Commit | Line | Data |
---|---|---|
984263bc | 1 | /* $FreeBSD: src/sys/netinet6/ip6_mroute.c,v 1.2.2.9 2003/01/23 21:06:47 sam Exp $ */ |
6caa4804 | 2 | /* $DragonFly: src/sys/netinet6/ip6_mroute.c,v 1.18 2008/06/21 12:30:19 aggelos Exp $ */ |
984263bc MD |
3 | /* $KAME: ip6_mroute.c,v 1.58 2001/12/18 02:36:31 itojun Exp $ */ |
4 | ||
5 | /* | |
6 | * Copyright (C) 1998 WIDE Project. | |
7 | * All rights reserved. | |
8 | * | |
9 | * Redistribution and use in source and binary forms, with or without | |
10 | * modification, are permitted provided that the following conditions | |
11 | * are met: | |
12 | * 1. Redistributions of source code must retain the above copyright | |
13 | * notice, this list of conditions and the following disclaimer. | |
14 | * 2. Redistributions in binary form must reproduce the above copyright | |
15 | * notice, this list of conditions and the following disclaimer in the | |
16 | * documentation and/or other materials provided with the distribution. | |
17 | * 3. Neither the name of the project nor the names of its contributors | |
18 | * may be used to endorse or promote products derived from this software | |
19 | * without specific prior written permission. | |
20 | * | |
21 | * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND | |
22 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
23 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
24 | * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE | |
25 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
27 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
28 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
29 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
30 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
31 | * SUCH DAMAGE. | |
32 | */ | |
33 | ||
34 | /* BSDI ip_mroute.c,v 2.10 1996/11/14 00:29:52 jch Exp */ | |
35 | ||
36 | /* | |
37 | * IP multicast forwarding procedures | |
38 | * | |
39 | * Written by David Waitzman, BBN Labs, August 1988. | |
40 | * Modified by Steve Deering, Stanford, February 1989. | |
41 | * Modified by Mark J. Steiglitz, Stanford, May, 1991 | |
42 | * Modified by Van Jacobson, LBL, January 1993 | |
43 | * Modified by Ajit Thyagarajan, PARC, August 1993 | |
44 | * Modified by Bill Fenenr, PARC, April 1994 | |
45 | * | |
46 | * MROUTING Revision: 3.5.1.2 + PIM-SMv2 (pimd) Support | |
47 | */ | |
48 | ||
49 | #include "opt_inet.h" | |
50 | #include "opt_inet6.h" | |
51 | ||
52 | #include <sys/param.h> | |
53 | #include <sys/systm.h> | |
54 | #include <sys/callout.h> | |
55 | #include <sys/malloc.h> | |
56 | #include <sys/mbuf.h> | |
57 | #include <sys/socket.h> | |
58 | #include <sys/socketvar.h> | |
59 | #include <sys/sockio.h> | |
60 | #include <sys/protosw.h> | |
61 | #include <sys/errno.h> | |
62 | #include <sys/time.h> | |
63 | #include <sys/kernel.h> | |
64 | #include <sys/syslog.h> | |
abf782b3 | 65 | #include <sys/thread2.h> |
984263bc MD |
66 | |
67 | #include <net/if.h> | |
68 | #include <net/route.h> | |
69 | #include <net/raw_cb.h> | |
70 | ||
71 | #include <netinet/in.h> | |
72 | #include <netinet/in_var.h> | |
73 | ||
74 | #include <netinet/ip6.h> | |
75 | #include <netinet6/ip6_var.h> | |
76 | #include <netinet6/ip6_mroute.h> | |
77 | #include <netinet6/pim6.h> | |
78 | #include <netinet6/pim6_var.h> | |
79 | ||
80 | #include <net/net_osdep.h> | |
81 | ||
82 | static MALLOC_DEFINE(M_MRTABLE, "mf6c", "multicast forwarding cache entry"); | |
83 | ||
84 | #define M_HASCL(m) ((m)->m_flags & M_EXT) | |
85 | ||
56d702cc RG |
86 | static int ip6_mdq (struct mbuf *, struct ifnet *, struct mf6c *); |
87 | static void phyint_send (struct ip6_hdr *, struct mif6 *, struct mbuf *); | |
984263bc | 88 | |
56d702cc RG |
89 | static int set_pim6 (int *); |
90 | static int socket_send (struct socket *, struct mbuf *, | |
91 | struct sockaddr_in6 *); | |
92 | static int register_send (struct ip6_hdr *, struct mif6 *, | |
93 | struct mbuf *); | |
984263bc MD |
94 | |
95 | /* | |
96 | * Globals. All but ip6_mrouter, ip6_mrtproto and mrt6stat could be static, | |
97 | * except for netstat or debugging purposes. | |
98 | */ | |
99 | struct socket *ip6_mrouter = NULL; | |
100 | int ip6_mrouter_ver = 0; | |
101 | int ip6_mrtproto = IPPROTO_PIM; /* for netstat only */ | |
102 | struct mrt6stat mrt6stat; | |
103 | ||
104 | #define NO_RTE_FOUND 0x1 | |
105 | #define RTE_FOUND 0x2 | |
106 | ||
107 | struct mf6c *mf6ctable[MF6CTBLSIZ]; | |
108 | u_char n6expire[MF6CTBLSIZ]; | |
109 | static struct mif6 mif6table[MAXMIFS]; | |
110 | #ifdef MRT6DEBUG | |
111 | u_int mrt6debug = 0; /* debug level */ | |
112 | #define DEBUG_MFC 0x02 | |
113 | #define DEBUG_FORWARD 0x04 | |
114 | #define DEBUG_EXPIRE 0x08 | |
115 | #define DEBUG_XMIT 0x10 | |
116 | #define DEBUG_REG 0x20 | |
117 | #define DEBUG_PIM 0x40 | |
118 | #endif | |
119 | ||
56d702cc | 120 | static void expire_upcalls (void *); |
984263bc MD |
121 | #define EXPIRE_TIMEOUT (hz / 4) /* 4x / second */ |
122 | #define UPCALL_EXPIRE 6 /* number of timeouts */ | |
123 | ||
124 | #ifdef INET | |
125 | #ifdef MROUTING | |
126 | extern struct socket *ip_mrouter; | |
127 | #endif | |
128 | #endif | |
129 | ||
130 | /* | |
131 | * 'Interfaces' associated with decapsulator (so we can tell | |
132 | * packets that went through it from ones that get reflected | |
133 | * by a broken gateway). These interfaces are never linked into | |
134 | * the system ifnet list & no routes point to them. I.e., packets | |
135 | * can't be sent this way. They only exist as a placeholder for | |
136 | * multicast source verification. | |
137 | */ | |
138 | struct ifnet multicast_register_if; | |
139 | ||
140 | #define ENCAP_HOPS 64 | |
141 | ||
142 | /* | |
143 | * Private variables. | |
144 | */ | |
145 | static mifi_t nummifs = 0; | |
146 | static mifi_t reg_mif_num = (mifi_t)-1; | |
147 | ||
148 | static struct pim6stat pim6stat; | |
149 | static int pim6; | |
150 | ||
151 | /* | |
152 | * Hash function for a source, group entry | |
153 | */ | |
154 | #define MF6CHASH(a, g) MF6CHASHMOD((a).s6_addr32[0] ^ (a).s6_addr32[1] ^ \ | |
155 | (a).s6_addr32[2] ^ (a).s6_addr32[3] ^ \ | |
156 | (g).s6_addr32[0] ^ (g).s6_addr32[1] ^ \ | |
157 | (g).s6_addr32[2] ^ (g).s6_addr32[3]) | |
158 | ||
159 | /* | |
160 | * Find a route for a given origin IPv6 address and Multicast group address. | |
161 | * Quality of service parameter to be added in the future!!! | |
162 | */ | |
163 | ||
164 | #define MF6CFIND(o, g, rt) do { \ | |
165 | struct mf6c *_rt = mf6ctable[MF6CHASH(o,g)]; \ | |
166 | rt = NULL; \ | |
167 | mrt6stat.mrt6s_mfc_lookups++; \ | |
168 | while (_rt) { \ | |
169 | if (IN6_ARE_ADDR_EQUAL(&_rt->mf6c_origin.sin6_addr, &(o)) && \ | |
170 | IN6_ARE_ADDR_EQUAL(&_rt->mf6c_mcastgrp.sin6_addr, &(g)) && \ | |
171 | (_rt->mf6c_stall == NULL)) { \ | |
172 | rt = _rt; \ | |
173 | break; \ | |
174 | } \ | |
175 | _rt = _rt->mf6c_next; \ | |
176 | } \ | |
177 | if (rt == NULL) { \ | |
178 | mrt6stat.mrt6s_mfc_misses++; \ | |
179 | } \ | |
180 | } while (0) | |
181 | ||
182 | /* | |
183 | * Macros to compute elapsed time efficiently | |
184 | * Borrowed from Van Jacobson's scheduling code | |
185 | */ | |
186 | #define TV_DELTA(a, b, delta) do { \ | |
187 | int xxs; \ | |
188 | \ | |
189 | delta = (a).tv_usec - (b).tv_usec; \ | |
190 | if ((xxs = (a).tv_sec - (b).tv_sec)) { \ | |
191 | switch (xxs) { \ | |
192 | case 2: \ | |
193 | delta += 1000000; \ | |
194 | /* fall through */ \ | |
195 | case 1: \ | |
196 | delta += 1000000; \ | |
197 | break; \ | |
198 | default: \ | |
199 | delta += (1000000 * xxs); \ | |
200 | } \ | |
201 | } \ | |
202 | } while (0) | |
203 | ||
204 | #define TV_LT(a, b) (((a).tv_usec < (b).tv_usec && \ | |
205 | (a).tv_sec <= (b).tv_sec) || (a).tv_sec < (b).tv_sec) | |
206 | ||
207 | #ifdef UPCALL_TIMING | |
208 | #define UPCALL_MAX 50 | |
209 | u_long upcall_data[UPCALL_MAX + 1]; | |
210 | static void collate(); | |
211 | #endif /* UPCALL_TIMING */ | |
212 | ||
56d702cc RG |
213 | static int get_sg_cnt (struct sioc_sg_req6 *); |
214 | static int get_mif6_cnt (struct sioc_mif_req6 *); | |
215 | static int ip6_mrouter_init (struct socket *, struct mbuf *, int); | |
216 | static int add_m6if (struct mif6ctl *); | |
217 | static int del_m6if (mifi_t *); | |
218 | static int add_m6fc (struct mf6cctl *); | |
219 | static int del_m6fc (struct mf6cctl *); | |
984263bc MD |
220 | |
221 | static struct callout expire_upcalls_ch; | |
222 | ||
223 | /* | |
224 | * Handle MRT setsockopt commands to modify the multicast routing tables. | |
225 | */ | |
226 | int | |
122ebd49 | 227 | ip6_mrouter_set(struct socket *so, struct sockopt *sopt) |
984263bc MD |
228 | { |
229 | int error = 0; | |
230 | struct mbuf *m; | |
231 | ||
232 | if (so != ip6_mrouter && sopt->sopt_name != MRT6_INIT) | |
233 | return (EACCES); | |
234 | ||
235 | if ((error = soopt_getm(sopt, &m)) != 0) /* XXX */ | |
236 | return (error); | |
6caa4804 | 237 | soopt_to_mbuf(sopt, m); /* XXX */ |
984263bc MD |
238 | |
239 | switch (sopt->sopt_name) { | |
240 | case MRT6_INIT: | |
241 | #ifdef MRT6_OINIT | |
242 | case MRT6_OINIT: | |
243 | #endif | |
244 | error = ip6_mrouter_init(so, m, sopt->sopt_name); | |
245 | break; | |
246 | case MRT6_DONE: | |
247 | error = ip6_mrouter_done(); | |
248 | break; | |
249 | case MRT6_ADD_MIF: | |
250 | error = add_m6if(mtod(m, struct mif6ctl *)); | |
251 | break; | |
252 | case MRT6_DEL_MIF: | |
253 | error = del_m6if(mtod(m, mifi_t *)); | |
254 | break; | |
255 | case MRT6_ADD_MFC: | |
256 | error = add_m6fc(mtod(m, struct mf6cctl *)); | |
257 | break; | |
258 | case MRT6_DEL_MFC: | |
259 | error = del_m6fc(mtod(m, struct mf6cctl *)); | |
260 | break; | |
261 | case MRT6_PIM: | |
262 | error = set_pim6(mtod(m, int *)); | |
263 | break; | |
264 | default: | |
265 | error = EOPNOTSUPP; | |
266 | break; | |
267 | } | |
268 | ||
0bdb1448 | 269 | m_freem(m); |
bde3511a | 270 | return (error); |
984263bc MD |
271 | } |
272 | ||
273 | /* | |
274 | * Handle MRT getsockopt commands | |
275 | */ | |
276 | int | |
122ebd49 | 277 | ip6_mrouter_get(struct socket *so, struct sockopt *sopt) |
984263bc MD |
278 | { |
279 | int error = 0; | |
280 | ||
281 | if (so != ip6_mrouter) return EACCES; | |
282 | ||
283 | switch (sopt->sopt_name) { | |
284 | case MRT6_PIM: | |
6caa4804 | 285 | soopt_from_kbuf(sopt, &pim6, sizeof(pim6)); |
984263bc MD |
286 | break; |
287 | } | |
288 | return (error); | |
289 | } | |
290 | ||
291 | /* | |
292 | * Handle ioctl commands to obtain information from the cache | |
293 | */ | |
294 | int | |
122ebd49 | 295 | mrt6_ioctl(int cmd, caddr_t data) |
984263bc MD |
296 | { |
297 | int error = 0; | |
298 | ||
299 | switch (cmd) { | |
300 | case SIOCGETSGCNT_IN6: | |
bde3511a | 301 | return (get_sg_cnt((struct sioc_sg_req6 *)data)); |
984263bc MD |
302 | break; /* for safety */ |
303 | case SIOCGETMIFCNT_IN6: | |
bde3511a | 304 | return (get_mif6_cnt((struct sioc_mif_req6 *)data)); |
984263bc MD |
305 | break; /* for safety */ |
306 | default: | |
307 | return (EINVAL); | |
308 | break; | |
309 | } | |
310 | return error; | |
311 | } | |
312 | ||
313 | /* | |
314 | * returns the packet, byte, rpf-failure count for the source group provided | |
315 | */ | |
316 | static int | |
122ebd49 | 317 | get_sg_cnt(struct sioc_sg_req6 *req) |
984263bc MD |
318 | { |
319 | struct mf6c *rt; | |
984263bc | 320 | |
abf782b3 | 321 | crit_enter(); |
984263bc | 322 | MF6CFIND(req->src.sin6_addr, req->grp.sin6_addr, rt); |
abf782b3 | 323 | crit_exit(); |
984263bc MD |
324 | if (rt != NULL) { |
325 | req->pktcnt = rt->mf6c_pkt_cnt; | |
326 | req->bytecnt = rt->mf6c_byte_cnt; | |
327 | req->wrong_if = rt->mf6c_wrong_if; | |
328 | } else | |
bde3511a | 329 | return (ESRCH); |
984263bc MD |
330 | #if 0 |
331 | req->pktcnt = req->bytecnt = req->wrong_if = 0xffffffff; | |
332 | #endif | |
333 | ||
334 | return 0; | |
335 | } | |
336 | ||
337 | /* | |
338 | * returns the input and output packet and byte counts on the mif provided | |
339 | */ | |
340 | static int | |
122ebd49 | 341 | get_mif6_cnt(struct sioc_mif_req6 *req) |
984263bc MD |
342 | { |
343 | mifi_t mifi = req->mifi; | |
344 | ||
345 | if (mifi >= nummifs) | |
346 | return EINVAL; | |
347 | ||
348 | req->icount = mif6table[mifi].m6_pkt_in; | |
349 | req->ocount = mif6table[mifi].m6_pkt_out; | |
350 | req->ibytes = mif6table[mifi].m6_bytes_in; | |
351 | req->obytes = mif6table[mifi].m6_bytes_out; | |
352 | ||
353 | return 0; | |
354 | } | |
355 | ||
356 | static int | |
122ebd49 | 357 | set_pim6(int *i) |
984263bc MD |
358 | { |
359 | if ((*i != 1) && (*i != 0)) | |
360 | return EINVAL; | |
361 | ||
362 | pim6 = *i; | |
363 | ||
364 | return 0; | |
365 | } | |
366 | ||
367 | /* | |
368 | * Enable multicast routing | |
369 | */ | |
370 | static int | |
122ebd49 | 371 | ip6_mrouter_init(struct socket *so, struct mbuf *m, int cmd) |
984263bc MD |
372 | { |
373 | int *v; | |
374 | ||
375 | #ifdef MRT6DEBUG | |
376 | if (mrt6debug) | |
377 | log(LOG_DEBUG, | |
378 | "ip6_mrouter_init: so_type = %d, pr_protocol = %d\n", | |
379 | so->so_type, so->so_proto->pr_protocol); | |
380 | #endif | |
381 | ||
382 | if (so->so_type != SOCK_RAW || | |
383 | so->so_proto->pr_protocol != IPPROTO_ICMPV6) | |
384 | return EOPNOTSUPP; | |
385 | ||
386 | if (!m || (m->m_len != sizeof(int *))) | |
387 | return ENOPROTOOPT; | |
388 | ||
389 | v = mtod(m, int *); | |
390 | if (*v != 1) | |
391 | return ENOPROTOOPT; | |
392 | ||
393 | if (ip6_mrouter != NULL) return EADDRINUSE; | |
394 | ||
395 | ip6_mrouter = so; | |
396 | ip6_mrouter_ver = cmd; | |
397 | ||
398 | bzero((caddr_t)mf6ctable, sizeof(mf6ctable)); | |
399 | bzero((caddr_t)n6expire, sizeof(n6expire)); | |
400 | ||
401 | pim6 = 0;/* used for stubbing out/in pim stuff */ | |
402 | ||
403 | callout_reset(&expire_upcalls_ch, EXPIRE_TIMEOUT, | |
404 | expire_upcalls, NULL); | |
405 | ||
406 | #ifdef MRT6DEBUG | |
407 | if (mrt6debug) | |
408 | log(LOG_DEBUG, "ip6_mrouter_init\n"); | |
409 | #endif | |
410 | ||
411 | return 0; | |
412 | } | |
413 | ||
414 | /* | |
415 | * Disable multicast routing | |
416 | */ | |
417 | int | |
122ebd49 | 418 | ip6_mrouter_done(void) |
984263bc MD |
419 | { |
420 | mifi_t mifi; | |
421 | int i; | |
422 | struct ifnet *ifp; | |
423 | struct in6_ifreq ifr; | |
424 | struct mf6c *rt; | |
425 | struct rtdetq *rte; | |
984263bc | 426 | |
984263bc MD |
427 | /* |
428 | * For each phyint in use, disable promiscuous reception of all IPv6 | |
429 | * multicasts. | |
430 | */ | |
431 | #ifdef INET | |
432 | #ifdef MROUTING | |
433 | /* | |
434 | * If there is still IPv4 multicast routing daemon, | |
435 | * we remain interfaces to receive all muliticasted packets. | |
436 | * XXX: there may be an interface in which the IPv4 multicast | |
437 | * daemon is not interested... | |
438 | */ | |
439 | if (!ip_mrouter) | |
440 | #endif | |
441 | #endif | |
442 | { | |
443 | for (mifi = 0; mifi < nummifs; mifi++) { | |
444 | if (mif6table[mifi].m6_ifp && | |
445 | !(mif6table[mifi].m6_flags & MIFF_REGISTER)) { | |
446 | ifr.ifr_addr.sin6_family = AF_INET6; | |
84204577 | 447 | ifr.ifr_addr.sin6_addr= kin6addr_any; |
984263bc | 448 | ifp = mif6table[mifi].m6_ifp; |
a3dd34d2 | 449 | ifnet_serialize_all(ifp); |
78195a76 MD |
450 | ifp->if_ioctl(ifp, SIOCDELMULTI, |
451 | (caddr_t)&ifr, NULL); | |
a3dd34d2 | 452 | ifnet_deserialize_all(ifp); |
984263bc MD |
453 | } |
454 | } | |
455 | } | |
456 | #ifdef notyet | |
457 | bzero((caddr_t)qtable, sizeof(qtable)); | |
458 | bzero((caddr_t)tbftable, sizeof(tbftable)); | |
459 | #endif | |
460 | bzero((caddr_t)mif6table, sizeof(mif6table)); | |
461 | nummifs = 0; | |
462 | ||
463 | pim6 = 0; /* used to stub out/in pim specific code */ | |
464 | ||
465 | callout_stop(&expire_upcalls_ch); | |
466 | ||
467 | /* | |
468 | * Free all multicast forwarding cache entries. | |
469 | */ | |
470 | for (i = 0; i < MF6CTBLSIZ; i++) { | |
471 | rt = mf6ctable[i]; | |
472 | while (rt) { | |
473 | struct mf6c *frt; | |
474 | ||
475 | for (rte = rt->mf6c_stall; rte != NULL; ) { | |
476 | struct rtdetq *n = rte->next; | |
477 | ||
de99dcea | 478 | m_freem(rte->m); |
efda3bd0 | 479 | kfree(rte, M_MRTABLE); |
984263bc MD |
480 | rte = n; |
481 | } | |
482 | frt = rt; | |
483 | rt = rt->mf6c_next; | |
efda3bd0 | 484 | kfree(frt, M_MRTABLE); |
984263bc MD |
485 | } |
486 | } | |
487 | ||
488 | bzero((caddr_t)mf6ctable, sizeof(mf6ctable)); | |
489 | ||
490 | /* | |
491 | * Reset de-encapsulation cache | |
492 | */ | |
493 | reg_mif_num = -1; | |
494 | ||
495 | ip6_mrouter = NULL; | |
496 | ip6_mrouter_ver = 0; | |
497 | ||
984263bc MD |
498 | #ifdef MRT6DEBUG |
499 | if (mrt6debug) | |
500 | log(LOG_DEBUG, "ip6_mrouter_done\n"); | |
501 | #endif | |
502 | ||
503 | return 0; | |
504 | } | |
505 | ||
506 | static struct sockaddr_in6 sin6 = { sizeof(sin6), AF_INET6 }; | |
507 | ||
508 | /* | |
509 | * Add a mif to the mif table | |
510 | */ | |
511 | static int | |
122ebd49 | 512 | add_m6if(struct mif6ctl *mifcp) |
984263bc MD |
513 | { |
514 | struct mif6 *mifp; | |
515 | struct ifnet *ifp; | |
abf782b3 | 516 | int error; |
984263bc MD |
517 | #ifdef notyet |
518 | struct tbf *m_tbf = tbftable + mifcp->mif6c_mifi; | |
519 | #endif | |
520 | ||
521 | if (mifcp->mif6c_mifi >= MAXMIFS) | |
522 | return EINVAL; | |
523 | mifp = mif6table + mifcp->mif6c_mifi; | |
524 | if (mifp->m6_ifp) | |
525 | return EADDRINUSE; /* XXX: is it appropriate? */ | |
526 | if (mifcp->mif6c_pifi == 0 || mifcp->mif6c_pifi > if_index) | |
527 | return ENXIO; | |
528 | ifp = ifindex2ifnet[mifcp->mif6c_pifi]; | |
529 | ||
530 | if (mifcp->mif6c_flags & MIFF_REGISTER) { | |
531 | if (reg_mif_num == (mifi_t)-1) { | |
3e4a09e7 MD |
532 | strlcpy(multicast_register_if.if_xname, "register_mif", |
533 | IFNAMSIZ); | |
984263bc MD |
534 | multicast_register_if.if_flags |= IFF_LOOPBACK; |
535 | multicast_register_if.if_index = mifcp->mif6c_mifi; | |
536 | reg_mif_num = mifcp->mif6c_mifi; | |
537 | } | |
538 | ||
539 | ifp = &multicast_register_if; | |
540 | ||
541 | } /* if REGISTER */ | |
542 | else { | |
543 | /* Make sure the interface supports multicast */ | |
544 | if ((ifp->if_flags & IFF_MULTICAST) == 0) | |
545 | return EOPNOTSUPP; | |
546 | ||
abf782b3 | 547 | crit_enter(); |
984263bc | 548 | error = if_allmulti(ifp, 1); |
abf782b3 | 549 | crit_exit(); |
984263bc MD |
550 | if (error) |
551 | return error; | |
552 | } | |
553 | ||
abf782b3 | 554 | crit_enter(); |
984263bc MD |
555 | mifp->m6_flags = mifcp->mif6c_flags; |
556 | mifp->m6_ifp = ifp; | |
557 | #ifdef notyet | |
558 | /* scaling up here allows division by 1024 in critical code */ | |
559 | mifp->m6_rate_limit = mifcp->mif6c_rate_limit * 1024 / 1000; | |
560 | #endif | |
561 | /* initialize per mif pkt counters */ | |
562 | mifp->m6_pkt_in = 0; | |
563 | mifp->m6_pkt_out = 0; | |
564 | mifp->m6_bytes_in = 0; | |
565 | mifp->m6_bytes_out = 0; | |
abf782b3 | 566 | crit_exit(); |
984263bc MD |
567 | |
568 | /* Adjust nummifs up if the mifi is higher than nummifs */ | |
569 | if (nummifs <= mifcp->mif6c_mifi) | |
570 | nummifs = mifcp->mif6c_mifi + 1; | |
571 | ||
572 | #ifdef MRT6DEBUG | |
573 | if (mrt6debug) | |
574 | log(LOG_DEBUG, | |
3e4a09e7 | 575 | "add_mif #%d, phyint %s\n", |
984263bc | 576 | mifcp->mif6c_mifi, |
3e4a09e7 | 577 | ifp->if_xname); |
984263bc MD |
578 | #endif |
579 | ||
580 | return 0; | |
581 | } | |
582 | ||
583 | /* | |
584 | * Delete a mif from the mif table | |
585 | */ | |
586 | static int | |
122ebd49 | 587 | del_m6if(mifi_t *mifip) |
984263bc MD |
588 | { |
589 | struct mif6 *mifp = mif6table + *mifip; | |
590 | mifi_t mifi; | |
591 | struct ifnet *ifp; | |
984263bc MD |
592 | |
593 | if (*mifip >= nummifs) | |
594 | return EINVAL; | |
595 | if (mifp->m6_ifp == NULL) | |
596 | return EINVAL; | |
597 | ||
abf782b3 | 598 | crit_enter(); |
984263bc MD |
599 | |
600 | if (!(mifp->m6_flags & MIFF_REGISTER)) { | |
601 | /* | |
602 | * XXX: what if there is yet IPv4 multicast daemon | |
603 | * using the interface? | |
604 | */ | |
605 | ifp = mifp->m6_ifp; | |
606 | ||
607 | if_allmulti(ifp, 0); | |
608 | } | |
609 | ||
610 | #ifdef notyet | |
611 | bzero((caddr_t)qtable[*mifip], sizeof(qtable[*mifip])); | |
612 | bzero((caddr_t)mifp->m6_tbf, sizeof(*(mifp->m6_tbf))); | |
613 | #endif | |
614 | bzero((caddr_t)mifp, sizeof (*mifp)); | |
615 | ||
616 | /* Adjust nummifs down */ | |
617 | for (mifi = nummifs; mifi > 0; mifi--) | |
618 | if (mif6table[mifi - 1].m6_ifp) | |
619 | break; | |
620 | nummifs = mifi; | |
621 | ||
abf782b3 | 622 | crit_exit(); |
984263bc MD |
623 | |
624 | #ifdef MRT6DEBUG | |
625 | if (mrt6debug) | |
626 | log(LOG_DEBUG, "del_m6if %d, nummifs %d\n", *mifip, nummifs); | |
627 | #endif | |
628 | ||
629 | return 0; | |
630 | } | |
631 | ||
632 | /* | |
633 | * Add an mfc entry | |
634 | */ | |
635 | static int | |
122ebd49 | 636 | add_m6fc(struct mf6cctl *mfccp) |
984263bc MD |
637 | { |
638 | struct mf6c *rt; | |
639 | u_long hash; | |
640 | struct rtdetq *rte; | |
641 | u_short nstl; | |
984263bc MD |
642 | |
643 | MF6CFIND(mfccp->mf6cc_origin.sin6_addr, | |
644 | mfccp->mf6cc_mcastgrp.sin6_addr, rt); | |
645 | ||
646 | /* If an entry already exists, just update the fields */ | |
647 | if (rt) { | |
648 | #ifdef MRT6DEBUG | |
649 | if (mrt6debug & DEBUG_MFC) | |
650 | log(LOG_DEBUG, | |
651 | "add_m6fc no upcall h %d o %s g %s p %x\n", | |
652 | ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), | |
653 | ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), | |
654 | mfccp->mf6cc_parent); | |
655 | #endif | |
656 | ||
abf782b3 | 657 | crit_enter(); |
984263bc MD |
658 | rt->mf6c_parent = mfccp->mf6cc_parent; |
659 | rt->mf6c_ifset = mfccp->mf6cc_ifset; | |
abf782b3 | 660 | crit_exit(); |
984263bc MD |
661 | return 0; |
662 | } | |
663 | ||
664 | /* | |
665 | * Find the entry for which the upcall was made and update | |
666 | */ | |
abf782b3 | 667 | crit_enter(); |
984263bc MD |
668 | hash = MF6CHASH(mfccp->mf6cc_origin.sin6_addr, |
669 | mfccp->mf6cc_mcastgrp.sin6_addr); | |
670 | for (rt = mf6ctable[hash], nstl = 0; rt; rt = rt->mf6c_next) { | |
671 | if (IN6_ARE_ADDR_EQUAL(&rt->mf6c_origin.sin6_addr, | |
672 | &mfccp->mf6cc_origin.sin6_addr) && | |
673 | IN6_ARE_ADDR_EQUAL(&rt->mf6c_mcastgrp.sin6_addr, | |
674 | &mfccp->mf6cc_mcastgrp.sin6_addr) && | |
675 | (rt->mf6c_stall != NULL)) { | |
676 | ||
677 | if (nstl++) | |
678 | log(LOG_ERR, | |
679 | "add_m6fc: %s o %s g %s p %x dbx %p\n", | |
680 | "multiple kernel entries", | |
681 | ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), | |
682 | ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), | |
683 | mfccp->mf6cc_parent, rt->mf6c_stall); | |
684 | ||
685 | #ifdef MRT6DEBUG | |
686 | if (mrt6debug & DEBUG_MFC) | |
687 | log(LOG_DEBUG, | |
688 | "add_m6fc o %s g %s p %x dbg %x\n", | |
689 | ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), | |
690 | ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), | |
691 | mfccp->mf6cc_parent, rt->mf6c_stall); | |
692 | #endif | |
693 | ||
694 | rt->mf6c_origin = mfccp->mf6cc_origin; | |
695 | rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp; | |
696 | rt->mf6c_parent = mfccp->mf6cc_parent; | |
697 | rt->mf6c_ifset = mfccp->mf6cc_ifset; | |
698 | /* initialize pkt counters per src-grp */ | |
699 | rt->mf6c_pkt_cnt = 0; | |
700 | rt->mf6c_byte_cnt = 0; | |
701 | rt->mf6c_wrong_if = 0; | |
702 | ||
703 | rt->mf6c_expire = 0; /* Don't clean this guy up */ | |
704 | n6expire[hash]--; | |
705 | ||
706 | /* free packets Qed at the end of this entry */ | |
707 | for (rte = rt->mf6c_stall; rte != NULL; ) { | |
708 | struct rtdetq *n = rte->next; | |
709 | ip6_mdq(rte->m, rte->ifp, rt); | |
710 | m_freem(rte->m); | |
711 | #ifdef UPCALL_TIMING | |
712 | collate(&(rte->t)); | |
713 | #endif /* UPCALL_TIMING */ | |
efda3bd0 | 714 | kfree(rte, M_MRTABLE); |
984263bc MD |
715 | rte = n; |
716 | } | |
717 | rt->mf6c_stall = NULL; | |
718 | } | |
719 | } | |
720 | ||
721 | /* | |
722 | * It is possible that an entry is being inserted without an upcall | |
723 | */ | |
724 | if (nstl == 0) { | |
725 | #ifdef MRT6DEBUG | |
726 | if (mrt6debug & DEBUG_MFC) | |
727 | log(LOG_DEBUG,"add_mfc no upcall h %d o %s g %s p %x\n", | |
728 | hash, | |
729 | ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), | |
730 | ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), | |
731 | mfccp->mf6cc_parent); | |
732 | #endif | |
733 | ||
734 | for (rt = mf6ctable[hash]; rt; rt = rt->mf6c_next) { | |
735 | ||
736 | if (IN6_ARE_ADDR_EQUAL(&rt->mf6c_origin.sin6_addr, | |
737 | &mfccp->mf6cc_origin.sin6_addr)&& | |
738 | IN6_ARE_ADDR_EQUAL(&rt->mf6c_mcastgrp.sin6_addr, | |
739 | &mfccp->mf6cc_mcastgrp.sin6_addr)) { | |
740 | ||
741 | rt->mf6c_origin = mfccp->mf6cc_origin; | |
742 | rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp; | |
743 | rt->mf6c_parent = mfccp->mf6cc_parent; | |
744 | rt->mf6c_ifset = mfccp->mf6cc_ifset; | |
745 | /* initialize pkt counters per src-grp */ | |
746 | rt->mf6c_pkt_cnt = 0; | |
747 | rt->mf6c_byte_cnt = 0; | |
748 | rt->mf6c_wrong_if = 0; | |
749 | ||
750 | if (rt->mf6c_expire) | |
751 | n6expire[hash]--; | |
752 | rt->mf6c_expire = 0; | |
753 | } | |
754 | } | |
755 | if (rt == NULL) { | |
756 | /* no upcall, so make a new entry */ | |
efda3bd0 | 757 | rt = (struct mf6c *)kmalloc(sizeof(*rt), M_MRTABLE, |
984263bc MD |
758 | M_NOWAIT); |
759 | if (rt == NULL) { | |
abf782b3 | 760 | crit_exit(); |
984263bc MD |
761 | return ENOBUFS; |
762 | } | |
763 | ||
764 | /* insert new entry at head of hash chain */ | |
765 | rt->mf6c_origin = mfccp->mf6cc_origin; | |
766 | rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp; | |
767 | rt->mf6c_parent = mfccp->mf6cc_parent; | |
768 | rt->mf6c_ifset = mfccp->mf6cc_ifset; | |
769 | /* initialize pkt counters per src-grp */ | |
770 | rt->mf6c_pkt_cnt = 0; | |
771 | rt->mf6c_byte_cnt = 0; | |
772 | rt->mf6c_wrong_if = 0; | |
773 | rt->mf6c_expire = 0; | |
774 | rt->mf6c_stall = NULL; | |
775 | ||
776 | /* link into table */ | |
777 | rt->mf6c_next = mf6ctable[hash]; | |
778 | mf6ctable[hash] = rt; | |
779 | } | |
780 | } | |
abf782b3 | 781 | crit_exit(); |
984263bc MD |
782 | return 0; |
783 | } | |
784 | ||
785 | #ifdef UPCALL_TIMING | |
786 | /* | |
787 | * collect delay statistics on the upcalls | |
788 | */ | |
789 | static void | |
122ebd49 | 790 | collate(struct timeval *t) |
984263bc MD |
791 | { |
792 | u_long d; | |
793 | struct timeval tp; | |
794 | u_long delta; | |
795 | ||
796 | GET_TIME(tp); | |
797 | ||
798 | if (TV_LT(*t, tp)) | |
799 | { | |
800 | TV_DELTA(tp, *t, delta); | |
801 | ||
802 | d = delta >> 10; | |
803 | if (d > UPCALL_MAX) | |
804 | d = UPCALL_MAX; | |
805 | ||
806 | ++upcall_data[d]; | |
807 | } | |
808 | } | |
809 | #endif /* UPCALL_TIMING */ | |
810 | ||
811 | /* | |
812 | * Delete an mfc entry | |
813 | */ | |
814 | static int | |
122ebd49 | 815 | del_m6fc(struct mf6cctl *mfccp) |
984263bc MD |
816 | { |
817 | struct sockaddr_in6 origin; | |
818 | struct sockaddr_in6 mcastgrp; | |
819 | struct mf6c *rt; | |
820 | struct mf6c **nptr; | |
821 | u_long hash; | |
984263bc MD |
822 | |
823 | origin = mfccp->mf6cc_origin; | |
824 | mcastgrp = mfccp->mf6cc_mcastgrp; | |
825 | hash = MF6CHASH(origin.sin6_addr, mcastgrp.sin6_addr); | |
826 | ||
827 | #ifdef MRT6DEBUG | |
828 | if (mrt6debug & DEBUG_MFC) | |
829 | log(LOG_DEBUG,"del_m6fc orig %s mcastgrp %s\n", | |
830 | ip6_sprintf(&origin.sin6_addr), | |
831 | ip6_sprintf(&mcastgrp.sin6_addr)); | |
832 | #endif | |
833 | ||
abf782b3 | 834 | crit_enter(); |
984263bc MD |
835 | |
836 | nptr = &mf6ctable[hash]; | |
837 | while ((rt = *nptr) != NULL) { | |
838 | if (IN6_ARE_ADDR_EQUAL(&origin.sin6_addr, | |
839 | &rt->mf6c_origin.sin6_addr) && | |
840 | IN6_ARE_ADDR_EQUAL(&mcastgrp.sin6_addr, | |
841 | &rt->mf6c_mcastgrp.sin6_addr) && | |
842 | rt->mf6c_stall == NULL) | |
843 | break; | |
844 | ||
845 | nptr = &rt->mf6c_next; | |
846 | } | |
847 | if (rt == NULL) { | |
abf782b3 | 848 | crit_exit(); |
984263bc MD |
849 | return EADDRNOTAVAIL; |
850 | } | |
851 | ||
852 | *nptr = rt->mf6c_next; | |
efda3bd0 | 853 | kfree(rt, M_MRTABLE); |
984263bc | 854 | |
abf782b3 | 855 | crit_exit(); |
984263bc MD |
856 | |
857 | return 0; | |
858 | } | |
859 | ||
860 | static int | |
e475836d | 861 | socket_send(struct socket *so, struct mbuf *mm, struct sockaddr_in6 *src) |
984263bc | 862 | { |
e475836d MD |
863 | if (so) { |
864 | lwkt_gettoken(&so->so_rcv.ssb_token); | |
865 | if (ssb_appendaddr(&so->so_rcv, | |
984263bc | 866 | (struct sockaddr *)src, |
60233e58 | 867 | mm, NULL) != 0) { |
e475836d MD |
868 | sorwakeup(so); |
869 | lwkt_reltoken(&so->so_rcv.ssb_token); | |
984263bc MD |
870 | return 0; |
871 | } | |
e475836d | 872 | lwkt_reltoken(&so->so_rcv.ssb_token); |
984263bc MD |
873 | } |
874 | m_freem(mm); | |
875 | return -1; | |
876 | } | |
877 | ||
878 | /* | |
879 | * IPv6 multicast forwarding function. This function assumes that the packet | |
880 | * pointed to by "ip6" has arrived on (or is about to be sent to) the interface | |
881 | * pointed to by "ifp", and the packet is to be relayed to other networks | |
882 | * that have members of the packet's destination IPv6 multicast group. | |
883 | * | |
884 | * The packet is returned unscathed to the caller, unless it is | |
885 | * erroneous, in which case a non-zero return value tells the caller to | |
886 | * discard it. | |
887 | */ | |
888 | ||
889 | int | |
122ebd49 | 890 | ip6_mforward(struct ip6_hdr *ip6, struct ifnet *ifp, struct mbuf *m) |
984263bc MD |
891 | { |
892 | struct mf6c *rt; | |
893 | struct mif6 *mifp; | |
894 | struct mbuf *mm; | |
984263bc MD |
895 | mifi_t mifi; |
896 | ||
897 | #ifdef MRT6DEBUG | |
898 | if (mrt6debug & DEBUG_FORWARD) | |
899 | log(LOG_DEBUG, "ip6_mforward: src %s, dst %s, ifindex %d\n", | |
900 | ip6_sprintf(&ip6->ip6_src), ip6_sprintf(&ip6->ip6_dst), | |
901 | ifp->if_index); | |
902 | #endif | |
903 | ||
904 | /* | |
905 | * Don't forward a packet with Hop limit of zero or one, | |
906 | * or a packet destined to a local-only group. | |
907 | */ | |
908 | if (ip6->ip6_hlim <= 1 || IN6_IS_ADDR_MC_NODELOCAL(&ip6->ip6_dst) || | |
909 | IN6_IS_ADDR_MC_LINKLOCAL(&ip6->ip6_dst)) | |
910 | return 0; | |
911 | ip6->ip6_hlim--; | |
912 | ||
913 | /* | |
914 | * Source address check: do not forward packets with unspecified | |
915 | * source. It was discussed in July 2000, on ipngwg mailing list. | |
916 | * This is rather more serious than unicast cases, because some | |
917 | * MLD packets can be sent with the unspecified source address | |
918 | * (although such packets must normally set 1 to the hop limit field). | |
919 | */ | |
920 | if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) { | |
921 | ip6stat.ip6s_cantforward++; | |
cec73927 MD |
922 | if (ip6_log_time + ip6_log_interval < time_uptime) { |
923 | ip6_log_time = time_uptime; | |
984263bc MD |
924 | log(LOG_DEBUG, |
925 | "cannot forward " | |
926 | "from %s to %s nxt %d received on %s\n", | |
927 | ip6_sprintf(&ip6->ip6_src), | |
928 | ip6_sprintf(&ip6->ip6_dst), | |
929 | ip6->ip6_nxt, | |
930 | if_name(m->m_pkthdr.rcvif)); | |
931 | } | |
932 | return 0; | |
933 | } | |
934 | ||
935 | /* | |
936 | * Determine forwarding mifs from the forwarding cache table | |
937 | */ | |
abf782b3 | 938 | crit_enter(); |
984263bc MD |
939 | MF6CFIND(ip6->ip6_src, ip6->ip6_dst, rt); |
940 | ||
941 | /* Entry exists, so forward if necessary */ | |
942 | if (rt) { | |
abf782b3 | 943 | crit_exit(); |
984263bc MD |
944 | return (ip6_mdq(m, ifp, rt)); |
945 | } else { | |
946 | /* | |
947 | * If we don't have a route for packet's origin, | |
948 | * Make a copy of the packet & | |
949 | * send message to routing daemon | |
950 | */ | |
951 | ||
952 | struct mbuf *mb0; | |
953 | struct rtdetq *rte; | |
954 | u_long hash; | |
955 | /* int i, npkts;*/ | |
956 | #ifdef UPCALL_TIMING | |
957 | struct timeval tp; | |
958 | ||
959 | GET_TIME(tp); | |
960 | #endif /* UPCALL_TIMING */ | |
961 | ||
962 | mrt6stat.mrt6s_no_route++; | |
963 | #ifdef MRT6DEBUG | |
964 | if (mrt6debug & (DEBUG_FORWARD | DEBUG_MFC)) | |
965 | log(LOG_DEBUG, "ip6_mforward: no rte s %s g %s\n", | |
966 | ip6_sprintf(&ip6->ip6_src), | |
967 | ip6_sprintf(&ip6->ip6_dst)); | |
968 | #endif | |
969 | ||
970 | /* | |
971 | * Allocate mbufs early so that we don't do extra work if we | |
972 | * are just going to fail anyway. | |
973 | */ | |
efda3bd0 | 974 | rte = (struct rtdetq *)kmalloc(sizeof(*rte), M_MRTABLE, |
984263bc MD |
975 | M_NOWAIT); |
976 | if (rte == NULL) { | |
abf782b3 | 977 | crit_exit(); |
984263bc MD |
978 | return ENOBUFS; |
979 | } | |
980 | mb0 = m_copy(m, 0, M_COPYALL); | |
981 | /* | |
982 | * Pullup packet header if needed before storing it, | |
983 | * as other references may modify it in the meantime. | |
984 | */ | |
985 | if (mb0 && | |
986 | (M_HASCL(mb0) || mb0->m_len < sizeof(struct ip6_hdr))) | |
987 | mb0 = m_pullup(mb0, sizeof(struct ip6_hdr)); | |
988 | if (mb0 == NULL) { | |
efda3bd0 | 989 | kfree(rte, M_MRTABLE); |
abf782b3 | 990 | crit_exit(); |
984263bc MD |
991 | return ENOBUFS; |
992 | } | |
993 | ||
994 | /* is there an upcall waiting for this packet? */ | |
995 | hash = MF6CHASH(ip6->ip6_src, ip6->ip6_dst); | |
996 | for (rt = mf6ctable[hash]; rt; rt = rt->mf6c_next) { | |
997 | if (IN6_ARE_ADDR_EQUAL(&ip6->ip6_src, | |
998 | &rt->mf6c_origin.sin6_addr) && | |
999 | IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, | |
1000 | &rt->mf6c_mcastgrp.sin6_addr) && | |
1001 | (rt->mf6c_stall != NULL)) | |
1002 | break; | |
1003 | } | |
1004 | ||
1005 | if (rt == NULL) { | |
1006 | struct mrt6msg *im; | |
1007 | #ifdef MRT6_OINIT | |
1008 | struct omrt6msg *oim; | |
1009 | #endif | |
1010 | ||
1011 | /* no upcall, so make a new entry */ | |
efda3bd0 | 1012 | rt = (struct mf6c *)kmalloc(sizeof(*rt), M_MRTABLE, |
984263bc MD |
1013 | M_NOWAIT); |
1014 | if (rt == NULL) { | |
efda3bd0 | 1015 | kfree(rte, M_MRTABLE); |
984263bc | 1016 | m_freem(mb0); |
abf782b3 | 1017 | crit_exit(); |
984263bc MD |
1018 | return ENOBUFS; |
1019 | } | |
1020 | /* | |
1021 | * Make a copy of the header to send to the user | |
1022 | * level process | |
1023 | */ | |
1024 | mm = m_copy(mb0, 0, sizeof(struct ip6_hdr)); | |
1025 | ||
1026 | if (mm == NULL) { | |
efda3bd0 | 1027 | kfree(rte, M_MRTABLE); |
984263bc | 1028 | m_freem(mb0); |
efda3bd0 | 1029 | kfree(rt, M_MRTABLE); |
abf782b3 | 1030 | crit_exit(); |
984263bc MD |
1031 | return ENOBUFS; |
1032 | } | |
1033 | ||
1034 | /* | |
1035 | * Send message to routing daemon | |
1036 | */ | |
1037 | sin6.sin6_addr = ip6->ip6_src; | |
1038 | ||
1039 | im = NULL; | |
1040 | #ifdef MRT6_OINIT | |
1041 | oim = NULL; | |
1042 | #endif | |
1043 | switch (ip6_mrouter_ver) { | |
1044 | #ifdef MRT6_OINIT | |
1045 | case MRT6_OINIT: | |
1046 | oim = mtod(mm, struct omrt6msg *); | |
1047 | oim->im6_msgtype = MRT6MSG_NOCACHE; | |
1048 | oim->im6_mbz = 0; | |
1049 | break; | |
1050 | #endif | |
1051 | case MRT6_INIT: | |
1052 | im = mtod(mm, struct mrt6msg *); | |
1053 | im->im6_msgtype = MRT6MSG_NOCACHE; | |
1054 | im->im6_mbz = 0; | |
1055 | break; | |
1056 | default: | |
efda3bd0 | 1057 | kfree(rte, M_MRTABLE); |
984263bc | 1058 | m_freem(mb0); |
efda3bd0 | 1059 | kfree(rt, M_MRTABLE); |
abf782b3 | 1060 | crit_exit(); |
984263bc MD |
1061 | return EINVAL; |
1062 | } | |
1063 | ||
1064 | #ifdef MRT6DEBUG | |
1065 | if (mrt6debug & DEBUG_FORWARD) | |
1066 | log(LOG_DEBUG, | |
1067 | "getting the iif info in the kernel\n"); | |
1068 | #endif | |
1069 | ||
1070 | for (mifp = mif6table, mifi = 0; | |
1071 | mifi < nummifs && mifp->m6_ifp != ifp; | |
1072 | mifp++, mifi++) | |
1073 | ; | |
1074 | ||
1075 | switch (ip6_mrouter_ver) { | |
1076 | #ifdef MRT6_OINIT | |
1077 | case MRT6_OINIT: | |
1078 | oim->im6_mif = mifi; | |
1079 | break; | |
1080 | #endif | |
1081 | case MRT6_INIT: | |
1082 | im->im6_mif = mifi; | |
1083 | break; | |
1084 | } | |
1085 | ||
1086 | if (socket_send(ip6_mrouter, mm, &sin6) < 0) { | |
1087 | log(LOG_WARNING, "ip6_mforward: ip6_mrouter " | |
1088 | "socket queue full\n"); | |
1089 | mrt6stat.mrt6s_upq_sockfull++; | |
efda3bd0 | 1090 | kfree(rte, M_MRTABLE); |
984263bc | 1091 | m_freem(mb0); |
efda3bd0 | 1092 | kfree(rt, M_MRTABLE); |
abf782b3 | 1093 | crit_exit(); |
984263bc MD |
1094 | return ENOBUFS; |
1095 | } | |
1096 | ||
1097 | mrt6stat.mrt6s_upcalls++; | |
1098 | ||
1099 | /* insert new entry at head of hash chain */ | |
1100 | bzero(rt, sizeof(*rt)); | |
1101 | rt->mf6c_origin.sin6_family = AF_INET6; | |
1102 | rt->mf6c_origin.sin6_len = sizeof(struct sockaddr_in6); | |
1103 | rt->mf6c_origin.sin6_addr = ip6->ip6_src; | |
1104 | rt->mf6c_mcastgrp.sin6_family = AF_INET6; | |
1105 | rt->mf6c_mcastgrp.sin6_len = sizeof(struct sockaddr_in6); | |
1106 | rt->mf6c_mcastgrp.sin6_addr = ip6->ip6_dst; | |
1107 | rt->mf6c_expire = UPCALL_EXPIRE; | |
1108 | n6expire[hash]++; | |
1109 | rt->mf6c_parent = MF6C_INCOMPLETE_PARENT; | |
1110 | ||
1111 | /* link into table */ | |
1112 | rt->mf6c_next = mf6ctable[hash]; | |
1113 | mf6ctable[hash] = rt; | |
1114 | /* Add this entry to the end of the queue */ | |
1115 | rt->mf6c_stall = rte; | |
1116 | } else { | |
1117 | /* determine if q has overflowed */ | |
1118 | struct rtdetq **p; | |
1119 | int npkts = 0; | |
1120 | ||
1121 | for (p = &rt->mf6c_stall; *p != NULL; p = &(*p)->next) | |
1122 | if (++npkts > MAX_UPQ6) { | |
1123 | mrt6stat.mrt6s_upq_ovflw++; | |
efda3bd0 | 1124 | kfree(rte, M_MRTABLE); |
984263bc | 1125 | m_freem(mb0); |
abf782b3 | 1126 | crit_exit(); |
984263bc MD |
1127 | return 0; |
1128 | } | |
1129 | ||
1130 | /* Add this entry to the end of the queue */ | |
1131 | *p = rte; | |
1132 | } | |
1133 | ||
1134 | rte->next = NULL; | |
1135 | rte->m = mb0; | |
1136 | rte->ifp = ifp; | |
1137 | #ifdef UPCALL_TIMING | |
1138 | rte->t = tp; | |
1139 | #endif /* UPCALL_TIMING */ | |
1140 | ||
abf782b3 | 1141 | crit_exit(); |
984263bc MD |
1142 | |
1143 | return 0; | |
1144 | } | |
1145 | } | |
1146 | ||
1147 | /* | |
1148 | * Clean up cache entries if upcalls are not serviced | |
1149 | * Call from the Slow Timeout mechanism, every half second. | |
1150 | */ | |
1151 | static void | |
122ebd49 | 1152 | expire_upcalls(void *unused) |
984263bc MD |
1153 | { |
1154 | struct rtdetq *rte; | |
1155 | struct mf6c *mfc, **nptr; | |
1156 | int i; | |
984263bc | 1157 | |
abf782b3 | 1158 | crit_enter(); |
984263bc MD |
1159 | for (i = 0; i < MF6CTBLSIZ; i++) { |
1160 | if (n6expire[i] == 0) | |
1161 | continue; | |
1162 | nptr = &mf6ctable[i]; | |
1163 | while ((mfc = *nptr) != NULL) { | |
1164 | rte = mfc->mf6c_stall; | |
1165 | /* | |
1166 | * Skip real cache entries | |
1167 | * Make sure it wasn't marked to not expire (shouldn't happen) | |
1168 | * If it expires now | |
1169 | */ | |
1170 | if (rte != NULL && | |
1171 | mfc->mf6c_expire != 0 && | |
1172 | --mfc->mf6c_expire == 0) { | |
1173 | #ifdef MRT6DEBUG | |
1174 | if (mrt6debug & DEBUG_EXPIRE) | |
1175 | log(LOG_DEBUG, "expire_upcalls: expiring (%s %s)\n", | |
1176 | ip6_sprintf(&mfc->mf6c_origin.sin6_addr), | |
1177 | ip6_sprintf(&mfc->mf6c_mcastgrp.sin6_addr)); | |
1178 | #endif | |
1179 | /* | |
1180 | * drop all the packets | |
1181 | * free the mbuf with the pkt, if, timing info | |
1182 | */ | |
1183 | do { | |
1184 | struct rtdetq *n = rte->next; | |
1185 | m_freem(rte->m); | |
efda3bd0 | 1186 | kfree(rte, M_MRTABLE); |
984263bc MD |
1187 | rte = n; |
1188 | } while (rte != NULL); | |
1189 | mrt6stat.mrt6s_cache_cleanups++; | |
1190 | n6expire[i]--; | |
1191 | ||
1192 | *nptr = mfc->mf6c_next; | |
efda3bd0 | 1193 | kfree(mfc, M_MRTABLE); |
984263bc MD |
1194 | } else { |
1195 | nptr = &mfc->mf6c_next; | |
1196 | } | |
1197 | } | |
1198 | } | |
abf782b3 | 1199 | crit_exit(); |
984263bc MD |
1200 | callout_reset(&expire_upcalls_ch, EXPIRE_TIMEOUT, |
1201 | expire_upcalls, NULL); | |
1202 | } | |
1203 | ||
1204 | /* | |
1205 | * Packet forwarding routine once entry in the cache is made | |
1206 | */ | |
1207 | static int | |
122ebd49 | 1208 | ip6_mdq(struct mbuf *m, struct ifnet *ifp, struct mf6c *rt) |
984263bc MD |
1209 | { |
1210 | struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); | |
1211 | mifi_t mifi, iif; | |
1212 | struct mif6 *mifp; | |
1213 | int plen = m->m_pkthdr.len; | |
1214 | ||
1215 | /* | |
1216 | * Macro to send packet on mif. Since RSVP packets don't get counted on | |
1217 | * input, they shouldn't get counted on output, so statistics keeping is | |
7a44d1cb | 1218 | * separate. |
984263bc MD |
1219 | */ |
1220 | ||
1221 | #define MC6_SEND(ip6, mifp, m) do { \ | |
1222 | if ((mifp)->m6_flags & MIFF_REGISTER) \ | |
1223 | register_send((ip6), (mifp), (m)); \ | |
1224 | else \ | |
1225 | phyint_send((ip6), (mifp), (m)); \ | |
1226 | } while (0) | |
1227 | ||
1228 | /* | |
1229 | * Don't forward if it didn't arrive from the parent mif | |
1230 | * for its origin. | |
1231 | */ | |
1232 | mifi = rt->mf6c_parent; | |
1233 | if ((mifi >= nummifs) || (mif6table[mifi].m6_ifp != ifp)) { | |
1234 | /* came in the wrong interface */ | |
1235 | #ifdef MRT6DEBUG | |
1236 | if (mrt6debug & DEBUG_FORWARD) | |
1237 | log(LOG_DEBUG, | |
1238 | "wrong if: ifid %d mifi %d mififid %x\n", | |
1239 | ifp->if_index, mifi, | |
1240 | mif6table[mifi].m6_ifp->if_index); | |
1241 | #endif | |
1242 | mrt6stat.mrt6s_wrong_if++; | |
1243 | rt->mf6c_wrong_if++; | |
1244 | /* | |
1245 | * If we are doing PIM processing, and we are forwarding | |
1246 | * packets on this interface, send a message to the | |
1247 | * routing daemon. | |
1248 | */ | |
1249 | /* have to make sure this is a valid mif */ | |
1250 | if (mifi < nummifs && mif6table[mifi].m6_ifp) | |
1251 | if (pim6 && (m->m_flags & M_LOOP) == 0) { | |
1252 | /* | |
1253 | * Check the M_LOOP flag to avoid an | |
1254 | * unnecessary PIM assert. | |
1255 | * XXX: M_LOOP is an ad-hoc hack... | |
1256 | */ | |
1257 | static struct sockaddr_in6 sin6 = | |
1258 | { sizeof(sin6), AF_INET6 }; | |
1259 | ||
1260 | struct mbuf *mm; | |
1261 | struct mrt6msg *im; | |
1262 | #ifdef MRT6_OINIT | |
1263 | struct omrt6msg *oim; | |
1264 | #endif | |
1265 | ||
1266 | mm = m_copy(m, 0, sizeof(struct ip6_hdr)); | |
1267 | if (mm && | |
1268 | (M_HASCL(mm) || | |
1269 | mm->m_len < sizeof(struct ip6_hdr))) | |
1270 | mm = m_pullup(mm, sizeof(struct ip6_hdr)); | |
1271 | if (mm == NULL) | |
1272 | return ENOBUFS; | |
1273 | ||
1274 | #ifdef MRT6_OINIT | |
1275 | oim = NULL; | |
1276 | #endif | |
1277 | im = NULL; | |
1278 | switch (ip6_mrouter_ver) { | |
1279 | #ifdef MRT6_OINIT | |
1280 | case MRT6_OINIT: | |
1281 | oim = mtod(mm, struct omrt6msg *); | |
1282 | oim->im6_msgtype = MRT6MSG_WRONGMIF; | |
1283 | oim->im6_mbz = 0; | |
1284 | break; | |
1285 | #endif | |
1286 | case MRT6_INIT: | |
1287 | im = mtod(mm, struct mrt6msg *); | |
1288 | im->im6_msgtype = MRT6MSG_WRONGMIF; | |
1289 | im->im6_mbz = 0; | |
1290 | break; | |
1291 | default: | |
1292 | m_freem(mm); | |
1293 | return EINVAL; | |
1294 | } | |
1295 | ||
1296 | for (mifp = mif6table, iif = 0; | |
1297 | iif < nummifs && mifp && | |
1298 | mifp->m6_ifp != ifp; | |
1299 | mifp++, iif++) | |
1300 | ; | |
1301 | ||
1302 | switch (ip6_mrouter_ver) { | |
1303 | #ifdef MRT6_OINIT | |
1304 | case MRT6_OINIT: | |
1305 | oim->im6_mif = iif; | |
1306 | sin6.sin6_addr = oim->im6_src; | |
1307 | break; | |
1308 | #endif | |
1309 | case MRT6_INIT: | |
1310 | im->im6_mif = iif; | |
1311 | sin6.sin6_addr = im->im6_src; | |
1312 | break; | |
1313 | } | |
1314 | ||
1315 | mrt6stat.mrt6s_upcalls++; | |
1316 | ||
1317 | if (socket_send(ip6_mrouter, mm, &sin6) < 0) { | |
1318 | #ifdef MRT6DEBUG | |
1319 | if (mrt6debug) | |
1320 | log(LOG_WARNING, "mdq, ip6_mrouter socket queue full\n"); | |
1321 | #endif | |
1322 | ++mrt6stat.mrt6s_upq_sockfull; | |
1323 | return ENOBUFS; | |
1324 | } /* if socket Q full */ | |
1325 | } /* if PIM */ | |
1326 | return 0; | |
1327 | } /* if wrong iif */ | |
1328 | ||
1329 | /* If I sourced this packet, it counts as output, else it was input. */ | |
1330 | if (m->m_pkthdr.rcvif == NULL) { | |
1331 | /* XXX: is rcvif really NULL when output?? */ | |
1332 | mif6table[mifi].m6_pkt_out++; | |
1333 | mif6table[mifi].m6_bytes_out += plen; | |
1334 | } else { | |
1335 | mif6table[mifi].m6_pkt_in++; | |
1336 | mif6table[mifi].m6_bytes_in += plen; | |
1337 | } | |
1338 | rt->mf6c_pkt_cnt++; | |
1339 | rt->mf6c_byte_cnt += plen; | |
1340 | ||
1341 | /* | |
1342 | * For each mif, forward a copy of the packet if there are group | |
1343 | * members downstream on the interface. | |
1344 | */ | |
1345 | for (mifp = mif6table, mifi = 0; mifi < nummifs; mifp++, mifi++) | |
1346 | if (IF_ISSET(mifi, &rt->mf6c_ifset)) { | |
1347 | /* | |
1348 | * check if the outgoing packet is going to break | |
1349 | * a scope boundary. | |
1350 | * XXX For packets through PIM register tunnel | |
1351 | * interface, we believe a routing daemon. | |
1352 | */ | |
1353 | if ((mif6table[rt->mf6c_parent].m6_flags & | |
1354 | MIFF_REGISTER) == 0 && | |
1355 | (mif6table[mifi].m6_flags & MIFF_REGISTER) == 0 && | |
1356 | (in6_addr2scopeid(ifp, &ip6->ip6_dst) != | |
1357 | in6_addr2scopeid(mif6table[mifi].m6_ifp, | |
1358 | &ip6->ip6_dst) || | |
1359 | in6_addr2scopeid(ifp, &ip6->ip6_src) != | |
1360 | in6_addr2scopeid(mif6table[mifi].m6_ifp, | |
1361 | &ip6->ip6_src))) { | |
1362 | ip6stat.ip6s_badscope++; | |
1363 | continue; | |
1364 | } | |
1365 | ||
1366 | mifp->m6_pkt_out++; | |
1367 | mifp->m6_bytes_out += plen; | |
1368 | MC6_SEND(ip6, mifp, m); | |
1369 | } | |
1370 | return 0; | |
1371 | } | |
1372 | ||
1373 | static void | |
122ebd49 | 1374 | phyint_send(struct ip6_hdr *ip6, struct mif6 *mifp, struct mbuf *m) |
984263bc MD |
1375 | { |
1376 | struct mbuf *mb_copy; | |
1377 | struct ifnet *ifp = mifp->m6_ifp; | |
1378 | int error = 0; | |
984263bc MD |
1379 | static struct route_in6 ro; |
1380 | struct in6_multi *in6m; | |
1381 | struct sockaddr_in6 *dst6; | |
1382 | ||
abf782b3 EN |
1383 | crit_enter(); /* needs to protect static "ro" below. */ |
1384 | ||
984263bc MD |
1385 | /* |
1386 | * Make a new reference to the packet; make sure that | |
1387 | * the IPv6 header is actually copied, not just referenced, | |
1388 | * so that ip6_output() only scribbles on the copy. | |
1389 | */ | |
1390 | mb_copy = m_copy(m, 0, M_COPYALL); | |
1391 | if (mb_copy && | |
1392 | (M_HASCL(mb_copy) || mb_copy->m_len < sizeof(struct ip6_hdr))) | |
1393 | mb_copy = m_pullup(mb_copy, sizeof(struct ip6_hdr)); | |
1394 | if (mb_copy == NULL) { | |
abf782b3 | 1395 | crit_exit(); |
984263bc MD |
1396 | return; |
1397 | } | |
1398 | /* set MCAST flag to the outgoing packet */ | |
1399 | mb_copy->m_flags |= M_MCAST; | |
1400 | ||
1401 | /* | |
1402 | * If we sourced the packet, call ip6_output since we may devide | |
1403 | * the packet into fragments when the packet is too big for the | |
1404 | * outgoing interface. | |
1405 | * Otherwise, we can simply send the packet to the interface | |
1406 | * sending queue. | |
1407 | */ | |
1408 | if (m->m_pkthdr.rcvif == NULL) { | |
1409 | struct ip6_moptions im6o; | |
1410 | ||
1411 | im6o.im6o_multicast_ifp = ifp; | |
1412 | /* XXX: ip6_output will override ip6->ip6_hlim */ | |
1413 | im6o.im6o_multicast_hlim = ip6->ip6_hlim; | |
1414 | im6o.im6o_multicast_loop = 1; | |
1415 | error = ip6_output(mb_copy, NULL, &ro, | |
1416 | IPV6_FORWARDING, &im6o, NULL, NULL); | |
1417 | ||
1418 | #ifdef MRT6DEBUG | |
1419 | if (mrt6debug & DEBUG_XMIT) | |
1420 | log(LOG_DEBUG, "phyint_send on mif %d err %d\n", | |
1421 | mifp - mif6table, error); | |
1422 | #endif | |
abf782b3 | 1423 | crit_exit(); |
984263bc MD |
1424 | return; |
1425 | } | |
1426 | ||
1427 | /* | |
1428 | * If we belong to the destination multicast group | |
1429 | * on the outgoing interface, loop back a copy. | |
1430 | */ | |
1431 | dst6 = (struct sockaddr_in6 *)&ro.ro_dst; | |
72659ed0 | 1432 | in6m = IN6_LOOKUP_MULTI(&ip6->ip6_dst, ifp); |
984263bc MD |
1433 | if (in6m != NULL) { |
1434 | dst6->sin6_len = sizeof(struct sockaddr_in6); | |
1435 | dst6->sin6_family = AF_INET6; | |
1436 | dst6->sin6_addr = ip6->ip6_dst; | |
1437 | ip6_mloopback(ifp, m, (struct sockaddr_in6 *)&ro.ro_dst); | |
1438 | } | |
1439 | /* | |
1440 | * Put the packet into the sending queue of the outgoing interface | |
1441 | * if it would fit in the MTU of the interface. | |
1442 | */ | |
1443 | if (mb_copy->m_pkthdr.len <= ifp->if_mtu || ifp->if_mtu < IPV6_MMTU) { | |
1444 | dst6->sin6_len = sizeof(struct sockaddr_in6); | |
1445 | dst6->sin6_family = AF_INET6; | |
1446 | dst6->sin6_addr = ip6->ip6_dst; | |
1447 | /* | |
1448 | * We just call if_output instead of nd6_output here, since | |
1449 | * we need no ND for a multicast forwarded packet...right? | |
1450 | */ | |
9db4b353 | 1451 | error = ifp->if_output(ifp, mb_copy, |
984263bc MD |
1452 | (struct sockaddr *)&ro.ro_dst, NULL); |
1453 | #ifdef MRT6DEBUG | |
1454 | if (mrt6debug & DEBUG_XMIT) | |
1455 | log(LOG_DEBUG, "phyint_send on mif %d err %d\n", | |
1456 | mifp - mif6table, error); | |
1457 | #endif | |
1458 | } else { | |
1459 | #ifdef MULTICAST_PMTUD | |
1460 | icmp6_error(mb_copy, ICMP6_PACKET_TOO_BIG, 0, ifp->if_mtu); | |
1461 | #else | |
1462 | #ifdef MRT6DEBUG | |
1463 | if (mrt6debug & DEBUG_XMIT) | |
1464 | log(LOG_DEBUG, | |
1465 | "phyint_send: packet too big on %s o %s g %s" | |
1466 | " size %d(discarded)\n", | |
1467 | if_name(ifp), | |
1468 | ip6_sprintf(&ip6->ip6_src), | |
1469 | ip6_sprintf(&ip6->ip6_dst), | |
1470 | mb_copy->m_pkthdr.len); | |
1471 | #endif /* MRT6DEBUG */ | |
1472 | m_freem(mb_copy); /* simply discard the packet */ | |
1473 | #endif | |
1474 | } | |
1475 | ||
abf782b3 | 1476 | crit_exit(); |
984263bc MD |
1477 | } |
1478 | ||
1479 | static int | |
122ebd49 | 1480 | register_send(struct ip6_hdr *ip6, struct mif6 *mif, struct mbuf *m) |
984263bc MD |
1481 | { |
1482 | struct mbuf *mm; | |
1483 | int i, len = m->m_pkthdr.len; | |
1484 | static struct sockaddr_in6 sin6 = { sizeof(sin6), AF_INET6 }; | |
1485 | struct mrt6msg *im6; | |
1486 | ||
1487 | #ifdef MRT6DEBUG | |
1488 | if (mrt6debug) | |
1489 | log(LOG_DEBUG, "** IPv6 register_send **\n src %s dst %s\n", | |
1490 | ip6_sprintf(&ip6->ip6_src), ip6_sprintf(&ip6->ip6_dst)); | |
1491 | #endif | |
1492 | ++pim6stat.pim6s_snd_registers; | |
1493 | ||
1494 | /* Make a copy of the packet to send to the user level process */ | |
74f1caca | 1495 | MGETHDR(mm, MB_DONTWAIT, MT_HEADER); |
984263bc MD |
1496 | if (mm == NULL) |
1497 | return ENOBUFS; | |
1498 | mm->m_pkthdr.rcvif = NULL; | |
1499 | mm->m_data += max_linkhdr; | |
1500 | mm->m_len = sizeof(struct ip6_hdr); | |
1501 | ||
1502 | if ((mm->m_next = m_copy(m, 0, M_COPYALL)) == NULL) { | |
1503 | m_freem(mm); | |
1504 | return ENOBUFS; | |
1505 | } | |
1506 | i = MHLEN - M_LEADINGSPACE(mm); | |
1507 | if (i > len) | |
1508 | i = len; | |
1509 | mm = m_pullup(mm, i); | |
1510 | if (mm == NULL) | |
1511 | return ENOBUFS; | |
1512 | /* TODO: check it! */ | |
1513 | mm->m_pkthdr.len = len + sizeof(struct ip6_hdr); | |
1514 | ||
1515 | /* | |
1516 | * Send message to routing daemon | |
1517 | */ | |
1518 | sin6.sin6_addr = ip6->ip6_src; | |
1519 | ||
1520 | im6 = mtod(mm, struct mrt6msg *); | |
1521 | im6->im6_msgtype = MRT6MSG_WHOLEPKT; | |
1522 | im6->im6_mbz = 0; | |
1523 | ||
1524 | im6->im6_mif = mif - mif6table; | |
1525 | ||
1526 | /* iif info is not given for reg. encap.n */ | |
1527 | mrt6stat.mrt6s_upcalls++; | |
1528 | ||
1529 | if (socket_send(ip6_mrouter, mm, &sin6) < 0) { | |
1530 | #ifdef MRT6DEBUG | |
1531 | if (mrt6debug) | |
1532 | log(LOG_WARNING, | |
1533 | "register_send: ip6_mrouter socket queue full\n"); | |
1534 | #endif | |
1535 | ++mrt6stat.mrt6s_upq_sockfull; | |
1536 | return ENOBUFS; | |
1537 | } | |
1538 | return 0; | |
1539 | } | |
1540 | ||
1541 | /* | |
1542 | * PIM sparse mode hook | |
1543 | * Receives the pim control messages, and passes them up to the listening | |
1544 | * socket, using rip6_input. | |
1545 | * The only message processed is the REGISTER pim message; the pim header | |
1546 | * is stripped off, and the inner packet is passed to register_mforward. | |
1547 | */ | |
1548 | int | |
122ebd49 | 1549 | pim6_input(struct mbuf **mp, int *offp, int proto) |
984263bc MD |
1550 | { |
1551 | struct pim *pim; /* pointer to a pim struct */ | |
1552 | struct ip6_hdr *ip6; | |
1553 | int pimlen; | |
1554 | struct mbuf *m = *mp; | |
1555 | int minlen; | |
1556 | int off = *offp; | |
1557 | ||
1558 | ++pim6stat.pim6s_rcv_total; | |
1559 | ||
1560 | ip6 = mtod(m, struct ip6_hdr *); | |
1561 | pimlen = m->m_pkthdr.len - *offp; | |
1562 | ||
1563 | /* | |
1564 | * Validate lengths | |
1565 | */ | |
1566 | if (pimlen < PIM_MINLEN) { | |
1567 | ++pim6stat.pim6s_rcv_tooshort; | |
1568 | #ifdef MRT6DEBUG | |
1569 | if (mrt6debug & DEBUG_PIM) | |
1570 | log(LOG_DEBUG,"pim6_input: PIM packet too short\n"); | |
1571 | #endif | |
1572 | m_freem(m); | |
bde3511a | 1573 | return (IPPROTO_DONE); |
984263bc MD |
1574 | } |
1575 | ||
1576 | /* | |
1577 | * if the packet is at least as big as a REGISTER, go ahead | |
1578 | * and grab the PIM REGISTER header size, to avoid another | |
1579 | * possible m_pullup() later. | |
1580 | * | |
1581 | * PIM_MINLEN == pimhdr + u_int32 == 8 | |
1582 | * PIM6_REG_MINLEN == pimhdr + reghdr + eip6hdr == 4 + 4 + 40 | |
1583 | */ | |
1584 | minlen = (pimlen >= PIM6_REG_MINLEN) ? PIM6_REG_MINLEN : PIM_MINLEN; | |
1585 | ||
1586 | /* | |
1587 | * Make sure that the IP6 and PIM headers in contiguous memory, and | |
1588 | * possibly the PIM REGISTER header | |
1589 | */ | |
1590 | #ifndef PULLDOWN_TEST | |
1591 | IP6_EXTHDR_CHECK(m, off, minlen, IPPROTO_DONE); | |
1592 | /* adjust pointer */ | |
1593 | ip6 = mtod(m, struct ip6_hdr *); | |
1594 | ||
1595 | /* adjust mbuf to point to the PIM header */ | |
1596 | pim = (struct pim *)((caddr_t)ip6 + off); | |
1597 | #else | |
1598 | IP6_EXTHDR_GET(pim, struct pim *, m, off, minlen); | |
1599 | if (pim == NULL) { | |
1600 | pim6stat.pim6s_rcv_tooshort++; | |
1601 | return IPPROTO_DONE; | |
1602 | } | |
1603 | #endif | |
1604 | ||
1605 | #define PIM6_CHECKSUM | |
1606 | #ifdef PIM6_CHECKSUM | |
1607 | { | |
1608 | int cksumlen; | |
1609 | ||
1610 | /* | |
1611 | * Validate checksum. | |
1612 | * If PIM REGISTER, exclude the data packet | |
1613 | */ | |
1614 | if (pim->pim_type == PIM_REGISTER) | |
1615 | cksumlen = PIM_MINLEN; | |
1616 | else | |
1617 | cksumlen = pimlen; | |
1618 | ||
1619 | if (in6_cksum(m, IPPROTO_PIM, off, cksumlen)) { | |
1620 | ++pim6stat.pim6s_rcv_badsum; | |
1621 | #ifdef MRT6DEBUG | |
1622 | if (mrt6debug & DEBUG_PIM) | |
1623 | log(LOG_DEBUG, | |
1624 | "pim6_input: invalid checksum\n"); | |
1625 | #endif | |
1626 | m_freem(m); | |
bde3511a | 1627 | return (IPPROTO_DONE); |
984263bc MD |
1628 | } |
1629 | } | |
1630 | #endif /* PIM_CHECKSUM */ | |
1631 | ||
1632 | /* PIM version check */ | |
1633 | if (pim->pim_ver != PIM_VERSION) { | |
1634 | ++pim6stat.pim6s_rcv_badversion; | |
1635 | #ifdef MRT6DEBUG | |
1636 | log(LOG_ERR, | |
1637 | "pim6_input: incorrect version %d, expecting %d\n", | |
1638 | pim->pim_ver, PIM_VERSION); | |
1639 | #endif | |
1640 | m_freem(m); | |
bde3511a | 1641 | return (IPPROTO_DONE); |
984263bc MD |
1642 | } |
1643 | ||
1644 | if (pim->pim_type == PIM_REGISTER) { | |
1645 | /* | |
1646 | * since this is a REGISTER, we'll make a copy of the register | |
1647 | * headers ip6+pim+u_int32_t+encap_ip6, to be passed up to the | |
1648 | * routing daemon. | |
1649 | */ | |
1650 | static struct sockaddr_in6 dst = { sizeof(dst), AF_INET6 }; | |
1651 | ||
1652 | struct mbuf *mcp; | |
1653 | struct ip6_hdr *eip6; | |
1654 | u_int32_t *reghdr; | |
984263bc MD |
1655 | |
1656 | ++pim6stat.pim6s_rcv_registers; | |
1657 | ||
1658 | if ((reg_mif_num >= nummifs) || (reg_mif_num == (mifi_t) -1)) { | |
1659 | #ifdef MRT6DEBUG | |
1660 | if (mrt6debug & DEBUG_PIM) | |
1661 | log(LOG_DEBUG, | |
1662 | "pim6_input: register mif not set: %d\n", | |
1663 | reg_mif_num); | |
1664 | #endif | |
1665 | m_freem(m); | |
bde3511a | 1666 | return (IPPROTO_DONE); |
984263bc MD |
1667 | } |
1668 | ||
1669 | reghdr = (u_int32_t *)(pim + 1); | |
1670 | ||
1671 | if ((ntohl(*reghdr) & PIM_NULL_REGISTER)) | |
1672 | goto pim6_input_to_daemon; | |
1673 | ||
1674 | /* | |
1675 | * Validate length | |
1676 | */ | |
1677 | if (pimlen < PIM6_REG_MINLEN) { | |
1678 | ++pim6stat.pim6s_rcv_tooshort; | |
1679 | ++pim6stat.pim6s_rcv_badregisters; | |
1680 | #ifdef MRT6DEBUG | |
1681 | log(LOG_ERR, | |
1682 | "pim6_input: register packet size too " | |
1683 | "small %d from %s\n", | |
1684 | pimlen, ip6_sprintf(&ip6->ip6_src)); | |
1685 | #endif | |
1686 | m_freem(m); | |
bde3511a | 1687 | return (IPPROTO_DONE); |
984263bc MD |
1688 | } |
1689 | ||
1690 | eip6 = (struct ip6_hdr *) (reghdr + 1); | |
1691 | #ifdef MRT6DEBUG | |
1692 | if (mrt6debug & DEBUG_PIM) | |
1693 | log(LOG_DEBUG, | |
1694 | "pim6_input[register], eip6: %s -> %s, " | |
1695 | "eip6 plen %d\n", | |
1696 | ip6_sprintf(&eip6->ip6_src), | |
1697 | ip6_sprintf(&eip6->ip6_dst), | |
1698 | ntohs(eip6->ip6_plen)); | |
1699 | #endif | |
1700 | ||
1701 | /* verify the version number of the inner packet */ | |
1702 | if ((eip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) { | |
1703 | ++pim6stat.pim6s_rcv_badregisters; | |
1704 | #ifdef MRT6DEBUG | |
1705 | log(LOG_DEBUG, "pim6_input: invalid IP version (%d) " | |
1706 | "of the inner packet\n", | |
1707 | (eip6->ip6_vfc & IPV6_VERSION)); | |
1708 | #endif | |
1709 | m_freem(m); | |
bde3511a | 1710 | return (IPPROTO_NONE); |
984263bc MD |
1711 | } |
1712 | ||
1713 | /* verify the inner packet is destined to a mcast group */ | |
1714 | if (!IN6_IS_ADDR_MULTICAST(&eip6->ip6_dst)) { | |
1715 | ++pim6stat.pim6s_rcv_badregisters; | |
1716 | #ifdef MRT6DEBUG | |
1717 | if (mrt6debug & DEBUG_PIM) | |
1718 | log(LOG_DEBUG, | |
1719 | "pim6_input: inner packet of register " | |
1720 | "is not multicast %s\n", | |
1721 | ip6_sprintf(&eip6->ip6_dst)); | |
1722 | #endif | |
1723 | m_freem(m); | |
bde3511a | 1724 | return (IPPROTO_DONE); |
984263bc MD |
1725 | } |
1726 | ||
1727 | /* | |
1728 | * make a copy of the whole header to pass to the daemon later. | |
1729 | */ | |
1730 | mcp = m_copy(m, 0, off + PIM6_REG_MINLEN); | |
1731 | if (mcp == NULL) { | |
1732 | #ifdef MRT6DEBUG | |
1733 | log(LOG_ERR, | |
1734 | "pim6_input: pim register: " | |
1735 | "could not copy register head\n"); | |
1736 | #endif | |
1737 | m_freem(m); | |
bde3511a | 1738 | return (IPPROTO_DONE); |
984263bc MD |
1739 | } |
1740 | ||
1741 | /* | |
1742 | * forward the inner ip6 packet; point m_data at the inner ip6. | |
1743 | */ | |
1744 | m_adj(m, off + PIM_MINLEN); | |
1745 | #ifdef MRT6DEBUG | |
1746 | if (mrt6debug & DEBUG_PIM) { | |
1747 | log(LOG_DEBUG, | |
1748 | "pim6_input: forwarding decapsulated register: " | |
1749 | "src %s, dst %s, mif %d\n", | |
1750 | ip6_sprintf(&eip6->ip6_src), | |
1751 | ip6_sprintf(&eip6->ip6_dst), | |
1752 | reg_mif_num); | |
1753 | } | |
1754 | #endif | |
1755 | ||
651d02c5 SZ |
1756 | if_simloop(mif6table[reg_mif_num].m6_ifp, m, |
1757 | dst.sin6_family, 0); | |
984263bc MD |
1758 | |
1759 | /* prepare the register head to send to the mrouting daemon */ | |
1760 | m = mcp; | |
1761 | } | |
1762 | ||
1763 | /* | |
1764 | * Pass the PIM message up to the daemon; if it is a register message | |
1765 | * pass the 'head' only up to the daemon. This includes the | |
1766 | * encapsulator ip6 header, pim header, register header and the | |
1767 | * encapsulated ip6 header. | |
1768 | */ | |
bde3511a | 1769 | pim6_input_to_daemon: |
984263bc | 1770 | rip6_input(&m, offp, proto); |
bde3511a | 1771 | return (IPPROTO_DONE); |
984263bc | 1772 | } |