/* * Copyright (c) 1998-2001 * University of Southern California/Information Sciences Institute. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ /* * Part of this program has been derived from mrouted. * The mrouted program is covered by the license in the accompanying file * named "LICENSE.mrouted". * * The mrouted program is COPYRIGHT 1989 by The Board of Trustees of * Leland Stanford Junior University. * */ #include "defs.h" #ifdef RAW_OUTPUT_IS_RAW int curttl = 0; #endif /* * XXX: in Some BSD's there is only MRT_ASSERT, but in Linux there are * both MRT_ASSERT and MRT_PIM */ #ifndef MRT_PIM #define MRT_PIM MRT_ASSERT #endif #ifdef __linux__ /* Currently only available on Linux */ # ifndef MRT_TABLE # define MRT_TABLE (MRT_BASE + 9) # endif #endif /* * Open/init the multicast routing in the kernel and sets the * MRT_PIM (aka MRT_ASSERT) flag in the kernel. */ void k_init_pim(int socket) { int v = 1; #ifdef MRT_TABLE /* Currently only available on Linux */ if (mrt_table_id != 0) { logit(LOG_INFO, 0, "Initializing multicast routing table id %u", mrt_table_id); if (setsockopt(socket, IPPROTO_IP, MRT_TABLE, &mrt_table_id, sizeof(mrt_table_id)) < 0) { logit(LOG_WARNING, errno, "Cannot set multicast routing table id"); logit(LOG_ERR, 0, "Make sure your kernel has CONFIG_IP_MROUTE_MULTIPLE_TABLES=y"); } } #endif if (setsockopt(socket, IPPROTO_IP, MRT_INIT, (char *)&v, sizeof(int)) < 0) { if (errno == EADDRINUSE) logit(LOG_ERR, 0, "Another multicast routing application is already running."); else logit(LOG_ERR, errno, "Cannot enable multicast routing in kernel"); } if (setsockopt(socket, IPPROTO_IP, MRT_PIM, (char *)&v, sizeof(int)) < 0) logit(LOG_ERR, errno, "Cannot set PIM flag in kernel"); } /* * Stops the multicast routing in the kernel and resets the * MRT_PIM (aka MRT_ASSERT) flag in the kernel. */ void k_stop_pim(int socket) { int v = 0; if (setsockopt(socket, IPPROTO_IP, MRT_PIM, (char *)&v, sizeof(int)) < 0) logit(LOG_ERR, errno, "Cannot reset PIM flag in kernel"); if (setsockopt(socket, IPPROTO_IP, MRT_DONE, (char *)NULL, 0) < 0) logit(LOG_ERR, errno, "Cannot disable multicast routing in kernel"); } /* * Set the socket sending buffer. `bufsize` is the preferred size, * `minsize` is the smallest acceptable size. */ void k_set_sndbuf(int socket, int bufsize, int minsize) { int delta = bufsize / 2; int iter = 0; /* * Set the socket buffer. If we can't set it as large as we * want, search around to try to find the highest acceptable * value. The highest acceptable value being smaller than * minsize is a fatal error. */ if (setsockopt(socket, SOL_SOCKET, SO_SNDBUF, (char *)&bufsize, sizeof(bufsize)) < 0) { bufsize -= delta; while (1) { iter++; if (delta > 1) delta /= 2; if (setsockopt(socket, SOL_SOCKET, SO_SNDBUF, (char *)&bufsize, sizeof(bufsize)) < 0) { bufsize -= delta; } else { if (delta < 1024) break; bufsize += delta; } } if (bufsize < minsize) { logit(LOG_ERR, 0, "OS-allowed send buffer size %u < app min %u", bufsize, minsize); /*NOTREACHED*/ } } IF_DEBUG(DEBUG_KERN) { logit(LOG_DEBUG, 0, "Got %d byte send buffer size in %d iterations", bufsize, iter); } } /* * Set the socket receiving buffer. `bufsize` is the preferred size, * `minsize` is the smallest acceptable size. */ void k_set_rcvbuf(int socket, int bufsize, int minsize) { int delta = bufsize / 2; int iter = 0; /* * Set the socket buffer. If we can't set it as large as we * want, search around to try to find the highest acceptable * value. The highest acceptable value being smaller than * minsize is a fatal error. */ if (setsockopt(socket, SOL_SOCKET, SO_RCVBUF, (char *)&bufsize, sizeof(bufsize)) < 0) { bufsize -= delta; while (1) { iter++; if (delta > 1) delta /= 2; if (setsockopt(socket, SOL_SOCKET, SO_RCVBUF, (char *)&bufsize, sizeof(bufsize)) < 0) { bufsize -= delta; } else { if (delta < 1024) break; bufsize += delta; } } if (bufsize < minsize) { logit(LOG_ERR, 0, "OS-allowed recv buffer size %u < app min %u", bufsize, minsize); /*NOTREACHED*/ } } IF_DEBUG(DEBUG_KERN) { logit(LOG_DEBUG, 0, "Got %d byte recv buffer size in %d iterations", bufsize, iter); } } /* * Set/reset the IP_HDRINCL option. My guess is we don't need it for raw * sockets, but having it here won't hurt. Well, unless you are running * an older version of FreeBSD (older than 2.2.2). If the multicast * raw packet is bigger than 208 bytes, then IP_HDRINCL triggers a bug * in the kernel and "panic". The kernel patch for netinet/ip_raw.c * coming with this distribution fixes it. */ void k_hdr_include(int socket, int val) { #ifdef IP_HDRINCL if (setsockopt(socket, IPPROTO_IP, IP_HDRINCL, (char *)&val, sizeof(val)) < 0) logit(LOG_ERR, errno, "Failed %s IP_HDRINCL on socket %d", ENABLINGSTR(val), socket); #endif } /* * Set the default TTL for the multicast packets outgoing from this * socket. * TODO: Does it affect the unicast packets? */ void k_set_ttl(int socket __attribute__((unused)), int t) { #ifdef RAW_OUTPUT_IS_RAW curttl = t; #else uint8_t ttl; ttl = t; if (setsockopt(socket, IPPROTO_IP, IP_MULTICAST_TTL, (char *)&ttl, sizeof(ttl)) < 0) logit(LOG_ERR, errno, "Failed setting IP_MULTICAST_TTL %u on socket %d", ttl, socket); #endif } /* * Set/reset the IP_MULTICAST_LOOP. Set/reset is specified by "flag". */ void k_set_loop(int socket, int flag) { uint8_t loop; loop = flag; if (setsockopt(socket, IPPROTO_IP, IP_MULTICAST_LOOP, (char *)&loop, sizeof(loop)) < 0) logit(LOG_ERR, errno, "Failed %s IP_MULTICAST_LOOP on socket %d", ENABLINGSTR(flag), socket); } /* * Set the IP_MULTICAST_IF option on local interface ifa. */ void k_set_if(int socket, uint32_t ifa) { struct in_addr adr; adr.s_addr = ifa; if (setsockopt(socket, IPPROTO_IP, IP_MULTICAST_IF, (char *)&adr, sizeof(adr)) < 0) { if (errno == EADDRNOTAVAIL || errno == EINVAL) return; logit(LOG_ERR, errno, "Failed setting IP_MULTICAST_IF option on %s", inet_fmt(adr.s_addr, s1, sizeof(s1))); } } /* * Set Router Alert IP option, RFC2113 */ void k_set_router_alert(int socket) { char router_alert[4]; /* Router Alert IP Option */ router_alert[0] = IPOPT_RA; /* Router Alert */ router_alert[1] = 4; /* 4 bytes */ router_alert[2] = 0; router_alert[3] = 0; if (setsockopt(socket, IPPROTO_IP, IP_OPTIONS, router_alert, sizeof(router_alert) )< 0) logit(LOG_ERR, errno, "setsockopt IP_OPTIONS IPOPT_RA"); } /* * Join a multicast group on virtual interface 'v'. */ void k_join(int socket, uint32_t grp, struct uvif *v) { #ifdef __linux__ struct ip_mreqn mreq; #else struct ip_mreq mreq; #endif /* __linux__ */ #ifdef __linux__ mreq.imr_ifindex = v->uv_ifindex; mreq.imr_address.s_addr = v->uv_lcl_addr; #else mreq.imr_interface.s_addr = v->uv_lcl_addr; #endif /* __linux__ */ mreq.imr_multiaddr.s_addr = grp; if (setsockopt(socket, IPPROTO_IP, IP_ADD_MEMBERSHIP, (char *)&mreq, sizeof(mreq)) < 0) { #ifdef __linux__ logit(LOG_WARNING, errno, "Cannot join group %s on interface %s (ifindex %d)", inet_fmt(grp, s1, sizeof(s1)), inet_fmt(v->uv_lcl_addr, s2, sizeof(s2)), v->uv_ifindex); #else logit(LOG_WARNING, errno, "Cannot join group %s on interface %s", inet_fmt(grp, s1, sizeof(s1)), inet_fmt(v->uv_lcl_addr, s2, sizeof(s2))); #endif /* __linux__ */ } } /* * Leave a multicast group on virtual interface 'v'. */ void k_leave(int socket, uint32_t grp, struct uvif *v) { #ifdef __linux__ struct ip_mreqn mreq; #else struct ip_mreq mreq; #endif /* __linux__ */ #ifdef __linux__ mreq.imr_ifindex = v->uv_ifindex; mreq.imr_address.s_addr = v->uv_lcl_addr; #else mreq.imr_interface.s_addr = v->uv_lcl_addr; #endif /* __linux__ */ mreq.imr_multiaddr.s_addr = grp; if (setsockopt(socket, IPPROTO_IP, IP_DROP_MEMBERSHIP, (char *)&mreq, sizeof(mreq)) < 0) { #ifdef __linux__ logit(LOG_WARNING, errno, "Cannot leave group %s on interface %s (ifindex %d)", inet_fmt(grp, s1, sizeof(s1)), inet_fmt(v->uv_lcl_addr, s2, sizeof(s2)), v->uv_ifindex); #else logit(LOG_WARNING, errno, "Cannot leave group %s on interface %s", inet_fmt(grp, s1, sizeof(s1)), inet_fmt(v->uv_lcl_addr, s2, sizeof(s2))); #endif /* __linux__ */ } } /* * Fill struct vifctl using corresponding fields from struct uvif. */ static void uvif_to_vifctl(struct vifctl *vc, struct uvif *v) { /* XXX: we don't support VIFF_TUNNEL; VIFF_SRCRT is obsolete */ vc->vifc_flags = 0; if (v->uv_flags & VIFF_REGISTER) vc->vifc_flags |= VIFF_REGISTER; vc->vifc_threshold = v->uv_threshold; vc->vifc_rate_limit = v->uv_rate_limit; vc->vifc_lcl_addr.s_addr = v->uv_lcl_addr; vc->vifc_rmt_addr.s_addr = v->uv_rmt_addr; } /* * Add a virtual interface in the kernel. */ void k_add_vif(int socket, vifi_t vifi, struct uvif *v) { struct vifctl vc; vc.vifc_vifi = vifi; uvif_to_vifctl(&vc, v); if (setsockopt(socket, IPPROTO_IP, MRT_ADD_VIF, (char *)&vc, sizeof(vc)) < 0) logit(LOG_ERR, errno, "Failed adding VIF %d (MRT_ADD_VIF) for iface %s", vifi, v->uv_name); } /* * Delete a virtual interface in the kernel. */ void k_del_vif(int socket, vifi_t vifi, struct uvif *v __attribute__((unused))) { /* * Unfortunately Linux MRT_DEL_VIF API differs a bit from the *BSD one. It * expects to receive a pointer to struct vifctl that corresponds to the VIF * we're going to delete. *BSD systems on the other hand exepect only the * index of that VIF. */ #ifdef __linux__ struct vifctl vc; vc.vifc_vifi = vifi; uvif_to_vifctl(&vc, v); /* 'v' is used only on Linux systems. */ if (setsockopt(socket, IPPROTO_IP, MRT_DEL_VIF, (char *)&vc, sizeof(vc)) < 0) #else /* *BSD et al. */ if (setsockopt(socket, IPPROTO_IP, MRT_DEL_VIF, (char *)&vifi, sizeof(vifi)) < 0) #endif /* !__linux__ */ { if (errno == EADDRNOTAVAIL || errno == EINVAL) return; logit(LOG_ERR, errno, "Failed removing VIF %d (MRT_DEL_VIF)", vifi); } } /* * Delete all MFC entries for particular routing entry from the kernel. */ int k_del_mfc(int socket, uint32_t source, uint32_t group) { struct mfcctl mc; memset(&mc, 0, sizeof(mc)); mc.mfcc_origin.s_addr = source; mc.mfcc_mcastgrp.s_addr = group; if (setsockopt(socket, IPPROTO_IP, MRT_DEL_MFC, (char *)&mc, sizeof(mc)) < 0) { logit(LOG_WARNING, errno, "Failed removing MFC entry src %s, grp %s", inet_fmt(mc.mfcc_origin.s_addr, s1, sizeof(s1)), inet_fmt(mc.mfcc_mcastgrp.s_addr, s2, sizeof(s2))); return FALSE; } logit(LOG_INFO, 0, "Removed MFC entry src %s, grp %s", inet_fmt(mc.mfcc_origin.s_addr, s1, sizeof(s1)), inet_fmt(mc.mfcc_mcastgrp.s_addr, s2, sizeof(s2))); return TRUE; } /* * Install/modify a MFC entry in the kernel */ int k_chg_mfc(int socket, uint32_t source, uint32_t group, vifi_t iif, vifbitmap_t oifs, uint32_t rp_addr __attribute__((unused))) { char input[IFNAMSIZ], output[MAXVIFS * (IFNAMSIZ + 2)] = ""; vifi_t vifi; struct uvif *v; struct mfcctl mc; memset(&mc, 0, sizeof(mc)); mc.mfcc_origin.s_addr = source; mc.mfcc_mcastgrp.s_addr = group; mc.mfcc_parent = iif; /* * draft-ietf-pim-sm-v2-new-05.txt section 4.2 mentions iif is removed * at the packet forwarding phase */ VIFM_CLR(mc.mfcc_parent, oifs); for (vifi = 0, v = uvifs; vifi < numvifs; vifi++, v++) { if (VIFM_ISSET(vifi, oifs)) { mc.mfcc_ttls[vifi] = v->uv_threshold; if (output[0] != 0) strlcat(output, ", ", sizeof(output)); strlcat(output, v->uv_name, sizeof(output)); } else { mc.mfcc_ttls[vifi] = 0; } } strlcpy(input, uvifs[iif].uv_name, sizeof(input)); #ifdef PIM_REG_KERNEL_ENCAP mc.mfcc_rp_addr.s_addr = rp_addr; #endif if (setsockopt(socket, IPPROTO_IP, MRT_ADD_MFC, (char *)&mc, sizeof(mc)) < 0) { logit(LOG_WARNING, errno, "Failed adding MFC entry src %s grp %s from %s to %s", inet_fmt(mc.mfcc_origin.s_addr, s1, sizeof(s1)), inet_fmt(mc.mfcc_mcastgrp.s_addr, s2, sizeof(s2)), input, output); return FALSE; } logit(LOG_INFO, 0, "Added kernel MFC entry src %s grp %s from %s to %s", inet_fmt(mc.mfcc_origin.s_addr, s1, sizeof(s1)), inet_fmt(mc.mfcc_mcastgrp.s_addr, s2, sizeof(s2)), input, output); return TRUE; } /* * Get packet counters for particular interface * XXX: TODO: currently not used, but keep just in case we need it later. */ int k_get_vif_count(vifi_t vifi, struct vif_count *retval) { struct sioc_vif_req vreq; memset(&vreq, 0, sizeof(vreq)); vreq.vifi = vifi; if (ioctl(udp_socket, SIOCGETVIFCNT, (char *)&vreq) < 0) { logit(LOG_WARNING, errno, "Failed reading kernel packet count (SIOCGETVIFCNT) on vif %d", vifi); retval->icount = retval->ocount = retval->ibytes = retval->obytes = 0xffffffff; return 1; } retval->icount = vreq.icount; retval->ocount = vreq.ocount; retval->ibytes = vreq.ibytes; retval->obytes = vreq.obytes; return 0; } /* * Gets the number of packets, bytes, and number op packets arrived * on wrong if in the kernel for particular (S,G) entry. */ int k_get_sg_cnt(int socket, uint32_t source, uint32_t group, struct sg_count *retval) { struct sioc_sg_req sgreq; memset(&sgreq, 0, sizeof(sgreq)); sgreq.src.s_addr = source; sgreq.grp.s_addr = group; if ((ioctl(socket, SIOCGETSGCNT, (char *)&sgreq) < 0) || (sgreq.wrong_if == 0xffffffff)) { /* XXX: ipmulti-3.5 has bug in ip_mroute.c, get_sg_cnt(): * the return code is always 0, so this is why we need to check * the wrong_if value. */ logit(LOG_WARNING, errno, "Failed reading kernel count (SIOCGETSGCNT) for (S,G) on (%s, %s)", inet_fmt(source, s1, sizeof(s1)), inet_fmt(group, s2, sizeof(s2))); retval->pktcnt = retval->bytecnt = retval->wrong_if = ~0; return 1; } retval->pktcnt = sgreq.pktcnt; retval->bytecnt = sgreq.bytecnt; retval->wrong_if = sgreq.wrong_if; return 0; } /** * Local Variables: * version-control: t * indent-tabs-mode: t * c-file-style: "ellemtel" * c-basic-offset: 4 * End: */