igmp.c 63 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678
  1. /*
  2. * Linux NET3: Internet Group Management Protocol [IGMP]
  3. *
  4. * This code implements the IGMP protocol as defined in RFC1112. There has
  5. * been a further revision of this protocol since which is now supported.
  6. *
  7. * If you have trouble with this module be careful what gcc you have used,
  8. * the older version didn't come out right using gcc 2.5.8, the newer one
  9. * seems to fall out with gcc 2.6.2.
  10. *
  11. * Authors:
  12. * Alan Cox <alan@lxorguk.ukuu.org.uk>
  13. *
  14. * This program is free software; you can redistribute it and/or
  15. * modify it under the terms of the GNU General Public License
  16. * as published by the Free Software Foundation; either version
  17. * 2 of the License, or (at your option) any later version.
  18. *
  19. * Fixes:
  20. *
  21. * Alan Cox : Added lots of __inline__ to optimise
  22. * the memory usage of all the tiny little
  23. * functions.
  24. * Alan Cox : Dumped the header building experiment.
  25. * Alan Cox : Minor tweaks ready for multicast routing
  26. * and extended IGMP protocol.
  27. * Alan Cox : Removed a load of inline directives. Gcc 2.5.8
  28. * writes utterly bogus code otherwise (sigh)
  29. * fixed IGMP loopback to behave in the manner
  30. * desired by mrouted, fixed the fact it has been
  31. * broken since 1.3.6 and cleaned up a few minor
  32. * points.
  33. *
  34. * Chih-Jen Chang : Tried to revise IGMP to Version 2
  35. * Tsu-Sheng Tsao E-mail: chihjenc@scf.usc.edu and tsusheng@scf.usc.edu
  36. * The enhancements are mainly based on Steve Deering's
  37. * ipmulti-3.5 source code.
  38. * Chih-Jen Chang : Added the igmp_get_mrouter_info and
  39. * Tsu-Sheng Tsao igmp_set_mrouter_info to keep track of
  40. * the mrouted version on that device.
  41. * Chih-Jen Chang : Added the max_resp_time parameter to
  42. * Tsu-Sheng Tsao igmp_heard_query(). Using this parameter
  43. * to identify the multicast router version
  44. * and do what the IGMP version 2 specified.
  45. * Chih-Jen Chang : Added a timer to revert to IGMP V2 router
  46. * Tsu-Sheng Tsao if the specified time expired.
  47. * Alan Cox : Stop IGMP from 0.0.0.0 being accepted.
  48. * Alan Cox : Use GFP_ATOMIC in the right places.
  49. * Christian Daudt : igmp timer wasn't set for local group
  50. * memberships but was being deleted,
  51. * which caused a "del_timer() called
  52. * from %p with timer not initialized\n"
  53. * message (960131).
  54. * Christian Daudt : removed del_timer from
  55. * igmp_timer_expire function (960205).
  56. * Christian Daudt : igmp_heard_report now only calls
  57. * igmp_timer_expire if tm->running is
  58. * true (960216).
  59. * Malcolm Beattie : ttl comparison wrong in igmp_rcv made
  60. * igmp_heard_query never trigger. Expiry
  61. * miscalculation fixed in igmp_heard_query
  62. * and random() made to return unsigned to
  63. * prevent negative expiry times.
  64. * Alexey Kuznetsov: Wrong group leaving behaviour, backport
  65. * fix from pending 2.1.x patches.
  66. * Alan Cox: Forget to enable FDDI support earlier.
  67. * Alexey Kuznetsov: Fixed leaving groups on device down.
  68. * Alexey Kuznetsov: Accordance to igmp-v2-06 draft.
  69. * David L Stevens: IGMPv3 support, with help from
  70. * Vinay Kulkarni
  71. */
  72. #include <linux/module.h>
  73. #include <linux/slab.h>
  74. #include <asm/uaccess.h>
  75. #include <linux/types.h>
  76. #include <linux/kernel.h>
  77. #include <linux/jiffies.h>
  78. #include <linux/string.h>
  79. #include <linux/socket.h>
  80. #include <linux/sockios.h>
  81. #include <linux/in.h>
  82. #include <linux/inet.h>
  83. #include <linux/netdevice.h>
  84. #include <linux/skbuff.h>
  85. #include <linux/inetdevice.h>
  86. #include <linux/igmp.h>
  87. #include <linux/if_arp.h>
  88. #include <linux/rtnetlink.h>
  89. #include <linux/times.h>
  90. #include <net/net_namespace.h>
  91. #include <net/arp.h>
  92. #include <net/ip.h>
  93. #include <net/protocol.h>
  94. #include <net/route.h>
  95. #include <net/sock.h>
  96. #include <net/checksum.h>
  97. #include <linux/netfilter_ipv4.h>
  98. #ifdef CONFIG_IP_MROUTE
  99. #include <linux/mroute.h>
  100. #endif
  101. #ifdef CONFIG_PROC_FS
  102. #include <linux/proc_fs.h>
  103. #include <linux/seq_file.h>
  104. #endif
  105. #define IP_MAX_MEMBERSHIPS 20
  106. #define IP_MAX_MSF 10
  107. #ifdef CONFIG_IP_MULTICAST
  108. /* Parameter names and values are taken from igmp-v2-06 draft */
  109. #define IGMP_V1_Router_Present_Timeout (400*HZ)
  110. #define IGMP_V2_Router_Present_Timeout (400*HZ)
  111. #define IGMP_Unsolicited_Report_Interval (10*HZ)
  112. #define IGMP_Query_Response_Interval (10*HZ)
  113. #define IGMP_Unsolicited_Report_Count 2
  114. #define IGMP_Initial_Report_Delay (1)
  115. /* IGMP_Initial_Report_Delay is not from IGMP specs!
  116. * IGMP specs require to report membership immediately after
  117. * joining a group, but we delay the first report by a
  118. * small interval. It seems more natural and still does not
  119. * contradict to specs provided this delay is small enough.
  120. */
  121. #define IGMP_V1_SEEN(in_dev) \
  122. (IPV4_DEVCONF_ALL(dev_net(in_dev->dev), FORCE_IGMP_VERSION) == 1 || \
  123. IN_DEV_CONF_GET((in_dev), FORCE_IGMP_VERSION) == 1 || \
  124. ((in_dev)->mr_v1_seen && \
  125. time_before(jiffies, (in_dev)->mr_v1_seen)))
  126. #define IGMP_V2_SEEN(in_dev) \
  127. (IPV4_DEVCONF_ALL(dev_net(in_dev->dev), FORCE_IGMP_VERSION) == 2 || \
  128. IN_DEV_CONF_GET((in_dev), FORCE_IGMP_VERSION) == 2 || \
  129. ((in_dev)->mr_v2_seen && \
  130. time_before(jiffies, (in_dev)->mr_v2_seen)))
  131. static void igmpv3_add_delrec(struct in_device *in_dev, struct ip_mc_list *im);
  132. static void igmpv3_del_delrec(struct in_device *in_dev, __be32 multiaddr);
  133. static void igmpv3_clear_delrec(struct in_device *in_dev);
  134. static int sf_setstate(struct ip_mc_list *pmc);
  135. static void sf_markstate(struct ip_mc_list *pmc);
  136. #endif
  137. static void ip_mc_clear_src(struct ip_mc_list *pmc);
  138. static int ip_mc_add_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
  139. int sfcount, __be32 *psfsrc, int delta);
  140. static void ip_ma_put(struct ip_mc_list *im)
  141. {
  142. if (atomic_dec_and_test(&im->refcnt)) {
  143. in_dev_put(im->interface);
  144. kfree_rcu(im, rcu);
  145. }
  146. }
  147. #define for_each_pmc_rcu(in_dev, pmc) \
  148. for (pmc = rcu_dereference(in_dev->mc_list); \
  149. pmc != NULL; \
  150. pmc = rcu_dereference(pmc->next_rcu))
  151. #define for_each_pmc_rtnl(in_dev, pmc) \
  152. for (pmc = rtnl_dereference(in_dev->mc_list); \
  153. pmc != NULL; \
  154. pmc = rtnl_dereference(pmc->next_rcu))
  155. #ifdef CONFIG_IP_MULTICAST
  156. /*
  157. * Timer management
  158. */
  159. static void igmp_stop_timer(struct ip_mc_list *im)
  160. {
  161. spin_lock_bh(&im->lock);
  162. if (del_timer(&im->timer))
  163. atomic_dec(&im->refcnt);
  164. im->tm_running = 0;
  165. im->reporter = 0;
  166. im->unsolicit_count = 0;
  167. spin_unlock_bh(&im->lock);
  168. }
  169. /* It must be called with locked im->lock */
  170. static void igmp_start_timer(struct ip_mc_list *im, int max_delay)
  171. {
  172. int tv = net_random() % max_delay;
  173. im->tm_running = 1;
  174. if (!mod_timer(&im->timer, jiffies+tv+2))
  175. atomic_inc(&im->refcnt);
  176. }
  177. static void igmp_gq_start_timer(struct in_device *in_dev)
  178. {
  179. int tv = net_random() % in_dev->mr_maxdelay;
  180. in_dev->mr_gq_running = 1;
  181. if (!mod_timer(&in_dev->mr_gq_timer, jiffies+tv+2))
  182. in_dev_hold(in_dev);
  183. }
  184. static void igmp_ifc_start_timer(struct in_device *in_dev, int delay)
  185. {
  186. int tv = net_random() % delay;
  187. if (!mod_timer(&in_dev->mr_ifc_timer, jiffies+tv+2))
  188. in_dev_hold(in_dev);
  189. }
  190. static void igmp_mod_timer(struct ip_mc_list *im, int max_delay)
  191. {
  192. spin_lock_bh(&im->lock);
  193. im->unsolicit_count = 0;
  194. if (del_timer(&im->timer)) {
  195. if ((long)(im->timer.expires-jiffies) < max_delay) {
  196. add_timer(&im->timer);
  197. im->tm_running = 1;
  198. spin_unlock_bh(&im->lock);
  199. return;
  200. }
  201. atomic_dec(&im->refcnt);
  202. }
  203. igmp_start_timer(im, max_delay);
  204. spin_unlock_bh(&im->lock);
  205. }
  206. /*
  207. * Send an IGMP report.
  208. */
  209. #define IGMP_SIZE (sizeof(struct igmphdr)+sizeof(struct iphdr)+4)
  210. static int is_in(struct ip_mc_list *pmc, struct ip_sf_list *psf, int type,
  211. int gdeleted, int sdeleted)
  212. {
  213. switch (type) {
  214. case IGMPV3_MODE_IS_INCLUDE:
  215. case IGMPV3_MODE_IS_EXCLUDE:
  216. if (gdeleted || sdeleted)
  217. return 0;
  218. if (!(pmc->gsquery && !psf->sf_gsresp)) {
  219. if (pmc->sfmode == MCAST_INCLUDE)
  220. return 1;
  221. /* don't include if this source is excluded
  222. * in all filters
  223. */
  224. if (psf->sf_count[MCAST_INCLUDE])
  225. return type == IGMPV3_MODE_IS_INCLUDE;
  226. return pmc->sfcount[MCAST_EXCLUDE] ==
  227. psf->sf_count[MCAST_EXCLUDE];
  228. }
  229. return 0;
  230. case IGMPV3_CHANGE_TO_INCLUDE:
  231. if (gdeleted || sdeleted)
  232. return 0;
  233. return psf->sf_count[MCAST_INCLUDE] != 0;
  234. case IGMPV3_CHANGE_TO_EXCLUDE:
  235. if (gdeleted || sdeleted)
  236. return 0;
  237. if (pmc->sfcount[MCAST_EXCLUDE] == 0 ||
  238. psf->sf_count[MCAST_INCLUDE])
  239. return 0;
  240. return pmc->sfcount[MCAST_EXCLUDE] ==
  241. psf->sf_count[MCAST_EXCLUDE];
  242. case IGMPV3_ALLOW_NEW_SOURCES:
  243. if (gdeleted || !psf->sf_crcount)
  244. return 0;
  245. return (pmc->sfmode == MCAST_INCLUDE) ^ sdeleted;
  246. case IGMPV3_BLOCK_OLD_SOURCES:
  247. if (pmc->sfmode == MCAST_INCLUDE)
  248. return gdeleted || (psf->sf_crcount && sdeleted);
  249. return psf->sf_crcount && !gdeleted && !sdeleted;
  250. }
  251. return 0;
  252. }
  253. static int
  254. igmp_scount(struct ip_mc_list *pmc, int type, int gdeleted, int sdeleted)
  255. {
  256. struct ip_sf_list *psf;
  257. int scount = 0;
  258. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  259. if (!is_in(pmc, psf, type, gdeleted, sdeleted))
  260. continue;
  261. scount++;
  262. }
  263. return scount;
  264. }
  265. #define igmp_skb_size(skb) (*(unsigned int *)((skb)->cb))
  266. static struct sk_buff *igmpv3_newpack(struct net_device *dev, int size)
  267. {
  268. struct sk_buff *skb;
  269. struct rtable *rt;
  270. struct iphdr *pip;
  271. struct igmpv3_report *pig;
  272. struct net *net = dev_net(dev);
  273. struct flowi4 fl4;
  274. int hlen = LL_RESERVED_SPACE(dev);
  275. int tlen = dev->needed_tailroom;
  276. while (1) {
  277. skb = alloc_skb(size + hlen + tlen,
  278. GFP_ATOMIC | __GFP_NOWARN);
  279. if (skb)
  280. break;
  281. size >>= 1;
  282. if (size < 256)
  283. return NULL;
  284. }
  285. igmp_skb_size(skb) = size;
  286. rt = ip_route_output_ports(net, &fl4, NULL, IGMPV3_ALL_MCR, 0,
  287. 0, 0,
  288. IPPROTO_IGMP, 0, dev->ifindex);
  289. if (IS_ERR(rt)) {
  290. kfree_skb(skb);
  291. return NULL;
  292. }
  293. skb_dst_set(skb, &rt->dst);
  294. skb->dev = dev;
  295. skb_reserve(skb, hlen);
  296. skb_reset_network_header(skb);
  297. pip = ip_hdr(skb);
  298. skb_put(skb, sizeof(struct iphdr) + 4);
  299. pip->version = 4;
  300. pip->ihl = (sizeof(struct iphdr)+4)>>2;
  301. pip->tos = 0xc0;
  302. pip->frag_off = htons(IP_DF);
  303. pip->ttl = 1;
  304. pip->daddr = fl4.daddr;
  305. pip->saddr = fl4.saddr;
  306. pip->protocol = IPPROTO_IGMP;
  307. pip->tot_len = 0; /* filled in later */
  308. ip_select_ident(pip, &rt->dst, NULL);
  309. ((u8 *)&pip[1])[0] = IPOPT_RA;
  310. ((u8 *)&pip[1])[1] = 4;
  311. ((u8 *)&pip[1])[2] = 0;
  312. ((u8 *)&pip[1])[3] = 0;
  313. skb->transport_header = skb->network_header + sizeof(struct iphdr) + 4;
  314. skb_put(skb, sizeof(*pig));
  315. pig = igmpv3_report_hdr(skb);
  316. pig->type = IGMPV3_HOST_MEMBERSHIP_REPORT;
  317. pig->resv1 = 0;
  318. pig->csum = 0;
  319. pig->resv2 = 0;
  320. pig->ngrec = 0;
  321. return skb;
  322. }
  323. static int igmpv3_sendpack(struct sk_buff *skb)
  324. {
  325. struct igmphdr *pig = igmp_hdr(skb);
  326. const int igmplen = skb->tail - skb->transport_header;
  327. pig->csum = ip_compute_csum(igmp_hdr(skb), igmplen);
  328. return ip_local_out(skb);
  329. }
  330. static int grec_size(struct ip_mc_list *pmc, int type, int gdel, int sdel)
  331. {
  332. return sizeof(struct igmpv3_grec) + 4*igmp_scount(pmc, type, gdel, sdel);
  333. }
  334. static struct sk_buff *add_grhead(struct sk_buff *skb, struct ip_mc_list *pmc,
  335. int type, struct igmpv3_grec **ppgr)
  336. {
  337. struct net_device *dev = pmc->interface->dev;
  338. struct igmpv3_report *pih;
  339. struct igmpv3_grec *pgr;
  340. if (!skb)
  341. skb = igmpv3_newpack(dev, dev->mtu);
  342. if (!skb)
  343. return NULL;
  344. pgr = (struct igmpv3_grec *)skb_put(skb, sizeof(struct igmpv3_grec));
  345. pgr->grec_type = type;
  346. pgr->grec_auxwords = 0;
  347. pgr->grec_nsrcs = 0;
  348. pgr->grec_mca = pmc->multiaddr;
  349. pih = igmpv3_report_hdr(skb);
  350. pih->ngrec = htons(ntohs(pih->ngrec)+1);
  351. *ppgr = pgr;
  352. return skb;
  353. }
  354. #define AVAILABLE(skb) ((skb) ? ((skb)->dev ? igmp_skb_size(skb) - (skb)->len : \
  355. skb_tailroom(skb)) : 0)
  356. static struct sk_buff *add_grec(struct sk_buff *skb, struct ip_mc_list *pmc,
  357. int type, int gdeleted, int sdeleted)
  358. {
  359. struct net_device *dev = pmc->interface->dev;
  360. struct igmpv3_report *pih;
  361. struct igmpv3_grec *pgr = NULL;
  362. struct ip_sf_list *psf, *psf_next, *psf_prev, **psf_list;
  363. int scount, stotal, first, isquery, truncate;
  364. if (pmc->multiaddr == IGMP_ALL_HOSTS)
  365. return skb;
  366. isquery = type == IGMPV3_MODE_IS_INCLUDE ||
  367. type == IGMPV3_MODE_IS_EXCLUDE;
  368. truncate = type == IGMPV3_MODE_IS_EXCLUDE ||
  369. type == IGMPV3_CHANGE_TO_EXCLUDE;
  370. stotal = scount = 0;
  371. psf_list = sdeleted ? &pmc->tomb : &pmc->sources;
  372. if (!*psf_list)
  373. goto empty_source;
  374. pih = skb ? igmpv3_report_hdr(skb) : NULL;
  375. /* EX and TO_EX get a fresh packet, if needed */
  376. if (truncate) {
  377. if (pih && pih->ngrec &&
  378. AVAILABLE(skb) < grec_size(pmc, type, gdeleted, sdeleted)) {
  379. if (skb)
  380. igmpv3_sendpack(skb);
  381. skb = igmpv3_newpack(dev, dev->mtu);
  382. }
  383. }
  384. first = 1;
  385. psf_prev = NULL;
  386. for (psf=*psf_list; psf; psf=psf_next) {
  387. __be32 *psrc;
  388. psf_next = psf->sf_next;
  389. if (!is_in(pmc, psf, type, gdeleted, sdeleted)) {
  390. psf_prev = psf;
  391. continue;
  392. }
  393. /* clear marks on query responses */
  394. if (isquery)
  395. psf->sf_gsresp = 0;
  396. if (AVAILABLE(skb) < sizeof(__be32) +
  397. first*sizeof(struct igmpv3_grec)) {
  398. if (truncate && !first)
  399. break; /* truncate these */
  400. if (pgr)
  401. pgr->grec_nsrcs = htons(scount);
  402. if (skb)
  403. igmpv3_sendpack(skb);
  404. skb = igmpv3_newpack(dev, dev->mtu);
  405. first = 1;
  406. scount = 0;
  407. }
  408. if (first) {
  409. skb = add_grhead(skb, pmc, type, &pgr);
  410. first = 0;
  411. }
  412. if (!skb)
  413. return NULL;
  414. psrc = (__be32 *)skb_put(skb, sizeof(__be32));
  415. *psrc = psf->sf_inaddr;
  416. scount++; stotal++;
  417. if ((type == IGMPV3_ALLOW_NEW_SOURCES ||
  418. type == IGMPV3_BLOCK_OLD_SOURCES) && psf->sf_crcount) {
  419. psf->sf_crcount--;
  420. if ((sdeleted || gdeleted) && psf->sf_crcount == 0) {
  421. if (psf_prev)
  422. psf_prev->sf_next = psf->sf_next;
  423. else
  424. *psf_list = psf->sf_next;
  425. kfree(psf);
  426. continue;
  427. }
  428. }
  429. psf_prev = psf;
  430. }
  431. empty_source:
  432. if (!stotal) {
  433. if (type == IGMPV3_ALLOW_NEW_SOURCES ||
  434. type == IGMPV3_BLOCK_OLD_SOURCES)
  435. return skb;
  436. if (pmc->crcount || isquery) {
  437. /* make sure we have room for group header */
  438. if (skb && AVAILABLE(skb)<sizeof(struct igmpv3_grec)) {
  439. igmpv3_sendpack(skb);
  440. skb = NULL; /* add_grhead will get a new one */
  441. }
  442. skb = add_grhead(skb, pmc, type, &pgr);
  443. }
  444. }
  445. if (pgr)
  446. pgr->grec_nsrcs = htons(scount);
  447. if (isquery)
  448. pmc->gsquery = 0; /* clear query state on report */
  449. return skb;
  450. }
  451. static int igmpv3_send_report(struct in_device *in_dev, struct ip_mc_list *pmc)
  452. {
  453. struct sk_buff *skb = NULL;
  454. int type;
  455. if (!pmc) {
  456. rcu_read_lock();
  457. for_each_pmc_rcu(in_dev, pmc) {
  458. if (pmc->multiaddr == IGMP_ALL_HOSTS)
  459. continue;
  460. spin_lock_bh(&pmc->lock);
  461. if (pmc->sfcount[MCAST_EXCLUDE])
  462. type = IGMPV3_MODE_IS_EXCLUDE;
  463. else
  464. type = IGMPV3_MODE_IS_INCLUDE;
  465. skb = add_grec(skb, pmc, type, 0, 0);
  466. spin_unlock_bh(&pmc->lock);
  467. }
  468. rcu_read_unlock();
  469. } else {
  470. spin_lock_bh(&pmc->lock);
  471. if (pmc->sfcount[MCAST_EXCLUDE])
  472. type = IGMPV3_MODE_IS_EXCLUDE;
  473. else
  474. type = IGMPV3_MODE_IS_INCLUDE;
  475. skb = add_grec(skb, pmc, type, 0, 0);
  476. spin_unlock_bh(&pmc->lock);
  477. }
  478. if (!skb)
  479. return 0;
  480. return igmpv3_sendpack(skb);
  481. }
  482. /*
  483. * remove zero-count source records from a source filter list
  484. */
  485. static void igmpv3_clear_zeros(struct ip_sf_list **ppsf)
  486. {
  487. struct ip_sf_list *psf_prev, *psf_next, *psf;
  488. psf_prev = NULL;
  489. for (psf=*ppsf; psf; psf = psf_next) {
  490. psf_next = psf->sf_next;
  491. if (psf->sf_crcount == 0) {
  492. if (psf_prev)
  493. psf_prev->sf_next = psf->sf_next;
  494. else
  495. *ppsf = psf->sf_next;
  496. kfree(psf);
  497. } else
  498. psf_prev = psf;
  499. }
  500. }
  501. static void igmpv3_send_cr(struct in_device *in_dev)
  502. {
  503. struct ip_mc_list *pmc, *pmc_prev, *pmc_next;
  504. struct sk_buff *skb = NULL;
  505. int type, dtype;
  506. rcu_read_lock();
  507. spin_lock_bh(&in_dev->mc_tomb_lock);
  508. /* deleted MCA's */
  509. pmc_prev = NULL;
  510. for (pmc=in_dev->mc_tomb; pmc; pmc=pmc_next) {
  511. pmc_next = pmc->next;
  512. if (pmc->sfmode == MCAST_INCLUDE) {
  513. type = IGMPV3_BLOCK_OLD_SOURCES;
  514. dtype = IGMPV3_BLOCK_OLD_SOURCES;
  515. skb = add_grec(skb, pmc, type, 1, 0);
  516. skb = add_grec(skb, pmc, dtype, 1, 1);
  517. }
  518. if (pmc->crcount) {
  519. if (pmc->sfmode == MCAST_EXCLUDE) {
  520. type = IGMPV3_CHANGE_TO_INCLUDE;
  521. skb = add_grec(skb, pmc, type, 1, 0);
  522. }
  523. pmc->crcount--;
  524. if (pmc->crcount == 0) {
  525. igmpv3_clear_zeros(&pmc->tomb);
  526. igmpv3_clear_zeros(&pmc->sources);
  527. }
  528. }
  529. if (pmc->crcount == 0 && !pmc->tomb && !pmc->sources) {
  530. if (pmc_prev)
  531. pmc_prev->next = pmc_next;
  532. else
  533. in_dev->mc_tomb = pmc_next;
  534. in_dev_put(pmc->interface);
  535. kfree(pmc);
  536. } else
  537. pmc_prev = pmc;
  538. }
  539. spin_unlock_bh(&in_dev->mc_tomb_lock);
  540. /* change recs */
  541. for_each_pmc_rcu(in_dev, pmc) {
  542. spin_lock_bh(&pmc->lock);
  543. if (pmc->sfcount[MCAST_EXCLUDE]) {
  544. type = IGMPV3_BLOCK_OLD_SOURCES;
  545. dtype = IGMPV3_ALLOW_NEW_SOURCES;
  546. } else {
  547. type = IGMPV3_ALLOW_NEW_SOURCES;
  548. dtype = IGMPV3_BLOCK_OLD_SOURCES;
  549. }
  550. skb = add_grec(skb, pmc, type, 0, 0);
  551. skb = add_grec(skb, pmc, dtype, 0, 1); /* deleted sources */
  552. /* filter mode changes */
  553. if (pmc->crcount) {
  554. if (pmc->sfmode == MCAST_EXCLUDE)
  555. type = IGMPV3_CHANGE_TO_EXCLUDE;
  556. else
  557. type = IGMPV3_CHANGE_TO_INCLUDE;
  558. skb = add_grec(skb, pmc, type, 0, 0);
  559. pmc->crcount--;
  560. }
  561. spin_unlock_bh(&pmc->lock);
  562. }
  563. rcu_read_unlock();
  564. if (!skb)
  565. return;
  566. (void) igmpv3_sendpack(skb);
  567. }
  568. static int igmp_send_report(struct in_device *in_dev, struct ip_mc_list *pmc,
  569. int type)
  570. {
  571. struct sk_buff *skb;
  572. struct iphdr *iph;
  573. struct igmphdr *ih;
  574. struct rtable *rt;
  575. struct net_device *dev = in_dev->dev;
  576. struct net *net = dev_net(dev);
  577. __be32 group = pmc ? pmc->multiaddr : 0;
  578. struct flowi4 fl4;
  579. __be32 dst;
  580. int hlen, tlen;
  581. if (type == IGMPV3_HOST_MEMBERSHIP_REPORT)
  582. return igmpv3_send_report(in_dev, pmc);
  583. else if (type == IGMP_HOST_LEAVE_MESSAGE)
  584. dst = IGMP_ALL_ROUTER;
  585. else
  586. dst = group;
  587. rt = ip_route_output_ports(net, &fl4, NULL, dst, 0,
  588. 0, 0,
  589. IPPROTO_IGMP, 0, dev->ifindex);
  590. if (IS_ERR(rt))
  591. return -1;
  592. hlen = LL_RESERVED_SPACE(dev);
  593. tlen = dev->needed_tailroom;
  594. skb = alloc_skb(IGMP_SIZE + hlen + tlen, GFP_ATOMIC);
  595. if (skb == NULL) {
  596. ip_rt_put(rt);
  597. return -1;
  598. }
  599. skb_dst_set(skb, &rt->dst);
  600. skb_reserve(skb, hlen);
  601. skb_reset_network_header(skb);
  602. iph = ip_hdr(skb);
  603. skb_put(skb, sizeof(struct iphdr) + 4);
  604. iph->version = 4;
  605. iph->ihl = (sizeof(struct iphdr)+4)>>2;
  606. iph->tos = 0xc0;
  607. iph->frag_off = htons(IP_DF);
  608. iph->ttl = 1;
  609. iph->daddr = dst;
  610. iph->saddr = fl4.saddr;
  611. iph->protocol = IPPROTO_IGMP;
  612. ip_select_ident(iph, &rt->dst, NULL);
  613. ((u8 *)&iph[1])[0] = IPOPT_RA;
  614. ((u8 *)&iph[1])[1] = 4;
  615. ((u8 *)&iph[1])[2] = 0;
  616. ((u8 *)&iph[1])[3] = 0;
  617. ih = (struct igmphdr *)skb_put(skb, sizeof(struct igmphdr));
  618. ih->type = type;
  619. ih->code = 0;
  620. ih->csum = 0;
  621. ih->group = group;
  622. ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
  623. return ip_local_out(skb);
  624. }
  625. static void igmp_gq_timer_expire(unsigned long data)
  626. {
  627. struct in_device *in_dev = (struct in_device *)data;
  628. in_dev->mr_gq_running = 0;
  629. igmpv3_send_report(in_dev, NULL);
  630. __in_dev_put(in_dev);
  631. }
  632. static void igmp_ifc_timer_expire(unsigned long data)
  633. {
  634. struct in_device *in_dev = (struct in_device *)data;
  635. igmpv3_send_cr(in_dev);
  636. if (in_dev->mr_ifc_count) {
  637. in_dev->mr_ifc_count--;
  638. igmp_ifc_start_timer(in_dev, IGMP_Unsolicited_Report_Interval);
  639. }
  640. __in_dev_put(in_dev);
  641. }
  642. static void igmp_ifc_event(struct in_device *in_dev)
  643. {
  644. if (IGMP_V1_SEEN(in_dev) || IGMP_V2_SEEN(in_dev))
  645. return;
  646. in_dev->mr_ifc_count = in_dev->mr_qrv ? in_dev->mr_qrv :
  647. IGMP_Unsolicited_Report_Count;
  648. igmp_ifc_start_timer(in_dev, 1);
  649. }
  650. static void igmp_timer_expire(unsigned long data)
  651. {
  652. struct ip_mc_list *im=(struct ip_mc_list *)data;
  653. struct in_device *in_dev = im->interface;
  654. spin_lock(&im->lock);
  655. im->tm_running = 0;
  656. if (im->unsolicit_count) {
  657. im->unsolicit_count--;
  658. igmp_start_timer(im, IGMP_Unsolicited_Report_Interval);
  659. }
  660. im->reporter = 1;
  661. spin_unlock(&im->lock);
  662. if (IGMP_V1_SEEN(in_dev))
  663. igmp_send_report(in_dev, im, IGMP_HOST_MEMBERSHIP_REPORT);
  664. else if (IGMP_V2_SEEN(in_dev))
  665. igmp_send_report(in_dev, im, IGMPV2_HOST_MEMBERSHIP_REPORT);
  666. else
  667. igmp_send_report(in_dev, im, IGMPV3_HOST_MEMBERSHIP_REPORT);
  668. ip_ma_put(im);
  669. }
  670. /* mark EXCLUDE-mode sources */
  671. static int igmp_xmarksources(struct ip_mc_list *pmc, int nsrcs, __be32 *srcs)
  672. {
  673. struct ip_sf_list *psf;
  674. int i, scount;
  675. scount = 0;
  676. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  677. if (scount == nsrcs)
  678. break;
  679. for (i=0; i<nsrcs; i++) {
  680. /* skip inactive filters */
  681. if (psf->sf_count[MCAST_INCLUDE] ||
  682. pmc->sfcount[MCAST_EXCLUDE] !=
  683. psf->sf_count[MCAST_EXCLUDE])
  684. break;
  685. if (srcs[i] == psf->sf_inaddr) {
  686. scount++;
  687. break;
  688. }
  689. }
  690. }
  691. pmc->gsquery = 0;
  692. if (scount == nsrcs) /* all sources excluded */
  693. return 0;
  694. return 1;
  695. }
  696. static int igmp_marksources(struct ip_mc_list *pmc, int nsrcs, __be32 *srcs)
  697. {
  698. struct ip_sf_list *psf;
  699. int i, scount;
  700. if (pmc->sfmode == MCAST_EXCLUDE)
  701. return igmp_xmarksources(pmc, nsrcs, srcs);
  702. /* mark INCLUDE-mode sources */
  703. scount = 0;
  704. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  705. if (scount == nsrcs)
  706. break;
  707. for (i=0; i<nsrcs; i++)
  708. if (srcs[i] == psf->sf_inaddr) {
  709. psf->sf_gsresp = 1;
  710. scount++;
  711. break;
  712. }
  713. }
  714. if (!scount) {
  715. pmc->gsquery = 0;
  716. return 0;
  717. }
  718. pmc->gsquery = 1;
  719. return 1;
  720. }
  721. /* return true if packet was dropped */
  722. static bool igmp_heard_report(struct in_device *in_dev, __be32 group)
  723. {
  724. struct ip_mc_list *im;
  725. /* Timers are only set for non-local groups */
  726. if (group == IGMP_ALL_HOSTS)
  727. return false;
  728. rcu_read_lock();
  729. for_each_pmc_rcu(in_dev, im) {
  730. if (im->multiaddr == group) {
  731. igmp_stop_timer(im);
  732. break;
  733. }
  734. }
  735. rcu_read_unlock();
  736. return false;
  737. }
  738. /* return true if packet was dropped */
  739. static bool igmp_heard_query(struct in_device *in_dev, struct sk_buff *skb,
  740. int len)
  741. {
  742. struct igmphdr *ih = igmp_hdr(skb);
  743. struct igmpv3_query *ih3 = igmpv3_query_hdr(skb);
  744. struct ip_mc_list *im;
  745. __be32 group = ih->group;
  746. int max_delay;
  747. int mark = 0;
  748. if (len == 8) {
  749. if (ih->code == 0) {
  750. /* Alas, old v1 router presents here. */
  751. max_delay = IGMP_Query_Response_Interval;
  752. in_dev->mr_v1_seen = jiffies +
  753. IGMP_V1_Router_Present_Timeout;
  754. group = 0;
  755. } else {
  756. /* v2 router present */
  757. max_delay = ih->code*(HZ/IGMP_TIMER_SCALE);
  758. in_dev->mr_v2_seen = jiffies +
  759. IGMP_V2_Router_Present_Timeout;
  760. }
  761. /* cancel the interface change timer */
  762. in_dev->mr_ifc_count = 0;
  763. if (del_timer(&in_dev->mr_ifc_timer))
  764. __in_dev_put(in_dev);
  765. /* clear deleted report items */
  766. igmpv3_clear_delrec(in_dev);
  767. } else if (len < 12) {
  768. return true; /* ignore bogus packet; freed by caller */
  769. } else if (IGMP_V1_SEEN(in_dev)) {
  770. /* This is a v3 query with v1 queriers present */
  771. max_delay = IGMP_Query_Response_Interval;
  772. group = 0;
  773. } else if (IGMP_V2_SEEN(in_dev)) {
  774. /* this is a v3 query with v2 queriers present;
  775. * Interpretation of the max_delay code is problematic here.
  776. * A real v2 host would use ih_code directly, while v3 has a
  777. * different encoding. We use the v3 encoding as more likely
  778. * to be intended in a v3 query.
  779. */
  780. max_delay = IGMPV3_MRC(ih3->code)*(HZ/IGMP_TIMER_SCALE);
  781. if (!max_delay)
  782. max_delay = 1; /* can't mod w/ 0 */
  783. } else { /* v3 */
  784. if (!pskb_may_pull(skb, sizeof(struct igmpv3_query)))
  785. return true;
  786. ih3 = igmpv3_query_hdr(skb);
  787. if (ih3->nsrcs) {
  788. if (!pskb_may_pull(skb, sizeof(struct igmpv3_query)
  789. + ntohs(ih3->nsrcs)*sizeof(__be32)))
  790. return true;
  791. ih3 = igmpv3_query_hdr(skb);
  792. }
  793. max_delay = IGMPV3_MRC(ih3->code)*(HZ/IGMP_TIMER_SCALE);
  794. if (!max_delay)
  795. max_delay = 1; /* can't mod w/ 0 */
  796. in_dev->mr_maxdelay = max_delay;
  797. if (ih3->qrv)
  798. in_dev->mr_qrv = ih3->qrv;
  799. if (!group) { /* general query */
  800. if (ih3->nsrcs)
  801. return false; /* no sources allowed */
  802. igmp_gq_start_timer(in_dev);
  803. return false;
  804. }
  805. /* mark sources to include, if group & source-specific */
  806. mark = ih3->nsrcs != 0;
  807. }
  808. /*
  809. * - Start the timers in all of our membership records
  810. * that the query applies to for the interface on
  811. * which the query arrived excl. those that belong
  812. * to a "local" group (224.0.0.X)
  813. * - For timers already running check if they need to
  814. * be reset.
  815. * - Use the igmp->igmp_code field as the maximum
  816. * delay possible
  817. */
  818. rcu_read_lock();
  819. for_each_pmc_rcu(in_dev, im) {
  820. int changed;
  821. if (group && group != im->multiaddr)
  822. continue;
  823. if (im->multiaddr == IGMP_ALL_HOSTS)
  824. continue;
  825. spin_lock_bh(&im->lock);
  826. if (im->tm_running)
  827. im->gsquery = im->gsquery && mark;
  828. else
  829. im->gsquery = mark;
  830. changed = !im->gsquery ||
  831. igmp_marksources(im, ntohs(ih3->nsrcs), ih3->srcs);
  832. spin_unlock_bh(&im->lock);
  833. if (changed)
  834. igmp_mod_timer(im, max_delay);
  835. }
  836. rcu_read_unlock();
  837. return false;
  838. }
  839. /* called in rcu_read_lock() section */
  840. int igmp_rcv(struct sk_buff *skb)
  841. {
  842. /* This basically follows the spec line by line -- see RFC1112 */
  843. struct igmphdr *ih;
  844. struct in_device *in_dev = __in_dev_get_rcu(skb->dev);
  845. int len = skb->len;
  846. bool dropped = true;
  847. if (in_dev == NULL)
  848. goto drop;
  849. if (!pskb_may_pull(skb, sizeof(struct igmphdr)))
  850. goto drop;
  851. switch (skb->ip_summed) {
  852. case CHECKSUM_COMPLETE:
  853. if (!csum_fold(skb->csum))
  854. break;
  855. /* fall through */
  856. case CHECKSUM_NONE:
  857. skb->csum = 0;
  858. if (__skb_checksum_complete(skb))
  859. goto drop;
  860. }
  861. ih = igmp_hdr(skb);
  862. switch (ih->type) {
  863. case IGMP_HOST_MEMBERSHIP_QUERY:
  864. dropped = igmp_heard_query(in_dev, skb, len);
  865. break;
  866. case IGMP_HOST_MEMBERSHIP_REPORT:
  867. case IGMPV2_HOST_MEMBERSHIP_REPORT:
  868. /* Is it our report looped back? */
  869. if (rt_is_output_route(skb_rtable(skb)))
  870. break;
  871. /* don't rely on MC router hearing unicast reports */
  872. if (skb->pkt_type == PACKET_MULTICAST ||
  873. skb->pkt_type == PACKET_BROADCAST)
  874. dropped = igmp_heard_report(in_dev, ih->group);
  875. break;
  876. case IGMP_PIM:
  877. #ifdef CONFIG_IP_PIMSM_V1
  878. return pim_rcv_v1(skb);
  879. #endif
  880. case IGMPV3_HOST_MEMBERSHIP_REPORT:
  881. case IGMP_DVMRP:
  882. case IGMP_TRACE:
  883. case IGMP_HOST_LEAVE_MESSAGE:
  884. case IGMP_MTRACE:
  885. case IGMP_MTRACE_RESP:
  886. break;
  887. default:
  888. break;
  889. }
  890. drop:
  891. if (dropped)
  892. kfree_skb(skb);
  893. else
  894. consume_skb(skb);
  895. return 0;
  896. }
  897. #endif
  898. /*
  899. * Add a filter to a device
  900. */
  901. static void ip_mc_filter_add(struct in_device *in_dev, __be32 addr)
  902. {
  903. char buf[MAX_ADDR_LEN];
  904. struct net_device *dev = in_dev->dev;
  905. /* Checking for IFF_MULTICAST here is WRONG-WRONG-WRONG.
  906. We will get multicast token leakage, when IFF_MULTICAST
  907. is changed. This check should be done in ndo_set_rx_mode
  908. routine. Something sort of:
  909. if (dev->mc_list && dev->flags&IFF_MULTICAST) { do it; }
  910. --ANK
  911. */
  912. if (arp_mc_map(addr, buf, dev, 0) == 0)
  913. dev_mc_add(dev, buf);
  914. }
  915. /*
  916. * Remove a filter from a device
  917. */
  918. static void ip_mc_filter_del(struct in_device *in_dev, __be32 addr)
  919. {
  920. char buf[MAX_ADDR_LEN];
  921. struct net_device *dev = in_dev->dev;
  922. if (arp_mc_map(addr, buf, dev, 0) == 0)
  923. dev_mc_del(dev, buf);
  924. }
  925. #ifdef CONFIG_IP_MULTICAST
  926. /*
  927. * deleted ip_mc_list manipulation
  928. */
  929. static void igmpv3_add_delrec(struct in_device *in_dev, struct ip_mc_list *im)
  930. {
  931. struct ip_mc_list *pmc;
  932. /* this is an "ip_mc_list" for convenience; only the fields below
  933. * are actually used. In particular, the refcnt and users are not
  934. * used for management of the delete list. Using the same structure
  935. * for deleted items allows change reports to use common code with
  936. * non-deleted or query-response MCA's.
  937. */
  938. pmc = kzalloc(sizeof(*pmc), GFP_KERNEL);
  939. if (!pmc)
  940. return;
  941. spin_lock_bh(&im->lock);
  942. pmc->interface = im->interface;
  943. in_dev_hold(in_dev);
  944. pmc->multiaddr = im->multiaddr;
  945. pmc->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  946. IGMP_Unsolicited_Report_Count;
  947. pmc->sfmode = im->sfmode;
  948. if (pmc->sfmode == MCAST_INCLUDE) {
  949. struct ip_sf_list *psf;
  950. pmc->tomb = im->tomb;
  951. pmc->sources = im->sources;
  952. im->tomb = im->sources = NULL;
  953. for (psf=pmc->sources; psf; psf=psf->sf_next)
  954. psf->sf_crcount = pmc->crcount;
  955. }
  956. spin_unlock_bh(&im->lock);
  957. spin_lock_bh(&in_dev->mc_tomb_lock);
  958. pmc->next = in_dev->mc_tomb;
  959. in_dev->mc_tomb = pmc;
  960. spin_unlock_bh(&in_dev->mc_tomb_lock);
  961. }
  962. static void igmpv3_del_delrec(struct in_device *in_dev, __be32 multiaddr)
  963. {
  964. struct ip_mc_list *pmc, *pmc_prev;
  965. struct ip_sf_list *psf, *psf_next;
  966. spin_lock_bh(&in_dev->mc_tomb_lock);
  967. pmc_prev = NULL;
  968. for (pmc=in_dev->mc_tomb; pmc; pmc=pmc->next) {
  969. if (pmc->multiaddr == multiaddr)
  970. break;
  971. pmc_prev = pmc;
  972. }
  973. if (pmc) {
  974. if (pmc_prev)
  975. pmc_prev->next = pmc->next;
  976. else
  977. in_dev->mc_tomb = pmc->next;
  978. }
  979. spin_unlock_bh(&in_dev->mc_tomb_lock);
  980. if (pmc) {
  981. for (psf=pmc->tomb; psf; psf=psf_next) {
  982. psf_next = psf->sf_next;
  983. kfree(psf);
  984. }
  985. in_dev_put(pmc->interface);
  986. kfree(pmc);
  987. }
  988. }
  989. static void igmpv3_clear_delrec(struct in_device *in_dev)
  990. {
  991. struct ip_mc_list *pmc, *nextpmc;
  992. spin_lock_bh(&in_dev->mc_tomb_lock);
  993. pmc = in_dev->mc_tomb;
  994. in_dev->mc_tomb = NULL;
  995. spin_unlock_bh(&in_dev->mc_tomb_lock);
  996. for (; pmc; pmc = nextpmc) {
  997. nextpmc = pmc->next;
  998. ip_mc_clear_src(pmc);
  999. in_dev_put(pmc->interface);
  1000. kfree(pmc);
  1001. }
  1002. /* clear dead sources, too */
  1003. rcu_read_lock();
  1004. for_each_pmc_rcu(in_dev, pmc) {
  1005. struct ip_sf_list *psf, *psf_next;
  1006. spin_lock_bh(&pmc->lock);
  1007. psf = pmc->tomb;
  1008. pmc->tomb = NULL;
  1009. spin_unlock_bh(&pmc->lock);
  1010. for (; psf; psf=psf_next) {
  1011. psf_next = psf->sf_next;
  1012. kfree(psf);
  1013. }
  1014. }
  1015. rcu_read_unlock();
  1016. }
  1017. #endif
  1018. static void igmp_group_dropped(struct ip_mc_list *im)
  1019. {
  1020. struct in_device *in_dev = im->interface;
  1021. #ifdef CONFIG_IP_MULTICAST
  1022. int reporter;
  1023. #endif
  1024. if (im->loaded) {
  1025. im->loaded = 0;
  1026. ip_mc_filter_del(in_dev, im->multiaddr);
  1027. }
  1028. #ifdef CONFIG_IP_MULTICAST
  1029. if (im->multiaddr == IGMP_ALL_HOSTS)
  1030. return;
  1031. reporter = im->reporter;
  1032. igmp_stop_timer(im);
  1033. if (!in_dev->dead) {
  1034. if (IGMP_V1_SEEN(in_dev))
  1035. return;
  1036. if (IGMP_V2_SEEN(in_dev)) {
  1037. if (reporter)
  1038. igmp_send_report(in_dev, im, IGMP_HOST_LEAVE_MESSAGE);
  1039. return;
  1040. }
  1041. /* IGMPv3 */
  1042. igmpv3_add_delrec(in_dev, im);
  1043. igmp_ifc_event(in_dev);
  1044. }
  1045. #endif
  1046. }
  1047. static void igmp_group_added(struct ip_mc_list *im)
  1048. {
  1049. struct in_device *in_dev = im->interface;
  1050. if (im->loaded == 0) {
  1051. im->loaded = 1;
  1052. ip_mc_filter_add(in_dev, im->multiaddr);
  1053. }
  1054. #ifdef CONFIG_IP_MULTICAST
  1055. if (im->multiaddr == IGMP_ALL_HOSTS)
  1056. return;
  1057. if (in_dev->dead)
  1058. return;
  1059. if (IGMP_V1_SEEN(in_dev) || IGMP_V2_SEEN(in_dev)) {
  1060. spin_lock_bh(&im->lock);
  1061. igmp_start_timer(im, IGMP_Initial_Report_Delay);
  1062. spin_unlock_bh(&im->lock);
  1063. return;
  1064. }
  1065. /* else, v3 */
  1066. im->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1067. IGMP_Unsolicited_Report_Count;
  1068. igmp_ifc_event(in_dev);
  1069. #endif
  1070. }
  1071. /*
  1072. * Multicast list managers
  1073. */
  1074. /*
  1075. * A socket has joined a multicast group on device dev.
  1076. */
  1077. void ip_mc_inc_group(struct in_device *in_dev, __be32 addr)
  1078. {
  1079. struct ip_mc_list *im;
  1080. ASSERT_RTNL();
  1081. for_each_pmc_rtnl(in_dev, im) {
  1082. if (im->multiaddr == addr) {
  1083. im->users++;
  1084. ip_mc_add_src(in_dev, &addr, MCAST_EXCLUDE, 0, NULL, 0);
  1085. goto out;
  1086. }
  1087. }
  1088. im = kzalloc(sizeof(*im), GFP_KERNEL);
  1089. if (!im)
  1090. goto out;
  1091. im->users = 1;
  1092. im->interface = in_dev;
  1093. in_dev_hold(in_dev);
  1094. im->multiaddr = addr;
  1095. /* initial mode is (EX, empty) */
  1096. im->sfmode = MCAST_EXCLUDE;
  1097. im->sfcount[MCAST_EXCLUDE] = 1;
  1098. atomic_set(&im->refcnt, 1);
  1099. spin_lock_init(&im->lock);
  1100. #ifdef CONFIG_IP_MULTICAST
  1101. setup_timer(&im->timer, &igmp_timer_expire, (unsigned long)im);
  1102. im->unsolicit_count = IGMP_Unsolicited_Report_Count;
  1103. #endif
  1104. im->next_rcu = in_dev->mc_list;
  1105. in_dev->mc_count++;
  1106. rcu_assign_pointer(in_dev->mc_list, im);
  1107. #ifdef CONFIG_IP_MULTICAST
  1108. igmpv3_del_delrec(in_dev, im->multiaddr);
  1109. #endif
  1110. igmp_group_added(im);
  1111. if (!in_dev->dead)
  1112. ip_rt_multicast_event(in_dev);
  1113. out:
  1114. return;
  1115. }
  1116. EXPORT_SYMBOL(ip_mc_inc_group);
  1117. /*
  1118. * Resend IGMP JOIN report; used for bonding.
  1119. * Called with rcu_read_lock()
  1120. */
  1121. void ip_mc_rejoin_groups(struct in_device *in_dev)
  1122. {
  1123. #ifdef CONFIG_IP_MULTICAST
  1124. struct ip_mc_list *im;
  1125. int type;
  1126. for_each_pmc_rcu(in_dev, im) {
  1127. if (im->multiaddr == IGMP_ALL_HOSTS)
  1128. continue;
  1129. /* a failover is happening and switches
  1130. * must be notified immediately
  1131. */
  1132. if (IGMP_V1_SEEN(in_dev))
  1133. type = IGMP_HOST_MEMBERSHIP_REPORT;
  1134. else if (IGMP_V2_SEEN(in_dev))
  1135. type = IGMPV2_HOST_MEMBERSHIP_REPORT;
  1136. else
  1137. type = IGMPV3_HOST_MEMBERSHIP_REPORT;
  1138. igmp_send_report(in_dev, im, type);
  1139. }
  1140. #endif
  1141. }
  1142. EXPORT_SYMBOL(ip_mc_rejoin_groups);
  1143. /*
  1144. * A socket has left a multicast group on device dev
  1145. */
  1146. void ip_mc_dec_group(struct in_device *in_dev, __be32 addr)
  1147. {
  1148. struct ip_mc_list *i;
  1149. struct ip_mc_list __rcu **ip;
  1150. ASSERT_RTNL();
  1151. for (ip = &in_dev->mc_list;
  1152. (i = rtnl_dereference(*ip)) != NULL;
  1153. ip = &i->next_rcu) {
  1154. if (i->multiaddr == addr) {
  1155. if (--i->users == 0) {
  1156. *ip = i->next_rcu;
  1157. in_dev->mc_count--;
  1158. igmp_group_dropped(i);
  1159. ip_mc_clear_src(i);
  1160. if (!in_dev->dead)
  1161. ip_rt_multicast_event(in_dev);
  1162. ip_ma_put(i);
  1163. return;
  1164. }
  1165. break;
  1166. }
  1167. }
  1168. }
  1169. EXPORT_SYMBOL(ip_mc_dec_group);
  1170. /* Device changing type */
  1171. void ip_mc_unmap(struct in_device *in_dev)
  1172. {
  1173. struct ip_mc_list *pmc;
  1174. ASSERT_RTNL();
  1175. for_each_pmc_rtnl(in_dev, pmc)
  1176. igmp_group_dropped(pmc);
  1177. }
  1178. void ip_mc_remap(struct in_device *in_dev)
  1179. {
  1180. struct ip_mc_list *pmc;
  1181. ASSERT_RTNL();
  1182. for_each_pmc_rtnl(in_dev, pmc)
  1183. igmp_group_added(pmc);
  1184. }
  1185. /* Device going down */
  1186. void ip_mc_down(struct in_device *in_dev)
  1187. {
  1188. struct ip_mc_list *pmc;
  1189. ASSERT_RTNL();
  1190. for_each_pmc_rtnl(in_dev, pmc)
  1191. igmp_group_dropped(pmc);
  1192. #ifdef CONFIG_IP_MULTICAST
  1193. in_dev->mr_ifc_count = 0;
  1194. if (del_timer(&in_dev->mr_ifc_timer))
  1195. __in_dev_put(in_dev);
  1196. in_dev->mr_gq_running = 0;
  1197. if (del_timer(&in_dev->mr_gq_timer))
  1198. __in_dev_put(in_dev);
  1199. igmpv3_clear_delrec(in_dev);
  1200. #endif
  1201. ip_mc_dec_group(in_dev, IGMP_ALL_HOSTS);
  1202. }
  1203. void ip_mc_init_dev(struct in_device *in_dev)
  1204. {
  1205. ASSERT_RTNL();
  1206. in_dev->mc_tomb = NULL;
  1207. #ifdef CONFIG_IP_MULTICAST
  1208. in_dev->mr_gq_running = 0;
  1209. setup_timer(&in_dev->mr_gq_timer, igmp_gq_timer_expire,
  1210. (unsigned long)in_dev);
  1211. in_dev->mr_ifc_count = 0;
  1212. in_dev->mc_count = 0;
  1213. setup_timer(&in_dev->mr_ifc_timer, igmp_ifc_timer_expire,
  1214. (unsigned long)in_dev);
  1215. in_dev->mr_qrv = IGMP_Unsolicited_Report_Count;
  1216. #endif
  1217. spin_lock_init(&in_dev->mc_tomb_lock);
  1218. }
  1219. /* Device going up */
  1220. void ip_mc_up(struct in_device *in_dev)
  1221. {
  1222. struct ip_mc_list *pmc;
  1223. ASSERT_RTNL();
  1224. ip_mc_inc_group(in_dev, IGMP_ALL_HOSTS);
  1225. for_each_pmc_rtnl(in_dev, pmc)
  1226. igmp_group_added(pmc);
  1227. }
  1228. /*
  1229. * Device is about to be destroyed: clean up.
  1230. */
  1231. void ip_mc_destroy_dev(struct in_device *in_dev)
  1232. {
  1233. struct ip_mc_list *i;
  1234. ASSERT_RTNL();
  1235. /* Deactivate timers */
  1236. ip_mc_down(in_dev);
  1237. while ((i = rtnl_dereference(in_dev->mc_list)) != NULL) {
  1238. in_dev->mc_list = i->next_rcu;
  1239. in_dev->mc_count--;
  1240. /* We've dropped the groups in ip_mc_down already */
  1241. ip_mc_clear_src(i);
  1242. ip_ma_put(i);
  1243. }
  1244. }
  1245. /* RTNL is locked */
  1246. static struct in_device *ip_mc_find_dev(struct net *net, struct ip_mreqn *imr)
  1247. {
  1248. struct net_device *dev = NULL;
  1249. struct in_device *idev = NULL;
  1250. if (imr->imr_ifindex) {
  1251. idev = inetdev_by_index(net, imr->imr_ifindex);
  1252. return idev;
  1253. }
  1254. if (imr->imr_address.s_addr) {
  1255. dev = __ip_dev_find(net, imr->imr_address.s_addr, false);
  1256. if (!dev)
  1257. return NULL;
  1258. }
  1259. if (!dev) {
  1260. struct rtable *rt = ip_route_output(net,
  1261. imr->imr_multiaddr.s_addr,
  1262. 0, 0, 0);
  1263. if (!IS_ERR(rt)) {
  1264. dev = rt->dst.dev;
  1265. ip_rt_put(rt);
  1266. }
  1267. }
  1268. if (dev) {
  1269. imr->imr_ifindex = dev->ifindex;
  1270. idev = __in_dev_get_rtnl(dev);
  1271. }
  1272. return idev;
  1273. }
  1274. /*
  1275. * Join a socket to a group
  1276. */
  1277. int sysctl_igmp_max_memberships __read_mostly = IP_MAX_MEMBERSHIPS;
  1278. int sysctl_igmp_max_msf __read_mostly = IP_MAX_MSF;
  1279. static int ip_mc_del1_src(struct ip_mc_list *pmc, int sfmode,
  1280. __be32 *psfsrc)
  1281. {
  1282. struct ip_sf_list *psf, *psf_prev;
  1283. int rv = 0;
  1284. psf_prev = NULL;
  1285. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  1286. if (psf->sf_inaddr == *psfsrc)
  1287. break;
  1288. psf_prev = psf;
  1289. }
  1290. if (!psf || psf->sf_count[sfmode] == 0) {
  1291. /* source filter not found, or count wrong => bug */
  1292. return -ESRCH;
  1293. }
  1294. psf->sf_count[sfmode]--;
  1295. if (psf->sf_count[sfmode] == 0) {
  1296. ip_rt_multicast_event(pmc->interface);
  1297. }
  1298. if (!psf->sf_count[MCAST_INCLUDE] && !psf->sf_count[MCAST_EXCLUDE]) {
  1299. #ifdef CONFIG_IP_MULTICAST
  1300. struct in_device *in_dev = pmc->interface;
  1301. #endif
  1302. /* no more filters for this source */
  1303. if (psf_prev)
  1304. psf_prev->sf_next = psf->sf_next;
  1305. else
  1306. pmc->sources = psf->sf_next;
  1307. #ifdef CONFIG_IP_MULTICAST
  1308. if (psf->sf_oldin &&
  1309. !IGMP_V1_SEEN(in_dev) && !IGMP_V2_SEEN(in_dev)) {
  1310. psf->sf_crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1311. IGMP_Unsolicited_Report_Count;
  1312. psf->sf_next = pmc->tomb;
  1313. pmc->tomb = psf;
  1314. rv = 1;
  1315. } else
  1316. #endif
  1317. kfree(psf);
  1318. }
  1319. return rv;
  1320. }
  1321. #ifndef CONFIG_IP_MULTICAST
  1322. #define igmp_ifc_event(x) do { } while (0)
  1323. #endif
  1324. static int ip_mc_del_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
  1325. int sfcount, __be32 *psfsrc, int delta)
  1326. {
  1327. struct ip_mc_list *pmc;
  1328. int changerec = 0;
  1329. int i, err;
  1330. if (!in_dev)
  1331. return -ENODEV;
  1332. rcu_read_lock();
  1333. for_each_pmc_rcu(in_dev, pmc) {
  1334. if (*pmca == pmc->multiaddr)
  1335. break;
  1336. }
  1337. if (!pmc) {
  1338. /* MCA not found?? bug */
  1339. rcu_read_unlock();
  1340. return -ESRCH;
  1341. }
  1342. spin_lock_bh(&pmc->lock);
  1343. rcu_read_unlock();
  1344. #ifdef CONFIG_IP_MULTICAST
  1345. sf_markstate(pmc);
  1346. #endif
  1347. if (!delta) {
  1348. err = -EINVAL;
  1349. if (!pmc->sfcount[sfmode])
  1350. goto out_unlock;
  1351. pmc->sfcount[sfmode]--;
  1352. }
  1353. err = 0;
  1354. for (i=0; i<sfcount; i++) {
  1355. int rv = ip_mc_del1_src(pmc, sfmode, &psfsrc[i]);
  1356. changerec |= rv > 0;
  1357. if (!err && rv < 0)
  1358. err = rv;
  1359. }
  1360. if (pmc->sfmode == MCAST_EXCLUDE &&
  1361. pmc->sfcount[MCAST_EXCLUDE] == 0 &&
  1362. pmc->sfcount[MCAST_INCLUDE]) {
  1363. #ifdef CONFIG_IP_MULTICAST
  1364. struct ip_sf_list *psf;
  1365. #endif
  1366. /* filter mode change */
  1367. pmc->sfmode = MCAST_INCLUDE;
  1368. #ifdef CONFIG_IP_MULTICAST
  1369. pmc->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1370. IGMP_Unsolicited_Report_Count;
  1371. in_dev->mr_ifc_count = pmc->crcount;
  1372. for (psf=pmc->sources; psf; psf = psf->sf_next)
  1373. psf->sf_crcount = 0;
  1374. igmp_ifc_event(pmc->interface);
  1375. } else if (sf_setstate(pmc) || changerec) {
  1376. igmp_ifc_event(pmc->interface);
  1377. #endif
  1378. }
  1379. out_unlock:
  1380. spin_unlock_bh(&pmc->lock);
  1381. return err;
  1382. }
  1383. /*
  1384. * Add multicast single-source filter to the interface list
  1385. */
  1386. static int ip_mc_add1_src(struct ip_mc_list *pmc, int sfmode,
  1387. __be32 *psfsrc)
  1388. {
  1389. struct ip_sf_list *psf, *psf_prev;
  1390. psf_prev = NULL;
  1391. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  1392. if (psf->sf_inaddr == *psfsrc)
  1393. break;
  1394. psf_prev = psf;
  1395. }
  1396. if (!psf) {
  1397. psf = kzalloc(sizeof(*psf), GFP_ATOMIC);
  1398. if (!psf)
  1399. return -ENOBUFS;
  1400. psf->sf_inaddr = *psfsrc;
  1401. if (psf_prev) {
  1402. psf_prev->sf_next = psf;
  1403. } else
  1404. pmc->sources = psf;
  1405. }
  1406. psf->sf_count[sfmode]++;
  1407. if (psf->sf_count[sfmode] == 1) {
  1408. ip_rt_multicast_event(pmc->interface);
  1409. }
  1410. return 0;
  1411. }
  1412. #ifdef CONFIG_IP_MULTICAST
  1413. static void sf_markstate(struct ip_mc_list *pmc)
  1414. {
  1415. struct ip_sf_list *psf;
  1416. int mca_xcount = pmc->sfcount[MCAST_EXCLUDE];
  1417. for (psf=pmc->sources; psf; psf=psf->sf_next)
  1418. if (pmc->sfcount[MCAST_EXCLUDE]) {
  1419. psf->sf_oldin = mca_xcount ==
  1420. psf->sf_count[MCAST_EXCLUDE] &&
  1421. !psf->sf_count[MCAST_INCLUDE];
  1422. } else
  1423. psf->sf_oldin = psf->sf_count[MCAST_INCLUDE] != 0;
  1424. }
  1425. static int sf_setstate(struct ip_mc_list *pmc)
  1426. {
  1427. struct ip_sf_list *psf, *dpsf;
  1428. int mca_xcount = pmc->sfcount[MCAST_EXCLUDE];
  1429. int qrv = pmc->interface->mr_qrv;
  1430. int new_in, rv;
  1431. rv = 0;
  1432. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  1433. if (pmc->sfcount[MCAST_EXCLUDE]) {
  1434. new_in = mca_xcount == psf->sf_count[MCAST_EXCLUDE] &&
  1435. !psf->sf_count[MCAST_INCLUDE];
  1436. } else
  1437. new_in = psf->sf_count[MCAST_INCLUDE] != 0;
  1438. if (new_in) {
  1439. if (!psf->sf_oldin) {
  1440. struct ip_sf_list *prev = NULL;
  1441. for (dpsf=pmc->tomb; dpsf; dpsf=dpsf->sf_next) {
  1442. if (dpsf->sf_inaddr == psf->sf_inaddr)
  1443. break;
  1444. prev = dpsf;
  1445. }
  1446. if (dpsf) {
  1447. if (prev)
  1448. prev->sf_next = dpsf->sf_next;
  1449. else
  1450. pmc->tomb = dpsf->sf_next;
  1451. kfree(dpsf);
  1452. }
  1453. psf->sf_crcount = qrv;
  1454. rv++;
  1455. }
  1456. } else if (psf->sf_oldin) {
  1457. psf->sf_crcount = 0;
  1458. /*
  1459. * add or update "delete" records if an active filter
  1460. * is now inactive
  1461. */
  1462. for (dpsf=pmc->tomb; dpsf; dpsf=dpsf->sf_next)
  1463. if (dpsf->sf_inaddr == psf->sf_inaddr)
  1464. break;
  1465. if (!dpsf) {
  1466. dpsf = kmalloc(sizeof(*dpsf), GFP_ATOMIC);
  1467. if (!dpsf)
  1468. continue;
  1469. *dpsf = *psf;
  1470. /* pmc->lock held by callers */
  1471. dpsf->sf_next = pmc->tomb;
  1472. pmc->tomb = dpsf;
  1473. }
  1474. dpsf->sf_crcount = qrv;
  1475. rv++;
  1476. }
  1477. }
  1478. return rv;
  1479. }
  1480. #endif
  1481. /*
  1482. * Add multicast source filter list to the interface list
  1483. */
  1484. static int ip_mc_add_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
  1485. int sfcount, __be32 *psfsrc, int delta)
  1486. {
  1487. struct ip_mc_list *pmc;
  1488. int isexclude;
  1489. int i, err;
  1490. if (!in_dev)
  1491. return -ENODEV;
  1492. rcu_read_lock();
  1493. for_each_pmc_rcu(in_dev, pmc) {
  1494. if (*pmca == pmc->multiaddr)
  1495. break;
  1496. }
  1497. if (!pmc) {
  1498. /* MCA not found?? bug */
  1499. rcu_read_unlock();
  1500. return -ESRCH;
  1501. }
  1502. spin_lock_bh(&pmc->lock);
  1503. rcu_read_unlock();
  1504. #ifdef CONFIG_IP_MULTICAST
  1505. sf_markstate(pmc);
  1506. #endif
  1507. isexclude = pmc->sfmode == MCAST_EXCLUDE;
  1508. if (!delta)
  1509. pmc->sfcount[sfmode]++;
  1510. err = 0;
  1511. for (i=0; i<sfcount; i++) {
  1512. err = ip_mc_add1_src(pmc, sfmode, &psfsrc[i]);
  1513. if (err)
  1514. break;
  1515. }
  1516. if (err) {
  1517. int j;
  1518. if (!delta)
  1519. pmc->sfcount[sfmode]--;
  1520. for (j=0; j<i; j++)
  1521. (void) ip_mc_del1_src(pmc, sfmode, &psfsrc[j]);
  1522. } else if (isexclude != (pmc->sfcount[MCAST_EXCLUDE] != 0)) {
  1523. #ifdef CONFIG_IP_MULTICAST
  1524. struct ip_sf_list *psf;
  1525. in_dev = pmc->interface;
  1526. #endif
  1527. /* filter mode change */
  1528. if (pmc->sfcount[MCAST_EXCLUDE])
  1529. pmc->sfmode = MCAST_EXCLUDE;
  1530. else if (pmc->sfcount[MCAST_INCLUDE])
  1531. pmc->sfmode = MCAST_INCLUDE;
  1532. #ifdef CONFIG_IP_MULTICAST
  1533. /* else no filters; keep old mode for reports */
  1534. pmc->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1535. IGMP_Unsolicited_Report_Count;
  1536. in_dev->mr_ifc_count = pmc->crcount;
  1537. for (psf=pmc->sources; psf; psf = psf->sf_next)
  1538. psf->sf_crcount = 0;
  1539. igmp_ifc_event(in_dev);
  1540. } else if (sf_setstate(pmc)) {
  1541. igmp_ifc_event(in_dev);
  1542. #endif
  1543. }
  1544. spin_unlock_bh(&pmc->lock);
  1545. return err;
  1546. }
  1547. static void ip_mc_clear_src(struct ip_mc_list *pmc)
  1548. {
  1549. struct ip_sf_list *psf, *nextpsf;
  1550. for (psf=pmc->tomb; psf; psf=nextpsf) {
  1551. nextpsf = psf->sf_next;
  1552. kfree(psf);
  1553. }
  1554. pmc->tomb = NULL;
  1555. for (psf=pmc->sources; psf; psf=nextpsf) {
  1556. nextpsf = psf->sf_next;
  1557. kfree(psf);
  1558. }
  1559. pmc->sources = NULL;
  1560. pmc->sfmode = MCAST_EXCLUDE;
  1561. pmc->sfcount[MCAST_INCLUDE] = 0;
  1562. pmc->sfcount[MCAST_EXCLUDE] = 1;
  1563. }
  1564. /*
  1565. * Join a multicast group
  1566. */
  1567. int ip_mc_join_group(struct sock *sk , struct ip_mreqn *imr)
  1568. {
  1569. int err;
  1570. __be32 addr = imr->imr_multiaddr.s_addr;
  1571. struct ip_mc_socklist *iml = NULL, *i;
  1572. struct in_device *in_dev;
  1573. struct inet_sock *inet = inet_sk(sk);
  1574. struct net *net = sock_net(sk);
  1575. int ifindex;
  1576. int count = 0;
  1577. if (!ipv4_is_multicast(addr))
  1578. return -EINVAL;
  1579. rtnl_lock();
  1580. in_dev = ip_mc_find_dev(net, imr);
  1581. if (!in_dev) {
  1582. iml = NULL;
  1583. err = -ENODEV;
  1584. goto done;
  1585. }
  1586. err = -EADDRINUSE;
  1587. ifindex = imr->imr_ifindex;
  1588. for_each_pmc_rtnl(inet, i) {
  1589. if (i->multi.imr_multiaddr.s_addr == addr &&
  1590. i->multi.imr_ifindex == ifindex)
  1591. goto done;
  1592. count++;
  1593. }
  1594. err = -ENOBUFS;
  1595. if (count >= sysctl_igmp_max_memberships)
  1596. goto done;
  1597. iml = sock_kmalloc(sk, sizeof(*iml), GFP_KERNEL);
  1598. if (iml == NULL)
  1599. goto done;
  1600. memcpy(&iml->multi, imr, sizeof(*imr));
  1601. iml->next_rcu = inet->mc_list;
  1602. iml->sflist = NULL;
  1603. iml->sfmode = MCAST_EXCLUDE;
  1604. rcu_assign_pointer(inet->mc_list, iml);
  1605. ip_mc_inc_group(in_dev, addr);
  1606. err = 0;
  1607. done:
  1608. rtnl_unlock();
  1609. return err;
  1610. }
  1611. EXPORT_SYMBOL(ip_mc_join_group);
  1612. static int ip_mc_leave_src(struct sock *sk, struct ip_mc_socklist *iml,
  1613. struct in_device *in_dev)
  1614. {
  1615. struct ip_sf_socklist *psf = rtnl_dereference(iml->sflist);
  1616. int err;
  1617. if (psf == NULL) {
  1618. /* any-source empty exclude case */
  1619. return ip_mc_del_src(in_dev, &iml->multi.imr_multiaddr.s_addr,
  1620. iml->sfmode, 0, NULL, 0);
  1621. }
  1622. err = ip_mc_del_src(in_dev, &iml->multi.imr_multiaddr.s_addr,
  1623. iml->sfmode, psf->sl_count, psf->sl_addr, 0);
  1624. RCU_INIT_POINTER(iml->sflist, NULL);
  1625. /* decrease mem now to avoid the memleak warning */
  1626. atomic_sub(IP_SFLSIZE(psf->sl_max), &sk->sk_omem_alloc);
  1627. kfree_rcu(psf, rcu);
  1628. return err;
  1629. }
  1630. /*
  1631. * Ask a socket to leave a group.
  1632. */
  1633. int ip_mc_leave_group(struct sock *sk, struct ip_mreqn *imr)
  1634. {
  1635. struct inet_sock *inet = inet_sk(sk);
  1636. struct ip_mc_socklist *iml;
  1637. struct ip_mc_socklist __rcu **imlp;
  1638. struct in_device *in_dev;
  1639. struct net *net = sock_net(sk);
  1640. __be32 group = imr->imr_multiaddr.s_addr;
  1641. u32 ifindex;
  1642. int ret = -EADDRNOTAVAIL;
  1643. rtnl_lock();
  1644. in_dev = ip_mc_find_dev(net, imr);
  1645. ifindex = imr->imr_ifindex;
  1646. for (imlp = &inet->mc_list;
  1647. (iml = rtnl_dereference(*imlp)) != NULL;
  1648. imlp = &iml->next_rcu) {
  1649. if (iml->multi.imr_multiaddr.s_addr != group)
  1650. continue;
  1651. if (ifindex) {
  1652. if (iml->multi.imr_ifindex != ifindex)
  1653. continue;
  1654. } else if (imr->imr_address.s_addr && imr->imr_address.s_addr !=
  1655. iml->multi.imr_address.s_addr)
  1656. continue;
  1657. (void) ip_mc_leave_src(sk, iml, in_dev);
  1658. *imlp = iml->next_rcu;
  1659. if (in_dev)
  1660. ip_mc_dec_group(in_dev, group);
  1661. rtnl_unlock();
  1662. /* decrease mem now to avoid the memleak warning */
  1663. atomic_sub(sizeof(*iml), &sk->sk_omem_alloc);
  1664. kfree_rcu(iml, rcu);
  1665. return 0;
  1666. }
  1667. if (!in_dev)
  1668. ret = -ENODEV;
  1669. rtnl_unlock();
  1670. return ret;
  1671. }
  1672. EXPORT_SYMBOL(ip_mc_leave_group);
  1673. int ip_mc_source(int add, int omode, struct sock *sk, struct
  1674. ip_mreq_source *mreqs, int ifindex)
  1675. {
  1676. int err;
  1677. struct ip_mreqn imr;
  1678. __be32 addr = mreqs->imr_multiaddr;
  1679. struct ip_mc_socklist *pmc;
  1680. struct in_device *in_dev = NULL;
  1681. struct inet_sock *inet = inet_sk(sk);
  1682. struct ip_sf_socklist *psl;
  1683. struct net *net = sock_net(sk);
  1684. int leavegroup = 0;
  1685. int i, j, rv;
  1686. if (!ipv4_is_multicast(addr))
  1687. return -EINVAL;
  1688. rtnl_lock();
  1689. imr.imr_multiaddr.s_addr = mreqs->imr_multiaddr;
  1690. imr.imr_address.s_addr = mreqs->imr_interface;
  1691. imr.imr_ifindex = ifindex;
  1692. in_dev = ip_mc_find_dev(net, &imr);
  1693. if (!in_dev) {
  1694. err = -ENODEV;
  1695. goto done;
  1696. }
  1697. err = -EADDRNOTAVAIL;
  1698. for_each_pmc_rtnl(inet, pmc) {
  1699. if ((pmc->multi.imr_multiaddr.s_addr ==
  1700. imr.imr_multiaddr.s_addr) &&
  1701. (pmc->multi.imr_ifindex == imr.imr_ifindex))
  1702. break;
  1703. }
  1704. if (!pmc) { /* must have a prior join */
  1705. err = -EINVAL;
  1706. goto done;
  1707. }
  1708. /* if a source filter was set, must be the same mode as before */
  1709. if (pmc->sflist) {
  1710. if (pmc->sfmode != omode) {
  1711. err = -EINVAL;
  1712. goto done;
  1713. }
  1714. } else if (pmc->sfmode != omode) {
  1715. /* allow mode switches for empty-set filters */
  1716. ip_mc_add_src(in_dev, &mreqs->imr_multiaddr, omode, 0, NULL, 0);
  1717. ip_mc_del_src(in_dev, &mreqs->imr_multiaddr, pmc->sfmode, 0,
  1718. NULL, 0);
  1719. pmc->sfmode = omode;
  1720. }
  1721. psl = rtnl_dereference(pmc->sflist);
  1722. if (!add) {
  1723. if (!psl)
  1724. goto done; /* err = -EADDRNOTAVAIL */
  1725. rv = !0;
  1726. for (i=0; i<psl->sl_count; i++) {
  1727. rv = memcmp(&psl->sl_addr[i], &mreqs->imr_sourceaddr,
  1728. sizeof(__be32));
  1729. if (rv == 0)
  1730. break;
  1731. }
  1732. if (rv) /* source not found */
  1733. goto done; /* err = -EADDRNOTAVAIL */
  1734. /* special case - (INCLUDE, empty) == LEAVE_GROUP */
  1735. if (psl->sl_count == 1 && omode == MCAST_INCLUDE) {
  1736. leavegroup = 1;
  1737. goto done;
  1738. }
  1739. /* update the interface filter */
  1740. ip_mc_del_src(in_dev, &mreqs->imr_multiaddr, omode, 1,
  1741. &mreqs->imr_sourceaddr, 1);
  1742. for (j=i+1; j<psl->sl_count; j++)
  1743. psl->sl_addr[j-1] = psl->sl_addr[j];
  1744. psl->sl_count--;
  1745. err = 0;
  1746. goto done;
  1747. }
  1748. /* else, add a new source to the filter */
  1749. if (psl && psl->sl_count >= sysctl_igmp_max_msf) {
  1750. err = -ENOBUFS;
  1751. goto done;
  1752. }
  1753. if (!psl || psl->sl_count == psl->sl_max) {
  1754. struct ip_sf_socklist *newpsl;
  1755. int count = IP_SFBLOCK;
  1756. if (psl)
  1757. count += psl->sl_max;
  1758. newpsl = sock_kmalloc(sk, IP_SFLSIZE(count), GFP_KERNEL);
  1759. if (!newpsl) {
  1760. err = -ENOBUFS;
  1761. goto done;
  1762. }
  1763. newpsl->sl_max = count;
  1764. newpsl->sl_count = count - IP_SFBLOCK;
  1765. if (psl) {
  1766. for (i=0; i<psl->sl_count; i++)
  1767. newpsl->sl_addr[i] = psl->sl_addr[i];
  1768. /* decrease mem now to avoid the memleak warning */
  1769. atomic_sub(IP_SFLSIZE(psl->sl_max), &sk->sk_omem_alloc);
  1770. kfree_rcu(psl, rcu);
  1771. }
  1772. rcu_assign_pointer(pmc->sflist, newpsl);
  1773. psl = newpsl;
  1774. }
  1775. rv = 1; /* > 0 for insert logic below if sl_count is 0 */
  1776. for (i=0; i<psl->sl_count; i++) {
  1777. rv = memcmp(&psl->sl_addr[i], &mreqs->imr_sourceaddr,
  1778. sizeof(__be32));
  1779. if (rv == 0)
  1780. break;
  1781. }
  1782. if (rv == 0) /* address already there is an error */
  1783. goto done;
  1784. for (j=psl->sl_count-1; j>=i; j--)
  1785. psl->sl_addr[j+1] = psl->sl_addr[j];
  1786. psl->sl_addr[i] = mreqs->imr_sourceaddr;
  1787. psl->sl_count++;
  1788. err = 0;
  1789. /* update the interface list */
  1790. ip_mc_add_src(in_dev, &mreqs->imr_multiaddr, omode, 1,
  1791. &mreqs->imr_sourceaddr, 1);
  1792. done:
  1793. rtnl_unlock();
  1794. if (leavegroup)
  1795. return ip_mc_leave_group(sk, &imr);
  1796. return err;
  1797. }
  1798. int ip_mc_msfilter(struct sock *sk, struct ip_msfilter *msf, int ifindex)
  1799. {
  1800. int err = 0;
  1801. struct ip_mreqn imr;
  1802. __be32 addr = msf->imsf_multiaddr;
  1803. struct ip_mc_socklist *pmc;
  1804. struct in_device *in_dev;
  1805. struct inet_sock *inet = inet_sk(sk);
  1806. struct ip_sf_socklist *newpsl, *psl;
  1807. struct net *net = sock_net(sk);
  1808. int leavegroup = 0;
  1809. if (!ipv4_is_multicast(addr))
  1810. return -EINVAL;
  1811. if (msf->imsf_fmode != MCAST_INCLUDE &&
  1812. msf->imsf_fmode != MCAST_EXCLUDE)
  1813. return -EINVAL;
  1814. rtnl_lock();
  1815. imr.imr_multiaddr.s_addr = msf->imsf_multiaddr;
  1816. imr.imr_address.s_addr = msf->imsf_interface;
  1817. imr.imr_ifindex = ifindex;
  1818. in_dev = ip_mc_find_dev(net, &imr);
  1819. if (!in_dev) {
  1820. err = -ENODEV;
  1821. goto done;
  1822. }
  1823. /* special case - (INCLUDE, empty) == LEAVE_GROUP */
  1824. if (msf->imsf_fmode == MCAST_INCLUDE && msf->imsf_numsrc == 0) {
  1825. leavegroup = 1;
  1826. goto done;
  1827. }
  1828. for_each_pmc_rtnl(inet, pmc) {
  1829. if (pmc->multi.imr_multiaddr.s_addr == msf->imsf_multiaddr &&
  1830. pmc->multi.imr_ifindex == imr.imr_ifindex)
  1831. break;
  1832. }
  1833. if (!pmc) { /* must have a prior join */
  1834. err = -EINVAL;
  1835. goto done;
  1836. }
  1837. if (msf->imsf_numsrc) {
  1838. newpsl = sock_kmalloc(sk, IP_SFLSIZE(msf->imsf_numsrc),
  1839. GFP_KERNEL);
  1840. if (!newpsl) {
  1841. err = -ENOBUFS;
  1842. goto done;
  1843. }
  1844. newpsl->sl_max = newpsl->sl_count = msf->imsf_numsrc;
  1845. memcpy(newpsl->sl_addr, msf->imsf_slist,
  1846. msf->imsf_numsrc * sizeof(msf->imsf_slist[0]));
  1847. err = ip_mc_add_src(in_dev, &msf->imsf_multiaddr,
  1848. msf->imsf_fmode, newpsl->sl_count, newpsl->sl_addr, 0);
  1849. if (err) {
  1850. sock_kfree_s(sk, newpsl, IP_SFLSIZE(newpsl->sl_max));
  1851. goto done;
  1852. }
  1853. } else {
  1854. newpsl = NULL;
  1855. (void) ip_mc_add_src(in_dev, &msf->imsf_multiaddr,
  1856. msf->imsf_fmode, 0, NULL, 0);
  1857. }
  1858. psl = rtnl_dereference(pmc->sflist);
  1859. if (psl) {
  1860. (void) ip_mc_del_src(in_dev, &msf->imsf_multiaddr, pmc->sfmode,
  1861. psl->sl_count, psl->sl_addr, 0);
  1862. /* decrease mem now to avoid the memleak warning */
  1863. atomic_sub(IP_SFLSIZE(psl->sl_max), &sk->sk_omem_alloc);
  1864. kfree_rcu(psl, rcu);
  1865. } else
  1866. (void) ip_mc_del_src(in_dev, &msf->imsf_multiaddr, pmc->sfmode,
  1867. 0, NULL, 0);
  1868. rcu_assign_pointer(pmc->sflist, newpsl);
  1869. pmc->sfmode = msf->imsf_fmode;
  1870. err = 0;
  1871. done:
  1872. rtnl_unlock();
  1873. if (leavegroup)
  1874. err = ip_mc_leave_group(sk, &imr);
  1875. return err;
  1876. }
  1877. int ip_mc_msfget(struct sock *sk, struct ip_msfilter *msf,
  1878. struct ip_msfilter __user *optval, int __user *optlen)
  1879. {
  1880. int err, len, count, copycount;
  1881. struct ip_mreqn imr;
  1882. __be32 addr = msf->imsf_multiaddr;
  1883. struct ip_mc_socklist *pmc;
  1884. struct in_device *in_dev;
  1885. struct inet_sock *inet = inet_sk(sk);
  1886. struct ip_sf_socklist *psl;
  1887. struct net *net = sock_net(sk);
  1888. if (!ipv4_is_multicast(addr))
  1889. return -EINVAL;
  1890. rtnl_lock();
  1891. imr.imr_multiaddr.s_addr = msf->imsf_multiaddr;
  1892. imr.imr_address.s_addr = msf->imsf_interface;
  1893. imr.imr_ifindex = 0;
  1894. in_dev = ip_mc_find_dev(net, &imr);
  1895. if (!in_dev) {
  1896. err = -ENODEV;
  1897. goto done;
  1898. }
  1899. err = -EADDRNOTAVAIL;
  1900. for_each_pmc_rtnl(inet, pmc) {
  1901. if (pmc->multi.imr_multiaddr.s_addr == msf->imsf_multiaddr &&
  1902. pmc->multi.imr_ifindex == imr.imr_ifindex)
  1903. break;
  1904. }
  1905. if (!pmc) /* must have a prior join */
  1906. goto done;
  1907. msf->imsf_fmode = pmc->sfmode;
  1908. psl = rtnl_dereference(pmc->sflist);
  1909. rtnl_unlock();
  1910. if (!psl) {
  1911. len = 0;
  1912. count = 0;
  1913. } else {
  1914. count = psl->sl_count;
  1915. }
  1916. copycount = count < msf->imsf_numsrc ? count : msf->imsf_numsrc;
  1917. len = copycount * sizeof(psl->sl_addr[0]);
  1918. msf->imsf_numsrc = count;
  1919. if (put_user(IP_MSFILTER_SIZE(copycount), optlen) ||
  1920. copy_to_user(optval, msf, IP_MSFILTER_SIZE(0))) {
  1921. return -EFAULT;
  1922. }
  1923. if (len &&
  1924. copy_to_user(&optval->imsf_slist[0], psl->sl_addr, len))
  1925. return -EFAULT;
  1926. return 0;
  1927. done:
  1928. rtnl_unlock();
  1929. return err;
  1930. }
  1931. int ip_mc_gsfget(struct sock *sk, struct group_filter *gsf,
  1932. struct group_filter __user *optval, int __user *optlen)
  1933. {
  1934. int err, i, count, copycount;
  1935. struct sockaddr_in *psin;
  1936. __be32 addr;
  1937. struct ip_mc_socklist *pmc;
  1938. struct inet_sock *inet = inet_sk(sk);
  1939. struct ip_sf_socklist *psl;
  1940. psin = (struct sockaddr_in *)&gsf->gf_group;
  1941. if (psin->sin_family != AF_INET)
  1942. return -EINVAL;
  1943. addr = psin->sin_addr.s_addr;
  1944. if (!ipv4_is_multicast(addr))
  1945. return -EINVAL;
  1946. rtnl_lock();
  1947. err = -EADDRNOTAVAIL;
  1948. for_each_pmc_rtnl(inet, pmc) {
  1949. if (pmc->multi.imr_multiaddr.s_addr == addr &&
  1950. pmc->multi.imr_ifindex == gsf->gf_interface)
  1951. break;
  1952. }
  1953. if (!pmc) /* must have a prior join */
  1954. goto done;
  1955. gsf->gf_fmode = pmc->sfmode;
  1956. psl = rtnl_dereference(pmc->sflist);
  1957. rtnl_unlock();
  1958. count = psl ? psl->sl_count : 0;
  1959. copycount = count < gsf->gf_numsrc ? count : gsf->gf_numsrc;
  1960. gsf->gf_numsrc = count;
  1961. if (put_user(GROUP_FILTER_SIZE(copycount), optlen) ||
  1962. copy_to_user(optval, gsf, GROUP_FILTER_SIZE(0))) {
  1963. return -EFAULT;
  1964. }
  1965. for (i=0; i<copycount; i++) {
  1966. struct sockaddr_storage ss;
  1967. psin = (struct sockaddr_in *)&ss;
  1968. memset(&ss, 0, sizeof(ss));
  1969. psin->sin_family = AF_INET;
  1970. psin->sin_addr.s_addr = psl->sl_addr[i];
  1971. if (copy_to_user(&optval->gf_slist[i], &ss, sizeof(ss)))
  1972. return -EFAULT;
  1973. }
  1974. return 0;
  1975. done:
  1976. rtnl_unlock();
  1977. return err;
  1978. }
  1979. /*
  1980. * check if a multicast source filter allows delivery for a given <src,dst,intf>
  1981. */
  1982. int ip_mc_sf_allow(struct sock *sk, __be32 loc_addr, __be32 rmt_addr, int dif)
  1983. {
  1984. struct inet_sock *inet = inet_sk(sk);
  1985. struct ip_mc_socklist *pmc;
  1986. struct ip_sf_socklist *psl;
  1987. int i;
  1988. int ret;
  1989. ret = 1;
  1990. if (!ipv4_is_multicast(loc_addr))
  1991. goto out;
  1992. rcu_read_lock();
  1993. for_each_pmc_rcu(inet, pmc) {
  1994. if (pmc->multi.imr_multiaddr.s_addr == loc_addr &&
  1995. pmc->multi.imr_ifindex == dif)
  1996. break;
  1997. }
  1998. ret = inet->mc_all;
  1999. if (!pmc)
  2000. goto unlock;
  2001. psl = rcu_dereference(pmc->sflist);
  2002. ret = (pmc->sfmode == MCAST_EXCLUDE);
  2003. if (!psl)
  2004. goto unlock;
  2005. for (i=0; i<psl->sl_count; i++) {
  2006. if (psl->sl_addr[i] == rmt_addr)
  2007. break;
  2008. }
  2009. ret = 0;
  2010. if (pmc->sfmode == MCAST_INCLUDE && i >= psl->sl_count)
  2011. goto unlock;
  2012. if (pmc->sfmode == MCAST_EXCLUDE && i < psl->sl_count)
  2013. goto unlock;
  2014. ret = 1;
  2015. unlock:
  2016. rcu_read_unlock();
  2017. out:
  2018. return ret;
  2019. }
  2020. /*
  2021. * A socket is closing.
  2022. */
  2023. void ip_mc_drop_socket(struct sock *sk)
  2024. {
  2025. struct inet_sock *inet = inet_sk(sk);
  2026. struct ip_mc_socklist *iml;
  2027. struct net *net = sock_net(sk);
  2028. if (inet->mc_list == NULL)
  2029. return;
  2030. rtnl_lock();
  2031. while ((iml = rtnl_dereference(inet->mc_list)) != NULL) {
  2032. struct in_device *in_dev;
  2033. inet->mc_list = iml->next_rcu;
  2034. in_dev = inetdev_by_index(net, iml->multi.imr_ifindex);
  2035. (void) ip_mc_leave_src(sk, iml, in_dev);
  2036. if (in_dev != NULL)
  2037. ip_mc_dec_group(in_dev, iml->multi.imr_multiaddr.s_addr);
  2038. /* decrease mem now to avoid the memleak warning */
  2039. atomic_sub(sizeof(*iml), &sk->sk_omem_alloc);
  2040. kfree_rcu(iml, rcu);
  2041. }
  2042. rtnl_unlock();
  2043. }
  2044. /* called with rcu_read_lock() */
  2045. int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u16 proto)
  2046. {
  2047. struct ip_mc_list *im;
  2048. struct ip_sf_list *psf;
  2049. int rv = 0;
  2050. for_each_pmc_rcu(in_dev, im) {
  2051. if (im->multiaddr == mc_addr)
  2052. break;
  2053. }
  2054. if (im && proto == IPPROTO_IGMP) {
  2055. rv = 1;
  2056. } else if (im) {
  2057. if (src_addr) {
  2058. for (psf=im->sources; psf; psf=psf->sf_next) {
  2059. if (psf->sf_inaddr == src_addr)
  2060. break;
  2061. }
  2062. if (psf)
  2063. rv = psf->sf_count[MCAST_INCLUDE] ||
  2064. psf->sf_count[MCAST_EXCLUDE] !=
  2065. im->sfcount[MCAST_EXCLUDE];
  2066. else
  2067. rv = im->sfcount[MCAST_EXCLUDE] != 0;
  2068. } else
  2069. rv = 1; /* unspecified source; tentatively allow */
  2070. }
  2071. return rv;
  2072. }
  2073. #if defined(CONFIG_PROC_FS)
  2074. struct igmp_mc_iter_state {
  2075. struct seq_net_private p;
  2076. struct net_device *dev;
  2077. struct in_device *in_dev;
  2078. };
  2079. #define igmp_mc_seq_private(seq) ((struct igmp_mc_iter_state *)(seq)->private)
  2080. static inline struct ip_mc_list *igmp_mc_get_first(struct seq_file *seq)
  2081. {
  2082. struct net *net = seq_file_net(seq);
  2083. struct ip_mc_list *im = NULL;
  2084. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2085. state->in_dev = NULL;
  2086. for_each_netdev_rcu(net, state->dev) {
  2087. struct in_device *in_dev;
  2088. in_dev = __in_dev_get_rcu(state->dev);
  2089. if (!in_dev)
  2090. continue;
  2091. im = rcu_dereference(in_dev->mc_list);
  2092. if (im) {
  2093. state->in_dev = in_dev;
  2094. break;
  2095. }
  2096. }
  2097. return im;
  2098. }
  2099. static struct ip_mc_list *igmp_mc_get_next(struct seq_file *seq, struct ip_mc_list *im)
  2100. {
  2101. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2102. im = rcu_dereference(im->next_rcu);
  2103. while (!im) {
  2104. state->dev = next_net_device_rcu(state->dev);
  2105. if (!state->dev) {
  2106. state->in_dev = NULL;
  2107. break;
  2108. }
  2109. state->in_dev = __in_dev_get_rcu(state->dev);
  2110. if (!state->in_dev)
  2111. continue;
  2112. im = rcu_dereference(state->in_dev->mc_list);
  2113. }
  2114. return im;
  2115. }
  2116. static struct ip_mc_list *igmp_mc_get_idx(struct seq_file *seq, loff_t pos)
  2117. {
  2118. struct ip_mc_list *im = igmp_mc_get_first(seq);
  2119. if (im)
  2120. while (pos && (im = igmp_mc_get_next(seq, im)) != NULL)
  2121. --pos;
  2122. return pos ? NULL : im;
  2123. }
  2124. static void *igmp_mc_seq_start(struct seq_file *seq, loff_t *pos)
  2125. __acquires(rcu)
  2126. {
  2127. rcu_read_lock();
  2128. return *pos ? igmp_mc_get_idx(seq, *pos - 1) : SEQ_START_TOKEN;
  2129. }
  2130. static void *igmp_mc_seq_next(struct seq_file *seq, void *v, loff_t *pos)
  2131. {
  2132. struct ip_mc_list *im;
  2133. if (v == SEQ_START_TOKEN)
  2134. im = igmp_mc_get_first(seq);
  2135. else
  2136. im = igmp_mc_get_next(seq, v);
  2137. ++*pos;
  2138. return im;
  2139. }
  2140. static void igmp_mc_seq_stop(struct seq_file *seq, void *v)
  2141. __releases(rcu)
  2142. {
  2143. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2144. state->in_dev = NULL;
  2145. state->dev = NULL;
  2146. rcu_read_unlock();
  2147. }
  2148. static int igmp_mc_seq_show(struct seq_file *seq, void *v)
  2149. {
  2150. if (v == SEQ_START_TOKEN)
  2151. seq_puts(seq,
  2152. "Idx\tDevice : Count Querier\tGroup Users Timer\tReporter\n");
  2153. else {
  2154. struct ip_mc_list *im = (struct ip_mc_list *)v;
  2155. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2156. char *querier;
  2157. long delta;
  2158. #ifdef CONFIG_IP_MULTICAST
  2159. querier = IGMP_V1_SEEN(state->in_dev) ? "V1" :
  2160. IGMP_V2_SEEN(state->in_dev) ? "V2" :
  2161. "V3";
  2162. #else
  2163. querier = "NONE";
  2164. #endif
  2165. if (rcu_dereference(state->in_dev->mc_list) == im) {
  2166. seq_printf(seq, "%d\t%-10s: %5d %7s\n",
  2167. state->dev->ifindex, state->dev->name, state->in_dev->mc_count, querier);
  2168. }
  2169. delta = im->timer.expires - jiffies;
  2170. seq_printf(seq,
  2171. "\t\t\t\t%08X %5d %d:%08lX\t\t%d\n",
  2172. im->multiaddr, im->users,
  2173. im->tm_running,
  2174. im->tm_running ? jiffies_delta_to_clock_t(delta) : 0,
  2175. im->reporter);
  2176. }
  2177. return 0;
  2178. }
  2179. static const struct seq_operations igmp_mc_seq_ops = {
  2180. .start = igmp_mc_seq_start,
  2181. .next = igmp_mc_seq_next,
  2182. .stop = igmp_mc_seq_stop,
  2183. .show = igmp_mc_seq_show,
  2184. };
  2185. static int igmp_mc_seq_open(struct inode *inode, struct file *file)
  2186. {
  2187. return seq_open_net(inode, file, &igmp_mc_seq_ops,
  2188. sizeof(struct igmp_mc_iter_state));
  2189. }
  2190. static const struct file_operations igmp_mc_seq_fops = {
  2191. .owner = THIS_MODULE,
  2192. .open = igmp_mc_seq_open,
  2193. .read = seq_read,
  2194. .llseek = seq_lseek,
  2195. .release = seq_release_net,
  2196. };
  2197. struct igmp_mcf_iter_state {
  2198. struct seq_net_private p;
  2199. struct net_device *dev;
  2200. struct in_device *idev;
  2201. struct ip_mc_list *im;
  2202. };
  2203. #define igmp_mcf_seq_private(seq) ((struct igmp_mcf_iter_state *)(seq)->private)
  2204. static inline struct ip_sf_list *igmp_mcf_get_first(struct seq_file *seq)
  2205. {
  2206. struct net *net = seq_file_net(seq);
  2207. struct ip_sf_list *psf = NULL;
  2208. struct ip_mc_list *im = NULL;
  2209. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2210. state->idev = NULL;
  2211. state->im = NULL;
  2212. for_each_netdev_rcu(net, state->dev) {
  2213. struct in_device *idev;
  2214. idev = __in_dev_get_rcu(state->dev);
  2215. if (unlikely(idev == NULL))
  2216. continue;
  2217. im = rcu_dereference(idev->mc_list);
  2218. if (likely(im != NULL)) {
  2219. spin_lock_bh(&im->lock);
  2220. psf = im->sources;
  2221. if (likely(psf != NULL)) {
  2222. state->im = im;
  2223. state->idev = idev;
  2224. break;
  2225. }
  2226. spin_unlock_bh(&im->lock);
  2227. }
  2228. }
  2229. return psf;
  2230. }
  2231. static struct ip_sf_list *igmp_mcf_get_next(struct seq_file *seq, struct ip_sf_list *psf)
  2232. {
  2233. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2234. psf = psf->sf_next;
  2235. while (!psf) {
  2236. spin_unlock_bh(&state->im->lock);
  2237. state->im = state->im->next;
  2238. while (!state->im) {
  2239. state->dev = next_net_device_rcu(state->dev);
  2240. if (!state->dev) {
  2241. state->idev = NULL;
  2242. goto out;
  2243. }
  2244. state->idev = __in_dev_get_rcu(state->dev);
  2245. if (!state->idev)
  2246. continue;
  2247. state->im = rcu_dereference(state->idev->mc_list);
  2248. }
  2249. if (!state->im)
  2250. break;
  2251. spin_lock_bh(&state->im->lock);
  2252. psf = state->im->sources;
  2253. }
  2254. out:
  2255. return psf;
  2256. }
  2257. static struct ip_sf_list *igmp_mcf_get_idx(struct seq_file *seq, loff_t pos)
  2258. {
  2259. struct ip_sf_list *psf = igmp_mcf_get_first(seq);
  2260. if (psf)
  2261. while (pos && (psf = igmp_mcf_get_next(seq, psf)) != NULL)
  2262. --pos;
  2263. return pos ? NULL : psf;
  2264. }
  2265. static void *igmp_mcf_seq_start(struct seq_file *seq, loff_t *pos)
  2266. __acquires(rcu)
  2267. {
  2268. rcu_read_lock();
  2269. return *pos ? igmp_mcf_get_idx(seq, *pos - 1) : SEQ_START_TOKEN;
  2270. }
  2271. static void *igmp_mcf_seq_next(struct seq_file *seq, void *v, loff_t *pos)
  2272. {
  2273. struct ip_sf_list *psf;
  2274. if (v == SEQ_START_TOKEN)
  2275. psf = igmp_mcf_get_first(seq);
  2276. else
  2277. psf = igmp_mcf_get_next(seq, v);
  2278. ++*pos;
  2279. return psf;
  2280. }
  2281. static void igmp_mcf_seq_stop(struct seq_file *seq, void *v)
  2282. __releases(rcu)
  2283. {
  2284. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2285. if (likely(state->im != NULL)) {
  2286. spin_unlock_bh(&state->im->lock);
  2287. state->im = NULL;
  2288. }
  2289. state->idev = NULL;
  2290. state->dev = NULL;
  2291. rcu_read_unlock();
  2292. }
  2293. static int igmp_mcf_seq_show(struct seq_file *seq, void *v)
  2294. {
  2295. struct ip_sf_list *psf = (struct ip_sf_list *)v;
  2296. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2297. if (v == SEQ_START_TOKEN) {
  2298. seq_printf(seq,
  2299. "%3s %6s "
  2300. "%10s %10s %6s %6s\n", "Idx",
  2301. "Device", "MCA",
  2302. "SRC", "INC", "EXC");
  2303. } else {
  2304. seq_printf(seq,
  2305. "%3d %6.6s 0x%08x "
  2306. "0x%08x %6lu %6lu\n",
  2307. state->dev->ifindex, state->dev->name,
  2308. ntohl(state->im->multiaddr),
  2309. ntohl(psf->sf_inaddr),
  2310. psf->sf_count[MCAST_INCLUDE],
  2311. psf->sf_count[MCAST_EXCLUDE]);
  2312. }
  2313. return 0;
  2314. }
  2315. static const struct seq_operations igmp_mcf_seq_ops = {
  2316. .start = igmp_mcf_seq_start,
  2317. .next = igmp_mcf_seq_next,
  2318. .stop = igmp_mcf_seq_stop,
  2319. .show = igmp_mcf_seq_show,
  2320. };
  2321. static int igmp_mcf_seq_open(struct inode *inode, struct file *file)
  2322. {
  2323. return seq_open_net(inode, file, &igmp_mcf_seq_ops,
  2324. sizeof(struct igmp_mcf_iter_state));
  2325. }
  2326. static const struct file_operations igmp_mcf_seq_fops = {
  2327. .owner = THIS_MODULE,
  2328. .open = igmp_mcf_seq_open,
  2329. .read = seq_read,
  2330. .llseek = seq_lseek,
  2331. .release = seq_release_net,
  2332. };
  2333. static int __net_init igmp_net_init(struct net *net)
  2334. {
  2335. struct proc_dir_entry *pde;
  2336. pde = proc_net_fops_create(net, "igmp", S_IRUGO, &igmp_mc_seq_fops);
  2337. if (!pde)
  2338. goto out_igmp;
  2339. pde = proc_net_fops_create(net, "mcfilter", S_IRUGO, &igmp_mcf_seq_fops);
  2340. if (!pde)
  2341. goto out_mcfilter;
  2342. return 0;
  2343. out_mcfilter:
  2344. proc_net_remove(net, "igmp");
  2345. out_igmp:
  2346. return -ENOMEM;
  2347. }
  2348. static void __net_exit igmp_net_exit(struct net *net)
  2349. {
  2350. proc_net_remove(net, "mcfilter");
  2351. proc_net_remove(net, "igmp");
  2352. }
  2353. static struct pernet_operations igmp_net_ops = {
  2354. .init = igmp_net_init,
  2355. .exit = igmp_net_exit,
  2356. };
  2357. int __init igmp_mc_proc_init(void)
  2358. {
  2359. return register_pernet_subsys(&igmp_net_ops);
  2360. }
  2361. #endif