1 /* $FreeBSD: src/sys/netinet6/ip6_mroute.c,v 1.2.2.9 2003/01/23 21:06:47 sam Exp $ */ 2 /* $DragonFly: src/sys/netinet6/ip6_mroute.c,v 1.18 2008/06/21 12:30:19 aggelos Exp $ */ 3 /* $KAME: ip6_mroute.c,v 1.58 2001/12/18 02:36:31 itojun Exp $ */ 4 5 /* 6 * Copyright (C) 1998 WIDE Project. 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the project nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 /* BSDI ip_mroute.c,v 2.10 1996/11/14 00:29:52 jch Exp */ 35 36 /* 37 * IP multicast forwarding procedures 38 * 39 * Written by David Waitzman, BBN Labs, August 1988. 40 * Modified by Steve Deering, Stanford, February 1989. 41 * Modified by Mark J. Steiglitz, Stanford, May, 1991 42 * Modified by Van Jacobson, LBL, January 1993 43 * Modified by Ajit Thyagarajan, PARC, August 1993 44 * Modified by Bill Fenenr, PARC, April 1994 45 * 46 * MROUTING Revision: 3.5.1.2 + PIM-SMv2 (pimd) Support 47 */ 48 49 #include "opt_inet.h" 50 #include "opt_inet6.h" 51 52 #include <sys/param.h> 53 #include <sys/systm.h> 54 #include <sys/callout.h> 55 #include <sys/malloc.h> 56 #include <sys/mbuf.h> 57 #include <sys/socket.h> 58 #include <sys/socketvar.h> 59 #include <sys/sockio.h> 60 #include <sys/protosw.h> 61 #include <sys/errno.h> 62 #include <sys/time.h> 63 #include <sys/kernel.h> 64 #include <sys/syslog.h> 65 #include <sys/thread2.h> 66 67 #include <net/if.h> 68 #include <net/route.h> 69 #include <net/raw_cb.h> 70 71 #include <netinet/in.h> 72 #include <netinet/in_var.h> 73 74 #include <netinet/ip6.h> 75 #include <netinet6/ip6_var.h> 76 #include <netinet6/ip6_mroute.h> 77 #include <netinet6/pim6.h> 78 #include <netinet6/pim6_var.h> 79 80 #include <net/net_osdep.h> 81 82 static MALLOC_DEFINE(M_MRTABLE, "mf6c", "multicast forwarding cache entry"); 83 84 #define M_HASCL(m) ((m)->m_flags & M_EXT) 85 86 static int ip6_mdq (struct mbuf *, struct ifnet *, struct mf6c *); 87 static void phyint_send (struct ip6_hdr *, struct mif6 *, struct mbuf *); 88 89 static int set_pim6 (int *); 90 static int socket_send (struct socket *, struct mbuf *, 91 struct sockaddr_in6 *); 92 static int register_send (struct ip6_hdr *, struct mif6 *, 93 struct mbuf *); 94 95 /* 96 * Globals. All but ip6_mrouter, ip6_mrtproto and mrt6stat could be static, 97 * except for netstat or debugging purposes. 98 */ 99 struct socket *ip6_mrouter = NULL; 100 int ip6_mrouter_ver = 0; 101 int ip6_mrtproto = IPPROTO_PIM; /* for netstat only */ 102 struct mrt6stat mrt6stat; 103 104 #define NO_RTE_FOUND 0x1 105 #define RTE_FOUND 0x2 106 107 struct mf6c *mf6ctable[MF6CTBLSIZ]; 108 u_char n6expire[MF6CTBLSIZ]; 109 static struct mif6 mif6table[MAXMIFS]; 110 #ifdef MRT6DEBUG 111 u_int mrt6debug = 0; /* debug level */ 112 #define DEBUG_MFC 0x02 113 #define DEBUG_FORWARD 0x04 114 #define DEBUG_EXPIRE 0x08 115 #define DEBUG_XMIT 0x10 116 #define DEBUG_REG 0x20 117 #define DEBUG_PIM 0x40 118 #endif 119 120 static void expire_upcalls (void *); 121 #define EXPIRE_TIMEOUT (hz / 4) /* 4x / second */ 122 #define UPCALL_EXPIRE 6 /* number of timeouts */ 123 124 #ifdef INET 125 #ifdef MROUTING 126 extern struct socket *ip_mrouter; 127 #endif 128 #endif 129 130 /* 131 * 'Interfaces' associated with decapsulator (so we can tell 132 * packets that went through it from ones that get reflected 133 * by a broken gateway). These interfaces are never linked into 134 * the system ifnet list & no routes point to them. I.e., packets 135 * can't be sent this way. They only exist as a placeholder for 136 * multicast source verification. 137 */ 138 struct ifnet multicast_register_if; 139 140 #define ENCAP_HOPS 64 141 142 /* 143 * Private variables. 144 */ 145 static mifi_t nummifs = 0; 146 static mifi_t reg_mif_num = (mifi_t)-1; 147 148 static struct pim6stat pim6stat; 149 static int pim6; 150 151 /* 152 * Hash function for a source, group entry 153 */ 154 #define MF6CHASH(a, g) MF6CHASHMOD((a).s6_addr32[0] ^ (a).s6_addr32[1] ^ \ 155 (a).s6_addr32[2] ^ (a).s6_addr32[3] ^ \ 156 (g).s6_addr32[0] ^ (g).s6_addr32[1] ^ \ 157 (g).s6_addr32[2] ^ (g).s6_addr32[3]) 158 159 /* 160 * Find a route for a given origin IPv6 address and Multicast group address. 161 * Quality of service parameter to be added in the future!!! 162 */ 163 164 #define MF6CFIND(o, g, rt) do { \ 165 struct mf6c *_rt = mf6ctable[MF6CHASH(o,g)]; \ 166 rt = NULL; \ 167 mrt6stat.mrt6s_mfc_lookups++; \ 168 while (_rt) { \ 169 if (IN6_ARE_ADDR_EQUAL(&_rt->mf6c_origin.sin6_addr, &(o)) && \ 170 IN6_ARE_ADDR_EQUAL(&_rt->mf6c_mcastgrp.sin6_addr, &(g)) && \ 171 (_rt->mf6c_stall == NULL)) { \ 172 rt = _rt; \ 173 break; \ 174 } \ 175 _rt = _rt->mf6c_next; \ 176 } \ 177 if (rt == NULL) { \ 178 mrt6stat.mrt6s_mfc_misses++; \ 179 } \ 180 } while (0) 181 182 /* 183 * Macros to compute elapsed time efficiently 184 * Borrowed from Van Jacobson's scheduling code 185 */ 186 #define TV_DELTA(a, b, delta) do { \ 187 int xxs; \ 188 \ 189 delta = (a).tv_usec - (b).tv_usec; \ 190 if ((xxs = (a).tv_sec - (b).tv_sec)) { \ 191 switch (xxs) { \ 192 case 2: \ 193 delta += 1000000; \ 194 /* fall through */ \ 195 case 1: \ 196 delta += 1000000; \ 197 break; \ 198 default: \ 199 delta += (1000000 * xxs); \ 200 } \ 201 } \ 202 } while (0) 203 204 #define TV_LT(a, b) (((a).tv_usec < (b).tv_usec && \ 205 (a).tv_sec <= (b).tv_sec) || (a).tv_sec < (b).tv_sec) 206 207 #ifdef UPCALL_TIMING 208 #define UPCALL_MAX 50 209 u_long upcall_data[UPCALL_MAX + 1]; 210 static void collate(); 211 #endif /* UPCALL_TIMING */ 212 213 static int get_sg_cnt (struct sioc_sg_req6 *); 214 static int get_mif6_cnt (struct sioc_mif_req6 *); 215 static int ip6_mrouter_init (struct socket *, struct mbuf *, int); 216 static int add_m6if (struct mif6ctl *); 217 static int del_m6if (mifi_t *); 218 static int add_m6fc (struct mf6cctl *); 219 static int del_m6fc (struct mf6cctl *); 220 221 static struct callout expire_upcalls_ch; 222 223 /* 224 * Handle MRT setsockopt commands to modify the multicast routing tables. 225 */ 226 int 227 ip6_mrouter_set(struct socket *so, struct sockopt *sopt) 228 { 229 int error = 0; 230 struct mbuf *m; 231 232 if (so != ip6_mrouter && sopt->sopt_name != MRT6_INIT) 233 return (EACCES); 234 235 if ((error = soopt_getm(sopt, &m)) != 0) /* XXX */ 236 return (error); 237 soopt_to_mbuf(sopt, m); /* XXX */ 238 239 switch (sopt->sopt_name) { 240 case MRT6_INIT: 241 #ifdef MRT6_OINIT 242 case MRT6_OINIT: 243 #endif 244 error = ip6_mrouter_init(so, m, sopt->sopt_name); 245 break; 246 case MRT6_DONE: 247 error = ip6_mrouter_done(); 248 break; 249 case MRT6_ADD_MIF: 250 error = add_m6if(mtod(m, struct mif6ctl *)); 251 break; 252 case MRT6_DEL_MIF: 253 error = del_m6if(mtod(m, mifi_t *)); 254 break; 255 case MRT6_ADD_MFC: 256 error = add_m6fc(mtod(m, struct mf6cctl *)); 257 break; 258 case MRT6_DEL_MFC: 259 error = del_m6fc(mtod(m, struct mf6cctl *)); 260 break; 261 case MRT6_PIM: 262 error = set_pim6(mtod(m, int *)); 263 break; 264 default: 265 error = EOPNOTSUPP; 266 break; 267 } 268 269 m_freem(m); 270 return (error); 271 } 272 273 /* 274 * Handle MRT getsockopt commands 275 */ 276 int 277 ip6_mrouter_get(struct socket *so, struct sockopt *sopt) 278 { 279 int error = 0; 280 281 if (so != ip6_mrouter) return EACCES; 282 283 switch (sopt->sopt_name) { 284 case MRT6_PIM: 285 soopt_from_kbuf(sopt, &pim6, sizeof(pim6)); 286 break; 287 } 288 return (error); 289 } 290 291 /* 292 * Handle ioctl commands to obtain information from the cache 293 */ 294 int 295 mrt6_ioctl(int cmd, caddr_t data) 296 { 297 int error = 0; 298 299 switch (cmd) { 300 case SIOCGETSGCNT_IN6: 301 return (get_sg_cnt((struct sioc_sg_req6 *)data)); 302 break; /* for safety */ 303 case SIOCGETMIFCNT_IN6: 304 return (get_mif6_cnt((struct sioc_mif_req6 *)data)); 305 break; /* for safety */ 306 default: 307 return (EINVAL); 308 break; 309 } 310 return error; 311 } 312 313 /* 314 * returns the packet, byte, rpf-failure count for the source group provided 315 */ 316 static int 317 get_sg_cnt(struct sioc_sg_req6 *req) 318 { 319 struct mf6c *rt; 320 321 crit_enter(); 322 MF6CFIND(req->src.sin6_addr, req->grp.sin6_addr, rt); 323 crit_exit(); 324 if (rt != NULL) { 325 req->pktcnt = rt->mf6c_pkt_cnt; 326 req->bytecnt = rt->mf6c_byte_cnt; 327 req->wrong_if = rt->mf6c_wrong_if; 328 } else 329 return (ESRCH); 330 #if 0 331 req->pktcnt = req->bytecnt = req->wrong_if = 0xffffffff; 332 #endif 333 334 return 0; 335 } 336 337 /* 338 * returns the input and output packet and byte counts on the mif provided 339 */ 340 static int 341 get_mif6_cnt(struct sioc_mif_req6 *req) 342 { 343 mifi_t mifi = req->mifi; 344 345 if (mifi >= nummifs) 346 return EINVAL; 347 348 req->icount = mif6table[mifi].m6_pkt_in; 349 req->ocount = mif6table[mifi].m6_pkt_out; 350 req->ibytes = mif6table[mifi].m6_bytes_in; 351 req->obytes = mif6table[mifi].m6_bytes_out; 352 353 return 0; 354 } 355 356 static int 357 set_pim6(int *i) 358 { 359 if ((*i != 1) && (*i != 0)) 360 return EINVAL; 361 362 pim6 = *i; 363 364 return 0; 365 } 366 367 /* 368 * Enable multicast routing 369 */ 370 static int 371 ip6_mrouter_init(struct socket *so, struct mbuf *m, int cmd) 372 { 373 int *v; 374 375 #ifdef MRT6DEBUG 376 if (mrt6debug) 377 log(LOG_DEBUG, 378 "ip6_mrouter_init: so_type = %d, pr_protocol = %d\n", 379 so->so_type, so->so_proto->pr_protocol); 380 #endif 381 382 if (so->so_type != SOCK_RAW || 383 so->so_proto->pr_protocol != IPPROTO_ICMPV6) 384 return EOPNOTSUPP; 385 386 if (!m || (m->m_len != sizeof(int *))) 387 return ENOPROTOOPT; 388 389 v = mtod(m, int *); 390 if (*v != 1) 391 return ENOPROTOOPT; 392 393 if (ip6_mrouter != NULL) return EADDRINUSE; 394 395 ip6_mrouter = so; 396 ip6_mrouter_ver = cmd; 397 398 bzero((caddr_t)mf6ctable, sizeof(mf6ctable)); 399 bzero((caddr_t)n6expire, sizeof(n6expire)); 400 401 pim6 = 0;/* used for stubbing out/in pim stuff */ 402 403 callout_reset(&expire_upcalls_ch, EXPIRE_TIMEOUT, 404 expire_upcalls, NULL); 405 406 #ifdef MRT6DEBUG 407 if (mrt6debug) 408 log(LOG_DEBUG, "ip6_mrouter_init\n"); 409 #endif 410 411 return 0; 412 } 413 414 /* 415 * Disable multicast routing 416 */ 417 int 418 ip6_mrouter_done(void) 419 { 420 mifi_t mifi; 421 int i; 422 struct ifnet *ifp; 423 struct in6_ifreq ifr; 424 struct mf6c *rt; 425 struct rtdetq *rte; 426 427 /* 428 * For each phyint in use, disable promiscuous reception of all IPv6 429 * multicasts. 430 */ 431 #ifdef INET 432 #ifdef MROUTING 433 /* 434 * If there is still IPv4 multicast routing daemon, 435 * we remain interfaces to receive all muliticasted packets. 436 * XXX: there may be an interface in which the IPv4 multicast 437 * daemon is not interested... 438 */ 439 if (!ip_mrouter) 440 #endif 441 #endif 442 { 443 for (mifi = 0; mifi < nummifs; mifi++) { 444 if (mif6table[mifi].m6_ifp && 445 !(mif6table[mifi].m6_flags & MIFF_REGISTER)) { 446 ifr.ifr_addr.sin6_family = AF_INET6; 447 ifr.ifr_addr.sin6_addr= kin6addr_any; 448 ifp = mif6table[mifi].m6_ifp; 449 ifnet_serialize_all(ifp); 450 ifp->if_ioctl(ifp, SIOCDELMULTI, 451 (caddr_t)&ifr, NULL); 452 ifnet_deserialize_all(ifp); 453 } 454 } 455 } 456 #ifdef notyet 457 bzero((caddr_t)qtable, sizeof(qtable)); 458 bzero((caddr_t)tbftable, sizeof(tbftable)); 459 #endif 460 bzero((caddr_t)mif6table, sizeof(mif6table)); 461 nummifs = 0; 462 463 pim6 = 0; /* used to stub out/in pim specific code */ 464 465 callout_stop(&expire_upcalls_ch); 466 467 /* 468 * Free all multicast forwarding cache entries. 469 */ 470 for (i = 0; i < MF6CTBLSIZ; i++) { 471 rt = mf6ctable[i]; 472 while (rt) { 473 struct mf6c *frt; 474 475 for (rte = rt->mf6c_stall; rte != NULL; ) { 476 struct rtdetq *n = rte->next; 477 478 m_freem(rte->m); 479 kfree(rte, M_MRTABLE); 480 rte = n; 481 } 482 frt = rt; 483 rt = rt->mf6c_next; 484 kfree(frt, M_MRTABLE); 485 } 486 } 487 488 bzero((caddr_t)mf6ctable, sizeof(mf6ctable)); 489 490 /* 491 * Reset de-encapsulation cache 492 */ 493 reg_mif_num = -1; 494 495 ip6_mrouter = NULL; 496 ip6_mrouter_ver = 0; 497 498 #ifdef MRT6DEBUG 499 if (mrt6debug) 500 log(LOG_DEBUG, "ip6_mrouter_done\n"); 501 #endif 502 503 return 0; 504 } 505 506 static struct sockaddr_in6 sin6 = { sizeof(sin6), AF_INET6 }; 507 508 /* 509 * Add a mif to the mif table 510 */ 511 static int 512 add_m6if(struct mif6ctl *mifcp) 513 { 514 struct mif6 *mifp; 515 struct ifnet *ifp; 516 int error; 517 #ifdef notyet 518 struct tbf *m_tbf = tbftable + mifcp->mif6c_mifi; 519 #endif 520 521 if (mifcp->mif6c_mifi >= MAXMIFS) 522 return EINVAL; 523 mifp = mif6table + mifcp->mif6c_mifi; 524 if (mifp->m6_ifp) 525 return EADDRINUSE; /* XXX: is it appropriate? */ 526 if (mifcp->mif6c_pifi == 0 || mifcp->mif6c_pifi > if_index) 527 return ENXIO; 528 ifp = ifindex2ifnet[mifcp->mif6c_pifi]; 529 530 if (mifcp->mif6c_flags & MIFF_REGISTER) { 531 if (reg_mif_num == (mifi_t)-1) { 532 strlcpy(multicast_register_if.if_xname, "register_mif", 533 IFNAMSIZ); 534 multicast_register_if.if_flags |= IFF_LOOPBACK; 535 multicast_register_if.if_index = mifcp->mif6c_mifi; 536 reg_mif_num = mifcp->mif6c_mifi; 537 } 538 539 ifp = &multicast_register_if; 540 541 } /* if REGISTER */ 542 else { 543 /* Make sure the interface supports multicast */ 544 if ((ifp->if_flags & IFF_MULTICAST) == 0) 545 return EOPNOTSUPP; 546 547 crit_enter(); 548 error = if_allmulti(ifp, 1); 549 crit_exit(); 550 if (error) 551 return error; 552 } 553 554 crit_enter(); 555 mifp->m6_flags = mifcp->mif6c_flags; 556 mifp->m6_ifp = ifp; 557 #ifdef notyet 558 /* scaling up here allows division by 1024 in critical code */ 559 mifp->m6_rate_limit = mifcp->mif6c_rate_limit * 1024 / 1000; 560 #endif 561 /* initialize per mif pkt counters */ 562 mifp->m6_pkt_in = 0; 563 mifp->m6_pkt_out = 0; 564 mifp->m6_bytes_in = 0; 565 mifp->m6_bytes_out = 0; 566 crit_exit(); 567 568 /* Adjust nummifs up if the mifi is higher than nummifs */ 569 if (nummifs <= mifcp->mif6c_mifi) 570 nummifs = mifcp->mif6c_mifi + 1; 571 572 #ifdef MRT6DEBUG 573 if (mrt6debug) 574 log(LOG_DEBUG, 575 "add_mif #%d, phyint %s\n", 576 mifcp->mif6c_mifi, 577 ifp->if_xname); 578 #endif 579 580 return 0; 581 } 582 583 /* 584 * Delete a mif from the mif table 585 */ 586 static int 587 del_m6if(mifi_t *mifip) 588 { 589 struct mif6 *mifp = mif6table + *mifip; 590 mifi_t mifi; 591 struct ifnet *ifp; 592 593 if (*mifip >= nummifs) 594 return EINVAL; 595 if (mifp->m6_ifp == NULL) 596 return EINVAL; 597 598 crit_enter(); 599 600 if (!(mifp->m6_flags & MIFF_REGISTER)) { 601 /* 602 * XXX: what if there is yet IPv4 multicast daemon 603 * using the interface? 604 */ 605 ifp = mifp->m6_ifp; 606 607 if_allmulti(ifp, 0); 608 } 609 610 #ifdef notyet 611 bzero((caddr_t)qtable[*mifip], sizeof(qtable[*mifip])); 612 bzero((caddr_t)mifp->m6_tbf, sizeof(*(mifp->m6_tbf))); 613 #endif 614 bzero((caddr_t)mifp, sizeof (*mifp)); 615 616 /* Adjust nummifs down */ 617 for (mifi = nummifs; mifi > 0; mifi--) 618 if (mif6table[mifi - 1].m6_ifp) 619 break; 620 nummifs = mifi; 621 622 crit_exit(); 623 624 #ifdef MRT6DEBUG 625 if (mrt6debug) 626 log(LOG_DEBUG, "del_m6if %d, nummifs %d\n", *mifip, nummifs); 627 #endif 628 629 return 0; 630 } 631 632 /* 633 * Add an mfc entry 634 */ 635 static int 636 add_m6fc(struct mf6cctl *mfccp) 637 { 638 struct mf6c *rt; 639 u_long hash; 640 struct rtdetq *rte; 641 u_short nstl; 642 643 MF6CFIND(mfccp->mf6cc_origin.sin6_addr, 644 mfccp->mf6cc_mcastgrp.sin6_addr, rt); 645 646 /* If an entry already exists, just update the fields */ 647 if (rt) { 648 #ifdef MRT6DEBUG 649 if (mrt6debug & DEBUG_MFC) 650 log(LOG_DEBUG, 651 "add_m6fc no upcall h %d o %s g %s p %x\n", 652 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), 653 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), 654 mfccp->mf6cc_parent); 655 #endif 656 657 crit_enter(); 658 rt->mf6c_parent = mfccp->mf6cc_parent; 659 rt->mf6c_ifset = mfccp->mf6cc_ifset; 660 crit_exit(); 661 return 0; 662 } 663 664 /* 665 * Find the entry for which the upcall was made and update 666 */ 667 crit_enter(); 668 hash = MF6CHASH(mfccp->mf6cc_origin.sin6_addr, 669 mfccp->mf6cc_mcastgrp.sin6_addr); 670 for (rt = mf6ctable[hash], nstl = 0; rt; rt = rt->mf6c_next) { 671 if (IN6_ARE_ADDR_EQUAL(&rt->mf6c_origin.sin6_addr, 672 &mfccp->mf6cc_origin.sin6_addr) && 673 IN6_ARE_ADDR_EQUAL(&rt->mf6c_mcastgrp.sin6_addr, 674 &mfccp->mf6cc_mcastgrp.sin6_addr) && 675 (rt->mf6c_stall != NULL)) { 676 677 if (nstl++) 678 log(LOG_ERR, 679 "add_m6fc: %s o %s g %s p %x dbx %p\n", 680 "multiple kernel entries", 681 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), 682 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), 683 mfccp->mf6cc_parent, rt->mf6c_stall); 684 685 #ifdef MRT6DEBUG 686 if (mrt6debug & DEBUG_MFC) 687 log(LOG_DEBUG, 688 "add_m6fc o %s g %s p %x dbg %x\n", 689 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), 690 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), 691 mfccp->mf6cc_parent, rt->mf6c_stall); 692 #endif 693 694 rt->mf6c_origin = mfccp->mf6cc_origin; 695 rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp; 696 rt->mf6c_parent = mfccp->mf6cc_parent; 697 rt->mf6c_ifset = mfccp->mf6cc_ifset; 698 /* initialize pkt counters per src-grp */ 699 rt->mf6c_pkt_cnt = 0; 700 rt->mf6c_byte_cnt = 0; 701 rt->mf6c_wrong_if = 0; 702 703 rt->mf6c_expire = 0; /* Don't clean this guy up */ 704 n6expire[hash]--; 705 706 /* free packets Qed at the end of this entry */ 707 for (rte = rt->mf6c_stall; rte != NULL; ) { 708 struct rtdetq *n = rte->next; 709 ip6_mdq(rte->m, rte->ifp, rt); 710 m_freem(rte->m); 711 #ifdef UPCALL_TIMING 712 collate(&(rte->t)); 713 #endif /* UPCALL_TIMING */ 714 kfree(rte, M_MRTABLE); 715 rte = n; 716 } 717 rt->mf6c_stall = NULL; 718 } 719 } 720 721 /* 722 * It is possible that an entry is being inserted without an upcall 723 */ 724 if (nstl == 0) { 725 #ifdef MRT6DEBUG 726 if (mrt6debug & DEBUG_MFC) 727 log(LOG_DEBUG,"add_mfc no upcall h %d o %s g %s p %x\n", 728 hash, 729 ip6_sprintf(&mfccp->mf6cc_origin.sin6_addr), 730 ip6_sprintf(&mfccp->mf6cc_mcastgrp.sin6_addr), 731 mfccp->mf6cc_parent); 732 #endif 733 734 for (rt = mf6ctable[hash]; rt; rt = rt->mf6c_next) { 735 736 if (IN6_ARE_ADDR_EQUAL(&rt->mf6c_origin.sin6_addr, 737 &mfccp->mf6cc_origin.sin6_addr)&& 738 IN6_ARE_ADDR_EQUAL(&rt->mf6c_mcastgrp.sin6_addr, 739 &mfccp->mf6cc_mcastgrp.sin6_addr)) { 740 741 rt->mf6c_origin = mfccp->mf6cc_origin; 742 rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp; 743 rt->mf6c_parent = mfccp->mf6cc_parent; 744 rt->mf6c_ifset = mfccp->mf6cc_ifset; 745 /* initialize pkt counters per src-grp */ 746 rt->mf6c_pkt_cnt = 0; 747 rt->mf6c_byte_cnt = 0; 748 rt->mf6c_wrong_if = 0; 749 750 if (rt->mf6c_expire) 751 n6expire[hash]--; 752 rt->mf6c_expire = 0; 753 } 754 } 755 if (rt == NULL) { 756 /* no upcall, so make a new entry */ 757 rt = (struct mf6c *)kmalloc(sizeof(*rt), M_MRTABLE, 758 M_NOWAIT); 759 if (rt == NULL) { 760 crit_exit(); 761 return ENOBUFS; 762 } 763 764 /* insert new entry at head of hash chain */ 765 rt->mf6c_origin = mfccp->mf6cc_origin; 766 rt->mf6c_mcastgrp = mfccp->mf6cc_mcastgrp; 767 rt->mf6c_parent = mfccp->mf6cc_parent; 768 rt->mf6c_ifset = mfccp->mf6cc_ifset; 769 /* initialize pkt counters per src-grp */ 770 rt->mf6c_pkt_cnt = 0; 771 rt->mf6c_byte_cnt = 0; 772 rt->mf6c_wrong_if = 0; 773 rt->mf6c_expire = 0; 774 rt->mf6c_stall = NULL; 775 776 /* link into table */ 777 rt->mf6c_next = mf6ctable[hash]; 778 mf6ctable[hash] = rt; 779 } 780 } 781 crit_exit(); 782 return 0; 783 } 784 785 #ifdef UPCALL_TIMING 786 /* 787 * collect delay statistics on the upcalls 788 */ 789 static void 790 collate(struct timeval *t) 791 { 792 u_long d; 793 struct timeval tp; 794 u_long delta; 795 796 GET_TIME(tp); 797 798 if (TV_LT(*t, tp)) 799 { 800 TV_DELTA(tp, *t, delta); 801 802 d = delta >> 10; 803 if (d > UPCALL_MAX) 804 d = UPCALL_MAX; 805 806 ++upcall_data[d]; 807 } 808 } 809 #endif /* UPCALL_TIMING */ 810 811 /* 812 * Delete an mfc entry 813 */ 814 static int 815 del_m6fc(struct mf6cctl *mfccp) 816 { 817 struct sockaddr_in6 origin; 818 struct sockaddr_in6 mcastgrp; 819 struct mf6c *rt; 820 struct mf6c **nptr; 821 u_long hash; 822 823 origin = mfccp->mf6cc_origin; 824 mcastgrp = mfccp->mf6cc_mcastgrp; 825 hash = MF6CHASH(origin.sin6_addr, mcastgrp.sin6_addr); 826 827 #ifdef MRT6DEBUG 828 if (mrt6debug & DEBUG_MFC) 829 log(LOG_DEBUG,"del_m6fc orig %s mcastgrp %s\n", 830 ip6_sprintf(&origin.sin6_addr), 831 ip6_sprintf(&mcastgrp.sin6_addr)); 832 #endif 833 834 crit_enter(); 835 836 nptr = &mf6ctable[hash]; 837 while ((rt = *nptr) != NULL) { 838 if (IN6_ARE_ADDR_EQUAL(&origin.sin6_addr, 839 &rt->mf6c_origin.sin6_addr) && 840 IN6_ARE_ADDR_EQUAL(&mcastgrp.sin6_addr, 841 &rt->mf6c_mcastgrp.sin6_addr) && 842 rt->mf6c_stall == NULL) 843 break; 844 845 nptr = &rt->mf6c_next; 846 } 847 if (rt == NULL) { 848 crit_exit(); 849 return EADDRNOTAVAIL; 850 } 851 852 *nptr = rt->mf6c_next; 853 kfree(rt, M_MRTABLE); 854 855 crit_exit(); 856 857 return 0; 858 } 859 860 static int 861 socket_send(struct socket *so, struct mbuf *mm, struct sockaddr_in6 *src) 862 { 863 if (so) { 864 lwkt_gettoken(&so->so_rcv.ssb_token); 865 if (ssb_appendaddr(&so->so_rcv, 866 (struct sockaddr *)src, 867 mm, NULL) != 0) { 868 sorwakeup(so); 869 lwkt_reltoken(&so->so_rcv.ssb_token); 870 return 0; 871 } 872 lwkt_reltoken(&so->so_rcv.ssb_token); 873 } 874 m_freem(mm); 875 return -1; 876 } 877 878 /* 879 * IPv6 multicast forwarding function. This function assumes that the packet 880 * pointed to by "ip6" has arrived on (or is about to be sent to) the interface 881 * pointed to by "ifp", and the packet is to be relayed to other networks 882 * that have members of the packet's destination IPv6 multicast group. 883 * 884 * The packet is returned unscathed to the caller, unless it is 885 * erroneous, in which case a non-zero return value tells the caller to 886 * discard it. 887 */ 888 889 int 890 ip6_mforward(struct ip6_hdr *ip6, struct ifnet *ifp, struct mbuf *m) 891 { 892 struct mf6c *rt; 893 struct mif6 *mifp; 894 struct mbuf *mm; 895 mifi_t mifi; 896 897 #ifdef MRT6DEBUG 898 if (mrt6debug & DEBUG_FORWARD) 899 log(LOG_DEBUG, "ip6_mforward: src %s, dst %s, ifindex %d\n", 900 ip6_sprintf(&ip6->ip6_src), ip6_sprintf(&ip6->ip6_dst), 901 ifp->if_index); 902 #endif 903 904 /* 905 * Don't forward a packet with Hop limit of zero or one, 906 * or a packet destined to a local-only group. 907 */ 908 if (ip6->ip6_hlim <= 1 || IN6_IS_ADDR_MC_NODELOCAL(&ip6->ip6_dst) || 909 IN6_IS_ADDR_MC_LINKLOCAL(&ip6->ip6_dst)) 910 return 0; 911 ip6->ip6_hlim--; 912 913 /* 914 * Source address check: do not forward packets with unspecified 915 * source. It was discussed in July 2000, on ipngwg mailing list. 916 * This is rather more serious than unicast cases, because some 917 * MLD packets can be sent with the unspecified source address 918 * (although such packets must normally set 1 to the hop limit field). 919 */ 920 if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) { 921 ip6stat.ip6s_cantforward++; 922 if (ip6_log_time + ip6_log_interval < time_uptime) { 923 ip6_log_time = time_uptime; 924 log(LOG_DEBUG, 925 "cannot forward " 926 "from %s to %s nxt %d received on %s\n", 927 ip6_sprintf(&ip6->ip6_src), 928 ip6_sprintf(&ip6->ip6_dst), 929 ip6->ip6_nxt, 930 if_name(m->m_pkthdr.rcvif)); 931 } 932 return 0; 933 } 934 935 /* 936 * Determine forwarding mifs from the forwarding cache table 937 */ 938 crit_enter(); 939 MF6CFIND(ip6->ip6_src, ip6->ip6_dst, rt); 940 941 /* Entry exists, so forward if necessary */ 942 if (rt) { 943 crit_exit(); 944 return (ip6_mdq(m, ifp, rt)); 945 } else { 946 /* 947 * If we don't have a route for packet's origin, 948 * Make a copy of the packet & 949 * send message to routing daemon 950 */ 951 952 struct mbuf *mb0; 953 struct rtdetq *rte; 954 u_long hash; 955 /* int i, npkts;*/ 956 #ifdef UPCALL_TIMING 957 struct timeval tp; 958 959 GET_TIME(tp); 960 #endif /* UPCALL_TIMING */ 961 962 mrt6stat.mrt6s_no_route++; 963 #ifdef MRT6DEBUG 964 if (mrt6debug & (DEBUG_FORWARD | DEBUG_MFC)) 965 log(LOG_DEBUG, "ip6_mforward: no rte s %s g %s\n", 966 ip6_sprintf(&ip6->ip6_src), 967 ip6_sprintf(&ip6->ip6_dst)); 968 #endif 969 970 /* 971 * Allocate mbufs early so that we don't do extra work if we 972 * are just going to fail anyway. 973 */ 974 rte = (struct rtdetq *)kmalloc(sizeof(*rte), M_MRTABLE, 975 M_NOWAIT); 976 if (rte == NULL) { 977 crit_exit(); 978 return ENOBUFS; 979 } 980 mb0 = m_copy(m, 0, M_COPYALL); 981 /* 982 * Pullup packet header if needed before storing it, 983 * as other references may modify it in the meantime. 984 */ 985 if (mb0 && 986 (M_HASCL(mb0) || mb0->m_len < sizeof(struct ip6_hdr))) 987 mb0 = m_pullup(mb0, sizeof(struct ip6_hdr)); 988 if (mb0 == NULL) { 989 kfree(rte, M_MRTABLE); 990 crit_exit(); 991 return ENOBUFS; 992 } 993 994 /* is there an upcall waiting for this packet? */ 995 hash = MF6CHASH(ip6->ip6_src, ip6->ip6_dst); 996 for (rt = mf6ctable[hash]; rt; rt = rt->mf6c_next) { 997 if (IN6_ARE_ADDR_EQUAL(&ip6->ip6_src, 998 &rt->mf6c_origin.sin6_addr) && 999 IN6_ARE_ADDR_EQUAL(&ip6->ip6_dst, 1000 &rt->mf6c_mcastgrp.sin6_addr) && 1001 (rt->mf6c_stall != NULL)) 1002 break; 1003 } 1004 1005 if (rt == NULL) { 1006 struct mrt6msg *im; 1007 #ifdef MRT6_OINIT 1008 struct omrt6msg *oim; 1009 #endif 1010 1011 /* no upcall, so make a new entry */ 1012 rt = (struct mf6c *)kmalloc(sizeof(*rt), M_MRTABLE, 1013 M_NOWAIT); 1014 if (rt == NULL) { 1015 kfree(rte, M_MRTABLE); 1016 m_freem(mb0); 1017 crit_exit(); 1018 return ENOBUFS; 1019 } 1020 /* 1021 * Make a copy of the header to send to the user 1022 * level process 1023 */ 1024 mm = m_copy(mb0, 0, sizeof(struct ip6_hdr)); 1025 1026 if (mm == NULL) { 1027 kfree(rte, M_MRTABLE); 1028 m_freem(mb0); 1029 kfree(rt, M_MRTABLE); 1030 crit_exit(); 1031 return ENOBUFS; 1032 } 1033 1034 /* 1035 * Send message to routing daemon 1036 */ 1037 sin6.sin6_addr = ip6->ip6_src; 1038 1039 im = NULL; 1040 #ifdef MRT6_OINIT 1041 oim = NULL; 1042 #endif 1043 switch (ip6_mrouter_ver) { 1044 #ifdef MRT6_OINIT 1045 case MRT6_OINIT: 1046 oim = mtod(mm, struct omrt6msg *); 1047 oim->im6_msgtype = MRT6MSG_NOCACHE; 1048 oim->im6_mbz = 0; 1049 break; 1050 #endif 1051 case MRT6_INIT: 1052 im = mtod(mm, struct mrt6msg *); 1053 im->im6_msgtype = MRT6MSG_NOCACHE; 1054 im->im6_mbz = 0; 1055 break; 1056 default: 1057 kfree(rte, M_MRTABLE); 1058 m_freem(mb0); 1059 kfree(rt, M_MRTABLE); 1060 crit_exit(); 1061 return EINVAL; 1062 } 1063 1064 #ifdef MRT6DEBUG 1065 if (mrt6debug & DEBUG_FORWARD) 1066 log(LOG_DEBUG, 1067 "getting the iif info in the kernel\n"); 1068 #endif 1069 1070 for (mifp = mif6table, mifi = 0; 1071 mifi < nummifs && mifp->m6_ifp != ifp; 1072 mifp++, mifi++) 1073 ; 1074 1075 switch (ip6_mrouter_ver) { 1076 #ifdef MRT6_OINIT 1077 case MRT6_OINIT: 1078 oim->im6_mif = mifi; 1079 break; 1080 #endif 1081 case MRT6_INIT: 1082 im->im6_mif = mifi; 1083 break; 1084 } 1085 1086 if (socket_send(ip6_mrouter, mm, &sin6) < 0) { 1087 log(LOG_WARNING, "ip6_mforward: ip6_mrouter " 1088 "socket queue full\n"); 1089 mrt6stat.mrt6s_upq_sockfull++; 1090 kfree(rte, M_MRTABLE); 1091 m_freem(mb0); 1092 kfree(rt, M_MRTABLE); 1093 crit_exit(); 1094 return ENOBUFS; 1095 } 1096 1097 mrt6stat.mrt6s_upcalls++; 1098 1099 /* insert new entry at head of hash chain */ 1100 bzero(rt, sizeof(*rt)); 1101 rt->mf6c_origin.sin6_family = AF_INET6; 1102 rt->mf6c_origin.sin6_len = sizeof(struct sockaddr_in6); 1103 rt->mf6c_origin.sin6_addr = ip6->ip6_src; 1104 rt->mf6c_mcastgrp.sin6_family = AF_INET6; 1105 rt->mf6c_mcastgrp.sin6_len = sizeof(struct sockaddr_in6); 1106 rt->mf6c_mcastgrp.sin6_addr = ip6->ip6_dst; 1107 rt->mf6c_expire = UPCALL_EXPIRE; 1108 n6expire[hash]++; 1109 rt->mf6c_parent = MF6C_INCOMPLETE_PARENT; 1110 1111 /* link into table */ 1112 rt->mf6c_next = mf6ctable[hash]; 1113 mf6ctable[hash] = rt; 1114 /* Add this entry to the end of the queue */ 1115 rt->mf6c_stall = rte; 1116 } else { 1117 /* determine if q has overflowed */ 1118 struct rtdetq **p; 1119 int npkts = 0; 1120 1121 for (p = &rt->mf6c_stall; *p != NULL; p = &(*p)->next) 1122 if (++npkts > MAX_UPQ6) { 1123 mrt6stat.mrt6s_upq_ovflw++; 1124 kfree(rte, M_MRTABLE); 1125 m_freem(mb0); 1126 crit_exit(); 1127 return 0; 1128 } 1129 1130 /* Add this entry to the end of the queue */ 1131 *p = rte; 1132 } 1133 1134 rte->next = NULL; 1135 rte->m = mb0; 1136 rte->ifp = ifp; 1137 #ifdef UPCALL_TIMING 1138 rte->t = tp; 1139 #endif /* UPCALL_TIMING */ 1140 1141 crit_exit(); 1142 1143 return 0; 1144 } 1145 } 1146 1147 /* 1148 * Clean up cache entries if upcalls are not serviced 1149 * Call from the Slow Timeout mechanism, every half second. 1150 */ 1151 static void 1152 expire_upcalls(void *unused) 1153 { 1154 struct rtdetq *rte; 1155 struct mf6c *mfc, **nptr; 1156 int i; 1157 1158 crit_enter(); 1159 for (i = 0; i < MF6CTBLSIZ; i++) { 1160 if (n6expire[i] == 0) 1161 continue; 1162 nptr = &mf6ctable[i]; 1163 while ((mfc = *nptr) != NULL) { 1164 rte = mfc->mf6c_stall; 1165 /* 1166 * Skip real cache entries 1167 * Make sure it wasn't marked to not expire (shouldn't happen) 1168 * If it expires now 1169 */ 1170 if (rte != NULL && 1171 mfc->mf6c_expire != 0 && 1172 --mfc->mf6c_expire == 0) { 1173 #ifdef MRT6DEBUG 1174 if (mrt6debug & DEBUG_EXPIRE) 1175 log(LOG_DEBUG, "expire_upcalls: expiring (%s %s)\n", 1176 ip6_sprintf(&mfc->mf6c_origin.sin6_addr), 1177 ip6_sprintf(&mfc->mf6c_mcastgrp.sin6_addr)); 1178 #endif 1179 /* 1180 * drop all the packets 1181 * free the mbuf with the pkt, if, timing info 1182 */ 1183 do { 1184 struct rtdetq *n = rte->next; 1185 m_freem(rte->m); 1186 kfree(rte, M_MRTABLE); 1187 rte = n; 1188 } while (rte != NULL); 1189 mrt6stat.mrt6s_cache_cleanups++; 1190 n6expire[i]--; 1191 1192 *nptr = mfc->mf6c_next; 1193 kfree(mfc, M_MRTABLE); 1194 } else { 1195 nptr = &mfc->mf6c_next; 1196 } 1197 } 1198 } 1199 crit_exit(); 1200 callout_reset(&expire_upcalls_ch, EXPIRE_TIMEOUT, 1201 expire_upcalls, NULL); 1202 } 1203 1204 /* 1205 * Packet forwarding routine once entry in the cache is made 1206 */ 1207 static int 1208 ip6_mdq(struct mbuf *m, struct ifnet *ifp, struct mf6c *rt) 1209 { 1210 struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *); 1211 mifi_t mifi, iif; 1212 struct mif6 *mifp; 1213 int plen = m->m_pkthdr.len; 1214 1215 /* 1216 * Macro to send packet on mif. Since RSVP packets don't get counted on 1217 * input, they shouldn't get counted on output, so statistics keeping is 1218 * separate. 1219 */ 1220 1221 #define MC6_SEND(ip6, mifp, m) do { \ 1222 if ((mifp)->m6_flags & MIFF_REGISTER) \ 1223 register_send((ip6), (mifp), (m)); \ 1224 else \ 1225 phyint_send((ip6), (mifp), (m)); \ 1226 } while (0) 1227 1228 /* 1229 * Don't forward if it didn't arrive from the parent mif 1230 * for its origin. 1231 */ 1232 mifi = rt->mf6c_parent; 1233 if ((mifi >= nummifs) || (mif6table[mifi].m6_ifp != ifp)) { 1234 /* came in the wrong interface */ 1235 #ifdef MRT6DEBUG 1236 if (mrt6debug & DEBUG_FORWARD) 1237 log(LOG_DEBUG, 1238 "wrong if: ifid %d mifi %d mififid %x\n", 1239 ifp->if_index, mifi, 1240 mif6table[mifi].m6_ifp->if_index); 1241 #endif 1242 mrt6stat.mrt6s_wrong_if++; 1243 rt->mf6c_wrong_if++; 1244 /* 1245 * If we are doing PIM processing, and we are forwarding 1246 * packets on this interface, send a message to the 1247 * routing daemon. 1248 */ 1249 /* have to make sure this is a valid mif */ 1250 if (mifi < nummifs && mif6table[mifi].m6_ifp) 1251 if (pim6 && (m->m_flags & M_LOOP) == 0) { 1252 /* 1253 * Check the M_LOOP flag to avoid an 1254 * unnecessary PIM assert. 1255 * XXX: M_LOOP is an ad-hoc hack... 1256 */ 1257 static struct sockaddr_in6 sin6 = 1258 { sizeof(sin6), AF_INET6 }; 1259 1260 struct mbuf *mm; 1261 struct mrt6msg *im; 1262 #ifdef MRT6_OINIT 1263 struct omrt6msg *oim; 1264 #endif 1265 1266 mm = m_copy(m, 0, sizeof(struct ip6_hdr)); 1267 if (mm && 1268 (M_HASCL(mm) || 1269 mm->m_len < sizeof(struct ip6_hdr))) 1270 mm = m_pullup(mm, sizeof(struct ip6_hdr)); 1271 if (mm == NULL) 1272 return ENOBUFS; 1273 1274 #ifdef MRT6_OINIT 1275 oim = NULL; 1276 #endif 1277 im = NULL; 1278 switch (ip6_mrouter_ver) { 1279 #ifdef MRT6_OINIT 1280 case MRT6_OINIT: 1281 oim = mtod(mm, struct omrt6msg *); 1282 oim->im6_msgtype = MRT6MSG_WRONGMIF; 1283 oim->im6_mbz = 0; 1284 break; 1285 #endif 1286 case MRT6_INIT: 1287 im = mtod(mm, struct mrt6msg *); 1288 im->im6_msgtype = MRT6MSG_WRONGMIF; 1289 im->im6_mbz = 0; 1290 break; 1291 default: 1292 m_freem(mm); 1293 return EINVAL; 1294 } 1295 1296 for (mifp = mif6table, iif = 0; 1297 iif < nummifs && mifp && 1298 mifp->m6_ifp != ifp; 1299 mifp++, iif++) 1300 ; 1301 1302 switch (ip6_mrouter_ver) { 1303 #ifdef MRT6_OINIT 1304 case MRT6_OINIT: 1305 oim->im6_mif = iif; 1306 sin6.sin6_addr = oim->im6_src; 1307 break; 1308 #endif 1309 case MRT6_INIT: 1310 im->im6_mif = iif; 1311 sin6.sin6_addr = im->im6_src; 1312 break; 1313 } 1314 1315 mrt6stat.mrt6s_upcalls++; 1316 1317 if (socket_send(ip6_mrouter, mm, &sin6) < 0) { 1318 #ifdef MRT6DEBUG 1319 if (mrt6debug) 1320 log(LOG_WARNING, "mdq, ip6_mrouter socket queue full\n"); 1321 #endif 1322 ++mrt6stat.mrt6s_upq_sockfull; 1323 return ENOBUFS; 1324 } /* if socket Q full */ 1325 } /* if PIM */ 1326 return 0; 1327 } /* if wrong iif */ 1328 1329 /* If I sourced this packet, it counts as output, else it was input. */ 1330 if (m->m_pkthdr.rcvif == NULL) { 1331 /* XXX: is rcvif really NULL when output?? */ 1332 mif6table[mifi].m6_pkt_out++; 1333 mif6table[mifi].m6_bytes_out += plen; 1334 } else { 1335 mif6table[mifi].m6_pkt_in++; 1336 mif6table[mifi].m6_bytes_in += plen; 1337 } 1338 rt->mf6c_pkt_cnt++; 1339 rt->mf6c_byte_cnt += plen; 1340 1341 /* 1342 * For each mif, forward a copy of the packet if there are group 1343 * members downstream on the interface. 1344 */ 1345 for (mifp = mif6table, mifi = 0; mifi < nummifs; mifp++, mifi++) 1346 if (IF_ISSET(mifi, &rt->mf6c_ifset)) { 1347 /* 1348 * check if the outgoing packet is going to break 1349 * a scope boundary. 1350 * XXX For packets through PIM register tunnel 1351 * interface, we believe a routing daemon. 1352 */ 1353 if ((mif6table[rt->mf6c_parent].m6_flags & 1354 MIFF_REGISTER) == 0 && 1355 (mif6table[mifi].m6_flags & MIFF_REGISTER) == 0 && 1356 (in6_addr2scopeid(ifp, &ip6->ip6_dst) != 1357 in6_addr2scopeid(mif6table[mifi].m6_ifp, 1358 &ip6->ip6_dst) || 1359 in6_addr2scopeid(ifp, &ip6->ip6_src) != 1360 in6_addr2scopeid(mif6table[mifi].m6_ifp, 1361 &ip6->ip6_src))) { 1362 ip6stat.ip6s_badscope++; 1363 continue; 1364 } 1365 1366 mifp->m6_pkt_out++; 1367 mifp->m6_bytes_out += plen; 1368 MC6_SEND(ip6, mifp, m); 1369 } 1370 return 0; 1371 } 1372 1373 static void 1374 phyint_send(struct ip6_hdr *ip6, struct mif6 *mifp, struct mbuf *m) 1375 { 1376 struct mbuf *mb_copy; 1377 struct ifnet *ifp = mifp->m6_ifp; 1378 int error = 0; 1379 static struct route_in6 ro; 1380 struct in6_multi *in6m; 1381 struct sockaddr_in6 *dst6; 1382 1383 crit_enter(); /* needs to protect static "ro" below. */ 1384 1385 /* 1386 * Make a new reference to the packet; make sure that 1387 * the IPv6 header is actually copied, not just referenced, 1388 * so that ip6_output() only scribbles on the copy. 1389 */ 1390 mb_copy = m_copy(m, 0, M_COPYALL); 1391 if (mb_copy && 1392 (M_HASCL(mb_copy) || mb_copy->m_len < sizeof(struct ip6_hdr))) 1393 mb_copy = m_pullup(mb_copy, sizeof(struct ip6_hdr)); 1394 if (mb_copy == NULL) { 1395 crit_exit(); 1396 return; 1397 } 1398 /* set MCAST flag to the outgoing packet */ 1399 mb_copy->m_flags |= M_MCAST; 1400 1401 /* 1402 * If we sourced the packet, call ip6_output since we may devide 1403 * the packet into fragments when the packet is too big for the 1404 * outgoing interface. 1405 * Otherwise, we can simply send the packet to the interface 1406 * sending queue. 1407 */ 1408 if (m->m_pkthdr.rcvif == NULL) { 1409 struct ip6_moptions im6o; 1410 1411 im6o.im6o_multicast_ifp = ifp; 1412 /* XXX: ip6_output will override ip6->ip6_hlim */ 1413 im6o.im6o_multicast_hlim = ip6->ip6_hlim; 1414 im6o.im6o_multicast_loop = 1; 1415 error = ip6_output(mb_copy, NULL, &ro, 1416 IPV6_FORWARDING, &im6o, NULL, NULL); 1417 1418 #ifdef MRT6DEBUG 1419 if (mrt6debug & DEBUG_XMIT) 1420 log(LOG_DEBUG, "phyint_send on mif %d err %d\n", 1421 mifp - mif6table, error); 1422 #endif 1423 crit_exit(); 1424 return; 1425 } 1426 1427 /* 1428 * If we belong to the destination multicast group 1429 * on the outgoing interface, loop back a copy. 1430 */ 1431 dst6 = (struct sockaddr_in6 *)&ro.ro_dst; 1432 IN6_LOOKUP_MULTI(ip6->ip6_dst, ifp, in6m); 1433 if (in6m != NULL) { 1434 dst6->sin6_len = sizeof(struct sockaddr_in6); 1435 dst6->sin6_family = AF_INET6; 1436 dst6->sin6_addr = ip6->ip6_dst; 1437 ip6_mloopback(ifp, m, (struct sockaddr_in6 *)&ro.ro_dst); 1438 } 1439 /* 1440 * Put the packet into the sending queue of the outgoing interface 1441 * if it would fit in the MTU of the interface. 1442 */ 1443 if (mb_copy->m_pkthdr.len <= ifp->if_mtu || ifp->if_mtu < IPV6_MMTU) { 1444 dst6->sin6_len = sizeof(struct sockaddr_in6); 1445 dst6->sin6_family = AF_INET6; 1446 dst6->sin6_addr = ip6->ip6_dst; 1447 /* 1448 * We just call if_output instead of nd6_output here, since 1449 * we need no ND for a multicast forwarded packet...right? 1450 */ 1451 error = ifp->if_output(ifp, mb_copy, 1452 (struct sockaddr *)&ro.ro_dst, NULL); 1453 #ifdef MRT6DEBUG 1454 if (mrt6debug & DEBUG_XMIT) 1455 log(LOG_DEBUG, "phyint_send on mif %d err %d\n", 1456 mifp - mif6table, error); 1457 #endif 1458 } else { 1459 #ifdef MULTICAST_PMTUD 1460 icmp6_error(mb_copy, ICMP6_PACKET_TOO_BIG, 0, ifp->if_mtu); 1461 #else 1462 #ifdef MRT6DEBUG 1463 if (mrt6debug & DEBUG_XMIT) 1464 log(LOG_DEBUG, 1465 "phyint_send: packet too big on %s o %s g %s" 1466 " size %d(discarded)\n", 1467 if_name(ifp), 1468 ip6_sprintf(&ip6->ip6_src), 1469 ip6_sprintf(&ip6->ip6_dst), 1470 mb_copy->m_pkthdr.len); 1471 #endif /* MRT6DEBUG */ 1472 m_freem(mb_copy); /* simply discard the packet */ 1473 #endif 1474 } 1475 1476 crit_exit(); 1477 } 1478 1479 static int 1480 register_send(struct ip6_hdr *ip6, struct mif6 *mif, struct mbuf *m) 1481 { 1482 struct mbuf *mm; 1483 int i, len = m->m_pkthdr.len; 1484 static struct sockaddr_in6 sin6 = { sizeof(sin6), AF_INET6 }; 1485 struct mrt6msg *im6; 1486 1487 #ifdef MRT6DEBUG 1488 if (mrt6debug) 1489 log(LOG_DEBUG, "** IPv6 register_send **\n src %s dst %s\n", 1490 ip6_sprintf(&ip6->ip6_src), ip6_sprintf(&ip6->ip6_dst)); 1491 #endif 1492 ++pim6stat.pim6s_snd_registers; 1493 1494 /* Make a copy of the packet to send to the user level process */ 1495 MGETHDR(mm, MB_DONTWAIT, MT_HEADER); 1496 if (mm == NULL) 1497 return ENOBUFS; 1498 mm->m_pkthdr.rcvif = NULL; 1499 mm->m_data += max_linkhdr; 1500 mm->m_len = sizeof(struct ip6_hdr); 1501 1502 if ((mm->m_next = m_copy(m, 0, M_COPYALL)) == NULL) { 1503 m_freem(mm); 1504 return ENOBUFS; 1505 } 1506 i = MHLEN - M_LEADINGSPACE(mm); 1507 if (i > len) 1508 i = len; 1509 mm = m_pullup(mm, i); 1510 if (mm == NULL) 1511 return ENOBUFS; 1512 /* TODO: check it! */ 1513 mm->m_pkthdr.len = len + sizeof(struct ip6_hdr); 1514 1515 /* 1516 * Send message to routing daemon 1517 */ 1518 sin6.sin6_addr = ip6->ip6_src; 1519 1520 im6 = mtod(mm, struct mrt6msg *); 1521 im6->im6_msgtype = MRT6MSG_WHOLEPKT; 1522 im6->im6_mbz = 0; 1523 1524 im6->im6_mif = mif - mif6table; 1525 1526 /* iif info is not given for reg. encap.n */ 1527 mrt6stat.mrt6s_upcalls++; 1528 1529 if (socket_send(ip6_mrouter, mm, &sin6) < 0) { 1530 #ifdef MRT6DEBUG 1531 if (mrt6debug) 1532 log(LOG_WARNING, 1533 "register_send: ip6_mrouter socket queue full\n"); 1534 #endif 1535 ++mrt6stat.mrt6s_upq_sockfull; 1536 return ENOBUFS; 1537 } 1538 return 0; 1539 } 1540 1541 /* 1542 * PIM sparse mode hook 1543 * Receives the pim control messages, and passes them up to the listening 1544 * socket, using rip6_input. 1545 * The only message processed is the REGISTER pim message; the pim header 1546 * is stripped off, and the inner packet is passed to register_mforward. 1547 */ 1548 int 1549 pim6_input(struct mbuf **mp, int *offp, int proto) 1550 { 1551 struct pim *pim; /* pointer to a pim struct */ 1552 struct ip6_hdr *ip6; 1553 int pimlen; 1554 struct mbuf *m = *mp; 1555 int minlen; 1556 int off = *offp; 1557 1558 ++pim6stat.pim6s_rcv_total; 1559 1560 ip6 = mtod(m, struct ip6_hdr *); 1561 pimlen = m->m_pkthdr.len - *offp; 1562 1563 /* 1564 * Validate lengths 1565 */ 1566 if (pimlen < PIM_MINLEN) { 1567 ++pim6stat.pim6s_rcv_tooshort; 1568 #ifdef MRT6DEBUG 1569 if (mrt6debug & DEBUG_PIM) 1570 log(LOG_DEBUG,"pim6_input: PIM packet too short\n"); 1571 #endif 1572 m_freem(m); 1573 return (IPPROTO_DONE); 1574 } 1575 1576 /* 1577 * if the packet is at least as big as a REGISTER, go ahead 1578 * and grab the PIM REGISTER header size, to avoid another 1579 * possible m_pullup() later. 1580 * 1581 * PIM_MINLEN == pimhdr + u_int32 == 8 1582 * PIM6_REG_MINLEN == pimhdr + reghdr + eip6hdr == 4 + 4 + 40 1583 */ 1584 minlen = (pimlen >= PIM6_REG_MINLEN) ? PIM6_REG_MINLEN : PIM_MINLEN; 1585 1586 /* 1587 * Make sure that the IP6 and PIM headers in contiguous memory, and 1588 * possibly the PIM REGISTER header 1589 */ 1590 #ifndef PULLDOWN_TEST 1591 IP6_EXTHDR_CHECK(m, off, minlen, IPPROTO_DONE); 1592 /* adjust pointer */ 1593 ip6 = mtod(m, struct ip6_hdr *); 1594 1595 /* adjust mbuf to point to the PIM header */ 1596 pim = (struct pim *)((caddr_t)ip6 + off); 1597 #else 1598 IP6_EXTHDR_GET(pim, struct pim *, m, off, minlen); 1599 if (pim == NULL) { 1600 pim6stat.pim6s_rcv_tooshort++; 1601 return IPPROTO_DONE; 1602 } 1603 #endif 1604 1605 #define PIM6_CHECKSUM 1606 #ifdef PIM6_CHECKSUM 1607 { 1608 int cksumlen; 1609 1610 /* 1611 * Validate checksum. 1612 * If PIM REGISTER, exclude the data packet 1613 */ 1614 if (pim->pim_type == PIM_REGISTER) 1615 cksumlen = PIM_MINLEN; 1616 else 1617 cksumlen = pimlen; 1618 1619 if (in6_cksum(m, IPPROTO_PIM, off, cksumlen)) { 1620 ++pim6stat.pim6s_rcv_badsum; 1621 #ifdef MRT6DEBUG 1622 if (mrt6debug & DEBUG_PIM) 1623 log(LOG_DEBUG, 1624 "pim6_input: invalid checksum\n"); 1625 #endif 1626 m_freem(m); 1627 return (IPPROTO_DONE); 1628 } 1629 } 1630 #endif /* PIM_CHECKSUM */ 1631 1632 /* PIM version check */ 1633 if (pim->pim_ver != PIM_VERSION) { 1634 ++pim6stat.pim6s_rcv_badversion; 1635 #ifdef MRT6DEBUG 1636 log(LOG_ERR, 1637 "pim6_input: incorrect version %d, expecting %d\n", 1638 pim->pim_ver, PIM_VERSION); 1639 #endif 1640 m_freem(m); 1641 return (IPPROTO_DONE); 1642 } 1643 1644 if (pim->pim_type == PIM_REGISTER) { 1645 /* 1646 * since this is a REGISTER, we'll make a copy of the register 1647 * headers ip6+pim+u_int32_t+encap_ip6, to be passed up to the 1648 * routing daemon. 1649 */ 1650 static struct sockaddr_in6 dst = { sizeof(dst), AF_INET6 }; 1651 1652 struct mbuf *mcp; 1653 struct ip6_hdr *eip6; 1654 u_int32_t *reghdr; 1655 1656 ++pim6stat.pim6s_rcv_registers; 1657 1658 if ((reg_mif_num >= nummifs) || (reg_mif_num == (mifi_t) -1)) { 1659 #ifdef MRT6DEBUG 1660 if (mrt6debug & DEBUG_PIM) 1661 log(LOG_DEBUG, 1662 "pim6_input: register mif not set: %d\n", 1663 reg_mif_num); 1664 #endif 1665 m_freem(m); 1666 return (IPPROTO_DONE); 1667 } 1668 1669 reghdr = (u_int32_t *)(pim + 1); 1670 1671 if ((ntohl(*reghdr) & PIM_NULL_REGISTER)) 1672 goto pim6_input_to_daemon; 1673 1674 /* 1675 * Validate length 1676 */ 1677 if (pimlen < PIM6_REG_MINLEN) { 1678 ++pim6stat.pim6s_rcv_tooshort; 1679 ++pim6stat.pim6s_rcv_badregisters; 1680 #ifdef MRT6DEBUG 1681 log(LOG_ERR, 1682 "pim6_input: register packet size too " 1683 "small %d from %s\n", 1684 pimlen, ip6_sprintf(&ip6->ip6_src)); 1685 #endif 1686 m_freem(m); 1687 return (IPPROTO_DONE); 1688 } 1689 1690 eip6 = (struct ip6_hdr *) (reghdr + 1); 1691 #ifdef MRT6DEBUG 1692 if (mrt6debug & DEBUG_PIM) 1693 log(LOG_DEBUG, 1694 "pim6_input[register], eip6: %s -> %s, " 1695 "eip6 plen %d\n", 1696 ip6_sprintf(&eip6->ip6_src), 1697 ip6_sprintf(&eip6->ip6_dst), 1698 ntohs(eip6->ip6_plen)); 1699 #endif 1700 1701 /* verify the version number of the inner packet */ 1702 if ((eip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) { 1703 ++pim6stat.pim6s_rcv_badregisters; 1704 #ifdef MRT6DEBUG 1705 log(LOG_DEBUG, "pim6_input: invalid IP version (%d) " 1706 "of the inner packet\n", 1707 (eip6->ip6_vfc & IPV6_VERSION)); 1708 #endif 1709 m_freem(m); 1710 return (IPPROTO_NONE); 1711 } 1712 1713 /* verify the inner packet is destined to a mcast group */ 1714 if (!IN6_IS_ADDR_MULTICAST(&eip6->ip6_dst)) { 1715 ++pim6stat.pim6s_rcv_badregisters; 1716 #ifdef MRT6DEBUG 1717 if (mrt6debug & DEBUG_PIM) 1718 log(LOG_DEBUG, 1719 "pim6_input: inner packet of register " 1720 "is not multicast %s\n", 1721 ip6_sprintf(&eip6->ip6_dst)); 1722 #endif 1723 m_freem(m); 1724 return (IPPROTO_DONE); 1725 } 1726 1727 /* 1728 * make a copy of the whole header to pass to the daemon later. 1729 */ 1730 mcp = m_copy(m, 0, off + PIM6_REG_MINLEN); 1731 if (mcp == NULL) { 1732 #ifdef MRT6DEBUG 1733 log(LOG_ERR, 1734 "pim6_input: pim register: " 1735 "could not copy register head\n"); 1736 #endif 1737 m_freem(m); 1738 return (IPPROTO_DONE); 1739 } 1740 1741 /* 1742 * forward the inner ip6 packet; point m_data at the inner ip6. 1743 */ 1744 m_adj(m, off + PIM_MINLEN); 1745 #ifdef MRT6DEBUG 1746 if (mrt6debug & DEBUG_PIM) { 1747 log(LOG_DEBUG, 1748 "pim6_input: forwarding decapsulated register: " 1749 "src %s, dst %s, mif %d\n", 1750 ip6_sprintf(&eip6->ip6_src), 1751 ip6_sprintf(&eip6->ip6_dst), 1752 reg_mif_num); 1753 } 1754 #endif 1755 1756 if_simloop(mif6table[reg_mif_num].m6_ifp, m, 1757 dst.sin6_family, 0); 1758 1759 /* prepare the register head to send to the mrouting daemon */ 1760 m = mcp; 1761 } 1762 1763 /* 1764 * Pass the PIM message up to the daemon; if it is a register message 1765 * pass the 'head' only up to the daemon. This includes the 1766 * encapsulator ip6 header, pim header, register header and the 1767 * encapsulated ip6 header. 1768 */ 1769 pim6_input_to_daemon: 1770 rip6_input(&m, offp, proto); 1771 return (IPPROTO_DONE); 1772 } 1773