Home | History | Annotate | Line # | Download | only in mrouted
igmp.c revision 1.8
      1 /*	$NetBSD: igmp.c,v 1.8 2002/08/01 03:40:34 itojun Exp $	*/
      2 
      3 /*
      4  * The mrouted program is covered by the license in the accompanying file
      5  * named "LICENSE".  Use of the mrouted program represents acceptance of
      6  * the terms and conditions listed in that file.
      7  *
      8  * The mrouted program is COPYRIGHT 1989 by The Board of Trustees of
      9  * Leland Stanford Junior University.
     10  */
     11 
     12 
     13 #include "defs.h"
     14 
     15 
     16 /*
     17  * Exported variables.
     18  */
     19 char		*recv_buf; 		     /* input packet buffer         */
     20 char		*send_buf; 		     /* output packet buffer        */
     21 int		igmp_socket;		     /* socket for all network I/O  */
     22 u_int32_t	allhosts_group;		     /* All hosts addr in net order */
     23 u_int32_t	allrtrs_group;		     /* All-Routers "  in net order */
     24 u_int32_t	dvmrp_group;		     /* DVMRP grp addr in net order */
     25 u_int32_t	dvmrp_genid;		     /* IGMP generation id          */
     26 
     27 /*
     28  * Local function definitions.
     29  */
     30 /* u_char promoted to u_int */
     31 static char *	packet_kind(u_int type, u_int code);
     32 static int	igmp_log_level(u_int type, u_int code);
     33 
     34 /*
     35  * Open and initialize the igmp socket, and fill in the non-changing
     36  * IP header fields in the output packet buffer.
     37  */
     38 void
     39 init_igmp(void)
     40 {
     41     struct ip *ip;
     42 
     43     recv_buf = malloc(RECV_BUF_SIZE);
     44     send_buf = malloc(RECV_BUF_SIZE);
     45 
     46     if ((igmp_socket = socket(AF_INET, SOCK_RAW, IPPROTO_IGMP)) < 0)
     47 	log(LOG_ERR, errno, "IGMP socket");
     48 
     49     k_hdr_include(TRUE);	/* include IP header when sending */
     50     k_set_rcvbuf(48*1024);	/* lots of input buffering        */
     51     k_set_ttl(1);		/* restrict multicasts to one hop */
     52     k_set_loop(FALSE);		/* disable multicast loopback     */
     53 
     54     ip         = (struct ip *)send_buf;
     55     ip->ip_hl  = sizeof(struct ip) >> 2;
     56     ip->ip_v   = IPVERSION;
     57     ip->ip_tos = 0;
     58     ip->ip_off = 0;
     59     ip->ip_p   = IPPROTO_IGMP;
     60     ip->ip_ttl = MAXTTL;	/* applies to unicasts only */
     61 
     62     allhosts_group = htonl(INADDR_ALLHOSTS_GROUP);
     63     dvmrp_group    = htonl(INADDR_DVMRP_GROUP);
     64     allrtrs_group  = htonl(INADDR_ALLRTRS_GROUP);
     65 }
     66 
     67 #define PIM_QUERY        0
     68 #define PIM_REGISTER     1
     69 #define PIM_REGISTER_STOP 	2
     70 #define PIM_JOIN_PRUNE   3
     71 #define PIM_RP_REACHABLE 4
     72 #define PIM_ASSERT       5
     73 #define PIM_GRAFT        6
     74 #define PIM_GRAFT_ACK    7
     75 
     76 static char *
     77 packet_kind(u_int type, u_int code)
     78 {
     79     switch (type) {
     80 	case IGMP_HOST_MEMBERSHIP_QUERY:	return "membership query  ";
     81 	case IGMP_v1_HOST_MEMBERSHIP_REPORT:	return "v1 member report  ";
     82 	case IGMP_v2_HOST_MEMBERSHIP_REPORT:	return "v2 member report  ";
     83 	case IGMP_HOST_LEAVE_MESSAGE:           return "leave message     ";
     84 	case IGMP_DVMRP:
     85 	  switch (code) {
     86 	    case DVMRP_PROBE:	    		return "neighbor probe    ";
     87 	    case DVMRP_REPORT:	    		return "route report      ";
     88 	    case DVMRP_ASK_NEIGHBORS:   	return "neighbor request  ";
     89 	    case DVMRP_NEIGHBORS:	    	return "neighbor list     ";
     90 	    case DVMRP_ASK_NEIGHBORS2:   	return "neighbor request 2";
     91 	    case DVMRP_NEIGHBORS2:	    	return "neighbor list 2   ";
     92 	    case DVMRP_PRUNE:			return "prune message     ";
     93 	    case DVMRP_GRAFT:			return "graft message     ";
     94 	    case DVMRP_GRAFT_ACK:		return "graft message ack ";
     95 	    case DVMRP_INFO_REQUEST:		return "info request      ";
     96 	    case DVMRP_INFO_REPLY:		return "info reply        ";
     97 	    default:	    			return "unknown DVMRP msg ";
     98 	  }
     99  	case IGMP_PIM:
    100  	  switch (code) {
    101  	    case PIM_QUERY:			return "PIM Router-Query  ";
    102  	    case PIM_REGISTER:			return "PIM Register      ";
    103  	    case PIM_REGISTER_STOP:		return "PIM Register-Stop ";
    104  	    case PIM_JOIN_PRUNE:		return "PIM Join/Prune    ";
    105  	    case PIM_RP_REACHABLE:		return "PIM RP-Reachable  ";
    106  	    case PIM_ASSERT:			return "PIM Assert        ";
    107  	    case PIM_GRAFT:			return "PIM Graft         ";
    108  	    case PIM_GRAFT_ACK:			return "PIM Graft-Ack     ";
    109  	    default:		    		return "unknown PIM msg   ";
    110  	  }
    111 	case IGMP_MTRACE_QUERY:			return "IGMP trace query  ";
    112 	case IGMP_MTRACE_REPLY:			return "IGMP trace reply  ";
    113 	default:			    	return "unknown IGMP msg  ";
    114     }
    115 }
    116 
    117 /*
    118  * Process a newly received IGMP packet that is sitting in the input
    119  * packet buffer.
    120  */
    121 void
    122 accept_igmp(int recvlen)
    123 {
    124     u_int32_t src, dst, group;
    125     struct ip *ip;
    126     struct igmp *igmp;
    127     int ipdatalen, iphdrlen, igmpdatalen;
    128 
    129     if (recvlen < sizeof(struct ip)) {
    130 	log(LOG_WARNING, 0,
    131 	    "received packet too short (%u bytes) for IP header", recvlen);
    132 	return;
    133     }
    134 
    135     ip        = (struct ip *)recv_buf;
    136     src       = ip->ip_src.s_addr;
    137     dst       = ip->ip_dst.s_addr;
    138 
    139     /*
    140      * this is most likely a message from the kernel indicating that
    141      * a new src grp pair message has arrived and so, it would be
    142      * necessary to install a route into the kernel for this.
    143      */
    144     if (ip->ip_p == 0) {
    145 	if (src == 0 || dst == 0)
    146 	    log(LOG_WARNING, 0, "kernel request not accurate");
    147 	else
    148 	    add_table_entry(src, dst);
    149 	return;
    150     }
    151 
    152     iphdrlen  = ip->ip_hl << 2;
    153     ipdatalen = ip->ip_len;
    154     if (iphdrlen + ipdatalen != recvlen) {
    155 	log(LOG_WARNING, 0,
    156 	    "received packet from %s shorter (%u bytes) than hdr+data length (%u+%u)",
    157 	    inet_fmt(src, s1), recvlen, iphdrlen, ipdatalen);
    158 	return;
    159     }
    160 
    161     igmp        = (struct igmp *)(recv_buf + iphdrlen);
    162     group       = igmp->igmp_group.s_addr;
    163     igmpdatalen = ipdatalen - IGMP_MINLEN;
    164     if (igmpdatalen < 0) {
    165 	log(LOG_WARNING, 0,
    166 	    "received IP data field too short (%u bytes) for IGMP, from %s",
    167 	    ipdatalen, inet_fmt(src, s1));
    168 	return;
    169     }
    170 
    171     log(LOG_DEBUG, 0, "RECV %s from %-15s to %s",
    172 	packet_kind(igmp->igmp_type, igmp->igmp_code),
    173 	inet_fmt(src, s1), inet_fmt(dst, s2));
    174 
    175     switch (igmp->igmp_type) {
    176 
    177 	case IGMP_HOST_MEMBERSHIP_QUERY:
    178 	    accept_membership_query(src, dst, group, igmp->igmp_code);
    179 	    return;
    180 
    181 	case IGMP_v1_HOST_MEMBERSHIP_REPORT:
    182 	case IGMP_v2_HOST_MEMBERSHIP_REPORT:
    183 	    accept_group_report(src, dst, group, igmp->igmp_type);
    184 	    return;
    185 
    186 	case IGMP_HOST_LEAVE_MESSAGE:
    187 	    accept_leave_message(src, dst, group);
    188 	    return;
    189 
    190 	case IGMP_DVMRP:
    191 	    group = ntohl(group);
    192 
    193 	    switch (igmp->igmp_code) {
    194 		case DVMRP_PROBE:
    195 		    accept_probe(src, dst,
    196 				 (char *)(igmp+1), igmpdatalen, group);
    197 		    return;
    198 
    199 		case DVMRP_REPORT:
    200  		    accept_report(src, dst,
    201 				  (char *)(igmp+1), igmpdatalen, group);
    202 		    return;
    203 
    204 		case DVMRP_ASK_NEIGHBORS:
    205 		    accept_neighbor_request(src, dst);
    206 		    return;
    207 
    208 		case DVMRP_ASK_NEIGHBORS2:
    209 		    accept_neighbor_request2(src, dst);
    210 		    return;
    211 
    212 		case DVMRP_NEIGHBORS:
    213 		    accept_neighbors(src, dst, (u_char *)(igmp+1), igmpdatalen,
    214 					     group);
    215 		    return;
    216 
    217 		case DVMRP_NEIGHBORS2:
    218 		    accept_neighbors2(src, dst, (u_char *)(igmp+1), igmpdatalen,
    219 					     group);
    220 		    return;
    221 
    222 		case DVMRP_PRUNE:
    223 		    accept_prune(src, dst, (char *)(igmp+1), igmpdatalen);
    224 		    return;
    225 
    226 		case DVMRP_GRAFT:
    227 		    accept_graft(src, dst, (char *)(igmp+1), igmpdatalen);
    228 		    return;
    229 
    230 		case DVMRP_GRAFT_ACK:
    231 		    accept_g_ack(src, dst, (char *)(igmp+1), igmpdatalen);
    232 		    return;
    233 
    234 		case DVMRP_INFO_REQUEST:
    235 		    accept_info_request(src, dst, (char *)(igmp+1),
    236 				igmpdatalen);
    237 		    return;
    238 
    239 		case DVMRP_INFO_REPLY:
    240 		    accept_info_reply(src, dst, (char *)(igmp+1), igmpdatalen);
    241 		    return;
    242 
    243 		default:
    244 		    log(LOG_INFO, 0,
    245 		     "ignoring unknown DVMRP message code %u from %s to %s",
    246 		     igmp->igmp_code, inet_fmt(src, s1),
    247 		     inet_fmt(dst, s2));
    248 		    return;
    249 	    }
    250 
    251  	case IGMP_PIM:
    252  	    return;
    253 
    254 	case IGMP_MTRACE_REPLY:
    255 	    return;
    256 
    257 	case IGMP_MTRACE_QUERY:
    258 	    accept_mtrace(src, dst, group, (char *)(igmp+1),
    259 		   igmp->igmp_code, igmpdatalen);
    260 	    return;
    261 
    262 	default:
    263 	    log(LOG_INFO, 0,
    264 		"ignoring unknown IGMP message type %x from %s to %s",
    265 		igmp->igmp_type, inet_fmt(src, s1),
    266 		inet_fmt(dst, s2));
    267 	    return;
    268     }
    269 }
    270 
    271 /*
    272  * Some IGMP messages are more important than others.  This routine
    273  * determines the logging level at which to log a send error (often
    274  * "No route to host").  This is important when there is asymmetric
    275  * reachability and someone is trying to, i.e., mrinfo me periodically.
    276  */
    277 static int
    278 igmp_log_level(u_int type, u_int code)
    279 {
    280     switch (type) {
    281 	case IGMP_MTRACE_REPLY:
    282 	    return LOG_INFO;
    283 
    284 	case IGMP_DVMRP:
    285 	  switch (code) {
    286 	    case DVMRP_NEIGHBORS:
    287 	    case DVMRP_NEIGHBORS2:
    288 		return LOG_INFO;
    289 	  }
    290     }
    291     return LOG_WARNING;
    292 }
    293 
    294 /*
    295  * Construct an IGMP message in the output packet buffer.  The caller may
    296  * have already placed data in that buffer, of length 'datalen'.  Then send
    297  * the message from the interface with IP address 'src' to destination 'dst'.
    298  */
    299 void
    300 send_igmp(u_int32_t src, u_int32_t dst, int type, int code, u_int32_t group,
    301 	  int datalen)
    302 {
    303     struct sockaddr_in sdst;
    304     struct ip *ip;
    305     struct igmp *igmp;
    306     int setloop;
    307 
    308     setloop                 = 0;
    309     ip                      = (struct ip *)send_buf;
    310     ip->ip_src.s_addr       = src;
    311     ip->ip_dst.s_addr       = dst;
    312     ip->ip_len              = MIN_IP_HEADER_LEN + IGMP_MINLEN + datalen;
    313 
    314     igmp                    = (struct igmp *)(send_buf + MIN_IP_HEADER_LEN);
    315     igmp->igmp_type         = type;
    316     igmp->igmp_code         = code;
    317     igmp->igmp_group.s_addr = group;
    318     igmp->igmp_cksum        = 0;
    319     igmp->igmp_cksum        = inet_cksum((u_int16_t *)igmp,
    320 					 IGMP_MINLEN + datalen);
    321 
    322     if (IN_MULTICAST(ntohl(dst))) {
    323 	k_set_if(src);
    324 	if (type != IGMP_DVMRP) {
    325 	    setloop = 1;
    326 	    k_set_loop(TRUE);
    327 	}
    328     }
    329 
    330     bzero(&sdst, sizeof(sdst));
    331     sdst.sin_family = AF_INET;
    332 #if (defined(BSD) && (BSD >= 199103))
    333     sdst.sin_len = sizeof(sdst);
    334 #endif
    335     sdst.sin_addr.s_addr = dst;
    336     if (sendto(igmp_socket, send_buf, ip->ip_len, 0,
    337 			(struct sockaddr *)&sdst, sizeof(sdst)) < 0) {
    338 	if (errno == ENETDOWN)
    339 	    check_vif_state();
    340 	else
    341 	    log(igmp_log_level(type, code), errno,
    342 		"sendto to %s on %s",
    343 		inet_fmt(dst, s1), inet_fmt(src, s2));
    344     }
    345 
    346     if (setloop)
    347 	    k_set_loop(FALSE);
    348 
    349     log(LOG_DEBUG, 0, "SENT %s from %-15s to %s",
    350 	packet_kind(type, code), inet_fmt(src, s1), inet_fmt(dst, s2));
    351 }
    352