2 * Copyright (c) 2003-2012 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
28 /* $FreeBSD: src/sys/netinet6/ip6_mroute.c,v 1.16.2.1 2002/12/18 21:39:40 suz Exp $ */
29 /* $KAME: ip6_mroute.c,v 1.58 2001/12/18 02:36:31 itojun Exp $ */
32 * Copyright (C) 1998 WIDE Project.
33 * All rights reserved.
35 * Redistribution and use in source and binary forms, with or without
36 * modification, are permitted provided that the following conditions
38 * 1. Redistributions of source code must retain the above copyright
39 * notice, this list of conditions and the following disclaimer.
40 * 2. Redistributions in binary form must reproduce the above copyright
41 * notice, this list of conditions and the following disclaimer in the
42 * documentation and/or other materials provided with the distribution.
43 * 3. Neither the name of the project nor the names of its contributors
44 * may be used to endorse or promote products derived from this software
45 * without specific prior written permission.
47 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
48 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
49 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
50 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
51 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
52 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
53 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
54 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
55 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
56 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
60 * NOTICE: This file was modified by SPARTA, Inc. in 2005 to introduce
61 * support for mandatory and extensible security protections. This notice
62 * is included in support of clause 2.2 (b) of the Apple Public License,
66 /* BSDI ip_mroute.c,v 2.10 1996/11/14 00:29:52 jch Exp */
69 * IP multicast forwarding procedures
71 * Written by David Waitzman, BBN Labs, August 1988.
72 * Modified by Steve Deering, Stanford, February 1989.
73 * Modified by Mark J. Steiglitz, Stanford, May, 1991
74 * Modified by Van Jacobson, LBL, January 1993
75 * Modified by Ajit Thyagarajan, PARC, August 1993
76 * Modified by Bill Fenenr, PARC, April 1994
78 * MROUTING Revision: 3.5.1.2 + PIM-SMv2 (pimd) Support
82 #include <sys/param.h>
83 #include <sys/systm.h>
84 #include <sys/malloc.h>
86 #include <sys/socket.h>
87 #include <sys/socketvar.h>
88 #include <sys/sockio.h>
89 #include <sys/protosw.h>
90 #include <sys/errno.h>
92 #include <sys/kernel.h>
93 #include <sys/syslog.h>
94 #include <kern/locks.h>
97 #include <net/route.h>
98 #include <net/raw_cb.h>
100 #include <net/net_osdep.h>
102 #include <netinet/in.h>
103 #include <netinet/in_var.h>
105 #include <netinet/ip6.h>
106 #include <netinet6/ip6_var.h>
107 #include <netinet6/scope6_var.h>
108 #include <netinet6/ip6_mroute.h>
109 #include <netinet/icmp6.h>
110 #include <netinet6/pim6.h>
111 #include <netinet6/pim6_var.h>
114 #include <security/mac.h>
118 static MALLOC_DEFINE(M_MRTABLE
, "mf6c", "multicast forwarding cache entry");
121 #define M_HASCL(m) ((m)->m_flags & M_EXT)
123 static int ip6_mdq(struct mbuf
*, struct ifnet
*, struct mf6c
*);
124 static void phyint_send(struct ip6_hdr
*, struct mif6
*, struct mbuf
*);
126 static int set_pim6(int *);
127 static int socket_send(struct socket
*, struct mbuf
*,
128 struct sockaddr_in6
*);
129 static int register_send(struct ip6_hdr
*, struct mif6
*,
133 * Globals. All but ip6_mrouter, ip6_mrtproto and mrt6stat could be static,
134 * except for netstat or debugging purposes.
136 struct socket
*ip6_mrouter
= NULL
;
137 int ip6_mrouter_ver
= 0;
138 int ip6_mrtproto
= IPPROTO_PIM
; /* for netstat only */
142 struct mrt6stat mrt6stat
;
144 #define NO_RTE_FOUND 0x1
145 #define RTE_FOUND 0x2
147 struct mf6c
*mf6ctable
[MF6CTBLSIZ
];
148 u_char n6expire
[MF6CTBLSIZ
];
149 static struct mif6 mif6table
[MAXMIFS
];
151 u_int mrt6debug
= 0; /* debug level */
152 #define DEBUG_MFC 0x02
153 #define DEBUG_FORWARD 0x04
154 #define DEBUG_EXPIRE 0x08
155 #define DEBUG_XMIT 0x10
156 #define DEBUG_REG 0x20
157 #define DEBUG_PIM 0x40
160 static void expire_upcalls(void *);
162 #define EXPIRE_TIMEOUT (hz / 4) /* 4x / second */
163 #define UPCALL_EXPIRE 6 /* number of timeouts */
167 extern struct socket
*ip_mrouter
;
172 * 'Interfaces' associated with decapsulator (so we can tell
173 * packets that went through it from ones that get reflected
174 * by a broken gateway). These interfaces are never linked into
175 * the system ifnet list & no routes point to them. I.e., packets
176 * can't be sent this way. They only exist as a placeholder for
177 * multicast source verification.
179 struct ifnet multicast_register_if
;
181 #define ENCAP_HOPS 64
186 static mifi_t nummifs
= 0;
187 static mifi_t reg_mif_num
= (mifi_t
)-1;
189 static struct pim6stat pim6stat
;
193 * Hash function for a source, group entry
195 #define MF6CHASH(a, g) MF6CHASHMOD((a).s6_addr32[0] ^ (a).s6_addr32[1] ^ \
196 (a).s6_addr32[2] ^ (a).s6_addr32[3] ^ \
197 (g).s6_addr32[0] ^ (g).s6_addr32[1] ^ \
198 (g).s6_addr32[2] ^ (g).s6_addr32[3])
201 * Find a route for a given origin IPv6 address and Multicast group address.
202 * Quality of service parameter to be added in the future!!!
205 #define MF6CFIND(o, g, rt) do { \
206 struct mf6c *_rt = mf6ctable[MF6CHASH(o,g)]; \
208 mrt6stat.mrt6s_mfc_lookups++; \
210 if (IN6_ARE_ADDR_EQUAL(&_rt->mf6c_origin.sin6_addr, &(o)) && \
211 IN6_ARE_ADDR_EQUAL(&_rt->mf6c_mcastgrp.sin6_addr, &(g)) && \
212 (_rt->mf6c_stall == NULL)) { \
216 _rt = _rt->mf6c_next; \
219 mrt6stat.mrt6s_mfc_misses++; \
224 * Macros to compute elapsed time efficiently
225 * Borrowed from Van Jacobson's scheduling code
227 #define TV_DELTA(a, b, delta) do { \
230 delta = (a).tv_usec - (b).tv_usec; \
231 if ((xxs = (a).tv_sec - (b).tv_sec)) { \
240 delta += (1000000 * xxs); \
245 #define TV_LT(a, b) (((a).tv_usec < (b).tv_usec && \
246 (a).tv_sec <= (b).tv_sec) || (a).tv_sec < (b).tv_sec)
249 #define UPCALL_MAX 50
250 u_int32_t upcall_data
[UPCALL_MAX
+ 1];
251 static void collate();
252 #endif /* UPCALL_TIMING */
254 static int get_sg_cnt(struct sioc_sg_req6
*);
255 static int get_mif6_cnt(void *, int);
256 static int ip6_mrouter_init(struct socket
*, int, int);
257 static int add_m6if(struct mif6ctl
*);
258 static int del_m6if(mifi_t
*);
259 static int add_m6fc(struct mf6cctl
*);
260 static int del_m6fc(struct mf6cctl
*);
263 * Handle MRT setsockopt commands to modify the multicast routing tables.
266 ip6_mrouter_set(so
, sopt
)
268 struct sockopt
*sopt
;
276 if (so
!= ip6_mrouter
&& sopt
->sopt_name
!= MRT6_INIT
)
279 switch (sopt
->sopt_name
) {
284 error
= sooptcopyin(sopt
, &optval
, sizeof(optval
),
288 error
= ip6_mrouter_init(so
, optval
, sopt
->sopt_name
);
291 error
= ip6_mrouter_done();
294 error
= sooptcopyin(sopt
, &mifc
, sizeof(mifc
), sizeof(mifc
));
297 error
= add_m6if(&mifc
);
300 error
= sooptcopyin(sopt
, &mfcc
, sizeof(mfcc
), sizeof(mfcc
));
303 error
= add_m6fc(&mfcc
);
306 error
= sooptcopyin(sopt
, &mfcc
, sizeof(mfcc
), sizeof(mfcc
));
309 error
= del_m6fc(&mfcc
);
312 error
= sooptcopyin(sopt
, &mifi
, sizeof(mifi
), sizeof(mifi
));
315 error
= del_m6if(&mifi
);
318 error
= sooptcopyin(sopt
, &optval
, sizeof(optval
),
322 error
= set_pim6(&optval
);
333 * Handle MRT getsockopt commands
336 ip6_mrouter_get(so
, sopt
)
338 struct sockopt
*sopt
;
342 if (so
!= ip6_mrouter
) return EACCES
;
344 switch (sopt
->sopt_name
) {
346 error
= sooptcopyout(sopt
, &pim6
, sizeof(pim6
));
353 * Handle ioctl commands to obtain information from the cache
356 mrt6_ioctl(u_long cmd
, caddr_t data
)
361 case SIOCGETSGCNT_IN6
: { /* struct sioc_sg_req6 */
362 struct sioc_sg_req6 req
;
364 bcopy(data
, &req
, sizeof (req
));
365 error
= get_sg_cnt(®
);
366 bcopy(&req
, data
, sizeof (req
));
370 case SIOCGETMIFCNT_IN6_32
: /* struct sioc_mif_req6_32 */
371 case SIOCGETMIFCNT_IN6_64
: /* struct sioc_mif_req6_64 */
372 return (get_mif6_cnt(data
, cmd
== SIOCGETMIFCNT_IN6_64
));
383 * returns the packet, byte, rpf-failure count for the source group provided
387 struct sioc_sg_req6
*req
;
391 MF6CFIND(req
->src
.sin6_addr
, req
->grp
.sin6_addr
, rt
);
393 req
->pktcnt
= rt
->mf6c_pkt_cnt
;
394 req
->bytecnt
= rt
->mf6c_byte_cnt
;
395 req
->wrong_if
= rt
->mf6c_wrong_if
;
399 req
->pktcnt
= req
->bytecnt
= req
->wrong_if
= 0xffffffff;
406 * returns the input and output packet and byte counts on the mif provided
409 get_mif6_cnt(void *data
, int p64
)
412 struct sioc_mif_req6_64
*req
= data
;
415 bcopy(&req
->mifi
, &mifi
, sizeof (mifi
));
419 bcopy(&mif6table
[mifi
].m6_pkt_in
, &req
->icount
,
420 sizeof (req
->icount
));
421 bcopy(&mif6table
[mifi
].m6_pkt_out
, &req
->ocount
,
422 sizeof (req
->ocount
));
423 bcopy(&mif6table
[mifi
].m6_bytes_in
, &req
->ibytes
,
424 sizeof (req
->ibytes
));
425 bcopy(&mif6table
[mifi
].m6_bytes_out
, &req
->obytes
,
426 sizeof (req
->obytes
));
428 struct sioc_mif_req6_32
*req
= data
;
431 bcopy(&req
->mifi
, &mifi
, sizeof (mifi
));
435 bcopy(&mif6table
[mifi
].m6_pkt_in
, &req
->icount
,
436 sizeof (req
->icount
));
437 bcopy(&mif6table
[mifi
].m6_pkt_out
, &req
->ocount
,
438 sizeof (req
->ocount
));
439 bcopy(&mif6table
[mifi
].m6_bytes_in
, &req
->ibytes
,
440 sizeof (req
->ibytes
));
441 bcopy(&mif6table
[mifi
].m6_bytes_out
, &req
->obytes
,
442 sizeof (req
->obytes
));
451 if ((*i
!= 1) && (*i
!= 0))
460 * Enable multicast routing
463 ip6_mrouter_init(so
, v
, cmd
)
471 "ip6_mrouter_init: so_type = %d, pr_protocol = %d\n",
472 so
->so_type
, so
->so_proto
->pr_protocol
);
475 if (so
->so_type
!= SOCK_RAW
||
476 so
->so_proto
->pr_protocol
!= IPPROTO_ICMPV6
)
480 return (ENOPROTOOPT
);
482 if (ip6_mrouter
!= NULL
) return EADDRINUSE
;
485 ip6_mrouter_ver
= cmd
;
487 bzero((caddr_t
)mf6ctable
, sizeof(mf6ctable
));
488 bzero((caddr_t
)n6expire
, sizeof(n6expire
));
490 pim6
= 0;/* used for stubbing out/in pim stuff */
492 timeout(expire_upcalls
, (caddr_t
)NULL
, EXPIRE_TIMEOUT
);
496 log(LOG_DEBUG
, "ip6_mrouter_init\n");
503 * Disable multicast routing
515 * For each phyint in use, disable promiscuous reception of all IPv6
521 * If there is still IPv4 multicast routing daemon,
522 * we remain interfaces to receive all muliticasted packets.
523 * XXX: there may be an interface in which the IPv4 multicast
524 * daemon is not interested...
530 for (mifi
= 0; mifi
< nummifs
; mifi
++) {
531 if (mif6table
[mifi
].m6_ifp
&&
532 !(mif6table
[mifi
].m6_flags
& MIFF_REGISTER
)) {
534 if_allmulti(mif6table
[mifi
].m6_ifp
, 0);
538 struct in6_ifreq ifr
;
540 ifr
.ifr_addr
.sin6_family
= AF_INET6
;
541 ifr
.ifr_addr
.sin6_addr
= in6addr_any
;
542 ifp
= mif6table
[mifi
].m6_ifp
;
543 ifnet_ioctl(ifp
, 0, SIOCDELMULTI
, &ifr
);
549 bzero((caddr_t
)mif6table
, sizeof(mif6table
));
552 pim6
= 0; /* used to stub out/in pim specific code */
554 untimeout(expire_upcalls
, (caddr_t
)NULL
);
557 * Free all multicast forwarding cache entries.
558 *###LD 5/27 needs locking
560 for (i
= 0; i
< MF6CTBLSIZ
; i
++) {
565 for (rte
= rt
->mf6c_stall
; rte
!= NULL
; ) {
566 struct rtdetq
*n
= rte
->next
;
569 FREE(rte
, M_MRTABLE
);
574 FREE(frt
, M_MRTABLE
);
578 bzero((caddr_t
)mf6ctable
, sizeof(mf6ctable
));
581 * Reset de-encapsulation cache
591 log(LOG_DEBUG
, "ip6_mrouter_done\n");
597 static struct sockaddr_in6 sin6
= { sizeof(sin6
), AF_INET6
,
598 0, 0, IN6ADDR_ANY_INIT
, 0};
601 * Add a mif to the mif table
605 struct mif6ctl
*mifcp
;
611 struct tbf
*m_tbf
= tbftable
+ mifcp
->mif6c_mifi
;
614 if (mifcp
->mif6c_mifi
>= MAXMIFS
)
616 mifp
= mif6table
+ mifcp
->mif6c_mifi
;
618 return (EADDRINUSE
); /* XXX: is it appropriate? */
619 if (mifcp
->mif6c_pifi
== 0 || mifcp
->mif6c_pifi
> if_index
)
622 ifnet_head_lock_shared();
623 if (mifcp
->mif6c_pifi
== 0 || mifcp
->mif6c_pifi
> if_index
) {
627 ifp
= ifindex2ifnet
[mifcp
->mif6c_pifi
];
633 if (mifcp
->mif6c_flags
& MIFF_REGISTER
) {
634 if (reg_mif_num
== (mifi_t
)-1) {
635 multicast_register_if
.if_name
= "register_mif";
636 multicast_register_if
.if_flags
|= IFF_LOOPBACK
;
637 multicast_register_if
.if_index
= mifcp
->mif6c_mifi
;
638 reg_mif_num
= mifcp
->mif6c_mifi
;
641 ifp
= &multicast_register_if
;
645 /* Make sure the interface supports multicast */
646 if ((ifp
->if_flags
& IFF_MULTICAST
) == 0)
649 error
= if_allmulti(ifp
, 1);
654 mifp
->m6_flags
= mifcp
->mif6c_flags
;
657 /* initialize per mif pkt counters */
659 mifp
->m6_pkt_out
= 0;
660 mifp
->m6_bytes_in
= 0;
661 mifp
->m6_bytes_out
= 0;
663 /* Adjust nummifs up if the mifi is higher than nummifs */
664 if (nummifs
<= mifcp
->mif6c_mifi
)
665 nummifs
= mifcp
->mif6c_mifi
+ 1;
670 "add_mif #%d, phyint %s%d\n",
672 ifp
->if_name
, ifp
->if_unit
);
679 * Delete a mif from the mif table
685 struct mif6
*mifp
= mif6table
+ *mifip
;
689 if (*mifip
>= nummifs
)
691 if (mifp
->m6_ifp
== NULL
)
695 if (!(mifp
->m6_flags
& MIFF_REGISTER
)) {
697 * XXX: what if there is yet IPv4 multicast daemon
698 * using the interface?
705 bzero((caddr_t
)mifp
, sizeof(*mifp
));
707 /* Adjust nummifs down */
708 for (mifi
= nummifs
; mifi
> 0; mifi
--)
709 if (mif6table
[mifi
- 1].m6_ifp
)
716 log(LOG_DEBUG
, "del_m6if %d, nummifs %d\n", *mifip
, nummifs
);
727 struct mf6cctl
*mfccp
;
734 MF6CFIND(mfccp
->mf6cc_origin
.sin6_addr
,
735 mfccp
->mf6cc_mcastgrp
.sin6_addr
, rt
);
737 /* If an entry already exists, just update the fields */
740 if (mrt6debug
& DEBUG_MFC
)
742 "add_m6fc no upcall h %d o %s g %s p %x\n",
743 ip6_sprintf(&mfccp
->mf6cc_origin
.sin6_addr
),
744 ip6_sprintf(&mfccp
->mf6cc_mcastgrp
.sin6_addr
),
745 mfccp
->mf6cc_parent
);
748 rt
->mf6c_parent
= mfccp
->mf6cc_parent
;
749 rt
->mf6c_ifset
= mfccp
->mf6cc_ifset
;
754 * Find the entry for which the upcall was made and update
756 hash
= MF6CHASH(mfccp
->mf6cc_origin
.sin6_addr
,
757 mfccp
->mf6cc_mcastgrp
.sin6_addr
);
758 for (rt
= mf6ctable
[hash
], nstl
= 0; rt
; rt
= rt
->mf6c_next
) {
759 if (IN6_ARE_ADDR_EQUAL(&rt
->mf6c_origin
.sin6_addr
,
760 &mfccp
->mf6cc_origin
.sin6_addr
) &&
761 IN6_ARE_ADDR_EQUAL(&rt
->mf6c_mcastgrp
.sin6_addr
,
762 &mfccp
->mf6cc_mcastgrp
.sin6_addr
) &&
763 (rt
->mf6c_stall
!= NULL
)) {
767 "add_m6fc: %s o %s g %s p %x dbx %p\n",
768 "multiple kernel entries",
769 ip6_sprintf(&mfccp
->mf6cc_origin
.sin6_addr
),
770 ip6_sprintf(&mfccp
->mf6cc_mcastgrp
.sin6_addr
),
771 mfccp
->mf6cc_parent
, rt
->mf6c_stall
);
774 if (mrt6debug
& DEBUG_MFC
)
776 "add_m6fc o %s g %s p %x dbg %x\n",
777 ip6_sprintf(&mfccp
->mf6cc_origin
.sin6_addr
),
778 ip6_sprintf(&mfccp
->mf6cc_mcastgrp
.sin6_addr
),
779 mfccp
->mf6cc_parent
, rt
->mf6c_stall
);
782 rt
->mf6c_origin
= mfccp
->mf6cc_origin
;
783 rt
->mf6c_mcastgrp
= mfccp
->mf6cc_mcastgrp
;
784 rt
->mf6c_parent
= mfccp
->mf6cc_parent
;
785 rt
->mf6c_ifset
= mfccp
->mf6cc_ifset
;
786 /* initialize pkt counters per src-grp */
787 rt
->mf6c_pkt_cnt
= 0;
788 rt
->mf6c_byte_cnt
= 0;
789 rt
->mf6c_wrong_if
= 0;
791 rt
->mf6c_expire
= 0; /* Don't clean this guy up */
794 /* free packets Qed at the end of this entry */
795 for (rte
= rt
->mf6c_stall
; rte
!= NULL
; ) {
796 struct rtdetq
*n
= rte
->next
;
797 ip6_mdq(rte
->m
, rte
->ifp
, rt
);
801 #endif /* UPCALL_TIMING */
802 FREE(rte
, M_MRTABLE
);
805 rt
->mf6c_stall
= NULL
;
810 * It is possible that an entry is being inserted without an upcall
814 if (mrt6debug
& DEBUG_MFC
)
815 log(LOG_DEBUG
,"add_mfc no upcall h %d o %s g %s p %x\n",
817 ip6_sprintf(&mfccp
->mf6cc_origin
.sin6_addr
),
818 ip6_sprintf(&mfccp
->mf6cc_mcastgrp
.sin6_addr
),
819 mfccp
->mf6cc_parent
);
822 for (rt
= mf6ctable
[hash
]; rt
; rt
= rt
->mf6c_next
) {
824 if (IN6_ARE_ADDR_EQUAL(&rt
->mf6c_origin
.sin6_addr
,
825 &mfccp
->mf6cc_origin
.sin6_addr
)&&
826 IN6_ARE_ADDR_EQUAL(&rt
->mf6c_mcastgrp
.sin6_addr
,
827 &mfccp
->mf6cc_mcastgrp
.sin6_addr
)) {
829 rt
->mf6c_origin
= mfccp
->mf6cc_origin
;
830 rt
->mf6c_mcastgrp
= mfccp
->mf6cc_mcastgrp
;
831 rt
->mf6c_parent
= mfccp
->mf6cc_parent
;
832 rt
->mf6c_ifset
= mfccp
->mf6cc_ifset
;
833 /* initialize pkt counters per src-grp */
834 rt
->mf6c_pkt_cnt
= 0;
835 rt
->mf6c_byte_cnt
= 0;
836 rt
->mf6c_wrong_if
= 0;
844 /* no upcall, so make a new entry */
845 rt
= (struct mf6c
*)_MALLOC(sizeof(*rt
), M_MRTABLE
,
851 /* insert new entry at head of hash chain */
852 rt
->mf6c_origin
= mfccp
->mf6cc_origin
;
853 rt
->mf6c_mcastgrp
= mfccp
->mf6cc_mcastgrp
;
854 rt
->mf6c_parent
= mfccp
->mf6cc_parent
;
855 rt
->mf6c_ifset
= mfccp
->mf6cc_ifset
;
856 /* initialize pkt counters per src-grp */
857 rt
->mf6c_pkt_cnt
= 0;
858 rt
->mf6c_byte_cnt
= 0;
859 rt
->mf6c_wrong_if
= 0;
861 rt
->mf6c_stall
= NULL
;
863 /* link into table */
864 rt
->mf6c_next
= mf6ctable
[hash
];
865 mf6ctable
[hash
] = rt
;
873 * collect delay statistics on the upcalls
887 TV_DELTA(tp
, *t
, delta
);
896 #endif /* UPCALL_TIMING */
899 * Delete an mfc entry
903 struct mf6cctl
*mfccp
;
905 struct sockaddr_in6 origin
;
906 struct sockaddr_in6 mcastgrp
;
911 origin
= mfccp
->mf6cc_origin
;
912 mcastgrp
= mfccp
->mf6cc_mcastgrp
;
913 hash
= MF6CHASH(origin
.sin6_addr
, mcastgrp
.sin6_addr
);
916 if (mrt6debug
& DEBUG_MFC
)
917 log(LOG_DEBUG
,"del_m6fc orig %s mcastgrp %s\n",
918 ip6_sprintf(&origin
.sin6_addr
),
919 ip6_sprintf(&mcastgrp
.sin6_addr
));
923 nptr
= &mf6ctable
[hash
];
924 while ((rt
= *nptr
) != NULL
) {
925 if (IN6_ARE_ADDR_EQUAL(&origin
.sin6_addr
,
926 &rt
->mf6c_origin
.sin6_addr
) &&
927 IN6_ARE_ADDR_EQUAL(&mcastgrp
.sin6_addr
,
928 &rt
->mf6c_mcastgrp
.sin6_addr
) &&
929 rt
->mf6c_stall
== NULL
)
932 nptr
= &rt
->mf6c_next
;
935 return EADDRNOTAVAIL
;
938 *nptr
= rt
->mf6c_next
;
946 socket_send(s
, mm
, src
)
949 struct sockaddr_in6
*src
;
951 //### LD 5/27/04 needs locking!
954 if (sbappendaddr(&s
->so_rcv
,
955 (struct sockaddr
*)src
,
956 mm
, (struct mbuf
*)0, NULL
) != 0) {
965 * IPv6 multicast forwarding function. This function assumes that the packet
966 * pointed to by "ip6" has arrived on (or is about to be sent to) the interface
967 * pointed to by "ifp", and the packet is to be relayed to other networks
968 * that have members of the packet's destination IPv6 multicast group.
970 * The packet is returned unscathed to the caller, unless it is
971 * erroneous, in which case a non-zero return value tells the caller to
976 ip6_mforward(ip6
, ifp
, m
)
985 struct timeval timenow
;
988 if (mrt6debug
& DEBUG_FORWARD
)
989 log(LOG_DEBUG
, "ip6_mforward: src %s, dst %s, ifindex %d\n",
990 ip6_sprintf(&ip6
->ip6_src
), ip6_sprintf(&ip6
->ip6_dst
),
995 * Don't forward a packet with Hop limit of zero or one,
996 * or a packet destined to a local-only group.
998 if (ip6
->ip6_hlim
<= 1 || IN6_IS_ADDR_MC_NODELOCAL(&ip6
->ip6_dst
) ||
999 IN6_IS_ADDR_MC_LINKLOCAL(&ip6
->ip6_dst
))
1004 * Source address check: do not forward packets with unspecified
1005 * source. It was discussed in July 2000, on ipngwg mailing list.
1006 * This is rather more serious than unicast cases, because some
1007 * MLD packets can be sent with the unspecified source address
1008 * (although such packets must normally set 1 to the hop limit field).
1010 getmicrotime(&timenow
);
1011 if (IN6_IS_ADDR_UNSPECIFIED(&ip6
->ip6_src
)) {
1012 ip6stat
.ip6s_cantforward
++;
1013 if (ip6_log_time
+ ip6_log_interval
< timenow
.tv_sec
) {
1014 ip6_log_time
= timenow
.tv_sec
;
1017 "from %s to %s nxt %d received on %s\n",
1018 ip6_sprintf(&ip6
->ip6_src
),
1019 ip6_sprintf(&ip6
->ip6_dst
),
1021 if_name(m
->m_pkthdr
.rcvif
));
1027 * Determine forwarding mifs from the forwarding cache table
1029 MF6CFIND(ip6
->ip6_src
, ip6
->ip6_dst
, rt
);
1031 /* Entry exists, so forward if necessary */
1033 return (ip6_mdq(m
, ifp
, rt
));
1036 * If we don't have a route for packet's origin,
1037 * Make a copy of the packet &
1038 * send message to routing daemon
1049 #endif /* UPCALL_TIMING */
1051 mrt6stat
.mrt6s_no_route
++;
1053 if (mrt6debug
& (DEBUG_FORWARD
| DEBUG_MFC
))
1054 log(LOG_DEBUG
, "ip6_mforward: no rte s %s g %s\n",
1055 ip6_sprintf(&ip6
->ip6_src
),
1056 ip6_sprintf(&ip6
->ip6_dst
));
1060 * Allocate mbufs early so that we don't do extra work if we
1061 * are just going to fail anyway.
1063 rte
= (struct rtdetq
*)_MALLOC(sizeof(*rte
), M_MRTABLE
,
1068 mb0
= m_copy(m
, 0, M_COPYALL
);
1070 * Pullup packet header if needed before storing it,
1071 * as other references may modify it in the meantime.
1074 (M_HASCL(mb0
) || mb0
->m_len
< sizeof(struct ip6_hdr
)))
1075 mb0
= m_pullup(mb0
, sizeof(struct ip6_hdr
));
1077 FREE(rte
, M_MRTABLE
);
1081 /* is there an upcall waiting for this packet? */
1082 hash
= MF6CHASH(ip6
->ip6_src
, ip6
->ip6_dst
);
1083 for (rt
= mf6ctable
[hash
]; rt
; rt
= rt
->mf6c_next
) {
1084 if (IN6_ARE_ADDR_EQUAL(&ip6
->ip6_src
,
1085 &rt
->mf6c_origin
.sin6_addr
) &&
1086 IN6_ARE_ADDR_EQUAL(&ip6
->ip6_dst
,
1087 &rt
->mf6c_mcastgrp
.sin6_addr
) &&
1088 (rt
->mf6c_stall
!= NULL
))
1095 struct omrt6msg
*oim
;
1098 /* no upcall, so make a new entry */
1099 rt
= (struct mf6c
*)_MALLOC(sizeof(*rt
), M_MRTABLE
,
1102 FREE(rte
, M_MRTABLE
);
1107 * Make a copy of the header to send to the user
1110 mm
= m_copy(mb0
, 0, sizeof(struct ip6_hdr
));
1113 FREE(rte
, M_MRTABLE
);
1115 FREE(rt
, M_MRTABLE
);
1120 * Send message to routing daemon
1122 sin6
.sin6_addr
= ip6
->ip6_src
;
1128 switch (ip6_mrouter_ver
) {
1131 oim
= mtod(mm
, struct omrt6msg
*);
1132 oim
->im6_msgtype
= MRT6MSG_NOCACHE
;
1137 im
= mtod(mm
, struct mrt6msg
*);
1138 im
->im6_msgtype
= MRT6MSG_NOCACHE
;
1142 FREE(rte
, M_MRTABLE
);
1144 FREE(rt
, M_MRTABLE
);
1149 if (mrt6debug
& DEBUG_FORWARD
)
1151 "getting the iif info in the kernel\n");
1154 for (mifp
= mif6table
, mifi
= 0;
1155 mifi
< nummifs
&& mifp
->m6_ifp
!= ifp
;
1159 switch (ip6_mrouter_ver
) {
1162 oim
->im6_mif
= mifi
;
1170 if (socket_send(ip6_mrouter
, mm
, &sin6
) < 0) {
1171 log(LOG_WARNING
, "ip6_mforward: ip6_mrouter "
1172 "socket queue full\n");
1173 mrt6stat
.mrt6s_upq_sockfull
++;
1174 FREE(rte
, M_MRTABLE
);
1176 FREE(rt
, M_MRTABLE
);
1180 mrt6stat
.mrt6s_upcalls
++;
1182 /* insert new entry at head of hash chain */
1183 bzero(rt
, sizeof(*rt
));
1184 rt
->mf6c_origin
.sin6_family
= AF_INET6
;
1185 rt
->mf6c_origin
.sin6_len
= sizeof(struct sockaddr_in6
);
1186 rt
->mf6c_origin
.sin6_addr
= ip6
->ip6_src
;
1187 rt
->mf6c_mcastgrp
.sin6_family
= AF_INET6
;
1188 rt
->mf6c_mcastgrp
.sin6_len
= sizeof(struct sockaddr_in6
);
1189 rt
->mf6c_mcastgrp
.sin6_addr
= ip6
->ip6_dst
;
1190 rt
->mf6c_expire
= UPCALL_EXPIRE
;
1192 rt
->mf6c_parent
= MF6C_INCOMPLETE_PARENT
;
1194 /* link into table */
1195 rt
->mf6c_next
= mf6ctable
[hash
];
1196 mf6ctable
[hash
] = rt
;
1197 /* Add this entry to the end of the queue */
1198 rt
->mf6c_stall
= rte
;
1200 /* determine if q has overflowed */
1204 for (p
= &rt
->mf6c_stall
; *p
!= NULL
; p
= &(*p
)->next
)
1205 if (++npkts
> MAX_UPQ6
) {
1206 mrt6stat
.mrt6s_upq_ovflw
++;
1207 FREE(rte
, M_MRTABLE
);
1212 /* Add this entry to the end of the queue */
1221 #endif /* UPCALL_TIMING */
1229 * Clean up cache entries if upcalls are not serviced
1230 * Call from the Slow Timeout mechanism, every half second.
1234 __unused
void *unused
)
1237 struct mf6c
*mfc
, **nptr
;
1240 for (i
= 0; i
< MF6CTBLSIZ
; i
++) {
1241 if (n6expire
[i
] == 0)
1243 nptr
= &mf6ctable
[i
];
1244 while ((mfc
= *nptr
) != NULL
) {
1245 rte
= mfc
->mf6c_stall
;
1247 * Skip real cache entries
1248 * Make sure it wasn't marked to not expire (shouldn't happen)
1252 mfc
->mf6c_expire
!= 0 &&
1253 --mfc
->mf6c_expire
== 0) {
1255 if (mrt6debug
& DEBUG_EXPIRE
)
1256 log(LOG_DEBUG
, "expire_upcalls: expiring (%s %s)\n",
1257 ip6_sprintf(&mfc
->mf6c_origin
.sin6_addr
),
1258 ip6_sprintf(&mfc
->mf6c_mcastgrp
.sin6_addr
));
1261 * drop all the packets
1262 * free the mbuf with the pkt, if, timing info
1265 struct rtdetq
*n
= rte
->next
;
1267 FREE(rte
, M_MRTABLE
);
1269 } while (rte
!= NULL
);
1270 mrt6stat
.mrt6s_cache_cleanups
++;
1273 *nptr
= mfc
->mf6c_next
;
1274 FREE(mfc
, M_MRTABLE
);
1276 nptr
= &mfc
->mf6c_next
;
1281 timeout(expire_upcalls
, (caddr_t
)NULL
, EXPIRE_TIMEOUT
);
1285 * Packet forwarding routine once entry in the cache is made
1293 struct ip6_hdr
*ip6
= mtod(m
, struct ip6_hdr
*);
1296 int plen
= m
->m_pkthdr
.len
;
1297 struct in6_addr src0
, dst0
; /* copies for local work */
1298 u_int32_t iszone
, idzone
, oszone
, odzone
;
1302 * Macro to send packet on mif. Since RSVP packets don't get counted on
1303 * input, they shouldn't get counted on output, so statistics keeping is
1307 #define MC6_SEND(ip6, mifp, m) do { \
1308 if ((mifp)->m6_flags & MIFF_REGISTER) \
1309 register_send((ip6), (mifp), (m)); \
1311 phyint_send((ip6), (mifp), (m)); \
1315 * Don't forward if it didn't arrive from the parent mif
1318 mifi
= rt
->mf6c_parent
;
1319 if ((mifi
>= nummifs
) || (mif6table
[mifi
].m6_ifp
!= ifp
)) {
1320 /* came in the wrong interface */
1322 if (mrt6debug
& DEBUG_FORWARD
)
1324 "wrong if: ifid %d mifi %d mififid %x\n",
1325 ifp
->if_index
, mifi
,
1326 mif6table
[mifi
].m6_ifp
->if_index
);
1328 mrt6stat
.mrt6s_wrong_if
++;
1329 rt
->mf6c_wrong_if
++;
1331 * If we are doing PIM processing, and we are forwarding
1332 * packets on this interface, send a message to the
1335 /* have to make sure this is a valid mif */
1336 if (mifi
< nummifs
&& mif6table
[mifi
].m6_ifp
)
1337 if (pim6
&& (m
->m_flags
& M_LOOP
) == 0) {
1339 * Check the M_LOOP flag to avoid an
1340 * unnecessary PIM assert.
1341 * XXX: M_LOOP is an ad-hoc hack...
1343 static struct sockaddr_in6 addr
=
1344 { sizeof(addr
), AF_INET6
, 0, 0, IN6ADDR_ANY_INIT
, 0};
1349 struct omrt6msg
*oim
;
1352 mm
= m_copy(m
, 0, sizeof(struct ip6_hdr
));
1355 mm
->m_len
< sizeof(struct ip6_hdr
)))
1356 mm
= m_pullup(mm
, sizeof(struct ip6_hdr
));
1364 switch (ip6_mrouter_ver
) {
1367 oim
= mtod(mm
, struct omrt6msg
*);
1368 oim
->im6_msgtype
= MRT6MSG_WRONGMIF
;
1373 im
= mtod(mm
, struct mrt6msg
*);
1374 im
->im6_msgtype
= MRT6MSG_WRONGMIF
;
1382 for (mifp
= mif6table
, iif
= 0;
1383 iif
< nummifs
&& mifp
&&
1384 mifp
->m6_ifp
!= ifp
;
1388 switch (ip6_mrouter_ver
) {
1392 addr
.sin6_addr
= oim
->im6_src
;
1397 addr
.sin6_addr
= im
->im6_src
;
1401 mrt6stat
.mrt6s_upcalls
++;
1403 if (socket_send(ip6_mrouter
, mm
, &addr
) < 0) {
1406 log(LOG_WARNING
, "mdq, ip6_mrouter socket queue full\n");
1408 ++mrt6stat
.mrt6s_upq_sockfull
;
1410 } /* if socket Q full */
1413 } /* if wrong iif */
1415 /* If I sourced this packet, it counts as output, else it was input. */
1416 if (m
->m_pkthdr
.rcvif
== NULL
) {
1417 /* XXX: is rcvif really NULL when output?? */
1418 mif6table
[mifi
].m6_pkt_out
++;
1419 mif6table
[mifi
].m6_bytes_out
+= plen
;
1421 mif6table
[mifi
].m6_pkt_in
++;
1422 mif6table
[mifi
].m6_bytes_in
+= plen
;
1425 rt
->mf6c_byte_cnt
+= plen
;
1428 * For each mif, forward a copy of the packet if there are group
1429 * members downstream on the interface.
1431 src0
= ip6
->ip6_src
;
1432 dst0
= ip6
->ip6_dst
;
1433 if ((error
= in6_setscope(&src0
, ifp
, &iszone
)) != 0 ||
1434 (error
= in6_setscope(&dst0
, ifp
, &idzone
)) != 0) {
1435 ip6stat
.ip6s_badscope
++;
1438 for (mifp
= mif6table
, mifi
= 0; mifi
< nummifs
; mifp
++, mifi
++) {
1439 if (IF_ISSET(mifi
, &rt
->mf6c_ifset
)) {
1441 * check if the outgoing packet is going to break
1443 * XXX For packets through PIM register tunnel
1444 * interface, we believe a routing daemon.
1446 if (!(mif6table
[rt
->mf6c_parent
].m6_flags
&
1448 !(mif6table
[mifi
].m6_flags
& MIFF_REGISTER
)) {
1449 if (in6_setscope(&src0
, mif6table
[mifi
].m6_ifp
,
1451 in6_setscope(&dst0
, mif6table
[mifi
].m6_ifp
,
1455 ip6stat
.ip6s_badscope
++;
1461 mifp
->m6_bytes_out
+= plen
;
1462 MC6_SEND(ip6
, mifp
, m
);
1469 phyint_send(ip6
, mifp
, m
)
1470 struct ip6_hdr
*ip6
;
1474 struct mbuf
*mb_copy
;
1475 struct ifnet
*ifp
= mifp
->m6_ifp
;
1477 static struct route_in6 ro
;
1478 struct in6_multi
*in6m
;
1479 struct sockaddr_in6
*dst6
;
1482 * Make a new reference to the packet; make sure that
1483 * the IPv6 header is actually copied, not just referenced,
1484 * so that ip6_output() only scribbles on the copy.
1486 mb_copy
= m_copy(m
, 0, M_COPYALL
);
1488 (M_HASCL(mb_copy
) || mb_copy
->m_len
< sizeof(struct ip6_hdr
)))
1489 mb_copy
= m_pullup(mb_copy
, sizeof(struct ip6_hdr
));
1490 if (mb_copy
== NULL
) {
1493 /* set MCAST flag to the outgoing packet */
1494 mb_copy
->m_flags
|= M_MCAST
;
1497 * If we sourced the packet, call ip6_output since we may devide
1498 * the packet into fragments when the packet is too big for the
1499 * outgoing interface.
1500 * Otherwise, we can simply send the packet to the interface
1503 if (m
->m_pkthdr
.rcvif
== NULL
) {
1504 struct ip6_moptions
*im6o
;
1506 im6o
= ip6_allocmoptions(M_DONTWAIT
);
1512 im6o
->im6o_multicast_ifp
= ifp
;
1513 /* XXX: ip6_output will override ip6->ip6_hlim */
1514 im6o
->im6o_multicast_hlim
= ip6
->ip6_hlim
;
1515 im6o
->im6o_multicast_loop
= 1;
1516 error
= ip6_output(mb_copy
, NULL
, &ro
, IPV6_FORWARDING
,
1521 if (mrt6debug
& DEBUG_XMIT
)
1522 log(LOG_DEBUG
, "phyint_send on mif %d err %d\n",
1523 mifp
- mif6table
, error
);
1529 * If we belong to the destination multicast group
1530 * on the outgoing interface, loop back a copy.
1532 dst6
= (struct sockaddr_in6
*)&ro
.ro_dst
;
1533 in6_multihead_lock_shared();
1534 IN6_LOOKUP_MULTI(ip6
->ip6_dst
, ifp
, in6m
);
1535 in6_multihead_lock_done();
1538 dst6
->sin6_len
= sizeof(struct sockaddr_in6
);
1539 dst6
->sin6_family
= AF_INET6
;
1540 dst6
->sin6_addr
= ip6
->ip6_dst
;
1541 ip6_mloopback(ifp
, m
, (struct sockaddr_in6
*)&ro
.ro_dst
);
1544 * Put the packet into the sending queue of the outgoing interface
1545 * if it would fit in the MTU of the interface.
1547 if (mb_copy
->m_pkthdr
.len
<= ifp
->if_mtu
|| ifp
->if_mtu
< IPV6_MMTU
) {
1548 dst6
->sin6_len
= sizeof(struct sockaddr_in6
);
1549 dst6
->sin6_family
= AF_INET6
;
1550 dst6
->sin6_addr
= ip6
->ip6_dst
;
1552 * We just call if_output instead of nd6_output here, since
1553 * we need no ND for a multicast forwarded packet...right?
1556 /* Make sure the HW checksum flags are cleaned before sending the packet */
1558 mb_copy
->m_pkthdr
.rcvif
= 0;
1559 mb_copy
->m_pkthdr
.csum_data
= 0;
1560 mb_copy
->m_pkthdr
.csum_flags
= 0;
1562 error
= dlil_output(ifp
, PF_INET6
, mb_copy
,
1563 NULL
, (struct sockaddr
*)&ro
.ro_dst
, 0, NULL
);
1565 error
= (*ifp
->if_output
)(ifp
, mb_copy
,
1566 (struct sockaddr
*)&ro
.ro_dst
,
1570 if (mrt6debug
& DEBUG_XMIT
)
1571 log(LOG_DEBUG
, "phyint_send on mif %d err %d\n",
1572 mifp
- mif6table
, error
);
1576 * pMTU discovery is intentionally disabled by default, since
1577 * various router may notify pMTU in multicast, which can be
1578 * a DDoS to a router
1581 icmp6_error(mb_copy
, ICMP6_PACKET_TOO_BIG
, 0, ifp
->if_mtu
);
1584 if (mrt6debug
& DEBUG_XMIT
) {
1586 "phyint_send: packet too big on %s o %s "
1587 "g %s size %d(discarded)\n",
1589 ip6_sprintf(&ip6
->ip6_src
),
1590 ip6_sprintf(&ip6
->ip6_dst
),
1591 mb_copy
->m_pkthdr
.len
);
1594 #endif /* MRT6DEBUG */
1595 m_freem(mb_copy
); /* simply discard the packet */
1601 register_send(ip6
, mif
, m
)
1602 struct ip6_hdr
*ip6
;
1607 int i
, len
= m
->m_pkthdr
.len
;
1608 static struct sockaddr_in6 addr
= { sizeof(addr
), AF_INET6
,
1609 0, 0, IN6ADDR_ANY_INIT
, 0};
1610 struct mrt6msg
*im6
;
1614 log(LOG_DEBUG
, "** IPv6 register_send **\n src %s dst %s\n",
1615 ip6_sprintf(&ip6
->ip6_src
), ip6_sprintf(&ip6
->ip6_dst
));
1617 ++pim6stat
.pim6s_snd_registers
;
1619 /* Make a copy of the packet to send to the user level process */
1620 MGETHDR(mm
, M_DONTWAIT
, MT_HEADER
);
1623 #ifdef __darwin8_notyet
1625 mac_create_mbuf_multicast_encap(m
, mif
->m6_ifp
, mm
);
1628 mm
->m_pkthdr
.rcvif
= NULL
;
1629 mm
->m_data
+= max_linkhdr
;
1630 mm
->m_len
= sizeof(struct ip6_hdr
);
1632 if ((mm
->m_next
= m_copy(m
, 0, M_COPYALL
)) == NULL
) {
1636 i
= MHLEN
- M_LEADINGSPACE(mm
);
1639 mm
= m_pullup(mm
, i
);
1644 /* TODO: check it! */
1645 mm
->m_pkthdr
.len
= len
+ sizeof(struct ip6_hdr
);
1648 * Send message to routing daemon
1650 addr
.sin6_addr
= ip6
->ip6_src
;
1652 im6
= mtod(mm
, struct mrt6msg
*);
1653 im6
->im6_msgtype
= MRT6MSG_WHOLEPKT
;
1656 im6
->im6_mif
= mif
- mif6table
;
1658 /* iif info is not given for reg. encap.n */
1659 mrt6stat
.mrt6s_upcalls
++;
1661 if (socket_send(ip6_mrouter
, mm
, &addr
) < 0) {
1665 "register_send: ip6_mrouter socket queue full\n");
1667 ++mrt6stat
.mrt6s_upq_sockfull
;
1674 * PIM sparse mode hook
1675 * Receives the pim control messages, and passes them up to the listening
1676 * socket, using rip6_input.
1677 * The only message processed is the REGISTER pim message; the pim header
1678 * is stripped off, and the inner packet is passed to register_mforward.
1681 pim6_input(struct mbuf
**mp
, int *offp
, int proto
)
1683 struct pim
*pim
; /* pointer to a pim struct */
1684 struct ip6_hdr
*ip6
;
1686 struct mbuf
*m
= *mp
;
1690 ++pim6stat
.pim6s_rcv_total
;
1692 /* Expect 32-bit aligned data pointer on strict-align platforms */
1693 MBUF_STRICT_DATA_ALIGNMENT_CHECK_32(m
);
1695 ip6
= mtod(m
, struct ip6_hdr
*);
1696 pimlen
= m
->m_pkthdr
.len
- *offp
;
1701 if (pimlen
< PIM_MINLEN
) {
1702 ++pim6stat
.pim6s_rcv_tooshort
;
1704 if (mrt6debug
& DEBUG_PIM
)
1705 log(LOG_DEBUG
,"pim6_input: PIM packet too short\n");
1708 return(IPPROTO_DONE
);
1712 * if the packet is at least as big as a REGISTER, go ahead
1713 * and grab the PIM REGISTER header size, to avoid another
1714 * possible m_pullup() later.
1716 * PIM_MINLEN == pimhdr + u_int32 == 8
1717 * PIM6_REG_MINLEN == pimhdr + reghdr + eip6hdr == 4 + 4 + 40
1719 minlen
= (pimlen
>= PIM6_REG_MINLEN
) ? PIM6_REG_MINLEN
: PIM_MINLEN
;
1722 * Make sure that the IP6 and PIM headers in contiguous memory, and
1723 * possibly the PIM REGISTER header
1725 #ifndef PULLDOWN_TEST
1726 IP6_EXTHDR_CHECK(m
, off
, minlen
, return IPPROTO_DONE
);
1727 /* adjust pointer */
1728 ip6
= mtod(m
, struct ip6_hdr
*);
1730 /* adjust mbuf to point to the PIM header */
1731 pim
= (struct pim
*)((caddr_t
)ip6
+ off
);
1733 IP6_EXTHDR_GET(pim
, struct pim
*, m
, off
, minlen
);
1735 pim6stat
.pim6s_rcv_tooshort
++;
1736 return IPPROTO_DONE
;
1740 #define PIM6_CHECKSUM
1741 #ifdef PIM6_CHECKSUM
1746 * Validate checksum.
1747 * If PIM REGISTER, exclude the data packet
1749 if (pim
->pim_type
== PIM_REGISTER
)
1750 cksumlen
= PIM_MINLEN
;
1754 if (in6_cksum(m
, IPPROTO_PIM
, off
, cksumlen
)) {
1755 ++pim6stat
.pim6s_rcv_badsum
;
1757 if (mrt6debug
& DEBUG_PIM
)
1759 "pim6_input: invalid checksum\n");
1762 return(IPPROTO_DONE
);
1765 #endif /* PIM_CHECKSUM */
1767 /* PIM version check */
1768 if (pim
->pim_ver
!= PIM_VERSION
) {
1769 ++pim6stat
.pim6s_rcv_badversion
;
1772 "pim6_input: incorrect version %d, expecting %d\n",
1773 pim
->pim_ver
, PIM_VERSION
);
1776 return(IPPROTO_DONE
);
1779 if (pim
->pim_type
== PIM_REGISTER
) {
1781 * since this is a REGISTER, we'll make a copy of the register
1782 * headers ip6+pim+u_int32_t+encap_ip6, to be passed up to the
1785 static struct sockaddr_in6 dst
= { sizeof(dst
), AF_INET6
,
1786 0, 0, IN6ADDR_ANY_INIT
, 0 };
1789 struct ip6_hdr
*eip6
;
1792 ++pim6stat
.pim6s_rcv_registers
;
1794 if ((reg_mif_num
>= nummifs
) || (reg_mif_num
== (mifi_t
) -1)) {
1796 if (mrt6debug
& DEBUG_PIM
)
1798 "pim6_input: register mif not set: %d\n",
1802 return(IPPROTO_DONE
);
1805 reghdr
= (u_int32_t
*)(pim
+ 1);
1807 if ((ntohl(*reghdr
) & PIM_NULL_REGISTER
))
1808 goto pim6_input_to_daemon
;
1813 if (pimlen
< PIM6_REG_MINLEN
) {
1814 ++pim6stat
.pim6s_rcv_tooshort
;
1815 ++pim6stat
.pim6s_rcv_badregisters
;
1818 "pim6_input: register packet size too "
1819 "small %d from %s\n",
1820 pimlen
, ip6_sprintf(&ip6
->ip6_src
));
1823 return(IPPROTO_DONE
);
1826 eip6
= (struct ip6_hdr
*) (reghdr
+ 1);
1828 if (mrt6debug
& DEBUG_PIM
)
1830 "pim6_input[register], eip6: %s -> %s, "
1832 ip6_sprintf(&eip6
->ip6_src
),
1833 ip6_sprintf(&eip6
->ip6_dst
),
1834 ntohs(eip6
->ip6_plen
));
1837 /* verify the version number of the inner packet */
1838 if ((eip6
->ip6_vfc
& IPV6_VERSION_MASK
) != IPV6_VERSION
) {
1839 ++pim6stat
.pim6s_rcv_badregisters
;
1841 log(LOG_DEBUG
, "pim6_input: invalid IP version (%d) "
1842 "of the inner packet\n",
1843 (eip6
->ip6_vfc
& IPV6_VERSION
));
1846 return(IPPROTO_NONE
);
1849 /* verify the inner packet is destined to a mcast group */
1850 if (!IN6_IS_ADDR_MULTICAST(&eip6
->ip6_dst
)) {
1851 ++pim6stat
.pim6s_rcv_badregisters
;
1853 if (mrt6debug
& DEBUG_PIM
)
1855 "pim6_input: inner packet of register "
1856 "is not multicast %s\n",
1857 ip6_sprintf(&eip6
->ip6_dst
));
1860 return(IPPROTO_DONE
);
1864 * make a copy of the whole header to pass to the daemon later.
1866 mcp
= m_copy(m
, 0, off
+ PIM6_REG_MINLEN
);
1870 "pim6_input: pim register: "
1871 "could not copy register head\n");
1874 return(IPPROTO_DONE
);
1878 * forward the inner ip6 packet; point m_data at the inner ip6.
1880 m_adj(m
, off
+ PIM_MINLEN
);
1882 if (mrt6debug
& DEBUG_PIM
) {
1884 "pim6_input: forwarding decapsulated register: "
1885 "src %s, dst %s, mif %d\n",
1886 ip6_sprintf(&eip6
->ip6_src
),
1887 ip6_sprintf(&eip6
->ip6_dst
),
1895 dlil_output(lo_ifp
, PF_INET6
, m
, 0, (struct sockaddr
*)&dst
, 0, NULL
);
1898 printf("Warning: pim6_input call to dlil_find_dltag failed!\n");
1902 (void) if_simloop(mif6table
[reg_mif_num
].m6_ifp
, m
,
1903 dst
.sin6_family
, NULL
);
1906 /* prepare the register head to send to the mrouting daemon */
1911 * Pass the PIM message up to the daemon; if it is a register message
1912 * pass the 'head' only up to the daemon. This includes the
1913 * encapsulator ip6 header, pim header, register header and the
1914 * encapsulated ip6 header.
1916 pim6_input_to_daemon
:
1917 rip6_input(&m
, offp
);
1918 return(IPPROTO_DONE
);