Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
1da177e4 LT |
2 | /* |
3 | * Forwarding decision | |
4 | * Linux ethernet bridge | |
5 | * | |
6 | * Authors: | |
7 | * Lennert Buytenhek <buytenh@gnu.org> | |
1da177e4 LT |
8 | */ |
9 | ||
025d89c2 | 10 | #include <linux/err.h> |
5a0e3ad6 | 11 | #include <linux/slab.h> |
1da177e4 LT |
12 | #include <linux/kernel.h> |
13 | #include <linux/netdevice.h> | |
c06ee961 | 14 | #include <linux/netpoll.h> |
1da177e4 | 15 | #include <linux/skbuff.h> |
85ca719e | 16 | #include <linux/if_vlan.h> |
1da177e4 LT |
17 | #include <linux/netfilter_bridge.h> |
18 | #include "br_private.h" | |
19 | ||
1a81a2e0 | 20 | /* Don't forward packets to originating port or forwarding disabled */ |
9d6f229f | 21 | static inline int should_deliver(const struct net_bridge_port *p, |
1da177e4 LT |
22 | const struct sk_buff *skb) |
23 | { | |
2594e906 NA |
24 | struct net_bridge_vlan_group *vg; |
25 | ||
907b1e6e | 26 | vg = nbp_vlan_group_rcu(p); |
a97bfc1d | 27 | return ((p->flags & BR_HAIRPIN_MODE) || skb->dev != p->dev) && |
0a1868b9 EA |
28 | (br_mst_is_enabled(p->br) || p->state == BR_STATE_FORWARDING) && |
29 | br_allowed_egress(vg, skb) && nbp_switchdev_allowed_egress(p, skb) && | |
7d850abd | 30 | !br_skb_isolated(p, skb); |
1da177e4 LT |
31 | } |
32 | ||
0c4b51f0 | 33 | int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb) |
1da177e4 | 34 | { |
28c1382f | 35 | skb_push(skb, ETH_HLEN); |
df356d5e TM |
36 | if (!is_skb_forwardable(skb->dev, skb)) |
37 | goto drop; | |
38 | ||
df356d5e | 39 | br_drop_fake_rtable(skb); |
df356d5e TM |
40 | |
41 | if (skb->ip_summed == CHECKSUM_PARTIAL && | |
a98c0c47 | 42 | eth_type_vlan(skb->protocol)) { |
df356d5e TM |
43 | int depth; |
44 | ||
4063384e | 45 | if (!vlan_get_protocol_and_depth(skb, skb->protocol, &depth)) |
df356d5e TM |
46 | goto drop; |
47 | ||
48 | skb_set_network_header(skb, depth); | |
1da177e4 LT |
49 | } |
50 | ||
c5381154 | 51 | br_switchdev_frame_set_offload_fwd_mark(skb); |
47211192 | 52 | |
df356d5e TM |
53 | dev_queue_xmit(skb); |
54 | ||
55 | return 0; | |
56 | ||
57 | drop: | |
58 | kfree_skb(skb); | |
1da177e4 LT |
59 | return 0; |
60 | } | |
34666d46 | 61 | EXPORT_SYMBOL_GPL(br_dev_queue_push_xmit); |
1da177e4 | 62 | |
0c4b51f0 | 63 | int br_forward_finish(struct net *net, struct sock *sk, struct sk_buff *skb) |
1da177e4 | 64 | { |
de799101 | 65 | skb_clear_tstamp(skb); |
29a26a56 EB |
66 | return NF_HOOK(NFPROTO_BRIDGE, NF_BR_POST_ROUTING, |
67 | net, sk, skb, NULL, skb->dev, | |
9ef513be | 68 | br_dev_queue_push_xmit); |
1da177e4 | 69 | |
1da177e4 | 70 | } |
34666d46 | 71 | EXPORT_SYMBOL_GPL(br_forward_finish); |
1da177e4 | 72 | |
37b090e6 NA |
73 | static void __br_forward(const struct net_bridge_port *to, |
74 | struct sk_buff *skb, bool local_orig) | |
1da177e4 | 75 | { |
2594e906 | 76 | struct net_bridge_vlan_group *vg; |
37b090e6 NA |
77 | struct net_device *indev; |
78 | struct net *net; | |
79 | int br_hook; | |
2594e906 | 80 | |
47211192 TW |
81 | /* Mark the skb for forwarding offload early so that br_handle_vlan() |
82 | * can know whether to pop the VLAN header on egress or keep it. | |
83 | */ | |
84 | nbp_switchdev_frame_mark_tx_fwd_offload(to, skb); | |
85 | ||
907b1e6e | 86 | vg = nbp_vlan_group_rcu(to); |
11538d03 | 87 | skb = br_handle_vlan(to->br, to, vg, skb); |
78851988 VY |
88 | if (!skb) |
89 | return; | |
90 | ||
37b090e6 | 91 | indev = skb->dev; |
1da177e4 | 92 | skb->dev = to->dev; |
37b090e6 NA |
93 | if (!local_orig) { |
94 | if (skb_warn_if_lro(skb)) { | |
91d2c34a | 95 | kfree_skb(skb); |
37b090e6 | 96 | return; |
91d2c34a | 97 | } |
37b090e6 NA |
98 | br_hook = NF_BR_FORWARD; |
99 | skb_forward_csum(skb); | |
100 | net = dev_net(indev); | |
101 | } else { | |
102 | if (unlikely(netpoll_tx_running(to->br->dev))) { | |
28c1382f YW |
103 | skb_push(skb, ETH_HLEN); |
104 | if (!is_skb_forwardable(skb->dev, skb)) | |
37b090e6 | 105 | kfree_skb(skb); |
28c1382f | 106 | else |
37b090e6 | 107 | br_netpoll_send_skb(to, skb); |
37b090e6 NA |
108 | return; |
109 | } | |
110 | br_hook = NF_BR_LOCAL_OUT; | |
111 | net = dev_net(skb->dev); | |
112 | indev = NULL; | |
91d2c34a HX |
113 | } |
114 | ||
37b090e6 NA |
115 | NF_HOOK(NFPROTO_BRIDGE, br_hook, |
116 | net, NULL, skb, indev, skb->dev, | |
713aefa3 | 117 | br_forward_finish); |
1da177e4 LT |
118 | } |
119 | ||
37b090e6 NA |
120 | static int deliver_clone(const struct net_bridge_port *prev, |
121 | struct sk_buff *skb, bool local_orig) | |
1da177e4 | 122 | { |
37b090e6 | 123 | struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev; |
1da177e4 | 124 | |
37b090e6 NA |
125 | skb = skb_clone(skb, GFP_ATOMIC); |
126 | if (!skb) { | |
44bdb313 | 127 | DEV_STATS_INC(dev, tx_dropped); |
37b090e6 | 128 | return -ENOMEM; |
1da177e4 LT |
129 | } |
130 | ||
37b090e6 NA |
131 | __br_forward(prev, skb, local_orig); |
132 | return 0; | |
1da177e4 LT |
133 | } |
134 | ||
37b090e6 NA |
135 | /** |
136 | * br_forward - forward a packet to a specific port | |
137 | * @to: destination port | |
138 | * @skb: packet being forwarded | |
139 | * @local_rcv: packet will be received locally after forwarding | |
140 | * @local_orig: packet is locally originated | |
141 | * | |
142 | * Should be called with rcu_read_lock. | |
143 | */ | |
144 | void br_forward(const struct net_bridge_port *to, | |
145 | struct sk_buff *skb, bool local_rcv, bool local_orig) | |
1da177e4 | 146 | { |
2756f68c NA |
147 | if (unlikely(!to)) |
148 | goto out; | |
149 | ||
150 | /* redirect to backup link if the destination port is down */ | |
151 | if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) { | |
152 | struct net_bridge_port *backup_port; | |
153 | ||
154 | backup_port = rcu_dereference(to->backup_port); | |
155 | if (unlikely(!backup_port)) | |
156 | goto out; | |
29cfb2aa | 157 | BR_INPUT_SKB_CB(skb)->backup_nhid = READ_ONCE(to->backup_nhid); |
2756f68c NA |
158 | to = backup_port; |
159 | } | |
160 | ||
161 | if (should_deliver(to, skb)) { | |
b35c5f63 | 162 | if (local_rcv) |
37b090e6 | 163 | deliver_clone(to, skb, local_orig); |
7f7708f0 | 164 | else |
37b090e6 | 165 | __br_forward(to, skb, local_orig); |
1da177e4 LT |
166 | return; |
167 | } | |
168 | ||
2756f68c | 169 | out: |
b35c5f63 | 170 | if (!local_rcv) |
7f7708f0 | 171 | kfree_skb(skb); |
1da177e4 | 172 | } |
37b090e6 | 173 | EXPORT_SYMBOL_GPL(br_forward); |
025d89c2 HX |
174 | |
175 | static struct net_bridge_port *maybe_deliver( | |
176 | struct net_bridge_port *prev, struct net_bridge_port *p, | |
37b090e6 | 177 | struct sk_buff *skb, bool local_orig) |
025d89c2 | 178 | { |
847d44ef | 179 | u8 igmp_type = br_multicast_igmp_type(skb); |
025d89c2 HX |
180 | int err; |
181 | ||
182 | if (!should_deliver(p, skb)) | |
183 | return prev; | |
184 | ||
47211192 TW |
185 | nbp_switchdev_frame_mark_tx_fwd_to_hwdom(p, skb); |
186 | ||
025d89c2 HX |
187 | if (!prev) |
188 | goto out; | |
189 | ||
37b090e6 | 190 | err = deliver_clone(prev, skb, local_orig); |
025d89c2 HX |
191 | if (err) |
192 | return ERR_PTR(err); | |
025d89c2 | 193 | out: |
847d44ef PNA |
194 | br_multicast_count(p->br, p, skb, igmp_type, BR_MCAST_DIR_TX); |
195 | ||
025d89c2 HX |
196 | return p; |
197 | } | |
198 | ||
37b090e6 NA |
199 | /* called under rcu_read_lock */ |
200 | void br_flood(struct net_bridge *br, struct sk_buff *skb, | |
e408336a IS |
201 | enum br_pkt_type pkt_type, bool local_rcv, bool local_orig, |
202 | u16 vid) | |
1da177e4 | 203 | { |
623e43c2 | 204 | enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET; |
37b090e6 | 205 | struct net_bridge_port *prev = NULL; |
1080ab95 | 206 | struct net_bridge_port *p; |
1da177e4 | 207 | |
7b4858df IS |
208 | br_tc_skb_miss_set(skb, pkt_type != BR_PKT_BROADCAST); |
209 | ||
1da177e4 | 210 | list_for_each_entry_rcu(p, &br->port_list, list) { |
99f906e9 MM |
211 | /* Do not flood unicast traffic to ports that turn it off, nor |
212 | * other traffic if flood off, except for traffic we originate | |
213 | */ | |
214 | switch (pkt_type) { | |
215 | case BR_PKT_UNICAST: | |
216 | if (!(p->flags & BR_FLOOD)) | |
217 | continue; | |
218 | break; | |
219 | case BR_PKT_MULTICAST: | |
220 | if (!(p->flags & BR_MCAST_FLOOD) && skb->dev != br->dev) | |
221 | continue; | |
222 | break; | |
223 | case BR_PKT_BROADCAST: | |
224 | if (!(p->flags & BR_BCAST_FLOOD) && skb->dev != br->dev) | |
225 | continue; | |
226 | break; | |
227 | } | |
95850116 KP |
228 | |
229 | /* Do not flood to ports that enable proxy ARP */ | |
230 | if (p->flags & BR_PROXYARP) | |
231 | continue; | |
013a7ce8 | 232 | if (BR_INPUT_SKB_CB(skb)->proxyarp_replied && |
3aca683e IS |
233 | ((p->flags & BR_PROXYARP_WIFI) || |
234 | br_is_neigh_suppress_enabled(p, vid))) | |
842a9ae0 | 235 | continue; |
95850116 | 236 | |
37b090e6 | 237 | prev = maybe_deliver(prev, p, skb, local_orig); |
623e43c2 RR |
238 | if (IS_ERR(prev)) { |
239 | reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM : | |
240 | SKB_DROP_REASON_NOT_SPECIFIED; | |
025d89c2 | 241 | goto out; |
623e43c2 | 242 | } |
1da177e4 LT |
243 | } |
244 | ||
b33084be HX |
245 | if (!prev) |
246 | goto out; | |
247 | ||
b35c5f63 | 248 | if (local_rcv) |
37b090e6 | 249 | deliver_clone(prev, skb, local_orig); |
025d89c2 | 250 | else |
37b090e6 | 251 | __br_forward(prev, skb, local_orig); |
b33084be | 252 | return; |
1da177e4 | 253 | |
b33084be | 254 | out: |
b35c5f63 | 255 | if (!local_rcv) |
623e43c2 | 256 | kfree_skb_reason(skb, reason); |
1da177e4 LT |
257 | } |
258 | ||
5cb5e947 | 259 | #ifdef CONFIG_BRIDGE_IGMP_SNOOPING |
5b9d6b15 AB |
260 | static void maybe_deliver_addr(struct net_bridge_port *p, struct sk_buff *skb, |
261 | const unsigned char *addr, bool local_orig) | |
262 | { | |
263 | struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev; | |
264 | const unsigned char *src = eth_hdr(skb)->h_source; | |
86b29d83 | 265 | struct sk_buff *nskb; |
5b9d6b15 AB |
266 | |
267 | if (!should_deliver(p, skb)) | |
268 | return; | |
269 | ||
270 | /* Even with hairpin, no soliloquies - prevent breaking IPv6 DAD */ | |
271 | if (skb->dev == p->dev && ether_addr_equal(src, addr)) | |
272 | return; | |
273 | ||
86b29d83 FF |
274 | __skb_push(skb, ETH_HLEN); |
275 | nskb = pskb_copy(skb, GFP_ATOMIC); | |
276 | __skb_pull(skb, ETH_HLEN); | |
277 | if (!nskb) { | |
44bdb313 | 278 | DEV_STATS_INC(dev, tx_dropped); |
5b9d6b15 AB |
279 | return; |
280 | } | |
281 | ||
86b29d83 FF |
282 | skb = nskb; |
283 | __skb_pull(skb, ETH_HLEN); | |
5b9d6b15 AB |
284 | if (!is_broadcast_ether_addr(addr)) |
285 | memcpy(eth_hdr(skb)->h_dest, addr, ETH_ALEN); | |
286 | ||
287 | __br_forward(p, skb, local_orig); | |
288 | } | |
289 | ||
5cb5e947 | 290 | /* called with rcu_read_lock */ |
37b090e6 NA |
291 | void br_multicast_flood(struct net_bridge_mdb_entry *mdst, |
292 | struct sk_buff *skb, | |
adc47037 | 293 | struct net_bridge_mcast *brmctx, |
37b090e6 | 294 | bool local_rcv, bool local_orig) |
5cb5e947 | 295 | { |
623e43c2 | 296 | enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET; |
afe0159d | 297 | struct net_bridge_port *prev = NULL; |
5cb5e947 | 298 | struct net_bridge_port_group *p; |
36cfec73 | 299 | bool allow_mode_include = true; |
5cb5e947 HX |
300 | struct hlist_node *rp; |
301 | ||
adc47037 | 302 | rp = br_multicast_get_first_rport_node(brmctx, skb); |
44ebb081 | 303 | |
36cfec73 NA |
304 | if (mdst) { |
305 | p = rcu_dereference(mdst->ports); | |
adc47037 | 306 | if (br_multicast_should_handle_mode(brmctx, mdst->addr.proto) && |
36cfec73 NA |
307 | br_multicast_is_star_g(&mdst->addr)) |
308 | allow_mode_include = false; | |
309 | } else { | |
310 | p = NULL; | |
7b4858df | 311 | br_tc_skb_miss_set(skb, true); |
36cfec73 NA |
312 | } |
313 | ||
5cb5e947 | 314 | while (p || rp) { |
afe0159d | 315 | struct net_bridge_port *port, *lport, *rport; |
316 | ||
085b53c8 | 317 | lport = p ? p->key.port : NULL; |
44ebb081 | 318 | rport = br_multicast_rport_from_node_skb(rp, skb); |
5cb5e947 | 319 | |
6db6f0ea FF |
320 | if ((unsigned long)lport > (unsigned long)rport) { |
321 | port = lport; | |
322 | ||
323 | if (port->flags & BR_MULTICAST_TO_UNICAST) { | |
324 | maybe_deliver_addr(lport, skb, p->eth_addr, | |
325 | local_orig); | |
326 | goto delivered; | |
327 | } | |
36cfec73 NA |
328 | if ((!allow_mode_include && |
329 | p->filter_mode == MCAST_INCLUDE) || | |
330 | (p->flags & MDB_PG_FLAGS_BLOCKED)) | |
331 | goto delivered; | |
6db6f0ea FF |
332 | } else { |
333 | port = rport; | |
334 | } | |
5cb5e947 | 335 | |
37b090e6 | 336 | prev = maybe_deliver(prev, port, skb, local_orig); |
623e43c2 RR |
337 | if (IS_ERR(prev)) { |
338 | reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM : | |
339 | SKB_DROP_REASON_NOT_SPECIFIED; | |
5cb5e947 | 340 | goto out; |
623e43c2 | 341 | } |
847d44ef | 342 | delivered: |
5cb5e947 | 343 | if ((unsigned long)lport >= (unsigned long)port) |
83f6a740 | 344 | p = rcu_dereference(p->next); |
5cb5e947 | 345 | if ((unsigned long)rport >= (unsigned long)port) |
e8051688 | 346 | rp = rcu_dereference(hlist_next_rcu(rp)); |
5cb5e947 HX |
347 | } |
348 | ||
349 | if (!prev) | |
350 | goto out; | |
351 | ||
b35c5f63 | 352 | if (local_rcv) |
37b090e6 | 353 | deliver_clone(prev, skb, local_orig); |
5cb5e947 | 354 | else |
37b090e6 | 355 | __br_forward(prev, skb, local_orig); |
5cb5e947 HX |
356 | return; |
357 | ||
358 | out: | |
b35c5f63 | 359 | if (!local_rcv) |
623e43c2 | 360 | kfree_skb_reason(skb, reason); |
5cb5e947 | 361 | } |
5cb5e947 | 362 | #endif |