Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp1551473imj; Sun, 17 Feb 2019 08:28:53 -0800 (PST) X-Google-Smtp-Source: AHgI3IZgwH0OgAoSEuy9Xra73BpPvK4DyTyQ6WNnbzAcW+CJeoxZJD7/20mxDs9XP/Nr/M4wTlSw X-Received: by 2002:a63:618d:: with SMTP id v135mr14679424pgb.238.1550420933867; Sun, 17 Feb 2019 08:28:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550420933; cv=none; d=google.com; s=arc-20160816; b=C6C4t2r1XcEVGxnPwooI4zKH9KgKmm3TQJ1ZCslgtURBvFOH25L0PQX4nqY/Pdj9Lt aetjcIGebJXrhiXr+aP6eITGQ36/SBcGDBlEzrTL8WEQft6qQc86xIqMf+d9EFPfrOtv fnj0s+G0OHwW0w3tSR3mawgzqyrBha/f7TH6Grbs9nHglyylAQFDOg4Tidk+IFVIFRQE ZQ/LA8KXWGYh/b+et2NCbY5saBWWxRVNMEmMnWCJ+2s6rP2/zI3lTHtwrU/rIOeEL4wf YNA9Kc0UeQNdkiAmcyPw2AKnvwlv3yTELJ1T/wHZJh+yaLc84A9S42PQyrlixKrkfvjN D9DA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject:dkim-signature; bh=BCoHtEvbPNkmj25tdc1uluIH6vnbWeFVIPAzSdkUxTE=; b=c/8SE6F7wO1wiBrQrcAmHd6R5ie8SfvguFhN74xY7+B/2/gtgQtmQzup154hHL+ldM LTmIt/0w1H42aDYRCqV8/X1OUVPEcnOoFLII/EMI9klyInpA0XWOiNhKW8A+s3uDSjR6 5tOw7FcX4j0YXhRalpJbdGTYTLz4QZQmywjXpQC1PG5CVBJE8A1bZsJpTbAsan+DEQbT s4xPPtPz32WlRYzpYKcNT8xg83+wL03gmOqsxpXMe38I1fa4fS2jqzOGBOKfHqOovTvO +vY6k+5C61Y2UeApMeA2qicFwZaxe+gdtyvWHb+HsKCanNMTnhuYqFSD99CHg+GRJzpU yIJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@newmedia-net.de header.s=mikd header.b=L4kyQD4M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=newmedia-net.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s14si3755854plq.284.2019.02.17.08.28.38; Sun, 17 Feb 2019 08:28:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@newmedia-net.de header.s=mikd header.b=L4kyQD4M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=newmedia-net.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727114AbfBQOpB (ORCPT + 99 others); Sun, 17 Feb 2019 09:45:01 -0500 Received: from webmail.newmedia-net.de ([185.84.6.166]:43349 "EHLO webmail.newmedia-net.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725795AbfBQOpB (ORCPT ); Sun, 17 Feb 2019 09:45:01 -0500 X-Greylist: delayed 930 seconds by postgrey-1.27 at vger.kernel.org; Sun, 17 Feb 2019 09:44:59 EST DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=newmedia-net.de; s=mikd; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject; bh=BCoHtEvbPNkmj25tdc1uluIH6vnbWeFVIPAzSdkUxTE=; b=L4kyQD4MMgZVAs9aLL01E7y08Jeay60mO9vo4REPpg/AdxCvwJSmSDFlFNf0WYllj43p5LfqtZ7B99CzPXBMzlDm2WhJ7GVPOBXqnblJx+Qbc/IKNQbxW/m4X5U9Ngn0DUuKIOjuqVLH+6TVWxPmt4lnDA/3nt85S72LVzsSY40=; Subject: Re: [PATCH 4.19 01/24] bridge: do not add port to router list when receives query with source 0.0.0.0 To: Greg Kroah-Hartman , linux-kernel@vger.kernel.org Cc: stable@vger.kernel.org, Ying Xu , Hangbin Liu , Nikolay Aleksandrov , Roopa Prabhu , "David S. Miller" References: <20181102182839.725385066@linuxfoundation.org> <20181102182839.913422845@linuxfoundation.org> From: Sebastian Gottschall Message-ID: <07d315a2-d735-3d8b-686c-9c52acf91bf1@newmedia-net.de> Date: Sun, 17 Feb 2019 15:29:22 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 In-Reply-To: <20181102182839.913422845@linuxfoundation.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Received: from [2003:c9:3f02:2400:a93f:22bc:252b:7e28] by webmail.newmedia-net.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.72) (envelope-from ) id 1gvNRh-0007b7-8v; Sun, 17 Feb 2019 15:29:29 +0100 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org according to user reports this patch will cause a serious regression. igmp snooping is not working anymore with this patch Am 02.11.2018 um 19:34 schrieb Greg Kroah-Hartman: > 4.19-stable review patch. If anyone has any objections, please let me know. > > ------------------ > > From: Hangbin Liu > > [ Upstream commit 5a2de63fd1a59c30c02526d427bc014b98adf508 ] > > Based on RFC 4541, 2.1.1. IGMP Forwarding Rules > > The switch supporting IGMP snooping must maintain a list of > multicast routers and the ports on which they are attached. This > list can be constructed in any combination of the following ways: > > a) This list should be built by the snooping switch sending > Multicast Router Solicitation messages as described in IGMP > Multicast Router Discovery [MRDISC]. It may also snoop > Multicast Router Advertisement messages sent by and to other > nodes. > > b) The arrival port for IGMP Queries (sent by multicast routers) > where the source address is not 0.0.0.0. > > We should not add the port to router list when receives query with source > 0.0.0.0. > > Reported-by: Ying Xu > Signed-off-by: Hangbin Liu > Acked-by: Nikolay Aleksandrov > Acked-by: Roopa Prabhu > Signed-off-by: David S. Miller > Signed-off-by: Greg Kroah-Hartman > --- > net/bridge/br_multicast.c | 10 +++++++++- > 1 file changed, 9 insertions(+), 1 deletion(-) > > --- a/net/bridge/br_multicast.c > +++ b/net/bridge/br_multicast.c > @@ -1420,7 +1420,15 @@ static void br_multicast_query_received( > return; > > br_multicast_update_query_timer(br, query, max_delay); > - br_multicast_mark_router(br, port); > + > + /* Based on RFC4541, section 2.1.1 IGMP Forwarding Rules, > + * the arrival port for IGMP Queries where the source address > + * is 0.0.0.0 should not be added to router port list. > + */ > + if ((saddr->proto == htons(ETH_P_IP) && saddr->u.ip4) || > + (saddr->proto == htons(ETH_P_IPV6) && > + !ipv6_addr_any(&saddr->u.ip6))) > + br_multicast_mark_router(br, port); > } > > static void br_ip4_multicast_query(struct net_bridge *br, > > >