]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - net/bridge/br_multicast.c
bridge: multicast: fix handling of temp and perm entries
[mirror_ubuntu-zesty-kernel.git] / net / bridge / br_multicast.c
1 /*
2 * Bridge multicast support.
3 *
4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13 #include <linux/err.h>
14 #include <linux/export.h>
15 #include <linux/if_ether.h>
16 #include <linux/igmp.h>
17 #include <linux/jhash.h>
18 #include <linux/kernel.h>
19 #include <linux/log2.h>
20 #include <linux/netdevice.h>
21 #include <linux/netfilter_bridge.h>
22 #include <linux/random.h>
23 #include <linux/rculist.h>
24 #include <linux/skbuff.h>
25 #include <linux/slab.h>
26 #include <linux/timer.h>
27 #include <linux/inetdevice.h>
28 #include <net/ip.h>
29 #if IS_ENABLED(CONFIG_IPV6)
30 #include <net/ipv6.h>
31 #include <net/mld.h>
32 #include <net/ip6_checksum.h>
33 #include <net/addrconf.h>
34 #endif
35
36 #include "br_private.h"
37
38 static void br_multicast_start_querier(struct net_bridge *br,
39 struct bridge_mcast_own_query *query);
40 static void br_multicast_add_router(struct net_bridge *br,
41 struct net_bridge_port *port);
42 unsigned int br_mdb_rehash_seq;
43
44 static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
45 {
46 if (a->proto != b->proto)
47 return 0;
48 if (a->vid != b->vid)
49 return 0;
50 switch (a->proto) {
51 case htons(ETH_P_IP):
52 return a->u.ip4 == b->u.ip4;
53 #if IS_ENABLED(CONFIG_IPV6)
54 case htons(ETH_P_IPV6):
55 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);
56 #endif
57 }
58 return 0;
59 }
60
61 static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip,
62 __u16 vid)
63 {
64 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1);
65 }
66
67 #if IS_ENABLED(CONFIG_IPV6)
68 static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
69 const struct in6_addr *ip,
70 __u16 vid)
71 {
72 return jhash_2words(ipv6_addr_hash(ip), vid,
73 mdb->secret) & (mdb->max - 1);
74 }
75 #endif
76
77 static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
78 struct br_ip *ip)
79 {
80 switch (ip->proto) {
81 case htons(ETH_P_IP):
82 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid);
83 #if IS_ENABLED(CONFIG_IPV6)
84 case htons(ETH_P_IPV6):
85 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid);
86 #endif
87 }
88 return 0;
89 }
90
91 static struct net_bridge_mdb_entry *__br_mdb_ip_get(
92 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash)
93 {
94 struct net_bridge_mdb_entry *mp;
95
96 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
97 if (br_ip_equal(&mp->addr, dst))
98 return mp;
99 }
100
101 return NULL;
102 }
103
104 struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb,
105 struct br_ip *dst)
106 {
107 if (!mdb)
108 return NULL;
109
110 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
111 }
112
113 static struct net_bridge_mdb_entry *br_mdb_ip4_get(
114 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid)
115 {
116 struct br_ip br_dst;
117
118 br_dst.u.ip4 = dst;
119 br_dst.proto = htons(ETH_P_IP);
120 br_dst.vid = vid;
121
122 return br_mdb_ip_get(mdb, &br_dst);
123 }
124
125 #if IS_ENABLED(CONFIG_IPV6)
126 static struct net_bridge_mdb_entry *br_mdb_ip6_get(
127 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
128 __u16 vid)
129 {
130 struct br_ip br_dst;
131
132 br_dst.u.ip6 = *dst;
133 br_dst.proto = htons(ETH_P_IPV6);
134 br_dst.vid = vid;
135
136 return br_mdb_ip_get(mdb, &br_dst);
137 }
138 #endif
139
140 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
141 struct sk_buff *skb, u16 vid)
142 {
143 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
144 struct br_ip ip;
145
146 if (br->multicast_disabled)
147 return NULL;
148
149 if (BR_INPUT_SKB_CB(skb)->igmp)
150 return NULL;
151
152 ip.proto = skb->protocol;
153 ip.vid = vid;
154
155 switch (skb->protocol) {
156 case htons(ETH_P_IP):
157 ip.u.ip4 = ip_hdr(skb)->daddr;
158 break;
159 #if IS_ENABLED(CONFIG_IPV6)
160 case htons(ETH_P_IPV6):
161 ip.u.ip6 = ipv6_hdr(skb)->daddr;
162 break;
163 #endif
164 default:
165 return NULL;
166 }
167
168 return br_mdb_ip_get(mdb, &ip);
169 }
170
171 static void br_mdb_free(struct rcu_head *head)
172 {
173 struct net_bridge_mdb_htable *mdb =
174 container_of(head, struct net_bridge_mdb_htable, rcu);
175 struct net_bridge_mdb_htable *old = mdb->old;
176
177 mdb->old = NULL;
178 kfree(old->mhash);
179 kfree(old);
180 }
181
182 static int br_mdb_copy(struct net_bridge_mdb_htable *new,
183 struct net_bridge_mdb_htable *old,
184 int elasticity)
185 {
186 struct net_bridge_mdb_entry *mp;
187 int maxlen;
188 int len;
189 int i;
190
191 for (i = 0; i < old->max; i++)
192 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver])
193 hlist_add_head(&mp->hlist[new->ver],
194 &new->mhash[br_ip_hash(new, &mp->addr)]);
195
196 if (!elasticity)
197 return 0;
198
199 maxlen = 0;
200 for (i = 0; i < new->max; i++) {
201 len = 0;
202 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver])
203 len++;
204 if (len > maxlen)
205 maxlen = len;
206 }
207
208 return maxlen > elasticity ? -EINVAL : 0;
209 }
210
211 void br_multicast_free_pg(struct rcu_head *head)
212 {
213 struct net_bridge_port_group *p =
214 container_of(head, struct net_bridge_port_group, rcu);
215
216 kfree(p);
217 }
218
219 static void br_multicast_free_group(struct rcu_head *head)
220 {
221 struct net_bridge_mdb_entry *mp =
222 container_of(head, struct net_bridge_mdb_entry, rcu);
223
224 kfree(mp);
225 }
226
227 static void br_multicast_group_expired(unsigned long data)
228 {
229 struct net_bridge_mdb_entry *mp = (void *)data;
230 struct net_bridge *br = mp->br;
231 struct net_bridge_mdb_htable *mdb;
232
233 spin_lock(&br->multicast_lock);
234 if (!netif_running(br->dev) || timer_pending(&mp->timer))
235 goto out;
236
237 mp->mglist = false;
238
239 if (mp->ports)
240 goto out;
241
242 mdb = mlock_dereference(br->mdb, br);
243
244 hlist_del_rcu(&mp->hlist[mdb->ver]);
245 mdb->size--;
246
247 call_rcu_bh(&mp->rcu, br_multicast_free_group);
248
249 out:
250 spin_unlock(&br->multicast_lock);
251 }
252
253 static void br_multicast_del_pg(struct net_bridge *br,
254 struct net_bridge_port_group *pg)
255 {
256 struct net_bridge_mdb_htable *mdb;
257 struct net_bridge_mdb_entry *mp;
258 struct net_bridge_port_group *p;
259 struct net_bridge_port_group __rcu **pp;
260
261 mdb = mlock_dereference(br->mdb, br);
262
263 mp = br_mdb_ip_get(mdb, &pg->addr);
264 if (WARN_ON(!mp))
265 return;
266
267 for (pp = &mp->ports;
268 (p = mlock_dereference(*pp, br)) != NULL;
269 pp = &p->next) {
270 if (p != pg)
271 continue;
272
273 rcu_assign_pointer(*pp, p->next);
274 hlist_del_init(&p->mglist);
275 del_timer(&p->timer);
276 br_mdb_notify(br->dev, p->port, &pg->addr, RTM_DELMDB,
277 p->state);
278 call_rcu_bh(&p->rcu, br_multicast_free_pg);
279
280 if (!mp->ports && !mp->mglist &&
281 netif_running(br->dev))
282 mod_timer(&mp->timer, jiffies);
283
284 return;
285 }
286
287 WARN_ON(1);
288 }
289
290 static void br_multicast_port_group_expired(unsigned long data)
291 {
292 struct net_bridge_port_group *pg = (void *)data;
293 struct net_bridge *br = pg->port->br;
294
295 spin_lock(&br->multicast_lock);
296 if (!netif_running(br->dev) || timer_pending(&pg->timer) ||
297 hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT)
298 goto out;
299
300 br_multicast_del_pg(br, pg);
301
302 out:
303 spin_unlock(&br->multicast_lock);
304 }
305
306 static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
307 int elasticity)
308 {
309 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
310 struct net_bridge_mdb_htable *mdb;
311 int err;
312
313 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
314 if (!mdb)
315 return -ENOMEM;
316
317 mdb->max = max;
318 mdb->old = old;
319
320 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC);
321 if (!mdb->mhash) {
322 kfree(mdb);
323 return -ENOMEM;
324 }
325
326 mdb->size = old ? old->size : 0;
327 mdb->ver = old ? old->ver ^ 1 : 0;
328
329 if (!old || elasticity)
330 get_random_bytes(&mdb->secret, sizeof(mdb->secret));
331 else
332 mdb->secret = old->secret;
333
334 if (!old)
335 goto out;
336
337 err = br_mdb_copy(mdb, old, elasticity);
338 if (err) {
339 kfree(mdb->mhash);
340 kfree(mdb);
341 return err;
342 }
343
344 br_mdb_rehash_seq++;
345 call_rcu_bh(&mdb->rcu, br_mdb_free);
346
347 out:
348 rcu_assign_pointer(*mdbp, mdb);
349
350 return 0;
351 }
352
353 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
354 __be32 group)
355 {
356 struct sk_buff *skb;
357 struct igmphdr *ih;
358 struct ethhdr *eth;
359 struct iphdr *iph;
360
361 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
362 sizeof(*ih) + 4);
363 if (!skb)
364 goto out;
365
366 skb->protocol = htons(ETH_P_IP);
367
368 skb_reset_mac_header(skb);
369 eth = eth_hdr(skb);
370
371 ether_addr_copy(eth->h_source, br->dev->dev_addr);
372 eth->h_dest[0] = 1;
373 eth->h_dest[1] = 0;
374 eth->h_dest[2] = 0x5e;
375 eth->h_dest[3] = 0;
376 eth->h_dest[4] = 0;
377 eth->h_dest[5] = 1;
378 eth->h_proto = htons(ETH_P_IP);
379 skb_put(skb, sizeof(*eth));
380
381 skb_set_network_header(skb, skb->len);
382 iph = ip_hdr(skb);
383
384 iph->version = 4;
385 iph->ihl = 6;
386 iph->tos = 0xc0;
387 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4);
388 iph->id = 0;
389 iph->frag_off = htons(IP_DF);
390 iph->ttl = 1;
391 iph->protocol = IPPROTO_IGMP;
392 iph->saddr = br->multicast_query_use_ifaddr ?
393 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0;
394 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP);
395 ((u8 *)&iph[1])[0] = IPOPT_RA;
396 ((u8 *)&iph[1])[1] = 4;
397 ((u8 *)&iph[1])[2] = 0;
398 ((u8 *)&iph[1])[3] = 0;
399 ip_send_check(iph);
400 skb_put(skb, 24);
401
402 skb_set_transport_header(skb, skb->len);
403 ih = igmp_hdr(skb);
404 ih->type = IGMP_HOST_MEMBERSHIP_QUERY;
405 ih->code = (group ? br->multicast_last_member_interval :
406 br->multicast_query_response_interval) /
407 (HZ / IGMP_TIMER_SCALE);
408 ih->group = group;
409 ih->csum = 0;
410 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
411 skb_put(skb, sizeof(*ih));
412
413 __skb_pull(skb, sizeof(*eth));
414
415 out:
416 return skb;
417 }
418
419 #if IS_ENABLED(CONFIG_IPV6)
420 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
421 const struct in6_addr *group)
422 {
423 struct sk_buff *skb;
424 struct ipv6hdr *ip6h;
425 struct mld_msg *mldq;
426 struct ethhdr *eth;
427 u8 *hopopt;
428 unsigned long interval;
429
430 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
431 8 + sizeof(*mldq));
432 if (!skb)
433 goto out;
434
435 skb->protocol = htons(ETH_P_IPV6);
436
437 /* Ethernet header */
438 skb_reset_mac_header(skb);
439 eth = eth_hdr(skb);
440
441 ether_addr_copy(eth->h_source, br->dev->dev_addr);
442 eth->h_proto = htons(ETH_P_IPV6);
443 skb_put(skb, sizeof(*eth));
444
445 /* IPv6 header + HbH option */
446 skb_set_network_header(skb, skb->len);
447 ip6h = ipv6_hdr(skb);
448
449 *(__force __be32 *)ip6h = htonl(0x60000000);
450 ip6h->payload_len = htons(8 + sizeof(*mldq));
451 ip6h->nexthdr = IPPROTO_HOPOPTS;
452 ip6h->hop_limit = 1;
453 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1));
454 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0,
455 &ip6h->saddr)) {
456 kfree_skb(skb);
457 return NULL;
458 }
459 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest);
460
461 hopopt = (u8 *)(ip6h + 1);
462 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */
463 hopopt[1] = 0; /* length of HbH */
464 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */
465 hopopt[3] = 2; /* Length of RA Option */
466 hopopt[4] = 0; /* Type = 0x0000 (MLD) */
467 hopopt[5] = 0;
468 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */
469 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */
470
471 skb_put(skb, sizeof(*ip6h) + 8);
472
473 /* ICMPv6 */
474 skb_set_transport_header(skb, skb->len);
475 mldq = (struct mld_msg *) icmp6_hdr(skb);
476
477 interval = ipv6_addr_any(group) ?
478 br->multicast_query_response_interval :
479 br->multicast_last_member_interval;
480
481 mldq->mld_type = ICMPV6_MGM_QUERY;
482 mldq->mld_code = 0;
483 mldq->mld_cksum = 0;
484 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval));
485 mldq->mld_reserved = 0;
486 mldq->mld_mca = *group;
487
488 /* checksum */
489 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
490 sizeof(*mldq), IPPROTO_ICMPV6,
491 csum_partial(mldq,
492 sizeof(*mldq), 0));
493 skb_put(skb, sizeof(*mldq));
494
495 __skb_pull(skb, sizeof(*eth));
496
497 out:
498 return skb;
499 }
500 #endif
501
502 static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
503 struct br_ip *addr)
504 {
505 switch (addr->proto) {
506 case htons(ETH_P_IP):
507 return br_ip4_multicast_alloc_query(br, addr->u.ip4);
508 #if IS_ENABLED(CONFIG_IPV6)
509 case htons(ETH_P_IPV6):
510 return br_ip6_multicast_alloc_query(br, &addr->u.ip6);
511 #endif
512 }
513 return NULL;
514 }
515
516 static struct net_bridge_mdb_entry *br_multicast_get_group(
517 struct net_bridge *br, struct net_bridge_port *port,
518 struct br_ip *group, int hash)
519 {
520 struct net_bridge_mdb_htable *mdb;
521 struct net_bridge_mdb_entry *mp;
522 unsigned int count = 0;
523 unsigned int max;
524 int elasticity;
525 int err;
526
527 mdb = rcu_dereference_protected(br->mdb, 1);
528 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
529 count++;
530 if (unlikely(br_ip_equal(group, &mp->addr)))
531 return mp;
532 }
533
534 elasticity = 0;
535 max = mdb->max;
536
537 if (unlikely(count > br->hash_elasticity && count)) {
538 if (net_ratelimit())
539 br_info(br, "Multicast hash table "
540 "chain limit reached: %s\n",
541 port ? port->dev->name : br->dev->name);
542
543 elasticity = br->hash_elasticity;
544 }
545
546 if (mdb->size >= max) {
547 max *= 2;
548 if (unlikely(max > br->hash_max)) {
549 br_warn(br, "Multicast hash table maximum of %d "
550 "reached, disabling snooping: %s\n",
551 br->hash_max,
552 port ? port->dev->name : br->dev->name);
553 err = -E2BIG;
554 disable:
555 br->multicast_disabled = 1;
556 goto err;
557 }
558 }
559
560 if (max > mdb->max || elasticity) {
561 if (mdb->old) {
562 if (net_ratelimit())
563 br_info(br, "Multicast hash table "
564 "on fire: %s\n",
565 port ? port->dev->name : br->dev->name);
566 err = -EEXIST;
567 goto err;
568 }
569
570 err = br_mdb_rehash(&br->mdb, max, elasticity);
571 if (err) {
572 br_warn(br, "Cannot rehash multicast "
573 "hash table, disabling snooping: %s, %d, %d\n",
574 port ? port->dev->name : br->dev->name,
575 mdb->size, err);
576 goto disable;
577 }
578
579 err = -EAGAIN;
580 goto err;
581 }
582
583 return NULL;
584
585 err:
586 mp = ERR_PTR(err);
587 return mp;
588 }
589
590 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br,
591 struct net_bridge_port *port, struct br_ip *group)
592 {
593 struct net_bridge_mdb_htable *mdb;
594 struct net_bridge_mdb_entry *mp;
595 int hash;
596 int err;
597
598 mdb = rcu_dereference_protected(br->mdb, 1);
599 if (!mdb) {
600 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0);
601 if (err)
602 return ERR_PTR(err);
603 goto rehash;
604 }
605
606 hash = br_ip_hash(mdb, group);
607 mp = br_multicast_get_group(br, port, group, hash);
608 switch (PTR_ERR(mp)) {
609 case 0:
610 break;
611
612 case -EAGAIN:
613 rehash:
614 mdb = rcu_dereference_protected(br->mdb, 1);
615 hash = br_ip_hash(mdb, group);
616 break;
617
618 default:
619 goto out;
620 }
621
622 mp = kzalloc(sizeof(*mp), GFP_ATOMIC);
623 if (unlikely(!mp))
624 return ERR_PTR(-ENOMEM);
625
626 mp->br = br;
627 mp->addr = *group;
628 setup_timer(&mp->timer, br_multicast_group_expired,
629 (unsigned long)mp);
630
631 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]);
632 mdb->size++;
633
634 out:
635 return mp;
636 }
637
638 struct net_bridge_port_group *br_multicast_new_port_group(
639 struct net_bridge_port *port,
640 struct br_ip *group,
641 struct net_bridge_port_group __rcu *next,
642 unsigned char state)
643 {
644 struct net_bridge_port_group *p;
645
646 p = kzalloc(sizeof(*p), GFP_ATOMIC);
647 if (unlikely(!p))
648 return NULL;
649
650 p->addr = *group;
651 p->port = port;
652 p->state = state;
653 rcu_assign_pointer(p->next, next);
654 hlist_add_head(&p->mglist, &port->mglist);
655 setup_timer(&p->timer, br_multicast_port_group_expired,
656 (unsigned long)p);
657 return p;
658 }
659
660 static int br_multicast_add_group(struct net_bridge *br,
661 struct net_bridge_port *port,
662 struct br_ip *group)
663 {
664 struct net_bridge_mdb_entry *mp;
665 struct net_bridge_port_group *p;
666 struct net_bridge_port_group __rcu **pp;
667 unsigned long now = jiffies;
668 int err;
669
670 spin_lock(&br->multicast_lock);
671 if (!netif_running(br->dev) ||
672 (port && port->state == BR_STATE_DISABLED))
673 goto out;
674
675 mp = br_multicast_new_group(br, port, group);
676 err = PTR_ERR(mp);
677 if (IS_ERR(mp))
678 goto err;
679
680 if (!port) {
681 mp->mglist = true;
682 mod_timer(&mp->timer, now + br->multicast_membership_interval);
683 goto out;
684 }
685
686 for (pp = &mp->ports;
687 (p = mlock_dereference(*pp, br)) != NULL;
688 pp = &p->next) {
689 if (p->port == port)
690 goto found;
691 if ((unsigned long)p->port < (unsigned long)port)
692 break;
693 }
694
695 p = br_multicast_new_port_group(port, group, *pp, MDB_TEMPORARY);
696 if (unlikely(!p))
697 goto err;
698 rcu_assign_pointer(*pp, p);
699 br_mdb_notify(br->dev, port, group, RTM_NEWMDB, MDB_TEMPORARY);
700
701 found:
702 mod_timer(&p->timer, now + br->multicast_membership_interval);
703 out:
704 err = 0;
705
706 err:
707 spin_unlock(&br->multicast_lock);
708 return err;
709 }
710
711 static int br_ip4_multicast_add_group(struct net_bridge *br,
712 struct net_bridge_port *port,
713 __be32 group,
714 __u16 vid)
715 {
716 struct br_ip br_group;
717
718 if (ipv4_is_local_multicast(group))
719 return 0;
720
721 br_group.u.ip4 = group;
722 br_group.proto = htons(ETH_P_IP);
723 br_group.vid = vid;
724
725 return br_multicast_add_group(br, port, &br_group);
726 }
727
728 #if IS_ENABLED(CONFIG_IPV6)
729 static int br_ip6_multicast_add_group(struct net_bridge *br,
730 struct net_bridge_port *port,
731 const struct in6_addr *group,
732 __u16 vid)
733 {
734 struct br_ip br_group;
735
736 if (ipv6_addr_is_ll_all_nodes(group))
737 return 0;
738
739 br_group.u.ip6 = *group;
740 br_group.proto = htons(ETH_P_IPV6);
741 br_group.vid = vid;
742
743 return br_multicast_add_group(br, port, &br_group);
744 }
745 #endif
746
747 static void br_multicast_router_expired(unsigned long data)
748 {
749 struct net_bridge_port *port = (void *)data;
750 struct net_bridge *br = port->br;
751
752 spin_lock(&br->multicast_lock);
753 if (port->multicast_router != 1 ||
754 timer_pending(&port->multicast_router_timer) ||
755 hlist_unhashed(&port->rlist))
756 goto out;
757
758 hlist_del_init_rcu(&port->rlist);
759
760 out:
761 spin_unlock(&br->multicast_lock);
762 }
763
764 static void br_multicast_local_router_expired(unsigned long data)
765 {
766 }
767
768 static void br_multicast_querier_expired(struct net_bridge *br,
769 struct bridge_mcast_own_query *query)
770 {
771 spin_lock(&br->multicast_lock);
772 if (!netif_running(br->dev) || br->multicast_disabled)
773 goto out;
774
775 br_multicast_start_querier(br, query);
776
777 out:
778 spin_unlock(&br->multicast_lock);
779 }
780
781 static void br_ip4_multicast_querier_expired(unsigned long data)
782 {
783 struct net_bridge *br = (void *)data;
784
785 br_multicast_querier_expired(br, &br->ip4_own_query);
786 }
787
788 #if IS_ENABLED(CONFIG_IPV6)
789 static void br_ip6_multicast_querier_expired(unsigned long data)
790 {
791 struct net_bridge *br = (void *)data;
792
793 br_multicast_querier_expired(br, &br->ip6_own_query);
794 }
795 #endif
796
797 static void br_multicast_select_own_querier(struct net_bridge *br,
798 struct br_ip *ip,
799 struct sk_buff *skb)
800 {
801 if (ip->proto == htons(ETH_P_IP))
802 br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr;
803 #if IS_ENABLED(CONFIG_IPV6)
804 else
805 br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr;
806 #endif
807 }
808
809 static void __br_multicast_send_query(struct net_bridge *br,
810 struct net_bridge_port *port,
811 struct br_ip *ip)
812 {
813 struct sk_buff *skb;
814
815 skb = br_multicast_alloc_query(br, ip);
816 if (!skb)
817 return;
818
819 if (port) {
820 skb->dev = port->dev;
821 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, NULL, skb,
822 NULL, skb->dev,
823 br_dev_queue_push_xmit);
824 } else {
825 br_multicast_select_own_querier(br, ip, skb);
826 netif_rx(skb);
827 }
828 }
829
830 static void br_multicast_send_query(struct net_bridge *br,
831 struct net_bridge_port *port,
832 struct bridge_mcast_own_query *own_query)
833 {
834 unsigned long time;
835 struct br_ip br_group;
836 struct bridge_mcast_other_query *other_query = NULL;
837
838 if (!netif_running(br->dev) || br->multicast_disabled ||
839 !br->multicast_querier)
840 return;
841
842 memset(&br_group.u, 0, sizeof(br_group.u));
843
844 if (port ? (own_query == &port->ip4_own_query) :
845 (own_query == &br->ip4_own_query)) {
846 other_query = &br->ip4_other_query;
847 br_group.proto = htons(ETH_P_IP);
848 #if IS_ENABLED(CONFIG_IPV6)
849 } else {
850 other_query = &br->ip6_other_query;
851 br_group.proto = htons(ETH_P_IPV6);
852 #endif
853 }
854
855 if (!other_query || timer_pending(&other_query->timer))
856 return;
857
858 __br_multicast_send_query(br, port, &br_group);
859
860 time = jiffies;
861 time += own_query->startup_sent < br->multicast_startup_query_count ?
862 br->multicast_startup_query_interval :
863 br->multicast_query_interval;
864 mod_timer(&own_query->timer, time);
865 }
866
867 static void
868 br_multicast_port_query_expired(struct net_bridge_port *port,
869 struct bridge_mcast_own_query *query)
870 {
871 struct net_bridge *br = port->br;
872
873 spin_lock(&br->multicast_lock);
874 if (port->state == BR_STATE_DISABLED ||
875 port->state == BR_STATE_BLOCKING)
876 goto out;
877
878 if (query->startup_sent < br->multicast_startup_query_count)
879 query->startup_sent++;
880
881 br_multicast_send_query(port->br, port, query);
882
883 out:
884 spin_unlock(&br->multicast_lock);
885 }
886
887 static void br_ip4_multicast_port_query_expired(unsigned long data)
888 {
889 struct net_bridge_port *port = (void *)data;
890
891 br_multicast_port_query_expired(port, &port->ip4_own_query);
892 }
893
894 #if IS_ENABLED(CONFIG_IPV6)
895 static void br_ip6_multicast_port_query_expired(unsigned long data)
896 {
897 struct net_bridge_port *port = (void *)data;
898
899 br_multicast_port_query_expired(port, &port->ip6_own_query);
900 }
901 #endif
902
903 void br_multicast_add_port(struct net_bridge_port *port)
904 {
905 port->multicast_router = 1;
906
907 setup_timer(&port->multicast_router_timer, br_multicast_router_expired,
908 (unsigned long)port);
909 setup_timer(&port->ip4_own_query.timer,
910 br_ip4_multicast_port_query_expired, (unsigned long)port);
911 #if IS_ENABLED(CONFIG_IPV6)
912 setup_timer(&port->ip6_own_query.timer,
913 br_ip6_multicast_port_query_expired, (unsigned long)port);
914 #endif
915 }
916
917 void br_multicast_del_port(struct net_bridge_port *port)
918 {
919 struct net_bridge *br = port->br;
920 struct net_bridge_port_group *pg;
921 struct hlist_node *n;
922
923 /* Take care of the remaining groups, only perm ones should be left */
924 spin_lock_bh(&br->multicast_lock);
925 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
926 br_multicast_del_pg(br, pg);
927 spin_unlock_bh(&br->multicast_lock);
928 del_timer_sync(&port->multicast_router_timer);
929 }
930
931 static void br_multicast_enable(struct bridge_mcast_own_query *query)
932 {
933 query->startup_sent = 0;
934
935 if (try_to_del_timer_sync(&query->timer) >= 0 ||
936 del_timer(&query->timer))
937 mod_timer(&query->timer, jiffies);
938 }
939
940 void br_multicast_enable_port(struct net_bridge_port *port)
941 {
942 struct net_bridge *br = port->br;
943
944 spin_lock(&br->multicast_lock);
945 if (br->multicast_disabled || !netif_running(br->dev))
946 goto out;
947
948 br_multicast_enable(&port->ip4_own_query);
949 #if IS_ENABLED(CONFIG_IPV6)
950 br_multicast_enable(&port->ip6_own_query);
951 #endif
952 if (port->multicast_router == 2 && hlist_unhashed(&port->rlist))
953 br_multicast_add_router(br, port);
954
955 out:
956 spin_unlock(&br->multicast_lock);
957 }
958
959 void br_multicast_disable_port(struct net_bridge_port *port)
960 {
961 struct net_bridge *br = port->br;
962 struct net_bridge_port_group *pg;
963 struct hlist_node *n;
964
965 spin_lock(&br->multicast_lock);
966 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
967 if (pg->state == MDB_TEMPORARY)
968 br_multicast_del_pg(br, pg);
969
970 if (!hlist_unhashed(&port->rlist))
971 hlist_del_init_rcu(&port->rlist);
972 del_timer(&port->multicast_router_timer);
973 del_timer(&port->ip4_own_query.timer);
974 #if IS_ENABLED(CONFIG_IPV6)
975 del_timer(&port->ip6_own_query.timer);
976 #endif
977 spin_unlock(&br->multicast_lock);
978 }
979
980 static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
981 struct net_bridge_port *port,
982 struct sk_buff *skb,
983 u16 vid)
984 {
985 struct igmpv3_report *ih;
986 struct igmpv3_grec *grec;
987 int i;
988 int len;
989 int num;
990 int type;
991 int err = 0;
992 __be32 group;
993
994 ih = igmpv3_report_hdr(skb);
995 num = ntohs(ih->ngrec);
996 len = sizeof(*ih);
997
998 for (i = 0; i < num; i++) {
999 len += sizeof(*grec);
1000 if (!pskb_may_pull(skb, len))
1001 return -EINVAL;
1002
1003 grec = (void *)(skb->data + len - sizeof(*grec));
1004 group = grec->grec_mca;
1005 type = grec->grec_type;
1006
1007 len += ntohs(grec->grec_nsrcs) * 4;
1008 if (!pskb_may_pull(skb, len))
1009 return -EINVAL;
1010
1011 /* We treat this as an IGMPv2 report for now. */
1012 switch (type) {
1013 case IGMPV3_MODE_IS_INCLUDE:
1014 case IGMPV3_MODE_IS_EXCLUDE:
1015 case IGMPV3_CHANGE_TO_INCLUDE:
1016 case IGMPV3_CHANGE_TO_EXCLUDE:
1017 case IGMPV3_ALLOW_NEW_SOURCES:
1018 case IGMPV3_BLOCK_OLD_SOURCES:
1019 break;
1020
1021 default:
1022 continue;
1023 }
1024
1025 err = br_ip4_multicast_add_group(br, port, group, vid);
1026 if (err)
1027 break;
1028 }
1029
1030 return err;
1031 }
1032
1033 #if IS_ENABLED(CONFIG_IPV6)
1034 static int br_ip6_multicast_mld2_report(struct net_bridge *br,
1035 struct net_bridge_port *port,
1036 struct sk_buff *skb,
1037 u16 vid)
1038 {
1039 struct icmp6hdr *icmp6h;
1040 struct mld2_grec *grec;
1041 int i;
1042 int len;
1043 int num;
1044 int err = 0;
1045
1046 if (!pskb_may_pull(skb, sizeof(*icmp6h)))
1047 return -EINVAL;
1048
1049 icmp6h = icmp6_hdr(skb);
1050 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]);
1051 len = sizeof(*icmp6h);
1052
1053 for (i = 0; i < num; i++) {
1054 __be16 *nsrcs, _nsrcs;
1055
1056 nsrcs = skb_header_pointer(skb,
1057 len + offsetof(struct mld2_grec,
1058 grec_nsrcs),
1059 sizeof(_nsrcs), &_nsrcs);
1060 if (!nsrcs)
1061 return -EINVAL;
1062
1063 if (!pskb_may_pull(skb,
1064 len + sizeof(*grec) +
1065 sizeof(struct in6_addr) * ntohs(*nsrcs)))
1066 return -EINVAL;
1067
1068 grec = (struct mld2_grec *)(skb->data + len);
1069 len += sizeof(*grec) +
1070 sizeof(struct in6_addr) * ntohs(*nsrcs);
1071
1072 /* We treat these as MLDv1 reports for now. */
1073 switch (grec->grec_type) {
1074 case MLD2_MODE_IS_INCLUDE:
1075 case MLD2_MODE_IS_EXCLUDE:
1076 case MLD2_CHANGE_TO_INCLUDE:
1077 case MLD2_CHANGE_TO_EXCLUDE:
1078 case MLD2_ALLOW_NEW_SOURCES:
1079 case MLD2_BLOCK_OLD_SOURCES:
1080 break;
1081
1082 default:
1083 continue;
1084 }
1085
1086 err = br_ip6_multicast_add_group(br, port, &grec->grec_mca,
1087 vid);
1088 if (err)
1089 break;
1090 }
1091
1092 return err;
1093 }
1094 #endif
1095
1096 static bool br_ip4_multicast_select_querier(struct net_bridge *br,
1097 struct net_bridge_port *port,
1098 __be32 saddr)
1099 {
1100 if (!timer_pending(&br->ip4_own_query.timer) &&
1101 !timer_pending(&br->ip4_other_query.timer))
1102 goto update;
1103
1104 if (!br->ip4_querier.addr.u.ip4)
1105 goto update;
1106
1107 if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4))
1108 goto update;
1109
1110 return false;
1111
1112 update:
1113 br->ip4_querier.addr.u.ip4 = saddr;
1114
1115 /* update protected by general multicast_lock by caller */
1116 rcu_assign_pointer(br->ip4_querier.port, port);
1117
1118 return true;
1119 }
1120
1121 #if IS_ENABLED(CONFIG_IPV6)
1122 static bool br_ip6_multicast_select_querier(struct net_bridge *br,
1123 struct net_bridge_port *port,
1124 struct in6_addr *saddr)
1125 {
1126 if (!timer_pending(&br->ip6_own_query.timer) &&
1127 !timer_pending(&br->ip6_other_query.timer))
1128 goto update;
1129
1130 if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0)
1131 goto update;
1132
1133 return false;
1134
1135 update:
1136 br->ip6_querier.addr.u.ip6 = *saddr;
1137
1138 /* update protected by general multicast_lock by caller */
1139 rcu_assign_pointer(br->ip6_querier.port, port);
1140
1141 return true;
1142 }
1143 #endif
1144
1145 static bool br_multicast_select_querier(struct net_bridge *br,
1146 struct net_bridge_port *port,
1147 struct br_ip *saddr)
1148 {
1149 switch (saddr->proto) {
1150 case htons(ETH_P_IP):
1151 return br_ip4_multicast_select_querier(br, port, saddr->u.ip4);
1152 #if IS_ENABLED(CONFIG_IPV6)
1153 case htons(ETH_P_IPV6):
1154 return br_ip6_multicast_select_querier(br, port, &saddr->u.ip6);
1155 #endif
1156 }
1157
1158 return false;
1159 }
1160
1161 static void
1162 br_multicast_update_query_timer(struct net_bridge *br,
1163 struct bridge_mcast_other_query *query,
1164 unsigned long max_delay)
1165 {
1166 if (!timer_pending(&query->timer))
1167 query->delay_time = jiffies + max_delay;
1168
1169 mod_timer(&query->timer, jiffies + br->multicast_querier_interval);
1170 }
1171
1172 /*
1173 * Add port to router_list
1174 * list is maintained ordered by pointer value
1175 * and locked by br->multicast_lock and RCU
1176 */
1177 static void br_multicast_add_router(struct net_bridge *br,
1178 struct net_bridge_port *port)
1179 {
1180 struct net_bridge_port *p;
1181 struct hlist_node *slot = NULL;
1182
1183 if (!hlist_unhashed(&port->rlist))
1184 return;
1185
1186 hlist_for_each_entry(p, &br->router_list, rlist) {
1187 if ((unsigned long) port >= (unsigned long) p)
1188 break;
1189 slot = &p->rlist;
1190 }
1191
1192 if (slot)
1193 hlist_add_behind_rcu(&port->rlist, slot);
1194 else
1195 hlist_add_head_rcu(&port->rlist, &br->router_list);
1196 }
1197
1198 static void br_multicast_mark_router(struct net_bridge *br,
1199 struct net_bridge_port *port)
1200 {
1201 unsigned long now = jiffies;
1202
1203 if (!port) {
1204 if (br->multicast_router == 1)
1205 mod_timer(&br->multicast_router_timer,
1206 now + br->multicast_querier_interval);
1207 return;
1208 }
1209
1210 if (port->multicast_router != 1)
1211 return;
1212
1213 br_multicast_add_router(br, port);
1214
1215 mod_timer(&port->multicast_router_timer,
1216 now + br->multicast_querier_interval);
1217 }
1218
1219 static void br_multicast_query_received(struct net_bridge *br,
1220 struct net_bridge_port *port,
1221 struct bridge_mcast_other_query *query,
1222 struct br_ip *saddr,
1223 unsigned long max_delay)
1224 {
1225 if (!br_multicast_select_querier(br, port, saddr))
1226 return;
1227
1228 br_multicast_update_query_timer(br, query, max_delay);
1229 br_multicast_mark_router(br, port);
1230 }
1231
1232 static int br_ip4_multicast_query(struct net_bridge *br,
1233 struct net_bridge_port *port,
1234 struct sk_buff *skb,
1235 u16 vid)
1236 {
1237 const struct iphdr *iph = ip_hdr(skb);
1238 struct igmphdr *ih = igmp_hdr(skb);
1239 struct net_bridge_mdb_entry *mp;
1240 struct igmpv3_query *ih3;
1241 struct net_bridge_port_group *p;
1242 struct net_bridge_port_group __rcu **pp;
1243 struct br_ip saddr;
1244 unsigned long max_delay;
1245 unsigned long now = jiffies;
1246 __be32 group;
1247 int err = 0;
1248
1249 spin_lock(&br->multicast_lock);
1250 if (!netif_running(br->dev) ||
1251 (port && port->state == BR_STATE_DISABLED))
1252 goto out;
1253
1254 group = ih->group;
1255
1256 if (skb->len == sizeof(*ih)) {
1257 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE);
1258
1259 if (!max_delay) {
1260 max_delay = 10 * HZ;
1261 group = 0;
1262 }
1263 } else if (skb->len >= sizeof(*ih3)) {
1264 ih3 = igmpv3_query_hdr(skb);
1265 if (ih3->nsrcs)
1266 goto out;
1267
1268 max_delay = ih3->code ?
1269 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1;
1270 } else {
1271 goto out;
1272 }
1273
1274 if (!group) {
1275 saddr.proto = htons(ETH_P_IP);
1276 saddr.u.ip4 = iph->saddr;
1277
1278 br_multicast_query_received(br, port, &br->ip4_other_query,
1279 &saddr, max_delay);
1280 goto out;
1281 }
1282
1283 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid);
1284 if (!mp)
1285 goto out;
1286
1287 max_delay *= br->multicast_last_member_count;
1288
1289 if (mp->mglist &&
1290 (timer_pending(&mp->timer) ?
1291 time_after(mp->timer.expires, now + max_delay) :
1292 try_to_del_timer_sync(&mp->timer) >= 0))
1293 mod_timer(&mp->timer, now + max_delay);
1294
1295 for (pp = &mp->ports;
1296 (p = mlock_dereference(*pp, br)) != NULL;
1297 pp = &p->next) {
1298 if (timer_pending(&p->timer) ?
1299 time_after(p->timer.expires, now + max_delay) :
1300 try_to_del_timer_sync(&p->timer) >= 0)
1301 mod_timer(&p->timer, now + max_delay);
1302 }
1303
1304 out:
1305 spin_unlock(&br->multicast_lock);
1306 return err;
1307 }
1308
1309 #if IS_ENABLED(CONFIG_IPV6)
1310 static int br_ip6_multicast_query(struct net_bridge *br,
1311 struct net_bridge_port *port,
1312 struct sk_buff *skb,
1313 u16 vid)
1314 {
1315 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
1316 struct mld_msg *mld;
1317 struct net_bridge_mdb_entry *mp;
1318 struct mld2_query *mld2q;
1319 struct net_bridge_port_group *p;
1320 struct net_bridge_port_group __rcu **pp;
1321 struct br_ip saddr;
1322 unsigned long max_delay;
1323 unsigned long now = jiffies;
1324 const struct in6_addr *group = NULL;
1325 bool is_general_query;
1326 int err = 0;
1327
1328 spin_lock(&br->multicast_lock);
1329 if (!netif_running(br->dev) ||
1330 (port && port->state == BR_STATE_DISABLED))
1331 goto out;
1332
1333 if (skb->len == sizeof(*mld)) {
1334 if (!pskb_may_pull(skb, sizeof(*mld))) {
1335 err = -EINVAL;
1336 goto out;
1337 }
1338 mld = (struct mld_msg *) icmp6_hdr(skb);
1339 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay));
1340 if (max_delay)
1341 group = &mld->mld_mca;
1342 } else {
1343 if (!pskb_may_pull(skb, sizeof(*mld2q))) {
1344 err = -EINVAL;
1345 goto out;
1346 }
1347 mld2q = (struct mld2_query *)icmp6_hdr(skb);
1348 if (!mld2q->mld2q_nsrcs)
1349 group = &mld2q->mld2q_mca;
1350
1351 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL);
1352 }
1353
1354 is_general_query = group && ipv6_addr_any(group);
1355
1356 if (is_general_query) {
1357 saddr.proto = htons(ETH_P_IPV6);
1358 saddr.u.ip6 = ip6h->saddr;
1359
1360 br_multicast_query_received(br, port, &br->ip6_other_query,
1361 &saddr, max_delay);
1362 goto out;
1363 } else if (!group) {
1364 goto out;
1365 }
1366
1367 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid);
1368 if (!mp)
1369 goto out;
1370
1371 max_delay *= br->multicast_last_member_count;
1372 if (mp->mglist &&
1373 (timer_pending(&mp->timer) ?
1374 time_after(mp->timer.expires, now + max_delay) :
1375 try_to_del_timer_sync(&mp->timer) >= 0))
1376 mod_timer(&mp->timer, now + max_delay);
1377
1378 for (pp = &mp->ports;
1379 (p = mlock_dereference(*pp, br)) != NULL;
1380 pp = &p->next) {
1381 if (timer_pending(&p->timer) ?
1382 time_after(p->timer.expires, now + max_delay) :
1383 try_to_del_timer_sync(&p->timer) >= 0)
1384 mod_timer(&p->timer, now + max_delay);
1385 }
1386
1387 out:
1388 spin_unlock(&br->multicast_lock);
1389 return err;
1390 }
1391 #endif
1392
1393 static void
1394 br_multicast_leave_group(struct net_bridge *br,
1395 struct net_bridge_port *port,
1396 struct br_ip *group,
1397 struct bridge_mcast_other_query *other_query,
1398 struct bridge_mcast_own_query *own_query)
1399 {
1400 struct net_bridge_mdb_htable *mdb;
1401 struct net_bridge_mdb_entry *mp;
1402 struct net_bridge_port_group *p;
1403 unsigned long now;
1404 unsigned long time;
1405
1406 spin_lock(&br->multicast_lock);
1407 if (!netif_running(br->dev) ||
1408 (port && port->state == BR_STATE_DISABLED) ||
1409 timer_pending(&other_query->timer))
1410 goto out;
1411
1412 mdb = mlock_dereference(br->mdb, br);
1413 mp = br_mdb_ip_get(mdb, group);
1414 if (!mp)
1415 goto out;
1416
1417 if (br->multicast_querier) {
1418 __br_multicast_send_query(br, port, &mp->addr);
1419
1420 time = jiffies + br->multicast_last_member_count *
1421 br->multicast_last_member_interval;
1422
1423 mod_timer(&own_query->timer, time);
1424
1425 for (p = mlock_dereference(mp->ports, br);
1426 p != NULL;
1427 p = mlock_dereference(p->next, br)) {
1428 if (p->port != port)
1429 continue;
1430
1431 if (!hlist_unhashed(&p->mglist) &&
1432 (timer_pending(&p->timer) ?
1433 time_after(p->timer.expires, time) :
1434 try_to_del_timer_sync(&p->timer) >= 0)) {
1435 mod_timer(&p->timer, time);
1436 }
1437
1438 break;
1439 }
1440 }
1441
1442 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) {
1443 struct net_bridge_port_group __rcu **pp;
1444
1445 for (pp = &mp->ports;
1446 (p = mlock_dereference(*pp, br)) != NULL;
1447 pp = &p->next) {
1448 if (p->port != port)
1449 continue;
1450
1451 rcu_assign_pointer(*pp, p->next);
1452 hlist_del_init(&p->mglist);
1453 del_timer(&p->timer);
1454 br_mdb_notify(br->dev, port, group, RTM_DELMDB,
1455 p->state);
1456 call_rcu_bh(&p->rcu, br_multicast_free_pg);
1457
1458 if (!mp->ports && !mp->mglist &&
1459 netif_running(br->dev))
1460 mod_timer(&mp->timer, jiffies);
1461 }
1462 goto out;
1463 }
1464
1465 now = jiffies;
1466 time = now + br->multicast_last_member_count *
1467 br->multicast_last_member_interval;
1468
1469 if (!port) {
1470 if (mp->mglist &&
1471 (timer_pending(&mp->timer) ?
1472 time_after(mp->timer.expires, time) :
1473 try_to_del_timer_sync(&mp->timer) >= 0)) {
1474 mod_timer(&mp->timer, time);
1475 }
1476
1477 goto out;
1478 }
1479
1480 for (p = mlock_dereference(mp->ports, br);
1481 p != NULL;
1482 p = mlock_dereference(p->next, br)) {
1483 if (p->port != port)
1484 continue;
1485
1486 if (!hlist_unhashed(&p->mglist) &&
1487 (timer_pending(&p->timer) ?
1488 time_after(p->timer.expires, time) :
1489 try_to_del_timer_sync(&p->timer) >= 0)) {
1490 mod_timer(&p->timer, time);
1491 }
1492
1493 break;
1494 }
1495 out:
1496 spin_unlock(&br->multicast_lock);
1497 }
1498
1499 static void br_ip4_multicast_leave_group(struct net_bridge *br,
1500 struct net_bridge_port *port,
1501 __be32 group,
1502 __u16 vid)
1503 {
1504 struct br_ip br_group;
1505 struct bridge_mcast_own_query *own_query;
1506
1507 if (ipv4_is_local_multicast(group))
1508 return;
1509
1510 own_query = port ? &port->ip4_own_query : &br->ip4_own_query;
1511
1512 br_group.u.ip4 = group;
1513 br_group.proto = htons(ETH_P_IP);
1514 br_group.vid = vid;
1515
1516 br_multicast_leave_group(br, port, &br_group, &br->ip4_other_query,
1517 own_query);
1518 }
1519
1520 #if IS_ENABLED(CONFIG_IPV6)
1521 static void br_ip6_multicast_leave_group(struct net_bridge *br,
1522 struct net_bridge_port *port,
1523 const struct in6_addr *group,
1524 __u16 vid)
1525 {
1526 struct br_ip br_group;
1527 struct bridge_mcast_own_query *own_query;
1528
1529 if (ipv6_addr_is_ll_all_nodes(group))
1530 return;
1531
1532 own_query = port ? &port->ip6_own_query : &br->ip6_own_query;
1533
1534 br_group.u.ip6 = *group;
1535 br_group.proto = htons(ETH_P_IPV6);
1536 br_group.vid = vid;
1537
1538 br_multicast_leave_group(br, port, &br_group, &br->ip6_other_query,
1539 own_query);
1540 }
1541 #endif
1542
1543 static int br_multicast_ipv4_rcv(struct net_bridge *br,
1544 struct net_bridge_port *port,
1545 struct sk_buff *skb,
1546 u16 vid)
1547 {
1548 struct sk_buff *skb_trimmed = NULL;
1549 struct igmphdr *ih;
1550 int err;
1551
1552 err = ip_mc_check_igmp(skb, &skb_trimmed);
1553
1554 if (err == -ENOMSG) {
1555 if (!ipv4_is_local_multicast(ip_hdr(skb)->daddr))
1556 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1557 return 0;
1558 } else if (err < 0) {
1559 return err;
1560 }
1561
1562 BR_INPUT_SKB_CB(skb)->igmp = 1;
1563 ih = igmp_hdr(skb);
1564
1565 switch (ih->type) {
1566 case IGMP_HOST_MEMBERSHIP_REPORT:
1567 case IGMPV2_HOST_MEMBERSHIP_REPORT:
1568 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1569 err = br_ip4_multicast_add_group(br, port, ih->group, vid);
1570 break;
1571 case IGMPV3_HOST_MEMBERSHIP_REPORT:
1572 err = br_ip4_multicast_igmp3_report(br, port, skb_trimmed, vid);
1573 break;
1574 case IGMP_HOST_MEMBERSHIP_QUERY:
1575 err = br_ip4_multicast_query(br, port, skb_trimmed, vid);
1576 break;
1577 case IGMP_HOST_LEAVE_MESSAGE:
1578 br_ip4_multicast_leave_group(br, port, ih->group, vid);
1579 break;
1580 }
1581
1582 if (skb_trimmed)
1583 kfree_skb(skb_trimmed);
1584
1585 return err;
1586 }
1587
1588 #if IS_ENABLED(CONFIG_IPV6)
1589 static int br_multicast_ipv6_rcv(struct net_bridge *br,
1590 struct net_bridge_port *port,
1591 struct sk_buff *skb,
1592 u16 vid)
1593 {
1594 struct sk_buff *skb_trimmed = NULL;
1595 struct mld_msg *mld;
1596 int err;
1597
1598 err = ipv6_mc_check_mld(skb, &skb_trimmed);
1599
1600 if (err == -ENOMSG) {
1601 if (!ipv6_addr_is_ll_all_nodes(&ipv6_hdr(skb)->daddr))
1602 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1603 return 0;
1604 } else if (err < 0) {
1605 return err;
1606 }
1607
1608 BR_INPUT_SKB_CB(skb)->igmp = 1;
1609 mld = (struct mld_msg *)skb_transport_header(skb);
1610
1611 switch (mld->mld_type) {
1612 case ICMPV6_MGM_REPORT:
1613 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1614 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid);
1615 break;
1616 case ICMPV6_MLD2_REPORT:
1617 err = br_ip6_multicast_mld2_report(br, port, skb_trimmed, vid);
1618 break;
1619 case ICMPV6_MGM_QUERY:
1620 err = br_ip6_multicast_query(br, port, skb_trimmed, vid);
1621 break;
1622 case ICMPV6_MGM_REDUCTION:
1623 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid);
1624 break;
1625 }
1626
1627 if (skb_trimmed)
1628 kfree_skb(skb_trimmed);
1629
1630 return err;
1631 }
1632 #endif
1633
1634 int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port,
1635 struct sk_buff *skb, u16 vid)
1636 {
1637 BR_INPUT_SKB_CB(skb)->igmp = 0;
1638 BR_INPUT_SKB_CB(skb)->mrouters_only = 0;
1639
1640 if (br->multicast_disabled)
1641 return 0;
1642
1643 switch (skb->protocol) {
1644 case htons(ETH_P_IP):
1645 return br_multicast_ipv4_rcv(br, port, skb, vid);
1646 #if IS_ENABLED(CONFIG_IPV6)
1647 case htons(ETH_P_IPV6):
1648 return br_multicast_ipv6_rcv(br, port, skb, vid);
1649 #endif
1650 }
1651
1652 return 0;
1653 }
1654
1655 static void br_multicast_query_expired(struct net_bridge *br,
1656 struct bridge_mcast_own_query *query,
1657 struct bridge_mcast_querier *querier)
1658 {
1659 spin_lock(&br->multicast_lock);
1660 if (query->startup_sent < br->multicast_startup_query_count)
1661 query->startup_sent++;
1662
1663 RCU_INIT_POINTER(querier->port, NULL);
1664 br_multicast_send_query(br, NULL, query);
1665 spin_unlock(&br->multicast_lock);
1666 }
1667
1668 static void br_ip4_multicast_query_expired(unsigned long data)
1669 {
1670 struct net_bridge *br = (void *)data;
1671
1672 br_multicast_query_expired(br, &br->ip4_own_query, &br->ip4_querier);
1673 }
1674
1675 #if IS_ENABLED(CONFIG_IPV6)
1676 static void br_ip6_multicast_query_expired(unsigned long data)
1677 {
1678 struct net_bridge *br = (void *)data;
1679
1680 br_multicast_query_expired(br, &br->ip6_own_query, &br->ip6_querier);
1681 }
1682 #endif
1683
1684 void br_multicast_init(struct net_bridge *br)
1685 {
1686 br->hash_elasticity = 4;
1687 br->hash_max = 512;
1688
1689 br->multicast_router = 1;
1690 br->multicast_querier = 0;
1691 br->multicast_query_use_ifaddr = 0;
1692 br->multicast_last_member_count = 2;
1693 br->multicast_startup_query_count = 2;
1694
1695 br->multicast_last_member_interval = HZ;
1696 br->multicast_query_response_interval = 10 * HZ;
1697 br->multicast_startup_query_interval = 125 * HZ / 4;
1698 br->multicast_query_interval = 125 * HZ;
1699 br->multicast_querier_interval = 255 * HZ;
1700 br->multicast_membership_interval = 260 * HZ;
1701
1702 br->ip4_other_query.delay_time = 0;
1703 br->ip4_querier.port = NULL;
1704 #if IS_ENABLED(CONFIG_IPV6)
1705 br->ip6_other_query.delay_time = 0;
1706 br->ip6_querier.port = NULL;
1707 #endif
1708
1709 spin_lock_init(&br->multicast_lock);
1710 setup_timer(&br->multicast_router_timer,
1711 br_multicast_local_router_expired, 0);
1712 setup_timer(&br->ip4_other_query.timer,
1713 br_ip4_multicast_querier_expired, (unsigned long)br);
1714 setup_timer(&br->ip4_own_query.timer, br_ip4_multicast_query_expired,
1715 (unsigned long)br);
1716 #if IS_ENABLED(CONFIG_IPV6)
1717 setup_timer(&br->ip6_other_query.timer,
1718 br_ip6_multicast_querier_expired, (unsigned long)br);
1719 setup_timer(&br->ip6_own_query.timer, br_ip6_multicast_query_expired,
1720 (unsigned long)br);
1721 #endif
1722 }
1723
1724 static void __br_multicast_open(struct net_bridge *br,
1725 struct bridge_mcast_own_query *query)
1726 {
1727 query->startup_sent = 0;
1728
1729 if (br->multicast_disabled)
1730 return;
1731
1732 mod_timer(&query->timer, jiffies);
1733 }
1734
1735 void br_multicast_open(struct net_bridge *br)
1736 {
1737 __br_multicast_open(br, &br->ip4_own_query);
1738 #if IS_ENABLED(CONFIG_IPV6)
1739 __br_multicast_open(br, &br->ip6_own_query);
1740 #endif
1741 }
1742
1743 void br_multicast_stop(struct net_bridge *br)
1744 {
1745 del_timer_sync(&br->multicast_router_timer);
1746 del_timer_sync(&br->ip4_other_query.timer);
1747 del_timer_sync(&br->ip4_own_query.timer);
1748 #if IS_ENABLED(CONFIG_IPV6)
1749 del_timer_sync(&br->ip6_other_query.timer);
1750 del_timer_sync(&br->ip6_own_query.timer);
1751 #endif
1752 }
1753
1754 void br_multicast_dev_del(struct net_bridge *br)
1755 {
1756 struct net_bridge_mdb_htable *mdb;
1757 struct net_bridge_mdb_entry *mp;
1758 struct hlist_node *n;
1759 u32 ver;
1760 int i;
1761
1762 spin_lock_bh(&br->multicast_lock);
1763 mdb = mlock_dereference(br->mdb, br);
1764 if (!mdb)
1765 goto out;
1766
1767 br->mdb = NULL;
1768
1769 ver = mdb->ver;
1770 for (i = 0; i < mdb->max; i++) {
1771 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i],
1772 hlist[ver]) {
1773 del_timer(&mp->timer);
1774 call_rcu_bh(&mp->rcu, br_multicast_free_group);
1775 }
1776 }
1777
1778 if (mdb->old) {
1779 spin_unlock_bh(&br->multicast_lock);
1780 rcu_barrier_bh();
1781 spin_lock_bh(&br->multicast_lock);
1782 WARN_ON(mdb->old);
1783 }
1784
1785 mdb->old = mdb;
1786 call_rcu_bh(&mdb->rcu, br_mdb_free);
1787
1788 out:
1789 spin_unlock_bh(&br->multicast_lock);
1790 }
1791
1792 int br_multicast_set_router(struct net_bridge *br, unsigned long val)
1793 {
1794 int err = -EINVAL;
1795
1796 spin_lock_bh(&br->multicast_lock);
1797
1798 switch (val) {
1799 case 0:
1800 case 2:
1801 del_timer(&br->multicast_router_timer);
1802 /* fall through */
1803 case 1:
1804 br->multicast_router = val;
1805 err = 0;
1806 break;
1807 }
1808
1809 spin_unlock_bh(&br->multicast_lock);
1810
1811 return err;
1812 }
1813
1814 int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val)
1815 {
1816 struct net_bridge *br = p->br;
1817 int err = -EINVAL;
1818
1819 spin_lock(&br->multicast_lock);
1820
1821 switch (val) {
1822 case 0:
1823 case 1:
1824 case 2:
1825 p->multicast_router = val;
1826 err = 0;
1827
1828 if (val < 2 && !hlist_unhashed(&p->rlist))
1829 hlist_del_init_rcu(&p->rlist);
1830
1831 if (val == 1)
1832 break;
1833
1834 del_timer(&p->multicast_router_timer);
1835
1836 if (val == 0)
1837 break;
1838
1839 br_multicast_add_router(br, p);
1840 break;
1841 }
1842
1843 spin_unlock(&br->multicast_lock);
1844
1845 return err;
1846 }
1847
1848 static void br_multicast_start_querier(struct net_bridge *br,
1849 struct bridge_mcast_own_query *query)
1850 {
1851 struct net_bridge_port *port;
1852
1853 __br_multicast_open(br, query);
1854
1855 list_for_each_entry(port, &br->port_list, list) {
1856 if (port->state == BR_STATE_DISABLED ||
1857 port->state == BR_STATE_BLOCKING)
1858 continue;
1859
1860 if (query == &br->ip4_own_query)
1861 br_multicast_enable(&port->ip4_own_query);
1862 #if IS_ENABLED(CONFIG_IPV6)
1863 else
1864 br_multicast_enable(&port->ip6_own_query);
1865 #endif
1866 }
1867 }
1868
1869 int br_multicast_toggle(struct net_bridge *br, unsigned long val)
1870 {
1871 int err = 0;
1872 struct net_bridge_mdb_htable *mdb;
1873
1874 spin_lock_bh(&br->multicast_lock);
1875 if (br->multicast_disabled == !val)
1876 goto unlock;
1877
1878 br->multicast_disabled = !val;
1879 if (br->multicast_disabled)
1880 goto unlock;
1881
1882 if (!netif_running(br->dev))
1883 goto unlock;
1884
1885 mdb = mlock_dereference(br->mdb, br);
1886 if (mdb) {
1887 if (mdb->old) {
1888 err = -EEXIST;
1889 rollback:
1890 br->multicast_disabled = !!val;
1891 goto unlock;
1892 }
1893
1894 err = br_mdb_rehash(&br->mdb, mdb->max,
1895 br->hash_elasticity);
1896 if (err)
1897 goto rollback;
1898 }
1899
1900 br_multicast_start_querier(br, &br->ip4_own_query);
1901 #if IS_ENABLED(CONFIG_IPV6)
1902 br_multicast_start_querier(br, &br->ip6_own_query);
1903 #endif
1904
1905 unlock:
1906 spin_unlock_bh(&br->multicast_lock);
1907
1908 return err;
1909 }
1910
1911 int br_multicast_set_querier(struct net_bridge *br, unsigned long val)
1912 {
1913 unsigned long max_delay;
1914
1915 val = !!val;
1916
1917 spin_lock_bh(&br->multicast_lock);
1918 if (br->multicast_querier == val)
1919 goto unlock;
1920
1921 br->multicast_querier = val;
1922 if (!val)
1923 goto unlock;
1924
1925 max_delay = br->multicast_query_response_interval;
1926
1927 if (!timer_pending(&br->ip4_other_query.timer))
1928 br->ip4_other_query.delay_time = jiffies + max_delay;
1929
1930 br_multicast_start_querier(br, &br->ip4_own_query);
1931
1932 #if IS_ENABLED(CONFIG_IPV6)
1933 if (!timer_pending(&br->ip6_other_query.timer))
1934 br->ip6_other_query.delay_time = jiffies + max_delay;
1935
1936 br_multicast_start_querier(br, &br->ip6_own_query);
1937 #endif
1938
1939 unlock:
1940 spin_unlock_bh(&br->multicast_lock);
1941
1942 return 0;
1943 }
1944
1945 int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
1946 {
1947 int err = -EINVAL;
1948 u32 old;
1949 struct net_bridge_mdb_htable *mdb;
1950
1951 spin_lock_bh(&br->multicast_lock);
1952 if (!is_power_of_2(val))
1953 goto unlock;
1954
1955 mdb = mlock_dereference(br->mdb, br);
1956 if (mdb && val < mdb->size)
1957 goto unlock;
1958
1959 err = 0;
1960
1961 old = br->hash_max;
1962 br->hash_max = val;
1963
1964 if (mdb) {
1965 if (mdb->old) {
1966 err = -EEXIST;
1967 rollback:
1968 br->hash_max = old;
1969 goto unlock;
1970 }
1971
1972 err = br_mdb_rehash(&br->mdb, br->hash_max,
1973 br->hash_elasticity);
1974 if (err)
1975 goto rollback;
1976 }
1977
1978 unlock:
1979 spin_unlock_bh(&br->multicast_lock);
1980
1981 return err;
1982 }
1983
1984 /**
1985 * br_multicast_list_adjacent - Returns snooped multicast addresses
1986 * @dev: The bridge port adjacent to which to retrieve addresses
1987 * @br_ip_list: The list to store found, snooped multicast IP addresses in
1988 *
1989 * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast
1990 * snooping feature on all bridge ports of dev's bridge device, excluding
1991 * the addresses from dev itself.
1992 *
1993 * Returns the number of items added to br_ip_list.
1994 *
1995 * Notes:
1996 * - br_ip_list needs to be initialized by caller
1997 * - br_ip_list might contain duplicates in the end
1998 * (needs to be taken care of by caller)
1999 * - br_ip_list needs to be freed by caller
2000 */
2001 int br_multicast_list_adjacent(struct net_device *dev,
2002 struct list_head *br_ip_list)
2003 {
2004 struct net_bridge *br;
2005 struct net_bridge_port *port;
2006 struct net_bridge_port_group *group;
2007 struct br_ip_list *entry;
2008 int count = 0;
2009
2010 rcu_read_lock();
2011 if (!br_ip_list || !br_port_exists(dev))
2012 goto unlock;
2013
2014 port = br_port_get_rcu(dev);
2015 if (!port || !port->br)
2016 goto unlock;
2017
2018 br = port->br;
2019
2020 list_for_each_entry_rcu(port, &br->port_list, list) {
2021 if (!port->dev || port->dev == dev)
2022 continue;
2023
2024 hlist_for_each_entry_rcu(group, &port->mglist, mglist) {
2025 entry = kmalloc(sizeof(*entry), GFP_ATOMIC);
2026 if (!entry)
2027 goto unlock;
2028
2029 entry->addr = group->addr;
2030 list_add(&entry->list, br_ip_list);
2031 count++;
2032 }
2033 }
2034
2035 unlock:
2036 rcu_read_unlock();
2037 return count;
2038 }
2039 EXPORT_SYMBOL_GPL(br_multicast_list_adjacent);
2040
2041 /**
2042 * br_multicast_has_querier_anywhere - Checks for a querier on a bridge
2043 * @dev: The bridge port providing the bridge on which to check for a querier
2044 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6
2045 *
2046 * Checks whether the given interface has a bridge on top and if so returns
2047 * true if a valid querier exists anywhere on the bridged link layer.
2048 * Otherwise returns false.
2049 */
2050 bool br_multicast_has_querier_anywhere(struct net_device *dev, int proto)
2051 {
2052 struct net_bridge *br;
2053 struct net_bridge_port *port;
2054 struct ethhdr eth;
2055 bool ret = false;
2056
2057 rcu_read_lock();
2058 if (!br_port_exists(dev))
2059 goto unlock;
2060
2061 port = br_port_get_rcu(dev);
2062 if (!port || !port->br)
2063 goto unlock;
2064
2065 br = port->br;
2066
2067 memset(&eth, 0, sizeof(eth));
2068 eth.h_proto = htons(proto);
2069
2070 ret = br_multicast_querier_exists(br, &eth);
2071
2072 unlock:
2073 rcu_read_unlock();
2074 return ret;
2075 }
2076 EXPORT_SYMBOL_GPL(br_multicast_has_querier_anywhere);
2077
2078 /**
2079 * br_multicast_has_querier_adjacent - Checks for a querier behind a bridge port
2080 * @dev: The bridge port adjacent to which to check for a querier
2081 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6
2082 *
2083 * Checks whether the given interface has a bridge on top and if so returns
2084 * true if a selected querier is behind one of the other ports of this
2085 * bridge. Otherwise returns false.
2086 */
2087 bool br_multicast_has_querier_adjacent(struct net_device *dev, int proto)
2088 {
2089 struct net_bridge *br;
2090 struct net_bridge_port *port;
2091 bool ret = false;
2092
2093 rcu_read_lock();
2094 if (!br_port_exists(dev))
2095 goto unlock;
2096
2097 port = br_port_get_rcu(dev);
2098 if (!port || !port->br)
2099 goto unlock;
2100
2101 br = port->br;
2102
2103 switch (proto) {
2104 case ETH_P_IP:
2105 if (!timer_pending(&br->ip4_other_query.timer) ||
2106 rcu_dereference(br->ip4_querier.port) == port)
2107 goto unlock;
2108 break;
2109 #if IS_ENABLED(CONFIG_IPV6)
2110 case ETH_P_IPV6:
2111 if (!timer_pending(&br->ip6_other_query.timer) ||
2112 rcu_dereference(br->ip6_querier.port) == port)
2113 goto unlock;
2114 break;
2115 #endif
2116 default:
2117 goto unlock;
2118 }
2119
2120 ret = true;
2121 unlock:
2122 rcu_read_unlock();
2123 return ret;
2124 }
2125 EXPORT_SYMBOL_GPL(br_multicast_has_querier_adjacent);