net: bridge: fdb: add support for flush filtering based on ndm flags and state
authorNikolay Aleksandrov <razor@blackwall.org>
Wed, 13 Apr 2022 10:52:01 +0000 (13:52 +0300)
committerDavid S. Miller <davem@davemloft.net>
Wed, 13 Apr 2022 11:46:26 +0000 (12:46 +0100)
Add support for fdb flush filtering based on ndm flags and state. NDM
state and flags are mapped to bridge-specific flags and matched
according to the specified masks. NTF_USE is used to represent
added_by_user flag since it sets it on fdb add and we don't have a 1:1
mapping for it. Only allowed bits can be set, NTF_SELF and NTF_MASTER are
ignored.

Signed-off-by: Nikolay Aleksandrov <razor@blackwall.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/bridge/br_fdb.c
net/bridge/br_private.h

index 45d02f2264db1484d931aa2422a89bf60f2648f5..74d759d09f94de1ef32d02df7a1ec8d0fbda2f9a 100644 (file)
@@ -594,13 +594,40 @@ void br_fdb_flush(struct net_bridge *br,
        rcu_read_unlock();
 }
 
+static unsigned long __ndm_state_to_fdb_flags(u16 ndm_state)
+{
+       unsigned long flags = 0;
+
+       if (ndm_state & NUD_PERMANENT)
+               __set_bit(BR_FDB_LOCAL, &flags);
+       if (ndm_state & NUD_NOARP)
+               __set_bit(BR_FDB_STATIC, &flags);
+
+       return flags;
+}
+
+static unsigned long __ndm_flags_to_fdb_flags(u8 ndm_flags)
+{
+       unsigned long flags = 0;
+
+       if (ndm_flags & NTF_USE)
+               __set_bit(BR_FDB_ADDED_BY_USER, &flags);
+       if (ndm_flags & NTF_EXT_LEARNED)
+               __set_bit(BR_FDB_ADDED_BY_EXT_LEARN, &flags);
+       if (ndm_flags & NTF_OFFLOADED)
+               __set_bit(BR_FDB_OFFLOADED, &flags);
+       if (ndm_flags & NTF_STICKY)
+               __set_bit(BR_FDB_STICKY, &flags);
+
+       return flags;
+}
+
 int br_fdb_delete_bulk(struct ndmsg *ndm, struct nlattr *tb[],
                       struct net_device *dev, u16 vid,
                       struct netlink_ext_ack *extack)
 {
-       struct net_bridge_fdb_flush_desc desc = {
-               .flags_mask = BR_FDB_STATIC
-       };
+       u8 ndm_flags = ndm->ndm_flags & ~FDB_FLUSH_IGNORED_NDM_FLAGS;
+       struct net_bridge_fdb_flush_desc desc = {};
        struct net_bridge_port *p = NULL;
        struct net_bridge *br;
 
@@ -615,6 +642,31 @@ int br_fdb_delete_bulk(struct ndmsg *ndm, struct nlattr *tb[],
                br = p->br;
        }
 
+       if (ndm_flags & ~FDB_FLUSH_ALLOWED_NDM_FLAGS) {
+               NL_SET_ERR_MSG(extack, "Unsupported fdb flush ndm flag bits set");
+               return -EINVAL;
+       }
+       if (ndm->ndm_state & ~FDB_FLUSH_ALLOWED_NDM_STATES) {
+               NL_SET_ERR_MSG(extack, "Unsupported fdb flush ndm state bits set");
+               return -EINVAL;
+       }
+
+       desc.flags |= __ndm_state_to_fdb_flags(ndm->ndm_state);
+       desc.flags |= __ndm_flags_to_fdb_flags(ndm_flags);
+       if (tb[NDA_NDM_STATE_MASK]) {
+               u16 ndm_state_mask = nla_get_u16(tb[NDA_NDM_STATE_MASK]);
+
+               desc.flags_mask |= __ndm_state_to_fdb_flags(ndm_state_mask);
+       }
+       if (tb[NDA_NDM_FLAGS_MASK]) {
+               u8 ndm_flags_mask = nla_get_u8(tb[NDA_NDM_FLAGS_MASK]);
+
+               desc.flags_mask |= __ndm_flags_to_fdb_flags(ndm_flags_mask);
+       }
+
+       br_debug(br, "flushing port ifindex: %d vlan id: %u flags: 0x%lx flags mask: 0x%lx\n",
+                desc.port_ifindex, desc.vlan_id, desc.flags, desc.flags_mask);
+
        br_fdb_flush(br, &desc);
 
        return 0;
index ffe5db48d0c6447c72ca0ca5d5e7f17daf4794d0..6ae882cfae1cc3b703cec29835ea52e93c7d5c27 100644 (file)
@@ -762,6 +762,11 @@ static inline void br_netpoll_disable(struct net_bridge_port *p)
 #endif
 
 /* br_fdb.c */
+#define FDB_FLUSH_IGNORED_NDM_FLAGS (NTF_MASTER | NTF_SELF)
+#define FDB_FLUSH_ALLOWED_NDM_STATES (NUD_PERMANENT | NUD_NOARP)
+#define FDB_FLUSH_ALLOWED_NDM_FLAGS (NTF_USE | NTF_EXT_LEARNED | \
+                                    NTF_STICKY | NTF_OFFLOADED)
+
 int br_fdb_init(void);
 void br_fdb_fini(void);
 int br_fdb_hash_init(struct net_bridge *br);