igmp.c 63 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677
  1. /*
  2. * Linux NET3: Internet Group Management Protocol [IGMP]
  3. *
  4. * This code implements the IGMP protocol as defined in RFC1112. There has
  5. * been a further revision of this protocol since which is now supported.
  6. *
  7. * If you have trouble with this module be careful what gcc you have used,
  8. * the older version didn't come out right using gcc 2.5.8, the newer one
  9. * seems to fall out with gcc 2.6.2.
  10. *
  11. * Authors:
  12. * Alan Cox <alan@lxorguk.ukuu.org.uk>
  13. *
  14. * This program is free software; you can redistribute it and/or
  15. * modify it under the terms of the GNU General Public License
  16. * as published by the Free Software Foundation; either version
  17. * 2 of the License, or (at your option) any later version.
  18. *
  19. * Fixes:
  20. *
  21. * Alan Cox : Added lots of __inline__ to optimise
  22. * the memory usage of all the tiny little
  23. * functions.
  24. * Alan Cox : Dumped the header building experiment.
  25. * Alan Cox : Minor tweaks ready for multicast routing
  26. * and extended IGMP protocol.
  27. * Alan Cox : Removed a load of inline directives. Gcc 2.5.8
  28. * writes utterly bogus code otherwise (sigh)
  29. * fixed IGMP loopback to behave in the manner
  30. * desired by mrouted, fixed the fact it has been
  31. * broken since 1.3.6 and cleaned up a few minor
  32. * points.
  33. *
  34. * Chih-Jen Chang : Tried to revise IGMP to Version 2
  35. * Tsu-Sheng Tsao E-mail: chihjenc@scf.usc.edu and tsusheng@scf.usc.edu
  36. * The enhancements are mainly based on Steve Deering's
  37. * ipmulti-3.5 source code.
  38. * Chih-Jen Chang : Added the igmp_get_mrouter_info and
  39. * Tsu-Sheng Tsao igmp_set_mrouter_info to keep track of
  40. * the mrouted version on that device.
  41. * Chih-Jen Chang : Added the max_resp_time parameter to
  42. * Tsu-Sheng Tsao igmp_heard_query(). Using this parameter
  43. * to identify the multicast router version
  44. * and do what the IGMP version 2 specified.
  45. * Chih-Jen Chang : Added a timer to revert to IGMP V2 router
  46. * Tsu-Sheng Tsao if the specified time expired.
  47. * Alan Cox : Stop IGMP from 0.0.0.0 being accepted.
  48. * Alan Cox : Use GFP_ATOMIC in the right places.
  49. * Christian Daudt : igmp timer wasn't set for local group
  50. * memberships but was being deleted,
  51. * which caused a "del_timer() called
  52. * from %p with timer not initialized\n"
  53. * message (960131).
  54. * Christian Daudt : removed del_timer from
  55. * igmp_timer_expire function (960205).
  56. * Christian Daudt : igmp_heard_report now only calls
  57. * igmp_timer_expire if tm->running is
  58. * true (960216).
  59. * Malcolm Beattie : ttl comparison wrong in igmp_rcv made
  60. * igmp_heard_query never trigger. Expiry
  61. * miscalculation fixed in igmp_heard_query
  62. * and random() made to return unsigned to
  63. * prevent negative expiry times.
  64. * Alexey Kuznetsov: Wrong group leaving behaviour, backport
  65. * fix from pending 2.1.x patches.
  66. * Alan Cox: Forget to enable FDDI support earlier.
  67. * Alexey Kuznetsov: Fixed leaving groups on device down.
  68. * Alexey Kuznetsov: Accordance to igmp-v2-06 draft.
  69. * David L Stevens: IGMPv3 support, with help from
  70. * Vinay Kulkarni
  71. */
  72. #include <linux/module.h>
  73. #include <linux/slab.h>
  74. #include <asm/uaccess.h>
  75. #include <linux/types.h>
  76. #include <linux/kernel.h>
  77. #include <linux/jiffies.h>
  78. #include <linux/string.h>
  79. #include <linux/socket.h>
  80. #include <linux/sockios.h>
  81. #include <linux/in.h>
  82. #include <linux/inet.h>
  83. #include <linux/netdevice.h>
  84. #include <linux/skbuff.h>
  85. #include <linux/inetdevice.h>
  86. #include <linux/igmp.h>
  87. #include <linux/if_arp.h>
  88. #include <linux/rtnetlink.h>
  89. #include <linux/times.h>
  90. #include <net/net_namespace.h>
  91. #include <net/arp.h>
  92. #include <net/ip.h>
  93. #include <net/protocol.h>
  94. #include <net/route.h>
  95. #include <net/sock.h>
  96. #include <net/checksum.h>
  97. #include <linux/netfilter_ipv4.h>
  98. #ifdef CONFIG_IP_MROUTE
  99. #include <linux/mroute.h>
  100. #endif
  101. #ifdef CONFIG_PROC_FS
  102. #include <linux/proc_fs.h>
  103. #include <linux/seq_file.h>
  104. #endif
  105. #define IP_MAX_MEMBERSHIPS 20
  106. #define IP_MAX_MSF 10
  107. #ifdef CONFIG_IP_MULTICAST
  108. /* Parameter names and values are taken from igmp-v2-06 draft */
  109. #define IGMP_V1_Router_Present_Timeout (400*HZ)
  110. #define IGMP_V2_Router_Present_Timeout (400*HZ)
  111. #define IGMP_Unsolicited_Report_Interval (10*HZ)
  112. #define IGMP_Query_Response_Interval (10*HZ)
  113. #define IGMP_Unsolicited_Report_Count 2
  114. #define IGMP_Initial_Report_Delay (1)
  115. /* IGMP_Initial_Report_Delay is not from IGMP specs!
  116. * IGMP specs require to report membership immediately after
  117. * joining a group, but we delay the first report by a
  118. * small interval. It seems more natural and still does not
  119. * contradict to specs provided this delay is small enough.
  120. */
  121. #define IGMP_V1_SEEN(in_dev) \
  122. (IPV4_DEVCONF_ALL(dev_net(in_dev->dev), FORCE_IGMP_VERSION) == 1 || \
  123. IN_DEV_CONF_GET((in_dev), FORCE_IGMP_VERSION) == 1 || \
  124. ((in_dev)->mr_v1_seen && \
  125. time_before(jiffies, (in_dev)->mr_v1_seen)))
  126. #define IGMP_V2_SEEN(in_dev) \
  127. (IPV4_DEVCONF_ALL(dev_net(in_dev->dev), FORCE_IGMP_VERSION) == 2 || \
  128. IN_DEV_CONF_GET((in_dev), FORCE_IGMP_VERSION) == 2 || \
  129. ((in_dev)->mr_v2_seen && \
  130. time_before(jiffies, (in_dev)->mr_v2_seen)))
  131. static void igmpv3_add_delrec(struct in_device *in_dev, struct ip_mc_list *im);
  132. static void igmpv3_del_delrec(struct in_device *in_dev, __be32 multiaddr);
  133. static void igmpv3_clear_delrec(struct in_device *in_dev);
  134. static int sf_setstate(struct ip_mc_list *pmc);
  135. static void sf_markstate(struct ip_mc_list *pmc);
  136. #endif
  137. static void ip_mc_clear_src(struct ip_mc_list *pmc);
  138. static int ip_mc_add_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
  139. int sfcount, __be32 *psfsrc, int delta);
  140. static void ip_ma_put(struct ip_mc_list *im)
  141. {
  142. if (atomic_dec_and_test(&im->refcnt)) {
  143. in_dev_put(im->interface);
  144. kfree_rcu(im, rcu);
  145. }
  146. }
  147. #define for_each_pmc_rcu(in_dev, pmc) \
  148. for (pmc = rcu_dereference(in_dev->mc_list); \
  149. pmc != NULL; \
  150. pmc = rcu_dereference(pmc->next_rcu))
  151. #define for_each_pmc_rtnl(in_dev, pmc) \
  152. for (pmc = rtnl_dereference(in_dev->mc_list); \
  153. pmc != NULL; \
  154. pmc = rtnl_dereference(pmc->next_rcu))
  155. #ifdef CONFIG_IP_MULTICAST
  156. /*
  157. * Timer management
  158. */
  159. static void igmp_stop_timer(struct ip_mc_list *im)
  160. {
  161. spin_lock_bh(&im->lock);
  162. if (del_timer(&im->timer))
  163. atomic_dec(&im->refcnt);
  164. im->tm_running = 0;
  165. im->reporter = 0;
  166. im->unsolicit_count = 0;
  167. spin_unlock_bh(&im->lock);
  168. }
  169. /* It must be called with locked im->lock */
  170. static void igmp_start_timer(struct ip_mc_list *im, int max_delay)
  171. {
  172. int tv = net_random() % max_delay;
  173. im->tm_running = 1;
  174. if (!mod_timer(&im->timer, jiffies+tv+2))
  175. atomic_inc(&im->refcnt);
  176. }
  177. static void igmp_gq_start_timer(struct in_device *in_dev)
  178. {
  179. int tv = net_random() % in_dev->mr_maxdelay;
  180. in_dev->mr_gq_running = 1;
  181. if (!mod_timer(&in_dev->mr_gq_timer, jiffies+tv+2))
  182. in_dev_hold(in_dev);
  183. }
  184. static void igmp_ifc_start_timer(struct in_device *in_dev, int delay)
  185. {
  186. int tv = net_random() % delay;
  187. if (!mod_timer(&in_dev->mr_ifc_timer, jiffies+tv+2))
  188. in_dev_hold(in_dev);
  189. }
  190. static void igmp_mod_timer(struct ip_mc_list *im, int max_delay)
  191. {
  192. spin_lock_bh(&im->lock);
  193. im->unsolicit_count = 0;
  194. if (del_timer(&im->timer)) {
  195. if ((long)(im->timer.expires-jiffies) < max_delay) {
  196. add_timer(&im->timer);
  197. im->tm_running = 1;
  198. spin_unlock_bh(&im->lock);
  199. return;
  200. }
  201. atomic_dec(&im->refcnt);
  202. }
  203. igmp_start_timer(im, max_delay);
  204. spin_unlock_bh(&im->lock);
  205. }
  206. /*
  207. * Send an IGMP report.
  208. */
  209. #define IGMP_SIZE (sizeof(struct igmphdr)+sizeof(struct iphdr)+4)
  210. static int is_in(struct ip_mc_list *pmc, struct ip_sf_list *psf, int type,
  211. int gdeleted, int sdeleted)
  212. {
  213. switch (type) {
  214. case IGMPV3_MODE_IS_INCLUDE:
  215. case IGMPV3_MODE_IS_EXCLUDE:
  216. if (gdeleted || sdeleted)
  217. return 0;
  218. if (!(pmc->gsquery && !psf->sf_gsresp)) {
  219. if (pmc->sfmode == MCAST_INCLUDE)
  220. return 1;
  221. /* don't include if this source is excluded
  222. * in all filters
  223. */
  224. if (psf->sf_count[MCAST_INCLUDE])
  225. return type == IGMPV3_MODE_IS_INCLUDE;
  226. return pmc->sfcount[MCAST_EXCLUDE] ==
  227. psf->sf_count[MCAST_EXCLUDE];
  228. }
  229. return 0;
  230. case IGMPV3_CHANGE_TO_INCLUDE:
  231. if (gdeleted || sdeleted)
  232. return 0;
  233. return psf->sf_count[MCAST_INCLUDE] != 0;
  234. case IGMPV3_CHANGE_TO_EXCLUDE:
  235. if (gdeleted || sdeleted)
  236. return 0;
  237. if (pmc->sfcount[MCAST_EXCLUDE] == 0 ||
  238. psf->sf_count[MCAST_INCLUDE])
  239. return 0;
  240. return pmc->sfcount[MCAST_EXCLUDE] ==
  241. psf->sf_count[MCAST_EXCLUDE];
  242. case IGMPV3_ALLOW_NEW_SOURCES:
  243. if (gdeleted || !psf->sf_crcount)
  244. return 0;
  245. return (pmc->sfmode == MCAST_INCLUDE) ^ sdeleted;
  246. case IGMPV3_BLOCK_OLD_SOURCES:
  247. if (pmc->sfmode == MCAST_INCLUDE)
  248. return gdeleted || (psf->sf_crcount && sdeleted);
  249. return psf->sf_crcount && !gdeleted && !sdeleted;
  250. }
  251. return 0;
  252. }
  253. static int
  254. igmp_scount(struct ip_mc_list *pmc, int type, int gdeleted, int sdeleted)
  255. {
  256. struct ip_sf_list *psf;
  257. int scount = 0;
  258. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  259. if (!is_in(pmc, psf, type, gdeleted, sdeleted))
  260. continue;
  261. scount++;
  262. }
  263. return scount;
  264. }
  265. #define igmp_skb_size(skb) (*(unsigned int *)((skb)->cb))
  266. static struct sk_buff *igmpv3_newpack(struct net_device *dev, int size)
  267. {
  268. struct sk_buff *skb;
  269. struct rtable *rt;
  270. struct iphdr *pip;
  271. struct igmpv3_report *pig;
  272. struct net *net = dev_net(dev);
  273. struct flowi4 fl4;
  274. int hlen = LL_RESERVED_SPACE(dev);
  275. int tlen = dev->needed_tailroom;
  276. while (1) {
  277. skb = alloc_skb(size + hlen + tlen,
  278. GFP_ATOMIC | __GFP_NOWARN);
  279. if (skb)
  280. break;
  281. size >>= 1;
  282. if (size < 256)
  283. return NULL;
  284. }
  285. igmp_skb_size(skb) = size;
  286. rt = ip_route_output_ports(net, &fl4, NULL, IGMPV3_ALL_MCR, 0,
  287. 0, 0,
  288. IPPROTO_IGMP, 0, dev->ifindex);
  289. if (IS_ERR(rt)) {
  290. kfree_skb(skb);
  291. return NULL;
  292. }
  293. skb_dst_set(skb, &rt->dst);
  294. skb->dev = dev;
  295. skb_reserve(skb, hlen);
  296. skb_reset_network_header(skb);
  297. pip = ip_hdr(skb);
  298. skb_put(skb, sizeof(struct iphdr) + 4);
  299. pip->version = 4;
  300. pip->ihl = (sizeof(struct iphdr)+4)>>2;
  301. pip->tos = 0xc0;
  302. pip->frag_off = htons(IP_DF);
  303. pip->ttl = 1;
  304. pip->daddr = fl4.daddr;
  305. pip->saddr = fl4.saddr;
  306. pip->protocol = IPPROTO_IGMP;
  307. pip->tot_len = 0; /* filled in later */
  308. ip_select_ident(pip, &rt->dst, NULL);
  309. ((u8 *)&pip[1])[0] = IPOPT_RA;
  310. ((u8 *)&pip[1])[1] = 4;
  311. ((u8 *)&pip[1])[2] = 0;
  312. ((u8 *)&pip[1])[3] = 0;
  313. skb->transport_header = skb->network_header + sizeof(struct iphdr) + 4;
  314. skb_put(skb, sizeof(*pig));
  315. pig = igmpv3_report_hdr(skb);
  316. pig->type = IGMPV3_HOST_MEMBERSHIP_REPORT;
  317. pig->resv1 = 0;
  318. pig->csum = 0;
  319. pig->resv2 = 0;
  320. pig->ngrec = 0;
  321. return skb;
  322. }
  323. static int igmpv3_sendpack(struct sk_buff *skb)
  324. {
  325. struct igmphdr *pig = igmp_hdr(skb);
  326. const int igmplen = skb->tail - skb->transport_header;
  327. pig->csum = ip_compute_csum(igmp_hdr(skb), igmplen);
  328. return ip_local_out(skb);
  329. }
  330. static int grec_size(struct ip_mc_list *pmc, int type, int gdel, int sdel)
  331. {
  332. return sizeof(struct igmpv3_grec) + 4*igmp_scount(pmc, type, gdel, sdel);
  333. }
  334. static struct sk_buff *add_grhead(struct sk_buff *skb, struct ip_mc_list *pmc,
  335. int type, struct igmpv3_grec **ppgr)
  336. {
  337. struct net_device *dev = pmc->interface->dev;
  338. struct igmpv3_report *pih;
  339. struct igmpv3_grec *pgr;
  340. if (!skb)
  341. skb = igmpv3_newpack(dev, dev->mtu);
  342. if (!skb)
  343. return NULL;
  344. pgr = (struct igmpv3_grec *)skb_put(skb, sizeof(struct igmpv3_grec));
  345. pgr->grec_type = type;
  346. pgr->grec_auxwords = 0;
  347. pgr->grec_nsrcs = 0;
  348. pgr->grec_mca = pmc->multiaddr;
  349. pih = igmpv3_report_hdr(skb);
  350. pih->ngrec = htons(ntohs(pih->ngrec)+1);
  351. *ppgr = pgr;
  352. return skb;
  353. }
  354. #define AVAILABLE(skb) ((skb) ? ((skb)->dev ? igmp_skb_size(skb) - (skb)->len : \
  355. skb_tailroom(skb)) : 0)
  356. static struct sk_buff *add_grec(struct sk_buff *skb, struct ip_mc_list *pmc,
  357. int type, int gdeleted, int sdeleted)
  358. {
  359. struct net_device *dev = pmc->interface->dev;
  360. struct igmpv3_report *pih;
  361. struct igmpv3_grec *pgr = NULL;
  362. struct ip_sf_list *psf, *psf_next, *psf_prev, **psf_list;
  363. int scount, stotal, first, isquery, truncate;
  364. if (pmc->multiaddr == IGMP_ALL_HOSTS)
  365. return skb;
  366. isquery = type == IGMPV3_MODE_IS_INCLUDE ||
  367. type == IGMPV3_MODE_IS_EXCLUDE;
  368. truncate = type == IGMPV3_MODE_IS_EXCLUDE ||
  369. type == IGMPV3_CHANGE_TO_EXCLUDE;
  370. stotal = scount = 0;
  371. psf_list = sdeleted ? &pmc->tomb : &pmc->sources;
  372. if (!*psf_list)
  373. goto empty_source;
  374. pih = skb ? igmpv3_report_hdr(skb) : NULL;
  375. /* EX and TO_EX get a fresh packet, if needed */
  376. if (truncate) {
  377. if (pih && pih->ngrec &&
  378. AVAILABLE(skb) < grec_size(pmc, type, gdeleted, sdeleted)) {
  379. if (skb)
  380. igmpv3_sendpack(skb);
  381. skb = igmpv3_newpack(dev, dev->mtu);
  382. }
  383. }
  384. first = 1;
  385. psf_prev = NULL;
  386. for (psf=*psf_list; psf; psf=psf_next) {
  387. __be32 *psrc;
  388. psf_next = psf->sf_next;
  389. if (!is_in(pmc, psf, type, gdeleted, sdeleted)) {
  390. psf_prev = psf;
  391. continue;
  392. }
  393. /* clear marks on query responses */
  394. if (isquery)
  395. psf->sf_gsresp = 0;
  396. if (AVAILABLE(skb) < sizeof(__be32) +
  397. first*sizeof(struct igmpv3_grec)) {
  398. if (truncate && !first)
  399. break; /* truncate these */
  400. if (pgr)
  401. pgr->grec_nsrcs = htons(scount);
  402. if (skb)
  403. igmpv3_sendpack(skb);
  404. skb = igmpv3_newpack(dev, dev->mtu);
  405. first = 1;
  406. scount = 0;
  407. }
  408. if (first) {
  409. skb = add_grhead(skb, pmc, type, &pgr);
  410. first = 0;
  411. }
  412. if (!skb)
  413. return NULL;
  414. psrc = (__be32 *)skb_put(skb, sizeof(__be32));
  415. *psrc = psf->sf_inaddr;
  416. scount++; stotal++;
  417. if ((type == IGMPV3_ALLOW_NEW_SOURCES ||
  418. type == IGMPV3_BLOCK_OLD_SOURCES) && psf->sf_crcount) {
  419. psf->sf_crcount--;
  420. if ((sdeleted || gdeleted) && psf->sf_crcount == 0) {
  421. if (psf_prev)
  422. psf_prev->sf_next = psf->sf_next;
  423. else
  424. *psf_list = psf->sf_next;
  425. kfree(psf);
  426. continue;
  427. }
  428. }
  429. psf_prev = psf;
  430. }
  431. empty_source:
  432. if (!stotal) {
  433. if (type == IGMPV3_ALLOW_NEW_SOURCES ||
  434. type == IGMPV3_BLOCK_OLD_SOURCES)
  435. return skb;
  436. if (pmc->crcount || isquery) {
  437. /* make sure we have room for group header */
  438. if (skb && AVAILABLE(skb)<sizeof(struct igmpv3_grec)) {
  439. igmpv3_sendpack(skb);
  440. skb = NULL; /* add_grhead will get a new one */
  441. }
  442. skb = add_grhead(skb, pmc, type, &pgr);
  443. }
  444. }
  445. if (pgr)
  446. pgr->grec_nsrcs = htons(scount);
  447. if (isquery)
  448. pmc->gsquery = 0; /* clear query state on report */
  449. return skb;
  450. }
  451. static int igmpv3_send_report(struct in_device *in_dev, struct ip_mc_list *pmc)
  452. {
  453. struct sk_buff *skb = NULL;
  454. int type;
  455. if (!pmc) {
  456. rcu_read_lock();
  457. for_each_pmc_rcu(in_dev, pmc) {
  458. if (pmc->multiaddr == IGMP_ALL_HOSTS)
  459. continue;
  460. spin_lock_bh(&pmc->lock);
  461. if (pmc->sfcount[MCAST_EXCLUDE])
  462. type = IGMPV3_MODE_IS_EXCLUDE;
  463. else
  464. type = IGMPV3_MODE_IS_INCLUDE;
  465. skb = add_grec(skb, pmc, type, 0, 0);
  466. spin_unlock_bh(&pmc->lock);
  467. }
  468. rcu_read_unlock();
  469. } else {
  470. spin_lock_bh(&pmc->lock);
  471. if (pmc->sfcount[MCAST_EXCLUDE])
  472. type = IGMPV3_MODE_IS_EXCLUDE;
  473. else
  474. type = IGMPV3_MODE_IS_INCLUDE;
  475. skb = add_grec(skb, pmc, type, 0, 0);
  476. spin_unlock_bh(&pmc->lock);
  477. }
  478. if (!skb)
  479. return 0;
  480. return igmpv3_sendpack(skb);
  481. }
  482. /*
  483. * remove zero-count source records from a source filter list
  484. */
  485. static void igmpv3_clear_zeros(struct ip_sf_list **ppsf)
  486. {
  487. struct ip_sf_list *psf_prev, *psf_next, *psf;
  488. psf_prev = NULL;
  489. for (psf=*ppsf; psf; psf = psf_next) {
  490. psf_next = psf->sf_next;
  491. if (psf->sf_crcount == 0) {
  492. if (psf_prev)
  493. psf_prev->sf_next = psf->sf_next;
  494. else
  495. *ppsf = psf->sf_next;
  496. kfree(psf);
  497. } else
  498. psf_prev = psf;
  499. }
  500. }
  501. static void igmpv3_send_cr(struct in_device *in_dev)
  502. {
  503. struct ip_mc_list *pmc, *pmc_prev, *pmc_next;
  504. struct sk_buff *skb = NULL;
  505. int type, dtype;
  506. rcu_read_lock();
  507. spin_lock_bh(&in_dev->mc_tomb_lock);
  508. /* deleted MCA's */
  509. pmc_prev = NULL;
  510. for (pmc=in_dev->mc_tomb; pmc; pmc=pmc_next) {
  511. pmc_next = pmc->next;
  512. if (pmc->sfmode == MCAST_INCLUDE) {
  513. type = IGMPV3_BLOCK_OLD_SOURCES;
  514. dtype = IGMPV3_BLOCK_OLD_SOURCES;
  515. skb = add_grec(skb, pmc, type, 1, 0);
  516. skb = add_grec(skb, pmc, dtype, 1, 1);
  517. }
  518. if (pmc->crcount) {
  519. if (pmc->sfmode == MCAST_EXCLUDE) {
  520. type = IGMPV3_CHANGE_TO_INCLUDE;
  521. skb = add_grec(skb, pmc, type, 1, 0);
  522. }
  523. pmc->crcount--;
  524. if (pmc->crcount == 0) {
  525. igmpv3_clear_zeros(&pmc->tomb);
  526. igmpv3_clear_zeros(&pmc->sources);
  527. }
  528. }
  529. if (pmc->crcount == 0 && !pmc->tomb && !pmc->sources) {
  530. if (pmc_prev)
  531. pmc_prev->next = pmc_next;
  532. else
  533. in_dev->mc_tomb = pmc_next;
  534. in_dev_put(pmc->interface);
  535. kfree(pmc);
  536. } else
  537. pmc_prev = pmc;
  538. }
  539. spin_unlock_bh(&in_dev->mc_tomb_lock);
  540. /* change recs */
  541. for_each_pmc_rcu(in_dev, pmc) {
  542. spin_lock_bh(&pmc->lock);
  543. if (pmc->sfcount[MCAST_EXCLUDE]) {
  544. type = IGMPV3_BLOCK_OLD_SOURCES;
  545. dtype = IGMPV3_ALLOW_NEW_SOURCES;
  546. } else {
  547. type = IGMPV3_ALLOW_NEW_SOURCES;
  548. dtype = IGMPV3_BLOCK_OLD_SOURCES;
  549. }
  550. skb = add_grec(skb, pmc, type, 0, 0);
  551. skb = add_grec(skb, pmc, dtype, 0, 1); /* deleted sources */
  552. /* filter mode changes */
  553. if (pmc->crcount) {
  554. if (pmc->sfmode == MCAST_EXCLUDE)
  555. type = IGMPV3_CHANGE_TO_EXCLUDE;
  556. else
  557. type = IGMPV3_CHANGE_TO_INCLUDE;
  558. skb = add_grec(skb, pmc, type, 0, 0);
  559. pmc->crcount--;
  560. }
  561. spin_unlock_bh(&pmc->lock);
  562. }
  563. rcu_read_unlock();
  564. if (!skb)
  565. return;
  566. (void) igmpv3_sendpack(skb);
  567. }
  568. static int igmp_send_report(struct in_device *in_dev, struct ip_mc_list *pmc,
  569. int type)
  570. {
  571. struct sk_buff *skb;
  572. struct iphdr *iph;
  573. struct igmphdr *ih;
  574. struct rtable *rt;
  575. struct net_device *dev = in_dev->dev;
  576. struct net *net = dev_net(dev);
  577. __be32 group = pmc ? pmc->multiaddr : 0;
  578. struct flowi4 fl4;
  579. __be32 dst;
  580. int hlen, tlen;
  581. if (type == IGMPV3_HOST_MEMBERSHIP_REPORT)
  582. return igmpv3_send_report(in_dev, pmc);
  583. else if (type == IGMP_HOST_LEAVE_MESSAGE)
  584. dst = IGMP_ALL_ROUTER;
  585. else
  586. dst = group;
  587. rt = ip_route_output_ports(net, &fl4, NULL, dst, 0,
  588. 0, 0,
  589. IPPROTO_IGMP, 0, dev->ifindex);
  590. if (IS_ERR(rt))
  591. return -1;
  592. hlen = LL_RESERVED_SPACE(dev);
  593. tlen = dev->needed_tailroom;
  594. skb = alloc_skb(IGMP_SIZE + hlen + tlen, GFP_ATOMIC);
  595. if (skb == NULL) {
  596. ip_rt_put(rt);
  597. return -1;
  598. }
  599. skb_dst_set(skb, &rt->dst);
  600. skb_reserve(skb, hlen);
  601. skb_reset_network_header(skb);
  602. iph = ip_hdr(skb);
  603. skb_put(skb, sizeof(struct iphdr) + 4);
  604. iph->version = 4;
  605. iph->ihl = (sizeof(struct iphdr)+4)>>2;
  606. iph->tos = 0xc0;
  607. iph->frag_off = htons(IP_DF);
  608. iph->ttl = 1;
  609. iph->daddr = dst;
  610. iph->saddr = fl4.saddr;
  611. iph->protocol = IPPROTO_IGMP;
  612. ip_select_ident(iph, &rt->dst, NULL);
  613. ((u8 *)&iph[1])[0] = IPOPT_RA;
  614. ((u8 *)&iph[1])[1] = 4;
  615. ((u8 *)&iph[1])[2] = 0;
  616. ((u8 *)&iph[1])[3] = 0;
  617. ih = (struct igmphdr *)skb_put(skb, sizeof(struct igmphdr));
  618. ih->type = type;
  619. ih->code = 0;
  620. ih->csum = 0;
  621. ih->group = group;
  622. ih->csum = ip_compute_csum((void *)ih, sizeof(struct igmphdr));
  623. return ip_local_out(skb);
  624. }
  625. static void igmp_gq_timer_expire(unsigned long data)
  626. {
  627. struct in_device *in_dev = (struct in_device *)data;
  628. in_dev->mr_gq_running = 0;
  629. igmpv3_send_report(in_dev, NULL);
  630. __in_dev_put(in_dev);
  631. }
  632. static void igmp_ifc_timer_expire(unsigned long data)
  633. {
  634. struct in_device *in_dev = (struct in_device *)data;
  635. igmpv3_send_cr(in_dev);
  636. if (in_dev->mr_ifc_count) {
  637. in_dev->mr_ifc_count--;
  638. igmp_ifc_start_timer(in_dev, IGMP_Unsolicited_Report_Interval);
  639. }
  640. __in_dev_put(in_dev);
  641. }
  642. static void igmp_ifc_event(struct in_device *in_dev)
  643. {
  644. if (IGMP_V1_SEEN(in_dev) || IGMP_V2_SEEN(in_dev))
  645. return;
  646. in_dev->mr_ifc_count = in_dev->mr_qrv ? in_dev->mr_qrv :
  647. IGMP_Unsolicited_Report_Count;
  648. igmp_ifc_start_timer(in_dev, 1);
  649. }
  650. static void igmp_timer_expire(unsigned long data)
  651. {
  652. struct ip_mc_list *im=(struct ip_mc_list *)data;
  653. struct in_device *in_dev = im->interface;
  654. spin_lock(&im->lock);
  655. im->tm_running = 0;
  656. if (im->unsolicit_count) {
  657. im->unsolicit_count--;
  658. igmp_start_timer(im, IGMP_Unsolicited_Report_Interval);
  659. }
  660. im->reporter = 1;
  661. spin_unlock(&im->lock);
  662. if (IGMP_V1_SEEN(in_dev))
  663. igmp_send_report(in_dev, im, IGMP_HOST_MEMBERSHIP_REPORT);
  664. else if (IGMP_V2_SEEN(in_dev))
  665. igmp_send_report(in_dev, im, IGMPV2_HOST_MEMBERSHIP_REPORT);
  666. else
  667. igmp_send_report(in_dev, im, IGMPV3_HOST_MEMBERSHIP_REPORT);
  668. ip_ma_put(im);
  669. }
  670. /* mark EXCLUDE-mode sources */
  671. static int igmp_xmarksources(struct ip_mc_list *pmc, int nsrcs, __be32 *srcs)
  672. {
  673. struct ip_sf_list *psf;
  674. int i, scount;
  675. scount = 0;
  676. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  677. if (scount == nsrcs)
  678. break;
  679. for (i=0; i<nsrcs; i++) {
  680. /* skip inactive filters */
  681. if (psf->sf_count[MCAST_INCLUDE] ||
  682. pmc->sfcount[MCAST_EXCLUDE] !=
  683. psf->sf_count[MCAST_EXCLUDE])
  684. break;
  685. if (srcs[i] == psf->sf_inaddr) {
  686. scount++;
  687. break;
  688. }
  689. }
  690. }
  691. pmc->gsquery = 0;
  692. if (scount == nsrcs) /* all sources excluded */
  693. return 0;
  694. return 1;
  695. }
  696. static int igmp_marksources(struct ip_mc_list *pmc, int nsrcs, __be32 *srcs)
  697. {
  698. struct ip_sf_list *psf;
  699. int i, scount;
  700. if (pmc->sfmode == MCAST_EXCLUDE)
  701. return igmp_xmarksources(pmc, nsrcs, srcs);
  702. /* mark INCLUDE-mode sources */
  703. scount = 0;
  704. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  705. if (scount == nsrcs)
  706. break;
  707. for (i=0; i<nsrcs; i++)
  708. if (srcs[i] == psf->sf_inaddr) {
  709. psf->sf_gsresp = 1;
  710. scount++;
  711. break;
  712. }
  713. }
  714. if (!scount) {
  715. pmc->gsquery = 0;
  716. return 0;
  717. }
  718. pmc->gsquery = 1;
  719. return 1;
  720. }
  721. /* return true if packet was dropped */
  722. static bool igmp_heard_report(struct in_device *in_dev, __be32 group)
  723. {
  724. struct ip_mc_list *im;
  725. /* Timers are only set for non-local groups */
  726. if (group == IGMP_ALL_HOSTS)
  727. return false;
  728. rcu_read_lock();
  729. for_each_pmc_rcu(in_dev, im) {
  730. if (im->multiaddr == group) {
  731. igmp_stop_timer(im);
  732. break;
  733. }
  734. }
  735. rcu_read_unlock();
  736. return false;
  737. }
  738. /* return true if packet was dropped */
  739. static bool igmp_heard_query(struct in_device *in_dev, struct sk_buff *skb,
  740. int len)
  741. {
  742. struct igmphdr *ih = igmp_hdr(skb);
  743. struct igmpv3_query *ih3 = igmpv3_query_hdr(skb);
  744. struct ip_mc_list *im;
  745. __be32 group = ih->group;
  746. int max_delay;
  747. int mark = 0;
  748. if (len == 8) {
  749. if (ih->code == 0) {
  750. /* Alas, old v1 router presents here. */
  751. max_delay = IGMP_Query_Response_Interval;
  752. in_dev->mr_v1_seen = jiffies +
  753. IGMP_V1_Router_Present_Timeout;
  754. group = 0;
  755. } else {
  756. /* v2 router present */
  757. max_delay = ih->code*(HZ/IGMP_TIMER_SCALE);
  758. in_dev->mr_v2_seen = jiffies +
  759. IGMP_V2_Router_Present_Timeout;
  760. }
  761. /* cancel the interface change timer */
  762. in_dev->mr_ifc_count = 0;
  763. if (del_timer(&in_dev->mr_ifc_timer))
  764. __in_dev_put(in_dev);
  765. /* clear deleted report items */
  766. igmpv3_clear_delrec(in_dev);
  767. } else if (len < 12) {
  768. return true; /* ignore bogus packet; freed by caller */
  769. } else if (IGMP_V1_SEEN(in_dev)) {
  770. /* This is a v3 query with v1 queriers present */
  771. max_delay = IGMP_Query_Response_Interval;
  772. group = 0;
  773. } else if (IGMP_V2_SEEN(in_dev)) {
  774. /* this is a v3 query with v2 queriers present;
  775. * Interpretation of the max_delay code is problematic here.
  776. * A real v2 host would use ih_code directly, while v3 has a
  777. * different encoding. We use the v3 encoding as more likely
  778. * to be intended in a v3 query.
  779. */
  780. max_delay = IGMPV3_MRC(ih3->code)*(HZ/IGMP_TIMER_SCALE);
  781. if (!max_delay)
  782. max_delay = 1; /* can't mod w/ 0 */
  783. } else { /* v3 */
  784. if (!pskb_may_pull(skb, sizeof(struct igmpv3_query)))
  785. return true;
  786. ih3 = igmpv3_query_hdr(skb);
  787. if (ih3->nsrcs) {
  788. if (!pskb_may_pull(skb, sizeof(struct igmpv3_query)
  789. + ntohs(ih3->nsrcs)*sizeof(__be32)))
  790. return true;
  791. ih3 = igmpv3_query_hdr(skb);
  792. }
  793. max_delay = IGMPV3_MRC(ih3->code)*(HZ/IGMP_TIMER_SCALE);
  794. if (!max_delay)
  795. max_delay = 1; /* can't mod w/ 0 */
  796. in_dev->mr_maxdelay = max_delay;
  797. if (ih3->qrv)
  798. in_dev->mr_qrv = ih3->qrv;
  799. if (!group) { /* general query */
  800. if (ih3->nsrcs)
  801. return false; /* no sources allowed */
  802. igmp_gq_start_timer(in_dev);
  803. return false;
  804. }
  805. /* mark sources to include, if group & source-specific */
  806. mark = ih3->nsrcs != 0;
  807. }
  808. /*
  809. * - Start the timers in all of our membership records
  810. * that the query applies to for the interface on
  811. * which the query arrived excl. those that belong
  812. * to a "local" group (224.0.0.X)
  813. * - For timers already running check if they need to
  814. * be reset.
  815. * - Use the igmp->igmp_code field as the maximum
  816. * delay possible
  817. */
  818. rcu_read_lock();
  819. for_each_pmc_rcu(in_dev, im) {
  820. int changed;
  821. if (group && group != im->multiaddr)
  822. continue;
  823. if (im->multiaddr == IGMP_ALL_HOSTS)
  824. continue;
  825. spin_lock_bh(&im->lock);
  826. if (im->tm_running)
  827. im->gsquery = im->gsquery && mark;
  828. else
  829. im->gsquery = mark;
  830. changed = !im->gsquery ||
  831. igmp_marksources(im, ntohs(ih3->nsrcs), ih3->srcs);
  832. spin_unlock_bh(&im->lock);
  833. if (changed)
  834. igmp_mod_timer(im, max_delay);
  835. }
  836. rcu_read_unlock();
  837. return false;
  838. }
  839. /* called in rcu_read_lock() section */
  840. int igmp_rcv(struct sk_buff *skb)
  841. {
  842. /* This basically follows the spec line by line -- see RFC1112 */
  843. struct igmphdr *ih;
  844. struct in_device *in_dev = __in_dev_get_rcu(skb->dev);
  845. int len = skb->len;
  846. bool dropped = true;
  847. if (in_dev == NULL)
  848. goto drop;
  849. if (!pskb_may_pull(skb, sizeof(struct igmphdr)))
  850. goto drop;
  851. switch (skb->ip_summed) {
  852. case CHECKSUM_COMPLETE:
  853. if (!csum_fold(skb->csum))
  854. break;
  855. /* fall through */
  856. case CHECKSUM_NONE:
  857. skb->csum = 0;
  858. if (__skb_checksum_complete(skb))
  859. goto drop;
  860. }
  861. ih = igmp_hdr(skb);
  862. switch (ih->type) {
  863. case IGMP_HOST_MEMBERSHIP_QUERY:
  864. dropped = igmp_heard_query(in_dev, skb, len);
  865. break;
  866. case IGMP_HOST_MEMBERSHIP_REPORT:
  867. case IGMPV2_HOST_MEMBERSHIP_REPORT:
  868. /* Is it our report looped back? */
  869. if (rt_is_output_route(skb_rtable(skb)))
  870. break;
  871. /* don't rely on MC router hearing unicast reports */
  872. if (skb->pkt_type == PACKET_MULTICAST ||
  873. skb->pkt_type == PACKET_BROADCAST)
  874. dropped = igmp_heard_report(in_dev, ih->group);
  875. break;
  876. case IGMP_PIM:
  877. #ifdef CONFIG_IP_PIMSM_V1
  878. return pim_rcv_v1(skb);
  879. #endif
  880. case IGMPV3_HOST_MEMBERSHIP_REPORT:
  881. case IGMP_DVMRP:
  882. case IGMP_TRACE:
  883. case IGMP_HOST_LEAVE_MESSAGE:
  884. case IGMP_MTRACE:
  885. case IGMP_MTRACE_RESP:
  886. break;
  887. default:
  888. break;
  889. }
  890. drop:
  891. if (dropped)
  892. kfree_skb(skb);
  893. else
  894. consume_skb(skb);
  895. return 0;
  896. }
  897. #endif
  898. /*
  899. * Add a filter to a device
  900. */
  901. static void ip_mc_filter_add(struct in_device *in_dev, __be32 addr)
  902. {
  903. char buf[MAX_ADDR_LEN];
  904. struct net_device *dev = in_dev->dev;
  905. /* Checking for IFF_MULTICAST here is WRONG-WRONG-WRONG.
  906. We will get multicast token leakage, when IFF_MULTICAST
  907. is changed. This check should be done in ndo_set_rx_mode
  908. routine. Something sort of:
  909. if (dev->mc_list && dev->flags&IFF_MULTICAST) { do it; }
  910. --ANK
  911. */
  912. if (arp_mc_map(addr, buf, dev, 0) == 0)
  913. dev_mc_add(dev, buf);
  914. }
  915. /*
  916. * Remove a filter from a device
  917. */
  918. static void ip_mc_filter_del(struct in_device *in_dev, __be32 addr)
  919. {
  920. char buf[MAX_ADDR_LEN];
  921. struct net_device *dev = in_dev->dev;
  922. if (arp_mc_map(addr, buf, dev, 0) == 0)
  923. dev_mc_del(dev, buf);
  924. }
  925. #ifdef CONFIG_IP_MULTICAST
  926. /*
  927. * deleted ip_mc_list manipulation
  928. */
  929. static void igmpv3_add_delrec(struct in_device *in_dev, struct ip_mc_list *im)
  930. {
  931. struct ip_mc_list *pmc;
  932. /* this is an "ip_mc_list" for convenience; only the fields below
  933. * are actually used. In particular, the refcnt and users are not
  934. * used for management of the delete list. Using the same structure
  935. * for deleted items allows change reports to use common code with
  936. * non-deleted or query-response MCA's.
  937. */
  938. pmc = kzalloc(sizeof(*pmc), GFP_KERNEL);
  939. if (!pmc)
  940. return;
  941. spin_lock_bh(&im->lock);
  942. pmc->interface = im->interface;
  943. in_dev_hold(in_dev);
  944. pmc->multiaddr = im->multiaddr;
  945. pmc->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  946. IGMP_Unsolicited_Report_Count;
  947. pmc->sfmode = im->sfmode;
  948. if (pmc->sfmode == MCAST_INCLUDE) {
  949. struct ip_sf_list *psf;
  950. pmc->tomb = im->tomb;
  951. pmc->sources = im->sources;
  952. im->tomb = im->sources = NULL;
  953. for (psf=pmc->sources; psf; psf=psf->sf_next)
  954. psf->sf_crcount = pmc->crcount;
  955. }
  956. spin_unlock_bh(&im->lock);
  957. spin_lock_bh(&in_dev->mc_tomb_lock);
  958. pmc->next = in_dev->mc_tomb;
  959. in_dev->mc_tomb = pmc;
  960. spin_unlock_bh(&in_dev->mc_tomb_lock);
  961. }
  962. static void igmpv3_del_delrec(struct in_device *in_dev, __be32 multiaddr)
  963. {
  964. struct ip_mc_list *pmc, *pmc_prev;
  965. struct ip_sf_list *psf, *psf_next;
  966. spin_lock_bh(&in_dev->mc_tomb_lock);
  967. pmc_prev = NULL;
  968. for (pmc=in_dev->mc_tomb; pmc; pmc=pmc->next) {
  969. if (pmc->multiaddr == multiaddr)
  970. break;
  971. pmc_prev = pmc;
  972. }
  973. if (pmc) {
  974. if (pmc_prev)
  975. pmc_prev->next = pmc->next;
  976. else
  977. in_dev->mc_tomb = pmc->next;
  978. }
  979. spin_unlock_bh(&in_dev->mc_tomb_lock);
  980. if (pmc) {
  981. for (psf=pmc->tomb; psf; psf=psf_next) {
  982. psf_next = psf->sf_next;
  983. kfree(psf);
  984. }
  985. in_dev_put(pmc->interface);
  986. kfree(pmc);
  987. }
  988. }
  989. static void igmpv3_clear_delrec(struct in_device *in_dev)
  990. {
  991. struct ip_mc_list *pmc, *nextpmc;
  992. spin_lock_bh(&in_dev->mc_tomb_lock);
  993. pmc = in_dev->mc_tomb;
  994. in_dev->mc_tomb = NULL;
  995. spin_unlock_bh(&in_dev->mc_tomb_lock);
  996. for (; pmc; pmc = nextpmc) {
  997. nextpmc = pmc->next;
  998. ip_mc_clear_src(pmc);
  999. in_dev_put(pmc->interface);
  1000. kfree(pmc);
  1001. }
  1002. /* clear dead sources, too */
  1003. rcu_read_lock();
  1004. for_each_pmc_rcu(in_dev, pmc) {
  1005. struct ip_sf_list *psf, *psf_next;
  1006. spin_lock_bh(&pmc->lock);
  1007. psf = pmc->tomb;
  1008. pmc->tomb = NULL;
  1009. spin_unlock_bh(&pmc->lock);
  1010. for (; psf; psf=psf_next) {
  1011. psf_next = psf->sf_next;
  1012. kfree(psf);
  1013. }
  1014. }
  1015. rcu_read_unlock();
  1016. }
  1017. #endif
  1018. static void igmp_group_dropped(struct ip_mc_list *im)
  1019. {
  1020. struct in_device *in_dev = im->interface;
  1021. #ifdef CONFIG_IP_MULTICAST
  1022. int reporter;
  1023. #endif
  1024. if (im->loaded) {
  1025. im->loaded = 0;
  1026. ip_mc_filter_del(in_dev, im->multiaddr);
  1027. }
  1028. #ifdef CONFIG_IP_MULTICAST
  1029. if (im->multiaddr == IGMP_ALL_HOSTS)
  1030. return;
  1031. reporter = im->reporter;
  1032. igmp_stop_timer(im);
  1033. if (!in_dev->dead) {
  1034. if (IGMP_V1_SEEN(in_dev))
  1035. return;
  1036. if (IGMP_V2_SEEN(in_dev)) {
  1037. if (reporter)
  1038. igmp_send_report(in_dev, im, IGMP_HOST_LEAVE_MESSAGE);
  1039. return;
  1040. }
  1041. /* IGMPv3 */
  1042. igmpv3_add_delrec(in_dev, im);
  1043. igmp_ifc_event(in_dev);
  1044. }
  1045. #endif
  1046. }
  1047. static void igmp_group_added(struct ip_mc_list *im)
  1048. {
  1049. struct in_device *in_dev = im->interface;
  1050. if (im->loaded == 0) {
  1051. im->loaded = 1;
  1052. ip_mc_filter_add(in_dev, im->multiaddr);
  1053. }
  1054. #ifdef CONFIG_IP_MULTICAST
  1055. if (im->multiaddr == IGMP_ALL_HOSTS)
  1056. return;
  1057. if (in_dev->dead)
  1058. return;
  1059. if (IGMP_V1_SEEN(in_dev) || IGMP_V2_SEEN(in_dev)) {
  1060. spin_lock_bh(&im->lock);
  1061. igmp_start_timer(im, IGMP_Initial_Report_Delay);
  1062. spin_unlock_bh(&im->lock);
  1063. return;
  1064. }
  1065. /* else, v3 */
  1066. im->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1067. IGMP_Unsolicited_Report_Count;
  1068. igmp_ifc_event(in_dev);
  1069. #endif
  1070. }
  1071. /*
  1072. * Multicast list managers
  1073. */
  1074. /*
  1075. * A socket has joined a multicast group on device dev.
  1076. */
  1077. void ip_mc_inc_group(struct in_device *in_dev, __be32 addr)
  1078. {
  1079. struct ip_mc_list *im;
  1080. ASSERT_RTNL();
  1081. for_each_pmc_rtnl(in_dev, im) {
  1082. if (im->multiaddr == addr) {
  1083. im->users++;
  1084. ip_mc_add_src(in_dev, &addr, MCAST_EXCLUDE, 0, NULL, 0);
  1085. goto out;
  1086. }
  1087. }
  1088. im = kzalloc(sizeof(*im), GFP_KERNEL);
  1089. if (!im)
  1090. goto out;
  1091. im->users = 1;
  1092. im->interface = in_dev;
  1093. in_dev_hold(in_dev);
  1094. im->multiaddr = addr;
  1095. /* initial mode is (EX, empty) */
  1096. im->sfmode = MCAST_EXCLUDE;
  1097. im->sfcount[MCAST_EXCLUDE] = 1;
  1098. atomic_set(&im->refcnt, 1);
  1099. spin_lock_init(&im->lock);
  1100. #ifdef CONFIG_IP_MULTICAST
  1101. setup_timer(&im->timer, &igmp_timer_expire, (unsigned long)im);
  1102. im->unsolicit_count = IGMP_Unsolicited_Report_Count;
  1103. #endif
  1104. im->next_rcu = in_dev->mc_list;
  1105. in_dev->mc_count++;
  1106. rcu_assign_pointer(in_dev->mc_list, im);
  1107. #ifdef CONFIG_IP_MULTICAST
  1108. igmpv3_del_delrec(in_dev, im->multiaddr);
  1109. #endif
  1110. igmp_group_added(im);
  1111. if (!in_dev->dead)
  1112. ip_rt_multicast_event(in_dev);
  1113. out:
  1114. return;
  1115. }
  1116. EXPORT_SYMBOL(ip_mc_inc_group);
  1117. /*
  1118. * Resend IGMP JOIN report; used for bonding.
  1119. * Called with rcu_read_lock()
  1120. */
  1121. void ip_mc_rejoin_groups(struct in_device *in_dev)
  1122. {
  1123. #ifdef CONFIG_IP_MULTICAST
  1124. struct ip_mc_list *im;
  1125. int type;
  1126. for_each_pmc_rcu(in_dev, im) {
  1127. if (im->multiaddr == IGMP_ALL_HOSTS)
  1128. continue;
  1129. /* a failover is happening and switches
  1130. * must be notified immediately
  1131. */
  1132. if (IGMP_V1_SEEN(in_dev))
  1133. type = IGMP_HOST_MEMBERSHIP_REPORT;
  1134. else if (IGMP_V2_SEEN(in_dev))
  1135. type = IGMPV2_HOST_MEMBERSHIP_REPORT;
  1136. else
  1137. type = IGMPV3_HOST_MEMBERSHIP_REPORT;
  1138. igmp_send_report(in_dev, im, type);
  1139. }
  1140. #endif
  1141. }
  1142. EXPORT_SYMBOL(ip_mc_rejoin_groups);
  1143. /*
  1144. * A socket has left a multicast group on device dev
  1145. */
  1146. void ip_mc_dec_group(struct in_device *in_dev, __be32 addr)
  1147. {
  1148. struct ip_mc_list *i;
  1149. struct ip_mc_list __rcu **ip;
  1150. ASSERT_RTNL();
  1151. for (ip = &in_dev->mc_list;
  1152. (i = rtnl_dereference(*ip)) != NULL;
  1153. ip = &i->next_rcu) {
  1154. if (i->multiaddr == addr) {
  1155. if (--i->users == 0) {
  1156. *ip = i->next_rcu;
  1157. in_dev->mc_count--;
  1158. igmp_group_dropped(i);
  1159. ip_mc_clear_src(i);
  1160. if (!in_dev->dead)
  1161. ip_rt_multicast_event(in_dev);
  1162. ip_ma_put(i);
  1163. return;
  1164. }
  1165. break;
  1166. }
  1167. }
  1168. }
  1169. EXPORT_SYMBOL(ip_mc_dec_group);
  1170. /* Device changing type */
  1171. void ip_mc_unmap(struct in_device *in_dev)
  1172. {
  1173. struct ip_mc_list *pmc;
  1174. ASSERT_RTNL();
  1175. for_each_pmc_rtnl(in_dev, pmc)
  1176. igmp_group_dropped(pmc);
  1177. }
  1178. void ip_mc_remap(struct in_device *in_dev)
  1179. {
  1180. struct ip_mc_list *pmc;
  1181. ASSERT_RTNL();
  1182. for_each_pmc_rtnl(in_dev, pmc)
  1183. igmp_group_added(pmc);
  1184. }
  1185. /* Device going down */
  1186. void ip_mc_down(struct in_device *in_dev)
  1187. {
  1188. struct ip_mc_list *pmc;
  1189. ASSERT_RTNL();
  1190. for_each_pmc_rtnl(in_dev, pmc)
  1191. igmp_group_dropped(pmc);
  1192. #ifdef CONFIG_IP_MULTICAST
  1193. in_dev->mr_ifc_count = 0;
  1194. if (del_timer(&in_dev->mr_ifc_timer))
  1195. __in_dev_put(in_dev);
  1196. in_dev->mr_gq_running = 0;
  1197. if (del_timer(&in_dev->mr_gq_timer))
  1198. __in_dev_put(in_dev);
  1199. igmpv3_clear_delrec(in_dev);
  1200. #endif
  1201. ip_mc_dec_group(in_dev, IGMP_ALL_HOSTS);
  1202. }
  1203. void ip_mc_init_dev(struct in_device *in_dev)
  1204. {
  1205. ASSERT_RTNL();
  1206. in_dev->mc_tomb = NULL;
  1207. #ifdef CONFIG_IP_MULTICAST
  1208. in_dev->mr_gq_running = 0;
  1209. setup_timer(&in_dev->mr_gq_timer, igmp_gq_timer_expire,
  1210. (unsigned long)in_dev);
  1211. in_dev->mr_ifc_count = 0;
  1212. in_dev->mc_count = 0;
  1213. setup_timer(&in_dev->mr_ifc_timer, igmp_ifc_timer_expire,
  1214. (unsigned long)in_dev);
  1215. in_dev->mr_qrv = IGMP_Unsolicited_Report_Count;
  1216. #endif
  1217. spin_lock_init(&in_dev->mc_tomb_lock);
  1218. }
  1219. /* Device going up */
  1220. void ip_mc_up(struct in_device *in_dev)
  1221. {
  1222. struct ip_mc_list *pmc;
  1223. ASSERT_RTNL();
  1224. ip_mc_inc_group(in_dev, IGMP_ALL_HOSTS);
  1225. for_each_pmc_rtnl(in_dev, pmc)
  1226. igmp_group_added(pmc);
  1227. }
  1228. /*
  1229. * Device is about to be destroyed: clean up.
  1230. */
  1231. void ip_mc_destroy_dev(struct in_device *in_dev)
  1232. {
  1233. struct ip_mc_list *i;
  1234. ASSERT_RTNL();
  1235. /* Deactivate timers */
  1236. ip_mc_down(in_dev);
  1237. while ((i = rtnl_dereference(in_dev->mc_list)) != NULL) {
  1238. in_dev->mc_list = i->next_rcu;
  1239. in_dev->mc_count--;
  1240. /* We've dropped the groups in ip_mc_down already */
  1241. ip_mc_clear_src(i);
  1242. ip_ma_put(i);
  1243. }
  1244. }
  1245. /* RTNL is locked */
  1246. static struct in_device *ip_mc_find_dev(struct net *net, struct ip_mreqn *imr)
  1247. {
  1248. struct net_device *dev = NULL;
  1249. struct in_device *idev = NULL;
  1250. if (imr->imr_ifindex) {
  1251. idev = inetdev_by_index(net, imr->imr_ifindex);
  1252. return idev;
  1253. }
  1254. if (imr->imr_address.s_addr) {
  1255. dev = __ip_dev_find(net, imr->imr_address.s_addr, false);
  1256. if (!dev)
  1257. return NULL;
  1258. }
  1259. if (!dev) {
  1260. struct rtable *rt = ip_route_output(net,
  1261. imr->imr_multiaddr.s_addr,
  1262. 0, 0, 0);
  1263. if (!IS_ERR(rt)) {
  1264. dev = rt->dst.dev;
  1265. ip_rt_put(rt);
  1266. }
  1267. }
  1268. if (dev) {
  1269. imr->imr_ifindex = dev->ifindex;
  1270. idev = __in_dev_get_rtnl(dev);
  1271. }
  1272. return idev;
  1273. }
  1274. /*
  1275. * Join a socket to a group
  1276. */
  1277. int sysctl_igmp_max_memberships __read_mostly = IP_MAX_MEMBERSHIPS;
  1278. int sysctl_igmp_max_msf __read_mostly = IP_MAX_MSF;
  1279. static int ip_mc_del1_src(struct ip_mc_list *pmc, int sfmode,
  1280. __be32 *psfsrc)
  1281. {
  1282. struct ip_sf_list *psf, *psf_prev;
  1283. int rv = 0;
  1284. psf_prev = NULL;
  1285. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  1286. if (psf->sf_inaddr == *psfsrc)
  1287. break;
  1288. psf_prev = psf;
  1289. }
  1290. if (!psf || psf->sf_count[sfmode] == 0) {
  1291. /* source filter not found, or count wrong => bug */
  1292. return -ESRCH;
  1293. }
  1294. psf->sf_count[sfmode]--;
  1295. if (psf->sf_count[sfmode] == 0) {
  1296. ip_rt_multicast_event(pmc->interface);
  1297. }
  1298. if (!psf->sf_count[MCAST_INCLUDE] && !psf->sf_count[MCAST_EXCLUDE]) {
  1299. #ifdef CONFIG_IP_MULTICAST
  1300. struct in_device *in_dev = pmc->interface;
  1301. #endif
  1302. /* no more filters for this source */
  1303. if (psf_prev)
  1304. psf_prev->sf_next = psf->sf_next;
  1305. else
  1306. pmc->sources = psf->sf_next;
  1307. #ifdef CONFIG_IP_MULTICAST
  1308. if (psf->sf_oldin &&
  1309. !IGMP_V1_SEEN(in_dev) && !IGMP_V2_SEEN(in_dev)) {
  1310. psf->sf_crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1311. IGMP_Unsolicited_Report_Count;
  1312. psf->sf_next = pmc->tomb;
  1313. pmc->tomb = psf;
  1314. rv = 1;
  1315. } else
  1316. #endif
  1317. kfree(psf);
  1318. }
  1319. return rv;
  1320. }
  1321. #ifndef CONFIG_IP_MULTICAST
  1322. #define igmp_ifc_event(x) do { } while (0)
  1323. #endif
  1324. static int ip_mc_del_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
  1325. int sfcount, __be32 *psfsrc, int delta)
  1326. {
  1327. struct ip_mc_list *pmc;
  1328. int changerec = 0;
  1329. int i, err;
  1330. if (!in_dev)
  1331. return -ENODEV;
  1332. rcu_read_lock();
  1333. for_each_pmc_rcu(in_dev, pmc) {
  1334. if (*pmca == pmc->multiaddr)
  1335. break;
  1336. }
  1337. if (!pmc) {
  1338. /* MCA not found?? bug */
  1339. rcu_read_unlock();
  1340. return -ESRCH;
  1341. }
  1342. spin_lock_bh(&pmc->lock);
  1343. rcu_read_unlock();
  1344. #ifdef CONFIG_IP_MULTICAST
  1345. sf_markstate(pmc);
  1346. #endif
  1347. if (!delta) {
  1348. err = -EINVAL;
  1349. if (!pmc->sfcount[sfmode])
  1350. goto out_unlock;
  1351. pmc->sfcount[sfmode]--;
  1352. }
  1353. err = 0;
  1354. for (i=0; i<sfcount; i++) {
  1355. int rv = ip_mc_del1_src(pmc, sfmode, &psfsrc[i]);
  1356. changerec |= rv > 0;
  1357. if (!err && rv < 0)
  1358. err = rv;
  1359. }
  1360. if (pmc->sfmode == MCAST_EXCLUDE &&
  1361. pmc->sfcount[MCAST_EXCLUDE] == 0 &&
  1362. pmc->sfcount[MCAST_INCLUDE]) {
  1363. #ifdef CONFIG_IP_MULTICAST
  1364. struct ip_sf_list *psf;
  1365. #endif
  1366. /* filter mode change */
  1367. pmc->sfmode = MCAST_INCLUDE;
  1368. #ifdef CONFIG_IP_MULTICAST
  1369. pmc->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1370. IGMP_Unsolicited_Report_Count;
  1371. in_dev->mr_ifc_count = pmc->crcount;
  1372. for (psf=pmc->sources; psf; psf = psf->sf_next)
  1373. psf->sf_crcount = 0;
  1374. igmp_ifc_event(pmc->interface);
  1375. } else if (sf_setstate(pmc) || changerec) {
  1376. igmp_ifc_event(pmc->interface);
  1377. #endif
  1378. }
  1379. out_unlock:
  1380. spin_unlock_bh(&pmc->lock);
  1381. return err;
  1382. }
  1383. /*
  1384. * Add multicast single-source filter to the interface list
  1385. */
  1386. static int ip_mc_add1_src(struct ip_mc_list *pmc, int sfmode,
  1387. __be32 *psfsrc)
  1388. {
  1389. struct ip_sf_list *psf, *psf_prev;
  1390. psf_prev = NULL;
  1391. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  1392. if (psf->sf_inaddr == *psfsrc)
  1393. break;
  1394. psf_prev = psf;
  1395. }
  1396. if (!psf) {
  1397. psf = kzalloc(sizeof(*psf), GFP_ATOMIC);
  1398. if (!psf)
  1399. return -ENOBUFS;
  1400. psf->sf_inaddr = *psfsrc;
  1401. if (psf_prev) {
  1402. psf_prev->sf_next = psf;
  1403. } else
  1404. pmc->sources = psf;
  1405. }
  1406. psf->sf_count[sfmode]++;
  1407. if (psf->sf_count[sfmode] == 1) {
  1408. ip_rt_multicast_event(pmc->interface);
  1409. }
  1410. return 0;
  1411. }
  1412. #ifdef CONFIG_IP_MULTICAST
  1413. static void sf_markstate(struct ip_mc_list *pmc)
  1414. {
  1415. struct ip_sf_list *psf;
  1416. int mca_xcount = pmc->sfcount[MCAST_EXCLUDE];
  1417. for (psf=pmc->sources; psf; psf=psf->sf_next)
  1418. if (pmc->sfcount[MCAST_EXCLUDE]) {
  1419. psf->sf_oldin = mca_xcount ==
  1420. psf->sf_count[MCAST_EXCLUDE] &&
  1421. !psf->sf_count[MCAST_INCLUDE];
  1422. } else
  1423. psf->sf_oldin = psf->sf_count[MCAST_INCLUDE] != 0;
  1424. }
  1425. static int sf_setstate(struct ip_mc_list *pmc)
  1426. {
  1427. struct ip_sf_list *psf, *dpsf;
  1428. int mca_xcount = pmc->sfcount[MCAST_EXCLUDE];
  1429. int qrv = pmc->interface->mr_qrv;
  1430. int new_in, rv;
  1431. rv = 0;
  1432. for (psf=pmc->sources; psf; psf=psf->sf_next) {
  1433. if (pmc->sfcount[MCAST_EXCLUDE]) {
  1434. new_in = mca_xcount == psf->sf_count[MCAST_EXCLUDE] &&
  1435. !psf->sf_count[MCAST_INCLUDE];
  1436. } else
  1437. new_in = psf->sf_count[MCAST_INCLUDE] != 0;
  1438. if (new_in) {
  1439. if (!psf->sf_oldin) {
  1440. struct ip_sf_list *prev = NULL;
  1441. for (dpsf=pmc->tomb; dpsf; dpsf=dpsf->sf_next) {
  1442. if (dpsf->sf_inaddr == psf->sf_inaddr)
  1443. break;
  1444. prev = dpsf;
  1445. }
  1446. if (dpsf) {
  1447. if (prev)
  1448. prev->sf_next = dpsf->sf_next;
  1449. else
  1450. pmc->tomb = dpsf->sf_next;
  1451. kfree(dpsf);
  1452. }
  1453. psf->sf_crcount = qrv;
  1454. rv++;
  1455. }
  1456. } else if (psf->sf_oldin) {
  1457. psf->sf_crcount = 0;
  1458. /*
  1459. * add or update "delete" records if an active filter
  1460. * is now inactive
  1461. */
  1462. for (dpsf=pmc->tomb; dpsf; dpsf=dpsf->sf_next)
  1463. if (dpsf->sf_inaddr == psf->sf_inaddr)
  1464. break;
  1465. if (!dpsf) {
  1466. dpsf = kmalloc(sizeof(*dpsf), GFP_ATOMIC);
  1467. if (!dpsf)
  1468. continue;
  1469. *dpsf = *psf;
  1470. /* pmc->lock held by callers */
  1471. dpsf->sf_next = pmc->tomb;
  1472. pmc->tomb = dpsf;
  1473. }
  1474. dpsf->sf_crcount = qrv;
  1475. rv++;
  1476. }
  1477. }
  1478. return rv;
  1479. }
  1480. #endif
  1481. /*
  1482. * Add multicast source filter list to the interface list
  1483. */
  1484. static int ip_mc_add_src(struct in_device *in_dev, __be32 *pmca, int sfmode,
  1485. int sfcount, __be32 *psfsrc, int delta)
  1486. {
  1487. struct ip_mc_list *pmc;
  1488. int isexclude;
  1489. int i, err;
  1490. if (!in_dev)
  1491. return -ENODEV;
  1492. rcu_read_lock();
  1493. for_each_pmc_rcu(in_dev, pmc) {
  1494. if (*pmca == pmc->multiaddr)
  1495. break;
  1496. }
  1497. if (!pmc) {
  1498. /* MCA not found?? bug */
  1499. rcu_read_unlock();
  1500. return -ESRCH;
  1501. }
  1502. spin_lock_bh(&pmc->lock);
  1503. rcu_read_unlock();
  1504. #ifdef CONFIG_IP_MULTICAST
  1505. sf_markstate(pmc);
  1506. #endif
  1507. isexclude = pmc->sfmode == MCAST_EXCLUDE;
  1508. if (!delta)
  1509. pmc->sfcount[sfmode]++;
  1510. err = 0;
  1511. for (i=0; i<sfcount; i++) {
  1512. err = ip_mc_add1_src(pmc, sfmode, &psfsrc[i]);
  1513. if (err)
  1514. break;
  1515. }
  1516. if (err) {
  1517. int j;
  1518. if (!delta)
  1519. pmc->sfcount[sfmode]--;
  1520. for (j=0; j<i; j++)
  1521. (void) ip_mc_del1_src(pmc, sfmode, &psfsrc[j]);
  1522. } else if (isexclude != (pmc->sfcount[MCAST_EXCLUDE] != 0)) {
  1523. #ifdef CONFIG_IP_MULTICAST
  1524. struct ip_sf_list *psf;
  1525. in_dev = pmc->interface;
  1526. #endif
  1527. /* filter mode change */
  1528. if (pmc->sfcount[MCAST_EXCLUDE])
  1529. pmc->sfmode = MCAST_EXCLUDE;
  1530. else if (pmc->sfcount[MCAST_INCLUDE])
  1531. pmc->sfmode = MCAST_INCLUDE;
  1532. #ifdef CONFIG_IP_MULTICAST
  1533. /* else no filters; keep old mode for reports */
  1534. pmc->crcount = in_dev->mr_qrv ? in_dev->mr_qrv :
  1535. IGMP_Unsolicited_Report_Count;
  1536. in_dev->mr_ifc_count = pmc->crcount;
  1537. for (psf=pmc->sources; psf; psf = psf->sf_next)
  1538. psf->sf_crcount = 0;
  1539. igmp_ifc_event(in_dev);
  1540. } else if (sf_setstate(pmc)) {
  1541. igmp_ifc_event(in_dev);
  1542. #endif
  1543. }
  1544. spin_unlock_bh(&pmc->lock);
  1545. return err;
  1546. }
  1547. static void ip_mc_clear_src(struct ip_mc_list *pmc)
  1548. {
  1549. struct ip_sf_list *psf, *nextpsf;
  1550. for (psf=pmc->tomb; psf; psf=nextpsf) {
  1551. nextpsf = psf->sf_next;
  1552. kfree(psf);
  1553. }
  1554. pmc->tomb = NULL;
  1555. for (psf=pmc->sources; psf; psf=nextpsf) {
  1556. nextpsf = psf->sf_next;
  1557. kfree(psf);
  1558. }
  1559. pmc->sources = NULL;
  1560. pmc->sfmode = MCAST_EXCLUDE;
  1561. pmc->sfcount[MCAST_INCLUDE] = 0;
  1562. pmc->sfcount[MCAST_EXCLUDE] = 1;
  1563. }
  1564. /*
  1565. * Join a multicast group
  1566. */
  1567. int ip_mc_join_group(struct sock *sk , struct ip_mreqn *imr)
  1568. {
  1569. int err;
  1570. __be32 addr = imr->imr_multiaddr.s_addr;
  1571. struct ip_mc_socklist *iml = NULL, *i;
  1572. struct in_device *in_dev;
  1573. struct inet_sock *inet = inet_sk(sk);
  1574. struct net *net = sock_net(sk);
  1575. int ifindex;
  1576. int count = 0;
  1577. if (!ipv4_is_multicast(addr))
  1578. return -EINVAL;
  1579. rtnl_lock();
  1580. in_dev = ip_mc_find_dev(net, imr);
  1581. if (!in_dev) {
  1582. iml = NULL;
  1583. err = -ENODEV;
  1584. goto done;
  1585. }
  1586. err = -EADDRINUSE;
  1587. ifindex = imr->imr_ifindex;
  1588. for_each_pmc_rtnl(inet, i) {
  1589. if (i->multi.imr_multiaddr.s_addr == addr &&
  1590. i->multi.imr_ifindex == ifindex)
  1591. goto done;
  1592. count++;
  1593. }
  1594. err = -ENOBUFS;
  1595. if (count >= sysctl_igmp_max_memberships)
  1596. goto done;
  1597. iml = sock_kmalloc(sk, sizeof(*iml), GFP_KERNEL);
  1598. if (iml == NULL)
  1599. goto done;
  1600. memcpy(&iml->multi, imr, sizeof(*imr));
  1601. iml->next_rcu = inet->mc_list;
  1602. iml->sflist = NULL;
  1603. iml->sfmode = MCAST_EXCLUDE;
  1604. rcu_assign_pointer(inet->mc_list, iml);
  1605. ip_mc_inc_group(in_dev, addr);
  1606. err = 0;
  1607. done:
  1608. rtnl_unlock();
  1609. return err;
  1610. }
  1611. EXPORT_SYMBOL(ip_mc_join_group);
  1612. static int ip_mc_leave_src(struct sock *sk, struct ip_mc_socklist *iml,
  1613. struct in_device *in_dev)
  1614. {
  1615. struct ip_sf_socklist *psf = rtnl_dereference(iml->sflist);
  1616. int err;
  1617. if (psf == NULL) {
  1618. /* any-source empty exclude case */
  1619. return ip_mc_del_src(in_dev, &iml->multi.imr_multiaddr.s_addr,
  1620. iml->sfmode, 0, NULL, 0);
  1621. }
  1622. err = ip_mc_del_src(in_dev, &iml->multi.imr_multiaddr.s_addr,
  1623. iml->sfmode, psf->sl_count, psf->sl_addr, 0);
  1624. RCU_INIT_POINTER(iml->sflist, NULL);
  1625. /* decrease mem now to avoid the memleak warning */
  1626. atomic_sub(IP_SFLSIZE(psf->sl_max), &sk->sk_omem_alloc);
  1627. kfree_rcu(psf, rcu);
  1628. return err;
  1629. }
  1630. /*
  1631. * Ask a socket to leave a group.
  1632. */
  1633. int ip_mc_leave_group(struct sock *sk, struct ip_mreqn *imr)
  1634. {
  1635. struct inet_sock *inet = inet_sk(sk);
  1636. struct ip_mc_socklist *iml;
  1637. struct ip_mc_socklist __rcu **imlp;
  1638. struct in_device *in_dev;
  1639. struct net *net = sock_net(sk);
  1640. __be32 group = imr->imr_multiaddr.s_addr;
  1641. u32 ifindex;
  1642. int ret = -EADDRNOTAVAIL;
  1643. rtnl_lock();
  1644. in_dev = ip_mc_find_dev(net, imr);
  1645. ifindex = imr->imr_ifindex;
  1646. for (imlp = &inet->mc_list;
  1647. (iml = rtnl_dereference(*imlp)) != NULL;
  1648. imlp = &iml->next_rcu) {
  1649. if (iml->multi.imr_multiaddr.s_addr != group)
  1650. continue;
  1651. if (ifindex) {
  1652. if (iml->multi.imr_ifindex != ifindex)
  1653. continue;
  1654. } else if (imr->imr_address.s_addr && imr->imr_address.s_addr !=
  1655. iml->multi.imr_address.s_addr)
  1656. continue;
  1657. (void) ip_mc_leave_src(sk, iml, in_dev);
  1658. *imlp = iml->next_rcu;
  1659. if (in_dev)
  1660. ip_mc_dec_group(in_dev, group);
  1661. rtnl_unlock();
  1662. /* decrease mem now to avoid the memleak warning */
  1663. atomic_sub(sizeof(*iml), &sk->sk_omem_alloc);
  1664. kfree_rcu(iml, rcu);
  1665. return 0;
  1666. }
  1667. if (!in_dev)
  1668. ret = -ENODEV;
  1669. rtnl_unlock();
  1670. return ret;
  1671. }
  1672. int ip_mc_source(int add, int omode, struct sock *sk, struct
  1673. ip_mreq_source *mreqs, int ifindex)
  1674. {
  1675. int err;
  1676. struct ip_mreqn imr;
  1677. __be32 addr = mreqs->imr_multiaddr;
  1678. struct ip_mc_socklist *pmc;
  1679. struct in_device *in_dev = NULL;
  1680. struct inet_sock *inet = inet_sk(sk);
  1681. struct ip_sf_socklist *psl;
  1682. struct net *net = sock_net(sk);
  1683. int leavegroup = 0;
  1684. int i, j, rv;
  1685. if (!ipv4_is_multicast(addr))
  1686. return -EINVAL;
  1687. rtnl_lock();
  1688. imr.imr_multiaddr.s_addr = mreqs->imr_multiaddr;
  1689. imr.imr_address.s_addr = mreqs->imr_interface;
  1690. imr.imr_ifindex = ifindex;
  1691. in_dev = ip_mc_find_dev(net, &imr);
  1692. if (!in_dev) {
  1693. err = -ENODEV;
  1694. goto done;
  1695. }
  1696. err = -EADDRNOTAVAIL;
  1697. for_each_pmc_rtnl(inet, pmc) {
  1698. if ((pmc->multi.imr_multiaddr.s_addr ==
  1699. imr.imr_multiaddr.s_addr) &&
  1700. (pmc->multi.imr_ifindex == imr.imr_ifindex))
  1701. break;
  1702. }
  1703. if (!pmc) { /* must have a prior join */
  1704. err = -EINVAL;
  1705. goto done;
  1706. }
  1707. /* if a source filter was set, must be the same mode as before */
  1708. if (pmc->sflist) {
  1709. if (pmc->sfmode != omode) {
  1710. err = -EINVAL;
  1711. goto done;
  1712. }
  1713. } else if (pmc->sfmode != omode) {
  1714. /* allow mode switches for empty-set filters */
  1715. ip_mc_add_src(in_dev, &mreqs->imr_multiaddr, omode, 0, NULL, 0);
  1716. ip_mc_del_src(in_dev, &mreqs->imr_multiaddr, pmc->sfmode, 0,
  1717. NULL, 0);
  1718. pmc->sfmode = omode;
  1719. }
  1720. psl = rtnl_dereference(pmc->sflist);
  1721. if (!add) {
  1722. if (!psl)
  1723. goto done; /* err = -EADDRNOTAVAIL */
  1724. rv = !0;
  1725. for (i=0; i<psl->sl_count; i++) {
  1726. rv = memcmp(&psl->sl_addr[i], &mreqs->imr_sourceaddr,
  1727. sizeof(__be32));
  1728. if (rv == 0)
  1729. break;
  1730. }
  1731. if (rv) /* source not found */
  1732. goto done; /* err = -EADDRNOTAVAIL */
  1733. /* special case - (INCLUDE, empty) == LEAVE_GROUP */
  1734. if (psl->sl_count == 1 && omode == MCAST_INCLUDE) {
  1735. leavegroup = 1;
  1736. goto done;
  1737. }
  1738. /* update the interface filter */
  1739. ip_mc_del_src(in_dev, &mreqs->imr_multiaddr, omode, 1,
  1740. &mreqs->imr_sourceaddr, 1);
  1741. for (j=i+1; j<psl->sl_count; j++)
  1742. psl->sl_addr[j-1] = psl->sl_addr[j];
  1743. psl->sl_count--;
  1744. err = 0;
  1745. goto done;
  1746. }
  1747. /* else, add a new source to the filter */
  1748. if (psl && psl->sl_count >= sysctl_igmp_max_msf) {
  1749. err = -ENOBUFS;
  1750. goto done;
  1751. }
  1752. if (!psl || psl->sl_count == psl->sl_max) {
  1753. struct ip_sf_socklist *newpsl;
  1754. int count = IP_SFBLOCK;
  1755. if (psl)
  1756. count += psl->sl_max;
  1757. newpsl = sock_kmalloc(sk, IP_SFLSIZE(count), GFP_KERNEL);
  1758. if (!newpsl) {
  1759. err = -ENOBUFS;
  1760. goto done;
  1761. }
  1762. newpsl->sl_max = count;
  1763. newpsl->sl_count = count - IP_SFBLOCK;
  1764. if (psl) {
  1765. for (i=0; i<psl->sl_count; i++)
  1766. newpsl->sl_addr[i] = psl->sl_addr[i];
  1767. /* decrease mem now to avoid the memleak warning */
  1768. atomic_sub(IP_SFLSIZE(psl->sl_max), &sk->sk_omem_alloc);
  1769. kfree_rcu(psl, rcu);
  1770. }
  1771. rcu_assign_pointer(pmc->sflist, newpsl);
  1772. psl = newpsl;
  1773. }
  1774. rv = 1; /* > 0 for insert logic below if sl_count is 0 */
  1775. for (i=0; i<psl->sl_count; i++) {
  1776. rv = memcmp(&psl->sl_addr[i], &mreqs->imr_sourceaddr,
  1777. sizeof(__be32));
  1778. if (rv == 0)
  1779. break;
  1780. }
  1781. if (rv == 0) /* address already there is an error */
  1782. goto done;
  1783. for (j=psl->sl_count-1; j>=i; j--)
  1784. psl->sl_addr[j+1] = psl->sl_addr[j];
  1785. psl->sl_addr[i] = mreqs->imr_sourceaddr;
  1786. psl->sl_count++;
  1787. err = 0;
  1788. /* update the interface list */
  1789. ip_mc_add_src(in_dev, &mreqs->imr_multiaddr, omode, 1,
  1790. &mreqs->imr_sourceaddr, 1);
  1791. done:
  1792. rtnl_unlock();
  1793. if (leavegroup)
  1794. return ip_mc_leave_group(sk, &imr);
  1795. return err;
  1796. }
  1797. int ip_mc_msfilter(struct sock *sk, struct ip_msfilter *msf, int ifindex)
  1798. {
  1799. int err = 0;
  1800. struct ip_mreqn imr;
  1801. __be32 addr = msf->imsf_multiaddr;
  1802. struct ip_mc_socklist *pmc;
  1803. struct in_device *in_dev;
  1804. struct inet_sock *inet = inet_sk(sk);
  1805. struct ip_sf_socklist *newpsl, *psl;
  1806. struct net *net = sock_net(sk);
  1807. int leavegroup = 0;
  1808. if (!ipv4_is_multicast(addr))
  1809. return -EINVAL;
  1810. if (msf->imsf_fmode != MCAST_INCLUDE &&
  1811. msf->imsf_fmode != MCAST_EXCLUDE)
  1812. return -EINVAL;
  1813. rtnl_lock();
  1814. imr.imr_multiaddr.s_addr = msf->imsf_multiaddr;
  1815. imr.imr_address.s_addr = msf->imsf_interface;
  1816. imr.imr_ifindex = ifindex;
  1817. in_dev = ip_mc_find_dev(net, &imr);
  1818. if (!in_dev) {
  1819. err = -ENODEV;
  1820. goto done;
  1821. }
  1822. /* special case - (INCLUDE, empty) == LEAVE_GROUP */
  1823. if (msf->imsf_fmode == MCAST_INCLUDE && msf->imsf_numsrc == 0) {
  1824. leavegroup = 1;
  1825. goto done;
  1826. }
  1827. for_each_pmc_rtnl(inet, pmc) {
  1828. if (pmc->multi.imr_multiaddr.s_addr == msf->imsf_multiaddr &&
  1829. pmc->multi.imr_ifindex == imr.imr_ifindex)
  1830. break;
  1831. }
  1832. if (!pmc) { /* must have a prior join */
  1833. err = -EINVAL;
  1834. goto done;
  1835. }
  1836. if (msf->imsf_numsrc) {
  1837. newpsl = sock_kmalloc(sk, IP_SFLSIZE(msf->imsf_numsrc),
  1838. GFP_KERNEL);
  1839. if (!newpsl) {
  1840. err = -ENOBUFS;
  1841. goto done;
  1842. }
  1843. newpsl->sl_max = newpsl->sl_count = msf->imsf_numsrc;
  1844. memcpy(newpsl->sl_addr, msf->imsf_slist,
  1845. msf->imsf_numsrc * sizeof(msf->imsf_slist[0]));
  1846. err = ip_mc_add_src(in_dev, &msf->imsf_multiaddr,
  1847. msf->imsf_fmode, newpsl->sl_count, newpsl->sl_addr, 0);
  1848. if (err) {
  1849. sock_kfree_s(sk, newpsl, IP_SFLSIZE(newpsl->sl_max));
  1850. goto done;
  1851. }
  1852. } else {
  1853. newpsl = NULL;
  1854. (void) ip_mc_add_src(in_dev, &msf->imsf_multiaddr,
  1855. msf->imsf_fmode, 0, NULL, 0);
  1856. }
  1857. psl = rtnl_dereference(pmc->sflist);
  1858. if (psl) {
  1859. (void) ip_mc_del_src(in_dev, &msf->imsf_multiaddr, pmc->sfmode,
  1860. psl->sl_count, psl->sl_addr, 0);
  1861. /* decrease mem now to avoid the memleak warning */
  1862. atomic_sub(IP_SFLSIZE(psl->sl_max), &sk->sk_omem_alloc);
  1863. kfree_rcu(psl, rcu);
  1864. } else
  1865. (void) ip_mc_del_src(in_dev, &msf->imsf_multiaddr, pmc->sfmode,
  1866. 0, NULL, 0);
  1867. rcu_assign_pointer(pmc->sflist, newpsl);
  1868. pmc->sfmode = msf->imsf_fmode;
  1869. err = 0;
  1870. done:
  1871. rtnl_unlock();
  1872. if (leavegroup)
  1873. err = ip_mc_leave_group(sk, &imr);
  1874. return err;
  1875. }
  1876. int ip_mc_msfget(struct sock *sk, struct ip_msfilter *msf,
  1877. struct ip_msfilter __user *optval, int __user *optlen)
  1878. {
  1879. int err, len, count, copycount;
  1880. struct ip_mreqn imr;
  1881. __be32 addr = msf->imsf_multiaddr;
  1882. struct ip_mc_socklist *pmc;
  1883. struct in_device *in_dev;
  1884. struct inet_sock *inet = inet_sk(sk);
  1885. struct ip_sf_socklist *psl;
  1886. struct net *net = sock_net(sk);
  1887. if (!ipv4_is_multicast(addr))
  1888. return -EINVAL;
  1889. rtnl_lock();
  1890. imr.imr_multiaddr.s_addr = msf->imsf_multiaddr;
  1891. imr.imr_address.s_addr = msf->imsf_interface;
  1892. imr.imr_ifindex = 0;
  1893. in_dev = ip_mc_find_dev(net, &imr);
  1894. if (!in_dev) {
  1895. err = -ENODEV;
  1896. goto done;
  1897. }
  1898. err = -EADDRNOTAVAIL;
  1899. for_each_pmc_rtnl(inet, pmc) {
  1900. if (pmc->multi.imr_multiaddr.s_addr == msf->imsf_multiaddr &&
  1901. pmc->multi.imr_ifindex == imr.imr_ifindex)
  1902. break;
  1903. }
  1904. if (!pmc) /* must have a prior join */
  1905. goto done;
  1906. msf->imsf_fmode = pmc->sfmode;
  1907. psl = rtnl_dereference(pmc->sflist);
  1908. rtnl_unlock();
  1909. if (!psl) {
  1910. len = 0;
  1911. count = 0;
  1912. } else {
  1913. count = psl->sl_count;
  1914. }
  1915. copycount = count < msf->imsf_numsrc ? count : msf->imsf_numsrc;
  1916. len = copycount * sizeof(psl->sl_addr[0]);
  1917. msf->imsf_numsrc = count;
  1918. if (put_user(IP_MSFILTER_SIZE(copycount), optlen) ||
  1919. copy_to_user(optval, msf, IP_MSFILTER_SIZE(0))) {
  1920. return -EFAULT;
  1921. }
  1922. if (len &&
  1923. copy_to_user(&optval->imsf_slist[0], psl->sl_addr, len))
  1924. return -EFAULT;
  1925. return 0;
  1926. done:
  1927. rtnl_unlock();
  1928. return err;
  1929. }
  1930. int ip_mc_gsfget(struct sock *sk, struct group_filter *gsf,
  1931. struct group_filter __user *optval, int __user *optlen)
  1932. {
  1933. int err, i, count, copycount;
  1934. struct sockaddr_in *psin;
  1935. __be32 addr;
  1936. struct ip_mc_socklist *pmc;
  1937. struct inet_sock *inet = inet_sk(sk);
  1938. struct ip_sf_socklist *psl;
  1939. psin = (struct sockaddr_in *)&gsf->gf_group;
  1940. if (psin->sin_family != AF_INET)
  1941. return -EINVAL;
  1942. addr = psin->sin_addr.s_addr;
  1943. if (!ipv4_is_multicast(addr))
  1944. return -EINVAL;
  1945. rtnl_lock();
  1946. err = -EADDRNOTAVAIL;
  1947. for_each_pmc_rtnl(inet, pmc) {
  1948. if (pmc->multi.imr_multiaddr.s_addr == addr &&
  1949. pmc->multi.imr_ifindex == gsf->gf_interface)
  1950. break;
  1951. }
  1952. if (!pmc) /* must have a prior join */
  1953. goto done;
  1954. gsf->gf_fmode = pmc->sfmode;
  1955. psl = rtnl_dereference(pmc->sflist);
  1956. rtnl_unlock();
  1957. count = psl ? psl->sl_count : 0;
  1958. copycount = count < gsf->gf_numsrc ? count : gsf->gf_numsrc;
  1959. gsf->gf_numsrc = count;
  1960. if (put_user(GROUP_FILTER_SIZE(copycount), optlen) ||
  1961. copy_to_user(optval, gsf, GROUP_FILTER_SIZE(0))) {
  1962. return -EFAULT;
  1963. }
  1964. for (i=0; i<copycount; i++) {
  1965. struct sockaddr_storage ss;
  1966. psin = (struct sockaddr_in *)&ss;
  1967. memset(&ss, 0, sizeof(ss));
  1968. psin->sin_family = AF_INET;
  1969. psin->sin_addr.s_addr = psl->sl_addr[i];
  1970. if (copy_to_user(&optval->gf_slist[i], &ss, sizeof(ss)))
  1971. return -EFAULT;
  1972. }
  1973. return 0;
  1974. done:
  1975. rtnl_unlock();
  1976. return err;
  1977. }
  1978. /*
  1979. * check if a multicast source filter allows delivery for a given <src,dst,intf>
  1980. */
  1981. int ip_mc_sf_allow(struct sock *sk, __be32 loc_addr, __be32 rmt_addr, int dif)
  1982. {
  1983. struct inet_sock *inet = inet_sk(sk);
  1984. struct ip_mc_socklist *pmc;
  1985. struct ip_sf_socklist *psl;
  1986. int i;
  1987. int ret;
  1988. ret = 1;
  1989. if (!ipv4_is_multicast(loc_addr))
  1990. goto out;
  1991. rcu_read_lock();
  1992. for_each_pmc_rcu(inet, pmc) {
  1993. if (pmc->multi.imr_multiaddr.s_addr == loc_addr &&
  1994. pmc->multi.imr_ifindex == dif)
  1995. break;
  1996. }
  1997. ret = inet->mc_all;
  1998. if (!pmc)
  1999. goto unlock;
  2000. psl = rcu_dereference(pmc->sflist);
  2001. ret = (pmc->sfmode == MCAST_EXCLUDE);
  2002. if (!psl)
  2003. goto unlock;
  2004. for (i=0; i<psl->sl_count; i++) {
  2005. if (psl->sl_addr[i] == rmt_addr)
  2006. break;
  2007. }
  2008. ret = 0;
  2009. if (pmc->sfmode == MCAST_INCLUDE && i >= psl->sl_count)
  2010. goto unlock;
  2011. if (pmc->sfmode == MCAST_EXCLUDE && i < psl->sl_count)
  2012. goto unlock;
  2013. ret = 1;
  2014. unlock:
  2015. rcu_read_unlock();
  2016. out:
  2017. return ret;
  2018. }
  2019. /*
  2020. * A socket is closing.
  2021. */
  2022. void ip_mc_drop_socket(struct sock *sk)
  2023. {
  2024. struct inet_sock *inet = inet_sk(sk);
  2025. struct ip_mc_socklist *iml;
  2026. struct net *net = sock_net(sk);
  2027. if (inet->mc_list == NULL)
  2028. return;
  2029. rtnl_lock();
  2030. while ((iml = rtnl_dereference(inet->mc_list)) != NULL) {
  2031. struct in_device *in_dev;
  2032. inet->mc_list = iml->next_rcu;
  2033. in_dev = inetdev_by_index(net, iml->multi.imr_ifindex);
  2034. (void) ip_mc_leave_src(sk, iml, in_dev);
  2035. if (in_dev != NULL)
  2036. ip_mc_dec_group(in_dev, iml->multi.imr_multiaddr.s_addr);
  2037. /* decrease mem now to avoid the memleak warning */
  2038. atomic_sub(sizeof(*iml), &sk->sk_omem_alloc);
  2039. kfree_rcu(iml, rcu);
  2040. }
  2041. rtnl_unlock();
  2042. }
  2043. /* called with rcu_read_lock() */
  2044. int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u16 proto)
  2045. {
  2046. struct ip_mc_list *im;
  2047. struct ip_sf_list *psf;
  2048. int rv = 0;
  2049. for_each_pmc_rcu(in_dev, im) {
  2050. if (im->multiaddr == mc_addr)
  2051. break;
  2052. }
  2053. if (im && proto == IPPROTO_IGMP) {
  2054. rv = 1;
  2055. } else if (im) {
  2056. if (src_addr) {
  2057. for (psf=im->sources; psf; psf=psf->sf_next) {
  2058. if (psf->sf_inaddr == src_addr)
  2059. break;
  2060. }
  2061. if (psf)
  2062. rv = psf->sf_count[MCAST_INCLUDE] ||
  2063. psf->sf_count[MCAST_EXCLUDE] !=
  2064. im->sfcount[MCAST_EXCLUDE];
  2065. else
  2066. rv = im->sfcount[MCAST_EXCLUDE] != 0;
  2067. } else
  2068. rv = 1; /* unspecified source; tentatively allow */
  2069. }
  2070. return rv;
  2071. }
  2072. #if defined(CONFIG_PROC_FS)
  2073. struct igmp_mc_iter_state {
  2074. struct seq_net_private p;
  2075. struct net_device *dev;
  2076. struct in_device *in_dev;
  2077. };
  2078. #define igmp_mc_seq_private(seq) ((struct igmp_mc_iter_state *)(seq)->private)
  2079. static inline struct ip_mc_list *igmp_mc_get_first(struct seq_file *seq)
  2080. {
  2081. struct net *net = seq_file_net(seq);
  2082. struct ip_mc_list *im = NULL;
  2083. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2084. state->in_dev = NULL;
  2085. for_each_netdev_rcu(net, state->dev) {
  2086. struct in_device *in_dev;
  2087. in_dev = __in_dev_get_rcu(state->dev);
  2088. if (!in_dev)
  2089. continue;
  2090. im = rcu_dereference(in_dev->mc_list);
  2091. if (im) {
  2092. state->in_dev = in_dev;
  2093. break;
  2094. }
  2095. }
  2096. return im;
  2097. }
  2098. static struct ip_mc_list *igmp_mc_get_next(struct seq_file *seq, struct ip_mc_list *im)
  2099. {
  2100. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2101. im = rcu_dereference(im->next_rcu);
  2102. while (!im) {
  2103. state->dev = next_net_device_rcu(state->dev);
  2104. if (!state->dev) {
  2105. state->in_dev = NULL;
  2106. break;
  2107. }
  2108. state->in_dev = __in_dev_get_rcu(state->dev);
  2109. if (!state->in_dev)
  2110. continue;
  2111. im = rcu_dereference(state->in_dev->mc_list);
  2112. }
  2113. return im;
  2114. }
  2115. static struct ip_mc_list *igmp_mc_get_idx(struct seq_file *seq, loff_t pos)
  2116. {
  2117. struct ip_mc_list *im = igmp_mc_get_first(seq);
  2118. if (im)
  2119. while (pos && (im = igmp_mc_get_next(seq, im)) != NULL)
  2120. --pos;
  2121. return pos ? NULL : im;
  2122. }
  2123. static void *igmp_mc_seq_start(struct seq_file *seq, loff_t *pos)
  2124. __acquires(rcu)
  2125. {
  2126. rcu_read_lock();
  2127. return *pos ? igmp_mc_get_idx(seq, *pos - 1) : SEQ_START_TOKEN;
  2128. }
  2129. static void *igmp_mc_seq_next(struct seq_file *seq, void *v, loff_t *pos)
  2130. {
  2131. struct ip_mc_list *im;
  2132. if (v == SEQ_START_TOKEN)
  2133. im = igmp_mc_get_first(seq);
  2134. else
  2135. im = igmp_mc_get_next(seq, v);
  2136. ++*pos;
  2137. return im;
  2138. }
  2139. static void igmp_mc_seq_stop(struct seq_file *seq, void *v)
  2140. __releases(rcu)
  2141. {
  2142. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2143. state->in_dev = NULL;
  2144. state->dev = NULL;
  2145. rcu_read_unlock();
  2146. }
  2147. static int igmp_mc_seq_show(struct seq_file *seq, void *v)
  2148. {
  2149. if (v == SEQ_START_TOKEN)
  2150. seq_puts(seq,
  2151. "Idx\tDevice : Count Querier\tGroup Users Timer\tReporter\n");
  2152. else {
  2153. struct ip_mc_list *im = (struct ip_mc_list *)v;
  2154. struct igmp_mc_iter_state *state = igmp_mc_seq_private(seq);
  2155. char *querier;
  2156. long delta;
  2157. #ifdef CONFIG_IP_MULTICAST
  2158. querier = IGMP_V1_SEEN(state->in_dev) ? "V1" :
  2159. IGMP_V2_SEEN(state->in_dev) ? "V2" :
  2160. "V3";
  2161. #else
  2162. querier = "NONE";
  2163. #endif
  2164. if (rcu_dereference(state->in_dev->mc_list) == im) {
  2165. seq_printf(seq, "%d\t%-10s: %5d %7s\n",
  2166. state->dev->ifindex, state->dev->name, state->in_dev->mc_count, querier);
  2167. }
  2168. delta = im->timer.expires - jiffies;
  2169. seq_printf(seq,
  2170. "\t\t\t\t%08X %5d %d:%08lX\t\t%d\n",
  2171. im->multiaddr, im->users,
  2172. im->tm_running,
  2173. im->tm_running ? jiffies_delta_to_clock_t(delta) : 0,
  2174. im->reporter);
  2175. }
  2176. return 0;
  2177. }
  2178. static const struct seq_operations igmp_mc_seq_ops = {
  2179. .start = igmp_mc_seq_start,
  2180. .next = igmp_mc_seq_next,
  2181. .stop = igmp_mc_seq_stop,
  2182. .show = igmp_mc_seq_show,
  2183. };
  2184. static int igmp_mc_seq_open(struct inode *inode, struct file *file)
  2185. {
  2186. return seq_open_net(inode, file, &igmp_mc_seq_ops,
  2187. sizeof(struct igmp_mc_iter_state));
  2188. }
  2189. static const struct file_operations igmp_mc_seq_fops = {
  2190. .owner = THIS_MODULE,
  2191. .open = igmp_mc_seq_open,
  2192. .read = seq_read,
  2193. .llseek = seq_lseek,
  2194. .release = seq_release_net,
  2195. };
  2196. struct igmp_mcf_iter_state {
  2197. struct seq_net_private p;
  2198. struct net_device *dev;
  2199. struct in_device *idev;
  2200. struct ip_mc_list *im;
  2201. };
  2202. #define igmp_mcf_seq_private(seq) ((struct igmp_mcf_iter_state *)(seq)->private)
  2203. static inline struct ip_sf_list *igmp_mcf_get_first(struct seq_file *seq)
  2204. {
  2205. struct net *net = seq_file_net(seq);
  2206. struct ip_sf_list *psf = NULL;
  2207. struct ip_mc_list *im = NULL;
  2208. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2209. state->idev = NULL;
  2210. state->im = NULL;
  2211. for_each_netdev_rcu(net, state->dev) {
  2212. struct in_device *idev;
  2213. idev = __in_dev_get_rcu(state->dev);
  2214. if (unlikely(idev == NULL))
  2215. continue;
  2216. im = rcu_dereference(idev->mc_list);
  2217. if (likely(im != NULL)) {
  2218. spin_lock_bh(&im->lock);
  2219. psf = im->sources;
  2220. if (likely(psf != NULL)) {
  2221. state->im = im;
  2222. state->idev = idev;
  2223. break;
  2224. }
  2225. spin_unlock_bh(&im->lock);
  2226. }
  2227. }
  2228. return psf;
  2229. }
  2230. static struct ip_sf_list *igmp_mcf_get_next(struct seq_file *seq, struct ip_sf_list *psf)
  2231. {
  2232. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2233. psf = psf->sf_next;
  2234. while (!psf) {
  2235. spin_unlock_bh(&state->im->lock);
  2236. state->im = state->im->next;
  2237. while (!state->im) {
  2238. state->dev = next_net_device_rcu(state->dev);
  2239. if (!state->dev) {
  2240. state->idev = NULL;
  2241. goto out;
  2242. }
  2243. state->idev = __in_dev_get_rcu(state->dev);
  2244. if (!state->idev)
  2245. continue;
  2246. state->im = rcu_dereference(state->idev->mc_list);
  2247. }
  2248. if (!state->im)
  2249. break;
  2250. spin_lock_bh(&state->im->lock);
  2251. psf = state->im->sources;
  2252. }
  2253. out:
  2254. return psf;
  2255. }
  2256. static struct ip_sf_list *igmp_mcf_get_idx(struct seq_file *seq, loff_t pos)
  2257. {
  2258. struct ip_sf_list *psf = igmp_mcf_get_first(seq);
  2259. if (psf)
  2260. while (pos && (psf = igmp_mcf_get_next(seq, psf)) != NULL)
  2261. --pos;
  2262. return pos ? NULL : psf;
  2263. }
  2264. static void *igmp_mcf_seq_start(struct seq_file *seq, loff_t *pos)
  2265. __acquires(rcu)
  2266. {
  2267. rcu_read_lock();
  2268. return *pos ? igmp_mcf_get_idx(seq, *pos - 1) : SEQ_START_TOKEN;
  2269. }
  2270. static void *igmp_mcf_seq_next(struct seq_file *seq, void *v, loff_t *pos)
  2271. {
  2272. struct ip_sf_list *psf;
  2273. if (v == SEQ_START_TOKEN)
  2274. psf = igmp_mcf_get_first(seq);
  2275. else
  2276. psf = igmp_mcf_get_next(seq, v);
  2277. ++*pos;
  2278. return psf;
  2279. }
  2280. static void igmp_mcf_seq_stop(struct seq_file *seq, void *v)
  2281. __releases(rcu)
  2282. {
  2283. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2284. if (likely(state->im != NULL)) {
  2285. spin_unlock_bh(&state->im->lock);
  2286. state->im = NULL;
  2287. }
  2288. state->idev = NULL;
  2289. state->dev = NULL;
  2290. rcu_read_unlock();
  2291. }
  2292. static int igmp_mcf_seq_show(struct seq_file *seq, void *v)
  2293. {
  2294. struct ip_sf_list *psf = (struct ip_sf_list *)v;
  2295. struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq);
  2296. if (v == SEQ_START_TOKEN) {
  2297. seq_printf(seq,
  2298. "%3s %6s "
  2299. "%10s %10s %6s %6s\n", "Idx",
  2300. "Device", "MCA",
  2301. "SRC", "INC", "EXC");
  2302. } else {
  2303. seq_printf(seq,
  2304. "%3d %6.6s 0x%08x "
  2305. "0x%08x %6lu %6lu\n",
  2306. state->dev->ifindex, state->dev->name,
  2307. ntohl(state->im->multiaddr),
  2308. ntohl(psf->sf_inaddr),
  2309. psf->sf_count[MCAST_INCLUDE],
  2310. psf->sf_count[MCAST_EXCLUDE]);
  2311. }
  2312. return 0;
  2313. }
  2314. static const struct seq_operations igmp_mcf_seq_ops = {
  2315. .start = igmp_mcf_seq_start,
  2316. .next = igmp_mcf_seq_next,
  2317. .stop = igmp_mcf_seq_stop,
  2318. .show = igmp_mcf_seq_show,
  2319. };
  2320. static int igmp_mcf_seq_open(struct inode *inode, struct file *file)
  2321. {
  2322. return seq_open_net(inode, file, &igmp_mcf_seq_ops,
  2323. sizeof(struct igmp_mcf_iter_state));
  2324. }
  2325. static const struct file_operations igmp_mcf_seq_fops = {
  2326. .owner = THIS_MODULE,
  2327. .open = igmp_mcf_seq_open,
  2328. .read = seq_read,
  2329. .llseek = seq_lseek,
  2330. .release = seq_release_net,
  2331. };
  2332. static int __net_init igmp_net_init(struct net *net)
  2333. {
  2334. struct proc_dir_entry *pde;
  2335. pde = proc_net_fops_create(net, "igmp", S_IRUGO, &igmp_mc_seq_fops);
  2336. if (!pde)
  2337. goto out_igmp;
  2338. pde = proc_net_fops_create(net, "mcfilter", S_IRUGO, &igmp_mcf_seq_fops);
  2339. if (!pde)
  2340. goto out_mcfilter;
  2341. return 0;
  2342. out_mcfilter:
  2343. proc_net_remove(net, "igmp");
  2344. out_igmp:
  2345. return -ENOMEM;
  2346. }
  2347. static void __net_exit igmp_net_exit(struct net *net)
  2348. {
  2349. proc_net_remove(net, "mcfilter");
  2350. proc_net_remove(net, "igmp");
  2351. }
  2352. static struct pernet_operations igmp_net_ops = {
  2353. .init = igmp_net_init,
  2354. .exit = igmp_net_exit,
  2355. };
  2356. int __init igmp_mc_proc_init(void)
  2357. {
  2358. return register_pernet_subsys(&igmp_net_ops);
  2359. }
  2360. #endif