1/* 2 * Bridge multicast support. 3 * 4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au> 5 * 6 * This program is free software; you can redistribute it and/or modify it 7 * under the terms of the GNU General Public License as published by the Free 8 * Software Foundation; either version 2 of the License, or (at your option) 9 * any later version. 10 * 11 */ 12 13#include <linux/err.h> 14#include <linux/export.h> 15#include <linux/if_ether.h> 16#include <linux/igmp.h> 17#include <linux/jhash.h> 18#include <linux/kernel.h> 19#include <linux/log2.h> 20#include <linux/netdevice.h> 21#include <linux/netfilter_bridge.h> 22#include <linux/random.h> 23#include <linux/rculist.h> 24#include <linux/skbuff.h> 25#include <linux/slab.h> 26#include <linux/timer.h> 27#include <linux/inetdevice.h> 28#include <net/ip.h> 29#if IS_ENABLED(CONFIG_IPV6) 30#include <net/ipv6.h> 31#include <net/mld.h> 32#include <net/ip6_checksum.h> 33#include <net/addrconf.h> 34#endif 35 36#include "br_private.h" 37 38static void br_multicast_start_querier(struct net_bridge *br, 39 struct bridge_mcast_own_query *query); 40unsigned int br_mdb_rehash_seq; 41 42static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b) 43{ 44 if (a->proto != b->proto) 45 return 0; 46 if (a->vid != b->vid) 47 return 0; 48 switch (a->proto) { 49 case htons(ETH_P_IP): 50 return a->u.ip4 == b->u.ip4; 51#if IS_ENABLED(CONFIG_IPV6) 52 case htons(ETH_P_IPV6): 53 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6); 54#endif 55 } 56 return 0; 57} 58 59static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip, 60 __u16 vid) 61{ 62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1); 63} 64 65#if IS_ENABLED(CONFIG_IPV6) 66static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb, 67 const struct in6_addr *ip, 68 __u16 vid) 69{ 70 return jhash_2words(ipv6_addr_hash(ip), vid, 71 mdb->secret) & (mdb->max - 1); 72} 73#endif 74 75static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb, 76 struct br_ip *ip) 77{ 78 switch (ip->proto) { 79 case htons(ETH_P_IP): 80 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid); 81#if IS_ENABLED(CONFIG_IPV6) 82 case htons(ETH_P_IPV6): 83 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid); 84#endif 85 } 86 return 0; 87} 88 89static struct net_bridge_mdb_entry *__br_mdb_ip_get( 90 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash) 91{ 92 struct net_bridge_mdb_entry *mp; 93 94 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) { 95 if (br_ip_equal(&mp->addr, dst)) 96 return mp; 97 } 98 99 return NULL; 100} 101 102struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb, 103 struct br_ip *dst) 104{ 105 if (!mdb) 106 return NULL; 107 108 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst)); 109} 110 111static struct net_bridge_mdb_entry *br_mdb_ip4_get( 112 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid) 113{ 114 struct br_ip br_dst; 115 116 br_dst.u.ip4 = dst; 117 br_dst.proto = htons(ETH_P_IP); 118 br_dst.vid = vid; 119 120 return br_mdb_ip_get(mdb, &br_dst); 121} 122 123#if IS_ENABLED(CONFIG_IPV6) 124static struct net_bridge_mdb_entry *br_mdb_ip6_get( 125 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst, 126 __u16 vid) 127{ 128 struct br_ip br_dst; 129 130 br_dst.u.ip6 = *dst; 131 br_dst.proto = htons(ETH_P_IPV6); 132 br_dst.vid = vid; 133 134 return br_mdb_ip_get(mdb, &br_dst); 135} 136#endif 137 138struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br, 139 struct sk_buff *skb, u16 vid) 140{ 141 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb); 142 struct br_ip ip; 143 144 if (br->multicast_disabled) 145 return NULL; 146 147 if (BR_INPUT_SKB_CB(skb)->igmp) 148 return NULL; 149 150 ip.proto = skb->protocol; 151 ip.vid = vid; 152 153 switch (skb->protocol) { 154 case htons(ETH_P_IP): 155 ip.u.ip4 = ip_hdr(skb)->daddr; 156 break; 157#if IS_ENABLED(CONFIG_IPV6) 158 case htons(ETH_P_IPV6): 159 ip.u.ip6 = ipv6_hdr(skb)->daddr; 160 break; 161#endif 162 default: 163 return NULL; 164 } 165 166 return br_mdb_ip_get(mdb, &ip); 167} 168 169static void br_mdb_free(struct rcu_head *head) 170{ 171 struct net_bridge_mdb_htable *mdb = 172 container_of(head, struct net_bridge_mdb_htable, rcu); 173 struct net_bridge_mdb_htable *old = mdb->old; 174 175 mdb->old = NULL; 176 kfree(old->mhash); 177 kfree(old); 178} 179 180static int br_mdb_copy(struct net_bridge_mdb_htable *new, 181 struct net_bridge_mdb_htable *old, 182 int elasticity) 183{ 184 struct net_bridge_mdb_entry *mp; 185 int maxlen; 186 int len; 187 int i; 188 189 for (i = 0; i < old->max; i++) 190 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver]) 191 hlist_add_head(&mp->hlist[new->ver], 192 &new->mhash[br_ip_hash(new, &mp->addr)]); 193 194 if (!elasticity) 195 return 0; 196 197 maxlen = 0; 198 for (i = 0; i < new->max; i++) { 199 len = 0; 200 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver]) 201 len++; 202 if (len > maxlen) 203 maxlen = len; 204 } 205 206 return maxlen > elasticity ? -EINVAL : 0; 207} 208 209void br_multicast_free_pg(struct rcu_head *head) 210{ 211 struct net_bridge_port_group *p = 212 container_of(head, struct net_bridge_port_group, rcu); 213 214 kfree(p); 215} 216 217static void br_multicast_free_group(struct rcu_head *head) 218{ 219 struct net_bridge_mdb_entry *mp = 220 container_of(head, struct net_bridge_mdb_entry, rcu); 221 222 kfree(mp); 223} 224 225static void br_multicast_group_expired(unsigned long data) 226{ 227 struct net_bridge_mdb_entry *mp = (void *)data; 228 struct net_bridge *br = mp->br; 229 struct net_bridge_mdb_htable *mdb; 230 231 spin_lock(&br->multicast_lock); 232 if (!netif_running(br->dev) || timer_pending(&mp->timer)) 233 goto out; 234 235 mp->mglist = false; 236 237 if (mp->ports) 238 goto out; 239 240 mdb = mlock_dereference(br->mdb, br); 241 242 hlist_del_rcu(&mp->hlist[mdb->ver]); 243 mdb->size--; 244 245 call_rcu_bh(&mp->rcu, br_multicast_free_group); 246 247out: 248 spin_unlock(&br->multicast_lock); 249} 250 251static void br_multicast_del_pg(struct net_bridge *br, 252 struct net_bridge_port_group *pg) 253{ 254 struct net_bridge_mdb_htable *mdb; 255 struct net_bridge_mdb_entry *mp; 256 struct net_bridge_port_group *p; 257 struct net_bridge_port_group __rcu **pp; 258 259 mdb = mlock_dereference(br->mdb, br); 260 261 mp = br_mdb_ip_get(mdb, &pg->addr); 262 if (WARN_ON(!mp)) 263 return; 264 265 for (pp = &mp->ports; 266 (p = mlock_dereference(*pp, br)) != NULL; 267 pp = &p->next) { 268 if (p != pg) 269 continue; 270 271 rcu_assign_pointer(*pp, p->next); 272 hlist_del_init(&p->mglist); 273 del_timer(&p->timer); 274 call_rcu_bh(&p->rcu, br_multicast_free_pg); 275 276 if (!mp->ports && !mp->mglist && 277 netif_running(br->dev)) 278 mod_timer(&mp->timer, jiffies); 279 280 return; 281 } 282 283 WARN_ON(1); 284} 285 286static void br_multicast_port_group_expired(unsigned long data) 287{ 288 struct net_bridge_port_group *pg = (void *)data; 289 struct net_bridge *br = pg->port->br; 290 291 spin_lock(&br->multicast_lock); 292 if (!netif_running(br->dev) || timer_pending(&pg->timer) || 293 hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT) 294 goto out; 295 296 br_multicast_del_pg(br, pg); 297 298out: 299 spin_unlock(&br->multicast_lock); 300} 301 302static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max, 303 int elasticity) 304{ 305 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1); 306 struct net_bridge_mdb_htable *mdb; 307 int err; 308 309 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC); 310 if (!mdb) 311 return -ENOMEM; 312 313 mdb->max = max; 314 mdb->old = old; 315 316 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC); 317 if (!mdb->mhash) { 318 kfree(mdb); 319 return -ENOMEM; 320 } 321 322 mdb->size = old ? old->size : 0; 323 mdb->ver = old ? old->ver ^ 1 : 0; 324 325 if (!old || elasticity) 326 get_random_bytes(&mdb->secret, sizeof(mdb->secret)); 327 else 328 mdb->secret = old->secret; 329 330 if (!old) 331 goto out; 332 333 err = br_mdb_copy(mdb, old, elasticity); 334 if (err) { 335 kfree(mdb->mhash); 336 kfree(mdb); 337 return err; 338 } 339 340 br_mdb_rehash_seq++; 341 call_rcu_bh(&mdb->rcu, br_mdb_free); 342 343out: 344 rcu_assign_pointer(*mdbp, mdb); 345 346 return 0; 347} 348 349static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br, 350 __be32 group) 351{ 352 struct sk_buff *skb; 353 struct igmphdr *ih; 354 struct ethhdr *eth; 355 struct iphdr *iph; 356 357 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) + 358 sizeof(*ih) + 4); 359 if (!skb) 360 goto out; 361 362 skb->protocol = htons(ETH_P_IP); 363 364 skb_reset_mac_header(skb); 365 eth = eth_hdr(skb); 366 367 ether_addr_copy(eth->h_source, br->dev->dev_addr); 368 eth->h_dest[0] = 1; 369 eth->h_dest[1] = 0; 370 eth->h_dest[2] = 0x5e; 371 eth->h_dest[3] = 0; 372 eth->h_dest[4] = 0; 373 eth->h_dest[5] = 1; 374 eth->h_proto = htons(ETH_P_IP); 375 skb_put(skb, sizeof(*eth)); 376 377 skb_set_network_header(skb, skb->len); 378 iph = ip_hdr(skb); 379 380 iph->version = 4; 381 iph->ihl = 6; 382 iph->tos = 0xc0; 383 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4); 384 iph->id = 0; 385 iph->frag_off = htons(IP_DF); 386 iph->ttl = 1; 387 iph->protocol = IPPROTO_IGMP; 388 iph->saddr = br->multicast_query_use_ifaddr ? 389 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0; 390 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP); 391 ((u8 *)&iph[1])[0] = IPOPT_RA; 392 ((u8 *)&iph[1])[1] = 4; 393 ((u8 *)&iph[1])[2] = 0; 394 ((u8 *)&iph[1])[3] = 0; 395 ip_send_check(iph); 396 skb_put(skb, 24); 397 398 skb_set_transport_header(skb, skb->len); 399 ih = igmp_hdr(skb); 400 ih->type = IGMP_HOST_MEMBERSHIP_QUERY; 401 ih->code = (group ? br->multicast_last_member_interval : 402 br->multicast_query_response_interval) / 403 (HZ / IGMP_TIMER_SCALE); 404 ih->group = group; 405 ih->csum = 0; 406 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr)); 407 skb_put(skb, sizeof(*ih)); 408 409 __skb_pull(skb, sizeof(*eth)); 410 411out: 412 return skb; 413} 414 415#if IS_ENABLED(CONFIG_IPV6) 416static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br, 417 const struct in6_addr *group) 418{ 419 struct sk_buff *skb; 420 struct ipv6hdr *ip6h; 421 struct mld_msg *mldq; 422 struct ethhdr *eth; 423 u8 *hopopt; 424 unsigned long interval; 425 426 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) + 427 8 + sizeof(*mldq)); 428 if (!skb) 429 goto out; 430 431 skb->protocol = htons(ETH_P_IPV6); 432 433 /* Ethernet header */ 434 skb_reset_mac_header(skb); 435 eth = eth_hdr(skb); 436 437 ether_addr_copy(eth->h_source, br->dev->dev_addr); 438 eth->h_proto = htons(ETH_P_IPV6); 439 skb_put(skb, sizeof(*eth)); 440 441 /* IPv6 header + HbH option */ 442 skb_set_network_header(skb, skb->len); 443 ip6h = ipv6_hdr(skb); 444 445 *(__force __be32 *)ip6h = htonl(0x60000000); 446 ip6h->payload_len = htons(8 + sizeof(*mldq)); 447 ip6h->nexthdr = IPPROTO_HOPOPTS; 448 ip6h->hop_limit = 1; 449 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1)); 450 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0, 451 &ip6h->saddr)) { 452 kfree_skb(skb); 453 return NULL; 454 } 455 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest); 456 457 hopopt = (u8 *)(ip6h + 1); 458 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */ 459 hopopt[1] = 0; /* length of HbH */ 460 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */ 461 hopopt[3] = 2; /* Length of RA Option */ 462 hopopt[4] = 0; /* Type = 0x0000 (MLD) */ 463 hopopt[5] = 0; 464 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */ 465 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */ 466 467 skb_put(skb, sizeof(*ip6h) + 8); 468 469 /* ICMPv6 */ 470 skb_set_transport_header(skb, skb->len); 471 mldq = (struct mld_msg *) icmp6_hdr(skb); 472 473 interval = ipv6_addr_any(group) ? 474 br->multicast_query_response_interval : 475 br->multicast_last_member_interval; 476 477 mldq->mld_type = ICMPV6_MGM_QUERY; 478 mldq->mld_code = 0; 479 mldq->mld_cksum = 0; 480 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval)); 481 mldq->mld_reserved = 0; 482 mldq->mld_mca = *group; 483 484 /* checksum */ 485 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, 486 sizeof(*mldq), IPPROTO_ICMPV6, 487 csum_partial(mldq, 488 sizeof(*mldq), 0)); 489 skb_put(skb, sizeof(*mldq)); 490 491 __skb_pull(skb, sizeof(*eth)); 492 493out: 494 return skb; 495} 496#endif 497 498static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br, 499 struct br_ip *addr) 500{ 501 switch (addr->proto) { 502 case htons(ETH_P_IP): 503 return br_ip4_multicast_alloc_query(br, addr->u.ip4); 504#if IS_ENABLED(CONFIG_IPV6) 505 case htons(ETH_P_IPV6): 506 return br_ip6_multicast_alloc_query(br, &addr->u.ip6); 507#endif 508 } 509 return NULL; 510} 511 512static struct net_bridge_mdb_entry *br_multicast_get_group( 513 struct net_bridge *br, struct net_bridge_port *port, 514 struct br_ip *group, int hash) 515{ 516 struct net_bridge_mdb_htable *mdb; 517 struct net_bridge_mdb_entry *mp; 518 unsigned int count = 0; 519 unsigned int max; 520 int elasticity; 521 int err; 522 523 mdb = rcu_dereference_protected(br->mdb, 1); 524 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) { 525 count++; 526 if (unlikely(br_ip_equal(group, &mp->addr))) 527 return mp; 528 } 529 530 elasticity = 0; 531 max = mdb->max; 532 533 if (unlikely(count > br->hash_elasticity && count)) { 534 if (net_ratelimit()) 535 br_info(br, "Multicast hash table " 536 "chain limit reached: %s\n", 537 port ? port->dev->name : br->dev->name); 538 539 elasticity = br->hash_elasticity; 540 } 541 542 if (mdb->size >= max) { 543 max *= 2; 544 if (unlikely(max > br->hash_max)) { 545 br_warn(br, "Multicast hash table maximum of %d " 546 "reached, disabling snooping: %s\n", 547 br->hash_max, 548 port ? port->dev->name : br->dev->name); 549 err = -E2BIG; 550disable: 551 br->multicast_disabled = 1; 552 goto err; 553 } 554 } 555 556 if (max > mdb->max || elasticity) { 557 if (mdb->old) { 558 if (net_ratelimit()) 559 br_info(br, "Multicast hash table " 560 "on fire: %s\n", 561 port ? port->dev->name : br->dev->name); 562 err = -EEXIST; 563 goto err; 564 } 565 566 err = br_mdb_rehash(&br->mdb, max, elasticity); 567 if (err) { 568 br_warn(br, "Cannot rehash multicast " 569 "hash table, disabling snooping: %s, %d, %d\n", 570 port ? port->dev->name : br->dev->name, 571 mdb->size, err); 572 goto disable; 573 } 574 575 err = -EAGAIN; 576 goto err; 577 } 578 579 return NULL; 580 581err: 582 mp = ERR_PTR(err); 583 return mp; 584} 585 586struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br, 587 struct net_bridge_port *port, struct br_ip *group) 588{ 589 struct net_bridge_mdb_htable *mdb; 590 struct net_bridge_mdb_entry *mp; 591 int hash; 592 int err; 593 594 mdb = rcu_dereference_protected(br->mdb, 1); 595 if (!mdb) { 596 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0); 597 if (err) 598 return ERR_PTR(err); 599 goto rehash; 600 } 601 602 hash = br_ip_hash(mdb, group); 603 mp = br_multicast_get_group(br, port, group, hash); 604 switch (PTR_ERR(mp)) { 605 case 0: 606 break; 607 608 case -EAGAIN: 609rehash: 610 mdb = rcu_dereference_protected(br->mdb, 1); 611 hash = br_ip_hash(mdb, group); 612 break; 613 614 default: 615 goto out; 616 } 617 618 mp = kzalloc(sizeof(*mp), GFP_ATOMIC); 619 if (unlikely(!mp)) 620 return ERR_PTR(-ENOMEM); 621 622 mp->br = br; 623 mp->addr = *group; 624 setup_timer(&mp->timer, br_multicast_group_expired, 625 (unsigned long)mp); 626 627 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]); 628 mdb->size++; 629 630out: 631 return mp; 632} 633 634struct net_bridge_port_group *br_multicast_new_port_group( 635 struct net_bridge_port *port, 636 struct br_ip *group, 637 struct net_bridge_port_group __rcu *next, 638 unsigned char state) 639{ 640 struct net_bridge_port_group *p; 641 642 p = kzalloc(sizeof(*p), GFP_ATOMIC); 643 if (unlikely(!p)) 644 return NULL; 645 646 p->addr = *group; 647 p->port = port; 648 p->state = state; 649 rcu_assign_pointer(p->next, next); 650 hlist_add_head(&p->mglist, &port->mglist); 651 setup_timer(&p->timer, br_multicast_port_group_expired, 652 (unsigned long)p); 653 return p; 654} 655 656static int br_multicast_add_group(struct net_bridge *br, 657 struct net_bridge_port *port, 658 struct br_ip *group) 659{ 660 struct net_bridge_mdb_entry *mp; 661 struct net_bridge_port_group *p; 662 struct net_bridge_port_group __rcu **pp; 663 unsigned long now = jiffies; 664 int err; 665 666 spin_lock(&br->multicast_lock); 667 if (!netif_running(br->dev) || 668 (port && port->state == BR_STATE_DISABLED)) 669 goto out; 670 671 mp = br_multicast_new_group(br, port, group); 672 err = PTR_ERR(mp); 673 if (IS_ERR(mp)) 674 goto err; 675 676 if (!port) { 677 mp->mglist = true; 678 mod_timer(&mp->timer, now + br->multicast_membership_interval); 679 goto out; 680 } 681 682 for (pp = &mp->ports; 683 (p = mlock_dereference(*pp, br)) != NULL; 684 pp = &p->next) { 685 if (p->port == port) 686 goto found; 687 if ((unsigned long)p->port < (unsigned long)port) 688 break; 689 } 690 691 p = br_multicast_new_port_group(port, group, *pp, MDB_TEMPORARY); 692 if (unlikely(!p)) 693 goto err; 694 rcu_assign_pointer(*pp, p); 695 br_mdb_notify(br->dev, port, group, RTM_NEWMDB); 696 697found: 698 mod_timer(&p->timer, now + br->multicast_membership_interval); 699out: 700 err = 0; 701 702err: 703 spin_unlock(&br->multicast_lock); 704 return err; 705} 706 707static int br_ip4_multicast_add_group(struct net_bridge *br, 708 struct net_bridge_port *port, 709 __be32 group, 710 __u16 vid) 711{ 712 struct br_ip br_group; 713 714 if (ipv4_is_local_multicast(group)) 715 return 0; 716 717 br_group.u.ip4 = group; 718 br_group.proto = htons(ETH_P_IP); 719 br_group.vid = vid; 720 721 return br_multicast_add_group(br, port, &br_group); 722} 723 724#if IS_ENABLED(CONFIG_IPV6) 725static int br_ip6_multicast_add_group(struct net_bridge *br, 726 struct net_bridge_port *port, 727 const struct in6_addr *group, 728 __u16 vid) 729{ 730 struct br_ip br_group; 731 732 if (ipv6_addr_is_ll_all_nodes(group)) 733 return 0; 734 735 br_group.u.ip6 = *group; 736 br_group.proto = htons(ETH_P_IPV6); 737 br_group.vid = vid; 738 739 return br_multicast_add_group(br, port, &br_group); 740} 741#endif 742 743static void br_multicast_router_expired(unsigned long data) 744{ 745 struct net_bridge_port *port = (void *)data; 746 struct net_bridge *br = port->br; 747 748 spin_lock(&br->multicast_lock); 749 if (port->multicast_router != 1 || 750 timer_pending(&port->multicast_router_timer) || 751 hlist_unhashed(&port->rlist)) 752 goto out; 753 754 hlist_del_init_rcu(&port->rlist); 755 756out: 757 spin_unlock(&br->multicast_lock); 758} 759 760static void br_multicast_local_router_expired(unsigned long data) 761{ 762} 763 764static void br_multicast_querier_expired(struct net_bridge *br, 765 struct bridge_mcast_own_query *query) 766{ 767 spin_lock(&br->multicast_lock); 768 if (!netif_running(br->dev) || br->multicast_disabled) 769 goto out; 770 771 br_multicast_start_querier(br, query); 772 773out: 774 spin_unlock(&br->multicast_lock); 775} 776 777static void br_ip4_multicast_querier_expired(unsigned long data) 778{ 779 struct net_bridge *br = (void *)data; 780 781 br_multicast_querier_expired(br, &br->ip4_own_query); 782} 783 784#if IS_ENABLED(CONFIG_IPV6) 785static void br_ip6_multicast_querier_expired(unsigned long data) 786{ 787 struct net_bridge *br = (void *)data; 788 789 br_multicast_querier_expired(br, &br->ip6_own_query); 790} 791#endif 792 793static void br_multicast_select_own_querier(struct net_bridge *br, 794 struct br_ip *ip, 795 struct sk_buff *skb) 796{ 797 if (ip->proto == htons(ETH_P_IP)) 798 br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr; 799#if IS_ENABLED(CONFIG_IPV6) 800 else 801 br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr; 802#endif 803} 804 805static void __br_multicast_send_query(struct net_bridge *br, 806 struct net_bridge_port *port, 807 struct br_ip *ip) 808{ 809 struct sk_buff *skb; 810 811 skb = br_multicast_alloc_query(br, ip); 812 if (!skb) 813 return; 814 815 if (port) { 816 skb->dev = port->dev; 817 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, NULL, skb, 818 NULL, skb->dev, 819 br_dev_queue_push_xmit); 820 } else { 821 br_multicast_select_own_querier(br, ip, skb); 822 netif_rx(skb); 823 } 824} 825 826static void br_multicast_send_query(struct net_bridge *br, 827 struct net_bridge_port *port, 828 struct bridge_mcast_own_query *own_query) 829{ 830 unsigned long time; 831 struct br_ip br_group; 832 struct bridge_mcast_other_query *other_query = NULL; 833 834 if (!netif_running(br->dev) || br->multicast_disabled || 835 !br->multicast_querier) 836 return; 837 838 memset(&br_group.u, 0, sizeof(br_group.u)); 839 840 if (port ? (own_query == &port->ip4_own_query) : 841 (own_query == &br->ip4_own_query)) { 842 other_query = &br->ip4_other_query; 843 br_group.proto = htons(ETH_P_IP); 844#if IS_ENABLED(CONFIG_IPV6) 845 } else { 846 other_query = &br->ip6_other_query; 847 br_group.proto = htons(ETH_P_IPV6); 848#endif 849 } 850 851 if (!other_query || timer_pending(&other_query->timer)) 852 return; 853 854 __br_multicast_send_query(br, port, &br_group); 855 856 time = jiffies; 857 time += own_query->startup_sent < br->multicast_startup_query_count ? 858 br->multicast_startup_query_interval : 859 br->multicast_query_interval; 860 mod_timer(&own_query->timer, time); 861} 862 863static void 864br_multicast_port_query_expired(struct net_bridge_port *port, 865 struct bridge_mcast_own_query *query) 866{ 867 struct net_bridge *br = port->br; 868 869 spin_lock(&br->multicast_lock); 870 if (port->state == BR_STATE_DISABLED || 871 port->state == BR_STATE_BLOCKING) 872 goto out; 873 874 if (query->startup_sent < br->multicast_startup_query_count) 875 query->startup_sent++; 876 877 br_multicast_send_query(port->br, port, query); 878 879out: 880 spin_unlock(&br->multicast_lock); 881} 882 883static void br_ip4_multicast_port_query_expired(unsigned long data) 884{ 885 struct net_bridge_port *port = (void *)data; 886 887 br_multicast_port_query_expired(port, &port->ip4_own_query); 888} 889 890#if IS_ENABLED(CONFIG_IPV6) 891static void br_ip6_multicast_port_query_expired(unsigned long data) 892{ 893 struct net_bridge_port *port = (void *)data; 894 895 br_multicast_port_query_expired(port, &port->ip6_own_query); 896} 897#endif 898 899void br_multicast_add_port(struct net_bridge_port *port) 900{ 901 port->multicast_router = 1; 902 903 setup_timer(&port->multicast_router_timer, br_multicast_router_expired, 904 (unsigned long)port); 905 setup_timer(&port->ip4_own_query.timer, 906 br_ip4_multicast_port_query_expired, (unsigned long)port); 907#if IS_ENABLED(CONFIG_IPV6) 908 setup_timer(&port->ip6_own_query.timer, 909 br_ip6_multicast_port_query_expired, (unsigned long)port); 910#endif 911} 912 913void br_multicast_del_port(struct net_bridge_port *port) 914{ 915 del_timer_sync(&port->multicast_router_timer); 916} 917 918static void br_multicast_enable(struct bridge_mcast_own_query *query) 919{ 920 query->startup_sent = 0; 921 922 if (try_to_del_timer_sync(&query->timer) >= 0 || 923 del_timer(&query->timer)) 924 mod_timer(&query->timer, jiffies); 925} 926 927void br_multicast_enable_port(struct net_bridge_port *port) 928{ 929 struct net_bridge *br = port->br; 930 931 spin_lock(&br->multicast_lock); 932 if (br->multicast_disabled || !netif_running(br->dev)) 933 goto out; 934 935 br_multicast_enable(&port->ip4_own_query); 936#if IS_ENABLED(CONFIG_IPV6) 937 br_multicast_enable(&port->ip6_own_query); 938#endif 939 940out: 941 spin_unlock(&br->multicast_lock); 942} 943 944void br_multicast_disable_port(struct net_bridge_port *port) 945{ 946 struct net_bridge *br = port->br; 947 struct net_bridge_port_group *pg; 948 struct hlist_node *n; 949 950 spin_lock(&br->multicast_lock); 951 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist) 952 br_multicast_del_pg(br, pg); 953 954 if (!hlist_unhashed(&port->rlist)) 955 hlist_del_init_rcu(&port->rlist); 956 del_timer(&port->multicast_router_timer); 957 del_timer(&port->ip4_own_query.timer); 958#if IS_ENABLED(CONFIG_IPV6) 959 del_timer(&port->ip6_own_query.timer); 960#endif 961 spin_unlock(&br->multicast_lock); 962} 963 964static int br_ip4_multicast_igmp3_report(struct net_bridge *br, 965 struct net_bridge_port *port, 966 struct sk_buff *skb, 967 u16 vid) 968{ 969 struct igmpv3_report *ih; 970 struct igmpv3_grec *grec; 971 int i; 972 int len; 973 int num; 974 int type; 975 int err = 0; 976 __be32 group; 977 978 if (!pskb_may_pull(skb, sizeof(*ih))) 979 return -EINVAL; 980 981 ih = igmpv3_report_hdr(skb); 982 num = ntohs(ih->ngrec); 983 len = skb_transport_offset(skb) + sizeof(*ih); 984 985 for (i = 0; i < num; i++) { 986 len += sizeof(*grec); 987 if (!pskb_may_pull(skb, len)) 988 return -EINVAL; 989 990 grec = (void *)(skb->data + len - sizeof(*grec)); 991 group = grec->grec_mca; 992 type = grec->grec_type; 993 994 len += ntohs(grec->grec_nsrcs) * 4; 995 if (!pskb_may_pull(skb, len)) 996 return -EINVAL; 997 998 /* We treat this as an IGMPv2 report for now. */ 999 switch (type) { 1000 case IGMPV3_MODE_IS_INCLUDE: 1001 case IGMPV3_MODE_IS_EXCLUDE: 1002 case IGMPV3_CHANGE_TO_INCLUDE: 1003 case IGMPV3_CHANGE_TO_EXCLUDE: 1004 case IGMPV3_ALLOW_NEW_SOURCES: 1005 case IGMPV3_BLOCK_OLD_SOURCES: 1006 break; 1007 1008 default: 1009 continue; 1010 } 1011 1012 err = br_ip4_multicast_add_group(br, port, group, vid); 1013 if (err) 1014 break; 1015 } 1016 1017 return err; 1018} 1019 1020#if IS_ENABLED(CONFIG_IPV6) 1021static int br_ip6_multicast_mld2_report(struct net_bridge *br, 1022 struct net_bridge_port *port, 1023 struct sk_buff *skb, 1024 u16 vid) 1025{ 1026 struct icmp6hdr *icmp6h; 1027 struct mld2_grec *grec; 1028 int i; 1029 int len; 1030 int num; 1031 int err = 0; 1032 1033 if (!pskb_may_pull(skb, sizeof(*icmp6h))) 1034 return -EINVAL; 1035 1036 icmp6h = icmp6_hdr(skb); 1037 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]); 1038 len = skb_transport_offset(skb) + sizeof(*icmp6h); 1039 1040 for (i = 0; i < num; i++) { 1041 __be16 *nsrcs, _nsrcs; 1042 1043 nsrcs = skb_header_pointer(skb, 1044 len + offsetof(struct mld2_grec, 1045 grec_nsrcs), 1046 sizeof(_nsrcs), &_nsrcs); 1047 if (!nsrcs) 1048 return -EINVAL; 1049 1050 if (!pskb_may_pull(skb, 1051 len + sizeof(*grec) + 1052 sizeof(struct in6_addr) * ntohs(*nsrcs))) 1053 return -EINVAL; 1054 1055 grec = (struct mld2_grec *)(skb->data + len); 1056 len += sizeof(*grec) + 1057 sizeof(struct in6_addr) * ntohs(*nsrcs); 1058 1059 /* We treat these as MLDv1 reports for now. */ 1060 switch (grec->grec_type) { 1061 case MLD2_MODE_IS_INCLUDE: 1062 case MLD2_MODE_IS_EXCLUDE: 1063 case MLD2_CHANGE_TO_INCLUDE: 1064 case MLD2_CHANGE_TO_EXCLUDE: 1065 case MLD2_ALLOW_NEW_SOURCES: 1066 case MLD2_BLOCK_OLD_SOURCES: 1067 break; 1068 1069 default: 1070 continue; 1071 } 1072 1073 err = br_ip6_multicast_add_group(br, port, &grec->grec_mca, 1074 vid); 1075 if (err) 1076 break; 1077 } 1078 1079 return err; 1080} 1081#endif 1082 1083static bool br_ip4_multicast_select_querier(struct net_bridge *br, 1084 struct net_bridge_port *port, 1085 __be32 saddr) 1086{ 1087 if (!timer_pending(&br->ip4_own_query.timer) && 1088 !timer_pending(&br->ip4_other_query.timer)) 1089 goto update; 1090 1091 if (!br->ip4_querier.addr.u.ip4) 1092 goto update; 1093 1094 if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4)) 1095 goto update; 1096 1097 return false; 1098 1099update: 1100 br->ip4_querier.addr.u.ip4 = saddr; 1101 1102 /* update protected by general multicast_lock by caller */ 1103 rcu_assign_pointer(br->ip4_querier.port, port); 1104 1105 return true; 1106} 1107 1108#if IS_ENABLED(CONFIG_IPV6) 1109static bool br_ip6_multicast_select_querier(struct net_bridge *br, 1110 struct net_bridge_port *port, 1111 struct in6_addr *saddr) 1112{ 1113 if (!timer_pending(&br->ip6_own_query.timer) && 1114 !timer_pending(&br->ip6_other_query.timer)) 1115 goto update; 1116 1117 if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0) 1118 goto update; 1119 1120 return false; 1121 1122update: 1123 br->ip6_querier.addr.u.ip6 = *saddr; 1124 1125 /* update protected by general multicast_lock by caller */ 1126 rcu_assign_pointer(br->ip6_querier.port, port); 1127 1128 return true; 1129} 1130#endif 1131 1132static bool br_multicast_select_querier(struct net_bridge *br, 1133 struct net_bridge_port *port, 1134 struct br_ip *saddr) 1135{ 1136 switch (saddr->proto) { 1137 case htons(ETH_P_IP): 1138 return br_ip4_multicast_select_querier(br, port, saddr->u.ip4); 1139#if IS_ENABLED(CONFIG_IPV6) 1140 case htons(ETH_P_IPV6): 1141 return br_ip6_multicast_select_querier(br, port, &saddr->u.ip6); 1142#endif 1143 } 1144 1145 return false; 1146} 1147 1148static void 1149br_multicast_update_query_timer(struct net_bridge *br, 1150 struct bridge_mcast_other_query *query, 1151 unsigned long max_delay) 1152{ 1153 if (!timer_pending(&query->timer)) 1154 query->delay_time = jiffies + max_delay; 1155 1156 mod_timer(&query->timer, jiffies + br->multicast_querier_interval); 1157} 1158 1159/* 1160 * Add port to router_list 1161 * list is maintained ordered by pointer value 1162 * and locked by br->multicast_lock and RCU 1163 */ 1164static void br_multicast_add_router(struct net_bridge *br, 1165 struct net_bridge_port *port) 1166{ 1167 struct net_bridge_port *p; 1168 struct hlist_node *slot = NULL; 1169 1170 if (!hlist_unhashed(&port->rlist)) 1171 return; 1172 1173 hlist_for_each_entry(p, &br->router_list, rlist) { 1174 if ((unsigned long) port >= (unsigned long) p) 1175 break; 1176 slot = &p->rlist; 1177 } 1178 1179 if (slot) 1180 hlist_add_behind_rcu(&port->rlist, slot); 1181 else 1182 hlist_add_head_rcu(&port->rlist, &br->router_list); 1183} 1184 1185static void br_multicast_mark_router(struct net_bridge *br, 1186 struct net_bridge_port *port) 1187{ 1188 unsigned long now = jiffies; 1189 1190 if (!port) { 1191 if (br->multicast_router == 1) 1192 mod_timer(&br->multicast_router_timer, 1193 now + br->multicast_querier_interval); 1194 return; 1195 } 1196 1197 if (port->multicast_router != 1) 1198 return; 1199 1200 br_multicast_add_router(br, port); 1201 1202 mod_timer(&port->multicast_router_timer, 1203 now + br->multicast_querier_interval); 1204} 1205 1206static void br_multicast_query_received(struct net_bridge *br, 1207 struct net_bridge_port *port, 1208 struct bridge_mcast_other_query *query, 1209 struct br_ip *saddr, 1210 unsigned long max_delay) 1211{ 1212 if (!br_multicast_select_querier(br, port, saddr)) 1213 return; 1214 1215 br_multicast_update_query_timer(br, query, max_delay); 1216 br_multicast_mark_router(br, port); 1217} 1218 1219static int br_ip4_multicast_query(struct net_bridge *br, 1220 struct net_bridge_port *port, 1221 struct sk_buff *skb, 1222 u16 vid) 1223{ 1224 const struct iphdr *iph = ip_hdr(skb); 1225 struct igmphdr *ih = igmp_hdr(skb); 1226 struct net_bridge_mdb_entry *mp; 1227 struct igmpv3_query *ih3; 1228 struct net_bridge_port_group *p; 1229 struct net_bridge_port_group __rcu **pp; 1230 struct br_ip saddr; 1231 unsigned long max_delay; 1232 unsigned long now = jiffies; 1233 __be32 group; 1234 int err = 0; 1235 1236 spin_lock(&br->multicast_lock); 1237 if (!netif_running(br->dev) || 1238 (port && port->state == BR_STATE_DISABLED)) 1239 goto out; 1240 1241 group = ih->group; 1242 1243 if (skb->len == sizeof(*ih)) { 1244 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE); 1245 1246 if (!max_delay) { 1247 max_delay = 10 * HZ; 1248 group = 0; 1249 } 1250 } else { 1251 if (!pskb_may_pull(skb, sizeof(struct igmpv3_query))) { 1252 err = -EINVAL; 1253 goto out; 1254 } 1255 1256 ih3 = igmpv3_query_hdr(skb); 1257 if (ih3->nsrcs) 1258 goto out; 1259 1260 max_delay = ih3->code ? 1261 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1; 1262 } 1263 1264 /* RFC2236+RFC3376 (IGMPv2+IGMPv3) require the multicast link layer 1265 * all-systems destination addresses (224.0.0.1) for general queries 1266 */ 1267 if (!group && iph->daddr != htonl(INADDR_ALLHOSTS_GROUP)) { 1268 err = -EINVAL; 1269 goto out; 1270 } 1271 1272 if (!group) { 1273 saddr.proto = htons(ETH_P_IP); 1274 saddr.u.ip4 = iph->saddr; 1275 1276 br_multicast_query_received(br, port, &br->ip4_other_query, 1277 &saddr, max_delay); 1278 goto out; 1279 } 1280 1281 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid); 1282 if (!mp) 1283 goto out; 1284 1285 max_delay *= br->multicast_last_member_count; 1286 1287 if (mp->mglist && 1288 (timer_pending(&mp->timer) ? 1289 time_after(mp->timer.expires, now + max_delay) : 1290 try_to_del_timer_sync(&mp->timer) >= 0)) 1291 mod_timer(&mp->timer, now + max_delay); 1292 1293 for (pp = &mp->ports; 1294 (p = mlock_dereference(*pp, br)) != NULL; 1295 pp = &p->next) { 1296 if (timer_pending(&p->timer) ? 1297 time_after(p->timer.expires, now + max_delay) : 1298 try_to_del_timer_sync(&p->timer) >= 0) 1299 mod_timer(&p->timer, now + max_delay); 1300 } 1301 1302out: 1303 spin_unlock(&br->multicast_lock); 1304 return err; 1305} 1306 1307#if IS_ENABLED(CONFIG_IPV6) 1308static int br_ip6_multicast_query(struct net_bridge *br, 1309 struct net_bridge_port *port, 1310 struct sk_buff *skb, 1311 u16 vid) 1312{ 1313 const struct ipv6hdr *ip6h = ipv6_hdr(skb); 1314 struct mld_msg *mld; 1315 struct net_bridge_mdb_entry *mp; 1316 struct mld2_query *mld2q; 1317 struct net_bridge_port_group *p; 1318 struct net_bridge_port_group __rcu **pp; 1319 struct br_ip saddr; 1320 unsigned long max_delay; 1321 unsigned long now = jiffies; 1322 const struct in6_addr *group = NULL; 1323 bool is_general_query; 1324 int err = 0; 1325 1326 spin_lock(&br->multicast_lock); 1327 if (!netif_running(br->dev) || 1328 (port && port->state == BR_STATE_DISABLED)) 1329 goto out; 1330 1331 /* RFC2710+RFC3810 (MLDv1+MLDv2) require link-local source addresses */ 1332 if (!(ipv6_addr_type(&ip6h->saddr) & IPV6_ADDR_LINKLOCAL)) { 1333 err = -EINVAL; 1334 goto out; 1335 } 1336 1337 if (skb->len == sizeof(*mld)) { 1338 if (!pskb_may_pull(skb, sizeof(*mld))) { 1339 err = -EINVAL; 1340 goto out; 1341 } 1342 mld = (struct mld_msg *) icmp6_hdr(skb); 1343 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay)); 1344 if (max_delay) 1345 group = &mld->mld_mca; 1346 } else { 1347 if (!pskb_may_pull(skb, sizeof(*mld2q))) { 1348 err = -EINVAL; 1349 goto out; 1350 } 1351 mld2q = (struct mld2_query *)icmp6_hdr(skb); 1352 if (!mld2q->mld2q_nsrcs) 1353 group = &mld2q->mld2q_mca; 1354 1355 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL); 1356 } 1357 1358 is_general_query = group && ipv6_addr_any(group); 1359 1360 /* RFC2710+RFC3810 (MLDv1+MLDv2) require the multicast link layer 1361 * all-nodes destination address (ff02::1) for general queries 1362 */ 1363 if (is_general_query && !ipv6_addr_is_ll_all_nodes(&ip6h->daddr)) { 1364 err = -EINVAL; 1365 goto out; 1366 } 1367 1368 if (is_general_query) { 1369 saddr.proto = htons(ETH_P_IPV6); 1370 saddr.u.ip6 = ip6h->saddr; 1371 1372 br_multicast_query_received(br, port, &br->ip6_other_query, 1373 &saddr, max_delay); 1374 goto out; 1375 } else if (!group) { 1376 goto out; 1377 } 1378 1379 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid); 1380 if (!mp) 1381 goto out; 1382 1383 max_delay *= br->multicast_last_member_count; 1384 if (mp->mglist && 1385 (timer_pending(&mp->timer) ? 1386 time_after(mp->timer.expires, now + max_delay) : 1387 try_to_del_timer_sync(&mp->timer) >= 0)) 1388 mod_timer(&mp->timer, now + max_delay); 1389 1390 for (pp = &mp->ports; 1391 (p = mlock_dereference(*pp, br)) != NULL; 1392 pp = &p->next) { 1393 if (timer_pending(&p->timer) ? 1394 time_after(p->timer.expires, now + max_delay) : 1395 try_to_del_timer_sync(&p->timer) >= 0) 1396 mod_timer(&p->timer, now + max_delay); 1397 } 1398 1399out: 1400 spin_unlock(&br->multicast_lock); 1401 return err; 1402} 1403#endif 1404 1405static void 1406br_multicast_leave_group(struct net_bridge *br, 1407 struct net_bridge_port *port, 1408 struct br_ip *group, 1409 struct bridge_mcast_other_query *other_query, 1410 struct bridge_mcast_own_query *own_query) 1411{ 1412 struct net_bridge_mdb_htable *mdb; 1413 struct net_bridge_mdb_entry *mp; 1414 struct net_bridge_port_group *p; 1415 unsigned long now; 1416 unsigned long time; 1417 1418 spin_lock(&br->multicast_lock); 1419 if (!netif_running(br->dev) || 1420 (port && port->state == BR_STATE_DISABLED) || 1421 timer_pending(&other_query->timer)) 1422 goto out; 1423 1424 mdb = mlock_dereference(br->mdb, br); 1425 mp = br_mdb_ip_get(mdb, group); 1426 if (!mp) 1427 goto out; 1428 1429 if (br->multicast_querier) { 1430 __br_multicast_send_query(br, port, &mp->addr); 1431 1432 time = jiffies + br->multicast_last_member_count * 1433 br->multicast_last_member_interval; 1434 1435 mod_timer(&own_query->timer, time); 1436 1437 for (p = mlock_dereference(mp->ports, br); 1438 p != NULL; 1439 p = mlock_dereference(p->next, br)) { 1440 if (p->port != port) 1441 continue; 1442 1443 if (!hlist_unhashed(&p->mglist) && 1444 (timer_pending(&p->timer) ? 1445 time_after(p->timer.expires, time) : 1446 try_to_del_timer_sync(&p->timer) >= 0)) { 1447 mod_timer(&p->timer, time); 1448 } 1449 1450 break; 1451 } 1452 } 1453 1454 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) { 1455 struct net_bridge_port_group __rcu **pp; 1456 1457 for (pp = &mp->ports; 1458 (p = mlock_dereference(*pp, br)) != NULL; 1459 pp = &p->next) { 1460 if (p->port != port) 1461 continue; 1462 1463 rcu_assign_pointer(*pp, p->next); 1464 hlist_del_init(&p->mglist); 1465 del_timer(&p->timer); 1466 call_rcu_bh(&p->rcu, br_multicast_free_pg); 1467 br_mdb_notify(br->dev, port, group, RTM_DELMDB); 1468 1469 if (!mp->ports && !mp->mglist && 1470 netif_running(br->dev)) 1471 mod_timer(&mp->timer, jiffies); 1472 } 1473 goto out; 1474 } 1475 1476 now = jiffies; 1477 time = now + br->multicast_last_member_count * 1478 br->multicast_last_member_interval; 1479 1480 if (!port) { 1481 if (mp->mglist && 1482 (timer_pending(&mp->timer) ? 1483 time_after(mp->timer.expires, time) : 1484 try_to_del_timer_sync(&mp->timer) >= 0)) { 1485 mod_timer(&mp->timer, time); 1486 } 1487 1488 goto out; 1489 } 1490 1491 for (p = mlock_dereference(mp->ports, br); 1492 p != NULL; 1493 p = mlock_dereference(p->next, br)) { 1494 if (p->port != port) 1495 continue; 1496 1497 if (!hlist_unhashed(&p->mglist) && 1498 (timer_pending(&p->timer) ? 1499 time_after(p->timer.expires, time) : 1500 try_to_del_timer_sync(&p->timer) >= 0)) { 1501 mod_timer(&p->timer, time); 1502 } 1503 1504 break; 1505 } 1506out: 1507 spin_unlock(&br->multicast_lock); 1508} 1509 1510static void br_ip4_multicast_leave_group(struct net_bridge *br, 1511 struct net_bridge_port *port, 1512 __be32 group, 1513 __u16 vid) 1514{ 1515 struct br_ip br_group; 1516 struct bridge_mcast_own_query *own_query; 1517 1518 if (ipv4_is_local_multicast(group)) 1519 return; 1520 1521 own_query = port ? &port->ip4_own_query : &br->ip4_own_query; 1522 1523 br_group.u.ip4 = group; 1524 br_group.proto = htons(ETH_P_IP); 1525 br_group.vid = vid; 1526 1527 br_multicast_leave_group(br, port, &br_group, &br->ip4_other_query, 1528 own_query); 1529} 1530 1531#if IS_ENABLED(CONFIG_IPV6) 1532static void br_ip6_multicast_leave_group(struct net_bridge *br, 1533 struct net_bridge_port *port, 1534 const struct in6_addr *group, 1535 __u16 vid) 1536{ 1537 struct br_ip br_group; 1538 struct bridge_mcast_own_query *own_query; 1539 1540 if (ipv6_addr_is_ll_all_nodes(group)) 1541 return; 1542 1543 own_query = port ? &port->ip6_own_query : &br->ip6_own_query; 1544 1545 br_group.u.ip6 = *group; 1546 br_group.proto = htons(ETH_P_IPV6); 1547 br_group.vid = vid; 1548 1549 br_multicast_leave_group(br, port, &br_group, &br->ip6_other_query, 1550 own_query); 1551} 1552#endif 1553 1554static int br_multicast_ipv4_rcv(struct net_bridge *br, 1555 struct net_bridge_port *port, 1556 struct sk_buff *skb, 1557 u16 vid) 1558{ 1559 struct sk_buff *skb2 = skb; 1560 const struct iphdr *iph; 1561 struct igmphdr *ih; 1562 unsigned int len; 1563 unsigned int offset; 1564 int err; 1565 1566 /* We treat OOM as packet loss for now. */ 1567 if (!pskb_may_pull(skb, sizeof(*iph))) 1568 return -EINVAL; 1569 1570 iph = ip_hdr(skb); 1571 1572 if (iph->ihl < 5 || iph->version != 4) 1573 return -EINVAL; 1574 1575 if (!pskb_may_pull(skb, ip_hdrlen(skb))) 1576 return -EINVAL; 1577 1578 iph = ip_hdr(skb); 1579 1580 if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl))) 1581 return -EINVAL; 1582 1583 if (iph->protocol != IPPROTO_IGMP) { 1584 if (!ipv4_is_local_multicast(iph->daddr)) 1585 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1586 return 0; 1587 } 1588 1589 len = ntohs(iph->tot_len); 1590 if (skb->len < len || len < ip_hdrlen(skb)) 1591 return -EINVAL; 1592 1593 if (skb->len > len) { 1594 skb2 = skb_clone(skb, GFP_ATOMIC); 1595 if (!skb2) 1596 return -ENOMEM; 1597 1598 err = pskb_trim_rcsum(skb2, len); 1599 if (err) 1600 goto err_out; 1601 } 1602 1603 len -= ip_hdrlen(skb2); 1604 offset = skb_network_offset(skb2) + ip_hdrlen(skb2); 1605 __skb_pull(skb2, offset); 1606 skb_reset_transport_header(skb2); 1607 1608 err = -EINVAL; 1609 if (!pskb_may_pull(skb2, sizeof(*ih))) 1610 goto out; 1611 1612 switch (skb2->ip_summed) { 1613 case CHECKSUM_COMPLETE: 1614 if (!csum_fold(skb2->csum)) 1615 break; 1616 /* fall through */ 1617 case CHECKSUM_NONE: 1618 skb2->csum = 0; 1619 if (skb_checksum_complete(skb2)) 1620 goto out; 1621 } 1622 1623 err = 0; 1624 1625 BR_INPUT_SKB_CB(skb)->igmp = 1; 1626 ih = igmp_hdr(skb2); 1627 1628 switch (ih->type) { 1629 case IGMP_HOST_MEMBERSHIP_REPORT: 1630 case IGMPV2_HOST_MEMBERSHIP_REPORT: 1631 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1632 err = br_ip4_multicast_add_group(br, port, ih->group, vid); 1633 break; 1634 case IGMPV3_HOST_MEMBERSHIP_REPORT: 1635 err = br_ip4_multicast_igmp3_report(br, port, skb2, vid); 1636 break; 1637 case IGMP_HOST_MEMBERSHIP_QUERY: 1638 err = br_ip4_multicast_query(br, port, skb2, vid); 1639 break; 1640 case IGMP_HOST_LEAVE_MESSAGE: 1641 br_ip4_multicast_leave_group(br, port, ih->group, vid); 1642 break; 1643 } 1644 1645out: 1646 __skb_push(skb2, offset); 1647err_out: 1648 if (skb2 != skb) 1649 kfree_skb(skb2); 1650 return err; 1651} 1652 1653#if IS_ENABLED(CONFIG_IPV6) 1654static int br_multicast_ipv6_rcv(struct net_bridge *br, 1655 struct net_bridge_port *port, 1656 struct sk_buff *skb, 1657 u16 vid) 1658{ 1659 struct sk_buff *skb2; 1660 const struct ipv6hdr *ip6h; 1661 u8 icmp6_type; 1662 u8 nexthdr; 1663 __be16 frag_off; 1664 unsigned int len; 1665 int offset; 1666 int err; 1667 1668 if (!pskb_may_pull(skb, sizeof(*ip6h))) 1669 return -EINVAL; 1670 1671 ip6h = ipv6_hdr(skb); 1672 1673 /* 1674 * We're interested in MLD messages only. 1675 * - Version is 6 1676 * - MLD has always Router Alert hop-by-hop option 1677 * - But we do not support jumbrograms. 1678 */ 1679 if (ip6h->version != 6) 1680 return 0; 1681 1682 /* Prevent flooding this packet if there is no listener present */ 1683 if (!ipv6_addr_is_ll_all_nodes(&ip6h->daddr)) 1684 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1685 1686 if (ip6h->nexthdr != IPPROTO_HOPOPTS || 1687 ip6h->payload_len == 0) 1688 return 0; 1689 1690 len = ntohs(ip6h->payload_len) + sizeof(*ip6h); 1691 if (skb->len < len) 1692 return -EINVAL; 1693 1694 nexthdr = ip6h->nexthdr; 1695 offset = ipv6_skip_exthdr(skb, sizeof(*ip6h), &nexthdr, &frag_off); 1696 1697 if (offset < 0 || nexthdr != IPPROTO_ICMPV6) 1698 return 0; 1699 1700 /* Okay, we found ICMPv6 header */ 1701 skb2 = skb_clone(skb, GFP_ATOMIC); 1702 if (!skb2) 1703 return -ENOMEM; 1704 1705 err = -EINVAL; 1706 if (!pskb_may_pull(skb2, offset + sizeof(struct icmp6hdr))) 1707 goto out; 1708 1709 len -= offset - skb_network_offset(skb2); 1710 1711 __skb_pull(skb2, offset); 1712 skb_reset_transport_header(skb2); 1713 skb_postpull_rcsum(skb2, skb_network_header(skb2), 1714 skb_network_header_len(skb2)); 1715 1716 icmp6_type = icmp6_hdr(skb2)->icmp6_type; 1717 1718 switch (icmp6_type) { 1719 case ICMPV6_MGM_QUERY: 1720 case ICMPV6_MGM_REPORT: 1721 case ICMPV6_MGM_REDUCTION: 1722 case ICMPV6_MLD2_REPORT: 1723 break; 1724 default: 1725 err = 0; 1726 goto out; 1727 } 1728 1729 /* Okay, we found MLD message. Check further. */ 1730 if (skb2->len > len) { 1731 err = pskb_trim_rcsum(skb2, len); 1732 if (err) 1733 goto out; 1734 err = -EINVAL; 1735 } 1736 1737 ip6h = ipv6_hdr(skb2); 1738 1739 switch (skb2->ip_summed) { 1740 case CHECKSUM_COMPLETE: 1741 if (!csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, skb2->len, 1742 IPPROTO_ICMPV6, skb2->csum)) 1743 break; 1744 /*FALLTHROUGH*/ 1745 case CHECKSUM_NONE: 1746 skb2->csum = ~csum_unfold(csum_ipv6_magic(&ip6h->saddr, 1747 &ip6h->daddr, 1748 skb2->len, 1749 IPPROTO_ICMPV6, 0)); 1750 if (__skb_checksum_complete(skb2)) 1751 goto out; 1752 } 1753 1754 err = 0; 1755 1756 BR_INPUT_SKB_CB(skb)->igmp = 1; 1757 1758 switch (icmp6_type) { 1759 case ICMPV6_MGM_REPORT: 1760 { 1761 struct mld_msg *mld; 1762 if (!pskb_may_pull(skb2, sizeof(*mld))) { 1763 err = -EINVAL; 1764 goto out; 1765 } 1766 mld = (struct mld_msg *)skb_transport_header(skb2); 1767 BR_INPUT_SKB_CB(skb)->mrouters_only = 1; 1768 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid); 1769 break; 1770 } 1771 case ICMPV6_MLD2_REPORT: 1772 err = br_ip6_multicast_mld2_report(br, port, skb2, vid); 1773 break; 1774 case ICMPV6_MGM_QUERY: 1775 err = br_ip6_multicast_query(br, port, skb2, vid); 1776 break; 1777 case ICMPV6_MGM_REDUCTION: 1778 { 1779 struct mld_msg *mld; 1780 if (!pskb_may_pull(skb2, sizeof(*mld))) { 1781 err = -EINVAL; 1782 goto out; 1783 } 1784 mld = (struct mld_msg *)skb_transport_header(skb2); 1785 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid); 1786 } 1787 } 1788 1789out: 1790 kfree_skb(skb2); 1791 return err; 1792} 1793#endif 1794 1795int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port, 1796 struct sk_buff *skb, u16 vid) 1797{ 1798 BR_INPUT_SKB_CB(skb)->igmp = 0; 1799 BR_INPUT_SKB_CB(skb)->mrouters_only = 0; 1800 1801 if (br->multicast_disabled) 1802 return 0; 1803 1804 switch (skb->protocol) { 1805 case htons(ETH_P_IP): 1806 return br_multicast_ipv4_rcv(br, port, skb, vid); 1807#if IS_ENABLED(CONFIG_IPV6) 1808 case htons(ETH_P_IPV6): 1809 return br_multicast_ipv6_rcv(br, port, skb, vid); 1810#endif 1811 } 1812 1813 return 0; 1814} 1815 1816static void br_multicast_query_expired(struct net_bridge *br, 1817 struct bridge_mcast_own_query *query, 1818 struct bridge_mcast_querier *querier) 1819{ 1820 spin_lock(&br->multicast_lock); 1821 if (query->startup_sent < br->multicast_startup_query_count) 1822 query->startup_sent++; 1823 1824 RCU_INIT_POINTER(querier->port, NULL); 1825 br_multicast_send_query(br, NULL, query); 1826 spin_unlock(&br->multicast_lock); 1827} 1828 1829static void br_ip4_multicast_query_expired(unsigned long data) 1830{ 1831 struct net_bridge *br = (void *)data; 1832 1833 br_multicast_query_expired(br, &br->ip4_own_query, &br->ip4_querier); 1834} 1835 1836#if IS_ENABLED(CONFIG_IPV6) 1837static void br_ip6_multicast_query_expired(unsigned long data) 1838{ 1839 struct net_bridge *br = (void *)data; 1840 1841 br_multicast_query_expired(br, &br->ip6_own_query, &br->ip6_querier); 1842} 1843#endif 1844 1845void br_multicast_init(struct net_bridge *br) 1846{ 1847 br->hash_elasticity = 4; 1848 br->hash_max = 512; 1849 1850 br->multicast_router = 1; 1851 br->multicast_querier = 0; 1852 br->multicast_query_use_ifaddr = 0; 1853 br->multicast_last_member_count = 2; 1854 br->multicast_startup_query_count = 2; 1855 1856 br->multicast_last_member_interval = HZ; 1857 br->multicast_query_response_interval = 10 * HZ; 1858 br->multicast_startup_query_interval = 125 * HZ / 4; 1859 br->multicast_query_interval = 125 * HZ; 1860 br->multicast_querier_interval = 255 * HZ; 1861 br->multicast_membership_interval = 260 * HZ; 1862 1863 br->ip4_other_query.delay_time = 0; 1864 br->ip4_querier.port = NULL; 1865#if IS_ENABLED(CONFIG_IPV6) 1866 br->ip6_other_query.delay_time = 0; 1867 br->ip6_querier.port = NULL; 1868#endif 1869 1870 spin_lock_init(&br->multicast_lock); 1871 setup_timer(&br->multicast_router_timer, 1872 br_multicast_local_router_expired, 0); 1873 setup_timer(&br->ip4_other_query.timer, 1874 br_ip4_multicast_querier_expired, (unsigned long)br); 1875 setup_timer(&br->ip4_own_query.timer, br_ip4_multicast_query_expired, 1876 (unsigned long)br); 1877#if IS_ENABLED(CONFIG_IPV6) 1878 setup_timer(&br->ip6_other_query.timer, 1879 br_ip6_multicast_querier_expired, (unsigned long)br); 1880 setup_timer(&br->ip6_own_query.timer, br_ip6_multicast_query_expired, 1881 (unsigned long)br); 1882#endif 1883} 1884 1885static void __br_multicast_open(struct net_bridge *br, 1886 struct bridge_mcast_own_query *query) 1887{ 1888 query->startup_sent = 0; 1889 1890 if (br->multicast_disabled) 1891 return; 1892 1893 mod_timer(&query->timer, jiffies); 1894} 1895 1896void br_multicast_open(struct net_bridge *br) 1897{ 1898 __br_multicast_open(br, &br->ip4_own_query); 1899#if IS_ENABLED(CONFIG_IPV6) 1900 __br_multicast_open(br, &br->ip6_own_query); 1901#endif 1902} 1903 1904void br_multicast_stop(struct net_bridge *br) 1905{ 1906 struct net_bridge_mdb_htable *mdb; 1907 struct net_bridge_mdb_entry *mp; 1908 struct hlist_node *n; 1909 u32 ver; 1910 int i; 1911 1912 del_timer_sync(&br->multicast_router_timer); 1913 del_timer_sync(&br->ip4_other_query.timer); 1914 del_timer_sync(&br->ip4_own_query.timer); 1915#if IS_ENABLED(CONFIG_IPV6) 1916 del_timer_sync(&br->ip6_other_query.timer); 1917 del_timer_sync(&br->ip6_own_query.timer); 1918#endif 1919 1920 spin_lock_bh(&br->multicast_lock); 1921 mdb = mlock_dereference(br->mdb, br); 1922 if (!mdb) 1923 goto out; 1924 1925 br->mdb = NULL; 1926 1927 ver = mdb->ver; 1928 for (i = 0; i < mdb->max; i++) { 1929 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i], 1930 hlist[ver]) { 1931 del_timer(&mp->timer); 1932 call_rcu_bh(&mp->rcu, br_multicast_free_group); 1933 } 1934 } 1935 1936 if (mdb->old) { 1937 spin_unlock_bh(&br->multicast_lock); 1938 rcu_barrier_bh(); 1939 spin_lock_bh(&br->multicast_lock); 1940 WARN_ON(mdb->old); 1941 } 1942 1943 mdb->old = mdb; 1944 call_rcu_bh(&mdb->rcu, br_mdb_free); 1945 1946out: 1947 spin_unlock_bh(&br->multicast_lock); 1948} 1949 1950int br_multicast_set_router(struct net_bridge *br, unsigned long val) 1951{ 1952 int err = -ENOENT; 1953 1954 spin_lock_bh(&br->multicast_lock); 1955 if (!netif_running(br->dev)) 1956 goto unlock; 1957 1958 switch (val) { 1959 case 0: 1960 case 2: 1961 del_timer(&br->multicast_router_timer); 1962 /* fall through */ 1963 case 1: 1964 br->multicast_router = val; 1965 err = 0; 1966 break; 1967 1968 default: 1969 err = -EINVAL; 1970 break; 1971 } 1972 1973unlock: 1974 spin_unlock_bh(&br->multicast_lock); 1975 1976 return err; 1977} 1978 1979int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val) 1980{ 1981 struct net_bridge *br = p->br; 1982 int err = -ENOENT; 1983 1984 spin_lock(&br->multicast_lock); 1985 if (!netif_running(br->dev) || p->state == BR_STATE_DISABLED) 1986 goto unlock; 1987 1988 switch (val) { 1989 case 0: 1990 case 1: 1991 case 2: 1992 p->multicast_router = val; 1993 err = 0; 1994 1995 if (val < 2 && !hlist_unhashed(&p->rlist)) 1996 hlist_del_init_rcu(&p->rlist); 1997 1998 if (val == 1) 1999 break; 2000 2001 del_timer(&p->multicast_router_timer); 2002 2003 if (val == 0) 2004 break; 2005 2006 br_multicast_add_router(br, p); 2007 break; 2008 2009 default: 2010 err = -EINVAL; 2011 break; 2012 } 2013 2014unlock: 2015 spin_unlock(&br->multicast_lock); 2016 2017 return err; 2018} 2019 2020static void br_multicast_start_querier(struct net_bridge *br, 2021 struct bridge_mcast_own_query *query) 2022{ 2023 struct net_bridge_port *port; 2024 2025 __br_multicast_open(br, query); 2026 2027 list_for_each_entry(port, &br->port_list, list) { 2028 if (port->state == BR_STATE_DISABLED || 2029 port->state == BR_STATE_BLOCKING) 2030 continue; 2031 2032 if (query == &br->ip4_own_query) 2033 br_multicast_enable(&port->ip4_own_query); 2034#if IS_ENABLED(CONFIG_IPV6) 2035 else 2036 br_multicast_enable(&port->ip6_own_query); 2037#endif 2038 } 2039} 2040 2041int br_multicast_toggle(struct net_bridge *br, unsigned long val) 2042{ 2043 int err = 0; 2044 struct net_bridge_mdb_htable *mdb; 2045 2046 spin_lock_bh(&br->multicast_lock); 2047 if (br->multicast_disabled == !val) 2048 goto unlock; 2049 2050 br->multicast_disabled = !val; 2051 if (br->multicast_disabled) 2052 goto unlock; 2053 2054 if (!netif_running(br->dev)) 2055 goto unlock; 2056 2057 mdb = mlock_dereference(br->mdb, br); 2058 if (mdb) { 2059 if (mdb->old) { 2060 err = -EEXIST; 2061rollback: 2062 br->multicast_disabled = !!val; 2063 goto unlock; 2064 } 2065 2066 err = br_mdb_rehash(&br->mdb, mdb->max, 2067 br->hash_elasticity); 2068 if (err) 2069 goto rollback; 2070 } 2071 2072 br_multicast_start_querier(br, &br->ip4_own_query); 2073#if IS_ENABLED(CONFIG_IPV6) 2074 br_multicast_start_querier(br, &br->ip6_own_query); 2075#endif 2076 2077unlock: 2078 spin_unlock_bh(&br->multicast_lock); 2079 2080 return err; 2081} 2082 2083int br_multicast_set_querier(struct net_bridge *br, unsigned long val) 2084{ 2085 unsigned long max_delay; 2086 2087 val = !!val; 2088 2089 spin_lock_bh(&br->multicast_lock); 2090 if (br->multicast_querier == val) 2091 goto unlock; 2092 2093 br->multicast_querier = val; 2094 if (!val) 2095 goto unlock; 2096 2097 max_delay = br->multicast_query_response_interval; 2098 2099 if (!timer_pending(&br->ip4_other_query.timer)) 2100 br->ip4_other_query.delay_time = jiffies + max_delay; 2101 2102 br_multicast_start_querier(br, &br->ip4_own_query); 2103 2104#if IS_ENABLED(CONFIG_IPV6) 2105 if (!timer_pending(&br->ip6_other_query.timer)) 2106 br->ip6_other_query.delay_time = jiffies + max_delay; 2107 2108 br_multicast_start_querier(br, &br->ip6_own_query); 2109#endif 2110 2111unlock: 2112 spin_unlock_bh(&br->multicast_lock); 2113 2114 return 0; 2115} 2116 2117int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val) 2118{ 2119 int err = -ENOENT; 2120 u32 old; 2121 struct net_bridge_mdb_htable *mdb; 2122 2123 spin_lock_bh(&br->multicast_lock); 2124 if (!netif_running(br->dev)) 2125 goto unlock; 2126 2127 err = -EINVAL; 2128 if (!is_power_of_2(val)) 2129 goto unlock; 2130 2131 mdb = mlock_dereference(br->mdb, br); 2132 if (mdb && val < mdb->size) 2133 goto unlock; 2134 2135 err = 0; 2136 2137 old = br->hash_max; 2138 br->hash_max = val; 2139 2140 if (mdb) { 2141 if (mdb->old) { 2142 err = -EEXIST; 2143rollback: 2144 br->hash_max = old; 2145 goto unlock; 2146 } 2147 2148 err = br_mdb_rehash(&br->mdb, br->hash_max, 2149 br->hash_elasticity); 2150 if (err) 2151 goto rollback; 2152 } 2153 2154unlock: 2155 spin_unlock_bh(&br->multicast_lock); 2156 2157 return err; 2158} 2159 2160/** 2161 * br_multicast_list_adjacent - Returns snooped multicast addresses 2162 * @dev: The bridge port adjacent to which to retrieve addresses 2163 * @br_ip_list: The list to store found, snooped multicast IP addresses in 2164 * 2165 * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast 2166 * snooping feature on all bridge ports of dev's bridge device, excluding 2167 * the addresses from dev itself. 2168 * 2169 * Returns the number of items added to br_ip_list. 2170 * 2171 * Notes: 2172 * - br_ip_list needs to be initialized by caller 2173 * - br_ip_list might contain duplicates in the end 2174 * (needs to be taken care of by caller) 2175 * - br_ip_list needs to be freed by caller 2176 */ 2177int br_multicast_list_adjacent(struct net_device *dev, 2178 struct list_head *br_ip_list) 2179{ 2180 struct net_bridge *br; 2181 struct net_bridge_port *port; 2182 struct net_bridge_port_group *group; 2183 struct br_ip_list *entry; 2184 int count = 0; 2185 2186 rcu_read_lock(); 2187 if (!br_ip_list || !br_port_exists(dev)) 2188 goto unlock; 2189 2190 port = br_port_get_rcu(dev); 2191 if (!port || !port->br) 2192 goto unlock; 2193 2194 br = port->br; 2195 2196 list_for_each_entry_rcu(port, &br->port_list, list) { 2197 if (!port->dev || port->dev == dev) 2198 continue; 2199 2200 hlist_for_each_entry_rcu(group, &port->mglist, mglist) { 2201 entry = kmalloc(sizeof(*entry), GFP_ATOMIC); 2202 if (!entry) 2203 goto unlock; 2204 2205 entry->addr = group->addr; 2206 list_add(&entry->list, br_ip_list); 2207 count++; 2208 } 2209 } 2210 2211unlock: 2212 rcu_read_unlock(); 2213 return count; 2214} 2215EXPORT_SYMBOL_GPL(br_multicast_list_adjacent); 2216 2217/** 2218 * br_multicast_has_querier_anywhere - Checks for a querier on a bridge 2219 * @dev: The bridge port providing the bridge on which to check for a querier 2220 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 2221 * 2222 * Checks whether the given interface has a bridge on top and if so returns 2223 * true if a valid querier exists anywhere on the bridged link layer. 2224 * Otherwise returns false. 2225 */ 2226bool br_multicast_has_querier_anywhere(struct net_device *dev, int proto) 2227{ 2228 struct net_bridge *br; 2229 struct net_bridge_port *port; 2230 struct ethhdr eth; 2231 bool ret = false; 2232 2233 rcu_read_lock(); 2234 if (!br_port_exists(dev)) 2235 goto unlock; 2236 2237 port = br_port_get_rcu(dev); 2238 if (!port || !port->br) 2239 goto unlock; 2240 2241 br = port->br; 2242 2243 memset(ð, 0, sizeof(eth)); 2244 eth.h_proto = htons(proto); 2245 2246 ret = br_multicast_querier_exists(br, ð); 2247 2248unlock: 2249 rcu_read_unlock(); 2250 return ret; 2251} 2252EXPORT_SYMBOL_GPL(br_multicast_has_querier_anywhere); 2253 2254/** 2255 * br_multicast_has_querier_adjacent - Checks for a querier behind a bridge port 2256 * @dev: The bridge port adjacent to which to check for a querier 2257 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6 2258 * 2259 * Checks whether the given interface has a bridge on top and if so returns 2260 * true if a selected querier is behind one of the other ports of this 2261 * bridge. Otherwise returns false. 2262 */ 2263bool br_multicast_has_querier_adjacent(struct net_device *dev, int proto) 2264{ 2265 struct net_bridge *br; 2266 struct net_bridge_port *port; 2267 bool ret = false; 2268 2269 rcu_read_lock(); 2270 if (!br_port_exists(dev)) 2271 goto unlock; 2272 2273 port = br_port_get_rcu(dev); 2274 if (!port || !port->br) 2275 goto unlock; 2276 2277 br = port->br; 2278 2279 switch (proto) { 2280 case ETH_P_IP: 2281 if (!timer_pending(&br->ip4_other_query.timer) || 2282 rcu_dereference(br->ip4_querier.port) == port) 2283 goto unlock; 2284 break; 2285#if IS_ENABLED(CONFIG_IPV6) 2286 case ETH_P_IPV6: 2287 if (!timer_pending(&br->ip6_other_query.timer) || 2288 rcu_dereference(br->ip6_querier.port) == port) 2289 goto unlock; 2290 break; 2291#endif 2292 default: 2293 goto unlock; 2294 } 2295 2296 ret = true; 2297unlock: 2298 rcu_read_unlock(); 2299 return ret; 2300} 2301EXPORT_SYMBOL_GPL(br_multicast_has_querier_adjacent); 2302