2005-01-07 01:45:51 +00:00
|
|
|
/*-
|
1994-05-24 10:09:53 +00:00
|
|
|
* Copyright (c) 1988 Stephen Deering.
|
|
|
|
* Copyright (c) 1992, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Stephen Deering of Stanford University.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)igmp.c 8.1 (Berkeley) 7/19/93
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
1994-09-06 22:42:31 +00:00
|
|
|
/*
|
|
|
|
* Internet Group Management Protocol (IGMP) routines.
|
|
|
|
*
|
|
|
|
* Written by Steve Deering, Stanford, May 1988.
|
|
|
|
* Modified by Rosen Sharma, Stanford, Aug 1994.
|
1995-06-13 17:51:16 +00:00
|
|
|
* Modified by Bill Fenner, Xerox PARC, Feb 1995.
|
1996-03-14 16:59:20 +00:00
|
|
|
* Modified to fully comply to IGMPv2 by Bill Fenner, Oct 1995.
|
1994-09-06 22:42:31 +00:00
|
|
|
*
|
1996-03-14 16:59:20 +00:00
|
|
|
* MULTICAST Revision: 3.5.1.4
|
1994-09-06 22:42:31 +00:00
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2002-07-31 16:46:56 +00:00
|
|
|
#include "opt_mac.h"
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
1994-05-25 09:21:21 +00:00
|
|
|
#include <sys/systm.h>
|
2002-07-31 16:46:56 +00:00
|
|
|
#include <sys/mac.h>
|
1997-09-02 01:19:47 +00:00
|
|
|
#include <sys/malloc.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/protosw.h>
|
1995-11-14 20:34:56 +00:00
|
|
|
#include <sys/kernel.h>
|
1995-02-16 00:27:47 +00:00
|
|
|
#include <sys/sysctl.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/ip_var.h>
|
2005-11-18 20:12:40 +00:00
|
|
|
#include <netinet/ip_options.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <netinet/igmp.h>
|
|
|
|
#include <netinet/igmp_var.h>
|
|
|
|
|
2000-05-06 18:19:58 +00:00
|
|
|
#include <machine/in_cksum.h>
|
|
|
|
|
1999-01-18 01:56:31 +00:00
|
|
|
static MALLOC_DEFINE(M_IGMP, "igmp", "igmp state");
|
1997-10-11 18:31:40 +00:00
|
|
|
|
2003-08-20 17:32:17 +00:00
|
|
|
static struct router_info *find_rti(struct ifnet *ifp);
|
|
|
|
static void igmp_sendpkt(struct in_multi *, int, unsigned long);
|
1995-12-02 19:38:06 +00:00
|
|
|
|
1995-12-09 20:43:53 +00:00
|
|
|
static struct igmpstat igmpstat;
|
1994-09-06 22:42:31 +00:00
|
|
|
|
2003-08-20 17:32:17 +00:00
|
|
|
SYSCTL_STRUCT(_net_inet_igmp, IGMPCTL_STATS, stats, CTLFLAG_RW, &igmpstat,
|
|
|
|
igmpstat, "");
|
1995-11-14 20:34:56 +00:00
|
|
|
|
2004-06-11 03:42:37 +00:00
|
|
|
/*
|
|
|
|
* igmp_mtx protects all mutable global variables in igmp.c, as well as
|
|
|
|
* the data fields in struct router_info. In general, a router_info
|
|
|
|
* structure will be valid as long as the referencing struct in_multi is
|
|
|
|
* valid, so no reference counting is used. We allow unlocked reads of
|
|
|
|
* router_info data when accessed via an in_multi read-only.
|
|
|
|
*/
|
|
|
|
static struct mtx igmp_mtx;
|
2003-08-20 17:32:17 +00:00
|
|
|
static SLIST_HEAD(, router_info) router_info_head;
|
1995-06-13 17:51:16 +00:00
|
|
|
static int igmp_timers_are_running;
|
2004-06-11 03:42:37 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* XXXRW: can we define these such that these can be made const? In any
|
|
|
|
* case, these shouldn't be changed after igmp_init() and therefore don't
|
|
|
|
* need locking.
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
static u_long igmp_all_hosts_group;
|
1996-03-14 16:59:20 +00:00
|
|
|
static u_long igmp_all_rtrs_group;
|
2004-06-11 03:42:37 +00:00
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
static struct mbuf *router_alert;
|
2003-08-20 17:32:17 +00:00
|
|
|
static struct route igmprt;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2003-08-20 17:09:01 +00:00
|
|
|
#ifdef IGMP_DEBUG
|
|
|
|
#define IGMP_PRINTF(x) printf(x)
|
|
|
|
#else
|
|
|
|
#define IGMP_PRINTF(x)
|
|
|
|
#endif
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_init(void)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1996-03-14 16:59:20 +00:00
|
|
|
struct ipoption *ra;
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* To avoid byte-swapping the same value over and over again.
|
|
|
|
*/
|
|
|
|
igmp_all_hosts_group = htonl(INADDR_ALLHOSTS_GROUP);
|
1996-03-14 16:59:20 +00:00
|
|
|
igmp_all_rtrs_group = htonl(INADDR_ALLRTRS_GROUP);
|
1995-06-13 17:51:16 +00:00
|
|
|
|
|
|
|
igmp_timers_are_running = 0;
|
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
/*
|
|
|
|
* Construct a Router Alert option to use in outgoing packets
|
|
|
|
*/
|
2003-02-19 05:47:46 +00:00
|
|
|
MGET(router_alert, M_DONTWAIT, MT_DATA);
|
1996-03-14 16:59:20 +00:00
|
|
|
ra = mtod(router_alert, struct ipoption *);
|
|
|
|
ra->ipopt_dst.s_addr = 0;
|
|
|
|
ra->ipopt_list[0] = IPOPT_RA; /* Router Alert Option */
|
|
|
|
ra->ipopt_list[1] = 0x04; /* 4 bytes long */
|
|
|
|
ra->ipopt_list[2] = 0x00;
|
|
|
|
ra->ipopt_list[3] = 0x00;
|
|
|
|
router_alert->m_len = sizeof(ra->ipopt_dst) + ra->ipopt_list[1];
|
1994-09-06 22:42:31 +00:00
|
|
|
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_init(&igmp_mtx, "igmp_mtx", NULL, MTX_DEF);
|
2003-08-20 17:09:01 +00:00
|
|
|
SLIST_INIT(&router_info_head);
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|
|
|
|
|
1995-12-09 20:43:53 +00:00
|
|
|
static struct router_info *
|
2003-08-20 17:32:17 +00:00
|
|
|
find_rti(struct ifnet *ifp)
|
1994-09-06 22:42:31 +00:00
|
|
|
{
|
2003-08-20 17:09:01 +00:00
|
|
|
struct router_info *rti;
|
1994-09-06 22:42:31 +00:00
|
|
|
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_assert(&igmp_mtx, MA_OWNED);
|
2003-08-20 17:09:01 +00:00
|
|
|
IGMP_PRINTF("[igmp.c, _find_rti] --> entering \n");
|
|
|
|
SLIST_FOREACH(rti, &router_info_head, rti_list) {
|
|
|
|
if (rti->rti_ifp == ifp) {
|
|
|
|
IGMP_PRINTF(
|
|
|
|
"[igmp.c, _find_rti] --> found old entry \n");
|
2003-08-20 17:32:17 +00:00
|
|
|
return rti;
|
|
|
|
}
|
|
|
|
}
|
1999-01-18 01:56:31 +00:00
|
|
|
MALLOC(rti, struct router_info *, sizeof *rti, M_IGMP, M_NOWAIT);
|
2005-03-26 22:20:22 +00:00
|
|
|
if (rti == NULL) {
|
|
|
|
IGMP_PRINTF( "[igmp.c, _find_rti] --> no memory for entry\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2003-08-20 17:32:17 +00:00
|
|
|
rti->rti_ifp = ifp;
|
|
|
|
rti->rti_type = IGMP_V2_ROUTER;
|
|
|
|
rti->rti_time = 0;
|
2003-08-20 17:09:01 +00:00
|
|
|
SLIST_INSERT_HEAD(&router_info_head, rti, rti_list);
|
|
|
|
|
|
|
|
IGMP_PRINTF("[igmp.c, _find_rti] --> created an entry \n");
|
2003-08-20 17:32:17 +00:00
|
|
|
return rti;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_input(register struct mbuf *m, int off)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2002-11-20 19:00:54 +00:00
|
|
|
register int iphlen = off;
|
|
|
|
register struct igmp *igmp;
|
|
|
|
register struct ip *ip;
|
|
|
|
register int igmplen;
|
|
|
|
register struct ifnet *ifp = m->m_pkthdr.rcvif;
|
|
|
|
register int minlen;
|
|
|
|
register struct in_multi *inm;
|
|
|
|
register struct in_ifaddr *ia;
|
1994-05-24 10:09:53 +00:00
|
|
|
struct in_multistep step;
|
1994-09-06 22:42:31 +00:00
|
|
|
struct router_info *rti;
|
1995-05-16 01:28:29 +00:00
|
|
|
int timer; /** timer value in the igmp query header **/
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
++igmpstat.igps_rcv_total;
|
|
|
|
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
igmplen = ip->ip_len;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Validate lengths
|
|
|
|
*/
|
|
|
|
if (igmplen < IGMP_MINLEN) {
|
|
|
|
++igmpstat.igps_rcv_tooshort;
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
minlen = iphlen + IGMP_MINLEN;
|
|
|
|
if ((m->m_flags & M_EXT || m->m_len < minlen) &&
|
|
|
|
(m = m_pullup(m, minlen)) == 0) {
|
|
|
|
++igmpstat.igps_rcv_tooshort;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Validate checksum
|
|
|
|
*/
|
|
|
|
m->m_data += iphlen;
|
|
|
|
m->m_len -= iphlen;
|
|
|
|
igmp = mtod(m, struct igmp *);
|
|
|
|
if (in_cksum(m, igmplen)) {
|
|
|
|
++igmpstat.igps_rcv_badsum;
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
m->m_data -= iphlen;
|
|
|
|
m->m_len += iphlen;
|
1994-09-06 22:42:31 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
ip = mtod(m, struct ip *);
|
1995-05-16 01:28:29 +00:00
|
|
|
timer = igmp->igmp_code * PR_FASTHZ / IGMP_TIMER_SCALE;
|
1998-12-12 21:45:49 +00:00
|
|
|
if (timer == 0)
|
|
|
|
timer = 1;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
/*
|
|
|
|
* In the IGMPv2 specification, there are 3 states and a flag.
|
|
|
|
*
|
|
|
|
* In Non-Member state, we simply don't have a membership record.
|
|
|
|
* In Delaying Member state, our timer is running (inm->inm_timer)
|
|
|
|
* In Idle Member state, our timer is not running (inm->inm_timer==0)
|
|
|
|
*
|
|
|
|
* The flag is inm->inm_state, it is set to IGMP_OTHERMEMBER if
|
|
|
|
* we have heard a report from another member, or IGMP_IREPORTEDLAST
|
|
|
|
* if I sent the last report.
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
switch (igmp->igmp_type) {
|
1996-03-14 16:59:20 +00:00
|
|
|
case IGMP_MEMBERSHIP_QUERY:
|
1994-05-24 10:09:53 +00:00
|
|
|
++igmpstat.igps_rcv_queries;
|
|
|
|
|
1995-04-26 18:10:58 +00:00
|
|
|
if (ifp->if_flags & IFF_LOOPBACK)
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
1994-09-06 22:42:31 +00:00
|
|
|
if (igmp->igmp_code == 0) {
|
1996-03-14 16:59:20 +00:00
|
|
|
/*
|
|
|
|
* Old router. Remember that the querier on this
|
|
|
|
* interface is old, and set the timer to the
|
|
|
|
* value in RFC 1112.
|
|
|
|
*/
|
1994-10-31 06:36:47 +00:00
|
|
|
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_lock(&igmp_mtx);
|
|
|
|
rti = find_rti(ifp);
|
2005-03-26 22:20:22 +00:00
|
|
|
if (rti == NULL) {
|
|
|
|
mtx_unlock(&igmp_mtx);
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
|
|
|
}
|
1996-03-14 16:59:20 +00:00
|
|
|
rti->rti_type = IGMP_V1_ROUTER;
|
|
|
|
rti->rti_time = 0;
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_unlock(&igmp_mtx);
|
1994-10-31 06:36:47 +00:00
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
timer = IGMP_MAX_HOST_REPORT_DELAY * PR_FASTHZ;
|
1994-10-31 06:36:47 +00:00
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
if (ip->ip_dst.s_addr != igmp_all_hosts_group ||
|
|
|
|
igmp->igmp_group.s_addr != 0) {
|
1994-09-06 22:42:31 +00:00
|
|
|
++igmpstat.igps_rcv_badqueries;
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
|
|
|
}
|
1996-03-14 16:59:20 +00:00
|
|
|
} else {
|
1994-09-06 22:42:31 +00:00
|
|
|
/*
|
1996-03-14 16:59:20 +00:00
|
|
|
* New router. Simply do the new validity check.
|
1994-09-06 22:42:31 +00:00
|
|
|
*/
|
1996-03-14 16:59:20 +00:00
|
|
|
|
|
|
|
if (igmp->igmp_group.s_addr != 0 &&
|
|
|
|
!IN_MULTICAST(ntohl(igmp->igmp_group.s_addr))) {
|
|
|
|
++igmpstat.igps_rcv_badqueries;
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|
1996-03-14 16:59:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* - Start the timers in all of our membership records
|
|
|
|
* that the query applies to for the interface on
|
|
|
|
* which the query arrived excl. those that belong
|
|
|
|
* to the "all-hosts" group (224.0.0.1).
|
|
|
|
* - Restart any timer that is already running but has
|
|
|
|
* a value longer than the requested timeout.
|
|
|
|
* - Use the value specified in the query message as
|
|
|
|
* the maximum timeout.
|
|
|
|
*/
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK();
|
1996-03-14 16:59:20 +00:00
|
|
|
IN_FIRST_MULTI(step, inm);
|
|
|
|
while (inm != NULL) {
|
1995-06-13 17:51:16 +00:00
|
|
|
if (inm->inm_ifp == ifp &&
|
1996-03-14 16:59:20 +00:00
|
|
|
inm->inm_addr.s_addr != igmp_all_hosts_group &&
|
|
|
|
(igmp->igmp_group.s_addr == 0 ||
|
|
|
|
igmp->igmp_group.s_addr == inm->inm_addr.s_addr)) {
|
|
|
|
if (inm->inm_timer == 0 ||
|
|
|
|
inm->inm_timer > timer) {
|
|
|
|
inm->inm_timer =
|
|
|
|
IGMP_RANDOM_DELAY(timer);
|
|
|
|
igmp_timers_are_running = 1;
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
IN_NEXT_MULTI(step, inm);
|
|
|
|
}
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
1995-06-13 17:51:16 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
case IGMP_V1_MEMBERSHIP_REPORT:
|
|
|
|
case IGMP_V2_MEMBERSHIP_REPORT:
|
1995-06-13 17:51:16 +00:00
|
|
|
/*
|
1996-03-14 16:59:20 +00:00
|
|
|
* For fast leave to work, we have to know that we are the
|
|
|
|
* last person to send a report for this group. Reports
|
|
|
|
* can potentially get looped back if we are a multicast
|
|
|
|
* router, so discard reports sourced by me.
|
1995-06-13 17:51:16 +00:00
|
|
|
*/
|
1996-03-14 16:59:20 +00:00
|
|
|
IFP_TO_IA(ifp, ia);
|
|
|
|
if (ia && ip->ip_src.s_addr == IA_SIN(ia)->sin_addr.s_addr)
|
|
|
|
break;
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
++igmpstat.igps_rcv_reports;
|
|
|
|
|
1995-04-26 18:10:58 +00:00
|
|
|
if (ifp->if_flags & IFF_LOOPBACK)
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
if (!IN_MULTICAST(ntohl(igmp->igmp_group.s_addr))) {
|
1994-05-24 10:09:53 +00:00
|
|
|
++igmpstat.igps_rcv_badreports;
|
|
|
|
m_freem(m);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* KLUDGE: if the IP source address of the report has an
|
|
|
|
* unspecified (i.e., zero) subnet number, as is allowed for
|
|
|
|
* a booting host, replace it with the correct subnet number
|
2002-05-12 00:22:38 +00:00
|
|
|
* so that a process-level multicast routing daemon can
|
1994-05-24 10:09:53 +00:00
|
|
|
* determine which subnet it arrived from. This is necessary
|
|
|
|
* to compensate for the lack of any way for a process to
|
|
|
|
* determine the arrival interface of an incoming packet.
|
|
|
|
*/
|
1996-03-14 16:59:20 +00:00
|
|
|
if ((ntohl(ip->ip_src.s_addr) & IN_CLASSA_NET) == 0)
|
1994-05-24 10:09:53 +00:00
|
|
|
if (ia) ip->ip_src.s_addr = htonl(ia->ia_subnet);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we belong to the group being reported, stop
|
|
|
|
* our timer for that group.
|
|
|
|
*/
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK();
|
1994-05-24 10:09:53 +00:00
|
|
|
IN_LOOKUP_MULTI(igmp->igmp_group, ifp, inm);
|
1994-09-06 22:42:31 +00:00
|
|
|
if (inm != NULL) {
|
1996-03-14 16:59:20 +00:00
|
|
|
inm->inm_timer = 0;
|
|
|
|
++igmpstat.igps_rcv_ourreports;
|
1994-09-06 22:42:31 +00:00
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
inm->inm_state = IGMP_OTHERMEMBER;
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
1996-03-14 16:59:20 +00:00
|
|
|
|
|
|
|
break;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Pass all valid IGMP packets up to any process(es) listening
|
|
|
|
* on a raw IGMP socket.
|
|
|
|
*/
|
2001-09-03 20:40:35 +00:00
|
|
|
rip_input(m, off);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_joingroup(struct in_multi *inm)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
|
|
|
|
IN_MULTI_LOCK_ASSERT();
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
if (inm->inm_addr.s_addr == igmp_all_hosts_group
|
|
|
|
|| inm->inm_ifp->if_flags & IFF_LOOPBACK) {
|
1994-05-24 10:09:53 +00:00
|
|
|
inm->inm_timer = 0;
|
1996-03-14 16:59:20 +00:00
|
|
|
inm->inm_state = IGMP_OTHERMEMBER;
|
|
|
|
} else {
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_lock(&igmp_mtx);
|
1996-03-14 16:59:20 +00:00
|
|
|
inm->inm_rti = find_rti(inm->inm_ifp);
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_unlock(&igmp_mtx);
|
2005-03-26 22:20:22 +00:00
|
|
|
if (inm->inm_rti != NULL) {
|
|
|
|
igmp_sendpkt(inm, inm->inm_rti->rti_type, 0);
|
|
|
|
inm->inm_timer = IGMP_RANDOM_DELAY(
|
1994-09-06 22:42:31 +00:00
|
|
|
IGMP_MAX_HOST_REPORT_DELAY*PR_FASTHZ);
|
2005-03-26 22:20:22 +00:00
|
|
|
inm->inm_state = IGMP_IREPORTEDLAST;
|
|
|
|
igmp_timers_are_running = 1;
|
|
|
|
}
|
|
|
|
/* XXX handling of failure case? */
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_leavegroup(struct in_multi *inm)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-08-20 17:32:17 +00:00
|
|
|
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK_ASSERT();
|
|
|
|
|
1996-03-14 16:59:20 +00:00
|
|
|
if (inm->inm_state == IGMP_IREPORTEDLAST &&
|
|
|
|
inm->inm_addr.s_addr != igmp_all_hosts_group &&
|
|
|
|
!(inm->inm_ifp->if_flags & IFF_LOOPBACK) &&
|
|
|
|
inm->inm_rti->rti_type != IGMP_V1_ROUTER)
|
|
|
|
igmp_sendpkt(inm, IGMP_V2_LEAVE_GROUP, igmp_all_rtrs_group);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_fasttimo(void)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2002-11-20 19:00:54 +00:00
|
|
|
register struct in_multi *inm;
|
1994-05-24 10:09:53 +00:00
|
|
|
struct in_multistep step;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Quick check to see if any work needs to be done, in order
|
|
|
|
* to minimize the overhead of fasttimo processing.
|
|
|
|
*/
|
1995-06-13 17:51:16 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (!igmp_timers_are_running)
|
|
|
|
return;
|
|
|
|
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK();
|
1994-05-24 10:09:53 +00:00
|
|
|
igmp_timers_are_running = 0;
|
|
|
|
IN_FIRST_MULTI(step, inm);
|
|
|
|
while (inm != NULL) {
|
|
|
|
if (inm->inm_timer == 0) {
|
|
|
|
/* do nothing */
|
|
|
|
} else if (--inm->inm_timer == 0) {
|
1996-03-14 16:59:20 +00:00
|
|
|
igmp_sendpkt(inm, inm->inm_rti->rti_type, 0);
|
|
|
|
inm->inm_state = IGMP_IREPORTEDLAST;
|
1994-05-24 10:09:53 +00:00
|
|
|
} else {
|
|
|
|
igmp_timers_are_running = 1;
|
|
|
|
}
|
|
|
|
IN_NEXT_MULTI(step, inm);
|
|
|
|
}
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_UNLOCK();
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
1994-09-06 22:42:31 +00:00
|
|
|
void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_slowtimo(void)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2003-08-20 17:09:01 +00:00
|
|
|
struct router_info *rti;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2003-08-20 17:09:01 +00:00
|
|
|
IGMP_PRINTF("[igmp.c,_slowtimo] -- > entering \n");
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_lock(&igmp_mtx);
|
2003-08-20 17:09:01 +00:00
|
|
|
SLIST_FOREACH(rti, &router_info_head, rti_list) {
|
2003-08-20 17:32:17 +00:00
|
|
|
if (rti->rti_type == IGMP_V1_ROUTER) {
|
|
|
|
rti->rti_time++;
|
|
|
|
if (rti->rti_time >= IGMP_AGE_THRESHOLD)
|
|
|
|
rti->rti_type = IGMP_V2_ROUTER;
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|
|
|
|
}
|
2004-06-11 03:42:37 +00:00
|
|
|
mtx_unlock(&igmp_mtx);
|
2003-08-20 17:09:01 +00:00
|
|
|
IGMP_PRINTF("[igmp.c,_slowtimo] -- > exiting \n");
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2003-08-20 17:32:17 +00:00
|
|
|
igmp_sendpkt(struct in_multi *inm, int type, unsigned long addr)
|
1994-09-06 22:42:31 +00:00
|
|
|
{
|
2003-08-20 17:32:17 +00:00
|
|
|
struct mbuf *m;
|
|
|
|
struct igmp *igmp;
|
|
|
|
struct ip *ip;
|
|
|
|
struct ip_moptions imo;
|
1994-09-06 22:42:31 +00:00
|
|
|
|
Introduce in_multi_mtx, which will protect IPv4-layer multicast address
lists, as well as accessor macros. For now, this is a recursive mutex
due code sequences where IPv4 multicast calls into IGMP calls into
ip_output(), which then tests for a multicast forwarding case.
For support macros in in_var.h to check multicast address lists, assert
that in_multi_mtx is held.
Acquire in_multi_mtx around iteration over the IPv4 multicast address
lists, such as in ip_input() and ip_output().
Acquire in_multi_mtx when manipulating the IPv4 layer multicast addresses,
as well as over the manipulation of ifnet multicast address lists in order
to keep the two layers in sync.
Lock down accesses to IPv4 multicast addresses in IGMP, or assert the
lock when performing IGMP join/leave events.
Eliminate spl's associated with IPv4 multicast addresses, portions of
IGMP that weren't previously expunged by IGMP locking.
Add in_multi_mtx, igmp_mtx, and if_addr_mtx lock order to hard-coded
lock order in WITNESS, in that order.
Problem reported by: Ed Maste <emaste at phaedrus dot sandvine dot ca>
MFC after: 10 days
2005-08-03 19:29:47 +00:00
|
|
|
IN_MULTI_LOCK_ASSERT();
|
|
|
|
|
2005-11-02 13:46:32 +00:00
|
|
|
MGETHDR(m, M_DONTWAIT, MT_DATA);
|
2003-08-20 17:32:17 +00:00
|
|
|
if (m == NULL)
|
|
|
|
return;
|
1994-09-06 22:42:31 +00:00
|
|
|
|
1995-04-26 18:10:58 +00:00
|
|
|
m->m_pkthdr.rcvif = loif;
|
2002-07-31 16:46:56 +00:00
|
|
|
#ifdef MAC
|
|
|
|
mac_create_mbuf_linklayer(inm->inm_ifp, m);
|
|
|
|
#endif
|
1994-09-06 22:42:31 +00:00
|
|
|
m->m_pkthdr.len = sizeof(struct ip) + IGMP_MINLEN;
|
|
|
|
MH_ALIGN(m, IGMP_MINLEN + sizeof(struct ip));
|
|
|
|
m->m_data += sizeof(struct ip);
|
2003-08-20 17:32:17 +00:00
|
|
|
m->m_len = IGMP_MINLEN;
|
|
|
|
igmp = mtod(m, struct igmp *);
|
|
|
|
igmp->igmp_type = type;
|
|
|
|
igmp->igmp_code = 0;
|
|
|
|
igmp->igmp_group = inm->inm_addr;
|
|
|
|
igmp->igmp_cksum = 0;
|
|
|
|
igmp->igmp_cksum = in_cksum(m, IGMP_MINLEN);
|
|
|
|
|
|
|
|
m->m_data -= sizeof(struct ip);
|
|
|
|
m->m_len += sizeof(struct ip);
|
|
|
|
ip = mtod(m, struct ip *);
|
|
|
|
ip->ip_tos = 0;
|
|
|
|
ip->ip_len = sizeof(struct ip) + IGMP_MINLEN;
|
|
|
|
ip->ip_off = 0;
|
|
|
|
ip->ip_p = IPPROTO_IGMP;
|
|
|
|
ip->ip_src.s_addr = INADDR_ANY;
|
|
|
|
ip->ip_dst.s_addr = addr ? addr : igmp->igmp_group.s_addr;
|
|
|
|
|
|
|
|
imo.imo_multicast_ifp = inm->inm_ifp;
|
|
|
|
imo.imo_multicast_ttl = 1;
|
1996-04-18 15:41:11 +00:00
|
|
|
imo.imo_multicast_vif = -1;
|
2003-08-20 17:32:17 +00:00
|
|
|
/*
|
|
|
|
* Request loopback of the report if we are acting as a multicast
|
|
|
|
* router, so that the process-level routing daemon can hear it.
|
|
|
|
*/
|
|
|
|
imo.imo_multicast_loop = (ip_mrouter != NULL);
|
1994-09-06 22:42:31 +00:00
|
|
|
|
1996-04-18 15:41:11 +00:00
|
|
|
/*
|
|
|
|
* XXX
|
|
|
|
* Do we have to worry about reentrancy here? Don't think so.
|
|
|
|
*/
|
2003-08-20 17:32:17 +00:00
|
|
|
ip_output(m, router_alert, &igmprt, 0, &imo, NULL);
|
1994-09-06 22:42:31 +00:00
|
|
|
|
2003-08-20 17:32:17 +00:00
|
|
|
++igmpstat.igps_snd_reports;
|
1994-09-06 22:42:31 +00:00
|
|
|
}
|