blob: 6c196037d8185a8681da5d1eeb374aaa658daaff [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Forwarding decision
3 * Linux ethernet bridge
4 *
5 * Authors:
6 * Lennert Buytenhek <buytenh@gnu.org>
7 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version
11 * 2 of the License, or (at your option) any later version.
12 */
13
Herbert Xu025d89c2010-02-27 19:41:43 +000014#include <linux/err.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090015#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <linux/kernel.h>
17#include <linux/netdevice.h>
WANG Congc06ee962010-05-06 00:48:24 -070018#include <linux/netpoll.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <linux/skbuff.h>
Stephen Hemminger85ca7192006-04-26 02:39:19 -070020#include <linux/if_vlan.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include <linux/netfilter_bridge.h>
22#include "br_private.h"
23
David S. Miller87faf3c2010-03-16 14:37:47 -070024static int deliver_clone(const struct net_bridge_port *prev,
25 struct sk_buff *skb,
Michael Braun7f7708f2010-03-16 00:26:22 -070026 void (*__packet_hook)(const struct net_bridge_port *p,
27 struct sk_buff *skb));
28
tanxiaojun1a81a2e2013-12-16 21:32:46 +080029/* Don't forward packets to originating port or forwarding disabled */
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +090030static inline int should_deliver(const struct net_bridge_port *p,
Linus Torvalds1da177e2005-04-16 15:20:36 -070031 const struct sk_buff *skb)
32{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020033 struct net_bridge_vlan_group *vg;
34
Nikolay Aleksandrov907b1e62015-10-12 21:47:02 +020035 vg = nbp_vlan_group_rcu(p);
tanxiaojuna97bfc12013-12-19 13:28:11 +080036 return ((p->flags & BR_HAIRPIN_MODE) || skb->dev != p->dev) &&
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020037 br_allowed_egress(vg, skb) && p->state == BR_STATE_FORWARDING;
Linus Torvalds1da177e2005-04-16 15:20:36 -070038}
39
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -050040int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -070041{
Toshiaki Makitadf356d52015-07-28 19:05:37 +090042 if (!is_skb_forwardable(skb->dev, skb))
43 goto drop;
44
45 skb_push(skb, ETH_HLEN);
46 br_drop_fake_rtable(skb);
Toshiaki Makitadf356d52015-07-28 19:05:37 +090047
48 if (skb->ip_summed == CHECKSUM_PARTIAL &&
49 (skb->protocol == htons(ETH_P_8021Q) ||
50 skb->protocol == htons(ETH_P_8021AD))) {
51 int depth;
52
53 if (!__vlan_get_protocol(skb, skb->protocol, &depth))
54 goto drop;
55
56 skb_set_network_header(skb, depth);
Linus Torvalds1da177e2005-04-16 15:20:36 -070057 }
58
Toshiaki Makitadf356d52015-07-28 19:05:37 +090059 dev_queue_xmit(skb);
60
61 return 0;
62
63drop:
64 kfree_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -070065 return 0;
66}
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +020067EXPORT_SYMBOL_GPL(br_dev_queue_push_xmit);
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -050069int br_forward_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -070070{
Eric W. Biederman29a26a52015-09-15 20:04:16 -050071 return NF_HOOK(NFPROTO_BRIDGE, NF_BR_POST_ROUTING,
72 net, sk, skb, NULL, skb->dev,
Stephen Hemminger9ef513b2006-05-25 15:58:54 -070073 br_dev_queue_push_xmit);
Linus Torvalds1da177e2005-04-16 15:20:36 -070074
Linus Torvalds1da177e2005-04-16 15:20:36 -070075}
Pablo Neira Ayuso34666d42014-09-18 11:29:03 +020076EXPORT_SYMBOL_GPL(br_forward_finish);
Linus Torvalds1da177e2005-04-16 15:20:36 -070077
78static void __br_deliver(const struct net_bridge_port *to, struct sk_buff *skb)
79{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020080 struct net_bridge_vlan_group *vg;
81
Nikolay Aleksandrov907b1e62015-10-12 21:47:02 +020082 vg = nbp_vlan_group_rcu(to);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +020083 skb = br_handle_vlan(to->br, vg, skb);
Vlad Yasevich78851982013-02-13 12:00:14 +000084 if (!skb)
85 return;
86
Linus Torvalds1da177e2005-04-16 15:20:36 -070087 skb->dev = to->dev;
Herbert Xu91d2c342010-06-10 16:12:50 +000088
Amerigo Wange15c3c222012-08-10 01:24:45 +000089 if (unlikely(netpoll_tx_running(to->br->dev))) {
Vlad Yasevichf6367b42014-03-27 17:32:30 -040090 if (!is_skb_forwardable(skb->dev, skb))
Herbert Xu91d2c342010-06-10 16:12:50 +000091 kfree_skb(skb);
92 else {
93 skb_push(skb, ETH_HLEN);
94 br_netpoll_send_skb(to, skb);
95 }
96 return;
97 }
98
Eric W. Biederman29a26a52015-09-15 20:04:16 -050099 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT,
100 dev_net(skb->dev), NULL, skb,NULL, skb->dev,
Jan Engelhardt713aefa2010-03-23 04:07:21 +0100101 br_forward_finish);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102}
103
104static void __br_forward(const struct net_bridge_port *to, struct sk_buff *skb)
105{
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200106 struct net_bridge_vlan_group *vg;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700107 struct net_device *indev;
108
Herbert Xu4906f992009-02-09 15:07:18 -0800109 if (skb_warn_if_lro(skb)) {
110 kfree_skb(skb);
111 return;
112 }
113
Nikolay Aleksandrov907b1e62015-10-12 21:47:02 +0200114 vg = nbp_vlan_group_rcu(to);
Nikolay Aleksandrov2594e902015-09-25 19:00:11 +0200115 skb = br_handle_vlan(to->br, vg, skb);
Vlad Yasevich78851982013-02-13 12:00:14 +0000116 if (!skb)
117 return;
118
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119 indev = skb->dev;
120 skb->dev = to->dev;
Herbert Xu35fc92a2007-03-26 23:22:20 -0700121 skb_forward_csum(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500123 NF_HOOK(NFPROTO_BRIDGE, NF_BR_FORWARD,
124 dev_net(indev), NULL, skb, indev, skb->dev,
Jan Engelhardt713aefa2010-03-23 04:07:21 +0100125 br_forward_finish);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126}
127
128/* called with rcu_read_lock */
129void br_deliver(const struct net_bridge_port *to, struct sk_buff *skb)
130{
stephen hemminger43598812011-12-08 07:17:49 +0000131 if (to && should_deliver(to, skb)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132 __br_deliver(to, skb);
133 return;
134 }
135
136 kfree_skb(skb);
137}
Pablo Neira Ayuso523b9292014-10-25 18:40:26 +0200138EXPORT_SYMBOL_GPL(br_deliver);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139
140/* called with rcu_read_lock */
Michael Braun7f7708f2010-03-16 00:26:22 -0700141void br_forward(const struct net_bridge_port *to, struct sk_buff *skb, struct sk_buff *skb0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142{
Roopa Prabhub7af1472015-10-27 07:52:56 -0700143 if (to && should_deliver(to, skb)) {
Michael Braun7f7708f2010-03-16 00:26:22 -0700144 if (skb0)
145 deliver_clone(to, skb, __br_forward);
146 else
147 __br_forward(to, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 return;
149 }
150
Michael Braun7f7708f2010-03-16 00:26:22 -0700151 if (!skb0)
152 kfree_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700153}
154
David S. Miller87faf3c2010-03-16 14:37:47 -0700155static int deliver_clone(const struct net_bridge_port *prev,
156 struct sk_buff *skb,
Herbert Xu025d89c2010-02-27 19:41:43 +0000157 void (*__packet_hook)(const struct net_bridge_port *p,
158 struct sk_buff *skb))
159{
Herbert Xufed396a2010-06-15 21:43:07 -0700160 struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
161
Herbert Xu025d89c2010-02-27 19:41:43 +0000162 skb = skb_clone(skb, GFP_ATOMIC);
163 if (!skb) {
Herbert Xu025d89c2010-02-27 19:41:43 +0000164 dev->stats.tx_dropped++;
165 return -ENOMEM;
166 }
167
168 __packet_hook(prev, skb);
169 return 0;
170}
171
172static struct net_bridge_port *maybe_deliver(
173 struct net_bridge_port *prev, struct net_bridge_port *p,
174 struct sk_buff *skb,
175 void (*__packet_hook)(const struct net_bridge_port *p,
176 struct sk_buff *skb))
177{
178 int err;
179
180 if (!should_deliver(p, skb))
181 return prev;
182
183 if (!prev)
184 goto out;
185
186 err = deliver_clone(prev, skb, __packet_hook);
187 if (err)
188 return ERR_PTR(err);
189
190out:
191 return p;
192}
193
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194/* called under bridge lock */
Herbert Xue081e1e2007-09-16 16:20:48 -0700195static void br_flood(struct net_bridge *br, struct sk_buff *skb,
Herbert Xub33084b2010-02-27 19:41:41 +0000196 struct sk_buff *skb0,
197 void (*__packet_hook)(const struct net_bridge_port *p,
Vlad Yasevich867a5942013-06-05 10:08:01 -0400198 struct sk_buff *skb),
199 bool unicast)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200{
Nikolay Aleksandrov1080ab92016-06-28 16:57:06 +0200201 u8 igmp_type = br_multicast_igmp_type(skb);
202 __be16 proto = skb->protocol;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203 struct net_bridge_port *prev;
Nikolay Aleksandrov1080ab92016-06-28 16:57:06 +0200204 struct net_bridge_port *p;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206 prev = NULL;
207
208 list_for_each_entry_rcu(p, &br->port_list, list) {
Vlad Yasevich867a5942013-06-05 10:08:01 -0400209 /* Do not flood unicast traffic to ports that turn it off */
210 if (unicast && !(p->flags & BR_FLOOD))
211 continue;
Kyeyoon Park95850112014-10-23 14:49:17 -0700212
213 /* Do not flood to ports that enable proxy ARP */
214 if (p->flags & BR_PROXYARP)
215 continue;
Jouni Malinen842a9ae2015-03-04 12:54:21 +0200216 if ((p->flags & BR_PROXYARP_WIFI) &&
217 BR_INPUT_SKB_CB(skb)->proxyarp_replied)
218 continue;
Kyeyoon Park95850112014-10-23 14:49:17 -0700219
Herbert Xu025d89c2010-02-27 19:41:43 +0000220 prev = maybe_deliver(prev, p, skb, __packet_hook);
221 if (IS_ERR(prev))
222 goto out;
Nikolay Aleksandrov1080ab92016-06-28 16:57:06 +0200223 if (prev == p)
224 br_multicast_count(p->br, p, proto, igmp_type,
225 BR_MCAST_DIR_TX);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226 }
227
Herbert Xub33084b2010-02-27 19:41:41 +0000228 if (!prev)
229 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700230
Herbert Xu025d89c2010-02-27 19:41:43 +0000231 if (skb0)
232 deliver_clone(prev, skb, __packet_hook);
233 else
234 __packet_hook(prev, skb);
Herbert Xub33084b2010-02-27 19:41:41 +0000235 return;
236
237out:
238 if (!skb0)
239 kfree_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700240}
241
242
243/* called with rcu_read_lock */
Vlad Yasevich867a5942013-06-05 10:08:01 -0400244void br_flood_deliver(struct net_bridge *br, struct sk_buff *skb, bool unicast)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700245{
Vlad Yasevich867a5942013-06-05 10:08:01 -0400246 br_flood(br, skb, NULL, __br_deliver, unicast);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247}
248
249/* called under bridge lock */
Herbert Xub33084b2010-02-27 19:41:41 +0000250void br_flood_forward(struct net_bridge *br, struct sk_buff *skb,
Vlad Yasevich867a5942013-06-05 10:08:01 -0400251 struct sk_buff *skb2, bool unicast)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252{
Vlad Yasevich867a5942013-06-05 10:08:01 -0400253 br_flood(br, skb, skb2, __br_forward, unicast);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254}
Herbert Xu5cb5e942010-02-27 19:41:46 +0000255
256#ifdef CONFIG_BRIDGE_IGMP_SNOOPING
257/* called with rcu_read_lock */
258static void br_multicast_flood(struct net_bridge_mdb_entry *mdst,
259 struct sk_buff *skb, struct sk_buff *skb0,
260 void (*__packet_hook)(
261 const struct net_bridge_port *p,
262 struct sk_buff *skb))
263{
264 struct net_device *dev = BR_INPUT_SKB_CB(skb)->brdev;
Nikolay Aleksandrov1080ab92016-06-28 16:57:06 +0200265 u8 igmp_type = br_multicast_igmp_type(skb);
Herbert Xu5cb5e942010-02-27 19:41:46 +0000266 struct net_bridge *br = netdev_priv(dev);
stephen hemmingerafe01592010-04-27 15:01:07 +0000267 struct net_bridge_port *prev = NULL;
Herbert Xu5cb5e942010-02-27 19:41:46 +0000268 struct net_bridge_port_group *p;
Nikolay Aleksandrov1080ab92016-06-28 16:57:06 +0200269 __be16 proto = skb->protocol;
270
Herbert Xu5cb5e942010-02-27 19:41:46 +0000271 struct hlist_node *rp;
272
Eric Dumazete8051682010-11-15 06:38:10 +0000273 rp = rcu_dereference(hlist_first_rcu(&br->router_list));
stephen hemminger83f6a742010-04-27 15:01:06 +0000274 p = mdst ? rcu_dereference(mdst->ports) : NULL;
Herbert Xu5cb5e942010-02-27 19:41:46 +0000275 while (p || rp) {
stephen hemmingerafe01592010-04-27 15:01:07 +0000276 struct net_bridge_port *port, *lport, *rport;
277
Herbert Xu5cb5e942010-02-27 19:41:46 +0000278 lport = p ? p->port : NULL;
279 rport = rp ? hlist_entry(rp, struct net_bridge_port, rlist) :
280 NULL;
281
282 port = (unsigned long)lport > (unsigned long)rport ?
283 lport : rport;
284
285 prev = maybe_deliver(prev, port, skb, __packet_hook);
286 if (IS_ERR(prev))
287 goto out;
Nikolay Aleksandrov1080ab92016-06-28 16:57:06 +0200288 if (prev == port)
289 br_multicast_count(port->br, port, proto, igmp_type,
290 BR_MCAST_DIR_TX);
Herbert Xu5cb5e942010-02-27 19:41:46 +0000291
292 if ((unsigned long)lport >= (unsigned long)port)
stephen hemminger83f6a742010-04-27 15:01:06 +0000293 p = rcu_dereference(p->next);
Herbert Xu5cb5e942010-02-27 19:41:46 +0000294 if ((unsigned long)rport >= (unsigned long)port)
Eric Dumazete8051682010-11-15 06:38:10 +0000295 rp = rcu_dereference(hlist_next_rcu(rp));
Herbert Xu5cb5e942010-02-27 19:41:46 +0000296 }
297
298 if (!prev)
299 goto out;
300
301 if (skb0)
302 deliver_clone(prev, skb, __packet_hook);
303 else
304 __packet_hook(prev, skb);
305 return;
306
307out:
308 if (!skb0)
309 kfree_skb(skb);
310}
311
312/* called with rcu_read_lock */
313void br_multicast_deliver(struct net_bridge_mdb_entry *mdst,
314 struct sk_buff *skb)
315{
316 br_multicast_flood(mdst, skb, NULL, __br_deliver);
317}
318
319/* called with rcu_read_lock */
320void br_multicast_forward(struct net_bridge_mdb_entry *mdst,
321 struct sk_buff *skb, struct sk_buff *skb2)
322{
323 br_multicast_flood(mdst, skb, skb2, __br_forward);
324}
325#endif