net: bridge: rearrange flood vs unicast receive paths
[deliverable/linux.git] / net / bridge / br_input.c
CommitLineData
1da177e4
LT
1/*
2 * Handle incoming frames
3 * Linux ethernet bridge
4 *
5 * Authors:
6 * Lennert Buytenhek <buytenh@gnu.org>
7 *
1da177e4
LT
8 * This program is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU General Public License
10 * as published by the Free Software Foundation; either version
11 * 2 of the License, or (at your option) any later version.
12 */
13
5a0e3ad6 14#include <linux/slab.h>
1da177e4
LT
15#include <linux/kernel.h>
16#include <linux/netdevice.h>
17#include <linux/etherdevice.h>
18#include <linux/netfilter_bridge.h>
95850116
KP
19#include <linux/neighbour.h>
20#include <net/arp.h>
bc3b2d7f 21#include <linux/export.h>
a37b85c9 22#include <linux/rculist.h>
1da177e4
LT
23#include "br_private.h"
24
a386f990
ED
25/* Hook for brouter */
26br_should_route_hook_t __rcu *br_should_route_hook __read_mostly;
27EXPORT_SYMBOL(br_should_route_hook);
28
0c4b51f0
EB
29static int
30br_netif_receive_skb(struct net *net, struct sock *sk, struct sk_buff *skb)
04eb4489
EB
31{
32 return netif_receive_skb(skb);
33}
34
68b7c895 35static int br_pass_frame_up(struct sk_buff *skb)
1da177e4 36{
68b7c895 37 struct net_device *indev, *brdev = BR_INPUT_SKB_CB(skb)->brdev;
14bb4789 38 struct net_bridge *br = netdev_priv(brdev);
2594e906 39 struct net_bridge_vlan_group *vg;
8f84985f 40 struct pcpu_sw_netstats *brstats = this_cpu_ptr(br->stats);
1da177e4 41
406818ff 42 u64_stats_update_begin(&brstats->syncp);
14bb4789 43 brstats->rx_packets++;
44 brstats->rx_bytes += skb->len;
406818ff 45 u64_stats_update_end(&brstats->syncp);
1da177e4 46
907b1e6e 47 vg = br_vlan_group_rcu(br);
85f46c6b
VY
48 /* Bridge is just like any other port. Make sure the
49 * packet is allowed except in promisc modue when someone
50 * may be running packet capture.
51 */
52 if (!(brdev->flags & IFF_PROMISC) &&
2594e906 53 !br_allowed_egress(vg, skb)) {
85f46c6b
VY
54 kfree_skb(skb);
55 return NET_RX_DROP;
56 }
57
1da177e4 58 indev = skb->dev;
a339f1c8 59 skb->dev = brdev;
2594e906 60 skb = br_handle_vlan(br, vg, skb);
fc92f745
VY
61 if (!skb)
62 return NET_RX_DROP;
1080ab95 63 /* update the multicast stats if the packet is IGMP/MLD */
a65056ec 64 br_multicast_count(br, NULL, skb, br_multicast_igmp_type(skb),
1080ab95 65 BR_MCAST_DIR_TX);
1da177e4 66
29a26a56
EB
67 return NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_IN,
68 dev_net(indev), NULL, skb, indev, NULL,
04eb4489 69 br_netif_receive_skb);
1da177e4
LT
70}
71
95850116 72static void br_do_proxy_arp(struct sk_buff *skb, struct net_bridge *br,
842a9ae0 73 u16 vid, struct net_bridge_port *p)
95850116
KP
74{
75 struct net_device *dev = br->dev;
76 struct neighbour *n;
77 struct arphdr *parp;
78 u8 *arpptr, *sha;
79 __be32 sip, tip;
80
842a9ae0
JM
81 BR_INPUT_SKB_CB(skb)->proxyarp_replied = false;
82
95850116
KP
83 if (dev->flags & IFF_NOARP)
84 return;
85
86 if (!pskb_may_pull(skb, arp_hdr_len(dev))) {
87 dev->stats.tx_dropped++;
88 return;
89 }
90 parp = arp_hdr(skb);
91
92 if (parp->ar_pro != htons(ETH_P_IP) ||
93 parp->ar_op != htons(ARPOP_REQUEST) ||
94 parp->ar_hln != dev->addr_len ||
95 parp->ar_pln != 4)
96 return;
97
98 arpptr = (u8 *)parp + sizeof(struct arphdr);
99 sha = arpptr;
100 arpptr += dev->addr_len; /* sha */
101 memcpy(&sip, arpptr, sizeof(sip));
102 arpptr += sizeof(sip);
103 arpptr += dev->addr_len; /* tha */
104 memcpy(&tip, arpptr, sizeof(tip));
105
106 if (ipv4_is_loopback(tip) ||
107 ipv4_is_multicast(tip))
108 return;
109
110 n = neigh_lookup(&arp_tbl, &tip, dev);
111 if (n) {
112 struct net_bridge_fdb_entry *f;
113
114 if (!(n->nud_state & NUD_VALID)) {
115 neigh_release(n);
116 return;
117 }
118
119 f = __br_fdb_get(br, n->ha, vid);
842a9ae0
JM
120 if (f && ((p->flags & BR_PROXYARP) ||
121 (f->dst && (f->dst->flags & BR_PROXYARP_WIFI)))) {
95850116
KP
122 arp_send(ARPOP_REPLY, ETH_P_ARP, sip, skb->dev, tip,
123 sha, n->ha, sha);
842a9ae0
JM
124 BR_INPUT_SKB_CB(skb)->proxyarp_replied = true;
125 }
95850116
KP
126
127 neigh_release(n);
128 }
129}
130
eeaf61d8 131/* note: already called with rcu_read_lock */
0c4b51f0 132int br_handle_frame_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
1da177e4 133{
f350a0a8 134 struct net_bridge_port *p = br_port_get_rcu(skb->dev);
46c0772d
NA
135 const unsigned char *dest = eth_hdr(skb)->h_dest;
136 struct net_bridge_fdb_entry *dst = NULL;
e151aab9 137 bool mcast_hit = false, unicast = true;
c4fcb78c 138 struct net_bridge_mdb_entry *mdst;
46c0772d 139 struct net_bridge *br;
e081e1e3 140 struct sk_buff *skb2;
78851988 141 u16 vid = 0;
1da177e4 142
b3f1be4b
SH
143 if (!p || p->state == BR_STATE_DISABLED)
144 goto drop;
145
907b1e6e 146 if (!br_allowed_ingress(p->br, nbp_vlan_group_rcu(p), skb, &vid))
eb707618 147 goto out;
a37b85c9 148
85967bb4 149 /* insert into forwarding database after filtering to avoid spoofing */
b3f1be4b 150 br = p->br;
9ba18891 151 if (p->flags & BR_LEARNING)
a5642ab4 152 br_fdb_update(br, p, eth_hdr(skb)->h_source, vid, false);
85967bb4 153
44661462 154 if (!is_broadcast_ether_addr(dest) && is_multicast_ether_addr(dest) &&
06499098 155 br_multicast_rcv(br, p, skb, vid))
c4fcb78c
HX
156 goto drop;
157
b3f1be4b
SH
158 if (p->state == BR_STATE_LEARNING)
159 goto drop;
0e5eabac 160
68b7c895
HX
161 BR_INPUT_SKB_CB(skb)->brdev = br->dev;
162
e081e1e3
HX
163 /* The packet skb2 goes to the local host (NULL to skip). */
164 skb2 = NULL;
1da177e4 165
e081e1e3
HX
166 if (br->dev->flags & IFF_PROMISC)
167 skb2 = skb;
168
842a9ae0
JM
169 if (IS_ENABLED(CONFIG_INET) && skb->protocol == htons(ETH_P_ARP))
170 br_do_proxy_arp(skb, br, vid, p);
95850116 171
842a9ae0 172 if (is_broadcast_ether_addr(dest)) {
44661462 173 skb2 = skb;
867a5943
VY
174 unicast = false;
175 } else if (is_multicast_ether_addr(dest)) {
fbca58a2 176 mdst = br_mdb_get(br, skb, vid);
b00589af 177 if ((mdst || BR_INPUT_SKB_CB_MROUTERS_ONLY(skb)) &&
cc0fdd80 178 br_multicast_querier_exists(br, eth_hdr(skb))) {
8a870178 179 if ((mdst && mdst->mglist) ||
e151aab9 180 br_multicast_is_router(br)) {
c4fcb78c 181 skb2 = skb;
e151aab9
NA
182 br->dev->stats.multicast++;
183 }
184 mcast_hit = true;
46c0772d 185 } else {
c4fcb78c 186 skb2 = skb;
e151aab9 187 br->dev->stats.multicast++;
46c0772d 188 }
867a5943 189 unicast = false;
46c0772d 190 } else if ((dst = __br_fdb_get(br, dest, vid)) && dst->is_local) {
e081e1e3 191 /* Do not forward the packet since it's local. */
e151aab9 192 return br_pass_frame_up(skb);
1da177e4
LT
193 }
194
e151aab9
NA
195 if (dst) {
196 dst->used = jiffies;
197 br_forward(dst->dst, skb, skb2);
198 } else {
199 if (!mcast_hit)
867a5943 200 br_flood_forward(br, skb, skb2, unicast);
e151aab9
NA
201 else
202 br_multicast_forward(mdst, skb, skb2);
e081e1e3 203 }
1da177e4 204
87557c18 205 if (skb2)
68b7c895 206 return br_pass_frame_up(skb2);
87557c18 207
1da177e4
LT
208out:
209 return 0;
b3f1be4b
SH
210drop:
211 kfree_skb(skb);
212 goto out;
1da177e4 213}
34666d46 214EXPORT_SYMBOL_GPL(br_handle_frame_finish);
1da177e4 215
56fae404 216static void __br_handle_local_finish(struct sk_buff *skb)
cf0f02d0 217{
f350a0a8 218 struct net_bridge_port *p = br_port_get_rcu(skb->dev);
2ba071ec 219 u16 vid = 0;
cf0f02d0 220
e0d7968a
TM
221 /* check if vlan is allowed, to avoid spoofing */
222 if (p->flags & BR_LEARNING && br_should_learn(p, skb, &vid))
a5642ab4 223 br_fdb_update(p->br, p, eth_hdr(skb)->h_source, vid, false);
56fae404
IS
224}
225
226/* note: already called with rcu_read_lock */
227static int br_handle_local_finish(struct net *net, struct sock *sk, struct sk_buff *skb)
228{
229 struct net_bridge_port *p = br_port_get_rcu(skb->dev);
230
231 __br_handle_local_finish(skb);
8626c56c
FW
232
233 BR_INPUT_SKB_CB(skb)->brdev = p->br->dev;
234 br_pass_frame_up(skb);
235 return 0;
cf0f02d0
SH
236}
237
1da177e4 238/*
6229e362 239 * Return NULL if skb is handled
eeaf61d8 240 * note: already called with rcu_read_lock
1da177e4 241 */
8a4eb573 242rx_handler_result_t br_handle_frame(struct sk_buff **pskb)
1da177e4 243{
ab95bfe0 244 struct net_bridge_port *p;
8a4eb573 245 struct sk_buff *skb = *pskb;
1da177e4 246 const unsigned char *dest = eth_hdr(skb)->h_dest;
a386f990 247 br_should_route_hook_t *rhook;
1da177e4 248
c2368e79 249 if (unlikely(skb->pkt_type == PACKET_LOOPBACK))
8a4eb573 250 return RX_HANDLER_PASS;
ab95bfe0 251
1da177e4 252 if (!is_valid_ether_addr(eth_hdr(skb)->h_source))
467aea0d 253 goto drop;
1da177e4 254
7b995651
HX
255 skb = skb_share_check(skb, GFP_ATOMIC);
256 if (!skb)
8a4eb573 257 return RX_HANDLER_CONSUMED;
7b995651 258
f350a0a8 259 p = br_port_get_rcu(skb->dev);
ab95bfe0 260
46acc460 261 if (unlikely(is_link_local_ether_addr(dest))) {
f2808d22
TM
262 u16 fwd_mask = p->br->group_fwd_mask_required;
263
515853cc 264 /*
265 * See IEEE 802.1D Table 7-10 Reserved addresses
266 *
267 * Assignment Value
268 * Bridge Group Address 01-80-C2-00-00-00
269 * (MAC Control) 802.3 01-80-C2-00-00-01
270 * (Link Aggregation) 802.3 01-80-C2-00-00-02
271 * 802.1X PAE address 01-80-C2-00-00-03
272 *
273 * 802.1AB LLDP 01-80-C2-00-00-0E
274 *
275 * Others reserved for future standardization
276 */
277 switch (dest[5]) {
278 case 0x00: /* Bridge Group Address */
279 /* If STP is turned off,
280 then must forward to keep loop detection */
f2808d22
TM
281 if (p->br->stp_enabled == BR_NO_STP ||
282 fwd_mask & (1u << dest[5]))
515853cc 283 goto forward;
56fae404
IS
284 *pskb = skb;
285 __br_handle_local_finish(skb);
286 return RX_HANDLER_PASS;
515853cc 287
288 case 0x01: /* IEEE MAC (Pause) */
2111f8b9
SH
289 goto drop;
290
515853cc 291 default:
292 /* Allow selective forwarding for most other protocols */
f2808d22
TM
293 fwd_mask |= p->br->group_fwd_mask;
294 if (fwd_mask & (1u << dest[5]))
515853cc 295 goto forward;
296 }
a598f6ae 297
515853cc 298 /* Deliver packet to local host only */
8626c56c
FW
299 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_IN, dev_net(skb->dev),
300 NULL, skb, skb->dev, NULL, br_handle_local_finish);
301 return RX_HANDLER_CONSUMED;
2111f8b9 302 }
1da177e4 303
a598f6ae 304forward:
467aea0d
SH
305 switch (p->state) {
306 case BR_STATE_FORWARDING:
82de382c 307 rhook = rcu_dereference(br_should_route_hook);
a386f990 308 if (rhook) {
8a4eb573
JP
309 if ((*rhook)(skb)) {
310 *pskb = skb;
311 return RX_HANDLER_PASS;
312 }
1da177e4
LT
313 dest = eth_hdr(skb)->h_dest;
314 }
467aea0d
SH
315 /* fall through */
316 case BR_STATE_LEARNING:
9a7b6ef9 317 if (ether_addr_equal(p->br->dev->dev_addr, dest))
1da177e4
LT
318 skb->pkt_type = PACKET_HOST;
319
29a26a56
EB
320 NF_HOOK(NFPROTO_BRIDGE, NF_BR_PRE_ROUTING,
321 dev_net(skb->dev), NULL, skb, skb->dev, NULL,
1da177e4 322 br_handle_frame_finish);
467aea0d
SH
323 break;
324 default:
325drop:
326 kfree_skb(skb);
1da177e4 327 }
8a4eb573 328 return RX_HANDLER_CONSUMED;
1da177e4 329}
This page took 0.801001 seconds and 5 git commands to generate.