]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Userspace interface | |
3 | * Linux ethernet bridge | |
4 | * | |
5 | * Authors: | |
6 | * Lennert Buytenhek <buytenh@gnu.org> | |
7 | * | |
1da177e4 LT |
8 | * This program is free software; you can redistribute it and/or |
9 | * modify it under the terms of the GNU General Public License | |
10 | * as published by the Free Software Foundation; either version | |
11 | * 2 of the License, or (at your option) any later version. | |
12 | */ | |
13 | ||
14 | #include <linux/kernel.h> | |
15 | #include <linux/netdevice.h> | |
77f98598 | 16 | #include <linux/etherdevice.h> |
c06ee961 | 17 | #include <linux/netpoll.h> |
1da177e4 LT |
18 | #include <linux/ethtool.h> |
19 | #include <linux/if_arp.h> | |
20 | #include <linux/module.h> | |
21 | #include <linux/init.h> | |
22 | #include <linux/rtnetlink.h> | |
46f25dff | 23 | #include <linux/if_ether.h> |
5a0e3ad6 | 24 | #include <linux/slab.h> |
c6e970a0 | 25 | #include <net/dsa.h> |
1da177e4 | 26 | #include <net/sock.h> |
407af329 | 27 | #include <linux/if_vlan.h> |
56607386 | 28 | #include <net/switchdev.h> |
1da177e4 LT |
29 | |
30 | #include "br_private.h" | |
31 | ||
32 | /* | |
33 | * Determine initial path cost based on speed. | |
34 | * using recommendations from 802.1d standard | |
35 | * | |
61a44b9c | 36 | * Since driver might sleep need to not be holding any locks. |
1da177e4 | 37 | */ |
4433f420 | 38 | static int port_cost(struct net_device *dev) |
1da177e4 | 39 | { |
702b26a2 | 40 | struct ethtool_link_ksettings ecmd; |
b4a488d1 | 41 | |
702b26a2 DD |
42 | if (!__ethtool_get_link_ksettings(dev, &ecmd)) { |
43 | switch (ecmd.base.speed) { | |
fa3df928 JP |
44 | case SPEED_10000: |
45 | return 2; | |
46 | case SPEED_1000: | |
47 | return 4; | |
48 | case SPEED_100: | |
49 | return 19; | |
50 | case SPEED_10: | |
51 | return 100; | |
1da177e4 LT |
52 | } |
53 | } | |
54 | ||
55 | /* Old silly heuristics based on name */ | |
56 | if (!strncmp(dev->name, "lec", 3)) | |
57 | return 7; | |
58 | ||
59 | if (!strncmp(dev->name, "plip", 4)) | |
60 | return 2500; | |
61 | ||
62 | return 100; /* assume old 10Mbps */ | |
63 | } | |
64 | ||
4433f420 | 65 | |
1a81a2e0 | 66 | /* Check for port carrier transitions. */ |
269def7c | 67 | void br_port_carrier_check(struct net_bridge_port *p) |
4433f420 | 68 | { |
269def7c SH |
69 | struct net_device *dev = p->dev; |
70 | struct net_bridge *br = p->br; | |
6e86b890 | 71 | |
8f3359bd | 72 | if (!(p->flags & BR_ADMIN_COST) && |
73 | netif_running(dev) && netif_oper_up(dev)) | |
6e86b890 SH |
74 | p->path_cost = port_cost(dev); |
75 | ||
aa7c6e5f | 76 | if (!netif_running(br->dev)) |
77 | return; | |
78 | ||
79 | spin_lock_bh(&br->lock); | |
576eb625 | 80 | if (netif_running(dev) && netif_oper_up(dev)) { |
aa7c6e5f | 81 | if (p->state == BR_STATE_DISABLED) |
82 | br_stp_enable_port(p); | |
83 | } else { | |
84 | if (p->state != BR_STATE_DISABLED) | |
85 | br_stp_disable_port(p); | |
4433f420 | 86 | } |
aa7c6e5f | 87 | spin_unlock_bh(&br->lock); |
4433f420 SH |
88 | } |
89 | ||
2796d0c6 VY |
90 | static void br_port_set_promisc(struct net_bridge_port *p) |
91 | { | |
92 | int err = 0; | |
93 | ||
94 | if (br_promisc_port(p)) | |
95 | return; | |
96 | ||
97 | err = dev_set_promiscuity(p->dev, 1); | |
98 | if (err) | |
99 | return; | |
100 | ||
101 | br_fdb_unsync_static(p->br, p); | |
102 | p->flags |= BR_PROMISC; | |
103 | } | |
104 | ||
105 | static void br_port_clear_promisc(struct net_bridge_port *p) | |
106 | { | |
107 | int err; | |
108 | ||
109 | /* Check if the port is already non-promisc or if it doesn't | |
110 | * support UNICAST filtering. Without unicast filtering support | |
111 | * we'll end up re-enabling promisc mode anyway, so just check for | |
112 | * it here. | |
113 | */ | |
114 | if (!br_promisc_port(p) || !(p->dev->priv_flags & IFF_UNICAST_FLT)) | |
115 | return; | |
116 | ||
117 | /* Since we'll be clearing the promisc mode, program the port | |
118 | * first so that we don't have interruption in traffic. | |
119 | */ | |
120 | err = br_fdb_sync_static(p->br, p); | |
121 | if (err) | |
122 | return; | |
123 | ||
124 | dev_set_promiscuity(p->dev, -1); | |
125 | p->flags &= ~BR_PROMISC; | |
126 | } | |
127 | ||
128 | /* When a port is added or removed or when certain port flags | |
129 | * change, this function is called to automatically manage | |
130 | * promiscuity setting of all the bridge ports. We are always called | |
131 | * under RTNL so can skip using rcu primitives. | |
132 | */ | |
133 | void br_manage_promisc(struct net_bridge *br) | |
134 | { | |
135 | struct net_bridge_port *p; | |
136 | bool set_all = false; | |
137 | ||
138 | /* If vlan filtering is disabled or bridge interface is placed | |
139 | * into promiscuous mode, place all ports in promiscuous mode. | |
140 | */ | |
1f51445a | 141 | if ((br->dev->flags & IFF_PROMISC) || !br_vlan_enabled(br->dev)) |
2796d0c6 VY |
142 | set_all = true; |
143 | ||
144 | list_for_each_entry(p, &br->port_list, list) { | |
145 | if (set_all) { | |
146 | br_port_set_promisc(p); | |
147 | } else { | |
148 | /* If the number of auto-ports is <= 1, then all other | |
149 | * ports will have their output configuration | |
150 | * statically specified through fdbs. Since ingress | |
151 | * on the auto-port becomes forwarding/egress to other | |
152 | * ports and egress configuration is statically known, | |
153 | * we can say that ingress configuration of the | |
154 | * auto-port is also statically known. | |
155 | * This lets us disable promiscuous mode and write | |
156 | * this config to hw. | |
157 | */ | |
e0a47d1f TM |
158 | if (br->auto_cnt == 0 || |
159 | (br->auto_cnt == 1 && br_auto_port(p))) | |
2796d0c6 VY |
160 | br_port_clear_promisc(p); |
161 | else | |
162 | br_port_set_promisc(p); | |
163 | } | |
164 | } | |
165 | } | |
166 | ||
e028e4b8 VY |
167 | static void nbp_update_port_count(struct net_bridge *br) |
168 | { | |
169 | struct net_bridge_port *p; | |
170 | u32 cnt = 0; | |
171 | ||
172 | list_for_each_entry(p, &br->port_list, list) { | |
173 | if (br_auto_port(p)) | |
174 | cnt++; | |
175 | } | |
2796d0c6 VY |
176 | if (br->auto_cnt != cnt) { |
177 | br->auto_cnt = cnt; | |
178 | br_manage_promisc(br); | |
179 | } | |
180 | } | |
181 | ||
182 | static void nbp_delete_promisc(struct net_bridge_port *p) | |
183 | { | |
025559ee | 184 | /* If port is currently promiscuous, unset promiscuity. |
2796d0c6 VY |
185 | * Otherwise, it is a static port so remove all addresses |
186 | * from it. | |
187 | */ | |
188 | dev_set_allmulti(p->dev, -1); | |
189 | if (br_promisc_port(p)) | |
190 | dev_set_promiscuity(p->dev, -1); | |
191 | else | |
192 | br_fdb_unsync_static(p->br, p); | |
e028e4b8 VY |
193 | } |
194 | ||
bab1deea SH |
195 | static void release_nbp(struct kobject *kobj) |
196 | { | |
197 | struct net_bridge_port *p | |
198 | = container_of(kobj, struct net_bridge_port, kobj); | |
199 | kfree(p); | |
200 | } | |
201 | ||
202 | static struct kobj_type brport_ktype = { | |
203 | #ifdef CONFIG_SYSFS | |
204 | .sysfs_ops = &brport_sysfs_ops, | |
205 | #endif | |
206 | .release = release_nbp, | |
207 | }; | |
208 | ||
1da177e4 LT |
209 | static void destroy_nbp(struct net_bridge_port *p) |
210 | { | |
211 | struct net_device *dev = p->dev; | |
212 | ||
1da177e4 LT |
213 | p->br = NULL; |
214 | p->dev = NULL; | |
215 | dev_put(dev); | |
216 | ||
bab1deea | 217 | kobject_put(&p->kobj); |
1da177e4 LT |
218 | } |
219 | ||
220 | static void destroy_nbp_rcu(struct rcu_head *head) | |
221 | { | |
222 | struct net_bridge_port *p = | |
223 | container_of(head, struct net_bridge_port, rcu); | |
224 | destroy_nbp(p); | |
225 | } | |
226 | ||
45493d47 PA |
227 | static unsigned get_max_headroom(struct net_bridge *br) |
228 | { | |
229 | unsigned max_headroom = 0; | |
230 | struct net_bridge_port *p; | |
231 | ||
232 | list_for_each_entry(p, &br->port_list, list) { | |
233 | unsigned dev_headroom = netdev_get_fwd_headroom(p->dev); | |
234 | ||
235 | if (dev_headroom > max_headroom) | |
236 | max_headroom = dev_headroom; | |
237 | } | |
238 | ||
239 | return max_headroom; | |
240 | } | |
241 | ||
242 | static void update_headroom(struct net_bridge *br, int new_hr) | |
243 | { | |
244 | struct net_bridge_port *p; | |
245 | ||
246 | list_for_each_entry(p, &br->port_list, list) | |
247 | netdev_set_rx_headroom(p->dev, new_hr); | |
248 | ||
249 | br->dev->needed_headroom = new_hr; | |
250 | } | |
251 | ||
3f4cfc2d SH |
252 | /* Delete port(interface) from bridge is done in two steps. |
253 | * via RCU. First step, marks device as down. That deletes | |
254 | * all the timers and stops new packets from flowing through. | |
255 | * | |
256 | * Final cleanup doesn't occur until after all CPU's finished | |
257 | * processing packets. | |
258 | * | |
259 | * Protected from multiple admin operations by RTNL mutex | |
260 | */ | |
1da177e4 LT |
261 | static void del_nbp(struct net_bridge_port *p) |
262 | { | |
263 | struct net_bridge *br = p->br; | |
264 | struct net_device *dev = p->dev; | |
265 | ||
b3bcb72e | 266 | sysfs_remove_link(br->ifobj, p->dev->name); |
bab1deea | 267 | |
2796d0c6 | 268 | nbp_delete_promisc(p); |
1da177e4 LT |
269 | |
270 | spin_lock_bh(&br->lock); | |
271 | br_stp_disable_port(p); | |
272 | spin_unlock_bh(&br->lock); | |
273 | ||
92899063 | 274 | br_ifinfo_notify(RTM_DELLINK, NULL, p); |
b86c4503 | 275 | |
1da177e4 | 276 | list_del_rcu(&p->list); |
45493d47 PA |
277 | if (netdev_get_fwd_headroom(dev) == br->dev->needed_headroom) |
278 | update_headroom(br, get_max_headroom(br)); | |
279 | netdev_reset_rx_headroom(dev); | |
1da177e4 | 280 | |
f409d0ed | 281 | nbp_vlan_flush(p); |
1ea2d020 | 282 | br_fdb_delete_by_port(br, p, 0, 1); |
56607386 JP |
283 | switchdev_deferred_process(); |
284 | ||
e028e4b8 VY |
285 | nbp_update_port_count(br); |
286 | ||
0f49579a JP |
287 | netdev_upper_dev_unlink(dev, br->dev); |
288 | ||
f350a0a8 JP |
289 | dev->priv_flags &= ~IFF_BRIDGE_PORT; |
290 | ||
ab95bfe0 | 291 | netdev_rx_handler_unregister(dev); |
b3f1be4b | 292 | |
3fe2d7c7 HX |
293 | br_multicast_del_port(p); |
294 | ||
125a12cc | 295 | kobject_uevent(&p->kobj, KOBJ_REMOVE); |
bab1deea SH |
296 | kobject_del(&p->kobj); |
297 | ||
91d2c34a HX |
298 | br_netpoll_disable(p); |
299 | ||
1da177e4 LT |
300 | call_rcu(&p->rcu, destroy_nbp_rcu); |
301 | } | |
302 | ||
1ce5cce8 | 303 | /* Delete bridge device */ |
304 | void br_dev_delete(struct net_device *dev, struct list_head *head) | |
1da177e4 | 305 | { |
1ce5cce8 | 306 | struct net_bridge *br = netdev_priv(dev); |
1da177e4 LT |
307 | struct net_bridge_port *p, *n; |
308 | ||
309 | list_for_each_entry_safe(p, n, &br->port_list, list) { | |
1da177e4 LT |
310 | del_nbp(p); |
311 | } | |
312 | ||
821f1b21 RP |
313 | br_recalculate_neigh_suppress_enabled(br); |
314 | ||
1ea2d020 | 315 | br_fdb_delete_by_port(br, NULL, 0, 1); |
f8730420 | 316 | |
f7cdee8a | 317 | cancel_delayed_work_sync(&br->gc_work); |
1da177e4 LT |
318 | |
319 | br_sysfs_delbr(br->dev); | |
8c56ba05 | 320 | unregister_netdevice_queue(br->dev, head); |
1da177e4 LT |
321 | } |
322 | ||
1da177e4 LT |
323 | /* find an available port number */ |
324 | static int find_portno(struct net_bridge *br) | |
325 | { | |
326 | int index; | |
327 | struct net_bridge_port *p; | |
328 | unsigned long *inuse; | |
329 | ||
3b781fa1 | 330 | inuse = kcalloc(BITS_TO_LONGS(BR_MAX_PORTS), sizeof(unsigned long), |
1da177e4 LT |
331 | GFP_KERNEL); |
332 | if (!inuse) | |
333 | return -ENOMEM; | |
334 | ||
1da177e4 LT |
335 | set_bit(0, inuse); /* zero is reserved */ |
336 | list_for_each_entry(p, &br->port_list, list) { | |
337 | set_bit(p->port_no, inuse); | |
338 | } | |
339 | index = find_first_zero_bit(inuse, BR_MAX_PORTS); | |
340 | kfree(inuse); | |
341 | ||
342 | return (index >= BR_MAX_PORTS) ? -EXFULL : index; | |
343 | } | |
344 | ||
4433f420 | 345 | /* called with RTNL but without bridge lock */ |
9d6f229f | 346 | static struct net_bridge_port *new_nbp(struct net_bridge *br, |
4433f420 | 347 | struct net_device *dev) |
1da177e4 | 348 | { |
1da177e4 | 349 | struct net_bridge_port *p; |
1080ab95 | 350 | int index, err; |
9d6f229f | 351 | |
1da177e4 LT |
352 | index = find_portno(br); |
353 | if (index < 0) | |
354 | return ERR_PTR(index); | |
355 | ||
cee48541 | 356 | p = kzalloc(sizeof(*p), GFP_KERNEL); |
1da177e4 LT |
357 | if (p == NULL) |
358 | return ERR_PTR(-ENOMEM); | |
359 | ||
1da177e4 LT |
360 | p->br = br; |
361 | dev_hold(dev); | |
362 | p->dev = dev; | |
4433f420 | 363 | p->path_cost = port_cost(dev); |
9d6f229f | 364 | p->priority = 0x8000 >> BR_PORT_BITS; |
1da177e4 | 365 | p->port_no = index; |
99f906e9 | 366 | p->flags = BR_LEARNING | BR_FLOOD | BR_MCAST_FLOOD | BR_BCAST_FLOOD; |
1da177e4 | 367 | br_init_port(p); |
775dd692 | 368 | br_set_state(p, BR_STATE_DISABLED); |
d32439c0 | 369 | br_stp_port_timer_init(p); |
1080ab95 NA |
370 | err = br_multicast_add_port(p); |
371 | if (err) { | |
372 | dev_put(dev); | |
373 | kfree(p); | |
374 | p = ERR_PTR(err); | |
375 | } | |
1da177e4 LT |
376 | |
377 | return p; | |
378 | } | |
379 | ||
4aa678ba | 380 | int br_add_bridge(struct net *net, const char *name) |
1da177e4 LT |
381 | { |
382 | struct net_device *dev; | |
11f3a6bd | 383 | int res; |
1da177e4 | 384 | |
c835a677 | 385 | dev = alloc_netdev(sizeof(struct net_bridge), name, NET_NAME_UNKNOWN, |
bb900b27 | 386 | br_dev_setup); |
387 | ||
9d6f229f | 388 | if (!dev) |
1da177e4 LT |
389 | return -ENOMEM; |
390 | ||
bb900b27 | 391 | dev_net_set(dev, net); |
149ddd83 | 392 | dev->rtnl_link_ops = &br_link_ops; |
e340a90e | 393 | |
11f3a6bd ED |
394 | res = register_netdev(dev); |
395 | if (res) | |
396 | free_netdev(dev); | |
397 | return res; | |
1da177e4 LT |
398 | } |
399 | ||
4aa678ba | 400 | int br_del_bridge(struct net *net, const char *name) |
1da177e4 LT |
401 | { |
402 | struct net_device *dev; | |
403 | int ret = 0; | |
404 | ||
405 | rtnl_lock(); | |
4aa678ba | 406 | dev = __dev_get_by_name(net, name); |
9d6f229f | 407 | if (dev == NULL) |
1da177e4 LT |
408 | ret = -ENXIO; /* Could not find device */ |
409 | ||
410 | else if (!(dev->priv_flags & IFF_EBRIDGE)) { | |
411 | /* Attempt to delete non bridge device! */ | |
412 | ret = -EPERM; | |
413 | } | |
414 | ||
415 | else if (dev->flags & IFF_UP) { | |
416 | /* Not shutdown yet. */ | |
417 | ret = -EBUSY; | |
9d6f229f | 418 | } |
1da177e4 | 419 | |
9d6f229f | 420 | else |
1ce5cce8 | 421 | br_dev_delete(dev, NULL); |
1da177e4 LT |
422 | |
423 | rtnl_unlock(); | |
424 | return ret; | |
425 | } | |
426 | ||
419d14af CW |
427 | static bool min_mtu(int a, int b) |
428 | { | |
429 | return a < b ? 1 : 0; | |
430 | } | |
431 | ||
432 | static bool max_mtu(int a, int b) | |
433 | { | |
434 | return a > b ? 1 : 0; | |
435 | } | |
436 | ||
46f25dff | 437 | /* MTU of the bridge pseudo-device: ETH_DATA_LEN or the minimum of the ports */ |
419d14af | 438 | static int __br_mtu(const struct net_bridge *br, bool (compare_fn)(int, int)) |
1da177e4 LT |
439 | { |
440 | const struct net_bridge_port *p; | |
441 | int mtu = 0; | |
442 | ||
443 | ASSERT_RTNL(); | |
444 | ||
445 | if (list_empty(&br->port_list)) | |
46f25dff | 446 | mtu = ETH_DATA_LEN; |
1da177e4 LT |
447 | else { |
448 | list_for_each_entry(p, &br->port_list, list) { | |
419d14af | 449 | if (!mtu || compare_fn(p->dev->mtu, mtu)) |
1da177e4 LT |
450 | mtu = p->dev->mtu; |
451 | } | |
452 | } | |
453 | return mtu; | |
454 | } | |
455 | ||
419d14af CW |
456 | int br_mtu(const struct net_bridge *br) |
457 | { | |
82792a07 | 458 | if (br_vlan_enabled(br->dev)) |
419d14af CW |
459 | return __br_mtu(br, max_mtu); |
460 | else | |
461 | return __br_mtu(br, min_mtu); | |
462 | } | |
463 | ||
ae74f100 ED |
464 | static void br_set_gso_limits(struct net_bridge *br) |
465 | { | |
466 | unsigned int gso_max_size = GSO_MAX_SIZE; | |
467 | u16 gso_max_segs = GSO_MAX_SEGS; | |
468 | const struct net_bridge_port *p; | |
469 | ||
470 | list_for_each_entry(p, &br->port_list, list) { | |
471 | gso_max_size = min(gso_max_size, p->dev->gso_max_size); | |
472 | gso_max_segs = min(gso_max_segs, p->dev->gso_max_segs); | |
473 | } | |
474 | br->dev->gso_max_size = gso_max_size; | |
475 | br->dev->gso_max_segs = gso_max_segs; | |
476 | } | |
477 | ||
81d35307 SH |
478 | /* |
479 | * Recomputes features using slave's features | |
480 | */ | |
c8f44aff MM |
481 | netdev_features_t br_features_recompute(struct net_bridge *br, |
482 | netdev_features_t features) | |
81d35307 SH |
483 | { |
484 | struct net_bridge_port *p; | |
c8f44aff | 485 | netdev_features_t mask; |
81d35307 | 486 | |
b63365a2 | 487 | if (list_empty(&br->port_list)) |
c4d27ef9 | 488 | return features; |
b63365a2 | 489 | |
c4d27ef9 | 490 | mask = features; |
b63365a2 | 491 | features &= ~NETIF_F_ONE_FOR_ALL; |
81d35307 SH |
492 | |
493 | list_for_each_entry(p, &br->port_list, list) { | |
b63365a2 HX |
494 | features = netdev_increment_features(features, |
495 | p->dev->features, mask); | |
81d35307 | 496 | } |
f902e881 | 497 | features = netdev_add_tso_features(features, mask); |
81d35307 | 498 | |
c4d27ef9 | 499 | return features; |
81d35307 SH |
500 | } |
501 | ||
1da177e4 | 502 | /* called with RTNL */ |
ca752be0 DA |
503 | int br_add_if(struct net_bridge *br, struct net_device *dev, |
504 | struct netlink_ext_ack *extack) | |
1da177e4 LT |
505 | { |
506 | struct net_bridge_port *p; | |
507 | int err = 0; | |
45493d47 | 508 | unsigned br_hr, dev_hr; |
edf947f1 | 509 | bool changed_addr; |
1da177e4 | 510 | |
8db0a2ee FF |
511 | /* Don't allow bridging non-ethernet like devices, or DSA-enabled |
512 | * master network devices since the bridge layer rx_handler prevents | |
513 | * the DSA fake ethertype handler to be invoked, so we do not strip off | |
514 | * the DSA switch tag protocol header and the bridge layer just return | |
515 | * RX_HANDLER_CONSUMED, stopping RX processing for these frames. | |
516 | */ | |
1056bd51 | 517 | if ((dev->flags & IFF_LOOPBACK) || |
77f98598 | 518 | dev->type != ARPHRD_ETHER || dev->addr_len != ETH_ALEN || |
8db0a2ee FF |
519 | !is_valid_ether_addr(dev->dev_addr) || |
520 | netdev_uses_dsa(dev)) | |
1da177e4 LT |
521 | return -EINVAL; |
522 | ||
1056bd51 | 523 | /* No bridging of bridges */ |
ca752be0 DA |
524 | if (dev->netdev_ops->ndo_start_xmit == br_dev_xmit) { |
525 | NL_SET_ERR_MSG(extack, | |
526 | "Can not enslave a bridge to a bridge"); | |
1da177e4 | 527 | return -ELOOP; |
ca752be0 | 528 | } |
1da177e4 | 529 | |
1056bd51 | 530 | /* Device is already being bridged */ |
f350a0a8 | 531 | if (br_port_exists(dev)) |
1da177e4 LT |
532 | return -EBUSY; |
533 | ||
ad4bb6f8 | 534 | /* No bridging devices that dislike that (e.g. wireless) */ |
ca752be0 DA |
535 | if (dev->priv_flags & IFF_DONT_BRIDGE) { |
536 | NL_SET_ERR_MSG(extack, | |
537 | "Device does not allow enslaving to a bridge"); | |
ad4bb6f8 | 538 | return -EOPNOTSUPP; |
ca752be0 | 539 | } |
ad4bb6f8 | 540 | |
bab1deea SH |
541 | p = new_nbp(br, dev); |
542 | if (IS_ERR(p)) | |
1da177e4 LT |
543 | return PTR_ERR(p); |
544 | ||
bb8ed630 AW |
545 | call_netdevice_notifiers(NETDEV_JOIN, dev); |
546 | ||
2796d0c6 | 547 | err = dev_set_allmulti(dev, 1); |
bc3f9076 WC |
548 | if (err) |
549 | goto put_back; | |
550 | ||
e32cc736 GKH |
551 | err = kobject_init_and_add(&p->kobj, &brport_ktype, &(dev->dev.kobj), |
552 | SYSFS_BRIDGE_PORT_ATTR); | |
bab1deea SH |
553 | if (err) |
554 | goto err1; | |
1da177e4 | 555 | |
bab1deea SH |
556 | err = br_sysfs_addif(p); |
557 | if (err) | |
558 | goto err2; | |
1da177e4 | 559 | |
a8779ec1 | 560 | err = br_netpoll_enable(p); |
93d8bf9f | 561 | if (err) |
91d2c34a HX |
562 | goto err3; |
563 | ||
0f49579a | 564 | err = netdev_rx_handler_register(dev, br_handle_frame, p); |
ab95bfe0 | 565 | if (err) |
9b1536c4 | 566 | goto err4; |
f350a0a8 | 567 | |
0f49579a JP |
568 | dev->priv_flags |= IFF_BRIDGE_PORT; |
569 | ||
ca752be0 | 570 | err = netdev_master_upper_dev_link(dev, br->dev, NULL, NULL, extack); |
afc6151a | 571 | if (err) |
9b1536c4 | 572 | goto err5; |
afc6151a | 573 | |
6bc506b4 IS |
574 | err = nbp_switchdev_mark_set(p); |
575 | if (err) | |
576 | goto err6; | |
577 | ||
0187bdfb | 578 | dev_disable_lro(dev); |
bab1deea SH |
579 | |
580 | list_add_rcu(&p->list, &br->port_list); | |
581 | ||
e028e4b8 VY |
582 | nbp_update_port_count(br); |
583 | ||
c4d27ef9 MM |
584 | netdev_update_features(br->dev); |
585 | ||
45493d47 PA |
586 | br_hr = br->dev->needed_headroom; |
587 | dev_hr = netdev_get_fwd_headroom(dev); | |
588 | if (br_hr < dev_hr) | |
589 | update_headroom(br, dev_hr); | |
590 | else | |
591 | netdev_set_rx_headroom(dev, br_hr); | |
fd094808 | 592 | |
a4b816d8 TM |
593 | if (br_fdb_insert(br, p, dev->dev_addr, 0)) |
594 | netdev_err(dev, "failed insert local address bridge forwarding table\n"); | |
595 | ||
08474cc1 ER |
596 | err = nbp_vlan_init(p); |
597 | if (err) { | |
5be5a2df | 598 | netdev_err(dev, "failed to initialize vlan filtering on this port\n"); |
6bc506b4 | 599 | goto err7; |
08474cc1 | 600 | } |
5be5a2df | 601 | |
bab1deea | 602 | spin_lock_bh(&br->lock); |
edf947f1 | 603 | changed_addr = br_stp_recalculate_bridge_id(br); |
de79059e | 604 | |
576eb625 | 605 | if (netif_running(dev) && netif_oper_up(dev) && |
de79059e AS |
606 | (br->dev->flags & IFF_UP)) |
607 | br_stp_enable_port(p); | |
bab1deea SH |
608 | spin_unlock_bh(&br->lock); |
609 | ||
92899063 | 610 | br_ifinfo_notify(RTM_NEWLINK, NULL, p); |
b86c4503 | 611 | |
edf947f1 | 612 | if (changed_addr) |
56139fc5 | 613 | call_netdevice_notifiers(NETDEV_CHANGEADDR, br->dev); |
edf947f1 | 614 | |
419d14af | 615 | dev_set_mtu(br->dev, br_mtu(br)); |
ae74f100 | 616 | br_set_gso_limits(br); |
269def7c | 617 | |
bab1deea | 618 | kobject_uevent(&p->kobj, KOBJ_ADD); |
1da177e4 | 619 | |
bab1deea | 620 | return 0; |
afc6151a | 621 | |
6bc506b4 | 622 | err7: |
08474cc1 ER |
623 | list_del_rcu(&p->list); |
624 | br_fdb_delete_by_port(br, p, 0, 1); | |
625 | nbp_update_port_count(br); | |
6bc506b4 | 626 | err6: |
08474cc1 | 627 | netdev_upper_dev_unlink(dev, br->dev); |
9b1536c4 | 628 | err5: |
0f49579a JP |
629 | dev->priv_flags &= ~IFF_BRIDGE_PORT; |
630 | netdev_rx_handler_unregister(dev); | |
9b1536c4 G |
631 | err4: |
632 | br_netpoll_disable(p); | |
91d2c34a HX |
633 | err3: |
634 | sysfs_remove_link(br->ifobj, p->dev->name); | |
bab1deea | 635 | err2: |
c587aea9 | 636 | kobject_put(&p->kobj); |
30df94f8 | 637 | p = NULL; /* kobject_put frees */ |
77f98598 | 638 | err1: |
019ee792 | 639 | dev_set_allmulti(dev, -1); |
43af8532 VL |
640 | put_back: |
641 | dev_put(dev); | |
bc3f9076 | 642 | kfree(p); |
1da177e4 LT |
643 | return err; |
644 | } | |
645 | ||
646 | /* called with RTNL */ | |
647 | int br_del_if(struct net_bridge *br, struct net_device *dev) | |
648 | { | |
f350a0a8 | 649 | struct net_bridge_port *p; |
9be6dd65 | 650 | bool changed_addr; |
f350a0a8 | 651 | |
ec1e5610 | 652 | p = br_port_get_rtnl(dev); |
b5ed54e9 | 653 | if (!p || p->br != br) |
1da177e4 LT |
654 | return -EINVAL; |
655 | ||
d30362c0 AW |
656 | /* Since more than one interface can be attached to a bridge, |
657 | * there still maybe an alternate path for netconsole to use; | |
658 | * therefore there is no reason for a NETDEV_RELEASE event. | |
659 | */ | |
1da177e4 LT |
660 | del_nbp(p); |
661 | ||
419d14af | 662 | dev_set_mtu(br->dev, br_mtu(br)); |
ae74f100 | 663 | br_set_gso_limits(br); |
4c906c27 | 664 | |
1da177e4 | 665 | spin_lock_bh(&br->lock); |
9be6dd65 | 666 | changed_addr = br_stp_recalculate_bridge_id(br); |
1da177e4 LT |
667 | spin_unlock_bh(&br->lock); |
668 | ||
9be6dd65 AW |
669 | if (changed_addr) |
670 | call_netdevice_notifiers(NETDEV_CHANGEADDR, br->dev); | |
671 | ||
c4d27ef9 MM |
672 | netdev_update_features(br->dev); |
673 | ||
1da177e4 LT |
674 | return 0; |
675 | } | |
e028e4b8 VY |
676 | |
677 | void br_port_flags_change(struct net_bridge_port *p, unsigned long mask) | |
678 | { | |
679 | struct net_bridge *br = p->br; | |
680 | ||
681 | if (mask & BR_AUTO_MASK) | |
682 | nbp_update_port_count(br); | |
821f1b21 RP |
683 | |
684 | if (mask & BR_NEIGH_SUPPRESS) | |
685 | br_recalculate_neigh_suppress_enabled(br); | |
e028e4b8 | 686 | } |