hc
2023-12-11 d2ccde1c8e90d38cee87a1b0309ad2827f3fd30d
kernel/net/bridge/br_multicast.c
....@@ -1,19 +1,15 @@
1
+// SPDX-License-Identifier: GPL-2.0-or-later
12 /*
23 * Bridge multicast support.
34 *
45 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
5
- *
6
- * This program is free software; you can redistribute it and/or modify it
7
- * under the terms of the GNU General Public License as published by the Free
8
- * Software Foundation; either version 2 of the License, or (at your option)
9
- * any later version.
10
- *
116 */
127
138 #include <linux/err.h>
149 #include <linux/export.h>
1510 #include <linux/if_ether.h>
1611 #include <linux/igmp.h>
12
+#include <linux/in.h>
1713 #include <linux/jhash.h>
1814 #include <linux/kernel.h>
1915 #include <linux/log2.h>
....@@ -29,6 +25,7 @@
2925 #include <net/ip.h>
3026 #include <net/switchdev.h>
3127 #if IS_ENABLED(CONFIG_IPV6)
28
+#include <linux/icmpv6.h>
3229 #include <net/ipv6.h>
3330 #include <net/mld.h>
3431 #include <net/ip6_checksum.h>
....@@ -36,6 +33,20 @@
3633 #endif
3734
3835 #include "br_private.h"
36
+
37
+static const struct rhashtable_params br_mdb_rht_params = {
38
+ .head_offset = offsetof(struct net_bridge_mdb_entry, rhnode),
39
+ .key_offset = offsetof(struct net_bridge_mdb_entry, addr),
40
+ .key_len = sizeof(struct br_ip),
41
+ .automatic_shrinking = true,
42
+};
43
+
44
+static const struct rhashtable_params br_sg_port_rht_params = {
45
+ .head_offset = offsetof(struct net_bridge_port_group, rhnode),
46
+ .key_offset = offsetof(struct net_bridge_port_group, key),
47
+ .key_len = sizeof(struct net_bridge_port_group_sg_key),
48
+ .automatic_shrinking = true,
49
+};
3950
4051 static void br_multicast_start_querier(struct net_bridge *br,
4152 struct bridge_mcast_own_query *query);
....@@ -46,6 +57,7 @@
4657 __be32 group,
4758 __u16 vid,
4859 const unsigned char *src);
60
+static void br_multicast_port_group_rexmit(struct timer_list *t);
4961
5062 static void __del_port_router(struct net_bridge_port *p);
5163 #if IS_ENABLED(CONFIG_IPV6)
....@@ -54,229 +66,557 @@
5466 const struct in6_addr *group,
5567 __u16 vid, const unsigned char *src);
5668 #endif
57
-unsigned int br_mdb_rehash_seq;
69
+static struct net_bridge_port_group *
70
+__br_multicast_add_group(struct net_bridge *br,
71
+ struct net_bridge_port *port,
72
+ struct br_ip *group,
73
+ const unsigned char *src,
74
+ u8 filter_mode,
75
+ bool igmpv2_mldv1,
76
+ bool blocked);
77
+static void br_multicast_find_del_pg(struct net_bridge *br,
78
+ struct net_bridge_port_group *pg);
5879
59
-static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
80
+static struct net_bridge_port_group *
81
+br_sg_port_find(struct net_bridge *br,
82
+ struct net_bridge_port_group_sg_key *sg_p)
6083 {
61
- if (a->proto != b->proto)
62
- return 0;
63
- if (a->vid != b->vid)
64
- return 0;
65
- switch (a->proto) {
66
- case htons(ETH_P_IP):
67
- return a->u.ip4 == b->u.ip4;
68
-#if IS_ENABLED(CONFIG_IPV6)
69
- case htons(ETH_P_IPV6):
70
- return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);
71
-#endif
72
- }
73
- return 0;
84
+ lockdep_assert_held_once(&br->multicast_lock);
85
+
86
+ return rhashtable_lookup_fast(&br->sg_port_tbl, sg_p,
87
+ br_sg_port_rht_params);
7488 }
7589
76
-static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip,
77
- __u16 vid)
90
+static struct net_bridge_mdb_entry *br_mdb_ip_get_rcu(struct net_bridge *br,
91
+ struct br_ip *dst)
7892 {
79
- return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1);
93
+ return rhashtable_lookup(&br->mdb_hash_tbl, dst, br_mdb_rht_params);
8094 }
8195
82
-#if IS_ENABLED(CONFIG_IPV6)
83
-static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
84
- const struct in6_addr *ip,
85
- __u16 vid)
86
-{
87
- return jhash_2words(ipv6_addr_hash(ip), vid,
88
- mdb->secret) & (mdb->max - 1);
89
-}
90
-#endif
91
-
92
-static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
93
- struct br_ip *ip)
94
-{
95
- switch (ip->proto) {
96
- case htons(ETH_P_IP):
97
- return __br_ip4_hash(mdb, ip->u.ip4, ip->vid);
98
-#if IS_ENABLED(CONFIG_IPV6)
99
- case htons(ETH_P_IPV6):
100
- return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid);
101
-#endif
102
- }
103
- return 0;
104
-}
105
-
106
-static struct net_bridge_mdb_entry *__br_mdb_ip_get(
107
- struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash)
108
-{
109
- struct net_bridge_mdb_entry *mp;
110
-
111
- hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
112
- if (br_ip_equal(&mp->addr, dst))
113
- return mp;
114
- }
115
-
116
- return NULL;
117
-}
118
-
119
-struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb,
96
+struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge *br,
12097 struct br_ip *dst)
12198 {
122
- if (!mdb)
123
- return NULL;
99
+ struct net_bridge_mdb_entry *ent;
124100
125
- return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
101
+ lockdep_assert_held_once(&br->multicast_lock);
102
+
103
+ rcu_read_lock();
104
+ ent = rhashtable_lookup(&br->mdb_hash_tbl, dst, br_mdb_rht_params);
105
+ rcu_read_unlock();
106
+
107
+ return ent;
126108 }
127109
128
-static struct net_bridge_mdb_entry *br_mdb_ip4_get(
129
- struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid)
110
+static struct net_bridge_mdb_entry *br_mdb_ip4_get(struct net_bridge *br,
111
+ __be32 dst, __u16 vid)
130112 {
131113 struct br_ip br_dst;
132114
133
- br_dst.u.ip4 = dst;
115
+ memset(&br_dst, 0, sizeof(br_dst));
116
+ br_dst.dst.ip4 = dst;
134117 br_dst.proto = htons(ETH_P_IP);
135118 br_dst.vid = vid;
136119
137
- return br_mdb_ip_get(mdb, &br_dst);
120
+ return br_mdb_ip_get(br, &br_dst);
138121 }
139122
140123 #if IS_ENABLED(CONFIG_IPV6)
141
-static struct net_bridge_mdb_entry *br_mdb_ip6_get(
142
- struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
143
- __u16 vid)
124
+static struct net_bridge_mdb_entry *br_mdb_ip6_get(struct net_bridge *br,
125
+ const struct in6_addr *dst,
126
+ __u16 vid)
144127 {
145128 struct br_ip br_dst;
146129
147
- br_dst.u.ip6 = *dst;
130
+ memset(&br_dst, 0, sizeof(br_dst));
131
+ br_dst.dst.ip6 = *dst;
148132 br_dst.proto = htons(ETH_P_IPV6);
149133 br_dst.vid = vid;
150134
151
- return br_mdb_ip_get(mdb, &br_dst);
135
+ return br_mdb_ip_get(br, &br_dst);
152136 }
153137 #endif
154138
155139 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
156140 struct sk_buff *skb, u16 vid)
157141 {
158
- struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
159142 struct br_ip ip;
160143
161
- if (br->multicast_disabled)
144
+ if (!br_opt_get(br, BROPT_MULTICAST_ENABLED))
162145 return NULL;
163146
164147 if (BR_INPUT_SKB_CB(skb)->igmp)
165148 return NULL;
166149
150
+ memset(&ip, 0, sizeof(ip));
167151 ip.proto = skb->protocol;
168152 ip.vid = vid;
169153
170154 switch (skb->protocol) {
171155 case htons(ETH_P_IP):
172
- ip.u.ip4 = ip_hdr(skb)->daddr;
156
+ ip.dst.ip4 = ip_hdr(skb)->daddr;
157
+ if (br->multicast_igmp_version == 3) {
158
+ struct net_bridge_mdb_entry *mdb;
159
+
160
+ ip.src.ip4 = ip_hdr(skb)->saddr;
161
+ mdb = br_mdb_ip_get_rcu(br, &ip);
162
+ if (mdb)
163
+ return mdb;
164
+ ip.src.ip4 = 0;
165
+ }
173166 break;
174167 #if IS_ENABLED(CONFIG_IPV6)
175168 case htons(ETH_P_IPV6):
176
- ip.u.ip6 = ipv6_hdr(skb)->daddr;
169
+ ip.dst.ip6 = ipv6_hdr(skb)->daddr;
170
+ if (br->multicast_mld_version == 2) {
171
+ struct net_bridge_mdb_entry *mdb;
172
+
173
+ ip.src.ip6 = ipv6_hdr(skb)->saddr;
174
+ mdb = br_mdb_ip_get_rcu(br, &ip);
175
+ if (mdb)
176
+ return mdb;
177
+ memset(&ip.src.ip6, 0, sizeof(ip.src.ip6));
178
+ }
177179 break;
178180 #endif
179181 default:
180182 return NULL;
181183 }
182184
183
- return br_mdb_ip_get(mdb, &ip);
185
+ return br_mdb_ip_get_rcu(br, &ip);
184186 }
185187
186
-static void br_mdb_free(struct rcu_head *head)
188
+static bool br_port_group_equal(struct net_bridge_port_group *p,
189
+ struct net_bridge_port *port,
190
+ const unsigned char *src)
187191 {
188
- struct net_bridge_mdb_htable *mdb =
189
- container_of(head, struct net_bridge_mdb_htable, rcu);
190
- struct net_bridge_mdb_htable *old = mdb->old;
192
+ if (p->key.port != port)
193
+ return false;
191194
192
- mdb->old = NULL;
193
- kfree(old->mhash);
194
- kfree(old);
195
+ if (!(port->flags & BR_MULTICAST_TO_UNICAST))
196
+ return true;
197
+
198
+ return ether_addr_equal(src, p->eth_addr);
195199 }
196200
197
-static int br_mdb_copy(struct net_bridge_mdb_htable *new,
198
- struct net_bridge_mdb_htable *old,
199
- int elasticity)
201
+static void __fwd_add_star_excl(struct net_bridge_port_group *pg,
202
+ struct br_ip *sg_ip)
203
+{
204
+ struct net_bridge_port_group_sg_key sg_key;
205
+ struct net_bridge *br = pg->key.port->br;
206
+ struct net_bridge_port_group *src_pg;
207
+
208
+ memset(&sg_key, 0, sizeof(sg_key));
209
+ sg_key.port = pg->key.port;
210
+ sg_key.addr = *sg_ip;
211
+ if (br_sg_port_find(br, &sg_key))
212
+ return;
213
+
214
+ src_pg = __br_multicast_add_group(br, pg->key.port, sg_ip, pg->eth_addr,
215
+ MCAST_INCLUDE, false, false);
216
+ if (IS_ERR_OR_NULL(src_pg) ||
217
+ src_pg->rt_protocol != RTPROT_KERNEL)
218
+ return;
219
+
220
+ src_pg->flags |= MDB_PG_FLAGS_STAR_EXCL;
221
+}
222
+
223
+static void __fwd_del_star_excl(struct net_bridge_port_group *pg,
224
+ struct br_ip *sg_ip)
225
+{
226
+ struct net_bridge_port_group_sg_key sg_key;
227
+ struct net_bridge *br = pg->key.port->br;
228
+ struct net_bridge_port_group *src_pg;
229
+
230
+ memset(&sg_key, 0, sizeof(sg_key));
231
+ sg_key.port = pg->key.port;
232
+ sg_key.addr = *sg_ip;
233
+ src_pg = br_sg_port_find(br, &sg_key);
234
+ if (!src_pg || !(src_pg->flags & MDB_PG_FLAGS_STAR_EXCL) ||
235
+ src_pg->rt_protocol != RTPROT_KERNEL)
236
+ return;
237
+
238
+ br_multicast_find_del_pg(br, src_pg);
239
+}
240
+
241
+/* When a port group transitions to (or is added as) EXCLUDE we need to add it
242
+ * to all other ports' S,G entries which are not blocked by the current group
243
+ * for proper replication, the assumption is that any S,G blocked entries
244
+ * are already added so the S,G,port lookup should skip them.
245
+ * When a port group transitions from EXCLUDE -> INCLUDE mode or is being
246
+ * deleted we need to remove it from all ports' S,G entries where it was
247
+ * automatically installed before (i.e. where it's MDB_PG_FLAGS_STAR_EXCL).
248
+ */
249
+void br_multicast_star_g_handle_mode(struct net_bridge_port_group *pg,
250
+ u8 filter_mode)
251
+{
252
+ struct net_bridge *br = pg->key.port->br;
253
+ struct net_bridge_port_group *pg_lst;
254
+ struct net_bridge_mdb_entry *mp;
255
+ struct br_ip sg_ip;
256
+
257
+ if (WARN_ON(!br_multicast_is_star_g(&pg->key.addr)))
258
+ return;
259
+
260
+ mp = br_mdb_ip_get(br, &pg->key.addr);
261
+ if (!mp)
262
+ return;
263
+
264
+ memset(&sg_ip, 0, sizeof(sg_ip));
265
+ sg_ip = pg->key.addr;
266
+ for (pg_lst = mlock_dereference(mp->ports, br);
267
+ pg_lst;
268
+ pg_lst = mlock_dereference(pg_lst->next, br)) {
269
+ struct net_bridge_group_src *src_ent;
270
+
271
+ if (pg_lst == pg)
272
+ continue;
273
+ hlist_for_each_entry(src_ent, &pg_lst->src_list, node) {
274
+ if (!(src_ent->flags & BR_SGRP_F_INSTALLED))
275
+ continue;
276
+ sg_ip.src = src_ent->addr.src;
277
+ switch (filter_mode) {
278
+ case MCAST_INCLUDE:
279
+ __fwd_del_star_excl(pg, &sg_ip);
280
+ break;
281
+ case MCAST_EXCLUDE:
282
+ __fwd_add_star_excl(pg, &sg_ip);
283
+ break;
284
+ }
285
+ }
286
+ }
287
+}
288
+
289
+/* called when adding a new S,G with host_joined == false by default */
290
+static void br_multicast_sg_host_state(struct net_bridge_mdb_entry *star_mp,
291
+ struct net_bridge_port_group *sg)
292
+{
293
+ struct net_bridge_mdb_entry *sg_mp;
294
+
295
+ if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr)))
296
+ return;
297
+ if (!star_mp->host_joined)
298
+ return;
299
+
300
+ sg_mp = br_mdb_ip_get(star_mp->br, &sg->key.addr);
301
+ if (!sg_mp)
302
+ return;
303
+ sg_mp->host_joined = true;
304
+}
305
+
306
+/* set the host_joined state of all of *,G's S,G entries */
307
+static void br_multicast_star_g_host_state(struct net_bridge_mdb_entry *star_mp)
308
+{
309
+ struct net_bridge *br = star_mp->br;
310
+ struct net_bridge_mdb_entry *sg_mp;
311
+ struct net_bridge_port_group *pg;
312
+ struct br_ip sg_ip;
313
+
314
+ if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr)))
315
+ return;
316
+
317
+ memset(&sg_ip, 0, sizeof(sg_ip));
318
+ sg_ip = star_mp->addr;
319
+ for (pg = mlock_dereference(star_mp->ports, br);
320
+ pg;
321
+ pg = mlock_dereference(pg->next, br)) {
322
+ struct net_bridge_group_src *src_ent;
323
+
324
+ hlist_for_each_entry(src_ent, &pg->src_list, node) {
325
+ if (!(src_ent->flags & BR_SGRP_F_INSTALLED))
326
+ continue;
327
+ sg_ip.src = src_ent->addr.src;
328
+ sg_mp = br_mdb_ip_get(br, &sg_ip);
329
+ if (!sg_mp)
330
+ continue;
331
+ sg_mp->host_joined = star_mp->host_joined;
332
+ }
333
+ }
334
+}
335
+
336
+static void br_multicast_sg_del_exclude_ports(struct net_bridge_mdb_entry *sgmp)
337
+{
338
+ struct net_bridge_port_group __rcu **pp;
339
+ struct net_bridge_port_group *p;
340
+
341
+ /* *,G exclude ports are only added to S,G entries */
342
+ if (WARN_ON(br_multicast_is_star_g(&sgmp->addr)))
343
+ return;
344
+
345
+ /* we need the STAR_EXCLUDE ports if there are non-STAR_EXCLUDE ports
346
+ * we should ignore perm entries since they're managed by user-space
347
+ */
348
+ for (pp = &sgmp->ports;
349
+ (p = mlock_dereference(*pp, sgmp->br)) != NULL;
350
+ pp = &p->next)
351
+ if (!(p->flags & (MDB_PG_FLAGS_STAR_EXCL |
352
+ MDB_PG_FLAGS_PERMANENT)))
353
+ return;
354
+
355
+ /* currently the host can only have joined the *,G which means
356
+ * we treat it as EXCLUDE {}, so for an S,G it's considered a
357
+ * STAR_EXCLUDE entry and we can safely leave it
358
+ */
359
+ sgmp->host_joined = false;
360
+
361
+ for (pp = &sgmp->ports;
362
+ (p = mlock_dereference(*pp, sgmp->br)) != NULL;) {
363
+ if (!(p->flags & MDB_PG_FLAGS_PERMANENT))
364
+ br_multicast_del_pg(sgmp, p, pp);
365
+ else
366
+ pp = &p->next;
367
+ }
368
+}
369
+
370
+void br_multicast_sg_add_exclude_ports(struct net_bridge_mdb_entry *star_mp,
371
+ struct net_bridge_port_group *sg)
372
+{
373
+ struct net_bridge_port_group_sg_key sg_key;
374
+ struct net_bridge *br = star_mp->br;
375
+ struct net_bridge_port_group *pg;
376
+
377
+ if (WARN_ON(br_multicast_is_star_g(&sg->key.addr)))
378
+ return;
379
+ if (WARN_ON(!br_multicast_is_star_g(&star_mp->addr)))
380
+ return;
381
+
382
+ br_multicast_sg_host_state(star_mp, sg);
383
+ memset(&sg_key, 0, sizeof(sg_key));
384
+ sg_key.addr = sg->key.addr;
385
+ /* we need to add all exclude ports to the S,G */
386
+ for (pg = mlock_dereference(star_mp->ports, br);
387
+ pg;
388
+ pg = mlock_dereference(pg->next, br)) {
389
+ struct net_bridge_port_group *src_pg;
390
+
391
+ if (pg == sg || pg->filter_mode == MCAST_INCLUDE)
392
+ continue;
393
+
394
+ sg_key.port = pg->key.port;
395
+ if (br_sg_port_find(br, &sg_key))
396
+ continue;
397
+
398
+ src_pg = __br_multicast_add_group(br, pg->key.port,
399
+ &sg->key.addr,
400
+ sg->eth_addr,
401
+ MCAST_INCLUDE, false, false);
402
+ if (IS_ERR_OR_NULL(src_pg) ||
403
+ src_pg->rt_protocol != RTPROT_KERNEL)
404
+ continue;
405
+ src_pg->flags |= MDB_PG_FLAGS_STAR_EXCL;
406
+ }
407
+}
408
+
409
+static void br_multicast_fwd_src_add(struct net_bridge_group_src *src)
410
+{
411
+ struct net_bridge_mdb_entry *star_mp;
412
+ struct net_bridge_port_group *sg;
413
+ struct br_ip sg_ip;
414
+
415
+ if (src->flags & BR_SGRP_F_INSTALLED)
416
+ return;
417
+
418
+ memset(&sg_ip, 0, sizeof(sg_ip));
419
+ sg_ip = src->pg->key.addr;
420
+ sg_ip.src = src->addr.src;
421
+ sg = __br_multicast_add_group(src->br, src->pg->key.port, &sg_ip,
422
+ src->pg->eth_addr, MCAST_INCLUDE, false,
423
+ !timer_pending(&src->timer));
424
+ if (IS_ERR_OR_NULL(sg))
425
+ return;
426
+ src->flags |= BR_SGRP_F_INSTALLED;
427
+ sg->flags &= ~MDB_PG_FLAGS_STAR_EXCL;
428
+
429
+ /* if it was added by user-space as perm we can skip next steps */
430
+ if (sg->rt_protocol != RTPROT_KERNEL &&
431
+ (sg->flags & MDB_PG_FLAGS_PERMANENT))
432
+ return;
433
+
434
+ /* the kernel is now responsible for removing this S,G */
435
+ del_timer(&sg->timer);
436
+ star_mp = br_mdb_ip_get(src->br, &src->pg->key.addr);
437
+ if (!star_mp)
438
+ return;
439
+
440
+ br_multicast_sg_add_exclude_ports(star_mp, sg);
441
+}
442
+
443
+static void br_multicast_fwd_src_remove(struct net_bridge_group_src *src)
444
+{
445
+ struct net_bridge_port_group *p, *pg = src->pg;
446
+ struct net_bridge_port_group __rcu **pp;
447
+ struct net_bridge_mdb_entry *mp;
448
+ struct br_ip sg_ip;
449
+
450
+ memset(&sg_ip, 0, sizeof(sg_ip));
451
+ sg_ip = pg->key.addr;
452
+ sg_ip.src = src->addr.src;
453
+
454
+ mp = br_mdb_ip_get(src->br, &sg_ip);
455
+ if (!mp)
456
+ return;
457
+
458
+ for (pp = &mp->ports;
459
+ (p = mlock_dereference(*pp, src->br)) != NULL;
460
+ pp = &p->next) {
461
+ if (!br_port_group_equal(p, pg->key.port, pg->eth_addr))
462
+ continue;
463
+
464
+ if (p->rt_protocol != RTPROT_KERNEL &&
465
+ (p->flags & MDB_PG_FLAGS_PERMANENT))
466
+ break;
467
+
468
+ br_multicast_del_pg(mp, p, pp);
469
+ break;
470
+ }
471
+ src->flags &= ~BR_SGRP_F_INSTALLED;
472
+}
473
+
474
+/* install S,G and based on src's timer enable or disable forwarding */
475
+static void br_multicast_fwd_src_handle(struct net_bridge_group_src *src)
476
+{
477
+ struct net_bridge_port_group_sg_key sg_key;
478
+ struct net_bridge_port_group *sg;
479
+ u8 old_flags;
480
+
481
+ br_multicast_fwd_src_add(src);
482
+
483
+ memset(&sg_key, 0, sizeof(sg_key));
484
+ sg_key.addr = src->pg->key.addr;
485
+ sg_key.addr.src = src->addr.src;
486
+ sg_key.port = src->pg->key.port;
487
+
488
+ sg = br_sg_port_find(src->br, &sg_key);
489
+ if (!sg || (sg->flags & MDB_PG_FLAGS_PERMANENT))
490
+ return;
491
+
492
+ old_flags = sg->flags;
493
+ if (timer_pending(&src->timer))
494
+ sg->flags &= ~MDB_PG_FLAGS_BLOCKED;
495
+ else
496
+ sg->flags |= MDB_PG_FLAGS_BLOCKED;
497
+
498
+ if (old_flags != sg->flags) {
499
+ struct net_bridge_mdb_entry *sg_mp;
500
+
501
+ sg_mp = br_mdb_ip_get(src->br, &sg_key.addr);
502
+ if (!sg_mp)
503
+ return;
504
+ br_mdb_notify(src->br->dev, sg_mp, sg, RTM_NEWMDB);
505
+ }
506
+}
507
+
508
+static void br_multicast_destroy_mdb_entry(struct net_bridge_mcast_gc *gc)
200509 {
201510 struct net_bridge_mdb_entry *mp;
202
- int maxlen;
203
- int len;
204
- int i;
205511
206
- for (i = 0; i < old->max; i++)
207
- hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver])
208
- hlist_add_head(&mp->hlist[new->ver],
209
- &new->mhash[br_ip_hash(new, &mp->addr)]);
512
+ mp = container_of(gc, struct net_bridge_mdb_entry, mcast_gc);
513
+ WARN_ON(!hlist_unhashed(&mp->mdb_node));
514
+ WARN_ON(mp->ports);
210515
211
- if (!elasticity)
212
- return 0;
213
-
214
- maxlen = 0;
215
- for (i = 0; i < new->max; i++) {
216
- len = 0;
217
- hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver])
218
- len++;
219
- if (len > maxlen)
220
- maxlen = len;
221
- }
222
-
223
- return maxlen > elasticity ? -EINVAL : 0;
516
+ del_timer_sync(&mp->timer);
517
+ kfree_rcu(mp, rcu);
224518 }
225519
226
-void br_multicast_free_pg(struct rcu_head *head)
520
+static void br_multicast_del_mdb_entry(struct net_bridge_mdb_entry *mp)
227521 {
228
- struct net_bridge_port_group *p =
229
- container_of(head, struct net_bridge_port_group, rcu);
522
+ struct net_bridge *br = mp->br;
230523
231
- kfree(p);
232
-}
233
-
234
-static void br_multicast_free_group(struct rcu_head *head)
235
-{
236
- struct net_bridge_mdb_entry *mp =
237
- container_of(head, struct net_bridge_mdb_entry, rcu);
238
-
239
- kfree(mp);
524
+ rhashtable_remove_fast(&br->mdb_hash_tbl, &mp->rhnode,
525
+ br_mdb_rht_params);
526
+ hlist_del_init_rcu(&mp->mdb_node);
527
+ hlist_add_head(&mp->mcast_gc.gc_node, &br->mcast_gc_list);
528
+ queue_work(system_long_wq, &br->mcast_gc_work);
240529 }
241530
242531 static void br_multicast_group_expired(struct timer_list *t)
243532 {
244533 struct net_bridge_mdb_entry *mp = from_timer(mp, t, timer);
245534 struct net_bridge *br = mp->br;
246
- struct net_bridge_mdb_htable *mdb;
247535
248536 spin_lock(&br->multicast_lock);
249
- if (!netif_running(br->dev) || timer_pending(&mp->timer))
537
+ if (hlist_unhashed(&mp->mdb_node) || !netif_running(br->dev) ||
538
+ timer_pending(&mp->timer))
250539 goto out;
251540
252
- mp->host_joined = false;
253
- br_mdb_notify(br->dev, NULL, &mp->addr, RTM_DELMDB, 0);
541
+ br_multicast_host_leave(mp, true);
254542
255543 if (mp->ports)
256544 goto out;
257
-
258
- mdb = mlock_dereference(br->mdb, br);
259
-
260
- hlist_del_rcu(&mp->hlist[mdb->ver]);
261
- mdb->size--;
262
-
263
- call_rcu_bh(&mp->rcu, br_multicast_free_group);
264
-
545
+ br_multicast_del_mdb_entry(mp);
265546 out:
266547 spin_unlock(&br->multicast_lock);
267548 }
268549
269
-static void br_multicast_del_pg(struct net_bridge *br,
270
- struct net_bridge_port_group *pg)
550
+static void br_multicast_destroy_group_src(struct net_bridge_mcast_gc *gc)
271551 {
272
- struct net_bridge_mdb_htable *mdb;
552
+ struct net_bridge_group_src *src;
553
+
554
+ src = container_of(gc, struct net_bridge_group_src, mcast_gc);
555
+ WARN_ON(!hlist_unhashed(&src->node));
556
+
557
+ del_timer_sync(&src->timer);
558
+ kfree_rcu(src, rcu);
559
+}
560
+
561
+static void br_multicast_del_group_src(struct net_bridge_group_src *src)
562
+{
563
+ struct net_bridge *br = src->pg->key.port->br;
564
+
565
+ br_multicast_fwd_src_remove(src);
566
+ hlist_del_init_rcu(&src->node);
567
+ src->pg->src_ents--;
568
+ hlist_add_head(&src->mcast_gc.gc_node, &br->mcast_gc_list);
569
+ queue_work(system_long_wq, &br->mcast_gc_work);
570
+}
571
+
572
+static void br_multicast_destroy_port_group(struct net_bridge_mcast_gc *gc)
573
+{
574
+ struct net_bridge_port_group *pg;
575
+
576
+ pg = container_of(gc, struct net_bridge_port_group, mcast_gc);
577
+ WARN_ON(!hlist_unhashed(&pg->mglist));
578
+ WARN_ON(!hlist_empty(&pg->src_list));
579
+
580
+ del_timer_sync(&pg->rexmit_timer);
581
+ del_timer_sync(&pg->timer);
582
+ kfree_rcu(pg, rcu);
583
+}
584
+
585
+void br_multicast_del_pg(struct net_bridge_mdb_entry *mp,
586
+ struct net_bridge_port_group *pg,
587
+ struct net_bridge_port_group __rcu **pp)
588
+{
589
+ struct net_bridge *br = pg->key.port->br;
590
+ struct net_bridge_group_src *ent;
591
+ struct hlist_node *tmp;
592
+
593
+ rcu_assign_pointer(*pp, pg->next);
594
+ hlist_del_init(&pg->mglist);
595
+ hlist_for_each_entry_safe(ent, tmp, &pg->src_list, node)
596
+ br_multicast_del_group_src(ent);
597
+ br_mdb_notify(br->dev, mp, pg, RTM_DELMDB);
598
+ if (!br_multicast_is_star_g(&mp->addr)) {
599
+ rhashtable_remove_fast(&br->sg_port_tbl, &pg->rhnode,
600
+ br_sg_port_rht_params);
601
+ br_multicast_sg_del_exclude_ports(mp);
602
+ } else {
603
+ br_multicast_star_g_handle_mode(pg, MCAST_INCLUDE);
604
+ }
605
+ hlist_add_head(&pg->mcast_gc.gc_node, &br->mcast_gc_list);
606
+ queue_work(system_long_wq, &br->mcast_gc_work);
607
+
608
+ if (!mp->ports && !mp->host_joined && netif_running(br->dev))
609
+ mod_timer(&mp->timer, jiffies);
610
+}
611
+
612
+static void br_multicast_find_del_pg(struct net_bridge *br,
613
+ struct net_bridge_port_group *pg)
614
+{
615
+ struct net_bridge_port_group __rcu **pp;
273616 struct net_bridge_mdb_entry *mp;
274617 struct net_bridge_port_group *p;
275
- struct net_bridge_port_group __rcu **pp;
276618
277
- mdb = mlock_dereference(br->mdb, br);
278
-
279
- mp = br_mdb_ip_get(mdb, &pg->addr);
619
+ mp = br_mdb_ip_get(br, &pg->key.addr);
280620 if (WARN_ON(!mp))
281621 return;
282622
....@@ -286,17 +626,7 @@
286626 if (p != pg)
287627 continue;
288628
289
- rcu_assign_pointer(*pp, p->next);
290
- hlist_del_init(&p->mglist);
291
- del_timer(&p->timer);
292
- br_mdb_notify(br->dev, p->port, &pg->addr, RTM_DELMDB,
293
- p->flags);
294
- call_rcu_bh(&p->rcu, br_multicast_free_pg);
295
-
296
- if (!mp->ports && !mp->host_joined &&
297
- netif_running(br->dev))
298
- mod_timer(&mp->timer, jiffies);
299
-
629
+ br_multicast_del_pg(mp, pg, pp);
300630 return;
301631 }
302632
....@@ -306,82 +636,98 @@
306636 static void br_multicast_port_group_expired(struct timer_list *t)
307637 {
308638 struct net_bridge_port_group *pg = from_timer(pg, t, timer);
309
- struct net_bridge *br = pg->port->br;
639
+ struct net_bridge_group_src *src_ent;
640
+ struct net_bridge *br = pg->key.port->br;
641
+ struct hlist_node *tmp;
642
+ bool changed;
310643
311644 spin_lock(&br->multicast_lock);
312645 if (!netif_running(br->dev) || timer_pending(&pg->timer) ||
313646 hlist_unhashed(&pg->mglist) || pg->flags & MDB_PG_FLAGS_PERMANENT)
314647 goto out;
315648
316
- br_multicast_del_pg(br, pg);
649
+ changed = !!(pg->filter_mode == MCAST_EXCLUDE);
650
+ pg->filter_mode = MCAST_INCLUDE;
651
+ hlist_for_each_entry_safe(src_ent, tmp, &pg->src_list, node) {
652
+ if (!timer_pending(&src_ent->timer)) {
653
+ br_multicast_del_group_src(src_ent);
654
+ changed = true;
655
+ }
656
+ }
317657
658
+ if (hlist_empty(&pg->src_list)) {
659
+ br_multicast_find_del_pg(br, pg);
660
+ } else if (changed) {
661
+ struct net_bridge_mdb_entry *mp = br_mdb_ip_get(br, &pg->key.addr);
662
+
663
+ if (changed && br_multicast_is_star_g(&pg->key.addr))
664
+ br_multicast_star_g_handle_mode(pg, MCAST_INCLUDE);
665
+
666
+ if (WARN_ON(!mp))
667
+ goto out;
668
+ br_mdb_notify(br->dev, mp, pg, RTM_NEWMDB);
669
+ }
318670 out:
319671 spin_unlock(&br->multicast_lock);
320672 }
321673
322
-static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
323
- int elasticity)
674
+static void br_multicast_gc(struct hlist_head *head)
324675 {
325
- struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
326
- struct net_bridge_mdb_htable *mdb;
327
- int err;
676
+ struct net_bridge_mcast_gc *gcent;
677
+ struct hlist_node *tmp;
328678
329
- mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
330
- if (!mdb)
331
- return -ENOMEM;
332
-
333
- mdb->max = max;
334
- mdb->old = old;
335
-
336
- mdb->mhash = kcalloc(max, sizeof(*mdb->mhash), GFP_ATOMIC);
337
- if (!mdb->mhash) {
338
- kfree(mdb);
339
- return -ENOMEM;
679
+ hlist_for_each_entry_safe(gcent, tmp, head, gc_node) {
680
+ hlist_del_init(&gcent->gc_node);
681
+ gcent->destroy(gcent);
340682 }
341
-
342
- mdb->size = old ? old->size : 0;
343
- mdb->ver = old ? old->ver ^ 1 : 0;
344
-
345
- if (!old || elasticity)
346
- get_random_bytes(&mdb->secret, sizeof(mdb->secret));
347
- else
348
- mdb->secret = old->secret;
349
-
350
- if (!old)
351
- goto out;
352
-
353
- err = br_mdb_copy(mdb, old, elasticity);
354
- if (err) {
355
- kfree(mdb->mhash);
356
- kfree(mdb);
357
- return err;
358
- }
359
-
360
- br_mdb_rehash_seq++;
361
- call_rcu_bh(&mdb->rcu, br_mdb_free);
362
-
363
-out:
364
- rcu_assign_pointer(*mdbp, mdb);
365
-
366
- return 0;
367683 }
368684
369685 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
370
- __be32 group,
371
- u8 *igmp_type)
686
+ struct net_bridge_port_group *pg,
687
+ __be32 ip_dst, __be32 group,
688
+ bool with_srcs, bool over_lmqt,
689
+ u8 sflag, u8 *igmp_type,
690
+ bool *need_rexmit)
372691 {
692
+ struct net_bridge_port *p = pg ? pg->key.port : NULL;
693
+ struct net_bridge_group_src *ent;
694
+ size_t pkt_size, igmp_hdr_size;
695
+ unsigned long now = jiffies;
373696 struct igmpv3_query *ihv3;
374
- size_t igmp_hdr_size;
697
+ void *csum_start = NULL;
698
+ __sum16 *csum = NULL;
375699 struct sk_buff *skb;
376700 struct igmphdr *ih;
377701 struct ethhdr *eth;
702
+ unsigned long lmqt;
378703 struct iphdr *iph;
704
+ u16 lmqt_srcs = 0;
379705
380706 igmp_hdr_size = sizeof(*ih);
381
- if (br->multicast_igmp_version == 3)
707
+ if (br->multicast_igmp_version == 3) {
382708 igmp_hdr_size = sizeof(*ihv3);
383
- skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
384
- igmp_hdr_size + 4);
709
+ if (pg && with_srcs) {
710
+ lmqt = now + (br->multicast_last_member_interval *
711
+ br->multicast_last_member_count);
712
+ hlist_for_each_entry(ent, &pg->src_list, node) {
713
+ if (over_lmqt == time_after(ent->timer.expires,
714
+ lmqt) &&
715
+ ent->src_query_rexmit_cnt > 0)
716
+ lmqt_srcs++;
717
+ }
718
+
719
+ if (!lmqt_srcs)
720
+ return NULL;
721
+ igmp_hdr_size += lmqt_srcs * sizeof(__be32);
722
+ }
723
+ }
724
+
725
+ pkt_size = sizeof(*eth) + sizeof(*iph) + 4 + igmp_hdr_size;
726
+ if ((p && pkt_size > p->dev->mtu) ||
727
+ pkt_size > br->dev->mtu)
728
+ return NULL;
729
+
730
+ skb = netdev_alloc_skb_ip_align(br->dev, pkt_size);
385731 if (!skb)
386732 goto out;
387733
....@@ -391,29 +737,24 @@
391737 eth = eth_hdr(skb);
392738
393739 ether_addr_copy(eth->h_source, br->dev->dev_addr);
394
- eth->h_dest[0] = 1;
395
- eth->h_dest[1] = 0;
396
- eth->h_dest[2] = 0x5e;
397
- eth->h_dest[3] = 0;
398
- eth->h_dest[4] = 0;
399
- eth->h_dest[5] = 1;
740
+ ip_eth_mc_map(ip_dst, eth->h_dest);
400741 eth->h_proto = htons(ETH_P_IP);
401742 skb_put(skb, sizeof(*eth));
402743
403744 skb_set_network_header(skb, skb->len);
404745 iph = ip_hdr(skb);
746
+ iph->tot_len = htons(pkt_size - sizeof(*eth));
405747
406748 iph->version = 4;
407749 iph->ihl = 6;
408750 iph->tos = 0xc0;
409
- iph->tot_len = htons(sizeof(*iph) + igmp_hdr_size + 4);
410751 iph->id = 0;
411752 iph->frag_off = htons(IP_DF);
412753 iph->ttl = 1;
413754 iph->protocol = IPPROTO_IGMP;
414
- iph->saddr = br->multicast_query_use_ifaddr ?
755
+ iph->saddr = br_opt_get(br, BROPT_MULTICAST_QUERY_USE_IFADDR) ?
415756 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0;
416
- iph->daddr = htonl(INADDR_ALLHOSTS_GROUP);
757
+ iph->daddr = ip_dst;
417758 ((u8 *)&iph[1])[0] = IPOPT_RA;
418759 ((u8 *)&iph[1])[1] = 4;
419760 ((u8 *)&iph[1])[2] = 0;
....@@ -433,7 +774,8 @@
433774 (HZ / IGMP_TIMER_SCALE);
434775 ih->group = group;
435776 ih->csum = 0;
436
- ih->csum = ip_compute_csum((void *)ih, sizeof(*ih));
777
+ csum = &ih->csum;
778
+ csum_start = (void *)ih;
437779 break;
438780 case 3:
439781 ihv3 = igmpv3_query_hdr(skb);
....@@ -443,15 +785,40 @@
443785 (HZ / IGMP_TIMER_SCALE);
444786 ihv3->group = group;
445787 ihv3->qqic = br->multicast_query_interval / HZ;
446
- ihv3->nsrcs = 0;
788
+ ihv3->nsrcs = htons(lmqt_srcs);
447789 ihv3->resv = 0;
448
- ihv3->suppress = 0;
790
+ ihv3->suppress = sflag;
449791 ihv3->qrv = 2;
450792 ihv3->csum = 0;
451
- ihv3->csum = ip_compute_csum((void *)ihv3, sizeof(*ihv3));
793
+ csum = &ihv3->csum;
794
+ csum_start = (void *)ihv3;
795
+ if (!pg || !with_srcs)
796
+ break;
797
+
798
+ lmqt_srcs = 0;
799
+ hlist_for_each_entry(ent, &pg->src_list, node) {
800
+ if (over_lmqt == time_after(ent->timer.expires,
801
+ lmqt) &&
802
+ ent->src_query_rexmit_cnt > 0) {
803
+ ihv3->srcs[lmqt_srcs++] = ent->addr.src.ip4;
804
+ ent->src_query_rexmit_cnt--;
805
+ if (need_rexmit && ent->src_query_rexmit_cnt)
806
+ *need_rexmit = true;
807
+ }
808
+ }
809
+ if (WARN_ON(lmqt_srcs != ntohs(ihv3->nsrcs))) {
810
+ kfree_skb(skb);
811
+ return NULL;
812
+ }
452813 break;
453814 }
454815
816
+ if (WARN_ON(!csum || !csum_start)) {
817
+ kfree_skb(skb);
818
+ return NULL;
819
+ }
820
+
821
+ *csum = ip_compute_csum(csum_start, igmp_hdr_size);
455822 skb_put(skb, igmp_hdr_size);
456823 __skb_pull(skb, sizeof(*eth));
457824
....@@ -461,23 +828,54 @@
461828
462829 #if IS_ENABLED(CONFIG_IPV6)
463830 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
464
- const struct in6_addr *grp,
465
- u8 *igmp_type)
831
+ struct net_bridge_port_group *pg,
832
+ const struct in6_addr *ip6_dst,
833
+ const struct in6_addr *group,
834
+ bool with_srcs, bool over_llqt,
835
+ u8 sflag, u8 *igmp_type,
836
+ bool *need_rexmit)
466837 {
838
+ struct net_bridge_port *p = pg ? pg->key.port : NULL;
839
+ struct net_bridge_group_src *ent;
840
+ size_t pkt_size, mld_hdr_size;
841
+ unsigned long now = jiffies;
467842 struct mld2_query *mld2q;
843
+ void *csum_start = NULL;
468844 unsigned long interval;
845
+ __sum16 *csum = NULL;
469846 struct ipv6hdr *ip6h;
470847 struct mld_msg *mldq;
471
- size_t mld_hdr_size;
472848 struct sk_buff *skb;
849
+ unsigned long llqt;
473850 struct ethhdr *eth;
851
+ u16 llqt_srcs = 0;
474852 u8 *hopopt;
475853
476854 mld_hdr_size = sizeof(*mldq);
477
- if (br->multicast_mld_version == 2)
855
+ if (br->multicast_mld_version == 2) {
478856 mld_hdr_size = sizeof(*mld2q);
479
- skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
480
- 8 + mld_hdr_size);
857
+ if (pg && with_srcs) {
858
+ llqt = now + (br->multicast_last_member_interval *
859
+ br->multicast_last_member_count);
860
+ hlist_for_each_entry(ent, &pg->src_list, node) {
861
+ if (over_llqt == time_after(ent->timer.expires,
862
+ llqt) &&
863
+ ent->src_query_rexmit_cnt > 0)
864
+ llqt_srcs++;
865
+ }
866
+
867
+ if (!llqt_srcs)
868
+ return NULL;
869
+ mld_hdr_size += llqt_srcs * sizeof(struct in6_addr);
870
+ }
871
+ }
872
+
873
+ pkt_size = sizeof(*eth) + sizeof(*ip6h) + 8 + mld_hdr_size;
874
+ if ((p && pkt_size > p->dev->mtu) ||
875
+ pkt_size > br->dev->mtu)
876
+ return NULL;
877
+
878
+ skb = netdev_alloc_skb_ip_align(br->dev, pkt_size);
481879 if (!skb)
482880 goto out;
483881
....@@ -499,15 +897,15 @@
499897 ip6h->payload_len = htons(8 + mld_hdr_size);
500898 ip6h->nexthdr = IPPROTO_HOPOPTS;
501899 ip6h->hop_limit = 1;
502
- ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1));
900
+ ip6h->daddr = *ip6_dst;
503901 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0,
504902 &ip6h->saddr)) {
505903 kfree_skb(skb);
506
- br->has_ipv6_addr = 0;
904
+ br_opt_toggle(br, BROPT_HAS_IPV6_ADDR, false);
507905 return NULL;
508906 }
509907
510
- br->has_ipv6_addr = 1;
908
+ br_opt_toggle(br, BROPT_HAS_IPV6_ADDR, true);
511909 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest);
512910
513911 hopopt = (u8 *)(ip6h + 1);
....@@ -524,7 +922,7 @@
524922
525923 /* ICMPv6 */
526924 skb_set_transport_header(skb, skb->len);
527
- interval = ipv6_addr_any(grp) ?
925
+ interval = ipv6_addr_any(group) ?
528926 br->multicast_query_response_interval :
529927 br->multicast_last_member_interval;
530928 *igmp_type = ICMPV6_MGM_QUERY;
....@@ -536,12 +934,9 @@
536934 mldq->mld_cksum = 0;
537935 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval));
538936 mldq->mld_reserved = 0;
539
- mldq->mld_mca = *grp;
540
- mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
541
- sizeof(*mldq), IPPROTO_ICMPV6,
542
- csum_partial(mldq,
543
- sizeof(*mldq),
544
- 0));
937
+ mldq->mld_mca = *group;
938
+ csum = &mldq->mld_cksum;
939
+ csum_start = (void *)mldq;
545940 break;
546941 case 2:
547942 mld2q = (struct mld2_query *)icmp6_hdr(skb);
....@@ -551,21 +946,43 @@
551946 mld2q->mld2q_cksum = 0;
552947 mld2q->mld2q_resv1 = 0;
553948 mld2q->mld2q_resv2 = 0;
554
- mld2q->mld2q_suppress = 0;
949
+ mld2q->mld2q_suppress = sflag;
555950 mld2q->mld2q_qrv = 2;
556
- mld2q->mld2q_nsrcs = 0;
951
+ mld2q->mld2q_nsrcs = htons(llqt_srcs);
557952 mld2q->mld2q_qqic = br->multicast_query_interval / HZ;
558
- mld2q->mld2q_mca = *grp;
559
- mld2q->mld2q_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
560
- sizeof(*mld2q),
561
- IPPROTO_ICMPV6,
562
- csum_partial(mld2q,
563
- sizeof(*mld2q),
564
- 0));
953
+ mld2q->mld2q_mca = *group;
954
+ csum = &mld2q->mld2q_cksum;
955
+ csum_start = (void *)mld2q;
956
+ if (!pg || !with_srcs)
957
+ break;
958
+
959
+ llqt_srcs = 0;
960
+ hlist_for_each_entry(ent, &pg->src_list, node) {
961
+ if (over_llqt == time_after(ent->timer.expires,
962
+ llqt) &&
963
+ ent->src_query_rexmit_cnt > 0) {
964
+ mld2q->mld2q_srcs[llqt_srcs++] = ent->addr.src.ip6;
965
+ ent->src_query_rexmit_cnt--;
966
+ if (need_rexmit && ent->src_query_rexmit_cnt)
967
+ *need_rexmit = true;
968
+ }
969
+ }
970
+ if (WARN_ON(llqt_srcs != ntohs(mld2q->mld2q_nsrcs))) {
971
+ kfree_skb(skb);
972
+ return NULL;
973
+ }
565974 break;
566975 }
567
- skb_put(skb, mld_hdr_size);
568976
977
+ if (WARN_ON(!csum || !csum_start)) {
978
+ kfree_skb(skb);
979
+ return NULL;
980
+ }
981
+
982
+ *csum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, mld_hdr_size,
983
+ IPPROTO_ICMPV6,
984
+ csum_partial(csum_start, mld_hdr_size, 0));
985
+ skb_put(skb, mld_hdr_size);
569986 __skb_pull(skb, sizeof(*eth));
570987
571988 out:
....@@ -574,126 +991,57 @@
574991 #endif
575992
576993 static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
577
- struct br_ip *addr,
578
- u8 *igmp_type)
994
+ struct net_bridge_port_group *pg,
995
+ struct br_ip *ip_dst,
996
+ struct br_ip *group,
997
+ bool with_srcs, bool over_lmqt,
998
+ u8 sflag, u8 *igmp_type,
999
+ bool *need_rexmit)
5791000 {
580
- switch (addr->proto) {
1001
+ __be32 ip4_dst;
1002
+
1003
+ switch (group->proto) {
5811004 case htons(ETH_P_IP):
582
- return br_ip4_multicast_alloc_query(br, addr->u.ip4, igmp_type);
1005
+ ip4_dst = ip_dst ? ip_dst->dst.ip4 : htonl(INADDR_ALLHOSTS_GROUP);
1006
+ return br_ip4_multicast_alloc_query(br, pg,
1007
+ ip4_dst, group->dst.ip4,
1008
+ with_srcs, over_lmqt,
1009
+ sflag, igmp_type,
1010
+ need_rexmit);
5831011 #if IS_ENABLED(CONFIG_IPV6)
584
- case htons(ETH_P_IPV6):
585
- return br_ip6_multicast_alloc_query(br, &addr->u.ip6,
586
- igmp_type);
1012
+ case htons(ETH_P_IPV6): {
1013
+ struct in6_addr ip6_dst;
1014
+
1015
+ if (ip_dst)
1016
+ ip6_dst = ip_dst->dst.ip6;
1017
+ else
1018
+ ipv6_addr_set(&ip6_dst, htonl(0xff020000), 0, 0,
1019
+ htonl(1));
1020
+
1021
+ return br_ip6_multicast_alloc_query(br, pg,
1022
+ &ip6_dst, &group->dst.ip6,
1023
+ with_srcs, over_lmqt,
1024
+ sflag, igmp_type,
1025
+ need_rexmit);
1026
+ }
5871027 #endif
5881028 }
5891029 return NULL;
5901030 }
5911031
592
-static struct net_bridge_mdb_entry *br_multicast_get_group(
593
- struct net_bridge *br, struct net_bridge_port *port,
594
- struct br_ip *group, int hash)
595
-{
596
- struct net_bridge_mdb_htable *mdb;
597
- struct net_bridge_mdb_entry *mp;
598
- unsigned int count = 0;
599
- unsigned int max;
600
- int elasticity;
601
- int err;
602
-
603
- mdb = rcu_dereference_protected(br->mdb, 1);
604
- hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
605
- count++;
606
- if (unlikely(br_ip_equal(group, &mp->addr)))
607
- return mp;
608
- }
609
-
610
- elasticity = 0;
611
- max = mdb->max;
612
-
613
- if (unlikely(count > br->hash_elasticity && count)) {
614
- if (net_ratelimit())
615
- br_info(br, "Multicast hash table "
616
- "chain limit reached: %s\n",
617
- port ? port->dev->name : br->dev->name);
618
-
619
- elasticity = br->hash_elasticity;
620
- }
621
-
622
- if (mdb->size >= max) {
623
- max *= 2;
624
- if (unlikely(max > br->hash_max)) {
625
- br_warn(br, "Multicast hash table maximum of %d "
626
- "reached, disabling snooping: %s\n",
627
- br->hash_max,
628
- port ? port->dev->name : br->dev->name);
629
- err = -E2BIG;
630
-disable:
631
- br->multicast_disabled = 1;
632
- goto err;
633
- }
634
- }
635
-
636
- if (max > mdb->max || elasticity) {
637
- if (mdb->old) {
638
- if (net_ratelimit())
639
- br_info(br, "Multicast hash table "
640
- "on fire: %s\n",
641
- port ? port->dev->name : br->dev->name);
642
- err = -EEXIST;
643
- goto err;
644
- }
645
-
646
- err = br_mdb_rehash(&br->mdb, max, elasticity);
647
- if (err) {
648
- br_warn(br, "Cannot rehash multicast "
649
- "hash table, disabling snooping: %s, %d, %d\n",
650
- port ? port->dev->name : br->dev->name,
651
- mdb->size, err);
652
- goto disable;
653
- }
654
-
655
- err = -EAGAIN;
656
- goto err;
657
- }
658
-
659
- return NULL;
660
-
661
-err:
662
- mp = ERR_PTR(err);
663
- return mp;
664
-}
665
-
6661032 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br,
667
- struct net_bridge_port *p,
6681033 struct br_ip *group)
6691034 {
670
- struct net_bridge_mdb_htable *mdb;
6711035 struct net_bridge_mdb_entry *mp;
672
- int hash;
6731036 int err;
6741037
675
- mdb = rcu_dereference_protected(br->mdb, 1);
676
- if (!mdb) {
677
- err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0);
678
- if (err)
679
- return ERR_PTR(err);
680
- goto rehash;
681
- }
1038
+ mp = br_mdb_ip_get(br, group);
1039
+ if (mp)
1040
+ return mp;
6821041
683
- hash = br_ip_hash(mdb, group);
684
- mp = br_multicast_get_group(br, p, group, hash);
685
- switch (PTR_ERR(mp)) {
686
- case 0:
687
- break;
688
-
689
- case -EAGAIN:
690
-rehash:
691
- mdb = rcu_dereference_protected(br->mdb, 1);
692
- hash = br_ip_hash(mdb, group);
693
- break;
694
-
695
- default:
696
- goto out;
1042
+ if (atomic_read(&br->mdb_hash_tbl.nelems) >= br->hash_max) {
1043
+ br_opt_toggle(br, BROPT_MULTICAST_ENABLED, false);
1044
+ return ERR_PTR(-E2BIG);
6971045 }
6981046
6991047 mp = kzalloc(sizeof(*mp), GFP_ATOMIC);
....@@ -702,13 +1050,105 @@
7021050
7031051 mp->br = br;
7041052 mp->addr = *group;
1053
+ mp->mcast_gc.destroy = br_multicast_destroy_mdb_entry;
7051054 timer_setup(&mp->timer, br_multicast_group_expired, 0);
1055
+ err = rhashtable_lookup_insert_fast(&br->mdb_hash_tbl, &mp->rhnode,
1056
+ br_mdb_rht_params);
1057
+ if (err) {
1058
+ kfree(mp);
1059
+ mp = ERR_PTR(err);
1060
+ } else {
1061
+ hlist_add_head_rcu(&mp->mdb_node, &br->mdb_list);
1062
+ }
7061063
707
- hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]);
708
- mdb->size++;
1064
+ return mp;
1065
+}
1066
+
1067
+static void br_multicast_group_src_expired(struct timer_list *t)
1068
+{
1069
+ struct net_bridge_group_src *src = from_timer(src, t, timer);
1070
+ struct net_bridge_port_group *pg;
1071
+ struct net_bridge *br = src->br;
1072
+
1073
+ spin_lock(&br->multicast_lock);
1074
+ if (hlist_unhashed(&src->node) || !netif_running(br->dev) ||
1075
+ timer_pending(&src->timer))
1076
+ goto out;
1077
+
1078
+ pg = src->pg;
1079
+ if (pg->filter_mode == MCAST_INCLUDE) {
1080
+ br_multicast_del_group_src(src);
1081
+ if (!hlist_empty(&pg->src_list))
1082
+ goto out;
1083
+ br_multicast_find_del_pg(br, pg);
1084
+ } else {
1085
+ br_multicast_fwd_src_handle(src);
1086
+ }
7091087
7101088 out:
711
- return mp;
1089
+ spin_unlock(&br->multicast_lock);
1090
+}
1091
+
1092
+static struct net_bridge_group_src *
1093
+br_multicast_find_group_src(struct net_bridge_port_group *pg, struct br_ip *ip)
1094
+{
1095
+ struct net_bridge_group_src *ent;
1096
+
1097
+ switch (ip->proto) {
1098
+ case htons(ETH_P_IP):
1099
+ hlist_for_each_entry(ent, &pg->src_list, node)
1100
+ if (ip->src.ip4 == ent->addr.src.ip4)
1101
+ return ent;
1102
+ break;
1103
+#if IS_ENABLED(CONFIG_IPV6)
1104
+ case htons(ETH_P_IPV6):
1105
+ hlist_for_each_entry(ent, &pg->src_list, node)
1106
+ if (!ipv6_addr_cmp(&ent->addr.src.ip6, &ip->src.ip6))
1107
+ return ent;
1108
+ break;
1109
+#endif
1110
+ }
1111
+
1112
+ return NULL;
1113
+}
1114
+
1115
+static struct net_bridge_group_src *
1116
+br_multicast_new_group_src(struct net_bridge_port_group *pg, struct br_ip *src_ip)
1117
+{
1118
+ struct net_bridge_group_src *grp_src;
1119
+
1120
+ if (unlikely(pg->src_ents >= PG_SRC_ENT_LIMIT))
1121
+ return NULL;
1122
+
1123
+ switch (src_ip->proto) {
1124
+ case htons(ETH_P_IP):
1125
+ if (ipv4_is_zeronet(src_ip->src.ip4) ||
1126
+ ipv4_is_multicast(src_ip->src.ip4))
1127
+ return NULL;
1128
+ break;
1129
+#if IS_ENABLED(CONFIG_IPV6)
1130
+ case htons(ETH_P_IPV6):
1131
+ if (ipv6_addr_any(&src_ip->src.ip6) ||
1132
+ ipv6_addr_is_multicast(&src_ip->src.ip6))
1133
+ return NULL;
1134
+ break;
1135
+#endif
1136
+ }
1137
+
1138
+ grp_src = kzalloc(sizeof(*grp_src), GFP_ATOMIC);
1139
+ if (unlikely(!grp_src))
1140
+ return NULL;
1141
+
1142
+ grp_src->pg = pg;
1143
+ grp_src->br = pg->key.port->br;
1144
+ grp_src->addr = *src_ip;
1145
+ grp_src->mcast_gc.destroy = br_multicast_destroy_group_src;
1146
+ timer_setup(&grp_src->timer, br_multicast_group_src_expired, 0);
1147
+
1148
+ hlist_add_head_rcu(&grp_src->node, &pg->src_list);
1149
+ pg->src_ents++;
1150
+
1151
+ return grp_src;
7121152 }
7131153
7141154 struct net_bridge_port_group *br_multicast_new_port_group(
....@@ -716,7 +1156,9 @@
7161156 struct br_ip *group,
7171157 struct net_bridge_port_group __rcu *next,
7181158 unsigned char flags,
719
- const unsigned char *src)
1159
+ const unsigned char *src,
1160
+ u8 filter_mode,
1161
+ u8 rt_protocol)
7201162 {
7211163 struct net_bridge_port_group *p;
7221164
....@@ -724,61 +1166,82 @@
7241166 if (unlikely(!p))
7251167 return NULL;
7261168
727
- p->addr = *group;
728
- p->port = port;
1169
+ p->key.addr = *group;
1170
+ p->key.port = port;
7291171 p->flags = flags;
1172
+ p->filter_mode = filter_mode;
1173
+ p->rt_protocol = rt_protocol;
1174
+ p->mcast_gc.destroy = br_multicast_destroy_port_group;
1175
+ INIT_HLIST_HEAD(&p->src_list);
1176
+
1177
+ if (!br_multicast_is_star_g(group) &&
1178
+ rhashtable_lookup_insert_fast(&port->br->sg_port_tbl, &p->rhnode,
1179
+ br_sg_port_rht_params)) {
1180
+ kfree(p);
1181
+ return NULL;
1182
+ }
1183
+
7301184 rcu_assign_pointer(p->next, next);
731
- hlist_add_head(&p->mglist, &port->mglist);
7321185 timer_setup(&p->timer, br_multicast_port_group_expired, 0);
1186
+ timer_setup(&p->rexmit_timer, br_multicast_port_group_rexmit, 0);
1187
+ hlist_add_head(&p->mglist, &port->mglist);
7331188
7341189 if (src)
7351190 memcpy(p->eth_addr, src, ETH_ALEN);
7361191 else
737
- memset(p->eth_addr, 0xff, ETH_ALEN);
1192
+ eth_broadcast_addr(p->eth_addr);
7381193
7391194 return p;
7401195 }
7411196
742
-static bool br_port_group_equal(struct net_bridge_port_group *p,
743
- struct net_bridge_port *port,
744
- const unsigned char *src)
1197
+void br_multicast_host_join(struct net_bridge_mdb_entry *mp, bool notify)
7451198 {
746
- if (p->port != port)
747
- return false;
748
-
749
- if (!(port->flags & BR_MULTICAST_TO_UNICAST))
750
- return true;
751
-
752
- return ether_addr_equal(src, p->eth_addr);
1199
+ if (!mp->host_joined) {
1200
+ mp->host_joined = true;
1201
+ if (br_multicast_is_star_g(&mp->addr))
1202
+ br_multicast_star_g_host_state(mp);
1203
+ if (notify)
1204
+ br_mdb_notify(mp->br->dev, mp, NULL, RTM_NEWMDB);
1205
+ }
1206
+ mod_timer(&mp->timer, jiffies + mp->br->multicast_membership_interval);
7531207 }
7541208
755
-static int br_multicast_add_group(struct net_bridge *br,
756
- struct net_bridge_port *port,
757
- struct br_ip *group,
758
- const unsigned char *src)
1209
+void br_multicast_host_leave(struct net_bridge_mdb_entry *mp, bool notify)
1210
+{
1211
+ if (!mp->host_joined)
1212
+ return;
1213
+
1214
+ mp->host_joined = false;
1215
+ if (br_multicast_is_star_g(&mp->addr))
1216
+ br_multicast_star_g_host_state(mp);
1217
+ if (notify)
1218
+ br_mdb_notify(mp->br->dev, mp, NULL, RTM_DELMDB);
1219
+}
1220
+
1221
+static struct net_bridge_port_group *
1222
+__br_multicast_add_group(struct net_bridge *br,
1223
+ struct net_bridge_port *port,
1224
+ struct br_ip *group,
1225
+ const unsigned char *src,
1226
+ u8 filter_mode,
1227
+ bool igmpv2_mldv1,
1228
+ bool blocked)
7591229 {
7601230 struct net_bridge_port_group __rcu **pp;
761
- struct net_bridge_port_group *p;
1231
+ struct net_bridge_port_group *p = NULL;
7621232 struct net_bridge_mdb_entry *mp;
7631233 unsigned long now = jiffies;
764
- int err;
7651234
766
- spin_lock(&br->multicast_lock);
7671235 if (!netif_running(br->dev) ||
7681236 (port && port->state == BR_STATE_DISABLED))
7691237 goto out;
7701238
771
- mp = br_multicast_new_group(br, port, group);
772
- err = PTR_ERR(mp);
1239
+ mp = br_multicast_new_group(br, group);
7731240 if (IS_ERR(mp))
774
- goto err;
1241
+ return ERR_PTR(PTR_ERR(mp));
7751242
7761243 if (!port) {
777
- if (!mp->host_joined) {
778
- mp->host_joined = true;
779
- br_mdb_notify(br->dev, NULL, &mp->addr, RTM_NEWMDB, 0);
780
- }
781
- mod_timer(&mp->timer, now + br->multicast_membership_interval);
1244
+ br_multicast_host_join(mp, true);
7821245 goto out;
7831246 }
7841247
....@@ -787,23 +1250,46 @@
7871250 pp = &p->next) {
7881251 if (br_port_group_equal(p, port, src))
7891252 goto found;
790
- if ((unsigned long)p->port < (unsigned long)port)
1253
+ if ((unsigned long)p->key.port < (unsigned long)port)
7911254 break;
7921255 }
7931256
794
- p = br_multicast_new_port_group(port, group, *pp, 0, src);
795
- if (unlikely(!p))
796
- goto err;
1257
+ p = br_multicast_new_port_group(port, group, *pp, 0, src, filter_mode,
1258
+ RTPROT_KERNEL);
1259
+ if (unlikely(!p)) {
1260
+ p = ERR_PTR(-ENOMEM);
1261
+ goto out;
1262
+ }
7971263 rcu_assign_pointer(*pp, p);
798
- br_mdb_notify(br->dev, port, group, RTM_NEWMDB, 0);
1264
+ if (blocked)
1265
+ p->flags |= MDB_PG_FLAGS_BLOCKED;
1266
+ br_mdb_notify(br->dev, mp, p, RTM_NEWMDB);
7991267
8001268 found:
801
- mod_timer(&p->timer, now + br->multicast_membership_interval);
802
-out:
803
- err = 0;
1269
+ if (igmpv2_mldv1)
1270
+ mod_timer(&p->timer, now + br->multicast_membership_interval);
8041271
805
-err:
1272
+out:
1273
+ return p;
1274
+}
1275
+
1276
+static int br_multicast_add_group(struct net_bridge *br,
1277
+ struct net_bridge_port *port,
1278
+ struct br_ip *group,
1279
+ const unsigned char *src,
1280
+ u8 filter_mode,
1281
+ bool igmpv2_mldv1)
1282
+{
1283
+ struct net_bridge_port_group *pg;
1284
+ int err;
1285
+
1286
+ spin_lock(&br->multicast_lock);
1287
+ pg = __br_multicast_add_group(br, port, group, src, filter_mode,
1288
+ igmpv2_mldv1, false);
1289
+ /* NULL is considered valid for host joined groups */
1290
+ err = IS_ERR(pg) ? PTR_ERR(pg) : 0;
8061291 spin_unlock(&br->multicast_lock);
1292
+
8071293 return err;
8081294 }
8091295
....@@ -811,18 +1297,23 @@
8111297 struct net_bridge_port *port,
8121298 __be32 group,
8131299 __u16 vid,
814
- const unsigned char *src)
1300
+ const unsigned char *src,
1301
+ bool igmpv2)
8151302 {
8161303 struct br_ip br_group;
1304
+ u8 filter_mode;
8171305
8181306 if (ipv4_is_local_multicast(group))
8191307 return 0;
8201308
821
- br_group.u.ip4 = group;
1309
+ memset(&br_group, 0, sizeof(br_group));
1310
+ br_group.dst.ip4 = group;
8221311 br_group.proto = htons(ETH_P_IP);
8231312 br_group.vid = vid;
1313
+ filter_mode = igmpv2 ? MCAST_EXCLUDE : MCAST_INCLUDE;
8241314
825
- return br_multicast_add_group(br, port, &br_group, src);
1315
+ return br_multicast_add_group(br, port, &br_group, src, filter_mode,
1316
+ igmpv2);
8261317 }
8271318
8281319 #if IS_ENABLED(CONFIG_IPV6)
....@@ -830,18 +1321,23 @@
8301321 struct net_bridge_port *port,
8311322 const struct in6_addr *group,
8321323 __u16 vid,
833
- const unsigned char *src)
1324
+ const unsigned char *src,
1325
+ bool mldv1)
8341326 {
8351327 struct br_ip br_group;
1328
+ u8 filter_mode;
8361329
8371330 if (ipv6_addr_is_ll_all_nodes(group))
8381331 return 0;
8391332
840
- br_group.u.ip6 = *group;
1333
+ memset(&br_group, 0, sizeof(br_group));
1334
+ br_group.dst.ip6 = *group;
8411335 br_group.proto = htons(ETH_P_IPV6);
8421336 br_group.vid = vid;
1337
+ filter_mode = mldv1 ? MCAST_EXCLUDE : MCAST_INCLUDE;
8431338
844
- return br_multicast_add_group(br, port, &br_group, src);
1339
+ return br_multicast_add_group(br, port, &br_group, src, filter_mode,
1340
+ mldv1);
8451341 }
8461342 #endif
8471343
....@@ -894,7 +1390,7 @@
8941390 struct bridge_mcast_own_query *query)
8951391 {
8961392 spin_lock(&br->multicast_lock);
897
- if (!netif_running(br->dev) || br->multicast_disabled)
1393
+ if (!netif_running(br->dev) || !br_opt_get(br, BROPT_MULTICAST_ENABLED))
8981394 goto out;
8991395
9001396 br_multicast_start_querier(br, query);
....@@ -924,21 +1420,30 @@
9241420 struct sk_buff *skb)
9251421 {
9261422 if (ip->proto == htons(ETH_P_IP))
927
- br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr;
1423
+ br->ip4_querier.addr.src.ip4 = ip_hdr(skb)->saddr;
9281424 #if IS_ENABLED(CONFIG_IPV6)
9291425 else
930
- br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr;
1426
+ br->ip6_querier.addr.src.ip6 = ipv6_hdr(skb)->saddr;
9311427 #endif
9321428 }
9331429
9341430 static void __br_multicast_send_query(struct net_bridge *br,
9351431 struct net_bridge_port *port,
936
- struct br_ip *ip)
1432
+ struct net_bridge_port_group *pg,
1433
+ struct br_ip *ip_dst,
1434
+ struct br_ip *group,
1435
+ bool with_srcs,
1436
+ u8 sflag,
1437
+ bool *need_rexmit)
9371438 {
1439
+ bool over_lmqt = !!sflag;
9381440 struct sk_buff *skb;
9391441 u8 igmp_type;
9401442
941
- skb = br_multicast_alloc_query(br, ip, &igmp_type);
1443
+again_under_lmqt:
1444
+ skb = br_multicast_alloc_query(br, pg, ip_dst, group, with_srcs,
1445
+ over_lmqt, sflag, &igmp_type,
1446
+ need_rexmit);
9421447 if (!skb)
9431448 return;
9441449
....@@ -949,8 +1454,13 @@
9491454 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT,
9501455 dev_net(port->dev), NULL, skb, NULL, skb->dev,
9511456 br_dev_queue_push_xmit);
1457
+
1458
+ if (over_lmqt && with_srcs && sflag) {
1459
+ over_lmqt = false;
1460
+ goto again_under_lmqt;
1461
+ }
9521462 } else {
953
- br_multicast_select_own_querier(br, ip, skb);
1463
+ br_multicast_select_own_querier(br, group, skb);
9541464 br_multicast_count(br, port, skb, igmp_type,
9551465 BR_MCAST_DIR_RX);
9561466 netif_rx(skb);
....@@ -965,11 +1475,12 @@
9651475 struct br_ip br_group;
9661476 unsigned long time;
9671477
968
- if (!netif_running(br->dev) || br->multicast_disabled ||
969
- !br->multicast_querier)
1478
+ if (!netif_running(br->dev) ||
1479
+ !br_opt_get(br, BROPT_MULTICAST_ENABLED) ||
1480
+ !br_opt_get(br, BROPT_MULTICAST_QUERIER))
9701481 return;
9711482
972
- memset(&br_group.u, 0, sizeof(br_group.u));
1483
+ memset(&br_group.dst, 0, sizeof(br_group.dst));
9731484
9741485 if (port ? (own_query == &port->ip4_own_query) :
9751486 (own_query == &br->ip4_own_query)) {
....@@ -985,7 +1496,8 @@
9851496 if (!other_query || timer_pending(&other_query->timer))
9861497 return;
9871498
988
- __br_multicast_send_query(br, port, &br_group);
1499
+ __br_multicast_send_query(br, port, NULL, NULL, &br_group, false, 0,
1500
+ NULL);
9891501
9901502 time = jiffies;
9911503 time += own_query->startup_sent < br->multicast_startup_query_count ?
....@@ -1030,13 +1542,51 @@
10301542 }
10311543 #endif
10321544
1545
+static void br_multicast_port_group_rexmit(struct timer_list *t)
1546
+{
1547
+ struct net_bridge_port_group *pg = from_timer(pg, t, rexmit_timer);
1548
+ struct bridge_mcast_other_query *other_query = NULL;
1549
+ struct net_bridge *br = pg->key.port->br;
1550
+ bool need_rexmit = false;
1551
+
1552
+ spin_lock(&br->multicast_lock);
1553
+ if (!netif_running(br->dev) || hlist_unhashed(&pg->mglist) ||
1554
+ !br_opt_get(br, BROPT_MULTICAST_ENABLED) ||
1555
+ !br_opt_get(br, BROPT_MULTICAST_QUERIER))
1556
+ goto out;
1557
+
1558
+ if (pg->key.addr.proto == htons(ETH_P_IP))
1559
+ other_query = &br->ip4_other_query;
1560
+#if IS_ENABLED(CONFIG_IPV6)
1561
+ else
1562
+ other_query = &br->ip6_other_query;
1563
+#endif
1564
+
1565
+ if (!other_query || timer_pending(&other_query->timer))
1566
+ goto out;
1567
+
1568
+ if (pg->grp_query_rexmit_cnt) {
1569
+ pg->grp_query_rexmit_cnt--;
1570
+ __br_multicast_send_query(br, pg->key.port, pg, &pg->key.addr,
1571
+ &pg->key.addr, false, 1, NULL);
1572
+ }
1573
+ __br_multicast_send_query(br, pg->key.port, pg, &pg->key.addr,
1574
+ &pg->key.addr, true, 0, &need_rexmit);
1575
+
1576
+ if (pg->grp_query_rexmit_cnt || need_rexmit)
1577
+ mod_timer(&pg->rexmit_timer, jiffies +
1578
+ br->multicast_last_member_interval);
1579
+out:
1580
+ spin_unlock(&br->multicast_lock);
1581
+}
1582
+
10331583 static void br_mc_disabled_update(struct net_device *dev, bool value)
10341584 {
10351585 struct switchdev_attr attr = {
10361586 .orig_dev = dev,
10371587 .id = SWITCHDEV_ATTR_ID_BRIDGE_MC_DISABLED,
10381588 .flags = SWITCHDEV_F_DEFER,
1039
- .u.mc_disabled = value,
1589
+ .u.mc_disabled = !value,
10401590 };
10411591
10421592 switchdev_port_attr_set(dev, &attr);
....@@ -1054,7 +1604,8 @@
10541604 timer_setup(&port->ip6_own_query.timer,
10551605 br_ip6_multicast_port_query_expired, 0);
10561606 #endif
1057
- br_mc_disabled_update(port->dev, port->br->multicast_disabled);
1607
+ br_mc_disabled_update(port->dev,
1608
+ br_opt_get(port->br, BROPT_MULTICAST_ENABLED));
10581609
10591610 port->mcast_stats = netdev_alloc_pcpu_stats(struct bridge_mcast_stats);
10601611 if (!port->mcast_stats)
....@@ -1067,13 +1618,16 @@
10671618 {
10681619 struct net_bridge *br = port->br;
10691620 struct net_bridge_port_group *pg;
1621
+ HLIST_HEAD(deleted_head);
10701622 struct hlist_node *n;
10711623
10721624 /* Take care of the remaining groups, only perm ones should be left */
10731625 spin_lock_bh(&br->multicast_lock);
10741626 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
1075
- br_multicast_del_pg(br, pg);
1627
+ br_multicast_find_del_pg(br, pg);
1628
+ hlist_move_list(&br->mcast_gc_list, &deleted_head);
10761629 spin_unlock_bh(&br->multicast_lock);
1630
+ br_multicast_gc(&deleted_head);
10771631 del_timer_sync(&port->multicast_router_timer);
10781632 free_percpu(port->mcast_stats);
10791633 }
....@@ -1091,7 +1645,7 @@
10911645 {
10921646 struct net_bridge *br = port->br;
10931647
1094
- if (br->multicast_disabled || !netif_running(br->dev))
1648
+ if (!br_opt_get(br, BROPT_MULTICAST_ENABLED) || !netif_running(br->dev))
10951649 return;
10961650
10971651 br_multicast_enable(&port->ip4_own_query);
....@@ -1121,7 +1675,7 @@
11211675 spin_lock(&br->multicast_lock);
11221676 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
11231677 if (!(pg->flags & MDB_PG_FLAGS_PERMANENT))
1124
- br_multicast_del_pg(br, pg);
1678
+ br_multicast_find_del_pg(br, pg);
11251679
11261680 __del_port_router(port);
11271681
....@@ -1133,20 +1687,574 @@
11331687 spin_unlock(&br->multicast_lock);
11341688 }
11351689
1690
+static int __grp_src_delete_marked(struct net_bridge_port_group *pg)
1691
+{
1692
+ struct net_bridge_group_src *ent;
1693
+ struct hlist_node *tmp;
1694
+ int deleted = 0;
1695
+
1696
+ hlist_for_each_entry_safe(ent, tmp, &pg->src_list, node)
1697
+ if (ent->flags & BR_SGRP_F_DELETE) {
1698
+ br_multicast_del_group_src(ent);
1699
+ deleted++;
1700
+ }
1701
+
1702
+ return deleted;
1703
+}
1704
+
1705
+static void __grp_src_mod_timer(struct net_bridge_group_src *src,
1706
+ unsigned long expires)
1707
+{
1708
+ mod_timer(&src->timer, expires);
1709
+ br_multicast_fwd_src_handle(src);
1710
+}
1711
+
1712
+static void __grp_src_query_marked_and_rexmit(struct net_bridge_port_group *pg)
1713
+{
1714
+ struct bridge_mcast_other_query *other_query = NULL;
1715
+ struct net_bridge *br = pg->key.port->br;
1716
+ u32 lmqc = br->multicast_last_member_count;
1717
+ unsigned long lmqt, lmi, now = jiffies;
1718
+ struct net_bridge_group_src *ent;
1719
+
1720
+ if (!netif_running(br->dev) ||
1721
+ !br_opt_get(br, BROPT_MULTICAST_ENABLED))
1722
+ return;
1723
+
1724
+ if (pg->key.addr.proto == htons(ETH_P_IP))
1725
+ other_query = &br->ip4_other_query;
1726
+#if IS_ENABLED(CONFIG_IPV6)
1727
+ else
1728
+ other_query = &br->ip6_other_query;
1729
+#endif
1730
+
1731
+ lmqt = now + br_multicast_lmqt(br);
1732
+ hlist_for_each_entry(ent, &pg->src_list, node) {
1733
+ if (ent->flags & BR_SGRP_F_SEND) {
1734
+ ent->flags &= ~BR_SGRP_F_SEND;
1735
+ if (ent->timer.expires > lmqt) {
1736
+ if (br_opt_get(br, BROPT_MULTICAST_QUERIER) &&
1737
+ other_query &&
1738
+ !timer_pending(&other_query->timer))
1739
+ ent->src_query_rexmit_cnt = lmqc;
1740
+ __grp_src_mod_timer(ent, lmqt);
1741
+ }
1742
+ }
1743
+ }
1744
+
1745
+ if (!br_opt_get(br, BROPT_MULTICAST_QUERIER) ||
1746
+ !other_query || timer_pending(&other_query->timer))
1747
+ return;
1748
+
1749
+ __br_multicast_send_query(br, pg->key.port, pg, &pg->key.addr,
1750
+ &pg->key.addr, true, 1, NULL);
1751
+
1752
+ lmi = now + br->multicast_last_member_interval;
1753
+ if (!timer_pending(&pg->rexmit_timer) ||
1754
+ time_after(pg->rexmit_timer.expires, lmi))
1755
+ mod_timer(&pg->rexmit_timer, lmi);
1756
+}
1757
+
1758
+static void __grp_send_query_and_rexmit(struct net_bridge_port_group *pg)
1759
+{
1760
+ struct bridge_mcast_other_query *other_query = NULL;
1761
+ struct net_bridge *br = pg->key.port->br;
1762
+ unsigned long now = jiffies, lmi;
1763
+
1764
+ if (!netif_running(br->dev) ||
1765
+ !br_opt_get(br, BROPT_MULTICAST_ENABLED))
1766
+ return;
1767
+
1768
+ if (pg->key.addr.proto == htons(ETH_P_IP))
1769
+ other_query = &br->ip4_other_query;
1770
+#if IS_ENABLED(CONFIG_IPV6)
1771
+ else
1772
+ other_query = &br->ip6_other_query;
1773
+#endif
1774
+
1775
+ if (br_opt_get(br, BROPT_MULTICAST_QUERIER) &&
1776
+ other_query && !timer_pending(&other_query->timer)) {
1777
+ lmi = now + br->multicast_last_member_interval;
1778
+ pg->grp_query_rexmit_cnt = br->multicast_last_member_count - 1;
1779
+ __br_multicast_send_query(br, pg->key.port, pg, &pg->key.addr,
1780
+ &pg->key.addr, false, 0, NULL);
1781
+ if (!timer_pending(&pg->rexmit_timer) ||
1782
+ time_after(pg->rexmit_timer.expires, lmi))
1783
+ mod_timer(&pg->rexmit_timer, lmi);
1784
+ }
1785
+
1786
+ if (pg->filter_mode == MCAST_EXCLUDE &&
1787
+ (!timer_pending(&pg->timer) ||
1788
+ time_after(pg->timer.expires, now + br_multicast_lmqt(br))))
1789
+ mod_timer(&pg->timer, now + br_multicast_lmqt(br));
1790
+}
1791
+
1792
+/* State Msg type New state Actions
1793
+ * INCLUDE (A) IS_IN (B) INCLUDE (A+B) (B)=GMI
1794
+ * INCLUDE (A) ALLOW (B) INCLUDE (A+B) (B)=GMI
1795
+ * EXCLUDE (X,Y) ALLOW (A) EXCLUDE (X+A,Y-A) (A)=GMI
1796
+ */
1797
+static bool br_multicast_isinc_allow(struct net_bridge_port_group *pg,
1798
+ void *srcs, u32 nsrcs, size_t src_size)
1799
+{
1800
+ struct net_bridge *br = pg->key.port->br;
1801
+ struct net_bridge_group_src *ent;
1802
+ unsigned long now = jiffies;
1803
+ bool changed = false;
1804
+ struct br_ip src_ip;
1805
+ u32 src_idx;
1806
+
1807
+ memset(&src_ip, 0, sizeof(src_ip));
1808
+ src_ip.proto = pg->key.addr.proto;
1809
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
1810
+ memcpy(&src_ip.src, srcs, src_size);
1811
+ ent = br_multicast_find_group_src(pg, &src_ip);
1812
+ if (!ent) {
1813
+ ent = br_multicast_new_group_src(pg, &src_ip);
1814
+ if (ent)
1815
+ changed = true;
1816
+ }
1817
+
1818
+ if (ent)
1819
+ __grp_src_mod_timer(ent, now + br_multicast_gmi(br));
1820
+ srcs += src_size;
1821
+ }
1822
+
1823
+ return changed;
1824
+}
1825
+
1826
+/* State Msg type New state Actions
1827
+ * INCLUDE (A) IS_EX (B) EXCLUDE (A*B,B-A) (B-A)=0
1828
+ * Delete (A-B)
1829
+ * Group Timer=GMI
1830
+ */
1831
+static void __grp_src_isexc_incl(struct net_bridge_port_group *pg,
1832
+ void *srcs, u32 nsrcs, size_t src_size)
1833
+{
1834
+ struct net_bridge_group_src *ent;
1835
+ struct br_ip src_ip;
1836
+ u32 src_idx;
1837
+
1838
+ hlist_for_each_entry(ent, &pg->src_list, node)
1839
+ ent->flags |= BR_SGRP_F_DELETE;
1840
+
1841
+ memset(&src_ip, 0, sizeof(src_ip));
1842
+ src_ip.proto = pg->key.addr.proto;
1843
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
1844
+ memcpy(&src_ip.src, srcs, src_size);
1845
+ ent = br_multicast_find_group_src(pg, &src_ip);
1846
+ if (ent)
1847
+ ent->flags &= ~BR_SGRP_F_DELETE;
1848
+ else
1849
+ ent = br_multicast_new_group_src(pg, &src_ip);
1850
+ if (ent)
1851
+ br_multicast_fwd_src_handle(ent);
1852
+ srcs += src_size;
1853
+ }
1854
+
1855
+ __grp_src_delete_marked(pg);
1856
+}
1857
+
1858
+/* State Msg type New state Actions
1859
+ * EXCLUDE (X,Y) IS_EX (A) EXCLUDE (A-Y,Y*A) (A-X-Y)=GMI
1860
+ * Delete (X-A)
1861
+ * Delete (Y-A)
1862
+ * Group Timer=GMI
1863
+ */
1864
+static bool __grp_src_isexc_excl(struct net_bridge_port_group *pg,
1865
+ void *srcs, u32 nsrcs, size_t src_size)
1866
+{
1867
+ struct net_bridge *br = pg->key.port->br;
1868
+ struct net_bridge_group_src *ent;
1869
+ unsigned long now = jiffies;
1870
+ bool changed = false;
1871
+ struct br_ip src_ip;
1872
+ u32 src_idx;
1873
+
1874
+ hlist_for_each_entry(ent, &pg->src_list, node)
1875
+ ent->flags |= BR_SGRP_F_DELETE;
1876
+
1877
+ memset(&src_ip, 0, sizeof(src_ip));
1878
+ src_ip.proto = pg->key.addr.proto;
1879
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
1880
+ memcpy(&src_ip.src, srcs, src_size);
1881
+ ent = br_multicast_find_group_src(pg, &src_ip);
1882
+ if (ent) {
1883
+ ent->flags &= ~BR_SGRP_F_DELETE;
1884
+ } else {
1885
+ ent = br_multicast_new_group_src(pg, &src_ip);
1886
+ if (ent) {
1887
+ __grp_src_mod_timer(ent,
1888
+ now + br_multicast_gmi(br));
1889
+ changed = true;
1890
+ }
1891
+ }
1892
+ srcs += src_size;
1893
+ }
1894
+
1895
+ if (__grp_src_delete_marked(pg))
1896
+ changed = true;
1897
+
1898
+ return changed;
1899
+}
1900
+
1901
+static bool br_multicast_isexc(struct net_bridge_port_group *pg,
1902
+ void *srcs, u32 nsrcs, size_t src_size)
1903
+{
1904
+ struct net_bridge *br = pg->key.port->br;
1905
+ bool changed = false;
1906
+
1907
+ switch (pg->filter_mode) {
1908
+ case MCAST_INCLUDE:
1909
+ __grp_src_isexc_incl(pg, srcs, nsrcs, src_size);
1910
+ br_multicast_star_g_handle_mode(pg, MCAST_EXCLUDE);
1911
+ changed = true;
1912
+ break;
1913
+ case MCAST_EXCLUDE:
1914
+ changed = __grp_src_isexc_excl(pg, srcs, nsrcs, src_size);
1915
+ break;
1916
+ }
1917
+
1918
+ pg->filter_mode = MCAST_EXCLUDE;
1919
+ mod_timer(&pg->timer, jiffies + br_multicast_gmi(br));
1920
+
1921
+ return changed;
1922
+}
1923
+
1924
+/* State Msg type New state Actions
1925
+ * INCLUDE (A) TO_IN (B) INCLUDE (A+B) (B)=GMI
1926
+ * Send Q(G,A-B)
1927
+ */
1928
+static bool __grp_src_toin_incl(struct net_bridge_port_group *pg,
1929
+ void *srcs, u32 nsrcs, size_t src_size)
1930
+{
1931
+ struct net_bridge *br = pg->key.port->br;
1932
+ u32 src_idx, to_send = pg->src_ents;
1933
+ struct net_bridge_group_src *ent;
1934
+ unsigned long now = jiffies;
1935
+ bool changed = false;
1936
+ struct br_ip src_ip;
1937
+
1938
+ hlist_for_each_entry(ent, &pg->src_list, node)
1939
+ ent->flags |= BR_SGRP_F_SEND;
1940
+
1941
+ memset(&src_ip, 0, sizeof(src_ip));
1942
+ src_ip.proto = pg->key.addr.proto;
1943
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
1944
+ memcpy(&src_ip.src, srcs, src_size);
1945
+ ent = br_multicast_find_group_src(pg, &src_ip);
1946
+ if (ent) {
1947
+ ent->flags &= ~BR_SGRP_F_SEND;
1948
+ to_send--;
1949
+ } else {
1950
+ ent = br_multicast_new_group_src(pg, &src_ip);
1951
+ if (ent)
1952
+ changed = true;
1953
+ }
1954
+ if (ent)
1955
+ __grp_src_mod_timer(ent, now + br_multicast_gmi(br));
1956
+ srcs += src_size;
1957
+ }
1958
+
1959
+ if (to_send)
1960
+ __grp_src_query_marked_and_rexmit(pg);
1961
+
1962
+ return changed;
1963
+}
1964
+
1965
+/* State Msg type New state Actions
1966
+ * EXCLUDE (X,Y) TO_IN (A) EXCLUDE (X+A,Y-A) (A)=GMI
1967
+ * Send Q(G,X-A)
1968
+ * Send Q(G)
1969
+ */
1970
+static bool __grp_src_toin_excl(struct net_bridge_port_group *pg,
1971
+ void *srcs, u32 nsrcs, size_t src_size)
1972
+{
1973
+ struct net_bridge *br = pg->key.port->br;
1974
+ u32 src_idx, to_send = pg->src_ents;
1975
+ struct net_bridge_group_src *ent;
1976
+ unsigned long now = jiffies;
1977
+ bool changed = false;
1978
+ struct br_ip src_ip;
1979
+
1980
+ hlist_for_each_entry(ent, &pg->src_list, node)
1981
+ if (timer_pending(&ent->timer))
1982
+ ent->flags |= BR_SGRP_F_SEND;
1983
+
1984
+ memset(&src_ip, 0, sizeof(src_ip));
1985
+ src_ip.proto = pg->key.addr.proto;
1986
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
1987
+ memcpy(&src_ip.src, srcs, src_size);
1988
+ ent = br_multicast_find_group_src(pg, &src_ip);
1989
+ if (ent) {
1990
+ if (timer_pending(&ent->timer)) {
1991
+ ent->flags &= ~BR_SGRP_F_SEND;
1992
+ to_send--;
1993
+ }
1994
+ } else {
1995
+ ent = br_multicast_new_group_src(pg, &src_ip);
1996
+ if (ent)
1997
+ changed = true;
1998
+ }
1999
+ if (ent)
2000
+ __grp_src_mod_timer(ent, now + br_multicast_gmi(br));
2001
+ srcs += src_size;
2002
+ }
2003
+
2004
+ if (to_send)
2005
+ __grp_src_query_marked_and_rexmit(pg);
2006
+
2007
+ __grp_send_query_and_rexmit(pg);
2008
+
2009
+ return changed;
2010
+}
2011
+
2012
+static bool br_multicast_toin(struct net_bridge_port_group *pg,
2013
+ void *srcs, u32 nsrcs, size_t src_size)
2014
+{
2015
+ bool changed = false;
2016
+
2017
+ switch (pg->filter_mode) {
2018
+ case MCAST_INCLUDE:
2019
+ changed = __grp_src_toin_incl(pg, srcs, nsrcs, src_size);
2020
+ break;
2021
+ case MCAST_EXCLUDE:
2022
+ changed = __grp_src_toin_excl(pg, srcs, nsrcs, src_size);
2023
+ break;
2024
+ }
2025
+
2026
+ return changed;
2027
+}
2028
+
2029
+/* State Msg type New state Actions
2030
+ * INCLUDE (A) TO_EX (B) EXCLUDE (A*B,B-A) (B-A)=0
2031
+ * Delete (A-B)
2032
+ * Send Q(G,A*B)
2033
+ * Group Timer=GMI
2034
+ */
2035
+static void __grp_src_toex_incl(struct net_bridge_port_group *pg,
2036
+ void *srcs, u32 nsrcs, size_t src_size)
2037
+{
2038
+ struct net_bridge_group_src *ent;
2039
+ u32 src_idx, to_send = 0;
2040
+ struct br_ip src_ip;
2041
+
2042
+ hlist_for_each_entry(ent, &pg->src_list, node)
2043
+ ent->flags = (ent->flags & ~BR_SGRP_F_SEND) | BR_SGRP_F_DELETE;
2044
+
2045
+ memset(&src_ip, 0, sizeof(src_ip));
2046
+ src_ip.proto = pg->key.addr.proto;
2047
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
2048
+ memcpy(&src_ip.src, srcs, src_size);
2049
+ ent = br_multicast_find_group_src(pg, &src_ip);
2050
+ if (ent) {
2051
+ ent->flags = (ent->flags & ~BR_SGRP_F_DELETE) |
2052
+ BR_SGRP_F_SEND;
2053
+ to_send++;
2054
+ } else {
2055
+ ent = br_multicast_new_group_src(pg, &src_ip);
2056
+ }
2057
+ if (ent)
2058
+ br_multicast_fwd_src_handle(ent);
2059
+ srcs += src_size;
2060
+ }
2061
+
2062
+ __grp_src_delete_marked(pg);
2063
+ if (to_send)
2064
+ __grp_src_query_marked_and_rexmit(pg);
2065
+}
2066
+
2067
+/* State Msg type New state Actions
2068
+ * EXCLUDE (X,Y) TO_EX (A) EXCLUDE (A-Y,Y*A) (A-X-Y)=Group Timer
2069
+ * Delete (X-A)
2070
+ * Delete (Y-A)
2071
+ * Send Q(G,A-Y)
2072
+ * Group Timer=GMI
2073
+ */
2074
+static bool __grp_src_toex_excl(struct net_bridge_port_group *pg,
2075
+ void *srcs, u32 nsrcs, size_t src_size)
2076
+{
2077
+ struct net_bridge_group_src *ent;
2078
+ u32 src_idx, to_send = 0;
2079
+ bool changed = false;
2080
+ struct br_ip src_ip;
2081
+
2082
+ hlist_for_each_entry(ent, &pg->src_list, node)
2083
+ ent->flags = (ent->flags & ~BR_SGRP_F_SEND) | BR_SGRP_F_DELETE;
2084
+
2085
+ memset(&src_ip, 0, sizeof(src_ip));
2086
+ src_ip.proto = pg->key.addr.proto;
2087
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
2088
+ memcpy(&src_ip.src, srcs, src_size);
2089
+ ent = br_multicast_find_group_src(pg, &src_ip);
2090
+ if (ent) {
2091
+ ent->flags &= ~BR_SGRP_F_DELETE;
2092
+ } else {
2093
+ ent = br_multicast_new_group_src(pg, &src_ip);
2094
+ if (ent) {
2095
+ __grp_src_mod_timer(ent, pg->timer.expires);
2096
+ changed = true;
2097
+ }
2098
+ }
2099
+ if (ent && timer_pending(&ent->timer)) {
2100
+ ent->flags |= BR_SGRP_F_SEND;
2101
+ to_send++;
2102
+ }
2103
+ srcs += src_size;
2104
+ }
2105
+
2106
+ if (__grp_src_delete_marked(pg))
2107
+ changed = true;
2108
+ if (to_send)
2109
+ __grp_src_query_marked_and_rexmit(pg);
2110
+
2111
+ return changed;
2112
+}
2113
+
2114
+static bool br_multicast_toex(struct net_bridge_port_group *pg,
2115
+ void *srcs, u32 nsrcs, size_t src_size)
2116
+{
2117
+ struct net_bridge *br = pg->key.port->br;
2118
+ bool changed = false;
2119
+
2120
+ switch (pg->filter_mode) {
2121
+ case MCAST_INCLUDE:
2122
+ __grp_src_toex_incl(pg, srcs, nsrcs, src_size);
2123
+ br_multicast_star_g_handle_mode(pg, MCAST_EXCLUDE);
2124
+ changed = true;
2125
+ break;
2126
+ case MCAST_EXCLUDE:
2127
+ changed = __grp_src_toex_excl(pg, srcs, nsrcs, src_size);
2128
+ break;
2129
+ }
2130
+
2131
+ pg->filter_mode = MCAST_EXCLUDE;
2132
+ mod_timer(&pg->timer, jiffies + br_multicast_gmi(br));
2133
+
2134
+ return changed;
2135
+}
2136
+
2137
+/* State Msg type New state Actions
2138
+ * INCLUDE (A) BLOCK (B) INCLUDE (A) Send Q(G,A*B)
2139
+ */
2140
+static void __grp_src_block_incl(struct net_bridge_port_group *pg,
2141
+ void *srcs, u32 nsrcs, size_t src_size)
2142
+{
2143
+ struct net_bridge_group_src *ent;
2144
+ u32 src_idx, to_send = 0;
2145
+ struct br_ip src_ip;
2146
+
2147
+ hlist_for_each_entry(ent, &pg->src_list, node)
2148
+ ent->flags &= ~BR_SGRP_F_SEND;
2149
+
2150
+ memset(&src_ip, 0, sizeof(src_ip));
2151
+ src_ip.proto = pg->key.addr.proto;
2152
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
2153
+ memcpy(&src_ip.src, srcs, src_size);
2154
+ ent = br_multicast_find_group_src(pg, &src_ip);
2155
+ if (ent) {
2156
+ ent->flags |= BR_SGRP_F_SEND;
2157
+ to_send++;
2158
+ }
2159
+ srcs += src_size;
2160
+ }
2161
+
2162
+ if (to_send)
2163
+ __grp_src_query_marked_and_rexmit(pg);
2164
+
2165
+ if (pg->filter_mode == MCAST_INCLUDE && hlist_empty(&pg->src_list))
2166
+ br_multicast_find_del_pg(pg->key.port->br, pg);
2167
+}
2168
+
2169
+/* State Msg type New state Actions
2170
+ * EXCLUDE (X,Y) BLOCK (A) EXCLUDE (X+(A-Y),Y) (A-X-Y)=Group Timer
2171
+ * Send Q(G,A-Y)
2172
+ */
2173
+static bool __grp_src_block_excl(struct net_bridge_port_group *pg,
2174
+ void *srcs, u32 nsrcs, size_t src_size)
2175
+{
2176
+ struct net_bridge_group_src *ent;
2177
+ u32 src_idx, to_send = 0;
2178
+ bool changed = false;
2179
+ struct br_ip src_ip;
2180
+
2181
+ hlist_for_each_entry(ent, &pg->src_list, node)
2182
+ ent->flags &= ~BR_SGRP_F_SEND;
2183
+
2184
+ memset(&src_ip, 0, sizeof(src_ip));
2185
+ src_ip.proto = pg->key.addr.proto;
2186
+ for (src_idx = 0; src_idx < nsrcs; src_idx++) {
2187
+ memcpy(&src_ip.src, srcs, src_size);
2188
+ ent = br_multicast_find_group_src(pg, &src_ip);
2189
+ if (!ent) {
2190
+ ent = br_multicast_new_group_src(pg, &src_ip);
2191
+ if (ent) {
2192
+ __grp_src_mod_timer(ent, pg->timer.expires);
2193
+ changed = true;
2194
+ }
2195
+ }
2196
+ if (ent && timer_pending(&ent->timer)) {
2197
+ ent->flags |= BR_SGRP_F_SEND;
2198
+ to_send++;
2199
+ }
2200
+ srcs += src_size;
2201
+ }
2202
+
2203
+ if (to_send)
2204
+ __grp_src_query_marked_and_rexmit(pg);
2205
+
2206
+ return changed;
2207
+}
2208
+
2209
+static bool br_multicast_block(struct net_bridge_port_group *pg,
2210
+ void *srcs, u32 nsrcs, size_t src_size)
2211
+{
2212
+ bool changed = false;
2213
+
2214
+ switch (pg->filter_mode) {
2215
+ case MCAST_INCLUDE:
2216
+ __grp_src_block_incl(pg, srcs, nsrcs, src_size);
2217
+ break;
2218
+ case MCAST_EXCLUDE:
2219
+ changed = __grp_src_block_excl(pg, srcs, nsrcs, src_size);
2220
+ break;
2221
+ }
2222
+
2223
+ return changed;
2224
+}
2225
+
2226
+static struct net_bridge_port_group *
2227
+br_multicast_find_port(struct net_bridge_mdb_entry *mp,
2228
+ struct net_bridge_port *p,
2229
+ const unsigned char *src)
2230
+{
2231
+ struct net_bridge *br __maybe_unused = mp->br;
2232
+ struct net_bridge_port_group *pg;
2233
+
2234
+ for (pg = mlock_dereference(mp->ports, br);
2235
+ pg;
2236
+ pg = mlock_dereference(pg->next, br))
2237
+ if (br_port_group_equal(pg, p, src))
2238
+ return pg;
2239
+
2240
+ return NULL;
2241
+}
2242
+
11362243 static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
11372244 struct net_bridge_port *port,
11382245 struct sk_buff *skb,
11392246 u16 vid)
11402247 {
2248
+ bool igmpv2 = br->multicast_igmp_version == 2;
2249
+ struct net_bridge_mdb_entry *mdst;
2250
+ struct net_bridge_port_group *pg;
11412251 const unsigned char *src;
11422252 struct igmpv3_report *ih;
11432253 struct igmpv3_grec *grec;
1144
- int i;
1145
- int len;
1146
- int num;
1147
- int type;
1148
- int err = 0;
2254
+ int i, len, num, type;
2255
+ bool changed = false;
11492256 __be32 group;
2257
+ int err = 0;
11502258 u16 nsrcs;
11512259
11522260 ih = igmpv3_report_hdr(skb);
....@@ -1155,7 +2263,7 @@
11552263
11562264 for (i = 0; i < num; i++) {
11572265 len += sizeof(*grec);
1158
- if (!pskb_may_pull(skb, len))
2266
+ if (!ip_mc_may_pull(skb, len))
11592267 return -EINVAL;
11602268
11612269 grec = (void *)(skb->data + len - sizeof(*grec));
....@@ -1164,10 +2272,9 @@
11642272 nsrcs = ntohs(grec->grec_nsrcs);
11652273
11662274 len += nsrcs * 4;
1167
- if (!pskb_may_pull(skb, len))
2275
+ if (!ip_mc_may_pull(skb, len))
11682276 return -EINVAL;
11692277
1170
- /* We treat this as an IGMPv2 report for now. */
11712278 switch (type) {
11722279 case IGMPV3_MODE_IS_INCLUDE:
11732280 case IGMPV3_MODE_IS_EXCLUDE:
....@@ -1182,16 +2289,62 @@
11822289 }
11832290
11842291 src = eth_hdr(skb)->h_source;
1185
- if ((type == IGMPV3_CHANGE_TO_INCLUDE ||
1186
- type == IGMPV3_MODE_IS_INCLUDE) &&
1187
- nsrcs == 0) {
1188
- br_ip4_multicast_leave_group(br, port, group, vid, src);
2292
+ if (nsrcs == 0 &&
2293
+ (type == IGMPV3_CHANGE_TO_INCLUDE ||
2294
+ type == IGMPV3_MODE_IS_INCLUDE)) {
2295
+ if (!port || igmpv2) {
2296
+ br_ip4_multicast_leave_group(br, port, group, vid, src);
2297
+ continue;
2298
+ }
11892299 } else {
11902300 err = br_ip4_multicast_add_group(br, port, group, vid,
1191
- src);
2301
+ src, igmpv2);
11922302 if (err)
11932303 break;
11942304 }
2305
+
2306
+ if (!port || igmpv2)
2307
+ continue;
2308
+
2309
+ spin_lock_bh(&br->multicast_lock);
2310
+ mdst = br_mdb_ip4_get(br, group, vid);
2311
+ if (!mdst)
2312
+ goto unlock_continue;
2313
+ pg = br_multicast_find_port(mdst, port, src);
2314
+ if (!pg || (pg->flags & MDB_PG_FLAGS_PERMANENT))
2315
+ goto unlock_continue;
2316
+ /* reload grec */
2317
+ grec = (void *)(skb->data + len - sizeof(*grec) - (nsrcs * 4));
2318
+ switch (type) {
2319
+ case IGMPV3_ALLOW_NEW_SOURCES:
2320
+ changed = br_multicast_isinc_allow(pg, grec->grec_src,
2321
+ nsrcs, sizeof(__be32));
2322
+ break;
2323
+ case IGMPV3_MODE_IS_INCLUDE:
2324
+ changed = br_multicast_isinc_allow(pg, grec->grec_src, nsrcs,
2325
+ sizeof(__be32));
2326
+ break;
2327
+ case IGMPV3_MODE_IS_EXCLUDE:
2328
+ changed = br_multicast_isexc(pg, grec->grec_src, nsrcs,
2329
+ sizeof(__be32));
2330
+ break;
2331
+ case IGMPV3_CHANGE_TO_INCLUDE:
2332
+ changed = br_multicast_toin(pg, grec->grec_src, nsrcs,
2333
+ sizeof(__be32));
2334
+ break;
2335
+ case IGMPV3_CHANGE_TO_EXCLUDE:
2336
+ changed = br_multicast_toex(pg, grec->grec_src, nsrcs,
2337
+ sizeof(__be32));
2338
+ break;
2339
+ case IGMPV3_BLOCK_OLD_SOURCES:
2340
+ changed = br_multicast_block(pg, grec->grec_src, nsrcs,
2341
+ sizeof(__be32));
2342
+ break;
2343
+ }
2344
+ if (changed)
2345
+ br_mdb_notify(br->dev, mdst, pg, RTM_NEWMDB);
2346
+unlock_continue:
2347
+ spin_unlock_bh(&br->multicast_lock);
11952348 }
11962349
11972350 return err;
....@@ -1203,15 +2356,19 @@
12032356 struct sk_buff *skb,
12042357 u16 vid)
12052358 {
2359
+ bool mldv1 = br->multicast_mld_version == 1;
2360
+ struct net_bridge_mdb_entry *mdst;
2361
+ struct net_bridge_port_group *pg;
2362
+ unsigned int nsrcs_offset;
12062363 const unsigned char *src;
12072364 struct icmp6hdr *icmp6h;
12082365 struct mld2_grec *grec;
1209
- int i;
1210
- int len;
1211
- int num;
2366
+ unsigned int grec_len;
2367
+ bool changed = false;
2368
+ int i, len, num;
12122369 int err = 0;
12132370
1214
- if (!pskb_may_pull(skb, sizeof(*icmp6h)))
2371
+ if (!ipv6_mc_may_pull(skb, sizeof(*icmp6h)))
12152372 return -EINVAL;
12162373
12172374 icmp6h = icmp6_hdr(skb);
....@@ -1222,25 +2379,26 @@
12222379 __be16 *_nsrcs, __nsrcs;
12232380 u16 nsrcs;
12242381
1225
- _nsrcs = skb_header_pointer(skb,
1226
- len + offsetof(struct mld2_grec,
1227
- grec_nsrcs),
2382
+ nsrcs_offset = len + offsetof(struct mld2_grec, grec_nsrcs);
2383
+
2384
+ if (skb_transport_offset(skb) + ipv6_transport_len(skb) <
2385
+ nsrcs_offset + sizeof(__nsrcs))
2386
+ return -EINVAL;
2387
+
2388
+ _nsrcs = skb_header_pointer(skb, nsrcs_offset,
12282389 sizeof(__nsrcs), &__nsrcs);
12292390 if (!_nsrcs)
12302391 return -EINVAL;
12312392
12322393 nsrcs = ntohs(*_nsrcs);
2394
+ grec_len = struct_size(grec, grec_src, nsrcs);
12332395
1234
- if (!pskb_may_pull(skb,
1235
- len + sizeof(*grec) +
1236
- sizeof(struct in6_addr) * nsrcs))
2396
+ if (!ipv6_mc_may_pull(skb, len + grec_len))
12372397 return -EINVAL;
12382398
12392399 grec = (struct mld2_grec *)(skb->data + len);
1240
- len += sizeof(*grec) +
1241
- sizeof(struct in6_addr) * nsrcs;
2400
+ len += grec_len;
12422401
1243
- /* We treat these as MLDv1 reports for now. */
12442402 switch (grec->grec_type) {
12452403 case MLD2_MODE_IS_INCLUDE:
12462404 case MLD2_MODE_IS_EXCLUDE:
....@@ -1258,15 +2416,61 @@
12582416 if ((grec->grec_type == MLD2_CHANGE_TO_INCLUDE ||
12592417 grec->grec_type == MLD2_MODE_IS_INCLUDE) &&
12602418 nsrcs == 0) {
1261
- br_ip6_multicast_leave_group(br, port, &grec->grec_mca,
1262
- vid, src);
2419
+ if (!port || mldv1) {
2420
+ br_ip6_multicast_leave_group(br, port,
2421
+ &grec->grec_mca,
2422
+ vid, src);
2423
+ continue;
2424
+ }
12632425 } else {
12642426 err = br_ip6_multicast_add_group(br, port,
12652427 &grec->grec_mca, vid,
1266
- src);
2428
+ src, mldv1);
12672429 if (err)
12682430 break;
12692431 }
2432
+
2433
+ if (!port || mldv1)
2434
+ continue;
2435
+
2436
+ spin_lock_bh(&br->multicast_lock);
2437
+ mdst = br_mdb_ip6_get(br, &grec->grec_mca, vid);
2438
+ if (!mdst)
2439
+ goto unlock_continue;
2440
+ pg = br_multicast_find_port(mdst, port, src);
2441
+ if (!pg || (pg->flags & MDB_PG_FLAGS_PERMANENT))
2442
+ goto unlock_continue;
2443
+ switch (grec->grec_type) {
2444
+ case MLD2_ALLOW_NEW_SOURCES:
2445
+ changed = br_multicast_isinc_allow(pg, grec->grec_src,
2446
+ nsrcs,
2447
+ sizeof(struct in6_addr));
2448
+ break;
2449
+ case MLD2_MODE_IS_INCLUDE:
2450
+ changed = br_multicast_isinc_allow(pg, grec->grec_src, nsrcs,
2451
+ sizeof(struct in6_addr));
2452
+ break;
2453
+ case MLD2_MODE_IS_EXCLUDE:
2454
+ changed = br_multicast_isexc(pg, grec->grec_src, nsrcs,
2455
+ sizeof(struct in6_addr));
2456
+ break;
2457
+ case MLD2_CHANGE_TO_INCLUDE:
2458
+ changed = br_multicast_toin(pg, grec->grec_src, nsrcs,
2459
+ sizeof(struct in6_addr));
2460
+ break;
2461
+ case MLD2_CHANGE_TO_EXCLUDE:
2462
+ changed = br_multicast_toex(pg, grec->grec_src, nsrcs,
2463
+ sizeof(struct in6_addr));
2464
+ break;
2465
+ case MLD2_BLOCK_OLD_SOURCES:
2466
+ changed = br_multicast_block(pg, grec->grec_src, nsrcs,
2467
+ sizeof(struct in6_addr));
2468
+ break;
2469
+ }
2470
+ if (changed)
2471
+ br_mdb_notify(br->dev, mdst, pg, RTM_NEWMDB);
2472
+unlock_continue:
2473
+ spin_unlock_bh(&br->multicast_lock);
12702474 }
12712475
12722476 return err;
....@@ -1281,16 +2485,16 @@
12812485 !timer_pending(&br->ip4_other_query.timer))
12822486 goto update;
12832487
1284
- if (!br->ip4_querier.addr.u.ip4)
2488
+ if (!br->ip4_querier.addr.src.ip4)
12852489 goto update;
12862490
1287
- if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4))
2491
+ if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.src.ip4))
12882492 goto update;
12892493
12902494 return false;
12912495
12922496 update:
1293
- br->ip4_querier.addr.u.ip4 = saddr;
2497
+ br->ip4_querier.addr.src.ip4 = saddr;
12942498
12952499 /* update protected by general multicast_lock by caller */
12962500 rcu_assign_pointer(br->ip4_querier.port, port);
....@@ -1307,13 +2511,13 @@
13072511 !timer_pending(&br->ip6_other_query.timer))
13082512 goto update;
13092513
1310
- if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0)
2514
+ if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.src.ip6) <= 0)
13112515 goto update;
13122516
13132517 return false;
13142518
13152519 update:
1316
- br->ip6_querier.addr.u.ip6 = *saddr;
2520
+ br->ip6_querier.addr.src.ip6 = *saddr;
13172521
13182522 /* update protected by general multicast_lock by caller */
13192523 rcu_assign_pointer(br->ip6_querier.port, port);
....@@ -1328,10 +2532,10 @@
13282532 {
13292533 switch (saddr->proto) {
13302534 case htons(ETH_P_IP):
1331
- return br_ip4_multicast_select_querier(br, port, saddr->u.ip4);
2535
+ return br_ip4_multicast_select_querier(br, port, saddr->src.ip4);
13322536 #if IS_ENABLED(CONFIG_IPV6)
13332537 case htons(ETH_P_IPV6):
1334
- return br_ip6_multicast_select_querier(br, port, &saddr->u.ip6);
2538
+ return br_ip6_multicast_select_querier(br, port, &saddr->src.ip6);
13352539 #endif
13362540 }
13372541
....@@ -1433,6 +2637,7 @@
14332637 struct sk_buff *skb,
14342638 u16 vid)
14352639 {
2640
+ unsigned int transport_len = ip_transport_len(skb);
14362641 const struct iphdr *iph = ip_hdr(skb);
14372642 struct igmphdr *ih = igmp_hdr(skb);
14382643 struct net_bridge_mdb_entry *mp;
....@@ -1442,7 +2647,6 @@
14422647 struct br_ip saddr;
14432648 unsigned long max_delay;
14442649 unsigned long now = jiffies;
1445
- unsigned int offset = skb_transport_offset(skb);
14462650 __be32 group;
14472651
14482652 spin_lock(&br->multicast_lock);
....@@ -1452,16 +2656,17 @@
14522656
14532657 group = ih->group;
14542658
1455
- if (skb->len == offset + sizeof(*ih)) {
2659
+ if (transport_len == sizeof(*ih)) {
14562660 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE);
14572661
14582662 if (!max_delay) {
14592663 max_delay = 10 * HZ;
14602664 group = 0;
14612665 }
1462
- } else if (skb->len >= offset + sizeof(*ih3)) {
2666
+ } else if (transport_len >= sizeof(*ih3)) {
14632667 ih3 = igmpv3_query_hdr(skb);
1464
- if (ih3->nsrcs)
2668
+ if (ih3->nsrcs ||
2669
+ (br->multicast_igmp_version == 3 && group && ih3->suppress))
14652670 goto out;
14662671
14672672 max_delay = ih3->code ?
....@@ -1472,14 +2677,14 @@
14722677
14732678 if (!group) {
14742679 saddr.proto = htons(ETH_P_IP);
1475
- saddr.u.ip4 = iph->saddr;
2680
+ saddr.src.ip4 = iph->saddr;
14762681
14772682 br_multicast_query_received(br, port, &br->ip4_other_query,
14782683 &saddr, max_delay);
14792684 goto out;
14802685 }
14812686
1482
- mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid);
2687
+ mp = br_mdb_ip4_get(br, group, vid);
14832688 if (!mp)
14842689 goto out;
14852690
....@@ -1496,7 +2701,9 @@
14962701 pp = &p->next) {
14972702 if (timer_pending(&p->timer) ?
14982703 time_after(p->timer.expires, now + max_delay) :
1499
- try_to_del_timer_sync(&p->timer) >= 0)
2704
+ try_to_del_timer_sync(&p->timer) >= 0 &&
2705
+ (br->multicast_igmp_version == 2 ||
2706
+ p->filter_mode == MCAST_EXCLUDE))
15002707 mod_timer(&p->timer, now + max_delay);
15012708 }
15022709
....@@ -1510,6 +2717,7 @@
15102717 struct sk_buff *skb,
15112718 u16 vid)
15122719 {
2720
+ unsigned int transport_len = ipv6_transport_len(skb);
15132721 struct mld_msg *mld;
15142722 struct net_bridge_mdb_entry *mp;
15152723 struct mld2_query *mld2q;
....@@ -1528,7 +2736,7 @@
15282736 (port && port->state == BR_STATE_DISABLED))
15292737 goto out;
15302738
1531
- if (skb->len == offset + sizeof(*mld)) {
2739
+ if (transport_len == sizeof(*mld)) {
15322740 if (!pskb_may_pull(skb, offset + sizeof(*mld))) {
15332741 err = -EINVAL;
15342742 goto out;
....@@ -1545,6 +2753,10 @@
15452753 mld2q = (struct mld2_query *)icmp6_hdr(skb);
15462754 if (!mld2q->mld2q_nsrcs)
15472755 group = &mld2q->mld2q_mca;
2756
+ if (br->multicast_mld_version == 2 &&
2757
+ !ipv6_addr_any(&mld2q->mld2q_mca) &&
2758
+ mld2q->mld2q_suppress)
2759
+ goto out;
15482760
15492761 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL);
15502762 }
....@@ -1553,7 +2765,7 @@
15532765
15542766 if (is_general_query) {
15552767 saddr.proto = htons(ETH_P_IPV6);
1556
- saddr.u.ip6 = ipv6_hdr(skb)->saddr;
2768
+ saddr.src.ip6 = ipv6_hdr(skb)->saddr;
15572769
15582770 br_multicast_query_received(br, port, &br->ip6_other_query,
15592771 &saddr, max_delay);
....@@ -1562,7 +2774,7 @@
15622774 goto out;
15632775 }
15642776
1565
- mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid);
2777
+ mp = br_mdb_ip6_get(br, group, vid);
15662778 if (!mp)
15672779 goto out;
15682780
....@@ -1578,7 +2790,9 @@
15782790 pp = &p->next) {
15792791 if (timer_pending(&p->timer) ?
15802792 time_after(p->timer.expires, now + max_delay) :
1581
- try_to_del_timer_sync(&p->timer) >= 0)
2793
+ try_to_del_timer_sync(&p->timer) >= 0 &&
2794
+ (br->multicast_mld_version == 1 ||
2795
+ p->filter_mode == MCAST_EXCLUDE))
15822796 mod_timer(&p->timer, now + max_delay);
15832797 }
15842798
....@@ -1596,7 +2810,6 @@
15962810 struct bridge_mcast_own_query *own_query,
15972811 const unsigned char *src)
15982812 {
1599
- struct net_bridge_mdb_htable *mdb;
16002813 struct net_bridge_mdb_entry *mp;
16012814 struct net_bridge_port_group *p;
16022815 unsigned long now;
....@@ -1607,8 +2820,7 @@
16072820 (port && port->state == BR_STATE_DISABLED))
16082821 goto out;
16092822
1610
- mdb = mlock_dereference(br->mdb, br);
1611
- mp = br_mdb_ip_get(mdb, group);
2823
+ mp = br_mdb_ip_get(br, group);
16122824 if (!mp)
16132825 goto out;
16142826
....@@ -1624,16 +2836,8 @@
16242836 if (p->flags & MDB_PG_FLAGS_PERMANENT)
16252837 break;
16262838
1627
- rcu_assign_pointer(*pp, p->next);
1628
- hlist_del_init(&p->mglist);
1629
- del_timer(&p->timer);
1630
- call_rcu_bh(&p->rcu, br_multicast_free_pg);
1631
- br_mdb_notify(br->dev, port, group, RTM_DELMDB,
1632
- p->flags);
1633
-
1634
- if (!mp->ports && !mp->host_joined &&
1635
- netif_running(br->dev))
1636
- mod_timer(&mp->timer, jiffies);
2839
+ p->flags |= MDB_PG_FLAGS_FAST_LEAVE;
2840
+ br_multicast_del_pg(mp, p, pp);
16372841 }
16382842 goto out;
16392843 }
....@@ -1641,8 +2845,9 @@
16412845 if (timer_pending(&other_query->timer))
16422846 goto out;
16432847
1644
- if (br->multicast_querier) {
1645
- __br_multicast_send_query(br, port, &mp->addr);
2848
+ if (br_opt_get(br, BROPT_MULTICAST_QUERIER)) {
2849
+ __br_multicast_send_query(br, port, NULL, NULL, &mp->addr,
2850
+ false, 0, NULL);
16462851
16472852 time = jiffies + br->multicast_last_member_count *
16482853 br->multicast_last_member_interval;
....@@ -1684,7 +2889,7 @@
16842889 for (p = mlock_dereference(mp->ports, br);
16852890 p != NULL;
16862891 p = mlock_dereference(p->next, br)) {
1687
- if (p->port != port)
2892
+ if (p->key.port != port)
16882893 continue;
16892894
16902895 if (!hlist_unhashed(&p->mglist) &&
....@@ -1714,7 +2919,8 @@
17142919
17152920 own_query = port ? &port->ip4_own_query : &br->ip4_own_query;
17162921
1717
- br_group.u.ip4 = group;
2922
+ memset(&br_group, 0, sizeof(br_group));
2923
+ br_group.dst.ip4 = group;
17182924 br_group.proto = htons(ETH_P_IP);
17192925 br_group.vid = vid;
17202926
....@@ -1737,7 +2943,8 @@
17372943
17382944 own_query = port ? &port->ip6_own_query : &br->ip6_own_query;
17392945
1740
- br_group.u.ip6 = *group;
2946
+ memset(&br_group, 0, sizeof(br_group));
2947
+ br_group.dst.ip6 = *group;
17412948 br_group.proto = htons(ETH_P_IPV6);
17422949 br_group.vid = vid;
17432950
....@@ -1753,7 +2960,7 @@
17532960 struct bridge_mcast_stats __percpu *stats;
17542961 struct bridge_mcast_stats *pstats;
17552962
1756
- if (!br->multicast_stats_enabled)
2963
+ if (!br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED))
17572964 return;
17582965
17592966 if (p)
....@@ -1796,17 +3003,31 @@
17963003 spin_unlock(&br->multicast_lock);
17973004 }
17983005
3006
+static int br_ip4_multicast_mrd_rcv(struct net_bridge *br,
3007
+ struct net_bridge_port *port,
3008
+ struct sk_buff *skb)
3009
+{
3010
+ if (ip_hdr(skb)->protocol != IPPROTO_IGMP ||
3011
+ igmp_hdr(skb)->type != IGMP_MRDISC_ADV)
3012
+ return -ENOMSG;
3013
+
3014
+ spin_lock(&br->multicast_lock);
3015
+ br_multicast_mark_router(br, port);
3016
+ spin_unlock(&br->multicast_lock);
3017
+
3018
+ return 0;
3019
+}
3020
+
17993021 static int br_multicast_ipv4_rcv(struct net_bridge *br,
18003022 struct net_bridge_port *port,
18013023 struct sk_buff *skb,
18023024 u16 vid)
18033025 {
1804
- struct sk_buff *skb_trimmed = NULL;
18053026 const unsigned char *src;
18063027 struct igmphdr *ih;
18073028 int err;
18083029
1809
- err = ip_mc_check_igmp(skb, &skb_trimmed);
3030
+ err = ip_mc_check_igmp(skb);
18103031
18113032 if (err == -ENOMSG) {
18123033 if (!ipv4_is_local_multicast(ip_hdr(skb)->daddr)) {
....@@ -1814,7 +3035,10 @@
18143035 } else if (pim_ipv4_all_pim_routers(ip_hdr(skb)->daddr)) {
18153036 if (ip_hdr(skb)->protocol == IPPROTO_PIM)
18163037 br_multicast_pim(br, port, skb);
3038
+ } else if (ipv4_is_all_snoopers(ip_hdr(skb)->daddr)) {
3039
+ br_ip4_multicast_mrd_rcv(br, port, skb);
18173040 }
3041
+
18183042 return 0;
18193043 } else if (err < 0) {
18203044 br_multicast_err_count(br, port, skb->protocol);
....@@ -1829,21 +3053,19 @@
18293053 case IGMP_HOST_MEMBERSHIP_REPORT:
18303054 case IGMPV2_HOST_MEMBERSHIP_REPORT:
18313055 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1832
- err = br_ip4_multicast_add_group(br, port, ih->group, vid, src);
3056
+ err = br_ip4_multicast_add_group(br, port, ih->group, vid, src,
3057
+ true);
18333058 break;
18343059 case IGMPV3_HOST_MEMBERSHIP_REPORT:
1835
- err = br_ip4_multicast_igmp3_report(br, port, skb_trimmed, vid);
3060
+ err = br_ip4_multicast_igmp3_report(br, port, skb, vid);
18363061 break;
18373062 case IGMP_HOST_MEMBERSHIP_QUERY:
1838
- br_ip4_multicast_query(br, port, skb_trimmed, vid);
3063
+ br_ip4_multicast_query(br, port, skb, vid);
18393064 break;
18403065 case IGMP_HOST_LEAVE_MESSAGE:
18413066 br_ip4_multicast_leave_group(br, port, ih->group, vid, src);
18423067 break;
18433068 }
1844
-
1845
- if (skb_trimmed && skb_trimmed != skb)
1846
- kfree_skb(skb_trimmed);
18473069
18483070 br_multicast_count(br, port, skb, BR_INPUT_SKB_CB(skb)->igmp,
18493071 BR_MCAST_DIR_RX);
....@@ -1852,21 +3074,36 @@
18523074 }
18533075
18543076 #if IS_ENABLED(CONFIG_IPV6)
3077
+static void br_ip6_multicast_mrd_rcv(struct net_bridge *br,
3078
+ struct net_bridge_port *port,
3079
+ struct sk_buff *skb)
3080
+{
3081
+ if (icmp6_hdr(skb)->icmp6_type != ICMPV6_MRDISC_ADV)
3082
+ return;
3083
+
3084
+ spin_lock(&br->multicast_lock);
3085
+ br_multicast_mark_router(br, port);
3086
+ spin_unlock(&br->multicast_lock);
3087
+}
3088
+
18553089 static int br_multicast_ipv6_rcv(struct net_bridge *br,
18563090 struct net_bridge_port *port,
18573091 struct sk_buff *skb,
18583092 u16 vid)
18593093 {
1860
- struct sk_buff *skb_trimmed = NULL;
18613094 const unsigned char *src;
18623095 struct mld_msg *mld;
18633096 int err;
18643097
1865
- err = ipv6_mc_check_mld(skb, &skb_trimmed);
3098
+ err = ipv6_mc_check_mld(skb);
18663099
1867
- if (err == -ENOMSG) {
3100
+ if (err == -ENOMSG || err == -ENODATA) {
18683101 if (!ipv6_addr_is_ll_all_nodes(&ipv6_hdr(skb)->daddr))
18693102 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
3103
+ if (err == -ENODATA &&
3104
+ ipv6_addr_is_all_snoopers(&ipv6_hdr(skb)->daddr))
3105
+ br_ip6_multicast_mrd_rcv(br, port, skb);
3106
+
18703107 return 0;
18713108 } else if (err < 0) {
18723109 br_multicast_err_count(br, port, skb->protocol);
....@@ -1881,22 +3118,19 @@
18813118 src = eth_hdr(skb)->h_source;
18823119 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
18833120 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid,
1884
- src);
3121
+ src, true);
18853122 break;
18863123 case ICMPV6_MLD2_REPORT:
1887
- err = br_ip6_multicast_mld2_report(br, port, skb_trimmed, vid);
3124
+ err = br_ip6_multicast_mld2_report(br, port, skb, vid);
18883125 break;
18893126 case ICMPV6_MGM_QUERY:
1890
- err = br_ip6_multicast_query(br, port, skb_trimmed, vid);
3127
+ err = br_ip6_multicast_query(br, port, skb, vid);
18913128 break;
18923129 case ICMPV6_MGM_REDUCTION:
18933130 src = eth_hdr(skb)->h_source;
18943131 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid, src);
18953132 break;
18963133 }
1897
-
1898
- if (skb_trimmed && skb_trimmed != skb)
1899
- kfree_skb(skb_trimmed);
19003134
19013135 br_multicast_count(br, port, skb, BR_INPUT_SKB_CB(skb)->igmp,
19023136 BR_MCAST_DIR_RX);
....@@ -1913,7 +3147,7 @@
19133147 BR_INPUT_SKB_CB(skb)->igmp = 0;
19143148 BR_INPUT_SKB_CB(skb)->mrouters_only = 0;
19153149
1916
- if (br->multicast_disabled)
3150
+ if (!br_opt_get(br, BROPT_MULTICAST_ENABLED))
19173151 return 0;
19183152
19193153 switch (skb->protocol) {
....@@ -1959,14 +3193,24 @@
19593193 }
19603194 #endif
19613195
3196
+static void br_multicast_gc_work(struct work_struct *work)
3197
+{
3198
+ struct net_bridge *br = container_of(work, struct net_bridge,
3199
+ mcast_gc_work);
3200
+ HLIST_HEAD(deleted_head);
3201
+
3202
+ spin_lock_bh(&br->multicast_lock);
3203
+ hlist_move_list(&br->mcast_gc_list, &deleted_head);
3204
+ spin_unlock_bh(&br->multicast_lock);
3205
+
3206
+ br_multicast_gc(&deleted_head);
3207
+}
3208
+
19623209 void br_multicast_init(struct net_bridge *br)
19633210 {
1964
- br->hash_elasticity = 4;
1965
- br->hash_max = 512;
3211
+ br->hash_max = BR_MULTICAST_DEFAULT_HASH_MAX;
19663212
19673213 br->multicast_router = MDB_RTR_TYPE_TEMP_QUERY;
1968
- br->multicast_querier = 0;
1969
- br->multicast_query_use_ifaddr = 0;
19703214 br->multicast_last_member_count = 2;
19713215 br->multicast_startup_query_count = 2;
19723216
....@@ -1985,7 +3229,8 @@
19853229 br->ip6_other_query.delay_time = 0;
19863230 br->ip6_querier.port = NULL;
19873231 #endif
1988
- br->has_ipv6_addr = 1;
3232
+ br_opt_toggle(br, BROPT_MULTICAST_ENABLED, true);
3233
+ br_opt_toggle(br, BROPT_HAS_IPV6_ADDR, true);
19893234
19903235 spin_lock_init(&br->multicast_lock);
19913236 timer_setup(&br->multicast_router_timer,
....@@ -2000,6 +3245,71 @@
20003245 timer_setup(&br->ip6_own_query.timer,
20013246 br_ip6_multicast_query_expired, 0);
20023247 #endif
3248
+ INIT_HLIST_HEAD(&br->mdb_list);
3249
+ INIT_HLIST_HEAD(&br->mcast_gc_list);
3250
+ INIT_WORK(&br->mcast_gc_work, br_multicast_gc_work);
3251
+}
3252
+
3253
+static void br_ip4_multicast_join_snoopers(struct net_bridge *br)
3254
+{
3255
+ struct in_device *in_dev = in_dev_get(br->dev);
3256
+
3257
+ if (!in_dev)
3258
+ return;
3259
+
3260
+ __ip_mc_inc_group(in_dev, htonl(INADDR_ALLSNOOPERS_GROUP), GFP_ATOMIC);
3261
+ in_dev_put(in_dev);
3262
+}
3263
+
3264
+#if IS_ENABLED(CONFIG_IPV6)
3265
+static void br_ip6_multicast_join_snoopers(struct net_bridge *br)
3266
+{
3267
+ struct in6_addr addr;
3268
+
3269
+ ipv6_addr_set(&addr, htonl(0xff020000), 0, 0, htonl(0x6a));
3270
+ ipv6_dev_mc_inc(br->dev, &addr);
3271
+}
3272
+#else
3273
+static inline void br_ip6_multicast_join_snoopers(struct net_bridge *br)
3274
+{
3275
+}
3276
+#endif
3277
+
3278
+void br_multicast_join_snoopers(struct net_bridge *br)
3279
+{
3280
+ br_ip4_multicast_join_snoopers(br);
3281
+ br_ip6_multicast_join_snoopers(br);
3282
+}
3283
+
3284
+static void br_ip4_multicast_leave_snoopers(struct net_bridge *br)
3285
+{
3286
+ struct in_device *in_dev = in_dev_get(br->dev);
3287
+
3288
+ if (WARN_ON(!in_dev))
3289
+ return;
3290
+
3291
+ __ip_mc_dec_group(in_dev, htonl(INADDR_ALLSNOOPERS_GROUP), GFP_ATOMIC);
3292
+ in_dev_put(in_dev);
3293
+}
3294
+
3295
+#if IS_ENABLED(CONFIG_IPV6)
3296
+static void br_ip6_multicast_leave_snoopers(struct net_bridge *br)
3297
+{
3298
+ struct in6_addr addr;
3299
+
3300
+ ipv6_addr_set(&addr, htonl(0xff020000), 0, 0, htonl(0x6a));
3301
+ ipv6_dev_mc_dec(br->dev, &addr);
3302
+}
3303
+#else
3304
+static inline void br_ip6_multicast_leave_snoopers(struct net_bridge *br)
3305
+{
3306
+}
3307
+#endif
3308
+
3309
+void br_multicast_leave_snoopers(struct net_bridge *br)
3310
+{
3311
+ br_ip4_multicast_leave_snoopers(br);
3312
+ br_ip6_multicast_leave_snoopers(br);
20033313 }
20043314
20053315 static void __br_multicast_open(struct net_bridge *br,
....@@ -2007,7 +3317,7 @@
20073317 {
20083318 query->startup_sent = 0;
20093319
2010
- if (br->multicast_disabled)
3320
+ if (!br_opt_get(br, BROPT_MULTICAST_ENABLED))
20113321 return;
20123322
20133323 mod_timer(&query->timer, jiffies);
....@@ -2034,40 +3344,20 @@
20343344
20353345 void br_multicast_dev_del(struct net_bridge *br)
20363346 {
2037
- struct net_bridge_mdb_htable *mdb;
20383347 struct net_bridge_mdb_entry *mp;
2039
- struct hlist_node *n;
2040
- u32 ver;
2041
- int i;
3348
+ HLIST_HEAD(deleted_head);
3349
+ struct hlist_node *tmp;
20423350
20433351 spin_lock_bh(&br->multicast_lock);
2044
- mdb = mlock_dereference(br->mdb, br);
2045
- if (!mdb)
2046
- goto out;
2047
-
2048
- br->mdb = NULL;
2049
-
2050
- ver = mdb->ver;
2051
- for (i = 0; i < mdb->max; i++) {
2052
- hlist_for_each_entry_safe(mp, n, &mdb->mhash[i],
2053
- hlist[ver]) {
2054
- del_timer(&mp->timer);
2055
- call_rcu_bh(&mp->rcu, br_multicast_free_group);
2056
- }
2057
- }
2058
-
2059
- if (mdb->old) {
2060
- spin_unlock_bh(&br->multicast_lock);
2061
- rcu_barrier_bh();
2062
- spin_lock_bh(&br->multicast_lock);
2063
- WARN_ON(mdb->old);
2064
- }
2065
-
2066
- mdb->old = mdb;
2067
- call_rcu_bh(&mdb->rcu, br_mdb_free);
2068
-
2069
-out:
3352
+ hlist_for_each_entry_safe(mp, tmp, &br->mdb_list, mdb_node)
3353
+ br_multicast_del_mdb_entry(mp);
3354
+ hlist_move_list(&br->mcast_gc_list, &deleted_head);
20703355 spin_unlock_bh(&br->multicast_lock);
3356
+
3357
+ br_multicast_gc(&deleted_head);
3358
+ cancel_work_sync(&br->mcast_gc_work);
3359
+
3360
+ rcu_barrier();
20713361 }
20723362
20733363 int br_multicast_set_router(struct net_bridge *br, unsigned long val)
....@@ -2179,52 +3469,59 @@
21793469
21803470 int br_multicast_toggle(struct net_bridge *br, unsigned long val)
21813471 {
2182
- struct net_bridge_mdb_htable *mdb;
21833472 struct net_bridge_port *port;
2184
- int err = 0;
3473
+ bool change_snoopers = false;
21853474
21863475 spin_lock_bh(&br->multicast_lock);
2187
- if (br->multicast_disabled == !val)
3476
+ if (!!br_opt_get(br, BROPT_MULTICAST_ENABLED) == !!val)
21883477 goto unlock;
21893478
2190
- br_mc_disabled_update(br->dev, !val);
2191
- br->multicast_disabled = !val;
2192
- if (br->multicast_disabled)
3479
+ br_mc_disabled_update(br->dev, val);
3480
+ br_opt_toggle(br, BROPT_MULTICAST_ENABLED, !!val);
3481
+ if (!br_opt_get(br, BROPT_MULTICAST_ENABLED)) {
3482
+ change_snoopers = true;
21933483 goto unlock;
3484
+ }
21943485
21953486 if (!netif_running(br->dev))
21963487 goto unlock;
2197
-
2198
- mdb = mlock_dereference(br->mdb, br);
2199
- if (mdb) {
2200
- if (mdb->old) {
2201
- err = -EEXIST;
2202
-rollback:
2203
- br->multicast_disabled = !!val;
2204
- goto unlock;
2205
- }
2206
-
2207
- err = br_mdb_rehash(&br->mdb, mdb->max,
2208
- br->hash_elasticity);
2209
- if (err)
2210
- goto rollback;
2211
- }
22123488
22133489 br_multicast_open(br);
22143490 list_for_each_entry(port, &br->port_list, list)
22153491 __br_multicast_enable_port(port);
22163492
3493
+ change_snoopers = true;
3494
+
22173495 unlock:
22183496 spin_unlock_bh(&br->multicast_lock);
22193497
2220
- return err;
3498
+ /* br_multicast_join_snoopers has the potential to cause
3499
+ * an MLD Report/Leave to be delivered to br_multicast_rcv,
3500
+ * which would in turn call br_multicast_add_group, which would
3501
+ * attempt to acquire multicast_lock. This function should be
3502
+ * called after the lock has been released to avoid deadlocks on
3503
+ * multicast_lock.
3504
+ *
3505
+ * br_multicast_leave_snoopers does not have the problem since
3506
+ * br_multicast_rcv first checks BROPT_MULTICAST_ENABLED, and
3507
+ * returns without calling br_multicast_ipv4/6_rcv if it's not
3508
+ * enabled. Moved both functions out just for symmetry.
3509
+ */
3510
+ if (change_snoopers) {
3511
+ if (br_opt_get(br, BROPT_MULTICAST_ENABLED))
3512
+ br_multicast_join_snoopers(br);
3513
+ else
3514
+ br_multicast_leave_snoopers(br);
3515
+ }
3516
+
3517
+ return 0;
22213518 }
22223519
22233520 bool br_multicast_enabled(const struct net_device *dev)
22243521 {
22253522 struct net_bridge *br = netdev_priv(dev);
22263523
2227
- return !br->multicast_disabled;
3524
+ return !!br_opt_get(br, BROPT_MULTICAST_ENABLED);
22283525 }
22293526 EXPORT_SYMBOL_GPL(br_multicast_enabled);
22303527
....@@ -2247,10 +3544,10 @@
22473544 val = !!val;
22483545
22493546 spin_lock_bh(&br->multicast_lock);
2250
- if (br->multicast_querier == val)
3547
+ if (br_opt_get(br, BROPT_MULTICAST_QUERIER) == val)
22513548 goto unlock;
22523549
2253
- br->multicast_querier = val;
3550
+ br_opt_toggle(br, BROPT_MULTICAST_QUERIER, !!val);
22543551 if (!val)
22553552 goto unlock;
22563553
....@@ -2272,45 +3569,6 @@
22723569 spin_unlock_bh(&br->multicast_lock);
22733570
22743571 return 0;
2275
-}
2276
-
2277
-int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
2278
-{
2279
- int err = -EINVAL;
2280
- u32 old;
2281
- struct net_bridge_mdb_htable *mdb;
2282
-
2283
- spin_lock_bh(&br->multicast_lock);
2284
- if (!is_power_of_2(val))
2285
- goto unlock;
2286
-
2287
- mdb = mlock_dereference(br->mdb, br);
2288
- if (mdb && val < mdb->size)
2289
- goto unlock;
2290
-
2291
- err = 0;
2292
-
2293
- old = br->hash_max;
2294
- br->hash_max = val;
2295
-
2296
- if (mdb) {
2297
- if (mdb->old) {
2298
- err = -EEXIST;
2299
-rollback:
2300
- br->hash_max = old;
2301
- goto unlock;
2302
- }
2303
-
2304
- err = br_mdb_rehash(&br->mdb, br->hash_max,
2305
- br->hash_elasticity);
2306
- if (err)
2307
- goto rollback;
2308
- }
2309
-
2310
-unlock:
2311
- spin_unlock_bh(&br->multicast_lock);
2312
-
2313
- return err;
23143572 }
23153573
23163574 int br_multicast_set_igmp_version(struct net_bridge *br, unsigned long val)
....@@ -2378,7 +3636,7 @@
23783636 int count = 0;
23793637
23803638 rcu_read_lock();
2381
- if (!br_ip_list || !br_port_exists(dev))
3639
+ if (!br_ip_list || !netif_is_bridge_port(dev))
23823640 goto unlock;
23833641
23843642 port = br_port_get_rcu(dev);
....@@ -2396,7 +3654,7 @@
23963654 if (!entry)
23973655 goto unlock;
23983656
2399
- entry->addr = group->addr;
3657
+ entry->addr = group->key.addr;
24003658 list_add(&entry->list, br_ip_list);
24013659 count++;
24023660 }
....@@ -2425,7 +3683,7 @@
24253683 bool ret = false;
24263684
24273685 rcu_read_lock();
2428
- if (!br_port_exists(dev))
3686
+ if (!netif_is_bridge_port(dev))
24293687 goto unlock;
24303688
24313689 port = br_port_get_rcu(dev);
....@@ -2461,7 +3719,7 @@
24613719 bool ret = false;
24623720
24633721 rcu_read_lock();
2464
- if (!br_port_exists(dev))
3722
+ if (!netif_is_bridge_port(dev))
24653723 goto unlock;
24663724
24673725 port = br_port_get_rcu(dev);
....@@ -2571,7 +3829,7 @@
25713829 struct bridge_mcast_stats __percpu *stats;
25723830
25733831 /* if multicast_disabled is true then igmp type can't be set */
2574
- if (!type || !br->multicast_stats_enabled)
3832
+ if (!type || !br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED))
25753833 return;
25763834
25773835 if (p)
....@@ -2598,7 +3856,8 @@
25983856 free_percpu(br->mcast_stats);
25993857 }
26003858
2601
-static void mcast_stats_add_dir(u64 *dst, u64 *src)
3859
+/* noinline for https://bugs.llvm.org/show_bug.cgi?id=45802#c9 */
3860
+static noinline_for_stack void mcast_stats_add_dir(u64 *dst, u64 *src)
26023861 {
26033862 dst[BR_MCAST_DIR_RX] += src[BR_MCAST_DIR_RX];
26043863 dst[BR_MCAST_DIR_TX] += src[BR_MCAST_DIR_TX];
....@@ -2649,3 +3908,26 @@
26493908 }
26503909 memcpy(dest, &tdst, sizeof(*dest));
26513910 }
3911
+
3912
+int br_mdb_hash_init(struct net_bridge *br)
3913
+{
3914
+ int err;
3915
+
3916
+ err = rhashtable_init(&br->sg_port_tbl, &br_sg_port_rht_params);
3917
+ if (err)
3918
+ return err;
3919
+
3920
+ err = rhashtable_init(&br->mdb_hash_tbl, &br_mdb_rht_params);
3921
+ if (err) {
3922
+ rhashtable_destroy(&br->sg_port_tbl);
3923
+ return err;
3924
+ }
3925
+
3926
+ return 0;
3927
+}
3928
+
3929
+void br_mdb_hash_fini(struct net_bridge *br)
3930
+{
3931
+ rhashtable_destroy(&br->sg_port_tbl);
3932
+ rhashtable_destroy(&br->mdb_hash_tbl);
3933
+}