]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/ipv4/ipmr.c
treewide: setup_timer() -> timer_setup()
[mirror_ubuntu-bionic-kernel.git] / net / ipv4 / ipmr.c
CommitLineData
1da177e4
LT
1/*
2 * IP multicast routing support for mrouted 3.6/3.8
3 *
113aa838 4 * (c) 1995 Alan Cox, <alan@lxorguk.ukuu.org.uk>
1da177e4
LT
5 * Linux Consultancy and Custom Driver Development
6 *
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License
9 * as published by the Free Software Foundation; either version
10 * 2 of the License, or (at your option) any later version.
11 *
1da177e4
LT
12 * Fixes:
13 * Michael Chastain : Incorrect size of copying.
14 * Alan Cox : Added the cache manager code
15 * Alan Cox : Fixed the clone/copy bug and device race.
16 * Mike McLagan : Routing by source
17 * Malcolm Beattie : Buffer handling fixes.
18 * Alexey Kuznetsov : Double buffer free and other fixes.
19 * SVR Anand : Fixed several multicast bugs and problems.
20 * Alexey Kuznetsov : Status, optimisations and more.
21 * Brad Parker : Better behaviour on mrouted upcall
22 * overflow.
23 * Carlos Picoto : PIMv1 Support
24 * Pavlin Ivanov Radoslavov: PIMv2 Registers must checksum only PIM header
f77f13e2 25 * Relax this requirement to work with older peers.
1da177e4
LT
26 *
27 */
28
7c0f6ba6 29#include <linux/uaccess.h>
1da177e4 30#include <linux/types.h>
4fc268d2 31#include <linux/capability.h>
1da177e4
LT
32#include <linux/errno.h>
33#include <linux/timer.h>
34#include <linux/mm.h>
35#include <linux/kernel.h>
36#include <linux/fcntl.h>
37#include <linux/stat.h>
38#include <linux/socket.h>
39#include <linux/in.h>
40#include <linux/inet.h>
41#include <linux/netdevice.h>
42#include <linux/inetdevice.h>
43#include <linux/igmp.h>
44#include <linux/proc_fs.h>
45#include <linux/seq_file.h>
46#include <linux/mroute.h>
47#include <linux/init.h>
46f25dff 48#include <linux/if_ether.h>
5a0e3ad6 49#include <linux/slab.h>
457c4cbc 50#include <net/net_namespace.h>
1da177e4
LT
51#include <net/ip.h>
52#include <net/protocol.h>
53#include <linux/skbuff.h>
14c85021 54#include <net/route.h>
1da177e4
LT
55#include <net/sock.h>
56#include <net/icmp.h>
57#include <net/udp.h>
58#include <net/raw.h>
59#include <linux/notifier.h>
60#include <linux/if_arp.h>
61#include <linux/netfilter_ipv4.h>
709b46e8 62#include <linux/compat.h>
bc3b2d7f 63#include <linux/export.h>
c5441932 64#include <net/ip_tunnels.h>
1da177e4 65#include <net/checksum.h>
dc5fc579 66#include <net/netlink.h>
f0ad0860 67#include <net/fib_rules.h>
d67b8c61 68#include <linux/netconf.h>
ccbb0aa6 69#include <net/nexthop.h>
5d8b3e69 70#include <net/switchdev.h>
1da177e4 71
f0ad0860
PM
72struct ipmr_rule {
73 struct fib_rule common;
74};
75
76struct ipmr_result {
77 struct mr_table *mrt;
78};
79
1da177e4 80/* Big lock, protecting vif table, mrt cache and mroute socket state.
a8cb16dd 81 * Note that the changes are semaphored via rtnl_lock.
1da177e4
LT
82 */
83
84static DEFINE_RWLOCK(mrt_lock);
85
7ef8f65d 86/* Multicast router control variables */
1da177e4 87
1da177e4
LT
88/* Special spinlock for queue of unresolved entries */
89static DEFINE_SPINLOCK(mfc_unres_lock);
90
91/* We return to original Alan's scheme. Hash table of resolved
a8cb16dd
ED
92 * entries is changed only in process context and protected
93 * with weak lock mrt_lock. Queue of unresolved entries is protected
94 * with strong spinlock mfc_unres_lock.
95 *
96 * In this case data path is free of exclusive locks at all.
1da177e4
LT
97 */
98
e18b890b 99static struct kmem_cache *mrt_cachep __read_mostly;
1da177e4 100
f0ad0860 101static struct mr_table *ipmr_new_table(struct net *net, u32 id);
acbb219d
FR
102static void ipmr_free_table(struct mr_table *mrt);
103
c4854ec8 104static void ip_mr_forward(struct net *net, struct mr_table *mrt,
4b1f0d33
DS
105 struct net_device *dev, struct sk_buff *skb,
106 struct mfc_cache *cache, int local);
0c12295a 107static int ipmr_cache_report(struct mr_table *mrt,
4feb88e5 108 struct sk_buff *pkt, vifi_t vifi, int assert);
cb6a4e46
PM
109static int __ipmr_fill_mroute(struct mr_table *mrt, struct sk_buff *skb,
110 struct mfc_cache *c, struct rtmsg *rtm);
8cd3ac9f
ND
111static void mroute_netlink_event(struct mr_table *mrt, struct mfc_cache *mfc,
112 int cmd);
5a645dd8 113static void igmpmsg_netlink_event(struct mr_table *mrt, struct sk_buff *pkt);
0e615e96 114static void mroute_clean_tables(struct mr_table *mrt, bool all);
e99e88a9 115static void ipmr_expire_process(struct timer_list *t);
f0ad0860
PM
116
117#ifdef CONFIG_IP_MROUTE_MULTIPLE_TABLES
118#define ipmr_for_each_table(mrt, net) \
119 list_for_each_entry_rcu(mrt, &net->ipv4.mr_tables, list)
120
121static struct mr_table *ipmr_get_table(struct net *net, u32 id)
122{
123 struct mr_table *mrt;
124
125 ipmr_for_each_table(mrt, net) {
126 if (mrt->id == id)
127 return mrt;
128 }
129 return NULL;
130}
131
da91981b 132static int ipmr_fib_lookup(struct net *net, struct flowi4 *flp4,
f0ad0860
PM
133 struct mr_table **mrt)
134{
f0ad0860 135 int err;
95f4a45d
HFS
136 struct ipmr_result res;
137 struct fib_lookup_arg arg = {
138 .result = &res,
139 .flags = FIB_LOOKUP_NOREF,
140 };
f0ad0860 141
e58e4159
DA
142 /* update flow if oif or iif point to device enslaved to l3mdev */
143 l3mdev_update_flow(net, flowi4_to_flowi(flp4));
144
da91981b
DM
145 err = fib_rules_lookup(net->ipv4.mr_rules_ops,
146 flowi4_to_flowi(flp4), 0, &arg);
f0ad0860
PM
147 if (err < 0)
148 return err;
149 *mrt = res.mrt;
150 return 0;
151}
152
153static int ipmr_rule_action(struct fib_rule *rule, struct flowi *flp,
154 int flags, struct fib_lookup_arg *arg)
155{
156 struct ipmr_result *res = arg->result;
157 struct mr_table *mrt;
1da177e4 158
f0ad0860
PM
159 switch (rule->action) {
160 case FR_ACT_TO_TBL:
161 break;
162 case FR_ACT_UNREACHABLE:
163 return -ENETUNREACH;
164 case FR_ACT_PROHIBIT:
165 return -EACCES;
166 case FR_ACT_BLACKHOLE:
167 default:
168 return -EINVAL;
169 }
170
e58e4159
DA
171 arg->table = fib_rule_get_table(rule, arg);
172
173 mrt = ipmr_get_table(rule->fr_net, arg->table);
51456b29 174 if (!mrt)
f0ad0860
PM
175 return -EAGAIN;
176 res->mrt = mrt;
177 return 0;
178}
179
180static int ipmr_rule_match(struct fib_rule *rule, struct flowi *fl, int flags)
181{
182 return 1;
183}
184
185static const struct nla_policy ipmr_rule_policy[FRA_MAX + 1] = {
186 FRA_GENERIC_POLICY,
187};
188
189static int ipmr_rule_configure(struct fib_rule *rule, struct sk_buff *skb,
190 struct fib_rule_hdr *frh, struct nlattr **tb)
191{
192 return 0;
193}
194
195static int ipmr_rule_compare(struct fib_rule *rule, struct fib_rule_hdr *frh,
196 struct nlattr **tb)
197{
198 return 1;
199}
200
201static int ipmr_rule_fill(struct fib_rule *rule, struct sk_buff *skb,
202 struct fib_rule_hdr *frh)
203{
204 frh->dst_len = 0;
205 frh->src_len = 0;
206 frh->tos = 0;
207 return 0;
208}
209
04a6f82c 210static const struct fib_rules_ops __net_initconst ipmr_rules_ops_template = {
25239cee 211 .family = RTNL_FAMILY_IPMR,
f0ad0860
PM
212 .rule_size = sizeof(struct ipmr_rule),
213 .addr_size = sizeof(u32),
214 .action = ipmr_rule_action,
215 .match = ipmr_rule_match,
216 .configure = ipmr_rule_configure,
217 .compare = ipmr_rule_compare,
f0ad0860
PM
218 .fill = ipmr_rule_fill,
219 .nlgroup = RTNLGRP_IPV4_RULE,
220 .policy = ipmr_rule_policy,
221 .owner = THIS_MODULE,
222};
223
224static int __net_init ipmr_rules_init(struct net *net)
225{
226 struct fib_rules_ops *ops;
227 struct mr_table *mrt;
228 int err;
229
230 ops = fib_rules_register(&ipmr_rules_ops_template, net);
231 if (IS_ERR(ops))
232 return PTR_ERR(ops);
233
234 INIT_LIST_HEAD(&net->ipv4.mr_tables);
235
236 mrt = ipmr_new_table(net, RT_TABLE_DEFAULT);
1113ebbc
NA
237 if (IS_ERR(mrt)) {
238 err = PTR_ERR(mrt);
f0ad0860
PM
239 goto err1;
240 }
241
242 err = fib_default_rule_add(ops, 0x7fff, RT_TABLE_DEFAULT, 0);
243 if (err < 0)
244 goto err2;
245
246 net->ipv4.mr_rules_ops = ops;
247 return 0;
248
249err2:
f243e5a7 250 ipmr_free_table(mrt);
f0ad0860
PM
251err1:
252 fib_rules_unregister(ops);
253 return err;
254}
255
256static void __net_exit ipmr_rules_exit(struct net *net)
257{
258 struct mr_table *mrt, *next;
259
ed785309 260 rtnl_lock();
035320d5
ED
261 list_for_each_entry_safe(mrt, next, &net->ipv4.mr_tables, list) {
262 list_del(&mrt->list);
acbb219d 263 ipmr_free_table(mrt);
035320d5 264 }
f0ad0860 265 fib_rules_unregister(net->ipv4.mr_rules_ops);
419df12f 266 rtnl_unlock();
f0ad0860 267}
4d65b948
YG
268
269static int ipmr_rules_dump(struct net *net, struct notifier_block *nb)
270{
271 return fib_rules_dump(net, nb, RTNL_FAMILY_IPMR);
272}
273
274static unsigned int ipmr_rules_seq_read(struct net *net)
275{
276 return fib_rules_seq_read(net, RTNL_FAMILY_IPMR);
277}
478e4c2f
YG
278
279bool ipmr_rule_default(const struct fib_rule *rule)
280{
281 return fib_rule_matchall(rule) && rule->table == RT_TABLE_DEFAULT;
282}
283EXPORT_SYMBOL(ipmr_rule_default);
f0ad0860
PM
284#else
285#define ipmr_for_each_table(mrt, net) \
286 for (mrt = net->ipv4.mrt; mrt; mrt = NULL)
287
288static struct mr_table *ipmr_get_table(struct net *net, u32 id)
289{
290 return net->ipv4.mrt;
291}
292
da91981b 293static int ipmr_fib_lookup(struct net *net, struct flowi4 *flp4,
f0ad0860
PM
294 struct mr_table **mrt)
295{
296 *mrt = net->ipv4.mrt;
297 return 0;
298}
299
300static int __net_init ipmr_rules_init(struct net *net)
301{
1113ebbc
NA
302 struct mr_table *mrt;
303
304 mrt = ipmr_new_table(net, RT_TABLE_DEFAULT);
305 if (IS_ERR(mrt))
306 return PTR_ERR(mrt);
307 net->ipv4.mrt = mrt;
308 return 0;
f0ad0860
PM
309}
310
311static void __net_exit ipmr_rules_exit(struct net *net)
312{
ed785309 313 rtnl_lock();
acbb219d 314 ipmr_free_table(net->ipv4.mrt);
ed785309
WC
315 net->ipv4.mrt = NULL;
316 rtnl_unlock();
f0ad0860 317}
4d65b948
YG
318
319static int ipmr_rules_dump(struct net *net, struct notifier_block *nb)
320{
321 return 0;
322}
323
324static unsigned int ipmr_rules_seq_read(struct net *net)
325{
326 return 0;
327}
478e4c2f
YG
328
329bool ipmr_rule_default(const struct fib_rule *rule)
330{
331 return true;
332}
333EXPORT_SYMBOL(ipmr_rule_default);
f0ad0860
PM
334#endif
335
8fb472c0
NA
336static inline int ipmr_hash_cmp(struct rhashtable_compare_arg *arg,
337 const void *ptr)
338{
339 const struct mfc_cache_cmp_arg *cmparg = arg->key;
340 struct mfc_cache *c = (struct mfc_cache *)ptr;
341
342 return cmparg->mfc_mcastgrp != c->mfc_mcastgrp ||
343 cmparg->mfc_origin != c->mfc_origin;
344}
345
346static const struct rhashtable_params ipmr_rht_params = {
347 .head_offset = offsetof(struct mfc_cache, mnode),
348 .key_offset = offsetof(struct mfc_cache, cmparg),
349 .key_len = sizeof(struct mfc_cache_cmp_arg),
350 .nelem_hint = 3,
351 .locks_mul = 1,
352 .obj_cmpfn = ipmr_hash_cmp,
353 .automatic_shrinking = true,
354};
355
f0ad0860
PM
356static struct mr_table *ipmr_new_table(struct net *net, u32 id)
357{
358 struct mr_table *mrt;
1da177e4 359
1113ebbc
NA
360 /* "pimreg%u" should not exceed 16 bytes (IFNAMSIZ) */
361 if (id != RT_TABLE_DEFAULT && id >= 1000000000)
362 return ERR_PTR(-EINVAL);
363
f0ad0860 364 mrt = ipmr_get_table(net, id);
00db4124 365 if (mrt)
f0ad0860
PM
366 return mrt;
367
368 mrt = kzalloc(sizeof(*mrt), GFP_KERNEL);
51456b29 369 if (!mrt)
1113ebbc 370 return ERR_PTR(-ENOMEM);
8de53dfb 371 write_pnet(&mrt->net, net);
f0ad0860
PM
372 mrt->id = id;
373
8fb472c0
NA
374 rhltable_init(&mrt->mfc_hash, &ipmr_rht_params);
375 INIT_LIST_HEAD(&mrt->mfc_cache_list);
f0ad0860
PM
376 INIT_LIST_HEAD(&mrt->mfc_unres_queue);
377
e99e88a9 378 timer_setup(&mrt->ipmr_expire_timer, ipmr_expire_process, 0);
f0ad0860 379
f0ad0860 380 mrt->mroute_reg_vif_num = -1;
f0ad0860
PM
381#ifdef CONFIG_IP_MROUTE_MULTIPLE_TABLES
382 list_add_tail_rcu(&mrt->list, &net->ipv4.mr_tables);
383#endif
384 return mrt;
385}
1da177e4 386
acbb219d
FR
387static void ipmr_free_table(struct mr_table *mrt)
388{
389 del_timer_sync(&mrt->ipmr_expire_timer);
0e615e96 390 mroute_clean_tables(mrt, true);
8fb472c0 391 rhltable_destroy(&mrt->mfc_hash);
acbb219d
FR
392 kfree(mrt);
393}
394
1da177e4
LT
395/* Service routines creating virtual interfaces: DVMRP tunnels and PIMREG */
396
d607032d
WC
397static void ipmr_del_tunnel(struct net_device *dev, struct vifctl *v)
398{
4feb88e5
BT
399 struct net *net = dev_net(dev);
400
d607032d
WC
401 dev_close(dev);
402
4feb88e5 403 dev = __dev_get_by_name(net, "tunl0");
d607032d 404 if (dev) {
5bc3eb7e 405 const struct net_device_ops *ops = dev->netdev_ops;
d607032d 406 struct ifreq ifr;
d607032d
WC
407 struct ip_tunnel_parm p;
408
409 memset(&p, 0, sizeof(p));
410 p.iph.daddr = v->vifc_rmt_addr.s_addr;
411 p.iph.saddr = v->vifc_lcl_addr.s_addr;
412 p.iph.version = 4;
413 p.iph.ihl = 5;
414 p.iph.protocol = IPPROTO_IPIP;
415 sprintf(p.name, "dvmrp%d", v->vifc_vifi);
416 ifr.ifr_ifru.ifru_data = (__force void __user *)&p;
417
5bc3eb7e
SH
418 if (ops->ndo_do_ioctl) {
419 mm_segment_t oldfs = get_fs();
420
421 set_fs(KERNEL_DS);
422 ops->ndo_do_ioctl(dev, &ifr, SIOCDELTUNNEL);
423 set_fs(oldfs);
424 }
d607032d
WC
425 }
426}
427
a0b47736
NA
428/* Initialize ipmr pimreg/tunnel in_device */
429static bool ipmr_init_vif_indev(const struct net_device *dev)
430{
431 struct in_device *in_dev;
432
433 ASSERT_RTNL();
434
435 in_dev = __in_dev_get_rtnl(dev);
436 if (!in_dev)
437 return false;
438 ipv4_devconf_setall(in_dev);
439 neigh_parms_data_state_setall(in_dev->arp_parms);
440 IPV4_DEVCONF(in_dev->cnf, RP_FILTER) = 0;
441
442 return true;
443}
444
7ef8f65d 445static struct net_device *ipmr_new_tunnel(struct net *net, struct vifctl *v)
1da177e4
LT
446{
447 struct net_device *dev;
448
4feb88e5 449 dev = __dev_get_by_name(net, "tunl0");
1da177e4
LT
450
451 if (dev) {
5bc3eb7e 452 const struct net_device_ops *ops = dev->netdev_ops;
1da177e4
LT
453 int err;
454 struct ifreq ifr;
1da177e4 455 struct ip_tunnel_parm p;
1da177e4
LT
456
457 memset(&p, 0, sizeof(p));
458 p.iph.daddr = v->vifc_rmt_addr.s_addr;
459 p.iph.saddr = v->vifc_lcl_addr.s_addr;
460 p.iph.version = 4;
461 p.iph.ihl = 5;
462 p.iph.protocol = IPPROTO_IPIP;
463 sprintf(p.name, "dvmrp%d", v->vifc_vifi);
ba93ef74 464 ifr.ifr_ifru.ifru_data = (__force void __user *)&p;
1da177e4 465
5bc3eb7e
SH
466 if (ops->ndo_do_ioctl) {
467 mm_segment_t oldfs = get_fs();
468
469 set_fs(KERNEL_DS);
470 err = ops->ndo_do_ioctl(dev, &ifr, SIOCADDTUNNEL);
471 set_fs(oldfs);
a8cb16dd 472 } else {
5bc3eb7e 473 err = -EOPNOTSUPP;
a8cb16dd 474 }
1da177e4
LT
475 dev = NULL;
476
4feb88e5
BT
477 if (err == 0 &&
478 (dev = __dev_get_by_name(net, p.name)) != NULL) {
1da177e4 479 dev->flags |= IFF_MULTICAST;
a0b47736 480 if (!ipmr_init_vif_indev(dev))
1da177e4 481 goto failure;
1da177e4
LT
482 if (dev_open(dev))
483 goto failure;
7dc00c82 484 dev_hold(dev);
1da177e4
LT
485 }
486 }
487 return dev;
488
489failure:
1da177e4
LT
490 unregister_netdevice(dev);
491 return NULL;
492}
493
c316c629 494#if defined(CONFIG_IP_PIMSM_V1) || defined(CONFIG_IP_PIMSM_V2)
6fef4c0c 495static netdev_tx_t reg_vif_xmit(struct sk_buff *skb, struct net_device *dev)
1da177e4 496{
4feb88e5 497 struct net *net = dev_net(dev);
f0ad0860 498 struct mr_table *mrt;
da91981b
DM
499 struct flowi4 fl4 = {
500 .flowi4_oif = dev->ifindex,
6a662719 501 .flowi4_iif = skb->skb_iif ? : LOOPBACK_IFINDEX,
da91981b 502 .flowi4_mark = skb->mark,
f0ad0860
PM
503 };
504 int err;
505
da91981b 506 err = ipmr_fib_lookup(net, &fl4, &mrt);
e40dbc51
BG
507 if (err < 0) {
508 kfree_skb(skb);
f0ad0860 509 return err;
e40dbc51 510 }
4feb88e5 511
1da177e4 512 read_lock(&mrt_lock);
cf3677ae
PE
513 dev->stats.tx_bytes += skb->len;
514 dev->stats.tx_packets++;
0c12295a 515 ipmr_cache_report(mrt, skb, mrt->mroute_reg_vif_num, IGMPMSG_WHOLEPKT);
1da177e4
LT
516 read_unlock(&mrt_lock);
517 kfree_skb(skb);
6ed10654 518 return NETDEV_TX_OK;
1da177e4
LT
519}
520
ee9b9596
ND
521static int reg_vif_get_iflink(const struct net_device *dev)
522{
523 return 0;
524}
525
007c3838
SH
526static const struct net_device_ops reg_vif_netdev_ops = {
527 .ndo_start_xmit = reg_vif_xmit,
ee9b9596 528 .ndo_get_iflink = reg_vif_get_iflink,
007c3838
SH
529};
530
1da177e4
LT
531static void reg_vif_setup(struct net_device *dev)
532{
533 dev->type = ARPHRD_PIMREG;
46f25dff 534 dev->mtu = ETH_DATA_LEN - sizeof(struct iphdr) - 8;
1da177e4 535 dev->flags = IFF_NOARP;
70cb4a45 536 dev->netdev_ops = &reg_vif_netdev_ops;
cf124db5 537 dev->needs_free_netdev = true;
403dbb97 538 dev->features |= NETIF_F_NETNS_LOCAL;
1da177e4
LT
539}
540
f0ad0860 541static struct net_device *ipmr_reg_vif(struct net *net, struct mr_table *mrt)
1da177e4
LT
542{
543 struct net_device *dev;
f0ad0860 544 char name[IFNAMSIZ];
1da177e4 545
f0ad0860
PM
546 if (mrt->id == RT_TABLE_DEFAULT)
547 sprintf(name, "pimreg");
548 else
549 sprintf(name, "pimreg%u", mrt->id);
1da177e4 550
c835a677 551 dev = alloc_netdev(0, name, NET_NAME_UNKNOWN, reg_vif_setup);
1da177e4 552
51456b29 553 if (!dev)
1da177e4
LT
554 return NULL;
555
403dbb97
TG
556 dev_net_set(dev, net);
557
1da177e4
LT
558 if (register_netdevice(dev)) {
559 free_netdev(dev);
560 return NULL;
561 }
1da177e4 562
a0b47736 563 if (!ipmr_init_vif_indev(dev))
1da177e4 564 goto failure;
1da177e4
LT
565 if (dev_open(dev))
566 goto failure;
567
7dc00c82
WC
568 dev_hold(dev);
569
1da177e4
LT
570 return dev;
571
572failure:
1da177e4
LT
573 unregister_netdevice(dev);
574 return NULL;
575}
c316c629
NA
576
577/* called with rcu_read_lock() */
578static int __pim_rcv(struct mr_table *mrt, struct sk_buff *skb,
579 unsigned int pimlen)
580{
581 struct net_device *reg_dev = NULL;
582 struct iphdr *encap;
583
584 encap = (struct iphdr *)(skb_transport_header(skb) + pimlen);
7ef8f65d 585 /* Check that:
c316c629
NA
586 * a. packet is really sent to a multicast group
587 * b. packet is not a NULL-REGISTER
588 * c. packet is not truncated
589 */
590 if (!ipv4_is_multicast(encap->daddr) ||
591 encap->tot_len == 0 ||
592 ntohs(encap->tot_len) + pimlen > skb->len)
593 return 1;
594
595 read_lock(&mrt_lock);
596 if (mrt->mroute_reg_vif_num >= 0)
597 reg_dev = mrt->vif_table[mrt->mroute_reg_vif_num].dev;
598 read_unlock(&mrt_lock);
599
600 if (!reg_dev)
601 return 1;
602
603 skb->mac_header = skb->network_header;
604 skb_pull(skb, (u8 *)encap - skb->data);
605 skb_reset_network_header(skb);
606 skb->protocol = htons(ETH_P_IP);
607 skb->ip_summed = CHECKSUM_NONE;
608
609 skb_tunnel_rx(skb, reg_dev, dev_net(reg_dev));
610
611 netif_rx(skb);
612
613 return NET_RX_SUCCESS;
614}
615#else
616static struct net_device *ipmr_reg_vif(struct net *net, struct mr_table *mrt)
617{
618 return NULL;
619}
1da177e4
LT
620#endif
621
4d65b948
YG
622static int call_ipmr_vif_entry_notifier(struct notifier_block *nb,
623 struct net *net,
624 enum fib_event_type event_type,
625 struct vif_device *vif,
626 vifi_t vif_index, u32 tb_id)
627{
628 struct vif_entry_notifier_info info = {
629 .info = {
630 .family = RTNL_FAMILY_IPMR,
631 .net = net,
632 },
633 .dev = vif->dev,
634 .vif_index = vif_index,
635 .vif_flags = vif->flags,
636 .tb_id = tb_id,
637 };
638
639 return call_fib_notifier(nb, net, event_type, &info.info);
640}
641
b362053a
YG
642static int call_ipmr_vif_entry_notifiers(struct net *net,
643 enum fib_event_type event_type,
644 struct vif_device *vif,
645 vifi_t vif_index, u32 tb_id)
646{
647 struct vif_entry_notifier_info info = {
648 .info = {
649 .family = RTNL_FAMILY_IPMR,
650 .net = net,
651 },
652 .dev = vif->dev,
653 .vif_index = vif_index,
654 .vif_flags = vif->flags,
655 .tb_id = tb_id,
656 };
657
658 ASSERT_RTNL();
659 net->ipv4.ipmr_seq++;
660 return call_fib_notifiers(net, event_type, &info.info);
661}
662
4d65b948
YG
663static int call_ipmr_mfc_entry_notifier(struct notifier_block *nb,
664 struct net *net,
665 enum fib_event_type event_type,
666 struct mfc_cache *mfc, u32 tb_id)
667{
668 struct mfc_entry_notifier_info info = {
669 .info = {
670 .family = RTNL_FAMILY_IPMR,
671 .net = net,
672 },
673 .mfc = mfc,
674 .tb_id = tb_id
675 };
676
677 return call_fib_notifier(nb, net, event_type, &info.info);
678}
679
b362053a
YG
680static int call_ipmr_mfc_entry_notifiers(struct net *net,
681 enum fib_event_type event_type,
682 struct mfc_cache *mfc, u32 tb_id)
683{
684 struct mfc_entry_notifier_info info = {
685 .info = {
686 .family = RTNL_FAMILY_IPMR,
687 .net = net,
688 },
689 .mfc = mfc,
690 .tb_id = tb_id
691 };
692
693 ASSERT_RTNL();
694 net->ipv4.ipmr_seq++;
695 return call_fib_notifiers(net, event_type, &info.info);
696}
697
2c53040f
BH
698/**
699 * vif_delete - Delete a VIF entry
7dc00c82 700 * @notify: Set to 1, if the caller is a notifier_call
1da177e4 701 */
0c12295a 702static int vif_delete(struct mr_table *mrt, int vifi, int notify,
d17fa6fa 703 struct list_head *head)
1da177e4 704{
b362053a 705 struct net *net = read_pnet(&mrt->net);
1da177e4
LT
706 struct vif_device *v;
707 struct net_device *dev;
708 struct in_device *in_dev;
709
0c12295a 710 if (vifi < 0 || vifi >= mrt->maxvif)
1da177e4
LT
711 return -EADDRNOTAVAIL;
712
0c12295a 713 v = &mrt->vif_table[vifi];
1da177e4 714
b362053a
YG
715 if (VIF_EXISTS(mrt, vifi))
716 call_ipmr_vif_entry_notifiers(net, FIB_EVENT_VIF_DEL, v, vifi,
717 mrt->id);
718
1da177e4
LT
719 write_lock_bh(&mrt_lock);
720 dev = v->dev;
721 v->dev = NULL;
722
723 if (!dev) {
724 write_unlock_bh(&mrt_lock);
725 return -EADDRNOTAVAIL;
726 }
727
0c12295a
PM
728 if (vifi == mrt->mroute_reg_vif_num)
729 mrt->mroute_reg_vif_num = -1;
1da177e4 730
a8cb16dd 731 if (vifi + 1 == mrt->maxvif) {
1da177e4 732 int tmp;
a8cb16dd
ED
733
734 for (tmp = vifi - 1; tmp >= 0; tmp--) {
0c12295a 735 if (VIF_EXISTS(mrt, tmp))
1da177e4
LT
736 break;
737 }
0c12295a 738 mrt->maxvif = tmp+1;
1da177e4
LT
739 }
740
741 write_unlock_bh(&mrt_lock);
742
743 dev_set_allmulti(dev, -1);
744
a8cb16dd
ED
745 in_dev = __in_dev_get_rtnl(dev);
746 if (in_dev) {
42f811b8 747 IPV4_DEVCONF(in_dev->cnf, MC_FORWARDING)--;
3b022865 748 inet_netconf_notify_devconf(dev_net(dev), RTM_NEWNETCONF,
d67b8c61
ND
749 NETCONFA_MC_FORWARDING,
750 dev->ifindex, &in_dev->cnf);
1da177e4
LT
751 ip_rt_multicast_event(in_dev);
752 }
753
a8cb16dd 754 if (v->flags & (VIFF_TUNNEL | VIFF_REGISTER) && !notify)
d17fa6fa 755 unregister_netdevice_queue(dev, head);
1da177e4
LT
756
757 dev_put(dev);
758 return 0;
759}
760
a8c9486b 761static void ipmr_cache_free_rcu(struct rcu_head *head)
5c0a66f5 762{
a8c9486b
ED
763 struct mfc_cache *c = container_of(head, struct mfc_cache, rcu);
764
5c0a66f5
BT
765 kmem_cache_free(mrt_cachep, c);
766}
767
310ebbba 768void ipmr_cache_free(struct mfc_cache *c)
a8c9486b
ED
769{
770 call_rcu(&c->rcu, ipmr_cache_free_rcu);
771}
310ebbba 772EXPORT_SYMBOL(ipmr_cache_free);
a8c9486b 773
1da177e4 774/* Destroy an unresolved cache entry, killing queued skbs
a8cb16dd 775 * and reporting error to netlink readers.
1da177e4 776 */
0c12295a 777static void ipmr_destroy_unres(struct mr_table *mrt, struct mfc_cache *c)
1da177e4 778{
8de53dfb 779 struct net *net = read_pnet(&mrt->net);
1da177e4 780 struct sk_buff *skb;
9ef1d4c7 781 struct nlmsgerr *e;
1da177e4 782
0c12295a 783 atomic_dec(&mrt->cache_resolve_queue_len);
1da177e4 784
c354e124 785 while ((skb = skb_dequeue(&c->mfc_un.unres.unresolved))) {
eddc9ec5 786 if (ip_hdr(skb)->version == 0) {
af72868b
JB
787 struct nlmsghdr *nlh = skb_pull(skb,
788 sizeof(struct iphdr));
1da177e4 789 nlh->nlmsg_type = NLMSG_ERROR;
573ce260 790 nlh->nlmsg_len = nlmsg_msg_size(sizeof(struct nlmsgerr));
1da177e4 791 skb_trim(skb, nlh->nlmsg_len);
573ce260 792 e = nlmsg_data(nlh);
9ef1d4c7
PM
793 e->error = -ETIMEDOUT;
794 memset(&e->msg, 0, sizeof(e->msg));
2942e900 795
15e47304 796 rtnl_unicast(skb, net, NETLINK_CB(skb).portid);
a8cb16dd 797 } else {
1da177e4 798 kfree_skb(skb);
a8cb16dd 799 }
1da177e4
LT
800 }
801
5c0a66f5 802 ipmr_cache_free(c);
1da177e4
LT
803}
804
e258beb2 805/* Timer process for the unresolved queue. */
e99e88a9 806static void ipmr_expire_process(struct timer_list *t)
1da177e4 807{
e99e88a9 808 struct mr_table *mrt = from_timer(mrt, t, ipmr_expire_timer);
1da177e4
LT
809 unsigned long now;
810 unsigned long expires;
862465f2 811 struct mfc_cache *c, *next;
1da177e4
LT
812
813 if (!spin_trylock(&mfc_unres_lock)) {
0c12295a 814 mod_timer(&mrt->ipmr_expire_timer, jiffies+HZ/10);
1da177e4
LT
815 return;
816 }
817
0c12295a 818 if (list_empty(&mrt->mfc_unres_queue))
1da177e4
LT
819 goto out;
820
821 now = jiffies;
822 expires = 10*HZ;
1da177e4 823
0c12295a 824 list_for_each_entry_safe(c, next, &mrt->mfc_unres_queue, list) {
1da177e4
LT
825 if (time_after(c->mfc_un.unres.expires, now)) {
826 unsigned long interval = c->mfc_un.unres.expires - now;
827 if (interval < expires)
828 expires = interval;
1da177e4
LT
829 continue;
830 }
831
862465f2 832 list_del(&c->list);
8cd3ac9f 833 mroute_netlink_event(mrt, c, RTM_DELROUTE);
0c12295a 834 ipmr_destroy_unres(mrt, c);
1da177e4
LT
835 }
836
0c12295a
PM
837 if (!list_empty(&mrt->mfc_unres_queue))
838 mod_timer(&mrt->ipmr_expire_timer, jiffies + expires);
1da177e4
LT
839
840out:
841 spin_unlock(&mfc_unres_lock);
842}
843
844/* Fill oifs list. It is called under write locked mrt_lock. */
0c12295a 845static void ipmr_update_thresholds(struct mr_table *mrt, struct mfc_cache *cache,
d658f8a0 846 unsigned char *ttls)
1da177e4
LT
847{
848 int vifi;
849
850 cache->mfc_un.res.minvif = MAXVIFS;
851 cache->mfc_un.res.maxvif = 0;
852 memset(cache->mfc_un.res.ttls, 255, MAXVIFS);
853
0c12295a
PM
854 for (vifi = 0; vifi < mrt->maxvif; vifi++) {
855 if (VIF_EXISTS(mrt, vifi) &&
cf958ae3 856 ttls[vifi] && ttls[vifi] < 255) {
1da177e4
LT
857 cache->mfc_un.res.ttls[vifi] = ttls[vifi];
858 if (cache->mfc_un.res.minvif > vifi)
859 cache->mfc_un.res.minvif = vifi;
860 if (cache->mfc_un.res.maxvif <= vifi)
861 cache->mfc_un.res.maxvif = vifi + 1;
862 }
863 }
90b5ca17 864 cache->mfc_un.res.lastuse = jiffies;
1da177e4
LT
865}
866
0c12295a
PM
867static int vif_add(struct net *net, struct mr_table *mrt,
868 struct vifctl *vifc, int mrtsock)
1da177e4
LT
869{
870 int vifi = vifc->vifc_vifi;
5d8b3e69
YG
871 struct switchdev_attr attr = {
872 .id = SWITCHDEV_ATTR_ID_PORT_PARENT_ID,
873 };
0c12295a 874 struct vif_device *v = &mrt->vif_table[vifi];
1da177e4
LT
875 struct net_device *dev;
876 struct in_device *in_dev;
d607032d 877 int err;
1da177e4
LT
878
879 /* Is vif busy ? */
0c12295a 880 if (VIF_EXISTS(mrt, vifi))
1da177e4
LT
881 return -EADDRINUSE;
882
883 switch (vifc->vifc_flags) {
1da177e4 884 case VIFF_REGISTER:
1973a4ea 885 if (!ipmr_pimsm_enabled())
c316c629
NA
886 return -EINVAL;
887 /* Special Purpose VIF in PIM
1da177e4
LT
888 * All the packets will be sent to the daemon
889 */
0c12295a 890 if (mrt->mroute_reg_vif_num >= 0)
1da177e4 891 return -EADDRINUSE;
f0ad0860 892 dev = ipmr_reg_vif(net, mrt);
1da177e4
LT
893 if (!dev)
894 return -ENOBUFS;
d607032d
WC
895 err = dev_set_allmulti(dev, 1);
896 if (err) {
897 unregister_netdevice(dev);
7dc00c82 898 dev_put(dev);
d607032d
WC
899 return err;
900 }
1da177e4 901 break;
e905a9ed 902 case VIFF_TUNNEL:
4feb88e5 903 dev = ipmr_new_tunnel(net, vifc);
1da177e4
LT
904 if (!dev)
905 return -ENOBUFS;
d607032d
WC
906 err = dev_set_allmulti(dev, 1);
907 if (err) {
908 ipmr_del_tunnel(dev, vifc);
7dc00c82 909 dev_put(dev);
d607032d
WC
910 return err;
911 }
1da177e4 912 break;
ee5e81f0 913 case VIFF_USE_IFINDEX:
1da177e4 914 case 0:
ee5e81f0
I
915 if (vifc->vifc_flags == VIFF_USE_IFINDEX) {
916 dev = dev_get_by_index(net, vifc->vifc_lcl_ifindex);
51456b29 917 if (dev && !__in_dev_get_rtnl(dev)) {
ee5e81f0
I
918 dev_put(dev);
919 return -EADDRNOTAVAIL;
920 }
a8cb16dd 921 } else {
ee5e81f0 922 dev = ip_dev_find(net, vifc->vifc_lcl_addr.s_addr);
a8cb16dd 923 }
1da177e4
LT
924 if (!dev)
925 return -EADDRNOTAVAIL;
d607032d 926 err = dev_set_allmulti(dev, 1);
7dc00c82
WC
927 if (err) {
928 dev_put(dev);
d607032d 929 return err;
7dc00c82 930 }
1da177e4
LT
931 break;
932 default:
933 return -EINVAL;
934 }
935
a8cb16dd
ED
936 in_dev = __in_dev_get_rtnl(dev);
937 if (!in_dev) {
d0490cfd 938 dev_put(dev);
1da177e4 939 return -EADDRNOTAVAIL;
d0490cfd 940 }
42f811b8 941 IPV4_DEVCONF(in_dev->cnf, MC_FORWARDING)++;
3b022865
DA
942 inet_netconf_notify_devconf(net, RTM_NEWNETCONF, NETCONFA_MC_FORWARDING,
943 dev->ifindex, &in_dev->cnf);
1da177e4
LT
944 ip_rt_multicast_event(in_dev);
945
a8cb16dd
ED
946 /* Fill in the VIF structures */
947
5d8b3e69
YG
948 attr.orig_dev = dev;
949 if (!switchdev_port_attr_get(dev, &attr)) {
950 memcpy(v->dev_parent_id.id, attr.u.ppid.id, attr.u.ppid.id_len);
951 v->dev_parent_id.id_len = attr.u.ppid.id_len;
952 } else {
953 v->dev_parent_id.id_len = 0;
954 }
c354e124
JK
955 v->rate_limit = vifc->vifc_rate_limit;
956 v->local = vifc->vifc_lcl_addr.s_addr;
957 v->remote = vifc->vifc_rmt_addr.s_addr;
958 v->flags = vifc->vifc_flags;
1da177e4
LT
959 if (!mrtsock)
960 v->flags |= VIFF_STATIC;
c354e124 961 v->threshold = vifc->vifc_threshold;
1da177e4
LT
962 v->bytes_in = 0;
963 v->bytes_out = 0;
964 v->pkt_in = 0;
965 v->pkt_out = 0;
966 v->link = dev->ifindex;
a8cb16dd 967 if (v->flags & (VIFF_TUNNEL | VIFF_REGISTER))
a54acb3a 968 v->link = dev_get_iflink(dev);
1da177e4
LT
969
970 /* And finish update writing critical data */
971 write_lock_bh(&mrt_lock);
c354e124 972 v->dev = dev;
a8cb16dd 973 if (v->flags & VIFF_REGISTER)
0c12295a 974 mrt->mroute_reg_vif_num = vifi;
0c12295a
PM
975 if (vifi+1 > mrt->maxvif)
976 mrt->maxvif = vifi+1;
1da177e4 977 write_unlock_bh(&mrt_lock);
b362053a 978 call_ipmr_vif_entry_notifiers(net, FIB_EVENT_VIF_ADD, v, vifi, mrt->id);
1da177e4
LT
979 return 0;
980}
981
a8c9486b 982/* called with rcu_read_lock() */
0c12295a 983static struct mfc_cache *ipmr_cache_find(struct mr_table *mrt,
4feb88e5
BT
984 __be32 origin,
985 __be32 mcastgrp)
1da177e4 986{
8fb472c0
NA
987 struct mfc_cache_cmp_arg arg = {
988 .mfc_mcastgrp = mcastgrp,
989 .mfc_origin = origin
990 };
991 struct rhlist_head *tmp, *list;
1da177e4
LT
992 struct mfc_cache *c;
993
8fb472c0
NA
994 list = rhltable_lookup(&mrt->mfc_hash, &arg, ipmr_rht_params);
995 rhl_for_each_entry_rcu(c, tmp, list, mnode)
996 return c;
997
862465f2 998 return NULL;
1da177e4
LT
999}
1000
660b26dc
ND
1001/* Look for a (*,*,oif) entry */
1002static struct mfc_cache *ipmr_cache_find_any_parent(struct mr_table *mrt,
1003 int vifi)
1004{
8fb472c0
NA
1005 struct mfc_cache_cmp_arg arg = {
1006 .mfc_mcastgrp = htonl(INADDR_ANY),
1007 .mfc_origin = htonl(INADDR_ANY)
1008 };
1009 struct rhlist_head *tmp, *list;
660b26dc
ND
1010 struct mfc_cache *c;
1011
8fb472c0
NA
1012 list = rhltable_lookup(&mrt->mfc_hash, &arg, ipmr_rht_params);
1013 rhl_for_each_entry_rcu(c, tmp, list, mnode)
1014 if (c->mfc_un.res.ttls[vifi] < 255)
660b26dc
ND
1015 return c;
1016
1017 return NULL;
1018}
1019
1020/* Look for a (*,G) entry */
1021static struct mfc_cache *ipmr_cache_find_any(struct mr_table *mrt,
1022 __be32 mcastgrp, int vifi)
1023{
8fb472c0
NA
1024 struct mfc_cache_cmp_arg arg = {
1025 .mfc_mcastgrp = mcastgrp,
1026 .mfc_origin = htonl(INADDR_ANY)
1027 };
1028 struct rhlist_head *tmp, *list;
660b26dc
ND
1029 struct mfc_cache *c, *proxy;
1030
360eb5da 1031 if (mcastgrp == htonl(INADDR_ANY))
660b26dc
ND
1032 goto skip;
1033
8fb472c0
NA
1034 list = rhltable_lookup(&mrt->mfc_hash, &arg, ipmr_rht_params);
1035 rhl_for_each_entry_rcu(c, tmp, list, mnode) {
1036 if (c->mfc_un.res.ttls[vifi] < 255)
1037 return c;
1038
1039 /* It's ok if the vifi is part of the static tree */
1040 proxy = ipmr_cache_find_any_parent(mrt, c->mfc_parent);
1041 if (proxy && proxy->mfc_un.res.ttls[vifi] < 255)
1042 return c;
1043 }
660b26dc
ND
1044
1045skip:
1046 return ipmr_cache_find_any_parent(mrt, vifi);
1047}
1048
8fb472c0
NA
1049/* Look for a (S,G,iif) entry if parent != -1 */
1050static struct mfc_cache *ipmr_cache_find_parent(struct mr_table *mrt,
1051 __be32 origin, __be32 mcastgrp,
1052 int parent)
1053{
1054 struct mfc_cache_cmp_arg arg = {
1055 .mfc_mcastgrp = mcastgrp,
1056 .mfc_origin = origin,
1057 };
1058 struct rhlist_head *tmp, *list;
1059 struct mfc_cache *c;
1060
1061 list = rhltable_lookup(&mrt->mfc_hash, &arg, ipmr_rht_params);
1062 rhl_for_each_entry_rcu(c, tmp, list, mnode)
1063 if (parent == -1 || parent == c->mfc_parent)
1064 return c;
1065
1066 return NULL;
1067}
1068
7ef8f65d 1069/* Allocate a multicast cache entry */
d658f8a0 1070static struct mfc_cache *ipmr_cache_alloc(void)
1da177e4 1071{
c354e124 1072 struct mfc_cache *c = kmem_cache_zalloc(mrt_cachep, GFP_KERNEL);
a8c9486b 1073
70a0dec4
TG
1074 if (c) {
1075 c->mfc_un.res.last_assert = jiffies - MFC_ASSERT_THRESH - 1;
a8c9486b 1076 c->mfc_un.res.minvif = MAXVIFS;
310ebbba 1077 refcount_set(&c->mfc_un.res.refcount, 1);
70a0dec4 1078 }
1da177e4
LT
1079 return c;
1080}
1081
d658f8a0 1082static struct mfc_cache *ipmr_cache_alloc_unres(void)
1da177e4 1083{
c354e124 1084 struct mfc_cache *c = kmem_cache_zalloc(mrt_cachep, GFP_ATOMIC);
a8c9486b
ED
1085
1086 if (c) {
1087 skb_queue_head_init(&c->mfc_un.unres.unresolved);
1088 c->mfc_un.unres.expires = jiffies + 10*HZ;
1089 }
1da177e4
LT
1090 return c;
1091}
1092
7ef8f65d 1093/* A cache entry has gone into a resolved state from queued */
0c12295a
PM
1094static void ipmr_cache_resolve(struct net *net, struct mr_table *mrt,
1095 struct mfc_cache *uc, struct mfc_cache *c)
1da177e4
LT
1096{
1097 struct sk_buff *skb;
9ef1d4c7 1098 struct nlmsgerr *e;
1da177e4 1099
a8cb16dd 1100 /* Play the pending entries through our router */
c354e124 1101 while ((skb = __skb_dequeue(&uc->mfc_un.unres.unresolved))) {
eddc9ec5 1102 if (ip_hdr(skb)->version == 0) {
af72868b
JB
1103 struct nlmsghdr *nlh = skb_pull(skb,
1104 sizeof(struct iphdr));
1da177e4 1105
573ce260 1106 if (__ipmr_fill_mroute(mrt, skb, c, nlmsg_data(nlh)) > 0) {
a8cb16dd
ED
1107 nlh->nlmsg_len = skb_tail_pointer(skb) -
1108 (u8 *)nlh;
1da177e4
LT
1109 } else {
1110 nlh->nlmsg_type = NLMSG_ERROR;
573ce260 1111 nlh->nlmsg_len = nlmsg_msg_size(sizeof(struct nlmsgerr));
1da177e4 1112 skb_trim(skb, nlh->nlmsg_len);
573ce260 1113 e = nlmsg_data(nlh);
9ef1d4c7
PM
1114 e->error = -EMSGSIZE;
1115 memset(&e->msg, 0, sizeof(e->msg));
1da177e4 1116 }
2942e900 1117
15e47304 1118 rtnl_unicast(skb, net, NETLINK_CB(skb).portid);
a8cb16dd 1119 } else {
4b1f0d33 1120 ip_mr_forward(net, mrt, skb->dev, skb, c, 0);
a8cb16dd 1121 }
1da177e4
LT
1122 }
1123}
1124
5a645dd8 1125/* Bounce a cache query up to mrouted and netlink.
1da177e4 1126 *
c316c629 1127 * Called under mrt_lock.
1da177e4 1128 */
0c12295a 1129static int ipmr_cache_report(struct mr_table *mrt,
4feb88e5 1130 struct sk_buff *pkt, vifi_t vifi, int assert)
1da177e4 1131{
c9bdd4b5 1132 const int ihl = ip_hdrlen(pkt);
c316c629 1133 struct sock *mroute_sk;
1da177e4
LT
1134 struct igmphdr *igmp;
1135 struct igmpmsg *msg;
c316c629 1136 struct sk_buff *skb;
1da177e4
LT
1137 int ret;
1138
1da177e4
LT
1139 if (assert == IGMPMSG_WHOLEPKT)
1140 skb = skb_realloc_headroom(pkt, sizeof(struct iphdr));
1141 else
1da177e4
LT
1142 skb = alloc_skb(128, GFP_ATOMIC);
1143
132adf54 1144 if (!skb)
1da177e4
LT
1145 return -ENOBUFS;
1146
1da177e4
LT
1147 if (assert == IGMPMSG_WHOLEPKT) {
1148 /* Ugly, but we have no choice with this interface.
a8cb16dd
ED
1149 * Duplicate old header, fix ihl, length etc.
1150 * And all this only to mangle msg->im_msgtype and
1151 * to set msg->im_mbz to "mbz" :-)
1da177e4 1152 */
878c8145
ACM
1153 skb_push(skb, sizeof(struct iphdr));
1154 skb_reset_network_header(skb);
badff6d0 1155 skb_reset_transport_header(skb);
0272ffc4 1156 msg = (struct igmpmsg *)skb_network_header(skb);
d56f90a7 1157 memcpy(msg, skb_network_header(pkt), sizeof(struct iphdr));
1da177e4
LT
1158 msg->im_msgtype = IGMPMSG_WHOLEPKT;
1159 msg->im_mbz = 0;
0c12295a 1160 msg->im_vif = mrt->mroute_reg_vif_num;
eddc9ec5
ACM
1161 ip_hdr(skb)->ihl = sizeof(struct iphdr) >> 2;
1162 ip_hdr(skb)->tot_len = htons(ntohs(ip_hdr(pkt)->tot_len) +
1163 sizeof(struct iphdr));
c316c629
NA
1164 } else {
1165 /* Copy the IP header */
1166 skb_set_network_header(skb, skb->len);
1167 skb_put(skb, ihl);
1168 skb_copy_to_linear_data(skb, pkt->data, ihl);
1169 /* Flag to the kernel this is a route add */
1170 ip_hdr(skb)->protocol = 0;
1171 msg = (struct igmpmsg *)skb_network_header(skb);
1172 msg->im_vif = vifi;
1173 skb_dst_set(skb, dst_clone(skb_dst(pkt)));
1174 /* Add our header */
4df864c1 1175 igmp = skb_put(skb, sizeof(struct igmphdr));
c316c629
NA
1176 igmp->type = assert;
1177 msg->im_msgtype = assert;
1178 igmp->code = 0;
1179 ip_hdr(skb)->tot_len = htons(skb->len); /* Fix the length */
1180 skb->transport_header = skb->network_header;
e905a9ed 1181 }
1da177e4 1182
4c968709
ED
1183 rcu_read_lock();
1184 mroute_sk = rcu_dereference(mrt->mroute_sk);
51456b29 1185 if (!mroute_sk) {
4c968709 1186 rcu_read_unlock();
1da177e4
LT
1187 kfree_skb(skb);
1188 return -EINVAL;
1189 }
1190
5a645dd8
JG
1191 igmpmsg_netlink_event(mrt, skb);
1192
a8cb16dd 1193 /* Deliver to mrouted */
4c968709
ED
1194 ret = sock_queue_rcv_skb(mroute_sk, skb);
1195 rcu_read_unlock();
70a269e6 1196 if (ret < 0) {
e87cc472 1197 net_warn_ratelimited("mroute: pending queue full, dropping entries\n");
1da177e4
LT
1198 kfree_skb(skb);
1199 }
1200
1201 return ret;
1202}
1203
7ef8f65d
NA
1204/* Queue a packet for resolution. It gets locked cache entry! */
1205static int ipmr_cache_unresolved(struct mr_table *mrt, vifi_t vifi,
4b1f0d33 1206 struct sk_buff *skb, struct net_device *dev)
1da177e4 1207{
8fb472c0
NA
1208 const struct iphdr *iph = ip_hdr(skb);
1209 struct mfc_cache *c;
862465f2 1210 bool found = false;
1da177e4 1211 int err;
1da177e4
LT
1212
1213 spin_lock_bh(&mfc_unres_lock);
0c12295a 1214 list_for_each_entry(c, &mrt->mfc_unres_queue, list) {
e258beb2 1215 if (c->mfc_mcastgrp == iph->daddr &&
862465f2
PM
1216 c->mfc_origin == iph->saddr) {
1217 found = true;
1da177e4 1218 break;
862465f2 1219 }
1da177e4
LT
1220 }
1221
862465f2 1222 if (!found) {
a8cb16dd 1223 /* Create a new entry if allowable */
0c12295a 1224 if (atomic_read(&mrt->cache_resolve_queue_len) >= 10 ||
d658f8a0 1225 (c = ipmr_cache_alloc_unres()) == NULL) {
1da177e4
LT
1226 spin_unlock_bh(&mfc_unres_lock);
1227
1228 kfree_skb(skb);
1229 return -ENOBUFS;
1230 }
1231
a8cb16dd 1232 /* Fill in the new cache entry */
eddc9ec5
ACM
1233 c->mfc_parent = -1;
1234 c->mfc_origin = iph->saddr;
1235 c->mfc_mcastgrp = iph->daddr;
1da177e4 1236
a8cb16dd 1237 /* Reflect first query at mrouted. */
0c12295a 1238 err = ipmr_cache_report(mrt, skb, vifi, IGMPMSG_NOCACHE);
4feb88e5 1239 if (err < 0) {
e905a9ed 1240 /* If the report failed throw the cache entry
1da177e4
LT
1241 out - Brad Parker
1242 */
1243 spin_unlock_bh(&mfc_unres_lock);
1244
5c0a66f5 1245 ipmr_cache_free(c);
1da177e4
LT
1246 kfree_skb(skb);
1247 return err;
1248 }
1249
0c12295a
PM
1250 atomic_inc(&mrt->cache_resolve_queue_len);
1251 list_add(&c->list, &mrt->mfc_unres_queue);
8cd3ac9f 1252 mroute_netlink_event(mrt, c, RTM_NEWROUTE);
1da177e4 1253
278554bd
DM
1254 if (atomic_read(&mrt->cache_resolve_queue_len) == 1)
1255 mod_timer(&mrt->ipmr_expire_timer, c->mfc_un.unres.expires);
1da177e4
LT
1256 }
1257
a8cb16dd 1258 /* See if we can append the packet */
a8cb16dd 1259 if (c->mfc_un.unres.unresolved.qlen > 3) {
1da177e4
LT
1260 kfree_skb(skb);
1261 err = -ENOBUFS;
1262 } else {
4b1f0d33
DS
1263 if (dev) {
1264 skb->dev = dev;
1265 skb->skb_iif = dev->ifindex;
1266 }
c354e124 1267 skb_queue_tail(&c->mfc_un.unres.unresolved, skb);
1da177e4
LT
1268 err = 0;
1269 }
1270
1271 spin_unlock_bh(&mfc_unres_lock);
1272 return err;
1273}
1274
7ef8f65d 1275/* MFC cache manipulation by user space mroute daemon */
1da177e4 1276
660b26dc 1277static int ipmr_mfc_delete(struct mr_table *mrt, struct mfcctl *mfc, int parent)
1da177e4 1278{
b362053a 1279 struct net *net = read_pnet(&mrt->net);
8fb472c0 1280 struct mfc_cache *c;
1da177e4 1281
8fb472c0
NA
1282 /* The entries are added/deleted only under RTNL */
1283 rcu_read_lock();
1284 c = ipmr_cache_find_parent(mrt, mfc->mfcc_origin.s_addr,
1285 mfc->mfcc_mcastgrp.s_addr, parent);
1286 rcu_read_unlock();
1287 if (!c)
1288 return -ENOENT;
1289 rhltable_remove(&mrt->mfc_hash, &c->mnode, ipmr_rht_params);
1290 list_del_rcu(&c->list);
b362053a 1291 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_DEL, c, mrt->id);
8fb472c0 1292 mroute_netlink_event(mrt, c, RTM_DELROUTE);
310ebbba 1293 ipmr_cache_put(c);
1da177e4 1294
8fb472c0 1295 return 0;
1da177e4
LT
1296}
1297
0c12295a 1298static int ipmr_mfc_add(struct net *net, struct mr_table *mrt,
660b26dc 1299 struct mfcctl *mfc, int mrtsock, int parent)
1da177e4 1300{
862465f2 1301 struct mfc_cache *uc, *c;
8fb472c0
NA
1302 bool found;
1303 int ret;
1da177e4 1304
a50436f2
PM
1305 if (mfc->mfcc_parent >= MAXVIFS)
1306 return -ENFILE;
1307
8fb472c0
NA
1308 /* The entries are added/deleted only under RTNL */
1309 rcu_read_lock();
1310 c = ipmr_cache_find_parent(mrt, mfc->mfcc_origin.s_addr,
1311 mfc->mfcc_mcastgrp.s_addr, parent);
1312 rcu_read_unlock();
1313 if (c) {
1da177e4
LT
1314 write_lock_bh(&mrt_lock);
1315 c->mfc_parent = mfc->mfcc_parent;
0c12295a 1316 ipmr_update_thresholds(mrt, c, mfc->mfcc_ttls);
1da177e4
LT
1317 if (!mrtsock)
1318 c->mfc_flags |= MFC_STATIC;
1319 write_unlock_bh(&mrt_lock);
b362053a
YG
1320 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_REPLACE, c,
1321 mrt->id);
8cd3ac9f 1322 mroute_netlink_event(mrt, c, RTM_NEWROUTE);
1da177e4
LT
1323 return 0;
1324 }
1325
360eb5da 1326 if (mfc->mfcc_mcastgrp.s_addr != htonl(INADDR_ANY) &&
660b26dc 1327 !ipv4_is_multicast(mfc->mfcc_mcastgrp.s_addr))
1da177e4
LT
1328 return -EINVAL;
1329
d658f8a0 1330 c = ipmr_cache_alloc();
51456b29 1331 if (!c)
1da177e4
LT
1332 return -ENOMEM;
1333
c354e124
JK
1334 c->mfc_origin = mfc->mfcc_origin.s_addr;
1335 c->mfc_mcastgrp = mfc->mfcc_mcastgrp.s_addr;
1336 c->mfc_parent = mfc->mfcc_parent;
0c12295a 1337 ipmr_update_thresholds(mrt, c, mfc->mfcc_ttls);
1da177e4
LT
1338 if (!mrtsock)
1339 c->mfc_flags |= MFC_STATIC;
1340
8fb472c0
NA
1341 ret = rhltable_insert_key(&mrt->mfc_hash, &c->cmparg, &c->mnode,
1342 ipmr_rht_params);
1343 if (ret) {
1344 pr_err("ipmr: rhtable insert error %d\n", ret);
1345 ipmr_cache_free(c);
1346 return ret;
1347 }
1348 list_add_tail_rcu(&c->list, &mrt->mfc_cache_list);
7ef8f65d
NA
1349 /* Check to see if we resolved a queued list. If so we
1350 * need to send on the frames and tidy up.
1da177e4 1351 */
b0ebb739 1352 found = false;
1da177e4 1353 spin_lock_bh(&mfc_unres_lock);
0c12295a 1354 list_for_each_entry(uc, &mrt->mfc_unres_queue, list) {
e258beb2 1355 if (uc->mfc_origin == c->mfc_origin &&
1da177e4 1356 uc->mfc_mcastgrp == c->mfc_mcastgrp) {
862465f2 1357 list_del(&uc->list);
0c12295a 1358 atomic_dec(&mrt->cache_resolve_queue_len);
b0ebb739 1359 found = true;
1da177e4
LT
1360 break;
1361 }
1362 }
0c12295a
PM
1363 if (list_empty(&mrt->mfc_unres_queue))
1364 del_timer(&mrt->ipmr_expire_timer);
1da177e4
LT
1365 spin_unlock_bh(&mfc_unres_lock);
1366
b0ebb739 1367 if (found) {
0c12295a 1368 ipmr_cache_resolve(net, mrt, uc, c);
5c0a66f5 1369 ipmr_cache_free(uc);
1da177e4 1370 }
b362053a 1371 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_ADD, c, mrt->id);
8cd3ac9f 1372 mroute_netlink_event(mrt, c, RTM_NEWROUTE);
1da177e4
LT
1373 return 0;
1374}
1375
7ef8f65d 1376/* Close the multicast socket, and clear the vif tables etc */
0e615e96 1377static void mroute_clean_tables(struct mr_table *mrt, bool all)
1da177e4 1378{
b362053a 1379 struct net *net = read_pnet(&mrt->net);
8fb472c0 1380 struct mfc_cache *c, *tmp;
d17fa6fa 1381 LIST_HEAD(list);
8fb472c0 1382 int i;
e905a9ed 1383
a8cb16dd 1384 /* Shut down all active vif entries */
0c12295a 1385 for (i = 0; i < mrt->maxvif; i++) {
0e615e96
NA
1386 if (!all && (mrt->vif_table[i].flags & VIFF_STATIC))
1387 continue;
1388 vif_delete(mrt, i, 0, &list);
1da177e4 1389 }
d17fa6fa 1390 unregister_netdevice_many(&list);
1da177e4 1391
a8cb16dd 1392 /* Wipe the cache */
8fb472c0
NA
1393 list_for_each_entry_safe(c, tmp, &mrt->mfc_cache_list, list) {
1394 if (!all && (c->mfc_flags & MFC_STATIC))
1395 continue;
1396 rhltable_remove(&mrt->mfc_hash, &c->mnode, ipmr_rht_params);
1397 list_del_rcu(&c->list);
b362053a
YG
1398 call_ipmr_mfc_entry_notifiers(net, FIB_EVENT_ENTRY_DEL, c,
1399 mrt->id);
8fb472c0 1400 mroute_netlink_event(mrt, c, RTM_DELROUTE);
310ebbba 1401 ipmr_cache_put(c);
1da177e4
LT
1402 }
1403
0c12295a 1404 if (atomic_read(&mrt->cache_resolve_queue_len) != 0) {
1da177e4 1405 spin_lock_bh(&mfc_unres_lock);
8fb472c0 1406 list_for_each_entry_safe(c, tmp, &mrt->mfc_unres_queue, list) {
862465f2 1407 list_del(&c->list);
8cd3ac9f 1408 mroute_netlink_event(mrt, c, RTM_DELROUTE);
0c12295a 1409 ipmr_destroy_unres(mrt, c);
1da177e4
LT
1410 }
1411 spin_unlock_bh(&mfc_unres_lock);
1412 }
1413}
1414
4c968709
ED
1415/* called from ip_ra_control(), before an RCU grace period,
1416 * we dont need to call synchronize_rcu() here
1417 */
1da177e4
LT
1418static void mrtsock_destruct(struct sock *sk)
1419{
4feb88e5 1420 struct net *net = sock_net(sk);
f0ad0860 1421 struct mr_table *mrt;
4feb88e5 1422
1215e51e 1423 ASSERT_RTNL();
f0ad0860 1424 ipmr_for_each_table(mrt, net) {
4c968709 1425 if (sk == rtnl_dereference(mrt->mroute_sk)) {
f0ad0860 1426 IPV4_DEVCONF_ALL(net, MC_FORWARDING)--;
3b022865
DA
1427 inet_netconf_notify_devconf(net, RTM_NEWNETCONF,
1428 NETCONFA_MC_FORWARDING,
d67b8c61
ND
1429 NETCONFA_IFINDEX_ALL,
1430 net->ipv4.devconf_all);
a9b3cd7f 1431 RCU_INIT_POINTER(mrt->mroute_sk, NULL);
0e615e96 1432 mroute_clean_tables(mrt, false);
f0ad0860 1433 }
1da177e4 1434 }
1da177e4
LT
1435}
1436
7ef8f65d
NA
1437/* Socket options and virtual interface manipulation. The whole
1438 * virtual interface system is a complete heap, but unfortunately
1439 * that's how BSD mrouted happens to think. Maybe one day with a proper
1440 * MOSPF/PIM router set up we can clean this up.
1da177e4 1441 */
e905a9ed 1442
29e97d21
NA
1443int ip_mroute_setsockopt(struct sock *sk, int optname, char __user *optval,
1444 unsigned int optlen)
1da177e4 1445{
4feb88e5 1446 struct net *net = sock_net(sk);
29e97d21 1447 int val, ret = 0, parent = 0;
f0ad0860 1448 struct mr_table *mrt;
29e97d21
NA
1449 struct vifctl vif;
1450 struct mfcctl mfc;
1451 u32 uval;
f0ad0860 1452
29e97d21
NA
1453 /* There's one exception to the lock - MRT_DONE which needs to unlock */
1454 rtnl_lock();
5e1859fb 1455 if (sk->sk_type != SOCK_RAW ||
29e97d21
NA
1456 inet_sk(sk)->inet_num != IPPROTO_IGMP) {
1457 ret = -EOPNOTSUPP;
1458 goto out_unlock;
1459 }
5e1859fb 1460
f0ad0860 1461 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
29e97d21
NA
1462 if (!mrt) {
1463 ret = -ENOENT;
1464 goto out_unlock;
1465 }
132adf54 1466 if (optname != MRT_INIT) {
33d480ce 1467 if (sk != rcu_access_pointer(mrt->mroute_sk) &&
29e97d21
NA
1468 !ns_capable(net->user_ns, CAP_NET_ADMIN)) {
1469 ret = -EACCES;
1470 goto out_unlock;
1471 }
1da177e4
LT
1472 }
1473
132adf54
SH
1474 switch (optname) {
1475 case MRT_INIT:
42e6b89c 1476 if (optlen != sizeof(int)) {
29e97d21 1477 ret = -EINVAL;
42e6b89c
NA
1478 break;
1479 }
1480 if (rtnl_dereference(mrt->mroute_sk)) {
29e97d21 1481 ret = -EADDRINUSE;
29e97d21 1482 break;
42e6b89c 1483 }
132adf54
SH
1484
1485 ret = ip_ra_control(sk, 1, mrtsock_destruct);
1486 if (ret == 0) {
cf778b00 1487 rcu_assign_pointer(mrt->mroute_sk, sk);
4feb88e5 1488 IPV4_DEVCONF_ALL(net, MC_FORWARDING)++;
3b022865
DA
1489 inet_netconf_notify_devconf(net, RTM_NEWNETCONF,
1490 NETCONFA_MC_FORWARDING,
d67b8c61
ND
1491 NETCONFA_IFINDEX_ALL,
1492 net->ipv4.devconf_all);
132adf54 1493 }
29e97d21 1494 break;
132adf54 1495 case MRT_DONE:
29e97d21
NA
1496 if (sk != rcu_access_pointer(mrt->mroute_sk)) {
1497 ret = -EACCES;
1498 } else {
29e97d21 1499 ret = ip_ra_control(sk, 0, NULL);
1215e51e 1500 goto out_unlock;
29e97d21
NA
1501 }
1502 break;
132adf54
SH
1503 case MRT_ADD_VIF:
1504 case MRT_DEL_VIF:
29e97d21
NA
1505 if (optlen != sizeof(vif)) {
1506 ret = -EINVAL;
1507 break;
1508 }
1509 if (copy_from_user(&vif, optval, sizeof(vif))) {
1510 ret = -EFAULT;
1511 break;
1512 }
1513 if (vif.vifc_vifi >= MAXVIFS) {
1514 ret = -ENFILE;
1515 break;
1516 }
c354e124 1517 if (optname == MRT_ADD_VIF) {
4c968709
ED
1518 ret = vif_add(net, mrt, &vif,
1519 sk == rtnl_dereference(mrt->mroute_sk));
132adf54 1520 } else {
0c12295a 1521 ret = vif_delete(mrt, vif.vifc_vifi, 0, NULL);
132adf54 1522 }
29e97d21 1523 break;
7ef8f65d
NA
1524 /* Manipulate the forwarding caches. These live
1525 * in a sort of kernel/user symbiosis.
1526 */
132adf54
SH
1527 case MRT_ADD_MFC:
1528 case MRT_DEL_MFC:
660b26dc 1529 parent = -1;
fcfd6dfa 1530 /* fall through */
660b26dc
ND
1531 case MRT_ADD_MFC_PROXY:
1532 case MRT_DEL_MFC_PROXY:
29e97d21
NA
1533 if (optlen != sizeof(mfc)) {
1534 ret = -EINVAL;
1535 break;
1536 }
1537 if (copy_from_user(&mfc, optval, sizeof(mfc))) {
1538 ret = -EFAULT;
1539 break;
1540 }
660b26dc
ND
1541 if (parent == 0)
1542 parent = mfc.mfcc_parent;
660b26dc
ND
1543 if (optname == MRT_DEL_MFC || optname == MRT_DEL_MFC_PROXY)
1544 ret = ipmr_mfc_delete(mrt, &mfc, parent);
132adf54 1545 else
4c968709 1546 ret = ipmr_mfc_add(net, mrt, &mfc,
660b26dc
ND
1547 sk == rtnl_dereference(mrt->mroute_sk),
1548 parent);
29e97d21 1549 break;
7ef8f65d 1550 /* Control PIM assert. */
132adf54 1551 case MRT_ASSERT:
29e97d21
NA
1552 if (optlen != sizeof(val)) {
1553 ret = -EINVAL;
1554 break;
1555 }
1556 if (get_user(val, (int __user *)optval)) {
1557 ret = -EFAULT;
1558 break;
1559 }
1560 mrt->mroute_do_assert = val;
1561 break;
132adf54 1562 case MRT_PIM:
1973a4ea 1563 if (!ipmr_pimsm_enabled()) {
29e97d21
NA
1564 ret = -ENOPROTOOPT;
1565 break;
1566 }
1567 if (optlen != sizeof(val)) {
1568 ret = -EINVAL;
1569 break;
1570 }
1571 if (get_user(val, (int __user *)optval)) {
1572 ret = -EFAULT;
1573 break;
1574 }
ba93ef74 1575
29e97d21
NA
1576 val = !!val;
1577 if (val != mrt->mroute_do_pim) {
1578 mrt->mroute_do_pim = val;
1579 mrt->mroute_do_assert = val;
1da177e4 1580 }
29e97d21 1581 break;
f0ad0860 1582 case MRT_TABLE:
29e97d21
NA
1583 if (!IS_BUILTIN(CONFIG_IP_MROUTE_MULTIPLE_TABLES)) {
1584 ret = -ENOPROTOOPT;
1585 break;
1586 }
1587 if (optlen != sizeof(uval)) {
1588 ret = -EINVAL;
1589 break;
1590 }
1591 if (get_user(uval, (u32 __user *)optval)) {
1592 ret = -EFAULT;
1593 break;
1594 }
f0ad0860 1595
4c968709
ED
1596 if (sk == rtnl_dereference(mrt->mroute_sk)) {
1597 ret = -EBUSY;
1598 } else {
29e97d21 1599 mrt = ipmr_new_table(net, uval);
1113ebbc
NA
1600 if (IS_ERR(mrt))
1601 ret = PTR_ERR(mrt);
5e1859fb 1602 else
29e97d21 1603 raw_sk(sk)->ipmr_table = uval;
4c968709 1604 }
29e97d21 1605 break;
7ef8f65d 1606 /* Spurious command, or MRT_VERSION which you cannot set. */
132adf54 1607 default:
29e97d21 1608 ret = -ENOPROTOOPT;
1da177e4 1609 }
29e97d21
NA
1610out_unlock:
1611 rtnl_unlock();
29e97d21 1612 return ret;
1da177e4
LT
1613}
1614
7ef8f65d 1615/* Getsock opt support for the multicast routing system. */
c354e124 1616int ip_mroute_getsockopt(struct sock *sk, int optname, char __user *optval, int __user *optlen)
1da177e4
LT
1617{
1618 int olr;
1619 int val;
4feb88e5 1620 struct net *net = sock_net(sk);
f0ad0860
PM
1621 struct mr_table *mrt;
1622
5e1859fb
ED
1623 if (sk->sk_type != SOCK_RAW ||
1624 inet_sk(sk)->inet_num != IPPROTO_IGMP)
1625 return -EOPNOTSUPP;
1626
f0ad0860 1627 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
51456b29 1628 if (!mrt)
f0ad0860 1629 return -ENOENT;
1da177e4 1630
fe9ef3ce
NA
1631 switch (optname) {
1632 case MRT_VERSION:
1633 val = 0x0305;
1634 break;
1635 case MRT_PIM:
1973a4ea 1636 if (!ipmr_pimsm_enabled())
fe9ef3ce
NA
1637 return -ENOPROTOOPT;
1638 val = mrt->mroute_do_pim;
1639 break;
1640 case MRT_ASSERT:
1641 val = mrt->mroute_do_assert;
1642 break;
1643 default:
1da177e4 1644 return -ENOPROTOOPT;
fe9ef3ce 1645 }
1da177e4
LT
1646
1647 if (get_user(olr, optlen))
1648 return -EFAULT;
1da177e4
LT
1649 olr = min_t(unsigned int, olr, sizeof(int));
1650 if (olr < 0)
1651 return -EINVAL;
c354e124 1652 if (put_user(olr, optlen))
1da177e4 1653 return -EFAULT;
c354e124 1654 if (copy_to_user(optval, &val, olr))
1da177e4
LT
1655 return -EFAULT;
1656 return 0;
1657}
1658
7ef8f65d 1659/* The IP multicast ioctl support routines. */
1da177e4
LT
1660int ipmr_ioctl(struct sock *sk, int cmd, void __user *arg)
1661{
1662 struct sioc_sg_req sr;
1663 struct sioc_vif_req vr;
1664 struct vif_device *vif;
1665 struct mfc_cache *c;
4feb88e5 1666 struct net *net = sock_net(sk);
f0ad0860
PM
1667 struct mr_table *mrt;
1668
1669 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
51456b29 1670 if (!mrt)
f0ad0860 1671 return -ENOENT;
e905a9ed 1672
132adf54
SH
1673 switch (cmd) {
1674 case SIOCGETVIFCNT:
c354e124 1675 if (copy_from_user(&vr, arg, sizeof(vr)))
132adf54 1676 return -EFAULT;
0c12295a 1677 if (vr.vifi >= mrt->maxvif)
132adf54
SH
1678 return -EINVAL;
1679 read_lock(&mrt_lock);
0c12295a
PM
1680 vif = &mrt->vif_table[vr.vifi];
1681 if (VIF_EXISTS(mrt, vr.vifi)) {
c354e124
JK
1682 vr.icount = vif->pkt_in;
1683 vr.ocount = vif->pkt_out;
1684 vr.ibytes = vif->bytes_in;
1685 vr.obytes = vif->bytes_out;
1da177e4 1686 read_unlock(&mrt_lock);
1da177e4 1687
c354e124 1688 if (copy_to_user(arg, &vr, sizeof(vr)))
132adf54
SH
1689 return -EFAULT;
1690 return 0;
1691 }
1692 read_unlock(&mrt_lock);
1693 return -EADDRNOTAVAIL;
1694 case SIOCGETSGCNT:
c354e124 1695 if (copy_from_user(&sr, arg, sizeof(sr)))
132adf54
SH
1696 return -EFAULT;
1697
a8c9486b 1698 rcu_read_lock();
0c12295a 1699 c = ipmr_cache_find(mrt, sr.src.s_addr, sr.grp.s_addr);
132adf54
SH
1700 if (c) {
1701 sr.pktcnt = c->mfc_un.res.pkt;
1702 sr.bytecnt = c->mfc_un.res.bytes;
1703 sr.wrong_if = c->mfc_un.res.wrong_if;
a8c9486b 1704 rcu_read_unlock();
132adf54 1705
c354e124 1706 if (copy_to_user(arg, &sr, sizeof(sr)))
132adf54
SH
1707 return -EFAULT;
1708 return 0;
1709 }
a8c9486b 1710 rcu_read_unlock();
132adf54
SH
1711 return -EADDRNOTAVAIL;
1712 default:
1713 return -ENOIOCTLCMD;
1da177e4
LT
1714 }
1715}
1716
709b46e8
EB
1717#ifdef CONFIG_COMPAT
1718struct compat_sioc_sg_req {
1719 struct in_addr src;
1720 struct in_addr grp;
1721 compat_ulong_t pktcnt;
1722 compat_ulong_t bytecnt;
1723 compat_ulong_t wrong_if;
1724};
1725
ca6b8bb0
DM
1726struct compat_sioc_vif_req {
1727 vifi_t vifi; /* Which iface */
1728 compat_ulong_t icount;
1729 compat_ulong_t ocount;
1730 compat_ulong_t ibytes;
1731 compat_ulong_t obytes;
1732};
1733
709b46e8
EB
1734int ipmr_compat_ioctl(struct sock *sk, unsigned int cmd, void __user *arg)
1735{
0033d5ad 1736 struct compat_sioc_sg_req sr;
ca6b8bb0
DM
1737 struct compat_sioc_vif_req vr;
1738 struct vif_device *vif;
709b46e8
EB
1739 struct mfc_cache *c;
1740 struct net *net = sock_net(sk);
1741 struct mr_table *mrt;
1742
1743 mrt = ipmr_get_table(net, raw_sk(sk)->ipmr_table ? : RT_TABLE_DEFAULT);
51456b29 1744 if (!mrt)
709b46e8
EB
1745 return -ENOENT;
1746
1747 switch (cmd) {
ca6b8bb0
DM
1748 case SIOCGETVIFCNT:
1749 if (copy_from_user(&vr, arg, sizeof(vr)))
1750 return -EFAULT;
1751 if (vr.vifi >= mrt->maxvif)
1752 return -EINVAL;
1753 read_lock(&mrt_lock);
1754 vif = &mrt->vif_table[vr.vifi];
1755 if (VIF_EXISTS(mrt, vr.vifi)) {
1756 vr.icount = vif->pkt_in;
1757 vr.ocount = vif->pkt_out;
1758 vr.ibytes = vif->bytes_in;
1759 vr.obytes = vif->bytes_out;
1760 read_unlock(&mrt_lock);
1761
1762 if (copy_to_user(arg, &vr, sizeof(vr)))
1763 return -EFAULT;
1764 return 0;
1765 }
1766 read_unlock(&mrt_lock);
1767 return -EADDRNOTAVAIL;
709b46e8
EB
1768 case SIOCGETSGCNT:
1769 if (copy_from_user(&sr, arg, sizeof(sr)))
1770 return -EFAULT;
1771
1772 rcu_read_lock();
1773 c = ipmr_cache_find(mrt, sr.src.s_addr, sr.grp.s_addr);
1774 if (c) {
1775 sr.pktcnt = c->mfc_un.res.pkt;
1776 sr.bytecnt = c->mfc_un.res.bytes;
1777 sr.wrong_if = c->mfc_un.res.wrong_if;
1778 rcu_read_unlock();
1779
1780 if (copy_to_user(arg, &sr, sizeof(sr)))
1781 return -EFAULT;
1782 return 0;
1783 }
1784 rcu_read_unlock();
1785 return -EADDRNOTAVAIL;
1786 default:
1787 return -ENOIOCTLCMD;
1788 }
1789}
1790#endif
1791
1da177e4
LT
1792static int ipmr_device_event(struct notifier_block *this, unsigned long event, void *ptr)
1793{
351638e7 1794 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
4feb88e5 1795 struct net *net = dev_net(dev);
f0ad0860 1796 struct mr_table *mrt;
1da177e4
LT
1797 struct vif_device *v;
1798 int ct;
e9dc8653 1799
1da177e4
LT
1800 if (event != NETDEV_UNREGISTER)
1801 return NOTIFY_DONE;
f0ad0860
PM
1802
1803 ipmr_for_each_table(mrt, net) {
1804 v = &mrt->vif_table[0];
1805 for (ct = 0; ct < mrt->maxvif; ct++, v++) {
1806 if (v->dev == dev)
e92036a6 1807 vif_delete(mrt, ct, 1, NULL);
f0ad0860 1808 }
1da177e4
LT
1809 }
1810 return NOTIFY_DONE;
1811}
1812
c354e124 1813static struct notifier_block ip_mr_notifier = {
1da177e4
LT
1814 .notifier_call = ipmr_device_event,
1815};
1816
7ef8f65d
NA
1817/* Encapsulate a packet by attaching a valid IPIP header to it.
1818 * This avoids tunnel drivers and other mess and gives us the speed so
1819 * important for multicast video.
1da177e4 1820 */
b6a7719a
HFS
1821static void ip_encap(struct net *net, struct sk_buff *skb,
1822 __be32 saddr, __be32 daddr)
1da177e4 1823{
8856dfa3 1824 struct iphdr *iph;
b71d1d42 1825 const struct iphdr *old_iph = ip_hdr(skb);
8856dfa3
ACM
1826
1827 skb_push(skb, sizeof(struct iphdr));
b0e380b1 1828 skb->transport_header = skb->network_header;
8856dfa3 1829 skb_reset_network_header(skb);
eddc9ec5 1830 iph = ip_hdr(skb);
1da177e4 1831
a8cb16dd 1832 iph->version = 4;
e023dd64
ACM
1833 iph->tos = old_iph->tos;
1834 iph->ttl = old_iph->ttl;
1da177e4
LT
1835 iph->frag_off = 0;
1836 iph->daddr = daddr;
1837 iph->saddr = saddr;
1838 iph->protocol = IPPROTO_IPIP;
1839 iph->ihl = 5;
1840 iph->tot_len = htons(skb->len);
b6a7719a 1841 ip_select_ident(net, skb, NULL);
1da177e4
LT
1842 ip_send_check(iph);
1843
1da177e4
LT
1844 memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
1845 nf_reset(skb);
1846}
1847
0c4b51f0
EB
1848static inline int ipmr_forward_finish(struct net *net, struct sock *sk,
1849 struct sk_buff *skb)
1da177e4 1850{
a8cb16dd 1851 struct ip_options *opt = &(IPCB(skb)->opt);
1da177e4 1852
73186df8
DM
1853 IP_INC_STATS(net, IPSTATS_MIB_OUTFORWDATAGRAMS);
1854 IP_ADD_STATS(net, IPSTATS_MIB_OUTOCTETS, skb->len);
1da177e4
LT
1855
1856 if (unlikely(opt->optlen))
1857 ip_forward_options(skb);
1858
13206b6b 1859 return dst_output(net, sk, skb);
1da177e4
LT
1860}
1861
a5bc9294
YG
1862#ifdef CONFIG_NET_SWITCHDEV
1863static bool ipmr_forward_offloaded(struct sk_buff *skb, struct mr_table *mrt,
1864 int in_vifi, int out_vifi)
1865{
1866 struct vif_device *out_vif = &mrt->vif_table[out_vifi];
1867 struct vif_device *in_vif = &mrt->vif_table[in_vifi];
1868
1869 if (!skb->offload_mr_fwd_mark)
1870 return false;
1871 if (!out_vif->dev_parent_id.id_len || !in_vif->dev_parent_id.id_len)
1872 return false;
1873 return netdev_phys_item_id_same(&out_vif->dev_parent_id,
1874 &in_vif->dev_parent_id);
1875}
1876#else
1877static bool ipmr_forward_offloaded(struct sk_buff *skb, struct mr_table *mrt,
1878 int in_vifi, int out_vifi)
1879{
1880 return false;
1881}
1882#endif
1883
7ef8f65d 1884/* Processing handlers for ipmr_forward */
1da177e4 1885
0c12295a 1886static void ipmr_queue_xmit(struct net *net, struct mr_table *mrt,
a5bc9294
YG
1887 int in_vifi, struct sk_buff *skb,
1888 struct mfc_cache *c, int vifi)
1da177e4 1889{
eddc9ec5 1890 const struct iphdr *iph = ip_hdr(skb);
0c12295a 1891 struct vif_device *vif = &mrt->vif_table[vifi];
1da177e4
LT
1892 struct net_device *dev;
1893 struct rtable *rt;
31e4543d 1894 struct flowi4 fl4;
1da177e4
LT
1895 int encap = 0;
1896
51456b29 1897 if (!vif->dev)
1da177e4
LT
1898 goto out_free;
1899
1da177e4
LT
1900 if (vif->flags & VIFF_REGISTER) {
1901 vif->pkt_out++;
c354e124 1902 vif->bytes_out += skb->len;
cf3677ae
PE
1903 vif->dev->stats.tx_bytes += skb->len;
1904 vif->dev->stats.tx_packets++;
0c12295a 1905 ipmr_cache_report(mrt, skb, vifi, IGMPMSG_WHOLEPKT);
69ebbf58 1906 goto out_free;
1da177e4 1907 }
1da177e4 1908
a5bc9294
YG
1909 if (ipmr_forward_offloaded(skb, mrt, in_vifi, vifi))
1910 goto out_free;
1911
a8cb16dd 1912 if (vif->flags & VIFF_TUNNEL) {
31e4543d 1913 rt = ip_route_output_ports(net, &fl4, NULL,
78fbfd8a
DM
1914 vif->remote, vif->local,
1915 0, 0,
1916 IPPROTO_IPIP,
1917 RT_TOS(iph->tos), vif->link);
b23dd4fe 1918 if (IS_ERR(rt))
1da177e4
LT
1919 goto out_free;
1920 encap = sizeof(struct iphdr);
1921 } else {
31e4543d 1922 rt = ip_route_output_ports(net, &fl4, NULL, iph->daddr, 0,
78fbfd8a
DM
1923 0, 0,
1924 IPPROTO_IPIP,
1925 RT_TOS(iph->tos), vif->link);
b23dd4fe 1926 if (IS_ERR(rt))
1da177e4
LT
1927 goto out_free;
1928 }
1929
d8d1f30b 1930 dev = rt->dst.dev;
1da177e4 1931
d8d1f30b 1932 if (skb->len+encap > dst_mtu(&rt->dst) && (ntohs(iph->frag_off) & IP_DF)) {
1da177e4 1933 /* Do not fragment multicasts. Alas, IPv4 does not
a8cb16dd
ED
1934 * allow to send ICMP, so that packets will disappear
1935 * to blackhole.
1da177e4 1936 */
73186df8 1937 IP_INC_STATS(net, IPSTATS_MIB_FRAGFAILS);
1da177e4
LT
1938 ip_rt_put(rt);
1939 goto out_free;
1940 }
1941
d8d1f30b 1942 encap += LL_RESERVED_SPACE(dev) + rt->dst.header_len;
1da177e4
LT
1943
1944 if (skb_cow(skb, encap)) {
e905a9ed 1945 ip_rt_put(rt);
1da177e4
LT
1946 goto out_free;
1947 }
1948
1949 vif->pkt_out++;
c354e124 1950 vif->bytes_out += skb->len;
1da177e4 1951
adf30907 1952 skb_dst_drop(skb);
d8d1f30b 1953 skb_dst_set(skb, &rt->dst);
eddc9ec5 1954 ip_decrease_ttl(ip_hdr(skb));
1da177e4
LT
1955
1956 /* FIXME: forward and output firewalls used to be called here.
a8cb16dd
ED
1957 * What do we do with netfilter? -- RR
1958 */
1da177e4 1959 if (vif->flags & VIFF_TUNNEL) {
b6a7719a 1960 ip_encap(net, skb, vif->local, vif->remote);
1da177e4 1961 /* FIXME: extra output firewall step used to be here. --RR */
2f4c02d4
PE
1962 vif->dev->stats.tx_packets++;
1963 vif->dev->stats.tx_bytes += skb->len;
1da177e4
LT
1964 }
1965
9ee6c5dc 1966 IPCB(skb)->flags |= IPSKB_FORWARDED;
1da177e4 1967
7ef8f65d 1968 /* RFC1584 teaches, that DVMRP/PIM router must deliver packets locally
1da177e4
LT
1969 * not only before forwarding, but after forwarding on all output
1970 * interfaces. It is clear, if mrouter runs a multicasting
1971 * program, it should receive packets not depending to what interface
1972 * program is joined.
1973 * If we will not make it, the program will have to join on all
1974 * interfaces. On the other hand, multihoming host (or router, but
1975 * not mrouter) cannot join to more than one interface - it will
1976 * result in receiving multiple packets.
1977 */
29a26a56
EB
1978 NF_HOOK(NFPROTO_IPV4, NF_INET_FORWARD,
1979 net, NULL, skb, skb->dev, dev,
1da177e4
LT
1980 ipmr_forward_finish);
1981 return;
1982
1983out_free:
1984 kfree_skb(skb);
1da177e4
LT
1985}
1986
0c12295a 1987static int ipmr_find_vif(struct mr_table *mrt, struct net_device *dev)
1da177e4
LT
1988{
1989 int ct;
0c12295a
PM
1990
1991 for (ct = mrt->maxvif-1; ct >= 0; ct--) {
1992 if (mrt->vif_table[ct].dev == dev)
1da177e4
LT
1993 break;
1994 }
1995 return ct;
1996}
1997
1998/* "local" means that we should preserve one skb (for local delivery) */
c4854ec8 1999static void ip_mr_forward(struct net *net, struct mr_table *mrt,
4b1f0d33
DS
2000 struct net_device *dev, struct sk_buff *skb,
2001 struct mfc_cache *cache, int local)
1da177e4 2002{
4b1f0d33 2003 int true_vifi = ipmr_find_vif(mrt, dev);
1da177e4
LT
2004 int psend = -1;
2005 int vif, ct;
2006
2007 vif = cache->mfc_parent;
2008 cache->mfc_un.res.pkt++;
2009 cache->mfc_un.res.bytes += skb->len;
43b9e127 2010 cache->mfc_un.res.lastuse = jiffies;
1da177e4 2011
360eb5da 2012 if (cache->mfc_origin == htonl(INADDR_ANY) && true_vifi >= 0) {
660b26dc
ND
2013 struct mfc_cache *cache_proxy;
2014
2015 /* For an (*,G) entry, we only check that the incomming
2016 * interface is part of the static tree.
2017 */
2018 cache_proxy = ipmr_cache_find_any_parent(mrt, vif);
2019 if (cache_proxy &&
2020 cache_proxy->mfc_un.res.ttls[true_vifi] < 255)
2021 goto forward;
2022 }
2023
7ef8f65d 2024 /* Wrong interface: drop packet and (maybe) send PIM assert. */
4b1f0d33 2025 if (mrt->vif_table[vif].dev != dev) {
c7537967 2026 if (rt_is_output_route(skb_rtable(skb))) {
1da177e4 2027 /* It is our own packet, looped back.
a8cb16dd
ED
2028 * Very complicated situation...
2029 *
2030 * The best workaround until routing daemons will be
2031 * fixed is not to redistribute packet, if it was
2032 * send through wrong interface. It means, that
2033 * multicast applications WILL NOT work for
2034 * (S,G), which have default multicast route pointing
2035 * to wrong oif. In any case, it is not a good
2036 * idea to use multicasting applications on router.
1da177e4
LT
2037 */
2038 goto dont_forward;
2039 }
2040
2041 cache->mfc_un.res.wrong_if++;
1da177e4 2042
0c12295a 2043 if (true_vifi >= 0 && mrt->mroute_do_assert &&
1da177e4 2044 /* pimsm uses asserts, when switching from RPT to SPT,
a8cb16dd
ED
2045 * so that we cannot check that packet arrived on an oif.
2046 * It is bad, but otherwise we would need to move pretty
2047 * large chunk of pimd to kernel. Ough... --ANK
1da177e4 2048 */
0c12295a 2049 (mrt->mroute_do_pim ||
6f9374a9 2050 cache->mfc_un.res.ttls[true_vifi] < 255) &&
e905a9ed 2051 time_after(jiffies,
1da177e4
LT
2052 cache->mfc_un.res.last_assert + MFC_ASSERT_THRESH)) {
2053 cache->mfc_un.res.last_assert = jiffies;
0c12295a 2054 ipmr_cache_report(mrt, skb, true_vifi, IGMPMSG_WRONGVIF);
1da177e4
LT
2055 }
2056 goto dont_forward;
2057 }
2058
660b26dc 2059forward:
0c12295a
PM
2060 mrt->vif_table[vif].pkt_in++;
2061 mrt->vif_table[vif].bytes_in += skb->len;
1da177e4 2062
7ef8f65d 2063 /* Forward the frame */
360eb5da
ND
2064 if (cache->mfc_origin == htonl(INADDR_ANY) &&
2065 cache->mfc_mcastgrp == htonl(INADDR_ANY)) {
660b26dc
ND
2066 if (true_vifi >= 0 &&
2067 true_vifi != cache->mfc_parent &&
2068 ip_hdr(skb)->ttl >
2069 cache->mfc_un.res.ttls[cache->mfc_parent]) {
2070 /* It's an (*,*) entry and the packet is not coming from
2071 * the upstream: forward the packet to the upstream
2072 * only.
2073 */
2074 psend = cache->mfc_parent;
2075 goto last_forward;
2076 }
2077 goto dont_forward;
2078 }
a8cb16dd
ED
2079 for (ct = cache->mfc_un.res.maxvif - 1;
2080 ct >= cache->mfc_un.res.minvif; ct--) {
660b26dc 2081 /* For (*,G) entry, don't forward to the incoming interface */
360eb5da
ND
2082 if ((cache->mfc_origin != htonl(INADDR_ANY) ||
2083 ct != true_vifi) &&
660b26dc 2084 ip_hdr(skb)->ttl > cache->mfc_un.res.ttls[ct]) {
1da177e4
LT
2085 if (psend != -1) {
2086 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
a8cb16dd 2087
1da177e4 2088 if (skb2)
a5bc9294
YG
2089 ipmr_queue_xmit(net, mrt, true_vifi,
2090 skb2, cache, psend);
1da177e4 2091 }
c354e124 2092 psend = ct;
1da177e4
LT
2093 }
2094 }
660b26dc 2095last_forward:
1da177e4
LT
2096 if (psend != -1) {
2097 if (local) {
2098 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
a8cb16dd 2099
1da177e4 2100 if (skb2)
a5bc9294
YG
2101 ipmr_queue_xmit(net, mrt, true_vifi, skb2,
2102 cache, psend);
1da177e4 2103 } else {
a5bc9294 2104 ipmr_queue_xmit(net, mrt, true_vifi, skb, cache, psend);
c4854ec8 2105 return;
1da177e4
LT
2106 }
2107 }
2108
2109dont_forward:
2110 if (!local)
2111 kfree_skb(skb);
1da177e4
LT
2112}
2113
417da66f 2114static struct mr_table *ipmr_rt_fib_lookup(struct net *net, struct sk_buff *skb)
ee3f1aaf 2115{
417da66f
DM
2116 struct rtable *rt = skb_rtable(skb);
2117 struct iphdr *iph = ip_hdr(skb);
da91981b 2118 struct flowi4 fl4 = {
417da66f
DM
2119 .daddr = iph->daddr,
2120 .saddr = iph->saddr,
b0fe4a31 2121 .flowi4_tos = RT_TOS(iph->tos),
4fd551d7
DM
2122 .flowi4_oif = (rt_is_output_route(rt) ?
2123 skb->dev->ifindex : 0),
2124 .flowi4_iif = (rt_is_output_route(rt) ?
1fb9489b 2125 LOOPBACK_IFINDEX :
4fd551d7 2126 skb->dev->ifindex),
b4869889 2127 .flowi4_mark = skb->mark,
ee3f1aaf
DM
2128 };
2129 struct mr_table *mrt;
2130 int err;
2131
da91981b 2132 err = ipmr_fib_lookup(net, &fl4, &mrt);
ee3f1aaf
DM
2133 if (err)
2134 return ERR_PTR(err);
2135 return mrt;
2136}
1da177e4 2137
7ef8f65d
NA
2138/* Multicast packets for forwarding arrive here
2139 * Called with rcu_read_lock();
1da177e4 2140 */
1da177e4
LT
2141int ip_mr_input(struct sk_buff *skb)
2142{
2143 struct mfc_cache *cache;
4feb88e5 2144 struct net *net = dev_net(skb->dev);
511c3f92 2145 int local = skb_rtable(skb)->rt_flags & RTCF_LOCAL;
f0ad0860 2146 struct mr_table *mrt;
bcfc7d33
TW
2147 struct net_device *dev;
2148
2149 /* skb->dev passed in is the loX master dev for vrfs.
2150 * As there are no vifs associated with loopback devices,
2151 * get the proper interface that does have a vif associated with it.
2152 */
2153 dev = skb->dev;
2154 if (netif_is_l3_master(skb->dev)) {
2155 dev = dev_get_by_index_rcu(net, IPCB(skb)->iif);
2156 if (!dev) {
2157 kfree_skb(skb);
2158 return -ENODEV;
2159 }
2160 }
1da177e4
LT
2161
2162 /* Packet is looped back after forward, it should not be
a8cb16dd 2163 * forwarded second time, but still can be delivered locally.
1da177e4 2164 */
4c968709 2165 if (IPCB(skb)->flags & IPSKB_FORWARDED)
1da177e4
LT
2166 goto dont_forward;
2167
417da66f 2168 mrt = ipmr_rt_fib_lookup(net, skb);
ee3f1aaf
DM
2169 if (IS_ERR(mrt)) {
2170 kfree_skb(skb);
2171 return PTR_ERR(mrt);
e40dbc51 2172 }
1da177e4 2173 if (!local) {
4c968709
ED
2174 if (IPCB(skb)->opt.router_alert) {
2175 if (ip_call_ra_chain(skb))
2176 return 0;
2177 } else if (ip_hdr(skb)->protocol == IPPROTO_IGMP) {
2178 /* IGMPv1 (and broken IGMPv2 implementations sort of
2179 * Cisco IOS <= 11.2(8)) do not put router alert
2180 * option to IGMP packets destined to routable
2181 * groups. It is very bad, because it means
2182 * that we can forward NO IGMP messages.
2183 */
2184 struct sock *mroute_sk;
2185
2186 mroute_sk = rcu_dereference(mrt->mroute_sk);
2187 if (mroute_sk) {
2188 nf_reset(skb);
2189 raw_rcv(mroute_sk, skb);
2190 return 0;
2191 }
1da177e4
LT
2192 }
2193 }
2194
a8c9486b 2195 /* already under rcu_read_lock() */
0c12295a 2196 cache = ipmr_cache_find(mrt, ip_hdr(skb)->saddr, ip_hdr(skb)->daddr);
51456b29 2197 if (!cache) {
bcfc7d33 2198 int vif = ipmr_find_vif(mrt, dev);
660b26dc
ND
2199
2200 if (vif >= 0)
2201 cache = ipmr_cache_find_any(mrt, ip_hdr(skb)->daddr,
2202 vif);
2203 }
1da177e4 2204
7ef8f65d 2205 /* No usable cache entry */
51456b29 2206 if (!cache) {
1da177e4
LT
2207 int vif;
2208
2209 if (local) {
2210 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
2211 ip_local_deliver(skb);
51456b29 2212 if (!skb2)
1da177e4 2213 return -ENOBUFS;
1da177e4
LT
2214 skb = skb2;
2215 }
2216
a8c9486b 2217 read_lock(&mrt_lock);
bcfc7d33 2218 vif = ipmr_find_vif(mrt, dev);
1da177e4 2219 if (vif >= 0) {
4b1f0d33 2220 int err2 = ipmr_cache_unresolved(mrt, vif, skb, dev);
1da177e4
LT
2221 read_unlock(&mrt_lock);
2222
0eae88f3 2223 return err2;
1da177e4
LT
2224 }
2225 read_unlock(&mrt_lock);
2226 kfree_skb(skb);
2227 return -ENODEV;
2228 }
2229
a8c9486b 2230 read_lock(&mrt_lock);
4b1f0d33 2231 ip_mr_forward(net, mrt, dev, skb, cache, local);
1da177e4
LT
2232 read_unlock(&mrt_lock);
2233
2234 if (local)
2235 return ip_local_deliver(skb);
2236
2237 return 0;
2238
2239dont_forward:
2240 if (local)
2241 return ip_local_deliver(skb);
2242 kfree_skb(skb);
2243 return 0;
2244}
2245
b1879204 2246#ifdef CONFIG_IP_PIMSM_V1
7ef8f65d 2247/* Handle IGMP messages of PIMv1 */
a8cb16dd 2248int pim_rcv_v1(struct sk_buff *skb)
b1879204
IJ
2249{
2250 struct igmphdr *pim;
4feb88e5 2251 struct net *net = dev_net(skb->dev);
f0ad0860 2252 struct mr_table *mrt;
b1879204
IJ
2253
2254 if (!pskb_may_pull(skb, sizeof(*pim) + sizeof(struct iphdr)))
2255 goto drop;
2256
2257 pim = igmp_hdr(skb);
2258
417da66f 2259 mrt = ipmr_rt_fib_lookup(net, skb);
ee3f1aaf
DM
2260 if (IS_ERR(mrt))
2261 goto drop;
0c12295a 2262 if (!mrt->mroute_do_pim ||
b1879204
IJ
2263 pim->group != PIM_V1_VERSION || pim->code != PIM_V1_REGISTER)
2264 goto drop;
2265
f0ad0860 2266 if (__pim_rcv(mrt, skb, sizeof(*pim))) {
b1879204
IJ
2267drop:
2268 kfree_skb(skb);
2269 }
1da177e4
LT
2270 return 0;
2271}
2272#endif
2273
2274#ifdef CONFIG_IP_PIMSM_V2
a8cb16dd 2275static int pim_rcv(struct sk_buff *skb)
1da177e4
LT
2276{
2277 struct pimreghdr *pim;
f0ad0860
PM
2278 struct net *net = dev_net(skb->dev);
2279 struct mr_table *mrt;
1da177e4 2280
b1879204 2281 if (!pskb_may_pull(skb, sizeof(*pim) + sizeof(struct iphdr)))
1da177e4
LT
2282 goto drop;
2283
9c70220b 2284 pim = (struct pimreghdr *)skb_transport_header(skb);
56245cae 2285 if (pim->type != ((PIM_VERSION << 4) | (PIM_TYPE_REGISTER)) ||
a8cb16dd 2286 (pim->flags & PIM_NULL_REGISTER) ||
e905a9ed 2287 (ip_compute_csum((void *)pim, sizeof(*pim)) != 0 &&
d3bc23e7 2288 csum_fold(skb_checksum(skb, 0, skb->len, 0))))
1da177e4
LT
2289 goto drop;
2290
417da66f 2291 mrt = ipmr_rt_fib_lookup(net, skb);
ee3f1aaf
DM
2292 if (IS_ERR(mrt))
2293 goto drop;
f0ad0860 2294 if (__pim_rcv(mrt, skb, sizeof(*pim))) {
b1879204
IJ
2295drop:
2296 kfree_skb(skb);
2297 }
1da177e4
LT
2298 return 0;
2299}
2300#endif
2301
cb6a4e46
PM
2302static int __ipmr_fill_mroute(struct mr_table *mrt, struct sk_buff *skb,
2303 struct mfc_cache *c, struct rtmsg *rtm)
1da177e4 2304{
adfa85e4 2305 struct rta_mfc_stats mfcs;
43b9e127
NA
2306 struct nlattr *mp_attr;
2307 struct rtnexthop *nhp;
b5036cd4 2308 unsigned long lastuse;
43b9e127 2309 int ct;
1da177e4 2310
7438189b 2311 /* If cache is unresolved, don't try to parse IIF and OIF */
1708ebc9
NA
2312 if (c->mfc_parent >= MAXVIFS) {
2313 rtm->rtm_flags |= RTNH_F_UNRESOLVED;
7438189b 2314 return -ENOENT;
1708ebc9 2315 }
7438189b 2316
92a395e5
TG
2317 if (VIF_EXISTS(mrt, c->mfc_parent) &&
2318 nla_put_u32(skb, RTA_IIF, mrt->vif_table[c->mfc_parent].dev->ifindex) < 0)
2319 return -EMSGSIZE;
1da177e4 2320
c7c0bbea
YG
2321 if (c->mfc_flags & MFC_OFFLOAD)
2322 rtm->rtm_flags |= RTNH_F_OFFLOAD;
2323
92a395e5
TG
2324 if (!(mp_attr = nla_nest_start(skb, RTA_MULTIPATH)))
2325 return -EMSGSIZE;
1da177e4
LT
2326
2327 for (ct = c->mfc_un.res.minvif; ct < c->mfc_un.res.maxvif; ct++) {
0c12295a 2328 if (VIF_EXISTS(mrt, ct) && c->mfc_un.res.ttls[ct] < 255) {
92a395e5
TG
2329 if (!(nhp = nla_reserve_nohdr(skb, sizeof(*nhp)))) {
2330 nla_nest_cancel(skb, mp_attr);
2331 return -EMSGSIZE;
2332 }
2333
1da177e4
LT
2334 nhp->rtnh_flags = 0;
2335 nhp->rtnh_hops = c->mfc_un.res.ttls[ct];
0c12295a 2336 nhp->rtnh_ifindex = mrt->vif_table[ct].dev->ifindex;
1da177e4
LT
2337 nhp->rtnh_len = sizeof(*nhp);
2338 }
2339 }
92a395e5
TG
2340
2341 nla_nest_end(skb, mp_attr);
2342
b5036cd4
NA
2343 lastuse = READ_ONCE(c->mfc_un.res.lastuse);
2344 lastuse = time_after_eq(jiffies, lastuse) ? jiffies - lastuse : 0;
2345
adfa85e4
ND
2346 mfcs.mfcs_packets = c->mfc_un.res.pkt;
2347 mfcs.mfcs_bytes = c->mfc_un.res.bytes;
2348 mfcs.mfcs_wrong_if = c->mfc_un.res.wrong_if;
43b9e127 2349 if (nla_put_64bit(skb, RTA_MFC_STATS, sizeof(mfcs), &mfcs, RTA_PAD) ||
b5036cd4 2350 nla_put_u64_64bit(skb, RTA_EXPIRES, jiffies_to_clock_t(lastuse),
43b9e127 2351 RTA_PAD))
adfa85e4
ND
2352 return -EMSGSIZE;
2353
1da177e4
LT
2354 rtm->rtm_type = RTN_MULTICAST;
2355 return 1;
1da177e4
LT
2356}
2357
9a1b9496
DM
2358int ipmr_get_route(struct net *net, struct sk_buff *skb,
2359 __be32 saddr, __be32 daddr,
9f09eaea 2360 struct rtmsg *rtm, u32 portid)
1da177e4 2361{
1da177e4 2362 struct mfc_cache *cache;
9a1b9496
DM
2363 struct mr_table *mrt;
2364 int err;
1da177e4 2365
f0ad0860 2366 mrt = ipmr_get_table(net, RT_TABLE_DEFAULT);
51456b29 2367 if (!mrt)
f0ad0860
PM
2368 return -ENOENT;
2369
a8c9486b 2370 rcu_read_lock();
9a1b9496 2371 cache = ipmr_cache_find(mrt, saddr, daddr);
51456b29 2372 if (!cache && skb->dev) {
660b26dc 2373 int vif = ipmr_find_vif(mrt, skb->dev);
1da177e4 2374
660b26dc
ND
2375 if (vif >= 0)
2376 cache = ipmr_cache_find_any(mrt, daddr, vif);
2377 }
51456b29 2378 if (!cache) {
72287490 2379 struct sk_buff *skb2;
eddc9ec5 2380 struct iphdr *iph;
1da177e4 2381 struct net_device *dev;
a8cb16dd 2382 int vif = -1;
1da177e4 2383
1da177e4 2384 dev = skb->dev;
a8c9486b 2385 read_lock(&mrt_lock);
a8cb16dd
ED
2386 if (dev)
2387 vif = ipmr_find_vif(mrt, dev);
2388 if (vif < 0) {
1da177e4 2389 read_unlock(&mrt_lock);
a8c9486b 2390 rcu_read_unlock();
1da177e4
LT
2391 return -ENODEV;
2392 }
72287490
AK
2393 skb2 = skb_clone(skb, GFP_ATOMIC);
2394 if (!skb2) {
2395 read_unlock(&mrt_lock);
a8c9486b 2396 rcu_read_unlock();
72287490
AK
2397 return -ENOMEM;
2398 }
2399
2cf75070 2400 NETLINK_CB(skb2).portid = portid;
e2d1bca7
ACM
2401 skb_push(skb2, sizeof(struct iphdr));
2402 skb_reset_network_header(skb2);
eddc9ec5
ACM
2403 iph = ip_hdr(skb2);
2404 iph->ihl = sizeof(struct iphdr) >> 2;
9a1b9496
DM
2405 iph->saddr = saddr;
2406 iph->daddr = daddr;
eddc9ec5 2407 iph->version = 0;
4b1f0d33 2408 err = ipmr_cache_unresolved(mrt, vif, skb2, dev);
1da177e4 2409 read_unlock(&mrt_lock);
a8c9486b 2410 rcu_read_unlock();
1da177e4
LT
2411 return err;
2412 }
2413
a8c9486b 2414 read_lock(&mrt_lock);
cb6a4e46 2415 err = __ipmr_fill_mroute(mrt, skb, cache, rtm);
1da177e4 2416 read_unlock(&mrt_lock);
a8c9486b 2417 rcu_read_unlock();
1da177e4
LT
2418 return err;
2419}
2420
cb6a4e46 2421static int ipmr_fill_mroute(struct mr_table *mrt, struct sk_buff *skb,
65886f43
ND
2422 u32 portid, u32 seq, struct mfc_cache *c, int cmd,
2423 int flags)
cb6a4e46
PM
2424{
2425 struct nlmsghdr *nlh;
2426 struct rtmsg *rtm;
1eb99af5 2427 int err;
cb6a4e46 2428
65886f43 2429 nlh = nlmsg_put(skb, portid, seq, cmd, sizeof(*rtm), flags);
51456b29 2430 if (!nlh)
cb6a4e46
PM
2431 return -EMSGSIZE;
2432
2433 rtm = nlmsg_data(nlh);
2434 rtm->rtm_family = RTNL_FAMILY_IPMR;
2435 rtm->rtm_dst_len = 32;
2436 rtm->rtm_src_len = 32;
2437 rtm->rtm_tos = 0;
2438 rtm->rtm_table = mrt->id;
f3756b79
DM
2439 if (nla_put_u32(skb, RTA_TABLE, mrt->id))
2440 goto nla_put_failure;
cb6a4e46
PM
2441 rtm->rtm_type = RTN_MULTICAST;
2442 rtm->rtm_scope = RT_SCOPE_UNIVERSE;
9a68ac72
ND
2443 if (c->mfc_flags & MFC_STATIC)
2444 rtm->rtm_protocol = RTPROT_STATIC;
2445 else
2446 rtm->rtm_protocol = RTPROT_MROUTED;
cb6a4e46
PM
2447 rtm->rtm_flags = 0;
2448
930345ea
JB
2449 if (nla_put_in_addr(skb, RTA_SRC, c->mfc_origin) ||
2450 nla_put_in_addr(skb, RTA_DST, c->mfc_mcastgrp))
f3756b79 2451 goto nla_put_failure;
1eb99af5
ND
2452 err = __ipmr_fill_mroute(mrt, skb, c, rtm);
2453 /* do not break the dump if cache is unresolved */
2454 if (err < 0 && err != -ENOENT)
cb6a4e46
PM
2455 goto nla_put_failure;
2456
053c095a
JB
2457 nlmsg_end(skb, nlh);
2458 return 0;
cb6a4e46
PM
2459
2460nla_put_failure:
2461 nlmsg_cancel(skb, nlh);
2462 return -EMSGSIZE;
2463}
2464
8cd3ac9f
ND
2465static size_t mroute_msgsize(bool unresolved, int maxvif)
2466{
2467 size_t len =
2468 NLMSG_ALIGN(sizeof(struct rtmsg))
2469 + nla_total_size(4) /* RTA_TABLE */
2470 + nla_total_size(4) /* RTA_SRC */
2471 + nla_total_size(4) /* RTA_DST */
2472 ;
2473
2474 if (!unresolved)
2475 len = len
2476 + nla_total_size(4) /* RTA_IIF */
2477 + nla_total_size(0) /* RTA_MULTIPATH */
2478 + maxvif * NLA_ALIGN(sizeof(struct rtnexthop))
2479 /* RTA_MFC_STATS */
a9a08042 2480 + nla_total_size_64bit(sizeof(struct rta_mfc_stats))
8cd3ac9f
ND
2481 ;
2482
2483 return len;
2484}
2485
2486static void mroute_netlink_event(struct mr_table *mrt, struct mfc_cache *mfc,
2487 int cmd)
2488{
2489 struct net *net = read_pnet(&mrt->net);
2490 struct sk_buff *skb;
2491 int err = -ENOBUFS;
2492
2493 skb = nlmsg_new(mroute_msgsize(mfc->mfc_parent >= MAXVIFS, mrt->maxvif),
2494 GFP_ATOMIC);
51456b29 2495 if (!skb)
8cd3ac9f
ND
2496 goto errout;
2497
65886f43 2498 err = ipmr_fill_mroute(mrt, skb, 0, 0, mfc, cmd, 0);
8cd3ac9f
ND
2499 if (err < 0)
2500 goto errout;
2501
2502 rtnl_notify(skb, net, 0, RTNLGRP_IPV4_MROUTE, NULL, GFP_ATOMIC);
2503 return;
2504
2505errout:
2506 kfree_skb(skb);
2507 if (err < 0)
2508 rtnl_set_sk_err(net, RTNLGRP_IPV4_MROUTE, err);
2509}
2510
5a645dd8
JG
2511static size_t igmpmsg_netlink_msgsize(size_t payloadlen)
2512{
2513 size_t len =
2514 NLMSG_ALIGN(sizeof(struct rtgenmsg))
2515 + nla_total_size(1) /* IPMRA_CREPORT_MSGTYPE */
2516 + nla_total_size(4) /* IPMRA_CREPORT_VIF_ID */
2517 + nla_total_size(4) /* IPMRA_CREPORT_SRC_ADDR */
2518 + nla_total_size(4) /* IPMRA_CREPORT_DST_ADDR */
2519 /* IPMRA_CREPORT_PKT */
2520 + nla_total_size(payloadlen)
2521 ;
2522
2523 return len;
2524}
2525
2526static void igmpmsg_netlink_event(struct mr_table *mrt, struct sk_buff *pkt)
2527{
2528 struct net *net = read_pnet(&mrt->net);
2529 struct nlmsghdr *nlh;
2530 struct rtgenmsg *rtgenm;
2531 struct igmpmsg *msg;
2532 struct sk_buff *skb;
2533 struct nlattr *nla;
2534 int payloadlen;
2535
2536 payloadlen = pkt->len - sizeof(struct igmpmsg);
2537 msg = (struct igmpmsg *)skb_network_header(pkt);
2538
2539 skb = nlmsg_new(igmpmsg_netlink_msgsize(payloadlen), GFP_ATOMIC);
2540 if (!skb)
2541 goto errout;
2542
2543 nlh = nlmsg_put(skb, 0, 0, RTM_NEWCACHEREPORT,
2544 sizeof(struct rtgenmsg), 0);
2545 if (!nlh)
2546 goto errout;
2547 rtgenm = nlmsg_data(nlh);
2548 rtgenm->rtgen_family = RTNL_FAMILY_IPMR;
2549 if (nla_put_u8(skb, IPMRA_CREPORT_MSGTYPE, msg->im_msgtype) ||
2550 nla_put_u32(skb, IPMRA_CREPORT_VIF_ID, msg->im_vif) ||
2551 nla_put_in_addr(skb, IPMRA_CREPORT_SRC_ADDR,
2552 msg->im_src.s_addr) ||
2553 nla_put_in_addr(skb, IPMRA_CREPORT_DST_ADDR,
2554 msg->im_dst.s_addr))
2555 goto nla_put_failure;
2556
2557 nla = nla_reserve(skb, IPMRA_CREPORT_PKT, payloadlen);
2558 if (!nla || skb_copy_bits(pkt, sizeof(struct igmpmsg),
2559 nla_data(nla), payloadlen))
2560 goto nla_put_failure;
2561
2562 nlmsg_end(skb, nlh);
2563
2564 rtnl_notify(skb, net, 0, RTNLGRP_IPV4_MROUTE_R, NULL, GFP_ATOMIC);
2565 return;
2566
2567nla_put_failure:
2568 nlmsg_cancel(skb, nlh);
2569errout:
2570 kfree_skb(skb);
2571 rtnl_set_sk_err(net, RTNLGRP_IPV4_MROUTE_R, -ENOBUFS);
2572}
2573
4f75ba69
DS
2574static int ipmr_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr *nlh,
2575 struct netlink_ext_ack *extack)
2576{
2577 struct net *net = sock_net(in_skb->sk);
2578 struct nlattr *tb[RTA_MAX + 1];
2579 struct sk_buff *skb = NULL;
2580 struct mfc_cache *cache;
2581 struct mr_table *mrt;
2582 struct rtmsg *rtm;
2583 __be32 src, grp;
2584 u32 tableid;
2585 int err;
2586
2587 err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX,
2588 rtm_ipv4_policy, extack);
2589 if (err < 0)
2590 goto errout;
2591
2592 rtm = nlmsg_data(nlh);
2593
2594 src = tb[RTA_SRC] ? nla_get_in_addr(tb[RTA_SRC]) : 0;
2595 grp = tb[RTA_DST] ? nla_get_in_addr(tb[RTA_DST]) : 0;
2596 tableid = tb[RTA_TABLE] ? nla_get_u32(tb[RTA_TABLE]) : 0;
2597
2598 mrt = ipmr_get_table(net, tableid ? tableid : RT_TABLE_DEFAULT);
2e3d232e
DC
2599 if (!mrt) {
2600 err = -ENOENT;
4f75ba69
DS
2601 goto errout_free;
2602 }
2603
2604 /* entries are added/deleted only under RTNL */
2605 rcu_read_lock();
2606 cache = ipmr_cache_find(mrt, src, grp);
2607 rcu_read_unlock();
2608 if (!cache) {
2609 err = -ENOENT;
2610 goto errout_free;
2611 }
2612
2613 skb = nlmsg_new(mroute_msgsize(false, mrt->maxvif), GFP_KERNEL);
2614 if (!skb) {
2615 err = -ENOBUFS;
2616 goto errout_free;
2617 }
2618
2619 err = ipmr_fill_mroute(mrt, skb, NETLINK_CB(in_skb).portid,
2620 nlh->nlmsg_seq, cache,
2621 RTM_NEWROUTE, 0);
2622 if (err < 0)
2623 goto errout_free;
2624
2625 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
2626
2627errout:
2628 return err;
2629
2630errout_free:
2631 kfree_skb(skb);
2632 goto errout;
2633}
2634
cb6a4e46
PM
2635static int ipmr_rtm_dumproute(struct sk_buff *skb, struct netlink_callback *cb)
2636{
2637 struct net *net = sock_net(skb->sk);
2638 struct mr_table *mrt;
2639 struct mfc_cache *mfc;
2640 unsigned int t = 0, s_t;
cb6a4e46
PM
2641 unsigned int e = 0, s_e;
2642
2643 s_t = cb->args[0];
8fb472c0 2644 s_e = cb->args[1];
cb6a4e46 2645
a8c9486b 2646 rcu_read_lock();
cb6a4e46
PM
2647 ipmr_for_each_table(mrt, net) {
2648 if (t < s_t)
2649 goto next_table;
8fb472c0
NA
2650 list_for_each_entry_rcu(mfc, &mrt->mfc_cache_list, list) {
2651 if (e < s_e)
2652 goto next_entry;
2653 if (ipmr_fill_mroute(mrt, skb,
2654 NETLINK_CB(cb->skb).portid,
2655 cb->nlh->nlmsg_seq,
2656 mfc, RTM_NEWROUTE,
2657 NLM_F_MULTI) < 0)
2658 goto done;
cb6a4e46 2659next_entry:
8fb472c0 2660 e++;
cb6a4e46 2661 }
8fb472c0
NA
2662 e = 0;
2663 s_e = 0;
2664
1eb99af5
ND
2665 spin_lock_bh(&mfc_unres_lock);
2666 list_for_each_entry(mfc, &mrt->mfc_unres_queue, list) {
2667 if (e < s_e)
2668 goto next_entry2;
2669 if (ipmr_fill_mroute(mrt, skb,
2670 NETLINK_CB(cb->skb).portid,
2671 cb->nlh->nlmsg_seq,
65886f43
ND
2672 mfc, RTM_NEWROUTE,
2673 NLM_F_MULTI) < 0) {
1eb99af5
ND
2674 spin_unlock_bh(&mfc_unres_lock);
2675 goto done;
2676 }
2677next_entry2:
2678 e++;
2679 }
2680 spin_unlock_bh(&mfc_unres_lock);
8fb472c0
NA
2681 e = 0;
2682 s_e = 0;
cb6a4e46
PM
2683next_table:
2684 t++;
2685 }
2686done:
a8c9486b 2687 rcu_read_unlock();
cb6a4e46 2688
8fb472c0 2689 cb->args[1] = e;
cb6a4e46
PM
2690 cb->args[0] = t;
2691
2692 return skb->len;
2693}
2694
ccbb0aa6
NA
2695static const struct nla_policy rtm_ipmr_policy[RTA_MAX + 1] = {
2696 [RTA_SRC] = { .type = NLA_U32 },
2697 [RTA_DST] = { .type = NLA_U32 },
2698 [RTA_IIF] = { .type = NLA_U32 },
2699 [RTA_TABLE] = { .type = NLA_U32 },
2700 [RTA_MULTIPATH] = { .len = sizeof(struct rtnexthop) },
2701};
2702
2703static bool ipmr_rtm_validate_proto(unsigned char rtm_protocol)
2704{
2705 switch (rtm_protocol) {
2706 case RTPROT_STATIC:
2707 case RTPROT_MROUTED:
2708 return true;
2709 }
2710 return false;
2711}
2712
2713static int ipmr_nla_get_ttls(const struct nlattr *nla, struct mfcctl *mfcc)
2714{
2715 struct rtnexthop *rtnh = nla_data(nla);
2716 int remaining = nla_len(nla), vifi = 0;
2717
2718 while (rtnh_ok(rtnh, remaining)) {
2719 mfcc->mfcc_ttls[vifi] = rtnh->rtnh_hops;
2720 if (++vifi == MAXVIFS)
2721 break;
2722 rtnh = rtnh_next(rtnh, &remaining);
2723 }
2724
2725 return remaining > 0 ? -EINVAL : vifi;
2726}
2727
2728/* returns < 0 on error, 0 for ADD_MFC and 1 for ADD_MFC_PROXY */
2729static int rtm_to_ipmr_mfcc(struct net *net, struct nlmsghdr *nlh,
2730 struct mfcctl *mfcc, int *mrtsock,
c21ef3e3
DA
2731 struct mr_table **mrtret,
2732 struct netlink_ext_ack *extack)
ccbb0aa6
NA
2733{
2734 struct net_device *dev = NULL;
2735 u32 tblid = RT_TABLE_DEFAULT;
2736 struct mr_table *mrt;
2737 struct nlattr *attr;
2738 struct rtmsg *rtm;
2739 int ret, rem;
2740
fceb6435 2741 ret = nlmsg_validate(nlh, sizeof(*rtm), RTA_MAX, rtm_ipmr_policy,
c21ef3e3 2742 extack);
ccbb0aa6
NA
2743 if (ret < 0)
2744 goto out;
2745 rtm = nlmsg_data(nlh);
2746
2747 ret = -EINVAL;
2748 if (rtm->rtm_family != RTNL_FAMILY_IPMR || rtm->rtm_dst_len != 32 ||
2749 rtm->rtm_type != RTN_MULTICAST ||
2750 rtm->rtm_scope != RT_SCOPE_UNIVERSE ||
2751 !ipmr_rtm_validate_proto(rtm->rtm_protocol))
2752 goto out;
2753
2754 memset(mfcc, 0, sizeof(*mfcc));
2755 mfcc->mfcc_parent = -1;
2756 ret = 0;
2757 nlmsg_for_each_attr(attr, nlh, sizeof(struct rtmsg), rem) {
2758 switch (nla_type(attr)) {
2759 case RTA_SRC:
2760 mfcc->mfcc_origin.s_addr = nla_get_be32(attr);
2761 break;
2762 case RTA_DST:
2763 mfcc->mfcc_mcastgrp.s_addr = nla_get_be32(attr);
2764 break;
2765 case RTA_IIF:
2766 dev = __dev_get_by_index(net, nla_get_u32(attr));
2767 if (!dev) {
2768 ret = -ENODEV;
2769 goto out;
2770 }
2771 break;
2772 case RTA_MULTIPATH:
2773 if (ipmr_nla_get_ttls(attr, mfcc) < 0) {
2774 ret = -EINVAL;
2775 goto out;
2776 }
2777 break;
2778 case RTA_PREFSRC:
2779 ret = 1;
2780 break;
2781 case RTA_TABLE:
2782 tblid = nla_get_u32(attr);
2783 break;
2784 }
2785 }
2786 mrt = ipmr_get_table(net, tblid);
2787 if (!mrt) {
2788 ret = -ENOENT;
2789 goto out;
2790 }
2791 *mrtret = mrt;
2792 *mrtsock = rtm->rtm_protocol == RTPROT_MROUTED ? 1 : 0;
2793 if (dev)
2794 mfcc->mfcc_parent = ipmr_find_vif(mrt, dev);
2795
2796out:
2797 return ret;
2798}
2799
2800/* takes care of both newroute and delroute */
c21ef3e3
DA
2801static int ipmr_rtm_route(struct sk_buff *skb, struct nlmsghdr *nlh,
2802 struct netlink_ext_ack *extack)
ccbb0aa6
NA
2803{
2804 struct net *net = sock_net(skb->sk);
2805 int ret, mrtsock, parent;
2806 struct mr_table *tbl;
2807 struct mfcctl mfcc;
2808
2809 mrtsock = 0;
2810 tbl = NULL;
c21ef3e3 2811 ret = rtm_to_ipmr_mfcc(net, nlh, &mfcc, &mrtsock, &tbl, extack);
ccbb0aa6
NA
2812 if (ret < 0)
2813 return ret;
2814
2815 parent = ret ? mfcc.mfcc_parent : -1;
2816 if (nlh->nlmsg_type == RTM_NEWROUTE)
2817 return ipmr_mfc_add(net, tbl, &mfcc, mrtsock, parent);
2818 else
2819 return ipmr_mfc_delete(tbl, &mfcc, parent);
2820}
2821
772c344d
NA
2822static bool ipmr_fill_table(struct mr_table *mrt, struct sk_buff *skb)
2823{
2824 u32 queue_len = atomic_read(&mrt->cache_resolve_queue_len);
2825
2826 if (nla_put_u32(skb, IPMRA_TABLE_ID, mrt->id) ||
2827 nla_put_u32(skb, IPMRA_TABLE_CACHE_RES_QUEUE_LEN, queue_len) ||
2828 nla_put_s32(skb, IPMRA_TABLE_MROUTE_REG_VIF_NUM,
2829 mrt->mroute_reg_vif_num) ||
2830 nla_put_u8(skb, IPMRA_TABLE_MROUTE_DO_ASSERT,
2831 mrt->mroute_do_assert) ||
2832 nla_put_u8(skb, IPMRA_TABLE_MROUTE_DO_PIM, mrt->mroute_do_pim))
2833 return false;
2834
2835 return true;
2836}
2837
2838static bool ipmr_fill_vif(struct mr_table *mrt, u32 vifid, struct sk_buff *skb)
2839{
2840 struct nlattr *vif_nest;
2841 struct vif_device *vif;
2842
2843 /* if the VIF doesn't exist just continue */
2844 if (!VIF_EXISTS(mrt, vifid))
2845 return true;
2846
2847 vif = &mrt->vif_table[vifid];
2848 vif_nest = nla_nest_start(skb, IPMRA_VIF);
2849 if (!vif_nest)
2850 return false;
2851 if (nla_put_u32(skb, IPMRA_VIFA_IFINDEX, vif->dev->ifindex) ||
2852 nla_put_u32(skb, IPMRA_VIFA_VIF_ID, vifid) ||
2853 nla_put_u16(skb, IPMRA_VIFA_FLAGS, vif->flags) ||
2854 nla_put_u64_64bit(skb, IPMRA_VIFA_BYTES_IN, vif->bytes_in,
2855 IPMRA_VIFA_PAD) ||
2856 nla_put_u64_64bit(skb, IPMRA_VIFA_BYTES_OUT, vif->bytes_out,
2857 IPMRA_VIFA_PAD) ||
2858 nla_put_u64_64bit(skb, IPMRA_VIFA_PACKETS_IN, vif->pkt_in,
2859 IPMRA_VIFA_PAD) ||
2860 nla_put_u64_64bit(skb, IPMRA_VIFA_PACKETS_OUT, vif->pkt_out,
2861 IPMRA_VIFA_PAD) ||
2862 nla_put_be32(skb, IPMRA_VIFA_LOCAL_ADDR, vif->local) ||
2863 nla_put_be32(skb, IPMRA_VIFA_REMOTE_ADDR, vif->remote)) {
2864 nla_nest_cancel(skb, vif_nest);
2865 return false;
2866 }
2867 nla_nest_end(skb, vif_nest);
2868
2869 return true;
2870}
2871
2872static int ipmr_rtm_dumplink(struct sk_buff *skb, struct netlink_callback *cb)
2873{
2874 struct net *net = sock_net(skb->sk);
2875 struct nlmsghdr *nlh = NULL;
2876 unsigned int t = 0, s_t;
2877 unsigned int e = 0, s_e;
2878 struct mr_table *mrt;
2879
2880 s_t = cb->args[0];
2881 s_e = cb->args[1];
2882
2883 ipmr_for_each_table(mrt, net) {
2884 struct nlattr *vifs, *af;
2885 struct ifinfomsg *hdr;
2886 u32 i;
2887
2888 if (t < s_t)
2889 goto skip_table;
2890 nlh = nlmsg_put(skb, NETLINK_CB(cb->skb).portid,
2891 cb->nlh->nlmsg_seq, RTM_NEWLINK,
2892 sizeof(*hdr), NLM_F_MULTI);
2893 if (!nlh)
2894 break;
2895
2896 hdr = nlmsg_data(nlh);
2897 memset(hdr, 0, sizeof(*hdr));
2898 hdr->ifi_family = RTNL_FAMILY_IPMR;
2899
2900 af = nla_nest_start(skb, IFLA_AF_SPEC);
2901 if (!af) {
2902 nlmsg_cancel(skb, nlh);
2903 goto out;
2904 }
2905
2906 if (!ipmr_fill_table(mrt, skb)) {
2907 nlmsg_cancel(skb, nlh);
2908 goto out;
2909 }
2910
2911 vifs = nla_nest_start(skb, IPMRA_TABLE_VIFS);
2912 if (!vifs) {
2913 nla_nest_end(skb, af);
2914 nlmsg_end(skb, nlh);
2915 goto out;
2916 }
2917 for (i = 0; i < mrt->maxvif; i++) {
2918 if (e < s_e)
2919 goto skip_entry;
2920 if (!ipmr_fill_vif(mrt, i, skb)) {
2921 nla_nest_end(skb, vifs);
2922 nla_nest_end(skb, af);
2923 nlmsg_end(skb, nlh);
2924 goto out;
2925 }
2926skip_entry:
2927 e++;
2928 }
2929 s_e = 0;
2930 e = 0;
2931 nla_nest_end(skb, vifs);
2932 nla_nest_end(skb, af);
2933 nlmsg_end(skb, nlh);
2934skip_table:
2935 t++;
2936 }
2937
2938out:
2939 cb->args[1] = e;
2940 cb->args[0] = t;
2941
2942 return skb->len;
2943}
2944
e905a9ed 2945#ifdef CONFIG_PROC_FS
7ef8f65d
NA
2946/* The /proc interfaces to multicast routing :
2947 * /proc/net/ip_mr_cache & /proc/net/ip_mr_vif
1da177e4
LT
2948 */
2949struct ipmr_vif_iter {
f6bb4514 2950 struct seq_net_private p;
f0ad0860 2951 struct mr_table *mrt;
1da177e4
LT
2952 int ct;
2953};
2954
f6bb4514
BT
2955static struct vif_device *ipmr_vif_seq_idx(struct net *net,
2956 struct ipmr_vif_iter *iter,
1da177e4
LT
2957 loff_t pos)
2958{
f0ad0860 2959 struct mr_table *mrt = iter->mrt;
0c12295a
PM
2960
2961 for (iter->ct = 0; iter->ct < mrt->maxvif; ++iter->ct) {
2962 if (!VIF_EXISTS(mrt, iter->ct))
1da177e4 2963 continue;
e905a9ed 2964 if (pos-- == 0)
0c12295a 2965 return &mrt->vif_table[iter->ct];
1da177e4
LT
2966 }
2967 return NULL;
2968}
2969
2970static void *ipmr_vif_seq_start(struct seq_file *seq, loff_t *pos)
ba93ef74 2971 __acquires(mrt_lock)
1da177e4 2972{
f0ad0860 2973 struct ipmr_vif_iter *iter = seq->private;
f6bb4514 2974 struct net *net = seq_file_net(seq);
f0ad0860
PM
2975 struct mr_table *mrt;
2976
2977 mrt = ipmr_get_table(net, RT_TABLE_DEFAULT);
51456b29 2978 if (!mrt)
f0ad0860
PM
2979 return ERR_PTR(-ENOENT);
2980
2981 iter->mrt = mrt;
f6bb4514 2982
1da177e4 2983 read_lock(&mrt_lock);
f6bb4514 2984 return *pos ? ipmr_vif_seq_idx(net, seq->private, *pos - 1)
1da177e4
LT
2985 : SEQ_START_TOKEN;
2986}
2987
2988static void *ipmr_vif_seq_next(struct seq_file *seq, void *v, loff_t *pos)
2989{
2990 struct ipmr_vif_iter *iter = seq->private;
f6bb4514 2991 struct net *net = seq_file_net(seq);
f0ad0860 2992 struct mr_table *mrt = iter->mrt;
1da177e4
LT
2993
2994 ++*pos;
2995 if (v == SEQ_START_TOKEN)
f6bb4514 2996 return ipmr_vif_seq_idx(net, iter, 0);
e905a9ed 2997
0c12295a
PM
2998 while (++iter->ct < mrt->maxvif) {
2999 if (!VIF_EXISTS(mrt, iter->ct))
1da177e4 3000 continue;
0c12295a 3001 return &mrt->vif_table[iter->ct];
1da177e4
LT
3002 }
3003 return NULL;
3004}
3005
3006static void ipmr_vif_seq_stop(struct seq_file *seq, void *v)
ba93ef74 3007 __releases(mrt_lock)
1da177e4
LT
3008{
3009 read_unlock(&mrt_lock);
3010}
3011
3012static int ipmr_vif_seq_show(struct seq_file *seq, void *v)
3013{
f0ad0860
PM
3014 struct ipmr_vif_iter *iter = seq->private;
3015 struct mr_table *mrt = iter->mrt;
f6bb4514 3016
1da177e4 3017 if (v == SEQ_START_TOKEN) {
e905a9ed 3018 seq_puts(seq,
1da177e4
LT
3019 "Interface BytesIn PktsIn BytesOut PktsOut Flags Local Remote\n");
3020 } else {
3021 const struct vif_device *vif = v;
3022 const char *name = vif->dev ? vif->dev->name : "none";
3023
3024 seq_printf(seq,
5b5e0928 3025 "%2zd %-10s %8ld %7ld %8ld %7ld %05X %08X %08X\n",
0c12295a 3026 vif - mrt->vif_table,
e905a9ed 3027 name, vif->bytes_in, vif->pkt_in,
1da177e4
LT
3028 vif->bytes_out, vif->pkt_out,
3029 vif->flags, vif->local, vif->remote);
3030 }
3031 return 0;
3032}
3033
f690808e 3034static const struct seq_operations ipmr_vif_seq_ops = {
1da177e4
LT
3035 .start = ipmr_vif_seq_start,
3036 .next = ipmr_vif_seq_next,
3037 .stop = ipmr_vif_seq_stop,
3038 .show = ipmr_vif_seq_show,
3039};
3040
3041static int ipmr_vif_open(struct inode *inode, struct file *file)
3042{
f6bb4514
BT
3043 return seq_open_net(inode, file, &ipmr_vif_seq_ops,
3044 sizeof(struct ipmr_vif_iter));
1da177e4
LT
3045}
3046
9a32144e 3047static const struct file_operations ipmr_vif_fops = {
1da177e4
LT
3048 .owner = THIS_MODULE,
3049 .open = ipmr_vif_open,
3050 .read = seq_read,
3051 .llseek = seq_lseek,
f6bb4514 3052 .release = seq_release_net,
1da177e4
LT
3053};
3054
3055struct ipmr_mfc_iter {
f6bb4514 3056 struct seq_net_private p;
f0ad0860 3057 struct mr_table *mrt;
862465f2 3058 struct list_head *cache;
1da177e4
LT
3059};
3060
f6bb4514
BT
3061static struct mfc_cache *ipmr_mfc_seq_idx(struct net *net,
3062 struct ipmr_mfc_iter *it, loff_t pos)
1da177e4 3063{
f0ad0860 3064 struct mr_table *mrt = it->mrt;
1da177e4
LT
3065 struct mfc_cache *mfc;
3066
a8c9486b 3067 rcu_read_lock();
8fb472c0
NA
3068 it->cache = &mrt->mfc_cache_list;
3069 list_for_each_entry_rcu(mfc, &mrt->mfc_cache_list, list)
3070 if (pos-- == 0)
3071 return mfc;
a8c9486b 3072 rcu_read_unlock();
1da177e4 3073
1da177e4 3074 spin_lock_bh(&mfc_unres_lock);
0c12295a 3075 it->cache = &mrt->mfc_unres_queue;
862465f2 3076 list_for_each_entry(mfc, it->cache, list)
e258beb2 3077 if (pos-- == 0)
1da177e4
LT
3078 return mfc;
3079 spin_unlock_bh(&mfc_unres_lock);
3080
3081 it->cache = NULL;
3082 return NULL;
3083}
3084
3085
3086static void *ipmr_mfc_seq_start(struct seq_file *seq, loff_t *pos)
3087{
3088 struct ipmr_mfc_iter *it = seq->private;
f6bb4514 3089 struct net *net = seq_file_net(seq);
f0ad0860 3090 struct mr_table *mrt;
f6bb4514 3091
f0ad0860 3092 mrt = ipmr_get_table(net, RT_TABLE_DEFAULT);
51456b29 3093 if (!mrt)
f0ad0860 3094 return ERR_PTR(-ENOENT);
f6bb4514 3095
f0ad0860 3096 it->mrt = mrt;
1da177e4 3097 it->cache = NULL;
f6bb4514 3098 return *pos ? ipmr_mfc_seq_idx(net, seq->private, *pos - 1)
1da177e4
LT
3099 : SEQ_START_TOKEN;
3100}
3101
3102static void *ipmr_mfc_seq_next(struct seq_file *seq, void *v, loff_t *pos)
3103{
1da177e4 3104 struct ipmr_mfc_iter *it = seq->private;
f6bb4514 3105 struct net *net = seq_file_net(seq);
f0ad0860 3106 struct mr_table *mrt = it->mrt;
8fb472c0 3107 struct mfc_cache *mfc = v;
1da177e4
LT
3108
3109 ++*pos;
3110
3111 if (v == SEQ_START_TOKEN)
f6bb4514 3112 return ipmr_mfc_seq_idx(net, seq->private, 0);
1da177e4 3113
862465f2
PM
3114 if (mfc->list.next != it->cache)
3115 return list_entry(mfc->list.next, struct mfc_cache, list);
e905a9ed 3116
0c12295a 3117 if (it->cache == &mrt->mfc_unres_queue)
1da177e4
LT
3118 goto end_of_list;
3119
1da177e4 3120 /* exhausted cache_array, show unresolved */
a8c9486b 3121 rcu_read_unlock();
0c12295a 3122 it->cache = &mrt->mfc_unres_queue;
e905a9ed 3123
1da177e4 3124 spin_lock_bh(&mfc_unres_lock);
862465f2
PM
3125 if (!list_empty(it->cache))
3126 return list_first_entry(it->cache, struct mfc_cache, list);
1da177e4 3127
a8cb16dd 3128end_of_list:
1da177e4
LT
3129 spin_unlock_bh(&mfc_unres_lock);
3130 it->cache = NULL;
3131
3132 return NULL;
3133}
3134
3135static void ipmr_mfc_seq_stop(struct seq_file *seq, void *v)
3136{
3137 struct ipmr_mfc_iter *it = seq->private;
f0ad0860 3138 struct mr_table *mrt = it->mrt;
1da177e4 3139
0c12295a 3140 if (it->cache == &mrt->mfc_unres_queue)
1da177e4 3141 spin_unlock_bh(&mfc_unres_lock);
8fb472c0 3142 else if (it->cache == &mrt->mfc_cache_list)
a8c9486b 3143 rcu_read_unlock();
1da177e4
LT
3144}
3145
3146static int ipmr_mfc_seq_show(struct seq_file *seq, void *v)
3147{
3148 int n;
3149
3150 if (v == SEQ_START_TOKEN) {
e905a9ed 3151 seq_puts(seq,
1da177e4
LT
3152 "Group Origin Iif Pkts Bytes Wrong Oifs\n");
3153 } else {
3154 const struct mfc_cache *mfc = v;
3155 const struct ipmr_mfc_iter *it = seq->private;
f0ad0860 3156 const struct mr_table *mrt = it->mrt;
e905a9ed 3157
0eae88f3
ED
3158 seq_printf(seq, "%08X %08X %-3hd",
3159 (__force u32) mfc->mfc_mcastgrp,
3160 (__force u32) mfc->mfc_origin,
1ea472e2 3161 mfc->mfc_parent);
1da177e4 3162
0c12295a 3163 if (it->cache != &mrt->mfc_unres_queue) {
1ea472e2
BT
3164 seq_printf(seq, " %8lu %8lu %8lu",
3165 mfc->mfc_un.res.pkt,
3166 mfc->mfc_un.res.bytes,
3167 mfc->mfc_un.res.wrong_if);
132adf54 3168 for (n = mfc->mfc_un.res.minvif;
a8cb16dd 3169 n < mfc->mfc_un.res.maxvif; n++) {
0c12295a 3170 if (VIF_EXISTS(mrt, n) &&
cf958ae3
BT
3171 mfc->mfc_un.res.ttls[n] < 255)
3172 seq_printf(seq,
e905a9ed 3173 " %2d:%-3d",
1da177e4
LT
3174 n, mfc->mfc_un.res.ttls[n]);
3175 }
1ea472e2
BT
3176 } else {
3177 /* unresolved mfc_caches don't contain
3178 * pkt, bytes and wrong_if values
3179 */
3180 seq_printf(seq, " %8lu %8lu %8lu", 0ul, 0ul, 0ul);
1da177e4
LT
3181 }
3182 seq_putc(seq, '\n');
3183 }
3184 return 0;
3185}
3186
f690808e 3187static const struct seq_operations ipmr_mfc_seq_ops = {
1da177e4
LT
3188 .start = ipmr_mfc_seq_start,
3189 .next = ipmr_mfc_seq_next,
3190 .stop = ipmr_mfc_seq_stop,
3191 .show = ipmr_mfc_seq_show,
3192};
3193
3194static int ipmr_mfc_open(struct inode *inode, struct file *file)
3195{
f6bb4514
BT
3196 return seq_open_net(inode, file, &ipmr_mfc_seq_ops,
3197 sizeof(struct ipmr_mfc_iter));
1da177e4
LT
3198}
3199
9a32144e 3200static const struct file_operations ipmr_mfc_fops = {
1da177e4
LT
3201 .owner = THIS_MODULE,
3202 .open = ipmr_mfc_open,
3203 .read = seq_read,
3204 .llseek = seq_lseek,
f6bb4514 3205 .release = seq_release_net,
1da177e4 3206};
e905a9ed 3207#endif
1da177e4
LT
3208
3209#ifdef CONFIG_IP_PIMSM_V2
32613090 3210static const struct net_protocol pim_protocol = {
1da177e4 3211 .handler = pim_rcv,
403dbb97 3212 .netns_ok = 1,
1da177e4
LT
3213};
3214#endif
3215
4d65b948
YG
3216static unsigned int ipmr_seq_read(struct net *net)
3217{
3218 ASSERT_RTNL();
3219
3220 return net->ipv4.ipmr_seq + ipmr_rules_seq_read(net);
3221}
3222
3223static int ipmr_dump(struct net *net, struct notifier_block *nb)
3224{
3225 struct mr_table *mrt;
3226 int err;
3227
3228 err = ipmr_rules_dump(net, nb);
3229 if (err)
3230 return err;
3231
3232 ipmr_for_each_table(mrt, net) {
3233 struct vif_device *v = &mrt->vif_table[0];
3234 struct mfc_cache *mfc;
3235 int vifi;
3236
3237 /* Notifiy on table VIF entries */
3238 read_lock(&mrt_lock);
3239 for (vifi = 0; vifi < mrt->maxvif; vifi++, v++) {
3240 if (!v->dev)
3241 continue;
3242
3243 call_ipmr_vif_entry_notifier(nb, net, FIB_EVENT_VIF_ADD,
3244 v, vifi, mrt->id);
3245 }
3246 read_unlock(&mrt_lock);
3247
3248 /* Notify on table MFC entries */
3249 list_for_each_entry_rcu(mfc, &mrt->mfc_cache_list, list)
3250 call_ipmr_mfc_entry_notifier(nb, net,
3251 FIB_EVENT_ENTRY_ADD, mfc,
3252 mrt->id);
3253 }
3254
3255 return 0;
3256}
3257
3258static const struct fib_notifier_ops ipmr_notifier_ops_template = {
3259 .family = RTNL_FAMILY_IPMR,
3260 .fib_seq_read = ipmr_seq_read,
3261 .fib_dump = ipmr_dump,
3262 .owner = THIS_MODULE,
3263};
3264
ef739d8a 3265static int __net_init ipmr_notifier_init(struct net *net)
4d65b948
YG
3266{
3267 struct fib_notifier_ops *ops;
3268
3269 net->ipv4.ipmr_seq = 0;
3270
3271 ops = fib_notifier_ops_register(&ipmr_notifier_ops_template, net);
3272 if (IS_ERR(ops))
3273 return PTR_ERR(ops);
3274 net->ipv4.ipmr_notifier_ops = ops;
3275
3276 return 0;
3277}
3278
3279static void __net_exit ipmr_notifier_exit(struct net *net)
3280{
3281 fib_notifier_ops_unregister(net->ipv4.ipmr_notifier_ops);
3282 net->ipv4.ipmr_notifier_ops = NULL;
3283}
3284
7ef8f65d 3285/* Setup for IP multicast routing */
cf958ae3
BT
3286static int __net_init ipmr_net_init(struct net *net)
3287{
f0ad0860 3288 int err;
cf958ae3 3289
4d65b948
YG
3290 err = ipmr_notifier_init(net);
3291 if (err)
3292 goto ipmr_notifier_fail;
3293
f0ad0860
PM
3294 err = ipmr_rules_init(net);
3295 if (err < 0)
4d65b948 3296 goto ipmr_rules_fail;
f6bb4514
BT
3297
3298#ifdef CONFIG_PROC_FS
3299 err = -ENOMEM;
d4beaa66 3300 if (!proc_create("ip_mr_vif", 0, net->proc_net, &ipmr_vif_fops))
f6bb4514 3301 goto proc_vif_fail;
d4beaa66 3302 if (!proc_create("ip_mr_cache", 0, net->proc_net, &ipmr_mfc_fops))
f6bb4514
BT
3303 goto proc_cache_fail;
3304#endif
2bb8b26c
BT
3305 return 0;
3306
f6bb4514
BT
3307#ifdef CONFIG_PROC_FS
3308proc_cache_fail:
ece31ffd 3309 remove_proc_entry("ip_mr_vif", net->proc_net);
f6bb4514 3310proc_vif_fail:
f0ad0860 3311 ipmr_rules_exit(net);
f6bb4514 3312#endif
4d65b948
YG
3313ipmr_rules_fail:
3314 ipmr_notifier_exit(net);
3315ipmr_notifier_fail:
cf958ae3
BT
3316 return err;
3317}
3318
3319static void __net_exit ipmr_net_exit(struct net *net)
3320{
f6bb4514 3321#ifdef CONFIG_PROC_FS
ece31ffd
G
3322 remove_proc_entry("ip_mr_cache", net->proc_net);
3323 remove_proc_entry("ip_mr_vif", net->proc_net);
f6bb4514 3324#endif
4d65b948 3325 ipmr_notifier_exit(net);
f0ad0860 3326 ipmr_rules_exit(net);
cf958ae3
BT
3327}
3328
3329static struct pernet_operations ipmr_net_ops = {
3330 .init = ipmr_net_init,
3331 .exit = ipmr_net_exit,
3332};
e905a9ed 3333
03d2f897 3334int __init ip_mr_init(void)
1da177e4 3335{
03d2f897
WC
3336 int err;
3337
1da177e4
LT
3338 mrt_cachep = kmem_cache_create("ip_mrt_cache",
3339 sizeof(struct mfc_cache),
a8c9486b 3340 0, SLAB_HWCACHE_ALIGN | SLAB_PANIC,
20c2df83 3341 NULL);
03d2f897 3342
cf958ae3
BT
3343 err = register_pernet_subsys(&ipmr_net_ops);
3344 if (err)
3345 goto reg_pernet_fail;
3346
03d2f897
WC
3347 err = register_netdevice_notifier(&ip_mr_notifier);
3348 if (err)
3349 goto reg_notif_fail;
403dbb97
TG
3350#ifdef CONFIG_IP_PIMSM_V2
3351 if (inet_add_protocol(&pim_protocol, IPPROTO_PIM) < 0) {
058bd4d2 3352 pr_err("%s: can't add PIM protocol\n", __func__);
403dbb97
TG
3353 err = -EAGAIN;
3354 goto add_proto_fail;
3355 }
3356#endif
c7ac8679 3357 rtnl_register(RTNL_FAMILY_IPMR, RTM_GETROUTE,
b97bac64 3358 ipmr_rtm_getroute, ipmr_rtm_dumproute, 0);
ccbb0aa6 3359 rtnl_register(RTNL_FAMILY_IPMR, RTM_NEWROUTE,
b97bac64 3360 ipmr_rtm_route, NULL, 0);
ccbb0aa6 3361 rtnl_register(RTNL_FAMILY_IPMR, RTM_DELROUTE,
b97bac64 3362 ipmr_rtm_route, NULL, 0);
772c344d
NA
3363
3364 rtnl_register(RTNL_FAMILY_IPMR, RTM_GETLINK,
b97bac64 3365 NULL, ipmr_rtm_dumplink, 0);
03d2f897 3366 return 0;
f6bb4514 3367
403dbb97
TG
3368#ifdef CONFIG_IP_PIMSM_V2
3369add_proto_fail:
3370 unregister_netdevice_notifier(&ip_mr_notifier);
3371#endif
c3e38896 3372reg_notif_fail:
cf958ae3
BT
3373 unregister_pernet_subsys(&ipmr_net_ops);
3374reg_pernet_fail:
c3e38896 3375 kmem_cache_destroy(mrt_cachep);
03d2f897 3376 return err;
1da177e4 3377}