Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
torvalds
GitHub Repository: torvalds/linux
Path: blob/master/net/bridge/br_forward.c
26278 views
1
// SPDX-License-Identifier: GPL-2.0-or-later
2
/*
3
* Forwarding decision
4
* Linux ethernet bridge
5
*
6
* Authors:
7
* Lennert Buytenhek <[email protected]>
8
*/
9
10
#include <linux/err.h>
11
#include <linux/slab.h>
12
#include <linux/kernel.h>
13
#include <linux/netdevice.h>
14
#include <linux/netpoll.h>
15
#include <linux/skbuff.h>
16
#include <linux/if_vlan.h>
17
#include <linux/netfilter_bridge.h>
18
#include "br_private.h"
19
20
/* Don't forward packets to originating port or forwarding disabled */
21
static inline int should_deliver(const struct net_bridge_port *p,
22
const struct sk_buff *skb)
23
{
24
struct net_bridge_vlan_group *vg;
25
26
vg = nbp_vlan_group_rcu(p);
27
return ((p->flags & BR_HAIRPIN_MODE) || skb->dev != p->dev) &&
28
(br_mst_is_enabled(p->br) || p->state == BR_STATE_FORWARDING) &&
29
br_allowed_egress(vg, skb) && nbp_switchdev_allowed_egress(p, skb) &&
30
!br_skb_isolated(p, skb);
31
}
32
33
int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb)
34
{
35
skb_push(skb, ETH_HLEN);
36
if (!is_skb_forwardable(skb->dev, skb))
37
goto drop;
38
39
br_drop_fake_rtable(skb);
40
41
if (skb->ip_summed == CHECKSUM_PARTIAL &&
42
eth_type_vlan(skb->protocol)) {
43
int depth;
44
45
if (!vlan_get_protocol_and_depth(skb, skb->protocol, &depth))
46
goto drop;
47
48
skb_set_network_header(skb, depth);
49
}
50
51
br_switchdev_frame_set_offload_fwd_mark(skb);
52
53
dev_queue_xmit(skb);
54
55
return 0;
56
57
drop:
58
kfree_skb(skb);
59
return 0;
60
}
61
EXPORT_SYMBOL_GPL(br_dev_queue_push_xmit);
62
63
int br_forward_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
64
{
65
skb_clear_tstamp(skb);
66
return NF_HOOK(NFPROTO_BRIDGE, NF_BR_POST_ROUTING,
67
net, sk, skb, NULL, skb->dev,
68
br_dev_queue_push_xmit);
69
70
}
71
EXPORT_SYMBOL_GPL(br_forward_finish);
72
73
static void __br_forward(const struct net_bridge_port *to,
74
struct sk_buff *skb, bool local_orig)
75
{
76
struct net_bridge_vlan_group *vg;
77
struct net_device *indev;
78
struct net *net;
79
int br_hook;
80
81
/* Mark the skb for forwarding offload early so that br_handle_vlan()
82
* can know whether to pop the VLAN header on egress or keep it.
83
*/
84
nbp_switchdev_frame_mark_tx_fwd_offload(to, skb);
85
86
vg = nbp_vlan_group_rcu(to);
87
skb = br_handle_vlan(to->br, to, vg, skb);
88
if (!skb)
89
return;
90
91
indev = skb->dev;
92
skb->dev = to->dev;
93
if (!local_orig) {
94
if (skb_warn_if_lro(skb)) {
95
kfree_skb(skb);
96
return;
97
}
98
br_hook = NF_BR_FORWARD;
99
skb_forward_csum(skb);
100
net = dev_net(indev);
101
} else {
102
if (unlikely(netpoll_tx_running(to->br->dev))) {
103
skb_push(skb, ETH_HLEN);
104
if (!is_skb_forwardable(skb->dev, skb))
105
kfree_skb(skb);
106
else
107
br_netpoll_send_skb(to, skb);
108
return;
109
}
110
br_hook = NF_BR_LOCAL_OUT;
111
net = dev_net(skb->dev);
112
indev = NULL;
113
}
114
115
NF_HOOK(NFPROTO_BRIDGE, br_hook,
116
net, NULL, skb, indev, skb->dev,
117
br_forward_finish);
118
}
119
120
static int deliver_clone(const struct net_bridge_port *prev,
121
struct sk_buff *skb, bool local_orig)
122
{
123
struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
124
125
skb = skb_clone(skb, GFP_ATOMIC);
126
if (!skb) {
127
DEV_STATS_INC(dev, tx_dropped);
128
return -ENOMEM;
129
}
130
131
__br_forward(prev, skb, local_orig);
132
return 0;
133
}
134
135
/**
136
* br_forward - forward a packet to a specific port
137
* @to: destination port
138
* @skb: packet being forwarded
139
* @local_rcv: packet will be received locally after forwarding
140
* @local_orig: packet is locally originated
141
*
142
* Should be called with rcu_read_lock.
143
*/
144
void br_forward(const struct net_bridge_port *to,
145
struct sk_buff *skb, bool local_rcv, bool local_orig)
146
{
147
if (unlikely(!to))
148
goto out;
149
150
/* redirect to backup link if the destination port is down */
151
if (rcu_access_pointer(to->backup_port) && !netif_carrier_ok(to->dev)) {
152
struct net_bridge_port *backup_port;
153
154
backup_port = rcu_dereference(to->backup_port);
155
if (unlikely(!backup_port))
156
goto out;
157
BR_INPUT_SKB_CB(skb)->backup_nhid = READ_ONCE(to->backup_nhid);
158
to = backup_port;
159
}
160
161
if (should_deliver(to, skb)) {
162
if (local_rcv)
163
deliver_clone(to, skb, local_orig);
164
else
165
__br_forward(to, skb, local_orig);
166
return;
167
}
168
169
out:
170
if (!local_rcv)
171
kfree_skb(skb);
172
}
173
EXPORT_SYMBOL_GPL(br_forward);
174
175
static struct net_bridge_port *maybe_deliver(
176
struct net_bridge_port *prev, struct net_bridge_port *p,
177
struct sk_buff *skb, bool local_orig)
178
{
179
u8 igmp_type = br_multicast_igmp_type(skb);
180
int err;
181
182
if (!should_deliver(p, skb))
183
return prev;
184
185
nbp_switchdev_frame_mark_tx_fwd_to_hwdom(p, skb);
186
187
if (!prev)
188
goto out;
189
190
err = deliver_clone(prev, skb, local_orig);
191
if (err)
192
return ERR_PTR(err);
193
out:
194
br_multicast_count(p->br, p, skb, igmp_type, BR_MCAST_DIR_TX);
195
196
return p;
197
}
198
199
/* called under rcu_read_lock */
200
void br_flood(struct net_bridge *br, struct sk_buff *skb,
201
enum br_pkt_type pkt_type, bool local_rcv, bool local_orig,
202
u16 vid)
203
{
204
enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET;
205
struct net_bridge_port *prev = NULL;
206
struct net_bridge_port *p;
207
208
br_tc_skb_miss_set(skb, pkt_type != BR_PKT_BROADCAST);
209
210
list_for_each_entry_rcu(p, &br->port_list, list) {
211
/* Do not flood unicast traffic to ports that turn it off, nor
212
* other traffic if flood off, except for traffic we originate
213
*/
214
switch (pkt_type) {
215
case BR_PKT_UNICAST:
216
if (!(p->flags & BR_FLOOD))
217
continue;
218
break;
219
case BR_PKT_MULTICAST:
220
if (!(p->flags & BR_MCAST_FLOOD) && skb->dev != br->dev)
221
continue;
222
break;
223
case BR_PKT_BROADCAST:
224
if (!(p->flags & BR_BCAST_FLOOD) && skb->dev != br->dev)
225
continue;
226
break;
227
}
228
229
/* Do not flood to ports that enable proxy ARP */
230
if (p->flags & BR_PROXYARP)
231
continue;
232
if (BR_INPUT_SKB_CB(skb)->proxyarp_replied &&
233
((p->flags & BR_PROXYARP_WIFI) ||
234
br_is_neigh_suppress_enabled(p, vid)))
235
continue;
236
237
prev = maybe_deliver(prev, p, skb, local_orig);
238
if (IS_ERR(prev)) {
239
reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM :
240
SKB_DROP_REASON_NOT_SPECIFIED;
241
goto out;
242
}
243
}
244
245
if (!prev)
246
goto out;
247
248
if (local_rcv)
249
deliver_clone(prev, skb, local_orig);
250
else
251
__br_forward(prev, skb, local_orig);
252
return;
253
254
out:
255
if (!local_rcv)
256
kfree_skb_reason(skb, reason);
257
}
258
259
#ifdef CONFIG_BRIDGE_IGMP_SNOOPING
260
static void maybe_deliver_addr(struct net_bridge_port *p, struct sk_buff *skb,
261
const unsigned char *addr, bool local_orig)
262
{
263
struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
264
const unsigned char *src = eth_hdr(skb)->h_source;
265
struct sk_buff *nskb;
266
267
if (!should_deliver(p, skb))
268
return;
269
270
/* Even with hairpin, no soliloquies - prevent breaking IPv6 DAD */
271
if (skb->dev == p->dev && ether_addr_equal(src, addr))
272
return;
273
274
__skb_push(skb, ETH_HLEN);
275
nskb = pskb_copy(skb, GFP_ATOMIC);
276
__skb_pull(skb, ETH_HLEN);
277
if (!nskb) {
278
DEV_STATS_INC(dev, tx_dropped);
279
return;
280
}
281
282
skb = nskb;
283
__skb_pull(skb, ETH_HLEN);
284
if (!is_broadcast_ether_addr(addr))
285
memcpy(eth_hdr(skb)->h_dest, addr, ETH_ALEN);
286
287
__br_forward(p, skb, local_orig);
288
}
289
290
/* called with rcu_read_lock */
291
void br_multicast_flood(struct net_bridge_mdb_entry *mdst,
292
struct sk_buff *skb,
293
struct net_bridge_mcast *brmctx,
294
bool local_rcv, bool local_orig)
295
{
296
enum skb_drop_reason reason = SKB_DROP_REASON_NO_TX_TARGET;
297
struct net_bridge_port *prev = NULL;
298
struct net_bridge_port_group *p;
299
bool allow_mode_include = true;
300
struct hlist_node *rp;
301
302
rp = br_multicast_get_first_rport_node(brmctx, skb);
303
304
if (mdst) {
305
p = rcu_dereference(mdst->ports);
306
if (br_multicast_should_handle_mode(brmctx, mdst->addr.proto) &&
307
br_multicast_is_star_g(&mdst->addr))
308
allow_mode_include = false;
309
} else {
310
p = NULL;
311
br_tc_skb_miss_set(skb, true);
312
}
313
314
while (p || rp) {
315
struct net_bridge_port *port, *lport, *rport;
316
317
lport = p ? p->key.port : NULL;
318
rport = br_multicast_rport_from_node_skb(rp, skb);
319
320
if ((unsigned long)lport > (unsigned long)rport) {
321
port = lport;
322
323
if (port->flags & BR_MULTICAST_TO_UNICAST) {
324
maybe_deliver_addr(lport, skb, p->eth_addr,
325
local_orig);
326
goto delivered;
327
}
328
if ((!allow_mode_include &&
329
p->filter_mode == MCAST_INCLUDE) ||
330
(p->flags & MDB_PG_FLAGS_BLOCKED))
331
goto delivered;
332
} else {
333
port = rport;
334
}
335
336
prev = maybe_deliver(prev, port, skb, local_orig);
337
if (IS_ERR(prev)) {
338
reason = PTR_ERR(prev) == -ENOMEM ? SKB_DROP_REASON_NOMEM :
339
SKB_DROP_REASON_NOT_SPECIFIED;
340
goto out;
341
}
342
delivered:
343
if ((unsigned long)lport >= (unsigned long)port)
344
p = rcu_dereference(p->next);
345
if ((unsigned long)rport >= (unsigned long)port)
346
rp = rcu_dereference(hlist_next_rcu(rp));
347
}
348
349
if (!prev)
350
goto out;
351
352
if (local_rcv)
353
deliver_clone(prev, skb, local_orig);
354
else
355
__br_forward(prev, skb, local_orig);
356
return;
357
358
out:
359
if (!local_rcv)
360
kfree_skb_reason(skb, reason);
361
}
362
#endif
363
364