]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - net/bridge/br_multicast.c
bridge: adhere to querier election mechanism specified by RFCs
[mirror_ubuntu-zesty-kernel.git] / net / bridge / br_multicast.c
1 /*
2 * Bridge multicast support.
3 *
4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13 #include <linux/err.h>
14 #include <linux/if_ether.h>
15 #include <linux/igmp.h>
16 #include <linux/jhash.h>
17 #include <linux/kernel.h>
18 #include <linux/log2.h>
19 #include <linux/netdevice.h>
20 #include <linux/netfilter_bridge.h>
21 #include <linux/random.h>
22 #include <linux/rculist.h>
23 #include <linux/skbuff.h>
24 #include <linux/slab.h>
25 #include <linux/timer.h>
26 #include <linux/inetdevice.h>
27 #include <net/ip.h>
28 #if IS_ENABLED(CONFIG_IPV6)
29 #include <net/ipv6.h>
30 #include <net/mld.h>
31 #include <net/ip6_checksum.h>
32 #include <net/addrconf.h>
33 #endif
34
35 #include "br_private.h"
36
37 static void br_multicast_start_querier(struct net_bridge *br,
38 struct bridge_mcast_own_query *query);
39 unsigned int br_mdb_rehash_seq;
40
41 static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
42 {
43 if (a->proto != b->proto)
44 return 0;
45 if (a->vid != b->vid)
46 return 0;
47 switch (a->proto) {
48 case htons(ETH_P_IP):
49 return a->u.ip4 == b->u.ip4;
50 #if IS_ENABLED(CONFIG_IPV6)
51 case htons(ETH_P_IPV6):
52 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);
53 #endif
54 }
55 return 0;
56 }
57
58 static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip,
59 __u16 vid)
60 {
61 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1);
62 }
63
64 #if IS_ENABLED(CONFIG_IPV6)
65 static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
66 const struct in6_addr *ip,
67 __u16 vid)
68 {
69 return jhash_2words(ipv6_addr_hash(ip), vid,
70 mdb->secret) & (mdb->max - 1);
71 }
72 #endif
73
74 static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
75 struct br_ip *ip)
76 {
77 switch (ip->proto) {
78 case htons(ETH_P_IP):
79 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid);
80 #if IS_ENABLED(CONFIG_IPV6)
81 case htons(ETH_P_IPV6):
82 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid);
83 #endif
84 }
85 return 0;
86 }
87
88 static struct net_bridge_mdb_entry *__br_mdb_ip_get(
89 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash)
90 {
91 struct net_bridge_mdb_entry *mp;
92
93 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
94 if (br_ip_equal(&mp->addr, dst))
95 return mp;
96 }
97
98 return NULL;
99 }
100
101 struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb,
102 struct br_ip *dst)
103 {
104 if (!mdb)
105 return NULL;
106
107 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
108 }
109
110 static struct net_bridge_mdb_entry *br_mdb_ip4_get(
111 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid)
112 {
113 struct br_ip br_dst;
114
115 br_dst.u.ip4 = dst;
116 br_dst.proto = htons(ETH_P_IP);
117 br_dst.vid = vid;
118
119 return br_mdb_ip_get(mdb, &br_dst);
120 }
121
122 #if IS_ENABLED(CONFIG_IPV6)
123 static struct net_bridge_mdb_entry *br_mdb_ip6_get(
124 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
125 __u16 vid)
126 {
127 struct br_ip br_dst;
128
129 br_dst.u.ip6 = *dst;
130 br_dst.proto = htons(ETH_P_IPV6);
131 br_dst.vid = vid;
132
133 return br_mdb_ip_get(mdb, &br_dst);
134 }
135 #endif
136
137 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
138 struct sk_buff *skb, u16 vid)
139 {
140 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
141 struct br_ip ip;
142
143 if (br->multicast_disabled)
144 return NULL;
145
146 if (BR_INPUT_SKB_CB(skb)->igmp)
147 return NULL;
148
149 ip.proto = skb->protocol;
150 ip.vid = vid;
151
152 switch (skb->protocol) {
153 case htons(ETH_P_IP):
154 ip.u.ip4 = ip_hdr(skb)->daddr;
155 break;
156 #if IS_ENABLED(CONFIG_IPV6)
157 case htons(ETH_P_IPV6):
158 ip.u.ip6 = ipv6_hdr(skb)->daddr;
159 break;
160 #endif
161 default:
162 return NULL;
163 }
164
165 return br_mdb_ip_get(mdb, &ip);
166 }
167
168 static void br_mdb_free(struct rcu_head *head)
169 {
170 struct net_bridge_mdb_htable *mdb =
171 container_of(head, struct net_bridge_mdb_htable, rcu);
172 struct net_bridge_mdb_htable *old = mdb->old;
173
174 mdb->old = NULL;
175 kfree(old->mhash);
176 kfree(old);
177 }
178
179 static int br_mdb_copy(struct net_bridge_mdb_htable *new,
180 struct net_bridge_mdb_htable *old,
181 int elasticity)
182 {
183 struct net_bridge_mdb_entry *mp;
184 int maxlen;
185 int len;
186 int i;
187
188 for (i = 0; i < old->max; i++)
189 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver])
190 hlist_add_head(&mp->hlist[new->ver],
191 &new->mhash[br_ip_hash(new, &mp->addr)]);
192
193 if (!elasticity)
194 return 0;
195
196 maxlen = 0;
197 for (i = 0; i < new->max; i++) {
198 len = 0;
199 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver])
200 len++;
201 if (len > maxlen)
202 maxlen = len;
203 }
204
205 return maxlen > elasticity ? -EINVAL : 0;
206 }
207
208 void br_multicast_free_pg(struct rcu_head *head)
209 {
210 struct net_bridge_port_group *p =
211 container_of(head, struct net_bridge_port_group, rcu);
212
213 kfree(p);
214 }
215
216 static void br_multicast_free_group(struct rcu_head *head)
217 {
218 struct net_bridge_mdb_entry *mp =
219 container_of(head, struct net_bridge_mdb_entry, rcu);
220
221 kfree(mp);
222 }
223
224 static void br_multicast_group_expired(unsigned long data)
225 {
226 struct net_bridge_mdb_entry *mp = (void *)data;
227 struct net_bridge *br = mp->br;
228 struct net_bridge_mdb_htable *mdb;
229
230 spin_lock(&br->multicast_lock);
231 if (!netif_running(br->dev) || timer_pending(&mp->timer))
232 goto out;
233
234 mp->mglist = false;
235
236 if (mp->ports)
237 goto out;
238
239 mdb = mlock_dereference(br->mdb, br);
240
241 hlist_del_rcu(&mp->hlist[mdb->ver]);
242 mdb->size--;
243
244 call_rcu_bh(&mp->rcu, br_multicast_free_group);
245
246 out:
247 spin_unlock(&br->multicast_lock);
248 }
249
250 static void br_multicast_del_pg(struct net_bridge *br,
251 struct net_bridge_port_group *pg)
252 {
253 struct net_bridge_mdb_htable *mdb;
254 struct net_bridge_mdb_entry *mp;
255 struct net_bridge_port_group *p;
256 struct net_bridge_port_group __rcu **pp;
257
258 mdb = mlock_dereference(br->mdb, br);
259
260 mp = br_mdb_ip_get(mdb, &pg->addr);
261 if (WARN_ON(!mp))
262 return;
263
264 for (pp = &mp->ports;
265 (p = mlock_dereference(*pp, br)) != NULL;
266 pp = &p->next) {
267 if (p != pg)
268 continue;
269
270 rcu_assign_pointer(*pp, p->next);
271 hlist_del_init(&p->mglist);
272 del_timer(&p->timer);
273 call_rcu_bh(&p->rcu, br_multicast_free_pg);
274
275 if (!mp->ports && !mp->mglist &&
276 netif_running(br->dev))
277 mod_timer(&mp->timer, jiffies);
278
279 return;
280 }
281
282 WARN_ON(1);
283 }
284
285 static void br_multicast_port_group_expired(unsigned long data)
286 {
287 struct net_bridge_port_group *pg = (void *)data;
288 struct net_bridge *br = pg->port->br;
289
290 spin_lock(&br->multicast_lock);
291 if (!netif_running(br->dev) || timer_pending(&pg->timer) ||
292 hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT)
293 goto out;
294
295 br_multicast_del_pg(br, pg);
296
297 out:
298 spin_unlock(&br->multicast_lock);
299 }
300
301 static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
302 int elasticity)
303 {
304 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
305 struct net_bridge_mdb_htable *mdb;
306 int err;
307
308 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
309 if (!mdb)
310 return -ENOMEM;
311
312 mdb->max = max;
313 mdb->old = old;
314
315 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC);
316 if (!mdb->mhash) {
317 kfree(mdb);
318 return -ENOMEM;
319 }
320
321 mdb->size = old ? old->size : 0;
322 mdb->ver = old ? old->ver ^ 1 : 0;
323
324 if (!old || elasticity)
325 get_random_bytes(&mdb->secret, sizeof(mdb->secret));
326 else
327 mdb->secret = old->secret;
328
329 if (!old)
330 goto out;
331
332 err = br_mdb_copy(mdb, old, elasticity);
333 if (err) {
334 kfree(mdb->mhash);
335 kfree(mdb);
336 return err;
337 }
338
339 br_mdb_rehash_seq++;
340 call_rcu_bh(&mdb->rcu, br_mdb_free);
341
342 out:
343 rcu_assign_pointer(*mdbp, mdb);
344
345 return 0;
346 }
347
348 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
349 __be32 group)
350 {
351 struct sk_buff *skb;
352 struct igmphdr *ih;
353 struct ethhdr *eth;
354 struct iphdr *iph;
355
356 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
357 sizeof(*ih) + 4);
358 if (!skb)
359 goto out;
360
361 skb->protocol = htons(ETH_P_IP);
362
363 skb_reset_mac_header(skb);
364 eth = eth_hdr(skb);
365
366 ether_addr_copy(eth->h_source, br->dev->dev_addr);
367 eth->h_dest[0] = 1;
368 eth->h_dest[1] = 0;
369 eth->h_dest[2] = 0x5e;
370 eth->h_dest[3] = 0;
371 eth->h_dest[4] = 0;
372 eth->h_dest[5] = 1;
373 eth->h_proto = htons(ETH_P_IP);
374 skb_put(skb, sizeof(*eth));
375
376 skb_set_network_header(skb, skb->len);
377 iph = ip_hdr(skb);
378
379 iph->version = 4;
380 iph->ihl = 6;
381 iph->tos = 0xc0;
382 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4);
383 iph->id = 0;
384 iph->frag_off = htons(IP_DF);
385 iph->ttl = 1;
386 iph->protocol = IPPROTO_IGMP;
387 iph->saddr = br->multicast_query_use_ifaddr ?
388 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0;
389 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP);
390 ((u8 *)&iph[1])[0] = IPOPT_RA;
391 ((u8 *)&iph[1])[1] = 4;
392 ((u8 *)&iph[1])[2] = 0;
393 ((u8 *)&iph[1])[3] = 0;
394 ip_send_check(iph);
395 skb_put(skb, 24);
396
397 skb_set_transport_header(skb, skb->len);
398 ih = igmp_hdr(skb);
399 ih->type = IGMP_HOST_MEMBERSHIP_QUERY;
400 ih->code = (group ? br->multicast_last_member_interval :
401 br->multicast_query_response_interval) /
402 (HZ / IGMP_TIMER_SCALE);
403 ih->group = group;
404 ih->csum = 0;
405 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
406 skb_put(skb, sizeof(*ih));
407
408 __skb_pull(skb, sizeof(*eth));
409
410 out:
411 return skb;
412 }
413
414 #if IS_ENABLED(CONFIG_IPV6)
415 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
416 const struct in6_addr *group)
417 {
418 struct sk_buff *skb;
419 struct ipv6hdr *ip6h;
420 struct mld_msg *mldq;
421 struct ethhdr *eth;
422 u8 *hopopt;
423 unsigned long interval;
424
425 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
426 8 + sizeof(*mldq));
427 if (!skb)
428 goto out;
429
430 skb->protocol = htons(ETH_P_IPV6);
431
432 /* Ethernet header */
433 skb_reset_mac_header(skb);
434 eth = eth_hdr(skb);
435
436 ether_addr_copy(eth->h_source, br->dev->dev_addr);
437 eth->h_proto = htons(ETH_P_IPV6);
438 skb_put(skb, sizeof(*eth));
439
440 /* IPv6 header + HbH option */
441 skb_set_network_header(skb, skb->len);
442 ip6h = ipv6_hdr(skb);
443
444 *(__force __be32 *)ip6h = htonl(0x60000000);
445 ip6h->payload_len = htons(8 + sizeof(*mldq));
446 ip6h->nexthdr = IPPROTO_HOPOPTS;
447 ip6h->hop_limit = 1;
448 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1));
449 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0,
450 &ip6h->saddr)) {
451 kfree_skb(skb);
452 return NULL;
453 }
454 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest);
455
456 hopopt = (u8 *)(ip6h + 1);
457 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */
458 hopopt[1] = 0; /* length of HbH */
459 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */
460 hopopt[3] = 2; /* Length of RA Option */
461 hopopt[4] = 0; /* Type = 0x0000 (MLD) */
462 hopopt[5] = 0;
463 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */
464 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */
465
466 skb_put(skb, sizeof(*ip6h) + 8);
467
468 /* ICMPv6 */
469 skb_set_transport_header(skb, skb->len);
470 mldq = (struct mld_msg *) icmp6_hdr(skb);
471
472 interval = ipv6_addr_any(group) ?
473 br->multicast_query_response_interval :
474 br->multicast_last_member_interval;
475
476 mldq->mld_type = ICMPV6_MGM_QUERY;
477 mldq->mld_code = 0;
478 mldq->mld_cksum = 0;
479 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval));
480 mldq->mld_reserved = 0;
481 mldq->mld_mca = *group;
482
483 /* checksum */
484 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
485 sizeof(*mldq), IPPROTO_ICMPV6,
486 csum_partial(mldq,
487 sizeof(*mldq), 0));
488 skb_put(skb, sizeof(*mldq));
489
490 __skb_pull(skb, sizeof(*eth));
491
492 out:
493 return skb;
494 }
495 #endif
496
497 static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
498 struct br_ip *addr)
499 {
500 switch (addr->proto) {
501 case htons(ETH_P_IP):
502 return br_ip4_multicast_alloc_query(br, addr->u.ip4);
503 #if IS_ENABLED(CONFIG_IPV6)
504 case htons(ETH_P_IPV6):
505 return br_ip6_multicast_alloc_query(br, &addr->u.ip6);
506 #endif
507 }
508 return NULL;
509 }
510
511 static struct net_bridge_mdb_entry *br_multicast_get_group(
512 struct net_bridge *br, struct net_bridge_port *port,
513 struct br_ip *group, int hash)
514 {
515 struct net_bridge_mdb_htable *mdb;
516 struct net_bridge_mdb_entry *mp;
517 unsigned int count = 0;
518 unsigned int max;
519 int elasticity;
520 int err;
521
522 mdb = rcu_dereference_protected(br->mdb, 1);
523 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
524 count++;
525 if (unlikely(br_ip_equal(group, &mp->addr)))
526 return mp;
527 }
528
529 elasticity = 0;
530 max = mdb->max;
531
532 if (unlikely(count > br->hash_elasticity && count)) {
533 if (net_ratelimit())
534 br_info(br, "Multicast hash table "
535 "chain limit reached: %s\n",
536 port ? port->dev->name : br->dev->name);
537
538 elasticity = br->hash_elasticity;
539 }
540
541 if (mdb->size >= max) {
542 max *= 2;
543 if (unlikely(max > br->hash_max)) {
544 br_warn(br, "Multicast hash table maximum of %d "
545 "reached, disabling snooping: %s\n",
546 br->hash_max,
547 port ? port->dev->name : br->dev->name);
548 err = -E2BIG;
549 disable:
550 br->multicast_disabled = 1;
551 goto err;
552 }
553 }
554
555 if (max > mdb->max || elasticity) {
556 if (mdb->old) {
557 if (net_ratelimit())
558 br_info(br, "Multicast hash table "
559 "on fire: %s\n",
560 port ? port->dev->name : br->dev->name);
561 err = -EEXIST;
562 goto err;
563 }
564
565 err = br_mdb_rehash(&br->mdb, max, elasticity);
566 if (err) {
567 br_warn(br, "Cannot rehash multicast "
568 "hash table, disabling snooping: %s, %d, %d\n",
569 port ? port->dev->name : br->dev->name,
570 mdb->size, err);
571 goto disable;
572 }
573
574 err = -EAGAIN;
575 goto err;
576 }
577
578 return NULL;
579
580 err:
581 mp = ERR_PTR(err);
582 return mp;
583 }
584
585 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br,
586 struct net_bridge_port *port, struct br_ip *group)
587 {
588 struct net_bridge_mdb_htable *mdb;
589 struct net_bridge_mdb_entry *mp;
590 int hash;
591 int err;
592
593 mdb = rcu_dereference_protected(br->mdb, 1);
594 if (!mdb) {
595 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0);
596 if (err)
597 return ERR_PTR(err);
598 goto rehash;
599 }
600
601 hash = br_ip_hash(mdb, group);
602 mp = br_multicast_get_group(br, port, group, hash);
603 switch (PTR_ERR(mp)) {
604 case 0:
605 break;
606
607 case -EAGAIN:
608 rehash:
609 mdb = rcu_dereference_protected(br->mdb, 1);
610 hash = br_ip_hash(mdb, group);
611 break;
612
613 default:
614 goto out;
615 }
616
617 mp = kzalloc(sizeof(*mp), GFP_ATOMIC);
618 if (unlikely(!mp))
619 return ERR_PTR(-ENOMEM);
620
621 mp->br = br;
622 mp->addr = *group;
623 setup_timer(&mp->timer, br_multicast_group_expired,
624 (unsigned long)mp);
625
626 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]);
627 mdb->size++;
628
629 out:
630 return mp;
631 }
632
633 struct net_bridge_port_group *br_multicast_new_port_group(
634 struct net_bridge_port *port,
635 struct br_ip *group,
636 struct net_bridge_port_group __rcu *next,
637 unsigned char state)
638 {
639 struct net_bridge_port_group *p;
640
641 p = kzalloc(sizeof(*p), GFP_ATOMIC);
642 if (unlikely(!p))
643 return NULL;
644
645 p->addr = *group;
646 p->port = port;
647 p->state = state;
648 rcu_assign_pointer(p->next, next);
649 hlist_add_head(&p->mglist, &port->mglist);
650 setup_timer(&p->timer, br_multicast_port_group_expired,
651 (unsigned long)p);
652 return p;
653 }
654
655 static int br_multicast_add_group(struct net_bridge *br,
656 struct net_bridge_port *port,
657 struct br_ip *group)
658 {
659 struct net_bridge_mdb_entry *mp;
660 struct net_bridge_port_group *p;
661 struct net_bridge_port_group __rcu **pp;
662 unsigned long now = jiffies;
663 int err;
664
665 spin_lock(&br->multicast_lock);
666 if (!netif_running(br->dev) ||
667 (port && port->state == BR_STATE_DISABLED))
668 goto out;
669
670 mp = br_multicast_new_group(br, port, group);
671 err = PTR_ERR(mp);
672 if (IS_ERR(mp))
673 goto err;
674
675 if (!port) {
676 mp->mglist = true;
677 mod_timer(&mp->timer, now + br->multicast_membership_interval);
678 goto out;
679 }
680
681 for (pp = &mp->ports;
682 (p = mlock_dereference(*pp, br)) != NULL;
683 pp = &p->next) {
684 if (p->port == port)
685 goto found;
686 if ((unsigned long)p->port < (unsigned long)port)
687 break;
688 }
689
690 p = br_multicast_new_port_group(port, group, *pp, MDB_TEMPORARY);
691 if (unlikely(!p))
692 goto err;
693 rcu_assign_pointer(*pp, p);
694 br_mdb_notify(br->dev, port, group, RTM_NEWMDB);
695
696 found:
697 mod_timer(&p->timer, now + br->multicast_membership_interval);
698 out:
699 err = 0;
700
701 err:
702 spin_unlock(&br->multicast_lock);
703 return err;
704 }
705
706 static int br_ip4_multicast_add_group(struct net_bridge *br,
707 struct net_bridge_port *port,
708 __be32 group,
709 __u16 vid)
710 {
711 struct br_ip br_group;
712
713 if (ipv4_is_local_multicast(group))
714 return 0;
715
716 br_group.u.ip4 = group;
717 br_group.proto = htons(ETH_P_IP);
718 br_group.vid = vid;
719
720 return br_multicast_add_group(br, port, &br_group);
721 }
722
723 #if IS_ENABLED(CONFIG_IPV6)
724 static int br_ip6_multicast_add_group(struct net_bridge *br,
725 struct net_bridge_port *port,
726 const struct in6_addr *group,
727 __u16 vid)
728 {
729 struct br_ip br_group;
730
731 if (ipv6_addr_is_ll_all_nodes(group))
732 return 0;
733
734 br_group.u.ip6 = *group;
735 br_group.proto = htons(ETH_P_IPV6);
736 br_group.vid = vid;
737
738 return br_multicast_add_group(br, port, &br_group);
739 }
740 #endif
741
742 static void br_multicast_router_expired(unsigned long data)
743 {
744 struct net_bridge_port *port = (void *)data;
745 struct net_bridge *br = port->br;
746
747 spin_lock(&br->multicast_lock);
748 if (port->multicast_router != 1 ||
749 timer_pending(&port->multicast_router_timer) ||
750 hlist_unhashed(&port->rlist))
751 goto out;
752
753 hlist_del_init_rcu(&port->rlist);
754
755 out:
756 spin_unlock(&br->multicast_lock);
757 }
758
759 static void br_multicast_local_router_expired(unsigned long data)
760 {
761 }
762
763 static void br_multicast_querier_expired(struct net_bridge *br,
764 struct bridge_mcast_own_query *query)
765 {
766 spin_lock(&br->multicast_lock);
767 if (!netif_running(br->dev) || br->multicast_disabled)
768 goto out;
769
770 br_multicast_start_querier(br, query);
771
772 out:
773 spin_unlock(&br->multicast_lock);
774 }
775
776 static void br_ip4_multicast_querier_expired(unsigned long data)
777 {
778 struct net_bridge *br = (void *)data;
779
780 br_multicast_querier_expired(br, &br->ip4_own_query);
781 }
782
783 #if IS_ENABLED(CONFIG_IPV6)
784 static void br_ip6_multicast_querier_expired(unsigned long data)
785 {
786 struct net_bridge *br = (void *)data;
787
788 br_multicast_querier_expired(br, &br->ip6_own_query);
789 }
790 #endif
791
792 static void br_multicast_select_own_querier(struct net_bridge *br,
793 struct br_ip *ip,
794 struct sk_buff *skb)
795 {
796 if (ip->proto == htons(ETH_P_IP))
797 br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr;
798 #if IS_ENABLED(CONFIG_IPV6)
799 else
800 br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr;
801 #endif
802 }
803
804 static void __br_multicast_send_query(struct net_bridge *br,
805 struct net_bridge_port *port,
806 struct br_ip *ip)
807 {
808 struct sk_buff *skb;
809
810 skb = br_multicast_alloc_query(br, ip);
811 if (!skb)
812 return;
813
814 if (port) {
815 __skb_push(skb, sizeof(struct ethhdr));
816 skb->dev = port->dev;
817 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, skb, NULL, skb->dev,
818 dev_queue_xmit);
819 } else {
820 br_multicast_select_own_querier(br, ip, skb);
821 netif_rx(skb);
822 }
823 }
824
825 static void br_multicast_send_query(struct net_bridge *br,
826 struct net_bridge_port *port,
827 struct bridge_mcast_own_query *own_query)
828 {
829 unsigned long time;
830 struct br_ip br_group;
831 struct bridge_mcast_other_query *other_query = NULL;
832
833 if (!netif_running(br->dev) || br->multicast_disabled ||
834 !br->multicast_querier)
835 return;
836
837 memset(&br_group.u, 0, sizeof(br_group.u));
838
839 if (port ? (own_query == &port->ip4_own_query) :
840 (own_query == &br->ip4_own_query)) {
841 other_query = &br->ip4_other_query;
842 br_group.proto = htons(ETH_P_IP);
843 #if IS_ENABLED(CONFIG_IPV6)
844 } else {
845 other_query = &br->ip6_other_query;
846 br_group.proto = htons(ETH_P_IPV6);
847 #endif
848 }
849
850 if (!other_query || timer_pending(&other_query->timer))
851 return;
852
853 __br_multicast_send_query(br, port, &br_group);
854
855 time = jiffies;
856 time += own_query->startup_sent < br->multicast_startup_query_count ?
857 br->multicast_startup_query_interval :
858 br->multicast_query_interval;
859 mod_timer(&own_query->timer, time);
860 }
861
862 static void
863 br_multicast_port_query_expired(struct net_bridge_port *port,
864 struct bridge_mcast_own_query *query)
865 {
866 struct net_bridge *br = port->br;
867
868 spin_lock(&br->multicast_lock);
869 if (port->state == BR_STATE_DISABLED ||
870 port->state == BR_STATE_BLOCKING)
871 goto out;
872
873 if (query->startup_sent < br->multicast_startup_query_count)
874 query->startup_sent++;
875
876 br_multicast_send_query(port->br, port, query);
877
878 out:
879 spin_unlock(&br->multicast_lock);
880 }
881
882 static void br_ip4_multicast_port_query_expired(unsigned long data)
883 {
884 struct net_bridge_port *port = (void *)data;
885
886 br_multicast_port_query_expired(port, &port->ip4_own_query);
887 }
888
889 #if IS_ENABLED(CONFIG_IPV6)
890 static void br_ip6_multicast_port_query_expired(unsigned long data)
891 {
892 struct net_bridge_port *port = (void *)data;
893
894 br_multicast_port_query_expired(port, &port->ip6_own_query);
895 }
896 #endif
897
898 void br_multicast_add_port(struct net_bridge_port *port)
899 {
900 port->multicast_router = 1;
901
902 setup_timer(&port->multicast_router_timer, br_multicast_router_expired,
903 (unsigned long)port);
904 setup_timer(&port->ip4_own_query.timer,
905 br_ip4_multicast_port_query_expired, (unsigned long)port);
906 #if IS_ENABLED(CONFIG_IPV6)
907 setup_timer(&port->ip6_own_query.timer,
908 br_ip6_multicast_port_query_expired, (unsigned long)port);
909 #endif
910 }
911
912 void br_multicast_del_port(struct net_bridge_port *port)
913 {
914 del_timer_sync(&port->multicast_router_timer);
915 }
916
917 static void br_multicast_enable(struct bridge_mcast_own_query *query)
918 {
919 query->startup_sent = 0;
920
921 if (try_to_del_timer_sync(&query->timer) >= 0 ||
922 del_timer(&query->timer))
923 mod_timer(&query->timer, jiffies);
924 }
925
926 void br_multicast_enable_port(struct net_bridge_port *port)
927 {
928 struct net_bridge *br = port->br;
929
930 spin_lock(&br->multicast_lock);
931 if (br->multicast_disabled || !netif_running(br->dev))
932 goto out;
933
934 br_multicast_enable(&port->ip4_own_query);
935 #if IS_ENABLED(CONFIG_IPV6)
936 br_multicast_enable(&port->ip6_own_query);
937 #endif
938
939 out:
940 spin_unlock(&br->multicast_lock);
941 }
942
943 void br_multicast_disable_port(struct net_bridge_port *port)
944 {
945 struct net_bridge *br = port->br;
946 struct net_bridge_port_group *pg;
947 struct hlist_node *n;
948
949 spin_lock(&br->multicast_lock);
950 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
951 br_multicast_del_pg(br, pg);
952
953 if (!hlist_unhashed(&port->rlist))
954 hlist_del_init_rcu(&port->rlist);
955 del_timer(&port->multicast_router_timer);
956 del_timer(&port->ip4_own_query.timer);
957 #if IS_ENABLED(CONFIG_IPV6)
958 del_timer(&port->ip6_own_query.timer);
959 #endif
960 spin_unlock(&br->multicast_lock);
961 }
962
963 static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
964 struct net_bridge_port *port,
965 struct sk_buff *skb,
966 u16 vid)
967 {
968 struct igmpv3_report *ih;
969 struct igmpv3_grec *grec;
970 int i;
971 int len;
972 int num;
973 int type;
974 int err = 0;
975 __be32 group;
976
977 if (!pskb_may_pull(skb, sizeof(*ih)))
978 return -EINVAL;
979
980 ih = igmpv3_report_hdr(skb);
981 num = ntohs(ih->ngrec);
982 len = sizeof(*ih);
983
984 for (i = 0; i < num; i++) {
985 len += sizeof(*grec);
986 if (!pskb_may_pull(skb, len))
987 return -EINVAL;
988
989 grec = (void *)(skb->data + len - sizeof(*grec));
990 group = grec->grec_mca;
991 type = grec->grec_type;
992
993 len += ntohs(grec->grec_nsrcs) * 4;
994 if (!pskb_may_pull(skb, len))
995 return -EINVAL;
996
997 /* We treat this as an IGMPv2 report for now. */
998 switch (type) {
999 case IGMPV3_MODE_IS_INCLUDE:
1000 case IGMPV3_MODE_IS_EXCLUDE:
1001 case IGMPV3_CHANGE_TO_INCLUDE:
1002 case IGMPV3_CHANGE_TO_EXCLUDE:
1003 case IGMPV3_ALLOW_NEW_SOURCES:
1004 case IGMPV3_BLOCK_OLD_SOURCES:
1005 break;
1006
1007 default:
1008 continue;
1009 }
1010
1011 err = br_ip4_multicast_add_group(br, port, group, vid);
1012 if (err)
1013 break;
1014 }
1015
1016 return err;
1017 }
1018
1019 #if IS_ENABLED(CONFIG_IPV6)
1020 static int br_ip6_multicast_mld2_report(struct net_bridge *br,
1021 struct net_bridge_port *port,
1022 struct sk_buff *skb,
1023 u16 vid)
1024 {
1025 struct icmp6hdr *icmp6h;
1026 struct mld2_grec *grec;
1027 int i;
1028 int len;
1029 int num;
1030 int err = 0;
1031
1032 if (!pskb_may_pull(skb, sizeof(*icmp6h)))
1033 return -EINVAL;
1034
1035 icmp6h = icmp6_hdr(skb);
1036 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]);
1037 len = sizeof(*icmp6h);
1038
1039 for (i = 0; i < num; i++) {
1040 __be16 *nsrcs, _nsrcs;
1041
1042 nsrcs = skb_header_pointer(skb,
1043 len + offsetof(struct mld2_grec,
1044 grec_nsrcs),
1045 sizeof(_nsrcs), &_nsrcs);
1046 if (!nsrcs)
1047 return -EINVAL;
1048
1049 if (!pskb_may_pull(skb,
1050 len + sizeof(*grec) +
1051 sizeof(struct in6_addr) * ntohs(*nsrcs)))
1052 return -EINVAL;
1053
1054 grec = (struct mld2_grec *)(skb->data + len);
1055 len += sizeof(*grec) +
1056 sizeof(struct in6_addr) * ntohs(*nsrcs);
1057
1058 /* We treat these as MLDv1 reports for now. */
1059 switch (grec->grec_type) {
1060 case MLD2_MODE_IS_INCLUDE:
1061 case MLD2_MODE_IS_EXCLUDE:
1062 case MLD2_CHANGE_TO_INCLUDE:
1063 case MLD2_CHANGE_TO_EXCLUDE:
1064 case MLD2_ALLOW_NEW_SOURCES:
1065 case MLD2_BLOCK_OLD_SOURCES:
1066 break;
1067
1068 default:
1069 continue;
1070 }
1071
1072 err = br_ip6_multicast_add_group(br, port, &grec->grec_mca,
1073 vid);
1074 if (!err)
1075 break;
1076 }
1077
1078 return err;
1079 }
1080 #endif
1081
1082 static bool br_ip4_multicast_select_querier(struct net_bridge *br,
1083 __be32 saddr)
1084 {
1085 if (!timer_pending(&br->ip4_own_query.timer) &&
1086 !timer_pending(&br->ip4_other_query.timer))
1087 goto update;
1088
1089 if (!br->ip4_querier.addr.u.ip4)
1090 goto update;
1091
1092 if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4))
1093 goto update;
1094
1095 return false;
1096
1097 update:
1098 br->ip4_querier.addr.u.ip4 = saddr;
1099
1100 return true;
1101 }
1102
1103 #if IS_ENABLED(CONFIG_IPV6)
1104 static bool br_ip6_multicast_select_querier(struct net_bridge *br,
1105 struct in6_addr *saddr)
1106 {
1107 if (!timer_pending(&br->ip6_own_query.timer) &&
1108 !timer_pending(&br->ip6_other_query.timer))
1109 goto update;
1110
1111 if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0)
1112 goto update;
1113
1114 return false;
1115
1116 update:
1117 br->ip6_querier.addr.u.ip6 = *saddr;
1118
1119 return true;
1120 }
1121 #endif
1122
1123 static bool br_multicast_select_querier(struct net_bridge *br,
1124 struct br_ip *saddr)
1125 {
1126 switch (saddr->proto) {
1127 case htons(ETH_P_IP):
1128 return br_ip4_multicast_select_querier(br, saddr->u.ip4);
1129 #if IS_ENABLED(CONFIG_IPV6)
1130 case htons(ETH_P_IPV6):
1131 return br_ip6_multicast_select_querier(br, &saddr->u.ip6);
1132 #endif
1133 }
1134
1135 return false;
1136 }
1137
1138 static void
1139 br_multicast_update_query_timer(struct net_bridge *br,
1140 struct bridge_mcast_other_query *query,
1141 unsigned long max_delay)
1142 {
1143 if (!timer_pending(&query->timer))
1144 query->delay_time = jiffies + max_delay;
1145
1146 mod_timer(&query->timer, jiffies + br->multicast_querier_interval);
1147 }
1148
1149 /*
1150 * Add port to router_list
1151 * list is maintained ordered by pointer value
1152 * and locked by br->multicast_lock and RCU
1153 */
1154 static void br_multicast_add_router(struct net_bridge *br,
1155 struct net_bridge_port *port)
1156 {
1157 struct net_bridge_port *p;
1158 struct hlist_node *slot = NULL;
1159
1160 hlist_for_each_entry(p, &br->router_list, rlist) {
1161 if ((unsigned long) port >= (unsigned long) p)
1162 break;
1163 slot = &p->rlist;
1164 }
1165
1166 if (slot)
1167 hlist_add_after_rcu(slot, &port->rlist);
1168 else
1169 hlist_add_head_rcu(&port->rlist, &br->router_list);
1170 }
1171
1172 static void br_multicast_mark_router(struct net_bridge *br,
1173 struct net_bridge_port *port)
1174 {
1175 unsigned long now = jiffies;
1176
1177 if (!port) {
1178 if (br->multicast_router == 1)
1179 mod_timer(&br->multicast_router_timer,
1180 now + br->multicast_querier_interval);
1181 return;
1182 }
1183
1184 if (port->multicast_router != 1)
1185 return;
1186
1187 if (!hlist_unhashed(&port->rlist))
1188 goto timer;
1189
1190 br_multicast_add_router(br, port);
1191
1192 timer:
1193 mod_timer(&port->multicast_router_timer,
1194 now + br->multicast_querier_interval);
1195 }
1196
1197 static void br_multicast_query_received(struct net_bridge *br,
1198 struct net_bridge_port *port,
1199 struct bridge_mcast_other_query *query,
1200 struct br_ip *saddr,
1201 unsigned long max_delay)
1202 {
1203 if (!br_multicast_select_querier(br, saddr))
1204 return;
1205
1206 br_multicast_update_query_timer(br, query, max_delay);
1207 br_multicast_mark_router(br, port);
1208 }
1209
1210 static int br_ip4_multicast_query(struct net_bridge *br,
1211 struct net_bridge_port *port,
1212 struct sk_buff *skb,
1213 u16 vid)
1214 {
1215 const struct iphdr *iph = ip_hdr(skb);
1216 struct igmphdr *ih = igmp_hdr(skb);
1217 struct net_bridge_mdb_entry *mp;
1218 struct igmpv3_query *ih3;
1219 struct net_bridge_port_group *p;
1220 struct net_bridge_port_group __rcu **pp;
1221 struct br_ip saddr;
1222 unsigned long max_delay;
1223 unsigned long now = jiffies;
1224 __be32 group;
1225 int err = 0;
1226
1227 spin_lock(&br->multicast_lock);
1228 if (!netif_running(br->dev) ||
1229 (port && port->state == BR_STATE_DISABLED))
1230 goto out;
1231
1232 group = ih->group;
1233
1234 if (skb->len == sizeof(*ih)) {
1235 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE);
1236
1237 if (!max_delay) {
1238 max_delay = 10 * HZ;
1239 group = 0;
1240 }
1241 } else {
1242 if (!pskb_may_pull(skb, sizeof(struct igmpv3_query))) {
1243 err = -EINVAL;
1244 goto out;
1245 }
1246
1247 ih3 = igmpv3_query_hdr(skb);
1248 if (ih3->nsrcs)
1249 goto out;
1250
1251 max_delay = ih3->code ?
1252 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1;
1253 }
1254
1255 /* RFC2236+RFC3376 (IGMPv2+IGMPv3) require the multicast link layer
1256 * all-systems destination addresses (224.0.0.1) for general queries
1257 */
1258 if (!group && iph->daddr != htonl(INADDR_ALLHOSTS_GROUP)) {
1259 err = -EINVAL;
1260 goto out;
1261 }
1262
1263 if (!group) {
1264 saddr.proto = htons(ETH_P_IP);
1265 saddr.u.ip4 = iph->saddr;
1266
1267 br_multicast_query_received(br, port, &br->ip4_other_query,
1268 &saddr, max_delay);
1269 goto out;
1270 }
1271
1272 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid);
1273 if (!mp)
1274 goto out;
1275
1276 max_delay *= br->multicast_last_member_count;
1277
1278 if (mp->mglist &&
1279 (timer_pending(&mp->timer) ?
1280 time_after(mp->timer.expires, now + max_delay) :
1281 try_to_del_timer_sync(&mp->timer) >= 0))
1282 mod_timer(&mp->timer, now + max_delay);
1283
1284 for (pp = &mp->ports;
1285 (p = mlock_dereference(*pp, br)) != NULL;
1286 pp = &p->next) {
1287 if (timer_pending(&p->timer) ?
1288 time_after(p->timer.expires, now + max_delay) :
1289 try_to_del_timer_sync(&p->timer) >= 0)
1290 mod_timer(&p->timer, now + max_delay);
1291 }
1292
1293 out:
1294 spin_unlock(&br->multicast_lock);
1295 return err;
1296 }
1297
1298 #if IS_ENABLED(CONFIG_IPV6)
1299 static int br_ip6_multicast_query(struct net_bridge *br,
1300 struct net_bridge_port *port,
1301 struct sk_buff *skb,
1302 u16 vid)
1303 {
1304 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
1305 struct mld_msg *mld;
1306 struct net_bridge_mdb_entry *mp;
1307 struct mld2_query *mld2q;
1308 struct net_bridge_port_group *p;
1309 struct net_bridge_port_group __rcu **pp;
1310 struct br_ip saddr;
1311 unsigned long max_delay;
1312 unsigned long now = jiffies;
1313 const struct in6_addr *group = NULL;
1314 bool is_general_query;
1315 int err = 0;
1316
1317 spin_lock(&br->multicast_lock);
1318 if (!netif_running(br->dev) ||
1319 (port && port->state == BR_STATE_DISABLED))
1320 goto out;
1321
1322 /* RFC2710+RFC3810 (MLDv1+MLDv2) require link-local source addresses */
1323 if (!(ipv6_addr_type(&ip6h->saddr) & IPV6_ADDR_LINKLOCAL)) {
1324 err = -EINVAL;
1325 goto out;
1326 }
1327
1328 if (skb->len == sizeof(*mld)) {
1329 if (!pskb_may_pull(skb, sizeof(*mld))) {
1330 err = -EINVAL;
1331 goto out;
1332 }
1333 mld = (struct mld_msg *) icmp6_hdr(skb);
1334 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay));
1335 if (max_delay)
1336 group = &mld->mld_mca;
1337 } else {
1338 if (!pskb_may_pull(skb, sizeof(*mld2q))) {
1339 err = -EINVAL;
1340 goto out;
1341 }
1342 mld2q = (struct mld2_query *)icmp6_hdr(skb);
1343 if (!mld2q->mld2q_nsrcs)
1344 group = &mld2q->mld2q_mca;
1345
1346 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL);
1347 }
1348
1349 is_general_query = group && ipv6_addr_any(group);
1350
1351 /* RFC2710+RFC3810 (MLDv1+MLDv2) require the multicast link layer
1352 * all-nodes destination address (ff02::1) for general queries
1353 */
1354 if (is_general_query && !ipv6_addr_is_ll_all_nodes(&ip6h->daddr)) {
1355 err = -EINVAL;
1356 goto out;
1357 }
1358
1359 if (is_general_query) {
1360 saddr.proto = htons(ETH_P_IPV6);
1361 saddr.u.ip6 = ip6h->saddr;
1362
1363 br_multicast_query_received(br, port, &br->ip6_other_query,
1364 &saddr, max_delay);
1365 goto out;
1366 }
1367
1368 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid);
1369 if (!mp)
1370 goto out;
1371
1372 max_delay *= br->multicast_last_member_count;
1373 if (mp->mglist &&
1374 (timer_pending(&mp->timer) ?
1375 time_after(mp->timer.expires, now + max_delay) :
1376 try_to_del_timer_sync(&mp->timer) >= 0))
1377 mod_timer(&mp->timer, now + max_delay);
1378
1379 for (pp = &mp->ports;
1380 (p = mlock_dereference(*pp, br)) != NULL;
1381 pp = &p->next) {
1382 if (timer_pending(&p->timer) ?
1383 time_after(p->timer.expires, now + max_delay) :
1384 try_to_del_timer_sync(&p->timer) >= 0)
1385 mod_timer(&p->timer, now + max_delay);
1386 }
1387
1388 out:
1389 spin_unlock(&br->multicast_lock);
1390 return err;
1391 }
1392 #endif
1393
1394 static void
1395 br_multicast_leave_group(struct net_bridge *br,
1396 struct net_bridge_port *port,
1397 struct br_ip *group,
1398 struct bridge_mcast_other_query *other_query,
1399 struct bridge_mcast_own_query *own_query)
1400 {
1401 struct net_bridge_mdb_htable *mdb;
1402 struct net_bridge_mdb_entry *mp;
1403 struct net_bridge_port_group *p;
1404 unsigned long now;
1405 unsigned long time;
1406
1407 spin_lock(&br->multicast_lock);
1408 if (!netif_running(br->dev) ||
1409 (port && port->state == BR_STATE_DISABLED) ||
1410 timer_pending(&other_query->timer))
1411 goto out;
1412
1413 mdb = mlock_dereference(br->mdb, br);
1414 mp = br_mdb_ip_get(mdb, group);
1415 if (!mp)
1416 goto out;
1417
1418 if (br->multicast_querier) {
1419 __br_multicast_send_query(br, port, &mp->addr);
1420
1421 time = jiffies + br->multicast_last_member_count *
1422 br->multicast_last_member_interval;
1423
1424 mod_timer(&own_query->timer, time);
1425
1426 for (p = mlock_dereference(mp->ports, br);
1427 p != NULL;
1428 p = mlock_dereference(p->next, br)) {
1429 if (p->port != port)
1430 continue;
1431
1432 if (!hlist_unhashed(&p->mglist) &&
1433 (timer_pending(&p->timer) ?
1434 time_after(p->timer.expires, time) :
1435 try_to_del_timer_sync(&p->timer) >= 0)) {
1436 mod_timer(&p->timer, time);
1437 }
1438
1439 break;
1440 }
1441 }
1442
1443 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) {
1444 struct net_bridge_port_group __rcu **pp;
1445
1446 for (pp = &mp->ports;
1447 (p = mlock_dereference(*pp, br)) != NULL;
1448 pp = &p->next) {
1449 if (p->port != port)
1450 continue;
1451
1452 rcu_assign_pointer(*pp, p->next);
1453 hlist_del_init(&p->mglist);
1454 del_timer(&p->timer);
1455 call_rcu_bh(&p->rcu, br_multicast_free_pg);
1456 br_mdb_notify(br->dev, port, group, RTM_DELMDB);
1457
1458 if (!mp->ports && !mp->mglist &&
1459 netif_running(br->dev))
1460 mod_timer(&mp->timer, jiffies);
1461 }
1462 goto out;
1463 }
1464
1465 now = jiffies;
1466 time = now + br->multicast_last_member_count *
1467 br->multicast_last_member_interval;
1468
1469 if (!port) {
1470 if (mp->mglist &&
1471 (timer_pending(&mp->timer) ?
1472 time_after(mp->timer.expires, time) :
1473 try_to_del_timer_sync(&mp->timer) >= 0)) {
1474 mod_timer(&mp->timer, time);
1475 }
1476
1477 goto out;
1478 }
1479
1480 for (p = mlock_dereference(mp->ports, br);
1481 p != NULL;
1482 p = mlock_dereference(p->next, br)) {
1483 if (p->port != port)
1484 continue;
1485
1486 if (!hlist_unhashed(&p->mglist) &&
1487 (timer_pending(&p->timer) ?
1488 time_after(p->timer.expires, time) :
1489 try_to_del_timer_sync(&p->timer) >= 0)) {
1490 mod_timer(&p->timer, time);
1491 }
1492
1493 break;
1494 }
1495 out:
1496 spin_unlock(&br->multicast_lock);
1497 }
1498
1499 static void br_ip4_multicast_leave_group(struct net_bridge *br,
1500 struct net_bridge_port *port,
1501 __be32 group,
1502 __u16 vid)
1503 {
1504 struct br_ip br_group;
1505 struct bridge_mcast_own_query *own_query;
1506
1507 if (ipv4_is_local_multicast(group))
1508 return;
1509
1510 own_query = port ? &port->ip4_own_query : &br->ip4_own_query;
1511
1512 br_group.u.ip4 = group;
1513 br_group.proto = htons(ETH_P_IP);
1514 br_group.vid = vid;
1515
1516 br_multicast_leave_group(br, port, &br_group, &br->ip4_other_query,
1517 own_query);
1518 }
1519
1520 #if IS_ENABLED(CONFIG_IPV6)
1521 static void br_ip6_multicast_leave_group(struct net_bridge *br,
1522 struct net_bridge_port *port,
1523 const struct in6_addr *group,
1524 __u16 vid)
1525 {
1526 struct br_ip br_group;
1527 struct bridge_mcast_own_query *own_query;
1528
1529 if (ipv6_addr_is_ll_all_nodes(group))
1530 return;
1531
1532 own_query = port ? &port->ip6_own_query : &br->ip6_own_query;
1533
1534 br_group.u.ip6 = *group;
1535 br_group.proto = htons(ETH_P_IPV6);
1536 br_group.vid = vid;
1537
1538 br_multicast_leave_group(br, port, &br_group, &br->ip6_other_query,
1539 own_query);
1540 }
1541 #endif
1542
1543 static int br_multicast_ipv4_rcv(struct net_bridge *br,
1544 struct net_bridge_port *port,
1545 struct sk_buff *skb,
1546 u16 vid)
1547 {
1548 struct sk_buff *skb2 = skb;
1549 const struct iphdr *iph;
1550 struct igmphdr *ih;
1551 unsigned int len;
1552 unsigned int offset;
1553 int err;
1554
1555 /* We treat OOM as packet loss for now. */
1556 if (!pskb_may_pull(skb, sizeof(*iph)))
1557 return -EINVAL;
1558
1559 iph = ip_hdr(skb);
1560
1561 if (iph->ihl < 5 || iph->version != 4)
1562 return -EINVAL;
1563
1564 if (!pskb_may_pull(skb, ip_hdrlen(skb)))
1565 return -EINVAL;
1566
1567 iph = ip_hdr(skb);
1568
1569 if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl)))
1570 return -EINVAL;
1571
1572 if (iph->protocol != IPPROTO_IGMP) {
1573 if (!ipv4_is_local_multicast(iph->daddr))
1574 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1575 return 0;
1576 }
1577
1578 len = ntohs(iph->tot_len);
1579 if (skb->len < len || len < ip_hdrlen(skb))
1580 return -EINVAL;
1581
1582 if (skb->len > len) {
1583 skb2 = skb_clone(skb, GFP_ATOMIC);
1584 if (!skb2)
1585 return -ENOMEM;
1586
1587 err = pskb_trim_rcsum(skb2, len);
1588 if (err)
1589 goto err_out;
1590 }
1591
1592 len -= ip_hdrlen(skb2);
1593 offset = skb_network_offset(skb2) + ip_hdrlen(skb2);
1594 __skb_pull(skb2, offset);
1595 skb_reset_transport_header(skb2);
1596
1597 err = -EINVAL;
1598 if (!pskb_may_pull(skb2, sizeof(*ih)))
1599 goto out;
1600
1601 switch (skb2->ip_summed) {
1602 case CHECKSUM_COMPLETE:
1603 if (!csum_fold(skb2->csum))
1604 break;
1605 /* fall through */
1606 case CHECKSUM_NONE:
1607 skb2->csum = 0;
1608 if (skb_checksum_complete(skb2))
1609 goto out;
1610 }
1611
1612 err = 0;
1613
1614 BR_INPUT_SKB_CB(skb)->igmp = 1;
1615 ih = igmp_hdr(skb2);
1616
1617 switch (ih->type) {
1618 case IGMP_HOST_MEMBERSHIP_REPORT:
1619 case IGMPV2_HOST_MEMBERSHIP_REPORT:
1620 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1621 err = br_ip4_multicast_add_group(br, port, ih->group, vid);
1622 break;
1623 case IGMPV3_HOST_MEMBERSHIP_REPORT:
1624 err = br_ip4_multicast_igmp3_report(br, port, skb2, vid);
1625 break;
1626 case IGMP_HOST_MEMBERSHIP_QUERY:
1627 err = br_ip4_multicast_query(br, port, skb2, vid);
1628 break;
1629 case IGMP_HOST_LEAVE_MESSAGE:
1630 br_ip4_multicast_leave_group(br, port, ih->group, vid);
1631 break;
1632 }
1633
1634 out:
1635 __skb_push(skb2, offset);
1636 err_out:
1637 if (skb2 != skb)
1638 kfree_skb(skb2);
1639 return err;
1640 }
1641
1642 #if IS_ENABLED(CONFIG_IPV6)
1643 static int br_multicast_ipv6_rcv(struct net_bridge *br,
1644 struct net_bridge_port *port,
1645 struct sk_buff *skb,
1646 u16 vid)
1647 {
1648 struct sk_buff *skb2;
1649 const struct ipv6hdr *ip6h;
1650 u8 icmp6_type;
1651 u8 nexthdr;
1652 __be16 frag_off;
1653 unsigned int len;
1654 int offset;
1655 int err;
1656
1657 if (!pskb_may_pull(skb, sizeof(*ip6h)))
1658 return -EINVAL;
1659
1660 ip6h = ipv6_hdr(skb);
1661
1662 /*
1663 * We're interested in MLD messages only.
1664 * - Version is 6
1665 * - MLD has always Router Alert hop-by-hop option
1666 * - But we do not support jumbrograms.
1667 */
1668 if (ip6h->version != 6)
1669 return 0;
1670
1671 /* Prevent flooding this packet if there is no listener present */
1672 if (!ipv6_addr_is_ll_all_nodes(&ip6h->daddr))
1673 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1674
1675 if (ip6h->nexthdr != IPPROTO_HOPOPTS ||
1676 ip6h->payload_len == 0)
1677 return 0;
1678
1679 len = ntohs(ip6h->payload_len) + sizeof(*ip6h);
1680 if (skb->len < len)
1681 return -EINVAL;
1682
1683 nexthdr = ip6h->nexthdr;
1684 offset = ipv6_skip_exthdr(skb, sizeof(*ip6h), &nexthdr, &frag_off);
1685
1686 if (offset < 0 || nexthdr != IPPROTO_ICMPV6)
1687 return 0;
1688
1689 /* Okay, we found ICMPv6 header */
1690 skb2 = skb_clone(skb, GFP_ATOMIC);
1691 if (!skb2)
1692 return -ENOMEM;
1693
1694 err = -EINVAL;
1695 if (!pskb_may_pull(skb2, offset + sizeof(struct icmp6hdr)))
1696 goto out;
1697
1698 len -= offset - skb_network_offset(skb2);
1699
1700 __skb_pull(skb2, offset);
1701 skb_reset_transport_header(skb2);
1702 skb_postpull_rcsum(skb2, skb_network_header(skb2),
1703 skb_network_header_len(skb2));
1704
1705 icmp6_type = icmp6_hdr(skb2)->icmp6_type;
1706
1707 switch (icmp6_type) {
1708 case ICMPV6_MGM_QUERY:
1709 case ICMPV6_MGM_REPORT:
1710 case ICMPV6_MGM_REDUCTION:
1711 case ICMPV6_MLD2_REPORT:
1712 break;
1713 default:
1714 err = 0;
1715 goto out;
1716 }
1717
1718 /* Okay, we found MLD message. Check further. */
1719 if (skb2->len > len) {
1720 err = pskb_trim_rcsum(skb2, len);
1721 if (err)
1722 goto out;
1723 err = -EINVAL;
1724 }
1725
1726 ip6h = ipv6_hdr(skb2);
1727
1728 switch (skb2->ip_summed) {
1729 case CHECKSUM_COMPLETE:
1730 if (!csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, skb2->len,
1731 IPPROTO_ICMPV6, skb2->csum))
1732 break;
1733 /*FALLTHROUGH*/
1734 case CHECKSUM_NONE:
1735 skb2->csum = ~csum_unfold(csum_ipv6_magic(&ip6h->saddr,
1736 &ip6h->daddr,
1737 skb2->len,
1738 IPPROTO_ICMPV6, 0));
1739 if (__skb_checksum_complete(skb2))
1740 goto out;
1741 }
1742
1743 err = 0;
1744
1745 BR_INPUT_SKB_CB(skb)->igmp = 1;
1746
1747 switch (icmp6_type) {
1748 case ICMPV6_MGM_REPORT:
1749 {
1750 struct mld_msg *mld;
1751 if (!pskb_may_pull(skb2, sizeof(*mld))) {
1752 err = -EINVAL;
1753 goto out;
1754 }
1755 mld = (struct mld_msg *)skb_transport_header(skb2);
1756 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1757 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid);
1758 break;
1759 }
1760 case ICMPV6_MLD2_REPORT:
1761 err = br_ip6_multicast_mld2_report(br, port, skb2, vid);
1762 break;
1763 case ICMPV6_MGM_QUERY:
1764 err = br_ip6_multicast_query(br, port, skb2, vid);
1765 break;
1766 case ICMPV6_MGM_REDUCTION:
1767 {
1768 struct mld_msg *mld;
1769 if (!pskb_may_pull(skb2, sizeof(*mld))) {
1770 err = -EINVAL;
1771 goto out;
1772 }
1773 mld = (struct mld_msg *)skb_transport_header(skb2);
1774 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid);
1775 }
1776 }
1777
1778 out:
1779 kfree_skb(skb2);
1780 return err;
1781 }
1782 #endif
1783
1784 int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port,
1785 struct sk_buff *skb, u16 vid)
1786 {
1787 BR_INPUT_SKB_CB(skb)->igmp = 0;
1788 BR_INPUT_SKB_CB(skb)->mrouters_only = 0;
1789
1790 if (br->multicast_disabled)
1791 return 0;
1792
1793 switch (skb->protocol) {
1794 case htons(ETH_P_IP):
1795 return br_multicast_ipv4_rcv(br, port, skb, vid);
1796 #if IS_ENABLED(CONFIG_IPV6)
1797 case htons(ETH_P_IPV6):
1798 return br_multicast_ipv6_rcv(br, port, skb, vid);
1799 #endif
1800 }
1801
1802 return 0;
1803 }
1804
1805 static void br_multicast_query_expired(struct net_bridge *br,
1806 struct bridge_mcast_own_query *query)
1807 {
1808 spin_lock(&br->multicast_lock);
1809 if (query->startup_sent < br->multicast_startup_query_count)
1810 query->startup_sent++;
1811
1812 br_multicast_send_query(br, NULL, query);
1813 spin_unlock(&br->multicast_lock);
1814 }
1815
1816 static void br_ip4_multicast_query_expired(unsigned long data)
1817 {
1818 struct net_bridge *br = (void *)data;
1819
1820 br_multicast_query_expired(br, &br->ip4_own_query);
1821 }
1822
1823 #if IS_ENABLED(CONFIG_IPV6)
1824 static void br_ip6_multicast_query_expired(unsigned long data)
1825 {
1826 struct net_bridge *br = (void *)data;
1827
1828 br_multicast_query_expired(br, &br->ip6_own_query);
1829 }
1830 #endif
1831
1832 void br_multicast_init(struct net_bridge *br)
1833 {
1834 br->hash_elasticity = 4;
1835 br->hash_max = 512;
1836
1837 br->multicast_router = 1;
1838 br->multicast_querier = 0;
1839 br->multicast_query_use_ifaddr = 0;
1840 br->multicast_last_member_count = 2;
1841 br->multicast_startup_query_count = 2;
1842
1843 br->multicast_last_member_interval = HZ;
1844 br->multicast_query_response_interval = 10 * HZ;
1845 br->multicast_startup_query_interval = 125 * HZ / 4;
1846 br->multicast_query_interval = 125 * HZ;
1847 br->multicast_querier_interval = 255 * HZ;
1848 br->multicast_membership_interval = 260 * HZ;
1849
1850 br->ip4_other_query.delay_time = 0;
1851 #if IS_ENABLED(CONFIG_IPV6)
1852 br->ip6_other_query.delay_time = 0;
1853 #endif
1854
1855 spin_lock_init(&br->multicast_lock);
1856 setup_timer(&br->multicast_router_timer,
1857 br_multicast_local_router_expired, 0);
1858 setup_timer(&br->ip4_other_query.timer,
1859 br_ip4_multicast_querier_expired, (unsigned long)br);
1860 setup_timer(&br->ip4_own_query.timer, br_ip4_multicast_query_expired,
1861 (unsigned long)br);
1862 #if IS_ENABLED(CONFIG_IPV6)
1863 setup_timer(&br->ip6_other_query.timer,
1864 br_ip6_multicast_querier_expired, (unsigned long)br);
1865 setup_timer(&br->ip6_own_query.timer, br_ip6_multicast_query_expired,
1866 (unsigned long)br);
1867 #endif
1868 }
1869
1870 static void __br_multicast_open(struct net_bridge *br,
1871 struct bridge_mcast_own_query *query)
1872 {
1873 query->startup_sent = 0;
1874
1875 if (br->multicast_disabled)
1876 return;
1877
1878 mod_timer(&query->timer, jiffies);
1879 }
1880
1881 void br_multicast_open(struct net_bridge *br)
1882 {
1883 __br_multicast_open(br, &br->ip4_own_query);
1884 #if IS_ENABLED(CONFIG_IPV6)
1885 __br_multicast_open(br, &br->ip6_own_query);
1886 #endif
1887 }
1888
1889 void br_multicast_stop(struct net_bridge *br)
1890 {
1891 struct net_bridge_mdb_htable *mdb;
1892 struct net_bridge_mdb_entry *mp;
1893 struct hlist_node *n;
1894 u32 ver;
1895 int i;
1896
1897 del_timer_sync(&br->multicast_router_timer);
1898 del_timer_sync(&br->ip4_other_query.timer);
1899 del_timer_sync(&br->ip4_own_query.timer);
1900 #if IS_ENABLED(CONFIG_IPV6)
1901 del_timer_sync(&br->ip6_other_query.timer);
1902 del_timer_sync(&br->ip6_own_query.timer);
1903 #endif
1904
1905 spin_lock_bh(&br->multicast_lock);
1906 mdb = mlock_dereference(br->mdb, br);
1907 if (!mdb)
1908 goto out;
1909
1910 br->mdb = NULL;
1911
1912 ver = mdb->ver;
1913 for (i = 0; i < mdb->max; i++) {
1914 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i],
1915 hlist[ver]) {
1916 del_timer(&mp->timer);
1917 call_rcu_bh(&mp->rcu, br_multicast_free_group);
1918 }
1919 }
1920
1921 if (mdb->old) {
1922 spin_unlock_bh(&br->multicast_lock);
1923 rcu_barrier_bh();
1924 spin_lock_bh(&br->multicast_lock);
1925 WARN_ON(mdb->old);
1926 }
1927
1928 mdb->old = mdb;
1929 call_rcu_bh(&mdb->rcu, br_mdb_free);
1930
1931 out:
1932 spin_unlock_bh(&br->multicast_lock);
1933 }
1934
1935 int br_multicast_set_router(struct net_bridge *br, unsigned long val)
1936 {
1937 int err = -ENOENT;
1938
1939 spin_lock_bh(&br->multicast_lock);
1940 if (!netif_running(br->dev))
1941 goto unlock;
1942
1943 switch (val) {
1944 case 0:
1945 case 2:
1946 del_timer(&br->multicast_router_timer);
1947 /* fall through */
1948 case 1:
1949 br->multicast_router = val;
1950 err = 0;
1951 break;
1952
1953 default:
1954 err = -EINVAL;
1955 break;
1956 }
1957
1958 unlock:
1959 spin_unlock_bh(&br->multicast_lock);
1960
1961 return err;
1962 }
1963
1964 int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val)
1965 {
1966 struct net_bridge *br = p->br;
1967 int err = -ENOENT;
1968
1969 spin_lock(&br->multicast_lock);
1970 if (!netif_running(br->dev) || p->state == BR_STATE_DISABLED)
1971 goto unlock;
1972
1973 switch (val) {
1974 case 0:
1975 case 1:
1976 case 2:
1977 p->multicast_router = val;
1978 err = 0;
1979
1980 if (val < 2 && !hlist_unhashed(&p->rlist))
1981 hlist_del_init_rcu(&p->rlist);
1982
1983 if (val == 1)
1984 break;
1985
1986 del_timer(&p->multicast_router_timer);
1987
1988 if (val == 0)
1989 break;
1990
1991 br_multicast_add_router(br, p);
1992 break;
1993
1994 default:
1995 err = -EINVAL;
1996 break;
1997 }
1998
1999 unlock:
2000 spin_unlock(&br->multicast_lock);
2001
2002 return err;
2003 }
2004
2005 static void br_multicast_start_querier(struct net_bridge *br,
2006 struct bridge_mcast_own_query *query)
2007 {
2008 struct net_bridge_port *port;
2009
2010 __br_multicast_open(br, query);
2011
2012 list_for_each_entry(port, &br->port_list, list) {
2013 if (port->state == BR_STATE_DISABLED ||
2014 port->state == BR_STATE_BLOCKING)
2015 continue;
2016
2017 if (query == &br->ip4_own_query)
2018 br_multicast_enable(&port->ip4_own_query);
2019 #if IS_ENABLED(CONFIG_IPV6)
2020 else
2021 br_multicast_enable(&port->ip6_own_query);
2022 #endif
2023 }
2024 }
2025
2026 int br_multicast_toggle(struct net_bridge *br, unsigned long val)
2027 {
2028 int err = 0;
2029 struct net_bridge_mdb_htable *mdb;
2030
2031 spin_lock_bh(&br->multicast_lock);
2032 if (br->multicast_disabled == !val)
2033 goto unlock;
2034
2035 br->multicast_disabled = !val;
2036 if (br->multicast_disabled)
2037 goto unlock;
2038
2039 if (!netif_running(br->dev))
2040 goto unlock;
2041
2042 mdb = mlock_dereference(br->mdb, br);
2043 if (mdb) {
2044 if (mdb->old) {
2045 err = -EEXIST;
2046 rollback:
2047 br->multicast_disabled = !!val;
2048 goto unlock;
2049 }
2050
2051 err = br_mdb_rehash(&br->mdb, mdb->max,
2052 br->hash_elasticity);
2053 if (err)
2054 goto rollback;
2055 }
2056
2057 br_multicast_start_querier(br, &br->ip4_own_query);
2058 #if IS_ENABLED(CONFIG_IPV6)
2059 br_multicast_start_querier(br, &br->ip6_own_query);
2060 #endif
2061
2062 unlock:
2063 spin_unlock_bh(&br->multicast_lock);
2064
2065 return err;
2066 }
2067
2068 int br_multicast_set_querier(struct net_bridge *br, unsigned long val)
2069 {
2070 unsigned long max_delay;
2071
2072 val = !!val;
2073
2074 spin_lock_bh(&br->multicast_lock);
2075 if (br->multicast_querier == val)
2076 goto unlock;
2077
2078 br->multicast_querier = val;
2079 if (!val)
2080 goto unlock;
2081
2082 max_delay = br->multicast_query_response_interval;
2083
2084 if (!timer_pending(&br->ip4_other_query.timer))
2085 br->ip4_other_query.delay_time = jiffies + max_delay;
2086
2087 br_multicast_start_querier(br, &br->ip4_own_query);
2088
2089 #if IS_ENABLED(CONFIG_IPV6)
2090 if (!timer_pending(&br->ip6_other_query.timer))
2091 br->ip6_other_query.delay_time = jiffies + max_delay;
2092
2093 br_multicast_start_querier(br, &br->ip6_own_query);
2094 #endif
2095
2096 unlock:
2097 spin_unlock_bh(&br->multicast_lock);
2098
2099 return 0;
2100 }
2101
2102 int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
2103 {
2104 int err = -ENOENT;
2105 u32 old;
2106 struct net_bridge_mdb_htable *mdb;
2107
2108 spin_lock_bh(&br->multicast_lock);
2109 if (!netif_running(br->dev))
2110 goto unlock;
2111
2112 err = -EINVAL;
2113 if (!is_power_of_2(val))
2114 goto unlock;
2115
2116 mdb = mlock_dereference(br->mdb, br);
2117 if (mdb && val < mdb->size)
2118 goto unlock;
2119
2120 err = 0;
2121
2122 old = br->hash_max;
2123 br->hash_max = val;
2124
2125 if (mdb) {
2126 if (mdb->old) {
2127 err = -EEXIST;
2128 rollback:
2129 br->hash_max = old;
2130 goto unlock;
2131 }
2132
2133 err = br_mdb_rehash(&br->mdb, br->hash_max,
2134 br->hash_elasticity);
2135 if (err)
2136 goto rollback;
2137 }
2138
2139 unlock:
2140 spin_unlock_bh(&br->multicast_lock);
2141
2142 return err;
2143 }