xref: /linux/net/bridge/br_forward.c (revision 14ea4cd1b19162888f629c4ce1ba268c683b0f12)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  *	Forwarding decision
4  *	Linux ethernet bridge
5  *
6  *	Authors:
7  *	Lennert Buytenhek		<buytenh@gnu.org>
8  */
9 
10 #include <linux/err.h>
11 #include <linux/slab.h>
12 #include <linux/kernel.h>
13 #include <linux/netdevice.h>
14 #include <linux/netpoll.h>
15 #include <linux/skbuff.h>
16 #include <linux/if_vlan.h>
17 #include <linux/netfilter_bridge.h>
18 #include "br_private.h"
19 
20 /* Don't forward packets to originating port or forwarding disabled */
21 static inline int should_deliver(const struct net_bridge_port *p,
22 				 const struct sk_buff *skb)
23 {
24 	struct net_bridge_vlan_group *vg;
25 
26 	vg = nbp_vlan_group_rcu(p);
27 	return ((p->flags & BR_HAIRPIN_MODE) || skb->dev != p->dev) &&
28 		(br_mst_is_enabled(p->br) || p->state == BR_STATE_FORWARDING) &&
29 		br_allowed_egress(vg, skb) && nbp_switchdev_allowed_egress(p, skb) &&
30 		!br_skb_isolated(p, skb);
31 }
32 
33 int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb)
34 {
35 	skb_push(skb, ETH_HLEN);
36 	if (!is_skb_forwardable(skb->dev, skb))
37 		goto drop;
38 
39 	br_drop_fake_rtable(skb);
40 
41 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
42 	    eth_type_vlan(skb->protocol)) {
43 		int depth;
44 
45 		if (!vlan_get_protocol_and_depth(skb, skb->protocol, &depth))
46 			goto drop;
47 
48 		skb_set_network_header(skb, depth);
49 	}
50 
51 	br_switchdev_frame_set_offload_fwd_mark(skb);
52 
53 	dev_queue_xmit(skb);
54 
55 	return 0;
56 
57 drop:
58 	kfree_skb(skb);
59 	return 0;
60 }
61 EXPORT_SYMBOL_GPL(br_dev_queue_push_xmit);
62 
63 int br_forward_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
64 {
65 	skb_clear_tstamp(skb);
66 	return NF_HOOK(NFPROTO_BRIDGE, NF_BR_POST_ROUTING,
67 		       net, sk, skb, NULL, skb->dev,
68 		       br_dev_queue_push_xmit);
69 
70 }
71 EXPORT_SYMBOL_GPL(br_forward_finish);
72 
73 static void __br_forward(const struct net_bridge_port *to,
74 			 struct sk_buff *skb, bool local_orig)
75 {
76 	struct net_bridge_vlan_group *vg;
77 	struct net_device *indev;
78 	struct net *net;
79 	int br_hook;
80 
81 	/* Mark the skb for forwarding offload early so that br_handle_vlan()
82 	 * can know whether to pop the VLAN header on egress or keep it.
83 	 */
84 	nbp_switchdev_frame_mark_tx_fwd_offload(to, skb);
85 
86 	vg = nbp_vlan_group_rcu(to);
87 	skb = br_handle_vlan(to->br, to, vg, skb);
88 	if (!skb)
89 		return;
90 
91 	indev = skb->dev;
92 	skb->dev = to->dev;
93 	if (!local_orig) {
94 		if (skb_warn_if_lro(skb)) {
95 			kfree_skb(skb);
96 			return;
97 		}
98 		br_hook = NF_BR_FORWARD;
99 		skb_forward_csum(skb);
100 		net = dev_net(indev);
101 	} else {
102 		if (unlikely(netpoll_tx_running(to->br->dev))) {
103 			skb_push(skb, ETH_HLEN);
104 			if (!is_skb_forwardable(skb->dev, skb))
105 				kfree_skb(skb);
106 			else
107 				br_netpoll_send_skb(to, skb);
108 			return;
109 		}
110 		br_hook = NF_BR_LOCAL_OUT;
111 		net = dev_net(skb->dev);
112 		indev = NULL;
113 	}
114 
115 	NF_HOOK(NFPROTO_BRIDGE, br_hook,
116 		net, NULL, skb, indev, skb->dev,
117 		br_forward_finish);
118 }
119 
120 static int deliver_clone(const struct net_bridge_port *prev,
121 			 struct sk_buff *skb, bool local_orig)
122 {
123 	struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
124 
125 	skb = skb_clone(skb, GFP_ATOMIC);
126 	if (!skb) {
127 		DEV_STATS_INC(dev, tx_dropped);
128 		return -ENOMEM;
129 	}
130 
131 	__br_forward(prev, skb, local_orig);
132 	return 0;
133 }
134 
135 /**
136  * br_forward - forward a packet to a specific port
137  * @to: destination port
138  * @skb: packet being forwarded
139  * @local_rcv: packet will be received locally after forwarding
140  * @local_orig: packet is locally originated
141  *
142  * Should be called with rcu_read_lock.
143  */
144 void br_forward(const struct net_bridge_port *to,
145 		struct sk_buff *skb, bool local_rcv, bool local_orig)
146 {
147 	if (unlikely(!to))
148 		goto out;
149 
150 	/* redirect to backup link if the destination port is down */
151 	if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) {
152 		struct net_bridge_port *backup_port;
153 
154 		backup_port = rcu_dereference(to->backup_port);
155 		if (unlikely(!backup_port))
156 			goto out;
157 		BR_INPUT_SKB_CB(skb)->backup_nhid = READ_ONCE(to->backup_nhid);
158 		to = backup_port;
159 	}
160 
161 	if (should_deliver(to, skb)) {
162 		if (local_rcv)
163 			deliver_clone(to, skb, local_orig);
164 		else
165 			__br_forward(to, skb, local_orig);
166 		return;
167 	}
168 
169 out:
170 	if (!local_rcv)
171 		kfree_skb(skb);
172 }
173 EXPORT_SYMBOL_GPL(br_forward);
174 
175 static struct net_bridge_port *maybe_deliver(
176 	struct net_bridge_port *prev, struct net_bridge_port *p,
177 	struct sk_buff *skb, bool local_orig)
178 {
179 	u8 igmp_type = br_multicast_igmp_type(skb);
180 	int err;
181 
182 	if (!should_deliver(p, skb))
183 		return prev;
184 
185 	nbp_switchdev_frame_mark_tx_fwd_to_hwdom(p, skb);
186 
187 	if (!prev)
188 		goto out;
189 
190 	err = deliver_clone(prev, skb, local_orig);
191 	if (err)
192 		return ERR_PTR(err);
193 out:
194 	br_multicast_count(p->br, p, skb, igmp_type, BR_MCAST_DIR_TX);
195 
196 	return p;
197 }
198 
199 /* called under rcu_read_lock */
200 void br_flood(struct net_bridge *br, struct sk_buff *skb,
201 	      enum br_pkt_type pkt_type, bool local_rcv, bool local_orig,
202 	      u16 vid)
203 {
204 	enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET;
205 	struct net_bridge_port *prev = NULL;
206 	struct net_bridge_port *p;
207 
208 	br_tc_skb_miss_set(skb, pkt_type != BR_PKT_BROADCAST);
209 
210 	list_for_each_entry_rcu(p, &br->port_list, list) {
211 		/* Do not flood unicast traffic to ports that turn it off, nor
212 		 * other traffic if flood off, except for traffic we originate
213 		 */
214 		switch (pkt_type) {
215 		case BR_PKT_UNICAST:
216 			if (!(p->flags & BR_FLOOD))
217 				continue;
218 			break;
219 		case BR_PKT_MULTICAST:
220 			if (!(p->flags & BR_MCAST_FLOOD) && skb->dev != br->dev)
221 				continue;
222 			break;
223 		case BR_PKT_BROADCAST:
224 			if (!(p->flags & BR_BCAST_FLOOD) && skb->dev != br->dev)
225 				continue;
226 			break;
227 		}
228 
229 		/* Do not flood to ports that enable proxy ARP */
230 		if (p->flags & BR_PROXYARP)
231 			continue;
232 		if (BR_INPUT_SKB_CB(skb)->proxyarp_replied &&
233 		    ((p->flags & BR_PROXYARP_WIFI) ||
234 		     br_is_neigh_suppress_enabled(p, vid)))
235 			continue;
236 
237 		prev = maybe_deliver(prev, p, skb, local_orig);
238 		if (IS_ERR(prev)) {
239 			reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM :
240 				 SKB_DROP_REASON_NOT_SPECIFIED;
241 			goto out;
242 		}
243 	}
244 
245 	if (!prev)
246 		goto out;
247 
248 	if (local_rcv)
249 		deliver_clone(prev, skb, local_orig);
250 	else
251 		__br_forward(prev, skb, local_orig);
252 	return;
253 
254 out:
255 	if (!local_rcv)
256 		kfree_skb_reason(skb, reason);
257 }
258 
259 #ifdef CONFIG_BRIDGE_IGMP_SNOOPING
260 static void maybe_deliver_addr(struct net_bridge_port *p, struct sk_buff *skb,
261 			       const unsigned char *addr, bool local_orig)
262 {
263 	struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
264 	const unsigned char *src = eth_hdr(skb)->h_source;
265 	struct sk_buff *nskb;
266 
267 	if (!should_deliver(p, skb))
268 		return;
269 
270 	/* Even with hairpin, no soliloquies - prevent breaking IPv6 DAD */
271 	if (skb->dev == p->dev && ether_addr_equal(src, addr))
272 		return;
273 
274 	__skb_push(skb, ETH_HLEN);
275 	nskb = pskb_copy(skb, GFP_ATOMIC);
276 	__skb_pull(skb, ETH_HLEN);
277 	if (!nskb) {
278 		DEV_STATS_INC(dev, tx_dropped);
279 		return;
280 	}
281 
282 	skb = nskb;
283 	__skb_pull(skb, ETH_HLEN);
284 	if (!is_broadcast_ether_addr(addr))
285 		memcpy(eth_hdr(skb)->h_dest, addr, ETH_ALEN);
286 
287 	__br_forward(p, skb, local_orig);
288 }
289 
290 /* called with rcu_read_lock */
291 void br_multicast_flood(struct net_bridge_mdb_entry *mdst,
292 			struct sk_buff *skb,
293 			struct net_bridge_mcast *brmctx,
294 			bool local_rcv, bool local_orig)
295 {
296 	enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET;
297 	struct net_bridge_port *prev = NULL;
298 	struct net_bridge_port_group *p;
299 	bool allow_mode_include = true;
300 	struct hlist_node *rp;
301 
302 	rp = br_multicast_get_first_rport_node(brmctx, skb);
303 
304 	if (mdst) {
305 		p = rcu_dereference(mdst->ports);
306 		if (br_multicast_should_handle_mode(brmctx, mdst->addr.proto) &&
307 		    br_multicast_is_star_g(&mdst->addr))
308 			allow_mode_include = false;
309 	} else {
310 		p = NULL;
311 		br_tc_skb_miss_set(skb, true);
312 	}
313 
314 	while (p || rp) {
315 		struct net_bridge_port *port, *lport, *rport;
316 
317 		lport = p ? p->key.port : NULL;
318 		rport = br_multicast_rport_from_node_skb(rp, skb);
319 
320 		if ((unsigned long)lport > (unsigned long)rport) {
321 			port = lport;
322 
323 			if (port->flags & BR_MULTICAST_TO_UNICAST) {
324 				maybe_deliver_addr(lport, skb, p->eth_addr,
325 						   local_orig);
326 				goto delivered;
327 			}
328 			if ((!allow_mode_include &&
329 			     p->filter_mode == MCAST_INCLUDE) ||
330 			    (p->flags & MDB_PG_FLAGS_BLOCKED))
331 				goto delivered;
332 		} else {
333 			port = rport;
334 		}
335 
336 		prev = maybe_deliver(prev, port, skb, local_orig);
337 		if (IS_ERR(prev)) {
338 			reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM :
339 				 SKB_DROP_REASON_NOT_SPECIFIED;
340 			goto out;
341 		}
342 delivered:
343 		if ((unsigned long)lport >= (unsigned long)port)
344 			p = rcu_dereference(p->next);
345 		if ((unsigned long)rport >= (unsigned long)port)
346 			rp = rcu_dereference(hlist_next_rcu(rp));
347 	}
348 
349 	if (!prev)
350 		goto out;
351 
352 	if (local_rcv)
353 		deliver_clone(prev, skb, local_orig);
354 	else
355 		__br_forward(prev, skb, local_orig);
356 	return;
357 
358 out:
359 	if (!local_rcv)
360 		kfree_skb_reason(skb, reason);
361 }
362 #endif
363