* [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages
@ 2025-07-16 15:35 Joseph Huang
2025-07-16 15:42 ` Nikolay Aleksandrov
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Joseph Huang @ 2025-07-16 15:35 UTC (permalink / raw)
To: netdev
Cc: Joseph Huang, Joseph Huang, Nikolay Aleksandrov, Ido Schimmel,
David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Simon Horman, Vladimir Oltean, Florian Fainelli,
Tobias Waldekranz, bridge, linux-kernel
Do not offload IGMP/MLD messages as it could lead to IGMP/MLD Reports
being unintentionally flooded to Hosts. Instead, let the bridge decide
where to send these IGMP/MLD messages.
Consider the case where the local host is sending out reports in response
to a remote querier like the following:
mcast-listener-process (IP_ADD_MEMBERSHIP)
\
br0
/ \
swp1 swp2
| |
QUERIER SOME-OTHER-HOST
In the above setup, br0 will want to br_forward() reports for
mcast-listener-process's group(s) via swp1 to QUERIER; but since the
source hwdom is 0, the report is eligible for tx offloading, and is
flooded by hardware to both swp1 and swp2, reaching SOME-OTHER-HOST as
well. (Example and illustration provided by Tobias.)
Fixes: 472111920f1c ("net: bridge: switchdev: allow the TX data plane forwarding to be offloaded")
Signed-off-by: Joseph Huang <Joseph.Huang@garmin.com>
---
v1: https://lore.kernel.org/netdev/20250701193639.836027-1-Joseph.Huang@garmin.com/
v2: https://lore.kernel.org/netdev/20250714150101.1168368-1-Joseph.Huang@garmin.com/
Updated commit message.
v3: Return early if it's an IGMP/MLD packet.
---
net/bridge/br_switchdev.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/net/bridge/br_switchdev.c b/net/bridge/br_switchdev.c
index 95d7355a0407..9a910cf0256e 100644
--- a/net/bridge/br_switchdev.c
+++ b/net/bridge/br_switchdev.c
@@ -17,6 +17,9 @@ static bool nbp_switchdev_can_offload_tx_fwd(const struct net_bridge_port *p,
if (!static_branch_unlikely(&br_switchdev_tx_fwd_offload))
return false;
+ if (br_multicast_igmp_type(skb))
+ return false;
+
return (p->flags & BR_TX_FWD_OFFLOAD) &&
(p->hwdom != BR_INPUT_SKB_CB(skb)->src_hwdom);
}
--
2.50.1
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages
2025-07-16 15:35 [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages Joseph Huang
@ 2025-07-16 15:42 ` Nikolay Aleksandrov
2025-07-16 15:57 ` Ido Schimmel
2025-07-17 14:50 ` patchwork-bot+netdevbpf
2 siblings, 0 replies; 4+ messages in thread
From: Nikolay Aleksandrov @ 2025-07-16 15:42 UTC (permalink / raw)
To: Joseph Huang, netdev
Cc: Joseph Huang, Ido Schimmel, David S. Miller, Eric Dumazet,
Jakub Kicinski, Paolo Abeni, Simon Horman, Vladimir Oltean,
Florian Fainelli, Tobias Waldekranz, bridge, linux-kernel
On 7/16/25 18:35, Joseph Huang wrote:
> Do not offload IGMP/MLD messages as it could lead to IGMP/MLD Reports
> being unintentionally flooded to Hosts. Instead, let the bridge decide
> where to send these IGMP/MLD messages.
>
> Consider the case where the local host is sending out reports in response
> to a remote querier like the following:
>
> mcast-listener-process (IP_ADD_MEMBERSHIP)
> \
> br0
> / \
> swp1 swp2
> | |
> QUERIER SOME-OTHER-HOST
>
> In the above setup, br0 will want to br_forward() reports for
> mcast-listener-process's group(s) via swp1 to QUERIER; but since the
> source hwdom is 0, the report is eligible for tx offloading, and is
> flooded by hardware to both swp1 and swp2, reaching SOME-OTHER-HOST as
> well. (Example and illustration provided by Tobias.)
>
> Fixes: 472111920f1c ("net: bridge: switchdev: allow the TX data plane forwarding to be offloaded")
> Signed-off-by: Joseph Huang <Joseph.Huang@garmin.com>
> ---
> v1: https://lore.kernel.org/netdev/20250701193639.836027-1-Joseph.Huang@garmin.com/
> v2: https://lore.kernel.org/netdev/20250714150101.1168368-1-Joseph.Huang@garmin.com/
> Updated commit message.
> v3: Return early if it's an IGMP/MLD packet.
> ---
> net/bridge/br_switchdev.c | 3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/net/bridge/br_switchdev.c b/net/bridge/br_switchdev.c
> index 95d7355a0407..9a910cf0256e 100644
> --- a/net/bridge/br_switchdev.c
> +++ b/net/bridge/br_switchdev.c
> @@ -17,6 +17,9 @@ static bool nbp_switchdev_can_offload_tx_fwd(const struct net_bridge_port *p,
> if (!static_branch_unlikely(&br_switchdev_tx_fwd_offload))
> return false;
>
> + if (br_multicast_igmp_type(skb))
> + return false;
> +
> return (p->flags & BR_TX_FWD_OFFLOAD) &&
> (p->hwdom != BR_INPUT_SKB_CB(skb)->src_hwdom);
> }
LGTM,
Acked-by: Nikolay Aleksandrov <razor@blackwall.org>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages
2025-07-16 15:35 [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages Joseph Huang
2025-07-16 15:42 ` Nikolay Aleksandrov
@ 2025-07-16 15:57 ` Ido Schimmel
2025-07-17 14:50 ` patchwork-bot+netdevbpf
2 siblings, 0 replies; 4+ messages in thread
From: Ido Schimmel @ 2025-07-16 15:57 UTC (permalink / raw)
To: Joseph Huang
Cc: netdev, Joseph Huang, Nikolay Aleksandrov, David S. Miller,
Eric Dumazet, Jakub Kicinski, Paolo Abeni, Simon Horman,
Vladimir Oltean, Florian Fainelli, Tobias Waldekranz, bridge,
linux-kernel
On Wed, Jul 16, 2025 at 11:35:50AM -0400, Joseph Huang wrote:
> Do not offload IGMP/MLD messages as it could lead to IGMP/MLD Reports
> being unintentionally flooded to Hosts. Instead, let the bridge decide
> where to send these IGMP/MLD messages.
>
> Consider the case where the local host is sending out reports in response
> to a remote querier like the following:
>
> mcast-listener-process (IP_ADD_MEMBERSHIP)
> \
> br0
> / \
> swp1 swp2
> | |
> QUERIER SOME-OTHER-HOST
>
> In the above setup, br0 will want to br_forward() reports for
> mcast-listener-process's group(s) via swp1 to QUERIER; but since the
> source hwdom is 0, the report is eligible for tx offloading, and is
> flooded by hardware to both swp1 and swp2, reaching SOME-OTHER-HOST as
> well. (Example and illustration provided by Tobias.)
>
> Fixes: 472111920f1c ("net: bridge: switchdev: allow the TX data plane forwarding to be offloaded")
> Signed-off-by: Joseph Huang <Joseph.Huang@garmin.com>
Reviewed-by: Ido Schimmel <idosch@nvidia.com>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages
2025-07-16 15:35 [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages Joseph Huang
2025-07-16 15:42 ` Nikolay Aleksandrov
2025-07-16 15:57 ` Ido Schimmel
@ 2025-07-17 14:50 ` patchwork-bot+netdevbpf
2 siblings, 0 replies; 4+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-07-17 14:50 UTC (permalink / raw)
To: Joseph Huang
Cc: netdev, joseph.huang.2024, razor, idosch, davem, edumazet, kuba,
pabeni, horms, vladimir.oltean, f.fainelli, tobias, bridge,
linux-kernel
Hello:
This patch was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Wed, 16 Jul 2025 11:35:50 -0400 you wrote:
> Do not offload IGMP/MLD messages as it could lead to IGMP/MLD Reports
> being unintentionally flooded to Hosts. Instead, let the bridge decide
> where to send these IGMP/MLD messages.
>
> Consider the case where the local host is sending out reports in response
> to a remote querier like the following:
>
> [...]
Here is the summary with links:
- [v3,net] net: bridge: Do not offload IGMP/MLD messages
https://git.kernel.org/netdev/net/c/683dc24da8bf
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2025-07-17 14:50 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-16 15:35 [PATCH v3 net] net: bridge: Do not offload IGMP/MLD messages Joseph Huang
2025-07-16 15:42 ` Nikolay Aleksandrov
2025-07-16 15:57 ` Ido Schimmel
2025-07-17 14:50 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).