bridge: add export of multicast database adjacent to net_dev
[deliverable/linux.git] / net / bridge / br_multicast.c
1 /*
2 * Bridge multicast support.
3 *
4 * Copyright (c) 2010 Herbert Xu <herbert@gondor.apana.org.au>
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the Free
8 * Software Foundation; either version 2 of the License, or (at your option)
9 * any later version.
10 *
11 */
12
13 #include <linux/err.h>
14 #include <linux/export.h>
15 #include <linux/if_ether.h>
16 #include <linux/igmp.h>
17 #include <linux/jhash.h>
18 #include <linux/kernel.h>
19 #include <linux/log2.h>
20 #include <linux/netdevice.h>
21 #include <linux/netfilter_bridge.h>
22 #include <linux/random.h>
23 #include <linux/rculist.h>
24 #include <linux/skbuff.h>
25 #include <linux/slab.h>
26 #include <linux/timer.h>
27 #include <linux/inetdevice.h>
28 #include <net/ip.h>
29 #if IS_ENABLED(CONFIG_IPV6)
30 #include <net/ipv6.h>
31 #include <net/mld.h>
32 #include <net/ip6_checksum.h>
33 #include <net/addrconf.h>
34 #endif
35
36 #include "br_private.h"
37
38 static void br_multicast_start_querier(struct net_bridge *br,
39 struct bridge_mcast_own_query *query);
40 unsigned int br_mdb_rehash_seq;
41
42 static inline int br_ip_equal(const struct br_ip *a, const struct br_ip *b)
43 {
44 if (a->proto != b->proto)
45 return 0;
46 if (a->vid != b->vid)
47 return 0;
48 switch (a->proto) {
49 case htons(ETH_P_IP):
50 return a->u.ip4 == b->u.ip4;
51 #if IS_ENABLED(CONFIG_IPV6)
52 case htons(ETH_P_IPV6):
53 return ipv6_addr_equal(&a->u.ip6, &b->u.ip6);
54 #endif
55 }
56 return 0;
57 }
58
59 static inline int __br_ip4_hash(struct net_bridge_mdb_htable *mdb, __be32 ip,
60 __u16 vid)
61 {
62 return jhash_2words((__force u32)ip, vid, mdb->secret) & (mdb->max - 1);
63 }
64
65 #if IS_ENABLED(CONFIG_IPV6)
66 static inline int __br_ip6_hash(struct net_bridge_mdb_htable *mdb,
67 const struct in6_addr *ip,
68 __u16 vid)
69 {
70 return jhash_2words(ipv6_addr_hash(ip), vid,
71 mdb->secret) & (mdb->max - 1);
72 }
73 #endif
74
75 static inline int br_ip_hash(struct net_bridge_mdb_htable *mdb,
76 struct br_ip *ip)
77 {
78 switch (ip->proto) {
79 case htons(ETH_P_IP):
80 return __br_ip4_hash(mdb, ip->u.ip4, ip->vid);
81 #if IS_ENABLED(CONFIG_IPV6)
82 case htons(ETH_P_IPV6):
83 return __br_ip6_hash(mdb, &ip->u.ip6, ip->vid);
84 #endif
85 }
86 return 0;
87 }
88
89 static struct net_bridge_mdb_entry *__br_mdb_ip_get(
90 struct net_bridge_mdb_htable *mdb, struct br_ip *dst, int hash)
91 {
92 struct net_bridge_mdb_entry *mp;
93
94 hlist_for_each_entry_rcu(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
95 if (br_ip_equal(&mp->addr, dst))
96 return mp;
97 }
98
99 return NULL;
100 }
101
102 struct net_bridge_mdb_entry *br_mdb_ip_get(struct net_bridge_mdb_htable *mdb,
103 struct br_ip *dst)
104 {
105 if (!mdb)
106 return NULL;
107
108 return __br_mdb_ip_get(mdb, dst, br_ip_hash(mdb, dst));
109 }
110
111 static struct net_bridge_mdb_entry *br_mdb_ip4_get(
112 struct net_bridge_mdb_htable *mdb, __be32 dst, __u16 vid)
113 {
114 struct br_ip br_dst;
115
116 br_dst.u.ip4 = dst;
117 br_dst.proto = htons(ETH_P_IP);
118 br_dst.vid = vid;
119
120 return br_mdb_ip_get(mdb, &br_dst);
121 }
122
123 #if IS_ENABLED(CONFIG_IPV6)
124 static struct net_bridge_mdb_entry *br_mdb_ip6_get(
125 struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
126 __u16 vid)
127 {
128 struct br_ip br_dst;
129
130 br_dst.u.ip6 = *dst;
131 br_dst.proto = htons(ETH_P_IPV6);
132 br_dst.vid = vid;
133
134 return br_mdb_ip_get(mdb, &br_dst);
135 }
136 #endif
137
138 struct net_bridge_mdb_entry *br_mdb_get(struct net_bridge *br,
139 struct sk_buff *skb, u16 vid)
140 {
141 struct net_bridge_mdb_htable *mdb = rcu_dereference(br->mdb);
142 struct br_ip ip;
143
144 if (br->multicast_disabled)
145 return NULL;
146
147 if (BR_INPUT_SKB_CB(skb)->igmp)
148 return NULL;
149
150 ip.proto = skb->protocol;
151 ip.vid = vid;
152
153 switch (skb->protocol) {
154 case htons(ETH_P_IP):
155 ip.u.ip4 = ip_hdr(skb)->daddr;
156 break;
157 #if IS_ENABLED(CONFIG_IPV6)
158 case htons(ETH_P_IPV6):
159 ip.u.ip6 = ipv6_hdr(skb)->daddr;
160 break;
161 #endif
162 default:
163 return NULL;
164 }
165
166 return br_mdb_ip_get(mdb, &ip);
167 }
168
169 static void br_mdb_free(struct rcu_head *head)
170 {
171 struct net_bridge_mdb_htable *mdb =
172 container_of(head, struct net_bridge_mdb_htable, rcu);
173 struct net_bridge_mdb_htable *old = mdb->old;
174
175 mdb->old = NULL;
176 kfree(old->mhash);
177 kfree(old);
178 }
179
180 static int br_mdb_copy(struct net_bridge_mdb_htable *new,
181 struct net_bridge_mdb_htable *old,
182 int elasticity)
183 {
184 struct net_bridge_mdb_entry *mp;
185 int maxlen;
186 int len;
187 int i;
188
189 for (i = 0; i < old->max; i++)
190 hlist_for_each_entry(mp, &old->mhash[i], hlist[old->ver])
191 hlist_add_head(&mp->hlist[new->ver],
192 &new->mhash[br_ip_hash(new, &mp->addr)]);
193
194 if (!elasticity)
195 return 0;
196
197 maxlen = 0;
198 for (i = 0; i < new->max; i++) {
199 len = 0;
200 hlist_for_each_entry(mp, &new->mhash[i], hlist[new->ver])
201 len++;
202 if (len > maxlen)
203 maxlen = len;
204 }
205
206 return maxlen > elasticity ? -EINVAL : 0;
207 }
208
209 void br_multicast_free_pg(struct rcu_head *head)
210 {
211 struct net_bridge_port_group *p =
212 container_of(head, struct net_bridge_port_group, rcu);
213
214 kfree(p);
215 }
216
217 static void br_multicast_free_group(struct rcu_head *head)
218 {
219 struct net_bridge_mdb_entry *mp =
220 container_of(head, struct net_bridge_mdb_entry, rcu);
221
222 kfree(mp);
223 }
224
225 static void br_multicast_group_expired(unsigned long data)
226 {
227 struct net_bridge_mdb_entry *mp = (void *)data;
228 struct net_bridge *br = mp->br;
229 struct net_bridge_mdb_htable *mdb;
230
231 spin_lock(&br->multicast_lock);
232 if (!netif_running(br->dev) || timer_pending(&mp->timer))
233 goto out;
234
235 mp->mglist = false;
236
237 if (mp->ports)
238 goto out;
239
240 mdb = mlock_dereference(br->mdb, br);
241
242 hlist_del_rcu(&mp->hlist[mdb->ver]);
243 mdb->size--;
244
245 call_rcu_bh(&mp->rcu, br_multicast_free_group);
246
247 out:
248 spin_unlock(&br->multicast_lock);
249 }
250
251 static void br_multicast_del_pg(struct net_bridge *br,
252 struct net_bridge_port_group *pg)
253 {
254 struct net_bridge_mdb_htable *mdb;
255 struct net_bridge_mdb_entry *mp;
256 struct net_bridge_port_group *p;
257 struct net_bridge_port_group __rcu **pp;
258
259 mdb = mlock_dereference(br->mdb, br);
260
261 mp = br_mdb_ip_get(mdb, &pg->addr);
262 if (WARN_ON(!mp))
263 return;
264
265 for (pp = &mp->ports;
266 (p = mlock_dereference(*pp, br)) != NULL;
267 pp = &p->next) {
268 if (p != pg)
269 continue;
270
271 rcu_assign_pointer(*pp, p->next);
272 hlist_del_init(&p->mglist);
273 del_timer(&p->timer);
274 call_rcu_bh(&p->rcu, br_multicast_free_pg);
275
276 if (!mp->ports && !mp->mglist &&
277 netif_running(br->dev))
278 mod_timer(&mp->timer, jiffies);
279
280 return;
281 }
282
283 WARN_ON(1);
284 }
285
286 static void br_multicast_port_group_expired(unsigned long data)
287 {
288 struct net_bridge_port_group *pg = (void *)data;
289 struct net_bridge *br = pg->port->br;
290
291 spin_lock(&br->multicast_lock);
292 if (!netif_running(br->dev) || timer_pending(&pg->timer) ||
293 hlist_unhashed(&pg->mglist) || pg->state & MDB_PERMANENT)
294 goto out;
295
296 br_multicast_del_pg(br, pg);
297
298 out:
299 spin_unlock(&br->multicast_lock);
300 }
301
302 static int br_mdb_rehash(struct net_bridge_mdb_htable __rcu **mdbp, int max,
303 int elasticity)
304 {
305 struct net_bridge_mdb_htable *old = rcu_dereference_protected(*mdbp, 1);
306 struct net_bridge_mdb_htable *mdb;
307 int err;
308
309 mdb = kmalloc(sizeof(*mdb), GFP_ATOMIC);
310 if (!mdb)
311 return -ENOMEM;
312
313 mdb->max = max;
314 mdb->old = old;
315
316 mdb->mhash = kzalloc(max * sizeof(*mdb->mhash), GFP_ATOMIC);
317 if (!mdb->mhash) {
318 kfree(mdb);
319 return -ENOMEM;
320 }
321
322 mdb->size = old ? old->size : 0;
323 mdb->ver = old ? old->ver ^ 1 : 0;
324
325 if (!old || elasticity)
326 get_random_bytes(&mdb->secret, sizeof(mdb->secret));
327 else
328 mdb->secret = old->secret;
329
330 if (!old)
331 goto out;
332
333 err = br_mdb_copy(mdb, old, elasticity);
334 if (err) {
335 kfree(mdb->mhash);
336 kfree(mdb);
337 return err;
338 }
339
340 br_mdb_rehash_seq++;
341 call_rcu_bh(&mdb->rcu, br_mdb_free);
342
343 out:
344 rcu_assign_pointer(*mdbp, mdb);
345
346 return 0;
347 }
348
349 static struct sk_buff *br_ip4_multicast_alloc_query(struct net_bridge *br,
350 __be32 group)
351 {
352 struct sk_buff *skb;
353 struct igmphdr *ih;
354 struct ethhdr *eth;
355 struct iphdr *iph;
356
357 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*iph) +
358 sizeof(*ih) + 4);
359 if (!skb)
360 goto out;
361
362 skb->protocol = htons(ETH_P_IP);
363
364 skb_reset_mac_header(skb);
365 eth = eth_hdr(skb);
366
367 ether_addr_copy(eth->h_source, br->dev->dev_addr);
368 eth->h_dest[0] = 1;
369 eth->h_dest[1] = 0;
370 eth->h_dest[2] = 0x5e;
371 eth->h_dest[3] = 0;
372 eth->h_dest[4] = 0;
373 eth->h_dest[5] = 1;
374 eth->h_proto = htons(ETH_P_IP);
375 skb_put(skb, sizeof(*eth));
376
377 skb_set_network_header(skb, skb->len);
378 iph = ip_hdr(skb);
379
380 iph->version = 4;
381 iph->ihl = 6;
382 iph->tos = 0xc0;
383 iph->tot_len = htons(sizeof(*iph) + sizeof(*ih) + 4);
384 iph->id = 0;
385 iph->frag_off = htons(IP_DF);
386 iph->ttl = 1;
387 iph->protocol = IPPROTO_IGMP;
388 iph->saddr = br->multicast_query_use_ifaddr ?
389 inet_select_addr(br->dev, 0, RT_SCOPE_LINK) : 0;
390 iph->daddr = htonl(INADDR_ALLHOSTS_GROUP);
391 ((u8 *)&iph[1])[0] = IPOPT_RA;
392 ((u8 *)&iph[1])[1] = 4;
393 ((u8 *)&iph[1])[2] = 0;
394 ((u8 *)&iph[1])[3] = 0;
395 ip_send_check(iph);
396 skb_put(skb, 24);
397
398 skb_set_transport_header(skb, skb->len);
399 ih = igmp_hdr(skb);
400 ih->type = IGMP_HOST_MEMBERSHIP_QUERY;
401 ih->code = (group ? br->multicast_last_member_interval :
402 br->multicast_query_response_interval) /
403 (HZ / IGMP_TIMER_SCALE);
404 ih->group = group;
405 ih->csum = 0;
406 ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
407 skb_put(skb, sizeof(*ih));
408
409 __skb_pull(skb, sizeof(*eth));
410
411 out:
412 return skb;
413 }
414
415 #if IS_ENABLED(CONFIG_IPV6)
416 static struct sk_buff *br_ip6_multicast_alloc_query(struct net_bridge *br,
417 const struct in6_addr *group)
418 {
419 struct sk_buff *skb;
420 struct ipv6hdr *ip6h;
421 struct mld_msg *mldq;
422 struct ethhdr *eth;
423 u8 *hopopt;
424 unsigned long interval;
425
426 skb = netdev_alloc_skb_ip_align(br->dev, sizeof(*eth) + sizeof(*ip6h) +
427 8 + sizeof(*mldq));
428 if (!skb)
429 goto out;
430
431 skb->protocol = htons(ETH_P_IPV6);
432
433 /* Ethernet header */
434 skb_reset_mac_header(skb);
435 eth = eth_hdr(skb);
436
437 ether_addr_copy(eth->h_source, br->dev->dev_addr);
438 eth->h_proto = htons(ETH_P_IPV6);
439 skb_put(skb, sizeof(*eth));
440
441 /* IPv6 header + HbH option */
442 skb_set_network_header(skb, skb->len);
443 ip6h = ipv6_hdr(skb);
444
445 *(__force __be32 *)ip6h = htonl(0x60000000);
446 ip6h->payload_len = htons(8 + sizeof(*mldq));
447 ip6h->nexthdr = IPPROTO_HOPOPTS;
448 ip6h->hop_limit = 1;
449 ipv6_addr_set(&ip6h->daddr, htonl(0xff020000), 0, 0, htonl(1));
450 if (ipv6_dev_get_saddr(dev_net(br->dev), br->dev, &ip6h->daddr, 0,
451 &ip6h->saddr)) {
452 kfree_skb(skb);
453 return NULL;
454 }
455 ipv6_eth_mc_map(&ip6h->daddr, eth->h_dest);
456
457 hopopt = (u8 *)(ip6h + 1);
458 hopopt[0] = IPPROTO_ICMPV6; /* next hdr */
459 hopopt[1] = 0; /* length of HbH */
460 hopopt[2] = IPV6_TLV_ROUTERALERT; /* Router Alert */
461 hopopt[3] = 2; /* Length of RA Option */
462 hopopt[4] = 0; /* Type = 0x0000 (MLD) */
463 hopopt[5] = 0;
464 hopopt[6] = IPV6_TLV_PAD1; /* Pad1 */
465 hopopt[7] = IPV6_TLV_PAD1; /* Pad1 */
466
467 skb_put(skb, sizeof(*ip6h) + 8);
468
469 /* ICMPv6 */
470 skb_set_transport_header(skb, skb->len);
471 mldq = (struct mld_msg *) icmp6_hdr(skb);
472
473 interval = ipv6_addr_any(group) ?
474 br->multicast_query_response_interval :
475 br->multicast_last_member_interval;
476
477 mldq->mld_type = ICMPV6_MGM_QUERY;
478 mldq->mld_code = 0;
479 mldq->mld_cksum = 0;
480 mldq->mld_maxdelay = htons((u16)jiffies_to_msecs(interval));
481 mldq->mld_reserved = 0;
482 mldq->mld_mca = *group;
483
484 /* checksum */
485 mldq->mld_cksum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
486 sizeof(*mldq), IPPROTO_ICMPV6,
487 csum_partial(mldq,
488 sizeof(*mldq), 0));
489 skb_put(skb, sizeof(*mldq));
490
491 __skb_pull(skb, sizeof(*eth));
492
493 out:
494 return skb;
495 }
496 #endif
497
498 static struct sk_buff *br_multicast_alloc_query(struct net_bridge *br,
499 struct br_ip *addr)
500 {
501 switch (addr->proto) {
502 case htons(ETH_P_IP):
503 return br_ip4_multicast_alloc_query(br, addr->u.ip4);
504 #if IS_ENABLED(CONFIG_IPV6)
505 case htons(ETH_P_IPV6):
506 return br_ip6_multicast_alloc_query(br, &addr->u.ip6);
507 #endif
508 }
509 return NULL;
510 }
511
512 static struct net_bridge_mdb_entry *br_multicast_get_group(
513 struct net_bridge *br, struct net_bridge_port *port,
514 struct br_ip *group, int hash)
515 {
516 struct net_bridge_mdb_htable *mdb;
517 struct net_bridge_mdb_entry *mp;
518 unsigned int count = 0;
519 unsigned int max;
520 int elasticity;
521 int err;
522
523 mdb = rcu_dereference_protected(br->mdb, 1);
524 hlist_for_each_entry(mp, &mdb->mhash[hash], hlist[mdb->ver]) {
525 count++;
526 if (unlikely(br_ip_equal(group, &mp->addr)))
527 return mp;
528 }
529
530 elasticity = 0;
531 max = mdb->max;
532
533 if (unlikely(count > br->hash_elasticity && count)) {
534 if (net_ratelimit())
535 br_info(br, "Multicast hash table "
536 "chain limit reached: %s\n",
537 port ? port->dev->name : br->dev->name);
538
539 elasticity = br->hash_elasticity;
540 }
541
542 if (mdb->size >= max) {
543 max *= 2;
544 if (unlikely(max > br->hash_max)) {
545 br_warn(br, "Multicast hash table maximum of %d "
546 "reached, disabling snooping: %s\n",
547 br->hash_max,
548 port ? port->dev->name : br->dev->name);
549 err = -E2BIG;
550 disable:
551 br->multicast_disabled = 1;
552 goto err;
553 }
554 }
555
556 if (max > mdb->max || elasticity) {
557 if (mdb->old) {
558 if (net_ratelimit())
559 br_info(br, "Multicast hash table "
560 "on fire: %s\n",
561 port ? port->dev->name : br->dev->name);
562 err = -EEXIST;
563 goto err;
564 }
565
566 err = br_mdb_rehash(&br->mdb, max, elasticity);
567 if (err) {
568 br_warn(br, "Cannot rehash multicast "
569 "hash table, disabling snooping: %s, %d, %d\n",
570 port ? port->dev->name : br->dev->name,
571 mdb->size, err);
572 goto disable;
573 }
574
575 err = -EAGAIN;
576 goto err;
577 }
578
579 return NULL;
580
581 err:
582 mp = ERR_PTR(err);
583 return mp;
584 }
585
586 struct net_bridge_mdb_entry *br_multicast_new_group(struct net_bridge *br,
587 struct net_bridge_port *port, struct br_ip *group)
588 {
589 struct net_bridge_mdb_htable *mdb;
590 struct net_bridge_mdb_entry *mp;
591 int hash;
592 int err;
593
594 mdb = rcu_dereference_protected(br->mdb, 1);
595 if (!mdb) {
596 err = br_mdb_rehash(&br->mdb, BR_HASH_SIZE, 0);
597 if (err)
598 return ERR_PTR(err);
599 goto rehash;
600 }
601
602 hash = br_ip_hash(mdb, group);
603 mp = br_multicast_get_group(br, port, group, hash);
604 switch (PTR_ERR(mp)) {
605 case 0:
606 break;
607
608 case -EAGAIN:
609 rehash:
610 mdb = rcu_dereference_protected(br->mdb, 1);
611 hash = br_ip_hash(mdb, group);
612 break;
613
614 default:
615 goto out;
616 }
617
618 mp = kzalloc(sizeof(*mp), GFP_ATOMIC);
619 if (unlikely(!mp))
620 return ERR_PTR(-ENOMEM);
621
622 mp->br = br;
623 mp->addr = *group;
624 setup_timer(&mp->timer, br_multicast_group_expired,
625 (unsigned long)mp);
626
627 hlist_add_head_rcu(&mp->hlist[mdb->ver], &mdb->mhash[hash]);
628 mdb->size++;
629
630 out:
631 return mp;
632 }
633
634 struct net_bridge_port_group *br_multicast_new_port_group(
635 struct net_bridge_port *port,
636 struct br_ip *group,
637 struct net_bridge_port_group __rcu *next,
638 unsigned char state)
639 {
640 struct net_bridge_port_group *p;
641
642 p = kzalloc(sizeof(*p), GFP_ATOMIC);
643 if (unlikely(!p))
644 return NULL;
645
646 p->addr = *group;
647 p->port = port;
648 p->state = state;
649 rcu_assign_pointer(p->next, next);
650 hlist_add_head(&p->mglist, &port->mglist);
651 setup_timer(&p->timer, br_multicast_port_group_expired,
652 (unsigned long)p);
653 return p;
654 }
655
656 static int br_multicast_add_group(struct net_bridge *br,
657 struct net_bridge_port *port,
658 struct br_ip *group)
659 {
660 struct net_bridge_mdb_entry *mp;
661 struct net_bridge_port_group *p;
662 struct net_bridge_port_group __rcu **pp;
663 unsigned long now = jiffies;
664 int err;
665
666 spin_lock(&br->multicast_lock);
667 if (!netif_running(br->dev) ||
668 (port && port->state == BR_STATE_DISABLED))
669 goto out;
670
671 mp = br_multicast_new_group(br, port, group);
672 err = PTR_ERR(mp);
673 if (IS_ERR(mp))
674 goto err;
675
676 if (!port) {
677 mp->mglist = true;
678 mod_timer(&mp->timer, now + br->multicast_membership_interval);
679 goto out;
680 }
681
682 for (pp = &mp->ports;
683 (p = mlock_dereference(*pp, br)) != NULL;
684 pp = &p->next) {
685 if (p->port == port)
686 goto found;
687 if ((unsigned long)p->port < (unsigned long)port)
688 break;
689 }
690
691 p = br_multicast_new_port_group(port, group, *pp, MDB_TEMPORARY);
692 if (unlikely(!p))
693 goto err;
694 rcu_assign_pointer(*pp, p);
695 br_mdb_notify(br->dev, port, group, RTM_NEWMDB);
696
697 found:
698 mod_timer(&p->timer, now + br->multicast_membership_interval);
699 out:
700 err = 0;
701
702 err:
703 spin_unlock(&br->multicast_lock);
704 return err;
705 }
706
707 static int br_ip4_multicast_add_group(struct net_bridge *br,
708 struct net_bridge_port *port,
709 __be32 group,
710 __u16 vid)
711 {
712 struct br_ip br_group;
713
714 if (ipv4_is_local_multicast(group))
715 return 0;
716
717 br_group.u.ip4 = group;
718 br_group.proto = htons(ETH_P_IP);
719 br_group.vid = vid;
720
721 return br_multicast_add_group(br, port, &br_group);
722 }
723
724 #if IS_ENABLED(CONFIG_IPV6)
725 static int br_ip6_multicast_add_group(struct net_bridge *br,
726 struct net_bridge_port *port,
727 const struct in6_addr *group,
728 __u16 vid)
729 {
730 struct br_ip br_group;
731
732 if (ipv6_addr_is_ll_all_nodes(group))
733 return 0;
734
735 br_group.u.ip6 = *group;
736 br_group.proto = htons(ETH_P_IPV6);
737 br_group.vid = vid;
738
739 return br_multicast_add_group(br, port, &br_group);
740 }
741 #endif
742
743 static void br_multicast_router_expired(unsigned long data)
744 {
745 struct net_bridge_port *port = (void *)data;
746 struct net_bridge *br = port->br;
747
748 spin_lock(&br->multicast_lock);
749 if (port->multicast_router != 1 ||
750 timer_pending(&port->multicast_router_timer) ||
751 hlist_unhashed(&port->rlist))
752 goto out;
753
754 hlist_del_init_rcu(&port->rlist);
755
756 out:
757 spin_unlock(&br->multicast_lock);
758 }
759
760 static void br_multicast_local_router_expired(unsigned long data)
761 {
762 }
763
764 static void br_multicast_querier_expired(struct net_bridge *br,
765 struct bridge_mcast_own_query *query)
766 {
767 spin_lock(&br->multicast_lock);
768 if (!netif_running(br->dev) || br->multicast_disabled)
769 goto out;
770
771 br_multicast_start_querier(br, query);
772
773 out:
774 spin_unlock(&br->multicast_lock);
775 }
776
777 static void br_ip4_multicast_querier_expired(unsigned long data)
778 {
779 struct net_bridge *br = (void *)data;
780
781 br_multicast_querier_expired(br, &br->ip4_own_query);
782 }
783
784 #if IS_ENABLED(CONFIG_IPV6)
785 static void br_ip6_multicast_querier_expired(unsigned long data)
786 {
787 struct net_bridge *br = (void *)data;
788
789 br_multicast_querier_expired(br, &br->ip6_own_query);
790 }
791 #endif
792
793 static void br_multicast_select_own_querier(struct net_bridge *br,
794 struct br_ip *ip,
795 struct sk_buff *skb)
796 {
797 if (ip->proto == htons(ETH_P_IP))
798 br->ip4_querier.addr.u.ip4 = ip_hdr(skb)->saddr;
799 #if IS_ENABLED(CONFIG_IPV6)
800 else
801 br->ip6_querier.addr.u.ip6 = ipv6_hdr(skb)->saddr;
802 #endif
803 }
804
805 static void __br_multicast_send_query(struct net_bridge *br,
806 struct net_bridge_port *port,
807 struct br_ip *ip)
808 {
809 struct sk_buff *skb;
810
811 skb = br_multicast_alloc_query(br, ip);
812 if (!skb)
813 return;
814
815 if (port) {
816 __skb_push(skb, sizeof(struct ethhdr));
817 skb->dev = port->dev;
818 NF_HOOK(NFPROTO_BRIDGE, NF_BR_LOCAL_OUT, skb, NULL, skb->dev,
819 dev_queue_xmit);
820 } else {
821 br_multicast_select_own_querier(br, ip, skb);
822 netif_rx(skb);
823 }
824 }
825
826 static void br_multicast_send_query(struct net_bridge *br,
827 struct net_bridge_port *port,
828 struct bridge_mcast_own_query *own_query)
829 {
830 unsigned long time;
831 struct br_ip br_group;
832 struct bridge_mcast_other_query *other_query = NULL;
833
834 if (!netif_running(br->dev) || br->multicast_disabled ||
835 !br->multicast_querier)
836 return;
837
838 memset(&br_group.u, 0, sizeof(br_group.u));
839
840 if (port ? (own_query == &port->ip4_own_query) :
841 (own_query == &br->ip4_own_query)) {
842 other_query = &br->ip4_other_query;
843 br_group.proto = htons(ETH_P_IP);
844 #if IS_ENABLED(CONFIG_IPV6)
845 } else {
846 other_query = &br->ip6_other_query;
847 br_group.proto = htons(ETH_P_IPV6);
848 #endif
849 }
850
851 if (!other_query || timer_pending(&other_query->timer))
852 return;
853
854 __br_multicast_send_query(br, port, &br_group);
855
856 time = jiffies;
857 time += own_query->startup_sent < br->multicast_startup_query_count ?
858 br->multicast_startup_query_interval :
859 br->multicast_query_interval;
860 mod_timer(&own_query->timer, time);
861 }
862
863 static void
864 br_multicast_port_query_expired(struct net_bridge_port *port,
865 struct bridge_mcast_own_query *query)
866 {
867 struct net_bridge *br = port->br;
868
869 spin_lock(&br->multicast_lock);
870 if (port->state == BR_STATE_DISABLED ||
871 port->state == BR_STATE_BLOCKING)
872 goto out;
873
874 if (query->startup_sent < br->multicast_startup_query_count)
875 query->startup_sent++;
876
877 br_multicast_send_query(port->br, port, query);
878
879 out:
880 spin_unlock(&br->multicast_lock);
881 }
882
883 static void br_ip4_multicast_port_query_expired(unsigned long data)
884 {
885 struct net_bridge_port *port = (void *)data;
886
887 br_multicast_port_query_expired(port, &port->ip4_own_query);
888 }
889
890 #if IS_ENABLED(CONFIG_IPV6)
891 static void br_ip6_multicast_port_query_expired(unsigned long data)
892 {
893 struct net_bridge_port *port = (void *)data;
894
895 br_multicast_port_query_expired(port, &port->ip6_own_query);
896 }
897 #endif
898
899 void br_multicast_add_port(struct net_bridge_port *port)
900 {
901 port->multicast_router = 1;
902
903 setup_timer(&port->multicast_router_timer, br_multicast_router_expired,
904 (unsigned long)port);
905 setup_timer(&port->ip4_own_query.timer,
906 br_ip4_multicast_port_query_expired, (unsigned long)port);
907 #if IS_ENABLED(CONFIG_IPV6)
908 setup_timer(&port->ip6_own_query.timer,
909 br_ip6_multicast_port_query_expired, (unsigned long)port);
910 #endif
911 }
912
913 void br_multicast_del_port(struct net_bridge_port *port)
914 {
915 del_timer_sync(&port->multicast_router_timer);
916 }
917
918 static void br_multicast_enable(struct bridge_mcast_own_query *query)
919 {
920 query->startup_sent = 0;
921
922 if (try_to_del_timer_sync(&query->timer) >= 0 ||
923 del_timer(&query->timer))
924 mod_timer(&query->timer, jiffies);
925 }
926
927 void br_multicast_enable_port(struct net_bridge_port *port)
928 {
929 struct net_bridge *br = port->br;
930
931 spin_lock(&br->multicast_lock);
932 if (br->multicast_disabled || !netif_running(br->dev))
933 goto out;
934
935 br_multicast_enable(&port->ip4_own_query);
936 #if IS_ENABLED(CONFIG_IPV6)
937 br_multicast_enable(&port->ip6_own_query);
938 #endif
939
940 out:
941 spin_unlock(&br->multicast_lock);
942 }
943
944 void br_multicast_disable_port(struct net_bridge_port *port)
945 {
946 struct net_bridge *br = port->br;
947 struct net_bridge_port_group *pg;
948 struct hlist_node *n;
949
950 spin_lock(&br->multicast_lock);
951 hlist_for_each_entry_safe(pg, n, &port->mglist, mglist)
952 br_multicast_del_pg(br, pg);
953
954 if (!hlist_unhashed(&port->rlist))
955 hlist_del_init_rcu(&port->rlist);
956 del_timer(&port->multicast_router_timer);
957 del_timer(&port->ip4_own_query.timer);
958 #if IS_ENABLED(CONFIG_IPV6)
959 del_timer(&port->ip6_own_query.timer);
960 #endif
961 spin_unlock(&br->multicast_lock);
962 }
963
964 static int br_ip4_multicast_igmp3_report(struct net_bridge *br,
965 struct net_bridge_port *port,
966 struct sk_buff *skb,
967 u16 vid)
968 {
969 struct igmpv3_report *ih;
970 struct igmpv3_grec *grec;
971 int i;
972 int len;
973 int num;
974 int type;
975 int err = 0;
976 __be32 group;
977
978 if (!pskb_may_pull(skb, sizeof(*ih)))
979 return -EINVAL;
980
981 ih = igmpv3_report_hdr(skb);
982 num = ntohs(ih->ngrec);
983 len = sizeof(*ih);
984
985 for (i = 0; i < num; i++) {
986 len += sizeof(*grec);
987 if (!pskb_may_pull(skb, len))
988 return -EINVAL;
989
990 grec = (void *)(skb->data + len - sizeof(*grec));
991 group = grec->grec_mca;
992 type = grec->grec_type;
993
994 len += ntohs(grec->grec_nsrcs) * 4;
995 if (!pskb_may_pull(skb, len))
996 return -EINVAL;
997
998 /* We treat this as an IGMPv2 report for now. */
999 switch (type) {
1000 case IGMPV3_MODE_IS_INCLUDE:
1001 case IGMPV3_MODE_IS_EXCLUDE:
1002 case IGMPV3_CHANGE_TO_INCLUDE:
1003 case IGMPV3_CHANGE_TO_EXCLUDE:
1004 case IGMPV3_ALLOW_NEW_SOURCES:
1005 case IGMPV3_BLOCK_OLD_SOURCES:
1006 break;
1007
1008 default:
1009 continue;
1010 }
1011
1012 err = br_ip4_multicast_add_group(br, port, group, vid);
1013 if (err)
1014 break;
1015 }
1016
1017 return err;
1018 }
1019
1020 #if IS_ENABLED(CONFIG_IPV6)
1021 static int br_ip6_multicast_mld2_report(struct net_bridge *br,
1022 struct net_bridge_port *port,
1023 struct sk_buff *skb,
1024 u16 vid)
1025 {
1026 struct icmp6hdr *icmp6h;
1027 struct mld2_grec *grec;
1028 int i;
1029 int len;
1030 int num;
1031 int err = 0;
1032
1033 if (!pskb_may_pull(skb, sizeof(*icmp6h)))
1034 return -EINVAL;
1035
1036 icmp6h = icmp6_hdr(skb);
1037 num = ntohs(icmp6h->icmp6_dataun.un_data16[1]);
1038 len = sizeof(*icmp6h);
1039
1040 for (i = 0; i < num; i++) {
1041 __be16 *nsrcs, _nsrcs;
1042
1043 nsrcs = skb_header_pointer(skb,
1044 len + offsetof(struct mld2_grec,
1045 grec_nsrcs),
1046 sizeof(_nsrcs), &_nsrcs);
1047 if (!nsrcs)
1048 return -EINVAL;
1049
1050 if (!pskb_may_pull(skb,
1051 len + sizeof(*grec) +
1052 sizeof(struct in6_addr) * ntohs(*nsrcs)))
1053 return -EINVAL;
1054
1055 grec = (struct mld2_grec *)(skb->data + len);
1056 len += sizeof(*grec) +
1057 sizeof(struct in6_addr) * ntohs(*nsrcs);
1058
1059 /* We treat these as MLDv1 reports for now. */
1060 switch (grec->grec_type) {
1061 case MLD2_MODE_IS_INCLUDE:
1062 case MLD2_MODE_IS_EXCLUDE:
1063 case MLD2_CHANGE_TO_INCLUDE:
1064 case MLD2_CHANGE_TO_EXCLUDE:
1065 case MLD2_ALLOW_NEW_SOURCES:
1066 case MLD2_BLOCK_OLD_SOURCES:
1067 break;
1068
1069 default:
1070 continue;
1071 }
1072
1073 err = br_ip6_multicast_add_group(br, port, &grec->grec_mca,
1074 vid);
1075 if (!err)
1076 break;
1077 }
1078
1079 return err;
1080 }
1081 #endif
1082
1083 static bool br_ip4_multicast_select_querier(struct net_bridge *br,
1084 __be32 saddr)
1085 {
1086 if (!timer_pending(&br->ip4_own_query.timer) &&
1087 !timer_pending(&br->ip4_other_query.timer))
1088 goto update;
1089
1090 if (!br->ip4_querier.addr.u.ip4)
1091 goto update;
1092
1093 if (ntohl(saddr) <= ntohl(br->ip4_querier.addr.u.ip4))
1094 goto update;
1095
1096 return false;
1097
1098 update:
1099 br->ip4_querier.addr.u.ip4 = saddr;
1100
1101 return true;
1102 }
1103
1104 #if IS_ENABLED(CONFIG_IPV6)
1105 static bool br_ip6_multicast_select_querier(struct net_bridge *br,
1106 struct in6_addr *saddr)
1107 {
1108 if (!timer_pending(&br->ip6_own_query.timer) &&
1109 !timer_pending(&br->ip6_other_query.timer))
1110 goto update;
1111
1112 if (ipv6_addr_cmp(saddr, &br->ip6_querier.addr.u.ip6) <= 0)
1113 goto update;
1114
1115 return false;
1116
1117 update:
1118 br->ip6_querier.addr.u.ip6 = *saddr;
1119
1120 return true;
1121 }
1122 #endif
1123
1124 static bool br_multicast_select_querier(struct net_bridge *br,
1125 struct br_ip *saddr)
1126 {
1127 switch (saddr->proto) {
1128 case htons(ETH_P_IP):
1129 return br_ip4_multicast_select_querier(br, saddr->u.ip4);
1130 #if IS_ENABLED(CONFIG_IPV6)
1131 case htons(ETH_P_IPV6):
1132 return br_ip6_multicast_select_querier(br, &saddr->u.ip6);
1133 #endif
1134 }
1135
1136 return false;
1137 }
1138
1139 static void
1140 br_multicast_update_query_timer(struct net_bridge *br,
1141 struct bridge_mcast_other_query *query,
1142 unsigned long max_delay)
1143 {
1144 if (!timer_pending(&query->timer))
1145 query->delay_time = jiffies + max_delay;
1146
1147 mod_timer(&query->timer, jiffies + br->multicast_querier_interval);
1148 }
1149
1150 /*
1151 * Add port to router_list
1152 * list is maintained ordered by pointer value
1153 * and locked by br->multicast_lock and RCU
1154 */
1155 static void br_multicast_add_router(struct net_bridge *br,
1156 struct net_bridge_port *port)
1157 {
1158 struct net_bridge_port *p;
1159 struct hlist_node *slot = NULL;
1160
1161 hlist_for_each_entry(p, &br->router_list, rlist) {
1162 if ((unsigned long) port >= (unsigned long) p)
1163 break;
1164 slot = &p->rlist;
1165 }
1166
1167 if (slot)
1168 hlist_add_after_rcu(slot, &port->rlist);
1169 else
1170 hlist_add_head_rcu(&port->rlist, &br->router_list);
1171 }
1172
1173 static void br_multicast_mark_router(struct net_bridge *br,
1174 struct net_bridge_port *port)
1175 {
1176 unsigned long now = jiffies;
1177
1178 if (!port) {
1179 if (br->multicast_router == 1)
1180 mod_timer(&br->multicast_router_timer,
1181 now + br->multicast_querier_interval);
1182 return;
1183 }
1184
1185 if (port->multicast_router != 1)
1186 return;
1187
1188 if (!hlist_unhashed(&port->rlist))
1189 goto timer;
1190
1191 br_multicast_add_router(br, port);
1192
1193 timer:
1194 mod_timer(&port->multicast_router_timer,
1195 now + br->multicast_querier_interval);
1196 }
1197
1198 static void br_multicast_query_received(struct net_bridge *br,
1199 struct net_bridge_port *port,
1200 struct bridge_mcast_other_query *query,
1201 struct br_ip *saddr,
1202 unsigned long max_delay)
1203 {
1204 if (!br_multicast_select_querier(br, saddr))
1205 return;
1206
1207 br_multicast_update_query_timer(br, query, max_delay);
1208 br_multicast_mark_router(br, port);
1209 }
1210
1211 static int br_ip4_multicast_query(struct net_bridge *br,
1212 struct net_bridge_port *port,
1213 struct sk_buff *skb,
1214 u16 vid)
1215 {
1216 const struct iphdr *iph = ip_hdr(skb);
1217 struct igmphdr *ih = igmp_hdr(skb);
1218 struct net_bridge_mdb_entry *mp;
1219 struct igmpv3_query *ih3;
1220 struct net_bridge_port_group *p;
1221 struct net_bridge_port_group __rcu **pp;
1222 struct br_ip saddr;
1223 unsigned long max_delay;
1224 unsigned long now = jiffies;
1225 __be32 group;
1226 int err = 0;
1227
1228 spin_lock(&br->multicast_lock);
1229 if (!netif_running(br->dev) ||
1230 (port && port->state == BR_STATE_DISABLED))
1231 goto out;
1232
1233 group = ih->group;
1234
1235 if (skb->len == sizeof(*ih)) {
1236 max_delay = ih->code * (HZ / IGMP_TIMER_SCALE);
1237
1238 if (!max_delay) {
1239 max_delay = 10 * HZ;
1240 group = 0;
1241 }
1242 } else {
1243 if (!pskb_may_pull(skb, sizeof(struct igmpv3_query))) {
1244 err = -EINVAL;
1245 goto out;
1246 }
1247
1248 ih3 = igmpv3_query_hdr(skb);
1249 if (ih3->nsrcs)
1250 goto out;
1251
1252 max_delay = ih3->code ?
1253 IGMPV3_MRC(ih3->code) * (HZ / IGMP_TIMER_SCALE) : 1;
1254 }
1255
1256 /* RFC2236+RFC3376 (IGMPv2+IGMPv3) require the multicast link layer
1257 * all-systems destination addresses (224.0.0.1) for general queries
1258 */
1259 if (!group && iph->daddr != htonl(INADDR_ALLHOSTS_GROUP)) {
1260 err = -EINVAL;
1261 goto out;
1262 }
1263
1264 if (!group) {
1265 saddr.proto = htons(ETH_P_IP);
1266 saddr.u.ip4 = iph->saddr;
1267
1268 br_multicast_query_received(br, port, &br->ip4_other_query,
1269 &saddr, max_delay);
1270 goto out;
1271 }
1272
1273 mp = br_mdb_ip4_get(mlock_dereference(br->mdb, br), group, vid);
1274 if (!mp)
1275 goto out;
1276
1277 max_delay *= br->multicast_last_member_count;
1278
1279 if (mp->mglist &&
1280 (timer_pending(&mp->timer) ?
1281 time_after(mp->timer.expires, now + max_delay) :
1282 try_to_del_timer_sync(&mp->timer) >= 0))
1283 mod_timer(&mp->timer, now + max_delay);
1284
1285 for (pp = &mp->ports;
1286 (p = mlock_dereference(*pp, br)) != NULL;
1287 pp = &p->next) {
1288 if (timer_pending(&p->timer) ?
1289 time_after(p->timer.expires, now + max_delay) :
1290 try_to_del_timer_sync(&p->timer) >= 0)
1291 mod_timer(&p->timer, now + max_delay);
1292 }
1293
1294 out:
1295 spin_unlock(&br->multicast_lock);
1296 return err;
1297 }
1298
1299 #if IS_ENABLED(CONFIG_IPV6)
1300 static int br_ip6_multicast_query(struct net_bridge *br,
1301 struct net_bridge_port *port,
1302 struct sk_buff *skb,
1303 u16 vid)
1304 {
1305 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
1306 struct mld_msg *mld;
1307 struct net_bridge_mdb_entry *mp;
1308 struct mld2_query *mld2q;
1309 struct net_bridge_port_group *p;
1310 struct net_bridge_port_group __rcu **pp;
1311 struct br_ip saddr;
1312 unsigned long max_delay;
1313 unsigned long now = jiffies;
1314 const struct in6_addr *group = NULL;
1315 bool is_general_query;
1316 int err = 0;
1317
1318 spin_lock(&br->multicast_lock);
1319 if (!netif_running(br->dev) ||
1320 (port && port->state == BR_STATE_DISABLED))
1321 goto out;
1322
1323 /* RFC2710+RFC3810 (MLDv1+MLDv2) require link-local source addresses */
1324 if (!(ipv6_addr_type(&ip6h->saddr) & IPV6_ADDR_LINKLOCAL)) {
1325 err = -EINVAL;
1326 goto out;
1327 }
1328
1329 if (skb->len == sizeof(*mld)) {
1330 if (!pskb_may_pull(skb, sizeof(*mld))) {
1331 err = -EINVAL;
1332 goto out;
1333 }
1334 mld = (struct mld_msg *) icmp6_hdr(skb);
1335 max_delay = msecs_to_jiffies(ntohs(mld->mld_maxdelay));
1336 if (max_delay)
1337 group = &mld->mld_mca;
1338 } else {
1339 if (!pskb_may_pull(skb, sizeof(*mld2q))) {
1340 err = -EINVAL;
1341 goto out;
1342 }
1343 mld2q = (struct mld2_query *)icmp6_hdr(skb);
1344 if (!mld2q->mld2q_nsrcs)
1345 group = &mld2q->mld2q_mca;
1346
1347 max_delay = max(msecs_to_jiffies(mldv2_mrc(mld2q)), 1UL);
1348 }
1349
1350 is_general_query = group && ipv6_addr_any(group);
1351
1352 /* RFC2710+RFC3810 (MLDv1+MLDv2) require the multicast link layer
1353 * all-nodes destination address (ff02::1) for general queries
1354 */
1355 if (is_general_query && !ipv6_addr_is_ll_all_nodes(&ip6h->daddr)) {
1356 err = -EINVAL;
1357 goto out;
1358 }
1359
1360 if (is_general_query) {
1361 saddr.proto = htons(ETH_P_IPV6);
1362 saddr.u.ip6 = ip6h->saddr;
1363
1364 br_multicast_query_received(br, port, &br->ip6_other_query,
1365 &saddr, max_delay);
1366 goto out;
1367 }
1368
1369 mp = br_mdb_ip6_get(mlock_dereference(br->mdb, br), group, vid);
1370 if (!mp)
1371 goto out;
1372
1373 max_delay *= br->multicast_last_member_count;
1374 if (mp->mglist &&
1375 (timer_pending(&mp->timer) ?
1376 time_after(mp->timer.expires, now + max_delay) :
1377 try_to_del_timer_sync(&mp->timer) >= 0))
1378 mod_timer(&mp->timer, now + max_delay);
1379
1380 for (pp = &mp->ports;
1381 (p = mlock_dereference(*pp, br)) != NULL;
1382 pp = &p->next) {
1383 if (timer_pending(&p->timer) ?
1384 time_after(p->timer.expires, now + max_delay) :
1385 try_to_del_timer_sync(&p->timer) >= 0)
1386 mod_timer(&p->timer, now + max_delay);
1387 }
1388
1389 out:
1390 spin_unlock(&br->multicast_lock);
1391 return err;
1392 }
1393 #endif
1394
1395 static void
1396 br_multicast_leave_group(struct net_bridge *br,
1397 struct net_bridge_port *port,
1398 struct br_ip *group,
1399 struct bridge_mcast_other_query *other_query,
1400 struct bridge_mcast_own_query *own_query)
1401 {
1402 struct net_bridge_mdb_htable *mdb;
1403 struct net_bridge_mdb_entry *mp;
1404 struct net_bridge_port_group *p;
1405 unsigned long now;
1406 unsigned long time;
1407
1408 spin_lock(&br->multicast_lock);
1409 if (!netif_running(br->dev) ||
1410 (port && port->state == BR_STATE_DISABLED) ||
1411 timer_pending(&other_query->timer))
1412 goto out;
1413
1414 mdb = mlock_dereference(br->mdb, br);
1415 mp = br_mdb_ip_get(mdb, group);
1416 if (!mp)
1417 goto out;
1418
1419 if (br->multicast_querier) {
1420 __br_multicast_send_query(br, port, &mp->addr);
1421
1422 time = jiffies + br->multicast_last_member_count *
1423 br->multicast_last_member_interval;
1424
1425 mod_timer(&own_query->timer, time);
1426
1427 for (p = mlock_dereference(mp->ports, br);
1428 p != NULL;
1429 p = mlock_dereference(p->next, br)) {
1430 if (p->port != port)
1431 continue;
1432
1433 if (!hlist_unhashed(&p->mglist) &&
1434 (timer_pending(&p->timer) ?
1435 time_after(p->timer.expires, time) :
1436 try_to_del_timer_sync(&p->timer) >= 0)) {
1437 mod_timer(&p->timer, time);
1438 }
1439
1440 break;
1441 }
1442 }
1443
1444 if (port && (port->flags & BR_MULTICAST_FAST_LEAVE)) {
1445 struct net_bridge_port_group __rcu **pp;
1446
1447 for (pp = &mp->ports;
1448 (p = mlock_dereference(*pp, br)) != NULL;
1449 pp = &p->next) {
1450 if (p->port != port)
1451 continue;
1452
1453 rcu_assign_pointer(*pp, p->next);
1454 hlist_del_init(&p->mglist);
1455 del_timer(&p->timer);
1456 call_rcu_bh(&p->rcu, br_multicast_free_pg);
1457 br_mdb_notify(br->dev, port, group, RTM_DELMDB);
1458
1459 if (!mp->ports && !mp->mglist &&
1460 netif_running(br->dev))
1461 mod_timer(&mp->timer, jiffies);
1462 }
1463 goto out;
1464 }
1465
1466 now = jiffies;
1467 time = now + br->multicast_last_member_count *
1468 br->multicast_last_member_interval;
1469
1470 if (!port) {
1471 if (mp->mglist &&
1472 (timer_pending(&mp->timer) ?
1473 time_after(mp->timer.expires, time) :
1474 try_to_del_timer_sync(&mp->timer) >= 0)) {
1475 mod_timer(&mp->timer, time);
1476 }
1477
1478 goto out;
1479 }
1480
1481 for (p = mlock_dereference(mp->ports, br);
1482 p != NULL;
1483 p = mlock_dereference(p->next, br)) {
1484 if (p->port != port)
1485 continue;
1486
1487 if (!hlist_unhashed(&p->mglist) &&
1488 (timer_pending(&p->timer) ?
1489 time_after(p->timer.expires, time) :
1490 try_to_del_timer_sync(&p->timer) >= 0)) {
1491 mod_timer(&p->timer, time);
1492 }
1493
1494 break;
1495 }
1496 out:
1497 spin_unlock(&br->multicast_lock);
1498 }
1499
1500 static void br_ip4_multicast_leave_group(struct net_bridge *br,
1501 struct net_bridge_port *port,
1502 __be32 group,
1503 __u16 vid)
1504 {
1505 struct br_ip br_group;
1506 struct bridge_mcast_own_query *own_query;
1507
1508 if (ipv4_is_local_multicast(group))
1509 return;
1510
1511 own_query = port ? &port->ip4_own_query : &br->ip4_own_query;
1512
1513 br_group.u.ip4 = group;
1514 br_group.proto = htons(ETH_P_IP);
1515 br_group.vid = vid;
1516
1517 br_multicast_leave_group(br, port, &br_group, &br->ip4_other_query,
1518 own_query);
1519 }
1520
1521 #if IS_ENABLED(CONFIG_IPV6)
1522 static void br_ip6_multicast_leave_group(struct net_bridge *br,
1523 struct net_bridge_port *port,
1524 const struct in6_addr *group,
1525 __u16 vid)
1526 {
1527 struct br_ip br_group;
1528 struct bridge_mcast_own_query *own_query;
1529
1530 if (ipv6_addr_is_ll_all_nodes(group))
1531 return;
1532
1533 own_query = port ? &port->ip6_own_query : &br->ip6_own_query;
1534
1535 br_group.u.ip6 = *group;
1536 br_group.proto = htons(ETH_P_IPV6);
1537 br_group.vid = vid;
1538
1539 br_multicast_leave_group(br, port, &br_group, &br->ip6_other_query,
1540 own_query);
1541 }
1542 #endif
1543
1544 static int br_multicast_ipv4_rcv(struct net_bridge *br,
1545 struct net_bridge_port *port,
1546 struct sk_buff *skb,
1547 u16 vid)
1548 {
1549 struct sk_buff *skb2 = skb;
1550 const struct iphdr *iph;
1551 struct igmphdr *ih;
1552 unsigned int len;
1553 unsigned int offset;
1554 int err;
1555
1556 /* We treat OOM as packet loss for now. */
1557 if (!pskb_may_pull(skb, sizeof(*iph)))
1558 return -EINVAL;
1559
1560 iph = ip_hdr(skb);
1561
1562 if (iph->ihl < 5 || iph->version != 4)
1563 return -EINVAL;
1564
1565 if (!pskb_may_pull(skb, ip_hdrlen(skb)))
1566 return -EINVAL;
1567
1568 iph = ip_hdr(skb);
1569
1570 if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl)))
1571 return -EINVAL;
1572
1573 if (iph->protocol != IPPROTO_IGMP) {
1574 if (!ipv4_is_local_multicast(iph->daddr))
1575 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1576 return 0;
1577 }
1578
1579 len = ntohs(iph->tot_len);
1580 if (skb->len < len || len < ip_hdrlen(skb))
1581 return -EINVAL;
1582
1583 if (skb->len > len) {
1584 skb2 = skb_clone(skb, GFP_ATOMIC);
1585 if (!skb2)
1586 return -ENOMEM;
1587
1588 err = pskb_trim_rcsum(skb2, len);
1589 if (err)
1590 goto err_out;
1591 }
1592
1593 len -= ip_hdrlen(skb2);
1594 offset = skb_network_offset(skb2) + ip_hdrlen(skb2);
1595 __skb_pull(skb2, offset);
1596 skb_reset_transport_header(skb2);
1597
1598 err = -EINVAL;
1599 if (!pskb_may_pull(skb2, sizeof(*ih)))
1600 goto out;
1601
1602 switch (skb2->ip_summed) {
1603 case CHECKSUM_COMPLETE:
1604 if (!csum_fold(skb2->csum))
1605 break;
1606 /* fall through */
1607 case CHECKSUM_NONE:
1608 skb2->csum = 0;
1609 if (skb_checksum_complete(skb2))
1610 goto out;
1611 }
1612
1613 err = 0;
1614
1615 BR_INPUT_SKB_CB(skb)->igmp = 1;
1616 ih = igmp_hdr(skb2);
1617
1618 switch (ih->type) {
1619 case IGMP_HOST_MEMBERSHIP_REPORT:
1620 case IGMPV2_HOST_MEMBERSHIP_REPORT:
1621 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1622 err = br_ip4_multicast_add_group(br, port, ih->group, vid);
1623 break;
1624 case IGMPV3_HOST_MEMBERSHIP_REPORT:
1625 err = br_ip4_multicast_igmp3_report(br, port, skb2, vid);
1626 break;
1627 case IGMP_HOST_MEMBERSHIP_QUERY:
1628 err = br_ip4_multicast_query(br, port, skb2, vid);
1629 break;
1630 case IGMP_HOST_LEAVE_MESSAGE:
1631 br_ip4_multicast_leave_group(br, port, ih->group, vid);
1632 break;
1633 }
1634
1635 out:
1636 __skb_push(skb2, offset);
1637 err_out:
1638 if (skb2 != skb)
1639 kfree_skb(skb2);
1640 return err;
1641 }
1642
1643 #if IS_ENABLED(CONFIG_IPV6)
1644 static int br_multicast_ipv6_rcv(struct net_bridge *br,
1645 struct net_bridge_port *port,
1646 struct sk_buff *skb,
1647 u16 vid)
1648 {
1649 struct sk_buff *skb2;
1650 const struct ipv6hdr *ip6h;
1651 u8 icmp6_type;
1652 u8 nexthdr;
1653 __be16 frag_off;
1654 unsigned int len;
1655 int offset;
1656 int err;
1657
1658 if (!pskb_may_pull(skb, sizeof(*ip6h)))
1659 return -EINVAL;
1660
1661 ip6h = ipv6_hdr(skb);
1662
1663 /*
1664 * We're interested in MLD messages only.
1665 * - Version is 6
1666 * - MLD has always Router Alert hop-by-hop option
1667 * - But we do not support jumbrograms.
1668 */
1669 if (ip6h->version != 6)
1670 return 0;
1671
1672 /* Prevent flooding this packet if there is no listener present */
1673 if (!ipv6_addr_is_ll_all_nodes(&ip6h->daddr))
1674 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1675
1676 if (ip6h->nexthdr != IPPROTO_HOPOPTS ||
1677 ip6h->payload_len == 0)
1678 return 0;
1679
1680 len = ntohs(ip6h->payload_len) + sizeof(*ip6h);
1681 if (skb->len < len)
1682 return -EINVAL;
1683
1684 nexthdr = ip6h->nexthdr;
1685 offset = ipv6_skip_exthdr(skb, sizeof(*ip6h), &nexthdr, &frag_off);
1686
1687 if (offset < 0 || nexthdr != IPPROTO_ICMPV6)
1688 return 0;
1689
1690 /* Okay, we found ICMPv6 header */
1691 skb2 = skb_clone(skb, GFP_ATOMIC);
1692 if (!skb2)
1693 return -ENOMEM;
1694
1695 err = -EINVAL;
1696 if (!pskb_may_pull(skb2, offset + sizeof(struct icmp6hdr)))
1697 goto out;
1698
1699 len -= offset - skb_network_offset(skb2);
1700
1701 __skb_pull(skb2, offset);
1702 skb_reset_transport_header(skb2);
1703 skb_postpull_rcsum(skb2, skb_network_header(skb2),
1704 skb_network_header_len(skb2));
1705
1706 icmp6_type = icmp6_hdr(skb2)->icmp6_type;
1707
1708 switch (icmp6_type) {
1709 case ICMPV6_MGM_QUERY:
1710 case ICMPV6_MGM_REPORT:
1711 case ICMPV6_MGM_REDUCTION:
1712 case ICMPV6_MLD2_REPORT:
1713 break;
1714 default:
1715 err = 0;
1716 goto out;
1717 }
1718
1719 /* Okay, we found MLD message. Check further. */
1720 if (skb2->len > len) {
1721 err = pskb_trim_rcsum(skb2, len);
1722 if (err)
1723 goto out;
1724 err = -EINVAL;
1725 }
1726
1727 ip6h = ipv6_hdr(skb2);
1728
1729 switch (skb2->ip_summed) {
1730 case CHECKSUM_COMPLETE:
1731 if (!csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, skb2->len,
1732 IPPROTO_ICMPV6, skb2->csum))
1733 break;
1734 /*FALLTHROUGH*/
1735 case CHECKSUM_NONE:
1736 skb2->csum = ~csum_unfold(csum_ipv6_magic(&ip6h->saddr,
1737 &ip6h->daddr,
1738 skb2->len,
1739 IPPROTO_ICMPV6, 0));
1740 if (__skb_checksum_complete(skb2))
1741 goto out;
1742 }
1743
1744 err = 0;
1745
1746 BR_INPUT_SKB_CB(skb)->igmp = 1;
1747
1748 switch (icmp6_type) {
1749 case ICMPV6_MGM_REPORT:
1750 {
1751 struct mld_msg *mld;
1752 if (!pskb_may_pull(skb2, sizeof(*mld))) {
1753 err = -EINVAL;
1754 goto out;
1755 }
1756 mld = (struct mld_msg *)skb_transport_header(skb2);
1757 BR_INPUT_SKB_CB(skb)->mrouters_only = 1;
1758 err = br_ip6_multicast_add_group(br, port, &mld->mld_mca, vid);
1759 break;
1760 }
1761 case ICMPV6_MLD2_REPORT:
1762 err = br_ip6_multicast_mld2_report(br, port, skb2, vid);
1763 break;
1764 case ICMPV6_MGM_QUERY:
1765 err = br_ip6_multicast_query(br, port, skb2, vid);
1766 break;
1767 case ICMPV6_MGM_REDUCTION:
1768 {
1769 struct mld_msg *mld;
1770 if (!pskb_may_pull(skb2, sizeof(*mld))) {
1771 err = -EINVAL;
1772 goto out;
1773 }
1774 mld = (struct mld_msg *)skb_transport_header(skb2);
1775 br_ip6_multicast_leave_group(br, port, &mld->mld_mca, vid);
1776 }
1777 }
1778
1779 out:
1780 kfree_skb(skb2);
1781 return err;
1782 }
1783 #endif
1784
1785 int br_multicast_rcv(struct net_bridge *br, struct net_bridge_port *port,
1786 struct sk_buff *skb, u16 vid)
1787 {
1788 BR_INPUT_SKB_CB(skb)->igmp = 0;
1789 BR_INPUT_SKB_CB(skb)->mrouters_only = 0;
1790
1791 if (br->multicast_disabled)
1792 return 0;
1793
1794 switch (skb->protocol) {
1795 case htons(ETH_P_IP):
1796 return br_multicast_ipv4_rcv(br, port, skb, vid);
1797 #if IS_ENABLED(CONFIG_IPV6)
1798 case htons(ETH_P_IPV6):
1799 return br_multicast_ipv6_rcv(br, port, skb, vid);
1800 #endif
1801 }
1802
1803 return 0;
1804 }
1805
1806 static void br_multicast_query_expired(struct net_bridge *br,
1807 struct bridge_mcast_own_query *query)
1808 {
1809 spin_lock(&br->multicast_lock);
1810 if (query->startup_sent < br->multicast_startup_query_count)
1811 query->startup_sent++;
1812
1813 br_multicast_send_query(br, NULL, query);
1814 spin_unlock(&br->multicast_lock);
1815 }
1816
1817 static void br_ip4_multicast_query_expired(unsigned long data)
1818 {
1819 struct net_bridge *br = (void *)data;
1820
1821 br_multicast_query_expired(br, &br->ip4_own_query);
1822 }
1823
1824 #if IS_ENABLED(CONFIG_IPV6)
1825 static void br_ip6_multicast_query_expired(unsigned long data)
1826 {
1827 struct net_bridge *br = (void *)data;
1828
1829 br_multicast_query_expired(br, &br->ip6_own_query);
1830 }
1831 #endif
1832
1833 void br_multicast_init(struct net_bridge *br)
1834 {
1835 br->hash_elasticity = 4;
1836 br->hash_max = 512;
1837
1838 br->multicast_router = 1;
1839 br->multicast_querier = 0;
1840 br->multicast_query_use_ifaddr = 0;
1841 br->multicast_last_member_count = 2;
1842 br->multicast_startup_query_count = 2;
1843
1844 br->multicast_last_member_interval = HZ;
1845 br->multicast_query_response_interval = 10 * HZ;
1846 br->multicast_startup_query_interval = 125 * HZ / 4;
1847 br->multicast_query_interval = 125 * HZ;
1848 br->multicast_querier_interval = 255 * HZ;
1849 br->multicast_membership_interval = 260 * HZ;
1850
1851 br->ip4_other_query.delay_time = 0;
1852 #if IS_ENABLED(CONFIG_IPV6)
1853 br->ip6_other_query.delay_time = 0;
1854 #endif
1855
1856 spin_lock_init(&br->multicast_lock);
1857 setup_timer(&br->multicast_router_timer,
1858 br_multicast_local_router_expired, 0);
1859 setup_timer(&br->ip4_other_query.timer,
1860 br_ip4_multicast_querier_expired, (unsigned long)br);
1861 setup_timer(&br->ip4_own_query.timer, br_ip4_multicast_query_expired,
1862 (unsigned long)br);
1863 #if IS_ENABLED(CONFIG_IPV6)
1864 setup_timer(&br->ip6_other_query.timer,
1865 br_ip6_multicast_querier_expired, (unsigned long)br);
1866 setup_timer(&br->ip6_own_query.timer, br_ip6_multicast_query_expired,
1867 (unsigned long)br);
1868 #endif
1869 }
1870
1871 static void __br_multicast_open(struct net_bridge *br,
1872 struct bridge_mcast_own_query *query)
1873 {
1874 query->startup_sent = 0;
1875
1876 if (br->multicast_disabled)
1877 return;
1878
1879 mod_timer(&query->timer, jiffies);
1880 }
1881
1882 void br_multicast_open(struct net_bridge *br)
1883 {
1884 __br_multicast_open(br, &br->ip4_own_query);
1885 #if IS_ENABLED(CONFIG_IPV6)
1886 __br_multicast_open(br, &br->ip6_own_query);
1887 #endif
1888 }
1889
1890 void br_multicast_stop(struct net_bridge *br)
1891 {
1892 struct net_bridge_mdb_htable *mdb;
1893 struct net_bridge_mdb_entry *mp;
1894 struct hlist_node *n;
1895 u32 ver;
1896 int i;
1897
1898 del_timer_sync(&br->multicast_router_timer);
1899 del_timer_sync(&br->ip4_other_query.timer);
1900 del_timer_sync(&br->ip4_own_query.timer);
1901 #if IS_ENABLED(CONFIG_IPV6)
1902 del_timer_sync(&br->ip6_other_query.timer);
1903 del_timer_sync(&br->ip6_own_query.timer);
1904 #endif
1905
1906 spin_lock_bh(&br->multicast_lock);
1907 mdb = mlock_dereference(br->mdb, br);
1908 if (!mdb)
1909 goto out;
1910
1911 br->mdb = NULL;
1912
1913 ver = mdb->ver;
1914 for (i = 0; i < mdb->max; i++) {
1915 hlist_for_each_entry_safe(mp, n, &mdb->mhash[i],
1916 hlist[ver]) {
1917 del_timer(&mp->timer);
1918 call_rcu_bh(&mp->rcu, br_multicast_free_group);
1919 }
1920 }
1921
1922 if (mdb->old) {
1923 spin_unlock_bh(&br->multicast_lock);
1924 rcu_barrier_bh();
1925 spin_lock_bh(&br->multicast_lock);
1926 WARN_ON(mdb->old);
1927 }
1928
1929 mdb->old = mdb;
1930 call_rcu_bh(&mdb->rcu, br_mdb_free);
1931
1932 out:
1933 spin_unlock_bh(&br->multicast_lock);
1934 }
1935
1936 int br_multicast_set_router(struct net_bridge *br, unsigned long val)
1937 {
1938 int err = -ENOENT;
1939
1940 spin_lock_bh(&br->multicast_lock);
1941 if (!netif_running(br->dev))
1942 goto unlock;
1943
1944 switch (val) {
1945 case 0:
1946 case 2:
1947 del_timer(&br->multicast_router_timer);
1948 /* fall through */
1949 case 1:
1950 br->multicast_router = val;
1951 err = 0;
1952 break;
1953
1954 default:
1955 err = -EINVAL;
1956 break;
1957 }
1958
1959 unlock:
1960 spin_unlock_bh(&br->multicast_lock);
1961
1962 return err;
1963 }
1964
1965 int br_multicast_set_port_router(struct net_bridge_port *p, unsigned long val)
1966 {
1967 struct net_bridge *br = p->br;
1968 int err = -ENOENT;
1969
1970 spin_lock(&br->multicast_lock);
1971 if (!netif_running(br->dev) || p->state == BR_STATE_DISABLED)
1972 goto unlock;
1973
1974 switch (val) {
1975 case 0:
1976 case 1:
1977 case 2:
1978 p->multicast_router = val;
1979 err = 0;
1980
1981 if (val < 2 && !hlist_unhashed(&p->rlist))
1982 hlist_del_init_rcu(&p->rlist);
1983
1984 if (val == 1)
1985 break;
1986
1987 del_timer(&p->multicast_router_timer);
1988
1989 if (val == 0)
1990 break;
1991
1992 br_multicast_add_router(br, p);
1993 break;
1994
1995 default:
1996 err = -EINVAL;
1997 break;
1998 }
1999
2000 unlock:
2001 spin_unlock(&br->multicast_lock);
2002
2003 return err;
2004 }
2005
2006 static void br_multicast_start_querier(struct net_bridge *br,
2007 struct bridge_mcast_own_query *query)
2008 {
2009 struct net_bridge_port *port;
2010
2011 __br_multicast_open(br, query);
2012
2013 list_for_each_entry(port, &br->port_list, list) {
2014 if (port->state == BR_STATE_DISABLED ||
2015 port->state == BR_STATE_BLOCKING)
2016 continue;
2017
2018 if (query == &br->ip4_own_query)
2019 br_multicast_enable(&port->ip4_own_query);
2020 #if IS_ENABLED(CONFIG_IPV6)
2021 else
2022 br_multicast_enable(&port->ip6_own_query);
2023 #endif
2024 }
2025 }
2026
2027 int br_multicast_toggle(struct net_bridge *br, unsigned long val)
2028 {
2029 int err = 0;
2030 struct net_bridge_mdb_htable *mdb;
2031
2032 spin_lock_bh(&br->multicast_lock);
2033 if (br->multicast_disabled == !val)
2034 goto unlock;
2035
2036 br->multicast_disabled = !val;
2037 if (br->multicast_disabled)
2038 goto unlock;
2039
2040 if (!netif_running(br->dev))
2041 goto unlock;
2042
2043 mdb = mlock_dereference(br->mdb, br);
2044 if (mdb) {
2045 if (mdb->old) {
2046 err = -EEXIST;
2047 rollback:
2048 br->multicast_disabled = !!val;
2049 goto unlock;
2050 }
2051
2052 err = br_mdb_rehash(&br->mdb, mdb->max,
2053 br->hash_elasticity);
2054 if (err)
2055 goto rollback;
2056 }
2057
2058 br_multicast_start_querier(br, &br->ip4_own_query);
2059 #if IS_ENABLED(CONFIG_IPV6)
2060 br_multicast_start_querier(br, &br->ip6_own_query);
2061 #endif
2062
2063 unlock:
2064 spin_unlock_bh(&br->multicast_lock);
2065
2066 return err;
2067 }
2068
2069 int br_multicast_set_querier(struct net_bridge *br, unsigned long val)
2070 {
2071 unsigned long max_delay;
2072
2073 val = !!val;
2074
2075 spin_lock_bh(&br->multicast_lock);
2076 if (br->multicast_querier == val)
2077 goto unlock;
2078
2079 br->multicast_querier = val;
2080 if (!val)
2081 goto unlock;
2082
2083 max_delay = br->multicast_query_response_interval;
2084
2085 if (!timer_pending(&br->ip4_other_query.timer))
2086 br->ip4_other_query.delay_time = jiffies + max_delay;
2087
2088 br_multicast_start_querier(br, &br->ip4_own_query);
2089
2090 #if IS_ENABLED(CONFIG_IPV6)
2091 if (!timer_pending(&br->ip6_other_query.timer))
2092 br->ip6_other_query.delay_time = jiffies + max_delay;
2093
2094 br_multicast_start_querier(br, &br->ip6_own_query);
2095 #endif
2096
2097 unlock:
2098 spin_unlock_bh(&br->multicast_lock);
2099
2100 return 0;
2101 }
2102
2103 int br_multicast_set_hash_max(struct net_bridge *br, unsigned long val)
2104 {
2105 int err = -ENOENT;
2106 u32 old;
2107 struct net_bridge_mdb_htable *mdb;
2108
2109 spin_lock_bh(&br->multicast_lock);
2110 if (!netif_running(br->dev))
2111 goto unlock;
2112
2113 err = -EINVAL;
2114 if (!is_power_of_2(val))
2115 goto unlock;
2116
2117 mdb = mlock_dereference(br->mdb, br);
2118 if (mdb && val < mdb->size)
2119 goto unlock;
2120
2121 err = 0;
2122
2123 old = br->hash_max;
2124 br->hash_max = val;
2125
2126 if (mdb) {
2127 if (mdb->old) {
2128 err = -EEXIST;
2129 rollback:
2130 br->hash_max = old;
2131 goto unlock;
2132 }
2133
2134 err = br_mdb_rehash(&br->mdb, br->hash_max,
2135 br->hash_elasticity);
2136 if (err)
2137 goto rollback;
2138 }
2139
2140 unlock:
2141 spin_unlock_bh(&br->multicast_lock);
2142
2143 return err;
2144 }
2145
2146 /**
2147 * br_multicast_list_adjacent - Returns snooped multicast addresses
2148 * @dev: The bridge port adjacent to which to retrieve addresses
2149 * @br_ip_list: The list to store found, snooped multicast IP addresses in
2150 *
2151 * Creates a list of IP addresses (struct br_ip_list) sensed by the multicast
2152 * snooping feature on all bridge ports of dev's bridge device, excluding
2153 * the addresses from dev itself.
2154 *
2155 * Returns the number of items added to br_ip_list.
2156 *
2157 * Notes:
2158 * - br_ip_list needs to be initialized by caller
2159 * - br_ip_list might contain duplicates in the end
2160 * (needs to be taken care of by caller)
2161 * - br_ip_list needs to be freed by caller
2162 */
2163 int br_multicast_list_adjacent(struct net_device *dev,
2164 struct list_head *br_ip_list)
2165 {
2166 struct net_bridge *br;
2167 struct net_bridge_port *port;
2168 struct net_bridge_port_group *group;
2169 struct br_ip_list *entry;
2170 int count = 0;
2171
2172 rcu_read_lock();
2173 if (!br_ip_list || !br_port_exists(dev))
2174 goto unlock;
2175
2176 port = br_port_get_rcu(dev);
2177 if (!port || !port->br)
2178 goto unlock;
2179
2180 br = port->br;
2181
2182 list_for_each_entry_rcu(port, &br->port_list, list) {
2183 if (!port->dev || port->dev == dev)
2184 continue;
2185
2186 hlist_for_each_entry_rcu(group, &port->mglist, mglist) {
2187 entry = kmalloc(sizeof(*entry), GFP_ATOMIC);
2188 if (!entry)
2189 goto unlock;
2190
2191 entry->addr = group->addr;
2192 list_add(&entry->list, br_ip_list);
2193 count++;
2194 }
2195 }
2196
2197 unlock:
2198 rcu_read_unlock();
2199 return count;
2200 }
2201 EXPORT_SYMBOL_GPL(br_multicast_list_adjacent);
This page took 0.080431 seconds and 5 git commands to generate.