]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - net/bridge/br_multicast.c
Merge tag 'linux-kselftest-3.19-rc1' of git://git.kernel.org/pub/scm/linux/kernel...
[mirror_ubuntu-artful-kernel.git] / net / bridge / br_multicast.c
1 /*
2 * Bridge multicast support.
3 *
4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13 #include <linux/err.h>
14 #include <linux/export.h>
15 #include <linux/if_ether.h>
16 #include <linux/igmp.h>
17 #include <linux/jhash.h>
18 #include <linux/kernel.h>
19 #include <linux/log2.h>
20 #include <linux/netdevice.h>
21 #include <linux/netfilter_bridge.h>
22 #include <linux/random.h>
23 #include <linux/rculist.h>
24 #include <linux/skbuff.h>
25 #include <linux/slab.h>
26 #include <linux/timer.h>
27 #include <linux/inetdevice.h>
28 #include <net/ip.h>
29 #if IS_ENABLED(CONFIG_IPV6)
30 #include <net/ipv6.h>
31 #include <net/mld.h>
32 #include <net/ip6_checksum.h>
33 #include <net/addrconf.h>
34 #endif
35
36 #include "br_private.h"
37
38 static void br_multicast_start_querier(struct net_bridge *br,
39 struct bridge_mcast_own_query *query);
40 unsigned int br_mdb_rehash_seq;
41
42 static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
43 {
44 if (a->proto != b->proto)
45 return 0;
46 if (a->vid != b->vid)
47 return 0;
48 switch (a->proto) {
49 case htons(ETH_P_IP):
50 return a->u.ip4 == b->u.ip4;
51 #if IS_ENABLED(CONFIG_IPV6)
52 case htons(ETH_P_IPV6):
53 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);
54 #endif
55 }
56 return 0;
57 }
58
59 static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip,
60 __u16 vid)
61 {
62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1);
63 }
64
65 #if IS_ENABLED(CONFIG_IPV6)
66 static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
67 const struct in6_addr *ip,
68 __u16 vid)
69 {
70 return jhash_2words(ipv6_addr_hash(ip), vid,
71 mdb->secret) & (mdb->max - 1);
72 }
73 #endif
74
75 static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
76 struct br_ip *ip)
77 {
78 switch (ip->proto) {
79 case htons(ETH_P_IP):
80 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid);
81 #if IS_ENABLED(CONFIG_IPV6)
82 case htons(ETH_P_IPV6):
83 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid);
84 #endif
85 }
86 return 0;
87 }
88
89 static struct net_bridge_mdb_entry *__br_mdb_ip_get(
90 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash)
91 {
92 struct net_bridge_mdb_entry *mp;
93
94 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
95 if (br_ip_equal(&mp->addr, dst))
96 return mp;
97 }
98
99 return NULL;
100 }
101
102 struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb,
103 struct br_ip *dst)
104 {
105 if (!mdb)
106 return NULL;
107
108 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
109 }
110
111 static struct net_bridge_mdb_entry *br_mdb_ip4_get(
112 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid)
113 {
114 struct br_ip br_dst;
115
116 br_dst.u.ip4 = dst;
117 br_dst.proto = htons(ETH_P_IP);
118 br_dst.vid = vid;
119
120 return br_mdb_ip_get(mdb, &br_dst);
121 }
122
123 #if IS_ENABLED(CONFIG_IPV6)
124 static struct net_bridge_mdb_entry *br_mdb_ip6_get(
125 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
126 __u16 vid)
127 {
128 struct br_ip br_dst;
129
130 br_dst.u.ip6 = *dst;
131 br_dst.proto = htons(ETH_P_IPV6);
132 br_dst.vid = vid;
133
134 return br_mdb_ip_get(mdb, &br_dst);
135 }
136 #endif
137
138 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
139 struct sk_buff *skb, u16 vid)
140 {
141 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
142 struct br_ip ip;
143
144 if (br->multicast_disabled)
145 return NULL;
146
147 if (BR_INPUT_SKB_CB(skb)->igmp)
148 return NULL;
149
150 ip.proto = skb->protocol;
151 ip.vid = vid;
152
153 switch (skb->protocol) {
154 case htons(ETH_P_IP):
155 ip.u.ip4 = ip_hdr(skb)->daddr;
156 break;
157 #if IS_ENABLED(CONFIG_IPV6)
158 case htons(ETH_P_IPV6):
159 ip.u.ip6 = ipv6_hdr(skb)->daddr;
160 break;
161 #endif
162 default:
163 return NULL;
164 }
165
166 return br_mdb_ip_get(mdb, &ip);
167 }
168
169 static void br_mdb_free(struct rcu_head *head)
170 {
171 struct net_bridge_mdb_htable *mdb =
172 container_of(head, struct net_bridge_mdb_htable, rcu);
173 struct net_bridge_mdb_htable *old = mdb->old;
174
175 mdb->old = NULL;
176 kfree(old->mhash);
177 kfree(old);
178 }
179
180 static int br_mdb_copy(struct net_bridge_mdb_htable *new,
181 struct net_bridge_mdb_htable *old,
182 int elasticity)
183 {
184 struct net_bridge_mdb_entry *mp;
185 int maxlen;
186 int len;
187 int i;
188
189 for (i = 0; i < old->max; i++)
190 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver])
191 hlist_add_head(&mp->hlist[new->ver],
192 &new->mhash[br_ip_hash(new, &mp->addr)]);
193
194 if (!elasticity)
195 return 0;
196
197 maxlen = 0;
198 for (i = 0; i < new->max; i++) {
199 len = 0;
200 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver])
201 len++;
202 if (len > maxlen)
203 maxlen = len;
204 }
205
206 return maxlen > elasticity ? -EINVAL : 0;
207 }
208
209 void br_multicast_free_pg(struct rcu_head *head)
210 {
211 struct net_bridge_port_group *p =
212 container_of(head, struct net_bridge_port_group, rcu);
213
214 kfree(p);
215 }
216
217 static void br_multicast_free_group(struct rcu_head *head)
218 {
219 struct net_bridge_mdb_entry *mp =
220 container_of(head, struct net_bridge_mdb_entry, rcu);
221
222 kfree(mp);
223 }
224
225 static void br_multicast_group_expired(unsigned long data)
226 {
227 struct net_bridge_mdb_entry *mp = (void *)data;
228 struct net_bridge *br = mp->br;
229 struct net_bridge_mdb_htable *mdb;
230
231 spin_lock(&br->multicast_lock);
232 if (!netif_running(br->dev) || timer_pending(&mp->timer))
233 goto out;
234
235 mp->mglist = false;
236
237 if (mp->ports)
238 goto out;
239
240 mdb = mlock_dereference(br->mdb, br);
241
242 hlist_del_rcu(&mp->hlist[mdb->ver]);
243 mdb->size--;
244
245 call_rcu_bh(&mp->rcu, br_multicast_free_group);
246
247 out:
248 spin_unlock(&br->multicast_lock);
249 }
250
251 static void br_multicast_del_pg(struct net_bridge *br,
252 struct net_bridge_port_group *pg)
253 {
254 struct net_bridge_mdb_htable *mdb;
255 struct net_bridge_mdb_entry *mp;
256 struct net_bridge_port_group *p;
257 struct net_bridge_port_group __rcu **pp;
258
259 mdb = mlock_dereference(br->mdb, br);
260
261 mp = br_mdb_ip_get(mdb, &pg->addr);
262 if (WARN_ON(!mp))
263 return;
264
265 for (pp = &mp->ports;
266 (p = mlock_dereference(*pp, br)) != NULL;
267 pp = &p->next) {
268 if (p != pg)
269 continue;
270
271 rcu_assign_pointer(*pp, p->next);
272 hlist_del_init(&p->mglist);
273 del_timer(&p->timer);
274 call_rcu_bh(&p->rcu, br_multicast_free_pg);
275
276 if (!mp->ports && !mp->mglist &&
277 netif_running(br->dev))
278 mod_timer(&mp->timer, jiffies);
279
280 return;
281 }
282
283 WARN_ON(1);
284 }
285
286 static void br_multicast_port_group_expired(unsigned long data)
287 {
288 struct net_bridge_port_group *pg = (void *)data;
289 struct net_bridge *br = pg->port->br;
290
291 spin_lock(&br->multicast_lock);
292 if (!netif_running(br->dev) || timer_pending(&pg->timer) ||
293 hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT)
294 goto out;
295
296 br_multicast_del_pg(br, pg);
297
298 out:
299 spin_unlock(&br->multicast_lock);
300 }
301
302 static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
303 int elasticity)
304 {
305 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
306 struct net_bridge_mdb_htable *mdb;
307 int err;
308
309 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
310 if (!mdb)
311 return -ENOMEM;
312
313 mdb->max = max;
314 mdb->old = old;
315
316 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC);
317 if (!mdb->mhash) {
318 kfree(mdb);
319 return -ENOMEM;
320 }
321
322 mdb->size = old ? old->size : 0;
323 mdb->ver = old ? old->ver ^ 1 : 0;
324
325 if (!old || elasticity)
326 get_random_bytes(&mdb->secret, sizeof(mdb->secret));
327 else
328 mdb->secret = old->secret;
329
330 if (!old)
331 goto out;
332
333 err = br_mdb_copy(mdb, old, elasticity);
334 if (err) {
335 kfree(mdb->mhash);
336 kfree(mdb);
337 return err;
338 }
339
340 br_mdb_rehash_seq++;
341 call_rcu_bh(&mdb->rcu, br_mdb_free);
342
343 out:
344 rcu_assign_pointer(*mdbp, mdb);
345
346 return 0;
347 }
348
349 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
350 __be32 group)
351 {
352 struct sk_buff *skb;
353 struct igmphdr *ih;
354 struct ethhdr *eth;
355 struct iphdr *iph;
356
357 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
358 sizeof(*ih) + 4);
359 if (!skb)
360 goto out;
361
362 skb->protocol = htons(ETH_P_IP);
363
364 skb_reset_mac_header(skb);
365 eth = eth_hdr(skb);
366
367 ether_addr_copy(eth->h_source, br->dev->dev_addr);
368 eth->h_dest[0] = 1;
369 eth->h_dest[1] = 0;
370 eth->h_dest[2] = 0x5e;
371 eth->h_dest[3] = 0;
372 eth->h_dest[4] = 0;
373 eth->h_dest[5] = 1;
374 eth->h_proto = htons(ETH_P_IP);
375 skb_put(skb, sizeof(*eth));
376
377 skb_set_network_header(skb, skb->len);
378 iph = ip_hdr(skb);
379
380 iph->version = 4;
381 iph->ihl = 6;
382 iph->tos = 0xc0;
383 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4);
384 iph->id = 0;
385 iph->frag_off = htons(IP_DF);
386 iph->ttl = 1;
387 iph->protocol = IPPROTO_IGMP;
388 iph->saddr = br->multicast_query_use_ifaddr ?
389 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0;
390 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP);
391 ((u8 *)&iph[1])[0] = IPOPT_RA;
392 ((u8 *)&iph[1])[1] = 4;
393 ((u8 *)&iph[1])[2] = 0;
394 ((u8 *)&iph[1])[3] = 0;
395 ip_send_check(iph);
396 skb_put(skb, 24);
397
398 skb_set_transport_header(skb, skb->len);
399 ih = igmp_hdr(skb);
400 ih->type = IGMP_HOST_MEMBERSHIP_QUERY;
401 ih->code = (group ? br->multicast_last_member_interval :
402 br->multicast_query_response_interval) /
403 (HZ / IGMP_TIMER_SCALE);
404 ih->group = group;
405 ih->csum = 0;
406 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
407 skb_put(skb, sizeof(*ih));
408
409 __skb_pull(skb, sizeof(*eth));
410
411 out:
412 return skb;
413 }
414
415 #if IS_ENABLED(CONFIG_IPV6)
416 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
417 const struct in6_addr *group)
418 {
419 struct sk_buff *skb;
420 struct ipv6hdr *ip6h;
421 struct mld_msg *mldq;
422 struct ethhdr *eth;
423 u8 *hopopt;
424 unsigned long interval;
425
426 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
427 8 + sizeof(*mldq));
428 if (!skb)
429 goto out;
430
431 skb->protocol = htons(ETH_P_IPV6);
432
433 /* Ethernet header */
434 skb_reset_mac_header(skb);
435 eth = eth_hdr(skb);
436
437 ether_addr_copy(eth->h_source, br->dev->dev_addr);
438 eth->h_proto = htons(ETH_P_IPV6);
439 skb_put(skb, sizeof(*eth));
440
441 /* IPv6 header + HbH option */
442 skb_set_network_header(skb, skb->len);
443 ip6h = ipv6_hdr(skb);
444
445 *(__force __be32 *)ip6h = htonl(0x60000000);
446 ip6h->payload_len = htons(8 + sizeof(*mldq));
447 ip6h->nexthdr = IPPROTO_HOPOPTS;
448 ip6h->hop_limit = 1;
449 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1));
450 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0,
451 &ip6h->saddr)) {
452 kfree_skb(skb);
453 return NULL;
454 }
455 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest);
456
457 hopopt = (u8 *)(ip6h + 1);
458 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */
459 hopopt[1] = 0; /* length of HbH */
460 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */
461 hopopt[3] = 2; /* Length of RA Option */
462 hopopt[4] = 0; /* Type = 0x0000 (MLD) */
463 hopopt[5] = 0;
464 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */
465 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */
466
467 skb_put(skb, sizeof(*ip6h) + 8);
468
469 /* ICMPv6 */
470 skb_set_transport_header(skb, skb->len);
471 mldq = (struct mld_msg *) icmp6_hdr(skb);
472
473 interval = ipv6_addr_any(group) ?
474 br->multicast_query_response_interval :
475 br->multicast_last_member_interval;
476
477 mldq->mld_type = ICMPV6_MGM_QUERY;
478 mldq->mld_code = 0;
479 mldq->mld_cksum = 0;
480 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval));
481 mldq->mld_reserved = 0;
482 mldq->mld_mca = *group;
483
484 /* checksum */
485 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
486 sizeof(*mldq), IPPROTO_ICMPV6,
487 csum_partial(mldq,
488 sizeof(*mldq), 0));
489 skb_put(skb, sizeof(*mldq));
490
491 __skb_pull(skb, sizeof(*eth));
492
493 out:
494 return skb;
495 }
496 #endif
497
498 static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
499 struct br_ip *addr)
500 {
501 switch (addr->proto) {
502 case htons(ETH_P_IP):
503 return br_ip4_multicast_alloc_query(br, addr->u.ip4);
504 #if IS_ENABLED(CONFIG_IPV6)
505 case htons(ETH_P_IPV6):
506 return br_ip6_multicast_alloc_query(br, &addr->u.ip6);
507 #endif
508 }
509 return NULL;
510 }
511
512 static struct net_bridge_mdb_entry *br_multicast_get_group(
513 struct net_bridge *br, struct net_bridge_port *port,
514 struct br_ip *group, int hash)
515 {
516 struct net_bridge_mdb_htable *mdb;
517 struct net_bridge_mdb_entry *mp;
518 unsigned int count = 0;
519 unsigned int max;
520 int elasticity;
521 int err;
522
523 mdb = rcu_dereference_protected(br->mdb, 1);
524 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
525 count++;
526 if (unlikely(br_ip_equal(group, &mp->addr)))
527 return mp;
528 }
529
530 elasticity = 0;
531 max = mdb->max;
532
533 if (unlikely(count > br->hash_elasticity && count)) {
534 if (net_ratelimit())
535 br_info(br, "Multicast hash table "
536 "chain limit reached: %s\n",
537 port ? port->dev->name : br->dev->name);
538
539 elasticity = br->hash_elasticity;
540 }
541
542 if (mdb->size >= max) {
543 max *= 2;
544 if (unlikely(max > br->hash_max)) {
545 br_warn(br, "Multicast hash table maximum of %d "
546 "reached, disabling snooping: %s\n",
547 br->hash_max,
548 port ? port->dev->name : br->dev->name);
549 err = -E2BIG;
550 disable:
551 br->multicast_disabled = 1;
552 goto err;
553 }
554 }
555
556 if (max > mdb->max || elasticity) {
557 if (mdb->old) {
558 if (net_ratelimit())
559 br_info(br, "Multicast hash table "
560 "on fire: %s\n",
561 port ? port->dev->name : br->dev->name);
562 err = -EEXIST;
563 goto err;
564 }
565
566 err = br_mdb_rehash(&br->mdb, max, elasticity);
567 if (err) {
568 br_warn(br, "Cannot rehash multicast "
569 "hash table, disabling snooping: %s, %d, %d\n",
570 port ? port->dev->name : br->dev->name,
571 mdb->size, err);
572 goto disable;
573 }
574
575 err = -EAGAIN;
576 goto err;
577 }
578
579 return NULL;
580
581 err:
582 mp = ERR_PTR(err);
583 return mp;
584 }
585
586 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br,
587 struct net_bridge_port *port, struct br_ip *group)
588 {
589 struct net_bridge_mdb_htable *mdb;
590 struct net_bridge_mdb_entry *mp;
591 int hash;
592 int err;
593
594 mdb = rcu_dereference_protected(br->mdb, 1);
595 if (!mdb) {
596 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0);
597 if (err)
598 return ERR_PTR(err);
599 goto rehash;
600 }
601
602 hash = br_ip_hash(mdb, group);
603 mp = br_multicast_get_group(br, port, group, hash);
604 switch (PTR_ERR(mp)) {
605 case 0:
606 break;
607
608 case -EAGAIN:
609 rehash:
610 mdb = rcu_dereference_protected(br->mdb, 1);
611 hash = br_ip_hash(mdb, group);
612 break;
613
614 default:
615 goto out;
616 }
617
618 mp = kzalloc(sizeof(*mp), GFP_ATOMIC);
619 if (unlikely(!mp))
620 return ERR_PTR(-ENOMEM);
621
622 mp->br = br;
623 mp->addr = *group;
624 setup_timer(&mp->timer, br_multicast_group_expired,
625 (unsigned long)mp);
626
627 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]);
628 mdb->size++;
629
630 out:
631 return mp;
632 }
633
634 struct net_bridge_port_group *br_multicast_new_port_group(
635 struct net_bridge_port *port,
636 struct br_ip *group,
637 struct net_bridge_port_group __rcu *next,
638 unsigned char state)
639 {
640 struct net_bridge_port_group *p;
641
642 p = kzalloc(sizeof(*p), GFP_ATOMIC);
643 if (unlikely(!p))
644 return NULL;
645
646 p->addr = *group;
647 p->port = port;
648 p->state = state;
649 rcu_assign_pointer(p->next, next);
650 hlist_add_head(&p->mglist, &port->mglist);
651 setup_timer(&p->timer, br_multicast_port_group_expired,
652 (unsigned long)p);
653 return p;
654 }
655
656 static int br_multicast_add_group(struct net_bridge *br,
657 struct net_bridge_port *port,
658 struct br_ip *group)
659 {
660 struct net_bridge_mdb_entry *mp;
661 struct net_bridge_port_group *p;
662 struct net_bridge_port_group __rcu **pp;
663 unsigned long now = jiffies;
664 int err;
665
666 spin_lock(&br->multicast_lock);
667 if (!netif_running(br->dev) ||
668 (port && port->state == BR_STATE_DISABLED))
669 goto out;
670
671 mp = br_multicast_new_group(br, port, group);
672 err = PTR_ERR(mp);
673 if (IS_ERR(mp))
674 goto err;
675
676 if (!port) {
677 mp->mglist = true;
678 mod_timer(&mp->timer, now + br->multicast_membership_interval);
679 goto out;
680 }
681
682 for (pp = &mp->ports;
683 (p = mlock_dereference(*pp, br)) != NULL;
684 pp = &p->next) {
685 if (p->port == port)
686 goto found;
687 if ((unsigned long)p->port < (unsigned long)port)
688 break;
689 }
690
691 p = br_multicast_new_port_group(port, group, *pp, MDB_TEMPORARY);
692 if (unlikely(!p))
693 goto err;
694 rcu_assign_pointer(*pp, p);
695 br_mdb_notify(br->dev, port, group, RTM_NEWMDB);
696
697 found:
698 mod_timer(&p->timer, now + br->multicast_membership_interval);
699 out:
700 err = 0;
701
702 err:
703 spin_unlock(&br->multicast_lock);
704 return err;
705 }
706
707 static int br_ip4_multicast_add_group(struct net_bridge *br,
708 struct net_bridge_port *port,
709 __be32 group,
710 __u16 vid)
711 {
712 struct br_ip br_group;
713
714 if (ipv4_is_local_multicast(group))
715 return 0;
716
717 br_group.u.ip4 = group;
718 br_group.proto = htons(ETH_P_IP);
719 br_group.vid = vid;
720
721 return br_multicast_add_group(br, port, &br_group);
722 }
723
724 #if IS_ENABLED(CONFIG_IPV6)
725 static int br_ip6_multicast_add_group(struct net_bridge *br,
726 struct net_bridge_port *port,
727 const struct in6_addr *group,
728 __u16 vid)
729 {
730 struct br_ip br_group;
731
732 if (ipv6_addr_is_ll_all_nodes(group))
733 return 0;
734
735 br_group.u.ip6 = *group;
736 br_group.proto = htons(ETH_P_IPV6);
737 br_group.vid = vid;
738
739 return br_multicast_add_group(br, port, &br_group);
740 }
741 #endif
742
743 static void br_multicast_router_expired(unsigned long data)
744 {
745 struct net_bridge_port *port = (void *)data;
746 struct net_bridge *br = port->br;
747
748 spin_lock(&br->multicast_lock);
749 if (port->multicast_router != 1 ||
750 timer_pending(&port->multicast_router_timer) ||
751 hlist_unhashed(&port->rlist))
752 goto out;
753
754 hlist_del_init_rcu(&port->rlist);
755
756 out:
757 spin_unlock(&br->multicast_lock);
758 }
759
760 static void br_multicast_local_router_expired(unsigned long data)
761 {
762 }
763
764 static void br_multicast_querier_expired(struct net_bridge *br,
765 struct bridge_mcast_own_query *query)
766 {
767 spin_lock(&br->multicast_lock);
768 if (!netif_running(br->dev) || br->multicast_disabled)
769 goto out;
770
771 br_multicast_start_querier(br, query);
772
773 out:
774 spin_unlock(&br->multicast_lock);
775 }
776
777 static void br_ip4_multicast_querier_expired(unsigned long data)
778 {
779 struct net_bridge *br = (void *)data;
780
781 br_multicast_querier_expired(br, &br->ip4_own_query);
782 }
783
784 #if IS_ENABLED(CONFIG_IPV6)
785 static void br_ip6_multicast_querier_expired(unsigned long data)
786 {
787 struct net_bridge *br = (void *)data;
788
789 br_multicast_querier_expired(br, &br->ip6_own_query);
790 }
791 #endif
792
793 static void br_multicast_select_own_querier(struct net_bridge *br,
794 struct br_ip *ip,
795 struct sk_buff *skb)
796 {
797 if (ip->proto == htons(ETH_P_IP))
798 br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr;
799 #if IS_ENABLED(CONFIG_IPV6)
800 else
801 br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr;
802 #endif
803 }
804
805 static void __br_multicast_send_query(struct net_bridge *br,
806 struct net_bridge_port *port,
807 struct br_ip *ip)
808 {
809 struct sk_buff *skb;
810
811 skb = br_multicast_alloc_query(br, ip);
812 if (!skb)
813 return;
814
815 if (port) {
816 skb->dev = port->dev;
817 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, skb, NULL, skb->dev,
818 br_dev_queue_push_xmit);
819 } else {
820 br_multicast_select_own_querier(br, ip, skb);
821 netif_rx(skb);
822 }
823 }
824
825 static void br_multicast_send_query(struct net_bridge *br,
826 struct net_bridge_port *port,
827 struct bridge_mcast_own_query *own_query)
828 {
829 unsigned long time;
830 struct br_ip br_group;
831 struct bridge_mcast_other_query *other_query = NULL;
832
833 if (!netif_running(br->dev) || br->multicast_disabled ||
834 !br->multicast_querier)
835 return;
836
837 memset(&br_group.u, 0, sizeof(br_group.u));
838
839 if (port ? (own_query == &port->ip4_own_query) :
840 (own_query == &br->ip4_own_query)) {
841 other_query = &br->ip4_other_query;
842 br_group.proto = htons(ETH_P_IP);
843 #if IS_ENABLED(CONFIG_IPV6)
844 } else {
845 other_query = &br->ip6_other_query;
846 br_group.proto = htons(ETH_P_IPV6);
847 #endif
848 }
849
850 if (!other_query || timer_pending(&other_query->timer))
851 return;
852
853 __br_multicast_send_query(br, port, &br_group);
854
855 time = jiffies;
856 time += own_query->startup_sent < br->multicast_startup_query_count ?
857 br->multicast_startup_query_interval :
858 br->multicast_query_interval;
859 mod_timer(&own_query->timer, time);
860 }
861
862 static void
863 br_multicast_port_query_expired(struct net_bridge_port *port,
864 struct bridge_mcast_own_query *query)
865 {
866 struct net_bridge *br = port->br;
867
868 spin_lock(&br->multicast_lock);
869 if (port->state == BR_STATE_DISABLED ||
870 port->state == BR_STATE_BLOCKING)
871 goto out;
872
873 if (query->startup_sent < br->multicast_startup_query_count)
874 query->startup_sent++;
875
876 br_multicast_send_query(port->br, port, query);
877
878 out:
879 spin_unlock(&br->multicast_lock);
880 }
881
882 static void br_ip4_multicast_port_query_expired(unsigned long data)
883 {
884 struct net_bridge_port *port = (void *)data;
885
886 br_multicast_port_query_expired(port, &port->ip4_own_query);
887 }
888
889 #if IS_ENABLED(CONFIG_IPV6)
890 static void br_ip6_multicast_port_query_expired(unsigned long data)
891 {
892 struct net_bridge_port *port = (void *)data;
893
894 br_multicast_port_query_expired(port, &port->ip6_own_query);
895 }
896 #endif
897
898 void br_multicast_add_port(struct net_bridge_port *port)
899 {
900 port->multicast_router = 1;
901
902 setup_timer(&port->multicast_router_timer, br_multicast_router_expired,
903 (unsigned long)port);
904 setup_timer(&port->ip4_own_query.timer,
905 br_ip4_multicast_port_query_expired, (unsigned long)port);
906 #if IS_ENABLED(CONFIG_IPV6)
907 setup_timer(&port->ip6_own_query.timer,
908 br_ip6_multicast_port_query_expired, (unsigned long)port);
909 #endif
910 }
911
912 void br_multicast_del_port(struct net_bridge_port *port)
913 {
914 del_timer_sync(&port->multicast_router_timer);
915 }
916
917 static void br_multicast_enable(struct bridge_mcast_own_query *query)
918 {
919 query->startup_sent = 0;
920
921 if (try_to_del_timer_sync(&query->timer) >= 0 ||
922 del_timer(&query->timer))
923 mod_timer(&query->timer, jiffies);
924 }
925
926 void br_multicast_enable_port(struct net_bridge_port *port)
927 {
928 struct net_bridge *br = port->br;
929
930 spin_lock(&br->multicast_lock);
931 if (br->multicast_disabled || !netif_running(br->dev))
932 goto out;
933
934 br_multicast_enable(&port->ip4_own_query);
935 #if IS_ENABLED(CONFIG_IPV6)
936 br_multicast_enable(&port->ip6_own_query);
937 #endif
938
939 out:
940 spin_unlock(&br->multicast_lock);
941 }
942
943 void br_multicast_disable_port(struct net_bridge_port *port)
944 {
945 struct net_bridge *br = port->br;
946 struct net_bridge_port_group *pg;
947 struct hlist_node *n;
948
949 spin_lock(&br->multicast_lock);
950 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
951 br_multicast_del_pg(br, pg);
952
953 if (!hlist_unhashed(&port->rlist))
954 hlist_del_init_rcu(&port->rlist);
955 del_timer(&port->multicast_router_timer);
956 del_timer(&port->ip4_own_query.timer);
957 #if IS_ENABLED(CONFIG_IPV6)
958 del_timer(&port->ip6_own_query.timer);
959 #endif
960 spin_unlock(&br->multicast_lock);
961 }
962
963 static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
964 struct net_bridge_port *port,
965 struct sk_buff *skb,
966 u16 vid)
967 {
968 struct igmpv3_report *ih;
969 struct igmpv3_grec *grec;
970 int i;
971 int len;
972 int num;
973 int type;
974 int err = 0;
975 __be32 group;
976
977 if (!pskb_may_pull(skb, sizeof(*ih)))
978 return -EINVAL;
979
980 ih = igmpv3_report_hdr(skb);
981 num = ntohs(ih->ngrec);
982 len = sizeof(*ih);
983
984 for (i = 0; i < num; i++) {
985 len += sizeof(*grec);
986 if (!pskb_may_pull(skb, len))
987 return -EINVAL;
988
989 grec = (void *)(skb->data + len - sizeof(*grec));
990 group = grec->grec_mca;
991 type = grec->grec_type;
992
993 len += ntohs(grec->grec_nsrcs) * 4;
994 if (!pskb_may_pull(skb, len))
995 return -EINVAL;
996
997 /* We treat this as an IGMPv2 report for now. */
998 switch (type) {
999 case IGMPV3_MODE_IS_INCLUDE:
1000 case IGMPV3_MODE_IS_EXCLUDE:
1001 case IGMPV3_CHANGE_TO_INCLUDE:
1002 case IGMPV3_CHANGE_TO_EXCLUDE:
1003 case IGMPV3_ALLOW_NEW_SOURCES:
1004 case IGMPV3_BLOCK_OLD_SOURCES:
1005 break;
1006
1007 default:
1008 continue;
1009 }
1010
1011 err = br_ip4_multicast_add_group(br, port, group, vid);
1012 if (err)
1013 break;
1014 }
1015
1016 return err;
1017 }
1018
1019 #if IS_ENABLED(CONFIG_IPV6)
1020 static int br_ip6_multicast_mld2_report(struct net_bridge *br,
1021 struct net_bridge_port *port,
1022 struct sk_buff *skb,
1023 u16 vid)
1024 {
1025 struct icmp6hdr *icmp6h;
1026 struct mld2_grec *grec;
1027 int i;
1028 int len;
1029 int num;
1030 int err = 0;
1031
1032 if (!pskb_may_pull(skb, sizeof(*icmp6h)))
1033 return -EINVAL;
1034
1035 icmp6h = icmp6_hdr(skb);
1036 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]);
1037 len = sizeof(*icmp6h);
1038
1039 for (i = 0; i < num; i++) {
1040 __be16 *nsrcs, _nsrcs;
1041
1042 nsrcs = skb_header_pointer(skb,
1043 len + offsetof(struct mld2_grec,
1044 grec_nsrcs),
1045 sizeof(_nsrcs), &_nsrcs);
1046 if (!nsrcs)
1047 return -EINVAL;
1048
1049 if (!pskb_may_pull(skb,
1050 len + sizeof(*grec) +
1051 sizeof(struct in6_addr) * ntohs(*nsrcs)))
1052 return -EINVAL;
1053
1054 grec = (struct mld2_grec *)(skb->data + len);
1055 len += sizeof(*grec) +
1056 sizeof(struct in6_addr) * ntohs(*nsrcs);
1057
1058 /* We treat these as MLDv1 reports for now. */
1059 switch (grec->grec_type) {
1060 case MLD2_MODE_IS_INCLUDE:
1061 case MLD2_MODE_IS_EXCLUDE:
1062 case MLD2_CHANGE_TO_INCLUDE:
1063 case MLD2_CHANGE_TO_EXCLUDE:
1064 case MLD2_ALLOW_NEW_SOURCES:
1065 case MLD2_BLOCK_OLD_SOURCES:
1066 break;
1067
1068 default:
1069 continue;
1070 }
1071
1072 err = br_ip6_multicast_add_group(br, port, &grec->grec_mca,
1073 vid);
1074 if (!err)
1075 break;
1076 }
1077
1078 return err;
1079 }
1080 #endif
1081
1082 static bool br_ip4_multicast_select_querier(struct net_bridge *br,
1083 struct net_bridge_port *port,
1084 __be32 saddr)
1085 {
1086 if (!timer_pending(&br->ip4_own_query.timer) &&
1087 !timer_pending(&br->ip4_other_query.timer))
1088 goto update;
1089
1090 if (!br->ip4_querier.addr.u.ip4)
1091 goto update;
1092
1093 if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4))
1094 goto update;
1095
1096 return false;
1097
1098 update:
1099 br->ip4_querier.addr.u.ip4 = saddr;
1100
1101 /* update protected by general multicast_lock by caller */
1102 rcu_assign_pointer(br->ip4_querier.port, port);
1103
1104 return true;
1105 }
1106
1107 #if IS_ENABLED(CONFIG_IPV6)
1108 static bool br_ip6_multicast_select_querier(struct net_bridge *br,
1109 struct net_bridge_port *port,
1110 struct in6_addr *saddr)
1111 {
1112 if (!timer_pending(&br->ip6_own_query.timer) &&
1113 !timer_pending(&br->ip6_other_query.timer))
1114 goto update;
1115
1116 if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0)
1117 goto update;
1118
1119 return false;
1120
1121 update:
1122 br->ip6_querier.addr.u.ip6 = *saddr;
1123
1124 /* update protected by general multicast_lock by caller */
1125 rcu_assign_pointer(br->ip6_querier.port, port);
1126
1127 return true;
1128 }
1129 #endif
1130
1131 static bool br_multicast_select_querier(struct net_bridge *br,
1132 struct net_bridge_port *port,
1133 struct br_ip *saddr)
1134 {
1135 switch (saddr->proto) {
1136 case htons(ETH_P_IP):
1137 return br_ip4_multicast_select_querier(br, port, saddr->u.ip4);
1138 #if IS_ENABLED(CONFIG_IPV6)
1139 case htons(ETH_P_IPV6):
1140 return br_ip6_multicast_select_querier(br, port, &saddr->u.ip6);
1141 #endif
1142 }
1143
1144 return false;
1145 }
1146
1147 static void
1148 br_multicast_update_query_timer(struct net_bridge *br,
1149 struct bridge_mcast_other_query *query,
1150 unsigned long max_delay)
1151 {
1152 if (!timer_pending(&query->timer))
1153 query->delay_time = jiffies + max_delay;
1154
1155 mod_timer(&query->timer, jiffies + br->multicast_querier_interval);
1156 }
1157
1158 /*
1159 * Add port to router_list
1160 * list is maintained ordered by pointer value
1161 * and locked by br->multicast_lock and RCU
1162 */
1163 static void br_multicast_add_router(struct net_bridge *br,
1164 struct net_bridge_port *port)
1165 {
1166 struct net_bridge_port *p;
1167 struct hlist_node *slot = NULL;
1168
1169 hlist_for_each_entry(p, &br->router_list, rlist) {
1170 if ((unsigned long) port >= (unsigned long) p)
1171 break;
1172 slot = &p->rlist;
1173 }
1174
1175 if (slot)
1176 hlist_add_behind_rcu(&port->rlist, slot);
1177 else
1178 hlist_add_head_rcu(&port->rlist, &br->router_list);
1179 }
1180
1181 static void br_multicast_mark_router(struct net_bridge *br,
1182 struct net_bridge_port *port)
1183 {
1184 unsigned long now = jiffies;
1185
1186 if (!port) {
1187 if (br->multicast_router == 1)
1188 mod_timer(&br->multicast_router_timer,
1189 now + br->multicast_querier_interval);
1190 return;
1191 }
1192
1193 if (port->multicast_router != 1)
1194 return;
1195
1196 if (!hlist_unhashed(&port->rlist))
1197 goto timer;
1198
1199 br_multicast_add_router(br, port);
1200
1201 timer:
1202 mod_timer(&port->multicast_router_timer,
1203 now + br->multicast_querier_interval);
1204 }
1205
1206 static void br_multicast_query_received(struct net_bridge *br,
1207 struct net_bridge_port *port,
1208 struct bridge_mcast_other_query *query,
1209 struct br_ip *saddr,
1210 unsigned long max_delay)
1211 {
1212 if (!br_multicast_select_querier(br, port, saddr))
1213 return;
1214
1215 br_multicast_update_query_timer(br, query, max_delay);
1216 br_multicast_mark_router(br, port);
1217 }
1218
1219 static int br_ip4_multicast_query(struct net_bridge *br,
1220 struct net_bridge_port *port,
1221 struct sk_buff *skb,
1222 u16 vid)
1223 {
1224 const struct iphdr *iph = ip_hdr(skb);
1225 struct igmphdr *ih = igmp_hdr(skb);
1226 struct net_bridge_mdb_entry *mp;
1227 struct igmpv3_query *ih3;
1228 struct net_bridge_port_group *p;
1229 struct net_bridge_port_group __rcu **pp;
1230 struct br_ip saddr;
1231 unsigned long max_delay;
1232 unsigned long now = jiffies;
1233 __be32 group;
1234 int err = 0;
1235
1236 spin_lock(&br->multicast_lock);
1237 if (!netif_running(br->dev) ||
1238 (port && port->state == BR_STATE_DISABLED))
1239 goto out;
1240
1241 group = ih->group;
1242
1243 if (skb->len == sizeof(*ih)) {
1244 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE);
1245
1246 if (!max_delay) {
1247 max_delay = 10 * HZ;
1248 group = 0;
1249 }
1250 } else {
1251 if (!pskb_may_pull(skb, sizeof(struct igmpv3_query))) {
1252 err = -EINVAL;
1253 goto out;
1254 }
1255
1256 ih3 = igmpv3_query_hdr(skb);
1257 if (ih3->nsrcs)
1258 goto out;
1259
1260 max_delay = ih3->code ?
1261 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1;
1262 }
1263
1264 /* RFC2236+RFC3376 (IGMPv2+IGMPv3) require the multicast link layer
1265 * all-systems destination addresses (224.0.0.1) for general queries
1266 */
1267 if (!group && iph->daddr != htonl(INADDR_ALLHOSTS_GROUP)) {
1268 err = -EINVAL;
1269 goto out;
1270 }
1271
1272 if (!group) {
1273 saddr.proto = htons(ETH_P_IP);
1274 saddr.u.ip4 = iph->saddr;
1275
1276 br_multicast_query_received(br, port, &br->ip4_other_query,
1277 &saddr, max_delay);
1278 goto out;
1279 }
1280
1281 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid);
1282 if (!mp)
1283 goto out;
1284
1285 max_delay *= br->multicast_last_member_count;
1286
1287 if (mp->mglist &&
1288 (timer_pending(&mp->timer) ?
1289 time_after(mp->timer.expires, now + max_delay) :
1290 try_to_del_timer_sync(&mp->timer) >= 0))
1291 mod_timer(&mp->timer, now + max_delay);
1292
1293 for (pp = &mp->ports;
1294 (p = mlock_dereference(*pp, br)) != NULL;
1295 pp = &p->next) {
1296 if (timer_pending(&p->timer) ?
1297 time_after(p->timer.expires, now + max_delay) :
1298 try_to_del_timer_sync(&p->timer) >= 0)
1299 mod_timer(&p->timer, now + max_delay);
1300 }
1301
1302 out:
1303 spin_unlock(&br->multicast_lock);
1304 return err;
1305 }
1306
1307 #if IS_ENABLED(CONFIG_IPV6)
1308 static int br_ip6_multicast_query(struct net_bridge *br,
1309 struct net_bridge_port *port,
1310 struct sk_buff *skb,
1311 u16 vid)
1312 {
1313 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
1314 struct mld_msg *mld;
1315 struct net_bridge_mdb_entry *mp;
1316 struct mld2_query *mld2q;
1317 struct net_bridge_port_group *p;
1318 struct net_bridge_port_group __rcu **pp;
1319 struct br_ip saddr;
1320 unsigned long max_delay;
1321 unsigned long now = jiffies;
1322 const struct in6_addr *group = NULL;
1323 bool is_general_query;
1324 int err = 0;
1325
1326 spin_lock(&br->multicast_lock);
1327 if (!netif_running(br->dev) ||
1328 (port && port->state == BR_STATE_DISABLED))
1329 goto out;
1330
1331 /* RFC2710+RFC3810 (MLDv1+MLDv2) require link-local source addresses */
1332 if (!(ipv6_addr_type(&ip6h->saddr) & IPV6_ADDR_LINKLOCAL)) {
1333 err = -EINVAL;
1334 goto out;
1335 }
1336
1337 if (skb->len == sizeof(*mld)) {
1338 if (!pskb_may_pull(skb, sizeof(*mld))) {
1339 err = -EINVAL;
1340 goto out;
1341 }
1342 mld = (struct mld_msg *) icmp6_hdr(skb);
1343 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay));
1344 if (max_delay)
1345 group = &mld->mld_mca;
1346 } else {
1347 if (!pskb_may_pull(skb, sizeof(*mld2q))) {
1348 err = -EINVAL;
1349 goto out;
1350 }
1351 mld2q = (struct mld2_query *)icmp6_hdr(skb);
1352 if (!mld2q->mld2q_nsrcs)
1353 group = &mld2q->mld2q_mca;
1354
1355 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL);
1356 }
1357
1358 is_general_query = group && ipv6_addr_any(group);
1359
1360 /* RFC2710+RFC3810 (MLDv1+MLDv2) require the multicast link layer
1361 * all-nodes destination address (ff02::1) for general queries
1362 */
1363 if (is_general_query && !ipv6_addr_is_ll_all_nodes(&ip6h->daddr)) {
1364 err = -EINVAL;
1365 goto out;
1366 }
1367
1368 if (is_general_query) {
1369 saddr.proto = htons(ETH_P_IPV6);
1370 saddr.u.ip6 = ip6h->saddr;
1371
1372 br_multicast_query_received(br, port, &br->ip6_other_query,
1373 &saddr, max_delay);
1374 goto out;
1375 } else if (!group) {
1376 goto out;
1377 }
1378
1379 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid);
1380 if (!mp)
1381 goto out;
1382
1383 max_delay *= br->multicast_last_member_count;
1384 if (mp->mglist &&
1385 (timer_pending(&mp->timer) ?
1386 time_after(mp->timer.expires, now + max_delay) :
1387 try_to_del_timer_sync(&mp->timer) >= 0))
1388 mod_timer(&mp->timer, now + max_delay);
1389
1390 for (pp = &mp->ports;
1391 (p = mlock_dereference(*pp, br)) != NULL;
1392 pp = &p->next) {
1393 if (timer_pending(&p->timer) ?
1394 time_after(p->timer.expires, now + max_delay) :
1395 try_to_del_timer_sync(&p->timer) >= 0)
1396 mod_timer(&p->timer, now + max_delay);
1397 }
1398
1399 out:
1400 spin_unlock(&br->multicast_lock);
1401 return err;
1402 }
1403 #endif
1404
1405 static void
1406 br_multicast_leave_group(struct net_bridge *br,
1407 struct net_bridge_port *port,
1408 struct br_ip *group,
1409 struct bridge_mcast_other_query *other_query,
1410 struct bridge_mcast_own_query *own_query)
1411 {
1412 struct net_bridge_mdb_htable *mdb;
1413 struct net_bridge_mdb_entry *mp;
1414 struct net_bridge_port_group *p;
1415 unsigned long now;
1416 unsigned long time;
1417
1418 spin_lock(&br->multicast_lock);
1419 if (!netif_running(br->dev) ||
1420 (port && port->state == BR_STATE_DISABLED) ||
1421 timer_pending(&other_query->timer))
1422 goto out;
1423
1424 mdb = mlock_dereference(br->mdb, br);
1425 mp = br_mdb_ip_get(mdb, group);
1426 if (!mp)
1427 goto out;
1428
1429 if (br->multicast_querier) {
1430 __br_multicast_send_query(br, port, &mp->addr);
1431
1432 time = jiffies + br->multicast_last_member_count *
1433 br->multicast_last_member_interval;
1434
1435 mod_timer(&own_query->timer, time);
1436
1437 for (p = mlock_dereference(mp->ports, br);
1438 p != NULL;
1439 p = mlock_dereference(p->next, br)) {
1440 if (p->port != port)
1441 continue;
1442
1443 if (!hlist_unhashed(&p->mglist) &&
1444 (timer_pending(&p->timer) ?
1445 time_after(p->timer.expires, time) :
1446 try_to_del_timer_sync(&p->timer) >= 0)) {
1447 mod_timer(&p->timer, time);
1448 }
1449
1450 break;
1451 }
1452 }
1453
1454 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) {
1455 struct net_bridge_port_group __rcu **pp;
1456
1457 for (pp = &mp->ports;
1458 (p = mlock_dereference(*pp, br)) != NULL;
1459 pp = &p->next) {
1460 if (p->port != port)
1461 continue;
1462
1463 rcu_assign_pointer(*pp, p->next);
1464 hlist_del_init(&p->mglist);
1465 del_timer(&p->timer);
1466 call_rcu_bh(&p->rcu, br_multicast_free_pg);
1467 br_mdb_notify(br->dev, port, group, RTM_DELMDB);
1468
1469 if (!mp->ports && !mp->mglist &&
1470 netif_running(br->dev))
1471 mod_timer(&mp->timer, jiffies);
1472 }
1473 goto out;
1474 }
1475
1476 now = jiffies;
1477 time = now + br->multicast_last_member_count *
1478 br->multicast_last_member_interval;
1479
1480 if (!port) {
1481 if (mp->mglist &&
1482 (timer_pending(&mp->timer) ?
1483 time_after(mp->timer.expires, time) :
1484 try_to_del_timer_sync(&mp->timer) >= 0)) {
1485 mod_timer(&mp->timer, time);
1486 }
1487
1488 goto out;
1489 }
1490
1491 for (p = mlock_dereference(mp->ports, br);
1492 p != NULL;
1493 p = mlock_dereference(p->next, br)) {
1494 if (p->port != port)
1495 continue;
1496
1497 if (!hlist_unhashed(&p->mglist) &&
1498 (timer_pending(&p->timer) ?
1499 time_after(p->timer.expires, time) :
1500 try_to_del_timer_sync(&p->timer) >= 0)) {
1501 mod_timer(&p->timer, time);
1502 }
1503
1504 break;
1505 }
1506 out:
1507 spin_unlock(&br->multicast_lock);
1508 }
1509
1510 static void br_ip4_multicast_leave_group(struct net_bridge *br,
1511 struct net_bridge_port *port,
1512 __be32 group,
1513 __u16 vid)
1514 {
1515 struct br_ip br_group;
1516 struct bridge_mcast_own_query *own_query;
1517
1518 if (ipv4_is_local_multicast(group))
1519 return;
1520
1521 own_query = port ? &port->ip4_own_query : &br->ip4_own_query;
1522
1523 br_group.u.ip4 = group;
1524 br_group.proto = htons(ETH_P_IP);
1525 br_group.vid = vid;
1526
1527 br_multicast_leave_group(br, port, &br_group, &br->ip4_other_query,
1528 own_query);
1529 }
1530
1531 #if IS_ENABLED(CONFIG_IPV6)
1532 static void br_ip6_multicast_leave_group(struct net_bridge *br,
1533 struct net_bridge_port *port,
1534 const struct in6_addr *group,
1535 __u16 vid)
1536 {
1537 struct br_ip br_group;
1538 struct bridge_mcast_own_query *own_query;
1539
1540 if (ipv6_addr_is_ll_all_nodes(group))
1541 return;
1542
1543 own_query = port ? &port->ip6_own_query : &br->ip6_own_query;
1544
1545 br_group.u.ip6 = *group;
1546 br_group.proto = htons(ETH_P_IPV6);
1547 br_group.vid = vid;
1548
1549 br_multicast_leave_group(br, port, &br_group, &br->ip6_other_query,
1550 own_query);
1551 }
1552 #endif
1553
1554 static int br_multicast_ipv4_rcv(struct net_bridge *br,
1555 struct net_bridge_port *port,
1556 struct sk_buff *skb,
1557 u16 vid)
1558 {
1559 struct sk_buff *skb2 = skb;
1560 const struct iphdr *iph;
1561 struct igmphdr *ih;
1562 unsigned int len;
1563 unsigned int offset;
1564 int err;
1565
1566 /* We treat OOM as packet loss for now. */
1567 if (!pskb_may_pull(skb, sizeof(*iph)))
1568 return -EINVAL;
1569
1570 iph = ip_hdr(skb);
1571
1572 if (iph->ihl < 5 || iph->version != 4)
1573 return -EINVAL;
1574
1575 if (!pskb_may_pull(skb, ip_hdrlen(skb)))
1576 return -EINVAL;
1577
1578 iph = ip_hdr(skb);
1579
1580 if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl)))
1581 return -EINVAL;
1582
1583 if (iph->protocol != IPPROTO_IGMP) {
1584 if (!ipv4_is_local_multicast(iph->daddr))
1585 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1586 return 0;
1587 }
1588
1589 len = ntohs(iph->tot_len);
1590 if (skb->len < len || len < ip_hdrlen(skb))
1591 return -EINVAL;
1592
1593 if (skb->len > len) {
1594 skb2 = skb_clone(skb, GFP_ATOMIC);
1595 if (!skb2)
1596 return -ENOMEM;
1597
1598 err = pskb_trim_rcsum(skb2, len);
1599 if (err)
1600 goto err_out;
1601 }
1602
1603 len -= ip_hdrlen(skb2);
1604 offset = skb_network_offset(skb2) + ip_hdrlen(skb2);
1605 __skb_pull(skb2, offset);
1606 skb_reset_transport_header(skb2);
1607
1608 err = -EINVAL;
1609 if (!pskb_may_pull(skb2, sizeof(*ih)))
1610 goto out;
1611
1612 switch (skb2->ip_summed) {
1613 case CHECKSUM_COMPLETE:
1614 if (!csum_fold(skb2->csum))
1615 break;
1616 /* fall through */
1617 case CHECKSUM_NONE:
1618 skb2->csum = 0;
1619 if (skb_checksum_complete(skb2))
1620 goto out;
1621 }
1622
1623 err = 0;
1624
1625 BR_INPUT_SKB_CB(skb)->igmp = 1;
1626 ih = igmp_hdr(skb2);
1627
1628 switch (ih->type) {
1629 case IGMP_HOST_MEMBERSHIP_REPORT:
1630 case IGMPV2_HOST_MEMBERSHIP_REPORT:
1631 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1632 err = br_ip4_multicast_add_group(br, port, ih->group, vid);
1633 break;
1634 case IGMPV3_HOST_MEMBERSHIP_REPORT:
1635 err = br_ip4_multicast_igmp3_report(br, port, skb2, vid);
1636 break;
1637 case IGMP_HOST_MEMBERSHIP_QUERY:
1638 err = br_ip4_multicast_query(br, port, skb2, vid);
1639 break;
1640 case IGMP_HOST_LEAVE_MESSAGE:
1641 br_ip4_multicast_leave_group(br, port, ih->group, vid);
1642 break;
1643 }
1644
1645 out:
1646 __skb_push(skb2, offset);
1647 err_out:
1648 if (skb2 != skb)
1649 kfree_skb(skb2);
1650 return err;
1651 }
1652
1653 #if IS_ENABLED(CONFIG_IPV6)
1654 static int br_multicast_ipv6_rcv(struct net_bridge *br,
1655 struct net_bridge_port *port,
1656 struct sk_buff *skb,
1657 u16 vid)
1658 {
1659 struct sk_buff *skb2;
1660 const struct ipv6hdr *ip6h;
1661 u8 icmp6_type;
1662 u8 nexthdr;
1663 __be16 frag_off;
1664 unsigned int len;
1665 int offset;
1666 int err;
1667
1668 if (!pskb_may_pull(skb, sizeof(*ip6h)))
1669 return -EINVAL;
1670
1671 ip6h = ipv6_hdr(skb);
1672
1673 /*
1674 * We're interested in MLD messages only.
1675 * - Version is 6
1676 * - MLD has always Router Alert hop-by-hop option
1677 * - But we do not support jumbrograms.
1678 */
1679 if (ip6h->version != 6)
1680 return 0;
1681
1682 /* Prevent flooding this packet if there is no listener present */
1683 if (!ipv6_addr_is_ll_all_nodes(&ip6h->daddr))
1684 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1685
1686 if (ip6h->nexthdr != IPPROTO_HOPOPTS ||
1687 ip6h->payload_len == 0)
1688 return 0;
1689
1690 len = ntohs(ip6h->payload_len) + sizeof(*ip6h);
1691 if (skb->len < len)
1692 return -EINVAL;
1693
1694 nexthdr = ip6h->nexthdr;
1695 offset = ipv6_skip_exthdr(skb, sizeof(*ip6h), &nexthdr, &frag_off);
1696
1697 if (offset < 0 || nexthdr != IPPROTO_ICMPV6)
1698 return 0;
1699
1700 /* Okay, we found ICMPv6 header */
1701 skb2 = skb_clone(skb, GFP_ATOMIC);
1702 if (!skb2)
1703 return -ENOMEM;
1704
1705 err = -EINVAL;
1706 if (!pskb_may_pull(skb2, offset + sizeof(struct icmp6hdr)))
1707 goto out;
1708
1709 len -= offset - skb_network_offset(skb2);
1710
1711 __skb_pull(skb2, offset);
1712 skb_reset_transport_header(skb2);
1713 skb_postpull_rcsum(skb2, skb_network_header(skb2),
1714 skb_network_header_len(skb2));
1715
1716 icmp6_type = icmp6_hdr(skb2)->icmp6_type;
1717
1718 switch (icmp6_type) {
1719 case ICMPV6_MGM_QUERY:
1720 case ICMPV6_MGM_REPORT:
1721 case ICMPV6_MGM_REDUCTION:
1722 case ICMPV6_MLD2_REPORT:
1723 break;
1724 default:
1725 err = 0;
1726 goto out;
1727 }
1728
1729 /* Okay, we found MLD message. Check further. */
1730 if (skb2->len > len) {
1731 err = pskb_trim_rcsum(skb2, len);
1732 if (err)
1733 goto out;
1734 err = -EINVAL;
1735 }
1736
1737 ip6h = ipv6_hdr(skb2);
1738
1739 switch (skb2->ip_summed) {
1740 case CHECKSUM_COMPLETE:
1741 if (!csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, skb2->len,
1742 IPPROTO_ICMPV6, skb2->csum))
1743 break;
1744 /*FALLTHROUGH*/
1745 case CHECKSUM_NONE:
1746 skb2->csum = ~csum_unfold(csum_ipv6_magic(&ip6h->saddr,
1747 &ip6h->daddr,
1748 skb2->len,
1749 IPPROTO_ICMPV6, 0));
1750 if (__skb_checksum_complete(skb2))
1751 goto out;
1752 }
1753
1754 err = 0;
1755
1756 BR_INPUT_SKB_CB(skb)->igmp = 1;
1757
1758 switch (icmp6_type) {
1759 case ICMPV6_MGM_REPORT:
1760 {
1761 struct mld_msg *mld;
1762 if (!pskb_may_pull(skb2, sizeof(*mld))) {
1763 err = -EINVAL;
1764 goto out;
1765 }
1766 mld = (struct mld_msg *)skb_transport_header(skb2);
1767 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1768 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid);
1769 break;
1770 }
1771 case ICMPV6_MLD2_REPORT:
1772 err = br_ip6_multicast_mld2_report(br, port, skb2, vid);
1773 break;
1774 case ICMPV6_MGM_QUERY:
1775 err = br_ip6_multicast_query(br, port, skb2, vid);
1776 break;
1777 case ICMPV6_MGM_REDUCTION:
1778 {
1779 struct mld_msg *mld;
1780 if (!pskb_may_pull(skb2, sizeof(*mld))) {
1781 err = -EINVAL;
1782 goto out;
1783 }
1784 mld = (struct mld_msg *)skb_transport_header(skb2);
1785 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid);
1786 }
1787 }
1788
1789 out:
1790 kfree_skb(skb2);
1791 return err;
1792 }
1793 #endif
1794
1795 int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port,
1796 struct sk_buff *skb, u16 vid)
1797 {
1798 BR_INPUT_SKB_CB(skb)->igmp = 0;
1799 BR_INPUT_SKB_CB(skb)->mrouters_only = 0;
1800
1801 if (br->multicast_disabled)
1802 return 0;
1803
1804 switch (skb->protocol) {
1805 case htons(ETH_P_IP):
1806 return br_multicast_ipv4_rcv(br, port, skb, vid);
1807 #if IS_ENABLED(CONFIG_IPV6)
1808 case htons(ETH_P_IPV6):
1809 return br_multicast_ipv6_rcv(br, port, skb, vid);
1810 #endif
1811 }
1812
1813 return 0;
1814 }
1815
1816 static void br_multicast_query_expired(struct net_bridge *br,
1817 struct bridge_mcast_own_query *query,
1818 struct bridge_mcast_querier *querier)
1819 {
1820 spin_lock(&br->multicast_lock);
1821 if (query->startup_sent < br->multicast_startup_query_count)
1822 query->startup_sent++;
1823
1824 RCU_INIT_POINTER(querier, NULL);
1825 br_multicast_send_query(br, NULL, query);
1826 spin_unlock(&br->multicast_lock);
1827 }
1828
1829 static void br_ip4_multicast_query_expired(unsigned long data)
1830 {
1831 struct net_bridge *br = (void *)data;
1832
1833 br_multicast_query_expired(br, &br->ip4_own_query, &br->ip4_querier);
1834 }
1835
1836 #if IS_ENABLED(CONFIG_IPV6)
1837 static void br_ip6_multicast_query_expired(unsigned long data)
1838 {
1839 struct net_bridge *br = (void *)data;
1840
1841 br_multicast_query_expired(br, &br->ip6_own_query, &br->ip6_querier);
1842 }
1843 #endif
1844
1845 void br_multicast_init(struct net_bridge *br)
1846 {
1847 br->hash_elasticity = 4;
1848 br->hash_max = 512;
1849
1850 br->multicast_router = 1;
1851 br->multicast_querier = 0;
1852 br->multicast_query_use_ifaddr = 0;
1853 br->multicast_last_member_count = 2;
1854 br->multicast_startup_query_count = 2;
1855
1856 br->multicast_last_member_interval = HZ;
1857 br->multicast_query_response_interval = 10 * HZ;
1858 br->multicast_startup_query_interval = 125 * HZ / 4;
1859 br->multicast_query_interval = 125 * HZ;
1860 br->multicast_querier_interval = 255 * HZ;
1861 br->multicast_membership_interval = 260 * HZ;
1862
1863 br->ip4_other_query.delay_time = 0;
1864 br->ip4_querier.port = NULL;
1865 #if IS_ENABLED(CONFIG_IPV6)
1866 br->ip6_other_query.delay_time = 0;
1867 br->ip6_querier.port = NULL;
1868 #endif
1869
1870 spin_lock_init(&br->multicast_lock);
1871 setup_timer(&br->multicast_router_timer,
1872 br_multicast_local_router_expired, 0);
1873 setup_timer(&br->ip4_other_query.timer,
1874 br_ip4_multicast_querier_expired, (unsigned long)br);
1875 setup_timer(&br->ip4_own_query.timer, br_ip4_multicast_query_expired,
1876 (unsigned long)br);
1877 #if IS_ENABLED(CONFIG_IPV6)
1878 setup_timer(&br->ip6_other_query.timer,
1879 br_ip6_multicast_querier_expired, (unsigned long)br);
1880 setup_timer(&br->ip6_own_query.timer, br_ip6_multicast_query_expired,
1881 (unsigned long)br);
1882 #endif
1883 }
1884
1885 static void __br_multicast_open(struct net_bridge *br,
1886 struct bridge_mcast_own_query *query)
1887 {
1888 query->startup_sent = 0;
1889
1890 if (br->multicast_disabled)
1891 return;
1892
1893 mod_timer(&query->timer, jiffies);
1894 }
1895
1896 void br_multicast_open(struct net_bridge *br)
1897 {
1898 __br_multicast_open(br, &br->ip4_own_query);
1899 #if IS_ENABLED(CONFIG_IPV6)
1900 __br_multicast_open(br, &br->ip6_own_query);
1901 #endif
1902 }
1903
1904 void br_multicast_stop(struct net_bridge *br)
1905 {
1906 struct net_bridge_mdb_htable *mdb;
1907 struct net_bridge_mdb_entry *mp;
1908 struct hlist_node *n;
1909 u32 ver;
1910 int i;
1911
1912 del_timer_sync(&br->multicast_router_timer);
1913 del_timer_sync(&br->ip4_other_query.timer);
1914 del_timer_sync(&br->ip4_own_query.timer);
1915 #if IS_ENABLED(CONFIG_IPV6)
1916 del_timer_sync(&br->ip6_other_query.timer);
1917 del_timer_sync(&br->ip6_own_query.timer);
1918 #endif
1919
1920 spin_lock_bh(&br->multicast_lock);
1921 mdb = mlock_dereference(br->mdb, br);
1922 if (!mdb)
1923 goto out;
1924
1925 br->mdb = NULL;
1926
1927 ver = mdb->ver;
1928 for (i = 0; i < mdb->max; i++) {
1929 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i],
1930 hlist[ver]) {
1931 del_timer(&mp->timer);
1932 call_rcu_bh(&mp->rcu, br_multicast_free_group);
1933 }
1934 }
1935
1936 if (mdb->old) {
1937 spin_unlock_bh(&br->multicast_lock);
1938 rcu_barrier_bh();
1939 spin_lock_bh(&br->multicast_lock);
1940 WARN_ON(mdb->old);
1941 }
1942
1943 mdb->old = mdb;
1944 call_rcu_bh(&mdb->rcu, br_mdb_free);
1945
1946 out:
1947 spin_unlock_bh(&br->multicast_lock);
1948 }
1949
1950 int br_multicast_set_router(struct net_bridge *br, unsigned long val)
1951 {
1952 int err = -ENOENT;
1953
1954 spin_lock_bh(&br->multicast_lock);
1955 if (!netif_running(br->dev))
1956 goto unlock;
1957
1958 switch (val) {
1959 case 0:
1960 case 2:
1961 del_timer(&br->multicast_router_timer);
1962 /* fall through */
1963 case 1:
1964 br->multicast_router = val;
1965 err = 0;
1966 break;
1967
1968 default:
1969 err = -EINVAL;
1970 break;
1971 }
1972
1973 unlock:
1974 spin_unlock_bh(&br->multicast_lock);
1975
1976 return err;
1977 }
1978
1979 int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val)
1980 {
1981 struct net_bridge *br = p->br;
1982 int err = -ENOENT;
1983
1984 spin_lock(&br->multicast_lock);
1985 if (!netif_running(br->dev) || p->state == BR_STATE_DISABLED)
1986 goto unlock;
1987
1988 switch (val) {
1989 case 0:
1990 case 1:
1991 case 2:
1992 p->multicast_router = val;
1993 err = 0;
1994
1995 if (val < 2 && !hlist_unhashed(&p->rlist))
1996 hlist_del_init_rcu(&p->rlist);
1997
1998 if (val == 1)
1999 break;
2000
2001 del_timer(&p->multicast_router_timer);
2002
2003 if (val == 0)
2004 break;
2005
2006 br_multicast_add_router(br, p);
2007 break;
2008
2009 default:
2010 err = -EINVAL;
2011 break;
2012 }
2013
2014 unlock:
2015 spin_unlock(&br->multicast_lock);
2016
2017 return err;
2018 }
2019
2020 static void br_multicast_start_querier(struct net_bridge *br,
2021 struct bridge_mcast_own_query *query)
2022 {
2023 struct net_bridge_port *port;
2024
2025 __br_multicast_open(br, query);
2026
2027 list_for_each_entry(port, &br->port_list, list) {
2028 if (port->state == BR_STATE_DISABLED ||
2029 port->state == BR_STATE_BLOCKING)
2030 continue;
2031
2032 if (query == &br->ip4_own_query)
2033 br_multicast_enable(&port->ip4_own_query);
2034 #if IS_ENABLED(CONFIG_IPV6)
2035 else
2036 br_multicast_enable(&port->ip6_own_query);
2037 #endif
2038 }
2039 }
2040
2041 int br_multicast_toggle(struct net_bridge *br, unsigned long val)
2042 {
2043 int err = 0;
2044 struct net_bridge_mdb_htable *mdb;
2045
2046 spin_lock_bh(&br->multicast_lock);
2047 if (br->multicast_disabled == !val)
2048 goto unlock;
2049
2050 br->multicast_disabled = !val;
2051 if (br->multicast_disabled)
2052 goto unlock;
2053
2054 if (!netif_running(br->dev))
2055 goto unlock;
2056
2057 mdb = mlock_dereference(br->mdb, br);
2058 if (mdb) {
2059 if (mdb->old) {
2060 err = -EEXIST;
2061 rollback:
2062 br->multicast_disabled = !!val;
2063 goto unlock;
2064 }
2065
2066 err = br_mdb_rehash(&br->mdb, mdb->max,
2067 br->hash_elasticity);
2068 if (err)
2069 goto rollback;
2070 }
2071
2072 br_multicast_start_querier(br, &br->ip4_own_query);
2073 #if IS_ENABLED(CONFIG_IPV6)
2074 br_multicast_start_querier(br, &br->ip6_own_query);
2075 #endif
2076
2077 unlock:
2078 spin_unlock_bh(&br->multicast_lock);
2079
2080 return err;
2081 }
2082
2083 int br_multicast_set_querier(struct net_bridge *br, unsigned long val)
2084 {
2085 unsigned long max_delay;
2086
2087 val = !!val;
2088
2089 spin_lock_bh(&br->multicast_lock);
2090 if (br->multicast_querier == val)
2091 goto unlock;
2092
2093 br->multicast_querier = val;
2094 if (!val)
2095 goto unlock;
2096
2097 max_delay = br->multicast_query_response_interval;
2098
2099 if (!timer_pending(&br->ip4_other_query.timer))
2100 br->ip4_other_query.delay_time = jiffies + max_delay;
2101
2102 br_multicast_start_querier(br, &br->ip4_own_query);
2103
2104 #if IS_ENABLED(CONFIG_IPV6)
2105 if (!timer_pending(&br->ip6_other_query.timer))
2106 br->ip6_other_query.delay_time = jiffies + max_delay;
2107
2108 br_multicast_start_querier(br, &br->ip6_own_query);
2109 #endif
2110
2111 unlock:
2112 spin_unlock_bh(&br->multicast_lock);
2113
2114 return 0;
2115 }
2116
2117 int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
2118 {
2119 int err = -ENOENT;
2120 u32 old;
2121 struct net_bridge_mdb_htable *mdb;
2122
2123 spin_lock_bh(&br->multicast_lock);
2124 if (!netif_running(br->dev))
2125 goto unlock;
2126
2127 err = -EINVAL;
2128 if (!is_power_of_2(val))
2129 goto unlock;
2130
2131 mdb = mlock_dereference(br->mdb, br);
2132 if (mdb && val < mdb->size)
2133 goto unlock;
2134
2135 err = 0;
2136
2137 old = br->hash_max;
2138 br->hash_max = val;
2139
2140 if (mdb) {
2141 if (mdb->old) {
2142 err = -EEXIST;
2143 rollback:
2144 br->hash_max = old;
2145 goto unlock;
2146 }
2147
2148 err = br_mdb_rehash(&br->mdb, br->hash_max,
2149 br->hash_elasticity);
2150 if (err)
2151 goto rollback;
2152 }
2153
2154 unlock:
2155 spin_unlock_bh(&br->multicast_lock);
2156
2157 return err;
2158 }
2159
2160 /**
2161 * br_multicast_list_adjacent - Returns snooped multicast addresses
2162 * @dev: The bridge port adjacent to which to retrieve addresses
2163 * @br_ip_list: The list to store found, snooped multicast IP addresses in
2164 *
2165 * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast
2166 * snooping feature on all bridge ports of dev's bridge device, excluding
2167 * the addresses from dev itself.
2168 *
2169 * Returns the number of items added to br_ip_list.
2170 *
2171 * Notes:
2172 * - br_ip_list needs to be initialized by caller
2173 * - br_ip_list might contain duplicates in the end
2174 * (needs to be taken care of by caller)
2175 * - br_ip_list needs to be freed by caller
2176 */
2177 int br_multicast_list_adjacent(struct net_device *dev,
2178 struct list_head *br_ip_list)
2179 {
2180 struct net_bridge *br;
2181 struct net_bridge_port *port;
2182 struct net_bridge_port_group *group;
2183 struct br_ip_list *entry;
2184 int count = 0;
2185
2186 rcu_read_lock();
2187 if (!br_ip_list || !br_port_exists(dev))
2188 goto unlock;
2189
2190 port = br_port_get_rcu(dev);
2191 if (!port || !port->br)
2192 goto unlock;
2193
2194 br = port->br;
2195
2196 list_for_each_entry_rcu(port, &br->port_list, list) {
2197 if (!port->dev || port->dev == dev)
2198 continue;
2199
2200 hlist_for_each_entry_rcu(group, &port->mglist, mglist) {
2201 entry = kmalloc(sizeof(*entry), GFP_ATOMIC);
2202 if (!entry)
2203 goto unlock;
2204
2205 entry->addr = group->addr;
2206 list_add(&entry->list, br_ip_list);
2207 count++;
2208 }
2209 }
2210
2211 unlock:
2212 rcu_read_unlock();
2213 return count;
2214 }
2215 EXPORT_SYMBOL_GPL(br_multicast_list_adjacent);
2216
2217 /**
2218 * br_multicast_has_querier_anywhere - Checks for a querier on a bridge
2219 * @dev: The bridge port providing the bridge on which to check for a querier
2220 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6
2221 *
2222 * Checks whether the given interface has a bridge on top and if so returns
2223 * true if a valid querier exists anywhere on the bridged link layer.
2224 * Otherwise returns false.
2225 */
2226 bool br_multicast_has_querier_anywhere(struct net_device *dev, int proto)
2227 {
2228 struct net_bridge *br;
2229 struct net_bridge_port *port;
2230 struct ethhdr eth;
2231 bool ret = false;
2232
2233 rcu_read_lock();
2234 if (!br_port_exists(dev))
2235 goto unlock;
2236
2237 port = br_port_get_rcu(dev);
2238 if (!port || !port->br)
2239 goto unlock;
2240
2241 br = port->br;
2242
2243 memset(&eth, 0, sizeof(eth));
2244 eth.h_proto = htons(proto);
2245
2246 ret = br_multicast_querier_exists(br, &eth);
2247
2248 unlock:
2249 rcu_read_unlock();
2250 return ret;
2251 }
2252 EXPORT_SYMBOL_GPL(br_multicast_has_querier_anywhere);
2253
2254 /**
2255 * br_multicast_has_querier_adjacent - Checks for a querier behind a bridge port
2256 * @dev: The bridge port adjacent to which to check for a querier
2257 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6
2258 *
2259 * Checks whether the given interface has a bridge on top and if so returns
2260 * true if a selected querier is behind one of the other ports of this
2261 * bridge. Otherwise returns false.
2262 */
2263 bool br_multicast_has_querier_adjacent(struct net_device *dev, int proto)
2264 {
2265 struct net_bridge *br;
2266 struct net_bridge_port *port;
2267 bool ret = false;
2268
2269 rcu_read_lock();
2270 if (!br_port_exists(dev))
2271 goto unlock;
2272
2273 port = br_port_get_rcu(dev);
2274 if (!port || !port->br)
2275 goto unlock;
2276
2277 br = port->br;
2278
2279 switch (proto) {
2280 case ETH_P_IP:
2281 if (!timer_pending(&br->ip4_other_query.timer) ||
2282 rcu_dereference(br->ip4_querier.port) == port)
2283 goto unlock;
2284 break;
2285 #if IS_ENABLED(CONFIG_IPV6)
2286 case ETH_P_IPV6:
2287 if (!timer_pending(&br->ip6_other_query.timer) ||
2288 rcu_dereference(br->ip6_querier.port) == port)
2289 goto unlock;
2290 break;
2291 #endif
2292 default:
2293 goto unlock;
2294 }
2295
2296 ret = true;
2297 unlock:
2298 rcu_read_unlock();
2299 return ret;
2300 }
2301 EXPORT_SYMBOL_GPL(br_multicast_has_querier_adjacent);