Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp1567371imj; Sun, 17 Feb 2019 08:52:14 -0800 (PST) X-Google-Smtp-Source: AHgI3IbzZrrj5XSk/nssFlJaA894LrDcqtO/6RccAVCVxtQUSzu2Z2vllWtgRhR4Yh2z/3NjF1zp X-Received: by 2002:a17:902:bc3:: with SMTP id 61mr20970177plr.15.1550422334410; Sun, 17 Feb 2019 08:52:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550422334; cv=none; d=google.com; s=arc-20160816; b=HCdxQAgg9BS8R5VIIPo5M8/AH3DRQ255RXNJxSsqILF4OWLpLvr3yR9xeuQB5DTD3Q E3qML9CzBS/3NJsRA5OXY46EsrqgavFCfMc3uZrEil+ZkXHH1ikQNAkYBZuyoBcX6JhI ThtVprPUWgtai+tHhaezaGYXLDDuc6liWC/DCqXXZa08iI0BD72SN3mat119c64bnwBv JX6q1MAU4cQbiZVT8Q2rQKqHK0PlfXh1N5ERZF4YVx49FehR7YUJZtsGPHOcS4LyDzk+ FhAIor44Hx8DwEQlsfllH0G3qqTSVjyNfv44ZytnzusKrTviwMVOTwVIW6gfJMDCrzA7 SzXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=4KlGyi3iaSBZGguWW+4CZPquSlufxSRi74urgapM+6w=; b=Mvbm77P4v+oLOE3iUnLj3De7CI6DkMfP6oLQR/FwuxmrtuvHWEmIlQ28qpAeqX0sHe eXVhE3aFIe+pZxm2yY5B/iorEIPEtcy8rRWMGugWmV1iSbU2/uAp6BOggoa7nRw1R9lD k53Pob/qgqmbkXHnITJQac6r4AykZpeRkBpIzJtvW5y28dM9uHKCPWZIgHCNBGAy6wdr teAb9m1JF1gX8y5YsMK15ohlStU7MwsY8KXUnGOIW7g6kUW1WXic7bnPYUiH9ZkQz0yu k7ExvwnF7YhMAR8hmrWrEJStFX2phS5f/voJo/lxTuoNXVfF8SHt3E7er9ZrjcFIKeOr qHYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lt0qqpqg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o4si6921828pgr.78.2019.02.17.08.51.58; Sun, 17 Feb 2019 08:52:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lt0qqpqg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726995AbfBQQsP (ORCPT + 99 others); Sun, 17 Feb 2019 11:48:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:46374 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726311AbfBQQsP (ORCPT ); Sun, 17 Feb 2019 11:48:15 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 13CAF21924; Sun, 17 Feb 2019 16:48:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550422093; bh=HjFIrihBcVZgXoCOgErOCMvaEU7bieYJv1BUuJ2jlJI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=lt0qqpqgxMpr7qUsMdlBJo7N40b4yaDT4H/w6vMeJ8gljl9lRSeerh9uvlWzgXOwP twyi03Qz4VrpkKb+aN4d9jvnKDS+bbuFzBHC2bDCyd96kcaLrGMIDA9gsZrN18ekPC P+3IQKzfWaO3ZaRScBI3vkFoouliDOeJTPUGCt9A= Date: Sun, 17 Feb 2019 17:48:09 +0100 From: Greg Kroah-Hartman To: Sebastian Gottschall Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Ying Xu , Hangbin Liu , Nikolay Aleksandrov , Roopa Prabhu , "David S. Miller" Subject: Re: [PATCH 4.19 01/24] bridge: do not add port to router list when receives query with source 0.0.0.0 Message-ID: <20190217164809.GA24091@kroah.com> References: <20181102182839.725385066@linuxfoundation.org> <20181102182839.913422845@linuxfoundation.org> <07d315a2-d735-3d8b-686c-9c52acf91bf1@newmedia-net.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <07d315a2-d735-3d8b-686c-9c52acf91bf1@newmedia-net.de> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Feb 17, 2019 at 03:29:22PM +0100, Sebastian Gottschall wrote: > according to user reports this patch will cause a serious regression. igmp > snooping is not working anymore with this patch > > Am 02.11.2018 um 19:34 schrieb Greg Kroah-Hartman: > > 4.19-stable review patch. If anyone has any objections, please let me know. > > > > ------------------ > > > > From: Hangbin Liu > > > > [ Upstream commit 5a2de63fd1a59c30c02526d427bc014b98adf508 ] > > > > Based on RFC 4541, 2.1.1. IGMP Forwarding Rules > > > > The switch supporting IGMP snooping must maintain a list of > > multicast routers and the ports on which they are attached. This > > list can be constructed in any combination of the following ways: > > > > a) This list should be built by the snooping switch sending > > Multicast Router Solicitation messages as described in IGMP > > Multicast Router Discovery [MRDISC]. It may also snoop > > Multicast Router Advertisement messages sent by and to other > > nodes. > > > > b) The arrival port for IGMP Queries (sent by multicast routers) > > where the source address is not 0.0.0.0. > > > > We should not add the port to router list when receives query with source > > 0.0.0.0. > > > > Reported-by: Ying Xu > > Signed-off-by: Hangbin Liu > > Acked-by: Nikolay Aleksandrov > > Acked-by: Roopa Prabhu > > Signed-off-by: David S. Miller > > Signed-off-by: Greg Kroah-Hartman > > --- > > net/bridge/br_multicast.c | 10 +++++++++- > > 1 file changed, 9 insertions(+), 1 deletion(-) > > > > --- a/net/bridge/br_multicast.c > > +++ b/net/bridge/br_multicast.c > > @@ -1420,7 +1420,15 @@ static void br_multicast_query_received( > > return; > > br_multicast_update_query_timer(br, query, max_delay); > > - br_multicast_mark_router(br, port); > > + > > + /* Based on RFC4541, section 2.1.1 IGMP Forwarding Rules, > > + * the arrival port for IGMP Queries where the source address > > + * is 0.0.0.0 should not be added to router port list. > > + */ > > + if ((saddr->proto == htons(ETH_P_IP) && saddr->u.ip4) || > > + (saddr->proto == htons(ETH_P_IPV6) && > > + !ipv6_addr_any(&saddr->u.ip6))) > > + br_multicast_mark_router(br, port); > > } > > static void br_ip4_multicast_query(struct net_bridge *br, Is this also a problem in 4.20? This patch went into 4.20-rc1, so it has been around for a while with no reported issues that I can find. Any pointers to the reports? thanks, greg k-h