]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - net/bridge/br_multicast.c
bridge: mcast: use names for the different multicast_router types
[thirdparty/kernel/stable.git] / net / bridge / br_multicast.c
CommitLineData
eb1d1641
HX
1/*
2 * Bridge multicast support.
3 *
4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13#include <linux/err.h>
07f8ac4a 14#include <linux/export.h>
eb1d1641
HX
15#include <linux/if_ether.h>
16#include <linux/igmp.h>
17#include <linux/jhash.h>
18#include <linux/kernel.h>
b195167f 19#include <linux/log2.h>
eb1d1641
HX
20#include <linux/netdevice.h>
21#include <linux/netfilter_bridge.h>
22#include <linux/random.h>
23#include <linux/rculist.h>
24#include <linux/skbuff.h>
25#include <linux/slab.h>
26#include <linux/timer.h>
1c8ad5bf 27#include <linux/inetdevice.h>
eb1d1641 28#include <net/ip.h>
dfd56b8b 29#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
30#include <net/ipv6.h>
31#include <net/mld.h>
d4c4f07d 32#include <net/ip6_checksum.h>
3c3769e6 33#include <net/addrconf.h>
08b202b6 34#endif
eb1d1641
HX
35
36#include "br_private.h"
37
cc0fdd80 38static void br_multicast_start_querier(struct net_bridge *br,
90010b36 39 struct bridge_mcast_own_query *query);
754bc547
SA
40static void br_multicast_add_router(struct net_bridge *br,
41 struct net_bridge_port *port);
bc8c20ac
SA
42static void br_ip4_multicast_leave_group(struct net_bridge *br,
43 struct net_bridge_port *port,
44 __be32 group,
45 __u16 vid);
46#if IS_ENABLED(CONFIG_IPV6)
47static void br_ip6_multicast_leave_group(struct net_bridge *br,
48 struct net_bridge_port *port,
49 const struct in6_addr *group,
50 __u16 vid);
51#endif
2ce297fc 52unsigned int br_mdb_rehash_seq;
c83b8fab 53
8ef2a9a5
YH
54static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
55{
56 if (a->proto != b->proto)
57 return 0;
b0e9a30d
VY
58 if (a->vid != b->vid)
59 return 0;
8ef2a9a5
YH
60 switch (a->proto) {
61 case htons(ETH_P_IP):
62 return a->u.ip4 == b->u.ip4;
dfd56b8b 63#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
64 case htons(ETH_P_IPV6):
65 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);
66#endif
8ef2a9a5
YH
67 }
68 return 0;
69}
70
b0e9a30d
VY
71static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip,
72 __u16 vid)
eb1d1641 73{
b0e9a30d 74 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1);
eb1d1641
HX
75}
76
dfd56b8b 77#if IS_ENABLED(CONFIG_IPV6)
08b202b6 78static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
b0e9a30d
VY
79 const struct in6_addr *ip,
80 __u16 vid)
08b202b6 81{
b0e9a30d
VY
82 return jhash_2words(ipv6_addr_hash(ip), vid,
83 mdb->secret) & (mdb->max - 1);
08b202b6
YH
84}
85#endif
86
8ef2a9a5
YH
87static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
88 struct br_ip *ip)
89{
90 switch (ip->proto) {
91 case htons(ETH_P_IP):
b0e9a30d 92 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid);
dfd56b8b 93#if IS_ENABLED(CONFIG_IPV6)
08b202b6 94 case htons(ETH_P_IPV6):
b0e9a30d 95 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid);
08b202b6 96#endif
8ef2a9a5
YH
97 }
98 return 0;
eb1d1641
HX
99}
100
101static struct net_bridge_mdb_entry *__br_mdb_ip_get(
8ef2a9a5 102 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash)
eb1d1641
HX
103{
104 struct net_bridge_mdb_entry *mp;
eb1d1641 105
b67bfe0d 106 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
8ef2a9a5 107 if (br_ip_equal(&mp->addr, dst))
eb1d1641
HX
108 return mp;
109 }
110
111 return NULL;
112}
113
cfd56754
CW
114struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb,
115 struct br_ip *dst)
7f285fa7
HX
116{
117 if (!mdb)
118 return NULL;
119
120 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
121}
122
8ef2a9a5 123static struct net_bridge_mdb_entry *br_mdb_ip4_get(
b0e9a30d 124 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid)
eb1d1641 125{
8ef2a9a5
YH
126 struct br_ip br_dst;
127
128 br_dst.u.ip4 = dst;
129 br_dst.proto = htons(ETH_P_IP);
b0e9a30d 130 br_dst.vid = vid;
0821ec55 131
7f285fa7 132 return br_mdb_ip_get(mdb, &br_dst);
8ef2a9a5
YH
133}
134
dfd56b8b 135#if IS_ENABLED(CONFIG_IPV6)
08b202b6 136static struct net_bridge_mdb_entry *br_mdb_ip6_get(
b0e9a30d
VY
137 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
138 __u16 vid)
08b202b6
YH
139{
140 struct br_ip br_dst;
0821ec55 141
4e3fd7a0 142 br_dst.u.ip6 = *dst;
08b202b6 143 br_dst.proto = htons(ETH_P_IPV6);
b0e9a30d 144 br_dst.vid = vid;
08b202b6 145
7f285fa7 146 return br_mdb_ip_get(mdb, &br_dst);
08b202b6
YH
147}
148#endif
149
eb1d1641 150struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
fbca58a2 151 struct sk_buff *skb, u16 vid)
eb1d1641 152{
e8051688 153 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
8ef2a9a5
YH
154 struct br_ip ip;
155
7f285fa7 156 if (br->multicast_disabled)
eb1d1641
HX
157 return NULL;
158
8ef2a9a5 159 if (BR_INPUT_SKB_CB(skb)->igmp)
eb1d1641
HX
160 return NULL;
161
8ef2a9a5 162 ip.proto = skb->protocol;
fbca58a2 163 ip.vid = vid;
8ef2a9a5 164
eb1d1641
HX
165 switch (skb->protocol) {
166 case htons(ETH_P_IP):
8ef2a9a5
YH
167 ip.u.ip4 = ip_hdr(skb)->daddr;
168 break;
dfd56b8b 169#if IS_ENABLED(CONFIG_IPV6)
08b202b6 170 case htons(ETH_P_IPV6):
4e3fd7a0 171 ip.u.ip6 = ipv6_hdr(skb)->daddr;
08b202b6
YH
172 break;
173#endif
8ef2a9a5
YH
174 default:
175 return NULL;
eb1d1641
HX
176 }
177
8ef2a9a5 178 return br_mdb_ip_get(mdb, &ip);
eb1d1641
HX
179}
180
181static void br_mdb_free(struct rcu_head *head)
182{
183 struct net_bridge_mdb_htable *mdb =
184 container_of(head, struct net_bridge_mdb_htable, rcu);
185 struct net_bridge_mdb_htable *old = mdb->old;
186
187 mdb->old = NULL;
188 kfree(old->mhash);
189 kfree(old);
190}
191
192static int br_mdb_copy(struct net_bridge_mdb_htable *new,
193 struct net_bridge_mdb_htable *old,
194 int elasticity)
195{
196 struct net_bridge_mdb_entry *mp;
eb1d1641
HX
197 int maxlen;
198 int len;
199 int i;
200
201 for (i = 0; i < old->max; i++)
b67bfe0d 202 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver])
eb1d1641 203 hlist_add_head(&mp->hlist[new->ver],
8ef2a9a5 204 &new->mhash[br_ip_hash(new, &mp->addr)]);
eb1d1641
HX
205
206 if (!elasticity)
207 return 0;
208
209 maxlen = 0;
210 for (i = 0; i < new->max; i++) {
211 len = 0;
b67bfe0d 212 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver])
eb1d1641
HX
213 len++;
214 if (len > maxlen)
215 maxlen = len;
216 }
217
218 return maxlen > elasticity ? -EINVAL : 0;
219}
220
cfd56754 221void br_multicast_free_pg(struct rcu_head *head)
eb1d1641
HX
222{
223 struct net_bridge_port_group *p =
224 container_of(head, struct net_bridge_port_group, rcu);
225
226 kfree(p);
227}
228
229static void br_multicast_free_group(struct rcu_head *head)
230{
231 struct net_bridge_mdb_entry *mp =
232 container_of(head, struct net_bridge_mdb_entry, rcu);
233
234 kfree(mp);
235}
236
237static void br_multicast_group_expired(unsigned long data)
238{
239 struct net_bridge_mdb_entry *mp = (void *)data;
240 struct net_bridge *br = mp->br;
241 struct net_bridge_mdb_htable *mdb;
242
243 spin_lock(&br->multicast_lock);
244 if (!netif_running(br->dev) || timer_pending(&mp->timer))
245 goto out;
246
8a870178 247 mp->mglist = false;
eb1d1641
HX
248
249 if (mp->ports)
250 goto out;
251
e8051688
ED
252 mdb = mlock_dereference(br->mdb, br);
253
eb1d1641
HX
254 hlist_del_rcu(&mp->hlist[mdb->ver]);
255 mdb->size--;
256
eb1d1641
HX
257 call_rcu_bh(&mp->rcu, br_multicast_free_group);
258
259out:
260 spin_unlock(&br->multicast_lock);
261}
262
263static void br_multicast_del_pg(struct net_bridge *br,
264 struct net_bridge_port_group *pg)
265{
e8051688 266 struct net_bridge_mdb_htable *mdb;
eb1d1641
HX
267 struct net_bridge_mdb_entry *mp;
268 struct net_bridge_port_group *p;
e8051688
ED
269 struct net_bridge_port_group __rcu **pp;
270
271 mdb = mlock_dereference(br->mdb, br);
eb1d1641 272
8ef2a9a5 273 mp = br_mdb_ip_get(mdb, &pg->addr);
eb1d1641
HX
274 if (WARN_ON(!mp))
275 return;
276
e8051688
ED
277 for (pp = &mp->ports;
278 (p = mlock_dereference(*pp, br)) != NULL;
279 pp = &p->next) {
eb1d1641
HX
280 if (p != pg)
281 continue;
282
83f6a740 283 rcu_assign_pointer(*pp, p->next);
eb1d1641
HX
284 hlist_del_init(&p->mglist);
285 del_timer(&p->timer);
9e8430f8 286 br_mdb_notify(br->dev, p, RTM_DELMDB);
eb1d1641
HX
287 call_rcu_bh(&p->rcu, br_multicast_free_pg);
288
454594f3 289 if (!mp->ports && !mp->mglist &&
eb1d1641
HX
290 netif_running(br->dev))
291 mod_timer(&mp->timer, jiffies);
292
293 return;
294 }
295
296 WARN_ON(1);
297}
298
299static void br_multicast_port_group_expired(unsigned long data)
300{
301 struct net_bridge_port_group *pg = (void *)data;
302 struct net_bridge *br = pg->port->br;
303
304 spin_lock(&br->multicast_lock);
305 if (!netif_running(br->dev) || timer_pending(&pg->timer) ||
9d06b6d8 306 hlist_unhashed(&pg->mglist) || pg->flags & MDB_PG_FLAGS_PERMANENT)
eb1d1641
HX
307 goto out;
308
309 br_multicast_del_pg(br, pg);
310
311out:
312 spin_unlock(&br->multicast_lock);
313}
314
e8051688 315static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
eb1d1641
HX
316 int elasticity)
317{
e8051688 318 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
eb1d1641
HX
319 struct net_bridge_mdb_htable *mdb;
320 int err;
321
322 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
323 if (!mdb)
324 return -ENOMEM;
325
326 mdb->max = max;
327 mdb->old = old;
328
329 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC);
330 if (!mdb->mhash) {
331 kfree(mdb);
332 return -ENOMEM;
333 }
334
335 mdb->size = old ? old->size : 0;
336 mdb->ver = old ? old->ver ^ 1 : 0;
337
338 if (!old || elasticity)
339 get_random_bytes(&mdb->secret, sizeof(mdb->secret));
340 else
341 mdb->secret = old->secret;
342
343 if (!old)
344 goto out;
345
346 err = br_mdb_copy(mdb, old, elasticity);
347 if (err) {
348 kfree(mdb->mhash);
349 kfree(mdb);
350 return err;
351 }
352
2ce297fc 353 br_mdb_rehash_seq++;
eb1d1641
HX
354 call_rcu_bh(&mdb->rcu, br_mdb_free);
355
356out:
357 rcu_assign_pointer(*mdbp, mdb);
358
359 return 0;
360}
361
8ef2a9a5
YH
362static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
363 __be32 group)
eb1d1641
HX
364{
365 struct sk_buff *skb;
366 struct igmphdr *ih;
367 struct ethhdr *eth;
368 struct iphdr *iph;
369
370 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
371 sizeof(*ih) + 4);
372 if (!skb)
373 goto out;
374
375 skb->protocol = htons(ETH_P_IP);
376
377 skb_reset_mac_header(skb);
378 eth = eth_hdr(skb);
379
e5a727f6 380 ether_addr_copy(eth->h_source, br->dev->dev_addr);
eb1d1641
HX
381 eth->h_dest[0] = 1;
382 eth->h_dest[1] = 0;
383 eth->h_dest[2] = 0x5e;
384 eth->h_dest[3] = 0;
385 eth->h_dest[4] = 0;
386 eth->h_dest[5] = 1;
387 eth->h_proto = htons(ETH_P_IP);
388 skb_put(skb, sizeof(*eth));
389
390 skb_set_network_header(skb, skb->len);
391 iph = ip_hdr(skb);
392
393 iph->version = 4;
394 iph->ihl = 6;
395 iph->tos = 0xc0;
396 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4);
397 iph->id = 0;
398 iph->frag_off = htons(IP_DF);
399 iph->ttl = 1;
400 iph->protocol = IPPROTO_IGMP;
1c8ad5bf
CW
401 iph->saddr = br->multicast_query_use_ifaddr ?
402 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0;
eb1d1641
HX
403 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP);
404 ((u8 *)&iph[1])[0] = IPOPT_RA;
405 ((u8 *)&iph[1])[1] = 4;
406 ((u8 *)&iph[1])[2] = 0;
407 ((u8 *)&iph[1])[3] = 0;
408 ip_send_check(iph);
409 skb_put(skb, 24);
410
411 skb_set_transport_header(skb, skb->len);
412 ih = igmp_hdr(skb);
413 ih->type = IGMP_HOST_MEMBERSHIP_QUERY;
414 ih->code = (group ? br->multicast_last_member_interval :
415 br->multicast_query_response_interval) /
416 (HZ / IGMP_TIMER_SCALE);
417 ih->group = group;
418 ih->csum = 0;
419 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
420 skb_put(skb, sizeof(*ih));
421
422 __skb_pull(skb, sizeof(*eth));
423
424out:
425 return skb;
426}
427
dfd56b8b 428#if IS_ENABLED(CONFIG_IPV6)
08b202b6 429static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
b71d1d42 430 const struct in6_addr *group)
08b202b6
YH
431{
432 struct sk_buff *skb;
433 struct ipv6hdr *ip6h;
434 struct mld_msg *mldq;
435 struct ethhdr *eth;
436 u8 *hopopt;
437 unsigned long interval;
438
439 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
440 8 + sizeof(*mldq));
441 if (!skb)
442 goto out;
443
444 skb->protocol = htons(ETH_P_IPV6);
445
446 /* Ethernet header */
447 skb_reset_mac_header(skb);
448 eth = eth_hdr(skb);
449
e5a727f6 450 ether_addr_copy(eth->h_source, br->dev->dev_addr);
08b202b6
YH
451 eth->h_proto = htons(ETH_P_IPV6);
452 skb_put(skb, sizeof(*eth));
453
454 /* IPv6 header + HbH option */
455 skb_set_network_header(skb, skb->len);
456 ip6h = ipv6_hdr(skb);
457
458 *(__force __be32 *)ip6h = htonl(0x60000000);
76d66158 459 ip6h->payload_len = htons(8 + sizeof(*mldq));
08b202b6
YH
460 ip6h->nexthdr = IPPROTO_HOPOPTS;
461 ip6h->hop_limit = 1;
a7bff75b 462 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1));
d1d81d4c
UW
463 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0,
464 &ip6h->saddr)) {
465 kfree_skb(skb);
466 return NULL;
467 }
36cff5a1 468 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest);
08b202b6
YH
469
470 hopopt = (u8 *)(ip6h + 1);
471 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */
472 hopopt[1] = 0; /* length of HbH */
473 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */
474 hopopt[3] = 2; /* Length of RA Option */
475 hopopt[4] = 0; /* Type = 0x0000 (MLD) */
476 hopopt[5] = 0;
1de5a71c
EZ
477 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */
478 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */
08b202b6
YH
479
480 skb_put(skb, sizeof(*ip6h) + 8);
481
482 /* ICMPv6 */
483 skb_set_transport_header(skb, skb->len);
484 mldq = (struct mld_msg *) icmp6_hdr(skb);
485
32de868c
LL
486 interval = ipv6_addr_any(group) ?
487 br->multicast_query_response_interval :
488 br->multicast_last_member_interval;
08b202b6
YH
489
490 mldq->mld_type = ICMPV6_MGM_QUERY;
491 mldq->mld_code = 0;
492 mldq->mld_cksum = 0;
493 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval));
494 mldq->mld_reserved = 0;
4e3fd7a0 495 mldq->mld_mca = *group;
08b202b6
YH
496
497 /* checksum */
498 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
499 sizeof(*mldq), IPPROTO_ICMPV6,
500 csum_partial(mldq,
501 sizeof(*mldq), 0));
502 skb_put(skb, sizeof(*mldq));
503
504 __skb_pull(skb, sizeof(*eth));
505
506out:
507 return skb;
508}
509#endif
510
8ef2a9a5
YH
511static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
512 struct br_ip *addr)
513{
514 switch (addr->proto) {
515 case htons(ETH_P_IP):
516 return br_ip4_multicast_alloc_query(br, addr->u.ip4);
dfd56b8b 517#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
518 case htons(ETH_P_IPV6):
519 return br_ip6_multicast_alloc_query(br, &addr->u.ip6);
520#endif
8ef2a9a5
YH
521 }
522 return NULL;
523}
524
eb1d1641 525static struct net_bridge_mdb_entry *br_multicast_get_group(
8ef2a9a5
YH
526 struct net_bridge *br, struct net_bridge_port *port,
527 struct br_ip *group, int hash)
eb1d1641 528{
e8051688 529 struct net_bridge_mdb_htable *mdb;
eb1d1641 530 struct net_bridge_mdb_entry *mp;
95c96174
ED
531 unsigned int count = 0;
532 unsigned int max;
eb1d1641
HX
533 int elasticity;
534 int err;
535
e8051688 536 mdb = rcu_dereference_protected(br->mdb, 1);
b67bfe0d 537 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
eb1d1641 538 count++;
8ef2a9a5 539 if (unlikely(br_ip_equal(group, &mp->addr)))
eb1d1641 540 return mp;
eb1d1641
HX
541 }
542
543 elasticity = 0;
544 max = mdb->max;
545
546 if (unlikely(count > br->hash_elasticity && count)) {
547 if (net_ratelimit())
28a16c97 548 br_info(br, "Multicast hash table "
549 "chain limit reached: %s\n",
550 port ? port->dev->name : br->dev->name);
eb1d1641
HX
551
552 elasticity = br->hash_elasticity;
553 }
554
555 if (mdb->size >= max) {
556 max *= 2;
036be6db
TG
557 if (unlikely(max > br->hash_max)) {
558 br_warn(br, "Multicast hash table maximum of %d "
559 "reached, disabling snooping: %s\n",
560 br->hash_max,
561 port ? port->dev->name : br->dev->name);
eb1d1641
HX
562 err = -E2BIG;
563disable:
564 br->multicast_disabled = 1;
565 goto err;
566 }
567 }
568
569 if (max > mdb->max || elasticity) {
570 if (mdb->old) {
571 if (net_ratelimit())
28a16c97 572 br_info(br, "Multicast hash table "
573 "on fire: %s\n",
574 port ? port->dev->name : br->dev->name);
eb1d1641
HX
575 err = -EEXIST;
576 goto err;
577 }
578
579 err = br_mdb_rehash(&br->mdb, max, elasticity);
580 if (err) {
28a16c97 581 br_warn(br, "Cannot rehash multicast "
582 "hash table, disabling snooping: %s, %d, %d\n",
583 port ? port->dev->name : br->dev->name,
584 mdb->size, err);
eb1d1641
HX
585 goto disable;
586 }
587
588 err = -EAGAIN;
589 goto err;
590 }
591
592 return NULL;
593
594err:
595 mp = ERR_PTR(err);
596 return mp;
597}
598
cfd56754
CW
599struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br,
600 struct net_bridge_port *port, struct br_ip *group)
eb1d1641 601{
e8051688 602 struct net_bridge_mdb_htable *mdb;
eb1d1641
HX
603 struct net_bridge_mdb_entry *mp;
604 int hash;
4c0833bc 605 int err;
eb1d1641 606
e8051688 607 mdb = rcu_dereference_protected(br->mdb, 1);
eb1d1641 608 if (!mdb) {
4c0833bc
TK
609 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0);
610 if (err)
611 return ERR_PTR(err);
eb1d1641
HX
612 goto rehash;
613 }
614
615 hash = br_ip_hash(mdb, group);
616 mp = br_multicast_get_group(br, port, group, hash);
617 switch (PTR_ERR(mp)) {
618 case 0:
619 break;
620
621 case -EAGAIN:
622rehash:
e8051688 623 mdb = rcu_dereference_protected(br->mdb, 1);
eb1d1641
HX
624 hash = br_ip_hash(mdb, group);
625 break;
626
627 default:
628 goto out;
629 }
630
631 mp = kzalloc(sizeof(*mp), GFP_ATOMIC);
632 if (unlikely(!mp))
4c0833bc 633 return ERR_PTR(-ENOMEM);
eb1d1641
HX
634
635 mp->br = br;
8ef2a9a5 636 mp->addr = *group;
1faabf2a
ED
637 setup_timer(&mp->timer, br_multicast_group_expired,
638 (unsigned long)mp);
639
eb1d1641
HX
640 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]);
641 mdb->size++;
642
643out:
644 return mp;
645}
646
cfd56754
CW
647struct net_bridge_port_group *br_multicast_new_port_group(
648 struct net_bridge_port *port,
649 struct br_ip *group,
ccb1c31a 650 struct net_bridge_port_group __rcu *next,
9d06b6d8 651 unsigned char flags)
cfd56754
CW
652{
653 struct net_bridge_port_group *p;
654
655 p = kzalloc(sizeof(*p), GFP_ATOMIC);
656 if (unlikely(!p))
657 return NULL;
658
659 p->addr = *group;
660 p->port = port;
9d06b6d8 661 p->flags = flags;
eca2a43b 662 rcu_assign_pointer(p->next, next);
cfd56754
CW
663 hlist_add_head(&p->mglist, &port->mglist);
664 setup_timer(&p->timer, br_multicast_port_group_expired,
665 (unsigned long)p);
666 return p;
667}
668
eb1d1641 669static int br_multicast_add_group(struct net_bridge *br,
8ef2a9a5
YH
670 struct net_bridge_port *port,
671 struct br_ip *group)
eb1d1641
HX
672{
673 struct net_bridge_mdb_entry *mp;
674 struct net_bridge_port_group *p;
e8051688 675 struct net_bridge_port_group __rcu **pp;
454594f3 676 unsigned long now = jiffies;
eb1d1641
HX
677 int err;
678
eb1d1641
HX
679 spin_lock(&br->multicast_lock);
680 if (!netif_running(br->dev) ||
681 (port && port->state == BR_STATE_DISABLED))
682 goto out;
683
684 mp = br_multicast_new_group(br, port, group);
685 err = PTR_ERR(mp);
4c0833bc 686 if (IS_ERR(mp))
eb1d1641
HX
687 goto err;
688
689 if (!port) {
8a870178 690 mp->mglist = true;
454594f3 691 mod_timer(&mp->timer, now + br->multicast_membership_interval);
eb1d1641
HX
692 goto out;
693 }
694
e8051688
ED
695 for (pp = &mp->ports;
696 (p = mlock_dereference(*pp, br)) != NULL;
697 pp = &p->next) {
eb1d1641 698 if (p->port == port)
454594f3 699 goto found;
eb1d1641
HX
700 if ((unsigned long)p->port < (unsigned long)port)
701 break;
702 }
703
9d06b6d8 704 p = br_multicast_new_port_group(port, group, *pp, 0);
eb1d1641
HX
705 if (unlikely(!p))
706 goto err;
eb1d1641 707 rcu_assign_pointer(*pp, p);
9e8430f8 708 br_mdb_notify(br->dev, p, RTM_NEWMDB);
eb1d1641 709
454594f3
LL
710found:
711 mod_timer(&p->timer, now + br->multicast_membership_interval);
eb1d1641
HX
712out:
713 err = 0;
714
715err:
716 spin_unlock(&br->multicast_lock);
717 return err;
718}
719
8ef2a9a5
YH
720static int br_ip4_multicast_add_group(struct net_bridge *br,
721 struct net_bridge_port *port,
b0e9a30d
VY
722 __be32 group,
723 __u16 vid)
8ef2a9a5
YH
724{
725 struct br_ip br_group;
726
727 if (ipv4_is_local_multicast(group))
728 return 0;
729
730 br_group.u.ip4 = group;
731 br_group.proto = htons(ETH_P_IP);
b0e9a30d 732 br_group.vid = vid;
8ef2a9a5
YH
733
734 return br_multicast_add_group(br, port, &br_group);
735}
736
dfd56b8b 737#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
738static int br_ip6_multicast_add_group(struct net_bridge *br,
739 struct net_bridge_port *port,
b0e9a30d
VY
740 const struct in6_addr *group,
741 __u16 vid)
08b202b6
YH
742{
743 struct br_ip br_group;
744
3c3769e6 745 if (ipv6_addr_is_ll_all_nodes(group))
08b202b6
YH
746 return 0;
747
4e3fd7a0 748 br_group.u.ip6 = *group;
9cc6e0c4 749 br_group.proto = htons(ETH_P_IPV6);
b0e9a30d 750 br_group.vid = vid;
08b202b6
YH
751
752 return br_multicast_add_group(br, port, &br_group);
753}
754#endif
755
eb1d1641
HX
756static void br_multicast_router_expired(unsigned long data)
757{
758 struct net_bridge_port *port = (void *)data;
759 struct net_bridge *br = port->br;
760
761 spin_lock(&br->multicast_lock);
7f0aec7a 762 if (port->multicast_router != MDB_RTR_TYPE_TEMP_QUERY ||
eb1d1641
HX
763 timer_pending(&port->multicast_router_timer) ||
764 hlist_unhashed(&port->rlist))
765 goto out;
766
767 hlist_del_init_rcu(&port->rlist);
949f1e39 768 br_rtr_notify(br->dev, port, RTM_DELMDB);
eb1d1641
HX
769
770out:
771 spin_unlock(&br->multicast_lock);
772}
773
774static void br_multicast_local_router_expired(unsigned long data)
775{
776}
777
cc0fdd80 778static void br_multicast_querier_expired(struct net_bridge *br,
90010b36 779 struct bridge_mcast_own_query *query)
c83b8fab 780{
c83b8fab
HX
781 spin_lock(&br->multicast_lock);
782 if (!netif_running(br->dev) || br->multicast_disabled)
783 goto out;
784
cc0fdd80 785 br_multicast_start_querier(br, query);
c83b8fab
HX
786
787out:
788 spin_unlock(&br->multicast_lock);
789}
790
cc0fdd80
LL
791static void br_ip4_multicast_querier_expired(unsigned long data)
792{
793 struct net_bridge *br = (void *)data;
794
90010b36 795 br_multicast_querier_expired(br, &br->ip4_own_query);
cc0fdd80
LL
796}
797
798#if IS_ENABLED(CONFIG_IPV6)
799static void br_ip6_multicast_querier_expired(unsigned long data)
800{
801 struct net_bridge *br = (void *)data;
802
90010b36 803 br_multicast_querier_expired(br, &br->ip6_own_query);
cc0fdd80
LL
804}
805#endif
806
dc4eb53a
LL
807static void br_multicast_select_own_querier(struct net_bridge *br,
808 struct br_ip *ip,
809 struct sk_buff *skb)
810{
811 if (ip->proto == htons(ETH_P_IP))
812 br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr;
813#if IS_ENABLED(CONFIG_IPV6)
814 else
815 br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr;
816#endif
817}
818
8ef2a9a5
YH
819static void __br_multicast_send_query(struct net_bridge *br,
820 struct net_bridge_port *port,
821 struct br_ip *ip)
eb1d1641 822{
eb1d1641
HX
823 struct sk_buff *skb;
824
8ef2a9a5 825 skb = br_multicast_alloc_query(br, ip);
eb1d1641 826 if (!skb)
8ef2a9a5 827 return;
eb1d1641
HX
828
829 if (port) {
eb1d1641 830 skb->dev = port->dev;
29a26a56
EB
831 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT,
832 dev_net(port->dev), NULL, skb, NULL, skb->dev,
f0b4eece 833 br_dev_queue_push_xmit);
dc4eb53a
LL
834 } else {
835 br_multicast_select_own_querier(br, ip, skb);
eb1d1641 836 netif_rx(skb);
dc4eb53a 837 }
8ef2a9a5
YH
838}
839
840static void br_multicast_send_query(struct net_bridge *br,
cc0fdd80 841 struct net_bridge_port *port,
90010b36 842 struct bridge_mcast_own_query *own_query)
8ef2a9a5
YH
843{
844 unsigned long time;
845 struct br_ip br_group;
90010b36 846 struct bridge_mcast_other_query *other_query = NULL;
8ef2a9a5
YH
847
848 if (!netif_running(br->dev) || br->multicast_disabled ||
cc0fdd80 849 !br->multicast_querier)
8ef2a9a5
YH
850 return;
851
08b202b6
YH
852 memset(&br_group.u, 0, sizeof(br_group.u));
853
90010b36
LL
854 if (port ? (own_query == &port->ip4_own_query) :
855 (own_query == &br->ip4_own_query)) {
856 other_query = &br->ip4_other_query;
cc0fdd80 857 br_group.proto = htons(ETH_P_IP);
dfd56b8b 858#if IS_ENABLED(CONFIG_IPV6)
cc0fdd80 859 } else {
90010b36 860 other_query = &br->ip6_other_query;
cc0fdd80 861 br_group.proto = htons(ETH_P_IPV6);
08b202b6 862#endif
cc0fdd80
LL
863 }
864
90010b36 865 if (!other_query || timer_pending(&other_query->timer))
cc0fdd80
LL
866 return;
867
868 __br_multicast_send_query(br, port, &br_group);
eb1d1641 869
eb1d1641 870 time = jiffies;
90010b36 871 time += own_query->startup_sent < br->multicast_startup_query_count ?
eb1d1641
HX
872 br->multicast_startup_query_interval :
873 br->multicast_query_interval;
90010b36 874 mod_timer(&own_query->timer, time);
eb1d1641
HX
875}
876
90010b36
LL
877static void
878br_multicast_port_query_expired(struct net_bridge_port *port,
879 struct bridge_mcast_own_query *query)
eb1d1641 880{
eb1d1641
HX
881 struct net_bridge *br = port->br;
882
883 spin_lock(&br->multicast_lock);
02a780c0
DC
884 if (port->state == BR_STATE_DISABLED ||
885 port->state == BR_STATE_BLOCKING)
eb1d1641
HX
886 goto out;
887
cc0fdd80
LL
888 if (query->startup_sent < br->multicast_startup_query_count)
889 query->startup_sent++;
eb1d1641 890
cc0fdd80 891 br_multicast_send_query(port->br, port, query);
eb1d1641
HX
892
893out:
894 spin_unlock(&br->multicast_lock);
895}
896
cc0fdd80
LL
897static void br_ip4_multicast_port_query_expired(unsigned long data)
898{
899 struct net_bridge_port *port = (void *)data;
900
90010b36 901 br_multicast_port_query_expired(port, &port->ip4_own_query);
cc0fdd80
LL
902}
903
904#if IS_ENABLED(CONFIG_IPV6)
905static void br_ip6_multicast_port_query_expired(unsigned long data)
906{
907 struct net_bridge_port *port = (void *)data;
908
90010b36 909 br_multicast_port_query_expired(port, &port->ip6_own_query);
cc0fdd80
LL
910}
911#endif
912
eb1d1641
HX
913void br_multicast_add_port(struct net_bridge_port *port)
914{
7f0aec7a 915 port->multicast_router = MDB_RTR_TYPE_TEMP_QUERY;
eb1d1641
HX
916
917 setup_timer(&port->multicast_router_timer, br_multicast_router_expired,
918 (unsigned long)port);
90010b36
LL
919 setup_timer(&port->ip4_own_query.timer,
920 br_ip4_multicast_port_query_expired, (unsigned long)port);
cc0fdd80 921#if IS_ENABLED(CONFIG_IPV6)
90010b36
LL
922 setup_timer(&port->ip6_own_query.timer,
923 br_ip6_multicast_port_query_expired, (unsigned long)port);
cc0fdd80 924#endif
eb1d1641
HX
925}
926
927void br_multicast_del_port(struct net_bridge_port *port)
928{
e10177ab
SA
929 struct net_bridge *br = port->br;
930 struct net_bridge_port_group *pg;
931 struct hlist_node *n;
932
933 /* Take care of the remaining groups, only perm ones should be left */
934 spin_lock_bh(&br->multicast_lock);
935 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
936 br_multicast_del_pg(br, pg);
937 spin_unlock_bh(&br->multicast_lock);
eb1d1641
HX
938 del_timer_sync(&port->multicast_router_timer);
939}
940
90010b36 941static void br_multicast_enable(struct bridge_mcast_own_query *query)
561f1103 942{
cc0fdd80 943 query->startup_sent = 0;
561f1103 944
cc0fdd80
LL
945 if (try_to_del_timer_sync(&query->timer) >= 0 ||
946 del_timer(&query->timer))
947 mod_timer(&query->timer, jiffies);
561f1103
HX
948}
949
eb1d1641
HX
950void br_multicast_enable_port(struct net_bridge_port *port)
951{
952 struct net_bridge *br = port->br;
953
954 spin_lock(&br->multicast_lock);
955 if (br->multicast_disabled || !netif_running(br->dev))
956 goto out;
957
90010b36 958 br_multicast_enable(&port->ip4_own_query);
cc0fdd80 959#if IS_ENABLED(CONFIG_IPV6)
90010b36 960 br_multicast_enable(&port->ip6_own_query);
cc0fdd80 961#endif
7f0aec7a
NA
962 if (port->multicast_router == MDB_RTR_TYPE_PERM &&
963 hlist_unhashed(&port->rlist))
754bc547 964 br_multicast_add_router(br, port);
eb1d1641
HX
965
966out:
967 spin_unlock(&br->multicast_lock);
968}
969
970void br_multicast_disable_port(struct net_bridge_port *port)
971{
972 struct net_bridge *br = port->br;
973 struct net_bridge_port_group *pg;
b67bfe0d 974 struct hlist_node *n;
eb1d1641
HX
975
976 spin_lock(&br->multicast_lock);
b67bfe0d 977 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
9d06b6d8 978 if (!(pg->flags & MDB_PG_FLAGS_PERMANENT))
e10177ab 979 br_multicast_del_pg(br, pg);
eb1d1641 980
949f1e39 981 if (!hlist_unhashed(&port->rlist)) {
eb1d1641 982 hlist_del_init_rcu(&port->rlist);
949f1e39
SA
983 br_rtr_notify(br->dev, port, RTM_DELMDB);
984 }
eb1d1641 985 del_timer(&port->multicast_router_timer);
90010b36 986 del_timer(&port->ip4_own_query.timer);
cc0fdd80 987#if IS_ENABLED(CONFIG_IPV6)
90010b36 988 del_timer(&port->ip6_own_query.timer);
cc0fdd80 989#endif
eb1d1641
HX
990 spin_unlock(&br->multicast_lock);
991}
992
8ef2a9a5
YH
993static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
994 struct net_bridge_port *port,
06499098
VY
995 struct sk_buff *skb,
996 u16 vid)
eb1d1641
HX
997{
998 struct igmpv3_report *ih;
999 struct igmpv3_grec *grec;
1000 int i;
1001 int len;
1002 int num;
1003 int type;
1004 int err = 0;
1005 __be32 group;
1006
eb1d1641
HX
1007 ih = igmpv3_report_hdr(skb);
1008 num = ntohs(ih->ngrec);
c2d4fbd2 1009 len = skb_transport_offset(skb) + sizeof(*ih);
eb1d1641
HX
1010
1011 for (i = 0; i < num; i++) {
1012 len += sizeof(*grec);
1013 if (!pskb_may_pull(skb, len))
1014 return -EINVAL;
1015
fd218cf9 1016 grec = (void *)(skb->data + len - sizeof(*grec));
eb1d1641
HX
1017 group = grec->grec_mca;
1018 type = grec->grec_type;
1019
8eabf95c 1020 len += ntohs(grec->grec_nsrcs) * 4;
eb1d1641
HX
1021 if (!pskb_may_pull(skb, len))
1022 return -EINVAL;
1023
1024 /* We treat this as an IGMPv2 report for now. */
1025 switch (type) {
1026 case IGMPV3_MODE_IS_INCLUDE:
1027 case IGMPV3_MODE_IS_EXCLUDE:
1028 case IGMPV3_CHANGE_TO_INCLUDE:
1029 case IGMPV3_CHANGE_TO_EXCLUDE:
1030 case IGMPV3_ALLOW_NEW_SOURCES:
1031 case IGMPV3_BLOCK_OLD_SOURCES:
1032 break;
1033
1034 default:
1035 continue;
1036 }
1037
bc8c20ac
SA
1038 if ((type == IGMPV3_CHANGE_TO_INCLUDE ||
1039 type == IGMPV3_MODE_IS_INCLUDE) &&
1040 ntohs(grec->grec_nsrcs) == 0) {
1041 br_ip4_multicast_leave_group(br, port, group, vid);
1042 } else {
1043 err = br_ip4_multicast_add_group(br, port, group, vid);
1044 if (err)
1045 break;
1046 }
eb1d1641
HX
1047 }
1048
1049 return err;
1050}
1051
dfd56b8b 1052#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
1053static int br_ip6_multicast_mld2_report(struct net_bridge *br,
1054 struct net_bridge_port *port,
06499098
VY
1055 struct sk_buff *skb,
1056 u16 vid)
08b202b6
YH
1057{
1058 struct icmp6hdr *icmp6h;
1059 struct mld2_grec *grec;
1060 int i;
1061 int len;
1062 int num;
1063 int err = 0;
1064
1065 if (!pskb_may_pull(skb, sizeof(*icmp6h)))
1066 return -EINVAL;
1067
1068 icmp6h = icmp6_hdr(skb);
1069 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]);
c2d4fbd2 1070 len = skb_transport_offset(skb) + sizeof(*icmp6h);
08b202b6
YH
1071
1072 for (i = 0; i < num; i++) {
1073 __be16 *nsrcs, _nsrcs;
1074
1075 nsrcs = skb_header_pointer(skb,
1076 len + offsetof(struct mld2_grec,
649e984d 1077 grec_nsrcs),
08b202b6
YH
1078 sizeof(_nsrcs), &_nsrcs);
1079 if (!nsrcs)
1080 return -EINVAL;
1081
1082 if (!pskb_may_pull(skb,
1083 len + sizeof(*grec) +
d41db9f3 1084 sizeof(struct in6_addr) * ntohs(*nsrcs)))
08b202b6
YH
1085 return -EINVAL;
1086
1087 grec = (struct mld2_grec *)(skb->data + len);
d41db9f3
LL
1088 len += sizeof(*grec) +
1089 sizeof(struct in6_addr) * ntohs(*nsrcs);
08b202b6
YH
1090
1091 /* We treat these as MLDv1 reports for now. */
1092 switch (grec->grec_type) {
1093 case MLD2_MODE_IS_INCLUDE:
1094 case MLD2_MODE_IS_EXCLUDE:
1095 case MLD2_CHANGE_TO_INCLUDE:
1096 case MLD2_CHANGE_TO_EXCLUDE:
1097 case MLD2_ALLOW_NEW_SOURCES:
1098 case MLD2_BLOCK_OLD_SOURCES:
1099 break;
1100
1101 default:
1102 continue;
1103 }
1104
bc8c20ac
SA
1105 if ((grec->grec_type == MLD2_CHANGE_TO_INCLUDE ||
1106 grec->grec_type == MLD2_MODE_IS_INCLUDE) &&
1107 ntohs(*nsrcs) == 0) {
1108 br_ip6_multicast_leave_group(br, port, &grec->grec_mca,
1109 vid);
1110 } else {
1111 err = br_ip6_multicast_add_group(br, port,
1112 &grec->grec_mca, vid);
1113 if (!err)
1114 break;
1115 }
08b202b6
YH
1116 }
1117
1118 return err;
1119}
1120#endif
1121
dc4eb53a 1122static bool br_ip4_multicast_select_querier(struct net_bridge *br,
2cd41431 1123 struct net_bridge_port *port,
dc4eb53a
LL
1124 __be32 saddr)
1125{
1126 if (!timer_pending(&br->ip4_own_query.timer) &&
1127 !timer_pending(&br->ip4_other_query.timer))
1128 goto update;
1129
1130 if (!br->ip4_querier.addr.u.ip4)
1131 goto update;
1132
1133 if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4))
1134 goto update;
1135
1136 return false;
1137
1138update:
1139 br->ip4_querier.addr.u.ip4 = saddr;
1140
2cd41431
LL
1141 /* update protected by general multicast_lock by caller */
1142 rcu_assign_pointer(br->ip4_querier.port, port);
1143
dc4eb53a
LL
1144 return true;
1145}
1146
1147#if IS_ENABLED(CONFIG_IPV6)
1148static bool br_ip6_multicast_select_querier(struct net_bridge *br,
2cd41431 1149 struct net_bridge_port *port,
dc4eb53a
LL
1150 struct in6_addr *saddr)
1151{
1152 if (!timer_pending(&br->ip6_own_query.timer) &&
1153 !timer_pending(&br->ip6_other_query.timer))
1154 goto update;
1155
1156 if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0)
1157 goto update;
1158
1159 return false;
1160
1161update:
1162 br->ip6_querier.addr.u.ip6 = *saddr;
1163
2cd41431
LL
1164 /* update protected by general multicast_lock by caller */
1165 rcu_assign_pointer(br->ip6_querier.port, port);
1166
dc4eb53a
LL
1167 return true;
1168}
1169#endif
1170
1171static bool br_multicast_select_querier(struct net_bridge *br,
2cd41431 1172 struct net_bridge_port *port,
dc4eb53a
LL
1173 struct br_ip *saddr)
1174{
1175 switch (saddr->proto) {
1176 case htons(ETH_P_IP):
2cd41431 1177 return br_ip4_multicast_select_querier(br, port, saddr->u.ip4);
dc4eb53a
LL
1178#if IS_ENABLED(CONFIG_IPV6)
1179 case htons(ETH_P_IPV6):
2cd41431 1180 return br_ip6_multicast_select_querier(br, port, &saddr->u.ip6);
dc4eb53a
LL
1181#endif
1182 }
1183
1184 return false;
1185}
1186
cc0fdd80 1187static void
90010b36
LL
1188br_multicast_update_query_timer(struct net_bridge *br,
1189 struct bridge_mcast_other_query *query,
1190 unsigned long max_delay)
b00589af 1191{
90010b36
LL
1192 if (!timer_pending(&query->timer))
1193 query->delay_time = jiffies + max_delay;
b00589af 1194
90010b36 1195 mod_timer(&query->timer, jiffies + br->multicast_querier_interval);
b00589af
LL
1196}
1197
7e80c124 1198/*
7c77602f 1199 * Add port to router_list
7e80c124 1200 * list is maintained ordered by pointer value
1201 * and locked by br->multicast_lock and RCU
1202 */
0909e117
HX
1203static void br_multicast_add_router(struct net_bridge *br,
1204 struct net_bridge_port *port)
1205{
dcdca2c4 1206 struct net_bridge_port *p;
b67bfe0d 1207 struct hlist_node *slot = NULL;
dcdca2c4 1208
1a040eac
NA
1209 if (!hlist_unhashed(&port->rlist))
1210 return;
1211
b67bfe0d 1212 hlist_for_each_entry(p, &br->router_list, rlist) {
7e80c124 1213 if ((unsigned long) port >= (unsigned long) p)
1214 break;
b67bfe0d 1215 slot = &p->rlist;
dcdca2c4 1216 }
1217
7e80c124 1218 if (slot)
1d023284 1219 hlist_add_behind_rcu(&port->rlist, slot);
dcdca2c4 1220 else
1221 hlist_add_head_rcu(&port->rlist, &br->router_list);
949f1e39 1222 br_rtr_notify(br->dev, port, RTM_NEWMDB);
0909e117
HX
1223}
1224
eb1d1641
HX
1225static void br_multicast_mark_router(struct net_bridge *br,
1226 struct net_bridge_port *port)
1227{
1228 unsigned long now = jiffies;
eb1d1641
HX
1229
1230 if (!port) {
7f0aec7a 1231 if (br->multicast_router == MDB_RTR_TYPE_TEMP_QUERY)
eb1d1641
HX
1232 mod_timer(&br->multicast_router_timer,
1233 now + br->multicast_querier_interval);
1234 return;
1235 }
1236
7f0aec7a 1237 if (port->multicast_router != MDB_RTR_TYPE_TEMP_QUERY)
eb1d1641
HX
1238 return;
1239
0909e117 1240 br_multicast_add_router(br, port);
eb1d1641 1241
eb1d1641
HX
1242 mod_timer(&port->multicast_router_timer,
1243 now + br->multicast_querier_interval);
1244}
1245
1246static void br_multicast_query_received(struct net_bridge *br,
1247 struct net_bridge_port *port,
90010b36 1248 struct bridge_mcast_other_query *query,
dc4eb53a 1249 struct br_ip *saddr,
b00589af 1250 unsigned long max_delay)
eb1d1641 1251{
2cd41431 1252 if (!br_multicast_select_querier(br, port, saddr))
eb1d1641
HX
1253 return;
1254
dc4eb53a 1255 br_multicast_update_query_timer(br, query, max_delay);
eb1d1641
HX
1256 br_multicast_mark_router(br, port);
1257}
1258
8ef2a9a5
YH
1259static int br_ip4_multicast_query(struct net_bridge *br,
1260 struct net_bridge_port *port,
06499098
VY
1261 struct sk_buff *skb,
1262 u16 vid)
eb1d1641 1263{
b71d1d42 1264 const struct iphdr *iph = ip_hdr(skb);
eb1d1641
HX
1265 struct igmphdr *ih = igmp_hdr(skb);
1266 struct net_bridge_mdb_entry *mp;
1267 struct igmpv3_query *ih3;
1268 struct net_bridge_port_group *p;
e8051688 1269 struct net_bridge_port_group __rcu **pp;
dc4eb53a 1270 struct br_ip saddr;
eb1d1641
HX
1271 unsigned long max_delay;
1272 unsigned long now = jiffies;
1273 __be32 group;
bec68ff1 1274 int err = 0;
eb1d1641
HX
1275
1276 spin_lock(&br->multicast_lock);
1277 if (!netif_running(br->dev) ||
1278 (port && port->state == BR_STATE_DISABLED))
1279 goto out;
1280
eb1d1641
HX
1281 group = ih->group;
1282
1283 if (skb->len == sizeof(*ih)) {
1284 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE);
1285
1286 if (!max_delay) {
1287 max_delay = 10 * HZ;
1288 group = 0;
1289 }
9afd85c9 1290 } else if (skb->len >= sizeof(*ih3)) {
eb1d1641
HX
1291 ih3 = igmpv3_query_hdr(skb);
1292 if (ih3->nsrcs)
bec68ff1 1293 goto out;
eb1d1641 1294
0ba8c9ec
YH
1295 max_delay = ih3->code ?
1296 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1;
9afd85c9 1297 } else {
9ed973cc
LL
1298 goto out;
1299 }
1300
dc4eb53a
LL
1301 if (!group) {
1302 saddr.proto = htons(ETH_P_IP);
1303 saddr.u.ip4 = iph->saddr;
b00589af 1304
dc4eb53a
LL
1305 br_multicast_query_received(br, port, &br->ip4_other_query,
1306 &saddr, max_delay);
eb1d1641 1307 goto out;
dc4eb53a 1308 }
eb1d1641 1309
b0e9a30d 1310 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid);
eb1d1641
HX
1311 if (!mp)
1312 goto out;
1313
1314 max_delay *= br->multicast_last_member_count;
1315
8a870178 1316 if (mp->mglist &&
eb1d1641
HX
1317 (timer_pending(&mp->timer) ?
1318 time_after(mp->timer.expires, now + max_delay) :
1319 try_to_del_timer_sync(&mp->timer) >= 0))
1320 mod_timer(&mp->timer, now + max_delay);
1321
e8051688
ED
1322 for (pp = &mp->ports;
1323 (p = mlock_dereference(*pp, br)) != NULL;
1324 pp = &p->next) {
eb1d1641
HX
1325 if (timer_pending(&p->timer) ?
1326 time_after(p->timer.expires, now + max_delay) :
1327 try_to_del_timer_sync(&p->timer) >= 0)
24f9cdcb 1328 mod_timer(&p->timer, now + max_delay);
eb1d1641
HX
1329 }
1330
1331out:
1332 spin_unlock(&br->multicast_lock);
bec68ff1 1333 return err;
eb1d1641
HX
1334}
1335
dfd56b8b 1336#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
1337static int br_ip6_multicast_query(struct net_bridge *br,
1338 struct net_bridge_port *port,
06499098
VY
1339 struct sk_buff *skb,
1340 u16 vid)
08b202b6 1341{
b71d1d42 1342 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
eca2a43b 1343 struct mld_msg *mld;
08b202b6
YH
1344 struct net_bridge_mdb_entry *mp;
1345 struct mld2_query *mld2q;
e8051688
ED
1346 struct net_bridge_port_group *p;
1347 struct net_bridge_port_group __rcu **pp;
dc4eb53a 1348 struct br_ip saddr;
08b202b6
YH
1349 unsigned long max_delay;
1350 unsigned long now = jiffies;
b71d1d42 1351 const struct in6_addr *group = NULL;
9ed973cc 1352 bool is_general_query;
08b202b6
YH
1353 int err = 0;
1354
1355 spin_lock(&br->multicast_lock);
1356 if (!netif_running(br->dev) ||
1357 (port && port->state == BR_STATE_DISABLED))
1358 goto out;
1359
08b202b6
YH
1360 if (skb->len == sizeof(*mld)) {
1361 if (!pskb_may_pull(skb, sizeof(*mld))) {
1362 err = -EINVAL;
1363 goto out;
1364 }
1365 mld = (struct mld_msg *) icmp6_hdr(skb);
4715213d 1366 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay));
08b202b6
YH
1367 if (max_delay)
1368 group = &mld->mld_mca;
248ba8ec 1369 } else {
08b202b6
YH
1370 if (!pskb_may_pull(skb, sizeof(*mld2q))) {
1371 err = -EINVAL;
1372 goto out;
1373 }
1374 mld2q = (struct mld2_query *)icmp6_hdr(skb);
1375 if (!mld2q->mld2q_nsrcs)
1376 group = &mld2q->mld2q_mca;
e3f5b170
DB
1377
1378 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL);
08b202b6
YH
1379 }
1380
9ed973cc
LL
1381 is_general_query = group && ipv6_addr_any(group);
1382
dc4eb53a
LL
1383 if (is_general_query) {
1384 saddr.proto = htons(ETH_P_IPV6);
1385 saddr.u.ip6 = ip6h->saddr;
b00589af 1386
dc4eb53a
LL
1387 br_multicast_query_received(br, port, &br->ip6_other_query,
1388 &saddr, max_delay);
08b202b6 1389 goto out;
6c03ee8b
LL
1390 } else if (!group) {
1391 goto out;
dc4eb53a 1392 }
08b202b6 1393
b0e9a30d 1394 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid);
08b202b6
YH
1395 if (!mp)
1396 goto out;
1397
1398 max_delay *= br->multicast_last_member_count;
8a870178 1399 if (mp->mglist &&
08b202b6
YH
1400 (timer_pending(&mp->timer) ?
1401 time_after(mp->timer.expires, now + max_delay) :
1402 try_to_del_timer_sync(&mp->timer) >= 0))
1403 mod_timer(&mp->timer, now + max_delay);
1404
e8051688
ED
1405 for (pp = &mp->ports;
1406 (p = mlock_dereference(*pp, br)) != NULL;
1407 pp = &p->next) {
08b202b6
YH
1408 if (timer_pending(&p->timer) ?
1409 time_after(p->timer.expires, now + max_delay) :
1410 try_to_del_timer_sync(&p->timer) >= 0)
24f9cdcb 1411 mod_timer(&p->timer, now + max_delay);
08b202b6
YH
1412 }
1413
1414out:
1415 spin_unlock(&br->multicast_lock);
1416 return err;
1417}
1418#endif
1419
90010b36
LL
1420static void
1421br_multicast_leave_group(struct net_bridge *br,
1422 struct net_bridge_port *port,
1423 struct br_ip *group,
1424 struct bridge_mcast_other_query *other_query,
1425 struct bridge_mcast_own_query *own_query)
eb1d1641
HX
1426{
1427 struct net_bridge_mdb_htable *mdb;
1428 struct net_bridge_mdb_entry *mp;
1429 struct net_bridge_port_group *p;
1430 unsigned long now;
1431 unsigned long time;
1432
eb1d1641
HX
1433 spin_lock(&br->multicast_lock);
1434 if (!netif_running(br->dev) ||
544586f7 1435 (port && port->state == BR_STATE_DISABLED))
eb1d1641
HX
1436 goto out;
1437
e8051688 1438 mdb = mlock_dereference(br->mdb, br);
eb1d1641
HX
1439 mp = br_mdb_ip_get(mdb, group);
1440 if (!mp)
1441 goto out;
1442
544586f7
SA
1443 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) {
1444 struct net_bridge_port_group __rcu **pp;
1445
1446 for (pp = &mp->ports;
1447 (p = mlock_dereference(*pp, br)) != NULL;
1448 pp = &p->next) {
1449 if (p->port != port)
1450 continue;
1451
1452 rcu_assign_pointer(*pp, p->next);
1453 hlist_del_init(&p->mglist);
1454 del_timer(&p->timer);
1455 call_rcu_bh(&p->rcu, br_multicast_free_pg);
9e8430f8 1456 br_mdb_notify(br->dev, p, RTM_DELMDB);
544586f7
SA
1457
1458 if (!mp->ports && !mp->mglist &&
1459 netif_running(br->dev))
1460 mod_timer(&mp->timer, jiffies);
1461 }
1462 goto out;
1463 }
1464
1465 if (timer_pending(&other_query->timer))
1466 goto out;
1467
cc0fdd80 1468 if (br->multicast_querier) {
6b7df111
CW
1469 __br_multicast_send_query(br, port, &mp->addr);
1470
1471 time = jiffies + br->multicast_last_member_count *
1472 br->multicast_last_member_interval;
cc0fdd80 1473
90010b36 1474 mod_timer(&own_query->timer, time);
6b7df111
CW
1475
1476 for (p = mlock_dereference(mp->ports, br);
1477 p != NULL;
1478 p = mlock_dereference(p->next, br)) {
1479 if (p->port != port)
1480 continue;
1481
1482 if (!hlist_unhashed(&p->mglist) &&
1483 (timer_pending(&p->timer) ?
1484 time_after(p->timer.expires, time) :
1485 try_to_del_timer_sync(&p->timer) >= 0)) {
1486 mod_timer(&p->timer, time);
1487 }
1488
1489 break;
1490 }
1491 }
1492
eb1d1641
HX
1493 now = jiffies;
1494 time = now + br->multicast_last_member_count *
1495 br->multicast_last_member_interval;
1496
1497 if (!port) {
454594f3 1498 if (mp->mglist &&
eb1d1641
HX
1499 (timer_pending(&mp->timer) ?
1500 time_after(mp->timer.expires, time) :
1501 try_to_del_timer_sync(&mp->timer) >= 0)) {
1502 mod_timer(&mp->timer, time);
eb1d1641 1503 }
454594f3
LL
1504
1505 goto out;
1506 }
1507
1508 for (p = mlock_dereference(mp->ports, br);
1509 p != NULL;
1510 p = mlock_dereference(p->next, br)) {
1511 if (p->port != port)
1512 continue;
1513
1514 if (!hlist_unhashed(&p->mglist) &&
1515 (timer_pending(&p->timer) ?
1516 time_after(p->timer.expires, time) :
1517 try_to_del_timer_sync(&p->timer) >= 0)) {
1518 mod_timer(&p->timer, time);
1519 }
1520
1521 break;
eb1d1641 1522 }
eb1d1641
HX
1523out:
1524 spin_unlock(&br->multicast_lock);
1525}
1526
8ef2a9a5
YH
1527static void br_ip4_multicast_leave_group(struct net_bridge *br,
1528 struct net_bridge_port *port,
b0e9a30d
VY
1529 __be32 group,
1530 __u16 vid)
8ef2a9a5
YH
1531{
1532 struct br_ip br_group;
90010b36 1533 struct bridge_mcast_own_query *own_query;
8ef2a9a5
YH
1534
1535 if (ipv4_is_local_multicast(group))
1536 return;
1537
90010b36
LL
1538 own_query = port ? &port->ip4_own_query : &br->ip4_own_query;
1539
8ef2a9a5
YH
1540 br_group.u.ip4 = group;
1541 br_group.proto = htons(ETH_P_IP);
b0e9a30d 1542 br_group.vid = vid;
8ef2a9a5 1543
90010b36
LL
1544 br_multicast_leave_group(br, port, &br_group, &br->ip4_other_query,
1545 own_query);
8ef2a9a5
YH
1546}
1547
dfd56b8b 1548#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
1549static void br_ip6_multicast_leave_group(struct net_bridge *br,
1550 struct net_bridge_port *port,
b0e9a30d
VY
1551 const struct in6_addr *group,
1552 __u16 vid)
08b202b6
YH
1553{
1554 struct br_ip br_group;
90010b36 1555 struct bridge_mcast_own_query *own_query;
08b202b6 1556
3c3769e6 1557 if (ipv6_addr_is_ll_all_nodes(group))
08b202b6
YH
1558 return;
1559
90010b36
LL
1560 own_query = port ? &port->ip6_own_query : &br->ip6_own_query;
1561
4e3fd7a0 1562 br_group.u.ip6 = *group;
08b202b6 1563 br_group.proto = htons(ETH_P_IPV6);
b0e9a30d 1564 br_group.vid = vid;
08b202b6 1565
90010b36
LL
1566 br_multicast_leave_group(br, port, &br_group, &br->ip6_other_query,
1567 own_query);
08b202b6
YH
1568}
1569#endif
8ef2a9a5 1570
eb1d1641
HX
1571static int br_multicast_ipv4_rcv(struct net_bridge *br,
1572 struct net_bridge_port *port,
06499098
VY
1573 struct sk_buff *skb,
1574 u16 vid)
eb1d1641 1575{
9afd85c9 1576 struct sk_buff *skb_trimmed = NULL;
eb1d1641 1577 struct igmphdr *ih;
eb1d1641
HX
1578 int err;
1579
9afd85c9 1580 err = ip_mc_check_igmp(skb, &skb_trimmed);
eb1d1641 1581
9afd85c9
LL
1582 if (err == -ENOMSG) {
1583 if (!ipv4_is_local_multicast(ip_hdr(skb)->daddr))
bd4265fe 1584 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
eb1d1641 1585 return 0;
9afd85c9
LL
1586 } else if (err < 0) {
1587 return err;
bd4265fe 1588 }
eb1d1641 1589
eb1d1641 1590 BR_INPUT_SKB_CB(skb)->igmp = 1;
9afd85c9 1591 ih = igmp_hdr(skb);
eb1d1641
HX
1592
1593 switch (ih->type) {
1594 case IGMP_HOST_MEMBERSHIP_REPORT:
1595 case IGMPV2_HOST_MEMBERSHIP_REPORT:
62b2bcb4 1596 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
b0e9a30d 1597 err = br_ip4_multicast_add_group(br, port, ih->group, vid);
eb1d1641
HX
1598 break;
1599 case IGMPV3_HOST_MEMBERSHIP_REPORT:
9afd85c9 1600 err = br_ip4_multicast_igmp3_report(br, port, skb_trimmed, vid);
eb1d1641
HX
1601 break;
1602 case IGMP_HOST_MEMBERSHIP_QUERY:
9afd85c9 1603 err = br_ip4_multicast_query(br, port, skb_trimmed, vid);
eb1d1641
HX
1604 break;
1605 case IGMP_HOST_LEAVE_MESSAGE:
b0e9a30d 1606 br_ip4_multicast_leave_group(br, port, ih->group, vid);
eb1d1641
HX
1607 break;
1608 }
1609
a516993f 1610 if (skb_trimmed && skb_trimmed != skb)
9afd85c9
LL
1611 kfree_skb(skb_trimmed);
1612
eb1d1641
HX
1613 return err;
1614}
1615
dfd56b8b 1616#if IS_ENABLED(CONFIG_IPV6)
08b202b6
YH
1617static int br_multicast_ipv6_rcv(struct net_bridge *br,
1618 struct net_bridge_port *port,
06499098
VY
1619 struct sk_buff *skb,
1620 u16 vid)
08b202b6 1621{
9afd85c9
LL
1622 struct sk_buff *skb_trimmed = NULL;
1623 struct mld_msg *mld;
08b202b6
YH
1624 int err;
1625
9afd85c9 1626 err = ipv6_mc_check_mld(skb, &skb_trimmed);
08b202b6 1627
9afd85c9
LL
1628 if (err == -ENOMSG) {
1629 if (!ipv6_addr_is_ll_all_nodes(&ipv6_hdr(skb)->daddr))
1630 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
08b202b6 1631 return 0;
9afd85c9
LL
1632 } else if (err < 0) {
1633 return err;
08b202b6
YH
1634 }
1635
08b202b6 1636 BR_INPUT_SKB_CB(skb)->igmp = 1;
9afd85c9 1637 mld = (struct mld_msg *)skb_transport_header(skb);
08b202b6 1638
9afd85c9 1639 switch (mld->mld_type) {
08b202b6 1640 case ICMPV6_MGM_REPORT:
fc2af6c7 1641 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
b0e9a30d 1642 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid);
08b202b6 1643 break;
08b202b6 1644 case ICMPV6_MLD2_REPORT:
9afd85c9 1645 err = br_ip6_multicast_mld2_report(br, port, skb_trimmed, vid);
08b202b6
YH
1646 break;
1647 case ICMPV6_MGM_QUERY:
9afd85c9 1648 err = br_ip6_multicast_query(br, port, skb_trimmed, vid);
08b202b6
YH
1649 break;
1650 case ICMPV6_MGM_REDUCTION:
b0e9a30d 1651 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid);
9afd85c9 1652 break;
08b202b6
YH
1653 }
1654
a516993f 1655 if (skb_trimmed && skb_trimmed != skb)
9afd85c9
LL
1656 kfree_skb(skb_trimmed);
1657
08b202b6
YH
1658 return err;
1659}
1660#endif
1661
eb1d1641 1662int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port,
06499098 1663 struct sk_buff *skb, u16 vid)
eb1d1641 1664{
1fafc7a9
YH
1665 BR_INPUT_SKB_CB(skb)->igmp = 0;
1666 BR_INPUT_SKB_CB(skb)->mrouters_only = 0;
1667
eb1d1641
HX
1668 if (br->multicast_disabled)
1669 return 0;
1670
1671 switch (skb->protocol) {
1672 case htons(ETH_P_IP):
06499098 1673 return br_multicast_ipv4_rcv(br, port, skb, vid);
dfd56b8b 1674#if IS_ENABLED(CONFIG_IPV6)
08b202b6 1675 case htons(ETH_P_IPV6):
06499098 1676 return br_multicast_ipv6_rcv(br, port, skb, vid);
08b202b6 1677#endif
eb1d1641
HX
1678 }
1679
1680 return 0;
1681}
1682
cc0fdd80 1683static void br_multicast_query_expired(struct net_bridge *br,
2cd41431
LL
1684 struct bridge_mcast_own_query *query,
1685 struct bridge_mcast_querier *querier)
cc0fdd80
LL
1686{
1687 spin_lock(&br->multicast_lock);
1688 if (query->startup_sent < br->multicast_startup_query_count)
1689 query->startup_sent++;
1690
71d9f614 1691 RCU_INIT_POINTER(querier->port, NULL);
cc0fdd80
LL
1692 br_multicast_send_query(br, NULL, query);
1693 spin_unlock(&br->multicast_lock);
1694}
1695
1696static void br_ip4_multicast_query_expired(unsigned long data)
eb1d1641
HX
1697{
1698 struct net_bridge *br = (void *)data;
1699
2cd41431 1700 br_multicast_query_expired(br, &br->ip4_own_query, &br->ip4_querier);
cc0fdd80 1701}
eb1d1641 1702
cc0fdd80
LL
1703#if IS_ENABLED(CONFIG_IPV6)
1704static void br_ip6_multicast_query_expired(unsigned long data)
1705{
1706 struct net_bridge *br = (void *)data;
eb1d1641 1707
2cd41431 1708 br_multicast_query_expired(br, &br->ip6_own_query, &br->ip6_querier);
eb1d1641 1709}
cc0fdd80 1710#endif
eb1d1641
HX
1711
1712void br_multicast_init(struct net_bridge *br)
1713{
1714 br->hash_elasticity = 4;
1715 br->hash_max = 512;
1716
7f0aec7a 1717 br->multicast_router = MDB_RTR_TYPE_TEMP_QUERY;
c5c23260 1718 br->multicast_querier = 0;
1c8ad5bf 1719 br->multicast_query_use_ifaddr = 0;
eb1d1641
HX
1720 br->multicast_last_member_count = 2;
1721 br->multicast_startup_query_count = 2;
1722
1723 br->multicast_last_member_interval = HZ;
1724 br->multicast_query_response_interval = 10 * HZ;
1725 br->multicast_startup_query_interval = 125 * HZ / 4;
1726 br->multicast_query_interval = 125 * HZ;
1727 br->multicast_querier_interval = 255 * HZ;
1728 br->multicast_membership_interval = 260 * HZ;
1729
90010b36 1730 br->ip4_other_query.delay_time = 0;
2cd41431 1731 br->ip4_querier.port = NULL;
cc0fdd80 1732#if IS_ENABLED(CONFIG_IPV6)
90010b36 1733 br->ip6_other_query.delay_time = 0;
2cd41431 1734 br->ip6_querier.port = NULL;
cc0fdd80 1735#endif
b00589af 1736
eb1d1641
HX
1737 spin_lock_init(&br->multicast_lock);
1738 setup_timer(&br->multicast_router_timer,
1739 br_multicast_local_router_expired, 0);
90010b36
LL
1740 setup_timer(&br->ip4_other_query.timer,
1741 br_ip4_multicast_querier_expired, (unsigned long)br);
1742 setup_timer(&br->ip4_own_query.timer, br_ip4_multicast_query_expired,
eb1d1641 1743 (unsigned long)br);
cc0fdd80 1744#if IS_ENABLED(CONFIG_IPV6)
90010b36
LL
1745 setup_timer(&br->ip6_other_query.timer,
1746 br_ip6_multicast_querier_expired, (unsigned long)br);
1747 setup_timer(&br->ip6_own_query.timer, br_ip6_multicast_query_expired,
cc0fdd80
LL
1748 (unsigned long)br);
1749#endif
eb1d1641
HX
1750}
1751
cc0fdd80 1752static void __br_multicast_open(struct net_bridge *br,
90010b36 1753 struct bridge_mcast_own_query *query)
eb1d1641 1754{
cc0fdd80 1755 query->startup_sent = 0;
eb1d1641
HX
1756
1757 if (br->multicast_disabled)
1758 return;
1759
cc0fdd80
LL
1760 mod_timer(&query->timer, jiffies);
1761}
1762
1763void br_multicast_open(struct net_bridge *br)
1764{
90010b36 1765 __br_multicast_open(br, &br->ip4_own_query);
cc0fdd80 1766#if IS_ENABLED(CONFIG_IPV6)
90010b36 1767 __br_multicast_open(br, &br->ip6_own_query);
cc0fdd80 1768#endif
eb1d1641
HX
1769}
1770
1771void br_multicast_stop(struct net_bridge *br)
1772{
eb1d1641 1773 del_timer_sync(&br->multicast_router_timer);
90010b36
LL
1774 del_timer_sync(&br->ip4_other_query.timer);
1775 del_timer_sync(&br->ip4_own_query.timer);
cc0fdd80 1776#if IS_ENABLED(CONFIG_IPV6)
90010b36
LL
1777 del_timer_sync(&br->ip6_other_query.timer);
1778 del_timer_sync(&br->ip6_own_query.timer);
cc0fdd80 1779#endif
e10177ab
SA
1780}
1781
1782void br_multicast_dev_del(struct net_bridge *br)
1783{
1784 struct net_bridge_mdb_htable *mdb;
1785 struct net_bridge_mdb_entry *mp;
1786 struct hlist_node *n;
1787 u32 ver;
1788 int i;
eb1d1641
HX
1789
1790 spin_lock_bh(&br->multicast_lock);
e8051688 1791 mdb = mlock_dereference(br->mdb, br);
eb1d1641
HX
1792 if (!mdb)
1793 goto out;
1794
1795 br->mdb = NULL;
1796
1797 ver = mdb->ver;
1798 for (i = 0; i < mdb->max; i++) {
b67bfe0d 1799 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i],
eb1d1641
HX
1800 hlist[ver]) {
1801 del_timer(&mp->timer);
eb1d1641
HX
1802 call_rcu_bh(&mp->rcu, br_multicast_free_group);
1803 }
1804 }
1805
1806 if (mdb->old) {
1807 spin_unlock_bh(&br->multicast_lock);
10cc2b50 1808 rcu_barrier_bh();
eb1d1641
HX
1809 spin_lock_bh(&br->multicast_lock);
1810 WARN_ON(mdb->old);
1811 }
1812
1813 mdb->old = mdb;
1814 call_rcu_bh(&mdb->rcu, br_mdb_free);
1815
1816out:
1817 spin_unlock_bh(&br->multicast_lock);
1818}
0909e117
HX
1819
1820int br_multicast_set_router(struct net_bridge *br, unsigned long val)
1821{
6ae4ae8e 1822 int err = -EINVAL;
0909e117
HX
1823
1824 spin_lock_bh(&br->multicast_lock);
0909e117
HX
1825
1826 switch (val) {
7f0aec7a
NA
1827 case MDB_RTR_TYPE_DISABLED:
1828 case MDB_RTR_TYPE_PERM:
0909e117
HX
1829 del_timer(&br->multicast_router_timer);
1830 /* fall through */
7f0aec7a 1831 case MDB_RTR_TYPE_TEMP_QUERY:
0909e117
HX
1832 br->multicast_router = val;
1833 err = 0;
1834 break;
0909e117
HX
1835 }
1836
0909e117
HX
1837 spin_unlock_bh(&br->multicast_lock);
1838
1839 return err;
1840}
1841
7f0aec7a
NA
1842static void __del_port_router(struct net_bridge_port *p)
1843{
1844 if (hlist_unhashed(&p->rlist))
1845 return;
1846 hlist_del_init_rcu(&p->rlist);
1847 br_rtr_notify(p->br->dev, p, RTM_DELMDB);
1848}
1849
0909e117
HX
1850int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val)
1851{
1852 struct net_bridge *br = p->br;
6ae4ae8e 1853 int err = -EINVAL;
0909e117
HX
1854
1855 spin_lock(&br->multicast_lock);
0909e117
HX
1856
1857 switch (val) {
7f0aec7a
NA
1858 case MDB_RTR_TYPE_DISABLED:
1859 p->multicast_router = MDB_RTR_TYPE_DISABLED;
1860 __del_port_router(p);
1861 del_timer(&p->multicast_router_timer);
1862 break;
1863 case MDB_RTR_TYPE_TEMP_QUERY:
1864 p->multicast_router = MDB_RTR_TYPE_TEMP_QUERY;
1865 __del_port_router(p);
1866 break;
1867 case MDB_RTR_TYPE_PERM:
1868 p->multicast_router = MDB_RTR_TYPE_PERM;
0909e117 1869 del_timer(&p->multicast_router_timer);
0909e117
HX
1870 br_multicast_add_router(br, p);
1871 break;
7f0aec7a
NA
1872 default:
1873 goto unlock;
0909e117 1874 }
7f0aec7a
NA
1875 err = 0;
1876unlock:
0909e117
HX
1877 spin_unlock(&br->multicast_lock);
1878
1879 return err;
1880}
561f1103 1881
cc0fdd80 1882static void br_multicast_start_querier(struct net_bridge *br,
90010b36 1883 struct bridge_mcast_own_query *query)
561f1103
HX
1884{
1885 struct net_bridge_port *port;
74857216 1886
cc0fdd80 1887 __br_multicast_open(br, query);
74857216
HX
1888
1889 list_for_each_entry(port, &br->port_list, list) {
1890 if (port->state == BR_STATE_DISABLED ||
1891 port->state == BR_STATE_BLOCKING)
1892 continue;
1893
90010b36
LL
1894 if (query == &br->ip4_own_query)
1895 br_multicast_enable(&port->ip4_own_query);
cc0fdd80
LL
1896#if IS_ENABLED(CONFIG_IPV6)
1897 else
90010b36 1898 br_multicast_enable(&port->ip6_own_query);
cc0fdd80 1899#endif
74857216
HX
1900 }
1901}
1902
1903int br_multicast_toggle(struct net_bridge *br, unsigned long val)
1904{
3a7fda06 1905 int err = 0;
e8051688 1906 struct net_bridge_mdb_htable *mdb;
561f1103 1907
ef5e0d82 1908 spin_lock_bh(&br->multicast_lock);
561f1103
HX
1909 if (br->multicast_disabled == !val)
1910 goto unlock;
1911
1912 br->multicast_disabled = !val;
1913 if (br->multicast_disabled)
1914 goto unlock;
1915
3a7fda06
HX
1916 if (!netif_running(br->dev))
1917 goto unlock;
1918
e8051688
ED
1919 mdb = mlock_dereference(br->mdb, br);
1920 if (mdb) {
1921 if (mdb->old) {
561f1103
HX
1922 err = -EEXIST;
1923rollback:
1924 br->multicast_disabled = !!val;
1925 goto unlock;
1926 }
1927
e8051688 1928 err = br_mdb_rehash(&br->mdb, mdb->max,
561f1103
HX
1929 br->hash_elasticity);
1930 if (err)
1931 goto rollback;
1932 }
1933
90010b36 1934 br_multicast_start_querier(br, &br->ip4_own_query);
cc0fdd80 1935#if IS_ENABLED(CONFIG_IPV6)
90010b36 1936 br_multicast_start_querier(br, &br->ip6_own_query);
cc0fdd80 1937#endif
561f1103
HX
1938
1939unlock:
ef5e0d82 1940 spin_unlock_bh(&br->multicast_lock);
561f1103
HX
1941
1942 return err;
1943}
b195167f 1944
c5c23260
HX
1945int br_multicast_set_querier(struct net_bridge *br, unsigned long val)
1946{
b00589af
LL
1947 unsigned long max_delay;
1948
c5c23260
HX
1949 val = !!val;
1950
1951 spin_lock_bh(&br->multicast_lock);
1952 if (br->multicast_querier == val)
1953 goto unlock;
1954
1955 br->multicast_querier = val;
b00589af
LL
1956 if (!val)
1957 goto unlock;
1958
1959 max_delay = br->multicast_query_response_interval;
b00589af 1960
90010b36
LL
1961 if (!timer_pending(&br->ip4_other_query.timer))
1962 br->ip4_other_query.delay_time = jiffies + max_delay;
cc0fdd80 1963
90010b36 1964 br_multicast_start_querier(br, &br->ip4_own_query);
cc0fdd80
LL
1965
1966#if IS_ENABLED(CONFIG_IPV6)
90010b36
LL
1967 if (!timer_pending(&br->ip6_other_query.timer))
1968 br->ip6_other_query.delay_time = jiffies + max_delay;
cc0fdd80 1969
90010b36 1970 br_multicast_start_querier(br, &br->ip6_own_query);
cc0fdd80 1971#endif
c5c23260
HX
1972
1973unlock:
1974 spin_unlock_bh(&br->multicast_lock);
1975
1976 return 0;
1977}
1978
b195167f
HX
1979int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
1980{
6ae4ae8e 1981 int err = -EINVAL;
b195167f 1982 u32 old;
e8051688 1983 struct net_bridge_mdb_htable *mdb;
b195167f 1984
fe0d692b 1985 spin_lock_bh(&br->multicast_lock);
b195167f
HX
1986 if (!is_power_of_2(val))
1987 goto unlock;
e8051688
ED
1988
1989 mdb = mlock_dereference(br->mdb, br);
1990 if (mdb && val < mdb->size)
b195167f
HX
1991 goto unlock;
1992
1993 err = 0;
1994
1995 old = br->hash_max;
1996 br->hash_max = val;
1997
e8051688
ED
1998 if (mdb) {
1999 if (mdb->old) {
b195167f
HX
2000 err = -EEXIST;
2001rollback:
2002 br->hash_max = old;
2003 goto unlock;
2004 }
2005
2006 err = br_mdb_rehash(&br->mdb, br->hash_max,
2007 br->hash_elasticity);
2008 if (err)
2009 goto rollback;
2010 }
2011
2012unlock:
fe0d692b 2013 spin_unlock_bh(&br->multicast_lock);
b195167f
HX
2014
2015 return err;
2016}
07f8ac4a
LL
2017
2018/**
2019 * br_multicast_list_adjacent - Returns snooped multicast addresses
2020 * @dev: The bridge port adjacent to which to retrieve addresses
2021 * @br_ip_list: The list to store found, snooped multicast IP addresses in
2022 *
2023 * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast
2024 * snooping feature on all bridge ports of dev's bridge device, excluding
2025 * the addresses from dev itself.
2026 *
2027 * Returns the number of items added to br_ip_list.
2028 *
2029 * Notes:
2030 * - br_ip_list needs to be initialized by caller
2031 * - br_ip_list might contain duplicates in the end
2032 * (needs to be taken care of by caller)
2033 * - br_ip_list needs to be freed by caller
2034 */
2035int br_multicast_list_adjacent(struct net_device *dev,
2036 struct list_head *br_ip_list)
2037{
2038 struct net_bridge *br;
2039 struct net_bridge_port *port;
2040 struct net_bridge_port_group *group;
2041 struct br_ip_list *entry;
2042 int count = 0;
2043
2044 rcu_read_lock();
2045 if (!br_ip_list || !br_port_exists(dev))
2046 goto unlock;
2047
2048 port = br_port_get_rcu(dev);
2049 if (!port || !port->br)
2050 goto unlock;
2051
2052 br = port->br;
2053
2054 list_for_each_entry_rcu(port, &br->port_list, list) {
2055 if (!port->dev || port->dev == dev)
2056 continue;
2057
2058 hlist_for_each_entry_rcu(group, &port->mglist, mglist) {
2059 entry = kmalloc(sizeof(*entry), GFP_ATOMIC);
2060 if (!entry)
2061 goto unlock;
2062
2063 entry->addr = group->addr;
2064 list_add(&entry->list, br_ip_list);
2065 count++;
2066 }
2067 }
2068
2069unlock:
2070 rcu_read_unlock();
2071 return count;
2072}
2073EXPORT_SYMBOL_GPL(br_multicast_list_adjacent);
2cd41431 2074
c34963e2
LL
2075/**
2076 * br_multicast_has_querier_anywhere - Checks for a querier on a bridge
2077 * @dev: The bridge port providing the bridge on which to check for a querier
2078 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6
2079 *
2080 * Checks whether the given interface has a bridge on top and if so returns
2081 * true if a valid querier exists anywhere on the bridged link layer.
2082 * Otherwise returns false.
2083 */
2084bool br_multicast_has_querier_anywhere(struct net_device *dev, int proto)
2085{
2086 struct net_bridge *br;
2087 struct net_bridge_port *port;
2088 struct ethhdr eth;
2089 bool ret = false;
2090
2091 rcu_read_lock();
2092 if (!br_port_exists(dev))
2093 goto unlock;
2094
2095 port = br_port_get_rcu(dev);
2096 if (!port || !port->br)
2097 goto unlock;
2098
2099 br = port->br;
2100
2101 memset(&eth, 0, sizeof(eth));
2102 eth.h_proto = htons(proto);
2103
2104 ret = br_multicast_querier_exists(br, &eth);
2105
2106unlock:
2107 rcu_read_unlock();
2108 return ret;
2109}
2110EXPORT_SYMBOL_GPL(br_multicast_has_querier_anywhere);
2111
2cd41431
LL
2112/**
2113 * br_multicast_has_querier_adjacent - Checks for a querier behind a bridge port
2114 * @dev: The bridge port adjacent to which to check for a querier
2115 * @proto: The protocol family to check for: IGMP -> ETH_P_IP, MLD -> ETH_P_IPV6
2116 *
2117 * Checks whether the given interface has a bridge on top and if so returns
2118 * true if a selected querier is behind one of the other ports of this
2119 * bridge. Otherwise returns false.
2120 */
2121bool br_multicast_has_querier_adjacent(struct net_device *dev, int proto)
2122{
2123 struct net_bridge *br;
2124 struct net_bridge_port *port;
2125 bool ret = false;
2126
2127 rcu_read_lock();
2128 if (!br_port_exists(dev))
2129 goto unlock;
2130
2131 port = br_port_get_rcu(dev);
2132 if (!port || !port->br)
2133 goto unlock;
2134
2135 br = port->br;
2136
2137 switch (proto) {
2138 case ETH_P_IP:
2139 if (!timer_pending(&br->ip4_other_query.timer) ||
2140 rcu_dereference(br->ip4_querier.port) == port)
2141 goto unlock;
2142 break;
3993c4e1 2143#if IS_ENABLED(CONFIG_IPV6)
2cd41431
LL
2144 case ETH_P_IPV6:
2145 if (!timer_pending(&br->ip6_other_query.timer) ||
2146 rcu_dereference(br->ip6_querier.port) == port)
2147 goto unlock;
2148 break;
3993c4e1 2149#endif
2cd41431
LL
2150 default:
2151 goto unlock;
2152 }
2153
2154 ret = true;
2155unlock:
2156 rcu_read_unlock();
2157 return ret;
2158}
2159EXPORT_SYMBOL_GPL(br_multicast_has_querier_adjacent);