1 /* 2 * Bridge multicast support. 3 * 4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> 5 * 6 * This program is free software; you can redistribute it and/or modify it 7 * under the terms of the GNU General Public License as published by the Free 8 * Software Foundation; either version 2 of the License, or (at your option) 9 * any later version. 10 * 11 */ 12 13 #include <linux/err.h> 14 #include <linux/if_ether.h> 15 #include <linux/igmp.h> 16 #include <linux/jhash.h> 17 #include <linux/kernel.h> 18 #include <linux/log2.h> 19 #include <linux/netdevice.h> 20 #include <linux/netfilter_bridge.h> 21 #include <linux/random.h> 22 #include <linux/rculist.h> 23 #include <linux/skbuff.h> 24 #include <linux/slab.h> 25 #include <linux/timer.h> 26 #include <linux/inetdevice.h> 27 #include <net/ip.h> 28 #if IS_ENABLED(CONFIG_IPV6) 29 #include <net/ipv6.h> 30 #include <net/mld.h> 31 #include <net/ip6_checksum.h> 32 #include <net/addrconf.h> 33 #endif 34 35 #include "br_private.h" 36 37 static void br_multicast_start_querier(struct net_bridge *br, 38 struct bridge_mcast_query *query); 39 unsigned int br_mdb_rehash_seq; 40 41 static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b) 42 { 43 if (a->proto != b->proto) 44 return 0; 45 if (a->vid != b->vid) 46 return 0; 47 switch (a->proto) { 48 case htons(ETH_P_IP): 49 return a->u.ip4 == b->u.ip4; 50 #if IS_ENABLED(CONFIG_IPV6) 51 case htons(ETH_P_IPV6): 52 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6); 53 #endif 54 } 55 return 0; 56 } 57 58 static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip, 59 __u16 vid) 60 { 61 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); 62 } 63 64 #if IS_ENABLED(CONFIG_IPV6) 65 static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb, 66 const struct in6_addr *ip, 67 __u16 vid) 68 { 69 return jhash_2words(ipv6_addr_hash(ip), vid, 70 mdb->secret) & (mdb->max - 1); 71 } 72 #endif 73 74 static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb, 75 struct br_ip *ip) 76 { 77 switch (ip->proto) { 78 case htons(ETH_P_IP): 79 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid); 80 #if IS_ENABLED(CONFIG_IPV6) 81 case htons(ETH_P_IPV6): 82 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid); 83 #endif 84 } 85 return 0; 86 } 87 88 static struct net_bridge_mdb_entry *__br_mdb_ip_get( 89 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash) 90 { 91 struct net_bridge_mdb_entry *mp; 92 93 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) { 94 if (br_ip_equal(&mp->addr, dst)) 95 return mp; 96 } 97 98 return NULL; 99 } 100 101 struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb, 102 struct br_ip *dst) 103 { 104 if (!mdb) 105 return NULL; 106 107 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst)); 108 } 109 110 static struct net_bridge_mdb_entry *br_mdb_ip4_get( 111 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid) 112 { 113 struct br_ip br_dst; 114 115 br_dst.u.ip4 = dst; 116 br_dst.proto = htons(ETH_P_IP); 117 br_dst.vid = vid; 118 119 return br_mdb_ip_get(mdb, &br_dst); 120 } 121 122 #if IS_ENABLED(CONFIG_IPV6) 123 static struct net_bridge_mdb_entry *br_mdb_ip6_get( 124 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst, 125 __u16 vid) 126 { 127 struct br_ip br_dst; 128 129 br_dst.u.ip6 = *dst; 130 br_dst.proto = htons(ETH_P_IPV6); 131 br_dst.vid = vid; 132 133 return br_mdb_ip_get(mdb, &br_dst); 134 } 135 #endif 136 137 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br, 138 struct sk_buff *skb, u16 vid) 139 { 140 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb); 141 struct br_ip ip; 142 143 if (br->multicast_disabled) 144 return NULL; 145 146 if (BR_INPUT_SKB_CB(skb)->igmp) 147 return NULL; 148 149 ip.proto = skb->protocol; 150 ip.vid = vid; 151 152 switch (skb->protocol) { 153 case htons(ETH_P_IP): 154 ip.u.ip4 = ip_hdr(skb)->daddr; 155 break; 156 #if IS_ENABLED(CONFIG_IPV6) 157 case htons(ETH_P_IPV6): 158 ip.u.ip6 = ipv6_hdr(skb)->daddr; 159 break; 160 #endif 161 default: 162 return NULL; 163 } 164 165 return br_mdb_ip_get(mdb, &ip); 166 } 167 168 static void br_mdb_free(struct rcu_head *head) 169 { 170 struct net_bridge_mdb_htable *mdb = 171 container_of(head, struct net_bridge_mdb_htable, rcu); 172 struct net_bridge_mdb_htable *old = mdb->old; 173 174 mdb->old = NULL; 175 kfree(old->mhash); 176 kfree(old); 177 } 178 179 static int br_mdb_copy(struct net_bridge_mdb_htable *new, 180 struct net_bridge_mdb_htable *old, 181 int elasticity) 182 { 183 struct net_bridge_mdb_entry *mp; 184 int maxlen; 185 int len; 186 int i; 187 188 for (i = 0; i < old->max; i++) 189 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver]) 190 hlist_add_head(&mp->hlist[new->ver], 191 &new->mhash[br_ip_hash(new, &mp->addr)]); 192 193 if (!elasticity) 194 return 0; 195 196 maxlen = 0; 197 for (i = 0; i < new->max; i++) { 198 len = 0; 199 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver]) 200 len++; 201 if (len > maxlen) 202 maxlen = len; 203 } 204 205 return maxlen > elasticity ? -EINVAL : 0; 206 } 207 208 void br_multicast_free_pg(struct rcu_head *head) 209 { 210 struct net_bridge_port_group *p = 211 container_of(head, struct net_bridge_port_group, rcu); 212 213 kfree(p); 214 } 215 216 static void br_multicast_free_group(struct rcu_head *head) 217 { 218 struct net_bridge_mdb_entry *mp = 219 container_of(head, struct net_bridge_mdb_entry, rcu); 220 221 kfree(mp); 222 } 223 224 static void br_multicast_group_expired(unsigned long data) 225 { 226 struct net_bridge_mdb_entry *mp = (void *)data; 227 struct net_bridge *br = mp->br; 228 struct net_bridge_mdb_htable *mdb; 229 230 spin_lock(&br->multicast_lock); 231 if (!netif_running(br->dev) || timer_pending(&mp->timer)) 232 goto out; 233 234 mp->mglist = false; 235 236 if (mp->ports) 237 goto out; 238 239 mdb = mlock_dereference(br->mdb, br); 240 241 hlist_del_rcu(&mp->hlist[mdb->ver]); 242 mdb->size--; 243 244 call_rcu_bh(&mp->rcu, br_multicast_free_group); 245 246 out: 247 spin_unlock(&br->multicast_lock); 248 } 249 250 static void br_multicast_del_pg(struct net_bridge *br, 251 struct net_bridge_port_group *pg) 252 { 253 struct net_bridge_mdb_htable *mdb; 254 struct net_bridge_mdb_entry *mp; 255 struct net_bridge_port_group *p; 256 struct net_bridge_port_group __rcu **pp; 257 258 mdb = mlock_dereference(br->mdb, br); 259 260 mp = br_mdb_ip_get(mdb, &pg->addr); 261 if (WARN_ON(!mp)) 262 return; 263 264 for (pp = &mp->ports; 265 (p = mlock_dereference(*pp, br)) != NULL; 266 pp = &p->next) { 267 if (p != pg) 268 continue; 269 270 rcu_assign_pointer(*pp, p->next); 271 hlist_del_init(&p->mglist); 272 del_timer(&p->timer); 273 call_rcu_bh(&p->rcu, br_multicast_free_pg); 274 275 if (!mp->ports && !mp->mglist && 276 netif_running(br->dev)) 277 mod_timer(&mp->timer, jiffies); 278 279 return; 280 } 281 282 WARN_ON(1); 283 } 284 285 static void br_multicast_port_group_expired(unsigned long data) 286 { 287 struct net_bridge_port_group *pg = (void *)data; 288 struct net_bridge *br = pg->port->br; 289 290 spin_lock(&br->multicast_lock); 291 if (!netif_running(br->dev) || timer_pending(&pg->timer) || 292 hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT) 293 goto out; 294 295 br_multicast_del_pg(br, pg); 296 297 out: 298 spin_unlock(&br->multicast_lock); 299 } 300 301 static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max, 302 int elasticity) 303 { 304 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1); 305 struct net_bridge_mdb_htable *mdb; 306 int err; 307 308 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC); 309 if (!mdb) 310 return -ENOMEM; 311 312 mdb->max = max; 313 mdb->old = old; 314 315 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC); 316 if (!mdb->mhash) { 317 kfree(mdb); 318 return -ENOMEM; 319 } 320 321 mdb->size = old ? old->size : 0; 322 mdb->ver = old ? old->ver ^ 1 : 0; 323 324 if (!old || elasticity) 325 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); 326 else 327 mdb->secret = old->secret; 328 329 if (!old) 330 goto out; 331 332 err = br_mdb_copy(mdb, old, elasticity); 333 if (err) { 334 kfree(mdb->mhash); 335 kfree(mdb); 336 return err; 337 } 338 339 br_mdb_rehash_seq++; 340 call_rcu_bh(&mdb->rcu, br_mdb_free); 341 342 out: 343 rcu_assign_pointer(*mdbp, mdb); 344 345 return 0; 346 } 347 348 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br, 349 __be32 group) 350 { 351 struct sk_buff *skb; 352 struct igmphdr *ih; 353 struct ethhdr *eth; 354 struct iphdr *iph; 355 356 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) + 357 sizeof(*ih) + 4); 358 if (!skb) 359 goto out; 360 361 skb->protocol = htons(ETH_P_IP); 362 363 skb_reset_mac_header(skb); 364 eth = eth_hdr(skb); 365 366 memcpy(eth->h_source, br->dev->dev_addr, ETH_ALEN); 367 eth->h_dest[0] = 1; 368 eth->h_dest[1] = 0; 369 eth->h_dest[2] = 0x5e; 370 eth->h_dest[3] = 0; 371 eth->h_dest[4] = 0; 372 eth->h_dest[5] = 1; 373 eth->h_proto = htons(ETH_P_IP); 374 skb_put(skb, sizeof(*eth)); 375 376 skb_set_network_header(skb, skb->len); 377 iph = ip_hdr(skb); 378 379 iph->version = 4; 380 iph->ihl = 6; 381 iph->tos = 0xc0; 382 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4); 383 iph->id = 0; 384 iph->frag_off = htons(IP_DF); 385 iph->ttl = 1; 386 iph->protocol = IPPROTO_IGMP; 387 iph->saddr = br->multicast_query_use_ifaddr ? 388 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0; 389 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP); 390 ((u8 *)&iph[1])[0] = IPOPT_RA; 391 ((u8 *)&iph[1])[1] = 4; 392 ((u8 *)&iph[1])[2] = 0; 393 ((u8 *)&iph[1])[3] = 0; 394 ip_send_check(iph); 395 skb_put(skb, 24); 396 397 skb_set_transport_header(skb, skb->len); 398 ih = igmp_hdr(skb); 399 ih->type = IGMP_HOST_MEMBERSHIP_QUERY; 400 ih->code = (group ? br->multicast_last_member_interval : 401 br->multicast_query_response_interval) / 402 (HZ / IGMP_TIMER_SCALE); 403 ih->group = group; 404 ih->csum = 0; 405 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr)); 406 skb_put(skb, sizeof(*ih)); 407 408 __skb_pull(skb, sizeof(*eth)); 409 410 out: 411 return skb; 412 } 413 414 #if IS_ENABLED(CONFIG_IPV6) 415 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br, 416 const struct in6_addr *group) 417 { 418 struct sk_buff *skb; 419 struct ipv6hdr *ip6h; 420 struct mld_msg *mldq; 421 struct ethhdr *eth; 422 u8 *hopopt; 423 unsigned long interval; 424 425 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) + 426 8 + sizeof(*mldq)); 427 if (!skb) 428 goto out; 429 430 skb->protocol = htons(ETH_P_IPV6); 431 432 /* Ethernet header */ 433 skb_reset_mac_header(skb); 434 eth = eth_hdr(skb); 435 436 memcpy(eth->h_source, br->dev->dev_addr, ETH_ALEN); 437 eth->h_proto = htons(ETH_P_IPV6); 438 skb_put(skb, sizeof(*eth)); 439 440 /* IPv6 header + HbH option */ 441 skb_set_network_header(skb, skb->len); 442 ip6h = ipv6_hdr(skb); 443 444 *(__force __be32 *)ip6h = htonl(0x60000000); 445 ip6h->payload_len = htons(8 + sizeof(*mldq)); 446 ip6h->nexthdr = IPPROTO_HOPOPTS; 447 ip6h->hop_limit = 1; 448 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1)); 449 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0, 450 &ip6h->saddr)) { 451 kfree_skb(skb); 452 return NULL; 453 } 454 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest); 455 456 hopopt = (u8 *)(ip6h + 1); 457 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */ 458 hopopt[1] = 0; /* length of HbH */ 459 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */ 460 hopopt[3] = 2; /* Length of RA Option */ 461 hopopt[4] = 0; /* Type = 0x0000 (MLD) */ 462 hopopt[5] = 0; 463 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */ 464 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */ 465 466 skb_put(skb, sizeof(*ip6h) + 8); 467 468 /* ICMPv6 */ 469 skb_set_transport_header(skb, skb->len); 470 mldq = (struct mld_msg *) icmp6_hdr(skb); 471 472 interval = ipv6_addr_any(group) ? 473 br->multicast_query_response_interval : 474 br->multicast_last_member_interval; 475 476 mldq->mld_type = ICMPV6_MGM_QUERY; 477 mldq->mld_code = 0; 478 mldq->mld_cksum = 0; 479 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval)); 480 mldq->mld_reserved = 0; 481 mldq->mld_mca = *group; 482 483 /* checksum */ 484 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, 485 sizeof(*mldq), IPPROTO_ICMPV6, 486 csum_partial(mldq, 487 sizeof(*mldq), 0)); 488 skb_put(skb, sizeof(*mldq)); 489 490 __skb_pull(skb, sizeof(*eth)); 491 492 out: 493 return skb; 494 } 495 #endif 496 497 static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br, 498 struct br_ip *addr) 499 { 500 switch (addr->proto) { 501 case htons(ETH_P_IP): 502 return br_ip4_multicast_alloc_query(br, addr->u.ip4); 503 #if IS_ENABLED(CONFIG_IPV6) 504 case htons(ETH_P_IPV6): 505 return br_ip6_multicast_alloc_query(br, &addr->u.ip6); 506 #endif 507 } 508 return NULL; 509 } 510 511 static struct net_bridge_mdb_entry *br_multicast_get_group( 512 struct net_bridge *br, struct net_bridge_port *port, 513 struct br_ip *group, int hash) 514 { 515 struct net_bridge_mdb_htable *mdb; 516 struct net_bridge_mdb_entry *mp; 517 unsigned int count = 0; 518 unsigned int max; 519 int elasticity; 520 int err; 521 522 mdb = rcu_dereference_protected(br->mdb, 1); 523 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) { 524 count++; 525 if (unlikely(br_ip_equal(group, &mp->addr))) 526 return mp; 527 } 528 529 elasticity = 0; 530 max = mdb->max; 531 532 if (unlikely(count > br->hash_elasticity && count)) { 533 if (net_ratelimit()) 534 br_info(br, "Multicast hash table " 535 "chain limit reached: %s\n", 536 port ? port->dev->name : br->dev->name); 537 538 elasticity = br->hash_elasticity; 539 } 540 541 if (mdb->size >= max) { 542 max *= 2; 543 if (unlikely(max > br->hash_max)) { 544 br_warn(br, "Multicast hash table maximum of %d " 545 "reached, disabling snooping: %s\n", 546 br->hash_max, 547 port ? port->dev->name : br->dev->name); 548 err = -E2BIG; 549 disable: 550 br->multicast_disabled = 1; 551 goto err; 552 } 553 } 554 555 if (max > mdb->max || elasticity) { 556 if (mdb->old) { 557 if (net_ratelimit()) 558 br_info(br, "Multicast hash table " 559 "on fire: %s\n", 560 port ? port->dev->name : br->dev->name); 561 err = -EEXIST; 562 goto err; 563 } 564 565 err = br_mdb_rehash(&br->mdb, max, elasticity); 566 if (err) { 567 br_warn(br, "Cannot rehash multicast " 568 "hash table, disabling snooping: %s, %d, %d\n", 569 port ? port->dev->name : br->dev->name, 570 mdb->size, err); 571 goto disable; 572 } 573 574 err = -EAGAIN; 575 goto err; 576 } 577 578 return NULL; 579 580 err: 581 mp = ERR_PTR(err); 582 return mp; 583 } 584 585 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br, 586 struct net_bridge_port *port, struct br_ip *group) 587 { 588 struct net_bridge_mdb_htable *mdb; 589 struct net_bridge_mdb_entry *mp; 590 int hash; 591 int err; 592 593 mdb = rcu_dereference_protected(br->mdb, 1); 594 if (!mdb) { 595 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0); 596 if (err) 597 return ERR_PTR(err); 598 goto rehash; 599 } 600 601 hash = br_ip_hash(mdb, group); 602 mp = br_multicast_get_group(br, port, group, hash); 603 switch (PTR_ERR(mp)) { 604 case 0: 605 break; 606 607 case -EAGAIN: 608 rehash: 609 mdb = rcu_dereference_protected(br->mdb, 1); 610 hash = br_ip_hash(mdb, group); 611 break; 612 613 default: 614 goto out; 615 } 616 617 mp = kzalloc(sizeof(*mp), GFP_ATOMIC); 618 if (unlikely(!mp)) 619 return ERR_PTR(-ENOMEM); 620 621 mp->br = br; 622 mp->addr = *group; 623 setup_timer(&mp->timer, br_multicast_group_expired, 624 (unsigned long)mp); 625 626 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]); 627 mdb->size++; 628 629 out: 630 return mp; 631 } 632 633 struct net_bridge_port_group *br_multicast_new_port_group( 634 struct net_bridge_port *port, 635 struct br_ip *group, 636 struct net_bridge_port_group __rcu *next, 637 unsigned char state) 638 { 639 struct net_bridge_port_group *p; 640 641 p = kzalloc(sizeof(*p), GFP_ATOMIC); 642 if (unlikely(!p)) 643 return NULL; 644 645 p->addr = *group; 646 p->port = port; 647 p->state = state; 648 rcu_assign_pointer(p->next, next); 649 hlist_add_head(&p->mglist, &port->mglist); 650 setup_timer(&p->timer, br_multicast_port_group_expired, 651 (unsigned long)p); 652 return p; 653 } 654 655 static int br_multicast_add_group(struct net_bridge *br, 656 struct net_bridge_port *port, 657 struct br_ip *group) 658 { 659 struct net_bridge_mdb_entry *mp; 660 struct net_bridge_port_group *p; 661 struct net_bridge_port_group __rcu **pp; 662 unsigned long now = jiffies; 663 int err; 664 665 spin_lock(&br->multicast_lock); 666 if (!netif_running(br->dev) || 667 (port && port->state == BR_STATE_DISABLED)) 668 goto out; 669 670 mp = br_multicast_new_group(br, port, group); 671 err = PTR_ERR(mp); 672 if (IS_ERR(mp)) 673 goto err; 674 675 if (!port) { 676 mp->mglist = true; 677 mod_timer(&mp->timer, now + br->multicast_membership_interval); 678 goto out; 679 } 680 681 for (pp = &mp->ports; 682 (p = mlock_dereference(*pp, br)) != NULL; 683 pp = &p->next) { 684 if (p->port == port) 685 goto found; 686 if ((unsigned long)p->port < (unsigned long)port) 687 break; 688 } 689 690 p = br_multicast_new_port_group(port, group, *pp, MDB_TEMPORARY); 691 if (unlikely(!p)) 692 goto err; 693 rcu_assign_pointer(*pp, p); 694 br_mdb_notify(br->dev, port, group, RTM_NEWMDB); 695 696 found: 697 mod_timer(&p->timer, now + br->multicast_membership_interval); 698 out: 699 err = 0; 700 701 err: 702 spin_unlock(&br->multicast_lock); 703 return err; 704 } 705 706 static int br_ip4_multicast_add_group(struct net_bridge *br, 707 struct net_bridge_port *port, 708 __be32 group, 709 __u16 vid) 710 { 711 struct br_ip br_group; 712 713 if (ipv4_is_local_multicast(group)) 714 return 0; 715 716 br_group.u.ip4 = group; 717 br_group.proto = htons(ETH_P_IP); 718 br_group.vid = vid; 719 720 return br_multicast_add_group(br, port, &br_group); 721 } 722 723 #if IS_ENABLED(CONFIG_IPV6) 724 static int br_ip6_multicast_add_group(struct net_bridge *br, 725 struct net_bridge_port *port, 726 const struct in6_addr *group, 727 __u16 vid) 728 { 729 struct br_ip br_group; 730 731 if (ipv6_addr_is_ll_all_nodes(group)) 732 return 0; 733 734 br_group.u.ip6 = *group; 735 br_group.proto = htons(ETH_P_IPV6); 736 br_group.vid = vid; 737 738 return br_multicast_add_group(br, port, &br_group); 739 } 740 #endif 741 742 static void br_multicast_router_expired(unsigned long data) 743 { 744 struct net_bridge_port *port = (void *)data; 745 struct net_bridge *br = port->br; 746 747 spin_lock(&br->multicast_lock); 748 if (port->multicast_router != 1 || 749 timer_pending(&port->multicast_router_timer) || 750 hlist_unhashed(&port->rlist)) 751 goto out; 752 753 hlist_del_init_rcu(&port->rlist); 754 755 out: 756 spin_unlock(&br->multicast_lock); 757 } 758 759 static void br_multicast_local_router_expired(unsigned long data) 760 { 761 } 762 763 static void br_multicast_querier_expired(struct net_bridge *br, 764 struct bridge_mcast_query *query) 765 { 766 spin_lock(&br->multicast_lock); 767 if (!netif_running(br->dev) || br->multicast_disabled) 768 goto out; 769 770 br_multicast_start_querier(br, query); 771 772 out: 773 spin_unlock(&br->multicast_lock); 774 } 775 776 static void br_ip4_multicast_querier_expired(unsigned long data) 777 { 778 struct net_bridge *br = (void *)data; 779 780 br_multicast_querier_expired(br, &br->ip4_query); 781 } 782 783 #if IS_ENABLED(CONFIG_IPV6) 784 static void br_ip6_multicast_querier_expired(unsigned long data) 785 { 786 struct net_bridge *br = (void *)data; 787 788 br_multicast_querier_expired(br, &br->ip6_query); 789 } 790 #endif 791 792 static void __br_multicast_send_query(struct net_bridge *br, 793 struct net_bridge_port *port, 794 struct br_ip *ip) 795 { 796 struct sk_buff *skb; 797 798 skb = br_multicast_alloc_query(br, ip); 799 if (!skb) 800 return; 801 802 if (port) { 803 __skb_push(skb, sizeof(struct ethhdr)); 804 skb->dev = port->dev; 805 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, skb, NULL, skb->dev, 806 dev_queue_xmit); 807 } else 808 netif_rx(skb); 809 } 810 811 static void br_multicast_send_query(struct net_bridge *br, 812 struct net_bridge_port *port, 813 struct bridge_mcast_query *query) 814 { 815 unsigned long time; 816 struct br_ip br_group; 817 struct bridge_mcast_querier *querier = NULL; 818 819 if (!netif_running(br->dev) || br->multicast_disabled || 820 !br->multicast_querier) 821 return; 822 823 memset(&br_group.u, 0, sizeof(br_group.u)); 824 825 if (port ? (query == &port->ip4_query) : 826 (query == &br->ip4_query)) { 827 querier = &br->ip4_querier; 828 br_group.proto = htons(ETH_P_IP); 829 #if IS_ENABLED(CONFIG_IPV6) 830 } else { 831 querier = &br->ip6_querier; 832 br_group.proto = htons(ETH_P_IPV6); 833 #endif 834 } 835 836 if (!querier || timer_pending(&querier->timer)) 837 return; 838 839 __br_multicast_send_query(br, port, &br_group); 840 841 time = jiffies; 842 time += query->startup_sent < br->multicast_startup_query_count ? 843 br->multicast_startup_query_interval : 844 br->multicast_query_interval; 845 mod_timer(&query->timer, time); 846 } 847 848 static void br_multicast_port_query_expired(struct net_bridge_port *port, 849 struct bridge_mcast_query *query) 850 { 851 struct net_bridge *br = port->br; 852 853 spin_lock(&br->multicast_lock); 854 if (port->state == BR_STATE_DISABLED || 855 port->state == BR_STATE_BLOCKING) 856 goto out; 857 858 if (query->startup_sent < br->multicast_startup_query_count) 859 query->startup_sent++; 860 861 br_multicast_send_query(port->br, port, query); 862 863 out: 864 spin_unlock(&br->multicast_lock); 865 } 866 867 static void br_ip4_multicast_port_query_expired(unsigned long data) 868 { 869 struct net_bridge_port *port = (void *)data; 870 871 br_multicast_port_query_expired(port, &port->ip4_query); 872 } 873 874 #if IS_ENABLED(CONFIG_IPV6) 875 static void br_ip6_multicast_port_query_expired(unsigned long data) 876 { 877 struct net_bridge_port *port = (void *)data; 878 879 br_multicast_port_query_expired(port, &port->ip6_query); 880 } 881 #endif 882 883 void br_multicast_add_port(struct net_bridge_port *port) 884 { 885 port->multicast_router = 1; 886 887 setup_timer(&port->multicast_router_timer, br_multicast_router_expired, 888 (unsigned long)port); 889 setup_timer(&port->ip4_query.timer, br_ip4_multicast_port_query_expired, 890 (unsigned long)port); 891 #if IS_ENABLED(CONFIG_IPV6) 892 setup_timer(&port->ip6_query.timer, br_ip6_multicast_port_query_expired, 893 (unsigned long)port); 894 #endif 895 } 896 897 void br_multicast_del_port(struct net_bridge_port *port) 898 { 899 del_timer_sync(&port->multicast_router_timer); 900 } 901 902 static void br_multicast_enable(struct bridge_mcast_query *query) 903 { 904 query->startup_sent = 0; 905 906 if (try_to_del_timer_sync(&query->timer) >= 0 || 907 del_timer(&query->timer)) 908 mod_timer(&query->timer, jiffies); 909 } 910 911 void br_multicast_enable_port(struct net_bridge_port *port) 912 { 913 struct net_bridge *br = port->br; 914 915 spin_lock(&br->multicast_lock); 916 if (br->multicast_disabled || !netif_running(br->dev)) 917 goto out; 918 919 br_multicast_enable(&port->ip4_query); 920 #if IS_ENABLED(CONFIG_IPV6) 921 br_multicast_enable(&port->ip6_query); 922 #endif 923 924 out: 925 spin_unlock(&br->multicast_lock); 926 } 927 928 void br_multicast_disable_port(struct net_bridge_port *port) 929 { 930 struct net_bridge *br = port->br; 931 struct net_bridge_port_group *pg; 932 struct hlist_node *n; 933 934 spin_lock(&br->multicast_lock); 935 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist) 936 br_multicast_del_pg(br, pg); 937 938 if (!hlist_unhashed(&port->rlist)) 939 hlist_del_init_rcu(&port->rlist); 940 del_timer(&port->multicast_router_timer); 941 del_timer(&port->ip4_query.timer); 942 #if IS_ENABLED(CONFIG_IPV6) 943 del_timer(&port->ip6_query.timer); 944 #endif 945 spin_unlock(&br->multicast_lock); 946 } 947 948 static int br_ip4_multicast_igmp3_report(struct net_bridge *br, 949 struct net_bridge_port *port, 950 struct sk_buff *skb, 951 u16 vid) 952 { 953 struct igmpv3_report *ih; 954 struct igmpv3_grec *grec; 955 int i; 956 int len; 957 int num; 958 int type; 959 int err = 0; 960 __be32 group; 961 962 if (!pskb_may_pull(skb, sizeof(*ih))) 963 return -EINVAL; 964 965 ih = igmpv3_report_hdr(skb); 966 num = ntohs(ih->ngrec); 967 len = sizeof(*ih); 968 969 for (i = 0; i < num; i++) { 970 len += sizeof(*grec); 971 if (!pskb_may_pull(skb, len)) 972 return -EINVAL; 973 974 grec = (void *)(skb->data + len - sizeof(*grec)); 975 group = grec->grec_mca; 976 type = grec->grec_type; 977 978 len += ntohs(grec->grec_nsrcs) * 4; 979 if (!pskb_may_pull(skb, len)) 980 return -EINVAL; 981 982 /* We treat this as an IGMPv2 report for now. */ 983 switch (type) { 984 case IGMPV3_MODE_IS_INCLUDE: 985 case IGMPV3_MODE_IS_EXCLUDE: 986 case IGMPV3_CHANGE_TO_INCLUDE: 987 case IGMPV3_CHANGE_TO_EXCLUDE: 988 case IGMPV3_ALLOW_NEW_SOURCES: 989 case IGMPV3_BLOCK_OLD_SOURCES: 990 break; 991 992 default: 993 continue; 994 } 995 996 err = br_ip4_multicast_add_group(br, port, group, vid); 997 if (err) 998 break; 999 } 1000 1001 return err; 1002 } 1003 1004 #if IS_ENABLED(CONFIG_IPV6) 1005 static int br_ip6_multicast_mld2_report(struct net_bridge *br, 1006 struct net_bridge_port *port, 1007 struct sk_buff *skb, 1008 u16 vid) 1009 { 1010 struct icmp6hdr *icmp6h; 1011 struct mld2_grec *grec; 1012 int i; 1013 int len; 1014 int num; 1015 int err = 0; 1016 1017 if (!pskb_may_pull(skb, sizeof(*icmp6h))) 1018 return -EINVAL; 1019 1020 icmp6h = icmp6_hdr(skb); 1021 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]); 1022 len = sizeof(*icmp6h); 1023 1024 for (i = 0; i < num; i++) { 1025 __be16 *nsrcs, _nsrcs; 1026 1027 nsrcs = skb_header_pointer(skb, 1028 len + offsetof(struct mld2_grec, 1029 grec_nsrcs), 1030 sizeof(_nsrcs), &_nsrcs); 1031 if (!nsrcs) 1032 return -EINVAL; 1033 1034 if (!pskb_may_pull(skb, 1035 len + sizeof(*grec) + 1036 sizeof(struct in6_addr) * ntohs(*nsrcs))) 1037 return -EINVAL; 1038 1039 grec = (struct mld2_grec *)(skb->data + len); 1040 len += sizeof(*grec) + 1041 sizeof(struct in6_addr) * ntohs(*nsrcs); 1042 1043 /* We treat these as MLDv1 reports for now. */ 1044 switch (grec->grec_type) { 1045 case MLD2_MODE_IS_INCLUDE: 1046 case MLD2_MODE_IS_EXCLUDE: 1047 case MLD2_CHANGE_TO_INCLUDE: 1048 case MLD2_CHANGE_TO_EXCLUDE: 1049 case MLD2_ALLOW_NEW_SOURCES: 1050 case MLD2_BLOCK_OLD_SOURCES: 1051 break; 1052 1053 default: 1054 continue; 1055 } 1056 1057 err = br_ip6_multicast_add_group(br, port, &grec->grec_mca, 1058 vid); 1059 if (!err) 1060 break; 1061 } 1062 1063 return err; 1064 } 1065 #endif 1066 1067 static void 1068 br_multicast_update_querier_timer(struct net_bridge *br, 1069 struct bridge_mcast_querier *querier, 1070 unsigned long max_delay) 1071 { 1072 if (!timer_pending(&querier->timer)) 1073 querier->delay_time = jiffies + max_delay; 1074 1075 mod_timer(&querier->timer, jiffies + br->multicast_querier_interval); 1076 } 1077 1078 /* 1079 * Add port to router_list 1080 * list is maintained ordered by pointer value 1081 * and locked by br->multicast_lock and RCU 1082 */ 1083 static void br_multicast_add_router(struct net_bridge *br, 1084 struct net_bridge_port *port) 1085 { 1086 struct net_bridge_port *p; 1087 struct hlist_node *slot = NULL; 1088 1089 hlist_for_each_entry(p, &br->router_list, rlist) { 1090 if ((unsigned long) port >= (unsigned long) p) 1091 break; 1092 slot = &p->rlist; 1093 } 1094 1095 if (slot) 1096 hlist_add_after_rcu(slot, &port->rlist); 1097 else 1098 hlist_add_head_rcu(&port->rlist, &br->router_list); 1099 } 1100 1101 static void br_multicast_mark_router(struct net_bridge *br, 1102 struct net_bridge_port *port) 1103 { 1104 unsigned long now = jiffies; 1105 1106 if (!port) { 1107 if (br->multicast_router == 1) 1108 mod_timer(&br->multicast_router_timer, 1109 now + br->multicast_querier_interval); 1110 return; 1111 } 1112 1113 if (port->multicast_router != 1) 1114 return; 1115 1116 if (!hlist_unhashed(&port->rlist)) 1117 goto timer; 1118 1119 br_multicast_add_router(br, port); 1120 1121 timer: 1122 mod_timer(&port->multicast_router_timer, 1123 now + br->multicast_querier_interval); 1124 } 1125 1126 static void br_multicast_query_received(struct net_bridge *br, 1127 struct net_bridge_port *port, 1128 struct bridge_mcast_querier *querier, 1129 int saddr, 1130 unsigned long max_delay) 1131 { 1132 if (saddr) 1133 br_multicast_update_querier_timer(br, querier, max_delay); 1134 else if (timer_pending(&querier->timer)) 1135 return; 1136 1137 br_multicast_mark_router(br, port); 1138 } 1139 1140 static int br_ip4_multicast_query(struct net_bridge *br, 1141 struct net_bridge_port *port, 1142 struct sk_buff *skb, 1143 u16 vid) 1144 { 1145 const struct iphdr *iph = ip_hdr(skb); 1146 struct igmphdr *ih = igmp_hdr(skb); 1147 struct net_bridge_mdb_entry *mp; 1148 struct igmpv3_query *ih3; 1149 struct net_bridge_port_group *p; 1150 struct net_bridge_port_group __rcu **pp; 1151 unsigned long max_delay; 1152 unsigned long now = jiffies; 1153 __be32 group; 1154 int err = 0; 1155 1156 spin_lock(&br->multicast_lock); 1157 if (!netif_running(br->dev) || 1158 (port && port->state == BR_STATE_DISABLED)) 1159 goto out; 1160 1161 group = ih->group; 1162 1163 if (skb->len == sizeof(*ih)) { 1164 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE); 1165 1166 if (!max_delay) { 1167 max_delay = 10 * HZ; 1168 group = 0; 1169 } 1170 } else { 1171 if (!pskb_may_pull(skb, sizeof(struct igmpv3_query))) { 1172 err = -EINVAL; 1173 goto out; 1174 } 1175 1176 ih3 = igmpv3_query_hdr(skb); 1177 if (ih3->nsrcs) 1178 goto out; 1179 1180 max_delay = ih3->code ? 1181 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1; 1182 } 1183 1184 br_multicast_query_received(br, port, &br->ip4_querier, !!iph->saddr, 1185 max_delay); 1186 1187 if (!group) 1188 goto out; 1189 1190 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid); 1191 if (!mp) 1192 goto out; 1193 1194 max_delay *= br->multicast_last_member_count; 1195 1196 if (mp->mglist && 1197 (timer_pending(&mp->timer) ? 1198 time_after(mp->timer.expires, now + max_delay) : 1199 try_to_del_timer_sync(&mp->timer) >= 0)) 1200 mod_timer(&mp->timer, now + max_delay); 1201 1202 for (pp = &mp->ports; 1203 (p = mlock_dereference(*pp, br)) != NULL; 1204 pp = &p->next) { 1205 if (timer_pending(&p->timer) ? 1206 time_after(p->timer.expires, now + max_delay) : 1207 try_to_del_timer_sync(&p->timer) >= 0) 1208 mod_timer(&p->timer, now + max_delay); 1209 } 1210 1211 out: 1212 spin_unlock(&br->multicast_lock); 1213 return err; 1214 } 1215 1216 #if IS_ENABLED(CONFIG_IPV6) 1217 static int br_ip6_multicast_query(struct net_bridge *br, 1218 struct net_bridge_port *port, 1219 struct sk_buff *skb, 1220 u16 vid) 1221 { 1222 const struct ipv6hdr *ip6h = ipv6_hdr(skb); 1223 struct mld_msg *mld; 1224 struct net_bridge_mdb_entry *mp; 1225 struct mld2_query *mld2q; 1226 struct net_bridge_port_group *p; 1227 struct net_bridge_port_group __rcu **pp; 1228 unsigned long max_delay; 1229 unsigned long now = jiffies; 1230 const struct in6_addr *group = NULL; 1231 int err = 0; 1232 1233 spin_lock(&br->multicast_lock); 1234 if (!netif_running(br->dev) || 1235 (port && port->state == BR_STATE_DISABLED)) 1236 goto out; 1237 1238 if (skb->len == sizeof(*mld)) { 1239 if (!pskb_may_pull(skb, sizeof(*mld))) { 1240 err = -EINVAL; 1241 goto out; 1242 } 1243 mld = (struct mld_msg *) icmp6_hdr(skb); 1244 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay)); 1245 if (max_delay) 1246 group = &mld->mld_mca; 1247 } else { 1248 if (!pskb_may_pull(skb, sizeof(*mld2q))) { 1249 err = -EINVAL; 1250 goto out; 1251 } 1252 mld2q = (struct mld2_query *)icmp6_hdr(skb); 1253 if (!mld2q->mld2q_nsrcs) 1254 group = &mld2q->mld2q_mca; 1255 1256 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL); 1257 } 1258 1259 br_multicast_query_received(br, port, &br->ip6_querier, 1260 !ipv6_addr_any(&ip6h->saddr), max_delay); 1261 1262 if (!group) 1263 goto out; 1264 1265 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid); 1266 if (!mp) 1267 goto out; 1268 1269 max_delay *= br->multicast_last_member_count; 1270 if (mp->mglist && 1271 (timer_pending(&mp->timer) ? 1272 time_after(mp->timer.expires, now + max_delay) : 1273 try_to_del_timer_sync(&mp->timer) >= 0)) 1274 mod_timer(&mp->timer, now + max_delay); 1275 1276 for (pp = &mp->ports; 1277 (p = mlock_dereference(*pp, br)) != NULL; 1278 pp = &p->next) { 1279 if (timer_pending(&p->timer) ? 1280 time_after(p->timer.expires, now + max_delay) : 1281 try_to_del_timer_sync(&p->timer) >= 0) 1282 mod_timer(&p->timer, now + max_delay); 1283 } 1284 1285 out: 1286 spin_unlock(&br->multicast_lock); 1287 return err; 1288 } 1289 #endif 1290 1291 static void br_multicast_leave_group(struct net_bridge *br, 1292 struct net_bridge_port *port, 1293 struct br_ip *group, 1294 struct bridge_mcast_querier *querier, 1295 struct bridge_mcast_query *query) 1296 { 1297 struct net_bridge_mdb_htable *mdb; 1298 struct net_bridge_mdb_entry *mp; 1299 struct net_bridge_port_group *p; 1300 unsigned long now; 1301 unsigned long time; 1302 1303 spin_lock(&br->multicast_lock); 1304 if (!netif_running(br->dev) || 1305 (port && port->state == BR_STATE_DISABLED) || 1306 timer_pending(&querier->timer)) 1307 goto out; 1308 1309 mdb = mlock_dereference(br->mdb, br); 1310 mp = br_mdb_ip_get(mdb, group); 1311 if (!mp) 1312 goto out; 1313 1314 if (br->multicast_querier) { 1315 __br_multicast_send_query(br, port, &mp->addr); 1316 1317 time = jiffies + br->multicast_last_member_count * 1318 br->multicast_last_member_interval; 1319 1320 mod_timer(&query->timer, time); 1321 1322 for (p = mlock_dereference(mp->ports, br); 1323 p != NULL; 1324 p = mlock_dereference(p->next, br)) { 1325 if (p->port != port) 1326 continue; 1327 1328 if (!hlist_unhashed(&p->mglist) && 1329 (timer_pending(&p->timer) ? 1330 time_after(p->timer.expires, time) : 1331 try_to_del_timer_sync(&p->timer) >= 0)) { 1332 mod_timer(&p->timer, time); 1333 } 1334 1335 break; 1336 } 1337 } 1338 1339 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) { 1340 struct net_bridge_port_group __rcu **pp; 1341 1342 for (pp = &mp->ports; 1343 (p = mlock_dereference(*pp, br)) != NULL; 1344 pp = &p->next) { 1345 if (p->port != port) 1346 continue; 1347 1348 rcu_assign_pointer(*pp, p->next); 1349 hlist_del_init(&p->mglist); 1350 del_timer(&p->timer); 1351 call_rcu_bh(&p->rcu, br_multicast_free_pg); 1352 br_mdb_notify(br->dev, port, group, RTM_DELMDB); 1353 1354 if (!mp->ports && !mp->mglist && 1355 netif_running(br->dev)) 1356 mod_timer(&mp->timer, jiffies); 1357 } 1358 goto out; 1359 } 1360 1361 now = jiffies; 1362 time = now + br->multicast_last_member_count * 1363 br->multicast_last_member_interval; 1364 1365 if (!port) { 1366 if (mp->mglist && 1367 (timer_pending(&mp->timer) ? 1368 time_after(mp->timer.expires, time) : 1369 try_to_del_timer_sync(&mp->timer) >= 0)) { 1370 mod_timer(&mp->timer, time); 1371 } 1372 1373 goto out; 1374 } 1375 1376 for (p = mlock_dereference(mp->ports, br); 1377 p != NULL; 1378 p = mlock_dereference(p->next, br)) { 1379 if (p->port != port) 1380 continue; 1381 1382 if (!hlist_unhashed(&p->mglist) && 1383 (timer_pending(&p->timer) ? 1384 time_after(p->timer.expires, time) : 1385 try_to_del_timer_sync(&p->timer) >= 0)) { 1386 mod_timer(&p->timer, time); 1387 } 1388 1389 break; 1390 } 1391 out: 1392 spin_unlock(&br->multicast_lock); 1393 } 1394 1395 static void br_ip4_multicast_leave_group(struct net_bridge *br, 1396 struct net_bridge_port *port, 1397 __be32 group, 1398 __u16 vid) 1399 { 1400 struct br_ip br_group; 1401 struct bridge_mcast_query *query = port ? &port->ip4_query : 1402 &br->ip4_query; 1403 1404 if (ipv4_is_local_multicast(group)) 1405 return; 1406 1407 br_group.u.ip4 = group; 1408 br_group.proto = htons(ETH_P_IP); 1409 br_group.vid = vid; 1410 1411 br_multicast_leave_group(br, port, &br_group, &br->ip4_querier, query); 1412 } 1413 1414 #if IS_ENABLED(CONFIG_IPV6) 1415 static void br_ip6_multicast_leave_group(struct net_bridge *br, 1416 struct net_bridge_port *port, 1417 const struct in6_addr *group, 1418 __u16 vid) 1419 { 1420 struct br_ip br_group; 1421 struct bridge_mcast_query *query = port ? &port->ip6_query : 1422 &br->ip6_query; 1423 1424 1425 if (ipv6_addr_is_ll_all_nodes(group)) 1426 return; 1427 1428 br_group.u.ip6 = *group; 1429 br_group.proto = htons(ETH_P_IPV6); 1430 br_group.vid = vid; 1431 1432 br_multicast_leave_group(br, port, &br_group, &br->ip6_querier, query); 1433 } 1434 #endif 1435 1436 static int br_multicast_ipv4_rcv(struct net_bridge *br, 1437 struct net_bridge_port *port, 1438 struct sk_buff *skb, 1439 u16 vid) 1440 { 1441 struct sk_buff *skb2 = skb; 1442 const struct iphdr *iph; 1443 struct igmphdr *ih; 1444 unsigned int len; 1445 unsigned int offset; 1446 int err; 1447 1448 /* We treat OOM as packet loss for now. */ 1449 if (!pskb_may_pull(skb, sizeof(*iph))) 1450 return -EINVAL; 1451 1452 iph = ip_hdr(skb); 1453 1454 if (iph->ihl < 5 || iph->version != 4) 1455 return -EINVAL; 1456 1457 if (!pskb_may_pull(skb, ip_hdrlen(skb))) 1458 return -EINVAL; 1459 1460 iph = ip_hdr(skb); 1461 1462 if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl))) 1463 return -EINVAL; 1464 1465 if (iph->protocol != IPPROTO_IGMP) { 1466 if (!ipv4_is_local_multicast(iph->daddr)) 1467 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1468 return 0; 1469 } 1470 1471 len = ntohs(iph->tot_len); 1472 if (skb->len < len || len < ip_hdrlen(skb)) 1473 return -EINVAL; 1474 1475 if (skb->len > len) { 1476 skb2 = skb_clone(skb, GFP_ATOMIC); 1477 if (!skb2) 1478 return -ENOMEM; 1479 1480 err = pskb_trim_rcsum(skb2, len); 1481 if (err) 1482 goto err_out; 1483 } 1484 1485 len -= ip_hdrlen(skb2); 1486 offset = skb_network_offset(skb2) + ip_hdrlen(skb2); 1487 __skb_pull(skb2, offset); 1488 skb_reset_transport_header(skb2); 1489 1490 err = -EINVAL; 1491 if (!pskb_may_pull(skb2, sizeof(*ih))) 1492 goto out; 1493 1494 switch (skb2->ip_summed) { 1495 case CHECKSUM_COMPLETE: 1496 if (!csum_fold(skb2->csum)) 1497 break; 1498 /* fall through */ 1499 case CHECKSUM_NONE: 1500 skb2->csum = 0; 1501 if (skb_checksum_complete(skb2)) 1502 goto out; 1503 } 1504 1505 err = 0; 1506 1507 BR_INPUT_SKB_CB(skb)->igmp = 1; 1508 ih = igmp_hdr(skb2); 1509 1510 switch (ih->type) { 1511 case IGMP_HOST_MEMBERSHIP_REPORT: 1512 case IGMPV2_HOST_MEMBERSHIP_REPORT: 1513 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1514 err = br_ip4_multicast_add_group(br, port, ih->group, vid); 1515 break; 1516 case IGMPV3_HOST_MEMBERSHIP_REPORT: 1517 err = br_ip4_multicast_igmp3_report(br, port, skb2, vid); 1518 break; 1519 case IGMP_HOST_MEMBERSHIP_QUERY: 1520 err = br_ip4_multicast_query(br, port, skb2, vid); 1521 break; 1522 case IGMP_HOST_LEAVE_MESSAGE: 1523 br_ip4_multicast_leave_group(br, port, ih->group, vid); 1524 break; 1525 } 1526 1527 out: 1528 __skb_push(skb2, offset); 1529 err_out: 1530 if (skb2 != skb) 1531 kfree_skb(skb2); 1532 return err; 1533 } 1534 1535 #if IS_ENABLED(CONFIG_IPV6) 1536 static int br_multicast_ipv6_rcv(struct net_bridge *br, 1537 struct net_bridge_port *port, 1538 struct sk_buff *skb, 1539 u16 vid) 1540 { 1541 struct sk_buff *skb2; 1542 const struct ipv6hdr *ip6h; 1543 u8 icmp6_type; 1544 u8 nexthdr; 1545 __be16 frag_off; 1546 unsigned int len; 1547 int offset; 1548 int err; 1549 1550 if (!pskb_may_pull(skb, sizeof(*ip6h))) 1551 return -EINVAL; 1552 1553 ip6h = ipv6_hdr(skb); 1554 1555 /* 1556 * We're interested in MLD messages only. 1557 * - Version is 6 1558 * - MLD has always Router Alert hop-by-hop option 1559 * - But we do not support jumbrograms. 1560 */ 1561 if (ip6h->version != 6) 1562 return 0; 1563 1564 /* Prevent flooding this packet if there is no listener present */ 1565 if (!ipv6_addr_is_ll_all_nodes(&ip6h->daddr)) 1566 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1567 1568 if (ip6h->nexthdr != IPPROTO_HOPOPTS || 1569 ip6h->payload_len == 0) 1570 return 0; 1571 1572 len = ntohs(ip6h->payload_len) + sizeof(*ip6h); 1573 if (skb->len < len) 1574 return -EINVAL; 1575 1576 nexthdr = ip6h->nexthdr; 1577 offset = ipv6_skip_exthdr(skb, sizeof(*ip6h), &nexthdr, &frag_off); 1578 1579 if (offset < 0 || nexthdr != IPPROTO_ICMPV6) 1580 return 0; 1581 1582 /* Okay, we found ICMPv6 header */ 1583 skb2 = skb_clone(skb, GFP_ATOMIC); 1584 if (!skb2) 1585 return -ENOMEM; 1586 1587 err = -EINVAL; 1588 if (!pskb_may_pull(skb2, offset + sizeof(struct icmp6hdr))) 1589 goto out; 1590 1591 len -= offset - skb_network_offset(skb2); 1592 1593 __skb_pull(skb2, offset); 1594 skb_reset_transport_header(skb2); 1595 skb_postpull_rcsum(skb2, skb_network_header(skb2), 1596 skb_network_header_len(skb2)); 1597 1598 icmp6_type = icmp6_hdr(skb2)->icmp6_type; 1599 1600 switch (icmp6_type) { 1601 case ICMPV6_MGM_QUERY: 1602 case ICMPV6_MGM_REPORT: 1603 case ICMPV6_MGM_REDUCTION: 1604 case ICMPV6_MLD2_REPORT: 1605 break; 1606 default: 1607 err = 0; 1608 goto out; 1609 } 1610 1611 /* Okay, we found MLD message. Check further. */ 1612 if (skb2->len > len) { 1613 err = pskb_trim_rcsum(skb2, len); 1614 if (err) 1615 goto out; 1616 err = -EINVAL; 1617 } 1618 1619 ip6h = ipv6_hdr(skb2); 1620 1621 switch (skb2->ip_summed) { 1622 case CHECKSUM_COMPLETE: 1623 if (!csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, skb2->len, 1624 IPPROTO_ICMPV6, skb2->csum)) 1625 break; 1626 /*FALLTHROUGH*/ 1627 case CHECKSUM_NONE: 1628 skb2->csum = ~csum_unfold(csum_ipv6_magic(&ip6h->saddr, 1629 &ip6h->daddr, 1630 skb2->len, 1631 IPPROTO_ICMPV6, 0)); 1632 if (__skb_checksum_complete(skb2)) 1633 goto out; 1634 } 1635 1636 err = 0; 1637 1638 BR_INPUT_SKB_CB(skb)->igmp = 1; 1639 1640 switch (icmp6_type) { 1641 case ICMPV6_MGM_REPORT: 1642 { 1643 struct mld_msg *mld; 1644 if (!pskb_may_pull(skb2, sizeof(*mld))) { 1645 err = -EINVAL; 1646 goto out; 1647 } 1648 mld = (struct mld_msg *)skb_transport_header(skb2); 1649 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1650 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid); 1651 break; 1652 } 1653 case ICMPV6_MLD2_REPORT: 1654 err = br_ip6_multicast_mld2_report(br, port, skb2, vid); 1655 break; 1656 case ICMPV6_MGM_QUERY: 1657 err = br_ip6_multicast_query(br, port, skb2, vid); 1658 break; 1659 case ICMPV6_MGM_REDUCTION: 1660 { 1661 struct mld_msg *mld; 1662 if (!pskb_may_pull(skb2, sizeof(*mld))) { 1663 err = -EINVAL; 1664 goto out; 1665 } 1666 mld = (struct mld_msg *)skb_transport_header(skb2); 1667 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid); 1668 } 1669 } 1670 1671 out: 1672 kfree_skb(skb2); 1673 return err; 1674 } 1675 #endif 1676 1677 int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port, 1678 struct sk_buff *skb, u16 vid) 1679 { 1680 BR_INPUT_SKB_CB(skb)->igmp = 0; 1681 BR_INPUT_SKB_CB(skb)->mrouters_only = 0; 1682 1683 if (br->multicast_disabled) 1684 return 0; 1685 1686 switch (skb->protocol) { 1687 case htons(ETH_P_IP): 1688 return br_multicast_ipv4_rcv(br, port, skb, vid); 1689 #if IS_ENABLED(CONFIG_IPV6) 1690 case htons(ETH_P_IPV6): 1691 return br_multicast_ipv6_rcv(br, port, skb, vid); 1692 #endif 1693 } 1694 1695 return 0; 1696 } 1697 1698 static void br_multicast_query_expired(struct net_bridge *br, 1699 struct bridge_mcast_query *query) 1700 { 1701 spin_lock(&br->multicast_lock); 1702 if (query->startup_sent < br->multicast_startup_query_count) 1703 query->startup_sent++; 1704 1705 br_multicast_send_query(br, NULL, query); 1706 spin_unlock(&br->multicast_lock); 1707 } 1708 1709 static void br_ip4_multicast_query_expired(unsigned long data) 1710 { 1711 struct net_bridge *br = (void *)data; 1712 1713 br_multicast_query_expired(br, &br->ip4_query); 1714 } 1715 1716 #if IS_ENABLED(CONFIG_IPV6) 1717 static void br_ip6_multicast_query_expired(unsigned long data) 1718 { 1719 struct net_bridge *br = (void *)data; 1720 1721 br_multicast_query_expired(br, &br->ip6_query); 1722 } 1723 #endif 1724 1725 void br_multicast_init(struct net_bridge *br) 1726 { 1727 br->hash_elasticity = 4; 1728 br->hash_max = 512; 1729 1730 br->multicast_router = 1; 1731 br->multicast_querier = 0; 1732 br->multicast_query_use_ifaddr = 0; 1733 br->multicast_last_member_count = 2; 1734 br->multicast_startup_query_count = 2; 1735 1736 br->multicast_last_member_interval = HZ; 1737 br->multicast_query_response_interval = 10 * HZ; 1738 br->multicast_startup_query_interval = 125 * HZ / 4; 1739 br->multicast_query_interval = 125 * HZ; 1740 br->multicast_querier_interval = 255 * HZ; 1741 br->multicast_membership_interval = 260 * HZ; 1742 1743 br->ip4_querier.delay_time = 0; 1744 #if IS_ENABLED(CONFIG_IPV6) 1745 br->ip6_querier.delay_time = 0; 1746 #endif 1747 1748 spin_lock_init(&br->multicast_lock); 1749 setup_timer(&br->multicast_router_timer, 1750 br_multicast_local_router_expired, 0); 1751 setup_timer(&br->ip4_querier.timer, br_ip4_multicast_querier_expired, 1752 (unsigned long)br); 1753 setup_timer(&br->ip4_query.timer, br_ip4_multicast_query_expired, 1754 (unsigned long)br); 1755 #if IS_ENABLED(CONFIG_IPV6) 1756 setup_timer(&br->ip6_querier.timer, br_ip6_multicast_querier_expired, 1757 (unsigned long)br); 1758 setup_timer(&br->ip6_query.timer, br_ip6_multicast_query_expired, 1759 (unsigned long)br); 1760 #endif 1761 } 1762 1763 static void __br_multicast_open(struct net_bridge *br, 1764 struct bridge_mcast_query *query) 1765 { 1766 query->startup_sent = 0; 1767 1768 if (br->multicast_disabled) 1769 return; 1770 1771 mod_timer(&query->timer, jiffies); 1772 } 1773 1774 void br_multicast_open(struct net_bridge *br) 1775 { 1776 __br_multicast_open(br, &br->ip4_query); 1777 #if IS_ENABLED(CONFIG_IPV6) 1778 __br_multicast_open(br, &br->ip6_query); 1779 #endif 1780 } 1781 1782 void br_multicast_stop(struct net_bridge *br) 1783 { 1784 struct net_bridge_mdb_htable *mdb; 1785 struct net_bridge_mdb_entry *mp; 1786 struct hlist_node *n; 1787 u32 ver; 1788 int i; 1789 1790 del_timer_sync(&br->multicast_router_timer); 1791 del_timer_sync(&br->ip4_querier.timer); 1792 del_timer_sync(&br->ip4_query.timer); 1793 #if IS_ENABLED(CONFIG_IPV6) 1794 del_timer_sync(&br->ip6_querier.timer); 1795 del_timer_sync(&br->ip6_query.timer); 1796 #endif 1797 1798 spin_lock_bh(&br->multicast_lock); 1799 mdb = mlock_dereference(br->mdb, br); 1800 if (!mdb) 1801 goto out; 1802 1803 br->mdb = NULL; 1804 1805 ver = mdb->ver; 1806 for (i = 0; i < mdb->max; i++) { 1807 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i], 1808 hlist[ver]) { 1809 del_timer(&mp->timer); 1810 call_rcu_bh(&mp->rcu, br_multicast_free_group); 1811 } 1812 } 1813 1814 if (mdb->old) { 1815 spin_unlock_bh(&br->multicast_lock); 1816 rcu_barrier_bh(); 1817 spin_lock_bh(&br->multicast_lock); 1818 WARN_ON(mdb->old); 1819 } 1820 1821 mdb->old = mdb; 1822 call_rcu_bh(&mdb->rcu, br_mdb_free); 1823 1824 out: 1825 spin_unlock_bh(&br->multicast_lock); 1826 } 1827 1828 int br_multicast_set_router(struct net_bridge *br, unsigned long val) 1829 { 1830 int err = -ENOENT; 1831 1832 spin_lock_bh(&br->multicast_lock); 1833 if (!netif_running(br->dev)) 1834 goto unlock; 1835 1836 switch (val) { 1837 case 0: 1838 case 2: 1839 del_timer(&br->multicast_router_timer); 1840 /* fall through */ 1841 case 1: 1842 br->multicast_router = val; 1843 err = 0; 1844 break; 1845 1846 default: 1847 err = -EINVAL; 1848 break; 1849 } 1850 1851 unlock: 1852 spin_unlock_bh(&br->multicast_lock); 1853 1854 return err; 1855 } 1856 1857 int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val) 1858 { 1859 struct net_bridge *br = p->br; 1860 int err = -ENOENT; 1861 1862 spin_lock(&br->multicast_lock); 1863 if (!netif_running(br->dev) || p->state == BR_STATE_DISABLED) 1864 goto unlock; 1865 1866 switch (val) { 1867 case 0: 1868 case 1: 1869 case 2: 1870 p->multicast_router = val; 1871 err = 0; 1872 1873 if (val < 2 && !hlist_unhashed(&p->rlist)) 1874 hlist_del_init_rcu(&p->rlist); 1875 1876 if (val == 1) 1877 break; 1878 1879 del_timer(&p->multicast_router_timer); 1880 1881 if (val == 0) 1882 break; 1883 1884 br_multicast_add_router(br, p); 1885 break; 1886 1887 default: 1888 err = -EINVAL; 1889 break; 1890 } 1891 1892 unlock: 1893 spin_unlock(&br->multicast_lock); 1894 1895 return err; 1896 } 1897 1898 static void br_multicast_start_querier(struct net_bridge *br, 1899 struct bridge_mcast_query *query) 1900 { 1901 struct net_bridge_port *port; 1902 1903 __br_multicast_open(br, query); 1904 1905 list_for_each_entry(port, &br->port_list, list) { 1906 if (port->state == BR_STATE_DISABLED || 1907 port->state == BR_STATE_BLOCKING) 1908 continue; 1909 1910 if (query == &br->ip4_query) 1911 br_multicast_enable(&port->ip4_query); 1912 #if IS_ENABLED(CONFIG_IPV6) 1913 else 1914 br_multicast_enable(&port->ip6_query); 1915 #endif 1916 } 1917 } 1918 1919 int br_multicast_toggle(struct net_bridge *br, unsigned long val) 1920 { 1921 int err = 0; 1922 struct net_bridge_mdb_htable *mdb; 1923 1924 spin_lock_bh(&br->multicast_lock); 1925 if (br->multicast_disabled == !val) 1926 goto unlock; 1927 1928 br->multicast_disabled = !val; 1929 if (br->multicast_disabled) 1930 goto unlock; 1931 1932 if (!netif_running(br->dev)) 1933 goto unlock; 1934 1935 mdb = mlock_dereference(br->mdb, br); 1936 if (mdb) { 1937 if (mdb->old) { 1938 err = -EEXIST; 1939 rollback: 1940 br->multicast_disabled = !!val; 1941 goto unlock; 1942 } 1943 1944 err = br_mdb_rehash(&br->mdb, mdb->max, 1945 br->hash_elasticity); 1946 if (err) 1947 goto rollback; 1948 } 1949 1950 br_multicast_start_querier(br, &br->ip4_query); 1951 #if IS_ENABLED(CONFIG_IPV6) 1952 br_multicast_start_querier(br, &br->ip6_query); 1953 #endif 1954 1955 unlock: 1956 spin_unlock_bh(&br->multicast_lock); 1957 1958 return err; 1959 } 1960 1961 int br_multicast_set_querier(struct net_bridge *br, unsigned long val) 1962 { 1963 unsigned long max_delay; 1964 1965 val = !!val; 1966 1967 spin_lock_bh(&br->multicast_lock); 1968 if (br->multicast_querier == val) 1969 goto unlock; 1970 1971 br->multicast_querier = val; 1972 if (!val) 1973 goto unlock; 1974 1975 max_delay = br->multicast_query_response_interval; 1976 1977 if (!timer_pending(&br->ip4_querier.timer)) 1978 br->ip4_querier.delay_time = jiffies + max_delay; 1979 1980 br_multicast_start_querier(br, &br->ip4_query); 1981 1982 #if IS_ENABLED(CONFIG_IPV6) 1983 if (!timer_pending(&br->ip6_querier.timer)) 1984 br->ip6_querier.delay_time = jiffies + max_delay; 1985 1986 br_multicast_start_querier(br, &br->ip6_query); 1987 #endif 1988 1989 unlock: 1990 spin_unlock_bh(&br->multicast_lock); 1991 1992 return 0; 1993 } 1994 1995 int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val) 1996 { 1997 int err = -ENOENT; 1998 u32 old; 1999 struct net_bridge_mdb_htable *mdb; 2000 2001 spin_lock_bh(&br->multicast_lock); 2002 if (!netif_running(br->dev)) 2003 goto unlock; 2004 2005 err = -EINVAL; 2006 if (!is_power_of_2(val)) 2007 goto unlock; 2008 2009 mdb = mlock_dereference(br->mdb, br); 2010 if (mdb && val < mdb->size) 2011 goto unlock; 2012 2013 err = 0; 2014 2015 old = br->hash_max; 2016 br->hash_max = val; 2017 2018 if (mdb) { 2019 if (mdb->old) { 2020 err = -EEXIST; 2021 rollback: 2022 br->hash_max = old; 2023 goto unlock; 2024 } 2025 2026 err = br_mdb_rehash(&br->mdb, br->hash_max, 2027 br->hash_elasticity); 2028 if (err) 2029 goto rollback; 2030 } 2031 2032 unlock: 2033 spin_unlock_bh(&br->multicast_lock); 2034 2035 return err; 2036 } 2037