1 /*- 2 * Copyright (c) 1988 Stephen Deering. 3 * Copyright (c) 1992, 1993 4 * The Regents of the University of California. All rights reserved. 5 * 6 * This code is derived from software contributed to Berkeley by 7 * Stephen Deering of Stanford University. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)igmp.c 8.1 (Berkeley) 7/19/93 34 * $FreeBSD$ 35 */ 36 37 /* 38 * Internet Group Management Protocol (IGMP) routines. 39 * 40 * Written by Steve Deering, Stanford, May 1988. 41 * Modified by Rosen Sharma, Stanford, Aug 1994. 42 * Modified by Bill Fenner, Xerox PARC, Feb 1995. 43 * Modified to fully comply to IGMPv2 by Bill Fenner, Oct 1995. 44 * 45 * MULTICAST Revision: 3.5.1.4 46 */ 47 48 #include "opt_mac.h" 49 50 #include <sys/param.h> 51 #include <sys/systm.h> 52 #include <sys/mac.h> 53 #include <sys/malloc.h> 54 #include <sys/mbuf.h> 55 #include <sys/socket.h> 56 #include <sys/protosw.h> 57 #include <sys/kernel.h> 58 #include <sys/sysctl.h> 59 60 #include <net/if.h> 61 #include <net/route.h> 62 63 #include <netinet/in.h> 64 #include <netinet/in_var.h> 65 #include <netinet/in_systm.h> 66 #include <netinet/ip.h> 67 #include <netinet/ip_var.h> 68 #include <netinet/igmp.h> 69 #include <netinet/igmp_var.h> 70 71 #include <machine/in_cksum.h> 72 73 static MALLOC_DEFINE(M_IGMP, "igmp", "igmp state"); 74 75 static struct router_info *find_rti(struct ifnet *ifp); 76 static void igmp_sendpkt(struct in_multi *, int, unsigned long); 77 78 static struct igmpstat igmpstat; 79 80 SYSCTL_STRUCT(_net_inet_igmp, IGMPCTL_STATS, stats, CTLFLAG_RW, &igmpstat, 81 igmpstat, ""); 82 83 /* 84 * igmp_mtx protects all mutable global variables in igmp.c, as well as 85 * the data fields in struct router_info. In general, a router_info 86 * structure will be valid as long as the referencing struct in_multi is 87 * valid, so no reference counting is used. We allow unlocked reads of 88 * router_info data when accessed via an in_multi read-only. 89 */ 90 static struct mtx igmp_mtx; 91 static SLIST_HEAD(, router_info) router_info_head; 92 static int igmp_timers_are_running; 93 94 /* 95 * XXXRW: can we define these such that these can be made const? In any 96 * case, these shouldn't be changed after igmp_init() and therefore don't 97 * need locking. 98 */ 99 static u_long igmp_all_hosts_group; 100 static u_long igmp_all_rtrs_group; 101 102 static struct mbuf *router_alert; 103 static struct route igmprt; 104 105 #ifdef IGMP_DEBUG 106 #define IGMP_PRINTF(x) printf(x) 107 #else 108 #define IGMP_PRINTF(x) 109 #endif 110 111 void 112 igmp_init(void) 113 { 114 struct ipoption *ra; 115 116 /* 117 * To avoid byte-swapping the same value over and over again. 118 */ 119 igmp_all_hosts_group = htonl(INADDR_ALLHOSTS_GROUP); 120 igmp_all_rtrs_group = htonl(INADDR_ALLRTRS_GROUP); 121 122 igmp_timers_are_running = 0; 123 124 /* 125 * Construct a Router Alert option to use in outgoing packets 126 */ 127 MGET(router_alert, M_DONTWAIT, MT_DATA); 128 ra = mtod(router_alert, struct ipoption *); 129 ra->ipopt_dst.s_addr = 0; 130 ra->ipopt_list[0] = IPOPT_RA; /* Router Alert Option */ 131 ra->ipopt_list[1] = 0x04; /* 4 bytes long */ 132 ra->ipopt_list[2] = 0x00; 133 ra->ipopt_list[3] = 0x00; 134 router_alert->m_len = sizeof(ra->ipopt_dst) + ra->ipopt_list[1]; 135 136 mtx_init(&igmp_mtx, "igmp_mtx", NULL, MTX_DEF); 137 SLIST_INIT(&router_info_head); 138 } 139 140 static struct router_info * 141 find_rti(struct ifnet *ifp) 142 { 143 struct router_info *rti; 144 145 mtx_assert(&igmp_mtx, MA_OWNED); 146 IGMP_PRINTF("[igmp.c, _find_rti] --> entering \n"); 147 SLIST_FOREACH(rti, &router_info_head, rti_list) { 148 if (rti->rti_ifp == ifp) { 149 IGMP_PRINTF( 150 "[igmp.c, _find_rti] --> found old entry \n"); 151 return rti; 152 } 153 } 154 MALLOC(rti, struct router_info *, sizeof *rti, M_IGMP, M_NOWAIT); 155 if (rti == NULL) { 156 IGMP_PRINTF( "[igmp.c, _find_rti] --> no memory for entry\n"); 157 return NULL; 158 } 159 rti->rti_ifp = ifp; 160 rti->rti_type = IGMP_V2_ROUTER; 161 rti->rti_time = 0; 162 SLIST_INSERT_HEAD(&router_info_head, rti, rti_list); 163 164 IGMP_PRINTF("[igmp.c, _find_rti] --> created an entry \n"); 165 return rti; 166 } 167 168 void 169 igmp_input(register struct mbuf *m, int off) 170 { 171 register int iphlen = off; 172 register struct igmp *igmp; 173 register struct ip *ip; 174 register int igmplen; 175 register struct ifnet *ifp = m->m_pkthdr.rcvif; 176 register int minlen; 177 register struct in_multi *inm; 178 register struct in_ifaddr *ia; 179 struct in_multistep step; 180 struct router_info *rti; 181 int timer; /** timer value in the igmp query header **/ 182 183 ++igmpstat.igps_rcv_total; 184 185 ip = mtod(m, struct ip *); 186 igmplen = ip->ip_len; 187 188 /* 189 * Validate lengths 190 */ 191 if (igmplen < IGMP_MINLEN) { 192 ++igmpstat.igps_rcv_tooshort; 193 m_freem(m); 194 return; 195 } 196 minlen = iphlen + IGMP_MINLEN; 197 if ((m->m_flags & M_EXT || m->m_len < minlen) && 198 (m = m_pullup(m, minlen)) == 0) { 199 ++igmpstat.igps_rcv_tooshort; 200 return; 201 } 202 203 /* 204 * Validate checksum 205 */ 206 m->m_data += iphlen; 207 m->m_len -= iphlen; 208 igmp = mtod(m, struct igmp *); 209 if (in_cksum(m, igmplen)) { 210 ++igmpstat.igps_rcv_badsum; 211 m_freem(m); 212 return; 213 } 214 m->m_data -= iphlen; 215 m->m_len += iphlen; 216 217 ip = mtod(m, struct ip *); 218 timer = igmp->igmp_code * PR_FASTHZ / IGMP_TIMER_SCALE; 219 if (timer == 0) 220 timer = 1; 221 222 /* 223 * In the IGMPv2 specification, there are 3 states and a flag. 224 * 225 * In Non-Member state, we simply don't have a membership record. 226 * In Delaying Member state, our timer is running (inm->inm_timer) 227 * In Idle Member state, our timer is not running (inm->inm_timer==0) 228 * 229 * The flag is inm->inm_state, it is set to IGMP_OTHERMEMBER if 230 * we have heard a report from another member, or IGMP_IREPORTEDLAST 231 * if I sent the last report. 232 */ 233 switch (igmp->igmp_type) { 234 case IGMP_MEMBERSHIP_QUERY: 235 ++igmpstat.igps_rcv_queries; 236 237 if (ifp->if_flags & IFF_LOOPBACK) 238 break; 239 240 if (igmp->igmp_code == 0) { 241 /* 242 * Old router. Remember that the querier on this 243 * interface is old, and set the timer to the 244 * value in RFC 1112. 245 */ 246 247 mtx_lock(&igmp_mtx); 248 rti = find_rti(ifp); 249 if (rti == NULL) { 250 mtx_unlock(&igmp_mtx); 251 m_freem(m); 252 return; 253 } 254 rti->rti_type = IGMP_V1_ROUTER; 255 rti->rti_time = 0; 256 mtx_unlock(&igmp_mtx); 257 258 timer = IGMP_MAX_HOST_REPORT_DELAY * PR_FASTHZ; 259 260 if (ip->ip_dst.s_addr != igmp_all_hosts_group || 261 igmp->igmp_group.s_addr != 0) { 262 ++igmpstat.igps_rcv_badqueries; 263 m_freem(m); 264 return; 265 } 266 } else { 267 /* 268 * New router. Simply do the new validity check. 269 */ 270 271 if (igmp->igmp_group.s_addr != 0 && 272 !IN_MULTICAST(ntohl(igmp->igmp_group.s_addr))) { 273 ++igmpstat.igps_rcv_badqueries; 274 m_freem(m); 275 return; 276 } 277 } 278 279 /* 280 * - Start the timers in all of our membership records 281 * that the query applies to for the interface on 282 * which the query arrived excl. those that belong 283 * to the "all-hosts" group (224.0.0.1). 284 * - Restart any timer that is already running but has 285 * a value longer than the requested timeout. 286 * - Use the value specified in the query message as 287 * the maximum timeout. 288 */ 289 IN_FIRST_MULTI(step, inm); 290 while (inm != NULL) { 291 if (inm->inm_ifp == ifp && 292 inm->inm_addr.s_addr != igmp_all_hosts_group && 293 (igmp->igmp_group.s_addr == 0 || 294 igmp->igmp_group.s_addr == inm->inm_addr.s_addr)) { 295 if (inm->inm_timer == 0 || 296 inm->inm_timer > timer) { 297 inm->inm_timer = 298 IGMP_RANDOM_DELAY(timer); 299 igmp_timers_are_running = 1; 300 } 301 } 302 IN_NEXT_MULTI(step, inm); 303 } 304 305 break; 306 307 case IGMP_V1_MEMBERSHIP_REPORT: 308 case IGMP_V2_MEMBERSHIP_REPORT: 309 /* 310 * For fast leave to work, we have to know that we are the 311 * last person to send a report for this group. Reports 312 * can potentially get looped back if we are a multicast 313 * router, so discard reports sourced by me. 314 */ 315 IFP_TO_IA(ifp, ia); 316 if (ia && ip->ip_src.s_addr == IA_SIN(ia)->sin_addr.s_addr) 317 break; 318 319 ++igmpstat.igps_rcv_reports; 320 321 if (ifp->if_flags & IFF_LOOPBACK) 322 break; 323 324 if (!IN_MULTICAST(ntohl(igmp->igmp_group.s_addr))) { 325 ++igmpstat.igps_rcv_badreports; 326 m_freem(m); 327 return; 328 } 329 330 /* 331 * KLUDGE: if the IP source address of the report has an 332 * unspecified (i.e., zero) subnet number, as is allowed for 333 * a booting host, replace it with the correct subnet number 334 * so that a process-level multicast routing daemon can 335 * determine which subnet it arrived from. This is necessary 336 * to compensate for the lack of any way for a process to 337 * determine the arrival interface of an incoming packet. 338 */ 339 if ((ntohl(ip->ip_src.s_addr) & IN_CLASSA_NET) == 0) 340 if (ia) ip->ip_src.s_addr = htonl(ia->ia_subnet); 341 342 /* 343 * If we belong to the group being reported, stop 344 * our timer for that group. 345 */ 346 IN_LOOKUP_MULTI(igmp->igmp_group, ifp, inm); 347 348 if (inm != NULL) { 349 inm->inm_timer = 0; 350 ++igmpstat.igps_rcv_ourreports; 351 352 inm->inm_state = IGMP_OTHERMEMBER; 353 } 354 355 break; 356 } 357 358 /* 359 * Pass all valid IGMP packets up to any process(es) listening 360 * on a raw IGMP socket. 361 */ 362 rip_input(m, off); 363 } 364 365 void 366 igmp_joingroup(struct in_multi *inm) 367 { 368 int s = splnet(); 369 370 if (inm->inm_addr.s_addr == igmp_all_hosts_group 371 || inm->inm_ifp->if_flags & IFF_LOOPBACK) { 372 inm->inm_timer = 0; 373 inm->inm_state = IGMP_OTHERMEMBER; 374 } else { 375 mtx_lock(&igmp_mtx); 376 inm->inm_rti = find_rti(inm->inm_ifp); 377 mtx_unlock(&igmp_mtx); 378 if (inm->inm_rti != NULL) { 379 igmp_sendpkt(inm, inm->inm_rti->rti_type, 0); 380 inm->inm_timer = IGMP_RANDOM_DELAY( 381 IGMP_MAX_HOST_REPORT_DELAY*PR_FASTHZ); 382 inm->inm_state = IGMP_IREPORTEDLAST; 383 igmp_timers_are_running = 1; 384 } 385 /* XXX handling of failure case? */ 386 } 387 splx(s); 388 } 389 390 void 391 igmp_leavegroup(struct in_multi *inm) 392 { 393 394 if (inm->inm_state == IGMP_IREPORTEDLAST && 395 inm->inm_addr.s_addr != igmp_all_hosts_group && 396 !(inm->inm_ifp->if_flags & IFF_LOOPBACK) && 397 inm->inm_rti->rti_type != IGMP_V1_ROUTER) 398 igmp_sendpkt(inm, IGMP_V2_LEAVE_GROUP, igmp_all_rtrs_group); 399 } 400 401 void 402 igmp_fasttimo(void) 403 { 404 register struct in_multi *inm; 405 struct in_multistep step; 406 int s; 407 408 /* 409 * Quick check to see if any work needs to be done, in order 410 * to minimize the overhead of fasttimo processing. 411 */ 412 413 if (!igmp_timers_are_running) 414 return; 415 416 s = splnet(); 417 igmp_timers_are_running = 0; 418 IN_FIRST_MULTI(step, inm); 419 while (inm != NULL) { 420 if (inm->inm_timer == 0) { 421 /* do nothing */ 422 } else if (--inm->inm_timer == 0) { 423 igmp_sendpkt(inm, inm->inm_rti->rti_type, 0); 424 inm->inm_state = IGMP_IREPORTEDLAST; 425 } else { 426 igmp_timers_are_running = 1; 427 } 428 IN_NEXT_MULTI(step, inm); 429 } 430 splx(s); 431 } 432 433 void 434 igmp_slowtimo(void) 435 { 436 int s = splnet(); 437 struct router_info *rti; 438 439 IGMP_PRINTF("[igmp.c,_slowtimo] -- > entering \n"); 440 mtx_lock(&igmp_mtx); 441 SLIST_FOREACH(rti, &router_info_head, rti_list) { 442 if (rti->rti_type == IGMP_V1_ROUTER) { 443 rti->rti_time++; 444 if (rti->rti_time >= IGMP_AGE_THRESHOLD) 445 rti->rti_type = IGMP_V2_ROUTER; 446 } 447 } 448 mtx_unlock(&igmp_mtx); 449 IGMP_PRINTF("[igmp.c,_slowtimo] -- > exiting \n"); 450 splx(s); 451 } 452 453 static void 454 igmp_sendpkt(struct in_multi *inm, int type, unsigned long addr) 455 { 456 struct mbuf *m; 457 struct igmp *igmp; 458 struct ip *ip; 459 struct ip_moptions imo; 460 461 MGETHDR(m, M_DONTWAIT, MT_HEADER); 462 if (m == NULL) 463 return; 464 465 m->m_pkthdr.rcvif = loif; 466 #ifdef MAC 467 mac_create_mbuf_linklayer(inm->inm_ifp, m); 468 #endif 469 m->m_pkthdr.len = sizeof(struct ip) + IGMP_MINLEN; 470 MH_ALIGN(m, IGMP_MINLEN + sizeof(struct ip)); 471 m->m_data += sizeof(struct ip); 472 m->m_len = IGMP_MINLEN; 473 igmp = mtod(m, struct igmp *); 474 igmp->igmp_type = type; 475 igmp->igmp_code = 0; 476 igmp->igmp_group = inm->inm_addr; 477 igmp->igmp_cksum = 0; 478 igmp->igmp_cksum = in_cksum(m, IGMP_MINLEN); 479 480 m->m_data -= sizeof(struct ip); 481 m->m_len += sizeof(struct ip); 482 ip = mtod(m, struct ip *); 483 ip->ip_tos = 0; 484 ip->ip_len = sizeof(struct ip) + IGMP_MINLEN; 485 ip->ip_off = 0; 486 ip->ip_p = IPPROTO_IGMP; 487 ip->ip_src.s_addr = INADDR_ANY; 488 ip->ip_dst.s_addr = addr ? addr : igmp->igmp_group.s_addr; 489 490 imo.imo_multicast_ifp = inm->inm_ifp; 491 imo.imo_multicast_ttl = 1; 492 imo.imo_multicast_vif = -1; 493 /* 494 * Request loopback of the report if we are acting as a multicast 495 * router, so that the process-level routing daemon can hear it. 496 */ 497 imo.imo_multicast_loop = (ip_mrouter != NULL); 498 499 /* 500 * XXX 501 * Do we have to worry about reentrancy here? Don't think so. 502 */ 503 ip_output(m, router_alert, &igmprt, 0, &imo, NULL); 504 505 ++igmpstat.igps_snd_reports; 506 } 507