netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag
@ 2015-02-04  9:51 Jouni Malinen
  2015-02-04  9:51 ` [PATCH 2/3] bridge: Selectively prevent bridge port flooding for proxy ARP Jouni Malinen
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Jouni Malinen @ 2015-02-04  9:51 UTC (permalink / raw)
  To: David Miller; +Cc: netdev, Kyeyoon Park, Jouni Malinen

From: Kyeyoon Park <kyeyoonp@codeaurora.org>

When doing proxy ARP, instead of checking the bridge port flag for
BR_PROXYARP on the bridge port on which the frame was received, check
the bridge port flag of the bridge port to which the target device
belongs.

Signed-off-by: Kyeyoon Park <kyeyoonp@codeaurora.org>
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
---
 net/bridge/br_input.c | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c
index e2aa7be..cfd46c6 100644
--- a/net/bridge/br_input.c
+++ b/net/bridge/br_input.c
@@ -105,7 +105,7 @@ static void br_do_proxy_arp(struct sk_buff *skb, struct net_bridge *br,
 		}
 
 		f = __br_fdb_get(br, n->ha, vid);
-		if (f)
+		if (f && f->dst->flags & BR_PROXYARP)
 			arp_send(ARPOP_REPLY, ETH_P_ARP, sip, skb->dev, tip,
 				 sha, n->ha, sha);
 
@@ -155,7 +155,6 @@ int br_handle_frame_finish(struct sk_buff *skb)
 
 	if (is_broadcast_ether_addr(dest)) {
 		if (IS_ENABLED(CONFIG_INET) &&
-		    p->flags & BR_PROXYARP &&
 		    skb->protocol == htons(ETH_P_ARP))
 			br_do_proxy_arp(skb, br, vid);
 
-- 
1.9.1

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [PATCH 2/3] bridge: Selectively prevent bridge port flooding for proxy ARP
  2015-02-04  9:51 [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Jouni Malinen
@ 2015-02-04  9:51 ` Jouni Malinen
  2015-02-04  9:51 ` [PATCH 3/3] bridge: Allow proxy ARP for unicast ARP requests Jouni Malinen
  2015-02-04 23:13 ` [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Stephen Hemminger
  2 siblings, 0 replies; 4+ messages in thread
From: Jouni Malinen @ 2015-02-04  9:51 UTC (permalink / raw)
  To: David Miller; +Cc: netdev, Kyeyoon Park, Jouni Malinen

From: Kyeyoon Park <kyeyoonp@codeaurora.org>

Rather than completely blocking the bridge port flooding when
BR_PROXYARP is enabled, selectively prevent bridge port flooding for the
proxy ARP relevant frames. This is done by marking the "skb" with this
info when proxy ARP code executes.

Signed-off-by: Kyeyoon Park <kyeyoonp@codeaurora.org>
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
---
 net/bridge/br_forward.c | 3 ++-
 net/bridge/br_input.c   | 6 +++++-
 net/bridge/br_private.h | 1 +
 3 files changed, 8 insertions(+), 2 deletions(-)

diff --git a/net/bridge/br_forward.c b/net/bridge/br_forward.c
index f96933a..81b4bed 100644
--- a/net/bridge/br_forward.c
+++ b/net/bridge/br_forward.c
@@ -186,7 +186,8 @@ static void br_flood(struct net_bridge *br, struct sk_buff *skb,
 			continue;
 
 		/* Do not flood to ports that enable proxy ARP */
-		if (p->flags & BR_PROXYARP)
+		if (p->flags & BR_PROXYARP &&
+		    BR_INPUT_SKB_CB(skb)->proxyarp_replied)
 			continue;
 
 		prev = maybe_deliver(prev, p, skb, __packet_hook);
diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c
index cfd46c6..41d1d3f 100644
--- a/net/bridge/br_input.c
+++ b/net/bridge/br_input.c
@@ -68,6 +68,8 @@ static void br_do_proxy_arp(struct sk_buff *skb, struct net_bridge *br,
 	u8 *arpptr, *sha;
 	__be32 sip, tip;
 
+	BR_INPUT_SKB_CB(skb)->proxyarp_replied = false;
+
 	if (dev->flags & IFF_NOARP)
 		return;
 
@@ -105,9 +107,11 @@ static void br_do_proxy_arp(struct sk_buff *skb, struct net_bridge *br,
 		}
 
 		f = __br_fdb_get(br, n->ha, vid);
-		if (f && f->dst->flags & BR_PROXYARP)
+		if (f && f->dst->flags & BR_PROXYARP) {
 			arp_send(ARPOP_REPLY, ETH_P_ARP, sip, skb->dev, tip,
 				 sha, n->ha, sha);
+			BR_INPUT_SKB_CB(skb)->proxyarp_replied = true;
+		}
 
 		neigh_release(n);
 	}
diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h
index de09199..c32e279 100644
--- a/net/bridge/br_private.h
+++ b/net/bridge/br_private.h
@@ -305,6 +305,7 @@ struct br_input_skb_cb {
 #endif
 
 	u16 frag_max_size;
+	bool proxyarp_replied;
 
 #ifdef CONFIG_BRIDGE_VLAN_FILTERING
 	bool vlan_filtered;
-- 
1.9.1

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [PATCH 3/3] bridge: Allow proxy ARP for unicast ARP requests
  2015-02-04  9:51 [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Jouni Malinen
  2015-02-04  9:51 ` [PATCH 2/3] bridge: Selectively prevent bridge port flooding for proxy ARP Jouni Malinen
@ 2015-02-04  9:51 ` Jouni Malinen
  2015-02-04 23:13 ` [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Stephen Hemminger
  2 siblings, 0 replies; 4+ messages in thread
From: Jouni Malinen @ 2015-02-04  9:51 UTC (permalink / raw)
  To: David Miller; +Cc: netdev, Kyeyoon Park, Jouni Malinen

From: Kyeyoon Park <kyeyoonp@codeaurora.org>

It is possible for unicast ARP requests to be used and the same proxyarp
mechanism should work for them as well as for the broadcast case.

Signed-off-by: Kyeyoon Park <kyeyoonp@codeaurora.org>
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
---
 net/bridge/br_input.c | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/net/bridge/br_input.c b/net/bridge/br_input.c
index 41d1d3f..c60100f 100644
--- a/net/bridge/br_input.c
+++ b/net/bridge/br_input.c
@@ -157,11 +157,11 @@ int br_handle_frame_finish(struct sk_buff *skb)
 
 	dst = NULL;
 
-	if (is_broadcast_ether_addr(dest)) {
-		if (IS_ENABLED(CONFIG_INET) &&
-		    skb->protocol == htons(ETH_P_ARP))
-			br_do_proxy_arp(skb, br, vid);
+	if (IS_ENABLED(CONFIG_INET) &&
+	    skb->protocol == htons(ETH_P_ARP))
+		br_do_proxy_arp(skb, br, vid);
 
+	if (is_broadcast_ether_addr(dest)) {
 		skb2 = skb;
 		unicast = false;
 	} else if (is_multicast_ether_addr(dest)) {
-- 
1.9.1

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag
  2015-02-04  9:51 [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Jouni Malinen
  2015-02-04  9:51 ` [PATCH 2/3] bridge: Selectively prevent bridge port flooding for proxy ARP Jouni Malinen
  2015-02-04  9:51 ` [PATCH 3/3] bridge: Allow proxy ARP for unicast ARP requests Jouni Malinen
@ 2015-02-04 23:13 ` Stephen Hemminger
  2 siblings, 0 replies; 4+ messages in thread
From: Stephen Hemminger @ 2015-02-04 23:13 UTC (permalink / raw)
  To: Jouni Malinen; +Cc: David Miller, netdev, Kyeyoon Park

On Wed,  4 Feb 2015 11:51:05 +0200
Jouni Malinen <jouni@codeaurora.org> wrote:

> +		if (f && f->dst->flags & BR_PROXYARP)

Please add parens when mixing && and & in same if

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2015-02-04 23:14 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-02-04  9:51 [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Jouni Malinen
2015-02-04  9:51 ` [PATCH 2/3] bridge: Selectively prevent bridge port flooding for proxy ARP Jouni Malinen
2015-02-04  9:51 ` [PATCH 3/3] bridge: Allow proxy ARP for unicast ARP requests Jouni Malinen
2015-02-04 23:13 ` [PATCH 1/3] bridge: Base the BR_PROXYARP decision on the target port flag Stephen Hemminger

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).