mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-06-27 09:02:06 +00:00
bridge: add root port blocking
This is Linux bridge implementation of root port guard. If BPDU is received from a leaf (edge) port, it should not be elected as root port. Why would you want to do this? If using STP on a bridge and the downstream bridges are not fully trusted; this prevents a hostile guest for rerouting traffic. Why not just use netfilter? Netfilter does not track of follow spanning tree decisions. It would be difficult and error prone to try and mirror STP resolution in netfilter module. Signed-off-by: Stephen Hemminger <shemminger@vyatta.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
a2e01a65cd
commit
1007dd1aa5
5 changed files with 29 additions and 2 deletions
|
@ -100,6 +100,21 @@ static int br_should_become_root_port(const struct net_bridge_port *p,
|
|||
return 0;
|
||||
}
|
||||
|
||||
static void br_root_port_block(const struct net_bridge *br,
|
||||
struct net_bridge_port *p)
|
||||
{
|
||||
|
||||
br_notice(br, "port %u(%s) tried to become root port (blocked)",
|
||||
(unsigned int) p->port_no, p->dev->name);
|
||||
|
||||
p->state = BR_STATE_LISTENING;
|
||||
br_log_state(p);
|
||||
br_ifinfo_notify(RTM_NEWLINK, p);
|
||||
|
||||
if (br->forward_delay > 0)
|
||||
mod_timer(&p->forward_delay_timer, jiffies + br->forward_delay);
|
||||
}
|
||||
|
||||
/* called under bridge lock */
|
||||
static void br_root_selection(struct net_bridge *br)
|
||||
{
|
||||
|
@ -107,7 +122,12 @@ static void br_root_selection(struct net_bridge *br)
|
|||
u16 root_port = 0;
|
||||
|
||||
list_for_each_entry(p, &br->port_list, list) {
|
||||
if (br_should_become_root_port(p, root_port))
|
||||
if (!br_should_become_root_port(p, root_port))
|
||||
continue;
|
||||
|
||||
if (p->flags & BR_ROOT_BLOCK)
|
||||
br_root_port_block(br, p);
|
||||
else
|
||||
root_port = p->port_no;
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue