blob: dfdbb9ebbc87491298d006053c642495990a5205 [file] [log] [blame]
b.liue9582032025-04-17 19:18:16 +08001// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * IP multicast routing support for mrouted 3.6/3.8
4 *
5 * (c) 1995 Alan Cox, <alan@lxorguk.ukuu.org.uk>
6 * Linux Consultancy and Custom Driver Development
7 *
8 * Fixes:
9 * Michael Chastain : Incorrect size of copying.
10 * Alan Cox : Added the cache manager code
11 * Alan Cox : Fixed the clone/copy bug and device race.
12 * Mike McLagan : Routing by source
13 * Malcolm Beattie : Buffer handling fixes.
14 * Alexey Kuznetsov : Double buffer free and other fixes.
15 * SVR Anand : Fixed several multicast bugs and problems.
16 * Alexey Kuznetsov : Status, optimisations and more.
17 * Brad Parker : Better behaviour on mrouted upcall
18 * overflow.
19 * Carlos Picoto : PIMv1 Support
20 * Pavlin Ivanov Radoslavov: PIMv2 Registers must checksum only PIM header
21 * Relax this requirement to work with older peers.
22 */
23
24#include <linux/uaccess.h>
25#include <linux/types.h>
26#include <linux/cache.h>
27#include <linux/capability.h>
28#include <linux/errno.h>
29#include <linux/mm.h>
30#include <linux/kernel.h>
31#include <linux/fcntl.h>
32#include <linux/stat.h>
33#include <linux/socket.h>
34#include <linux/in.h>
35#include <linux/inet.h>
36#include <linux/netdevice.h>
37#include <linux/inetdevice.h>
38#include <linux/igmp.h>
39#include <linux/proc_fs.h>
40#include <linux/seq_file.h>
41#include <linux/mroute.h>
42#include <linux/init.h>
43#include <linux/if_ether.h>
44#include <linux/slab.h>
45#include <net/net_namespace.h>
46#include <net/ip.h>
47#include <net/protocol.h>
48#include <linux/skbuff.h>
49#include <net/route.h>
50#include <net/icmp.h>
51#include <net/udp.h>
52#include <net/raw.h>
53#include <linux/notifier.h>
54#include <linux/if_arp.h>
55#include <linux/netfilter_ipv4.h>
56#include <linux/compat.h>
57#include <linux/export.h>
58#include <linux/rhashtable.h>
59#include <net/ip_tunnels.h>
60#include <net/checksum.h>
61#include <net/netlink.h>
62#include <net/fib_rules.h>
63#include <linux/netconf.h>
64#include <net/rtnh.h>
65
66#include <linux/nospec.h>
67
68struct ipmr_rule {
69 struct fib_rule common;
70};
71
72struct ipmr_result {
73 struct mr_table *mrt;
74};
75
76/* Big lock, protecting vif table, mrt cache and mroute socket state.
77 * Note that the changes are semaphored via rtnl_lock.
78 */
79
80static DEFINE_RWLOCK(mrt_lock);
81
82/* Multicast router control variables */
83
84/* Special spinlock for queue of unresolved entries */
85static DEFINE_SPINLOCK(mfc_unres_lock);
86
87/* We return to original Alan's scheme. Hash table of resolved
88 * entries is changed only in process context and protected
89 * with weak lock mrt_lock. Queue of unresolved entries is protected
90 * with strong spinlock mfc_unres_lock.
91 *
92 * In this case data path is free of exclusive locks at all.
93 */
94
95static struct kmem_cache *mrt_cachep __ro_after_init;
96
97static struct mr_table *ipmr_new_table(struct net *net, u32 id);
98static void ipmr_free_table(struct mr_table *mrt);
99
100static void ip_mr_forward(struct net *net, struct mr_table *mrt,
101 struct net_device *dev, struct sk_buff *skb,
102 struct mfc_cache *cache, int local);
103static int ipmr_cache_report(struct mr_table *mrt,
104 struct sk_buff *pkt, vifi_t vifi, int assert);
105static void mroute_netlink_event(struct mr_table *mrt, struct mfc_cache *mfc,
106 int cmd);
107static void igmpmsg_netlink_event(struct mr_table *mrt, struct sk_buff *pkt);
108static void mroute_clean_tables(struct mr_table *mrt, int flags);
109static void ipmr_expire_process(struct timer_list *t);
110
111#ifdef CONFIG_IP_MROUTE_MULTIPLE_TABLES
112#define ipmr_for_each_table(mrt, net) \
113 list_for_each_entry_rcu(mrt, &net->ipv4.mr_tables, list)
114
115static struct mr_table *ipmr_mr_table_iter(struct net *net,
116 struct mr_table *mrt)
117{
118 struct mr_table *ret;
119
120 if (!mrt)
121 ret = list_entry_rcu(net->ipv4.mr_tables.next,
122 struct mr_table, list);
123 else
124 ret = list_entry_rcu(mrt->list.next,
125 struct mr_table, list);
126
127 if (&ret->list == &net->ipv4.mr_tables)
128 return NULL;
129 return ret;
130}
131
132static struct mr_table *__ipmr_get_table(struct net *net, u32 id)
133{
134 struct mr_table *mrt;
135
136 ipmr_for_each_table(mrt, net) {
137 if (mrt->id == id)
138 return mrt;
139 }
140 return NULL;
141}
142
143static struct mr_table *ipmr_get_table(struct net *net, u32 id)
144{
145 struct mr_table *mrt;
146
147 rcu_read_lock();
148 mrt = __ipmr_get_table(net, id);
149 rcu_read_unlock();
150 return mrt;
151}
152
153static int ipmr_fib_lookup(struct net *net, struct flowi4 *flp4,
154 struct mr_table **mrt)
155{
156 int err;
157 struct ipmr_result res;
158 struct fib_lookup_arg arg = {
159 .result = &res,
160 .flags = FIB_LOOKUP_NOREF,
161 };
162
163 /* update flow if oif or iif point to device enslaved to l3mdev */
164 l3mdev_update_flow(net, flowi4_to_flowi(flp4));
165
166 err = fib_rules_lookup(net->ipv4.mr_rules_ops,
167 flowi4_to_flowi(flp4), 0, &arg);
168 if (err < 0)
169 return err;
170 *mrt = res.mrt;
171 return 0;
172}
173
174static int ipmr_rule_action(struct fib_rule *rule, struct flowi *flp,
175 int flags, struct fib_lookup_arg *arg)
176{
177 struct ipmr_result *res = arg->result;
178 struct mr_table *mrt;
179
180 switch (rule->action) {
181 case FR_ACT_TO_TBL:
182 break;
183 case FR_ACT_UNREACHABLE:
184 return -ENETUNREACH;
185 case FR_ACT_PROHIBIT:
186 case FR_ACT_POLICY_FAILED:
187 return -EACCES;
188 case FR_ACT_BLACKHOLE:
189 default:
190 return -EINVAL;
191 }
192
193 arg->table = fib_rule_get_table(rule, arg);
194
195 mrt = __ipmr_get_table(rule->fr_net, arg->table);
196 if (!mrt)
197 return -EAGAIN;
198 res->mrt = mrt;
199 return 0;
200}
201
202static int ipmr_rule_match(struct fib_rule *rule, struct flowi *fl, int flags)
203{
204 return 1;
205}
206
207static const struct nla_policy ipmr_rule_policy[FRA_MAX + 1] = {
208 FRA_GENERIC_POLICY,
209};
210
211static int ipmr_rule_configure(struct fib_rule *rule, struct sk_buff *skb,
212 struct fib_rule_hdr *frh, struct nlattr **tb,
213 struct netlink_ext_ack *extack)
214{
215 return 0;
216}
217
218static int ipmr_rule_compare(struct fib_rule *rule, struct fib_rule_hdr *frh,
219 struct nlattr **tb)
220{
221 return 1;
222}
223
224static int ipmr_rule_fill(struct fib_rule *rule, struct sk_buff *skb,
225 struct fib_rule_hdr *frh)
226{
227 frh->dst_len = 0;
228 frh->src_len = 0;
229 frh->tos = 0;
230 return 0;
231}
232
233static const struct fib_rules_ops __net_initconst ipmr_rules_ops_template = {
234 .family = RTNL_FAMILY_IPMR,
235 .rule_size = sizeof(struct ipmr_rule),
236 .addr_size = sizeof(u32),
237 .action = ipmr_rule_action,
238 .match = ipmr_rule_match,
239 .configure = ipmr_rule_configure,
240 .compare = ipmr_rule_compare,
241 .fill = ipmr_rule_fill,
242 .nlgroup = RTNLGRP_IPV4_RULE,
243 .policy = ipmr_rule_policy,
244 .owner = THIS_MODULE,
245};
246
247static int __net_init ipmr_rules_init(struct net *net)
248{
249 struct fib_rules_ops *ops;
250 struct mr_table *mrt;
251 int err;
252
253 ops = fib_rules_register(&ipmr_rules_ops_template, net);
254 if (IS_ERR(ops))
255 return PTR_ERR(ops);
256
257 INIT_LIST_HEAD(&net->ipv4.mr_tables);
258
259 mrt = ipmr_new_table(net, RT_TABLE_DEFAULT);
260 if (IS_ERR(mrt)) {
261 err = PTR_ERR(mrt);
262 goto err1;
263 }
264
265 err = fib_default_rule_add(ops, 0x7fff, RT_TABLE_DEFAULT, 0);
266 if (err < 0)
267 goto err2;
268
269 net->ipv4.mr_rules_ops = ops;
270 return 0;
271
272err2:
273 rtnl_lock();
274 ipmr_free_table(mrt);
275 rtnl_unlock();
276err1:
277 fib_rules_unregister(ops);
278 return err;
279}
280
281static void __net_exit ipmr_rules_exit(struct net *net)
282{
283 struct mr_table *mrt, *next;
284
285 rtnl_lock();
286 list_for_each_entry_safe(mrt, next, &net->ipv4.mr_tables, list) {
287 list_del(&mrt->list);
288 ipmr_free_table(mrt);
289 }
290 fib_rules_unregister(net->ipv4.mr_rules_ops);
291 rtnl_unlock();
292}
293
294static int ipmr_rules_dump(struct net *net, struct notifier_block *nb)
295{
296 return fib_rules_dump(net, nb, RTNL_FAMILY_IPMR);
297}
298
299static unsigned int ipmr_rules_seq_read(struct net *net)
300{
301 return fib_rules_seq_read(net, RTNL_FAMILY_IPMR);
302}
303
304bool ipmr_rule_default(const struct fib_rule *rule)
305{
306 return fib_rule_matchall(rule) && rule->table == RT_TABLE_DEFAULT;
307}
308EXPORT_SYMBOL(ipmr_rule_default);
309#else
310#define ipmr_for_each_table(mrt, net) \
311 for (mrt = net->ipv4.mrt; mrt; mrt = NULL)
312
313static struct mr_table *ipmr_mr_table_iter(struct net *net,
314 struct mr_table *mrt)
315{
316 if (!mrt)
317 return net->ipv4.mrt;
318 return NULL;
319}
320
321static struct mr_table *ipmr_get_table(struct net *net, u32 id)
322{
323 return net->ipv4.mrt;
324}
325
326#define __ipmr_get_table ipmr_get_table
327
328static int ipmr_fib_lookup(struct net *net, struct flowi4 *flp4,
329 struct mr_table **mrt)
330{
331 *mrt = net->ipv4.mrt;
332 return 0;
333}
334
335static int __net_init ipmr_rules_init(struct net *net)
336{
337 struct mr_table *mrt;
338
339 mrt = ipmr_new_table(net, RT_TABLE_DEFAULT);
340 if (IS_ERR(mrt))
341 return PTR_ERR(mrt);
342 net->ipv4.mrt = mrt;
343 return 0;
344}
345
346static void __net_exit ipmr_rules_exit(struct net *net)
347{
348 rtnl_lock();
349 ipmr_free_table(net->ipv4.mrt);
350 net->ipv4.mrt = NULL;
351 rtnl_unlock();
352}
353
354static int ipmr_rules_dump(struct net *net, struct notifier_block *nb)
355{
356 return 0;
357}
358
359static unsigned int ipmr_rules_seq_read(struct net *net)
360{
361 return 0;
362}
363
364bool ipmr_rule_default(const struct fib_rule *rule)
365{
366 return true;
367}
368EXPORT_SYMBOL(ipmr_rule_default);
369#endif
370
371static inline int ipmr_hash_cmp(struct rhashtable_compare_arg *arg,
372 const void *ptr)
373{
374 const struct mfc_cache_cmp_arg *cmparg = arg->key;
375 struct mfc_cache *c = (struct mfc_cache *)ptr;
376
377 return cmparg->mfc_mcastgrp != c->mfc_mcastgrp ||
378 cmparg->mfc_origin != c->mfc_origin;
379}
380
381static const struct rhashtable_params ipmr_rht_params = {
382 .head_offset = offsetof(struct mr_mfc, mnode),
383 .key_offset = offsetof(struct mfc_cache, cmparg),
384 .key_len = sizeof(struct mfc_cache_cmp_arg),
385 .nelem_hint = 3,
386 .obj_cmpfn = ipmr_hash_cmp,
387 .automatic_shrinking = true,
388};
389
390static void ipmr_new_table_set(struct mr_table *mrt,
391 struct net *net)
392{
393#ifdef CONFIG_IP_MROUTE_MULTIPLE_TABLES
394 list_add_tail_rcu(&mrt->list, &net->ipv4.mr_tables);
395#endif
396}
397
398static struct mfc_cache_cmp_arg ipmr_mr_table_ops_cmparg_any = {
399 .mfc_mcastgrp = htonl(INADDR_ANY),
400 .mfc_origin = htonl(INADDR_ANY),
401};
402
403static struct mr_table_ops ipmr_mr_table_ops = {
404 .rht_params = &ipmr_rht_params,
405 .cmparg_any = &ipmr_mr_table_ops_cmparg_any,
406};
407
408static struct mr_table *ipmr_new_table(struct net *net, u32 id)
409{
410 struct mr_table *mrt;
411
412 /* "pimreg%u" should not exceed 16 bytes (IFNAMSIZ) */
413 if (id != RT_TABLE_DEFAULT && id >= 1000000000)
414 return ERR_PTR(-EINVAL);
415
416 mrt = __ipmr_get_table(net, id);
417 if (mrt)
418 return mrt;
419
420 return mr_table_alloc(net, id, &ipmr_mr_table_ops,
421 ipmr_expire_process, ipmr_new_table_set);
422}
423
424static void ipmr_free_table(struct mr_table *mrt)
425{
426 del_timer_sync(&mrt->ipmr_expire_timer);
427 mroute_clean_tables(mrt, MRT_FLUSH_VIFS | MRT_FLUSH_VIFS_STATIC |
428 MRT_FLUSH_MFC | MRT_FLUSH_MFC_STATIC);
429 rhltable_destroy(&mrt->mfc_hash);
430 kfree(mrt);
431}
432
433/* Service routines creating virtual interfaces: DVMRP tunnels and PIMREG */
434
435static void ipmr_del_tunnel(struct net_device *dev, struct vifctl *v)
436{
437 struct net *net = dev_net(dev);
438
439 dev_close(dev);
440
441 dev = __dev_get_by_name(net, "tunl0");
442 if (dev) {
443 const struct net_device_ops *ops = dev->netdev_ops;
444 struct ifreq ifr;
445 struct ip_tunnel_parm p;
446
447 memset(&p, 0, sizeof(p));
448 p.iph.daddr = v->vifc_rmt_addr.s_addr;
449 p.iph.saddr = v->vifc_lcl_addr.s_addr;
450 p.iph.version = 4;
451 p.iph.ihl = 5;
452 p.iph.protocol = IPPROTO_IPIP;
453 sprintf(p.name, "dvmrp%d", v->vifc_vifi);
454 ifr.ifr_ifru.ifru_data = (__force void __user *)&p;
455
456 if (ops->ndo_do_ioctl) {
457 mm_segment_t oldfs = get_fs();
458
459 set_fs(KERNEL_DS);
460 ops->ndo_do_ioctl(dev, &ifr, SIOCDELTUNNEL);
461 set_fs(oldfs);
462 }
463 }
464}
465
466/* Initialize ipmr pimreg/tunnel in_device */
467static bool ipmr_init_vif_indev(const struct net_device *dev)
468{
469 struct in_device *in_dev;
470
471 ASSERT_RTNL();
472
473 in_dev = __in_dev_get_rtnl(dev);
474 if (!in_dev)
475 return false;
476 ipv4_devconf_setall(in_dev);
477 neigh_parms_data_state_setall(in_dev->arp_parms);
478 IPV4_DEVCONF(in_dev->cnf, RP_FILTER) = 0;
479
480 return true;
481}
482
483static struct net_device *ipmr_new_tunnel(struct net *net, struct vifctl *v)
484{
485 struct net_device *dev;
486
487 dev = __dev_get_by_name(net, "tunl0");
488
489 if (dev) {
490 const struct net_device_ops *ops = dev->netdev_ops;
491 int err;
492 struct ifreq ifr;
493 struct ip_tunnel_parm p;
494
495 memset(&p, 0, sizeof(p));
496 p.iph.daddr = v->vifc_rmt_addr.s_addr;
497 p.iph.saddr = v->vifc_lcl_addr.s_addr;
498 p.iph.version = 4;
499 p.iph.ihl = 5;
500 p.iph.protocol = IPPROTO_IPIP;
501 sprintf(p.name, "dvmrp%d", v->vifc_vifi);
502 ifr.ifr_ifru.ifru_data = (__force void __user *)&p;
503
504 if (ops->ndo_do_ioctl) {
505 mm_segment_t oldfs = get_fs();
506
507 set_fs(KERNEL_DS);
508 err = ops->ndo_do_ioctl(dev, &ifr, SIOCADDTUNNEL);
509 set_fs(oldfs);
510 } else {
511 err = -EOPNOTSUPP;
512 }
513 dev = NULL;
514
515 if (err == 0 &&
516 (dev = __dev_get_by_name(net, p.name)) != NULL) {
517 dev->flags |= IFF_MULTICAST;
518 if (!ipmr_init_vif_indev(dev))
519 goto failure;
520 if (dev_open(dev, NULL))
521 goto failure;
522 dev_hold(dev);
523 }
524 }
525 return dev;
526
527failure:
528 unregister_netdevice(dev);
529 return NULL;
530}
531
532#if defined(CONFIG_IP_PIMSM_V1) || defined(CONFIG_IP_PIMSM_V2)
533static netdev_tx_t reg_vif_xmit(struct sk_buff *skb, struct net_device *dev)
534{
535 struct net *net = dev_net(dev);
536 struct mr_table *mrt;
537 struct flowi4 fl4 = {
538 .flowi4_oif = dev->ifindex,
539 .flowi4_iif = skb->skb_iif ? : LOOPBACK_IFINDEX,
540 .flowi4_mark = skb->mark,
541 };
542 int err;
543
544 err = ipmr_fib_lookup(net, &fl4, &mrt);
545 if (err < 0) {
546 kfree_skb(skb);
547 return err;
548 }
549
550 read_lock(&mrt_lock);
551 dev->stats.tx_bytes += skb->len;
552 dev->stats.tx_packets++;
553 ipmr_cache_report(mrt, skb, mrt->mroute_reg_vif_num, IGMPMSG_WHOLEPKT);
554 read_unlock(&mrt_lock);
555 kfree_skb(skb);
556 return NETDEV_TX_OK;
557}
558
559static int reg_vif_get_iflink(const struct net_device *dev)
560{
561 return 0;
562}
563
564static const struct net_device_ops reg_vif_netdev_ops = {
565 .ndo_start_xmit = reg_vif_xmit,
566 .ndo_get_iflink = reg_vif_get_iflink,
567};
568
569static void reg_vif_setup(struct net_device *dev)
570{
571 dev->type = ARPHRD_PIMREG;
572 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 8;
573 dev->flags = IFF_NOARP;
574 dev->netdev_ops = &reg_vif_netdev_ops;
575 dev->needs_free_netdev = true;
576 dev->features |= NETIF_F_NETNS_LOCAL;
577}
578
579static struct net_device *ipmr_reg_vif(struct net *net, struct mr_table *mrt)
580{
581 struct net_device *dev;
582 char name[IFNAMSIZ];
583
584 if (mrt->id == RT_TABLE_DEFAULT)
585 sprintf(name, "pimreg");
586 else
587 sprintf(name, "pimreg%u", mrt->id);
588
589 dev = alloc_netdev(0, name, NET_NAME_UNKNOWN, reg_vif_setup);
590
591 if (!dev)
592 return NULL;
593
594 dev_net_set(dev, net);
595
596 if (register_netdevice(dev)) {
597 free_netdev(dev);
598 return NULL;
599 }
600
601 if (!ipmr_init_vif_indev(dev))
602 goto failure;
603 if (dev_open(dev, NULL))
604 goto failure;
605
606 dev_hold(dev);
607
608 return dev;
609
610failure:
611 unregister_netdevice(dev);
612 return NULL;
613}
614
615/* called with rcu_read_lock() */
616static int __pim_rcv(struct mr_table *mrt, struct sk_buff *skb,
617 unsigned int pimlen)
618{
619 struct net_device *reg_dev = NULL;
620 struct iphdr *encap;
621
622 encap = (struct iphdr *)(skb_transport_header(skb) + pimlen);
623 /* Check that:
624 * a. packet is really sent to a multicast group
625 * b. packet is not a NULL-REGISTER
626 * c. packet is not truncated
627 */
628 if (!ipv4_is_multicast(encap->daddr) ||
629 encap->tot_len == 0 ||
630 ntohs(encap->tot_len) + pimlen > skb->len)
631 return 1;
632
633 read_lock(&mrt_lock);
634 if (mrt->mroute_reg_vif_num >= 0)
635 reg_dev = mrt->vif_table[mrt->mroute_reg_vif_num].dev;
636 read_unlock(&mrt_lock);
637
638 if (!reg_dev)
639 return 1;
640
641 skb->mac_header = skb->network_header;
642 skb_pull(skb, (u8 *)encap - skb->data);
643 skb_reset_network_header(skb);
644 skb->protocol = htons(ETH_P_IP);
645 skb->ip_summed = CHECKSUM_NONE;
646
647 skb_tunnel_rx(skb, reg_dev, dev_net(reg_dev));
648
649 netif_rx(skb);
650
651 return NET_RX_SUCCESS;
652}
653#else
654static struct net_device *ipmr_reg_vif(struct net *net, struct mr_table *mrt)
655{
656 return NULL;
657}
658#endif
659
660static int call_ipmr_vif_entry_notifiers(struct net *net,
661 enum fib_event_type event_type,
662 struct vif_device *vif,
663 vifi_t vif_index, u32 tb_id)
664{
665 return mr_call_vif_notifiers(net, RTNL_FAMILY_IPMR, event_type,
666 vif, vif_index, tb_id,
667 &net->ipv4.ipmr_seq);
668}
669
670static int call_ipmr_mfc_entry_notifiers(struct net *net,
671 enum fib_event_type event_type,
672 struct mfc_cache *mfc, u32 tb_id)
673{
674 return mr_call_mfc_notifiers(net, RTNL_FAMILY_IPMR, event_type,
675 &mfc->_c, tb_id, &net->ipv4.ipmr_seq);
676}
677
678/**
679 * vif_delete - Delete a VIF entry
680 * @notify: Set to 1, if the caller is a notifier_call
681 */
682static int vif_delete(struct mr_table *mrt, int vifi, int notify,
683 struct list_head *head)
684{
685 struct net *net = read_pnet(&mrt->net);
686 struct vif_device *v;
687 struct net_device *dev;
688 struct in_device *in_dev;
689
690 if (vifi < 0 || vifi >= mrt->maxvif)
691 return -EADDRNOTAVAIL;
692
693 v = &mrt->vif_table[vifi];
694
695 if (VIF_EXISTS(mrt, vifi))
696 call_ipmr_vif_entry_notifiers(net, FIB_EVENT_VIF_DEL, v, vifi,
697 mrt->id);
698
699 write_lock_bh(&mrt_lock);
700 dev = v->dev;
701 v->dev = NULL;
702
703 if (!dev) {
704 write_unlock_bh(&mrt_lock);
705 return -EADDRNOTAVAIL;
706 }
707
708 if (vifi == mrt->mroute_reg_vif_num)
709 mrt->mroute_reg_vif_num = -1;
710
711 if (vifi + 1 == mrt->maxvif) {
712 int tmp;
713
714 for (tmp = vifi - 1; tmp >= 0; tmp--) {
715 if (VIF_EXISTS(mrt, tmp))
716 break;
717 }
718 mrt->maxvif = tmp+1;
719 }
720
721 write_unlock_bh(&mrt_lock);
722
723 dev_set_allmulti(dev, -1);
724
725 in_dev = __in_dev_get_rtnl(dev);
726 if (in_dev) {
727 IPV4_DEVCONF(in_dev->cnf, MC_FORWARDING)--;
728 inet_netconf_notify_devconf(dev_net(dev), RTM_NEWNETCONF,
729 NETCONFA_MC_FORWARDING,
730 dev->ifindex, &in_dev->cnf);
731 ip_rt_multicast_event(in_dev);
732 }
733
734 if (v->flags & (VIFF_TUNNEL | VIFF_REGISTER) && !notify)
735 unregister_netdevice_queue(dev, head);
736
737 dev_put(dev);
738 return 0;
739}
740
741static void ipmr_cache_free_rcu(struct rcu_head *head)
742{
743 struct mr_mfc *c = container_of(head, struct mr_mfc, rcu);
744
745 kmem_cache_free(mrt_cachep, (struct mfc_cache *)c);
746}
747
748static void ipmr_cache_free(struct mfc_cache *c)
749{
750 call_rcu(&c->_c.rcu, ipmr_cache_free_rcu);
751}
752
753/* Destroy an unresolved cache entry, killing queued skbs
754 * and reporting error to netlink readers.
755 */
756static void ipmr_destroy_unres(struct mr_table *mrt, struct mfc_cache *c)
757{
758 struct net *net = read_pnet(&mrt->net);
759 struct sk_buff *skb;
760 struct nlmsgerr *e;
761
762 atomic_dec(&mrt->cache_resolve_queue_len);
763
764 while ((skb = skb_dequeue(&c->_c.mfc_un.unres.unresolved))) {
765 if (ip_hdr(skb)->version == 0) {
766 struct nlmsghdr *nlh = skb_pull(skb,
767 sizeof(struct iphdr));
768 nlh->nlmsg_type = NLMSG_ERROR;
769 nlh->nlmsg_len = nlmsg_msg_size(sizeof(struct nlmsgerr));
770 skb_trim(skb, nlh->nlmsg_len);
771 e = nlmsg_data(nlh);
772 e->error = -ETIMEDOUT;
773 memset(&e->msg, 0, sizeof(e->msg));
774
775 rtnl_unicast(skb, net, NETLINK_CB(skb).portid);
776 } else {
777 kfree_skb(skb);
778 }
779 }
780
781 ipmr_cache_free(c);
782}
783
784/* Timer process for the unresolved queue. */
785static void ipmr_expire_process(struct timer_list *t)
786{
787 struct mr_table *mrt = from_timer(mrt, t, ipmr_expire_timer);
788 struct mr_mfc *c, *next;
789 unsigned long expires;
790 unsigned long now;
791
792 if (!spin_trylock(&mfc_unres_lock)) {
793 mod_timer(&mrt->ipmr_expire_timer, jiffies+HZ/10);
794 return;
795 }
796
797 if (list_empty(&mrt->mfc_unres_queue))
798 goto out;
799
800 now = jiffies;
801 expires = 10*HZ;
802
803 list_for_each_entry_safe(c, next, &mrt->mfc_unres_queue, list) {
804 if (time_after(c->mfc_un.unres.expires, now)) {
805 unsigned long interval = c->mfc_un.unres.expires - now;
806 if (interval < expires)
807 expires = interval;
808 continue;
809 }
810
811 list_del(&c->list);
812 mroute_netlink_event(mrt, (struct mfc_cache *)c, RTM_DELROUTE);
813 ipmr_destroy_unres(mrt, (struct mfc_cache *)c);
814 }
815
816 if (!list_empty(&mrt->mfc_unres_queue))
817 mod_timer(&mrt->ipmr_expire_timer, jiffies + expires);
818
819out:
820 spin_unlock(&mfc_unres_lock);
821}
822
823/* Fill oifs list. It is called under write locked mrt_lock. */
824static void ipmr_update_thresholds(struct mr_table *mrt, struct mr_mfc *cache,
825 unsigned char *ttls)
826{
827 int vifi;
828
829 cache->mfc_un.res.minvif = MAXVIFS;
830 cache->mfc_un.res.maxvif = 0;
831 memset(cache->mfc_un.res.ttls, 255, MAXVIFS);
832
833 for (vifi = 0; vifi < mrt->maxvif; vifi++) {
834 if (VIF_EXISTS(mrt, vifi) &&
835 ttls[vifi] && ttls[vifi] < 255) {
836 cache->mfc_un.res.ttls[vifi] = ttls[vifi];
837 if (cache->mfc_un.res.minvif > vifi)
838 cache->mfc_un.res.minvif = vifi;
839 if (cache->mfc_un.res.maxvif <= vifi)
840 cache->mfc_un.res.maxvif = vifi + 1;
841 }
842 }
843 cache->mfc_un.res.lastuse = jiffies;
844}
845
846static int vif_add(struct net *net, struct mr_table *mrt,
847 struct vifctl *vifc, int mrtsock)
848{
849 struct netdev_phys_item_id ppid = { };
850 int vifi = vifc->vifc_vifi;
851 struct vif_device *v = &mrt->vif_table[vifi];
852 struct net_device *dev;
853 struct in_device *in_dev;
854 int err;
855
856 /* Is vif busy ? */
857 if (VIF_EXISTS(mrt, vifi))
858 return -EADDRINUSE;
859
860 switch (vifc->vifc_flags) {
861 case VIFF_REGISTER:
862 if (!ipmr_pimsm_enabled())
863 return -EINVAL;
864 /* Special Purpose VIF in PIM
865 * All the packets will be sent to the daemon
866 */
867 if (mrt->mroute_reg_vif_num >= 0)
868 return -EADDRINUSE;
869 dev = ipmr_reg_vif(net, mrt);
870 if (!dev)
871 return -ENOBUFS;
872 err = dev_set_allmulti(dev, 1);
873 if (err) {
874 unregister_netdevice(dev);
875 dev_put(dev);
876 return err;
877 }
878 break;
879 case VIFF_TUNNEL:
880 dev = ipmr_new_tunnel(net, vifc);
881 if (!dev)
882 return -ENOBUFS;
883 err = dev_set_allmulti(dev, 1);
884 if (err) {
885 ipmr_del_tunnel(dev, vifc);
886 dev_put(dev);
887 return err;
888 }
889 break;
890 case VIFF_USE_IFINDEX:
891 case 0:
892 if (vifc->vifc_flags == VIFF_USE_IFINDEX) {
893 dev = dev_get_by_index(net, vifc->vifc_lcl_ifindex);
894 if (dev && !__in_dev_get_rtnl(dev)) {
895 dev_put(dev);
896 return -EADDRNOTAVAIL;
897 }
898 } else {
899 dev = ip_dev_find(net, vifc->vifc_lcl_addr.s_addr);
900 }
901 if (!dev)
902 return -EADDRNOTAVAIL;
903 err = dev_set_allmulti(dev, 1);
904 if (err) {
905 dev_put(dev);
906 return err;
907 }
908 break;
909 default:
910 return -EINVAL;
911 }
912
913 in_dev = __in_dev_get_rtnl(dev);
914 if (!in_dev) {
915 dev_put(dev);
916 return -EADDRNOTAVAIL;
917 }
918 IPV4_DEVCONF(in_dev->cnf, MC_FORWARDING)++;
919 inet_netconf_notify_devconf(net, RTM_NEWNETCONF, NETCONFA_MC_FORWARDING,
920 dev->ifindex, &in_dev->cnf);
921 ip_rt_multicast_event(in_dev);
922
923 /* Fill in the VIF structures */
924 vif_device_init(v, dev, vifc->vifc_rate_limit,
925 vifc->vifc_threshold,
926 vifc->vifc_flags | (!mrtsock ? VIFF_STATIC : 0),
927 (VIFF_TUNNEL | VIFF_REGISTER));
928
929 err = dev_get_port_parent_id(dev, &ppid, true);
930 if (err == 0) {
931 memcpy(v->dev_parent_id.id, ppid.id, ppid.id_len);
932 v->dev_parent_id.id_len = ppid.id_len;
933 } else {
934 v->dev_parent_id.id_len = 0;
935 }
936
937 v->local = vifc->vifc_lcl_addr.s_addr;
938 v->remote = vifc->vifc_rmt_addr.s_addr;
939
940 /* And finish update writing critical data */
941 write_lock_bh(&mrt_lock);
942 v->dev = dev;
943 if (v->flags & VIFF_REGISTER)
944 mrt->mroute_reg_vif_num = vifi;
945 if (vifi+1 > mrt->maxvif)
946 mrt->maxvif = vifi+1;
947 write_unlock_bh(&mrt_lock);
948 call_ipmr_vif_entry_notifiers(net, FIB_EVENT_VIF_ADD, v, vifi, mrt->id);
949 return 0;
950}
951
952/* called with rcu_read_lock() */
953static struct mfc_cache *ipmr_cache_find(struct mr_table *mrt,
954 __be32 origin,
955 __be32 mcastgrp)
956{
957 struct mfc_cache_cmp_arg arg = {
958 .mfc_mcastgrp = mcastgrp,
959 .mfc_origin = origin
960 };
961
962 return mr_mfc_find(mrt, &arg);
963}
964
965/* Look for a (*,G) entry */
966static struct mfc_cache *ipmr_cache_find_any(struct mr_table *mrt,
967 __be32 mcastgrp, int vifi)
968{
969 struct mfc_cache_cmp_arg arg = {
970 .mfc_mcastgrp = mcastgrp,
971 .mfc_origin = htonl(INADDR_ANY)
972 };
973
974 if (mcastgrp == htonl(INADDR_ANY))
975 return mr_mfc_find_any_parent(mrt, vifi);
976 return mr_mfc_find_any(mrt, vifi, &arg);
977}
978
979/* Look for a (S,G,iif) entry if parent != -1 */
980static struct mfc_cache *ipmr_cache_find_parent(struct mr_table *mrt,
981 __be32 origin, __be32 mcastgrp,
982 int parent)
983{
984 struct mfc_cache_cmp_arg arg = {
985 .mfc_mcastgrp = mcastgrp,
986 .mfc_origin = origin,
987 };
988
989 return mr_mfc_find_parent(mrt, &arg, parent);
990}
991
992/* Allocate a multicast cache entry */
993static struct mfc_cache *ipmr_cache_alloc(void)
994{
995 struct mfc_cache *c = kmem_cache_zalloc(mrt_cachep, GFP_KERNEL);
996
997 if (c) {
998 c->_c.mfc_un.res.last_assert = jiffies - MFC_ASSERT_THRESH - 1;
999 c->_c.mfc_un.res.minvif = MAXVIFS;
1000 c->_c.free = ipmr_cache_free_rcu;
1001 refcount_set(&c->_c.mfc_un.res.refcount, 1);
1002 }
1003 return c;
1004}
1005
1006static struct mfc_cache *ipmr_cache_alloc_unres(void)
1007{
1008 struct mfc_cache *c = kmem_cache_zalloc(mrt_cachep, GFP_ATOMIC);
1009
1010 if (c) {
1011 skb_queue_head_init(&c->_c.mfc_un.unres.unresolved);
1012 c->_c.mfc_un.unres.expires = jiffies + 10 * HZ;
1013 }
1014 return c;
1015}
1016
1017/* A cache entry has gone into a resolved state from queued */
1018static void ipmr_cache_resolve(struct net *net, struct mr_table *mrt,
1019 struct mfc_cache *uc, struct mfc_cache *c)
1020{
1021 struct sk_buff *skb;
1022 struct nlmsgerr *e;
1023
1024 /* Play the pending entries through our router */
1025 while ((skb = __skb_dequeue(&uc->_c.mfc_un.unres.unresolved))) {
1026 if (ip_hdr(skb)->version == 0) {
1027 struct nlmsghdr *nlh = skb_pull(skb,
1028 sizeof(struct iphdr));
1029
1030 if (mr_fill_mroute(mrt, skb, &c->_c,
1031 nlmsg_data(nlh)) > 0) {
1032 nlh->nlmsg_len = skb_tail_pointer(skb) -
1033 (u8 *)nlh;
1034 } else {
1035 nlh->nlmsg_type = NLMSG_ERROR;
1036 nlh->nlmsg_len = nlmsg_msg_size(sizeof(struct nlmsgerr));
1037 skb_trim(skb, nlh->nlmsg_len);
1038 e = nlmsg_data(nlh);
1039 e->error = -EMSGSIZE;
1040 memset(&e->msg, 0, sizeof(e->msg));
1041 }
1042
1043 rtnl_unicast(skb, net, NETLINK_CB(skb).portid);
1044 } else {
1045 ip_mr_forward(net, mrt, skb->dev, skb, c, 0);
1046 }
1047 }
1048}
1049
1050/* Bounce a cache query up to mrouted and netlink.
1051 *
1052 * Called under mrt_lock.
1053 */
1054static int ipmr_cache_report(struct mr_table *mrt,
1055 struct sk_buff *pkt, vifi_t vifi, int assert)
1056{
1057 const int ihl = ip_hdrlen(pkt);
1058 struct sock *mroute_sk;
1059 struct igmphdr *igmp;
1060 struct igmpmsg *msg;
1061 struct sk_buff *skb;
1062 int ret;
1063
1064 if (assert == IGMPMSG_WHOLEPKT || assert == IGMPMSG_WRVIFWHOLE)
1065 skb = skb_realloc_headroom(pkt, sizeof(struct iphdr));
1066 else
1067 skb = alloc_skb(128, GFP_ATOMIC);
1068
1069 if (!skb)
1070 return -ENOBUFS;
1071
1072 if (assert == IGMPMSG_WHOLEPKT || assert == IGMPMSG_WRVIFWHOLE) {
1073 /* Ugly, but we have no choice with this interface.
1074 * Duplicate old header, fix ihl, length etc.
1075 * And all this only to mangle msg->im_msgtype and
1076 * to set msg->im_mbz to "mbz" :-)
1077 */
1078 skb_push(skb, sizeof(struct iphdr));
1079 skb_reset_network_header(skb);
1080 skb_reset_transport_header(skb);
1081 msg = (struct igmpmsg *)skb_network_header(skb);
1082 memcpy(msg, skb_network_header(pkt), sizeof(struct iphdr));
1083 msg->im_msgtype = assert;
1084 msg->im_mbz = 0;
1085 if (assert == IGMPMSG_WRVIFWHOLE)
1086 msg->im_vif = vifi;
1087 else
1088 msg->im_vif = mrt->mroute_reg_vif_num;
1089 ip_hdr(skb)->ihl = sizeof(struct iphdr) >> 2;
1090 ip_hdr(skb)->tot_len = htons(ntohs(ip_hdr(pkt)->tot_len) +
1091 sizeof(struct iphdr));
1092 } else {
1093 /* Copy the IP header */
1094 skb_set_network_header(skb, skb->len);
1095 skb_put(skb, ihl);
1096 skb_copy_to_linear_data(skb, pkt->data, ihl);
1097 /* Flag to the kernel this is a route add */
1098 ip_hdr(skb)->protocol = 0;
1099 msg = (struct igmpmsg *)skb_network_header(skb);
1100 msg->im_vif = vifi;
1101 skb_dst_set(skb, dst_clone(skb_dst(pkt)));
1102 /* Add our header */
1103 igmp = skb_put(skb, sizeof(struct igmphdr));
1104 igmp->type = assert;
1105 msg->im_msgtype = assert;
1106 igmp->code = 0;
1107 ip_hdr(skb)->tot_len = htons(skb->len); /* Fix the length */
1108 skb->transport_header = skb->network_header;
1109 }
1110
1111 rcu_read_lock();
1112 mroute_sk = rcu_dereference(mrt->mroute_sk);
1113 if (!mroute_sk) {
1114 rcu_read_unlock();
1115 kfree_skb(skb);
1116 return -EINVAL;
1117 }
1118
1119 igmpmsg_netlink_event(mrt, skb);
1120
1121 /* Deliver to mrouted */
1122 ret = sock_queue_rcv_skb(mroute_sk, skb);
1123 rcu_read_unlock();
1124 if (ret < 0) {
1125 net_warn_ratelimited("mroute: pending queue full, dropping entries\n");
1126 kfree_skb(skb);
1127 }
1128
1129 return ret;
1130}
1131
1132/* Queue a packet for resolution. It gets locked cache entry! */
1133static int ipmr_cache_unresolved(struct mr_table *mrt, vifi_t vifi,
1134 struct sk_buff *skb, struct net_device *dev)
1135{
1136 const struct iphdr *iph = ip_hdr(skb);
1137 struct mfc_cache *c;
1138 bool found = false;
1139 int err;
1140
1141 spin_lock_bh(&mfc_unres_lock);
1142 list_for_each_entry(c, &mrt->mfc_unres_queue, _c.list) {
1143 if (c->mfc_mcastgrp == iph->daddr &&
1144 c->mfc_origin == iph->saddr) {
1145 found = true;
1146 break;
1147 }
1148 }
1149
1150 if (!found) {
1151 /* Create a new entry if allowable */
1152 c = ipmr_cache_alloc_unres();
1153 if (!c) {
1154 spin_unlock_bh(&mfc_unres_lock);
1155
1156 kfree_skb(skb);
1157 return -ENOBUFS;
1158 }
1159
1160 /* Fill in the new cache entry */
1161 c->_c.mfc_parent = -1;
1162 c->mfc_origin = iph->saddr;
1163 c->mfc_mcastgrp = iph->daddr;
1164
1165 /* Reflect first query at mrouted. */
1166 err = ipmr_cache_report(mrt, skb, vifi, IGMPMSG_NOCACHE);
1167
1168 if (err < 0) {
1169 /* If the report failed throw the cache entry
1170 out - Brad Parker
1171 */
1172 spin_unlock_bh(&mfc_unres_lock);
1173
1174 ipmr_cache_free(c);
1175 kfree_skb(skb);
1176 return err;
1177 }
1178
1179 atomic_inc(&mrt->cache_resolve_queue_len);
1180 list_add(&c->_c.list, &mrt->mfc_unres_queue);
1181 mroute_netlink_event(mrt, c, RTM_NEWROUTE);
1182
1183 if (atomic_read(&mrt->cache_resolve_queue_len) == 1)
1184 mod_timer(&mrt->ipmr_expire_timer,
1185 c->_c.mfc_un.unres.expires);
1186 }
1187
1188 /* See if we can append the packet */
1189 if (c->_c.mfc_un.unres.unresolved.qlen > 3) {
1190 kfree_skb(skb);
1191 err = -ENOBUFS;
1192 } else {
1193 if (dev) {
1194 skb->dev = dev;
1195 skb->skb_iif = dev->ifindex;
1196 }
1197 skb_queue_tail(&c->_c.mfc_un.unres.unresolved, skb);
1198 err = 0;
1199 }
1200
1201 spin_unlock_bh(&mfc_unres_lock);
1202 return err;
1203}
1204
1205/* MFC cache manipulation by user space mroute daemon */
1206
1207static int ipmr_mfc_delete(struct mr_table *mrt, struct mfcctl *mfc, int parent)
1208{
1209 struct net *net = read_pnet(&mrt->net);
1210 struct mfc_cache *c;
1211
1212 /* The entries are added/deleted only under RTNL */
1213 rcu_read_lock();
1214 c = ipmr_cache_find_parent(mrt, mfc->mfcc_origin.s_addr,
1215 mfc->mfcc_mcastgrp.s_addr, parent);
1216 rcu_read_unlock();
1217 if (!c)
1218 return -ENOENT;
1219 rhltable_remove(&mrt->mfc_hash, &c->_c.mnode, ipmr_rht_params);
1220 list_del_rcu(&c->_c.list);
1221 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_DEL, c, mrt->id);
1222 mroute_netlink_event(mrt, c, RTM_DELROUTE);
1223 mr_cache_put(&c->_c);
1224
1225 return 0;
1226}
1227
1228static int ipmr_mfc_add(struct net *net, struct mr_table *mrt,
1229 struct mfcctl *mfc, int mrtsock, int parent)
1230{
1231 struct mfc_cache *uc, *c;
1232 struct mr_mfc *_uc;
1233 bool found;
1234 int ret;
1235
1236 if (mfc->mfcc_parent >= MAXVIFS)
1237 return -ENFILE;
1238
1239 /* The entries are added/deleted only under RTNL */
1240 rcu_read_lock();
1241 c = ipmr_cache_find_parent(mrt, mfc->mfcc_origin.s_addr,
1242 mfc->mfcc_mcastgrp.s_addr, parent);
1243 rcu_read_unlock();
1244 if (c) {
1245 write_lock_bh(&mrt_lock);
1246 c->_c.mfc_parent = mfc->mfcc_parent;
1247 ipmr_update_thresholds(mrt, &c->_c, mfc->mfcc_ttls);
1248 if (!mrtsock)
1249 c->_c.mfc_flags |= MFC_STATIC;
1250 write_unlock_bh(&mrt_lock);
1251 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_REPLACE, c,
1252 mrt->id);
1253 mroute_netlink_event(mrt, c, RTM_NEWROUTE);
1254 return 0;
1255 }
1256
1257 if (mfc->mfcc_mcastgrp.s_addr != htonl(INADDR_ANY) &&
1258 !ipv4_is_multicast(mfc->mfcc_mcastgrp.s_addr))
1259 return -EINVAL;
1260
1261 c = ipmr_cache_alloc();
1262 if (!c)
1263 return -ENOMEM;
1264
1265 c->mfc_origin = mfc->mfcc_origin.s_addr;
1266 c->mfc_mcastgrp = mfc->mfcc_mcastgrp.s_addr;
1267 c->_c.mfc_parent = mfc->mfcc_parent;
1268 ipmr_update_thresholds(mrt, &c->_c, mfc->mfcc_ttls);
1269 if (!mrtsock)
1270 c->_c.mfc_flags |= MFC_STATIC;
1271
1272 ret = rhltable_insert_key(&mrt->mfc_hash, &c->cmparg, &c->_c.mnode,
1273 ipmr_rht_params);
1274 if (ret) {
1275 pr_err("ipmr: rhtable insert error %d\n", ret);
1276 ipmr_cache_free(c);
1277 return ret;
1278 }
1279 list_add_tail_rcu(&c->_c.list, &mrt->mfc_cache_list);
1280 /* Check to see if we resolved a queued list. If so we
1281 * need to send on the frames and tidy up.
1282 */
1283 found = false;
1284 spin_lock_bh(&mfc_unres_lock);
1285 list_for_each_entry(_uc, &mrt->mfc_unres_queue, list) {
1286 uc = (struct mfc_cache *)_uc;
1287 if (uc->mfc_origin == c->mfc_origin &&
1288 uc->mfc_mcastgrp == c->mfc_mcastgrp) {
1289 list_del(&_uc->list);
1290 atomic_dec(&mrt->cache_resolve_queue_len);
1291 found = true;
1292 break;
1293 }
1294 }
1295 if (list_empty(&mrt->mfc_unres_queue))
1296 del_timer(&mrt->ipmr_expire_timer);
1297 spin_unlock_bh(&mfc_unres_lock);
1298
1299 if (found) {
1300 ipmr_cache_resolve(net, mrt, uc, c);
1301 ipmr_cache_free(uc);
1302 }
1303 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_ADD, c, mrt->id);
1304 mroute_netlink_event(mrt, c, RTM_NEWROUTE);
1305 return 0;
1306}
1307
1308/* Close the multicast socket, and clear the vif tables etc */
1309static void mroute_clean_tables(struct mr_table *mrt, int flags)
1310{
1311 struct net *net = read_pnet(&mrt->net);
1312 struct mr_mfc *c, *tmp;
1313 struct mfc_cache *cache;
1314 LIST_HEAD(list);
1315 int i;
1316
1317 /* Shut down all active vif entries */
1318 if (flags & (MRT_FLUSH_VIFS | MRT_FLUSH_VIFS_STATIC)) {
1319 for (i = 0; i < mrt->maxvif; i++) {
1320 if (((mrt->vif_table[i].flags & VIFF_STATIC) &&
1321 !(flags & MRT_FLUSH_VIFS_STATIC)) ||
1322 (!(mrt->vif_table[i].flags & VIFF_STATIC) && !(flags & MRT_FLUSH_VIFS)))
1323 continue;
1324 vif_delete(mrt, i, 0, &list);
1325 }
1326 unregister_netdevice_many(&list);
1327 }
1328
1329 /* Wipe the cache */
1330 if (flags & (MRT_FLUSH_MFC | MRT_FLUSH_MFC_STATIC)) {
1331 list_for_each_entry_safe(c, tmp, &mrt->mfc_cache_list, list) {
1332 if (((c->mfc_flags & MFC_STATIC) && !(flags & MRT_FLUSH_MFC_STATIC)) ||
1333 (!(c->mfc_flags & MFC_STATIC) && !(flags & MRT_FLUSH_MFC)))
1334 continue;
1335 rhltable_remove(&mrt->mfc_hash, &c->mnode, ipmr_rht_params);
1336 list_del_rcu(&c->list);
1337 cache = (struct mfc_cache *)c;
1338 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_DEL, cache,
1339 mrt->id);
1340 mroute_netlink_event(mrt, cache, RTM_DELROUTE);
1341 mr_cache_put(c);
1342 }
1343 }
1344
1345 if (flags & MRT_FLUSH_MFC) {
1346 if (atomic_read(&mrt->cache_resolve_queue_len) != 0) {
1347 spin_lock_bh(&mfc_unres_lock);
1348 list_for_each_entry_safe(c, tmp, &mrt->mfc_unres_queue, list) {
1349 list_del(&c->list);
1350 cache = (struct mfc_cache *)c;
1351 mroute_netlink_event(mrt, cache, RTM_DELROUTE);
1352 ipmr_destroy_unres(mrt, cache);
1353 }
1354 spin_unlock_bh(&mfc_unres_lock);
1355 }
1356 }
1357}
1358
1359/* called from ip_ra_control(), before an RCU grace period,
1360 * we dont need to call synchronize_rcu() here
1361 */
1362static void mrtsock_destruct(struct sock *sk)
1363{
1364 struct net *net = sock_net(sk);
1365 struct mr_table *mrt;
1366
1367 rtnl_lock();
1368 ipmr_for_each_table(mrt, net) {
1369 if (sk == rtnl_dereference(mrt->mroute_sk)) {
1370 IPV4_DEVCONF_ALL(net, MC_FORWARDING)--;
1371 inet_netconf_notify_devconf(net, RTM_NEWNETCONF,
1372 NETCONFA_MC_FORWARDING,
1373 NETCONFA_IFINDEX_ALL,
1374 net->ipv4.devconf_all);
1375 RCU_INIT_POINTER(mrt->mroute_sk, NULL);
1376 mroute_clean_tables(mrt, MRT_FLUSH_VIFS | MRT_FLUSH_MFC);
1377 }
1378 }
1379 rtnl_unlock();
1380}
1381
1382/* Socket options and virtual interface manipulation. The whole
1383 * virtual interface system is a complete heap, but unfortunately
1384 * that's how BSD mrouted happens to think. Maybe one day with a proper
1385 * MOSPF/PIM router set up we can clean this up.
1386 */
1387
1388int ip_mroute_setsockopt(struct sock *sk, int optname, char __user *optval,
1389 unsigned int optlen)
1390{
1391 struct net *net = sock_net(sk);
1392 int val, ret = 0, parent = 0;
1393 struct mr_table *mrt;
1394 struct vifctl vif;
1395 struct mfcctl mfc;
1396 bool do_wrvifwhole;
1397 u32 uval;
1398
1399 /* There's one exception to the lock - MRT_DONE which needs to unlock */
1400 rtnl_lock();
1401 if (sk->sk_type != SOCK_RAW ||
1402 inet_sk(sk)->inet_num != IPPROTO_IGMP) {
1403 ret = -EOPNOTSUPP;
1404 goto out_unlock;
1405 }
1406
1407 mrt = __ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
1408 if (!mrt) {
1409 ret = -ENOENT;
1410 goto out_unlock;
1411 }
1412 if (optname != MRT_INIT) {
1413 if (sk != rcu_access_pointer(mrt->mroute_sk) &&
1414 !ns_capable(net->user_ns, CAP_NET_ADMIN)) {
1415 ret = -EACCES;
1416 goto out_unlock;
1417 }
1418 }
1419
1420 switch (optname) {
1421 case MRT_INIT:
1422 if (optlen != sizeof(int)) {
1423 ret = -EINVAL;
1424 break;
1425 }
1426 if (rtnl_dereference(mrt->mroute_sk)) {
1427 ret = -EADDRINUSE;
1428 break;
1429 }
1430
1431 ret = ip_ra_control(sk, 1, mrtsock_destruct);
1432 if (ret == 0) {
1433 rcu_assign_pointer(mrt->mroute_sk, sk);
1434 IPV4_DEVCONF_ALL(net, MC_FORWARDING)++;
1435 inet_netconf_notify_devconf(net, RTM_NEWNETCONF,
1436 NETCONFA_MC_FORWARDING,
1437 NETCONFA_IFINDEX_ALL,
1438 net->ipv4.devconf_all);
1439 }
1440 break;
1441 case MRT_DONE:
1442 if (sk != rcu_access_pointer(mrt->mroute_sk)) {
1443 ret = -EACCES;
1444 } else {
1445 /* We need to unlock here because mrtsock_destruct takes
1446 * care of rtnl itself and we can't change that due to
1447 * the IP_ROUTER_ALERT setsockopt which runs without it.
1448 */
1449 rtnl_unlock();
1450 ret = ip_ra_control(sk, 0, NULL);
1451 goto out;
1452 }
1453 break;
1454 case MRT_ADD_VIF:
1455 case MRT_DEL_VIF:
1456 if (optlen != sizeof(vif)) {
1457 ret = -EINVAL;
1458 break;
1459 }
1460 if (copy_from_user(&vif, optval, sizeof(vif))) {
1461 ret = -EFAULT;
1462 break;
1463 }
1464 if (vif.vifc_vifi >= MAXVIFS) {
1465 ret = -ENFILE;
1466 break;
1467 }
1468 if (optname == MRT_ADD_VIF) {
1469 ret = vif_add(net, mrt, &vif,
1470 sk == rtnl_dereference(mrt->mroute_sk));
1471 } else {
1472 ret = vif_delete(mrt, vif.vifc_vifi, 0, NULL);
1473 }
1474 break;
1475 /* Manipulate the forwarding caches. These live
1476 * in a sort of kernel/user symbiosis.
1477 */
1478 case MRT_ADD_MFC:
1479 case MRT_DEL_MFC:
1480 parent = -1;
1481 /* fall through */
1482 case MRT_ADD_MFC_PROXY:
1483 case MRT_DEL_MFC_PROXY:
1484 if (optlen != sizeof(mfc)) {
1485 ret = -EINVAL;
1486 break;
1487 }
1488 if (copy_from_user(&mfc, optval, sizeof(mfc))) {
1489 ret = -EFAULT;
1490 break;
1491 }
1492 if (parent == 0)
1493 parent = mfc.mfcc_parent;
1494 if (optname == MRT_DEL_MFC || optname == MRT_DEL_MFC_PROXY)
1495 ret = ipmr_mfc_delete(mrt, &mfc, parent);
1496 else
1497 ret = ipmr_mfc_add(net, mrt, &mfc,
1498 sk == rtnl_dereference(mrt->mroute_sk),
1499 parent);
1500 break;
1501 case MRT_FLUSH:
1502 if (optlen != sizeof(val)) {
1503 ret = -EINVAL;
1504 break;
1505 }
1506 if (get_user(val, (int __user *)optval)) {
1507 ret = -EFAULT;
1508 break;
1509 }
1510 mroute_clean_tables(mrt, val);
1511 break;
1512 /* Control PIM assert. */
1513 case MRT_ASSERT:
1514 if (optlen != sizeof(val)) {
1515 ret = -EINVAL;
1516 break;
1517 }
1518 if (get_user(val, (int __user *)optval)) {
1519 ret = -EFAULT;
1520 break;
1521 }
1522 mrt->mroute_do_assert = val;
1523 break;
1524 case MRT_PIM:
1525 if (!ipmr_pimsm_enabled()) {
1526 ret = -ENOPROTOOPT;
1527 break;
1528 }
1529 if (optlen != sizeof(val)) {
1530 ret = -EINVAL;
1531 break;
1532 }
1533 if (get_user(val, (int __user *)optval)) {
1534 ret = -EFAULT;
1535 break;
1536 }
1537
1538 do_wrvifwhole = (val == IGMPMSG_WRVIFWHOLE);
1539 val = !!val;
1540 if (val != mrt->mroute_do_pim) {
1541 mrt->mroute_do_pim = val;
1542 mrt->mroute_do_assert = val;
1543 mrt->mroute_do_wrvifwhole = do_wrvifwhole;
1544 }
1545 break;
1546 case MRT_TABLE:
1547 if (!IS_BUILTIN(CONFIG_IP_MROUTE_MULTIPLE_TABLES)) {
1548 ret = -ENOPROTOOPT;
1549 break;
1550 }
1551 if (optlen != sizeof(uval)) {
1552 ret = -EINVAL;
1553 break;
1554 }
1555 if (get_user(uval, (u32 __user *)optval)) {
1556 ret = -EFAULT;
1557 break;
1558 }
1559
1560 if (sk == rtnl_dereference(mrt->mroute_sk)) {
1561 ret = -EBUSY;
1562 } else {
1563 mrt = ipmr_new_table(net, uval);
1564 if (IS_ERR(mrt))
1565 ret = PTR_ERR(mrt);
1566 else
1567 raw_sk(sk)->ipmr_table = uval;
1568 }
1569 break;
1570 /* Spurious command, or MRT_VERSION which you cannot set. */
1571 default:
1572 ret = -ENOPROTOOPT;
1573 }
1574out_unlock:
1575 rtnl_unlock();
1576out:
1577 return ret;
1578}
1579
1580/* Getsock opt support for the multicast routing system. */
1581int ip_mroute_getsockopt(struct sock *sk, int optname, char __user *optval, int __user *optlen)
1582{
1583 int olr;
1584 int val;
1585 struct net *net = sock_net(sk);
1586 struct mr_table *mrt;
1587
1588 if (sk->sk_type != SOCK_RAW ||
1589 inet_sk(sk)->inet_num != IPPROTO_IGMP)
1590 return -EOPNOTSUPP;
1591
1592 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
1593 if (!mrt)
1594 return -ENOENT;
1595
1596 switch (optname) {
1597 case MRT_VERSION:
1598 val = 0x0305;
1599 break;
1600 case MRT_PIM:
1601 if (!ipmr_pimsm_enabled())
1602 return -ENOPROTOOPT;
1603 val = mrt->mroute_do_pim;
1604 break;
1605 case MRT_ASSERT:
1606 val = mrt->mroute_do_assert;
1607 break;
1608 default:
1609 return -ENOPROTOOPT;
1610 }
1611
1612 if (get_user(olr, optlen))
1613 return -EFAULT;
1614 olr = min_t(unsigned int, olr, sizeof(int));
1615 if (olr < 0)
1616 return -EINVAL;
1617 if (put_user(olr, optlen))
1618 return -EFAULT;
1619 if (copy_to_user(optval, &val, olr))
1620 return -EFAULT;
1621 return 0;
1622}
1623
1624/* The IP multicast ioctl support routines. */
1625int ipmr_ioctl(struct sock *sk, int cmd, void __user *arg)
1626{
1627 struct sioc_sg_req sr;
1628 struct sioc_vif_req vr;
1629 struct vif_device *vif;
1630 struct mfc_cache *c;
1631 struct net *net = sock_net(sk);
1632 struct mr_table *mrt;
1633
1634 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
1635 if (!mrt)
1636 return -ENOENT;
1637
1638 switch (cmd) {
1639 case SIOCGETVIFCNT:
1640 if (copy_from_user(&vr, arg, sizeof(vr)))
1641 return -EFAULT;
1642 if (vr.vifi >= mrt->maxvif)
1643 return -EINVAL;
1644 vr.vifi = array_index_nospec(vr.vifi, mrt->maxvif);
1645 read_lock(&mrt_lock);
1646 vif = &mrt->vif_table[vr.vifi];
1647 if (VIF_EXISTS(mrt, vr.vifi)) {
1648 vr.icount = vif->pkt_in;
1649 vr.ocount = vif->pkt_out;
1650 vr.ibytes = vif->bytes_in;
1651 vr.obytes = vif->bytes_out;
1652 read_unlock(&mrt_lock);
1653
1654 if (copy_to_user(arg, &vr, sizeof(vr)))
1655 return -EFAULT;
1656 return 0;
1657 }
1658 read_unlock(&mrt_lock);
1659 return -EADDRNOTAVAIL;
1660 case SIOCGETSGCNT:
1661 if (copy_from_user(&sr, arg, sizeof(sr)))
1662 return -EFAULT;
1663
1664 rcu_read_lock();
1665 c = ipmr_cache_find(mrt, sr.src.s_addr, sr.grp.s_addr);
1666 if (c) {
1667 sr.pktcnt = c->_c.mfc_un.res.pkt;
1668 sr.bytecnt = c->_c.mfc_un.res.bytes;
1669 sr.wrong_if = c->_c.mfc_un.res.wrong_if;
1670 rcu_read_unlock();
1671
1672 if (copy_to_user(arg, &sr, sizeof(sr)))
1673 return -EFAULT;
1674 return 0;
1675 }
1676 rcu_read_unlock();
1677 return -EADDRNOTAVAIL;
1678 default:
1679 return -ENOIOCTLCMD;
1680 }
1681}
1682
1683#ifdef CONFIG_COMPAT
1684struct compat_sioc_sg_req {
1685 struct in_addr src;
1686 struct in_addr grp;
1687 compat_ulong_t pktcnt;
1688 compat_ulong_t bytecnt;
1689 compat_ulong_t wrong_if;
1690};
1691
1692struct compat_sioc_vif_req {
1693 vifi_t vifi; /* Which iface */
1694 compat_ulong_t icount;
1695 compat_ulong_t ocount;
1696 compat_ulong_t ibytes;
1697 compat_ulong_t obytes;
1698};
1699
1700int ipmr_compat_ioctl(struct sock *sk, unsigned int cmd, void __user *arg)
1701{
1702 struct compat_sioc_sg_req sr;
1703 struct compat_sioc_vif_req vr;
1704 struct vif_device *vif;
1705 struct mfc_cache *c;
1706 struct net *net = sock_net(sk);
1707 struct mr_table *mrt;
1708
1709 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
1710 if (!mrt)
1711 return -ENOENT;
1712
1713 switch (cmd) {
1714 case SIOCGETVIFCNT:
1715 if (copy_from_user(&vr, arg, sizeof(vr)))
1716 return -EFAULT;
1717 if (vr.vifi >= mrt->maxvif)
1718 return -EINVAL;
1719 vr.vifi = array_index_nospec(vr.vifi, mrt->maxvif);
1720 read_lock(&mrt_lock);
1721 vif = &mrt->vif_table[vr.vifi];
1722 if (VIF_EXISTS(mrt, vr.vifi)) {
1723 vr.icount = vif->pkt_in;
1724 vr.ocount = vif->pkt_out;
1725 vr.ibytes = vif->bytes_in;
1726 vr.obytes = vif->bytes_out;
1727 read_unlock(&mrt_lock);
1728
1729 if (copy_to_user(arg, &vr, sizeof(vr)))
1730 return -EFAULT;
1731 return 0;
1732 }
1733 read_unlock(&mrt_lock);
1734 return -EADDRNOTAVAIL;
1735 case SIOCGETSGCNT:
1736 if (copy_from_user(&sr, arg, sizeof(sr)))
1737 return -EFAULT;
1738
1739 rcu_read_lock();
1740 c = ipmr_cache_find(mrt, sr.src.s_addr, sr.grp.s_addr);
1741 if (c) {
1742 sr.pktcnt = c->_c.mfc_un.res.pkt;
1743 sr.bytecnt = c->_c.mfc_un.res.bytes;
1744 sr.wrong_if = c->_c.mfc_un.res.wrong_if;
1745 rcu_read_unlock();
1746
1747 if (copy_to_user(arg, &sr, sizeof(sr)))
1748 return -EFAULT;
1749 return 0;
1750 }
1751 rcu_read_unlock();
1752 return -EADDRNOTAVAIL;
1753 default:
1754 return -ENOIOCTLCMD;
1755 }
1756}
1757#endif
1758
1759static int ipmr_device_event(struct notifier_block *this, unsigned long event, void *ptr)
1760{
1761 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1762 struct net *net = dev_net(dev);
1763 struct mr_table *mrt;
1764 struct vif_device *v;
1765 int ct;
1766
1767 if (event != NETDEV_UNREGISTER)
1768 return NOTIFY_DONE;
1769
1770 ipmr_for_each_table(mrt, net) {
1771 v = &mrt->vif_table[0];
1772 for (ct = 0; ct < mrt->maxvif; ct++, v++) {
1773 if (v->dev == dev)
1774 vif_delete(mrt, ct, 1, NULL);
1775 }
1776 }
1777 return NOTIFY_DONE;
1778}
1779
1780static struct notifier_block ip_mr_notifier = {
1781 .notifier_call = ipmr_device_event,
1782};
1783
1784/* Encapsulate a packet by attaching a valid IPIP header to it.
1785 * This avoids tunnel drivers and other mess and gives us the speed so
1786 * important for multicast video.
1787 */
1788static void ip_encap(struct net *net, struct sk_buff *skb,
1789 __be32 saddr, __be32 daddr)
1790{
1791 struct iphdr *iph;
1792 const struct iphdr *old_iph = ip_hdr(skb);
1793
1794 skb_push(skb, sizeof(struct iphdr));
1795 skb->transport_header = skb->network_header;
1796 skb_reset_network_header(skb);
1797 iph = ip_hdr(skb);
1798
1799 iph->version = 4;
1800 iph->tos = old_iph->tos;
1801 iph->ttl = old_iph->ttl;
1802 iph->frag_off = 0;
1803 iph->daddr = daddr;
1804 iph->saddr = saddr;
1805 iph->protocol = IPPROTO_IPIP;
1806 iph->ihl = 5;
1807 iph->tot_len = htons(skb->len);
1808 ip_select_ident(net, skb, NULL);
1809 ip_send_check(iph);
1810
1811 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
1812 nf_reset_ct(skb);
1813}
1814
1815static inline int ipmr_forward_finish(struct net *net, struct sock *sk,
1816 struct sk_buff *skb)
1817{
1818 struct ip_options *opt = &(IPCB(skb)->opt);
1819
1820 IP_INC_STATS(net, IPSTATS_MIB_OUTFORWDATAGRAMS);
1821 IP_ADD_STATS(net, IPSTATS_MIB_OUTOCTETS, skb->len);
1822
1823 if (unlikely(opt->optlen))
1824 ip_forward_options(skb);
1825
1826 return dst_output(net, sk, skb);
1827}
1828
1829#ifdef CONFIG_NET_SWITCHDEV
1830static bool ipmr_forward_offloaded(struct sk_buff *skb, struct mr_table *mrt,
1831 int in_vifi, int out_vifi)
1832{
1833 struct vif_device *out_vif = &mrt->vif_table[out_vifi];
1834 struct vif_device *in_vif = &mrt->vif_table[in_vifi];
1835
1836 if (!skb->offload_l3_fwd_mark)
1837 return false;
1838 if (!out_vif->dev_parent_id.id_len || !in_vif->dev_parent_id.id_len)
1839 return false;
1840 return netdev_phys_item_id_same(&out_vif->dev_parent_id,
1841 &in_vif->dev_parent_id);
1842}
1843#else
1844static bool ipmr_forward_offloaded(struct sk_buff *skb, struct mr_table *mrt,
1845 int in_vifi, int out_vifi)
1846{
1847 return false;
1848}
1849#endif
1850
1851/* Processing handlers for ipmr_forward */
1852
1853static void ipmr_queue_xmit(struct net *net, struct mr_table *mrt,
1854 int in_vifi, struct sk_buff *skb, int vifi)
1855{
1856 const struct iphdr *iph = ip_hdr(skb);
1857 struct vif_device *vif = &mrt->vif_table[vifi];
1858 struct net_device *dev;
1859 struct rtable *rt;
1860 struct flowi4 fl4;
1861 int encap = 0;
1862
1863 if (!vif->dev)
1864 goto out_free;
1865
1866 if (vif->flags & VIFF_REGISTER) {
1867 vif->pkt_out++;
1868 vif->bytes_out += skb->len;
1869 vif->dev->stats.tx_bytes += skb->len;
1870 vif->dev->stats.tx_packets++;
1871 ipmr_cache_report(mrt, skb, vifi, IGMPMSG_WHOLEPKT);
1872 goto out_free;
1873 }
1874
1875 if (ipmr_forward_offloaded(skb, mrt, in_vifi, vifi))
1876 goto out_free;
1877
1878 if (vif->flags & VIFF_TUNNEL) {
1879 rt = ip_route_output_ports(net, &fl4, NULL,
1880 vif->remote, vif->local,
1881 0, 0,
1882 IPPROTO_IPIP,
1883 RT_TOS(iph->tos), vif->link);
1884 if (IS_ERR(rt))
1885 goto out_free;
1886 encap = sizeof(struct iphdr);
1887 } else {
1888 rt = ip_route_output_ports(net, &fl4, NULL, iph->daddr, 0,
1889 0, 0,
1890 IPPROTO_IPIP,
1891 RT_TOS(iph->tos), vif->link);
1892 if (IS_ERR(rt))
1893 goto out_free;
1894 }
1895
1896 dev = rt->dst.dev;
1897
1898 if (skb->len+encap > dst_mtu(&rt->dst) && (ntohs(iph->frag_off) & IP_DF)) {
1899 /* Do not fragment multicasts. Alas, IPv4 does not
1900 * allow to send ICMP, so that packets will disappear
1901 * to blackhole.
1902 */
1903 IP_INC_STATS(net, IPSTATS_MIB_FRAGFAILS);
1904 ip_rt_put(rt);
1905 goto out_free;
1906 }
1907
1908 encap += LL_RESERVED_SPACE(dev) + rt->dst.header_len;
1909
1910 if (skb_cow(skb, encap)) {
1911 ip_rt_put(rt);
1912 goto out_free;
1913 }
1914
1915 vif->pkt_out++;
1916 vif->bytes_out += skb->len;
1917
1918 skb_dst_drop(skb);
1919 skb_dst_set(skb, &rt->dst);
1920 ip_decrease_ttl(ip_hdr(skb));
1921
1922 /* FIXME: forward and output firewalls used to be called here.
1923 * What do we do with netfilter? -- RR
1924 */
1925 if (vif->flags & VIFF_TUNNEL) {
1926 ip_encap(net, skb, vif->local, vif->remote);
1927 /* FIXME: extra output firewall step used to be here. --RR */
1928 vif->dev->stats.tx_packets++;
1929 vif->dev->stats.tx_bytes += skb->len;
1930 }
1931
1932 IPCB(skb)->flags |= IPSKB_FORWARDED;
1933
1934 /* RFC1584 teaches, that DVMRP/PIM router must deliver packets locally
1935 * not only before forwarding, but after forwarding on all output
1936 * interfaces. It is clear, if mrouter runs a multicasting
1937 * program, it should receive packets not depending to what interface
1938 * program is joined.
1939 * If we will not make it, the program will have to join on all
1940 * interfaces. On the other hand, multihoming host (or router, but
1941 * not mrouter) cannot join to more than one interface - it will
1942 * result in receiving multiple packets.
1943 */
1944 NF_HOOK(NFPROTO_IPV4, NF_INET_FORWARD,
1945 net, NULL, skb, skb->dev, dev,
1946 ipmr_forward_finish);
1947 return;
1948
1949out_free:
1950 kfree_skb(skb);
1951}
1952
1953static int ipmr_find_vif(struct mr_table *mrt, struct net_device *dev)
1954{
1955 int ct;
1956
1957 for (ct = mrt->maxvif-1; ct >= 0; ct--) {
1958 if (mrt->vif_table[ct].dev == dev)
1959 break;
1960 }
1961 return ct;
1962}
1963
1964/* "local" means that we should preserve one skb (for local delivery) */
1965static void ip_mr_forward(struct net *net, struct mr_table *mrt,
1966 struct net_device *dev, struct sk_buff *skb,
1967 struct mfc_cache *c, int local)
1968{
1969 int true_vifi = ipmr_find_vif(mrt, dev);
1970 int psend = -1;
1971 int vif, ct;
1972
1973 vif = c->_c.mfc_parent;
1974 c->_c.mfc_un.res.pkt++;
1975 c->_c.mfc_un.res.bytes += skb->len;
1976 c->_c.mfc_un.res.lastuse = jiffies;
1977
1978 if (c->mfc_origin == htonl(INADDR_ANY) && true_vifi >= 0) {
1979 struct mfc_cache *cache_proxy;
1980
1981 /* For an (*,G) entry, we only check that the incomming
1982 * interface is part of the static tree.
1983 */
1984 cache_proxy = mr_mfc_find_any_parent(mrt, vif);
1985 if (cache_proxy &&
1986 cache_proxy->_c.mfc_un.res.ttls[true_vifi] < 255)
1987 goto forward;
1988 }
1989
1990 /* Wrong interface: drop packet and (maybe) send PIM assert. */
1991 if (mrt->vif_table[vif].dev != dev) {
1992 if (rt_is_output_route(skb_rtable(skb))) {
1993 /* It is our own packet, looped back.
1994 * Very complicated situation...
1995 *
1996 * The best workaround until routing daemons will be
1997 * fixed is not to redistribute packet, if it was
1998 * send through wrong interface. It means, that
1999 * multicast applications WILL NOT work for
2000 * (S,G), which have default multicast route pointing
2001 * to wrong oif. In any case, it is not a good
2002 * idea to use multicasting applications on router.
2003 */
2004 goto dont_forward;
2005 }
2006
2007 c->_c.mfc_un.res.wrong_if++;
2008
2009 if (true_vifi >= 0 && mrt->mroute_do_assert &&
2010 /* pimsm uses asserts, when switching from RPT to SPT,
2011 * so that we cannot check that packet arrived on an oif.
2012 * It is bad, but otherwise we would need to move pretty
2013 * large chunk of pimd to kernel. Ough... --ANK
2014 */
2015 (mrt->mroute_do_pim ||
2016 c->_c.mfc_un.res.ttls[true_vifi] < 255) &&
2017 time_after(jiffies,
2018 c->_c.mfc_un.res.last_assert +
2019 MFC_ASSERT_THRESH)) {
2020 c->_c.mfc_un.res.last_assert = jiffies;
2021 ipmr_cache_report(mrt, skb, true_vifi, IGMPMSG_WRONGVIF);
2022 if (mrt->mroute_do_wrvifwhole)
2023 ipmr_cache_report(mrt, skb, true_vifi,
2024 IGMPMSG_WRVIFWHOLE);
2025 }
2026 goto dont_forward;
2027 }
2028
2029forward:
2030 mrt->vif_table[vif].pkt_in++;
2031 mrt->vif_table[vif].bytes_in += skb->len;
2032
2033 /* Forward the frame */
2034 if (c->mfc_origin == htonl(INADDR_ANY) &&
2035 c->mfc_mcastgrp == htonl(INADDR_ANY)) {
2036 if (true_vifi >= 0 &&
2037 true_vifi != c->_c.mfc_parent &&
2038 ip_hdr(skb)->ttl >
2039 c->_c.mfc_un.res.ttls[c->_c.mfc_parent]) {
2040 /* It's an (*,*) entry and the packet is not coming from
2041 * the upstream: forward the packet to the upstream
2042 * only.
2043 */
2044 psend = c->_c.mfc_parent;
2045 goto last_forward;
2046 }
2047 goto dont_forward;
2048 }
2049 for (ct = c->_c.mfc_un.res.maxvif - 1;
2050 ct >= c->_c.mfc_un.res.minvif; ct--) {
2051 /* For (*,G) entry, don't forward to the incoming interface */
2052 if ((c->mfc_origin != htonl(INADDR_ANY) ||
2053 ct != true_vifi) &&
2054 ip_hdr(skb)->ttl > c->_c.mfc_un.res.ttls[ct]) {
2055 if (psend != -1) {
2056 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
2057
2058 if (skb2)
2059 ipmr_queue_xmit(net, mrt, true_vifi,
2060 skb2, psend);
2061 }
2062 psend = ct;
2063 }
2064 }
2065last_forward:
2066 if (psend != -1) {
2067 if (local) {
2068 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
2069
2070 if (skb2)
2071 ipmr_queue_xmit(net, mrt, true_vifi, skb2,
2072 psend);
2073 } else {
2074 ipmr_queue_xmit(net, mrt, true_vifi, skb, psend);
2075 return;
2076 }
2077 }
2078
2079dont_forward:
2080 if (!local)
2081 kfree_skb(skb);
2082}
2083
2084static struct mr_table *ipmr_rt_fib_lookup(struct net *net, struct sk_buff *skb)
2085{
2086 struct rtable *rt = skb_rtable(skb);
2087 struct iphdr *iph = ip_hdr(skb);
2088 struct flowi4 fl4 = {
2089 .daddr = iph->daddr,
2090 .saddr = iph->saddr,
2091 .flowi4_tos = RT_TOS(iph->tos),
2092 .flowi4_oif = (rt_is_output_route(rt) ?
2093 skb->dev->ifindex : 0),
2094 .flowi4_iif = (rt_is_output_route(rt) ?
2095 LOOPBACK_IFINDEX :
2096 skb->dev->ifindex),
2097 .flowi4_mark = skb->mark,
2098 };
2099 struct mr_table *mrt;
2100 int err;
2101
2102 err = ipmr_fib_lookup(net, &fl4, &mrt);
2103 if (err)
2104 return ERR_PTR(err);
2105 return mrt;
2106}
2107
2108/* Multicast packets for forwarding arrive here
2109 * Called with rcu_read_lock();
2110 */
2111int ip_mr_input(struct sk_buff *skb)
2112{
2113 struct mfc_cache *cache;
2114 struct net *net = dev_net(skb->dev);
2115 int local = skb_rtable(skb)->rt_flags & RTCF_LOCAL;
2116 struct mr_table *mrt;
2117 struct net_device *dev;
2118
2119 /* skb->dev passed in is the loX master dev for vrfs.
2120 * As there are no vifs associated with loopback devices,
2121 * get the proper interface that does have a vif associated with it.
2122 */
2123 dev = skb->dev;
2124 if (netif_is_l3_master(skb->dev)) {
2125 dev = dev_get_by_index_rcu(net, IPCB(skb)->iif);
2126 if (!dev) {
2127 kfree_skb(skb);
2128 return -ENODEV;
2129 }
2130 }
2131
2132 /* Packet is looped back after forward, it should not be
2133 * forwarded second time, but still can be delivered locally.
2134 */
2135 if (IPCB(skb)->flags & IPSKB_FORWARDED)
2136 goto dont_forward;
2137
2138 mrt = ipmr_rt_fib_lookup(net, skb);
2139 if (IS_ERR(mrt)) {
2140 kfree_skb(skb);
2141 return PTR_ERR(mrt);
2142 }
2143 if (!local) {
2144 if (IPCB(skb)->opt.router_alert) {
2145 if (ip_call_ra_chain(skb))
2146 return 0;
2147 } else if (ip_hdr(skb)->protocol == IPPROTO_IGMP) {
2148 /* IGMPv1 (and broken IGMPv2 implementations sort of
2149 * Cisco IOS <= 11.2(8)) do not put router alert
2150 * option to IGMP packets destined to routable
2151 * groups. It is very bad, because it means
2152 * that we can forward NO IGMP messages.
2153 */
2154 struct sock *mroute_sk;
2155
2156 mroute_sk = rcu_dereference(mrt->mroute_sk);
2157 if (mroute_sk) {
2158 nf_reset_ct(skb);
2159 raw_rcv(mroute_sk, skb);
2160 return 0;
2161 }
2162 }
2163 }
2164
2165 /* already under rcu_read_lock() */
2166 cache = ipmr_cache_find(mrt, ip_hdr(skb)->saddr, ip_hdr(skb)->daddr);
2167 if (!cache) {
2168 int vif = ipmr_find_vif(mrt, dev);
2169
2170 if (vif >= 0)
2171 cache = ipmr_cache_find_any(mrt, ip_hdr(skb)->daddr,
2172 vif);
2173 }
2174
2175 /* No usable cache entry */
2176 if (!cache) {
2177 int vif;
2178
2179 if (local) {
2180 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
2181 ip_local_deliver(skb);
2182 if (!skb2)
2183 return -ENOBUFS;
2184 skb = skb2;
2185 }
2186
2187 read_lock(&mrt_lock);
2188 vif = ipmr_find_vif(mrt, dev);
2189 if (vif >= 0) {
2190 int err2 = ipmr_cache_unresolved(mrt, vif, skb, dev);
2191 read_unlock(&mrt_lock);
2192
2193 return err2;
2194 }
2195 read_unlock(&mrt_lock);
2196 kfree_skb(skb);
2197 return -ENODEV;
2198 }
2199
2200 read_lock(&mrt_lock);
2201 ip_mr_forward(net, mrt, dev, skb, cache, local);
2202 read_unlock(&mrt_lock);
2203
2204 if (local)
2205 return ip_local_deliver(skb);
2206
2207 return 0;
2208
2209dont_forward:
2210 if (local)
2211 return ip_local_deliver(skb);
2212 kfree_skb(skb);
2213 return 0;
2214}
2215
2216#ifdef CONFIG_IP_PIMSM_V1
2217/* Handle IGMP messages of PIMv1 */
2218int pim_rcv_v1(struct sk_buff *skb)
2219{
2220 struct igmphdr *pim;
2221 struct net *net = dev_net(skb->dev);
2222 struct mr_table *mrt;
2223
2224 if (!pskb_may_pull(skb, sizeof(*pim) + sizeof(struct iphdr)))
2225 goto drop;
2226
2227 pim = igmp_hdr(skb);
2228
2229 mrt = ipmr_rt_fib_lookup(net, skb);
2230 if (IS_ERR(mrt))
2231 goto drop;
2232 if (!mrt->mroute_do_pim ||
2233 pim->group != PIM_V1_VERSION || pim->code != PIM_V1_REGISTER)
2234 goto drop;
2235
2236 if (__pim_rcv(mrt, skb, sizeof(*pim))) {
2237drop:
2238 kfree_skb(skb);
2239 }
2240 return 0;
2241}
2242#endif
2243
2244#ifdef CONFIG_IP_PIMSM_V2
2245static int pim_rcv(struct sk_buff *skb)
2246{
2247 struct pimreghdr *pim;
2248 struct net *net = dev_net(skb->dev);
2249 struct mr_table *mrt;
2250
2251 if (!pskb_may_pull(skb, sizeof(*pim) + sizeof(struct iphdr)))
2252 goto drop;
2253
2254 pim = (struct pimreghdr *)skb_transport_header(skb);
2255 if (pim->type != ((PIM_VERSION << 4) | (PIM_TYPE_REGISTER)) ||
2256 (pim->flags & PIM_NULL_REGISTER) ||
2257 (ip_compute_csum((void *)pim, sizeof(*pim)) != 0 &&
2258 csum_fold(skb_checksum(skb, 0, skb->len, 0))))
2259 goto drop;
2260
2261 mrt = ipmr_rt_fib_lookup(net, skb);
2262 if (IS_ERR(mrt))
2263 goto drop;
2264 if (__pim_rcv(mrt, skb, sizeof(*pim))) {
2265drop:
2266 kfree_skb(skb);
2267 }
2268 return 0;
2269}
2270#endif
2271
2272int ipmr_get_route(struct net *net, struct sk_buff *skb,
2273 __be32 saddr, __be32 daddr,
2274 struct rtmsg *rtm, u32 portid)
2275{
2276 struct mfc_cache *cache;
2277 struct mr_table *mrt;
2278 int err;
2279
2280 rcu_read_lock();
2281 mrt = __ipmr_get_table(net, RT_TABLE_DEFAULT);
2282 if (!mrt) {
2283 rcu_read_unlock();
2284 return -ENOENT;
2285 }
2286
2287 cache = ipmr_cache_find(mrt, saddr, daddr);
2288 if (!cache && skb->dev) {
2289 int vif = ipmr_find_vif(mrt, skb->dev);
2290
2291 if (vif >= 0)
2292 cache = ipmr_cache_find_any(mrt, daddr, vif);
2293 }
2294 if (!cache) {
2295 struct sk_buff *skb2;
2296 struct iphdr *iph;
2297 struct net_device *dev;
2298 int vif = -1;
2299
2300 dev = skb->dev;
2301 read_lock(&mrt_lock);
2302 if (dev)
2303 vif = ipmr_find_vif(mrt, dev);
2304 if (vif < 0) {
2305 read_unlock(&mrt_lock);
2306 rcu_read_unlock();
2307 return -ENODEV;
2308 }
2309
2310 skb2 = skb_realloc_headroom(skb, sizeof(struct iphdr));
2311 if (!skb2) {
2312 read_unlock(&mrt_lock);
2313 rcu_read_unlock();
2314 return -ENOMEM;
2315 }
2316
2317 NETLINK_CB(skb2).portid = portid;
2318 skb_push(skb2, sizeof(struct iphdr));
2319 skb_reset_network_header(skb2);
2320 iph = ip_hdr(skb2);
2321 iph->ihl = sizeof(struct iphdr) >> 2;
2322 iph->saddr = saddr;
2323 iph->daddr = daddr;
2324 iph->version = 0;
2325 err = ipmr_cache_unresolved(mrt, vif, skb2, dev);
2326 read_unlock(&mrt_lock);
2327 rcu_read_unlock();
2328 return err;
2329 }
2330
2331 read_lock(&mrt_lock);
2332 err = mr_fill_mroute(mrt, skb, &cache->_c, rtm);
2333 read_unlock(&mrt_lock);
2334 rcu_read_unlock();
2335 return err;
2336}
2337
2338static int ipmr_fill_mroute(struct mr_table *mrt, struct sk_buff *skb,
2339 u32 portid, u32 seq, struct mfc_cache *c, int cmd,
2340 int flags)
2341{
2342 struct nlmsghdr *nlh;
2343 struct rtmsg *rtm;
2344 int err;
2345
2346 nlh = nlmsg_put(skb, portid, seq, cmd, sizeof(*rtm), flags);
2347 if (!nlh)
2348 return -EMSGSIZE;
2349
2350 rtm = nlmsg_data(nlh);
2351 rtm->rtm_family = RTNL_FAMILY_IPMR;
2352 rtm->rtm_dst_len = 32;
2353 rtm->rtm_src_len = 32;
2354 rtm->rtm_tos = 0;
2355 rtm->rtm_table = mrt->id;
2356 if (nla_put_u32(skb, RTA_TABLE, mrt->id))
2357 goto nla_put_failure;
2358 rtm->rtm_type = RTN_MULTICAST;
2359 rtm->rtm_scope = RT_SCOPE_UNIVERSE;
2360 if (c->_c.mfc_flags & MFC_STATIC)
2361 rtm->rtm_protocol = RTPROT_STATIC;
2362 else
2363 rtm->rtm_protocol = RTPROT_MROUTED;
2364 rtm->rtm_flags = 0;
2365
2366 if (nla_put_in_addr(skb, RTA_SRC, c->mfc_origin) ||
2367 nla_put_in_addr(skb, RTA_DST, c->mfc_mcastgrp))
2368 goto nla_put_failure;
2369 err = mr_fill_mroute(mrt, skb, &c->_c, rtm);
2370 /* do not break the dump if cache is unresolved */
2371 if (err < 0 && err != -ENOENT)
2372 goto nla_put_failure;
2373
2374 nlmsg_end(skb, nlh);
2375 return 0;
2376
2377nla_put_failure:
2378 nlmsg_cancel(skb, nlh);
2379 return -EMSGSIZE;
2380}
2381
2382static int _ipmr_fill_mroute(struct mr_table *mrt, struct sk_buff *skb,
2383 u32 portid, u32 seq, struct mr_mfc *c, int cmd,
2384 int flags)
2385{
2386 return ipmr_fill_mroute(mrt, skb, portid, seq, (struct mfc_cache *)c,
2387 cmd, flags);
2388}
2389
2390static size_t mroute_msgsize(bool unresolved, int maxvif)
2391{
2392 size_t len =
2393 NLMSG_ALIGN(sizeof(struct rtmsg))
2394 + nla_total_size(4) /* RTA_TABLE */
2395 + nla_total_size(4) /* RTA_SRC */
2396 + nla_total_size(4) /* RTA_DST */
2397 ;
2398
2399 if (!unresolved)
2400 len = len
2401 + nla_total_size(4) /* RTA_IIF */
2402 + nla_total_size(0) /* RTA_MULTIPATH */
2403 + maxvif * NLA_ALIGN(sizeof(struct rtnexthop))
2404 /* RTA_MFC_STATS */
2405 + nla_total_size_64bit(sizeof(struct rta_mfc_stats))
2406 ;
2407
2408 return len;
2409}
2410
2411static void mroute_netlink_event(struct mr_table *mrt, struct mfc_cache *mfc,
2412 int cmd)
2413{
2414 struct net *net = read_pnet(&mrt->net);
2415 struct sk_buff *skb;
2416 int err = -ENOBUFS;
2417
2418 skb = nlmsg_new(mroute_msgsize(mfc->_c.mfc_parent >= MAXVIFS,
2419 mrt->maxvif),
2420 GFP_ATOMIC);
2421 if (!skb)
2422 goto errout;
2423
2424 err = ipmr_fill_mroute(mrt, skb, 0, 0, mfc, cmd, 0);
2425 if (err < 0)
2426 goto errout;
2427
2428 rtnl_notify(skb, net, 0, RTNLGRP_IPV4_MROUTE, NULL, GFP_ATOMIC);
2429 return;
2430
2431errout:
2432 kfree_skb(skb);
2433 if (err < 0)
2434 rtnl_set_sk_err(net, RTNLGRP_IPV4_MROUTE, err);
2435}
2436
2437static size_t igmpmsg_netlink_msgsize(size_t payloadlen)
2438{
2439 size_t len =
2440 NLMSG_ALIGN(sizeof(struct rtgenmsg))
2441 + nla_total_size(1) /* IPMRA_CREPORT_MSGTYPE */
2442 + nla_total_size(4) /* IPMRA_CREPORT_VIF_ID */
2443 + nla_total_size(4) /* IPMRA_CREPORT_SRC_ADDR */
2444 + nla_total_size(4) /* IPMRA_CREPORT_DST_ADDR */
2445 /* IPMRA_CREPORT_PKT */
2446 + nla_total_size(payloadlen)
2447 ;
2448
2449 return len;
2450}
2451
2452static void igmpmsg_netlink_event(struct mr_table *mrt, struct sk_buff *pkt)
2453{
2454 struct net *net = read_pnet(&mrt->net);
2455 struct nlmsghdr *nlh;
2456 struct rtgenmsg *rtgenm;
2457 struct igmpmsg *msg;
2458 struct sk_buff *skb;
2459 struct nlattr *nla;
2460 int payloadlen;
2461
2462 payloadlen = pkt->len - sizeof(struct igmpmsg);
2463 msg = (struct igmpmsg *)skb_network_header(pkt);
2464
2465 skb = nlmsg_new(igmpmsg_netlink_msgsize(payloadlen), GFP_ATOMIC);
2466 if (!skb)
2467 goto errout;
2468
2469 nlh = nlmsg_put(skb, 0, 0, RTM_NEWCACHEREPORT,
2470 sizeof(struct rtgenmsg), 0);
2471 if (!nlh)
2472 goto errout;
2473 rtgenm = nlmsg_data(nlh);
2474 rtgenm->rtgen_family = RTNL_FAMILY_IPMR;
2475 if (nla_put_u8(skb, IPMRA_CREPORT_MSGTYPE, msg->im_msgtype) ||
2476 nla_put_u32(skb, IPMRA_CREPORT_VIF_ID, msg->im_vif) ||
2477 nla_put_in_addr(skb, IPMRA_CREPORT_SRC_ADDR,
2478 msg->im_src.s_addr) ||
2479 nla_put_in_addr(skb, IPMRA_CREPORT_DST_ADDR,
2480 msg->im_dst.s_addr))
2481 goto nla_put_failure;
2482
2483 nla = nla_reserve(skb, IPMRA_CREPORT_PKT, payloadlen);
2484 if (!nla || skb_copy_bits(pkt, sizeof(struct igmpmsg),
2485 nla_data(nla), payloadlen))
2486 goto nla_put_failure;
2487
2488 nlmsg_end(skb, nlh);
2489
2490 rtnl_notify(skb, net, 0, RTNLGRP_IPV4_MROUTE_R, NULL, GFP_ATOMIC);
2491 return;
2492
2493nla_put_failure:
2494 nlmsg_cancel(skb, nlh);
2495errout:
2496 kfree_skb(skb);
2497 rtnl_set_sk_err(net, RTNLGRP_IPV4_MROUTE_R, -ENOBUFS);
2498}
2499
2500static int ipmr_rtm_valid_getroute_req(struct sk_buff *skb,
2501 const struct nlmsghdr *nlh,
2502 struct nlattr **tb,
2503 struct netlink_ext_ack *extack)
2504{
2505 struct rtmsg *rtm;
2506 int i, err;
2507
2508 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*rtm))) {
2509 NL_SET_ERR_MSG(extack, "ipv4: Invalid header for multicast route get request");
2510 return -EINVAL;
2511 }
2512
2513 if (!netlink_strict_get_check(skb))
2514 return nlmsg_parse_deprecated(nlh, sizeof(*rtm), tb, RTA_MAX,
2515 rtm_ipv4_policy, extack);
2516
2517 rtm = nlmsg_data(nlh);
2518 if ((rtm->rtm_src_len && rtm->rtm_src_len != 32) ||
2519 (rtm->rtm_dst_len && rtm->rtm_dst_len != 32) ||
2520 rtm->rtm_tos || rtm->rtm_table || rtm->rtm_protocol ||
2521 rtm->rtm_scope || rtm->rtm_type || rtm->rtm_flags) {
2522 NL_SET_ERR_MSG(extack, "ipv4: Invalid values in header for multicast route get request");
2523 return -EINVAL;
2524 }
2525
2526 err = nlmsg_parse_deprecated_strict(nlh, sizeof(*rtm), tb, RTA_MAX,
2527 rtm_ipv4_policy, extack);
2528 if (err)
2529 return err;
2530
2531 if ((tb[RTA_SRC] && !rtm->rtm_src_len) ||
2532 (tb[RTA_DST] && !rtm->rtm_dst_len)) {
2533 NL_SET_ERR_MSG(extack, "ipv4: rtm_src_len and rtm_dst_len must be 32 for IPv4");
2534 return -EINVAL;
2535 }
2536
2537 for (i = 0; i <= RTA_MAX; i++) {
2538 if (!tb[i])
2539 continue;
2540
2541 switch (i) {
2542 case RTA_SRC:
2543 case RTA_DST:
2544 case RTA_TABLE:
2545 break;
2546 default:
2547 NL_SET_ERR_MSG(extack, "ipv4: Unsupported attribute in multicast route get request");
2548 return -EINVAL;
2549 }
2550 }
2551
2552 return 0;
2553}
2554
2555static int ipmr_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr *nlh,
2556 struct netlink_ext_ack *extack)
2557{
2558 struct net *net = sock_net(in_skb->sk);
2559 struct nlattr *tb[RTA_MAX + 1];
2560 struct sk_buff *skb = NULL;
2561 struct mfc_cache *cache;
2562 struct mr_table *mrt;
2563 __be32 src, grp;
2564 u32 tableid;
2565 int err;
2566
2567 err = ipmr_rtm_valid_getroute_req(in_skb, nlh, tb, extack);
2568 if (err < 0)
2569 goto errout;
2570
2571 src = tb[RTA_SRC] ? nla_get_in_addr(tb[RTA_SRC]) : 0;
2572 grp = tb[RTA_DST] ? nla_get_in_addr(tb[RTA_DST]) : 0;
2573 tableid = tb[RTA_TABLE] ? nla_get_u32(tb[RTA_TABLE]) : 0;
2574
2575 mrt = __ipmr_get_table(net, tableid ? tableid : RT_TABLE_DEFAULT);
2576 if (!mrt) {
2577 err = -ENOENT;
2578 goto errout_free;
2579 }
2580
2581 /* entries are added/deleted only under RTNL */
2582 rcu_read_lock();
2583 cache = ipmr_cache_find(mrt, src, grp);
2584 rcu_read_unlock();
2585 if (!cache) {
2586 err = -ENOENT;
2587 goto errout_free;
2588 }
2589
2590 skb = nlmsg_new(mroute_msgsize(false, mrt->maxvif), GFP_KERNEL);
2591 if (!skb) {
2592 err = -ENOBUFS;
2593 goto errout_free;
2594 }
2595
2596 err = ipmr_fill_mroute(mrt, skb, NETLINK_CB(in_skb).portid,
2597 nlh->nlmsg_seq, cache,
2598 RTM_NEWROUTE, 0);
2599 if (err < 0)
2600 goto errout_free;
2601
2602 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
2603
2604errout:
2605 return err;
2606
2607errout_free:
2608 kfree_skb(skb);
2609 goto errout;
2610}
2611
2612static int ipmr_rtm_dumproute(struct sk_buff *skb, struct netlink_callback *cb)
2613{
2614 struct fib_dump_filter filter = {};
2615 int err;
2616
2617 if (cb->strict_check) {
2618 err = ip_valid_fib_dump_req(sock_net(skb->sk), cb->nlh,
2619 &filter, cb);
2620 if (err < 0)
2621 return err;
2622 }
2623
2624 if (filter.table_id) {
2625 struct mr_table *mrt;
2626
2627 mrt = __ipmr_get_table(sock_net(skb->sk), filter.table_id);
2628 if (!mrt) {
2629 if (rtnl_msg_family(cb->nlh) != RTNL_FAMILY_IPMR)
2630 return skb->len;
2631
2632 NL_SET_ERR_MSG(cb->extack, "ipv4: MR table does not exist");
2633 return -ENOENT;
2634 }
2635 err = mr_table_dump(mrt, skb, cb, _ipmr_fill_mroute,
2636 &mfc_unres_lock, &filter);
2637 return skb->len ? : err;
2638 }
2639
2640 return mr_rtm_dumproute(skb, cb, ipmr_mr_table_iter,
2641 _ipmr_fill_mroute, &mfc_unres_lock, &filter);
2642}
2643
2644static const struct nla_policy rtm_ipmr_policy[RTA_MAX + 1] = {
2645 [RTA_SRC] = { .type = NLA_U32 },
2646 [RTA_DST] = { .type = NLA_U32 },
2647 [RTA_IIF] = { .type = NLA_U32 },
2648 [RTA_TABLE] = { .type = NLA_U32 },
2649 [RTA_MULTIPATH] = { .len = sizeof(struct rtnexthop) },
2650};
2651
2652static bool ipmr_rtm_validate_proto(unsigned char rtm_protocol)
2653{
2654 switch (rtm_protocol) {
2655 case RTPROT_STATIC:
2656 case RTPROT_MROUTED:
2657 return true;
2658 }
2659 return false;
2660}
2661
2662static int ipmr_nla_get_ttls(const struct nlattr *nla, struct mfcctl *mfcc)
2663{
2664 struct rtnexthop *rtnh = nla_data(nla);
2665 int remaining = nla_len(nla), vifi = 0;
2666
2667 while (rtnh_ok(rtnh, remaining)) {
2668 mfcc->mfcc_ttls[vifi] = rtnh->rtnh_hops;
2669 if (++vifi == MAXVIFS)
2670 break;
2671 rtnh = rtnh_next(rtnh, &remaining);
2672 }
2673
2674 return remaining > 0 ? -EINVAL : vifi;
2675}
2676
2677/* returns < 0 on error, 0 for ADD_MFC and 1 for ADD_MFC_PROXY */
2678static int rtm_to_ipmr_mfcc(struct net *net, struct nlmsghdr *nlh,
2679 struct mfcctl *mfcc, int *mrtsock,
2680 struct mr_table **mrtret,
2681 struct netlink_ext_ack *extack)
2682{
2683 struct net_device *dev = NULL;
2684 u32 tblid = RT_TABLE_DEFAULT;
2685 struct mr_table *mrt;
2686 struct nlattr *attr;
2687 struct rtmsg *rtm;
2688 int ret, rem;
2689
2690 ret = nlmsg_validate_deprecated(nlh, sizeof(*rtm), RTA_MAX,
2691 rtm_ipmr_policy, extack);
2692 if (ret < 0)
2693 goto out;
2694 rtm = nlmsg_data(nlh);
2695
2696 ret = -EINVAL;
2697 if (rtm->rtm_family != RTNL_FAMILY_IPMR || rtm->rtm_dst_len != 32 ||
2698 rtm->rtm_type != RTN_MULTICAST ||
2699 rtm->rtm_scope != RT_SCOPE_UNIVERSE ||
2700 !ipmr_rtm_validate_proto(rtm->rtm_protocol))
2701 goto out;
2702
2703 memset(mfcc, 0, sizeof(*mfcc));
2704 mfcc->mfcc_parent = -1;
2705 ret = 0;
2706 nlmsg_for_each_attr(attr, nlh, sizeof(struct rtmsg), rem) {
2707 switch (nla_type(attr)) {
2708 case RTA_SRC:
2709 mfcc->mfcc_origin.s_addr = nla_get_be32(attr);
2710 break;
2711 case RTA_DST:
2712 mfcc->mfcc_mcastgrp.s_addr = nla_get_be32(attr);
2713 break;
2714 case RTA_IIF:
2715 dev = __dev_get_by_index(net, nla_get_u32(attr));
2716 if (!dev) {
2717 ret = -ENODEV;
2718 goto out;
2719 }
2720 break;
2721 case RTA_MULTIPATH:
2722 if (ipmr_nla_get_ttls(attr, mfcc) < 0) {
2723 ret = -EINVAL;
2724 goto out;
2725 }
2726 break;
2727 case RTA_PREFSRC:
2728 ret = 1;
2729 break;
2730 case RTA_TABLE:
2731 tblid = nla_get_u32(attr);
2732 break;
2733 }
2734 }
2735 mrt = __ipmr_get_table(net, tblid);
2736 if (!mrt) {
2737 ret = -ENOENT;
2738 goto out;
2739 }
2740 *mrtret = mrt;
2741 *mrtsock = rtm->rtm_protocol == RTPROT_MROUTED ? 1 : 0;
2742 if (dev)
2743 mfcc->mfcc_parent = ipmr_find_vif(mrt, dev);
2744
2745out:
2746 return ret;
2747}
2748
2749/* takes care of both newroute and delroute */
2750static int ipmr_rtm_route(struct sk_buff *skb, struct nlmsghdr *nlh,
2751 struct netlink_ext_ack *extack)
2752{
2753 struct net *net = sock_net(skb->sk);
2754 int ret, mrtsock, parent;
2755 struct mr_table *tbl;
2756 struct mfcctl mfcc;
2757
2758 mrtsock = 0;
2759 tbl = NULL;
2760 ret = rtm_to_ipmr_mfcc(net, nlh, &mfcc, &mrtsock, &tbl, extack);
2761 if (ret < 0)
2762 return ret;
2763
2764 parent = ret ? mfcc.mfcc_parent : -1;
2765 if (nlh->nlmsg_type == RTM_NEWROUTE)
2766 return ipmr_mfc_add(net, tbl, &mfcc, mrtsock, parent);
2767 else
2768 return ipmr_mfc_delete(tbl, &mfcc, parent);
2769}
2770
2771static bool ipmr_fill_table(struct mr_table *mrt, struct sk_buff *skb)
2772{
2773 u32 queue_len = atomic_read(&mrt->cache_resolve_queue_len);
2774
2775 if (nla_put_u32(skb, IPMRA_TABLE_ID, mrt->id) ||
2776 nla_put_u32(skb, IPMRA_TABLE_CACHE_RES_QUEUE_LEN, queue_len) ||
2777 nla_put_s32(skb, IPMRA_TABLE_MROUTE_REG_VIF_NUM,
2778 mrt->mroute_reg_vif_num) ||
2779 nla_put_u8(skb, IPMRA_TABLE_MROUTE_DO_ASSERT,
2780 mrt->mroute_do_assert) ||
2781 nla_put_u8(skb, IPMRA_TABLE_MROUTE_DO_PIM, mrt->mroute_do_pim) ||
2782 nla_put_u8(skb, IPMRA_TABLE_MROUTE_DO_WRVIFWHOLE,
2783 mrt->mroute_do_wrvifwhole))
2784 return false;
2785
2786 return true;
2787}
2788
2789static bool ipmr_fill_vif(struct mr_table *mrt, u32 vifid, struct sk_buff *skb)
2790{
2791 struct nlattr *vif_nest;
2792 struct vif_device *vif;
2793
2794 /* if the VIF doesn't exist just continue */
2795 if (!VIF_EXISTS(mrt, vifid))
2796 return true;
2797
2798 vif = &mrt->vif_table[vifid];
2799 vif_nest = nla_nest_start_noflag(skb, IPMRA_VIF);
2800 if (!vif_nest)
2801 return false;
2802 if (nla_put_u32(skb, IPMRA_VIFA_IFINDEX, vif->dev->ifindex) ||
2803 nla_put_u32(skb, IPMRA_VIFA_VIF_ID, vifid) ||
2804 nla_put_u16(skb, IPMRA_VIFA_FLAGS, vif->flags) ||
2805 nla_put_u64_64bit(skb, IPMRA_VIFA_BYTES_IN, vif->bytes_in,
2806 IPMRA_VIFA_PAD) ||
2807 nla_put_u64_64bit(skb, IPMRA_VIFA_BYTES_OUT, vif->bytes_out,
2808 IPMRA_VIFA_PAD) ||
2809 nla_put_u64_64bit(skb, IPMRA_VIFA_PACKETS_IN, vif->pkt_in,
2810 IPMRA_VIFA_PAD) ||
2811 nla_put_u64_64bit(skb, IPMRA_VIFA_PACKETS_OUT, vif->pkt_out,
2812 IPMRA_VIFA_PAD) ||
2813 nla_put_be32(skb, IPMRA_VIFA_LOCAL_ADDR, vif->local) ||
2814 nla_put_be32(skb, IPMRA_VIFA_REMOTE_ADDR, vif->remote)) {
2815 nla_nest_cancel(skb, vif_nest);
2816 return false;
2817 }
2818 nla_nest_end(skb, vif_nest);
2819
2820 return true;
2821}
2822
2823static int ipmr_valid_dumplink(const struct nlmsghdr *nlh,
2824 struct netlink_ext_ack *extack)
2825{
2826 struct ifinfomsg *ifm;
2827
2828 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*ifm))) {
2829 NL_SET_ERR_MSG(extack, "ipv4: Invalid header for ipmr link dump");
2830 return -EINVAL;
2831 }
2832
2833 if (nlmsg_attrlen(nlh, sizeof(*ifm))) {
2834 NL_SET_ERR_MSG(extack, "Invalid data after header in ipmr link dump");
2835 return -EINVAL;
2836 }
2837
2838 ifm = nlmsg_data(nlh);
2839 if (ifm->__ifi_pad || ifm->ifi_type || ifm->ifi_flags ||
2840 ifm->ifi_change || ifm->ifi_index) {
2841 NL_SET_ERR_MSG(extack, "Invalid values in header for ipmr link dump request");
2842 return -EINVAL;
2843 }
2844
2845 return 0;
2846}
2847
2848static int ipmr_rtm_dumplink(struct sk_buff *skb, struct netlink_callback *cb)
2849{
2850 struct net *net = sock_net(skb->sk);
2851 struct nlmsghdr *nlh = NULL;
2852 unsigned int t = 0, s_t;
2853 unsigned int e = 0, s_e;
2854 struct mr_table *mrt;
2855
2856 if (cb->strict_check) {
2857 int err = ipmr_valid_dumplink(cb->nlh, cb->extack);
2858
2859 if (err < 0)
2860 return err;
2861 }
2862
2863 s_t = cb->args[0];
2864 s_e = cb->args[1];
2865
2866 ipmr_for_each_table(mrt, net) {
2867 struct nlattr *vifs, *af;
2868 struct ifinfomsg *hdr;
2869 u32 i;
2870
2871 if (t < s_t)
2872 goto skip_table;
2873 nlh = nlmsg_put(skb, NETLINK_CB(cb->skb).portid,
2874 cb->nlh->nlmsg_seq, RTM_NEWLINK,
2875 sizeof(*hdr), NLM_F_MULTI);
2876 if (!nlh)
2877 break;
2878
2879 hdr = nlmsg_data(nlh);
2880 memset(hdr, 0, sizeof(*hdr));
2881 hdr->ifi_family = RTNL_FAMILY_IPMR;
2882
2883 af = nla_nest_start_noflag(skb, IFLA_AF_SPEC);
2884 if (!af) {
2885 nlmsg_cancel(skb, nlh);
2886 goto out;
2887 }
2888
2889 if (!ipmr_fill_table(mrt, skb)) {
2890 nlmsg_cancel(skb, nlh);
2891 goto out;
2892 }
2893
2894 vifs = nla_nest_start_noflag(skb, IPMRA_TABLE_VIFS);
2895 if (!vifs) {
2896 nla_nest_end(skb, af);
2897 nlmsg_end(skb, nlh);
2898 goto out;
2899 }
2900 for (i = 0; i < mrt->maxvif; i++) {
2901 if (e < s_e)
2902 goto skip_entry;
2903 if (!ipmr_fill_vif(mrt, i, skb)) {
2904 nla_nest_end(skb, vifs);
2905 nla_nest_end(skb, af);
2906 nlmsg_end(skb, nlh);
2907 goto out;
2908 }
2909skip_entry:
2910 e++;
2911 }
2912 s_e = 0;
2913 e = 0;
2914 nla_nest_end(skb, vifs);
2915 nla_nest_end(skb, af);
2916 nlmsg_end(skb, nlh);
2917skip_table:
2918 t++;
2919 }
2920
2921out:
2922 cb->args[1] = e;
2923 cb->args[0] = t;
2924
2925 return skb->len;
2926}
2927
2928#ifdef CONFIG_PROC_FS
2929/* The /proc interfaces to multicast routing :
2930 * /proc/net/ip_mr_cache & /proc/net/ip_mr_vif
2931 */
2932
2933static void *ipmr_vif_seq_start(struct seq_file *seq, loff_t *pos)
2934 __acquires(RCU)
2935{
2936 struct mr_vif_iter *iter = seq->private;
2937 struct net *net = seq_file_net(seq);
2938 struct mr_table *mrt;
2939
2940 rcu_read_lock();
2941 mrt = __ipmr_get_table(net, RT_TABLE_DEFAULT);
2942 if (!mrt) {
2943 rcu_read_unlock();
2944 return ERR_PTR(-ENOENT);
2945 }
2946
2947 iter->mrt = mrt;
2948
2949 return mr_vif_seq_start(seq, pos);
2950}
2951
2952static void ipmr_vif_seq_stop(struct seq_file *seq, void *v)
2953 __releases(RCU)
2954{
2955 rcu_read_unlock();
2956}
2957
2958static int ipmr_vif_seq_show(struct seq_file *seq, void *v)
2959{
2960 struct mr_vif_iter *iter = seq->private;
2961 struct mr_table *mrt = iter->mrt;
2962
2963 if (v == SEQ_START_TOKEN) {
2964 seq_puts(seq,
2965 "Interface BytesIn PktsIn BytesOut PktsOut Flags Local Remote\n");
2966 } else {
2967 const struct vif_device *vif = v;
2968 const char *name = vif->dev ?
2969 vif->dev->name : "none";
2970
2971 seq_printf(seq,
2972 "%2td %-10s %8ld %7ld %8ld %7ld %05X %08X %08X\n",
2973 vif - mrt->vif_table,
2974 name, vif->bytes_in, vif->pkt_in,
2975 vif->bytes_out, vif->pkt_out,
2976 vif->flags, vif->local, vif->remote);
2977 }
2978 return 0;
2979}
2980
2981static const struct seq_operations ipmr_vif_seq_ops = {
2982 .start = ipmr_vif_seq_start,
2983 .next = mr_vif_seq_next,
2984 .stop = ipmr_vif_seq_stop,
2985 .show = ipmr_vif_seq_show,
2986};
2987
2988static void *ipmr_mfc_seq_start(struct seq_file *seq, loff_t *pos)
2989{
2990 struct net *net = seq_file_net(seq);
2991 struct mr_table *mrt;
2992
2993 mrt = ipmr_get_table(net, RT_TABLE_DEFAULT);
2994 if (!mrt)
2995 return ERR_PTR(-ENOENT);
2996
2997 return mr_mfc_seq_start(seq, pos, mrt, &mfc_unres_lock);
2998}
2999
3000static int ipmr_mfc_seq_show(struct seq_file *seq, void *v)
3001{
3002 int n;
3003
3004 if (v == SEQ_START_TOKEN) {
3005 seq_puts(seq,
3006 "Group Origin Iif Pkts Bytes Wrong Oifs\n");
3007 } else {
3008 const struct mfc_cache *mfc = v;
3009 const struct mr_mfc_iter *it = seq->private;
3010 const struct mr_table *mrt = it->mrt;
3011
3012 seq_printf(seq, "%08X %08X %-3hd",
3013 (__force u32) mfc->mfc_mcastgrp,
3014 (__force u32) mfc->mfc_origin,
3015 mfc->_c.mfc_parent);
3016
3017 if (it->cache != &mrt->mfc_unres_queue) {
3018 seq_printf(seq, " %8lu %8lu %8lu",
3019 mfc->_c.mfc_un.res.pkt,
3020 mfc->_c.mfc_un.res.bytes,
3021 mfc->_c.mfc_un.res.wrong_if);
3022 for (n = mfc->_c.mfc_un.res.minvif;
3023 n < mfc->_c.mfc_un.res.maxvif; n++) {
3024 if (VIF_EXISTS(mrt, n) &&
3025 mfc->_c.mfc_un.res.ttls[n] < 255)
3026 seq_printf(seq,
3027 " %2d:%-3d",
3028 n, mfc->_c.mfc_un.res.ttls[n]);
3029 }
3030 } else {
3031 /* unresolved mfc_caches don't contain
3032 * pkt, bytes and wrong_if values
3033 */
3034 seq_printf(seq, " %8lu %8lu %8lu", 0ul, 0ul, 0ul);
3035 }
3036 seq_putc(seq, '\n');
3037 }
3038 return 0;
3039}
3040
3041static const struct seq_operations ipmr_mfc_seq_ops = {
3042 .start = ipmr_mfc_seq_start,
3043 .next = mr_mfc_seq_next,
3044 .stop = mr_mfc_seq_stop,
3045 .show = ipmr_mfc_seq_show,
3046};
3047#endif
3048
3049#ifdef CONFIG_IP_PIMSM_V2
3050static const struct net_protocol pim_protocol = {
3051 .handler = pim_rcv,
3052 .netns_ok = 1,
3053};
3054#endif
3055
3056static unsigned int ipmr_seq_read(struct net *net)
3057{
3058 ASSERT_RTNL();
3059
3060 return net->ipv4.ipmr_seq + ipmr_rules_seq_read(net);
3061}
3062
3063static int ipmr_dump(struct net *net, struct notifier_block *nb)
3064{
3065 return mr_dump(net, nb, RTNL_FAMILY_IPMR, ipmr_rules_dump,
3066 ipmr_mr_table_iter, &mrt_lock);
3067}
3068
3069static const struct fib_notifier_ops ipmr_notifier_ops_template = {
3070 .family = RTNL_FAMILY_IPMR,
3071 .fib_seq_read = ipmr_seq_read,
3072 .fib_dump = ipmr_dump,
3073 .owner = THIS_MODULE,
3074};
3075
3076static int __net_init ipmr_notifier_init(struct net *net)
3077{
3078 struct fib_notifier_ops *ops;
3079
3080 net->ipv4.ipmr_seq = 0;
3081
3082 ops = fib_notifier_ops_register(&ipmr_notifier_ops_template, net);
3083 if (IS_ERR(ops))
3084 return PTR_ERR(ops);
3085 net->ipv4.ipmr_notifier_ops = ops;
3086
3087 return 0;
3088}
3089
3090static void __net_exit ipmr_notifier_exit(struct net *net)
3091{
3092 fib_notifier_ops_unregister(net->ipv4.ipmr_notifier_ops);
3093 net->ipv4.ipmr_notifier_ops = NULL;
3094}
3095
3096/* Setup for IP multicast routing */
3097static int __net_init ipmr_net_init(struct net *net)
3098{
3099 int err;
3100
3101 err = ipmr_notifier_init(net);
3102 if (err)
3103 goto ipmr_notifier_fail;
3104
3105 err = ipmr_rules_init(net);
3106 if (err < 0)
3107 goto ipmr_rules_fail;
3108
3109#ifdef CONFIG_PROC_FS
3110 err = -ENOMEM;
3111 if (!proc_create_net("ip_mr_vif", 0, net->proc_net, &ipmr_vif_seq_ops,
3112 sizeof(struct mr_vif_iter)))
3113 goto proc_vif_fail;
3114 if (!proc_create_net("ip_mr_cache", 0, net->proc_net, &ipmr_mfc_seq_ops,
3115 sizeof(struct mr_mfc_iter)))
3116 goto proc_cache_fail;
3117#endif
3118 return 0;
3119
3120#ifdef CONFIG_PROC_FS
3121proc_cache_fail:
3122 remove_proc_entry("ip_mr_vif", net->proc_net);
3123proc_vif_fail:
3124 ipmr_rules_exit(net);
3125#endif
3126ipmr_rules_fail:
3127 ipmr_notifier_exit(net);
3128ipmr_notifier_fail:
3129 return err;
3130}
3131
3132static void __net_exit ipmr_net_exit(struct net *net)
3133{
3134#ifdef CONFIG_PROC_FS
3135 remove_proc_entry("ip_mr_cache", net->proc_net);
3136 remove_proc_entry("ip_mr_vif", net->proc_net);
3137#endif
3138 ipmr_notifier_exit(net);
3139 ipmr_rules_exit(net);
3140}
3141
3142static struct pernet_operations ipmr_net_ops = {
3143 .init = ipmr_net_init,
3144 .exit = ipmr_net_exit,
3145};
3146
3147int __init ip_mr_init(void)
3148{
3149 int err;
3150
3151 mrt_cachep = kmem_cache_create("ip_mrt_cache",
3152 sizeof(struct mfc_cache),
3153 0, SLAB_HWCACHE_ALIGN | SLAB_PANIC,
3154 NULL);
3155
3156 err = register_pernet_subsys(&ipmr_net_ops);
3157 if (err)
3158 goto reg_pernet_fail;
3159
3160 err = register_netdevice_notifier(&ip_mr_notifier);
3161 if (err)
3162 goto reg_notif_fail;
3163#ifdef CONFIG_IP_PIMSM_V2
3164 if (inet_add_protocol(&pim_protocol, IPPROTO_PIM) < 0) {
3165 pr_err("%s: can't add PIM protocol\n", __func__);
3166 err = -EAGAIN;
3167 goto add_proto_fail;
3168 }
3169#endif
3170 rtnl_register(RTNL_FAMILY_IPMR, RTM_GETROUTE,
3171 ipmr_rtm_getroute, ipmr_rtm_dumproute, 0);
3172 rtnl_register(RTNL_FAMILY_IPMR, RTM_NEWROUTE,
3173 ipmr_rtm_route, NULL, 0);
3174 rtnl_register(RTNL_FAMILY_IPMR, RTM_DELROUTE,
3175 ipmr_rtm_route, NULL, 0);
3176
3177 rtnl_register(RTNL_FAMILY_IPMR, RTM_GETLINK,
3178 NULL, ipmr_rtm_dumplink, 0);
3179 return 0;
3180
3181#ifdef CONFIG_IP_PIMSM_V2
3182add_proto_fail:
3183 unregister_netdevice_notifier(&ip_mr_notifier);
3184#endif
3185reg_notif_fail:
3186 unregister_pernet_subsys(&ipmr_net_ops);
3187reg_pernet_fail:
3188 kmem_cache_destroy(mrt_cachep);
3189 return err;
3190}