diff options
author | Fernando Luis Vázquez Cao <fernando@oss.ntt.co.jp> | 2011-06-13 15:06:58 +0000 |
---|---|---|
committer | David S. Miller <davem@conan.davemloft.net> | 2011-06-16 23:14:13 -0400 |
commit | fc2af6c73fc9449cd5894a36bb76b8f8c0e49fd8 (patch) | |
tree | f2013b06d5c6c049529598477e15584a1e77c342 | |
parent | 62b2bcb49cca72f6d3f39f831127a6ab315a475d (diff) | |
download | linux-3.10-fc2af6c73fc9449cd5894a36bb76b8f8c0e49fd8.tar.gz linux-3.10-fc2af6c73fc9449cd5894a36bb76b8f8c0e49fd8.tar.bz2 linux-3.10-fc2af6c73fc9449cd5894a36bb76b8f8c0e49fd8.zip |
IGMP snooping: set mrouters_only flag for IPv6 traffic properly
Upon reception of a MGM report packet the kernel sets the mrouters_only flag
in a skb that is a clone of the original skb, which means that the bridge
loses track of MGM packets (cb buffers are tied to a specific skb and not
shared) and it ends up forwading join requests to the bridge interface.
This can cause unexpected membership timeouts and intermitent/permanent loss
of connectivity as described in RFC 4541 [2.1.1. IGMP Forwarding Rules]:
A snooping switch should forward IGMP Membership Reports only to
those ports where multicast routers are attached.
[...]
Sending membership reports to other hosts can result, for IGMPv1
and IGMPv2, in unintentionally preventing a host from joining a
specific multicast group.
Signed-off-by: Fernando Luis Vazquez Cao <fernando@oss.ntt.co.jp>
Signed-off-by: David S. Miller <davem@conan.davemloft.net>
-rw-r--r-- | net/bridge/br_multicast.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c index a6d87c17bb0..29b9812c8da 100644 --- a/net/bridge/br_multicast.c +++ b/net/bridge/br_multicast.c @@ -1543,7 +1543,7 @@ static int br_multicast_ipv6_rcv(struct net_bridge *br, goto out; } mld = (struct mld_msg *)skb_transport_header(skb2); - BR_INPUT_SKB_CB(skb2)->mrouters_only = 1; + BR_INPUT_SKB_CB(skb)->mrouters_only = 1; err = br_ip6_multicast_add_group(br, port, &mld->mld_mca); break; } |