 rtnl_lock();
4aa678ba 258 dev = __dev_get_by_name(net, name);
9d6f229f 259 if (dev == NULL)
1da177e4
LT
260 ret = -ENXIO; /* Could not find device */
261
262 else if (!(dev->priv_flags & IFF_EBRIDGE)) {
263 /* Attempt to delete non bridge device! */
264 ret = -EPERM;
265 }
266
267 else if (dev->flags & IFF_UP) {
268 /* Not shutdown yet. */
269 ret = -EBUSY;
9d6f229f 270 }
1da177e4 271
9d6f229f 272 else
1ce5cce8 273 br_dev_delete(dev, NULL);
1da177e4
LT
274
275 rtnl_unlock();
276 return ret;
277}
278
46f25dff 279/* MTU of the bridge pseudo-device: ETH_DATA_LEN or the minimum of the ports */
1da177e4
LT
280int br_min_mtu(const struct net_bridge *br)
281{
282 const struct net_bridge_port *p;
283 int mtu = 0;
284
285 ASSERT_RTNL();
286
287 if (list_empty(&br->port_list))
46f25dff 288 mtu = ETH_DATA_LEN;
1da177e4
LT
289 else {
290 list_for_each_entry(p, &br->port_list, list) {
291 if (!mtu || p->dev->mtu < mtu)
292 mtu = p->dev->mtu;
293 }
294 }
295 return mtu;
296}
297
81d35307
SH
298/*
299 * Recomputes features using slave's features
300 */
c8f44aff
MM
301netdev_features_t br_features_recompute(struct net_bridge *br,
302 netdev_features_t features)
81d35307
SH
303{
304 struct net_bridge_port *p;
c8f44aff 305 netdev_features_t mask;
81d35307 306
b63365a2 307 if (list_empty(&br->port_list))
c4d27ef9 308 return features;
b63365a2 309
c4d27ef9 310 mask = features;
b63365a2 311 features &= ~NETIF_F_ONE_FOR_ALL;
81d35307
SH
312
313 list_for_each_entry(p, &br->port_list, list) {
b63365a2
HX
314 features = netdev_increment_features(features,
315 p->dev->features, mask);
81d35307
SH
316 }
317
c4d27ef9 318 return features;
81d35307
SH
319}
320
1da177e4
LT
321/* called with RTNL */
322int br_add_if(struct net_bridge *br, struct net_device *dev)
323{
324 struct net_bridge_port *p;
325 int err = 0;
edf947f1 326 bool changed_addr;
1da177e4 327
1056bd51
SH
328 /* Don't allow bridging non-ethernet like devices */
329 if ((dev->flags & IFF_LOOPBACK) ||
77f98598 330 dev->type != ARPHRD_ETHER || dev->addr_len != ETH_ALEN ||
331 !is_valid_ether_addr(dev->dev_addr))
1da177e4
LT
332 return -EINVAL;
333
1056bd51 334 /* No bridging of bridges */
00829823 335 if (dev->netdev_ops->ndo_start_xmit == br_dev_xmit)
1da177e4
LT
336 return -ELOOP;
337
1056bd51 338 /* Device is already being bridged */
f350a0a8 339 if (br_port_exists(dev))
1da177e4
LT
340 return -EBUSY;
341
ad4bb6f8
JB
342 /* No bridging devices that dislike that (e.g. wireless) */
343 if (dev->priv_flags & IFF_DONT_BRIDGE)
344 return -EOPNOTSUPP;
345
bab1deea
SH
346 p = new_nbp(br, dev);
347 if (IS_ERR(p))
1da177e4
LT
348 return PTR_ERR(p);
349
bb8ed630
AW
350 call_netdevice_notifiers(NETDEV_JOIN, dev);
351
bc3f9076
WC
352 err = dev_set_promiscuity(dev, 1);
353 if (err)
354 goto put_back;
355
e32cc736
GKH
356 err = kobject_init_and_add(&p->kobj, &brport_ktype, &(dev->dev.kobj),
357 SYSFS_BRIDGE_PORT_ATTR);
bab1deea
SH
358 if (err)
359 goto err1;
1da177e4 360
bab1deea
SH
361 err = br_sysfs_addif(p);
362 if (err)
363 goto err2;
1da177e4 364
47be03a2 365 if (br_netpoll_info(br) && ((err = br_netpoll_enable(p, GFP_KERNEL))))
91d2c34a
HX
366 goto err3;
367
74fdd93f 368 err = netdev_master_upper_dev_link(dev, br->dev);
ab95bfe0 369 if (err)
9b1536c4 370 goto err4;
f350a0a8 371
afc6151a
JP
372 err = netdev_rx_handler_register(dev, br_handle_frame, p);
373 if (err)
9b1536c4 374 goto err5;
afc6151a 375
f350a0a8 376 dev->priv_flags |= IFF_BRIDGE_PORT;
ab95bfe0 377
0187bdfb 378 dev_disable_lro(dev);
bab1deea
SH
379
380 list_add_rcu(&p->list, &br->port_list);
381
c4d27ef9
MM
382 netdev_update_features(br->dev);
383
bab1deea 384 spin_lock_bh(&br->lock);
edf947f1 385 changed_addr = br_stp_recalculate_bridge_id(br);
de79059e 386
576eb625 387 if (netif_running(dev) && netif_oper_up(dev) &&
de79059e
AS
388 (br->dev->flags & IFF_UP))
389 br_stp_enable_port(p);
bab1deea
SH
390 spin_unlock_bh(&br->lock);
391
b86c4503
SH
392 br_ifinfo_notify(RTM_NEWLINK, p);
393
edf947f1 394 if (changed_addr)
56139fc5 395 call_netdevice_notifiers(NETDEV_CHANGEADDR, br->dev);
edf947f1 396
bab1deea 397 dev_set_mtu(br->dev, br_min_mtu(br));
269def7c 398
77f98598 399 if (br_fdb_insert(br, p, dev->dev_addr))
400 netdev_err(dev, "failed insert local address bridge forwarding table\n");
401
bab1deea 402 kobject_uevent(&p->kobj, KOBJ_ADD);
1da177e4 403
bab1deea 404 return 0;
afc6151a 405
9b1536c4 406err5:
74fdd93f 407 netdev_upper_dev_unlink(dev, br->dev);
9b1536c4
G
408err4:
409 br_netpoll_disable(p);
91d2c34a
HX
410err3:
411 sysfs_remove_link(br->ifobj, p->dev->name);
bab1deea 412err2:
c587aea9 413 kobject_put(&p->kobj);
30df94f8 414 p = NULL; /* kobject_put frees */
77f98598 415err1:
bc3f9076 416 dev_set_promiscuity(dev, -1);
43af8532
VL
417put_back:
418 dev_put(dev);
bc3f9076 419 kfree(p);
1da177e4
LT
420 return err;
421}
422
423/* called with RTNL */
424int br_del_if(struct net_bridge *br, struct net_device *dev)
425{
f350a0a8 426 struct net_bridge_port *p;
9be6dd65 427 bool changed_addr;
f350a0a8 428
ec1e5610 429 p = br_port_get_rtnl(dev);
b5ed54e9 430 if (!p || p->br != br)
1da177e4
LT
431 return -EINVAL;
432
d30362c0
AW
433 /* Since more than one interface can be attached to a bridge,
434 * there still maybe an alternate path for netconsole to use;
435 * therefore there is no reason for a NETDEV_RELEASE event.
436 */
1da177e4
LT
437 del_nbp(p);
438
439 spin_lock_bh(&br->lock);
9be6dd65 440 changed_addr = br_stp_recalculate_bridge_id(br);
1da177e4
LT
441 spin_unlock_bh(&br->lock);
442
9be6dd65
AW
443 if (changed_addr)
444 call_netdevice_notifiers(NETDEV_CHANGEADDR, br->dev);
445
c4d27ef9
MM
446 netdev_update_features(br->dev);
447
1da177e4
LT
448 return 0;
449}
450
2c8c1e72 451void __net_exit br_net_exit(struct net *net)
1da177e4 452{
ab1b2046 453 struct net_device *dev;
8c56ba05 454 LIST_HEAD(list);
1da177e4
LT
455
456 rtnl_lock();
8c56ba05
ED
457 for_each_netdev(net, dev)
458 if (dev->priv_flags & IFF_EBRIDGE)
1ce5cce8 459 br_dev_delete(dev, &list);
8c56ba05
ED
460
461 unregister_netdevice_many(&list);
1da177e4
LT
462 rtnl_unlock();
463
464}