Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp540294imp; Wed, 20 Feb 2019 04:51:09 -0800 (PST) X-Google-Smtp-Source: AHgI3IZt9xwNfxh2VsRLVKA+CdeGePlbJ7ePgKgPR4kwqRuKu8M1TMP54nQzZwuQ6qyRC+2oT2me X-Received: by 2002:a17:902:29ab:: with SMTP id h40mr36543955plb.238.1550667069635; Wed, 20 Feb 2019 04:51:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550667069; cv=none; d=google.com; s=arc-20160816; b=A3Db1PeUKI9Mt81Peo+54KIKsYLrieRS/3j1xwZ3puvcUEwFtlGvyV3A8H1rFpN0+P BzlYJH1g+kBdQPuiPu4yLC0i5yIRsOW28Ad/pO+cHY8jjPbm33qSIXlUB/WBbmyTdlnL 7KoRp4qwlHZ0zZdAdUVDNhlNJYjPP8Gt8vb9x/eUPp4uhCCyR16DIj/tWeIrjmE+zMpJ vbE7+lbaULS3ejamTH+PjWDhgs5cCNf7XPGCvP45So81e5pNXxgC+CKBbJGJsKYiJPmE mDVUEa2oD6hsg3om0472TCdteL2KbRnzsJYmul3AgHeZXMbokeCwGJTBxHEZBT07RB50 dEUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:references:cc:to:from :subject:dkim-signature; bh=S43t4STrzKNlgIHgw7HYKHhdcrGiPYaOdSdJSMzauHI=; b=Evw7qVZtOhHMaqCeJpdgAgEb6yrgiP6s8/Vu269MY8s/b6QPWDtGxO2D4gqy11sA0o 6dsgMLK9wWGlRsnOmiYLSojjeyY6+GXfaAt8hrjT/HdrC0RZsBhJ7RTviiAfq/ovqakT DvXw+D2BlOyrVr5E8qgagxmLFcOj6o4iHRQYOFSKVfas7CnpXSnK9Ukb0vnbYlGJEinA u2mPPI60qKDSIxrgaquKd93cta6QqdnsMbOhs5SOZ9QErzNN1Hf8T4F/7dMknmts/iQO kc+6MLwJeDcfOrFm6J56YHA81ZhDyPt6DkC++x41E+GRn0Hy9mTardb6B7Rxv1r1XiZe sV7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@newmedia-net.de header.s=mikd header.b=mZtltRy8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=newmedia-net.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t14si17580847pfh.107.2019.02.20.04.50.53; Wed, 20 Feb 2019 04:51:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@newmedia-net.de header.s=mikd header.b=mZtltRy8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=newmedia-net.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727932AbfBTMsz (ORCPT + 99 others); Wed, 20 Feb 2019 07:48:55 -0500 Received: from webmail.newmedia-net.de ([185.84.6.166]:47916 "EHLO webmail.newmedia-net.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726414AbfBTMsz (ORCPT ); Wed, 20 Feb 2019 07:48:55 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=newmedia-net.de; s=mikd; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:References:Cc:To:From:Subject; bh=S43t4STrzKNlgIHgw7HYKHhdcrGiPYaOdSdJSMzauHI=; b=mZtltRy8vfIag1PTaJh8AYJRBBVHDZMV+hVG+hwyEW5cNJc3d0SEzCqa1XQLwvlfUtBOg59VFNoxmMb0xY0R1PF3/3VnOTEuNxHK/jlKGxK+BWiI5UOPMdInIQYNyPtXMQYyGjAPoLoX2/pvbjz/vUjJE41k/amgAJJr/qzvftM=; Subject: Re: [PATCH 4.19 01/24] bridge: do not add port to router list when receives query with source 0.0.0.0 From: Sebastian Gottschall To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Ying Xu , Hangbin Liu , Nikolay Aleksandrov , Roopa Prabhu , "David S. Miller" References: <20181102182839.725385066@linuxfoundation.org> <20181102182839.913422845@linuxfoundation.org> <07d315a2-d735-3d8b-686c-9c52acf91bf1@newmedia-net.de> <20190217164809.GA24091@kroah.com> <7978727a-eacc-779c-771f-f4c3013237f3@newmedia-net.de> Message-ID: <0425449f-f6d9-c492-d7c8-ba202db88d26@newmedia-net.de> Date: Wed, 20 Feb 2019 13:48:47 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 In-Reply-To: <7978727a-eacc-779c-771f-f4c3013237f3@newmedia-net.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Received: from [212.111.244.1] (helo=[172.29.0.186]) by webmail.newmedia-net.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.72) (envelope-from ) id 1gwRIy-0004RO-Lx; Wed, 20 Feb 2019 13:48:52 +0100 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org *reminder* Am 18.02.2019 um 11:18 schrieb Sebastian Gottschall: > > Am 17.02.2019 um 17:48 schrieb Greg Kroah-Hartman: >> On Sun, Feb 17, 2019 at 03:29:22PM +0100, Sebastian Gottschall wrote: >>> according to user reports this patch will cause a serious >>> regression. igmp >>> snooping is not working anymore with this patch >>> >>> Am 02.11.2018 um 19:34 schrieb Greg Kroah-Hartman: >>>> 4.19-stable review patch.  If anyone has any objections, please let >>>> me know. >>>> >>>> ------------------ >>>> >>>> From: Hangbin Liu >>>> >>>> [ Upstream commit 5a2de63fd1a59c30c02526d427bc014b98adf508 ] >>>> >>>> Based on RFC 4541, 2.1.1.  IGMP Forwarding Rules >>>> >>>>     The switch supporting IGMP snooping must maintain a list of >>>>     multicast routers and the ports on which they are attached.  This >>>>     list can be constructed in any combination of the following ways: >>>> >>>>     a) This list should be built by the snooping switch sending >>>>        Multicast Router Solicitation messages as described in IGMP >>>>        Multicast Router Discovery [MRDISC].  It may also snoop >>>>        Multicast Router Advertisement messages sent by and to other >>>>        nodes. >>>> >>>>     b) The arrival port for IGMP Queries (sent by multicast routers) >>>>        where the source address is not 0.0.0.0. >>>> >>>> We should not add the port to router list when receives query with >>>> source >>>> 0.0.0.0. >>>> >>>> Reported-by: Ying Xu >>>> Signed-off-by: Hangbin Liu >>>> Acked-by: Nikolay Aleksandrov >>>> Acked-by: Roopa Prabhu >>>> Signed-off-by: David S. Miller >>>> Signed-off-by: Greg Kroah-Hartman >>>> --- >>>>    net/bridge/br_multicast.c |   10 +++++++++- >>>>    1 file changed, 9 insertions(+), 1 deletion(-) >>>> >>>> --- a/net/bridge/br_multicast.c >>>> +++ b/net/bridge/br_multicast.c >>>> @@ -1420,7 +1420,15 @@ static void br_multicast_query_received( >>>>            return; >>>>        br_multicast_update_query_timer(br, query, max_delay); >>>> -    br_multicast_mark_router(br, port); >>>> + >>>> +    /* Based on RFC4541, section 2.1.1 IGMP Forwarding Rules, >>>> +     * the arrival port for IGMP Queries where the source address >>>> +     * is 0.0.0.0 should not be added to router port list. >>>> +     */ >>>> +    if ((saddr->proto == htons(ETH_P_IP) && saddr->u.ip4) || >>>> +        (saddr->proto == htons(ETH_P_IPV6) && >>>> +         !ipv6_addr_any(&saddr->u.ip6))) >>>> +        br_multicast_mark_router(br, port); >>>>    } >>>>    static void br_ip4_multicast_query(struct net_bridge *br, >> Is this also a problem in 4.20?  This patch went into 4.20-rc1, so it >> has been around for a while with no reported issues that I can find. >> Any pointers to the reports? > > i need to check this. i found this patch in 4.9, 4.14 and 4.4 > the rest was picked up from the mailinglist. according to the git > sources of 4.20 and 5.0 the same code is in there as well > > i just got the report from users today and was able to reproduce it > with iptv streams. just by disabling the code it was working again. > > Sebastian >> >> thanks, >> >> greg k-h >> >