]> git.saurik.com Git - apple/xnu.git/blame - bsd/netinet/in_mcast.c
xnu-3789.31.2.tar.gz
[apple/xnu.git] / bsd / netinet / in_mcast.c
CommitLineData
6d2010ae 1/*
39037602 2 * Copyright (c) 2010-2016 Apple Inc. All rights reserved.
6d2010ae
A
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28/*-
29 * Copyright (c) 2007-2009 Bruce Simpson.
30 * Copyright (c) 2005 Robert N. M. Watson.
31 * All rights reserved.
32 *
33 * Redistribution and use in source and binary forms, with or without
34 * modification, are permitted provided that the following conditions
35 * are met:
36 * 1. Redistributions of source code must retain the above copyright
37 * notice, this list of conditions and the following disclaimer.
38 * 2. Redistributions in binary form must reproduce the above copyright
39 * notice, this list of conditions and the following disclaimer in the
40 * documentation and/or other materials provided with the distribution.
41 * 3. The name of the author may not be used to endorse or promote
42 * products derived from this software without specific prior written
43 * permission.
44 *
45 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
46 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
47 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
48 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
49 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
50 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
51 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
53 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
54 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 * SUCH DAMAGE.
56 */
57
58/*
59 * IPv4 multicast socket, group, and socket option processing module.
60 */
61
62#include <sys/cdefs.h>
63
64#include <sys/param.h>
65#include <sys/systm.h>
66#include <sys/kernel.h>
67#include <sys/malloc.h>
68#include <sys/mbuf.h>
69#include <sys/protosw.h>
70#include <sys/socket.h>
71#include <sys/socketvar.h>
72#include <sys/protosw.h>
73#include <sys/sysctl.h>
74#include <sys/tree.h>
75#include <sys/mcache.h>
76
77#include <kern/zalloc.h>
78
79#include <pexpert/pexpert.h>
80
81#include <net/if.h>
82#include <net/if_dl.h>
83#include <net/route.h>
84
85#include <netinet/in.h>
86#include <netinet/in_systm.h>
87#include <netinet/in_pcb.h>
88#include <netinet/in_var.h>
89#include <netinet/ip_var.h>
90#include <netinet/igmp_var.h>
91
92#ifndef __SOCKUNION_DECLARED
93union sockunion {
94 struct sockaddr_storage ss;
95 struct sockaddr sa;
96 struct sockaddr_dl sdl;
97 struct sockaddr_in sin;
98};
99typedef union sockunion sockunion_t;
100#define __SOCKUNION_DECLARED
101#endif /* __SOCKUNION_DECLARED */
102
103/*
104 * Functions with non-static linkage defined in this file should be
105 * declared in in_var.h:
106 * imo_multi_filter()
107 * in_addmulti()
108 * in_delmulti()
109 * in_joingroup()
110 * in_leavegroup()
111 * and ip_var.h:
112 * inp_freemoptions()
113 * inp_getmoptions()
114 * inp_setmoptions()
115 *
116 * XXX: Both carp and pf need to use the legacy (*,G) KPIs in_addmulti()
117 * and in_delmulti().
118 */
119static void imf_commit(struct in_mfilter *);
120static int imf_get_source(struct in_mfilter *imf,
121 const struct sockaddr_in *psin,
122 struct in_msource **);
123static struct in_msource *
124 imf_graft(struct in_mfilter *, const uint8_t,
125 const struct sockaddr_in *);
126static int imf_prune(struct in_mfilter *, const struct sockaddr_in *);
127static void imf_rollback(struct in_mfilter *);
128static void imf_reap(struct in_mfilter *);
129static int imo_grow(struct ip_moptions *, size_t);
130static size_t imo_match_group(const struct ip_moptions *,
131 const struct ifnet *, const struct sockaddr *);
132static struct in_msource *
133 imo_match_source(const struct ip_moptions *, const size_t,
134 const struct sockaddr *);
135static void ims_merge(struct ip_msource *ims,
136 const struct in_msource *lims, const int rollback);
137static int in_getmulti(struct ifnet *, const struct in_addr *,
138 struct in_multi **);
139static int in_joingroup(struct ifnet *, const struct in_addr *,
140 struct in_mfilter *, struct in_multi **);
141static int inm_get_source(struct in_multi *inm, const in_addr_t haddr,
142 const int noalloc, struct ip_msource **pims);
143static int inm_is_ifp_detached(const struct in_multi *);
144static int inm_merge(struct in_multi *, /*const*/ struct in_mfilter *);
145static void inm_reap(struct in_multi *);
146static struct ip_moptions *
147 inp_findmoptions(struct inpcb *);
148static int inp_get_source_filters(struct inpcb *, struct sockopt *);
149static struct ifnet *
150 inp_lookup_mcast_ifp(const struct inpcb *,
151 const struct sockaddr_in *, const struct in_addr);
152static int inp_block_unblock_source(struct inpcb *, struct sockopt *);
153static int inp_set_multicast_if(struct inpcb *, struct sockopt *);
154static int inp_set_source_filters(struct inpcb *, struct sockopt *);
155static int sysctl_ip_mcast_filters SYSCTL_HANDLER_ARGS;
156static struct ifnet * ip_multicast_if(struct in_addr *, unsigned int *);
157static __inline__ int ip_msource_cmp(const struct ip_msource *,
158 const struct ip_msource *);
159
160SYSCTL_NODE(_net_inet_ip, OID_AUTO, mcast, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "IPv4 multicast");
161
162static u_long in_mcast_maxgrpsrc = IP_MAX_GROUP_SRC_FILTER;
163SYSCTL_LONG(_net_inet_ip_mcast, OID_AUTO, maxgrpsrc,
164 CTLFLAG_RW | CTLFLAG_LOCKED, &in_mcast_maxgrpsrc, "Max source filters per group");
165
166static u_long in_mcast_maxsocksrc = IP_MAX_SOCK_SRC_FILTER;
167SYSCTL_LONG(_net_inet_ip_mcast, OID_AUTO, maxsocksrc,
168 CTLFLAG_RW | CTLFLAG_LOCKED, &in_mcast_maxsocksrc,
169 "Max source filters per socket");
170
171int in_mcast_loop = IP_DEFAULT_MULTICAST_LOOP;
172SYSCTL_INT(_net_inet_ip_mcast, OID_AUTO, loop, CTLFLAG_RW | CTLFLAG_LOCKED,
173 &in_mcast_loop, 0, "Loopback multicast datagrams by default");
174
175SYSCTL_NODE(_net_inet_ip_mcast, OID_AUTO, filters,
176 CTLFLAG_RD | CTLFLAG_LOCKED, sysctl_ip_mcast_filters,
177 "Per-interface stack-wide source filters");
178
179RB_GENERATE_PREV(ip_msource_tree, ip_msource, ims_link, ip_msource_cmp);
180
181#define INM_TRACE_HIST_SIZE 32 /* size of trace history */
182
183/* For gdb */
184__private_extern__ unsigned int inm_trace_hist_size = INM_TRACE_HIST_SIZE;
185
186struct in_multi_dbg {
187 struct in_multi inm; /* in_multi */
188 u_int16_t inm_refhold_cnt; /* # of ref */
189 u_int16_t inm_refrele_cnt; /* # of rele */
190 /*
191 * Circular lists of inm_addref and inm_remref callers.
192 */
193 ctrace_t inm_refhold[INM_TRACE_HIST_SIZE];
194 ctrace_t inm_refrele[INM_TRACE_HIST_SIZE];
195 /*
196 * Trash list linkage
197 */
198 TAILQ_ENTRY(in_multi_dbg) inm_trash_link;
199};
200
201/* List of trash in_multi entries protected by inm_trash_lock */
202static TAILQ_HEAD(, in_multi_dbg) inm_trash_head;
203static decl_lck_mtx_data(, inm_trash_lock);
204
205#define INM_ZONE_MAX 64 /* maximum elements in zone */
206#define INM_ZONE_NAME "in_multi" /* zone name */
207
208#if DEBUG
209static unsigned int inm_debug = 1; /* debugging (enabled) */
210#else
211static unsigned int inm_debug; /* debugging (disabled) */
212#endif /* !DEBUG */
213static unsigned int inm_size; /* size of zone element */
214static struct zone *inm_zone; /* zone for in_multi */
215
216#define IPMS_ZONE_MAX 64 /* maximum elements in zone */
217#define IPMS_ZONE_NAME "ip_msource" /* zone name */
218
219static unsigned int ipms_size; /* size of zone element */
220static struct zone *ipms_zone; /* zone for ip_msource */
221
222#define INMS_ZONE_MAX 64 /* maximum elements in zone */
223#define INMS_ZONE_NAME "in_msource" /* zone name */
224
225static unsigned int inms_size; /* size of zone element */
226static struct zone *inms_zone; /* zone for in_msource */
227
228/* Lock group and attribute for in_multihead_lock lock */
229static lck_attr_t *in_multihead_lock_attr;
230static lck_grp_t *in_multihead_lock_grp;
231static lck_grp_attr_t *in_multihead_lock_grp_attr;
232
233static decl_lck_rw_data(, in_multihead_lock);
234struct in_multihead in_multihead;
235
236static struct in_multi *in_multi_alloc(int);
237static void in_multi_free(struct in_multi *);
238static void in_multi_attach(struct in_multi *);
239static void inm_trace(struct in_multi *, int);
240
241static struct ip_msource *ipms_alloc(int);
242static void ipms_free(struct ip_msource *);
243static struct in_msource *inms_alloc(int);
244static void inms_free(struct in_msource *);
245
6d2010ae
A
246static __inline int
247ip_msource_cmp(const struct ip_msource *a, const struct ip_msource *b)
248{
249
250 if (a->ims_haddr < b->ims_haddr)
251 return (-1);
252 if (a->ims_haddr == b->ims_haddr)
253 return (0);
254 return (1);
255}
256
257/*
258 * Inline function which wraps assertions for a valid ifp.
259 */
260static __inline__ int
261inm_is_ifp_detached(const struct in_multi *inm)
262{
263 VERIFY(inm->inm_ifma != NULL);
264 VERIFY(inm->inm_ifp == inm->inm_ifma->ifma_ifp);
265
266 return (!ifnet_is_attached(inm->inm_ifp, 0));
267}
268
269/*
270 * Initialize an in_mfilter structure to a known state at t0, t1
271 * with an empty source filter list.
272 */
273static __inline__ void
274imf_init(struct in_mfilter *imf, const int st0, const int st1)
275{
276 memset(imf, 0, sizeof(struct in_mfilter));
277 RB_INIT(&imf->imf_sources);
278 imf->imf_st[0] = st0;
279 imf->imf_st[1] = st1;
280}
281
282/*
283 * Resize the ip_moptions vector to the next power-of-two minus 1.
284 */
285static int
286imo_grow(struct ip_moptions *imo, size_t newmax)
287{
288 struct in_multi **nmships;
289 struct in_multi **omships;
290 struct in_mfilter *nmfilters;
291 struct in_mfilter *omfilters;
292 size_t idx;
293 size_t oldmax;
294
295 IMO_LOCK_ASSERT_HELD(imo);
296
297 nmships = NULL;
298 nmfilters = NULL;
299 omships = imo->imo_membership;
300 omfilters = imo->imo_mfilters;
301 oldmax = imo->imo_max_memberships;
302 if (newmax == 0)
303 newmax = ((oldmax + 1) * 2) - 1;
304
305 if (newmax > IP_MAX_MEMBERSHIPS)
306 return (ETOOMANYREFS);
307
308 if ((nmships = (struct in_multi **)_REALLOC(omships,
309 sizeof (struct in_multi *) * newmax, M_IPMOPTS,
310 M_WAITOK | M_ZERO)) == NULL)
311 return (ENOMEM);
312
313 imo->imo_membership = nmships;
314
315 if ((nmfilters = (struct in_mfilter *)_REALLOC(omfilters,
316 sizeof (struct in_mfilter) * newmax, M_INMFILTER,
317 M_WAITOK | M_ZERO)) == NULL)
318 return (ENOMEM);
319
320 imo->imo_mfilters = nmfilters;
321
322 /* Initialize newly allocated source filter heads. */
323 for (idx = oldmax; idx < newmax; idx++)
324 imf_init(&nmfilters[idx], MCAST_UNDEFINED, MCAST_EXCLUDE);
325
326 imo->imo_max_memberships = newmax;
327
328 return (0);
329}
330
331/*
332 * Find an IPv4 multicast group entry for this ip_moptions instance
333 * which matches the specified group, and optionally an interface.
334 * Return its index into the array, or -1 if not found.
335 */
336static size_t
337imo_match_group(const struct ip_moptions *imo, const struct ifnet *ifp,
338 const struct sockaddr *group)
339{
340 const struct sockaddr_in *gsin;
341 struct in_multi *pinm;
342 int idx;
343 int nmships;
344
39236c6e 345 IMO_LOCK_ASSERT_HELD(__DECONST(struct ip_moptions *, imo));
6d2010ae 346
316670eb 347 gsin = (struct sockaddr_in *)(uintptr_t)(size_t)group;
6d2010ae
A
348
349 /* The imo_membership array may be lazy allocated. */
350 if (imo->imo_membership == NULL || imo->imo_num_memberships == 0)
351 return (-1);
352
353 nmships = imo->imo_num_memberships;
354 for (idx = 0; idx < nmships; idx++) {
355 pinm = imo->imo_membership[idx];
356 if (pinm == NULL)
357 continue;
358 INM_LOCK(pinm);
359 if ((ifp == NULL || (pinm->inm_ifp == ifp)) &&
360 in_hosteq(pinm->inm_addr, gsin->sin_addr)) {
361 INM_UNLOCK(pinm);
362 break;
363 }
364 INM_UNLOCK(pinm);
365 }
366 if (idx >= nmships)
367 idx = -1;
368
369 return (idx);
370}
371
372/*
373 * Find an IPv4 multicast source entry for this imo which matches
374 * the given group index for this socket, and source address.
375 *
376 * NOTE: This does not check if the entry is in-mode, merely if
377 * it exists, which may not be the desired behaviour.
378 */
379static struct in_msource *
380imo_match_source(const struct ip_moptions *imo, const size_t gidx,
381 const struct sockaddr *src)
382{
383 struct ip_msource find;
384 struct in_mfilter *imf;
385 struct ip_msource *ims;
386 const sockunion_t *psa;
387
39236c6e 388 IMO_LOCK_ASSERT_HELD(__DECONST(struct ip_moptions *, imo));
6d2010ae
A
389
390 VERIFY(src->sa_family == AF_INET);
391 VERIFY(gidx != (size_t)-1 && gidx < imo->imo_num_memberships);
392
393 /* The imo_mfilters array may be lazy allocated. */
394 if (imo->imo_mfilters == NULL)
395 return (NULL);
396 imf = &imo->imo_mfilters[gidx];
397
398 /* Source trees are keyed in host byte order. */
316670eb 399 psa = (sockunion_t *)(uintptr_t)(size_t)src;
6d2010ae
A
400 find.ims_haddr = ntohl(psa->sin.sin_addr.s_addr);
401 ims = RB_FIND(ip_msource_tree, &imf->imf_sources, &find);
402
403 return ((struct in_msource *)ims);
404}
405
406/*
407 * Perform filtering for multicast datagrams on a socket by group and source.
408 *
409 * Returns 0 if a datagram should be allowed through, or various error codes
410 * if the socket was not a member of the group, or the source was muted, etc.
411 */
412int
413imo_multi_filter(const struct ip_moptions *imo, const struct ifnet *ifp,
414 const struct sockaddr *group, const struct sockaddr *src)
415{
416 size_t gidx;
417 struct in_msource *ims;
418 int mode;
419
39236c6e 420 IMO_LOCK_ASSERT_HELD(__DECONST(struct ip_moptions *, imo));
6d2010ae
A
421 VERIFY(ifp != NULL);
422
423 gidx = imo_match_group(imo, ifp, group);
424 if (gidx == (size_t)-1)
425 return (MCAST_NOTGMEMBER);
426
427 /*
428 * Check if the source was included in an (S,G) join.
429 * Allow reception on exclusive memberships by default,
430 * reject reception on inclusive memberships by default.
431 * Exclude source only if an in-mode exclude filter exists.
432 * Include source only if an in-mode include filter exists.
433 * NOTE: We are comparing group state here at IGMP t1 (now)
434 * with socket-layer t0 (since last downcall).
435 */
436 mode = imo->imo_mfilters[gidx].imf_st[1];
437 ims = imo_match_source(imo, gidx, src);
438
439 if ((ims == NULL && mode == MCAST_INCLUDE) ||
440 (ims != NULL && ims->imsl_st[0] != mode)) {
441 return (MCAST_NOTSMEMBER);
442 }
443
444 return (MCAST_PASS);
445}
446
447int
316670eb 448imo_clone(struct inpcb *from_inp, struct inpcb *to_inp)
6d2010ae
A
449{
450 int i, err = 0;
316670eb
A
451 struct ip_moptions *from;
452 struct ip_moptions *to;
453
454 from = inp_findmoptions(from_inp);
455 if (from == NULL)
456 return (ENOMEM);
457
458 to = inp_findmoptions(to_inp);
459 if (to == NULL) {
460 IMO_REMREF(from);
461 return (ENOMEM);
462 }
6d2010ae
A
463
464 IMO_LOCK(from);
465 IMO_LOCK(to);
466
467 to->imo_multicast_ifp = from->imo_multicast_ifp;
468 to->imo_multicast_vif = from->imo_multicast_vif;
469 to->imo_multicast_ttl = from->imo_multicast_ttl;
470 to->imo_multicast_loop = from->imo_multicast_loop;
471
472 /*
473 * We're cloning, so drop any existing memberships and source
474 * filters on the destination ip_moptions.
475 */
476 for (i = 0; i < to->imo_num_memberships; ++i) {
477 struct in_mfilter *imf;
478
479 imf = to->imo_mfilters ? &to->imo_mfilters[i] : NULL;
480 if (imf != NULL)
481 imf_leave(imf);
482
483 (void) in_leavegroup(to->imo_membership[i], imf);
484
485 if (imf != NULL)
486 imf_purge(imf);
487
488 INM_REMREF(to->imo_membership[i]);
489 to->imo_membership[i] = NULL;
490 }
491 to->imo_num_memberships = 0;
492
493 VERIFY(to->imo_max_memberships != 0 && from->imo_max_memberships != 0);
494 if (to->imo_max_memberships < from->imo_max_memberships) {
495 /*
496 * Ensure source and destination ip_moptions memberships
497 * and source filters arrays are at least equal in size.
498 */
499 err = imo_grow(to, from->imo_max_memberships);
500 if (err != 0)
501 goto done;
502 }
503 VERIFY(to->imo_max_memberships >= from->imo_max_memberships);
504
505 /*
506 * Source filtering doesn't apply to OpenTransport socket,
507 * so simply hold additional reference count per membership.
508 */
316670eb
A
509 for (i = 0; i < from->imo_num_memberships; i++) {
510 to->imo_membership[i] =
511 in_addmulti(&from->imo_membership[i]->inm_addr,
512 from->imo_membership[i]->inm_ifp);
513 if (to->imo_membership[i] == NULL)
514 break;
6d2010ae
A
515 to->imo_num_memberships++;
516 }
517 VERIFY(to->imo_num_memberships == from->imo_num_memberships);
518
519done:
520 IMO_UNLOCK(to);
316670eb 521 IMO_REMREF(to);
6d2010ae 522 IMO_UNLOCK(from);
316670eb 523 IMO_REMREF(from);
6d2010ae
A
524
525 return (err);
526}
527
528/*
529 * Find and return a reference to an in_multi record for (ifp, group),
530 * and bump its reference count.
531 * If one does not exist, try to allocate it, and update link-layer multicast
532 * filters on ifp to listen for group.
533 * Return 0 if successful, otherwise return an appropriate error code.
534 */
535static int
536in_getmulti(struct ifnet *ifp, const struct in_addr *group,
537 struct in_multi **pinm)
538{
539 struct sockaddr_in gsin;
540 struct ifmultiaddr *ifma;
541 struct in_multi *inm;
542 int error;
543
544 in_multihead_lock_shared();
545 IN_LOOKUP_MULTI(group, ifp, inm);
546 if (inm != NULL) {
547 INM_LOCK(inm);
548 VERIFY(inm->inm_reqcnt >= 1);
549 inm->inm_reqcnt++;
550 VERIFY(inm->inm_reqcnt != 0);
551 *pinm = inm;
552 INM_UNLOCK(inm);
553 in_multihead_lock_done();
554 /*
555 * We already joined this group; return the inm
556 * with a refcount held (via lookup) for caller.
557 */
558 return (0);
559 }
560 in_multihead_lock_done();
561
562 bzero(&gsin, sizeof(gsin));
563 gsin.sin_family = AF_INET;
564 gsin.sin_len = sizeof(struct sockaddr_in);
565 gsin.sin_addr = *group;
566
567 /*
568 * Check if a link-layer group is already associated
569 * with this network-layer group on the given ifnet.
570 */
571 error = if_addmulti(ifp, (struct sockaddr *)&gsin, &ifma);
572 if (error != 0)
573 return (error);
574
575 /*
576 * See comments in inm_remref() for access to ifma_protospec.
577 */
578 in_multihead_lock_exclusive();
579 IFMA_LOCK(ifma);
580 if ((inm = ifma->ifma_protospec) != NULL) {
581 VERIFY(ifma->ifma_addr != NULL);
582 VERIFY(ifma->ifma_addr->sa_family == AF_INET);
583 INM_ADDREF(inm); /* for caller */
584 IFMA_UNLOCK(ifma);
585 INM_LOCK(inm);
586 VERIFY(inm->inm_ifma == ifma);
587 VERIFY(inm->inm_ifp == ifp);
588 VERIFY(in_hosteq(inm->inm_addr, *group));
589 if (inm->inm_debug & IFD_ATTACHED) {
590 VERIFY(inm->inm_reqcnt >= 1);
591 inm->inm_reqcnt++;
592 VERIFY(inm->inm_reqcnt != 0);
593 *pinm = inm;
594 INM_UNLOCK(inm);
595 in_multihead_lock_done();
596 IFMA_REMREF(ifma);
597 /*
598 * We lost the race with another thread doing
599 * in_getmulti(); since this group has already
600 * been joined; return the inm with a refcount
601 * held for caller.
602 */
603 return (0);
604 }
605 /*
606 * We lost the race with another thread doing in_delmulti();
607 * the inm referring to the ifma has been detached, thus we
608 * reattach it back to the in_multihead list and return the
609 * inm with a refcount held for the caller.
610 */
611 in_multi_attach(inm);
612 VERIFY((inm->inm_debug &
613 (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED);
614 *pinm = inm;
615 INM_UNLOCK(inm);
616 in_multihead_lock_done();
617 IFMA_REMREF(ifma);
618 return (0);
619 }
620 IFMA_UNLOCK(ifma);
621
622 /*
623 * A new in_multi record is needed; allocate and initialize it.
624 * We DO NOT perform an IGMP join as the in_ layer may need to
625 * push an initial source list down to IGMP to support SSM.
626 *
627 * The initial source filter state is INCLUDE, {} as per the RFC.
628 */
629 inm = in_multi_alloc(M_WAITOK);
630 if (inm == NULL) {
631 in_multihead_lock_done();
632 IFMA_REMREF(ifma);
633 return (ENOMEM);
634 }
635 INM_LOCK(inm);
636 inm->inm_addr = *group;
637 inm->inm_ifp = ifp;
638 inm->inm_igi = IGMP_IFINFO(ifp);
639 VERIFY(inm->inm_igi != NULL);
640 IGI_ADDREF(inm->inm_igi);
641 inm->inm_ifma = ifma; /* keep refcount from if_addmulti() */
642 inm->inm_state = IGMP_NOT_MEMBER;
643 /*
644 * Pending state-changes per group are subject to a bounds check.
645 */
646 inm->inm_scq.ifq_maxlen = IGMP_MAX_STATE_CHANGES;
647 inm->inm_st[0].iss_fmode = MCAST_UNDEFINED;
648 inm->inm_st[1].iss_fmode = MCAST_UNDEFINED;
649 RB_INIT(&inm->inm_srcs);
650 *pinm = inm;
651 in_multi_attach(inm);
652 VERIFY((inm->inm_debug & (IFD_ATTACHED | IFD_TRASHED)) == IFD_ATTACHED);
653 INM_ADDREF_LOCKED(inm); /* for caller */
654 INM_UNLOCK(inm);
655
656 IFMA_LOCK(ifma);
657 VERIFY(ifma->ifma_protospec == NULL);
658 ifma->ifma_protospec = inm;
659 IFMA_UNLOCK(ifma);
660 in_multihead_lock_done();
661
662 return (0);
663}
664
665/*
666 * Clear recorded source entries for a group.
667 * Used by the IGMP code.
668 * FIXME: Should reap.
669 */
670void
671inm_clear_recorded(struct in_multi *inm)
672{
673 struct ip_msource *ims;
674
675 INM_LOCK_ASSERT_HELD(inm);
676
677 RB_FOREACH(ims, ip_msource_tree, &inm->inm_srcs) {
678 if (ims->ims_stp) {
679 ims->ims_stp = 0;
680 --inm->inm_st[1].iss_rec;
681 }
682 }
683 VERIFY(inm->inm_st[1].iss_rec == 0);
684}
685
686/*
687 * Record a source as pending for a Source-Group IGMPv3 query.
688 * This lives here as it modifies the shared tree.
689 *
690 * inm is the group descriptor.
691 * naddr is the address of the source to record in network-byte order.
692 *
693 * If the net.inet.igmp.sgalloc sysctl is non-zero, we will
694 * lazy-allocate a source node in response to an SG query.
695 * Otherwise, no allocation is performed. This saves some memory
696 * with the trade-off that the source will not be reported to the
697 * router if joined in the window between the query response and
698 * the group actually being joined on the local host.
699 *
700 * Return 0 if the source didn't exist or was already marked as recorded.
701 * Return 1 if the source was marked as recorded by this function.
702 * Return <0 if any error occured (negated errno code).
703 */
704int
705inm_record_source(struct in_multi *inm, const in_addr_t naddr)
706{
707 struct ip_msource find;
708 struct ip_msource *ims, *nims;
709
710 INM_LOCK_ASSERT_HELD(inm);
711
712 find.ims_haddr = ntohl(naddr);
713 ims = RB_FIND(ip_msource_tree, &inm->inm_srcs, &find);
714 if (ims && ims->ims_stp)
715 return (0);
716 if (ims == NULL) {
717 if (inm->inm_nsrc == in_mcast_maxgrpsrc)
718 return (-ENOSPC);
719 nims = ipms_alloc(M_WAITOK);
720 if (nims == NULL)
721 return (-ENOMEM);
722 nims->ims_haddr = find.ims_haddr;
723 RB_INSERT(ip_msource_tree, &inm->inm_srcs, nims);
724 ++inm->inm_nsrc;
725 ims = nims;
726 }
727
728 /*
729 * Mark the source as recorded and update the recorded
730 * source count.
731 */
732 ++ims->ims_stp;
733 ++inm->inm_st[1].iss_rec;
734
735 return (1);
736}
737
738/*
739 * Return a pointer to an in_msource owned by an in_mfilter,
740 * given its source address.
741 * Lazy-allocate if needed. If this is a new entry its filter state is
742 * undefined at t0.
743 *
744 * imf is the filter set being modified.
745 * haddr is the source address in *host* byte-order.
746 *
747 * Caller is expected to be holding imo_lock.
748 */
749static int
750imf_get_source(struct in_mfilter *imf, const struct sockaddr_in *psin,
751 struct in_msource **plims)
752{
753 struct ip_msource find;
754 struct ip_msource *ims;
755 struct in_msource *lims;
756 int error;
757
758 error = 0;
759 ims = NULL;
760 lims = NULL;
761
762 /* key is host byte order */
763 find.ims_haddr = ntohl(psin->sin_addr.s_addr);
764 ims = RB_FIND(ip_msource_tree, &imf->imf_sources, &find);
765 lims = (struct in_msource *)ims;
766 if (lims == NULL) {
767 if (imf->imf_nsrc == in_mcast_maxsocksrc)
768 return (ENOSPC);
769 lims = inms_alloc(M_WAITOK);
770 if (lims == NULL)
771 return (ENOMEM);
772 lims->ims_haddr = find.ims_haddr;
773 lims->imsl_st[0] = MCAST_UNDEFINED;
774 RB_INSERT(ip_msource_tree, &imf->imf_sources,
775 (struct ip_msource *)lims);
776 ++imf->imf_nsrc;
777 }
778
779 *plims = lims;
780
781 return (error);
782}
783
784/*
785 * Graft a source entry into an existing socket-layer filter set,
786 * maintaining any required invariants and checking allocations.
787 *
788 * The source is marked as being in the new filter mode at t1.
789 *
790 * Return the pointer to the new node, otherwise return NULL.
791 *
792 * Caller is expected to be holding imo_lock.
793 */
794static struct in_msource *
795imf_graft(struct in_mfilter *imf, const uint8_t st1,
796 const struct sockaddr_in *psin)
797{
798 struct in_msource *lims;
799
800 lims = inms_alloc(M_WAITOK);
801 if (lims == NULL)
802 return (NULL);
803 lims->ims_haddr = ntohl(psin->sin_addr.s_addr);
804 lims->imsl_st[0] = MCAST_UNDEFINED;
805 lims->imsl_st[1] = st1;
806 RB_INSERT(ip_msource_tree, &imf->imf_sources,
807 (struct ip_msource *)lims);
808 ++imf->imf_nsrc;
809
810 return (lims);
811}
812
813/*
814 * Prune a source entry from an existing socket-layer filter set,
815 * maintaining any required invariants and checking allocations.
816 *
817 * The source is marked as being left at t1, it is not freed.
818 *
819 * Return 0 if no error occurred, otherwise return an errno value.
820 *
821 * Caller is expected to be holding imo_lock.
822 */
823static int
824imf_prune(struct in_mfilter *imf, const struct sockaddr_in *psin)
825{
826 struct ip_msource find;
827 struct ip_msource *ims;
828 struct in_msource *lims;
829
830 /* key is host byte order */
831 find.ims_haddr = ntohl(psin->sin_addr.s_addr);
832 ims = RB_FIND(ip_msource_tree, &imf->imf_sources, &find);
833 if (ims == NULL)
834 return (ENOENT);
835 lims = (struct in_msource *)ims;
836 lims->imsl_st[1] = MCAST_UNDEFINED;
837 return (0);
838}
839
840/*
841 * Revert socket-layer filter set deltas at t1 to t0 state.
842 *
843 * Caller is expected to be holding imo_lock.
844 */
845static void
846imf_rollback(struct in_mfilter *imf)
847{
848 struct ip_msource *ims, *tims;
849 struct in_msource *lims;
850
851 RB_FOREACH_SAFE(ims, ip_msource_tree, &imf->imf_sources, tims) {
852 lims = (struct in_msource *)ims;
853 if (lims->imsl_st[0] == lims->imsl_st[1]) {
854 /* no change at t1 */
855 continue;
856 } else if (lims->imsl_st[0] != MCAST_UNDEFINED) {
857 /* revert change to existing source at t1 */
858 lims->imsl_st[1] = lims->imsl_st[0];
859 } else {
860 /* revert source added t1 */
39236c6e
A
861 IGMP_PRINTF(("%s: free inms 0x%llx\n", __func__,
862 (uint64_t)VM_KERNEL_ADDRPERM(lims)));
6d2010ae
A
863 RB_REMOVE(ip_msource_tree, &imf->imf_sources, ims);
864 inms_free(lims);
865 imf->imf_nsrc--;
866 }
867 }
868 imf->imf_st[1] = imf->imf_st[0];
869}
870
871/*
872 * Mark socket-layer filter set as INCLUDE {} at t1.
873 *
874 * Caller is expected to be holding imo_lock.
875 */
876void
877imf_leave(struct in_mfilter *imf)
878{
879 struct ip_msource *ims;
880 struct in_msource *lims;
881
882 RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources) {
883 lims = (struct in_msource *)ims;
884 lims->imsl_st[1] = MCAST_UNDEFINED;
885 }
886 imf->imf_st[1] = MCAST_INCLUDE;
887}
888
889/*
890 * Mark socket-layer filter set deltas as committed.
891 *
892 * Caller is expected to be holding imo_lock.
893 */
894static void
895imf_commit(struct in_mfilter *imf)
896{
897 struct ip_msource *ims;
898 struct in_msource *lims;
899
900 RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources) {
901 lims = (struct in_msource *)ims;
902 lims->imsl_st[0] = lims->imsl_st[1];
903 }
904 imf->imf_st[0] = imf->imf_st[1];
905}
906
907/*
908 * Reap unreferenced sources from socket-layer filter set.
909 *
910 * Caller is expected to be holding imo_lock.
911 */
912static void
913imf_reap(struct in_mfilter *imf)
914{
915 struct ip_msource *ims, *tims;
916 struct in_msource *lims;
917
918 RB_FOREACH_SAFE(ims, ip_msource_tree, &imf->imf_sources, tims) {
919 lims = (struct in_msource *)ims;
920 if ((lims->imsl_st[0] == MCAST_UNDEFINED) &&
921 (lims->imsl_st[1] == MCAST_UNDEFINED)) {
39236c6e
A
922 IGMP_PRINTF(("%s: free inms 0x%llx\n", __func__,
923 (uint64_t)VM_KERNEL_ADDRPERM(lims)));
6d2010ae
A
924 RB_REMOVE(ip_msource_tree, &imf->imf_sources, ims);
925 inms_free(lims);
926 imf->imf_nsrc--;
927 }
928 }
929}
930
931/*
932 * Purge socket-layer filter set.
933 *
934 * Caller is expected to be holding imo_lock.
935 */
936void
937imf_purge(struct in_mfilter *imf)
938{
939 struct ip_msource *ims, *tims;
940 struct in_msource *lims;
941
942 RB_FOREACH_SAFE(ims, ip_msource_tree, &imf->imf_sources, tims) {
943 lims = (struct in_msource *)ims;
39236c6e
A
944 IGMP_PRINTF(("%s: free inms 0x%llx\n", __func__,
945 (uint64_t)VM_KERNEL_ADDRPERM(lims)));
6d2010ae
A
946 RB_REMOVE(ip_msource_tree, &imf->imf_sources, ims);
947 inms_free(lims);
948 imf->imf_nsrc--;
949 }
950 imf->imf_st[0] = imf->imf_st[1] = MCAST_UNDEFINED;
951 VERIFY(RB_EMPTY(&imf->imf_sources));
952}
953
954/*
955 * Look up a source filter entry for a multicast group.
956 *
957 * inm is the group descriptor to work with.
958 * haddr is the host-byte-order IPv4 address to look up.
959 * noalloc may be non-zero to suppress allocation of sources.
960 * *pims will be set to the address of the retrieved or allocated source.
961 *
962 * Return 0 if successful, otherwise return a non-zero error code.
963 */
964static int
965inm_get_source(struct in_multi *inm, const in_addr_t haddr,
966 const int noalloc, struct ip_msource **pims)
967{
968 struct ip_msource find;
969 struct ip_msource *ims, *nims;
970#ifdef IGMP_DEBUG
971 struct in_addr ia;
39236c6e 972 char buf[MAX_IPv4_STR_LEN];
6d2010ae
A
973#endif
974 INM_LOCK_ASSERT_HELD(inm);
975
976 find.ims_haddr = haddr;
977 ims = RB_FIND(ip_msource_tree, &inm->inm_srcs, &find);
978 if (ims == NULL && !noalloc) {
979 if (inm->inm_nsrc == in_mcast_maxgrpsrc)
980 return (ENOSPC);
981 nims = ipms_alloc(M_WAITOK);
982 if (nims == NULL)
983 return (ENOMEM);
984 nims->ims_haddr = haddr;
985 RB_INSERT(ip_msource_tree, &inm->inm_srcs, nims);
986 ++inm->inm_nsrc;
987 ims = nims;
988#ifdef IGMP_DEBUG
989 ia.s_addr = htonl(haddr);
39236c6e
A
990 inet_ntop(AF_INET, &ia, buf, sizeof(buf));
991 IGMP_PRINTF(("%s: allocated %s as 0x%llx\n", __func__,
992 buf, (uint64_t)VM_KERNEL_ADDRPERM(ims)));
6d2010ae
A
993#endif
994 }
995
996 *pims = ims;
997 return (0);
998}
999
1000/*
1001 * Helper function to derive the filter mode on a source entry
1002 * from its internal counters. Predicates are:
1003 * A source is only excluded if all listeners exclude it.
1004 * A source is only included if no listeners exclude it,
1005 * and at least one listener includes it.
1006 * May be used by ifmcstat(8).
1007 */
1008uint8_t
1009ims_get_mode(const struct in_multi *inm, const struct ip_msource *ims,
1010 uint8_t t)
1011{
39236c6e 1012 INM_LOCK_ASSERT_HELD(__DECONST(struct in_multi *, inm));
6d2010ae
A
1013
1014 t = !!t;
1015 if (inm->inm_st[t].iss_ex > 0 &&
1016 inm->inm_st[t].iss_ex == ims->ims_st[t].ex)
1017 return (MCAST_EXCLUDE);
1018 else if (ims->ims_st[t].in > 0 && ims->ims_st[t].ex == 0)
1019 return (MCAST_INCLUDE);
1020 return (MCAST_UNDEFINED);
1021}
1022
1023/*
1024 * Merge socket-layer source into IGMP-layer source.
1025 * If rollback is non-zero, perform the inverse of the merge.
1026 */
1027static void
1028ims_merge(struct ip_msource *ims, const struct in_msource *lims,
1029 const int rollback)
1030{
1031 int n = rollback ? -1 : 1;
1032#ifdef IGMP_DEBUG
1033 struct in_addr ia;
1034
1035 ia.s_addr = htonl(ims->ims_haddr);
1036#endif
1037
1038 if (lims->imsl_st[0] == MCAST_EXCLUDE) {
39236c6e
A
1039 IGMP_INET_PRINTF(ia,
1040 ("%s: t1 ex -= %d on %s\n",
1041 __func__, n, _igmp_inet_buf));
6d2010ae
A
1042 ims->ims_st[1].ex -= n;
1043 } else if (lims->imsl_st[0] == MCAST_INCLUDE) {
39236c6e
A
1044 IGMP_INET_PRINTF(ia,
1045 ("%s: t1 in -= %d on %s\n",
1046 __func__, n, _igmp_inet_buf));
6d2010ae
A
1047 ims->ims_st[1].in -= n;
1048 }
1049
1050 if (lims->imsl_st[1] == MCAST_EXCLUDE) {
39236c6e
A
1051 IGMP_INET_PRINTF(ia,
1052 ("%s: t1 ex += %d on %s\n",
1053 __func__, n, _igmp_inet_buf));
6d2010ae
A
1054 ims->ims_st[1].ex += n;
1055 } else if (lims->imsl_st[1] == MCAST_INCLUDE) {
39236c6e
A
1056 IGMP_INET_PRINTF(ia,
1057 ("%s: t1 in += %d on %s\n",
1058 __func__, n, _igmp_inet_buf));
6d2010ae
A
1059 ims->ims_st[1].in += n;
1060 }
1061}
1062
1063/*
1064 * Atomically update the global in_multi state, when a membership's
1065 * filter list is being updated in any way.
1066 *
1067 * imf is the per-inpcb-membership group filter pointer.
1068 * A fake imf may be passed for in-kernel consumers.
1069 *
1070 * XXX This is a candidate for a set-symmetric-difference style loop
1071 * which would eliminate the repeated lookup from root of ims nodes,
1072 * as they share the same key space.
1073 *
1074 * If any error occurred this function will back out of refcounts
1075 * and return a non-zero value.
1076 */
1077static int
1078inm_merge(struct in_multi *inm, /*const*/ struct in_mfilter *imf)
1079{
1080 struct ip_msource *ims, *nims;
1081 struct in_msource *lims;
1082 int schanged, error;
1083 int nsrc0, nsrc1;
1084
1085 INM_LOCK_ASSERT_HELD(inm);
1086
1087 schanged = 0;
1088 error = 0;
1089 nsrc1 = nsrc0 = 0;
1090
1091 /*
1092 * Update the source filters first, as this may fail.
1093 * Maintain count of in-mode filters at t0, t1. These are
1094 * used to work out if we transition into ASM mode or not.
1095 * Maintain a count of source filters whose state was
1096 * actually modified by this operation.
1097 */
1098 RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources) {
1099 lims = (struct in_msource *)ims;
1100 if (lims->imsl_st[0] == imf->imf_st[0]) nsrc0++;
1101 if (lims->imsl_st[1] == imf->imf_st[1]) nsrc1++;
1102 if (lims->imsl_st[0] == lims->imsl_st[1]) continue;
1103 error = inm_get_source(inm, lims->ims_haddr, 0, &nims);
1104 ++schanged;
1105 if (error)
1106 break;
1107 ims_merge(nims, lims, 0);
1108 }
1109 if (error) {
1110 struct ip_msource *bims;
1111
1112 RB_FOREACH_REVERSE_FROM(ims, ip_msource_tree, nims) {
1113 lims = (struct in_msource *)ims;
1114 if (lims->imsl_st[0] == lims->imsl_st[1])
1115 continue;
1116 (void) inm_get_source(inm, lims->ims_haddr, 1, &bims);
1117 if (bims == NULL)
1118 continue;
1119 ims_merge(bims, lims, 1);
1120 }
1121 goto out_reap;
1122 }
1123
1124 IGMP_PRINTF(("%s: imf filters in-mode: %d at t0, %d at t1\n",
1125 __func__, nsrc0, nsrc1));
1126
1127 /* Handle transition between INCLUDE {n} and INCLUDE {} on socket. */
1128 if (imf->imf_st[0] == imf->imf_st[1] &&
1129 imf->imf_st[1] == MCAST_INCLUDE) {
1130 if (nsrc1 == 0) {
1131 IGMP_PRINTF(("%s: --in on inm at t1\n", __func__));
1132 --inm->inm_st[1].iss_in;
1133 }
1134 }
1135
1136 /* Handle filter mode transition on socket. */
1137 if (imf->imf_st[0] != imf->imf_st[1]) {
1138 IGMP_PRINTF(("%s: imf transition %d to %d\n",
1139 __func__, imf->imf_st[0], imf->imf_st[1]));
1140
1141 if (imf->imf_st[0] == MCAST_EXCLUDE) {
1142 IGMP_PRINTF(("%s: --ex on inm at t1\n", __func__));
1143 --inm->inm_st[1].iss_ex;
1144 } else if (imf->imf_st[0] == MCAST_INCLUDE) {
1145 IGMP_PRINTF(("%s: --in on inm at t1\n", __func__));
1146 --inm->inm_st[1].iss_in;
1147 }
1148
1149 if (imf->imf_st[1] == MCAST_EXCLUDE) {
1150 IGMP_PRINTF(("%s: ex++ on inm at t1\n", __func__));
1151 inm->inm_st[1].iss_ex++;
1152 } else if (imf->imf_st[1] == MCAST_INCLUDE && nsrc1 > 0) {
1153 IGMP_PRINTF(("%s: in++ on inm at t1\n", __func__));
1154 inm->inm_st[1].iss_in++;
1155 }
1156 }
1157
1158 /*
1159 * Track inm filter state in terms of listener counts.
1160 * If there are any exclusive listeners, stack-wide
1161 * membership is exclusive.
1162 * Otherwise, if only inclusive listeners, stack-wide is inclusive.
1163 * If no listeners remain, state is undefined at t1,
1164 * and the IGMP lifecycle for this group should finish.
1165 */
1166 if (inm->inm_st[1].iss_ex > 0) {
1167 IGMP_PRINTF(("%s: transition to EX\n", __func__));
1168 inm->inm_st[1].iss_fmode = MCAST_EXCLUDE;
1169 } else if (inm->inm_st[1].iss_in > 0) {
1170 IGMP_PRINTF(("%s: transition to IN\n", __func__));
1171 inm->inm_st[1].iss_fmode = MCAST_INCLUDE;
1172 } else {
1173 IGMP_PRINTF(("%s: transition to UNDEF\n", __func__));
1174 inm->inm_st[1].iss_fmode = MCAST_UNDEFINED;
1175 }
1176
1177 /* Decrement ASM listener count on transition out of ASM mode. */
1178 if (imf->imf_st[0] == MCAST_EXCLUDE && nsrc0 == 0) {
1179 if ((imf->imf_st[1] != MCAST_EXCLUDE) ||
1180 (imf->imf_st[1] == MCAST_EXCLUDE && nsrc1 > 0)) {
1181 IGMP_PRINTF(("%s: --asm on inm at t1\n", __func__));
1182 --inm->inm_st[1].iss_asm;
1183 }
1184 }
1185
1186 /* Increment ASM listener count on transition to ASM mode. */
1187 if (imf->imf_st[1] == MCAST_EXCLUDE && nsrc1 == 0) {
1188 IGMP_PRINTF(("%s: asm++ on inm at t1\n", __func__));
1189 inm->inm_st[1].iss_asm++;
1190 }
1191
39236c6e
A
1192 IGMP_PRINTF(("%s: merged imf 0x%llx to inm 0x%llx\n", __func__,
1193 (uint64_t)VM_KERNEL_ADDRPERM(imf),
1194 (uint64_t)VM_KERNEL_ADDRPERM(inm)));
6d2010ae
A
1195 inm_print(inm);
1196
1197out_reap:
1198 if (schanged > 0) {
1199 IGMP_PRINTF(("%s: sources changed; reaping\n", __func__));
1200 inm_reap(inm);
1201 }
1202 return (error);
1203}
1204
1205/*
1206 * Mark an in_multi's filter set deltas as committed.
1207 * Called by IGMP after a state change has been enqueued.
1208 */
1209void
1210inm_commit(struct in_multi *inm)
1211{
1212 struct ip_msource *ims;
1213
1214 INM_LOCK_ASSERT_HELD(inm);
1215
39236c6e
A
1216 IGMP_PRINTF(("%s: commit inm 0x%llx\n", __func__,
1217 (uint64_t)VM_KERNEL_ADDRPERM(inm)));
6d2010ae
A
1218 IGMP_PRINTF(("%s: pre commit:\n", __func__));
1219 inm_print(inm);
1220
1221 RB_FOREACH(ims, ip_msource_tree, &inm->inm_srcs) {
1222 ims->ims_st[0] = ims->ims_st[1];
1223 }
1224 inm->inm_st[0] = inm->inm_st[1];
1225}
1226
1227/*
1228 * Reap unreferenced nodes from an in_multi's filter set.
1229 */
1230static void
1231inm_reap(struct in_multi *inm)
1232{
1233 struct ip_msource *ims, *tims;
1234
1235 INM_LOCK_ASSERT_HELD(inm);
1236
1237 RB_FOREACH_SAFE(ims, ip_msource_tree, &inm->inm_srcs, tims) {
1238 if (ims->ims_st[0].ex > 0 || ims->ims_st[0].in > 0 ||
1239 ims->ims_st[1].ex > 0 || ims->ims_st[1].in > 0 ||
1240 ims->ims_stp != 0)
1241 continue;
39236c6e
A
1242 IGMP_PRINTF(("%s: free ims 0x%llx\n", __func__,
1243 (uint64_t)VM_KERNEL_ADDRPERM(ims)));
6d2010ae
A
1244 RB_REMOVE(ip_msource_tree, &inm->inm_srcs, ims);
1245 ipms_free(ims);
1246 inm->inm_nsrc--;
1247 }
1248}
1249
1250/*
1251 * Purge all source nodes from an in_multi's filter set.
1252 */
1253void
1254inm_purge(struct in_multi *inm)
1255{
1256 struct ip_msource *ims, *tims;
1257
1258 INM_LOCK_ASSERT_HELD(inm);
1259
1260 RB_FOREACH_SAFE(ims, ip_msource_tree, &inm->inm_srcs, tims) {
39236c6e
A
1261 IGMP_PRINTF(("%s: free ims 0x%llx\n", __func__,
1262 (uint64_t)VM_KERNEL_ADDRPERM(ims)));
6d2010ae
A
1263 RB_REMOVE(ip_msource_tree, &inm->inm_srcs, ims);
1264 ipms_free(ims);
1265 inm->inm_nsrc--;
1266 }
1267}
1268
1269/*
1270 * Join a multicast group; real entry point.
1271 *
1272 * Only preserves atomicity at inm level.
1273 * NOTE: imf argument cannot be const due to sys/tree.h limitations.
1274 *
1275 * If the IGMP downcall fails, the group is not joined, and an error
1276 * code is returned.
1277 */
1278static int
1279in_joingroup(struct ifnet *ifp, const struct in_addr *gina,
1280 /*const*/ struct in_mfilter *imf, struct in_multi **pinm)
1281{
1282 struct in_mfilter timf;
1283 struct in_multi *inm = NULL;
1284 int error = 0;
39236c6e 1285 struct igmp_tparams itp;
6d2010ae 1286
39236c6e
A
1287 IGMP_INET_PRINTF(*gina, ("%s: join %s on 0x%llx(%s))\n", __func__,
1288 _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp), if_name(ifp)));
6d2010ae 1289
39236c6e 1290 bzero(&itp, sizeof (itp));
6d2010ae
A
1291 *pinm = NULL;
1292
1293 /*
1294 * If no imf was specified (i.e. kernel consumer),
1295 * fake one up and assume it is an ASM join.
1296 */
1297 if (imf == NULL) {
1298 imf_init(&timf, MCAST_UNDEFINED, MCAST_EXCLUDE);
1299 imf = &timf;
1300 }
1301
1302 error = in_getmulti(ifp, gina, &inm);
1303 if (error) {
1304 IGMP_PRINTF(("%s: in_getmulti() failure\n", __func__));
1305 return (error);
1306 }
1307
1308 IGMP_PRINTF(("%s: merge inm state\n", __func__));
1309
1310 INM_LOCK(inm);
1311 error = inm_merge(inm, imf);
1312 if (error) {
1313 IGMP_PRINTF(("%s: failed to merge inm state\n", __func__));
1314 goto out_inm_release;
1315 }
1316
1317 IGMP_PRINTF(("%s: doing igmp downcall\n", __func__));
39236c6e 1318 error = igmp_change_state(inm, &itp);
6d2010ae
A
1319 if (error) {
1320 IGMP_PRINTF(("%s: failed to update source\n", __func__));
39236c6e 1321 imf_rollback(imf);
6d2010ae
A
1322 goto out_inm_release;
1323 }
1324
1325out_inm_release:
1326 if (error) {
39236c6e
A
1327 IGMP_PRINTF(("%s: dropping ref on 0x%llx\n", __func__,
1328 (uint64_t)VM_KERNEL_ADDRPERM(inm)));
6d2010ae
A
1329 INM_UNLOCK(inm);
1330 INM_REMREF(inm);
1331 } else {
1332 INM_UNLOCK(inm);
1333 *pinm = inm; /* keep refcount from in_getmulti() */
1334 }
1335
39236c6e
A
1336 /* schedule timer now that we've dropped the lock(s) */
1337 igmp_set_timeout(&itp);
1338
6d2010ae
A
1339 return (error);
1340}
1341
1342/*
1343 * Leave a multicast group; real entry point.
1344 * All source filters will be expunged.
1345 *
1346 * Only preserves atomicity at inm level.
1347 *
1348 * Note: This is not the same as inm_release(*) as this function also
1349 * makes a state change downcall into IGMP.
1350 */
1351int
1352in_leavegroup(struct in_multi *inm, /*const*/ struct in_mfilter *imf)
1353{
1354 struct in_mfilter timf;
1355 int error, lastref;
39236c6e 1356 struct igmp_tparams itp;
6d2010ae 1357
39236c6e 1358 bzero(&itp, sizeof (itp));
6d2010ae
A
1359 error = 0;
1360
1361 INM_LOCK_ASSERT_NOTHELD(inm);
1362
1363 in_multihead_lock_exclusive();
1364 INM_LOCK(inm);
1365
39236c6e
A
1366 IGMP_INET_PRINTF(inm->inm_addr,
1367 ("%s: leave inm 0x%llx, %s/%s%d, imf 0x%llx\n", __func__,
1368 (uint64_t)VM_KERNEL_ADDRPERM(inm), _igmp_inet_buf,
6d2010ae 1369 (inm_is_ifp_detached(inm) ? "null" : inm->inm_ifp->if_name),
39236c6e 1370 inm->inm_ifp->if_unit, (uint64_t)VM_KERNEL_ADDRPERM(imf)));
6d2010ae
A
1371
1372 /*
1373 * If no imf was specified (i.e. kernel consumer),
1374 * fake one up and assume it is an ASM join.
1375 */
1376 if (imf == NULL) {
1377 imf_init(&timf, MCAST_EXCLUDE, MCAST_UNDEFINED);
1378 imf = &timf;
1379 }
1380
1381 /*
1382 * Begin state merge transaction at IGMP layer.
1383 *
1384 * As this particular invocation should not cause any memory
1385 * to be allocated, and there is no opportunity to roll back
1386 * the transaction, it MUST NOT fail.
1387 */
1388 IGMP_PRINTF(("%s: merge inm state\n", __func__));
1389
1390 error = inm_merge(inm, imf);
1391 KASSERT(error == 0, ("%s: failed to merge inm state\n", __func__));
1392
1393 IGMP_PRINTF(("%s: doing igmp downcall\n", __func__));
39236c6e 1394 error = igmp_change_state(inm, &itp);
6d2010ae
A
1395#if IGMP_DEBUG
1396 if (error)
1397 IGMP_PRINTF(("%s: failed igmp downcall\n", __func__));
1398#endif
1399 lastref = in_multi_detach(inm);
1400 VERIFY(!lastref || (!(inm->inm_debug & IFD_ATTACHED) &&
1401 inm->inm_reqcnt == 0));
1402 INM_UNLOCK(inm);
1403 in_multihead_lock_done();
1404
1405 if (lastref)
1406 INM_REMREF(inm); /* for in_multihead list */
1407
39236c6e
A
1408 /* schedule timer now that we've dropped the lock(s) */
1409 igmp_set_timeout(&itp);
1410
6d2010ae
A
1411 return (error);
1412}
1413
1414/*
1415 * Join an IPv4 multicast group in (*,G) exclusive mode.
1416 * The group must be a 224.0.0.0/24 link-scope group.
1417 * This KPI is for legacy kernel consumers only.
1418 */
1419struct in_multi *
1420in_addmulti(struct in_addr *ap, struct ifnet *ifp)
1421{
1422 struct in_multi *pinm = NULL;
1423 int error;
1424
1425 KASSERT(IN_LOCAL_GROUP(ntohl(ap->s_addr)),
1426 ("%s: %s not in 224.0.0.0/24\n", __func__, inet_ntoa(*ap)));
1427
1428 error = in_joingroup(ifp, ap, NULL, &pinm);
1429 VERIFY(pinm != NULL || error != 0);
1430
1431 return (pinm);
1432}
1433
1434/*
1435 * Leave an IPv4 multicast group, assumed to be in exclusive (*,G) mode.
1436 * This KPI is for legacy kernel consumers only.
1437 */
1438void
1439in_delmulti(struct in_multi *inm)
1440{
1441
1442 (void) in_leavegroup(inm, NULL);
1443}
1444
1445/*
1446 * Block or unblock an ASM multicast source on an inpcb.
1447 * This implements the delta-based API described in RFC 3678.
1448 *
1449 * The delta-based API applies only to exclusive-mode memberships.
1450 * An IGMP downcall will be performed.
1451 *
1452 * Return 0 if successful, otherwise return an appropriate error code.
1453 */
1454static int
1455inp_block_unblock_source(struct inpcb *inp, struct sockopt *sopt)
1456{
1457 struct group_source_req gsr;
1458 sockunion_t *gsa, *ssa;
1459 struct ifnet *ifp;
1460 struct in_mfilter *imf;
1461 struct ip_moptions *imo;
1462 struct in_msource *ims;
1463 struct in_multi *inm;
1464 size_t idx;
1465 uint16_t fmode;
1466 int error, doblock;
1467 unsigned int ifindex = 0;
39236c6e 1468 struct igmp_tparams itp;
6d2010ae 1469
39236c6e 1470 bzero(&itp, sizeof (itp));
6d2010ae
A
1471 ifp = NULL;
1472 error = 0;
1473 doblock = 0;
1474
1475 memset(&gsr, 0, sizeof(struct group_source_req));
1476 gsa = (sockunion_t *)&gsr.gsr_group;
1477 ssa = (sockunion_t *)&gsr.gsr_source;
1478
1479 switch (sopt->sopt_name) {
1480 case IP_BLOCK_SOURCE:
1481 case IP_UNBLOCK_SOURCE: {
1482 struct ip_mreq_source mreqs;
1483
1484 error = sooptcopyin(sopt, &mreqs,
1485 sizeof(struct ip_mreq_source),
1486 sizeof(struct ip_mreq_source));
1487 if (error)
1488 return (error);
1489
1490 gsa->sin.sin_family = AF_INET;
1491 gsa->sin.sin_len = sizeof(struct sockaddr_in);
1492 gsa->sin.sin_addr = mreqs.imr_multiaddr;
1493
1494 ssa->sin.sin_family = AF_INET;
1495 ssa->sin.sin_len = sizeof(struct sockaddr_in);
1496 ssa->sin.sin_addr = mreqs.imr_sourceaddr;
1497
1498 if (!in_nullhost(mreqs.imr_interface))
1499 ifp = ip_multicast_if(&mreqs.imr_interface, &ifindex);
1500
1501 if (sopt->sopt_name == IP_BLOCK_SOURCE)
1502 doblock = 1;
1503
39236c6e
A
1504 IGMP_INET_PRINTF(mreqs.imr_interface,
1505 ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__,
1506 _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp)));
6d2010ae
A
1507 break;
1508 }
1509
1510 case MCAST_BLOCK_SOURCE:
1511 case MCAST_UNBLOCK_SOURCE:
1512 error = sooptcopyin(sopt, &gsr,
1513 sizeof(struct group_source_req),
1514 sizeof(struct group_source_req));
1515 if (error)
1516 return (error);
1517
1518 if (gsa->sin.sin_family != AF_INET ||
1519 gsa->sin.sin_len != sizeof(struct sockaddr_in))
1520 return (EINVAL);
1521
1522 if (ssa->sin.sin_family != AF_INET ||
1523 ssa->sin.sin_len != sizeof(struct sockaddr_in))
1524 return (EINVAL);
1525
1526 ifnet_head_lock_shared();
1527 if (gsr.gsr_interface == 0 ||
1528 (u_int)if_index < gsr.gsr_interface) {
1529 ifnet_head_done();
1530 return (EADDRNOTAVAIL);
1531 }
1532
1533 ifp = ifindex2ifnet[gsr.gsr_interface];
1534 ifnet_head_done();
1535
1536 if (ifp == NULL)
1537 return (EADDRNOTAVAIL);
1538
1539 if (sopt->sopt_name == MCAST_BLOCK_SOURCE)
1540 doblock = 1;
1541 break;
1542
1543 default:
1544 IGMP_PRINTF(("%s: unknown sopt_name %d\n",
1545 __func__, sopt->sopt_name));
1546 return (EOPNOTSUPP);
6d2010ae
A
1547 }
1548
1549 if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr)))
1550 return (EINVAL);
1551
1552 /*
1553 * Check if we are actually a member of this group.
1554 */
1555 imo = inp_findmoptions(inp);
1556 if (imo == NULL)
1557 return (ENOMEM);
1558
1559 IMO_LOCK(imo);
1560 idx = imo_match_group(imo, ifp, &gsa->sa);
1561 if (idx == (size_t)-1 || imo->imo_mfilters == NULL) {
1562 error = EADDRNOTAVAIL;
1563 goto out_imo_locked;
1564 }
1565
1566 VERIFY(imo->imo_mfilters != NULL);
1567 imf = &imo->imo_mfilters[idx];
1568 inm = imo->imo_membership[idx];
1569
1570 /*
1571 * Attempting to use the delta-based API on an
1572 * non exclusive-mode membership is an error.
1573 */
1574 fmode = imf->imf_st[0];
1575 if (fmode != MCAST_EXCLUDE) {
1576 error = EINVAL;
1577 goto out_imo_locked;
1578 }
1579
1580 /*
1581 * Deal with error cases up-front:
1582 * Asked to block, but already blocked; or
1583 * Asked to unblock, but nothing to unblock.
1584 * If adding a new block entry, allocate it.
1585 */
1586 ims = imo_match_source(imo, idx, &ssa->sa);
1587 if ((ims != NULL && doblock) || (ims == NULL && !doblock)) {
39236c6e
A
1588 IGMP_INET_PRINTF(ssa->sin.sin_addr,
1589 ("%s: source %s %spresent\n", __func__,
1590 _igmp_inet_buf, doblock ? "" : "not "));
6d2010ae
A
1591 error = EADDRNOTAVAIL;
1592 goto out_imo_locked;
1593 }
1594
1595 /*
1596 * Begin state merge transaction at socket layer.
1597 */
1598 if (doblock) {
1599 IGMP_PRINTF(("%s: %s source\n", __func__, "block"));
1600 ims = imf_graft(imf, fmode, &ssa->sin);
1601 if (ims == NULL)
1602 error = ENOMEM;
1603 } else {
1604 IGMP_PRINTF(("%s: %s source\n", __func__, "allow"));
1605 error = imf_prune(imf, &ssa->sin);
1606 }
1607
1608 if (error) {
1609 IGMP_PRINTF(("%s: merge imf state failed\n", __func__));
1610 goto out_imf_rollback;
1611 }
1612
1613 /*
1614 * Begin state merge transaction at IGMP layer.
1615 */
1616 INM_LOCK(inm);
1617 IGMP_PRINTF(("%s: merge inm state\n", __func__));
1618 error = inm_merge(inm, imf);
1619 if (error) {
1620 IGMP_PRINTF(("%s: failed to merge inm state\n", __func__));
1621 INM_UNLOCK(inm);
1622 goto out_imf_rollback;
1623 }
1624
1625 IGMP_PRINTF(("%s: doing igmp downcall\n", __func__));
39236c6e 1626 error = igmp_change_state(inm, &itp);
6d2010ae
A
1627 INM_UNLOCK(inm);
1628#if IGMP_DEBUG
1629 if (error)
1630 IGMP_PRINTF(("%s: failed igmp downcall\n", __func__));
1631#endif
1632
1633out_imf_rollback:
1634 if (error)
1635 imf_rollback(imf);
1636 else
1637 imf_commit(imf);
1638
1639 imf_reap(imf);
1640
1641out_imo_locked:
1642 IMO_UNLOCK(imo);
1643 IMO_REMREF(imo); /* from inp_findmoptions() */
39236c6e
A
1644
1645 /* schedule timer now that we've dropped the lock(s) */
1646 igmp_set_timeout(&itp);
1647
6d2010ae
A
1648 return (error);
1649}
1650
1651/*
1652 * Given an inpcb, return its multicast options structure pointer.
1653 *
1654 * Caller is responsible for locking the inpcb, and releasing the
1655 * extra reference held on the imo, upon a successful return.
1656 */
1657static struct ip_moptions *
1658inp_findmoptions(struct inpcb *inp)
1659{
1660 struct ip_moptions *imo;
1661 struct in_multi **immp;
1662 struct in_mfilter *imfp;
1663 size_t idx;
1664
1665 if ((imo = inp->inp_moptions) != NULL) {
1666 IMO_ADDREF(imo); /* for caller */
1667 return (imo);
1668 }
1669
1670 imo = ip_allocmoptions(M_WAITOK);
1671 if (imo == NULL)
1672 return (NULL);
1673
1674 immp = _MALLOC(sizeof (*immp) * IP_MIN_MEMBERSHIPS, M_IPMOPTS,
1675 M_WAITOK | M_ZERO);
1676 if (immp == NULL) {
1677 IMO_REMREF(imo);
1678 return (NULL);
1679 }
1680
1681 imfp = _MALLOC(sizeof (struct in_mfilter) * IP_MIN_MEMBERSHIPS,
1682 M_INMFILTER, M_WAITOK | M_ZERO);
1683 if (imfp == NULL) {
1684 _FREE(immp, M_IPMOPTS);
1685 IMO_REMREF(imo);
1686 return (NULL);
1687 }
1688
1689 imo->imo_multicast_ifp = NULL;
1690 imo->imo_multicast_addr.s_addr = INADDR_ANY;
1691 imo->imo_multicast_vif = -1;
1692 imo->imo_multicast_ttl = IP_DEFAULT_MULTICAST_TTL;
1693 imo->imo_multicast_loop = in_mcast_loop;
1694 imo->imo_num_memberships = 0;
1695 imo->imo_max_memberships = IP_MIN_MEMBERSHIPS;
1696 imo->imo_membership = immp;
1697
1698 /* Initialize per-group source filters. */
1699 for (idx = 0; idx < IP_MIN_MEMBERSHIPS; idx++)
1700 imf_init(&imfp[idx], MCAST_UNDEFINED, MCAST_EXCLUDE);
1701
1702 imo->imo_mfilters = imfp;
1703 inp->inp_moptions = imo; /* keep reference from ip_allocmoptions() */
1704 IMO_ADDREF(imo); /* for caller */
1705
1706 return (imo);
1707}
1708/*
1709 * Atomically get source filters on a socket for an IPv4 multicast group.
1710 */
1711static int
1712inp_get_source_filters(struct inpcb *inp, struct sockopt *sopt)
1713{
1714 struct __msfilterreq64 msfr, msfr64;
1715 struct __msfilterreq32 msfr32;
1716 sockunion_t *gsa;
1717 struct ifnet *ifp;
1718 struct ip_moptions *imo;
1719 struct in_mfilter *imf;
1720 struct ip_msource *ims;
1721 struct in_msource *lims;
1722 struct sockaddr_in *psin;
1723 struct sockaddr_storage *ptss;
1724 struct sockaddr_storage *tss;
1725 int error;
1726 size_t idx, nsrcs, ncsrcs;
1727 user_addr_t tmp_ptr;
1728
1729 imo = inp->inp_moptions;
1730 VERIFY(imo != NULL);
1731
1732 if (IS_64BIT_PROCESS(current_proc())) {
1733 error = sooptcopyin(sopt, &msfr64,
1734 sizeof(struct __msfilterreq64),
1735 sizeof(struct __msfilterreq64));
1736 if (error)
1737 return (error);
1738 /* we never use msfr.msfr_srcs; */
3e170ce0 1739 memcpy(&msfr, &msfr64, sizeof(msfr64));
6d2010ae
A
1740 } else {
1741 error = sooptcopyin(sopt, &msfr32,
1742 sizeof(struct __msfilterreq32),
1743 sizeof(struct __msfilterreq32));
1744 if (error)
1745 return (error);
1746 /* we never use msfr.msfr_srcs; */
3e170ce0 1747 memcpy(&msfr, &msfr32, sizeof(msfr32));
6d2010ae
A
1748 }
1749
1750 ifnet_head_lock_shared();
1751 if (msfr.msfr_ifindex == 0 || (u_int)if_index < msfr.msfr_ifindex) {
1752 ifnet_head_done();
1753 return (EADDRNOTAVAIL);
1754 }
1755
1756 ifp = ifindex2ifnet[msfr.msfr_ifindex];
1757 ifnet_head_done();
1758
1759 if (ifp == NULL)
1760 return (EADDRNOTAVAIL);
316670eb
A
1761
1762 if ((size_t) msfr.msfr_nsrcs >
39236c6e
A
1763 UINT32_MAX / sizeof(struct sockaddr_storage))
1764 msfr.msfr_nsrcs = UINT32_MAX / sizeof(struct sockaddr_storage);
316670eb 1765
6d2010ae
A
1766 if (msfr.msfr_nsrcs > in_mcast_maxsocksrc)
1767 msfr.msfr_nsrcs = in_mcast_maxsocksrc;
1768
1769 IMO_LOCK(imo);
1770 /*
1771 * Lookup group on the socket.
1772 */
1773 gsa = (sockunion_t *)&msfr.msfr_group;
1774 idx = imo_match_group(imo, ifp, &gsa->sa);
1775 if (idx == (size_t)-1 || imo->imo_mfilters == NULL) {
1776 IMO_UNLOCK(imo);
1777 return (EADDRNOTAVAIL);
1778 }
1779 imf = &imo->imo_mfilters[idx];
1780
1781 /*
1782 * Ignore memberships which are in limbo.
1783 */
1784 if (imf->imf_st[1] == MCAST_UNDEFINED) {
1785 IMO_UNLOCK(imo);
1786 return (EAGAIN);
1787 }
1788 msfr.msfr_fmode = imf->imf_st[1];
1789
1790 /*
1791 * If the user specified a buffer, copy out the source filter
1792 * entries to userland gracefully.
1793 * We only copy out the number of entries which userland
1794 * has asked for, but we always tell userland how big the
1795 * buffer really needs to be.
1796 */
1797
1798 if (IS_64BIT_PROCESS(current_proc()))
1799 tmp_ptr = msfr64.msfr_srcs;
1800 else
1801 tmp_ptr = CAST_USER_ADDR_T(msfr32.msfr_srcs);
1802
1803 tss = NULL;
1804 if (tmp_ptr != USER_ADDR_NULL && msfr.msfr_nsrcs > 0) {
316670eb 1805 tss = _MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*tss),
6d2010ae
A
1806 M_TEMP, M_WAITOK | M_ZERO);
1807 if (tss == NULL) {
1808 IMO_UNLOCK(imo);
1809 return (ENOBUFS);
1810 }
1811 }
1812
1813 /*
1814 * Count number of sources in-mode at t0.
1815 * If buffer space exists and remains, copy out source entries.
1816 */
1817 nsrcs = msfr.msfr_nsrcs;
1818 ncsrcs = 0;
1819 ptss = tss;
1820 RB_FOREACH(ims, ip_msource_tree, &imf->imf_sources) {
1821 lims = (struct in_msource *)ims;
1822 if (lims->imsl_st[0] == MCAST_UNDEFINED ||
1823 lims->imsl_st[0] != imf->imf_st[0])
1824 continue;
1825 if (tss != NULL && nsrcs > 0) {
1826 psin = (struct sockaddr_in *)ptss;
1827 psin->sin_family = AF_INET;
1828 psin->sin_len = sizeof(struct sockaddr_in);
1829 psin->sin_addr.s_addr = htonl(lims->ims_haddr);
1830 psin->sin_port = 0;
1831 ++ptss;
1832 --nsrcs;
1833 ++ncsrcs;
1834 }
1835 }
1836
1837 IMO_UNLOCK(imo);
1838
1839 if (tss != NULL) {
316670eb 1840 error = copyout(tss, tmp_ptr, ncsrcs * sizeof(*tss));
6d2010ae
A
1841 FREE(tss, M_TEMP);
1842 if (error)
1843 return (error);
1844 }
1845
1846 msfr.msfr_nsrcs = ncsrcs;
1847 if (IS_64BIT_PROCESS(current_proc())) {
1848 msfr64.msfr_ifindex = msfr.msfr_ifindex;
1849 msfr64.msfr_fmode = msfr.msfr_fmode;
1850 msfr64.msfr_nsrcs = msfr.msfr_nsrcs;
1851 memcpy(&msfr64.msfr_group, &msfr.msfr_group,
1852 sizeof(struct sockaddr_storage));
1853 error = sooptcopyout(sopt, &msfr64,
1854 sizeof(struct __msfilterreq64));
1855 } else {
1856 msfr32.msfr_ifindex = msfr.msfr_ifindex;
1857 msfr32.msfr_fmode = msfr.msfr_fmode;
1858 msfr32.msfr_nsrcs = msfr.msfr_nsrcs;
3e170ce0 1859 memcpy(&msfr32.msfr_group, &msfr.msfr_group,
6d2010ae
A
1860 sizeof(struct sockaddr_storage));
1861 error = sooptcopyout(sopt, &msfr32,
1862 sizeof(struct __msfilterreq32));
1863 }
1864
1865 return (error);
1866}
1867
1868/*
1869 * Return the IP multicast options in response to user getsockopt().
1870 */
1871int
1872inp_getmoptions(struct inpcb *inp, struct sockopt *sopt)
1873{
1874 struct ip_mreqn mreqn;
1875 struct ip_moptions *imo;
1876 struct ifnet *ifp;
1877 struct in_ifaddr *ia;
1878 int error, optval;
1879 unsigned int ifindex;
1880 u_char coptval;
1881
1882 imo = inp->inp_moptions;
1883 /*
1884 * If socket is neither of type SOCK_RAW or SOCK_DGRAM,
1885 * or is a divert socket, reject it.
1886 */
39236c6e
A
1887 if (SOCK_PROTO(inp->inp_socket) == IPPROTO_DIVERT ||
1888 (SOCK_TYPE(inp->inp_socket) != SOCK_RAW &&
1889 SOCK_TYPE(inp->inp_socket) != SOCK_DGRAM)) {
6d2010ae
A
1890 return (EOPNOTSUPP);
1891 }
1892
1893 error = 0;
1894 switch (sopt->sopt_name) {
6d2010ae
A
1895 case IP_MULTICAST_IF:
1896 memset(&mreqn, 0, sizeof(struct ip_mreqn));
1897 if (imo != NULL) {
1898 IMO_LOCK(imo);
1899 ifp = imo->imo_multicast_ifp;
1900 if (!in_nullhost(imo->imo_multicast_addr)) {
1901 mreqn.imr_address = imo->imo_multicast_addr;
1902 } else if (ifp != NULL) {
1903 mreqn.imr_ifindex = ifp->if_index;
1904 IFP_TO_IA(ifp, ia);
1905 if (ia != NULL) {
1906 IFA_LOCK_SPIN(&ia->ia_ifa);
1907 mreqn.imr_address =
1908 IA_SIN(ia)->sin_addr;
1909 IFA_UNLOCK(&ia->ia_ifa);
1910 IFA_REMREF(&ia->ia_ifa);
1911 }
1912 }
1913 IMO_UNLOCK(imo);
1914 }
1915 if (sopt->sopt_valsize == sizeof(struct ip_mreqn)) {
1916 error = sooptcopyout(sopt, &mreqn,
1917 sizeof(struct ip_mreqn));
1918 } else {
1919 error = sooptcopyout(sopt, &mreqn.imr_address,
1920 sizeof(struct in_addr));
1921 }
1922 break;
1923
1924 case IP_MULTICAST_IFINDEX:
1925 if (imo != NULL)
1926 IMO_LOCK(imo);
1927 if (imo == NULL || imo->imo_multicast_ifp == NULL) {
1928 ifindex = 0;
1929 } else {
1930 ifindex = imo->imo_multicast_ifp->if_index;
1931 }
1932 if (imo != NULL)
1933 IMO_UNLOCK(imo);
1934 error = sooptcopyout(sopt, &ifindex, sizeof (ifindex));
1935 break;
1936
1937 case IP_MULTICAST_TTL:
1938 if (imo == NULL)
1939 optval = coptval = IP_DEFAULT_MULTICAST_TTL;
1940 else {
1941 IMO_LOCK(imo);
1942 optval = coptval = imo->imo_multicast_ttl;
1943 IMO_UNLOCK(imo);
1944 }
1945 if (sopt->sopt_valsize == sizeof(u_char))
1946 error = sooptcopyout(sopt, &coptval, sizeof(u_char));
1947 else
1948 error = sooptcopyout(sopt, &optval, sizeof(int));
1949 break;
1950
1951 case IP_MULTICAST_LOOP:
1952 if (imo == 0)
1953 optval = coptval = IP_DEFAULT_MULTICAST_LOOP;
1954 else {
1955 IMO_LOCK(imo);
1956 optval = coptval = imo->imo_multicast_loop;
1957 IMO_UNLOCK(imo);
1958 }
1959 if (sopt->sopt_valsize == sizeof(u_char))
1960 error = sooptcopyout(sopt, &coptval, sizeof(u_char));
1961 else
1962 error = sooptcopyout(sopt, &optval, sizeof(int));
1963 break;
1964
1965 case IP_MSFILTER:
1966 if (imo == NULL) {
1967 error = EADDRNOTAVAIL;
1968 } else {
1969 error = inp_get_source_filters(inp, sopt);
1970 }
1971 break;
1972
1973 default:
1974 error = ENOPROTOOPT;
1975 break;
1976 }
1977
1978 return (error);
1979}
1980
1981/*
1982 * Look up the ifnet to use for a multicast group membership,
1983 * given the IPv4 address of an interface, and the IPv4 group address.
1984 *
1985 * This routine exists to support legacy multicast applications
1986 * which do not understand that multicast memberships are scoped to
1987 * specific physical links in the networking stack, or which need
1988 * to join link-scope groups before IPv4 addresses are configured.
1989 *
1990 * If inp is non-NULL and is bound to an interface, use this socket's
1991 * inp_boundif for any required routing table lookup.
1992 *
1993 * If the route lookup fails, attempt to use the first non-loopback
1994 * interface with multicast capability in the system as a
1995 * last resort. The legacy IPv4 ASM API requires that we do
1996 * this in order to allow groups to be joined when the routing
1997 * table has not yet been populated during boot.
1998 *
1999 * Returns NULL if no ifp could be found.
2000 *
2001 */
2002static struct ifnet *
2003inp_lookup_mcast_ifp(const struct inpcb *inp,
2004 const struct sockaddr_in *gsin, const struct in_addr ina)
2005{
2006 struct ifnet *ifp;
2007 unsigned int ifindex = 0;
2008
2009 VERIFY(gsin->sin_family == AF_INET);
2010 VERIFY(IN_MULTICAST(ntohl(gsin->sin_addr.s_addr)));
2011
2012 ifp = NULL;
2013 if (!in_nullhost(ina)) {
2014 struct in_addr new_ina;
2015 memcpy(&new_ina, &ina, sizeof(struct in_addr));
2016 ifp = ip_multicast_if(&new_ina, &ifindex);
2017 } else {
2018 struct route ro;
2019 unsigned int ifscope = IFSCOPE_NONE;
2020
2021 if (inp != NULL && (inp->inp_flags & INP_BOUND_IF))
316670eb 2022 ifscope = inp->inp_boundifp->if_index;
6d2010ae
A
2023
2024 bzero(&ro, sizeof (ro));
2025 memcpy(&ro.ro_dst, gsin, sizeof(struct sockaddr_in));
2026 rtalloc_scoped_ign(&ro, 0, ifscope);
2027 if (ro.ro_rt != NULL) {
2028 ifp = ro.ro_rt->rt_ifp;
2029 VERIFY(ifp != NULL);
6d2010ae
A
2030 } else {
2031 struct in_ifaddr *ia;
2032 struct ifnet *mifp;
2033
2034 mifp = NULL;
2035 lck_rw_lock_shared(in_ifaddr_rwlock);
2036 TAILQ_FOREACH(ia, &in_ifaddrhead, ia_link) {
2037 IFA_LOCK_SPIN(&ia->ia_ifa);
2038 mifp = ia->ia_ifp;
2039 IFA_UNLOCK(&ia->ia_ifa);
2040 if (!(mifp->if_flags & IFF_LOOPBACK) &&
2041 (mifp->if_flags & IFF_MULTICAST)) {
2042 ifp = mifp;
2043 break;
2044 }
2045 }
2046 lck_rw_done(in_ifaddr_rwlock);
2047 }
39236c6e 2048 ROUTE_RELEASE(&ro);
6d2010ae
A
2049 }
2050
2051 return (ifp);
2052}
2053
2054/*
2055 * Join an IPv4 multicast group, possibly with a source.
2056 *
2057 * NB: sopt->sopt_val might point to the kernel address space. This means that
2058 * we were called by the IPv6 stack due to the presence of an IPv6 v4 mapped
2059 * address. In this scenario, sopt_p points to kernproc and sooptcopyin() will
2060 * just issue an in-kernel memcpy.
2061 */
2062int
2063inp_join_group(struct inpcb *inp, struct sockopt *sopt)
2064{
2065 struct group_source_req gsr;
2066 sockunion_t *gsa, *ssa;
2067 struct ifnet *ifp;
2068 struct in_mfilter *imf;
2069 struct ip_moptions *imo;
2070 struct in_multi *inm = NULL;
2071 struct in_msource *lims;
2072 size_t idx;
2073 int error, is_new;
39236c6e 2074 struct igmp_tparams itp;
6d2010ae 2075
39236c6e 2076 bzero(&itp, sizeof (itp));
6d2010ae
A
2077 ifp = NULL;
2078 imf = NULL;
2079 error = 0;
2080 is_new = 0;
2081
2082 memset(&gsr, 0, sizeof(struct group_source_req));
2083 gsa = (sockunion_t *)&gsr.gsr_group;
2084 gsa->ss.ss_family = AF_UNSPEC;
2085 ssa = (sockunion_t *)&gsr.gsr_source;
2086 ssa->ss.ss_family = AF_UNSPEC;
2087
2088 switch (sopt->sopt_name) {
2089 case IP_ADD_MEMBERSHIP:
2090 case IP_ADD_SOURCE_MEMBERSHIP: {
2091 struct ip_mreq_source mreqs;
2092
2093 if (sopt->sopt_name == IP_ADD_MEMBERSHIP) {
2094 error = sooptcopyin(sopt, &mreqs,
2095 sizeof(struct ip_mreq),
2096 sizeof(struct ip_mreq));
2097 /*
2098 * Do argument switcharoo from ip_mreq into
2099 * ip_mreq_source to avoid using two instances.
2100 */
2101 mreqs.imr_interface = mreqs.imr_sourceaddr;
2102 mreqs.imr_sourceaddr.s_addr = INADDR_ANY;
2103 } else if (sopt->sopt_name == IP_ADD_SOURCE_MEMBERSHIP) {
2104 error = sooptcopyin(sopt, &mreqs,
2105 sizeof(struct ip_mreq_source),
2106 sizeof(struct ip_mreq_source));
2107 }
2108 if (error) {
2109 IGMP_PRINTF(("%s: error copyin IP_ADD_MEMBERSHIP/"
2110 "IP_ADD_SOURCE_MEMBERSHIP %d err=%d\n",
2111 __func__, sopt->sopt_name, error));
2112 return (error);
2113 }
2114
2115 gsa->sin.sin_family = AF_INET;
2116 gsa->sin.sin_len = sizeof(struct sockaddr_in);
2117 gsa->sin.sin_addr = mreqs.imr_multiaddr;
2118
2119 if (sopt->sopt_name == IP_ADD_SOURCE_MEMBERSHIP) {
2120 ssa->sin.sin_family = AF_INET;
2121 ssa->sin.sin_len = sizeof(struct sockaddr_in);
2122 ssa->sin.sin_addr = mreqs.imr_sourceaddr;
2123 }
2124
2125 if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr)))
2126 return (EINVAL);
2127
2128 ifp = inp_lookup_mcast_ifp(inp, &gsa->sin,
2129 mreqs.imr_interface);
39236c6e
A
2130 IGMP_INET_PRINTF(mreqs.imr_interface,
2131 ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__,
2132 _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp)));
6d2010ae
A
2133 break;
2134 }
2135
2136 case MCAST_JOIN_GROUP:
2137 case MCAST_JOIN_SOURCE_GROUP:
2138 if (sopt->sopt_name == MCAST_JOIN_GROUP) {
2139 error = sooptcopyin(sopt, &gsr,
2140 sizeof(struct group_req),
2141 sizeof(struct group_req));
2142 } else if (sopt->sopt_name == MCAST_JOIN_SOURCE_GROUP) {
2143 error = sooptcopyin(sopt, &gsr,
2144 sizeof(struct group_source_req),
2145 sizeof(struct group_source_req));
2146 }
2147 if (error)
2148 return (error);
2149
2150 if (gsa->sin.sin_family != AF_INET ||
2151 gsa->sin.sin_len != sizeof(struct sockaddr_in))
2152 return (EINVAL);
2153
2154 /*
2155 * Overwrite the port field if present, as the sockaddr
2156 * being copied in may be matched with a binary comparison.
2157 */
2158 gsa->sin.sin_port = 0;
2159 if (sopt->sopt_name == MCAST_JOIN_SOURCE_GROUP) {
2160 if (ssa->sin.sin_family != AF_INET ||
2161 ssa->sin.sin_len != sizeof(struct sockaddr_in))
2162 return (EINVAL);
2163 ssa->sin.sin_port = 0;
2164 }
2165
2166 if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr)))
2167 return (EINVAL);
2168
2169 ifnet_head_lock_shared();
2170 if (gsr.gsr_interface == 0 ||
2171 (u_int)if_index < gsr.gsr_interface) {
2172 ifnet_head_done();
2173 return (EADDRNOTAVAIL);
2174 }
2175 ifp = ifindex2ifnet[gsr.gsr_interface];
2176 ifnet_head_done();
2177
2178 break;
2179
2180 default:
2181 IGMP_PRINTF(("%s: unknown sopt_name %d\n",
2182 __func__, sopt->sopt_name));
2183 return (EOPNOTSUPP);
6d2010ae
A
2184 }
2185
2186 if (ifp == NULL || (ifp->if_flags & IFF_MULTICAST) == 0)
2187 return (EADDRNOTAVAIL);
2188
2189 imo = inp_findmoptions(inp);
2190 if (imo == NULL)
2191 return (ENOMEM);
2192
2193 IMO_LOCK(imo);
2194 idx = imo_match_group(imo, ifp, &gsa->sa);
2195 if (idx == (size_t)-1) {
2196 is_new = 1;
2197 } else {
2198 inm = imo->imo_membership[idx];
2199 imf = &imo->imo_mfilters[idx];
2200 if (ssa->ss.ss_family != AF_UNSPEC) {
2201 /*
2202 * MCAST_JOIN_SOURCE_GROUP on an exclusive membership
2203 * is an error. On an existing inclusive membership,
2204 * it just adds the source to the filter list.
2205 */
2206 if (imf->imf_st[1] != MCAST_INCLUDE) {
2207 error = EINVAL;
2208 goto out_imo_locked;
2209 }
2210 /*
2211 * Throw out duplicates.
2212 *
2213 * XXX FIXME: This makes a naive assumption that
2214 * even if entries exist for *ssa in this imf,
2215 * they will be rejected as dupes, even if they
2216 * are not valid in the current mode (in-mode).
2217 *
2218 * in_msource is transactioned just as for anything
2219 * else in SSM -- but note naive use of inm_graft()
2220 * below for allocating new filter entries.
2221 *
2222 * This is only an issue if someone mixes the
2223 * full-state SSM API with the delta-based API,
2224 * which is discouraged in the relevant RFCs.
2225 */
2226 lims = imo_match_source(imo, idx, &ssa->sa);
2227 if (lims != NULL /*&&
2228 lims->imsl_st[1] == MCAST_INCLUDE*/) {
2229 error = EADDRNOTAVAIL;
2230 goto out_imo_locked;
2231 }
2232 } else {
2233 /*
2234 * MCAST_JOIN_GROUP on an existing exclusive
2235 * membership is an error; return EADDRINUSE
2236 * to preserve 4.4BSD API idempotence, and
2237 * avoid tedious detour to code below.
2238 * NOTE: This is bending RFC 3678 a bit.
2239 *
2240 * On an existing inclusive membership, this is also
2241 * an error; if you want to change filter mode,
2242 * you must use the userland API setsourcefilter().
2243 * XXX We don't reject this for imf in UNDEFINED
2244 * state at t1, because allocation of a filter
2245 * is atomic with allocation of a membership.
2246 */
2247 error = EINVAL;
2248 /* See comments above for EADDRINUSE */
2249 if (imf->imf_st[1] == MCAST_EXCLUDE)
2250 error = EADDRINUSE;
2251 goto out_imo_locked;
2252 }
2253 }
2254
2255 /*
2256 * Begin state merge transaction at socket layer.
2257 */
2258
2259 if (is_new) {
2260 if (imo->imo_num_memberships == imo->imo_max_memberships) {
2261 error = imo_grow(imo, 0);
2262 if (error)
2263 goto out_imo_locked;
2264 }
2265 /*
2266 * Allocate the new slot upfront so we can deal with
2267 * grafting the new source filter in same code path
2268 * as for join-source on existing membership.
2269 */
2270 idx = imo->imo_num_memberships;
2271 imo->imo_membership[idx] = NULL;
2272 imo->imo_num_memberships++;
2273 VERIFY(imo->imo_mfilters != NULL);
2274 imf = &imo->imo_mfilters[idx];
2275 VERIFY(RB_EMPTY(&imf->imf_sources));
2276 }
2277
2278 /*
2279 * Graft new source into filter list for this inpcb's
2280 * membership of the group. The in_multi may not have
2281 * been allocated yet if this is a new membership, however,
2282 * the in_mfilter slot will be allocated and must be initialized.
2283 */
2284 if (ssa->ss.ss_family != AF_UNSPEC) {
2285 /* Membership starts in IN mode */
2286 if (is_new) {
2287 IGMP_PRINTF(("%s: new join w/source\n", __func__));
2288 imf_init(imf, MCAST_UNDEFINED, MCAST_INCLUDE);
2289 } else {
2290 IGMP_PRINTF(("%s: %s source\n", __func__, "allow"));
2291 }
2292 lims = imf_graft(imf, MCAST_INCLUDE, &ssa->sin);
2293 if (lims == NULL) {
2294 IGMP_PRINTF(("%s: merge imf state failed\n",
2295 __func__));
2296 error = ENOMEM;
2297 goto out_imo_free;
2298 }
2299 } else {
2300 /* No address specified; Membership starts in EX mode */
2301 if (is_new) {
2302 IGMP_PRINTF(("%s: new join w/o source\n", __func__));
2303 imf_init(imf, MCAST_UNDEFINED, MCAST_EXCLUDE);
2304 }
2305 }
2306
2307 /*
2308 * Begin state merge transaction at IGMP layer.
2309 */
6d2010ae 2310 if (is_new) {
39037602
A
2311 /*
2312 * Unlock socket as we may end up calling ifnet_ioctl() to join (or leave)
2313 * the multicast group and we run the risk of a lock ordering issue
2314 * if the ifnet thread calls into the socket layer to acquire the pcb list
2315 * lock while the input thread delivers multicast packets
2316 */
2317 IMO_ADDREF_LOCKED(imo);
2318 IMO_UNLOCK(imo);
2319 socket_unlock(inp->inp_socket, 0);
2320
6d2010ae
A
2321 VERIFY(inm == NULL);
2322 error = in_joingroup(ifp, &gsa->sin.sin_addr, imf, &inm);
39037602
A
2323
2324 socket_lock(inp->inp_socket, 0);
2325 IMO_REMREF(imo);
2326 IMO_LOCK(imo);
2327
6d2010ae
A
2328 VERIFY(inm != NULL || error != 0);
2329 if (error)
2330 goto out_imo_free;
2331 imo->imo_membership[idx] = inm; /* from in_joingroup() */
2332 } else {
2333 IGMP_PRINTF(("%s: merge inm state\n", __func__));
2334 INM_LOCK(inm);
2335 error = inm_merge(inm, imf);
2336 if (error) {
2337 IGMP_PRINTF(("%s: failed to merge inm state\n",
2338 __func__));
2339 INM_UNLOCK(inm);
2340 goto out_imf_rollback;
2341 }
2342 IGMP_PRINTF(("%s: doing igmp downcall\n", __func__));
39236c6e 2343 error = igmp_change_state(inm, &itp);
6d2010ae
A
2344 INM_UNLOCK(inm);
2345 if (error) {
2346 IGMP_PRINTF(("%s: failed igmp downcall\n",
2347 __func__));
2348 goto out_imf_rollback;
2349 }
2350 }
2351
2352out_imf_rollback:
2353 if (error) {
2354 imf_rollback(imf);
2355 if (is_new)
2356 imf_purge(imf);
2357 else
2358 imf_reap(imf);
2359 } else {
2360 imf_commit(imf);
2361 }
2362
2363out_imo_free:
2364 if (error && is_new) {
2365 VERIFY(inm == NULL);
2366 imo->imo_membership[idx] = NULL;
2367 --imo->imo_num_memberships;
2368 }
2369
2370out_imo_locked:
2371 IMO_UNLOCK(imo);
2372 IMO_REMREF(imo); /* from inp_findmoptions() */
39236c6e
A
2373
2374 /* schedule timer now that we've dropped the lock(s) */
2375 igmp_set_timeout(&itp);
2376
6d2010ae
A
2377 return (error);
2378}
2379
2380/*
2381 * Leave an IPv4 multicast group on an inpcb, possibly with a source.
2382 *
2383 * NB: sopt->sopt_val might point to the kernel address space. Refer to the
2384 * block comment on top of inp_join_group() for more information.
2385 */
2386int
2387inp_leave_group(struct inpcb *inp, struct sockopt *sopt)
2388{
2389 struct group_source_req gsr;
2390 struct ip_mreq_source mreqs;
2391 sockunion_t *gsa, *ssa;
2392 struct ifnet *ifp;
2393 struct in_mfilter *imf;
2394 struct ip_moptions *imo;
2395 struct in_msource *ims;
2396 struct in_multi *inm = NULL;
2397 size_t idx;
2398 int error, is_final;
2399 unsigned int ifindex = 0;
39236c6e 2400 struct igmp_tparams itp;
6d2010ae 2401
39236c6e 2402 bzero(&itp, sizeof (itp));
6d2010ae
A
2403 ifp = NULL;
2404 error = 0;
2405 is_final = 1;
2406
2407 memset(&gsr, 0, sizeof(struct group_source_req));
2408 gsa = (sockunion_t *)&gsr.gsr_group;
2409 gsa->ss.ss_family = AF_UNSPEC;
2410 ssa = (sockunion_t *)&gsr.gsr_source;
2411 ssa->ss.ss_family = AF_UNSPEC;
2412
2413 switch (sopt->sopt_name) {
2414 case IP_DROP_MEMBERSHIP:
2415 case IP_DROP_SOURCE_MEMBERSHIP:
2416 if (sopt->sopt_name == IP_DROP_MEMBERSHIP) {
2417 error = sooptcopyin(sopt, &mreqs,
2418 sizeof(struct ip_mreq),
2419 sizeof(struct ip_mreq));
2420 /*
2421 * Swap interface and sourceaddr arguments,
2422 * as ip_mreq and ip_mreq_source are laid
2423 * out differently.
2424 */
2425 mreqs.imr_interface = mreqs.imr_sourceaddr;
2426 mreqs.imr_sourceaddr.s_addr = INADDR_ANY;
2427 } else if (sopt->sopt_name == IP_DROP_SOURCE_MEMBERSHIP) {
2428 error = sooptcopyin(sopt, &mreqs,
2429 sizeof(struct ip_mreq_source),
2430 sizeof(struct ip_mreq_source));
2431 }
2432 if (error)
2433 return (error);
2434
2435 gsa->sin.sin_family = AF_INET;
2436 gsa->sin.sin_len = sizeof(struct sockaddr_in);
2437 gsa->sin.sin_addr = mreqs.imr_multiaddr;
2438
2439 if (sopt->sopt_name == IP_DROP_SOURCE_MEMBERSHIP) {
2440 ssa->sin.sin_family = AF_INET;
2441 ssa->sin.sin_len = sizeof(struct sockaddr_in);
2442 ssa->sin.sin_addr = mreqs.imr_sourceaddr;
2443 }
2444 /*
2445 * Attempt to look up hinted ifp from interface address.
2446 * Fallthrough with null ifp iff lookup fails, to
2447 * preserve 4.4BSD mcast API idempotence.
2448 * XXX NOTE WELL: The RFC 3678 API is preferred because
2449 * using an IPv4 address as a key is racy.
2450 */
2451 if (!in_nullhost(mreqs.imr_interface))
2452 ifp = ip_multicast_if(&mreqs.imr_interface, &ifindex);
2453
39236c6e
A
2454 IGMP_INET_PRINTF(mreqs.imr_interface,
2455 ("%s: imr_interface = %s, ifp = 0x%llx\n", __func__,
2456 _igmp_inet_buf, (uint64_t)VM_KERNEL_ADDRPERM(ifp)));
6d2010ae
A
2457
2458 break;
2459
2460 case MCAST_LEAVE_GROUP:
2461 case MCAST_LEAVE_SOURCE_GROUP:
2462 if (sopt->sopt_name == MCAST_LEAVE_GROUP) {
2463 error = sooptcopyin(sopt, &gsr,
2464 sizeof(struct group_req),
2465 sizeof(struct group_req));
2466 } else if (sopt->sopt_name == MCAST_LEAVE_SOURCE_GROUP) {
2467 error = sooptcopyin(sopt, &gsr,
2468 sizeof(struct group_source_req),
2469 sizeof(struct group_source_req));
2470 }
2471 if (error)
2472 return (error);
2473
2474 if (gsa->sin.sin_family != AF_INET ||
2475 gsa->sin.sin_len != sizeof(struct sockaddr_in))
2476 return (EINVAL);
2477
2478 if (sopt->sopt_name == MCAST_LEAVE_SOURCE_GROUP) {
2479 if (ssa->sin.sin_family != AF_INET ||
2480 ssa->sin.sin_len != sizeof(struct sockaddr_in))
2481 return (EINVAL);
2482 }
2483
2484 ifnet_head_lock_shared();
2485 if (gsr.gsr_interface == 0 ||
2486 (u_int)if_index < gsr.gsr_interface) {
2487 ifnet_head_done();
2488 return (EADDRNOTAVAIL);
2489 }
2490
2491 ifp = ifindex2ifnet[gsr.gsr_interface];
2492 ifnet_head_done();
2493 break;
2494
2495 default:
2496 IGMP_PRINTF(("%s: unknown sopt_name %d\n",
2497 __func__, sopt->sopt_name));
2498 return (EOPNOTSUPP);
6d2010ae
A
2499 }
2500
2501 if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr)))
2502 return (EINVAL);
2503
2504 /*
2505 * Find the membership in the membership array.
2506 */
2507 imo = inp_findmoptions(inp);
2508 if (imo == NULL)
2509 return (ENOMEM);
2510
2511 IMO_LOCK(imo);
2512 idx = imo_match_group(imo, ifp, &gsa->sa);
2513 if (idx == (size_t)-1) {
2514 error = EADDRNOTAVAIL;
2515 goto out_locked;
2516 }
2517 inm = imo->imo_membership[idx];
2518 imf = &imo->imo_mfilters[idx];
2519
2520 if (ssa->ss.ss_family != AF_UNSPEC) {
2521 IGMP_PRINTF(("%s: opt=%d is_final=0\n", __func__,
2522 sopt->sopt_name));
2523 is_final = 0;
2524 }
2525
2526 /*
2527 * Begin state merge transaction at socket layer.
2528 */
2529
2530 /*
2531 * If we were instructed only to leave a given source, do so.
2532 * MCAST_LEAVE_SOURCE_GROUP is only valid for inclusive memberships.
2533 */
2534 if (is_final) {
2535 imf_leave(imf);
2536 } else {
2537 if (imf->imf_st[0] == MCAST_EXCLUDE) {
2538 error = EADDRNOTAVAIL;
2539 goto out_locked;
2540 }
2541 ims = imo_match_source(imo, idx, &ssa->sa);
2542 if (ims == NULL) {
39236c6e
A
2543 IGMP_INET_PRINTF(ssa->sin.sin_addr,
2544 ("%s: source %s %spresent\n", __func__,
2545 _igmp_inet_buf, "not "));
6d2010ae
A
2546 error = EADDRNOTAVAIL;
2547 goto out_locked;
2548 }
2549 IGMP_PRINTF(("%s: %s source\n", __func__, "block"));
2550 error = imf_prune(imf, &ssa->sin);
2551 if (error) {
2552 IGMP_PRINTF(("%s: merge imf state failed\n",
2553 __func__));
2554 goto out_locked;
2555 }
2556 }
2557
2558 /*
2559 * Begin state merge transaction at IGMP layer.
2560 */
2561
39037602 2562
6d2010ae
A
2563 if (is_final) {
2564 /*
2565 * Give up the multicast address record to which
2566 * the membership points. Reference held in imo
2567 * will be released below.
2568 */
2569 (void) in_leavegroup(inm, imf);
2570 } else {
2571 IGMP_PRINTF(("%s: merge inm state\n", __func__));
2572 INM_LOCK(inm);
2573 error = inm_merge(inm, imf);
2574 if (error) {
2575 IGMP_PRINTF(("%s: failed to merge inm state\n",
2576 __func__));
2577 INM_UNLOCK(inm);
2578 goto out_imf_rollback;
2579 }
2580
2581 IGMP_PRINTF(("%s: doing igmp downcall\n", __func__));
39236c6e 2582 error = igmp_change_state(inm, &itp);
6d2010ae
A
2583 if (error) {
2584 IGMP_PRINTF(("%s: failed igmp downcall\n", __func__));
2585 }
2586 INM_UNLOCK(inm);
2587 }
2588
2589out_imf_rollback:
2590 if (error)
2591 imf_rollback(imf);
2592 else
2593 imf_commit(imf);
2594
2595 imf_reap(imf);
2596
2597 if (is_final) {
39037602 2598 /* Remove the gap in the membership array. */
6d2010ae
A
2599 VERIFY(inm == imo->imo_membership[idx]);
2600 imo->imo_membership[idx] = NULL;
39037602
A
2601
2602 /*
2603 * See inp_join_group() for why we need to unlock
2604 */
2605 IMO_ADDREF_LOCKED(imo);
2606 IMO_UNLOCK(imo);
2607 socket_unlock(inp->inp_socket, 0);
2608
6d2010ae 2609 INM_REMREF(inm);
39037602
A
2610
2611 socket_lock(inp->inp_socket, 0);
2612 IMO_REMREF(imo);
2613 IMO_LOCK(imo);
2614
6d2010ae
A
2615 for (++idx; idx < imo->imo_num_memberships; ++idx) {
2616 imo->imo_membership[idx-1] = imo->imo_membership[idx];
2617 imo->imo_mfilters[idx-1] = imo->imo_mfilters[idx];
2618 }
2619 imo->imo_num_memberships--;
2620 }
2621
2622out_locked:
2623 IMO_UNLOCK(imo);
2624 IMO_REMREF(imo); /* from inp_findmoptions() */
39236c6e
A
2625
2626 /* schedule timer now that we've dropped the lock(s) */
2627 igmp_set_timeout(&itp);
2628
6d2010ae
A
2629 return (error);
2630}
2631
2632/*
2633 * Select the interface for transmitting IPv4 multicast datagrams.
2634 *
2635 * Either an instance of struct in_addr or an instance of struct ip_mreqn
2636 * may be passed to this socket option. An address of INADDR_ANY or an
2637 * interface index of 0 is used to remove a previous selection.
2638 * When no interface is selected, one is chosen for every send.
2639 */
2640static int
2641inp_set_multicast_if(struct inpcb *inp, struct sockopt *sopt)
2642{
2643 struct in_addr addr;
2644 struct ip_mreqn mreqn;
2645 struct ifnet *ifp;
2646 struct ip_moptions *imo;
2647 int error = 0 ;
2648 unsigned int ifindex = 0;
2649
2650 if (sopt->sopt_valsize == sizeof(struct ip_mreqn)) {
2651 /*
2652 * An interface index was specified using the
2653 * Linux-derived ip_mreqn structure.
2654 */
2655 error = sooptcopyin(sopt, &mreqn, sizeof(struct ip_mreqn),
2656 sizeof(struct ip_mreqn));
2657 if (error)
2658 return (error);
2659
2660 ifnet_head_lock_shared();
2661 if (mreqn.imr_ifindex < 0 || if_index < mreqn.imr_ifindex) {
2662 ifnet_head_done();
2663 return (EINVAL);
2664 }
2665
2666 if (mreqn.imr_ifindex == 0) {
2667 ifp = NULL;
2668 } else {
2669 ifp = ifindex2ifnet[mreqn.imr_ifindex];
2670 if (ifp == NULL) {
2671 ifnet_head_done();
2672 return (EADDRNOTAVAIL);
2673 }
2674 }
2675 ifnet_head_done();
2676 } else {
2677 /*
2678 * An interface was specified by IPv4 address.
2679 * This is the traditional BSD usage.
2680 */
2681 error = sooptcopyin(sopt, &addr, sizeof(struct in_addr),
2682 sizeof(struct in_addr));
2683 if (error)
2684 return (error);
2685 if (in_nullhost(addr)) {
2686 ifp = NULL;
2687 } else {
2688 ifp = ip_multicast_if(&addr, &ifindex);
2689 if (ifp == NULL) {
39236c6e
A
2690 IGMP_INET_PRINTF(addr,
2691 ("%s: can't find ifp for addr=%s\n",
2692 __func__, _igmp_inet_buf));
6d2010ae
A
2693 return (EADDRNOTAVAIL);
2694 }
2695 }
39236c6e 2696 /* XXX remove? */
6d2010ae 2697#ifdef IGMP_DEBUG0
39236c6e
A
2698 IGMP_PRINTF(("%s: ifp = 0x%llx, addr = %s\n", __func__,
2699 (uint64_t)VM_KERNEL_ADDRPERM(ifp), inet_ntoa(addr)));
6d2010ae
A
2700#endif
2701 }
2702
2703 /* Reject interfaces which do not support multicast. */
2704 if (ifp != NULL && (ifp->if_flags & IFF_MULTICAST) == 0)
2705 return (EOPNOTSUPP);
2706
2707 imo = inp_findmoptions(inp);
2708 if (imo == NULL)
2709 return (ENOMEM);
2710
2711 IMO_LOCK(imo);
2712 imo->imo_multicast_ifp = ifp;
2713 if (ifindex)
2714 imo->imo_multicast_addr = addr;
2715 else
2716 imo->imo_multicast_addr.s_addr = INADDR_ANY;
2717 IMO_UNLOCK(imo);
2718 IMO_REMREF(imo); /* from inp_findmoptions() */
2719
2720 return (0);
2721}
2722
2723/*
2724 * Atomically set source filters on a socket for an IPv4 multicast group.
2725 */
2726static int
2727inp_set_source_filters(struct inpcb *inp, struct sockopt *sopt)
2728{
2729 struct __msfilterreq64 msfr, msfr64;
2730 struct __msfilterreq32 msfr32;
2731 sockunion_t *gsa;
2732 struct ifnet *ifp;
2733 struct in_mfilter *imf;
2734 struct ip_moptions *imo;
2735 struct in_multi *inm;
39236c6e 2736 size_t idx;
6d2010ae 2737 int error;
39236c6e
A
2738 user_addr_t tmp_ptr;
2739 struct igmp_tparams itp;
2740
2741 bzero(&itp, sizeof (itp));
6d2010ae
A
2742
2743 if (IS_64BIT_PROCESS(current_proc())) {
2744 error = sooptcopyin(sopt, &msfr64,
2745 sizeof(struct __msfilterreq64),
2746 sizeof(struct __msfilterreq64));
2747 if (error)
2748 return (error);
2749 /* we never use msfr.msfr_srcs; */
3e170ce0 2750 memcpy(&msfr, &msfr64, sizeof(msfr64));
6d2010ae
A
2751 } else {
2752 error = sooptcopyin(sopt, &msfr32,
2753 sizeof(struct __msfilterreq32),
2754 sizeof(struct __msfilterreq32));
2755 if (error)
2756 return (error);
2757 /* we never use msfr.msfr_srcs; */
3e170ce0 2758 memcpy(&msfr, &msfr32, sizeof(msfr32));
6d2010ae
A
2759 }
2760
316670eb 2761 if ((size_t) msfr.msfr_nsrcs >
39236c6e
A
2762 UINT32_MAX / sizeof(struct sockaddr_storage))
2763 msfr.msfr_nsrcs = UINT32_MAX / sizeof(struct sockaddr_storage);
316670eb 2764
6d2010ae
A
2765 if (msfr.msfr_nsrcs > in_mcast_maxsocksrc)
2766 return (ENOBUFS);
2767
2768 if ((msfr.msfr_fmode != MCAST_EXCLUDE &&
2769 msfr.msfr_fmode != MCAST_INCLUDE))
2770 return (EINVAL);
2771
2772 if (msfr.msfr_group.ss_family != AF_INET ||
2773 msfr.msfr_group.ss_len != sizeof(struct sockaddr_in))
2774 return (EINVAL);
2775
2776 gsa = (sockunion_t *)&msfr.msfr_group;
2777 if (!IN_MULTICAST(ntohl(gsa->sin.sin_addr.s_addr)))
2778 return (EINVAL);
2779
2780 gsa->sin.sin_port = 0; /* ignore port */
2781
2782 ifnet_head_lock_shared();
2783 if (msfr.msfr_ifindex == 0 || (u_int)if_index < msfr.msfr_ifindex) {
2784 ifnet_head_done();
2785 return (EADDRNOTAVAIL);
2786 }
2787
2788 ifp = ifindex2ifnet[msfr.msfr_ifindex];
2789 ifnet_head_done();
2790 if (ifp == NULL)
2791 return (EADDRNOTAVAIL);
2792
2793 /*
2794 * Check if this socket is a member of this group.
2795 */
2796 imo = inp_findmoptions(inp);
2797 if (imo == NULL)
2798 return (ENOMEM);
2799
2800 IMO_LOCK(imo);
2801 idx = imo_match_group(imo, ifp, &gsa->sa);
2802 if (idx == (size_t)-1 || imo->imo_mfilters == NULL) {
2803 error = EADDRNOTAVAIL;
2804 goto out_imo_locked;
2805 }
2806 inm = imo->imo_membership[idx];
2807 imf = &imo->imo_mfilters[idx];
2808
2809 /*
2810 * Begin state merge transaction at socket layer.
2811 */
2812
2813 imf->imf_st[1] = msfr.msfr_fmode;
2814
2815 /*
2816 * Apply any new source filters, if present.
2817 * Make a copy of the user-space source vector so
2818 * that we may copy them with a single copyin. This
2819 * allows us to deal with page faults up-front.
2820 */
2821 if (msfr.msfr_nsrcs > 0) {
2822 struct in_msource *lims;
2823 struct sockaddr_in *psin;
2824 struct sockaddr_storage *kss, *pkss;
2825 int i;
2826
2827 if (IS_64BIT_PROCESS(current_proc()))
2828 tmp_ptr = msfr64.msfr_srcs;
2829 else
2830 tmp_ptr = CAST_USER_ADDR_T(msfr32.msfr_srcs);
2831
2832 IGMP_PRINTF(("%s: loading %lu source list entries\n",
2833 __func__, (unsigned long)msfr.msfr_nsrcs));
316670eb 2834 kss = _MALLOC((size_t) msfr.msfr_nsrcs * sizeof(*kss),
6d2010ae
A
2835 M_TEMP, M_WAITOK);
2836 if (kss == NULL) {
2837 error = ENOMEM;
2838 goto out_imo_locked;
2839 }
2840 error = copyin(tmp_ptr, kss,
316670eb 2841 (size_t) msfr.msfr_nsrcs * sizeof(*kss));
6d2010ae
A
2842 if (error) {
2843 FREE(kss, M_TEMP);
2844 goto out_imo_locked;
2845 }
2846
2847 /*
2848 * Mark all source filters as UNDEFINED at t1.
2849 * Restore new group filter mode, as imf_leave()
2850 * will set it to INCLUDE.
2851 */
2852 imf_leave(imf);
2853 imf->imf_st[1] = msfr.msfr_fmode;
2854
2855 /*
2856 * Update socket layer filters at t1, lazy-allocating
2857 * new entries. This saves a bunch of memory at the
2858 * cost of one RB_FIND() per source entry; duplicate
2859 * entries in the msfr_nsrcs vector are ignored.
2860 * If we encounter an error, rollback transaction.
2861 *
2862 * XXX This too could be replaced with a set-symmetric
2863 * difference like loop to avoid walking from root
2864 * every time, as the key space is common.
2865 */
2866 for (i = 0, pkss = kss; (u_int)i < msfr.msfr_nsrcs;
2867 i++, pkss++) {
2868 psin = (struct sockaddr_in *)pkss;
2869 if (psin->sin_family != AF_INET) {
2870 error = EAFNOSUPPORT;
2871 break;
2872 }
2873 if (psin->sin_len != sizeof(struct sockaddr_in)) {
2874 error = EINVAL;
2875 break;
2876 }
2877 error = imf_get_source(imf, psin, &lims);
2878 if (error)
2879 break;
2880 lims->imsl_st[1] = imf->imf_st[1];
2881 }
2882 FREE(kss, M_TEMP);
2883 }
2884
2885 if (error)
2886 goto out_imf_rollback;
2887
2888 /*
2889 * Begin state merge transaction at IGMP layer.
2890 */
2891 INM_LOCK(inm);
2892 IGMP_PRINTF(("%s: merge inm state\n", __func__));
2893 error = inm_merge(inm, imf);
2894 if (error) {
2895 IGMP_PRINTF(("%s: failed to merge inm state\n", __func__));
2896 INM_UNLOCK(inm);
2897 goto out_imf_rollback;
2898 }
2899
2900 IGMP_PRINTF(("%s: doing igmp downcall\n", __func__));
39236c6e 2901 error = igmp_change_state(inm, &itp);
6d2010ae
A
2902 INM_UNLOCK(inm);
2903#ifdef IGMP_DEBUG
2904 if (error)
2905 IGMP_PRINTF(("%s: failed igmp downcall\n", __func__));
2906#endif
2907
2908out_imf_rollback:
2909 if (error)
2910 imf_rollback(imf);
2911 else
2912 imf_commit(imf);
2913
2914 imf_reap(imf);
2915
2916out_imo_locked:
2917 IMO_UNLOCK(imo);
2918 IMO_REMREF(imo); /* from inp_findmoptions() */
2919
39236c6e
A
2920 /* schedule timer now that we've dropped the lock(s) */
2921 igmp_set_timeout(&itp);
2922
6d2010ae
A
2923 return (error);
2924}
2925
2926/*
2927 * Set the IP multicast options in response to user setsockopt().
2928 *
2929 * Many of the socket options handled in this function duplicate the
2930 * functionality of socket options in the regular unicast API. However,
2931 * it is not possible to merge the duplicate code, because the idempotence
2932 * of the IPv4 multicast part of the BSD Sockets API must be preserved;
2933 * the effects of these options must be treated as separate and distinct.
6d2010ae
A
2934 */
2935int
2936inp_setmoptions(struct inpcb *inp, struct sockopt *sopt)
2937{
2938 struct ip_moptions *imo;
2939 int error;
2940 unsigned int ifindex;
2941 struct ifnet *ifp;
2942
2943 error = 0;
2944
2945 /*
2946 * If socket is neither of type SOCK_RAW or SOCK_DGRAM,
2947 * or is a divert socket, reject it.
2948 */
39236c6e
A
2949 if (SOCK_PROTO(inp->inp_socket) == IPPROTO_DIVERT ||
2950 (SOCK_TYPE(inp->inp_socket) != SOCK_RAW &&
2951 SOCK_TYPE(inp->inp_socket) != SOCK_DGRAM))
6d2010ae
A
2952 return (EOPNOTSUPP);
2953
2954 switch (sopt->sopt_name) {
6d2010ae
A
2955 case IP_MULTICAST_IF:
2956 error = inp_set_multicast_if(inp, sopt);
2957 break;
2958
2959 case IP_MULTICAST_IFINDEX:
2960 /*
2961 * Select the interface for outgoing multicast packets.
2962 */
2963 error = sooptcopyin(sopt, &ifindex, sizeof (ifindex),
2964 sizeof (ifindex));
2965 if (error)
2966 break;
2967
2968 imo = inp_findmoptions(inp);
2969 if (imo == NULL) {
2970 error = ENOMEM;
2971 break;
2972 }
2973 /*
2974 * Index 0 is used to remove a previous selection.
2975 * When no interface is selected, a default one is
2976 * chosen every time a multicast packet is sent.
2977 */
2978 if (ifindex == 0) {
2979 IMO_LOCK(imo);
2980 imo->imo_multicast_ifp = NULL;
2981 IMO_UNLOCK(imo);
2982 IMO_REMREF(imo); /* from inp_findmoptions() */
2983 break;
2984 }
2985
2986 ifnet_head_lock_shared();
2987 /* Don't need to check is ifindex is < 0 since it's unsigned */
2988 if ((unsigned int)if_index < ifindex) {
2989 ifnet_head_done();
2990 IMO_REMREF(imo); /* from inp_findmoptions() */
2991 error = ENXIO; /* per IPV6_MULTICAST_IF */
2992 break;
2993 }
2994 ifp = ifindex2ifnet[ifindex];
2995 ifnet_head_done();
2996
2997 /* If it's detached or isn't a multicast interface, bail out */
2998 if (ifp == NULL || !(ifp->if_flags & IFF_MULTICAST)) {
2999 IMO_REMREF(imo); /* from inp_findmoptions() */
3000 error = EADDRNOTAVAIL;
3001 break;
3002 }
3003 IMO_LOCK(imo);
3004 imo->imo_multicast_ifp = ifp;
3005 /*
3006 * Clear out any remnants of past IP_MULTICAST_IF. The addr
3007 * isn't really used anywhere in the kernel; we could have
3008 * iterated thru the addresses of the interface and pick one
3009 * here, but that is redundant since ip_getmoptions() already
3010 * takes care of that for INADDR_ANY.
3011 */
3012 imo->imo_multicast_addr.s_addr = INADDR_ANY;
3013 IMO_UNLOCK(imo);
3014 IMO_REMREF(imo); /* from inp_findmoptions() */
3015 break;
3016
3017 case IP_MULTICAST_TTL: {
3018 u_char ttl;
3019
3020 /*
3021 * Set the IP time-to-live for outgoing multicast packets.
3022 * The original multicast API required a char argument,
3023 * which is inconsistent with the rest of the socket API.
3024 * We allow either a char or an int.
3025 */
3026 if (sopt->sopt_valsize == sizeof(u_char)) {
3027 error = sooptcopyin(sopt, &ttl, sizeof(u_char),
3028 sizeof(u_char));
3029 if (error)
3030 break;
3031 } else {
3032 u_int ittl;
3033
3034 error = sooptcopyin(sopt, &ittl, sizeof(u_int),
3035 sizeof(u_int));
3036 if (error)
3037 break;
3038 if (ittl > 255) {
3039 error = EINVAL;
3040 break;
3041 }
3042 ttl = (u_char)ittl;
3043 }
3044 imo = inp_findmoptions(inp);
3045 if (imo == NULL) {
3046 error = ENOMEM;
3047 break;
3048 }
3049 IMO_LOCK(imo);
3050 imo->imo_multicast_ttl = ttl;
3051 IMO_UNLOCK(imo);
3052 IMO_REMREF(imo); /* from inp_findmoptions() */
3053 break;
3054 }
3055
3056 case IP_MULTICAST_LOOP: {
3057 u_char loop;
3058
3059 /*
3060 * Set the loopback flag for outgoing multicast packets.
3061 * Must be zero or one. The original multicast API required a
3062 * char argument, which is inconsistent with the rest
3063 * of the socket API. We allow either a char or an int.
3064 */
3065 if (sopt->sopt_valsize == sizeof(u_char)) {
3066 error = sooptcopyin(sopt, &loop, sizeof(u_char),
3067 sizeof(u_char));
3068 if (error)
3069 break;
3070 } else {
3071 u_int iloop;
3072
3073 error = sooptcopyin(sopt, &iloop, sizeof(u_int),
3074 sizeof(u_int));
3075 if (error)
3076 break;
3077 loop = (u_char)iloop;
3078 }
3079 imo = inp_findmoptions(inp);
3080 if (imo == NULL) {
3081 error = ENOMEM;
3082 break;
3083 }
3084 IMO_LOCK(imo);
3085 imo->imo_multicast_loop = !!loop;
3086 IMO_UNLOCK(imo);
3087 IMO_REMREF(imo); /* from inp_findmoptions() */
3088 break;
3089 }
3090
3091 case IP_ADD_MEMBERSHIP:
3092 case IP_ADD_SOURCE_MEMBERSHIP:
3093 case MCAST_JOIN_GROUP:
3094 case MCAST_JOIN_SOURCE_GROUP:
3095 error = inp_join_group(inp, sopt);
3096 break;
3097
3098 case IP_DROP_MEMBERSHIP:
3099 case IP_DROP_SOURCE_MEMBERSHIP:
3100 case MCAST_LEAVE_GROUP:
3101 case MCAST_LEAVE_SOURCE_GROUP:
3102 error = inp_leave_group(inp, sopt);
3103 break;
3104
3105 case IP_BLOCK_SOURCE:
3106 case IP_UNBLOCK_SOURCE:
3107 case MCAST_BLOCK_SOURCE:
3108 case MCAST_UNBLOCK_SOURCE:
3109 error = inp_block_unblock_source(inp, sopt);
3110 break;
3111
3112 case IP_MSFILTER:
3113 error = inp_set_source_filters(inp, sopt);
3114 break;
3115
3116 default:
3117 error = EOPNOTSUPP;
3118 break;
3119 }
3120
3121 return (error);
3122}
3123
3124/*
3125 * Expose IGMP's multicast filter mode and source list(s) to userland,
3126 * keyed by (ifindex, group).
3127 * The filter mode is written out as a uint32_t, followed by
3128 * 0..n of struct in_addr.
3129 * For use by ifmcstat(8).
3130 */
3131static int
3132sysctl_ip_mcast_filters SYSCTL_HANDLER_ARGS
3133{
3134#pragma unused(oidp)
3135
3136 struct in_addr src, group;
3137 struct ifnet *ifp;
3138 struct in_multi *inm;
3139 struct in_multistep step;
3140 struct ip_msource *ims;
3141 int *name;
3142 int retval = 0;
3143 u_int namelen;
3144 uint32_t fmode, ifindex;
3145
3146 name = (int *)arg1;
3147 namelen = (u_int)arg2;
3148
3149 if (req->newptr != USER_ADDR_NULL)
3150 return (EPERM);
3151
3152 if (namelen != 2)
3153 return (EINVAL);
3154
3155 ifindex = name[0];
3156 ifnet_head_lock_shared();
3157 if (ifindex <= 0 || ifindex > (u_int)if_index) {
3158 IGMP_PRINTF(("%s: ifindex %u out of range\n",
3159 __func__, ifindex));
3160 ifnet_head_done();
3161 return (ENOENT);
3162 }
3163
3164 group.s_addr = name[1];
3165 if (!IN_MULTICAST(ntohl(group.s_addr))) {
39236c6e
A
3166 IGMP_INET_PRINTF(group,
3167 ("%s: group %s is not multicast\n",
3168 __func__, _igmp_inet_buf));
6d2010ae
A
3169 ifnet_head_done();
3170 return (EINVAL);
3171 }
3172
3173 ifp = ifindex2ifnet[ifindex];
3174 ifnet_head_done();
3175 if (ifp == NULL) {
3176 IGMP_PRINTF(("%s: no ifp for ifindex %u\n", __func__, ifindex));
3177 return (ENOENT);
3178 }
3179
3180 in_multihead_lock_shared();
3181 IN_FIRST_MULTI(step, inm);
3182 while (inm != NULL) {
3183 INM_LOCK(inm);
3184 if (inm->inm_ifp != ifp)
3185 goto next;
3186
3187 if (!in_hosteq(inm->inm_addr, group))
3188 goto next;
3189
3190 fmode = inm->inm_st[1].iss_fmode;
3191 retval = SYSCTL_OUT(req, &fmode, sizeof(uint32_t));
3192 if (retval != 0) {
3193 INM_UNLOCK(inm);
3194 break; /* abort */
3195 }
3196 RB_FOREACH(ims, ip_msource_tree, &inm->inm_srcs) {
3197#ifdef IGMP_DEBUG
3198 struct in_addr ina;
3199 ina.s_addr = htonl(ims->ims_haddr);
39236c6e
A
3200 IGMP_INET_PRINTF(ina,
3201 ("%s: visit node %s\n", __func__, _igmp_inet_buf));
6d2010ae
A
3202#endif
3203 /*
3204 * Only copy-out sources which are in-mode.
3205 */
3206 if (fmode != ims_get_mode(inm, ims, 1)) {
3207 IGMP_PRINTF(("%s: skip non-in-mode\n",
3208 __func__));
3209 continue; /* process next source */
3210 }
3211 src.s_addr = htonl(ims->ims_haddr);
3212 retval = SYSCTL_OUT(req, &src, sizeof(struct in_addr));
3213 if (retval != 0)
3214 break; /* process next inm */
3215 }
3216next:
3217 INM_UNLOCK(inm);
3218 IN_NEXT_MULTI(step, inm);
3219 }
3220 in_multihead_lock_done();
3221
3222 return (retval);
3223}
3224
3225/*
3226 * XXX
3227 * The whole multicast option thing needs to be re-thought.
3228 * Several of these options are equally applicable to non-multicast
3229 * transmission, and one (IP_MULTICAST_TTL) totally duplicates a
3230 * standard option (IP_TTL).
3231 */
3232/*
3233 * following RFC1724 section 3.3, 0.0.0.0/8 is interpreted as interface index.
3234 */
3235static struct ifnet *
3236ip_multicast_if(struct in_addr *a, unsigned int *ifindexp)
3237{
3238 unsigned int ifindex;
3239 struct ifnet *ifp;
3240
3241 if (ifindexp != NULL)
3242 *ifindexp = 0;
3243 if (ntohl(a->s_addr) >> 24 == 0) {
3244 ifindex = ntohl(a->s_addr) & 0xffffff;
3245 ifnet_head_lock_shared();
3246 /* Don't need to check is ifindex is < 0 since it's unsigned */
3247 if ((unsigned int)if_index < ifindex) {
3248 ifnet_head_done();
3249 return (NULL);
3250 }
3251 ifp = ifindex2ifnet[ifindex];
3252 ifnet_head_done();
3253 if (ifp != NULL && ifindexp != NULL)
3254 *ifindexp = ifindex;
3255 } else {
3256 INADDR_TO_IFP(*a, ifp);
3257 }
3258 return (ifp);
3259}
3260
3261void
3262in_multi_init(void)
3263{
3264 PE_parse_boot_argn("ifa_debug", &inm_debug, sizeof (inm_debug));
3265
3266 /* Setup lock group and attribute for in_multihead */
3267 in_multihead_lock_grp_attr = lck_grp_attr_alloc_init();
3268 in_multihead_lock_grp = lck_grp_alloc_init("in_multihead",
3269 in_multihead_lock_grp_attr);
3270 in_multihead_lock_attr = lck_attr_alloc_init();
3271 lck_rw_init(&in_multihead_lock, in_multihead_lock_grp,
3272 in_multihead_lock_attr);
3273
3274 lck_mtx_init(&inm_trash_lock, in_multihead_lock_grp,
3275 in_multihead_lock_attr);
3276 TAILQ_INIT(&inm_trash_head);
3277
3278 inm_size = (inm_debug == 0) ? sizeof (struct in_multi) :
3279 sizeof (struct in_multi_dbg);
3280 inm_zone = zinit(inm_size, INM_ZONE_MAX * inm_size,
3281 0, INM_ZONE_NAME);
3282 if (inm_zone == NULL) {
3283 panic("%s: failed allocating %s", __func__, INM_ZONE_NAME);
3284 /* NOTREACHED */
3285 }
3286 zone_change(inm_zone, Z_EXPAND, TRUE);
3287
3288 ipms_size = sizeof (struct ip_msource);
3289 ipms_zone = zinit(ipms_size, IPMS_ZONE_MAX * ipms_size,
3290 0, IPMS_ZONE_NAME);
3291 if (ipms_zone == NULL) {
3292 panic("%s: failed allocating %s", __func__, IPMS_ZONE_NAME);
3293 /* NOTREACHED */
3294 }
3295 zone_change(ipms_zone, Z_EXPAND, TRUE);
3296
3297 inms_size = sizeof (struct in_msource);
3298 inms_zone = zinit(inms_size, INMS_ZONE_MAX * inms_size,
3299 0, INMS_ZONE_NAME);
3300 if (inms_zone == NULL) {
3301 panic("%s: failed allocating %s", __func__, INMS_ZONE_NAME);
3302 /* NOTREACHED */
3303 }
3304 zone_change(inms_zone, Z_EXPAND, TRUE);
3305}
3306
3307static struct in_multi *
3308in_multi_alloc(int how)
3309{
3310 struct in_multi *inm;
3311
3312 inm = (how == M_WAITOK) ? zalloc(inm_zone) : zalloc_noblock(inm_zone);
3313 if (inm != NULL) {
3314 bzero(inm, inm_size);
3315 lck_mtx_init(&inm->inm_lock, in_multihead_lock_grp,
3316 in_multihead_lock_attr);
3317 inm->inm_debug |= IFD_ALLOC;
3318 if (inm_debug != 0) {
3319 inm->inm_debug |= IFD_DEBUG;
3320 inm->inm_trace = inm_trace;
3321 }
3322 }
3323 return (inm);
3324}
3325
3326static void
3327in_multi_free(struct in_multi *inm)
3328{
3329 INM_LOCK(inm);
3330 if (inm->inm_debug & IFD_ATTACHED) {
3331 panic("%s: attached inm=%p is being freed", __func__, inm);
3332 /* NOTREACHED */
3333 } else if (inm->inm_ifma != NULL) {
3334 panic("%s: ifma not NULL for inm=%p", __func__, inm);
3335 /* NOTREACHED */
3336 } else if (!(inm->inm_debug & IFD_ALLOC)) {
3337 panic("%s: inm %p cannot be freed", __func__, inm);
3338 /* NOTREACHED */
3339 } else if (inm->inm_refcount != 0) {
3340 panic("%s: non-zero refcount inm=%p", __func__, inm);
3341 /* NOTREACHED */
3342 } else if (inm->inm_reqcnt != 0) {
3343 panic("%s: non-zero reqcnt inm=%p", __func__, inm);
3344 /* NOTREACHED */
3345 }
3346
3347 /* Free any pending IGMPv3 state-change records */
3348 IF_DRAIN(&inm->inm_scq);
3349
3350 inm->inm_debug &= ~IFD_ALLOC;
3351 if ((inm->inm_debug & (IFD_DEBUG | IFD_TRASHED)) ==
3352 (IFD_DEBUG | IFD_TRASHED)) {
3353 lck_mtx_lock(&inm_trash_lock);
3354 TAILQ_REMOVE(&inm_trash_head, (struct in_multi_dbg *)inm,
3355 inm_trash_link);
3356 lck_mtx_unlock(&inm_trash_lock);
3357 inm->inm_debug &= ~IFD_TRASHED;
3358 }
3359 INM_UNLOCK(inm);
3360
3361 lck_mtx_destroy(&inm->inm_lock, in_multihead_lock_grp);
3362 zfree(inm_zone, inm);
3363}
3364
3365static void
3366in_multi_attach(struct in_multi *inm)
3367{
3368 in_multihead_lock_assert(LCK_RW_ASSERT_EXCLUSIVE);
3369 INM_LOCK_ASSERT_HELD(inm);
3370
3371 if (inm->inm_debug & IFD_ATTACHED) {
3372 panic("%s: Attempt to attach an already attached inm=%p",
3373 __func__, inm);
3374 /* NOTREACHED */
3375 } else if (inm->inm_debug & IFD_TRASHED) {
3376 panic("%s: Attempt to reattach a detached inm=%p",
3377 __func__, inm);
3378 /* NOTREACHED */
3379 }
3380
3381 inm->inm_reqcnt++;
3382 VERIFY(inm->inm_reqcnt == 1);
3383 INM_ADDREF_LOCKED(inm);
3384 inm->inm_debug |= IFD_ATTACHED;
3385 /*
3386 * Reattach case: If debugging is enabled, take it
3387 * out of the trash list and clear IFD_TRASHED.
3388 */
3389 if ((inm->inm_debug & (IFD_DEBUG | IFD_TRASHED)) ==
3390 (IFD_DEBUG | IFD_TRASHED)) {
3391 /* Become a regular mutex, just in case */
3392 INM_CONVERT_LOCK(inm);
3393 lck_mtx_lock(&inm_trash_lock);
3394 TAILQ_REMOVE(&inm_trash_head, (struct in_multi_dbg *)inm,
3395 inm_trash_link);
3396 lck_mtx_unlock(&inm_trash_lock);
3397 inm->inm_debug &= ~IFD_TRASHED;
3398 }
3399
3400 LIST_INSERT_HEAD(&in_multihead, inm, inm_link);
3401}
3402
3403int
3404in_multi_detach(struct in_multi *inm)
3405{
3406 in_multihead_lock_assert(LCK_RW_ASSERT_EXCLUSIVE);
3407 INM_LOCK_ASSERT_HELD(inm);
3408
3409 if (inm->inm_reqcnt == 0) {
3410 panic("%s: inm=%p negative reqcnt", __func__, inm);
3411 /* NOTREACHED */
3412 }
3413
3414 --inm->inm_reqcnt;
3415 if (inm->inm_reqcnt > 0)
3416 return (0);
3417
3418 if (!(inm->inm_debug & IFD_ATTACHED)) {
3419 panic("%s: Attempt to detach an unattached record inm=%p",
3420 __func__, inm);
3421 /* NOTREACHED */
3422 } else if (inm->inm_debug & IFD_TRASHED) {
3423 panic("%s: inm %p is already in trash list", __func__, inm);
3424 /* NOTREACHED */
3425 }
3426
3427 /*
3428 * NOTE: Caller calls IFMA_REMREF
3429 */
3430 inm->inm_debug &= ~IFD_ATTACHED;
3431 LIST_REMOVE(inm, inm_link);
3432
3433 if (inm->inm_debug & IFD_DEBUG) {
3434 /* Become a regular mutex, just in case */
3435 INM_CONVERT_LOCK(inm);
3436 lck_mtx_lock(&inm_trash_lock);
3437 TAILQ_INSERT_TAIL(&inm_trash_head,
3438 (struct in_multi_dbg *)inm, inm_trash_link);
3439 lck_mtx_unlock(&inm_trash_lock);
3440 inm->inm_debug |= IFD_TRASHED;
3441 }
3442
3443 return (1);
3444}
3445
3446void
3447inm_addref(struct in_multi *inm, int locked)
3448{
3449 if (!locked)
3450 INM_LOCK_SPIN(inm);
3451 else
3452 INM_LOCK_ASSERT_HELD(inm);
3453
3454 if (++inm->inm_refcount == 0) {
3455 panic("%s: inm=%p wraparound refcnt", __func__, inm);
3456 /* NOTREACHED */
3457 } else if (inm->inm_trace != NULL) {
3458 (*inm->inm_trace)(inm, TRUE);
3459 }
3460 if (!locked)
3461 INM_UNLOCK(inm);
3462}
3463
3464void
3465inm_remref(struct in_multi *inm, int locked)
3466{
3467 struct ifmultiaddr *ifma;
3468 struct igmp_ifinfo *igi;
3469
3470 if (!locked)
3471 INM_LOCK_SPIN(inm);
3472 else
3473 INM_LOCK_ASSERT_HELD(inm);
3474
3475 if (inm->inm_refcount == 0 || (inm->inm_refcount == 1 && locked)) {
3476 panic("%s: inm=%p negative/missing refcnt", __func__, inm);
3477 /* NOTREACHED */
3478 } else if (inm->inm_trace != NULL) {
3479 (*inm->inm_trace)(inm, FALSE);
3480 }
3481
3482 --inm->inm_refcount;
3483 if (inm->inm_refcount > 0) {
3484 if (!locked)
3485 INM_UNLOCK(inm);
3486 return;
3487 }
3488
3489 /*
3490 * Synchronization with in_getmulti(). In the event the inm has been
3491 * detached, the underlying ifma would still be in the if_multiaddrs
3492 * list, and thus can be looked up via if_addmulti(). At that point,
3493 * the only way to find this inm is via ifma_protospec. To avoid
3494 * race conditions between the last inm_remref() of that inm and its
3495 * use via ifma_protospec, in_multihead lock is used for serialization.
3496 * In order to avoid violating the lock order, we must drop inm_lock
3497 * before acquiring in_multihead lock. To prevent the inm from being
3498 * freed prematurely, we hold an extra reference.
3499 */
3500 ++inm->inm_refcount;
3501 INM_UNLOCK(inm);
3502 in_multihead_lock_shared();
3503 INM_LOCK_SPIN(inm);
3504 --inm->inm_refcount;
3505 if (inm->inm_refcount > 0) {
3506 /* We've lost the race, so abort since inm is still in use */
3507 INM_UNLOCK(inm);
3508 in_multihead_lock_done();
3509 /* If it was locked, return it as such */
3510 if (locked)
3511 INM_LOCK(inm);
3512 return;
3513 }
3514 inm_purge(inm);
3515 ifma = inm->inm_ifma;
3516 inm->inm_ifma = NULL;
3517 inm->inm_ifp = NULL;
3518 igi = inm->inm_igi;
3519 inm->inm_igi = NULL;
3520 INM_UNLOCK(inm);
3521 IFMA_LOCK_SPIN(ifma);
3522 ifma->ifma_protospec = NULL;
3523 IFMA_UNLOCK(ifma);
3524 in_multihead_lock_done();
3525
3526 in_multi_free(inm);
3527 if_delmulti_ifma(ifma);
3528 /* Release reference held to the underlying ifmultiaddr */
3529 IFMA_REMREF(ifma);
3530
3531 if (igi != NULL)
3532 IGI_REMREF(igi);
3533}
3534
3535static void
3536inm_trace(struct in_multi *inm, int refhold)
3537{
3538 struct in_multi_dbg *inm_dbg = (struct in_multi_dbg *)inm;
3539 ctrace_t *tr;
3540 u_int32_t idx;
3541 u_int16_t *cnt;
3542
3543 if (!(inm->inm_debug & IFD_DEBUG)) {
3544 panic("%s: inm %p has no debug structure", __func__, inm);
3545 /* NOTREACHED */
3546 }
3547 if (refhold) {
3548 cnt = &inm_dbg->inm_refhold_cnt;
3549 tr = inm_dbg->inm_refhold;
3550 } else {
3551 cnt = &inm_dbg->inm_refrele_cnt;
3552 tr = inm_dbg->inm_refrele;
3553 }
3554
3555 idx = atomic_add_16_ov(cnt, 1) % INM_TRACE_HIST_SIZE;
3556 ctrace_record(&tr[idx]);
3557}
3558
3559void
3560in_multihead_lock_exclusive(void)
3561{
3562 lck_rw_lock_exclusive(&in_multihead_lock);
3563}
3564
3565void
3566in_multihead_lock_shared(void)
3567{
3568 lck_rw_lock_shared(&in_multihead_lock);
3569}
3570
3571void
3572in_multihead_lock_assert(int what)
3573{
3574 lck_rw_assert(&in_multihead_lock, what);
3575}
3576
3577void
3578in_multihead_lock_done(void)
3579{
3580 lck_rw_done(&in_multihead_lock);
3581}
3582
3583static struct ip_msource *
3584ipms_alloc(int how)
3585{
3586 struct ip_msource *ims;
3587
3588 ims = (how == M_WAITOK) ? zalloc(ipms_zone) : zalloc_noblock(ipms_zone);
3589 if (ims != NULL)
3590 bzero(ims, ipms_size);
3591
3592 return (ims);
3593}
3594
3595static void
3596ipms_free(struct ip_msource *ims)
3597{
3598 zfree(ipms_zone, ims);
3599}
3600
3601static struct in_msource *
3602inms_alloc(int how)
3603{
3604 struct in_msource *inms;
3605
3606 inms = (how == M_WAITOK) ? zalloc(inms_zone) :
3607 zalloc_noblock(inms_zone);
3608 if (inms != NULL)
3609 bzero(inms, inms_size);
3610
3611 return (inms);
3612}
3613
3614static void
3615inms_free(struct in_msource *inms)
3616{
3617 zfree(inms_zone, inms);
3618}
3619
3620#ifdef IGMP_DEBUG
3621
3622static const char *inm_modestrs[] = { "un\n", "in", "ex" };
3623
3624static const char *
3625inm_mode_str(const int mode)
3626{
3627 if (mode >= MCAST_UNDEFINED && mode <= MCAST_EXCLUDE)
3628 return (inm_modestrs[mode]);
3629 return ("??");
3630}
3631
3632static const char *inm_statestrs[] = {
3633 "not-member\n",
3634 "silent\n",
39236c6e 3635 "reporting\n",
6d2010ae
A
3636 "idle\n",
3637 "lazy\n",
3638 "sleeping\n",
3639 "awakening\n",
3640 "query-pending\n",
3641 "sg-query-pending\n",
3642 "leaving"
3643};
3644
3645static const char *
3646inm_state_str(const int state)
3647{
3648 if (state >= IGMP_NOT_MEMBER && state <= IGMP_LEAVING_MEMBER)
3649 return (inm_statestrs[state]);
3650 return ("??");
3651}
3652
3653/*
3654 * Dump an in_multi structure to the console.
3655 */
3656void
3657inm_print(const struct in_multi *inm)
3658{
3659 int t;
39236c6e 3660 char buf[MAX_IPv4_STR_LEN];
6d2010ae 3661
39236c6e 3662 INM_LOCK_ASSERT_HELD(__DECONST(struct in_multi *, inm));
6d2010ae
A
3663
3664 if (igmp_debug == 0)
3665 return;
3666
39236c6e
A
3667 inet_ntop(AF_INET, &inm->inm_addr, buf, sizeof(buf));
3668 printf("%s: --- begin inm 0x%llx ---\n", __func__,
3669 (uint64_t)VM_KERNEL_ADDRPERM(inm));
3670 printf("addr %s ifp 0x%llx(%s) ifma 0x%llx\n",
3671 buf,
3672 (uint64_t)VM_KERNEL_ADDRPERM(inm->inm_ifp),
3673 if_name(inm->inm_ifp),
3674 (uint64_t)VM_KERNEL_ADDRPERM(inm->inm_ifma));
6d2010ae
A
3675 printf("timer %u state %s refcount %u scq.len %u\n",
3676 inm->inm_timer,
3677 inm_state_str(inm->inm_state),
3678 inm->inm_refcount,
3679 inm->inm_scq.ifq_len);
39236c6e
A
3680 printf("igi 0x%llx nsrc %lu sctimer %u scrv %u\n",
3681 (uint64_t)VM_KERNEL_ADDRPERM(inm->inm_igi),
6d2010ae
A
3682 inm->inm_nsrc,
3683 inm->inm_sctimer,
3684 inm->inm_scrv);
3685 for (t = 0; t < 2; t++) {
3686 printf("t%d: fmode %s asm %u ex %u in %u rec %u\n", t,
3687 inm_mode_str(inm->inm_st[t].iss_fmode),
3688 inm->inm_st[t].iss_asm,
3689 inm->inm_st[t].iss_ex,
3690 inm->inm_st[t].iss_in,
3691 inm->inm_st[t].iss_rec);
3692 }
39236c6e
A
3693 printf("%s: --- end inm 0x%llx ---\n", __func__,
3694 (uint64_t)VM_KERNEL_ADDRPERM(inm));
6d2010ae
A
3695}
3696
3697#else
3698
3699void
3700inm_print(__unused const struct in_multi *inm)
3701{
3702
3703}
3704
3705#endif