1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Bridge multicast support. 4 * 5 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> 6 */ 7 8 #include <linux/err.h> 9 #include <linux/export.h> 10 #include <linux/if_ether.h> 11 #include <linux/igmp.h> 12 #include <linux/in.h> 13 #include <linux/jhash.h> 14 #include <linux/kernel.h> 15 #include <linux/log2.h> 16 #include <linux/netdevice.h> 17 #include <linux/netfilter_bridge.h> 18 #include <linux/random.h> 19 #include <linux/rculist.h> 20 #include <linux/skbuff.h> 21 #include <linux/slab.h> 22 #include <linux/timer.h> 23 #include <linux/inetdevice.h> 24 #include <linux/mroute.h> 25 #include <net/ip.h> 26 #include <net/switchdev.h> 27 #if IS_ENABLED(CONFIG_IPV6) 28 #include <linux/icmpv6.h> 29 #include <net/ipv6.h> 30 #include <net/mld.h> 31 #include <net/ip6_checksum.h> 32 #include <net/addrconf.h> 33 #endif 34 35 #include "br_private.h" 36 #include "br_private_mcast_eht.h" 37 38 static const struct rhashtable_params br_mdb_rht_params = { 39 .head_offset = offsetof(struct net_bridge_mdb_entry, rhnode), 40 .key_offset = offsetof(struct net_bridge_mdb_entry, addr), 41 .key_len = sizeof(struct br_ip), 42 .automatic_shrinking = true, 43 }; 44 45 static const struct rhashtable_params br_sg_port_rht_params = { 46 .head_offset = offsetof(struct net_bridge_port_group, rhnode), 47 .key_offset = offsetof(struct net_bridge_port_group, key), 48 .key_len = sizeof(struct net_bridge_port_group_sg_key), 49 .automatic_shrinking = true, 50 }; 51 52 static void br_multicast_start_querier(struct net_bridge_mcast *brmctx, 53 struct bridge_mcast_own_query *query); 54 static void br_ip4_multicast_add_router(struct net_bridge_mcast *brmctx, 55 struct net_bridge_mcast_port *pmctx); 56 static void br_ip4_multicast_leave_group(struct net_bridge_mcast *brmctx, 57 struct net_bridge_mcast_port *pmctx, 58 __be32 group, 59 __u16 vid, 60 const unsigned char *src); 61 static void br_multicast_port_group_rexmit(struct timer_list *t); 62 63 static void 64 br_multicast_rport_del_notify(struct net_bridge_mcast_port *pmctx, bool deleted); 65 static void br_ip6_multicast_add_router(struct net_bridge_mcast *brmctx, 66 struct net_bridge_mcast_port *pmctx); 67 #if IS_ENABLED(CONFIG_IPV6) 68 static void br_ip6_multicast_leave_group(struct net_bridge_mcast *brmctx, 69 struct net_bridge_mcast_port *pmctx, 70 const struct in6_addr *group, 71 __u16 vid, const unsigned char *src); 72 #endif 73 static struct net_bridge_port_group * 74 __br_multicast_add_group(struct net_bridge_mcast *brmctx, 75 struct net_bridge_mcast_port *pmctx, 76 struct br_ip *group, 77 const unsigned char *src, 78 u8 filter_mode, 79 bool igmpv2_mldv1, 80 bool blocked); 81 static void br_multicast_find_del_pg(struct net_bridge *br, 82 struct net_bridge_port_group *pg); 83 static void __br_multicast_stop(struct net_bridge_mcast *brmctx); 84 85 static struct net_bridge_port_group * 86 br_sg_port_find(struct net_bridge *br, 87 struct net_bridge_port_group_sg_key *sg_p) 88 { 89 lockdep_assert_held_once(&br->multicast_lock); 90 91 return rhashtable_lookup_fast(&br->sg_port_tbl, sg_p, 92 br_sg_port_rht_params); 93 } 94 95 static struct net_bridge_mdb_entry *br_mdb_ip_get_rcu(struct net_bridge *br, 96 struct br_ip *dst) 97 { 98 return rhashtable_lookup(&br->mdb_hash_tbl, dst, br_mdb_rht_params); 99 } 100 101 struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge *br, 102 struct br_ip *dst) 103 { 104 struct net_bridge_mdb_entry *ent; 105 106 lockdep_assert_held_once(&br->multicast_lock); 107 108 rcu_read_lock(); 109 ent = rhashtable_lookup(&br->mdb_hash_tbl, dst, br_mdb_rht_params); 110 rcu_read_unlock(); 111 112 return ent; 113 } 114 115 static struct net_bridge_mdb_entry *br_mdb_ip4_get(struct net_bridge *br, 116 __be32 dst, __u16 vid) 117 { 118 struct br_ip br_dst; 119 120 memset(&br_dst, 0, sizeof(br_dst)); 121 br_dst.dst.ip4 = dst; 122 br_dst.proto = htons(ETH_P_IP); 123 br_dst.vid = vid; 124 125 return br_mdb_ip_get(br, &br_dst); 126 } 127 128 #if IS_ENABLED(CONFIG_IPV6) 129 static struct net_bridge_mdb_entry *br_mdb_ip6_get(struct net_bridge *br, 130 const struct in6_addr *dst, 131 __u16 vid) 132 { 133 struct br_ip br_dst; 134 135 memset(&br_dst, 0, sizeof(br_dst)); 136 br_dst.dst.ip6 = *dst; 137 br_dst.proto = htons(ETH_P_IPV6); 138 br_dst.vid = vid; 139 140 return br_mdb_ip_get(br, &br_dst); 141 } 142 #endif 143 144 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge_mcast *brmctx, 145 struct sk_buff *skb, u16 vid) 146 { 147 struct net_bridge *br = brmctx->br; 148 struct br_ip ip; 149 150 if (!br_opt_get(br, BROPT_MULTICAST_ENABLED) || 151 br_multicast_ctx_vlan_global_disabled(brmctx)) 152 return NULL; 153 154 if (BR_INPUT_SKB_CB(skb)->igmp) 155 return NULL; 156 157 memset(&ip, 0, sizeof(ip)); 158 ip.proto = skb->protocol; 159 ip.vid = vid; 160 161 switch (skb->protocol) { 162 case htons(ETH_P_IP): 163 ip.dst.ip4 = ip_hdr(skb)->daddr; 164 if (brmctx->multicast_igmp_version == 3) { 165 struct net_bridge_mdb_entry *mdb; 166 167 ip.src.ip4 = ip_hdr(skb)->saddr; 168 mdb = br_mdb_ip_get_rcu(br, &ip); 169 if (mdb) 170 return mdb; 171 ip.src.ip4 = 0; 172 } 173 break; 174 #if IS_ENABLED(CONFIG_IPV6) 175 case htons(ETH_P_IPV6): 176 ip.dst.ip6 = ipv6_hdr(skb)->daddr; 177 if (brmctx->multicast_mld_version == 2) { 178 struct net_bridge_mdb_entry *mdb; 179 180 ip.src.ip6 = ipv6_hdr(skb)->saddr; 181 mdb = br_mdb_ip_get_rcu(br, &ip); 182 if (mdb) 183 return mdb; 184 memset(&ip.src.ip6, 0, sizeof(ip.src.ip6)); 185 } 186 break; 187 #endif 188 default: 189 ip.proto = 0; 190 ether_addr_copy(ip.dst.mac_addr, eth_hdr(skb)->h_dest); 191 } 192 193 return br_mdb_ip_get_rcu(br, &ip); 194 } 195 196 /* IMPORTANT: this function must be used only when the contexts cannot be 197 * passed down (e.g. timer) and must be used for read-only purposes because 198 * the vlan snooping option can change, so it can return any context 199 * (non-vlan or vlan). Its initial intended purpose is to read timer values 200 * from the *current* context based on the option. At worst that could lead 201 * to inconsistent timers when the contexts are changed, i.e. src timer 202 * which needs to re-arm with a specific delay taken from the old context 203 */ 204 static struct net_bridge_mcast_port * 205 br_multicast_pg_to_port_ctx(const struct net_bridge_port_group *pg) 206 { 207 struct net_bridge_mcast_port *pmctx = &pg->key.port->multicast_ctx; 208 struct net_bridge_vlan *vlan; 209 210 lockdep_assert_held_once(&pg->key.port->br->multicast_lock); 211 212 /* if vlan snooping is disabled use the port's multicast context */ 213 if (!pg->key.addr.vid || 214 !br_opt_get(pg->key.port->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) 215 goto out; 216 217 /* locking is tricky here, due to different rules for multicast and 218 * vlans we need to take rcu to find the vlan and make sure it has 219 * the BR_VLFLAG_MCAST_ENABLED flag set, it can only change under 220 * multicast_lock which must be already held here, so the vlan's pmctx 221 * can safely be used on return 222 */ 223 rcu_read_lock(); 224 vlan = br_vlan_find(nbp_vlan_group(pg->key.port), pg->key.addr.vid); 225 if (vlan && !br_multicast_port_ctx_vlan_disabled(&vlan->port_mcast_ctx)) 226 pmctx = &vlan->port_mcast_ctx; 227 else 228 pmctx = NULL; 229 rcu_read_unlock(); 230 out: 231 return pmctx; 232 } 233 234 /* when snooping we need to check if the contexts should be used 235 * in the following order: 236 * - if pmctx is non-NULL (port), check if it should be used 237 * - if pmctx is NULL (bridge), check if brmctx should be used 238 */ 239 static bool 240 br_multicast_ctx_should_use(const struct net_bridge_mcast *brmctx, 241 const struct net_bridge_mcast_port *pmctx) 242 { 243 if (!netif_running(brmctx->br->dev)) 244 return false; 245 246 if (pmctx) 247 return !br_multicast_port_ctx_state_disabled(pmctx); 248 else 249 return !br_multicast_ctx_vlan_disabled(brmctx); 250 } 251 252 static bool br_port_group_equal(struct net_bridge_port_group *p, 253 struct net_bridge_port *port, 254 const unsigned char *src) 255 { 256 if (p->key.port != port) 257 return false; 258 259 if (!(port->flags & BR_MULTICAST_TO_UNICAST)) 260 return true; 261 262 return ether_addr_equal(src, p->eth_addr); 263 } 264 265 static void __fwd_add_star_excl(struct net_bridge_mcast_port *pmctx, 266 struct net_bridge_port_group *pg, 267 struct br_ip *sg_ip) 268 { 269 struct net_bridge_port_group_sg_key sg_key; 270 struct net_bridge_port_group *src_pg; 271 struct net_bridge_mcast *brmctx; 272 273 memset(&sg_key, 0, sizeof(sg_key)); 274 brmctx = br_multicast_port_ctx_get_global(pmctx); 275 sg_key.port = pg->key.port; 276 sg_key.addr = *sg_ip; 277 if (br_sg_port_find(brmctx->br, &sg_key)) 278 return; 279 280 src_pg = __br_multicast_add_group(brmctx, pmctx, 281 sg_ip, pg->eth_addr, 282 MCAST_INCLUDE, false, false); 283 if (IS_ERR_OR_NULL(src_pg) || 284 src_pg->rt_protocol != RTPROT_KERNEL) 285 return; 286 287 src_pg->flags |= MDB_PG_FLAGS_STAR_EXCL; 288 } 289 290 static void __fwd_del_star_excl(struct net_bridge_port_group *pg, 291 struct br_ip *sg_ip) 292 { 293 struct net_bridge_port_group_sg_key sg_key; 294 struct net_bridge *br = pg->key.port->br; 295 struct net_bridge_port_group *src_pg; 296 297 memset(&sg_key, 0, sizeof(sg_key)); 298 sg_key.port = pg->key.port; 299 sg_key.addr = *sg_ip; 300 src_pg = br_sg_port_find(br, &sg_key); 301 if (!src_pg || !(src_pg->flags & MDB_PG_FLAGS_STAR_EXCL) || 302 src_pg->rt_protocol != RTPROT_KERNEL) 303 return; 304 305 br_multicast_find_del_pg(br, src_pg); 306 } 307 308 /* When a port group transitions to (or is added as) EXCLUDE we need to add it 309 * to all other ports' S,G entries which are not blocked by the current group 310 * for proper replication, the assumption is that any S,G blocked entries 311 * are already added so the S,G,port lookup should skip them. 312 * When a port group transitions from EXCLUDE -> INCLUDE mode or is being 313 * deleted we need to remove it from all ports' S,G entries where it was 314 * automatically installed before (i.e. where it's MDB_PG_FLAGS_STAR_EXCL). 315 */ 316 void br_multicast_star_g_handle_mode(struct net_bridge_port_group *pg, 317 u8 filter_mode) 318 { 319 struct net_bridge *br = pg->key.port->br; 320 struct net_bridge_port_group *pg_lst; 321 struct net_bridge_mcast_port *pmctx; 322 struct net_bridge_mdb_entry *mp; 323 struct br_ip sg_ip; 324 325 if (WARN_ON(!br_multicast_is_star_g(&pg->key.addr))) 326 return; 327 328 mp = br_mdb_ip_get(br, &pg->key.addr); 329 if (!mp) 330 return; 331 pmctx = br_multicast_pg_to_port_ctx(pg); 332 if (!pmctx) 333 return; 334 335 memset(&sg_ip, 0, sizeof(sg_ip)); 336 sg_ip = pg->key.addr; 337 338 for (pg_lst = mlock_dereference(mp->ports, br); 339 pg_lst; 340 pg_lst = mlock_dereference(pg_lst->next, br)) { 341 struct net_bridge_group_src *src_ent; 342 343 if (pg_lst == pg) 344 continue; 345 hlist_for_each_entry(src_ent, &pg_lst->src_list, node) { 346 if (!(src_ent->flags & BR_SGRP_F_INSTALLED)) 347 continue; 348 sg_ip.src = src_ent->addr.src; 349 switch (filter_mode) { 350 case MCAST_INCLUDE: 351 __fwd_del_star_excl(pg, &sg_ip); 352 break; 353 case MCAST_EXCLUDE: 354 __fwd_add_star_excl(pmctx, pg, &sg_ip); 355 break; 356 } 357 } 358 } 359 } 360 361 /* called when adding a new S,G with host_joined == false by default */ 362 static void br_multicast_sg_host_state(struct net_bridge_mdb_entry *star_mp, 363 struct net_bridge_port_group *sg) 364 { 365 struct net_bridge_mdb_entry *sg_mp; 366 367 if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr))) 368 return; 369 if (!star_mp->host_joined) 370 return; 371 372 sg_mp = br_mdb_ip_get(star_mp->br, &sg->key.addr); 373 if (!sg_mp) 374 return; 375 sg_mp->host_joined = true; 376 } 377 378 /* set the host_joined state of all of *,G's S,G entries */ 379 static void br_multicast_star_g_host_state(struct net_bridge_mdb_entry *star_mp) 380 { 381 struct net_bridge *br = star_mp->br; 382 struct net_bridge_mdb_entry *sg_mp; 383 struct net_bridge_port_group *pg; 384 struct br_ip sg_ip; 385 386 if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr))) 387 return; 388 389 memset(&sg_ip, 0, sizeof(sg_ip)); 390 sg_ip = star_mp->addr; 391 for (pg = mlock_dereference(star_mp->ports, br); 392 pg; 393 pg = mlock_dereference(pg->next, br)) { 394 struct net_bridge_group_src *src_ent; 395 396 hlist_for_each_entry(src_ent, &pg->src_list, node) { 397 if (!(src_ent->flags & BR_SGRP_F_INSTALLED)) 398 continue; 399 sg_ip.src = src_ent->addr.src; 400 sg_mp = br_mdb_ip_get(br, &sg_ip); 401 if (!sg_mp) 402 continue; 403 sg_mp->host_joined = star_mp->host_joined; 404 } 405 } 406 } 407 408 static void br_multicast_sg_del_exclude_ports(struct net_bridge_mdb_entry *sgmp) 409 { 410 struct net_bridge_port_group __rcu **pp; 411 struct net_bridge_port_group *p; 412 413 /* *,G exclude ports are only added to S,G entries */ 414 if (WARN_ON(br_multicast_is_star_g(&sgmp->addr))) 415 return; 416 417 /* we need the STAR_EXCLUDE ports if there are non-STAR_EXCLUDE ports 418 * we should ignore perm entries since they're managed by user-space 419 */ 420 for (pp = &sgmp->ports; 421 (p = mlock_dereference(*pp, sgmp->br)) != NULL; 422 pp = &p->next) 423 if (!(p->flags & (MDB_PG_FLAGS_STAR_EXCL | 424 MDB_PG_FLAGS_PERMANENT))) 425 return; 426 427 /* currently the host can only have joined the *,G which means 428 * we treat it as EXCLUDE {}, so for an S,G it's considered a 429 * STAR_EXCLUDE entry and we can safely leave it 430 */ 431 sgmp->host_joined = false; 432 433 for (pp = &sgmp->ports; 434 (p = mlock_dereference(*pp, sgmp->br)) != NULL;) { 435 if (!(p->flags & MDB_PG_FLAGS_PERMANENT)) 436 br_multicast_del_pg(sgmp, p, pp); 437 else 438 pp = &p->next; 439 } 440 } 441 442 void br_multicast_sg_add_exclude_ports(struct net_bridge_mdb_entry *star_mp, 443 struct net_bridge_port_group *sg) 444 { 445 struct net_bridge_port_group_sg_key sg_key; 446 struct net_bridge *br = star_mp->br; 447 struct net_bridge_mcast_port *pmctx; 448 struct net_bridge_port_group *pg; 449 struct net_bridge_mcast *brmctx; 450 451 if (WARN_ON(br_multicast_is_star_g(&sg->key.addr))) 452 return; 453 if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr))) 454 return; 455 456 br_multicast_sg_host_state(star_mp, sg); 457 memset(&sg_key, 0, sizeof(sg_key)); 458 sg_key.addr = sg->key.addr; 459 /* we need to add all exclude ports to the S,G */ 460 for (pg = mlock_dereference(star_mp->ports, br); 461 pg; 462 pg = mlock_dereference(pg->next, br)) { 463 struct net_bridge_port_group *src_pg; 464 465 if (pg == sg || pg->filter_mode == MCAST_INCLUDE) 466 continue; 467 468 sg_key.port = pg->key.port; 469 if (br_sg_port_find(br, &sg_key)) 470 continue; 471 472 pmctx = br_multicast_pg_to_port_ctx(pg); 473 if (!pmctx) 474 continue; 475 brmctx = br_multicast_port_ctx_get_global(pmctx); 476 477 src_pg = __br_multicast_add_group(brmctx, pmctx, 478 &sg->key.addr, 479 sg->eth_addr, 480 MCAST_INCLUDE, false, false); 481 if (IS_ERR_OR_NULL(src_pg) || 482 src_pg->rt_protocol != RTPROT_KERNEL) 483 continue; 484 src_pg->flags |= MDB_PG_FLAGS_STAR_EXCL; 485 } 486 } 487 488 static void br_multicast_fwd_src_add(struct net_bridge_group_src *src) 489 { 490 struct net_bridge_mdb_entry *star_mp; 491 struct net_bridge_mcast_port *pmctx; 492 struct net_bridge_port_group *sg; 493 struct net_bridge_mcast *brmctx; 494 struct br_ip sg_ip; 495 496 if (src->flags & BR_SGRP_F_INSTALLED) 497 return; 498 499 memset(&sg_ip, 0, sizeof(sg_ip)); 500 pmctx = br_multicast_pg_to_port_ctx(src->pg); 501 if (!pmctx) 502 return; 503 brmctx = br_multicast_port_ctx_get_global(pmctx); 504 sg_ip = src->pg->key.addr; 505 sg_ip.src = src->addr.src; 506 507 sg = __br_multicast_add_group(brmctx, pmctx, &sg_ip, 508 src->pg->eth_addr, MCAST_INCLUDE, false, 509 !timer_pending(&src->timer)); 510 if (IS_ERR_OR_NULL(sg)) 511 return; 512 src->flags |= BR_SGRP_F_INSTALLED; 513 sg->flags &= ~MDB_PG_FLAGS_STAR_EXCL; 514 515 /* if it was added by user-space as perm we can skip next steps */ 516 if (sg->rt_protocol != RTPROT_KERNEL && 517 (sg->flags & MDB_PG_FLAGS_PERMANENT)) 518 return; 519 520 /* the kernel is now responsible for removing this S,G */ 521 del_timer(&sg->timer); 522 star_mp = br_mdb_ip_get(src->br, &src->pg->key.addr); 523 if (!star_mp) 524 return; 525 526 br_multicast_sg_add_exclude_ports(star_mp, sg); 527 } 528 529 static void br_multicast_fwd_src_remove(struct net_bridge_group_src *src, 530 bool fastleave) 531 { 532 struct net_bridge_port_group *p, *pg = src->pg; 533 struct net_bridge_port_group __rcu **pp; 534 struct net_bridge_mdb_entry *mp; 535 struct br_ip sg_ip; 536 537 memset(&sg_ip, 0, sizeof(sg_ip)); 538 sg_ip = pg->key.addr; 539 sg_ip.src = src->addr.src; 540 541 mp = br_mdb_ip_get(src->br, &sg_ip); 542 if (!mp) 543 return; 544 545 for (pp = &mp->ports; 546 (p = mlock_dereference(*pp, src->br)) != NULL; 547 pp = &p->next) { 548 if (!br_port_group_equal(p, pg->key.port, pg->eth_addr)) 549 continue; 550 551 if (p->rt_protocol != RTPROT_KERNEL && 552 (p->flags & MDB_PG_FLAGS_PERMANENT)) 553 break; 554 555 if (fastleave) 556 p->flags |= MDB_PG_FLAGS_FAST_LEAVE; 557 br_multicast_del_pg(mp, p, pp); 558 break; 559 } 560 src->flags &= ~BR_SGRP_F_INSTALLED; 561 } 562 563 /* install S,G and based on src's timer enable or disable forwarding */ 564 static void br_multicast_fwd_src_handle(struct net_bridge_group_src *src) 565 { 566 struct net_bridge_port_group_sg_key sg_key; 567 struct net_bridge_port_group *sg; 568 u8 old_flags; 569 570 br_multicast_fwd_src_add(src); 571 572 memset(&sg_key, 0, sizeof(sg_key)); 573 sg_key.addr = src->pg->key.addr; 574 sg_key.addr.src = src->addr.src; 575 sg_key.port = src->pg->key.port; 576 577 sg = br_sg_port_find(src->br, &sg_key); 578 if (!sg || (sg->flags & MDB_PG_FLAGS_PERMANENT)) 579 return; 580 581 old_flags = sg->flags; 582 if (timer_pending(&src->timer)) 583 sg->flags &= ~MDB_PG_FLAGS_BLOCKED; 584 else 585 sg->flags |= MDB_PG_FLAGS_BLOCKED; 586 587 if (old_flags != sg->flags) { 588 struct net_bridge_mdb_entry *sg_mp; 589 590 sg_mp = br_mdb_ip_get(src->br, &sg_key.addr); 591 if (!sg_mp) 592 return; 593 br_mdb_notify(src->br->dev, sg_mp, sg, RTM_NEWMDB); 594 } 595 } 596 597 static void br_multicast_destroy_mdb_entry(struct net_bridge_mcast_gc *gc) 598 { 599 struct net_bridge_mdb_entry *mp; 600 601 mp = container_of(gc, struct net_bridge_mdb_entry, mcast_gc); 602 WARN_ON(!hlist_unhashed(&mp->mdb_node)); 603 WARN_ON(mp->ports); 604 605 del_timer_sync(&mp->timer); 606 kfree_rcu(mp, rcu); 607 } 608 609 static void br_multicast_del_mdb_entry(struct net_bridge_mdb_entry *mp) 610 { 611 struct net_bridge *br = mp->br; 612 613 rhashtable_remove_fast(&br->mdb_hash_tbl, &mp->rhnode, 614 br_mdb_rht_params); 615 hlist_del_init_rcu(&mp->mdb_node); 616 hlist_add_head(&mp->mcast_gc.gc_node, &br->mcast_gc_list); 617 queue_work(system_long_wq, &br->mcast_gc_work); 618 } 619 620 static void br_multicast_group_expired(struct timer_list *t) 621 { 622 struct net_bridge_mdb_entry *mp = from_timer(mp, t, timer); 623 struct net_bridge *br = mp->br; 624 625 spin_lock(&br->multicast_lock); 626 if (hlist_unhashed(&mp->mdb_node) || !netif_running(br->dev) || 627 timer_pending(&mp->timer)) 628 goto out; 629 630 br_multicast_host_leave(mp, true); 631 632 if (mp->ports) 633 goto out; 634 br_multicast_del_mdb_entry(mp); 635 out: 636 spin_unlock(&br->multicast_lock); 637 } 638 639 static void br_multicast_destroy_group_src(struct net_bridge_mcast_gc *gc) 640 { 641 struct net_bridge_group_src *src; 642 643 src = container_of(gc, struct net_bridge_group_src, mcast_gc); 644 WARN_ON(!hlist_unhashed(&src->node)); 645 646 del_timer_sync(&src->timer); 647 kfree_rcu(src, rcu); 648 } 649 650 void br_multicast_del_group_src(struct net_bridge_group_src *src, 651 bool fastleave) 652 { 653 struct net_bridge *br = src->pg->key.port->br; 654 655 br_multicast_fwd_src_remove(src, fastleave); 656 hlist_del_init_rcu(&src->node); 657 src->pg->src_ents--; 658 hlist_add_head(&src->mcast_gc.gc_node, &br->mcast_gc_list); 659 queue_work(system_long_wq, &br->mcast_gc_work); 660 } 661 662 static void br_multicast_destroy_port_group(struct net_bridge_mcast_gc *gc) 663 { 664 struct net_bridge_port_group *pg; 665 666 pg = container_of(gc, struct net_bridge_port_group, mcast_gc); 667 WARN_ON(!hlist_unhashed(&pg->mglist)); 668 WARN_ON(!hlist_empty(&pg->src_list)); 669 670 del_timer_sync(&pg->rexmit_timer); 671 del_timer_sync(&pg->timer); 672 kfree_rcu(pg, rcu); 673 } 674 675 void br_multicast_del_pg(struct net_bridge_mdb_entry *mp, 676 struct net_bridge_port_group *pg, 677 struct net_bridge_port_group __rcu **pp) 678 { 679 struct net_bridge *br = pg->key.port->br; 680 struct net_bridge_group_src *ent; 681 struct hlist_node *tmp; 682 683 rcu_assign_pointer(*pp, pg->next); 684 hlist_del_init(&pg->mglist); 685 br_multicast_eht_clean_sets(pg); 686 hlist_for_each_entry_safe(ent, tmp, &pg->src_list, node) 687 br_multicast_del_group_src(ent, false); 688 br_mdb_notify(br->dev, mp, pg, RTM_DELMDB); 689 if (!br_multicast_is_star_g(&mp->addr)) { 690 rhashtable_remove_fast(&br->sg_port_tbl, &pg->rhnode, 691 br_sg_port_rht_params); 692 br_multicast_sg_del_exclude_ports(mp); 693 } else { 694 br_multicast_star_g_handle_mode(pg, MCAST_INCLUDE); 695 } 696 hlist_add_head(&pg->mcast_gc.gc_node, &br->mcast_gc_list); 697 queue_work(system_long_wq, &br->mcast_gc_work); 698 699 if (!mp->ports && !mp->host_joined && netif_running(br->dev)) 700 mod_timer(&mp->timer, jiffies); 701 } 702 703 static void br_multicast_find_del_pg(struct net_bridge *br, 704 struct net_bridge_port_group *pg) 705 { 706 struct net_bridge_port_group __rcu **pp; 707 struct net_bridge_mdb_entry *mp; 708 struct net_bridge_port_group *p; 709 710 mp = br_mdb_ip_get(br, &pg->key.addr); 711 if (WARN_ON(!mp)) 712 return; 713 714 for (pp = &mp->ports; 715 (p = mlock_dereference(*pp, br)) != NULL; 716 pp = &p->next) { 717 if (p != pg) 718 continue; 719 720 br_multicast_del_pg(mp, pg, pp); 721 return; 722 } 723 724 WARN_ON(1); 725 } 726 727 static void br_multicast_port_group_expired(struct timer_list *t) 728 { 729 struct net_bridge_port_group *pg = from_timer(pg, t, timer); 730 struct net_bridge_group_src *src_ent; 731 struct net_bridge *br = pg->key.port->br; 732 struct hlist_node *tmp; 733 bool changed; 734 735 spin_lock(&br->multicast_lock); 736 if (!netif_running(br->dev) || timer_pending(&pg->timer) || 737 hlist_unhashed(&pg->mglist) || pg->flags & MDB_PG_FLAGS_PERMANENT) 738 goto out; 739 740 changed = !!(pg->filter_mode == MCAST_EXCLUDE); 741 pg->filter_mode = MCAST_INCLUDE; 742 hlist_for_each_entry_safe(src_ent, tmp, &pg->src_list, node) { 743 if (!timer_pending(&src_ent->timer)) { 744 br_multicast_del_group_src(src_ent, false); 745 changed = true; 746 } 747 } 748 749 if (hlist_empty(&pg->src_list)) { 750 br_multicast_find_del_pg(br, pg); 751 } else if (changed) { 752 struct net_bridge_mdb_entry *mp = br_mdb_ip_get(br, &pg->key.addr); 753 754 if (changed && br_multicast_is_star_g(&pg->key.addr)) 755 br_multicast_star_g_handle_mode(pg, MCAST_INCLUDE); 756 757 if (WARN_ON(!mp)) 758 goto out; 759 br_mdb_notify(br->dev, mp, pg, RTM_NEWMDB); 760 } 761 out: 762 spin_unlock(&br->multicast_lock); 763 } 764 765 static void br_multicast_gc(struct hlist_head *head) 766 { 767 struct net_bridge_mcast_gc *gcent; 768 struct hlist_node *tmp; 769 770 hlist_for_each_entry_safe(gcent, tmp, head, gc_node) { 771 hlist_del_init(&gcent->gc_node); 772 gcent->destroy(gcent); 773 } 774 } 775 776 static void __br_multicast_query_handle_vlan(struct net_bridge_mcast *brmctx, 777 struct net_bridge_mcast_port *pmctx, 778 struct sk_buff *skb) 779 { 780 struct net_bridge_vlan *vlan = NULL; 781 782 if (pmctx && br_multicast_port_ctx_is_vlan(pmctx)) 783 vlan = pmctx->vlan; 784 else if (br_multicast_ctx_is_vlan(brmctx)) 785 vlan = brmctx->vlan; 786 787 if (vlan && !(vlan->flags & BRIDGE_VLAN_INFO_UNTAGGED)) { 788 u16 vlan_proto; 789 790 if (br_vlan_get_proto(brmctx->br->dev, &vlan_proto) != 0) 791 return; 792 __vlan_hwaccel_put_tag(skb, htons(vlan_proto), vlan->vid); 793 } 794 } 795 796 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge_mcast *brmctx, 797 struct net_bridge_mcast_port *pmctx, 798 struct net_bridge_port_group *pg, 799 __be32 ip_dst, __be32 group, 800 bool with_srcs, bool over_lmqt, 801 u8 sflag, u8 *igmp_type, 802 bool *need_rexmit) 803 { 804 struct net_bridge_port *p = pg ? pg->key.port : NULL; 805 struct net_bridge_group_src *ent; 806 size_t pkt_size, igmp_hdr_size; 807 unsigned long now = jiffies; 808 struct igmpv3_query *ihv3; 809 void *csum_start = NULL; 810 __sum16 *csum = NULL; 811 struct sk_buff *skb; 812 struct igmphdr *ih; 813 struct ethhdr *eth; 814 unsigned long lmqt; 815 struct iphdr *iph; 816 u16 lmqt_srcs = 0; 817 818 igmp_hdr_size = sizeof(*ih); 819 if (brmctx->multicast_igmp_version == 3) { 820 igmp_hdr_size = sizeof(*ihv3); 821 if (pg && with_srcs) { 822 lmqt = now + (brmctx->multicast_last_member_interval * 823 brmctx->multicast_last_member_count); 824 hlist_for_each_entry(ent, &pg->src_list, node) { 825 if (over_lmqt == time_after(ent->timer.expires, 826 lmqt) && 827 ent->src_query_rexmit_cnt > 0) 828 lmqt_srcs++; 829 } 830 831 if (!lmqt_srcs) 832 return NULL; 833 igmp_hdr_size += lmqt_srcs * sizeof(__be32); 834 } 835 } 836 837 pkt_size = sizeof(*eth) + sizeof(*iph) + 4 + igmp_hdr_size; 838 if ((p && pkt_size > p->dev->mtu) || 839 pkt_size > brmctx->br->dev->mtu) 840 return NULL; 841 842 skb = netdev_alloc_skb_ip_align(brmctx->br->dev, pkt_size); 843 if (!skb) 844 goto out; 845 846 __br_multicast_query_handle_vlan(brmctx, pmctx, skb); 847 skb->protocol = htons(ETH_P_IP); 848 849 skb_reset_mac_header(skb); 850 eth = eth_hdr(skb); 851 852 ether_addr_copy(eth->h_source, brmctx->br->dev->dev_addr); 853 ip_eth_mc_map(ip_dst, eth->h_dest); 854 eth->h_proto = htons(ETH_P_IP); 855 skb_put(skb, sizeof(*eth)); 856 857 skb_set_network_header(skb, skb->len); 858 iph = ip_hdr(skb); 859 iph->tot_len = htons(pkt_size - sizeof(*eth)); 860 861 iph->version = 4; 862 iph->ihl = 6; 863 iph->tos = 0xc0; 864 iph->id = 0; 865 iph->frag_off = htons(IP_DF); 866 iph->ttl = 1; 867 iph->protocol = IPPROTO_IGMP; 868 iph->saddr = br_opt_get(brmctx->br, BROPT_MULTICAST_QUERY_USE_IFADDR) ? 869 inet_select_addr(brmctx->br->dev, 0, RT_SCOPE_LINK) : 0; 870 iph->daddr = ip_dst; 871 ((u8 *)&iph[1])[0] = IPOPT_RA; 872 ((u8 *)&iph[1])[1] = 4; 873 ((u8 *)&iph[1])[2] = 0; 874 ((u8 *)&iph[1])[3] = 0; 875 ip_send_check(iph); 876 skb_put(skb, 24); 877 878 skb_set_transport_header(skb, skb->len); 879 *igmp_type = IGMP_HOST_MEMBERSHIP_QUERY; 880 881 switch (brmctx->multicast_igmp_version) { 882 case 2: 883 ih = igmp_hdr(skb); 884 ih->type = IGMP_HOST_MEMBERSHIP_QUERY; 885 ih->code = (group ? brmctx->multicast_last_member_interval : 886 brmctx->multicast_query_response_interval) / 887 (HZ / IGMP_TIMER_SCALE); 888 ih->group = group; 889 ih->csum = 0; 890 csum = &ih->csum; 891 csum_start = (void *)ih; 892 break; 893 case 3: 894 ihv3 = igmpv3_query_hdr(skb); 895 ihv3->type = IGMP_HOST_MEMBERSHIP_QUERY; 896 ihv3->code = (group ? brmctx->multicast_last_member_interval : 897 brmctx->multicast_query_response_interval) / 898 (HZ / IGMP_TIMER_SCALE); 899 ihv3->group = group; 900 ihv3->qqic = brmctx->multicast_query_interval / HZ; 901 ihv3->nsrcs = htons(lmqt_srcs); 902 ihv3->resv = 0; 903 ihv3->suppress = sflag; 904 ihv3->qrv = 2; 905 ihv3->csum = 0; 906 csum = &ihv3->csum; 907 csum_start = (void *)ihv3; 908 if (!pg || !with_srcs) 909 break; 910 911 lmqt_srcs = 0; 912 hlist_for_each_entry(ent, &pg->src_list, node) { 913 if (over_lmqt == time_after(ent->timer.expires, 914 lmqt) && 915 ent->src_query_rexmit_cnt > 0) { 916 ihv3->srcs[lmqt_srcs++] = ent->addr.src.ip4; 917 ent->src_query_rexmit_cnt--; 918 if (need_rexmit && ent->src_query_rexmit_cnt) 919 *need_rexmit = true; 920 } 921 } 922 if (WARN_ON(lmqt_srcs != ntohs(ihv3->nsrcs))) { 923 kfree_skb(skb); 924 return NULL; 925 } 926 break; 927 } 928 929 if (WARN_ON(!csum || !csum_start)) { 930 kfree_skb(skb); 931 return NULL; 932 } 933 934 *csum = ip_compute_csum(csum_start, igmp_hdr_size); 935 skb_put(skb, igmp_hdr_size); 936 __skb_pull(skb, sizeof(*eth)); 937 938 out: 939 return skb; 940 } 941 942 #if IS_ENABLED(CONFIG_IPV6) 943 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge_mcast *brmctx, 944 struct net_bridge_mcast_port *pmctx, 945 struct net_bridge_port_group *pg, 946 const struct in6_addr *ip6_dst, 947 const struct in6_addr *group, 948 bool with_srcs, bool over_llqt, 949 u8 sflag, u8 *igmp_type, 950 bool *need_rexmit) 951 { 952 struct net_bridge_port *p = pg ? pg->key.port : NULL; 953 struct net_bridge_group_src *ent; 954 size_t pkt_size, mld_hdr_size; 955 unsigned long now = jiffies; 956 struct mld2_query *mld2q; 957 void *csum_start = NULL; 958 unsigned long interval; 959 __sum16 *csum = NULL; 960 struct ipv6hdr *ip6h; 961 struct mld_msg *mldq; 962 struct sk_buff *skb; 963 unsigned long llqt; 964 struct ethhdr *eth; 965 u16 llqt_srcs = 0; 966 u8 *hopopt; 967 968 mld_hdr_size = sizeof(*mldq); 969 if (brmctx->multicast_mld_version == 2) { 970 mld_hdr_size = sizeof(*mld2q); 971 if (pg && with_srcs) { 972 llqt = now + (brmctx->multicast_last_member_interval * 973 brmctx->multicast_last_member_count); 974 hlist_for_each_entry(ent, &pg->src_list, node) { 975 if (over_llqt == time_after(ent->timer.expires, 976 llqt) && 977 ent->src_query_rexmit_cnt > 0) 978 llqt_srcs++; 979 } 980 981 if (!llqt_srcs) 982 return NULL; 983 mld_hdr_size += llqt_srcs * sizeof(struct in6_addr); 984 } 985 } 986 987 pkt_size = sizeof(*eth) + sizeof(*ip6h) + 8 + mld_hdr_size; 988 if ((p && pkt_size > p->dev->mtu) || 989 pkt_size > brmctx->br->dev->mtu) 990 return NULL; 991 992 skb = netdev_alloc_skb_ip_align(brmctx->br->dev, pkt_size); 993 if (!skb) 994 goto out; 995 996 __br_multicast_query_handle_vlan(brmctx, pmctx, skb); 997 skb->protocol = htons(ETH_P_IPV6); 998 999 /* Ethernet header */ 1000 skb_reset_mac_header(skb); 1001 eth = eth_hdr(skb); 1002 1003 ether_addr_copy(eth->h_source, brmctx->br->dev->dev_addr); 1004 eth->h_proto = htons(ETH_P_IPV6); 1005 skb_put(skb, sizeof(*eth)); 1006 1007 /* IPv6 header + HbH option */ 1008 skb_set_network_header(skb, skb->len); 1009 ip6h = ipv6_hdr(skb); 1010 1011 *(__force __be32 *)ip6h = htonl(0x60000000); 1012 ip6h->payload_len = htons(8 + mld_hdr_size); 1013 ip6h->nexthdr = IPPROTO_HOPOPTS; 1014 ip6h->hop_limit = 1; 1015 ip6h->daddr = *ip6_dst; 1016 if (ipv6_dev_get_saddr(dev_net(brmctx->br->dev), brmctx->br->dev, 1017 &ip6h->daddr, 0, &ip6h->saddr)) { 1018 kfree_skb(skb); 1019 br_opt_toggle(brmctx->br, BROPT_HAS_IPV6_ADDR, false); 1020 return NULL; 1021 } 1022 1023 br_opt_toggle(brmctx->br, BROPT_HAS_IPV6_ADDR, true); 1024 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest); 1025 1026 hopopt = (u8 *)(ip6h + 1); 1027 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */ 1028 hopopt[1] = 0; /* length of HbH */ 1029 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */ 1030 hopopt[3] = 2; /* Length of RA Option */ 1031 hopopt[4] = 0; /* Type = 0x0000 (MLD) */ 1032 hopopt[5] = 0; 1033 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */ 1034 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */ 1035 1036 skb_put(skb, sizeof(*ip6h) + 8); 1037 1038 /* ICMPv6 */ 1039 skb_set_transport_header(skb, skb->len); 1040 interval = ipv6_addr_any(group) ? 1041 brmctx->multicast_query_response_interval : 1042 brmctx->multicast_last_member_interval; 1043 *igmp_type = ICMPV6_MGM_QUERY; 1044 switch (brmctx->multicast_mld_version) { 1045 case 1: 1046 mldq = (struct mld_msg *)icmp6_hdr(skb); 1047 mldq->mld_type = ICMPV6_MGM_QUERY; 1048 mldq->mld_code = 0; 1049 mldq->mld_cksum = 0; 1050 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval)); 1051 mldq->mld_reserved = 0; 1052 mldq->mld_mca = *group; 1053 csum = &mldq->mld_cksum; 1054 csum_start = (void *)mldq; 1055 break; 1056 case 2: 1057 mld2q = (struct mld2_query *)icmp6_hdr(skb); 1058 mld2q->mld2q_mrc = htons((u16)jiffies_to_msecs(interval)); 1059 mld2q->mld2q_type = ICMPV6_MGM_QUERY; 1060 mld2q->mld2q_code = 0; 1061 mld2q->mld2q_cksum = 0; 1062 mld2q->mld2q_resv1 = 0; 1063 mld2q->mld2q_resv2 = 0; 1064 mld2q->mld2q_suppress = sflag; 1065 mld2q->mld2q_qrv = 2; 1066 mld2q->mld2q_nsrcs = htons(llqt_srcs); 1067 mld2q->mld2q_qqic = brmctx->multicast_query_interval / HZ; 1068 mld2q->mld2q_mca = *group; 1069 csum = &mld2q->mld2q_cksum; 1070 csum_start = (void *)mld2q; 1071 if (!pg || !with_srcs) 1072 break; 1073 1074 llqt_srcs = 0; 1075 hlist_for_each_entry(ent, &pg->src_list, node) { 1076 if (over_llqt == time_after(ent->timer.expires, 1077 llqt) && 1078 ent->src_query_rexmit_cnt > 0) { 1079 mld2q->mld2q_srcs[llqt_srcs++] = ent->addr.src.ip6; 1080 ent->src_query_rexmit_cnt--; 1081 if (need_rexmit && ent->src_query_rexmit_cnt) 1082 *need_rexmit = true; 1083 } 1084 } 1085 if (WARN_ON(llqt_srcs != ntohs(mld2q->mld2q_nsrcs))) { 1086 kfree_skb(skb); 1087 return NULL; 1088 } 1089 break; 1090 } 1091 1092 if (WARN_ON(!csum || !csum_start)) { 1093 kfree_skb(skb); 1094 return NULL; 1095 } 1096 1097 *csum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, mld_hdr_size, 1098 IPPROTO_ICMPV6, 1099 csum_partial(csum_start, mld_hdr_size, 0)); 1100 skb_put(skb, mld_hdr_size); 1101 __skb_pull(skb, sizeof(*eth)); 1102 1103 out: 1104 return skb; 1105 } 1106 #endif 1107 1108 static struct sk_buff *br_multicast_alloc_query(struct net_bridge_mcast *brmctx, 1109 struct net_bridge_mcast_port *pmctx, 1110 struct net_bridge_port_group *pg, 1111 struct br_ip *ip_dst, 1112 struct br_ip *group, 1113 bool with_srcs, bool over_lmqt, 1114 u8 sflag, u8 *igmp_type, 1115 bool *need_rexmit) 1116 { 1117 __be32 ip4_dst; 1118 1119 switch (group->proto) { 1120 case htons(ETH_P_IP): 1121 ip4_dst = ip_dst ? ip_dst->dst.ip4 : htonl(INADDR_ALLHOSTS_GROUP); 1122 return br_ip4_multicast_alloc_query(brmctx, pmctx, pg, 1123 ip4_dst, group->dst.ip4, 1124 with_srcs, over_lmqt, 1125 sflag, igmp_type, 1126 need_rexmit); 1127 #if IS_ENABLED(CONFIG_IPV6) 1128 case htons(ETH_P_IPV6): { 1129 struct in6_addr ip6_dst; 1130 1131 if (ip_dst) 1132 ip6_dst = ip_dst->dst.ip6; 1133 else 1134 ipv6_addr_set(&ip6_dst, htonl(0xff020000), 0, 0, 1135 htonl(1)); 1136 1137 return br_ip6_multicast_alloc_query(brmctx, pmctx, pg, 1138 &ip6_dst, &group->dst.ip6, 1139 with_srcs, over_lmqt, 1140 sflag, igmp_type, 1141 need_rexmit); 1142 } 1143 #endif 1144 } 1145 return NULL; 1146 } 1147 1148 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br, 1149 struct br_ip *group) 1150 { 1151 struct net_bridge_mdb_entry *mp; 1152 int err; 1153 1154 mp = br_mdb_ip_get(br, group); 1155 if (mp) 1156 return mp; 1157 1158 if (atomic_read(&br->mdb_hash_tbl.nelems) >= br->hash_max) { 1159 br_opt_toggle(br, BROPT_MULTICAST_ENABLED, false); 1160 return ERR_PTR(-E2BIG); 1161 } 1162 1163 mp = kzalloc(sizeof(*mp), GFP_ATOMIC); 1164 if (unlikely(!mp)) 1165 return ERR_PTR(-ENOMEM); 1166 1167 mp->br = br; 1168 mp->addr = *group; 1169 mp->mcast_gc.destroy = br_multicast_destroy_mdb_entry; 1170 timer_setup(&mp->timer, br_multicast_group_expired, 0); 1171 err = rhashtable_lookup_insert_fast(&br->mdb_hash_tbl, &mp->rhnode, 1172 br_mdb_rht_params); 1173 if (err) { 1174 kfree(mp); 1175 mp = ERR_PTR(err); 1176 } else { 1177 hlist_add_head_rcu(&mp->mdb_node, &br->mdb_list); 1178 } 1179 1180 return mp; 1181 } 1182 1183 static void br_multicast_group_src_expired(struct timer_list *t) 1184 { 1185 struct net_bridge_group_src *src = from_timer(src, t, timer); 1186 struct net_bridge_port_group *pg; 1187 struct net_bridge *br = src->br; 1188 1189 spin_lock(&br->multicast_lock); 1190 if (hlist_unhashed(&src->node) || !netif_running(br->dev) || 1191 timer_pending(&src->timer)) 1192 goto out; 1193 1194 pg = src->pg; 1195 if (pg->filter_mode == MCAST_INCLUDE) { 1196 br_multicast_del_group_src(src, false); 1197 if (!hlist_empty(&pg->src_list)) 1198 goto out; 1199 br_multicast_find_del_pg(br, pg); 1200 } else { 1201 br_multicast_fwd_src_handle(src); 1202 } 1203 1204 out: 1205 spin_unlock(&br->multicast_lock); 1206 } 1207 1208 struct net_bridge_group_src * 1209 br_multicast_find_group_src(struct net_bridge_port_group *pg, struct br_ip *ip) 1210 { 1211 struct net_bridge_group_src *ent; 1212 1213 switch (ip->proto) { 1214 case htons(ETH_P_IP): 1215 hlist_for_each_entry(ent, &pg->src_list, node) 1216 if (ip->src.ip4 == ent->addr.src.ip4) 1217 return ent; 1218 break; 1219 #if IS_ENABLED(CONFIG_IPV6) 1220 case htons(ETH_P_IPV6): 1221 hlist_for_each_entry(ent, &pg->src_list, node) 1222 if (!ipv6_addr_cmp(&ent->addr.src.ip6, &ip->src.ip6)) 1223 return ent; 1224 break; 1225 #endif 1226 } 1227 1228 return NULL; 1229 } 1230 1231 static struct net_bridge_group_src * 1232 br_multicast_new_group_src(struct net_bridge_port_group *pg, struct br_ip *src_ip) 1233 { 1234 struct net_bridge_group_src *grp_src; 1235 1236 if (unlikely(pg->src_ents >= PG_SRC_ENT_LIMIT)) 1237 return NULL; 1238 1239 switch (src_ip->proto) { 1240 case htons(ETH_P_IP): 1241 if (ipv4_is_zeronet(src_ip->src.ip4) || 1242 ipv4_is_multicast(src_ip->src.ip4)) 1243 return NULL; 1244 break; 1245 #if IS_ENABLED(CONFIG_IPV6) 1246 case htons(ETH_P_IPV6): 1247 if (ipv6_addr_any(&src_ip->src.ip6) || 1248 ipv6_addr_is_multicast(&src_ip->src.ip6)) 1249 return NULL; 1250 break; 1251 #endif 1252 } 1253 1254 grp_src = kzalloc(sizeof(*grp_src), GFP_ATOMIC); 1255 if (unlikely(!grp_src)) 1256 return NULL; 1257 1258 grp_src->pg = pg; 1259 grp_src->br = pg->key.port->br; 1260 grp_src->addr = *src_ip; 1261 grp_src->mcast_gc.destroy = br_multicast_destroy_group_src; 1262 timer_setup(&grp_src->timer, br_multicast_group_src_expired, 0); 1263 1264 hlist_add_head_rcu(&grp_src->node, &pg->src_list); 1265 pg->src_ents++; 1266 1267 return grp_src; 1268 } 1269 1270 struct net_bridge_port_group *br_multicast_new_port_group( 1271 struct net_bridge_port *port, 1272 struct br_ip *group, 1273 struct net_bridge_port_group __rcu *next, 1274 unsigned char flags, 1275 const unsigned char *src, 1276 u8 filter_mode, 1277 u8 rt_protocol) 1278 { 1279 struct net_bridge_port_group *p; 1280 1281 p = kzalloc(sizeof(*p), GFP_ATOMIC); 1282 if (unlikely(!p)) 1283 return NULL; 1284 1285 p->key.addr = *group; 1286 p->key.port = port; 1287 p->flags = flags; 1288 p->filter_mode = filter_mode; 1289 p->rt_protocol = rt_protocol; 1290 p->eht_host_tree = RB_ROOT; 1291 p->eht_set_tree = RB_ROOT; 1292 p->mcast_gc.destroy = br_multicast_destroy_port_group; 1293 INIT_HLIST_HEAD(&p->src_list); 1294 1295 if (!br_multicast_is_star_g(group) && 1296 rhashtable_lookup_insert_fast(&port->br->sg_port_tbl, &p->rhnode, 1297 br_sg_port_rht_params)) { 1298 kfree(p); 1299 return NULL; 1300 } 1301 1302 rcu_assign_pointer(p->next, next); 1303 timer_setup(&p->timer, br_multicast_port_group_expired, 0); 1304 timer_setup(&p->rexmit_timer, br_multicast_port_group_rexmit, 0); 1305 hlist_add_head(&p->mglist, &port->mglist); 1306 1307 if (src) 1308 memcpy(p->eth_addr, src, ETH_ALEN); 1309 else 1310 eth_broadcast_addr(p->eth_addr); 1311 1312 return p; 1313 } 1314 1315 void br_multicast_host_join(const struct net_bridge_mcast *brmctx, 1316 struct net_bridge_mdb_entry *mp, bool notify) 1317 { 1318 if (!mp->host_joined) { 1319 mp->host_joined = true; 1320 if (br_multicast_is_star_g(&mp->addr)) 1321 br_multicast_star_g_host_state(mp); 1322 if (notify) 1323 br_mdb_notify(mp->br->dev, mp, NULL, RTM_NEWMDB); 1324 } 1325 1326 if (br_group_is_l2(&mp->addr)) 1327 return; 1328 1329 mod_timer(&mp->timer, jiffies + brmctx->multicast_membership_interval); 1330 } 1331 1332 void br_multicast_host_leave(struct net_bridge_mdb_entry *mp, bool notify) 1333 { 1334 if (!mp->host_joined) 1335 return; 1336 1337 mp->host_joined = false; 1338 if (br_multicast_is_star_g(&mp->addr)) 1339 br_multicast_star_g_host_state(mp); 1340 if (notify) 1341 br_mdb_notify(mp->br->dev, mp, NULL, RTM_DELMDB); 1342 } 1343 1344 static struct net_bridge_port_group * 1345 __br_multicast_add_group(struct net_bridge_mcast *brmctx, 1346 struct net_bridge_mcast_port *pmctx, 1347 struct br_ip *group, 1348 const unsigned char *src, 1349 u8 filter_mode, 1350 bool igmpv2_mldv1, 1351 bool blocked) 1352 { 1353 struct net_bridge_port_group __rcu **pp; 1354 struct net_bridge_port_group *p = NULL; 1355 struct net_bridge_mdb_entry *mp; 1356 unsigned long now = jiffies; 1357 1358 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 1359 goto out; 1360 1361 mp = br_multicast_new_group(brmctx->br, group); 1362 if (IS_ERR(mp)) 1363 return ERR_CAST(mp); 1364 1365 if (!pmctx) { 1366 br_multicast_host_join(brmctx, mp, true); 1367 goto out; 1368 } 1369 1370 for (pp = &mp->ports; 1371 (p = mlock_dereference(*pp, brmctx->br)) != NULL; 1372 pp = &p->next) { 1373 if (br_port_group_equal(p, pmctx->port, src)) 1374 goto found; 1375 if ((unsigned long)p->key.port < (unsigned long)pmctx->port) 1376 break; 1377 } 1378 1379 p = br_multicast_new_port_group(pmctx->port, group, *pp, 0, src, 1380 filter_mode, RTPROT_KERNEL); 1381 if (unlikely(!p)) { 1382 p = ERR_PTR(-ENOMEM); 1383 goto out; 1384 } 1385 rcu_assign_pointer(*pp, p); 1386 if (blocked) 1387 p->flags |= MDB_PG_FLAGS_BLOCKED; 1388 br_mdb_notify(brmctx->br->dev, mp, p, RTM_NEWMDB); 1389 1390 found: 1391 if (igmpv2_mldv1) 1392 mod_timer(&p->timer, 1393 now + brmctx->multicast_membership_interval); 1394 1395 out: 1396 return p; 1397 } 1398 1399 static int br_multicast_add_group(struct net_bridge_mcast *brmctx, 1400 struct net_bridge_mcast_port *pmctx, 1401 struct br_ip *group, 1402 const unsigned char *src, 1403 u8 filter_mode, 1404 bool igmpv2_mldv1) 1405 { 1406 struct net_bridge_port_group *pg; 1407 int err; 1408 1409 spin_lock(&brmctx->br->multicast_lock); 1410 pg = __br_multicast_add_group(brmctx, pmctx, group, src, filter_mode, 1411 igmpv2_mldv1, false); 1412 /* NULL is considered valid for host joined groups */ 1413 err = PTR_ERR_OR_ZERO(pg); 1414 spin_unlock(&brmctx->br->multicast_lock); 1415 1416 return err; 1417 } 1418 1419 static int br_ip4_multicast_add_group(struct net_bridge_mcast *brmctx, 1420 struct net_bridge_mcast_port *pmctx, 1421 __be32 group, 1422 __u16 vid, 1423 const unsigned char *src, 1424 bool igmpv2) 1425 { 1426 struct br_ip br_group; 1427 u8 filter_mode; 1428 1429 if (ipv4_is_local_multicast(group)) 1430 return 0; 1431 1432 memset(&br_group, 0, sizeof(br_group)); 1433 br_group.dst.ip4 = group; 1434 br_group.proto = htons(ETH_P_IP); 1435 br_group.vid = vid; 1436 filter_mode = igmpv2 ? MCAST_EXCLUDE : MCAST_INCLUDE; 1437 1438 return br_multicast_add_group(brmctx, pmctx, &br_group, src, 1439 filter_mode, igmpv2); 1440 } 1441 1442 #if IS_ENABLED(CONFIG_IPV6) 1443 static int br_ip6_multicast_add_group(struct net_bridge_mcast *brmctx, 1444 struct net_bridge_mcast_port *pmctx, 1445 const struct in6_addr *group, 1446 __u16 vid, 1447 const unsigned char *src, 1448 bool mldv1) 1449 { 1450 struct br_ip br_group; 1451 u8 filter_mode; 1452 1453 if (ipv6_addr_is_ll_all_nodes(group)) 1454 return 0; 1455 1456 memset(&br_group, 0, sizeof(br_group)); 1457 br_group.dst.ip6 = *group; 1458 br_group.proto = htons(ETH_P_IPV6); 1459 br_group.vid = vid; 1460 filter_mode = mldv1 ? MCAST_EXCLUDE : MCAST_INCLUDE; 1461 1462 return br_multicast_add_group(brmctx, pmctx, &br_group, src, 1463 filter_mode, mldv1); 1464 } 1465 #endif 1466 1467 static bool br_multicast_rport_del(struct hlist_node *rlist) 1468 { 1469 if (hlist_unhashed(rlist)) 1470 return false; 1471 1472 hlist_del_init_rcu(rlist); 1473 return true; 1474 } 1475 1476 static bool br_ip4_multicast_rport_del(struct net_bridge_mcast_port *pmctx) 1477 { 1478 return br_multicast_rport_del(&pmctx->ip4_rlist); 1479 } 1480 1481 static bool br_ip6_multicast_rport_del(struct net_bridge_mcast_port *pmctx) 1482 { 1483 #if IS_ENABLED(CONFIG_IPV6) 1484 return br_multicast_rport_del(&pmctx->ip6_rlist); 1485 #else 1486 return false; 1487 #endif 1488 } 1489 1490 static void br_multicast_router_expired(struct net_bridge_mcast_port *pmctx, 1491 struct timer_list *t, 1492 struct hlist_node *rlist) 1493 { 1494 struct net_bridge *br = pmctx->port->br; 1495 bool del; 1496 1497 spin_lock(&br->multicast_lock); 1498 if (pmctx->multicast_router == MDB_RTR_TYPE_DISABLED || 1499 pmctx->multicast_router == MDB_RTR_TYPE_PERM || 1500 timer_pending(t)) 1501 goto out; 1502 1503 del = br_multicast_rport_del(rlist); 1504 br_multicast_rport_del_notify(pmctx, del); 1505 out: 1506 spin_unlock(&br->multicast_lock); 1507 } 1508 1509 static void br_ip4_multicast_router_expired(struct timer_list *t) 1510 { 1511 struct net_bridge_mcast_port *pmctx = from_timer(pmctx, t, 1512 ip4_mc_router_timer); 1513 1514 br_multicast_router_expired(pmctx, t, &pmctx->ip4_rlist); 1515 } 1516 1517 #if IS_ENABLED(CONFIG_IPV6) 1518 static void br_ip6_multicast_router_expired(struct timer_list *t) 1519 { 1520 struct net_bridge_mcast_port *pmctx = from_timer(pmctx, t, 1521 ip6_mc_router_timer); 1522 1523 br_multicast_router_expired(pmctx, t, &pmctx->ip6_rlist); 1524 } 1525 #endif 1526 1527 static void br_mc_router_state_change(struct net_bridge *p, 1528 bool is_mc_router) 1529 { 1530 struct switchdev_attr attr = { 1531 .orig_dev = p->dev, 1532 .id = SWITCHDEV_ATTR_ID_BRIDGE_MROUTER, 1533 .flags = SWITCHDEV_F_DEFER, 1534 .u.mrouter = is_mc_router, 1535 }; 1536 1537 switchdev_port_attr_set(p->dev, &attr, NULL); 1538 } 1539 1540 static void br_multicast_local_router_expired(struct net_bridge_mcast *brmctx, 1541 struct timer_list *timer) 1542 { 1543 spin_lock(&brmctx->br->multicast_lock); 1544 if (brmctx->multicast_router == MDB_RTR_TYPE_DISABLED || 1545 brmctx->multicast_router == MDB_RTR_TYPE_PERM || 1546 br_ip4_multicast_is_router(brmctx) || 1547 br_ip6_multicast_is_router(brmctx)) 1548 goto out; 1549 1550 br_mc_router_state_change(brmctx->br, false); 1551 out: 1552 spin_unlock(&brmctx->br->multicast_lock); 1553 } 1554 1555 static void br_ip4_multicast_local_router_expired(struct timer_list *t) 1556 { 1557 struct net_bridge_mcast *brmctx = from_timer(brmctx, t, 1558 ip4_mc_router_timer); 1559 1560 br_multicast_local_router_expired(brmctx, t); 1561 } 1562 1563 #if IS_ENABLED(CONFIG_IPV6) 1564 static void br_ip6_multicast_local_router_expired(struct timer_list *t) 1565 { 1566 struct net_bridge_mcast *brmctx = from_timer(brmctx, t, 1567 ip6_mc_router_timer); 1568 1569 br_multicast_local_router_expired(brmctx, t); 1570 } 1571 #endif 1572 1573 static void br_multicast_querier_expired(struct net_bridge_mcast *brmctx, 1574 struct bridge_mcast_own_query *query) 1575 { 1576 spin_lock(&brmctx->br->multicast_lock); 1577 if (!netif_running(brmctx->br->dev) || 1578 br_multicast_ctx_vlan_global_disabled(brmctx) || 1579 !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED)) 1580 goto out; 1581 1582 br_multicast_start_querier(brmctx, query); 1583 1584 out: 1585 spin_unlock(&brmctx->br->multicast_lock); 1586 } 1587 1588 static void br_ip4_multicast_querier_expired(struct timer_list *t) 1589 { 1590 struct net_bridge_mcast *brmctx = from_timer(brmctx, t, 1591 ip4_other_query.timer); 1592 1593 br_multicast_querier_expired(brmctx, &brmctx->ip4_own_query); 1594 } 1595 1596 #if IS_ENABLED(CONFIG_IPV6) 1597 static void br_ip6_multicast_querier_expired(struct timer_list *t) 1598 { 1599 struct net_bridge_mcast *brmctx = from_timer(brmctx, t, 1600 ip6_other_query.timer); 1601 1602 br_multicast_querier_expired(brmctx, &brmctx->ip6_own_query); 1603 } 1604 #endif 1605 1606 static void br_multicast_select_own_querier(struct net_bridge_mcast *brmctx, 1607 struct br_ip *ip, 1608 struct sk_buff *skb) 1609 { 1610 if (ip->proto == htons(ETH_P_IP)) 1611 brmctx->ip4_querier.addr.src.ip4 = ip_hdr(skb)->saddr; 1612 #if IS_ENABLED(CONFIG_IPV6) 1613 else 1614 brmctx->ip6_querier.addr.src.ip6 = ipv6_hdr(skb)->saddr; 1615 #endif 1616 } 1617 1618 static void __br_multicast_send_query(struct net_bridge_mcast *brmctx, 1619 struct net_bridge_mcast_port *pmctx, 1620 struct net_bridge_port_group *pg, 1621 struct br_ip *ip_dst, 1622 struct br_ip *group, 1623 bool with_srcs, 1624 u8 sflag, 1625 bool *need_rexmit) 1626 { 1627 bool over_lmqt = !!sflag; 1628 struct sk_buff *skb; 1629 u8 igmp_type; 1630 1631 if (!br_multicast_ctx_should_use(brmctx, pmctx) || 1632 !br_multicast_ctx_matches_vlan_snooping(brmctx)) 1633 return; 1634 1635 again_under_lmqt: 1636 skb = br_multicast_alloc_query(brmctx, pmctx, pg, ip_dst, group, 1637 with_srcs, over_lmqt, sflag, &igmp_type, 1638 need_rexmit); 1639 if (!skb) 1640 return; 1641 1642 if (pmctx) { 1643 skb->dev = pmctx->port->dev; 1644 br_multicast_count(brmctx->br, pmctx->port, skb, igmp_type, 1645 BR_MCAST_DIR_TX); 1646 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, 1647 dev_net(pmctx->port->dev), NULL, skb, NULL, skb->dev, 1648 br_dev_queue_push_xmit); 1649 1650 if (over_lmqt && with_srcs && sflag) { 1651 over_lmqt = false; 1652 goto again_under_lmqt; 1653 } 1654 } else { 1655 br_multicast_select_own_querier(brmctx, group, skb); 1656 br_multicast_count(brmctx->br, NULL, skb, igmp_type, 1657 BR_MCAST_DIR_RX); 1658 netif_rx(skb); 1659 } 1660 } 1661 1662 static void br_multicast_send_query(struct net_bridge_mcast *brmctx, 1663 struct net_bridge_mcast_port *pmctx, 1664 struct bridge_mcast_own_query *own_query) 1665 { 1666 struct bridge_mcast_other_query *other_query = NULL; 1667 struct br_ip br_group; 1668 unsigned long time; 1669 1670 if (!br_multicast_ctx_should_use(brmctx, pmctx) || 1671 !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED) || 1672 !brmctx->multicast_querier) 1673 return; 1674 1675 memset(&br_group.dst, 0, sizeof(br_group.dst)); 1676 1677 if (pmctx ? (own_query == &pmctx->ip4_own_query) : 1678 (own_query == &brmctx->ip4_own_query)) { 1679 other_query = &brmctx->ip4_other_query; 1680 br_group.proto = htons(ETH_P_IP); 1681 #if IS_ENABLED(CONFIG_IPV6) 1682 } else { 1683 other_query = &brmctx->ip6_other_query; 1684 br_group.proto = htons(ETH_P_IPV6); 1685 #endif 1686 } 1687 1688 if (!other_query || timer_pending(&other_query->timer)) 1689 return; 1690 1691 __br_multicast_send_query(brmctx, pmctx, NULL, NULL, &br_group, false, 1692 0, NULL); 1693 1694 time = jiffies; 1695 time += own_query->startup_sent < brmctx->multicast_startup_query_count ? 1696 brmctx->multicast_startup_query_interval : 1697 brmctx->multicast_query_interval; 1698 mod_timer(&own_query->timer, time); 1699 } 1700 1701 static void 1702 br_multicast_port_query_expired(struct net_bridge_mcast_port *pmctx, 1703 struct bridge_mcast_own_query *query) 1704 { 1705 struct net_bridge *br = pmctx->port->br; 1706 struct net_bridge_mcast *brmctx; 1707 1708 spin_lock(&br->multicast_lock); 1709 if (br_multicast_port_ctx_state_stopped(pmctx)) 1710 goto out; 1711 1712 brmctx = br_multicast_port_ctx_get_global(pmctx); 1713 if (query->startup_sent < brmctx->multicast_startup_query_count) 1714 query->startup_sent++; 1715 1716 br_multicast_send_query(brmctx, pmctx, query); 1717 1718 out: 1719 spin_unlock(&br->multicast_lock); 1720 } 1721 1722 static void br_ip4_multicast_port_query_expired(struct timer_list *t) 1723 { 1724 struct net_bridge_mcast_port *pmctx = from_timer(pmctx, t, 1725 ip4_own_query.timer); 1726 1727 br_multicast_port_query_expired(pmctx, &pmctx->ip4_own_query); 1728 } 1729 1730 #if IS_ENABLED(CONFIG_IPV6) 1731 static void br_ip6_multicast_port_query_expired(struct timer_list *t) 1732 { 1733 struct net_bridge_mcast_port *pmctx = from_timer(pmctx, t, 1734 ip6_own_query.timer); 1735 1736 br_multicast_port_query_expired(pmctx, &pmctx->ip6_own_query); 1737 } 1738 #endif 1739 1740 static void br_multicast_port_group_rexmit(struct timer_list *t) 1741 { 1742 struct net_bridge_port_group *pg = from_timer(pg, t, rexmit_timer); 1743 struct bridge_mcast_other_query *other_query = NULL; 1744 struct net_bridge *br = pg->key.port->br; 1745 struct net_bridge_mcast_port *pmctx; 1746 struct net_bridge_mcast *brmctx; 1747 bool need_rexmit = false; 1748 1749 spin_lock(&br->multicast_lock); 1750 if (!netif_running(br->dev) || hlist_unhashed(&pg->mglist) || 1751 !br_opt_get(br, BROPT_MULTICAST_ENABLED)) 1752 goto out; 1753 1754 pmctx = br_multicast_pg_to_port_ctx(pg); 1755 if (!pmctx) 1756 goto out; 1757 brmctx = br_multicast_port_ctx_get_global(pmctx); 1758 if (!brmctx->multicast_querier) 1759 goto out; 1760 1761 if (pg->key.addr.proto == htons(ETH_P_IP)) 1762 other_query = &brmctx->ip4_other_query; 1763 #if IS_ENABLED(CONFIG_IPV6) 1764 else 1765 other_query = &brmctx->ip6_other_query; 1766 #endif 1767 1768 if (!other_query || timer_pending(&other_query->timer)) 1769 goto out; 1770 1771 if (pg->grp_query_rexmit_cnt) { 1772 pg->grp_query_rexmit_cnt--; 1773 __br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, 1774 &pg->key.addr, false, 1, NULL); 1775 } 1776 __br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, 1777 &pg->key.addr, true, 0, &need_rexmit); 1778 1779 if (pg->grp_query_rexmit_cnt || need_rexmit) 1780 mod_timer(&pg->rexmit_timer, jiffies + 1781 brmctx->multicast_last_member_interval); 1782 out: 1783 spin_unlock(&br->multicast_lock); 1784 } 1785 1786 static int br_mc_disabled_update(struct net_device *dev, bool value, 1787 struct netlink_ext_ack *extack) 1788 { 1789 struct switchdev_attr attr = { 1790 .orig_dev = dev, 1791 .id = SWITCHDEV_ATTR_ID_BRIDGE_MC_DISABLED, 1792 .flags = SWITCHDEV_F_DEFER, 1793 .u.mc_disabled = !value, 1794 }; 1795 1796 return switchdev_port_attr_set(dev, &attr, extack); 1797 } 1798 1799 void br_multicast_port_ctx_init(struct net_bridge_port *port, 1800 struct net_bridge_vlan *vlan, 1801 struct net_bridge_mcast_port *pmctx) 1802 { 1803 pmctx->port = port; 1804 pmctx->vlan = vlan; 1805 pmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; 1806 timer_setup(&pmctx->ip4_mc_router_timer, 1807 br_ip4_multicast_router_expired, 0); 1808 timer_setup(&pmctx->ip4_own_query.timer, 1809 br_ip4_multicast_port_query_expired, 0); 1810 #if IS_ENABLED(CONFIG_IPV6) 1811 timer_setup(&pmctx->ip6_mc_router_timer, 1812 br_ip6_multicast_router_expired, 0); 1813 timer_setup(&pmctx->ip6_own_query.timer, 1814 br_ip6_multicast_port_query_expired, 0); 1815 #endif 1816 } 1817 1818 void br_multicast_port_ctx_deinit(struct net_bridge_mcast_port *pmctx) 1819 { 1820 #if IS_ENABLED(CONFIG_IPV6) 1821 del_timer_sync(&pmctx->ip6_mc_router_timer); 1822 #endif 1823 del_timer_sync(&pmctx->ip4_mc_router_timer); 1824 } 1825 1826 int br_multicast_add_port(struct net_bridge_port *port) 1827 { 1828 int err; 1829 1830 port->multicast_eht_hosts_limit = BR_MCAST_DEFAULT_EHT_HOSTS_LIMIT; 1831 br_multicast_port_ctx_init(port, NULL, &port->multicast_ctx); 1832 1833 err = br_mc_disabled_update(port->dev, 1834 br_opt_get(port->br, 1835 BROPT_MULTICAST_ENABLED), 1836 NULL); 1837 if (err && err != -EOPNOTSUPP) 1838 return err; 1839 1840 port->mcast_stats = netdev_alloc_pcpu_stats(struct bridge_mcast_stats); 1841 if (!port->mcast_stats) 1842 return -ENOMEM; 1843 1844 return 0; 1845 } 1846 1847 void br_multicast_del_port(struct net_bridge_port *port) 1848 { 1849 struct net_bridge *br = port->br; 1850 struct net_bridge_port_group *pg; 1851 HLIST_HEAD(deleted_head); 1852 struct hlist_node *n; 1853 1854 /* Take care of the remaining groups, only perm ones should be left */ 1855 spin_lock_bh(&br->multicast_lock); 1856 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist) 1857 br_multicast_find_del_pg(br, pg); 1858 hlist_move_list(&br->mcast_gc_list, &deleted_head); 1859 spin_unlock_bh(&br->multicast_lock); 1860 br_multicast_gc(&deleted_head); 1861 br_multicast_port_ctx_deinit(&port->multicast_ctx); 1862 free_percpu(port->mcast_stats); 1863 } 1864 1865 static void br_multicast_enable(struct bridge_mcast_own_query *query) 1866 { 1867 query->startup_sent = 0; 1868 1869 if (try_to_del_timer_sync(&query->timer) >= 0 || 1870 del_timer(&query->timer)) 1871 mod_timer(&query->timer, jiffies); 1872 } 1873 1874 static void __br_multicast_enable_port_ctx(struct net_bridge_mcast_port *pmctx) 1875 { 1876 struct net_bridge *br = pmctx->port->br; 1877 struct net_bridge_mcast *brmctx; 1878 1879 brmctx = br_multicast_port_ctx_get_global(pmctx); 1880 if (!br_opt_get(br, BROPT_MULTICAST_ENABLED) || 1881 !netif_running(br->dev)) 1882 return; 1883 1884 br_multicast_enable(&pmctx->ip4_own_query); 1885 #if IS_ENABLED(CONFIG_IPV6) 1886 br_multicast_enable(&pmctx->ip6_own_query); 1887 #endif 1888 if (pmctx->multicast_router == MDB_RTR_TYPE_PERM) { 1889 br_ip4_multicast_add_router(brmctx, pmctx); 1890 br_ip6_multicast_add_router(brmctx, pmctx); 1891 } 1892 } 1893 1894 void br_multicast_enable_port(struct net_bridge_port *port) 1895 { 1896 struct net_bridge *br = port->br; 1897 1898 spin_lock_bh(&br->multicast_lock); 1899 __br_multicast_enable_port_ctx(&port->multicast_ctx); 1900 spin_unlock_bh(&br->multicast_lock); 1901 } 1902 1903 static void __br_multicast_disable_port_ctx(struct net_bridge_mcast_port *pmctx) 1904 { 1905 struct net_bridge_port_group *pg; 1906 struct hlist_node *n; 1907 bool del = false; 1908 1909 hlist_for_each_entry_safe(pg, n, &pmctx->port->mglist, mglist) 1910 if (!(pg->flags & MDB_PG_FLAGS_PERMANENT) && 1911 (!br_multicast_port_ctx_is_vlan(pmctx) || 1912 pg->key.addr.vid == pmctx->vlan->vid)) 1913 br_multicast_find_del_pg(pmctx->port->br, pg); 1914 1915 del |= br_ip4_multicast_rport_del(pmctx); 1916 del_timer(&pmctx->ip4_mc_router_timer); 1917 del_timer(&pmctx->ip4_own_query.timer); 1918 del |= br_ip6_multicast_rport_del(pmctx); 1919 #if IS_ENABLED(CONFIG_IPV6) 1920 del_timer(&pmctx->ip6_mc_router_timer); 1921 del_timer(&pmctx->ip6_own_query.timer); 1922 #endif 1923 br_multicast_rport_del_notify(pmctx, del); 1924 } 1925 1926 void br_multicast_disable_port(struct net_bridge_port *port) 1927 { 1928 spin_lock_bh(&port->br->multicast_lock); 1929 __br_multicast_disable_port_ctx(&port->multicast_ctx); 1930 spin_unlock_bh(&port->br->multicast_lock); 1931 } 1932 1933 static int __grp_src_delete_marked(struct net_bridge_port_group *pg) 1934 { 1935 struct net_bridge_group_src *ent; 1936 struct hlist_node *tmp; 1937 int deleted = 0; 1938 1939 hlist_for_each_entry_safe(ent, tmp, &pg->src_list, node) 1940 if (ent->flags & BR_SGRP_F_DELETE) { 1941 br_multicast_del_group_src(ent, false); 1942 deleted++; 1943 } 1944 1945 return deleted; 1946 } 1947 1948 static void __grp_src_mod_timer(struct net_bridge_group_src *src, 1949 unsigned long expires) 1950 { 1951 mod_timer(&src->timer, expires); 1952 br_multicast_fwd_src_handle(src); 1953 } 1954 1955 static void __grp_src_query_marked_and_rexmit(struct net_bridge_mcast *brmctx, 1956 struct net_bridge_mcast_port *pmctx, 1957 struct net_bridge_port_group *pg) 1958 { 1959 struct bridge_mcast_other_query *other_query = NULL; 1960 u32 lmqc = brmctx->multicast_last_member_count; 1961 unsigned long lmqt, lmi, now = jiffies; 1962 struct net_bridge_group_src *ent; 1963 1964 if (!netif_running(brmctx->br->dev) || 1965 !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED)) 1966 return; 1967 1968 if (pg->key.addr.proto == htons(ETH_P_IP)) 1969 other_query = &brmctx->ip4_other_query; 1970 #if IS_ENABLED(CONFIG_IPV6) 1971 else 1972 other_query = &brmctx->ip6_other_query; 1973 #endif 1974 1975 lmqt = now + br_multicast_lmqt(brmctx); 1976 hlist_for_each_entry(ent, &pg->src_list, node) { 1977 if (ent->flags & BR_SGRP_F_SEND) { 1978 ent->flags &= ~BR_SGRP_F_SEND; 1979 if (ent->timer.expires > lmqt) { 1980 if (brmctx->multicast_querier && 1981 other_query && 1982 !timer_pending(&other_query->timer)) 1983 ent->src_query_rexmit_cnt = lmqc; 1984 __grp_src_mod_timer(ent, lmqt); 1985 } 1986 } 1987 } 1988 1989 if (!brmctx->multicast_querier || 1990 !other_query || timer_pending(&other_query->timer)) 1991 return; 1992 1993 __br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, 1994 &pg->key.addr, true, 1, NULL); 1995 1996 lmi = now + brmctx->multicast_last_member_interval; 1997 if (!timer_pending(&pg->rexmit_timer) || 1998 time_after(pg->rexmit_timer.expires, lmi)) 1999 mod_timer(&pg->rexmit_timer, lmi); 2000 } 2001 2002 static void __grp_send_query_and_rexmit(struct net_bridge_mcast *brmctx, 2003 struct net_bridge_mcast_port *pmctx, 2004 struct net_bridge_port_group *pg) 2005 { 2006 struct bridge_mcast_other_query *other_query = NULL; 2007 unsigned long now = jiffies, lmi; 2008 2009 if (!netif_running(brmctx->br->dev) || 2010 !br_opt_get(brmctx->br, BROPT_MULTICAST_ENABLED)) 2011 return; 2012 2013 if (pg->key.addr.proto == htons(ETH_P_IP)) 2014 other_query = &brmctx->ip4_other_query; 2015 #if IS_ENABLED(CONFIG_IPV6) 2016 else 2017 other_query = &brmctx->ip6_other_query; 2018 #endif 2019 2020 if (brmctx->multicast_querier && 2021 other_query && !timer_pending(&other_query->timer)) { 2022 lmi = now + brmctx->multicast_last_member_interval; 2023 pg->grp_query_rexmit_cnt = brmctx->multicast_last_member_count - 1; 2024 __br_multicast_send_query(brmctx, pmctx, pg, &pg->key.addr, 2025 &pg->key.addr, false, 0, NULL); 2026 if (!timer_pending(&pg->rexmit_timer) || 2027 time_after(pg->rexmit_timer.expires, lmi)) 2028 mod_timer(&pg->rexmit_timer, lmi); 2029 } 2030 2031 if (pg->filter_mode == MCAST_EXCLUDE && 2032 (!timer_pending(&pg->timer) || 2033 time_after(pg->timer.expires, now + br_multicast_lmqt(brmctx)))) 2034 mod_timer(&pg->timer, now + br_multicast_lmqt(brmctx)); 2035 } 2036 2037 /* State Msg type New state Actions 2038 * INCLUDE (A) IS_IN (B) INCLUDE (A+B) (B)=GMI 2039 * INCLUDE (A) ALLOW (B) INCLUDE (A+B) (B)=GMI 2040 * EXCLUDE (X,Y) ALLOW (A) EXCLUDE (X+A,Y-A) (A)=GMI 2041 */ 2042 static bool br_multicast_isinc_allow(const struct net_bridge_mcast *brmctx, 2043 struct net_bridge_port_group *pg, void *h_addr, 2044 void *srcs, u32 nsrcs, size_t addr_size, 2045 int grec_type) 2046 { 2047 struct net_bridge_group_src *ent; 2048 unsigned long now = jiffies; 2049 bool changed = false; 2050 struct br_ip src_ip; 2051 u32 src_idx; 2052 2053 memset(&src_ip, 0, sizeof(src_ip)); 2054 src_ip.proto = pg->key.addr.proto; 2055 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2056 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2057 ent = br_multicast_find_group_src(pg, &src_ip); 2058 if (!ent) { 2059 ent = br_multicast_new_group_src(pg, &src_ip); 2060 if (ent) 2061 changed = true; 2062 } 2063 2064 if (ent) 2065 __grp_src_mod_timer(ent, now + br_multicast_gmi(brmctx)); 2066 } 2067 2068 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2069 grec_type)) 2070 changed = true; 2071 2072 return changed; 2073 } 2074 2075 /* State Msg type New state Actions 2076 * INCLUDE (A) IS_EX (B) EXCLUDE (A*B,B-A) (B-A)=0 2077 * Delete (A-B) 2078 * Group Timer=GMI 2079 */ 2080 static void __grp_src_isexc_incl(const struct net_bridge_mcast *brmctx, 2081 struct net_bridge_port_group *pg, void *h_addr, 2082 void *srcs, u32 nsrcs, size_t addr_size, 2083 int grec_type) 2084 { 2085 struct net_bridge_group_src *ent; 2086 struct br_ip src_ip; 2087 u32 src_idx; 2088 2089 hlist_for_each_entry(ent, &pg->src_list, node) 2090 ent->flags |= BR_SGRP_F_DELETE; 2091 2092 memset(&src_ip, 0, sizeof(src_ip)); 2093 src_ip.proto = pg->key.addr.proto; 2094 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2095 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2096 ent = br_multicast_find_group_src(pg, &src_ip); 2097 if (ent) 2098 ent->flags &= ~BR_SGRP_F_DELETE; 2099 else 2100 ent = br_multicast_new_group_src(pg, &src_ip); 2101 if (ent) 2102 br_multicast_fwd_src_handle(ent); 2103 } 2104 2105 br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2106 grec_type); 2107 2108 __grp_src_delete_marked(pg); 2109 } 2110 2111 /* State Msg type New state Actions 2112 * EXCLUDE (X,Y) IS_EX (A) EXCLUDE (A-Y,Y*A) (A-X-Y)=GMI 2113 * Delete (X-A) 2114 * Delete (Y-A) 2115 * Group Timer=GMI 2116 */ 2117 static bool __grp_src_isexc_excl(const struct net_bridge_mcast *brmctx, 2118 struct net_bridge_port_group *pg, void *h_addr, 2119 void *srcs, u32 nsrcs, size_t addr_size, 2120 int grec_type) 2121 { 2122 struct net_bridge_group_src *ent; 2123 unsigned long now = jiffies; 2124 bool changed = false; 2125 struct br_ip src_ip; 2126 u32 src_idx; 2127 2128 hlist_for_each_entry(ent, &pg->src_list, node) 2129 ent->flags |= BR_SGRP_F_DELETE; 2130 2131 memset(&src_ip, 0, sizeof(src_ip)); 2132 src_ip.proto = pg->key.addr.proto; 2133 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2134 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2135 ent = br_multicast_find_group_src(pg, &src_ip); 2136 if (ent) { 2137 ent->flags &= ~BR_SGRP_F_DELETE; 2138 } else { 2139 ent = br_multicast_new_group_src(pg, &src_ip); 2140 if (ent) { 2141 __grp_src_mod_timer(ent, 2142 now + br_multicast_gmi(brmctx)); 2143 changed = true; 2144 } 2145 } 2146 } 2147 2148 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2149 grec_type)) 2150 changed = true; 2151 2152 if (__grp_src_delete_marked(pg)) 2153 changed = true; 2154 2155 return changed; 2156 } 2157 2158 static bool br_multicast_isexc(const struct net_bridge_mcast *brmctx, 2159 struct net_bridge_port_group *pg, void *h_addr, 2160 void *srcs, u32 nsrcs, size_t addr_size, 2161 int grec_type) 2162 { 2163 bool changed = false; 2164 2165 switch (pg->filter_mode) { 2166 case MCAST_INCLUDE: 2167 __grp_src_isexc_incl(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2168 grec_type); 2169 br_multicast_star_g_handle_mode(pg, MCAST_EXCLUDE); 2170 changed = true; 2171 break; 2172 case MCAST_EXCLUDE: 2173 changed = __grp_src_isexc_excl(brmctx, pg, h_addr, srcs, nsrcs, 2174 addr_size, grec_type); 2175 break; 2176 } 2177 2178 pg->filter_mode = MCAST_EXCLUDE; 2179 mod_timer(&pg->timer, jiffies + br_multicast_gmi(brmctx)); 2180 2181 return changed; 2182 } 2183 2184 /* State Msg type New state Actions 2185 * INCLUDE (A) TO_IN (B) INCLUDE (A+B) (B)=GMI 2186 * Send Q(G,A-B) 2187 */ 2188 static bool __grp_src_toin_incl(struct net_bridge_mcast *brmctx, 2189 struct net_bridge_mcast_port *pmctx, 2190 struct net_bridge_port_group *pg, void *h_addr, 2191 void *srcs, u32 nsrcs, size_t addr_size, 2192 int grec_type) 2193 { 2194 u32 src_idx, to_send = pg->src_ents; 2195 struct net_bridge_group_src *ent; 2196 unsigned long now = jiffies; 2197 bool changed = false; 2198 struct br_ip src_ip; 2199 2200 hlist_for_each_entry(ent, &pg->src_list, node) 2201 ent->flags |= BR_SGRP_F_SEND; 2202 2203 memset(&src_ip, 0, sizeof(src_ip)); 2204 src_ip.proto = pg->key.addr.proto; 2205 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2206 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2207 ent = br_multicast_find_group_src(pg, &src_ip); 2208 if (ent) { 2209 ent->flags &= ~BR_SGRP_F_SEND; 2210 to_send--; 2211 } else { 2212 ent = br_multicast_new_group_src(pg, &src_ip); 2213 if (ent) 2214 changed = true; 2215 } 2216 if (ent) 2217 __grp_src_mod_timer(ent, now + br_multicast_gmi(brmctx)); 2218 } 2219 2220 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2221 grec_type)) 2222 changed = true; 2223 2224 if (to_send) 2225 __grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); 2226 2227 return changed; 2228 } 2229 2230 /* State Msg type New state Actions 2231 * EXCLUDE (X,Y) TO_IN (A) EXCLUDE (X+A,Y-A) (A)=GMI 2232 * Send Q(G,X-A) 2233 * Send Q(G) 2234 */ 2235 static bool __grp_src_toin_excl(struct net_bridge_mcast *brmctx, 2236 struct net_bridge_mcast_port *pmctx, 2237 struct net_bridge_port_group *pg, void *h_addr, 2238 void *srcs, u32 nsrcs, size_t addr_size, 2239 int grec_type) 2240 { 2241 u32 src_idx, to_send = pg->src_ents; 2242 struct net_bridge_group_src *ent; 2243 unsigned long now = jiffies; 2244 bool changed = false; 2245 struct br_ip src_ip; 2246 2247 hlist_for_each_entry(ent, &pg->src_list, node) 2248 if (timer_pending(&ent->timer)) 2249 ent->flags |= BR_SGRP_F_SEND; 2250 2251 memset(&src_ip, 0, sizeof(src_ip)); 2252 src_ip.proto = pg->key.addr.proto; 2253 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2254 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2255 ent = br_multicast_find_group_src(pg, &src_ip); 2256 if (ent) { 2257 if (timer_pending(&ent->timer)) { 2258 ent->flags &= ~BR_SGRP_F_SEND; 2259 to_send--; 2260 } 2261 } else { 2262 ent = br_multicast_new_group_src(pg, &src_ip); 2263 if (ent) 2264 changed = true; 2265 } 2266 if (ent) 2267 __grp_src_mod_timer(ent, now + br_multicast_gmi(brmctx)); 2268 } 2269 2270 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2271 grec_type)) 2272 changed = true; 2273 2274 if (to_send) 2275 __grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); 2276 2277 __grp_send_query_and_rexmit(brmctx, pmctx, pg); 2278 2279 return changed; 2280 } 2281 2282 static bool br_multicast_toin(struct net_bridge_mcast *brmctx, 2283 struct net_bridge_mcast_port *pmctx, 2284 struct net_bridge_port_group *pg, void *h_addr, 2285 void *srcs, u32 nsrcs, size_t addr_size, 2286 int grec_type) 2287 { 2288 bool changed = false; 2289 2290 switch (pg->filter_mode) { 2291 case MCAST_INCLUDE: 2292 changed = __grp_src_toin_incl(brmctx, pmctx, pg, h_addr, srcs, 2293 nsrcs, addr_size, grec_type); 2294 break; 2295 case MCAST_EXCLUDE: 2296 changed = __grp_src_toin_excl(brmctx, pmctx, pg, h_addr, srcs, 2297 nsrcs, addr_size, grec_type); 2298 break; 2299 } 2300 2301 if (br_multicast_eht_should_del_pg(pg)) { 2302 pg->flags |= MDB_PG_FLAGS_FAST_LEAVE; 2303 br_multicast_find_del_pg(pg->key.port->br, pg); 2304 /* a notification has already been sent and we shouldn't 2305 * access pg after the delete so we have to return false 2306 */ 2307 changed = false; 2308 } 2309 2310 return changed; 2311 } 2312 2313 /* State Msg type New state Actions 2314 * INCLUDE (A) TO_EX (B) EXCLUDE (A*B,B-A) (B-A)=0 2315 * Delete (A-B) 2316 * Send Q(G,A*B) 2317 * Group Timer=GMI 2318 */ 2319 static void __grp_src_toex_incl(struct net_bridge_mcast *brmctx, 2320 struct net_bridge_mcast_port *pmctx, 2321 struct net_bridge_port_group *pg, void *h_addr, 2322 void *srcs, u32 nsrcs, size_t addr_size, 2323 int grec_type) 2324 { 2325 struct net_bridge_group_src *ent; 2326 u32 src_idx, to_send = 0; 2327 struct br_ip src_ip; 2328 2329 hlist_for_each_entry(ent, &pg->src_list, node) 2330 ent->flags = (ent->flags & ~BR_SGRP_F_SEND) | BR_SGRP_F_DELETE; 2331 2332 memset(&src_ip, 0, sizeof(src_ip)); 2333 src_ip.proto = pg->key.addr.proto; 2334 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2335 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2336 ent = br_multicast_find_group_src(pg, &src_ip); 2337 if (ent) { 2338 ent->flags = (ent->flags & ~BR_SGRP_F_DELETE) | 2339 BR_SGRP_F_SEND; 2340 to_send++; 2341 } else { 2342 ent = br_multicast_new_group_src(pg, &src_ip); 2343 } 2344 if (ent) 2345 br_multicast_fwd_src_handle(ent); 2346 } 2347 2348 br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2349 grec_type); 2350 2351 __grp_src_delete_marked(pg); 2352 if (to_send) 2353 __grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); 2354 } 2355 2356 /* State Msg type New state Actions 2357 * EXCLUDE (X,Y) TO_EX (A) EXCLUDE (A-Y,Y*A) (A-X-Y)=Group Timer 2358 * Delete (X-A) 2359 * Delete (Y-A) 2360 * Send Q(G,A-Y) 2361 * Group Timer=GMI 2362 */ 2363 static bool __grp_src_toex_excl(struct net_bridge_mcast *brmctx, 2364 struct net_bridge_mcast_port *pmctx, 2365 struct net_bridge_port_group *pg, void *h_addr, 2366 void *srcs, u32 nsrcs, size_t addr_size, 2367 int grec_type) 2368 { 2369 struct net_bridge_group_src *ent; 2370 u32 src_idx, to_send = 0; 2371 bool changed = false; 2372 struct br_ip src_ip; 2373 2374 hlist_for_each_entry(ent, &pg->src_list, node) 2375 ent->flags = (ent->flags & ~BR_SGRP_F_SEND) | BR_SGRP_F_DELETE; 2376 2377 memset(&src_ip, 0, sizeof(src_ip)); 2378 src_ip.proto = pg->key.addr.proto; 2379 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2380 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2381 ent = br_multicast_find_group_src(pg, &src_ip); 2382 if (ent) { 2383 ent->flags &= ~BR_SGRP_F_DELETE; 2384 } else { 2385 ent = br_multicast_new_group_src(pg, &src_ip); 2386 if (ent) { 2387 __grp_src_mod_timer(ent, pg->timer.expires); 2388 changed = true; 2389 } 2390 } 2391 if (ent && timer_pending(&ent->timer)) { 2392 ent->flags |= BR_SGRP_F_SEND; 2393 to_send++; 2394 } 2395 } 2396 2397 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2398 grec_type)) 2399 changed = true; 2400 2401 if (__grp_src_delete_marked(pg)) 2402 changed = true; 2403 if (to_send) 2404 __grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); 2405 2406 return changed; 2407 } 2408 2409 static bool br_multicast_toex(struct net_bridge_mcast *brmctx, 2410 struct net_bridge_mcast_port *pmctx, 2411 struct net_bridge_port_group *pg, void *h_addr, 2412 void *srcs, u32 nsrcs, size_t addr_size, 2413 int grec_type) 2414 { 2415 bool changed = false; 2416 2417 switch (pg->filter_mode) { 2418 case MCAST_INCLUDE: 2419 __grp_src_toex_incl(brmctx, pmctx, pg, h_addr, srcs, nsrcs, 2420 addr_size, grec_type); 2421 br_multicast_star_g_handle_mode(pg, MCAST_EXCLUDE); 2422 changed = true; 2423 break; 2424 case MCAST_EXCLUDE: 2425 changed = __grp_src_toex_excl(brmctx, pmctx, pg, h_addr, srcs, 2426 nsrcs, addr_size, grec_type); 2427 break; 2428 } 2429 2430 pg->filter_mode = MCAST_EXCLUDE; 2431 mod_timer(&pg->timer, jiffies + br_multicast_gmi(brmctx)); 2432 2433 return changed; 2434 } 2435 2436 /* State Msg type New state Actions 2437 * INCLUDE (A) BLOCK (B) INCLUDE (A) Send Q(G,A*B) 2438 */ 2439 static bool __grp_src_block_incl(struct net_bridge_mcast *brmctx, 2440 struct net_bridge_mcast_port *pmctx, 2441 struct net_bridge_port_group *pg, void *h_addr, 2442 void *srcs, u32 nsrcs, size_t addr_size, int grec_type) 2443 { 2444 struct net_bridge_group_src *ent; 2445 u32 src_idx, to_send = 0; 2446 bool changed = false; 2447 struct br_ip src_ip; 2448 2449 hlist_for_each_entry(ent, &pg->src_list, node) 2450 ent->flags &= ~BR_SGRP_F_SEND; 2451 2452 memset(&src_ip, 0, sizeof(src_ip)); 2453 src_ip.proto = pg->key.addr.proto; 2454 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2455 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2456 ent = br_multicast_find_group_src(pg, &src_ip); 2457 if (ent) { 2458 ent->flags |= BR_SGRP_F_SEND; 2459 to_send++; 2460 } 2461 } 2462 2463 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2464 grec_type)) 2465 changed = true; 2466 2467 if (to_send) 2468 __grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); 2469 2470 return changed; 2471 } 2472 2473 /* State Msg type New state Actions 2474 * EXCLUDE (X,Y) BLOCK (A) EXCLUDE (X+(A-Y),Y) (A-X-Y)=Group Timer 2475 * Send Q(G,A-Y) 2476 */ 2477 static bool __grp_src_block_excl(struct net_bridge_mcast *brmctx, 2478 struct net_bridge_mcast_port *pmctx, 2479 struct net_bridge_port_group *pg, void *h_addr, 2480 void *srcs, u32 nsrcs, size_t addr_size, int grec_type) 2481 { 2482 struct net_bridge_group_src *ent; 2483 u32 src_idx, to_send = 0; 2484 bool changed = false; 2485 struct br_ip src_ip; 2486 2487 hlist_for_each_entry(ent, &pg->src_list, node) 2488 ent->flags &= ~BR_SGRP_F_SEND; 2489 2490 memset(&src_ip, 0, sizeof(src_ip)); 2491 src_ip.proto = pg->key.addr.proto; 2492 for (src_idx = 0; src_idx < nsrcs; src_idx++) { 2493 memcpy(&src_ip.src, srcs + (src_idx * addr_size), addr_size); 2494 ent = br_multicast_find_group_src(pg, &src_ip); 2495 if (!ent) { 2496 ent = br_multicast_new_group_src(pg, &src_ip); 2497 if (ent) { 2498 __grp_src_mod_timer(ent, pg->timer.expires); 2499 changed = true; 2500 } 2501 } 2502 if (ent && timer_pending(&ent->timer)) { 2503 ent->flags |= BR_SGRP_F_SEND; 2504 to_send++; 2505 } 2506 } 2507 2508 if (br_multicast_eht_handle(brmctx, pg, h_addr, srcs, nsrcs, addr_size, 2509 grec_type)) 2510 changed = true; 2511 2512 if (to_send) 2513 __grp_src_query_marked_and_rexmit(brmctx, pmctx, pg); 2514 2515 return changed; 2516 } 2517 2518 static bool br_multicast_block(struct net_bridge_mcast *brmctx, 2519 struct net_bridge_mcast_port *pmctx, 2520 struct net_bridge_port_group *pg, void *h_addr, 2521 void *srcs, u32 nsrcs, size_t addr_size, int grec_type) 2522 { 2523 bool changed = false; 2524 2525 switch (pg->filter_mode) { 2526 case MCAST_INCLUDE: 2527 changed = __grp_src_block_incl(brmctx, pmctx, pg, h_addr, srcs, 2528 nsrcs, addr_size, grec_type); 2529 break; 2530 case MCAST_EXCLUDE: 2531 changed = __grp_src_block_excl(brmctx, pmctx, pg, h_addr, srcs, 2532 nsrcs, addr_size, grec_type); 2533 break; 2534 } 2535 2536 if ((pg->filter_mode == MCAST_INCLUDE && hlist_empty(&pg->src_list)) || 2537 br_multicast_eht_should_del_pg(pg)) { 2538 if (br_multicast_eht_should_del_pg(pg)) 2539 pg->flags |= MDB_PG_FLAGS_FAST_LEAVE; 2540 br_multicast_find_del_pg(pg->key.port->br, pg); 2541 /* a notification has already been sent and we shouldn't 2542 * access pg after the delete so we have to return false 2543 */ 2544 changed = false; 2545 } 2546 2547 return changed; 2548 } 2549 2550 static struct net_bridge_port_group * 2551 br_multicast_find_port(struct net_bridge_mdb_entry *mp, 2552 struct net_bridge_port *p, 2553 const unsigned char *src) 2554 { 2555 struct net_bridge *br __maybe_unused = mp->br; 2556 struct net_bridge_port_group *pg; 2557 2558 for (pg = mlock_dereference(mp->ports, br); 2559 pg; 2560 pg = mlock_dereference(pg->next, br)) 2561 if (br_port_group_equal(pg, p, src)) 2562 return pg; 2563 2564 return NULL; 2565 } 2566 2567 static int br_ip4_multicast_igmp3_report(struct net_bridge_mcast *brmctx, 2568 struct net_bridge_mcast_port *pmctx, 2569 struct sk_buff *skb, 2570 u16 vid) 2571 { 2572 bool igmpv2 = brmctx->multicast_igmp_version == 2; 2573 struct net_bridge_mdb_entry *mdst; 2574 struct net_bridge_port_group *pg; 2575 const unsigned char *src; 2576 struct igmpv3_report *ih; 2577 struct igmpv3_grec *grec; 2578 int i, len, num, type; 2579 __be32 group, *h_addr; 2580 bool changed = false; 2581 int err = 0; 2582 u16 nsrcs; 2583 2584 ih = igmpv3_report_hdr(skb); 2585 num = ntohs(ih->ngrec); 2586 len = skb_transport_offset(skb) + sizeof(*ih); 2587 2588 for (i = 0; i < num; i++) { 2589 len += sizeof(*grec); 2590 if (!ip_mc_may_pull(skb, len)) 2591 return -EINVAL; 2592 2593 grec = (void *)(skb->data + len - sizeof(*grec)); 2594 group = grec->grec_mca; 2595 type = grec->grec_type; 2596 nsrcs = ntohs(grec->grec_nsrcs); 2597 2598 len += nsrcs * 4; 2599 if (!ip_mc_may_pull(skb, len)) 2600 return -EINVAL; 2601 2602 switch (type) { 2603 case IGMPV3_MODE_IS_INCLUDE: 2604 case IGMPV3_MODE_IS_EXCLUDE: 2605 case IGMPV3_CHANGE_TO_INCLUDE: 2606 case IGMPV3_CHANGE_TO_EXCLUDE: 2607 case IGMPV3_ALLOW_NEW_SOURCES: 2608 case IGMPV3_BLOCK_OLD_SOURCES: 2609 break; 2610 2611 default: 2612 continue; 2613 } 2614 2615 src = eth_hdr(skb)->h_source; 2616 if (nsrcs == 0 && 2617 (type == IGMPV3_CHANGE_TO_INCLUDE || 2618 type == IGMPV3_MODE_IS_INCLUDE)) { 2619 if (!pmctx || igmpv2) { 2620 br_ip4_multicast_leave_group(brmctx, pmctx, 2621 group, vid, src); 2622 continue; 2623 } 2624 } else { 2625 err = br_ip4_multicast_add_group(brmctx, pmctx, group, 2626 vid, src, igmpv2); 2627 if (err) 2628 break; 2629 } 2630 2631 if (!pmctx || igmpv2) 2632 continue; 2633 2634 spin_lock_bh(&brmctx->br->multicast_lock); 2635 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 2636 goto unlock_continue; 2637 2638 mdst = br_mdb_ip4_get(brmctx->br, group, vid); 2639 if (!mdst) 2640 goto unlock_continue; 2641 pg = br_multicast_find_port(mdst, pmctx->port, src); 2642 if (!pg || (pg->flags & MDB_PG_FLAGS_PERMANENT)) 2643 goto unlock_continue; 2644 /* reload grec and host addr */ 2645 grec = (void *)(skb->data + len - sizeof(*grec) - (nsrcs * 4)); 2646 h_addr = &ip_hdr(skb)->saddr; 2647 switch (type) { 2648 case IGMPV3_ALLOW_NEW_SOURCES: 2649 changed = br_multicast_isinc_allow(brmctx, pg, h_addr, 2650 grec->grec_src, 2651 nsrcs, sizeof(__be32), type); 2652 break; 2653 case IGMPV3_MODE_IS_INCLUDE: 2654 changed = br_multicast_isinc_allow(brmctx, pg, h_addr, 2655 grec->grec_src, 2656 nsrcs, sizeof(__be32), type); 2657 break; 2658 case IGMPV3_MODE_IS_EXCLUDE: 2659 changed = br_multicast_isexc(brmctx, pg, h_addr, 2660 grec->grec_src, 2661 nsrcs, sizeof(__be32), type); 2662 break; 2663 case IGMPV3_CHANGE_TO_INCLUDE: 2664 changed = br_multicast_toin(brmctx, pmctx, pg, h_addr, 2665 grec->grec_src, 2666 nsrcs, sizeof(__be32), type); 2667 break; 2668 case IGMPV3_CHANGE_TO_EXCLUDE: 2669 changed = br_multicast_toex(brmctx, pmctx, pg, h_addr, 2670 grec->grec_src, 2671 nsrcs, sizeof(__be32), type); 2672 break; 2673 case IGMPV3_BLOCK_OLD_SOURCES: 2674 changed = br_multicast_block(brmctx, pmctx, pg, h_addr, 2675 grec->grec_src, 2676 nsrcs, sizeof(__be32), type); 2677 break; 2678 } 2679 if (changed) 2680 br_mdb_notify(brmctx->br->dev, mdst, pg, RTM_NEWMDB); 2681 unlock_continue: 2682 spin_unlock_bh(&brmctx->br->multicast_lock); 2683 } 2684 2685 return err; 2686 } 2687 2688 #if IS_ENABLED(CONFIG_IPV6) 2689 static int br_ip6_multicast_mld2_report(struct net_bridge_mcast *brmctx, 2690 struct net_bridge_mcast_port *pmctx, 2691 struct sk_buff *skb, 2692 u16 vid) 2693 { 2694 bool mldv1 = brmctx->multicast_mld_version == 1; 2695 struct net_bridge_mdb_entry *mdst; 2696 struct net_bridge_port_group *pg; 2697 unsigned int nsrcs_offset; 2698 const unsigned char *src; 2699 struct icmp6hdr *icmp6h; 2700 struct in6_addr *h_addr; 2701 struct mld2_grec *grec; 2702 unsigned int grec_len; 2703 bool changed = false; 2704 int i, len, num; 2705 int err = 0; 2706 2707 if (!ipv6_mc_may_pull(skb, sizeof(*icmp6h))) 2708 return -EINVAL; 2709 2710 icmp6h = icmp6_hdr(skb); 2711 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]); 2712 len = skb_transport_offset(skb) + sizeof(*icmp6h); 2713 2714 for (i = 0; i < num; i++) { 2715 __be16 *_nsrcs, __nsrcs; 2716 u16 nsrcs; 2717 2718 nsrcs_offset = len + offsetof(struct mld2_grec, grec_nsrcs); 2719 2720 if (skb_transport_offset(skb) + ipv6_transport_len(skb) < 2721 nsrcs_offset + sizeof(__nsrcs)) 2722 return -EINVAL; 2723 2724 _nsrcs = skb_header_pointer(skb, nsrcs_offset, 2725 sizeof(__nsrcs), &__nsrcs); 2726 if (!_nsrcs) 2727 return -EINVAL; 2728 2729 nsrcs = ntohs(*_nsrcs); 2730 grec_len = struct_size(grec, grec_src, nsrcs); 2731 2732 if (!ipv6_mc_may_pull(skb, len + grec_len)) 2733 return -EINVAL; 2734 2735 grec = (struct mld2_grec *)(skb->data + len); 2736 len += grec_len; 2737 2738 switch (grec->grec_type) { 2739 case MLD2_MODE_IS_INCLUDE: 2740 case MLD2_MODE_IS_EXCLUDE: 2741 case MLD2_CHANGE_TO_INCLUDE: 2742 case MLD2_CHANGE_TO_EXCLUDE: 2743 case MLD2_ALLOW_NEW_SOURCES: 2744 case MLD2_BLOCK_OLD_SOURCES: 2745 break; 2746 2747 default: 2748 continue; 2749 } 2750 2751 src = eth_hdr(skb)->h_source; 2752 if ((grec->grec_type == MLD2_CHANGE_TO_INCLUDE || 2753 grec->grec_type == MLD2_MODE_IS_INCLUDE) && 2754 nsrcs == 0) { 2755 if (!pmctx || mldv1) { 2756 br_ip6_multicast_leave_group(brmctx, pmctx, 2757 &grec->grec_mca, 2758 vid, src); 2759 continue; 2760 } 2761 } else { 2762 err = br_ip6_multicast_add_group(brmctx, pmctx, 2763 &grec->grec_mca, vid, 2764 src, mldv1); 2765 if (err) 2766 break; 2767 } 2768 2769 if (!pmctx || mldv1) 2770 continue; 2771 2772 spin_lock_bh(&brmctx->br->multicast_lock); 2773 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 2774 goto unlock_continue; 2775 2776 mdst = br_mdb_ip6_get(brmctx->br, &grec->grec_mca, vid); 2777 if (!mdst) 2778 goto unlock_continue; 2779 pg = br_multicast_find_port(mdst, pmctx->port, src); 2780 if (!pg || (pg->flags & MDB_PG_FLAGS_PERMANENT)) 2781 goto unlock_continue; 2782 h_addr = &ipv6_hdr(skb)->saddr; 2783 switch (grec->grec_type) { 2784 case MLD2_ALLOW_NEW_SOURCES: 2785 changed = br_multicast_isinc_allow(brmctx, pg, h_addr, 2786 grec->grec_src, nsrcs, 2787 sizeof(struct in6_addr), 2788 grec->grec_type); 2789 break; 2790 case MLD2_MODE_IS_INCLUDE: 2791 changed = br_multicast_isinc_allow(brmctx, pg, h_addr, 2792 grec->grec_src, nsrcs, 2793 sizeof(struct in6_addr), 2794 grec->grec_type); 2795 break; 2796 case MLD2_MODE_IS_EXCLUDE: 2797 changed = br_multicast_isexc(brmctx, pg, h_addr, 2798 grec->grec_src, nsrcs, 2799 sizeof(struct in6_addr), 2800 grec->grec_type); 2801 break; 2802 case MLD2_CHANGE_TO_INCLUDE: 2803 changed = br_multicast_toin(brmctx, pmctx, pg, h_addr, 2804 grec->grec_src, nsrcs, 2805 sizeof(struct in6_addr), 2806 grec->grec_type); 2807 break; 2808 case MLD2_CHANGE_TO_EXCLUDE: 2809 changed = br_multicast_toex(brmctx, pmctx, pg, h_addr, 2810 grec->grec_src, nsrcs, 2811 sizeof(struct in6_addr), 2812 grec->grec_type); 2813 break; 2814 case MLD2_BLOCK_OLD_SOURCES: 2815 changed = br_multicast_block(brmctx, pmctx, pg, h_addr, 2816 grec->grec_src, nsrcs, 2817 sizeof(struct in6_addr), 2818 grec->grec_type); 2819 break; 2820 } 2821 if (changed) 2822 br_mdb_notify(brmctx->br->dev, mdst, pg, RTM_NEWMDB); 2823 unlock_continue: 2824 spin_unlock_bh(&brmctx->br->multicast_lock); 2825 } 2826 2827 return err; 2828 } 2829 #endif 2830 2831 static bool br_ip4_multicast_select_querier(struct net_bridge_mcast *brmctx, 2832 struct net_bridge_mcast_port *pmctx, 2833 __be32 saddr) 2834 { 2835 struct net_bridge_port *port = pmctx ? pmctx->port : NULL; 2836 2837 if (!timer_pending(&brmctx->ip4_own_query.timer) && 2838 !timer_pending(&brmctx->ip4_other_query.timer)) 2839 goto update; 2840 2841 if (!brmctx->ip4_querier.addr.src.ip4) 2842 goto update; 2843 2844 if (ntohl(saddr) <= ntohl(brmctx->ip4_querier.addr.src.ip4)) 2845 goto update; 2846 2847 return false; 2848 2849 update: 2850 brmctx->ip4_querier.addr.src.ip4 = saddr; 2851 2852 /* update protected by general multicast_lock by caller */ 2853 rcu_assign_pointer(brmctx->ip4_querier.port, port); 2854 2855 return true; 2856 } 2857 2858 #if IS_ENABLED(CONFIG_IPV6) 2859 static bool br_ip6_multicast_select_querier(struct net_bridge_mcast *brmctx, 2860 struct net_bridge_mcast_port *pmctx, 2861 struct in6_addr *saddr) 2862 { 2863 struct net_bridge_port *port = pmctx ? pmctx->port : NULL; 2864 2865 if (!timer_pending(&brmctx->ip6_own_query.timer) && 2866 !timer_pending(&brmctx->ip6_other_query.timer)) 2867 goto update; 2868 2869 if (ipv6_addr_cmp(saddr, &brmctx->ip6_querier.addr.src.ip6) <= 0) 2870 goto update; 2871 2872 return false; 2873 2874 update: 2875 brmctx->ip6_querier.addr.src.ip6 = *saddr; 2876 2877 /* update protected by general multicast_lock by caller */ 2878 rcu_assign_pointer(brmctx->ip6_querier.port, port); 2879 2880 return true; 2881 } 2882 #endif 2883 2884 static void 2885 br_multicast_update_query_timer(struct net_bridge_mcast *brmctx, 2886 struct bridge_mcast_other_query *query, 2887 unsigned long max_delay) 2888 { 2889 if (!timer_pending(&query->timer)) 2890 query->delay_time = jiffies + max_delay; 2891 2892 mod_timer(&query->timer, jiffies + brmctx->multicast_querier_interval); 2893 } 2894 2895 static void br_port_mc_router_state_change(struct net_bridge_port *p, 2896 bool is_mc_router) 2897 { 2898 struct switchdev_attr attr = { 2899 .orig_dev = p->dev, 2900 .id = SWITCHDEV_ATTR_ID_PORT_MROUTER, 2901 .flags = SWITCHDEV_F_DEFER, 2902 .u.mrouter = is_mc_router, 2903 }; 2904 2905 switchdev_port_attr_set(p->dev, &attr, NULL); 2906 } 2907 2908 static struct net_bridge_port * 2909 br_multicast_rport_from_node(struct net_bridge_mcast *brmctx, 2910 struct hlist_head *mc_router_list, 2911 struct hlist_node *rlist) 2912 { 2913 struct net_bridge_mcast_port *pmctx; 2914 2915 #if IS_ENABLED(CONFIG_IPV6) 2916 if (mc_router_list == &brmctx->ip6_mc_router_list) 2917 pmctx = hlist_entry(rlist, struct net_bridge_mcast_port, 2918 ip6_rlist); 2919 else 2920 #endif 2921 pmctx = hlist_entry(rlist, struct net_bridge_mcast_port, 2922 ip4_rlist); 2923 2924 return pmctx->port; 2925 } 2926 2927 static struct hlist_node * 2928 br_multicast_get_rport_slot(struct net_bridge_mcast *brmctx, 2929 struct net_bridge_port *port, 2930 struct hlist_head *mc_router_list) 2931 2932 { 2933 struct hlist_node *slot = NULL; 2934 struct net_bridge_port *p; 2935 struct hlist_node *rlist; 2936 2937 hlist_for_each(rlist, mc_router_list) { 2938 p = br_multicast_rport_from_node(brmctx, mc_router_list, rlist); 2939 2940 if ((unsigned long)port >= (unsigned long)p) 2941 break; 2942 2943 slot = rlist; 2944 } 2945 2946 return slot; 2947 } 2948 2949 static bool br_multicast_no_router_otherpf(struct net_bridge_mcast_port *pmctx, 2950 struct hlist_node *rnode) 2951 { 2952 #if IS_ENABLED(CONFIG_IPV6) 2953 if (rnode != &pmctx->ip6_rlist) 2954 return hlist_unhashed(&pmctx->ip6_rlist); 2955 else 2956 return hlist_unhashed(&pmctx->ip4_rlist); 2957 #else 2958 return true; 2959 #endif 2960 } 2961 2962 /* Add port to router_list 2963 * list is maintained ordered by pointer value 2964 * and locked by br->multicast_lock and RCU 2965 */ 2966 static void br_multicast_add_router(struct net_bridge_mcast *brmctx, 2967 struct net_bridge_mcast_port *pmctx, 2968 struct hlist_node *rlist, 2969 struct hlist_head *mc_router_list) 2970 { 2971 struct hlist_node *slot; 2972 2973 if (!hlist_unhashed(rlist)) 2974 return; 2975 2976 slot = br_multicast_get_rport_slot(brmctx, pmctx->port, mc_router_list); 2977 2978 if (slot) 2979 hlist_add_behind_rcu(rlist, slot); 2980 else 2981 hlist_add_head_rcu(rlist, mc_router_list); 2982 2983 /* For backwards compatibility for now, only notify if we 2984 * switched from no IPv4/IPv6 multicast router to a new 2985 * IPv4 or IPv6 multicast router. 2986 */ 2987 if (br_multicast_no_router_otherpf(pmctx, rlist)) { 2988 br_rtr_notify(pmctx->port->br->dev, pmctx, RTM_NEWMDB); 2989 br_port_mc_router_state_change(pmctx->port, true); 2990 } 2991 } 2992 2993 /* Add port to router_list 2994 * list is maintained ordered by pointer value 2995 * and locked by br->multicast_lock and RCU 2996 */ 2997 static void br_ip4_multicast_add_router(struct net_bridge_mcast *brmctx, 2998 struct net_bridge_mcast_port *pmctx) 2999 { 3000 br_multicast_add_router(brmctx, pmctx, &pmctx->ip4_rlist, 3001 &brmctx->ip4_mc_router_list); 3002 } 3003 3004 /* Add port to router_list 3005 * list is maintained ordered by pointer value 3006 * and locked by br->multicast_lock and RCU 3007 */ 3008 static void br_ip6_multicast_add_router(struct net_bridge_mcast *brmctx, 3009 struct net_bridge_mcast_port *pmctx) 3010 { 3011 #if IS_ENABLED(CONFIG_IPV6) 3012 br_multicast_add_router(brmctx, pmctx, &pmctx->ip6_rlist, 3013 &brmctx->ip6_mc_router_list); 3014 #endif 3015 } 3016 3017 static void br_multicast_mark_router(struct net_bridge_mcast *brmctx, 3018 struct net_bridge_mcast_port *pmctx, 3019 struct timer_list *timer, 3020 struct hlist_node *rlist, 3021 struct hlist_head *mc_router_list) 3022 { 3023 unsigned long now = jiffies; 3024 3025 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 3026 return; 3027 3028 if (!pmctx) { 3029 if (brmctx->multicast_router == MDB_RTR_TYPE_TEMP_QUERY) { 3030 if (!br_ip4_multicast_is_router(brmctx) && 3031 !br_ip6_multicast_is_router(brmctx)) 3032 br_mc_router_state_change(brmctx->br, true); 3033 mod_timer(timer, now + brmctx->multicast_querier_interval); 3034 } 3035 return; 3036 } 3037 3038 if (pmctx->multicast_router == MDB_RTR_TYPE_DISABLED || 3039 pmctx->multicast_router == MDB_RTR_TYPE_PERM) 3040 return; 3041 3042 br_multicast_add_router(brmctx, pmctx, rlist, mc_router_list); 3043 mod_timer(timer, now + brmctx->multicast_querier_interval); 3044 } 3045 3046 static void br_ip4_multicast_mark_router(struct net_bridge_mcast *brmctx, 3047 struct net_bridge_mcast_port *pmctx) 3048 { 3049 struct timer_list *timer = &brmctx->ip4_mc_router_timer; 3050 struct hlist_node *rlist = NULL; 3051 3052 if (pmctx) { 3053 timer = &pmctx->ip4_mc_router_timer; 3054 rlist = &pmctx->ip4_rlist; 3055 } 3056 3057 br_multicast_mark_router(brmctx, pmctx, timer, rlist, 3058 &brmctx->ip4_mc_router_list); 3059 } 3060 3061 static void br_ip6_multicast_mark_router(struct net_bridge_mcast *brmctx, 3062 struct net_bridge_mcast_port *pmctx) 3063 { 3064 #if IS_ENABLED(CONFIG_IPV6) 3065 struct timer_list *timer = &brmctx->ip6_mc_router_timer; 3066 struct hlist_node *rlist = NULL; 3067 3068 if (pmctx) { 3069 timer = &pmctx->ip6_mc_router_timer; 3070 rlist = &pmctx->ip6_rlist; 3071 } 3072 3073 br_multicast_mark_router(brmctx, pmctx, timer, rlist, 3074 &brmctx->ip6_mc_router_list); 3075 #endif 3076 } 3077 3078 static void 3079 br_ip4_multicast_query_received(struct net_bridge_mcast *brmctx, 3080 struct net_bridge_mcast_port *pmctx, 3081 struct bridge_mcast_other_query *query, 3082 struct br_ip *saddr, 3083 unsigned long max_delay) 3084 { 3085 if (!br_ip4_multicast_select_querier(brmctx, pmctx, saddr->src.ip4)) 3086 return; 3087 3088 br_multicast_update_query_timer(brmctx, query, max_delay); 3089 br_ip4_multicast_mark_router(brmctx, pmctx); 3090 } 3091 3092 #if IS_ENABLED(CONFIG_IPV6) 3093 static void 3094 br_ip6_multicast_query_received(struct net_bridge_mcast *brmctx, 3095 struct net_bridge_mcast_port *pmctx, 3096 struct bridge_mcast_other_query *query, 3097 struct br_ip *saddr, 3098 unsigned long max_delay) 3099 { 3100 if (!br_ip6_multicast_select_querier(brmctx, pmctx, &saddr->src.ip6)) 3101 return; 3102 3103 br_multicast_update_query_timer(brmctx, query, max_delay); 3104 br_ip6_multicast_mark_router(brmctx, pmctx); 3105 } 3106 #endif 3107 3108 static void br_ip4_multicast_query(struct net_bridge_mcast *brmctx, 3109 struct net_bridge_mcast_port *pmctx, 3110 struct sk_buff *skb, 3111 u16 vid) 3112 { 3113 unsigned int transport_len = ip_transport_len(skb); 3114 const struct iphdr *iph = ip_hdr(skb); 3115 struct igmphdr *ih = igmp_hdr(skb); 3116 struct net_bridge_mdb_entry *mp; 3117 struct igmpv3_query *ih3; 3118 struct net_bridge_port_group *p; 3119 struct net_bridge_port_group __rcu **pp; 3120 struct br_ip saddr; 3121 unsigned long max_delay; 3122 unsigned long now = jiffies; 3123 __be32 group; 3124 3125 spin_lock(&brmctx->br->multicast_lock); 3126 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 3127 goto out; 3128 3129 group = ih->group; 3130 3131 if (transport_len == sizeof(*ih)) { 3132 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE); 3133 3134 if (!max_delay) { 3135 max_delay = 10 * HZ; 3136 group = 0; 3137 } 3138 } else if (transport_len >= sizeof(*ih3)) { 3139 ih3 = igmpv3_query_hdr(skb); 3140 if (ih3->nsrcs || 3141 (brmctx->multicast_igmp_version == 3 && group && 3142 ih3->suppress)) 3143 goto out; 3144 3145 max_delay = ih3->code ? 3146 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1; 3147 } else { 3148 goto out; 3149 } 3150 3151 if (!group) { 3152 saddr.proto = htons(ETH_P_IP); 3153 saddr.src.ip4 = iph->saddr; 3154 3155 br_ip4_multicast_query_received(brmctx, pmctx, 3156 &brmctx->ip4_other_query, 3157 &saddr, max_delay); 3158 goto out; 3159 } 3160 3161 mp = br_mdb_ip4_get(brmctx->br, group, vid); 3162 if (!mp) 3163 goto out; 3164 3165 max_delay *= brmctx->multicast_last_member_count; 3166 3167 if (mp->host_joined && 3168 (timer_pending(&mp->timer) ? 3169 time_after(mp->timer.expires, now + max_delay) : 3170 try_to_del_timer_sync(&mp->timer) >= 0)) 3171 mod_timer(&mp->timer, now + max_delay); 3172 3173 for (pp = &mp->ports; 3174 (p = mlock_dereference(*pp, brmctx->br)) != NULL; 3175 pp = &p->next) { 3176 if (timer_pending(&p->timer) ? 3177 time_after(p->timer.expires, now + max_delay) : 3178 try_to_del_timer_sync(&p->timer) >= 0 && 3179 (brmctx->multicast_igmp_version == 2 || 3180 p->filter_mode == MCAST_EXCLUDE)) 3181 mod_timer(&p->timer, now + max_delay); 3182 } 3183 3184 out: 3185 spin_unlock(&brmctx->br->multicast_lock); 3186 } 3187 3188 #if IS_ENABLED(CONFIG_IPV6) 3189 static int br_ip6_multicast_query(struct net_bridge_mcast *brmctx, 3190 struct net_bridge_mcast_port *pmctx, 3191 struct sk_buff *skb, 3192 u16 vid) 3193 { 3194 unsigned int transport_len = ipv6_transport_len(skb); 3195 struct mld_msg *mld; 3196 struct net_bridge_mdb_entry *mp; 3197 struct mld2_query *mld2q; 3198 struct net_bridge_port_group *p; 3199 struct net_bridge_port_group __rcu **pp; 3200 struct br_ip saddr; 3201 unsigned long max_delay; 3202 unsigned long now = jiffies; 3203 unsigned int offset = skb_transport_offset(skb); 3204 const struct in6_addr *group = NULL; 3205 bool is_general_query; 3206 int err = 0; 3207 3208 spin_lock(&brmctx->br->multicast_lock); 3209 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 3210 goto out; 3211 3212 if (transport_len == sizeof(*mld)) { 3213 if (!pskb_may_pull(skb, offset + sizeof(*mld))) { 3214 err = -EINVAL; 3215 goto out; 3216 } 3217 mld = (struct mld_msg *) icmp6_hdr(skb); 3218 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay)); 3219 if (max_delay) 3220 group = &mld->mld_mca; 3221 } else { 3222 if (!pskb_may_pull(skb, offset + sizeof(*mld2q))) { 3223 err = -EINVAL; 3224 goto out; 3225 } 3226 mld2q = (struct mld2_query *)icmp6_hdr(skb); 3227 if (!mld2q->mld2q_nsrcs) 3228 group = &mld2q->mld2q_mca; 3229 if (brmctx->multicast_mld_version == 2 && 3230 !ipv6_addr_any(&mld2q->mld2q_mca) && 3231 mld2q->mld2q_suppress) 3232 goto out; 3233 3234 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL); 3235 } 3236 3237 is_general_query = group && ipv6_addr_any(group); 3238 3239 if (is_general_query) { 3240 saddr.proto = htons(ETH_P_IPV6); 3241 saddr.src.ip6 = ipv6_hdr(skb)->saddr; 3242 3243 br_ip6_multicast_query_received(brmctx, pmctx, 3244 &brmctx->ip6_other_query, 3245 &saddr, max_delay); 3246 goto out; 3247 } else if (!group) { 3248 goto out; 3249 } 3250 3251 mp = br_mdb_ip6_get(brmctx->br, group, vid); 3252 if (!mp) 3253 goto out; 3254 3255 max_delay *= brmctx->multicast_last_member_count; 3256 if (mp->host_joined && 3257 (timer_pending(&mp->timer) ? 3258 time_after(mp->timer.expires, now + max_delay) : 3259 try_to_del_timer_sync(&mp->timer) >= 0)) 3260 mod_timer(&mp->timer, now + max_delay); 3261 3262 for (pp = &mp->ports; 3263 (p = mlock_dereference(*pp, brmctx->br)) != NULL; 3264 pp = &p->next) { 3265 if (timer_pending(&p->timer) ? 3266 time_after(p->timer.expires, now + max_delay) : 3267 try_to_del_timer_sync(&p->timer) >= 0 && 3268 (brmctx->multicast_mld_version == 1 || 3269 p->filter_mode == MCAST_EXCLUDE)) 3270 mod_timer(&p->timer, now + max_delay); 3271 } 3272 3273 out: 3274 spin_unlock(&brmctx->br->multicast_lock); 3275 return err; 3276 } 3277 #endif 3278 3279 static void 3280 br_multicast_leave_group(struct net_bridge_mcast *brmctx, 3281 struct net_bridge_mcast_port *pmctx, 3282 struct br_ip *group, 3283 struct bridge_mcast_other_query *other_query, 3284 struct bridge_mcast_own_query *own_query, 3285 const unsigned char *src) 3286 { 3287 struct net_bridge_mdb_entry *mp; 3288 struct net_bridge_port_group *p; 3289 unsigned long now; 3290 unsigned long time; 3291 3292 spin_lock(&brmctx->br->multicast_lock); 3293 if (!br_multicast_ctx_should_use(brmctx, pmctx)) 3294 goto out; 3295 3296 mp = br_mdb_ip_get(brmctx->br, group); 3297 if (!mp) 3298 goto out; 3299 3300 if (pmctx && (pmctx->port->flags & BR_MULTICAST_FAST_LEAVE)) { 3301 struct net_bridge_port_group __rcu **pp; 3302 3303 for (pp = &mp->ports; 3304 (p = mlock_dereference(*pp, brmctx->br)) != NULL; 3305 pp = &p->next) { 3306 if (!br_port_group_equal(p, pmctx->port, src)) 3307 continue; 3308 3309 if (p->flags & MDB_PG_FLAGS_PERMANENT) 3310 break; 3311 3312 p->flags |= MDB_PG_FLAGS_FAST_LEAVE; 3313 br_multicast_del_pg(mp, p, pp); 3314 } 3315 goto out; 3316 } 3317 3318 if (timer_pending(&other_query->timer)) 3319 goto out; 3320 3321 if (brmctx->multicast_querier) { 3322 __br_multicast_send_query(brmctx, pmctx, NULL, NULL, &mp->addr, 3323 false, 0, NULL); 3324 3325 time = jiffies + brmctx->multicast_last_member_count * 3326 brmctx->multicast_last_member_interval; 3327 3328 mod_timer(&own_query->timer, time); 3329 3330 for (p = mlock_dereference(mp->ports, brmctx->br); 3331 p != NULL && pmctx != NULL; 3332 p = mlock_dereference(p->next, brmctx->br)) { 3333 if (!br_port_group_equal(p, pmctx->port, src)) 3334 continue; 3335 3336 if (!hlist_unhashed(&p->mglist) && 3337 (timer_pending(&p->timer) ? 3338 time_after(p->timer.expires, time) : 3339 try_to_del_timer_sync(&p->timer) >= 0)) { 3340 mod_timer(&p->timer, time); 3341 } 3342 3343 break; 3344 } 3345 } 3346 3347 now = jiffies; 3348 time = now + brmctx->multicast_last_member_count * 3349 brmctx->multicast_last_member_interval; 3350 3351 if (!pmctx) { 3352 if (mp->host_joined && 3353 (timer_pending(&mp->timer) ? 3354 time_after(mp->timer.expires, time) : 3355 try_to_del_timer_sync(&mp->timer) >= 0)) { 3356 mod_timer(&mp->timer, time); 3357 } 3358 3359 goto out; 3360 } 3361 3362 for (p = mlock_dereference(mp->ports, brmctx->br); 3363 p != NULL; 3364 p = mlock_dereference(p->next, brmctx->br)) { 3365 if (p->key.port != pmctx->port) 3366 continue; 3367 3368 if (!hlist_unhashed(&p->mglist) && 3369 (timer_pending(&p->timer) ? 3370 time_after(p->timer.expires, time) : 3371 try_to_del_timer_sync(&p->timer) >= 0)) { 3372 mod_timer(&p->timer, time); 3373 } 3374 3375 break; 3376 } 3377 out: 3378 spin_unlock(&brmctx->br->multicast_lock); 3379 } 3380 3381 static void br_ip4_multicast_leave_group(struct net_bridge_mcast *brmctx, 3382 struct net_bridge_mcast_port *pmctx, 3383 __be32 group, 3384 __u16 vid, 3385 const unsigned char *src) 3386 { 3387 struct br_ip br_group; 3388 struct bridge_mcast_own_query *own_query; 3389 3390 if (ipv4_is_local_multicast(group)) 3391 return; 3392 3393 own_query = pmctx ? &pmctx->ip4_own_query : &brmctx->ip4_own_query; 3394 3395 memset(&br_group, 0, sizeof(br_group)); 3396 br_group.dst.ip4 = group; 3397 br_group.proto = htons(ETH_P_IP); 3398 br_group.vid = vid; 3399 3400 br_multicast_leave_group(brmctx, pmctx, &br_group, 3401 &brmctx->ip4_other_query, 3402 own_query, src); 3403 } 3404 3405 #if IS_ENABLED(CONFIG_IPV6) 3406 static void br_ip6_multicast_leave_group(struct net_bridge_mcast *brmctx, 3407 struct net_bridge_mcast_port *pmctx, 3408 const struct in6_addr *group, 3409 __u16 vid, 3410 const unsigned char *src) 3411 { 3412 struct br_ip br_group; 3413 struct bridge_mcast_own_query *own_query; 3414 3415 if (ipv6_addr_is_ll_all_nodes(group)) 3416 return; 3417 3418 own_query = pmctx ? &pmctx->ip6_own_query : &brmctx->ip6_own_query; 3419 3420 memset(&br_group, 0, sizeof(br_group)); 3421 br_group.dst.ip6 = *group; 3422 br_group.proto = htons(ETH_P_IPV6); 3423 br_group.vid = vid; 3424 3425 br_multicast_leave_group(brmctx, pmctx, &br_group, 3426 &brmctx->ip6_other_query, 3427 own_query, src); 3428 } 3429 #endif 3430 3431 static void br_multicast_err_count(const struct net_bridge *br, 3432 const struct net_bridge_port *p, 3433 __be16 proto) 3434 { 3435 struct bridge_mcast_stats __percpu *stats; 3436 struct bridge_mcast_stats *pstats; 3437 3438 if (!br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)) 3439 return; 3440 3441 if (p) 3442 stats = p->mcast_stats; 3443 else 3444 stats = br->mcast_stats; 3445 if (WARN_ON(!stats)) 3446 return; 3447 3448 pstats = this_cpu_ptr(stats); 3449 3450 u64_stats_update_begin(&pstats->syncp); 3451 switch (proto) { 3452 case htons(ETH_P_IP): 3453 pstats->mstats.igmp_parse_errors++; 3454 break; 3455 #if IS_ENABLED(CONFIG_IPV6) 3456 case htons(ETH_P_IPV6): 3457 pstats->mstats.mld_parse_errors++; 3458 break; 3459 #endif 3460 } 3461 u64_stats_update_end(&pstats->syncp); 3462 } 3463 3464 static void br_multicast_pim(struct net_bridge_mcast *brmctx, 3465 struct net_bridge_mcast_port *pmctx, 3466 const struct sk_buff *skb) 3467 { 3468 unsigned int offset = skb_transport_offset(skb); 3469 struct pimhdr *pimhdr, _pimhdr; 3470 3471 pimhdr = skb_header_pointer(skb, offset, sizeof(_pimhdr), &_pimhdr); 3472 if (!pimhdr || pim_hdr_version(pimhdr) != PIM_VERSION || 3473 pim_hdr_type(pimhdr) != PIM_TYPE_HELLO) 3474 return; 3475 3476 spin_lock(&brmctx->br->multicast_lock); 3477 br_ip4_multicast_mark_router(brmctx, pmctx); 3478 spin_unlock(&brmctx->br->multicast_lock); 3479 } 3480 3481 static int br_ip4_multicast_mrd_rcv(struct net_bridge_mcast *brmctx, 3482 struct net_bridge_mcast_port *pmctx, 3483 struct sk_buff *skb) 3484 { 3485 if (ip_hdr(skb)->protocol != IPPROTO_IGMP || 3486 igmp_hdr(skb)->type != IGMP_MRDISC_ADV) 3487 return -ENOMSG; 3488 3489 spin_lock(&brmctx->br->multicast_lock); 3490 br_ip4_multicast_mark_router(brmctx, pmctx); 3491 spin_unlock(&brmctx->br->multicast_lock); 3492 3493 return 0; 3494 } 3495 3496 static int br_multicast_ipv4_rcv(struct net_bridge_mcast *brmctx, 3497 struct net_bridge_mcast_port *pmctx, 3498 struct sk_buff *skb, 3499 u16 vid) 3500 { 3501 struct net_bridge_port *p = pmctx ? pmctx->port : NULL; 3502 const unsigned char *src; 3503 struct igmphdr *ih; 3504 int err; 3505 3506 err = ip_mc_check_igmp(skb); 3507 3508 if (err == -ENOMSG) { 3509 if (!ipv4_is_local_multicast(ip_hdr(skb)->daddr)) { 3510 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 3511 } else if (pim_ipv4_all_pim_routers(ip_hdr(skb)->daddr)) { 3512 if (ip_hdr(skb)->protocol == IPPROTO_PIM) 3513 br_multicast_pim(brmctx, pmctx, skb); 3514 } else if (ipv4_is_all_snoopers(ip_hdr(skb)->daddr)) { 3515 br_ip4_multicast_mrd_rcv(brmctx, pmctx, skb); 3516 } 3517 3518 return 0; 3519 } else if (err < 0) { 3520 br_multicast_err_count(brmctx->br, p, skb->protocol); 3521 return err; 3522 } 3523 3524 ih = igmp_hdr(skb); 3525 src = eth_hdr(skb)->h_source; 3526 BR_INPUT_SKB_CB(skb)->igmp = ih->type; 3527 3528 switch (ih->type) { 3529 case IGMP_HOST_MEMBERSHIP_REPORT: 3530 case IGMPV2_HOST_MEMBERSHIP_REPORT: 3531 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 3532 err = br_ip4_multicast_add_group(brmctx, pmctx, ih->group, vid, 3533 src, true); 3534 break; 3535 case IGMPV3_HOST_MEMBERSHIP_REPORT: 3536 err = br_ip4_multicast_igmp3_report(brmctx, pmctx, skb, vid); 3537 break; 3538 case IGMP_HOST_MEMBERSHIP_QUERY: 3539 br_ip4_multicast_query(brmctx, pmctx, skb, vid); 3540 break; 3541 case IGMP_HOST_LEAVE_MESSAGE: 3542 br_ip4_multicast_leave_group(brmctx, pmctx, ih->group, vid, src); 3543 break; 3544 } 3545 3546 br_multicast_count(brmctx->br, p, skb, BR_INPUT_SKB_CB(skb)->igmp, 3547 BR_MCAST_DIR_RX); 3548 3549 return err; 3550 } 3551 3552 #if IS_ENABLED(CONFIG_IPV6) 3553 static void br_ip6_multicast_mrd_rcv(struct net_bridge_mcast *brmctx, 3554 struct net_bridge_mcast_port *pmctx, 3555 struct sk_buff *skb) 3556 { 3557 if (icmp6_hdr(skb)->icmp6_type != ICMPV6_MRDISC_ADV) 3558 return; 3559 3560 spin_lock(&brmctx->br->multicast_lock); 3561 br_ip6_multicast_mark_router(brmctx, pmctx); 3562 spin_unlock(&brmctx->br->multicast_lock); 3563 } 3564 3565 static int br_multicast_ipv6_rcv(struct net_bridge_mcast *brmctx, 3566 struct net_bridge_mcast_port *pmctx, 3567 struct sk_buff *skb, 3568 u16 vid) 3569 { 3570 struct net_bridge_port *p = pmctx ? pmctx->port : NULL; 3571 const unsigned char *src; 3572 struct mld_msg *mld; 3573 int err; 3574 3575 err = ipv6_mc_check_mld(skb); 3576 3577 if (err == -ENOMSG || err == -ENODATA) { 3578 if (!ipv6_addr_is_ll_all_nodes(&ipv6_hdr(skb)->daddr)) 3579 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 3580 if (err == -ENODATA && 3581 ipv6_addr_is_all_snoopers(&ipv6_hdr(skb)->daddr)) 3582 br_ip6_multicast_mrd_rcv(brmctx, pmctx, skb); 3583 3584 return 0; 3585 } else if (err < 0) { 3586 br_multicast_err_count(brmctx->br, p, skb->protocol); 3587 return err; 3588 } 3589 3590 mld = (struct mld_msg *)skb_transport_header(skb); 3591 BR_INPUT_SKB_CB(skb)->igmp = mld->mld_type; 3592 3593 switch (mld->mld_type) { 3594 case ICMPV6_MGM_REPORT: 3595 src = eth_hdr(skb)->h_source; 3596 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 3597 err = br_ip6_multicast_add_group(brmctx, pmctx, &mld->mld_mca, 3598 vid, src, true); 3599 break; 3600 case ICMPV6_MLD2_REPORT: 3601 err = br_ip6_multicast_mld2_report(brmctx, pmctx, skb, vid); 3602 break; 3603 case ICMPV6_MGM_QUERY: 3604 err = br_ip6_multicast_query(brmctx, pmctx, skb, vid); 3605 break; 3606 case ICMPV6_MGM_REDUCTION: 3607 src = eth_hdr(skb)->h_source; 3608 br_ip6_multicast_leave_group(brmctx, pmctx, &mld->mld_mca, vid, 3609 src); 3610 break; 3611 } 3612 3613 br_multicast_count(brmctx->br, p, skb, BR_INPUT_SKB_CB(skb)->igmp, 3614 BR_MCAST_DIR_RX); 3615 3616 return err; 3617 } 3618 #endif 3619 3620 int br_multicast_rcv(struct net_bridge_mcast **brmctx, 3621 struct net_bridge_mcast_port **pmctx, 3622 struct net_bridge_vlan *vlan, 3623 struct sk_buff *skb, u16 vid) 3624 { 3625 int ret = 0; 3626 3627 BR_INPUT_SKB_CB(skb)->igmp = 0; 3628 BR_INPUT_SKB_CB(skb)->mrouters_only = 0; 3629 3630 if (!br_opt_get((*brmctx)->br, BROPT_MULTICAST_ENABLED)) 3631 return 0; 3632 3633 if (br_opt_get((*brmctx)->br, BROPT_MCAST_VLAN_SNOOPING_ENABLED) && vlan) { 3634 const struct net_bridge_vlan *masterv; 3635 3636 /* the vlan has the master flag set only when transmitting 3637 * through the bridge device 3638 */ 3639 if (br_vlan_is_master(vlan)) { 3640 masterv = vlan; 3641 *brmctx = &vlan->br_mcast_ctx; 3642 *pmctx = NULL; 3643 } else { 3644 masterv = vlan->brvlan; 3645 *brmctx = &vlan->brvlan->br_mcast_ctx; 3646 *pmctx = &vlan->port_mcast_ctx; 3647 } 3648 3649 if (!(masterv->priv_flags & BR_VLFLAG_GLOBAL_MCAST_ENABLED)) 3650 return 0; 3651 } 3652 3653 switch (skb->protocol) { 3654 case htons(ETH_P_IP): 3655 ret = br_multicast_ipv4_rcv(*brmctx, *pmctx, skb, vid); 3656 break; 3657 #if IS_ENABLED(CONFIG_IPV6) 3658 case htons(ETH_P_IPV6): 3659 ret = br_multicast_ipv6_rcv(*brmctx, *pmctx, skb, vid); 3660 break; 3661 #endif 3662 } 3663 3664 return ret; 3665 } 3666 3667 static void br_multicast_query_expired(struct net_bridge_mcast *brmctx, 3668 struct bridge_mcast_own_query *query, 3669 struct bridge_mcast_querier *querier) 3670 { 3671 spin_lock(&brmctx->br->multicast_lock); 3672 if (br_multicast_ctx_vlan_disabled(brmctx)) 3673 goto out; 3674 3675 if (query->startup_sent < brmctx->multicast_startup_query_count) 3676 query->startup_sent++; 3677 3678 RCU_INIT_POINTER(querier->port, NULL); 3679 br_multicast_send_query(brmctx, NULL, query); 3680 out: 3681 spin_unlock(&brmctx->br->multicast_lock); 3682 } 3683 3684 static void br_ip4_multicast_query_expired(struct timer_list *t) 3685 { 3686 struct net_bridge_mcast *brmctx = from_timer(brmctx, t, 3687 ip4_own_query.timer); 3688 3689 br_multicast_query_expired(brmctx, &brmctx->ip4_own_query, 3690 &brmctx->ip4_querier); 3691 } 3692 3693 #if IS_ENABLED(CONFIG_IPV6) 3694 static void br_ip6_multicast_query_expired(struct timer_list *t) 3695 { 3696 struct net_bridge_mcast *brmctx = from_timer(brmctx, t, 3697 ip6_own_query.timer); 3698 3699 br_multicast_query_expired(brmctx, &brmctx->ip6_own_query, 3700 &brmctx->ip6_querier); 3701 } 3702 #endif 3703 3704 static void br_multicast_gc_work(struct work_struct *work) 3705 { 3706 struct net_bridge *br = container_of(work, struct net_bridge, 3707 mcast_gc_work); 3708 HLIST_HEAD(deleted_head); 3709 3710 spin_lock_bh(&br->multicast_lock); 3711 hlist_move_list(&br->mcast_gc_list, &deleted_head); 3712 spin_unlock_bh(&br->multicast_lock); 3713 3714 br_multicast_gc(&deleted_head); 3715 } 3716 3717 void br_multicast_ctx_init(struct net_bridge *br, 3718 struct net_bridge_vlan *vlan, 3719 struct net_bridge_mcast *brmctx) 3720 { 3721 brmctx->br = br; 3722 brmctx->vlan = vlan; 3723 brmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; 3724 brmctx->multicast_last_member_count = 2; 3725 brmctx->multicast_startup_query_count = 2; 3726 3727 brmctx->multicast_last_member_interval = HZ; 3728 brmctx->multicast_query_response_interval = 10 * HZ; 3729 brmctx->multicast_startup_query_interval = 125 * HZ / 4; 3730 brmctx->multicast_query_interval = 125 * HZ; 3731 brmctx->multicast_querier_interval = 255 * HZ; 3732 brmctx->multicast_membership_interval = 260 * HZ; 3733 3734 brmctx->ip4_other_query.delay_time = 0; 3735 brmctx->ip4_querier.port = NULL; 3736 brmctx->multicast_igmp_version = 2; 3737 #if IS_ENABLED(CONFIG_IPV6) 3738 brmctx->multicast_mld_version = 1; 3739 brmctx->ip6_other_query.delay_time = 0; 3740 brmctx->ip6_querier.port = NULL; 3741 #endif 3742 3743 timer_setup(&brmctx->ip4_mc_router_timer, 3744 br_ip4_multicast_local_router_expired, 0); 3745 timer_setup(&brmctx->ip4_other_query.timer, 3746 br_ip4_multicast_querier_expired, 0); 3747 timer_setup(&brmctx->ip4_own_query.timer, 3748 br_ip4_multicast_query_expired, 0); 3749 #if IS_ENABLED(CONFIG_IPV6) 3750 timer_setup(&brmctx->ip6_mc_router_timer, 3751 br_ip6_multicast_local_router_expired, 0); 3752 timer_setup(&brmctx->ip6_other_query.timer, 3753 br_ip6_multicast_querier_expired, 0); 3754 timer_setup(&brmctx->ip6_own_query.timer, 3755 br_ip6_multicast_query_expired, 0); 3756 #endif 3757 } 3758 3759 void br_multicast_ctx_deinit(struct net_bridge_mcast *brmctx) 3760 { 3761 __br_multicast_stop(brmctx); 3762 } 3763 3764 void br_multicast_init(struct net_bridge *br) 3765 { 3766 br->hash_max = BR_MULTICAST_DEFAULT_HASH_MAX; 3767 3768 br_multicast_ctx_init(br, NULL, &br->multicast_ctx); 3769 3770 br_opt_toggle(br, BROPT_MULTICAST_ENABLED, true); 3771 br_opt_toggle(br, BROPT_HAS_IPV6_ADDR, true); 3772 3773 spin_lock_init(&br->multicast_lock); 3774 INIT_HLIST_HEAD(&br->mdb_list); 3775 INIT_HLIST_HEAD(&br->mcast_gc_list); 3776 INIT_WORK(&br->mcast_gc_work, br_multicast_gc_work); 3777 } 3778 3779 static void br_ip4_multicast_join_snoopers(struct net_bridge *br) 3780 { 3781 struct in_device *in_dev = in_dev_get(br->dev); 3782 3783 if (!in_dev) 3784 return; 3785 3786 __ip_mc_inc_group(in_dev, htonl(INADDR_ALLSNOOPERS_GROUP), GFP_ATOMIC); 3787 in_dev_put(in_dev); 3788 } 3789 3790 #if IS_ENABLED(CONFIG_IPV6) 3791 static void br_ip6_multicast_join_snoopers(struct net_bridge *br) 3792 { 3793 struct in6_addr addr; 3794 3795 ipv6_addr_set(&addr, htonl(0xff020000), 0, 0, htonl(0x6a)); 3796 ipv6_dev_mc_inc(br->dev, &addr); 3797 } 3798 #else 3799 static inline void br_ip6_multicast_join_snoopers(struct net_bridge *br) 3800 { 3801 } 3802 #endif 3803 3804 void br_multicast_join_snoopers(struct net_bridge *br) 3805 { 3806 br_ip4_multicast_join_snoopers(br); 3807 br_ip6_multicast_join_snoopers(br); 3808 } 3809 3810 static void br_ip4_multicast_leave_snoopers(struct net_bridge *br) 3811 { 3812 struct in_device *in_dev = in_dev_get(br->dev); 3813 3814 if (WARN_ON(!in_dev)) 3815 return; 3816 3817 __ip_mc_dec_group(in_dev, htonl(INADDR_ALLSNOOPERS_GROUP), GFP_ATOMIC); 3818 in_dev_put(in_dev); 3819 } 3820 3821 #if IS_ENABLED(CONFIG_IPV6) 3822 static void br_ip6_multicast_leave_snoopers(struct net_bridge *br) 3823 { 3824 struct in6_addr addr; 3825 3826 ipv6_addr_set(&addr, htonl(0xff020000), 0, 0, htonl(0x6a)); 3827 ipv6_dev_mc_dec(br->dev, &addr); 3828 } 3829 #else 3830 static inline void br_ip6_multicast_leave_snoopers(struct net_bridge *br) 3831 { 3832 } 3833 #endif 3834 3835 void br_multicast_leave_snoopers(struct net_bridge *br) 3836 { 3837 br_ip4_multicast_leave_snoopers(br); 3838 br_ip6_multicast_leave_snoopers(br); 3839 } 3840 3841 static void __br_multicast_open_query(struct net_bridge *br, 3842 struct bridge_mcast_own_query *query) 3843 { 3844 query->startup_sent = 0; 3845 3846 if (!br_opt_get(br, BROPT_MULTICAST_ENABLED)) 3847 return; 3848 3849 mod_timer(&query->timer, jiffies); 3850 } 3851 3852 static void __br_multicast_open(struct net_bridge_mcast *brmctx) 3853 { 3854 __br_multicast_open_query(brmctx->br, &brmctx->ip4_own_query); 3855 #if IS_ENABLED(CONFIG_IPV6) 3856 __br_multicast_open_query(brmctx->br, &brmctx->ip6_own_query); 3857 #endif 3858 } 3859 3860 void br_multicast_open(struct net_bridge *br) 3861 { 3862 ASSERT_RTNL(); 3863 3864 if (br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) { 3865 struct net_bridge_vlan_group *vg; 3866 struct net_bridge_vlan *vlan; 3867 3868 vg = br_vlan_group(br); 3869 if (vg) { 3870 list_for_each_entry(vlan, &vg->vlan_list, vlist) { 3871 struct net_bridge_mcast *brmctx; 3872 3873 brmctx = &vlan->br_mcast_ctx; 3874 if (br_vlan_is_brentry(vlan) && 3875 !br_multicast_ctx_vlan_disabled(brmctx)) 3876 __br_multicast_open(&vlan->br_mcast_ctx); 3877 } 3878 } 3879 } else { 3880 __br_multicast_open(&br->multicast_ctx); 3881 } 3882 } 3883 3884 static void __br_multicast_stop(struct net_bridge_mcast *brmctx) 3885 { 3886 del_timer_sync(&brmctx->ip4_mc_router_timer); 3887 del_timer_sync(&brmctx->ip4_other_query.timer); 3888 del_timer_sync(&brmctx->ip4_own_query.timer); 3889 #if IS_ENABLED(CONFIG_IPV6) 3890 del_timer_sync(&brmctx->ip6_mc_router_timer); 3891 del_timer_sync(&brmctx->ip6_other_query.timer); 3892 del_timer_sync(&brmctx->ip6_own_query.timer); 3893 #endif 3894 } 3895 3896 void br_multicast_toggle_one_vlan(struct net_bridge_vlan *vlan, bool on) 3897 { 3898 struct net_bridge *br; 3899 3900 /* it's okay to check for the flag without the multicast lock because it 3901 * can only change under RTNL -> multicast_lock, we need the latter to 3902 * sync with timers and packets 3903 */ 3904 if (on == !!(vlan->priv_flags & BR_VLFLAG_MCAST_ENABLED)) 3905 return; 3906 3907 if (br_vlan_is_master(vlan)) { 3908 br = vlan->br; 3909 3910 if (!br_vlan_is_brentry(vlan) || 3911 (on && 3912 br_multicast_ctx_vlan_global_disabled(&vlan->br_mcast_ctx))) 3913 return; 3914 3915 spin_lock_bh(&br->multicast_lock); 3916 vlan->priv_flags ^= BR_VLFLAG_MCAST_ENABLED; 3917 spin_unlock_bh(&br->multicast_lock); 3918 3919 if (on) 3920 __br_multicast_open(&vlan->br_mcast_ctx); 3921 else 3922 __br_multicast_stop(&vlan->br_mcast_ctx); 3923 } else { 3924 struct net_bridge_mcast *brmctx; 3925 3926 brmctx = br_multicast_port_ctx_get_global(&vlan->port_mcast_ctx); 3927 if (on && br_multicast_ctx_vlan_global_disabled(brmctx)) 3928 return; 3929 3930 br = vlan->port->br; 3931 spin_lock_bh(&br->multicast_lock); 3932 vlan->priv_flags ^= BR_VLFLAG_MCAST_ENABLED; 3933 if (on) 3934 __br_multicast_enable_port_ctx(&vlan->port_mcast_ctx); 3935 else 3936 __br_multicast_disable_port_ctx(&vlan->port_mcast_ctx); 3937 spin_unlock_bh(&br->multicast_lock); 3938 } 3939 } 3940 3941 void br_multicast_toggle_vlan(struct net_bridge_vlan *vlan, bool on) 3942 { 3943 struct net_bridge_port *p; 3944 3945 if (WARN_ON_ONCE(!br_vlan_is_master(vlan))) 3946 return; 3947 3948 list_for_each_entry(p, &vlan->br->port_list, list) { 3949 struct net_bridge_vlan *vport; 3950 3951 vport = br_vlan_find(nbp_vlan_group(p), vlan->vid); 3952 if (!vport) 3953 continue; 3954 br_multicast_toggle_one_vlan(vport, on); 3955 } 3956 } 3957 3958 int br_multicast_toggle_vlan_snooping(struct net_bridge *br, bool on, 3959 struct netlink_ext_ack *extack) 3960 { 3961 struct net_bridge_vlan_group *vg; 3962 struct net_bridge_vlan *vlan; 3963 struct net_bridge_port *p; 3964 3965 if (br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED) == on) 3966 return 0; 3967 3968 if (on && !br_opt_get(br, BROPT_VLAN_ENABLED)) { 3969 NL_SET_ERR_MSG_MOD(extack, "Cannot enable multicast vlan snooping with vlan filtering disabled"); 3970 return -EINVAL; 3971 } 3972 3973 vg = br_vlan_group(br); 3974 if (!vg) 3975 return 0; 3976 3977 br_opt_toggle(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED, on); 3978 3979 /* disable/enable non-vlan mcast contexts based on vlan snooping */ 3980 if (on) 3981 __br_multicast_stop(&br->multicast_ctx); 3982 else 3983 __br_multicast_open(&br->multicast_ctx); 3984 list_for_each_entry(p, &br->port_list, list) { 3985 if (on) 3986 br_multicast_disable_port(p); 3987 else 3988 br_multicast_enable_port(p); 3989 } 3990 3991 list_for_each_entry(vlan, &vg->vlan_list, vlist) 3992 br_multicast_toggle_vlan(vlan, on); 3993 3994 return 0; 3995 } 3996 3997 bool br_multicast_toggle_global_vlan(struct net_bridge_vlan *vlan, bool on) 3998 { 3999 ASSERT_RTNL(); 4000 4001 /* BR_VLFLAG_GLOBAL_MCAST_ENABLED relies on eventual consistency and 4002 * requires only RTNL to change 4003 */ 4004 if (on == !!(vlan->priv_flags & BR_VLFLAG_GLOBAL_MCAST_ENABLED)) 4005 return false; 4006 4007 vlan->priv_flags ^= BR_VLFLAG_GLOBAL_MCAST_ENABLED; 4008 br_multicast_toggle_vlan(vlan, on); 4009 4010 return true; 4011 } 4012 4013 void br_multicast_stop(struct net_bridge *br) 4014 { 4015 ASSERT_RTNL(); 4016 4017 if (br_opt_get(br, BROPT_MCAST_VLAN_SNOOPING_ENABLED)) { 4018 struct net_bridge_vlan_group *vg; 4019 struct net_bridge_vlan *vlan; 4020 4021 vg = br_vlan_group(br); 4022 if (vg) { 4023 list_for_each_entry(vlan, &vg->vlan_list, vlist) { 4024 struct net_bridge_mcast *brmctx; 4025 4026 brmctx = &vlan->br_mcast_ctx; 4027 if (br_vlan_is_brentry(vlan) && 4028 !br_multicast_ctx_vlan_disabled(brmctx)) 4029 __br_multicast_stop(&vlan->br_mcast_ctx); 4030 } 4031 } 4032 } else { 4033 __br_multicast_stop(&br->multicast_ctx); 4034 } 4035 } 4036 4037 void br_multicast_dev_del(struct net_bridge *br) 4038 { 4039 struct net_bridge_mdb_entry *mp; 4040 HLIST_HEAD(deleted_head); 4041 struct hlist_node *tmp; 4042 4043 spin_lock_bh(&br->multicast_lock); 4044 hlist_for_each_entry_safe(mp, tmp, &br->mdb_list, mdb_node) 4045 br_multicast_del_mdb_entry(mp); 4046 hlist_move_list(&br->mcast_gc_list, &deleted_head); 4047 spin_unlock_bh(&br->multicast_lock); 4048 4049 br_multicast_ctx_deinit(&br->multicast_ctx); 4050 br_multicast_gc(&deleted_head); 4051 cancel_work_sync(&br->mcast_gc_work); 4052 4053 rcu_barrier(); 4054 } 4055 4056 int br_multicast_set_router(struct net_bridge_mcast *brmctx, unsigned long val) 4057 { 4058 int err = -EINVAL; 4059 4060 spin_lock_bh(&brmctx->br->multicast_lock); 4061 4062 switch (val) { 4063 case MDB_RTR_TYPE_DISABLED: 4064 case MDB_RTR_TYPE_PERM: 4065 br_mc_router_state_change(brmctx->br, val == MDB_RTR_TYPE_PERM); 4066 del_timer(&brmctx->ip4_mc_router_timer); 4067 #if IS_ENABLED(CONFIG_IPV6) 4068 del_timer(&brmctx->ip6_mc_router_timer); 4069 #endif 4070 brmctx->multicast_router = val; 4071 err = 0; 4072 break; 4073 case MDB_RTR_TYPE_TEMP_QUERY: 4074 if (brmctx->multicast_router != MDB_RTR_TYPE_TEMP_QUERY) 4075 br_mc_router_state_change(brmctx->br, false); 4076 brmctx->multicast_router = val; 4077 err = 0; 4078 break; 4079 } 4080 4081 spin_unlock_bh(&brmctx->br->multicast_lock); 4082 4083 return err; 4084 } 4085 4086 static void 4087 br_multicast_rport_del_notify(struct net_bridge_mcast_port *pmctx, bool deleted) 4088 { 4089 if (!deleted) 4090 return; 4091 4092 /* For backwards compatibility for now, only notify if there is 4093 * no multicast router anymore for both IPv4 and IPv6. 4094 */ 4095 if (!hlist_unhashed(&pmctx->ip4_rlist)) 4096 return; 4097 #if IS_ENABLED(CONFIG_IPV6) 4098 if (!hlist_unhashed(&pmctx->ip6_rlist)) 4099 return; 4100 #endif 4101 4102 br_rtr_notify(pmctx->port->br->dev, pmctx, RTM_DELMDB); 4103 br_port_mc_router_state_change(pmctx->port, false); 4104 4105 /* don't allow timer refresh */ 4106 if (pmctx->multicast_router == MDB_RTR_TYPE_TEMP) 4107 pmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; 4108 } 4109 4110 int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val) 4111 { 4112 struct net_bridge_mcast *brmctx = &p->br->multicast_ctx; 4113 struct net_bridge_mcast_port *pmctx = &p->multicast_ctx; 4114 unsigned long now = jiffies; 4115 int err = -EINVAL; 4116 bool del = false; 4117 4118 spin_lock(&p->br->multicast_lock); 4119 if (pmctx->multicast_router == val) { 4120 /* Refresh the temp router port timer */ 4121 if (pmctx->multicast_router == MDB_RTR_TYPE_TEMP) { 4122 mod_timer(&pmctx->ip4_mc_router_timer, 4123 now + brmctx->multicast_querier_interval); 4124 #if IS_ENABLED(CONFIG_IPV6) 4125 mod_timer(&pmctx->ip6_mc_router_timer, 4126 now + brmctx->multicast_querier_interval); 4127 #endif 4128 } 4129 err = 0; 4130 goto unlock; 4131 } 4132 switch (val) { 4133 case MDB_RTR_TYPE_DISABLED: 4134 pmctx->multicast_router = MDB_RTR_TYPE_DISABLED; 4135 del |= br_ip4_multicast_rport_del(pmctx); 4136 del_timer(&pmctx->ip4_mc_router_timer); 4137 del |= br_ip6_multicast_rport_del(pmctx); 4138 #if IS_ENABLED(CONFIG_IPV6) 4139 del_timer(&pmctx->ip6_mc_router_timer); 4140 #endif 4141 br_multicast_rport_del_notify(pmctx, del); 4142 break; 4143 case MDB_RTR_TYPE_TEMP_QUERY: 4144 pmctx->multicast_router = MDB_RTR_TYPE_TEMP_QUERY; 4145 del |= br_ip4_multicast_rport_del(pmctx); 4146 del |= br_ip6_multicast_rport_del(pmctx); 4147 br_multicast_rport_del_notify(pmctx, del); 4148 break; 4149 case MDB_RTR_TYPE_PERM: 4150 pmctx->multicast_router = MDB_RTR_TYPE_PERM; 4151 del_timer(&pmctx->ip4_mc_router_timer); 4152 br_ip4_multicast_add_router(brmctx, pmctx); 4153 #if IS_ENABLED(CONFIG_IPV6) 4154 del_timer(&pmctx->ip6_mc_router_timer); 4155 #endif 4156 br_ip6_multicast_add_router(brmctx, pmctx); 4157 break; 4158 case MDB_RTR_TYPE_TEMP: 4159 pmctx->multicast_router = MDB_RTR_TYPE_TEMP; 4160 br_ip4_multicast_mark_router(brmctx, pmctx); 4161 br_ip6_multicast_mark_router(brmctx, pmctx); 4162 break; 4163 default: 4164 goto unlock; 4165 } 4166 err = 0; 4167 unlock: 4168 spin_unlock(&p->br->multicast_lock); 4169 4170 return err; 4171 } 4172 4173 static void br_multicast_start_querier(struct net_bridge_mcast *brmctx, 4174 struct bridge_mcast_own_query *query) 4175 { 4176 struct net_bridge_port *port; 4177 4178 if (!br_multicast_ctx_matches_vlan_snooping(brmctx)) 4179 return; 4180 4181 __br_multicast_open_query(brmctx->br, query); 4182 4183 rcu_read_lock(); 4184 list_for_each_entry_rcu(port, &brmctx->br->port_list, list) { 4185 struct bridge_mcast_own_query *ip4_own_query; 4186 #if IS_ENABLED(CONFIG_IPV6) 4187 struct bridge_mcast_own_query *ip6_own_query; 4188 #endif 4189 4190 if (br_multicast_port_ctx_state_stopped(&port->multicast_ctx)) 4191 continue; 4192 4193 if (br_multicast_ctx_is_vlan(brmctx)) { 4194 struct net_bridge_vlan *vlan; 4195 4196 vlan = br_vlan_find(nbp_vlan_group(port), brmctx->vlan->vid); 4197 if (!vlan || 4198 br_multicast_port_ctx_state_stopped(&vlan->port_mcast_ctx)) 4199 continue; 4200 4201 ip4_own_query = &vlan->port_mcast_ctx.ip4_own_query; 4202 #if IS_ENABLED(CONFIG_IPV6) 4203 ip6_own_query = &vlan->port_mcast_ctx.ip6_own_query; 4204 #endif 4205 } else { 4206 ip4_own_query = &port->multicast_ctx.ip4_own_query; 4207 #if IS_ENABLED(CONFIG_IPV6) 4208 ip6_own_query = &port->multicast_ctx.ip6_own_query; 4209 #endif 4210 } 4211 4212 if (query == &brmctx->ip4_own_query) 4213 br_multicast_enable(ip4_own_query); 4214 #if IS_ENABLED(CONFIG_IPV6) 4215 else 4216 br_multicast_enable(ip6_own_query); 4217 #endif 4218 } 4219 rcu_read_unlock(); 4220 } 4221 4222 int br_multicast_toggle(struct net_bridge *br, unsigned long val, 4223 struct netlink_ext_ack *extack) 4224 { 4225 struct net_bridge_port *port; 4226 bool change_snoopers = false; 4227 int err = 0; 4228 4229 spin_lock_bh(&br->multicast_lock); 4230 if (!!br_opt_get(br, BROPT_MULTICAST_ENABLED) == !!val) 4231 goto unlock; 4232 4233 err = br_mc_disabled_update(br->dev, val, extack); 4234 if (err == -EOPNOTSUPP) 4235 err = 0; 4236 if (err) 4237 goto unlock; 4238 4239 br_opt_toggle(br, BROPT_MULTICAST_ENABLED, !!val); 4240 if (!br_opt_get(br, BROPT_MULTICAST_ENABLED)) { 4241 change_snoopers = true; 4242 goto unlock; 4243 } 4244 4245 if (!netif_running(br->dev)) 4246 goto unlock; 4247 4248 br_multicast_open(br); 4249 list_for_each_entry(port, &br->port_list, list) 4250 __br_multicast_enable_port_ctx(&port->multicast_ctx); 4251 4252 change_snoopers = true; 4253 4254 unlock: 4255 spin_unlock_bh(&br->multicast_lock); 4256 4257 /* br_multicast_join_snoopers has the potential to cause 4258 * an MLD Report/Leave to be delivered to br_multicast_rcv, 4259 * which would in turn call br_multicast_add_group, which would 4260 * attempt to acquire multicast_lock. This function should be 4261 * called after the lock has been released to avoid deadlocks on 4262 * multicast_lock. 4263 * 4264 * br_multicast_leave_snoopers does not have the problem since 4265 * br_multicast_rcv first checks BROPT_MULTICAST_ENABLED, and 4266 * returns without calling br_multicast_ipv4/6_rcv if it's not 4267 * enabled. Moved both functions out just for symmetry. 4268 */ 4269 if (change_snoopers) { 4270 if (br_opt_get(br, BROPT_MULTICAST_ENABLED)) 4271 br_multicast_join_snoopers(br); 4272 else 4273 br_multicast_leave_snoopers(br); 4274 } 4275 4276 return err; 4277 } 4278 4279 bool br_multicast_enabled(const struct net_device *dev) 4280 { 4281 struct net_bridge *br = netdev_priv(dev); 4282 4283 return !!br_opt_get(br, BROPT_MULTICAST_ENABLED); 4284 } 4285 EXPORT_SYMBOL_GPL(br_multicast_enabled); 4286 4287 bool br_multicast_router(const struct net_device *dev) 4288 { 4289 struct net_bridge *br = netdev_priv(dev); 4290 bool is_router; 4291 4292 spin_lock_bh(&br->multicast_lock); 4293 is_router = br_multicast_is_router(&br->multicast_ctx, NULL); 4294 spin_unlock_bh(&br->multicast_lock); 4295 return is_router; 4296 } 4297 EXPORT_SYMBOL_GPL(br_multicast_router); 4298 4299 int br_multicast_set_querier(struct net_bridge_mcast *brmctx, unsigned long val) 4300 { 4301 unsigned long max_delay; 4302 4303 val = !!val; 4304 4305 spin_lock_bh(&brmctx->br->multicast_lock); 4306 if (brmctx->multicast_querier == val) 4307 goto unlock; 4308 4309 WRITE_ONCE(brmctx->multicast_querier, val); 4310 if (!val) 4311 goto unlock; 4312 4313 max_delay = brmctx->multicast_query_response_interval; 4314 4315 if (!timer_pending(&brmctx->ip4_other_query.timer)) 4316 brmctx->ip4_other_query.delay_time = jiffies + max_delay; 4317 4318 br_multicast_start_querier(brmctx, &brmctx->ip4_own_query); 4319 4320 #if IS_ENABLED(CONFIG_IPV6) 4321 if (!timer_pending(&brmctx->ip6_other_query.timer)) 4322 brmctx->ip6_other_query.delay_time = jiffies + max_delay; 4323 4324 br_multicast_start_querier(brmctx, &brmctx->ip6_own_query); 4325 #endif 4326 4327 unlock: 4328 spin_unlock_bh(&brmctx->br->multicast_lock); 4329 4330 return 0; 4331 } 4332 4333 int br_multicast_set_igmp_version(struct net_bridge_mcast *brmctx, 4334 unsigned long val) 4335 { 4336 /* Currently we support only version 2 and 3 */ 4337 switch (val) { 4338 case 2: 4339 case 3: 4340 break; 4341 default: 4342 return -EINVAL; 4343 } 4344 4345 spin_lock_bh(&brmctx->br->multicast_lock); 4346 brmctx->multicast_igmp_version = val; 4347 spin_unlock_bh(&brmctx->br->multicast_lock); 4348 4349 return 0; 4350 } 4351 4352 #if IS_ENABLED(CONFIG_IPV6) 4353 int br_multicast_set_mld_version(struct net_bridge_mcast *brmctx, 4354 unsigned long val) 4355 { 4356 /* Currently we support version 1 and 2 */ 4357 switch (val) { 4358 case 1: 4359 case 2: 4360 break; 4361 default: 4362 return -EINVAL; 4363 } 4364 4365 spin_lock_bh(&brmctx->br->multicast_lock); 4366 brmctx->multicast_mld_version = val; 4367 spin_unlock_bh(&brmctx->br->multicast_lock); 4368 4369 return 0; 4370 } 4371 #endif 4372 4373 /** 4374 * br_multicast_list_adjacent - Returns snooped multicast addresses 4375 * @dev: The bridge port adjacent to which to retrieve addresses 4376 * @br_ip_list: The list to store found, snooped multicast IP addresses in 4377 * 4378 * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast 4379 * snooping feature on all bridge ports of dev's bridge device, excluding 4380 * the addresses from dev itself. 4381 * 4382 * Returns the number of items added to br_ip_list. 4383 * 4384 * Notes: 4385 * - br_ip_list needs to be initialized by caller 4386 * - br_ip_list might contain duplicates in the end 4387 * (needs to be taken care of by caller) 4388 * - br_ip_list needs to be freed by caller 4389 */ 4390 int br_multicast_list_adjacent(struct net_device *dev, 4391 struct list_head *br_ip_list) 4392 { 4393 struct net_bridge *br; 4394 struct net_bridge_port *port; 4395 struct net_bridge_port_group *group; 4396 struct br_ip_list *entry; 4397 int count = 0; 4398 4399 rcu_read_lock(); 4400 if (!br_ip_list || !netif_is_bridge_port(dev)) 4401 goto unlock; 4402 4403 port = br_port_get_rcu(dev); 4404 if (!port || !port->br) 4405 goto unlock; 4406 4407 br = port->br; 4408 4409 list_for_each_entry_rcu(port, &br->port_list, list) { 4410 if (!port->dev || port->dev == dev) 4411 continue; 4412 4413 hlist_for_each_entry_rcu(group, &port->mglist, mglist) { 4414 entry = kmalloc(sizeof(*entry), GFP_ATOMIC); 4415 if (!entry) 4416 goto unlock; 4417 4418 entry->addr = group->key.addr; 4419 list_add(&entry->list, br_ip_list); 4420 count++; 4421 } 4422 } 4423 4424 unlock: 4425 rcu_read_unlock(); 4426 return count; 4427 } 4428 EXPORT_SYMBOL_GPL(br_multicast_list_adjacent); 4429 4430 /** 4431 * br_multicast_has_querier_anywhere - Checks for a querier on a bridge 4432 * @dev: The bridge port providing the bridge on which to check for a querier 4433 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 4434 * 4435 * Checks whether the given interface has a bridge on top and if so returns 4436 * true if a valid querier exists anywhere on the bridged link layer. 4437 * Otherwise returns false. 4438 */ 4439 bool br_multicast_has_querier_anywhere(struct net_device *dev, int proto) 4440 { 4441 struct net_bridge *br; 4442 struct net_bridge_port *port; 4443 struct ethhdr eth; 4444 bool ret = false; 4445 4446 rcu_read_lock(); 4447 if (!netif_is_bridge_port(dev)) 4448 goto unlock; 4449 4450 port = br_port_get_rcu(dev); 4451 if (!port || !port->br) 4452 goto unlock; 4453 4454 br = port->br; 4455 4456 memset(ð, 0, sizeof(eth)); 4457 eth.h_proto = htons(proto); 4458 4459 ret = br_multicast_querier_exists(&br->multicast_ctx, ð, NULL); 4460 4461 unlock: 4462 rcu_read_unlock(); 4463 return ret; 4464 } 4465 EXPORT_SYMBOL_GPL(br_multicast_has_querier_anywhere); 4466 4467 /** 4468 * br_multicast_has_querier_adjacent - Checks for a querier behind a bridge port 4469 * @dev: The bridge port adjacent to which to check for a querier 4470 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 4471 * 4472 * Checks whether the given interface has a bridge on top and if so returns 4473 * true if a selected querier is behind one of the other ports of this 4474 * bridge. Otherwise returns false. 4475 */ 4476 bool br_multicast_has_querier_adjacent(struct net_device *dev, int proto) 4477 { 4478 struct net_bridge_mcast *brmctx; 4479 struct net_bridge *br; 4480 struct net_bridge_port *port; 4481 bool ret = false; 4482 4483 rcu_read_lock(); 4484 if (!netif_is_bridge_port(dev)) 4485 goto unlock; 4486 4487 port = br_port_get_rcu(dev); 4488 if (!port || !port->br) 4489 goto unlock; 4490 4491 br = port->br; 4492 brmctx = &br->multicast_ctx; 4493 4494 switch (proto) { 4495 case ETH_P_IP: 4496 if (!timer_pending(&brmctx->ip4_other_query.timer) || 4497 rcu_dereference(brmctx->ip4_querier.port) == port) 4498 goto unlock; 4499 break; 4500 #if IS_ENABLED(CONFIG_IPV6) 4501 case ETH_P_IPV6: 4502 if (!timer_pending(&brmctx->ip6_other_query.timer) || 4503 rcu_dereference(brmctx->ip6_querier.port) == port) 4504 goto unlock; 4505 break; 4506 #endif 4507 default: 4508 goto unlock; 4509 } 4510 4511 ret = true; 4512 unlock: 4513 rcu_read_unlock(); 4514 return ret; 4515 } 4516 EXPORT_SYMBOL_GPL(br_multicast_has_querier_adjacent); 4517 4518 /** 4519 * br_multicast_has_router_adjacent - Checks for a router behind a bridge port 4520 * @dev: The bridge port adjacent to which to check for a multicast router 4521 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 4522 * 4523 * Checks whether the given interface has a bridge on top and if so returns 4524 * true if a multicast router is behind one of the other ports of this 4525 * bridge. Otherwise returns false. 4526 */ 4527 bool br_multicast_has_router_adjacent(struct net_device *dev, int proto) 4528 { 4529 struct net_bridge_mcast_port *pmctx; 4530 struct net_bridge_mcast *brmctx; 4531 struct net_bridge_port *port; 4532 bool ret = false; 4533 4534 rcu_read_lock(); 4535 port = br_port_get_check_rcu(dev); 4536 if (!port) 4537 goto unlock; 4538 4539 brmctx = &port->br->multicast_ctx; 4540 switch (proto) { 4541 case ETH_P_IP: 4542 hlist_for_each_entry_rcu(pmctx, &brmctx->ip4_mc_router_list, 4543 ip4_rlist) { 4544 if (pmctx->port == port) 4545 continue; 4546 4547 ret = true; 4548 goto unlock; 4549 } 4550 break; 4551 #if IS_ENABLED(CONFIG_IPV6) 4552 case ETH_P_IPV6: 4553 hlist_for_each_entry_rcu(pmctx, &brmctx->ip6_mc_router_list, 4554 ip6_rlist) { 4555 if (pmctx->port == port) 4556 continue; 4557 4558 ret = true; 4559 goto unlock; 4560 } 4561 break; 4562 #endif 4563 default: 4564 /* when compiled without IPv6 support, be conservative and 4565 * always assume presence of an IPv6 multicast router 4566 */ 4567 ret = true; 4568 } 4569 4570 unlock: 4571 rcu_read_unlock(); 4572 return ret; 4573 } 4574 EXPORT_SYMBOL_GPL(br_multicast_has_router_adjacent); 4575 4576 static void br_mcast_stats_add(struct bridge_mcast_stats __percpu *stats, 4577 const struct sk_buff *skb, u8 type, u8 dir) 4578 { 4579 struct bridge_mcast_stats *pstats = this_cpu_ptr(stats); 4580 __be16 proto = skb->protocol; 4581 unsigned int t_len; 4582 4583 u64_stats_update_begin(&pstats->syncp); 4584 switch (proto) { 4585 case htons(ETH_P_IP): 4586 t_len = ntohs(ip_hdr(skb)->tot_len) - ip_hdrlen(skb); 4587 switch (type) { 4588 case IGMP_HOST_MEMBERSHIP_REPORT: 4589 pstats->mstats.igmp_v1reports[dir]++; 4590 break; 4591 case IGMPV2_HOST_MEMBERSHIP_REPORT: 4592 pstats->mstats.igmp_v2reports[dir]++; 4593 break; 4594 case IGMPV3_HOST_MEMBERSHIP_REPORT: 4595 pstats->mstats.igmp_v3reports[dir]++; 4596 break; 4597 case IGMP_HOST_MEMBERSHIP_QUERY: 4598 if (t_len != sizeof(struct igmphdr)) { 4599 pstats->mstats.igmp_v3queries[dir]++; 4600 } else { 4601 unsigned int offset = skb_transport_offset(skb); 4602 struct igmphdr *ih, _ihdr; 4603 4604 ih = skb_header_pointer(skb, offset, 4605 sizeof(_ihdr), &_ihdr); 4606 if (!ih) 4607 break; 4608 if (!ih->code) 4609 pstats->mstats.igmp_v1queries[dir]++; 4610 else 4611 pstats->mstats.igmp_v2queries[dir]++; 4612 } 4613 break; 4614 case IGMP_HOST_LEAVE_MESSAGE: 4615 pstats->mstats.igmp_leaves[dir]++; 4616 break; 4617 } 4618 break; 4619 #if IS_ENABLED(CONFIG_IPV6) 4620 case htons(ETH_P_IPV6): 4621 t_len = ntohs(ipv6_hdr(skb)->payload_len) + 4622 sizeof(struct ipv6hdr); 4623 t_len -= skb_network_header_len(skb); 4624 switch (type) { 4625 case ICMPV6_MGM_REPORT: 4626 pstats->mstats.mld_v1reports[dir]++; 4627 break; 4628 case ICMPV6_MLD2_REPORT: 4629 pstats->mstats.mld_v2reports[dir]++; 4630 break; 4631 case ICMPV6_MGM_QUERY: 4632 if (t_len != sizeof(struct mld_msg)) 4633 pstats->mstats.mld_v2queries[dir]++; 4634 else 4635 pstats->mstats.mld_v1queries[dir]++; 4636 break; 4637 case ICMPV6_MGM_REDUCTION: 4638 pstats->mstats.mld_leaves[dir]++; 4639 break; 4640 } 4641 break; 4642 #endif /* CONFIG_IPV6 */ 4643 } 4644 u64_stats_update_end(&pstats->syncp); 4645 } 4646 4647 void br_multicast_count(struct net_bridge *br, 4648 const struct net_bridge_port *p, 4649 const struct sk_buff *skb, u8 type, u8 dir) 4650 { 4651 struct bridge_mcast_stats __percpu *stats; 4652 4653 /* if multicast_disabled is true then igmp type can't be set */ 4654 if (!type || !br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)) 4655 return; 4656 4657 if (p) 4658 stats = p->mcast_stats; 4659 else 4660 stats = br->mcast_stats; 4661 if (WARN_ON(!stats)) 4662 return; 4663 4664 br_mcast_stats_add(stats, skb, type, dir); 4665 } 4666 4667 int br_multicast_init_stats(struct net_bridge *br) 4668 { 4669 br->mcast_stats = netdev_alloc_pcpu_stats(struct bridge_mcast_stats); 4670 if (!br->mcast_stats) 4671 return -ENOMEM; 4672 4673 return 0; 4674 } 4675 4676 void br_multicast_uninit_stats(struct net_bridge *br) 4677 { 4678 free_percpu(br->mcast_stats); 4679 } 4680 4681 /* noinline for https://bugs.llvm.org/show_bug.cgi?id=45802#c9 */ 4682 static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src) 4683 { 4684 dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX]; 4685 dst[BR_MCAST_DIR_TX] += src[BR_MCAST_DIR_TX]; 4686 } 4687 4688 void br_multicast_get_stats(const struct net_bridge *br, 4689 const struct net_bridge_port *p, 4690 struct br_mcast_stats *dest) 4691 { 4692 struct bridge_mcast_stats __percpu *stats; 4693 struct br_mcast_stats tdst; 4694 int i; 4695 4696 memset(dest, 0, sizeof(*dest)); 4697 if (p) 4698 stats = p->mcast_stats; 4699 else 4700 stats = br->mcast_stats; 4701 if (WARN_ON(!stats)) 4702 return; 4703 4704 memset(&tdst, 0, sizeof(tdst)); 4705 for_each_possible_cpu(i) { 4706 struct bridge_mcast_stats *cpu_stats = per_cpu_ptr(stats, i); 4707 struct br_mcast_stats temp; 4708 unsigned int start; 4709 4710 do { 4711 start = u64_stats_fetch_begin_irq(&cpu_stats->syncp); 4712 memcpy(&temp, &cpu_stats->mstats, sizeof(temp)); 4713 } while (u64_stats_fetch_retry_irq(&cpu_stats->syncp, start)); 4714 4715 mcast_stats_add_dir(tdst.igmp_v1queries, temp.igmp_v1queries); 4716 mcast_stats_add_dir(tdst.igmp_v2queries, temp.igmp_v2queries); 4717 mcast_stats_add_dir(tdst.igmp_v3queries, temp.igmp_v3queries); 4718 mcast_stats_add_dir(tdst.igmp_leaves, temp.igmp_leaves); 4719 mcast_stats_add_dir(tdst.igmp_v1reports, temp.igmp_v1reports); 4720 mcast_stats_add_dir(tdst.igmp_v2reports, temp.igmp_v2reports); 4721 mcast_stats_add_dir(tdst.igmp_v3reports, temp.igmp_v3reports); 4722 tdst.igmp_parse_errors += temp.igmp_parse_errors; 4723 4724 mcast_stats_add_dir(tdst.mld_v1queries, temp.mld_v1queries); 4725 mcast_stats_add_dir(tdst.mld_v2queries, temp.mld_v2queries); 4726 mcast_stats_add_dir(tdst.mld_leaves, temp.mld_leaves); 4727 mcast_stats_add_dir(tdst.mld_v1reports, temp.mld_v1reports); 4728 mcast_stats_add_dir(tdst.mld_v2reports, temp.mld_v2reports); 4729 tdst.mld_parse_errors += temp.mld_parse_errors; 4730 } 4731 memcpy(dest, &tdst, sizeof(*dest)); 4732 } 4733 4734 int br_mdb_hash_init(struct net_bridge *br) 4735 { 4736 int err; 4737 4738 err = rhashtable_init(&br->sg_port_tbl, &br_sg_port_rht_params); 4739 if (err) 4740 return err; 4741 4742 err = rhashtable_init(&br->mdb_hash_tbl, &br_mdb_rht_params); 4743 if (err) { 4744 rhashtable_destroy(&br->sg_port_tbl); 4745 return err; 4746 } 4747 4748 return 0; 4749 } 4750 4751 void br_mdb_hash_fini(struct net_bridge *br) 4752 { 4753 rhashtable_destroy(&br->sg_port_tbl); 4754 rhashtable_destroy(&br->mdb_hash_tbl); 4755 } 4756