xref: /linux/net/bridge/br_forward.c (revision 460ea8980511c01c1551012b9a6ec6a06d02da59)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  *	Forwarding decision
4  *	Linux ethernet bridge
5  *
6  *	Authors:
7  *	Lennert Buytenhek		<buytenh@gnu.org>
8  */
9 
10 #include <linux/err.h>
11 #include <linux/slab.h>
12 #include <linux/kernel.h>
13 #include <linux/netdevice.h>
14 #include <linux/netpoll.h>
15 #include <linux/skbuff.h>
16 #include <linux/if_vlan.h>
17 #include <linux/netfilter_bridge.h>
18 #include "br_private.h"
19 
20 /* Don't forward packets to originating port or forwarding disabled */
21 static inline int should_deliver(const struct net_bridge_port *p,
22 				 const struct sk_buff *skb)
23 {
24 	struct net_bridge_vlan_group *vg;
25 
26 	vg = nbp_vlan_group_rcu(p);
27 	return ((p->flags & BR_HAIRPIN_MODE) || skb->dev != p->dev) &&
28 		p->state == BR_STATE_FORWARDING && br_allowed_egress(vg, skb) &&
29 		nbp_switchdev_allowed_egress(p, skb) &&
30 		!br_skb_isolated(p, skb);
31 }
32 
33 int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb)
34 {
35 	skb_push(skb, ETH_HLEN);
36 	if (!is_skb_forwardable(skb->dev, skb))
37 		goto drop;
38 
39 	br_drop_fake_rtable(skb);
40 
41 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
42 	    eth_type_vlan(skb->protocol)) {
43 		int depth;
44 
45 		if (!vlan_get_protocol_and_depth(skb, skb->protocol, &depth))
46 			goto drop;
47 
48 		skb_set_network_header(skb, depth);
49 	}
50 
51 	br_switchdev_frame_set_offload_fwd_mark(skb);
52 
53 	dev_queue_xmit(skb);
54 
55 	return 0;
56 
57 drop:
58 	kfree_skb(skb);
59 	return 0;
60 }
61 EXPORT_SYMBOL_GPL(br_dev_queue_push_xmit);
62 
63 int br_forward_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
64 {
65 	skb_clear_tstamp(skb);
66 	return NF_HOOK(NFPROTO_BRIDGE, NF_BR_POST_ROUTING,
67 		       net, sk, skb, NULL, skb->dev,
68 		       br_dev_queue_push_xmit);
69 
70 }
71 EXPORT_SYMBOL_GPL(br_forward_finish);
72 
73 static void __br_forward(const struct net_bridge_port *to,
74 			 struct sk_buff *skb, bool local_orig)
75 {
76 	struct net_bridge_vlan_group *vg;
77 	struct net_device *indev;
78 	struct net *net;
79 	int br_hook;
80 
81 	/* Mark the skb for forwarding offload early so that br_handle_vlan()
82 	 * can know whether to pop the VLAN header on egress or keep it.
83 	 */
84 	nbp_switchdev_frame_mark_tx_fwd_offload(to, skb);
85 
86 	vg = nbp_vlan_group_rcu(to);
87 	skb = br_handle_vlan(to->br, to, vg, skb);
88 	if (!skb)
89 		return;
90 
91 	indev = skb->dev;
92 	skb->dev = to->dev;
93 	if (!local_orig) {
94 		if (skb_warn_if_lro(skb)) {
95 			kfree_skb(skb);
96 			return;
97 		}
98 		br_hook = NF_BR_FORWARD;
99 		skb_forward_csum(skb);
100 		net = dev_net(indev);
101 	} else {
102 		if (unlikely(netpoll_tx_running(to->br->dev))) {
103 			skb_push(skb, ETH_HLEN);
104 			if (!is_skb_forwardable(skb->dev, skb))
105 				kfree_skb(skb);
106 			else
107 				br_netpoll_send_skb(to, skb);
108 			return;
109 		}
110 		br_hook = NF_BR_LOCAL_OUT;
111 		net = dev_net(skb->dev);
112 		indev = NULL;
113 	}
114 
115 	NF_HOOK(NFPROTO_BRIDGE, br_hook,
116 		net, NULL, skb, indev, skb->dev,
117 		br_forward_finish);
118 }
119 
120 static int deliver_clone(const struct net_bridge_port *prev,
121 			 struct sk_buff *skb, bool local_orig)
122 {
123 	struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
124 
125 	skb = skb_clone(skb, GFP_ATOMIC);
126 	if (!skb) {
127 		dev->stats.tx_dropped++;
128 		return -ENOMEM;
129 	}
130 
131 	__br_forward(prev, skb, local_orig);
132 	return 0;
133 }
134 
135 /**
136  * br_forward - forward a packet to a specific port
137  * @to: destination port
138  * @skb: packet being forwarded
139  * @local_rcv: packet will be received locally after forwarding
140  * @local_orig: packet is locally originated
141  *
142  * Should be called with rcu_read_lock.
143  */
144 void br_forward(const struct net_bridge_port *to,
145 		struct sk_buff *skb, bool local_rcv, bool local_orig)
146 {
147 	if (unlikely(!to))
148 		goto out;
149 
150 	/* redirect to backup link if the destination port is down */
151 	if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) {
152 		struct net_bridge_port *backup_port;
153 
154 		backup_port = rcu_dereference(to->backup_port);
155 		if (unlikely(!backup_port))
156 			goto out;
157 		to = backup_port;
158 	}
159 
160 	if (should_deliver(to, skb)) {
161 		if (local_rcv)
162 			deliver_clone(to, skb, local_orig);
163 		else
164 			__br_forward(to, skb, local_orig);
165 		return;
166 	}
167 
168 out:
169 	if (!local_rcv)
170 		kfree_skb(skb);
171 }
172 EXPORT_SYMBOL_GPL(br_forward);
173 
174 static struct net_bridge_port *maybe_deliver(
175 	struct net_bridge_port *prev, struct net_bridge_port *p,
176 	struct sk_buff *skb, bool local_orig)
177 {
178 	u8 igmp_type = br_multicast_igmp_type(skb);
179 	int err;
180 
181 	if (!should_deliver(p, skb))
182 		return prev;
183 
184 	nbp_switchdev_frame_mark_tx_fwd_to_hwdom(p, skb);
185 
186 	if (!prev)
187 		goto out;
188 
189 	err = deliver_clone(prev, skb, local_orig);
190 	if (err)
191 		return ERR_PTR(err);
192 out:
193 	br_multicast_count(p->br, p, skb, igmp_type, BR_MCAST_DIR_TX);
194 
195 	return p;
196 }
197 
198 /* called under rcu_read_lock */
199 void br_flood(struct net_bridge *br, struct sk_buff *skb,
200 	      enum br_pkt_type pkt_type, bool local_rcv, bool local_orig,
201 	      u16 vid)
202 {
203 	struct net_bridge_port *prev = NULL;
204 	struct net_bridge_port *p;
205 
206 	br_tc_skb_miss_set(skb, pkt_type != BR_PKT_BROADCAST);
207 
208 	list_for_each_entry_rcu(p, &br->port_list, list) {
209 		/* Do not flood unicast traffic to ports that turn it off, nor
210 		 * other traffic if flood off, except for traffic we originate
211 		 */
212 		switch (pkt_type) {
213 		case BR_PKT_UNICAST:
214 			if (!(p->flags & BR_FLOOD))
215 				continue;
216 			break;
217 		case BR_PKT_MULTICAST:
218 			if (!(p->flags & BR_MCAST_FLOOD) && skb->dev != br->dev)
219 				continue;
220 			break;
221 		case BR_PKT_BROADCAST:
222 			if (!(p->flags & BR_BCAST_FLOOD) && skb->dev != br->dev)
223 				continue;
224 			break;
225 		}
226 
227 		/* Do not flood to ports that enable proxy ARP */
228 		if (p->flags & BR_PROXYARP)
229 			continue;
230 		if (BR_INPUT_SKB_CB(skb)->proxyarp_replied &&
231 		    ((p->flags & BR_PROXYARP_WIFI) ||
232 		     br_is_neigh_suppress_enabled(p, vid)))
233 			continue;
234 
235 		prev = maybe_deliver(prev, p, skb, local_orig);
236 		if (IS_ERR(prev))
237 			goto out;
238 	}
239 
240 	if (!prev)
241 		goto out;
242 
243 	if (local_rcv)
244 		deliver_clone(prev, skb, local_orig);
245 	else
246 		__br_forward(prev, skb, local_orig);
247 	return;
248 
249 out:
250 	if (!local_rcv)
251 		kfree_skb(skb);
252 }
253 
254 #ifdef CONFIG_BRIDGE_IGMP_SNOOPING
255 static void maybe_deliver_addr(struct net_bridge_port *p, struct sk_buff *skb,
256 			       const unsigned char *addr, bool local_orig)
257 {
258 	struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
259 	const unsigned char *src = eth_hdr(skb)->h_source;
260 
261 	if (!should_deliver(p, skb))
262 		return;
263 
264 	/* Even with hairpin, no soliloquies - prevent breaking IPv6 DAD */
265 	if (skb->dev == p->dev && ether_addr_equal(src, addr))
266 		return;
267 
268 	skb = skb_copy(skb, GFP_ATOMIC);
269 	if (!skb) {
270 		dev->stats.tx_dropped++;
271 		return;
272 	}
273 
274 	if (!is_broadcast_ether_addr(addr))
275 		memcpy(eth_hdr(skb)->h_dest, addr, ETH_ALEN);
276 
277 	__br_forward(p, skb, local_orig);
278 }
279 
280 /* called with rcu_read_lock */
281 void br_multicast_flood(struct net_bridge_mdb_entry *mdst,
282 			struct sk_buff *skb,
283 			struct net_bridge_mcast *brmctx,
284 			bool local_rcv, bool local_orig)
285 {
286 	struct net_bridge_port *prev = NULL;
287 	struct net_bridge_port_group *p;
288 	bool allow_mode_include = true;
289 	struct hlist_node *rp;
290 
291 	rp = br_multicast_get_first_rport_node(brmctx, skb);
292 
293 	if (mdst) {
294 		p = rcu_dereference(mdst->ports);
295 		if (br_multicast_should_handle_mode(brmctx, mdst->addr.proto) &&
296 		    br_multicast_is_star_g(&mdst->addr))
297 			allow_mode_include = false;
298 	} else {
299 		p = NULL;
300 		br_tc_skb_miss_set(skb, true);
301 	}
302 
303 	while (p || rp) {
304 		struct net_bridge_port *port, *lport, *rport;
305 
306 		lport = p ? p->key.port : NULL;
307 		rport = br_multicast_rport_from_node_skb(rp, skb);
308 
309 		if ((unsigned long)lport > (unsigned long)rport) {
310 			port = lport;
311 
312 			if (port->flags & BR_MULTICAST_TO_UNICAST) {
313 				maybe_deliver_addr(lport, skb, p->eth_addr,
314 						   local_orig);
315 				goto delivered;
316 			}
317 			if ((!allow_mode_include &&
318 			     p->filter_mode == MCAST_INCLUDE) ||
319 			    (p->flags & MDB_PG_FLAGS_BLOCKED))
320 				goto delivered;
321 		} else {
322 			port = rport;
323 		}
324 
325 		prev = maybe_deliver(prev, port, skb, local_orig);
326 		if (IS_ERR(prev))
327 			goto out;
328 delivered:
329 		if ((unsigned long)lport >= (unsigned long)port)
330 			p = rcu_dereference(p->next);
331 		if ((unsigned long)rport >= (unsigned long)port)
332 			rp = rcu_dereference(hlist_next_rcu(rp));
333 	}
334 
335 	if (!prev)
336 		goto out;
337 
338 	if (local_rcv)
339 		deliver_clone(prev, skb, local_orig);
340 	else
341 		__br_forward(prev, skb, local_orig);
342 	return;
343 
344 out:
345 	if (!local_rcv)
346 		kfree_skb(skb);
347 }
348 #endif
349