From patchwork Mon Mar 15 19:54:13 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tobias Waldekranz X-Patchwork-Id: 12140581 X-Patchwork-Delegate: kuba@kernel.org Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C5703C433DB for ; Mon, 15 Mar 2021 19:55:05 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 7AB5564EB9 for ; Mon, 15 Mar 2021 19:55:05 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232837AbhCOTyd (ORCPT ); Mon, 15 Mar 2021 15:54:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37348 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232201AbhCOTyW (ORCPT ); Mon, 15 Mar 2021 15:54:22 -0400 Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B291FC06174A for ; Mon, 15 Mar 2021 12:54:21 -0700 (PDT) Received: by mail-lj1-x22b.google.com with SMTP id z25so17737872lja.3 for ; Mon, 15 Mar 2021 12:54:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=waldekranz-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:mime-version:organization :content-transfer-encoding; bh=weg72wpldcSL1I55zGGOF2EL2xqYg1/oj+TqGx/N+g8=; b=Fm9WiG2giLiVevchHB22lRkJ1QH0LRRqyqMn1SxleGboV4r+4LBWZcLMXqIWk6hOeH y6Cd6g62AvgWdh6aPw08QQX+fRAklgdbjA/+WIhX6ycIbBhDNQK/YkSobsVHSCibDhxF J9E+5b+9sY/DFEPwj+c6FDoaHoHzECC1KgF/l12h9MTlx+G9HasTdZ0W2LmAbb0xelIu IcgYXgM1Vue8r2GhlidtCPRcNzCm9m0IKfRs9HxQ8Xmdnz8al9aqCmtUOiga7T339SOY u167xupbJx7McTLyh2MbNh2HWAoEye8ZqOredmr7zzwYRYrR23wUJhwp7twzfK23EYyi d6eg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :organization:content-transfer-encoding; bh=weg72wpldcSL1I55zGGOF2EL2xqYg1/oj+TqGx/N+g8=; b=cmZ9bTyi7crRrOAj5ElfVHlNSyaCsj71vHBSPU0Lc8xsbRS0RUfFbE/hQdZqbU8tMd ZiHZX3sfaVVBYG2ar0CZJS+9cSJdStjQ2LDHp+bUAZGiVTl1tLKFMt9PWreVOyGs1MmY CC0GXX6Qaca3Tu7XfIsoigR5exT2sLHJwy/e6euB9A6NKH3/u1x9e/5cC57qN/COXU5t o80B87TrwCTGsU0c/WdY8yTYMtzVkxuawnBCyKcD2IJnsI4Gl+TsR4qGzKVC3Ej4lvSh A1l+jAvnfpWE7OAeydMLPoRGQRpYf/CkikUjo7OFUL+beFijyxJd2Bo0kYn27Wi2d+4i YRbw== X-Gm-Message-State: AOAM532fGWlBbOWesmXnqUXVHsKeixJtiMvn4MG+2P+3kC3Zu0qSZLGe 5q+wgatzxqm2Q/NWYcJD29tTFOOiP/4QwLPs X-Google-Smtp-Source: ABdhPJyrPxNZvMh/mHC0aIraDHlTOiK4C0J+9dGZCXVaZGyUv4s0sbCeHHRODyxtGMbr4fN4yYHlpw== X-Received: by 2002:a2e:b051:: with SMTP id d17mr380413ljl.255.1615838060078; Mon, 15 Mar 2021 12:54:20 -0700 (PDT) Received: from veiron.westermo.com (static-193-12-47-89.cust.tele2.se. [193.12.47.89]) by smtp.gmail.com with ESMTPSA id u25sm2803627lfk.213.2021.03.15.12.54.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Mar 2021 12:54:19 -0700 (PDT) From: Tobias Waldekranz To: davem@davemloft.net, kuba@kernel.org Cc: andrew@lunn.ch, vivien.didelot@gmail.com, f.fainelli@gmail.com, olteanv@gmail.com, netdev@vger.kernel.org Subject: [PATCH net] net: dsa: Centralize validation of VLAN configuration Date: Mon, 15 Mar 2021 20:54:13 +0100 Message-Id: <20210315195413.2679929-1-tobias@waldekranz.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Organization: Westermo Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: kuba@kernel.org There are four kinds of events that have an inpact on VLAN configuration of DSA ports: - Adding VLAN uppers (ip link add dev swp0.1 link swp0 type vlan id 1) - Bridging VLAN uppers (ip link set dev swp0.1 master br0) - Adding bridge VLANs (bridge vlan add dev swp0 vid 1) - Changes to a bridge's VLAN filtering setting (ip link set dev br0 type bridge vlan_filtering 1) For all of these events, we want to ensure that some invariants are upheld for offloaded ports belonging to our tree: - For hardware where VLAN filtering is a global setting, either all bridges must use VLAN filtering, or no bridge can. - For all filtering bridges, no VID may be configured on more than one VLAN upper. An example of a violation of this would be: .100 br0 .100 \ / \ / swp0 swp1 $ ip link add dev br0 type bridge vlan_filtering 1 $ ip link add dev swp0.100 link swp0 type vlan id 100 $ ip link set dev swp0 master br0 $ ip link add dev swp1.100 link swp0 type vlan id 100 $ ip link set dev swp1 master br0 - For all filtering bridges, no upper VLAN may share a bridge with another offloaded port. An example of a violation of this would be: br0 / | / | .100 | | | swp0 swp1 $ ip link add dev br0 type bridge vlan_filtering 1 $ ip link add dev swp0.100 link swp0 type vlan id 100 $ ip link set dev swp0.100 master br0 $ ip link set dev swp1 master br0 - For all filtering bridges, no VID that exists in the bridge may be used by a VLAN upper. An example of a violation of this would be: br0 (100) | .100 | \ | swp0 $ ip link add dev br0 type bridge vlan_filtering 1 $ ip link add dev swp0.100 link swp0 type vlan id 100 $ ip link set dev swp0 master br0 $ bridge vlan add dev swp0 vid 100 Move the validation of these invariants to a central function, and use it from all sites where these events are handled. This way, we ensure that all invariants are always checked, avoiding certain configs being allowed or disallowed depending on the order in which commands are given. Signed-off-by: Tobias Waldekranz Reported-by: kernel test robot --- I realize that this perhaps is a bit sprawling, but it is not obvious to me how it could be split up. Happy to take suggestions. I have tested this against Vladimir's comprehensive test suite posted here: https://lore.kernel.org/netdev/20210309220119.t24sdc7cqqfxhpfb@skbuf/ With this patch applied, all cases pass both for regular ports and hardware offloaded LAGs on an mv88e6xxx device. I have made an effort to not use any LAG-specific knowledge, so this should also work for other offloaded uppers in the future (like HSR rings for example). net/dsa/dsa2.c | 180 +++++++++++++++++++++++++++++++++++++++++++++ net/dsa/dsa_priv.h | 29 ++++++++ net/dsa/port.c | 100 ++++++++++--------------- net/dsa/slave.c | 100 +++++++------------------ 4 files changed, 275 insertions(+), 134 deletions(-) diff --git a/net/dsa/dsa2.c b/net/dsa/dsa2.c index 4d4956ed303b..206e05985857 100644 --- a/net/dsa/dsa2.c +++ b/net/dsa/dsa2.c @@ -21,6 +21,186 @@ static DEFINE_MUTEX(dsa2_mutex); LIST_HEAD(dsa_tree_list); +static bool dsa_bridge_filtering_is_coherent(struct dsa_switch_tree *dst, bool filter, + struct netlink_ext_ack *extack) +{ + bool is_global = false; + struct dsa_port *dp; + + list_for_each_entry(dp, &dst->ports, list) { + if (dp->ds->vlan_filtering_is_global) { + is_global = true; + break; + } + } + + if (!is_global) + return true; + + /* For cases where enabling/disabling VLAN awareness is global + * to the switch, we need to handle the case where multiple + * bridges span different ports of the same switch device and + * one of them has a different setting than what is being + * requested. + */ + list_for_each_entry(dp, &dst->ports, list) { + if (!dp->bridge_dev) + continue; + + if (br_vlan_enabled(dp->bridge_dev) != filter) { + NL_SET_ERR_MSG_MOD(extack, + "VLAN filtering is not consistent across all bridges"); + return false; + } + } + + return true; +} + +static bool dsa_8021q_uppers_are_coherent(struct dsa_switch_tree *dst, + struct net_device *br, + bool seen_vlan_upper, + unsigned long *upper_vids, + struct netlink_ext_ack *extack) +{ + struct net_device *lower, *upper; + struct list_head *liter, *uiter; + struct dsa_slave_priv *priv; + bool seen_offloaded = false; + u16 vid; + + netdev_for_each_lower_dev(br, lower, liter) { + priv = dsa_slave_dev_lower_find(lower); + if (!priv || priv->dp->ds->dst != dst) + /* Ignore ports that are not related to us in + * any way. + */ + continue; + + if (is_vlan_dev(lower)) { + seen_vlan_upper = true; + continue; + } + + if (dsa_port_offloads_bridge(priv->dp, br) && + dsa_port_offloads_bridge_port(priv->dp, lower)) + seen_offloaded = true; + else + /* Non-offloaded uppers can to whatever they + * want. + */ + continue; + + netdev_for_each_upper_dev_rcu(lower, upper, uiter) { + if (!is_vlan_dev(upper)) + continue; + + vid = vlan_dev_vlan_id(upper); + if (!test_bit(vid, upper_vids)) { + set_bit(vid, upper_vids); + continue; + } + + NL_SET_ERR_MSG_MOD(extack, + "Multiple VLAN interfaces cannot use the same VID"); + return false; + } + } + + if (seen_offloaded && seen_vlan_upper) { + NL_SET_ERR_MSG_MOD(extack, + "VLAN interfaces cannot share bridge with offloaded port"); + return false; + } + + return true; +} + +static bool dsa_bridge_vlans_are_coherent(struct net_device *br, + u16 new_vid, unsigned long *upper_vids, + struct netlink_ext_ack *extack) +{ + u16 vid; + + if (new_vid && test_bit(new_vid, upper_vids)) + goto err; + + for_each_set_bit(vid, upper_vids, VLAN_N_VID) { + struct bridge_vlan_info br_info; + + if (br_vlan_get_info(br, vid, &br_info)) + /* Error means that the VID does not exist, + * which is what we want to ensure. + */ + continue; + + goto err; + } + + return true; + +err: + NL_SET_ERR_MSG_MOD(extack, "No bridge VID may be used on a related VLAN interface"); + return false; +} + +/** + * dsa_bridge_is_coherent - Verify that DSA tree accepts a bridge config. + * @dst: Tree to verify against. + * @br: Bridge netdev to verify. + * @mod: Description of the modification to introduce. + * @extack: Netlink extended ack for error reporting. + * + * Verify that the VLAN config of @br, its offloaded ports belonging + * to @dst and their VLAN uppers, can be correctly offloaded after + * introducing the change described by @mod. If this is not the case, + * an error is reported via @extack. + * + * Return: true if the config can be offloaded, false otherwise. + */ +bool dsa_bridge_is_coherent(struct dsa_switch_tree *dst, struct net_device *br, + struct dsa_bridge_mod *mod, + struct netlink_ext_ack *extack) +{ + unsigned long *upper_vids = NULL; + bool filter; + + if (mod->filter) + filter = *mod->filter; + else + filter = br && br_vlan_enabled(br); + + if (!dsa_bridge_filtering_is_coherent(dst, filter, extack)) + goto err; + + if (!filter) + return true; + + upper_vids = bitmap_zalloc(VLAN_N_VID, GFP_KERNEL); + if (!upper_vids) { + WARN_ON_ONCE(1); + goto err; + } + + if (mod->upper_vid) + set_bit(mod->upper_vid, upper_vids); + + if (!dsa_8021q_uppers_are_coherent(dst, br, mod->bridge_upper, + upper_vids, extack)) + goto err_free; + + if (!dsa_bridge_vlans_are_coherent(br, mod->br_vid, upper_vids, extack)) + goto err_free; + + kfree(upper_vids); + return true; + +err_free: + kfree(upper_vids); +err: + return false; +} + /** * dsa_tree_notify - Execute code for all switches in a DSA switch tree. * @dst: collection of struct dsa_switch devices to notify. diff --git a/net/dsa/dsa_priv.h b/net/dsa/dsa_priv.h index 9d4b0e9b1aa1..8d8d307df437 100644 --- a/net/dsa/dsa_priv.h +++ b/net/dsa/dsa_priv.h @@ -188,6 +188,13 @@ int dsa_port_lag_change(struct dsa_port *dp, int dsa_port_lag_join(struct dsa_port *dp, struct net_device *lag_dev, struct netdev_lag_upper_info *uinfo); void dsa_port_lag_leave(struct dsa_port *dp, struct net_device *lag_dev); +bool dsa_port_can_stack_vlan_upper(struct dsa_port *dp, u16 vid, + struct netlink_ext_ack *extack); +bool dsa_port_can_bridge_vlan_upper(struct dsa_port *dp, + struct net_device *upper_br, + struct netlink_ext_ack *extack); +bool dsa_port_can_add_bridge_vlan(struct dsa_port *dp, u16 vid, + struct netlink_ext_ack *extack); int dsa_port_vlan_filtering(struct dsa_port *dp, bool vlan_filtering, struct netlink_ext_ack *extack); bool dsa_port_skip_vlan_configuration(struct dsa_port *dp); @@ -271,6 +278,7 @@ static inline bool dsa_tree_offloads_bridge_port(struct dsa_switch_tree *dst, } /* slave.c */ +struct dsa_slave_priv *dsa_slave_dev_lower_find(struct net_device *dev); extern const struct dsa_device_ops notag_netdev_ops; void dsa_slave_mii_bus_init(struct dsa_switch *ds); int dsa_slave_create(struct dsa_port *dp); @@ -361,6 +369,27 @@ int dsa_switch_register_notifier(struct dsa_switch *ds); void dsa_switch_unregister_notifier(struct dsa_switch *ds); /* dsa2.c */ + +/** + * struct dsa_bridge_mod - Modification of bridge related config + * @filter: If non-NULL, the new state of VLAN filtering. + * @br_vid: If non-zero, this VID will be added to the bridge. + * @upper_vid: If non-zero, a VLAN upper using this VID will be added to + * a bridge port. + * @bridge_upper: If non-NULL, a VLAN upper will be added to the bridge. + * + * Describes a bridge related modification that is about to be applied. + */ +struct dsa_bridge_mod { + bool *filter; + u16 br_vid; + u16 upper_vid; + bool bridge_upper; +}; + +bool dsa_bridge_is_coherent(struct dsa_switch_tree *dst, struct net_device *br, + struct dsa_bridge_mod *mod, + struct netlink_ext_ack *extack); void dsa_lag_map(struct dsa_switch_tree *dst, struct net_device *lag); void dsa_lag_unmap(struct dsa_switch_tree *dst, struct net_device *lag); int dsa_tree_notify(struct dsa_switch_tree *dst, unsigned long e, void *v); diff --git a/net/dsa/port.c b/net/dsa/port.c index c9c6d7ab3f47..76c79d2d80a2 100644 --- a/net/dsa/port.c +++ b/net/dsa/port.c @@ -292,72 +292,48 @@ void dsa_port_lag_leave(struct dsa_port *dp, struct net_device *lag) dsa_lag_unmap(dp->ds->dst, lag); } -/* Must be called under rcu_read_lock() */ -static bool dsa_port_can_apply_vlan_filtering(struct dsa_port *dp, - bool vlan_filtering, - struct netlink_ext_ack *extack) +bool dsa_port_can_stack_vlan_upper(struct dsa_port *dp, u16 vid, + struct netlink_ext_ack *extack) { - struct dsa_switch *ds = dp->ds; - int err, i; + struct dsa_bridge_mod mod = { + .upper_vid = vid, + }; - /* VLAN awareness was off, so the question is "can we turn it on". - * We may have had 8021q uppers, those need to go. Make sure we don't - * enter an inconsistent state: deny changing the VLAN awareness state - * as long as we have 8021q uppers. - */ - if (vlan_filtering && dsa_is_user_port(ds, dp->index)) { - struct net_device *upper_dev, *slave = dp->slave; - struct net_device *br = dp->bridge_dev; - struct list_head *iter; - - netdev_for_each_upper_dev_rcu(slave, upper_dev, iter) { - struct bridge_vlan_info br_info; - u16 vid; - - if (!is_vlan_dev(upper_dev)) - continue; - - vid = vlan_dev_vlan_id(upper_dev); - - /* br_vlan_get_info() returns -EINVAL or -ENOENT if the - * device, respectively the VID is not found, returning - * 0 means success, which is a failure for us here. - */ - err = br_vlan_get_info(br, vid, &br_info); - if (err == 0) { - NL_SET_ERR_MSG_MOD(extack, - "Must first remove VLAN uppers having VIDs also present in bridge"); - return false; - } - } - } + return dsa_bridge_is_coherent(dp->ds->dst, dp->bridge_dev, &mod, + extack); +} - if (!ds->vlan_filtering_is_global) - return true; +bool dsa_port_can_bridge_vlan_upper(struct dsa_port *dp, + struct net_device *upper_br, + struct netlink_ext_ack *extack) +{ + struct dsa_bridge_mod mod = { + .bridge_upper = true, + }; - /* For cases where enabling/disabling VLAN awareness is global to the - * switch, we need to handle the case where multiple bridges span - * different ports of the same switch device and one of them has a - * different setting than what is being requested. - */ - for (i = 0; i < ds->num_ports; i++) { - struct net_device *other_bridge; - - other_bridge = dsa_to_port(ds, i)->bridge_dev; - if (!other_bridge) - continue; - /* If it's the same bridge, it also has same - * vlan_filtering setting => no need to check - */ - if (other_bridge == dp->bridge_dev) - continue; - if (br_vlan_enabled(other_bridge) != vlan_filtering) { - NL_SET_ERR_MSG_MOD(extack, - "VLAN filtering is a global setting"); - return false; - } - } - return true; + return dsa_bridge_is_coherent(dp->ds->dst, upper_br, &mod, extack); +} + +bool dsa_port_can_add_bridge_vlan(struct dsa_port *dp, u16 vid, + struct netlink_ext_ack *extack) +{ + struct dsa_bridge_mod mod = { + .br_vid = vid, + }; + + return dsa_bridge_is_coherent(dp->ds->dst, dp->bridge_dev, &mod, + extack); +} + +static bool dsa_port_can_apply_vlan_filtering(struct dsa_port *dp, bool filter, + struct netlink_ext_ack *extack) +{ + struct dsa_bridge_mod mod = { + .filter = &filter, + }; + + return dsa_bridge_is_coherent(dp->ds->dst, dp->bridge_dev, &mod, + extack); } int dsa_port_vlan_filtering(struct dsa_port *dp, bool vlan_filtering, diff --git a/net/dsa/slave.c b/net/dsa/slave.c index 992fcab4b552..04f75b0ae297 100644 --- a/net/dsa/slave.c +++ b/net/dsa/slave.c @@ -325,28 +325,6 @@ static int dsa_slave_port_attr_set(struct net_device *dev, return ret; } -/* Must be called under rcu_read_lock() */ -static int -dsa_slave_vlan_check_for_8021q_uppers(struct net_device *slave, - const struct switchdev_obj_port_vlan *vlan) -{ - struct net_device *upper_dev; - struct list_head *iter; - - netdev_for_each_upper_dev_rcu(slave, upper_dev, iter) { - u16 vid; - - if (!is_vlan_dev(upper_dev)) - continue; - - vid = vlan_dev_vlan_id(upper_dev); - if (vid == vlan->vid) - return -EBUSY; - } - - return 0; -} - static int dsa_slave_vlan_add(struct net_device *dev, const struct switchdev_obj *obj, struct netlink_ext_ack *extack) @@ -363,19 +341,8 @@ static int dsa_slave_vlan_add(struct net_device *dev, vlan = *SWITCHDEV_OBJ_PORT_VLAN(obj); - /* Deny adding a bridge VLAN when there is already an 802.1Q upper with - * the same VID. - */ - if (br_vlan_enabled(dp->bridge_dev)) { - rcu_read_lock(); - err = dsa_slave_vlan_check_for_8021q_uppers(dev, &vlan); - rcu_read_unlock(); - if (err) { - NL_SET_ERR_MSG_MOD(extack, - "Port already has a VLAN upper with this VID"); - return err; - } - } + if (!dsa_port_can_add_bridge_vlan(dp, vlan.vid, extack)) + return -EBUSY; err = dsa_port_vlan_add(dp, &vlan, extack); if (err) @@ -2050,30 +2017,20 @@ static int dsa_prevent_bridging_8021q_upper(struct net_device *dev, struct netdev_notifier_changeupper_info *info) { - struct netlink_ext_ack *ext_ack; - struct net_device *slave; - struct dsa_port *dp; - - ext_ack = netdev_notifier_info_to_extack(&info->info); + struct netlink_ext_ack *extack; + struct dsa_slave_priv *p; - if (!is_vlan_dev(dev)) - return NOTIFY_DONE; + extack = netdev_notifier_info_to_extack(&info->info); - slave = vlan_dev_real_dev(dev); - if (!dsa_slave_dev_check(slave)) + p = dsa_slave_dev_lower_find(vlan_dev_real_dev(dev)); + if (!p) return NOTIFY_DONE; - dp = dsa_slave_to_port(slave); - if (!dp->bridge_dev) + if (!netif_is_bridge_master(info->upper_dev) || !info->linking) return NOTIFY_DONE; - /* Deny enslaving a VLAN device into a VLAN-aware bridge */ - if (br_vlan_enabled(dp->bridge_dev) && - netif_is_bridge_master(info->upper_dev) && info->linking) { - NL_SET_ERR_MSG_MOD(ext_ack, - "Cannot enslave VLAN device into VLAN aware bridge"); + if (!dsa_port_can_bridge_vlan_upper(p->dp, info->upper_dev, extack)) return notifier_from_errno(-EINVAL); - } return NOTIFY_DONE; } @@ -2082,29 +2039,20 @@ static int dsa_slave_check_8021q_upper(struct net_device *dev, struct netdev_notifier_changeupper_info *info) { - struct dsa_port *dp = dsa_slave_to_port(dev); - struct net_device *br = dp->bridge_dev; - struct bridge_vlan_info br_info; struct netlink_ext_ack *extack; - int err = NOTIFY_DONE; + struct dsa_slave_priv *p; u16 vid; - if (!br || !br_vlan_enabled(br)) + extack = netdev_notifier_info_to_extack(&info->info); + + p = dsa_slave_dev_lower_find(dev); + if (!p) return NOTIFY_DONE; - extack = netdev_notifier_info_to_extack(&info->info); vid = vlan_dev_vlan_id(info->upper_dev); - /* br_vlan_get_info() returns -EINVAL or -ENOENT if the - * device, respectively the VID is not found, returning - * 0 means success, which is a failure for us here. - */ - err = br_vlan_get_info(br, vid, &br_info); - if (err == 0) { - NL_SET_ERR_MSG_MOD(extack, - "This VLAN is already configured by the bridge"); + if (!dsa_port_can_stack_vlan_upper(p->dp, vid, extack)) return notifier_from_errno(-EBUSY); - } return NOTIFY_DONE; } @@ -2121,8 +2069,16 @@ static int dsa_slave_netdevice_event(struct notifier_block *nb, struct dsa_port *dp; int err; + if (is_vlan_dev(dev)) + err = dsa_prevent_bridging_8021q_upper(dev, ptr); + else if (is_vlan_dev(info->upper_dev)) + err = dsa_slave_check_8021q_upper(dev, ptr); + + if (err) + return err; + if (!dsa_slave_dev_check(dev)) - return dsa_prevent_bridging_8021q_upper(dev, ptr); + return NOTIFY_DONE; dp = dsa_slave_to_port(dev); ds = dp->ds; @@ -2132,9 +2088,6 @@ static int dsa_slave_netdevice_event(struct notifier_block *nb, if (err) return notifier_from_errno(err); } - - if (is_vlan_dev(info->upper_dev)) - return dsa_slave_check_8021q_upper(dev, ptr); break; } case NETDEV_CHANGEUPPER: @@ -2260,12 +2213,15 @@ static int dsa_lower_dev_walk(struct net_device *lower_dev, return 0; } -static struct dsa_slave_priv *dsa_slave_dev_lower_find(struct net_device *dev) +struct dsa_slave_priv *dsa_slave_dev_lower_find(struct net_device *dev) { struct netdev_nested_priv priv = { .data = NULL, }; + if (dsa_slave_dev_check(dev)) + return netdev_priv(dev); + netdev_walk_all_lower_dev_rcu(dev, dsa_lower_dev_walk, &priv); return (struct dsa_slave_priv *)priv.data;