Merge tag 'mm-hotfixes-stable-2025-07-11-16-16' of git://git.kernel.org/pub/scm/linux...
[linux-2.6-block.git] / net / bridge / br_forward.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * Forwarding decision
4 * Linux ethernet bridge
5 *
6 * Authors:
7 * Lennert Buytenhek <buytenh@gnu.org>
1da177e4
LT
8 */
9
025d89c2 10#include <linux/err.h>
5a0e3ad6 11#include <linux/slab.h>
1da177e4
LT
12#include <linux/kernel.h>
13#include <linux/netdevice.h>
c06ee961 14#include <linux/netpoll.h>
1da177e4 15#include <linux/skbuff.h>
85ca719e 16#include <linux/if_vlan.h>
1da177e4
LT
17#include <linux/netfilter_bridge.h>
18#include "br_private.h"
19
1a81a2e0 20/* Don't forward packets to originating port or forwarding disabled */
9d6f229f 21static inline int should_deliver(const struct net_bridge_port *p,
1da177e4
LT
22 const struct sk_buff *skb)
23{
2594e906
NA
24 struct net_bridge_vlan_group *vg;
25
907b1e6e 26 vg = nbp_vlan_group_rcu(p);
a97bfc1d 27 return ((p->flags & BR_HAIRPIN_MODE) || skb->dev != p->dev) &&
0a1868b9
EA
28 (br_mst_is_enabled(p->br) || p->state == BR_STATE_FORWARDING) &&
29 br_allowed_egress(vg, skb) && nbp_switchdev_allowed_egress(p, skb) &&
7d850abd 30 !br_skb_isolated(p, skb);
1da177e4
LT
31}
32
0c4b51f0 33int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb)
1da177e4 34{
28c1382f 35 skb_push(skb, ETH_HLEN);
df356d5e
TM
36 if (!is_skb_forwardable(skb->dev, skb))
37 goto drop;
38
df356d5e 39 br_drop_fake_rtable(skb);
df356d5e
TM
40
41 if (skb->ip_summed == CHECKSUM_PARTIAL &&
a98c0c47 42 eth_type_vlan(skb->protocol)) {
df356d5e
TM
43 int depth;
44
4063384e 45 if (!vlan_get_protocol_and_depth(skb, skb->protocol, &depth))
df356d5e
TM
46 goto drop;
47
48 skb_set_network_header(skb, depth);
1da177e4
LT
49 }
50
c5381154 51 br_switchdev_frame_set_offload_fwd_mark(skb);
47211192 52
df356d5e
TM
53 dev_queue_xmit(skb);
54
55 return 0;
56
57drop:
58 kfree_skb(skb);
1da177e4
LT
59 return 0;
60}
34666d46 61EXPORT_SYMBOL_GPL(br_dev_queue_push_xmit);
1da177e4 62
0c4b51f0 63int br_forward_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
1da177e4 64{
de799101 65 skb_clear_tstamp(skb);
29a26a56
EB
66 return NF_HOOK(NFPROTO_BRIDGE, NF_BR_POST_ROUTING,
67 net, sk, skb, NULL, skb->dev,
9ef513be 68 br_dev_queue_push_xmit);
1da177e4 69
1da177e4 70}
34666d46 71EXPORT_SYMBOL_GPL(br_forward_finish);
1da177e4 72
37b090e6
NA
73static void __br_forward(const struct net_bridge_port *to,
74 struct sk_buff *skb, bool local_orig)
1da177e4 75{
2594e906 76 struct net_bridge_vlan_group *vg;
37b090e6
NA
77 struct net_device *indev;
78 struct net *net;
79 int br_hook;
2594e906 80
47211192
TW
81 /* Mark the skb for forwarding offload early so that br_handle_vlan()
82 * can know whether to pop the VLAN header on egress or keep it.
83 */
84 nbp_switchdev_frame_mark_tx_fwd_offload(to, skb);
85
907b1e6e 86 vg = nbp_vlan_group_rcu(to);
11538d03 87 skb = br_handle_vlan(to->br, to, vg, skb);
78851988
VY
88 if (!skb)
89 return;
90
37b090e6 91 indev = skb->dev;
1da177e4 92 skb->dev = to->dev;
37b090e6
NA
93 if (!local_orig) {
94 if (skb_warn_if_lro(skb)) {
91d2c34a 95 kfree_skb(skb);
37b090e6 96 return;
91d2c34a 97 }
37b090e6
NA
98 br_hook = NF_BR_FORWARD;
99 skb_forward_csum(skb);
100 net = dev_net(indev);
101 } else {
102 if (unlikely(netpoll_tx_running(to->br->dev))) {
28c1382f
YW
103 skb_push(skb, ETH_HLEN);
104 if (!is_skb_forwardable(skb->dev, skb))
37b090e6 105 kfree_skb(skb);
28c1382f 106 else
37b090e6 107 br_netpoll_send_skb(to, skb);
37b090e6
NA
108 return;
109 }
110 br_hook = NF_BR_LOCAL_OUT;
111 net = dev_net(skb->dev);
112 indev = NULL;
91d2c34a
HX
113 }
114
37b090e6
NA
115 NF_HOOK(NFPROTO_BRIDGE, br_hook,
116 net, NULL, skb, indev, skb->dev,
713aefa3 117 br_forward_finish);
1da177e4
LT
118}
119
37b090e6
NA
120static int deliver_clone(const struct net_bridge_port *prev,
121 struct sk_buff *skb, bool local_orig)
1da177e4 122{
37b090e6 123 struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
1da177e4 124
37b090e6
NA
125 skb = skb_clone(skb, GFP_ATOMIC);
126 if (!skb) {
44bdb313 127 DEV_STATS_INC(dev, tx_dropped);
37b090e6 128 return -ENOMEM;
1da177e4
LT
129 }
130
37b090e6
NA
131 __br_forward(prev, skb, local_orig);
132 return 0;
1da177e4
LT
133}
134
37b090e6
NA
135/**
136 * br_forward - forward a packet to a specific port
137 * @to: destination port
138 * @skb: packet being forwarded
139 * @local_rcv: packet will be received locally after forwarding
140 * @local_orig: packet is locally originated
141 *
142 * Should be called with rcu_read_lock.
143 */
144void br_forward(const struct net_bridge_port *to,
145 struct sk_buff *skb, bool local_rcv, bool local_orig)
1da177e4 146{
2756f68c
NA
147 if (unlikely(!to))
148 goto out;
149
150 /* redirect to backup link if the destination port is down */
151 if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) {
152 struct net_bridge_port *backup_port;
153
154 backup_port = rcu_dereference(to->backup_port);
155 if (unlikely(!backup_port))
156 goto out;
29cfb2aa 157 BR_INPUT_SKB_CB(skb)->backup_nhid = READ_ONCE(to->backup_nhid);
2756f68c
NA
158 to = backup_port;
159 }
160
161 if (should_deliver(to, skb)) {
b35c5f63 162 if (local_rcv)
37b090e6 163 deliver_clone(to, skb, local_orig);
7f7708f0 164 else
37b090e6 165 __br_forward(to, skb, local_orig);
1da177e4
LT
166 return;
167 }
168
2756f68c 169out:
b35c5f63 170 if (!local_rcv)
7f7708f0 171 kfree_skb(skb);
1da177e4 172}
37b090e6 173EXPORT_SYMBOL_GPL(br_forward);
025d89c2
HX
174
175static struct net_bridge_port *maybe_deliver(
176 struct net_bridge_port *prev, struct net_bridge_port *p,
37b090e6 177 struct sk_buff *skb, bool local_orig)
025d89c2 178{
847d44ef 179 u8 igmp_type = br_multicast_igmp_type(skb);
025d89c2
HX
180 int err;
181
182 if (!should_deliver(p, skb))
183 return prev;
184
47211192
TW
185 nbp_switchdev_frame_mark_tx_fwd_to_hwdom(p, skb);
186
025d89c2
HX
187 if (!prev)
188 goto out;
189
37b090e6 190 err = deliver_clone(prev, skb, local_orig);
025d89c2
HX
191 if (err)
192 return ERR_PTR(err);
025d89c2 193out:
847d44ef
PNA
194 br_multicast_count(p->br, p, skb, igmp_type, BR_MCAST_DIR_TX);
195
025d89c2
HX
196 return p;
197}
198
37b090e6
NA
199/* called under rcu_read_lock */
200void br_flood(struct net_bridge *br, struct sk_buff *skb,
e408336a
IS
201 enum br_pkt_type pkt_type, bool local_rcv, bool local_orig,
202 u16 vid)
1da177e4 203{
623e43c2 204 enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET;
37b090e6 205 struct net_bridge_port *prev = NULL;
1080ab95 206 struct net_bridge_port *p;
1da177e4 207
7b4858df
IS
208 br_tc_skb_miss_set(skb, pkt_type != BR_PKT_BROADCAST);
209
1da177e4 210 list_for_each_entry_rcu(p, &br->port_list, list) {
99f906e9
MM
211 /* Do not flood unicast traffic to ports that turn it off, nor
212 * other traffic if flood off, except for traffic we originate
213 */
214 switch (pkt_type) {
215 case BR_PKT_UNICAST:
216 if (!(p->flags & BR_FLOOD))
217 continue;
218 break;
219 case BR_PKT_MULTICAST:
220 if (!(p->flags & BR_MCAST_FLOOD) && skb->dev != br->dev)
221 continue;
222 break;
223 case BR_PKT_BROADCAST:
224 if (!(p->flags & BR_BCAST_FLOOD) && skb->dev != br->dev)
225 continue;
226 break;
227 }
95850116
KP
228
229 /* Do not flood to ports that enable proxy ARP */
230 if (p->flags & BR_PROXYARP)
231 continue;
013a7ce8 232 if (BR_INPUT_SKB_CB(skb)->proxyarp_replied &&
3aca683e
IS
233 ((p->flags & BR_PROXYARP_WIFI) ||
234 br_is_neigh_suppress_enabled(p, vid)))
842a9ae0 235 continue;
95850116 236
37b090e6 237 prev = maybe_deliver(prev, p, skb, local_orig);
623e43c2
RR
238 if (IS_ERR(prev)) {
239 reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM :
240 SKB_DROP_REASON_NOT_SPECIFIED;
025d89c2 241 goto out;
623e43c2 242 }
1da177e4
LT
243 }
244
b33084be
HX
245 if (!prev)
246 goto out;
247
b35c5f63 248 if (local_rcv)
37b090e6 249 deliver_clone(prev, skb, local_orig);
025d89c2 250 else
37b090e6 251 __br_forward(prev, skb, local_orig);
b33084be 252 return;
1da177e4 253
b33084be 254out:
b35c5f63 255 if (!local_rcv)
623e43c2 256 kfree_skb_reason(skb, reason);
1da177e4
LT
257}
258
5cb5e947 259#ifdef CONFIG_BRIDGE_IGMP_SNOOPING
5b9d6b15
AB
260static void maybe_deliver_addr(struct net_bridge_port *p, struct sk_buff *skb,
261 const unsigned char *addr, bool local_orig)
262{
263 struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
264 const unsigned char *src = eth_hdr(skb)->h_source;
86b29d83 265 struct sk_buff *nskb;
5b9d6b15
AB
266
267 if (!should_deliver(p, skb))
268 return;
269
270 /* Even with hairpin, no soliloquies - prevent breaking IPv6 DAD */
271 if (skb->dev == p->dev && ether_addr_equal(src, addr))
272 return;
273
86b29d83
FF
274 __skb_push(skb, ETH_HLEN);
275 nskb = pskb_copy(skb, GFP_ATOMIC);
276 __skb_pull(skb, ETH_HLEN);
277 if (!nskb) {
44bdb313 278 DEV_STATS_INC(dev, tx_dropped);
5b9d6b15
AB
279 return;
280 }
281
86b29d83
FF
282 skb = nskb;
283 __skb_pull(skb, ETH_HLEN);
5b9d6b15
AB
284 if (!is_broadcast_ether_addr(addr))
285 memcpy(eth_hdr(skb)->h_dest, addr, ETH_ALEN);
286
287 __br_forward(p, skb, local_orig);
288}
289
5cb5e947 290/* called with rcu_read_lock */
37b090e6
NA
291void br_multicast_flood(struct net_bridge_mdb_entry *mdst,
292 struct sk_buff *skb,
adc47037 293 struct net_bridge_mcast *brmctx,
37b090e6 294 bool local_rcv, bool local_orig)
5cb5e947 295{
623e43c2 296 enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET;
afe0159d 297 struct net_bridge_port *prev = NULL;
5cb5e947 298 struct net_bridge_port_group *p;
36cfec73 299 bool allow_mode_include = true;
5cb5e947
HX
300 struct hlist_node *rp;
301
adc47037 302 rp = br_multicast_get_first_rport_node(brmctx, skb);
44ebb081 303
36cfec73
NA
304 if (mdst) {
305 p = rcu_dereference(mdst->ports);
adc47037 306 if (br_multicast_should_handle_mode(brmctx, mdst->addr.proto) &&
36cfec73
NA
307 br_multicast_is_star_g(&mdst->addr))
308 allow_mode_include = false;
309 } else {
310 p = NULL;
7b4858df 311 br_tc_skb_miss_set(skb, true);
36cfec73
NA
312 }
313
5cb5e947 314 while (p || rp) {
afe0159d 315 struct net_bridge_port *port, *lport, *rport;
316
085b53c8 317 lport = p ? p->key.port : NULL;
44ebb081 318 rport = br_multicast_rport_from_node_skb(rp, skb);
5cb5e947 319
6db6f0ea
FF
320 if ((unsigned long)lport > (unsigned long)rport) {
321 port = lport;
322
323 if (port->flags & BR_MULTICAST_TO_UNICAST) {
324 maybe_deliver_addr(lport, skb, p->eth_addr,
325 local_orig);
326 goto delivered;
327 }
36cfec73
NA
328 if ((!allow_mode_include &&
329 p->filter_mode == MCAST_INCLUDE) ||
330 (p->flags & MDB_PG_FLAGS_BLOCKED))
331 goto delivered;
6db6f0ea
FF
332 } else {
333 port = rport;
334 }
5cb5e947 335
37b090e6 336 prev = maybe_deliver(prev, port, skb, local_orig);
623e43c2
RR
337 if (IS_ERR(prev)) {
338 reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM :
339 SKB_DROP_REASON_NOT_SPECIFIED;
5cb5e947 340 goto out;
623e43c2 341 }
847d44ef 342delivered:
5cb5e947 343 if ((unsigned long)lport >= (unsigned long)port)
83f6a740 344 p = rcu_dereference(p->next);
5cb5e947 345 if ((unsigned long)rport >= (unsigned long)port)
e8051688 346 rp = rcu_dereference(hlist_next_rcu(rp));
5cb5e947
HX
347 }
348
349 if (!prev)
350 goto out;
351
b35c5f63 352 if (local_rcv)
37b090e6 353 deliver_clone(prev, skb, local_orig);
5cb5e947 354 else
37b090e6 355 __br_forward(prev, skb, local_orig);
5cb5e947
HX
356 return;
357
358out:
b35c5f63 359 if (!local_rcv)
623e43c2 360 kfree_skb_reason(skb, reason);
5cb5e947 361}
5cb5e947 362#endif